diff --git a/doc/languages-frameworks/go.section.md b/doc/languages-frameworks/go.section.md
index 411205d08e43..9c67a514335e 100644
--- a/doc/languages-frameworks/go.section.md
+++ b/doc/languages-frameworks/go.section.md
@@ -142,4 +142,8 @@ Removes the pre-existing vendor directory. This should only be used if the depen
### `subPackages` {#var-go-subPackages}
-Limits the builder from building child packages that have not been listed. If `subPackages` is not specified, all child packages will be built.
+Specified as a string or list of strings. Limits the builder from building child packages that have not been listed. If `subPackages` is not specified, all child packages will be built.
+
+### `excludedPackages` {#var-go-excludedPackages}
+
+Specified as a string or list of strings. Causes the builder to skip building child packages that match any of the provided values. If `excludedPackages` is not specified, all child packages will be built.
diff --git a/maintainers/scripts/dep-licenses.sh b/maintainers/scripts/dep-licenses.sh
index 28ad22c334fc..816dcf6d7f76 100755
--- a/maintainers/scripts/dep-licenses.sh
+++ b/maintainers/scripts/dep-licenses.sh
@@ -9,7 +9,7 @@ tmp=$(mktemp --tmpdir -d nixpkgs-dep-license.XXXXXX)
exitHandler() {
exitCode=$?
rm -rf "$tmp"
- exit $exitCode
+ return $exitCode
}
trap "exitHandler" EXIT
diff --git a/nixos/doc/manual/from_md/release-notes/rl-2205.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
index 823fa3bc6639..dc428b533e36 100644
--- a/nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
+++ b/nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
@@ -68,6 +68,11 @@
granular distinction between reloads and restarts.
+
+
+ Systemd has been upgraded to the version 250.
+
+
kops
@@ -444,6 +449,12 @@
relying on the insecure behaviour before upgrading.
+
+
+ openssh has been update to 8.9p1, changing
+ the FIDO security key middleware interface.
+
+
services.k3s.enable no longer implies
diff --git a/nixos/doc/manual/release-notes/rl-2205.section.md b/nixos/doc/manual/release-notes/rl-2205.section.md
index 4ce04b16ace5..b8b070bd6cf4 100644
--- a/nixos/doc/manual/release-notes/rl-2205.section.md
+++ b/nixos/doc/manual/release-notes/rl-2205.section.md
@@ -25,6 +25,8 @@ In addition to numerous new and upgraded packages, this release has the followin
- systemd services can now set [systemd.services.\.reloadTriggers](#opt-systemd.services) instead of `reloadIfChanged` for a more granular distinction between reloads and restarts.
+- Systemd has been upgraded to the version 250.
+
- [`kops`](https://kops.sigs.k8s.io) defaults to 1.22.4, which will enable [Instance Metadata Service Version 2](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html) and require tokens on new clusters with Kubernetes 1.22. This will increase security by default, but may break some types of workloads. See the [release notes](https://kops.sigs.k8s.io/releases/1.22-notes/) for details.
- Module authors can use `mkRenamedOptionModuleWith` to automate the deprecation cycle without annoying out-of-tree module authors and their users.
@@ -143,6 +145,8 @@ In addition to numerous new and upgraded packages, this release has the followin
- `services.kubernetes.scheduler.{port,address}` now set `--secure-port` and `--bind-address` instead of `--port` and `--address`, since the former have been deprecated and are no longer functional in kubernetes>=1.23. Ensure that you are not relying on the insecure behaviour before upgrading.
+- `openssh` has been update to 8.9p1, changing the FIDO security key middleware interface.
+
- `services.k3s.enable` no longer implies `systemd.enableUnifiedCgroupHierarchy = false`, and will default to the 'systemd' cgroup driver when using `services.k3s.docker = true`.
This change may require a reboot to take effect, and k3s may not be able to run if the boot cgroup hierarchy does not match its configuration.
The previous behavior may be retained by explicitly setting `systemd.enableUnifiedCgroupHierarchy = false` in your configuration.
diff --git a/nixos/modules/services/misc/nix-daemon.nix b/nixos/modules/services/misc/nix-daemon.nix
index 4bc5b04d3a08..a4d2d10af70f 100644
--- a/nixos/modules/services/misc/nix-daemon.nix
+++ b/nixos/modules/services/misc/nix-daemon.nix
@@ -708,6 +708,14 @@ in
systemd.packages = [ nixPackage ];
+ # Will only work once https://github.com/NixOS/nix/pull/6285 is merged
+ # systemd.tmpfiles.packages = [ nixPackage ];
+
+ # Can be dropped for Nix > https://github.com/NixOS/nix/pull/6285
+ systemd.tmpfiles.rules = [
+ "d /nix/var/nix/daemon-socket 0755 root root - -"
+ ];
+
systemd.sockets.nix-daemon.wantedBy = [ "sockets.target" ];
systemd.services.nix-daemon =
diff --git a/nixos/modules/system/boot/networkd.nix b/nixos/modules/system/boot/networkd.nix
index 092b7b8863ae..1e9f870b32fb 100644
--- a/nixos/modules/system/boot/networkd.nix
+++ b/nixos/modules/system/boot/networkd.nix
@@ -281,6 +281,8 @@ let
"PrivateKeyFile"
"ListenPort"
"FirewallMark"
+ "RouteTable"
+ "RouteMetric"
])
(assertInt "FirewallMark")
(assertRange "FirewallMark" 1 4294967295)
@@ -296,6 +298,8 @@ let
"AllowedIPs"
"Endpoint"
"PersistentKeepalive"
+ "RouteTable"
+ "RouteMetric"
])
(assertInt "PersistentKeepalive")
(assertRange "PersistentKeepalive" 0 65535)
diff --git a/nixos/modules/system/boot/stage-1-init.sh b/nixos/modules/system/boot/stage-1-init.sh
index 8fcc1f029723..317583669809 100644
--- a/nixos/modules/system/boot/stage-1-init.sh
+++ b/nixos/modules/system/boot/stage-1-init.sh
@@ -232,7 +232,8 @@ done
mkdir -p /lib
ln -s @modulesClosure@/lib/modules /lib/modules
ln -s @modulesClosure@/lib/firmware /lib/firmware
-echo @extraUtils@/bin/modprobe > /proc/sys/kernel/modprobe
+# see comment in stage-1.nix for explanation
+echo @extraUtils@/bin/modprobe-kernel > /proc/sys/kernel/modprobe
for i in @kernelModules@; do
info "loading module $(basename $i)..."
modprobe $i
diff --git a/nixos/modules/system/boot/stage-1.nix b/nixos/modules/system/boot/stage-1.nix
index 1bafec30b53d..04753a6767d9 100644
--- a/nixos/modules/system/boot/stage-1.nix
+++ b/nixos/modules/system/boot/stage-1.nix
@@ -131,6 +131,26 @@ let
copy_bin_and_libs ${pkgs.kmod}/bin/kmod
ln -sf kmod $out/bin/modprobe
+ # Dirty hack to make sure the kernel properly loads modules
+ # such as ext4 on demand (e.g. on a `mount(2)` syscall). This is necessary
+ # because `kmod` isn't linked against `libpthread.so.0` anymore (since
+ # it was merged into `libc.so.6` since version `2.34`), but still needs
+ # to access it for some reason. This is not an issue in stage-1 itself
+ # because of the `LD_LIBRARY_PATH`-variable and anytime later because the rpath of
+ # kmod/modprobe points to glibc's `$out/lib` where `libpthread.so.6` exists.
+ # However, this is a problem when the kernel calls `modprobe` inside
+ # the initial ramdisk because it doesn't know about the
+ # `LD_LIBRARY_PATH` and the rpath was nuked.
+ #
+ # Also, we can't use `makeWrapper` here because `kmod` only does
+ # `modprobe` functionality if `argv[0] == "modprobe"`.
+ cat >$out/bin/modprobe-kernel <
diff --git a/pkgs/applications/kde/fetch.sh b/pkgs/applications/kde/fetch.sh
index 72b76131f64a..a24ef563f3e9 100644
--- a/pkgs/applications/kde/fetch.sh
+++ b/pkgs/applications/kde/fetch.sh
@@ -1 +1 @@
-WGET_ARGS=( https://download.kde.org/stable/release-service/21.12.2/src -A '*.tar.xz' )
+WGET_ARGS=( https://download.kde.org/stable/release-service/21.12.3/src -A '*.tar.xz' )
diff --git a/pkgs/applications/kde/kitinerary.nix b/pkgs/applications/kde/kitinerary.nix
index 83763ba965af..f69e705bb2f9 100644
--- a/pkgs/applications/kde/kitinerary.nix
+++ b/pkgs/applications/kde/kitinerary.nix
@@ -1,4 +1,4 @@
-{ mkDerivation, fetchpatch, lib, extra-cmake-modules
+{ mkDerivation, lib, extra-cmake-modules
, qtdeclarative, ki18n, kmime, kpkpass
, poppler, kcontacts, kcalendarcore
, shared-mime-info
@@ -10,15 +10,6 @@ mkDerivation {
license = with lib.licenses; [ lgpl21 ];
maintainers = [ lib.maintainers.bkchr ];
};
-
- patches = [
- # Fix build with poppler 22.03
- (fetchpatch {
- url = "https://github.com/KDE/kitinerary/commit/e21d1ffc5fa81a636245f49c97fe7cda63abbb1d.patch";
- sha256 = "1/zgq9QIOCPplqplDqgpoqzuYFf/m1Ixxawe50t2F04=";
- })
- ];
-
nativeBuildInputs = [
extra-cmake-modules
shared-mime-info # for update-mime-database
diff --git a/pkgs/applications/kde/srcs.nix b/pkgs/applications/kde/srcs.nix
index af8e47dd7493..3d5948c290dc 100644
--- a/pkgs/applications/kde/srcs.nix
+++ b/pkgs/applications/kde/srcs.nix
@@ -4,1843 +4,1843 @@
{
akonadi = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/akonadi-21.12.2.tar.xz";
- sha256 = "1i1q8zda3hl564w02478wyqv35wj8npkqayy7b13shkq9b9j3nj8";
- name = "akonadi-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/akonadi-21.12.3.tar.xz";
+ sha256 = "026srxk7da20vfhbj7jh8aip3sylpm61czwblj3wxxps0vbxxs2g";
+ name = "akonadi-21.12.3.tar.xz";
};
};
akonadi-calendar = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/akonadi-calendar-21.12.2.tar.xz";
- sha256 = "001ndvgqn6x70s7gdya1f1vr080mfkypam3k6z0i2ivlpymc3wly";
- name = "akonadi-calendar-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/akonadi-calendar-21.12.3.tar.xz";
+ sha256 = "0hzy6y9pxa06k0pp5yr84i0sv15qgzjn7nrlmsylm6iy7fspqqbq";
+ name = "akonadi-calendar-21.12.3.tar.xz";
};
};
akonadi-calendar-tools = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/akonadi-calendar-tools-21.12.2.tar.xz";
- sha256 = "0f0l6wj3h2afbmvnq60cg0x03a412849dg4l9dwgdn8yxvnxkhw6";
- name = "akonadi-calendar-tools-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/akonadi-calendar-tools-21.12.3.tar.xz";
+ sha256 = "1idh6kf8h9158rgw3b5lld7z9mvvif00jrvpz891cziblvr19p4a";
+ name = "akonadi-calendar-tools-21.12.3.tar.xz";
};
};
akonadi-contacts = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/akonadi-contacts-21.12.2.tar.xz";
- sha256 = "1aq81569kz529n66dl5jjzamy6kxw0xk5bcmjfvb3wpxznhiigqm";
- name = "akonadi-contacts-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/akonadi-contacts-21.12.3.tar.xz";
+ sha256 = "04ixj09s27q8pbmfrb1475bc0h84sb5ikfxzpc4i5b3whx40g9dm";
+ name = "akonadi-contacts-21.12.3.tar.xz";
};
};
akonadi-import-wizard = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/akonadi-import-wizard-21.12.2.tar.xz";
- sha256 = "0b4mphxbqzf3akhafxc4fvil83l3z4qcf8xnblw23ficqqs8s0di";
- name = "akonadi-import-wizard-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/akonadi-import-wizard-21.12.3.tar.xz";
+ sha256 = "1fbxx53zdcqp98mzdx45ccncppnxqfhc7j9qwwxcik0ygrmg9wcj";
+ name = "akonadi-import-wizard-21.12.3.tar.xz";
};
};
akonadi-mime = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/akonadi-mime-21.12.2.tar.xz";
- sha256 = "1nd6bf26lb5wfhzh4kn37iwmb6savcq9wsaph5c7jg6m0bdix1fn";
- name = "akonadi-mime-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/akonadi-mime-21.12.3.tar.xz";
+ sha256 = "1bcrbf5z9175p206cvm5s6zq882nb32cf9akdcbnadqiibrpxkxv";
+ name = "akonadi-mime-21.12.3.tar.xz";
};
};
akonadi-notes = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/akonadi-notes-21.12.2.tar.xz";
- sha256 = "1s3bxnqsjnlgsnia0nvqyc3m1ppzanzna9598lgwbmz053rgn7ck";
- name = "akonadi-notes-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/akonadi-notes-21.12.3.tar.xz";
+ sha256 = "0xkcw9izgxfzglciig2i4wiz6iflzjg0d6dp1nq6p1kwxwc899sb";
+ name = "akonadi-notes-21.12.3.tar.xz";
};
};
akonadi-search = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/akonadi-search-21.12.2.tar.xz";
- sha256 = "1hp2x8y59azl59znrqhrjn4n1bs2iqnkdsldv1f2k1ima6z5f4qy";
- name = "akonadi-search-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/akonadi-search-21.12.3.tar.xz";
+ sha256 = "1id6zzjxc9zvpz1ryj2zn1yff5ak04r1mlk9cklbj99frzf0wv6p";
+ name = "akonadi-search-21.12.3.tar.xz";
};
};
akonadiconsole = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/akonadiconsole-21.12.2.tar.xz";
- sha256 = "1rqfmhi1mzh6yzjg7jf6adf1xqvpbhcxgld2pp4rd9g5mi9rlxlk";
- name = "akonadiconsole-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/akonadiconsole-21.12.3.tar.xz";
+ sha256 = "1chb0ars9w05pq6ij2l8qfj1ac7pmzwg2mq1i4z8syhdklyryir1";
+ name = "akonadiconsole-21.12.3.tar.xz";
};
};
akregator = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/akregator-21.12.2.tar.xz";
- sha256 = "1srsm25qvbww0hl7r878n32b71g0p222zxyys7chzrg8izrh12b8";
- name = "akregator-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/akregator-21.12.3.tar.xz";
+ sha256 = "1yy5c29zxpli4cddknmdvjkgii3j7pvw6lhwqfrqjc8jh83gm8f8";
+ name = "akregator-21.12.3.tar.xz";
};
};
analitza = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/analitza-21.12.2.tar.xz";
- sha256 = "1ak2wyfx67cwx85d5053f6flxwas973mhnm25mf4jw0qll72vid4";
- name = "analitza-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/analitza-21.12.3.tar.xz";
+ sha256 = "0rgims4c80nficibg3lh764csh0kjsfnf7h303kyfd9yk59xa3in";
+ name = "analitza-21.12.3.tar.xz";
};
};
ark = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ark-21.12.2.tar.xz";
- sha256 = "1g05lyv8ll85myw0i62bxr4kmfd3dhldvmbgpgym9r1rgan12q90";
- name = "ark-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ark-21.12.3.tar.xz";
+ sha256 = "1p30bgnb3aw0f2jnaksz7jfqqcz45b2x3bjrri0w5w580204a5s8";
+ name = "ark-21.12.3.tar.xz";
};
};
artikulate = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/artikulate-21.12.2.tar.xz";
- sha256 = "1g0h0dqqsf3x8q292hfhrizl9dlqzm8gjynzcyrzx0gvbfadj2l1";
- name = "artikulate-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/artikulate-21.12.3.tar.xz";
+ sha256 = "0fbgmd3yfyv1pzz24874a0v7cl4yk6wlfryn8sn21smi054wqz6z";
+ name = "artikulate-21.12.3.tar.xz";
};
};
audiocd-kio = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/audiocd-kio-21.12.2.tar.xz";
- sha256 = "07nk060vkyn94ihs9v054zhsckfwpn8z911gy3hnyf1wdmnpfh2n";
- name = "audiocd-kio-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/audiocd-kio-21.12.3.tar.xz";
+ sha256 = "1alyn7w0v1by3fkb6xfnwj0hayjrrnmwnajnrnpvn8skbqsbzlgc";
+ name = "audiocd-kio-21.12.3.tar.xz";
};
};
baloo-widgets = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/baloo-widgets-21.12.2.tar.xz";
- sha256 = "1ax7pak9qb60yzdca8frkb8qs4khs6f2wbkwyb48s7zmdxqyw1bj";
- name = "baloo-widgets-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/baloo-widgets-21.12.3.tar.xz";
+ sha256 = "0cfcfmsgbaxi53a3r0f013lskm5yll7zaxw98nlj6r8fsq2slrhv";
+ name = "baloo-widgets-21.12.3.tar.xz";
};
};
blinken = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/blinken-21.12.2.tar.xz";
- sha256 = "0h0nw79zr891f54y2r3d3n837bzn24pfvkxsab1f0a228kjakw09";
- name = "blinken-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/blinken-21.12.3.tar.xz";
+ sha256 = "1pbwb7q4p705k31kd62gira0x9qccjsn07d6h1w44wydc3lfdjnc";
+ name = "blinken-21.12.3.tar.xz";
};
};
bomber = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/bomber-21.12.2.tar.xz";
- sha256 = "1348mdiykfg1c3gr5fkcf71mxf7lyapwg5ym3jqp9vyc56vhwfjs";
- name = "bomber-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/bomber-21.12.3.tar.xz";
+ sha256 = "1mlxs2dbsycq7mw9g1hl2l17gl0z33mrry5r0zmz74i67nfijg8w";
+ name = "bomber-21.12.3.tar.xz";
};
};
bovo = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/bovo-21.12.2.tar.xz";
- sha256 = "0i2i5ici9v402lrh83mhfsrxmqi0fs75rkfvhsbza3wab7b165kc";
- name = "bovo-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/bovo-21.12.3.tar.xz";
+ sha256 = "1jzvazqy5vcwkyhnbzw7sh8ngff5clclq98vbbhzd9dmnacirdbq";
+ name = "bovo-21.12.3.tar.xz";
};
};
calendarsupport = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/calendarsupport-21.12.2.tar.xz";
- sha256 = "021rr06ln7l0v2xjzsij4r71jwpy1w1r761bjad0ywprwkdc93bm";
- name = "calendarsupport-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/calendarsupport-21.12.3.tar.xz";
+ sha256 = "0annni037cp1ga2lj2gkjxlkygnaxna4fs095lbaqp5zljz3g8vp";
+ name = "calendarsupport-21.12.3.tar.xz";
};
};
cantor = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/cantor-21.12.2.tar.xz";
- sha256 = "0vq8yvdglf43y5r2f9bvamm9bp82q92hw9sr8xmgb5hqz5mkap78";
- name = "cantor-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/cantor-21.12.3.tar.xz";
+ sha256 = "0v0xcgaz3rag044wmpiq8gs7pp6n7wcca0q1hzav7i651pgqjjks";
+ name = "cantor-21.12.3.tar.xz";
};
};
cervisia = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/cervisia-21.12.2.tar.xz";
- sha256 = "1vpm3cjknpa4s9mjdfngpvidqihfh5sb427yhnydr1q2dmllr9nn";
- name = "cervisia-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/cervisia-21.12.3.tar.xz";
+ sha256 = "106x0xrscc6xvgijmqy892r1hrirjh32nj8lqhc7g7dzjaa7lhsj";
+ name = "cervisia-21.12.3.tar.xz";
};
};
dolphin = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/dolphin-21.12.2.tar.xz";
- sha256 = "0c0gk1djgl1d1qzibw5f1w29cnlxl6kan8pkg0izaqvnbmmx53wn";
- name = "dolphin-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/dolphin-21.12.3.tar.xz";
+ sha256 = "0m5nqa8j0mcsrx9wxfcf8z39kxas51k03lschr721vm4x65j64jq";
+ name = "dolphin-21.12.3.tar.xz";
};
};
dolphin-plugins = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/dolphin-plugins-21.12.2.tar.xz";
- sha256 = "1mrsampq1zq5rri1kx77dz0afz4a6s8pvb1255q0pl7imgxhiaqc";
- name = "dolphin-plugins-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/dolphin-plugins-21.12.3.tar.xz";
+ sha256 = "0rbz6fw98c71h10ry1xjc0pgzvphajmj18lnjm4hf7bbrizsmdb5";
+ name = "dolphin-plugins-21.12.3.tar.xz";
};
};
dragon = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/dragon-21.12.2.tar.xz";
- sha256 = "07zn4ishffh9g8hvkpfgm7j9cimw3plcabzk9p157nhgxr62z4sb";
- name = "dragon-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/dragon-21.12.3.tar.xz";
+ sha256 = "09iwwlbv4jmxs92dz20z9fqg1sfnqih54izz8459ibl8vydfgfp1";
+ name = "dragon-21.12.3.tar.xz";
};
};
elisa = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/elisa-21.12.2.tar.xz";
- sha256 = "0zwy0bi4s25y6adgjhrhw992i2c1kjwpgvp9yg902h8zpsdynwh5";
- name = "elisa-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/elisa-21.12.3.tar.xz";
+ sha256 = "0cg9v438fclqnv1rgx2k86mzfp5ggfcp7d5kr8xh4kjbmy17rzca";
+ name = "elisa-21.12.3.tar.xz";
};
};
eventviews = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/eventviews-21.12.2.tar.xz";
- sha256 = "1v3bpd0b3ph7v0kg8pyp4rr4j8cxy7y4csym5dlqn6l81db7d3gr";
- name = "eventviews-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/eventviews-21.12.3.tar.xz";
+ sha256 = "01x9ccwspn1dwkmcxcr8p6pazj6w31pxhx0bzlfr6bgpccicp2w2";
+ name = "eventviews-21.12.3.tar.xz";
};
};
ffmpegthumbs = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ffmpegthumbs-21.12.2.tar.xz";
- sha256 = "17cyrimlnf1npffmxinnj3q5ynqg3agx35b55iqnw3xixrz4snzr";
- name = "ffmpegthumbs-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ffmpegthumbs-21.12.3.tar.xz";
+ sha256 = "0x2gpx30azkz61p3xj1nm7hckyrmyh0qhs29ah30z6a5xw7336ws";
+ name = "ffmpegthumbs-21.12.3.tar.xz";
};
};
filelight = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/filelight-21.12.2.tar.xz";
- sha256 = "0khhwnms2ysy9ijpmmagm68w1zixmxs7svaaldd30xb3w52f78v2";
- name = "filelight-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/filelight-21.12.3.tar.xz";
+ sha256 = "1w3q0l9p5ry2crwdzcyb1d4ms2y4gp3y0a3j5drpy8clmxn0gz18";
+ name = "filelight-21.12.3.tar.xz";
};
};
granatier = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/granatier-21.12.2.tar.xz";
- sha256 = "0j7yizbljqx1a4wd4prmb3463r67f3lk5gv5x8j1yx2zmiaq0qki";
- name = "granatier-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/granatier-21.12.3.tar.xz";
+ sha256 = "16yriharl66frglmdy6750nixczh0l4c19nnr6dav15m8qfb3g6b";
+ name = "granatier-21.12.3.tar.xz";
};
};
grantlee-editor = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/grantlee-editor-21.12.2.tar.xz";
- sha256 = "0wxkg56s83i61i17cb2y6ziminaq2gammynrwm5jvkpi5vqwvi2s";
- name = "grantlee-editor-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/grantlee-editor-21.12.3.tar.xz";
+ sha256 = "00qy1ncgwylc995g051x5l679s16wjpcj7il62ck7d0j02rah0n2";
+ name = "grantlee-editor-21.12.3.tar.xz";
};
};
grantleetheme = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/grantleetheme-21.12.2.tar.xz";
- sha256 = "0z1p0s7fakfbscppmrgp1irf3dm2ayadyd3yb5zdsr9xahs0b9md";
- name = "grantleetheme-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/grantleetheme-21.12.3.tar.xz";
+ sha256 = "1w83slbkj2y1wk78srq2k95ybs66sb4mbaa0zm7fl9pkwhqxbnb7";
+ name = "grantleetheme-21.12.3.tar.xz";
};
};
gwenview = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/gwenview-21.12.2.tar.xz";
- sha256 = "1jkv34llga981dq08npk8alrg9h27prdpffcxkm368i77mvp9hv6";
- name = "gwenview-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/gwenview-21.12.3.tar.xz";
+ sha256 = "0zbsyrwlwbc9zmdxcgk02dvcb0f8izhlcbbzqw8cgr4l2c90xl98";
+ name = "gwenview-21.12.3.tar.xz";
};
};
incidenceeditor = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/incidenceeditor-21.12.2.tar.xz";
- sha256 = "151jhn84d5amv3abvp6cd2q10mf4mmv3q5hn0inqrmapy3v6bn8i";
- name = "incidenceeditor-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/incidenceeditor-21.12.3.tar.xz";
+ sha256 = "1sbflfggpqhwhg3iw46462z3p83sjhlx6f1fvgz251m020vqq9xa";
+ name = "incidenceeditor-21.12.3.tar.xz";
};
};
itinerary = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/itinerary-21.12.2.tar.xz";
- sha256 = "02w6696kdzgz2r9677nr1jyhd9mfhc2zhmasy70nblz0jn22bcq7";
- name = "itinerary-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/itinerary-21.12.3.tar.xz";
+ sha256 = "0gvkhwnxichvpwrsb6wjiv5q80v8k2yqvgpvfdapxnd7sx6qp7fp";
+ name = "itinerary-21.12.3.tar.xz";
};
};
juk = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/juk-21.12.2.tar.xz";
- sha256 = "1qgxpy1ksrgvdik69vppzdl1crscn69284q4wvwc5qh9v6rhv1xn";
- name = "juk-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/juk-21.12.3.tar.xz";
+ sha256 = "1ipzx031996h83f9w3fzbx5vf5nnskq9kf71a6aypqckk65vcqcs";
+ name = "juk-21.12.3.tar.xz";
};
};
k3b = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/k3b-21.12.2.tar.xz";
- sha256 = "0rjg3zs85gw62r3z3msp438jnf0ghc6y577br59ig19m10x33rz9";
- name = "k3b-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/k3b-21.12.3.tar.xz";
+ sha256 = "0igqb6zw76j2hl9xclcwfny2831phdg9s2msa1y87zyc3c7g9nxc";
+ name = "k3b-21.12.3.tar.xz";
};
};
kaccounts-integration = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kaccounts-integration-21.12.2.tar.xz";
- sha256 = "0c4yxrhbas0wsmrxr0pwkpgw9gzdvvf5r5nxd15f656bwwhmqlwy";
- name = "kaccounts-integration-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kaccounts-integration-21.12.3.tar.xz";
+ sha256 = "13q4d7ln98vdpb6ryk49zakx5bysdnjxifi7cma10fgk9gcqqhpb";
+ name = "kaccounts-integration-21.12.3.tar.xz";
};
};
kaccounts-providers = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kaccounts-providers-21.12.2.tar.xz";
- sha256 = "1srz43xf6kz7xfz8np94pdnhmvashk7y2f2a275rwpnlrl0yw1yd";
- name = "kaccounts-providers-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kaccounts-providers-21.12.3.tar.xz";
+ sha256 = "0kcyvpa0b872q7s4amagqcrzpl8cxlb91nwc9yg91wg56mmfv7m0";
+ name = "kaccounts-providers-21.12.3.tar.xz";
};
};
kaddressbook = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kaddressbook-21.12.2.tar.xz";
- sha256 = "04ac5z9603lxylc6x55chnc0w59mx3z92nyvfnvjvp1ga77si36b";
- name = "kaddressbook-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kaddressbook-21.12.3.tar.xz";
+ sha256 = "1hzq0fdy99l1kqw14d582l0s56gvrw86abihib6k4az4c6g3c0md";
+ name = "kaddressbook-21.12.3.tar.xz";
};
};
kajongg = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kajongg-21.12.2.tar.xz";
- sha256 = "04s3f8nj0rh1zy7sfa5kq0smbfsyylz9w3lxm2z69g7x5sb08k53";
- name = "kajongg-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kajongg-21.12.3.tar.xz";
+ sha256 = "1sffssfpzsd83ippkwpmqdx8rfh9cpd7i22nsv8asnaylylvy3zd";
+ name = "kajongg-21.12.3.tar.xz";
};
};
kalarm = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kalarm-21.12.2.tar.xz";
- sha256 = "0f3hcsql20lim9nqb0ha5lpsrbh131rwcla9i6aax5sgw4m6nyfh";
- name = "kalarm-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kalarm-21.12.3.tar.xz";
+ sha256 = "1miwcxim46hiabp2rbs874np544ip4x5nl1dc62h9li9784a9k3i";
+ name = "kalarm-21.12.3.tar.xz";
};
};
kalarmcal = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kalarmcal-21.12.2.tar.xz";
- sha256 = "15l893iv4smlppk7k682m9hwrph84p5chx5mgxixjxl28c1blcc8";
- name = "kalarmcal-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kalarmcal-21.12.3.tar.xz";
+ sha256 = "160pmr702b68hys9l02azvrv6pagy1r2whw0zp3jlf6863p9fkqr";
+ name = "kalarmcal-21.12.3.tar.xz";
};
};
kalgebra = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kalgebra-21.12.2.tar.xz";
- sha256 = "0w1h3as6dip4hrp2ay61sz9gixf4s887jp42v7zjajwwhjs6xs1m";
- name = "kalgebra-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kalgebra-21.12.3.tar.xz";
+ sha256 = "0870kdqha0nk2cm8hq8d9l2fqfw6hn0rx2qc9f9w8l4014rcn127";
+ name = "kalgebra-21.12.3.tar.xz";
};
};
kalzium = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kalzium-21.12.2.tar.xz";
- sha256 = "0kvrmvd2vgl6fklxq9sr46p6nnh0fk0l6licj9b5q9rz82xwbr50";
- name = "kalzium-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kalzium-21.12.3.tar.xz";
+ sha256 = "1qha1dh638ms785j1b73j19pj8y3c7v1n4jd1m93026a292m8jll";
+ name = "kalzium-21.12.3.tar.xz";
};
};
kamera = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kamera-21.12.2.tar.xz";
- sha256 = "07n1xlmg7m6p5ca0i4hjjyv564cqrn4p6h5yqx4pw3pcq8nizqfz";
- name = "kamera-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kamera-21.12.3.tar.xz";
+ sha256 = "1xwxmlnra9qdhvf1hhy04v72ar02pqxkg0l16a53809ilyss2wrm";
+ name = "kamera-21.12.3.tar.xz";
};
};
kamoso = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kamoso-21.12.2.tar.xz";
- sha256 = "09qn1px0mmcjhw9ikaz8xcjbdabh657ij3sa4ps37jbfzyyv45fb";
- name = "kamoso-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kamoso-21.12.3.tar.xz";
+ sha256 = "1q98f6ni4p19pk0svbfw4mbfwnc9i5p9csms2aj76mp2dn78xpib";
+ name = "kamoso-21.12.3.tar.xz";
};
};
kanagram = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kanagram-21.12.2.tar.xz";
- sha256 = "1l4j2fy8mwdywp0prswng1f06rpwkfi54dc8z5z02b13p47hz5cy";
- name = "kanagram-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kanagram-21.12.3.tar.xz";
+ sha256 = "131flw9pjvin4w1m36qkwgzna3llvxp1vq0ynzwfnvhs49i3g5gc";
+ name = "kanagram-21.12.3.tar.xz";
};
};
kapman = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kapman-21.12.2.tar.xz";
- sha256 = "0n1iz9jfgzpcpavb4ijfqp3hym7z53wzp5a5hiad8i6nws408grn";
- name = "kapman-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kapman-21.12.3.tar.xz";
+ sha256 = "1974z7g3ylvf48xh3xhf3gr7iphgmj83ir9hss1a2ba0hpgg463k";
+ name = "kapman-21.12.3.tar.xz";
};
};
kapptemplate = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kapptemplate-21.12.2.tar.xz";
- sha256 = "1sjyji533x9ph9l63zf0llsb0m5fzb1lka03h5blm7fdyw570bad";
- name = "kapptemplate-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kapptemplate-21.12.3.tar.xz";
+ sha256 = "16jgybcq3ixqwi7wli11ns7w4zdlj8rgw4chzsjcqxn6c0sqy8zq";
+ name = "kapptemplate-21.12.3.tar.xz";
};
};
kate = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kate-21.12.2.tar.xz";
- sha256 = "0r59rfyrbs50w9brl4rrq1wdfmrr3sz7plw2pqlc5xpzngrdlhs1";
- name = "kate-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kate-21.12.3.tar.xz";
+ sha256 = "1pp0k00kvih0xkkv1q1gha4na2bwqc7dhyyrla7c2vvln8gi99dg";
+ name = "kate-21.12.3.tar.xz";
};
};
katomic = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/katomic-21.12.2.tar.xz";
- sha256 = "123ls2p6az9bpy741xg85azs0p1qbssgcg4fh8cqazkz0kgzr0hf";
- name = "katomic-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/katomic-21.12.3.tar.xz";
+ sha256 = "1y4mnvkd6ajk0m0j2xph5zbw3a14clm2sswc4y8c9r4ipk3hqsgh";
+ name = "katomic-21.12.3.tar.xz";
};
};
kbackup = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kbackup-21.12.2.tar.xz";
- sha256 = "1yadxlqfz2a4lirxf2xmivggvdpbjiaw5zn7aw72jb3yjs7x6j03";
- name = "kbackup-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kbackup-21.12.3.tar.xz";
+ sha256 = "0r1cqkfzpdqpwv5pds8l0p7lxlwpv0mr7rjys1icsp8gl4hbpv60";
+ name = "kbackup-21.12.3.tar.xz";
};
};
kblackbox = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kblackbox-21.12.2.tar.xz";
- sha256 = "1y5l5l5p3s2gf69rih3mjdv42h9ydfk66v10ad5na3b4sqbi2qi7";
- name = "kblackbox-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kblackbox-21.12.3.tar.xz";
+ sha256 = "10j8rnpr3gjaqspx4mxqj9cncqj6v2jn5rkldr46bv7yxgjb5rw3";
+ name = "kblackbox-21.12.3.tar.xz";
};
};
kblocks = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kblocks-21.12.2.tar.xz";
- sha256 = "13anvyy3br7ybl74jcrnjmw5qjfyk4z6s7ncziw8l37ggg4k7n91";
- name = "kblocks-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kblocks-21.12.3.tar.xz";
+ sha256 = "1n3jc96ws8078gk1il61dc96p3pzvj3z9brnwi274pk4cif63bli";
+ name = "kblocks-21.12.3.tar.xz";
};
};
kbounce = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kbounce-21.12.2.tar.xz";
- sha256 = "07k5vmfkh9l4b4sb4an5qlnq0b9hmhh6dax0bjgia0ng9vxd011q";
- name = "kbounce-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kbounce-21.12.3.tar.xz";
+ sha256 = "1am4j11cjzlmav2zh5802kasy0kdcx78slycadnf96bmhxs8hvyv";
+ name = "kbounce-21.12.3.tar.xz";
};
};
kbreakout = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kbreakout-21.12.2.tar.xz";
- sha256 = "08rykfi82hgzg5l2bhs8nvh8si06nisy60653n6r7m8g327yyn1m";
- name = "kbreakout-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kbreakout-21.12.3.tar.xz";
+ sha256 = "0vqlxaggzvvrb439ybsvd5kr9j2jzpwk4xy3yni83y830h1mmhhc";
+ name = "kbreakout-21.12.3.tar.xz";
};
};
kbruch = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kbruch-21.12.2.tar.xz";
- sha256 = "0vvl2rk636zpg27hj2jly1awg4z3fm6mk75qrda3hl6gm8rddw1v";
- name = "kbruch-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kbruch-21.12.3.tar.xz";
+ sha256 = "1kcwbpa5lawkqqwn40r6d7savwvi7kkdgdxfxqxkviwnif2qkssx";
+ name = "kbruch-21.12.3.tar.xz";
};
};
kcachegrind = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kcachegrind-21.12.2.tar.xz";
- sha256 = "1fg7fn8a3bjbjr6bi298gqr4mr838v96bz9773pd7rnhffvvip8z";
- name = "kcachegrind-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kcachegrind-21.12.3.tar.xz";
+ sha256 = "1cssjywnhfbnsvly4mralpx3af2pqkmhg1jj2q3cjiqx44i3gkyx";
+ name = "kcachegrind-21.12.3.tar.xz";
};
};
kcalc = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kcalc-21.12.2.tar.xz";
- sha256 = "037xk57gjfbjpw1q4gm9k1xkc3x5xxjr4d8xmnrnc6ni090648q4";
- name = "kcalc-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kcalc-21.12.3.tar.xz";
+ sha256 = "15yqzhrlzcix8wvgaah8wf12msylgzyqwk58f58k5agxh97ahv4q";
+ name = "kcalc-21.12.3.tar.xz";
};
};
kcalutils = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kcalutils-21.12.2.tar.xz";
- sha256 = "0i474by8pyv64b7i807kym2q4wkhnyyn21vn56dbgp1awpi198i8";
- name = "kcalutils-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kcalutils-21.12.3.tar.xz";
+ sha256 = "006sfkjzyid8byl2mmyn1is4nra9wjqh21ksd5g1kv948hf1jdcs";
+ name = "kcalutils-21.12.3.tar.xz";
};
};
kcharselect = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kcharselect-21.12.2.tar.xz";
- sha256 = "1czkni7wrl2l5v0zpvxfwdaqd5i0x6knzbjhzh8shdg3h19sgqrm";
- name = "kcharselect-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kcharselect-21.12.3.tar.xz";
+ sha256 = "1aaiz9f9y2fmf284617pfnncgxjjjyfvdv08h900sc0bdlfmh4y7";
+ name = "kcharselect-21.12.3.tar.xz";
};
};
kcolorchooser = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kcolorchooser-21.12.2.tar.xz";
- sha256 = "12s2vfa3i7b5dh8c10xbqsy1xi9pq13vdj2xcpm5chkgw22595hv";
- name = "kcolorchooser-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kcolorchooser-21.12.3.tar.xz";
+ sha256 = "0jnnbwaj9xb0ifcc95xay8yc4bx9f29wqkj3h4kffzdlwvw3vp7s";
+ name = "kcolorchooser-21.12.3.tar.xz";
};
};
kcron = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kcron-21.12.2.tar.xz";
- sha256 = "0ddgl61vw4mj8sa6zg1m4s6qagwygdkvw9pjmfs8fsa1anhlillk";
- name = "kcron-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kcron-21.12.3.tar.xz";
+ sha256 = "0ffc71inp1kyd4xh39x6vbfggz0kpipd6r6vabfn187lpnpwcmpm";
+ name = "kcron-21.12.3.tar.xz";
};
};
kde-dev-scripts = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kde-dev-scripts-21.12.2.tar.xz";
- sha256 = "1vdssqwyi25j3saz5cw8n40y2i6bhq5l0rxbarh8m3iwcvx4ki3c";
- name = "kde-dev-scripts-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kde-dev-scripts-21.12.3.tar.xz";
+ sha256 = "04w4kk7vpfkjj2fzylmq590kk7xskw3a0id3wndw8066pfafsfg3";
+ name = "kde-dev-scripts-21.12.3.tar.xz";
};
};
kde-dev-utils = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kde-dev-utils-21.12.2.tar.xz";
- sha256 = "0flzc0kl252imng2mpg9mp71k8jrxc3yy7dzqlfdnpjz36dwpaqf";
- name = "kde-dev-utils-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kde-dev-utils-21.12.3.tar.xz";
+ sha256 = "1jdqv5zdigwazh3m580rmnylr6h6a6l5g2cpxy54v9sdvh3qb1yr";
+ name = "kde-dev-utils-21.12.3.tar.xz";
};
};
kdebugsettings = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdebugsettings-21.12.2.tar.xz";
- sha256 = "0cimipq45c36nwk3alg738jl93zxja3xi77zjqk0k28ffn6qn7c2";
- name = "kdebugsettings-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdebugsettings-21.12.3.tar.xz";
+ sha256 = "19ng7hvqpyh3kh0pahrknh89c113mqx1kxjq4r26xbww1ypkz8zq";
+ name = "kdebugsettings-21.12.3.tar.xz";
};
};
kdeconnect-kde = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdeconnect-kde-21.12.2.tar.xz";
- sha256 = "0crw0navhdsix0rpsya4vhffj35vlascpcflrs04vyws3v8xr026";
- name = "kdeconnect-kde-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdeconnect-kde-21.12.3.tar.xz";
+ sha256 = "1n9km7czif19cvrsdfcjbb02i1xgpa1z4ycn20d3g8azmli4zj4g";
+ name = "kdeconnect-kde-21.12.3.tar.xz";
};
};
kdeedu-data = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdeedu-data-21.12.2.tar.xz";
- sha256 = "1cpbi5gkbq7xrv276vm0jlcjc5y9x1kw8l8x0z7syy06s4s3pvg9";
- name = "kdeedu-data-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdeedu-data-21.12.3.tar.xz";
+ sha256 = "11mxxcca6jxz4qcmba12p6xbv845xa16b8ag529409f3276w4915";
+ name = "kdeedu-data-21.12.3.tar.xz";
};
};
kdegraphics-mobipocket = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdegraphics-mobipocket-21.12.2.tar.xz";
- sha256 = "0zbiz47mqa176gcina8v03fw2qqrc5v1l8mg2fcpnl5dxc9d56c4";
- name = "kdegraphics-mobipocket-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdegraphics-mobipocket-21.12.3.tar.xz";
+ sha256 = "091ix343p9vs4iyj8abq6mw9lbm1fx5167gykhm4g8bjk5vdri2q";
+ name = "kdegraphics-mobipocket-21.12.3.tar.xz";
};
};
kdegraphics-thumbnailers = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdegraphics-thumbnailers-21.12.2.tar.xz";
- sha256 = "09adinkdfbn5hfic92zbdhq9ldxpnbgf9pybsp4ibpw2097l2k5f";
- name = "kdegraphics-thumbnailers-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdegraphics-thumbnailers-21.12.3.tar.xz";
+ sha256 = "0shdrl6n1724i8jrkmy8z6ayhflg93401jia87mcc1apaw9s8y83";
+ name = "kdegraphics-thumbnailers-21.12.3.tar.xz";
};
};
kdenetwork-filesharing = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdenetwork-filesharing-21.12.2.tar.xz";
- sha256 = "0q7gndwvki3r9vhkxmwr8xzc54cjpk9nzhk2665wsk1msfp3xqw6";
- name = "kdenetwork-filesharing-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdenetwork-filesharing-21.12.3.tar.xz";
+ sha256 = "1y6sa22j2165j3x6ql1cfm30vv9ifb94mczbqbcjzmhqsypp5pw2";
+ name = "kdenetwork-filesharing-21.12.3.tar.xz";
};
};
kdenlive = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdenlive-21.12.2.tar.xz";
- sha256 = "1h668q91pcq3km7pq75krgq06x8gglmp8al52b0imyc9g9wy28z6";
- name = "kdenlive-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdenlive-21.12.3.tar.xz";
+ sha256 = "1hamdi2v3rx5zjmvpx1bximdppmzgsk9gbjxwgr691lkybkgx8vs";
+ name = "kdenlive-21.12.3.tar.xz";
};
};
kdepim-addons = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdepim-addons-21.12.2.tar.xz";
- sha256 = "00j67rvkvm1sri6ij5ziqjh340cmpsyfwwmw8hr1dsi3vlva4gk1";
- name = "kdepim-addons-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdepim-addons-21.12.3.tar.xz";
+ sha256 = "1pv780z29ccx05z12l2w5zdmby9d1q993jr0cyzvpapnmck9146h";
+ name = "kdepim-addons-21.12.3.tar.xz";
};
};
kdepim-runtime = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdepim-runtime-21.12.2.tar.xz";
- sha256 = "0y1hgab16h9ypqh9isabbb4km2907vzdydfkd1m5b63vfbambz0j";
- name = "kdepim-runtime-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdepim-runtime-21.12.3.tar.xz";
+ sha256 = "1ahrnnc9vn0556s4nrsjgc9vbf5rb6yby7fn33p3jjnpgja0mc7m";
+ name = "kdepim-runtime-21.12.3.tar.xz";
};
};
kdesdk-kioslaves = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdesdk-kioslaves-21.12.2.tar.xz";
- sha256 = "0vz6dk5an0bhnyglyqdgf3lqxdlc61k4vsbh8a4fky1zpvpwya84";
- name = "kdesdk-kioslaves-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdesdk-kioslaves-21.12.3.tar.xz";
+ sha256 = "1nhsvx5pznm3adf0scrcqqb2ibl52a241ki2gbwvxk2qpwwwx6jd";
+ name = "kdesdk-kioslaves-21.12.3.tar.xz";
};
};
kdesdk-thumbnailers = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdesdk-thumbnailers-21.12.2.tar.xz";
- sha256 = "1w90zjnwnqh1a47kgmijr8xp6z096f6ij250qfcl3bwvhxqmsrb0";
- name = "kdesdk-thumbnailers-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdesdk-thumbnailers-21.12.3.tar.xz";
+ sha256 = "0337rhgil42wychi5anq2v61xq8mbcvma4gb50smapcrjfl7fkdy";
+ name = "kdesdk-thumbnailers-21.12.3.tar.xz";
};
};
kdev-php = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdev-php-21.12.2.tar.xz";
- sha256 = "0ghxfllh8pkyrvsaz4iwc9bm98mkq6z3wr558w4wjykgjp69r08j";
- name = "kdev-php-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdev-php-21.12.3.tar.xz";
+ sha256 = "0z5iqgsh7w0hw0pw2522zlh5sd88zlplrxm3vjp3yvmza65471aa";
+ name = "kdev-php-21.12.3.tar.xz";
};
};
kdev-python = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdev-python-21.12.2.tar.xz";
- sha256 = "05jj7q7agkgpbrxzwh0n2ipc854cgm8skjyjkqmxp2kdf3fdm8lj";
- name = "kdev-python-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdev-python-21.12.3.tar.xz";
+ sha256 = "1iyg1cfldf5mk62anw8schiw3ii0gp20qwg6ljk1r9hv583iwrq6";
+ name = "kdev-python-21.12.3.tar.xz";
};
};
kdevelop = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdevelop-21.12.2.tar.xz";
- sha256 = "13kgkxvbjcb60ckapqrcr4m0y5kyag948xx6gwrvzhrhn46ynfgz";
- name = "kdevelop-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdevelop-21.12.3.tar.xz";
+ sha256 = "1shp8zlxr7iyysn1c8d3fp6rg6g2krj2v3zw5apalxcnal16bww6";
+ name = "kdevelop-21.12.3.tar.xz";
};
};
kdf = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdf-21.12.2.tar.xz";
- sha256 = "1fs8bab6q7imfpqqgasvr98k57nm68ignfch2i76rdcywhx3q268";
- name = "kdf-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdf-21.12.3.tar.xz";
+ sha256 = "179ygy4kxkapfyxqj8h5xlvp1160vd72af34vd0a4r5az7wfd1m7";
+ name = "kdf-21.12.3.tar.xz";
};
};
kdialog = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdialog-21.12.2.tar.xz";
- sha256 = "1k6zlh1gbpj0y40h1i8pan28d8chqjsnhd6pvsvr95b91d0pj2xn";
- name = "kdialog-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdialog-21.12.3.tar.xz";
+ sha256 = "04d1dqc5f02s867lllx1ix0nc55xw9hrpg7jxiy3v4c8vlzg0w53";
+ name = "kdialog-21.12.3.tar.xz";
};
};
kdiamond = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kdiamond-21.12.2.tar.xz";
- sha256 = "08b2a13bmxw3h6rhip619jvzgjrjgpz2v83i2azbqccfynisjnyh";
- name = "kdiamond-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kdiamond-21.12.3.tar.xz";
+ sha256 = "1d3c4pckddnri9i19g2pi2ygpqakllrgy6azgvnh5hn20kgsw7d9";
+ name = "kdiamond-21.12.3.tar.xz";
};
};
keditbookmarks = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/keditbookmarks-21.12.2.tar.xz";
- sha256 = "1fxm0mm3sqp2frk2fcs2jw86wjxb2j5z9vyb34x7g80k5j17j57m";
- name = "keditbookmarks-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/keditbookmarks-21.12.3.tar.xz";
+ sha256 = "0wfb7j1lhhdfw2x03p692mglmy9i9qys8mn4f3gxlb5imrd2hmnk";
+ name = "keditbookmarks-21.12.3.tar.xz";
};
};
kfind = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kfind-21.12.2.tar.xz";
- sha256 = "0kx6p4hyyalx5i8g4aq81aj30c9ac0380xvia9130g95pgkzd96c";
- name = "kfind-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kfind-21.12.3.tar.xz";
+ sha256 = "1v1yxsbmzv4q5m5rbvl9n095d9fq0b1zphnl6vrzff5r8i53pzx0";
+ name = "kfind-21.12.3.tar.xz";
};
};
kfloppy = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kfloppy-21.12.2.tar.xz";
- sha256 = "10245c87379576n11xcjkll3rkvzv815qsavr4alsj1jr8w6zyg8";
- name = "kfloppy-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kfloppy-21.12.3.tar.xz";
+ sha256 = "1phkigxd6bkwlcjrsfhlhn44ra9imfq0flcvp4vmza6c9ylsx6m8";
+ name = "kfloppy-21.12.3.tar.xz";
};
};
kfourinline = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kfourinline-21.12.2.tar.xz";
- sha256 = "1kz7ff31h8lvz7snqmjs6cma9i3py7dyd91i6ik2pwiar80sin1x";
- name = "kfourinline-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kfourinline-21.12.3.tar.xz";
+ sha256 = "0rb5jcmmf19bidwywj56dn0wfrnrfi5kc75c20d7mxnlgygfdnkg";
+ name = "kfourinline-21.12.3.tar.xz";
};
};
kgeography = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kgeography-21.12.2.tar.xz";
- sha256 = "09h5zp8pxzr47s7j50l6xfssvk9zk56cqgnsjx75yh1n077z1d0j";
- name = "kgeography-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kgeography-21.12.3.tar.xz";
+ sha256 = "1s1xyfffqkhmf4n74a4ksjz62rdiyl1fk1v57s9gnr6qw71wqql0";
+ name = "kgeography-21.12.3.tar.xz";
};
};
kget = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kget-21.12.2.tar.xz";
- sha256 = "0jmy2yxzrgq592dq075k7gp7ynk42i899jsbw0gbn79x69cxlkmv";
- name = "kget-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kget-21.12.3.tar.xz";
+ sha256 = "1w249gvzz47ac7n1mnxxf20d9l7jmbh18m5dijy55ck61s4zcq4l";
+ name = "kget-21.12.3.tar.xz";
};
};
kgoldrunner = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kgoldrunner-21.12.2.tar.xz";
- sha256 = "0by6cq31jsls3qaqn4agrdhvd9jqg84plm6nbgh3rc85pnj5h22p";
- name = "kgoldrunner-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kgoldrunner-21.12.3.tar.xz";
+ sha256 = "0gzz58407zjmk311kyyj5l2c1ciczcq9i8ckpwbd341dvwaww27q";
+ name = "kgoldrunner-21.12.3.tar.xz";
};
};
kgpg = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kgpg-21.12.2.tar.xz";
- sha256 = "1f193fyn1azwhm7b8gd5ffyb11acg1269mh1d2ly60ax83qjs48c";
- name = "kgpg-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kgpg-21.12.3.tar.xz";
+ sha256 = "1mzq3g4xwg459k0mp9xvg8bhilizadbh4gck1764wq69bxlcyav3";
+ name = "kgpg-21.12.3.tar.xz";
};
};
khangman = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/khangman-21.12.2.tar.xz";
- sha256 = "0xih54w33vigvm3x2xp5lf29k4aga4yil0qv263965nxn9djnlaw";
- name = "khangman-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/khangman-21.12.3.tar.xz";
+ sha256 = "000vn11pp4hwfh2689rmnwrrssrmrhx5569k02h4ynswkiykvbv6";
+ name = "khangman-21.12.3.tar.xz";
};
};
khelpcenter = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/khelpcenter-21.12.2.tar.xz";
- sha256 = "09ddkc7kiayx852mpgdmv04l19vrrc0yrf30hnyzkci58kbavvcq";
- name = "khelpcenter-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/khelpcenter-21.12.3.tar.xz";
+ sha256 = "1fj1c57bqs009rx9db4ifvfmhhl4b35r5sfly3wvbfr4dapjqfqr";
+ name = "khelpcenter-21.12.3.tar.xz";
};
};
kidentitymanagement = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kidentitymanagement-21.12.2.tar.xz";
- sha256 = "00fwjax3kfvr8jsy04hp1jyihvskvprbg83z2avhcy6lvr7g25kk";
- name = "kidentitymanagement-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kidentitymanagement-21.12.3.tar.xz";
+ sha256 = "18xwvlmqhih5jmig2mj3a6mc5awlxdv8f81da6cgm123imhrirk4";
+ name = "kidentitymanagement-21.12.3.tar.xz";
};
};
kig = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kig-21.12.2.tar.xz";
- sha256 = "100ds4728lfnb6r6c52rdzk2n4rcpc5jiv35q5qd7d6cszmxvhvx";
- name = "kig-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kig-21.12.3.tar.xz";
+ sha256 = "0rl0z1djsf9ha0q94v0cnj5qm4ij6yjsil2s57r3v666h64yradn";
+ name = "kig-21.12.3.tar.xz";
};
};
kigo = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kigo-21.12.2.tar.xz";
- sha256 = "0g1sl7bw9aln7fm2786sgh0m44da6vfxc9g0rizw31ff8papnyb8";
- name = "kigo-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kigo-21.12.3.tar.xz";
+ sha256 = "14pp73b9mbf0ny75b90vs7z9l61m7zp8cll7hl4bplqh1kig1szf";
+ name = "kigo-21.12.3.tar.xz";
};
};
killbots = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/killbots-21.12.2.tar.xz";
- sha256 = "1qryy2g2i6iqc6rsw8jz4c14x67glpm3zvcx2dghyll6q9hns43z";
- name = "killbots-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/killbots-21.12.3.tar.xz";
+ sha256 = "1ncr55xq04vrx6bss1ahk86c3l9ckhv4zjbc6gq4krhjw0lkdfiv";
+ name = "killbots-21.12.3.tar.xz";
};
};
kimagemapeditor = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kimagemapeditor-21.12.2.tar.xz";
- sha256 = "11j55jvfxdpam3gkfv7355av9d6mz8z6djhplhmfd56llkmvw4n2";
- name = "kimagemapeditor-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kimagemapeditor-21.12.3.tar.xz";
+ sha256 = "0qdmyrlf0jp3737p7x31wk428676xv77lx0mgyd9h2hdl0ipnbvr";
+ name = "kimagemapeditor-21.12.3.tar.xz";
};
};
kimap = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kimap-21.12.2.tar.xz";
- sha256 = "0sdas8knk6wa8hhgc3w62famdpq6pcxfhl4vmpw0r3aqskaci4q3";
- name = "kimap-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kimap-21.12.3.tar.xz";
+ sha256 = "11jd9zkvflfh3gqs36fhj8mla3k44xf7zdb0z4nl9sk5nhhgm5px";
+ name = "kimap-21.12.3.tar.xz";
};
};
kio-extras = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kio-extras-21.12.2.tar.xz";
- sha256 = "0133cww4k2svn7cvw0fbdcwwv0zg09d27gz59gkpfswjmpsxdqj4";
- name = "kio-extras-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kio-extras-21.12.3.tar.xz";
+ sha256 = "11zpnjdri7z4sz6zx26d9iv52aj4vf5lr9c114gg4pvz2l4h4h5i";
+ name = "kio-extras-21.12.3.tar.xz";
};
};
kio-gdrive = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kio-gdrive-21.12.2.tar.xz";
- sha256 = "1n3khrx5fczffwzg4bzxjhzy2kxf72dmb7fqs9hqfn1qkaahfv49";
- name = "kio-gdrive-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kio-gdrive-21.12.3.tar.xz";
+ sha256 = "0bm3c7g6q7z2ydnha2x5c456x9wlgachi9453mlrd2zcsc7c5h87";
+ name = "kio-gdrive-21.12.3.tar.xz";
};
};
kipi-plugins = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kipi-plugins-21.12.2.tar.xz";
- sha256 = "11f3qmgqxdlzvv2zldjawn7a3kdigj5pb535rc9v9a8fp8mjvk88";
- name = "kipi-plugins-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kipi-plugins-21.12.3.tar.xz";
+ sha256 = "1h6107d2a6jcyjsd191cg2ykgwm580j7wr0blg328ff6wwk1aizy";
+ name = "kipi-plugins-21.12.3.tar.xz";
};
};
kirigami-gallery = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kirigami-gallery-21.12.2.tar.xz";
- sha256 = "0rg9lg4iqxycfbhs62qs4ms4qadz1ii1dcv3ykkgn3w2brx77wad";
- name = "kirigami-gallery-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kirigami-gallery-21.12.3.tar.xz";
+ sha256 = "0pjd9bq965v9x433p8rbhd7w3fj0808qd7x4c11ziyhy4cg9gwml";
+ name = "kirigami-gallery-21.12.3.tar.xz";
};
};
kiriki = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kiriki-21.12.2.tar.xz";
- sha256 = "1blj3vl87jdrr8qv2cyng20nr4d54gbk7w72z9rl02l62c9gkw5j";
- name = "kiriki-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kiriki-21.12.3.tar.xz";
+ sha256 = "0qbm0zjjqnbcdm39zi8h240nblpa1pa7g1ls9mghzbqrdrh7n3a0";
+ name = "kiriki-21.12.3.tar.xz";
};
};
kiten = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kiten-21.12.2.tar.xz";
- sha256 = "18kxqrhfgch32583ra4422h7csd5ajijf9989bxz9hwi9mn3r2vl";
- name = "kiten-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kiten-21.12.3.tar.xz";
+ sha256 = "0z0haqxxkh7m2510b5qfwbx8s45vcahbk503jp1x0bwz03mrwflw";
+ name = "kiten-21.12.3.tar.xz";
};
};
kitinerary = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kitinerary-21.12.2.tar.xz";
- sha256 = "0g7z6408nhrv54h6xxd2rd9wj2hmwzc3lg5risyqbg2zii9j0sp2";
- name = "kitinerary-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kitinerary-21.12.3.tar.xz";
+ sha256 = "0kccrjiyib2zljr6rnc89y29jgi8cnhwfh1yq8psyzmca2n8lpxi";
+ name = "kitinerary-21.12.3.tar.xz";
};
};
kjumpingcube = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kjumpingcube-21.12.2.tar.xz";
- sha256 = "1abv3yi716n88b19rmimhw0vnnwyw28ab6fbcy9g1lgpbi69g5ax";
- name = "kjumpingcube-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kjumpingcube-21.12.3.tar.xz";
+ sha256 = "1wlk6my6pawmdv3zgcpnyyzpjwz0wii0h8i1z0gxhbpg9nc8iy1r";
+ name = "kjumpingcube-21.12.3.tar.xz";
};
};
kldap = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kldap-21.12.2.tar.xz";
- sha256 = "1xda42f1q5ih3hdhmcbdz0fx2nchirlwips3gq0jb6lfzi5dbqpl";
- name = "kldap-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kldap-21.12.3.tar.xz";
+ sha256 = "13llsfhx9lfvhf90a3vmpkyh02fjg5sp4fmrwrqyx9hjrbmy1g0a";
+ name = "kldap-21.12.3.tar.xz";
};
};
kleopatra = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kleopatra-21.12.2.tar.xz";
- sha256 = "1b2nq823gq1v20dnh3hm298fva7cmbn9hh0kmbq22kh98kv8chhh";
- name = "kleopatra-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kleopatra-21.12.3.tar.xz";
+ sha256 = "10f61m0qrs0qipn94jd32gibyj8pcvprs8j7gmac0mym0b3djjls";
+ name = "kleopatra-21.12.3.tar.xz";
};
};
klettres = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/klettres-21.12.2.tar.xz";
- sha256 = "1wi1byr36x7z9scsy1gffna36m8x9vyfcqzndvx6042i2y0smhwz";
- name = "klettres-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/klettres-21.12.3.tar.xz";
+ sha256 = "0l4zgfqd6l2bk67s2a0zldbcy8v7nwbv7yahvnyw4jf4jyv9q9rv";
+ name = "klettres-21.12.3.tar.xz";
};
};
klickety = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/klickety-21.12.2.tar.xz";
- sha256 = "19rn9p7cbxhn471b65nhwhpnfnhykjwj6n5lrsd431391dyhvshc";
- name = "klickety-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/klickety-21.12.3.tar.xz";
+ sha256 = "03liv3fax764ngfkwp3ga96irn8qb509b08ljnhz5aw5v9yrssnk";
+ name = "klickety-21.12.3.tar.xz";
};
};
klines = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/klines-21.12.2.tar.xz";
- sha256 = "1r004rsy98lxh5vd3r4bc0l4d7ymija13barg9xglj53xzbyij3k";
- name = "klines-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/klines-21.12.3.tar.xz";
+ sha256 = "1ypi64wdsw1zsj03wcxj02v27y1by113v89as8dyk9wr0pfmbpqf";
+ name = "klines-21.12.3.tar.xz";
};
};
kmag = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kmag-21.12.2.tar.xz";
- sha256 = "03kzahsr80wnbx6ky112ka3zm01pnc5h85l28a4186617swx344l";
- name = "kmag-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kmag-21.12.3.tar.xz";
+ sha256 = "067x65gmip89rdgii2nwnxn7zi96cf7vfbhqzg0499pd2d69p3sl";
+ name = "kmag-21.12.3.tar.xz";
};
};
kmahjongg = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kmahjongg-21.12.2.tar.xz";
- sha256 = "1w8v6fchrkvsbyvnx8vvs801cvg52pr78ihvdjv6c0vpd0q7z9rz";
- name = "kmahjongg-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kmahjongg-21.12.3.tar.xz";
+ sha256 = "02yvvpwkk5gbj445zv5xhfragk8220rlx0pkxf32pj0jsv7dnz1x";
+ name = "kmahjongg-21.12.3.tar.xz";
};
};
kmail = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kmail-21.12.2.tar.xz";
- sha256 = "003bnp00figa09qcp2hl45sivdk3d0j3amxdidyrn47q9vy40554";
- name = "kmail-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kmail-21.12.3.tar.xz";
+ sha256 = "1knh6cf72hidc6jyiw250b708b410fla0c5w83zaavmwv37ah8z0";
+ name = "kmail-21.12.3.tar.xz";
};
};
kmail-account-wizard = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kmail-account-wizard-21.12.2.tar.xz";
- sha256 = "1nmg8qns3iglcc4l4g5nffnji1vgg43a9fa9rz1hacvlkarm98m4";
- name = "kmail-account-wizard-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kmail-account-wizard-21.12.3.tar.xz";
+ sha256 = "0ar2rm6viissfipbak07fxivrgqgsdfilsprsqmvab44inw2g4pg";
+ name = "kmail-account-wizard-21.12.3.tar.xz";
};
};
kmailtransport = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kmailtransport-21.12.2.tar.xz";
- sha256 = "0rs6qihzy8q2n204zkhakgnjxwqy9pz9i0kv1j3amw2xv3f51rvw";
- name = "kmailtransport-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kmailtransport-21.12.3.tar.xz";
+ sha256 = "0l3pgs781a6is937i0bkz9ykr40l36rwlrirsr4g8wh0gkc3ifi6";
+ name = "kmailtransport-21.12.3.tar.xz";
};
};
kmbox = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kmbox-21.12.2.tar.xz";
- sha256 = "1mfwaw4d480kbb60wb0kvl5z35ly2hn6h73kx9wdb5y7mz05rvn1";
- name = "kmbox-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kmbox-21.12.3.tar.xz";
+ sha256 = "04cl2khj3a7n81nlmxsg8kgszrl22qm6s2kvbrhz39yfzi31cwqr";
+ name = "kmbox-21.12.3.tar.xz";
};
};
kmime = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kmime-21.12.2.tar.xz";
- sha256 = "0qxb0gf4pqfa0540fsbnf24nh9qwiamwl65q7vaanb80b211qp2g";
- name = "kmime-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kmime-21.12.3.tar.xz";
+ sha256 = "03s7l4lywdvp97h4qjgq06qqcclvnhy83qsrfzv0w2wcl631nnpw";
+ name = "kmime-21.12.3.tar.xz";
};
};
kmines = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kmines-21.12.2.tar.xz";
- sha256 = "0dsqlqmbaggab38zzjyhnx318sn2mw6y51k52c7blm2l53a8zp3j";
- name = "kmines-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kmines-21.12.3.tar.xz";
+ sha256 = "1wxy0cyz733wvnxfjhirqf41wnda4f6aqdiqmb5r1ngzzllgbglc";
+ name = "kmines-21.12.3.tar.xz";
};
};
kmix = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kmix-21.12.2.tar.xz";
- sha256 = "0fyjzzv6x9xf0g222jjsvrywnm3blhbzm2zwhxagrfkjvjpb2cvk";
- name = "kmix-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kmix-21.12.3.tar.xz";
+ sha256 = "1zk2xljis1pv3m4vs5zr6wza6iv5y6wmh1csx3rn8ylfkrpk7h8k";
+ name = "kmix-21.12.3.tar.xz";
};
};
kmousetool = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kmousetool-21.12.2.tar.xz";
- sha256 = "1hh7sql04hpwvb8hbi7snvh2d6922a2yraah9hd1jiwniv3cv175";
- name = "kmousetool-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kmousetool-21.12.3.tar.xz";
+ sha256 = "013qr1md3gbin7hcahnv14y9i2cg35r433s2w81fvgcakd38qvkj";
+ name = "kmousetool-21.12.3.tar.xz";
};
};
kmouth = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kmouth-21.12.2.tar.xz";
- sha256 = "0vxssxchh23bl237qw9pznbrkwyqx1bhbnp2fq9baw1bn88d18i5";
- name = "kmouth-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kmouth-21.12.3.tar.xz";
+ sha256 = "0xvkp2pm2szbgzdsfmwrykma8npmlwmx2pb1iakbx3x1wyyjsbim";
+ name = "kmouth-21.12.3.tar.xz";
};
};
kmplot = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kmplot-21.12.2.tar.xz";
- sha256 = "025n51s7i5nr63knsd78pg48wfs4cldhplr68jmwv2k8pb5w9kxs";
- name = "kmplot-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kmplot-21.12.3.tar.xz";
+ sha256 = "1vmrzfcdyaxgvyp9la2gvy3h5fhksmn24lsnrpvr6alj880mh8bq";
+ name = "kmplot-21.12.3.tar.xz";
};
};
knavalbattle = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/knavalbattle-21.12.2.tar.xz";
- sha256 = "1z1qqr5jjinm49p7rhr0pzf8ir2nvdq157zqxnnr6i11xqk2mnkj";
- name = "knavalbattle-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/knavalbattle-21.12.3.tar.xz";
+ sha256 = "1mpj1783za6b7a7cjawy4v0z24dvcd34gdb25qch4gi9cx1lc28z";
+ name = "knavalbattle-21.12.3.tar.xz";
};
};
knetwalk = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/knetwalk-21.12.2.tar.xz";
- sha256 = "1gnir7h1iam51frdajp4h6xw4biz545nljdfcck17jiw6ad9py4j";
- name = "knetwalk-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/knetwalk-21.12.3.tar.xz";
+ sha256 = "0ahms3imvkdknp1z2h6j42k9g1i20ygd2633icjv37d2cbij128m";
+ name = "knetwalk-21.12.3.tar.xz";
};
};
knights = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/knights-21.12.2.tar.xz";
- sha256 = "0k9hqgz3zw7vhrgbwnmy0v3j9kflz6wx8wavckg1i2l4qadprc1y";
- name = "knights-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/knights-21.12.3.tar.xz";
+ sha256 = "1m2big16rdw3w347m5vi0qhypnb2rgz6804kkxs7ln0yx658y4x4";
+ name = "knights-21.12.3.tar.xz";
};
};
knotes = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/knotes-21.12.2.tar.xz";
- sha256 = "0f8ra6nkgndgkfnw194y5976kkrm7qdj1w7l27znwalzaydnxvjg";
- name = "knotes-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/knotes-21.12.3.tar.xz";
+ sha256 = "07pj0aqwsy1xi5mx7x0h3zmxfg0n4afgjax9a9ihc553xs6k48d7";
+ name = "knotes-21.12.3.tar.xz";
};
};
kolf = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kolf-21.12.2.tar.xz";
- sha256 = "0as18rc45daak3xsmwn6k789yni46nsdkv83bfmbj3jcjhzv9x5k";
- name = "kolf-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kolf-21.12.3.tar.xz";
+ sha256 = "00dhjy82d9964z94nn4vkkwynql3bfa6djwrgsq93f9d7grgkd7g";
+ name = "kolf-21.12.3.tar.xz";
};
};
kollision = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kollision-21.12.2.tar.xz";
- sha256 = "1ycim9gjn9p6w6yyzsipqn7zpvi946s287mp4br35zavsf25gzn0";
- name = "kollision-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kollision-21.12.3.tar.xz";
+ sha256 = "0avin6s1lglfps6qlvz19i27nb0x0hgrl4q2brpq4kax7azs1nc3";
+ name = "kollision-21.12.3.tar.xz";
};
};
kolourpaint = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kolourpaint-21.12.2.tar.xz";
- sha256 = "0z53hp31sq4ksarvpzqmx9f3gac8ygrcj0ncppgbwwjkq63wr6v1";
- name = "kolourpaint-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kolourpaint-21.12.3.tar.xz";
+ sha256 = "0kbz8jz33bk4zr7kk6mb1y42mdq6nykdfqm2cs08sxldd3nrs6fj";
+ name = "kolourpaint-21.12.3.tar.xz";
};
};
kompare = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kompare-21.12.2.tar.xz";
- sha256 = "0ps6ng77kzcqf6b2sh8xmqh5d4jwkmj3qnbyxh4v4xxjbwy0mrwm";
- name = "kompare-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kompare-21.12.3.tar.xz";
+ sha256 = "097aawmziplsndj42bdjf3x3smal1fy67c2y7cik9p1qw9wgn24h";
+ name = "kompare-21.12.3.tar.xz";
};
};
konqueror = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/konqueror-21.12.2.tar.xz";
- sha256 = "0ia8qqas9x261ixa6jzih273ypqhdv5hijk042bcdmqd1z1s4n55";
- name = "konqueror-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/konqueror-21.12.3.tar.xz";
+ sha256 = "0z3zq71n0lnpx5ggfg835zbmgf2ly4zsmz01yyyxn9n9d9b6d3px";
+ name = "konqueror-21.12.3.tar.xz";
};
};
konquest = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/konquest-21.12.2.tar.xz";
- sha256 = "1arxp4x8pcmv8yqg1xy5b23avh5a7x660vvh6kaviimysad5wmc5";
- name = "konquest-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/konquest-21.12.3.tar.xz";
+ sha256 = "0lrahq9s70rx24dw4cgpvchr4s6pcl565vh343ggg24s1rd3ly80";
+ name = "konquest-21.12.3.tar.xz";
};
};
konsole = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/konsole-21.12.2.tar.xz";
- sha256 = "00gyzhcacd3467sv5ijihqva7pnvcy1chywfpy8qh2hcdkkvyfxa";
- name = "konsole-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/konsole-21.12.3.tar.xz";
+ sha256 = "06sqm2xmairicrdcxnf7imvyvw0wyknrrym334scx2w7mfhjg5qs";
+ name = "konsole-21.12.3.tar.xz";
};
};
kontact = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kontact-21.12.2.tar.xz";
- sha256 = "16ld08sx5lvrm9r0ync7r8bpd540gxsssvhxj5p43chq6b9hr5lm";
- name = "kontact-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kontact-21.12.3.tar.xz";
+ sha256 = "16p17b4llral0g48l3s9yg838x6hhc4dprlcpd00b8sy58c27f90";
+ name = "kontact-21.12.3.tar.xz";
};
};
kontactinterface = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kontactinterface-21.12.2.tar.xz";
- sha256 = "1qvjm27v797hcdqbr6jwdkwn3vpsy3f1i92slrwks03zj498ydlj";
- name = "kontactinterface-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kontactinterface-21.12.3.tar.xz";
+ sha256 = "1qwx0q4bbk3d720ij37wbd54g9alw6ispjl1mq19hkk3gs5l1c78";
+ name = "kontactinterface-21.12.3.tar.xz";
};
};
kontrast = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kontrast-21.12.2.tar.xz";
- sha256 = "0mk2i2x1yz0ykbnqvdbdpi9kplyzjxlwhhsvl4rbq0726g3q6pas";
- name = "kontrast-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kontrast-21.12.3.tar.xz";
+ sha256 = "1rp279mfq18p5kzw3788m8w6kkj8w7zfdv97rnl3n5jir4j94yxl";
+ name = "kontrast-21.12.3.tar.xz";
};
};
konversation = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/konversation-21.12.2.tar.xz";
- sha256 = "0lpkah6z12c4f77z6r5z31q5np3xwyb3y6xnsv1iq1rdzj0daxch";
- name = "konversation-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/konversation-21.12.3.tar.xz";
+ sha256 = "05dxzkpadz29b5fm6pf225xqq0gaz9w50paz9341kzz4k3rnzq80";
+ name = "konversation-21.12.3.tar.xz";
};
};
kopeninghours = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kopeninghours-21.12.2.tar.xz";
- sha256 = "1s4wcnk7p0vjqdhyf8131l3s6bn86gfkwl45zwpi7lpyacwgdf6k";
- name = "kopeninghours-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kopeninghours-21.12.3.tar.xz";
+ sha256 = "0pfkrns576ll6wc33c8i6pgzd9wf543w2isbvh393zyb1rr3bzgd";
+ name = "kopeninghours-21.12.3.tar.xz";
};
};
kopete = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kopete-21.12.2.tar.xz";
- sha256 = "1py45nk6bv5x2hnfzh5srq17lprkqrmpqr2h0fpmkmffx66njz5q";
- name = "kopete-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kopete-21.12.3.tar.xz";
+ sha256 = "1v519sw2lzlap6xci3j55k8c48755sc9p3mgvj566b6jjq64xi5k";
+ name = "kopete-21.12.3.tar.xz";
};
};
korganizer = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/korganizer-21.12.2.tar.xz";
- sha256 = "1kablp0x65jmdz5n3y19rgplcvvmq8vxz0ljw7lkrwr3pvvhyv3q";
- name = "korganizer-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/korganizer-21.12.3.tar.xz";
+ sha256 = "072pyzs38dv07mwi4hlfb4rh9jx40dpxac3ywy7kj6nyvbfjmh0r";
+ name = "korganizer-21.12.3.tar.xz";
};
};
kosmindoormap = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kosmindoormap-21.12.2.tar.xz";
- sha256 = "0max3mfwd5x8m3kqybnkrb4v93rdk1r007xw31l52j2rq2gh8pj2";
- name = "kosmindoormap-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kosmindoormap-21.12.3.tar.xz";
+ sha256 = "06i616c873lkkpy2iwdjcgwnm6adjrr6rcain2rrb1j4pgzmmbvw";
+ name = "kosmindoormap-21.12.3.tar.xz";
};
};
kpat = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kpat-21.12.2.tar.xz";
- sha256 = "0vra8n9xsba67as0ybmbjy235v3s7dmrwlf18avnb3ygxy0h8swf";
- name = "kpat-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kpat-21.12.3.tar.xz";
+ sha256 = "1jd9457hf15d2l6njkfyj9a7lfyabcm80vz3zjb2cykm16x3sdb8";
+ name = "kpat-21.12.3.tar.xz";
};
};
kpimtextedit = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kpimtextedit-21.12.2.tar.xz";
- sha256 = "06d42k433dvkfrnzfdx0b1qarrnmhnb4gyq7vgy6251ah8smild8";
- name = "kpimtextedit-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kpimtextedit-21.12.3.tar.xz";
+ sha256 = "19hrqbjcmpi81vmnggrkrv0fcc9inhz5aa5klx0141aylnzfgwsl";
+ name = "kpimtextedit-21.12.3.tar.xz";
};
};
kpkpass = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kpkpass-21.12.2.tar.xz";
- sha256 = "0p2l1z4blfq1iz3x9cnwwx2p9cs6bb4vw1csj29s09i6237ippzx";
- name = "kpkpass-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kpkpass-21.12.3.tar.xz";
+ sha256 = "05f88hlqxfak94jy8afiv91dgzxd9qgrkarnqi9rv1f5a3j7k3k7";
+ name = "kpkpass-21.12.3.tar.xz";
};
};
kpmcore = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kpmcore-21.12.2.tar.xz";
- sha256 = "1iyirvf04br0r8vclcpx0qrlm8wgqm9ww6xds3h9qjyqj1w8ng41";
- name = "kpmcore-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kpmcore-21.12.3.tar.xz";
+ sha256 = "19h0ag54xzv4hwh950hshjghd4fb9xkdg8rlx6lvqa0w9b8admva";
+ name = "kpmcore-21.12.3.tar.xz";
};
};
kpublictransport = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kpublictransport-21.12.2.tar.xz";
- sha256 = "02ffpgki4mdyczxa5bqb9wmg2c6anwxnsmlfdn1k47ry7ny2k9sl";
- name = "kpublictransport-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kpublictransport-21.12.3.tar.xz";
+ sha256 = "1jcba5bq320afzfs5ly3vyyicdix8fprpr02x67v8p7mdzg58cq6";
+ name = "kpublictransport-21.12.3.tar.xz";
};
};
kqtquickcharts = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kqtquickcharts-21.12.2.tar.xz";
- sha256 = "1sjm1vaksvp73866w09xadd1d0lakh00fwiic498siws4dvhhpif";
- name = "kqtquickcharts-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kqtquickcharts-21.12.3.tar.xz";
+ sha256 = "0gl9c8zfn440202l82y4nfng0hyhivby8a4hf91rphi8f1xfxxmr";
+ name = "kqtquickcharts-21.12.3.tar.xz";
};
};
krdc = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/krdc-21.12.2.tar.xz";
- sha256 = "005i3a7l9aq63nxsivj28kzjy2zdl759snwm56cgwq9rgc6sc003";
- name = "krdc-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/krdc-21.12.3.tar.xz";
+ sha256 = "09np9clvmdll7v2p9aswnlhz4cgsnly82za7k3k9fs66h5c8q20j";
+ name = "krdc-21.12.3.tar.xz";
};
};
kreversi = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kreversi-21.12.2.tar.xz";
- sha256 = "03b4c28297dzdzplmg818r27r9gpqj48rha9884h22fz9davgmhw";
- name = "kreversi-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kreversi-21.12.3.tar.xz";
+ sha256 = "0lbypkh6lc5af43c2p19gs2c53icxd26abxf5rhs2c8182gr39b8";
+ name = "kreversi-21.12.3.tar.xz";
};
};
krfb = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/krfb-21.12.2.tar.xz";
- sha256 = "1989q0mig516hz0lbq2m8p85x8ikpyrhj36cvq4c32sd2nasxkvc";
- name = "krfb-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/krfb-21.12.3.tar.xz";
+ sha256 = "1r8lvvh2z8xi0l3pizlpl12nm4fnbpgiwqmx18w8i51x4j27dv0n";
+ name = "krfb-21.12.3.tar.xz";
};
};
kross-interpreters = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kross-interpreters-21.12.2.tar.xz";
- sha256 = "14j7z6lwl0j7zdz29c1kjyhw0my6qfgnyxibwn9z87paxl8nv6z0";
- name = "kross-interpreters-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kross-interpreters-21.12.3.tar.xz";
+ sha256 = "0wyr3xwdkb2fiadzh5lhjli1g0mbxjw353q7k1vbi2wxg5b9042g";
+ name = "kross-interpreters-21.12.3.tar.xz";
};
};
kruler = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kruler-21.12.2.tar.xz";
- sha256 = "1w5dw3qda69d4ycbiaj18gfn6w28dj2lc37x2d86kx5skv8adxbw";
- name = "kruler-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kruler-21.12.3.tar.xz";
+ sha256 = "0jmb3a907jx0s80865lmd7in8ggdf30gdbgykpalzfrv7nkjamzr";
+ name = "kruler-21.12.3.tar.xz";
};
};
kshisen = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kshisen-21.12.2.tar.xz";
- sha256 = "0wjr9fnkmbylfq13zy3hifr4byj4y46f8cwh0w61ypgc0wjxnhhg";
- name = "kshisen-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kshisen-21.12.3.tar.xz";
+ sha256 = "1i11gh87gfza58rpdd44pjb423an9a44cls117ba9gznxm67cph5";
+ name = "kshisen-21.12.3.tar.xz";
};
};
ksirk = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ksirk-21.12.2.tar.xz";
- sha256 = "1lif8n8n2pj4vaf7zifqj7mjv5dbhki75wbwjd4q061wpr434vfj";
- name = "ksirk-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ksirk-21.12.3.tar.xz";
+ sha256 = "1ipnkg2mgj37g5s5ihlys176kn2c11f3d57xr9zhqf8fvkvrkfm0";
+ name = "ksirk-21.12.3.tar.xz";
};
};
ksmtp = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ksmtp-21.12.2.tar.xz";
- sha256 = "0hg5g401map67kjcgrd1a07iwyss5jnryhpsajffwz19sra855jp";
- name = "ksmtp-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ksmtp-21.12.3.tar.xz";
+ sha256 = "0kdy5gsg1sgccvdk1fpf866xl9m8v8z034jpgf6s7n2pr5r5mni2";
+ name = "ksmtp-21.12.3.tar.xz";
};
};
ksnakeduel = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ksnakeduel-21.12.2.tar.xz";
- sha256 = "0rdbsyfd3bink5cb0k5l713jw4syhz82kchn95cbg5zgc2iclfw4";
- name = "ksnakeduel-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ksnakeduel-21.12.3.tar.xz";
+ sha256 = "06rill73xhhxra7kmbvwwriv9vbi91641z334ry1m4rr1qm2cdd6";
+ name = "ksnakeduel-21.12.3.tar.xz";
};
};
kspaceduel = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kspaceduel-21.12.2.tar.xz";
- sha256 = "1kmwn55a4555g5m21jcr88k3f9aj87yifgrab6sx6gcw5q51d7vz";
- name = "kspaceduel-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kspaceduel-21.12.3.tar.xz";
+ sha256 = "0dv539jlpkj8hr4cz0ncqm3scg6ja3s41p37bpqd94zicfvzxw84";
+ name = "kspaceduel-21.12.3.tar.xz";
};
};
ksquares = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ksquares-21.12.2.tar.xz";
- sha256 = "12k09lasxyaxq4bp4fhczj8bpi8l6h1gn4nj6ka3zbc4mxxz34yc";
- name = "ksquares-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ksquares-21.12.3.tar.xz";
+ sha256 = "1wbrakq1wnwp558y140j9vbid3g0k332rwbilky7z11c0giiv76x";
+ name = "ksquares-21.12.3.tar.xz";
};
};
ksudoku = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ksudoku-21.12.2.tar.xz";
- sha256 = "1din2i3d9lhca5kw06ivixgk2prh1kfy8ikm0byl8qaqj4v89lji";
- name = "ksudoku-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ksudoku-21.12.3.tar.xz";
+ sha256 = "1gw0ybwhvg1z8pcs72f73y52jvzvrw367g275axf2rw50iik6jwv";
+ name = "ksudoku-21.12.3.tar.xz";
};
};
ksystemlog = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ksystemlog-21.12.2.tar.xz";
- sha256 = "0cvx13859bm4kfz75iia3chzi5pbbv70lkmspvjpa6cpsn05zy53";
- name = "ksystemlog-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ksystemlog-21.12.3.tar.xz";
+ sha256 = "0jkd0rx0xlzwsxa3s40sp5x4r19a9rg1x9klpnjfw0b326vgf2m9";
+ name = "ksystemlog-21.12.3.tar.xz";
};
};
kteatime = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kteatime-21.12.2.tar.xz";
- sha256 = "1m7ni3w82lqykgs5qfi0a43p9973244k8lr6rk30x7w551rc7yyw";
- name = "kteatime-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kteatime-21.12.3.tar.xz";
+ sha256 = "0i3ps1a8y8crmxf1631q4zjfa0zglqhq1rk6id5v2xx8f10rkh54";
+ name = "kteatime-21.12.3.tar.xz";
};
};
ktimer = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktimer-21.12.2.tar.xz";
- sha256 = "0jprayxn54pw7brrcb1b70y5sal9j6pfpwrphd2nyw5rkb2a484l";
- name = "ktimer-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktimer-21.12.3.tar.xz";
+ sha256 = "0s6zbygxnk69dciyz1iv1d6whfcv637licsd07n7fc8bsygqjl5p";
+ name = "ktimer-21.12.3.tar.xz";
};
};
ktnef = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktnef-21.12.2.tar.xz";
- sha256 = "0cl589z0v6h1z3aszk4160y99gpihpk203rn73dmb7c6qsk11cbl";
- name = "ktnef-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktnef-21.12.3.tar.xz";
+ sha256 = "1in991n8alkxf40p0wvkr7gdaaz8w4kdw1rsq6sbjil6cs4cr5nl";
+ name = "ktnef-21.12.3.tar.xz";
};
};
ktorrent = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktorrent-21.12.2.tar.xz";
- sha256 = "1zwakqp5j2795j4pln4sq595bc2zlw8cy8qdzwj365clfbpcbyc3";
- name = "ktorrent-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktorrent-21.12.3.tar.xz";
+ sha256 = "021x6qcbk4kdh5ay5mqmf92129s42j2rhrs0q350b0wcnpad55zd";
+ name = "ktorrent-21.12.3.tar.xz";
};
};
ktouch = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktouch-21.12.2.tar.xz";
- sha256 = "1rq2n8395sb17rqd295axv2pbwzhqs8ikjqx5ryn4lv1713alabl";
- name = "ktouch-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktouch-21.12.3.tar.xz";
+ sha256 = "0wi01gr85sxs4qhvnwkkp1230wnvz7gdr74zar03rc3wzwgv22nd";
+ name = "ktouch-21.12.3.tar.xz";
};
};
ktp-accounts-kcm = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktp-accounts-kcm-21.12.2.tar.xz";
- sha256 = "14niidb9kza6sms9rhhnvrba6rdwhc890b5inmlhdllnqbdrrcbl";
- name = "ktp-accounts-kcm-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktp-accounts-kcm-21.12.3.tar.xz";
+ sha256 = "1ydsfiw67avgwswvpy85s3siggyi4w610yqz5dyl535i6my1kl5n";
+ name = "ktp-accounts-kcm-21.12.3.tar.xz";
};
};
ktp-approver = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktp-approver-21.12.2.tar.xz";
- sha256 = "11scv978silxrprkyd66b4xkdww05xpgk8kvrknlwp33rmhm05sn";
- name = "ktp-approver-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktp-approver-21.12.3.tar.xz";
+ sha256 = "0mvczpc0dy2m0dn25r2h2js3hw7s0qr8zl3syvqbyqqs51s59xnl";
+ name = "ktp-approver-21.12.3.tar.xz";
};
};
ktp-auth-handler = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktp-auth-handler-21.12.2.tar.xz";
- sha256 = "006an8bva8zawnirv3ai3kjb59ffgany124ip546r5wg06zkk069";
- name = "ktp-auth-handler-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktp-auth-handler-21.12.3.tar.xz";
+ sha256 = "0lgg0ify9mbsd8has8ingkq3m0g91r9gvfq85s2xf90cwc1s429c";
+ name = "ktp-auth-handler-21.12.3.tar.xz";
};
};
ktp-call-ui = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktp-call-ui-21.12.2.tar.xz";
- sha256 = "0n8yirlsig37839rl73azg8vf8ppdxlf1dqgkf5bz8g3jcs92gcm";
- name = "ktp-call-ui-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktp-call-ui-21.12.3.tar.xz";
+ sha256 = "1npr8qbpxx25pm9mky9sd0qngc5wphmy5blvl6qy7nvs2rqszgam";
+ name = "ktp-call-ui-21.12.3.tar.xz";
};
};
ktp-common-internals = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktp-common-internals-21.12.2.tar.xz";
- sha256 = "0c7kfrgf8bqm7q9hp9fd8q49vakiihzl0dgdklpvgly48zfa2yan";
- name = "ktp-common-internals-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktp-common-internals-21.12.3.tar.xz";
+ sha256 = "0spr2gs5d561agvipkipwcxk2zjlhzvp6swdh8rcv23qr6igqjq6";
+ name = "ktp-common-internals-21.12.3.tar.xz";
};
};
ktp-contact-list = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktp-contact-list-21.12.2.tar.xz";
- sha256 = "0pw5kl0lh0ph3y9hyws7h7phh475lw07gydxxjsfxsd4nb70hkz8";
- name = "ktp-contact-list-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktp-contact-list-21.12.3.tar.xz";
+ sha256 = "1qn3bmwl4kvm5ikbr0ycy2znm4c2yv4m5863d4vakr8xhhappamp";
+ name = "ktp-contact-list-21.12.3.tar.xz";
};
};
ktp-contact-runner = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktp-contact-runner-21.12.2.tar.xz";
- sha256 = "0as41gba7ra65i6ml8j8fqh70x165cnmp9ry13ijrdf9vx21a45k";
- name = "ktp-contact-runner-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktp-contact-runner-21.12.3.tar.xz";
+ sha256 = "0bwi0j733jnwiqlxv8nik1whdvk4aggfayy2bcwwpj5zdzr3mbga";
+ name = "ktp-contact-runner-21.12.3.tar.xz";
};
};
ktp-desktop-applets = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktp-desktop-applets-21.12.2.tar.xz";
- sha256 = "0675hlcjq6xyzl1sz3a45inc3g69z5ilxyhhicxns8by3ydmb82x";
- name = "ktp-desktop-applets-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktp-desktop-applets-21.12.3.tar.xz";
+ sha256 = "01h26jsdb7mkw8isxpy4sfpdn11q209xqhhpnk7xvchs8fpl5fni";
+ name = "ktp-desktop-applets-21.12.3.tar.xz";
};
};
ktp-filetransfer-handler = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktp-filetransfer-handler-21.12.2.tar.xz";
- sha256 = "1cw2y06zcdfm9vixw99gbipgkl63vpkf73giq5ibal2g2yq9c2r5";
- name = "ktp-filetransfer-handler-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktp-filetransfer-handler-21.12.3.tar.xz";
+ sha256 = "0aq5ii7b2kk0qan4qph9glapp81sgqm2zzbdknggxz7vkhj5y6lk";
+ name = "ktp-filetransfer-handler-21.12.3.tar.xz";
};
};
ktp-kded-module = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktp-kded-module-21.12.2.tar.xz";
- sha256 = "1mwmdnr2c6ilhhjlq8bwd7gwvjmiq1k3lph5vlb5hy8nrp9x2p1r";
- name = "ktp-kded-module-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktp-kded-module-21.12.3.tar.xz";
+ sha256 = "0921lahpqjx094ngk68pphkv306ajgxbp6yb0hkckmlic4f2hm37";
+ name = "ktp-kded-module-21.12.3.tar.xz";
};
};
ktp-send-file = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktp-send-file-21.12.2.tar.xz";
- sha256 = "0083z5al3jgl1szmzddzkjln9ci37906mmnrcy9f0yxfq5v2gr44";
- name = "ktp-send-file-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktp-send-file-21.12.3.tar.xz";
+ sha256 = "0vvg0qz2zxckqqwfibsl88w0mpa7a0lzskwhzbvzir03x14rwjlc";
+ name = "ktp-send-file-21.12.3.tar.xz";
};
};
ktp-text-ui = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktp-text-ui-21.12.2.tar.xz";
- sha256 = "0lhbsmhp23sil3rckk51156qhz15hjyp943mgh4s3w49lwxgjpc8";
- name = "ktp-text-ui-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktp-text-ui-21.12.3.tar.xz";
+ sha256 = "046611abkdn7qqh6n4v8ssdzg10q4g14rji7klypmccfng0px2xg";
+ name = "ktp-text-ui-21.12.3.tar.xz";
};
};
ktuberling = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/ktuberling-21.12.2.tar.xz";
- sha256 = "0w9gx0i895vd0gi8wgd6hqikqjz5ir4li14i15k4akc7i7niy46r";
- name = "ktuberling-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/ktuberling-21.12.3.tar.xz";
+ sha256 = "1awsn285j9nggyypkra9ladgi46w2m7m09d8364w5d0sygpzmgsg";
+ name = "ktuberling-21.12.3.tar.xz";
};
};
kturtle = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kturtle-21.12.2.tar.xz";
- sha256 = "0xkl12albs66vnsbilkwpnw5qaqx2ss8wldsnigmf0x5d5hd554k";
- name = "kturtle-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kturtle-21.12.3.tar.xz";
+ sha256 = "1689skwk2dwm4mrl2mrakb1cn74nyxd6xa8ipxsip5zhjgkkvg23";
+ name = "kturtle-21.12.3.tar.xz";
};
};
kubrick = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kubrick-21.12.2.tar.xz";
- sha256 = "1sd8biyndnc7y4d3zsy4bmi409js9viyd4q5ql6fd2wcz656y1im";
- name = "kubrick-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kubrick-21.12.3.tar.xz";
+ sha256 = "0hx81cp1lql74c9067dw7mi78c6sp6p1a035j2nzjn9drpxal6p2";
+ name = "kubrick-21.12.3.tar.xz";
};
};
kwalletmanager = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kwalletmanager-21.12.2.tar.xz";
- sha256 = "0d2ma7dzn0nc25fj7lwaysfjfgqfl5nsisc01lp42n9k1bg0s0i5";
- name = "kwalletmanager-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kwalletmanager-21.12.3.tar.xz";
+ sha256 = "01xif44iz1ik32swlrzzjycizy4hjlis1f336qc9p7affjyv2797";
+ name = "kwalletmanager-21.12.3.tar.xz";
};
};
kwave = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kwave-21.12.2.tar.xz";
- sha256 = "01bjsm3aj7m1mq3nr6iwmcxswq8sxdxhhdyc5zlgffifpym53dc5";
- name = "kwave-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kwave-21.12.3.tar.xz";
+ sha256 = "07xbbii5gpllbpmkxfv5kwxawd390zp0angh94xjk0yq71lvdav2";
+ name = "kwave-21.12.3.tar.xz";
};
};
kwordquiz = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/kwordquiz-21.12.2.tar.xz";
- sha256 = "1na113adrd9djxk016riz3ajwrn9rbpc0ib34adfvp6nw48d9snp";
- name = "kwordquiz-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/kwordquiz-21.12.3.tar.xz";
+ sha256 = "1p06ki75zy4il6k9siavqddpr9j02z3lbnd14pxwk42fhfmbx057";
+ name = "kwordquiz-21.12.3.tar.xz";
};
};
libgravatar = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/libgravatar-21.12.2.tar.xz";
- sha256 = "0xj3v0cknkvr8ac5iipxpz1azr0hk42zgaaip5ivn7qjfhp0zvv0";
- name = "libgravatar-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/libgravatar-21.12.3.tar.xz";
+ sha256 = "1bihy3dfagwc7aday40myqjbn555mkzzaaq7c14ywkmhh99dhvh7";
+ name = "libgravatar-21.12.3.tar.xz";
};
};
libkcddb = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/libkcddb-21.12.2.tar.xz";
- sha256 = "07bcbmf3z5l0v5b6ra1h36yvbjpim1kzz1npd2h30iq09ibx6dr8";
- name = "libkcddb-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/libkcddb-21.12.3.tar.xz";
+ sha256 = "14f1mzsfm0vyqzsyja0p8ln1105sw5dr6fssj25j0qw4rnf9yw32";
+ name = "libkcddb-21.12.3.tar.xz";
};
};
libkcompactdisc = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/libkcompactdisc-21.12.2.tar.xz";
- sha256 = "08abnybd0fa0vvpaixi18ljfz0s8a5pmbblzpcc8rvwzdjc7az6q";
- name = "libkcompactdisc-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/libkcompactdisc-21.12.3.tar.xz";
+ sha256 = "1vmaf3b41sj0sm4k9zdliy5ba4ps5z0cwabggfish152wzw34kgn";
+ name = "libkcompactdisc-21.12.3.tar.xz";
};
};
libkdcraw = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/libkdcraw-21.12.2.tar.xz";
- sha256 = "0mzq0nha7mq5v3lb03xbspc0y2a7mg1mzlwbp3706ph6jp4m7mwa";
- name = "libkdcraw-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/libkdcraw-21.12.3.tar.xz";
+ sha256 = "1pyqsaaficwxbg6hk8xg8srq79i6xdxvghkn2rf54zj1435d9kva";
+ name = "libkdcraw-21.12.3.tar.xz";
};
};
libkdegames = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/libkdegames-21.12.2.tar.xz";
- sha256 = "1m1qz59fb82bsj9ri3b8a1ph2ihgs97wlqq91pbgqw0kgvyvka1j";
- name = "libkdegames-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/libkdegames-21.12.3.tar.xz";
+ sha256 = "0x5mw25c8hmnxhcxc2xm19xmgdxfbx89nrxfl6mzfrh8myr3ybsb";
+ name = "libkdegames-21.12.3.tar.xz";
};
};
libkdepim = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/libkdepim-21.12.2.tar.xz";
- sha256 = "0qqz9b17fz3kgh3gcyq30ds8fq7zkm14k85g4mywsn3lnn8bj6z9";
- name = "libkdepim-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/libkdepim-21.12.3.tar.xz";
+ sha256 = "0g9jx6z5jf9yqn01xc1k038b4ljr9sil7bwvifc64s38qxl9wmww";
+ name = "libkdepim-21.12.3.tar.xz";
};
};
libkeduvocdocument = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/libkeduvocdocument-21.12.2.tar.xz";
- sha256 = "16vh1bycq92bh47phv7nk62r5vjaiv1p8fvq5p5idsz9ipzb1wzp";
- name = "libkeduvocdocument-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/libkeduvocdocument-21.12.3.tar.xz";
+ sha256 = "16kk7ij2qxy5abgv9hgk1ycbx0f2gnpc9lxqbhl5sq9vxd4nblv0";
+ name = "libkeduvocdocument-21.12.3.tar.xz";
};
};
libkexiv2 = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/libkexiv2-21.12.2.tar.xz";
- sha256 = "1j1p1pw2l32q7lk8kp6r0nz9mzjdw6mxr2gi0p770k3k0arrsg87";
- name = "libkexiv2-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/libkexiv2-21.12.3.tar.xz";
+ sha256 = "0r2m6d9rw0r6rm6xqpj1i3w0hplhivy8h90zggqynfzvfyr9c529";
+ name = "libkexiv2-21.12.3.tar.xz";
};
};
libkgapi = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/libkgapi-21.12.2.tar.xz";
- sha256 = "0n6x0vdirv5qbi9qmd8956i307dz0lp80bw5cqxgk4gr4f8hzi8w";
- name = "libkgapi-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/libkgapi-21.12.3.tar.xz";
+ sha256 = "1vbk8786mk1irm94bsm97270gnd149nz7w0zqnvwz499f72d21jx";
+ name = "libkgapi-21.12.3.tar.xz";
};
};
libkipi = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/libkipi-21.12.2.tar.xz";
- sha256 = "0zlga9gy45cs3icx56gvq2nab7i3z5ydrmisa46vpca63w8swmys";
- name = "libkipi-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/libkipi-21.12.3.tar.xz";
+ sha256 = "0w2kwi6djwp8mhmpfrr16v8fgmwjmsc89rcwpfhgii1p68xia8gc";
+ name = "libkipi-21.12.3.tar.xz";
};
};
libkleo = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/libkleo-21.12.2.tar.xz";
- sha256 = "0vqgycmj2v91car7ckksnjxbq3b5nzk31p4x3577dgck9jmi30zd";
- name = "libkleo-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/libkleo-21.12.3.tar.xz";
+ sha256 = "19q128ldi0aspy7vc03r54vrf7wz7l1181x9pbmax8340nbnaz7l";
+ name = "libkleo-21.12.3.tar.xz";
};
};
libkmahjongg = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/libkmahjongg-21.12.2.tar.xz";
- sha256 = "10fgk8nhcr3rbdnh8az46jvl6w6xankdxzw4djj3qs4dpkl52vk4";
- name = "libkmahjongg-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/libkmahjongg-21.12.3.tar.xz";
+ sha256 = "114viyqq7zlwsdnm96iyyvj8ma4p06m69hs641yv42xlbkspwbal";
+ name = "libkmahjongg-21.12.3.tar.xz";
};
};
libkomparediff2 = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/libkomparediff2-21.12.2.tar.xz";
- sha256 = "07yzzc6ns1yx92gpcvhnxw0xna6ly1j4l4lx1rbw3d94z796694z";
- name = "libkomparediff2-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/libkomparediff2-21.12.3.tar.xz";
+ sha256 = "1j93lf9adyw581a9i8kc1pj6vadscibw49wvwfs750f0kxn5p0d2";
+ name = "libkomparediff2-21.12.3.tar.xz";
};
};
libksane = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/libksane-21.12.2.tar.xz";
- sha256 = "1iksfjwkibn1i8n541nngalrp8krc94qy9in801q10d291clwz9i";
- name = "libksane-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/libksane-21.12.3.tar.xz";
+ sha256 = "0ci2284ysh4q8sbhqcg5bis2v02bp5x64h8n0qik14yy24x852zg";
+ name = "libksane-21.12.3.tar.xz";
};
};
libksieve = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/libksieve-21.12.2.tar.xz";
- sha256 = "03aaqqb5g9iv49crrf7zbmsri8jjszn5wfvmcw559swalmmyzb4i";
- name = "libksieve-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/libksieve-21.12.3.tar.xz";
+ sha256 = "1li9cc5y6xbn4m4qa21qmsjd4xzshp67mxwh2nvr17mfs8ray7vd";
+ name = "libksieve-21.12.3.tar.xz";
};
};
libktorrent = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/libktorrent-21.12.2.tar.xz";
- sha256 = "06ak3bsy5x6a0r3l9hbfih9m41y3l357rpd42x8qp08djbs11xbf";
- name = "libktorrent-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/libktorrent-21.12.3.tar.xz";
+ sha256 = "0i976al9bsc3gbplqbxkxr03sdhxv3yzjlfkdaghga8fkihzkkl0";
+ name = "libktorrent-21.12.3.tar.xz";
};
};
lokalize = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/lokalize-21.12.2.tar.xz";
- sha256 = "1x6sb1fw0fqvk3vg299xvih1v2xm9hviv5h1b624maasw071nfyy";
- name = "lokalize-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/lokalize-21.12.3.tar.xz";
+ sha256 = "1gzfiajy377kx0iar85z72zqxh7y9vhp1hs03zzqymazawm9lqnn";
+ name = "lokalize-21.12.3.tar.xz";
};
};
lskat = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/lskat-21.12.2.tar.xz";
- sha256 = "0v16rg6d2l41xgkrkj8ibh5a0zjyb4jn7am6rbgl6k9g9mfqwdx7";
- name = "lskat-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/lskat-21.12.3.tar.xz";
+ sha256 = "1cfs1lfwgxwpn2g56y7jb2c6ijd81bi8ba8ap0yyx6nhv6na072b";
+ name = "lskat-21.12.3.tar.xz";
};
};
mailcommon = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/mailcommon-21.12.2.tar.xz";
- sha256 = "01kirl4lk1xq7y474438jv0av3ccg18krlchllcigd9c0vcp67qj";
- name = "mailcommon-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/mailcommon-21.12.3.tar.xz";
+ sha256 = "1zi8zkhv9g4vsylqzjm2wr9v6b20irfxhf4q467cmpqqrqpcp3af";
+ name = "mailcommon-21.12.3.tar.xz";
};
};
mailimporter = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/mailimporter-21.12.2.tar.xz";
- sha256 = "1ng8w4byq4iiwfzh4acl2glndlr7r9hr62qpj10kpn4fi0qblakb";
- name = "mailimporter-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/mailimporter-21.12.3.tar.xz";
+ sha256 = "0lcr9zzdf16f82spr9x33jnzr23sx7xk2zvfpzdki3b5jxvapnsk";
+ name = "mailimporter-21.12.3.tar.xz";
};
};
marble = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/marble-21.12.2.tar.xz";
- sha256 = "093drig77dyxwfavx30h2nzdqkn52h6pjn54j7fnwygz4742qv7n";
- name = "marble-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/marble-21.12.3.tar.xz";
+ sha256 = "0v6qd9cl6g8k55mjq2lswsfcxzf88w33nlm1193ps3ac0awjaaa4";
+ name = "marble-21.12.3.tar.xz";
};
};
markdownpart = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/markdownpart-21.12.2.tar.xz";
- sha256 = "0g7j15s15blqr0lfagmhvxxggdplvmnkf8g2b9ysjkrr49lgk7b6";
- name = "markdownpart-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/markdownpart-21.12.3.tar.xz";
+ sha256 = "1drvjrvmd2c36xj3x7kxb7lvk23cmaw8mi976pdfnxn5pdamv6wl";
+ name = "markdownpart-21.12.3.tar.xz";
};
};
mbox-importer = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/mbox-importer-21.12.2.tar.xz";
- sha256 = "0qakmg86978zjm2m98602zbaiyiryrmlx2vk93yyv5xg352gphjb";
- name = "mbox-importer-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/mbox-importer-21.12.3.tar.xz";
+ sha256 = "01bh0yzv23vkicc7lj217rp8c36kyyjlxmkwylss3hakr4b3afan";
+ name = "mbox-importer-21.12.3.tar.xz";
};
};
messagelib = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/messagelib-21.12.2.tar.xz";
- sha256 = "0ln473gdwsscjpsh50h2cbazxbc8qy1mmll9lsfngfw1qq49dwsp";
- name = "messagelib-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/messagelib-21.12.3.tar.xz";
+ sha256 = "0xrhnkahqirsz37lbvx505ll7bfhr25lbq89yqq81bxbzkbvamsw";
+ name = "messagelib-21.12.3.tar.xz";
};
};
minuet = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/minuet-21.12.2.tar.xz";
- sha256 = "050pmw3srfb800h91x6pqn1vz7s6458w94r2innwc1j04pr8jaxv";
- name = "minuet-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/minuet-21.12.3.tar.xz";
+ sha256 = "0r68z3j0j2gbwzj77wvsx1idrfkagj0pjai9j7fbqa0r6q833flr";
+ name = "minuet-21.12.3.tar.xz";
};
};
okular = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/okular-21.12.2.tar.xz";
- sha256 = "1k0bwyhk73gshc7f0j6mply2m9ykfd07mhkxwnzj874sby5rxhv9";
- name = "okular-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/okular-21.12.3.tar.xz";
+ sha256 = "054rzdqsqkjx2sncyfcnfdvm9bp45sdw3rycmpzicnwpn5j4hcb3";
+ name = "okular-21.12.3.tar.xz";
};
};
palapeli = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/palapeli-21.12.2.tar.xz";
- sha256 = "0v5456hm56c7f9d49l5zjql6f4ap72wmkf8in8s95lqmpn42dl17";
- name = "palapeli-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/palapeli-21.12.3.tar.xz";
+ sha256 = "076igql89sx55hfxjb79248ih4cjbkr1s1jnz46y3dk793rscm8g";
+ name = "palapeli-21.12.3.tar.xz";
};
};
parley = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/parley-21.12.2.tar.xz";
- sha256 = "1cwnlv57yqjm52i0jwl33pz4h9h448h0ljrg598ghby8p3b2i5w7";
- name = "parley-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/parley-21.12.3.tar.xz";
+ sha256 = "10hv885l0gz5aymf72f42bhkncfarj768nb12q9fxqk4x5rviiw0";
+ name = "parley-21.12.3.tar.xz";
};
};
partitionmanager = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/partitionmanager-21.12.2.tar.xz";
- sha256 = "0rr7ic2ivm7lp3lj20b8rfbx1sr91s24fzxfzfwnw9znl9vj410q";
- name = "partitionmanager-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/partitionmanager-21.12.3.tar.xz";
+ sha256 = "0x0k3vsbngcb7kvcgqj2w025fn9xvfd2232lx51xfar5r3jb7h1p";
+ name = "partitionmanager-21.12.3.tar.xz";
};
};
picmi = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/picmi-21.12.2.tar.xz";
- sha256 = "0qp8b1di3qnv4xrnpcmyi6myrrwzdlijhvxmacx4ijv7b7wlg4r7";
- name = "picmi-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/picmi-21.12.3.tar.xz";
+ sha256 = "0gk1yq5ac55k6lxbxszxpd393fb9k6yphisb71lx2zv9gchl44n6";
+ name = "picmi-21.12.3.tar.xz";
};
};
pim-data-exporter = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/pim-data-exporter-21.12.2.tar.xz";
- sha256 = "0m4dq3x5kbncnvixjigb85j6siws6q600piw53qabiwd6w6rp1xy";
- name = "pim-data-exporter-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/pim-data-exporter-21.12.3.tar.xz";
+ sha256 = "0qcwsbb4zsjgc15fhq9pp341wwm35y9v1lq8gnpjdsvfq2pczq5q";
+ name = "pim-data-exporter-21.12.3.tar.xz";
};
};
pim-sieve-editor = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/pim-sieve-editor-21.12.2.tar.xz";
- sha256 = "1cpazs6q6hv15ib6isif5syvpywxfdi7d3w8vc4pnfj94wkcq3gm";
- name = "pim-sieve-editor-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/pim-sieve-editor-21.12.3.tar.xz";
+ sha256 = "1gp4gpagv6pfiy6gyfh14z1rb16iqm1npmngw6ybjlhh6d424n90";
+ name = "pim-sieve-editor-21.12.3.tar.xz";
};
};
pimcommon = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/pimcommon-21.12.2.tar.xz";
- sha256 = "1pnhjhnjx98wdc3dg71qgjjj3dsncl56d86cagkk2spicv901p69";
- name = "pimcommon-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/pimcommon-21.12.3.tar.xz";
+ sha256 = "1k1d100lr277lgwyzn2ssxsx9x2yd9nfd5657r95vmdnkh2qs517";
+ name = "pimcommon-21.12.3.tar.xz";
};
};
poxml = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/poxml-21.12.2.tar.xz";
- sha256 = "1zzw9jwwd5nx12ma2ihffj6nhr3zlpahnj8k0r8mxcyn99j51kyn";
- name = "poxml-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/poxml-21.12.3.tar.xz";
+ sha256 = "19hrb75fbh102fw8ajflj4777s7hq7vxv6kbwjir6wzsvdfanwdb";
+ name = "poxml-21.12.3.tar.xz";
};
};
print-manager = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/print-manager-21.12.2.tar.xz";
- sha256 = "0xqv7f9p27maa0p20nc92g6240qkcin9s3dldr5b5q944hkkxizq";
- name = "print-manager-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/print-manager-21.12.3.tar.xz";
+ sha256 = "1q9vv5v9hivm583hcx8qa7xik9yv4zicrd02abcsn6hvgwmdav8b";
+ name = "print-manager-21.12.3.tar.xz";
};
};
rocs = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/rocs-21.12.2.tar.xz";
- sha256 = "1mjrgh0vfc1kvici5m1dx23s1c7qpvfx1br91yglgll1biajzqlq";
- name = "rocs-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/rocs-21.12.3.tar.xz";
+ sha256 = "1fgjap71qnaydar9q155is7vwjlkpa8wi1162dsqxr5ywy464wrg";
+ name = "rocs-21.12.3.tar.xz";
};
};
signon-kwallet-extension = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/signon-kwallet-extension-21.12.2.tar.xz";
- sha256 = "0qfim8ahklwkixpxcm9sj1w49cmb0wz5r8np6ga3r2rh4vlqdxbf";
- name = "signon-kwallet-extension-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/signon-kwallet-extension-21.12.3.tar.xz";
+ sha256 = "0sv0g50bxxd442ia7wzk2lkqwr8lsjxk5wm3zsskxhql851y0ybm";
+ name = "signon-kwallet-extension-21.12.3.tar.xz";
};
};
skanlite = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/skanlite-21.12.2.tar.xz";
- sha256 = "1fvdrzyvps0iqb9irnpdn81gmlmfhgfsfb5mg4i259sms6rq3h8m";
- name = "skanlite-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/skanlite-21.12.3.tar.xz";
+ sha256 = "06dwmdjrss7cqqigg4rwsy5dya35577qwdaxj2jbvs2pkzp9rq3p";
+ name = "skanlite-21.12.3.tar.xz";
};
};
spectacle = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/spectacle-21.12.2.tar.xz";
- sha256 = "1966ynfdkaya1iydi2hfmcr13adk7agjr9ndz2hjrwgjagd29pyr";
- name = "spectacle-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/spectacle-21.12.3.tar.xz";
+ sha256 = "155xin26lkjr0swb281afha906nqy2821lf2spmzzxa3xalzq3sv";
+ name = "spectacle-21.12.3.tar.xz";
};
};
step = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/step-21.12.2.tar.xz";
- sha256 = "1paq5wpya82s92zwacwbjf96nj52gy1sydk0gndyqi8jdplhlnps";
- name = "step-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/step-21.12.3.tar.xz";
+ sha256 = "0j3w63bxj3b4lrfb0mnchlvsr987v5zwwjw5jrgvqidrhv1rh7dc";
+ name = "step-21.12.3.tar.xz";
};
};
svgpart = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/svgpart-21.12.2.tar.xz";
- sha256 = "15624gfcn85xkh6lypkw73iidnclprhqhpxrjggbng1x22jg2iwc";
- name = "svgpart-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/svgpart-21.12.3.tar.xz";
+ sha256 = "0yg8sn1z9zfb7a6y61nw7vya516sfaydkgxh7cfwiz7sljl87z8j";
+ name = "svgpart-21.12.3.tar.xz";
};
};
sweeper = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/sweeper-21.12.2.tar.xz";
- sha256 = "07rqshzjjzqgmm5z0fn1hjd09prcwlnyilp3s61nl5fciby6m8fh";
- name = "sweeper-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/sweeper-21.12.3.tar.xz";
+ sha256 = "1l4ag2nhy0da9z4nlf7fmjrim7pmwpm3m4v4y50jlpdv73f63246";
+ name = "sweeper-21.12.3.tar.xz";
};
};
umbrello = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/umbrello-21.12.2.tar.xz";
- sha256 = "07bp3rf31x5c1vag6pw0lal9b6zmvsqa8wg8a30kj7k9wabvjprb";
- name = "umbrello-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/umbrello-21.12.3.tar.xz";
+ sha256 = "1i94l5hnn8hl0dgdq8sj5xm2vk372zfcnch9qvf9gcvhg08gdif6";
+ name = "umbrello-21.12.3.tar.xz";
};
};
yakuake = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/yakuake-21.12.2.tar.xz";
- sha256 = "1xkdyn944ga1xvwbbblnffvlnwgypspr909yvdy6xf5j0qaldsdk";
- name = "yakuake-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/yakuake-21.12.3.tar.xz";
+ sha256 = "10mkr8svkjf2s023mf21cil2c5v986s5b2yp1hm0fzdgmawpwrh9";
+ name = "yakuake-21.12.3.tar.xz";
};
};
zanshin = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/zanshin-21.12.2.tar.xz";
- sha256 = "1ilgswm4jbjk1mbvcrdi451f1w4vwx3ah6y32a3y5a9blbh9bh6c";
- name = "zanshin-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/zanshin-21.12.3.tar.xz";
+ sha256 = "1cwawpmx5hc60zkdkyh484lp3bwiipn6c3yh164gzw769vz9zr71";
+ name = "zanshin-21.12.3.tar.xz";
};
};
zeroconf-ioslave = {
- version = "21.12.2";
+ version = "21.12.3";
src = fetchurl {
- url = "${mirror}/stable/release-service/21.12.2/src/zeroconf-ioslave-21.12.2.tar.xz";
- sha256 = "0b59npqhmf3yvp9x0jm29bwzlyl0vm9l56jlsgwgiq7pwis5njwd";
- name = "zeroconf-ioslave-21.12.2.tar.xz";
+ url = "${mirror}/stable/release-service/21.12.3/src/zeroconf-ioslave-21.12.3.tar.xz";
+ sha256 = "09jmf233njbqam1swzvpzfgdplpjzdx48vjy6kcpmjvg2qlm7i2l";
+ name = "zeroconf-ioslave-21.12.3.tar.xz";
};
};
}
diff --git a/pkgs/applications/misc/pdfslicer/default.nix b/pkgs/applications/misc/pdfslicer/default.nix
index 31bc47140159..ed20f460a167 100644
--- a/pkgs/applications/misc/pdfslicer/default.nix
+++ b/pkgs/applications/misc/pdfslicer/default.nix
@@ -24,6 +24,12 @@ stdenv.mkDerivation rec {
sha256 = "0sja0ddd9c8wjjpzk2ag8q1lxpj09adgmhd7wnsylincqnj2jyls";
};
+ postPatch = ''
+ # Don't build tests, vendored catch doesn't build with latest glibc.
+ substituteInPlace CMakeLists.txt \
+ --replace "add_subdirectory (tests)" ""
+ '';
+
nativeBuildInputs = [
cmake
gettext
diff --git a/pkgs/applications/misc/trenchbroom/default.nix b/pkgs/applications/misc/trenchbroom/default.nix
index 8a7025060607..a49fbf71191e 100644
--- a/pkgs/applications/misc/trenchbroom/default.nix
+++ b/pkgs/applications/misc/trenchbroom/default.nix
@@ -21,6 +21,19 @@ stdenv.mkDerivation rec {
--subst-var-by APP_VERSION_YEAR ${lib.versions.major version} \
--subst-var-by APP_VERSION_NUMBER ${lib.versions.minor version} \
--subst-var-by GIT_DESCRIBE v${version}
+
+ # Tests don't compile because of vendored `catch2` being incompatible with glibc-2.34.
+ # Also, no need to since we don't even run them.
+ substituteInPlace lib/CMakeLists.txt \
+ --replace "add_subdirectory(Catch2)" ""
+ substituteInPlace lib/vecmath/CMakeLists.txt \
+ --replace "add_subdirectory(test)" "" \
+ --replace "add_subdirectory(lib)" ""
+ substituteInPlace lib/kdl/CMakeLists.txt \
+ --replace "add_subdirectory(test)" ""
+ substituteInPlace common/CMakeLists.txt \
+ --replace "add_subdirectory(test)" "" \
+ --replace "add_subdirectory(benchmark)" ""
'';
nativeBuildInputs = [ cmake git pandoc wrapQtAppsHook copyDesktopItems ];
diff --git a/pkgs/applications/networking/cluster/kube3d/default.nix b/pkgs/applications/networking/cluster/kube3d/default.nix
index 0da63fae4215..ebcb3bda7381 100644
--- a/pkgs/applications/networking/cluster/kube3d/default.nix
+++ b/pkgs/applications/networking/cluster/kube3d/default.nix
@@ -15,7 +15,7 @@ buildGoModule rec {
nativeBuildInputs = [ installShellFiles ];
- excludedPackages = "\\(tools\\|docgen\\)";
+ excludedPackages = [ "tools" "docgen" ];
ldflags =
let t = "github.com/rancher/k3d/v5/version"; in
diff --git a/pkgs/applications/networking/cluster/tektoncd-cli/default.nix b/pkgs/applications/networking/cluster/tektoncd-cli/default.nix
index bdd538ef804d..673a8c9a8f0a 100644
--- a/pkgs/applications/networking/cluster/tektoncd-cli/default.nix
+++ b/pkgs/applications/networking/cluster/tektoncd-cli/default.nix
@@ -19,7 +19,7 @@ buildGoModule rec {
# third_party/VENDOR-LICENSE breaks build/check as go files are still included
# docs is a tool for generating docs
- excludedPackages = "\\(third_party\\|cmd/docs\\)";
+ excludedPackages = [ "third_party" "cmd/docs" ];
preCheck = ''
# some tests try to write to the home dir
diff --git a/pkgs/applications/networking/instant-messengers/pond/default.nix b/pkgs/applications/networking/instant-messengers/pond/default.nix
index c7b5d56dbba3..568a2a5bd51b 100644
--- a/pkgs/applications/networking/instant-messengers/pond/default.nix
+++ b/pkgs/applications/networking/instant-messengers/pond/default.nix
@@ -24,7 +24,7 @@ buildGoPackage rec {
++ lib.optional stdenv.hostPlatform.isx86_64 dclxvi
++ lib.optionals gui [ wrapGAppsHook ];
tags = lib.optionals (!gui) [ "nogui" ];
- excludedPackages = "\\(appengine\\|bn256cgo\\)";
+ excludedPackages = [ "appengine" "bn256cgo" ];
postPatch = lib.optionalString stdenv.hostPlatform.isx86_64 ''
grep -r 'bn256' | awk -F: '{print $1}' | xargs sed -i \
-e "s,golang.org/x/crypto/bn256,github.com/agl/pond/bn256cgo,g" \
diff --git a/pkgs/applications/science/logic/potassco/clingcon.nix b/pkgs/applications/science/logic/potassco/clingcon.nix
index 1614adf45537..d7ec2e72433e 100644
--- a/pkgs/applications/science/logic/potassco/clingcon.nix
+++ b/pkgs/applications/science/logic/potassco/clingcon.nix
@@ -2,6 +2,7 @@
, fetchFromGitHub
, cmake
, clingo
+, catch2
}:
stdenv.mkDerivation rec {
@@ -15,6 +16,10 @@ stdenv.mkDerivation rec {
sha256 = "1g2xkz9nsgqnrw3fdf5jchl16f0skj5mm32va61scc2yrchll166";
};
+ postPatch = ''
+ cp ${catch2}/include/catch2/catch.hpp libclingcon/tests/catch.hpp
+ '';
+
nativeBuildInputs = [ cmake clingo ];
cmakeFlags = [
diff --git a/pkgs/applications/version-management/git-and-tools/git/default.nix b/pkgs/applications/version-management/git-and-tools/git/default.nix
index 13da857b790e..1f08cd26ef36 100644
--- a/pkgs/applications/version-management/git-and-tools/git/default.nix
+++ b/pkgs/applications/version-management/git-and-tools/git/default.nix
@@ -32,7 +32,9 @@ let
in
stdenv.mkDerivation {
- pname = "git";
+ pname = "git"
+ + lib.optionalString svnSupport "-with-svn"
+ + lib.optionalString (!svnSupport && !guiSupport && !sendEmailSupport && !withManual && !pythonSupport && !withpcre2) "-minimal";
inherit version;
src = fetchurl {
@@ -166,8 +168,13 @@ stdenv.mkDerivation {
cp -a contrib $out/share/git/
mkdir -p $out/share/bash-completion/completions
ln -s $out/share/git/contrib/completion/git-completion.bash $out/share/bash-completion/completions/git
- mkdir -p $out/share/bash-completion/completions
ln -s $out/share/git/contrib/completion/git-prompt.sh $out/share/bash-completion/completions/
+ # only readme, developed in another repo
+ rm -r contrib/hooks/multimail
+ mkdir -p $out/share/git-core/contrib
+ cp -a contrib/hooks/ $out/share/git-core/contrib/
+ substituteInPlace $out/share/git-core/contrib/hooks/pre-auto-gc-battery \
+ --replace ' grep' ' ${gnugrep}/bin/grep' \
# grep is a runtime dependency, need to patch so that it's found
substituteInPlace $out/libexec/git-core/git-sh-setup \
diff --git a/pkgs/applications/version-management/rcs/default.nix b/pkgs/applications/version-management/rcs/default.nix
index d46a67a8601e..6982bd43b263 100644
--- a/pkgs/applications/version-management/rcs/default.nix
+++ b/pkgs/applications/version-management/rcs/default.nix
@@ -9,6 +9,14 @@ stdenv.mkDerivation rec {
sha256 = "sha256-Q93+EHJKi4XiRo9kA7YABzcYbwHmDgvWL95p2EIjTMU=";
};
+ patches = [
+ # glibc 2.34 compat
+ (fetchpatch {
+ url = "https://src.fedoraproject.org/rpms/rcs/raw/f8e07cd37f4abfb36e37d41852bb8f9e234d3fb1/f/rcs-5.10.0-SIGSTKSZ.patch";
+ sha256 = "sha256-mc6Uye9mdEsLBcOnf1m1TUb1BV0ncNU//iKBpLGBjho=";
+ })
+ ];
+
ac_cv_path_ED = "${ed}/bin/ed";
DIFF = "${diffutils}/bin/diff";
DIFF3 = "${diffutils}/bin/diff3";
diff --git a/pkgs/applications/video/quvi/library.nix b/pkgs/applications/video/quvi/library.nix
index 071e67a17211..548b3d7f9724 100644
--- a/pkgs/applications/video/quvi/library.nix
+++ b/pkgs/applications/video/quvi/library.nix
@@ -18,5 +18,6 @@ stdenv.mkDerivation rec {
license = lib.licenses.lgpl21Plus;
platforms = lib.platforms.linux;
maintainers = [ ];
+ broken = true; # missing glibc-2.34 support, no upstream activity
};
}
diff --git a/pkgs/applications/video/quvi/scripts.nix b/pkgs/applications/video/quvi/scripts.nix
index 676d073900c5..a31ef6e72ae6 100644
--- a/pkgs/applications/video/quvi/scripts.nix
+++ b/pkgs/applications/video/quvi/scripts.nix
@@ -17,5 +17,6 @@ stdenv.mkDerivation rec {
license = lib.licenses.lgpl21Plus;
platforms = lib.platforms.linux;
maintainers = [ ];
+ broken = true; # missing glibc-2.34 support, no upstream activity
};
}
diff --git a/pkgs/applications/video/quvi/tool.nix b/pkgs/applications/video/quvi/tool.nix
index 87c8066a976c..ad6233cbd001 100644
--- a/pkgs/applications/video/quvi/tool.nix
+++ b/pkgs/applications/video/quvi/tool.nix
@@ -21,5 +21,6 @@ stdenv.mkDerivation rec {
license = lib.licenses.lgpl21Plus;
platforms = lib.platforms.linux;
maintainers = [ ];
+ broken = true; # missing glibc-2.34 support, no upstream activity
};
}
diff --git a/pkgs/build-support/make-desktopitem/default.nix b/pkgs/build-support/make-desktopitem/default.nix
index d831fe24d33b..e09fd0e20f22 100644
--- a/pkgs/build-support/make-desktopitem/default.nix
+++ b/pkgs/build-support/make-desktopitem/default.nix
@@ -34,11 +34,6 @@
, extraConfig ? {} # Additional values to be added literally to the final item, e.g. vendor extensions
}:
let
- # FIXME: workaround until https://github.com/NixOS/nixpkgs/pull/162246 lands
- cleanName = if lib.hasInfix " " name
- then throw "makeDesktopItem: name must not contain spaces!"
