diff --git a/maintainers/maintainer-list.nix b/maintainers/maintainer-list.nix
index b14431dbb7a4..43d8d58baa10 100644
--- a/maintainers/maintainer-list.nix
+++ b/maintainers/maintainer-list.nix
@@ -603,6 +603,12 @@
fingerprint = "7931 EB4E 4712 D7BE 04F8 6D34 07EE 1FFC A58A 11C5";
}];
};
+ amfl = {
+ email = "amfl@none.none";
+ github = "amfl";
+ githubId = 382798;
+ name = "amfl";
+ };
amiddelk = {
email = "amiddelk@gmail.com";
github = "amiddelk";
diff --git a/nixos/modules/config/swap.nix b/nixos/modules/config/swap.nix
index 9b005021086b..2b94b954cb80 100644
--- a/nixos/modules/config/swap.nix
+++ b/nixos/modules/config/swap.nix
@@ -203,7 +203,6 @@ in
];
# Create missing swapfiles.
- # FIXME: support changing the size of existing swapfiles.
systemd.services =
let
@@ -223,11 +222,7 @@ in
${optionalString (sw.size != null) ''
currentSize=$(( $(stat -c "%s" "${sw.device}" 2>/dev/null || echo 0) / 1024 / 1024 ))
if [ "${toString sw.size}" != "$currentSize" ]; then
- fallocate -l ${toString sw.size}M "${sw.device}" ||
- dd if=/dev/zero of="${sw.device}" bs=1M count=${toString sw.size}
- if [ "${toString sw.size}" -lt "$currentSize" ]; then
- truncate --size "${toString sw.size}M" "${sw.device}"
- fi
+ dd if=/dev/zero of="${sw.device}" bs=1M count=${toString sw.size}
chmod 0600 ${sw.device}
${optionalString (!sw.randomEncryption.enable) "mkswap ${sw.realDevice}"}
fi
diff --git a/nixos/modules/hardware/video/nvidia.nix b/nixos/modules/hardware/video/nvidia.nix
index 917c6d3013e7..5b379505608a 100644
--- a/nixos/modules/hardware/video/nvidia.nix
+++ b/nixos/modules/hardware/video/nvidia.nix
@@ -294,7 +294,7 @@ in
hardware.opengl.extraPackages32 = optional offloadCfg.enable nvidia_x11.lib32;
environment.systemPackages = [ nvidia_x11.bin ]
- ++ optionals nvidiaSettings [ nvidia_x11.settings ]
+ ++ optionals cfg.nvidiaSettings [ nvidia_x11.settings ]
++ optionals nvidiaPersistencedEnabled [ nvidia_x11.persistenced ];
systemd.packages = optional cfg.powerManagement.enable nvidia_x11.out;
diff --git a/nixos/modules/profiles/minimal.nix b/nixos/modules/profiles/minimal.nix
index f044e6f39ea5..e79b92723841 100644
--- a/nixos/modules/profiles/minimal.nix
+++ b/nixos/modules/profiles/minimal.nix
@@ -14,4 +14,6 @@ with lib;
documentation.enable = mkDefault false;
documentation.nixos.enable = mkDefault false;
+
+ programs.command-not-found.enable = mkDefault false;
}
diff --git a/nixos/modules/services/misc/plex.nix b/nixos/modules/services/misc/plex.nix
index 5f99ee866a50..2ae4e80d5c3f 100644
--- a/nixos/modules/services/misc/plex.nix
+++ b/nixos/modules/services/misc/plex.nix
@@ -65,6 +65,29 @@ in
'';
};
+ extraScanners = mkOption {
+ type = types.listOf types.path;
+ default = [];
+ description = ''
+ A list of paths to extra scanners to install in Plex's scanners
+ directory.
+
+ Every time the systemd unit for Plex starts up, all of the symlinks
+ in Plex's scanners directory will be cleared and this module will
+ symlink all of the paths specified here to that directory.
+ '';
+ example = literalExpression ''
+ [
+ (fetchFromGitHub {
+ owner = "ZeroQI";
+ repo = "Absolute-Series-Scanner";
+ rev = "773a39f502a1204b0b0255903cee4ed02c46fde0";
+ sha256 = "4l+vpiDdC8L/EeJowUgYyB3JPNTZ1sauN8liFAcK+PY=";
+ })
+ ]
+ '';
+ };
+
package = mkOption {
type = types.package;
default = pkgs.plex;
@@ -113,6 +136,7 @@ in
# Configuration for our FHS userenv script
PLEX_DATADIR=cfg.dataDir;
PLEX_PLUGINS=concatMapStringsSep ":" builtins.toString cfg.extraPlugins;
+ PLEX_SCANNERS=concatMapStringsSep ":" builtins.toString cfg.extraScanners;
# The following variables should be set by the FHS userenv script:
# PLEX_MEDIA_SERVER_APPLICATION_SUPPORT_DIR
diff --git a/nixos/modules/system/boot/networkd.nix b/nixos/modules/system/boot/networkd.nix
index 662dfe2db989..2e17bdf6bb65 100644
--- a/nixos/modules/system/boot/networkd.nix
+++ b/nixos/modules/system/boot/networkd.nix
@@ -131,6 +131,7 @@ let
"fou"
"xfrm"
"ifb"
+ "batadv"
])
(assertByteFormat "MTUBytes")
(assertMacAddress "MACAddress")
@@ -381,6 +382,29 @@ let
(assertInt "Table")
(assertMinimum "Table" 0)
];
+
+ sectionBatmanAdvanced = checkUnitConfig "BatmanAdvanced" [
+ (assertOnlyFields [
+ "GatewayMode"
+ "Aggregation"
+ "BridgeLoopAvoidance"
+ "DistributedArpTable"
+ "Fragmentation"
+ "HopPenalty"
+ "OriginatorIntervalSec"
+ "GatewayBandwithDown"
+ "GatewayBandwithUp"
+ "RoutingAlgorithm"
+ ])
+ (assertValueOneOf "GatewayMode" ["off" "client" "server"])
+ (assertValueOneOf "Aggregation" boolValues)
+ (assertValueOneOf "BridgeLoopAvoidance" boolValues)
+ (assertValueOneOf "DistributedArpTable" boolValues)
+ (assertValueOneOf "Fragmentation" boolValues)
+ (assertInt "HopPenalty")
+ (assertRange "HopPenalty" 0 255)
+ (assertValueOneOf "RoutingAlgorithm" ["batman-v" "batman-iv"])
+ ];
};
network = {
@@ -473,6 +497,7 @@ let
"IgnoreCarrierLoss"
"Xfrm"
"KeepConfiguration"
+ "BatmanAdvanced"
])
# Note: For DHCP the values both, none, v4, v6 are deprecated
(assertValueOneOf "DHCP" ["yes" "no" "ipv4" "ipv6"])
@@ -1056,6 +1081,21 @@ let
'';
};
+ batmanAdvancedConfig = mkOption {
+ default = {};
+ example = {
+ GatewayMode = "server";
+ RoutingAlgorithm = "batman-v";
+ };
+ type = types.addCheck (types.attrsOf unitOption) check.netdev.sectionBatmanAdvanced;
+ description = ''
+ Each attribute in this set specifies an option in the
+ [BatmanAdvanced] section of the unit. See
+ systemd.netdev
+ 5 for details.
