diff --git a/doc/languages-frameworks/ocaml.xml b/doc/languages-frameworks/ocaml.xml index d1c29c72f726..ea0770616802 100644 --- a/doc/languages-frameworks/ocaml.xml +++ b/doc/languages-frameworks/ocaml.xml @@ -67,9 +67,9 @@ buildDunePackage rec { Here is a second example, this time using a source archive generated with - dune-release. The unpackCmd - redefinition is necessary to be able to unpack the kind of tarball that - dune-release generates. This library does not depend + dune-release. It is a good idea to use this archive when + it is available as it will usually contain substituted variables such as a + %%VERSION%% field. This library does not depend on any other OCaml library and no tests are run after building it. @@ -87,8 +87,6 @@ buildDunePackage rec { sha256 = "1msg3vycd3k8qqj61sc23qks541cxpb97vrnrvrhjnqxsqnh6ygq"; }; - unpackCmd = "tar xjf $src"; - meta = with stdenv.lib; { homepage = https://github.com/flowtype/ocaml-wtf8; description = "WTF-8 is a superset of UTF-8 that allows unpaired surrogates."; diff --git a/doc/meta.xml b/doc/meta.xml index 51c7b2dfc88f..3abfe016d708 100644 --- a/doc/meta.xml +++ b/doc/meta.xml @@ -255,12 +255,22 @@ meta.platforms = stdenv.lib.platforms.linux; tests + + + This attribute is special in that it is not actually under the + meta attribute set but rather under the + passthru attribute set. This is due to a current + limitation of Nix, and will change as soon as Nixpkgs will be able to + depend on a new enough version of Nix. See + the relevant + issue for more details. + + An attribute set with as values tests. A test is a derivation, which builds successfully when the test passes, and fails to build otherwise. A - derivation that is a test requires some meta elements - to be defined: needsVMSupport (automatically filled-in - for NixOS tests) and timeout. + derivation that is a test needs to have meta.timeout + defined. The NixOS tests are available as nixosTests in @@ -270,7 +280,7 @@ meta.platforms = stdenv.lib.platforms.linux; { /* ... */, nixosTests }: { # ... - meta.tests = { + passthru.tests = { basic-functionality-and-dovecot-integration = nixosTests.opensmtpd; }; } @@ -294,17 +304,6 @@ meta.platforms = stdenv.lib.platforms.linux; - - - needsVMSupport - - - - A boolan that states whether the derivation requires build-time support - for Virtual Machine to build successfully. - - - hydraPlatforms diff --git a/maintainers/maintainer-list.nix b/maintainers/maintainer-list.nix index 47117ba8a7be..f339c93ef0b8 100644 --- a/maintainers/maintainer-list.nix +++ b/maintainers/maintainer-list.nix @@ -1527,6 +1527,11 @@ github = "ftrvxmtrx"; name = "Siarhei Zirukin"; }; + fuerbringer = { + email = "severin@fuerbringer.info"; + github = "fuerbringer"; + name = "Severin Fürbringer"; + }; funfunctor = { email = "eocallaghan@alterapraxis.com"; name = "Edward O'Callaghan"; @@ -1536,6 +1541,11 @@ github = "fuuzetsu"; name = "Mateusz Kowalczyk"; }; + fuwa = { + email = "echowss@gmail.com"; + github = "fuwa0529"; + name = "Haruka Akiyama"; + }; fuzzy-id = { email = "hacking+nixos@babibo.de"; name = "Thomas Bach"; diff --git a/nixos/lib/build-vms.nix b/nixos/lib/build-vms.nix index 4f65501f89c6..933f81392491 100644 --- a/nixos/lib/build-vms.nix +++ b/nixos/lib/build-vms.nix @@ -1,6 +1,4 @@ -{ system, minimal ? false, config ? {} }: - -let pkgs = import ../.. { inherit system config; }; in +{ system, pkgs, minimal ? false, config ? {} }: with pkgs.lib; with import ../lib/qemu-flags.nix { inherit pkgs; }; diff --git a/nixos/lib/testing.nix b/nixos/lib/testing.nix index 8cdf4150057e..f90fc9f7df0e 100644 --- a/nixos/lib/testing.nix +++ b/nixos/lib/testing.nix @@ -1,6 +1,6 @@ -{ system, minimal ? false, config ? {} }: +{ system, pkgs, minimal ? false, config ? {} }: -with import ./build-vms.nix { inherit system minimal config; }; +with import ./build-vms.nix { inherit system pkgs minimal config; }; with pkgs; let @@ -70,8 +70,6 @@ in rec { mv $i $out/coverage-data/$(dirname $(dirname $i)) done ''; - - meta.needsVMSupport = true; }; diff --git a/nixos/modules/installer/tools/nixos-build-vms/build-vms.nix b/nixos/modules/installer/tools/nixos-build-vms/build-vms.nix index 4372d196261e..2625f7661b78 100644 --- a/nixos/modules/installer/tools/nixos-build-vms/build-vms.nix +++ b/nixos/modules/installer/tools/nixos-build-vms/build-vms.nix @@ -1,9 +1,13 @@ { system ? builtins.currentSystem +, config ? {} , networkExpr }: let nodes = import networkExpr; in -with import ../../../../lib/testing.nix { inherit system; }; +with import ../../../../lib/testing.nix { + inherit system; + pkgs = import ../.. { inherit system config; }; +}; (makeTest { inherit nodes; testScript = ""; }).driver diff --git a/nixos/modules/misc/ids.nix b/nixos/modules/misc/ids.nix index 446a311807cc..aff562c00eb1 100644 --- a/nixos/modules/misc/ids.nix +++ b/nixos/modules/misc/ids.nix @@ -335,6 +335,7 @@ kapacitor = 308; solr = 309; alerta = 310; + minetest = 311; # When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399! @@ -630,6 +631,7 @@ kapacitor = 308; solr = 309; alerta = 310; + minetest = 311; # When adding a gid, make sure it doesn't match an existing # uid. Users and groups with the same name should have equal diff --git a/nixos/modules/services/games/minetest-server.nix b/nixos/modules/services/games/minetest-server.nix index 2de42f20f6cc..98e69c6dc0ea 100644 --- a/nixos/modules/services/games/minetest-server.nix +++ b/nixos/modules/services/games/minetest-server.nix @@ -84,7 +84,9 @@ in home = "/var/lib/minetest"; createHome = true; uid = config.ids.uids.minetest; + group = "minetest"; }; + users.groups.minetest.gid = config.ids.gids.minetest; systemd.services.minetest-server = { description = "Minetest Server Service"; @@ -93,6 +95,7 @@ in serviceConfig.Restart = "always"; serviceConfig.User = "minetest"; + serviceConfig.Group = "minetest"; script = '' cd /var/lib/minetest diff --git a/nixos/release.nix b/nixos/release.nix index c2372da23f57..e6abd003e881 100644 --- a/nixos/release.nix +++ b/nixos/release.nix @@ -14,28 +14,19 @@ let versionSuffix = (if stableBranch then "." else "pre") + "${toString nixpkgs.revCount}.${nixpkgs.shortRev}"; - importTest = fn: args: system: import fn ({ - inherit system; - } // args); - - # Note: only supportedSystems are considered. - callTestOnMatchingSystems = systems: fn: args: - forMatchingSystems - (intersectLists supportedSystems systems) - (system: hydraJob (importTest fn args system)); - callTest = callTestOnMatchingSystems supportedSystems; - - callSubTests = callSubTestsOnMatchingSystems supportedSystems; - callSubTestsOnMatchingSystems = systems: fn: args: let - discover = attrs: let - subTests = filterAttrs (const (hasAttr "test")) attrs; - in mapAttrs (const (t: hydraJob t.test)) subTests; - - discoverForSystem = system: mapAttrs (_: test: { - ${system} = test; - }) (discover (importTest fn args system)); - - in foldAttrs mergeAttrs {} (map discoverForSystem (intersectLists systems supportedSystems)); + # Run the tests for each platform. You can run a test by doing + # e.g. ‘nix-build -A tests.login.x86_64-linux’, or equivalently, + # ‘nix-build tests/login.nix -A result’. + allTestsForSystem = system: + import ./tests/all-tests.nix { + inherit system; + pkgs = import nixpkgs { inherit system; }; + callTest = t: { + ${system} = hydraJob t.test; + }; + }; + allTests = + foldAttrs recursiveUpdate {} (map allTestsForSystem supportedSystems); pkgs = import nixpkgs { system = "x86_64-linux"; }; @@ -245,200 +236,7 @@ in rec { }; */ - - # Run the tests for each platform. You can run a test by doing - # e.g. ‘nix-build -A tests.login.x86_64-linux’, or equivalently, - # ‘nix-build tests/login.nix -A result’. - tests.atd = callTest tests/atd.nix {}; - tests.acme = callTest tests/acme.nix {}; - tests.avahi = callTest tests/avahi.nix {}; - tests.beegfs = callTest tests/beegfs.nix {}; - tests.upnp = callTest tests/upnp.nix {}; - tests.bittorrent = callTest tests/bittorrent.nix {}; - tests.bind = callTest tests/bind.nix {}; - #tests.blivet = callTest tests/blivet.nix {}; # broken since 2017-07024 - tests.boot = callSubTests tests/boot.nix {}; - tests.boot-stage1 = callTest tests/boot-stage1.nix {}; - tests.borgbackup = callTest tests/borgbackup.nix {}; - tests.buildbot = callSubTests tests/buildbot.nix {}; - tests.cadvisor = callTestOnMatchingSystems ["x86_64-linux"] tests/cadvisor.nix {}; - tests.ceph = callTestOnMatchingSystems ["x86_64-linux"] tests/ceph.nix {}; - tests.certmgr = callSubTests tests/certmgr.nix {}; - tests.cfssl = callTestOnMatchingSystems ["x86_64-linux"] tests/cfssl.nix {}; - tests.chromium = (callSubTestsOnMatchingSystems ["x86_64-linux"] tests/chromium.nix {}).stable or {}; - tests.cjdns = callTest tests/cjdns.nix {}; - tests.cloud-init = callTest tests/cloud-init.nix {}; - tests.codimd = callTest tests/codimd.nix {}; - tests.containers-ipv4 = callTest tests/containers-ipv4.nix {}; - tests.containers-ipv6 = callTest tests/containers-ipv6.nix {}; - tests.containers-bridge = callTest tests/containers-bridge.nix {}; - tests.containers-imperative = callTest tests/containers-imperative.nix {}; - tests.containers-extra_veth = callTest tests/containers-extra_veth.nix {}; - tests.containers-physical_interfaces = callTest tests/containers-physical_interfaces.nix {}; - tests.containers-restart_networking = callTest tests/containers-restart_networking.nix {}; - tests.containers-tmpfs = callTest tests/containers-tmpfs.nix {}; - tests.containers-hosts = callTest tests/containers-hosts.nix {}; - tests.containers-macvlans = callTest tests/containers-macvlans.nix {}; - tests.couchdb = callTest tests/couchdb.nix {}; - tests.deluge = callTest tests/deluge.nix {}; - tests.dhparams = callTest tests/dhparams.nix {}; - tests.docker = callTestOnMatchingSystems ["x86_64-linux"] tests/docker.nix {}; - tests.docker-tools = callTestOnMatchingSystems ["x86_64-linux"] tests/docker-tools.nix {}; - tests.docker-tools-overlay = callTestOnMatchingSystems ["x86_64-linux"] tests/docker-tools-overlay.nix {}; - tests.docker-edge = callTestOnMatchingSystems ["x86_64-linux"] tests/docker-edge.nix {}; - tests.docker-preloader = callTestOnMatchingSystems ["x86_64-linux"] tests/docker-preloader.nix {}; - tests.docker-registry = callTest tests/docker-registry.nix {}; - tests.dovecot = callTest tests/dovecot.nix {}; - tests.dnscrypt-proxy = callTestOnMatchingSystems ["x86_64-linux"] tests/dnscrypt-proxy.nix {}; - tests.ecryptfs = callTest tests/ecryptfs.nix {}; - tests.etcd = callTestOnMatchingSystems ["x86_64-linux"] tests/etcd.nix {}; - tests.ec2-nixops = (callSubTestsOnMatchingSystems ["x86_64-linux"] tests/ec2.nix {}).boot-ec2-nixops or {}; - # ec2-config doesn't work in a sandbox as the simulated ec2 instance needs network access - #tests.ec2-config = (callSubTestsOnMatchingSystems ["x86_64-linux"] tests/ec2.nix {}).boot-ec2-config or {}; - tests.elk = callSubTestsOnMatchingSystems ["x86_64-linux"] tests/elk.nix {}; - tests.env = callTest tests/env.nix {}; - tests.ferm = callTest tests/ferm.nix {}; - tests.firefox = callTest tests/firefox.nix {}; - tests.flatpak = callTest tests/flatpak.nix {}; - tests.firewall = callTest tests/firewall.nix {}; - tests.fsck = callTest tests/fsck.nix {}; - tests.fwupd = callTest tests/fwupd.nix {}; - tests.gdk-pixbuf = callTest tests/gdk-pixbuf.nix {}; - tests.gitea = callSubTests tests/gitea.nix {}; - tests.gitlab = callTest tests/gitlab.nix {}; - tests.gitolite = callTest tests/gitolite.nix {}; - tests.gjs = callTest tests/gjs.nix {}; - tests.gocd-agent = callTest tests/gocd-agent.nix {}; - tests.gocd-server = callTest tests/gocd-server.nix {}; - tests.gnome3 = callTest tests/gnome3.nix {}; - tests.gnome3-gdm = callTest tests/gnome3-gdm.nix {}; - tests.grafana = callTest tests/grafana.nix {}; - tests.graphite = callTest tests/graphite.nix {}; - tests.hadoop.hdfs = callTestOnMatchingSystems [ "x86_64-linux" ] tests/hadoop/hdfs.nix {}; - tests.hadoop.yarn = callTestOnMatchingSystems [ "x86_64-linux" ] tests/hadoop/yarn.nix {}; - tests.hardened = callTest tests/hardened.nix { }; - tests.haproxy = callTest tests/haproxy.nix {}; - tests.hibernate = callTest tests/hibernate.nix {}; - tests.hitch = callTest tests/hitch {}; - tests.home-assistant = callTest tests/home-assistant.nix { }; - tests.hound = callTest tests/hound.nix {}; - tests.hocker-fetchdocker = callTest tests/hocker-fetchdocker {}; - tests.hydra = callTest tests/hydra {}; - tests.i3wm = callTest tests/i3wm.nix {}; - tests.iftop = callTest tests/iftop.nix {}; - tests.initrd-network-ssh = callTest tests/initrd-network-ssh {}; - tests.installer = callSubTests tests/installer.nix {}; - tests.influxdb = callTest tests/influxdb.nix {}; - tests.ipv6 = callTest tests/ipv6.nix {}; - tests.jenkins = callTest tests/jenkins.nix {}; - tests.ostree = callTest tests/ostree.nix {}; - tests.osquery = callTest tests/osquery.nix {}; - tests.plasma5 = callTest tests/plasma5.nix {}; - tests.plotinus = callTest tests/plotinus.nix {}; - tests.keymap = callSubTests tests/keymap.nix {}; - tests.incron = callTest tests/incron.nix {}; - tests.initrdNetwork = callTest tests/initrd-network.nix {}; - tests.kafka = callSubTests tests/kafka.nix {}; - tests.kernel-latest = callTest tests/kernel-latest.nix {}; - tests.kernel-lts = callTest tests/kernel-lts.nix {}; - tests.kubernetes.dns = callSubTestsOnMatchingSystems ["x86_64-linux"] tests/kubernetes/dns.nix {}; - ## kubernetes.e2e should eventually replace kubernetes.rbac when it works - #tests.kubernetes.e2e = callSubTestsOnMatchingSystems ["x86_64-linux"] tests/kubernetes/e2e.nix {}; - tests.kubernetes.rbac = callSubTestsOnMatchingSystems ["x86_64-linux"] tests/kubernetes/rbac.nix {}; - tests.latestKernel.login = callTest tests/login.nix { latestKernel = true; }; - tests.ldap = callTest tests/ldap.nix {}; - #tests.lightdm = callTest tests/lightdm.nix {}; - tests.login = callTest tests/login.nix {}; - #tests.logstash = callTest tests/logstash.nix {}; - tests.mathics = callTest tests/mathics.nix {}; - tests.matrix-synapse = callTest tests/matrix-synapse.nix {}; - tests.memcached = callTest tests/memcached.nix {}; - tests.mesos = callTest tests/mesos.nix {}; - tests.misc = callTest tests/misc.nix {}; - tests.mongodb = callTest tests/mongodb.nix {}; - tests.mpd = callTest tests/mpd.nix {}; - tests.mumble = callTest tests/mumble.nix {}; - tests.munin = callTest tests/munin.nix {}; - tests.mutableUsers = callTest tests/mutable-users.nix {}; - tests.mysql = callTest tests/mysql.nix {}; - tests.mysqlBackup = callTest tests/mysql-backup.nix {}; - tests.mysqlReplication = callTest tests/mysql-replication.nix {}; - tests.nat.firewall = callTest tests/nat.nix { withFirewall = true; }; - tests.nat.firewall-conntrack = callTest tests/nat.nix { withFirewall = true; withConntrackHelpers = true; }; - tests.nat.standalone = callTest tests/nat.nix { withFirewall = false; }; - tests.netdata = callTest tests/netdata.nix { }; - tests.networking.networkd = callSubTests tests/networking.nix { networkd = true; }; - tests.networking.scripted = callSubTests tests/networking.nix { networkd = false; }; - tests.nextcloud = callSubTests tests/nextcloud { }; - # TODO: put in networking.nix after the test becomes more complete - tests.networkingProxy = callTest tests/networking-proxy.nix {}; - tests.nexus = callTest tests/nexus.nix { }; - tests.nfs3 = callTest tests/nfs.nix { version = 3; }; - tests.nfs4 = callTest tests/nfs.nix { version = 4; }; - tests.nginx = callTest tests/nginx.nix { }; - tests.nghttpx = callTest tests/nghttpx.nix { }; - tests.nix-ssh-serve = callTest tests/nix-ssh-serve.nix { }; - tests.novacomd = callTestOnMatchingSystems ["x86_64-linux"] tests/novacomd.nix { }; - tests.leaps = callTest tests/leaps.nix { }; - tests.nsd = callTest tests/nsd.nix {}; - tests.openssh = callTest tests/openssh.nix {}; - tests.openldap = callTest tests/openldap.nix {}; - tests.opensmtpd = callTest tests/opensmtpd.nix {}; - tests.owncloud = callTest tests/owncloud.nix {}; - tests.pam-oath-login = callTest tests/pam-oath-login.nix {}; - tests.peerflix = callTest tests/peerflix.nix {}; - tests.php-pcre = callTest tests/php-pcre.nix {}; - tests.postgresql = callSubTests tests/postgresql.nix {}; - tests.pgmanage = callTest tests/pgmanage.nix {}; - tests.postgis = callTest tests/postgis.nix {}; - tests.powerdns = callTest tests/powerdns.nix {}; - tests.pgjwt = callTest tests/pgjwt.nix {}; - tests.predictable-interface-names = callSubTests tests/predictable-interface-names.nix {}; - tests.printing = callTest tests/printing.nix {}; - tests.prometheus = callTest tests/prometheus.nix {}; - tests.prometheus-exporters = callTest tests/prometheus-exporters.nix {}; - tests.prosody = callTest tests/prosody.nix {}; - tests.proxy = callTest tests/proxy.nix {}; - tests.quagga = callTest tests/quagga.nix {}; - tests.quake3 = callTest tests/quake3.nix {}; - tests.rabbitmq = callTest tests/rabbitmq.nix {}; - tests.radicale = callTest tests/radicale.nix {}; - tests.redmine = callTest tests/redmine.nix {}; - tests.rspamd = callSubTests tests/rspamd.nix {}; - tests.rsyslogd = callSubTests tests/rsyslogd.nix {}; - tests.runInMachine = callTest tests/run-in-machine.nix {}; - tests.rxe = callTest tests/rxe.nix {}; - tests.samba = callTest tests/samba.nix {}; - tests.sddm = callSubTests tests/sddm.nix {}; - tests.simple = callTest tests/simple.nix {}; - tests.slim = callTest tests/slim.nix {}; - tests.slurm = callTest tests/slurm.nix {}; - tests.smokeping = callTest tests/smokeping.nix {}; - tests.snapper = callTest tests/snapper.nix {}; - tests.solr = callTest tests/solr.nix {}; - #tests.statsd = callTest tests/statsd.nix {}; # statsd is broken: #45946 - tests.strongswan-swanctl = callTest tests/strongswan-swanctl.nix {}; - tests.sudo = callTest tests/sudo.nix {}; - tests.systemd = callTest tests/systemd.nix {}; - tests.switchTest = callTest tests/switch-test.nix {}; - tests.taskserver = callTest tests/taskserver.nix {}; - tests.tomcat = callTest tests/tomcat.nix {}; - tests.tor = callTest tests/tor.nix {}; - tests.transmission = callTest tests/transmission.nix {}; - tests.udisks2 = callTest tests/udisks2.nix {}; - tests.vault = callTest tests/vault.nix {}; - tests.virtualbox = callSubTestsOnMatchingSystems ["x86_64-linux"] tests/virtualbox.nix {}; - tests.wordpress = callTest tests/wordpress.nix {}; - tests.xautolock = callTest tests/xautolock.nix {}; - tests.xdg-desktop-portal = callTest tests/xdg-desktop-portal.nix {}; - tests.xfce = callTest tests/xfce.nix {}; - tests.xmonad = callTest tests/xmonad.nix {}; - tests.xrdp = callTest tests/xrdp.nix {}; - tests.xss-lock = callTest tests/xss-lock.nix {}; - tests.yabar = callTest tests/yabar.nix {}; - tests.zookeeper = callTest tests/zookeeper.nix {}; - tests.morty = callTest tests/morty.nix { }; - tests.bcachefs = callTest tests/bcachefs.nix { }; + tests = allTests; /* Build a bunch of typical closures so that Hydra can keep track of the evolution of closure sizes. */ diff --git a/nixos/tests/all-tests.nix b/nixos/tests/all-tests.nix new file mode 100644 index 000000000000..718a95dadd26 --- /dev/null +++ b/nixos/tests/all-tests.nix @@ -0,0 +1,214 @@ +{ system, pkgs, callTest }: +# The return value of this function will be an attrset with arbitrary depth and +# the `anything` returned by callTest at its test leafs. +# The tests not supported by `system` will be replaced with `{}`, so that +# `passthru.tests` can contain links to those without breaking on architectures +# where said tests are unsupported. +# Example callTest that just extracts the derivation from the test: +# callTest = t: t.test; + +with pkgs.lib; + +let + discoverTests = val: + if !isAttrs val then val + else if hasAttr "test" val then callTest val + else mapAttrs (n: s: discoverTests s) val; + handleTest = path: args: + discoverTests (import path ({ inherit system pkgs; } // args)); + handleTestOn = systems: path: args: + if elem system systems then handleTest path args + else {}; +in +{ + acme = handleTestOn ["x86_64-linux"] ./acme.nix {}; + atd = handleTest ./atd.nix {}; + avahi = handleTest ./avahi.nix {}; + bcachefs = handleTestOn ["x86_64-linux"] ./bcachefs.nix {}; # linux-4.18.2018.10.12 is unsupported on aarch64 + beegfs = handleTestOn ["x86_64-linux"] ./beegfs.nix {}; # beegfs is unsupported on aarch64 + bind = handleTest ./bind.nix {}; + bittorrent = handleTest ./bittorrent.nix {}; + #blivet = handleTest ./blivet.nix {}; # broken since 2017-07024 + boot = handleTestOn ["x86_64-linux"] ./boot.nix {}; # syslinux is unsupported on aarch64 + boot-stage1 = handleTest ./boot-stage1.nix {}; + borgbackup = handleTest ./borgbackup.nix {}; + buildbot = handleTest ./buildbot.nix {}; + cadvisor = handleTestOn ["x86_64-linux"] ./cadvisor.nix {}; + ceph = handleTestOn ["x86_64-linux"] ./ceph.nix {}; + certmgr = handleTest ./certmgr.nix {}; + cfssl = handleTestOn ["x86_64-linux"] ./cfssl.nix {}; + chromium = (handleTestOn ["x86_64-linux"] ./chromium.nix {}).stable or {}; + cjdns = handleTest ./cjdns.nix {}; + cloud-init = handleTest ./cloud-init.nix {}; + codimd = handleTest ./codimd.nix {}; + containers-bridge = handleTest ./containers-bridge.nix {}; + containers-extra_veth = handleTest ./containers-extra_veth.nix {}; + containers-hosts = handleTest ./containers-hosts.nix {}; + containers-imperative = handleTest ./containers-imperative.nix {}; + containers-ipv4 = handleTest ./containers-ipv4.nix {}; + containers-ipv6 = handleTest ./containers-ipv6.nix {}; + containers-macvlans = handleTest ./containers-macvlans.nix {}; + containers-physical_interfaces = handleTest ./containers-physical_interfaces.nix {}; + containers-restart_networking = handleTest ./containers-restart_networking.nix {}; + containers-tmpfs = handleTest ./containers-tmpfs.nix {}; + #couchdb = handleTest ./couchdb.nix {}; # spidermonkey-1.8.5 is marked as broken + deluge = handleTest ./deluge.nix {}; + dhparams = handleTest ./dhparams.nix {}; + dnscrypt-proxy = handleTestOn ["x86_64-linux"] ./dnscrypt-proxy.nix {}; + docker = handleTestOn ["x86_64-linux"] ./docker.nix {}; + docker-edge = handleTestOn ["x86_64-linux"] ./docker-edge.nix {}; + docker-preloader = handleTestOn ["x86_64-linux"] ./docker-preloader.nix {}; + docker-registry = handleTest ./docker-registry.nix {}; + docker-tools = handleTestOn ["x86_64-linux"] ./docker-tools.nix {}; + docker-tools-overlay = handleTestOn ["x86_64-linux"] ./docker-tools-overlay.nix {}; + dovecot = handleTest ./dovecot.nix {}; + # ec2-config doesn't work in a sandbox as the simulated ec2 instance needs network access + #ec2-config = (handleTestOn ["x86_64-linux"] ./ec2.nix {}).boot-ec2-config or {}; + ec2-nixops = (handleTestOn ["x86_64-linux"] ./ec2.nix {}).boot-ec2-nixops or {}; + ecryptfs = handleTest ./ecryptfs.nix {}; + elk = handleTestOn ["x86_64-linux"] ./elk.nix {}; + env = handleTest ./env.nix {}; + etcd = handleTestOn ["x86_64-linux"] ./etcd.nix {}; + ferm = handleTest ./ferm.nix {}; + firefox = handleTest ./firefox.nix {}; + firewall = handleTest ./firewall.nix {}; + flatpak = handleTest ./flatpak.nix {}; + fsck = handleTest ./fsck.nix {}; + fwupd = handleTestOn ["x86_64-linux"] ./fwupd.nix {}; # libsmbios is unsupported on aarch64 + gdk-pixbuf = handleTest ./gdk-pixbuf.nix {}; + gitea = handleTest ./gitea.nix {}; + gitlab = handleTest ./gitlab.nix {}; + gitolite = handleTest ./gitolite.nix {}; + gjs = handleTest ./gjs.nix {}; + gnome3 = handleTestOn ["x86_64-linux"] ./gnome3.nix {}; # libsmbios is unsupported on aarch64 + gnome3-gdm = handleTestOn ["x86_64-linux"] ./gnome3-gdm.nix {}; # libsmbios is unsupported on aarch64 + gocd-agent = handleTest ./gocd-agent.nix {}; + gocd-server = handleTest ./gocd-server.nix {}; + grafana = handleTest ./grafana.nix {}; + graphite = handleTest ./graphite.nix {}; + hadoop.hdfs = handleTestOn [ "x86_64-linux" ] ./hadoop/hdfs.nix {}; + hadoop.yarn = handleTestOn [ "x86_64-linux" ] ./hadoop/yarn.nix {}; + haproxy = handleTest ./haproxy.nix {}; + #hardened = handleTest ./hardened.nix {}; # broken due useSandbox = true + hibernate = handleTest ./hibernate.nix {}; + hitch = handleTest ./hitch {}; + hocker-fetchdocker = handleTest ./hocker-fetchdocker {}; + home-assistant = handleTest ./home-assistant.nix {}; + hound = handleTest ./hound.nix {}; + hydra = handleTest ./hydra {}; + i3wm = handleTest ./i3wm.nix {}; + iftop = handleTest ./iftop.nix {}; + incron = handleTest tests/incron.nix {}; + influxdb = handleTest ./influxdb.nix {}; + initrd-network-ssh = handleTest ./initrd-network-ssh {}; + initrdNetwork = handleTest ./initrd-network.nix {}; + installer = handleTest ./installer.nix {}; + ipv6 = handleTest ./ipv6.nix {}; + jenkins = handleTest ./jenkins.nix {}; + kafka = handleTest ./kafka.nix {}; + kernel-latest = handleTest ./kernel-latest.nix {}; + kernel-lts = handleTest ./kernel-lts.nix {}; + keymap = handleTest ./keymap.nix {}; + kubernetes.dns = handleTestOn ["x86_64-linux"] ./kubernetes/dns.nix {}; + # kubernetes.e2e should eventually replace kubernetes.rbac when it works + #kubernetes.e2e = handleTestOn ["x86_64-linux"] ./kubernetes/e2e.nix {}; + kubernetes.rbac = handleTestOn ["x86_64-linux"] ./kubernetes/rbac.nix {}; + latestKernel.login = handleTest ./login.nix { latestKernel = true; }; + ldap = handleTest ./ldap.nix {}; + leaps = handleTest ./leaps.nix {}; + #lightdm = handleTest ./lightdm.nix {}; + login = handleTest ./login.nix {}; + #logstash = handleTest ./logstash.nix {}; + mathics = handleTest ./mathics.nix {}; + matrix-synapse = handleTest ./matrix-synapse.nix {}; + memcached = handleTest ./memcached.nix {}; + mesos = handleTest ./mesos.nix {}; + misc = handleTest ./misc.nix {}; + mongodb = handleTest ./mongodb.nix {}; + morty = handleTest ./morty.nix {}; + mpd = handleTest ./mpd.nix {}; + mumble = handleTest ./mumble.nix {}; + munin = handleTest ./munin.nix {}; + mutableUsers = handleTest ./mutable-users.nix {}; + mysql = handleTest ./mysql.nix {}; + mysqlBackup = handleTest ./mysql-backup.nix {}; + mysqlReplication = handleTest ./mysql-replication.nix {}; + nat.firewall = handleTest ./nat.nix { withFirewall = true; }; + nat.firewall-conntrack = handleTest ./nat.nix { withFirewall = true; withConntrackHelpers = true; }; + nat.standalone = handleTest ./nat.nix { withFirewall = false; }; + netdata = handleTest ./netdata.nix {}; + networking.networkd = handleTest ./networking.nix { networkd = true; }; + networking.scripted = handleTest ./networking.nix { networkd = false; }; + # TODO: put in networking.nix after the test becomes more complete + networkingProxy = handleTest ./networking-proxy.nix {}; + nextcloud = handleTest ./nextcloud {}; + nexus = handleTest ./nexus.nix {}; + nfs3 = handleTest ./nfs.nix { version = 3; }; + nfs4 = handleTest ./nfs.nix { version = 4; }; + nghttpx = handleTest ./nghttpx.nix {}; + nginx = handleTest ./nginx.nix {}; + nix-ssh-serve = handleTest ./nix-ssh-serve.nix {}; + novacomd = handleTestOn ["x86_64-linux"] ./novacomd.nix {}; + nsd = handleTest ./nsd.nix {}; + openldap = handleTest ./openldap.nix {}; + opensmtpd = handleTest ./opensmtpd.nix {}; + openssh = handleTest ./openssh.nix {}; + osquery = handleTest ./osquery.nix {}; + ostree = handleTest ./ostree.nix {}; + owncloud = handleTest ./owncloud.nix {}; + pam-oath-login = handleTest ./pam-oath-login.nix {}; + peerflix = handleTest ./peerflix.nix {}; + pgjwt = handleTest ./pgjwt.nix {}; + pgmanage = handleTest ./pgmanage.nix {}; + php-pcre = handleTest ./php-pcre.nix {}; + plasma5 = handleTest ./plasma5.nix {}; + plotinus = handleTest ./plotinus.nix {}; + postgis = handleTest ./postgis.nix {}; + postgresql = handleTest ./postgresql.nix {}; + powerdns = handleTest ./powerdns.nix {}; + predictable-interface-names = handleTest ./predictable-interface-names.nix {}; + printing = handleTest ./printing.nix {}; + prometheus = handleTest ./prometheus.nix {}; + prometheus-exporters = handleTest ./prometheus-exporters.nix {}; + prosody = handleTest ./prosody.nix {}; + proxy = handleTest ./proxy.nix {}; + quagga = handleTest ./quagga.nix {}; + quake3 = handleTest ./quake3.nix {}; + rabbitmq = handleTest ./rabbitmq.nix {}; + radicale = handleTest ./radicale.nix {}; + redmine = handleTest ./redmine.nix {}; + rspamd = handleTest ./rspamd.nix {}; + rsyslogd = handleTest ./rsyslogd.nix {}; + runInMachine = handleTest ./run-in-machine.nix {}; + rxe = handleTest ./rxe.nix {}; + samba = handleTest ./samba.nix {}; + sddm = handleTest ./sddm.nix {}; + simple = handleTest ./simple.nix {}; + slim = handleTest ./slim.nix {}; + slurm = handleTest ./slurm.nix {}; + smokeping = handleTest ./smokeping.nix {}; + snapper = handleTest ./snapper.nix {}; + solr = handleTest ./solr.nix {}; + #statsd = handleTest ./statsd.nix {}; # statsd is broken: #45946 + strongswan-swanctl = handleTest ./strongswan-swanctl.nix {}; + sudo = handleTest ./sudo.nix {}; + switchTest = handleTest ./switch-test.nix {}; + systemd = handleTest ./systemd.nix {}; + taskserver = handleTest ./taskserver.nix {}; + tomcat = handleTest ./tomcat.nix {}; + tor = handleTest ./tor.nix {}; + transmission = handleTest ./transmission.nix {}; + udisks2 = handleTest ./udisks2.nix {}; + upnp = handleTest ./upnp.nix {}; + vault = handleTest ./vault.nix {}; + virtualbox = handleTestOn ["x86_64-linux"] ./virtualbox.nix {}; + wordpress = handleTest ./wordpress.nix {}; + xautolock = handleTest ./xautolock.nix {}; + xdg-desktop-portal = handleTest ./xdg-desktop-portal.nix {}; + xfce = handleTest ./xfce.nix {}; + xmonad = handleTest ./xmonad.nix {}; + xrdp = handleTest ./xrdp.nix {}; + xss-lock = handleTest ./xss-lock.nix {}; + yabar = handleTest ./yabar.nix {}; + zookeeper = handleTest ./zookeeper.nix {}; +} diff --git a/nixos/tests/boot.nix b/nixos/tests/boot.nix index 301d9d0f817f..c9bb1e77c6d0 100644 --- a/nixos/tests/boot.nix +++ b/nixos/tests/boot.nix @@ -1,6 +1,9 @@ -{ system ? builtins.currentSystem }: +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: -with import ../lib/testing.nix { inherit system; }; +with import ../lib/testing.nix { inherit system pkgs; }; with pkgs.lib; let diff --git a/nixos/tests/buildbot.nix b/nixos/tests/buildbot.nix index 399fd39005e2..210ad8e91df7 100644 --- a/nixos/tests/buildbot.nix +++ b/nixos/tests/buildbot.nix @@ -1,6 +1,9 @@ -{ system ? builtins.currentSystem }: +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: -with import ../lib/testing.nix { inherit system; }; +with import ../lib/testing.nix { inherit system pkgs; }; let # Test ensures buildbot master comes up correctly and workers can connect diff --git a/nixos/tests/certmgr.nix b/nixos/tests/certmgr.nix index 8354c46b85f7..fe67833808ce 100644 --- a/nixos/tests/certmgr.nix +++ b/nixos/tests/certmgr.nix @@ -1,6 +1,9 @@ -{ system ? builtins.currentSystem }: +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: -with import ../lib/testing.nix { inherit system; }; +with import ../lib/testing.nix { inherit system pkgs; }; let mkSpec = { host, service ? null, action }: { inherit action; diff --git a/nixos/tests/chromium.nix b/nixos/tests/chromium.nix index e5097609fb27..af5db2a3dbe1 100644 --- a/nixos/tests/chromium.nix +++ b/nixos/tests/chromium.nix @@ -1,5 +1,6 @@ { system ? builtins.currentSystem -, pkgs ? import ../.. { inherit system; } +, config ? {} +, pkgs ? import ../.. { inherit system config; } , channelMap ? { stable = pkgs.chromium; beta = pkgs.chromiumBeta; @@ -7,7 +8,7 @@ } }: -with import ../lib/testing.nix { inherit system; }; +with import ../lib/testing.nix { inherit system pkgs; }; with pkgs.lib; mapAttrs (channel: chromiumPkg: makeTest rec { diff --git a/nixos/tests/cloud-init.nix b/nixos/tests/cloud-init.nix index 303e74086460..516d29c9036b 100644 --- a/nixos/tests/cloud-init.nix +++ b/nixos/tests/cloud-init.nix @@ -1,6 +1,9 @@ -{ system ? builtins.currentSystem }: +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: -with import ../lib/testing.nix { inherit system; }; +with import ../lib/testing.nix { inherit system pkgs; }; with pkgs.lib; let diff --git a/nixos/tests/ec2.nix b/nixos/tests/ec2.nix index 8271747ccc63..ed6bf7da988c 100644 --- a/nixos/tests/ec2.nix +++ b/nixos/tests/ec2.nix @@ -1,6 +1,9 @@ -{ system ? builtins.currentSystem }: +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: -with import ../lib/testing.nix { inherit system; }; +with import ../lib/testing.nix { inherit system pkgs; }; with pkgs.lib; let diff --git a/nixos/tests/elk.nix b/nixos/tests/elk.nix index 15be72b80bba..d787ac973005 100644 --- a/nixos/tests/elk.nix +++ b/nixos/tests/elk.nix @@ -1,6 +1,12 @@ -{ system ? builtins.currentSystem, enableUnfree ? false }: -with import ../lib/testing.nix { inherit system; }; +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; }, + enableUnfree ? false +}: + +with import ../lib/testing.nix { inherit system pkgs; }; with pkgs.lib; + let esUrl = "http://localhost:9200"; diff --git a/nixos/tests/gitea.nix b/nixos/tests/gitea.nix index 7ffe05ef3f1f..354334991852 100644 --- a/nixos/tests/gitea.nix +++ b/nixos/tests/gitea.nix @@ -1,6 +1,9 @@ -{ system ? builtins.currentSystem }: +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: -with import ../lib/testing.nix { inherit system; }; +with import ../lib/testing.nix { inherit system pkgs; }; with pkgs.lib; { diff --git a/nixos/tests/installer.nix b/nixos/tests/installer.nix index 3f9fa0e6016c..e03fc459cb87 100644 --- a/nixos/tests/installer.nix +++ b/nixos/tests/installer.nix @@ -1,6 +1,9 @@ -{ system ? builtins.currentSystem }: +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: -with import ../lib/testing.nix { inherit system; }; +with import ../lib/testing.nix { inherit system pkgs; }; with pkgs.lib; let diff --git a/nixos/tests/kafka.nix b/nixos/tests/kafka.nix index c9fd74620efb..a833e01f9f5e 100644 --- a/nixos/tests/kafka.nix +++ b/nixos/tests/kafka.nix @@ -1,5 +1,9 @@ -{ system ? builtins.currentSystem }: -with import ../lib/testing.nix { inherit system; }; +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: + +with import ../lib/testing.nix { inherit system pkgs; }; with pkgs.lib; let diff --git a/nixos/tests/keymap.nix b/nixos/tests/keymap.nix index be880388314c..b19da251119b 100644 --- a/nixos/tests/keymap.nix +++ b/nixos/tests/keymap.nix @@ -1,6 +1,9 @@ -{ system ? builtins.currentSystem }: +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: -with import ../lib/testing.nix { inherit system; }; +with import ../lib/testing.nix { inherit system pkgs; }; let readyFile = "/tmp/readerReady"; diff --git a/nixos/tests/kubernetes/base.nix b/nixos/tests/kubernetes/base.nix index e4bc5b326d34..b77da3414b34 100644 --- a/nixos/tests/kubernetes/base.nix +++ b/nixos/tests/kubernetes/base.nix @@ -1,6 +1,9 @@ -{ system ? builtins.currentSystem }: +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: -with import ../../lib/testing.nix { inherit system; }; +with import ../../lib/testing.nix { inherit system pkgs; }; with pkgs.lib; let diff --git a/nixos/tests/make-test.nix b/nixos/tests/make-test.nix index ee4ba310ad50..cee5da93454a 100644 --- a/nixos/tests/make-test.nix +++ b/nixos/tests/make-test.nix @@ -1,5 +1,9 @@ -f: { system ? builtins.currentSystem, ... } @ args: +f: { + system ? builtins.currentSystem, + pkgs ? import ../.. { inherit system; config = {}; }, + ... +} @ args: -with import ../lib/testing.nix { inherit system; }; +with import ../lib/testing.nix { inherit system pkgs; }; makeTest (if pkgs.lib.isFunction f then f (args // { inherit pkgs; inherit (pkgs) lib; }) else f) diff --git a/nixos/tests/networking.nix b/nixos/tests/networking.nix index d1d4fd41dda6..e689eadf1dd8 100644 --- a/nixos/tests/networking.nix +++ b/nixos/tests/networking.nix @@ -1,8 +1,10 @@ { system ? builtins.currentSystem +, config ? {} +, pkgs ? import ../.. { inherit system config; } # bool: whether to use networkd in the tests , networkd }: -with import ../lib/testing.nix { inherit system; }; +with import ../lib/testing.nix { inherit system pkgs; }; with pkgs.lib; let diff --git a/nixos/tests/nextcloud/default.nix b/nixos/tests/nextcloud/default.nix index 66da6794b961..e4c7a70606cf 100644 --- a/nixos/tests/nextcloud/default.nix +++ b/nixos/tests/nextcloud/default.nix @@ -1,6 +1,9 @@ -{ system ? builtins.currentSystem }: +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../../.. { inherit system config; } +}: { - basic = import ./basic.nix { inherit system; }; - with-postgresql-and-redis = import ./with-postgresql-and-redis.nix { inherit system; }; - with-mysql-and-memcached = import ./with-mysql-and-memcached.nix { inherit system; }; + basic = import ./basic.nix { inherit system pkgs; }; + with-postgresql-and-redis = import ./with-postgresql-and-redis.nix { inherit system pkgs; }; + with-mysql-and-memcached = import ./with-mysql-and-memcached.nix { inherit system pkgs; }; } diff --git a/nixos/tests/postgresql.nix b/nixos/tests/postgresql.nix index f1f09277f342..ed54a31c8e52 100644 --- a/nixos/tests/postgresql.nix +++ b/nixos/tests/postgresql.nix @@ -1,6 +1,11 @@ -{ system ? builtins.currentSystem }: -with import ../lib/testing.nix { inherit system; }; +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: + +with import ../lib/testing.nix { inherit system pkgs; }; with pkgs.lib; + let postgresql-versions = pkgs.callPackages ../../pkgs/servers/sql/postgresql { }; test-sql = pkgs.writeText "postgresql-test" '' diff --git a/nixos/tests/predictable-interface-names.nix b/nixos/tests/predictable-interface-names.nix index 0d73436c1c3f..8306abb8c42f 100644 --- a/nixos/tests/predictable-interface-names.nix +++ b/nixos/tests/predictable-interface-names.nix @@ -1,7 +1,10 @@ -{ system ? builtins.currentSystem }: +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: let - inherit (import ../lib/testing.nix { inherit system; }) makeTest pkgs; + inherit (import ../lib/testing.nix { inherit system pkgs; }) makeTest; in pkgs.lib.listToAttrs (pkgs.lib.crossLists (predictable: withNetworkd: { name = pkgs.lib.optionalString (!predictable) "un" + "predictable" + pkgs.lib.optionalString withNetworkd "Networkd"; diff --git a/nixos/tests/rspamd.nix b/nixos/tests/rspamd.nix index c2175f1bc257..e16a9e6ffbc6 100644 --- a/nixos/tests/rspamd.nix +++ b/nixos/tests/rspamd.nix @@ -1,6 +1,11 @@ -{ system ? builtins.currentSystem }: -with import ../lib/testing.nix { inherit system; }; +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: + +with import ../lib/testing.nix { inherit system pkgs; }; with pkgs.lib; + let initMachine = '' startAll diff --git a/nixos/tests/rsyslogd.nix b/nixos/tests/rsyslogd.nix index 969d59e0f2c2..f17e61814c5e 100644 --- a/nixos/tests/rsyslogd.nix +++ b/nixos/tests/rsyslogd.nix @@ -1,7 +1,11 @@ -{ system ? builtins.currentSystem }: +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: -with import ../lib/testing.nix { inherit system; }; +with import ../lib/testing.nix { inherit system pkgs; }; with pkgs.lib; + { test1 = makeTest { name = "rsyslogd-test1"; diff --git a/nixos/tests/run-in-machine.nix b/nixos/tests/run-in-machine.nix index bd90dc3080bd..116f5dc28a62 100644 --- a/nixos/tests/run-in-machine.nix +++ b/nixos/tests/run-in-machine.nix @@ -1,6 +1,9 @@ -{ system ? builtins.currentSystem }: +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: -with import ../lib/testing.nix { inherit system; }; +with import ../lib/testing.nix { inherit system pkgs; }; let output = runInMachine { diff --git a/nixos/tests/sddm.nix b/nixos/tests/sddm.nix index 7b9fdc0b3441..678bcbeab20a 100644 --- a/nixos/tests/sddm.nix +++ b/nixos/tests/sddm.nix @@ -1,6 +1,9 @@ -{ system ? builtins.currentSystem }: +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: -with import ../lib/testing.nix { inherit system; }; +with import ../lib/testing.nix { inherit system pkgs; }; let inherit (pkgs) lib; diff --git a/nixos/tests/virtualbox.nix b/nixos/tests/virtualbox.nix index ce84576edca1..385e2939fe3b 100644 --- a/nixos/tests/virtualbox.nix +++ b/nixos/tests/virtualbox.nix @@ -1,6 +1,11 @@ -{ system ? builtins.currentSystem, debug ? false, enableUnfree ? false }: +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; }, + debug ? false, + enableUnfree ? false +}: -with import ../lib/testing.nix { inherit system; }; +with import ../lib/testing.nix { inherit system pkgs; }; with pkgs.lib; let diff --git a/nixos/tests/zfs.nix b/nixos/tests/zfs.nix index 1434038e90c1..d7a08268e984 100644 --- a/nixos/tests/zfs.nix +++ b/nixos/tests/zfs.nix @@ -1,6 +1,9 @@ -{ system ? builtins.currentSystem }: +{ system ? builtins.currentSystem, + config ? {}, + pkgs ? import ../.. { inherit system config; } +}: -with import ../lib/testing.nix { inherit system; }; +with import ../lib/testing.nix { inherit system pkgs; }; let diff --git a/pkgs/applications/altcoins/default.nix b/pkgs/applications/altcoins/default.nix index b24dbb8f90a5..87945988321b 100644 --- a/pkgs/applications/altcoins/default.nix +++ b/pkgs/applications/altcoins/default.nix @@ -81,6 +81,10 @@ rec { sumokoin = callPackage ./sumokoin.nix { }; + wownero = callPackage ./wownero.nix { + inherit (darwin.apple_sdk.frameworks) CoreData IOKit PCSC; + }; + zcash = callPackage ./zcash { withGui = false; openssl = openssl_1_1; diff --git a/pkgs/applications/altcoins/wownero.nix b/pkgs/applications/altcoins/wownero.nix new file mode 100644 index 000000000000..4b62ba759f36 --- /dev/null +++ b/pkgs/applications/altcoins/wownero.nix @@ -0,0 +1,51 @@ +{ stdenv, fetchFromGitHub, cmake, pkgconfig, git +, boost, miniupnpc, openssl, unbound, cppzmq +, zeromq, pcsclite, readline, libsodium +, CoreData, IOKit, PCSC +}: + +assert stdenv.isDarwin -> IOKit != null; + +with stdenv.lib; + +stdenv.mkDerivation rec { + name = "wownero-${version}"; + + version = "0.4.0.0"; + src = fetchFromGitHub { + owner = "wownero"; + repo = "wownero"; + fetchSubmodules = true; + rev = "v${version}"; + sha256 = "1z5fpl4gwys4v8ffrymlzwrbnrbg73x553a9lxwny7ba8yg2k14p"; + }; + + nativeBuildInputs = [ cmake pkgconfig git ]; + + buildInputs = [ + boost miniupnpc openssl unbound + cppzmq zeromq pcsclite readline libsodium + ] ++ optionals stdenv.isDarwin [ IOKit CoreData PCSC ]; + + cmakeFlags = [ + "-DReadline_ROOT_DIR=${readline.dev}" + "-DMANUAL_SUBMODULES=ON" + ] ++ optional stdenv.isDarwin "-DBoost_USE_MULTITHREADED=OFF"; + + hardeningDisable = [ "fortify" ]; + + meta = { + description = "Wownero is a fork of the cryptocurrency Monero with primary alterations"; + longDescription = '' + Wownero’s emission is capped and supply is finite. Wownero is a fairly + launched coin with no premine. It’s not a fork of another blockchain. With + its own genesis block there is no degradation of privacy caused by ring + signatures using different participants for the same transaction outputs. + Unlike opposing forks. + ''; + homepage = http://wownero.org/; + license = licenses.bsd3; + platforms = platforms.all; + maintainers = with maintainers; [ fuwa ]; + }; +} diff --git a/pkgs/applications/audio/sfxr-qt/default.nix b/pkgs/applications/audio/sfxr-qt/default.nix new file mode 100644 index 000000000000..a98d1431d65e --- /dev/null +++ b/pkgs/applications/audio/sfxr-qt/default.nix @@ -0,0 +1,36 @@ +{ stdenv, fetchFromGitHub +, cmake +, qtbase, qtquickcontrols2 +, SDL +, python3 +}: + +stdenv.mkDerivation rec { + name = "sfxr-qt-${version}"; + version = "1.2.0"; + src = fetchFromGitHub { + owner = "agateau"; + repo = "sfxr-qt"; + rev = version; + sha256 = "1ndw1dcmzvkrc6gnb0y057zb4lqlhwrv18jlbx26w3s4xrbxqr41"; + fetchSubmodules = true; + }; + nativeBuildInputs = [ + cmake + (python3.withPackages (pp: with pp; [ pyyaml jinja2 ])) + ]; + buildInputs = [ + qtbase qtquickcontrols2 + SDL + ]; + configurePhase = "cmake . -DCMAKE_INSTALL_PREFIX=$out"; + + meta = with stdenv.lib; { + homepage = https://github.com/agateau/sfxr-qt; + description = "A sound effect generator, QtQuick port of sfxr"; + license = licenses.gpl2; + maintainers = with maintainers; [ fgaz ]; + platforms = platforms.linux; + }; +} + diff --git a/pkgs/applications/editors/jetbrains/default.nix b/pkgs/applications/editors/jetbrains/default.nix index f5fbf1b5f03d..7d25b1ed39dd 100644 --- a/pkgs/applications/editors/jetbrains/default.nix +++ b/pkgs/applications/editors/jetbrains/default.nix @@ -250,12 +250,12 @@ in clion = buildClion rec { name = "clion-${version}"; - version = "2018.2.4"; /* updated by script */ + version = "2018.2.5"; /* updated by script */ description = "C/C++ IDE. New. Intelligent. Cross-platform"; license = stdenv.lib.licenses.unfree; src = fetchurl { url = "https://download.jetbrains.com/cpp/CLion-${version}.tar.gz"; - sha256 = "0ljzdjvlkm37gclny652nm7kw2hlyl1iiix6h44zq7fhszp5kmyr"; /* updated by script */ + sha256 = "0brbwgyjh38ix8nr176glmc3kr7ndi8wppxqkb1c890jw5d3916j"; /* updated by script */ }; wmClass = "jetbrains-clion"; update-channel = "CLion Release"; # channel's id as in http://www.jetbrains.com/updates/updates.xml @@ -315,12 +315,12 @@ in phpstorm = buildPhpStorm rec { name = "phpstorm-${version}"; - version = "2018.2.3"; /* updated by script */ + version = "2018.2.5"; /* updated by script */ description = "Professional IDE for Web and PHP developers"; license = stdenv.lib.licenses.unfree; src = fetchurl { url = "https://download.jetbrains.com/webide/PhpStorm-${version}.tar.gz"; - sha256 = "1kdv3h749ly2sadixz3khaxrias3k72fi2ixrzniynwhgiqixz70"; /* updated by script */ + sha256 = "0crr3056hlv9x2q1i1n00aavj53xkwkfy4lgyyphk81c0gly4dg1"; /* updated by script */ }; wmClass = "jetbrains-phpstorm"; update-channel = "PhpStorm 2018.2"; @@ -367,12 +367,12 @@ in ruby-mine = buildRubyMine rec { name = "ruby-mine-${version}"; - version = "2018.2.2"; /* updated by script */ + version = "2018.2.4"; /* updated by script */ description = "The Most Intelligent Ruby and Rails IDE"; license = stdenv.lib.licenses.unfree; src = fetchurl { url = "https://download.jetbrains.com/ruby/RubyMine-${version}.tar.gz"; - sha256 = "0585dnbvmzxnj2am6b04lfw75rdhk0fby2cbj58pzzcjz5xlrhvq"; /* updated by script */ + sha256 = "0dk3ch749ai5kyg9q8819ckrqw2jk4f656iqrkkpab9fjqfjylka"; /* updated by script */ }; wmClass = "jetbrains-rubymine"; update-channel = "RubyMine 2018.2"; @@ -380,12 +380,12 @@ in webstorm = buildWebStorm rec { name = "webstorm-${version}"; - version = "2018.2.3"; /* updated by script */ + version = "2018.2.5"; /* updated by script */ description = "Professional IDE for Web and JavaScript development"; license = stdenv.lib.licenses.unfree; src = fetchurl { url = "https://download.jetbrains.com/webstorm/WebStorm-${version}.tar.gz"; - sha256 = "0y3a1p047knc598aamxxdmcf5nr86wk60w6nk2bhcasxjyqaw6r4"; /* updated by script */ + sha256 = "0d4l2bf87i6kv45qmbw55hvcrnxr6zxjcjicbkjs2k01lv7y605c"; /* updated by script */ }; wmClass = "jetbrains-webstorm"; update-channel = "WebStorm Release"; diff --git a/pkgs/applications/editors/nano/default.nix b/pkgs/applications/editors/nano/default.nix index 36c400a74faa..0e313d33736a 100644 --- a/pkgs/applications/editors/nano/default.nix +++ b/pkgs/applications/editors/nano/default.nix @@ -20,11 +20,11 @@ let in stdenv.mkDerivation rec { name = "nano-${version}"; - version = "3.1"; + version = "3.2"; src = fetchurl { url = "mirror://gnu/nano/${name}.tar.xz"; - sha256 = "17kinzyv6vwgyx2d0ym1kp65qbf7kxzwpyg21ic1rijv1aj2rh0l"; + sha256 = "0jb3zq0v84xb0chyynkcp2jhs9660wmpkic294p4p6c96npp69yi"; }; nativeBuildInputs = [ texinfo ] ++ optional enableNls gettext; diff --git a/pkgs/applications/graphics/gocr/default.nix b/pkgs/applications/graphics/gocr/default.nix index 78772a63dfe3..f5fa8ca9221d 100644 --- a/pkgs/applications/graphics/gocr/default.nix +++ b/pkgs/applications/graphics/gocr/default.nix @@ -1,11 +1,11 @@ { stdenv, fetchurl, tk }: stdenv.mkDerivation rec { - name = "gocr-0.51"; + name = "gocr-0.52"; src = fetchurl { url = "https://www-e.uni-magdeburg.de/jschulen/ocr/${name}.tar.gz"; - sha256 = "14i6zi6q11h6d0qds2cpvgvhbxk5xaa027h8cd0wy1zblh7sxckf"; + sha256 = "11l6gds1lrm8lwrrsxnm5fjlwz8q1xbh896cprrl4psz21in946z"; }; buildFlags = [ "all" "libs" ]; diff --git a/pkgs/applications/misc/ola/default.nix b/pkgs/applications/misc/ola/default.nix index 792cff818655..fce6b8426cbf 100644 --- a/pkgs/applications/misc/ola/default.nix +++ b/pkgs/applications/misc/ola/default.nix @@ -16,7 +16,10 @@ stdenv.mkDerivation rec { nativeBuildInputs = [ autoreconfHook bison flex pkgconfig perl ]; buildInputs = [ libuuid cppunit protobuf3_1 zlib avahi libmicrohttpd python3 ]; - propagatedBuildInputs = [ python3Packages.protobuf3_1 python3Packages.numpy ]; + propagatedBuildInputs = [ + (python3Packages.protobuf.override { protobuf = protobuf3_1; }) + python3Packages.numpy + ]; configureFlags = [ "--enable-python-libs" ]; diff --git a/pkgs/applications/networking/browsers/brave/default.nix b/pkgs/applications/networking/browsers/brave/default.nix index 379180357a23..f19c6009588c 100644 --- a/pkgs/applications/networking/browsers/brave/default.nix +++ b/pkgs/applications/networking/browsers/brave/default.nix @@ -30,7 +30,8 @@ pango, udev, xorg, - zlib + zlib, + xdg_utils }: let rpath = lib.makeLibraryPath [ @@ -65,32 +66,67 @@ let rpath = lib.makeLibraryPath [ udev xorg.libxcb zlib + xdg_utils ]; in stdenv.mkDerivation rec { pname = "brave"; - version = "0.25.2"; + version = "0.56.12"; src = fetchurl { - url = "https://github.com/brave/browser-laptop/releases/download/v${version}dev/brave_${version}_amd64.deb"; - sha256 = "1r3rsa6szps7mvvpqyw0mg16zn36x451dxq4nmn2l5ds5cp1f017"; + url = "https://github.com/brave/brave-browser/releases/download/v${version}/brave-browser_${version}_amd64.deb"; + sha256 = "1pvablwchpsm1fdhfp9kr2912yv4812r8prv5fn799qpflzxvyai"; }; - phases = [ "unpackPhase" "installPhase" ]; + dontConfigure = true; + dontBuild = true; + dontPatchELF = true; nativeBuildInputs = [ dpkg ]; - unpackPhase = "dpkg-deb -x $src ."; + unpackPhase = "dpkg-deb --fsys-tarfile $src | tar -x --no-same-permissions --no-same-owner"; installPhase = '' mkdir -p $out cp -R usr/* $out + cp -R opt/ $out/opt + + export BINARYWRAPPER=$out/opt/brave.com/brave/brave-browser + + # Fix path to bash in $BINARYWRAPPER + substituteInPlace $BINARYWRAPPER \ + --replace /bin/bash ${stdenv.shell} + + ln -sf $BINARYWRAPPER $out/bin/brave patchelf \ --set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" \ - --set-rpath "${rpath}" $out/bin/brave + --set-rpath "${rpath}" $out/opt/brave.com/brave/brave + + # Fix paths + substituteInPlace $out/share/applications/brave-browser.desktop \ + --replace /usr/bin/brave-browser $out/bin/brave + substituteInPlace $out/share/gnome-control-center/default-apps/brave-browser.xml \ + --replace /opt/brave.com $out/opt/brave.com + substituteInPlace $out/share/menu/brave-browser.menu \ + --replace /opt/brave.com $out/opt/brave.com + substituteInPlace $out/opt/brave.com/brave/default-app-block \ + --replace /opt/brave.com $out/opt/brave.com + + # Correct icons location + icon_sizes=("16" "22" "24" "32" "48" "64" "128" "256") + + for icon in ''${icon_sizes[*]} + do + mkdir -p $out/share/icons/hicolor/$icon\x$icon/apps + ln -s $out/opt/brave.com/brave/product_logo_$icon.png $out/share/icons/hicolor/$icon\x$icon/apps/brave-browser.png + done + + # Replace xdg-settings and xdg-mime + ln -sf ${xdg_utils}/bin/xdg-settings $out/opt/brave.com/brave/xdg-settings + ln -sf ${xdg_utils}/bin/xdg-mime $out/opt/brave.com/brave/xdg-mime ''; meta = with stdenv.lib; { diff --git a/pkgs/applications/networking/instant-messengers/wire-desktop/default.nix b/pkgs/applications/networking/instant-messengers/wire-desktop/default.nix index 193e306f2286..c685a5b91c1e 100644 --- a/pkgs/applications/networking/instant-messengers/wire-desktop/default.nix +++ b/pkgs/applications/networking/instant-messengers/wire-desktop/default.nix @@ -72,7 +72,10 @@ in categories = "Network;InstantMessaging;Chat;VideoConference"; }; - phases = [ "unpackPhase" "installPhase" ]; + dontBuild = true; + dontPatchELF = true; + dontConfigure = true; + nativeBuildInputs = [ dpkg ]; unpackPhase = "dpkg-deb -x $src ."; installPhase = '' @@ -93,7 +96,7 @@ in # Desktop file mkdir -p "$out/share/applications" - cp ${desktopItem}/share/applications/* "$out/share/applications" + cp "${desktopItem}/share/applications/"* "$out/share/applications" ''; meta = with stdenv.lib; { diff --git a/pkgs/applications/science/math/R/default.nix b/pkgs/applications/science/math/R/default.nix index 913fac6ac128..2fa8f3e5d7be 100644 --- a/pkgs/applications/science/math/R/default.nix +++ b/pkgs/applications/science/math/R/default.nix @@ -4,6 +4,7 @@ , curl, Cocoa, Foundation, libobjc, libcxx, tzdata , withRecommendedPackages ? true , enableStrictBarrier ? false +, javaSupport ? (!stdenv.hostPlatform.isAarch32 && !stdenv.hostPlatform.isAarch64) }: stdenv.mkDerivation rec { @@ -17,9 +18,10 @@ stdenv.mkDerivation rec { buildInputs = [ bzip2 gfortran libX11 libXmu libXt libXt libjpeg libpng libtiff ncurses pango pcre perl readline texLive xz zlib less texinfo graphviz icu - pkgconfig bison imake which jdk openblas curl + pkgconfig bison imake which openblas curl ] ++ stdenv.lib.optionals (!stdenv.isDarwin) [ tcl tk ] - ++ stdenv.lib.optionals stdenv.isDarwin [ Cocoa Foundation libobjc libcxx ]; + ++ stdenv.lib.optionals stdenv.isDarwin [ Cocoa Foundation libobjc libcxx ] + ++ stdenv.lib.optional javaSupport jdk; patches = [ ./no-usr-local-search-paths.patch ]; @@ -47,7 +49,7 @@ stdenv.mkDerivation rec { CC=$(type -p cc) CXX=$(type -p c++) FC="${gfortran}/bin/gfortran" F77="${gfortran}/bin/gfortran" - JAVA_HOME="${jdk}" + ${stdenv.lib.optionalString javaSupport "JAVA_HOME=\"${jdk}\""} RANLIB=$(type -p ranlib) R_SHELL="${stdenv.shell}" '' + stdenv.lib.optionalString stdenv.isDarwin '' diff --git a/pkgs/applications/version-management/gitea/default.nix b/pkgs/applications/version-management/gitea/default.nix index a25492e4546c..8ee43dc16c1d 100644 --- a/pkgs/applications/version-management/gitea/default.nix +++ b/pkgs/applications/version-management/gitea/default.nix @@ -7,13 +7,13 @@ with stdenv.lib; buildGoPackage rec { name = "gitea-${version}"; - version = "1.5.2"; + version = "1.5.3"; src = fetchFromGitHub { owner = "go-gitea"; repo = "gitea"; rev = "v${version}"; - sha256 = "168pbndlh7c148p8wzkd39kd7idiba9zw7v0alp9zqcqzzayaydj"; + sha256 = "1f8cbsd3kn4v2a6c57rwh9slgvss7gnxs96yhcy2ddwyycf6i04d"; # Required to generate the same checksum on MacOS due to unicode encoding differences # More information: https://github.com/NixOS/nixpkgs/pull/48128 extraPostFetch = '' diff --git a/pkgs/development/python-modules/docker_compose/default.nix b/pkgs/applications/virtualization/docker-compose/default.nix similarity index 100% rename from pkgs/development/python-modules/docker_compose/default.nix rename to pkgs/applications/virtualization/docker-compose/default.nix diff --git a/pkgs/build-support/docker/default.nix b/pkgs/build-support/docker/default.nix index 2d6d6c1fc91d..890f64a9d3b1 100644 --- a/pkgs/build-support/docker/default.nix +++ b/pkgs/build-support/docker/default.nix @@ -11,7 +11,6 @@ pkgs, pigz, nix, - perl, runCommand, rsync, shadow, @@ -23,6 +22,7 @@ referencesByPopularity, writeScript, writeText, + closureInfo }: # WARNING: this API is unstable and may be subject to backwards-incompatible changes in the future. @@ -261,19 +261,6 @@ rec { ${text} ''; - nixRegistration = contents: runCommand "nix-registration" { - buildInputs = [ nix perl ]; - # For obtaining the closure of `contents'. - exportReferencesGraph = - let contentsList = if builtins.isList contents then contents else [ contents ]; - in map (x: [("closure-" + baseNameOf x) x]) contentsList; - } - '' - mkdir $out - printRegistration=1 perl ${pkgs.pathsFromGraph} closure-* > $out/db.dump - perl ${pkgs.pathsFromGraph} closure-* > $out/storePaths - ''; - # Create $maxLayers worth of Docker Layers, one layer per store path # unless there are more paths than $maxLayers. In that case, create # $maxLayers-1 for the most popular layers, and smush the remainaing @@ -795,29 +782,19 @@ rec { # the container. # Be careful since this doesn't work well with multilayer. buildImageWithNixDb = args@{ contents ? null, extraCommands ? "", ... }: - buildImage (args // { + let contentsList = if builtins.isList contents then contents else [ contents ]; + in buildImage (args // { extraCommands = '' echo "Generating the nix database..." echo "Warning: only the database of the deepest Nix layer is loaded." echo " If you want to use nix commands in the container, it would" echo " be better to only have one layer that contains a nix store." - # This requires Nix 1.12 or higher - export NIX_REMOTE=local?root=$PWD - ${nix}/bin/nix-store --load-db < ${nixRegistration contents}/db.dump - # We fill the store in order to run the 'verify' command that - # generates hash and size of output paths. - # Note when Nix 1.12 is be the stable one, the database dump - # generated by the exportReferencesGraph function will - # contains sha and size. See - # https://github.com/NixOS/nix/commit/c2b0d8749f7e77afc1c4b3e8dd36b7ee9720af4a - storePaths=$(cat ${nixRegistration contents}/storePaths) - echo "Copying everything to /nix/store (will take a while)..." - cp -prd $storePaths nix/store/ - ${nix}/bin/nix-store --verify --check-contents + export NIX_REMOTE=local?root=$PWD + ${nix}/bin/nix-store --load-db < ${closureInfo {rootPaths = contentsList;}}/registration mkdir -p nix/var/nix/gcroots/docker/ - for i in ${lib.concatStringsSep " " contents}; do + for i in ${lib.concatStringsSep " " contentsList}; do ln -s $i nix/var/nix/gcroots/docker/$(basename $i) done; '' + extraCommands; diff --git a/pkgs/build-support/libredirect/default.nix b/pkgs/build-support/libredirect/default.nix index d13cdd681a21..09a3da6729a9 100644 --- a/pkgs/build-support/libredirect/default.nix +++ b/pkgs/build-support/libredirect/default.nix @@ -1,19 +1,41 @@ -{ stdenv }: +{ stdenv, coreutils }: stdenv.mkDerivation { name = "libredirect-0"; - unpackPhase = "cp ${./libredirect.c} libredirect.c"; + unpackPhase = '' + cp ${./libredirect.c} libredirect.c + cp ${./test.c} test.c + ''; - buildPhase = - '' - gcc -Wall -std=c99 -O3 -shared libredirect.c -o libredirect.so -fPIC -ldl - ''; + shlibext = stdenv.targetPlatform.extensions.sharedLibrary; - installPhase = "mkdir -p $out/lib; cp libredirect.so $out/lib"; + buildPhase = '' + $CC -Wall -std=c99 -O3 -shared libredirect.c \ + -o "libredirect$shlibext" -fPIC -ldl + + if [ -n "$doInstallCheck" ]; then + $CC -Wall -std=c99 -O3 test.c -o test + fi + ''; + + installPhase = '' + install -vD "libredirect$shlibext" "$out/lib/libredirect$shlibext" + ''; + + doInstallCheck = true; + + installCheckPhase = if stdenv.isDarwin then '' + NIX_REDIRECTS="/foo/bar/test=${coreutils}/bin/true" \ + DYLD_INSERT_LIBRARIES="$out/lib/libredirect$shlibext" \ + DYLD_FORCE_FLAT_NAMESPACE=1 ./test + '' else '' + NIX_REDIRECTS="/foo/bar/test=${coreutils}/bin/true" \ + LD_PRELOAD="$out/lib/libredirect$shlibext" ./test + ''; meta = { - platforms = stdenv.lib.platforms.linux; + platforms = stdenv.lib.platforms.unix; description = "An LD_PRELOAD library to intercept and rewrite the paths in glibc calls"; longDescription = '' libredirect is an LD_PRELOAD library to intercept and rewrite the paths in diff --git a/pkgs/build-support/libredirect/libredirect.c b/pkgs/build-support/libredirect/libredirect.c index d1e8f77fb1f6..ba1e6c57e12e 100644 --- a/pkgs/build-support/libredirect/libredirect.c +++ b/pkgs/build-support/libredirect/libredirect.c @@ -119,6 +119,13 @@ int __xstat64(int ver, const char * path, struct stat64 * st) return __xstat64_real(ver, rewrite(path, buf), st); } +int stat(const char * path, struct stat * st) +{ + int (*__stat_real) (const char *, struct stat *) = dlsym(RTLD_NEXT, "stat"); + char buf[PATH_MAX]; + return __stat_real(rewrite(path, buf), st); +} + int * access(const char * path, int mode) { int * (*access_real) (const char *, int mode) = dlsym(RTLD_NEXT, "access"); diff --git a/pkgs/build-support/libredirect/test.c b/pkgs/build-support/libredirect/test.c new file mode 100644 index 000000000000..b57664db3c19 --- /dev/null +++ b/pkgs/build-support/libredirect/test.c @@ -0,0 +1,59 @@ +#include +#include +#include +#include +#include + +#include +#include +#include + +#define TESTPATH "/foo/bar/test" + +extern char **environ; + +void test_spawn(void) { + pid_t pid; + int ret; + posix_spawn_file_actions_t file_actions; + char *argv[] = {"true", NULL}; + + assert(posix_spawn_file_actions_init(&file_actions) == 0); + + ret = posix_spawn(&pid, TESTPATH, &file_actions, NULL, argv, environ); + + assert(ret == 0); + assert(waitpid(pid, NULL, 0) != -1); +} + +void test_execv(void) { + char *argv[] = {"true", NULL}; + assert(execv(TESTPATH, argv) == 0); +} + +int main(void) +{ + FILE *testfp; + int testfd; + struct stat testsb; + + testfp = fopen(TESTPATH, "r"); + assert(testfp != NULL); + fclose(testfp); + + testfd = open(TESTPATH, O_RDONLY); + assert(testfd != -1); + close(testfd); + + assert(access(TESTPATH, X_OK) == 0); + + assert(stat(TESTPATH, &testsb) != -1); + + test_spawn(); + test_execv(); + + /* If all goes well, this is never reached because test_execv() replaces + * the current process. + */ + return 0; +} diff --git a/pkgs/data/misc/hackage/default.nix b/pkgs/data/misc/hackage/default.nix index 5fac16067882..17f51e0d3036 100644 --- a/pkgs/data/misc/hackage/default.nix +++ b/pkgs/data/misc/hackage/default.nix @@ -1,6 +1,6 @@ { fetchurl }: fetchurl { - url = "https://github.com/commercialhaskell/all-cabal-hashes/archive/98ec0eee2ddef5d4a00e2ac4a95e8add46d23b69.tar.gz"; - sha256 = "0svcaaflqi5c815z3yrh61bjny1jnwp42sylmsnwryjldqvizc1a"; + url = "https://github.com/commercialhaskell/all-cabal-hashes/archive/1fba236a8a8f685aaf55029d20ab24d7e4cbc5ba.tar.gz"; + sha256 = "0yy6ass2c0vn81pcvb0ksc1qh3hlw2q97937vp73jawghgwsy9qv"; } diff --git a/pkgs/development/compilers/go/1.11.nix b/pkgs/development/compilers/go/1.11.nix index cab739b9028a..91afc89ae146 100644 --- a/pkgs/development/compilers/go/1.11.nix +++ b/pkgs/development/compilers/go/1.11.nix @@ -131,14 +131,17 @@ stdenv.mkDerivation rec { substituteInPlace "src/cmd/link/internal/ld/lib.go" --replace dsymutil ${llvm}/bin/llvm-dsymutil ''; - GOOS = if stdenv.isDarwin then "darwin" else "linux"; - GOARCH = if stdenv.isDarwin then "amd64" - else if stdenv.targetPlatform.isi686 then "386" - else if stdenv.targetPlatform.isx86_64 then "amd64" - else if stdenv.targetPlatform.isAarch32 then "arm" - else if stdenv.targetPlatform.isAarch64 then "arm64" - else throw "Unsupported system"; - GOARM = toString (stdenv.lib.intersectLists [(stdenv.targetPlatform.parsed.cpu.version or "")] ["5" "6" "7"]); + GOOS = stdenv.hostPlatform.parsed.kernel.name; + GOARCH = { + "i686" = "386"; + "x86_64" = "amd64"; + "aarch64" = "arm64"; + "arm" = "arm"; + "armv5tel" = "arm"; + "armv6l" = "arm"; + "armv7l" = "arm"; + }.${stdenv.hostPlatform.parsed.cpu.name} or (throw "Unsupported system"); + GOARM = toString (stdenv.lib.intersectLists [(stdenv.hostPlatform.parsed.cpu.version or "")] ["5" "6" "7"]); GO386 = 387; # from Arch: don't assume sse2 on i686 CGO_ENABLED = 1; GOROOT_BOOTSTRAP = "${goBootstrap}/share/go"; diff --git a/pkgs/development/haskell-modules/configuration-hackage2nix.yaml b/pkgs/development/haskell-modules/configuration-hackage2nix.yaml index 97f2955d3a9e..23f71d57d35e 100644 --- a/pkgs/development/haskell-modules/configuration-hackage2nix.yaml +++ b/pkgs/development/haskell-modules/configuration-hackage2nix.yaml @@ -45,7 +45,7 @@ default-package-overrides: - base-compat-batteries ==0.10.1 # Newer versions don't work in LTS-12.x - cassava-megaparsec < 2 - # LTS Haskell 12.17 + # LTS Haskell 12.18 - abstract-deque ==0.3 - abstract-deque-tests ==0.3 - abstract-par ==0.3.3 @@ -731,8 +731,8 @@ default-package-overrides: - fileplow ==0.1.0.0 - filter-logger ==0.6.0.0 - filtrable ==0.1.1.0 - - fin ==0.0.1 - Fin ==0.2.6.0 + - fin ==0.0.1 - FindBin ==0.0.5 - find-clumpiness ==0.2.3.1 - fingertree ==0.1.4.1 @@ -1010,8 +1010,8 @@ default-package-overrides: - hsdns ==1.7.1 - hsebaysdk ==0.4.0.0 - hsemail ==2 - - hset ==2.2.0 - HSet ==0.0.1 + - hset ==2.2.0 - hsexif ==0.6.1.6 - hs-functors ==0.1.3.0 - hs-GeoIP ==0.3 diff --git a/pkgs/development/haskell-modules/hackage-packages.nix b/pkgs/development/haskell-modules/hackage-packages.nix index e0324f973b7a..0962443c79c5 100644 --- a/pkgs/development/haskell-modules/hackage-packages.nix +++ b/pkgs/development/haskell-modules/hackage-packages.nix @@ -27130,8 +27130,8 @@ self: { }: mkDerivation { pname = "antiope-athena"; - version = "6.1.2"; - sha256 = "0af1sd3hhi2j2bsglqi5vqs7cjh719zbzkjcxi68sy4h3783vqc2"; + version = "6.1.3"; + sha256 = "00n1yj3qjlcbqjb1288h74nmlhk2851mmpkrlni48ja6hy3pnacc"; libraryHaskellDepends = [ amazonka amazonka-athena amazonka-core base lens resourcet text unliftio-core @@ -27147,8 +27147,8 @@ self: { ({ mkDerivation, aeson, antiope-s3, avro, base, bytestring, text }: mkDerivation { pname = "antiope-contract"; - version = "6.1.2"; - sha256 = "1s9xikffc3l6q7l2fmi5yz6shw90w8zgb8sc1s3d85z7kfsi87rp"; + version = "6.1.3"; + sha256 = "0jazg8jh0wcv5gzz2sxhb5z3s50fz6x83siih9xs456kzsickh9a"; libraryHaskellDepends = [ aeson antiope-s3 avro base bytestring text ]; @@ -27163,8 +27163,8 @@ self: { }: mkDerivation { pname = "antiope-core"; - version = "6.1.2"; - sha256 = "0bn975bcr1fm8w63m641iip22hw5alam28z73p3cjcx9wkzkfca4"; + version = "6.1.3"; + sha256 = "1qnbha6n0ax9gffa14dwgdklc8ilnxnccs60cfjfw8wjjfqm1wdc"; libraryHaskellDepends = [ amazonka amazonka-core base bytestring generic-lens http-client lens monad-logger mtl resourcet transformers unliftio-core @@ -27184,8 +27184,8 @@ self: { }: mkDerivation { pname = "antiope-dynamodb"; - version = "6.1.2"; - sha256 = "04ik6ms66yiq934dqhadw4fhb5js08q6czpgb8vqsv8pvm3cj30f"; + version = "6.1.3"; + sha256 = "0l8arxlxy9bb5gqfn7jp4gcfzr3c2ncbcchk635g58ac0chzgaw4"; libraryHaskellDepends = [ amazonka amazonka-core amazonka-dynamodb antiope-core base generic-lens lens text unliftio-core unordered-containers @@ -27205,8 +27205,8 @@ self: { }: mkDerivation { pname = "antiope-messages"; - version = "6.1.2"; - sha256 = "1vkjflqi2k4d74hwagfaff4gyjx5809d2yjijhmgwk5aldyydw9m"; + version = "6.1.3"; + sha256 = "0bk98ziv0ivwhbwd99pw54pf2788cva9bnqvv871wzxhqgd2vhx8"; libraryHaskellDepends = [ aeson amazonka amazonka-core amazonka-s3 amazonka-sqs antiope-s3 base generic-lens lens lens-aeson monad-loops network-uri text @@ -27223,25 +27223,25 @@ self: { "antiope-s3" = callPackage ({ mkDerivation, amazonka, amazonka-core, amazonka-s3, antiope-core - , base, bytestring, conduit, conduit-extra, exceptions + , attoparsec, base, bytestring, conduit, conduit-extra, exceptions , generic-lens, hedgehog, hspec, http-types, hw-hspec-hedgehog , lens, monad-logger, mtl, network-uri, resourcet, text , unliftio-core }: mkDerivation { pname = "antiope-s3"; - version = "6.1.2"; - sha256 = "1lrawihlnl1kmhqimcf59d7a2ad916ss83zjllx3x8cy6br68b4r"; + version = "6.1.3"; + sha256 = "167yc57r53yzfvyiz4z8kha820xfpwfa3mcb4kndlb650qa016ax"; libraryHaskellDepends = [ - amazonka amazonka-core amazonka-s3 antiope-core base bytestring - conduit conduit-extra exceptions generic-lens http-types lens - monad-logger mtl network-uri resourcet text unliftio-core + amazonka amazonka-core amazonka-s3 antiope-core attoparsec base + bytestring conduit conduit-extra exceptions generic-lens http-types + lens monad-logger mtl network-uri resourcet text unliftio-core ]; testHaskellDepends = [ - amazonka amazonka-core amazonka-s3 antiope-core base bytestring - conduit conduit-extra exceptions generic-lens hedgehog hspec - http-types hw-hspec-hedgehog lens monad-logger mtl network-uri - resourcet text unliftio-core + amazonka amazonka-core amazonka-s3 antiope-core attoparsec base + bytestring conduit conduit-extra exceptions generic-lens hedgehog + hspec http-types hw-hspec-hedgehog lens monad-logger mtl + network-uri resourcet text unliftio-core ]; license = stdenv.lib.licenses.mit; hydraPlatforms = stdenv.lib.platforms.none; @@ -27253,8 +27253,8 @@ self: { }: mkDerivation { pname = "antiope-sns"; - version = "6.1.2"; - sha256 = "0b6blhcc1dplc16v9k12jn9s9ii5575sj9hm4kbla8483j24rd3k"; + version = "6.1.3"; + sha256 = "1knxyvzr566qwaa6167w64v8rlnr89350cca46vcs50rcr7hdjpj"; libraryHaskellDepends = [ aeson amazonka amazonka-core amazonka-sns base generic-lens lens text unliftio-core @@ -27274,8 +27274,8 @@ self: { }: mkDerivation { pname = "antiope-sqs"; - version = "6.1.2"; - sha256 = "1d508kcsm1bxz768fxin5jc6y7jqskdxxpgl1z5n1579aq7wb0ia"; + version = "6.1.3"; + sha256 = "0xzcmjaniqprs2qachjiqzm4cxhgw4l6w7vg7sfp0b0l3m4kz4hh"; libraryHaskellDepends = [ aeson amazonka amazonka-core amazonka-s3 amazonka-sqs antiope-messages antiope-s3 base generic-lens lens lens-aeson @@ -27374,8 +27374,8 @@ self: { }: mkDerivation { pname = "aos-signature"; - version = "0.1.0"; - sha256 = "1nyizswc7jc6hylb57nsmpqndvqm8mk1wi2fi1l1cqgbkisrxmy5"; + version = "0.1.1"; + sha256 = "1sm925sr3ifi44wp7ndgjwwk3d3xy75ai6kgll573ngdicy3b2n3"; libraryHaskellDepends = [ base bytestring cryptonite memory mtl protolude random ]; @@ -28220,6 +28220,38 @@ self: { license = stdenv.lib.licenses.bsd3; }) {}; + "apply-refact_0_6_0_0" = callPackage + ({ mkDerivation, base, containers, directory, filemanip, filepath + , ghc, ghc-exactprint, mtl, optparse-applicative, process, refact + , silently, syb, tasty, tasty-expected-failure, tasty-golden + , temporary, transformers, unix-compat + }: + mkDerivation { + pname = "apply-refact"; + version = "0.6.0.0"; + sha256 = "0p2mqgjcqr1zcmk8zgr0yq7g8z1agsa6l493lkj6g3ya9lyhxgig"; + isLibrary = true; + isExecutable = true; + libraryHaskellDepends = [ + base containers directory filemanip ghc ghc-exactprint mtl process + refact syb temporary transformers unix-compat + ]; + executableHaskellDepends = [ + base containers directory filemanip filepath ghc ghc-exactprint mtl + optparse-applicative process refact syb temporary transformers + unix-compat + ]; + testHaskellDepends = [ + base containers directory filemanip filepath ghc ghc-exactprint mtl + optparse-applicative process refact silently syb tasty + tasty-expected-failure tasty-golden temporary transformers + unix-compat + ]; + description = "Perform refactorings specified by the refact library"; + license = stdenv.lib.licenses.bsd3; + hydraPlatforms = stdenv.lib.platforms.none; + }) {}; + "apportionment" = callPackage ({ mkDerivation, base, containers, utility-ht }: mkDerivation { @@ -31868,17 +31900,18 @@ self: { "aws-easy" = callPackage ({ mkDerivation, amazonka, amazonka-dynamodb, amazonka-s3, base - , bytestring, lens, resourcet, split, template-haskell, text - , unordered-containers + , bytestring, lens, monad-control, resourcet, split + , template-haskell, text, unordered-containers }: mkDerivation { pname = "aws-easy"; - version = "0.1.0.1"; - sha256 = "0sl3whg7x02c3cph5p72rlkycsr2m3ni0kad5rs0q644wgvhqvm5"; + version = "0.1.0.2"; + sha256 = "16a0dfgd6ggm5b4g75913b5pc0s5hdh7n1h3j22d4j50knd8j5r4"; isLibrary = true; isExecutable = true; libraryHaskellDepends = [ - amazonka base bytestring lens resourcet template-haskell + amazonka base bytestring lens monad-control resourcet + template-haskell ]; executableHaskellDepends = [ amazonka amazonka-dynamodb amazonka-s3 base lens split text @@ -32431,6 +32464,24 @@ self: { license = stdenv.lib.licenses.bsd3; }) {}; + "azure-email" = callPackage + ({ mkDerivation, aeson, base, base64-bytestring, bytestring + , cryptonite, exceptions, http-client, http-client-tls, lens-aeson + , microlens, RSA, text, time, uuid, wreq + }: + mkDerivation { + pname = "azure-email"; + version = "0.1.0.0"; + sha256 = "108xfmq9mb8fxy06six0id7sf8rpazknqx4plk93fl34xyrwald5"; + libraryHaskellDepends = [ + aeson base base64-bytestring bytestring cryptonite exceptions + http-client http-client-tls lens-aeson microlens RSA text time uuid + wreq + ]; + description = "send email with microsoft azure"; + license = stdenv.lib.licenses.bsd3; + }) {}; + "azure-service-api" = callPackage ({ mkDerivation, base, binary, bytestring, case-insensitive , certificate, crypto-pubkey-types, http-conduit, hxt, hxt-xpath @@ -39893,14 +39944,14 @@ self: { "btree" = callPackage ({ mkDerivation, base, clock, containers, ghc-prim, hashable - , MonadRandom, primitive, smallcheck, tasty, tasty-hunit - , tasty-smallcheck, transformers + , initialize, MonadRandom, primitive, smallcheck, tasty + , tasty-hunit, tasty-smallcheck, transformers }: mkDerivation { pname = "btree"; - version = "0.3.1"; - sha256 = "071ghhjzg7c6m87nh2q53kqbff9hx782h6c1z5s9pwl2b7r8cc7g"; - libraryHaskellDepends = [ base ghc-prim primitive ]; + version = "0.4.0"; + sha256 = "04jbvd247i8bfplyljp5937fw9x85w4v613kpzyb15z7nw2xr8l9"; + libraryHaskellDepends = [ base ghc-prim initialize primitive ]; testHaskellDepends = [ base containers hashable MonadRandom primitive smallcheck tasty tasty-hunit tasty-smallcheck transformers @@ -41783,8 +41834,8 @@ self: { pname = "cabal-install"; version = "2.4.0.0"; sha256 = "1xmyl0x8wqfrnray6ky5wy0g0samv4264fbdlzxhqsvk9dbfja8k"; - revision = "1"; - editedCabalFile = "0cni9i6f6kbfl6f5gypb9ky94ib1w6d0nkd05j4lmrjadnxss49a"; + revision = "2"; + editedCabalFile = "1xil5pim6j1ckqj61zz6l7xpfxxr3rkw2hvpws2f7pr9shk645dl"; isLibrary = false; isExecutable = true; setupHaskellDepends = [ base Cabal filepath process ]; @@ -50609,8 +50660,8 @@ self: { }: mkDerivation { pname = "composite-aeson"; - version = "0.5.4.0"; - sha256 = "08rmv82v5ipkcb46pcadx1s8c1v532l8ma2qlgiflq6jnxf7y0zn"; + version = "0.5.5.0"; + sha256 = "1hmhnkfmdjm5q8lkvlyr7rzs1lfycnblz3q2y8aziy27j7pvnz6h"; libraryHaskellDepends = [ aeson aeson-better-errors base composite-base containers contravariant generic-deriving hashable lens mmorph mtl profunctors @@ -50634,8 +50685,8 @@ self: { }: mkDerivation { pname = "composite-aeson-refined"; - version = "0.5.4.0"; - sha256 = "1x5vkxzj0afar4w2djx9s7h3vy9aa5my9wfks8n4ajlv92fch1zm"; + version = "0.5.5.0"; + sha256 = "0mm0dbsxqw5m78jgdn6vnbck2icqkzgwqyc3c3ghyz46cymd7pjz"; libraryHaskellDepends = [ aeson-better-errors base composite-aeson mtl refined ]; @@ -50647,19 +50698,20 @@ self: { "composite-base" = callPackage ({ mkDerivation, base, exceptions, hspec, lens, monad-control, mtl , profunctors, QuickCheck, template-haskell, text, transformers - , transformers-base, vinyl + , transformers-base, unliftio-core, vinyl }: mkDerivation { pname = "composite-base"; - version = "0.5.4.0"; - sha256 = "0brycxdwf4051qvad4b4ak47dl27qn3izv1bcqlpva01jvb6h21j"; + version = "0.5.5.0"; + sha256 = "0qlg979cwkdlfpcwh7r0qr9fjs525b3xly0invr358h2g1lgi0fm"; libraryHaskellDepends = [ base exceptions lens monad-control mtl profunctors template-haskell - text transformers transformers-base vinyl + text transformers transformers-base unliftio-core vinyl ]; testHaskellDepends = [ base exceptions hspec lens monad-control mtl profunctors QuickCheck - template-haskell text transformers transformers-base vinyl + template-haskell text transformers transformers-base unliftio-core + vinyl ]; description = "Shared utilities for composite-* packages"; license = stdenv.lib.licenses.bsd3; @@ -50671,8 +50723,8 @@ self: { }: mkDerivation { pname = "composite-ekg"; - version = "0.5.4.0"; - sha256 = "051dw8ncpsk2k05ipvlnkwv2gy6719w69v1hhwrryy3dad0f4wc3"; + version = "0.5.5.0"; + sha256 = "0bawdcx21dd0szxnnxs2iinzz6h4w2phk7mfs26fxiqx3f375lm4"; libraryHaskellDepends = [ base composite-base ekg-core lens text vinyl ]; @@ -50688,8 +50740,8 @@ self: { }: mkDerivation { pname = "composite-opaleye"; - version = "0.5.4.0"; - sha256 = "1k71v4dz4vl70ignjp6hgw6j4c9hdgafd9x973dk7w332m2vjdpn"; + version = "0.5.5.0"; + sha256 = "0s54g9c1lm3jrdj44cvzxgbfaf7l2fdq2yy25vhqdmww50h8q1cx"; libraryHaskellDepends = [ base bytestring composite-base lens opaleye postgresql-simple product-profunctors profunctors template-haskell text vinyl @@ -50711,8 +50763,8 @@ self: { }: mkDerivation { pname = "composite-swagger"; - version = "0.5.4.0"; - sha256 = "0i2jfchl88mrk9kmf8yv7cbv006ghilqsnbic7ddsbkzrjy1vdw0"; + version = "0.5.5.0"; + sha256 = "1qisvrs93jnrrjyhzdn0xwq54jc1mc8avpzq41a39ak5xdslzf6a"; libraryHaskellDepends = [ base composite-base insert-ordered-containers lens swagger2 template-haskell text vinyl @@ -56714,23 +56766,26 @@ self: { }) {}; "cuckoo-filter" = callPackage - ({ mkDerivation, aeson, base, cereal, containers, criterion - , hashable, QuickCheck, random, tasty, tasty-hunit - , tasty-quickcheck + ({ mkDerivation, aeson, array, base, bytestring, cereal, containers + , criterion, hashable, QuickCheck, random, tasty, tasty-hunit + , tasty-quickcheck, time }: mkDerivation { pname = "cuckoo-filter"; - version = "0.1.0.2"; - sha256 = "16ql9qvf1qsbnk1wxy3d5iqyk0kyx9w27vq284gr34yqd18dpvk5"; + version = "0.2.0.1"; + sha256 = "01l1ilxdd83l60f5hmpajwszn77lfmk16aqygg1jz45zkrd3scnb"; isLibrary = true; isExecutable = true; - libraryHaskellDepends = [ aeson base cereal containers hashable ]; + libraryHaskellDepends = [ + aeson array base bytestring cereal containers hashable time + ]; executableHaskellDepends = [ - aeson base cereal containers criterion hashable random + aeson array base bytestring cereal containers criterion hashable + random time ]; testHaskellDepends = [ - aeson base cereal containers hashable QuickCheck tasty tasty-hunit - tasty-quickcheck + aeson array base bytestring cereal containers hashable QuickCheck + tasty tasty-hunit tasty-quickcheck time ]; description = "Pure and impure Cuckoo Filter"; license = stdenv.lib.licenses.mit; @@ -66526,15 +66581,15 @@ self: { hydraPlatforms = stdenv.lib.platforms.none; }) {}; - "dotenv_0_6_0_3" = callPackage + "dotenv_0_7_0_0" = callPackage ({ mkDerivation, base, base-compat, containers, directory , exceptions, hspec, hspec-megaparsec, megaparsec , optparse-applicative, process, text, transformers, yaml }: mkDerivation { pname = "dotenv"; - version = "0.6.0.3"; - sha256 = "0dckfs69k3hqfjrpxkk30liq52pjd2424r8gp6i8xb0zk1xlsqgk"; + version = "0.7.0.0"; + sha256 = "1rxr90jcn1swfr4sac331w44cm4c7ci87ll2d2w03hbdlysvdv8h"; isLibrary = true; isExecutable = true; enableSeparateDataOutput = true; @@ -68931,20 +68986,20 @@ self: { "egison" = callPackage ({ mkDerivation, array, base, containers, criterion, deepseq , directory, filepath, ghc, ghc-paths, Glob, hashable, haskeline - , HUnit, mtl, parallel, parsec, process, random, regex-tdfa, split - , test-framework, test-framework-hunit, text, transformers + , HUnit, lens, mtl, parallel, parsec, process, random, regex-tdfa + , split, test-framework, test-framework-hunit, text, transformers , unordered-containers, vector }: mkDerivation { pname = "egison"; - version = "3.7.12"; - sha256 = "0dmy9hxamjpp553ipkfjwh8j3bxqql99idxcxkdsj1x4ixgm2m2g"; + version = "3.7.13"; + sha256 = "1kxlg7znyv4iaygm6gk50zw4vcijfmc16vl5bwif179v3r8nrpxn"; isLibrary = true; isExecutable = true; enableSeparateDataOutput = true; libraryHaskellDepends = [ array base containers directory ghc ghc-paths hashable haskeline - mtl parallel parsec process random regex-tdfa split text + lens mtl parallel parsec process random regex-tdfa split text transformers unordered-containers vector ]; executableHaskellDepends = [ @@ -69410,8 +69465,8 @@ self: { pname = "ekg-wai"; version = "0.1.0.3"; sha256 = "1sd2fz4l4slizm179x9cskqdvrpf6w4d779kah9hrnk3nqbmklxz"; - revision = "1"; - editedCabalFile = "0crcpwrnh1pi5n4dlp9cwminj1gls9ywm4fgvisafh480097b100"; + revision = "2"; + editedCabalFile = "17kca2wzlcv8nxyq096fv57jfklhz4ibnvf5nqqdszczb03j3dnn"; enableSeparateDataOutput = true; libraryHaskellDepends = [ aeson base bytestring ekg-core ekg-json filepath http-types network @@ -73641,8 +73696,8 @@ self: { }: mkDerivation { pname = "extensible-effects"; - version = "3.1.0.1"; - sha256 = "1znqhcx5y4mpkbib18nma2c6bw4wxyxlxg3s8kafdalrx61rdhy3"; + version = "3.1.0.2"; + sha256 = "0g568pp3sxzzzcpbcrvx76msn58nn41g1r4wq8sfvvg1hb28xpf5"; libraryHaskellDepends = [ base monad-control transformers-base ]; testHaskellDepends = [ base doctest HUnit monad-control QuickCheck silently test-framework @@ -75129,6 +75184,31 @@ self: { license = stdenv.lib.licenses.bsd3; }) {}; + "feed_1_0_1_0" = callPackage + ({ mkDerivation, base, base-compat, bytestring, HUnit + , markdown-unlit, old-locale, old-time, safe, test-framework + , test-framework-hunit, text, time, time-locale-compat, utf8-string + , xml-conduit, xml-types + }: + mkDerivation { + pname = "feed"; + version = "1.0.1.0"; + sha256 = "076krkyvbh24s50chdw3nz6w2svwchys65ppjzlm8gy42ddhbgc7"; + enableSeparateDataOutput = true; + libraryHaskellDepends = [ + base base-compat bytestring old-locale old-time safe text time + time-locale-compat utf8-string xml-conduit xml-types + ]; + testHaskellDepends = [ + base base-compat HUnit old-time test-framework test-framework-hunit + text time xml-conduit xml-types + ]; + testToolDepends = [ markdown-unlit ]; + description = "Interfacing with RSS (v 0.9x, 2.x, 1.0) + Atom feeds."; + license = stdenv.lib.licenses.bsd3; + hydraPlatforms = stdenv.lib.platforms.none; + }) {}; + "feed-cli" = callPackage ({ mkDerivation, base, directory, feed, old-locale, old-time, time , xml @@ -79715,6 +79795,74 @@ self: { hydraPlatforms = stdenv.lib.platforms.none; }) {}; + "freer-simple-catching" = callPackage + ({ mkDerivation, base, freer-simple, hspec }: + mkDerivation { + pname = "freer-simple-catching"; + version = "0.1.0.0"; + sha256 = "140dmmcnpnvn3hhwjic6ja86qhw84k1547zfya7h1gm4sw36mq56"; + libraryHaskellDepends = [ base freer-simple ]; + testHaskellDepends = [ base freer-simple hspec ]; + description = "Checked runtime exceptions with freer-simple"; + license = stdenv.lib.licenses.mit; + }) {}; + + "freer-simple-http" = callPackage + ({ mkDerivation, aeson, base, bytestring, containers, freer-simple + , hspec, http-client, http-types + }: + mkDerivation { + pname = "freer-simple-http"; + version = "0.1.0.0"; + sha256 = "0wxqlwqgsphmzhpsbkdq9bl5vjmq598x1q20dd235bdxgggnxd57"; + libraryHaskellDepends = [ + aeson base bytestring containers freer-simple http-client + http-types + ]; + testHaskellDepends = [ + aeson base bytestring containers freer-simple hspec http-client + http-types + ]; + description = "Make HTTP requests with freer-simple!"; + license = stdenv.lib.licenses.mit; + }) {}; + + "freer-simple-profiling" = callPackage + ({ mkDerivation, base, containers, freer-simple, hspec, time }: + mkDerivation { + pname = "freer-simple-profiling"; + version = "0.1.0.0"; + sha256 = "1ll8r8z7khxlr2yix9c8m3bjdq3yncvrsg6pj03n68wsf26zgf17"; + libraryHaskellDepends = [ base containers freer-simple time ]; + testHaskellDepends = [ base containers freer-simple hspec time ]; + description = "Automatic profling of freer-simple programs"; + license = stdenv.lib.licenses.mit; + }) {}; + + "freer-simple-random" = callPackage + ({ mkDerivation, base, containers, freer-simple, hspec, random }: + mkDerivation { + pname = "freer-simple-random"; + version = "0.1.0.0"; + sha256 = "0bp0px1d7lsghaq7giaqm3xlhp0fkrf15dxpqzlglh0ysd2xg3x3"; + libraryHaskellDepends = [ base containers freer-simple random ]; + testHaskellDepends = [ base containers freer-simple hspec random ]; + description = "Random number generators using freer-simple"; + license = stdenv.lib.licenses.mit; + }) {}; + + "freer-simple-time" = callPackage + ({ mkDerivation, base, freer-simple, hspec, time }: + mkDerivation { + pname = "freer-simple-time"; + version = "0.1.0.0"; + sha256 = "08ph7nlj3f3iyvqljwn1hz4z8x0nzl19fsmb0rkk9sjbkk043ar8"; + libraryHaskellDepends = [ base freer-simple time ]; + testHaskellDepends = [ base freer-simple hspec time ]; + description = "freer-simple interface to IO based time functions"; + license = stdenv.lib.licenses.mit; + }) {}; + "freesect" = callPackage ({ mkDerivation, array, base, cpphs, directory, mtl, parallel , pretty, random, syb @@ -83548,6 +83696,26 @@ self: { license = stdenv.lib.licenses.bsd3; }) {}; + "getopt-generics_0_13_0_3" = callPackage + ({ mkDerivation, base, base-compat, base-orphans, filepath + , generics-sop, hspec, QuickCheck, safe, silently, tagged + }: + mkDerivation { + pname = "getopt-generics"; + version = "0.13.0.3"; + sha256 = "1202xsfvygd06h1d70v73ldwj32qv6sqadk5zl2979dgjx4841db"; + libraryHaskellDepends = [ + base base-compat base-orphans generics-sop tagged + ]; + testHaskellDepends = [ + base base-compat base-orphans filepath generics-sop hspec + QuickCheck safe silently tagged + ]; + description = "Create command line interfaces with ease"; + license = stdenv.lib.licenses.bsd3; + hydraPlatforms = stdenv.lib.platforms.none; + }) {}; + "getopt-simple" = callPackage ({ mkDerivation, base, containers }: mkDerivation { @@ -85546,18 +85714,44 @@ self: { license = stdenv.lib.licenses.lgpl21; }) {gtk3 = pkgs.gnome3.gtk;}; + "gi-gtk_3_0_26" = callPackage + ({ mkDerivation, base, bytestring, Cabal, containers, gi-atk + , gi-cairo, gi-gdk, gi-gdkpixbuf, gi-gio, gi-glib, gi-gobject + , gi-pango, gtk3, haskell-gi, haskell-gi-base + , haskell-gi-overloading, text, transformers + }: + mkDerivation { + pname = "gi-gtk"; + version = "3.0.26"; + sha256 = "1b0sfjcjxm0kzqyhrvl4wbxqa7zdpwv13xzrpb1k1k9rijjf1anf"; + setupHaskellDepends = [ base Cabal haskell-gi ]; + libraryHaskellDepends = [ + base bytestring containers gi-atk gi-cairo gi-gdk gi-gdkpixbuf + gi-gio gi-glib gi-gobject gi-pango haskell-gi haskell-gi-base + haskell-gi-overloading text transformers + ]; + libraryPkgconfigDepends = [ gtk3 ]; + doHaddock = false; + description = "Gtk bindings"; + license = stdenv.lib.licenses.lgpl21; + hydraPlatforms = stdenv.lib.platforms.none; + }) {gtk3 = pkgs.gnome3.gtk;}; + "gi-gtk-declarative" = callPackage - ({ mkDerivation, base, gi-gobject, gi-gtk, haskell-gi - , haskell-gi-base, haskell-gi-overloading, mtl, text - , unordered-containers + ({ mkDerivation, base, criterion, gi-gdk, gi-glib, gi-gobject + , gi-gtk, haskell-gi, haskell-gi-base, haskell-gi-overloading, mtl + , random, text, unordered-containers, vector }: mkDerivation { pname = "gi-gtk-declarative"; - version = "0.1.0"; - sha256 = "1yqvqbhlgbpq5s77fvqi8f644i059gg64xdkgwr4ka6zdz4fhiaf"; + version = "0.2.0"; + sha256 = "0spp225x4acrm96gr0i1jqlhmdq52xqin6h0mma2gvjh025dywyh"; libraryHaskellDepends = [ base gi-gobject gi-gtk haskell-gi haskell-gi-base - haskell-gi-overloading mtl text unordered-containers + haskell-gi-overloading mtl text unordered-containers vector + ]; + benchmarkHaskellDepends = [ + base criterion gi-gdk gi-glib gi-gtk random text ]; description = "Declarative GTK+ programming in Haskell"; license = stdenv.lib.licenses.mpl20; @@ -85570,14 +85764,14 @@ self: { }: mkDerivation { pname = "gi-gtk-declarative-app-simple"; - version = "0.1.0"; - sha256 = "157xhfixlf545qzk9v4sav6817fdznxk0kwiin59xn9d3ldp71ak"; + version = "0.2.0"; + sha256 = "19br3alfj0ggsbwp0640pdrjz1dm59g2wv8sb38jznsrni5fb8yx"; libraryHaskellDepends = [ async base gi-gdk gi-glib gi-gobject gi-gtk gi-gtk-declarative haskell-gi haskell-gi-base haskell-gi-overloading pipes pipes-concurrency text ]; - description = "Declarative GTK+ programming in Haskell in the style of [Pux](https://github.com/alexmingoia/purescript-pux)."; + description = "Declarative GTK+ programming in Haskell in the style of Pux"; license = stdenv.lib.licenses.mpl20; }) {}; @@ -87900,20 +88094,20 @@ self: { }) {}; "gloss-export" = callPackage - ({ mkDerivation, base, GLFW-b, gloss, gloss-rendering, GLUT - , JuicyPixels, OpenGLRaw, vector + ({ mkDerivation, base, directory, filepath, GLFW-b, gloss + , gloss-rendering, GLUT, JuicyPixels, OpenGLRaw, vector }: mkDerivation { pname = "gloss-export"; - version = "0.1.0.0"; - sha256 = "0m5k8zr90wqh6sjgn5c3mrpffwkq8g42qji8ss77l97a2hcv50dq"; + version = "0.1.0.1"; + sha256 = "0f81fncs7xirnwxkidbiikcxaj82svn2cgwdhgg588sk28rbd0vz"; isLibrary = true; isExecutable = true; libraryHaskellDepends = [ base GLFW-b gloss-rendering GLUT JuicyPixels OpenGLRaw vector ]; executableHaskellDepends = [ base gloss ]; - testHaskellDepends = [ base ]; + testHaskellDepends = [ base directory filepath gloss JuicyPixels ]; description = "Export Gloss pictures to png, bmp, tga, tiff, gif and juicy-pixels-image"; license = stdenv.lib.licenses.mit; }) {}; @@ -92248,6 +92442,22 @@ self: { license = stdenv.lib.licenses.bsd3; }) {}; + "gscholar-rss" = callPackage + ({ mkDerivation, base, feed, http-conduit, scalpel-core, text, uri + }: + mkDerivation { + pname = "gscholar-rss"; + version = "0.1.0.0"; + sha256 = "17ki6wvrjvxl77zjpkxjq8yr4ljdrwlszrzwdv3arlq2c0mgl7yy"; + isLibrary = false; + isExecutable = true; + executableHaskellDepends = [ + base feed http-conduit scalpel-core text uri + ]; + description = "scrapes google scholar, provides RSS feed"; + license = stdenv.lib.licenses.gpl3; + }) {}; + "gsl-random" = callPackage ({ mkDerivation, base, Cabal, vector }: mkDerivation { @@ -100671,8 +100881,8 @@ self: { }: mkDerivation { pname = "haskoin-store"; - version = "0.6.1"; - sha256 = "0jgsf4f3qyq60dbyyni0d1cdphabf8ix4l0y1iiql5ii2fy50dw2"; + version = "0.6.2"; + sha256 = "0csb7rhcpc82xq5631i62rsr4s672b0jz8d2fmcga2j3a9di34xb"; isLibrary = true; isExecutable = true; libraryHaskellDepends = [ @@ -101249,8 +101459,8 @@ self: { }: mkDerivation { pname = "haskus-utils"; - version = "1.1"; - sha256 = "1grbj23545b7wxxyc4rra681k9c8xg36swlql3rgcr15m61fm647"; + version = "1.3"; + sha256 = "0gcwnhh3s3cmn7rwd31rs9rqmdpdhwk1la1pf56pcr10dy5iqbs4"; libraryHaskellDepends = [ base containers extra file-embed haskus-utils-data haskus-utils-types haskus-utils-variant list-t mtl @@ -101285,10 +101495,8 @@ self: { ({ mkDerivation, base }: mkDerivation { pname = "haskus-utils-types"; - version = "1.2"; - sha256 = "0q7i2z1l55x9pgf9bd5xng0bdx4v74356gayhdxws1gfmghgf7f0"; - revision = "1"; - editedCabalFile = "07r524gxdr3alwyns96rv2rmha96s89l2216hzrbvw6c6pqg401a"; + version = "1.3"; + sha256 = "06zfc5ivj7zx1c6inc3xkw9b3p62b2x7dr24fp1s59c9yfrihg1a"; libraryHaskellDepends = [ base ]; description = "Haskus utility modules"; license = stdenv.lib.licenses.bsd3; @@ -101296,14 +101504,15 @@ self: { "haskus-utils-variant" = callPackage ({ mkDerivation, base, haskus-utils-data, haskus-utils-types, tasty - , tasty-quickcheck, template-haskell + , tasty-quickcheck, template-haskell, transformers }: mkDerivation { pname = "haskus-utils-variant"; - version = "2.2"; - sha256 = "1h3rpk04dkqppfbw7pilc4sw0pkdxxr70zggsfn63ay4zqk6s5r7"; + version = "2.4"; + sha256 = "13yqyz1jb4qkdzjxwkpc9s2636disxldja49wmah7h71kd2sqn9r"; libraryHaskellDepends = [ base haskus-utils-data haskus-utils-types template-haskell + transformers ]; testHaskellDepends = [ base tasty tasty-quickcheck ]; description = "Variant and EADT"; @@ -108518,8 +108727,8 @@ self: { }: mkDerivation { pname = "hoauth2"; - version = "1.8.1"; - sha256 = "1b2rjqd8q0ybx26pmmsb1am9v6pnbp0xb3fzqvivxppdr5z6kl29"; + version = "1.8.2"; + sha256 = "0bh6ngq9850bxl2m1qpvnanif5nz09k697rw3sk6djqkcw3lv305"; isLibrary = true; isExecutable = true; libraryHaskellDepends = [ @@ -112436,6 +112645,87 @@ self: { license = stdenv.lib.licenses.bsd3; }) {}; + "hschema" = callPackage + ({ mkDerivation, base, comonad, contravariant, free, hashable + , invariant, lens, mtl, natural-transformation, profunctors, text + , unordered-containers, vector + }: + mkDerivation { + pname = "hschema"; + version = "0.0.1.0"; + sha256 = "0dm16r432rpk9r1a7nlwwbqi2sy9yg2z9w76s7wy1k67pmx19fmz"; + libraryHaskellDepends = [ + base comonad contravariant free hashable invariant lens mtl + natural-transformation profunctors text unordered-containers vector + ]; + description = "Describe schemas for your Haskell data types"; + license = stdenv.lib.licenses.lgpl3; + }) {}; + + "hschema-aeson" = callPackage + ({ mkDerivation, aeson, base, bytestring, comonad, contravariant + , convertible, directory, free, hschema, hschema-prettyprinter + , hschema-quickcheck, hspec, lens, mtl, natural-transformation + , prettyprinter, prettyprinter-ansi-terminal, QuickCheck + , quickcheck-instances, scientific, text, time + , unordered-containers, vector + }: + mkDerivation { + pname = "hschema-aeson"; + version = "0.0.1.0"; + sha256 = "1kq50rqmlhbh2ssly32gv5r6d6z4ly63hkl4lhvq0a153i7w387z"; + libraryHaskellDepends = [ + aeson base comonad contravariant free hschema hschema-prettyprinter + hschema-quickcheck lens mtl natural-transformation prettyprinter + prettyprinter-ansi-terminal QuickCheck quickcheck-instances + scientific text time unordered-containers vector + ]; + testHaskellDepends = [ + aeson base bytestring comonad contravariant convertible directory + free hschema hschema-prettyprinter hschema-quickcheck hspec lens + mtl natural-transformation prettyprinter + prettyprinter-ansi-terminal QuickCheck quickcheck-instances + scientific text time unordered-containers vector + ]; + description = "Describe schemas for your Haskell data types"; + license = stdenv.lib.licenses.lgpl3; + }) {}; + + "hschema-prettyprinter" = callPackage + ({ mkDerivation, base, contravariant, free, hschema, lens, mtl + , natural-transformation, prettyprinter + , prettyprinter-ansi-terminal, text, unordered-containers, vector + }: + mkDerivation { + pname = "hschema-prettyprinter"; + version = "0.0.1.0"; + sha256 = "064czqn3h5ql4bknagj2qp1m3pr1fcngpjmmy34dhxp0pg5xgvsw"; + libraryHaskellDepends = [ + base contravariant free hschema lens mtl natural-transformation + prettyprinter prettyprinter-ansi-terminal text unordered-containers + vector + ]; + description = "Describe schemas for your Haskell data types"; + license = stdenv.lib.licenses.lgpl3; + }) {}; + + "hschema-quickcheck" = callPackage + ({ mkDerivation, base, free, hschema, lens, mtl + , natural-transformation, QuickCheck, quickcheck-instances, text + , unordered-containers, vector + }: + mkDerivation { + pname = "hschema-quickcheck"; + version = "0.0.1.0"; + sha256 = "13hkpcj1cc4qykm8xhkzix29gbil8vz10b3ndivbxq5nk53r11s6"; + libraryHaskellDepends = [ + base free hschema lens mtl natural-transformation QuickCheck + quickcheck-instances text unordered-containers vector + ]; + description = "Describe schemas for your Haskell data types"; + license = stdenv.lib.licenses.lgpl3; + }) {}; + "hsclock" = callPackage ({ mkDerivation, base, cairo, glib, gtk, old-time }: mkDerivation { @@ -121161,6 +121451,18 @@ self: { hydraPlatforms = stdenv.lib.platforms.none; }) {}; + "impl" = callPackage + ({ mkDerivation, base, named, template-haskell }: + mkDerivation { + pname = "impl"; + version = "0.1.0.0"; + sha256 = "00l50mrl7g3jzixlj3z2kar61vzb152lnn485b7zdsz4vgqxs1sx"; + libraryHaskellDepends = [ base named template-haskell ]; + doHaddock = false; + description = "Framework for defaulting superclasses"; + license = stdenv.lib.licenses.mit; + }) {}; + "implicit" = callPackage ({ mkDerivation, base, blaze-builder, blaze-markup, blaze-svg , bytestring, bytestring-builder, containers, criterion, deepseq @@ -140745,6 +141047,28 @@ self: { license = stdenv.lib.licenses.bsd3; }) {}; + "massiv_0_2_3_0" = callPackage + ({ mkDerivation, base, bytestring, data-default, data-default-class + , deepseq, ghc-prim, hspec, primitive, QuickCheck, safe-exceptions + , vector + }: + mkDerivation { + pname = "massiv"; + version = "0.2.3.0"; + sha256 = "1wrfzlika7w82nxmmj192cbrhm769yhmichk1lpylldzvv9j0wl5"; + libraryHaskellDepends = [ + base bytestring data-default-class deepseq ghc-prim primitive + vector + ]; + testHaskellDepends = [ + base bytestring data-default deepseq hspec QuickCheck + safe-exceptions vector + ]; + description = "Massiv (Массив) is an Array Library"; + license = stdenv.lib.licenses.bsd3; + hydraPlatforms = stdenv.lib.platforms.none; + }) {}; + "massiv-io" = callPackage ({ mkDerivation, base, bytestring, data-default, deepseq, directory , filepath, JuicyPixels, massiv, netpbm, process, vector @@ -143270,12 +143594,12 @@ self: { license = stdenv.lib.licenses.bsd3; }) {}; - "microspec_0_2_0_1" = callPackage + "microspec_0_2_1_3" = callPackage ({ mkDerivation, base, QuickCheck, time }: mkDerivation { pname = "microspec"; - version = "0.2.0.1"; - sha256 = "1ygkxsj7rm42f245qip8893lm189immmd5ajimp5d1pkzfkw4dnp"; + version = "0.2.1.3"; + sha256 = "0615gdbsk7i3w71adjp69zabw4mli965wffm2h846hp6pjj31xcb"; libraryHaskellDepends = [ base QuickCheck time ]; description = "Tiny QuickCheck test library with minimal dependencies"; license = stdenv.lib.licenses.bsd3; @@ -143351,8 +143675,8 @@ self: { ({ mkDerivation, base, containers, safe, stm }: mkDerivation { pname = "midair"; - version = "0.2.0.0"; - sha256 = "1fdii0pj3f1bskj9bnphhy9gbp58cqjk0q3cmfj3ynkqz20j49ij"; + version = "0.2.0.1"; + sha256 = "1dkja5arps41wanhv1jnkf99xrc8f5aiimp27myd595lqqdr87s2"; libraryHaskellDepends = [ base containers safe stm ]; description = "Hot-swappable FRP"; license = stdenv.lib.licenses.gpl3; @@ -144450,20 +144774,22 @@ self: { hydraPlatforms = stdenv.lib.platforms.none; }) {}; - "mmark-cli_0_0_4_0" = callPackage - ({ mkDerivation, aeson, base, bytestring, directory, gitrev, lucid - , megaparsec, mmark, mmark-ext, optparse-applicative, stache, text + "mmark-cli_0_0_5_0" = callPackage + ({ mkDerivation, aeson, base, bytestring, directory + , ghc-syntax-highlighter, gitrev, lucid, megaparsec, mmark + , mmark-ext, optparse-applicative, stache, text , unordered-containers }: mkDerivation { pname = "mmark-cli"; - version = "0.0.4.0"; - sha256 = "0vw1pq3iz4bbz5fgbzi8lvpscc58izh6y210jfi12h2jyzajyf5k"; + version = "0.0.5.0"; + sha256 = "15qrp2q1flx9csqvj8zx9w1jqg8pwfi0v7wpia7n7vg09jgydhby"; isLibrary = false; isExecutable = true; executableHaskellDepends = [ - aeson base bytestring directory gitrev lucid megaparsec mmark - mmark-ext optparse-applicative stache text unordered-containers + aeson base bytestring directory ghc-syntax-highlighter gitrev lucid + megaparsec mmark mmark-ext optparse-applicative stache text + unordered-containers ]; description = "Command line interface to the MMark markdown processor"; license = stdenv.lib.licenses.bsd3; @@ -144493,6 +144819,27 @@ self: { hydraPlatforms = stdenv.lib.platforms.none; }) {}; + "mmark-ext_0_2_1_1" = callPackage + ({ mkDerivation, base, foldl, ghc-syntax-highlighter, hspec + , hspec-discover, lucid, microlens, mmark, modern-uri, skylighting + , text + }: + mkDerivation { + pname = "mmark-ext"; + version = "0.2.1.1"; + sha256 = "01av7d9n75mg9yzkxszrvbxjbsv4n0gsdmg3n2620zn40j5lwmcq"; + enableSeparateDataOutput = true; + libraryHaskellDepends = [ + base foldl ghc-syntax-highlighter lucid microlens mmark modern-uri + skylighting text + ]; + testHaskellDepends = [ base hspec lucid mmark skylighting text ]; + testToolDepends = [ hspec-discover ]; + description = "Commonly useful extensions for the MMark markdown processor"; + license = stdenv.lib.licenses.bsd3; + hydraPlatforms = stdenv.lib.platforms.none; + }) {}; + "mmorph" = callPackage ({ mkDerivation, base, mtl, transformers, transformers-compat }: mkDerivation { @@ -148402,8 +148749,8 @@ self: { ({ mkDerivation, base, template-haskell }: mkDerivation { pname = "multirec"; - version = "0.7.8"; - sha256 = "0n5rsjrg8b98aim1wsv1s2i17299h8g4k2gb7mgn1swzldrigjhz"; + version = "0.7.9"; + sha256 = "0a6kc3kkg7hz5wigp28fhp01pryb8gaw03fjc35mm4i2jfcjrplz"; libraryHaskellDepends = [ base template-haskell ]; testHaskellDepends = [ base ]; description = "Generic programming for families of recursive datatypes"; @@ -149959,6 +150306,8 @@ self: { pname = "named"; version = "0.2.0.0"; sha256 = "17ldvxypf099wj5phzh2aymzfwmyiyzhz24h1aj2s21nrys5n6n0"; + revision = "1"; + editedCabalFile = "0rnzxqlpxsfyvmc2i53iqspw03w2liflpy0zrc84pn6kw4v822j3"; libraryHaskellDepends = [ base ]; testHaskellDepends = [ base ]; description = "Named parameters (keyword arguments) for Haskell"; @@ -152371,8 +152720,8 @@ self: { ({ mkDerivation, base, doctest, network-uri, template-haskell }: mkDerivation { pname = "network-uri-static"; - version = "0.1.1.0"; - sha256 = "1fjw3a9ypmqf7kl8s9mgwa9jlswz98igp830f1hsyc1hdh9xlrqw"; + version = "0.1.2.0"; + sha256 = "1r1blpz313v6qacvbns53c2i1zgvadvl0ibmp2s3bv1ymm4caj74"; libraryHaskellDepends = [ base network-uri template-haskell ]; testHaskellDepends = [ base doctest ]; description = "A small utility to declare type-safe static URIs"; @@ -152748,8 +153097,8 @@ self: { }: mkDerivation { pname = "ngx-export"; - version = "1.5.0"; - sha256 = "1lw1hf2xy86n6c8426zdvk1qbm43gsk5zxjrbfqcy28qlnvwcdpa"; + version = "1.6.0"; + sha256 = "0svl195w8prf45g0pda1j6hngxpb18vdpc15cybxrzp2x689dxll"; libraryHaskellDepends = [ async base binary bytestring deepseq monad-loops template-haskell unix @@ -152764,8 +153113,8 @@ self: { }: mkDerivation { pname = "ngx-export-tools"; - version = "0.2.1.1"; - sha256 = "0z406bmfk9b1b6knpxwzkwh8n2cpfwgxdh52vghpgjf69c0yrjq1"; + version = "0.3.0.0"; + sha256 = "0dnkw5vvvdkcqqga9i4pvclvr3bh6wywdg0r60l8vwdcpi820dkl"; libraryHaskellDepends = [ aeson base binary bytestring ngx-export safe template-haskell ]; @@ -153383,6 +153732,17 @@ self: { hydraPlatforms = stdenv.lib.platforms.none; }) {}; + "nominal" = callPackage + ({ mkDerivation, base, containers }: + mkDerivation { + pname = "nominal"; + version = "0.2.0.0"; + sha256 = "1wd2vd0qn8ln3a5r29gikdcr4c2c2rf43p6kq3wmqm8ww30djgca"; + libraryHaskellDepends = [ base containers ]; + description = "Binders and alpha-equivalence made easy"; + license = stdenv.lib.licenses.gpl3; + }) {}; + "nomyx-api" = callPackage ({ mkDerivation, aeson, base, bytestring, containers, either , hslogger, lens, mtl, network-uri, nomyx-core, nomyx-language @@ -153634,8 +153994,8 @@ self: { ({ mkDerivation, base, containers, semigroupoids }: mkDerivation { pname = "nonemptymap"; - version = "0.0.4.0"; - sha256 = "0rkdhbg0bps8ws20xspw98fkmbcgzfir9kk5pxwir8x6pwwbfd8h"; + version = "0.0.6.0"; + sha256 = "1pzs51kmsyarv62qqbskhw2xlkjp74bwcgs9a8ri1jk96m64rg94"; libraryHaskellDepends = [ base containers semigroupoids ]; description = "A NonEmptyMap Implementation"; license = stdenv.lib.licenses.bsd3; @@ -155622,6 +155982,22 @@ self: { license = stdenv.lib.licenses.gpl3; }) {}; + "once_0_3" = callPackage + ({ mkDerivation, base, containers, hashable, template-haskell + , unordered-containers + }: + mkDerivation { + pname = "once"; + version = "0.3"; + sha256 = "1i5yf5d6c33arbrvvyk2bcp9cz8aj62zhd6sgxqz684baidn5rbc"; + libraryHaskellDepends = [ + base containers hashable template-haskell unordered-containers + ]; + description = "memoization for IO actions and functions"; + license = stdenv.lib.licenses.gpl3; + hydraPlatforms = stdenv.lib.platforms.none; + }) {}; + "one-line-aeson-text" = callPackage ({ mkDerivation, aeson, base, doctest, text, unordered-containers }: @@ -158293,6 +158669,41 @@ self: { license = stdenv.lib.licenses.bsd3; }) {}; + "pandoc-citeproc_0_14_8_1" = callPackage + ({ mkDerivation, aeson, aeson-pretty, attoparsec, base, bytestring + , Cabal, containers, data-default, directory, filepath, hs-bibutils + , mtl, old-locale, pandoc, pandoc-types, parsec, process, rfc5051 + , setenv, split, syb, tagsoup, temporary, text, time + , unordered-containers, vector, xml-conduit, yaml + }: + mkDerivation { + pname = "pandoc-citeproc"; + version = "0.14.8.1"; + sha256 = "04cdx0b9k3xk2ss97vws21pydxcwxffsgh7xrqrnwwc3v7jn80fz"; + isLibrary = true; + isExecutable = true; + enableSeparateDataOutput = true; + setupHaskellDepends = [ base Cabal ]; + libraryHaskellDepends = [ + aeson base bytestring containers data-default directory filepath + hs-bibutils mtl old-locale pandoc pandoc-types parsec rfc5051 + setenv split syb tagsoup text time unordered-containers vector + xml-conduit yaml + ]; + executableHaskellDepends = [ + aeson aeson-pretty attoparsec base bytestring filepath pandoc + pandoc-types syb text yaml + ]; + testHaskellDepends = [ + aeson base bytestring containers directory filepath mtl pandoc + pandoc-types process temporary text yaml + ]; + doCheck = false; + description = "Supports using pandoc with citeproc"; + license = stdenv.lib.licenses.bsd3; + hydraPlatforms = stdenv.lib.platforms.none; + }) {}; + "pandoc-citeproc-preamble" = callPackage ({ mkDerivation, base, directory, filepath, pandoc-types, process }: @@ -163595,8 +164006,8 @@ self: { }: mkDerivation { pname = "pinch"; - version = "0.3.3.0"; - sha256 = "0bhds7k9bsma1bvihvz6qf832gi2krak3yd8lnddcv87hnjsr4hq"; + version = "0.3.4.0"; + sha256 = "10rmk6f9cb2l7dyybwpbin0i5dqdg59d17m627kj9abyrlhcyf8a"; libraryHaskellDepends = [ array base bytestring containers deepseq ghc-prim hashable semigroups text unordered-containers vector @@ -165512,6 +165923,23 @@ self: { license = stdenv.lib.licenses.mit; }) {}; + "plotlyhs_0_2_1" = callPackage + ({ mkDerivation, aeson, base, blaze-html, blaze-markup, bytestring + , lucid, microlens, microlens-th, text, time + }: + mkDerivation { + pname = "plotlyhs"; + version = "0.2.1"; + sha256 = "1d7cqy22myp6r0x0b00amn64fra0lklb9jy2hd8ic9lxg0nd8pn9"; + libraryHaskellDepends = [ + aeson base blaze-html blaze-markup bytestring lucid microlens + microlens-th text time + ]; + description = "Haskell bindings to Plotly.js"; + license = stdenv.lib.licenses.mit; + hydraPlatforms = stdenv.lib.platforms.none; + }) {}; + "ploton" = callPackage ({ mkDerivation, base, hspec, optparse-applicative, process, split , transformers @@ -166967,18 +167395,18 @@ self: { }) {}; "postgres-websockets" = callPackage - ({ mkDerivation, aeson, ansi-wl-pprint, base, base64-bytestring - , bytestring, configurator, containers, contravariant, either - , hasql, hasql-pool, heredoc, hspec, hspec-wai, hspec-wai-json - , http-types, jose, jwt, lens, lens-aeson, optparse-applicative - , postgresql-libpq, protolude, retry, stm, stm-containers - , stringsearch, text, time, transformers, unordered-containers, wai - , wai-app-static, wai-extra, wai-websockets, warp, websockets + ({ mkDerivation, aeson, base, base64-bytestring, bytestring + , containers, contravariant, either, envparse, hasql, hasql-pool + , hspec, hspec-wai, hspec-wai-json, http-types, jose, jwt, lens + , lens-aeson, postgresql-libpq, protolude, retry, stm + , stm-containers, stringsearch, text, time, transformers + , unordered-containers, wai, wai-app-static, wai-extra + , wai-websockets, warp, websockets }: mkDerivation { pname = "postgres-websockets"; - version = "0.4.2.1"; - sha256 = "0jh4ms9lz456as24v9d4vqj2b52i9gw7svk5lzvb65nhfdpb4kfp"; + version = "0.5.0.1"; + sha256 = "0afhrzhixy0f31050jb04w8np6935wcl3j7ckbk0dm23mqz2z3zy"; isLibrary = true; isExecutable = true; libraryHaskellDepends = [ @@ -166988,9 +167416,8 @@ self: { unordered-containers wai wai-websockets websockets ]; executableHaskellDepends = [ - ansi-wl-pprint base base64-bytestring bytestring configurator hasql - hasql-pool heredoc optparse-applicative protolude text time - transformers wai wai-app-static wai-extra warp + base base64-bytestring bytestring envparse hasql hasql-pool + protolude text time transformers wai wai-app-static wai-extra warp ]; testHaskellDepends = [ aeson base containers hasql hasql-pool hspec hspec-wai @@ -170574,6 +171001,19 @@ self: { license = stdenv.lib.licenses.bsd3; }) {inherit (pkgs) libpulseaudio;}; + "proteome" = callPackage + ({ mkDerivation, base, nvim-hs }: + mkDerivation { + pname = "proteome"; + version = "0.1.0.0"; + sha256 = "13c4hrgc1vxvwmzw49djvp22y80z2cndqbqcd4fy4rm6hd6zbs81"; + isLibrary = false; + isExecutable = true; + executableHaskellDepends = [ base nvim-hs ]; + description = "neovim project manager"; + license = stdenv.lib.licenses.mit; + }) {}; + "proto-lens_0_2_2_0" = callPackage ({ mkDerivation, attoparsec, base, bytestring, containers , data-default-class, lens-family, parsec, pretty, text @@ -188842,6 +189282,8 @@ self: { pname = "servant-streaming"; version = "0.3.0.0"; sha256 = "0k2sgh7qhp54050k6xlz4zi5jf29xnar2iv02f4rg1k5fxjlh3cq"; + revision = "1"; + editedCabalFile = "1a9lg7cxbkj658hc76r5yk104q0hm3q9mkjzk17dwkwlnvdfq6m2"; libraryHaskellDepends = [ base http-types servant ]; testHaskellDepends = [ base hspec http-types QuickCheck servant ]; description = "Servant combinators for the 'streaming' package"; @@ -188858,6 +189300,8 @@ self: { pname = "servant-streaming-client"; version = "0.3.0.0"; sha256 = "1h3haws61m064zziyzn03n0450swffmr46gsv9k88lrpz8lv5qj2"; + revision = "1"; + editedCabalFile = "07xkgnhi8aspnqms5gx67ssw5m595gda8yqypdg2q59wwc6ib68d"; libraryHaskellDepends = [ base bytestring http-media http-types resourcet servant servant-client-core servant-streaming streaming @@ -188880,6 +189324,8 @@ self: { pname = "servant-streaming-docs"; version = "0.3.0.0"; sha256 = "0jy0na8cavym2vsy1a059n0yjzfb5a0xylyzxpz0i5apafv1xvlz"; + revision = "1"; + editedCabalFile = "02majkszg6d340mq07b9xyfd200xqpq9znl2j9dxqj7d9bqkrdrz"; libraryHaskellDepends = [ base lens servant servant-docs servant-streaming ]; @@ -188897,6 +189343,8 @@ self: { pname = "servant-streaming-server"; version = "0.3.0.0"; sha256 = "0lsh3x6hkbk7p095pkp7ld0m54xlkw0101x6nrxhjvhmw13aiq66"; + revision = "1"; + editedCabalFile = "1xfx22a83xwq2bzv7gm3z9drd5hiq6wz7yyvfpjz1c2dcicwflvm"; libraryHaskellDepends = [ base bytestring http-media http-types resourcet servant servant-server servant-streaming streaming streaming-wai wai @@ -190747,8 +191195,8 @@ self: { ({ mkDerivation, base, bytestring, unix }: mkDerivation { pname = "shared-memory"; - version = "0.1.0.0"; - sha256 = "15h4j81q2v97dx61pnpaqs99z4vvlw7xl1dxbh878imxj8zn4z84"; + version = "0.2.0.0"; + sha256 = "1g1s08zjpj9xaaff3qg29k6fhnpiig9fqv9i7879yhllh50kjrr6"; libraryHaskellDepends = [ base unix ]; testHaskellDepends = [ base bytestring unix ]; description = "POSIX shared memory"; @@ -200022,6 +200470,8 @@ self: { pname = "stemmer-german"; version = "0.1.1.1"; sha256 = "037dw03zb4xdfbzp8js04ymrxii7rsin7pwiansa9khb29w2jqsn"; + revision = "1"; + editedCabalFile = "0pvghdxgd56yjm33lrzk6343lklnfdw77g30vhbfddwwdx1ifx2v"; libraryHaskellDepends = [ base text ]; description = "Extract the stem of a German inflected word form"; license = stdenv.lib.licenses.mit; @@ -202350,8 +202800,8 @@ self: { }: mkDerivation { pname = "structured-cli"; - version = "2.2.1.0"; - sha256 = "1b75wnmprbb4sfnwyn5arc205ad5rlyz4hv63ai35i9iryax875s"; + version = "2.3.0.0"; + sha256 = "1qpyh9cjdxd6v5xdzp44qlpn0mskqc9qzs78rbyr1q1ylmlja6a7"; isLibrary = true; isExecutable = true; libraryHaskellDepends = [ @@ -203276,6 +203726,20 @@ self: { hydraPlatforms = stdenv.lib.platforms.none; }) {}; + "supervisors" = callPackage + ({ mkDerivation, async, base, containers, hspec, stm, unliftio }: + mkDerivation { + pname = "supervisors"; + version = "0.1.0.0"; + sha256 = "1sxralp0hcz2zn5byn67xq612nzmpm890gnjs827sidvr7r7h31j"; + revision = "1"; + editedCabalFile = "186a5vawnknixf4psp06cjbyby5qp4i0c8bpvisqi3pq3kag7x76"; + libraryHaskellDepends = [ async base containers stm unliftio ]; + testHaskellDepends = [ base hspec ]; + description = "Monitor groups of threads with non-hierarchical lifetimes"; + license = stdenv.lib.licenses.mit; + }) {}; + "supplemented" = callPackage ({ mkDerivation, base, base-prelude, QuickCheck , quickcheck-instances, rebase, tasty, tasty-hunit @@ -213041,30 +213505,32 @@ self: { license = stdenv.lib.licenses.mpl20; }) {}; - "tomland_0_4_0" = callPackage - ({ mkDerivation, base, hashable, hedgehog, hspec-megaparsec - , megaparsec, mtl, parser-combinators, tasty, tasty-discover - , tasty-hedgehog, tasty-hspec, text, time, transformers - , unordered-containers + "tomland_0_5_0" = callPackage + ({ mkDerivation, aeson, base, bytestring, containers, deepseq + , gauge, hashable, hedgehog, hspec-megaparsec, htoml + , htoml-megaparsec, megaparsec, mtl, parsec, parser-combinators + , tasty, tasty-discover, tasty-hedgehog, tasty-hspec, tasty-silver + , text, time, transformers, unordered-containers }: mkDerivation { pname = "tomland"; - version = "0.4.0"; - sha256 = "1rkdlq6js5ia807wh9hga6y9r92bxj8j5g7nynba1ilc3x70znfr"; - revision = "1"; - editedCabalFile = "1d02r17m15s5z4xqyy05s515lbsqxc3kcipk25xvn24inz42qg4r"; + version = "0.5.0"; + sha256 = "001gw3yj0ibg3dm4q5wz8akjpcdx6zj3jza1y6gq7m5h13fzrvgf"; isLibrary = true; isExecutable = true; libraryHaskellDepends = [ - base hashable megaparsec mtl parser-combinators text time - transformers unordered-containers + base bytestring containers deepseq hashable megaparsec mtl + parser-combinators text time transformers unordered-containers ]; executableHaskellDepends = [ base text time unordered-containers ]; testHaskellDepends = [ base hedgehog hspec-megaparsec megaparsec tasty tasty-hedgehog - tasty-hspec text time unordered-containers + tasty-hspec tasty-silver text time unordered-containers ]; testToolDepends = [ tasty-discover ]; + benchmarkHaskellDepends = [ + aeson base deepseq gauge htoml htoml-megaparsec parsec text time + ]; description = "Bidirectional TOML parser"; license = stdenv.lib.licenses.mpl20; hydraPlatforms = stdenv.lib.platforms.none; @@ -213959,8 +214425,8 @@ self: { pname = "transformers-lift"; version = "0.2.0.1"; sha256 = "17g03r5hpnygx0c9ybr9za6208ay0cjvz47rkyplv1r9zcivzn0b"; - revision = "1"; - editedCabalFile = "1dy9vg0drkm9ria80hlfx6v72ji2fwmv3ik7lryv7i7hk0bdzk8l"; + revision = "2"; + editedCabalFile = "16gpca2wfa7w2b5kzfvqsjjyd61pkv0wyi2mk5b34367p4chnsc5"; libraryHaskellDepends = [ base transformers writer-cps-transformers ]; @@ -214648,6 +215114,26 @@ self: { hydraPlatforms = stdenv.lib.platforms.none; }) {}; + "triplesec_0_2_2_0" = callPackage + ({ mkDerivation, base, bytestring, cryptonite, doctest, memory, mtl + , QuickCheck, tasty, tasty-hunit, tasty-quickcheck, transformers + }: + mkDerivation { + pname = "triplesec"; + version = "0.2.2.0"; + sha256 = "1gxks45hjr3a1lnr2v75cl0iwsmlzaq3yzd3p9s0pn5227f34zh7"; + libraryHaskellDepends = [ + base cryptonite memory mtl transformers + ]; + testHaskellDepends = [ + base bytestring doctest memory QuickCheck tasty tasty-hunit + tasty-quickcheck + ]; + description = "TripleSec is a simple, triple-paranoid, symmetric encryption library"; + license = stdenv.lib.licenses.bsd3; + hydraPlatforms = stdenv.lib.platforms.none; + }) {}; + "trivia" = callPackage ({ mkDerivation, base, comonad, distributive }: mkDerivation { @@ -216458,8 +216944,8 @@ self: { }: mkDerivation { pname = "type-map"; - version = "0.1.2.0"; - sha256 = "0cm2b4xkassjh71ndc5nddpmqyr5bcf3fqxs74wzd11dycmfqfaa"; + version = "0.1.3.0"; + sha256 = "146kc36z6fljcgmgl9vii1pmf3hs80v2vz21r84p823znrqjs8gc"; libraryHaskellDepends = [ base containers ghc-prim vector ]; testHaskellDepends = [ base HUnit test-framework test-framework-hunit @@ -222796,6 +223282,26 @@ self: { license = "GPL"; }) {}; + "vivid_0_4_2_3" = callPackage + ({ mkDerivation, base, binary, bytestring, containers, directory + , filepath, hashable, MonadRandom, mtl, network, process, random + , random-shuffle, split, stm, time, transformers, utf8-string + , vivid-osc, vivid-supercollider + }: + mkDerivation { + pname = "vivid"; + version = "0.4.2.3"; + sha256 = "0awm9cnjgfqx1qf6jsnwmf0kxqxwny82q1ddqna8ilqcdrbsxh0i"; + libraryHaskellDepends = [ + base binary bytestring containers directory filepath hashable + MonadRandom mtl network process random random-shuffle split stm + time transformers utf8-string vivid-osc vivid-supercollider + ]; + description = "Sound synthesis with SuperCollider"; + license = "GPL"; + hydraPlatforms = stdenv.lib.platforms.none; + }) {}; + "vivid-osc" = callPackage ({ mkDerivation, base, binary, bytestring, cereal, microspec, time }: @@ -222809,14 +223315,13 @@ self: { license = "GPL"; }) {}; - "vivid-osc_0_4_0_0" = callPackage - ({ mkDerivation, base, binary, bytestring, cereal, microspec, time - }: + "vivid-osc_0_5_0_0" = callPackage + ({ mkDerivation, base, bytestring, cereal, microspec, time }: mkDerivation { pname = "vivid-osc"; - version = "0.4.0.0"; - sha256 = "10wbl11xwkahjsnvy14ysvkbylh615x7i8v4hwrji81rfy2bs29n"; - libraryHaskellDepends = [ base binary bytestring cereal time ]; + version = "0.5.0.0"; + sha256 = "041m4k1aqkw35fp7l03i3ba1jyppr8lia2v2zyq7v8yzby8ngys6"; + libraryHaskellDepends = [ base bytestring cereal time ]; testHaskellDepends = [ base bytestring cereal microspec time ]; description = "Open Sound Control encode/decode"; license = "GPL"; @@ -222842,6 +223347,26 @@ self: { license = "GPL"; }) {}; + "vivid-supercollider_0_4_1_1" = callPackage + ({ mkDerivation, base, binary, bytestring, cereal, microspec + , QuickCheck, split, utf8-string, vivid-osc + }: + mkDerivation { + pname = "vivid-supercollider"; + version = "0.4.1.1"; + sha256 = "1qf4hnslcmqkahxs5d55iljiybn46is41a5kikjd2vnbns4va0fb"; + libraryHaskellDepends = [ + base binary bytestring cereal split utf8-string vivid-osc + ]; + testHaskellDepends = [ + base binary bytestring cereal microspec QuickCheck utf8-string + vivid-osc + ]; + description = "Implementation of SuperCollider server specifications"; + license = "GPL"; + hydraPlatforms = stdenv.lib.platforms.none; + }) {}; + "vk-aws-route53" = callPackage ({ mkDerivation, aws, base, bytestring, containers, http-conduit , http-types, old-locale, resourcet, text, time, xml-conduit @@ -223205,8 +223730,8 @@ self: { }: mkDerivation { pname = "waargonaut"; - version = "0.2.0.0"; - sha256 = "1qk4wg2jqzylaqq0yjq9byj3k5vj23jqvdshvyj7r9fl0f3hynni"; + version = "0.2.0.2"; + sha256 = "0sl4rhkrykd9hn1dpzzsf8hcg5jhx4f7wwysmam8apkkj0hafp17"; setupHaskellDepends = [ base Cabal cabal-doctest ]; libraryHaskellDepends = [ base bifunctors bytestring containers contravariant digit @@ -225754,7 +226279,7 @@ self: { hydraPlatforms = stdenv.lib.platforms.none; }) {}; - "web3_0_8_1_0" = callPackage + "web3_0_8_2_0" = callPackage ({ mkDerivation, aeson, async, base, basement, bytestring, cereal , cryptonite, data-default, exceptions, generics-sop, hspec , hspec-contrib, hspec-discover, hspec-expectations, http-client @@ -225765,8 +226290,8 @@ self: { }: mkDerivation { pname = "web3"; - version = "0.8.1.0"; - sha256 = "0aliq3iblnlz7waswzprb8z28v82sjq8qpc2bbcyknmpp52p2r26"; + version = "0.8.2.0"; + sha256 = "0gfz4011yflpjhg2397wq5761hq4r0g0yrkqljp1xsikq2jab72h"; libraryHaskellDepends = [ aeson async base basement bytestring cereal cryptonite data-default exceptions generics-sop http-client http-client-tls machines memory @@ -230404,8 +230929,8 @@ self: { }: mkDerivation { pname = "xmonad-extras"; - version = "0.14"; - sha256 = "1p1xc8qcrrdv3hhvlmg6l6mcywz7q2i81y6frnf3iz00n01b3d9f"; + version = "0.15"; + sha256 = "0yi6p4s9vl92bnr0sbcvm80x37n4fyglm4x3lrc9l8mapbpxjr02"; configureFlags = [ "-f-with_hlist" "-fwith_parsec" "-fwith_split" ]; @@ -235647,8 +236172,8 @@ self: { ({ mkDerivation, base, multirec }: mkDerivation { pname = "zipper"; - version = "0.4.2"; - sha256 = "1r8092amq5w9gl5szycl1r7wx87xnmkcapdzcwfa4c3pvxrhjy44"; + version = "0.4.3"; + sha256 = "1p8yn91snyv5p6bmll7d0gm0zbrhp99fl4kziq0vkbchlpcdjapf"; libraryHaskellDepends = [ base multirec ]; description = "Generic zipper for families of recursive datatypes"; license = stdenv.lib.licenses.bsd3; diff --git a/pkgs/development/interpreters/python/mk-python-derivation.nix b/pkgs/development/interpreters/python/mk-python-derivation.nix index ef8ee4e5425b..63ffdbb8c0ac 100644 --- a/pkgs/development/interpreters/python/mk-python-derivation.nix +++ b/pkgs/development/interpreters/python/mk-python-derivation.nix @@ -101,10 +101,6 @@ toPythonModule (python.stdenv.mkDerivation (builtins.removeAttrs attrs [ ${python.interpreter} ${./catch_conflicts}/catch_conflicts.py '' + attrs.postFixup or ''''; - # Print fewer warnings so we have less noise in our logs - # The amount of warnings also caused builds to be terminated. - PYTHONWARNINGS="once"; - meta = { # default to python's platforms platforms = python.meta.platforms; diff --git a/pkgs/development/libraries/catch/default.nix b/pkgs/development/libraries/catch/default.nix index 116216d500e2..d83060fc24d8 100644 --- a/pkgs/development/libraries/catch/default.nix +++ b/pkgs/development/libraries/catch/default.nix @@ -2,13 +2,13 @@ stdenv.mkDerivation rec { name = "catch-${version}"; - version = "1.12.0"; + version = "1.12.2"; src = fetchFromGitHub { owner = "catchorg"; repo = "Catch"; rev = "v${version}"; - sha256 = "0hkcmycvyyazzi9dywnyiipnmbx399iirh5xk5g957c8zl0505kd"; + sha256 = "1gdp5wm8khn02g2miz381llw3191k7309qj8s3jd6sasj01rhf23"; }; nativeBuildInputs = [ cmake ]; diff --git a/pkgs/development/libraries/catch2/default.nix b/pkgs/development/libraries/catch2/default.nix new file mode 100644 index 000000000000..073736ce66d9 --- /dev/null +++ b/pkgs/development/libraries/catch2/default.nix @@ -0,0 +1,27 @@ +{ stdenv, fetchFromGitHub, cmake, python }: + +stdenv.mkDerivation rec { + name = "catch2-${version}"; + version = "2.4.2"; + + src = fetchFromGitHub { + owner = "catchorg"; + repo = "Catch2"; + rev = "v${version}"; + sha256="1105bxbvh1xxl4yxjjp6l6w6hgsh8xbdiwlnga9di5y2x92b9bjd"; + }; + + nativeBuildInputs = [ cmake ]; + + cmakeFlags = [ + "-H.." + "-DBUILD_TESTING=OFF"]; + + meta = with stdenv.lib; { + description = "A multi-paradigm automated test framework for C++ and Objective-C (and, maybe, C)"; + homepage = http://catch-lib.net; + license = licenses.boost; + maintainers = with maintainers; [ edwtjo knedlsepp ]; + platforms = with platforms; unix; + }; +} diff --git a/pkgs/development/libraries/openzwave/default.nix b/pkgs/development/libraries/openzwave/default.nix index 087a22dd61ba..4150f0f466cd 100644 --- a/pkgs/development/libraries/openzwave/default.nix +++ b/pkgs/development/libraries/openzwave/default.nix @@ -3,16 +3,18 @@ , systemd }: let - version = "2018-04-04"; + version = "2018-11-04"; in stdenv.mkDerivation rec { name = "openzwave-${version}"; + # Use fork by Home Assistant because this package is mainly used for python.pkgs.homeassistant-pyozw. + # See https://github.com/OpenZWave/open-zwave/compare/master...home-assistant:hass for the difference. src = fetchFromGitHub { - owner = "OpenZWave"; + owner = "home-assistant"; repo = "open-zwave"; - rev = "ab5fe966fee882bb9e8d78a91db892a60a1863d9"; - sha256 = "0yby8ygzjn5zp5vhysxaadbzysqanwd2zakz379299qs454pr2h9"; + rev = "2cc174ad5c935d2d17828634aca2db5a60c59237"; + sha256 = "1d13maj93i6h792cbvqpx43ffss44dxmvbwj2777vzvvjib8m4n8"; }; nativeBuildInputs = [ doxygen fontconfig graphviz-nox libxml2 pkgconfig which ]; diff --git a/pkgs/development/libraries/qt-5/5.11/default.nix b/pkgs/development/libraries/qt-5/5.11/default.nix index bc4b0a8f33be..57300878e49d 100644 --- a/pkgs/development/libraries/qt-5/5.11/default.nix +++ b/pkgs/development/libraries/qt-5/5.11/default.nix @@ -113,6 +113,7 @@ let qtwayland = callPackage ../modules/qtwayland.nix {}; qtwebchannel = callPackage ../modules/qtwebchannel.nix {}; qtwebengine = callPackage ../modules/qtwebengine.nix {}; + qtwebglplugin = callPackage ../modules/qtwebglplugin.nix {}; qtwebkit = callPackage ../modules/qtwebkit.nix {}; qtwebsockets = callPackage ../modules/qtwebsockets.nix {}; qtx11extras = callPackage ../modules/qtx11extras.nix {}; diff --git a/pkgs/development/libraries/qt-5/modules/qtwebglplugin.nix b/pkgs/development/libraries/qt-5/modules/qtwebglplugin.nix new file mode 100644 index 000000000000..444d0c1beae8 --- /dev/null +++ b/pkgs/development/libraries/qt-5/modules/qtwebglplugin.nix @@ -0,0 +1,6 @@ +{ qtModule, qtbase, qtwebsockets }: + +qtModule { + name = "qtwebglplugin"; + qtInputs = [ qtbase qtwebsockets ]; +} diff --git a/pkgs/development/mobile/androidenv/androidsdk.nix b/pkgs/development/mobile/androidenv/androidsdk.nix index a463adaf731f..26750aed6cfc 100644 --- a/pkgs/development/mobile/androidenv/androidsdk.nix +++ b/pkgs/development/mobile/androidenv/androidsdk.nix @@ -41,10 +41,16 @@ stdenv.mkDerivation rec { } else throw "platform not ${stdenv.hostPlatform.system} supported!"; + emulator = fetchurl { + url = "https://dl.google.com/android/repository/emulator-linux-4969155.zip"; + sha256 = "0iw0j6j3w9zpfalsa7xq2czz4vzgq96zk2zddjhanwwx4p8fhrfd"; + }; + buildCommand = '' mkdir -p $out/libexec cd $out/libexec unpackFile $src + unpackFile $emulator cd tools for f in monitor bin/monkeyrunner bin/uiautomatorviewer @@ -76,13 +82,16 @@ stdenv.mkDerivation rec { # The emulators need additional libraries, which are dynamically loaded => let's wrap them ${stdenv.lib.optionalString (stdenv.hostPlatform.system == "x86_64-linux") '' - for i in emulator emulator-check + cd .. + for i in emulator/emulator* emulator/qemu/linux-x86_64/qemu-system-* do + patchelf --set-interpreter ${stdenv.cc.libc.out}/lib/ld-linux-x86-64.so.2 $i wrapProgram `pwd`/$i \ --prefix PATH : ${stdenv.lib.makeBinPath [ file glxinfo ]} \ --suffix LD_LIBRARY_PATH : `pwd`/lib:${makeLibraryPath [ stdenv.cc.cc libX11 libxcb libXau libXdmcp libXext libGLU_combined alsaLib zlib libpulseaudio dbus.lib ]} \ --suffix QT_XKB_CONFIG_ROOT : ${xkeyboardconfig}/share/X11/xkb done + cd tools ''} ''} @@ -93,7 +102,7 @@ stdenv.mkDerivation rec { # The monitor requires some more patching cd lib/monitor-x86 - patchelf --set-interpreter ${stdenv.cc.libc.out}/lib/ld-linux.so.2 monitor + patchelf --set-interpreter ${stdenv_32bit.cc.libc.out}/lib/ld-linux.so.2 monitor patchelf --set-rpath ${makeLibraryPath [ libX11 libXext libXrender freetype fontconfig ]} libcairo-swt.so wrapProgram `pwd`/monitor \ @@ -263,6 +272,14 @@ stdenv.mkDerivation rec { fi done + for i in $out/libexec/emulator/* + do + if [ ! -d $i ] && [ -x $i ] + then + ln -sf $i $out/bin/$(basename $i) + fi + done + wrapProgram $out/bin/sdkmanager \ --set JAVA_HOME ${jdk} diff --git a/pkgs/development/ocaml-modules/astring/default.nix b/pkgs/development/ocaml-modules/astring/default.nix index 827487be69bf..f5dd92422cc1 100644 --- a/pkgs/development/ocaml-modules/astring/default.nix +++ b/pkgs/development/ocaml-modules/astring/default.nix @@ -9,8 +9,6 @@ stdenv.mkDerivation rec { sha256 = "0ixjwc3plrljvj24za3l9gy0w30lsbggp8yh02lwrzw61ls4cri0"; }; - unpackCmd = "tar -xf $curSrc"; - buildInputs = [ ocaml findlib ocamlbuild topkg ]; inherit (topkg) buildPhase installPhase; diff --git a/pkgs/development/ocaml-modules/bos/default.nix b/pkgs/development/ocaml-modules/bos/default.nix index a1f4c6bc5649..974348116656 100644 --- a/pkgs/development/ocaml-modules/bos/default.nix +++ b/pkgs/development/ocaml-modules/bos/default.nix @@ -10,8 +10,6 @@ stdenv.mkDerivation rec { sha256 = "1s10iqx8rgnxr5n93lf4blwirjf8nlm272yg5sipr7lsr35v49wc"; }; - unpackCmd = "tar xjf $src"; - buildInputs = [ ocaml findlib ocamlbuild topkg ]; propagatedBuildInputs = [ astring fmt fpath logs rresult ]; diff --git a/pkgs/development/ocaml-modules/cmdliner/default.nix b/pkgs/development/ocaml-modules/cmdliner/default.nix index 4b055a130fd2..9ba48e6ebfd2 100644 --- a/pkgs/development/ocaml-modules/cmdliner/default.nix +++ b/pkgs/development/ocaml-modules/cmdliner/default.nix @@ -15,8 +15,6 @@ stdenv.mkDerivation rec { sha256 = "18jqphjiifljlh9jg8zpl6310p3iwyaqphdkmf89acyaix0s4kj1"; }; - unpackCmd = "tar xjf $src"; - nativeBuildInputs = [ ocamlbuild topkg ]; buildInputs = [ ocaml findlib ]; propagatedBuildInputs = [ result ]; diff --git a/pkgs/development/ocaml-modules/cpuid/default.nix b/pkgs/development/ocaml-modules/cpuid/default.nix index 37400856f1ae..0695da7ee37b 100644 --- a/pkgs/development/ocaml-modules/cpuid/default.nix +++ b/pkgs/development/ocaml-modules/cpuid/default.nix @@ -8,8 +8,6 @@ stdenv.mkDerivation { sha256 = "08k2558a3dnxn8msgpz8c93sfn0y027ganfdi2yvql0fp1ixv97p"; }; - unpackCmd = "tar xjf $src"; - buildInputs = [ ocaml findlib ocamlbuild topkg ocb-stubblr ]; inherit (topkg) buildPhase installPhase; diff --git a/pkgs/development/ocaml-modules/cstruct/default.nix b/pkgs/development/ocaml-modules/cstruct/default.nix index c3941173bff3..37c7f660ca6b 100644 --- a/pkgs/development/ocaml-modules/cstruct/default.nix +++ b/pkgs/development/ocaml-modules/cstruct/default.nix @@ -9,8 +9,6 @@ buildDunePackage rec { sha256 = "1x4jxsvd1lrfibnjdjrkfl7hqsc48rljnwbap6faanj9qhwwa6v2"; }; - unpackCmd = "tar -xjf $curSrc"; - propagatedBuildInputs = [ sexplib ocplib-endian ]; meta = { diff --git a/pkgs/development/ocaml-modules/cstruct/lwt.nix b/pkgs/development/ocaml-modules/cstruct/lwt.nix index 367a7fa2a445..fc6218389662 100644 --- a/pkgs/development/ocaml-modules/cstruct/lwt.nix +++ b/pkgs/development/ocaml-modules/cstruct/lwt.nix @@ -2,7 +2,7 @@ buildDunePackage { pname = "cstruct-lwt"; - inherit (cstruct) version src unpackCmd meta; + inherit (cstruct) version src meta; minimumOCamlVersion = "4.02"; diff --git a/pkgs/development/ocaml-modules/cstruct/ppx.nix b/pkgs/development/ocaml-modules/cstruct/ppx.nix index 837bca370cf3..5f4130dc23f2 100644 --- a/pkgs/development/ocaml-modules/cstruct/ppx.nix +++ b/pkgs/development/ocaml-modules/cstruct/ppx.nix @@ -2,7 +2,7 @@ buildDunePackage { pname = "ppx_cstruct"; - inherit (cstruct) version src unpackCmd meta; + inherit (cstruct) version src meta; minimumOCamlVersion = "4.02"; diff --git a/pkgs/development/ocaml-modules/cstruct/unix.nix b/pkgs/development/ocaml-modules/cstruct/unix.nix index 6fb34ba7821b..fb7612b5f05e 100644 --- a/pkgs/development/ocaml-modules/cstruct/unix.nix +++ b/pkgs/development/ocaml-modules/cstruct/unix.nix @@ -2,7 +2,7 @@ buildDunePackage { pname = "cstruct-unix"; - inherit (cstruct) version src unpackCmd meta; + inherit (cstruct) version src meta; minimumOCamlVersion = "4.02"; diff --git a/pkgs/development/ocaml-modules/csv/default.nix b/pkgs/development/ocaml-modules/csv/default.nix index 8b67200f32f7..e10b21286ddf 100644 --- a/pkgs/development/ocaml-modules/csv/default.nix +++ b/pkgs/development/ocaml-modules/csv/default.nix @@ -9,8 +9,6 @@ buildDunePackage rec { sha256 = "0cgfb6cwhwy7ypc1i3jyfz6sdnykp75aqi6kk0g1a2d81yjwzbcg"; }; - unpackCmd = "tar -xjf $src"; - meta = { description = "A pure OCaml library to read and write CSV files"; license = stdenv.lib.licenses.lgpl21; diff --git a/pkgs/development/ocaml-modules/digestif/default.nix b/pkgs/development/ocaml-modules/digestif/default.nix index cf8b5335d594..d8089bb533f0 100644 --- a/pkgs/development/ocaml-modules/digestif/default.nix +++ b/pkgs/development/ocaml-modules/digestif/default.nix @@ -13,8 +13,6 @@ stdenv.mkDerivation rec { sha256 = "0fsyfi5ps17j3wjav5176gf6z3a5xcw9aqhcr1gml9n9ayfbkhrd"; }; - unpackCmd = "tar -xjf $curSrc"; - buildInputs = [ ocaml findlib ocamlbuild topkg ]; inherit (topkg) buildPhase installPhase; diff --git a/pkgs/development/ocaml-modules/dtoa/default.nix b/pkgs/development/ocaml-modules/dtoa/default.nix index 0e776f8e0c79..a5164ab7fa9b 100644 --- a/pkgs/development/ocaml-modules/dtoa/default.nix +++ b/pkgs/development/ocaml-modules/dtoa/default.nix @@ -11,8 +11,6 @@ buildDunePackage rec { sha256 = "0rzysj07z2q6gk0yhjxnjnba01vmdb9x32wwna10qk3rrb8r2pnn"; }; - unpackCmd = "tar xjf $src"; - hardeningDisable = stdenv.lib.optional stdenv.isDarwin "strictoverflow"; meta = with stdenv.lib; { diff --git a/pkgs/development/ocaml-modules/farfadet/default.nix b/pkgs/development/ocaml-modules/farfadet/default.nix index 080cc74998df..20b6f7d0909e 100644 --- a/pkgs/development/ocaml-modules/farfadet/default.nix +++ b/pkgs/development/ocaml-modules/farfadet/default.nix @@ -15,8 +15,6 @@ stdenv.mkDerivation rec { sha256 = "06wvd57c8khpq0c2hvm15zng269zvabsw1lcaqphqdcckl67nsxr"; }; - unpackCmd = "tar -xjf $curSrc"; - buildInputs = [ ocaml findlib ocamlbuild topkg ]; propagatedBuildInputs = [ faraday ]; @@ -31,4 +29,3 @@ stdenv.mkDerivation rec { inherit (ocaml.meta) platforms; }; } - diff --git a/pkgs/development/ocaml-modules/fmt/default.nix b/pkgs/development/ocaml-modules/fmt/default.nix index 2aa560e5349b..922f85996e14 100644 --- a/pkgs/development/ocaml-modules/fmt/default.nix +++ b/pkgs/development/ocaml-modules/fmt/default.nix @@ -8,8 +8,6 @@ stdenv.mkDerivation { sha256 = "1zj9azcxcn6skmb69ykgmi9z8c50yskwg03wqgh87lypgjdcz060"; }; - unpackCmd = "tar xjf $src"; - buildInputs = [ ocaml findlib ocamlbuild topkg cmdliner ]; propagatedBuildInputs = [ result uchar ]; diff --git a/pkgs/development/ocaml-modules/fpath/default.nix b/pkgs/development/ocaml-modules/fpath/default.nix index f812ab1d48c0..9317f50717e2 100644 --- a/pkgs/development/ocaml-modules/fpath/default.nix +++ b/pkgs/development/ocaml-modules/fpath/default.nix @@ -7,8 +7,6 @@ stdenv.mkDerivation { sha256 = "1hr05d8bpqmqcfdavn4rjk9rxr7v2zl84866f5knjifrm60sxqic"; }; - unpackCmd = "tar xjf $src"; - buildInputs = [ ocaml findlib ocamlbuild topkg ]; propagatedBuildInputs = [ astring ]; diff --git a/pkgs/development/ocaml-modules/functoria/default.nix b/pkgs/development/ocaml-modules/functoria/default.nix index 150d8db16a04..12b24a43956c 100644 --- a/pkgs/development/ocaml-modules/functoria/default.nix +++ b/pkgs/development/ocaml-modules/functoria/default.nix @@ -13,8 +13,6 @@ stdenv.mkDerivation rec { sha256 = "019rl4rir4lwgjyqj2wq3ylw4daih1kxxgbc6ld6kzcq66mwr747"; }; - unpackCmd = "tar xjf $src"; - buildInputs = [ ocaml findlib ocamlbuild topkg ]; propagatedBuildInputs = [ bos cmdliner ocamlgraph ]; diff --git a/pkgs/development/ocaml-modules/gg/default.nix b/pkgs/development/ocaml-modules/gg/default.nix index 0c80f39d9d7d..e32611e0c05f 100644 --- a/pkgs/development/ocaml-modules/gg/default.nix +++ b/pkgs/development/ocaml-modules/gg/default.nix @@ -23,8 +23,6 @@ stdenv.mkDerivation rec { createFindlibDestdir = true; - unpackCmd = "tar xjf $src"; - buildPhase = "ocaml pkg/build.ml native=true native-dynlink=true"; installPhase = "opaline -libdir $OCAMLFIND_DESTDIR"; diff --git a/pkgs/development/ocaml-modules/hex/default.nix b/pkgs/development/ocaml-modules/hex/default.nix index 0131b0359707..172eecbe29db 100644 --- a/pkgs/development/ocaml-modules/hex/default.nix +++ b/pkgs/development/ocaml-modules/hex/default.nix @@ -11,8 +11,6 @@ buildDunePackage rec { sha256 = "17hqf7z5afp2z2c55fk5myxkm7cm74259rqm94hcxkqlpdaqhm8h"; }; - unpackCmd = "tar -xjf $curSrc"; - propagatedBuildInputs = [ cstruct ]; doCheck = true; diff --git a/pkgs/development/ocaml-modules/integers/default.nix b/pkgs/development/ocaml-modules/integers/default.nix index f7d22baf3e9e..bf2d2dd1e8b1 100644 --- a/pkgs/development/ocaml-modules/integers/default.nix +++ b/pkgs/development/ocaml-modules/integers/default.nix @@ -8,8 +8,6 @@ stdenv.mkDerivation { sha256 = "08b1ljw88ny3l0mdq6xmffjk8anfc77igryva5jz1p6f4f746ywk"; }; - unpackCmd = "tar xjf $src"; - buildInputs = [ ocaml findlib ocamlbuild topkg ]; inherit (topkg) buildPhase installPhase; diff --git a/pkgs/development/ocaml-modules/jsonm/default.nix b/pkgs/development/ocaml-modules/jsonm/default.nix index 0599a5f19fec..ca286ee36f8c 100644 --- a/pkgs/development/ocaml-modules/jsonm/default.nix +++ b/pkgs/development/ocaml-modules/jsonm/default.nix @@ -13,8 +13,6 @@ stdenv.mkDerivation { buildInputs = [ ocaml findlib ocamlbuild topkg ]; propagatedBuildInputs = [ uutf ]; - unpackCmd = "tar xjf $src"; - inherit (topkg) buildPhase installPhase; meta = { diff --git a/pkgs/development/ocaml-modules/logs/default.nix b/pkgs/development/ocaml-modules/logs/default.nix index aead4b4756f3..4b67b23d97b6 100644 --- a/pkgs/development/ocaml-modules/logs/default.nix +++ b/pkgs/development/ocaml-modules/logs/default.nix @@ -16,8 +16,6 @@ stdenv.mkDerivation rec { sha256 = "1khbn7jqpid83zn8rvyh1x1sirls7zc878zj4fz985m5xlsfy853"; }; - unpackCmd = "tar xjf $src"; - buildInputs = [ ocaml findlib ocamlbuild topkg fmt cmdliner lwt ]; propagatedBuildInputs = [ result ]; diff --git a/pkgs/development/ocaml-modules/lru/default.nix b/pkgs/development/ocaml-modules/lru/default.nix index 3e474c5653a7..d6ff17211994 100644 --- a/pkgs/development/ocaml-modules/lru/default.nix +++ b/pkgs/development/ocaml-modules/lru/default.nix @@ -9,8 +9,6 @@ stdenv.mkDerivation rec { sha256 = "0bd7js9rrma1fjjjjc3fgr9l5fjbhgihx2nsaf96g2b35iiaimd0"; }; - unpackCmd = "tar -xjf $curSrc"; - buildInputs = [ ocaml findlib ocamlbuild topkg ]; propagatedBuildInputs = [ psq ]; diff --git a/pkgs/development/ocaml-modules/mtime/default.nix b/pkgs/development/ocaml-modules/mtime/default.nix index 69921537f5b5..b067fd99ded4 100644 --- a/pkgs/development/ocaml-modules/mtime/default.nix +++ b/pkgs/development/ocaml-modules/mtime/default.nix @@ -23,8 +23,6 @@ stdenv.mkDerivation { inherit (param) sha256; }; - unpackCmd = "tar xjf $src"; - buildInputs = [ ocaml findlib ocamlbuild topkg ] ++ stdenv.lib.optional jsooSupport js_of_ocaml; diff --git a/pkgs/development/ocaml-modules/nocrypto/default.nix b/pkgs/development/ocaml-modules/nocrypto/default.nix index 67de1863e004..813b4d7f7a4a 100644 --- a/pkgs/development/ocaml-modules/nocrypto/default.nix +++ b/pkgs/development/ocaml-modules/nocrypto/default.nix @@ -16,8 +16,6 @@ stdenv.mkDerivation rec { sha256 = "0zshi9hlhcz61n5z1k6fx6rsi0pl4xgahsyl2jp0crqkaf3hqwlg"; }; - unpackCmd = "tar xjf $curSrc"; - patches = [ (fetchpatch { url = "https://raw.githubusercontent.com/ocaml/opam-repository/master/packages/nocrypto/nocrypto.0.5.4-1/files/0001-add-missing-runtime-dependencies-in-_tags.patch"; diff --git a/pkgs/development/ocaml-modules/notty/default.nix b/pkgs/development/ocaml-modules/notty/default.nix index 2dffb472f3e8..f273f28a71eb 100644 --- a/pkgs/development/ocaml-modules/notty/default.nix +++ b/pkgs/development/ocaml-modules/notty/default.nix @@ -19,8 +19,6 @@ stdenv.mkDerivation rec { sha256 = "0wdfmgx1mz77s7m451vy8r9i4iqwn7s7b39kpbpckf3w9417riq0"; }; - unpackCmd = "tar -xjf $curSrc"; - buildInputs = [ ocaml findlib ocamlbuild topkg ocb-stubblr ]; propagatedBuildInputs = [ result uucp uuseg uutf ] ++ optional withLwt lwt; diff --git a/pkgs/development/ocaml-modules/octavius/default.nix b/pkgs/development/ocaml-modules/octavius/default.nix index 57e3c9bfa745..6c2ee821c0d5 100644 --- a/pkgs/development/ocaml-modules/octavius/default.nix +++ b/pkgs/development/ocaml-modules/octavius/default.nix @@ -10,8 +10,6 @@ stdenv.mkDerivation { sha256 = "02milzzlr4xk5aymg2fjz27f528d5pyscqvld3q0dm41zcpkz5ml"; }; - unpackCmd = "tar xjf $src"; - buildInputs = [ ocaml findlib ocamlbuild topkg ]; inherit (topkg) buildPhase installPhase; diff --git a/pkgs/development/ocaml-modules/otfm/default.nix b/pkgs/development/ocaml-modules/otfm/default.nix index 05c25c81d5a0..081876f7075c 100644 --- a/pkgs/development/ocaml-modules/otfm/default.nix +++ b/pkgs/development/ocaml-modules/otfm/default.nix @@ -21,8 +21,6 @@ stdenv.mkDerivation rec { propagatedBuildInputs = [ uutf result ]; - unpackCmd = "tar xjf $src"; - inherit (topkg) buildPhase installPhase; meta = with stdenv.lib; { diff --git a/pkgs/development/ocaml-modules/ppx_blob/default.nix b/pkgs/development/ocaml-modules/ppx_blob/default.nix index b36eaed500f8..3b72853e7828 100644 --- a/pkgs/development/ocaml-modules/ppx_blob/default.nix +++ b/pkgs/development/ocaml-modules/ppx_blob/default.nix @@ -9,8 +9,6 @@ buildDunePackage rec { sha256 = "1xmslk1mwdzhy1bydgsjlcb7h544c39hvxa8lywp8w72gaggjl16"; }; - unpackCmd = "tar xjf $curSrc"; - buildInputs = [ alcotest ocaml-migrate-parsetree ]; doCheck = true; diff --git a/pkgs/development/ocaml-modules/ppx_gen_rec/default.nix b/pkgs/development/ocaml-modules/ppx_gen_rec/default.nix index 270afae754be..5d45ee90c2e9 100644 --- a/pkgs/development/ocaml-modules/ppx_gen_rec/default.nix +++ b/pkgs/development/ocaml-modules/ppx_gen_rec/default.nix @@ -11,8 +11,6 @@ buildDunePackage rec { sha256 = "0qy0wa3rd5yh1612jijadi1yddfslpsmmmf69phi2dhr3vmkhza7"; }; - unpackCmd = "tar xjf $src"; - buildInputs = [ ocaml-migrate-parsetree ]; meta = with stdenv.lib; { diff --git a/pkgs/development/ocaml-modules/psq/default.nix b/pkgs/development/ocaml-modules/psq/default.nix index fc3fa81a02a9..08b9c10d9821 100644 --- a/pkgs/development/ocaml-modules/psq/default.nix +++ b/pkgs/development/ocaml-modules/psq/default.nix @@ -13,8 +13,6 @@ stdenv.mkDerivation rec { sha256 = "08ghgdivbjrxnaqc3hsb69mr9s2ql5ds0fb97b7z6zimzqibz6lp"; }; - unpackCmd = "tar -xjf $curSrc"; - buildInputs = [ ocaml findlib ocamlbuild topkg ]; inherit (topkg) buildPhase installPhase; diff --git a/pkgs/development/ocaml-modules/ptime/default.nix b/pkgs/development/ocaml-modules/ptime/default.nix index b0067d44911f..4ac473fef006 100644 --- a/pkgs/development/ocaml-modules/ptime/default.nix +++ b/pkgs/development/ocaml-modules/ptime/default.nix @@ -9,8 +9,6 @@ stdenv.mkDerivation rec { sha256 = "0z2snhda8bg136xkw2msw6k2dz84vb49p8bgzrxfs8mawdlk0kkg"; }; - unpackCmd = "tar -xf $curSrc"; - buildInputs = [ ocaml findlib ocamlbuild topkg js_of_ocaml ]; propagatedBuildInputs = [ result ]; diff --git a/pkgs/development/ocaml-modules/react/default.nix b/pkgs/development/ocaml-modules/react/default.nix index 920ee05244a1..9d070b962b4c 100644 --- a/pkgs/development/ocaml-modules/react/default.nix +++ b/pkgs/development/ocaml-modules/react/default.nix @@ -8,7 +8,6 @@ stdenv.mkDerivation { sha256 = "1aj8w79gdd9xnrbz7s5p8glcb4pmimi8jp9f439dqnf6ih3mqb3v"; }; - unpackCmd = "tar xjf $src"; buildInputs = [ ocaml findlib topkg ocamlbuild ]; inherit (topkg) buildPhase installPhase; diff --git a/pkgs/development/ocaml-modules/rope/default.nix b/pkgs/development/ocaml-modules/rope/default.nix index 9e9ebea6b6a7..4353c606d618 100644 --- a/pkgs/development/ocaml-modules/rope/default.nix +++ b/pkgs/development/ocaml-modules/rope/default.nix @@ -8,7 +8,6 @@ let param = sha256 = "06pkbnkad2ck50jn59ggwv154yd9vb01abblihvam6p27m4za1pc"; buildInputs = [ dune ]; extra = { - unpackCmd = "tar -xjf $curSrc"; buildPhase = "dune build -p rope"; inherit (dune) installPhase; }; diff --git a/pkgs/development/ocaml-modules/rresult/default.nix b/pkgs/development/ocaml-modules/rresult/default.nix index 2cb602973f5f..270432b86e94 100644 --- a/pkgs/development/ocaml-modules/rresult/default.nix +++ b/pkgs/development/ocaml-modules/rresult/default.nix @@ -8,8 +8,6 @@ stdenv.mkDerivation rec { sha256 = "1k69a3gvrk7f2cshwjzvk7818f0bwxhacgd14wxy6d4gmrggci86"; }; - unpackCmd = "tar xjf $src"; - buildInputs = [ ocaml findlib ocamlbuild topkg ]; inherit (topkg) buildPhase installPhase; diff --git a/pkgs/development/ocaml-modules/topkg/default.nix b/pkgs/development/ocaml-modules/topkg/default.nix index 3ff641ff93e5..3e6b78a71719 100644 --- a/pkgs/development/ocaml-modules/topkg/default.nix +++ b/pkgs/development/ocaml-modules/topkg/default.nix @@ -32,7 +32,6 @@ stdenv.mkDerivation rec { buildInputs = [ ocaml findlib ocamlbuild ]; propagatedBuildInputs = [ result ]; - unpackCmd = "tar xjf ${src}"; buildPhase = "${run} build"; createFindlibDestdir = true; installPhase = "${opaline}/bin/opaline -prefix $out -libdir $OCAMLFIND_DESTDIR"; diff --git a/pkgs/development/ocaml-modules/tsdl/default.nix b/pkgs/development/ocaml-modules/tsdl/default.nix index 4230d098e0da..230aab2617f1 100644 --- a/pkgs/development/ocaml-modules/tsdl/default.nix +++ b/pkgs/development/ocaml-modules/tsdl/default.nix @@ -22,8 +22,6 @@ stdenv.mkDerivation { buildInputs = [ ocaml findlib ocamlbuild topkg result ocb-stubblr ]; propagatedBuildInputs = [ SDL2 ctypes ]; - unpackCmd = "tar xjf $src"; - preConfigure = '' # The following is done to avoid an additional dependency (ncurses) # due to linking in the custom bytecode runtime. Instead, just diff --git a/pkgs/development/ocaml-modules/uchar/default.nix b/pkgs/development/ocaml-modules/uchar/default.nix index 8fddf883da5d..c943d3ce35a8 100644 --- a/pkgs/development/ocaml-modules/uchar/default.nix +++ b/pkgs/development/ocaml-modules/uchar/default.nix @@ -8,7 +8,6 @@ stdenv.mkDerivation { sha256 = "1w2saw7zanf9m9ffvz2lvcxvlm118pws2x1wym526xmydhqpyfa7"; }; - unpackCmd = "tar xjf $src"; buildInputs = [ ocaml ocamlbuild findlib opaline ]; buildPhase = "ocaml pkg/build.ml native=true native-dynlink=true"; installPhase = "opaline -libdir $OCAMLFIND_DESTDIR"; diff --git a/pkgs/development/ocaml-modules/uri/default.nix b/pkgs/development/ocaml-modules/uri/default.nix index a8b664b0720c..6073411a24d2 100644 --- a/pkgs/development/ocaml-modules/uri/default.nix +++ b/pkgs/development/ocaml-modules/uri/default.nix @@ -11,8 +11,6 @@ buildDunePackage rec { sha256 = "1m845rwd70wi4iijkrigyz939m1x84ba70hvv0d9sgk6971w4kz0"; }; - unpackCmd = "tar -xjf $curSrc"; - buildInputs = [ ounit ]; propagatedBuildInputs = [ ppx_sexp_conv re sexplib stringext ]; doCheck = true; diff --git a/pkgs/development/ocaml-modules/uucd/default.nix b/pkgs/development/ocaml-modules/uucd/default.nix index 60429ca4b401..683ace8cbc57 100644 --- a/pkgs/development/ocaml-modules/uucd/default.nix +++ b/pkgs/development/ocaml-modules/uucd/default.nix @@ -15,8 +15,6 @@ stdenv.mkDerivation rec { buildInputs = [ ocaml findlib ocamlbuild topkg ]; - unpackCmd = "tar xjf $src"; - inherit (topkg) buildPhase installPhase; propagatedBuildInputs = [ xmlm ]; diff --git a/pkgs/development/ocaml-modules/uucp/default.nix b/pkgs/development/ocaml-modules/uucp/default.nix index 6e61d39fe8ea..1d3e9f283ce8 100644 --- a/pkgs/development/ocaml-modules/uucp/default.nix +++ b/pkgs/development/ocaml-modules/uucp/default.nix @@ -21,8 +21,6 @@ stdenv.mkDerivation { propagatedBuildInputs = [ uchar ]; - unpackCmd = "tar xjf $src"; - buildPhase = "${topkg.buildPhase} --with-cmdliner false"; inherit (topkg) installPhase; diff --git a/pkgs/development/ocaml-modules/uuidm/default.nix b/pkgs/development/ocaml-modules/uuidm/default.nix index b295143c0bc3..0c45e6c8af18 100644 --- a/pkgs/development/ocaml-modules/uuidm/default.nix +++ b/pkgs/development/ocaml-modules/uuidm/default.nix @@ -2,14 +2,12 @@ stdenv.mkDerivation rec { version = "0.9.6"; - name = "uuidm-${version}"; + name = "uuidm-${version}"; src = fetchurl { url = "http://erratique.ch/software/uuidm/releases/uuidm-${version}.tbz"; sha256 = "0hz4fdx0x16k0pw9995vkz5d1hmzz6b16wck9li399rcbfnv5jlc"; }; - unpackCmd = "tar -xf $curSrc"; - buildInputs = [ ocaml findlib ocamlbuild topkg cmdliner ]; inherit (topkg) buildPhase installPhase; diff --git a/pkgs/development/ocaml-modules/uunf/default.nix b/pkgs/development/ocaml-modules/uunf/default.nix index 4b0ce9e899c8..e6ecec3145e4 100644 --- a/pkgs/development/ocaml-modules/uunf/default.nix +++ b/pkgs/development/ocaml-modules/uunf/default.nix @@ -19,8 +19,6 @@ stdenv.mkDerivation rec { propagatedBuildInputs = [ uchar ]; - unpackCmd = "tar xjf $src"; - inherit (topkg) buildPhase installPhase; meta = with stdenv.lib; { diff --git a/pkgs/development/ocaml-modules/uuseg/default.nix b/pkgs/development/ocaml-modules/uuseg/default.nix index a0ed74f7cda9..df56e904ab67 100644 --- a/pkgs/development/ocaml-modules/uuseg/default.nix +++ b/pkgs/development/ocaml-modules/uuseg/default.nix @@ -18,8 +18,6 @@ stdenv.mkDerivation rec { buildInputs = [ ocaml findlib ocamlbuild cmdliner topkg uutf ]; propagatedBuildInputs = [ uucp uchar ]; - unpackCmd = "tar xjf $src"; - inherit (topkg) buildPhase installPhase; meta = with stdenv.lib; { diff --git a/pkgs/development/ocaml-modules/uutf/default.nix b/pkgs/development/ocaml-modules/uutf/default.nix index 95ec93d8584b..9b6c1868ad32 100644 --- a/pkgs/development/ocaml-modules/uutf/default.nix +++ b/pkgs/development/ocaml-modules/uutf/default.nix @@ -16,8 +16,6 @@ stdenv.mkDerivation rec { buildInputs = [ ocaml findlib ocamlbuild topkg cmdliner ]; propagatedBuildInputs = [ uchar ]; - unpackCmd = "tar xjf $src"; - inherit (topkg) buildPhase installPhase; meta = with stdenv.lib; { diff --git a/pkgs/development/ocaml-modules/vg/default.nix b/pkgs/development/ocaml-modules/vg/default.nix index 582b2dc8a2c0..5e0d715b0beb 100644 --- a/pkgs/development/ocaml-modules/vg/default.nix +++ b/pkgs/development/ocaml-modules/vg/default.nix @@ -32,8 +32,6 @@ stdenv.mkDerivation rec { ++ optionals pdfBackend [ uutf otfm ] ++ optionals htmlcBackend [ js_of_ocaml js_of_ocaml-ocamlbuild js_of_ocaml-ppx ]; - unpackCmd = "tar xjf $src"; - buildPhase = topkg.buildPhase + " --with-uutf ${boolToString pdfBackend}" + " --with-otfm ${boolToString pdfBackend}" diff --git a/pkgs/development/ocaml-modules/wtf8/default.nix b/pkgs/development/ocaml-modules/wtf8/default.nix index 1c105fbc0259..7f3686abb51a 100644 --- a/pkgs/development/ocaml-modules/wtf8/default.nix +++ b/pkgs/development/ocaml-modules/wtf8/default.nix @@ -11,8 +11,6 @@ buildDunePackage rec { sha256 = "1msg3vycd3k8qqj61sc23qks541cxpb97vrnrvrhjnqxsqnh6ygq"; }; - unpackCmd = "tar xjf $src"; - meta = with stdenv.lib; { homepage = https://github.com/flowtype/ocaml-wtf8; description = "WTF-8 is a superset of UTF-8 that allows unpaired surrogates."; diff --git a/pkgs/development/ocaml-modules/x509/default.nix b/pkgs/development/ocaml-modules/x509/default.nix index 44a25865c1a7..8d4bd4c82b39 100644 --- a/pkgs/development/ocaml-modules/x509/default.nix +++ b/pkgs/development/ocaml-modules/x509/default.nix @@ -12,8 +12,6 @@ stdenv.mkDerivation rec { sha256 = "1c62mw9rnzq0rs3ihbhfs18nv4mdzwag7893hlqgji3wmaai70pk"; }; - unpackCmd = "tar -xjf $curSrc"; - buildInputs = [ ocaml findlib ocamlbuild topkg ppx_sexp_conv ounit cstruct-unix ]; propagatedBuildInputs = [ asn1-combinators astring nocrypto ]; diff --git a/pkgs/development/ocaml-modules/xmlm/default.nix b/pkgs/development/ocaml-modules/xmlm/default.nix index a1765296d57d..d3166d4cd732 100644 --- a/pkgs/development/ocaml-modules/xmlm/default.nix +++ b/pkgs/development/ocaml-modules/xmlm/default.nix @@ -19,8 +19,6 @@ stdenv.mkDerivation rec { buildInputs = [ ocaml findlib ocamlbuild topkg ]; - unpackCmd = "tar xjf $src"; - inherit (topkg) buildPhase installPhase; meta = with stdenv.lib; { diff --git a/pkgs/development/python-modules/dpath/default.nix b/pkgs/development/python-modules/dpath/default.nix new file mode 100644 index 000000000000..3b878f7d5e4c --- /dev/null +++ b/pkgs/development/python-modules/dpath/default.nix @@ -0,0 +1,25 @@ +{ stdenv, fetchPypi, buildPythonPackage +, mock, nose +}: + +buildPythonPackage rec { + pname = "dpath"; + version = "1.4.2"; + + src = fetchPypi { + inherit pname version; + sha256 = "0gr7816pnzbyh9h1ia0qz0q1f9zfzacwb8dc36js8hw8x14myqqg"; + }; + + checkInputs = [ mock nose ]; + checkPhase = '' + nosetests + ''; + + meta = with stdenv.lib; { + homepage = https://github.com/akesterson/dpath-python; + license = [ licenses.mit ]; + description = "A python library for accessing and searching dictionaries via /slashed/paths ala xpath"; + maintainers = [ maintainers.mmlb ]; + }; +} diff --git a/pkgs/development/python-modules/homeassistant-pyozw/default.nix b/pkgs/development/python-modules/homeassistant-pyozw/default.nix new file mode 100644 index 000000000000..c4410cfdbcf1 --- /dev/null +++ b/pkgs/development/python-modules/homeassistant-pyozw/default.nix @@ -0,0 +1,14 @@ +{ python_openzwave, fetchPypi }: + +python_openzwave.overridePythonAttrs (oldAttrs: rec { + pname = "homeassistant_pyozw"; + version = "0.1.0"; + + src = fetchPypi { + inherit pname version; + extension = "zip"; + sha256 = "bca4062906f65db9b4668388e6755d6ea3ee9e1b02ad3ed81738bb4d32a79342"; + }; + + meta.homepage = https://github.com/home-assistant/python-openzwave; +}) diff --git a/pkgs/development/python-modules/matplotlib/2.nix b/pkgs/development/python-modules/matplotlib/2.nix new file mode 100644 index 000000000000..f073e7baa4ed --- /dev/null +++ b/pkgs/development/python-modules/matplotlib/2.nix @@ -0,0 +1,91 @@ +{ stdenv, fetchPypi, python, buildPythonPackage, pycairo, backports_functools_lru_cache +, which, cycler, dateutil, nose, numpy, pyparsing, sphinx, tornado, kiwisolver +, freetype, libpng, pkgconfig, mock, pytz, pygobject3, functools32, subprocess32 +, enableGhostscript ? false, ghostscript ? null, gtk3 +, enableGtk2 ? false, pygtk ? null, gobjectIntrospection +, enableGtk3 ? false, cairo +, enableTk ? false, tcl ? null, tk ? null, tkinter ? null, libX11 ? null +, enableQt ? false, pyqt4 +, libcxx +, Cocoa +, pythonOlder +}: + +assert enableGhostscript -> ghostscript != null; +assert enableGtk2 -> pygtk != null; +assert enableTk -> (tcl != null) + && (tk != null) + && (tkinter != null) + && (libX11 != null) + ; +assert enableQt -> pyqt4 != null; + +buildPythonPackage rec { + version = "2.2.3"; + pname = "matplotlib"; + + src = fetchPypi { + inherit pname version; + sha256 = "7355bf757ecacd5f0ac9dd9523c8e1a1103faadf8d33c22664178e17533f8ce5"; + }; + + NIX_CFLAGS_COMPILE = stdenv.lib.optionalString stdenv.isDarwin "-I${libcxx}/include/c++/v1"; + + XDG_RUNTIME_DIR = "/tmp"; + + buildInputs = [ python which sphinx stdenv ] + ++ stdenv.lib.optional enableGhostscript ghostscript + ++ stdenv.lib.optional stdenv.isDarwin [ Cocoa ]; + + propagatedBuildInputs = + [ cycler dateutil nose numpy pyparsing tornado freetype kiwisolver + libpng pkgconfig mock pytz ] + ++ stdenv.lib.optional (pythonOlder "3.3") backports_functools_lru_cache + ++ stdenv.lib.optional enableGtk2 pygtk + ++ stdenv.lib.optionals enableGtk3 [ cairo pycairo gtk3 gobjectIntrospection pygobject3 ] + ++ stdenv.lib.optionals enableTk [ tcl tk tkinter libX11 ] + ++ stdenv.lib.optionals enableQt [ pyqt4 ] + ++ stdenv.lib.optionals (builtins.hasAttr "isPy2" python) [ functools32 subprocess32 ]; + + patches = + [ ./basedirlist.patch ] ++ + stdenv.lib.optionals stdenv.isDarwin [ ./darwin-stdenv-2.2.3.patch ]; + + # Matplotlib tries to find Tcl/Tk by opening a Tk window and asking the + # corresponding interpreter object for its library paths. This fails if + # `$DISPLAY` is not set. The fallback option assumes that Tcl/Tk are both + # installed under the same path which is not true in Nix. + # With the following patch we just hard-code these paths into the install + # script. + postPatch = + let + inherit (stdenv.lib.strings) substring; + tcl_tk_cache = ''"${tk}/lib", "${tcl}/lib", "${substring 0 3 tk.version}"''; + in + stdenv.lib.optionalString enableTk + "sed -i '/self.tcl_tk_cache = None/s|None|${tcl_tk_cache}|' setupext.py"; + + checkPhase = '' + ${python.interpreter} tests.py + ''; + + # Test data is not included in the distribution (the `tests` folder + # is missing) + doCheck = false; + + prePatch = '' + # Failing test: ERROR: matplotlib.tests.test_style.test_use_url + sed -i 's/test_use_url/fails/' lib/matplotlib/tests/test_style.py + # Failing test: ERROR: test suite for + sed -i 's/TestTinyPages/fails/' lib/matplotlib/sphinxext/tests/test_tinypages.py + # Transient errors + sed -i 's/test_invisible_Line_rendering/noop/' lib/matplotlib/tests/test_lines.py + ''; + + meta = with stdenv.lib; { + description = "Python plotting library, making publication quality plots"; + homepage = "https://matplotlib.org/"; + maintainers = with maintainers; [ lovek323 ]; + }; + +} diff --git a/pkgs/development/python-modules/matplotlib/darwin-stdenv-2.2.3.patch b/pkgs/development/python-modules/matplotlib/darwin-stdenv-2.2.3.patch new file mode 100644 index 000000000000..ca399b4e6841 --- /dev/null +++ b/pkgs/development/python-modules/matplotlib/darwin-stdenv-2.2.3.patch @@ -0,0 +1,10 @@ +--- a/src/_macosx.m 2015-10-30 00:46:20.000000000 +0200 ++++ b/src/_macosx.m 2015-11-01 14:52:25.000000000 +0200 +@@ -6264,6 +6264,7 @@ + + static bool verify_framework(void) + { ++ return true; /* nixpkgs darwin stdenv */ + #ifdef COMPILING_FOR_10_6 + NSRunningApplication* app = [NSRunningApplication currentApplication]; + NSApplicationActivationPolicy activationPolicy = [app activationPolicy]; diff --git a/pkgs/development/python-modules/matplotlib/darwin-stdenv.patch b/pkgs/development/python-modules/matplotlib/darwin-stdenv.patch index ca399b4e6841..27ed8fc9f964 100644 --- a/pkgs/development/python-modules/matplotlib/darwin-stdenv.patch +++ b/pkgs/development/python-modules/matplotlib/darwin-stdenv.patch @@ -1,10 +1,12 @@ ---- a/src/_macosx.m 2015-10-30 00:46:20.000000000 +0200 -+++ b/src/_macosx.m 2015-11-01 14:52:25.000000000 +0200 -@@ -6264,6 +6264,7 @@ +diff -ruN matplotlib-3.0.0/src/_macosx.m matplotlib-3.0.0.patched/src/_macosx.m +--- matplotlib-3.0.0/src/_macosx.m 2018-09-16 00:35:21.000000000 +0200 ++++ matplotlib-3.0.0.patched/src/_macosx.m 2018-11-03 13:14:33.000000000 +0100 +@@ -2577,6 +2577,7 @@ static bool verify_framework(void) { + return true; /* nixpkgs darwin stdenv */ - #ifdef COMPILING_FOR_10_6 - NSRunningApplication* app = [NSRunningApplication currentApplication]; - NSApplicationActivationPolicy activationPolicy = [app activationPolicy]; + ProcessSerialNumber psn; + /* These methods are deprecated, but they don't require the app to + have started */ + diff --git a/pkgs/development/python-modules/matplotlib/default.nix b/pkgs/development/python-modules/matplotlib/default.nix index f9aa8cb2ebea..2cd7557bac7c 100644 --- a/pkgs/development/python-modules/matplotlib/default.nix +++ b/pkgs/development/python-modules/matplotlib/default.nix @@ -1,7 +1,7 @@ -{ stdenv, fetchPypi, python, buildPythonPackage, pycairo, backports_functools_lru_cache +{ stdenv, fetchPypi, python, buildPythonPackage, isPy3k, pycairo, backports_functools_lru_cache , which, cycler, dateutil, nose, numpy, pyparsing, sphinx, tornado, kiwisolver , freetype, libpng, pkgconfig, mock, pytz, pygobject3, functools32, subprocess32 -, enableGhostscript ? false, ghostscript ? null, gtk3 +, enableGhostscript ? true, ghostscript ? null, gtk3 , enableGtk2 ? false, pygtk ? null, gobjectIntrospection , enableGtk3 ? false, cairo , enableTk ? false, tcl ? null, tk ? null, tkinter ? null, libX11 ? null @@ -21,12 +21,14 @@ assert enableTk -> (tcl != null) assert enableQt -> pyqt4 != null; buildPythonPackage rec { - version = "2.2.3"; + version = "3.0.2"; pname = "matplotlib"; + disabled = !isPy3k; + src = fetchPypi { inherit pname version; - sha256 = "7355bf757ecacd5f0ac9dd9523c8e1a1103faadf8d33c22664178e17533f8ce5"; + sha256 = "c94b792af431f6adb6859eb218137acd9a35f4f7442cea57e4a59c54751c36af"; }; NIX_CFLAGS_COMPILE = stdenv.lib.optionalString stdenv.isDarwin "-I${libcxx}/include/c++/v1"; @@ -44,8 +46,7 @@ buildPythonPackage rec { ++ stdenv.lib.optional enableGtk2 pygtk ++ stdenv.lib.optionals enableGtk3 [ cairo pycairo gtk3 gobjectIntrospection pygobject3 ] ++ stdenv.lib.optionals enableTk [ tcl tk tkinter libX11 ] - ++ stdenv.lib.optionals enableQt [ pyqt4 ] - ++ stdenv.lib.optionals (builtins.hasAttr "isPy2" python) [ functools32 subprocess32 ]; + ++ stdenv.lib.optionals enableQt [ pyqt4 ]; patches = [ ./basedirlist.patch ] ++ @@ -84,9 +85,8 @@ buildPythonPackage rec { meta = with stdenv.lib; { description = "Python plotting library, making publication quality plots"; - homepage = "http://matplotlib.sourceforge.net/"; + homepage = "https://matplotlib.org/"; maintainers = with maintainers; [ lovek323 ]; - platforms = platforms.unix; }; } diff --git a/pkgs/development/python-modules/plyplus/default.nix b/pkgs/development/python-modules/plyplus/default.nix new file mode 100644 index 000000000000..2b18d114f3f6 --- /dev/null +++ b/pkgs/development/python-modules/plyplus/default.nix @@ -0,0 +1,21 @@ +{ lib, fetchPypi, buildPythonPackage, ply, isPy3k }: +buildPythonPackage rec { + pname = "PlyPlus"; + version = "0.7.5"; + + src = fetchPypi { + inherit pname version; + sha256 = "0g3flgfm3jpb2d8v9z0qmbwca5gxdqr10cs3zvlfhv5cs06ahpnp"; + }; + + propagatedBuildInputs = [ ply ]; + + disabled = isPy3k; + + meta = { + homepage = https://github.com/erezsh/plyplus; + description = "A general-purpose parser built on top of PLY"; + maintainers = with lib.maintainers; [ twey ]; + license = lib.licenses.mit; + }; +} diff --git a/pkgs/development/python-modules/py3status/default.nix b/pkgs/development/python-modules/py3status/default.nix index b580ae898502..edd98020f06d 100644 --- a/pkgs/development/python-modules/py3status/default.nix +++ b/pkgs/development/python-modules/py3status/default.nix @@ -19,11 +19,11 @@ buildPythonPackage rec { pname = "py3status"; - version = "3.13"; + version = "3.14"; src = fetchPypi { inherit pname version; - sha256 = "b4262db0b3b181fbf1a44679cd817c1cf0126ec34b3537550e294208f413daac"; + sha256 = "8775fb3903458a519593fc22b712ccac598464e319a12b9fdf04803fa60a1583"; }; doCheck = false; diff --git a/pkgs/development/python-modules/pytest/default.nix b/pkgs/development/python-modules/pytest/default.nix index ad8c8d9ad0da..9412a750a9ab 100644 --- a/pkgs/development/python-modules/pytest/default.nix +++ b/pkgs/development/python-modules/pytest/default.nix @@ -24,8 +24,7 @@ buildPythonPackage rec { checkPhase = '' runHook preCheck - # Re-enable warnings because the test suite relies on it. - PYTHONWARNINGS= $out/bin/py.test -x testing/ + $out/bin/py.test -x testing/ runHook postCheck ''; diff --git a/pkgs/tools/graphics/scour/default.nix b/pkgs/development/python-modules/scour/default.nix similarity index 73% rename from pkgs/tools/graphics/scour/default.nix rename to pkgs/development/python-modules/scour/default.nix index 11932aabe0bb..7c198519331b 100644 --- a/pkgs/tools/graphics/scour/default.nix +++ b/pkgs/development/python-modules/scour/default.nix @@ -1,8 +1,6 @@ -{ stdenv, python3 }: +{ lib, buildPythonPackage, fetchPypi, six }: -with python3.pkgs; - -buildPythonApplication rec { +buildPythonPackage rec { pname = "scour"; version = "0.37"; @@ -13,11 +11,13 @@ buildPythonApplication rec { propagatedBuildInputs = [ six ]; - meta = with stdenv.lib; { + # No tests included in archive + doCheck = false; + + meta = with lib; { description = "An SVG Optimizer / Cleaner "; homepage = https://github.com/scour-project/scour; license = licenses.asl20; maintainers = with maintainers; [ worldofpeace ]; - platforms = platforms.unix; }; } diff --git a/pkgs/development/tools/misc/gnum4/default.nix b/pkgs/development/tools/misc/gnum4/default.nix index e5ea17841aa6..12a5b8f2adcf 100644 --- a/pkgs/development/tools/misc/gnum4/default.nix +++ b/pkgs/development/tools/misc/gnum4/default.nix @@ -37,7 +37,7 @@ stdenv.mkDerivation rec { ''; license = stdenv.lib.licenses.gpl3Plus; - platforms = stdenv.lib.platforms.unix; + platforms = stdenv.lib.platforms.unix ++ stdenv.lib.platforms.windows; }; } diff --git a/pkgs/development/tools/rdocker/default.nix b/pkgs/development/tools/rdocker/default.nix new file mode 100644 index 000000000000..a5683e7a953d --- /dev/null +++ b/pkgs/development/tools/rdocker/default.nix @@ -0,0 +1,32 @@ +{ stdenv, fetchFromGitHub, makeWrapper, openssh }: + +stdenv.mkDerivation rec { + name = "rdocker-${version}"; + version = "unstable-2018-07-17"; + + src = fetchFromGitHub { + owner = "dvddarias"; + repo = "rdocker"; + rev = "949377de0154ade2d28c6d4c4ec33b65ea813b5a"; + sha256 = "1mwg9zh144q4fqk9016v2d347vzch8sxlixaxrz0ci9dxvs6ibd4"; + }; + + nativeBuildInputs = [ makeWrapper ]; + + installPhase = '' + install -Dm755 rdocker.sh $out/bin/rdocker + ''; + + postInstall = '' + wrapProgram $out/bin/rdocker \ + --prefix PATH : ${stdenv.lib.makeBinPath [ openssh ]} + ''; + + meta = with stdenv.lib; { + description = "Securely control a remote docker daemon CLI using ssh forwarding, no SSL setup needed"; + homepage = https://github.com/dvddarias/rdocker; + maintainers = [ stdenv.lib.maintainers.pneumaticat ]; + license = licenses.mit; + platforms = platforms.unix; + }; +} diff --git a/pkgs/development/tools/uftrace/default.nix b/pkgs/development/tools/uftrace/default.nix index fa57ce9df21f..7d5569b4376b 100644 --- a/pkgs/development/tools/uftrace/default.nix +++ b/pkgs/development/tools/uftrace/default.nix @@ -1,14 +1,14 @@ -{stdenv, fetchFromGitHub }: +{stdenv, fetchFromGitHub}: stdenv.mkDerivation rec { name = "uftrace-${version}"; - version = "0.9"; + version = "0.9.1"; src = fetchFromGitHub { owner = "namhyung"; repo = "uftrace"; - rev = "f0fed0b24a9727ffed04673b62f66baad21a1f99"; - sha256 = "0rn2xwd87qy5ihn5zq9pwq8cs1vfmcqqz0wl70wskkgp2ccsd9x8"; + rev = "v${version}"; + sha256 = "1jb4dp6crvfzxzmi5iflc7p13b7p2v1djyj6smbf9ns4wr515y6b"; }; postUnpack = '' @@ -23,4 +23,3 @@ stdenv.mkDerivation rec { maintainers = [stdenv.lib.maintainers.nthorne]; }; } - diff --git a/pkgs/games/minecraft-server/default.nix b/pkgs/games/minecraft-server/default.nix index 59e1144cf967..050e0126fa72 100644 --- a/pkgs/games/minecraft-server/default.nix +++ b/pkgs/games/minecraft-server/default.nix @@ -2,11 +2,13 @@ stdenv.mkDerivation rec { name = "minecraft-server-${version}"; - version = "1.12.2"; + version = "1.13.2"; src = fetchurl { - url = "https://s3.amazonaws.com/Minecraft.Download/versions/${version}/minecraft_server.${version}.jar"; - sha256 = "0zhnac6yvkdgdaag0gb0fgrkgizbwrpf7s76yqdiknfswrs947zy"; + # Old url + # https://s3.amazonaws.com/Minecraft.Download/versions/${version}/minecraft_server.${version}.jar + url = "https://launcher.mojang.com/v1/objects/3737db93722a9e39eeada7c27e7aca28b144ffa7/server.jar"; + sha256 = "13h8dxrrgqa1g6sd7aaw26779hcsqsyjm7xm0sknifn54lnamlzz"; }; preferLocalBuild = true; diff --git a/pkgs/games/minetest/default.nix b/pkgs/games/minetest/default.nix index fee8919bb236..28616fe845fc 100644 --- a/pkgs/games/minetest/default.nix +++ b/pkgs/games/minetest/default.nix @@ -4,19 +4,19 @@ }: let - version = "0.4.16"; + version = "0.4.17"; sources = { src = fetchFromGitHub { owner = "minetest"; repo = "minetest"; rev = "${version}"; - sha256 = "048m8as01bw4pnwfxx04wfnyljxq7ivk88l214zi18prrrkfamj3"; + sha256 = "0ri9hyhvcnyyy2k83qvv543s10476g9fn3vcbjwvxjfqap9mkc5m"; }; data = fetchFromGitHub { owner = "minetest"; repo = "minetest_game"; rev = "${version}"; - sha256 = "0alikzyjvj9hd8s3dd6ghpz0y982w2j0yd2zgd7a047mxw21hrcn"; + sha256 = "1g8iw2pya32ifljbdx6z6rpcinmzm81i9minhi2bi1d500ailn7s"; }; }; in stdenv.mkDerivation { diff --git a/pkgs/games/zangband/default.nix b/pkgs/games/zangband/default.nix index cf5e41f389a9..6fab49825340 100644 --- a/pkgs/games/zangband/default.nix +++ b/pkgs/games/zangband/default.nix @@ -1,28 +1,23 @@ { stdenv, fetchurl, ncurses, flex, bison, autoconf, automake, m4, coreutils }: stdenv.mkDerivation rec { - name = "zangband-${version}"; - version = "2.7.3"; + name = pname + "-" + version; + pname = "zangband"; + version = "2.7.4b"; src = fetchurl { - url = "ftp://ftp.sunet.se/pub/games/Angband/Variant/ZAngband/zangband-${version}.tar.gz"; - sha256 = "0654m8fzklsc8565sqdad76mxjsm1z9c280srq8863sd10af0bdq"; + url = "mirror://sourceforge/project/${pname}/${pname}-src/${version}/${name}.tar.gz"; + sha256 = "0kkz6f9myhjnr3308sdab8q186rd55lapvcp38w8qmakdbhc828j"; }; buildInputs = [ ncurses flex bison autoconf automake m4 ]; - # fails during chmod due to broken permissions - dontMakeSourcesWritable = true; - postUnpack = '' - chmod a+rwX -R . - ''; - preConfigure = '' sed -re 's/ch(own|grp|mod)/true/' -i lib/*/makefile.zb makefile.in sed -e '/FIXED_PATHS/d' -i src/z-config.h - ./bootstrap + autoconf ''; preInstall = '' @@ -42,8 +37,8 @@ stdenv.mkDerivation rec { cd "$ZANGBAND_PATH" for i in $(find "$ORIG_PATH" -type f); do REL_PATH="''${i#$ORIG_PATH/}" - mkdir -p "$(dirname "$REL_PATH")" - ln -s "$i" "$REL_PATH" &>/dev/null + mkdir -p "$(dirname "$REL_PATH")" + ln -s "$i" "$REL_PATH" &>/dev/null done mkdir -p lib/user lib/save for i in lib/*/*.raw; do @@ -59,5 +54,6 @@ stdenv.mkDerivation rec { meta = { description = "Rogue-like game"; license = stdenv.lib.licenses.unfree; + broken = true; # broken in runtime, will not get pass character generation }; } diff --git a/pkgs/misc/themes/matcha/default.nix b/pkgs/misc/themes/matcha/default.nix index 6e14d1587a75..d76e0ed74c5d 100644 --- a/pkgs/misc/themes/matcha/default.nix +++ b/pkgs/misc/themes/matcha/default.nix @@ -2,13 +2,13 @@ stdenv.mkDerivation rec { name = "matcha-${version}"; - version = "2018-10-30"; + version = "2018-11-12"; src = fetchFromGitHub { owner = "vinceliuice"; repo = "matcha"; rev = version; - sha256 = "1ks30xm7jhyxgs0blxxnc9ygmyfwrwc9k8d0y0i6yb7608p8zxzq"; + sha256 = "04alnwb3r0546y7xk2lx8bsdm47q6j89vld3g19rfb3622iv85la"; }; buildInputs = [ gdk_pixbuf librsvg ]; diff --git a/pkgs/misc/vscode-extensions/python/default.nix b/pkgs/misc/vscode-extensions/python/default.nix index a2d04edea19f..39e1341e15e2 100644 --- a/pkgs/misc/vscode-extensions/python/default.nix +++ b/pkgs/misc/vscode-extensions/python/default.nix @@ -20,8 +20,8 @@ vscode-utils.buildVscodeMarketplaceExtension { mktplcRef = { name = "python"; publisher = "ms-python"; - version = "2018.9.1"; - sha256 = "050r1rb0xyfikfa6iq741s368xz600pqdk74w6cxszxpy8kl2hng"; + version = "2018.10.1"; + sha256 = "1j9nf09v31lmrjkxf7p1d78d064x6afzh0dvssmk3sjm2c5r432k"; }; postPatch = '' diff --git a/pkgs/os-specific/linux/kernel/linux-testing.nix b/pkgs/os-specific/linux/kernel/linux-testing.nix index ad7e44ed0a17..9c8d44530875 100644 --- a/pkgs/os-specific/linux/kernel/linux-testing.nix +++ b/pkgs/os-specific/linux/kernel/linux-testing.nix @@ -1,13 +1,13 @@ { stdenv, buildPackages, fetchurl, perl, buildLinux, libelf, utillinux, ... } @ args: buildLinux (args // rec { - version = "4.20-rc1"; - modDirVersion = "4.20.0-rc1"; + version = "4.20-rc2"; + modDirVersion = "4.20.0-rc2"; extraMeta.branch = "4.20"; src = fetchurl { url = "https://git.kernel.org/torvalds/t/linux-${version}.tar.gz"; - sha256 = "0nf3rk8768740smkbf2ilsm40p1pnnmrpf53pmc5k1dkj4kgc0pb"; + sha256 = "0vmzrsfdg8sjyq833szirsv83wj2lgd92hy1fw5rp7xnjavn69hc"; }; # Should the testing kernels ever be built on Hydra? diff --git a/pkgs/servers/home-assistant/component-packages.nix b/pkgs/servers/home-assistant/component-packages.nix index 7f16e24a1f72..4aba2f435ba7 100644 --- a/pkgs/servers/home-assistant/component-packages.nix +++ b/pkgs/servers/home-assistant/component-packages.nix @@ -2,7 +2,7 @@ # Do not edit! { - version = "0.81.5"; + version = "0.82.0"; components = { "abode" = ps: with ps; [ ]; "ads" = ps: with ps; [ ]; @@ -137,6 +137,7 @@ "binary_sensor.rpi_gpio" = ps: with ps; [ ]; "binary_sensor.rpi_pfio" = ps: with ps; [ ]; "binary_sensor.satel_integra" = ps: with ps; [ ]; + "binary_sensor.sense" = ps: with ps; [ ]; "binary_sensor.skybell" = ps: with ps; [ ]; "binary_sensor.sleepiq" = ps: with ps; [ ]; "binary_sensor.spc" = ps: with ps; [ ]; @@ -317,18 +318,20 @@ "deconz" = ps: with ps; [ ]; "deconz.config_flow" = ps: with ps; [ ]; "deconz.const" = ps: with ps; [ ]; + "deconz.gateway" = ps: with ps; [ ]; "demo" = ps: with ps; [ aiohttp-cors ]; "device_sun_light_trigger" = ps: with ps; [ ]; "device_tracker" = ps: with ps; [ ]; "device_tracker.actiontec" = ps: with ps; [ ]; "device_tracker.aruba" = ps: with ps; [ pexpect ]; - "device_tracker.asuswrt" = ps: with ps; [ pexpect ]; + "device_tracker.asuswrt" = ps: with ps; [ ]; "device_tracker.automatic" = ps: with ps; [ aiohttp-cors ]; "device_tracker.bbox" = ps: with ps; [ ]; "device_tracker.bluetooth_le_tracker" = ps: with ps; [ ]; "device_tracker.bluetooth_tracker" = ps: with ps; [ ]; "device_tracker.bmw_connected_drive" = ps: with ps; [ ]; "device_tracker.bt_home_hub_5" = ps: with ps; [ ]; + "device_tracker.bt_smarthub" = ps: with ps; [ ]; "device_tracker.cisco_ios" = ps: with ps; [ pexpect ]; "device_tracker.ddwrt" = ps: with ps; [ ]; "device_tracker.demo" = ps: with ps; [ ]; @@ -407,6 +410,7 @@ "fan.mqtt" = ps: with ps; [ paho-mqtt ]; "fan.template" = ps: with ps; [ ]; "fan.tuya" = ps: with ps; [ ]; + "fan.wemo" = ps: with ps; [ ]; "fan.wink" = ps: with ps; [ ]; "fan.xiaomi_miio" = ps: with ps; [ construct ]; "fan.zha" = ps: with ps; [ ]; @@ -417,7 +421,7 @@ "foursquare" = ps: with ps; [ aiohttp-cors ]; "freedns" = ps: with ps; [ ]; "fritzbox" = ps: with ps; [ ]; - "frontend" = ps: with ps; [ aiohttp-cors ruamel_yaml ]; + "frontend" = ps: with ps; [ aiohttp-cors ]; "gc100" = ps: with ps; [ ]; "geo_location" = ps: with ps; [ ]; "geo_location.demo" = ps: with ps; [ ]; @@ -433,6 +437,7 @@ "google_assistant.trait" = ps: with ps; [ ]; "google_domains" = ps: with ps; [ ]; "graphite" = ps: with ps; [ ]; + "greeneye_monitor" = ps: with ps; [ ]; "group" = ps: with ps; [ ]; "habitica" = ps: with ps; [ ]; "hangouts" = ps: with ps; [ ]; @@ -492,6 +497,7 @@ "image_processing.openalpr_local" = ps: with ps; [ ]; "image_processing.opencv" = ps: with ps; [ numpy ]; "image_processing.seven_segments" = ps: with ps; [ ]; + "image_processing.tensorflow" = ps: with ps; [ numpy pillow protobuf ]; "influxdb" = ps: with ps; [ influxdb ]; "input_boolean" = ps: with ps; [ ]; "input_datetime" = ps: with ps; [ ]; @@ -611,11 +617,11 @@ "lock.wink" = ps: with ps; [ ]; "lock.xiaomi_aqara" = ps: with ps; [ ]; "lock.zwave" = ps: with ps; [ ]; - "logbook" = ps: with ps; [ aiohttp-cors ruamel_yaml sqlalchemy ]; + "logbook" = ps: with ps; [ aiohttp-cors sqlalchemy ]; "logentries" = ps: with ps; [ ]; "logger" = ps: with ps; [ ]; "logi_circle" = ps: with ps; [ ]; - "lovelace" = ps: with ps; [ ruamel_yaml ]; + "lovelace" = ps: with ps; [ ]; "lutron" = ps: with ps; [ ]; "lutron_caseta" = ps: with ps; [ ]; "mailbox" = ps: with ps; [ aiohttp-cors ]; @@ -740,7 +746,7 @@ "notify.hangouts" = ps: with ps; [ ]; "notify.hipchat" = ps: with ps; [ ]; "notify.homematic" = ps: with ps; [ pyhomematic ]; - "notify.html5" = ps: with ps; [ aiohttp-cors ruamel_yaml ]; + "notify.html5" = ps: with ps; [ aiohttp-cors ]; "notify.instapush" = ps: with ps; [ ]; "notify.ios" = ps: with ps; [ aiohttp-cors zeroconf ]; "notify.joaoapps_join" = ps: with ps; [ ]; @@ -789,8 +795,8 @@ "openuv" = ps: with ps; [ ]; "openuv.config_flow" = ps: with ps; [ ]; "openuv.const" = ps: with ps; [ ]; - "panel_custom" = ps: with ps; [ aiohttp-cors ruamel_yaml ]; - "panel_iframe" = ps: with ps; [ aiohttp-cors ruamel_yaml ]; + "panel_custom" = ps: with ps; [ aiohttp-cors ]; + "panel_iframe" = ps: with ps; [ aiohttp-cors ]; "persistent_notification" = ps: with ps; [ ]; "pilight" = ps: with ps; [ ]; "plant" = ps: with ps; [ ]; @@ -842,6 +848,7 @@ "scene.wink" = ps: with ps; [ ]; "script" = ps: with ps; [ ]; "scsgate" = ps: with ps; [ ]; + "sense" = ps: with ps; [ ]; "sensor" = ps: with ps; [ ]; "sensor.abode" = ps: with ps; [ ]; "sensor.ads" = ps: with ps; [ ]; @@ -929,12 +936,13 @@ "sensor.gearbest" = ps: with ps; [ ]; "sensor.geizhals" = ps: with ps; [ ]; "sensor.geo_rss_events" = ps: with ps; [ ]; - "sensor.gitlab_ci" = ps: with ps; [ ]; + "sensor.gitlab_ci" = ps: with ps; [ python-gitlab ]; "sensor.gitter" = ps: with ps; [ ]; "sensor.glances" = ps: with ps; [ ]; "sensor.google_travel_time" = ps: with ps; [ ]; "sensor.google_wifi" = ps: with ps; [ ]; "sensor.gpsd" = ps: with ps; [ ]; + "sensor.greeneye_monitor" = ps: with ps; [ ]; "sensor.gtfs" = ps: with ps; [ ]; "sensor.habitica" = ps: with ps; [ ]; "sensor.haveibeenpwned" = ps: with ps; [ ]; @@ -975,6 +983,7 @@ "sensor.lyft" = ps: with ps; [ ]; "sensor.magicseaweed" = ps: with ps; [ ]; "sensor.melissa" = ps: with ps; [ ]; + "sensor.meteo_france" = ps: with ps; [ ]; "sensor.metoffice" = ps: with ps; [ ]; "sensor.mfi" = ps: with ps; [ ]; "sensor.mhz19" = ps: with ps; [ ]; @@ -1017,7 +1026,7 @@ "sensor.pilight" = ps: with ps; [ ]; "sensor.plex" = ps: with ps; [ ]; "sensor.pocketcasts" = ps: with ps; [ ]; - "sensor.pollen" = ps: with ps; [ ]; + "sensor.pollen" = ps: with ps; [ numpy ]; "sensor.postnl" = ps: with ps; [ ]; "sensor.pushbullet" = ps: with ps; [ pushbullet ]; "sensor.pvoutput" = ps: with ps; [ ]; @@ -1096,7 +1105,7 @@ "sensor.twitch" = ps: with ps; [ ]; "sensor.uber" = ps: with ps; [ ]; "sensor.uk_transport" = ps: with ps; [ ]; - "sensor.upnp" = ps: with ps; [ aiohttp-cors ]; + "sensor.upnp" = ps: with ps; [ ]; "sensor.ups" = ps: with ps; [ ]; "sensor.uptime" = ps: with ps; [ ]; "sensor.uscis" = ps: with ps; [ ]; @@ -1124,7 +1133,6 @@ "sensor.xbox_live" = ps: with ps; [ ]; "sensor.xiaomi_aqara" = ps: with ps; [ ]; "sensor.xiaomi_miio" = ps: with ps; [ construct ]; - "sensor.yahoo_finance" = ps: with ps; [ ]; "sensor.yr" = ps: with ps; [ xmltodict ]; "sensor.yweather" = ps: with ps; [ yahooweather ]; "sensor.zabbix" = ps: with ps; [ ]; @@ -1298,7 +1306,7 @@ "unifi.errors" = ps: with ps; [ ]; "upcloud" = ps: with ps; [ ]; "updater" = ps: with ps; [ distro ]; - "upnp" = ps: with ps; [ aiohttp-cors ]; + "upnp" = ps: with ps; [ ]; "upnp.config_flow" = ps: with ps; [ ]; "upnp.const" = ps: with ps; [ ]; "upnp.device" = ps: with ps; [ ]; @@ -1362,7 +1370,7 @@ "zone.const" = ps: with ps; [ ]; "zone.zone" = ps: with ps; [ ]; "zoneminder" = ps: with ps; [ ]; - "zwave" = ps: with ps; [ pydispatcher python_openzwave ]; + "zwave" = ps: with ps; [ homeassistant-pyozw pydispatcher ]; "zwave.config_flow" = ps: with ps; [ ]; "zwave.const" = ps: with ps; [ ]; "zwave.discovery_schemas" = ps: with ps; [ ]; diff --git a/pkgs/servers/home-assistant/default.nix b/pkgs/servers/home-assistant/default.nix index 427f35e2fbcd..a8acf277709f 100644 --- a/pkgs/servers/home-assistant/default.nix +++ b/pkgs/servers/home-assistant/default.nix @@ -20,8 +20,8 @@ let # Override the version of some packages pinned in Home Assistant's setup.py (mkOverride "aiohttp" "3.4.4" "51afec6ffa50a9da4cdef188971a802beb1ca8e8edb40fa429e5e529db3475fa") - (mkOverride "astral" "1.6.1" - "ab0c08f2467d35fcaeb7bad15274743d3ac1ad18b5391f64a0058a9cd192d37d") + (mkOverride "astral" "1.7.1" + "88086fd2006c946567285286464b2da3294a3b0cbba4410b7008ec2458f82a07") (mkOverride "async-timeout" "3.0.1" "0c3c816a028d47f659d6ff5c745cb2acf1f966da1fe5c19c77a70282b25f4c5f") (mkOverride "attrs" "18.2.0" @@ -36,11 +36,17 @@ let "bf4d9b61dce69c49e830950aa36fad194706463b0b6dfe81425b9e0bc6644d46") (mkOverride "requests" "2.20.0" "99dcfdaaeb17caf6e526f32b6a7b780461512ab3f1d992187801694cba42770c") + (mkOverride "ruamel_yaml" "0.15.72" + "97652b9e3a76958cf6684d5d963674adf345d8cc192ddd95e2a21b22cda29f40") (mkOverride "voluptuous" "0.11.5" "567a56286ef82a9d7ae0628c5842f65f516abcb496e74f3f59f1d7b28df314ef") (mkOverride "voluptuous-serialize" "2.0.0" "44be04d87aec34bd7d31ab539341fadc505205f2299031ed9be985112c21aa41") + # used by auth.mfa_modules.totp + (mkOverride "pyotp" "2.2.6" + "dd9130dd91a0340d89a0f06f887dbd76dd07fb95a8886dc4bc401239f2eebd69") + # used by check_config script # can be unpinned once https://github.com/home-assistant/home-assistant/issues/11917 is resolved (mkOverride "colorlog" "3.1.4" @@ -79,7 +85,7 @@ let extraBuildInputs = extraPackages py.pkgs; # Don't forget to run parse-requirements.py after updating - hassVersion = "0.81.5"; + hassVersion = "0.82.0"; in with py.pkgs; buildPythonApplication rec { pname = "homeassistant"; @@ -94,12 +100,12 @@ in with py.pkgs; buildPythonApplication rec { owner = "home-assistant"; repo = "home-assistant"; rev = version; - sha256 = "1fgf9hrv7q7g8s561sir951vd27a459mh3k685xzfnhkh4si47g4"; + sha256 = "1vvq6frzwmbnynpq6269ykifwmvm8zj5zraslsph3jidppx2bnd4"; }; propagatedBuildInputs = [ # From setup.py - aiohttp astral async-timeout attrs bcrypt certifi jinja2 pyjwt cryptography pip pytz pyyaml requests voluptuous voluptuous-serialize + aiohttp astral async-timeout attrs bcrypt certifi jinja2 pyjwt cryptography pip pytz pyyaml requests ruamel_yaml voluptuous voluptuous-serialize # From http, frontend and recorder components and auth.mfa_modules.totp sqlalchemy aiohttp-cors hass-frontend pyotp pyqrcode ] ++ componentBuildInputs ++ extraBuildInputs; diff --git a/pkgs/servers/home-assistant/frontend.nix b/pkgs/servers/home-assistant/frontend.nix index 89d77649d971..c51a6f0472f4 100644 --- a/pkgs/servers/home-assistant/frontend.nix +++ b/pkgs/servers/home-assistant/frontend.nix @@ -2,11 +2,11 @@ buildPythonPackage rec { pname = "home-assistant-frontend"; - version = "20181026.4"; + version = "20181103.3"; src = fetchPypi { inherit pname version; - sha256 = "b0610206eee06042847d89a581ecfcd71255b0e1ecff77e302237e8aa175b00d"; + sha256 = "b1b598f637ffc4c37a3d35aa3b912216f0340cb43fa6c50f4617536669d19499"; }; propagatedBuildInputs = [ user-agents ]; diff --git a/pkgs/servers/home-assistant/parse-requirements.py b/pkgs/servers/home-assistant/parse-requirements.py index 95b731926984..63374b017956 100755 --- a/pkgs/servers/home-assistant/parse-requirements.py +++ b/pkgs/servers/home-assistant/parse-requirements.py @@ -1,5 +1,5 @@ #! /usr/bin/env nix-shell -#! nix-shell -i python3 -p "python3.withPackages (ps: with ps; [ aiohttp astral async-timeout attrs certifi jinja2 pyjwt cryptography pip pytz pyyaml requests voluptuous ])" +#! nix-shell -i python3 -p "python3.withPackages (ps: with ps; [ aiohttp astral async-timeout attrs certifi jinja2 pyjwt cryptography pip pytz pyyaml requests ruamel_yaml voluptuous ])" # # This script downloads Home Assistant's source tarball. # Inside the homeassistant/components directory, each component has an associated .py file, @@ -93,7 +93,7 @@ def name_to_attr_path(req): except KeyError: pass # Let's hope there's only one derivation with a matching name - assert(len(attr_paths) <= 1) + assert len(attr_paths) <= 1, "{} matches more than one derivation: {}".format(req, attr_paths) if len(attr_paths) == 1: return attr_paths.pop() else: diff --git a/pkgs/servers/mail/dovecot/default.nix b/pkgs/servers/mail/dovecot/default.nix index 8f60929e2f7c..f80a01e20f88 100644 --- a/pkgs/servers/mail/dovecot/default.nix +++ b/pkgs/servers/mail/dovecot/default.nix @@ -68,8 +68,8 @@ stdenv.mkDerivation rec { description = "Open source IMAP and POP3 email server written with security primarily in mind"; maintainers = with stdenv.lib.maintainers; [ peti rickynils fpletz ]; platforms = stdenv.lib.platforms.unix; - tests = { - opensmtpd-interaction = nixosTests.opensmtpd; - }; + }; + passthru.tests = { + opensmtpd-interaction = nixosTests.opensmtpd; }; } diff --git a/pkgs/servers/mail/opensmtpd/default.nix b/pkgs/servers/mail/opensmtpd/default.nix index 0ee1c92acbdc..695450f18222 100644 --- a/pkgs/servers/mail/opensmtpd/default.nix +++ b/pkgs/servers/mail/opensmtpd/default.nix @@ -61,8 +61,8 @@ stdenv.mkDerivation rec { license = licenses.isc; platforms = platforms.linux; maintainers = with maintainers; [ rickynils obadz ekleog ]; - tests = { - basic-functionality-and-dovecot-interaction = nixosTests.opensmtpd; - }; + }; + passthru.tests = { + basic-functionality-and-dovecot-interaction = nixosTests.opensmtpd; }; } diff --git a/pkgs/servers/mail/opensmtpd/extras.nix b/pkgs/servers/mail/opensmtpd/extras.nix index 6b63c317d78f..1d4ad63c37d2 100644 --- a/pkgs/servers/mail/opensmtpd/extras.nix +++ b/pkgs/servers/mail/opensmtpd/extras.nix @@ -1,13 +1,21 @@ { stdenv, fetchurl, openssl, libevent, libasr, - python2, pkgconfig, lua5, perl, mysql, postgresql, sqlite, hiredis }: + python2, pkgconfig, lua5, perl, mysql, postgresql, sqlite, hiredis, + enablePython ? true, + enableLua ? true, + enablePerl ? true, + enableMysql ? true, + enablePostgres ? true, + enableSqlite ? true, + enableRedis ? true, +}: stdenv.mkDerivation rec { name = "opensmtpd-extras-${version}"; - version = "5.7.1"; + version = "6.4.0"; src = fetchurl { url = "https://www.opensmtpd.org/archives/${name}.tar.gz"; - sha256 = "1kld4hxgz792s0cb2gl7m2n618ikzqkj88w5dhaxdrxg4x2c4vdm"; + sha256 = "09k25l7zy5ch3fk6qphni2h0rxdp8wacmfag1whi608dgimrhrnb"; }; nativeBuildInputs = [ pkgconfig ]; @@ -40,42 +48,45 @@ stdenv.mkDerivation rec { "--with-scheduler-ram" "--with-scheduler-stub" - ] ++ stdenv.lib.optional (python2 != null) [ + ] ++ stdenv.lib.optional enablePython [ "--with-python=${python2}" "--with-filter-python" "--with-queue-python" "--with-table-python" "--with-scheduler-python" - ] ++ stdenv.lib.optional (lua5 != null) [ + ] ++ stdenv.lib.optional enableLua [ "--with-lua=${pkgconfig}" "--with-filter-lua" - ] ++ stdenv.lib.optional (perl != null) [ + ] ++ stdenv.lib.optional enablePerl [ "--with-perl=${perl}" "--with-filter-perl" - ] ++ stdenv.lib.optional (mysql != null) [ + ] ++ stdenv.lib.optional enableMysql [ "--with-table-mysql" - ] ++ stdenv.lib.optional (postgresql != null) [ + ] ++ stdenv.lib.optional enablePostgres [ "--with-table-postgres" - ] ++ stdenv.lib.optional (sqlite != null) [ + ] ++ stdenv.lib.optional enableSqlite [ "--with-table-sqlite" - ] ++ stdenv.lib.optional (hiredis != null) [ + ] ++ stdenv.lib.optional enableRedis [ "--with-table-redis" ]; - NIX_CFLAGS_COMPILE = stdenv.lib.optional (hiredis != null) "-I${hiredis}/include/hiredis" ++ - stdenv.lib.optional (mysql != null) "-L${mysql.connector-c}/lib/mysql"; + NIX_CFLAGS_COMPILE = + stdenv.lib.optional enableRedis + "-I${hiredis}/include/hiredis -lhiredis" + ++ stdenv.lib.optional enableMysql + "-L${mysql.connector-c}/lib/mysql"; meta = with stdenv.lib; { homepage = https://www.opensmtpd.org/; description = "Extra plugins for the OpenSMTPD mail server"; license = licenses.isc; platforms = platforms.linux; - maintainers = with maintainers; [ gebner ]; + maintainers = with maintainers; [ gebner ekleog ]; }; } diff --git a/pkgs/shells/zsh/spaceship-prompt/default.nix b/pkgs/shells/zsh/spaceship-prompt/default.nix index 312b1e79f49c..28b116523ac0 100644 --- a/pkgs/shells/zsh/spaceship-prompt/default.nix +++ b/pkgs/shells/zsh/spaceship-prompt/default.nix @@ -25,7 +25,7 @@ stdenv.mkDerivation rec{ meta = with stdenv.lib; { description = "Zsh prompt for Astronauts"; - homepage = https://github.com/halfo/lambda-mod-zsh-theme/; + homepage = https://github.com/denysdovhan/spaceship-prompt/; license = licenses.mit; platforms = platforms.linux; maintainers = with maintainers; [ nyanloutre ]; diff --git a/pkgs/stdenv/generic/check-meta.nix b/pkgs/stdenv/generic/check-meta.nix index 0e93df855471..d09dff10b278 100644 --- a/pkgs/stdenv/generic/check-meta.nix +++ b/pkgs/stdenv/generic/check-meta.nix @@ -166,14 +166,15 @@ let hydraPlatforms = listOf str; broken = bool; # TODO: refactor once something like Profpatsch's types-simple will land + # This is currently dead code due to https://github.com/NixOS/nix/issues/2532 tests = attrsOf (mkOptionType { name = "test"; - check = x: isDerivation x && - x ? meta.timeout && - x ? meta.needsVMSupport; + check = x: x == {} || ( # Accept {} for tests that are unsupported + isDerivation x && + x ? meta.timeout + ); merge = lib.options.mergeOneOption; }); - needsVMSupport = bool; timeout = int; # Weirder stuff that doesn't appear in the documentation? diff --git a/pkgs/tools/misc/diskus/default.nix b/pkgs/tools/misc/diskus/default.nix new file mode 100644 index 000000000000..55489aec32a2 --- /dev/null +++ b/pkgs/tools/misc/diskus/default.nix @@ -0,0 +1,23 @@ +{ stdenv, fetchFromGitHub, rustPlatform }: + +rustPlatform.buildRustPackage rec { + name = "diskus-${version}"; + version = "0.4.0"; + + src = fetchFromGitHub { + owner = "sharkdp"; + repo = "diskus"; + rev = "cf4a5e0dc5bf3daedabe4b25343e7eb6238930c0"; + sha256 = "1w5fnpwdsfaca2177qn0clf8j7zwgzhdckjdl2zdbs5qrdwdqrd2"; + }; + + cargoSha256 = "08wm85cs0fi03a75wp276w5hgch3kd787py51jjcxdanm2viq7zv"; + + meta = with stdenv.lib; { + description = "A minimal, fast alternative to 'du -sh'"; + homepage = https://github.com/sharkdp/diskus; + license = with licenses; [ asl20 /* or */ mit ]; + maintainers = [ maintainers.fuerbringer ]; + platforms = platforms.linux; + }; +} diff --git a/pkgs/tools/networking/i2pd/default.nix b/pkgs/tools/networking/i2pd/default.nix index 7ab77b2d2ee7..6e4cf45686b6 100644 --- a/pkgs/tools/networking/i2pd/default.nix +++ b/pkgs/tools/networking/i2pd/default.nix @@ -11,13 +11,13 @@ stdenv.mkDerivation rec { name = pname + "-" + version; pname = "i2pd"; - version = "2.21.1"; + version = "2.22.0"; src = fetchFromGitHub { owner = "PurpleI2P"; repo = pname; rev = version; - sha256 = "0j892s9ga9fjc2q1rw3hp5il4mw1jc0aiw60y1rfaiflyv0wd696"; + sha256 = "1c4y5y6a9kssi9qmsyqz5hw29ya1s0i21fklnz48n08b7f4f9vlz"; }; buildInputs = with stdenv.lib; [ boost zlib openssl ] diff --git a/pkgs/tools/networking/ip2unix/default.nix b/pkgs/tools/networking/ip2unix/default.nix index 18a53d02b1ec..1fa1531d1837 100644 --- a/pkgs/tools/networking/ip2unix/default.nix +++ b/pkgs/tools/networking/ip2unix/default.nix @@ -1,27 +1,40 @@ { stdenv, fetchFromGitHub, meson, ninja, pkgconfig, libyamlcpp, systemd -, asciidoctor, python3Packages +, python3Packages, asciidoc, libxslt, docbook_xml_dtd_45, docbook_xsl +, libxml2, docbook5 }: stdenv.mkDerivation rec { name = "ip2unix-${version}"; - version = "1.1.1"; + version = "1.2.0"; src = fetchFromGitHub { owner = "nixcloud"; repo = "ip2unix"; rev = "v${version}"; - sha256 = "0lw4f1p1frfpf5l7faqdd80d6pi9g5sx7g3wpmig9sa50k6pmc0v"; + sha256 = "0blrhcmska06ydkl15jjgblygkwrimdnbaq3hhifgmffymfk2652"; }; nativeBuildInputs = [ - meson ninja pkgconfig asciidoctor - python3Packages.pytest python3Packages.pytest-timeout + meson ninja pkgconfig asciidoc libxslt.bin docbook_xml_dtd_45 docbook_xsl + libxml2.bin docbook5 python3Packages.pytest python3Packages.pytest-timeout ]; buildInputs = [ libyamlcpp systemd ]; doCheck = true; + doInstallCheck = true; + installCheckPhase = '' + found=0 + for man in "$out/share/man/man1"/ip2unix.1*; do + test -s "$man" && found=1 + done + if [ $found -ne 1 ]; then + echo "ERROR: Manual page hasn't been generated." >&2 + exit 1 + fi + ''; + meta = { homepage = https://github.com/nixcloud/ip2unix; description = "Turn IP sockets into Unix domain sockets"; diff --git a/pkgs/tools/text/gnused/422.nix b/pkgs/tools/text/gnused/422.nix index 037c2f17a63b..16d4f20fe8e7 100644 --- a/pkgs/tools/text/gnused/422.nix +++ b/pkgs/tools/text/gnused/422.nix @@ -8,6 +8,8 @@ stdenv.mkDerivation { sha256 = "f048d1838da284c8bc9753e4506b85a1e0cc1ea8999d36f6995bcb9460cddbd7"; }; + configureFlags = stdenv.lib.optional stdenv.hostPlatform.isMinGW "ac_cv_func__set_invalid_parameter_handler=no"; + outputs = [ "out" "info" ]; meta = { diff --git a/pkgs/tools/text/gnused/default.nix b/pkgs/tools/text/gnused/default.nix index af3db54e96d5..4bdddb8c50b7 100644 --- a/pkgs/tools/text/gnused/default.nix +++ b/pkgs/tools/text/gnused/default.nix @@ -32,7 +32,7 @@ stdenv.mkDerivation rec { license = stdenv.lib.licenses.gpl3Plus; - platforms = stdenv.lib.platforms.all; + platforms = stdenv.lib.platforms.unix; maintainers = [ ]; }; } diff --git a/pkgs/top-level/aliases.nix b/pkgs/top-level/aliases.nix index 8767d98ad0a9..505758d3af0d 100644 --- a/pkgs/top-level/aliases.nix +++ b/pkgs/top-level/aliases.nix @@ -85,6 +85,7 @@ mapAliases ({ docbook5_xsl = docbook_xsl_ns; # added 2018-04-25 docbook_xml_xslt = docbook_xsl; # added 2018-04-25 double_conversion = double-conversion; # 2017-11-22 + docker_compose = docker-compose; # 2018-11-10 dwarf_fortress = dwarf-fortress; # added 2016-01-23 emacsMelpa = emacs25PackagesNg; # for backward compatibility emacsPackagesGen = emacsPackagesFor; # added 2018-08-18 diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index e2392564c39a..044903140a67 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -73,23 +73,11 @@ with pkgs; ### Push NixOS tests inside the fixed point - nixosTests = - let - # TODO(Ericson2314,ekleog): Check this will work correctly with cross- - system = builtins.currentSystem; - rawTests = (import ../../nixos/release.nix { - nixpkgs = pkgs; - }).tests; - testNames = builtins.attrNames rawTests; - filteredList = builtins.filter - (test: rawTests.${test} ? ${system}) - testNames; - finalList = map - (test: { name = test; value = rawTests.${test}.${system}; }) - filteredList; - finalTests = builtins.listToAttrs finalList; - in - finalTests; + nixosTests = import ../../nixos/tests/all-tests.nix { + inherit pkgs; + system = stdenv.hostPlatform.system; + callTest = t: t.test; + }; ### BUILD SUPPORT @@ -154,7 +142,7 @@ with pkgs; dockerTools = callPackage ../build-support/docker { }; - docker_compose = pythonPackages.docker_compose; + docker-compose = python3Packages.callPackage ../applications/virtualization/docker-compose {}; docker-ls = callPackage ../tools/misc/docker-ls { }; @@ -691,6 +679,8 @@ with pkgs; cozy = callPackage ../applications/audio/cozy-audiobooks { }; + diskus = callPackage ../tools/misc/diskus { }; + djmount = callPackage ../tools/filesystems/djmount { }; dgsh = callPackage ../shells/dgsh { }; @@ -1108,6 +1098,8 @@ with pkgs; catch = callPackage ../development/libraries/catch { }; + catch2 = callPackage ../development/libraries/catch2 { }; + catdoc = callPackage ../tools/text/catdoc { }; catdocx = callPackage ../tools/text/catdocx { }; @@ -1585,7 +1577,7 @@ with pkgs; parallel-rust = callPackage ../tools/misc/parallel-rust { }; - scour = callPackage ../tools/graphics/scour { }; + scour = with python3Packages; toPythonApplication scour; s2png = callPackage ../tools/graphics/s2png { }; @@ -2964,7 +2956,10 @@ with pkgs; gnu-pw-mgr = callPackage ../tools/security/gnu-pw-mgr { }; - gnused = callPackage ../tools/text/gnused { }; + gnused = if !stdenv.hostPlatform.isWindows then + callPackage ../tools/text/gnused { } # broken on Windows + else + gnused_422; # This is an easy work-around for [:space:] problems. gnused_422 = callPackage ../tools/text/gnused/422.nix { }; @@ -8856,6 +8851,8 @@ with pkgs; hammer = callPackage ../development/tools/parsing/hammer { }; + rdocker = callPackage ../development/tools/rdocker { }; + redis-dump = callPackage ../development/tools/redis-dump { }; redo = callPackage ../development/tools/build-managers/redo { }; @@ -18926,6 +18923,8 @@ with pkgs; setbfree = callPackage ../applications/audio/setbfree { }; + sfxr-qt = libsForQt5.callPackage ../applications/audio/sfxr-qt { }; + shadowfox = callPackage ../tools/networking/shadowfox { }; shfmt = callPackage ../tools/text/shfmt { }; @@ -21673,14 +21672,14 @@ with pkgs; inherit (darwin.apple_sdk.frameworks) Accelerate CoreGraphics CoreVideo; }; - caffe2 = callPackage ../development/libraries/science/math/caffe2 { + caffe2 = callPackage ../development/libraries/science/math/caffe2 (rec { eigen3 = eigen3_3; inherit (python3Packages) python future six numpy pydot; protobuf = protobuf3_1; - python-protobuf = python3Packages.protobuf3_1; + python-protobuf = python3Packages.protobuf.override { inherit protobuf; }; # Used only for image loading. opencv3 = opencv3WithoutCuda; - }; + }); cntk = callPackage ../applications/science/math/cntk rec { cudaSupport = pkgs.config.cudaSupport or false; diff --git a/pkgs/top-level/python-packages.nix b/pkgs/top-level/python-packages.nix index 9f0118a13c47..ddebccef4686 100644 --- a/pkgs/top-level/python-packages.nix +++ b/pkgs/top-level/python-packages.nix @@ -1516,6 +1516,8 @@ in { dopy = callPackage ../development/python-modules/dopy { }; + dpath = callPackage ../development/python-modules/dpath { }; + dpkt = callPackage ../development/python-modules/dpkt {}; urllib3 = callPackage ../development/python-modules/urllib3 {}; @@ -2222,8 +2224,6 @@ in { pyfribidi = callPackage ../development/python-modules/pyfribidi { }; - docker_compose = callPackage ../development/python-modules/docker_compose {}; - pyftpdlib = callPackage ../development/python-modules/pyftpdlib { }; fdroidserver = callPackage ../development/python-modules/fdroidserver { }; @@ -2468,6 +2468,8 @@ in { hetzner = callPackage ../development/python-modules/hetzner { }; + homeassistant-pyozw = callPackage ../development/python-modules/homeassistant-pyozw { }; + htmllaundry = callPackage ../development/python-modules/htmllaundry { }; html5lib = callPackage ../development/python-modules/html5lib { }; @@ -2746,9 +2748,11 @@ in { mathics = callPackage ../development/python-modules/mathics { }; - matplotlib = callPackage ../development/python-modules/matplotlib { + matplotlib = let + path = if isPy3k then ../development/python-modules/matplotlib/default.nix else + ../development/python-modules/matplotlib/2.nix; + in callPackage path { stdenv = if stdenv.isDarwin then pkgs.clangStdenv else pkgs.stdenv; - enableGhostscript = true; inherit (pkgs.darwin.apple_sdk.frameworks) Cocoa; }; @@ -3030,6 +3034,8 @@ in { ply = callPackage ../development/python-modules/ply { }; + plyplus = callPackage ../development/python-modules/plyplus { }; + plyvel = callPackage ../development/python-modules/plyvel { }; osc = callPackage ../development/python-modules/osc { }; @@ -3247,12 +3253,6 @@ in { protobuf = pkgs.protobuf; }; - protobuf3_1 = callPackage ../development/python-modules/protobuf { - disabled = isPyPy; - doCheck = !isPy3k; - protobuf = pkgs.protobuf3_1; - }; - psd-tools = callPackage ../development/python-modules/psd-tools { }; psutil = callPackage ../development/python-modules/psutil { }; @@ -4899,6 +4899,8 @@ in { inherit python; })).python; + scour = callPackage ../development/python-modules/scour { }; + }); in fix' (extends overrides packages)