- else name;
-
# There are multiple places in the FDO spec that make "boolean" values actually tristate,
# e.g. StartupNotify, where "unset" is literally defined as "do something reasonable".
# So, handle null values separately.
@@ -116,8 +111,8 @@ let
content = [ mainSectionRendered ] ++ actionsRendered;
in
writeTextFile {
- name = "${cleanName}.desktop";
- destination = "/share/applications/${cleanName}.desktop";
+ name = "${name}.desktop";
+ destination = "/share/applications/${name}.desktop";
text = builtins.concatStringsSep "\n" content;
- checkPhase = "${buildPackages.desktop-file-utils}/bin/desktop-file-validate $target";
+ checkPhase = ''${buildPackages.desktop-file-utils}/bin/desktop-file-validate "$target"'';
}
diff --git a/pkgs/build-support/trivial-builders.nix b/pkgs/build-support/trivial-builders.nix
index c3072357a57e..4a3d37788814 100644
--- a/pkgs/build-support/trivial-builders.nix
+++ b/pkgs/build-support/trivial-builders.nix
@@ -120,7 +120,7 @@ rec {
allowSubstitutes = false;
}
''
- target=$out${destination}
+ target=$out${lib.escapeShellArg destination}
mkdir -p "$(dirname "$target")"
if [ -e "$textPath" ]; then
diff --git a/pkgs/build-support/trivial-builders/test/write-text-file.nix b/pkgs/build-support/trivial-builders/test/write-text-file.nix
new file mode 100644
index 000000000000..ac83a75fca4a
--- /dev/null
+++ b/pkgs/build-support/trivial-builders/test/write-text-file.nix
@@ -0,0 +1,34 @@
+{ writeTextFile }:
+let
+ veryWeirdName = ''here's a name with some "bad" characters, like spaces and quotes'';
+in writeTextFile {
+ name = "weird-names";
+ destination = "/etc/${veryWeirdName}";
+ text = ''passed!'';
+ checkPhase = ''
+ # intentionally hardcode everything here, to make sure
+ # Nix does not mess with file paths
+
+ name="here's a name with some \"bad\" characters, like spaces and quotes"
+ fullPath="$out/etc/$name"
+
+ if [ -f "$fullPath" ]; then
+ echo "[PASS] File exists!"
+ else
+ echo "[FAIL] File was not created at expected path!"
+ exit 1
+ fi
+
+ content=$(<"$fullPath")
+ expected="passed!"
+
+ if [ "$content" = "$expected" ]; then
+ echo "[PASS] Contents match!"
+ else
+ echo "[FAIL] File contents don't match!"
+ echo " Expected: $expected"
+ echo " Got: $content"
+ exit 2
+ fi
+ '';
+}
diff --git a/pkgs/data/icons/hicolor-icon-theme/default.nix b/pkgs/data/icons/hicolor-icon-theme/default.nix
index 3a8839844f11..4a58b8fb89ad 100644
--- a/pkgs/data/icons/hicolor-icon-theme/default.nix
+++ b/pkgs/data/icons/hicolor-icon-theme/default.nix
@@ -1,10 +1,11 @@
{ lib, stdenv, fetchurl }:
stdenv.mkDerivation rec {
- name = "hicolor-icon-theme-0.17";
+ pname = "hicolor-icon-theme";
+ version = "0.17";
src = fetchurl {
- url = "https://icon-theme.freedesktop.org/releases/${name}.tar.xz";
+ url = "https://icon-theme.freedesktop.org/releases/hicolor-icon-theme-${version}.tar.xz";
sha256 = "1n59i3al3zx6p90ff0l43gzpzmlqnzm6hf5cryxqrlbi48sq8x1i";
};
diff --git a/pkgs/data/misc/iana-etc/default.nix b/pkgs/data/misc/iana-etc/default.nix
index 5e7e70a1b05d..cab93d737c34 100644
--- a/pkgs/data/misc/iana-etc/default.nix
+++ b/pkgs/data/misc/iana-etc/default.nix
@@ -1,9 +1,8 @@
{ lib, fetchzip, stdenvNoCC, writeText }:
-let
+stdenvNoCC.mkDerivation rec {
+ pname = "iana-etc";
version = "20211124";
-in stdenvNoCC.mkDerivation {
- name = "iana-etc-${version}";
src = fetchzip {
url = "https://github.com/Mic92/iana-etc/releases/download/${version}/iana-etc-${version}.tar.gz";
sha256 = "sha256-4mM/ZeGd91e1AklGHFK5UB4llg9IgCo9DKcM0iXcBls=";
diff --git a/pkgs/data/misc/tzdata/default.nix b/pkgs/data/misc/tzdata/default.nix
index 78c93b05033e..b149f448da72 100644
--- a/pkgs/data/misc/tzdata/default.nix
+++ b/pkgs/data/misc/tzdata/default.nix
@@ -2,16 +2,16 @@
stdenv.mkDerivation rec {
pname = "tzdata";
- version = "2021e";
+ version = "2022a";
srcs =
[ (fetchurl {
url = "https://data.iana.org/time-zones/releases/tzdata${version}.tar.gz";
- sha256 = "1cdjdcxl0s9xf0dg1z64kh7llm80byxqlzrkkjzcdlyh6yvl5v07";
+ sha256 = "0r0nhwpk9nyxj5kkvjy58nr5d85568m04dcb69c4y3zmykczyzzg";
})
(fetchurl {
url = "https://data.iana.org/time-zones/releases/tzcode${version}.tar.gz";
- sha256 = "0x8pcfmjvxk29yfh8bklchv2f0vpl4yih0gc4wyx292l78wncijq";
+ sha256 = "1iysv8fdkm79k8wh8jizmjmq075q4qjhk090vxjy57my6dz5wmzq";
})
];
diff --git a/pkgs/data/sgml+xml/schemas/xml-dtd/docbook-ebnf/default.nix b/pkgs/data/sgml+xml/schemas/xml-dtd/docbook-ebnf/default.nix
index 1c6e57b3e7a7..6be2e89dcd2e 100644
--- a/pkgs/data/sgml+xml/schemas/xml-dtd/docbook-ebnf/default.nix
+++ b/pkgs/data/sgml+xml/schemas/xml-dtd/docbook-ebnf/default.nix
@@ -1,10 +1,11 @@
{lib, stdenv, fetchurl}:
-stdenv.mkDerivation {
- name = "docbook-xml-ebnf-1.2b1";
+stdenv.mkDerivation rec {
+ pname = "docbook-xml-ebnf";
+ version = "1.2b1";
dtd = fetchurl {
- url = "http://www.docbook.org/xml/ebnf/1.2b1/dbebnf.dtd";
+ url = "https://docbook.org/xml/ebnf/${version}/dbebnf.dtd";
sha256 = "0min5dsc53my13b94g2yd65q1nkjcf4x1dak00bsc4ckf86mrx95";
};
catalog = ./docbook-ebnf.cat;
diff --git a/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.1.2.nix b/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.1.2.nix
index 8a10defa0fb5..c367e2a1d0cd 100644
--- a/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.1.2.nix
+++ b/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.1.2.nix
@@ -1,27 +1,22 @@
{lib, stdenv, fetchurl, unzip, findXMLCatalogs}:
let
-
# Urgh, DocBook 4.1.2 doesn't come with an XML catalog. Use the one
# from 4.2.
docbook42catalog = fetchurl {
- url = "http://www.docbook.org/xml/4.2/catalog.xml";
+ url = "https://docbook.org/xml/4.2/catalog.xml";
sha256 = "18lhp6q2l0753s855r638shkbdwq9blm6akdjsc9nrik24k38j17";
};
-
in
import ./generic.nix {
inherit lib stdenv unzip findXMLCatalogs;
- name = "docbook-xml-4.1.2";
+ version = "4.1.2";
src = fetchurl {
- url = "http://www.docbook.org/xml/4.1.2/docbkx412.zip";
+ url = "https://docbook.org/xml/4.1.2/docbkx412.zip";
sha256 = "0wkp5rvnqj0ghxia0558mnn4c7s3n501j99q2isp3sp0ci069w1h";
};
postInstall = "
sed 's|V4.2|V4.1.2|g' < ${docbook42catalog} > catalog.xml
";
- meta = {
- branch = "4.1.2";
- };
}
diff --git a/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.2.nix b/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.2.nix
index 9a9abc0588bd..8f778ea7505d 100644
--- a/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.2.nix
+++ b/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.2.nix
@@ -2,12 +2,9 @@
import ./generic.nix {
inherit lib stdenv unzip findXMLCatalogs;
- name = "docbook-xml-4.2";
+ version = "4.2";
src = fetchurl {
- url = "http://www.docbook.org/xml/4.2/docbook-xml-4.2.zip";
+ url = "https://docbook.org/xml/4.2/docbook-xml-4.2.zip";
sha256 = "acc4601e4f97a196076b7e64b368d9248b07c7abf26b34a02cca40eeebe60fa2";
};
- meta = {
- branch = "4.2";
- };
}
diff --git a/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.3.nix b/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.3.nix
index 4d821ce2ffb8..a58370ec4ac6 100644
--- a/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.3.nix
+++ b/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.3.nix
@@ -2,12 +2,9 @@
import ./generic.nix {
inherit lib stdenv unzip findXMLCatalogs;
- name = "docbook-xml-4.3";
+ version = "4.3";
src = fetchurl {
- url = "http://www.docbook.org/xml/4.3/docbook-xml-4.3.zip";
+ url = "https://docbook.org/xml/4.3/docbook-xml-4.3.zip";
sha256 = "0r1l2if1z4wm2v664sqdizm4gak6db1kx9y50jq89m3gxaa8l1i3";
};
- meta = {
- branch = "4.3";
- };
}
diff --git a/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.4.nix b/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.4.nix
index ca847d3e436e..3b46fe81bd7a 100644
--- a/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.4.nix
+++ b/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.4.nix
@@ -2,12 +2,9 @@
import ./generic.nix {
inherit lib stdenv unzip findXMLCatalogs;
- name = "docbook-xml-4.4";
+ version = "4.4";
src = fetchurl {
- url = "http://www.docbook.org/xml/4.4/docbook-xml-4.4.zip";
+ url = "https://docbook.org/xml/4.4/docbook-xml-4.4.zip";
sha256 = "141h4zsyc71sfi2zzd89v4bb4qqq9ca1ri9ix2als9f4i3mmkw82";
};
- meta = {
- branch = "4.4";
- };
}
diff --git a/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.5.nix b/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.5.nix
index 7be810fe3071..c4ab1f6f3a9b 100644
--- a/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.5.nix
+++ b/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/4.5.nix
@@ -2,12 +2,9 @@
import ./generic.nix {
inherit lib stdenv unzip findXMLCatalogs;
- name = "docbook-xml-4.5";
+ version = "4.5";
src = fetchurl {
- url = "http://www.docbook.org/xml/4.5/docbook-xml-4.5.zip";
+ url = "https://docbook.org/xml/4.5/docbook-xml-4.5.zip";
sha256 = "1d671lcjckjri28xfbf6dq7y3xnkppa910w1jin8rjc35dx06kjf";
};
- meta = {
- branch = "4.5";
- };
}
diff --git a/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/generic.nix b/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/generic.nix
index 3d6edd300ec3..7a635f612af8 100644
--- a/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/generic.nix
+++ b/pkgs/data/sgml+xml/schemas/xml-dtd/docbook/generic.nix
@@ -1,9 +1,10 @@
-{ lib, stdenv, unzip, src, name, postInstall ? "true", meta ? {}, findXMLCatalogs }:
+{ lib, stdenv, unzip, src, version, postInstall ? "true", findXMLCatalogs }:
stdenv.mkDerivation {
- inherit src name postInstall;
+ inherit version src postInstall;
+ pname = "docbook-xml";
- nativeBuildInputs = [unzip];
+ nativeBuildInputs = [ unzip ];
propagatedNativeBuildInputs = [ findXMLCatalogs ];
unpackPhase = ''
@@ -17,7 +18,8 @@ stdenv.mkDerivation {
runHook postInstall
'';
- meta = meta // {
+ meta = {
+ branch = version;
platforms = lib.platforms.unix;
};
}
diff --git a/pkgs/data/sgml+xml/schemas/xml-dtd/xhtml1/default.nix b/pkgs/data/sgml+xml/schemas/xml-dtd/xhtml1/default.nix
index c698098e6c12..f05788076a69 100644
--- a/pkgs/data/sgml+xml/schemas/xml-dtd/xhtml1/default.nix
+++ b/pkgs/data/sgml+xml/schemas/xml-dtd/xhtml1/default.nix
@@ -1,10 +1,11 @@
{ lib, stdenv, fetchurl, libxml2 }:
stdenv.mkDerivation {
- name = "xhtml1-20020801";
+ pname = "xhtml1";
+ version = "unstable-2002-08-01";
src = fetchurl {
- url = "http://www.w3.org/TR/xhtml1/xhtml1.tgz";
+ url = "https://www.w3.org/TR/xhtml1/xhtml1.tgz";
sha256 = "0rr0d89i0z75qvjbm8il93bippx09hbmjwy0y2sj44n9np69x3hl";
};
diff --git a/pkgs/desktops/gnome-2/bindings/gnome-python/default.nix b/pkgs/desktops/gnome-2/bindings/gnome-python/default.nix
index 1e7d726d557c..0c636ffa5417 100644
--- a/pkgs/desktops/gnome-2/bindings/gnome-python/default.nix
+++ b/pkgs/desktops/gnome-2/bindings/gnome-python/default.nix
@@ -5,11 +5,11 @@ with lib;
let
inherit (python2.pkgs) python pygobject2 pygtk dbus-python;
in stdenv.mkDerivation rec {
- version = "2.28";
- name = "gnome-python-${version}.1";
+ pname = "gnome-python";
+ version = "2.28.1";
src = fetchurl {
- url = "mirror://gnome/sources/gnome-python/${version}/${name}.tar.bz2";
+ url = "mirror://gnome/sources/gnome-python/${lib.versions.majorMinor version}/gnome-python-${version}.tar.bz2";
sha256 = "759ce9344cbf89cf7f8449d945822a0c9f317a494f56787782a901e4119b96d8";
};
@@ -20,7 +20,7 @@ in stdenv.mkDerivation rec {
# gnome-python expects that .pth file is already installed by PyGTK in the
# same directory. This is not the case for Nix.
postInstall = ''
- echo "gtk-2.0" > $out/${python2.sitePackages}/${name}.pth
+ echo "gtk-2.0" > $out/${python2.sitePackages}/gnome-python-${version}.pth
'';
meta = with lib; {
diff --git a/pkgs/desktops/gnome-2/desktop/scrollkeeper/default.nix b/pkgs/desktops/gnome-2/desktop/scrollkeeper/default.nix
index 258789140c8d..521800b4aa07 100644
--- a/pkgs/desktops/gnome-2/desktop/scrollkeeper/default.nix
+++ b/pkgs/desktops/gnome-2/desktop/scrollkeeper/default.nix
@@ -1,9 +1,11 @@
-{stdenv, fetchurl, pkg-config, perlPackages, libxml2, libxslt, docbook_xml_dtd_42, automake, gettext}:
+{ lib, stdenv, fetchurl, pkg-config, perlPackages, libxml2, libxslt, docbook_xml_dtd_42, automake, gettext }:
+
+stdenv.mkDerivation rec {
+ pname = "scrollkeeper";
+ version = "0.3.14";
-stdenv.mkDerivation {
- name = "scrollkeeper-0.3.14";
src = fetchurl {
- url = "mirror://gnome/sources/scrollkeeper/0.3/scrollkeeper-0.3.14.tar.bz2";
+ url = "mirror://gnome/sources/scrollkeeper/${lib.versions.majorMinor version}/scrollkeeper-${version}.tar.bz2";
sha256 = "08n1xgj1f53zahwm0wpn3jid3rfbhi3iwby0ilaaldnid5qriqgc";
};
diff --git a/pkgs/desktops/gnome-2/platform/ORBit2/default.nix b/pkgs/desktops/gnome-2/platform/ORBit2/default.nix
index bf5ae4ebbb1a..a45095ba4978 100644
--- a/pkgs/desktops/gnome-2/platform/ORBit2/default.nix
+++ b/pkgs/desktops/gnome-2/platform/ORBit2/default.nix
@@ -1,11 +1,11 @@
{ lib, stdenv, fetchurl, pkg-config, glib, libIDL, libintl }:
stdenv.mkDerivation rec {
- name = "ORBit2-${minVer}.19";
- minVer = "2.14";
+ pname = "ORBit2";
+ version = "2.14.19";
src = fetchurl {
- url = "mirror://gnome/sources/ORBit2/${minVer}/${name}.tar.bz2";
+ url = "mirror://gnome/sources/ORBit2/${lib.versions.majorMinor version}/ORBit2-${version}.tar.bz2";
sha256 = "0l3mhpyym9m5iz09fz0rgiqxl2ym6kpkwpsp1xrr4aa80nlh1jam";
};
diff --git a/pkgs/desktops/gnome-2/platform/gnome-common/default.nix b/pkgs/desktops/gnome-2/platform/gnome-common/default.nix
index 54a2bd526a94..eba913c80c2d 100644
--- a/pkgs/desktops/gnome-2/platform/gnome-common/default.nix
+++ b/pkgs/desktops/gnome-2/platform/gnome-common/default.nix
@@ -1,11 +1,11 @@
-{ stdenv, fetchurl, which }:
+{ lib, stdenv, fetchurl, which }:
stdenv.mkDerivation rec {
- name = "gnome-common-${minVer}.0";
- minVer = "2.34";
+ pname = "gnome-common";
+ version = "2.34.0";
src = fetchurl {
- url = "mirror://gnome/sources/gnome-common/${minVer}/${name}.tar.bz2";
+ url = "mirror://gnome/sources/gnome-common/${lib.versions.majorMinor version}/gnome-common-${version}.tar.bz2";
sha256 = "1pz13mpp09q5s3bikm8ml92s1g0scihsm4iipqv1ql3mp6d4z73s";
};
diff --git a/pkgs/desktops/gnome-2/platform/gnome-mime-data/default.nix b/pkgs/desktops/gnome-2/platform/gnome-mime-data/default.nix
index d5af0e362b43..1604dbe0cf08 100644
--- a/pkgs/desktops/gnome-2/platform/gnome-mime-data/default.nix
+++ b/pkgs/desktops/gnome-2/platform/gnome-mime-data/default.nix
@@ -1,9 +1,10 @@
-{stdenv, fetchurl, intltool}:
+{ lib, stdenv, fetchurl, intltool }:
-stdenv.mkDerivation {
- name = "gnome-mime-data-2.18.0";
+stdenv.mkDerivation rec {
+ pname = "gnome-mime-data";
+ version = "2.18.0";
src = fetchurl {
- url = "mirror://gnome/sources/gnome-mime-data/2.18/gnome-mime-data-2.18.0.tar.bz2";
+ url = "mirror://gnome/sources/gnome-mime-data/${lib.versions.majorMinor version}/gnome-mime-data-${version}.tar.bz2";
sha256 = "1mvg8glb2a40yilmyabmb7fkbzlqd3i3d31kbkabqnq86xdnn69p";
};
nativeBuildInputs = [ intltool ];
diff --git a/pkgs/desktops/gnome-2/platform/gnome-vfs/default.nix b/pkgs/desktops/gnome-2/platform/gnome-vfs/default.nix
index 4196cf21c274..4c9f28230c31 100644
--- a/pkgs/desktops/gnome-2/platform/gnome-vfs/default.nix
+++ b/pkgs/desktops/gnome-2/platform/gnome-vfs/default.nix
@@ -1,12 +1,12 @@
-{ stdenv, fetchurl, fetchpatch, pkg-config, libxml2, bzip2, openssl, dbus-glib
+{ lib, stdenv, fetchurl, fetchpatch, pkg-config, libxml2, bzip2, openssl, dbus-glib
, glib, gamin, cdparanoia, intltool, GConf, gnome_mime_data, avahi, acl }:
stdenv.mkDerivation rec {
- name = "gnome-vfs-${minVer}.4";
- minVer = "2.24";
+ pname = "gnome-vfs";
+ version = "2.24.4";
src = fetchurl {
- url = "mirror://gnome/sources/gnome-vfs/${minVer}/${name}.tar.bz2";
+ url = "mirror://gnome/sources/gnome-vfs/${lib.versions.majorMinor version}/gnome-vfs-${version}.tar.bz2";
sha256 = "1ajg8jb8k3snxc7rrgczlh8daxkjidmcv3zr9w809sq4p2sn9pk2";
};
diff --git a/pkgs/desktops/gnome-2/platform/gtkhtml/default.nix b/pkgs/desktops/gnome-2/platform/gtkhtml/default.nix
index ec87bafc9980..4f4e0503f819 100644
--- a/pkgs/desktops/gnome-2/platform/gtkhtml/default.nix
+++ b/pkgs/desktops/gnome-2/platform/gtkhtml/default.nix
@@ -1,11 +1,12 @@
-{ stdenv, fetchurl, pkg-config, gtk2, intltool,
+{ lib, stdenv, fetchurl, pkg-config, gtk2, intltool,
GConf, enchant, isocodes, gnome-icon-theme }:
stdenv.mkDerivation rec {
- name = "gtkhtml-3.32.2";
+ pname = "gtkhtml";
+ version = "3.32.2";
src = fetchurl {
- url = "mirror://gnome/sources/gtkhtml/3.32/${name}.tar.bz2";
+ url = "mirror://gnome/sources/gtkhtml/${lib.versions.majorMinor version}/gtkhtml-${version}.tar.bz2";
sha256 = "17z3jwvpn8waz7bhwrk7a6vs9pad6sqmlxxcqwvxxq89ywy0ail7";
};
diff --git a/pkgs/desktops/gnome-2/platform/libIDL/default.nix b/pkgs/desktops/gnome-2/platform/libIDL/default.nix
index 4e9376d5c824..61b21ba88c01 100644
--- a/pkgs/desktops/gnome-2/platform/libIDL/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libIDL/default.nix
@@ -1,11 +1,11 @@
-{stdenv, fetchurl, flex, bison, pkg-config, glib, gettext}:
+{ lib, stdenv, fetchurl, flex, bison, pkg-config, glib, gettext }:
stdenv.mkDerivation rec {
- name = "libIDL-${minVer}.14";
- minVer = "0.8";
+ pname = "libIDL";
+ version = "0.8.14";
src = fetchurl {
- url = "mirror://gnome/sources/libIDL/${minVer}/${name}.tar.bz2";
+ url = "mirror://gnome/sources/libIDL/${lib.versions.majorMinor version}/libIDL-${version}.tar.bz2";
sha256 = "08129my8s9fbrk0vqvnmx6ph4nid744g5vbwphzkaik51664vln5";
};
diff --git a/pkgs/desktops/gnome-2/platform/libart_lgpl/default.nix b/pkgs/desktops/gnome-2/platform/libart_lgpl/default.nix
index 7b1ccb97dc4b..80ea3d02d939 100644
--- a/pkgs/desktops/gnome-2/platform/libart_lgpl/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libart_lgpl/default.nix
@@ -1,9 +1,10 @@
-{stdenv, fetchurl}:
+{ lib, stdenv, fetchurl }:
stdenv.mkDerivation rec {
- name = "libart_lgpl-2.3.21";
+ pname = "libart_lgpl";
+ version = "2.3.21";
src = fetchurl {
- url = "mirror://gnome/sources/libart_lgpl/2.3/${name}.tar.bz2";
+ url = "mirror://gnome/sources/libart_lgpl/${lib.versions.majorMinor version}/libart_lgpl-${version}.tar.bz2";
sha256 = "1yknfkyzgz9s616is0l9gp5aray0f2ry4dw533jgzj8gq5s1xhgx";
};
}
diff --git a/pkgs/desktops/gnome-2/platform/libbonobo/default.nix b/pkgs/desktops/gnome-2/platform/libbonobo/default.nix
index 8d991d743bec..e928052a4764 100644
--- a/pkgs/desktops/gnome-2/platform/libbonobo/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libbonobo/default.nix
@@ -1,12 +1,12 @@
-{ stdenv, fetchurl, flex, bison, pkg-config, glib, libxml2, popt
+{ lib, stdenv, fetchurl, flex, bison, pkg-config, glib, libxml2, popt
, intltool, ORBit2, procps }:
stdenv.mkDerivation rec {
- name = "libbonobo-${minVer}.1";
- minVer = "2.32";
+ pname = "libbonobo";
+ version = "2.32.1";
src = fetchurl {
- url = "mirror://gnome/sources/libbonobo/${minVer}/${name}.tar.bz2";
+ url = "mirror://gnome/sources/libbonobo/${lib.versions.majorMinor version}/libbonobo-${version}.tar.bz2";
sha256 = "0swp4kk6x7hy1rvd1f9jba31lvfc6qvafkvbpg9h0r34fzrd8q4i";
};
diff --git a/pkgs/desktops/gnome-2/platform/libbonoboui/default.nix b/pkgs/desktops/gnome-2/platform/libbonoboui/default.nix
index 4f9176acf103..36ab293f5f12 100644
--- a/pkgs/desktops/gnome-2/platform/libbonoboui/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libbonoboui/default.nix
@@ -1,12 +1,12 @@
-{ stdenv, fetchurl, bison, pkg-config, popt, libxml2, gtk2, libtool
+{ lib, stdenv, fetchurl, bison, pkg-config, popt, libxml2, gtk2, libtool
, intltool, libbonobo, GConf, libgnomecanvas, libgnome, libglade }:
stdenv.mkDerivation rec {
- name = "libbonoboui-${minVer}.5";
- minVer = "2.24";
+ pname = "libbonoboui";
+ version = "2.24.5";
src = fetchurl {
- url = "mirror://gnome/sources/libbonoboui/${minVer}/${name}.tar.bz2";
+ url = "mirror://gnome/sources/libbonoboui/${lib.versions.majorMinor version}/libbonoboui-${version}.tar.bz2";
sha256 = "1kbgqh7bw0fdx4f1a1aqwpff7gp5mwhbaz60c6c98bc4djng5dgs";
};
diff --git a/pkgs/desktops/gnome-2/platform/libglade/default.nix b/pkgs/desktops/gnome-2/platform/libglade/default.nix
index 3eb7b533f09e..3ed162cd8d5e 100644
--- a/pkgs/desktops/gnome-2/platform/libglade/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libglade/default.nix
@@ -2,11 +2,12 @@
assert withLibgladeConvert -> python2 != null;
-stdenv.mkDerivation {
- name = "libglade-2.6.4";
+stdenv.mkDerivation rec {
+ pname = "libglade";
+ version = "2.6.4";
src = fetchurl {
- url = "mirror://gnome/sources/libglade/2.6/libglade-2.6.4.tar.bz2";
+ url = "mirror://gnome/sources/libglade/${lib.versions.majorMinor version}/libglade-${version}.tar.bz2";
sha256 = "1v2x2s04jry4gpabws92i0wq2ghd47yr5n9nhgnkd7c38xv1wdk4";
};
diff --git a/pkgs/desktops/gnome-2/platform/libgnome/default.nix b/pkgs/desktops/gnome-2/platform/libgnome/default.nix
index ee477cb63c1b..2c70338a9005 100644
--- a/pkgs/desktops/gnome-2/platform/libgnome/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libgnome/default.nix
@@ -1,13 +1,13 @@
-{ stdenv, fetchurl, pkg-config, glib, popt, zlib, libcanberra-gtk2
+{ lib, stdenv, fetchurl, pkg-config, glib, popt, zlib, libcanberra-gtk2
, intltool, libbonobo, GConf, gnome_vfs, libtool, libogg
}:
stdenv.mkDerivation rec {
- name = "libgnome-${minVer}.1";
- minVer = "2.32";
+ pname = "libgnome";
+ version = "2.32.1";
src = fetchurl {
- url = "mirror://gnome/sources/libgnome/${minVer}/${name}.tar.bz2";
+ url = "mirror://gnome/sources/libgnome/${lib.versions.majorMinor version}/libgnome-${version}.tar.bz2";
sha256 = "197pnq8y0knqjhm2fg4j6hbqqm3qfzfnd0irhwxpk1b4hqb3kimj";
};
diff --git a/pkgs/desktops/gnome-2/platform/libgnomecanvas/default.nix b/pkgs/desktops/gnome-2/platform/libgnomecanvas/default.nix
index eb40c5ec0b5b..b856442290a4 100644
--- a/pkgs/desktops/gnome-2/platform/libgnomecanvas/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libgnomecanvas/default.nix
@@ -1,11 +1,11 @@
-{ stdenv, fetchurl, pkg-config, gtk2, intltool, libart_lgpl, libglade }:
+{ lib, stdenv, fetchurl, pkg-config, gtk2, intltool, libart_lgpl, libglade }:
stdenv.mkDerivation rec {
- name = "libgnomecanvas-${minVer}.3";
- minVer = "2.30";
+ pname = "libgnomecanvas";
+ version = "2.30.3";
src = fetchurl {
- url = "mirror://gnome/sources/libgnomecanvas/${minVer}/${name}.tar.bz2";
+ url = "mirror://gnome/sources/libgnomecanvas/${lib.versions.majorMinor version}/libgnomecanvas-${version}.tar.bz2";
sha256 = "0h6xvswbqspdifnyh5pm2pqq55yp3kn6yrswq7ay9z49hkh7i6w5";
};
diff --git a/pkgs/desktops/gnome-2/platform/libgnomecanvasmm/default.nix b/pkgs/desktops/gnome-2/platform/libgnomecanvasmm/default.nix
index 2811a138cb63..9cc2d169b7c3 100644
--- a/pkgs/desktops/gnome-2/platform/libgnomecanvasmm/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libgnomecanvasmm/default.nix
@@ -1,10 +1,11 @@
-{ stdenv, fetchurl, pkg-config, libgnomecanvas, gtkmm2 }:
+{ lib, stdenv, fetchurl, pkg-config, libgnomecanvas, gtkmm2 }:
-stdenv.mkDerivation {
- name = "libgnomecanvasmm-2.26.0";
+stdenv.mkDerivation rec {
+ pname = "libgnomecanvasmm";
+ version = "2.26.0";
src = fetchurl {
- url = "mirror://gnome/sources/libgnomecanvasmm/2.26/libgnomecanvasmm-2.26.0.tar.bz2";
+ url = "mirror://gnome/sources/libgnomecanvasmm/${lib.versions.majorMinor version}/libgnomecanvasmm-${version}.tar.bz2";
sha256 = "996577f97f459a574919e15ba7fee6af8cda38a87a98289e9a4f54752d83e918";
};
diff --git a/pkgs/desktops/gnome-2/platform/libgnomecups/default.nix b/pkgs/desktops/gnome-2/platform/libgnomecups/default.nix
index 7e33ee91285f..42de8c2471a3 100644
--- a/pkgs/desktops/gnome-2/platform/libgnomecups/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libgnomecups/default.nix
@@ -1,10 +1,11 @@
-{ stdenv, fetchurl, pkg-config, gtk2, gettext, libxml2, intltool, libart_lgpl }:
+{ lib, stdenv, fetchurl, pkg-config, gtk2, gettext, libxml2, intltool, libart_lgpl }:
stdenv.mkDerivation rec {
- name = "libgnomecups-0.2.3";
+ pname = "libgnomecups";
+ version = "0.2.3";
src = fetchurl {
- url = "mirror://gnome/sources/libgnomecups/0.2/${name}.tar.bz2";
+ url = "mirror://gnome/sources/libgnomecups/${lib.versions.majorMinor version}/libgnomecups-${version}.tar.bz2";
sha256 = "0a8xdaxzz2wc0n1fjcav65093gixzyac3948l8cxx1mk884yhc71";
};
diff --git a/pkgs/desktops/gnome-2/platform/libgnomeprint/default.nix b/pkgs/desktops/gnome-2/platform/libgnomeprint/default.nix
index b67be2b7f5b2..bb2e435f422d 100644
--- a/pkgs/desktops/gnome-2/platform/libgnomeprint/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libgnomeprint/default.nix
@@ -2,10 +2,11 @@
, libgnomecups, bison, flex }:
stdenv.mkDerivation rec {
- name = "libgnomeprint-2.18.8";
+ pname = "libgnomeprint";
+ version = "2.18.8";
src = fetchurl {
- url = "mirror://gnome/sources/libgnomeprint/2.18/${name}.tar.bz2";
+ url = "mirror://gnome/sources/libgnomeprint/${lib.versions.majorMinor version}/libgnomeprint-${version}.tar.bz2";
sha256 = "1034ec8651051f84d2424e7a1da61c530422cc20ce5b2d9e107e1e46778d9691";
};
diff --git a/pkgs/desktops/gnome-2/platform/libgnomeprintui/default.nix b/pkgs/desktops/gnome-2/platform/libgnomeprintui/default.nix
index 80d2c2050afe..a95ee70bca10 100644
--- a/pkgs/desktops/gnome-2/platform/libgnomeprintui/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libgnomeprintui/default.nix
@@ -1,10 +1,11 @@
-{stdenv, fetchurl, pkg-config, gtk2, gettext, intltool, libgnomecanvas, libgnomeprint, gnome-icon-theme}:
+{ lib, stdenv, fetchurl, pkg-config, gtk2, gettext, intltool, libgnomecanvas, libgnomeprint, gnome-icon-theme }:
-stdenv.mkDerivation {
- name = "libgnomeprintui-2.18.6";
+stdenv.mkDerivation rec {
+ pname = "libgnomeprintui";
+ version = "2.18.6";
src = fetchurl {
- url = "mirror://gnome/sources/libgnomeprintui/2.18/libgnomeprintui-2.18.6.tar.bz2";
+ url = "mirror://gnome/sources/libgnomeprintui/${lib.versions.majorMinor version}/libgnomeprintui-${version}.tar.bz2";
sha256 = "0spl8vinb5n6n1krnfnr61dwaxidg67h8j94z9p59k2xdsvfashm";
};
diff --git a/pkgs/desktops/gnome-2/platform/libgnomeui/default.nix b/pkgs/desktops/gnome-2/platform/libgnomeui/default.nix
index 0fa3847d9bda..0a84e0ea3ec5 100644
--- a/pkgs/desktops/gnome-2/platform/libgnomeui/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libgnomeui/default.nix
@@ -1,13 +1,13 @@
-{ stdenv, fetchurl, fetchpatch, pkg-config, libxml2, xorg, glib, pango
+{ lib, stdenv, fetchurl, fetchpatch, pkg-config, libxml2, xorg, glib, pango
, intltool, libgnome, libgnomecanvas, libbonoboui, GConf, libtool
, gnome_vfs, libgnome-keyring, libglade }:
stdenv.mkDerivation rec {
- name = "libgnomeui-${minVer}.5";
- minVer = "2.24";
+ pname = "libgnomeui";
+ version = "2.24.5";
src = fetchurl {
- url = "mirror://gnome/sources/libgnomeui/${minVer}/${name}.tar.bz2";
+ url = "mirror://gnome/sources/libgnomeui/${lib.versions.majorMinor version}/libgnomeui-${version}.tar.bz2";
sha256 = "03rwbli76crkjl6gp422wrc9lqpl174k56cp9i96b7l8jlj2yddf";
};
diff --git a/pkgs/desktops/gnome-2/platform/libgtkhtml/default.nix b/pkgs/desktops/gnome-2/platform/libgtkhtml/default.nix
index e7cf117ecdbc..9c7189c117ac 100644
--- a/pkgs/desktops/gnome-2/platform/libgtkhtml/default.nix
+++ b/pkgs/desktops/gnome-2/platform/libgtkhtml/default.nix
@@ -1,10 +1,11 @@
-{stdenv, fetchurl, pkg-config, gtk2, gettext, libxml2 }:
+{ lib, stdenv, fetchurl, pkg-config, gtk2, gettext, libxml2 }:
-stdenv.mkDerivation {
- name = "libgtkhtml-2.11.1";
+stdenv.mkDerivation rec {
+ pname = "libgtkhtml";
+ version = "2.11.1";
src = fetchurl {
- url = "mirror://gnome/sources/libgtkhtml/2.11/libgtkhtml-2.11.1.tar.bz2";
+ url = "mirror://gnome/sources/libgtkhtml/${lib.versions.majorMinor version}/libgtkhtml-${version}.tar.bz2";
sha256 = "0msajafd42545dxzyr5zqka990cjrxw2yz09ajv4zs8m1w6pm9rw";
};
diff --git a/pkgs/development/compilers/adoptopenjdk-bin/jdk-darwin-base.nix b/pkgs/development/compilers/adoptopenjdk-bin/jdk-darwin-base.nix
index ef3e4b7219e4..68d33b657c68 100644
--- a/pkgs/development/compilers/adoptopenjdk-bin/jdk-darwin-base.nix
+++ b/pkgs/development/compilers/adoptopenjdk-bin/jdk-darwin-base.nix
@@ -10,9 +10,10 @@ assert (stdenv.isDarwin && stdenv.isx86_64);
let cpuName = stdenv.hostPlatform.parsed.cpu.name;
result = stdenv.mkDerivation {
- name = if sourcePerArch.packageType == "jdk"
- then "adoptopenjdk-${sourcePerArch.vmType}-bin-${sourcePerArch.${cpuName}.version}"
- else "adoptopenjdk-${sourcePerArch.packageType}-${sourcePerArch.vmType}-bin-${sourcePerArch.${cpuName}.version}";
+ pname = if sourcePerArch.packageType == "jdk"
+ then "adoptopenjdk-${sourcePerArch.vmType}-bin"
+ else "adoptopenjdk-${sourcePerArch.packageType}-${sourcePerArch.vmType}-bin";
+ version = sourcePerArch.${cpuName}.version or (throw "unsupported CPU ${cpuName}");
src = fetchurl {
inherit (sourcePerArch.${cpuName}) url sha256;
diff --git a/pkgs/development/compilers/adoptopenjdk-bin/jdk-linux-base.nix b/pkgs/development/compilers/adoptopenjdk-bin/jdk-linux-base.nix
index 39685131edd3..6fc96b4d1825 100644
--- a/pkgs/development/compilers/adoptopenjdk-bin/jdk-linux-base.nix
+++ b/pkgs/development/compilers/adoptopenjdk-bin/jdk-linux-base.nix
@@ -33,9 +33,9 @@ let
in
let result = stdenv.mkDerivation rec {
- name = if sourcePerArch.packageType == "jdk"
- then "adoptopenjdk-${sourcePerArch.vmType}-bin-${version}"
- else "adoptopenjdk-${sourcePerArch.packageType}-${sourcePerArch.vmType}-bin-${version}";
+ pname = if sourcePerArch.packageType == "jdk"
+ then "adoptopenjdk-${sourcePerArch.vmType}-bin"
+ else "adoptopenjdk-${sourcePerArch.packageType}-${sourcePerArch.vmType}-bin";
version = sourcePerArch.${cpuName}.version or (throw "unsupported CPU ${cpuName}");
diff --git a/pkgs/development/compilers/gcc/10/default.nix b/pkgs/development/compilers/gcc/10/default.nix
index a26aaf771af3..d00d428a6950 100644
--- a/pkgs/development/compilers/gcc/10/default.nix
+++ b/pkgs/development/compilers/gcc/10/default.nix
@@ -8,12 +8,7 @@
, profiledCompiler ? false
, langJit ? false
, staticCompiler ? false
-, # N.B. the defult is intentionally not from an `isStatic`. See
- # https://gcc.gnu.org/install/configure.html - this is about target
- # platform libraries not host platform ones unlike normal. But since
- # we can't rebuild those without also rebuilding the compiler itself,
- # we opt to always build everything unlike our usual policy.
- enableShared ? true
+, enableShared ? !stdenv.targetPlatform.isStatic
, enableLTO ? !stdenv.hostPlatform.isStatic
, texinfo ? null
, perl ? null # optional, for texi2pod (then pod2man)
@@ -61,8 +56,8 @@ let majorVersion = "10";
inherit (stdenv) buildPlatform hostPlatform targetPlatform;
- patches =
- optional (targetPlatform != hostPlatform) ../libstdc++-target.patch
+ patches = [ ./gcc10-asan-glibc-2.34.patch ]
+ ++ optional (targetPlatform != hostPlatform) ../libstdc++-target.patch
++ optional noSysDirs ../no-sys-dirs.patch
++ optional (noSysDirs && hostPlatform.isRiscV) ../no-sys-dirs-riscv.patch
/* ++ optional (hostPlatform != buildPlatform) (fetchpatch { # XXX: Refine when this should be applied
@@ -266,7 +261,7 @@ stdenv.mkDerivation ({
};
enableParallelBuilding = true;
- inherit enableMultilib;
+ inherit enableMultilib enableShared;
inherit (stdenv) is64bit;
diff --git a/pkgs/development/compilers/gcc/10/gcc10-asan-glibc-2.34.patch b/pkgs/development/compilers/gcc/10/gcc10-asan-glibc-2.34.patch
new file mode 100644
index 000000000000..d6d4f41ffdf8
--- /dev/null
+++ b/pkgs/development/compilers/gcc/10/gcc10-asan-glibc-2.34.patch
@@ -0,0 +1,70 @@
+From 950bac27d63c1c2ac3a6ed867692d6a13f21feb3 Mon Sep 17 00:00:00 2001
+From: Jakub Jelinek
+Date: Sat, 17 Apr 2021 11:27:14 +0200
+Subject: [PATCH] sanitizer: Fix asan against glibc 2.34 [PR100114]
+
+As mentioned in the PR, SIGSTKSZ is no longer a compile time constant in
+glibc 2.34 and later, so
+static const uptr kAltStackSize = SIGSTKSZ * 4;
+needs dynamic initialization, but is used by a function called indirectly
+from .preinit_array and therefore before the variable is constructed.
+This results in using 0 size instead and all asan instrumented programs
+die with:
+==91==ERROR: AddressSanitizer failed to allocate 0x0 (0) bytes of SetAlternateSignalStack (error code: 22)
+
+Here is a cherry-pick from upstream to fix this.
+
+2021-04-17 Jakub Jelinek
+
+ PR sanitizer/100114
+ * sanitizer_common/sanitizer_posix_libcdep.cpp: Cherry-pick
+ llvm-project revisions 82150606fb11d28813ae6da1101f5bda638165fe
+ and b93629dd335ffee2fc4b9b619bf86c3f9e6b0023.
+
+(cherry picked from commit d9f462fb372fb02da032cefd6b091d7582c425ae)
+---
+ .../sanitizer_common/sanitizer_posix_libcdep.cpp | 13 ++++++++-----
+ 1 file changed, 8 insertions(+), 5 deletions(-)
+
+diff --git a/libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cpp b/libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cpp
+index 304b3a01a08..ac88fbe074e 100644
+--- a/libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cpp
++++ b/libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cpp
+@@ -169,7 +169,11 @@ bool SupportsColoredOutput(fd_t fd) {
+
+ #if !SANITIZER_GO
+ // TODO(glider): different tools may require different altstack size.
+-static const uptr kAltStackSize = SIGSTKSZ * 4; // SIGSTKSZ is not enough.
++static uptr GetAltStackSize() {
++ // SIGSTKSZ is not enough.
++ static const uptr kAltStackSize = SIGSTKSZ * 4;
++ return kAltStackSize;
++}
+
+ void SetAlternateSignalStack() {
+ stack_t altstack, oldstack;
+@@ -180,10 +184,9 @@ void SetAlternateSignalStack() {
+ // TODO(glider): the mapped stack should have the MAP_STACK flag in the
+ // future. It is not required by man 2 sigaltstack now (they're using
+ // malloc()).
+- void* base = MmapOrDie(kAltStackSize, __func__);
+- altstack.ss_sp = (char*) base;
++ altstack.ss_size = GetAltStackSize();
++ altstack.ss_sp = (char *)MmapOrDie(altstack.ss_size, __func__);
+ altstack.ss_flags = 0;
+- altstack.ss_size = kAltStackSize;
+ CHECK_EQ(0, sigaltstack(&altstack, nullptr));
+ }
+
+@@ -191,7 +194,7 @@ void UnsetAlternateSignalStack() {
+ stack_t altstack, oldstack;
+ altstack.ss_sp = nullptr;
+ altstack.ss_flags = SS_DISABLE;
+- altstack.ss_size = kAltStackSize; // Some sane value required on Darwin.
++ altstack.ss_size = GetAltStackSize(); // Some sane value required on Darwin.
+ CHECK_EQ(0, sigaltstack(&altstack, &oldstack));
+ UnmapOrDie(oldstack.ss_sp, oldstack.ss_size);
+ }
+--
+2.27.0
+
diff --git a/pkgs/development/compilers/gcc/11/default.nix b/pkgs/development/compilers/gcc/11/default.nix
index b78ca339fb85..79e682e88c4e 100644
--- a/pkgs/development/compilers/gcc/11/default.nix
+++ b/pkgs/development/compilers/gcc/11/default.nix
@@ -8,12 +8,7 @@
, profiledCompiler ? false
, langJit ? false
, staticCompiler ? false
-, # N.B. the defult is intentionally not from an `isStatic`. See
- # https://gcc.gnu.org/install/configure.html - this is about target
- # platform libraries not host platform ones unlike normal. But since
- # we can't rebuild those without also rebuilding the compiler itself,
- # we opt to always build everything unlike our usual policy.
- enableShared ? true
+, enableShared ? !stdenv.targetPlatform.isStatic
, enableLTO ? !stdenv.hostPlatform.isStatic
, texinfo ? null
, perl ? null # optional, for texi2pod (then pod2man)
@@ -269,7 +264,7 @@ stdenv.mkDerivation ({
};
enableParallelBuilding = true;
- inherit enableMultilib;
+ inherit enableShared enableMultilib;
inherit (stdenv) is64bit;
diff --git a/pkgs/development/compilers/gcc/4.8/default.nix b/pkgs/development/compilers/gcc/4.8/default.nix
index bc7868cc4606..ef1a04635f9a 100644
--- a/pkgs/development/compilers/gcc/4.8/default.nix
+++ b/pkgs/development/compilers/gcc/4.8/default.nix
@@ -8,12 +8,7 @@
, profiledCompiler ? false
, langJit ? false
, staticCompiler ? false
-, # N.B. the defult is intentionally not from an `isStatic`. See
- # https://gcc.gnu.org/install/configure.html - this is about target
- # platform libraries not host platform ones unlike normal. But since
- # we can't rebuild those without also rebuilding the compiler itself,
- # we opt to always build everything unlike our usual policy.
- enableShared ? true
+, enableShared ? !stdenv.targetPlatform.isStatic
, enableLTO ? !stdenv.hostPlatform.isStatic
, texinfo ? null
, perl ? null # optional, for texi2pod (then pod2man); required for Java
@@ -295,7 +290,7 @@ stdenv.mkDerivation ({
};
enableParallelBuilding = true;
- inherit enableMultilib;
+ inherit enableShared enableMultilib;
inherit (stdenv) is64bit;
diff --git a/pkgs/development/compilers/gcc/4.9/default.nix b/pkgs/development/compilers/gcc/4.9/default.nix
index bb1a3dd7d636..289df07d0312 100644
--- a/pkgs/development/compilers/gcc/4.9/default.nix
+++ b/pkgs/development/compilers/gcc/4.9/default.nix
@@ -8,12 +8,7 @@
, profiledCompiler ? false
, langJit ? false
, staticCompiler ? false
-, # N.B. the defult is intentionally not from an `isStatic`. See
- # https://gcc.gnu.org/install/configure.html - this is about target
- # platform libraries not host platform ones unlike normal. But since
- # we can't rebuild those without also rebuilding the compiler itself,
- # we opt to always build everything unlike our usual policy.
- enableShared ? true
+, enableShared ? !stdenv.targetPlatform.isStatic
, enableLTO ? !stdenv.hostPlatform.isStatic
, texinfo ? null
, perl ? null # optional, for texi2pod (then pod2man); required for Java
@@ -311,7 +306,7 @@ stdenv.mkDerivation ({
};
enableParallelBuilding = true;
- inherit enableMultilib;
+ inherit enableShared enableMultilib;
inherit (stdenv) is64bit;
diff --git a/pkgs/development/compilers/gcc/6/default.nix b/pkgs/development/compilers/gcc/6/default.nix
index 7548ec56c759..a577c61bdf58 100644
--- a/pkgs/development/compilers/gcc/6/default.nix
+++ b/pkgs/development/compilers/gcc/6/default.nix
@@ -9,12 +9,7 @@
, profiledCompiler ? false
, langJit ? false
, staticCompiler ? false
-, # N.B. the defult is intentionally not from an `isStatic`. See
- # https://gcc.gnu.org/install/configure.html - this is about target
- # platform libraries not host platform ones unlike normal. But since
- # we can't rebuild those without also rebuilding the compiler itself,
- # we opt to always build everything unlike our usual policy.
- enableShared ? true
+, enableShared ? !stdenv.targetPlatform.isStatic
, enableLTO ? !stdenv.hostPlatform.isStatic
, texinfo ? null
, flex
@@ -79,6 +74,7 @@ let majorVersion = "6";
] ++ optional (targetPlatform != hostPlatform) ../libstdc++-target.patch
++ optional noSysDirs ../no-sys-dirs.patch
++ optional langAda ../gnat-cflags.patch
+ ++ optional langAda ./gnat-glibc234.patch
++ optional langFortran ../gfortran-driving.patch
++ optional (targetPlatform.libc == "musl") ../libgomp-dont-force-initial-exec.patch
@@ -325,7 +321,7 @@ stdenv.mkDerivation ({
};
enableParallelBuilding = true;
- inherit enableMultilib;
+ inherit enableShared enableMultilib;
inherit (stdenv) is64bit;
diff --git a/pkgs/development/compilers/gcc/6/gnat-glibc234.patch b/pkgs/development/compilers/gcc/6/gnat-glibc234.patch
new file mode 100644
index 000000000000..2d29cd7fa77f
--- /dev/null
+++ b/pkgs/development/compilers/gcc/6/gnat-glibc234.patch
@@ -0,0 +1,30 @@
+Fix build with glibc 2.34. Adapted from:
+https://github.com/gcc-mirror/gcc/commit/331763de7d4850702a0f67298f36017c73cdb103
+--- a/gcc/ada/init.c
++++ b/gcc/ada/init.c
+@@ -579,12 +579,8 @@
+
+ #ifndef __ia64__
+ #define HAVE_GNAT_ALTERNATE_STACK 1
+-/* This must be in keeping with System.OS_Interface.Alternate_Stack_Size.
+- It must be larger than MINSIGSTKSZ and hopefully near 2 * SIGSTKSZ. */
+-# if 16 * 1024 < MINSIGSTKSZ
+-# error "__gnat_alternate_stack too small"
+-# endif
+-char __gnat_alternate_stack[16 * 1024];
++/* This must be in keeping with System.OS_Interface.Alternate_Stack_Size. */
++char __gnat_alternate_stack[32 * 1024];
+ #endif
+
+ #ifdef __XENO__
+--- a/gcc/ada/s-osinte-linux.ads
++++ b/gcc/ada/s-osinte-linux.ads
+@@ -328,7 +328,7 @@
+ oss : access stack_t) return int;
+ pragma Import (C, sigaltstack, "sigaltstack");
+
+- Alternate_Stack_Size : constant := 16 * 1024;
++ Alternate_Stack_Size : constant := 32 * 1024;
+ -- This must be in keeping with init.c:__gnat_alternate_stack
+
+ Alternate_Stack : aliased char_array (1 .. Alternate_Stack_Size);
diff --git a/pkgs/development/compilers/gcc/7/default.nix b/pkgs/development/compilers/gcc/7/default.nix
index dfac97104eb6..937ccbb35103 100644
--- a/pkgs/development/compilers/gcc/7/default.nix
+++ b/pkgs/development/compilers/gcc/7/default.nix
@@ -7,12 +7,7 @@
, profiledCompiler ? false
, langJit ? false
, staticCompiler ? false
-, # N.B. the defult is intentionally not from an `isStatic`. See
- # https://gcc.gnu.org/install/configure.html - this is about target
- # platform libraries not host platform ones unlike normal. But since
- # we can't rebuild those without also rebuilding the compiler itself,
- # we opt to always build everything unlike our usual policy.
- enableShared ? true
+, enableShared ? !stdenv.targetPlatform.isStatic
, enableLTO ? !stdenv.hostPlatform.isStatic
, texinfo ? null
, perl ? null # optional, for texi2pod (then pod2man)
@@ -63,6 +58,9 @@ let majorVersion = "7";
./riscv-pthread-reentrant.patch
# https://gcc.gnu.org/ml/gcc-patches/2018-03/msg00297.html
./riscv-no-relax.patch
+ # Fix for asan w/glibc-2.34. Although there's no upstream backport to v7,
+ # the patch from gcc 8 seems to work perfectly fine.
+ ./gcc8-asan-glibc-2.34.patch
./0001-Fix-build-for-glibc-2.31.patch
]
@@ -277,7 +275,7 @@ stdenv.mkDerivation ({
};
enableParallelBuilding = true;
- inherit enableMultilib;
+ inherit enableShared enableMultilib;
inherit (stdenv) is64bit;
diff --git a/pkgs/development/compilers/gcc/7/gcc8-asan-glibc-2.34.patch b/pkgs/development/compilers/gcc/7/gcc8-asan-glibc-2.34.patch
new file mode 100644
index 000000000000..5645b97c1d89
--- /dev/null
+++ b/pkgs/development/compilers/gcc/7/gcc8-asan-glibc-2.34.patch
@@ -0,0 +1,70 @@
+From ef195a39d0d3b929cc676302d074b42c25460601 Mon Sep 17 00:00:00 2001
+From: Jakub Jelinek
+Date: Sat, 17 Apr 2021 11:27:14 +0200
+Subject: [PATCH] sanitizer: Fix asan against glibc 2.34 [PR100114]
+
+As mentioned in the PR, SIGSTKSZ is no longer a compile time constant in
+glibc 2.34 and later, so
+static const uptr kAltStackSize = SIGSTKSZ * 4;
+needs dynamic initialization, but is used by a function called indirectly
+from .preinit_array and therefore before the variable is constructed.
+This results in using 0 size instead and all asan instrumented programs
+die with:
+==91==ERROR: AddressSanitizer failed to allocate 0x0 (0) bytes of SetAlternateSignalStack (error code: 22)
+
+Here is a cherry-pick from upstream to fix this.
+
+2021-04-17 Jakub Jelinek
+
+ PR sanitizer/100114
+ * sanitizer_common/sanitizer_posix_libcdep.cc: Cherry-pick
+ llvm-project revisions 82150606fb11d28813ae6da1101f5bda638165fe
+ and b93629dd335ffee2fc4b9b619bf86c3f9e6b0023.
+
+(cherry picked from commit 950bac27d63c1c2ac3a6ed867692d6a13f21feb3)
+---
+ .../sanitizer_common/sanitizer_posix_libcdep.cc | 13 ++++++++-----
+ 1 file changed, 8 insertions(+), 5 deletions(-)
+
+diff --git a/libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cc b/libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cc
+index 1a37118c299..066079b3954 100644
+--- a/libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cc
++++ b/libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cc
+@@ -159,7 +159,11 @@ bool SupportsColoredOutput(fd_t fd) {
+
+ #if !SANITIZER_GO
+ // TODO(glider): different tools may require different altstack size.
+-static const uptr kAltStackSize = SIGSTKSZ * 4; // SIGSTKSZ is not enough.
++static uptr GetAltStackSize() {
++ // SIGSTKSZ is not enough.
++ static const uptr kAltStackSize = SIGSTKSZ * 4;
++ return kAltStackSize;
++}
+
+ void SetAlternateSignalStack() {
+ stack_t altstack, oldstack;
+@@ -170,10 +174,9 @@ void SetAlternateSignalStack() {
+ // TODO(glider): the mapped stack should have the MAP_STACK flag in the
+ // future. It is not required by man 2 sigaltstack now (they're using
+ // malloc()).
+- void* base = MmapOrDie(kAltStackSize, __func__);
+- altstack.ss_sp = (char*) base;
++ altstack.ss_size = GetAltStackSize();
++ altstack.ss_sp = (char *)MmapOrDie(altstack.ss_size, __func__);
+ altstack.ss_flags = 0;
+- altstack.ss_size = kAltStackSize;
+ CHECK_EQ(0, sigaltstack(&altstack, nullptr));
+ }
+
+@@ -181,7 +184,7 @@ void UnsetAlternateSignalStack() {
+ stack_t altstack, oldstack;
+ altstack.ss_sp = nullptr;
+ altstack.ss_flags = SS_DISABLE;
+- altstack.ss_size = kAltStackSize; // Some sane value required on Darwin.
++ altstack.ss_size = GetAltStackSize(); // Some sane value required on Darwin.
+ CHECK_EQ(0, sigaltstack(&altstack, &oldstack));
+ UnmapOrDie(oldstack.ss_sp, oldstack.ss_size);
+ }
+--
+2.27.0
+
diff --git a/pkgs/development/compilers/gcc/8/default.nix b/pkgs/development/compilers/gcc/8/default.nix
index 609dfa722a65..e98197836955 100644
--- a/pkgs/development/compilers/gcc/8/default.nix
+++ b/pkgs/development/compilers/gcc/8/default.nix
@@ -7,12 +7,7 @@
, profiledCompiler ? false
, langJit ? false
, staticCompiler ? false
-, # N.B. the defult is intentionally not from an `isStatic`. See
- # https://gcc.gnu.org/install/configure.html - this is about target
- # platform libraries not host platform ones unlike normal. But since
- # we can't rebuild those without also rebuilding the compiler itself,
- # we opt to always build everything unlike our usual policy.
- enableShared ? true
+, enableShared ? !stdenv.targetPlatform.isStatic
, enableLTO ? !stdenv.hostPlatform.isStatic
, texinfo ? null
, perl ? null # optional, for texi2pod (then pod2man)
@@ -259,7 +254,7 @@ stdenv.mkDerivation ({
};
enableParallelBuilding = true;
- inherit enableMultilib;
+ inherit enableShared enableMultilib;
inherit (stdenv) is64bit;
diff --git a/pkgs/development/compilers/gcc/9/default.nix b/pkgs/development/compilers/gcc/9/default.nix
index ea4296826661..dd1a53e172a4 100644
--- a/pkgs/development/compilers/gcc/9/default.nix
+++ b/pkgs/development/compilers/gcc/9/default.nix
@@ -9,12 +9,7 @@
, profiledCompiler ? false
, langJit ? false
, staticCompiler ? false
-, # N.B. the defult is intentionally not from an `isStatic`. See
- # https://gcc.gnu.org/install/configure.html - this is about target
- # platform libraries not host platform ones unlike normal. But since
- # we can't rebuild those without also rebuilding the compiler itself,
- # we opt to always build everything unlike our usual policy.
- enableShared ? true
+, enableShared ? !stdenv.targetPlatform.isStatic
, enableLTO ? !stdenv.hostPlatform.isStatic
, texinfo ? null
, perl ? null # optional, for texi2pod (then pod2man)
@@ -78,7 +73,7 @@ let majorVersion = "9";
# https://gcc.gnu.org/bugzilla/show_bug.cgi?id=96796
#
# This patch can most likely be removed by a post 9.3.0-release.
- [ ./avoid-cycling-subreg-reloads.patch ]
+ [ ./avoid-cycling-subreg-reloads.patch ./gcc9-asan-glibc-2.34.patch ]
++ optional (targetPlatform != hostPlatform) ../libstdc++-target.patch
++ optional targetPlatform.isNetBSD ../libstdc++-netbsd-ctypes.patch
++ optional noSysDirs ../no-sys-dirs.patch
@@ -88,6 +83,11 @@ let majorVersion = "9";
sha256 = ""; # TODO: uncomment and check hash when available.
}) */
++ optional langAda ../gnat-cflags.patch
+ ++ optional langAda (fetchpatch {
+ name = "gnat-glibc-234.diff";
+ url = "https://github.com/gcc-mirror/gcc/commit/331763de7d4850702a0f67298f36017c73cdb103.diff";
+ sha256 = "eS4B7vJasnv2N+5v5yB8/iDpKPX8CJDAy2xabWWj+aU=";
+ })
++ optional langD ../libphobos.patch
++ optional langFortran ../gfortran-driving.patch
++ optional (targetPlatform.libc == "musl" && targetPlatform.isPower) ../ppc-musl.patch
@@ -285,7 +285,7 @@ stdenv.mkDerivation ({
};
enableParallelBuilding = true;
- inherit enableMultilib;
+ inherit enableShared enableMultilib;
inherit (stdenv) is64bit;
diff --git a/pkgs/development/compilers/gcc/9/gcc9-asan-glibc-2.34.patch b/pkgs/development/compilers/gcc/9/gcc9-asan-glibc-2.34.patch
new file mode 100644
index 000000000000..1aea1f9b18a1
--- /dev/null
+++ b/pkgs/development/compilers/gcc/9/gcc9-asan-glibc-2.34.patch
@@ -0,0 +1,70 @@
+From 3d0135bf3be416bbe2531dc763d19b749eb2b856 Mon Sep 17 00:00:00 2001
+From: Jakub Jelinek
+Date: Sat, 17 Apr 2021 11:27:14 +0200
+Subject: [PATCH] sanitizer: Fix asan against glibc 2.34 [PR100114]
+
+As mentioned in the PR, SIGSTKSZ is no longer a compile time constant in
+glibc 2.34 and later, so
+static const uptr kAltStackSize = SIGSTKSZ * 4;
+needs dynamic initialization, but is used by a function called indirectly
+from .preinit_array and therefore before the variable is constructed.
+This results in using 0 size instead and all asan instrumented programs
+die with:
+==91==ERROR: AddressSanitizer failed to allocate 0x0 (0) bytes of SetAlternateSignalStack (error code: 22)
+
+Here is a cherry-pick from upstream to fix this.
+
+2021-04-17 Jakub Jelinek
+
+ PR sanitizer/100114
+ * sanitizer_common/sanitizer_posix_libcdep.cc: Cherry-pick
+ llvm-project revisions 82150606fb11d28813ae6da1101f5bda638165fe
+ and b93629dd335ffee2fc4b9b619bf86c3f9e6b0023.
+
+(cherry picked from commit 950bac27d63c1c2ac3a6ed867692d6a13f21feb3)
+---
+ .../sanitizer_common/sanitizer_posix_libcdep.cc | 13 ++++++++-----
+ 1 file changed, 8 insertions(+), 5 deletions(-)
+
+diff --git a/libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cc b/libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cc
+index d2fd76a6d36..1917e29ced2 100644
+--- a/libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cc
++++ b/libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cc
+@@ -169,7 +169,11 @@ bool SupportsColoredOutput(fd_t fd) {
+
+ #if !SANITIZER_GO
+ // TODO(glider): different tools may require different altstack size.
+-static const uptr kAltStackSize = SIGSTKSZ * 4; // SIGSTKSZ is not enough.
++static uptr GetAltStackSize() {
++ // SIGSTKSZ is not enough.
++ static const uptr kAltStackSize = SIGSTKSZ * 4;
++ return kAltStackSize;
++}
+
+ void SetAlternateSignalStack() {
+ stack_t altstack, oldstack;
+@@ -180,10 +184,9 @@ void SetAlternateSignalStack() {
+ // TODO(glider): the mapped stack should have the MAP_STACK flag in the
+ // future. It is not required by man 2 sigaltstack now (they're using
+ // malloc()).
+- void* base = MmapOrDie(kAltStackSize, __func__);
+- altstack.ss_sp = (char*) base;
++ altstack.ss_size = GetAltStackSize();
++ altstack.ss_sp = (char *)MmapOrDie(altstack.ss_size, __func__);
+ altstack.ss_flags = 0;
+- altstack.ss_size = kAltStackSize;
+ CHECK_EQ(0, sigaltstack(&altstack, nullptr));
+ }
+
+@@ -191,7 +194,7 @@ void UnsetAlternateSignalStack() {
+ stack_t altstack, oldstack;
+ altstack.ss_sp = nullptr;
+ altstack.ss_flags = SS_DISABLE;
+- altstack.ss_size = kAltStackSize; // Some sane value required on Darwin.
++ altstack.ss_size = GetAltStackSize(); // Some sane value required on Darwin.
+ CHECK_EQ(0, sigaltstack(&altstack, &oldstack));
+ UnmapOrDie(oldstack.ss_sp, oldstack.ss_size);
+ }
+--
+2.27.0
+
diff --git a/pkgs/development/compilers/gcc/builder.sh b/pkgs/development/compilers/gcc/builder.sh
index e6d41d7b29ab..9d0514f17590 100644
--- a/pkgs/development/compilers/gcc/builder.sh
+++ b/pkgs/development/compilers/gcc/builder.sh
@@ -222,6 +222,10 @@ postInstall() {
moveToOutput "${targetConfig+$targetConfig/}lib/lib*.dll.a" "${!outputLib}"
moveToOutput "share/gcc-*/python" "${!outputLib}"
+ if [ -z "$enableShared" ]; then
+ moveToOutput "${targetConfig+$targetConfig/}lib/lib*.a" "${!outputLib}"
+ fi
+
for i in "${!outputLib}/${targetConfig}"/lib/*.{la,py}; do
substituteInPlace "$i" --replace "$out" "${!outputLib}"
done
diff --git a/pkgs/development/compilers/go/1.17.nix b/pkgs/development/compilers/go/1.17.nix
index 69537dc899e8..28d5ffdc6dff 100644
--- a/pkgs/development/compilers/go/1.17.nix
+++ b/pkgs/development/compilers/go/1.17.nix
@@ -55,11 +55,11 @@ in
stdenv.mkDerivation rec {
pname = "go";
- version = "1.17.7";
+ version = "1.17.8";
src = fetchurl {
url = "https://dl.google.com/go/go${version}.src.tar.gz";
- sha256 = "sha256-wQjNM7c7GRGgK2l3Qd896kPgGlxOCOQJ6LOg43RdK00=";
+ sha256 = "sha256-Lv/NiYFA2nmgYfN4TKT42LE9gR+yq+na0kBEQtq733o=";
};
# perl is used for testing go vet
diff --git a/pkgs/development/compilers/ocaml/4.10.nix b/pkgs/development/compilers/ocaml/4.10.nix
index 78051040b571..48d01a5a8c8d 100644
--- a/pkgs/development/compilers/ocaml/4.10.nix
+++ b/pkgs/development/compilers/ocaml/4.10.nix
@@ -3,4 +3,7 @@ import ./generic.nix {
minor_version = "10";
patch_version = "2";
sha256 = "sha256-locUYQeCgtXbAiB32JveJchfteN2YStE+MN9ToTwAOM=";
+ patches = [
+ ./glibc-2.34-for-ocaml-4.10-and-11.patch
+ ];
}
diff --git a/pkgs/development/compilers/ocaml/4.11.nix b/pkgs/development/compilers/ocaml/4.11.nix
index 3e5aefc11f1c..6a2e4f61f80e 100644
--- a/pkgs/development/compilers/ocaml/4.11.nix
+++ b/pkgs/development/compilers/ocaml/4.11.nix
@@ -3,4 +3,7 @@ import ./generic.nix {
minor_version = "11";
patch_version = "2";
sha256 = "1m3wrgkkv3f77wvcymjm0i2srxzmx62y6jln3i0a2px07ng08l9z";
+ patches = [
+ ./glibc-2.34-for-ocaml-4.10-and-11.patch
+ ];
}
diff --git a/pkgs/development/compilers/ocaml/4.12.nix b/pkgs/development/compilers/ocaml/4.12.nix
index 4be2bcf5f9d0..2066d0d5ad31 100644
--- a/pkgs/development/compilers/ocaml/4.12.nix
+++ b/pkgs/development/compilers/ocaml/4.12.nix
@@ -3,4 +3,9 @@ import ./generic.nix {
minor_version = "12";
patch_version = "1";
sha256 = "1jbjjnmqq6ymsy81x188i256bz4z5jrz1pws8g1qf59c32ganjkf";
+ patches = [
+ { url = "https://src.fedoraproject.org/rpms/ocaml/raw/129153b85109944bf0b2922949f77ef8f32b39a1/f/0004-Dynamically-allocate-the-alternate-signal-stack-1026.patch";
+ sha256 = "sha256-FdQ1HkMKHU9QvgLPUBvMdPiEa7w7IL3+1F3SLv63Gog=";
+ }
+ ];
}
diff --git a/pkgs/development/compilers/ocaml/Makefile.nixpkgs b/pkgs/development/compilers/ocaml/Makefile.nixpkgs
new file mode 100644
index 000000000000..2d6457852fc9
--- /dev/null
+++ b/pkgs/development/compilers/ocaml/Makefile.nixpkgs
@@ -0,0 +1,16 @@
+# ocaml build system does not allow for parallel building of some
+# top-level targets like 'world', 'bootstrap', 'world.opt' as
+# then spawn '$(MAKE) all' subprocesses that conflict among each
+# other. But we would still like to run each target in parallel
+# individually. This file defines such entry points.
+
+# Re-export all existing phases to make 'make install' work as is.
+include Makefile
+
+nixpkgs_world:
+ $(MAKE) world
+
+nixpkgs_world_bootstrap_world_opt:
+ $(MAKE) world
+ $(MAKE) bootstrap
+ $(MAKE) world.opt
diff --git a/pkgs/development/compilers/ocaml/generic.nix b/pkgs/development/compilers/ocaml/generic.nix
index ec52e56c1faa..0573b43f5e23 100644
--- a/pkgs/development/compilers/ocaml/generic.nix
+++ b/pkgs/development/compilers/ocaml/generic.nix
@@ -1,4 +1,4 @@
-{ minor_version, major_version, patch_version
+{ minor_version, major_version, patch_version, patches ? []
, ...}@args:
let
versionNoPatch = "${toString major_version}.${toString minor_version}";
@@ -6,7 +6,7 @@ let
safeX11 = stdenv: !(stdenv.isAarch32 || stdenv.isMips || stdenv.hostPlatform.isStatic);
in
-{ lib, stdenv, fetchurl, ncurses, buildEnv, libunwind
+{ lib, stdenv, fetchurl, ncurses, buildEnv, libunwind, fetchpatch
, libX11, xorgproto, useX11 ? safeX11 stdenv && !lib.versionAtLeast version "4.09"
, aflSupport ? false
, flambdaSupport ? false
@@ -28,21 +28,22 @@ in
let
useNativeCompilers = !stdenv.isMips;
inherit (lib) optional optionals optionalString;
- name = "ocaml${optionalString aflSupport "+afl"}${optionalString spaceTimeSupport "+spacetime"}${optionalString flambdaSupport "+flambda"}-${version}";
+ pname = "ocaml${optionalString aflSupport "+afl"}${optionalString spaceTimeSupport "+spacetime"}${optionalString flambdaSupport "+flambda"}";
in
let
x11env = buildEnv { name = "x11env"; paths = [libX11 xorgproto]; };
x11lib = x11env + "/lib";
x11inc = x11env + "/include";
+
+ fetchpatch' = x: if builtins.isAttrs x then fetchpatch x else x;
in
stdenv.mkDerivation (args // {
- inherit name;
- inherit version;
+ inherit pname version src;
- inherit src;
+ patches = map fetchpatch' patches;
strictDeps = true;
@@ -74,7 +75,18 @@ stdenv.mkDerivation (args // {
hardeningDisable = lib.optional (lib.versionAtLeast version "4.09" && stdenv.hostPlatform.isMusl) "pie"
++ lib.optionals (args ? hardeningDisable) args.hardeningDisable;
- buildFlags = [ "world" ] ++ optionals useNativeCompilers [ "bootstrap" "world.opt" ];
+ # Older versions have some race:
+ # cp: cannot stat 'boot/ocamlrun': No such file or directory
+ # make[2]: *** [Makefile:199: backup] Error 1
+ enableParallelBuilding = lib.versionAtLeast version "4.08";
+
+ # Workaround lack of parallelism support among top-level targets:
+ # we place nixpkgs-specific targets to a separate file and set
+ # sequential order among them as a single rule.
+ makefile = ./Makefile.nixpkgs;
+ buildFlags = if useNativeCompilers
+ then ["nixpkgs_world_bootstrap_world_opt"]
+ else ["nixpkgs_world"];
buildInputs = optional (!lib.versionAtLeast version "4.07") ncurses
++ optionals useX11 [ libX11 xorgproto ];
propagatedBuildInputs = optional spaceTimeSupport libunwind;
diff --git a/pkgs/development/compilers/ocaml/glibc-2.34-for-ocaml-4.10-and-11.patch b/pkgs/development/compilers/ocaml/glibc-2.34-for-ocaml-4.10-and-11.patch
new file mode 100644
index 000000000000..4ff9e6fddba5
--- /dev/null
+++ b/pkgs/development/compilers/ocaml/glibc-2.34-for-ocaml-4.10-and-11.patch
@@ -0,0 +1,37 @@
+From dfb5e954a04f59b0456cc4c0ddf3acaf22e0ff07 Mon Sep 17 00:00:00 2001
+From: Richard W.M. Jones
+Date: Feb 28 2021 20:45:47 +0000
+Subject: Workaround for glibc non-constant SIGSTKSZ
+
+
+https://github.com/ocaml/ocaml/issues/10250
+
+Signed-off-by: Richard W.M. Jones
+
+---
+
+diff --git a/runtime/signals_nat.c b/runtime/signals_nat.c
+index 8b64ab4..7f0a975 100644
+--- a/runtime/signals_nat.c
++++ b/runtime/signals_nat.c
+@@ -181,7 +181,19 @@ DECLARE_SIGNAL_HANDLER(trap_handler)
+ #error "CONTEXT_SP is required if HAS_STACK_OVERFLOW_DETECTION is defined"
+ #endif
+
++#ifndef __GLIBC__
+ static char sig_alt_stack[SIGSTKSZ];
++#else
++/* glibc 2.34 has non-constant SIGSTKSZ */
++static char *sig_alt_stack;
++
++static void allocate_sig_alt_stack(void) __attribute__((constructor));
++static void
++allocate_sig_alt_stack(void)
++{
++ sig_alt_stack = malloc(SIGSTKSZ);
++}
++#endif
+
+ /* Code compiled with ocamlopt never accesses more than
+ EXTRA_STACK bytes below the stack pointer. */
+
diff --git a/pkgs/development/compilers/openjdk/11.nix b/pkgs/development/compilers/openjdk/11.nix
index 6f4b78286d63..8c45bece9adc 100644
--- a/pkgs/development/compilers/openjdk/11.nix
+++ b/pkgs/development/compilers/openjdk/11.nix
@@ -40,6 +40,7 @@ let
./currency-date-range-jdk10.patch
./increase-javadoc-heap.patch
./fix-library-path-jdk11.patch
+ ./fix-glibc-2.34.patch
] ++ lib.optionals (!headless && enableGnome2) [
./swing-use-gtk-jdk10.patch
];
diff --git a/pkgs/development/compilers/openjdk/16.nix b/pkgs/development/compilers/openjdk/16.nix
index e6fd12a632b3..0a4a8e1de413 100644
--- a/pkgs/development/compilers/openjdk/16.nix
+++ b/pkgs/development/compilers/openjdk/16.nix
@@ -48,6 +48,7 @@ let
url = "https://src.fedoraproject.org/rpms/java-openjdk/raw/06c001c7d87f2e9fe4fedeef2d993bcd5d7afa2a/f/rh1673833-remove_removal_of_wformat_during_test_compilation.patch";
sha256 = "082lmc30x64x583vqq00c8y0wqih3y4r0mp1c4bqq36l22qv6b6r";
})
+ ./fix-glibc-2.34.patch
] ++ lib.optionals (!headless && enableGnome2) [
./swing-use-gtk-jdk13.patch
];
diff --git a/pkgs/development/compilers/openjdk/fix-glibc-2.34.patch b/pkgs/development/compilers/openjdk/fix-glibc-2.34.patch
new file mode 100644
index 000000000000..7bf8b2b16744
--- /dev/null
+++ b/pkgs/development/compilers/openjdk/fix-glibc-2.34.patch
@@ -0,0 +1,24 @@
+Taken from https://build.opensuse.org/package/view_file/Java:Factory/java-15-openjdk/openjdk-glibc234.patch
+
+--- openjdk/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c 2021-04-09 11:36:58.000000000 +0200
++++ openjdk/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c 2021-08-26 15:42:52.326232581 +0200
+@@ -67,8 +67,17 @@
+ longjmp(context, 1);
+ }
+
++static char* altstack = NULL;
++
+ void set_signal_handler() {
+- static char altstack[SIGSTKSZ];
++ if (altstack == NULL) {
++ // Dynamically allocated in case SIGSTKSZ is not constant
++ altstack = malloc(SIGSTKSZ);
++ if (altstack == NULL) {
++ fprintf(stderr, "Test ERROR. Unable to malloc altstack space\n");
++ exit(7);
++ }
++ }
+
+ stack_t ss = {
+ .ss_size = SIGSTKSZ,
+
diff --git a/pkgs/development/compilers/polyml/5.6.nix b/pkgs/development/compilers/polyml/5.6.nix
index 7858e3f6dc11..4354ce7e2d67 100644
--- a/pkgs/development/compilers/polyml/5.6.nix
+++ b/pkgs/development/compilers/polyml/5.6.nix
@@ -1,4 +1,4 @@
-{lib, stdenv, fetchurl, autoreconfHook}:
+{lib, stdenv, fetchurl, autoreconfHook, fetchpatch }:
let
version = "5.6";
@@ -12,6 +12,14 @@ stdenv.mkDerivation {
substituteInPlace configure.ac --replace stdc++ c++
'';
+ patches = [
+ # glibc 2.34 compat
+ (fetchpatch {
+ url = "https://src.fedoraproject.org/rpms/polyml/raw/4d8868ca5a1ce3268f212599a321f8011c950496/f/polyml-pthread-stack-min.patch";
+ sha256 = "1h5ihg2sxld9ymrl3f2mpnbn2242ka1fsa0h4gl9h90kndvg6kby";
+ })
+ ];
+
buildInputs = lib.optional stdenv.isDarwin autoreconfHook;
src = fetchurl {
diff --git a/pkgs/development/compilers/polyml/5.7.nix b/pkgs/development/compilers/polyml/5.7.nix
index 5ac6990383cc..efd3d1bfd40a 100644
--- a/pkgs/development/compilers/polyml/5.7.nix
+++ b/pkgs/development/compilers/polyml/5.7.nix
@@ -1,4 +1,4 @@
-{ lib, stdenv, fetchFromGitHub, autoreconfHook, gmp, libffi }:
+{ lib, stdenv, fetchFromGitHub, autoreconfHook, gmp, libffi, fetchpatch }:
stdenv.mkDerivation rec {
pname = "polyml";
@@ -8,7 +8,15 @@ stdenv.mkDerivation rec {
substituteInPlace configure.ac --replace stdc++ c++
'';
- patches = [ ./5.7-new-libffi-FFI_SYSV.patch ];
+ patches = [
+ ./5.7-new-libffi-FFI_SYSV.patch
+
+ # glibc 2.34 compat
+ (fetchpatch {
+ url = "https://src.fedoraproject.org/rpms/polyml/raw/4d8868ca5a1ce3268f212599a321f8011c950496/f/polyml-pthread-stack-min.patch";
+ sha256 = "1h5ihg2sxld9ymrl3f2mpnbn2242ka1fsa0h4gl9h90kndvg6kby";
+ })
+ ];
buildInputs = [ libffi gmp ];
diff --git a/pkgs/development/compilers/polyml/default.nix b/pkgs/development/compilers/polyml/default.nix
index 8a283bb6cf99..2f22f8cd616b 100644
--- a/pkgs/development/compilers/polyml/default.nix
+++ b/pkgs/development/compilers/polyml/default.nix
@@ -1,4 +1,10 @@
-{ lib, stdenv, fetchFromGitHub, fetchpatch, autoreconfHook, gmp, libffi }:
+{ lib
+, stdenv
+, fetchFromGitHub
+, autoreconfHook
+, gmp
+, libffi
+}:
stdenv.mkDerivation rec {
pname = "polyml";
diff --git a/pkgs/development/compilers/rust/1_58.nix b/pkgs/development/compilers/rust/1_59.nix
similarity index 56%
rename from pkgs/development/compilers/rust/1_58.nix
rename to pkgs/development/compilers/rust/1_59.nix
index c854bfdd37a4..981258516554 100644
--- a/pkgs/development/compilers/rust/1_58.nix
+++ b/pkgs/development/compilers/rust/1_59.nix
@@ -20,8 +20,8 @@
} @ args:
import ./default.nix {
- rustcVersion = "1.58.1";
- rustcSha256 = "1iq7kj16qfpkx8gvw50d8rf7glbm6s0pj2y1qkrz7mi56vfsyfd8";
+ rustcVersion = "1.59.0";
+ rustcSha256 = "sha256-p8juruhb/O+EyWsCsxcdHmVA0VF5/4Pd3Z6vuhhfhfk=";
llvmSharedForBuild = pkgsBuildBuild.llvmPackages_13.libllvm.override { enableSharedLibraries = true; };
llvmSharedForHost = pkgsBuildHost.llvmPackages_13.libllvm.override { enableSharedLibraries = true; };
@@ -37,24 +37,25 @@ import ./default.nix {
# Note: the version MUST be one version prior to the version we're
# building
- bootstrapVersion = "1.57.0";
+ bootstrapVersion = "1.58.1";
# fetch hashes by running `print-hashes.sh ${bootstrapVersion}`
bootstrapHashes = {
- i686-unknown-linux-gnu = "7e4ac8ca2874897099a3ceb89039ceee170f474a98ee247589fd6bca8dda7cfa";
- x86_64-unknown-linux-gnu = "ea0253784b2e5c22659ff148d492a68d2e11da734491714ebc61cc93896efcda";
- x86_64-unknown-linux-musl = "56876ebca0e46236208c8bd3c3425dba553abe49639e1040ee8b95bc66a45d33";
- arm-unknown-linux-gnueabihf = "b4448f7a96da4feee99a2c4b16b5738b99ab7e86e22d284ea6f7dca5921bca9b";
- armv7-unknown-linux-gnueabihf = "577682b1405e8901f971839407daaad06d8ae68ad370305b75d569ba293c4fb4";
- aarch64-unknown-linux-gnu = "d66847f7cf7b548ecb328c400ac4f691ee2aea6ff5cd9286ad8733239569556c";
- aarch64-unknown-linux-musl = "91c8e5171e5715261f7f635142a10a9415a4e5ba55374daf76f0b713c8b08132";
- x86_64-apple-darwin = "15ceffc4743434c19d08f73fb4edd6642b7fd8162ed7101d3e6ca2c691fcb699";
- aarch64-apple-darwin = "7511075e28b715e2d9c7ee74221779f8444681a4bb60ac3a0270a5fdf08bdd5a";
- powerpc64le-unknown-linux-gnu = "3ddc1abed6b7535c4150bf54291901fa856806c948bc21b711e24a3c8d810be7";
- riscv64gc-unknown-linux-gnu = "f809df1c6ac0adc9bd37eb871dfb0d9809f3ed7f61ba611f9305e9eb8f8c9226";
+ i686-unknown-linux-gnu = "c3d282cd96cc9e5292e62db1ebb9fa6d5b738f4684d5ece9883f7472e2f76ad4";
+ x86_64-unknown-linux-gnu = "4fac6df9ea49447682c333e57945bebf4f9f45ec7b08849e507a64b2ccd5f8fb";
+ x86_64-unknown-linux-musl = "7036e34eadc8ce22d16b0625919d9f2244ca49a5441d6599f4822116c181d272";
+ arm-unknown-linux-gnueabihf = "739389d46c5862b0e67d01dece99aa3db2229e055a3d7f7624679c55b6c33e06";
+ armv7-unknown-linux-gnueabihf = "6cede2c7795e8126b0f17b1032d52500e594bac64c7d190bdc0ac1c832ef30bd";
+ aarch64-unknown-linux-gnu = "ce557516593e4526709b0f33c2e1d7c932b3ddf76af94c2417d8d667921ce90c";
+ aarch64-unknown-linux-musl = "b1533fdeeda483a3633617fd18a79d8fad7821331614b8dc13efd8b22acc30f5";
+ x86_64-apple-darwin = "d0044680fc132a721481b130a0a4282a444867f423efdb890fe13e447966412f";
+ aarch64-apple-darwin = "00b44985bc87e53c53d92622fb10226f09e9f25c79db48a77c0a769a36f83b1e";
+ powerpc64le-unknown-linux-gnu = "b15baef702cbd6f0ea2bef7bf98ca7ce5644f2beb219028e8a12e7053da4c849";
+ riscv64gc-unknown-linux-gnu = "d8ea2b11a4b24d1169fa3190127488b951b8bdef28293a4129ddd46c0ba9469b";
+ mips64el-unknown-linux-gnuabi64 = "4f03bc972ae784d4f66cfa77215b369723531e67f647de9f49ce9fc21e5691af";
};
- selectRustPackage = pkgs: pkgs.rust_1_58;
+ selectRustPackage = pkgs: pkgs.rust_1_59;
rustcPatches = [
];
diff --git a/pkgs/development/compilers/rust/binary.nix b/pkgs/development/compilers/rust/binary.nix
index ce4250f675e9..1145f4da8f66 100644
--- a/pkgs/development/compilers/rust/binary.nix
+++ b/pkgs/development/compilers/rust/binary.nix
@@ -19,7 +19,7 @@ in
rec {
rustc = stdenv.mkDerivation {
- name = "rustc-${versionType}-${version}";
+ pname = "rustc-${versionType}";
inherit version;
inherit src;
@@ -71,7 +71,7 @@ rec {
};
cargo = stdenv.mkDerivation {
- name = "cargo-${versionType}-${version}";
+ pname = "cargo-${versionType}";
inherit version;
inherit src;
diff --git a/pkgs/development/compilers/rust/cargo.nix b/pkgs/development/compilers/rust/cargo.nix
index ee909e973a35..b50f36f0d9b6 100644
--- a/pkgs/development/compilers/rust/cargo.nix
+++ b/pkgs/development/compilers/rust/cargo.nix
@@ -5,7 +5,7 @@
}:
rustPlatform.buildRustPackage {
- name = "cargo-${rustc.version}";
+ pname = "cargo";
inherit (rustc) version src;
# the rust source tarball already has all the dependencies vendored, no need to fetch them again
diff --git a/pkgs/development/embedded/platformio/core.nix b/pkgs/development/embedded/platformio/core.nix
index f19458fa84fb..c40f2f45f312 100644
--- a/pkgs/development/embedded/platformio/core.nix
+++ b/pkgs/development/embedded/platformio/core.nix
@@ -153,7 +153,8 @@ with python.pkgs; buildPythonApplication rec {
--subst-var-by SPDX_LICENSE_LIST_DATA '${spdx-license-list-data.json}'
substituteInPlace setup.py \
- --replace "zeroconf==0.37.*" "zeroconf"
+ --replace "wsproto==1.0.*" "wsproto" \
+ --replace "zeroconf==0.38.*" "zeroconf"
'';
meta = with lib; {
diff --git a/pkgs/development/go-modules/generic/default.nix b/pkgs/development/go-modules/generic/default.nix
index 76d0dc961c5a..e2428edbb268 100644
--- a/pkgs/development/go-modules/generic/default.nix
+++ b/pkgs/development/go-modules/generic/default.nix
@@ -153,13 +153,13 @@ let
export GOCACHE=$TMPDIR/go-cache
export GOPATH="$TMPDIR/go"
+ export GOPROXY=off
export GOSUMDB=off
cd "$modRoot"
- '' + lib.optionalString (go-modules != "") ''
+ '' + lib.optionalString (vendorSha256 != null) ''
${if proxyVendor then ''
export GOPROXY=file://${go-modules}
'' else ''
- export GOPROXY=off
rm -rf vendor
cp -r --reflink=auto ${go-modules} vendor
''}
@@ -171,13 +171,20 @@ let
buildPhase = args.buildPhase or ''
runHook preBuild
+ exclude='\(/_\|examples\|Godeps\|testdata'
+ if [[ -n "$excludedPackages" ]]; then
+ IFS=' ' read -r -a excludedArr <<<$excludedPackages
+ printf -v excludedAlternates '%s\\|' "''${excludedArr[@]}"
+ excludedAlternates=''${excludedAlternates%\\|} # drop final \| added by printf
+ exclude+='\|'"$excludedAlternates"
+ fi
+ exclude+='\)'
+
buildGoDir() {
local d; local cmd;
cmd="$1"
d="$2"
. $TMPDIR/buildFlagsArray
- echo "$d" | grep -q "\(/_\|examples\|Godeps\|testdata\)" && return 0
- [ -n "$excludedPackages" ] && echo "$d" | grep -q "$excludedPackages" && return 0
local OUT
if ! OUT="$(go $cmd $buildFlags "''${buildFlagsArray[@]}" ''${tags:+-tags=${lib.concatStringsSep "," tags}} ''${ldflags:+-ldflags="$ldflags"} -v -p $NIX_BUILD_CORES $d 2>&1)"; then
if ! echo "$OUT" | grep -qE '(no( buildable| non-test)?|build constraints exclude all) Go (source )?files'; then
@@ -214,6 +221,7 @@ let
export NIX_BUILD_CORES=1
fi
for pkg in $(getGoDirs ""); do
+ grep -q "$exclude" <<<$pkg && continue
echo "Building subPackage $pkg"
buildGoDir install "$pkg"
done
diff --git a/pkgs/development/go-packages/generic/default.nix b/pkgs/development/go-packages/generic/default.nix
index 7c4d173b937b..3d633324eefe 100644
--- a/pkgs/development/go-packages/generic/default.nix
+++ b/pkgs/development/go-packages/generic/default.nix
@@ -150,13 +150,20 @@ let
runHook renameImports
+ exclude='\(/_\|examples\|Godeps\|testdata'
+ if [[ -n "$excludedPackages" ]]; then
+ IFS=' ' read -r -a excludedArr <<<$excludedPackages
+ printf -v excludedAlternates '%s\\|' "''${excludedArr[@]}"
+ excludedAlternates=''${excludedAlternates%\\|} # drop final \| added by printf
+ exclude+='\|'"$excludedAlternates"
+ fi
+ exclude+='\)'
+
buildGoDir() {
local d; local cmd;
cmd="$1"
d="$2"
. $TMPDIR/buildFlagsArray
- echo "$d" | grep -q "\(/_\|examples\|Godeps\)" && return 0
- [ -n "$excludedPackages" ] && echo "$d" | grep -q "$excludedPackages" && return 0
local OUT
if ! OUT="$(go $cmd $buildFlags "''${buildFlagsArray[@]}" ''${tags:+-tags=${lib.concatStringsSep "," tags}} ''${ldflags:+-ldflags="$ldflags"} -v -p $NIX_BUILD_CORES $d 2>&1)"; then
if ! echo "$OUT" | grep -qE '(no( buildable| non-test)?|build constraints exclude all) Go (source )?files'; then
@@ -195,6 +202,8 @@ let
export NIX_BUILD_CORES=1
fi
for pkg in $(getGoDirs ""); do
+ grep -q "$exclude" <<<$pkg && continue
+ echo "Building subPackage $pkg"
buildGoDir install "$pkg"
done
'' + lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) ''
diff --git a/pkgs/development/interpreters/maude/default.nix b/pkgs/development/interpreters/maude/default.nix
index 860f9ac3a5eb..30055dc7a3dd 100644
--- a/pkgs/development/interpreters/maude/default.nix
+++ b/pkgs/development/interpreters/maude/default.nix
@@ -30,6 +30,10 @@ stdenv.mkDerivation {
hardeningDisable = [ "stackprotector" ] ++
lib.optionals stdenv.isi686 [ "pic" "fortify" ];
+ # Fix for glibc-2.34, see
+ # https://gitweb.gentoo.org/repo/gentoo.git/commit/dev-lang/maude/maude-3.1-r1.ebuild?id=f021cc6cfa1e35eb9c59955830f1fd89bfcb26b4
+ configureFlags = [ "--without-libsigsegv" ];
+
preConfigure = ''
configureFlagsArray=(
--datadir="$out/share/maude"
diff --git a/pkgs/development/interpreters/perl/default.nix b/pkgs/development/interpreters/perl/default.nix
index 54769a03b7b6..f29e61d1105b 100644
--- a/pkgs/development/interpreters/perl/default.nix
+++ b/pkgs/development/interpreters/perl/default.nix
@@ -19,11 +19,10 @@ let
common = { perl, buildPerl, version, sha256 }: stdenv.mkDerivation (rec {
inherit version;
-
- name = "perl-${version}";
+ pname = "perl";
src = fetchurl {
- url = "mirror://cpan/src/5.0/${name}.tar.gz";
+ url = "mirror://cpan/src/5.0/perl-${version}.tar.gz";
inherit sha256;
};
diff --git a/pkgs/development/interpreters/python/default.nix b/pkgs/development/interpreters/python/default.nix
index bac5ba69c44a..6c566544f329 100644
--- a/pkgs/development/interpreters/python/default.nix
+++ b/pkgs/development/interpreters/python/default.nix
@@ -124,19 +124,19 @@ with pkgs;
sourceVersion = {
major = "3";
minor = "9";
- patch = "10";
+ patch = "11";
suffix = "";
};
- sha256 = "sha256-Co+/tSh+vDoT6brz1U4I+gZ3j/7M9jEa74Ibs6ZYbMg=";
+ sha256 = "sha256-ZnZ6NTCdck83DfnlA8FytO5ET0nWK5i8TspyUSPibEk=";
};
python310 = {
sourceVersion = {
major = "3";
minor = "10";
- patch = "2";
+ patch = "3";
suffix = "";
};
- sha256 = "sha256-F946x9qfJRmqnWQ3jGA6c6DprVjf+ogS5FFgwIbeZMc=";
+ sha256 = "sha256-WWxy3pmNw5IFvE9w7w2/ft7HQKMG0JtJqb0Kd4BnMNw=";
};
};
diff --git a/pkgs/development/interpreters/python/update-python-libraries/update-python-libraries.py b/pkgs/development/interpreters/python/update-python-libraries/update-python-libraries.py
index 5f55ed5ecaf1..3843497d94e5 100755
--- a/pkgs/development/interpreters/python/update-python-libraries/update-python-libraries.py
+++ b/pkgs/development/interpreters/python/update-python-libraries/update-python-libraries.py
@@ -356,17 +356,19 @@ def _update_package(path, target):
text = _replace_value('hash', sri_hash, text)
if fetcher == 'fetchFromGitHub':
- # in the case of fetchFromGitHub, it's common to see `rev = version;`
- # in which no string value is meant to be substituted.
- # Verify that the attribute is set to a variable
- regex = '(rev\s+=\s+([_a-zA-Z][_a-zA-Z0-9\.]*);)'
+ # in the case of fetchFromGitHub, it's common to see `rev = version;` or `rev = "v${version}";`
+ # in which no string value is meant to be substituted. However, we can just overwrite the previous value.
+ regex = '(rev\s+=\s+[^;]*;)'
regex = re.compile(regex)
- value = regex.findall(text)
- n = len(value)
+ matches = regex.findall(text)
+ n = len(matches)
if n == 0:
- # value is set to a string, e.g. `rev = "v${version}";`
- text = _replace_value('rev', f"{prefix}${{version}}", text)
+ raise ValueError("Unable to find rev value for {}.".format(pname))
+ else:
+ # forcefully rewrite rev, incase tagging conventions changed for a release
+ match = matches[0]
+ text = text.replace(match, f'rev = "refs/tags/{prefix}${{version}}";')
# incase there's no prefix, just rewrite without interpolation
text = text.replace('"${version}";', 'version;')
diff --git a/pkgs/development/interpreters/ruby/rubygems/default.nix b/pkgs/development/interpreters/ruby/rubygems/default.nix
index 4150f7683d5d..6a8e171ee6e1 100644
--- a/pkgs/development/interpreters/ruby/rubygems/default.nix
+++ b/pkgs/development/interpreters/ruby/rubygems/default.nix
@@ -1,7 +1,7 @@
{ stdenv, lib, fetchurl }:
stdenv.mkDerivation rec {
- name = "rubygems";
+ pname = "rubygems";
version = "3.2.26";
src = fetchurl {
diff --git a/pkgs/development/libraries/SDL2/default.nix b/pkgs/development/libraries/SDL2/default.nix
index d1086de3718d..d8d81492f914 100644
--- a/pkgs/development/libraries/SDL2/default.nix
+++ b/pkgs/development/libraries/SDL2/default.nix
@@ -65,6 +65,14 @@ stdenv.mkDerivation rec {
outputs = [ "out" "dev" ];
outputBin = "dev"; # sdl-config
+ patches = [
+ # `sdl2-config --cflags` from Nixpkgs returns include path to just SDL2.
+ # On a normal distro this is enough for includes from all SDL2* packages to work,
+ # but on NixOS they're spread across different paths.
+ # This patch + the setup-hook will ensure that `sdl2-config --cflags` works correctly.
+ ./find-headers.patch
+ ];
+
depsBuildBuild = [ pkg-config ];
nativeBuildInputs = [ pkg-config ] ++ optionals waylandSupport [ wayland ];
diff --git a/pkgs/development/libraries/SDL2/find-headers.patch b/pkgs/development/libraries/SDL2/find-headers.patch
new file mode 100644
index 000000000000..4792679deb11
--- /dev/null
+++ b/pkgs/development/libraries/SDL2/find-headers.patch
@@ -0,0 +1,34 @@
+diff --git a/sdl2-config.cmake.in b/sdl2-config.cmake.in
+index c570511fa..ca694f595 100644
+--- a/sdl2-config.cmake.in
++++ b/sdl2-config.cmake.in
+@@ -7,7 +7,8 @@ set(includedir "@includedir@")
+ set(SDL2_PREFIX "${prefix}")
+ set(SDL2_EXEC_PREFIX "${exec_prefix}")
+ set(SDL2_LIBDIR "${libdir}")
+-set(SDL2_INCLUDE_DIRS "${includedir}/SDL2")
++set(SDL2_INCLUDE_DIRS "${includedir}/SDL2" $ENV{SDL2_PATH})
++separate_arguments(SDL2_INCLUDE_DIRS)
+ set(SDL2_LIBRARIES "-L${SDL2_LIBDIR} @SDL_RLD_FLAGS@ @SDL_LIBS@")
+ string(STRIP "${SDL2_LIBRARIES}" SDL2_LIBRARIES)
+
+diff --git a/sdl2-config.in b/sdl2-config.in
+index 5a2aed292..7c55f0a28 100644
+--- a/sdl2-config.in
++++ b/sdl2-config.in
+@@ -42,7 +42,11 @@ while test $# -gt 0; do
+ echo @SDL_VERSION@
+ ;;
+ --cflags)
+- echo -I@includedir@/SDL2 @SDL_CFLAGS@
++ SDL_CFLAGS=""
++ for i in @includedir@/SDL2 $SDL2_PATH; do
++ SDL_CFLAGS="$SDL_CFLAGS -I$i"
++ done
++ echo $SDL_CFLAGS @SDL_CFLAGS@
+ ;;
+ @ENABLE_SHARED_TRUE@ --libs)
+ @ENABLE_SHARED_TRUE@ echo -L@libdir@ @SDL_RLD_FLAGS@ @SDL_LIBS@
+--
+2.33.1
+
diff --git a/pkgs/development/libraries/aspell/default.nix b/pkgs/development/libraries/aspell/default.nix
index 777bad1e5a53..b839092228b3 100644
--- a/pkgs/development/libraries/aspell/default.nix
+++ b/pkgs/development/libraries/aspell/default.nix
@@ -1,4 +1,8 @@
-{ lib, stdenv, fetchurl, fetchpatch, fetchzip, perl
+{ lib, stdenv, fetchurl, fetchpatch, fetchzip, perl, ncurses
+
+ # for tests
+, aspell, glibc, runCommand
+
, searchNixProfiles ? true
}:
@@ -37,7 +41,7 @@ stdenv.mkDerivation rec {
'';
nativeBuildInputs = [ perl ];
- buildInputs = [ perl ];
+ buildInputs = [ ncurses perl ];
doCheck = true;
@@ -55,6 +59,19 @@ stdenv.mkDerivation rec {
cp ${devaMapsSource}/u-deva.{cmap,cset} $out/lib/aspell/
'';
+ passthru.tests = {
+ uses-curses = runCommand "${pname}-curses" {
+ buildInputs = [ glibc ];
+ } ''
+ if ! ldd ${aspell}/bin/aspell | grep -q ${ncurses}
+ then
+ echo "Test failure: It does not look like aspell picked up the curses dependency."
+ exit 1
+ fi
+ touch $out
+ '';
+ };
+
meta = {
description = "Spell checker for many languages";
homepage = "http://aspell.net/";
diff --git a/pkgs/development/libraries/avahi/default.nix b/pkgs/development/libraries/avahi/default.nix
index a52d1be566e6..1732b5df04e2 100644
--- a/pkgs/development/libraries/avahi/default.nix
+++ b/pkgs/development/libraries/avahi/default.nix
@@ -18,7 +18,7 @@ let
in
stdenv.mkDerivation rec {
- name = "avahi${lib.optionalString withLibdnssdCompat "-compat"}-${version}";
+ pname = "avahi${lib.optionalString withLibdnssdCompat "-compat"}";
version = "0.8";
src = fetchurl {
@@ -33,6 +33,10 @@ stdenv.mkDerivation rec {
patches = [
./no-mkdir-localstatedir.patch
+ (fetchpatch {
+ url = "https://github.com/lathiat/avahi/commit/9d31939e55280a733d930b15ac9e4dda4497680c.patch";
+ sha256 = "sha256-BXWmrLWUvDxKPoIPRFBpMS3T4gijRw0J+rndp6iDybU=";
+ })
];
buildInputs = [ libdaemon dbus glib expat libiconv libevent ]
diff --git a/pkgs/development/libraries/boost/1.69.nix b/pkgs/development/libraries/boost/1.69.nix
index d934e3267fcb..c8846daa64f3 100644
--- a/pkgs/development/libraries/boost/1.69.nix
+++ b/pkgs/development/libraries/boost/1.69.nix
@@ -8,4 +8,6 @@ callPackage ./generic.nix (args // rec {
# SHA256 from http://www.boost.org/users/history/version_1_69_0.html
sha256 = "8f32d4617390d1c2d16f26a27ab60d97807b35440d45891fa340fc2648b04406";
};
+
+ patches = [ ./pthread-stack-min-fix.patch ];
})
diff --git a/pkgs/development/libraries/boost/1.70.nix b/pkgs/development/libraries/boost/1.70.nix
index bc70797acda8..4d50f41e49ce 100644
--- a/pkgs/development/libraries/boost/1.70.nix
+++ b/pkgs/development/libraries/boost/1.70.nix
@@ -8,4 +8,6 @@ callPackage ./generic.nix (args // rec {
# SHA256 from http://www.boost.org/users/history/version_1_70_0.html
sha256 = "430ae8354789de4fd19ee52f3b1f739e1fba576f0aded0897c3c2bc00fb38778";
};
+
+ patches = [ ./pthread-stack-min-fix.patch ];
})
diff --git a/pkgs/development/libraries/boost/1.72.nix b/pkgs/development/libraries/boost/1.72.nix
index bb2fccdfaf78..666a3cacb656 100644
--- a/pkgs/development/libraries/boost/1.72.nix
+++ b/pkgs/development/libraries/boost/1.72.nix
@@ -11,5 +11,7 @@ callPackage ./generic.nix (args // rec {
# SHA256 from http://www.boost.org/users/history/version_1_72_0.html
sha256 = "59c9b274bc451cf91a9ba1dd2c7fdcaf5d60b1b3aa83f2c9fa143417cc660722";
};
+
+ patches = [ ./pthread-stack-min-fix.patch ];
})
diff --git a/pkgs/development/libraries/boost/pthread-stack-min-fix.patch b/pkgs/development/libraries/boost/pthread-stack-min-fix.patch
new file mode 100644
index 000000000000..b6c85f840529
--- /dev/null
+++ b/pkgs/development/libraries/boost/pthread-stack-min-fix.patch
@@ -0,0 +1,15 @@
+Taken from https://github.com/conan-io/conan-center-index/pull/361/files
+
+diff --git a/include/boost/thread/pthread/thread_data.hpp b/include/boost/thread/pthread/thread_data.hpp
+index aefbeb4..bc9b136 100644
+--- a/boost/thread/pthread/thread_data.hpp
++++ b/boost/thread/pthread/thread_data.hpp
+@@ -57,7 +57,7 @@ namespace boost
+ #else
+ std::size_t page_size = ::sysconf( _SC_PAGESIZE);
+ #endif
+-#if PTHREAD_STACK_MIN > 0
++#ifdef PTHREAD_STACK_MIN
+ if (size
-+
- /* Keep in sync with win32/common.mak */
- #define SASL_VERSION_MAJOR 2
- #define SASL_VERSION_MINOR 1
diff --git a/pkgs/development/libraries/dav1d/default.nix b/pkgs/development/libraries/dav1d/default.nix
index b39e09236096..180480985ac7 100644
--- a/pkgs/development/libraries/dav1d/default.nix
+++ b/pkgs/development/libraries/dav1d/default.nix
@@ -10,14 +10,14 @@ assert useVulkan -> withExamples;
stdenv.mkDerivation rec {
pname = "dav1d";
- version = "0.9.2";
+ version = "1.0.0";
src = fetchFromGitLab {
domain = "code.videolan.org";
owner = "videolan";
repo = pname;
rev = version;
- sha256 = "0bkps488h9s15ylvkm4fmfywgrpbw570glawpnv6khpq9n223dzl";
+ sha256 = "sha256-RVr7NFVxY+6MBD8NV7eMW8TEWuCgcfqpula1o1VZe0o=";
};
nativeBuildInputs = [ meson ninja nasm pkg-config ];
@@ -31,6 +31,8 @@ stdenv.mkDerivation rec {
"-Denable_examples=${lib.boolToString withExamples}"
];
+ doCheck = true;
+
meta = with lib; {
description = "A cross-platform AV1 decoder focused on speed and correctness";
longDescription = ''
diff --git a/pkgs/development/libraries/dotconf/default.nix b/pkgs/development/libraries/dotconf/default.nix
index 39d71eee432b..fed050f64b6e 100644
--- a/pkgs/development/libraries/dotconf/default.nix
+++ b/pkgs/development/libraries/dotconf/default.nix
@@ -1,7 +1,7 @@
{ fetchFromGitHub, lib, stdenv, autoreconfHook }:
stdenv.mkDerivation rec {
- name = "dotconf-" + version;
+ pname = "dotconf";
version = "1.3";
src = fetchFromGitHub {
diff --git a/pkgs/development/libraries/expat/default.nix b/pkgs/development/libraries/expat/default.nix
index ac54ced75b1b..a05f3b71fb46 100644
--- a/pkgs/development/libraries/expat/default.nix
+++ b/pkgs/development/libraries/expat/default.nix
@@ -16,11 +16,11 @@
stdenv.mkDerivation rec {
pname = "expat";
- version = "2.4.6";
+ version = "2.4.7";
src = fetchurl {
url = "https://github.com/libexpat/libexpat/releases/download/R_${lib.replaceStrings ["."] ["_"] version}/${pname}-${version}.tar.xz";
- sha256 = "sha256-3lV5S3qbwhSFL9wHW+quzYVO/hNhWX5iaO6HlGlRKJs=";
+ sha256 = "0zbss0dssn17mjmvk17qfi5cmvm0lcyzs62cwvqr219hhl864xcq";
};
outputs = [ "out" "dev" ]; # TODO: fix referrers
@@ -45,6 +45,7 @@ stdenv.mkDerivation rec {
passthru.tests = {
inherit python3;
+ inherit (python3.pkgs) xmltodict;
inherit (haskellPackages) hexpat;
inherit (perlPackages) XMLSAXExpat XMLParser;
inherit (luaPackages) luaexpat;
diff --git a/pkgs/development/libraries/fltk/common.nix b/pkgs/development/libraries/fltk/common.nix
index 06e1c05c7d07..54c8b4094f16 100644
--- a/pkgs/development/libraries/fltk/common.nix
+++ b/pkgs/development/libraries/fltk/common.nix
@@ -36,7 +36,6 @@
, withDocs ? true
, doxygen
, graphviz
-, texlive
, withExamples ? true
, withShared ? true
@@ -44,11 +43,6 @@
let
onOff = value: if value then "ON" else "OFF";
- tex = texlive.combine {
- inherit (texlive)
- scheme-medium varwidth multirow hanging adjustbox collectbox stackengine
- sectsty tocloft newunicodechar etoc;
- };
in
stdenv.mkDerivation rec {
pname = "fltk";
@@ -81,7 +75,6 @@ stdenv.mkDerivation rec {
] ++ lib.optionals withDocs [
doxygen
graphviz
- tex
];
buildInputs = lib.optionals stdenv.hostPlatform.isDarwin [
@@ -149,9 +142,9 @@ stdenv.mkDerivation rec {
# Docs
"-DOPTION_BUILD_HTML_DOCUMENTATION=${onOff withDocs}"
- "-DOPTION_BUILD_PDF_DOCUMENTATION=${onOff withDocs}"
+ "-DOPTION_BUILD_PDF_DOCUMENTATION=OFF"
"-DOPTION_INSTALL_HTML_DOCUMENTATION=${onOff withDocs}"
- "-DOPTION_INSTALL_PDF_DOCUMENTATION=${onOff withDocs}"
+ "-DOPTION_INSTALL_PDF_DOCUMENTATION=OFF"
"-DOPTION_INCLUDE_DRIVER_DOCUMENTATION=${onOff withDocs}"
];
diff --git a/pkgs/development/libraries/gcc/libgcc/default.nix b/pkgs/development/libraries/gcc/libgcc/default.nix
index b9b7db729eba..094bb7e7a1d3 100644
--- a/pkgs/development/libraries/gcc/libgcc/default.nix
+++ b/pkgs/development/libraries/gcc/libgcc/default.nix
@@ -4,7 +4,7 @@
}:
stdenvNoLibs.mkDerivation rec {
- name = "libgcc-${version}";
+ pname = "libgcc";
inherit (gcc.cc) src version;
outputs = [ "out" "dev" ];
diff --git a/pkgs/development/libraries/ggz_base_libs/default.nix b/pkgs/development/libraries/ggz_base_libs/default.nix
index cafb86935490..687b74fdb3ad 100644
--- a/pkgs/development/libraries/ggz_base_libs/default.nix
+++ b/pkgs/development/libraries/ggz_base_libs/default.nix
@@ -1,12 +1,11 @@
{ lib, stdenv, fetchurl, intltool, openssl, expat, libgcrypt }:
stdenv.mkDerivation rec {
+ pname = "ggz-base-libs";
version = "0.99.5";
- baseName = "ggz-base-libs";
- name = "${baseName}-snapshot-${version}";
src = fetchurl {
- url = "http://mirrors.ibiblio.org/pub/mirrors/ggzgamingzone/ggz/snapshots/${name}.tar.gz";
+ url = "http://mirrors.ibiblio.org/pub/mirrors/ggzgamingzone/ggz/snapshots/ggz-base-libs-snapshot-${version}.tar.gz";
sha256 = "1cw1vg0fbj36zyggnzidx9cbjwfc1yr4zqmsipxnvns7xa2awbdk";
};
diff --git a/pkgs/development/libraries/glib/default.nix b/pkgs/development/libraries/glib/default.nix
index a7b8f0d44bf6..386130cc6224 100644
--- a/pkgs/development/libraries/glib/default.nix
+++ b/pkgs/development/libraries/glib/default.nix
@@ -54,6 +54,14 @@ stdenv.mkDerivation rec {
patches = optionals stdenv.isDarwin [
./darwin-compilation.patch
+
+ # Fix Inkscape compilation with clang++
+ # https://gitlab.gnome.org/GNOME/glib/-/issues/2625
+ (fetchpatch {
+ url = "https://gitlab.gnome.org/GNOME/glib/-/commit/97d39b745ff1f621424f68a41ce0a7c5bb554c87.patch";
+ sha256 = "wftuyf3ExFfrISngCQpEUpIGfHCCLXeYv/PEb/TE6a8=";
+ revert = true;
+ })
] ++ optionals stdenv.hostPlatform.isMusl [
./quark_init_on_demand.patch
./gobject_init_on_demand.patch
diff --git a/pkgs/development/libraries/glibc/0001-Revert-Remove-all-usage-of-BASH-or-BASH-in-installed.patch b/pkgs/development/libraries/glibc/0001-Revert-Remove-all-usage-of-BASH-or-BASH-in-installed.patch
new file mode 100644
index 000000000000..45bad2867e90
--- /dev/null
+++ b/pkgs/development/libraries/glibc/0001-Revert-Remove-all-usage-of-BASH-or-BASH-in-installed.patch
@@ -0,0 +1,131 @@
+From f81744bae4442345ff6f40d80fdb8adaba8b330f Mon Sep 17 00:00:00 2001
+From: Maximilian Bosch
+Date: Fri, 27 Aug 2021 17:19:27 +0200
+Subject: [PATCH] Revert "Remove all usage of @BASH@ or ${BASH} in installed
+ files, and hardcode /bin/bash instead"
+
+We need the ability to override to use `/bin/sh` here to avoid having
+some bootstrap tools in a final build product.
+
+This reverts commit 5188a9d0265cc6f7235a8af1d31ab02e4a24853d.
+---
+ debug/Makefile | 5 +++--
+ debug/xtrace.sh | 2 +-
+ elf/Makefile | 4 +++-
+ elf/ldd.bash.in | 2 +-
+ elf/sotruss.sh | 2 +-
+ malloc/Makefile | 5 +++--
+ malloc/memusage.sh | 2 +-
+ timezone/Makefile | 3 ++-
+ 8 files changed, 15 insertions(+), 10 deletions(-)
+
+diff --git a/debug/Makefile b/debug/Makefile
+index 6893111cbf..3f66666c6c 100644
+--- a/debug/Makefile
++++ b/debug/Makefile
+@@ -216,7 +216,8 @@ $(objpfx)pcprofiledump: $(objpfx)pcprofiledump.o
+
+ $(objpfx)xtrace: xtrace.sh
+ rm -f $@.new
+- sed -e 's|@VERSION@|$(version)|' -e 's|@SLIBDIR@|$(sLIBdir)|' \
+- -e 's|@BINDIR@|$(bindir)|' -e 's|@PKGVERSION@|$(PKGVERSION)|' \
++ sed -e 's|@BASH@|$(BASH)|' -e 's|@VERSION@|$(version)|' \
++ -e 's|@SLIBDIR@|$(sLIBdir)|' -e 's|@BINDIR@|$(bindir)|' \
++ -e 's|@PKGVERSION@|$(PKGVERSION)|' \
+ -e 's|@REPORT_BUGS_TO@|$(REPORT_BUGS_TO)|' $^ > $@.new \
+ && rm -f $@ && mv $@.new $@ && chmod +x $@
+diff --git a/debug/xtrace.sh b/debug/xtrace.sh
+index 9697fbe0b4..279fe59ac6 100755
+--- a/debug/xtrace.sh
++++ b/debug/xtrace.sh
+@@ -1,4 +1,4 @@
+-#!/bin/bash
++#! @BASH@
+ # Copyright (C) 1999-2021 Free Software Foundation, Inc.
+ # This file is part of the GNU C Library.
+ # Contributed by Ulrich Drepper , 1999.
+diff --git a/elf/Makefile b/elf/Makefile
+index d05f410592..9264409fdd 100644
+--- a/elf/Makefile
++++ b/elf/Makefile
+@@ -144,7 +144,8 @@ $(objpfx)sotruss-lib.so: $(common-objpfx)libc.so $(objpfx)ld.so \
+ $(common-objpfx)libc_nonshared.a
+
+ $(objpfx)sotruss: sotruss.sh $(common-objpfx)config.make
+- sed -e 's%@VERSION@%$(version)%g' \
++ sed -e 's%@BASH@%$(BASH)%g' \
++ -e 's%@VERSION@%$(version)%g' \
+ -e 's%@TEXTDOMAINDIR@%$(localedir)%g' \
+ -e 's%@PREFIX@%$(prefix)%g' \
+ -e 's|@PKGVERSION@|$(PKGVERSION)|g' \
+@@ -659,6 +660,7 @@ ldd-rewrite = -e 's%@RTLD@%$(rtlddir)/$(rtld-installed-name)%g' \
+ -e 's%@VERSION@%$(version)%g' \
+ -e 's|@PKGVERSION@|$(PKGVERSION)|g' \
+ -e 's|@REPORT_BUGS_TO@|$(REPORT_BUGS_TO)|g' \
++ -e 's%@BASH@%$(BASH)%g' \
+ -e 's%@TEXTDOMAINDIR@%$(localedir)%g'
+
+ ifeq ($(ldd-rewrite-script),no)
+diff --git a/elf/ldd.bash.in b/elf/ldd.bash.in
+index ba736464ac..57442bc3f2 100644
+--- a/elf/ldd.bash.in
++++ b/elf/ldd.bash.in
+@@ -1,4 +1,4 @@
+-#!/bin/bash
++#! @BASH@
+ # Copyright (C) 1996-2021 Free Software Foundation, Inc.
+ # This file is part of the GNU C Library.
+
+diff --git a/elf/sotruss.sh b/elf/sotruss.sh
+index 003cf4d825..fd4da80244 100755
+--- a/elf/sotruss.sh
++++ b/elf/sotruss.sh
+@@ -1,4 +1,4 @@
+-#!/bin/bash
++#! @BASH@
+ # Copyright (C) 2011-2021 Free Software Foundation, Inc.
+ # This file is part of the GNU C Library.
+
+diff --git a/malloc/Makefile b/malloc/Makefile
+index 9b70831d38..90ecadff6c 100644
+--- a/malloc/Makefile
++++ b/malloc/Makefile
+@@ -271,8 +271,9 @@ $(objpfx)mtrace: mtrace.pl
+
+ $(objpfx)memusage: memusage.sh
+ rm -f $@.new
+- sed -e 's|@VERSION@|$(version)|' -e 's|@SLIBDIR@|$(sLIBdir)|' \
+- -e 's|@BINDIR@|$(bindir)|' -e 's|@PKGVERSION@|$(PKGVERSION)|' \
++ sed -e 's|@BASH@|$(BASH)|' -e 's|@VERSION@|$(version)|' \
++ -e 's|@SLIBDIR@|$(sLIBdir)|' -e 's|@BINDIR@|$(bindir)|' \
++ -e 's|@PKGVERSION@|$(PKGVERSION)|' \
+ -e 's|@REPORT_BUGS_TO@|$(REPORT_BUGS_TO)|' $^ > $@.new \
+ && rm -f $@ && mv $@.new $@ && chmod +x $@
+
+diff --git a/malloc/memusage.sh b/malloc/memusage.sh
+index 0645f09911..c1cd4e23b7 100755
+--- a/malloc/memusage.sh
++++ b/malloc/memusage.sh
+@@ -1,4 +1,4 @@
+-#!/bin/bash
++#! @BASH@
+ # Copyright (C) 1999-2021 Free Software Foundation, Inc.
+ # This file is part of the GNU C Library.
+ # Contributed by Ulrich Drepper , 1999.
+diff --git a/timezone/Makefile b/timezone/Makefile
+index c624a189b3..395abfeebd 100644
+--- a/timezone/Makefile
++++ b/timezone/Makefile
+@@ -123,7 +123,8 @@ $(testdata)/XT%: testdata/XT%
+ cp $< $@
+
+ $(objpfx)tzselect: tzselect.ksh $(common-objpfx)config.make
+- sed -e 's|TZDIR=[^}]*|TZDIR=$(zonedir)|' \
++ sed -e 's|/bin/bash|$(BASH)|' \
++ -e 's|TZDIR=[^}]*|TZDIR=$(zonedir)|' \
+ -e '/TZVERSION=/s|see_Makefile|"$(version)"|' \
+ -e '/PKGVERSION=/s|=.*|="$(PKGVERSION)"|' \
+ -e '/REPORT_BUGS_TO=/s|=.*|="$(REPORT_BUGS_TO)"|' \
+--
+2.31.1
+
diff --git a/pkgs/development/libraries/glibc/2.33-master.patch.gz b/pkgs/development/libraries/glibc/2.33-master.patch.gz
deleted file mode 100644
index 777e94e2b2ea..000000000000
Binary files a/pkgs/development/libraries/glibc/2.33-master.patch.gz and /dev/null differ
diff --git a/pkgs/development/libraries/glibc/2.34-master.patch.gz b/pkgs/development/libraries/glibc/2.34-master.patch.gz
new file mode 100644
index 000000000000..8fb02ca6d721
Binary files /dev/null and b/pkgs/development/libraries/glibc/2.34-master.patch.gz differ
diff --git a/pkgs/development/libraries/glibc/common.nix b/pkgs/development/libraries/glibc/common.nix
index ffec9972d287..47aa304e7d39 100644
--- a/pkgs/development/libraries/glibc/common.nix
+++ b/pkgs/development/libraries/glibc/common.nix
@@ -43,9 +43,9 @@
} @ args:
let
- version = "2.33";
- patchSuffix = "-117";
- sha256 = "sha256-LiVWAA4QXb1X8Layoy/yzxc73k8Nhd/8z9i35RoGd/8=";
+ version = "2.34";
+ patchSuffix = "-115";
+ sha256 = "sha256-RNJqH+ILiFOkj0cOrQHkJ56GmsFJsZXdpORKGV2YGrI=";
in
assert withLinuxHeaders -> linuxHeaders != null;
@@ -62,14 +62,14 @@ stdenv.mkDerivation ({
patches =
[
/* No tarballs for stable upstream branch, only https://sourceware.org/git/glibc.git and using git would complicate bootstrapping.
- $ git fetch --all -p && git checkout origin/release/2.33/master && git describe
- glibc-2.33-117-g55446dd8a2
- $ git show --minimal --reverse glibc-2.33.. | gzip -9n --rsyncable - > 2.33-master.patch.gz
+ $ git fetch --all -p && git checkout origin/release/2.34/master && git describe
+ glibc-2.34-115-gd5d1c95aaf
+ $ git show --minimal --reverse glibc-2.34.. | gzip -9n --rsyncable - > 2.34-master.patch.gz
To compare the archive contents zdiff can be used.
- $ zdiff -u 2.33-master.patch.gz ../nixpkgs/pkgs/development/libraries/glibc/2.33-master.patch.gz
+ $ zdiff -u 2.34-master.patch.gz ../nixpkgs/pkgs/development/libraries/glibc/2.34-master.patch.gz
*/
- ./2.33-master.patch.gz
+ ./2.34-master.patch.gz
/* Allow NixOS and Nix to handle the locale-archive. */
./nix-locale-archive.patch
@@ -125,6 +125,8 @@ stdenv.mkDerivation ({
/* https://github.com/NixOS/nixpkgs/pull/137601 */
./nix-nss-open-files.patch
+
+ ./0001-Revert-Remove-all-usage-of-BASH-or-BASH-in-installed.patch
]
++ lib.optional stdenv.hostPlatform.isMusl ./fix-rpc-types-musl-conflicts.patch
++ lib.optional stdenv.buildPlatform.isDarwin ./darwin-cross-build.patch;
@@ -138,6 +140,10 @@ stdenv.mkDerivation ({
# nscd needs libgcc, and we don't want it dynamically linked
# because we don't want it to depend on bootstrap-tools libs.
echo "LDFLAGS-nscd += -static-libgcc" >> nscd/Makefile
+
+ # Ensure that `__nss_files_fopen` can still be wrapped by `libredirect`.
+ sed -i -e '/libc_hidden_def (__nss_files_fopen)/d' nss/nss_files_fopen.c
+ sed -i -e '/libc_hidden_proto (__nss_files_fopen)/d' include/nss_files.h
''
# FIXME: find a solution for infinite recursion in cross builds.
# For now it's hopefully acceptable that IDN from libc doesn't reliably work.
diff --git a/pkgs/development/libraries/glibc/default.nix b/pkgs/development/libraries/glibc/default.nix
index caaacfe4f436..65a622f04673 100644
--- a/pkgs/development/libraries/glibc/default.nix
+++ b/pkgs/development/libraries/glibc/default.nix
@@ -119,6 +119,17 @@ callPackage ./common.nix { inherit stdenv; } {
# Get rid of more unnecessary stuff.
rm -rf $out/var $bin/bin/sln
+
+ # Backwards-compatibility to fix e.g.
+ # "configure: error: Pthreads are required to build libgomp" during `gcc`-build
+ # because it's not actually needed anymore to link against `pthreads` since
+ # it's now part of `libc.so.6` itself, but the gcc build breaks if
+ # this doesn't work.