+ '';
+ };
+
};
addressOptions = {
@@ -1507,6 +1547,10 @@ let
[VRF]
${attrsToSection def.vrfConfig}
''
+ + optionalString (def.batmanAdvancedConfig != { }) ''
+ [BatmanAdvanced]
+ ${attrsToSection def.batmanAdvancedConfig}
+ ''
+ def.extraConfig;
};
diff --git a/pkgs/applications/graphics/ImageMagick/7.0.nix b/pkgs/applications/graphics/ImageMagick/7.0.nix
index a07cf38c0eba..257206b4f27e 100644
--- a/pkgs/applications/graphics/ImageMagick/7.0.nix
+++ b/pkgs/applications/graphics/ImageMagick/7.0.nix
@@ -18,13 +18,13 @@ in
stdenv.mkDerivation rec {
pname = "imagemagick";
- version = "7.1.0-13";
+ version = "7.1.0-14";
src = fetchFromGitHub {
owner = "ImageMagick";
repo = "ImageMagick";
rev = version;
- sha256 = "sha256-W/XqgYOlSailHQdNBYsvf2P9go9sblWayDLrQQlekro=";
+ sha256 = "sha256-w4h4KEfmDC/dDgtk7xgEnIYvSfPlKfsvdFhx43Tn9GA=";
};
outputs = [ "out" "dev" "doc" ]; # bin/ isn't really big
diff --git a/pkgs/applications/networking/browsers/chromium/upstream-info.json b/pkgs/applications/networking/browsers/chromium/upstream-info.json
index ca73b620cfbb..313a03d0dd2f 100644
--- a/pkgs/applications/networking/browsers/chromium/upstream-info.json
+++ b/pkgs/applications/networking/browsers/chromium/upstream-info.json
@@ -31,9 +31,9 @@
}
},
"dev": {
- "version": "97.0.4692.8",
- "sha256": "0n47jfxs05g55p69f5939jf5pgyw88n4cpg78k019n3zr2vlv1qf",
- "sha256bin64": "1gisqc6dz7yfigj0dji7cnx5jdcjz0gmn248cp2a6zs9mfvwwbqv",
+ "version": "97.0.4692.20",
+ "sha256": "1njgfz3kz1pyyaaskqc47ldy2gzc3c9a8mjib81nalzrqbmd3372",
+ "sha256bin64": "06vsmzz8nvmx7hfqwvqfmq4h000dw22srxdrgrdfgh7mry0yvf4a",
"deps": {
"gn": {
"version": "2021-11-03",
diff --git a/pkgs/applications/networking/cluster/spacegun/node-composition.nix b/pkgs/applications/networking/cluster/spacegun/node-composition.nix
index 7cbb2328ae73..9d532a3861a1 100644
--- a/pkgs/applications/networking/cluster/spacegun/node-composition.nix
+++ b/pkgs/applications/networking/cluster/spacegun/node-composition.nix
@@ -6,7 +6,7 @@
let
nodeEnv = import ../../../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv lib python2 runCommand writeTextFile;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/applications/networking/cluster/terraform-providers/providers.json b/pkgs/applications/networking/cluster/terraform-providers/providers.json
index ffcc0b3d43b1..3023bb6c7ac1 100644
--- a/pkgs/applications/networking/cluster/terraform-providers/providers.json
+++ b/pkgs/applications/networking/cluster/terraform-providers/providers.json
@@ -179,10 +179,10 @@
"owner": "cloudflare",
"provider-source-address": "registry.terraform.io/cloudflare/cloudflare",
"repo": "terraform-provider-cloudflare",
- "rev": "v2.23.0",
- "sha256": "0cyw6lddw3pj5lqra78qn0nd16ffay86vc8sqa68grx7ik9jgn7l",
- "vendorSha256": "19fdwif81lqp848jhawd09b0lalslrwadd519vsdw03v2wp4p962",
- "version": "2.23.0"
+ "rev": "v3.4.0",
+ "sha256": "1w37wkpb785jfqq91piclcsrhy3idpbmwb90n5y7rkgmm37ij7ij",
+ "vendorSha256": "004pb5xnvisq3j113i6qfvnh1j06nkpkgzav3wb08k0bl19b6jks",
+ "version": "3.4.0"
},
"cloudinit": {
"owner": "hashicorp",
diff --git a/pkgs/applications/version-management/commitizen/generate-dependencies.sh b/pkgs/applications/version-management/commitizen/generate-dependencies.sh
index 7111289d2909..9855e2d41d1a 100755
--- a/pkgs/applications/version-management/commitizen/generate-dependencies.sh
+++ b/pkgs/applications/version-management/commitizen/generate-dependencies.sh
@@ -1,5 +1,5 @@
#!/usr/bin/env nix-shell
-#! nix-shell -i bash -p nodePackages.node2nix
+#! nix-shell -I nixpkgs=../../../.. -i bash -p nodePackages.node2nix
node2nix \
--node-env node-env.nix \
diff --git a/pkgs/applications/version-management/commitizen/node-composition.nix b/pkgs/applications/version-management/commitizen/node-composition.nix
index 0769168a78fa..53bdef1f9864 100644
--- a/pkgs/applications/version-management/commitizen/node-composition.nix
+++ b/pkgs/applications/version-management/commitizen/node-composition.nix
@@ -1,4 +1,4 @@
-# This file has been generated by node2nix 1.8.0. Do not edit!