+ ln -sf $out/lib/libpthread.so.0 $out/lib/libpthread.so
+ ln -sf $out/lib/librt.so.1 $out/lib/librt.so
+ ln -sf $out/lib/libdl.so.2 $out/lib/libdl.so
+ ln -sf $out/lib/libutil.so.1 $out/lib/libutil.so
+ touch $out/lib/libpthread.a
''
# For some reason these aren't stripped otherwise and retain reference
# to bootstrap-tools; on cross-arm this stripping would break objects.
diff --git a/pkgs/development/libraries/glibc/nix-locale-archive.patch b/pkgs/development/libraries/glibc/nix-locale-archive.patch
index 39312951fcf9..2fedf2a7a7db 100644
--- a/pkgs/development/libraries/glibc/nix-locale-archive.patch
+++ b/pkgs/development/libraries/glibc/nix-locale-archive.patch
@@ -1,7 +1,8 @@
-diff -Naur glibc-2.27-orig/locale/loadarchive.c glibc-2.27/locale/loadarchive.c
---- glibc-2.27-orig/locale/loadarchive.c 2018-02-01 11:17:18.000000000 -0500
-+++ glibc-2.27/locale/loadarchive.c 2018-02-17 22:32:25.680169462 -0500
-@@ -123,6 +123,23 @@
+diff --git a/locale/loadarchive.c b/locale/loadarchive.c
+index 512769eaec..171dbb4ad9 100644
+--- a/locale/loadarchive.c
++++ b/locale/loadarchive.c
+@@ -123,6 +123,23 @@ calculate_head_size (const struct locarhead *h)
return MAX (namehash_end, MAX (string_end, locrectab_end));
}
@@ -25,7 +26,7 @@ diff -Naur glibc-2.27-orig/locale/loadarchive.c glibc-2.27/locale/loadarchive.c
/* Find the locale *NAMEP in the locale archive, and return the
internalized data structure for its CATEGORY data. If this locale has
-@@ -202,7 +219,7 @@
+@@ -202,7 +219,7 @@ _nl_load_locale_from_archive (int category, const char **namep)
archmapped = &headmap;
/* The archive has never been opened. */
@@ -34,23 +35,25 @@ diff -Naur glibc-2.27-orig/locale/loadarchive.c glibc-2.27/locale/loadarchive.c
if (fd < 0)
/* Cannot open the archive, for whatever reason. */
return NULL;
-@@ -397,8 +414,7 @@
+@@ -397,8 +414,7 @@ _nl_load_locale_from_archive (int category, const char **namep)
if (fd == -1)
{
- struct stat64 st;
+ struct __stat64_t64 st;
- fd = __open_nocancel (archfname,
- O_RDONLY|O_LARGEFILE|O_CLOEXEC);
-+ fd = open_locale_archive ();
++ fd = open_locale_archive();
if (fd == -1)
/* Cannot open the archive, for whatever reason. */
return NULL;
-diff -Naur glibc-2.27-orig/locale/programs/locale.c glibc-2.27/locale/programs/locale.c
---- glibc-2.27-orig/locale/programs/locale.c 2018-02-01 11:17:18.000000000 -0500
-+++ glibc-2.27/locale/programs/locale.c 2018-02-17 22:36:39.726293213 -0500
-@@ -633,6 +633,24 @@
+diff --git a/locale/programs/locale.c b/locale/programs/locale.c
+index ca0a95be99..e484783402 100644
+--- a/locale/programs/locale.c
++++ b/locale/programs/locale.c
+@@ -633,6 +633,24 @@ nameentcmp (const void *a, const void *b)
+ }
- static int
++static int
+open_locale_archive (void)
+{
+ int fd = -1;
@@ -68,11 +71,10 @@ diff -Naur glibc-2.27-orig/locale/programs/locale.c glibc-2.27/locale/programs/l
+}
+
+
-+static int
+ static int
write_archive_locales (void **all_datap, char *linebuf)
{
- struct stat64 st;
-@@ -644,7 +662,7 @@
+@@ -645,7 +663,7 @@ write_archive_locales (void **all_datap, char *linebuf)
int fd, ret = 0;
uint32_t cnt;
@@ -81,10 +83,11 @@ diff -Naur glibc-2.27-orig/locale/programs/locale.c glibc-2.27/locale/programs/l
if (fd < 0)
return 0;
-diff -Naur glibc-2.27-orig/locale/programs/locarchive.c glibc-2.27/locale/programs/locarchive.c
---- glibc-2.27-orig/locale/programs/locarchive.c 2018-02-01 11:17:18.000000000 -0500
-+++ glibc-2.27/locale/programs/locarchive.c 2018-02-17 22:40:51.245293975 -0500
-@@ -117,6 +117,22 @@
+diff --git a/locale/programs/locarchive.c b/locale/programs/locarchive.c
+index f38e835c52..779a3199fc 100644
+--- a/locale/programs/locarchive.c
++++ b/locale/programs/locarchive.c
+@@ -117,6 +117,22 @@ prepare_address_space (int fd, size_t total, size_t *reserved, int *xflags,
}
@@ -107,7 +110,7 @@ diff -Naur glibc-2.27-orig/locale/programs/locarchive.c glibc-2.27/locale/progra
static void
create_archive (const char *archivefname, struct locarhandle *ah)
{
-@@ -578,7 +594,7 @@
+@@ -578,7 +594,7 @@ open_archive (struct locarhandle *ah, bool readonly)
while (1)
{
/* Open the archive. We must have exclusive write access. */
diff --git a/pkgs/development/libraries/gmp/6.x.nix b/pkgs/development/libraries/gmp/6.x.nix
index 9093073cecff..af4f15a151f0 100644
--- a/pkgs/development/libraries/gmp/6.x.nix
+++ b/pkgs/development/libraries/gmp/6.x.nix
@@ -12,7 +12,7 @@
let inherit (lib) optional; in
let self = stdenv.mkDerivation rec {
- pname = "gmp";
+ pname = "gmp${lib.optionalString cxx "-with-cxx"}";
version = "6.2.1";
src = fetchurl { # we need to use bz2, others aren't in bootstrapping stdenv
diff --git a/pkgs/development/libraries/grpc/default.nix b/pkgs/development/libraries/grpc/default.nix
index 28c47640ca6a..37c2a1a44133 100644
--- a/pkgs/development/libraries/grpc/default.nix
+++ b/pkgs/development/libraries/grpc/default.nix
@@ -20,7 +20,7 @@
stdenv.mkDerivation rec {
pname = "grpc";
- version = "1.43.0"; # N.B: if you change this, please update:
+ version = "1.44.0"; # N.B: if you change this, please update:
# pythonPackages.grpcio-tools
# pythonPackages.grpcio-status
@@ -28,7 +28,7 @@ stdenv.mkDerivation rec {
owner = "grpc";
repo = "grpc";
rev = "v${version}";
- sha256 = "sha256-NPyCQsrmD/gBs4UHPGbBACmGRTNQDj6WfnfLNdWulK4=";
+ sha256 = "sha256-pG8RtAJJCLnxm+3hW1YsikyeNr9pjIRANeYhDJfTPbo=";
fetchSubmodules = true;
};
diff --git a/pkgs/development/libraries/gtkmm/2.x.nix b/pkgs/development/libraries/gtkmm/2.x.nix
index cf26e22da5bc..284ee83c2d4f 100644
--- a/pkgs/development/libraries/gtkmm/2.x.nix
+++ b/pkgs/development/libraries/gtkmm/2.x.nix
@@ -1,11 +1,11 @@
{ lib, stdenv, fetchurl, pkg-config, gtk2, glibmm, cairomm, pangomm, atkmm }:
stdenv.mkDerivation rec {
- name = "gtkmm-${minVer}.5";
- minVer = "2.24";
+ pname = "gtkmm";
+ version = "2.24.5";
src = fetchurl {
- url = "mirror://gnome/sources/gtkmm/${minVer}/${name}.tar.xz";
+ url = "mirror://gnome/sources/gtkmm/${lib.versions.majorMinor version}/gtkmm-${version}.tar.xz";
sha256 = "0680a53b7bf90b4e4bf444d1d89e6df41c777e0bacc96e9c09fc4dd2f5fe6b72";
};
diff --git a/pkgs/development/libraries/hspell/dicts.nix b/pkgs/development/libraries/hspell/dicts.nix
index 83942c2c1dde..06f80bf5cf22 100644
--- a/pkgs/development/libraries/hspell/dicts.nix
+++ b/pkgs/development/libraries/hspell/dicts.nix
@@ -2,7 +2,7 @@
let
dict = variant: a: stdenv.mkDerivation ({
- inherit (hspell) src patchPhase nativeBuildInputs;
+ inherit (hspell) version src patchPhase nativeBuildInputs;
buildFlags = [ variant ];
meta = hspell.meta // {
@@ -15,7 +15,7 @@ in
recurseForDerivations = true;
aspell = dict "aspell" {
- name = "aspell-dict-he-${hspell.version}";
+ pname = "aspell-dict-he";
installPhase = ''
mkdir -p $out/lib/aspell
@@ -23,7 +23,7 @@ in
};
myspell = dict "myspell" {
- name = "myspell-dict-he-${hspell.version}";
+ pname = "myspell-dict-he";
installPhase = ''
mkdir -p $out/lib/myspell
@@ -31,7 +31,7 @@ in
};
hunspell = dict "hunspell" {
- name = "hunspell-dict-he-${hspell.version}";
+ pname = "hunspell-dict-he";
installPhase = ''
mkdir -p $out/lib
diff --git a/pkgs/development/libraries/http-parser/default.nix b/pkgs/development/libraries/http-parser/default.nix
index 36ca0b0ca0b7..aff5b1ea3c18 100644
--- a/pkgs/development/libraries/http-parser/default.nix
+++ b/pkgs/development/libraries/http-parser/default.nix
@@ -1,4 +1,4 @@
-{ lib, stdenv, fetchFromGitHub }:
+{ lib, stdenv, fetchFromGitHub, fetchpatch }:
stdenv.mkDerivation rec {
pname = "http-parser";
@@ -12,7 +12,14 @@ stdenv.mkDerivation rec {
};
NIX_CFLAGS_COMPILE = "-Wno-error";
- patches = [ ./build-shared.patch ];
+ patches = [
+ ./build-shared.patch
+ # https://github.com/nodejs/http-parser/pull/510
+ (fetchpatch {
+ url = "https://github.com/nodejs/http-parser/commit/4f15b7d510dc7c6361a26a7c6d2f7c3a17f8d878.patch";
+ sha256 = "sha256-rZZMJeow3V1fTnjadRaRa+xTq3pdhZn/eJ4xjxEDoU4=";
+ })
+ ];
makeFlags = [ "DESTDIR=" "PREFIX=$(out)" ];
buildFlags = [ "library" ];
doCheck = true;
diff --git a/pkgs/development/libraries/ijs/default.nix b/pkgs/development/libraries/ijs/default.nix
index b300731ce440..ad13daef788d 100644
--- a/pkgs/development/libraries/ijs/default.nix
+++ b/pkgs/development/libraries/ijs/default.nix
@@ -1,9 +1,8 @@
{ lib, stdenv, autoreconfHook, ghostscript }:
stdenv.mkDerivation {
- name = "ijs-${ghostscript.version}";
-
- inherit (ghostscript) src;
+ pname = "ijs";
+ inherit (ghostscript) version src;
postPatch = "cd ijs";
diff --git a/pkgs/development/libraries/isl/generic.nix b/pkgs/development/libraries/isl/generic.nix
index eb6fe5f9cd69..0a8c89d88ad3 100644
--- a/pkgs/development/libraries/isl/generic.nix
+++ b/pkgs/development/libraries/isl/generic.nix
@@ -9,7 +9,8 @@
}:
stdenv.mkDerivation {
- name = "isl-${version}";
+ pname = "isl";
+ inherit version;
src = fetchurl {
inherit urls sha256;
diff --git a/pkgs/development/libraries/jcal/default.nix b/pkgs/development/libraries/jcal/default.nix
index 4ce62ec67bc4..354a5518c43d 100644
--- a/pkgs/development/libraries/jcal/default.nix
+++ b/pkgs/development/libraries/jcal/default.nix
@@ -3,7 +3,7 @@
}:
stdenv.mkDerivation rec {
- name = "jcal";
+ pname = "jcal";
version = "0.4.1";
src = fetchFromGitHub {
diff --git a/pkgs/development/libraries/kde-frameworks/attica.nix b/pkgs/development/libraries/kde-frameworks/attica.nix
index 8c71afd5dcf7..dbe4dd14b8f5 100644
--- a/pkgs/development/libraries/kde-frameworks/attica.nix
+++ b/pkgs/development/libraries/kde-frameworks/attica.nix
@@ -1,7 +1,7 @@
{ mkDerivation, extra-cmake-modules, qtbase }:
mkDerivation {
- name = "attica";
+ pname = "attica";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ qtbase ];
outputs = [ "out" "dev" ];
diff --git a/pkgs/development/libraries/kde-frameworks/baloo.nix b/pkgs/development/libraries/kde-frameworks/baloo.nix
index 0c8f181a188a..d608785027e8 100644
--- a/pkgs/development/libraries/kde-frameworks/baloo.nix
+++ b/pkgs/development/libraries/kde-frameworks/baloo.nix
@@ -6,7 +6,7 @@
}:
mkDerivation {
- name = "baloo";
+ pname = "baloo";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [
kauth kconfig kcrash kdbusaddons ki18n kio kidletime lmdb qtdeclarative
diff --git a/pkgs/development/libraries/kde-frameworks/bluez-qt.nix b/pkgs/development/libraries/kde-frameworks/bluez-qt.nix
index c5764b4915ed..c07553f8493f 100644
--- a/pkgs/development/libraries/kde-frameworks/bluez-qt.nix
+++ b/pkgs/development/libraries/kde-frameworks/bluez-qt.nix
@@ -4,7 +4,7 @@
}:
mkDerivation {
- name = "bluez-qt";
+ pname = "bluez-qt";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ qtdeclarative ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/breeze-icons.nix b/pkgs/development/libraries/kde-frameworks/breeze-icons.nix
index 6e79a45ea921..7fd482ea0da0 100644
--- a/pkgs/development/libraries/kde-frameworks/breeze-icons.nix
+++ b/pkgs/development/libraries/kde-frameworks/breeze-icons.nix
@@ -1,7 +1,7 @@
{ mkDerivation, extra-cmake-modules, gtk3, qtsvg, hicolor-icon-theme }:
mkDerivation {
- name = "breeze-icons";
+ pname = "breeze-icons";
nativeBuildInputs = [ extra-cmake-modules gtk3 ];
buildInputs = [ qtsvg ];
propagatedBuildInputs = [
diff --git a/pkgs/development/libraries/kde-frameworks/default.nix b/pkgs/development/libraries/kde-frameworks/default.nix
index a5b0bfdae8de..2f7d0943dd48 100644
--- a/pkgs/development/libraries/kde-frameworks/default.nix
+++ b/pkgs/development/libraries/kde-frameworks/default.nix
@@ -70,8 +70,8 @@ let
mkDerivation = args:
let
- inherit (args) name;
- inherit (srcs.${name}) src version;
+ inherit (args) pname;
+ inherit (srcs.${pname}) src version;
outputs = args.outputs or [ "bin" "dev" "out" ];
hasSeparateDev = lib.elem "dev" outputs;
@@ -90,8 +90,7 @@ let
};
in mkDerivation (args // {
- name = "${name}-${version}";
- inherit meta outputs setupHook src version;
+ inherit pname meta outputs setupHook src version;
});
};
diff --git a/pkgs/development/libraries/kde-frameworks/extra-cmake-modules/default.nix b/pkgs/development/libraries/kde-frameworks/extra-cmake-modules/default.nix
index b74fb29e5f2a..b274999010a2 100644
--- a/pkgs/development/libraries/kde-frameworks/extra-cmake-modules/default.nix
+++ b/pkgs/development/libraries/kde-frameworks/extra-cmake-modules/default.nix
@@ -1,7 +1,7 @@
{ mkDerivation, lib, cmake, pkg-config }:
mkDerivation {
- name = "extra-cmake-modules";
+ pname = "extra-cmake-modules";
patches = [
./nix-lib-path.patch
diff --git a/pkgs/development/libraries/kde-frameworks/fetch.sh b/pkgs/development/libraries/kde-frameworks/fetch.sh
index cb4e4cc26298..1e2e36d6784c 100644
--- a/pkgs/development/libraries/kde-frameworks/fetch.sh
+++ b/pkgs/development/libraries/kde-frameworks/fetch.sh
@@ -1 +1 @@
-WGET_ARGS=( https://download.kde.org/stable/frameworks/5.91/ -A '*.tar.xz' )
+WGET_ARGS=( https://download.kde.org/stable/frameworks/5.92/ -A '*.tar.xz' )
diff --git a/pkgs/development/libraries/kde-frameworks/frameworkintegration.nix b/pkgs/development/libraries/kde-frameworks/frameworkintegration.nix
index c49eab2763c5..6cb700c77744 100644
--- a/pkgs/development/libraries/kde-frameworks/frameworkintegration.nix
+++ b/pkgs/development/libraries/kde-frameworks/frameworkintegration.nix
@@ -6,7 +6,7 @@
}:
mkDerivation {
- name = "frameworkintegration";
+ pname = "frameworkintegration";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [
kbookmarks kcompletion kconfig ki18n kio knewstuff knotifications kpackage
diff --git a/pkgs/development/libraries/kde-frameworks/kactivities-stats.nix b/pkgs/development/libraries/kde-frameworks/kactivities-stats.nix
index 88fde8c5fd6d..63a5b0357241 100644
--- a/pkgs/development/libraries/kde-frameworks/kactivities-stats.nix
+++ b/pkgs/development/libraries/kde-frameworks/kactivities-stats.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kactivities-stats";
+ pname = "kactivities-stats";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ boost kactivities kconfig ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kactivities.nix b/pkgs/development/libraries/kde-frameworks/kactivities.nix
index b53de41455ad..f2f5d09cc8e6 100644
--- a/pkgs/development/libraries/kde-frameworks/kactivities.nix
+++ b/pkgs/development/libraries/kde-frameworks/kactivities.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kactivities";
+ pname = "kactivities";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [
boost kconfig kcoreaddons kio kwindowsystem qtdeclarative
diff --git a/pkgs/development/libraries/kde-frameworks/kapidox.nix b/pkgs/development/libraries/kde-frameworks/kapidox.nix
index 381dacaf4961..8d3e89935f8b 100644
--- a/pkgs/development/libraries/kde-frameworks/kapidox.nix
+++ b/pkgs/development/libraries/kde-frameworks/kapidox.nix
@@ -1,7 +1,7 @@
{ mkDerivation, lib, extra-cmake-modules, python3 }:
mkDerivation {
- name = "kapidox";
+ pname = "kapidox";
nativeBuildInputs = [ extra-cmake-modules python3 python3.pkgs.setuptools ];
postFixup = ''
moveToOutput bin $bin
diff --git a/pkgs/development/libraries/kde-frameworks/karchive.nix b/pkgs/development/libraries/kde-frameworks/karchive.nix
index bd010f3f11cf..822b28f3deea 100644
--- a/pkgs/development/libraries/kde-frameworks/karchive.nix
+++ b/pkgs/development/libraries/kde-frameworks/karchive.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "karchive";
+ pname = "karchive";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ bzip2 xz zlib zstd ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kauth/default.nix b/pkgs/development/libraries/kde-frameworks/kauth/default.nix
index 93c81525a148..f5ab518ce621 100644
--- a/pkgs/development/libraries/kde-frameworks/kauth/default.nix
+++ b/pkgs/development/libraries/kde-frameworks/kauth/default.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kauth";
+ pname = "kauth";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = lib.optional enablePolkit polkit-qt ++ [ qttools ];
propagatedBuildInputs = [ kcoreaddons ];
diff --git a/pkgs/development/libraries/kde-frameworks/kbookmarks.nix b/pkgs/development/libraries/kde-frameworks/kbookmarks.nix
index 4d68c3694bd3..1c45a4acb097 100644
--- a/pkgs/development/libraries/kde-frameworks/kbookmarks.nix
+++ b/pkgs/development/libraries/kde-frameworks/kbookmarks.nix
@@ -6,7 +6,7 @@
}:
mkDerivation {
- name = "kbookmarks";
+ pname = "kbookmarks";
nativeBuildInputs = [ extra-cmake-modules qttools ];
buildInputs = [
kcodecs kconfig kconfigwidgets kcoreaddons kiconthemes kxmlgui
diff --git a/pkgs/development/libraries/kde-frameworks/kcalendarcore.nix b/pkgs/development/libraries/kde-frameworks/kcalendarcore.nix
index f4f2b05ad736..3f02765af8ea 100644
--- a/pkgs/development/libraries/kde-frameworks/kcalendarcore.nix
+++ b/pkgs/development/libraries/kde-frameworks/kcalendarcore.nix
@@ -6,7 +6,7 @@
}:
mkDerivation {
- name = "kcalendarcore";
+ pname = "kcalendarcore";
nativeBuildInputs = [ extra-cmake-modules ];
propagatedBuildInputs = [ libical ];
outputs = [ "out" "dev" ];
diff --git a/pkgs/development/libraries/kde-frameworks/kcmutils/default.nix b/pkgs/development/libraries/kde-frameworks/kcmutils/default.nix
index 22e2929ae0cb..f965256ce3d4 100644
--- a/pkgs/development/libraries/kde-frameworks/kcmutils/default.nix
+++ b/pkgs/development/libraries/kde-frameworks/kcmutils/default.nix
@@ -6,7 +6,7 @@
}:
mkDerivation {
- name = "kcmutils";
+ pname = "kcmutils";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [
kcoreaddons kdeclarative ki18n kiconthemes kitemviews kpackage kxmlgui
diff --git a/pkgs/development/libraries/kde-frameworks/kcodecs.nix b/pkgs/development/libraries/kde-frameworks/kcodecs.nix
index a62135150a0f..69a9e812494e 100644
--- a/pkgs/development/libraries/kde-frameworks/kcodecs.nix
+++ b/pkgs/development/libraries/kde-frameworks/kcodecs.nix
@@ -1,7 +1,7 @@
{ mkDerivation, extra-cmake-modules, qtbase, qttools, gperf }:
mkDerivation {
- name = "kcodecs";
+ pname = "kcodecs";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ qttools gperf ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kcompletion.nix b/pkgs/development/libraries/kde-frameworks/kcompletion.nix
index ffa612ffaa19..28b4715f98f9 100644
--- a/pkgs/development/libraries/kde-frameworks/kcompletion.nix
+++ b/pkgs/development/libraries/kde-frameworks/kcompletion.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kcompletion";
+ pname = "kcompletion";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ kconfig kwidgetsaddons qttools ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kconfig.nix b/pkgs/development/libraries/kde-frameworks/kconfig.nix
index ba16e97ef3a6..76d9a85e649c 100644
--- a/pkgs/development/libraries/kde-frameworks/kconfig.nix
+++ b/pkgs/development/libraries/kde-frameworks/kconfig.nix
@@ -1,7 +1,7 @@
{ mkDerivation, extra-cmake-modules, qtbase, qttools }:
mkDerivation {
- name = "kconfig";
+ pname = "kconfig";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ qttools ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kconfigwidgets/default.nix b/pkgs/development/libraries/kde-frameworks/kconfigwidgets/default.nix
index fc10f3070b64..e9b283ebc318 100644
--- a/pkgs/development/libraries/kde-frameworks/kconfigwidgets/default.nix
+++ b/pkgs/development/libraries/kde-frameworks/kconfigwidgets/default.nix
@@ -4,7 +4,7 @@
}:
mkDerivation {
- name = "kconfigwidgets";
+ pname = "kconfigwidgets";
nativeBuildInputs = [ extra-cmake-modules kdoctools ];
buildInputs = [ kguiaddons ki18n qtbase qttools ];
propagatedBuildInputs = [ kauth kcodecs kconfig kwidgetsaddons ];
diff --git a/pkgs/development/libraries/kde-frameworks/kcontacts.nix b/pkgs/development/libraries/kde-frameworks/kcontacts.nix
index 56887b775f4a..0d26d064dd2b 100644
--- a/pkgs/development/libraries/kde-frameworks/kcontacts.nix
+++ b/pkgs/development/libraries/kde-frameworks/kcontacts.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kcontacts";
+ pname = "kcontacts";
meta = {
license = [ lib.licenses.lgpl21 ];
};
diff --git a/pkgs/development/libraries/kde-frameworks/kcoreaddons.nix b/pkgs/development/libraries/kde-frameworks/kcoreaddons.nix
index a2102c7d7323..f790d802c0ca 100644
--- a/pkgs/development/libraries/kde-frameworks/kcoreaddons.nix
+++ b/pkgs/development/libraries/kde-frameworks/kcoreaddons.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kcoreaddons";
+ pname = "kcoreaddons";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ qttools shared-mime-info ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kcrash.nix b/pkgs/development/libraries/kde-frameworks/kcrash.nix
index 27dc6d65edff..4658ab5c6dae 100644
--- a/pkgs/development/libraries/kde-frameworks/kcrash.nix
+++ b/pkgs/development/libraries/kde-frameworks/kcrash.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kcrash";
+ pname = "kcrash";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ kcoreaddons kwindowsystem qtx11extras ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kdav.nix b/pkgs/development/libraries/kde-frameworks/kdav.nix
index a03cca3fdf26..92d57158e320 100644
--- a/pkgs/development/libraries/kde-frameworks/kdav.nix
+++ b/pkgs/development/libraries/kde-frameworks/kdav.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kdav";
+ pname = "kdav";
meta = {
license = with lib.licenses; [ gpl2 lgpl21 fdl12 ];
};
diff --git a/pkgs/development/libraries/kde-frameworks/kdbusaddons.nix b/pkgs/development/libraries/kde-frameworks/kdbusaddons.nix
index 5c435b445414..b123129cf8d1 100644
--- a/pkgs/development/libraries/kde-frameworks/kdbusaddons.nix
+++ b/pkgs/development/libraries/kde-frameworks/kdbusaddons.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kdbusaddons";
+ pname = "kdbusaddons";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ qttools qtx11extras ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kdeclarative.nix b/pkgs/development/libraries/kde-frameworks/kdeclarative.nix
index 1389df5eb152..08f7cb5d3785 100644
--- a/pkgs/development/libraries/kde-frameworks/kdeclarative.nix
+++ b/pkgs/development/libraries/kde-frameworks/kdeclarative.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kdeclarative";
+ pname = "kdeclarative";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [
libepoxy kglobalaccel kguiaddons ki18n kiconthemes kio kwidgetsaddons
diff --git a/pkgs/development/libraries/kde-frameworks/kded.nix b/pkgs/development/libraries/kde-frameworks/kded.nix
index 250a999f4d6c..180d508acc58 100644
--- a/pkgs/development/libraries/kde-frameworks/kded.nix
+++ b/pkgs/development/libraries/kde-frameworks/kded.nix
@@ -6,7 +6,7 @@
}:
mkDerivation {
- name = "kded";
+ pname = "kded";
nativeBuildInputs = [ extra-cmake-modules kdoctools wrapGAppsHook ];
buildInputs = [
gsettings-desktop-schemas kconfig kcoreaddons kcrash kdbusaddons
diff --git a/pkgs/development/libraries/kde-frameworks/kdelibs4support/default.nix b/pkgs/development/libraries/kde-frameworks/kdelibs4support/default.nix
index 392aa9ea9025..1e7b30738752 100644
--- a/pkgs/development/libraries/kde-frameworks/kdelibs4support/default.nix
+++ b/pkgs/development/libraries/kde-frameworks/kdelibs4support/default.nix
@@ -9,7 +9,7 @@
}:
mkDerivation {
- name = "kdelibs4support";
+ pname = "kdelibs4support";
patches = [
./nix-kde-include-dir.patch
];
diff --git a/pkgs/development/libraries/kde-frameworks/kdesignerplugin.nix b/pkgs/development/libraries/kde-frameworks/kdesignerplugin.nix
index f1305274070f..6244b82397a2 100644
--- a/pkgs/development/libraries/kde-frameworks/kdesignerplugin.nix
+++ b/pkgs/development/libraries/kde-frameworks/kdesignerplugin.nix
@@ -6,7 +6,7 @@
}:
mkDerivation {
- name = "kdesignerplugin";
+ pname = "kdesignerplugin";
nativeBuildInputs = [ extra-cmake-modules kdoctools ];
buildInputs = [
kcompletion kconfig kconfigwidgets kcoreaddons kiconthemes kio kitemviews
diff --git a/pkgs/development/libraries/kde-frameworks/kdesu/default.nix b/pkgs/development/libraries/kde-frameworks/kdesu/default.nix
index 9a5f5a6942a8..fe506401da4e 100644
--- a/pkgs/development/libraries/kde-frameworks/kdesu/default.nix
+++ b/pkgs/development/libraries/kde-frameworks/kdesu/default.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kdesu";
+ pname = "kdesu";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ kcoreaddons ki18n kpty kservice qtbase ];
propagatedBuildInputs = [ kpty ];
diff --git a/pkgs/development/libraries/kde-frameworks/kdewebkit.nix b/pkgs/development/libraries/kde-frameworks/kdewebkit.nix
index 9f682b449752..b6d548cabfcd 100644
--- a/pkgs/development/libraries/kde-frameworks/kdewebkit.nix
+++ b/pkgs/development/libraries/kde-frameworks/kdewebkit.nix
@@ -3,7 +3,7 @@
}:
mkDerivation {
- name = "kdewebkit";
+ pname = "kdewebkit";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ kconfig kcoreaddons kio kparts ];
propagatedBuildInputs = [ qtwebkit ];
diff --git a/pkgs/development/libraries/kde-frameworks/kdnssd.nix b/pkgs/development/libraries/kde-frameworks/kdnssd.nix
index 8bb59bb36dba..545057e7ef1f 100644
--- a/pkgs/development/libraries/kde-frameworks/kdnssd.nix
+++ b/pkgs/development/libraries/kde-frameworks/kdnssd.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kdnssd";
+ pname = "kdnssd";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ avahi qttools ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kdoctools/default.nix b/pkgs/development/libraries/kde-frameworks/kdoctools/default.nix
index a87bef40b1e2..83f3a04ee36a 100644
--- a/pkgs/development/libraries/kde-frameworks/kdoctools/default.nix
+++ b/pkgs/development/libraries/kde-frameworks/kdoctools/default.nix
@@ -6,7 +6,7 @@
}:
mkDerivation {
- name = "kdoctools";
+ pname = "kdoctools";
nativeBuildInputs = [
extra-cmake-modules
# The build system insists on having native Perl.
diff --git a/pkgs/development/libraries/kde-frameworks/kemoticons.nix b/pkgs/development/libraries/kde-frameworks/kemoticons.nix
index 66a0889b13d2..67613d274a75 100644
--- a/pkgs/development/libraries/kde-frameworks/kemoticons.nix
+++ b/pkgs/development/libraries/kde-frameworks/kemoticons.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kemoticons";
+ pname = "kemoticons";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ karchive kcoreaddons ];
propagatedBuildInputs = [ kservice qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kfilemetadata/default.nix b/pkgs/development/libraries/kde-frameworks/kfilemetadata/default.nix
index 7c16dcf46507..782b03322143 100644
--- a/pkgs/development/libraries/kde-frameworks/kfilemetadata/default.nix
+++ b/pkgs/development/libraries/kde-frameworks/kfilemetadata/default.nix
@@ -15,7 +15,7 @@
}:
mkDerivation {
- name = "kfilemetadata";
+ pname = "kfilemetadata";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [
attr
diff --git a/pkgs/development/libraries/kde-frameworks/kglobalaccel.nix b/pkgs/development/libraries/kde-frameworks/kglobalaccel.nix
index 7001c98ee00f..ab181b8d902d 100644
--- a/pkgs/development/libraries/kde-frameworks/kglobalaccel.nix
+++ b/pkgs/development/libraries/kde-frameworks/kglobalaccel.nix
@@ -6,7 +6,7 @@
}:
mkDerivation {
- name = "kglobalaccel";
+ pname = "kglobalaccel";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [
kconfig kcoreaddons kcrash kdbusaddons kservice kwindowsystem qttools
diff --git a/pkgs/development/libraries/kde-frameworks/kguiaddons.nix b/pkgs/development/libraries/kde-frameworks/kguiaddons.nix
index bcd18ab614b6..d3575717592d 100644
--- a/pkgs/development/libraries/kde-frameworks/kguiaddons.nix
+++ b/pkgs/development/libraries/kde-frameworks/kguiaddons.nix
@@ -4,7 +4,7 @@
}:
mkDerivation {
- name = "kguiaddons";
+ pname = "kguiaddons";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ qtx11extras wayland ];
diff --git a/pkgs/development/libraries/kde-frameworks/kholidays.nix b/pkgs/development/libraries/kde-frameworks/kholidays.nix
index 2ede69e74953..9484dece57ed 100644
--- a/pkgs/development/libraries/kde-frameworks/kholidays.nix
+++ b/pkgs/development/libraries/kde-frameworks/kholidays.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kholidays";
+ pname = "kholidays";
meta = {
license = with lib.licenses; [ gpl2 lgpl21 fdl12 ];
maintainers = with lib.maintainers; [ bkchr ];
diff --git a/pkgs/development/libraries/kde-frameworks/khtml.nix b/pkgs/development/libraries/kde-frameworks/khtml.nix
index 3ef3a043c4e1..9677ffb78a5e 100644
--- a/pkgs/development/libraries/kde-frameworks/khtml.nix
+++ b/pkgs/development/libraries/kde-frameworks/khtml.nix
@@ -7,7 +7,7 @@
}:
mkDerivation {
- name = "khtml";
+ pname = "khtml";
nativeBuildInputs = [ extra-cmake-modules perl ];
buildInputs = [
giflib karchive kcodecs kglobalaccel ki18n kiconthemes kio knotifications
diff --git a/pkgs/development/libraries/kde-frameworks/ki18n.nix b/pkgs/development/libraries/kde-frameworks/ki18n.nix
index 46f502d06bb4..be8016155b87 100644
--- a/pkgs/development/libraries/kde-frameworks/ki18n.nix
+++ b/pkgs/development/libraries/kde-frameworks/ki18n.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "ki18n";
+ pname = "ki18n";
nativeBuildInputs = [ extra-cmake-modules ];
propagatedNativeBuildInputs = [ gettext python3 ];
buildInputs = [ qtdeclarative qtscript ];
diff --git a/pkgs/development/libraries/kde-frameworks/kiconthemes/default.nix b/pkgs/development/libraries/kde-frameworks/kiconthemes/default.nix
index 122f3108da44..f807193718d5 100644
--- a/pkgs/development/libraries/kde-frameworks/kiconthemes/default.nix
+++ b/pkgs/development/libraries/kde-frameworks/kiconthemes/default.nix
@@ -6,7 +6,7 @@
}:
mkDerivation {
- name = "kiconthemes";
+ pname = "kiconthemes";
patches = [
./default-theme-breeze.patch
];
diff --git a/pkgs/development/libraries/kde-frameworks/kidletime.nix b/pkgs/development/libraries/kde-frameworks/kidletime.nix
index 2678cf0804eb..6379a5e2e31b 100644
--- a/pkgs/development/libraries/kde-frameworks/kidletime.nix
+++ b/pkgs/development/libraries/kde-frameworks/kidletime.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kidletime";
+ pname = "kidletime";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ qtx11extras ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kimageformats.nix b/pkgs/development/libraries/kde-frameworks/kimageformats.nix
index 97b413e805c6..86026bf50f45 100644
--- a/pkgs/development/libraries/kde-frameworks/kimageformats.nix
+++ b/pkgs/development/libraries/kde-frameworks/kimageformats.nix
@@ -7,7 +7,7 @@
let inherit (lib) getDev; in
mkDerivation {
- name = "kimageformats";
+ pname = "kimageformats";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ karchive openexr libavif qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kinit/default.nix b/pkgs/development/libraries/kde-frameworks/kinit/default.nix
index dcd84f1f35a1..9acd56f324cb 100644
--- a/pkgs/development/libraries/kde-frameworks/kinit/default.nix
+++ b/pkgs/development/libraries/kde-frameworks/kinit/default.nix
@@ -7,7 +7,7 @@
let inherit (lib) getLib; in
mkDerivation {
- name = "kinit";
+ pname = "kinit";
outputs = [ "out" "dev" ];
nativeBuildInputs = [ extra-cmake-modules kdoctools ];
buildInputs = [
diff --git a/pkgs/development/libraries/kde-frameworks/kio/default.nix b/pkgs/development/libraries/kde-frameworks/kio/default.nix
index 5c05e0159b5b..7b2815945c8c 100644
--- a/pkgs/development/libraries/kde-frameworks/kio/default.nix
+++ b/pkgs/development/libraries/kde-frameworks/kio/default.nix
@@ -9,7 +9,7 @@
}:
mkDerivation {
- name = "kio";
+ pname = "kio";
nativeBuildInputs = [ extra-cmake-modules kdoctools ];
buildInputs = [
karchive kconfigwidgets kdbusaddons ki18n kiconthemes knotifications
diff --git a/pkgs/development/libraries/kde-frameworks/kirigami2.nix b/pkgs/development/libraries/kde-frameworks/kirigami2.nix
index bb5a5a3fc80f..281a490bf90a 100644
--- a/pkgs/development/libraries/kde-frameworks/kirigami2.nix
+++ b/pkgs/development/libraries/kde-frameworks/kirigami2.nix
@@ -1,7 +1,7 @@
{ mkDerivation, extra-cmake-modules, qtbase, qtquickcontrols2, qttranslations, qtgraphicaleffects }:
mkDerivation {
- name = "kirigami2";
+ pname = "kirigami2";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ qtbase qtquickcontrols2 qttranslations qtgraphicaleffects ];
outputs = [ "out" "dev" ];
diff --git a/pkgs/development/libraries/kde-frameworks/kitemmodels.nix b/pkgs/development/libraries/kde-frameworks/kitemmodels.nix
index 0f398b0f57d1..8abed8aaa090 100644
--- a/pkgs/development/libraries/kde-frameworks/kitemmodels.nix
+++ b/pkgs/development/libraries/kde-frameworks/kitemmodels.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kitemmodels";
+ pname = "kitemmodels";
nativeBuildInputs = [ extra-cmake-modules ];
propagatedBuildInputs = [ qtbase ];
outputs = [ "out" "dev" ];
diff --git a/pkgs/development/libraries/kde-frameworks/kitemviews.nix b/pkgs/development/libraries/kde-frameworks/kitemviews.nix
index 0e772978e191..ef350835f05d 100644
--- a/pkgs/development/libraries/kde-frameworks/kitemviews.nix
+++ b/pkgs/development/libraries/kde-frameworks/kitemviews.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kitemviews";
+ pname = "kitemviews";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ qttools ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kjobwidgets.nix b/pkgs/development/libraries/kde-frameworks/kjobwidgets.nix
index 2e116b7bb793..a4a6d5bb1025 100644
--- a/pkgs/development/libraries/kde-frameworks/kjobwidgets.nix
+++ b/pkgs/development/libraries/kde-frameworks/kjobwidgets.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kjobwidgets";
+ pname = "kjobwidgets";
nativeBuildInputs = [ extra-cmake-modules qttools ];
buildInputs = [ kcoreaddons kwidgetsaddons qtx11extras ];
}
diff --git a/pkgs/development/libraries/kde-frameworks/kjs.nix b/pkgs/development/libraries/kde-frameworks/kjs.nix
index 33aeb284e167..a0f985323747 100644
--- a/pkgs/development/libraries/kde-frameworks/kjs.nix
+++ b/pkgs/development/libraries/kde-frameworks/kjs.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kjs";
+ pname = "kjs";
nativeBuildInputs = [ extra-cmake-modules kdoctools ];
buildInputs = [ pcre qtbase ];
}
diff --git a/pkgs/development/libraries/kde-frameworks/kjsembed.nix b/pkgs/development/libraries/kde-frameworks/kjsembed.nix
index f552f963513d..576727e81d2f 100644
--- a/pkgs/development/libraries/kde-frameworks/kjsembed.nix
+++ b/pkgs/development/libraries/kde-frameworks/kjsembed.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kjsembed";
+ pname = "kjsembed";
nativeBuildInputs = [ extra-cmake-modules kdoctools qttools ];
buildInputs = [ ki18n qtsvg ];
propagatedBuildInputs = [ kjs ];
diff --git a/pkgs/development/libraries/kde-frameworks/kmediaplayer.nix b/pkgs/development/libraries/kde-frameworks/kmediaplayer.nix
index 5de26e0c8dcb..f92c22956511 100644
--- a/pkgs/development/libraries/kde-frameworks/kmediaplayer.nix
+++ b/pkgs/development/libraries/kde-frameworks/kmediaplayer.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kmediaplayer";
+ pname = "kmediaplayer";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ kparts kxmlgui ];
}
diff --git a/pkgs/development/libraries/kde-frameworks/knewstuff/default.nix b/pkgs/development/libraries/kde-frameworks/knewstuff/default.nix
index 6d170c0bb129..6e554b5faaad 100644
--- a/pkgs/development/libraries/kde-frameworks/knewstuff/default.nix
+++ b/pkgs/development/libraries/kde-frameworks/knewstuff/default.nix
@@ -7,7 +7,7 @@
}:
mkDerivation {
- name = "knewstuff";
+ pname = "knewstuff";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [
karchive kcompletion kconfig kcoreaddons ki18n kiconthemes kio kitemviews
diff --git a/pkgs/development/libraries/kde-frameworks/knotifications.nix b/pkgs/development/libraries/kde-frameworks/knotifications.nix
index d1a809d9f516..363ca46d10ae 100644
--- a/pkgs/development/libraries/kde-frameworks/knotifications.nix
+++ b/pkgs/development/libraries/kde-frameworks/knotifications.nix
@@ -7,7 +7,7 @@
}:
mkDerivation {
- name = "knotifications";
+ pname = "knotifications";
nativeBuildInputs = [ extra-cmake-modules qttools ];
buildInputs = [
kcodecs kconfig kcoreaddons kwindowsystem libdbusmenu phonon qtx11extras
diff --git a/pkgs/development/libraries/kde-frameworks/knotifyconfig.nix b/pkgs/development/libraries/kde-frameworks/knotifyconfig.nix
index 1971e3e8039b..b2415d731ff0 100644
--- a/pkgs/development/libraries/kde-frameworks/knotifyconfig.nix
+++ b/pkgs/development/libraries/kde-frameworks/knotifyconfig.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "knotifyconfig";
+ pname = "knotifyconfig";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ kcompletion kconfig ki18n kio phonon ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kpackage/default.nix b/pkgs/development/libraries/kde-frameworks/kpackage/default.nix
index d4edc09b2f00..c1d9bf387fc5 100644
--- a/pkgs/development/libraries/kde-frameworks/kpackage/default.nix
+++ b/pkgs/development/libraries/kde-frameworks/kpackage/default.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kpackage";
+ pname = "kpackage";
nativeBuildInputs = [ extra-cmake-modules kdoctools ];
buildInputs = [ karchive kconfig kcoreaddons ki18n qtbase ];
patches = [
diff --git a/pkgs/development/libraries/kde-frameworks/kparts.nix b/pkgs/development/libraries/kde-frameworks/kparts.nix
index e1d2a156160d..682c2da63132 100644
--- a/pkgs/development/libraries/kde-frameworks/kparts.nix
+++ b/pkgs/development/libraries/kde-frameworks/kparts.nix
@@ -6,7 +6,7 @@
}:
mkDerivation {
- name = "kparts";
+ pname = "kparts";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [
kconfig kcoreaddons ki18n kiconthemes kjobwidgets knotifications kservice
diff --git a/pkgs/development/libraries/kde-frameworks/kpeople.nix b/pkgs/development/libraries/kde-frameworks/kpeople.nix
index 52c16ea2b9c2..433cc6b6e113 100644
--- a/pkgs/development/libraries/kde-frameworks/kpeople.nix
+++ b/pkgs/development/libraries/kde-frameworks/kpeople.nix
@@ -6,7 +6,7 @@
}:
mkDerivation {
- name = "kpeople";
+ pname = "kpeople";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [
kcoreaddons ki18n kitemviews kservice kwidgetsaddons qtdeclarative
diff --git a/pkgs/development/libraries/kde-frameworks/kplotting.nix b/pkgs/development/libraries/kde-frameworks/kplotting.nix
index 68df24d0087b..eb26b252566b 100644
--- a/pkgs/development/libraries/kde-frameworks/kplotting.nix
+++ b/pkgs/development/libraries/kde-frameworks/kplotting.nix
@@ -3,7 +3,7 @@
}:
mkDerivation {
- name = "kplotting";
+ pname = "kplotting";
nativeBuildInputs = [ extra-cmake-modules ];
propagatedBuildInputs = [ qtbase qttools ];
outputs = [ "out" "dev" ];
diff --git a/pkgs/development/libraries/kde-frameworks/kpty.nix b/pkgs/development/libraries/kde-frameworks/kpty.nix
index 2456f4e22fab..239407d6abdf 100644
--- a/pkgs/development/libraries/kde-frameworks/kpty.nix
+++ b/pkgs/development/libraries/kde-frameworks/kpty.nix
@@ -1,7 +1,7 @@
{ mkDerivation, extra-cmake-modules, kcoreaddons, ki18n, qtbase, }:
mkDerivation {
- name = "kpty";
+ pname = "kpty";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ kcoreaddons ki18n qtbase ];
outputs = [ "out" "dev" ];
diff --git a/pkgs/development/libraries/kde-frameworks/kquickcharts.nix b/pkgs/development/libraries/kde-frameworks/kquickcharts.nix
index 0ae30be653d4..20c1b2368a7b 100644
--- a/pkgs/development/libraries/kde-frameworks/kquickcharts.nix
+++ b/pkgs/development/libraries/kde-frameworks/kquickcharts.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kquickcharts";
+ pname = "kquickcharts";
nativeBuildInputs = [ extra-cmake-modules ];
propagatedBuildInputs = [ qtquickcontrols2 ];
outputs = [ "out" "dev" ];
diff --git a/pkgs/development/libraries/kde-frameworks/kross.nix b/pkgs/development/libraries/kde-frameworks/kross.nix
index 189e100aa70c..7cc083e5a261 100644
--- a/pkgs/development/libraries/kde-frameworks/kross.nix
+++ b/pkgs/development/libraries/kde-frameworks/kross.nix
@@ -4,7 +4,7 @@
}:
mkDerivation {
- name = "kross";
+ pname = "kross";
nativeBuildInputs = [ extra-cmake-modules kdoctools ];
buildInputs = [ kcompletion kcoreaddons kxmlgui ];
propagatedBuildInputs = [
diff --git a/pkgs/development/libraries/kde-frameworks/krunner.nix b/pkgs/development/libraries/kde-frameworks/krunner.nix
index 7db7c61db466..a56e56a2fe09 100644
--- a/pkgs/development/libraries/kde-frameworks/krunner.nix
+++ b/pkgs/development/libraries/kde-frameworks/krunner.nix
@@ -7,7 +7,7 @@
let
self = mkDerivation {
- name = "krunner";
+ pname = "krunner";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [
kconfig kcoreaddons ki18n kio kservice qtdeclarative solid
diff --git a/pkgs/development/libraries/kde-frameworks/kservice/default.nix b/pkgs/development/libraries/kde-frameworks/kservice/default.nix
index c1488f728dd6..008c52cf0785 100644
--- a/pkgs/development/libraries/kde-frameworks/kservice/default.nix
+++ b/pkgs/development/libraries/kde-frameworks/kservice/default.nix
@@ -6,7 +6,7 @@
}:
mkDerivation {
- name = "kservice";
+ pname = "kservice";
nativeBuildInputs = [ extra-cmake-modules kdoctools ];
propagatedNativeBuildInputs = [ bison flex ];
buildInputs = [
diff --git a/pkgs/development/libraries/kde-frameworks/ktexteditor.nix b/pkgs/development/libraries/kde-frameworks/ktexteditor.nix
index 6a74dca7b4bd..5788c07cb05c 100644
--- a/pkgs/development/libraries/kde-frameworks/ktexteditor.nix
+++ b/pkgs/development/libraries/kde-frameworks/ktexteditor.nix
@@ -7,7 +7,7 @@
}:
mkDerivation {
- name = "ktexteditor";
+ pname = "ktexteditor";
nativeBuildInputs = [ extra-cmake-modules perl ];
buildInputs = [
karchive kconfig kguiaddons ki18n kiconthemes kio libgit2 qtscript
diff --git a/pkgs/development/libraries/kde-frameworks/ktextwidgets.nix b/pkgs/development/libraries/kde-frameworks/ktextwidgets.nix
index 653d0ac8899b..6ce7aa88c3a6 100644
--- a/pkgs/development/libraries/kde-frameworks/ktextwidgets.nix
+++ b/pkgs/development/libraries/kde-frameworks/ktextwidgets.nix
@@ -6,7 +6,7 @@
}:
mkDerivation {
- name = "ktextwidgets";
+ pname = "ktextwidgets";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [
kcompletion kconfig kconfigwidgets kiconthemes kservice kwindowsystem
diff --git a/pkgs/development/libraries/kde-frameworks/kunitconversion.nix b/pkgs/development/libraries/kde-frameworks/kunitconversion.nix
index de0d9aab922e..aa4c87a1e5f9 100644
--- a/pkgs/development/libraries/kde-frameworks/kunitconversion.nix
+++ b/pkgs/development/libraries/kde-frameworks/kunitconversion.nix
@@ -1,7 +1,7 @@
{ mkDerivation, extra-cmake-modules, ki18n, qtbase, }:
mkDerivation {
- name = "kunitconversion";
+ pname = "kunitconversion";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ ki18n qtbase ];
outputs = [ "out" "dev" ];
diff --git a/pkgs/development/libraries/kde-frameworks/kwallet.nix b/pkgs/development/libraries/kde-frameworks/kwallet.nix
index f93f0437dbd1..e2a54a03f6e6 100644
--- a/pkgs/development/libraries/kde-frameworks/kwallet.nix
+++ b/pkgs/development/libraries/kde-frameworks/kwallet.nix
@@ -7,7 +7,7 @@
}:
mkDerivation {
- name = "kwallet";
+ pname = "kwallet";
nativeBuildInputs = [ extra-cmake-modules kdoctools ];
buildInputs = [
kconfig kconfigwidgets kcoreaddons kdbusaddons ki18n kiconthemes
diff --git a/pkgs/development/libraries/kde-frameworks/kwayland.nix b/pkgs/development/libraries/kde-frameworks/kwayland.nix
index 749735c4ad58..6a070d227808 100644
--- a/pkgs/development/libraries/kde-frameworks/kwayland.nix
+++ b/pkgs/development/libraries/kde-frameworks/kwayland.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kwayland";
+ pname = "kwayland";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ plasma-wayland-protocols wayland wayland-protocols ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kwidgetsaddons.nix b/pkgs/development/libraries/kde-frameworks/kwidgetsaddons.nix
index ee347df18ab8..0fead3bfd6ba 100644
--- a/pkgs/development/libraries/kde-frameworks/kwidgetsaddons.nix
+++ b/pkgs/development/libraries/kde-frameworks/kwidgetsaddons.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "kwidgetsaddons";
+ pname = "kwidgetsaddons";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ qttools ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kwindowsystem/default.nix b/pkgs/development/libraries/kde-frameworks/kwindowsystem/default.nix
index 7643572a7ec0..ec102dbb342a 100644
--- a/pkgs/development/libraries/kde-frameworks/kwindowsystem/default.nix
+++ b/pkgs/development/libraries/kde-frameworks/kwindowsystem/default.nix
@@ -6,7 +6,7 @@
}:
mkDerivation {
- name = "kwindowsystem";
+ pname = "kwindowsystem";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ libpthreadstubs libXdmcp qttools qtx11extras ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/kxmlgui.nix b/pkgs/development/libraries/kde-frameworks/kxmlgui.nix
index 0b29158e4b06..c666edbc196d 100644
--- a/pkgs/development/libraries/kde-frameworks/kxmlgui.nix
+++ b/pkgs/development/libraries/kde-frameworks/kxmlgui.nix
@@ -6,7 +6,7 @@
}:
mkDerivation {
- name = "kxmlgui";
+ pname = "kxmlgui";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [
attica kglobalaccel ki18n kiconthemes kitemviews ktextwidgets kwindowsystem
diff --git a/pkgs/development/libraries/kde-frameworks/kxmlrpcclient.nix b/pkgs/development/libraries/kde-frameworks/kxmlrpcclient.nix
index aa334d69ef1d..3b2d869d1777 100644
--- a/pkgs/development/libraries/kde-frameworks/kxmlrpcclient.nix
+++ b/pkgs/development/libraries/kde-frameworks/kxmlrpcclient.nix
@@ -1,7 +1,7 @@
{ mkDerivation, extra-cmake-modules, ki18n, kio }:
mkDerivation {
- name = "kxmlrpcclient";
+ pname = "kxmlrpcclient";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ ki18n ];
propagatedBuildInputs = [ kio ];
diff --git a/pkgs/development/libraries/kde-frameworks/modemmanager-qt.nix b/pkgs/development/libraries/kde-frameworks/modemmanager-qt.nix
index 5ecb5317cfcc..507e24e8f61e 100644
--- a/pkgs/development/libraries/kde-frameworks/modemmanager-qt.nix
+++ b/pkgs/development/libraries/kde-frameworks/modemmanager-qt.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "modemmanager-qt";
+ pname = "modemmanager-qt";
nativeBuildInputs = [ extra-cmake-modules ];
propagatedBuildInputs = [ modemmanager qtbase ];
outputs = [ "out" "dev" ];
diff --git a/pkgs/development/libraries/kde-frameworks/networkmanager-qt.nix b/pkgs/development/libraries/kde-frameworks/networkmanager-qt.nix
index 2ff4b2c2b408..b79c79b084da 100644
--- a/pkgs/development/libraries/kde-frameworks/networkmanager-qt.nix
+++ b/pkgs/development/libraries/kde-frameworks/networkmanager-qt.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "networkmanager-qt";
+ pname = "networkmanager-qt";
nativeBuildInputs = [ extra-cmake-modules ];
propagatedBuildInputs = [ networkmanager qtbase ];
outputs = [ "out" "dev" ];
diff --git a/pkgs/development/libraries/kde-frameworks/oxygen-icons5.nix b/pkgs/development/libraries/kde-frameworks/oxygen-icons5.nix
index 32b219ab7e1c..7121944d5d39 100644
--- a/pkgs/development/libraries/kde-frameworks/oxygen-icons5.nix
+++ b/pkgs/development/libraries/kde-frameworks/oxygen-icons5.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "oxygen-icons5";
+ pname = "oxygen-icons5";
meta.license = lib.licenses.lgpl3Plus;
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/plasma-framework.nix b/pkgs/development/libraries/kde-frameworks/plasma-framework.nix
index 12540b07007c..cf118beaabce 100644
--- a/pkgs/development/libraries/kde-frameworks/plasma-framework.nix
+++ b/pkgs/development/libraries/kde-frameworks/plasma-framework.nix
@@ -8,7 +8,7 @@
}:
mkDerivation {
- name = "plasma-framework";
+ pname = "plasma-framework";
nativeBuildInputs = [ extra-cmake-modules kdoctools ];
buildInputs = [
kactivities karchive kconfig kconfigwidgets kcoreaddons kdbusaddons
diff --git a/pkgs/development/libraries/kde-frameworks/prison.nix b/pkgs/development/libraries/kde-frameworks/prison.nix
index 670fd02d6161..c2063e22bba7 100644
--- a/pkgs/development/libraries/kde-frameworks/prison.nix
+++ b/pkgs/development/libraries/kde-frameworks/prison.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "prison";
+ pname = "prison";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ libdmtx qrencode ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/purpose.nix b/pkgs/development/libraries/kde-frameworks/purpose.nix
index 0f376ce9ec3a..ee4e9584641c 100644
--- a/pkgs/development/libraries/kde-frameworks/purpose.nix
+++ b/pkgs/development/libraries/kde-frameworks/purpose.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "purpose";
+ pname = "purpose";
nativeBuildInputs = [ extra-cmake-modules intltool ];
buildInputs = [
qtbase accounts-qt qtdeclarative kaccounts-integration kconfig kcoreaddons
diff --git a/pkgs/development/libraries/kde-frameworks/qqc2-desktop-style.nix b/pkgs/development/libraries/kde-frameworks/qqc2-desktop-style.nix
index e400967407c6..6d8635c4f283 100644
--- a/pkgs/development/libraries/kde-frameworks/qqc2-desktop-style.nix
+++ b/pkgs/development/libraries/kde-frameworks/qqc2-desktop-style.nix
@@ -8,7 +8,7 @@
}:
mkDerivation {
- name = "qqc2-desktop-style";
+ pname = "qqc2-desktop-style";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ qtx11extras qtquickcontrols2 kconfig kiconthemes kirigami2 ];
}
diff --git a/pkgs/development/libraries/kde-frameworks/solid.nix b/pkgs/development/libraries/kde-frameworks/solid.nix
index aa1b1ebe3458..69ef8c8adca3 100644
--- a/pkgs/development/libraries/kde-frameworks/solid.nix
+++ b/pkgs/development/libraries/kde-frameworks/solid.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "solid";
+ pname = "solid";
nativeBuildInputs = [ bison extra-cmake-modules flex media-player-info ];
buildInputs = [ qtdeclarative qttools ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/sonnet.nix b/pkgs/development/libraries/kde-frameworks/sonnet.nix
index 2eff7bad2402..78aa189559fc 100644
--- a/pkgs/development/libraries/kde-frameworks/sonnet.nix
+++ b/pkgs/development/libraries/kde-frameworks/sonnet.nix
@@ -4,7 +4,7 @@
}:
mkDerivation {
- name = "sonnet";
+ pname = "sonnet";
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ aspell qttools ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/srcs.nix b/pkgs/development/libraries/kde-frameworks/srcs.nix
index 2b3983a892c8..1cddd857dda8 100644
--- a/pkgs/development/libraries/kde-frameworks/srcs.nix
+++ b/pkgs/development/libraries/kde-frameworks/srcs.nix
@@ -4,667 +4,667 @@
{
attica = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/attica-5.91.0.tar.xz";
- sha256 = "0svvy7qflidwxns12y2lra54gg6lhglcddzmrw7ccvbdyqcy2pn0";
- name = "attica-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/attica-5.92.0.tar.xz";
+ sha256 = "0cy9dd8kazfkhas87bxjj5smmzay3gvkjwsmy6gvkfxc6rvpqr5z";
+ name = "attica-5.92.0.tar.xz";
};
};
baloo = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/baloo-5.91.0.tar.xz";
- sha256 = "1cqjbaiwqba707xaz9zsrdz9cms2mdrhv6jpwsq8q7f4g4rxcx3m";
- name = "baloo-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/baloo-5.92.0.tar.xz";
+ sha256 = "0xd4a0p22gjm523ymlyd5nfgp8z3ayb0nq6a04h5py507mc70d98";
+ name = "baloo-5.92.0.tar.xz";
};
};
bluez-qt = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/bluez-qt-5.91.0.tar.xz";
- sha256 = "0p37jrmppwahh4vaq3wkw6xn0ms8dxcxpfd4glzjlnw426zrwnjr";
- name = "bluez-qt-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/bluez-qt-5.92.0.tar.xz";
+ sha256 = "1dlasb39kqrcql6hq0sl74ax3n5bdcy3pkhvc9vwpf9dxn1j93gm";
+ name = "bluez-qt-5.92.0.tar.xz";
};
};
breeze-icons = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/breeze-icons-5.91.0.tar.xz";
- sha256 = "0aj24gn48c17n9jzrj0az04ph4hpx7zf2rj4vgwl19iip69vfzf1";
- name = "breeze-icons-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/breeze-icons-5.92.0.tar.xz";
+ sha256 = "0rj30r52ca6njx00gmmni4k70yn8873ihxfbc66lklwzk1irdq29";
+ name = "breeze-icons-5.92.0.tar.xz";
};
};
extra-cmake-modules = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/extra-cmake-modules-5.91.0.tar.xz";
- sha256 = "0k65rvxh926ya6qahzk2ns7g1fya1429648mlx7iipxa61g8h5wp";
- name = "extra-cmake-modules-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/extra-cmake-modules-5.92.0.tar.xz";
+ sha256 = "1vq3sd4qfr4hjcgqyfpykcz5wyagbfvrd4p24pdki1zjqn5j76pq";
+ name = "extra-cmake-modules-5.92.0.tar.xz";
};
};
frameworkintegration = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/frameworkintegration-5.91.0.tar.xz";
- sha256 = "1176ql8f96ap4gzjaj8vm4cr6f2rsx9z93gpc4hx4jcqjhxqrg3z";
- name = "frameworkintegration-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/frameworkintegration-5.92.0.tar.xz";
+ sha256 = "0pgcwfxxzvfvqyjfgqzsllzfy9il4y8xr8dzdyjmd5vccpvgd3mx";
+ name = "frameworkintegration-5.92.0.tar.xz";
};
};
kactivities = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kactivities-5.91.0.tar.xz";
- sha256 = "03y4hx7jgrhac12ys8pm22h0f49kms8b71gck4xv577p3ywi3j60";
- name = "kactivities-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kactivities-5.92.0.tar.xz";
+ sha256 = "1kfvg23gdl4k6azs6700j8i8ncl8c7rrc70w1i2xhphz27ybc1pw";
+ name = "kactivities-5.92.0.tar.xz";
};
};
kactivities-stats = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kactivities-stats-5.91.0.tar.xz";
- sha256 = "0864qfljh20723djfzdv8h6nipw01825lhiknyqz17aj2x2ymzcq";
- name = "kactivities-stats-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kactivities-stats-5.92.0.tar.xz";
+ sha256 = "0lgp7zxgjmjm02x4mydlv6ivmlxqjkklav5vfwgjgf6v1qp161i2";
+ name = "kactivities-stats-5.92.0.tar.xz";
};
};
kapidox = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kapidox-5.91.0.tar.xz";
- sha256 = "1xxpl8rn49d2cr7ld94j3wsg21019l2kq14p5bvilisnj3salka3";
- name = "kapidox-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kapidox-5.92.0.tar.xz";
+ sha256 = "0vd5k4wmmawbhyy3cxj0gjidf4haghwbsbly9yr3zg3qb3g02ljg";
+ name = "kapidox-5.92.0.tar.xz";
};
};
karchive = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/karchive-5.91.0.tar.xz";
- sha256 = "1kjc47zzdd9jhcmynq6zw6y6zaj2c1i8pxvszx3d9x5asaz2qq53";
- name = "karchive-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/karchive-5.92.0.tar.xz";
+ sha256 = "1blzm6vf8kpflam4671r1y4svrsb79bglln7aia7baqh7a6a4xjh";
+ name = "karchive-5.92.0.tar.xz";
};
};
kauth = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kauth-5.91.0.tar.xz";
- sha256 = "001svdyvs8qc6h8zkb9x072npkz6xabz6j0djjb380gl9h9wnrgq";
- name = "kauth-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kauth-5.92.0.tar.xz";
+ sha256 = "0a27z9xr5ccxfcxmx93vs4hgxc388nsd9ac906mdh475ivv4p0j4";
+ name = "kauth-5.92.0.tar.xz";
};
};
kbookmarks = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kbookmarks-5.91.0.tar.xz";
- sha256 = "0iqfngsvpbgxk6h8l68idcp97df28sa2zwj707zs0mf2bl9k68m4";
- name = "kbookmarks-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kbookmarks-5.92.0.tar.xz";
+ sha256 = "0hym3558xnp3h7q8kf1ljcy65r3g37mcmqb1ll3nxd912rv4wl4r";
+ name = "kbookmarks-5.92.0.tar.xz";
};
};
kcalendarcore = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kcalendarcore-5.91.0.tar.xz";
- sha256 = "0gkn0mzk3za86pjrpi8gd9d71bfv0ihzkgn8yy1ik3dw1rf9gxip";
- name = "kcalendarcore-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kcalendarcore-5.92.0.tar.xz";
+ sha256 = "0fhbas8i7i08z4x32yq49admiz8vk4h9vwgkh7qy14lbzf6ydwkg";
+ name = "kcalendarcore-5.92.0.tar.xz";
};
};
kcmutils = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kcmutils-5.91.0.tar.xz";
- sha256 = "009r9r7fz1588g2cnqw585d2fz170x8j8bip1zqr7i4jl21ms68s";
- name = "kcmutils-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kcmutils-5.92.0.tar.xz";
+ sha256 = "0fldpkhq4ysma4m6qylr7kqvxw0rb11x5abz5921bhl5zicfcjfx";
+ name = "kcmutils-5.92.0.tar.xz";
};
};
kcodecs = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kcodecs-5.91.0.tar.xz";
- sha256 = "0qkwvbp4vp3w57f3fyjknxd66qac77hl77mf042c7jxjl5vq7h1y";
- name = "kcodecs-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kcodecs-5.92.0.tar.xz";
+ sha256 = "0xfjc0diljx081as3b500awybay9l3sfl59792h5z3clafjbgrfn";
+ name = "kcodecs-5.92.0.tar.xz";
};
};
kcompletion = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kcompletion-5.91.0.tar.xz";
- sha256 = "1l6z85a4rh3vrf4x5g3pqvp0q36gwmw0fbp9ny1iaqyy21dlh8i4";
- name = "kcompletion-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kcompletion-5.92.0.tar.xz";
+ sha256 = "1svwvj9jxkgcddfdila10ggdmsabs22vnhf9k7isp2zfdif55w88";
+ name = "kcompletion-5.92.0.tar.xz";
};
};
kconfig = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kconfig-5.91.0.tar.xz";
- sha256 = "0axdnqipa8xgx864zylxllnzchlp50q59bbfw3c98svvvkm3yg56";
- name = "kconfig-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kconfig-5.92.0.tar.xz";
+ sha256 = "08q57f3wxj22d485s0ph53p44yrkjb376817470a0s43p10vc0bq";
+ name = "kconfig-5.92.0.tar.xz";
};
};
kconfigwidgets = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kconfigwidgets-5.91.0.tar.xz";
- sha256 = "01mvv01hv64wadjh8xk3hhp1vbs04cvbrjpfl1g9cv2sa6hr7102";
- name = "kconfigwidgets-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kconfigwidgets-5.92.0.tar.xz";
+ sha256 = "0ji799xd45lpnd70a9bizicfz2bsmlxq6r0fqgn0ghwsbp9ywna2";
+ name = "kconfigwidgets-5.92.0.tar.xz";
};
};
kcontacts = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kcontacts-5.91.0.tar.xz";
- sha256 = "1c839c9rvys3jwmi3fzw06r1nhgvrb4z8sdh8gda0w03vqh7h1hv";
- name = "kcontacts-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kcontacts-5.92.0.tar.xz";
+ sha256 = "1kik4pvy8snvj6rsc9pfbcpc8rrcn0k4pjj1h9m221zma1p00xhj";
+ name = "kcontacts-5.92.0.tar.xz";
};
};
kcoreaddons = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kcoreaddons-5.91.0.tar.xz";
- sha256 = "16vimllvcs6rnb1ccbv9zg8hxbzacisgrlffyvwm608f4q1xmqyz";
- name = "kcoreaddons-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kcoreaddons-5.92.0.tar.xz";
+ sha256 = "0rv63byrxwf9zdpx347rxybpk2j9yyjqm323j60vb8ja6a7p2pyz";
+ name = "kcoreaddons-5.92.0.tar.xz";
};
};
kcrash = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kcrash-5.91.0.tar.xz";
- sha256 = "0gdknmp5a36ipvzms4jhxywyxpjh0vy26861c54jfsk13yircjal";
- name = "kcrash-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kcrash-5.92.0.tar.xz";
+ sha256 = "1ir64mlv49vh3vz81r22q3sx0fichiwjr8qw5jf5vx96a1dn1icv";
+ name = "kcrash-5.92.0.tar.xz";
};
};
kdav = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kdav-5.91.0.tar.xz";
- sha256 = "026w3bk2lmc7lqzra8w9jq8i2l1hvqsxz36r1jzj9p01skhdm32v";
- name = "kdav-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kdav-5.92.0.tar.xz";
+ sha256 = "1i5i6bkjairz1slk3fhrxd3s8wkcdaqg55jg2bv86kqh7d3nrcgk";
+ name = "kdav-5.92.0.tar.xz";
};
};
kdbusaddons = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kdbusaddons-5.91.0.tar.xz";
- sha256 = "18qhpj0s4abypkb8ix2d84wv1kqv6qxyblninn2f9hjkl2dnlwis";
- name = "kdbusaddons-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kdbusaddons-5.92.0.tar.xz";
+ sha256 = "0m5fd396xi3dhc45zwxjrrxr2bhlrc8g8m7n17jq1ylzqhyg60vw";
+ name = "kdbusaddons-5.92.0.tar.xz";
};
};
kdeclarative = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kdeclarative-5.91.0.tar.xz";
- sha256 = "183df5c0xyjqsip0izqvvk4wy2bjb973900s1wqsldhhvc7gpf7z";
- name = "kdeclarative-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kdeclarative-5.92.0.tar.xz";
+ sha256 = "1cymh8clcajk9cl6r443cpqk6vmp4x12ngc6wgp08z53zrvlv5py";
+ name = "kdeclarative-5.92.0.tar.xz";
};
};
kded = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kded-5.91.0.tar.xz";
- sha256 = "1zi0sixlzaxvw4lfil2r36i3xrav3vfwxp2r1lp4n65dpl7nv7p5";
- name = "kded-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kded-5.92.0.tar.xz";
+ sha256 = "0v0fak84nw4lb4qc1irb9sn5nh5k7qrhnfav5smn3cvchldm6dc3";
+ name = "kded-5.92.0.tar.xz";
};
};
kdelibs4support = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/portingAids/kdelibs4support-5.91.0.tar.xz";
- sha256 = "1373fi9vi7ki8frr0lsw6yp335i95v8yq2j41s7ip003dpy4hr2g";
- name = "kdelibs4support-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/portingAids/kdelibs4support-5.92.0.tar.xz";
+ sha256 = "1q7d0i09klkhsiwq7i91ypxakdr5b841zdb60q7yjzcdmn25wbi9";
+ name = "kdelibs4support-5.92.0.tar.xz";
};
};
kdesignerplugin = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/portingAids/kdesignerplugin-5.91.0.tar.xz";
- sha256 = "07lvvryc3k418hd0j7ddlqhid26c51isa8mvk7g6gd0v2x3gp76q";
- name = "kdesignerplugin-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/portingAids/kdesignerplugin-5.92.0.tar.xz";
+ sha256 = "0kial8k6qr39871v103952d0qcs0hm25y6k0vdg4y8ns8nrmjs06";
+ name = "kdesignerplugin-5.92.0.tar.xz";
};
};
kdesu = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kdesu-5.91.0.tar.xz";
- sha256 = "1wj099w810dabqn43pqis4sism3zwq3d1qa9mvcdyjafqbl7xnjm";
- name = "kdesu-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kdesu-5.92.0.tar.xz";
+ sha256 = "1yjyz4v0gn7ys7zy4ymn47zggxxmgd37big005c6g85dm63xr1s6";
+ name = "kdesu-5.92.0.tar.xz";
};
};
kdewebkit = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/portingAids/kdewebkit-5.91.0.tar.xz";
- sha256 = "1mln0w1dzrbpm373vfpcyss4xxnrfgwh9nhzr8wmzs8965bn3wqq";
- name = "kdewebkit-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/portingAids/kdewebkit-5.92.0.tar.xz";
+ sha256 = "1dni134qbs5yff7zgk4n3sfjwblzarblg16rj35l59l6mly7f2jd";
+ name = "kdewebkit-5.92.0.tar.xz";
};
};
kdnssd = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kdnssd-5.91.0.tar.xz";
- sha256 = "1smzwh7lvz8g7vydxnd2kkh0ymg7yp6akc7k2vg8q65pa6pxqn3g";
- name = "kdnssd-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kdnssd-5.92.0.tar.xz";
+ sha256 = "1m24v36pphy591z1xp90i0yxv70c62iinvy4gspdi15bz94sydjz";
+ name = "kdnssd-5.92.0.tar.xz";
};
};
kdoctools = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kdoctools-5.91.0.tar.xz";
- sha256 = "02lr4l4n5gnv7ffzml8lbrdwgfpq6m7ayhz3bdqqijdfvw6h283n";
- name = "kdoctools-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kdoctools-5.92.0.tar.xz";
+ sha256 = "0w08fa8rl0dhp59lv6xcvypahl6pxda6cr0vv0f0xv0xp6wax8w6";
+ name = "kdoctools-5.92.0.tar.xz";
};
};
kemoticons = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kemoticons-5.91.0.tar.xz";
- sha256 = "1jznkiq87rkndv10xs6974b5k0v82ly32agy5acxc2xy9wq7la0h";
- name = "kemoticons-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kemoticons-5.92.0.tar.xz";
+ sha256 = "01wzy3mwfz4sqpq8i1hfbbymajp55axryiaqkfr9r2n1844y7kzx";
+ name = "kemoticons-5.92.0.tar.xz";
};
};
kfilemetadata = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kfilemetadata-5.91.0.tar.xz";
- sha256 = "1z030irzcvmjq329nwfk3h8cd51dwy9mppnwbgcd0lw6y3bka0rq";
- name = "kfilemetadata-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kfilemetadata-5.92.0.tar.xz";
+ sha256 = "1khmx9kd1jhd6j7rmfww3vmyjz2pg36mpsdn0bc77kwl21ax696n";
+ name = "kfilemetadata-5.92.0.tar.xz";
};
};
kglobalaccel = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kglobalaccel-5.91.0.tar.xz";
- sha256 = "09wscg6f19sh314ywpxp47pdr1xf1wzpjchg9rcjg207zrfhqqf0";
- name = "kglobalaccel-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kglobalaccel-5.92.0.tar.xz";
+ sha256 = "0lhlb274pvv7rpkcsccqbv81bh8iklanp29g0k28wrv3kckiwyxy";
+ name = "kglobalaccel-5.92.0.tar.xz";
};
};
kguiaddons = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kguiaddons-5.91.0.tar.xz";
- sha256 = "0gn8lvpm4i11s5vavlpm162bizjkmh5cb4dhj3p34dlp4vcc4mky";
- name = "kguiaddons-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kguiaddons-5.92.0.tar.xz";
+ sha256 = "0pyzgyrglvz2m11b82rycs9fbmzpfgzabnjkvsq00agjcnjparqg";
+ name = "kguiaddons-5.92.0.tar.xz";
};
};
kholidays = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kholidays-5.91.0.tar.xz";
- sha256 = "165vfmi5y8l00ng494469w5s1gjnf9zkggqrzmq65dfkdis3amdm";
- name = "kholidays-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kholidays-5.92.0.tar.xz";
+ sha256 = "042bdg46hkpg66vdp9gk13wck5yhks8s6i9qz9xzh2mikz285lqf";
+ name = "kholidays-5.92.0.tar.xz";
};
};
khtml = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/portingAids/khtml-5.91.0.tar.xz";
- sha256 = "1ldkk1f954mmgz30vqa895z1nw2jaknnb53lsd5vqxzxi3cmc054";
- name = "khtml-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/portingAids/khtml-5.92.0.tar.xz";
+ sha256 = "06hpjcm5yrfj1056vvv9dklccd0a1y09zm8ch4a5d8l2lfgdg8ci";
+ name = "khtml-5.92.0.tar.xz";
};
};
ki18n = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/ki18n-5.91.0.tar.xz";
- sha256 = "11gdd2gvzsz3r8zvqbxxwbpwjvjwnzzhzyrd4spbpdy0w7j8n6ly";
- name = "ki18n-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/ki18n-5.92.0.tar.xz";
+ sha256 = "0xsp77iaxf72i0ri3pb6x5rrdz3cv8rxcaqcrynisvsmx7l35005";
+ name = "ki18n-5.92.0.tar.xz";
};
};
kiconthemes = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kiconthemes-5.91.0.tar.xz";
- sha256 = "1khh4ngivwdj9rxxcpx08ka8anskc9i1z9n2zijp4m5ix8mmj3c2";
- name = "kiconthemes-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kiconthemes-5.92.0.tar.xz";
+ sha256 = "08yb6f980p620dfklfiyp83lcsqw4dds9qwzd6xpn2mzz07p2a11";
+ name = "kiconthemes-5.92.0.tar.xz";
};
};
kidletime = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kidletime-5.91.0.tar.xz";
- sha256 = "12qmiwc8p3izj1y5h0rndj2s496ckm1p85dv4g51zbpg7m8a48qv";
- name = "kidletime-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kidletime-5.92.0.tar.xz";
+ sha256 = "1mw0jarqv2ypxwgf4qaxqlw0sijw0is36sasrfz8grbykwi18bz1";
+ name = "kidletime-5.92.0.tar.xz";
};
};
kimageformats = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kimageformats-5.91.0.tar.xz";
- sha256 = "0df8in33xwajqay487w0hjfsplz8y51w9sjb75na7yqsn75p38xb";
- name = "kimageformats-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kimageformats-5.92.0.tar.xz";
+ sha256 = "0sd3xhqh3zgy4jq8fc1llqjrxizylbsz58njz2dxqjas2a4rj16f";
+ name = "kimageformats-5.92.0.tar.xz";
};
};
kinit = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kinit-5.91.0.tar.xz";
- sha256 = "1y62k24mwzbg4gchvjb8wn6ygq57wc72clb3jgyipw034czdihvi";
- name = "kinit-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kinit-5.92.0.tar.xz";
+ sha256 = "1kpkqnq9krxlzhripwjhw3n55p5sxqsvj6nb2pqb9m0ppw97jlfb";
+ name = "kinit-5.92.0.tar.xz";
};
};
kio = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kio-5.91.0.tar.xz";
- sha256 = "14v28qilb5ayv9shw86hb88k60nr4bbd2pa4vwsqij9xkwlympgj";
- name = "kio-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kio-5.92.0.tar.xz";
+ sha256 = "1cscsjb2v0zygzazfhcflc3gb5ny1a79g3i6glyzw6ppj2c3yhyl";
+ name = "kio-5.92.0.tar.xz";
};
};
kirigami2 = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kirigami2-5.91.0.tar.xz";
- sha256 = "0ifljwa6hli2rndfadpzs30dpwc99nnvcm3yi9j5dim2bdf6glwc";
- name = "kirigami2-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kirigami2-5.92.0.tar.xz";
+ sha256 = "0p1x40p38pr9rvzwil57asgsaa95qpjqi9npwv4pgibhxacgznha";
+ name = "kirigami2-5.92.0.tar.xz";
};
};
kitemmodels = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kitemmodels-5.91.0.tar.xz";
- sha256 = "189kgrw2vjr9067mqr4f2sv06xmnjaapry0bf8s41v6r9v7py708";
- name = "kitemmodels-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kitemmodels-5.92.0.tar.xz";
+ sha256 = "16z8m11cyrapf6m56gmpjmvcgan7s50si8rl1cbbid02src7yp76";
+ name = "kitemmodels-5.92.0.tar.xz";
};
};
kitemviews = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kitemviews-5.91.0.tar.xz";
- sha256 = "16cm4zmv1ngrsmy6k0ybv5wxd0g8cc8zwq6ab7jvs7a04sykv238";
- name = "kitemviews-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kitemviews-5.92.0.tar.xz";
+ sha256 = "1ml6i1km22xsprldkzmngfh9xs5vdhlfvc6f7aq5hx9q5114v2q5";
+ name = "kitemviews-5.92.0.tar.xz";
};
};
kjobwidgets = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kjobwidgets-5.91.0.tar.xz";
- sha256 = "14pkyd6j78kignr62xfkvpyi2fwvzcvcsdnn23h8jxkhwm2ri42v";
- name = "kjobwidgets-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kjobwidgets-5.92.0.tar.xz";
+ sha256 = "09l5zgr5mn29v410ng5rccdg2bki9r6cb8y2lrijzgfxfxpvj96z";
+ name = "kjobwidgets-5.92.0.tar.xz";
};
};
kjs = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/portingAids/kjs-5.91.0.tar.xz";
- sha256 = "0jbwlnmf8whzgjkrbnsvdsnn3kv0h44ghf63m2qcgg2l9wb0j8rj";
- name = "kjs-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/portingAids/kjs-5.92.0.tar.xz";
+ sha256 = "067ilsm78x03kf5fs2xmlasvy2712k0xrsa404g2zj81fm92s1q4";
+ name = "kjs-5.92.0.tar.xz";
};
};
kjsembed = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/portingAids/kjsembed-5.91.0.tar.xz";
- sha256 = "124y7518jhjg3y2x7bcyl6b3c0bfxfbgd2sz6dwk45y4byx7rl60";
- name = "kjsembed-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/portingAids/kjsembed-5.92.0.tar.xz";
+ sha256 = "0db0r8v0bhp3razwyvmvk9r4psl14vgn23c4cm2q1b5pl0w6bhnp";
+ name = "kjsembed-5.92.0.tar.xz";
};
};
kmediaplayer = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/portingAids/kmediaplayer-5.91.0.tar.xz";
- sha256 = "0rn9azrj8k1m67y9ni0f3nwl9ldf1ksiqv6dgnzrx6xh0rxfm2h1";
- name = "kmediaplayer-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/portingAids/kmediaplayer-5.92.0.tar.xz";
+ sha256 = "19lpib2wj91w8shsf9056nwi46qja8nh96hj164ydqlkslpfnf7y";
+ name = "kmediaplayer-5.92.0.tar.xz";
};
};
knewstuff = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/knewstuff-5.91.0.tar.xz";
- sha256 = "0akaxi9klmpwn4pyr6ys5sxcapdspldq1f64im7vd6byzqrgpnax";
- name = "knewstuff-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/knewstuff-5.92.0.tar.xz";
+ sha256 = "0gvclv1a6xyrqa24svb56kp9zf2wi98as3q30lnwf0bpbpjsw52b";
+ name = "knewstuff-5.92.0.tar.xz";
};
};
knotifications = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/knotifications-5.91.0.tar.xz";
- sha256 = "1207rimq8si1zxnn827631a1hskrd3m3ilgaj3wj859qrbkqmxzm";
- name = "knotifications-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/knotifications-5.92.0.tar.xz";
+ sha256 = "1dwlx8w810l0cvy72mj52saf4x7i9p3xpqpjx4chy54n7mg0jklc";
+ name = "knotifications-5.92.0.tar.xz";
};
};
knotifyconfig = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/knotifyconfig-5.91.0.tar.xz";
- sha256 = "07m5mphd8mrak5sdqlldbcd51946v49xpcwi9fhn7w0kx29hknyf";
- name = "knotifyconfig-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/knotifyconfig-5.92.0.tar.xz";
+ sha256 = "0fii74r0ap3n08lp9kj7pki0msqjsia2jnmavyps51kq37im5x7p";
+ name = "knotifyconfig-5.92.0.tar.xz";
};
};
kpackage = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kpackage-5.91.0.tar.xz";
- sha256 = "12w8lfwifa107wlrld3zz774hczn9mkib6wqxw24yxxmzfw9lc2i";
- name = "kpackage-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kpackage-5.92.0.tar.xz";
+ sha256 = "1av6v0629a8yi0wpl7xgyd0gsn5gi228abdlvbk4dzrx9vxpa7rn";
+ name = "kpackage-5.92.0.tar.xz";
};
};
kparts = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kparts-5.91.0.tar.xz";
- sha256 = "10ni6b114acjnmrahvvqw75iqkc10ii97y3z7lirj2727a3qmzzj";
- name = "kparts-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kparts-5.92.0.tar.xz";
+ sha256 = "061kzss4b0bw67j3mc8h36mbaji077k3alk2ghcir7qix6r1hkh9";
+ name = "kparts-5.92.0.tar.xz";
};
};
kpeople = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kpeople-5.91.0.tar.xz";
- sha256 = "09l2q8cg9p8g7zkd1mjx6x08bqkr4ykxjibskc184asff7v47gvp";
- name = "kpeople-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kpeople-5.92.0.tar.xz";
+ sha256 = "0wf555pqiannxb115mlbl43ds1365im95vadsbzv1gdz668p44xk";
+ name = "kpeople-5.92.0.tar.xz";
};
};
kplotting = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kplotting-5.91.0.tar.xz";
- sha256 = "0rgmmliw9cfi0j2miszqz2kphqm04r5nfs8dqq6pnvclk1k9kss6";
- name = "kplotting-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kplotting-5.92.0.tar.xz";
+ sha256 = "1l8y0xlwjyv1l4g0mag4bgf906jc654ygky1bribzay4wki66pf9";
+ name = "kplotting-5.92.0.tar.xz";
};
};
kpty = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kpty-5.91.0.tar.xz";
- sha256 = "1yy1k96kikvvnlyd00krc08ifiqbrz0x5vwv3pgdbpnwgl8p580d";
- name = "kpty-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kpty-5.92.0.tar.xz";
+ sha256 = "0lp0bqlg1i0a5vl6gvvkngbsha8ab38z6b3sjvpmk83vixgsq7fb";
+ name = "kpty-5.92.0.tar.xz";
};
};
kquickcharts = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kquickcharts-5.91.0.tar.xz";
- sha256 = "1ghiymm257b8xgmkibb7s7bwb28x3zhnrgrrsya47q5njb87h0ck";
- name = "kquickcharts-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kquickcharts-5.92.0.tar.xz";
+ sha256 = "0y467vqx2r6dcyqwn6p7hbg4q7n0xdh4lcqwyin4cdxi14lhwhqs";
+ name = "kquickcharts-5.92.0.tar.xz";
};
};
kross = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/portingAids/kross-5.91.0.tar.xz";
- sha256 = "06f8220jmvjsfbzjkr2ybwicwjffbi3yw9sr3bcyrilchrrpgqal";
- name = "kross-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/portingAids/kross-5.92.0.tar.xz";
+ sha256 = "1gqy1h5mqsfgbpqkdrhs7xf77kw4yy19mryda1fwjcqzxd02i7hj";
+ name = "kross-5.92.0.tar.xz";
};
};
krunner = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/krunner-5.91.0.tar.xz";
- sha256 = "17iaw55rkzyfpgkbw2an6pa4wid79b0dnb3310vfaq0xkm0gjxq6";
- name = "krunner-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/krunner-5.92.0.tar.xz";
+ sha256 = "1vcgqjyx9i8k9q4j6q9p4f7sp76aap8gqn2v269lb7imcrfhrj1z";
+ name = "krunner-5.92.0.tar.xz";
};
};
kservice = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kservice-5.91.0.tar.xz";
- sha256 = "0m4j7djiyapi1hm23lz9nd238rrlldxlggzkqq056z486v2137bp";
- name = "kservice-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kservice-5.92.0.tar.xz";
+ sha256 = "1y1fr1galhhi6yf9w9qcvkp1zb63ifvr4wb43jwpvpms9djxkqjj";
+ name = "kservice-5.92.0.tar.xz";
};
};
ktexteditor = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/ktexteditor-5.91.0.tar.xz";
- sha256 = "1bkz6v1y5vyxav398a6224ldqa9pqhbad3vmhxrjb2hxcbha2cpm";
- name = "ktexteditor-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/ktexteditor-5.92.0.tar.xz";
+ sha256 = "137v8g7j8kkv9yh30ysmm5n6imyyd3jmd0f6w5ni00kxl0y1rl5w";
+ name = "ktexteditor-5.92.0.tar.xz";
};
};
ktextwidgets = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/ktextwidgets-5.91.0.tar.xz";
- sha256 = "0xmzrak5mwg1l4v38g14i7j1yr3j6sj13q2iqa433hs5agl6l6n4";
- name = "ktextwidgets-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/ktextwidgets-5.92.0.tar.xz";
+ sha256 = "030bz67n6m3fkbldnr48mzicm9cgnr9gdpwipaghl5x5k3s7p1py";
+ name = "ktextwidgets-5.92.0.tar.xz";
};
};
kunitconversion = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kunitconversion-5.91.0.tar.xz";
- sha256 = "0n2v0f08s71z2imhn41jkm2knjvk7bkwmcz70gs8h97ykrj6niap";
- name = "kunitconversion-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kunitconversion-5.92.0.tar.xz";
+ sha256 = "17ph75rg3y652ii0yxm9s8xrbpjs9pdfsrsajm220mi9ng2b9qj7";
+ name = "kunitconversion-5.92.0.tar.xz";
};
};
kwallet = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kwallet-5.91.0.tar.xz";
- sha256 = "1z1qb6a2b5rqj7js88ms8n67fbs885pw6djbf1l86na2zhf0adip";
- name = "kwallet-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kwallet-5.92.0.tar.xz";
+ sha256 = "1ra0cxw70vb6pks8sqw5k895rnrfzwxhg6vh4yc5dgzdn1nagb3i";
+ name = "kwallet-5.92.0.tar.xz";
};
};
kwayland = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kwayland-5.91.0.tar.xz";
- sha256 = "1a03ckacp39lpsqyykkm6lxajxm71s6ifpzgj8q0a37v75jzmz9y";
- name = "kwayland-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kwayland-5.92.0.tar.xz";
+ sha256 = "15fizsbdl6psmi24fvpfk9dvh61q07irzavpkl961qp4zg79gq4m";
+ name = "kwayland-5.92.0.tar.xz";
};
};
kwidgetsaddons = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kwidgetsaddons-5.91.0.tar.xz";
- sha256 = "03pj98sgybkcz487vr774x05w46imnipq2794nkv426nnhyxrd73";
- name = "kwidgetsaddons-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kwidgetsaddons-5.92.0.tar.xz";
+ sha256 = "0b0z24j162j39zfycl5al69xcqgdsr96p7ii3prm1mbyda6mbqyh";
+ name = "kwidgetsaddons-5.92.0.tar.xz";
};
};
kwindowsystem = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kwindowsystem-5.91.0.tar.xz";
- sha256 = "1yy02fvfabrsvdpmrkdnjdsdd3d2crxavsl47si6ry8fdxb90y95";
- name = "kwindowsystem-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kwindowsystem-5.92.0.tar.xz";
+ sha256 = "103xvhzlggi05k16s9kssy7g5a74k9yildj1a4igqwi39wmvvnyw";
+ name = "kwindowsystem-5.92.0.tar.xz";
};
};
kxmlgui = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/kxmlgui-5.91.0.tar.xz";
- sha256 = "1qww2isx99lx0mn1dv0vzrvmr2xdp8zgikyvgw1wf8hfay3v2s1g";
- name = "kxmlgui-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/kxmlgui-5.92.0.tar.xz";
+ sha256 = "0hxpjyjr77q2gyi3hg13119aza3634rvmllbj66pi7y37h6lr2z0";
+ name = "kxmlgui-5.92.0.tar.xz";
};
};
kxmlrpcclient = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/portingAids/kxmlrpcclient-5.91.0.tar.xz";
- sha256 = "1bnymf5wq4apjsgshvbhcggdw7jc0yxv4jag3k19ff9820lskhph";
- name = "kxmlrpcclient-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/portingAids/kxmlrpcclient-5.92.0.tar.xz";
+ sha256 = "1axy34g5ahd1c3qg7ab7h786jibpaj4dvj45x50x5czq06idqchf";
+ name = "kxmlrpcclient-5.92.0.tar.xz";
};
};
modemmanager-qt = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/modemmanager-qt-5.91.0.tar.xz";
- sha256 = "15l46lkh8nkal1nai494dabaysy581jzi8nwrv4kjvc6qwc3yrx2";
- name = "modemmanager-qt-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/modemmanager-qt-5.92.0.tar.xz";
+ sha256 = "162qzq1aqv2l3bi0r01xrfan20r1zhaaqih4dqbaj7vqibsb9l3y";
+ name = "modemmanager-qt-5.92.0.tar.xz";
};
};
networkmanager-qt = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/networkmanager-qt-5.91.0.tar.xz";
- sha256 = "0f27qin2ks3q7rin53sk9vjjnadjnax99d9k245sjr6fjpczy81f";
- name = "networkmanager-qt-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/networkmanager-qt-5.92.0.tar.xz";
+ sha256 = "0r7s3fw9fk3pkrzrl1bxsmkf1qbgv3p0jrsskp28f3561vncipai";
+ name = "networkmanager-qt-5.92.0.tar.xz";
};
};
oxygen-icons5 = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/oxygen-icons5-5.91.0.tar.xz";
- sha256 = "0j3j2lyxr2iz68vasvpjqkix4bnnj6wc4sr97i6x6z06zq0kawai";
- name = "oxygen-icons5-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/oxygen-icons5-5.92.0.tar.xz";
+ sha256 = "1wcy8bv4d6jns7vaisbvjc8nxriw9vkiz7j4za5ry7wnvlzv126a";
+ name = "oxygen-icons5-5.92.0.tar.xz";
};
};
plasma-framework = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/plasma-framework-5.91.0.tar.xz";
- sha256 = "0ydhhpnwf7lfl3kdjsw92mgsza5gy292f7v6kyby4ygjnir1hizl";
- name = "plasma-framework-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/plasma-framework-5.92.0.tar.xz";
+ sha256 = "1xq66lyagjsgfashhqgqgqhda0rqfqf0l5yf1gc4ziv48mibrhn6";
+ name = "plasma-framework-5.92.0.tar.xz";
};
};
prison = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/prison-5.91.0.tar.xz";
- sha256 = "0k1zp3jzh8gjsji6wh5g8k41zdl8s1vd58ipm0lxy670a71wcqcg";
- name = "prison-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/prison-5.92.0.tar.xz";
+ sha256 = "07p47q8sva82hglfzp145a1sajlal8b3qshhkicc9rkbsngywvvy";
+ name = "prison-5.92.0.tar.xz";
};
};
purpose = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/purpose-5.91.0.tar.xz";
- sha256 = "1z6wpz7d9byx4n5zx6chmyy9k1jkmghdgahsvkqsc33z6hnh2b4m";
- name = "purpose-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/purpose-5.92.0.tar.xz";
+ sha256 = "02j09zf18dwjk17mn841m7cm0qsn7gcz5lff8dad3yah0lc3wqcl";
+ name = "purpose-5.92.0.tar.xz";
};
};
qqc2-desktop-style = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/qqc2-desktop-style-5.91.0.tar.xz";
- sha256 = "0rd9rvffhif8yckwr7axjcv5iqn5b0jdviij7f9y8vjpkzyjvm8i";
- name = "qqc2-desktop-style-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/qqc2-desktop-style-5.92.0.tar.xz";
+ sha256 = "1b5xr71lan7ixvd1nfxy9wj21h4wwidsaxa192sha1d8p49hhlwp";
+ name = "qqc2-desktop-style-5.92.0.tar.xz";
};
};
solid = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/solid-5.91.0.tar.xz";
- sha256 = "1a4k0amyg8mvfr2ld7v8zyphhxv33yybh55vqcshwv4a0jm1wmjg";
- name = "solid-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/solid-5.92.0.tar.xz";
+ sha256 = "172sid8l1znzxxz0hi5m19yy4vg7l1nbghvzjvh18ssbmxcwh9l9";
+ name = "solid-5.92.0.tar.xz";
};
};
sonnet = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/sonnet-5.91.0.tar.xz";
- sha256 = "067xj5mllpzl0gnxxljhfi9y4xdgrpqbckm7pykczzqrklrrx8dx";
- name = "sonnet-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/sonnet-5.92.0.tar.xz";
+ sha256 = "08jps1hy0qvk62wnzn50qi8iaay7xav3hbcj55sk70mm7pd1vz1i";
+ name = "sonnet-5.92.0.tar.xz";
};
};
syndication = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/syndication-5.91.0.tar.xz";
- sha256 = "1f2kb6mh1xc1k1bn536lq9gq0j2lb65qw4vpp4ixynlfij4zq1gy";
- name = "syndication-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/syndication-5.92.0.tar.xz";
+ sha256 = "0ijxpnsygwzzybic5lp8gfq57y84vrp3bq7vdbjh3h0345vvk6hw";
+ name = "syndication-5.92.0.tar.xz";
};
};
syntax-highlighting = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/syntax-highlighting-5.91.0.tar.xz";
- sha256 = "0fprqi2z8issh3jkql6labszkwd3cpvd6qadsg9fi46vfjr4a2ip";
- name = "syntax-highlighting-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/syntax-highlighting-5.92.0.tar.xz";
+ sha256 = "03p5qzf13nbf54gzad3q1q6i33iggz3ik0ydr9szhj92kfppwd4r";
+ name = "syntax-highlighting-5.92.0.tar.xz";
};
};
threadweaver = {
- version = "5.91.0";
+ version = "5.92.0";
src = fetchurl {
- url = "${mirror}/stable/frameworks/5.91/threadweaver-5.91.0.tar.xz";
- sha256 = "1900kqglkwzkjc24mvl0j7jf7xcx6cr6b1g78s5b5m18rw050j12";
- name = "threadweaver-5.91.0.tar.xz";
+ url = "${mirror}/stable/frameworks/5.92/threadweaver-5.92.0.tar.xz";
+ sha256 = "008in2wbl6zr404m9hbqdvy3d4r06mmb3jrr13myldwljqywzc28";
+ name = "threadweaver-5.92.0.tar.xz";
};
};
}
diff --git a/pkgs/development/libraries/kde-frameworks/syndication.nix b/pkgs/development/libraries/kde-frameworks/syndication.nix
index fd5a9b9db846..1d32f9b70219 100644
--- a/pkgs/development/libraries/kde-frameworks/syndication.nix
+++ b/pkgs/development/libraries/kde-frameworks/syndication.nix
@@ -4,7 +4,7 @@
}:
mkDerivation {
- name = "syndication";
+ pname = "syndication";
meta.maintainers = [ lib.maintainers.bkchr ];
nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ kcodecs ];
diff --git a/pkgs/development/libraries/kde-frameworks/syntax-highlighting.nix b/pkgs/development/libraries/kde-frameworks/syntax-highlighting.nix
index a295b23f3210..fee392140f7e 100644
--- a/pkgs/development/libraries/kde-frameworks/syntax-highlighting.nix
+++ b/pkgs/development/libraries/kde-frameworks/syntax-highlighting.nix
@@ -3,7 +3,7 @@
}:
mkDerivation {
- name = "syntax-highlighting";
+ pname = "syntax-highlighting";
nativeBuildInputs = [ extra-cmake-modules perl ];
buildInputs = [ qttools ];
propagatedBuildInputs = [ qtbase ];
diff --git a/pkgs/development/libraries/kde-frameworks/threadweaver.nix b/pkgs/development/libraries/kde-frameworks/threadweaver.nix
index bfa529c9267a..fb43b9f28b06 100644
--- a/pkgs/development/libraries/kde-frameworks/threadweaver.nix
+++ b/pkgs/development/libraries/kde-frameworks/threadweaver.nix
@@ -5,7 +5,7 @@
}:
mkDerivation {
- name = "threadweaver";
+ pname = "threadweaver";
nativeBuildInputs = [ extra-cmake-modules ];
propagatedBuildInputs = [ qtbase ];
outputs = [ "out" "dev" ];
diff --git a/pkgs/development/libraries/kerberos/krb5.nix b/pkgs/development/libraries/kerberos/krb5.nix
index c632c2fdac9e..e1251b0e942c 100644
--- a/pkgs/development/libraries/kerberos/krb5.nix
+++ b/pkgs/development/libraries/kerberos/krb5.nix
@@ -18,7 +18,7 @@ let
in
with lib;
stdenv.mkDerivation rec {
- name = "${type}krb5-${version}";
+ pname = "${type}krb5";
version = "1.19.2";
src = fetchurl {
diff --git a/pkgs/development/libraries/khronos-ocl-icd-loader/default.nix b/pkgs/development/libraries/khronos-ocl-icd-loader/default.nix
index 732efda1df46..8ff7b9332476 100644
--- a/pkgs/development/libraries/khronos-ocl-icd-loader/default.nix
+++ b/pkgs/development/libraries/khronos-ocl-icd-loader/default.nix
@@ -1,7 +1,7 @@
{ lib, stdenv, fetchFromGitHub, opencl-headers, cmake, withTracing ? false }:
stdenv.mkDerivation rec {
- name = "khronos-ocl-icd-loader-${version}";
+ pname = "khronos-ocl-icd-loader";
version = "2022.01.04";
src = fetchFromGitHub {
diff --git a/pkgs/development/libraries/languagemachines/frog.nix b/pkgs/development/libraries/languagemachines/frog.nix
index b21d0f1159e0..50167f28a9db 100644
--- a/pkgs/development/libraries/languagemachines/frog.nix
+++ b/pkgs/development/libraries/languagemachines/frog.nix
@@ -9,7 +9,7 @@ let
in
stdenv.mkDerivation {
- name = "frog-${release.version}";
+ pname = "frog";
version = release.version;
src = fetchurl { inherit (release) url sha256;
name = "frog-v${release.version}.tar.gz"; };
diff --git a/pkgs/development/libraries/languagemachines/frogdata.nix b/pkgs/development/libraries/languagemachines/frogdata.nix
index f037e7fc17a0..5b1b07e79277 100644
--- a/pkgs/development/libraries/languagemachines/frogdata.nix
+++ b/pkgs/development/libraries/languagemachines/frogdata.nix
@@ -7,7 +7,7 @@ let
in
stdenv.mkDerivation {
- name = "frogdata-${release.version}";
+ pname = "frogdata";
version = release.version;
src = fetchurl { inherit (release) url sha256;
name = "frogdata-${release.version}.tar.gz"; };
diff --git a/pkgs/development/libraries/languagemachines/libfolia.nix b/pkgs/development/libraries/languagemachines/libfolia.nix
index c2b4f6662bb5..6cc5bcade205 100644
--- a/pkgs/development/libraries/languagemachines/libfolia.nix
+++ b/pkgs/development/libraries/languagemachines/libfolia.nix
@@ -8,7 +8,7 @@ let
in
stdenv.mkDerivation {
- name = "libfolia-${release.version}";
+ pname = "libfolia";
version = release.version;
src = fetchurl { inherit (release) url sha256;
name = "libfolia-${release.version}.tar.gz"; };
diff --git a/pkgs/development/libraries/languagemachines/mbt.nix b/pkgs/development/libraries/languagemachines/mbt.nix
index af0f87249423..9556c1d56701 100644
--- a/pkgs/development/libraries/languagemachines/mbt.nix
+++ b/pkgs/development/libraries/languagemachines/mbt.nix
@@ -9,7 +9,7 @@ let
in
stdenv.mkDerivation {
- name = "mbt-${release.version}";
+ pname = "mbt";
version = release.version;
src = fetchurl { inherit (release) url sha256;
name = "mbt-${release.version}.tar.gz"; };
diff --git a/pkgs/development/libraries/languagemachines/ticcutils.nix b/pkgs/development/libraries/languagemachines/ticcutils.nix
index a5b262106c05..0b5fef292fcf 100644
--- a/pkgs/development/libraries/languagemachines/ticcutils.nix
+++ b/pkgs/development/libraries/languagemachines/ticcutils.nix
@@ -7,7 +7,7 @@ let
in
stdenv.mkDerivation {
- name = "ticcutils-${release.version}";
+ pname = "ticcutils";
version = release.version;
src = fetchurl { inherit (release) url sha256;
name = "ticcutils-${release.version}.tar.gz"; };
diff --git a/pkgs/development/libraries/languagemachines/timbl.nix b/pkgs/development/libraries/languagemachines/timbl.nix
index 8b9e6c62aee2..1585798170b3 100644
--- a/pkgs/development/libraries/languagemachines/timbl.nix
+++ b/pkgs/development/libraries/languagemachines/timbl.nix
@@ -9,7 +9,7 @@ let
in
stdenv.mkDerivation {
- name = "timbl-${release.version}";
+ pname = "timbl";
version = release.version;
src = fetchurl { inherit (release) url sha256;
name = "timbl-${release.version}.tar.gz"; };
diff --git a/pkgs/development/libraries/languagemachines/timblserver.nix b/pkgs/development/libraries/languagemachines/timblserver.nix
index 55e914bd5b44..ea40d017d471 100644
--- a/pkgs/development/libraries/languagemachines/timblserver.nix
+++ b/pkgs/development/libraries/languagemachines/timblserver.nix
@@ -9,7 +9,7 @@ let
in
stdenv.mkDerivation {
- name = "timblserver-${release.version}";
+ pname = "timblserver";
version = release.version;
src = fetchurl { inherit (release) url sha256;
name = "timblserver-${release.version}.tar.gz"; };
diff --git a/pkgs/development/libraries/languagemachines/ucto.nix b/pkgs/development/libraries/languagemachines/ucto.nix
index 4d85bbfc212b..f707d9fb8b6e 100644
--- a/pkgs/development/libraries/languagemachines/ucto.nix
+++ b/pkgs/development/libraries/languagemachines/ucto.nix
@@ -9,7 +9,7 @@ let
in
stdenv.mkDerivation {
- name = "ucto-${release.version}";
+ pname = "ucto";
version = release.version;
src = fetchurl { inherit (release) url sha256;
name = "ucto-${release.version}.tar.gz"; };
diff --git a/pkgs/development/libraries/languagemachines/uctodata.nix b/pkgs/development/libraries/languagemachines/uctodata.nix
index dbc15a17a14b..a274b6193edd 100644
--- a/pkgs/development/libraries/languagemachines/uctodata.nix
+++ b/pkgs/development/libraries/languagemachines/uctodata.nix
@@ -7,7 +7,7 @@ let
in
stdenv.mkDerivation {
- name = "uctodata-${release.version}";
+ pname = "uctodata";
version = release.version;
src = fetchurl { inherit (release) url sha256;
name = "uctodata-${release.version}.tar.gz"; };
diff --git a/pkgs/development/libraries/leatherman/default.nix b/pkgs/development/libraries/leatherman/default.nix
index 874c567ed42e..05cf84144feb 100644
--- a/pkgs/development/libraries/leatherman/default.nix
+++ b/pkgs/development/libraries/leatherman/default.nix
@@ -11,6 +11,8 @@ stdenv.mkDerivation rec {
owner = "puppetlabs";
};
+ cmakeFlags = [ "-DLEATHERMAN_ENABLE_TESTING=OFF" ];
+
NIX_CFLAGS_COMPILE = "-Wno-error";
nativeBuildInputs = [ cmake ];
diff --git a/pkgs/development/libraries/libappindicator/default.nix b/pkgs/development/libraries/libappindicator/default.nix
index 469235e2e6af..8ca2acc11c71 100644
--- a/pkgs/development/libraries/libappindicator/default.nix
+++ b/pkgs/development/libraries/libappindicator/default.nix
@@ -13,8 +13,8 @@ with lib;
stdenv.mkDerivation rec {
- name = let postfix = if gtkVersion == "2" && monoSupport then "sharp" else "gtk${gtkVersion}";
- in "libappindicator-${postfix}-${version}";
+ pname = let postfix = if gtkVersion == "2" && monoSupport then "sharp" else "gtk${gtkVersion}";
+ in "libappindicator-${postfix}";
version = "12.10.1+20.10.20200706.1";
outputs = [ "out" "dev" ];
diff --git a/pkgs/development/libraries/libcbor/default.nix b/pkgs/development/libraries/libcbor/default.nix
index 349b715d8520..9473c4823fc4 100644
--- a/pkgs/development/libraries/libcbor/default.nix
+++ b/pkgs/development/libraries/libcbor/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "libcbor";
- version = "0.8.0";
+ version = "0.9.0";
src = fetchFromGitHub {
owner = "PJK";
repo = pname;
rev = "v${version}";
- sha256 = "01dv4vxcmbvpphqy16vqiwh25wx11x630js5wfnx7cryarsh9ld7";
+ sha256 = "sha256-Wp/48yQA17mf/dTgeMcMDvPpKOPkfLhQkCnzgGLpLtk=";
};
nativeBuildInputs = [ cmake ];
diff --git a/pkgs/development/libraries/libcollectdclient/default.nix b/pkgs/development/libraries/libcollectdclient/default.nix
index 0bf654ee963c..919ddcd3f066 100644
--- a/pkgs/development/libraries/libcollectdclient/default.nix
+++ b/pkgs/development/libraries/libcollectdclient/default.nix
@@ -2,7 +2,8 @@
with lib;
collectd.overrideAttrs (oldAttrs: {
- name = "libcollectdclient-${collectd.version}";
+ pname = "libcollectdclient";
+ inherit (collectd) version;
buildInputs = [ ];
configureFlags = (oldAttrs.configureFlags or []) ++ [
diff --git a/pkgs/development/libraries/libfido2/default.nix b/pkgs/development/libraries/libfido2/default.nix
index 13bbd246c64a..e5d6d1c7c679 100644
--- a/pkgs/development/libraries/libfido2/default.nix
+++ b/pkgs/development/libraries/libfido2/default.nix
@@ -12,12 +12,12 @@
stdenv.mkDerivation rec {
pname = "libfido2";
- version = "1.9.0";
+ version = "1.10.0";
# releases on https://developers.yubico.com/libfido2/Releases/ are signed
src = fetchurl {
url = "https://developers.yubico.com/${pname}/Releases/${pname}-${version}.tar.gz";
- sha256 = "sha256-ujnjrzc20t/IrT0ctuO+fszAlYhhCjsHyGXQ7T5YwtI=";
+ sha256 = "sha256-Um79PVavcGwF0J89IfGO47CxWsDB9cXaGsvCfCcwuZs=";
};
nativeBuildInputs = [ cmake pkg-config ];
diff --git a/pkgs/development/libraries/libfive/default.nix b/pkgs/development/libraries/libfive/default.nix
index 8634f05ebbc7..00031e66bf50 100644
--- a/pkgs/development/libraries/libfive/default.nix
+++ b/pkgs/development/libraries/libfive/default.nix
@@ -47,5 +47,6 @@ mkDerivation {
maintainers = with maintainers; [ hodapp kovirobi ];
license = with licenses; [ mpl20 gpl2Plus ];
platforms = with platforms; linux ++ darwin;
+ broken = true;
};
}
diff --git a/pkgs/development/libraries/libinput/default.nix b/pkgs/development/libraries/libinput/default.nix
index 89bdc15ff62c..5c06cd282da5 100644
--- a/pkgs/development/libraries/libinput/default.nix
+++ b/pkgs/development/libraries/libinput/default.nix
@@ -1,6 +1,7 @@
{ lib
, stdenv
-, fetchurl
+, fetchFromGitLab
+, gitUpdater
, pkg-config
, meson
, ninja
@@ -44,13 +45,16 @@ in
stdenv.mkDerivation rec {
pname = "libinput";
- version = "1.19.3";
+ version = "1.20.0";
outputs = [ "bin" "out" "dev" ];
- src = fetchurl {
- url = "https://www.freedesktop.org/software/libinput/libinput-${version}.tar.xz";
- sha256 = "sha256-PK54zN4Z19Dzh+WLxzTU0Xq19kJvVKnotyjJCxe6oGg=";
+ src = fetchFromGitLab {
+ domain = "gitlab.freedesktop.org";
+ owner = "libinput";
+ repo = "libinput";
+ rev = version;
+ sha256 = "Ey6ItBIrf1POACp2+6R0B4KxJq5V1HoO+y4j6hZSGAE=";
};
patches = [
@@ -113,8 +117,14 @@ stdenv.mkDerivation rec {
sed -i "/install_subdir('libinput', install_dir : dir_etc)/d" meson.build
'';
- passthru.tests = {
- libinput-module = nixosTests.libinput;
+ passthru = {
+ tests = {
+ libinput-module = nixosTests.libinput;
+ };
+ updateScript = gitUpdater {
+ inherit pname version;
+ patchlevel-unstable = true;
+ };
};
meta = with lib; {
diff --git a/pkgs/development/libraries/libjpeg-turbo/default.nix b/pkgs/development/libraries/libjpeg-turbo/default.nix
index 92aaf6201b93..75ec20545cae 100644
--- a/pkgs/development/libraries/libjpeg-turbo/default.nix
+++ b/pkgs/development/libraries/libjpeg-turbo/default.nix
@@ -16,13 +16,13 @@ assert !(enableJpeg7 && enableJpeg8); # pick only one or none, not both
stdenv.mkDerivation rec {
pname = "libjpeg-turbo";
- version = "2.1.2";
+ version = "2.1.3";
src = fetchFromGitHub {
owner = "libjpeg-turbo";
repo = "libjpeg-turbo";
rev = version;
- sha256 = "sha256-mlHueKAU/uNUdV9s4jWKAE+XVJdpEFhw2hxGvqRwAGc=";
+ sha256 = "sha256-GbOYoCNAsOESXrEsBb6OHVB4TKhPUEU04PBp8qXVMug=";
};
# This is needed by freeimage
diff --git a/pkgs/development/libraries/libnetfilter_conntrack/default.nix b/pkgs/development/libraries/libnetfilter_conntrack/default.nix
index a2097bb17e25..e960c8d1bf48 100644
--- a/pkgs/development/libraries/libnetfilter_conntrack/default.nix
+++ b/pkgs/development/libraries/libnetfilter_conntrack/default.nix
@@ -1,14 +1,22 @@
-{ lib, stdenv, fetchurl, pkg-config, libnfnetlink, libmnl }:
+{ lib, stdenv, fetchurl, fetchpatch, pkg-config, libnfnetlink, libmnl }:
stdenv.mkDerivation rec {
pname = "libnetfilter_conntrack";
- version = "1.0.8";
+ version = "1.0.9";
src = fetchurl {
url = "https://netfilter.org/projects/libnetfilter_conntrack/files/${pname}-${version}.tar.bz2";
- sha256 = "1ky1mqgnplw2h9jf0kn0a69d94jkydhbiipng9l2hdcj13h3pl8c";
+ sha256 = "sha256-Z72d9J/jTouCFE9t+5OzIPOEqOpZcn6S/40YtfS1eag=";
};
+ patches = [
+ # Fix Musl build.
+ (fetchpatch {
+ url = "https://git.netfilter.org/libnetfilter_conntrack/patch/?id=21ee35dde73aec5eba35290587d479218c6dd824";
+ sha256 = "00rp82jrx5ygcw8la3c7bv7sigw9qzbn956dk71qjx981a2g2kqk";
+ })
+ ];
+
buildInputs = [ libmnl ];
propagatedBuildInputs = [ libnfnetlink ];
nativeBuildInputs = [ pkg-config ];
diff --git a/pkgs/development/libraries/libosmscout/default.nix b/pkgs/development/libraries/libosmscout/default.nix
index 2f83963d205f..b11ec3eb94c1 100644
--- a/pkgs/development/libraries/libosmscout/default.nix
+++ b/pkgs/development/libraries/libosmscout/default.nix
@@ -11,6 +11,8 @@ mkDerivation rec {
sha256 = "1pa459h52kw88mvsdvkz83f4p35vvgsfy2qfjwcj61gj4y9d2rq4";
};
+ cmakeFlags = [ "-DOSMSCOUT_BUILD_TESTS=OFF" ];
+
nativeBuildInputs = [ cmake pkg-config ];
buildInputs = [ marisa qtlocation ];
diff --git a/pkgs/development/libraries/libowfat/default.nix b/pkgs/development/libraries/libowfat/default.nix
index 9db1354677d6..665121b58b5c 100644
--- a/pkgs/development/libraries/libowfat/default.nix
+++ b/pkgs/development/libraries/libowfat/default.nix
@@ -17,5 +17,8 @@ stdenv.mkDerivation rec {
homepage = "https://www.fefe.de/libowfat/";
license = licenses.gpl2;
platforms = platforms.linux;
+ # Doesn't build with glibc 2.34: https://hydra.nixos.org/build/156248131
+ # Should be fixed with the next release: https://bugs.gentoo.org/806505
+ broken = true;
};
}
diff --git a/pkgs/development/libraries/libressl/fix-build-with-glibc.patch b/pkgs/development/libraries/libressl/fix-build-with-glibc.patch
new file mode 100644
index 000000000000..db482bcb35da
--- /dev/null
+++ b/pkgs/development/libraries/libressl/fix-build-with-glibc.patch
@@ -0,0 +1,92 @@
+diff --git a/tests/explicit_bzero.c b/tests/explicit_bzero.c
+index 34c60baa8a..9c0e917829 100644
+--- a/tests/explicit_bzero.c
++++ b/tests/explicit_bzero.c
+@@ -1,4 +1,4 @@
+-/* $OpenBSD: explicit_bzero.c,v 1.6 2014/07/11 01:10:35 matthew Exp $ */
++/* $OpenBSD: explicit_bzero.c,v 1.7 2021/03/27 11:17:58 bcook Exp $ */
+ /*
+ * Copyright (c) 2014 Google Inc.
+ *
+@@ -18,6 +18,7 @@
+ #include
+ #include
+ #include
++#include
+ #include
+ #include
+
+@@ -36,19 +37,33 @@ enum {
+ SECRETBYTES = SECRETCOUNT * sizeof(secret)
+ };
+
+-static char altstack[SIGSTKSZ + SECRETBYTES];
++/*
++ * As of glibc 2.34, when _GNU_SOURCE is defined, SIGSTKSZ is no longer
++ * constant on Linux. SIGSTKSZ is redefined to sysconf (_SC_SIGSTKSZ).
++ */
++static char *altstack;
++#define ALTSTACK_SIZE (SIGSTKSZ + SECRETBYTES)
+
+ static void
+ setup_stack(void)
+ {
++ altstack = calloc(1, ALTSTACK_SIZE);
++ ASSERT_NE(NULL, altstack);
++
+ const stack_t sigstk = {
+ .ss_sp = altstack,
+- .ss_size = sizeof(altstack),
++ .ss_size = ALTSTACK_SIZE
+ };
+
+ ASSERT_EQ(0, sigaltstack(&sigstk, NULL));
+ }
+
++static void
++cleanup_stack(void)
++{
++ free(altstack);
++}
++
+ static void
+ assert_on_stack(void)
+ {
+@@ -129,7 +144,7 @@ test_without_bzero()
+ char buf[SECRETBYTES];
+ assert_on_stack();
+ populate_secret(buf, sizeof(buf));
+- char *res = memmem(altstack, sizeof(altstack), buf, sizeof(buf));
++ char *res = memmem(altstack, ALTSTACK_SIZE, buf, sizeof(buf));
+ ASSERT_NE(NULL, res);
+ return (res);
+ }
+@@ -140,7 +155,7 @@ test_with_bzero()
+ char buf[SECRETBYTES];
+ assert_on_stack();
+ populate_secret(buf, sizeof(buf));
+- char *res = memmem(altstack, sizeof(altstack), buf, sizeof(buf));
++ char *res = memmem(altstack, ALTSTACK_SIZE, buf, sizeof(buf));
+ ASSERT_NE(NULL, res);
+ explicit_bzero(buf, sizeof(buf));
+ return (res);
+@@ -183,15 +198,17 @@ main()
+ * on the stack. This sanity checks that call_on_stack() and
+ * populate_secret() work as intended.
+ */
+- memset(altstack, 0, sizeof(altstack));
++ memset(altstack, 0, ALTSTACK_SIZE);
+ call_on_stack(do_test_without_bzero);
+
+ /*
+ * Now test with a call to explicit_bzero() and check that we
+ * *don't* find any instances of the secret data.
+ */
+- memset(altstack, 0, sizeof(altstack));
++ memset(altstack, 0, ALTSTACK_SIZE);
+ call_on_stack(do_test_with_bzero);
+
++ cleanup_stack();
++
+ return (0);
+ }
diff --git a/pkgs/development/libraries/libsecret/default.nix b/pkgs/development/libraries/libsecret/default.nix
index 9e8be02aa63a..e023a524ae28 100644
--- a/pkgs/development/libraries/libsecret/default.nix
+++ b/pkgs/development/libraries/libsecret/default.nix
@@ -55,7 +55,7 @@ stdenv.mkDerivation rec {
glib
];
- installCheckInputs = [
+ checkInputs = [
python3
python3.pkgs.dbus-python
python3.pkgs.pygobject3
@@ -64,18 +64,36 @@ stdenv.mkDerivation rec {
gjs
];
- # needs to run after install because typelibs point to absolute paths
- doInstallCheck = false; # Failed to load shared library '/force/shared/libmock_service.so.0' referenced by the typelib
+ doCheck = true;
+
postPatch = ''
patchShebangs .
'';
- installCheckPhase = ''
- export NO_AT_BRIDGE=1
- xvfb-run -s '-screen 0 800x600x24' dbus-run-session \
+ preCheck = ''
+ # Our gobject-introspection patches make the shared library paths absolute
+ # in the GIR files. When running tests, the library is not yet installed,
+ # though, so we need to replace the absolute path with a local one during build.
+ # We are using a symlink that will be overwitten during installation.
+ mkdir -p $out/lib $out/lib
+ ln -s "$PWD/libsecret/libmock-service.so" "$out/lib/libmock-service.so"
+ ln -s "$PWD/libsecret/libsecret-1.so.0" "$out/lib/libsecret-1.so.0"
+ '';
+
+ checkPhase = ''
+ runHook preCheck
+
+ dbus-run-session \
--config-file=${dbus.daemon}/share/dbus-1/session.conf \
- make check
+ meson test --print-errorlogs
+
+ runHook postCheck
+ '';
+
+ postCheck = ''
+ # This is test-only so it won’t be overwritten during installation.
+ rm "$out/lib/libmock-service.so"
'';
postFixup = ''
diff --git a/pkgs/development/libraries/libspf2/default.nix b/pkgs/development/libraries/libspf2/default.nix
index c48c71e14485..203f2768e37b 100644
--- a/pkgs/development/libraries/libspf2/default.nix
+++ b/pkgs/development/libraries/libspf2/default.nix
@@ -1,4 +1,4 @@
-{ lib, stdenv, fetchFromGitHub, autoreconfHook }:
+{ lib, stdenv, fetchFromGitHub, autoreconfHook, fetchpatch }:
with lib;
@@ -13,6 +13,14 @@ stdenv.mkDerivation rec {
sha256 = "03iiaafdcwh220pqignk407h6klrakwz0zkb8iwk6nkwipkwvhsx";
};
+ patches = [
+ # glibc-2.34 compat
+ (fetchpatch {
+ url = "https://raw.githubusercontent.com/gentoo/gentoo/dbb8a5c9f749cc11e61cfe558f164b165cbc30cb/mail-filter/libspf2/files/libspf2-1.2.11-undefined-dn_.patch";
+ sha256 = "sha256-6JVVkVGCcFJsNeBdVTPcLhW4KoHLY4ai/KXDMliXgPA=";
+ })
+ ];
+
postPatch = ''
# disable static bins compilation
sed -i \
diff --git a/pkgs/development/libraries/libusb1/default.nix b/pkgs/development/libraries/libusb1/default.nix
index 1514d2702103..24b147d142d7 100644
--- a/pkgs/development/libraries/libusb1/default.nix
+++ b/pkgs/development/libraries/libusb1/default.nix
@@ -7,33 +7,27 @@
, udev
, libobjc
, IOKit
+, Security
, withStatic ? false
}:
stdenv.mkDerivation rec {
pname = "libusb";
- version = "1.0.24";
+ version = "1.0.25";
src = fetchFromGitHub {
owner = "libusb";
repo = "libusb";
rev = "v${version}";
- sha256 = "18ri8ky422hw64zry7bpbarb1m0hiljyf64a0a9y093y7aad38i7";
+ sha256 = "141wygijjcgka0h31504cdlvih4l2j02j67pcbb2l527p7dbc5pn";
};
outputs = [ "out" "dev" ];
- patches = [ (fetchpatch {
- # https://bugs.archlinux.org/task/69121
- url = "https://github.com/libusb/libusb/commit/f6d2cb561402c3b6d3627c0eb89e009b503d9067.patch";
- sha256 = "1dbahikcbwkjhyvks7wbp7fy2bf7nca48vg5z0zqvqzjb9y595cq";
- excludes = [ "libusb/version_nano.h" ];
- }) ];
-
nativeBuildInputs = [ pkg-config autoreconfHook ];
propagatedBuildInputs =
lib.optional enableUdev udev ++
- lib.optionals stdenv.isDarwin [ libobjc IOKit ];
+ lib.optionals stdenv.isDarwin [ libobjc IOKit Security ];
dontDisableStatic = withStatic;
diff --git a/pkgs/development/libraries/libuv/default.nix b/pkgs/development/libraries/libuv/default.nix
index 1d9354d48e1a..12f7f982c1df 100644
--- a/pkgs/development/libraries/libuv/default.nix
+++ b/pkgs/development/libraries/libuv/default.nix
@@ -1,14 +1,14 @@
{ stdenv, lib, fetchFromGitHub, autoconf, automake, libtool, pkg-config, ApplicationServices, CoreServices }:
stdenv.mkDerivation rec {
- version = "1.43.0";
+ version = "1.44.1";
pname = "libuv";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "v${version}";
- sha256 = "sha256-AsXJb2AGNx+SARPmY8uRFRLfX5vqTPNjwL8njSw/e7o=";
+ sha256 = "sha256-12uveSEavRxQW4xVrB4Rkkj+eHZ71Qy8dRG+95ldz50=";
};
postPatch = let
@@ -20,6 +20,7 @@ stdenv.mkDerivation rec {
"threadpool_multiple_event_loops" # times out on slow machines
"get_passwd" # passed on NixOS but failed on other Linuxes
"tcp_writealot" "udp_multicast_join" "udp_multicast_join6" # times out sometimes
+ "fs_fstat" # https://github.com/libuv/libuv/issues/2235#issuecomment-1012086927
] ++ lib.optionals stdenv.isDarwin [
# Sometimes: timeout (no output), failed uv_listen. Someone
# should report these failures to libuv team. There tests should
diff --git a/pkgs/development/libraries/libva/1.0.0.nix b/pkgs/development/libraries/libva/1.0.0.nix
deleted file mode 100644
index ade56ac16ee9..000000000000
--- a/pkgs/development/libraries/libva/1.0.0.nix
+++ /dev/null
@@ -1,37 +0,0 @@
-{ stdenv, lib, fetchurl, libX11, pkg-config, libXext, libdrm, libXfixes, wayland, libffi
-, libGL, mesa
-, minimal ? false, libva1-minimal
-}:
-
-stdenv.mkDerivation rec {
- pname = "libva";
- version = "1.7.3";
-
- src = fetchurl {
- url = "https://www.freedesktop.org/software/vaapi/releases/libva/${pname}-${version}.tar.bz2";
- sha256 = "1ndrf136rlw03xag7j1xpmf9015d1h0dpnv6v587jnh6k2a17g12";
- };
-
- outputs = [ "bin" "dev" "out" ];
-
- nativeBuildInputs = [ pkg-config ];
-
- buildInputs = [ libdrm ]
- ++ lib.optionals (!minimal) [ libva1-minimal libX11 libXext libXfixes wayland libffi libGL ];
- # TODO: share libs between minimal and !minimal - perhaps just symlink them
-
- configureFlags =
- # Add FHS paths for non-NixOS applications.
- [ "--with-drivers-path=${mesa.drivers.driverLink}/lib/dri:/usr/lib/dri:/usr/lib32/dri" ] ++
- lib.optionals (!minimal) [ "--enable-glx" ];
-
- installFlags = [ "dummy_drv_video_ladir=$(out)/lib/dri" ];
-
- meta = with lib; {
- homepage = "http://www.freedesktop.org/wiki/Software/vaapi";
- license = licenses.mit;
- description = "VAAPI library: Video Acceleration API";
- platforms = platforms.unix;
- maintainers = with maintainers; [ ];
- };
-}
diff --git a/pkgs/development/libraries/libva/1.nix b/pkgs/development/libraries/libva/1.nix
new file mode 100644
index 000000000000..5197420783a1
--- /dev/null
+++ b/pkgs/development/libraries/libva/1.nix
@@ -0,0 +1,50 @@
+{ stdenv
+, lib
+, fetchFromGitHub
+, autoreconfHook
+, libX11
+, pkg-config
+, libXext
+, libdrm
+, libXfixes
+, wayland
+, libffi
+, libGL
+, mesa
+, minimal ? false
+, libva1-minimal
+}:
+
+stdenv.mkDerivation rec {
+ pname = "libva" + lib.optionalString minimal "-minimal";
+ version = "1.8.3";
+
+ src = fetchFromGitHub {
+ owner = "intel";
+ repo = "libva";
+ rev = version;
+ sha256 = "sha256-ur59cqdZqXIY2dDUSie9XsxyRomVBxIW2IVKAgWYC38=";
+ };
+
+ outputs = [ "dev" "out" ];
+
+ nativeBuildInputs = [ autoreconfHook pkg-config ];
+
+ buildInputs = [ libdrm ]
+ ++ lib.optionals (!minimal) [ libva1-minimal libX11 libXext libXfixes wayland libffi libGL ];
+ # TODO: share libs between minimal and !minimal - perhaps just symlink them
+
+ # Add FHS paths for non-NixOS applications.