+# This file has been generated by node2nix 1.9.0. Do not edit!
{pkgs ? import {
inherit system;
@@ -6,12 +6,12 @@
let
nodeEnv = import ./node-env.nix {
- inherit (pkgs) lib stdenv python2 util-linux runCommand writeTextFile;
- inherit nodejs;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
+ inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
in
import ./node-packages.nix {
- inherit (pkgs) fetchurl fetchgit;
+ inherit (pkgs) fetchurl nix-gitignore stdenv lib fetchgit;
inherit nodeEnv;
}
diff --git a/pkgs/applications/version-management/commitizen/node-env.nix b/pkgs/applications/version-management/commitizen/node-env.nix
index 262df27e464f..5f055785791b 100644
--- a/pkgs/applications/version-management/commitizen/node-env.nix
+++ b/pkgs/applications/version-management/commitizen/node-env.nix
@@ -1,8 +1,11 @@
# This file originates from node2nix
-{lib, stdenv, nodejs, python2, util-linux, libtool, runCommand, writeTextFile}:
+{lib, stdenv, nodejs, python2, pkgs, libtool, runCommand, writeTextFile, writeShellScript}:
let
+ # Workaround to cope with utillinux in Nixpkgs 20.09 and util-linux in Nixpkgs master
+ utillinux = if pkgs ? utillinux then pkgs.utillinux else pkgs.util-linux;
+
python = if nodejs ? python then nodejs.python else python2;
# Create a tar wrapper that filters all the 'Ignoring unknown extended header keyword' noise
@@ -37,36 +40,22 @@ let
'';
};
- includeDependencies = {dependencies}:
- lib.optionalString (dependencies != [])
- (lib.concatMapStrings (dependency:
- ''
- # Bundle the dependencies of the package
- mkdir -p node_modules
- cd node_modules
+ # Common shell logic
+ installPackage = writeShellScript "install-package" ''
+ installPackage() {
+ local packageName=$1 src=$2
- # Only include dependencies if they don't exist. They may also be bundled in the package.
- if [ ! -e "${dependency.name}" ]
- then
- ${composePackage dependency}
- fi
+ local strippedName
- cd ..
- ''
- ) dependencies);
-
- # Recursively composes the dependencies of a package
- composePackage = { name, packageName, src, dependencies ? [], ... }@args:
- builtins.addErrorContext "while evaluating node package '${packageName}'" ''
- DIR=$(pwd)
+ local DIR=$PWD
cd $TMPDIR
- unpackFile ${src}
+ unpackFile $src
# Make the base dir in which the target dependency resides first
- mkdir -p "$(dirname "$DIR/${packageName}")"
+ mkdir -p "$(dirname "$DIR/$packageName")"
- if [ -f "${src}" ]
+ if [ -f "$src" ]
then
# Figure out what directory has been unpacked
packageDir="$(find . -maxdepth 1 -type d | tail -1)"
@@ -76,28 +65,53 @@ let
chmod -R u+w "$packageDir"
# Move the extracted tarball into the output folder
- mv "$packageDir" "$DIR/${packageName}"
- elif [ -d "${src}" ]
+ mv "$packageDir" "$DIR/$packageName"
+ elif [ -d "$src" ]
then
# Get a stripped name (without hash) of the source directory.
# On old nixpkgs it's already set internally.
if [ -z "$strippedName" ]
then
- strippedName="$(stripHash ${src})"
+ strippedName="$(stripHash $src)"
fi
# Restore write permissions to make building work
chmod -R u+w "$strippedName"
# Move the extracted directory into the output folder
- mv "$strippedName" "$DIR/${packageName}"
+ mv "$strippedName" "$DIR/$packageName"
fi
- # Unset the stripped name to not confuse the next unpack step
- unset strippedName
+ # Change to the package directory to install dependencies
+ cd "$DIR/$packageName"
+ }
+ '';
- # Include the dependencies of the package
- cd "$DIR/${packageName}"
+ # Bundle the dependencies of the package
+ #
+ # Only include dependencies if they don't exist. They may also be bundled in the package.
+ includeDependencies = {dependencies}:
+ lib.optionalString (dependencies != []) (
+ ''
+ mkdir -p node_modules
+ cd node_modules
+ ''
+ + (lib.concatMapStrings (dependency:
+ ''
+ if [ ! -e "${dependency.name}" ]; then
+ ${composePackage dependency}
+ fi
+ ''
+ ) dependencies)
+ + ''
+ cd ..
+ ''
+ );
+
+ # Recursively composes the dependencies of a package
+ composePackage = { name, packageName, src, dependencies ? [], ... }@args:
+ builtins.addErrorContext "while evaluating node package '${packageName}'" ''
+ installPackage "${packageName}" "${src}"
${includeDependencies { inherit dependencies; }}
cd ..
${lib.optionalString (builtins.substring 0 1 packageName == "@") "cd .."}
@@ -242,8 +256,8 @@ let
if(fs.existsSync("./package-lock.json")) {
var packageLock = JSON.parse(fs.readFileSync("./package-lock.json"));
- if(packageLock.lockfileVersion !== 1) {
- process.stderr.write("Sorry, I only understand lock file version 1!\n");
+ if(![1, 2].includes(packageLock.lockfileVersion)) {
+ process.stderr.write("Sorry, I only understand lock file versions 1 and 2!\n");
process.exit(1);
}
@@ -388,15 +402,16 @@ let
, dontStrip ? true
, unpackPhase ? "true"
, buildPhase ? "true"
+ , meta ? {}
, ... }@args:
let
- extraArgs = removeAttrs args [ "name" "dependencies" "buildInputs" "dontStrip" "dontNpmInstall" "preRebuild" "unpackPhase" "buildPhase" ];
+ extraArgs = removeAttrs args [ "name" "dependencies" "buildInputs" "dontStrip" "dontNpmInstall" "preRebuild" "unpackPhase" "buildPhase" "meta" ];
in
stdenv.mkDerivation ({
- name = "node_${name}-${version}";
+ name = "${name}-${version}";
buildInputs = [ tarWrapper python nodejs ]
- ++ lib.optional (stdenv.isLinux) util-linux
+ ++ lib.optional (stdenv.isLinux) utillinux
++ lib.optional (stdenv.isDarwin) libtool
++ buildInputs;
@@ -411,6 +426,8 @@ let
passAsFile = [ "compositionScript" "pinpointDependenciesScript" ];
installPhase = ''
+ source ${installPackage}
+
# Create and enter a root node_modules/ folder
mkdir -p $out/lib/node_modules
cd $out/lib/node_modules
@@ -443,10 +460,15 @@ let
# Run post install hook, if provided
runHook postInstall
'';
+
+ meta = {
+ # default to Node.js' platforms
+ platforms = nodejs.meta.platforms;
+ } // meta;
} // extraArgs);
- # Builds a development shell
- buildNodeShell =
+ # Builds a node environment (a node_modules folder and a set of binaries)
+ buildNodeDependencies =
{ name
, packageName
, version
@@ -465,12 +487,12 @@ let
let
extraArgs = removeAttrs args [ "name" "dependencies" "buildInputs" ];
-
- nodeDependencies = stdenv.mkDerivation ({
+ in
+ stdenv.mkDerivation ({
name = "node-dependencies-${name}-${version}";
buildInputs = [ tarWrapper python nodejs ]
- ++ lib.optional (stdenv.isLinux) util-linux
+ ++ lib.optional (stdenv.isLinux) utillinux
++ lib.optional (stdenv.isDarwin) libtool
++ buildInputs;
@@ -483,6 +505,8 @@ let
passAsFile = [ "includeScript" "pinpointDependenciesScript" ];
installPhase = ''
+ source ${installPackage}
+
mkdir -p $out/${packageName}
cd $out/${packageName}
@@ -512,11 +536,32 @@ let
ln -s $out/lib/node_modules/.bin $out/bin
'';
} // extraArgs);
+
+ # Builds a development shell
+ buildNodeShell =
+ { name
+ , packageName
+ , version
+ , src
+ , dependencies ? []
+ , buildInputs ? []
+ , production ? true
+ , npmFlags ? ""
+ , dontNpmInstall ? false
+ , bypassCache ? false
+ , reconstructLock ? false
+ , dontStrip ? true
+ , unpackPhase ? "true"
+ , buildPhase ? "true"
+ , ... }@args:
+
+ let
+ nodeDependencies = buildNodeDependencies args;
in
stdenv.mkDerivation {
name = "node-shell-${name}-${version}";
- buildInputs = [ python nodejs ] ++ lib.optional (stdenv.isLinux) util-linux ++ buildInputs;
+ buildInputs = [ python nodejs ] ++ lib.optional (stdenv.isLinux) utillinux ++ buildInputs;
buildCommand = ''
mkdir -p $out/bin
cat > $out/bin/shell <=2021.5.24"
+ '';
+
# Tests are broken (attempt to import a file that tells you not to import it,
# amongst other things)
doCheck = false;
diff --git a/pkgs/development/python-modules/unicorn/default.nix b/pkgs/development/python-modules/unicorn/default.nix
index 484f422adf3e..c9043afa85d9 100644
--- a/pkgs/development/python-modules/unicorn/default.nix
+++ b/pkgs/development/python-modules/unicorn/default.nix
@@ -1,10 +1,17 @@
-{ lib, stdenv, buildPythonPackage, setuptools, unicorn-emu }:
+{ lib
+, stdenv
+, buildPythonPackage
+, setuptools
+, unicorn-emu
+}:
buildPythonPackage rec {
pname = "unicorn";
version = lib.getVersion unicorn-emu;
+ format = "setuptools";
src = unicorn-emu.src;
+
sourceRoot = "source/bindings/python";
prePatch = ''
@@ -12,12 +19,21 @@ buildPythonPackage rec {
ln -s ${unicorn-emu}/lib/libunicorn.a prebuilt/
'';
- propagatedBuildInputs = [ setuptools ];
+ propagatedBuildInputs = [
+ setuptools
+ ];
+
+ # No tests present
+ doCheck = false;
+
+ pythonImportsCheck = [
+ "unicorn"
+ ];
meta = with lib; {
description = "Python bindings for Unicorn CPU emulator engine";
homepage = "https://www.unicorn-engine.org/";
- license = [ licenses.gpl2 ];
+ license = licenses.gpl2Plus;
maintainers = with maintainers; [ bennofs ris ];
};
}
diff --git a/pkgs/development/python-modules/xknx/default.nix b/pkgs/development/python-modules/xknx/default.nix
index f28a5c6a72a6..d7cf63f003d0 100644
--- a/pkgs/development/python-modules/xknx/default.nix
+++ b/pkgs/development/python-modules/xknx/default.nix
@@ -11,14 +11,16 @@
buildPythonPackage rec {
pname = "xknx";
- version = "0.18.12";
- disabled = pythonOlder "3.7";
+ version = "0.18.13";
+ format = "setuptools";
+
+ disabled = pythonOlder "3.8";
src = fetchFromGitHub {