+ configureFlags = [ "--with-drivers-path=${mesa.drivers.driverLink}/lib/dri:/usr/lib/dri:/usr/lib32/dri" ]
+ ++ lib.optionals (!minimal) [ "--enable-glx" ];
+
+ installFlags = [ "dummy_drv_video_ladir=$(out)/lib/dri" ];
+
+ meta = with lib; {
+ homepage = "https://www.freedesktop.org/wiki/Software/vaapi/";
+ license = licenses.mit;
+ description = "VAAPI library: Video Acceleration API";
+ platforms = platforms.unix;
+ maintainers = with maintainers; [ SuperSandro2000 ];
+ };
+}
diff --git a/pkgs/development/libraries/libva/default.nix b/pkgs/development/libraries/libva/default.nix
index 10f90a16c927..037318353ce0 100644
--- a/pkgs/development/libraries/libva/default.nix
+++ b/pkgs/development/libraries/libva/default.nix
@@ -6,14 +6,14 @@
}:
stdenv.mkDerivation rec {
- pname = "libva" + lib.optionalString minimal "minimal";
- version = "2.13.0";
+ pname = "libva" + lib.optionalString minimal "-minimal";
+ version = "2.14.0";
src = fetchFromGitHub {
owner = "intel";
repo = "libva";
rev = version;
- sha256 = "0vsvli3xc0gqqp06p7wkm973lhr7c5qgnyz5jfjmf8kv75rajazp";
+ sha256 = "0q395lg6gp05mwf04zbrwgj6q9073lahh3wrcfa2i8ll60cfq9fg";
};
outputs = [ "dev" "out" ];
@@ -40,7 +40,7 @@ stdenv.mkDerivation rec {
homepage = "https://01.org/linuxmedia/vaapi";
changelog = "https://raw.githubusercontent.com/intel/libva/${version}/NEWS";
license = licenses.mit;
- maintainers = with maintainers; [ primeos ];
+ maintainers = with maintainers; [ SuperSandro2000 ];
platforms = platforms.unix;
};
}
diff --git a/pkgs/development/libraries/libva/utils.nix b/pkgs/development/libraries/libva/utils.nix
index 05ba3519ff4c..357d20527957 100644
--- a/pkgs/development/libraries/libva/utils.nix
+++ b/pkgs/development/libraries/libva/utils.nix
@@ -4,13 +4,13 @@
stdenv.mkDerivation rec {
pname = "libva-utils";
- version = "2.13.0";
+ version = "2.14.0";
src = fetchFromGitHub {
owner = "intel";
repo = "libva-utils";
rev = version;
- sha256 = "0ahbwikdb0chf76whm62zz0a7zqil3gzsxmq38ccbqlmnnyjkbbb";
+ sha256 = "sha256-WuNJCFBbXbLSftL+L15ruq9PxM1XhIfYpP/IccB+aBs=";
};
nativeBuildInputs = [ meson ninja pkg-config ];
@@ -26,7 +26,7 @@ stdenv.mkDerivation rec {
homepage = "https://github.com/intel/libva-utils";
changelog = "https://raw.githubusercontent.com/intel/libva-utils/${version}/NEWS";
license = licenses.mit;
- maintainers = with maintainers; [ primeos ];
+ maintainers = with maintainers; [ SuperSandro2000 ];
platforms = platforms.unix;
};
}
diff --git a/pkgs/development/libraries/libwacom/default.nix b/pkgs/development/libraries/libwacom/default.nix
index 1517cf970782..7ccc0d2a1999 100644
--- a/pkgs/development/libraries/libwacom/default.nix
+++ b/pkgs/development/libraries/libwacom/default.nix
@@ -12,7 +12,7 @@
stdenv.mkDerivation rec {
pname = "libwacom";
- version = "2.0.0";
+ version = "2.1.0";
outputs = [ "out" "dev" ];
@@ -20,7 +20,7 @@ stdenv.mkDerivation rec {
owner = "linuxwacom";
repo = "libwacom";
rev = "libwacom-${version}";
- sha256 = "sha256-k8pEgEu+oWNa0rI47osVPKaZGxgwX/ENaz9jPrQXy0E=";
+ sha256 = "sha256-yqOhlbOgDIAsxgQWoLKj7WpwJXvxeuW8yCvuKTtE7h0=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/libraries/mesa/default.nix b/pkgs/development/libraries/mesa/default.nix
index 23163763ed9b..a48f4b42e453 100644
--- a/pkgs/development/libraries/mesa/default.nix
+++ b/pkgs/development/libraries/mesa/default.nix
@@ -15,6 +15,7 @@
, enableOSMesa ? stdenv.isLinux
, enableOpenCL ? stdenv.isLinux && stdenv.isx86_64
, libclc
+, jdupes
}:
/** Packaging design:
@@ -33,7 +34,7 @@ with lib;
let
# Release calendar: https://www.mesa3d.org/release-calendar.html
# Release frequency: https://www.mesa3d.org/releasing.html#schedule
- version = "21.3.7";
+ version = "21.3.8";
branch = versions.major version;
self = stdenv.mkDerivation {
@@ -47,7 +48,7 @@ self = stdenv.mkDerivation {
"ftp://ftp.freedesktop.org/pub/mesa/${version}/mesa-${version}.tar.xz"
"ftp://ftp.freedesktop.org/pub/mesa/older-versions/${branch}.x/${version}/mesa-${version}.tar.xz"
];
- sha256 = "0ggw3s514z6szasbiy4dv5mdi689121yy2xly2g21gv1mavrvyml";
+ sha256 = "19wx5plk6z0hhi0zdzxjx8ynl3lhlc5mbd8vhwqyk92kvhxjf3g7";
};
# TODO:
@@ -228,6 +229,9 @@ self = stdenv.mkDerivation {
fi
done
+ # NAR doesn't support hard links, so convert them to symlinks to save space.
+ ${jdupes}/bin/jdupes --hard-links --link-soft --recurse "$drivers"
+
# add RPATH so the drivers can find the moved libgallium and libdricore9
# moved here to avoid problems with stripping patchelfed files
for lib in $drivers/lib/*.so* $drivers/lib/*/*.so*; do
diff --git a/pkgs/development/libraries/mustache-hpp/default.nix b/pkgs/development/libraries/mustache-hpp/default.nix
index 373f232a9866..ce6dd1d21a9b 100644
--- a/pkgs/development/libraries/mustache-hpp/default.nix
+++ b/pkgs/development/libraries/mustache-hpp/default.nix
@@ -1,4 +1,4 @@
-{ lib, stdenv, fetchFromGitHub, cmake }:
+{ lib, stdenv, fetchFromGitHub }:
stdenv.mkDerivation rec {
pname = "mustache";
@@ -11,11 +11,11 @@ stdenv.mkDerivation rec {
sha256 = "0r9rbk6v1wpld2ismfsk2lkhbyv3dkf0p03hkjivbj05qkfhvlbb";
};
- nativeBuildInputs = [ cmake ];
+ dontBuild = true;
installPhase = ''
mkdir -p $out/include
- cp ../mustache.hpp $out/include
+ cp mustache.hpp $out/include
'';
meta = with lib; {
diff --git a/pkgs/development/libraries/nghttp2/default.nix b/pkgs/development/libraries/nghttp2/default.nix
index bd639ec3041a..01df15c0a831 100644
--- a/pkgs/development/libraries/nghttp2/default.nix
+++ b/pkgs/development/libraries/nghttp2/default.nix
@@ -1,90 +1,110 @@
-{ lib, stdenv, fetchurl, pkg-config
+{ lib
+, stdenv
+, fetchurl
+, installShellFiles
+, pkg-config
-# Optional Dependencies
-, openssl ? null, zlib ? null
-, enableLibEv ? !stdenv.hostPlatform.isWindows, libev ? null
-, enableCAres ? !stdenv.hostPlatform.isWindows, c-ares ? null
-, enableHpack ? false, jansson ? null
+# Optional dependencies
+, enableApp ? with stdenv.hostPlatform; !isWindows && !isStatic
+, c-ares ? null, libev ? null, openssl ? null, zlib ? null
, enableAsioLib ? false, boost ? null
, enableGetAssets ? false, libxml2 ? null
+, enableHpack ? false, jansson ? null
, enableJemalloc ? false, jemalloc ? null
-, enableApp ? with stdenv.hostPlatform; !isWindows && !isStatic
, enablePython ? false, python ? null, cython ? null, ncurses ? null, setuptools ? null
+# Unit tests ; we have to set TZDIR, which is a GNUism.
+, enableTests ? stdenv.hostPlatform.isGnu, cunit ? null, tzdata ? null
+
# downstream dependencies, for testing
, curl
, libsoup
}:
-# Note: this package is used for bootstrapping fetchurl, and thus
-# cannot use fetchpatch! All mutable patches (generated by GitHub or
-# cgit) that are needed here should be included directly in Nixpkgs as
-# files.
+# Note: this package is used for bootstrapping fetchurl, and thus cannot use fetchpatch!
+# All mutable patches (generated by GitHub or cgit) that are needed here
+# should be included directly in Nixpkgs as files.
-assert enableHpack -> jansson != null;
+assert enableApp -> c-ares != null && libev != null && openssl != null && zlib != null;
assert enableAsioLib -> boost != null;
-assert enableGetAssets -> libxml2 != null;
-assert enableJemalloc -> jemalloc != null;
+assert enableGetAssets -> enableApp == true && libxml2 != null;
+assert enableHpack -> enableApp == true && jansson != null;
+assert enableJemalloc -> enableApp == true && jemalloc != null;
assert enablePython -> python != null && cython != null && ncurses != null && setuptools != null;
-
-let inherit (lib) optional optionals optionalString; in
+assert enableTests -> cunit != null && tzdata != null;
stdenv.mkDerivation rec {
pname = "nghttp2";
- version = "1.43.0";
+ version = "1.47.0";
src = fetchurl {
url = "https://github.com/${pname}/${pname}/releases/download/v${version}/${pname}-${version}.tar.bz2";
- sha256 = "0qhgyphzdv72dgdfxin2xbk9623za3jwbcvhhaxixiwp6djj8vsm";
+ sha256 = "11d6w8iqrhnxmjd9ss9fzf66f7a32d48h2ihyk1580lg8d3rkj07";
};
outputs = [ "bin" "out" "dev" "lib" ]
- ++ optional enablePython "python";
+ ++ lib.optionals (enablePython) [ "python" ];
- nativeBuildInputs = [ pkg-config ];
- buildInputs = [ openssl ]
- ++ optional enableLibEv libev
- ++ [ zlib ]
- ++ optional enableCAres c-ares
- ++ optional enableHpack jansson
- ++ optional enableAsioLib boost
- ++ optional enableGetAssets libxml2
- ++ optional enableJemalloc jemalloc
- ++ optionals enablePython [ python ncurses setuptools ];
+ nativeBuildInputs = [ pkg-config ]
+ ++ lib.optionals (enableApp) [ installShellFiles ]
+ ++ lib.optionals (enablePython) [ cython ];
+
+ buildInputs = lib.optionals enableApp [ c-ares libev openssl zlib ]
+ ++ lib.optionals (enableAsioLib) [ boost ]
+ ++ lib.optionals (enableGetAssets) [ libxml2 ]
+ ++ lib.optionals (enableHpack) [ jansson ]
+ ++ lib.optionals (enableJemalloc) [ jemalloc ]
+ ++ lib.optionals (enablePython) [ python ncurses setuptools ];
enableParallelBuilding = true;
configureFlags = [
- "--with-spdylay=no"
"--disable-examples"
(lib.enableFeature enableApp "app")
- ] ++ optional enableAsioLib "--enable-asio-lib --with-boost-libdir=${boost}/lib"
- ++ (if enablePython then [
- "--with-cython=${cython}/bin/cython"
- ] else [
- "--disable-python-bindings"
- ]);
+ ] ++ lib.optionals (enableAsioLib) [ "--enable-asio-lib" "--with-boost-libdir=${boost}/lib" ]
+ ++ lib.optionals (enablePython) [ "--with-cython=${cython}/bin/cython" ];
- preInstall = optionalString enablePython ''
+ # Unit tests require CUnit and setting TZDIR environment variable
+ doCheck = enableTests;
+ checkInputs = lib.optionals (enableTests) [ cunit tzdata ];
+ preCheck = lib.optionalString (enableTests) ''
+ export TZDIR=${tzdata}/share/zoneinfo
+ '';
+
+ preInstall = lib.optionalString (enablePython) ''
mkdir -p $out/${python.sitePackages}
# convince installer it's ok to install here
export PYTHONPATH="$PYTHONPATH:$out/${python.sitePackages}"
'';
- postInstall = optionalString enablePython ''
+ postInstall = lib.optionalString (enablePython) ''
mkdir -p $python/${python.sitePackages}
mv $out/${python.sitePackages}/* $python/${python.sitePackages}
+ rm -r $out/lib
+ '' + lib.optionalString (enableApp) ''
+ installShellCompletion --bash doc/bash_completion/{h2load,nghttp,nghttpd,nghttpx}
'';
- #doCheck = true; # requires CUnit ; currently failing at test_util_localtime_date in util_test.cc
-
passthru.tests = {
inherit curl libsoup;
};
meta = with lib; {
+ description = "HTTP/2 C library and tools";
+ longDescription = ''
+ nghttp2 is an implementation of the HyperText Transfer Protocol version 2 in C.
+ The framing layer of HTTP/2 is implemented as a reusable C library. On top of that,
+ we have implemented an HTTP/2 client, server and proxy. We have also developed
+ load test and benchmarking tools for HTTP/2.
+ An HPACK encoder and decoder are available as a public API.
+ We have Python bindings of this library, but we do not have full code coverage yet.
+ An experimental high level C++ library is also available.
+ '';
+
homepage = "https://nghttp2.org/";
- description = "A C implementation of HTTP/2";
+ changelog = "https://github.com/nghttp2/nghttp2/releases/tag/v${version}";
+ # News articles with changes summary can be found here: https://nghttp2.org/blog/archives/
license = licenses.mit;
+ maintainers = with maintainers; [ c0bw3b ];
platforms = platforms.all;
};
}
diff --git a/pkgs/development/libraries/nss/default.nix b/pkgs/development/libraries/nss/default.nix
index d17f4c4a7835..454c09e1b02e 100644
--- a/pkgs/development/libraries/nss/default.nix
+++ b/pkgs/development/libraries/nss/default.nix
@@ -27,7 +27,8 @@ let
# It will rebuild itself using the version of this package (NSS) and if
# an update is required do the required changes to the expression.
# Example: nix-shell ./maintainers/scripts/update.nix --argstr package cacert
- version = "3.75";
+ version = "3.76";
+ underscoreVersion = lib.replaceStrings [ "." ] [ "_" ] version;
in
stdenv.mkDerivation rec {
@@ -35,8 +36,8 @@ stdenv.mkDerivation rec {
inherit version;
src = fetchurl {
- url = "mirror://mozilla/security/nss/releases/NSS_${lib.replaceStrings [ "." ] [ "_" ] version}_RTM/src/${pname}-${version}.tar.gz";
- sha256 = "10l5qn68gly2l4ifv0v6by1qc8nsmhra08nm9m7n913jh83iamzx";
+ url = "mirror://mozilla/security/nss/releases/NSS_${underscoreVersion}_RTM/src/${pname}-${version}.tar.gz";
+ sha256 = "0c0nmajcvnm8gqz2v6wrlq04yzy3y7hcs806wjnx4r6kml8073hv";
};
depsBuildBuild = [ buildPackages.stdenv.cc ];
@@ -190,6 +191,7 @@ stdenv.mkDerivation rec {
meta = with lib; {
homepage = "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS";
description = "A set of libraries for development of security-enabled client and server applications";
+ changelog = "https://github.com/nss-dev/nss/blob/master/doc/rst/releases/nss_${underscoreVersion}.rst";
maintainers = with maintainers; [ ];
license = licenses.mpl20;
platforms = platforms.all;
diff --git a/pkgs/development/libraries/polkit/default.nix b/pkgs/development/libraries/polkit/default.nix
index 72907f7aedc8..9c49f89c2ca9 100644
--- a/pkgs/development/libraries/polkit/default.nix
+++ b/pkgs/development/libraries/polkit/default.nix
@@ -71,6 +71,12 @@ stdenv.mkDerivation rec {
url = "https://src.fedoraproject.org/rpms/polkit/raw/0a203bd46a1e2ec8cc4b3626840e2ea9d0d13a9a/f/CVE-2021-4115.patch";
sha256 = "sha256-BivHVVpYB4Ies1YbBDyKwUmNlqq2D1MpMipH9/dZM54=";
})
+ # Fix build with meson 0.61
+ # https://gitlab.freedesktop.org/polkit/polkit/-/merge_requests/99
+ (fetchpatch {
+ url = "https://gitlab.freedesktop.org/polkit/polkit/-/commit/a96c5119f726225f8d79b222c85d71a9f0e32419.patch";
+ sha256 = "sha256-/hm/m22dKA50sDmw4L1VAlgvCm8CuIyNjHxF/2YgMKo=";
+ })
] ++ lib.optionals stdenv.hostPlatform.isMusl [
# Make netgroup support optional (musl does not have it)
# Upstream MR: https://gitlab.freedesktop.org/polkit/polkit/merge_requests/10
diff --git a/pkgs/development/libraries/qt-5/5.12/default.nix b/pkgs/development/libraries/qt-5/5.12/default.nix
index d89547261880..a3664ae9e055 100644
--- a/pkgs/development/libraries/qt-5/5.12/default.nix
+++ b/pkgs/development/libraries/qt-5/5.12/default.nix
@@ -84,7 +84,21 @@ let
qtlocation = [ ./qtlocation-gcc-9.patch ];
qtscript = [ ./qtscript.patch ];
qtserialport = [ ./qtserialport.patch ];
+ qtwayland = [
+ # NixOS-specific, ensure that app_id is correctly determined for
+ # wrapped executables from `wrapQtAppsHook` (see comment in patch for further
+ # context). Beware: shared among different Qt5 versions.
+ ../modules/qtwayland-app_id.patch
+ ];
qtwebengine = [
+ # glibc 2.34 compat
+ (fetchpatch {
+ url = "https://src.fedoraproject.org/rpms/qt5-qtwebengine/raw/d122c011631137b79455850c363676c655cf9e09/f/qtwebengine-everywhere-src-5.15.5-SIGSTKSZ.patch";
+ sha256 = "sha256-CJxN6sTvWdPVEwSkr0zpPrjyhUIi6tYSWb8ZyO0sY2o=";
+ excludes = [
+ "src/3rdparty/chromium/third_party/abseil-cpp/absl/debugging/failure_signal_handler.cc"
+ ];
+ })
./qtwebengine-no-build-skip.patch
# https://gitlab.freedesktop.org/pulseaudio/pulseaudio/issues/707
# https://bugreports.qt.io/browse/QTBUG-77037
diff --git a/pkgs/development/libraries/qt-5/5.14/default.nix b/pkgs/development/libraries/qt-5/5.14/default.nix
index 65ce74dac021..15c85961adcf 100644
--- a/pkgs/development/libraries/qt-5/5.14/default.nix
+++ b/pkgs/development/libraries/qt-5/5.14/default.nix
@@ -96,6 +96,12 @@ let
stripLen = 1;
extraPrefix = "src/3rdparty/";
})
+
+ # glibc 2.34 compat
+ (fetchpatch {
+ url = "https://src.fedoraproject.org/rpms/qt5-qtwebengine/raw/4cef673b2dd01ce85ce7a841cf352104bbe79668/f/qtwebengine-everywhere-5.15.2-SIGSTKSZ.patch";
+ sha256 = "sha256-2D0/FL4PBL4p6ccd6JoDAGqNtLs2aeE1OdM+PJItock=";
+ })
] ++ lib.optional stdenv.isDarwin ./qtwebengine-darwin-no-platform-check.patch;
qtwebkit = [
(fetchpatch {
@@ -120,7 +126,13 @@ let
./qtwebkit-darwin-no-qos-classes.patch
];
qttools = [ ./qttools.patch ];
- qtwayland = [ ./qtwayland-libdrm-build.patch ];
+ qtwayland = [
+ ./qtwayland-libdrm-build.patch
+ # NixOS-specific, ensure that app_id is correctly determined for
+ # wrapped executables from `wrapQtAppsHook` (see comment in patch for further
+ # context). Beware: shared among different Qt5 versions.
+ ../modules/qtwayland-app_id.patch
+ ];
};
addPackages = self: with self;
diff --git a/pkgs/development/libraries/qt-5/5.15/default.nix b/pkgs/development/libraries/qt-5/5.15/default.nix
index 5943a80a701e..946c196f4a2d 100644
--- a/pkgs/development/libraries/qt-5/5.15/default.nix
+++ b/pkgs/development/libraries/qt-5/5.15/default.nix
@@ -60,6 +60,12 @@ let
./qtwebengine-darwin-no-platform-check.patch
./qtwebengine-mac-dont-set-dsymutil-path.patch
];
+ qtwayland = [
+ # NixOS-specific, ensure that app_id is correctly determined for
+ # wrapped executables from `wrapQtAppsHook` (see comment in patch for further
+ # context). Beware: shared among different Qt5 versions.
+ ../modules/qtwayland-app_id.patch
+ ];
qtwebkit = [
(fetchpatch {
name = "qtwebkit-bison-3.7-build.patch";
diff --git a/pkgs/development/libraries/qt-5/modules/qtwayland-app_id.patch b/pkgs/development/libraries/qt-5/modules/qtwayland-app_id.patch
new file mode 100644
index 000000000000..24d081aa602b
--- /dev/null
+++ b/pkgs/development/libraries/qt-5/modules/qtwayland-app_id.patch
@@ -0,0 +1,36 @@
+Ensure that the correct `app_id` for Wayland is set. The upstream implementation
+uses `QFileInfo::baseName()`[1] which strips everything away after the first dot.
+This means that `.foo-wrapped` has an empty `app_id` because `baseName` returns
+an empty string in this case.
+
+The patch basically checks whether the program has the form `.foo-wrapped` (i.e. got
+wrapped by `makeWrapper`) and if that's the case, `foo` will be the correct `app_id`.
+
+[1] https://doc.qt.io/qt-5/qfileinfo.html#baseName
+
+diff --git a/src/client/qwaylandwindow.cpp b/src/client/qwaylandwindow.cpp
+index ba881cb..b3fd031 100644
+--- a/src/client/qwaylandwindow.cpp
++++ b/src/client/qwaylandwindow.cpp
+@@ -167,7 +167,20 @@ void QWaylandWindow::initWindow()
+ Qt::SkipEmptyParts);
+
+ if (domainName.isEmpty()) {
+- mShellSurface->setAppId(fi.baseName());
++ auto baseName = fi.baseName();
++ if (baseName.isEmpty()) {
++ auto fileName = fi.fileName();
++ if (fileName.endsWith("-wrapped") && fileName.startsWith(".")) {
++ do {
++ auto len = fileName.length();
++ fileName = fileName.right(len - 1);
++ fileName = fileName.left(len - 9);
++ } while (fileName.endsWith("-wrapped") && fileName.startsWith("."));
++ mShellSurface->setAppId(fileName);
++ }
++ } else {
++ mShellSurface->setAppId(baseName);
++ }
+ } else {
+ QString appId;
+ for (int i = 0; i < domainName.count(); ++i)
diff --git a/pkgs/development/libraries/recastnavigation/default.nix b/pkgs/development/libraries/recastnavigation/default.nix
index d39d1a713219..6fd2056d2ea2 100644
--- a/pkgs/development/libraries/recastnavigation/default.nix
+++ b/pkgs/development/libraries/recastnavigation/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, lib, fetchFromGitHub, cmake, libGL, SDL2, libGLU }:
+{ stdenv, lib, fetchFromGitHub, cmake, libGL, SDL2, libGLU, catch }:
stdenv.mkDerivation rec {
pname = "recastai";
@@ -13,6 +13,12 @@ stdenv.mkDerivation rec {
sha256 = "sha256-QP3lMMFR6fiKQTksAkRL6X9yaoVz2xt4QSIP9g6piww=";
};
+ postPatch = ''
+ cp ${catch}/include/catch/catch.hpp Tests/catch.hpp
+ '';
+
+ doCheck = true;
+
nativeBuildInputs = [ cmake ];
buildInputs = [ libGL SDL2 libGLU ];
diff --git a/pkgs/development/libraries/seasocks/default.nix b/pkgs/development/libraries/seasocks/default.nix
index fd53db0dcf91..044948a012e3 100644
--- a/pkgs/development/libraries/seasocks/default.nix
+++ b/pkgs/development/libraries/seasocks/default.nix
@@ -1,4 +1,4 @@
-{ lib, stdenv, fetchFromGitHub, cmake, python3, zlib }:
+{ lib, stdenv, fetchFromGitHub, cmake, python3, zlib, catch2 }:
stdenv.mkDerivation rec {
pname = "seasocks";
@@ -11,9 +11,15 @@ stdenv.mkDerivation rec {
sha256 = "1f9a3mx3yjmr5qry4rc1c7mrx3348iifxm7d8sj8yd41kqnzmfv4";
};
+ postPatch = ''
+ cp ${catch2}/include/catch2/catch.hpp src/test/c/catch/catch2/catch.hpp
+ '';
+
nativeBuildInputs = [ cmake ];
buildInputs = [ zlib python3 ];
+ doCheck = true;
+
meta = with lib; {
homepage = "https://github.com/mattgodbolt/seasocks";
description = "Tiny embeddable C++ HTTP and WebSocket server";
diff --git a/pkgs/development/libraries/soci/default.nix b/pkgs/development/libraries/soci/default.nix
index b17fbe16655b..142081da0153 100644
--- a/pkgs/development/libraries/soci/default.nix
+++ b/pkgs/development/libraries/soci/default.nix
@@ -27,7 +27,7 @@ stdenv.mkDerivation rec {
];
# Do not build static libraries
- cmakeFlags = [ "-DSOCI_STATIC=OFF" "-DCMAKE_CXX_STANDARD=11" ];
+ cmakeFlags = [ "-DSOCI_STATIC=OFF" "-DCMAKE_CXX_STANDARD=11" "-DSOCI_TESTS=off" ];
nativeBuildInputs = [ cmake ];
buildInputs = [
diff --git a/pkgs/development/libraries/spdlog/default.nix b/pkgs/development/libraries/spdlog/default.nix
index d4e0888ffd2f..6ef4f4af43ae 100644
--- a/pkgs/development/libraries/spdlog/default.nix
+++ b/pkgs/development/libraries/spdlog/default.nix
@@ -1,7 +1,7 @@
-{ lib, stdenv, fetchFromGitHub, cmake, fmt_8 }:
+{ lib, stdenv, fetchFromGitHub, cmake, fmt_8, fetchpatch }:
let
- generic = { version, sha256 }:
+ generic = { version, sha256, patches ? [] }:
stdenv.mkDerivation {
pname = "spdlog";
inherit version;
@@ -13,6 +13,8 @@ let
inherit sha256;
};
+ inherit patches;
+
nativeBuildInputs = [ cmake ];
# spdlog <1.3 uses a bundled version of fmt
propagatedBuildInputs = lib.optional (lib.versionAtLeast version "1.3") fmt_8;
@@ -51,6 +53,13 @@ in
spdlog_1 = generic {
version = "1.9.2";
sha256 = "sha256-GSUdHtvV/97RyDKy8i+ticnSlQCubGGWHg4Oo+YAr8Y=";
+ patches = [
+ # glibc 2.34 compat
+ (fetchpatch {
+ url = "https://github.com/gabime/spdlog/commit/d54b8e89c058f3cab2b32b3e9a2b49fd171d5895.patch";
+ sha256 = "sha256-pb7cREF90GXb5Mbs8xFLQ+eLo6Xum13/xYa8JUgJlbI=";
+ })
+ ];
};
spdlog_0 = generic {
diff --git a/pkgs/development/libraries/sqlite/default.nix b/pkgs/development/libraries/sqlite/default.nix
index 5fdf6c11d77b..6cb2eb4b2d10 100644
--- a/pkgs/development/libraries/sqlite/default.nix
+++ b/pkgs/development/libraries/sqlite/default.nix
@@ -1,6 +1,7 @@
{ lib, stdenv, fetchurl, zlib, interactive ? false, readline, ncurses
, python3Packages
, enableDeserialize ? false
+, sqldiff, sqlite-analyzer
}:
with lib;
@@ -11,13 +12,13 @@ in
stdenv.mkDerivation rec {
pname = "sqlite${optionalString interactive "-interactive"}";
- version = "3.37.2";
+ version = "3.38.1";
# nixpkgs-update: no auto update
# NB! Make sure to update ./tools.nix src (in the same directory).
src = fetchurl {
url = "https://sqlite.org/2022/sqlite-autoconf-${archiveVersion version}.tar.gz";
- sha256 = "sha256-QImo2bRnU3s/JG8he4TNduALHRqXH+WsoeMOIw5Gstg=";
+ sha256 = "sha256-jjqM65eU2Wg5lZDS3fnVwESpfdg9OLlhM2SiReyKL8Q=";
};
outputs = [ "bin" "dev" "out" ];
@@ -85,6 +86,7 @@ stdenv.mkDerivation rec {
passthru.tests = {
inherit (python3Packages) sqlalchemy;
+ inherit sqldiff sqlite-analyzer;
};
meta = {
diff --git a/pkgs/development/libraries/sqlite/tools.nix b/pkgs/development/libraries/sqlite/tools.nix
index d8d3735fe3d8..6b07c762881e 100644
--- a/pkgs/development/libraries/sqlite/tools.nix
+++ b/pkgs/development/libraries/sqlite/tools.nix
@@ -4,12 +4,12 @@ let
archiveVersion = import ./archive-version.nix lib;
mkTool = { pname, makeTarget, description, homepage }: stdenv.mkDerivation rec {
inherit pname;
- version = "3.37.2";
+ version = "3.38.1";
# nixpkgs-update: no auto update
src = assert version == sqlite.version; fetchurl {
url = "https://sqlite.org/2022/sqlite-src-${archiveVersion version}.zip";
- sha256 = "sha256-SGdwtNX4i1uw26VA3W7hdjBn11Od/uGKfGb+m7A9Ftk=";
+ sha256 = "sha256-F3rv2oF/qfUoJeF0hYf3wnqbXmtTpIHNQ0YfJ0bZMdg=";
};
nativeBuildInputs = [ unzip ];
diff --git a/pkgs/development/libraries/symengine/default.nix b/pkgs/development/libraries/symengine/default.nix
index cbe5e13a7007..5cb2e2117863 100644
--- a/pkgs/development/libraries/symengine/default.nix
+++ b/pkgs/development/libraries/symengine/default.nix
@@ -5,6 +5,7 @@
, flint
, mpfr
, libmpc
+, catch
}:
stdenv.mkDerivation rec {
@@ -18,6 +19,10 @@ stdenv.mkDerivation rec {
sha256 = "sha256-5KpxBusJCuwrfFWHbrRKlH6Ic7YivYqz2m+BCbNfZp0=";
};
+ postPatch = ''
+ cp ${catch}/include/catch/catch.hpp symengine/utilities/catch/catch.hpp
+ '';
+
nativeBuildInputs = [ cmake ];
buildInputs = [ gmp flint mpfr libmpc ];
diff --git a/pkgs/development/libraries/wxwidgets/wxGTK28.nix b/pkgs/development/libraries/wxwidgets/wxGTK28.nix
index 19a57d68e15b..b577e5248203 100644
--- a/pkgs/development/libraries/wxwidgets/wxGTK28.nix
+++ b/pkgs/development/libraries/wxwidgets/wxGTK28.nix
@@ -17,8 +17,6 @@
, withMesa ? lib.elem stdenv.hostPlatform.system lib.platforms.mesaPlatforms
}:
-assert withMesa -> libGLU != null && libGL != null;
-
stdenv.mkDerivation rec {
pname = "wxGTK";
version = "2.8.12.1";
diff --git a/pkgs/development/libraries/wxwidgets/wxGTK29.nix b/pkgs/development/libraries/wxwidgets/wxGTK29.nix
index d5bef77202f1..097cce6109cb 100644
--- a/pkgs/development/libraries/wxwidgets/wxGTK29.nix
+++ b/pkgs/development/libraries/wxwidgets/wxGTK29.nix
@@ -22,7 +22,6 @@
, setfile
}:
-assert withMesa -> libGLU != null && libGL != null;
stdenv.mkDerivation rec {
pname = "wxGTK";
version = "2.9.5";
diff --git a/pkgs/development/libraries/wxwidgets/wxGTK30.nix b/pkgs/development/libraries/wxwidgets/wxGTK30.nix
index 115453303870..6157786a5d04 100644
--- a/pkgs/development/libraries/wxwidgets/wxGTK30.nix
+++ b/pkgs/development/libraries/wxwidgets/wxGTK30.nix
@@ -28,7 +28,6 @@
assert withGtk2 -> (!withWebKit);
let
- inherit (gst_all_1) gstreamer gst-plugins-base;
gtk = if withGtk2 then gtk2 else gtk3;
in
stdenv.mkDerivation rec {
@@ -47,8 +46,8 @@ stdenv.mkDerivation rec {
];
buildInputs = [
- gstreamer
- gst-plugins-base
+ gst_all_1.gstreamer
+ gst_all_1.gst-plugins-base
gtk
libSM
libXinerama
diff --git a/pkgs/development/libraries/wxwidgets/wxGTK31.nix b/pkgs/development/libraries/wxwidgets/wxGTK31.nix
index 31d59e24fd84..5bce6250c74f 100644
--- a/pkgs/development/libraries/wxwidgets/wxGTK31.nix
+++ b/pkgs/development/libraries/wxwidgets/wxGTK31.nix
@@ -35,8 +35,6 @@
assert withGtk2 -> (!withWebKit);
let
- inherit (gnome2) GConf;
- inherit (gst_all_1) gst-plugins-base gstreamer;
gtk = if withGtk2 then gtk2 else gtk3;
in
stdenv.mkDerivation rec {
@@ -59,8 +57,8 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkg-config ];
buildInputs = [
- gst-plugins-base
- gstreamer
+ gst_all_1.gst-plugins-base
+ gst_all_1.gstreamer
]
++ lib.optionals (!stdenv.isDarwin) [
gtk
@@ -71,7 +69,7 @@ stdenv.mkDerivation rec {
xorgproto
]
++ lib.optionals withGtk2 [
- GConf
+ gnome2.GConf
]
++ lib.optional withMesa libGLU
++ lib.optional (withWebKit && !stdenv.isDarwin) webkitgtk
diff --git a/pkgs/development/libraries/wxwidgets/wxmac30.nix b/pkgs/development/libraries/wxwidgets/wxmac30.nix
index e1f732929cec..73bf013452a5 100644
--- a/pkgs/development/libraries/wxwidgets/wxmac30.nix
+++ b/pkgs/development/libraries/wxwidgets/wxmac30.nix
@@ -7,13 +7,15 @@
, libpng
, libtiff
, zlib
-, darwin
+, AGL
+, Cocoa
+, Kernel
+, WebKit
+, derez
+, rez
+, setfile
}:
-let
- inherit (darwin.apple_sdk.frameworks) AGL Cocoa Kernel WebKit;
- inherit (darwin.stubs) derez rez setfile;
-in
stdenv.mkDerivation rec {
pname = "wxmac";
version = "3.0.5.1";
diff --git a/pkgs/development/libraries/zeroc-ice/3.6.nix b/pkgs/development/libraries/zeroc-ice/3.6.nix
deleted file mode 100644
index e8082e50447a..000000000000
--- a/pkgs/development/libraries/zeroc-ice/3.6.nix
+++ /dev/null
@@ -1,59 +0,0 @@
-{ stdenv, lib, fetchFromGitHub
-, mcpp, bzip2, expat, openssl, db5
-, darwin, libiconv, Security
-, zeroc-ice # to share meta
-, cpp11 ? false
-}:
-
-stdenv.mkDerivation rec {
- pname = "zeroc-ice";
- version = "3.6.5";
-
- src = fetchFromGitHub {
- owner = "zeroc-ice";
- repo = "ice";
- rev = "v${version}";
- sha256 = "073h7v1f2sw77cr1a6xxa5l9j547pz24sxa9qdjc4zki0ivcnq15";
- };
-
- buildInputs = [ mcpp bzip2 expat openssl db5 ]
- ++ lib.optionals stdenv.isDarwin [ darwin.cctools libiconv Security ];
-
- postUnpack = ''
- sourceRoot=$sourceRoot/cpp
- '';
-
- prePatch = lib.optionalString stdenv.isDarwin ''
- substituteInPlace config/Make.rules.Darwin \
- --replace xcrun ""
- '';
-
- patches = [
- # Fixes compilation warning about uninitialied variables (in test code)
- ./uninitialized-variable-warning.patch
- ];
-
- preBuild = ''
- makeFlagsArray+=(
- "prefix=$out"
- "OPTIMIZE=yes"
- "USR_DIR_INSTALL=yes"
- "CONFIGS=${if cpp11 then "cpp11-shared" else "shared"}"
- "SKIP=slice2py" # provided by a separate package
- )
- '';
-
- # cannot find -lIceXML (linking bin/transformdb)
- enableParallelBuilding = false;
-
- outputs = [ "out" "bin" "dev" ];
-
- postInstall = ''
- mkdir -p $bin $dev/share
- mv $out/bin $bin
- mv $out/share/Ice-* $dev/share/ice
- rm -rf $out/share/slice
- '';
-
- inherit (zeroc-ice) meta;
-}
diff --git a/pkgs/development/libraries/zeroc-ice/default.nix b/pkgs/development/libraries/zeroc-ice/default.nix
index fcd836348556..9a1861f60440 100644
--- a/pkgs/development/libraries/zeroc-ice/default.nix
+++ b/pkgs/development/libraries/zeroc-ice/default.nix
@@ -3,6 +3,7 @@
, darwin, libiconv, Security
, python3 # for tests only
, cpp11 ? false
+, fetchpatch
}:
let
@@ -32,6 +33,18 @@ in stdenv.mkDerivation rec {
sha256 = "0zc8gmlzl2f38m1fj6pv2vm8ka7fkszd6hx2lb8gfv65vn3m4sk4";
};
+ patches = [
+ # Fixes for openssl 3.0 / glibc-2.34.
+ (fetchpatch {
+ url = "https://github.com/zeroc-ice/ice/commit/7204b31a082a10cd481c1f31dbb6184ec699160d.patch";
+ sha256 = "sha256-RN8kQrvWRu1oXB7UV7DkYbZ8A0VyJYGArx6ikovwefo=";
+ })
+ (fetchpatch {
+ url = "https://github.com/zeroc-ice/ice/commit/358e7fea00383d55d1c19d38a3bbb64aca803aeb.patch";
+ sha256 = "sha256-ntrTO6qHB7dw398BRdAyJQUfVYW3iEfzUaBYoWWOEDs=";
+ })
+ ];
+
buildInputs = [ zeroc_mcpp bzip2 expat libedit lmdb openssl ]
++ lib.optionals stdenv.isDarwin [ darwin.cctools libiconv Security ];
diff --git a/pkgs/development/libraries/zeroc-ice/uninitialized-variable-warning.patch b/pkgs/development/libraries/zeroc-ice/uninitialized-variable-warning.patch
deleted file mode 100644
index 878dee26bb83..000000000000
--- a/pkgs/development/libraries/zeroc-ice/uninitialized-variable-warning.patch
+++ /dev/null
@@ -1,20 +0,0 @@
-diff --git a/test/Glacier2/dynamicFiltering/TestControllerI.h b/test/Glacier2/dynamicFiltering/TestControllerI.h
-index 7e21639..1279200 100644
---- a/test/Glacier2/dynamicFiltering/TestControllerI.h
-+++ b/test/Glacier2/dynamicFiltering/TestControllerI.h
-@@ -21,13 +21,12 @@ struct SessionTuple
- {
- Glacier2::SessionPrx session;
- Glacier2::SessionControlPrx sessionControl;
-- bool configured;
-+ bool configured = false;
-
- SessionTuple() {}
- SessionTuple(Glacier2::SessionPrx s, Glacier2::SessionControlPrx control):
- session(s),
-- sessionControl(control),
-- configured(false)
-+ sessionControl(control)
- {}
-
- SessionTuple&
diff --git a/pkgs/development/libraries/zlib/default.nix b/pkgs/development/libraries/zlib/default.nix
index 48603000c903..91cd037e0e33 100644
--- a/pkgs/development/libraries/zlib/default.nix
+++ b/pkgs/development/libraries/zlib/default.nix
@@ -23,18 +23,16 @@ assert splitStaticOutput -> static;
stdenv.mkDerivation (rec {
pname = "zlib";
- version = "1.2.11";
+ version = "1.2.12";
src = fetchurl {
urls =
[ "https://www.zlib.net/fossils/zlib-${version}.tar.gz" # stable archive path
"mirror://sourceforge/libpng/zlib/${version}/zlib-${version}.tar.gz"
];
- sha256 = "c3e5e9fdd5004dcb542feda5ee4f0ff0744628baf8ed2dd5d66f8ca1197cb1a1";
+ sha256 = "91844808532e5ce316b3c010929493c0244f3d37593afd6de04f71821d5136d9";
};
- patches = lib.optional stdenv.hostPlatform.isCygwin ./disable-cygwin-widechar.patch;
-
postPatch = lib.optionalString stdenv.hostPlatform.isDarwin ''
substituteInPlace configure \
--replace '/usr/bin/libtool' '${stdenv.cc.targetPrefix}ar' \
diff --git a/pkgs/development/libraries/zlib/disable-cygwin-widechar.patch b/pkgs/development/libraries/zlib/disable-cygwin-widechar.patch
deleted file mode 100644
index 3de4978c3066..000000000000
--- a/pkgs/development/libraries/zlib/disable-cygwin-widechar.patch
+++ /dev/null
@@ -1,13 +0,0 @@
-diff --git a/gzguts.h b/gzguts.h
-index 990a4d2..6378d46 100644
---- a/gzguts.h
-+++ b/gzguts.h
-@@ -39,7 +39,7 @@
- # include
- #endif
-
--#if defined(_WIN32) || defined(__CYGWIN__)
-+#if defined(_WIN32)
- # define WIDECHAR
- #endif
-
diff --git a/pkgs/development/misc/breakpad/default.nix b/pkgs/development/misc/breakpad/default.nix
index 7fb2b329667d..045e2e8f9a6e 100644
--- a/pkgs/development/misc/breakpad/default.nix
+++ b/pkgs/development/misc/breakpad/default.nix
@@ -20,6 +20,11 @@ in stdenv.mkDerivation {
ln -s ${lss} $sourceRoot/src/third_party/lss
'';
+ postPatch = ''
+ substituteInPlace src/client/linux/handler/exception_handler.cc \
+ --replace "max(16384" "max(static_cast(16384)"
+ '';
+
meta = with lib; {
description = "An open-source multi-platform crash reporting system";
homepage = "https://chromium.googlesource.com/breakpad";
diff --git a/pkgs/development/python-modules/Cython/default.nix b/pkgs/development/python-modules/Cython/default.nix
index e22037cbbb9f..5ceabe766b86 100644
--- a/pkgs/development/python-modules/Cython/default.nix
+++ b/pkgs/development/python-modules/Cython/default.nix
@@ -25,11 +25,11 @@ let
in buildPythonPackage rec {
pname = "Cython";
- version = "0.29.24";
+ version = "0.29.28";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-zfBNB8NgCGDowuuq1Oj1KsP+shJFPBdkpJrAjIJ+hEM=";
+ sha256 = "sha256-1vrCNCgCww5RQmgo/ghP9N6xszhzZ8+Yl2uy5ktvjkU=";
};
nativeBuildInputs = [
@@ -44,13 +44,6 @@ in buildPythonPackage rec {
LC_ALL = "en_US.UTF-8";
patches = [
- # https://github.com/cython/cython/issues/2752, needed by sage (https://trac.sagemath.org/ticket/26855) and up to be included in 0.30
- (fetchpatch {
- name = "non-int-conversion-to-pyhash.patch";
- url = "https://github.com/cython/cython/commit/28251032f86c266065e4976080230481b1a1bb29.patch";
- sha256 = "19rg7xs8gr90k3ya5c634bs8gww1sxyhdavv07cyd2k71afr83gy";
- })
-
# backport Cython 3.0 trashcan support (https://github.com/cython/cython/pull/2842) to 0.X series.
# it does not affect Python code unless the code explicitly uses the feature.
# trashcan support is needed to avoid stack overflows during object deallocation in sage (https://trac.sagemath.org/ticket/27267)
diff --git a/pkgs/development/python-modules/XlsxWriter/default.nix b/pkgs/development/python-modules/XlsxWriter/default.nix
index 15bd1ee35fec..5096f37e3025 100644
--- a/pkgs/development/python-modules/XlsxWriter/default.nix
+++ b/pkgs/development/python-modules/XlsxWriter/default.nix
@@ -1,24 +1,36 @@
-{lib, buildPythonPackage, fetchFromGitHub}:
+{ lib
+, buildPythonPackage
+, fetchFromGitHub
+, pytestCheckHook
+, pythonOlder
+}:
buildPythonPackage rec {
+ pname = "xlsxwriter";
+ version = "3.0.2";
+ format = "setuptools";
- pname = "XlsxWriter";
- version = "1.2.9";
+ disabled = pythonOlder "3.7";
- # PyPI release tarball doesn't contain tests so let's use GitHub. See:
- # https://github.com/jmcnamara/XlsxWriter/issues/327
- src = fetchFromGitHub{
+ src = fetchFromGitHub {
owner = "jmcnamara";
- repo = pname;
+ repo = "XlsxWriter";
rev = "RELEASE_${version}";
- sha256 = "08pdca5ssi50bx2xz52gkmjix2ybv5i4bjw7yd6yfiph0y0qsbsb";
+ hash = "sha256-I87/8OhMoI9/BRXdmTZ1Ul+d+/x+Kg/9CuqMgTsP8Eo=";
};
- meta = {
- description = "A Python module for creating Excel XLSX files";
+ checkInputs = [
+ pytestCheckHook
+ ];
+
+ pythonImportsCheck = [
+ "xlsxwriter"
+ ];
+
+ meta = with lib; {
+ description = "Module for creating Excel XLSX files";
homepage = "https://xlsxwriter.readthedocs.io/";
- maintainers = with lib.maintainers; [ jluttine ];
- license = lib.licenses.bsd2;
+ license = licenses.bsd2;
+ maintainers = with maintainers; [ jluttine ];
};
-
}
diff --git a/pkgs/development/python-modules/adblock/default.nix b/pkgs/development/python-modules/adblock/default.nix
index 941beb544731..3655c7456e58 100644
--- a/pkgs/development/python-modules/adblock/default.nix
+++ b/pkgs/development/python-modules/adblock/default.nix
@@ -16,7 +16,7 @@
buildPythonPackage rec {
pname = "adblock";
- version = "0.5.1";
+ version = "0.5.2";
format = "pyproject";
disabled = pythonOlder "3.6";
@@ -25,14 +25,14 @@ buildPythonPackage rec {
src = fetchFromGitHub {
owner = "ArniDagur";
repo = "python-adblock";
- rev = version;
- sha256 = "sha256-f6PmEHVahQv8t+WOkE8DO2emivHG2t14hUSIf/l8omY=";
+ rev = "refs/tags/${version}";
+ sha256 = "sha256-6FH+AVK7+Yg1a6oKbFV80TuGGE4Y7I3mMVzwVHdHYO4=";
};
cargoDeps = rustPlatform.fetchCargoTarball {
inherit src;
name = "${pname}-${version}";
- hash = "sha256-x0mcykHWhheD2ycELcfR1ZQ/6WfFQzY+L/LmMipP4Rc=";
+ hash = "sha256-JI/C+Woi/dJWUGUum8daecjFWiQgxY6BFYZ5MpTcRvU=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/aioftp/default.nix b/pkgs/development/python-modules/aioftp/default.nix
index fab3a32a6a0e..83c5e986f099 100644
--- a/pkgs/development/python-modules/aioftp/default.nix
+++ b/pkgs/development/python-modules/aioftp/default.nix
@@ -11,14 +11,14 @@
buildPythonPackage rec {
pname = "aioftp";
- version = "0.20.0";
+ version = "0.20.1";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-N8qiKsWPaFT/t5p1eSHS0BydoXv4AL6y8gP4z4P9fsE=";
+ sha256 = "sha256-6p3n5tNNQrbwHqGRXYNL4+cf31Blx2e9elxX6/wxj/4=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/aiohttp/default.nix b/pkgs/development/python-modules/aiohttp/default.nix
index f6d9b5d97ec7..660e205fb482 100644
--- a/pkgs/development/python-modules/aiohttp/default.nix
+++ b/pkgs/development/python-modules/aiohttp/default.nix
@@ -75,6 +75,10 @@ buildPythonPackage rec {
"test_client_session_timeout_zero"
"test_mark_formdata_as_processed"
"test_requote_redirect_url_default"
+ # Disable tests that trigger deprecation warnings in pytest
+ "test_async_with_session"
+ "test_session_close_awaitable"
+ "test_close_run_until_complete_not_deprecated"
] ++ lib.optionals stdenv.is32bit [
"test_cookiejar"
] ++ lib.optionals stdenv.isDarwin [
diff --git a/pkgs/development/python-modules/aionotify/default.nix b/pkgs/development/python-modules/aionotify/default.nix
index e653f4cca74e..13ae51d25227 100644
--- a/pkgs/development/python-modules/aionotify/default.nix
+++ b/pkgs/development/python-modules/aionotify/default.nix
@@ -18,6 +18,11 @@ buildPythonPackage rec {
disabled = pythonOlder "3.5";
+ preCheck = ''
+ substituteInPlace tests/test_usage.py \
+ --replace "asyncio.wait_for(task, timeout, loop=self.loop)" "asyncio.wait_for(task, timeout)"
+ '';
+
checkInputs = [
asynctest
];
diff --git a/pkgs/development/python-modules/alembic/default.nix b/pkgs/development/python-modules/alembic/default.nix
index 18698a0d68f2..a82cd5e258ae 100644
--- a/pkgs/development/python-modules/alembic/default.nix
+++ b/pkgs/development/python-modules/alembic/default.nix
@@ -13,14 +13,14 @@
buildPythonPackage rec {
pname = "alembic";
- version = "1.7.5";
+ version = "1.7.6";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-fDKGlKLmjwPulx5jw72IWEZHA3OltTLPLJ8WAcQTsVM=";
+ sha256 = "sha256-bAwF6XaKiW2AQ4fiCymYgP4BvFZIQkaw3/6AddbT2Ec=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/ansi/default.nix b/pkgs/development/python-modules/ansi/default.nix
index d198fde80bb8..5847e3ad0f9e 100644
--- a/pkgs/development/python-modules/ansi/default.nix
+++ b/pkgs/development/python-modules/ansi/default.nix
@@ -1,17 +1,29 @@
-{ lib, buildPythonPackage, fetchPypi }:
+{ lib
+, buildPythonPackage
+, fetchFromGitHub
+, pytestCheckHook
+}:
buildPythonPackage rec {
pname = "ansi";
- version = "0.2.0";
+ version = "0.3.6";
+ format = "pyproject";
- src = fetchPypi {
- inherit pname version;
- sha256 = "98e9b27c4bb187867a69480cbc63b843331622fec7e7d090873d806e1b5d8a80";
+ src = fetchFromGitHub {
+ owner = "tehmaze";
+ repo = pname;
+ rev = "${pname}-${version}";
+ hash = "sha256-2gu2Dba3LOjMhbCCZrBqzlOor5KqDYThhe8OP8J3O2M=";
};
- checkPhase = ''
- python -c "import ansi.color"
- '';
+ checkInputs = [
+ pytestCheckHook
+ ];
+
+ pythonImportsCheck = [
+ "ansi.colour"
+ "ansi.color"
+ ];
meta = with lib; {
description = "ANSI cursor movement and graphics";
diff --git a/pkgs/development/python-modules/ansi2html/default.nix b/pkgs/development/python-modules/ansi2html/default.nix
index 50188fe0e4a3..1f45968974cb 100644
--- a/pkgs/development/python-modules/ansi2html/default.nix
+++ b/pkgs/development/python-modules/ansi2html/default.nix
@@ -2,13 +2,14 @@
buildPythonPackage rec {
pname = "ansi2html";
- version = "1.6.0";
+ version = "1.7.0";
+ format = "pyproject";
disabled = !isPy3k;
src = fetchPypi {
inherit pname version;
- sha256 = "0f124ea7efcf3f24f1f9398e527e688c9ae6eab26b0b84e1299ef7f94d92c596";
+ sha256 = "sha256-aTFr6MaKyRxVgtOXwokOacmTzHzaUgYqx+Rfy2YNjtw=";
};
nativeBuildInputs = [ setuptools-scm ];
diff --git a/pkgs/development/python-modules/anyio/default.nix b/pkgs/development/python-modules/anyio/default.nix
index 382e64ea0f4f..a9ae447d45ff 100644
--- a/pkgs/development/python-modules/anyio/default.nix
+++ b/pkgs/development/python-modules/anyio/default.nix
@@ -2,6 +2,7 @@
, lib
, buildPythonPackage
, fetchFromGitHub
+, fetchpatch
, pythonOlder
, setuptools-scm
, idna
@@ -19,7 +20,7 @@
buildPythonPackage rec {
pname = "anyio";
- version = "3.3.4";
+ version = "3.5.0";
format = "pyproject";
disabled = pythonOlder "3.7";
@@ -27,9 +28,17 @@ buildPythonPackage rec {
owner = "agronholm";
repo = pname;
rev = version;
- sha256 = "sha256-aMnXZ+4dlybId2QhjE/3STY+Sj/vzI6K7wmqqx+P8yE=";
+ sha256 = "sha256-AZ9M/NBCBlMIUpRJgKbJRL/oReZDUh2Jhwtoxoo0tMs=";
};
+ patches = [
+ (fetchpatch {
+ # Pytest 7.0 compatibility
+ url = "https://github.com/agronholm/anyio/commit/fed7cc4f95e196f68251bcb9253da3b143ea8e7e.patch";
+ sha256 = "sha256-VmZmiQEmWJ4aPz0Wx+GTMZo7jXRDScnRYf2Hu2hiRVw=";
+ })
+ ];
+
preBuild = ''
export SETUPTOOLS_SCM_PRETEND_VERSION=${version}
'';
diff --git a/pkgs/development/python-modules/apache-airflow/default.nix b/pkgs/development/python-modules/apache-airflow/default.nix
index 4ac03a8820fb..948fae7893b8 100644
--- a/pkgs/development/python-modules/apache-airflow/default.nix
+++ b/pkgs/development/python-modules/apache-airflow/default.nix
@@ -65,13 +65,13 @@
, mkYarnPackage
}:
let
- version = "2.2.3";
+ version = "2.2.4";
airflow-src = fetchFromGitHub rec {
owner = "apache";
repo = "airflow";
rev = version;
- sha256 = "02y3az7yj4g4qaamq5s1bcvy3knd6xmvnhbfqs3kbm51irkba1zq";
+ sha256 = "sha256-JCcEgCq1sB8lBaeJy7QQbWU00sGAh5vUmJAptF8M9qo=";
};
# airflow bundles a web interface, which is built using webpack by an undocumented shell script in airflow's source tree.
diff --git a/pkgs/development/python-modules/apache-beam/default.nix b/pkgs/development/python-modules/apache-beam/default.nix
index 2eeebaaea7f8..b8d1a94eeff0 100644
--- a/pkgs/development/python-modules/apache-beam/default.nix
+++ b/pkgs/development/python-modules/apache-beam/default.nix
@@ -43,14 +43,14 @@
buildPythonPackage rec {
pname = "apache-beam";
- version = "2.35.0";
+ version = "2.36.0";
disabled = pythonAtLeast "3.10";
src = fetchFromGitHub {
owner = "apache";
repo = "beam";
rev = "v${version}";
- sha256 = "0qxkas33d8i6yj133plnadbfm74ak7arn7ldpziyiwdav3hj68sy";
+ sha256 = "sha256-f+ICbKSwNjkhrTCCZwxbmqZlQ1+dQSTRag1IflWsqYg=";
};
patches = [
diff --git a/pkgs/development/python-modules/approvaltests/default.nix b/pkgs/development/python-modules/approvaltests/default.nix
index b74533e0d44b..ece87d1894e0 100644
--- a/pkgs/development/python-modules/approvaltests/default.nix
+++ b/pkgs/development/python-modules/approvaltests/default.nix
@@ -7,7 +7,7 @@
}:
buildPythonPackage rec {
- version = "3.6.0";
+ version = "4.0.0";
pname = "approvaltests";
# no tests included in PyPI tarball
@@ -15,7 +15,7 @@ buildPythonPackage rec {
owner = "approvals";
repo = "ApprovalTests.Python";
rev = "v${version}";
- sha256 = "sha256-pgGuIoYV6JRM9h7hR8IeNduqsGm+UrKq+P/T1LM30NE=";
+ sha256 = "sha256-4dg5xTswqLFRBaZagKrkilCvsAnky9donb03MT/PiWM=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/apsw/default.nix b/pkgs/development/python-modules/apsw/default.nix
index 46ae3fc34e56..5adee7244dd3 100644
--- a/pkgs/development/python-modules/apsw/default.nix
+++ b/pkgs/development/python-modules/apsw/default.nix
@@ -29,6 +29,14 @@ buildPythonPackage rec {
pytestCheckHook
];
+ # Works around the following error by dropping the call to that function
+ # def print_version_info(write=write):
+ # > write(" Python " + sys.executable + " " + str(sys.version_info) + "\n")
+ # E TypeError: 'module' object is not callable
+ preCheck = ''
+ sed -i '/print_version_info(write)/d' tests.py
+ '';
+
pytestFlagsArray = [
"tests.py"
];
diff --git a/pkgs/development/python-modules/arrow/default.nix b/pkgs/development/python-modules/arrow/default.nix
index fc66509a194a..c09610c3be1f 100644
--- a/pkgs/development/python-modules/arrow/default.nix
+++ b/pkgs/development/python-modules/arrow/default.nix
@@ -12,13 +12,13 @@
buildPythonPackage rec {
pname = "arrow";
- version = "1.2.1";
+ version = "1.2.2";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "c2dde3c382d9f7e6922ce636bf0b318a7a853df40ecb383b29192e6c5cc82840";
+ sha256 = "sha256-Bcrx/T2aEaETWytvCYh0IRU7lFWOXvTQkLVntHFzrCs=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/asdf/default.nix b/pkgs/development/python-modules/asdf/default.nix
index 1a9ba2dd0963..122020c271f9 100644
--- a/pkgs/development/python-modules/asdf/default.nix
+++ b/pkgs/development/python-modules/asdf/default.nix
@@ -17,13 +17,13 @@
buildPythonPackage rec {
pname = "asdf";
- version = "2.8.3";
+ version = "2.10.1";
disabled = pythonOlder "3.6";
format = "pyproject";
src = fetchPypi {
inherit pname version;
- sha256 = "de0f70ffb2e0d539461940d6f7529c3548541fa098d8edc37af256af61c09b44";
+ sha256 = "sha256-9+Vp8ps3I5Oe/sgWTrLtcnS91ICwsoPXWDPw9Z0QhAk=";
};
nativeBuildInputs = [ setuptools-scm ];
diff --git a/pkgs/development/python-modules/astropy/default.nix b/pkgs/development/python-modules/astropy/default.nix
index 78f02e2870ce..6a61dd1009c6 100644
--- a/pkgs/development/python-modules/astropy/default.nix
+++ b/pkgs/development/python-modules/astropy/default.nix
@@ -19,7 +19,7 @@
let
pname = "astropy";
- version = "5.0";
+ version = "5.0.1";
in
buildPythonPackage {
inherit pname version;
@@ -29,7 +29,7 @@ buildPythonPackage {
src = fetchPypi {
inherit pname version;
- sha256 = "70203e151e13292586a817b4069ce1aad4643567aff38b1d191c173bc54f3927";
+ sha256 = "sha256-Y4LN5qIFqgsWoNXmHAwBMevU8BdNbHPilk9L7hMqkCc=";
};
SETUPTOOLS_SCM_PRETEND_VERSION = version;
diff --git a/pkgs/development/python-modules/async-lru/default.nix b/pkgs/development/python-modules/async-lru/default.nix
index 9dc412ccde86..69e6519b32c3 100644
--- a/pkgs/development/python-modules/async-lru/default.nix
+++ b/pkgs/development/python-modules/async-lru/default.nix
@@ -28,6 +28,10 @@ buildPythonPackage rec {
pytest-asyncio
];
+ pytestFlagsArray = [
+ "--asyncio-mode=strict"
+ ];
+
disabledTests = [
# https://github.com/aio-libs/async-lru/issues/341
"test_alru_cache_deco"
diff --git a/pkgs/development/python-modules/authcaptureproxy/default.nix b/pkgs/development/python-modules/authcaptureproxy/default.nix
index 73422a0624c8..11e1f444cb0b 100644
--- a/pkgs/development/python-modules/authcaptureproxy/default.nix
+++ b/pkgs/development/python-modules/authcaptureproxy/default.nix
@@ -15,14 +15,14 @@
buildPythonPackage rec {
pname = "authcaptureproxy";
- version = "1.1.1";
+ version = "1.1.3";
format = "pyproject";
src = fetchFromGitHub {
owner = "alandtse";
repo = "auth_capture_proxy";
rev = "v${version}";
- sha256 = "08zpaclg5f9g1pix0jaq42i2ph12xc8djjrmhxz0yygw5rsilgl4";
+ sha256 = "sha256-RD/8v3IQb50iGkU6zj5QfHXakjHdcCBWWAkXhCIF6qo=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/autobahn/default.nix b/pkgs/development/python-modules/autobahn/default.nix
index a088a0120103..285630db32e9 100644
--- a/pkgs/development/python-modules/autobahn/default.nix
+++ b/pkgs/development/python-modules/autobahn/default.nix
@@ -23,14 +23,14 @@
buildPythonPackage rec {
pname = "autobahn";
- version = "21.11.1";
+ version = "22.2.2";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-vW9GMVQZygpb5BCfc3QQIIrV8ZcY9nympKZ0zGbKmxg=";
+ sha256 = "sha256-YOH0xgKqzQUv/j1GrkC2t1+ChrPEaSLCE7UjFi5YwX4=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/aws-adfs/default.nix b/pkgs/development/python-modules/aws-adfs/default.nix
index 461ce9d90d9d..673b6631cf2a 100644
--- a/pkgs/development/python-modules/aws-adfs/default.nix
+++ b/pkgs/development/python-modules/aws-adfs/default.nix
@@ -17,12 +17,12 @@
buildPythonPackage rec {
pname = "aws-adfs";
- version = "1.24.5";
+ version = "2.0.1";
disabled = isPy27;
src = fetchPypi {
inherit pname version;
- sha256 = "6a78bd31477ea9988166215ae86abcbfe1413bee20373ecdf0dd170b7290db55";
+ sha256 = "sha256-+WMv52JIbh51pqLhDnUCzrcbPD5eutzwFcPOhO+nR7s=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/azure-common/default.nix b/pkgs/development/python-modules/azure-common/default.nix
index 2312df1cafaf..a540ebf0bead 100644
--- a/pkgs/development/python-modules/azure-common/default.nix
+++ b/pkgs/development/python-modules/azure-common/default.nix
@@ -9,14 +9,14 @@
}:
buildPythonPackage rec {
- version = "1.1.27";
+ version = "1.1.28";
pname = "azure-common";
disabled = isPyPy;
src = fetchPypi {
inherit pname version;
extension = "zip";
- sha256 = "9f3f5d991023acbd93050cf53c4e863c6973ded7e236c69e99c8ff5c7bad41ef";
+ sha256 = "sha256-SsDNMhTja2obakQmhnIqXYzESWA6qDPz8PQL2oNnBKM=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/azure-core/default.nix b/pkgs/development/python-modules/azure-core/default.nix
index b7d330e6eff9..fbff37fad374 100644
--- a/pkgs/development/python-modules/azure-core/default.nix
+++ b/pkgs/development/python-modules/azure-core/default.nix
@@ -15,14 +15,14 @@
}:
buildPythonPackage rec {
- version = "1.21.1";
+ version = "1.22.1";
pname = "azure-core";
disabled = isPy27;
src = fetchPypi {
inherit pname version;
extension = "zip";
- sha256 = "88d2db5cf9a135a7287dc45fdde6b96f9ca62c9567512a3bb3e20e322ce7deb2";
+ sha256 = "sha256-S25AUmijO4cxB3lklc7D8vGx/+k1Ykzg+93/NtONOk0=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/azure-identity/default.nix b/pkgs/development/python-modules/azure-identity/default.nix
index ea0696e294a0..44660e56f426 100644
--- a/pkgs/development/python-modules/azure-identity/default.nix
+++ b/pkgs/development/python-modules/azure-identity/default.nix
@@ -24,6 +24,11 @@ buildPythonPackage rec {
sha256 = "sha256-Ag/w5HFXhS5KrIo62waEGCcUfyepTL50qQRCXY5i2Tw=";
};
+ postPatch = ''
+ substituteInPlace setup.py \
+ --replace "msal-extensions~=0.3.0" "msal-extensions"
+ '';
+
propagatedBuildInputs = [
azure-common
azure-core
diff --git a/pkgs/development/python-modules/azure-mgmt-kusto/azure-mgmt-apimanagement/default.nix b/pkgs/development/python-modules/azure-mgmt-kusto/azure-mgmt-apimanagement/default.nix
index 4c7233203bb9..4c61b55b666c 100644
--- a/pkgs/development/python-modules/azure-mgmt-kusto/azure-mgmt-apimanagement/default.nix
+++ b/pkgs/development/python-modules/azure-mgmt-kusto/azure-mgmt-apimanagement/default.nix
@@ -5,13 +5,13 @@
}:
buildPythonPackage rec {
- version = "2.1.0";
+ version = "3.0.0";
pname = "azure-mgmt-apimanagement";
disabled = isPy27;
src = fetchPypi {
inherit pname version;
- sha256 = "58296bd45e876df33f93f3a41c866c36476f5f3bd46818e8891308794f041c94";
+ sha256 = "sha256-kmL1TtOH6wg9ja5m0yqN81ZHMZuQK9SYzcN29QoS0VQ=";
extension = "zip";
};
diff --git a/pkgs/development/python-modules/azure-mgmt-loganalytics/default.nix b/pkgs/development/python-modules/azure-mgmt-loganalytics/default.nix
index 947bb4a28ba9..9629c6e7bba0 100644
--- a/pkgs/development/python-modules/azure-mgmt-loganalytics/default.nix
+++ b/pkgs/development/python-modules/azure-mgmt-loganalytics/default.nix
@@ -4,7 +4,6 @@
, msrest
, msrestazure
, azure-common
-, azure-mgmt-nspkg
, azure-mgmt-core
}:
@@ -22,7 +21,6 @@ buildPythonPackage rec {
msrest
msrestazure
azure-common
- azure-mgmt-nspkg
azure-mgmt-core
];
diff --git a/pkgs/development/python-modules/azure-mgmt-trafficmanager/default.nix b/pkgs/development/python-modules/azure-mgmt-trafficmanager/default.nix
index dd7ed3b19b21..68d14c49ef6a 100644
--- a/pkgs/development/python-modules/azure-mgmt-trafficmanager/default.nix
+++ b/pkgs/development/python-modules/azure-mgmt-trafficmanager/default.nix
@@ -4,24 +4,26 @@
, msrest
, msrestazure
, azure-common
+, azure-mgmt-core
, azure-mgmt-nspkg
, isPy3k
}:
buildPythonPackage rec {
pname = "azure-mgmt-trafficmanager";
- version = "0.51.0";
+ version = "1.0.0";
src = fetchPypi {
inherit pname version;
extension = "zip";
- sha256 = "fc8ae77022cfe52fda4379a2f31e0b857574d536e41291a7b569b5c0f4104186";
+ sha256 = "sha256-R0F2HoA0bE7dTLPycTaOqYBj+ATQFeJFwv4EjtK1lqg=";
};
propagatedBuildInputs = [
msrest
msrestazure
azure-common
+ azure-mgmt-core
] ++ lib.optionals (!isPy3k) [
azure-mgmt-nspkg
];
diff --git a/pkgs/development/python-modules/azure-servicebus/default.nix b/pkgs/development/python-modules/azure-servicebus/default.nix
index b4e37c33fef9..a0864529177f 100644
--- a/pkgs/development/python-modules/azure-servicebus/default.nix
+++ b/pkgs/development/python-modules/azure-servicebus/default.nix
@@ -12,13 +12,13 @@
buildPythonPackage rec {
pname = "azure-servicebus";
- version = "7.5.0";
+ version = "7.6.0";
format = "setuptools";
src = fetchPypi {
inherit pname version;
extension = "zip";
- sha256 = "e97a069c6a73fce3042a5ef0d438cc564152cfbcc2e7db6f7a19fbd51bb3555b";
+ sha256 = "sha256-uZGxQ1Vl6wpBCMW1+80/CBuqelLV02yXf1sNlNtCpHU=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/backports-zoneinfo/default.nix b/pkgs/development/python-modules/backports-zoneinfo/default.nix
index 0b4703e26516..d2b6d06c4cdb 100644
--- a/pkgs/development/python-modules/backports-zoneinfo/default.nix
+++ b/pkgs/development/python-modules/backports-zoneinfo/default.nix
@@ -1,4 +1,5 @@
{ lib, buildPythonPackage, fetchFromGitHub
+, pythonAtLeast
, pythonOlder
, python
, substituteAll
@@ -12,6 +13,8 @@ buildPythonPackage rec {
pname = "backports-zoneinfo";
version = "0.2.1";
+ disabled = pythonAtLeast "3.9";
+
src = fetchFromGitHub {
owner = "pganssle";
repo = "zoneinfo";
diff --git a/pkgs/development/python-modules/basemap/default.nix b/pkgs/development/python-modules/basemap/default.nix
index 30ca58fed319..6d8dd8a3943b 100644
--- a/pkgs/development/python-modules/basemap/default.nix
+++ b/pkgs/development/python-modules/basemap/default.nix
@@ -14,13 +14,13 @@
buildPythonPackage rec {
pname = "basemap";
- version = "1.3.0";
+ version = "1.3.2";
src = fetchFromGitHub {
owner = "matplotlib";
repo = "basemap";
rev = "v${version}";
- sha256 = "0nwpd6zx2q2fc556ppz71ra6ad9z0d5bz8hcld64i91dcy0f0zs3";
+ sha256 = "sha256-onNdOQL4i6GTcuCRel5yanJ2EQ5iYClp+imuBObXF2I=";
};
propagatedBuildInputs = [ numpy matplotlib pillow pyproj pyshp six ];
diff --git a/pkgs/development/python-modules/behave/default.nix b/pkgs/development/python-modules/behave/default.nix
index 1198f034d00a..2384a51e5023 100644
--- a/pkgs/development/python-modules/behave/default.nix
+++ b/pkgs/development/python-modules/behave/default.nix
@@ -7,13 +7,13 @@
buildPythonApplication rec {
pname = "behave";
- version = "1.2.7.dev1";
+ version = "1.2.7.dev2";
src = fetchFromGitHub {
owner = "behave";
repo = pname;
rev = "v${version}";
- sha256 = "1ssgixmqlg8sxsyalr83a1970njc2wg3zl8idsmxnsljwacv7qwv";
+ hash = "sha256-B8PUN1Q4UAsDWrHjPZDlpaPjCKjI/pAogCSI+BQnaWs=";
};
checkInputs = [ pytestCheckHook mock pathpy pyhamcrest pytest-html ];
diff --git a/pkgs/development/python-modules/bip_utils/default.nix b/pkgs/development/python-modules/bip_utils/default.nix
index a4430b655ce1..932d887754ec 100644
--- a/pkgs/development/python-modules/bip_utils/default.nix
+++ b/pkgs/development/python-modules/bip_utils/default.nix
@@ -8,7 +8,7 @@
buildPythonPackage rec {
pname = "bip_utils";
- version = "2.1.0";
+ version = "2.2.1";
disabled = pythonOlder "3.6";
@@ -16,7 +16,7 @@ buildPythonPackage rec {
owner = "ebellocchia";
repo = pname;
rev = "v${version}";
- sha256 = "1n677z6rvcny1vyfzwnvcmzbqp9m4kfpdjfvkf1q6310zr2ybp7m";
+ sha256 = "sha256-p2JOZAJxQ/nPZ7vjnB24hA3kz3Io4D3HTP/8mqS/XCc=";
};
propagatedBuildInputs = [ ecdsa pysha3 ];
diff --git a/pkgs/development/python-modules/bitbox02/default.nix b/pkgs/development/python-modules/bitbox02/default.nix
index d57d4a6585bd..358a4d163f3e 100644
--- a/pkgs/development/python-modules/bitbox02/default.nix
+++ b/pkgs/development/python-modules/bitbox02/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "bitbox02";
- version = "5.3.0";
+ version = "6.0.0";
src = fetchPypi {
inherit pname version;
- sha256 = "fe0e8aeb9b32fd7d76bb3e9838895973a74dfd532a8fb8ac174a1a60214aee26";
+ sha256 = "sha256-wTateh3dJycFNozLaQbAzXF0avr2ofBdjlqqcOBLr/0=";
};
propagatedBuildInputs = [ base58 ecdsa hidapi noiseprotocol protobuf semver typing-extensions ];
diff --git a/pkgs/development/python-modules/bitcoin-price-api/default.nix b/pkgs/development/python-modules/bitcoin-price-api/default.nix
deleted file mode 100644
index c9d317a81c3c..000000000000
--- a/pkgs/development/python-modules/bitcoin-price-api/default.nix
+++ /dev/null
@@ -1,24 +0,0 @@
-{ lib, buildPythonPackage, fetchPypi
-, python-dateutil, requests }:
-
-buildPythonPackage rec {
- pname = "bitcoin-price-api";
- version = "0.0.4";
-
- src = fetchPypi {
- inherit pname version;
- sha256 = "bc68076f9632aaa9a8009d916d67a709c1e045dd904cfc7a3e8be33960d32029";
- };
-
- propagatedBuildInputs = [ python-dateutil requests ];
-
- # No tests in archive
- doCheck = false;
-
- meta = {
- homepage = "https://github.com/dursk/bitcoin-price-api";
- description = "Price APIs for bitcoin exchanges";
- license = with lib.licenses; [ mit ];
- maintainers = with lib.maintainers; [ bhipple ];
- };
-}
diff --git a/pkgs/development/python-modules/bjoern/default.nix b/pkgs/development/python-modules/bjoern/default.nix
index ef599d89be2b..e8b11a6311a4 100644
--- a/pkgs/development/python-modules/bjoern/default.nix
+++ b/pkgs/development/python-modules/bjoern/default.nix
@@ -1,12 +1,17 @@
-{ lib, buildPythonPackage, fetchPypi, libev, python }:
+{ lib, buildPythonPackage, fetchFromGitHub, libev, python }:
buildPythonPackage rec {
pname = "bjoern";
- version = "3.1.0";
+ version = "3.2.1";
+ format = "setuptools";
- src = fetchPypi {
- inherit pname version;
- sha256 = "01f3b601cf0ab0a9c7cb9c8f944ab7c738baaa6043ca82db20e9bd7a9be5767b";
+ # tests are not published to pypi anymore
+ src = fetchFromGitHub {
+ owner = "jonashaag";
+ repo = pname;
+ rev = version;
+ hash = "sha256-d7u/lEh2Zr5NYWYu4Zr7kgyeOIQuHQLYrZeiZMHbpio=";
+ fetchSubmodules = true; # fetch http-parser and statsd-c-client submodules
};
buildInputs = [ libev ];
diff --git a/pkgs/development/python-modules/blessed/default.nix b/pkgs/development/python-modules/blessed/default.nix
index c2b03d35a21c..592c36692d0f 100644
--- a/pkgs/development/python-modules/blessed/default.nix
+++ b/pkgs/development/python-modules/blessed/default.nix
@@ -4,11 +4,11 @@
buildPythonPackage rec {
pname = "blessed";
- version = "1.19.0";
+ version = "1.19.1";
src = fetchPypi {
inherit pname version;
- sha256 = "4db0f94e5761aea330b528e84a250027ffe996b5a94bf03e502600c9a5ad7a61";
+ sha256 = "sha256-mg0JlpW/Yh1GgN1sc/atVH9qNEL72+gMSx2qHtvEkvw=";
};
checkInputs = [ pytest mock glibcLocales ];
diff --git a/pkgs/development/python-modules/boto3/default.nix b/pkgs/development/python-modules/boto3/default.nix
index c6fdc8c9981c..d1a104f6ae9b 100644
--- a/pkgs/development/python-modules/boto3/default.nix
+++ b/pkgs/development/python-modules/boto3/default.nix
@@ -13,11 +13,11 @@
buildPythonPackage rec {
pname = "boto3";
- version = "1.20.35"; # N.B: if you change this, change botocore and awscli to a matching version
+ version = "1.21.12"; # N.B: if you change this, change botocore and awscli to a matching version
src = fetchPypi {
inherit pname version;
- sha256 = "42dd9fcb9e033ab19c9dfaeaba745ef9d2db6efe4e9f1e1f547b3e3e0b1f4a82";
+ sha256 = "sha256-yS7CCmcHIbWhvAE7MFqE2yt/nHFmU7MFbOfi+9KhgO8=";
};
propagatedBuildInputs = [ botocore jmespath s3transfer ] ++ lib.optionals (!isPy3k) [ futures ];
diff --git a/pkgs/development/python-modules/botocore/default.nix b/pkgs/development/python-modules/botocore/default.nix
index 6d5c11665c2c..0c69de1c0e08 100644
--- a/pkgs/development/python-modules/botocore/default.nix
+++ b/pkgs/development/python-modules/botocore/default.nix
@@ -13,11 +13,11 @@
buildPythonPackage rec {
pname = "botocore";
- version = "1.23.35"; # N.B: if you change this, change boto3 and awscli to a matching version
+ version = "1.24.12"; # N.B: if you change this, change boto3 and awscli to a matching version
src = fetchPypi {
inherit pname version;
- sha256 = "5be6ba6c5ea71c256da8a5023bf9c278847c4b90fdb40f2c4c3bdb21ca11ff28";
+ sha256 = "sha256-AXSZmgSwouQkVxBgk6zps2+pR3KkQtm89gdQJj0dBz4=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/bottleneck/default.nix b/pkgs/development/python-modules/bottleneck/default.nix
index f7e7dc7c390c..7b8334ee36c1 100644
--- a/pkgs/development/python-modules/bottleneck/default.nix
+++ b/pkgs/development/python-modules/bottleneck/default.nix
@@ -7,11 +7,11 @@
buildPythonPackage rec {
pname = "Bottleneck";
- version = "1.3.2";
+ version = "1.3.4";
src = fetchPypi {
inherit pname version;
- sha256 = "20179f0b66359792ea283b69aa16366419132f3b6cf3adadc0c48e2e8118e573";
+ sha256 = "sha256-F2Sn9K1YxVhyPFQoR+s2erC7ttiApOXV7vMKDs5c7Oo=";
};
propagatedBuildInputs = [ numpy ];
diff --git a/pkgs/development/python-modules/boxx/default.nix b/pkgs/development/python-modules/boxx/default.nix
index a3f0db80fafe..dd521523179f 100644
--- a/pkgs/development/python-modules/boxx/default.nix
+++ b/pkgs/development/python-modules/boxx/default.nix
@@ -18,11 +18,11 @@
buildPythonPackage rec {
pname = "boxx";
- version = "0.9.9";
+ version = "0.9.10";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-Mc6R6ruUVhFs2D0CTJsAiM9aGOusS973hRS5r2kQsy4=";
+ sha256 = "sha256-Iw6jRhKAroqfWmbXhD7YTn4s8FrE/Iyd31EOP0tMdkQ=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/bsblan/default.nix b/pkgs/development/python-modules/bsblan/default.nix
index 6db952347752..ed13a3a3a7ba 100644
--- a/pkgs/development/python-modules/bsblan/default.nix
+++ b/pkgs/development/python-modules/bsblan/default.nix
@@ -5,6 +5,8 @@
, aresponses
, coverage
, mypy
+, poetry-core
+, pydantic
, pytest-asyncio
, pytest-cov
, pytest-mock
@@ -17,22 +19,27 @@
buildPythonPackage rec {
pname = "bsblan";
- version = "0.5.0";
- format = "setuptools";
+ version = "0.5.5";
+ format = "pyproject";
disabled = pythonOlder "3.8";
src = fetchFromGitHub {
owner = "liudger";
repo = "python-bsblan";
- rev = "v.${version}";
- sha256 = "1j41y2njnalcsp1vjqwl508yp3ki82lv8108ijz52hprhrq4fffb";
+ rev = "v${version}";
+ sha256 = "sha256-kq4cML7D9XC/QRPjGfaWcs0H78OOc2IXGua7qJpWYOQ=";
};
+ nativeBuildInputs = [
+ poetry-core
+ ];
+
propagatedBuildInputs = [
aiohttp
attrs
cattrs
+ pydantic
yarl
];
diff --git a/pkgs/development/python-modules/buildbot/default.nix b/pkgs/development/python-modules/buildbot/default.nix
index 2836ee24c34a..5190c1fa74f4 100644
--- a/pkgs/development/python-modules/buildbot/default.nix
+++ b/pkgs/development/python-modules/buildbot/default.nix
@@ -92,6 +92,9 @@ let
preCheck = ''
export LC_ALL="en_US.UTF-8"
export PATH="$out/bin:$PATH"
+
+ # remove testfile which is missing configuration file from sdist
+ rm buildbot/test/integration/test_graphql.py
'';
disabled = !isPy3k;
diff --git a/pkgs/development/python-modules/can/default.nix b/pkgs/development/python-modules/can/default.nix
index a68d73e1242c..18077ce78cc8 100644
--- a/pkgs/development/python-modules/can/default.nix
+++ b/pkgs/development/python-modules/can/default.nix
@@ -15,7 +15,7 @@
buildPythonPackage rec {
pname = "python-can";
- version = "unstable-2022-01-11";
+ version = "4.0.0";
format = "setuptools";
disabled = pythonOlder "3.6";
@@ -23,8 +23,8 @@ buildPythonPackage rec {
src = fetchFromGitHub {
owner = "hardbyte";
repo = pname;
- rev = "2e24af08326ecd69fba9f02fed7b9c26f233c92b";
- hash = "sha256-ZP5qtbjDtBZ2uT9DOSvSnfHyTlirr0oCEXhiLO1ydz0=";
+ rev = version;
+ hash = "sha256-/z7zBfVbO7x4UtzWOXolH2YrtYWgsvRLObWwz8sqOEc=";
};
propagatedBuildInputs = [
@@ -56,6 +56,9 @@ buildPythonPackage rec {
# Tests require access socket
"BasicTestUdpMulticastBusIPv4"
"BasicTestUdpMulticastBusIPv6"
+ # pytest.approx is not supported in a boolean context (since pytest7)
+ "test_pack_unpack"
+ "test_receive"
];
preCheck = ''
diff --git a/pkgs/development/python-modules/cattrs/default.nix b/pkgs/development/python-modules/cattrs/default.nix
index e3d694d28e3b..94a357df98be 100644
--- a/pkgs/development/python-modules/cattrs/default.nix
+++ b/pkgs/development/python-modules/cattrs/default.nix
@@ -7,6 +7,7 @@
, motor
, msgpack
, poetry-core
+, pytest-xdist
, pytestCheckHook
, pythonOlder
, pyyaml
@@ -44,12 +45,17 @@ buildPythonPackage rec {
immutables
motor
msgpack
+ pytest-xdist
pytestCheckHook
pyyaml
tomlkit
ujson
];
+ pytestFlagsArray = [
+ "--numprocesses $NIX_BUILD_CORES"
+ ];
+
postPatch = ''
substituteInPlace pyproject.toml \
--replace "-l --benchmark-sort=fullname --benchmark-warmup=true --benchmark-warmup-iterations=5 --benchmark-group-by=fullname" "" \
@@ -75,6 +81,8 @@ buildPythonPackage rec {
disabledTests = [
# orjson is not available as it requires Rust nightly features to compile its requirements
"test_orjson"
+ # tomlkit is pinned to an older version and newer versions raise InvalidControlChar exception
+ "test_tomlkit"
];
pythonImportsCheck = [
diff --git a/pkgs/development/python-modules/cbor2/default.nix b/pkgs/development/python-modules/cbor2/default.nix
index cf4813a9d908..5039872b336f 100644
--- a/pkgs/development/python-modules/cbor2/default.nix
+++ b/pkgs/development/python-modules/cbor2/default.nix
@@ -9,13 +9,13 @@
buildPythonPackage rec {
pname = "cbor2";
- version = "5.4.2";
+ version = "5.4.2.post1";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-4oPnC1WgSf82TMXmSP3lh+TZsOh+SyZkxp5jkTXms7g=";
+ sha256 = "sha256-nPIdWWBLlSnXh3yOA0Ki66rhoH/o/1aD3HX+wVhHx5c=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/certbot/default.nix b/pkgs/development/python-modules/certbot/default.nix
index e65e6f0d808e..72a5d8db39d7 100644
--- a/pkgs/development/python-modules/certbot/default.nix
+++ b/pkgs/development/python-modules/certbot/default.nix
@@ -9,13 +9,13 @@
buildPythonPackage rec {
pname = "certbot";
- version = "1.22.0";
+ version = "1.24.0";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "v${version}";
- sha256 = "1wrk5rhds6a69vbs1bda0zhwpvjhd8i20did6j3kydbas3zbr516";
+ sha256 = "sha256-XIKFEPQKIV5s6sZ7LRnlTvsb3cF4KIaiVZ36cAN1AwA=";
};
sourceRoot = "source/${pname}";
diff --git a/pkgs/development/python-modules/chalice/default.nix b/pkgs/development/python-modules/chalice/default.nix
index 762846ab34c2..93499d0f5638 100644
--- a/pkgs/development/python-modules/chalice/default.nix
+++ b/pkgs/development/python-modules/chalice/default.nix
@@ -24,13 +24,13 @@
buildPythonPackage rec {
pname = "chalice";
- version = "1.26.4";
+ version = "1.26.6";
src = fetchFromGitHub {
owner = "aws";
repo = pname;
rev = version;
- sha256 = "sha256-Xn8OqeEihLxZS9QZtrhzau2zLg9SzQrrigK70PoImhU=";
+ sha256 = "sha256-6Y5pJg6N/F97zvkyo4r6MoThi79kI53AvlHNOmOCpFA=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/ciscoconfparse/default.nix b/pkgs/development/python-modules/ciscoconfparse/default.nix
index e6db689a45c5..49b36a5c6582 100644
--- a/pkgs/development/python-modules/ciscoconfparse/default.nix
+++ b/pkgs/development/python-modules/ciscoconfparse/default.nix
@@ -33,6 +33,7 @@ buildPythonPackage rec {
passlib
dnspython
loguru
+ toml
];
checkInputs = [
diff --git a/pkgs/development/python-modules/click/default.nix b/pkgs/development/python-modules/click/default.nix
index 6d865307f9be..5156ad1048fb 100644
--- a/pkgs/development/python-modules/click/default.nix
+++ b/pkgs/development/python-modules/click/default.nix
@@ -17,11 +17,11 @@
buildPythonPackage rec {
pname = "click";
- version = "8.0.3";
+ version = "8.0.4";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-QQ6TKwUPXu13PEzalN51lxyJzbMVWnKggxE5p55ey1s=";
+ sha256 = "sha256-hFjXsSh8X7EoyQ4jOBz5nc3nS+r2x/9jhM6E1v4JCts=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/clldutils/default.nix b/pkgs/development/python-modules/clldutils/default.nix
index 563ad08381c4..697296d9a200 100644
--- a/pkgs/development/python-modules/clldutils/default.nix
+++ b/pkgs/development/python-modules/clldutils/default.nix
@@ -44,9 +44,15 @@ buildPythonPackage rec {
pytest-mock
];
+ disabledTests = [
+ # uses pytest.approx which is not supported in a boolean context in pytest7
+ "test_to_dec"
+ "test_roundtrip"
+ ];
+
meta = with lib; {
- description = "CSV on the Web";
- homepage = "https://github.com/cldf/csvw";
+ description = "Utilities for clld apps without the overhead of requiring pyramid, rdflib et al";
+ homepage = "https://github.com/clld/clldutils";
license = licenses.asl20;
maintainers = with maintainers; [ ];
};
diff --git a/pkgs/development/python-modules/cma/default.nix b/pkgs/development/python-modules/cma/default.nix
index 473f06076983..c0480f2fa714 100644
--- a/pkgs/development/python-modules/cma/default.nix
+++ b/pkgs/development/python-modules/cma/default.nix
@@ -7,13 +7,13 @@
buildPythonPackage rec {
pname = "cma";
- version = "3.1.0";
+ version = "3.2.1";
src = fetchFromGitHub {
owner = "CMA-ES";
repo = "pycma";
rev = "r${version}";
- sha256 = "1bal4kljxrdm6x5ppyi6i109714h0czdxfsna906dlfplrmq52bf";
+ sha256 = "sha256-wLUD8HMJusUeCwwp37D/W7yJuJQcDfRwVGVKwBS6sR8=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/cmd2/default.nix b/pkgs/development/python-modules/cmd2/default.nix
index 5f262438fe95..8a7f9a5e1c8a 100644
--- a/pkgs/development/python-modules/cmd2/default.nix
+++ b/pkgs/development/python-modules/cmd2/default.nix
@@ -18,13 +18,13 @@
buildPythonPackage rec {
pname = "cmd2";
- version = "2.3.3";
+ version = "2.4.0";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "750d7eb04d55c3bc2a413e191bc177856f388102de47d11f2210a35266543640";
+ sha256 = "sha256-CQkJq2yOzuQIE87HWeYd1ucMgiehqOlggvXysNOUvHc=";
};
LC_ALL = "en_US.UTF-8";
diff --git a/pkgs/development/python-modules/collections-extended/default.nix b/pkgs/development/python-modules/collections-extended/default.nix
index 52f73a5554a5..b51a458109c9 100644
--- a/pkgs/development/python-modules/collections-extended/default.nix
+++ b/pkgs/development/python-modules/collections-extended/default.nix
@@ -7,7 +7,7 @@
}:
buildPythonPackage rec {
pname = "collections-extended";
- version = "2.0.0";
+ version = "2.0.2";
format = "pyproject";
disabled = pythonOlder "3.6";
@@ -16,7 +16,7 @@ buildPythonPackage rec {
owner = "mlenzen";
repo = pname;
rev = "v${version}";
- sha256 = "sha256:1qcr1q49a134b122rpldjiim1fsl32gxs5fpj3232nyb05r68haz";
+ sha256 = "sha256-cK13+CQUELKSiLpG747+C+RB5b6luu0mWLLXTT+uGH4=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/commoncode/default.nix b/pkgs/development/python-modules/commoncode/default.nix
index 7a2416728c8e..ff642c8930e5 100644
--- a/pkgs/development/python-modules/commoncode/default.nix
+++ b/pkgs/development/python-modules/commoncode/default.nix
@@ -20,7 +20,7 @@
buildPythonPackage rec {
pname = "commoncode";
version = "30.0.0";
- format = "setuptools";
+ format = "pyproject";
disabled = pythonOlder "3.6";
@@ -29,6 +29,11 @@ buildPythonPackage rec {
sha256 = "sha256-6SeU4u6pfDuGCgCYAO5fdbWBxW9XN3WvM8j6DwUlFwM=";
};
+ postPatch = ''
+ substituteInPlace setup.cfg \
+ --replace "intbitset >= 2.3.0, < 3.0" "intbitset >= 2.3.0"
+ '';
+
dontConfigure = true;
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/construct/default.nix b/pkgs/development/python-modules/construct/default.nix
index 8ae44476eff4..ce6e0a65b342 100644
--- a/pkgs/development/python-modules/construct/default.nix
+++ b/pkgs/development/python-modules/construct/default.nix
@@ -5,7 +5,7 @@
buildPythonPackage rec {
pname = "construct";
- version = "2.10.67";
+ version = "2.10.68";
disabled = pythonOlder "3.6";
@@ -14,7 +14,7 @@ buildPythonPackage rec {
owner = pname;
repo = pname;
rev = "v${version}";
- sha256 = "1nciwim745qk41l1ck4chx3vxpfr6cq4k3a4i7vfnnrd3s6szzsw";
+ sha256 = "sha256-bp/YyRFP0rrBHPyhiqnn6o1iC5l61oedShZ2phGeqaw=";
};
# not an explicit dependency, but it's imported by an entrypoint
diff --git a/pkgs/development/python-modules/convertdate/default.nix b/pkgs/development/python-modules/convertdate/default.nix
index cc26142d362b..b20066c51d8b 100644
--- a/pkgs/development/python-modules/convertdate/default.nix
+++ b/pkgs/development/python-modules/convertdate/default.nix
@@ -1,23 +1,24 @@
{ lib
, buildPythonPackage
-, isPy27
, fetchFromGitHub
, pymeeus
, pytz
, pytestCheckHook
+, pythonOlder
}:
buildPythonPackage rec {
pname = "convertdate";
- version = "2.3.2";
- disabled = isPy27;
+ version = "2.4.0";
+ format = "setuptools";
+
+ disabled = pythonOlder "3.7";
- # Tests are not available in the PyPI tarball so use GitHub instead.
src = fetchFromGitHub {
owner = "fitnr";
repo = pname;
rev = "v${version}";
- sha256 = "0k7j59sbqwyi72vcjx5vsh3qb6hxfnkfjkd2i6f6lckdr1bkh7fz";
+ hash = "sha256-iOHK3UJulXJJR50nhiVgfk3bt+CAtG3BRySJ8DkBuJE=";
};
propagatedBuildInputs = [
@@ -29,11 +30,13 @@ buildPythonPackage rec {
pytestCheckHook
];
- pythonImportsCheck = [ "convertdate" ];
+ pythonImportsCheck = [
+ "convertdate"
+ ];
meta = with lib; {
- homepage = "https://github.com/fitnr/convertdate";
description = "Utils for converting between date formats and calculating holidays";
+ homepage = "https://github.com/fitnr/convertdate";
license = licenses.mit;
maintainers = with maintainers; [ jluttine ];
};
diff --git a/pkgs/development/python-modules/coverage/default.nix b/pkgs/development/python-modules/coverage/default.nix
index f1930b88fb8c..8019fc949665 100644
--- a/pkgs/development/python-modules/coverage/default.nix
+++ b/pkgs/development/python-modules/coverage/default.nix
@@ -7,13 +7,13 @@
buildPythonPackage rec {
pname = "coverage";
- version = "6.2";
+ version = "6.3.2";
# uses f strings
disabled = pythonOlder "3.5";
src = fetchPypi {
inherit pname version;
- sha256 = "e2cad8093172b7d1595b4ad66f24270808658e11acf43a8f95b41276162eb5b8";
+ sha256 = "sha256-A+KngmCGuR7zRf8YdC7p/Eemg5zNUXBh74+hl25lLOk=";
};
# No tests in archive
diff --git a/pkgs/development/python-modules/cssselect2/default.nix b/pkgs/development/python-modules/cssselect2/default.nix
index 52c1bc4067fb..987e84ffcee2 100644
--- a/pkgs/development/python-modules/cssselect2/default.nix
+++ b/pkgs/development/python-modules/cssselect2/default.nix
@@ -1,5 +1,6 @@
{ lib
, buildPythonPackage
+, flit-core
, pythonOlder
, fetchPypi
, tinycss2
@@ -8,18 +9,23 @@
buildPythonPackage rec {
pname = "cssselect2";
- version = "0.4.1";
+ version = "0.5.0";
+ format = "pyproject";
disabled = pythonOlder "3.5";
src = fetchPypi {
inherit pname version;
- sha256 = "93fbb9af860e95dd40bf18c3b2b6ed99189a07c0f29ba76f9c5be71344664ec8";
+ sha256 = "sha256-2Yp7vdjrxGCTJ5GV1mmjNZvVoj+QwZ6CwZ2e7vMz5hc=";
};
postPatch = ''
sed -i '/^addopts/d' pyproject.toml
'';
+ nativeBuildInputs = [
+ flit-core
+ ];
+
propagatedBuildInputs = [ tinycss2 ];
checkInputs = [ pytestCheckHook ];
diff --git a/pkgs/development/python-modules/cx_freeze/default.nix b/pkgs/development/python-modules/cx_freeze/default.nix
index 90e2608069c4..fb02b0d1ef14 100644
--- a/pkgs/development/python-modules/cx_freeze/default.nix
+++ b/pkgs/development/python-modules/cx_freeze/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "cx_Freeze";
- version = "6.9";
+ version = "6.10";
src = fetchPypi {
inherit pname version;
- sha256 = "673aa3199af2ef87fc03a43a30e5d78b27ced2cedde925da89c55b5657da267b";
+ sha256 = "sha256-5bcb9XuYgawUL76+riyLDTKUtW9uSKtkAyMh47Giuic=";
};
disabled = pythonOlder "3.5";
diff --git a/pkgs/development/python-modules/cyclonedx-python-lib/default.nix b/pkgs/development/python-modules/cyclonedx-python-lib/default.nix
index 26546c3f7cb0..af638894831d 100644
--- a/pkgs/development/python-modules/cyclonedx-python-lib/default.nix
+++ b/pkgs/development/python-modules/cyclonedx-python-lib/default.nix
@@ -17,7 +17,7 @@
buildPythonPackage rec {
pname = "cyclonedx-python-lib";
- version = "1.3.0";
+ version = "2.0.0";
format = "pyproject";
disabled = pythonOlder "3.6";
@@ -26,7 +26,7 @@ buildPythonPackage rec {
owner = "CycloneDX";
repo = pname;
rev = "v${version}";
- hash = "sha256-/1kWvhTUS0JT0RwodiivJSUiWIDwQyXxdjF/KUlCNds=";
+ hash = "sha256-S1bcUCHe4UYJuSHI8LMQZ/reS6YAE0hxrpw+QweFm/8=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/dask/default.nix b/pkgs/development/python-modules/dask/default.nix
index 7af0eca747e8..ffdca65a606a 100644
--- a/pkgs/development/python-modules/dask/default.nix
+++ b/pkgs/development/python-modules/dask/default.nix
@@ -22,7 +22,7 @@
buildPythonPackage rec {
pname = "dask";
- version = "2022.02.0";
+ version = "2022.02.1";
format = "setuptools";
disabled = pythonOlder "3.7";
@@ -31,7 +31,7 @@ buildPythonPackage rec {
owner = "dask";
repo = pname;
rev = version;
- hash = "sha256-tDqpIS8j6a16YbJak+P1GkCEZvJyheWV5vkUrkhScRY=";
+ hash = "sha256-A8ktvfpow/QKAEEt9SUnkTqYFJCrV1mgnuDIP3gdyrE=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/datadog/default.nix b/pkgs/development/python-modules/datadog/default.nix
index c15e673fa3ed..7d32650302f4 100644
--- a/pkgs/development/python-modules/datadog/default.nix
+++ b/pkgs/development/python-modules/datadog/default.nix
@@ -2,6 +2,7 @@
, buildPythonPackage
, fetchPypi
, pythonOlder
+, hatchling
, decorator
, requests
, typing ? null
@@ -17,17 +18,22 @@
buildPythonPackage rec {
pname = "datadog";
- version = "0.43.0";
+ version = "0.44.0";
+ format = "pyproject";
src = fetchPypi {
inherit pname version;
- sha256 = "1f2123083d9e1add6f238c62714b76ac2fc134d7d1c435cd82b976487b191b96";
+ sha256 = "sha256-BxFw8MfvIlEdv3+b12xL5QDuLT1SBykApch7VJXSxzM=";
};
postPatch = ''
find . -name '*.pyc' -exec rm {} \;
'';
+ nativeBuildInputs = [
+ hatchling
+ ];
+
propagatedBuildInputs = [ decorator requests ]
++ lib.optional (pythonOlder "3.5") typing
++ lib.optional (pythonOlder "3.0") configparser;
diff --git a/pkgs/development/python-modules/datasets/default.nix b/pkgs/development/python-modules/datasets/default.nix
index ab5e929818c6..baf27639fd4a 100644
--- a/pkgs/development/python-modules/datasets/default.nix
+++ b/pkgs/development/python-modules/datasets/default.nix
@@ -16,13 +16,13 @@
buildPythonPackage rec {
pname = "datasets";
- version = "1.17.0";
+ version = "1.18.3";
src = fetchFromGitHub {
owner = "huggingface";
repo = pname;
rev = version;
- sha256 = "0bsk3jldvcxak64dhlxkqax7mf83z6qpwfgfk32rni1gpnz5pqbd";
+ sha256 = "sha256-2x6DpsDcVF2O5iJKeMEGw/aJwZPc7gSGaK2947c3B6s=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/datatable/default.nix b/pkgs/development/python-modules/datatable/default.nix
index 9008270fc79e..004e47a60b5c 100644
--- a/pkgs/development/python-modules/datatable/default.nix
+++ b/pkgs/development/python-modules/datatable/default.nix
@@ -44,15 +44,9 @@ buildPythonPackage rec {
LLVM = llvm;
NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-isystem ${lib.getDev libcxx}/include/c++/v1";
- pytestFlagsArray = let
- # ini file (not included in tarball) required to change python_files setting,
- pytestIni = writeText "pytest.ini" ''
- [pytest]
- python_files = test_*.py test-*.py
- '';
- in [
- "-c ${pytestIni}"
- ];
+ # test suite is very cpu intensive, only run small subset to ensure package is working as expected
+ pytestFlagsArray = [ "tests/test-sets.py" ];
+
disabledTests = [
# skip tests which are irrelevant to our installation or use way too much memory
"test_xfunction_paths"
diff --git a/pkgs/development/python-modules/deepdiff/default.nix b/pkgs/development/python-modules/deepdiff/default.nix
index 67f5347e1e7e..2601eedc2fa2 100644
--- a/pkgs/development/python-modules/deepdiff/default.nix
+++ b/pkgs/development/python-modules/deepdiff/default.nix
@@ -12,18 +12,21 @@
buildPythonPackage rec {
pname = "deepdiff";
- version = "5.6.0";
+ version = "5.7.0";
format = "setuptools";
# pypi source does not contain all fixtures required for tests
src = fetchFromGitHub {
owner = "seperman";
repo = "deepdiff";
- rev = version;
- sha256 = "sha256-ysaIeVefsTX7ZubOXaEzeS1kMyBp4/w3SHNFxsGVhzY=";
+ # 5.7.0 release not tagged https://github.com/seperman/deepdiff/issues/300
+ rev = "f2ffdb83b2993f4f0bb7e854620f0acd0bf6339e";
+ hash = "sha256-0UBx7sH2iMrLVl5FtHNTwoecLHi8GbInn75G3FSg4gk=";
};
postPatch = ''
+ substituteInPlace requirements.txt \
+ --replace "ordered-set==4.0.2" "ordered-set"
substituteInPlace tests/test_command.py \
--replace '/tmp/' "$TMPDIR/"
'';
diff --git a/pkgs/development/python-modules/detect-secrets/default.nix b/pkgs/development/python-modules/detect-secrets/default.nix
index ef19b9a913b0..e9227891e045 100644
--- a/pkgs/development/python-modules/detect-secrets/default.nix
+++ b/pkgs/development/python-modules/detect-secrets/default.nix
@@ -15,14 +15,14 @@
buildPythonPackage rec {
pname = "detect-secrets";
- version = "1.1.0";
+ version = "1.2.0";
disabled = isPy27;
src = fetchFromGitHub {
owner = "Yelp";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-dG2YaWXAMINxBGKNMlVfGTR9QHdnepiZmN+G88X4Wak=";
+ hash = "sha256-4VcV06iaL3NAj7qF8RyfWV1zgrt928AQfjGeuO2Pbjk=";
leaveDotGit = true;
};
diff --git a/pkgs/development/python-modules/devtools/default.nix b/pkgs/development/python-modules/devtools/default.nix
index 5d4f0871bf78..34004769b1fd 100644
--- a/pkgs/development/python-modules/devtools/default.nix
+++ b/pkgs/development/python-modules/devtools/default.nix
@@ -34,11 +34,18 @@ buildPythonPackage rec {
pytest-mock
];
+ pytestFlagsArray = [
+ # pytest.PytestRemovedIn8Warning: Passing None has been deprecated.
+ "-W ignore::pytest.PytestRemovedIn8Warning"
+ ];
+
disabledTests = [
# Test for Windows32
"test_print_subprocess"
# sensitive to timing
"test_multiple_not_verbose"
+ # sensitive to interpreter output
+ "test_simple_vars"
];
pythonImportsCheck = [
diff --git a/pkgs/development/python-modules/diff-cover/default.nix b/pkgs/development/python-modules/diff-cover/default.nix
index cbb44fb7ca4f..22435ae71ba5 100644
--- a/pkgs/development/python-modules/diff-cover/default.nix
+++ b/pkgs/development/python-modules/diff-cover/default.nix
@@ -52,6 +52,8 @@ buildPythonPackage rec {
"file_does_not_exist"
# AssertionError: assert '.c { color:...
"test_style_defs"
+ # uses pytest.approx in a boolean context, which is unsupported since pytest7
+ "test_percent_covered"
];
pythonImportsCheck = [
diff --git a/pkgs/development/python-modules/distributed/default.nix b/pkgs/development/python-modules/distributed/default.nix
index ee86418a6651..2055c9de13e3 100644
--- a/pkgs/development/python-modules/distributed/default.nix
+++ b/pkgs/development/python-modules/distributed/default.nix
@@ -19,7 +19,7 @@
buildPythonPackage rec {
pname = "distributed";
- version = "2022.2.0";
+ version = "2022.2.1";
format = "setuptools";
disabled = pythonOlder "3.7";
@@ -27,7 +27,7 @@ buildPythonPackage rec {
# get full repository need conftest.py to run tests
src = fetchPypi {
inherit pname version;
- hash = "sha256-Gi9u7JczpnAEg53E7N5tXBfAeWZaLBVzRU3SpbU3bZU=";
+ hash = "sha256-+2KnWvjvM7vhqoCmjAGjOpPBzVozLdAXq0SVW/fs9ls=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/distro/default.nix b/pkgs/development/python-modules/distro/default.nix
index bf8675af941d..deee452ae1b4 100644
--- a/pkgs/development/python-modules/distro/default.nix
+++ b/pkgs/development/python-modules/distro/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "distro";
- version = "1.6.0";
+ version = "1.7.0";
src = fetchPypi {
inherit pname version;
- sha256 = "83f5e5a09f9c5f68f60173de572930effbcc0287bb84fdc4426cb4168c088424";
+ sha256 = "sha256-FRrsz2DCFkApMrUuQO5HepOfjViJiSc3igKrvoUsHDk=";
};
# tests are very targeted at individual linux distributions
diff --git a/pkgs/development/python-modules/django-appconf/default.nix b/pkgs/development/python-modules/django-appconf/default.nix
new file mode 100644
index 000000000000..66eef9d47288
--- /dev/null
+++ b/pkgs/development/python-modules/django-appconf/default.nix
@@ -0,0 +1,45 @@
+{ lib
+, buildPythonPackage
+, fetchFromGitHub
+, pythonOlder
+, django
+, six
+, python
+}:
+
+buildPythonPackage rec {
+ pname = "django-appconf";
+ version = "1.0.5";
+ format = "setuptools";
+
+ disabled = pythonOlder "3.6";
+
+ src = fetchFromGitHub {
+ owner = "django-compressor";
+ repo = "django-appconf";
+ rev = "v${version}";
+ hash = "sha256-nS4Hwp/NYg1XGvZO1tiE9mzJA7WFifyvgAjyp3YpqS4=";
+ };
+
+ propagatedBuildInputs = [
+ django
+ ];
+
+ preCheck = ''
+ # prove we're running tests against installed package, not build dir
+ rm -r appconf
+ '';
+
+ checkPhase = ''
+ runHook preCheck
+ ${python.interpreter} -m django test --settings=tests.test_settings
+ runHook postCheck
+ '';
+
+ meta = with lib; {
+ description = "A helper class for handling configuration defaults of packaged apps gracefully";
+ homepage = "https://django-appconf.readthedocs.org/";
+ license = licenses.bsd2;
+ maintainers = with maintainers; [ desiderius ];
+ };
+}
diff --git a/pkgs/development/python-modules/django-raster/default.nix b/pkgs/development/python-modules/django-raster/default.nix
index 713e7214cfbc..f590aca527f4 100644
--- a/pkgs/development/python-modules/django-raster/default.nix
+++ b/pkgs/development/python-modules/django-raster/default.nix
@@ -2,9 +2,7 @@
numpy, django_colorful, pillow, psycopg2,
pyparsing, django, celery, boto3, importlib-metadata
}:
-if lib.versionOlder django.version "2.0"
-then throw "django-raster requires Django >= 2.0. Consider overiding the python package set to use django_2."
-else
+
buildPythonPackage rec {
version = "0.8.1";
pname = "django-raster";
diff --git a/pkgs/development/python-modules/django-statici18n/default.nix b/pkgs/development/python-modules/django-statici18n/default.nix
index 78c807903c4e..db7d36c89933 100644
--- a/pkgs/development/python-modules/django-statici18n/default.nix
+++ b/pkgs/development/python-modules/django-statici18n/default.nix
@@ -1,4 +1,4 @@
-{ lib, buildPythonPackage, fetchPypi, django, django_appconf }:
+{ lib, buildPythonPackage, fetchPypi, django, django-appconf }:
buildPythonPackage rec {
pname = "django-statici18n";
@@ -9,7 +9,7 @@ buildPythonPackage rec {
sha256 = "dbcdac190d93e0b4eabcab8875c8eb68795eceb442f926843ec5cbe1432fe628";
};
- propagatedBuildInputs = [ django django_appconf ];
+ propagatedBuildInputs = [ django django-appconf ];
# pypi package does not contains test harness
# source tarball requires setting up a config
diff --git a/pkgs/development/python-modules/django-widget-tweaks/default.nix b/pkgs/development/python-modules/django-widget-tweaks/default.nix
index 63e575b63454..5fd29de16107 100644
--- a/pkgs/development/python-modules/django-widget-tweaks/default.nix
+++ b/pkgs/development/python-modules/django-widget-tweaks/default.nix
@@ -1,4 +1,16 @@
-{ buildPythonPackage, fetchFromGitHub, python, lib, django }:
+{ lib
+, buildPythonPackage
+, fetchFromGitHub
+
+# native
+, setuptools-scm
+
+# propagated
+, django
+
+# tests
+, python
+}:
buildPythonPackage rec {
pname = "django-widget-tweaks";
@@ -11,15 +23,26 @@ buildPythonPackage rec {
sha256 = "1rhn2skx287k6nnkxlwvl9snbia6w6z4c2rqg22hwzbz5w05b24h";
};
- checkPhase = "${python.interpreter} runtests.py";
- propagatedBuildInputs = [ django ];
+ SETUPTOOLS_SCM_PRETEND_VERSION = version;
+
+ nativeBuildInputs = [
+ setuptools-scm
+ ];
+
+ propagatedBuildInputs = [
+ django
+ ];
+
+ checkPhase = ''
+ ${python.interpreter} -m django test --settings=tests.settings
+ '';
meta = with lib; {
- description = "Tweak the form field rendering in templates, not in python-level form definitions.";
- homepage = "https://github.com/jazzband/django-widget-tweaks";
- license = licenses.mit;
- maintainers = with maintainers; [
- maxxk
- ];
+ description = "Tweak the form field rendering in templates, not in python-level form definitions.";
+ homepage = "https://github.com/jazzband/django-widget-tweaks";
+ license = licenses.mit;
+ maintainers = with maintainers; [
+ maxxk
+ ];
};
}
diff --git a/pkgs/development/python-modules/django/1.10-gis-libs.template.patch b/pkgs/development/python-modules/django/1.10-gis-libs.template.patch
deleted file mode 100644
index da154554d1b3..000000000000
--- a/pkgs/development/python-modules/django/1.10-gis-libs.template.patch
+++ /dev/null
@@ -1,24 +0,0 @@
-diff --git a/django/contrib/gis/gdal/libgdal.py b/django/contrib/gis/gdal/libgdal.py
---- a/django/contrib/gis/gdal/libgdal.py
-+++ b/django/contrib/gis/gdal/libgdal.py
-@@ -17,7 +17,7 @@ try:
- lib_path = settings.GDAL_LIBRARY_PATH
- except (AttributeError, EnvironmentError,
- ImportError, ImproperlyConfigured):
-- lib_path = None
-+ lib_path = "@gdal@/lib/libgdal@extension@"
-
- if lib_path:
- lib_names = None
-diff --git a/django/contrib/gis/geos/libgeos.py b/django/contrib/gis/geos/libgeos.py
---- a/django/contrib/gis/geos/libgeos.py
-+++ b/django/contrib/gis/geos/libgeos.py
-@@ -26,7 +26,7 @@ try:
- lib_path = settings.GEOS_LIBRARY_PATH
- except (AttributeError, EnvironmentError,
- ImportError, ImproperlyConfigured):
-- lib_path = None
-+ lib_path = "@geos@/lib/libgeos_c@extension@"
-
- # Setting the appropriate names for the GEOS-C library.
- if lib_path:
diff --git a/pkgs/development/python-modules/django/2.nix b/pkgs/development/python-modules/django/2.nix
deleted file mode 100644
index 727bf304fdb2..000000000000
--- a/pkgs/development/python-modules/django/2.nix
+++ /dev/null
@@ -1,39 +0,0 @@
-{ lib, stdenv, buildPythonPackage, fetchPypi, substituteAll,
- isPy3k,
- geos, gdal, pytz, sqlparse,
- withGdal ? false
-}:
-
-buildPythonPackage rec {
- pname = "django";
- version = "2.2.27";
-
- disabled = !isPy3k;
-
- src = fetchPypi {
- pname = "Django";
- inherit version;
- sha256 = "sha256-HuNwRrC/K2HoOzoB0GcyNRbsO28rF81JsTJt1LqdyRM=";
- };
-
- patches = lib.optional withGdal
- (substituteAll {
- src = ./1.10-gis-libs.template.patch;
- geos = geos;
- gdal = gdal;
- extension = stdenv.hostPlatform.extensions.sharedLibrary;
- })
- ;
-
- propagatedBuildInputs = [ pytz sqlparse ];
-
- # too complicated to setup
- doCheck = false;
-
- meta = with lib; {
- description = "A high-level Python Web framework";
- homepage = "https://www.djangoproject.com/";
- license = licenses.bsd3;
- maintainers = with maintainers; [ georgewhewell ];
- };
-}
diff --git a/pkgs/development/python-modules/django_appconf/default.nix b/pkgs/development/python-modules/django_appconf/default.nix
deleted file mode 100644
index 5da9ed0ca26d..000000000000
--- a/pkgs/development/python-modules/django_appconf/default.nix
+++ /dev/null
@@ -1,35 +0,0 @@
-{ lib, buildPythonPackage, fetchFromGitHub, six, django, fetchpatch }:
-buildPythonPackage rec {
- pname = "django-appconf";
- version = "1.0.3";
-
- src = fetchFromGitHub {
- owner = "django-compressor";
- repo = "django-appconf";
- rev = version;
- sha256 = "06hwbz7362y0la9np3df25mms235fcqgpd2vn0mnf8dri9spzy1h";
- };
-
- propagatedBuildInputs = [ six django ];
-
- patches = [
- (fetchpatch {
- name = "backport_django_2_2.patch";
- url = "https://github.com/django-compressor/django-appconf/commit/1526a842ee084b791aa66c931b3822091a442853.patch";
- sha256 = "1vl2s6vlf15089s8p4c3g4d5iqm8jva66bdw683r8440f80ixgmw";
- })
- ];
-
- checkPhase = ''
- # prove we're running tests against installed package, not build dir
- rm -r appconf
- python -m django test --settings="tests.test_settings"
- '';
-
- meta = with lib; {
- description = "A helper class for handling configuration defaults of packaged apps gracefully";
- homepage = "https://django-appconf.readthedocs.org/";
- license = licenses.bsd2;
- maintainers = with maintainers; [ desiderius ];
- };
-}
diff --git a/pkgs/development/python-modules/django_compressor/default.nix b/pkgs/development/python-modules/django_compressor/default.nix
index a8204eab5fad..82684b52374a 100644
--- a/pkgs/development/python-modules/django_compressor/default.nix
+++ b/pkgs/development/python-modules/django_compressor/default.nix
@@ -1,5 +1,5 @@
{ lib, buildPythonPackage, fetchPypi,
- rcssmin, rjsmin, django_appconf }:
+ rcssmin, rjsmin, django-appconf }:
buildPythonPackage rec {
pname = "django_compressor";
@@ -18,7 +18,7 @@ buildPythonPackage rec {
# requires django-sekizai, which we don't have packaged yet
doCheck = false;
- propagatedBuildInputs = [ rcssmin rjsmin django_appconf ];
+ propagatedBuildInputs = [ rcssmin rjsmin django-appconf ];
meta = with lib; {
description = "Compresses linked and inline JavaScript or CSS into single cached files";
diff --git a/pkgs/development/python-modules/django_contrib_comments/default.nix b/pkgs/development/python-modules/django_contrib_comments/default.nix
index 3f717b0fb5ce..88bbdfdeddb9 100644
--- a/pkgs/development/python-modules/django_contrib_comments/default.nix
+++ b/pkgs/development/python-modules/django_contrib_comments/default.nix
@@ -6,11 +6,11 @@
buildPythonPackage rec {
pname = "django-contrib-comments";
- version = "2.1.0";
+ version = "2.2.0";
src = fetchPypi {
inherit pname version;
- sha256 = "d82f1d04690550df026553053903deec0c52dc54212e1b79241b08f0355cff2c";
+ sha256 = "sha256-SN4A8VZ34BaiFq7/IF1uAOQ5HJpXAhNsZBGcRytzVto=";
};
propagatedBuildInputs = [ django ];
diff --git a/pkgs/development/python-modules/django_reversion/default.nix b/pkgs/development/python-modules/django_reversion/default.nix
index 1bf4d6b4dab5..f6bc72dc226a 100644
--- a/pkgs/development/python-modules/django_reversion/default.nix
+++ b/pkgs/development/python-modules/django_reversion/default.nix
@@ -6,11 +6,11 @@
buildPythonPackage rec {
pname = "django-reversion";
- version = "4.0.2";
+ version = "5.0.0";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-XTO6lE2/GccDDJ5w43MSSK40Nozyr+3hDg0I+/ieb4w=";
+ sha256 = "sha256-C63jw5k4dFEIfwxng14NPRhtdn3mpcW6U6iOr8Pyccg=";
};
# tests assume the availability of a mysql/postgresql database
diff --git a/pkgs/development/python-modules/dm-haiku/default.nix b/pkgs/development/python-modules/dm-haiku/default.nix
index 55a91006b06a..03677faa689f 100644
--- a/pkgs/development/python-modules/dm-haiku/default.nix
+++ b/pkgs/development/python-modules/dm-haiku/default.nix
@@ -15,13 +15,13 @@
buildPythonPackage rec {
pname = "dm-haiku";
- version = "0.0.5";
+ version = "0.0.6";
src = fetchFromGitHub {
owner = "deepmind";
repo = pname;
rev = "v${version}";
- sha256 = "1mdqjcka0m1div63ngba8w8z94id4c1h8xqmnq1xpmgkc79224wa";
+ sha256 = "sha256-qvKMeGPiWXvvyV+GZdTWdsC6Wp08AmP8nDtWk7sZtqM=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/dnspython/default.nix b/pkgs/development/python-modules/dnspython/default.nix
index 59730bff71ec..5676d270935f 100644
--- a/pkgs/development/python-modules/dnspython/default.nix
+++ b/pkgs/development/python-modules/dnspython/default.nix
@@ -5,6 +5,7 @@
, pythonOlder
, setuptools-scm
, pytestCheckHook
+, cacert
}:
buildPythonPackage rec {
@@ -20,16 +21,23 @@ buildPythonPackage rec {
checkInputs = [
pytestCheckHook
+ ] ++ lib.optional stdenv.isDarwin [
+ cacert
];
disabledTests = [
# dns.exception.SyntaxError: protocol not found
"test_misc_good_WKS_text"
- ] ++ lib.optionals stdenv.isDarwin [
- # unable to get local issuer certificate
- "test_async"
- "test_query"
+ # fails if IPv6 isn't available
"test_resolver_override"
+
+ # Tests that run inconsistently on darwin systems
+ ] ++ lib.optionals stdenv.isDarwin [
+ # 9 tests fail with: BlockingIOError: [Errno 35] Resource temporarily unavailable
+ "testQueryUDP"
+ # 6 tests fail with: dns.resolver.LifetimeTimeout: The resolution lifetime expired after ...
+ "testResolveCacheHit"
+ "testResolveTCP"
];
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/doit/default.nix b/pkgs/development/python-modules/doit/default.nix
index c7c66fceaa7c..95b7adc474af 100644
--- a/pkgs/development/python-modules/doit/default.nix
+++ b/pkgs/development/python-modules/doit/default.nix
@@ -8,6 +8,7 @@
, cloudpickle
, pyinotify
, macfsevents
+, toml
}:
buildPythonPackage rec {
@@ -21,8 +22,10 @@ buildPythonPackage rec {
sha256 = "sha256-OIER+Kals7RGIM7rKH0FhZJ8hdDW0/h5DTT7tFwM9sM=";
};
- propagatedBuildInputs = [ cloudpickle ]
- ++ lib.optional stdenv.isLinux pyinotify
+ propagatedBuildInputs = [
+ cloudpickle
+ toml
+ ] ++ lib.optional stdenv.isLinux pyinotify
++ lib.optional stdenv.isDarwin macfsevents;
# hangs on darwin
diff --git a/pkgs/development/python-modules/dynalite-devices/default.nix b/pkgs/development/python-modules/dynalite-devices/default.nix
index dafbcfc2f5cd..3ee79ae44804 100644
--- a/pkgs/development/python-modules/dynalite-devices/default.nix
+++ b/pkgs/development/python-modules/dynalite-devices/default.nix
@@ -8,12 +8,12 @@
buildPythonPackage rec {
pname = "dynalite-devices";
- version = "0.1.46";
+ version = "0.46";
src = fetchFromGitHub {
owner = "ziv1234";
repo = "python-dynalite-devices";
- rev = "v0.46"; # https://github.com/ziv1234/python-dynalite-devices/issues/2
+ rev = "v${version}"; # https://github.com/ziv1234/python-dynalite-devices/issues/2
hash = "sha256-Fju2JpFkQBCbOln7r3L+crv82TI2SkdPJ1oaK7PEifo=";
};
diff --git a/pkgs/development/python-modules/easyprocess/default.nix b/pkgs/development/python-modules/easyprocess/default.nix
index c98a8b572d45..97707e0e9fd4 100644
--- a/pkgs/development/python-modules/easyprocess/default.nix
+++ b/pkgs/development/python-modules/easyprocess/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "EasyProcess";
- version = "0.3";
+ version = "1.1";
src = fetchPypi {
inherit pname version;
- sha256 = "115rzzr0hx4af4m6krf7dxn8851n4l8jfxahjzjc2r0zq2m8v57v";
+ sha256 = "sha256-iFiYMCpXqrlIlz6LXTKkIpOSufstmGqx1P/VkOW6kOw=";
};
# No tests
diff --git a/pkgs/development/python-modules/entrypoints/default.nix b/pkgs/development/python-modules/entrypoints/default.nix
index a26d6ede8904..1223f3f911de 100644
--- a/pkgs/development/python-modules/entrypoints/default.nix
+++ b/pkgs/development/python-modules/entrypoints/default.nix
@@ -1,31 +1,36 @@
{ lib
, buildPythonPackage
+, pythonOlder
, fetchPypi
+, flit-core
, configparser
-, pytest
-, isPy3k
+, pytestCheckHook
}:
buildPythonPackage rec {
pname = "entrypoints";
- version = "0.3";
+ version = "0.4";
+ format = "pyproject";
+
+ disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "c70dd71abe5a8c85e55e12c19bd91ccfeec11a6e99044204511f9ed547d48451";
+ sha256 = "sha256-twbt2qkhihnrzWe1aBjwW7J1ibHKno15e3Sv+tTMrNQ=";
};
- checkInputs = [ pytest ];
+ nativeBuildInputs = [
+ flit-core
+ ];
- propagatedBuildInputs = lib.optional (!isPy3k) configparser;
+ checkInputs = [
+ pytestCheckHook
+ ];
- checkPhase = ''
- py.test tests
- '';
-
- meta = {
+ meta = with lib; {
description = "Discover and load entry points from installed packages";
homepage = "https://github.com/takluyver/entrypoints";
- license = lib.licenses.mit;
+ license = licenses.mit;
+ maintainers = with maintainers; [ ];
};
}
diff --git a/pkgs/development/python-modules/faker/default.nix b/pkgs/development/python-modules/faker/default.nix
index 048edf64d38f..728339621f89 100644
--- a/pkgs/development/python-modules/faker/default.nix
+++ b/pkgs/development/python-modules/faker/default.nix
@@ -12,12 +12,12 @@
buildPythonPackage rec {
pname = "faker";
- version = "11.3.0";
+ version = "13.3.0";
src = fetchPypi {
pname = "Faker";
inherit version;
- hash = "sha256-rb5WfmTaahCX/qyraZAA4a0W4Xplkqjwrh7gt/vxmIc=";
+ hash = "sha256-YYsUDHdHV4bb46VAmtU1Ict2dGq3pcd7mcZj8+8bG8I=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/fasteners/default.nix b/pkgs/development/python-modules/fasteners/default.nix
index 0364022fa286..b1281c686d87 100644
--- a/pkgs/development/python-modules/fasteners/default.nix
+++ b/pkgs/development/python-modules/fasteners/default.nix
@@ -1,47 +1,32 @@
{ lib
, buildPythonPackage
-, fetchPypi
-, six
-, monotonic
+, fetchFromGitHub
, diskcache
-, more-itertools
-, testtools
-, isPy3k
-, nose
-, futures ? null
+, pytestCheckHook
}:
buildPythonPackage rec {
pname = "fasteners";
- version = "0.16.3";
+ version = "0.17.3";
+ format = "pyproject";
- src = fetchPypi {
- inherit pname version;
- sha256 = "b1ab4e5adfbc28681ce44b3024421c4f567e705cc3963c732bf1cba3348307de";
+ src = fetchFromGitHub {
+ owner = "harlowja";
+ repo = pname;
+ rev = version;
+ hash = "sha256-FVhHp8BZ/wQQyr5AcuDo94LlflixhjZ0SnheSdHuDVQ=";
};
- propagatedBuildInputs = [
- six
- monotonic
- ];
-
checkInputs = [
diskcache
- more-itertools
- testtools
- nose
- ] ++ lib.optionals (!isPy3k) [
- futures
+ pytestCheckHook
];
- checkPhase = ''
- nosetests
- '';
-
meta = with lib; {
description = "A python package that provides useful locks";
homepage = "https://github.com/harlowja/fasteners";
license = licenses.asl20;
+ maintainers = with maintainers; [ ];
};
}
diff --git a/pkgs/development/python-modules/filelock/default.nix b/pkgs/development/python-modules/filelock/default.nix
index 8eaed65ca73c..16379ef85e1e 100644
--- a/pkgs/development/python-modules/filelock/default.nix
+++ b/pkgs/development/python-modules/filelock/default.nix
@@ -8,13 +8,13 @@
buildPythonPackage rec {
pname = "filelock";
- version = "3.4.2";
+ version = "3.6.0";
format = "pyproject";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "38b4f4c989f9d06d44524df1b24bd19e167d851f19b50bf3e3559952dddc5b80";
+ sha256 = "sha256-nNVAqTUuQyxyRqSP5OhxKxCssd8q0fMOjAcLgq4f7YU=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/findpython/default.nix b/pkgs/development/python-modules/findpython/default.nix
new file mode 100644
index 000000000000..ad35f379b906
--- /dev/null
+++ b/pkgs/development/python-modules/findpython/default.nix
@@ -0,0 +1,53 @@
+{ lib
+, buildPythonPackage
+, fetchPypi
+, pythonOlder
+
+# build time
+, pdm-pep517
+
+# runtime
+, packaging
+
+# tests
+, pytestCheckHook
+}:
+
+let
+ pname = "findpython";
+ version = "0.1.3";
+in
+buildPythonPackage {
+ inherit pname version;
+ format = "pyproject";
+
+ disabled = pythonOlder "3.7";
+
+ src = fetchPypi {
+ inherit pname version;
+ hash = "sha256-tVpBa5/PLShyG/vqHOsqbLZ6APmexLlKdtoix6IAKHA=";
+ };
+
+ nativeBuildInputs = [
+ pdm-pep517
+ ];
+
+ propagatedBuildInputs = [
+ packaging
+ ];
+
+ checkInputs = [
+ pytestCheckHook
+ ];
+
+ pythonImportsCheck = [
+ "findpython"
+ ];
+
+ meta = with lib; {
+ description = "A utility to find python versions on your system";
+ homepage = "https://github.com/frostming/findpython";
+ license = licenses.mit;
+ maintainers = with maintainers; [ hexa ];
+ };
+}
diff --git a/pkgs/development/python-modules/flask-compress/default.nix b/pkgs/development/python-modules/flask-compress/default.nix
index fff330946d16..26e5feca03e3 100644
--- a/pkgs/development/python-modules/flask-compress/default.nix
+++ b/pkgs/development/python-modules/flask-compress/default.nix
@@ -1,25 +1,43 @@
-{ lib, fetchPypi, buildPythonPackage, flask
+{ lib
+, fetchPypi
+, buildPythonPackage
+, setuptools-scm
+, flask
, brotli
+, pytestCheckHook
}:
buildPythonPackage rec {
- version = "1.10.1";
+ version = "1.11";
pname = "Flask-Compress";
+ format = "pyproject";
src = fetchPypi {
inherit pname version;
- sha256 = "28352387efbbe772cfb307570019f81957a13ff718d994a9125fa705efb73680";
+ sha256 = "sha256-9WnzLERtayXKjjR9UAOgUxgR73MmeABbADb8HJ6xwhw=";
};
- postPatch = ''
- sed -i -e 's/use_scm_version=.*/version="${version}",/' setup.py
- '';
+ nativeBuildInputs = [
+ setuptools-scm
+ ];
- propagatedBuildInputs = [ flask brotli ];
+ propagatedBuildInputs = [
+ flask
+ brotli
+ ];
+
+ checkInputs = [
+ pytestCheckHook
+ ];
+
+ pythonImportsCheck = [
+ "flask_compress"
+ ];
meta = with lib; {
description = "Compress responses in your Flask app with gzip";
- homepage = "https://libwilliam.github.io/flask-compress/";
+ homepage = "https://github.com/colour-science/flask-compress";
+ changelog = "https://github.com/colour-science/flask-compress/blob/v${version}/CHANGELOG.md";
license = licenses.mit;
};
}
diff --git a/pkgs/development/python-modules/flask-security-too/default.nix b/pkgs/development/python-modules/flask-security-too/default.nix
index ddf5aa05c493..e88556c07d02 100644
--- a/pkgs/development/python-modules/flask-security-too/default.nix
+++ b/pkgs/development/python-modules/flask-security-too/default.nix
@@ -28,12 +28,12 @@
buildPythonPackage rec {
pname = "flask-security-too";
- version = "4.1.2";
+ version = "4.1.3";
src = fetchPypi {
pname = "Flask-Security-Too";
inherit version;
- sha256 = "16ws5n08vm7wsa2f7lrkxvc7jl3ah1xfylhhyzb4vvqmlk7x9hw8";
+ sha256 = "sha256-mW2NKGeJpyR4Ri7m+KE3ElSg3E+P7qbzNTTCo3cskc8=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/flask/default.nix b/pkgs/development/python-modules/flask/default.nix
index 6c05367b3d47..6b49d2d2a6ee 100644
--- a/pkgs/development/python-modules/flask/default.nix
+++ b/pkgs/development/python-modules/flask/default.nix
@@ -12,12 +12,12 @@
}:
buildPythonPackage rec {
- version = "2.0.2";
+ version = "2.0.3";
pname = "Flask";
src = fetchPypi {
inherit pname version;
- sha256 = "7b2fb8e934ddd50731893bdcdb00fc8c0315916f9fcd50d22c7cc1a95ab634e2";
+ sha256 = "sha256-4RIMIoyi9VO0cN9KX6knq2YlhGdSYGmYGz6wqRkCaH0=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/fonttools/default.nix b/pkgs/development/python-modules/fonttools/default.nix
index 50f5e87a29f4..84f2edb72102 100644
--- a/pkgs/development/python-modules/fonttools/default.nix
+++ b/pkgs/development/python-modules/fonttools/default.nix
@@ -17,7 +17,7 @@
buildPythonPackage rec {
pname = "fonttools";
- version = "4.29.0";
+ version = "4.29.1";
# Bump to 3.7 when https://github.com/fonttools/fonttools/pull/2417 is merged
disabled = pythonOlder "3.6";
@@ -26,7 +26,7 @@ buildPythonPackage rec {
owner = pname;
repo = pname;
rev = version;
- sha256 = "LnkpTEpZbbRAyqGPJXdfpHjh4t7n6LkjZGLhirVNl7E=";
+ sha256 = "sha256-xviNGFcb1wj5WuA6UxHpw3BkpdjSJL3fbsBytJacp8w=";
};
# all dependencies are optional, but
diff --git a/pkgs/development/python-modules/fs/default.nix b/pkgs/development/python-modules/fs/default.nix
index 0ab3778f55cf..6915ba8d050c 100644
--- a/pkgs/development/python-modules/fs/default.nix
+++ b/pkgs/development/python-modules/fs/default.nix
@@ -20,11 +20,11 @@
buildPythonPackage rec {
pname = "fs";
- version = "2.4.14";
+ version = "2.4.15";
src = fetchPypi {
inherit pname version;
- sha256 = "9555dc2bc58c58cac03478ac7e9f622d29fe2d20a4384c24c90ab50de2c7b36c";
+ sha256 = "sha256-sJ0CwxH0rdHm4rdXJMRQ6vz+7MkXV5IkyorSHazQoYI=";
};
buildInputs = [ glibcLocales ];
diff --git a/pkgs/development/python-modules/ftfy/default.nix b/pkgs/development/python-modules/ftfy/default.nix
index 5ea93ec179ec..d214cb4f0a43 100644
--- a/pkgs/development/python-modules/ftfy/default.nix
+++ b/pkgs/development/python-modules/ftfy/default.nix
@@ -8,13 +8,13 @@
buildPythonPackage rec {
pname = "ftfy";
- version = "6.0.3";
+ version = "6.1.1";
disabled = !isPy3k;
src = fetchPypi {
inherit pname version;
- sha256 = "ba71121a9c8d7790d3e833c6c1021143f3e5c4118293ec3afb5d43ed9ca8e72b";
+ sha256 = "sha256-v8IBn4T82FFBkVIyCmN1YEoPFFnCgbWxmbLNDS5yf48=";
};
propagatedBuildInputs = [
@@ -29,6 +29,12 @@ buildPythonPackage rec {
export PATH=$out/bin:$PATH
'';
+ disabledTestPaths = [
+ # Calls poetry and fails to match output exactly
+ "tests/test_cli.py"
+ ];
+
+
meta = with lib; {
description = "Given Unicode text, make its representation consistent and possibly less broken";
homepage = "https://github.com/LuminosoInsight/python-ftfy";
diff --git a/pkgs/development/python-modules/genshi/default.nix b/pkgs/development/python-modules/genshi/default.nix
index c476960bbf83..be6abbd83644 100644
--- a/pkgs/development/python-modules/genshi/default.nix
+++ b/pkgs/development/python-modules/genshi/default.nix
@@ -7,11 +7,11 @@
buildPythonPackage rec {
pname = "Genshi";
- version = "0.7.5";
+ version = "0.7.6";
src = fetchPypi {
inherit pname version;
- sha256 = "c12d6c2abf7df0ec661d9ff2e197522eae846e43dc58abd5a36443d05bc41135";
+ sha256 = "sha256-NKLOi4DoQ/Ygxbe35ZqqNip2zpdkpvEQMig+2UWMOlk=";
};
# FAIL: test_sanitize_remove_script_elem (genshi.filters.tests.html.HTMLSanitizerTestCase)
diff --git a/pkgs/development/python-modules/gidgethub/default.nix b/pkgs/development/python-modules/gidgethub/default.nix
index 691af2eda849..9d1fdc07d901 100644
--- a/pkgs/development/python-modules/gidgethub/default.nix
+++ b/pkgs/development/python-modules/gidgethub/default.nix
@@ -16,13 +16,13 @@
buildPythonPackage rec {
pname = "gidgethub";
- version = "5.0.1";
+ version = "5.1.0";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "3efbd6998600254ec7a2869318bd3ffde38edc3a0d37be0c14bc46b45947b682";
+ sha256 = "sha256-kNGTb6mA2XBaljYvpOWaKFEks3NigsiPgmdIgSMKTiU=";
};
nativeBuildInputs = [ setuptools pytest-runner ];
diff --git a/pkgs/development/python-modules/github3_py/default.nix b/pkgs/development/python-modules/github3_py/default.nix
index 1f5c983e14f3..67e1868fb8b1 100644
--- a/pkgs/development/python-modules/github3_py/default.nix
+++ b/pkgs/development/python-modules/github3_py/default.nix
@@ -18,11 +18,11 @@
buildPythonPackage rec {
pname = "github3.py";
- version = "3.0.0";
+ version = "3.2.0";
src = fetchPypi {
inherit pname version;
- sha256 = "a9134cb9efd334b1644ad7c5ee3ff3ff488317c4549ffc0e8d82e4d63383a1a4";
+ sha256 = "sha256-Cbcr4Ul9NGsJaM3oNgoNavedwgbQFJpjzT7IbGXDd8w=";
};
checkInputs = [ betamax pytest betamax-matchers ]
diff --git a/pkgs/development/python-modules/google-api-python-client/default.nix b/pkgs/development/python-modules/google-api-python-client/default.nix
index 772f45411d39..493bda2f9d5c 100644
--- a/pkgs/development/python-modules/google-api-python-client/default.nix
+++ b/pkgs/development/python-modules/google-api-python-client/default.nix
@@ -13,14 +13,14 @@
buildPythonPackage rec {
pname = "google-api-python-client";
- version = "2.35.0";
+ version = "2.39.0";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "038b12979ea86ef0e33962bd33f955c337bc28f0471522bd27a801d52bfb4ae2";
+ sha256 = "sha256-QBFpIV7K+1r7aD0/4OQ8BZ62Jccf6hkp8WQD3acqLcE=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/graphql-relay/default.nix b/pkgs/development/python-modules/graphql-relay/default.nix
index 08e27c194873..d54604619252 100644
--- a/pkgs/development/python-modules/graphql-relay/default.nix
+++ b/pkgs/development/python-modules/graphql-relay/default.nix
@@ -10,11 +10,11 @@
buildPythonPackage rec {
pname = "graphql-relay";
- version = "3.1.0";
+ version = "3.1.5";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-cNWn7lmV6nwqmjflEidmOxpGTx9A6Y/d6VC+VBXf4LQ=";
+ sha256 = "sha256-En9AkT8Ry4R0Uu95STEmGq47Ii6q+Xb3yEMCmFNOVNM=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/graspologic/default.nix b/pkgs/development/python-modules/graspologic/default.nix
index 10e7190d1fde..1a246461e5f7 100644
--- a/pkgs/development/python-modules/graspologic/default.nix
+++ b/pkgs/development/python-modules/graspologic/default.nix
@@ -15,7 +15,7 @@
buildPythonPackage rec {
pname = "graspologic";
- version = "0.3.1";
+ version = "1.0.0";
disabled = isPy27;
@@ -23,7 +23,7 @@ buildPythonPackage rec {
owner = "microsoft";
repo = "graspologic";
rev = "v${version}";
- sha256 = "07dmfb1aplha01d22b41js7634dac4v28pv1l3bzssqhi4yyds7h";
+ sha256 = "sha256-mzJ3eFo77gnOh/Vs9u68yFDZW3ilXtcCCwKahKyRRmc=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/grpcio-status/default.nix b/pkgs/development/python-modules/grpcio-status/default.nix
index b20426c0288f..fc069dccbaf7 100644
--- a/pkgs/development/python-modules/grpcio-status/default.nix
+++ b/pkgs/development/python-modules/grpcio-status/default.nix
@@ -9,14 +9,14 @@
buildPythonPackage rec {
pname = "grpcio-status";
- version = "1.43.0";
+ version = "1.44.0";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-IXWQBvNqf/v/GH1BkfQRjActiqn6aCOhGq14QqPGzNA=";
+ sha256 = "sha256-rGE6t6RTgMv6PlKQItCzcxfYWPFyum5lwYiqc1VTk5g=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/grpcio-tools/default.nix b/pkgs/development/python-modules/grpcio-tools/default.nix
index 78d952f4cb97..c428be643075 100644
--- a/pkgs/development/python-modules/grpcio-tools/default.nix
+++ b/pkgs/development/python-modules/grpcio-tools/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "grpcio-tools";
- version = "1.43.0";
+ version = "1.44.0";
src = fetchPypi {
inherit pname version;
- sha256 = "f42f1d713096808b1b0472dd2a3749b712d13f0092dab9442d9c096446e860b2";
+ sha256 = "sha256-vjf0WOpRDJqPHKq7wrJY0S5V0YmlZ/Xtys6Q8n3A778=";
};
outputs = [ "out" "dev" ];
diff --git a/pkgs/development/python-modules/gssapi/default.nix b/pkgs/development/python-modules/gssapi/default.nix
index d500c6453213..f703820a4f5c 100644
--- a/pkgs/development/python-modules/gssapi/default.nix
+++ b/pkgs/development/python-modules/gssapi/default.nix
@@ -17,14 +17,14 @@
buildPythonPackage rec {
pname = "gssapi";
- version = "1.7.2";
+ version = "1.7.3";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "pythongssapi";
repo = "python-${pname}";
rev = "v${version}";
- sha256 = "1xdcnm66b07m7chf04pp58p3khvy547hns1fw1xffd4n51kl42pp";
+ sha256 = "sha256-/1YOnG6sCP8G8J3K2/RycTC95rXW9M+U3Mjz4GCt13s=";
};
# It's used to locate headers
diff --git a/pkgs/development/python-modules/gym/default.nix b/pkgs/development/python-modules/gym/default.nix
index 1616343f8b43..aff7d1a29781 100644
--- a/pkgs/development/python-modules/gym/default.nix
+++ b/pkgs/development/python-modules/gym/default.nix
@@ -7,13 +7,13 @@
buildPythonPackage rec {
pname = "gym";
- version = "0.21.0";
+ version = "0.22.0";
src = fetchFromGitHub {
owner = "openai";
repo = pname;
- rev = "v${version}";
- sha256 = "12b545xz0r2g4z5r7f8amxl7nm0lqymkzwcwhg1bni9h0sxwpv6c";
+ rev = version;
+ sha256 = "sha256-JbPWLuQGo+fErUlCKKpMwWdu0KvXBDuH2MeAHdJCTgM=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/h11/default.nix b/pkgs/development/python-modules/h11/default.nix
index f3d37dacfa3c..be4802566f75 100644
--- a/pkgs/development/python-modules/h11/default.nix
+++ b/pkgs/development/python-modules/h11/default.nix
@@ -6,11 +6,11 @@
buildPythonPackage rec {
pname = "h11";
- version = "0.12.0";
+ version = "0.13.0";
src = fetchPypi {
inherit pname version;
- sha256 = "0hk0nll6qazsambp3kl8cxxsbl4gv5y9252qadyk0jky0sv2q8j7";
+ sha256 = "sha256-cIE8ETUIeiSKTTjMDhoBgf+rIYgUGpPq9WeUDDlX/wY=";
};
checkInputs = [ pytestCheckHook ];
diff --git a/pkgs/development/python-modules/hass-nabucasa/default.nix b/pkgs/development/python-modules/hass-nabucasa/default.nix
index e7732e1f6a42..edf19d0e190f 100644
--- a/pkgs/development/python-modules/hass-nabucasa/default.nix
+++ b/pkgs/development/python-modules/hass-nabucasa/default.nix
@@ -28,7 +28,8 @@ buildPythonPackage rec {
sed -i 's/"acme.*"/"acme"/' setup.py
substituteInPlace setup.py \
--replace "cryptography>=2.8,<4.0" "cryptography" \
- --replace "snitun==" "snitun>="
+ --replace "snitun==" "snitun>=" \
+ --replace "pycognito==2022.01.0" "pycognito"
'';
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/hatasmota/default.nix b/pkgs/development/python-modules/hatasmota/default.nix
index 6a0a3793d87b..b710e5fb2e26 100644
--- a/pkgs/development/python-modules/hatasmota/default.nix
+++ b/pkgs/development/python-modules/hatasmota/default.nix
@@ -8,7 +8,7 @@
buildPythonPackage rec {
pname = "hatasmota";
- version = "0.3.1";
+ version = "0.4.0";
format = "setuptools";
disabled = pythonOlder "3.6";
@@ -17,7 +17,7 @@ buildPythonPackage rec {
owner = "emontnemery";
repo = pname;
rev = version;
- sha256 = "sha256-/am6cRhAdiqMq0u7Ed4qhIA+Em2O0gIt7HfP19+2XHw=";
+ sha256 = "sha256-r9EBuaKxc7Vcdfk8zoDpIi2i6yIGc7soSWx+RjG+SZo=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/hatchling/default.nix b/pkgs/development/python-modules/hatchling/default.nix
new file mode 100644
index 000000000000..09cbdead671a
--- /dev/null
+++ b/pkgs/development/python-modules/hatchling/default.nix
@@ -0,0 +1,79 @@
+{ lib
+, buildPythonPackage
+, fetchPypi
+, pythonOlder
+
+# runtime
+, editables
+, importlib-metadata # < 3.8
+, packaging
+, pathspec
+, pluggy
+, tomli
+
+# tests
+, build
+, python
+, requests
+, toml
+, virtualenv
+}:
+
+let
+ pname = "hatchling";
+ version = "0.20.1";
+in
+buildPythonPackage {
+ inherit pname version;
+ format = "pyproject";
+
+ src = fetchPypi {
+ inherit pname version;
+ hash = "sha256-l1VRce5H3CSAwZBeuxRyy7bNpOM6zX5s2L1/DXPo/Bg=";
+ };
+
+ # listed in backend/src/hatchling/ouroboros.py
+ propagatedBuildInputs = [
+ editables
+ packaging
+ pathspec
+ pluggy
+ tomli
+ ] ++ lib.optionals (pythonOlder "3.8") [
+ importlib-metadata
+ ];
+
+ pythonImportsCheck = [
+ "hatchling"
+ "hatchling.build"
+ ];
+
+ # tries to fetch packages from the internet
+ doCheck = false;
+
+ # listed in /backend/tests/downstream/requirements.txt
+ checkInputs = [
+ build
+ packaging
+ requests
+ toml
+ virtualenv
+ ];
+
+ preCheck = ''
+ export HOME=$TMPDIR
+ '';
+
+ checkPhase = ''
+ runHook preCheck
+ ${python.interpreter} tests/downstream/integrate.py
+ runHook postCheck
+ '';
+
+ meta = with lib; {
+ description = "Modern, extensible Python build backend";
+ homepage = "https://ofek.dev/hatch/latest/";
+ license = licenses.mit;
+ maintainers = with maintainers; [ hexa ofek ];
+ };
+}
diff --git a/pkgs/development/python-modules/hg-git/default.nix b/pkgs/development/python-modules/hg-git/default.nix
index eccdcdaed422..be3edd372180 100644
--- a/pkgs/development/python-modules/hg-git/default.nix
+++ b/pkgs/development/python-modules/hg-git/default.nix
@@ -7,11 +7,11 @@
buildPythonPackage rec {
pname = "hg-git";
- version = "0.10.3";
+ version = "0.10.4";
src = fetchPypi {
inherit pname version;
- sha256 = "27e6d7686a1548d4632dcc977f2ff3ce2e42d80735339b1f3b389b7481260cc4";
+ sha256 = "sha256-guJlIm9HPTgKw5cg/s7rFST/crAXfPxGYGeZxEJ+hcw=";
};
propagatedBuildInputs = [ dulwich mercurial ];
diff --git a/pkgs/development/python-modules/hmmlearn/default.nix b/pkgs/development/python-modules/hmmlearn/default.nix
index 17f5126367bf..bdeff30b7612 100644
--- a/pkgs/development/python-modules/hmmlearn/default.nix
+++ b/pkgs/development/python-modules/hmmlearn/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "hmmlearn";
- version = "0.2.6";
+ version = "0.2.7";
src = fetchurl {
url = "mirror://pypi/h/hmmlearn/${pname}-${version}.tar.gz";
- sha256 = "2a289cf28b31be59fa8ba5d3253d4a2a992401d45a8cdc221ae484fbf390c0d7";
+ sha256 = "sha256-a0snIPJ6912pNnq02Q3LAPONozFo322Rf57F3mZw9uE=";
};
buildInputs = [ setuptools-scm cython ];
diff --git a/pkgs/development/python-modules/httpcore/default.nix b/pkgs/development/python-modules/httpcore/default.nix
index 79d979b10a97..7f028c478fc5 100644
--- a/pkgs/development/python-modules/httpcore/default.nix
+++ b/pkgs/development/python-modules/httpcore/default.nix
@@ -12,6 +12,7 @@
, pytest-cov
, pytest-httpbin
, sniffio
+, socksio
, trio
, trustme
, uvicorn
@@ -19,22 +20,28 @@
buildPythonPackage rec {
pname = "httpcore";
- version = "0.14.4";
+ version = "0.14.7";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "encode";
repo = pname;
rev = version;
- sha256 = "19zsg8ijw0s1722ka67mjxx5z07lx9jq36z97l1fa6z1129wq240";
+ sha256 = "sha256-h+3MfP1p/ifN0mF/xxrOKPTjD4Q7WzRh94YO4DYSuXE=";
};
+ postPatch = ''
+ substituteInPlace setup.py \
+ --replace "h11>=0.11,<0.13" "h11>=0.11,<0.14"
+ '';
+
propagatedBuildInputs = [
anyio
certifi
h11
h2
sniffio
+ socksio
];
checkInputs = [
diff --git a/pkgs/development/python-modules/httplib2/default.nix b/pkgs/development/python-modules/httplib2/default.nix
index cd2134418a75..9fc6b4ff1440 100644
--- a/pkgs/development/python-modules/httplib2/default.nix
+++ b/pkgs/development/python-modules/httplib2/default.nix
@@ -52,7 +52,13 @@ buildPythonPackage rec {
# ValueError: Unable to load PEM file.
# https://github.com/httplib2/httplib2/issues/192#issuecomment-993165140
"test_client_cert_password_verified"
- ] ++ lib.optionals (stdenv.isDarwin) [
+
+ # improper pytest marking
+ "test_head_301"
+ "test_303"
+ ] ++ lib.optionals stdenv.isDarwin [
+ # fails with "ConnectionResetError: [Errno 54] Connection reset by peer"
+ "test_connection_close"
# fails with HTTP 408 Request Timeout, instead of expected 200 OK
"test_timeout_subsequent"
"test_connection_close"
diff --git a/pkgs/development/python-modules/httptools/default.nix b/pkgs/development/python-modules/httptools/default.nix
index 0a5b510b0ad9..963a9ff5ebfe 100644
--- a/pkgs/development/python-modules/httptools/default.nix
+++ b/pkgs/development/python-modules/httptools/default.nix
@@ -6,12 +6,12 @@
buildPythonPackage rec {
pname = "httptools";
- version = "0.3.0";
+ version = "0.4.0";
disabled = isPy27;
src = fetchPypi {
inherit pname version;
- sha256 = "3f9b4856d46ba1f0c850f4e84b264a9a8b4460acb20e865ec00978ad9fbaa4cf";
+ sha256 = "sha256-LJqTDDeLPRXWtpX7levP+BpzlbT5d1xPEKB2vrCywf8=";
};
# tests are not included in pypi tarball
diff --git a/pkgs/development/python-modules/httpx/default.nix b/pkgs/development/python-modules/httpx/default.nix
index d479cc1f13ce..dbf8d1745c0e 100644
--- a/pkgs/development/python-modules/httpx/default.nix
+++ b/pkgs/development/python-modules/httpx/default.nix
@@ -20,7 +20,7 @@
buildPythonPackage rec {
pname = "httpx";
- version = "0.21.3";
+ version = "0.22.0";
format = "setuptools";
disabled = pythonOlder "3.6";
@@ -29,7 +29,7 @@ buildPythonPackage rec {
owner = "encode";
repo = pname;
rev = version;
- sha256 = "01069b0kj6vnb26xazlz06rj4yncy5nkq76pajvzx0pmpjkniiz9";
+ sha256 = "sha256-hQmQodGpVG23IZSsWV7rB1iB6QAudDao/8YshIgpmas=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/huggingface-hub/default.nix b/pkgs/development/python-modules/huggingface-hub/default.nix
index cf0b27c6c5b3..3bbc8ad2669e 100644
--- a/pkgs/development/python-modules/huggingface-hub/default.nix
+++ b/pkgs/development/python-modules/huggingface-hub/default.nix
@@ -14,13 +14,13 @@
buildPythonPackage rec {
pname = "huggingface-hub";
- version = "0.1.2";
+ version = "0.4.0";
src = fetchFromGitHub {
owner = "huggingface";
repo = "huggingface_hub";
rev = "v${version}";
- sha256 = "1pmi76vinwwn0bcxy5hj8pxhzqxdbzp0y3hsd631yyys01s0n6xd";
+ sha256 = "sha256-rrkubNy60e/1VcGacYQang4yWxUzIBGySxZyq6G1arw=";
};
nativeBuildInputs = [ packaging ];
diff --git a/pkgs/development/python-modules/humanize/default.nix b/pkgs/development/python-modules/humanize/default.nix
index d0b2464608b9..fa13cdab0c23 100644
--- a/pkgs/development/python-modules/humanize/default.nix
+++ b/pkgs/development/python-modules/humanize/default.nix
@@ -9,7 +9,7 @@
}:
buildPythonPackage rec {
- version = "3.13.1";
+ version = "4.0.0";
pname = "humanize";
format = "pyproject";
@@ -19,7 +19,7 @@ buildPythonPackage rec {
owner = "jmoiron";
repo = pname;
rev = version;
- sha256 = "sha256-lgGBvYb3ciqETBOR31gxQVD7YyopTtmr++nCwvm63Zs=";
+ sha256 = "sha256-v4OdZmUI2LCick4qCSGOHJ7jtWybwKTeTeIcly+QQQQ=";
};
SETUPTOOLS_SCM_PRETEND_VERSION = version;
diff --git a/pkgs/development/python-modules/hypothesis/default.nix b/pkgs/development/python-modules/hypothesis/default.nix
index 89aac153172d..c928a13950ca 100644
--- a/pkgs/development/python-modules/hypothesis/default.nix
+++ b/pkgs/development/python-modules/hypothesis/default.nix
@@ -19,7 +19,7 @@ buildPythonPackage rec {
# If you need these, you can just add them to your environment.
pname = "hypothesis";
- version = "6.35.0";
+ version = "6.38.0";
format = "setuptools";
disabled = pythonOlder "3.7";
@@ -28,7 +28,7 @@ buildPythonPackage rec {
owner = "HypothesisWorks";
repo = "hypothesis-python";
rev = "hypothesis-python-${version}";
- sha256 = "08wph7q3c08480ma2p7m7mamy0g7g7r5jqpwdyhdga4cfg734527";
+ sha256 = "sha256-JLAM9gBf/Lh+UO7audy6V2jEPg5Cn4DR7moQV7VBwGc=";
};
postUnpack = "sourceRoot=$sourceRoot/hypothesis-python";
diff --git a/pkgs/development/python-modules/hypothesmith/default.nix b/pkgs/development/python-modules/hypothesmith/default.nix
index ee8b897154bd..33174deb6573 100644
--- a/pkgs/development/python-modules/hypothesmith/default.nix
+++ b/pkgs/development/python-modules/hypothesmith/default.nix
@@ -17,7 +17,11 @@ buildPythonPackage rec {
checkInputs = [ black parso pytestCheckHook pytest-cov pytest-xdist ];
- pytestFlagsArray = [ "-v" ]; # tests are fairly slow, prevents timeout due to no stdout printing
+ pytestFlagsArray = [
+ "-v"
+ "--numprocesses $NIX_BUILD_CORES"
+ ];
+
pythonImportsCheck = [ "hypothesmith" ];
meta = with lib; {
diff --git a/pkgs/development/python-modules/hyppo/default.nix b/pkgs/development/python-modules/hyppo/default.nix
index 61966bc7de76..b09d5bd565ff 100644
--- a/pkgs/development/python-modules/hyppo/default.nix
+++ b/pkgs/development/python-modules/hyppo/default.nix
@@ -13,7 +13,7 @@
buildPythonPackage rec {
pname = "hyppo";
- version = "0.2.2";
+ version = "0.3.2";
disabled = pythonOlder "3.6";
@@ -21,7 +21,7 @@ buildPythonPackage rec {
owner = "neurodata";
repo = pname;
rev = "v${version}";
- sha256 = "1wrzrppyjq0pc03bn6qcslxzcnwn7fr2z5lm71gfpli5k05i26nr";
+ sha256 = "sha256-DQ5DrQrFBJ3dnGAjD1c/7GCJeR3g+aL2poR4hwOvmPA=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/imageio/default.nix b/pkgs/development/python-modules/imageio/default.nix
index 98495932fdaf..9c449c69b770 100644
--- a/pkgs/development/python-modules/imageio/default.nix
+++ b/pkgs/development/python-modules/imageio/default.nix
@@ -1,26 +1,36 @@
{ lib
+, stdenv
, buildPythonPackage
, isPy27
, fetchPypi
-, fetchpatch
+, substituteAll
, imageio-ffmpeg
, numpy
, pillow
, psutil
, pytestCheckHook
, tifffile
+, fsspec
+, libGL
}:
buildPythonPackage rec {
pname = "imageio";
- version = "2.14.1";
+ version = "2.16.1";
disabled = isPy27;
src = fetchPypi {
- sha256 = "sha256-cJwY+ACYHkKGq+S9hrbJtbtuKFtrkztboJYu+OeZQFg=";
+ sha256 = "sha256-fxI8sjp3rFq+jtTnrWpggxqC3ixdEjRj3PHUJ4xHedI=";
inherit pname version;
};
+ patches = [
+ (substituteAll {
+ src = ./libgl-path.patch;
+ libgl = "${libGL.out}/lib/libGL${stdenv.hostPlatform.extensions.sharedLibrary}";
+ })
+ ];
+
propagatedBuildInputs = [
imageio-ffmpeg
numpy
@@ -28,34 +38,33 @@ buildPythonPackage rec {
];
checkInputs = [
+ fsspec
psutil
pytestCheckHook
tifffile
];
- preCheck = ''
- export IMAGEIO_USERDIR="$TMP"
- export IMAGEIO_NO_INTERNET="true"
- export HOME="$(mktemp -d)"
- '';
-
- disabledTests = [
- # tries to pull remote resources, even with IMAGEIO_NO_INTERNET
- "test_png_remote"
- # needs git history
- "test_mvolread_out_of_bytes"
- "test_imiter"
- "test_memory_size"
- "test_legacy_write_empty"
+ pytestFlagsArray = [
+ "-m 'not needs_internet'"
];
+ preCheck = ''
+ export IMAGEIO_USERDIR="$TMP"
+ export HOME=$TMPDIR
+ '';
+
disabledTestPaths = [
+ # tries to fetch fixtures over the network
+ "tests/test_freeimage.py"
"tests/test_pillow.py"
+ "tests/test_spe.py"
+ "tests/test_swf.py"
];
meta = with lib; {
description = "Library for reading and writing a wide range of image, video, scientific, and volumetric data formats";
homepage = "http://imageio.github.io/";
license = licenses.bsd2;
+ maintainers = with maintainers; [ ];
};
}
diff --git a/pkgs/development/python-modules/imageio/libgl-path.patch b/pkgs/development/python-modules/imageio/libgl-path.patch
new file mode 100644
index 000000000000..f2a2bbfa093d
--- /dev/null
+++ b/pkgs/development/python-modules/imageio/libgl-path.patch
@@ -0,0 +1,13 @@
+diff --git a/tests/test_core.py b/tests/test_core.py
+index 2cdbb3a..032974c 100644
+--- a/tests/test_core.py
++++ b/tests/test_core.py
+@@ -129,7 +129,7 @@ def test_findlib2():
+ open(os.path.join(fi_dir, "notalib.test.so"), "wb")
+
+ # Loading libs
+- gllib = ctypes.util.find_library("GL")
++ gllib = "@libgl@"
+ core.load_lib([gllib], [])
+ # Fail
+ raises(ValueError, core.load_lib, [], []) # Nothing given
diff --git a/pkgs/development/python-modules/importlib-metadata/default.nix b/pkgs/development/python-modules/importlib-metadata/default.nix
index 3917742a55a9..31181d9b1afe 100644
--- a/pkgs/development/python-modules/importlib-metadata/default.nix
+++ b/pkgs/development/python-modules/importlib-metadata/default.nix
@@ -2,6 +2,7 @@
, buildPythonPackage
, fetchPypi
, pythonOlder
+, setuptools
, setuptools-scm
, typing-extensions
, toml
@@ -10,7 +11,7 @@
buildPythonPackage rec {
pname = "importlib-metadata";
- version = "4.11.0";
+ version = "4.11.2";
format = "pyproject";
disabled = pythonOlder "3.7";
@@ -18,10 +19,11 @@ buildPythonPackage rec {
src = fetchPypi {
pname = "importlib_metadata";
inherit version;
- hash = "sha256-nl5VO7uhhDy0oAgjAUuQdha+Ru5QPSuboAHSFKjaIY8=";
+ hash = "sha256-s2/6kl/jE5svb/EdaSX/1Pp7xHhwFl46wmCse0+R5qw=";
};
nativeBuildInputs = [
+ setuptools # otherwise cross build fails
setuptools-scm
];
diff --git a/pkgs/development/python-modules/intbitset/default.nix b/pkgs/development/python-modules/intbitset/default.nix
index db98be8276c5..798bdbbd2519 100644
--- a/pkgs/development/python-modules/intbitset/default.nix
+++ b/pkgs/development/python-modules/intbitset/default.nix
@@ -1,36 +1,23 @@
{ lib
, fetchPypi
, buildPythonPackage
-, six
-, nose
+, pytestCheckHook
}:
+
buildPythonPackage rec {
pname = "intbitset";
- version = "2.4.1";
+ version = "3.0.0";
+ format = "setuptools";
src = fetchPypi {
inherit pname version;
- sha256 = "44bca80b8cc702d5a56f0686f2bb5e028ab4d0c2c1761941589d46b7fa2c701c";
+ sha256 = "sha256-tDG3CAlTZvz9Pi2pLq0TEPhl3DyYuWQS1N6VNNNokEE=";
};
- patches = [
- # fixes compilation on aarch64 and determinism (uses -march=core2 and
- # -mtune=native)
- ./remove-impure-tuning.patch
- ];
-
- propagatedBuildInputs = [
- six
- ];
-
checkInputs = [
- nose
+ pytestCheckHook
];
- checkPhase = ''
- nosetests
- '';
-
pythonImportsCheck = [
"intbitset"
];
diff --git a/pkgs/development/python-modules/intbitset/remove-impure-tuning.patch b/pkgs/development/python-modules/intbitset/remove-impure-tuning.patch
deleted file mode 100644
index 4747b87b806c..000000000000
--- a/pkgs/development/python-modules/intbitset/remove-impure-tuning.patch
+++ /dev/null
@@ -1,24 +0,0 @@
-From 2ea60bdf4d7b0344fc6ff5c97c675842fedccfa8 Mon Sep 17 00:00:00 2001
-From: Cole Helbling
-Date: Fri, 23 Apr 2021 09:02:22 -0700
-Subject: [PATCH] setup.py: remove impure tuning
-
----
- setup.py | 1 -
- 1 file changed, 1 deletion(-)
-
-diff --git a/setup.py b/setup.py
-index 7840022..3922aa5 100644
---- a/setup.py
-+++ b/setup.py
-@@ -48,7 +48,6 @@ setup(
- ext_modules=[
- Extension("intbitset",
- ["intbitset/intbitset.c", "intbitset/intbitset_impl.c"],
-- extra_compile_args=['-O3', '-march=core2', '-mtune=native']
- # For debug -> '-ftree-vectorizer-verbose=2'
- )
- ],
---
-2.30.1
-
diff --git a/pkgs/development/python-modules/intensity-normalization/default.nix b/pkgs/development/python-modules/intensity-normalization/default.nix
index 48260398f490..5e658953fc80 100644
--- a/pkgs/development/python-modules/intensity-normalization/default.nix
+++ b/pkgs/development/python-modules/intensity-normalization/default.nix
@@ -15,14 +15,15 @@
buildPythonPackage rec {
pname = "intensity-normalization";
- version = "2.1.4";
+ version = "2.2.0";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
- inherit pname version;
- sha256 = "e7b46039311bcbba40224d85eb07eefe1488bd8a6faa893a180e15e65c48b7f5";
+ pname = "intensity_normalization";
+ inherit version;
+ sha256 = "sha256-0tc21NBj3Cajklk9mWbKfBzbSwjUrBWs/SlakjEHC1U=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/ipykernel/default.nix b/pkgs/development/python-modules/ipykernel/default.nix
index e888fdcd3209..fe67c73cbadd 100644
--- a/pkgs/development/python-modules/ipykernel/default.nix
+++ b/pkgs/development/python-modules/ipykernel/default.nix
@@ -12,11 +12,11 @@
buildPythonPackage rec {
pname = "ipykernel";
- version = "6.7.0";
+ version = "6.9.1";
src = fetchPypi {
inherit pname version;
- sha256 = "d82b904fdc2fd8c7b1fbe0fa481c68a11b4cd4c8ef07e6517da1f10cc3114d24";
+ sha256 = "sha256-+VBwot/TFH+KsZ8Y7kZzMxCBN1hZN0XgfsGPsItAnx0=";
};
# debugpy is optional, see https://github.com/ipython/ipykernel/pull/767
diff --git a/pkgs/development/python-modules/ipympl/default.nix b/pkgs/development/python-modules/ipympl/default.nix
index 3644442f7ada..08b41e629787 100644
--- a/pkgs/development/python-modules/ipympl/default.nix
+++ b/pkgs/development/python-modules/ipympl/default.nix
@@ -7,12 +7,12 @@
buildPythonPackage rec {
pname = "ipympl";
- version = "0.8.7";
+ version = "0.8.8";
format = "wheel";
src = fetchPypi {
inherit pname version format;
- sha256 = "11c3d01f0555f855c51a960964e3ab4dff38e6ccd1a4695205fe250341a9eb99";
+ sha256 = "sha256-hkaK6q6MCigAfQx/bbuF8rbLmAUWfojU2qdSlWIAkVk=";
};
diff --git a/pkgs/development/python-modules/ipython/default.nix b/pkgs/development/python-modules/ipython/default.nix
index c1c0b049dc8c..24fd28a16f7c 100644
--- a/pkgs/development/python-modules/ipython/default.nix
+++ b/pkgs/development/python-modules/ipython/default.nix
@@ -28,13 +28,13 @@
buildPythonPackage rec {
pname = "ipython";
- version = "8.0.1";
+ version = "8.1.0";
format = "pyproject";
disabled = pythonOlder "3.8";
src = fetchPypi {
inherit pname version;
- sha256 = "0x19sj4dlq7r4p1mqnpx9245r8dwvpjwd8n34snfm37a452lsmmb";
+ sha256 = "sha256-QsI+kLLequYxJmiF3hZWpRehZz1+HbV+jrOku2zVzhs=";
};
buildInputs = [
diff --git a/pkgs/development/python-modules/itsdangerous/default.nix b/pkgs/development/python-modules/itsdangerous/default.nix
index 35cdf8836a89..c2050c6f79c0 100644
--- a/pkgs/development/python-modules/itsdangerous/default.nix
+++ b/pkgs/development/python-modules/itsdangerous/default.nix
@@ -8,12 +8,12 @@
buildPythonPackage rec {
pname = "itsdangerous";
- version = "2.0.1";
+ version = "2.1.0";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "1w6gfb2zhbcmrfj6digwzw1z68w6zg1q87rm6la2m412zil4swly";
+ sha256 = "sha256-2Ej8uLx9UHxFRrRIV06KRPxOorqE6/jXgykNU+gZkvU=";
};
checkInputs = [
diff --git a/pkgs/development/python-modules/jaraco_itertools/default.nix b/pkgs/development/python-modules/jaraco_itertools/default.nix
index 80b0349ed58d..95d20fd7e6be 100644
--- a/pkgs/development/python-modules/jaraco_itertools/default.nix
+++ b/pkgs/development/python-modules/jaraco_itertools/default.nix
@@ -4,11 +4,12 @@
buildPythonPackage rec {
pname = "jaraco.itertools";
- version = "6.0.3";
+ version = "6.2.1";
+ format = "pyproject";
src = fetchPypi {
inherit pname version;
- sha256 = "1775bfcad5de275a540a36720c5ab34594ea1dbe7ffefa32099b0129c5604608";
+ sha256 = "sha256-YJjts3xrgCPzeU1CWIoTv3WyygK0D/l5XIRry+DBtGw=";
};
pythonNamespaces = [ "jaraco" ];
diff --git a/pkgs/development/python-modules/jaraco_text/default.nix b/pkgs/development/python-modules/jaraco_text/default.nix
index 054f68ba2f24..e1e82df89ea3 100644
--- a/pkgs/development/python-modules/jaraco_text/default.nix
+++ b/pkgs/development/python-modules/jaraco_text/default.nix
@@ -10,14 +10,14 @@
buildPythonPackage rec {
pname = "jaraco.text";
- version = "3.6.0";
+ version = "3.7.0";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "901d3468eaaa04f1d8a8f141f54b8887bfd943ccba311fc1c1de62c66604dfe0";
+ sha256 = "sha256-p/nMG0Sl8wlqIWy9EwtlDHprLJ+ABbAArpfzKSOafAA=";
};
pythonNamespaces = [
diff --git a/pkgs/development/python-modules/joblib/default.nix b/pkgs/development/python-modules/joblib/default.nix
index 2b011f56c1e8..ad7db290d67e 100644
--- a/pkgs/development/python-modules/joblib/default.nix
+++ b/pkgs/development/python-modules/joblib/default.nix
@@ -1,4 +1,5 @@
{ lib
+, pythonAtLeast
, pythonOlder
, buildPythonPackage
, fetchPypi
@@ -28,6 +29,7 @@ buildPythonPackage rec {
disabledTests = [
"test_disk_used" # test_disk_used is broken: https://github.com/joblib/joblib/issues/57
"test_parallel_call_cached_function_defined_in_jupyter" # jupyter not available during tests
+ "test_nested_parallel_warnings" # tests is flaky under load
] ++ lib.optionals stdenv.isDarwin [
"test_dispatch_multiprocessing" # test_dispatch_multiprocessing is broken only on Darwin.
];
diff --git a/pkgs/development/python-modules/jsondiff/default.nix b/pkgs/development/python-modules/jsondiff/default.nix
index 0b6f01209818..fe41d0dd8540 100644
--- a/pkgs/development/python-modules/jsondiff/default.nix
+++ b/pkgs/development/python-modules/jsondiff/default.nix
@@ -5,11 +5,11 @@
buildPythonPackage rec {
pname = "jsondiff";
- version = "1.3.0";
+ version = "1.3.1";
src = fetchPypi {
inherit pname version;
- sha256 = "5122bf4708a031b02db029366184a87c5d0ddd5a327a5884ee6cf0193e599d71";
+ sha256 = "sha256-BM+uvUpeVziUirYVcQ3D7pjvvfhRJV/Tl3xMLuWecxI=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/jsonpickle/default.nix b/pkgs/development/python-modules/jsonpickle/default.nix
index a91e6b3accd2..1ffbbdd5e895 100644
--- a/pkgs/development/python-modules/jsonpickle/default.nix
+++ b/pkgs/development/python-modules/jsonpickle/default.nix
@@ -9,11 +9,11 @@
buildPythonPackage rec {
pname = "jsonpickle";
- version = "2.0.0";
+ version = "2.1.0";
src = fetchPypi {
inherit pname version;
- sha256 = "0be49cba80ea6f87a168aa8168d717d00c6ca07ba83df3cec32d3b30bfe6fb9a";
+ sha256 = "sha256-hGhM/FM4pTQXPI3WmAnkDyhl0L4fiit6+EZeW5aNz6k=";
};
checkInputs = [ pytest ];
diff --git a/pkgs/development/python-modules/jupyter-client/default.nix b/pkgs/development/python-modules/jupyter-client/default.nix
index 9cb465947551..23580f42bf57 100644
--- a/pkgs/development/python-modules/jupyter-client/default.nix
+++ b/pkgs/development/python-modules/jupyter-client/default.nix
@@ -14,11 +14,11 @@
buildPythonPackage rec {
pname = "jupyter_client";
- version = "7.1.0";
+ version = "7.1.2";
src = fetchPypi {
inherit pname version;
- sha256 = "a5f995a73cffb314ed262713ae6dfce53c6b8216cea9f332071b8ff44a6e1654";
+ sha256 = "sha256-TqYQM3Jsjlee21VibY7i5r8KgxWN3zdRuN1GssXNHpY=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/jupyter_core/default.nix b/pkgs/development/python-modules/jupyter_core/default.nix
index a7dd89a1f89a..b7838ff5915f 100644
--- a/pkgs/development/python-modules/jupyter_core/default.nix
+++ b/pkgs/development/python-modules/jupyter_core/default.nix
@@ -2,33 +2,54 @@
, buildPythonPackage
, fetchPypi
, isPy3k
+, fetchpatch
+, python
, ipython
, traitlets
, glibcLocales
, mock
-, pytest
+, pytestCheckHook
, nose
}:
buildPythonPackage rec {
pname = "jupyter_core";
- version = "4.9.1";
+ version = "4.9.2";
disabled = !isPy3k;
src = fetchPypi {
inherit pname version;
- sha256 = "dce8a7499da5a53ae3afd5a9f4b02e5df1d57250cf48f3ad79da23b4778cd6fa";
+ sha256 = "sha256-1puuuf+xKLjNJlf88nA/icdp0Wc8hRgSEZ46Kg6TrZo=";
};
- checkInputs = [ pytest mock glibcLocales nose ];
+ checkInputs = [ pytestCheckHook mock glibcLocales nose ];
propagatedBuildInputs = [ ipython traitlets ];
- patches = [ ./tests_respect_pythonpath.patch ];
+ patches = [
+ # install jupyter_core/*.py files
+ (fetchpatch {
+ url = "https://github.com/jupyter/jupyter_core/pull/253/commits/3bbeaebec0a53520523162d5e8d5c6ca02b1b782.patch";
+ sha256 = "sha256-QeAfj7wLz4egVUPMAgrZ9Wn/Tv60LrIXLgHGVoH41wQ=";
+ })
+ ./tests_respect_pythonpath.patch
+ ];
- checkPhase = ''
- HOME=$TMPDIR LC_ALL=en_US.utf8 py.test
+ preCheck = ''
+ export HOME=$TMPDIR
+ export LC_ALL=en_US.utf8
'';
+ disabledTests = [
+ # creates a temporary script, which isn't aware of PYTHONPATH
+ "test_argv0"
+ ];
+
+ postCheck = ''
+ $out/bin/jupyter --help > /dev/null
+ '';
+
+ pythonImportsCheck = [ "jupyter_core" ];
+
meta = with lib; {
description = "Jupyter core package. A base package on which Jupyter projects rely";
homepage = "https://jupyter.org/";
diff --git a/pkgs/development/python-modules/jupyterlab-git/default.nix b/pkgs/development/python-modules/jupyterlab-git/default.nix
index 9d2907072e62..dc909f798daf 100644
--- a/pkgs/development/python-modules/jupyterlab-git/default.nix
+++ b/pkgs/development/python-modules/jupyterlab-git/default.nix
@@ -17,14 +17,14 @@
buildPythonPackage rec {
pname = "jupyterlab-git";
- version = "0.34.1";
+ version = "0.34.2";
disabled = pythonOlder "3.6";
src = fetchPypi {
pname = "jupyterlab_git";
inherit version;
- sha256 = "c7a03f526eb19175df73fedd5dee3cdae2d39e0474eef8f55c1c55b219ab26d9";
+ sha256 = "sha256-WNBhuHF3rhAWZED4di9B9Loq+shRzpJuaAOOcND1YEE=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/keepalive/default.nix b/pkgs/development/python-modules/keepalive/default.nix
index b6daec6ca200..6a4fcdb265f4 100644
--- a/pkgs/development/python-modules/keepalive/default.nix
+++ b/pkgs/development/python-modules/keepalive/default.nix
@@ -19,6 +19,7 @@ buildPythonPackage rec {
description = "An HTTP handler for `urllib2` that supports HTTP 1.1 and keepalive";
homepage = "https://github.com/wikier/keepalive";
license = licenses.asl20;
+ broken = true; # uses use_2to3, which is no longer supported for setuptools>=58
};
}
diff --git a/pkgs/development/python-modules/keras/default.nix b/pkgs/development/python-modules/keras/default.nix
index 2b9a269e280f..dbdebefdb5a0 100644
--- a/pkgs/development/python-modules/keras/default.nix
+++ b/pkgs/development/python-modules/keras/default.nix
@@ -6,12 +6,12 @@
buildPythonPackage rec {
pname = "keras";
- version = "2.7.0";
+ version = "2.8.0";
format = "wheel";
src = fetchPypi {
inherit format pname version;
- sha256 = "0c33ae1f728064ca0d35dfba999e9c316f03623bf5688c82fb83cc74a80ea248";
+ sha256 = "sha256-dE053GV33NgP9KTUFUnpK3fWoX4O3VikMdMGVuKbyU4=";
};
checkInputs = [
diff --git a/pkgs/development/python-modules/labelbox/default.nix b/pkgs/development/python-modules/labelbox/default.nix
index c89782d4027e..27f05d83aa05 100644
--- a/pkgs/development/python-modules/labelbox/default.nix
+++ b/pkgs/development/python-modules/labelbox/default.nix
@@ -19,14 +19,14 @@
buildPythonPackage rec {
pname = "labelbox";
- version = "3.11.1";
+ version = "3.15.0";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "Labelbox";
repo = "labelbox-python";
- rev = "v${version}";
- sha256 = "114h9phvbdknyvqdnjba3pd7i4iznffhgx9d569lq0hfla3hl61a";
+ rev = "v.${version}";
+ sha256 = "sha256-pJkDC/2EDPWbIw9WqV9kdYmr4X6apXtholzd0IYjgDg=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/lektor/default.nix b/pkgs/development/python-modules/lektor/default.nix
index f88e14d0a3e7..918cbd2591c2 100644
--- a/pkgs/development/python-modules/lektor/default.nix
+++ b/pkgs/development/python-modules/lektor/default.nix
@@ -2,6 +2,7 @@
, buildPythonPackage
, fetchFromGitHub
, click
+, filetype
, watchdog
, exifread
, requests
@@ -17,6 +18,7 @@
, pytest-mock
, pytest-pylint
, pytest-click
+, python-slugify
, isPy27
, functools32
, setuptools
@@ -24,18 +26,19 @@
buildPythonPackage rec {
pname = "lektor";
- version = "3.3.1";
+ version = "3.3.2";
+ format = "pyproject";
src = fetchFromGitHub {
owner = "lektor";
repo = "lektor";
- rev = version;
- sha256 = "04gn3jybqf9wc6l9mi0djpki60adnk7gppmv987ik676k5x8f1kk";
+ rev = "v${version}";
+ sha256 = "sha256-PNHQ87aO+b1xseupIOsO7MXdr16s0gjoHGnZhPlKKRY=";
};
propagatedBuildInputs = [
- click watchdog exifread requests mistune inifile Babel jinja2
- flask pyopenssl ndg-httpsclient setuptools
+ click filetype watchdog exifread requests mistune inifile Babel jinja2
+ flask pyopenssl python-slugify ndg-httpsclient setuptools
] ++ lib.optionals isPy27 [ functools32 ];
checkInputs = [
diff --git a/pkgs/development/python-modules/levenshtein/default.nix b/pkgs/development/python-modules/levenshtein/default.nix
index 64a9a3b5e996..e5f743e0fe11 100644
--- a/pkgs/development/python-modules/levenshtein/default.nix
+++ b/pkgs/development/python-modules/levenshtein/default.nix
@@ -8,7 +8,7 @@
buildPythonPackage rec {
pname = "levenshtein";
- version = "0.17.0";
+ version = "0.18.1";
format = "setuptools";
disabled = pythonOlder "3.6";
@@ -17,7 +17,7 @@ buildPythonPackage rec {
owner = "maxbachmann";
repo = "Levenshtein";
rev = "v${version}";
- sha256 = "1a14cw2314jb5lrm979zipzk3av4630lxdr4jzj2wl5qh3yw4w52";
+ sha256 = "sha256-3p9LM4tv45bqeTsuyngivqfd5uml7uqGB2ICKqPa0qY=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/libcst/default.nix b/pkgs/development/python-modules/libcst/default.nix
index 0c4a8985e401..86b546289bbe 100644
--- a/pkgs/development/python-modules/libcst/default.nix
+++ b/pkgs/development/python-modules/libcst/default.nix
@@ -7,6 +7,8 @@
, python
, pythonOlder
, pyyaml
+, rustPlatform
+, setuptools-rust
, setuptools-scm
, typing-extensions
, typing-inspect
@@ -14,8 +16,8 @@
buildPythonPackage rec {
pname = "libcst";
- version = "0.3.23";
- format = "setuptools";
+ version = "0.4.1";
+ format = "pyproject";
disabled = pythonOlder "3.6";
@@ -23,9 +25,18 @@ buildPythonPackage rec {
owner = "instagram";
repo = pname;
rev = "v${version}";
- sha256 = "1r4aiqpndqa75119faknsghi7zxyjrx5r6i7cb3d0liwiqrkzrvx";
+ sha256 = "sha256-soAlt1KBpCn5JxM1b2LZ3vOpBn9HPGdbm+BBYbyEkfE=";
};
+ cargoDeps = rustPlatform.fetchCargoTarball {
+ inherit src;
+ sourceRoot = "source/${cargoRoot}";
+ name = "${pname}-${version}";
+ hash = "sha256:1rz1c0dv3f1h2m5hwdisl3rbqnmifbva4f0c4vygk7rh1q27l515";
+ };
+
+ cargoRoot = "native";
+
postPatch = ''
# test try to format files, which isn't necessary when consuming releases
sed -i libcst/codegen/generate.py \
@@ -35,8 +46,10 @@ buildPythonPackage rec {
SETUPTOOLS_SCM_PRETEND_VERSION = version;
nativeBuildInputs = [
+ setuptools-rust
setuptools-scm
- ];
+ rustPlatform.cargoSetupHook
+ ] ++ (with rustPlatform; [ rust.cargo rust.rustc ]);
propagatedBuildInputs = [
hypothesis
diff --git a/pkgs/development/python-modules/libevdev/default.nix b/pkgs/development/python-modules/libevdev/default.nix
index 4a4ba489e0a6..494e887c79bc 100644
--- a/pkgs/development/python-modules/libevdev/default.nix
+++ b/pkgs/development/python-modules/libevdev/default.nix
@@ -9,12 +9,12 @@
buildPythonPackage rec {
pname = "libevdev";
- version = "0.9";
+ version = "0.10";
disabled = isPy27;
src = fetchPypi {
inherit pname version;
- sha256 = "17agnigmzscmdjqmrylg1lza03hwjhgxbpf4l705s6i7p7ndaqrs";
+ sha256 = "sha256-9LM2Ftr6qmQYysCxso+XJSthwJdOU01J+yL8ZWbtwRM=";
};
patches = [
diff --git a/pkgs/development/python-modules/limits/default.nix b/pkgs/development/python-modules/limits/default.nix
index 9a19dda15789..47738b23dc41 100644
--- a/pkgs/development/python-modules/limits/default.nix
+++ b/pkgs/development/python-modules/limits/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "limits";
- version = "2.2.0";
+ version = "2.3.3";
src = fetchPypi {
inherit pname version;
- sha256 = "da6346f0dcf85f17f0f1cc709c3408a3058cf6fee68313c288127c287237b411";
+ sha256 = "sha256-1CcNKVkcxezqsZvgU0VaTmGbo5UGJQK94rVoGvfcG+g=";
};
propagatedBuildInputs = [ six ];
diff --git a/pkgs/development/python-modules/lxml/default.nix b/pkgs/development/python-modules/lxml/default.nix
index 2c549b6830a1..3ef230eb8e8d 100644
--- a/pkgs/development/python-modules/lxml/default.nix
+++ b/pkgs/development/python-modules/lxml/default.nix
@@ -8,13 +8,13 @@
buildPythonPackage rec {
pname = "lxml";
- version = "4.7.1";
+ version = "4.8.0";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "lxml-${version}";
- sha256 = "0xji4kcw1fl3nqg04q6zlympkx2kv2s1r1p18763dshgpisqgiq4";
+ sha256 = "sha256-ppyLn8B0YFQivRCOE8TjKGdDDQHbb7UdTUkevznoVC8=";
};
# setuptoolsBuildPhase needs dependencies to be passed through nativeBuildInputs
diff --git a/pkgs/development/python-modules/lz4/default.nix b/pkgs/development/python-modules/lz4/default.nix
index 9e2cc9b31e15..c6966e632f05 100644
--- a/pkgs/development/python-modules/lz4/default.nix
+++ b/pkgs/development/python-modules/lz4/default.nix
@@ -2,6 +2,7 @@
, buildPythonPackage
, fetchFromGitHub
, pythonOlder
+, python
# native inputs
, pkgconfig
@@ -14,7 +15,7 @@
buildPythonPackage rec {
pname = "python-lz4";
- version = "3.1.12";
+ version = "4.0.0";
format = "setuptools";
disabled = pythonOlder "3.5";
@@ -24,7 +25,7 @@ buildPythonPackage rec {
owner = pname;
repo = pname;
rev = "v${version}";
- sha256 = "sha256-fqt9aJGqZpfbiYtU8cmm7UQaixZwbTKFBwRfR1B/qic=";
+ sha256 = "sha256-9gp67i2fotvFOpkaQZ82/YKnDEs3DnzXfuNCVRJg88I=";
};
SETUPTOOLS_SCM_PRETEND_VERSION = version;
@@ -50,13 +51,13 @@ buildPythonPackage rec {
psutil
];
- # leave build directory, so the installed library gets imported
- preCheck = ''
- pushd tests
- '';
+ # for lz4.steam
+ PYLZ4_EXPERIMENTAL = true;
- postCheck = ''
- popd
+ # prevent local lz4 directory from getting imported as it lacks native extensions
+ preCheck = ''
+ rm -r lz4
+ export PYTHONPATH=$out/${python.sitePackages}:$PYTHONPATH
'';
meta = with lib; {
diff --git a/pkgs/development/python-modules/magicgui/default.nix b/pkgs/development/python-modules/magicgui/default.nix
index 03ca9d791597..28fa4c9c4e2a 100644
--- a/pkgs/development/python-modules/magicgui/default.nix
+++ b/pkgs/development/python-modules/magicgui/default.nix
@@ -11,12 +11,12 @@
, docstring-parser
}: buildPythonPackage rec {
pname = "magicgui";
- version = "0.3.0";
+ version = "0.3.7";
src = fetchFromGitHub {
owner = "napari";
repo = "magicgui";
rev = "v${version}";
- sha256 = "sha256-DvL1szk2RoCrpisjp0BVNL6qFZtYc2oYDenX59Cxbug=";
+ sha256 = "sha256-LYXNNr5lS3ibQk2NIopZkB8kzC7j3yY8moGMk0Gr+hU=";
};
nativeBuildInputs = [ setuptools-scm ];
propagatedBuildInputs = [ typing-extensions qtpy pyside2 psygnal docstring-parser ];
diff --git a/pkgs/development/python-modules/manticore/default.nix b/pkgs/development/python-modules/manticore/default.nix
index 0c36f2cc6cc6..2e1bff7e21ef 100644
--- a/pkgs/development/python-modules/manticore/default.nix
+++ b/pkgs/development/python-modules/manticore/default.nix
@@ -23,7 +23,7 @@
buildPythonPackage rec {
pname = "manticore";
- version = "0.3.6";
+ version = "0.3.7";
format = "setuptools";
disabled = pythonOlder "3.7";
@@ -32,7 +32,7 @@ buildPythonPackage rec {
owner = "trailofbits";
repo = "manticore";
rev = version;
- sha256 = "sha256-L112YwrBcdcLBeBsPLWt3C57u2WDvGLq50EzW9ojdyg=";
+ sha256 = "sha256-+17VBfAtkZZIi3SF5Num1Uqg3WjIpgbz3Jx65rD5zkM=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/markupsafe/default.nix b/pkgs/development/python-modules/markupsafe/default.nix
index 12845da7e37a..b0f876ef3e8d 100644
--- a/pkgs/development/python-modules/markupsafe/default.nix
+++ b/pkgs/development/python-modules/markupsafe/default.nix
@@ -7,13 +7,13 @@
buildPythonPackage rec {
pname = "markupsafe";
- version = "2.0.1";
+ version = "2.1.0";
disabled = pythonOlder "3.6";
src = fetchPypi {
pname = "MarkupSafe";
inherit version;
- sha256 = "02k2ynmqvvd0z0gakkf8s4idyb606r7zgga41jrkhqmigy06fk2r";
+ sha256 = "sha256-gL6vY937xkoEUrhB2ANsoGEeBJZQ4gr8uIL108Jm1l8=";
};
checkInputs = [
diff --git a/pkgs/development/python-modules/matrix-nio/default.nix b/pkgs/development/python-modules/matrix-nio/default.nix
index 665167e290ea..724a1459b779 100644
--- a/pkgs/development/python-modules/matrix-nio/default.nix
+++ b/pkgs/development/python-modules/matrix-nio/default.nix
@@ -41,6 +41,7 @@ buildPythonPackage rec {
postPatch = ''
substituteInPlace pyproject.toml \
--replace 'aiofiles = "^0.6.0"' 'aiofiles = "*"' \
+ --replace 'h11 = "^0.12.0"' 'h11 = "*"' \
--replace 'jsonschema = "^3.2.0"' 'jsonschema = "*"' \
--replace 'cachetools = { version = "^4.2.1", optional = true }' 'cachetools = { version = "*", optional = true }'
'';
diff --git a/pkgs/development/python-modules/meshio/default.nix b/pkgs/development/python-modules/meshio/default.nix
index 54f8431ba279..1471ea5b1e5d 100644
--- a/pkgs/development/python-modules/meshio/default.nix
+++ b/pkgs/development/python-modules/meshio/default.nix
@@ -6,22 +6,24 @@
, h5py
, exdown
, pytestCheckHook
+, rich
}:
buildPythonPackage rec {
pname = "meshio";
- version = "5.2.2";
+ version = "5.3.2";
format = "pyproject";
src = fetchPypi {
inherit pname version;
- sha256 = "209885ac31b00155e43c27859d1aff0ba7f97f319ee7bed453a8b9e1677a4e52";
+ sha256 = "sha256-L1YNRAgoHBvf8SsM++J+k1UNciIw91W1s6IA26I/bYw=";
};
propagatedBuildInputs = [
numpy
netcdf4
h5py
+ rich
];
checkInputs = [
diff --git a/pkgs/development/python-modules/mezzanine/default.nix b/pkgs/development/python-modules/mezzanine/default.nix
index 2c78575d3704..83085d76a367 100644
--- a/pkgs/development/python-modules/mezzanine/default.nix
+++ b/pkgs/development/python-modules/mezzanine/default.nix
@@ -20,12 +20,12 @@
}:
buildPythonPackage rec {
- version = "5.1.0";
+ version = "5.1.3";
pname = "Mezzanine";
src = fetchPypi {
inherit pname version;
- sha256 = "ce1117c81416d2e0a77981419312e200aec1cf3cb3ea9630083bd29e74bbb265";
+ sha256 = "sha256-G/Oj5g70tFUhnbSVElVk0s9Ka+MEuPsEgj6blcFBOoY=";
};
disabled = isPyPy || lib.versionOlder django.version "1.11"
diff --git a/pkgs/development/python-modules/minio/default.nix b/pkgs/development/python-modules/minio/default.nix
index 477ed47e9dd1..5b142406fab0 100644
--- a/pkgs/development/python-modules/minio/default.nix
+++ b/pkgs/development/python-modules/minio/default.nix
@@ -16,7 +16,7 @@
buildPythonPackage rec {
pname = "minio";
- version = "7.1.2";
+ version = "7.1.4";
format = "setuptools";
disabled = pythonOlder "3.6";
@@ -25,7 +25,7 @@ buildPythonPackage rec {
owner = "minio";
repo = "minio-py";
rev = version;
- sha256 = "sha256-KluSdmhpSSqUTLVdFpIGwre7LOu3A16rt73FvaTmuz8=";
+ sha256 = "sha256-IzITqo23pRf83SFpnBZdryGHIsxh+7HrLVLM9CT5nQQ=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/mongoengine/default.nix b/pkgs/development/python-modules/mongoengine/default.nix
index d609f465e277..269ebf2ef3cf 100644
--- a/pkgs/development/python-modules/mongoengine/default.nix
+++ b/pkgs/development/python-modules/mongoengine/default.nix
@@ -12,14 +12,14 @@
buildPythonPackage rec {
pname = "mongoengine";
- version = "0.23.1";
+ version = "0.24.0";
disabled = isPy27;
src = fetchFromGitHub {
owner = "MongoEngine";
repo = pname;
rev = "v${version}";
- sha256 = "1lj33pgdrp4rvjzcg2glvz1f87np1pfnqhlwbdcijav9rxqc0w70";
+ sha256 = "sha256-BQSB4SGlejARFreeTfqFMzCWvBc6Vvq9EOMLjhAihdI=";
};
propagatedBuildInputs = [
@@ -36,12 +36,15 @@ buildPythonPackage rec {
postPatch = ''
substituteInPlace setup.py \
- --replace "coverage==4.2" "coverage"
+ --replace "coverage==4.2" "coverage" \
+ --replace "pymongo>=3.4,<=4.0" "pymongo"
'';
# tests require mongodb running in background
doCheck = false;
+ pythonImportsCheck = [ "mongoengine" ];
+
meta = with lib; {
description = "MongoEngine is a Python Object-Document Mapper for working with MongoDB";
homepage = "http://mongoengine.org/";
diff --git a/pkgs/development/python-modules/moonraker-api/default.nix b/pkgs/development/python-modules/moonraker-api/default.nix
index 9f6ca7e91a78..50ba81d6d526 100644
--- a/pkgs/development/python-modules/moonraker-api/default.nix
+++ b/pkgs/development/python-modules/moonraker-api/default.nix
@@ -9,7 +9,7 @@
buildPythonPackage rec {
pname = "moonraker-api";
- version = "2.0.4";
+ version = "2.0.5";
format = "setuptools";
disabled = pythonOlder "3.8";
@@ -18,7 +18,7 @@ buildPythonPackage rec {
owner = "cmroche";
repo = pname;
rev = "v${version}";
- sha256 = "1hhm3jnl9qm44y4k927fzw1n32c3551kgsk7i57qw25nca9x3k61";
+ sha256 = "sha256-PgFsXmdAmHXK0wZ6xLTu94RdME1L2H1Mb6V+qFlGXSk=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/moto/default.nix b/pkgs/development/python-modules/moto/default.nix
index 1d9d07743798..f920a06488a3 100644
--- a/pkgs/development/python-modules/moto/default.nix
+++ b/pkgs/development/python-modules/moto/default.nix
@@ -1,269 +1,115 @@
-{ lib, buildPythonPackage, fetchPypi, isPy27, fetchpatch
+{ lib
+, buildPythonPackage
+, fetchPypi
+, pythonOlder
+
+# runtime
, aws-xray-sdk
-, backports_tempfile
, boto3
, botocore
, cfn-lint
+, cryptography
, docker
, flask
, flask-cors
-, freezegun
+, graphql-core
+, idna
, jinja2
, jsondiff
-, mock
-, pyaml
+, python-dateutil
, python-jose
, pytz
+, pyyaml
, requests
, responses
-, six
, sshpubkeys
-, sure
, werkzeug
, xmltodict
-, parameterized
-, idna
-, nose
+
+# tests
+, freezegun
, pytestCheckHook
, pytest-xdist
+, sure
}:
buildPythonPackage rec {
pname = "moto";
- version = "3.0.2";
+ version = "3.0.5";
+ format = "setuptools";
+
+ disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-vZ1oofOYUkFETDFKwSmifvvn+bCi/6NQAxu950NYk5k=";
+ sha256 = "sha256-hfLs4K0DBaoTo5E5zmSKs6/hwEyzKsHbjV5ekRfU0Q4=";
};
- postPatch = ''
- substituteInPlace setup.py \
- --replace "ecdsa<0.15" "ecdsa" \
- --replace "idna<3,>=2.5" "idna" \
- --replace "MarkupSafe<2.0" "MarkupSafe" \
- '';
-
propagatedBuildInputs = [
aws-xray-sdk
boto3
botocore
cfn-lint
+ cryptography
docker
- flask # required for server
+ flask
+ flask-cors
+ graphql-core
+ idna
jinja2
jsondiff
- mock
- pyaml
+ python-dateutil
python-jose
pytz
- six
+ pyyaml
requests
responses
sshpubkeys
werkzeug
xmltodict
- idna
- ] ++ lib.optionals isPy27 [ backports_tempfile ];
+ ];
checkInputs = [
- boto3
- flask-cors
freezegun
- parameterized
- pytestCheckHook
pytest-xdist
+ pytestCheckHook
sure
];
- # Multiple test files still import boto, rather than boto3 like
- # boto is long-deprecated and broken on python3.9
- # https://github.com/spulec/moto/blob/63ce647123755e4c4693a89f52c254596004c098/tests/test_autoscaling/test_autoscaling.py#L2
- # NOTE: This should change to use disabledTestFiles / disabledTestPaths once that
- # feature stabalizes: see #113153 (mostly the discussion therein), #113167, #110700
pytestFlagsArray = [
- "-n $NIX_BUILD_CORES"
- "--ignore=tests/test_awslambda/test_policy.py"
- "--ignore=tests/test_autoscaling/test_autoscaling.py"
- "--ignore=tests/test_autoscaling/test_cloudformation.py"
- "--ignore=tests/test_autoscaling/test_elbv2.py"
- "--ignore=tests/test_autoscaling/test_launch_configurations.py"
- "--ignore=tests/test_autoscaling/test_policies.py"
- "--ignore=tests/test_autoscaling/test_server.py"
- "--ignore=tests/test_awslambda/test_lambda.py"
- "--ignore=tests/test_awslambda/test_lambda_cloudformation.py"
- "--ignore=tests/test_batch/test_cloudformation.py"
- "--ignore=tests/test_batch/test_server.py"
- "--ignore=tests/test_cloudformation/test_cloudformation_depends_on.py"
- "--ignore=tests/test_cloudformation/test_cloudformation_stack_crud.py"
- "--ignore=tests/test_cloudformation/test_cloudformation_stack_crud_boto3.py"
- "--ignore=tests/test_cloudformation/test_cloudformation_stack_integration.py"
- "--ignore=tests/test_cloudformation/test_stack_parsing.py"
- "--ignore=tests/test_cloudformation/test_validate.py"
- "--ignore=tests/test_cloudwatch/test_cloudwatch.py"
- "--ignore=tests/test_cognitoidentity/test_server.py"
- "--ignore=tests/test_config/test_config.py"
- "--ignore=tests/test_core/test_auth.py"
- "--ignore=tests/test_core/test_decorator_calls.py"
- "--ignore=tests/test_core/test_nested.py"
- "--ignore=tests/test_core/test_server.py"
- "--ignore=tests/test_datapipeline/test_datapipeline.py"
- "--ignore=tests/test_datapipeline/test_server.py"
- "--ignore=tests/test_datasync/test_datasync.py"
- "--ignore=tests/test_dynamodb/test_dynamodb.py"
- "--ignore=tests/test_dynamodb/test_dynamodb_table_with_range_key.py"
- "--ignore=tests/test_dynamodb/test_dynamodb_table_without_range_key.py"
- "--ignore=tests/test_dynamodb/test_server.py"
- "--ignore=tests/test_dynamodb2/test_dynamodb.py"
- "--ignore=tests/test_dynamodb2/test_dynamodb_table_with_range_key.py"
- "--ignore=tests/test_dynamodb2/test_dynamodb_table_without_range_key.py"
- "--ignore=tests/test_dynamodb2/test_server.py"
- "--ignore=tests/test_ec2/test_amazon_dev_pay.py"
- "--ignore=tests/test_ec2/test_amis.py"
- "--ignore=tests/test_ec2/test_availability_zones_and_regions.py"
- "--ignore=tests/test_ec2/test_customer_gateways.py"
- "--ignore=tests/test_ec2/test_dhcp_options.py"
- "--ignore=tests/test_ec2/test_elastic_block_store.py"
- "--ignore=tests/test_ec2/test_elastic_ip_addresses.py"
- "--ignore=tests/test_ec2/test_elastic_network_interfaces.py"
- "--ignore=tests/test_ec2/test_general.py"
- "--ignore=tests/test_ec2/test_instances.py"
- "--ignore=tests/test_ec2/test_internet_gateways.py"
- "--ignore=tests/test_ec2/test_ip_addresses.py"
- "--ignore=tests/test_ec2/test_key_pairs.py"
- "--ignore=tests/test_ec2/test_monitoring.py"
- "--ignore=tests/test_ec2/test_network_acls.py"
- "--ignore=tests/test_ec2/test_placement_groups.py"
- "--ignore=tests/test_ec2/test_regions.py"
- "--ignore=tests/test_ec2/test_reserved_instances.py"
- "--ignore=tests/test_ec2/test_route_tables.py"
- "--ignore=tests/test_ec2/test_security_groups.py"
- "--ignore=tests/test_ec2/test_spot_instances.py"
- "--ignore=tests/test_ec2/test_subnets.py"
- "--ignore=tests/test_ec2/test_tags.py"
- "--ignore=tests/test_ec2/test_virtual_private_gateways.py"
- "--ignore=tests/test_ec2/test_vm_export.py"
- "--ignore=tests/test_ec2/test_vm_import.py"
- "--ignore=tests/test_ec2/test_vpc_peering.py"
- "--ignore=tests/test_ec2/test_vpcs.py"
- "--ignore=tests/test_ec2/test_vpn_connections.py"
- "--ignore=tests/test_ec2/test_vpn_connections.py"
- "--ignore=tests/test_ec2/test_windows.py"
- "--ignore=tests/test_ecs/test_ecs_boto3.py"
- "--ignore=tests/test_elb/test_elb.py"
- "--ignore=tests/test_elb/test_server.py"
- "--ignore=tests/test_elbv2/test_elbv2.py"
- "--ignore=tests/test_elbv2/test_server.py"
- "--ignore=tests/test_emr/test_emr.py"
- "--ignore=tests/test_emr/test_server.py"
- "--ignore=tests/test_glacier/test_glacier_archives.py"
- "--ignore=tests/test_glacier/test_glacier_jobs.py"
- "--ignore=tests/test_glacier/test_glacier_vaults.py"
- "--ignore=tests/test_iam/test_iam.py"
- "--ignore=tests/test_iam/test_iam_cloudformation.py"
- "--ignore=tests/test_iam/test_iam_groups.py"
- "--ignore=tests/test_iam/test_server.py"
- "--ignore=tests/test_iot/test_server.py"
- "--ignore=tests/test_iotdata/test_server.py"
- "--ignore=tests/test_kinesis/test_kinesis.py"
- "--ignore=tests/test_kinesis/test_kinesis_cloudformation.py"
- "--ignore=tests/test_kinesis/test_server.py"
- "--ignore=tests/test_kinesisvideo/test_server.py"
- "--ignore=tests/test_kinesisvideoarchivedmedia/test_server.py"
- "--ignore=tests/test_kms/test_kms.py"
- "--ignore=tests/test_kms/test_server.py"
- "--ignore=tests/test_kms/test_utils.py"
- "--ignore=tests/test_logs/test_logs.py"
- "--ignore=tests/test_polly/test_server.py"
- "--ignore=tests/test_rds/test_rds.py"
- "--ignore=tests/test_rds/test_server.py"
- "--ignore=tests/test_rds2/test_server.py"
- "--ignore=tests/test_redshift/test_redshift.py"
- "--ignore=tests/test_redshift/test_server.py"
- "--ignore=tests/test_resourcegroupstaggingapi/test_resourcegroupstaggingapi.py"
- "--ignore=tests/test_route53/test_route53.py"
- "--ignore=tests/test_s3/test_s3.py"
- "--ignore=tests/test_s3/test_s3_cloudformation.py"
- "--ignore=tests/test_s3/test_s3_lifecycle.py"
- "--ignore=tests/test_s3/test_s3_storageclass.py"
- "--ignore=tests/test_s3/test_s3_utils.py"
- "--ignore=tests/test_s3bucket_path/test_s3bucket_path.py"
- "--ignore=tests/test_s3bucket_path/test_s3bucket_path_combo.py"
- "--ignore=tests/test_secretsmanager/test_server.py"
- "--ignore=tests/test_ses/test_server.py"
- "--ignore=tests/test_ses/test_ses.py"
- "--ignore=tests/test_ses/test_ses_boto3.py"
- "--ignore=tests/test_ses/test_ses_sns_boto3.py"
- "--ignore=tests/test_sns/test_application.py"
- "--ignore=tests/test_sns/test_application_boto3.py"
- "--ignore=tests/test_sns/test_publishing.py"
- "--ignore=tests/test_sns/test_publishing_boto3.py"
- "--ignore=tests/test_sns/test_server.py"
- "--ignore=tests/test_sns/test_subscriptions.py"
- "--ignore=tests/test_sns/test_subscriptions_boto3.py"
- "--ignore=tests/test_sns/test_topics.py"
- "--ignore=tests/test_sns/test_topics_boto3.py"
- "--ignore=tests/test_sqs/test_server.py"
- "--ignore=tests/test_sqs/test_sqs.py"
- "--ignore=tests/test_ssm/test_ssm_boto3.py"
- "--ignore=tests/test_ssm/test_ssm_docs.py"
- "--ignore=tests/test_sts/test_server.py"
- "--ignore=tests/test_sts/test_sts.py"
- "--ignore=tests/test_swf/models/test_activity_task.py"
- "--ignore=tests/test_swf/models/test_decision_task.py"
- "--ignore=tests/test_swf/models/test_timeout.py"
- "--ignore=tests/test_swf/models/test_workflow_execution.py"
- "--ignore=tests/test_swf/responses/test_activity_tasks.py"
- "--ignore=tests/test_swf/responses/test_activity_types.py"
- "--ignore=tests/test_swf/responses/test_decision_tasks.py"
- "--ignore=tests/test_swf/responses/test_domains.py"
- "--ignore=tests/test_swf/responses/test_timeouts.py"
- "--ignore=tests/test_swf/responses/test_workflow_executions.py"
- "--ignore=tests/test_swf/responses/test_workflow_types.py"
- # attempts web connections
- "--ignore=tests/test_appsync/test_appsync_schema.py"
- "--ignore=tests/test_awslambda/test_lambda_eventsourcemapping.py"
- "--ignore=tests/test_awslambda/test_lambda_invoke.py"
- "--ignore=tests/test_batch/test_batch_jobs.py"
- "--ignore=tests/**/*_integration.py"
+ "--numprocesses $NIX_BUILD_CORES"
+
+ # Disable tests that try to access the network
+ "--deselect=tests/test_cloudformation/test_cloudformation_custom_resources.py::test_create_custom_lambda_resource__verify_cfnresponse_failed"
+ "--deselect=tests/test_cloudformation/test_server.py::test_cloudformation_server_get"
+ "--deselect=tests/test_core/test_decorator_calls.py::test_context_manager"
+ "--deselect=tests/test_core/test_decorator_calls.py::test_decorator_start_and_stop"
+ "--deselect=tests/test_core/test_request_mocking.py::test_passthrough_requests"
+ "--deselect=tests/test_firehose/test_firehose_put.py::test_put_record_batch_http_destination"
+ "--deselect=tests/test_firehose/test_firehose_put.py::test_put_record_http_destination"
+ "--deselect=tests/test_logs/test_integration.py::test_put_subscription_filter_with_lambda"
+ "--deselect=tests/test_sqs/test_integration.py::test_invoke_function_from_sqs_exception"
+ "--deselect=tests/test_sqs/test_sqs_integration.py::test_invoke_function_from_sqs_exception"
+ "--deselect=tests/test_stepfunctions/test_stepfunctions.py::test_state_machine_creation_fails_with_invalid_names"
+ "--deselect=tests/test_stepfunctions/test_stepfunctions.py::test_state_machine_list_executions_with_pagination"
+
+ # json.decoder.JSONDecodeError: Expecting value: line 1 column 1 (char 0)
+ "--deselect=tests/test_cloudformation/test_cloudformation_stack_integration.py::test_lambda_function"
+ ];
+
+ disabledTestPaths = [
+ # xml.parsers.expat.ExpatError: out of memory: line 1, column 0
+ "tests/test_sts/test_sts.py"
+ # botocore.exceptions.NoCredentialsError: Unable to locate credentials
+ "tests/test_redshiftdata/test_redshiftdata.py"
+ # Tries to access the network
+ "tests/test_appsync/test_appsync_schema.py"
+ "tests/test_awslambda/test_lambda_eventsourcemapping.py"
+ "tests/test_awslambda/test_lambda_invoke.py"
+ "tests/test_batch/test_batch_jobs.py"
];
disabledTests = [
- # these tests rely on the network
- "test_server"
- "test_managedblockchain_nodes"
- "test_swf"
- "test_simple_instance"
- "test_passthrough_requests"
- "test_s3_server_get"
- "test_s3_server_bucket_create"
- "test_s3_server_post_to_bucket"
- "test_s3_server_put_ipv6"
- "test_s3_server_put_ipv4"
- "test_http_proxying_integration"
- "test_submit_job_by_name"
- "test_submit_job"
- "test_list_jobs"
- "test_terminate_job"
- "test_idtoken_contains_kid_header"
- "test_latest_meta_data"
- "test_meta_data_iam"
- "test_meta_data_security_credentials"
- "test_meta_data_default_role"
- "test_reset_api"
- "test_data_api"
- "test_requests_to_amazon_subdomains_dont_work"
- "test_get_records_seq"
- "test_stream_with_range_key"
- "test_create_notebook_instance_bad_volume_size"
- "http_destination"
- "test_invoke_function_from_sqs_exception"
- "test_state_machine_list_executions_with_pagination"
- "test_put_subscription_filter_with_lambda"
- "test_create_custom_lambda_resource__verify_cfnresponse_failed"
- "test_state_machine_creation_fails_with_invalid_names"
- # needs graphql
- "test_get_schema_creation_status"
# only appears in aarch64 currently, but best to be safe
"test_state_machine_list_executions_with_filter"
];
diff --git a/pkgs/development/python-modules/msal-extensions/default.nix b/pkgs/development/python-modules/msal-extensions/default.nix
index f81395f0245b..a811018da214 100644
--- a/pkgs/development/python-modules/msal-extensions/default.nix
+++ b/pkgs/development/python-modules/msal-extensions/default.nix
@@ -11,11 +11,11 @@
buildPythonPackage rec {
pname = "msal-extensions";
- version = "0.3.1";
+ version = "1.0.0";
src = fetchPypi {
inherit pname version;
- sha256 = "d9029af70f2cbdc5ad7ecfed61cb432ebe900484843ccf72825445dbfe62d311";
+ sha256 = "sha256-xnarpWsMzjeD3htcXs/oKNuZgWeHUSbKS0fcZDZFE1Q=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/multidict/default.nix b/pkgs/development/python-modules/multidict/default.nix
index 0ea21ecbe405..6ee071732691 100644
--- a/pkgs/development/python-modules/multidict/default.nix
+++ b/pkgs/development/python-modules/multidict/default.nix
@@ -7,13 +7,13 @@
buildPythonPackage rec {
pname = "multidict";
- version = "5.2.0";
+ version = "6.0.2";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "0dd1c93edb444b33ba2274b66f63def8a327d607c6c790772f448a53b6ea59ce";
+ sha256 = "sha256-X/O9dfOOTEPx9HDy33pNQwuCHEziK+OE4UWctX1rsBM=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/mutagen/default.nix b/pkgs/development/python-modules/mutagen/default.nix
index 33fc3c02daeb..6308b6fceb6f 100644
--- a/pkgs/development/python-modules/mutagen/default.nix
+++ b/pkgs/development/python-modules/mutagen/default.nix
@@ -1,37 +1,74 @@
{ lib
, buildPythonPackage
+, pythonOlder
, fetchPypi
-, isPy27
-, flake8
+
+# docs
+, python
+, sphinx
+, sphinx_rtd_theme
+
+# tests
, hypothesis
-, pycodestyle
-, pyflakes
-, pytest
-, setuptools
-, pkgs
+, pytestCheckHook
}:
buildPythonPackage rec {
pname = "mutagen";
version = "1.45.1";
- disabled = isPy27; # abandoned
+ format = "pyproject";
+
+ disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
sha256 = "6397602efb3c2d7baebd2166ed85731ae1c1d475abca22090b7141ff5034b3e1";
};
- propagatedBuildInputs = [ setuptools ];
- checkInputs = [
- pkgs.faad2 pkgs.flac pkgs.vorbis-tools pkgs.liboggz
- pkgs.glibcLocales pycodestyle pyflakes pytest hypothesis flake8
+ outputs = [
+ "doc"
+ "out"
+ ];
+
+ nativeBuildInputs = [
+ sphinx
+ sphinx_rtd_theme
+ ];
+
+ postInstall = ''
+ ${python.interpreter} setup.py build_sphinx --build-dir=$doc
+ '';
+
+ checkInputs = [
+ hypothesis
+ pytestCheckHook
+ ];
+
+ disabledTests = [
+ # Hypothesis produces unreliable results: Falsified on the first call but did not on a subsequent one
+ "test_test_fileobj_save"
+ ];
+
+ disabledTestPaths = [
+ # we are not interested in code quality measurements
+ "tests/quality/test_flake8.py"
];
- LC_ALL = "en_US.UTF-8";
meta = with lib; {
- description = "Python multimedia tagging library";
+ description = "Python module for handling audio metadata";
+ longDescription = ''
+ Mutagen is a Python module to handle audio metadata. It supports
+ ASF, FLAC, MP4, Monkey's Audio, MP3, Musepack, Ogg Opus, Ogg FLAC,
+ Ogg Speex, Ogg Theora, Ogg Vorbis, True Audio, WavPack, OptimFROG,
+ and AIFF audio files. All versions of ID3v2 are supported, and all
+ standard ID3v2.4 frames are parsed. It can read Xing headers to
+ accurately calculate the bitrate and length of MP3s. ID3 and APEv2
+ tags can be edited regardless of audio format. It can also
+ manipulate Ogg streams on an individual packet/page level.
+ '';
homepage = "https://mutagen.readthedocs.io";
- license = licenses.lgpl2Plus;
+ changelog = "https://mutagen.readthedocs.io/en/latest/changelog.html#release-${lib.replaceStrings [ "." ] [ "-" ] version}";
+ license = licenses.gpl2Plus;
platforms = platforms.all;
};
}
diff --git a/pkgs/development/python-modules/mypy/default.nix b/pkgs/development/python-modules/mypy/default.nix
index 5c5e985641ff..937c95871724 100644
--- a/pkgs/development/python-modules/mypy/default.nix
+++ b/pkgs/development/python-modules/mypy/default.nix
@@ -14,22 +14,22 @@
buildPythonPackage rec {
pname = "mypy";
- version = "0.931";
+ version = "0.941";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "python";
repo = "mypy";
rev = "v${version}";
- sha256 = "1v83flrdxh8grcp40qw04q4hzjflih9xwib64078vsxv2w36f817";
+ hash = "sha256-H2SWJA0WWyKV7/5miFawv4JRXu/J7H6Wer1eBL+Tru0=";
};
patches = [
# FIXME: Remove patch after upstream has decided the proper solution.
# https://github.com/python/mypy/pull/11143
(fetchpatch {
- url = "https://github.com/python/mypy/commit/f1755259d54330cd087cae763cd5bbbff26e3e8a.patch";
- sha256 = "sha256-5gPahX2X6+/qUaqDQIGJGvh9lQ2EDtks2cpQutgbOHk=";
+ url = "https://github.com/python/mypy/commit/e7869f05751561958b946b562093397027f6d5fa.patch";
+ hash = "sha256-waIZ+m3tfvYE4HJ8kL6rN/C4fMjvLEe9UoPbt9mHWIM=";
})
];
diff --git a/pkgs/development/python-modules/napari/default.nix b/pkgs/development/python-modules/napari/default.nix
index 74936da4f725..babdbc4506dc 100644
--- a/pkgs/development/python-modules/napari/default.nix
+++ b/pkgs/development/python-modules/napari/default.nix
@@ -28,12 +28,12 @@
, wrapQtAppsHook
}: mkDerivationWith buildPythonPackage rec {
pname = "napari";
- version = "0.4.12";
+ version = "0.4.14";
src = fetchFromGitHub {
owner = "napari";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-0QSI0mgDjF70/X58fE7uWwlBUCGY5gsvbCm4oJkp2Yk=";
+ sha256 = "sha256-uDDj5dzsT4tRVV0Y+CYegiCpLM77XFaXEXEZXTnX808=";
};
nativeBuildInputs = [ setuptools-scm wrapQtAppsHook ];
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/nbclient/default.nix b/pkgs/development/python-modules/nbclient/default.nix
index c5e3facc0622..52478ad4fd62 100644
--- a/pkgs/development/python-modules/nbclient/default.nix
+++ b/pkgs/development/python-modules/nbclient/default.nix
@@ -6,12 +6,12 @@
buildPythonPackage rec {
pname = "nbclient";
- version = "0.5.10";
+ version = "0.5.11";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
- sha256 = "b5fdea88d6fa52ca38de6c2361401cfe7aaa7cd24c74effc5e489cec04d79088";
+ sha256 = "sha256-dRUWmS80tYFyutVO7x5L9+T0Rg1Y4lXKGk5clklHYAc=";
};
inherit doCheck;
diff --git a/pkgs/development/python-modules/nbconvert/default.nix b/pkgs/development/python-modules/nbconvert/default.nix
index ab91f22acc44..8604698cc2a2 100644
--- a/pkgs/development/python-modules/nbconvert/default.nix
+++ b/pkgs/development/python-modules/nbconvert/default.nix
@@ -23,11 +23,11 @@
buildPythonPackage rec {
pname = "nbconvert";
- version = "6.4.0";
+ version = "6.4.2";
src = fetchPypi {
inherit pname version;
- sha256 = "5412ec774c6db4fccecb8c4ba07ec5d37d6dcf5762593cb3d6ecbbeb562ebbe5";
+ sha256 = "sha256-6ygD2xj2+szmvzsBtoT+R5B5lL0VbRXqzN8BHj1/gWQ=";
};
# Add $out/share/jupyter to the list of paths that are used to search for
diff --git a/pkgs/development/python-modules/net2grid/default.nix b/pkgs/development/python-modules/net2grid/default.nix
index 05b5321a69cf..ef03d45ab6b8 100644
--- a/pkgs/development/python-modules/net2grid/default.nix
+++ b/pkgs/development/python-modules/net2grid/default.nix
@@ -12,7 +12,7 @@
buildPythonPackage rec {
pname = "net2grid";
- version = "3.0.0";
+ version = "4.0.0";
format = "pyproject";
disabled = pythonOlder "3.9";
@@ -21,7 +21,7 @@ buildPythonPackage rec {
owner = "klaasnicolaas";
repo = "python-net2grid";
rev = "v${version}";
- hash = "sha256-nT9qMv4Zr7SjNwHRN3HRR11yl+Oue8VVCfJr2n1D02Q=";
+ hash = "sha256-Ihs8qUx50tAUcRBsVArRhzoLcQUi1vbYh8sPyK75AEk=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/networkx/default.nix b/pkgs/development/python-modules/networkx/default.nix
index e8769f9efc7d..c876c0d549dd 100644
--- a/pkgs/development/python-modules/networkx/default.nix
+++ b/pkgs/development/python-modules/networkx/default.nix
@@ -10,11 +10,11 @@
buildPythonPackage rec {
pname = "networkx";
# upgrade may break sage, please test the sage build or ping @timokau on upgrade
- version = "2.6.3";
+ version = "2.7";
src = fetchPypi {
inherit pname version;
- sha256 = "c0946ed31d71f1b732b5aaa6da5a0388a345019af232ce2f49c766e2d6795c51";
+ sha256 = "sha256-7/t9nNXDbh4NM/QqOu9brd5QMFNYJqNn1c9gihcK9RU=";
};
propagatedBuildInputs = [ decorator setuptools ];
diff --git a/pkgs/development/python-modules/nibabel/default.nix b/pkgs/development/python-modules/nibabel/default.nix
index 60f5fcde63fe..dc0a6d12f0c1 100644
--- a/pkgs/development/python-modules/nibabel/default.nix
+++ b/pkgs/development/python-modules/nibabel/default.nix
@@ -3,7 +3,7 @@
, fetchPypi
, isPy27
, packaging
-, pytest
+, pytestCheckHook
, nose
, numpy
, h5py
@@ -23,11 +23,14 @@ buildPythonPackage rec {
propagatedBuildInputs = [ numpy scipy h5py packaging pydicom ];
- checkInputs = [ nose pytest ];
+ checkInputs = [
+ pytestCheckHook
+ ];
- checkPhase = ''
- pytest
- '';
+ disabledTests = [
+ # https://github.com/nipy/nibabel/issues/951
+ "test_filenames"
+ ];
meta = with lib; {
homepage = "https://nipy.org/nibabel";
diff --git a/pkgs/development/python-modules/nilearn/default.nix b/pkgs/development/python-modules/nilearn/default.nix
index 60e11ef1d12d..2494a446a811 100644
--- a/pkgs/development/python-modules/nilearn/default.nix
+++ b/pkgs/development/python-modules/nilearn/default.nix
@@ -3,11 +3,11 @@
buildPythonPackage rec {
pname = "nilearn";
- version = "0.8.1";
+ version = "0.9.0";
src = fetchPypi {
inherit pname version;
- sha256 = "a0489940855130f35bbc4cac0750479a6f82025215ea7b1d778faca064219298";
+ sha256 = "sha256-+cjjCt71FImRCux3JLVpneF4Qn065jhz2tmyPdMh/nY=";
};
checkInputs = [ pytestCheckHook ];
diff --git a/pkgs/development/python-modules/nose-cover3/default.nix b/pkgs/development/python-modules/nose-cover3/default.nix
deleted file mode 100644
index b75dcc526c5f..000000000000
--- a/pkgs/development/python-modules/nose-cover3/default.nix
+++ /dev/null
@@ -1,27 +0,0 @@
-{ lib
-, buildPythonPackage
-, fetchPypi
-, nose
-}:
-
-buildPythonPackage rec {
- pname = "nose-cover3";
- version = "0.1.0";
-
- src = fetchPypi {
- inherit pname version;
- sha256 = "1la4hhc1yszjpcchvkqk5xmzlb2g1b3fgxj9wwc58qc549whlcc1";
- };
-
- propagatedBuildInputs = [ nose ];
-
- # No tests included
- doCheck = false;
-
- meta = with lib; {
- description = "Coverage 3.x support for Nose";
- homepage = "https://github.com/ask/nosecover3";
- license = licenses.lgpl21;
- };
-
-}
diff --git a/pkgs/development/python-modules/notebook/default.nix b/pkgs/development/python-modules/notebook/default.nix
index 7a1902cb2114..586257a4f8db 100644
--- a/pkgs/development/python-modules/notebook/default.nix
+++ b/pkgs/development/python-modules/notebook/default.nix
@@ -27,12 +27,12 @@
buildPythonPackage rec {
pname = "notebook";
- version = "6.4.7";
+ version = "6.4.8";
disabled = !isPy3k;
src = fetchPypi {
inherit pname version;
- sha256 = "b01da66f11a203b3839d6afa4013674bcfff41c36552f9ad0fbcb2d93c92764a";
+ sha256 = "sha256-Hphcncb2eL3/+53GVzBrVGm/pi1z4D906N77920oQxI=";
};
LC_ALL = "en_US.utf8";
diff --git a/pkgs/development/python-modules/nplusone/default.nix b/pkgs/development/python-modules/nplusone/default.nix
index d9a340d82491..898d209d9138 100644
--- a/pkgs/development/python-modules/nplusone/default.nix
+++ b/pkgs/development/python-modules/nplusone/default.nix
@@ -8,7 +8,6 @@
, mock
, peewee
, pytest-django
-, pytest-pythonpath
, pytestCheckHook
, six
, sqlalchemy
@@ -38,7 +37,6 @@ buildPythonPackage rec {
mock
peewee
pytest-django
- pytest-pythonpath
pytestCheckHook
sqlalchemy
webtest
@@ -54,6 +52,7 @@ buildPythonPackage rec {
postPatch = ''
substituteInPlace pytest.ini \
+ --replace "python_paths" "pythonpath" \
--replace "--cov nplusone --cov-report term-missing" ""
'';
diff --git a/pkgs/development/python-modules/numba/default.nix b/pkgs/development/python-modules/numba/default.nix
index c1415a07b68e..0219300f1fdf 100644
--- a/pkgs/development/python-modules/numba/default.nix
+++ b/pkgs/development/python-modules/numba/default.nix
@@ -19,15 +19,24 @@
, cudaSupport ? false
}:
buildPythonPackage rec {
- version = "0.55.0";
+ version = "0.55.1";
pname = "numba";
disabled = pythonOlder "3.6" || pythonAtLeast "3.10";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-siHr2ZdmKh3Ld+TwkUDgIvv+dXetB4H8LgIUE126bL0=";
+ sha256 = "sha256-A+kGmiZm0chPk7ANvXFvuP7d6Lssbvr6LwSEKkZELqM=";
};
+ postPatch = ''
+ # numpy
+ substituteInPlace setup.py \
+ --replace "1.22" "2"
+
+ substituteInPlace numba/__init__.py \
+ --replace "(1, 21)" "(2, 0)"
+ '';
+
NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1";
propagatedBuildInputs = [ numpy llvmlite setuptools ] ++ lib.optionals cudaSupport [ cudatoolkit cudatoolkit.lib ];
diff --git a/pkgs/development/python-modules/numpydoc/default.nix b/pkgs/development/python-modules/numpydoc/default.nix
index 0f57847b3a62..ea092d01dd42 100644
--- a/pkgs/development/python-modules/numpydoc/default.nix
+++ b/pkgs/development/python-modules/numpydoc/default.nix
@@ -7,13 +7,13 @@
buildPythonPackage rec {
pname = "numpydoc";
- version = "1.1.0";
+ version = "1.2";
disabled = isPy27;
src = fetchPypi {
inherit pname;
inherit version;
- sha256 = "c36fd6cb7ffdc9b4e165a43f67bf6271a7b024d0bb6b00ac468c9e2bfc76448e";
+ sha256 = "sha256-DOwjN0DGsSWRMAXRboqZluBgUor8uLfK0/JwZinf1vc=";
};
checkInputs = [ nose pytest ];
diff --git a/pkgs/development/python-modules/nunavut/default.nix b/pkgs/development/python-modules/nunavut/default.nix
index f4cc9d3140e4..5b974c9b6af2 100644
--- a/pkgs/development/python-modules/nunavut/default.nix
+++ b/pkgs/development/python-modules/nunavut/default.nix
@@ -8,13 +8,13 @@
buildPythonPackage rec {
pname = "nunavut";
- version = "1.6.2";
+ version = "1.7.3";
disabled = pythonOlder "3.5";
src = fetchPypi {
inherit pname version;
- sha256 = "c6f99eaa65935b2c8a3f004025fb3c0309e11655c391d0fcd318d2a8665ca5c4";
+ sha256 = "sha256-Tj3zCKDM4IBH9BKonhW9gPFD+lE3Q570Lxfm6b/d5JU=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/oauthlib/default.nix b/pkgs/development/python-modules/oauthlib/default.nix
index 01e6ca29b5d9..3a2f5cb1bddc 100644
--- a/pkgs/development/python-modules/oauthlib/default.nix
+++ b/pkgs/development/python-modules/oauthlib/default.nix
@@ -1,28 +1,26 @@
{ lib
-, buildPythonPackage
-, fetchFromGitHub
-
-# propagates
, blinker
+, buildPythonPackage
, cryptography
-, pyjwt
-
-# test
+, fetchFromGitHub
, mock
+, pyjwt
, pytestCheckHook
+, pythonOlder
}:
buildPythonPackage rec {
pname = "oauthlib";
- version = "3.1.1";
+ version = "3.2.0";
format = "setuptools";
- # master supports pyjwt==1.7.1
+ disabled = pythonOlder "3.7";
+
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "v${version}";
- hash = "sha256:1bgxpzh11i0x7h9py3a29cz5z714b3p498b62znnn5ciy0cr80sv";
+ hash = "sha256-41JFURG8G8BjlAlNu2+lbj84XR/trAk1U5OPYxPq+5M=";
};
propagatedBuildInputs = [
@@ -36,10 +34,14 @@ buildPythonPackage rec {
pytestCheckHook
];
+ pythonImportsCheck = [
+ "oauthlib"
+ ];
+
meta = with lib; {
+ description = "Generic, spec-compliant, thorough implementation of the OAuth request-signing logic";
homepage = "https://github.com/idan/oauthlib";
- description = "A generic, spec-compliant, thorough implementation of the OAuth request-signing logic";
- maintainers = with maintainers; [ prikhi ];
license = licenses.bsd3;
+ maintainers = with maintainers; [ prikhi ];
};
}
diff --git a/pkgs/development/python-modules/objax/default.nix b/pkgs/development/python-modules/objax/default.nix
index da0a70aafb4c..84d56962cc4d 100644
--- a/pkgs/development/python-modules/objax/default.nix
+++ b/pkgs/development/python-modules/objax/default.nix
@@ -7,7 +7,7 @@
, parameterized
, pillow
, scipy
-, tensorflow-tensorboard
+, tensorboard
}:
buildPythonPackage rec {
@@ -33,7 +33,7 @@ buildPythonPackage rec {
parameterized
pillow
scipy
- tensorflow-tensorboard
+ tensorboard
];
pythonImportsCheck = [
diff --git a/pkgs/development/python-modules/onnx/default.nix b/pkgs/development/python-modules/onnx/default.nix
index d32b82365dc7..e873f3256084 100644
--- a/pkgs/development/python-modules/onnx/default.nix
+++ b/pkgs/development/python-modules/onnx/default.nix
@@ -14,14 +14,14 @@
buildPythonPackage rec {
pname = "onnx";
- version = "1.10.2";
+ version = "1.11.0";
format = "setuptools";
disabled = isPy27;
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-JNc8p9/X5sczmUT4lVS0AQcZiZM3kk/KFEfY8bXbUNY=";
+ sha256 = "sha256-7KIkx8LI7kByoHQ+SJioSpvfgpe15ZEKJjLkxBgv+yo=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/openai/default.nix b/pkgs/development/python-modules/openai/default.nix
index 4fb744826b79..a8b65ea58944 100644
--- a/pkgs/development/python-modules/openai/default.nix
+++ b/pkgs/development/python-modules/openai/default.nix
@@ -9,6 +9,7 @@
, pandas-stubs
, requests
, tqdm
+, wandb
# Check dependencies
, pytest-mock
@@ -35,6 +36,7 @@ buildPythonPackage rec {
pandas-stubs
requests
tqdm
+ wandb
];
pythonImportsCheck = [ "openai" ];
diff --git a/pkgs/development/python-modules/openapi-core/default.nix b/pkgs/development/python-modules/openapi-core/default.nix
index 199ea38ae4ab..32989e7f9ce5 100644
--- a/pkgs/development/python-modules/openapi-core/default.nix
+++ b/pkgs/development/python-modules/openapi-core/default.nix
@@ -68,6 +68,8 @@ buildPythonPackage rec {
disabledTestPaths = [
# AttributeError: 'str' object has no attribute '__name__'
"tests/integration/validation"
+ # requires secrets and additional configuration
+ "tests/integration/contrib/test_django.py"
# Unable to detect SECRET_KEY and ROOT_URLCONF
"tests/integration/contrib/test_django.py"
];
diff --git a/pkgs/development/python-modules/openapi-schema-validator/default.nix b/pkgs/development/python-modules/openapi-schema-validator/default.nix
index 8251c2cd0175..ced5f8ed68b8 100644
--- a/pkgs/development/python-modules/openapi-schema-validator/default.nix
+++ b/pkgs/development/python-modules/openapi-schema-validator/default.nix
@@ -14,14 +14,14 @@
buildPythonPackage rec {
pname = "openapi-schema-validator";
- version = "0.2.0";
+ version = "0.2.3";
format = "pyproject";
src = fetchFromGitHub {
owner = "p1c2u";
repo = pname;
rev = version;
- sha256 = "sha256-HoXtDlXOoYqzsM4FxVfLQdIlpJXaNUcQo8//B4JqJoA=";
+ sha256 = "sha256-rgl2B55dnbpZszr+gWM0FgeXMKfrkDG7HeZBSw5Eles=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/openapi-spec-validator/default.nix b/pkgs/development/python-modules/openapi-spec-validator/default.nix
index 4e61a86a5013..7ef70ab3d3ff 100644
--- a/pkgs/development/python-modules/openapi-spec-validator/default.nix
+++ b/pkgs/development/python-modules/openapi-spec-validator/default.nix
@@ -1,17 +1,23 @@
{ lib, buildPythonPackage, isPy27, fetchPypi
, jsonschema, openapi-schema-validator, pyyaml, six, pathlib
-, mock, pytest, pytest-cov, pytest-flake8, tox, setuptools }:
+, mock, pytest, pytest-cov, pytest-flake8, tox, setuptools
+, poetry-core
+, requests
+}:
buildPythonPackage rec {
pname = "openapi-spec-validator";
- version = "0.3.1";
+ version = "0.4.0";
+ format = "pyproject";
src = fetchPypi {
inherit pname version;
- sha256 = "3d70e6592754799f7e77a45b98c6a91706bdd309a425169d17d8e92173e198a2";
+ sha256 = "sha256-l/JYhQr8l7BI98JlOFXg+I+masEDwr5Qd8eWCsoq1Jo=";
};
- propagatedBuildInputs = [ jsonschema openapi-schema-validator pyyaml six setuptools ]
+ nativeBuildInputs = [ poetry-core ];
+
+ propagatedBuildInputs = [ jsonschema openapi-schema-validator pyyaml six setuptools requests ]
++ (lib.optionals (isPy27) [ pathlib ]);
checkInputs = [ mock pytest pytest-cov pytest-flake8 tox ];
diff --git a/pkgs/development/python-modules/openshift/default.nix b/pkgs/development/python-modules/openshift/default.nix
index 78e0c53c9112..c233f88c73f9 100644
--- a/pkgs/development/python-modules/openshift/default.nix
+++ b/pkgs/development/python-modules/openshift/default.nix
@@ -12,13 +12,13 @@
buildPythonPackage rec {
pname = "openshift";
- version = "0.12.1";
+ version = "0.13.1";
src = fetchFromGitHub {
owner = "openshift";
repo = "openshift-restclient-python";
rev = "v${version}";
- sha256 = "1di55xg3nl4dwrrfw314p4mfm6593kdi7ia517v1sm6x5p4hjl78";
+ sha256 = "sha256-9mMHih2xuQve8hEnc5x4f9Pd4wX7IMy3vrxxGFCG+8o=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/ordered-set/default.nix b/pkgs/development/python-modules/ordered-set/default.nix
index 7546566cb3aa..8ea71fd2d901 100644
--- a/pkgs/development/python-modules/ordered-set/default.nix
+++ b/pkgs/development/python-modules/ordered-set/default.nix
@@ -1,24 +1,39 @@
-{ buildPythonPackage, fetchPypi, lib, isPy27, pytest }:
+{ lib
+, buildPythonPackage
+, fetchPypi
+, pythonOlder
+, flit-core
+, pytestCheckHook
+}:
buildPythonPackage rec {
pname = "ordered-set";
- version = "4.0.2";
- disabled = isPy27;
+ version = "4.1.0";
+ format = "pyproject";
- checkInputs = [ pytest ];
+ disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
- sha256 = "159syfbqnwqnivzjfn3x7ak3xwrxmnzbji7c2qhj1jjv0pgv54xs";
+ sha256 = "sha256-aUqORMh2V8WSku3nKJHrkdNBMfZTFGOqswCRkcdzZKg=";
};
- checkPhase = ''
- py.test test.py
- '';
+ nativeBuildInputs = [
+ flit-core
+ ];
- meta = {
+ checkInputs = [
+ pytestCheckHook
+ ];
+
+ pythonImportsCheck = [
+ "ordered_set"
+ ];
+
+ meta = with lib; {
description = "A MutableSet that remembers its order, so that every entry has an index.";
- license = lib.licenses.mit;
- maintainers = [ lib.maintainers.MostAwesomeDude ];
+ homepage = "https://github.com/rspeer/ordered-set";
+ license = licenses.mit;
+ maintainers = with maintainers; [ MostAwesomeDude ];
};
}
diff --git a/pkgs/development/python-modules/osc-lib/default.nix b/pkgs/development/python-modules/osc-lib/default.nix
index e9a662412b77..2777fc5be754 100644
--- a/pkgs/development/python-modules/osc-lib/default.nix
+++ b/pkgs/development/python-modules/osc-lib/default.nix
@@ -43,7 +43,13 @@ buildPythonPackage rec {
];
checkPhase = ''
- stestr run
+ # tests parse cli output which slightly changed
+ stestr run -e <(echo "
+ osc_lib.tests.utils.test_tags.TestTagHelps.test_add_tag_filtering_option_to_parser
+ osc_lib.tests.utils.test_tags.TestTagHelps.test_add_tag_option_to_parser_for_create
+ osc_lib.tests.utils.test_tags.TestTagHelps.test_add_tag_option_to_parser_for_set
+ osc_lib.tests.utils.test_tags.TestTagHelps.test_add_tag_option_to_parser_for_unset
+ ")
'';
pythonImportsCheck = [ "osc_lib" ];
diff --git a/pkgs/development/python-modules/oslo-context/default.nix b/pkgs/development/python-modules/oslo-context/default.nix
index f38b9bb09b39..7f5fa9b98ca0 100644
--- a/pkgs/development/python-modules/oslo-context/default.nix
+++ b/pkgs/development/python-modules/oslo-context/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "oslo.context";
- version = "3.4.0";
+ version = "4.1.0";
src = fetchPypi {
inherit pname version;
- sha256 = "970f96361c5de9a5dc86d48a648289d77118180ca13ba5eeb307137736ffa953";
+ sha256 = "sha256-damnIqVS+6ionooBAo+oKmGQqzF6lZG7gzA6IhCnkUQ=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/packageurl-python/default.nix b/pkgs/development/python-modules/packageurl-python/default.nix
index 5236cc7bbf8e..c2d74d0d3c16 100644
--- a/pkgs/development/python-modules/packageurl-python/default.nix
+++ b/pkgs/development/python-modules/packageurl-python/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "packageurl-python";
- version = "0.9.8.1";
+ version = "0.9.9";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-Z14OyAWPoIN6BAUEcXi96mp9C0aWaYP6eeHAoa+rHJ4=";
+ sha256 = "sha256-hyoENLmkSLP6l1cXEfad0qP7cjRa1myQsX2Cev6oLwk=";
};
checkInputs = [ pytestCheckHook ];
diff --git a/pkgs/development/python-modules/pandas/default.nix b/pkgs/development/python-modules/pandas/default.nix
index 536f883f29a2..90309ef0b402 100644
--- a/pkgs/development/python-modules/pandas/default.nix
+++ b/pkgs/development/python-modules/pandas/default.nix
@@ -27,12 +27,12 @@
buildPythonPackage rec {
pname = "pandas";
- version = "1.3.5";
+ version = "1.4.1";
format = "setuptools";
src = fetchPypi {
inherit pname version;
- sha256 = "1e4285f5de1012de20ca46b188ccf33521bff61ba5c5ebd78b4fb28e5416a9f1";
+ sha256 = "sha256-jbk+yYrHy1+KwUIMEPXjxDUzFT8lP+f7bYkc9aorgNI=";
};
nativeBuildInputs = [ cython ];
diff --git a/pkgs/development/python-modules/parameterizedtestcase/default.nix b/pkgs/development/python-modules/parameterizedtestcase/default.nix
index 20e662cd66d6..9d277af8d1a9 100644
--- a/pkgs/development/python-modules/parameterizedtestcase/default.nix
+++ b/pkgs/development/python-modules/parameterizedtestcase/default.nix
@@ -27,5 +27,6 @@ buildPythonPackage rec {
homepage = "https://github.com/msabramo/python_unittest_parameterized_test_case";
license = licenses.mit;
maintainers = with maintainers; [ dotlambda ];
+ broken = python.isPy3k; # uses use_2to3
};
}
diff --git a/pkgs/development/python-modules/parse-type/default.nix b/pkgs/development/python-modules/parse-type/default.nix
index 5cfb4b610ce7..3356853e8ac4 100644
--- a/pkgs/development/python-modules/parse-type/default.nix
+++ b/pkgs/development/python-modules/parse-type/default.nix
@@ -8,13 +8,13 @@
buildPythonPackage rec {
pname = "parse-type";
- version = "0.5.6";
+ version = "0.6.0";
src = fetchFromGitHub {
owner = "jenisys";
repo = "parse_type";
rev = "v${version}";
- sha256 = "sha256-CJroqJIi5DpmR8i1lr8OJ+234615PhpVUsqK91XOT3E=";
+ sha256 = "sha256-v79zzAAwXYoK2N8ZPl1L90qOwMRexAV2wCTMvo4vrSc=";
};
propagatedBuildInputs = [
@@ -29,7 +29,7 @@ buildPythonPackage rec {
postPatch = ''
substituteInPlace pytest.ini \
--replace "--metadata PACKAGE_UNDER_TEST parse_type" "" \
- --replace "--metadata PACKAGE_VERSION 0.5.6" "" \
+ --replace "--metadata PACKAGE_VERSION ${version}" "" \
--replace "--html=build/testing/report.html --self-contained-html" "" \
--replace "--junit-xml=build/testing/report.xml" ""
'';
diff --git a/pkgs/development/python-modules/pathlib2/default.nix b/pkgs/development/python-modules/pathlib2/default.nix
index 757ddc7d9746..f0f0163652ca 100644
--- a/pkgs/development/python-modules/pathlib2/default.nix
+++ b/pkgs/development/python-modules/pathlib2/default.nix
@@ -5,28 +5,32 @@
, pythonOlder
, scandir ? null
, glibcLocales
-, mock ? null
+, mock
+, typing
}:
buildPythonPackage rec {
pname = "pathlib2";
- version = "2.3.6";
+ version = "2.3.7.post1";
src = fetchPypi {
inherit pname version;
- sha256 = "7d8bcb5555003cdf4a8d2872c538faa3a0f5d20630cb360e518ca3b981795e5f";
+ sha256 = "sha256-n+DtrYmLg8DD4ZnIQrJ+0hZkXS4Xd1ey3Wc4TUETxkE=";
};
- propagatedBuildInputs = [ six ] ++ lib.optional (pythonOlder "3.5") scandir;
- checkInputs = [ glibcLocales ] ++ lib.optional (pythonOlder "3.3") mock;
+ propagatedBuildInputs = [ six ]
+ ++ lib.optionals (pythonOlder "3.5") [ scandir typing ];
+ checkInputs = [ glibcLocales ]
+ ++ lib.optional (pythonOlder "3.3") mock;
preCheck = ''
export LC_ALL="en_US.UTF-8"
'';
- meta = {
+ meta = with lib; {
description = "This module offers classes representing filesystem paths with semantics appropriate for different operating systems.";
- homepage = "https://pypi.python.org/pypi/pathlib2/";
- license = with lib.licenses; [ mit ];
+ homepage = "https://pypi.org/project/pathlib2/";
+ license = with licenses; [ mit ];
+ maintainers = with maintainers; [ SuperSandro2000 ];
};
}
diff --git a/pkgs/development/python-modules/pdm-pep517/default.nix b/pkgs/development/python-modules/pdm-pep517/default.nix
index aa99d5f23f7b..5649e092634c 100644
--- a/pkgs/development/python-modules/pdm-pep517/default.nix
+++ b/pkgs/development/python-modules/pdm-pep517/default.nix
@@ -8,13 +8,13 @@
buildPythonPackage rec {
pname = "pdm-pep517";
- version = "0.10.2";
+ version = "0.11.2";
format = "pyproject";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
- sha256 = "83bb71a7588df69ea0d77dc6524741c3a1af54ad5f421341428de648bfc03a29";
+ sha256 = "sha256-4AC6tDUCwZHXGAiiYw3UTs4wGjGdJuACocrqOnMHzSA=";
};
preCheck = ''
diff --git a/pkgs/development/python-modules/peewee/default.nix b/pkgs/development/python-modules/peewee/default.nix
index 852ba5ffbcb7..85a58271b6d3 100644
--- a/pkgs/development/python-modules/peewee/default.nix
+++ b/pkgs/development/python-modules/peewee/default.nix
@@ -14,14 +14,14 @@
buildPythonPackage rec {
pname = "peewee";
- version = "3.14.8";
+ version = "3.14.9";
format = "setuptools";
src = fetchFromGitHub {
owner = "coleifer";
repo = pname;
rev = version;
- sha256 = "sha256-BJSM+7+VdW6SxN4/AXsX8NhQPdIFoYrVRVwR9OsJ3QE=";
+ sha256 = "sha256-8rwWKsOOYUrk2k1piCurb1LkB9zzmSITq52qWdyx4yk=";
};
buildInputs = [
diff --git a/pkgs/development/python-modules/pelican/default.nix b/pkgs/development/python-modules/pelican/default.nix
index 436192e18b8d..723b3888edb8 100644
--- a/pkgs/development/python-modules/pelican/default.nix
+++ b/pkgs/development/python-modules/pelican/default.nix
@@ -28,14 +28,14 @@
buildPythonPackage rec {
pname = "pelican";
- version = "4.7.1";
+ version = "4.7.2";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "getpelican";
repo = pname;
rev = version;
- sha256 = "0w3r4ifbrl6mhfphabqs048qys7x6k164ds63jr10l3namljm8ad";
+ hash = "sha256-ZBGzsyCtFt5uj9mpOpGdTzGJET0iwOAgDTy80P6anRU=";
# Remove unicode file names which leads to different checksums on HFS+
# vs. other filesystems because of unicode normalisation.
extraPostFetch = ''
diff --git a/pkgs/development/python-modules/perfplot/default.nix b/pkgs/development/python-modules/perfplot/default.nix
index ca8f867e6e30..a2bb6baec969 100644
--- a/pkgs/development/python-modules/perfplot/default.nix
+++ b/pkgs/development/python-modules/perfplot/default.nix
@@ -14,7 +14,7 @@
buildPythonPackage rec {
pname = "perfplot";
- version = "0.9.13";
+ version = "0.10.1";
format = "pyproject";
disabled = pythonOlder "3.7";
@@ -22,7 +22,7 @@ buildPythonPackage rec {
owner = "nschloe";
repo = pname;
rev = "v${version}";
- sha256 = "0ry5x38sv8gh505z6ip90jymm7kfgyf80y3vjb2i6z567bnblam6";
+ sha256 = "sha256-5qZolEJWjhqk1JakcGBWZ1hxeP1cLqcB7IZ3ufjOC/o=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/pgspecial/default.nix b/pkgs/development/python-modules/pgspecial/default.nix
index 308e8c9c8b64..e7b4e62ab575 100644
--- a/pkgs/development/python-modules/pgspecial/default.nix
+++ b/pkgs/development/python-modules/pgspecial/default.nix
@@ -10,11 +10,11 @@
buildPythonPackage rec {
pname = "pgspecial";
- version = "1.13.0";
+ version = "1.13.1";
src = fetchPypi {
inherit pname version;
- sha256 = "3847e205b19469f16ded05bda24b4758056d67ade4075a5ded4ce6628a9bad01";
+ sha256 = "sha256-1dq5ZpCQgnWRbcLGIu+uIX8ULggWX6NmlJ1By8VlhwE=";
};
propagatedBuildInputs = [
@@ -28,6 +28,11 @@ buildPythonPackage rec {
pytestCheckHook
];
+ disabledTests = [
+ # requires a postgresql server
+ "test_slash_dp_pattern_schema"
+ ];
+
meta = with lib; {
description = "Meta-commands handler for Postgres Database";
homepage = "https://pypi.python.org/pypi/pgspecial";
diff --git a/pkgs/development/python-modules/phonenumbers/default.nix b/pkgs/development/python-modules/phonenumbers/default.nix
index 9faad1e96de2..92b621e49c64 100644
--- a/pkgs/development/python-modules/phonenumbers/default.nix
+++ b/pkgs/development/python-modules/phonenumbers/default.nix
@@ -6,12 +6,12 @@
buildPythonPackage rec {
pname = "phonenumbers";
- version = "8.12.43";
+ version = "8.12.44";
format = "setuptools";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-HIJwouJX1sZUWKQig/gtPsp/e52SVFSmlm4vBN914c8=";
+ sha256 = "sha256-Js/QJX0XBP4viMr/LKq7cNFqh3seZbaq5R+fu+EKqM4=";
};
checkInputs = [
diff --git a/pkgs/development/python-modules/pip/default.nix b/pkgs/development/python-modules/pip/default.nix
index 2ddba8f363e3..a4370fbaae57 100644
--- a/pkgs/development/python-modules/pip/default.nix
+++ b/pkgs/development/python-modules/pip/default.nix
@@ -14,14 +14,14 @@
buildPythonPackage rec {
pname = "pip";
- version = "21.3.1";
+ version = "22.0.3";
format = "other";
src = fetchFromGitHub {
owner = "pypa";
repo = pname;
rev = version;
- sha256 = "sha256-A8oePI5VOKGJTY6ZuUhcOhRkz2I2FSdfsS2xIgktCVQ=";
+ sha256 = "sha256-Wu2QQfb0pehPLLa+za32C4jH1arkBKKc3jlAMRkDV5Q=";
name = "${pname}-${version}-source";
};
diff --git a/pkgs/development/python-modules/platformdirs/default.nix b/pkgs/development/python-modules/platformdirs/default.nix
index 2be8928f630f..584d9361fb76 100644
--- a/pkgs/development/python-modules/platformdirs/default.nix
+++ b/pkgs/development/python-modules/platformdirs/default.nix
@@ -11,7 +11,7 @@
buildPythonPackage rec {
pname = "platformdirs";
- version = "2.5.0";
+ version = "2.5.1";
format = "setuptools";
disabled = pythonOlder "3.7";
@@ -20,7 +20,7 @@ buildPythonPackage rec {
owner = pname;
repo = pname;
rev = version;
- sha256 = "sha256-fppwtY8VX8IQ96H930xItO7mS8LlxxHgBcKlwIL5P2E=";
+ sha256 = "sha256-z6WIwTWLlc/chNRxt3dqqa/IxYj1BBTcQ6OcfliHrvA=";
};
SETUPTOOLS_SCM_PRETEND_VERSION = version;
diff --git a/pkgs/development/python-modules/plotly/default.nix b/pkgs/development/python-modules/plotly/default.nix
index fbe869b07032..fc24a4c2e6f7 100644
--- a/pkgs/development/python-modules/plotly/default.nix
+++ b/pkgs/development/python-modules/plotly/default.nix
@@ -9,11 +9,11 @@
buildPythonPackage rec {
pname = "plotly";
- version = "5.5.0";
+ version = "5.6.0";
src = fetchPypi {
inherit pname version;
- sha256 = "20b8a1a0f0434f9b8d10eb7caa66e947a9a1d698e5a53d40d447bbc0d2ae41f0";
+ sha256 = "sha256-2G5E69449HU9/5gqubXgPPhyqrj99TpAPpme03gVQzE=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/plumbum/default.nix b/pkgs/development/python-modules/plumbum/default.nix
index ae3c4941f684..70b4421778f3 100644
--- a/pkgs/development/python-modules/plumbum/default.nix
+++ b/pkgs/development/python-modules/plumbum/default.nix
@@ -50,6 +50,14 @@ buildPythonPackage rec {
"test_change_env"
"test_dictlike"
"test_local"
+ # incompatible with pytest 7
+ "test_incorrect_login"
+ ];
+
+ disabledTestPaths = [
+ # incompatible with pytest7
+ # https://github.com/tomerfiliba/plumbum/issues/594
+ "tests/test_remote.py"
];
meta = with lib; {
diff --git a/pkgs/development/python-modules/poetry-core/default.nix b/pkgs/development/python-modules/poetry-core/default.nix
index e8632d0ed078..5922d67fc8b7 100644
--- a/pkgs/development/python-modules/poetry-core/default.nix
+++ b/pkgs/development/python-modules/poetry-core/default.nix
@@ -13,14 +13,14 @@
buildPythonPackage rec {
pname = "poetry-core";
- version = "1.0.7";
+ version = "1.0.8";
format = "pyproject";
src = fetchFromGitHub {
owner = "python-poetry";
repo = pname;
rev = version;
- sha256 = "0v86x8f8pcbviv2cdn7jjbgj3c994qasx0bqk1kr0mj8m6pjwy9z";
+ sha256 = "sha256-cs9SMGD9RdW8Wx/IAMq6gkOUBsney5r19hyGva98grk=";
};
postPatch = lib.optionalString (pythonOlder "3.8") ''
diff --git a/pkgs/development/python-modules/pooch/default.nix b/pkgs/development/python-modules/pooch/default.nix
index 3b7ddaf28019..238e6ad62230 100644
--- a/pkgs/development/python-modules/pooch/default.nix
+++ b/pkgs/development/python-modules/pooch/default.nix
@@ -11,12 +11,13 @@
buildPythonPackage rec {
pname = "pooch";
- version = "1.5.2";
+ version = "1.6.0";
+ format = "pyproject";
disabled = isPy27;
src = fetchPypi {
inherit pname version;
- sha256 = "5969b2f1defbdc405df932767e05e0b536e2771c27f1f95d7f260bc99bf13581";
+ sha256 = "sha256-V9IOxLEN1pTSsFu2S8axCcboWmwUBXlM6H7Ys0GrP0Q=";
};
nativeBuildInputs = [ setuptools-scm ];
diff --git a/pkgs/development/python-modules/portalocker/default.nix b/pkgs/development/python-modules/portalocker/default.nix
index 357ca815407f..cd7d6d03bbd4 100644
--- a/pkgs/development/python-modules/portalocker/default.nix
+++ b/pkgs/development/python-modules/portalocker/default.nix
@@ -22,6 +22,10 @@ buildPythonPackage rec {
pytest-mypy
];
+ disabledTests = [
+ "test_combined" # no longer compatible with setuptools>=58
+ ];
+
meta = with lib; {
description = "A library to provide an easy API to file locking";
homepage = "https://github.com/WoLpH/portalocker";
diff --git a/pkgs/development/python-modules/prettytable/default.nix b/pkgs/development/python-modules/prettytable/default.nix
index f914a0f3df44..25d22c2c5a2f 100644
--- a/pkgs/development/python-modules/prettytable/default.nix
+++ b/pkgs/development/python-modules/prettytable/default.nix
@@ -10,11 +10,11 @@
buildPythonPackage rec {
pname = "prettytable";
- version = "3.0.0";
+ version = "3.1.1";
src = fetchPypi {
inherit pname version;
- sha256 = "69fe75d78ac8651e16dd61265b9e19626df5d630ae294fc31687aa6037b97a58";
+ sha256 = "sha256-Q8niMnLKJT0Diudv463eiXlOkuf8qy3fW5SzhkLvTyE=";
};
nativeBuildInputs = [ setuptools-scm ];
diff --git a/pkgs/development/python-modules/prometheus-client/default.nix b/pkgs/development/python-modules/prometheus-client/default.nix
index 7af4e2b02faa..9ba5068359bb 100644
--- a/pkgs/development/python-modules/prometheus-client/default.nix
+++ b/pkgs/development/python-modules/prometheus-client/default.nix
@@ -7,7 +7,7 @@
buildPythonPackage rec {
pname = "prometheus-client";
- version = "0.12.0";
+ version = "0.13.1";
format = "setuptools";
disabled = pythonOlder "3.6";
@@ -16,7 +16,7 @@ buildPythonPackage rec {
owner = "prometheus";
repo = "client_python";
rev = "v${version}";
- sha256 = "1a0kllal5vkkdv325k0mx1mha2l9808mcz4dqx6qrgfskz8c2xjl";
+ sha256 = "sha256-1sMnlUOvvdlUuh288UalAdlf0a1mpnM+Y/upwlnL1H8=";
};
checkInputs = [
diff --git a/pkgs/development/python-modules/promise/default.nix b/pkgs/development/python-modules/promise/default.nix
index 403f0c097916..8833689cec12 100644
--- a/pkgs/development/python-modules/promise/default.nix
+++ b/pkgs/development/python-modules/promise/default.nix
@@ -18,6 +18,11 @@ buildPythonPackage rec {
sha256 = "17mq1bm78xfl0x1g50ng502m5ldq6421rzz35hlqafsj0cq8dkp6";
};
+ postPatch = ''
+ substituteInPlace tests/test_extra.py \
+ --replace "assert_exc.traceback[-1].path.strpath" "str(assert_exc.traceback[-1].path)"
+ '';
+
propagatedBuildInputs = [
six
];
diff --git a/pkgs/development/python-modules/prompt-toolkit/default.nix b/pkgs/development/python-modules/prompt-toolkit/default.nix
index e38560be2eb6..4ec9e381dafb 100644
--- a/pkgs/development/python-modules/prompt-toolkit/default.nix
+++ b/pkgs/development/python-modules/prompt-toolkit/default.nix
@@ -8,7 +8,7 @@
buildPythonPackage rec {
pname = "prompt-toolkit";
- version = "3.0.24";
+ version = "3.0.28";
format = "setuptools";
disabled = pythonOlder "3.6";
@@ -16,7 +16,7 @@ buildPythonPackage rec {
src = fetchPypi {
pname = "prompt_toolkit";
inherit version;
- sha256 = "1bb05628c7d87b645974a1bad3f17612be0c29fa39af9f7688030163f680bad6";
+ sha256 = "sha256-nxzRax6GwpaPJRnX+zHdnWaZFvUVYSwmnRTp7VK1FlA=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/proto-plus/default.nix b/pkgs/development/python-modules/proto-plus/default.nix
index dd2494729efd..defc28d9429a 100644
--- a/pkgs/development/python-modules/proto-plus/default.nix
+++ b/pkgs/development/python-modules/proto-plus/default.nix
@@ -10,12 +10,12 @@
buildPythonPackage rec {
pname = "proto-plus";
- version = "1.19.8";
+ version = "1.20.3";
disabled = !isPy3k;
src = fetchPypi {
inherit pname version;
- sha256 = "bdf45f0e0be71510eb2ec9db4da78afde7b5fb8b0a507a36340a9b6ce8e48e58";
+ sha256 = "sha256-8osiW8nmwU4gb7f46Zakb7LM2QJkjlEtSWq7anFqSuU=";
};
propagatedBuildInputs = [ protobuf ];
diff --git a/pkgs/development/python-modules/proxy-py/default.nix b/pkgs/development/python-modules/proxy-py/default.nix
index 4bf07b1375eb..6527f88e4891 100644
--- a/pkgs/development/python-modules/proxy-py/default.nix
+++ b/pkgs/development/python-modules/proxy-py/default.nix
@@ -13,7 +13,7 @@
buildPythonPackage rec {
pname = "proxy-py";
- version = "2.3.1";
+ version = "2.4.0";
format = "setuptools";
disabled = pythonOlder "3.7";
@@ -22,7 +22,7 @@ buildPythonPackage rec {
owner = "abhinavsingh";
repo = "proxy.py";
rev = "v${version}";
- sha256 = "sha256-qqwb3t8/xicDGfO6l843qRwh0yUfthnOIhgNeKIbEO4=";
+ sha256 = "sha256-VagX7ATVu6AT4POWoG9btizxFeBh9MLXiLpavtfXnyM=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/pybind11/default.nix b/pkgs/development/python-modules/pybind11/default.nix
index 46c1307826ef..8627ca53d54b 100644
--- a/pkgs/development/python-modules/pybind11/default.nix
+++ b/pkgs/development/python-modules/pybind11/default.nix
@@ -36,7 +36,7 @@ buildPythonPackage rec {
postBuild = ''
# build tests
- make
+ make -j $NIX_BUILD_CORES -l $NIX_BUILD_CORES
'';
postInstall = ''
@@ -60,6 +60,8 @@ buildPythonPackage rec {
"tests/test_numpy_dtypes.py"
# no need to test internal packaging
"tests/extra_python_package/test_files.py"
+ # tests that try to parse setuptools stdout
+ "tests/extra_setuptools/test_setuphelper.py"
];
meta = with lib; {
diff --git a/pkgs/development/python-modules/pybluez/default.nix b/pkgs/development/python-modules/pybluez/default.nix
index 1cd7d91ef259..ae90c21bea9f 100644
--- a/pkgs/development/python-modules/pybluez/default.nix
+++ b/pkgs/development/python-modules/pybluez/default.nix
@@ -2,11 +2,14 @@
, buildPythonPackage
, fetchFromGitHub
, pkgs
+, isPy3k
}:
buildPythonPackage rec {
version = "unstable-20160819";
pname = "pybluez";
+ # requires use2to3, which is no longer supported in setuptools>58
+ disabled = isPy3k;
propagatedBuildInputs = [ pkgs.bluez ];
diff --git a/pkgs/development/python-modules/pycognito/default.nix b/pkgs/development/python-modules/pycognito/default.nix
index 375453231b9b..ff050c15bfe0 100644
--- a/pkgs/development/python-modules/pycognito/default.nix
+++ b/pkgs/development/python-modules/pycognito/default.nix
@@ -4,22 +4,25 @@
, envs
, fetchFromGitHub
, isPy27
+, freezegun
, mock
+, moto
, pytestCheckHook
, python-jose
, requests
+, requests-mock
}:
buildPythonPackage rec {
pname = "pycognito";
- version = "2022.01.0";
+ version = "2022.02.1";
disabled = isPy27;
src = fetchFromGitHub {
owner = "pvizeli";
repo = pname;
rev = version;
- sha256 = "sha256-mmlw3irMC0SFjfEinXHyoPNfTvCcO02zGyqQLj9STSY=";
+ sha256 = "sha256-0PqeZ8yy2MzvIi1xQNosR7V2Ma3tMT0Q/v4OIv7f1Kg=";
};
propagatedBuildInputs = [
@@ -30,8 +33,11 @@ buildPythonPackage rec {
];
checkInputs = [
+ freezegun
mock
+ moto
pytestCheckHook
+ requests-mock
];
postPatch = ''
diff --git a/pkgs/development/python-modules/pydmd/default.nix b/pkgs/development/python-modules/pydmd/default.nix
index f80f90034784..68a19afddba7 100644
--- a/pkgs/development/python-modules/pydmd/default.nix
+++ b/pkgs/development/python-modules/pydmd/default.nix
@@ -35,9 +35,10 @@ buildPythonPackage rec {
pytestCheckHook
];
- disabledTestPaths = [
- # Those tests take over 1.5 h on hydra. Also, an error and two failures
- "tests/test_spdmd.py"
+ pytestFlagsArray = [
+ # test suite takes over 100 vCPU hours, just run small subset of it.