owner = "XKNX";
repo = pname;
rev = version;
- sha256 = "sha256-Wk6+IRIGMaOPOEVEyzalBKyK88Y2yfKKo6T0fKxeOOE=";
+ sha256 = "sha256-GZ5FRPQn69+/Fnx10VKWSIAaVXCcVyfvQVH1JaMGRC0=";
};
propagatedBuildInputs = [
@@ -32,7 +34,9 @@ buildPythonPackage rec {
pytestCheckHook
];
- pythonImportsCheck = [ "xknx" ];
+ pythonImportsCheck = [
+ "xknx"
+ ];
meta = with lib; {
description = "KNX Library Written in Python";
diff --git a/pkgs/development/tools/godot/default.nix b/pkgs/development/tools/godot/default.nix
index c781cb815f76..e72ea1138428 100644
--- a/pkgs/development/tools/godot/default.nix
+++ b/pkgs/development/tools/godot/default.nix
@@ -1,7 +1,24 @@
-{ stdenv, lib, fetchFromGitHub, scons, pkg-config, udev, libX11
-, libXcursor , libXinerama, libXrandr, libXrender, libpulseaudio
-, libXi, libXext, libXfixes, freetype, openssl
-, alsa-lib, libGLU, zlib, yasm
+{ stdenv
+, lib
+, fetchFromGitHub
+, scons
+, pkg-config
+, udev
+, libX11
+, libXcursor
+, libXinerama
+, libXrandr
+, libXrender
+, libpulseaudio
+, libXi
+, libXext
+, libXfixes
+, freetype
+, openssl
+, alsa-lib
+, libGLU
+, zlib
+, yasm
, withUdev ? true
}:
@@ -11,34 +28,49 @@ let
pulseaudio = false;
udev = withUdev;
};
-in stdenv.mkDerivation rec {
+in
+stdenv.mkDerivation rec {
pname = "godot";
- version = "3.3.3";
+ version = "3.4";
src = fetchFromGitHub {
- owner = "godotengine";
- repo = "godot";
- rev = "${version}-stable";
- sha256 = "0bkng0iwsfawxk8bxlq01ib4n6kaxjkbwcif1bhpvw5ra19430rg";
+ owner = "godotengine";
+ repo = "godot";
+ rev = "${version}-stable";
+ sha256 = "0y542zla6msgxf31rd0349d9j3ya7f3njnwmmrh8lmzfgxx86qbx";
};
nativeBuildInputs = [ pkg-config ];
buildInputs = [
- scons udev libX11 libXcursor libXinerama libXrandr libXrender
- libXi libXext libXfixes freetype openssl alsa-lib libpulseaudio
- libGLU zlib yasm
+ scons
+ udev
+ libX11
+ libXcursor
+ libXinerama
+ libXrandr
+ libXrender
+ libXi
+ libXext
+ libXfixes
+ freetype
+ openssl
+ alsa-lib
+ libpulseaudio
+ libGLU
+ zlib
+ yasm
];
- patches = [
- ./pkg_config_additions.patch
- ./dont_clobber_environment.patch
- ];
+ patches = [ ./pkg_config_additions.patch ./dont_clobber_environment.patch ];
enableParallelBuilding = true;
sconsFlags = "target=release_debug platform=x11";
preConfigure = ''
- sconsFlags+=" ${lib.concatStringsSep " " (lib.mapAttrsToList (k: v: "${k}=${builtins.toJSON v}") options)}"
+ sconsFlags+=" ${
+ lib.concatStringsSep " "
+ (lib.mapAttrsToList (k: v: "${k}=${builtins.toJSON v}") options)
+ }"
'';
outputs = [ "out" "dev" "man" ];
@@ -62,10 +94,10 @@ in stdenv.mkDerivation rec {
'';
meta = with lib; {
- homepage = "https://godotengine.org";
+ homepage = "https://godotengine.org";
description = "Free and Open Source 2D and 3D game engine";
- license = licenses.mit;
- platforms = [ "i686-linux" "x86_64-linux" ];
+ license = licenses.mit;
+ platforms = [ "i686-linux" "x86_64-linux" ];
maintainers = with maintainers; [ twey ];
};
}
diff --git a/pkgs/development/web/remarkjs/nodepkgs.nix b/pkgs/development/web/remarkjs/nodepkgs.nix
index baacee29ff20..6bb4ea8fbd67 100644
--- a/pkgs/development/web/remarkjs/nodepkgs.nix
+++ b/pkgs/development/web/remarkjs/nodepkgs.nix
@@ -6,7 +6,7 @@
let
nodeEnv = import ../../node-packages/node-env.nix {
- inherit (pkgs) stdenv lib python2 runCommand writeTextFile;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/misc/base16-builder/node-packages.nix b/pkgs/misc/base16-builder/node-packages.nix
index 79748949ff72..459157b82a4c 100644
--- a/pkgs/misc/base16-builder/node-packages.nix
+++ b/pkgs/misc/base16-builder/node-packages.nix
@@ -10,7 +10,7 @@ let
inherit (pkgs) stdenv lib nix-gitignore fetchurl fetchgit;
});
nodeEnv = import ../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv lib python2 runCommand writeTextFile;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/misc/vim-plugins/vim-utils.nix b/pkgs/misc/vim-plugins/vim-utils.nix
index aa97f6b60985..92642016b24a 100644
--- a/pkgs/misc/vim-plugins/vim-utils.nix
+++ b/pkgs/misc/vim-plugins/vim-utils.nix
@@ -199,6 +199,10 @@ let
linkVimlPlugin = plugin: packageName: dir: ''
mkdir -p $out/pack/${packageName}/${dir}
+ if test -e "$out/pack/${packageName}/${dir}/${lib.getName plugin}"; then
+ printf "\nERROR - Duplicated vim plugin: ${lib.getName plugin}\n\n"
+ exit 1
+ fi
ln -sf ${plugin}/${rtpPath} $out/pack/${packageName}/${dir}/${lib.getName plugin}
'';
diff --git a/pkgs/os-specific/linux/zfs/default.nix b/pkgs/os-specific/linux/zfs/default.nix
index 818452ba2013..50327bc658f2 100644
--- a/pkgs/os-specific/linux/zfs/default.nix
+++ b/pkgs/os-specific/linux/zfs/default.nix
@@ -202,7 +202,7 @@ let
changelog = "https://github.com/openzfs/zfs/releases/tag/zfs-${version}";
license = licenses.cddl;
platforms = platforms.linux;
- maintainers = with maintainers; [ hmenke jcumming jonringer wizeman fpletz globin mic92 ];
+ maintainers = with maintainers; [ hmenke jcumming jonringer wizeman fpletz globin ];
mainProgram = "zfs";