+ # TODO: Add a passthru.tests with all tests
+ "tests/test_dmdbase.py"
];
pythonImportsCheck = [
diff --git a/pkgs/development/python-modules/pyee/default.nix b/pkgs/development/python-modules/pyee/default.nix
index a252cd4505ac..e47e0366c863 100644
--- a/pkgs/development/python-modules/pyee/default.nix
+++ b/pkgs/development/python-modules/pyee/default.nix
@@ -12,13 +12,13 @@
buildPythonPackage rec {
pname = "pyee";
- version = "8.2.2";
+ version = "9.0.4";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-XH5g+N+VcQ2+F1UOFs4BU/g5kMAO90SEG0Pzce1T6+o=";
+ sha256 = "sha256-J3DEkoq8ch9GtwXmpysMWUgMSmnJqDygsAu5lPHqSzI=";
};
buildInputs = [
diff --git a/pkgs/development/python-modules/pyfaidx/default.nix b/pkgs/development/python-modules/pyfaidx/default.nix
index a2815c3e1e2d..e356ca563b54 100644
--- a/pkgs/development/python-modules/pyfaidx/default.nix
+++ b/pkgs/development/python-modules/pyfaidx/default.nix
@@ -10,12 +10,12 @@
buildPythonPackage rec {
pname = "pyfaidx";
- version = "0.6.3.1";
+ version = "0.6.4";
format = "setuptools";
src = fetchPypi {
inherit pname version;
- sha256 = "93adf036a75e08dc9b1dcd59de6a4db2f65a48c603edabe2e499764b6535ed50";
+ sha256 = "sha256-e6O9yx30unSfdmWzTmoFKqToQkBqDflebfRxfMEj85I=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/pyfakefs/default.nix b/pkgs/development/python-modules/pyfakefs/default.nix
index 29803793fd6f..63bf4483911a 100644
--- a/pkgs/development/python-modules/pyfakefs/default.nix
+++ b/pkgs/development/python-modules/pyfakefs/default.nix
@@ -7,13 +7,13 @@
}:
buildPythonPackage rec {
- version = "4.5.4";
+ version = "4.5.5";
pname = "pyfakefs";
disabled = pythonOlder "3.5";
src = fetchPypi {
inherit pname version;
- sha256 = "5b5951e873f73bf12e3a19d8e4470c4b7962c51df753cf8c4caaf64e24a0a323";
+ sha256 = "sha256-iIIe2MJjJxu2alRBmoJZGqEH+yz9pC3I8hWOC+CIWQc=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/pygit2/default.nix b/pkgs/development/python-modules/pygit2/default.nix
index b8b405a8ecf0..47654ff34c6a 100644
--- a/pkgs/development/python-modules/pygit2/default.nix
+++ b/pkgs/development/python-modules/pygit2/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "pygit2";
- version = "1.8.0";
+ version = "1.9.0";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-bixc/1qh5D9DEDSAdhFS9cXWvvQPXB9QyHWKbonmbLY=";
+ sha256 = "sha256-xehYisrV4y+gWVWCVxBZ5rkOx8SHxYtOU8KADcveRMg=";
};
preConfigure = lib.optionalString stdenv.isDarwin ''
diff --git a/pkgs/development/python-modules/pygls/default.nix b/pkgs/development/python-modules/pygls/default.nix
index 4c557b2676cd..22cea8c0709d 100644
--- a/pkgs/development/python-modules/pygls/default.nix
+++ b/pkgs/development/python-modules/pygls/default.nix
@@ -4,6 +4,7 @@
, fetchFromGitHub
, setuptools-scm
, pydantic
+, toml
, typeguard
, mock
, pytest-asyncio
@@ -13,6 +14,7 @@
buildPythonPackage rec {
pname = "pygls";
version = "0.11.3";
+ format = "setuptools";
disabled = !isPy3k;
src = fetchFromGitHub {
@@ -27,6 +29,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [
pydantic
+ toml
typeguard
];
# We don't know why an early version of pydantic is required, see:
diff --git a/pkgs/development/python-modules/pyicu/default.nix b/pkgs/development/python-modules/pyicu/default.nix
index 3281a7ceb873..02226feff2ce 100644
--- a/pkgs/development/python-modules/pyicu/default.nix
+++ b/pkgs/development/python-modules/pyicu/default.nix
@@ -8,11 +8,11 @@
buildPythonPackage rec {
pname = "PyICU";
- version = "2.8";
+ version = "2.8.1";
src = fetchPypi {
inherit pname version;
- sha256 = "3d80de47045a8163db5aebc947c42b4d429eeea4f0c32af4f40b33981fa872b9";
+ sha256 = "sha256-8LlUmof4e6fEE/E2edE3Jx4LN/HzmwEJrOOCV9TRSNY=";
};
nativeBuildInputs = [ icu ]; # for icu-config, but should be replaced with pkg-config
diff --git a/pkgs/development/python-modules/pylama/default.nix b/pkgs/development/python-modules/pylama/default.nix
index 3f93aef0a3f7..5d8674aac023 100644
--- a/pkgs/development/python-modules/pylama/default.nix
+++ b/pkgs/development/python-modules/pylama/default.nix
@@ -10,12 +10,14 @@
, pydocstyle
, pyflakes
, vulture
+, isort
+, pylint
, pytestCheckHook
}:
buildPythonPackage rec {
pname = "pylama";
- version = "8.3.6";
+ version = "8.3.7";
format = "setuptools";
@@ -24,7 +26,7 @@ buildPythonPackage rec {
owner = "klen";
repo = "pylama";
rev = version;
- hash = "sha256-KU/G+2Fm4G/dUuNhhk8xM0Y8+7YOUUgREONM8CQGugw=";
+ hash = "sha256-//mrvZb4bT4aATURqa4g1DUagYe9SoP3o3OrwmiEJnI=";
};
patches = [
@@ -45,14 +47,22 @@ buildPythonPackage rec {
];
checkInputs = [
+ # avoid infinite recursion pylint -> isort -> pylama
+ (pylint.override {
+ isort = isort.overridePythonAttrs (old: {
+ doCheck = false;
+ });
+ })
pytestCheckHook
];
+ preCheck = ''
+ export HOME=$TEMP
+ '';
+
disabledTests = [
- "test_pylint" # infinite recursion
"test_quotes" # FIXME package pylama-quotes
"test_radon" # FIXME package radon
- "test_sort"
];
pythonImportsCheck = [
diff --git a/pkgs/development/python-modules/pylint-django/default.nix b/pkgs/development/python-modules/pylint-django/default.nix
index 291ef8fba62e..61d49bd3ba0d 100644
--- a/pkgs/development/python-modules/pylint-django/default.nix
+++ b/pkgs/development/python-modules/pylint-django/default.nix
@@ -11,14 +11,14 @@
buildPythonPackage rec {
pname = "pylint-django";
- version = "2.5.0";
+ version = "2.5.2";
disabled = !isPy3k;
src = fetchFromGitHub {
owner = "PyCQA";
repo = pname;
rev = "v${version}";
- sha256 = "1r48dss9qnzlifwy5ylkffdw35aaajmil0486mav056jm1vmi2pr";
+ sha256 = "sha256-VgGdV1T154LauclGo6jpLPUrYn5vTOWwvO4IXQ9se7c=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/pymemcache/default.nix b/pkgs/development/python-modules/pymemcache/default.nix
index f30b6ea06b4c..f2055ca9a791 100644
--- a/pkgs/development/python-modules/pymemcache/default.nix
+++ b/pkgs/development/python-modules/pymemcache/default.nix
@@ -8,13 +8,13 @@
buildPythonPackage rec {
pname = "pymemcache";
- version = "3.5.0";
+ version = "3.5.1";
src = fetchFromGitHub {
owner = "pinterest";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-O2qmcLWCUSc1f32irelIZOOuOziOUQXFGcuQJBXPvvM=";
+ sha256 = "sha256-DKqfv5gf9gzbnEPQSzy2mAaVYJZL9jmTKyGWVzj40T4=";
};
checkInputs = [
diff --git a/pkgs/development/python-modules/pymongo/default.nix b/pkgs/development/python-modules/pymongo/default.nix
index bae4f7c25fb8..ba184f68b4b5 100644
--- a/pkgs/development/python-modules/pymongo/default.nix
+++ b/pkgs/development/python-modules/pymongo/default.nix
@@ -6,12 +6,12 @@
buildPythonPackage rec {
pname = "pymongo";
- version = "3.12.2";
+ version = "3.12.3";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "64ea5e97fca1a37f83df9f3460bf63640bc0d725e12f3471e6acbf3a6040dd37";
+ sha256 = "sha256-ConK3ABipeU2ZN3gQ/bAlxcrjBxfAJRJAJUoL/mZWl8=";
};
# Tests call a running mongodb instance
diff --git a/pkgs/development/python-modules/pynndescent/default.nix b/pkgs/development/python-modules/pynndescent/default.nix
index f15cfef63c6e..79b914f6122c 100644
--- a/pkgs/development/python-modules/pynndescent/default.nix
+++ b/pkgs/development/python-modules/pynndescent/default.nix
@@ -34,6 +34,16 @@ buildPythonPackage rec {
pytestCheckHook
];
+ disabledTests = [
+ # numpy.core._exceptions._UFuncNoLoopError
+ "test_sparse_nn_descent_query_accuracy_angular"
+ "test_nn_descent_query_accuracy_angular"
+ "test_alternative_distances"
+ # scipy: ValueError: Unknown Distance Metric: wminkowski
+ # https://github.com/scikit-learn/scikit-learn/pull/21741
+ "test_weighted_minkowski"
+ ];
+
pythonImportsCheck = [
"pynndescent"
];
diff --git a/pkgs/development/python-modules/pyomo/default.nix b/pkgs/development/python-modules/pyomo/default.nix
index e8d89e9ef2d2..20450cd9effc 100644
--- a/pkgs/development/python-modules/pyomo/default.nix
+++ b/pkgs/development/python-modules/pyomo/default.nix
@@ -12,14 +12,14 @@
buildPythonPackage rec {
pname = "pyomo";
- version = "5.7.3";
+ version = "6.3.0";
disabled = isPy27; # unable to import pyutilib.th
src = fetchFromGitHub {
repo = "pyomo";
owner = "pyomo";
rev = version;
- sha256 = "sha256-p0/DdCwyXdzXElzjWewKs0Oi7BMXC+BxgYikdZL0t68=";
+ sha256 = "sha256-xyjiB5fDRf5y9Av5Cr+8wtU4pHzMHsM45mcmJEOaTWs=";
};
checkInputs = [ nose glpk ];
diff --git a/pkgs/development/python-modules/pyopengl-accelerate/default.nix b/pkgs/development/python-modules/pyopengl-accelerate/default.nix
index c6839bba9896..195ec563d50f 100644
--- a/pkgs/development/python-modules/pyopengl-accelerate/default.nix
+++ b/pkgs/development/python-modules/pyopengl-accelerate/default.nix
@@ -1,11 +1,13 @@
{ lib
, buildPythonPackage
+, pythonAtLeast
, fetchPypi
}:
buildPythonPackage rec {
pname = "pyopengl-accelerate";
version = "3.1.5";
+ disabled = pythonAtLeast "3.10"; # fails to compile
src = fetchPypi {
pname = "PyOpenGL-accelerate";
diff --git a/pkgs/development/python-modules/pyopengl/default.nix b/pkgs/development/python-modules/pyopengl/default.nix
index 72d6ae332583..7370057ad720 100644
--- a/pkgs/development/python-modules/pyopengl/default.nix
+++ b/pkgs/development/python-modules/pyopengl/default.nix
@@ -7,12 +7,12 @@
buildPythonPackage rec {
pname = "pyopengl";
- version = "3.1.5";
+ version = "3.1.6";
src = fetchPypi {
pname = "PyOpenGL";
inherit version;
- sha256 = "4107ba0d0390da5766a08c242cf0cf3404c377ed293c5f6d701e457c57ba3424";
+ sha256 = "sha256-jqbIdzkn7adAW//G9buTvoFWmnsFyMrFDNlOlp3OXic=";
};
propagatedBuildInputs = [ pillow ];
diff --git a/pkgs/development/python-modules/pyownet/default.nix b/pkgs/development/python-modules/pyownet/default.nix
index 2bdc18e1e244..9a368c26087e 100644
--- a/pkgs/development/python-modules/pyownet/default.nix
+++ b/pkgs/development/python-modules/pyownet/default.nix
@@ -14,6 +14,10 @@ buildPythonPackage rec {
sha256 = "4f2fa4471c2f806b35090bdc6c092305c6eded3ff3736f8b586d35bdb157de62";
};
+ postPatch = ''
+ sed -i '/use_2to3/d' setup.py
+ '';
+
# tests access network
doCheck = false;
diff --git a/pkgs/development/python-modules/pyparsing/default.nix b/pkgs/development/python-modules/pyparsing/default.nix
index 27047cf6eabc..449c5334e664 100644
--- a/pkgs/development/python-modules/pyparsing/default.nix
+++ b/pkgs/development/python-modules/pyparsing/default.nix
@@ -11,13 +11,13 @@
let
pyparsing = buildPythonPackage rec {
pname = "pyparsing";
- version = "3.0.6";
+ version = "3.0.7";
src = fetchFromGitHub {
owner = "pyparsing";
repo = pname;
rev = "pyparsing_${version}";
- sha256 = "0n89ky7rx5yg09ssji8liahnyxip08hz7syc2k4pmlgs4978181a";
+ sha256 = "sha256-RyvTTbFshAZgyZPgzqcq31E504RlnMZuf16jJYGqDDI=";
};
# circular dependencies if enabled by default
diff --git a/pkgs/development/python-modules/pypdf3/default.nix b/pkgs/development/python-modules/pypdf3/default.nix
index 4970c0d527bb..a4273497e3bc 100644
--- a/pkgs/development/python-modules/pypdf3/default.nix
+++ b/pkgs/development/python-modules/pypdf3/default.nix
@@ -8,12 +8,12 @@
buildPythonPackage rec {
pname = "pypdf3";
- version = "1.0.5";
+ version = "1.0.6";
src = fetchPypi {
pname = "PyPDF3";
inherit version;
- sha256 = "sha256-DGKpR4p3z8tw4gKi5Hmj09svysD3Hkn4NklhgROmEAU=";
+ sha256 = "sha256-yUbzJzQZ43JY415yJz9JkEqxVyPYenYcERXvmXmfjF8=";
};
LC_ALL = "en_US.UTF-8";
diff --git a/pkgs/development/python-modules/pyperf/default.nix b/pkgs/development/python-modules/pyperf/default.nix
index 40a77fc0c7bd..25cf9906cb44 100644
--- a/pkgs/development/python-modules/pyperf/default.nix
+++ b/pkgs/development/python-modules/pyperf/default.nix
@@ -15,11 +15,11 @@
buildPythonPackage rec {
pname = "pyperf";
- version = "2.3.0";
+ version = "2.3.1";
src = fetchPypi {
inherit pname version;
- sha256 = "8a85dd42e067131d5b26b71472336da7f7f4b87ff9c97350d89f5ff0de9adedc";
+ sha256 = "sha256-SsLiz3JKubUlInw7SmnxarXHFOpbrWHJdODF1XhyOKE=";
};
checkInputs = [ nose psutil ] ++
diff --git a/pkgs/development/python-modules/pyres/default.nix b/pkgs/development/python-modules/pyres/default.nix
index bb15a4d927ab..a5b618d56902 100644
--- a/pkgs/development/python-modules/pyres/default.nix
+++ b/pkgs/development/python-modules/pyres/default.nix
@@ -1,26 +1,10 @@
{ lib, stdenv, fetchPypi, buildPythonPackage, fetchFromGitHub, simplejson, redis, setproctitle, nose, pkgs }:
-let
-
- # the requirements of `pyres` support Redis 3.x (due to a missing upper-bound),
- # but it doesn't support Redis 3.x.
- redis' = redis.overridePythonAttrs (old: rec {
- pname = "redis";
- version = "2.10.6";
- src = fetchPypi {
- inherit pname version;
- sha256 = "03vcgklykny0g0wpvqmy8p6azi2s078317wgb2xjv5m2rs9sjb52";
- };
- });
-
-in
-
buildPythonPackage rec {
pname = "pyres";
version = "1.5";
- # ps is used in Worker.worker_pids method
- propagatedBuildInputs = [ simplejson setproctitle redis' pkgs.ps ];
+ propagatedBuildInputs = [ simplejson setproctitle redis pkgs.ps ];
checkInputs = [ nose pkgs.redis ];
# PyPI tarball doesn't contain tests so let's use GitHub
@@ -44,5 +28,6 @@ buildPythonPackage rec {
homepage = "https://github.com/binarydud/pyres";
license = licenses.mit;
maintainers = with maintainers; [ jluttine ];
+ broken = true; # not compatible with latest redis
};
}
diff --git a/pkgs/development/python-modules/pyrsistent/default.nix b/pkgs/development/python-modules/pyrsistent/default.nix
index 75cecc7d7091..5a1b66bfa26c 100644
--- a/pkgs/development/python-modules/pyrsistent/default.nix
+++ b/pkgs/development/python-modules/pyrsistent/default.nix
@@ -9,13 +9,13 @@
buildPythonPackage rec {
pname = "pyrsistent";
- version = "0.18.0";
+ version = "0.18.1";
disabled = isPy27;
src = fetchPypi {
inherit pname version;
- sha256 = "773c781216f8c2900b42a7b638d5b517bb134ae1acbebe4d1e8f1f41ea60eb4b";
+ sha256 = "sha256-1NYfi5k6clW6cU3zrKUnAPgSUon4T3BM+AkWUXxG65Y=";
};
propagatedBuildInputs = [ six ];
diff --git a/pkgs/development/python-modules/pyspark/default.nix b/pkgs/development/python-modules/pyspark/default.nix
index 2e6f41aa2332..c424e3195e7d 100644
--- a/pkgs/development/python-modules/pyspark/default.nix
+++ b/pkgs/development/python-modules/pyspark/default.nix
@@ -6,11 +6,11 @@
buildPythonPackage rec {
pname = "pyspark";
- version = "3.2.0";
+ version = "3.2.1";
src = fetchPypi {
inherit pname version;
- sha256 = "bfea06179edbfb4bc76a0f470bd3c38e12f00e1023e3ad0373558d07cff102ab";
+ sha256 = "sha256-C4E1kmLsbprHjDUzROfeAmAn0UDG3vlJ/w2Aq3D4mlQ=";
};
# pypandoc is broken with pandoc2, so we just lose docs.
diff --git a/pkgs/development/python-modules/pyspnego/default.nix b/pkgs/development/python-modules/pyspnego/default.nix
index 561ec037c0a2..563042091bf7 100644
--- a/pkgs/development/python-modules/pyspnego/default.nix
+++ b/pkgs/development/python-modules/pyspnego/default.nix
@@ -13,7 +13,7 @@
buildPythonPackage rec {
pname = "pyspnego";
- version = "0.3.1";
+ version = "0.5.0";
disabled = pythonOlder "3.7";
@@ -21,7 +21,7 @@ buildPythonPackage rec {
owner = "jborean93";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-f7CR7wMxHNNpxizV7MFCtWci3SSNvdx+W5i/rgOUSxY=";
+ sha256 = "sha256-CvPvyP7Vi2Ib+ikgUQt8JkVt5fxzapG590TgAehXqHE=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/pytesseract/default.nix b/pkgs/development/python-modules/pytesseract/default.nix
index 4aac6902ce3b..13cfdaea214e 100644
--- a/pkgs/development/python-modules/pytesseract/default.nix
+++ b/pkgs/development/python-modules/pytesseract/default.nix
@@ -1,8 +1,9 @@
-{ buildPythonPackage, fetchPypi, lib, pillow, tesseract, substituteAll, packaging }:
+{ buildPythonPackage, fetchPypi, lib, packaging, pillow, tesseract, substituteAll }:
buildPythonPackage rec {
pname = "pytesseract";
version = "0.3.9";
+ format = "pyproject";
src = fetchPypi {
inherit pname version;
@@ -16,8 +17,14 @@ buildPythonPackage rec {
})
];
- buildInputs = [ tesseract ];
- propagatedBuildInputs = [ pillow packaging ];
+ buildInputs = [
+ tesseract
+ ];
+
+ propagatedBuildInputs = [
+ packaging
+ pillow
+ ];
# the package doesn't have any tests.
doCheck = false;
diff --git a/pkgs/development/python-modules/pytest-asyncio/default.nix b/pkgs/development/python-modules/pytest-asyncio/default.nix
index b8d3dffa3b0b..da60feb724f8 100644
--- a/pkgs/development/python-modules/pytest-asyncio/default.nix
+++ b/pkgs/development/python-modules/pytest-asyncio/default.nix
@@ -11,7 +11,7 @@
buildPythonPackage rec {
pname = "pytest-asyncio";
- version = "0.18.0";
+ version = "0.18.1";
format = "setuptools";
disabled = pythonOlder "3.7";
@@ -20,7 +20,7 @@ buildPythonPackage rec {
owner = "pytest-dev";
repo = pname;
rev = "v${version}";
- hash = "sha256-PE66ogjfzj6cW3+UD5nZHSt6zg7b+j6Q4ACznE4j0j8=";
+ hash = "sha256-9KN45+Pdz40rJv1NUxuoy8xWtLGt7kz7YcqfjfZ9x4A=";
};
SETUPTOOLS_SCM_PRETEND_VERSION = version;
diff --git a/pkgs/development/python-modules/pytest-cid/default.nix b/pkgs/development/python-modules/pytest-cid/default.nix
index c1c918c4d60c..767d300f7dd9 100644
--- a/pkgs/development/python-modules/pytest-cid/default.nix
+++ b/pkgs/development/python-modules/pytest-cid/default.nix
@@ -20,6 +20,11 @@ buildPythonPackage rec {
sha256 = "sha256-H2RtMGYWukowTTfqZSx+hikxzkqw1v5bA4AfZfiVl8U=";
};
+ postPatch = ''
+ substituteInPlace pyproject.toml \
+ --replace "pytest >= 5.0, < 7.0" "pytest >= 5.0"
+ '';
+
propagatedBuildInputs = [
py-cid
];
diff --git a/pkgs/development/python-modules/pytest-httpx/default.nix b/pkgs/development/python-modules/pytest-httpx/default.nix
index 9536325ade51..569ac8606f6a 100644
--- a/pkgs/development/python-modules/pytest-httpx/default.nix
+++ b/pkgs/development/python-modules/pytest-httpx/default.nix
@@ -10,7 +10,7 @@
buildPythonPackage rec {
pname = "pytest-httpx";
- version = "0.17.3";
+ version = "0.20.0";
format = "setuptools";
disabled = pythonOlder "3.6";
@@ -19,7 +19,7 @@ buildPythonPackage rec {
owner = "Colin-b";
repo = "pytest_httpx";
rev = "v${version}";
- sha256 = "sha256-cJRzjNIN9Fc8vcjmndW+akjxDSp+wFahY2MEslgXIwM=";
+ sha256 = "sha256-9LDbVZgTmfyYAWylUy6Q4KH2gKpAa/o4IhqQV31BVgY=";
};
buildInputs = [
diff --git a/pkgs/development/python-modules/pytest-isort/default.nix b/pkgs/development/python-modules/pytest-isort/default.nix
index e628e6a158c5..c06959b96c41 100644
--- a/pkgs/development/python-modules/pytest-isort/default.nix
+++ b/pkgs/development/python-modules/pytest-isort/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "pytest-isort";
- version = "2.0.0";
+ version = "3.0.0";
src = fetchPypi {
inherit pname version;
- sha256 = "821a8c5c9c4f3a3c52cfa9c541fbe89ac9e28728125125af53724c4c3f129117";
+ sha256 = "sha256-T+Sybq0q93ZzDsI/WHDXQh81qs4ipBxOk4WG702Hh8s=";
};
propagatedBuildInputs = [ isort ];
diff --git a/pkgs/development/python-modules/pytest-mpl/default.nix b/pkgs/development/python-modules/pytest-mpl/default.nix
index 747411ad7455..b5a5775f56ed 100644
--- a/pkgs/development/python-modules/pytest-mpl/default.nix
+++ b/pkgs/development/python-modules/pytest-mpl/default.nix
@@ -10,11 +10,11 @@
buildPythonPackage rec {
pname = "pytest-mpl";
- version = "0.13";
+ version = "0.14.0";
src = fetchPypi {
inherit pname version;
- sha256 = "582db6e14315f9b08cbd2df39b136dc344bfe8a27c2f05b995460fb0969ec19e";
+ sha256 = "sha256-iE4HjS1TgK9WQzhOIzw1jpZZgl+y2X/9r48YXENMjYk=";
};
buildInputs = [
diff --git a/pkgs/development/python-modules/pytest-mypy/default.nix b/pkgs/development/python-modules/pytest-mypy/default.nix
index 8c52fa2e6988..bec0ee59d0c5 100644
--- a/pkgs/development/python-modules/pytest-mypy/default.nix
+++ b/pkgs/development/python-modules/pytest-mypy/default.nix
@@ -9,11 +9,11 @@
buildPythonPackage rec {
pname = "pytest-mypy";
- version = "0.8.1";
+ version = "0.9.1";
src = fetchPypi {
inherit pname version;
- sha256 = "1fa55723a4bf1d054fcba1c3bd694215a2a65cc95ab10164f5808afd893f3b11";
+ sha256 = "sha256-n/o79AXBLFxr6ekuIr67arLJG5wy9FsPDJOvRzJpq1w=";
};
nativeBuildInputs = [ setuptools-scm ];
diff --git a/pkgs/development/python-modules/pytest-pythonpath/default.nix b/pkgs/development/python-modules/pytest-pythonpath/default.nix
deleted file mode 100644
index 8c3fb48b430e..000000000000
--- a/pkgs/development/python-modules/pytest-pythonpath/default.nix
+++ /dev/null
@@ -1,26 +0,0 @@
-{ buildPythonPackage, fetchPypi, lib, pytest }:
-
-buildPythonPackage rec {
- pname = "pytest-pythonpath";
- version = "0.7.4";
-
- src = fetchPypi {
- inherit pname version;
- sha256 = "sha256-ZOGVsjqPjAxjH7Fogtmtb6QTftHylh3dFdUgZc1DXbY=";
- };
-
- buildInputs = [ pytest ];
- checkInputs = [ pytest ];
-
- checkPhase = ''
- pytest
- '';
-
- meta = with lib; {
- description =
- "Pytest plugin for adding to the PYTHONPATH from command line or configs";
- homepage = "https://github.com/bigsassy/pytest-pythonpath";
- maintainers = with maintainers; [ cript0nauta ];
- license = licenses.mit;
- };
-}
diff --git a/pkgs/development/python-modules/pytest-regressions/default.nix b/pkgs/development/python-modules/pytest-regressions/default.nix
index 6866df7b7125..99099d3ac924 100644
--- a/pkgs/development/python-modules/pytest-regressions/default.nix
+++ b/pkgs/development/python-modules/pytest-regressions/default.nix
@@ -15,14 +15,14 @@
buildPythonPackage rec {
pname = "pytest-regressions";
- version = "2.3.0";
+ version = "2.3.1";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-STWtZzbvhQ0NsSvl7jh0CjmYjmtRA/LTUQAAaze5Tg4=";
+ sha256 = "sha256-s+xM2zTo9idgYnXYuDTGXmDhowc+MmuzcnpCcnPQIh0=";
};
SETUPTOOLS_SCM_PRETEND_VERSION = version;
diff --git a/pkgs/development/python-modules/pytest-runner/default.nix b/pkgs/development/python-modules/pytest-runner/default.nix
index d99f72299dd7..baca23d77491 100644
--- a/pkgs/development/python-modules/pytest-runner/default.nix
+++ b/pkgs/development/python-modules/pytest-runner/default.nix
@@ -1,20 +1,29 @@
-{ lib, buildPythonPackage, fetchPypi, setuptools-scm, pytest }:
+{ lib
+, buildPythonPackage
+, fetchPypi
+, setuptools-scm
+, pytest
+}:
buildPythonPackage rec {
pname = "pytest-runner";
- version = "5.3.1";
+ version = "6.0.0";
+ format = "pyproject";
src = fetchPypi {
inherit pname version;
- sha256 = "0fce5b8dc68760f353979d99fdd6b3ad46330b6b1837e2077a89ebcf204aac91";
+ sha256 = "sha256-tNhTYu0ptMNIZ43nl99Djw8FCUl924xkcJbAKm2HtoU=";
};
- nativeBuildInputs = [ setuptools-scm pytest ];
-
postPatch = ''
rm pytest.ini
'';
+ nativeBuildInputs = [
+ setuptools-scm
+ pytest
+ ];
+
checkPhase = ''
py.test tests
'';
diff --git a/pkgs/development/python-modules/pytest-socket/default.nix b/pkgs/development/python-modules/pytest-socket/default.nix
index 1376d3e8412f..bcd4abb4d410 100644
--- a/pkgs/development/python-modules/pytest-socket/default.nix
+++ b/pkgs/development/python-modules/pytest-socket/default.nix
@@ -9,7 +9,7 @@
buildPythonPackage rec {
pname = "pytest-socket";
- version = "0.5.0";
+ version = "0.5.1";
format = "pyproject";
disabled = pythonOlder "3.7";
@@ -18,7 +18,7 @@ buildPythonPackage rec {
owner = "miketheman";
repo = pname;
rev = version;
- hash = "sha256-HdGkpIHFsoAG2+8UyL9jSb3Dm8bWkYzREdY3i15ls/Q=";
+ hash = "sha256-QKHnuq2pqWMVUhF9nnhJggEK6SSyp6zBEfQX9tGND2E=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/pytest-subtests/default.nix b/pkgs/development/python-modules/pytest-subtests/default.nix
index d5e379b524d5..b1df1ceaad67 100644
--- a/pkgs/development/python-modules/pytest-subtests/default.nix
+++ b/pkgs/development/python-modules/pytest-subtests/default.nix
@@ -8,14 +8,14 @@
buildPythonPackage rec {
pname = "pytest-subtests";
- version = "0.6.0";
+ version = "0.7.0";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-Pr0wao3PdRM/F0LyiMgvNkJuvPihMtTuiXgtIOhPwTo=";
+ sha256 = "sha256-lcRMd+P77emEi7iMqQs4SBX8uoCQ75qfVWWasWOxaBw=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/pytest-testmon/default.nix b/pkgs/development/python-modules/pytest-testmon/default.nix
index 1b291778b2ad..3a3970018652 100644
--- a/pkgs/development/python-modules/pytest-testmon/default.nix
+++ b/pkgs/development/python-modules/pytest-testmon/default.nix
@@ -8,12 +8,12 @@
buildPythonPackage rec {
pname = "pytest-testmon";
- version = "1.2.2";
+ version = "1.3.0";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "e69d5aeac4e371986f94e8ad06e56d70633870d026f2306fca44051f02fcb688";
+ sha256 = "sha256-1Qyroq6Dv11EaCGRAj19bKQBfRz26XSh5TJY7xA/vBE=";
};
propagatedBuildInputs = [ coverage ];
diff --git a/pkgs/development/python-modules/pytest-timeout/default.nix b/pkgs/development/python-modules/pytest-timeout/default.nix
index f99340e48b3b..e380068c59d3 100644
--- a/pkgs/development/python-modules/pytest-timeout/default.nix
+++ b/pkgs/development/python-modules/pytest-timeout/default.nix
@@ -9,12 +9,12 @@
buildPythonPackage rec {
pname = "pytest-timeout";
- version = "2.0.2";
+ version = "2.1.0";
format = "setuptools";
src = fetchPypi {
inherit pname version;
- sha256 = "e6f98b54dafde8d70e4088467ff621260b641eb64895c4195b6e5c8f45638112";
+ sha256 = "sha256-wHygdATGEvirviIpSyPDaOLlEEtSHBeQGVVh834aw9k=";
};
buildInputs = [
diff --git a/pkgs/development/python-modules/pytest/default.nix b/pkgs/development/python-modules/pytest/default.nix
index 0b1bb2b02030..109e91828588 100644
--- a/pkgs/development/python-modules/pytest/default.nix
+++ b/pkgs/development/python-modules/pytest/default.nix
@@ -1,5 +1,4 @@
{ lib, buildPythonPackage, pythonOlder, fetchPypi, isPy3k, isPyPy
-, pythonAtLeast, fetchpatch
, atomicwrites
, attrs
, hypothesis
@@ -13,29 +12,21 @@
, setuptools
, setuptools-scm
, six
-, toml
+, tomli
, wcwidth
, writeText
}:
buildPythonPackage rec {
pname = "pytest";
- version = "6.2.5";
+ version = "7.0.1";
disabled = !isPy3k;
src = fetchPypi {
inherit pname version;
- sha256 = "131b36680866a76e6781d13f101efb86cf674ebb9762eb70d3082b6f29889e89";
+ sha256 = "sha256-4wkFoMEx09lLiWJKHMWv7D4LovvbFRhn2ODr1JhQ8XE=";
};
- patches = lib.optionals (pythonAtLeast "3.10") [
- (fetchpatch {
- # Fix test_errors_in_xfail_skip_expressions for Python 3.10.1, remove after 6.2.5
- url = "https://github.com/pytest-dev/pytest/commit/913439f5e5691f391e2969b3c8f0a49e50dce43a.patch";
- sha256 = "0hsl3lww6bx5k99cp8gj0fy9rg02kcfbwiiwjx2y8vbhwd5ns41p";
- })
- ];
-
nativeBuildInputs = [ setuptools-scm ];
propagatedBuildInputs = [
@@ -48,7 +39,7 @@ buildPythonPackage rec {
py
setuptools
six
- toml
+ tomli
wcwidth
] ++ lib.optionals (pythonOlder "3.6") [ pathlib2 ];
@@ -95,7 +86,7 @@ buildPythonPackage rec {
# - files are not needed after tests are finished
pytestRemoveBytecodePhase () {
# suffix is defined at:
- # https://github.com/pytest-dev/pytest/blob/6.2.5/src/_pytest/assertion/rewrite.py#L51-L53
+ # https://github.com/pytest-dev/pytest/blob/7.0.1/src/_pytest/assertion/rewrite.py#L51-L53
find $out -name "*-pytest-*.py[co]" -delete
}
preDistPhases+=" pytestRemoveBytecodePhase"
diff --git a/pkgs/development/python-modules/python-daemon/default.nix b/pkgs/development/python-modules/python-daemon/default.nix
index 074e5699e3d5..cc12b14aa153 100644
--- a/pkgs/development/python-modules/python-daemon/default.nix
+++ b/pkgs/development/python-modules/python-daemon/default.nix
@@ -51,6 +51,11 @@ buildPythonPackage rec {
})
];
+ disabledTestPaths = [
+ # requires removed distutils.command
+ "test_version.py"
+ ];
+
disabledTests = [
"begin_with_TestCase"
"changelog_TestCase"
diff --git a/pkgs/development/python-modules/python-dbusmock/default.nix b/pkgs/development/python-modules/python-dbusmock/default.nix
index 60e6f2e74552..378c58f02364 100644
--- a/pkgs/development/python-modules/python-dbusmock/default.nix
+++ b/pkgs/development/python-modules/python-dbusmock/default.nix
@@ -5,13 +5,13 @@
buildPythonPackage rec {
pname = "python-dbusmock";
- version = "0.25.0";
+ version = "0.26.1";
src = fetchFromGitHub {
owner = "martinpitt";
repo = pname;
rev = version;
- sha256 = "0zg2aib0k6hc1vvlbdcmp003m85dvkv7pndzgkc4vv2y9qpi0jp9";
+ sha256 = "sha256-kavbWMTgKU/rBIo7RMs9NkwReYQyEdeFwMBSzEM9wa0=";
};
prePatch = ''
diff --git a/pkgs/development/python-modules/python-glanceclient/default.nix b/pkgs/development/python-modules/python-glanceclient/default.nix
index 754bac51ea68..3d290ae5eda5 100644
--- a/pkgs/development/python-modules/python-glanceclient/default.nix
+++ b/pkgs/development/python-modules/python-glanceclient/default.nix
@@ -19,11 +19,11 @@
buildPythonApplication rec {
pname = "python-glanceclient";
- version = "3.5.0";
+ version = "3.6.0";
src = fetchPypi {
inherit pname version;
- sha256 = "417b9d814b43e62df4351f26a0d5569b801e9f99f7758bd8c82ef994c3629356";
+ sha256 = "sha256-gi1IYtWJL2pltoKTRy5gsHTRwHlp0GHoBMbh1UP5g9o=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/python-heatclient/default.nix b/pkgs/development/python-modules/python-heatclient/default.nix
index 8ba5c7dd21fc..d78682a8c66c 100644
--- a/pkgs/development/python-modules/python-heatclient/default.nix
+++ b/pkgs/development/python-modules/python-heatclient/default.nix
@@ -22,11 +22,11 @@
buildPythonApplication rec {
pname = "python-heatclient";
- version = "2.5.0";
+ version = "2.5.1";
src = fetchPypi {
inherit pname version;
- sha256 = "b610748eb3f18f6bd762e0808accdf872308289a77c3b19ed2d8b9f306393a42";
+ sha256 = "sha256-3l7XyxKm18BAM1DhNsCmRwcZR224+8m/jQ1YHrwLHCs=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/python-ironicclient/default.nix b/pkgs/development/python-modules/python-ironicclient/default.nix
index c193cf7cd1ad..83449a9285d3 100644
--- a/pkgs/development/python-modules/python-ironicclient/default.nix
+++ b/pkgs/development/python-modules/python-ironicclient/default.nix
@@ -20,11 +20,11 @@
buildPythonApplication rec {
pname = "python-ironicclient";
- version = "4.10.0";
+ version = "4.11.0";
src = fetchPypi {
inherit pname version;
- sha256 = "8f3ad8ae1fc4df524ea05a458ad2567b58144e881807dbbb985e282902d732fd";
+ sha256 = "sha256-zGG/3Cq7mARyuGGvqa4KGWFmx/UN+W2KMuy+RNenzXM=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/python-manilaclient/default.nix b/pkgs/development/python-modules/python-manilaclient/default.nix
index a2da2e4f4a76..09dc46ba9552 100644
--- a/pkgs/development/python-modules/python-manilaclient/default.nix
+++ b/pkgs/development/python-modules/python-manilaclient/default.nix
@@ -22,11 +22,11 @@
buildPythonApplication rec {
pname = "python-manilaclient";
- version = "3.2.0";
+ version = "3.3.0";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-6iAed0mtEYHguYq4Rlh4YWT8E5hNqBYPcnG9/8RMspo=";
+ sha256 = "sha256-JFfkbJHmDQFbiWXw0Wp+0xSLyXowIHnsw7+5irZwhXo=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/python-slugify/default.nix b/pkgs/development/python-modules/python-slugify/default.nix
index 16c4dc0f2308..2f22a20afb35 100644
--- a/pkgs/development/python-modules/python-slugify/default.nix
+++ b/pkgs/development/python-modules/python-slugify/default.nix
@@ -9,14 +9,14 @@
buildPythonPackage rec {
pname = "python-slugify";
- version = "6.1.0";
+ version = "6.1.1";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- hash = "sha256-7/GQ5N+sl9L4wYkO5oJwns0jZQdCNhaH24LZXh5eJfU=";
+ hash = "sha256-AAAzl/TjFBTpIs5WezpNoozxQ2pT0zLJrutRx9jEaf0=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/python-snappy/default.nix b/pkgs/development/python-modules/python-snappy/default.nix
index fe4d6ea7bda7..397fcaa3dd0d 100644
--- a/pkgs/development/python-modules/python-snappy/default.nix
+++ b/pkgs/development/python-modules/python-snappy/default.nix
@@ -4,35 +4,33 @@
, isPyPy
, snappy
, cffi
-, nose
+, python
}:
buildPythonPackage rec {
pname = "python-snappy";
- version = "0.6.0";
+ version = "0.6.1";
+ format = "setuptools";
src = fetchPypi {
inherit pname version;
- sha256 = "06l9my361ig4x5ycyrmq33q83zcdib3y2zxfxv7k7dlpyp9ri2hn";
+ sha256 = "sha256-tqEHqwYgasxTWdTFYyvZsi1EhwKnmzFpsMYuD7gIuyo=";
};
buildInputs = [ snappy ];
propagatedBuildInputs = lib.optional isPyPy cffi;
- checkInputs = [ nose ];
-
checkPhase = ''
- rm -r snappy # prevent local snappy from being picked up
- nosetests test_snappy.py
- '' + lib.optionalString isPyPy ''
- nosetests test_snappy_cffi.py
+ runHook preCheck
+ ${python.interpreter} -m unittest discover
+ runHook postCheck
'';
meta = with lib; {
description = "Python library for the snappy compression library from Google";
homepage = "https://github.com/andrix/python-snappy";
license = licenses.bsd3;
- maintainers = [ maintainers.costrouc ];
+ maintainers = with maintainers; [ costrouc ];
};
}
diff --git a/pkgs/development/python-modules/python-swiftclient/default.nix b/pkgs/development/python-modules/python-swiftclient/default.nix
index cb3b5b850e36..8c1e38ed45e0 100644
--- a/pkgs/development/python-modules/python-swiftclient/default.nix
+++ b/pkgs/development/python-modules/python-swiftclient/default.nix
@@ -10,11 +10,11 @@
buildPythonApplication rec {
pname = "python-swiftclient";
- version = "3.13.0";
+ version = "3.13.1";
src = fetchPypi {
inherit pname version;
- sha256 = "b200dcfbc6842bd4cac29efd0ea9ef34d3b8625957472ba7aa3ae0242437e2cc";
+ sha256 = "sha256-LSbJC2OS9r76f7sW/Np75Eqibiropb7icF0dHIE4M/A=";
};
propagatedBuildInputs = [ pbr python-keystoneclient ];
diff --git a/pkgs/development/python-modules/python3-saml/default.nix b/pkgs/development/python-modules/python3-saml/default.nix
index a21ee97eca5d..8bc9cf3090f0 100644
--- a/pkgs/development/python-modules/python3-saml/default.nix
+++ b/pkgs/development/python-modules/python3-saml/default.nix
@@ -3,14 +3,14 @@ isodate, lxml, xmlsec, freezegun }:
buildPythonPackage rec {
pname = "python3-saml";
- version = "1.12.0";
+ version = "1.14.0";
disabled = !isPy3k;
src = fetchFromGitHub {
owner = "onelogin";
repo = "python3-saml";
rev = "v${version}";
- sha256 = "sha256-VPUsjuo4FIes8ti0tkR0kT3J3RdUt1wtl4QEahVsc2c=";
+ sha256 = "sha256-TAfVXh1fSKhNn/lsi7elq4wFyKCxCtCYUTrnH3ytBTw=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/pytomlpp/default.nix b/pkgs/development/python-modules/pytomlpp/default.nix
index 271d193ce019..73c1987fb3c9 100644
--- a/pkgs/development/python-modules/pytomlpp/default.nix
+++ b/pkgs/development/python-modules/pytomlpp/default.nix
@@ -38,6 +38,14 @@ buildPythonPackage rec {
# pelican requires > 2.7
doCheck = !pythonOlder "3.6";
+ disabledTests = [
+ # incompatible with pytest7
+ # https://github.com/bobfang1992/pytomlpp/issues/66
+ "test_loads_valid_toml_files"
+ "test_round_trip_for_valid_toml_files"
+ "test_decode_encode_binary"
+ ];
+
preCheck = ''
cd tests
'';
diff --git a/pkgs/development/python-modules/pytools/default.nix b/pkgs/development/python-modules/pytools/default.nix
index 7dcd86705a35..f4710872cbe8 100644
--- a/pkgs/development/python-modules/pytools/default.nix
+++ b/pkgs/development/python-modules/pytools/default.nix
@@ -3,34 +3,36 @@
, fetchPypi
, pythonOlder
, decorator
-, appdirs
-, six
, numpy
-, pytest
+, platformdirs
+, pytestCheckHook
}:
buildPythonPackage rec {
pname = "pytools";
- version = "2021.2.9";
+ version = "2022.1";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "db6cf83c9ba0a165d545029e2301621486d1e9ef295684072e5cd75316a13755";
+ sha256 = "sha256-GXqs9uH11gxxW5JDh5Kst3Aq7Vnrv7FH+oTtp4DlT+4=";
};
- checkInputs = [ pytest ];
-
propagatedBuildInputs = [
decorator
- appdirs
- six
numpy
+ platformdirs
];
- checkPhase = ''
- py.test -k 'not test_persistent_dict'
- '';
+ checkInputs = [
+ pytestCheckHook
+ ];
+
+ pythonImportsCheck = [
+ "pytools"
+ "pytools.batchjob"
+ "pytools.lex"
+ ];
meta = {
homepage = "https://github.com/inducer/pytools/";
diff --git a/pkgs/development/python-modules/pytorch-lightning/default.nix b/pkgs/development/python-modules/pytorch-lightning/default.nix
index de75aa0ae8fb..d3c9a9655159 100644
--- a/pkgs/development/python-modules/pytorch-lightning/default.nix
+++ b/pkgs/development/python-modules/pytorch-lightning/default.nix
@@ -6,12 +6,12 @@
, pytestCheckHook
, pytorch
, pyyaml
-, tensorflow-tensorboard
+, tensorboard
, tqdm }:
buildPythonPackage rec {
pname = "pytorch-lightning";
- version = "1.5.8";
+ version = "1.5.10";
disabled = isPy27;
@@ -19,14 +19,14 @@ buildPythonPackage rec {
owner = "PyTorchLightning";
repo = pname;
rev = version;
- sha256 = "161mz66l11z4350q93fmmq3x0jzbp5761lf4fx3yvz17qzp7ygkn";
+ sha256 = "sha256-GP6/VZuRv8dS5wKQW7RbtOSa2vV9Af2Jp+ioEW3bIgc=";
};
propagatedBuildInputs = [
future
pytorch
pyyaml
- tensorflow-tensorboard
+ tensorboard
tqdm
];
diff --git a/pkgs/development/python-modules/pytorch-metric-learning/default.nix b/pkgs/development/python-modules/pytorch-metric-learning/default.nix
index e9728b3d676c..64dfca2e94b0 100644
--- a/pkgs/development/python-modules/pytorch-metric-learning/default.nix
+++ b/pkgs/development/python-modules/pytorch-metric-learning/default.nix
@@ -12,7 +12,7 @@
buildPythonPackage rec {
pname = "pytorch-metric-learning";
- version = "1.1.0";
+ version = "1.2.0";
disabled = isPy27;
@@ -20,7 +20,7 @@ buildPythonPackage rec {
owner = "KevinMusgrave";
repo = pname;
rev = "v${version}";
- sha256 = "0qvlxgdml22fzrs47yzqpfzak8lfdrzayvapawfz93cq8903h7qp";
+ sha256 = "sha256-M/iH+pIuamOmvxLtKMzWXiuMCnMXzpVFRb/HfYfCKdc=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/pytorch-pfn-extras/default.nix b/pkgs/development/python-modules/pytorch-pfn-extras/default.nix
index 46bd35b9cfb8..3c239d970402 100644
--- a/pkgs/development/python-modules/pytorch-pfn-extras/default.nix
+++ b/pkgs/development/python-modules/pytorch-pfn-extras/default.nix
@@ -10,13 +10,13 @@
buildPythonPackage rec {
pname = "pytorch-pfn-extras";
- version = "0.5.6";
+ version = "0.5.7";
src = fetchFromGitHub {
owner = "pfnet";
repo = pname;
rev = "v${version}";
- sha256 = "1ch4vhz3zjanj5advqsj51yy7idrp8yvydvcg4ymwa3wsfjrx58g";
+ sha256 = "sha256-gB575ZKXZRAy5K5CkBtfG6KG1yQ9WDREIobsy43CEOc=";
};
propagatedBuildInputs = [ numpy pytorch typing-extensions ];
diff --git a/pkgs/development/python-modules/pytorch/breakpad-sigstksz.patch b/pkgs/development/python-modules/pytorch/breakpad-sigstksz.patch
new file mode 100644
index 000000000000..33a2304cb9b1
--- /dev/null
+++ b/pkgs/development/python-modules/pytorch/breakpad-sigstksz.patch
@@ -0,0 +1,13 @@
+diff --git a/third_party/breakpad/src/client/linux/handler/exception_handler.cc b/third_party/breakpad/src/client/linux/handler/exception_handler.cc
+index ca353c4099..499be0a986 100644
+--- a/third_party/breakpad/src/client/linux/handler/exception_handler.cc
++++ b/third_party/breakpad/src/client/linux/handler/exception_handler.cc
+@@ -138,7 +138,7 @@ void InstallAlternateStackLocked() {
+ // SIGSTKSZ may be too small to prevent the signal handlers from overrunning
+ // the alternative stack. Ensure that the size of the alternative stack is
+ // large enough.
+- static const unsigned kSigStackSize = std::max(16384, SIGSTKSZ);
++ const unsigned kSigStackSize = std::max(16384, SIGSTKSZ);
+
+ // Only set an alternative stack if there isn't already one, or if the current
+ // one is too small.
diff --git a/pkgs/development/python-modules/pytorch/default.nix b/pkgs/development/python-modules/pytorch/default.nix
index c370eaf6a942..24ba74a1013b 100644
--- a/pkgs/development/python-modules/pytorch/default.nix
+++ b/pkgs/development/python-modules/pytorch/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, lib, fetchFromGitHub, buildPythonPackage, python,
+{ stdenv, lib, fetchFromGitHub, fetchpatch, buildPythonPackage, python,
cudaSupport ? false, cudatoolkit, cudnn, nccl, magma,
mklDnnSupport ? true, useSystemNccl ? true,
MPISupport ? false, mpi,
@@ -12,7 +12,7 @@
numactl,
# Propagated build inputs
- dataclasses, numpy, pyyaml, cffi, click, typing-extensions,
+ numpy, pyyaml, cffi, click, typing-extensions,
# Unit tests
hypothesis, psutil,
@@ -25,7 +25,7 @@
ninja,
# dependencies for torch.utils.tensorboard
- pillow, six, future, tensorflow-tensorboard, protobuf,
+ pillow, six, future, tensorboard, protobuf,
isPy3k, pythonOlder }:
@@ -117,9 +117,10 @@ let
in buildPythonPackage rec {
pname = "pytorch";
# Don't forget to update pytorch-bin to the same version.
- version = "1.10.2";
+ version = "1.11.0";
+ format = "setuptools";
- disabled = !isPy3k;
+ disabled = pythonOlder "3.7.0";
outputs = [
"out" # output standard python package
@@ -132,10 +133,15 @@ in buildPythonPackage rec {
repo = "pytorch";
rev = "v${version}";
fetchSubmodules = true;
- sha256 = "sha256-QcvoJqpZJXPSc9HLCJHetrp/hMESuC5kYl90d7Id0ZU=";
+ sha256 = "sha256-CEu63tdRBAF8CTchO3Qu8gUNObQylX6U08yDTI4/c/0=";
};
- patches = lib.optionals stdenv.isDarwin [
+ patches = [
+ # Fix for a breakpad incompatibility with glibc>2.33
+ # https://github.com/pytorch/pytorch/issues/70297
+ # https://github.com/google/breakpad/commit/605c51ed96ad44b34c457bbca320e74e194c317e
+ ./breakpad-sigstksz.patch
+ ] ++ lib.optionals stdenv.isDarwin [
# pthreadpool added support for Grand Central Dispatch in April
# 2020. However, this relies on functionality (DISPATCH_APPLY_AUTO)
# that is available starting with macOS 10.13. However, our current
@@ -144,13 +150,6 @@ in buildPythonPackage rec {
./pthreadpool-disable-gcd.diff
];
- # The dataclasses module is included with Python >= 3.7. This should
- # be fixed with the next PyTorch release.
- postPatch = ''
- substituteInPlace setup.py \
- --replace "'dataclasses'" "'dataclasses; python_version < \"3.7\"'"
- '';
-
preConfigure = lib.optionalString cudaSupport ''
export TORCH_CUDA_ARCH_LIST="${lib.strings.concatStringsSep ";" final_cudaArchList}"
export CC=${cudatoolkit.cc}/bin/gcc CXX=${cudatoolkit.cc}/bin/g++
@@ -208,7 +207,7 @@ in buildPythonPackage rec {
# https://github.com/pytorch/pytorch/issues/22346
#
# Also of interest: pytorch ignores CXXFLAGS uses CFLAGS for both C and C++:
- # https://github.com/pytorch/pytorch/blob/v1.2.0/setup.py#L17
+ # https://github.com/pytorch/pytorch/blob/v1.11.0/setup.py#L17
NIX_CFLAGS_COMPILE = lib.optionals (blas.implementation == "mkl") [ "-Wno-error=array-bounds" ];
nativeBuildInputs = [
@@ -230,9 +229,8 @@ in buildPythonPackage rec {
pyyaml
typing-extensions
# the following are required for tensorboard support
- pillow six future tensorflow-tensorboard protobuf
- ] ++ lib.optionals MPISupport [ mpi ]
- ++ lib.optionals (pythonOlder "3.7") [ dataclasses ];
+ pillow six future tensorboard protobuf
+ ] ++ lib.optionals MPISupport [ mpi ];
checkInputs = [ hypothesis ninja psutil ];
diff --git a/pkgs/development/python-modules/pyudev/default.nix b/pkgs/development/python-modules/pyudev/default.nix
index 89cd50f085f6..24784afc842d 100644
--- a/pkgs/development/python-modules/pyudev/default.nix
+++ b/pkgs/development/python-modules/pyudev/default.nix
@@ -4,11 +4,11 @@
buildPythonPackage rec {
pname = "pyudev";
- version = "0.22.0";
+ version = "0.23.2";
src = fetchPypi {
inherit pname version;
- sha256 = "0xmj6l08iih2js9skjqpv4w7y0dhxyg91zmrs6v5aa65gbmipfv9";
+ sha256 = "sha256-Mq41hbMgpRvCg+CgQAD9iiVZnttEVB4vUDT2r+5dFcw=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/pyuv/default.nix b/pkgs/development/python-modules/pyuv/default.nix
index 2d276c6dccab..2f1870dd1c85 100644
--- a/pkgs/development/python-modules/pyuv/default.nix
+++ b/pkgs/development/python-modules/pyuv/default.nix
@@ -1,5 +1,6 @@
{ lib
, buildPythonPackage
+, pythonAtLeast
, fetchFromGitHub
, libuv
}:
@@ -7,6 +8,7 @@
buildPythonPackage rec {
pname = "pyuv";
version = "1.4.0";
+ disabled = pythonAtLeast "3.10"; # https://github.com/saghul/pyuv/issues/273
src = fetchFromGitHub {
owner = "saghul";
diff --git a/pkgs/development/python-modules/pyvcf/default.nix b/pkgs/development/python-modules/pyvcf/default.nix
index 7c513617754f..919477298b15 100644
--- a/pkgs/development/python-modules/pyvcf/default.nix
+++ b/pkgs/development/python-modules/pyvcf/default.nix
@@ -28,5 +28,6 @@ buildPythonPackage rec {
vcf will attempt to parse the content of each record based on the data
types specified in the meta-information lines
'';
+ broken = true; # uses the 2to3 feature, that got removed in setuptools 0.58
};
}
diff --git a/pkgs/development/python-modules/pyverilog/default.nix b/pkgs/development/python-modules/pyverilog/default.nix
index 8e41d26921fa..115014a25bbb 100644
--- a/pkgs/development/python-modules/pyverilog/default.nix
+++ b/pkgs/development/python-modules/pyverilog/default.nix
@@ -5,7 +5,6 @@
, jinja2
, ply
, verilog
-, pytest-pythonpath
, pytestCheckHook
}:
@@ -32,8 +31,12 @@ buildPythonPackage rec {
verilog
];
+ preCheck = ''
+ substituteInPlace pytest.ini \
+ --replace "python_paths" "pythonpath"
+ '';
+
checkInputs = [
- pytest-pythonpath
pytestCheckHook
];
diff --git a/pkgs/development/python-modules/pywbem/default.nix b/pkgs/development/python-modules/pywbem/default.nix
index db7bd82b652b..0547f3edd938 100644
--- a/pkgs/development/python-modules/pywbem/default.nix
+++ b/pkgs/development/python-modules/pywbem/default.nix
@@ -6,11 +6,11 @@
buildPythonPackage rec {
pname = "pywbem";
- version = "1.4.0";
+ version = "1.4.1";
src = fetchPypi {
inherit pname version;
- sha256 = "52f668f7ee1f03bdd80485692b648588b3e1909e2dc0754dceca497f5e9cf059";
+ sha256 = "sha256-rYu75Kt+eVciwPJ/JlbJL8Zzp+BqFM0VGlDwMGRU0X4=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/pywebview/default.nix b/pkgs/development/python-modules/pywebview/default.nix
index 67f11ed291f5..2a369ca5704f 100644
--- a/pkgs/development/python-modules/pywebview/default.nix
+++ b/pkgs/development/python-modules/pywebview/default.nix
@@ -12,14 +12,14 @@
buildPythonPackage rec {
pname = "pywebview";
- version = "3.5";
+ version = "3.6.1";
disabled = pythonOlder "3.5";
src = fetchFromGitHub {
owner = "r0x0r";
repo = "pywebview";
rev = version;
- sha256 = "sha256-+At/ToEylSPcLh/u2NHVTXQpMnw+2/afsevg5YAX/4c=";
+ sha256 = "sha256-9o9ghqvU9Hnmf2aj/BqX7WBgS9ilRSnicR+qd25OfjI=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/qiskit-machine-learning/default.nix b/pkgs/development/python-modules/qiskit-machine-learning/default.nix
index 511bc0b2a0be..ad00a16a880e 100644
--- a/pkgs/development/python-modules/qiskit-machine-learning/default.nix
+++ b/pkgs/development/python-modules/qiskit-machine-learning/default.nix
@@ -23,7 +23,7 @@
buildPythonPackage rec {
pname = "qiskit-machine-learning";
- version = "0.3.0";
+ version = "0.3.1";
disabled = pythonOlder "3.6";
@@ -31,7 +31,7 @@ buildPythonPackage rec {
owner = "qiskit";
repo = pname;
rev = version;
- sha256 = "0jycs18apnwrksarpwpmp7scndyx91vnv6fchil4jyx4kym8mnf9";
+ sha256 = "sha256-8tnd6+tqofKuK/sBdqmClBtywHbu3VvwLjO9k4YoChA=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/qutip/default.nix b/pkgs/development/python-modules/qutip/default.nix
index 8d19e360ca4d..c1f078ecc138 100644
--- a/pkgs/development/python-modules/qutip/default.nix
+++ b/pkgs/development/python-modules/qutip/default.nix
@@ -1,57 +1,69 @@
{ lib, stdenv, fetchFromGitHub, buildPythonPackage, python, packaging, numpy
-, cython, scipy, matplotlib, pytestCheckHook, pytest-rerunfailures }:
+, cython, scipy, matplotlib, pytestCheckHook, pytest-rerunfailures
+, doCheck ? false
+}:
-buildPythonPackage rec {
- pname = "qutip";
- version = "4.6.3";
+let
+ self = buildPythonPackage rec {
+ pname = "qutip";
+ version = "4.6.3";
- src = fetchFromGitHub {
- owner = pname;
- repo = pname;
- rev = "v${version}";
- sha256 = "sha256-11K7Tl7PE98nM2vGsa+OKIJYu0Wmv8dT700PDt9RRVk=";
+ src = fetchFromGitHub {
+ owner = pname;
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "sha256-11K7Tl7PE98nM2vGsa+OKIJYu0Wmv8dT700PDt9RRVk=";
+ };
+
+ # QuTiP says it needs specific (old) Numpy versions. We overwrite them here
+ # as the tests work perfectly fine with up-to-date packages.
+ postPatch = ''
+ substituteInPlace setup.cfg --replace "numpy>=1.16.6,<1.20" "numpy>=1.16.6"
+ '';
+
+ # Disabling OpenMP support on Darwin.
+ setupPyGlobalFlags = lib.optional (!stdenv.isDarwin) "--with-openmp";
+
+ propagatedBuildInputs = [
+ packaging
+ numpy
+ cython
+ scipy
+ matplotlib
+ ];
+
+ checkInputs = [
+ pytestCheckHook
+ pytest-rerunfailures
+ ];
+
+ # test suite is very cpu intensive
+ inherit doCheck;
+ # - QuTiP tries to access the home directory to create an rc file for us.
+ # This of course fails and therefore, we provide a writable temp dir as HOME.
+ # - We need to go to another directory to run the tests from there.
+ # This is due to the Cython-compiled modules not being in the correct location
+ # of the source tree.
+ # - For running tests, see:
+ # https://qutip.org/docs/latest/installation.html#verifying-the-installation
+ checkPhase = ''
+ export OMP_NUM_THREADS=$NIX_BUILD_CORES
+ export HOME=$(mktemp -d)
+ mkdir -p test && cd test
+ ${python.interpreter} -c "import qutip.testing; qutip.testing.run()"
+ '';
+
+ pythonImportsCheck = [ "qutip" ];
+
+ passthru.tests = {
+ all-tests = self.override { doCheck = true; };
+ };
+
+ meta = with lib; {
+ description = "Open-source software for simulating the dynamics of closed and open quantum systems";
+ homepage = "https://qutip.org/";
+ license = licenses.bsd3;
+ maintainers = [ maintainers.fabiangd ];
+ };
};
-
- # QuTiP says it needs specific (old) Numpy versions. We overwrite them here
- # as the tests work perfectly fine with up-to-date packages.
- postPatch = ''
- substituteInPlace setup.cfg --replace "numpy>=1.16.6,<1.20" "numpy>=1.16.6"
- '';
-
- # Disabling OpenMP support on Darwin.
- setupPyGlobalFlags = lib.optional (!stdenv.isDarwin) "--with-openmp";
-
- propagatedBuildInputs = [
- packaging
- numpy
- cython
- scipy
- matplotlib
- ];
-
- checkInputs = [
- pytestCheckHook
- pytest-rerunfailures
- ];
-
- # - QuTiP tries to access the home directory to create an rc file for us.
- # This of course fails and therefore, we provide a writable temp dir as HOME.
- # - We need to go to another directory to run the tests from there.
- # This is due to the Cython-compiled modules not being in the correct location
- # of the source tree.
- # - For running tests, see:
- # https://qutip.org/docs/latest/installation.html#verifying-the-installation
- checkPhase = ''
- export OMP_NUM_THREADS=$NIX_BUILD_CORES
- export HOME=$(mktemp -d)
- mkdir -p test && cd test
- ${python.interpreter} -c "import qutip.testing; qutip.testing.run()"
- '';
-
- meta = with lib; {
- description = "Open-source software for simulating the dynamics of closed and open quantum systems";
- homepage = "https://qutip.org/";
- license = licenses.bsd3;
- maintainers = [ maintainers.fabiangd ];
- };
-}
+in self
diff --git a/pkgs/development/python-modules/rasterio/default.nix b/pkgs/development/python-modules/rasterio/default.nix
index 27d6d498c347..8c73268e6b8d 100644
--- a/pkgs/development/python-modules/rasterio/default.nix
+++ b/pkgs/development/python-modules/rasterio/default.nix
@@ -1,31 +1,86 @@
-{ buildPythonPackage, lib, fetchFromGitHub, isPy3k
-, cython, setuptools
-, numpy, affine, attrs, cligj, click-plugins, snuggs, gdal
-, pytest, pythonOlder, packaging, hypothesis, boto3
-, certifi, shapely
+{ lib
+, buildPythonPackage
+, fetchFromGitHub
+, pythonOlder
+
+# build time
+, cython
+, gdal
+
+# runtime
+, affine
+, attrs
+, boto3
+, click
+, click-plugins
+, cligj
+, matplotlib
+, numpy
+, snuggs
+
+# tests
+, hypothesis
+, packaging
+, pytest-randomly
+, pytestCheckHook
+, shapely
}:
buildPythonPackage rec {
pname = "rasterio";
- version = "1.2.10";
+ version = "1.2.10"; # not x.y[ab]z, those are alpha/beta versions
+ format = "pyproject";
disabled = pythonOlder "3.6";
# Pypi doesn't ship the tests, so we fetch directly from GitHub
src = fetchFromGitHub {
- owner = "mapbox";
+ owner = "rasterio";
repo = "rasterio";
rev = version;
- sha256 = "sha256-xVGwQfQvxsqYihUYXENJAz9Qp9xBkhsGc/RheRTJxgo=";
+ hash = "sha256-xVGwQfQvxsqYihUYXENJAz9Qp9xBkhsGc/RheRTJxgo=";
};
- checkInputs = [ boto3 pytest packaging hypothesis shapely ];
- nativeBuildInputs = [ cython gdal ];
- propagatedBuildInputs = [ certifi gdal numpy attrs affine cligj click-plugins snuggs setuptools ];
+ nativeBuildInputs = [
+ cython
+ gdal
+ ];
+
+ propagatedBuildInputs = [
+ affine
+ attrs
+ boto3
+ click
+ click-plugins
+ cligj
+ matplotlib
+ numpy
+ snuggs
+ ];
+
+ preCheck = ''
+ rm -rf rasterio
+ '';
+
+ checkInputs = [
+ pytest-randomly
+ pytestCheckHook
+ packaging
+ hypothesis
+ shapely
+ ];
+
+ pytestFlagsArray = [
+ "-m 'not network'"
+ ];
+
+ pythonImportsCheck = [
+ "rasterio"
+ ];
meta = with lib; {
description = "Python package to read and write geospatial raster data";
- license = licenses.bsd3;
homepage = "https://rasterio.readthedocs.io/en/latest/";
+ license = licenses.bsd3;
maintainers = with maintainers; [ mredaelli ];
};
}
diff --git a/pkgs/development/python-modules/readme_renderer/default.nix b/pkgs/development/python-modules/readme_renderer/default.nix
index 122c4fdf6653..ab062615cc49 100644
--- a/pkgs/development/python-modules/readme_renderer/default.nix
+++ b/pkgs/development/python-modules/readme_renderer/default.nix
@@ -43,6 +43,12 @@ buildPythonPackage rec {
disabledTests = [
# https://github.com/pypa/readme_renderer/issues/221
"test_GFM_"
+ # Relies on old distutils behaviour removed by setuptools (TypeError: dist must be a Distribution instance)
+ "test_valid_rst"
+ "test_invalid_rst"
+ "test_malicious_rst"
+ "test_invalid_missing"
+ "test_invalid_empty"
];
pythonImportsCheck = [
diff --git a/pkgs/development/python-modules/redis/default.nix b/pkgs/development/python-modules/redis/default.nix
index 0731487575b1..7cd59a5528a7 100644
--- a/pkgs/development/python-modules/redis/default.nix
+++ b/pkgs/development/python-modules/redis/default.nix
@@ -14,14 +14,14 @@
buildPythonPackage rec {
pname = "redis";
- version = "4.1.0";
+ version = "4.1.4";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-IfCiO85weQkHbmuizgdsulm/9g0qsily4GR/32IP/kc=";
+ sha256 = "sha256-HZoM34n92T+EJhcz4k9Vp7vUE6myGf2vVuPnKMqaIwY=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/regex/default.nix b/pkgs/development/python-modules/regex/default.nix
index 86e591eaf14f..512a7162f0e3 100644
--- a/pkgs/development/python-modules/regex/default.nix
+++ b/pkgs/development/python-modules/regex/default.nix
@@ -7,14 +7,14 @@
buildPythonPackage rec {
pname = "regex";
- version = "2022.1.18";
+ version = "2022.3.2";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- hash = "sha256-l/MtwDqAVKTEpatddh7Uhh6CiywgD+vU5GhXBppIORY=";
+ hash = "sha256-eeWvH/JYvA/gvdb2m8SuM5NaiY48vvu8zyLoiif6BTs=";
};
checkPhase = ''
diff --git a/pkgs/development/python-modules/reportlab/default.nix b/pkgs/development/python-modules/reportlab/default.nix
index 82d84dc26a97..629f8d0ec750 100644
--- a/pkgs/development/python-modules/reportlab/default.nix
+++ b/pkgs/development/python-modules/reportlab/default.nix
@@ -11,11 +11,11 @@ let
ft = freetype.overrideAttrs (oldArgs: { dontDisableStatic = true; });
in buildPythonPackage rec {
pname = "reportlab";
- version = "3.6.5";
+ version = "3.6.8";
src = fetchPypi {
inherit pname version;
- sha256 = "d8fe27ad312671c9347cf5997f7c1017833fac17233f33296281ba9fa0de189a";
+ sha256 = "sha256-3HZX/LC8PkhcPIaaRN3bUtcRNWoBpFZmS3vvgnIiyYI=";
};
checkInputs = [ glibcLocales ];
diff --git a/pkgs/development/python-modules/requests-oauthlib/default.nix b/pkgs/development/python-modules/requests-oauthlib/default.nix
index aed6576c90df..d42de957791e 100644
--- a/pkgs/development/python-modules/requests-oauthlib/default.nix
+++ b/pkgs/development/python-modules/requests-oauthlib/default.nix
@@ -10,11 +10,11 @@
buildPythonPackage rec {
pname = "requests-oauthlib";
- version = "1.3.0";
+ version = "1.3.1";
src = fetchPypi {
inherit pname version;
- sha256 = "0smaxs5ixng4z0k6dsgmm6s972ka3p6a2ykdpnl23mqzlw0ic9ml";
+ sha256 = "sha256-db6sSkeIHuuU1epdatMe+IhWr/4jMrmq+1LGRSzPDXo=";
};
propagatedBuildInputs = [ oauthlib requests ];
diff --git a/pkgs/development/python-modules/requests/default.nix b/pkgs/development/python-modules/requests/default.nix
index f5b021801f41..86b2c2ffc390 100644
--- a/pkgs/development/python-modules/requests/default.nix
+++ b/pkgs/development/python-modules/requests/default.nix
@@ -13,7 +13,6 @@
, pytest-mock
, pytest-xdist
, pytestCheckHook
-, trustme
, urllib3
}:
@@ -54,7 +53,6 @@ buildPythonPackage rec {
pytest-mock
pytest-xdist
pytestCheckHook
- trustme
];
# AttributeError: 'KeywordMapping' object has no attribute 'get'
diff --git a/pkgs/development/python-modules/respx/default.nix b/pkgs/development/python-modules/respx/default.nix
index 51d88446c0b5..241f0f9e9da4 100644
--- a/pkgs/development/python-modules/respx/default.nix
+++ b/pkgs/development/python-modules/respx/default.nix
@@ -12,13 +12,13 @@
buildPythonPackage rec {
pname = "respx";
- version = "0.19.1";
+ version = "0.19.2";
src = fetchFromGitHub {
owner = "lundberg";
repo = pname;
rev = version;
- sha256 = "134h9526md242p7ql0cpknqvkpd3fhxk2vridkvswg91f532w180";
+ sha256 = "sha256-uNmSBJOQF4baq8AWzfwj0kinO19jr6Mp9Yblys/WmZs=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/restructuredtext_lint/default.nix b/pkgs/development/python-modules/restructuredtext_lint/default.nix
index 01c7a5e78c62..0033794ef437 100644
--- a/pkgs/development/python-modules/restructuredtext_lint/default.nix
+++ b/pkgs/development/python-modules/restructuredtext_lint/default.nix
@@ -8,11 +8,11 @@
buildPythonPackage rec {
pname = "restructuredtext_lint";
- version = "1.3.2";
+ version = "1.4.0";
src = fetchPypi {
inherit pname version;
- sha256 = "d3b10a1fe2ecac537e51ae6d151b223b78de9fafdd50e5eb6b08c243df173c80";
+ sha256 = "sha256-GyNcDJIjQatsUwOQiS656S+QubdQRgY+BHys+w8FDEU=";
};
checkInputs = [ nose testtools ];
diff --git a/pkgs/development/python-modules/rich/default.nix b/pkgs/development/python-modules/rich/default.nix
index f6194970adbd..3e7055d274ef 100644
--- a/pkgs/development/python-modules/rich/default.nix
+++ b/pkgs/development/python-modules/rich/default.nix
@@ -13,15 +13,15 @@
buildPythonPackage rec {
pname = "rich";
- version = "11.0.0";
+ version = "11.2.0";
format = "pyproject";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
- owner = "willmcgugan";
+ owner = "Textualize";
repo = pname;
rev = "v${version}";
- sha256 = "0vkwar22rv1j6a3kqj3c016j0vnnha0kwi79fkd90ib1n501m7rn";
+ sha256 = "19k8c8jnqj1v0ji8kkx3r2ny6wlpwy58ir7lyrh2qyjvzkw08i58";
};
nativeBuildInputs = [ poetry-core ];
@@ -43,7 +43,7 @@ buildPythonPackage rec {
meta = with lib; {
description = "Render rich text, tables, progress bars, syntax highlighting, markdown and more to the terminal";
- homepage = "https://github.com/willmcgugan/rich";
+ homepage = "https://github.com/Textualize/rich";
license = licenses.mit;
maintainers = with maintainers; [ ris ];
};
diff --git a/pkgs/development/python-modules/robotstatuschecker/default.nix b/pkgs/development/python-modules/robotstatuschecker/default.nix
index 63e87609ac25..74810c7761f5 100644
--- a/pkgs/development/python-modules/robotstatuschecker/default.nix
+++ b/pkgs/development/python-modules/robotstatuschecker/default.nix
@@ -8,7 +8,7 @@ buildPythonPackage rec {
src = fetchFromGitHub {
owner = "robotframework";
repo = "statuschecker";
- rev = version;
+ rev = "refs/tags/v${version}";
sha256 = "0hy1390j3l4kkfna9x9xax4y5mqaa3hdndv3fiyg9wr5f7sx3wnz";
};
diff --git a/pkgs/development/python-modules/s3fs/default.nix b/pkgs/development/python-modules/s3fs/default.nix
index d90d1052282d..8582c0ac7292 100644
--- a/pkgs/development/python-modules/s3fs/default.nix
+++ b/pkgs/development/python-modules/s3fs/default.nix
@@ -8,11 +8,11 @@
buildPythonPackage rec {
pname = "s3fs";
- version = "2022.1.0";
+ version = "2022.2.0";
src = fetchPypi {
inherit pname version;
- sha256 = "6bafc1f6b4e935ea59512c0f38d5cb9c299dbbfe738e40c3d1de8f67b4ee1fd4";
+ sha256 = "sha256-RhHQ9+QeW8nawwCQcOCtN9qHpC9t73W0gTwG9+QEpzg=";
};
buildInputs = [
diff --git a/pkgs/development/python-modules/sagemaker/default.nix b/pkgs/development/python-modules/sagemaker/default.nix
index 80c4bd92a385..d18d939be606 100644
--- a/pkgs/development/python-modules/sagemaker/default.nix
+++ b/pkgs/development/python-modules/sagemaker/default.nix
@@ -17,14 +17,14 @@
buildPythonPackage rec {
pname = "sagemaker";
- version = "2.75.1";
+ version = "2.77.1";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-MN/F7TWaKsQpKMR7Pxx0Vam1+O+PFEJ/H5jLJh3zpe4=";
+ sha256 = "sha256-RX3QcjGDWYaPC9lKz/nJSMTO3jeXxY7MW98fHYfcLq0=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/sanic-testing/default.nix b/pkgs/development/python-modules/sanic-testing/default.nix
index 4bc446c2e142..3fb60ebaa9e5 100644
--- a/pkgs/development/python-modules/sanic-testing/default.nix
+++ b/pkgs/development/python-modules/sanic-testing/default.nix
@@ -1,11 +1,10 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
-, pytestCheckHook
, httpx
-, pytest-asyncio
, sanic
, websockets
+, callPackage
}:
buildPythonPackage rec {
@@ -19,11 +18,14 @@ buildPythonPackage rec {
sha256 = "17fbb78gvic5s9nlcgwj817fq1f9j9d1d7z6n2ahhinmvyzl9gc8";
};
+ outputs = [
+ "out"
+ "testsout"
+ ];
+
postPatch = ''
- # https://github.com/sanic-org/sanic-testing/issues/19
substituteInPlace setup.py \
- --replace '"websockets==8.1",' '"websockets>=9.1",' \
- --replace "httpx==0.18.*" "httpx"
+ --replace "httpx>=0.18,<0.22" "httpx"
'';
propagatedBuildInputs = [
@@ -32,18 +34,18 @@ buildPythonPackage rec {
websockets
];
- checkInputs = [
- pytest-asyncio
- pytestCheckHook
- ];
+ postInstall = ''
+ mkdir $testsout
+ cp -R tests $testsout/tests
+ '';
- # `sanic` is explicitly set to null when building `sanic` itself
- # to prevent infinite recursion. In that case we skip running
- # the package at all.
- doCheck = sanic != null;
- dontUsePythonImportsCheck = sanic == null;
+ # check in passthru.tests.pytest to escape infinite recursion with sanic
+ doCheck = false;
+ doInstallCheck = false;
- pythonImportsCheck = [ "sanic_testing" ];
+ passthru.tests = {
+ pytest = callPackage ./tests.nix { };
+ };
meta = with lib; {
description = "Core testing clients for the Sanic web framework";
diff --git a/pkgs/development/python-modules/sanic-testing/tests.nix b/pkgs/development/python-modules/sanic-testing/tests.nix
new file mode 100644
index 000000000000..6a228a982310
--- /dev/null
+++ b/pkgs/development/python-modules/sanic-testing/tests.nix
@@ -0,0 +1,26 @@
+{ buildPythonPackage
+, sanic
+, sanic-testing
+, pytest-asyncio
+, pytestCheckHook
+}:
+
+buildPythonPackage {
+ pname = "sanic-testing-tests";
+ inherit (sanic-testing) version;
+
+ src = sanic-testing.testsout;
+
+ dontBuild = true;
+ dontInstall = true;
+
+ checkInputs = [
+ pytest-asyncio
+ pytestCheckHook
+ sanic
+ ];
+
+ pythonImportsCheck = [
+ "sanic_testing"
+ ];
+}
diff --git a/pkgs/development/python-modules/sanic/default.nix b/pkgs/development/python-modules/sanic/default.nix
index 63c24e9936fc..460927719ad5 100644
--- a/pkgs/development/python-modules/sanic/default.nix
+++ b/pkgs/development/python-modules/sanic/default.nix
@@ -40,9 +40,12 @@ buildPythonPackage rec {
postPatch = ''
# Loosen dependency requirements.
substituteInPlace setup.py \
- --replace '"pytest==6.2.5"' '"pytest"' \
- --replace '"gunicorn==20.0.4"' '"gunicorn"' \
- --replace '"pytest-sanic",' "" \
+ --replace "pytest==6.2.5" "pytest" \
+ --replace "gunicorn==20.0.4" "gunicorn" \
+ --replace "multidict>=5.0,<6.0" "multidict"
+
+ sed '/pytest-sanic/d' setup.py
+
# Patch a request headers test to allow brotli encoding
# (we build httpx with brotli support, upstream doesn't).
substituteInPlace tests/test_headers.py \
@@ -118,6 +121,8 @@ buildPythonPackage rec {
"test_num_workers"
"test_server_run"
"test_version"
+ # Sensitive comparison of raw HTTP header fails
+ "test_raw_headers"
];
disabledTestPaths = [
diff --git a/pkgs/development/python-modules/schema-salad/default.nix b/pkgs/development/python-modules/schema-salad/default.nix
index bea5b766b5c9..f7be7f0107c0 100644
--- a/pkgs/development/python-modules/schema-salad/default.nix
+++ b/pkgs/development/python-modules/schema-salad/default.nix
@@ -13,14 +13,14 @@
buildPythonPackage rec {
pname = "schema-salad";
- version = "8.2.20220103095339";
+ version = "8.2.20220204150214";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "051690a2f89b98e35100cd2cb489406a5169a60c2f27a716f3f287a42d45be2d";
+ sha256 = "sha256-PlPb/nE3eWueUTWSDpa7JxPe2ee+KFna5VTR3IsClwQ=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/scikit-build/default.nix b/pkgs/development/python-modules/scikit-build/default.nix
index bc72f76bf223..3fefba47cbda 100644
--- a/pkgs/development/python-modules/scikit-build/default.nix
+++ b/pkgs/development/python-modules/scikit-build/default.nix
@@ -25,11 +25,11 @@
buildPythonPackage rec {
pname = "scikit-build";
- version = "0.12.0";
+ version = "0.13.1";
src = fetchPypi {
inherit pname version;
- sha256 = "f851382c469bcd9a8c98b1878bcfdd13b68556279d2fd9a329be41956ae5a7fe";
+ sha256 = "sha256-XRd0ousVmI4IHFgsJUq0qXUgluajTyNUEct5vWFmDDc=";
};
propagatedBuildInputs = [
@@ -66,6 +66,8 @@ buildPythonPackage rec {
"test_install_command" # tries to alter out path
"test_test_command" # tries to alter out path
"test_setup" # tries to install using distutils
+ "test_pep518" # pip exits with code 1
+ "test_dual_pep518" # pip exits with code 1
]);
checkPhase = ''
diff --git a/pkgs/development/python-modules/scikit-image/default.nix b/pkgs/development/python-modules/scikit-image/default.nix
index b06c1cb5db48..45239f64fbef 100644
--- a/pkgs/development/python-modules/scikit-image/default.nix
+++ b/pkgs/development/python-modules/scikit-image/default.nix
@@ -16,89 +16,98 @@
, imageio
, tifffile
, pytestCheckHook
+, doCheck ? false
}:
let
installedPackageRoot = "${builtins.placeholder "out"}/${python.sitePackages}";
-in buildPythonPackage rec {
- pname = "scikit-image";
- version = "0.18.3";
+ self = buildPythonPackage rec {
+ pname = "scikit-image";
+ version = "0.18.3";
- src = fetchFromGitHub {
- owner = pname;
- repo = pname;
- rev = "v${version}";
- sha256 = "0a2h3bw5rkk23k4r04qc9maccg00nddssd7lfsps8nhp5agk1vyh";
+ src = fetchFromGitHub {
+ owner = pname;
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0a2h3bw5rkk23k4r04qc9maccg00nddssd7lfsps8nhp5agk1vyh";
+ };
+
+ patches = [ ./add-testing-data.patch ];
+
+ nativeBuildInputs = [ cython ];
+
+ propagatedBuildInputs = [
+ cloudpickle
+ dask
+ imageio
+ matplotlib
+ networkx
+ numpy
+ pillow
+ pywavelets
+ scipy
+ six
+ tifffile
+ ];
+
+ # test suite is very cpu intensive, move to passthru.tests
+ inherit doCheck;
+ checkInputs = [ pytestCheckHook ];
+
+ # (1) The package has cythonized modules, whose .so libs will appear only in the wheel, i.e. in nix store;
+ # (2) To stop Python from importing the wrong directory, i.e. the one in the build dir, not the one in nix store, `skimage` dir should be removed or renamed;
+ # (3) Therefore, tests should be run on the installed package in nix store.
+
+ # See e.g. https://discourse.nixos.org/t/cant-import-cythonized-modules-at-checkphase/14207 on why the following is needed.
+ preCheck = ''
+ rm -r skimage
+ '';
+
+ disabledTestPaths = [
+ # Requires network access (actually some data is loaded via `skimage._shared.testing.fetch` in the global scope, which calls `pytest.skip` when a network is unaccessible, leading to a pytest collection error).
+ "${installedPackageRoot}/skimage/filters/rank/tests/test_rank.py"
+ ];
+ pytestFlagsArray = [ "${installedPackageRoot}" "--pyargs" "skimage" ] ++ builtins.map (testid: "--deselect=" + testid) ([
+ # These tests require network access
+ "skimage/data/test_data.py::test_skin"
+ "skimage/data/tests/test_data.py::test_skin"
+ "skimage/io/tests/test_io.py::test_imread_http_url"
+ "skimage/restoration/tests/test_rolling_ball.py::test_ndim"
+ ] ++ lib.optionals stdenv.isDarwin [
+ # Matplotlib tests are broken inside darwin sandbox
+ "skimage/feature/tests/test_util.py::test_plot_matches"
+ "skimage/filters/tests/test_thresholding.py::TestSimpleImage::test_try_all_threshold"
+ "skimage/io/tests/test_mpl_imshow.py::"
+ ]);
+
+ # Check cythonized modules
+ pythonImportsCheck = [
+ "skimage"
+ "skimage._shared"
+ "skimage.draw"
+ "skimage.feature"
+ "skimage.restoration"
+ "skimage.filters"
+ "skimage.future.graph"
+ "skimage.graph"
+ "skimage.io"
+ "skimage.measure"
+ "skimage.morphology"
+ "skimage.transform"
+ "skimage.util"
+ "skimage.segmentation"
+ ];
+
+ passthru.tests = {
+ all-tests = self.override { doCheck = true; };
+ };
+
+ meta = {
+ description = "Image processing routines for SciPy";
+ homepage = "https://scikit-image.org";
+ license = lib.licenses.bsd3;
+ maintainers = with lib.maintainers; [ yl3dy ];
+ };
};
-
- patches = [ ./add-testing-data.patch ];
-
- nativeBuildInputs = [ cython ];
-
- propagatedBuildInputs = [
- cloudpickle
- dask
- imageio
- matplotlib
- networkx
- numpy
- pillow
- pywavelets
- scipy
- six
- tifffile
- ];
-
- checkInputs = [ pytestCheckHook ];
-
- # (1) The package has cythonized modules, whose .so libs will appear only in the wheel, i.e. in nix store;
- # (2) To stop Python from importing the wrong directory, i.e. the one in the build dir, not the one in nix store, `skimage` dir should be removed or renamed;
- # (3) Therefore, tests should be run on the installed package in nix store.
-
- # See e.g. https://discourse.nixos.org/t/cant-import-cythonized-modules-at-checkphase/14207 on why the following is needed.
- preCheck = ''
- rm -r skimage
- '';
-
- disabledTestPaths = [
- # Requires network access (actually some data is loaded via `skimage._shared.testing.fetch` in the global scope, which calls `pytest.skip` when a network is unaccessible, leading to a pytest collection error).
- "${installedPackageRoot}/skimage/filters/rank/tests/test_rank.py"
- ];
- pytestFlagsArray = [ "${installedPackageRoot}" "--pyargs" "skimage" ] ++ builtins.map (testid: "--deselect=" + testid) ([
- # These tests require network access
- "skimage/data/test_data.py::test_skin"
- "skimage/data/tests/test_data.py::test_skin"
- "skimage/io/tests/test_io.py::test_imread_http_url"
- "skimage/restoration/tests/test_rolling_ball.py::test_ndim"
- ] ++ lib.optionals stdenv.isDarwin [
- # Matplotlib tests are broken inside darwin sandbox
- "skimage/feature/tests/test_util.py::test_plot_matches"
- "skimage/filters/tests/test_thresholding.py::TestSimpleImage::test_try_all_threshold"
- "skimage/io/tests/test_mpl_imshow.py::"
- ]);
-
- # Check cythonized modules
- pythonImportsCheck = [
- "skimage"
- "skimage._shared"
- "skimage.draw"
- "skimage.feature"
- "skimage.restoration"
- "skimage.filters"
- "skimage.future.graph"
- "skimage.graph"
- "skimage.io"
- "skimage.measure"
- "skimage.morphology"
- "skimage.transform"
- "skimage.util"
- "skimage.segmentation"
- ];
-
- meta = {
- description = "Image processing routines for SciPy";
- homepage = "https://scikit-image.org";
- license = lib.licenses.bsd3;
- maintainers = with lib.maintainers; [ yl3dy ];
- };
-}
+in
+ self
diff --git a/pkgs/development/python-modules/scipy/default.nix b/pkgs/development/python-modules/scipy/default.nix
index 9c3b28e0a9ac..85708822cc2b 100644
--- a/pkgs/development/python-modules/scipy/default.nix
+++ b/pkgs/development/python-modules/scipy/default.nix
@@ -15,11 +15,11 @@
buildPythonPackage rec {
pname = "scipy";
- version = "1.7.3";
+ version = "1.8.0";
src = fetchPypi {
inherit pname version;
- sha256 = "ab5875facfdef77e0a47d5fd39ea178b58e60e454a4c85aa1e52fcb80db7babf";
+ sha256 = "sha256-MdTy1rckvJqY5Se1hJuKflib8epjDDOqVj7akSyf8L0=";
};
nativeBuildInputs = [ cython gfortran pythran ];
diff --git a/pkgs/development/python-modules/scmrepo/default.nix b/pkgs/development/python-modules/scmrepo/default.nix
index b68d15f3cac1..1d07c371ca2a 100644
--- a/pkgs/development/python-modules/scmrepo/default.nix
+++ b/pkgs/development/python-modules/scmrepo/default.nix
@@ -37,6 +37,11 @@ buildPythonPackage rec {
pygtrie
];
+ postPatch = ''
+ substituteInPlace setup.cfg \
+ --replace "asyncssh>=2.7.1,<2.9" "asyncssh>=2.7.1"
+ '';
+
# Requires a running Docker instance
doCheck = false;
diff --git a/pkgs/development/python-modules/sentry-sdk/default.nix b/pkgs/development/python-modules/sentry-sdk/default.nix
index 51e6c76de5db..3272c4b612f6 100644
--- a/pkgs/development/python-modules/sentry-sdk/default.nix
+++ b/pkgs/development/python-modules/sentry-sdk/default.nix
@@ -126,6 +126,8 @@ buildPythonPackage rec {
"tests/integrations/chalice/"
# broken since rq-1.10.1: https://github.com/getsentry/sentry-python/issues/1274
"tests/integrations/rq/"
+ # broken since pytest 7.0.1; AssertionError: previous item was not torn down properly
+ "tests/utils/test_contextvars.py"
];
pythonImportsCheck = [
diff --git a/pkgs/development/python-modules/setuptools/default.nix b/pkgs/development/python-modules/setuptools/default.nix
index e748334b5ad1..6b18422cc18a 100644
--- a/pkgs/development/python-modules/setuptools/default.nix
+++ b/pkgs/development/python-modules/setuptools/default.nix
@@ -10,7 +10,7 @@
let
pname = "setuptools";
- version = "57.2.0";
+ version = "60.8.2";
# Create an sdist of setuptools
sdist = stdenv.mkDerivation rec {
@@ -20,12 +20,13 @@ let
owner = "pypa";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-zFmndVoATNxfvDsacY+gj5bzIbbd/8ldbsJj4qOawTA=";
+ sha256 = "1mqpmbn58rx3g24dm6wnllx0xs97ampn2yga3qypqgwnh1nk477i";
name = "${pname}-${version}-source";
};
patches = [
./tag-date.patch
+ ./setuptools-distutils-C++.patch
];
buildPhase = ''
diff --git a/pkgs/development/python-modules/setuptools/setuptools-distutils-C++.patch b/pkgs/development/python-modules/setuptools/setuptools-distutils-C++.patch
new file mode 100644
index 000000000000..a14e514fda7e
--- /dev/null
+++ b/pkgs/development/python-modules/setuptools/setuptools-distutils-C++.patch
@@ -0,0 +1,216 @@
+Based on pkgs/development/interpreters/python/cpython/3.7/python-3.x-distutils-C++.patch,
+adapted to apply to setuptools 60.x's bundled distutils.
+
+diff --git a/setuptools/_distutils/cygwinccompiler.py b/setuptools/_distutils/cygwinccompiler.py
+index c5c86d8f..b879e447 100644
+--- a/setuptools/_distutils/cygwinccompiler.py
++++ b/setuptools/_distutils/cygwinccompiler.py
+@@ -124,14 +124,19 @@ class CygwinCCompiler(UnixCCompiler):
+ self.cxx = os.environ.get('CXX', 'g++')
+
+ self.linker_dll = self.cc
++ self.linker_dll_cxx = self.cxx
+ shared_option = "-shared"
+
+ self.set_executables(compiler='%s -mcygwin -O -Wall' % self.cc,
+ compiler_so='%s -mcygwin -mdll -O -Wall' % self.cc,
+ compiler_cxx='%s -mcygwin -O -Wall' % self.cxx,
++ compiler_so_cxx='%s -mcygwin -mdll -O -Wall' % self.cxx,
+ linker_exe='%s -mcygwin' % self.cc,
+ linker_so=('%s -mcygwin %s' %
+- (self.linker_dll, shared_option)))
++ (self.linker_dll, shared_option)),
++ linker_exe_cxx='%s -mcygwin' % self.cxx,
++ linker_so_cxx=('%s -mcygwin %s' %
++ (self.linker_dll_cxx, shared_option)))
+
+ # Include the appropriate MSVC runtime library if Python was built
+ # with MSVC 7.0 or later.
+@@ -162,8 +167,12 @@ class CygwinCCompiler(UnixCCompiler):
+ raise CompileError(msg)
+ else: # for other files use the C-compiler
+ try:
+- self.spawn(self.compiler_so + cc_args + [src, '-o', obj] +
+- extra_postargs)
++ if self.detect_language(src) == 'c++':
++ self.spawn(self.compiler_so_cxx + cc_args + [src, '-o', obj] +
++ extra_postargs)
++ else:
++ self.spawn(self.compiler_so + cc_args + [src, '-o', obj] +
++ extra_postargs)
+ except DistutilsExecError as msg:
+ raise CompileError(msg)
+
+@@ -279,9 +288,13 @@ class Mingw32CCompiler(CygwinCCompiler):
+ self.set_executables(compiler='%s -O -Wall' % self.cc,
+ compiler_so='%s -mdll -O -Wall' % self.cc,
+ compiler_cxx='%s -O -Wall' % self.cxx,
++ compiler_so_cxx='%s -mdll -O -Wall' % self.cxx,
+ linker_exe='%s' % self.cc,
+ linker_so='%s %s'
+- % (self.linker_dll, shared_option))
++ % (self.linker_dll, shared_option),
++ linker_exe_cxx='%s' % self.cxx,
++ linker_so_cxx='%s %s'
++ % (self.linker_dll_cxx, shared_option))
+
+ # Maybe we should also append -mthreads, but then the finished
+ # dlls need another dll (mingwm10.dll see Mingw32 docs)
+diff --git a/setuptools/_distutils/sysconfig.py b/setuptools/_distutils/sysconfig.py
+index 4a77a431..1ad85181 100644
+--- a/setuptools/_distutils/sysconfig.py
++++ b/setuptools/_distutils/sysconfig.py
+@@ -216,9 +216,11 @@ def customize_compiler(compiler):
+ _osx_support.customize_compiler(_config_vars)
+ _config_vars['CUSTOMIZED_OSX_COMPILER'] = 'True'
+
+- (cc, cxx, cflags, ccshared, ldshared, shlib_suffix, ar, ar_flags) = \
+- get_config_vars('CC', 'CXX', 'CFLAGS',
+- 'CCSHARED', 'LDSHARED', 'SHLIB_SUFFIX', 'AR', 'ARFLAGS')
++ (cc, cxx, cflags, ccshared, ldshared, ldcxxshared, shlib_suffix, ar, ar_flags) = \
++ get_config_vars('CC', 'CXX', 'CFLAGS', 'CCSHARED', 'LDSHARED', 'LDCXXSHARED',
++ 'SHLIB_SUFFIX', 'AR', 'ARFLAGS')
++
++ cxxflags = cflags
+
+ if 'CC' in os.environ:
+ newcc = os.environ['CC']
+@@ -232,19 +234,27 @@ def customize_compiler(compiler):
+ cxx = os.environ['CXX']
+ if 'LDSHARED' in os.environ:
+ ldshared = os.environ['LDSHARED']
++ if 'LDCXXSHARED' in os.environ:
++ ldcxxshared = os.environ['LDCXXSHARED']
+ if 'CPP' in os.environ:
+ cpp = os.environ['CPP']
+ else:
+ cpp = cc + " -E" # not always
+ if 'LDFLAGS' in os.environ:
+ ldshared = ldshared + ' ' + os.environ['LDFLAGS']
++ ldcxxshared = ldcxxshared + ' ' + os.environ['LDFLAGS']
+ if 'CFLAGS' in os.environ:
+- cflags = cflags + ' ' + os.environ['CFLAGS']
++ cflags = os.environ['CFLAGS']
+ ldshared = ldshared + ' ' + os.environ['CFLAGS']
++ if 'CXXFLAGS' in os.environ:
++ cxxflags = os.environ['CXXFLAGS']
++ ldcxxshared = ldcxxshared + ' ' + os.environ['CXXFLAGS']
+ if 'CPPFLAGS' in os.environ:
+ cpp = cpp + ' ' + os.environ['CPPFLAGS']
+ cflags = cflags + ' ' + os.environ['CPPFLAGS']
++ cxxflags = cxxflags + ' ' + os.environ['CPPFLAGS']
+ ldshared = ldshared + ' ' + os.environ['CPPFLAGS']
++ ldcxxshared = ldcxxshared + ' ' + os.environ['CPPFLAGS']
+ if 'AR' in os.environ:
+ ar = os.environ['AR']
+ if 'ARFLAGS' in os.environ:
+@@ -253,13 +263,17 @@ def customize_compiler(compiler):
+ archiver = ar + ' ' + ar_flags
+
+ cc_cmd = cc + ' ' + cflags
++ cxx_cmd = cxx + ' ' + cxxflags
+ compiler.set_executables(
+ preprocessor=cpp,
+ compiler=cc_cmd,
+ compiler_so=cc_cmd + ' ' + ccshared,
+- compiler_cxx=cxx,
++ compiler_cxx=cxx_cmd,
++ compiler_so_cxx=cxx_cmd + ' ' + ccshared,
+ linker_so=ldshared,
+ linker_exe=cc,
++ linker_so_cxx=ldcxxshared,
++ linker_exe_cxx=cxx,
+ archiver=archiver)
+
+ if 'RANLIB' in os.environ and compiler.executables.get('ranlib', None):
+diff --git a/setuptools/_distutils/unixccompiler.py b/setuptools/_distutils/unixccompiler.py
+index a07e5988..576ef490 100644
+--- a/setuptools/_distutils/unixccompiler.py
++++ b/setuptools/_distutils/unixccompiler.py
+@@ -52,14 +52,17 @@ class UnixCCompiler(CCompiler):
+ # are pretty generic; they will probably have to be set by an outsider
+ # (eg. using information discovered by the sysconfig about building
+ # Python extensions).
+- executables = {'preprocessor' : None,
+- 'compiler' : ["cc"],
+- 'compiler_so' : ["cc"],
+- 'compiler_cxx' : ["cc"],
+- 'linker_so' : ["cc", "-shared"],
+- 'linker_exe' : ["cc"],
+- 'archiver' : ["ar", "-cr"],
+- 'ranlib' : None,
++ executables = {'preprocessor' : None,
++ 'compiler' : ["cc"],
++ 'compiler_so' : ["cc"],
++ 'compiler_cxx' : ["c++"],
++ 'compiler_so_cxx' : ["c++"],
++ 'linker_so' : ["cc", "-shared"],
++ 'linker_exe' : ["cc"],
++ 'linker_so_cxx' : ["c++", "-shared"],
++ 'linker_exe_cxx' : ["c++"],
++ 'archiver' : ["ar", "-cr"],
++ 'ranlib' : None,
+ }
+
+ if sys.platform[:6] == "darwin":
+@@ -110,12 +113,19 @@ class UnixCCompiler(CCompiler):
+
+ def _compile(self, obj, src, ext, cc_args, extra_postargs, pp_opts):
+ compiler_so = self.compiler_so
++ compiler_so_cxx = self.compiler_so_cxx
+ if sys.platform == 'darwin':
+ compiler_so = _osx_support.compiler_fixup(compiler_so,
+ cc_args + extra_postargs)
++ compiler_so_cxx = _osx_support.compiler_fixup(compiler_so_cxx,
++ cc_args + extra_postargs)
+ try:
+- self.spawn(compiler_so + cc_args + [src, '-o', obj] +
+- extra_postargs)
++ if self.detect_language(src) == 'c++':
++ self.spawn(compiler_so_cxx + cc_args + [src, '-o', obj] +
++ extra_postargs)
++ else:
++ self.spawn(compiler_so + cc_args + [src, '-o', obj] +
++ extra_postargs)
+ except DistutilsExecError as msg:
+ raise CompileError(msg)
+
+@@ -173,30 +183,16 @@ class UnixCCompiler(CCompiler):
+ ld_args.extend(extra_postargs)
+ self.mkpath(os.path.dirname(output_filename))
+ try:
+- if target_desc == CCompiler.EXECUTABLE:
+- linker = self.linker_exe[:]
++ if target_lang == "c++":
++ if target_desc == CCompiler.EXECUTABLE:
++ linker = self.linker_exe_cxx[:]
++ else:
++ linker = self.linker_so_cxx[:]
+ else:
+- linker = self.linker_so[:]
+- if target_lang == "c++" and self.compiler_cxx:
+- # skip over environment variable settings if /usr/bin/env
+- # is used to set up the linker's environment.
+- # This is needed on OSX. Note: this assumes that the
+- # normal and C++ compiler have the same environment
+- # settings.
+- i = 0
+- if os.path.basename(linker[0]) == "env":
+- i = 1
+- while '=' in linker[i]:
+- i += 1
+-
+- if os.path.basename(linker[i]) == 'ld_so_aix':
+- # AIX platforms prefix the compiler with the ld_so_aix
+- # script, so we need to adjust our linker index
+- offset = 1
++ if target_desc == CCompiler.EXECUTABLE:
++ linker = self.linker_exe[:]
+ else:
+- offset = 0
+-
+- linker[i+offset] = self.compiler_cxx[i]
++ linker = self.linker_so[:]
+
+ if sys.platform == 'darwin':
+ linker = _osx_support.compiler_fixup(linker, ld_args)
diff --git a/pkgs/development/python-modules/simple-salesforce/default.nix b/pkgs/development/python-modules/simple-salesforce/default.nix
index d2b36af12a3b..a9319779060e 100644
--- a/pkgs/development/python-modules/simple-salesforce/default.nix
+++ b/pkgs/development/python-modules/simple-salesforce/default.nix
@@ -10,13 +10,13 @@
buildPythonPackage rec {
pname = "simple-salesforce";
- version = "1.11.4";
+ version = "1.11.6";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "v${version}";
- sha256 = "17d6g7zfhlgd2n4mimjarl2x4hl7ww2lb4izidlns1hzqm8igg4y";
+ sha256 = "sha256-/uaFEQnilcelHKjbmrnyLm5Mzj2V8P4oEH+cgJn+KvI=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/sip/default.nix b/pkgs/development/python-modules/sip/default.nix
index 6904714a60c7..d6ee1e76f548 100644
--- a/pkgs/development/python-modules/sip/default.nix
+++ b/pkgs/development/python-modules/sip/default.nix
@@ -2,12 +2,12 @@
buildPythonPackage rec {
pname = "sip";
- version = "6.5.0";
+ version = "6.5.1";
src = fetchPypi {
pname = "sip";
inherit version;
- sha256 = "a1cf8431a8eb9392b3ff6dc61d832d0447bfdcae5b3e4256a5fa74dbc25b0734";
+ sha256 = "sha256-IE8CQNuJmadJ1jiph7NRhhhD5pI5uBHsPRiBQSw3BqY=";
};
patches = [
diff --git a/pkgs/development/python-modules/smbprotocol/default.nix b/pkgs/development/python-modules/smbprotocol/default.nix
index b5d826c8f8ef..562346b1a476 100644
--- a/pkgs/development/python-modules/smbprotocol/default.nix
+++ b/pkgs/development/python-modules/smbprotocol/default.nix
@@ -12,7 +12,7 @@
buildPythonPackage rec {
pname = "smbprotocol";
- version = "1.8.3";
+ version = "1.9.0";
format = "setuptools";
disabled = pythonOlder "3.6";
@@ -21,7 +21,7 @@ buildPythonPackage rec {
owner = "jborean93";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-m9C+uzwrEOcbkvBQ3Z+to2BsX2i7cLnUiV/+L7hMUdE=";
+ sha256 = "sha256-u3brP3WsnoqRy3R0OQQkIbq+avS7nemx9GKpvTq+vxg=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/socksio/default.nix b/pkgs/development/python-modules/socksio/default.nix
new file mode 100644
index 000000000000..5d42ed6e8ecc
--- /dev/null
+++ b/pkgs/development/python-modules/socksio/default.nix
@@ -0,0 +1,41 @@
+{ lib
+, buildPythonPackage
+, fetchPypi
+, pythonAtLeast
+, flit-core
+, pytestCheckHook
+}:
+
+let
+ pname = "socksio";
+ version = "1.0.0";
+in
+buildPythonPackage {
+ inherit pname version;
+ format = "pyproject";
+
+ src = fetchPypi {
+ inherit pname version;
+ hash = "sha256-+IvrPaW1w4uYkEad5n0MsPnUlLeLEGyhhF+WwQuRxKw=";
+ };
+
+ nativeBuildInputs = [
+ flit-core
+ ];
+
+ # remove coverage configuration
+ preCheck = ''
+ rm pytest.ini
+ '';
+
+ checkInputs = [
+ pytestCheckHook
+ ];
+
+ meta = with lib; {
+ description = "Sans-I/O implementation of SOCKS4, SOCKS4A, and SOCKS5";
+ homepage = "https://github.com/sethmlarson/socksio";
+ license = licenses.mit;
+ maintainers = with maintainers; [ hexa ];
+ };
+}
diff --git a/pkgs/development/python-modules/spacy-transformers/default.nix b/pkgs/development/python-modules/spacy-transformers/default.nix
index 2f70732caa31..d203f8709c37 100644
--- a/pkgs/development/python-modules/spacy-transformers/default.nix
+++ b/pkgs/development/python-modules/spacy-transformers/default.nix
@@ -12,13 +12,13 @@
buildPythonPackage rec {
pname = "spacy-transformers";
- version = "1.1.3";
+ version = "1.1.4";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "f4f553d3d2a065147a8c1292b5d9adf050c0f78dd15bb05c9614341cf88c5574";
+ sha256 = "sha256-G09bZiXTdEuukvKjPOYYTW/B19d406QSRDOU5ZflDDU=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/sphinx/default.nix b/pkgs/development/python-modules/sphinx/default.nix
index 19961cc2ec18..7d79aaa457a3 100644
--- a/pkgs/development/python-modules/sphinx/default.nix
+++ b/pkgs/development/python-modules/sphinx/default.nix
@@ -92,9 +92,11 @@ buildPythonPackage rec {
# Due to lack of network sandboxing can't guarantee port 7777 isn't bound
"test_inspect_main_url"
"test_auth_header_uses_first_match"
+ "test_linkcheck_allowed_redirects"
"test_linkcheck_request_headers"
"test_linkcheck_request_headers_no_slash"
"test_follows_redirects_on_HEAD"
+ "test_get_after_head_raises_connection_error"
"test_invalid_ssl"
"test_connect_to_selfsigned_with_tls_verify_false"
"test_connect_to_selfsigned_with_tls_cacerts"
diff --git a/pkgs/development/python-modules/spyder/default.nix b/pkgs/development/python-modules/spyder/default.nix
index cfeaf08fb33f..40e393b57d6c 100644
--- a/pkgs/development/python-modules/spyder/default.nix
+++ b/pkgs/development/python-modules/spyder/default.nix
@@ -8,13 +8,13 @@
buildPythonPackage rec {
pname = "spyder";
- version = "5.2.1";
+ version = "5.2.2";
disabled = isPy27;
src = fetchPypi {
inherit pname version;
- sha256 = "b318a70a75acd200018a547d2ff2d2f55e7507054469d0c77ec6f967ac3c2d28";
+ sha256 = "sha256-3DIikQlsc7Ptagi8ddR5ia+u24dXeBdppRkIn/xp3bg=";
};
nativeBuildInputs = [ pyqtwebengine.wrapQtAppsHook ];
diff --git a/pkgs/development/python-modules/sqlalchemy/default.nix b/pkgs/development/python-modules/sqlalchemy/default.nix
index 1d6406c5db13..d379fc929428 100644
--- a/pkgs/development/python-modules/sqlalchemy/default.nix
+++ b/pkgs/development/python-modules/sqlalchemy/default.nix
@@ -13,11 +13,11 @@
buildPythonPackage rec {
pname = "SQLAlchemy";
- version = "1.4.31";
+ version = "1.4.32";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-WCtZ0eV4CkR6raIrRh5QtASp3AV2jaHYc2itgZBGhBg=";
+ sha256 = "sha256-b90txZMdqrd4wrZbA99q5oN24CijCY62JNCQnZmYhbw=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/starlette/default.nix b/pkgs/development/python-modules/starlette/default.nix
index 1084a50be770..00283cd9ec9c 100644
--- a/pkgs/development/python-modules/starlette/default.nix
+++ b/pkgs/development/python-modules/starlette/default.nix
@@ -21,7 +21,7 @@
buildPythonPackage rec {
pname = "starlette";
- version = "0.17.1";
+ version = "0.18.0";
format = "setuptools";
disabled = pythonOlder "3.6";
@@ -30,7 +30,7 @@ buildPythonPackage rec {
owner = "encode";
repo = pname;
rev = version;
- sha256 = "sha256-qT/w7r8PsrauLoBolwCGpxiwhDZo3z6hIqKVXeY5yqA=";
+ sha256 = "sha256-N2X9pjCiQ6TKRcm6VlyybLLyCdjQuIZHu1vK99gY8rY=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/stone/default.nix b/pkgs/development/python-modules/stone/default.nix
index 8ea42d1f2795..55f74b58fb52 100644
--- a/pkgs/development/python-modules/stone/default.nix
+++ b/pkgs/development/python-modules/stone/default.nix
@@ -1,34 +1,31 @@
-{ lib, buildPythonPackage, fetchPypi
-, coverage
+{ lib
+, buildPythonPackage
+, fetchFromGitHub
, mock
, ply
-, pytest-runner
, pytestCheckHook
, six
}:
buildPythonPackage rec {
pname = "stone";
- version = "3.2.1";
+ version = "3.3.1";
- src = fetchPypi {
- inherit pname version;
- sha256 = "0xby5mpsms7b2rv8j6mvxzmzz5i9ii01brb9ylxz6kiv2i08piwv";
+ # pypi sdist misses requirements.txt
+ src = fetchFromGitHub {
+ owner = "dropbox";
+ repo = pname;
+ rev = "v${version}";
+ hash = "sha256-0FWdYbv+paVU3Wj6g9OrSNUB0pH8fLwTkhVIBPeFB/U=";
};
postPatch = ''
- substituteInPlace setup.py \
- --replace "pytest-runner == 5.2.0" "pytest-runner" \
- --replace "pytest < 5" "pytest"
- substituteInPlace test/requirements.txt \
- --replace "coverage==5.3" "coverage"
+ sed -i '/pytest-runner/d' setup.py
'';
- nativeBuildInputs = [ pytest-runner ];
-
propagatedBuildInputs = [ ply six ];
- checkInputs = [ pytestCheckHook coverage mock ];
+ checkInputs = [ pytestCheckHook mock ];
# try to import from `test` directory, which is exported by the python interpreter
# and cannot be overriden without removing some py3 to py2 support
diff --git a/pkgs/development/python-modules/stumpy/default.nix b/pkgs/development/python-modules/stumpy/default.nix
index 68e35a1d0eca..66a9b7e0d82c 100644
--- a/pkgs/development/python-modules/stumpy/default.nix
+++ b/pkgs/development/python-modules/stumpy/default.nix
@@ -34,6 +34,12 @@ buildPythonPackage rec {
pytestCheckHook
];
+ pytestFlagsArray = [
+ # whole testsuite is very CPU intensive, only run core tests
+ # TODO: move entire test suite to passthru.tests
+ "tests/test_core.py"
+ ];
+
meta = with lib; {
description = "A powerful and scalable library that can be used for a variety of time series data mining tasks";
homepage = "https://github.com/TDAmeritrade/stumpy";
diff --git a/pkgs/development/python-modules/suds-jurko/default.nix b/pkgs/development/python-modules/suds-jurko/default.nix
index af307919387f..f2776265b067 100644
--- a/pkgs/development/python-modules/suds-jurko/default.nix
+++ b/pkgs/development/python-modules/suds-jurko/default.nix
@@ -27,6 +27,7 @@ buildPythonPackage rec {
description = "Lightweight SOAP client (Jurko's fork)";
homepage = "https://bitbucket.org/jurko/suds";
license = licenses.lgpl3;
+ broken = true; # Uses use2to3, which has been removed in setuptools>=58
};
}
diff --git a/pkgs/development/python-modules/sunpy/default.nix b/pkgs/development/python-modules/sunpy/default.nix
index 4e61f8665ba6..9c88dc3462ac 100644
--- a/pkgs/development/python-modules/sunpy/default.nix
+++ b/pkgs/development/python-modules/sunpy/default.nix
@@ -31,14 +31,14 @@
buildPythonPackage rec {
pname = "sunpy";
- version = "3.1.3";
+ version = "3.1.4";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "4acb05a05c7e6a2090cd0bb426b34c7e1620be0de2bf90a95a3f48ba15a5fce2";
+ sha256 = "sha256-TDslY1KUohR9zyyJ6+B95MMMsUL1TBl49L+nSCvZ9nI=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/superqt/default.nix b/pkgs/development/python-modules/superqt/default.nix
index 9890a7000a9a..af600f623423 100644
--- a/pkgs/development/python-modules/superqt/default.nix
+++ b/pkgs/development/python-modules/superqt/default.nix
@@ -3,21 +3,25 @@
, fetchFromGitHub
, setuptools-scm
, pyqt5
+, qtpy
, typing-extensions
, pytest
, pytestCheckHook
-}: buildPythonPackage rec {
+}:
+
+buildPythonPackage rec {
pname = "superqt";
- version = "0.2.5-1";
+ version = "0.3.1";
+
src = fetchFromGitHub {
owner = "napari";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-rkTiCJ8mIogS9SDmLPiaAyhhuBx3kk6rXjCc19zbwiM=";
+ sha256 = "sha256-DPjJxOgybNvZ3YvYHr48fmx59Puck61Dzm2G4M9qKo4=";
};
format = "pyproject";
nativeBuildInputs = [ setuptools-scm ];
- propagatedBuildInputs = [ pyqt5 typing-extensions ];
+ propagatedBuildInputs = [ pyqt5 qtpy typing-extensions ];
checkInputs = [ pytestCheckHook pytest ];
doCheck = false; # Segfaults...
SETUPTOOLS_SCM_PRETEND_VERSION = version;
diff --git a/pkgs/development/python-modules/teletype/default.nix b/pkgs/development/python-modules/teletype/default.nix
index c3878bf3c877..47f6357a5683 100644
--- a/pkgs/development/python-modules/teletype/default.nix
+++ b/pkgs/development/python-modules/teletype/default.nix
@@ -2,11 +2,12 @@
buildPythonPackage rec {
pname = "teletype";
- version = "1.1.0";
+ version = "1.3.2";
+ format = "pyproject";
src = fetchPypi {
inherit pname version;
- sha256 = "02mg0qmdf7hljq6jw1hwaid3hvkf70dfxgrxmpqybaxrph5pfg1y";
+ sha256 = "sha256-9q46a4ui2kgSUL/vImR02r4T9huwLFwd70AqGBNJNzs=";
};
# no tests
diff --git a/pkgs/development/python-modules/tempora/default.nix b/pkgs/development/python-modules/tempora/default.nix
index 79b04b7ebbb2..ff837158fc26 100644
--- a/pkgs/development/python-modules/tempora/default.nix
+++ b/pkgs/development/python-modules/tempora/default.nix
@@ -1,30 +1,59 @@
-{ lib, buildPythonPackage, fetchPypi
-, setuptools-scm, pytestCheckHook, pytest-freezegun, freezegun, backports_unittest-mock
-, six, pytz, jaraco_functools, pythonOlder
+{ lib
+, buildPythonPackage
+, fetchPypi
+, pythonOlder
+
+# build time
+, setuptools-scm
+
+# runtime
+, pytz
+, jaraco_functools
+
+# tests
+, freezegun
+, pytest-freezegun
+, pytestCheckHook
}:
buildPythonPackage rec {
pname = "tempora";
- version = "5.0.0";
+ version = "5.0.1";
+ format = "pyproject";
+
+ disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
- sha256 = "aa21dd1956e29559ecb2f2f2e14fcdb950085222fbbf86e6c946b5e1a8c36b26";
+ sha256 = "sha256-y6Dxl6ZIg78+c2V++8AyTVvxcXnndpsThbTXXSbNkSc=";
};
- disabled = pythonOlder "3.2";
+ nativeBuildInputs = [
+ setuptools-scm
+ ];
- nativeBuildInputs = [ setuptools-scm ];
-
- propagatedBuildInputs = [ six pytz jaraco_functools ];
+ propagatedBuildInputs = [
+ jaraco_functools
+ pytz
+ ];
checkInputs = [
- pytest-freezegun pytestCheckHook freezegun backports_unittest-mock
+ freezegun
+ pytest-freezegun
+ pytestCheckHook
+ ];
+
+ pythonImportsCheck = [
+ "tempora"
+ "tempora.schedule"
+ "tempora.timing"
+ "tempora.utc"
];
meta = with lib; {
description = "Objects and routines pertaining to date and time";
homepage = "https://github.com/jaraco/tempora";
license = licenses.mit;
+ maintainers = with maintainers; [ ];
};
}
diff --git a/pkgs/development/python-modules/tensorflow-tensorboard/default.nix b/pkgs/development/python-modules/tensorboard/default.nix
similarity index 88%
rename from pkgs/development/python-modules/tensorflow-tensorboard/default.nix
rename to pkgs/development/python-modules/tensorboard/default.nix
index a4a04d898566..47025bf4a28a 100644
--- a/pkgs/development/python-modules/tensorflow-tensorboard/default.nix
+++ b/pkgs/development/python-modules/tensorboard/default.nix
@@ -22,17 +22,16 @@
# buildBazelPackage.
buildPythonPackage rec {
- pname = "tensorflow-tensorboard";
- version = "2.6.0";
+ pname = "tensorboard";
+ version = "2.8.0";
format = "wheel";
- disabled = pythonOlder "3.6" || pythonAtLeast "3.10";
+ disabled = pythonOlder "3.6" || pythonAtLeast "3.11";
src = fetchPypi {
- pname = "tensorboard";
- inherit version format;
+ inherit pname version format;
dist = "py3";
python = "py3";
- sha256 = "sha256-99rEzftS0UyeP3RYXOKq+OYgNiCoZOUfr4SYiwn3u9s=";
+ hash = "sha256-ZaM45EJOkHnyYEkjvb4wF5KtzirOG+aNprPd8AUXDe8=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/tensorboardx/default.nix b/pkgs/development/python-modules/tensorboardx/default.nix
index eacb5b4cdc80..7aa29f34baa5 100644
--- a/pkgs/development/python-modules/tensorboardx/default.nix
+++ b/pkgs/development/python-modules/tensorboardx/default.nix
@@ -13,7 +13,7 @@
, pytorch
, six
, soundfile
-, tensorflow-tensorboard
+, tensorboard
, torchvision
}:
@@ -56,7 +56,7 @@ buildPythonPackage rec {
pillow
pytestCheckHook
pytorch
- tensorflow-tensorboard
+ tensorboard
torchvision
];
@@ -70,6 +70,8 @@ buildPythonPackage rec {
disabledTestPaths = [
# we are not interested in linting errors
"tests/test_lint.py"
+ # missing caffe2 dependency
+ "tests/test_caffe2.py"
];
meta = with lib; {
diff --git a/pkgs/development/python-modules/tensorflow-datasets/default.nix b/pkgs/development/python-modules/tensorflow-datasets/default.nix
index b97461394d13..1fc9f5ae25dc 100644
--- a/pkgs/development/python-modules/tensorflow-datasets/default.nix
+++ b/pkgs/development/python-modules/tensorflow-datasets/default.nix
@@ -39,13 +39,13 @@
buildPythonPackage rec {
pname = "tensorflow-datasets";
- version = "4.4.0";
+ version = "4.5.2";
src = fetchFromGitHub {
owner = "tensorflow";
repo = "datasets";
rev = "v${version}";
- sha256 = "11kbpv54nwr0xf7z5mkj2lmrfqfmcdq8qcpapnqck1kiawr3yad6";
+ sha256 = "sha256-OZpaY/6BMISq5IeDXyuyu5L/yG+DwlFliw4BsipPOLg=";
};
patches = [
diff --git a/pkgs/development/python-modules/tensorflow-estimator/default.nix b/pkgs/development/python-modules/tensorflow-estimator/default.nix
index 5ad6d0ab6e55..7c7f155adb09 100644
--- a/pkgs/development/python-modules/tensorflow-estimator/default.nix
+++ b/pkgs/development/python-modules/tensorflow-estimator/default.nix
@@ -6,13 +6,13 @@
buildPythonPackage rec {
pname = "tensorflow-estimator";
- version = "2.7.0";
+ version = "2.8.0";
format = "wheel";
src = fetchPypi {
pname = "tensorflow_estimator";
inherit version format;
- hash = "sha256-MltaIkhkN5JCt7dsaYfKVEI5voJXnTPmjsfCvaV6vJ0=";
+ hash = "sha256-vujgUgxgrn6vbKjLRsWp9LRXJVMTgNuPvjj8tIR4trs=";
};
propagatedBuildInputs = [ mock numpy absl-py ];
diff --git a/pkgs/development/python-modules/tensorflow-metadata/build.patch b/pkgs/development/python-modules/tensorflow-metadata/build.patch
index ff81c5d1e86c..5b570bf72062 100644
--- a/pkgs/development/python-modules/tensorflow-metadata/build.patch
+++ b/pkgs/development/python-modules/tensorflow-metadata/build.patch
@@ -2,15 +2,6 @@ diff --git a/setup.py b/setup.py
index 7a09b2f..94c5aa6 100644
--- a/setup.py
+++ b/setup.py
-@@ -125,7 +125,7 @@ setup(
- ],
- namespace_packages=[],
- install_requires=[
-- 'absl-py>=0.9,<0.13',
-+ 'absl-py>=0.9',
- 'googleapis-common-protos>=1.52.0,<2',
- 'protobuf>=3.13,<4',
- ],
@@ -137,8 +137,5 @@ setup(
long_description_content_type='text/markdown',
keywords='tensorflow metadata tfx',
diff --git a/pkgs/development/python-modules/tensorflow-metadata/default.nix b/pkgs/development/python-modules/tensorflow-metadata/default.nix
index 2a80155c4cd9..b39f1211d0ca 100644
--- a/pkgs/development/python-modules/tensorflow-metadata/default.nix
+++ b/pkgs/development/python-modules/tensorflow-metadata/default.nix
@@ -2,18 +2,19 @@
, buildPythonPackage
, fetchFromGitHub
, googleapis-common-protos
+, protobuf
, lib
}:
buildPythonPackage rec {
pname = "tensorflow-metadata";
- version = "1.5.0";
+ version = "1.7.0";
src = fetchFromGitHub {
owner = "tensorflow";
repo = "metadata";
rev = "v${version}";
- sha256 = "17p74k6rwswpmj7m16cw9hdam6b4m7v5bahirmc2l1kwfvrn4w33";
+ sha256 = "sha256-CQlLEVNcD9u2pojz8r1eLzYzc9i2hjdZfzfYSQ/8Q4k=";
};
patches = [
@@ -31,8 +32,12 @@ buildPythonPackage rec {
propagatedBuildInputs = [
absl-py
googleapis-common-protos
+ protobuf
];
+ # has no tests
+ doCheck = false;
+
pythonImportsCheck = [
"tensorflow_metadata"
];
diff --git a/pkgs/development/python-modules/tensorflow-tensorboard/1/default.nix b/pkgs/development/python-modules/tensorflow-tensorboard/1/default.nix
deleted file mode 100644
index f58b1a207719..000000000000
--- a/pkgs/development/python-modules/tensorflow-tensorboard/1/default.nix
+++ /dev/null
@@ -1,65 +0,0 @@
-{ lib, fetchPypi, buildPythonPackage, isPy3k
-, numpy
-, wheel
-, werkzeug
-, protobuf
-, grpcio
-, markdown
-, futures
-, absl-py
-}:
-
-# tensorflow/tensorboard is built from a downloaded wheel, because
-# https://github.com/tensorflow/tensorboard/issues/719 blocks
-# buildBazelPackage.