# If your Linux kernel version is not yet supported by zfs, try zfsUnstable.
# On NixOS set the option boot.zfs.enableUnstable.
@@ -215,8 +215,8 @@ in {
# to be adapted
zfsStable = common {
# check the release notes for compatible kernels
- kernelCompatible = kernel.kernelAtLeast "3.10" && kernel.kernelOlder "5.16";
- latestCompatibleLinuxPackages = linuxPackages_5_15;
+ kernelCompatible = kernel.kernelAtLeast "3.10" && kernel.kernelOlder "5.15";
+ latestCompatibleLinuxPackages = linuxPackages_5_14;
# this package should point to the latest release.
version = "2.1.1";
@@ -226,8 +226,8 @@ in {
zfsUnstable = common {
# check the release notes for compatible kernels
- kernelCompatible = kernel.kernelAtLeast "3.10" && kernel.kernelOlder "5.16";
- latestCompatibleLinuxPackages = linuxPackages_5_15;
+ kernelCompatible = kernel.kernelAtLeast "3.10" && kernel.kernelOlder "5.15";
+ latestCompatibleLinuxPackages = linuxPackages_5_14;
# this package should point to a version / git revision compatible with the latest kernel release
# IMPORTANT: Always use a tagged release candidate or commits from the
diff --git a/pkgs/servers/gemini/gmid/default.nix b/pkgs/servers/gemini/gmid/default.nix
index f06498d583b5..803945c7a234 100644
--- a/pkgs/servers/gemini/gmid/default.nix
+++ b/pkgs/servers/gemini/gmid/default.nix
@@ -1,4 +1,4 @@
-{ lib, stdenv, fetchFromGitHub, bison, libressl, libevent }:
+{ lib, stdenv, fetchFromGitHub, fetchpatch, bison, libressl, libevent }:
stdenv.mkDerivation rec {
pname = "gmid";
@@ -11,6 +11,14 @@ stdenv.mkDerivation rec {
sha256 = "sha256-BBd0AL5jRRslxzDnxcTZRR+8J5D23NAQ7mp9K+leXAQ=";
};
+ patches = [
+ # Fix cross-compilation
+ (fetchpatch {
+ url = "https://github.com/omar-polo/gmid/commit/eb77afa8d308a2f4f422df2ff19f023b5b2cc591.patch";
+ sha256 = "sha256-rTTZUpfXOg7X0Ad0Y9evyU7k+aVYpJ0t9SEkNA/sSdk=";
+ })
+ ];
+
nativeBuildInputs = [ bison ];
buildInputs = [ libressl libevent ];
diff --git a/pkgs/servers/jellyfin/node-composition.nix b/pkgs/servers/jellyfin/node-composition.nix
index d0c72d2e8536..fc96c12c5b25 100644
--- a/pkgs/servers/jellyfin/node-composition.nix
+++ b/pkgs/servers/jellyfin/node-composition.nix
@@ -6,7 +6,7 @@
let
nodeEnv = import ../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv lib python2 runCommand writeTextFile;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/servers/matrix-synapse/matrix-appservice-irc/node-composition.nix b/pkgs/servers/matrix-synapse/matrix-appservice-irc/node-composition.nix
index 6fb86dfd79e7..f9a1999f36d7 100644
--- a/pkgs/servers/matrix-synapse/matrix-appservice-irc/node-composition.nix
+++ b/pkgs/servers/matrix-synapse/matrix-appservice-irc/node-composition.nix
@@ -6,7 +6,7 @@
let
nodeEnv = import ../../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv lib python2 runCommand writeTextFile;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/servers/matrix-synapse/matrix-appservice-slack/node-composition.nix b/pkgs/servers/matrix-synapse/matrix-appservice-slack/node-composition.nix
index e0d21f7d44d3..9f0040e2f446 100644
--- a/pkgs/servers/matrix-synapse/matrix-appservice-slack/node-composition.nix
+++ b/pkgs/servers/matrix-synapse/matrix-appservice-slack/node-composition.nix
@@ -6,7 +6,7 @@
let
nodeEnv = import ../../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv lib python2 runCommand writeTextFile;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/servers/monitoring/prometheus/webui/codemirror-promql/default.nix b/pkgs/servers/monitoring/prometheus/webui/codemirror-promql/default.nix
index 20c7e2568cf0..6b56f640ae9a 100644
--- a/pkgs/servers/monitoring/prometheus/webui/codemirror-promql/default.nix
+++ b/pkgs/servers/monitoring/prometheus/webui/codemirror-promql/default.nix
@@ -6,7 +6,7 @@
let
nodeEnv = import ../../../../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv lib python2 runCommand writeTextFile;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/servers/monitoring/prometheus/webui/webui/default.nix b/pkgs/servers/monitoring/prometheus/webui/webui/default.nix
index 20c7e2568cf0..6b56f640ae9a 100644
--- a/pkgs/servers/monitoring/prometheus/webui/webui/default.nix
+++ b/pkgs/servers/monitoring/prometheus/webui/webui/default.nix
@@ -6,7 +6,7 @@
let
nodeEnv = import ../../../../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv lib python2 runCommand writeTextFile;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/servers/mx-puppet-discord/node-composition.nix b/pkgs/servers/mx-puppet-discord/node-composition.nix
index 777c9db52568..1285e13cfba4 100644
--- a/pkgs/servers/mx-puppet-discord/node-composition.nix
+++ b/pkgs/servers/mx-puppet-discord/node-composition.nix
@@ -6,7 +6,7 @@
let
nodeEnv = import ../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv lib python2 runCommand writeTextFile;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/servers/plex/default.nix b/pkgs/servers/plex/default.nix
index 3d69d2197803..fd580d52d8a0 100644
--- a/pkgs/servers/plex/default.nix
+++ b/pkgs/servers/plex/default.nix
@@ -63,13 +63,9 @@ buildFHSUserEnv {
test -d "$pluginDir" || mkdir -p "$pluginDir"
# First, remove all of the symlinks in the plugins directory.
- echo "Removing old symlinks"
- for f in $(ls "$pluginDir/"); do
- if [[ -L "$pluginDir/$f" ]]; then
- echo "Removing plugin symlink: $pluginDir/$f"
- rm "$pluginDir/$f"
- fi
- done
+ while IFS= read -r -d $'\0' f; do
+ echo "Removing plugin symlink: $f"
+ done < <(find "$pluginDir" -type l -print0)
echo "Symlinking plugins"
IFS=':' read -ra pluginsArray <<< "$PLEX_PLUGINS"
@@ -87,6 +83,39 @@ buildFHSUserEnv {
done
fi
+ if [[ -n "''${PLEX_SCANNERS:-}" ]]; then
+ for scannerType in Common Movies Music Series; do
+ echo "Preparing $scannerType scanners directory"
+
+ scannerDir="$PLEX_DATADIR/Plex Media Server/Scanners/$scannerType"
+ test -d "$scannerDir" || mkdir -p "$scannerDir"
+
+ # First, remove all of the symlinks in the scanners directory.