-
-buildPythonPackage rec {
- pname = "tensorflow-tensorboard";
- version = "1.15.0";
- format = "wheel";
-
- src = fetchPypi ({
- pname = "tensorboard";
- inherit version format;
- } // (if isPy3k then {
- python = "py3";
- sha256 = "1g62i3nrgp8q9wfsyqqjkkfnsz7x2k018c26kdh527h1yrjjrbac";
- } else {
- python = "py2";
- sha256 = "0l3zc8j2sh7h1z4qpy8kfvclv3kzndri55p10i42q6xahs9phav1";
- }));
-
- propagatedBuildInputs = [
- numpy
- werkzeug
- protobuf
- markdown
- grpcio
- absl-py
- # not declared in install_requires, but used at runtime
- # https://github.com/NixOS/nixpkgs/issues/73840
- wheel
- ] ++ lib.optional (!isPy3k) futures;
-
- # in the absence of a real test suite, run cli and imports
- checkPhase = ''
- $out/bin/tensorboard --help > /dev/null
- '';
-
- pythonImportsCheck = [
- "tensorboard"
- "tensorboard.backend"
- "tensorboard.compat"
- "tensorboard.data"
- "tensorboard.plugins"
- "tensorboard.summary"
- "tensorboard.util"
- ];
-
- meta = with lib; {
- description = "TensorFlow's Visualization Toolkit";
- homepage = "http://tensorflow.org";
- license = licenses.asl20;
- maintainers = with maintainers; [ abbradar ];
- };
-}
diff --git a/pkgs/development/python-modules/tensorflow/bin.nix b/pkgs/development/python-modules/tensorflow/bin.nix
index 2556a8039c1b..2c47f8674e0e 100644
--- a/pkgs/development/python-modules/tensorflow/bin.nix
+++ b/pkgs/development/python-modules/tensorflow/bin.nix
@@ -18,7 +18,7 @@
, opt-einsum
, backports_weakref
, tensorflow-estimator
-, tensorflow-tensorboard
+, tensorboard
, cudaSupport ? false
, cudatoolkit
, cudnn
@@ -74,7 +74,7 @@ in buildPythonPackage {
google-pasta
wrapt
tensorflow-estimator
- tensorflow-tensorboard
+ tensorboard
keras-applications
keras-preprocessing
h5py
@@ -168,7 +168,7 @@ in buildPythonPackage {
'';
# Upstream has a pip hack that results in bin/tensorboard being in both tensorflow
- # and the propagated input tensorflow-tensorboard, which causes environment collisions.
+ # and the propagated input tensorboard, which causes environment collisions.
# Another possibility would be to have tensorboard only in the buildInputs
# See https://github.com/NixOS/nixpkgs/pull/44381 for more information.
postInstall = ''
diff --git a/pkgs/development/python-modules/tensorflow/default.nix b/pkgs/development/python-modules/tensorflow/default.nix
index 517faef3f8fc..2d5a302521b4 100644
--- a/pkgs/development/python-modules/tensorflow/default.nix
+++ b/pkgs/development/python-modules/tensorflow/default.nix
@@ -1,19 +1,19 @@
-{ stdenv, bazel_3, buildBazelPackage, isPy3k, lib, fetchFromGitHub, symlinkJoin
+{ stdenv, bazel_4, buildBazelPackage, isPy3k, lib, fetchFromGitHub, symlinkJoin
, addOpenGLRunpath, fetchpatch, patchelfUnstable
# Python deps
, buildPythonPackage, pythonOlder, python
# Python libraries
-, numpy, tensorflow-tensorboard, absl-py
+, numpy, tensorboard, absl-py
, setuptools, wheel, keras, keras-preprocessing, google-pasta
, opt-einsum, astunparse, h5py
, termcolor, grpcio, six, wrapt, protobuf-python, tensorflow-estimator
-, dill, flatbuffers-python, tblib, typing-extensions
+, dill, flatbuffers-python, portpicker, tblib, typing-extensions
# Common deps
, git, pybind11, which, binutils, glibcLocales, cython, perl
# Common libraries
-, jemalloc, mpi, gast, grpc, sqlite, boringssl, jsoncpp
+, jemalloc, mpi, gast, grpc, sqlite, boringssl, jsoncpp, nsync
, curl, snappy, flatbuffers-core, lmdb-core, icu, double-conversion, libpng, libjpeg_turbo, giflib, protobuf-core
-# Upsteam by default includes cuda support since tensorflow 1.15. We could do
+# Upstream by default includes cuda support since tensorflow 1.15. We could do
# that in nix as well. It would make some things easier and less confusing, but
# it would also make the default tensorflow package unfree. See
# https://groups.google.com/a/tensorflow.org/forum/#!topic/developers/iRCt5m4qUz0
@@ -72,7 +72,7 @@ let
tfFeature = x: if x then "1" else "0";
- version = "2.7.1";
+ version = "2.8.0";
variant = if cudaSupport then "-gpu" else "";
pname = "tensorflow${variant}";
@@ -94,8 +94,8 @@ let
setuptools
six
tblib
+ tensorboard
tensorflow-estimator
- tensorflow-tensorboard
termcolor
typing-extensions
wheel
@@ -179,20 +179,15 @@ let
stdenv = llvmPackages_11.stdenv;
})) {
name = "${pname}-${version}";
- bazel = bazel_3;
+ bazel = bazel_4;
src = fetchFromGitHub {
owner = "tensorflow";
repo = "tensorflow";
rev = "v${version}";
- sha256 = "1qwzbqq899swrwrwmm6z7mq9sc55gyh0r4ca0mcnchbvn7w0qbkh";
+ hash = "sha256-w78ehpsnXElIyYftgZEq3b/+TSrRN1gyWVUVlSZpGFM=";
};
- patches = [
- # Patch the sources to compile with protobuf >= 3.16.
- ./system-protobuf.patch
- ];
-
# On update, it can be useful to steal the changes from gentoo
# https://gitweb.gentoo.org/repo/gentoo.git/tree/sci-libs/tensorflow
@@ -207,20 +202,20 @@ let
git
# libs taken from system through the TF_SYS_LIBS mechanism
- grpc
- sqlite
boringssl
- jsoncpp
curl
+ double-conversion
+ flatbuffers-core
+ giflib
+ grpc
+ icu
+ jsoncpp
+ libjpeg_turbo
+ libpng
+ lmdb-core
pybind11
snappy
- flatbuffers-core
- icu
- double-conversion
- libpng
- libjpeg_turbo
- giflib
- lmdb-core
+ sqlite
] ++ lib.optionals cudaSupport [
cudatoolkit
cudnn
@@ -229,6 +224,8 @@ let
] ++ lib.optionals stdenv.isDarwin [
Foundation
Security
+ ] ++ lib.optionals (!stdenv.isDarwin) [
+ nsync
];
# arbitrarily set to the current latest bazel version, overly careful
@@ -237,7 +234,7 @@ let
# Take as many libraries from the system as possible. Keep in sync with
# list of valid syslibs in
# https://github.com/tensorflow/tensorflow/blob/master/third_party/systemlibs/syslibs_configure.bzl
- TF_SYSTEM_LIBS = lib.concatStringsSep "," [
+ TF_SYSTEM_LIBS = lib.concatStringsSep "," ([
"absl_py"
"astor_archive"
"astunparse_archive"
@@ -253,7 +250,6 @@ let
"cython"
"dill_archive"
"double_conversion"
- "enum34_archive"
"flatbuffers"
"functools32_archive"
"gast_archive"
@@ -264,7 +260,6 @@ let
"libjpeg_turbo"
"lmdb"
"nasm"
- # "nsync" # not packaged in nixpkgs
"opt_einsum_archive"
"org_sqlite"
"pasta"
@@ -277,7 +272,9 @@ let
"typing_extensions_archive"
"wrapt"
"zlib"
- ];
+ ] ++ lib.optionals (!stdenv.isDarwin) [
+ "nsync" # fails to build on darwin
+ ]);
INCLUDEDIR = "${includes_joined}/include";
@@ -361,12 +358,12 @@ let
fetchAttrs = {
# cudaSupport causes fetch of ncclArchive, resulting in different hashes
sha256 = if cudaSupport then
- "sha256-+szc2mRoImwijzbj3nw6HmZp3DeRjjPRU5yC+5AEbkg="
+ "sha256-dQEyfueuQPcGvbhuh8Al45np3nRLDw2PCfC2lEqAH50="
else
if stdenv.isDarwin then
- "sha256-+bwIzp6t7gRJPcI8B5oyuf9z0AjCAyggUR7x+vv5kFs="
+ "sha256-yfnZVtKWqNQGvlfq2owXhem0LmzDYriVfYgf1ZRlaDo="
else
- "sha256-5yOYmeGpJq4Chi55H7iblxyRXVktgnePtpYTPvBs538=";
+ "sha256:12i1ix2xwq77f3h8qr4h57g0aazrdsjjqa536cpwx3n1mvl5p6qi";
};
buildAttrs = {
@@ -428,18 +425,20 @@ in buildPythonPackage {
# Adjust dependency requirements:
# - Relax gast version requirement that doesn't match what we have packaged
+ # - Relax tf-estimator, that would require a nightly version
# - The purpose of python3Packages.libclang is not clear at the moment and we don't have it packaged yet
# - keras and tensorlow-io-gcs-filesystem will be considered as optional for now.
postPatch = ''
sed -i setup.py \
-e "s/'gast[^']*',/'gast',/" \
+ -e "s/'tf-estimator-nightly[^']*',/'tensorflow-estimator',/" \
-e "/'libclang[^']*',/d" \
-e "/'keras[^']*',/d" \
-e "/'tensorflow-io-gcs-filesystem[^']*',/d"
'';
# Upstream has a pip hack that results in bin/tensorboard being in both tensorflow
- # and the propagated input tensorflow-tensorboard, which causes environment collisions.
+ # and the propagated input tensorboard, which causes environment collisions.
# Another possibility would be to have tensorboard only in the buildInputs
# https://github.com/tensorflow/tensorflow/blob/v1.7.1/tensorflow/tools/pip_package/setup.py#L79
postInstall = ''
@@ -452,7 +451,6 @@ in buildPythonPackage {
propagatedBuildInputs = [
absl-py
astunparse
- dill
flatbuffers-python
gast
google-pasta
@@ -463,13 +461,12 @@ in buildPythonPackage {
opt-einsum
protobuf-python
six
- tblib
tensorflow-estimator
termcolor
typing-extensions
wrapt
] ++ lib.optionals withTensorboard [
- tensorflow-tensorboard
+ tensorboard
];
# remove patchelfUnstable once patchelf 0.14 with https://github.com/NixOS/patchelf/pull/256 becomes the default
@@ -486,7 +483,13 @@ in buildPythonPackage {
# Actual tests are slow and impure.
# TODO try to run them anyway
# TODO better test (files in tensorflow/tools/ci_build/builds/*test)
- checkInputs = [ keras ];
+ # TEST_PACKAGES in tensorflow/tools/pip_package/setup.py
+ checkInputs = [
+ dill
+ keras
+ portpicker
+ tblib
+ ];
checkPhase = ''
${python.interpreter} < Dict[str, Any]:
-+def load(fp: Union[IO, BinaryIO], *, parse_float: ParseFloat = float) -> Dict[str, Any]:
- """Parse TOML from a binary file object."""
- s_bytes = fp.read()
- try:
diff --git a/pkgs/development/python-modules/tomli/tests.nix b/pkgs/development/python-modules/tomli/tests.nix
deleted file mode 100644
index 5d3d67dbd128..000000000000
--- a/pkgs/development/python-modules/tomli/tests.nix
+++ /dev/null
@@ -1,21 +0,0 @@
-{ buildPythonPackage
-, tomli
-, pytestCheckHook
-, python-dateutil
-}:
-
-buildPythonPackage rec {
- pname = "tomli-tests";
- inherit (tomli) version;
-
- src = tomli.testsout;
-
- dontBuild = true;
- dontInstall = true;
-
- checkInputs = [
- pytestCheckHook
- python-dateutil
- tomli
- ];
-}
diff --git a/pkgs/development/python-modules/tomlkit/default.nix b/pkgs/development/python-modules/tomlkit/default.nix
index 6c8455f060ec..22f3ffab2995 100644
--- a/pkgs/development/python-modules/tomlkit/default.nix
+++ b/pkgs/development/python-modules/tomlkit/default.nix
@@ -4,11 +4,11 @@
buildPythonPackage rec {
pname = "tomlkit";
- version = "0.8.0";
+ version = "0.10.0";
src = fetchPypi {
inherit pname version;
- sha256 = "29e84a855712dfe0e88a48f6d05c21118dbafb283bb2eed614d46f80deb8e9a1";
+ sha256 = "sha256-2ZlGxq7TOHyYuJ2R+57f+PkBv5JVkBCBJmqE+1YErc0=";
};
propagatedBuildInputs =
diff --git a/pkgs/development/python-modules/torch-tb-profiler/default.nix b/pkgs/development/python-modules/torch-tb-profiler/default.nix
index fc53c5ba8232..284391061367 100644
--- a/pkgs/development/python-modules/torch-tb-profiler/default.nix
+++ b/pkgs/development/python-modules/torch-tb-profiler/default.nix
@@ -4,7 +4,7 @@
, pandas
, pytestCheckHook
, pytorch
-, tensorflow-tensorboard
+, tensorboard
, torchvision
}:
@@ -25,7 +25,7 @@ buildPythonPackage rec {
# See https://discourse.nixos.org/t/extracting-sub-directory-from-fetchgit-or-fetchurl-or-any-derivation/8830.
src = "${repo}/tb_plugin";
- propagatedBuildInputs = [ pandas tensorflow-tensorboard ];
+ propagatedBuildInputs = [ pandas tensorboard ];
checkInputs = [ pytestCheckHook pytorch torchvision ];
diff --git a/pkgs/development/python-modules/tornado/5.nix b/pkgs/development/python-modules/tornado/5.nix
index 2f3ba5c1c2aa..f0dc14b5fa2a 100644
--- a/pkgs/development/python-modules/tornado/5.nix
+++ b/pkgs/development/python-modules/tornado/5.nix
@@ -3,12 +3,13 @@
, buildPythonPackage
, fetchPypi
, isPy27
+, pythonAtLeast
}:
buildPythonPackage rec {
pname = "tornado";
version = "5.1.1";
- disabled = isPy27;
+ disabled = isPy27 || pythonAtLeast "3.10";
# We specify the name of the test files to prevent
# https://github.com/NixOS/nixpkgs/issues/14634
diff --git a/pkgs/development/python-modules/towncrier/default.nix b/pkgs/development/python-modules/towncrier/default.nix
index b039277f2019..9953e2c17be5 100644
--- a/pkgs/development/python-modules/towncrier/default.nix
+++ b/pkgs/development/python-modules/towncrier/default.nix
@@ -13,11 +13,11 @@
buildPythonPackage rec {
pname = "towncrier";
- version = "21.3.0";
+ version = "21.9.0";
src = fetchPypi {
inherit pname version;
- sha256 = "6eed0bc924d72c98c000cb8a64de3bd566e5cb0d11032b73fcccf8a8f956ddfe";
+ sha256 = "sha256-nLb0XBbhoe7J0OdlEWXnvmDNCrgdE6XJbKl6SYrof0g=";
};
propagatedBuildInputs = [
@@ -31,12 +31,18 @@ buildPythonPackage rec {
# zope.interface collision
doCheck = !isPy27;
+
+ preCheck = ''
+ export PATH=$out/bin:$PATH
+ '';
+
checkInputs = [
git
mock
twisted
pytestCheckHook
];
+
pythonImportsCheck = [ "towncrier" ];
meta = with lib; {
diff --git a/pkgs/development/python-modules/tpm2-pytss/default.nix b/pkgs/development/python-modules/tpm2-pytss/default.nix
index 544c1a3084a6..5cd14c7704d8 100644
--- a/pkgs/development/python-modules/tpm2-pytss/default.nix
+++ b/pkgs/development/python-modules/tpm2-pytss/default.nix
@@ -9,12 +9,12 @@ buildPythonPackage rec {
# Last version on github is 0.2.4, but it looks
# like a mistake (it's missing commits from 0.1.9)
- version = "0.1.9";
+ version = "1.0.0";
disabled = pythonOlder "3.5";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-v5Xth0A3tFnLFg54nvWYL2TD201e/GWv+2y5Qc60CmU=";
+ sha256 = "sha256-Gx1nIXYuhTmQva9LmtTYvd1nyRH/pBQZ5bJ8OLcc1lo=";
};
postPatch = ''
substituteInPlace tpm2_pytss/config.py --replace \
diff --git a/pkgs/development/python-modules/tqdm/default.nix b/pkgs/development/python-modules/tqdm/default.nix
index 3973d68b6c38..2613a2b587d7 100644
--- a/pkgs/development/python-modules/tqdm/default.nix
+++ b/pkgs/development/python-modules/tqdm/default.nix
@@ -14,11 +14,11 @@
buildPythonPackage rec {
pname = "tqdm";
- version = "4.62.3";
+ version = "4.63.0";
src = fetchPypi {
inherit pname version;
- sha256 = "d359de7217506c9851b7869f3708d8ee53ed70a1b8edbba4dbcb47442592920d";
+ sha256 = "sha256-HZg17ejjlLuMncv/vKAtcXIXETrcZ5I2hz7qrFvAs80=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/trio/default.nix b/pkgs/development/python-modules/trio/default.nix
index e667f146afc0..f9b325ecc295 100644
--- a/pkgs/development/python-modules/trio/default.nix
+++ b/pkgs/development/python-modules/trio/default.nix
@@ -13,19 +13,45 @@
, jedi
, astor
, yapf
+, coreutils
}:
buildPythonPackage rec {
pname = "trio";
- version = "0.19.0";
+ version = "0.20.0";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "895e318e5ec5e8cea9f60b473b6edb95b215e82d99556a03eb2d20c5e027efe1";
+ sha256 = "sha256-ZwpS0xFdDoeeGsg4pOuZmvMvhYFj46cE/kg53ipnYHA=";
};
- checkInputs = [ astor pytestCheckHook pyopenssl trustme jedi yapf ];
+ propagatedBuildInputs = [
+ attrs
+ sortedcontainers
+ async_generator
+ idna
+ outcome
+ sniffio
+ ] ++ lib.optionals (pythonOlder "3.7") [ contextvars ];
+
+ # tests are failing on Darwin
+ doCheck = !stdenv.isDarwin;
+
+ checkInputs = [
+ astor
+ jedi
+ pyopenssl
+ pytestCheckHook
+ trustme
+ yapf
+ ];
+
+ preCheck = ''
+ substituteInPlace trio/tests/test_subprocess.py \
+ --replace "/bin/sleep" "${coreutils}/bin/sleep"
+ '';
+
# It appears that the build sandbox doesn't include /etc/services, and these tests try to use it.
disabledTests = [
"getnameinfo"
@@ -41,18 +67,6 @@ buildPythonPackage rec {
"-W" "ignore::DeprecationWarning"
];
- propagatedBuildInputs = [
- attrs
- sortedcontainers
- async_generator
- idna
- outcome
- sniffio
- ] ++ lib.optionals (pythonOlder "3.7") [ contextvars ];
-
- # tests are failing on Darwin
- doCheck = !stdenv.isDarwin;
-
meta = {
description = "An async/await-native I/O library for humans and snake people";
homepage = "https://github.com/python-trio/trio";
diff --git a/pkgs/development/python-modules/trytond/default.nix b/pkgs/development/python-modules/trytond/default.nix
index c332a067a76b..6a52dd869e05 100644
--- a/pkgs/development/python-modules/trytond/default.nix
+++ b/pkgs/development/python-modules/trytond/default.nix
@@ -24,14 +24,14 @@
buildPythonApplication rec {
pname = "trytond";
- version = "6.2.3";
+ version = "6.2.6";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "9be5d27aff9ae9b0ab73a8805145b2cc89900b9b513e6d5bfce89e9b7167f8f4";
+ sha256 = "sha256-Sof6A9lxU70YnCbboJr56CAdTL0cRbaRNxdvG5Tnqnw=";
};
# Tells the tests which database to use
diff --git a/pkgs/development/python-modules/tweepy/default.nix b/pkgs/development/python-modules/tweepy/default.nix
index a3526eb707be..c97fd85a8be4 100644
--- a/pkgs/development/python-modules/tweepy/default.nix
+++ b/pkgs/development/python-modules/tweepy/default.nix
@@ -12,7 +12,7 @@
buildPythonPackage rec {
pname = "tweepy";
- version = "4.5.0";
+ version = "4.6.0";
format = "setuptools";
disabled = pythonOlder "3.6";
@@ -21,7 +21,7 @@ buildPythonPackage rec {
owner = pname;
repo = pname;
rev = "v${version}";
- sha256 = "sha256-mRpYPuj2B/kEaaeZlNYYnViGxWiK1xtWfDObHNduIK8=";
+ sha256 = "sha256-7ogsocRTMTO5yegyY7BADu9NrHK7zMMbihBu8oF4UlQ=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/twilio/default.nix b/pkgs/development/python-modules/twilio/default.nix
index ddc94541422c..4404b743bc50 100644
--- a/pkgs/development/python-modules/twilio/default.nix
+++ b/pkgs/development/python-modules/twilio/default.nix
@@ -1,17 +1,19 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
-, mock
-, nose
-, pyjwt
, pythonOlder
+
+, pyjwt
, pytz
, requests
+
+, mock
+, pytestCheckHook
}:
buildPythonPackage rec {
pname = "twilio";
- version = "7.5.0";
+ version = "7.7.0";
format = "setuptools";
disabled = pythonOlder "3.6";
@@ -20,7 +22,7 @@ buildPythonPackage rec {
owner = "twilio";
repo = "twilio-python";
rev = version;
- sha256 = "0h6r9nz7dcvagrjhzvnirpnjazcy9r64cwlr2bnmlrbjhwdni9rq";
+ sha256 = "sha256-PxLDAP/6Ddvf58eEyX3DHkdBNuLE5DlLdCEaRguqOy0=";
};
propagatedBuildInputs = [
@@ -31,7 +33,7 @@ buildPythonPackage rec {
checkInputs = [
mock
- nose
+ pytestCheckHook
];
pythonImportsCheck = [
diff --git a/pkgs/development/python-modules/twine/default.nix b/pkgs/development/python-modules/twine/default.nix
index 82c157722d28..d6fea5942117 100644
--- a/pkgs/development/python-modules/twine/default.nix
+++ b/pkgs/development/python-modules/twine/default.nix
@@ -14,13 +14,13 @@
buildPythonPackage rec {
pname = "twine";
- version = "3.7.1";
+ version = "3.8.0";
format = "pyproject";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "28460a3db6b4532bde6a5db6755cf2dce6c5020bada8a641bb2c5c7a9b1f35b8";
+ sha256 = "sha256-jvpSZY4K53BoahO2dVaTKPH7qYN+XeGGe/5fRqmu/hk=";
};
nativeBuildInputs = [ setuptools-scm ];
diff --git a/pkgs/development/python-modules/txaio/default.nix b/pkgs/development/python-modules/txaio/default.nix
index 074e7b8d5091..23c24f3e514a 100644
--- a/pkgs/development/python-modules/txaio/default.nix
+++ b/pkgs/development/python-modules/txaio/default.nix
@@ -12,12 +12,12 @@
buildPythonPackage rec {
pname = "txaio";
- version = "21.2.1";
+ version = "22.2.1";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-fW+JdFaAIz8cTbndt0jfXojSp6N5Yr4XTA/QTI26Hcg=";
+ sha256 = "sha256-LkWCtw8EsjRZCCVGhKmEIGwNm1DjB0okpMVauiHSTQE=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/typeguard/default.nix b/pkgs/development/python-modules/typeguard/default.nix
index 8b2ff2de5129..dd3f62527aa2 100644
--- a/pkgs/development/python-modules/typeguard/default.nix
+++ b/pkgs/development/python-modules/typeguard/default.nix
@@ -3,7 +3,7 @@
, pythonOlder
, lib
, setuptools-scm
-, pytest
+, pytestCheckHook
, typing-extensions
, glibcLocales
}:
@@ -26,12 +26,17 @@ buildPythonPackage rec {
substituteInPlace setup.cfg --replace " --cov" ""
'';
- checkInputs = [ pytest typing-extensions ];
+ checkInputs = [ pytestCheckHook typing-extensions ];
- # mypy tests aren't passing with latest mypy
- checkPhase = ''
- py.test . --ignore=tests/mypy
- '';
+ disabledTestPaths = [
+ # mypy tests aren't passing with latest mypy
+ "tests/mypy"
+ ];
+
+ disabledTests = [
+ # not compatible with python3.10
+ "test_typed_dict"
+ ];
disabled = pythonOlder "3.3";
diff --git a/pkgs/development/python-modules/typing-extensions/default.nix b/pkgs/development/python-modules/typing-extensions/default.nix
index 1e29bc9a6160..97f0d48cecc2 100644
--- a/pkgs/development/python-modules/typing-extensions/default.nix
+++ b/pkgs/development/python-modules/typing-extensions/default.nix
@@ -8,7 +8,7 @@
buildPythonPackage rec {
pname = "typing-extensions";
- version = "4.0.1";
+ version = "4.1.1";
format = "pyproject";
disabled = pythonOlder "3.6";
@@ -16,7 +16,7 @@ buildPythonPackage rec {
src = fetchPypi {
pname = "typing_extensions";
inherit version;
- hash = "sha256-TKCR3qFJ+UXsVq+0ja5xTyHoaS7yKjlSI7zTKJYbag4=";
+ hash = "sha256-GpRi3MM0enmx8cAnH7556ERYC7WYuvoe0gi5TaPNzUI=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/typing-inspect/default.nix b/pkgs/development/python-modules/typing-inspect/default.nix
index 1e5303b7b09e..d54016049364 100644
--- a/pkgs/development/python-modules/typing-inspect/default.nix
+++ b/pkgs/development/python-modules/typing-inspect/default.nix
@@ -3,6 +3,7 @@
, fetchPypi
, typing-extensions
, mypy-extensions
+, pytestCheckHook
}:
buildPythonPackage rec {
@@ -20,6 +21,19 @@ buildPythonPackage rec {
mypy-extensions
];
+ checkInputs = [
+ pytestCheckHook
+ ];
+
+ disabledTests = [
+ # https://github.com/ilevkivskyi/typing_inspect/issues/84
+ "test_typed_dict_typing_extension"
+ ];
+
+ pythonImportsCheck = [
+ "typing_inspect"
+ ];
+
meta = with lib; {
description = "Runtime inspection utilities for Python typing module";
homepage = "https://github.com/ilevkivskyi/typing_inspect";
diff --git a/pkgs/development/python-modules/ufo2ft/default.nix b/pkgs/development/python-modules/ufo2ft/default.nix
index a3458b2f332f..03ebd566b709 100644
--- a/pkgs/development/python-modules/ufo2ft/default.nix
+++ b/pkgs/development/python-modules/ufo2ft/default.nix
@@ -12,13 +12,13 @@
buildPythonPackage rec {
pname = "ufo2ft";
- version = "2.25.2";
+ version = "2.25.3";
format = "setuptools";
src = fetchPypi {
inherit pname version;
- sha256 = "ooWIHvyMtrht4WcGPiacY8dfjPSb5uitHnTRTKvf2AA=";
+ sha256 = "sha256-4OuEol+YorvOeK5bj33Po8V9KD0trcgTMXCTQ+J7q94=";
};
patches = [
diff --git a/pkgs/development/python-modules/unittest-xml-reporting/default.nix b/pkgs/development/python-modules/unittest-xml-reporting/default.nix
index c8d1edc42109..c4ee1f955e44 100644
--- a/pkgs/development/python-modules/unittest-xml-reporting/default.nix
+++ b/pkgs/development/python-modules/unittest-xml-reporting/default.nix
@@ -1,18 +1,21 @@
-{lib, fetchPypi, buildPythonPackage, isPy27, six}:
+{lib, fetchPypi, buildPythonPackage, isPy27, six, lxml }:
buildPythonPackage rec {
pname = "unittest-xml-reporting";
- version = "3.0.4";
+ version = "3.2.0";
disabled = isPy27;
- propagatedBuildInputs = [six];
+ propagatedBuildInputs = [
+ lxml
+ six
+ ];
# The tarball from Pypi doesn't actually contain the unit tests
doCheck = false;
src = fetchPypi {
inherit pname version;
- sha256 = "984cebba69e889401bfe3adb9088ca376b3a1f923f0590d005126c1bffd1a695";
+ sha256 = "sha256-7djTFwtAw6gbjPkQ9GxqMErihH7AEDbQLpwPm4V2LSg=";
};
meta = with lib; {
homepage = "https://github.com/xmlrunner/unittest-xml-reporting/tree/master/";
diff --git a/pkgs/development/python-modules/uproot/default.nix b/pkgs/development/python-modules/uproot/default.nix
index bf523046c616..8bf8e67b8e46 100644
--- a/pkgs/development/python-modules/uproot/default.nix
+++ b/pkgs/development/python-modules/uproot/default.nix
@@ -12,14 +12,14 @@
buildPythonPackage rec {
pname = "uproot";
- version = "4.1.9";
+ version = "4.2.0";
# fetch from github for tests
src = fetchFromGitHub {
owner = "scikit-hep";
repo = "uproot4";
rev = version;
- sha256 = "035gljxm18hvpfvc7nsd7lhawwq3np5sg1y86pzcxc680c6rj6lx";
+ sha256 = "sha256-ft2VXYGb+iPqRUrtOBvl7SgTPfPR4+IOdYFVTNbQAEw=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/uvicorn/default.nix b/pkgs/development/python-modules/uvicorn/default.nix
index 4ce9228efee8..a3238d4c5484 100644
--- a/pkgs/development/python-modules/uvicorn/default.nix
+++ b/pkgs/development/python-modules/uvicorn/default.nix
@@ -19,14 +19,14 @@
buildPythonPackage rec {
pname = "uvicorn";
- version = "0.16.0";
+ version = "0.17.5";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "encode";
repo = pname;
rev = version;
- sha256 = "14jih6j4q2qp5c9rgl798i5p51b4y6zkkj434q2l1naw0csphk4s";
+ sha256 = "sha256-66wPVnBLy2HK4p0m/b/DRxy12sk8AsVFZoFVcWRkL4s=";
};
outputs = [
diff --git a/pkgs/development/python-modules/uvloop/default.nix b/pkgs/development/python-modules/uvloop/default.nix
index 72ede5dc1716..b4b75dbb1941 100644
--- a/pkgs/development/python-modules/uvloop/default.nix
+++ b/pkgs/development/python-modules/uvloop/default.nix
@@ -62,8 +62,12 @@ buildPythonPackage rec {
"tests/test_sourcecode.py"
];
- # force using installed/compiled uvloop vs source by moving tests to temp dir
- preCheck = ''
+ preCheck = lib.optionalString stdenv.isDarwin ''
+ # Work around "OSError: AF_UNIX path too long"
+ # https://github.com/MagicStack/uvloop/issues/463
+ export TMPDIR="/tmp"
+ '' + ''
+ # force using installed/compiled uvloop vs source by moving tests to temp dir
export TEST_DIR=$(mktemp -d)
cp -r tests $TEST_DIR
pushd $TEST_DIR
diff --git a/pkgs/development/python-modules/virtualenv/default.nix b/pkgs/development/python-modules/virtualenv/default.nix
index c463c37747ea..126bf4e6c6c0 100644
--- a/pkgs/development/python-modules/virtualenv/default.nix
+++ b/pkgs/development/python-modules/virtualenv/default.nix
@@ -23,11 +23,11 @@
buildPythonPackage rec {
pname = "virtualenv";
- version = "20.13.0";
+ version = "20.13.2";
src = fetchPypi {
inherit pname version;
- sha256 = "d8458cf8d59d0ea495ad9b34c2599487f8a7772d796f9910858376d1600dd2dd";
+ sha256 = "sha256-AfX4B0TSSjdDzmGFgSNIjpHLLdHTvfkq2vG7o5/97fA=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/wandb/default.nix b/pkgs/development/python-modules/wandb/default.nix
index ef8e6cfd247e..7f21877f1fb5 100644
--- a/pkgs/development/python-modules/wandb/default.nix
+++ b/pkgs/development/python-modules/wandb/default.nix
@@ -114,6 +114,10 @@ buildPythonPackage rec {
"tests/test_tables.py"
];
+ # Disable test that fails on darwin due to issue with python3Packages.psutil:
+ # https://github.com/giampaolo/psutil/issues/1219
+ disabledTests = lib.optional stdenv.isDarwin "test_tpu_system_stats";
+
checkInputs = [
azure-core
bokeh
diff --git a/pkgs/development/python-modules/watchdog/default.nix b/pkgs/development/python-modules/watchdog/default.nix
index 9fba5785c447..1bc471c7287f 100644
--- a/pkgs/development/python-modules/watchdog/default.nix
+++ b/pkgs/development/python-modules/watchdog/default.nix
@@ -39,6 +39,11 @@ buildPythonPackage rec {
--replace "--cov-report=term-missing" ""
'';
+ disabledTests = [
+ # probably failing because of an encoding related issue
+ "test_create_wrong_encoding"
+ ];
+
disabledTestPaths = [
# Tests are flaky
"tests/test_inotify_buffer.py"
diff --git a/pkgs/development/python-modules/websocket-client/default.nix b/pkgs/development/python-modules/websocket-client/default.nix
index 116f45f16dd3..37d926e50555 100644
--- a/pkgs/development/python-modules/websocket-client/default.nix
+++ b/pkgs/development/python-modules/websocket-client/default.nix
@@ -8,12 +8,12 @@
buildPythonPackage rec {
pname = "websocket-client";
- version = "1.2.3";
+ version = "1.3.1";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- sha256 = "1315816c0acc508997eb3ae03b9d3ff619c9d12d544c9a9b553704b1cc4f6af5";
+ sha256 = "sha256-YninUGU5VBgoP4h958O+r7OqaNraXKy+SyFOjSbaSZs=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/weconnect-mqtt/default.nix b/pkgs/development/python-modules/weconnect-mqtt/default.nix
index 42a3877cffc1..0bb0a8f7999d 100644
--- a/pkgs/development/python-modules/weconnect-mqtt/default.nix
+++ b/pkgs/development/python-modules/weconnect-mqtt/default.nix
@@ -10,7 +10,7 @@
buildPythonPackage rec {
pname = "weconnect-mqtt";
- version = "0.30.0";
+ version = "0.30.2";
format = "setuptools";
disabled = pythonOlder "3.7";
@@ -19,7 +19,7 @@ buildPythonPackage rec {
owner = "tillsteinbach";
repo = "WeConnect-mqtt";
rev = "v${version}";
- sha256 = "sha256-/mlN9gEEy8DJSFef0Pp2PLjHhwStKwANKSzw4nT19eM=";
+ sha256 = "sha256-e8dDdtabEHQKNx3c63Ou3T3ygsj4763C9Pd8usFrSCE=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/weconnect/default.nix b/pkgs/development/python-modules/weconnect/default.nix
index f5af3e5aa504..096f1b0e99b0 100644
--- a/pkgs/development/python-modules/weconnect/default.nix
+++ b/pkgs/development/python-modules/weconnect/default.nix
@@ -12,7 +12,7 @@
buildPythonPackage rec {
pname = "weconnect";
- version = "0.37.0";
+ version = "0.37.2";
format = "setuptools";
disabled = pythonOlder "3.7";
@@ -21,7 +21,7 @@ buildPythonPackage rec {
owner = "tillsteinbach";
repo = "WeConnect-python";
rev = "v${version}";
- sha256 = "sha256-h6jKtQt9vCh5bnhIqWLniUIJ41GxCs0uSi4vBVNs8tE=";
+ sha256 = "sha256-54T4L1MzF2rkKM0AXz+bPBdVL7Izdho6c3AVSXBho2E=";
};
propagatedBuildInputs = [
@@ -42,8 +42,8 @@ buildPythonPackage rec {
substituteInPlace setup.py \
--replace "setup_requires=SETUP_REQUIRED," "setup_requires=[]," \
--replace "tests_require=TEST_REQUIRED," "tests_require=[],"
- substituteInPlace requirements.txt \
- --replace "pillow~=9.0.0" "pillow"
+ substituteInPlace image_extra_requirements.txt \
+ --replace "pillow~=9.0.1" "pillow"
substituteInPlace pytest.ini \
--replace "--cov=weconnect --cov-config=.coveragerc --cov-report html" "" \
--replace "pytest-cov" ""
diff --git a/pkgs/development/python-modules/werkzeug/default.nix b/pkgs/development/python-modules/werkzeug/default.nix
index c75c59ac1c9c..63c3ad1b420b 100644
--- a/pkgs/development/python-modules/werkzeug/default.nix
+++ b/pkgs/development/python-modules/werkzeug/default.nix
@@ -12,7 +12,7 @@
buildPythonPackage rec {
pname = "werkzeug";
- version = "2.0.2";
+ version = "2.0.3";
format = "setuptools";
disabled = pythonOlder "3.6";
@@ -20,7 +20,7 @@ buildPythonPackage rec {
src = fetchPypi {
pname = "Werkzeug";
inherit version;
- sha256 = "sha256-qiu2/I3ujWxQTArB5/X33FgQqZA+eTtvcVqfAVva25o=";
+ sha256 = "sha256-uGP4/wV8UiFktgZ8niiwQRYbS+W6TQ2s7qpQoWOCLTw=";
};
propagatedBuildInputs = lib.optionals (!stdenv.isDarwin) [
diff --git a/pkgs/development/python-modules/wsproto/default.nix b/pkgs/development/python-modules/wsproto/default.nix
index d4dd7d089997..803ddd51d9fa 100644
--- a/pkgs/development/python-modules/wsproto/default.nix
+++ b/pkgs/development/python-modules/wsproto/default.nix
@@ -6,12 +6,12 @@
buildPythonPackage rec {
pname = "wsproto";
- version = "1.0.0";
+ version = "1.1.0";
disabled = pythonOlder "3.6"; # python versions <3.6
src = fetchPypi {
inherit pname version;
- sha256 = "868776f8456997ad0d9720f7322b746bbe9193751b5b290b7f924659377c8c38";
+ sha256 = "sha256-ouVr/Vx82DwTadg7X+zNbTd5i3SHKGbmJhbg7PERvag=";
};
propagatedBuildInputs = [ h11 ] ++ lib.optional isPy36 dataclasses;
diff --git a/pkgs/development/python-modules/xarray/default.nix b/pkgs/development/python-modules/xarray/default.nix
index 5f780a61ffc5..85b8ac799c73 100644
--- a/pkgs/development/python-modules/xarray/default.nix
+++ b/pkgs/development/python-modules/xarray/default.nix
@@ -11,14 +11,14 @@
buildPythonPackage rec {
pname = "xarray";
- version = "0.20.2";
+ version = "2022.3.0";
format = "pyproject";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-wuvoDKgbEKAkH2h23MNKyWluXFzc30dY2nz0vXMsQfc=";
+ sha256 = "sha256-OYNEv30XBHeqzv9wIQ4R69aa9rFW/hOXgFTSXEhylEA=";
};
SETUPTOOLS_SCM_PRETEND_VERSION="${version}";
diff --git a/pkgs/development/python-modules/xgboost/default.nix b/pkgs/development/python-modules/xgboost/default.nix
index 3717ca2473c3..f6c63db45051 100644
--- a/pkgs/development/python-modules/xgboost/default.nix
+++ b/pkgs/development/python-modules/xgboost/default.nix
@@ -48,7 +48,8 @@ buildPythonPackage {
ln -s ${xgboost}/bin/xgboost ../xgboost
'';
- pytestFlagsArray = ["../tests/python"];
+ # tests are extremely cpu intensive, only run basic tests to ensure package is working
+ pytestFlagsArray = ["../tests/python/test_basic.py"];
disabledTestPaths = [
# Requires internet access: https://github.com/dmlc/xgboost/blob/03cd087da180b7dff21bd8ef34997bf747016025/tests/python/test_ranking.py#L81
"../tests/python/test_ranking.py"
diff --git a/pkgs/development/python-modules/xmlsec/default.nix b/pkgs/development/python-modules/xmlsec/default.nix
index 0a9a0af0e543..76ce32e5e8f3 100644
--- a/pkgs/development/python-modules/xmlsec/default.nix
+++ b/pkgs/development/python-modules/xmlsec/default.nix
@@ -16,6 +16,7 @@
buildPythonPackage rec {
pname = "xmlsec";
version = "1.3.12";
+ format = "pyproject";
src = fetchPypi {
inherit pname version;
@@ -35,7 +36,14 @@ buildPythonPackage rec {
# Full git clone required for test_doc_examples
checkInputs = [ pytestCheckHook hypothesis ];
- disabledTestPaths = [ "tests/test_doc_examples.py" ];
+
+ disabledTestPaths = [
+ "tests/test_doc_examples.py"
+ # test_reinitialize_module segfaults python
+ # https://github.com/mehcode/python-xmlsec/issues/203
+ "tests/test_xmlsec.py"
+ ];
+
pythonImportsCheck = [ "xmlsec" ];
diff --git a/pkgs/development/python-modules/xmltodict/default.nix b/pkgs/development/python-modules/xmltodict/default.nix
index 13cc5b89c2a2..5e0733b6256e 100644
--- a/pkgs/development/python-modules/xmltodict/default.nix
+++ b/pkgs/development/python-modules/xmltodict/default.nix
@@ -1,30 +1,27 @@
{ lib
, buildPythonPackage
, fetchPypi
-, coverage
, pytestCheckHook
}:
buildPythonPackage rec {
pname = "xmltodict";
version = "0.12.0";
+ format = "setuptools";
src = fetchPypi {
inherit pname version;
sha256 = "50d8c638ed7ecb88d90561beedbf720c9b4e851a9fa6c47ebd64e99d166d8a21";
};
- checkInputs = [ coverage pytestCheckHook ];
-
- disabledTests = [
- # incompatibilities with security fixes: https://github.com/martinblech/xmltodict/issues/289
- "test_namespace_collapse"
- "test_namespace_support"
+ checkInputs = [
+ pytestCheckHook
];
- meta = {
+ meta = with lib; {
description = "Makes working with XML feel like you are working with JSON";
homepage = "https://github.com/martinblech/xmltodict";
- license = lib.licenses.mit;
+ license = licenses.mit;
+ maintainers = with maintainers; [ ];
};
}
diff --git a/pkgs/development/python-modules/xxhash/default.nix b/pkgs/development/python-modules/xxhash/default.nix
index df3c0c852696..f70526da6a10 100644
--- a/pkgs/development/python-modules/xxhash/default.nix
+++ b/pkgs/development/python-modules/xxhash/default.nix
@@ -4,12 +4,12 @@
}:
buildPythonPackage rec {
- version = "2.0.2";
+ version = "3.0.0";
pname = "xxhash";
src = fetchPypi {
inherit pname version;
- sha256 = "b7bead8cf6210eadf9cecf356e17af794f57c0939a3d420a00d87ea652f87b49";
+ sha256 = "sha256-MLLZeq8R+xIgI/a0TruXxpVengDXRhqWQVygMLXOucc=";
};
meta = with lib; {
diff --git a/pkgs/development/python-modules/yq/default.nix b/pkgs/development/python-modules/yq/default.nix
index b87982b20b65..5bcbf24dc302 100644
--- a/pkgs/development/python-modules/yq/default.nix
+++ b/pkgs/development/python-modules/yq/default.nix
@@ -11,11 +11,11 @@
buildPythonPackage rec {
pname = "yq";
- version = "2.13.0";
+ version = "2.14.0";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-/RMf2x9WcWrY1EzZ6q99OyLTm6iGHqZKQJzD9K4mPbg=";
+ sha256 = "sha256-9L8rKZ0eXH69dM+yXR9dm2QBBjusB6LQmhVhRMHWROE=";
};
patches = [
diff --git a/pkgs/development/python-modules/zarr/default.nix b/pkgs/development/python-modules/zarr/default.nix
index 11c6f84850bd..c943f34c52ef 100644
--- a/pkgs/development/python-modules/zarr/default.nix
+++ b/pkgs/development/python-modules/zarr/default.nix
@@ -12,12 +12,12 @@
buildPythonPackage rec {
pname = "zarr";
- version = "2.10.3";
+ version = "2.11.0";
disabled = isPy27;
src = fetchPypi {
inherit pname version;
- sha256 = "76932665c2146ebdf15f6dba254f9e0030552fbfcf9322dea822bff96fbce693";
+ sha256 = "sha256-sIc74nr1aQc4+hWOp6gC6uRUkEwzmVBWGFrMWnQltFE=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/zeep/default.nix b/pkgs/development/python-modules/zeep/default.nix
index 1b3e0c5fcdf0..83ee3f37f7e4 100644
--- a/pkgs/development/python-modules/zeep/default.nix
+++ b/pkgs/development/python-modules/zeep/default.nix
@@ -6,6 +6,7 @@
, cached-property
, defusedxml
, fetchFromGitHub
+, fetchpatch
, freezegun
, httpx
, isodate
@@ -38,6 +39,14 @@ buildPythonPackage rec {
sha256 = "sha256-fJLr2LJpbNQTl183R56G7sJILfm04R39qpJxLogQLoo=";
};
+ patches = [
+ (fetchpatch {
+ # fixes pytest_httpx test case; https://github.com/mvantellingen/python-zeep/pull/1293
+ url = "https://github.com/mvantellingen/python-zeep/commit/2907848185adcb4e6d8c093db6c617c64cb8c8bf.patch";
+ hash = "sha256-hpksgMfrBLvYtI1QIs1aHBtFq7C1PWpnAj8BW5ak1/4=";
+ })
+ ];
+
propagatedBuildInputs = [
attrs
cached-property
diff --git a/pkgs/development/python-modules/zimports/default.nix b/pkgs/development/python-modules/zimports/default.nix
index d350e2040891..d4c6c6b7e474 100644
--- a/pkgs/development/python-modules/zimports/default.nix
+++ b/pkgs/development/python-modules/zimports/default.nix
@@ -10,13 +10,13 @@
buildPythonPackage rec {
pname = "zimports";
- version = "0.4.1";
+ version = "0.5.0";
src = fetchFromGitHub {
owner = "sqlalchemyorg";
repo = "zimports";
rev = "v${version}";
- sha256 = "11mg7j7xiypv9hki4qbnp9jsgwgfdrgdzfqyrzk5x0s4hycgi4q0";
+ sha256 = "sha256-O8MHUt9yswL9fK9pEddkvnNS2E4vWA/S1BTs1OD1VbU=";
};
disabled = !isPy3k;
diff --git a/pkgs/development/python-modules/zope_exceptions/default.nix b/pkgs/development/python-modules/zope_exceptions/default.nix
index 0586227c61c5..fb1eb07154a0 100644
--- a/pkgs/development/python-modules/zope_exceptions/default.nix
+++ b/pkgs/development/python-modules/zope_exceptions/default.nix
@@ -6,11 +6,11 @@
buildPythonPackage rec {
pname = "zope.exceptions";
- version = "4.4";
+ version = "4.5";
src = fetchPypi {
inherit pname version;
- sha256 = "0d72886b1bb8af4c346a117a540f28ab122577f5e3a105a261be72cd15776fda";
+ sha256 = "sha256-TjW7oEiJxdEU3KpVKXQl1fM/YYqF7323Ehs7dxEAeE4=";
};
propagatedBuildInputs = [ zope_interface ];
diff --git a/pkgs/development/python-modules/zopfli/default.nix b/pkgs/development/python-modules/zopfli/default.nix
index d7e9cf507f03..1bc880456b6e 100644
--- a/pkgs/development/python-modules/zopfli/default.nix
+++ b/pkgs/development/python-modules/zopfli/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "zopfli";
- version = "0.1.9";
+ version = "0.2.0";
src = fetchPypi {
inherit pname version;
- sha256 = "78de3cc08a8efaa8013d61528907d91ac4d6cc014ffd8a41cc10ee75e9e60d7b";
+ sha256 = "sha256-x9PzVcSR84TkNNsuYmheq269pmuWTonhdUuxFLLTjOo=";
extension = "zip";
};
diff --git a/pkgs/development/python2-modules/pycairo/default.nix b/pkgs/development/python2-modules/pycairo/default.nix
index 9da4da1479c0..eefc69a3323f 100644
--- a/pkgs/development/python2-modules/pycairo/default.nix
+++ b/pkgs/development/python2-modules/pycairo/default.nix
@@ -3,7 +3,7 @@
, meson
, ninja
, buildPythonPackage
-, pytestCheckHook
+, pytest
, pkg-config
, cairo
, python
@@ -32,9 +32,11 @@ buildPythonPackage rec {
cairo
];
- checkInputs = [
- pytestCheckHook
- ];
+ # HACK: Don't use the pytestCheckHook because PYTHONPATH
+ # will be added by the Python setuptook breaking meson.
+ checkPhase = ''
+ ${pytest}/bin/pytest
+ '';
mesonFlags = [
# This is only used for figuring out what version of Python is in
diff --git a/pkgs/development/tools/build-managers/cmake/default.nix b/pkgs/development/tools/build-managers/cmake/default.nix
index 47abc7ec767b..cf2fe926ddb0 100644
--- a/pkgs/development/tools/build-managers/cmake/default.nix
+++ b/pkgs/development/tools/build-managers/cmake/default.nix
@@ -17,11 +17,11 @@ stdenv.mkDerivation rec {
+ lib.optionalString isBootstrap "-boot"
+ lib.optionalString useNcurses "-cursesUI"
+ lib.optionalString withQt5 "-qt5UI";
- version = "3.22.2";
+ version = "3.22.3";
src = fetchurl {
url = "https://cmake.org/files/v${lib.versions.majorMinor version}/cmake-${version}.tar.gz";
- sha256 = "sha256-PBxHi5ZQsQfUUsW9VFxy4vrU43wJuJoZhLmi9G32rO0=";
+ sha256 = "sha256-n4RpFm+UVTtpeKFu4pIn7Emi61zrYIJ13sQNiuDRtaA=";
};
patches = [
diff --git a/pkgs/development/tools/build-managers/meson/default.nix b/pkgs/development/tools/build-managers/meson/default.nix
index 8744407fb96d..d8c92bc82d6e 100644
--- a/pkgs/development/tools/build-managers/meson/default.nix
+++ b/pkgs/development/tools/build-managers/meson/default.nix
@@ -10,11 +10,11 @@
python3.pkgs.buildPythonApplication rec {
pname = "meson";
- version = "0.60.3";
+ version = "0.61.2";
src = python3.pkgs.fetchPypi {
inherit pname version;
- hash = "sha256-h8pfqTWKAYZFKTkr1k4CcVjrlK/KfHdmsYZu8n7MuY4=";
+ hash = "sha256-AjOn+NlZB5MY9gUrCTnCf2il3oa6YB8lye5oaftfWIk=";
};
patches = [
@@ -58,10 +58,6 @@ python3.pkgs.buildPythonApplication rec {
# unsandboxed non-NixOS builds, see:
# https://github.com/NixOS/nixpkgs/issues/86131#issuecomment-711051774
./boost-Do-not-add-system-paths-on-nix.patch
-
- # Meson tries to update ld.so.cache which breaks when the target architecture
- # differs from the build host's.
- ./do-not-update-ldconfig-cache.patch
] ++ lib.optionals withDarwinFrameworksGtkDocPatch [
# Fix building gtkdoc for GLib
# https://github.com/mesonbuild/meson/pull/10186
diff --git a/pkgs/development/tools/build-managers/meson/do-not-update-ldconfig-cache.patch b/pkgs/development/tools/build-managers/meson/do-not-update-ldconfig-cache.patch
deleted file mode 100644
index 884023aaa7eb..000000000000
--- a/pkgs/development/tools/build-managers/meson/do-not-update-ldconfig-cache.patch
+++ /dev/null
@@ -1,12 +0,0 @@
-diff --git a/mesonbuild/minstall.py b/mesonbuild/minstall.py
-index cb87faf5c..878ec4cd6 100644
---- a/mesonbuild/minstall.py
-+++ b/mesonbuild/minstall.py
-@@ -551,7 +551,6 @@ class Installer:
- self.install_emptydir(d, dm, destdir, fullprefix)
- self.install_data(d, dm, destdir, fullprefix)
- self.restore_selinux_contexts(destdir)
-- self.apply_ldconfig(dm, destdir)
- self.run_install_script(d, destdir, fullprefix)
- if not self.did_install_something:
- self.log('Nothing to install.')
diff --git a/pkgs/development/tools/build-managers/meson/fix-gtkdoc-when-using-multiple-apple-frameworks.patch b/pkgs/development/tools/build-managers/meson/fix-gtkdoc-when-using-multiple-apple-frameworks.patch
index eb6d9718bcb2..6c237e92dd11 100644
--- a/pkgs/development/tools/build-managers/meson/fix-gtkdoc-when-using-multiple-apple-frameworks.patch
+++ b/pkgs/development/tools/build-managers/meson/fix-gtkdoc-when-using-multiple-apple-frameworks.patch
@@ -1,4 +1,4 @@
-From 0a008a6c7ecee19f35c8b7ab17b1470d0d1a8a15 Mon Sep 17 00:00:00 2001
+From b8ba462ae72e0818898357464263ec84722f6d4c Mon Sep 17 00:00:00 2001
From: Jan Tojnar
Date: Sat, 26 Mar 2022 02:26:27 +0100
Subject: [PATCH] gnome: Fix gtkdoc when using multiple Apple frameworks
@@ -11,13 +11,16 @@ Picked from https://github.com/mesonbuild/meson/pull/10186
Also pick https://github.com/mesonbuild/meson/commit/68e684d51f1e469e0d9f4b499ffda15146cad98a when resolving conflict.
diff --git a/mesonbuild/modules/gnome.py b/mesonbuild/modules/gnome.py
-index 7113f28d2..d3269b53f 100644
+index 214f97ac3..0521b2605 100644
--- a/mesonbuild/modules/gnome.py
+++ b/mesonbuild/modules/gnome.py
-@@ -384,13 +384,14 @@ class GnomeModule(ExtensionModule):
- def _get_link_args(self, state, lib, depends, include_rpath=False,
- use_gir_args=False):
- link_command = []
+@@ -593,15 +593,16 @@ class GnomeModule(ExtensionModule):
+ lib: T.Union[build.SharedLibrary, build.StaticLibrary],
+ depends: T.List[build.BuildTarget],
+ include_rpath: bool = False,
+- use_gir_args: bool = False) -> T.List[str]:
++ use_gir_args: bool = False) -> T.Tuple[T.List[str], T.List[T.Union[build.BuildTarget, 'build.GeneratedTypes', 'FileOrString']]]:
+ link_command: T.List[str] = []
+ new_depends = list(depends)
# Construct link args
if isinstance(lib, build.SharedLibrary):
@@ -30,42 +33,36 @@ index 7113f28d2..d3269b53f 100644
# Needed for the following binutils bug:
# https://github.com/mesonbuild/meson/issues/1911
# However, g-ir-scanner does not understand -Wl,-rpath
-@@ -404,18 +405,24 @@ class GnomeModule(ExtensionModule):
+@@ -615,19 +616,19 @@ class GnomeModule(ExtensionModule):
link_command.append('--extra-library=' + lib.name)
else:
link_command.append('-l' + lib.name)
- return link_command
--
-- def _get_dependencies_flags(self, deps, state, depends, include_rpath=False,
-- use_gir_args=False, separate_nodedup=False):
-- cflags = OrderedSet()
-- internal_ldflags = OrderedSet()
-- external_ldflags = OrderedSet()
+ return link_command, new_depends
-+
+
+- def _get_dependencies_flags(
+ def _get_dependencies_flags_raw(
-+ self, deps,
-+ state,
-+ depends,
-+ include_rpath: bool = False,
-+ use_gir_args: bool = False,
-+ ) -> T.Tuple[OrderedSet[str], OrderedSet[T.Union[str, T.Tuple[str, str]]], OrderedSet[T.Union[str, T.Tuple[str, str]]], OrderedSet[str],
-+ T.List]:
-+ cflags: OrderedSet[str] = OrderedSet()
+ self, deps: T.Sequence[T.Union['Dependency', build.SharedLibrary, build.StaticLibrary]],
+- state: 'ModuleState', depends: T.List[build.BuildTarget], include_rpath: bool = False,
+- use_gir_args: bool = False, separate_nodedup: bool = False
+- ) -> T.Tuple[OrderedSet[str], OrderedSet[str], OrderedSet[str], T.Optional[T.List[str]], OrderedSet[str]]:
++ state: 'ModuleState', depends: T.List[build.BuildTarget], include_rpath: bool,
++ use_gir_args: bool
++ ) -> T.Tuple[OrderedSet[str], OrderedSet[T.Union[str, T.Tuple[str, str]]], OrderedSet[T.Union[str, T.Tuple[str, str]]], T.Optional[T.List[str]], OrderedSet[str],
++ T.List[T.Union[build.BuildTarget, 'build.GeneratedTypes', 'FileOrString']]]:
+ cflags: OrderedSet[str] = OrderedSet()
+- internal_ldflags: OrderedSet[str] = OrderedSet()
+- external_ldflags: OrderedSet[str] = OrderedSet()
# External linker flags that can't be de-duped reliably because they
- # require two args in order, such as -framework AVFoundation
-- external_ldflags_nodedup = []
-- gi_includes = OrderedSet()
+- external_ldflags_nodedup: T.List[str] = []
+ # require two args in order, such as -framework AVFoundation will be stored as a tuple.
+ internal_ldflags: OrderedSet[T.Union[str, T.Tuple[str, str]]] = OrderedSet()
+ external_ldflags: OrderedSet[T.Union[str, T.Tuple[str, str]]] = OrderedSet()
-+ gi_includes: OrderedSet[str] = OrderedSet()
+ gi_includes: OrderedSet[str] = OrderedSet()
deps = mesonlib.listify(deps)
-+ depends = list(depends)
- for dep in deps:
- if isinstance(dep, Dependency):
-@@ -427,21 +434,20 @@ class GnomeModule(ExtensionModule):
+@@ -642,21 +643,20 @@ class GnomeModule(ExtensionModule):
cflags.update(state.get_include_args(dep.include_directories))
for lib in dep.libraries:
if isinstance(lib, build.SharedLibrary):
@@ -95,21 +92,21 @@ index 7113f28d2..d3269b53f 100644
for source in dep.sources:
if isinstance(source, GirTarget):
gi_includes.update([os.path.join(state.environment.get_build_dir(),
-@@ -469,7 +475,7 @@ class GnomeModule(ExtensionModule):
+@@ -684,7 +684,7 @@ class GnomeModule(ExtensionModule):
# If it's a framework arg, slurp the framework name too
# to preserve the order of arguments
- if lib == '-framework':
-- external_ldflags_nodedup += [lib, next(ldflags)]
-+ external_ldflags.update([(lib, next(ldflags))])
+ if flag == '-framework':
+- external_ldflags_nodedup += [flag, next(ldflags)]
++ external_ldflags.update([(flag, next(ldflags))])
else:
- external_ldflags.update([lib])
+ external_ldflags.update([flag])
elif isinstance(dep, (build.StaticLibrary, build.SharedLibrary)):
-@@ -480,21 +486,43 @@ class GnomeModule(ExtensionModule):
+@@ -695,21 +695,41 @@ class GnomeModule(ExtensionModule):
continue
if use_gir_args and self._gir_has_option('--extra-library'):
-- def fix_ldflags(ldflags):
-- fixed_ldflags = OrderedSet()
+- def fix_ldflags(ldflags: T.Iterable[str]) -> OrderedSet[str]:
+- fixed_ldflags: OrderedSet[str] = OrderedSet()
+ def fix_ldflags(ldflags: T.Iterable[T.Union[str, T.Tuple[str, str]]]) -> OrderedSet[T.Union[str, T.Tuple[str, str]]]:
+ fixed_ldflags: OrderedSet[T.Union[str, T.Tuple[str, str]]] = OrderedSet()
for ldflag in ldflags:
@@ -122,19 +119,17 @@ index 7113f28d2..d3269b53f 100644
external_ldflags = fix_ldflags(external_ldflags)
- if not separate_nodedup:
- external_ldflags.update(external_ldflags_nodedup)
-- return cflags, internal_ldflags, external_ldflags, gi_includes
+- return cflags, internal_ldflags, external_ldflags, None, gi_includes
- else:
- return cflags, internal_ldflags, external_ldflags, external_ldflags_nodedup, gi_includes
+ return cflags, internal_ldflags, external_ldflags, gi_includes, depends
+
+ def _get_dependencies_flags(
-+ self, deps,
-+ state,
-+ depends,
-+ include_rpath: bool = False,
-+ use_gir_args: bool = False,
++ self, deps: T.Sequence[T.Union['Dependency', build.SharedLibrary, build.StaticLibrary]],
++ state: 'ModuleState', depends: T.List[build.BuildTarget], include_rpath: bool = False,
++ use_gir_args: bool = False
+ ) -> T.Tuple[OrderedSet[str], T.List[str], T.List[str], OrderedSet[str],
-+ T.List]:
++ T.List[T.Union[build.BuildTarget, 'build.GeneratedTypes', 'FileOrString']]]:
+
+ cflags, internal_ldflags_raw, external_ldflags_raw, gi_includes, depends = self._get_dependencies_flags_raw(deps, state, depends, include_rpath, use_gir_args)
+ internal_ldflags: T.List[str] = []
@@ -153,24 +148,15 @@ index 7113f28d2..d3269b53f 100644
+ external_ldflags.extend(ldflag)
+ return cflags, internal_ldflags, external_ldflags, gi_includes, depends
- def _unwrap_gir_target(self, girtarget, state):
+ def _unwrap_gir_target(self, girtarget: T.Union[build.Executable, build.StaticLibrary, build.SharedLibrary], state: 'ModuleState'
+ ) -> T.Union[build.Executable, build.StaticLibrary, build.SharedLibrary]:
if not isinstance(girtarget, (build.Executable, build.SharedLibrary,
- build.StaticLibrary)):
-@@ -875,7 +903,7 @@ class GnomeModule(ExtensionModule):
+@@ -1056,7 +1076,7 @@ class GnomeModule(ExtensionModule):
# ldflags will be misinterpreted by gir scanner (showing
# spurious dependencies) but building GStreamer fails if they
# are not used here.
-- dep_cflags, dep_internal_ldflags, dep_external_ldflags, gi_includes = \
+- dep_cflags, dep_internal_ldflags, dep_external_ldflags, _, gi_includes = \
+ dep_cflags, dep_internal_ldflags, dep_external_ldflags, gi_includes, depends = \
self._get_dependencies_flags(deps, state, depends, use_gir_args=True)
scan_cflags = []
scan_cflags += list(self._get_scanner_cflags(cflags))
-@@ -1170,7 +1198,7 @@ class GnomeModule(ExtensionModule):
- deps = extract_as_list(kwargs, 'dependencies')
- cflags = []
- cflags.extend(mesonlib.stringlistify(kwargs.pop('c_args', [])))
-- deps_cflags, internal_ldflags, external_ldflags, gi_includes = \
-+ deps_cflags, internal_ldflags, external_ldflags, gi_includes, depends = \
- self._get_dependencies_flags(deps, state, depends, include_rpath=True)
- inc_dirs = mesonlib.extract_as_list(kwargs, 'include_directories')
- for incd in inc_dirs:
diff --git a/pkgs/development/tools/build-managers/meson/fix-rpath.patch b/pkgs/development/tools/build-managers/meson/fix-rpath.patch
index d34b6c4c4345..29bec7903ca9 100644
--- a/pkgs/development/tools/build-managers/meson/fix-rpath.patch
+++ b/pkgs/development/tools/build-managers/meson/fix-rpath.patch
@@ -1,9 +1,9 @@
--- a/mesonbuild/backend/backends.py
+++ b/mesonbuild/backend/backends.py
-@@ -456,6 +456,21 @@ class Backend:
- args.extend(self.environment.coredata.get_external_link_args(target.for_machine, lang))
- except Exception:
- pass
+@@ -723,6 +723,21 @@
+ @staticmethod
+ def get_rpath_dirs_from_link_args(args: T.List[str]) -> T.Set[str]:
+ dirs: T.Set[str] = set()
+
+ nix_ldflags = os.environ.get('NIX_LDFLAGS', '').split()
+ next_is_path = False
diff --git a/pkgs/development/tools/deadcode/default.nix b/pkgs/development/tools/deadcode/default.nix
index 014acc89e1f7..c5074cd03776 100644
--- a/pkgs/development/tools/deadcode/default.nix
+++ b/pkgs/development/tools/deadcode/default.nix
@@ -11,7 +11,7 @@ buildGoPackage rec {
rev = "210d2dc333e90c7e3eedf4f2242507a8e83ed4ab";
goPackagePath = "github.com/tsenart/deadcode";
- excludedPackages = "\\(cmd/fillswitch/test-fixtures\\)";
+ excludedPackages = "cmd/fillswitch/test-fixtures";
src = fetchFromGitHub {
inherit rev;
diff --git a/pkgs/development/tools/delve/default.nix b/pkgs/development/tools/delve/default.nix
index 478ef3b6fc68..f42046c284ec 100644
--- a/pkgs/development/tools/delve/default.nix
+++ b/pkgs/development/tools/delve/default.nix
@@ -5,7 +5,7 @@ buildGoPackage rec {
version = "1.8.2";
goPackagePath = "github.com/go-delve/delve";
- excludedPackages = "\\(_fixtures\\|scripts\\|service/test\\)";
+ excludedPackages = [ "_fixtures" "scripts" "service/test" ];
src = fetchFromGitHub {
owner = "go-delve";
diff --git a/pkgs/development/tools/documentation/doxygen/default.nix b/pkgs/development/tools/documentation/doxygen/default.nix
index a4a70dabd69d..5a0807974ede 100644
--- a/pkgs/development/tools/documentation/doxygen/default.nix
+++ b/pkgs/development/tools/documentation/doxygen/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "doxygen";
- version = "1.8.20";
+ version = "1.9.3";
src = fetchFromGitHub {
owner = "doxygen";
repo = "doxygen";
rev = "Release_${lib.replaceStrings [ "." ] [ "_" ] version}";
- sha256 = "17chvi3i80rj4750smpizf562xjzd2xcv5rfyh997pyvc1zbq5rh";
+ sha256 = "1xfsv31ffrv03qhxlscav0r5mdi3qz4654ib9cq35rvmxfj999bw";
};
nativeBuildInputs = [
@@ -30,19 +30,20 @@ stdenv.mkDerivation rec {
NIX_CFLAGS_COMPILE =
lib.optionalString stdenv.isDarwin "-mmacosx-version-min=10.9";
- enableParallelBuilding = false;
-
meta = {
license = lib.licenses.gpl2Plus;
- homepage = "http://doxygen.nl/";
+ homepage = "https://www.doxygen.nl/";
+ changelog = "https://www.doxygen.nl/manual/changelog.html";
description = "Source code documentation generator tool";
longDescription = ''
- Doxygen is a documentation system for C++, C, Java, Objective-C,
- Python, IDL (CORBA and Microsoft flavors), Fortran, VHDL, PHP,
- C\#, and to some extent D. It can generate an on-line
- documentation browser (in HTML) and/or an off-line reference
- manual (in LaTeX) from a set of documented source files.
+ Doxygen is the de facto standard tool for generating documentation from
+ annotated C++ sources, but it also supports other popular programming
+ languages such as C, Objective-C, C#, PHP, Java, Python, IDL (Corba,
+ Microsoft, and UNO/OpenOffice flavors), Fortran, VHDL and to some extent
+ D. It can generate an on-line documentation browser (in HTML) and/or an
+ off-line reference manual (in LaTeX) from a set of documented source
+ files.
'';
platforms = if qt5 != null then lib.platforms.linux else lib.platforms.unix;
diff --git a/pkgs/development/tools/gauge/default.nix b/pkgs/development/tools/gauge/default.nix
index 1048ca194411..4a300df0577c 100644
--- a/pkgs/development/tools/gauge/default.nix
+++ b/pkgs/development/tools/gauge/default.nix
@@ -4,7 +4,7 @@ buildGoModule rec {
pname = "gauge";
version = "1.4.3";
- excludedPackages = ''\(build\|man\)'';
+ excludedPackages = [ "build" "man" ];
src = fetchFromGitHub {
owner = "getgauge";
diff --git a/pkgs/development/tools/ginkgo/default.nix b/pkgs/development/tools/ginkgo/default.nix
index 6719d7103921..9985d43da2f7 100644
--- a/pkgs/development/tools/ginkgo/default.nix
+++ b/pkgs/development/tools/ginkgo/default.nix
@@ -14,7 +14,7 @@ buildGoModule rec {
# integration tests expect more file changes
# types tests are missing CodeLocation
- excludedPackages = "\\(integration\\|types\\)";
+ excludedPackages = [ "integration" "types" ];
meta = with lib; {
homepage = "https://onsi.github.io/ginkgo/";
diff --git a/pkgs/development/tools/go-motion/default.nix b/pkgs/development/tools/go-motion/default.nix
index 9ece650f0cb2..5004afc28e35 100644
--- a/pkgs/development/tools/go-motion/default.nix
+++ b/pkgs/development/tools/go-motion/default.nix
@@ -9,7 +9,6 @@ buildGoPackage rec {
rev = "218875ebe23806e7af82f3b5b14bb3355534f679";
goPackagePath = "github.com/fatih/motion";
- excludedPackages = "testdata";
src = fetchFromGitHub {
inherit rev;
diff --git a/pkgs/development/tools/gocode-gomod/default.nix b/pkgs/development/tools/gocode-gomod/default.nix
index fca346b78c42..c07d38b60733 100644
--- a/pkgs/development/tools/gocode-gomod/default.nix
+++ b/pkgs/development/tools/gocode-gomod/default.nix
@@ -9,8 +9,6 @@ buildGoModule rec {
# standard packages.
allowGoReference = true;
- excludedPackages = "internal/suggest/testdata";
-
src = fetchFromGitHub {
owner = "stamblerre";
repo = "gocode";
diff --git a/pkgs/development/tools/gocode/default.nix b/pkgs/development/tools/gocode/default.nix
index be9f70da9341..687b69cf2027 100644
--- a/pkgs/development/tools/gocode/default.nix
+++ b/pkgs/development/tools/gocode/default.nix
@@ -6,7 +6,6 @@ buildGoPackage rec {
rev = "4acdcbdea79de6b3dee1c637eca5cbea0fdbe37c";
goPackagePath = "github.com/mdempsky/gocode";
- excludedPackages = "internal/suggest/testdata";
# we must allow references to the original `go` package,
# because `gocode` needs to dig into $GOROOT to provide completions for the
diff --git a/pkgs/development/tools/gogetdoc/default.nix b/pkgs/development/tools/gogetdoc/default.nix
index 2a111a8d1ab3..6f7c189ea9d2 100644
--- a/pkgs/development/tools/gogetdoc/default.nix
+++ b/pkgs/development/tools/gogetdoc/default.nix
@@ -12,8 +12,6 @@ buildGoModule rec {
doCheck = false;
- excludedPackages = "\\(testdata\\)";
-
src = fetchFromGitHub {
inherit rev;
diff --git a/pkgs/development/tools/golint/default.nix b/pkgs/development/tools/golint/default.nix
index 3187f793127e..aa6ce6c7cda5 100644
--- a/pkgs/development/tools/golint/default.nix
+++ b/pkgs/development/tools/golint/default.nix
@@ -5,8 +5,6 @@ buildGoModule rec {
version = "20201208-${lib.strings.substring 0 7 rev}";
rev = "83fdc39ff7b56453e3793356bcff3070b9b96445";
- excludedPackages = "testdata";
-
# we must allow references to the original `go` package, as golint uses
# compiler go/build package to load the packages it's linting.
allowGoReference = true;
diff --git a/pkgs/development/tools/gotools/default.nix b/pkgs/development/tools/gotools/default.nix
index ea79baa96a70..9ea238233c36 100644
--- a/pkgs/development/tools/gotools/default.nix
+++ b/pkgs/development/tools/gotools/default.nix
@@ -38,9 +38,7 @@ buildGoModule rec {
export GOTOOLDIR=$out/bin
'';
- excludedPackages = "\\("
- + lib.concatStringsSep "\\|" ([ "testdata" "vet" "cover" ])
- + "\\)";
+ excludedPackages = [ "vet" "cover" ];
# Set GOTOOLDIR for derivations adding this to buildInputs
postInstall = ''
diff --git a/pkgs/development/tools/govers/default.nix b/pkgs/development/tools/govers/default.nix
index 5e2d89cfd5df..eb234c82fc08 100644
--- a/pkgs/development/tools/govers/default.nix
+++ b/pkgs/development/tools/govers/default.nix
@@ -1,16 +1,16 @@
-{ lib, buildGoPackage, fetchgit }:
+{ lib, buildGoPackage, fetchFromGitHub }:
buildGoPackage rec {
pname = "govers";
- version = "20160623-${lib.strings.substring 0 7 rev}";
- rev = "77fd787551fc5e7ae30696e009e334d52d2d3a43";
+ version = "unstable-2016-06-23";
goPackagePath = "github.com/rogpeppe/govers";
- src = fetchgit {
- inherit rev;
- url = "https://github.com/rogpeppe/govers";
- sha256 = "12w83vyi8mgn48fwdm2js693qcydimxapg8rk0yf01w0ab03r5wn";
+ src = fetchFromGitHub {
+ owner = "rogpeppe";
+ repo = "govers";
+ rev = "77fd787551fc5e7ae30696e009e334d52d2d3a43";
+ sha256 = "sha256-lpc8wFKAB+A8mBm9q3qNzTM8ktFS1MYdIvZVFP0eiIs=";
};
dontRenameImports = true;
diff --git a/pkgs/development/tools/ineffassign/default.nix b/pkgs/development/tools/ineffassign/default.nix
index 215809577523..111048b562f3 100644
--- a/pkgs/development/tools/ineffassign/default.nix
+++ b/pkgs/development/tools/ineffassign/default.nix
@@ -9,7 +9,6 @@ buildGoPackage rec {
rev = "1003c8bd00dc2869cb5ca5282e6ce33834fed514";
goPackagePath = "github.com/gordonklaus/ineffassign";
- excludedPackages = "testdata";
src = fetchFromGitHub {
inherit rev;
diff --git a/pkgs/development/tools/misc/patchelf/default.nix b/pkgs/development/tools/misc/patchelf/default.nix
index dcb4d2362c8e..6919cd0f23fb 100644
--- a/pkgs/development/tools/misc/patchelf/default.nix
+++ b/pkgs/development/tools/misc/patchelf/default.nix
@@ -7,11 +7,11 @@
stdenv.mkDerivation rec {
pname = "patchelf";
- version = "0.14.3";
+ version = "0.14.5";
src = fetchurl {
url = "https://github.com/NixOS/${pname}/releases/download/${version}/${pname}-${version}.tar.bz2";
- sha256 = "sha256-oBfsPSFSoZ/ZacDYez+LQ+MqZuT/q9yHZ6VgYrmuwnA=";
+ sha256 = "sha256-uaRvKYkyLrifpPYjfiCDbFe0VapDoyVF6gk7Qx2YL1w=";
};
setupHook = [ ./setup-hook.sh ];
diff --git a/pkgs/development/tools/misc/texinfo/6.8.nix b/pkgs/development/tools/misc/texinfo/6.8.nix
index 11435bf329f6..992f695bc92c 100644
--- a/pkgs/development/tools/misc/texinfo/6.8.nix
+++ b/pkgs/development/tools/misc/texinfo/6.8.nix
@@ -1,4 +1,8 @@
import ./common.nix {
version = "6.8";
sha256 = "1i7yb7mrp3inz25zbzv2pllr4y7d58v818f1as7iz8mw53nm7dwf";
+ patches = [
+ # glibc 2.34 compat
+ ./fix-glibc-2.34.patch
+ ];
}
diff --git a/pkgs/development/tools/misc/texinfo/common.nix b/pkgs/development/tools/misc/texinfo/common.nix
index b379df09a4b0..26732657eb9f 100644
--- a/pkgs/development/tools/misc/texinfo/common.nix
+++ b/pkgs/development/tools/misc/texinfo/common.nix
@@ -1,4 +1,4 @@
-{ version, sha256 }:
+{ version, sha256, patches ? [] }:
{ lib, stdenv, buildPackages, fetchurl, perl, xz, gettext
@@ -26,7 +26,7 @@ stdenv.mkDerivation {
inherit sha256;
};
- patches = optional crossBuildTools ./cross-tools-flags.patch;
+ patches = patches ++ optional crossBuildTools ./cross-tools-flags.patch;
# ncurses is required to build `makedoc'
# this feature is introduced by the ./cross-tools-flags.patch
diff --git a/pkgs/development/tools/misc/texinfo/fix-glibc-2.34.patch b/pkgs/development/tools/misc/texinfo/fix-glibc-2.34.patch
new file mode 100644
index 000000000000..60f2e63b7ce0
--- /dev/null
+++ b/pkgs/development/tools/misc/texinfo/fix-glibc-2.34.patch
@@ -0,0 +1,186 @@
+
+Patch by Vitezslav Crhonek
+Source: https://src.fedoraproject.org/rpms/texinfo/c/9b2cca4817fa4bd8d520fed05e9560fc7183dcdf?branch=rawhide
+
+diff -up texinfo-6.8/gnulib/lib/cdefs.h.orig texinfo-6.8/gnulib/lib/cdefs.h
+--- texinfo-6.8/gnulib/lib/cdefs.h.orig 2021-03-11 19:57:53.000000000 +0100
++++ texinfo-6.8/gnulib/lib/cdefs.h 2021-07-19 12:26:46.985176475 +0200
+@@ -321,15 +321,15 @@
+
+ /* The nonnull function attribute marks pointer parameters that
+ must not be NULL. */
+-#ifndef __attribute_nonnull__
++#ifndef __nonnull
+ # if __GNUC_PREREQ (3,3) || __glibc_has_attribute (__nonnull__)
+-# define __attribute_nonnull__(params) __attribute__ ((__nonnull__ params))
++# define __nonnull(params) __attribute__ ((__nonnull__ params))
+ # else
+-# define __attribute_nonnull__(params)
++# define __nonnull(params)
+ # endif
+-#endif
+-#ifndef __nonnull
+-# define __nonnull(params) __attribute_nonnull__ (params)
++#elif !defined __GLIBC__
++# undef __nonnull
++# define __nonnull(params) _GL_ATTRIBUTE_NONNULL (params)
+ #endif
+
+ /* If fortification mode, we warn about unused results of certain
+diff -up texinfo-6.8/gnulib/lib/libc-config.h.orig texinfo-6.8/gnulib/lib/libc-config.h
+--- texinfo-6.8/gnulib/lib/libc-config.h.orig 2021-03-11 19:57:54.000000000 +0100
++++ texinfo-6.8/gnulib/lib/libc-config.h 2021-07-19 12:27:58.810590975 +0200
+@@ -33,9 +33,9 @@
+ #include
+
+ /* On glibc this includes and and #defines
+- _FEATURES_H, __WORDSIZE, and __set_errno. On FreeBSD 11 and
+- DragonFlyBSD 5.9 it includes which defines __nonnull.
+- Elsewhere it is harmless. */
++ _FEATURES_H, __WORDSIZE, and __set_errno. On FreeBSD 11 it
++ includes which defines __nonnull. Elsewhere it
++ is harmless. */
+ #include
+
+ /* From glibc . */
+diff -up texinfo-6.8/gnulib/lib/malloc/dynarray-skeleton.c.orig texinfo-6.8/gnulib/lib/malloc/dynarray-skeleton.c
+--- texinfo-6.8/gnulib/lib/malloc/dynarray-skeleton.c.orig 2021-03-11 19:57:54.000000000 +0100
++++ texinfo-6.8/gnulib/lib/malloc/dynarray-skeleton.c 2021-07-19 12:24:46.878419397 +0200
+@@ -192,7 +192,7 @@ DYNARRAY_NAME (free__array__) (struct DY
+
+ /* Initialize a dynamic array object. This must be called before any
+ use of the object. */
+-__attribute_nonnull__ ((1))
++__nonnull ((1))
+ static void
+ DYNARRAY_NAME (init) (struct DYNARRAY_STRUCT *list)
+ {
+@@ -202,7 +202,7 @@ DYNARRAY_NAME (init) (struct DYNARRAY_ST
+ }
+
+ /* Deallocate the dynamic array and its elements. */
+-__attribute_maybe_unused__ __attribute_nonnull__ ((1))
++__attribute_maybe_unused__ __nonnull ((1))
+ static void
+ DYNARRAY_FREE (struct DYNARRAY_STRUCT *list)
+ {
+@@ -213,7 +213,7 @@ DYNARRAY_FREE (struct DYNARRAY_STRUCT *l
+ }
+
+ /* Return true if the dynamic array is in an error state. */
+-__attribute_nonnull__ ((1))
++__nonnull ((1))
+ static inline bool
+ DYNARRAY_NAME (has_failed) (const struct DYNARRAY_STRUCT *list)
+ {
+@@ -222,7 +222,7 @@ DYNARRAY_NAME (has_failed) (const struct
+
+ /* Mark the dynamic array as failed. All elements are deallocated as
+ a side effect. */
+-__attribute_nonnull__ ((1))
++__nonnull ((1))
+ static void
+ DYNARRAY_NAME (mark_failed) (struct DYNARRAY_STRUCT *list)
+ {
+@@ -236,7 +236,7 @@ DYNARRAY_NAME (mark_failed) (struct DYNA
+
+ /* Return the number of elements which have been added to the dynamic
+ array. */
+-__attribute_nonnull__ ((1))
++__nonnull ((1))
+ static inline size_t
+ DYNARRAY_NAME (size) (const struct DYNARRAY_STRUCT *list)
+ {
+@@ -245,7 +245,7 @@ DYNARRAY_NAME (size) (const struct DYNAR
+
+ /* Return a pointer to the array element at INDEX. Terminate the
+ process if INDEX is out of bounds. */
+-__attribute_nonnull__ ((1))
++__nonnull ((1))
+ static inline DYNARRAY_ELEMENT *
+ DYNARRAY_NAME (at) (struct DYNARRAY_STRUCT *list, size_t index)
+ {
+@@ -257,7 +257,7 @@ DYNARRAY_NAME (at) (struct DYNARRAY_STRU
+ /* Return a pointer to the first array element, if any. For a
+ zero-length array, the pointer can be NULL even though the dynamic
+ array has not entered the failure state. */
+-__attribute_nonnull__ ((1))
++__nonnull ((1))
+ static inline DYNARRAY_ELEMENT *
+ DYNARRAY_NAME (begin) (struct DYNARRAY_STRUCT *list)
+ {
+@@ -267,7 +267,7 @@ DYNARRAY_NAME (begin) (struct DYNARRAY_S
+ /* Return a pointer one element past the last array element. For a
+ zero-length array, the pointer can be NULL even though the dynamic
+ array has not entered the failure state. */
+-__attribute_nonnull__ ((1))
++__nonnull ((1))
+ static inline DYNARRAY_ELEMENT *
+ DYNARRAY_NAME (end) (struct DYNARRAY_STRUCT *list)
+ {
+@@ -294,7 +294,7 @@ DYNARRAY_NAME (add__) (struct DYNARRAY_S
+ /* Add ITEM at the end of the array, enlarging it by one element.
+ Mark *LIST as failed if the dynamic array allocation size cannot be
+ increased. */
+-__attribute_nonnull__ ((1))
++__nonnull ((1))
+ static inline void
+ DYNARRAY_NAME (add) (struct DYNARRAY_STRUCT *list, DYNARRAY_ELEMENT item)
+ {
+@@ -348,8 +348,7 @@ DYNARRAY_NAME (emplace__) (struct DYNARR
+ /* Allocate a place for a new element in *LIST and return a pointer to
+ it. The pointer can be NULL if the dynamic array cannot be
+ enlarged due to a memory allocation failure. */
+-__attribute_maybe_unused__ __attribute_warn_unused_result__
+-__attribute_nonnull__ ((1))
++__attribute_maybe_unused__ __attribute_warn_unused_result__ __nonnull ((1))
+ static
+ /* Avoid inlining with the larger initialization code. */
+ #if !(defined (DYNARRAY_ELEMENT_INIT) || defined (DYNARRAY_ELEMENT_FREE))
+@@ -373,7 +372,7 @@ DYNARRAY_NAME (emplace) (struct DYNARRAY
+ existing size, new elements are added (which can be initialized).
+ Otherwise, the list is truncated, and elements are freed. Return
+ false on memory allocation failure (and mark *LIST as failed). */
+-__attribute_maybe_unused__ __attribute_nonnull__ ((1))
++__attribute_maybe_unused__ __nonnull ((1))
+ static bool
+ DYNARRAY_NAME (resize) (struct DYNARRAY_STRUCT *list, size_t size)
+ {
+@@ -418,7 +417,7 @@ DYNARRAY_NAME (resize) (struct DYNARRAY_
+ }
+
+ /* Remove the last element of LIST if it is present. */
+-__attribute_maybe_unused__ __attribute_nonnull__ ((1))
++__attribute_maybe_unused__ __nonnull ((1))
+ static void
+ DYNARRAY_NAME (remove_last) (struct DYNARRAY_STRUCT *list)
+ {
+@@ -435,7 +434,7 @@ DYNARRAY_NAME (remove_last) (struct DYNA
+
+ /* Remove all elements from the list. The elements are freed, but the
+ list itself is not. */
+-__attribute_maybe_unused__ __attribute_nonnull__ ((1))
++__attribute_maybe_unused__ __nonnull ((1))
+ static void
+ DYNARRAY_NAME (clear) (struct DYNARRAY_STRUCT *list)
+ {
+@@ -453,8 +452,7 @@ DYNARRAY_NAME (clear) (struct DYNARRAY_S
+ stored in *RESULT if LIST refers to an empty list. On success, the
+ pointer in *RESULT is heap-allocated and must be deallocated using
+ free. */
+-__attribute_maybe_unused__ __attribute_warn_unused_result__
+-__attribute_nonnull__ ((1, 2))
++__attribute_maybe_unused__ __attribute_warn_unused_result__ __nonnull ((1, 2))
+ static bool
+ DYNARRAY_NAME (finalize) (struct DYNARRAY_STRUCT *list,
+ DYNARRAY_FINAL_TYPE *result)
+@@ -485,8 +483,7 @@ DYNARRAY_NAME (finalize) (struct DYNARRA
+ have a sentinel at the end). If LENGTHP is not NULL, the array
+ length is written to *LENGTHP. *LIST is re-initialized and can be
+ reused. */
+-__attribute_maybe_unused__ __attribute_warn_unused_result__
+-__attribute_nonnull__ ((1))
++__attribute_maybe_unused__ __attribute_warn_unused_result__ __nonnull ((1))
+ static DYNARRAY_ELEMENT *
+ DYNARRAY_NAME (finalize) (struct DYNARRAY_STRUCT *list, size_t *lengthp)
+ {
diff --git a/pkgs/development/tools/reftools/default.nix b/pkgs/development/tools/reftools/default.nix
index a31108f33812..0e8371e4a015 100644
--- a/pkgs/development/tools/reftools/default.nix
+++ b/pkgs/development/tools/reftools/default.nix
@@ -12,7 +12,7 @@ buildGoModule rec {
doCheck = false;
- excludedPackages = "\\(cmd/fillswitch/test-fixtures\\)";
+ excludedPackages = "cmd/fillswitch/test-fixtures";
src = fetchFromGitHub {
inherit rev;
diff --git a/pkgs/games/cataclysm-dda/common.nix b/pkgs/games/cataclysm-dda/common.nix
index 1701d84e8df7..af20169a6e08 100644
--- a/pkgs/games/cataclysm-dda/common.nix
+++ b/pkgs/games/cataclysm-dda/common.nix
@@ -49,7 +49,7 @@ stdenv.mkDerivation {
'';
makeFlags = [
- "PREFIX=$(out)" "LANGUAGES=all"
+ "PREFIX=$(out)" "LANGUAGES=all" "RUNTESTS=0"
(if useXdgDir then "USE_XDG_DIR=1" else "USE_HOME_DIR=1")
] ++ optionals (!debug) [
"RELEASE=1"
diff --git a/pkgs/games/nethack/default.nix b/pkgs/games/nethack/default.nix
index 2b29bddad93c..f6de3d57c130 100644
--- a/pkgs/games/nethack/default.nix
+++ b/pkgs/games/nethack/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, lib, fetchurl, coreutils, ncurses, gzip, flex, bison
+{ stdenv, lib, fetchurl, coreutils, ncurses, gzip, flex, bison, fetchpatch
, less
, buildPackages
, x11Mode ? false, qtMode ? false, libXaw, libXext, libXpm, bdftopcf, mkfontdir, pkg-config, qt5
@@ -24,6 +24,15 @@ in stdenv.mkDerivation rec {
else if qtMode then "nethack-qt"
else "nethack";
+ patches = [
+ # Don't unset `__warn_unused_result__`, breaks on glibc-2.34
+ (fetchpatch {
+ url = "https://github.com/NetHack/NetHack/commit/81d73ce417dda6a98e2e918e06922e68b67c53f7.patch";
+ sha256 = "sha256-PX9XtJTEE3K1yg/IwIzEIT+EZWi02gU+9msrsG9ZWQY=";
+ revert = true;
+ })
+ ];
+
src = fetchurl {
url = "https://nethack.org/download/${version}/nethack-${lib.replaceStrings ["."] [""] version}-src.tgz";
sha256 = "1liyckjp34j354qnxc1zn9730lh1p2dabrg1hap24z6xnqx0rpng";
diff --git a/pkgs/games/openmw/default.nix b/pkgs/games/openmw/default.nix
index edc8147a2b77..8746d3172ac8 100644
--- a/pkgs/games/openmw/default.nix
+++ b/pkgs/games/openmw/default.nix
@@ -83,5 +83,10 @@ mkDerivation rec {
license = licenses.gpl3Plus;
maintainers = with maintainers; [ abbradar marius851000 ];
platforms = platforms.linux;
+
+ # 2021-10-13, doesn't compile with glibc-2.34, maintainers prefer a fix on glibc's end.
+ # Can be marked as un-broken as soon as https://gitlab.com/OpenMW/openmw/-/merge_requests/1239
+ # is resolved and a patch is appliable here.
+ broken = true;
};
}
diff --git a/pkgs/games/steam/fhsenv.nix b/pkgs/games/steam/fhsenv.nix
index c5fba68b22a1..d18accd0d546 100644
--- a/pkgs/games/steam/fhsenv.nix
+++ b/pkgs/games/steam/fhsenv.nix
@@ -206,12 +206,6 @@ in buildFHSUserEnv rec {
++ steamPackages.steam-runtime-wrapped.overridePkgs
++ extraLibraries pkgs;
- extraBuildCommands = ''
- ln -s /usr/lib/libbz2.so usr/lib/libbz2.so.1.0
- '' + lib.optionalString (steam-runtime-wrapped-i686 != null) ''
- ln -s /usr/lib32/libbz2.so usr/lib32/libbz2.so.1.0
- '';
-
extraInstallCommands = ''
mkdir -p $out/share/applications
ln -s ${steam}/share/icons $out/share
@@ -269,7 +263,7 @@ in buildFHSUserEnv rec {
name = "steam-run";
targetPkgs = commonTargetPkgs;
- inherit multiPkgs extraBuildCommands profile extraInstallCommands;
+ inherit multiPkgs profile extraInstallCommands;
inherit unshareIpc unsharePid;
diff --git a/pkgs/misc/ghostscript/default.nix b/pkgs/misc/ghostscript/default.nix
index e80ad8a839fb..327cf2862346 100644
--- a/pkgs/misc/ghostscript/default.nix
+++ b/pkgs/misc/ghostscript/default.nix
@@ -29,11 +29,11 @@ let
in
stdenv.mkDerivation rec {
- pname = "ghostscript";
+ pname = "ghostscript${lib.optionalString (x11Support) "-with-X"}";
version = "9.55.0";
src = fetchurl {
- url = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/download/gs9${lib.versions.minor version}${lib.versions.patch version}/${pname}-${version}.tar.xz";
+ url = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/download/gs9${lib.versions.minor version}${lib.versions.patch version}/ghostscript-${version}.tar.xz";
sha512 = "27g72152mlwlalg232jxdhaf3ykgmqwi2pccbkwfygql1h9iz40plfbwbs1n0fkvm4zwzg5r9cr8g7w2dxih4jldiidv7rflxdy1is2";
};
diff --git a/pkgs/os-specific/darwin/apple-sdk-11.0/frameworks.nix b/pkgs/os-specific/darwin/apple-sdk-11.0/frameworks.nix
index 96c0475c087e..e9121b021164 100644
--- a/pkgs/os-specific/darwin/apple-sdk-11.0/frameworks.nix
+++ b/pkgs/os-specific/darwin/apple-sdk-11.0/frameworks.nix
@@ -89,6 +89,8 @@
IOBluetooth = { inherit CoreBluetooth IOKit; };
IOBluetoothUI = { inherit IOBluetooth; };
IOKit = {};
+ # `IOSurface` should depend on `Libsystem` (in place of `xpc`) but this currently causes build
+ # issues due to incompatibility issues between `Libsystem` and `libcxx`.
IOSurface = { inherit IOKit xpc; };
IOUSBHost = {};
IdentityLookup = {};
diff --git a/pkgs/os-specific/linux/apparmor/default.nix b/pkgs/os-specific/linux/apparmor/default.nix
index 5c1cf272e0e7..a7afd8386245 100644
--- a/pkgs/os-specific/linux/apparmor/default.nix
+++ b/pkgs/os-specific/linux/apparmor/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, lib, fetchurl, fetchpatch, makeWrapper, autoreconfHook
+{ stdenv, lib, fetchFromGitLab, fetchpatch, makeWrapper, autoreconfHook
, pkg-config, which
, flex, bison
, linuxHeaders ? stdenv.cc.libc.linuxHeaders
@@ -21,7 +21,7 @@
}:
let
- apparmor-version = "3.0.3";
+ apparmor-version = "3.0.4";
apparmor-meta = component: with lib; {
homepage = "https://apparmor.net/";
@@ -31,9 +31,11 @@ let
platforms = platforms.linux;
};
- apparmor-sources = fetchurl {
- url = "https://launchpad.net/apparmor/${lib.versions.majorMinor apparmor-version}/${apparmor-version}/+download/apparmor-${apparmor-version}.tar.gz";
- sha256 = "0nasq8pdmzkrf856yg1v8z5hcs0nn6gw2qr60ab0a7j9ixfv0g8m";
+ apparmor-sources = fetchFromGitLab {
+ owner = "apparmor";
+ repo = "apparmor";
+ rev = "v${apparmor-version}";
+ sha256 = "1a217j28rgfq4lsmpn0wv1xgmdr9ba8iysv9i6q477kj6z77zrb9";
};
aa-teardown = writeShellScript "aa-teardown" ''
@@ -48,8 +50,9 @@ let
substituteInPlace ./common/Make.rules \
--replace "/usr/bin/pod2man" "${buildPackages.perl}/bin/pod2man" \
--replace "/usr/bin/pod2html" "${buildPackages.perl}/bin/pod2html" \
- --replace "/usr/include/linux/capability.h" "${linuxHeaders}/include/linux/capability.h" \
--replace "/usr/share/man" "share/man"
+ substituteInPlace ./utils/Makefile \
+ --replace "/usr/include/linux/capability.h" "${linuxHeaders}/include/linux/capability.h"
'';
patches = lib.optionals stdenv.hostPlatform.isMusl [
@@ -60,6 +63,8 @@ let
})
];
+ python = python3.withPackages (ps: with ps; [ setuptools ]);
+
# Set to `true` after the next FIXME gets fixed or this gets some
# common derivation infra. Too much copy-paste to fix one by one.
doCheck = false;
@@ -86,19 +91,16 @@ let
ncurses
which
perl
- ] ++ lib.optional withPython python3;
+ ] ++ lib.optional withPython python;
buildInputs = lib.optional withPerl perl
- ++ lib.optional withPython python3;
+ ++ lib.optional withPython python;
# required to build apparmor-parser
dontDisableStatic = true;
prePatch = prePatchCommon + ''
substituteInPlace ./libraries/libapparmor/swig/perl/Makefile.am --replace install_vendor install_site
- substituteInPlace ./libraries/libapparmor/swig/perl/Makefile.in --replace install_vendor install_site
- substituteInPlace ./libraries/libapparmor/src/Makefile.am --replace "/usr/include/netinet/in.h" "${lib.getDev stdenv.cc.libc}/include/netinet/in.h"
- substituteInPlace ./libraries/libapparmor/src/Makefile.in --replace "/usr/include/netinet/in.h" "${lib.getDev stdenv.cc.libc}/include/netinet/in.h"
'';
inherit patches;
@@ -132,12 +134,12 @@ let
strictDeps = true;
- nativeBuildInputs = [ makeWrapper which python3 ];
+ nativeBuildInputs = [ makeWrapper which python ];
buildInputs = [
bash
perl
- python3
+ python
libapparmor
libapparmor.python
];
@@ -159,7 +161,7 @@ let
postInstall = ''
sed -i $out/bin/aa-unconfined -e "/my_env\['PATH'\]/d"
for prog in aa-audit aa-autodep aa-cleanprof aa-complain aa-disable aa-enforce aa-genprof aa-logprof aa-mergeprof aa-unconfined ; do
- wrapProgram $out/bin/$prog --prefix PYTHONPATH : "$out/lib/${python3.libPrefix}/site-packages:$PYTHONPATH"
+ wrapProgram $out/bin/$prog --prefix PYTHONPATH : "$out/lib/${python.sitePackages}:$PYTHONPATH"
done
substituteInPlace $out/bin/aa-notify \
diff --git a/pkgs/os-specific/linux/autofs/default.nix b/pkgs/os-specific/linux/autofs/default.nix
index 7b29f5a0e5cf..5e552301fe48 100644
--- a/pkgs/os-specific/linux/autofs/default.nix
+++ b/pkgs/os-specific/linux/autofs/default.nix
@@ -1,5 +1,7 @@
{ lib, stdenv, fetchurl, flex, bison, linuxHeaders, libtirpc, mount, umount, nfs-utils, e2fsprogs
-, libxml2, libkrb5, kmod, openldap, sssd, cyrus_sasl, openssl, rpcsvc-proto }:
+, libxml2, libkrb5, kmod, openldap, sssd, cyrus_sasl, openssl, rpcsvc-proto
+, fetchpatch
+}:
stdenv.mkDerivation rec {
version = "5.1.6";
@@ -10,6 +12,15 @@ stdenv.mkDerivation rec {
sha256 = "1vya21mb4izj3khcr3flibv7xc15vvx2v0rjfk5yd31qnzcy7pnx";
};
+ patches = [
+ # glibc 2.34 compat
+ (fetchpatch {
+ url = "https://src.fedoraproject.org/rpms/autofs/raw/cc745af5e42396d540d5b3b92fae486e232bf6bd/f/autofs-5.1.7-use-default-stack-size-for-threads.patch";
+ sha256 = "sha256-6ETDFbW7EhHR03xFWF+6OJBgn9NX3WW3bGhTNGodaOc=";
+ excludes = [ "CHANGELOG" ];
+ })
+ ];
+
preConfigure = ''
configureFlags="--enable-force-shutdown --enable-ignore-busy --with-path=$PATH"
export sssldir="${sssd}/lib/sssd/modules"
diff --git a/pkgs/os-specific/linux/conky/default.nix b/pkgs/os-specific/linux/conky/default.nix
index 9bd8890e7134..87f5bb052f48 100644
--- a/pkgs/os-specific/linux/conky/default.nix
+++ b/pkgs/os-specific/linux/conky/default.nix
@@ -1,7 +1,7 @@
{ config, lib, stdenv, fetchFromGitHub, pkg-config, cmake
# dependencies
-, glib, libXinerama
+, glib, libXinerama, catch2
# optional features without extra dependencies
, mpdSupport ? true
@@ -85,6 +85,8 @@ stdenv.mkDerivation rec {
sed -i 's/ Example: .*$//' doc/config_settings.xml
substituteInPlace cmake/Conky.cmake --replace "# set(RELEASE true)" "set(RELEASE true)"
+
+ cp ${catch2}/include/catch2/catch.hpp tests/catch2/catch.hpp
'';
NIX_LDFLAGS = "-lgcc_s";
@@ -133,6 +135,8 @@ stdenv.mkDerivation rec {
# src/conky.cc:137:23: fatal error: defconfig.h: No such file or directory
enableParallelBuilding = false;
+ doCheck = true;
+
meta = with lib; {
homepage = "http://conky.sourceforge.net/";
description = "Advanced, highly configurable system monitor based on torsmo";
diff --git a/pkgs/os-specific/linux/cryptsetup/default.nix b/pkgs/os-specific/linux/cryptsetup/default.nix
index a9bd508d16ec..be819802394e 100644
--- a/pkgs/os-specific/linux/cryptsetup/default.nix
+++ b/pkgs/os-specific/linux/cryptsetup/default.nix
@@ -5,7 +5,7 @@ stdenv.mkDerivation rec {
pname = "cryptsetup";
version = "2.4.3";
- outputs = [ "out" "dev" "man" ];
+ outputs = [ "bin" "out" "dev" "man" ];
separateDebugInfo = true;
src = fetchurl {
@@ -31,6 +31,12 @@ stdenv.mkDerivation rec {
"--enable-cryptsetup-reencrypt"
"--with-crypto_backend=openssl"
"--disable-ssh-token"
+ ] ++ lib.optionals stdenv.hostPlatform.isStatic [
+ "--disable-external-tokens"
+ # We have to override this even though we're removing token
+ # support, because the path still gets included in the binary even
+ # though it isn't used.
+ "--with-luks2-external-tokens-path=/"
];
nativeBuildInputs = [ pkg-config ];
diff --git a/pkgs/os-specific/linux/ell/default.nix b/pkgs/os-specific/linux/ell/default.nix
index aa8e3f15aab2..d79201cc4cd1 100644
--- a/pkgs/os-specific/linux/ell/default.nix
+++ b/pkgs/os-specific/linux/ell/default.nix
@@ -7,14 +7,14 @@
stdenv.mkDerivation rec {
pname = "ell";
- version = "0.46";
+ version = "0.49";
outputs = [ "out" "dev" ];
src = fetchgit {
url = "https://git.kernel.org/pub/scm/libs/ell/ell.git";
rev = version;
- sha256 = "sha256-Am1PNFFfSzII4Iaeq0wgfuVHSeMDjiDzYkNQWlnEHJY=";
+ sha256 = "sha256-/5ivelqRDvJuPVJqMs27VJUIq7/Dw6ROt/cmjSo309s=";
};
nativeBuildInputs = [
diff --git a/pkgs/os-specific/linux/fuse/common.nix b/pkgs/os-specific/linux/fuse/common.nix
index 7b9b35614a45..ac4deb19f51c 100644
--- a/pkgs/os-specific/linux/fuse/common.nix
+++ b/pkgs/os-specific/linux/fuse/common.nix
@@ -31,7 +31,13 @@ in stdenv.mkDerivation rec {
})
++ (if isFuse3
then [ ./fuse3-install.patch ./fuse3-Do-not-set-FUSERMOUNT_DIR.patch ]
- else [ ./fuse2-Do-not-set-FUSERMOUNT_DIR.patch ]);
+ else [
+ ./fuse2-Do-not-set-FUSERMOUNT_DIR.patch
+ (fetchpatch {
+ url = "https://gitweb.gentoo.org/repo/gentoo.git/plain/sys-fs/fuse/files/fuse-2.9.9-closefrom-glibc-2-34.patch?id=8a970396fca7aca2d5a761b8e7a8242f1eef14c9";
+ sha256 = "sha256-ELYBW/wxRcSMssv7ejCObrpsJHtOPJcGq33B9yHQII4=";
+ })
+ ]);
nativeBuildInputs = if isFuse3
then [ meson ninja pkg-config ]
diff --git a/pkgs/os-specific/linux/iwd/default.nix b/pkgs/os-specific/linux/iwd/default.nix
index 72ecaffe5f50..19f4301ff537 100644
--- a/pkgs/os-specific/linux/iwd/default.nix
+++ b/pkgs/os-specific/linux/iwd/default.nix
@@ -12,12 +12,12 @@
stdenv.mkDerivation rec {
pname = "iwd";
- version = "1.20";
+ version = "1.25";
src = fetchgit {
url = "https://git.kernel.org/pub/scm/network/wireless/iwd.git";
rev = version;
- sha256 = "sha256-GcqmMqrZSgvSrsY8FJbPynNWTzSi5A6kmyq+xJ+2i3Y=";
+ sha256 = "sha256-3IiRuILU2FKzXAQ0Q79DX2+nlNMcHNanS8m9GqjBBnU=";
};
outputs = [ "out" "man" "doc" ]
@@ -59,6 +59,7 @@ stdenv.mkDerivation rec {
postUnpack = ''
mkdir -p iwd/ell
ln -s ${ell.src}/ell/useful.h iwd/ell/useful.h
+ ln -s ${ell.src}/ell/asn1-private.h iwd/ell/asn1-private.h
patchShebangs .
'';
diff --git a/pkgs/os-specific/linux/kernel/common-config.nix b/pkgs/os-specific/linux/kernel/common-config.nix
index 153b41194b85..fdf54d302bf2 100644
--- a/pkgs/os-specific/linux/kernel/common-config.nix
+++ b/pkgs/os-specific/linux/kernel/common-config.nix
@@ -448,6 +448,9 @@ let
NLS_CODEPAGE_437 = module; # VFAT default for the codepage= mount option
NLS_ISO8859_1 = module; # VFAT default for the iocharset= mount option
+ # Needed to use the installation iso image. Not included in all defconfigs (e.g. arm64)
+ ISO9660_FS = module;
+
DEVTMPFS = yes;
UNICODE = whenAtLeast "5.2" yes; # Casefolding support for filesystems
@@ -906,6 +909,11 @@ let
ANDROID_BINDER_IPC = { optional = true; tristate = whenAtLeast "5.0" "y";};
ANDROID_BINDERFS = { optional = true; tristate = whenAtLeast "5.0" "y";};
ANDROID_BINDER_DEVICES = { optional = true; freeform = whenAtLeast "5.0" "binder,hwbinder,vndbinder";};
+
+ TASKSTATS = yes;
+ TASK_DELAY_ACCT = yes;
+ TASK_XACCT = yes;
+ TASK_IO_ACCOUNTING = yes;
} // optionalAttrs (stdenv.hostPlatform.system == "x86_64-linux" || stdenv.hostPlatform.system == "aarch64-linux") {
# Enable CPU/memory hotplug support
# Allows you to dynamically add & remove CPUs/memory to a VM client running NixOS without requiring a reboot
diff --git a/pkgs/os-specific/linux/kernel/generate-config.pl b/pkgs/os-specific/linux/kernel/generate-config.pl
index df807188f14f..7e12ca5d96a9 100644
--- a/pkgs/os-specific/linux/kernel/generate-config.pl
+++ b/pkgs/os-specific/linux/kernel/generate-config.pl
@@ -81,7 +81,7 @@ sub runConfig {
my $question = $1; my $name = $2; my $alts = $3;
my $answer = "";
# Build everything as a module if possible.
- $answer = "m" if $autoModules && $alts =~ /\/m/ && !($preferBuiltin && $alts =~ /Y/);
+ $answer = "m" if $autoModules && $alts =~ qr{\A(\w/)+m/(\w/)*\?\z} && !($preferBuiltin && $alts =~ /Y/);
$answer = $answers{$name} if defined $answers{$name};
print STDERR "QUESTION: $question, NAME: $name, ALTS: $alts, ANSWER: $answer\n" if $debug;
print OUT "$answer\n";
diff --git a/pkgs/os-specific/linux/kmod/default.nix b/pkgs/os-specific/linux/kmod/default.nix
index a1a1906ba9ce..0411bae2060c 100644
--- a/pkgs/os-specific/linux/kmod/default.nix
+++ b/pkgs/os-specific/linux/kmod/default.nix
@@ -16,6 +16,8 @@ in stdenv.mkDerivation rec {
sha256 = "0am54mi5rk72g5q7k6l6f36gw3r9vwgjmyna43ywcjhqmakyx00b";
};
+ outputs = [ "out" "dev" "lib" ];
+
nativeBuildInputs = [ autoreconfHook pkg-config libxslt ];
buildInputs = [ xz zstd ] ++ lib.optional stdenv.isDarwin elf-header;
diff --git a/pkgs/os-specific/linux/libcap/default.nix b/pkgs/os-specific/linux/libcap/default.nix
index 2f12d2fea38c..750e26313cfe 100644
--- a/pkgs/os-specific/linux/libcap/default.nix
+++ b/pkgs/os-specific/linux/libcap/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, lib, buildPackages, fetchurl, attr, perl, runtimeShell
+{ stdenv, lib, buildPackages, fetchurl, attr, runtimeShell
, usePam ? !isStatic, pam ? null
, isStatic ? stdenv.hostPlatform.isStatic
}:
@@ -7,18 +7,17 @@ assert usePam -> pam != null;
stdenv.mkDerivation rec {
pname = "libcap";
- version = "2.49";
+ version = "2.63";
src = fetchurl {
url = "mirror://kernel/linux/libs/security/linux-privs/libcap2/${pname}-${version}.tar.xz";
- sha256 = "sha256-6YvE2TZFCC7Hh3MLD9GnErOIgkZcUFd33hfDOIMe4YE=";
+ sha256 = "sha256-DGN7j0T8fYYneH6c9X8VrAbB3cy1PkH+7FSWvjRm938=";
};
outputs = [ "out" "dev" "lib" "man" "doc" ]
++ lib.optional usePam "pam";
depsBuildBuild = [ buildPackages.stdenv.cc ];
- nativeBuildInputs = [ perl ];
buildInputs = lib.optional usePam pam;
@@ -31,7 +30,9 @@ stdenv.mkDerivation rec {
"CC:=$(CC)"
] ++ lib.optional isStatic "SHARED=no";
- prePatch = ''
+ postPatch = ''
+ patchShebangs ./progs/mkcapshdoc.sh
+
# use full path to bash
substituteInPlace progs/capsh.c --replace "/bin/bash" "${runtimeShell}"
diff --git a/pkgs/os-specific/linux/nftables/default.nix b/pkgs/os-specific/linux/nftables/default.nix
index 0b6291226bc8..8485a868d8a5 100644
--- a/pkgs/os-specific/linux/nftables/default.nix
+++ b/pkgs/os-specific/linux/nftables/default.nix
@@ -1,7 +1,8 @@
{ lib, stdenv, fetchurl, pkg-config, bison, file, flex
, asciidoc, libxslt, findXMLCatalogs, docbook_xml_dtd_45, docbook_xsl
, libmnl, libnftnl, libpcap
-, gmp, jansson, readline
+, gmp, jansson, libedit
+, autoreconfHook, fetchpatch
, withDebugSymbols ? false
, withPython ? false , python3
, withXtables ? true , iptables
@@ -10,22 +11,23 @@
with lib;
stdenv.mkDerivation rec {
- version = "1.0.1";
+ version = "1.0.2";
pname = "nftables";
src = fetchurl {
url = "https://netfilter.org/projects/nftables/files/${pname}-${version}.tar.bz2";
- sha256 = "08x4xw0s5sap3q7jfr91v7mrkxrydi4dvsckw85ims0qb1ibmviw";
+ sha256 = "00jcjn1pl7qyqpg8pd4yhlkys7wbj4vkzgg73n27nmplzips6a0b";
};
nativeBuildInputs = [
+ autoreconfHook
pkg-config bison file flex
asciidoc docbook_xml_dtd_45 docbook_xsl findXMLCatalogs libxslt
];
buildInputs = [
libmnl libnftnl libpcap
- gmp jansson readline
+ gmp jansson libedit
] ++ optional withXtables iptables
++ optional withPython python3;
@@ -33,9 +35,17 @@ stdenv.mkDerivation rec {
substituteInPlace ./configure --replace /usr/bin/file ${file}/bin/file
'';
+ patches = [
+ # fix build after 1.0.2 release, drop when updating to a newer release
+ (fetchpatch {
+ url = "https://git.netfilter.org/nftables/patch/?id=18a08fb7f0443f8bde83393bd6f69e23a04246b3";
+ sha256 = "03dzhd7fhg0d20ly4rffk4ra7wlxp731892dhp8zw67jwhys9ywz";
+ })
+ ];
+
configureFlags = [
"--with-json"
- "--with-cli=readline" # TODO: maybe switch to editline
+ "--with-cli=editline"
] ++ optional (!withDebugSymbols) "--disable-debug"
++ optional (!withPython) "--disable-python"
++ optional withPython "--enable-python"
diff --git a/pkgs/os-specific/linux/shadow/default.nix b/pkgs/os-specific/linux/shadow/default.nix
index 2e4ae1649ea8..5537f9f6aacb 100644
--- a/pkgs/os-specific/linux/shadow/default.nix
+++ b/pkgs/os-specific/linux/shadow/default.nix
@@ -19,13 +19,13 @@ in
stdenv.mkDerivation rec {
pname = "shadow";
- version = "4.8.1";
+ version = "4.11.1";
src = fetchFromGitHub {
owner = "shadow-maint";
repo = "shadow";
- rev = version;
- sha256 = "13407r6qwss00504qy740jghb2dzd561la7dhp47rg8w3g8jarpn";
+ rev = "v${version}";
+ sha256 = "sha256-PxLX5V0t18JftT5wT41krNv18Ew7Kz3MfZkOi/80ODA=";
};
buildInputs = lib.optional (pam != null && stdenv.isLinux) pam;
diff --git a/pkgs/os-specific/linux/systemd/0001-Start-device-units-for-uninitialised-encrypted-devic.patch b/pkgs/os-specific/linux/systemd/0001-Start-device-units-for-uninitialised-encrypted-devic.patch
index a87c59558e01..404b0d2ee6f3 100644
--- a/pkgs/os-specific/linux/systemd/0001-Start-device-units-for-uninitialised-encrypted-devic.patch
+++ b/pkgs/os-specific/linux/systemd/0001-Start-device-units-for-uninitialised-encrypted-devic.patch
@@ -1,4 +1,4 @@
-From 93b2d29de784c68d1b4d70d7f214b19432aec6a8 Mon Sep 17 00:00:00 2001
+From 8622539fe2ce67934ed2e60626a2303ef8191e40 Mon Sep 17 00:00:00 2001
From: Eelco Dolstra
Date: Tue, 8 Jan 2013 15:46:30 +0100
Subject: [PATCH 01/19] Start device units for uninitialised encrypted devices
@@ -28,5 +28,5 @@ index 25b8a590a6..d18999ea87 100644
SUBSYSTEM=="block", ENV{ID_PART_GPT_AUTO_ROOT}=="1", ENV{ID_FS_TYPE}!="crypto_LUKS", SYMLINK+="gpt-auto-root"
SUBSYSTEM=="block", ENV{ID_PART_GPT_AUTO_ROOT}=="1", ENV{ID_FS_TYPE}=="crypto_LUKS", SYMLINK+="gpt-auto-root-luks"
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0002-Don-t-try-to-unmount-nix-or-nix-store.patch b/pkgs/os-specific/linux/systemd/0002-Don-t-try-to-unmount-nix-or-nix-store.patch
index e9fedd239f47..d37ace3250c2 100644
--- a/pkgs/os-specific/linux/systemd/0002-Don-t-try-to-unmount-nix-or-nix-store.patch
+++ b/pkgs/os-specific/linux/systemd/0002-Don-t-try-to-unmount-nix-or-nix-store.patch
@@ -1,4 +1,4 @@
-From 41edb381df0326e216b3c569d2cd5764591267d9 Mon Sep 17 00:00:00 2001
+From a845786195182c376b72a85433e278c35243676d Mon Sep 17 00:00:00 2001
From: Eelco Dolstra
Date: Fri, 12 Apr 2013 13:16:57 +0200
Subject: [PATCH 02/19] Don't try to unmount /nix or /nix/store
@@ -25,10 +25,10 @@ index f683f05981..5a04c2c2a6 100644
"/etc"))
return true;
diff --git a/src/shutdown/umount.c b/src/shutdown/umount.c
-index 1f945b7875..6df9d383ba 100644
+index f5a2cb20c1..51608d24c0 100644
--- a/src/shutdown/umount.c
+++ b/src/shutdown/umount.c
-@@ -508,6 +508,8 @@ static int delete_md(MountPoint *m) {
+@@ -502,6 +502,8 @@ static int delete_md(MountPoint *m) {
static bool nonunmountable_path(const char *path) {
return path_equal(path, "/")
@@ -38,5 +38,5 @@ index 1f945b7875..6df9d383ba 100644
|| path_equal(path, "/usr")
#endif
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0003-Fix-NixOS-containers.patch b/pkgs/os-specific/linux/systemd/0003-Fix-NixOS-containers.patch
index 217629f7d6ac..56c6238b81f2 100644
--- a/pkgs/os-specific/linux/systemd/0003-Fix-NixOS-containers.patch
+++ b/pkgs/os-specific/linux/systemd/0003-Fix-NixOS-containers.patch
@@ -1,4 +1,4 @@
-From 43620479f6bfbbc4c3eed28947e0676c817acb7c Mon Sep 17 00:00:00 2001
+From d33f3461fa2202ef9b0d6cdf2137c510c59fb052 Mon Sep 17 00:00:00 2001
From: Eelco Dolstra
Date: Wed, 16 Apr 2014 10:59:28 +0200
Subject: [PATCH 03/19] Fix NixOS containers
@@ -10,10 +10,10 @@ container, so checking early whether it exists will fail.
1 file changed, 2 insertions(+)
diff --git a/src/nspawn/nspawn.c b/src/nspawn/nspawn.c
-index 575b9da447..438ca294db 100644
+index 8f17ab8810..197e5aa252 100644
--- a/src/nspawn/nspawn.c
+++ b/src/nspawn/nspawn.c
-@@ -5590,6 +5590,7 @@ static int run(int argc, char *argv[]) {
+@@ -5625,6 +5625,7 @@ static int run(int argc, char *argv[]) {
goto finish;
}
} else {
@@ -21,7 +21,7 @@ index 575b9da447..438ca294db 100644
const char *p, *q;
if (arg_pivot_root_new)
-@@ -5604,6 +5605,7 @@ static int run(int argc, char *argv[]) {
+@@ -5639,6 +5640,7 @@ static int run(int argc, char *argv[]) {
r = -EINVAL;
goto finish;
}
@@ -30,5 +30,5 @@ index 575b9da447..438ca294db 100644
} else {
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0004-Look-for-fsck-in-the-right-place.patch b/pkgs/os-specific/linux/systemd/0004-Look-for-fsck-in-the-right-place.patch
index f7b768af515f..36d0ee0cde24 100644
--- a/pkgs/os-specific/linux/systemd/0004-Look-for-fsck-in-the-right-place.patch
+++ b/pkgs/os-specific/linux/systemd/0004-Look-for-fsck-in-the-right-place.patch
@@ -1,4 +1,4 @@
-From a08ed6697974d7f7dabe60d42bbc9e31a10f7e23 Mon Sep 17 00:00:00 2001
+From 8fd5968163f3a1cb5f196d934756ba08ccaa5b1e Mon Sep 17 00:00:00 2001
From: Eelco Dolstra
Date: Thu, 1 May 2014 14:10:10 +0200
Subject: [PATCH 04/19] Look for fsck in the right place
@@ -8,7 +8,7 @@ Subject: [PATCH 04/19] Look for fsck in the right place
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/fsck/fsck.c b/src/fsck/fsck.c
-index cd7adfaeb9..68cebdd158 100644
+index 745d01ff50..dd4eef45c3 100644
--- a/src/fsck/fsck.c
+++ b/src/fsck/fsck.c
@@ -368,7 +368,7 @@ static int run(int argc, char *argv[]) {
@@ -21,5 +21,5 @@ index cd7adfaeb9..68cebdd158 100644
cmdline[i++] = "-T";
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0005-Add-some-NixOS-specific-unit-directories.patch b/pkgs/os-specific/linux/systemd/0005-Add-some-NixOS-specific-unit-directories.patch
index 7ebf07d0a82b..6acac84a9d28 100644
--- a/pkgs/os-specific/linux/systemd/0005-Add-some-NixOS-specific-unit-directories.patch
+++ b/pkgs/os-specific/linux/systemd/0005-Add-some-NixOS-specific-unit-directories.patch
@@ -1,4 +1,4 @@
-From ddcfae6de8c460903c5db8c536ffeb5771e976f8 Mon Sep 17 00:00:00 2001
+From 90d1a90d3147e9c8db5caec8befabda270e755d4 Mon Sep 17 00:00:00 2001
From: Eelco Dolstra
Date: Fri, 19 Dec 2014 14:46:17 +0100
Subject: [PATCH 05/19] Add some NixOS-specific unit directories
@@ -14,10 +14,10 @@ Also, remove /usr and /lib as these don't exist on NixOS.
2 files changed, 6 insertions(+), 19 deletions(-)
diff --git a/src/basic/path-lookup.c b/src/basic/path-lookup.c
-index 05eb17d66c..1cd141d012 100644
+index 6fb8c40e7a..142ecdecec 100644
--- a/src/basic/path-lookup.c
+++ b/src/basic/path-lookup.c
-@@ -91,11 +91,7 @@ int xdg_user_data_dir(char **ret, const char *suffix) {
+@@ -92,11 +92,7 @@ int xdg_user_data_dir(char **ret, const char *suffix) {
}
static const char* const user_data_unit_paths[] = {
@@ -29,7 +29,7 @@ index 05eb17d66c..1cd141d012 100644
NULL
};
-@@ -613,15 +609,13 @@ int lookup_paths_init(
+@@ -614,15 +610,13 @@ int lookup_paths_init(
persistent_config,
SYSTEM_CONFIG_UNIT_DIR,
"/etc/systemd/system",
@@ -46,7 +46,7 @@ index 05eb17d66c..1cd141d012 100644
STRV_IFNOTNULL(generator_late));
break;
-@@ -637,14 +631,11 @@ int lookup_paths_init(
+@@ -638,14 +632,11 @@ int lookup_paths_init(
persistent_config,
USER_CONFIG_UNIT_DIR,
"/etc/systemd/user",
@@ -62,7 +62,7 @@ index 05eb17d66c..1cd141d012 100644
STRV_IFNOTNULL(generator_late));
break;
-@@ -794,7 +785,6 @@ char **generator_binary_paths(UnitFileScope scope) {
+@@ -795,7 +786,6 @@ char **generator_binary_paths(UnitFileScope scope) {
case UNIT_FILE_SYSTEM:
add = strv_new("/run/systemd/system-generators",
"/etc/systemd/system-generators",
@@ -70,7 +70,7 @@ index 05eb17d66c..1cd141d012 100644
SYSTEM_GENERATOR_DIR);
break;
-@@ -802,7 +792,6 @@ char **generator_binary_paths(UnitFileScope scope) {
+@@ -803,7 +793,6 @@ char **generator_binary_paths(UnitFileScope scope) {
case UNIT_FILE_USER:
add = strv_new("/run/systemd/user-generators",
"/etc/systemd/user-generators",
@@ -78,7 +78,7 @@ index 05eb17d66c..1cd141d012 100644
USER_GENERATOR_DIR);
break;
-@@ -841,12 +830,10 @@ char **env_generator_binary_paths(bool is_system) {
+@@ -842,12 +831,10 @@ char **env_generator_binary_paths(bool is_system) {
if (is_system)
add = strv_new("/run/systemd/system-environment-generators",
"/etc/systemd/system-environment-generators",
@@ -122,5 +122,5 @@ index fc0f8c34fa..162432e77f 100644
systemd_sleep_dir=${root_prefix}/lib/systemd/system-sleep
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0006-Get-rid-of-a-useless-message-in-user-sessions.patch b/pkgs/os-specific/linux/systemd/0006-Get-rid-of-a-useless-message-in-user-sessions.patch
index 0c09107c5ef2..438d841bb1c7 100644
--- a/pkgs/os-specific/linux/systemd/0006-Get-rid-of-a-useless-message-in-user-sessions.patch
+++ b/pkgs/os-specific/linux/systemd/0006-Get-rid-of-a-useless-message-in-user-sessions.patch
@@ -1,4 +1,4 @@
-From b39b8871bcaa07280d6b0cf2226b1a3be31232b8 Mon Sep 17 00:00:00 2001
+From 213279752124dc4a57a4189df9b5b2e96feaa0b3 Mon Sep 17 00:00:00 2001
From: Eelco Dolstra
Date: Mon, 11 May 2015 15:39:38 +0200
Subject: [PATCH 06/19] Get rid of a useless message in user sessions
@@ -13,10 +13,10 @@ in containers.