+ echo "Removing old symlinks"
+ while IFS= read -r -d $'\0' f; do
+ echo "Removing scanner symlink: $f"
+ done < <(find "$scannerDir" -type l -print0)
+
+ echo "Symlinking scanners"
+ IFS=':' read -ra scannersArray <<< "$PLEX_SCANNERS"
+ for path in "''${scannersArray[@]}"; do
+ # The provided source should contain a 'Scanners' directory; symlink
+ # from inside that.
+ subpath="$path/Scanners/$scannerType"
+ while IFS= read -r -d $'\0' file; do
+ dest="$scannerDir/$(basename "$file")"
+
+ if [[ -f "$dest" || -L "$dest" ]]; then
+ echo "Error symlinking scanner from $file to $dest: file or directory already exists"
+ else
+ echo "Symlinking scanner at: $file"
+ ln -s "$file" "$dest"
+ fi
+ done < <(find "$subpath" -type f -print0)
+ done
+ done
+ fi
+
# Tell Plex to use the data directory as the "Application Support"
# directory, otherwise it tries to write things into the user's home
# directory.
diff --git a/pkgs/servers/web-apps/cryptpad/node-packages.nix b/pkgs/servers/web-apps/cryptpad/node-packages.nix
index 76d5cf6a202f..0961603968ea 100644
--- a/pkgs/servers/web-apps/cryptpad/node-packages.nix
+++ b/pkgs/servers/web-apps/cryptpad/node-packages.nix
@@ -6,7 +6,7 @@
let
nodeEnv = import ../../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv lib python2 runCommand writeTextFile;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/servers/web-apps/whitebophir/node-packages.nix b/pkgs/servers/web-apps/whitebophir/node-packages.nix
index 76d5cf6a202f..0961603968ea 100644
--- a/pkgs/servers/web-apps/whitebophir/node-packages.nix
+++ b/pkgs/servers/web-apps/whitebophir/node-packages.nix
@@ -6,7 +6,7 @@
let
nodeEnv = import ../../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv lib python2 runCommand writeTextFile;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/tools/audio/botamusique/default.nix b/pkgs/tools/audio/botamusique/default.nix
index d13bbd13c922..a1c78768f6ab 100644
--- a/pkgs/tools/audio/botamusique/default.nix
+++ b/pkgs/tools/audio/botamusique/default.nix
@@ -17,7 +17,7 @@
let
nodejs = pkgs.nodejs-12_x;
nodeEnv = import ../../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv lib python2 runCommand writeTextFile;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/tools/graphics/ldgallery/viewer/node-composition.nix b/pkgs/tools/graphics/ldgallery/viewer/node-composition.nix
index aaf54a05c884..02fdb925fb1b 100644
--- a/pkgs/tools/graphics/ldgallery/viewer/node-composition.nix
+++ b/pkgs/tools/graphics/ldgallery/viewer/node-composition.nix
@@ -6,7 +6,7 @@
let
nodeEnv = import ../../../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv lib python2 runCommand writeTextFile;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/tools/misc/mongodb-compass/default.nix b/pkgs/tools/misc/mongodb-compass/default.nix
index 8baeb1556b14..e11d0899df4e 100644
--- a/pkgs/tools/misc/mongodb-compass/default.nix
+++ b/pkgs/tools/misc/mongodb-compass/default.nix
@@ -1,9 +1,40 @@
-{ lib, stdenv, fetchurl, dpkg
-, alsa-lib, at-spi2-atk, at-spi2-core, atk, cairo, cups, curl, dbus, expat, fontconfig, freetype, glib
-, gnome2, gdk-pixbuf, gtk3, pango, libnotify, libsecret, libuuid, libxcb, nspr, nss, systemd, xorg, wrapGAppsHook }:
+{
+alsa-lib,
+at-spi2-atk,
+at-spi2-core,
+atk,
+cairo,
+cups,
+curl,
+dbus,
+dpkg,
+expat,
+fetchurl,
+fontconfig,
+freetype,
+gdk-pixbuf,
+glib,
+gnome2,
+gtk3,
+lib,
+libdrm,
+libnotify,
+libsecret,
+libuuid,
+libxcb,
+libxkbcommon,
+mesa,
+nspr,
+nss,
+pango,
+stdenv,
+systemd,
+wrapGAppsHook,
+xorg,
+}:
let
- version = "1.25.0";
+ version = "1.29.4";
rpath = lib.makeLibraryPath [
alsa-lib
@@ -17,22 +48,24 @@ let
expat
fontconfig
freetype
+ gdk-pixbuf
glib
gnome2.GConf
- gdk-pixbuf
gtk3
- pango
+ libdrm
libnotify
libsecret
libuuid
libxcb
+ libxkbcommon
+ mesa
nspr
nss
+ pango
stdenv.cc.cc
systemd
-
- xorg.libxkbfile
xorg.libX11
+ xorg.libXScrnSaver
xorg.libXcomposite
xorg.libXcursor
xorg.libXdamage
@@ -42,14 +75,16 @@ let
xorg.libXrandr
xorg.libXrender
xorg.libXtst
- xorg.libXScrnSaver
- ] + ":${stdenv.cc.cc.lib}/lib64";
+ xorg.libxkbfile
+ xorg.libxshmfence
+ (lib.getLib stdenv.cc.cc)
+ ];
src =
if stdenv.hostPlatform.system == "x86_64-linux" then
fetchurl {
url = "https://downloads.mongodb.com/compass/mongodb-compass_${version}_amd64.deb";