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/src/core/manager.c b/src/core/manager.c
-index 34891a8754..b9b4789720 100644
+index 9368a1dfa1..5b0bdb1bc7 100644
--- a/src/core/manager.c
+++ b/src/core/manager.c
-@@ -1375,7 +1375,8 @@ static unsigned manager_dispatch_stop_when_bound_queue(Manager *m) {
+@@ -1408,7 +1408,8 @@ static unsigned manager_dispatch_stop_when_bound_queue(Manager *m) {
if (!unit_is_bound_by_inactive(u, &culprit))
continue;
@@ -27,5 +27,5 @@ index 34891a8754..b9b4789720 100644
/* If stopping a unit fails continuously we might enter a stop loop here, hence stop acting on the
* service being unnecessary after a while. */
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0007-hostnamed-localed-timedated-disable-methods-that-cha.patch b/pkgs/os-specific/linux/systemd/0007-hostnamed-localed-timedated-disable-methods-that-cha.patch
index d7649b5e44a7..a93488afbf92 100644
--- a/pkgs/os-specific/linux/systemd/0007-hostnamed-localed-timedated-disable-methods-that-cha.patch
+++ b/pkgs/os-specific/linux/systemd/0007-hostnamed-localed-timedated-disable-methods-that-cha.patch
@@ -1,4 +1,4 @@
-From 566208aea81057789218b959f4d0e898eec54fc9 Mon Sep 17 00:00:00 2001
+From 14474d5e116609ce4fac60d779b08fa3eab840c3 Mon Sep 17 00:00:00 2001
From: Gabriel Ebner
Date: Sun, 6 Dec 2015 14:26:36 +0100
Subject: [PATCH 07/19] hostnamed, localed, timedated: disable methods that
@@ -11,10 +11,10 @@ Subject: [PATCH 07/19] hostnamed, localed, timedated: disable methods that
3 files changed, 25 insertions(+)
diff --git a/src/hostname/hostnamed.c b/src/hostname/hostnamed.c
-index 36702f2fb0..669257ea2f 100644
+index b20a93ad81..6292fca4fc 100644
--- a/src/hostname/hostnamed.c
+++ b/src/hostname/hostnamed.c
-@@ -797,6 +797,9 @@ static int method_set_static_hostname(sd_bus_message *m, void *userdata, sd_bus_
+@@ -813,6 +813,9 @@ static int method_set_static_hostname(sd_bus_message *m, void *userdata, sd_bus_
if (r < 0)
return r;
@@ -24,7 +24,7 @@ index 36702f2fb0..669257ea2f 100644
name = empty_to_null(name);
context_read_etc_hostname(c);
-@@ -860,6 +863,9 @@ static int set_machine_info(Context *c, sd_bus_message *m, int prop, sd_bus_mess
+@@ -876,6 +879,9 @@ static int set_machine_info(Context *c, sd_bus_message *m, int prop, sd_bus_mess
if (r < 0)
return r;
@@ -104,5 +104,5 @@ index 66b454269d..0a8fe25d0f 100644
if (r < 0)
return r;
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0008-Fix-hwdb-paths.patch b/pkgs/os-specific/linux/systemd/0008-Fix-hwdb-paths.patch
index f938b553c9f5..e1bc44a148ea 100644
--- a/pkgs/os-specific/linux/systemd/0008-Fix-hwdb-paths.patch
+++ b/pkgs/os-specific/linux/systemd/0008-Fix-hwdb-paths.patch
@@ -1,4 +1,4 @@
-From 3b9983969de2a86929768f6362ed41c20dd13bd3 Mon Sep 17 00:00:00 2001
+From d668df39728c992ec0c691ef6e76664e7121f5bd Mon Sep 17 00:00:00 2001
From: Nikolay Amiantov
Date: Thu, 7 Jul 2016 02:47:13 +0300
Subject: [PATCH 08/19] Fix hwdb paths
@@ -24,5 +24,5 @@ index 5ddc2211e6..ee621eec46 100644
+ "/etc/udev/hwdb.bin\0"
+
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0009-Change-usr-share-zoneinfo-to-etc-zoneinfo.patch b/pkgs/os-specific/linux/systemd/0009-Change-usr-share-zoneinfo-to-etc-zoneinfo.patch
index 87cf1afc7d22..68d40980ab16 100644
--- a/pkgs/os-specific/linux/systemd/0009-Change-usr-share-zoneinfo-to-etc-zoneinfo.patch
+++ b/pkgs/os-specific/linux/systemd/0009-Change-usr-share-zoneinfo-to-etc-zoneinfo.patch
@@ -1,4 +1,4 @@
-From b5966b6abb9696798618367cab33d1fed317734f Mon Sep 17 00:00:00 2001
+From dd59ce5f1bbdafb0b92f8aeacc68b000ec347a61 Mon Sep 17 00:00:00 2001
From: Nikolay Amiantov
Date: Tue, 11 Oct 2016 13:12:08 +0300
Subject: [PATCH 09/19] Change /usr/share/zoneinfo to /etc/zoneinfo
@@ -35,10 +35,10 @@ index e486474c44..5f373d0723 100644
Etc/UTC. The resulting link should lead to the
corresponding binary
diff --git a/src/basic/time-util.c b/src/basic/time-util.c
-index 5d162e8ffe..1bec83e555 100644
+index b659d6905d..660b1c6fed 100644
--- a/src/basic/time-util.c
+++ b/src/basic/time-util.c
-@@ -1269,7 +1269,7 @@ static int get_timezones_from_zone1970_tab(char ***ret) {
+@@ -1267,7 +1267,7 @@ static int get_timezones_from_zone1970_tab(char ***ret) {
assert(ret);
@@ -47,7 +47,7 @@ index 5d162e8ffe..1bec83e555 100644
if (!f)
return -errno;
-@@ -1308,7 +1308,7 @@ static int get_timezones_from_tzdata_zi(char ***ret) {
+@@ -1306,7 +1306,7 @@ static int get_timezones_from_tzdata_zi(char ***ret) {
_cleanup_strv_free_ char **zones = NULL;
int r;
@@ -56,7 +56,7 @@ index 5d162e8ffe..1bec83e555 100644
if (!f)
return -errno;
-@@ -1421,7 +1421,7 @@ int verify_timezone(const char *name, int log_level) {
+@@ -1419,7 +1419,7 @@ int verify_timezone(const char *name, int log_level) {
if (p - name >= PATH_MAX)
return -ENAMETOOLONG;
@@ -65,7 +65,7 @@ index 5d162e8ffe..1bec83e555 100644
fd = open(t, O_RDONLY|O_CLOEXEC);
if (fd < 0)
-@@ -1512,7 +1512,7 @@ int get_timezone(char **ret) {
+@@ -1510,7 +1510,7 @@ int get_timezone(char **ret) {
if (r < 0)
return r; /* returns EINVAL if not a symlink */
@@ -75,10 +75,10 @@ index 5d162e8ffe..1bec83e555 100644
return -EINVAL;
diff --git a/src/firstboot/firstboot.c b/src/firstboot/firstboot.c
-index 2cb4f80d5d..ebeaeac52f 100644
+index d28a416e5d..c7c215731d 100644
--- a/src/firstboot/firstboot.c
+++ b/src/firstboot/firstboot.c
-@@ -491,7 +491,7 @@ static int process_timezone(void) {
+@@ -494,7 +494,7 @@ static int process_timezone(void) {
if (isempty(arg_timezone))
return 0;
@@ -88,10 +88,10 @@ index 2cb4f80d5d..ebeaeac52f 100644
(void) mkdir_parents(etc_localtime, 0755);
if (symlink(e, etc_localtime) < 0)
diff --git a/src/nspawn/nspawn.c b/src/nspawn/nspawn.c
-index 438ca294db..98bd110d92 100644
+index 197e5aa252..c674fa61d5 100644
--- a/src/nspawn/nspawn.c
+++ b/src/nspawn/nspawn.c
-@@ -1887,8 +1887,8 @@ int userns_mkdir(const char *root, const char *path, mode_t mode, uid_t uid, gid
+@@ -1899,8 +1899,8 @@ int userns_mkdir(const char *root, const char *path, mode_t mode, uid_t uid, gid
static const char *timezone_from_path(const char *path) {
return PATH_STARTSWITH_SET(
path,
@@ -137,5 +137,5 @@ index 0a8fe25d0f..2f02b9a520 100644
return -ENOMEM;
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0010-localectl-use-etc-X11-xkb-for-list-x11.patch b/pkgs/os-specific/linux/systemd/0010-localectl-use-etc-X11-xkb-for-list-x11.patch
index 6e36bbdc3406..f2514de6c662 100644
--- a/pkgs/os-specific/linux/systemd/0010-localectl-use-etc-X11-xkb-for-list-x11.patch
+++ b/pkgs/os-specific/linux/systemd/0010-localectl-use-etc-X11-xkb-for-list-x11.patch
@@ -1,4 +1,4 @@
-From f4e9304560ad42eeb8d42be583cc55eb2e5b4bb1 Mon Sep 17 00:00:00 2001
+From a93da270bed88972f4d60a1fa08f24e00712d7fb Mon Sep 17 00:00:00 2001
From: Imuli
Date: Wed, 19 Oct 2016 08:46:47 -0400
Subject: [PATCH 10/19] localectl: use /etc/X11/xkb for list-x11-*
@@ -10,10 +10,10 @@ NixOS has an option to link the xkb data files to /etc/X11, but not to
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/locale/localectl.c b/src/locale/localectl.c
-index 548ac8eb2c..5e372f1566 100644
+index b5624209dc..4ab7adfdb6 100644
--- a/src/locale/localectl.c
+++ b/src/locale/localectl.c
-@@ -280,7 +280,7 @@ static int list_x11_keymaps(int argc, char **argv, void *userdata) {
+@@ -279,7 +279,7 @@ static int list_x11_keymaps(int argc, char **argv, void *userdata) {
} state = NONE, look_for;
int r;
@@ -23,5 +23,5 @@ index 548ac8eb2c..5e372f1566 100644
return log_error_errno(errno, "Failed to open keyboard mapping list. %m");
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0011-build-don-t-create-statedir-and-don-t-touch-prefixdi.patch b/pkgs/os-specific/linux/systemd/0011-build-don-t-create-statedir-and-don-t-touch-prefixdi.patch
index 5aa22d988952..c21a1bda4122 100644
--- a/pkgs/os-specific/linux/systemd/0011-build-don-t-create-statedir-and-don-t-touch-prefixdi.patch
+++ b/pkgs/os-specific/linux/systemd/0011-build-don-t-create-statedir-and-don-t-touch-prefixdi.patch
@@ -1,4 +1,4 @@
-From 43a363f30b6012d600cfb62a3851c4ac7af4d1d5 Mon Sep 17 00:00:00 2001
+From 3bc3462165cd72de93a1c71f03e6c4150726b159 Mon Sep 17 00:00:00 2001
From: Franz Pletz
Date: Sun, 11 Feb 2018 04:37:44 +0100
Subject: [PATCH 11/19] build: don't create statedir and don't touch prefixdir
@@ -8,12 +8,12 @@ Subject: [PATCH 11/19] build: don't create statedir and don't touch prefixdir
1 file changed, 3 deletions(-)
diff --git a/meson.build b/meson.build
-index 5bdfd9753d..5bf6afc7b7 100644
+index c0cbadecb1..8266bf57de 100644
--- a/meson.build
+++ b/meson.build
-@@ -3539,9 +3539,6 @@ install_data('LICENSE.GPL2',
- 'docs/GVARIANT-SERIALIZATION.md',
- install_dir : docdir)
+@@ -3729,9 +3729,6 @@ install_data('LICENSE.GPL2',
+ install_subdir('LICENSES',
+ install_dir : docdir)
-meson.add_install_script('sh', '-c', mkdir_p.format(systemdstatedir))
-meson.add_install_script('sh', '-c', 'touch $DESTDIR@0@'.format(prefixdir))
@@ -22,5 +22,5 @@ index 5bdfd9753d..5bf6afc7b7 100644
# Ensure that changes to the docs/ directory do not break the
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0012-inherit-systemd-environment-when-calling-generators.patch b/pkgs/os-specific/linux/systemd/0012-inherit-systemd-environment-when-calling-generators.patch
index a2bdfcf8ec3f..5f27e4175232 100644
--- a/pkgs/os-specific/linux/systemd/0012-inherit-systemd-environment-when-calling-generators.patch
+++ b/pkgs/os-specific/linux/systemd/0012-inherit-systemd-environment-when-calling-generators.patch
@@ -1,4 +1,4 @@
-From 7ea935a5ac4f31106ce9347227d4eb59b77b02cd Mon Sep 17 00:00:00 2001
+From 85f0ad0cb7b4f0cfd482c9611f9cbc2dacbba33a Mon Sep 17 00:00:00 2001
From: Andreas Rammhold
Date: Fri, 2 Nov 2018 21:15:42 +0100
Subject: [PATCH 12/19] inherit systemd environment when calling generators.
@@ -16,10 +16,10 @@ executables that are being called from managers.
1 file changed, 9 insertions(+), 4 deletions(-)
diff --git a/src/core/manager.c b/src/core/manager.c
-index b9b4789720..79239afe4a 100644
+index 5b0bdb1bc7..1538a5200a 100644
--- a/src/core/manager.c
+++ b/src/core/manager.c
-@@ -4149,10 +4149,15 @@ static int manager_run_generators(Manager *m) {
+@@ -3653,10 +3653,15 @@ static int manager_run_generators(Manager *m) {
argv[4] = NULL;
RUN_WITH_UMASK(0022)
@@ -40,5 +40,5 @@ index b9b4789720..79239afe4a 100644
finish:
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0013-add-rootprefix-to-lookup-dir-paths.patch b/pkgs/os-specific/linux/systemd/0013-add-rootprefix-to-lookup-dir-paths.patch
index 20372a5dbad5..d008cf2821c7 100644
--- a/pkgs/os-specific/linux/systemd/0013-add-rootprefix-to-lookup-dir-paths.patch
+++ b/pkgs/os-specific/linux/systemd/0013-add-rootprefix-to-lookup-dir-paths.patch
@@ -1,4 +1,4 @@
-From eb93778af78a127e8e20d6ed7fd9f91fd22dc7c9 Mon Sep 17 00:00:00 2001
+From b30d2273d3ce1480b0c4c27c25211f84e04172e9 Mon Sep 17 00:00:00 2001
From: Andreas Rammhold
Date: Thu, 9 May 2019 11:15:22 +0200
Subject: [PATCH 13/19] add rootprefix to lookup dir paths
@@ -12,7 +12,7 @@ files that I might have missed.
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/src/basic/def.h b/src/basic/def.h
-index 2e60abb4f1..732ec51d36 100644
+index eccee3d3fa..e94a2c8bd0 100644
--- a/src/basic/def.h
+++ b/src/basic/def.h
@@ -39,13 +39,15 @@
@@ -34,5 +34,5 @@ index 2e60abb4f1..732ec51d36 100644
#define CONF_PATHS(n) \
CONF_PATHS_USR(n) \
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0014-systemd-shutdown-execute-scripts-in-etc-systemd-syst.patch b/pkgs/os-specific/linux/systemd/0014-systemd-shutdown-execute-scripts-in-etc-systemd-syst.patch
index a22566eb4cc3..49c6651c0edf 100644
--- a/pkgs/os-specific/linux/systemd/0014-systemd-shutdown-execute-scripts-in-etc-systemd-syst.patch
+++ b/pkgs/os-specific/linux/systemd/0014-systemd-shutdown-execute-scripts-in-etc-systemd-syst.patch
@@ -1,4 +1,4 @@
-From 1d623def80a3532ac1445499c9d4673e21ae8195 Mon Sep 17 00:00:00 2001
+From 76da27ff77e5db07e502d4d8d26286d69c3f0319 Mon Sep 17 00:00:00 2001
From: Nikolay Amiantov
Date: Thu, 25 Jul 2019 20:45:55 +0300
Subject: [PATCH 14/19] systemd-shutdown: execute scripts in
@@ -10,12 +10,12 @@ This is needed for NixOS to use such scripts as systemd directory is immutable.
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/shutdown/shutdown.c b/src/shutdown/shutdown.c
-index a98cfc4d8a..b0b34edda7 100644
+index 7ad9930677..fdb03a2e1a 100644
--- a/src/shutdown/shutdown.c
+++ b/src/shutdown/shutdown.c
-@@ -312,7 +312,7 @@ int main(int argc, char *argv[]) {
+@@ -335,7 +335,7 @@ int main(int argc, char *argv[]) {
_cleanup_free_ char *cgroup = NULL;
- char *arguments[3], *watchdog_device;
+ char *arguments[3];
int cmd, r, umount_log_level = LOG_INFO;
- static const char* const dirs[] = {SYSTEM_SHUTDOWN_PATH, NULL};
+ static const char* const dirs[] = {SYSTEM_SHUTDOWN_PATH, "/etc/systemd/system-shutdown", NULL};
@@ -23,5 +23,5 @@ index a98cfc4d8a..b0b34edda7 100644
/* The log target defaults to console, but the original systemd process will pass its log target in through a
* command line argument, which will override this default. Also, ensure we'll never log to the journal or
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0015-systemd-sleep-execute-scripts-in-etc-systemd-system-.patch b/pkgs/os-specific/linux/systemd/0015-systemd-sleep-execute-scripts-in-etc-systemd-system-.patch
index 1a21d1005ee0..78d77c005822 100644
--- a/pkgs/os-specific/linux/systemd/0015-systemd-sleep-execute-scripts-in-etc-systemd-system-.patch
+++ b/pkgs/os-specific/linux/systemd/0015-systemd-sleep-execute-scripts-in-etc-systemd-system-.patch
@@ -1,4 +1,4 @@
-From 5a96c4a98be971d84a12ae04e42bc3cb889d5191 Mon Sep 17 00:00:00 2001
+From 47c651f97acae814d4ff679ae04d78d4532cbca6 Mon Sep 17 00:00:00 2001
From: Nikolay Amiantov
Date: Thu, 25 Jul 2019 20:46:58 +0300
Subject: [PATCH 15/19] systemd-sleep: execute scripts in
@@ -10,7 +10,7 @@ This is needed for NixOS to use such scripts as systemd directory is immutable.
1 file changed, 1 insertion(+)
diff --git a/src/sleep/sleep.c b/src/sleep/sleep.c
-index a3aeb24633..0ed6a34d79 100644
+index 7064f3a905..b60ced9d9b 100644
--- a/src/sleep/sleep.c
+++ b/src/sleep/sleep.c
@@ -182,6 +182,7 @@ static int execute(
@@ -22,5 +22,5 @@ index a3aeb24633..0ed6a34d79 100644
};
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0016-kmod-static-nodes.service-Update-ConditionFileNotEmp.patch b/pkgs/os-specific/linux/systemd/0016-kmod-static-nodes.service-Update-ConditionFileNotEmp.patch
index 12624cb5548f..3c1643e0f1ab 100644
--- a/pkgs/os-specific/linux/systemd/0016-kmod-static-nodes.service-Update-ConditionFileNotEmp.patch
+++ b/pkgs/os-specific/linux/systemd/0016-kmod-static-nodes.service-Update-ConditionFileNotEmp.patch
@@ -1,32 +1,27 @@
-From 775a2a8940c07f4af33a2a11bfa17e0257b427cb Mon Sep 17 00:00:00 2001
+From df0fec7ac2f33bcca60ba9a2396af33397ba42cc Mon Sep 17 00:00:00 2001
From: Florian Klink
Date: Sat, 7 Mar 2020 22:40:27 +0100
Subject: [PATCH 16/19] kmod-static-nodes.service: Update ConditionFileNotEmpty
-kmod loads modules from not only /lib/modules but also from
-/run/booted-system/kernel-modules/lib/modules and
-/run/current-system/kernel-modules/lib/module
-
-Co-authored-by: Arian van Putten
+On NixOS, kernel modules of the currently booted systems are located at
+/run/booted-system/kernel-modules/lib/modules/%v/, not /lib/modules/%v/.
---
- units/kmod-static-nodes.service.in | 4 +++-
- 1 file changed, 3 insertions(+), 1 deletion(-)
+ units/kmod-static-nodes.service.in | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/units/kmod-static-nodes.service.in b/units/kmod-static-nodes.service.in
-index 777e82d16b..9a5e05a1cc 100644
+index 777e82d16b..b6abc2bba0 100644
--- a/units/kmod-static-nodes.service.in
+++ b/units/kmod-static-nodes.service.in
-@@ -12,7 +12,9 @@ Description=Create List of Static Device Nodes
+@@ -12,7 +12,7 @@ Description=Create List of Static Device Nodes
DefaultDependencies=no
Before=sysinit.target systemd-tmpfiles-setup-dev.service
ConditionCapability=CAP_SYS_MODULE
-ConditionFileNotEmpty=/lib/modules/%v/modules.devname
-+ConditionFileNotEmpty=|/lib/modules/%v/modules.devname
-+ConditionFileNotEmpty=|/run/booted-system/kernel-modules/lib/modules/%v/modules.devname
-+ConditionFileNotEmpty=|/run/current-system/kernel-modules/lib/modules/%v/modules.devname
++ConditionFileNotEmpty=/run/booted-system/kernel-modules/lib/modules/%v/modules.devname
[Service]
Type=oneshot
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0017-path-util.h-add-placeholder-for-DEFAULT_PATH_NORMAL.patch b/pkgs/os-specific/linux/systemd/0017-path-util.h-add-placeholder-for-DEFAULT_PATH_NORMAL.patch
index 52b74284fe26..882690ad9140 100644
--- a/pkgs/os-specific/linux/systemd/0017-path-util.h-add-placeholder-for-DEFAULT_PATH_NORMAL.patch
+++ b/pkgs/os-specific/linux/systemd/0017-path-util.h-add-placeholder-for-DEFAULT_PATH_NORMAL.patch
@@ -1,4 +1,4 @@
-From 6ddb2011b379f3232374327517af874b68c434b5 Mon Sep 17 00:00:00 2001
+From f21722ac0f51b0b59a5c030af3db5fe4e6397f7c Mon Sep 17 00:00:00 2001
From: Florian Klink
Date: Sun, 8 Mar 2020 01:05:54 +0100
Subject: [PATCH 17/19] path-util.h: add placeholder for DEFAULT_PATH_NORMAL
@@ -10,7 +10,7 @@ systemd itself uses extensively.
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/src/basic/path-util.h b/src/basic/path-util.h
-index 26e7362d1f..a8f8a863ec 100644
+index 518f3340bf..18e826ea0b 100644
--- a/src/basic/path-util.h
+++ b/src/basic/path-util.h
@@ -24,11 +24,11 @@
@@ -29,5 +29,5 @@ index 26e7362d1f..a8f8a863ec 100644
#if HAVE_SPLIT_USR
# define DEFAULT_PATH DEFAULT_PATH_SPLIT_USR
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0018-pkg-config-derive-prefix-from-prefix.patch b/pkgs/os-specific/linux/systemd/0018-pkg-config-derive-prefix-from-prefix.patch
index 58eb7f96e642..e602bef9c3d7 100644
--- a/pkgs/os-specific/linux/systemd/0018-pkg-config-derive-prefix-from-prefix.patch
+++ b/pkgs/os-specific/linux/systemd/0018-pkg-config-derive-prefix-from-prefix.patch
@@ -1,4 +1,4 @@
-From 50f2ada6cbfafa75b628410e8834f29581854e6f Mon Sep 17 00:00:00 2001
+From 968bd0c7bc058a4b05b6457f9ff20d02b70c9852 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?J=C3=B6rg=20Thalheim?=
Date: Sun, 6 Dec 2020 08:34:19 +0100
Subject: [PATCH 18/19] pkg-config: derive prefix from --prefix
@@ -29,5 +29,5 @@ index 162432e77f..2fc20daf03 100644
rootprefix=${root_prefix}
sysconf_dir={{SYSCONF_DIR}}
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/0019-core-handle-lookup-paths-being-symlinks.patch b/pkgs/os-specific/linux/systemd/0019-core-handle-lookup-paths-being-symlinks.patch
index 54e5c32aeb44..916f95e194ac 100644
--- a/pkgs/os-specific/linux/systemd/0019-core-handle-lookup-paths-being-symlinks.patch
+++ b/pkgs/os-specific/linux/systemd/0019-core-handle-lookup-paths-being-symlinks.patch
@@ -1,4 +1,4 @@
-From 2ab388cf0be320879e668a6206cb15d002b55f98 Mon Sep 17 00:00:00 2001
+From 169fc6f270ff3e3903a7a31550c964152f9751ec Mon Sep 17 00:00:00 2001
From: Andreas Rammhold
Date: Wed, 18 Aug 2021 19:10:08 +0200
Subject: [PATCH 19/19] core: handle lookup paths being symlinks
@@ -15,10 +15,10 @@ directory itself is already a symlink.
1 file changed, 31 insertions(+), 2 deletions(-)
diff --git a/src/basic/unit-file.c b/src/basic/unit-file.c
-index 0d58b1c4fe..7314f1245f 100644
+index 30c632dfce..6179100126 100644
--- a/src/basic/unit-file.c
+++ b/src/basic/unit-file.c
-@@ -254,6 +254,7 @@ int unit_file_build_name_map(
+@@ -255,6 +255,7 @@ int unit_file_build_name_map(
_cleanup_hashmap_free_ Hashmap *ids = NULL, *names = NULL;
_cleanup_set_free_free_ Set *paths = NULL;
@@ -26,7 +26,7 @@ index 0d58b1c4fe..7314f1245f 100644
uint64_t timestamp_hash;
char **dir;
int r;
-@@ -273,6 +274,34 @@ int unit_file_build_name_map(
+@@ -274,6 +275,34 @@ int unit_file_build_name_map(
return log_oom();
}
@@ -59,9 +59,9 @@ index 0d58b1c4fe..7314f1245f 100644
+ }
+
STRV_FOREACH(dir, (char**) lp->search_path) {
- struct dirent *de;
_cleanup_closedir_ DIR *d = NULL;
-@@ -351,11 +380,11 @@ int unit_file_build_name_map(
+
+@@ -386,11 +415,11 @@ int unit_file_build_name_map(
continue;
}
@@ -76,5 +76,5 @@ index 0d58b1c4fe..7314f1245f 100644
log_debug("%s: linked unit file: %s → %s",
__func__, filename, simplified);
--
-2.33.1
+2.34.0
diff --git a/pkgs/os-specific/linux/systemd/default.nix b/pkgs/os-specific/linux/systemd/default.nix
index 4cbed9b7cbf1..73c27b0b61f0 100644
--- a/pkgs/os-specific/linux/systemd/default.nix
+++ b/pkgs/os-specific/linux/systemd/default.nix
@@ -15,6 +15,8 @@
, gperf
, getent
, glibcLocales
+
+ # glib is only used during tests (test-bus-gvariant, test-bus-marshal)
, glib
, substituteAll
, gettext
@@ -29,7 +31,6 @@
# Optional dependencies
, pam
, cryptsetup
-, lvm2
, audit
, acl
, lz4
@@ -61,8 +62,10 @@
, kexec-tools
, bashInteractive
, libmicrohttpd
+, libfido2
+, p11-kit
- # the (optional) BPF feature requires bpftool, libbpf, clang and llmv-strip to be avilable during build time.
+ # the (optional) BPF feature requires bpftool, libbpf, clang and llvm-strip to be available during build time.
# Only libbpf should be a runtime dependency.
, bpftools
, libbpf
@@ -97,8 +100,8 @@
, withTimesyncd ? true
, withTpm2Tss ? !stdenv.hostPlatform.isMusl
, withUserDb ? !stdenv.hostPlatform.isMusl
-, libfido2
-, p11-kit
+ # tests assume too much system access for them to be feasible for us right now
+, withTests ? false
# name argument
, pname ? "systemd"
@@ -123,7 +126,14 @@ assert withHomed -> withCryptsetup;
assert withCryptsetup -> (cryptsetup != null);
let
wantCurl = withRemote || withImportd;
- version = "249.7";
+ wantGcrypt = withResolved || withImportd;
+ version = "250.4";
+
+ # Bump this variable on every (major) version change. See below (in the meson options list) for why.
+ # command:
+ # $ curl -s https://api.github.com/repos/systemd/systemd/releases/latest | \
+ # jq '.created_at|strptime("%Y-%m-%dT%H:%M:%SZ")|mktime'
+ releaseTimestamp = "1640290180";
in
stdenv.mkDerivation {
inherit pname version;
@@ -134,12 +144,12 @@ stdenv.mkDerivation {
owner = "systemd";
repo = "systemd-stable";
rev = "v${version}";
- sha256 = "sha256-y33/BvvI+JyhsvuT1Cbm6J2Z72j71oXgLw6X9NwCMPE=";
+ sha256 = "sha256-AdzPh7dGVrGbbjL9+PqytQOpRzNDUUEftmKZAbFH3L4=";
};
- # If these need to be regenerated, `git am path/to/00*.patch` them into a
- # systemd worktree, rebase to the more recent systemd version, and export the
- # patches again via `git -c format.signoff=false format-patch v${version}`.
+ # On major changes, or when otherwise required, you *must* reformat the patches,
+ # `git am path/to/00*.patch` them into a systemd worktree, rebase to the more recent
+ # systemd version, and export the patches again via `git -c format.signoff=false format-patch v${version}`.
# Use `find . -name "*.patch" | sort` to get an up-to-date listing of all patches
patches = [
./0001-Start-device-units-for-uninitialised-encrypted-devic.patch
@@ -166,42 +176,44 @@ stdenv.mkDerivation {
# systemd. With the below patch we mitigate that effect by special casing
# all our root unit dirs if they are symlinks. This does exactly what we
# need (AFAICT).
- # See https://github.com/systemd/systemd/pull/20479 for upsteam discussion.
+ # See https://github.com/systemd/systemd/pull/20479 for upstream discussion.
./0019-core-handle-lookup-paths-being-symlinks.patch
- ] ++ lib.optional stdenv.hostPlatform.isMusl (let
- oe-core = fetchzip {
- url = "https://git.openembedded.org/openembedded-core/snapshot/openembedded-core-14c6e5a4b72d0e4665279158a0740dd1dc21f72f.tar.bz2";
- sha256 = "1jixya4czkr5p5rdcw3d6ips8zzr82dvnanvzvgjh67730scflya";
- };
- musl-patches = oe-core + "/meta/recipes-core/systemd/systemd";
- in [
- (musl-patches + "/0002-don-t-use-glibc-specific-qsort_r.patch")
- (musl-patches + "/0003-missing_type.h-add-__compare_fn_t-and-comparison_fn_.patch")
- (musl-patches + "/0004-add-fallback-parse_printf_format-implementation.patch")
- (musl-patches + "/0005-src-basic-missing.h-check-for-missing-strndupa.patch")
- (musl-patches + "/0006-Include-netinet-if_ether.h.patch")
- (musl-patches + "/0007-don-t-fail-if-GLOB_BRACE-and-GLOB_ALTDIRFUNC-is-not-.patch")
- (musl-patches + "/0008-add-missing-FTW_-macros-for-musl.patch")
- (musl-patches + "/0009-fix-missing-of-__register_atfork-for-non-glibc-build.patch")
- (musl-patches + "/0010-Use-uintmax_t-for-handling-rlim_t.patch")
- (musl-patches + "/0011-test-sizeof.c-Disable-tests-for-missing-typedefs-in-.patch")
- (musl-patches + "/0012-don-t-pass-AT_SYMLINK_NOFOLLOW-flag-to-faccessat.patch")
- (musl-patches + "/0013-Define-glibc-compatible-basename-for-non-glibc-syste.patch")
- (musl-patches + "/0014-Do-not-disable-buffering-when-writing-to-oom_score_a.patch")
- (musl-patches + "/0015-distinguish-XSI-compliant-strerror_r-from-GNU-specif.patch")
- (musl-patches + "/0016-Hide-__start_BUS_ERROR_MAP-and-__stop_BUS_ERROR_MAP.patch")
- (musl-patches + "/0017-missing_type.h-add-__compar_d_fn_t-definition.patch")
- (musl-patches + "/0018-avoid-redefinition-of-prctl_mm_map-structure.patch")
- (musl-patches + "/0019-Handle-missing-LOCK_EX.patch")
- (musl-patches + "/0021-test-json.c-define-M_PIl.patch")
- (musl-patches + "/0022-do-not-disable-buffer-in-writing-files.patch")
- (musl-patches + "/0025-Handle-__cpu_mask-usage.patch")
- (musl-patches + "/0026-Handle-missing-gshadow.patch")
- (musl-patches + "/0028-missing_syscall.h-Define-MIPS-ABI-defines-for-musl.patch")
-
- # Being discussed upstream: https://lists.openembedded.org/g/openembedded-core/topic/86411771#157056
- ./musl.diff
- ]);
+ ] ++ lib.optional stdenv.hostPlatform.isMusl (
+ let
+ oe-core = fetchzip {
+ url = "https://git.openembedded.org/openembedded-core/snapshot/openembedded-core-7e35a575ef09a85e625a81e0b4d80b020e3e3a92.tar.bz2";
+ sha256 = "0dvz4685nk0y7nnq3sr2q8ab3wfx0bi8ilwcgn0h6kagwcnav2n8";
+ };
+ musl-patches = oe-core + "/meta/recipes-core/systemd/systemd";
+ in
+ [
+ (musl-patches + "/0002-don-t-use-glibc-specific-qsort_r.patch")
+ (musl-patches + "/0003-missing_type.h-add-__compare_fn_t-and-comparison_fn_.patch")
+ (musl-patches + "/0004-add-fallback-parse_printf_format-implementation.patch")
+ (musl-patches + "/0005-src-basic-missing.h-check-for-missing-strndupa.patch")
+ (musl-patches + "/0007-don-t-fail-if-GLOB_BRACE-and-GLOB_ALTDIRFUNC-is-not-.patch")
+ (musl-patches + "/0008-add-missing-FTW_-macros-for-musl.patch")
+ (musl-patches + "/0009-fix-missing-of-__register_atfork-for-non-glibc-build.patch")
+ (musl-patches + "/0010-Use-uintmax_t-for-handling-rlim_t.patch")
+ (musl-patches + "/0011-test-sizeof.c-Disable-tests-for-missing-typedefs-in-.patch")
+ (musl-patches + "/0012-don-t-pass-AT_SYMLINK_NOFOLLOW-flag-to-faccessat.patch")
+ (musl-patches + "/0013-Define-glibc-compatible-basename-for-non-glibc-syste.patch")
+ (musl-patches + "/0014-Do-not-disable-buffering-when-writing-to-oom_score_a.patch")
+ (musl-patches + "/0015-distinguish-XSI-compliant-strerror_r-from-GNU-specif.patch")
+ (musl-patches + "/0016-Hide-__start_BUS_ERROR_MAP-and-__stop_BUS_ERROR_MAP.patch")
+ (musl-patches + "/0017-missing_type.h-add-__compar_d_fn_t-definition.patch")
+ (musl-patches + "/0018-avoid-redefinition-of-prctl_mm_map-structure.patch")
+ (musl-patches + "/0019-Handle-missing-LOCK_EX.patch")
+ (musl-patches + "/0021-test-json.c-define-M_PIl.patch")
+ (musl-patches + "/0022-do-not-disable-buffer-in-writing-files.patch")
+ (musl-patches + "/0025-Handle-__cpu_mask-usage.patch")
+ (musl-patches + "/0026-Handle-missing-gshadow.patch")
+ (musl-patches + "/0028-missing_syscall.h-Define-MIPS-ABI-defines-for-musl.patch")
+ (musl-patches + "/0001-pass-correct-parameters-to-getdents64.patch")
+ (musl-patches + "/0002-Add-sys-stat.h-for-S_IFDIR.patch")
+ (musl-patches + "/0001-Adjust-for-musl-headers.patch")
+ ]
+ );
postPatch = ''
substituteInPlace src/basic/path-util.h --replace "@defaultPathNormal@" "${placeholder "out"}/bin/"
@@ -211,7 +223,7 @@ stdenv.mkDerivation {
"find_program('${stdenv.cc.bintools.targetPrefix}objcopy'"
'' + (
let
- # The folllowing patches references to dynamic libraries to ensure that
+ # The following patches references to dynamic libraries to ensure that
# all the features that are implemented via dlopen(3) are available (or
# explicitly deactivated) by pointing dlopen to the absolute store path
# instead of relying on the linkers runtime lookup code.
@@ -267,7 +279,7 @@ stdenv.mkDerivation {
{ name = "libidn.so.12"; pkg = null; }
{ name = "libidn.so.11"; pkg = null; }
- # journalctl --grep requires libpcre so lets provide it
+ # journalctl --grep requires libpcre so let's provide it
{ name = "libpcre2-8.so.0"; pkg = pcre2; }
# Support for TPM2 in systemd-cryptsetup, systemd-repart and systemd-cryptenroll
@@ -276,6 +288,10 @@ stdenv.mkDerivation {
{ name = "libtss2-mu.so.0"; pkg = opt withTpm2Tss tpm2-tss; }
{ name = "libtss2-tcti-"; pkg = opt withTpm2Tss tpm2-tss; }
{ name = "libfido2.so.1"; pkg = opt withFido2 libfido2; }
+
+ # inspect-elf support
+ { name = "libelf.so.1"; pkg = opt withCoredump elfutils; }
+ { name = "libdw.so.1"; pkg = opt withCoredump elfutils; }
];
patchDlOpen = dl:
@@ -294,7 +310,7 @@ stdenv.mkDerivation {
# exceptional case, details:
# https://github.com/systemd/systemd-stable/blob/v249-stable/src/shared/tpm2-util.c#L157
if ! [[ "${library}" =~ .*libtss2-tcti-$ ]]; then
- echo 'The shared library `${library}` does not exist but was given as subtitute for `${dl.name}`'
+ echo 'The shared library `${library}` does not exist but was given as substitute for `${dl.name}`'
exit 1
fi
fi
@@ -318,8 +334,8 @@ stdenv.mkDerivation {
fi
''
# Finally patch shebangs that might need patching.
- # Should no longer be necessary with v250.
- # https://github.com/systemd/systemd/pull/19638
+ # Should no longer be necessary with v251.
+ # https://github.com/systemd/systemd/pull/21749
+ ''
patchShebangs .
'';
@@ -356,16 +372,16 @@ stdenv.mkDerivation {
[
acl
audit
- glib
kmod
libcap
- libgcrypt
libidn2
libuuid
linuxHeaders
pam
]
+ ++ lib.optional wantGcrypt libgcrypt
+ ++ lib.optional withTests glib
++ lib.optional withApparmor libapparmor
++ lib.optional wantCurl (lib.getDev curl)
++ lib.optionals withCompression [ bzip2 lz4 xz zstd ]
@@ -389,6 +405,14 @@ stdenv.mkDerivation {
mesonFlags = [
"-Dversion-tag=${version}"
+ # We bump this variable on every (major) version change to ensure
+ # that we have known-good value for a timestamp that is in the (not so distant) past.
+ # This serves as a lower bound for valid system timestamps during startup. Systemd will
+ # reset the system timestamp if this date is +- 15 years from the system time.
+ # See the systemd v250 release notes for further details:
+ # https://github.com/systemd/systemd/blob/60e930fc3e6eb8a36fbc184773119eb8d2f30364/NEWS#L258-L266
+ "-Dtime-epoch=${releaseTimestamp}"
+
"-Ddbuspolicydir=${placeholder "out"}/share/dbus-1/system.d"
"-Ddbussessionservicedir=${placeholder "out"}/share/dbus-1/services"
"-Ddbussystemservicedir=${placeholder "out"}/share/dbus-1/system-services"
@@ -400,11 +424,11 @@ stdenv.mkDerivation {
"-Dsetfont-path=${kbd}/bin/setfont"
"-Dtty-gid=3" # tty in NixOS has gid 3
"-Ddebug-shell=${bashInteractive}/bin/bash"
- "-Dglib=${lib.boolToString (glib != null)}"
+ "-Dglib=${lib.boolToString withTests}"
# while we do not run tests we should also not build them. Removes about 600 targets
"-Dtests=false"
"-Danalyze=${lib.boolToString withAnalyze}"
- "-Dgcrypt=${lib.boolToString (libgcrypt != null)}"
+ "-Dgcrypt=${lib.boolToString wantGcrypt}"
"-Dimportd=${lib.boolToString withImportd}"
"-Dlz4=${lib.boolToString withCompression}"
"-Dhomed=${lib.boolToString withHomed}"
@@ -435,7 +459,11 @@ stdenv.mkDerivation {
"-Dsmack=true"
"-Db_pie=true"
"-Dinstall-sysconfdir=false"
- "-Defi-ld=${stdenv.cc.bintools.targetPrefix}ld"
+ "-Dsbat-distro=nixos"
+ "-Dsbat-distro-summary=NixOS"
+ "-Dsbat-distro-url=https://nixos.org/"
+ "-Dsbat-distro-pkgname=${pname}"
+ "-Dsbat-distro-version=${version}"
/*
As of now, systemd doesn't allow runtime configuration of these values. So
the settings in /etc/login.defs have no effect on it. Many people think this
@@ -448,7 +476,6 @@ stdenv.mkDerivation {
*/
"-Dsystem-uid-max=999"
"-Dsystem-gid-max=999"
- # "-Dtime-epoch=1"
"-Dsysvinit-path="
"-Dsysvrcnd-path="
@@ -487,57 +514,96 @@ stdenv.mkDerivation {
"-Dutmp=false"
"-Didn=false"
];
+ preConfigure =
+ let
+ # A list of all the runtime binaries that the systemd exectuables, tests and libraries are referencing in their source code, scripts and unit files.
+ # As soon as a dependency isn't required anymore we should remove it from the list. The `where` attribute for each of the replacement patterns must be exhaustive. If another (unhandled) case is found in the source code the build fails with an error message.
+ binaryReplacements = [
+ { search = "/usr/bin/getent"; replacement = "${getent}/bin/getent"; where = [ "src/nspawn/nspawn-setuid.c" ]; }
- preConfigure = ''
- mesonFlagsArray+=(-Dntp-servers="0.nixos.pool.ntp.org 1.nixos.pool.ntp.org 2.nixos.pool.ntp.org 3.nixos.pool.ntp.org")
- export LC_ALL="en_US.UTF-8";
- # FIXME: patch this in systemd properly (and send upstream).
- # already fixed in f00929ad622c978f8ad83590a15a765b4beecac9: (u)mount
- for i in \
- src/core/mount.c \
- src/core/swap.c \
- src/cryptsetup/cryptsetup-generator.c \
- src/journal/cat.c \
- src/nspawn/nspawn.c \
- src/remount-fs/remount-fs.c \
- src/shared/generator.c \
- src/shutdown/shutdown.c \
- units/emergency.service.in \
- units/modprobe@.service \
- units/rescue.service.in \
- units/systemd-logind.service.in \
- units/systemd-nspawn@.service.in; \
- do
- test -e $i
- substituteInPlace $i \
- --replace /usr/bin/getent ${getent}/bin/getent \
- --replace /sbin/mkswap ${lib.getBin util-linux}/sbin/mkswap \
- --replace /sbin/swapon ${lib.getBin util-linux}/sbin/swapon \
- --replace /sbin/swapoff ${lib.getBin util-linux}/sbin/swapoff \
- --replace /bin/echo ${coreutils}/bin/echo \
- --replace /bin/cat ${coreutils}/bin/cat \
- --replace /sbin/sulogin ${lib.getBin util-linux}/sbin/sulogin \
- --replace /sbin/modprobe ${lib.getBin kmod}/sbin/modprobe \
- --replace /usr/lib/systemd/systemd-fsck $out/lib/systemd/systemd-fsck \
- --replace /bin/plymouth /run/current-system/sw/bin/plymouth # To avoid dependency
- done
+ {
+ search = "/sbin/mkswap";
+ replacement = "${lib.getBin util-linux}/sbin/mkswap";
+ where = [
+ "man/systemd-makefs@.service.xml"
+ ];
+ }
+ { search = "/sbin/swapon"; replacement = "${lib.getBin util-linux}/sbin/swapon"; where = [ "src/core/swap.c" "src/basic/unit-def.h" ]; }
+ { search = "/sbin/swapoff"; replacement = "${lib.getBin util-linux}/sbin/swapoff"; where = [ "src/core/swap.c" ]; }
+ {
+ search = "/bin/echo";
+ replacement = "${coreutils}/bin/echo";
+ where = [
+ "man/systemd-analyze.xml"
+ "man/systemd.service.xml"
+ "src/analyze/test-verify.c"
+ "src/test/test-env-file.c"
+ "src/test/test-fileio.c"
+ ];
+ }
+ {
+ search = "/bin/cat";
+ replacement = "${coreutils}/bin/cat";
+ where = [ "test/create-busybox-container" "test/test-execute/exec-noexecpaths-simple.service" "src/journal/cat.c" ];
+ }
+ { search = "/sbin/modprobe"; replacement = "${lib.getBin kmod}/sbin/modprobe"; where = [ "units/modprobe@.service" ]; }
+ {
+ search = "/usr/lib/systemd/systemd-fsck";
+ replacement = "$out/lib/systemd/systemd-fsck";
+ where = [
+ "man/systemd-fsck@.service.xml"
+ ];
+ }
+ ] ++ lib.optionals withImportd [
+ {
+ search = "\"gpg\"";
+ replacement = "\\\"${gnupg}/bin/gpg\\\"";
+ where = [ "src/import/pull-common.c" ];
+ }
+ {
+ search = "\"tar\"";
+ replacement = "\\\"${gnutar}/bin/tar\\\"";
+ where = [
+ "src/import/export-tar.c"
+ "src/import/export.c"
+ "src/import/import-common.c"
+ "src/import/import-tar.c"
+ "src/import/import.c"
+ "src/import/importd.c"
+ "src/import/pull-tar.c"
+ "src/import/pull.c"
+ ];
+ }
+ ];
- for dir in tools src/resolve test src/test src/shared; do
- patchShebangs $dir
- done
+ # { replacement, search, where } -> List[str]
+ mkSubstitute = { replacement, search, where }:
+ map (path: "substituteInPlace ${path} --replace '${search}' \"${replacement}\"") where;
+ mkEnsureSubstituted = { replacement, search, where }:
+ ''
+ if [[ $(grep -r '${search}' | grep -v "${replacement}" | grep -Ev 'NEWS|^test/' | wc -l) -gt 0 ]]; then
+ echo "Not all references to '${search}' have been replaced. Found the following matches:"
+ grep '${search}' -r | grep -v "${replacement}" | grep -Ev 'NEWS|^test/'
+ exit 1
+ fi
+ '';
- # absolute paths to gpg & tar
- substituteInPlace src/import/pull-common.c \
- --replace '"gpg"' '"${gnupg}/bin/gpg"'
- for file in src/import/{{export,import,pull}-tar,import-common}.c; do
- substituteInPlace $file \
- --replace '"tar"' '"${gnutar}/bin/tar"'
- done
+ in
+ ''
+ mesonFlagsArray+=(-Dntp-servers="0.nixos.pool.ntp.org 1.nixos.pool.ntp.org 2.nixos.pool.ntp.org 3.nixos.pool.ntp.org")
+ export LC_ALL="en_US.UTF-8";
+
+ ${lib.concatStringsSep "\n" (lib.flatten (map mkSubstitute binaryReplacements))}
+ ${lib.concatMapStringsSep "\n" mkEnsureSubstituted binaryReplacements}
- substituteInPlace src/libsystemd/sd-journal/catalog.c \
- --replace /usr/lib/systemd/catalog/ $out/lib/systemd/catalog/
- '';
+ for dir in tools src/resolve test src/test src/shared; do
+ patchShebangs $dir
+ done
+
+ substituteInPlace src/libsystemd/sd-journal/catalog.c \
+ --replace /usr/lib/systemd/catalog/ $out/lib/systemd/catalog/
+ '';
# These defines are overridden by CFLAGS and would trigger annoying
# warning messages
@@ -545,7 +611,7 @@ stdenv.mkDerivation {
substituteInPlace config.h \
--replace "POLKIT_AGENT_BINARY_PATH" "_POLKIT_AGENT_BINARY_PATH" \
--replace "SYSTEMD_BINARY_PATH" "_SYSTEMD_BINARY_PATH" \
- --replace "SYSTEMD_CGROUP_AGENT_PATH" "_SYSTEMD_CGROUP_AGENT_PATH"
+ --replace "SYSTEMD_CGROUP_AGENTS_PATH" "_SYSTEMD_CGROUP_AGENT_PATH"
'';
NIX_CFLAGS_COMPILE = toString ([
@@ -557,8 +623,8 @@ stdenv.mkDerivation {
# Set the release_agent on /sys/fs/cgroup/systemd to the
# currently running systemd (/run/current-system/systemd) so
# that we don't use an obsolete/garbage-collected release agent.
- "-USYSTEMD_CGROUP_AGENT_PATH"
- "-DSYSTEMD_CGROUP_AGENT_PATH=\"/run/current-system/systemd/lib/systemd/systemd-cgroups-agent\""
+ "-USYSTEMD_CGROUP_AGENTS_PATH"
+ "-DSYSTEMD_CGROUP_AGENTS_PATH=\"/run/current-system/systemd/lib/systemd/systemd-cgroups-agent\""
"-USYSTEMD_BINARY_PATH"
"-DSYSTEMD_BINARY_PATH=\"/run/current-system/systemd/lib/systemd/systemd\""
@@ -575,6 +641,12 @@ stdenv.mkDerivation {
'';
postInstall = ''
+ # sysinit.target: Don't depend on
+ # systemd-tmpfiles-setup.service. This interferes with NixOps's
+ # send-keys feature (since sshd.service depends indirectly on
+ # sysinit.target).
+ mv $out/lib/systemd/system/sysinit.target.wants/systemd-tmpfiles-setup-dev.service $out/lib/systemd/system/multi-user.target.wants/
+
mkdir -p $out/example/systemd
mv $out/lib/{modules-load.d,binfmt.d,sysctl.d,tmpfiles.d} $out/example
mv $out/lib/systemd/{system,user} $out/example/systemd
diff --git a/pkgs/os-specific/linux/systemd/musl.diff b/pkgs/os-specific/linux/systemd/musl.diff
deleted file mode 100644
index cab135dd8fc5..000000000000
--- a/pkgs/os-specific/linux/systemd/musl.diff
+++ /dev/null
@@ -1,12 +0,0 @@
-diff --git a/src/shared/mount-setup.c b/src/shared/mount-setup.c
-index ef3527e..cc1ba23 100644
---- a/src/shared/mount-setup.c
-+++ b/src/shared/mount-setup.c
-@@ -32,6 +32,7 @@
- #include "strv.h"
- #include "user-util.h"
- #include "virt.h"
-+#include "missing_type.h"
-
- typedef enum MountMode {
- MNT_NONE = 0,
diff --git a/pkgs/os-specific/linux/tiscamera/default.nix b/pkgs/os-specific/linux/tiscamera/default.nix
index 38bc7c3eaff3..1182aead36be 100644
--- a/pkgs/os-specific/linux/tiscamera/default.nix
+++ b/pkgs/os-specific/linux/tiscamera/default.nix
@@ -17,6 +17,7 @@
, python3Packages
, libuuid
, wrapGAppsHook
+, catch2
}:
stdenv.mkDerivation rec {
@@ -30,6 +31,10 @@ stdenv.mkDerivation rec {
sha256 = "0hpy9yhc4mn6w8gvzwif703smmcys0j2jqbz2xfghqxcyb0ykplj";
};
+ postPatch = ''
+ cp ${catch2}/include/catch2/catch.hpp external/catch/catch.hpp
+ '';
+
nativeBuildInputs = [
cmake
pkg-config
diff --git a/pkgs/os-specific/linux/util-linux/default.nix b/pkgs/os-specific/linux/util-linux/default.nix
index bedd2417e7ea..d54f577def3e 100644
--- a/pkgs/os-specific/linux/util-linux/default.nix
+++ b/pkgs/os-specific/linux/util-linux/default.nix
@@ -4,11 +4,11 @@
}:
stdenv.mkDerivation rec {
- pname = "util-linux";
+ pname = "util-linux" + lib.optionalString ( !nlsSupport && ncurses == null && systemd == null ) "-minimal";
version = "2.37.4";
src = fetchurl {
- url = "mirror://kernel/linux/utils/util-linux/v${lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
+ url = "mirror://kernel/linux/utils/util-linux/v${lib.versions.majorMinor version}/util-linux-${version}.tar.xz";
sha256 = "sha256-Y05pFq2RM2bDU2tkaOeER2lUm5mnsr+AMU3nirVlW4M=";
};
diff --git a/pkgs/servers/home-assistant/default.nix b/pkgs/servers/home-assistant/default.nix
index ce72bb0f8ed9..32273d35e7a7 100644
--- a/pkgs/servers/home-assistant/default.nix
+++ b/pkgs/servers/home-assistant/default.nix
@@ -58,6 +58,18 @@ let
});
})
+ (self: super: {
+ hatasmota = super.hatasmota.overridePythonAttrs (oldAttrs: {
+ version = "0.3.1";
+ src = fetchFromGitHub {
+ owner = "emontnemery";
+ repo = "hatasmota";
+ rev = "0.3.1";
+ sha256 = "sha256-/am6cRhAdiqMq0u7Ed4qhIA+Em2O0gIt7HfP19+2XHw=";
+ };
+ });
+ })
+
(self: super: {
huawei-lte-api = super.huawei-lte-api.overridePythonAttrs (oldAttrs: rec {
version = "1.4.18";
diff --git a/pkgs/servers/http/trafficserver/default.nix b/pkgs/servers/http/trafficserver/default.nix
index 9058a4cbda75..06d640a5bc00 100644
--- a/pkgs/servers/http/trafficserver/default.nix
+++ b/pkgs/servers/http/trafficserver/default.nix
@@ -13,6 +13,7 @@
, python3
, xz
, zlib
+, catch2
# recommended dependencies
, withHwloc ? true
, hwloc
@@ -113,6 +114,8 @@ stdenv.mkDerivation rec {
tools/check-unused-dependencies
substituteInPlace configure --replace '/usr/bin/file' '${file}/bin/file'
+
+ cp ${catch2}/include/catch2/catch.hpp tests/include/catch.hpp
'' + lib.optionalString stdenv.isLinux ''
substituteInPlace configure \
--replace '/usr/include/linux' '${linuxHeaders}/include/linux'
diff --git a/pkgs/servers/mail/postfix/default.nix b/pkgs/servers/mail/postfix/default.nix
index 08c55f771724..942023b4eaf4 100644
--- a/pkgs/servers/mail/postfix/default.nix
+++ b/pkgs/servers/mail/postfix/default.nix
@@ -1,5 +1,6 @@
{ stdenv, lib, fetchurl, makeWrapper, gnused, db, openssl, cyrus_sasl, libnsl
, coreutils, findutils, gnugrep, gawk, icu, pcre, m4
+, fetchpatch
, buildPackages, nixosTests
, withLDAP ? true, openldap
, withPgSQL ? false, postgresql
@@ -46,6 +47,12 @@ in stdenv.mkDerivation rec {
./postfix-3.0-no-warnings.patch
./post-install-script.patch
./relative-symlinks.patch
+
+ # glibc 2.34 compat
+ (fetchpatch {
+ url = "https://src.fedoraproject.org/rpms/postfix/raw/2f9d42453e67ebc43f786d98262a249037f80a77/f/postfix-3.6.2-glibc-234-build-fix.patch";
+ sha256 = "sha256-xRUL5gaoIt6HagGlhsGwvwrAfYvzMgydsltYMWvl9BI=";
+ })
];
postPatch = lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) ''
diff --git a/pkgs/servers/monitoring/grafana/default.nix b/pkgs/servers/monitoring/grafana/default.nix
index e3877265ca35..c541c74d5be5 100644
--- a/pkgs/servers/monitoring/grafana/default.nix
+++ b/pkgs/servers/monitoring/grafana/default.nix
@@ -4,7 +4,7 @@ buildGoModule rec {
pname = "grafana";
version = "8.4.5";
- excludedPackages = "\\(alert_webhook_listener\\|clean-swagger\\|release_publisher\\|slow_proxy\\|slow_proxy_mac\\|macaron\\)";
+ excludedPackages = [ "alert_webhook_listener" "clean-swagger" "release_publisher" "slow_proxy" "slow_proxy_mac" "macaron" ];
src = fetchFromGitHub {
rev = "v${version}";
diff --git a/pkgs/servers/nosql/arangodb/default.nix b/pkgs/servers/nosql/arangodb/default.nix
index bf7f7b439609..d9f1892beca9 100644
--- a/pkgs/servers/nosql/arangodb/default.nix
+++ b/pkgs/servers/nosql/arangodb/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, lib, fetchFromGitHub, openssl, zlib, cmake, python2, perl, snappy, lzo, which }:
+{ stdenv, lib, fetchFromGitHub, openssl, zlib, cmake, python2, perl, snappy, lzo, which, catch2, catch }:
let
common = { version, sha256 }: stdenv.mkDerivation {
@@ -26,6 +26,14 @@ let
# with nixpkgs, it has no sense to check for a version update
substituteInPlace js/client/client.js --replace "require('@arangodb').checkAvailableVersions();" ""
substituteInPlace js/server/server.js --replace "require('@arangodb').checkAvailableVersions();" ""
+
+ ${if (lib.versionOlder version "3.4") then ''
+ cp ${catch}/include/catch/catch.hpp 3rdParty/catch/catch.hpp
+ '' else if (lib.versionOlder version "3.5") then ''
+ cp ${catch2}/include/catch2/catch.hpp 3rdParty/catch/catch.hpp
+ '' else ''
+ (cd 3rdParty/boost/1.69.0 && patch -p1 < ${../../../development/libraries/boost/pthread-stack-min-fix.patch})
+ ''}
'';
cmakeFlags = [
diff --git a/pkgs/servers/ursadb/default.nix b/pkgs/servers/ursadb/default.nix
index 836a5934d96b..c9b39eccd8a8 100644
--- a/pkgs/servers/ursadb/default.nix
+++ b/pkgs/servers/ursadb/default.nix
@@ -11,6 +11,14 @@ stdenv.mkDerivation rec {
hash = "sha256-/EK1CKJ0IR7fkKSpQkONbWcz6uhUoAwK430ljNYsV5U=";
};
+ postPatch = ''
+ substituteInPlace CMakeLists.txt \
+ --replace \
+ "add_executable(ursadb_test Tests.cpp)" "" \
+ --replace \
+ "target_link_libraries(ursadb_test ursa)" ""
+ '';
+
installPhase = ''
mkdir -p $out/bin
cp ursadb $out/bin/
diff --git a/pkgs/servers/xmpp/prosody/default.nix b/pkgs/servers/xmpp/prosody/default.nix
index 1556250447a9..6b70c4cc9874 100644
--- a/pkgs/servers/xmpp/prosody/default.nix
+++ b/pkgs/servers/xmpp/prosody/default.nix
@@ -72,17 +72,17 @@ stdenv.mkDerivation rec {
cp -r $communityModules/mod_${module} $out/lib/prosody/modules/
'') (lib.lists.unique(nixosModuleDeps ++ withCommunityModules ++ withOnlyInstalledCommunityModules))}
wrapProgram $out/bin/prosody \
- --set LUA_PATH "$luaEnvPath" \
- --set LUA_CPATH "$luaEnvCPath"
+ --prefix LUA_PATH ';' "$luaEnvPath" \
+ --prefix LUA_CPATH ';' "$luaEnvCPath"
wrapProgram $out/bin/prosodyctl \
--add-flags '--config "/etc/prosody/prosody.cfg.lua"' \
- --set LUA_PATH "$luaEnvPath" \
- --set LUA_CPATH "$luaEnvCPath"
+ --prefix LUA_PATH ';' "$luaEnvPath" \
+ --prefix LUA_CPATH ';' "$luaEnvCPath"
make -C tools/migration install
wrapProgram $out/bin/prosody-migrator \
- --set LUA_PATH "$luaEnvPath" \
- --set LUA_CPATH "$luaEnvCPath"
+ --prefix LUA_PATH ';' "$luaEnvPath" \
+ --prefix LUA_CPATH ';' "$luaEnvCPath"
'';
passthru = {
diff --git a/pkgs/stdenv/generic/setup.sh b/pkgs/stdenv/generic/setup.sh
index 0777fa830c10..350fff482528 100644
--- a/pkgs/stdenv/generic/setup.sh
+++ b/pkgs/stdenv/generic/setup.sh
@@ -143,14 +143,14 @@ exitHandler() {
echo "build failed with exit code $exitCode (ignored)"
mkdir -p "$out/nix-support"
printf "%s" "$exitCode" > "$out/nix-support/failed"
- exit 0
+ return 0
fi
else
runHook exitHook
fi
- exit "$exitCode"
+ return "$exitCode"
}
trap "exitHandler" EXIT
diff --git a/pkgs/stdenv/linux/make-bootstrap-tools.nix b/pkgs/stdenv/linux/make-bootstrap-tools.nix
index 84b63e7b8fd0..1d6ebe6284f5 100644
--- a/pkgs/stdenv/linux/make-bootstrap-tools.nix
+++ b/pkgs/stdenv/linux/make-bootstrap-tools.nix
@@ -74,6 +74,9 @@ in with pkgs; rec {
cp -d ${libc.out}/lib/libresolv*.so* $out/lib
cp -d ${libc.out}/lib/crt?.o $out/lib
+ # Hacky compat with our current unpack-bootstrap-tools.sh
+ ln -s librt.so "$out"/lib/librt-dummy.so
+
cp -rL ${libc.dev}/include $out
chmod -R u+w "$out"
diff --git a/pkgs/test/default.nix b/pkgs/test/default.nix
index 0e1b9c2ac7a0..63aaf6bb72e7 100644
--- a/pkgs/test/default.nix
+++ b/pkgs/test/default.nix
@@ -59,6 +59,7 @@ with pkgs;
trivial-builders = recurseIntoAttrs {
writeStringReferencesToFile = callPackage ../build-support/trivial-builders/test/writeStringReferencesToFile.nix {};
+ writeTextFile = callPackage ../build-support/trivial-builders/test/write-text-file.nix {};
references = callPackage ../build-support/trivial-builders/test/references.nix {};
overriding = callPackage ../build-support/trivial-builders/test-overriding.nix {};
concat = callPackage ../build-support/trivial-builders/test/concat-test.nix {};
diff --git a/pkgs/tools/X11/xnee/default.nix b/pkgs/tools/X11/xnee/default.nix
index c3355b802633..00ebb1ecec23 100644
--- a/pkgs/tools/X11/xnee/default.nix
+++ b/pkgs/tools/X11/xnee/default.nix
@@ -15,6 +15,12 @@ stdenv.mkDerivation rec {
do
sed -i "$i" -e's|/bin/bash|${stdenv.shell}|g ; s|/usr/bin/env bash|${stdenv.shell}|g'
done
+
+ # Fix for glibc-2.34. For some reason, `LIBSEMA="CCC"` is added
+ # if `sem_init` is part of libc which causes errors like
+ # `gcc: error: CCC: No such file or directory` during the build.
+ substituteInPlace configure \
+ --replace 'LIBSEMA="CCC"' 'LIBSEMA=""'
'';
buildInputs =
diff --git a/pkgs/tools/admin/awscli/default.nix b/pkgs/tools/admin/awscli/default.nix
index 11cf6c53076c..1e82459f4c6a 100644
--- a/pkgs/tools/admin/awscli/default.nix
+++ b/pkgs/tools/admin/awscli/default.nix
@@ -35,11 +35,11 @@ let
in
with py.pkgs; buildPythonApplication rec {
pname = "awscli";
- version = "1.22.35"; # N.B: if you change this, change botocore and boto3 to a matching version too
+ version = "1.22.67"; # N.B: if you change this, change botocore and boto3 to a matching version too
src = fetchPypi {
inherit pname version;
- hash = "sha256-GsMclLh/VtPaNjD+XDKqTYeSX29R2aRS7If9G918OWY=";
+ hash = "sha256-ofgxL9V/jTn/itxSOLGYkAmgQXES7aVUM/vM6nWdbBc=";
};
# https://github.com/aws/aws-cli/issues/4837
diff --git a/pkgs/tools/admin/awscli2/default.nix b/pkgs/tools/admin/awscli2/default.nix
index 08fb92e4ea63..16c547dbeba6 100644
--- a/pkgs/tools/admin/awscli2/default.nix
+++ b/pkgs/tools/admin/awscli2/default.nix
@@ -33,13 +33,13 @@ let
in
with py.pkgs; buildPythonApplication rec {
pname = "awscli2";
- version = "2.4.19"; # N.B: if you change this, change botocore to a matching version too
+ version = "2.4.23"; # N.B: if you change this, change botocore to a matching version too
src = fetchFromGitHub {
owner = "aws";
repo = "aws-cli";
rev = version;
- sha256 = "sha256-ZOSZBZT4d5jv5lg8KkGoOJqAvStUsGZbiXp3dpsrOpo=";
+ sha256 = "sha256-zpkphlIfmexqZm0lZgDP3RoQJqTpFdT+5dGtaLiRr/U=";
};
propagatedBuildInputs = [
@@ -69,7 +69,6 @@ with py.pkgs; buildPythonApplication rec {
postPatch = ''
substituteInPlace setup.cfg \
--replace "colorama>=0.2.5,<0.4.4" "colorama" \
- --replace "cryptography>=3.3.2,<3.4.0" "cryptography" \
--replace "docutils>=0.10,<0.16" "docutils" \
--replace "ruamel.yaml>=0.15.0,<0.16.0" "ruamel.yaml" \
--replace "wcwidth<0.2.0" "wcwidth" \
diff --git a/pkgs/tools/admin/azure-cli/default.nix b/pkgs/tools/admin/azure-cli/default.nix
index efd1ecfee3c1..01cb5081cf4f 100644
--- a/pkgs/tools/admin/azure-cli/default.nix
+++ b/pkgs/tools/admin/azure-cli/default.nix
@@ -1,7 +1,7 @@
{ stdenv, lib, python3, fetchFromGitHub, installShellFiles }:
let
- version = "2.32.0";
+ version = "2.34.1";
srcName = "azure-cli-${version}-src";
src = fetchFromGitHub {
@@ -9,7 +9,7 @@ let
owner = "Azure";
repo = "azure-cli";
rev = "azure-cli-${version}";
- sha256 = "sha256-PXY32bfuK0bQGI0N+XHs9lakF6K7+WjrHMvuNgDFSJM=";
+ sha256 = "sha256-BEEwxf3UTShKi3K/uBK1yMxyPCvybL/BbKsu8XAwu0M=";
};
# put packages that needs to be overriden in the py package scope
diff --git a/pkgs/tools/admin/azure-cli/python-packages.nix b/pkgs/tools/admin/azure-cli/python-packages.nix
index d27805bb257e..5b8732f53751 100644
--- a/pkgs/tools/admin/azure-cli/python-packages.nix
+++ b/pkgs/tools/admin/azure-cli/python-packages.nix
@@ -69,7 +69,8 @@ let
postPatch = ''
substituteInPlace setup.py \
--replace "requests[socks]~=2.25.1" "requests[socks]~=2.25" \
- --replace "cryptography>=3.2,<3.4" "cryptography"
+ --replace "cryptography>=3.2,<3.4" "cryptography" \
+ --replace "msal-extensions>=0.3.1,<0.4" "msal-extensions"
'';
checkInputs = with self; [ pytest ];
@@ -117,11 +118,11 @@ let
'';
};
- azure-batch = overrideAzureMgmtPackage super.azure-batch "11.0.0" "zip"
- "sha256-zl/bDsli7d/oXNgiBekXfLC720RSZXRuOLO7vx8W3HM=";
+ azure-batch = overrideAzureMgmtPackage super.azure-batch "12.0.0" "zip"
+ "sha256-GpseF4mEp79JWvZ7zOUfDbHkqKlXr7KeM1VKFKlnTes=";
- azure-mgmt-apimanagement = overrideAzureMgmtPackage super.azure-mgmt-apimanagement "0.2.0" "zip"
- "0whx3s8ri9939r3pdvjf8iqcslas1xy6cnccidmp10r5ng0023vr";
+ azure-mgmt-apimanagement = overrideAzureMgmtPackage super.azure-mgmt-apimanagement "3.0.0" "zip"
+ "9262f54ed387eb083d8dae66d32a8df35647319b902bd498cdc376f50a12d154";
azure-mgmt-batch = overrideAzureMgmtPackage super.azure-mgmt-batch "16.0.0" "zip"
"1b3cecd6f16813879c6ac1a1bb01f9a6f2752cd1f9157eb04d5e41e4a89f3c34";
@@ -156,8 +157,8 @@ let
azure-mgmt-cognitiveservices = overrideAzureMgmtPackage super.azure-mgmt-cognitiveservices "13.0.0" "zip"
"dc6116e8394d45312c7ad5a9098ce0dd2370bd92d43afd33d8b3bfab724fa498";
- azure-mgmt-compute = overrideAzureMgmtPackage super.azure-mgmt-compute "23.1.0" "zip"
- "sha256-Sduw9RAG1VfL0LIpmcuezz6rwr5G2W78xtZRxrM3VLM=";
+ azure-mgmt-compute = overrideAzureMgmtPackage super.azure-mgmt-compute "25.0.0" "zip"
+ "sha256-Y0WNBtQ9v0yhTVFfTvfcudWHOjzGagGB+/b++3Ie5Kk=";
azure-mgmt-consumption = overrideAzureMgmtPackage super.azure-mgmt-consumption "2.0.0" "zip"
"12ai4qps73ivawh0yzvgb148ksx02r30pqlvfihx497j62gsi1cs";
@@ -165,8 +166,8 @@ let
azure-mgmt-containerinstance = overrideAzureMgmtPackage super.azure-mgmt-containerinstance "9.1.0" "zip"
"sha256-N+zUTEnOyn18lDHlkUj+vRXX/sJhZR7XLd1YdV50ULA=";
- azure-mgmt-containerservice = overrideAzureMgmtPackage super.azure-mgmt-containerservice "16.1.0" "zip"
- "sha256-NlTIrOK4ho0OqcTHjHT1HobiMzDH2KY20TIlN0fm8/Q=";
+ azure-mgmt-containerservice = overrideAzureMgmtPackage super.azure-mgmt-containerservice "17.0.0" "zip"
+ "sha256-oUbWdZryabCCg/gTujchT7p1nS7IDoU5W9MQ4ekJYH8=";
azure-mgmt-cosmosdb = overrideAzureMgmtPackage super.azure-mgmt-cosmosdb "7.0.0b2" "zip"
"sha256-hVvYW9gkfTVMwis3IdD0JXYDxdKcyyzIFx3hNk7VMLI=";
@@ -183,11 +184,11 @@ let
azure-mgmt-imagebuilder = overrideAzureMgmtPackage super.azure-mgmt-imagebuilder "1.0.0" "zip"
"634e398de9a23e712aa27a4a59f9ea5d5091d1dfcfed5ac977230918872c4430";
- azure-mgmt-iothub = overrideAzureMgmtPackage super.azure-mgmt-iothub "2.1.0" "zip"
- "2724f48cadb1be7ee96fc26c7bfa178f82cea5d325e785e91d9f26965fa8e46f";
+ azure-mgmt-iothub = overrideAzureMgmtPackage super.azure-mgmt-iothub "2.2.0" "zip"
+ "sha256-nsAeVhs5N8bpwYenmRwJmqF/IAqz/ulSoYIeOU5l0eM=";
- azure-mgmt-iothubprovisioningservices = overrideAzureMgmtPackage super.azure-mgmt-iothubprovisioningservices "1.0.0" "zip"
- "e5871b03488b5ae6dfc441cdbda40cb39c000635ee57c513053792b3c15826a9";
+ azure-mgmt-iothubprovisioningservices = overrideAzureMgmtPackage super.azure-mgmt-iothubprovisioningservices "1.1.0" "zip"
+ "sha256-04OoJuff93L62G6IozpmHpEaUbHHHD6nKlkMHVoJvJ4=";
azure-mgmt-iotcentral = overrideAzureMgmtPackage super.azure-mgmt-iotcentral "9.0.0" "zip"
"64df73df449a6f3717f3d0963e5869224ed3e6216c79de571493bea7c1b52cb6";
@@ -198,14 +199,14 @@ let
azure-mgmt-devtestlabs = overrideAzureMgmtPackage super.azure-mgmt-devtestlabs "4.0.0" "zip"
"1397ksrd61jv7400mgn8sqngp6ahir55fyq9n5k69wk88169qm2r";
- azure-mgmt-netapp = overrideAzureMgmtPackage super.azure-mgmt-netapp "5.1.0" "zip"
- "sha256-MGCICI7hDobEzyTMgqnKYZ21zfwNo/ogfQDsf3fwbo4=";
+ azure-mgmt-netapp = overrideAzureMgmtPackage super.azure-mgmt-netapp "6.0.1" "zip"
+ "6ce683587be1638d8d77620b7af118060b8b7dfc4fd23d46a623a66edcb388e1";
azure-mgmt-dns = overrideAzureMgmtPackage super.azure-mgmt-dns "8.0.0" "zip"
"407c2dacb33513ffbe9ca4be5addb5e9d4bae0cb7efa613c3f7d531ef7bf8de8";
- azure-mgmt-loganalytics = overrideAzureMgmtPackage super.azure-mgmt-loganalytics "12.0.0" "zip"
- "da128a7e0291be7fa2063848df92a9180cf5c16d42adc09d2bc2efd711536bfb";
+ azure-mgmt-loganalytics = overrideAzureMgmtPackage super.azure-mgmt-loganalytics "13.0.0b2" "zip"
+ "sha256-j8CyWZGF7Z/5szJ+CD96E0EbNsceJ1SScrlPqWVLjnk=";
azure-mgmt-network = overrideAzureMgmtPackage super.azure-mgmt-network "19.3.0" "zip"
"0b6a1ccdffd76e057ab16a6c319740a0ca68d59fedf7e9c02f2437396e72aa11";
@@ -216,8 +217,8 @@ let
azure-mgmt-managedservices = overrideAzureMgmtPackage super.azure-mgmt-managedservices "1.0.0" "zip"
"sha256-/tg5n8Z3Oq2jfB0ElqRvWUENd8lJTQyllnxTHDN2rRk=";
- azure-mgmt-managementgroups = overrideAzureMgmtPackage super.azure-mgmt-managementgroups "0.1.0" "zip"
- "sha256-/2LZgu3aY0o2Fgyx0Vo2epVypay0GeXnrTcejIO9R8c=";
+ azure-mgmt-managementgroups = overrideAzureMgmtPackage super.azure-mgmt-managementgroups "1.0.0" "zip"
+ "bab9bd532a1c34557f5b0ab9950e431e3f00bb96e8a3ce66df0f6ce2ae19cd73";
azure-mgmt-marketplaceordering = overrideAzureMgmtPackage super.azure-mgmt-marketplaceordering "1.1.0" "zip"
"68b381f52a4df4435dacad5a97e1c59ac4c981f667dcca8f9d04453417d60ad8";
@@ -231,8 +232,8 @@ let
azure-mgmt-privatedns = overrideAzureMgmtPackage super.azure-mgmt-privatedns "1.0.0" "zip"
"b60f16e43f7b291582c5f57bae1b083096d8303e9d9958e2c29227a55cc27c45";
- azure-mgmt-web = overrideAzureMgmtPackage super.azure-mgmt-web "4.0.0" "zip"
- "sha256-5XQ3qTPn3qmwYY/nkODa3GP5hXc1NhrItfXoBiucKg0=";
+ azure-mgmt-web = overrideAzureMgmtPackage super.azure-mgmt-web "6.1.0" "zip"
+ "c26635089276515b0488fcf014aab50a0446f54800c6e0e5583cc493ac8d738f";
azure-mgmt-redhatopenshift = overrideAzureMgmtPackage super.azure-mgmt-redhatopenshift "1.0.0" "zip"
"94cd41f1ebd82e40620fd3e6d88f666b5c19ac7cf8b4e8edadb9721bd7c80980";
@@ -291,11 +292,11 @@ let
azure-mgmt-authorization = overrideAzureMgmtPackage super.azure-mgmt-authorization "0.61.0" "zip"
"0xfvx2dvfj3fbz4ngn860ipi4v6gxqajyjc8x92r8knhmniyxk7m";
- azure-mgmt-storage = overrideAzureMgmtPackage super.azure-mgmt-storage "19.0.0" "zip"
- "f05963e5a8696d0fd4dcadda4feecb9b382a380d2e461b3647704ac787d79876";
+ azure-mgmt-storage = overrideAzureMgmtPackage super.azure-mgmt-storage "19.1.0" "zip"
+ "sha256-Seoi8A4JZaNVCvNKQcGh06SBaQ9lAMeOhUCIAvVtdBY=";
- azure-mgmt-servicebus = overrideAzureMgmtPackage super.azure-mgmt-servicebus "6.0.0" "zip"
- "f6c64ed97d22d0c03c4ca5fc7594bd0f3d4147659c10110160009b93f541298e";
+ azure-mgmt-servicebus = overrideAzureMgmtPackage super.azure-mgmt-servicebus "7.1.0" "zip"
+ "d8ae7905fb7d3e24822daa20aa7bc5014f41aa18b48ea2d0161e997fc11a3d36";
azure-mgmt-servicefabric = overrideAzureMgmtPackage super.azure-mgmt-servicefabric "1.0.0" "zip"
"de35e117912832c1a9e93109a8d24cab94f55703a9087b2eb1c5b0655b3b1913";
@@ -413,12 +414,12 @@ let
});
azure-keyvault-keys = super.azure-keyvault-keys.overridePythonAttrs(oldAttrs: rec {
- version = "4.5.0b4";
+ version = "4.5.0b6";
src = super.fetchPypi {
inherit (oldAttrs) pname;
inherit version;
extension = "zip";
- sha256 = "sha256-f43ZTMFc0IVIaa69gEZFOLALREcx3RRCFoYDY2FYLrY=";
+ sha256 = "sha256-WFSRJaia0+WnvGxoMYZIvf81ue51VPYXzTp8huUh1fc=";
};
});
@@ -481,18 +482,6 @@ let
};
});
- PyGithub = super.PyGithub.overridePythonAttrs(oldAttrs: rec {
- version = "1.38";
-
- src = super.fetchPypi {
- inherit (oldAttrs) pname;
- inherit version;
- sha256 = "sha256-HtCPd17FBnvIRStyveLbuVz05S/yvVDMMsackf+tknI=";
- };
-
- doCheck = false;
- });
-
knack = super.knack.overridePythonAttrs(oldAttrs: rec {
version = "0.9.0";
diff --git a/pkgs/tools/compression/bzip2/default.nix b/pkgs/tools/compression/bzip2/default.nix
index da37cf9fbd8c..cd262875a76b 100644
--- a/pkgs/tools/compression/bzip2/default.nix
+++ b/pkgs/tools/compression/bzip2/default.nix
@@ -44,6 +44,10 @@ stdenv.mkDerivation rec {
enableParallelBuilding = true;
+ postInstall = ''
+ ln -s $out/lib/libbz2.so.1.0.* $out/lib/libbz2.so.1.0
+ '';
+
meta = with lib; {
description = "High-quality data compression program";
homepage = "https://www.sourceware.org/bzip2";
diff --git a/pkgs/tools/filesystems/btrfs-progs/default.nix b/pkgs/tools/filesystems/btrfs-progs/default.nix
index c51cc12da36b..fad1944c4a0e 100644
--- a/pkgs/tools/filesystems/btrfs-progs/default.nix
+++ b/pkgs/tools/filesystems/btrfs-progs/default.nix
@@ -7,11 +7,11 @@
stdenv.mkDerivation rec {
pname = "btrfs-progs";
- version = "5.16.1";
+ version = "5.16.2";
src = fetchurl {
url = "mirror://kernel/linux/kernel/people/kdave/btrfs-progs/btrfs-progs-v${version}.tar.xz";
- sha256 = "sha256-PaTaU2HPhr3dqA7bTE8w6gdstOvsKZBPoIr8kw754ag=";
+ sha256 = "sha256-npswOh0P2c6q8gTudMHI+h/VV5TiI9n+K8Yodey9U9I=";
};
nativeBuildInputs = [
diff --git a/pkgs/tools/filesystems/djmount/default.nix b/pkgs/tools/filesystems/djmount/default.nix
index f5b0a0315dfc..3111be5b4d12 100644
--- a/pkgs/tools/filesystems/djmount/default.nix
+++ b/pkgs/tools/filesystems/djmount/default.nix
@@ -8,6 +8,14 @@ stdenv.mkDerivation rec {
sha256 = "0kqf0cy3h4cfiy5a2sigmisx0lvvsi1n0fbyb9ll5gacmy1b8nxa";
};
+ postPatch = ''
+ # Taken from https://github.com/pupnp/pupnp/pull/334/files
+ substituteInPlace libupnp/threadutil/inc/ithread.h \
+ --replace \
+ "#define ithread_mutexattr_setkind_np pthread_mutexattr_setkind_np" \
+ '#define ithread_mutexattr_setkind_np pthread_mutexattr_settype'
+ '';
+
nativeBuildInputs = [ pkg-config ];
buildInputs = [ fuse];
diff --git a/pkgs/tools/filesystems/securefs/default.nix b/pkgs/tools/filesystems/securefs/default.nix
index 44e547b01c24..4d56f08b4426 100644
--- a/pkgs/tools/filesystems/securefs/default.nix
+++ b/pkgs/tools/filesystems/securefs/default.nix
@@ -20,6 +20,10 @@ stdenv.mkDerivation rec {
./add-macfuse-support.patch
];
+ postPatch = ''
+ sed -i -e '/TEST_SOURCES/d' CMakeLists.txt
+ '';
+
nativeBuildInputs = [ cmake ];
buildInputs = [ fuse ];
diff --git a/pkgs/tools/misc/aspcud/default.nix b/pkgs/tools/misc/aspcud/default.nix
index ef1b6a5a4ca5..12cc6572abcb 100644
--- a/pkgs/tools/misc/aspcud/default.nix
+++ b/pkgs/tools/misc/aspcud/default.nix
@@ -2,6 +2,7 @@
, stdenv
, fetchFromGitHub
, boost
+, catch2
, clasp
, cmake
, gringo
@@ -19,6 +20,10 @@ stdenv.mkDerivation rec {
hash = "sha256-d04GPMoz6PMGq6iiul0zT1C9Mljdl9uJJ2C8MIwcmaw=";
};
+ postPatch = ''
+ cp ${catch2}/include/catch2/catch.hpp libcudf/tests/catch.hpp
+ '';
+
nativeBuildInputs = [ cmake ];
buildInputs = [ boost clasp gringo re2c ];
@@ -28,6 +33,8 @@ stdenv.mkDerivation rec {
"-DASPCUD_CLASP_PATH=${clasp}/bin/clasp"
];
+ doCheck = true;
+
meta = with lib; {
description = "Solver for package problems in CUDF format using ASP";
homepage = "https://potassco.org/aspcud/";
diff --git a/pkgs/tools/misc/ethtool/default.nix b/pkgs/tools/misc/ethtool/default.nix
index 65797f65fe6d..d46815e8bf2a 100644
--- a/pkgs/tools/misc/ethtool/default.nix
+++ b/pkgs/tools/misc/ethtool/default.nix
@@ -7,11 +7,11 @@
stdenv.mkDerivation rec {
pname = "ethtool";
- version = "5.15";
+ version = "5.16";
src = fetchurl {
url = "mirror://kernel/software/network/${pname}/${pname}-${version}.tar.xz";
- sha256 = "sha256-aG/WEQOJ1JwqEg8Aw81d/kPeutqOAh5CcNdLvkUqEW0=";
+ sha256 = "sha256-qi/vGTbdShF1XfoL25Pw7FvqRSCNJ8l1S8Or4apCwcs=";
};
nativeBuildInputs = [
diff --git a/pkgs/tools/misc/findutils/default.nix b/pkgs/tools/misc/findutils/default.nix
index 3746c4b4657f..56d710c85454 100644
--- a/pkgs/tools/misc/findutils/default.nix
+++ b/pkgs/tools/misc/findutils/default.nix
@@ -40,7 +40,7 @@ stdenv.mkDerivation rec {
"--localstatedir=/var/cache"
];
- CFLAGS = [
+ CFLAGS = lib.optionals stdenv.isDarwin [
# TODO: Revisit upstream issue https://savannah.gnu.org/bugs/?59972
# https://github.com/Homebrew/homebrew-core/pull/69761#issuecomment-770268478
"-D__nonnull\\(params\\)="
diff --git a/pkgs/tools/misc/fontforge/default.nix b/pkgs/tools/misc/fontforge/default.nix
index 6bb728af99ca..3de016bf6d68 100644
--- a/pkgs/tools/misc/fontforge/default.nix
+++ b/pkgs/tools/misc/fontforge/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchpatch, fetchFromGitHub, lib
, cmake, perl, uthash, pkg-config, gettext
, python, freetype, zlib, glib, giflib, libpng, libjpeg, libtiff, libxml2, cairo, pango
-, readline, woff2, zeromq, libuninameslist
+, readline, woff2, zeromq
, withSpiro ? false, libspiro
, withGTK ? false, gtk3
, withGUI ? withGTK
@@ -14,13 +14,13 @@ assert withGTK -> withGUI;
stdenv.mkDerivation rec {
pname = "fontforge";
- version = "20201107";
+ version = "20220308";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = version;
- sha256 = "sha256-Rl/5lbXaPgIndANaD0IakaDus6T53FjiBb45FIuGrvc=";
+ sha256 = "sha256-q+71PDPODl5fEEy3d1icRl+rBGY7AhH+2dMUKeBWGgI=";
};
patches = [
@@ -28,13 +28,11 @@ stdenv.mkDerivation rec {
# Taken from https://salsa.debian.org/fonts-team/fontforge/-/blob/master/debian/patches/0001-add-extra-cmake-install-rules.patch
(fetchpatch {
url = "https://salsa.debian.org/fonts-team/fontforge/raw/76bffe6ccf8ab20a0c81476a80a87ad245e2fd1c/debian/patches/0001-add-extra-cmake-install-rules.patch";
- sha256 = "u3D9od2xLECNEHhZ+8dkuv9818tPkdP6y/Tvd9CADJg=";
- })
- # Fix segmentation fault with some fonts.
- # This is merged and should be present in the next release.
- (fetchpatch {
- url = "https://github.com/fontforge/fontforge/commit/69e263b2aff29ad22f97f13935cfa97a1eabf207.patch";
- sha256 = "06yyf90605aq6ppfiz83mqkdmnaq5418axp9jgsjyjq78b00xb29";
+ excludes = [
+ # Already handled upstream: https://github.com/fontforge/fontforge/commit/f97a2cd7b344ec8fcb9f8bfb908e1b6f36326d20
+ "contrib/cidmap/CMakeLists.txt"
+ ];
+ sha256 = "iQwaGeBHUais979hGVbU2NxKozQSQkpYXjApxPuLI/4=";
})
];
@@ -52,7 +50,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkg-config cmake ];
buildInputs = [
- readline uthash woff2 zeromq libuninameslist
+ readline uthash woff2 zeromq
python freetype zlib glib giflib libpng libjpeg libtiff libxml2
]
++ lib.optionals withSpiro [ libspiro ]
diff --git a/pkgs/tools/networking/curl/default.nix b/pkgs/tools/networking/curl/default.nix
index bfd48893165c..c032ba61c123 100644
--- a/pkgs/tools/networking/curl/default.nix
+++ b/pkgs/tools/networking/curl/default.nix
@@ -54,14 +54,14 @@ assert zstdSupport -> zstd != null;
stdenv.mkDerivation rec {
pname = "curl";
- version = "7.81.0";
+ version = "7.82.0";
src = fetchurl {
urls = [
"https://curl.haxx.se/download/${pname}-${version}.tar.bz2"
"https://github.com/curl/curl/releases/download/${lib.replaceStrings ["."] ["_"] pname}-${version}/${pname}-${version}.tar.bz2"
];
- sha256 = "sha256-Hno41wGOwGDx8W34OYVPCInpThIsTPpdOjfC3Fbx4lg=";
+ sha256 = "sha256-RtmgQAozQI/ZkncLBKRKdDSzA28ugImsKLV1c9WdNx8=";
};
patches = [
diff --git a/pkgs/tools/networking/eternal-terminal/default.nix b/pkgs/tools/networking/eternal-terminal/default.nix
index 035a99103fc7..0fb559afc990 100644
--- a/pkgs/tools/networking/eternal-terminal/default.nix
+++ b/pkgs/tools/networking/eternal-terminal/default.nix
@@ -7,6 +7,7 @@
, openssl
, protobuf
, zlib
+, catch2
}:
stdenv.mkDerivation rec {
@@ -20,6 +21,10 @@ stdenv.mkDerivation rec {
hash = "sha256-cCZbG0CD5V/FTj1BuVr083EJ+BCgIcKHomNtpJb3lOo=";
};
+ preBuild = ''
+ cp ${catch2}/include/catch2/catch.hpp ../external_imported/Catch2/single_include/catch2/catch.hpp
+ '';
+
nativeBuildInputs = [
cmake
];
@@ -42,6 +47,8 @@ stdenv.mkDerivation rec {
"-std=c++17"
];
+ doCheck = true;
+
meta = with lib; {
description = "Remote shell that automatically reconnects without interrupting the session";
homepage = "https://eternalterminal.dev/";
diff --git a/pkgs/tools/networking/modemmanager/default.nix b/pkgs/tools/networking/modemmanager/default.nix
index 126b3b513a86..c9d56044b0dc 100644
--- a/pkgs/tools/networking/modemmanager/default.nix
+++ b/pkgs/tools/networking/modemmanager/default.nix
@@ -5,11 +5,11 @@
stdenv.mkDerivation rec {
pname = "modemmanager";
- version = "1.18.4";
+ version = "1.18.6";
src = fetchurl {
url = "https://www.freedesktop.org/software/ModemManager/ModemManager-${version}.tar.xz";
- sha256 = "sha256-EfuXD2Pi2ojfS22HWeTuZJlExRUkS5eb9Qp6bfHX8Zk=";
+ sha256 = "sha256-1PgEsxz1BCOcXx1Jc8YglcAMuh7pq7UDcY2sbRRqRwo=";
};
nativeBuildInputs = [ vala gobject-introspection gettext pkg-config ];
diff --git a/pkgs/tools/networking/ntp/default.nix b/pkgs/tools/networking/ntp/default.nix
index 91e1767b75c1..f272470a98f4 100644
--- a/pkgs/tools/networking/ntp/default.nix
+++ b/pkgs/tools/networking/ntp/default.nix
@@ -9,6 +9,11 @@ stdenv.mkDerivation rec {
sha256 = "06cwhimm71safmwvp6nhxp6hvxsg62whnbgbgiflsqb8mgg40n7n";
};
+ patches = [
+ # From https://patchwork.openembedded.org/patch/180019/
+ ./glibc-2.34-fix.patch
+ ];
+
configureFlags = [
"--sysconfdir=/etc"
"--localstatedir=/var"
diff --git a/pkgs/tools/networking/ntp/glibc-2.34-fix.patch b/pkgs/tools/networking/ntp/glibc-2.34-fix.patch
new file mode 100644
index 000000000000..256f125a77b2
--- /dev/null
+++ b/pkgs/tools/networking/ntp/glibc-2.34-fix.patch
@@ -0,0 +1,28 @@
+From 082a504cfcc046c3d8adaae1164268bc94e5108a Mon Sep 17 00:00:00 2001
+From: Khem Raj
+Date: Sat, 31 Jul 2021 10:51:41 -0700
+Subject: [PATCH] libntp: Do not use PTHREAD_STACK_MIN on glibc
+In glibc 2.34+ PTHREAD_STACK_MIN is not a compile-time constant which
+could mean different stack sizes at runtime on different architectures
+and it also causes compile failure. Default glibc thread stack size
+or 64Kb set by ntp should be good in glibc these days.
+Upstream-Status: Pending
+Signed-off-by: Khem Raj
+---
+ libntp/work_thread.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+diff --git a/libntp/work_thread.c b/libntp/work_thread.c
+index 03a5647..3ddd751 100644
+--- a/libntp/work_thread.c
++++ b/libntp/work_thread.c
+@@ -41,7 +41,7 @@
+ #ifndef THREAD_MINSTACKSIZE
+ # define THREAD_MINSTACKSIZE (64U * 1024)
+ #endif
+-#ifndef __sun
++#if !defined(__sun) && !defined(__GLIBC__)
+ #if defined(PTHREAD_STACK_MIN) && THREAD_MINSTACKSIZE < PTHREAD_STACK_MIN
+ # undef THREAD_MINSTACKSIZE
+ # define THREAD_MINSTACKSIZE PTHREAD_STACK_MIN
+--
+2.32.0
diff --git a/pkgs/tools/networking/openconnect/default.nix b/pkgs/tools/networking/openconnect/default.nix
index 0e1da29320f0..5dea456d00bf 100644
--- a/pkgs/tools/networking/openconnect/default.nix
+++ b/pkgs/tools/networking/openconnect/default.nix
@@ -4,6 +4,7 @@
, pkg-config
, openssl ? null
, gnutls ? null
+, p11-kit
, gmp
, libxml2
, stoken
@@ -42,7 +43,8 @@ stdenv.mkDerivation rec {
];
buildInputs = [ openssl gnutls gmp libxml2 stoken zlib ]
- ++ lib.optional stdenv.isDarwin PCSC;
+ ++ lib.optional stdenv.isDarwin PCSC
+ ++ lib.optional stdenv.isLinux p11-kit;
nativeBuildInputs = [ pkg-config ]
++ lib.optional head autoreconfHook;
diff --git a/pkgs/tools/networking/openssh/default.nix b/pkgs/tools/networking/openssh/default.nix
index 36125a5893be..77277f20950b 100644
--- a/pkgs/tools/networking/openssh/default.nix
+++ b/pkgs/tools/networking/openssh/default.nix
@@ -6,11 +6,11 @@ in
openssh = common rec {
pname = "openssh";
- version = "8.8p1";
+ version = "8.9p1";
src = fetchurl {
url = "mirror://openbsd/OpenSSH/portable/openssh-${version}.tar.gz";
- sha256 = "1s8z6f7mi1pwsl79cqai8cr350m5lf2ifcxff57wx6mvm478k425";
+ sha256 = "sha256:1ry5prcax0134v6srkgznpl9ch5snkgq7yvjqvd8c5mbnxa7cjgx";
};
extraPatches = [ ./ssh-keysign-8.5.patch ];
diff --git a/pkgs/tools/networking/unbound/default.nix b/pkgs/tools/networking/unbound/default.nix
index b2d577dab330..b92fb23d64e5 100644
--- a/pkgs/tools/networking/unbound/default.nix
+++ b/pkgs/tools/networking/unbound/default.nix
@@ -8,6 +8,8 @@
, libsodium
, protobufc
, hiredis
+, python ? null
+, swig
, dns-root-data
, pkg-config
, makeWrapper
@@ -35,6 +37,7 @@
# Avoid .lib depending on lib.getLib openssl
# The build gets a little hacky, so in some cases we disable this approach.
, withSlimLib ? stdenv.isLinux && !stdenv.hostPlatform.isMusl && !withDNSTAP
+, withPythonModule ? false
, libnghttp2
}:
@@ -49,11 +52,13 @@ stdenv.mkDerivation rec {
outputs = [ "out" "lib" "man" ]; # "dev" would only split ~20 kB
- nativeBuildInputs = [ makeWrapper ];
+ nativeBuildInputs = [ makeWrapper ]
+ ++ lib.optionals withPythonModule [ swig ];
buildInputs = [ openssl nettle expat libevent ]
++ lib.optionals withSystemd [ pkg-config systemd ]
- ++ lib.optionals withDoH [ libnghttp2 ];
+ ++ lib.optionals withDoH [ libnghttp2 ]
+ ++ lib.optionals withPythonModule [ python ];
configureFlags = [
"--with-ssl=${openssl.dev}"
@@ -69,6 +74,8 @@ stdenv.mkDerivation rec {
"--disable-flto"
] ++ lib.optionals withSystemd [
"--enable-systemd"
+ ] ++ lib.optionals withPythonModule [
+ "--with-pythonmodule"
] ++ lib.optionals withDoH [
"--with-libnghttp2=${libnghttp2.dev}"
] ++ lib.optionals withECS [
@@ -100,12 +107,21 @@ stdenv.mkDerivation rec {
doCheck = true;
+ postPatch = lib.optionalString withPythonModule ''
+ substituteInPlace Makefile.in \
+ --replace "\$(DESTDIR)\$(PYTHON_SITE_PKG)" "$out/${python.sitePackages}"
+ '';
+
installFlags = [ "configfile=\${out}/etc/unbound/unbound.conf" ];
postInstall = ''
make unbound-event-install
wrapProgram $out/bin/unbound-control-setup \
--prefix PATH : ${lib.makeBinPath [ openssl ]}
+ '' + lib.optionalString withPythonModule ''
+ wrapProgram $out/bin/unbound \
+ --prefix PYTHONPATH : "$out/${python.sitePackages}" \
+ --argv0 $out/bin/unbound
'';
preFixup = lib.optionalString withSlimLib
diff --git a/pkgs/tools/package-management/pdm/default.nix b/pkgs/tools/package-management/pdm/default.nix
index 4e59333ed79b..cae4431ea65b 100644
--- a/pkgs/tools/package-management/pdm/default.nix
+++ b/pkgs/tools/package-management/pdm/default.nix
@@ -24,13 +24,13 @@ in
with python.pkgs;
buildPythonApplication rec {
pname = "pdm";
- version = "1.12.6";
+ version = "1.13.3";
format = "pyproject";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-MXKER2ijU+2yPnsBFH0cu/hjHI4uNt++AqggH5rhnaU=";
+ sha256 = "sha256-5+bjjljmk3AHaDVjYzNuC7lkkvlpLa9/grKgdmERC7k=";
};
# this patch allows us to run additional tests that invoke pdm, which checks
@@ -41,19 +41,12 @@ buildPythonApplication rec {
# doesn't appear to respect the settings in `$HOME`; possibly a bug upstream
patches = [
./check-update.patch
- (fetchurl {
- # Mark test that require network access
- url = "https://github.com/pdm-project/pdm/files/7911962/mark-network-tests.patch.txt";
- hash = "sha256:1dizf9j3z7zk4lxvnszwx63xzd9r68f2iva5sszzf8s8na831dvd";
- })
];
- postPatch = ''
- substituteInPlace pyproject.toml --replace "pdm-pep517>=0.9,<0.10" "pdm-pep517"
- '';
propagatedBuildInputs = [
blinker
click
+ findpython
installer
packaging
pdm-pep517
@@ -82,22 +75,19 @@ buildPythonApplication rec {
"-m 'not network'"
];
- preCheck = "HOME=$TMPDIR";
+ preCheck = ''
+ export HOME=$TMPDIR
+ '';
disabledTests = [
# sys.executable and expected executable are different
"test_set_non_exist_python_path"
# pythonfinder isn't aware of nix's python infrastructure
"test_auto_isolate_site_packages"
- "test_use_invalid_wrapper_python"
"test_use_wrapper_python"
- # tries to read/write files without proper permissions
- "test_completion_command"
- "test_plugin_add"
- "test_plugin_list"
- "test_plugin_remove"
- # tries to treat a gzip file as a zipfile and fails
- "test_resolve_local_artifacts"
+ "test_find_python_in_path"
+ # calls pip install and exits != 0
+ "test_pre_and_post_hooks"
];
meta = with lib; {
diff --git a/pkgs/tools/text/jumanpp/0001-Exclude-all-tests-from-the-build.patch b/pkgs/tools/text/jumanpp/0001-Exclude-all-tests-from-the-build.patch
new file mode 100644
index 000000000000..d41bada82def
--- /dev/null
+++ b/pkgs/tools/text/jumanpp/0001-Exclude-all-tests-from-the-build.patch
@@ -0,0 +1,177 @@
+From c52a5046e19718a43d48c9b3cfdc121d964e8c3b Mon Sep 17 00:00:00 2001
+From: Maximilian Bosch
+Date: Fri, 28 Jan 2022 17:43:35 +0100
+Subject: [PATCH] Exclude all tests from the build
+
+For some reason it isn't sufficient to set `-DJPP_ENABLE_TESTS=OFF`.
+Doing that because the tests on 2.0.0-rc3 don't seem to be working and
+the vendored catch2 doesn't build with glibc 2.34.
+---
+ src/CMakeLists.txt | 3 +--
+ src/core/CMakeLists.txt | 11 +----------
+ src/core/analysis/CMakeLists.txt | 2 --
+ src/core/codegen/CMakeLists.txt | 3 ---
+ src/core/spec/CMakeLists.txt | 2 --
+ src/core/training/CMakeLists.txt | 2 --
+ src/jumandic/CMakeLists.txt | 8 +-------
+ src/rnn/CMakeLists.txt | 5 +----
+ src/util/CMakeLists.txt | 2 --
+ 9 files changed, 4 insertions(+), 34 deletions(-)
+
+diff --git a/src/CMakeLists.txt b/src/CMakeLists.txt
+index 169dff5..64b6a07 100644
+--- a/src/CMakeLists.txt
++++ b/src/CMakeLists.txt
+@@ -67,7 +67,6 @@ function(jpp_feature_codegen)
+ endfunction(jpp_feature_codegen)
+
+ add_subdirectory(util)
+-add_subdirectory(testing)
+ add_subdirectory(core)
+ add_subdirectory(jumandic)
+-add_subdirectory(rnn)
+\ No newline at end of file
++add_subdirectory(rnn)
+diff --git a/src/core/CMakeLists.txt b/src/core/CMakeLists.txt
+index c63d134..01c825e 100644
+--- a/src/core/CMakeLists.txt
++++ b/src/core/CMakeLists.txt
+@@ -55,20 +55,11 @@ set(core_hdrs
+ ${core_hdrs}
+ )
+
+-set(core_test_srcs
+- ${core_test_srcs}
+- ${core_tsrcs}
+- test/test_analyzer_env.h
+- ../testing/test_analyzer.h
+- )
+-
+ add_library(jpp_core ${core_srcs} ${core_hdrs} ${libs3p_pegtl_headers})
+-jpp_test_executable(jpp_core_tests ${core_test_srcs})
+
+ target_include_directories(jpp_core PUBLIC ${jpp_core_cfg_dir})
+
+ target_link_libraries(jpp_core PUBLIC jpp_util jpp_rnn PRIVATE pathie)
+-target_link_libraries(jpp_core_tests jpp_core jpp_core_train)
+
+ if (${JPP_USE_PROTOBUF})
+ target_include_directories(jpp_core PUBLIC ${Protobuf_INCLUDE_DIR} ${CMAKE_CURRENT_BINARY_DIR})
+@@ -78,4 +69,4 @@ endif()
+ add_subdirectory(benchmarks)
+ if (${JPP_ENABLE_DEV_TOOLS})
+ add_subdirectory(devtools)
+-endif ()
+\ No newline at end of file
++endif ()
+diff --git a/src/core/analysis/CMakeLists.txt b/src/core/analysis/CMakeLists.txt
+index 526263e..1b32f8d 100644
+--- a/src/core/analysis/CMakeLists.txt
++++ b/src/core/analysis/CMakeLists.txt
+@@ -79,5 +79,3 @@ jpp_core_files(core_hdrs
+ )
+
+
+-jpp_test_executable(jpp_core_analysis_tests ${core_analysis_tsrc})
+-target_link_libraries(jpp_core_analysis_tests jpp_core)
+diff --git a/src/core/codegen/CMakeLists.txt b/src/core/codegen/CMakeLists.txt
+index a905cee..fa759c7 100644
+--- a/src/core/codegen/CMakeLists.txt
++++ b/src/core/codegen/CMakeLists.txt
+@@ -30,7 +30,4 @@ set(jpp_codegen_tsrcs
+
+ add_library(jpp_core_codegen ${jpp_codegen_srcs} ${jpp_codegen_hdrs})
+
+-jpp_test_executable(jpp_codegen_tests ${jpp_codegen_tsrcs})
+-target_include_directories(jpp_codegen_tests PRIVATE ${cgtest02_INCLUDE})
+ target_link_libraries(jpp_core_codegen jpp_core)
+-target_link_libraries(jpp_codegen_tests jpp_core_codegen)
+\ No newline at end of file
+diff --git a/src/core/spec/CMakeLists.txt b/src/core/spec/CMakeLists.txt
+index f495d67..da827b9 100644
+--- a/src/core/spec/CMakeLists.txt
++++ b/src/core/spec/CMakeLists.txt
+@@ -33,5 +33,3 @@ jpp_core_files(core_hdrs
+
+ )
+
+-jpp_test_executable(jpp_core_spec_tests ${core_spec_tsrc} ${libs3p_pegtl_headers})
+-target_link_libraries(jpp_core_spec_tests jpp_core)
+\ No newline at end of file
+diff --git a/src/core/training/CMakeLists.txt b/src/core/training/CMakeLists.txt
+index 960437e..4ede9e1 100644
+--- a/src/core/training/CMakeLists.txt
++++ b/src/core/training/CMakeLists.txt
+@@ -39,7 +39,5 @@ set(core_train_hdrs
+
+
+ add_library(jpp_core_train ${core_train_src} ${core_train_hdrs})
+-jpp_test_executable(jpp_core_train_tests ${core_train_tsrc})
+
+ target_link_libraries(jpp_core_train jpp_core)
+-target_link_libraries(jpp_core_train_tests jpp_core_train)
+\ No newline at end of file
+diff --git a/src/jumandic/CMakeLists.txt b/src/jumandic/CMakeLists.txt
+index bef3149..85a8b5d 100644
+--- a/src/jumandic/CMakeLists.txt
++++ b/src/jumandic/CMakeLists.txt
+@@ -53,10 +53,6 @@ if (${JPP_USE_PROTOBUF})
+ endif ()
+
+
+-jpp_test_executable(jpp_jumandic_tests ${jumandic_tests})
+-jpp_test_executable(jpp_bug_tests ${bug_test_sources})
+-target_include_directories(jpp_jumandic_tests PRIVATE ${jpp_jumandic_cg_INCLUDE})
+-
+ add_executable(jpp_jumandic_bootstrap main/bootstrap.cc)
+ add_executable(jumanpp_v2 main/jumanpp.cc)
+ add_executable(jumanpp_v2_train main/jumanpp_train.cc main/jumanpp_train.h)
+@@ -64,11 +60,9 @@ add_executable(jpp_jumandic_pathdiff main/path_diff.cc)
+ target_include_directories(jpp_jumandic_pathdiff PRIVATE ${jpp_jumandic_cg_INCLUDE})
+
+ target_link_libraries(jpp_jumandic jpp_jumandic_spec)
+-target_link_libraries(jpp_jumandic_tests jpp_jumandic jpp_core_train)
+-target_link_libraries(jpp_bug_tests jpp_jumandic jpp_core_train)
+ target_link_libraries(jpp_jumandic_bootstrap jpp_jumandic)
+ target_link_libraries(jumanpp_v2 jpp_jumandic)
+ target_link_libraries(jumanpp_v2_train jpp_jumandic jpp_core_train)
+ target_link_libraries(jpp_jumandic_pathdiff jpp_jumandic)
+
+-install(PROGRAMS ${CMAKE_CURRENT_BINARY_DIR}/jumanpp_v2 RENAME jumanpp DESTINATION bin)
+\ No newline at end of file
++install(PROGRAMS ${CMAKE_CURRENT_BINARY_DIR}/jumanpp_v2 RENAME jumanpp DESTINATION bin)
+diff --git a/src/rnn/CMakeLists.txt b/src/rnn/CMakeLists.txt
+index 448ba51..ca09a00 100644
+--- a/src/rnn/CMakeLists.txt
++++ b/src/rnn/CMakeLists.txt
+@@ -1,12 +1,9 @@
+ set(jpp_rnn_sources mikolov_rnn.cc)
+ set(jpp_rnn_includes mikolov_rnn.h simple_rnn_impl.h mikolov_rnn_impl.h rnn_arg_parse.h)
+-set(jpp_rnn_tests mikolov_rnn_test.cc)
+
+ add_library(jpp_rnn ${jpp_rnn_sources} ${jpp_rnn_includes} )
+ add_library(jumanpp_rnn_legacy legacy/rnnlmlib.h legacy/rnnlmlib_static.h legacy/rnnlmlib_static.cpp)
+
+-jpp_test_executable(jpp_rnn_tests ${jpp_rnn_tests})
+ target_link_libraries(jpp_rnn jpp_util)
+-target_link_libraries(jpp_rnn_tests jpp_rnn jumanpp_rnn_legacy)
+
+-target_link_libraries(jumanpp_rnn_legacy jpp_util)
+\ No newline at end of file
++target_link_libraries(jumanpp_rnn_legacy jpp_util)
+diff --git a/src/util/CMakeLists.txt b/src/util/CMakeLists.txt
+index 53b6c57..c4599d5 100644
+--- a/src/util/CMakeLists.txt
++++ b/src/util/CMakeLists.txt
+@@ -25,8 +25,6 @@ endif()
+
+
+ add_library(jpp_util ${jpp_util_sources} ${jpp_util_headers} ${BACKWARD_headers})
+-jpp_test_executable(jpp_util_test ${jpp_util_test_srcs} ${jpp_util_headers})
+-target_link_libraries(jpp_util_test jpp_util)
+ target_link_libraries(jpp_util ${CMAKE_THREAD_LIBS_INIT})
+ target_include_directories(jpp_util PUBLIC ${JPP_LIBS_DIR} ${JPP_SRC_DIR})
+ target_compile_features(jpp_util PUBLIC
+--
+2.33.1
+
diff --git a/pkgs/tools/text/jumanpp/default.nix b/pkgs/tools/text/jumanpp/default.nix
index 5fb5ec88d679..5bea259bccaf 100644
--- a/pkgs/tools/text/jumanpp/default.nix
+++ b/pkgs/tools/text/jumanpp/default.nix
@@ -9,6 +9,9 @@ stdenv.mkDerivation rec {
sha256 = "sha256-ASdr6qbkSe71M7QmuuwidCa4xQhDVoXBJ2XqvSY53pQ=";
};
+ patches = [ ./0001-Exclude-all-tests-from-the-build.patch ];
+ cmakeFlags = [ "-DJPP_ENABLE_TESTS=OFF" ];
+
nativeBuildInputs = [ cmake ];
buildInputs = [ protobuf ]
++ lib.optional stdenv.isDarwin libiconv;
diff --git a/pkgs/top-level/aliases.nix b/pkgs/top-level/aliases.nix
index 26c2f27df19f..18e920573046 100644
--- a/pkgs/top-level/aliases.nix
+++ b/pkgs/top-level/aliases.nix
@@ -1410,6 +1410,9 @@ mapAliases ({
targetLlvmLibraries = targetPackages.llvmPackages_git.libraries;
});
+ # Added 2022-01-28
+ zeroc-ice-36 = throw "Unmaintained, doesn't build w/glibc-2.34";
+
/* If these are in the scope of all-packages.nix, they cause collisions
between mixed versions of qt. See:
https://github.com/NixOS/nixpkgs/pull/101369 */
diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix
index 0565d2535b88..21345ef8d88a 100644
--- a/pkgs/top-level/all-packages.nix
+++ b/pkgs/top-level/all-packages.nix
@@ -672,9 +672,9 @@ with pkgs;
};
nghttp2 = buildPackages.nghttp2.override {
fetchurl = stdenv.fetchurlBoot;
- inherit zlib pkg-config openssl;
- c-ares = buildPackages.c-ares.override { fetchurl = stdenv.fetchurlBoot; };
- libev = buildPackages.libev.override { fetchurl = stdenv.fetchurlBoot; };
+ inherit pkg-config;
+ enableApp = false; # curl just needs libnghttp2
+ enableTests = false; # avoids bringing `cunit` and `tzdata` into scope
};
});
};
@@ -11209,7 +11209,9 @@ with pkgs;
};
unbound-full = unbound.override {
+ python = python3;
withSystemd = true;
+ withPythonModule = true;
withDoH = true;
withECS = true;
withDNSCrypt = true;
@@ -13285,18 +13287,18 @@ with pkgs;
inherit (darwin) apple_sdk;
};
- rust_1_58 = callPackage ../development/compilers/rust/1_58.nix {
+ rust_1_59 = callPackage ../development/compilers/rust/1_59.nix {
inherit (darwin.apple_sdk.frameworks) CoreFoundation Security SystemConfiguration;
llvm_13 = llvmPackages_13.libllvm;
};
- rust = rust_1_58;
+ rust = rust_1_59;
mrustc = callPackage ../development/compilers/mrustc { };
mrustc-minicargo = callPackage ../development/compilers/mrustc/minicargo.nix { };
mrustc-bootstrap = callPackage ../development/compilers/mrustc/bootstrap.nix { };
- rustPackages_1_58 = rust_1_58.packages.stable;
- rustPackages = rustPackages_1_58;
+ rustPackages_1_59 = rust_1_59.packages.stable;
+ rustPackages = rustPackages_1_59;
inherit (rustPackages) cargo clippy rustc rustPlatform;
@@ -17130,7 +17132,7 @@ with pkgs;
gmp5 = callPackage ../development/libraries/gmp/5.1.x.nix { };
gmp6 = callPackage ../development/libraries/gmp/6.x.nix { };
gmp = gmp6;
- gmpxx = appendToName "with-cxx" (gmp.override { cxx = true; });
+ gmpxx = gmp.override { cxx = true; };
#GMP ex-satellite, so better keep it near gmp
mpfr = callPackage ../development/libraries/mpfr { };
@@ -18917,7 +18919,7 @@ with pkgs;
libusb1 = callPackage ../development/libraries/libusb1 {
inherit (darwin) libobjc;
- inherit (darwin.apple_sdk.frameworks) IOKit;
+ inherit (darwin.apple_sdk.frameworks) IOKit Security;
# TODO: remove once `udev` is `systemdMinimal` everywhere.
udev = systemdMinimal;
};
@@ -18949,7 +18951,7 @@ with pkgs;
libva-minimal = libva.override { minimal = true; };
libva-utils = callPackage ../development/libraries/libva/utils.nix { };
- libva1 = callPackage ../development/libraries/libva/1.0.0.nix { };
+ libva1 = callPackage ../development/libraries/libva/1.nix { };
libva1-minimal = libva1.override { minimal = true; };
libvarlink = callPackage ../development/libraries/libvarlink { };
@@ -20722,7 +20724,10 @@ with pkgs;
wxGTK30-gtk2 = wxGTK30.override { withGtk2 = true; };
wxGTK30-gtk3 = wxGTK30.override { withGtk2 = false; };
- wxmac = callPackage ../development/libraries/wxwidgets/wxmac30.nix { };
+ wxmac = callPackage ../development/libraries/wxwidgets/wxmac30.nix {
+ inherit (darwin.stubs) derez rez setfile;
+ inherit (darwin.apple_sdk.frameworks) AGL Cocoa Kernel WebKit;
+ };
wxGTK31 = callPackage ../development/libraries/wxwidgets/wxGTK31.nix {
inherit (darwin.stubs) setfile;
@@ -23364,18 +23369,12 @@ with pkgs;
withTimesyncd = false;
withTpm2Tss = false;
withUserDb = false;
- glib = null;
- libgcrypt = null;
- lvm2 = null;
- libfido2 = null;
- p11-kit = null;
};
systemdStage1 = systemdMinimal.override {
pname = "systemd-stage-1";
withCryptsetup = true;
withFido2 = true;
withTpm2Tss = true;
- inherit lvm2 libfido2 p11-kit;
};
systemdStage1Network = systemdStage1.override {
pname = "systemd-stage-1-network";
@@ -23507,11 +23506,11 @@ with pkgs;
util-linuxCurses = util-linux;
- util-linuxMinimal = if stdenv.isLinux then appendToName "minimal" (util-linux.override {
+ util-linuxMinimal = if stdenv.isLinux then util-linux.override {
nlsSupport = false;
ncurses = null;
systemd = null;
- }) else util-linux;
+ } else util-linux;
v4l-utils = qt5.callPackage ../os-specific/linux/v4l-utils { };
@@ -26191,9 +26190,7 @@ with pkgs;
};
# Git with SVN support, but without GUI.
- gitSVN = lowPrio (appendToName "with-svn" (git.override {
- svnSupport = true;
- }));
+ gitSVN = lowPrio (git.override { svnSupport = true; });
git-doc = lib.addMetaAttrs {
description = "Additional documentation for Git";
@@ -26203,11 +26200,11 @@ with pkgs;
'';
} gitFull.doc;
- gitMinimal = appendToName "minimal" (git.override {
+ gitMinimal = git.override {
withManual = false;
pythonSupport = false;
withpcre2 = false;
- });
+ };
gitRepo = callPackage ../applications/version-management/git-repo { };
@@ -30472,10 +30469,6 @@ with pkgs;
zeroc-ice-cpp11 = zeroc-ice.override { cpp11 = true; };
- zeroc-ice-36 = callPackage ../development/libraries/zeroc-ice/3.6.nix {
- inherit (darwin.apple_sdk.frameworks) Security;
- };
-
zeronet = callPackage ../applications/networking/p2p/zeronet { };
zexy = callPackage ../applications/audio/pd-plugins/zexy {
@@ -33412,10 +33405,10 @@ with pkgs;
ghostscript = callPackage ../misc/ghostscript { };
- ghostscriptX = appendToName "with-X" (ghostscript.override {
+ ghostscriptX = ghostscript.override {
cupsSupport = true;
x11Support = true;
- });
+ };
glava = callPackage ../applications/misc/glava {};
diff --git a/pkgs/top-level/python-aliases.nix b/pkgs/top-level/python-aliases.nix
index 0abf2b589864..db0b456d905d 100644
--- a/pkgs/top-level/python-aliases.nix
+++ b/pkgs/top-level/python-aliases.nix
@@ -35,6 +35,7 @@ in
mapAliases ({
anyjson = throw "anyjson has been removed, it was using setuptools 2to3 translation feature, which has been removed in setuptools 58"; # added 2022-01-18
asyncio-nats-client = nats-py; # added 2022-02-08
+ bitcoin-price-api = throw "bitcoin-price-api has been removed, it was using setuptools 2to3 translation feautre, which has been removed in setuptools 58"; # added 2022-02-15
blockdiagcontrib-cisco = throw "blockdiagcontrib-cisco is not compatible with blockdiag 2.0.0 and has been removed."; # added 2020-11-29
bt_proximity = bt-proximity; # added 2021-07-02
carrot = throw "carrot has been removed, as its development was discontinued in 2012"; # added 2022-01-18
@@ -48,6 +49,8 @@ mapAliases ({
diff_cover = diff-cover; # added 2021-07-02
discogs_client = discogs-client; # added 2021-07-02
djangorestframework-jwt = drf-jwt; # added 2021-07-20
+ django_2 = throw "Django 2 has reached it's projected EOL in 2022/04 and has therefore been removed."; # added 2022-03-05
+ django_appconf = django-appconf; # added 2022-03-03
django_environ = django-environ; # added 2021-12-25
django_extensions = django-extensions; # added 2022-01-09
django_redis = django-redis; # added 2021-10-11
@@ -72,6 +75,7 @@ mapAliases ({
lammps-cython = throw "lammps-cython no longer builds and is unmaintained"; # added 2021-07-04
Markups = markups; # added 2022-02-14
MechanicalSoup = mechanicalsoup; # added 2021-06-01
+ nose-cover3 = throw "nose-cover3 has been removed, it was using setuptools 2to3 translation feature, which has been removed in setuptools 58"; # added 2022-02-16
pam = python-pam; # added 2020-09-07.
PasteDeploy = pastedeploy; # added 2021-10-07
powerlineMemSegment = powerline-mem-segment; # added 2021-10-08
@@ -87,6 +91,7 @@ mapAliases ({
pytest_6 = pytest; # added 2022-02-10
pytestcov = pytest-cov; # added 2021-01-04
pytest-pep8 = pytestpep8; # added 2021-01-04
+ pytest-pythonpath = throw "pytest-pythonpath is obsolete as of pytest 7.0.0 and has been removed"; # added 2022-03-09
pytestpep8 = throw "pytestpep8 was removed because it is abandoned and no longer compatible with pytest v6.0"; # added 2020-12-10
pytestquickcheck = pytest-quickcheck; # added 2021-07-20
pytestrunner = pytest-runner; # added 2021-01-04
@@ -118,6 +123,7 @@ mapAliases ({
tensorflow-bin_2 = tensorflow-bin; # added 2021-11-25
tensorflow-build_2 = tensorflow-build; # added 2021-11-25
tensorflow-estimator_2 = tensorflow-estimator; # added 2021-11-25
+ tensorflow-tensorboard = tensorboard; # added 2022-03-06
tensorflow-tensorboard_2 = tensorflow-tensorboard; # added 2021-11-25
tvnamer = throw "tvnamer was moved to pkgs.tvnamer"; # added 2021-07-05
WazeRouteCalculator = wazeroutecalculator; # added 2021-09-29
diff --git a/pkgs/top-level/python-packages.nix b/pkgs/top-level/python-packages.nix
index 8d5285bacec6..5b9d80332323 100644
--- a/pkgs/top-level/python-packages.nix
+++ b/pkgs/top-level/python-packages.nix
@@ -1238,8 +1238,6 @@ in {
bitcoinlib = callPackage ../development/python-modules/bitcoinlib { };
- bitcoin-price-api = callPackage ../development/python-modules/bitcoin-price-api { };
-
bitcoin-utils-fork-minimal = callPackage ../development/python-modules/bitcoin-utils-fork-minimal { };
bitcoinrpc = callPackage ../development/python-modules/bitcoinrpc { };
@@ -2236,7 +2234,6 @@ in {
django = self.django_3;
# Current LTS
- django_2 = callPackage ../development/python-modules/django/2.nix { };
django_3 = callPackage ../development/python-modules/django/3.nix { };
# Current latest
@@ -2246,7 +2243,7 @@ in {
django-anymail = callPackage ../development/python-modules/django-anymail { };
- django_appconf = callPackage ../development/python-modules/django_appconf { };
+ django-appconf = callPackage ../development/python-modules/django-appconf { };
django-auth-ldap = callPackage ../development/python-modules/django-auth-ldap { };
@@ -2898,6 +2895,8 @@ in {
findimports = callPackage ../development/python-modules/findimports { };
+ findpython = callPackage ../development/python-modules/findpython { };
+
fingerprints = callPackage ../development/python-modules/fingerprints { };
finitude = callPackage ../development/python-modules/finitude { };
@@ -3727,6 +3726,8 @@ in {
hatasmota = callPackage ../development/python-modules/hatasmota { };
+ hatchling = callPackage ../development/python-modules/hatchling { };
+
haversine = callPackage ../development/python-modules/haversine { };
hawkauthlib = callPackage ../development/python-modules/hawkauthlib { };
@@ -5535,7 +5536,8 @@ in {
nghttp2 = (toPythonModule (pkgs.nghttp2.override {
inherit (self) python cython setuptools;
inherit (pkgs) ncurses;
- enablePython = true;
+ enableApp = false; # build only libnghttp2 ...
+ enablePython = true; # ... and its Python bindings
})).python;
nibabel = callPackage ../development/python-modules/nibabel { };
@@ -5610,8 +5612,6 @@ in {
nose-cov = callPackage ../development/python-modules/nose-cov { };
- nose-cover3 = callPackage ../development/python-modules/nose-cover3 { };
-
nose-cprof = callPackage ../development/python-modules/nose-cprof { };
nose-exclude = callPackage ../development/python-modules/nose-exclude { };
@@ -7065,9 +7065,7 @@ in {
pygetwindow = callPackage ../development/python-modules/pygetwindow { };
- pygit2 = callPackage ../development/python-modules/pygit2 {
- libgit2 = pkgs.libgit2_1_3_0;
- };
+ pygit2 = callPackage ../development/python-modules/pygit2 { };
PyGithub = callPackage ../development/python-modules/pyGithub { };
@@ -7986,8 +7984,6 @@ in {
pytest-pylint = callPackage ../development/python-modules/pytest-pylint { };
- pytest-pythonpath = callPackage ../development/python-modules/pytest-pythonpath { };
-
pytest-qt = callPackage ../development/python-modules/pytest-qt { };
pytest-quickcheck = callPackage ../development/python-modules/pytest-quickcheck { };
@@ -9437,6 +9433,8 @@ in {
sockjs-tornado = callPackage ../development/python-modules/sockjs-tornado { };
+ socksio = callPackage ../development/python-modules/socksio { };
+
socksipy-branch = callPackage ../development/python-modules/socksipy-branch { };
soco = callPackage ../development/python-modules/soco { };
@@ -9901,6 +9899,8 @@ in {
tensorboard-plugin-wit = callPackage ../development/python-modules/tensorboard-plugin-wit { };
+ tensorboard = callPackage ../development/python-modules/tensorboard { };
+
tensorboardx = callPackage ../development/python-modules/tensorboardx { };
tensorflow-bin = callPackage ../development/python-modules/tensorflow/bin.nix {
@@ -9933,8 +9933,6 @@ in {
tensorflow = self.tensorflow-build;
- tensorflow-tensorboard = callPackage ../development/python-modules/tensorflow-tensorboard { };
-
tensorflowWithCuda = self.tensorflow.override {
cudaSupport = true;
};
@@ -10206,7 +10204,9 @@ in {
trimesh = callPackage ../development/python-modules/trimesh { };
- trio = callPackage ../development/python-modules/trio { };
+ trio = callPackage ../development/python-modules/trio {
+ inherit (pkgs) coreutils;
+ };
trio-asyncio = callPackage ../development/python-modules/trio-asyncio { };
diff --git a/pkgs/top-level/release-python.nix b/pkgs/top-level/release-python.nix
index d90be7f3bb4c..f34185722201 100644
--- a/pkgs/top-level/release-python.nix
+++ b/pkgs/top-level/release-python.nix
@@ -35,11 +35,12 @@ let
name = "python-tested";
meta.description = "Release-critical packages from the python package sets";
constituents = [
- jobs.remarshal.x86_64-linux # Used in pkgs.formats helper
- jobs.python39Packages.colorama.x86_64-linux # Used in nixos test-driver
- jobs.python39Packages.ptpython.x86_64-linux # Used in nixos test-driver
- jobs.python39Packages.requests.x86_64-linux # Almost ubiquous package
- jobs.python39Packages.sphinx.x86_64-linux # Document creation for many packages
+ jobs.remarshal.x86_64-linux # Used in pkgs.formats helper
+ jobs.python39Packages.buildcatrust.x86_64-linux # Used in pkgs.cacert
+ jobs.python39Packages.colorama.x86_64-linux # Used in nixos test-driver
+ jobs.python39Packages.ptpython.x86_64-linux # Used in nixos test-driver
+ jobs.python39Packages.requests.x86_64-linux # Almost ubiquous package
+ jobs.python39Packages.sphinx.x86_64-linux # Document creation for many packages
];
};