- sha256 = "sha256-998/voQ04fLj3KZCy6BueUoI1v++4BoGRTGJT7Nsv40=";
+ sha256 = "sha256-CqC6BrRhMfjxamSwC6ub1u3+FtDuIq3/OMNdUZgpCAQ=";
}
else
throw "MongoDB compass is not supported on ${stdenv.hostPlatform.system}";
@@ -94,8 +129,9 @@ in stdenv.mkDerivation {
meta = with lib; {
description = "The GUI for MongoDB";
+ maintainers = with maintainers; [ bryanasdev000 ];
homepage = "https://www.mongodb.com/products/compass";
- license = licenses.unfree;
+ license = licenses.sspl;
platforms = [ "x86_64-linux" ];
};
}
diff --git a/pkgs/tools/misc/vimpager/build.nix b/pkgs/tools/misc/vimpager/build.nix
index a610a461656c..c77f623c5dcd 100644
--- a/pkgs/tools/misc/vimpager/build.nix
+++ b/pkgs/tools/misc/vimpager/build.nix
@@ -2,6 +2,7 @@
, fetchFromGitHub
, coreutils
, sharutils
+, runtimeShell
, version
, sha256
}:
diff --git a/pkgs/tools/misc/vimpager/latest.nix b/pkgs/tools/misc/vimpager/latest.nix
index c98b9a000147..4ea8d5be57fd 100644
--- a/pkgs/tools/misc/vimpager/latest.nix
+++ b/pkgs/tools/misc/vimpager/latest.nix
@@ -1,7 +1,10 @@
-{ callPackage }:
+{ callPackage, runtimeShell }:
-callPackage ./build.nix {
+(callPackage ./build.nix {
version = "a4da4dfac44d1bbc6986c5c76fea45a60ebdd8e5";
sha256 = "0gcjpw2q263hh8w2sjvq3f3k2d28qpkkv0jnl8hw1l7v604i8zxg";
-}
-
+}).overrideAttrs (old: {
+ postPatch = old.postPatch or "" + ''
+ echo 'echo ${runtimeShell}' > scripts/find_shell
+ '';
+})
diff --git a/pkgs/tools/networking/airfield/node.nix b/pkgs/tools/networking/airfield/node.nix
index 0bcd0eb4b851..e6ff9b78d386 100644
--- a/pkgs/tools/networking/airfield/node.nix
+++ b/pkgs/tools/networking/airfield/node.nix
@@ -6,7 +6,7 @@
let
nodeEnv = import ../../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv lib python2 runCommand writeTextFile;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/tools/networking/gemget/default.nix b/pkgs/tools/networking/gemget/default.nix
new file mode 100644
index 000000000000..e501172f75e5
--- /dev/null
+++ b/pkgs/tools/networking/gemget/default.nix
@@ -0,0 +1,22 @@
+{ lib, buildGoModule, fetchFromGitHub }:
+
+buildGoModule rec {
+ pname = "gemget";
+ version = "1.8.0";
+
+ src = fetchFromGitHub {
+ owner = "makeworld-the-better-one";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "PmtIgxnzfLduNGTx8SNDky6juv+NTJ8Cr++SOCk/QNU=";
+ };
+
+ vendorSha256 = "sha256-Ep6HAJgurxFbA4L77z8V2ar06BBVWlAJS9VoSSUg27U=";
+
+ meta = with lib; {
+ description = "Command line downloader for the Gemini protocol";
+ homepage = "https://github.com/makeworld-the-better-one/gemget";
+ license = licenses.mit;
+ maintainers = with maintainers; [ amfl ];
+ };
+}
diff --git a/pkgs/tools/networking/zerotierone/default.nix b/pkgs/tools/networking/zerotierone/default.nix
index d86eb8c88657..94cd645d177c 100644
--- a/pkgs/tools/networking/zerotierone/default.nix
+++ b/pkgs/tools/networking/zerotierone/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "zerotierone";
- version = "1.8.2";
+ version = "1.8.3";
src = fetchFromGitHub {
owner = "zerotier";
repo = "ZeroTierOne";
rev = version;
- sha256 = "sha256-Itq06zE2AVQ1HSUEQdNUuvEazfU56Hs86T0DEVuF8d4=";
+ sha256 = "sha256-668KZ2E0jx/s+w4pl+oJbPlfdRGr6ypP2/FoFEBReIk=";
};
preConfigure = ''
diff --git a/pkgs/tools/package-management/cargo-outdated/default.nix b/pkgs/tools/package-management/cargo-outdated/default.nix
index 106622706f00..62b91a4e4d1f 100644
--- a/pkgs/tools/package-management/cargo-outdated/default.nix
+++ b/pkgs/tools/package-management/cargo-outdated/default.nix
@@ -1,28 +1,37 @@
-{ lib, stdenv, fetchCrate, rustPlatform, pkg-config, openssl, libiconv, curl, darwin }:
+{ lib
+, rustPlatform
+, fetchCrate
+, pkg-config
+, openssl
+, stdenv
+, curl
+, Security
+, SystemConfiguration
+}:
rustPlatform.buildRustPackage rec {
pname = "cargo-outdated";
- version = "0.9.18";
+ version = "0.10.1";
src = fetchCrate {
inherit pname version;
- sha256 = "19r4nv28iq4cmzs5j127qgvdf7y3pfmgjp6jzzbb8b5xj7w06jhl";
+ sha256 = "sha256-jg8KuIu1SaIRlEI9yvpLCESZfAyNgSThJ6pe7+IM6j0=";
};
- cargoSha256 = "1rf3sxprra9s76iip2xf82kclgs83fhnlx9ykl9hhn2y0z8r3342";
+ cargoSha256 = "sha256-jfZUtUVHEC8zK+FJHSOQxELWTG/Of2WSDoqdg/Sckws=";
nativeBuildInputs = [ pkg-config ];
- buildInputs = [ openssl ]
- ++ lib.optionals stdenv.isDarwin [
- darwin.apple_sdk.frameworks.Security
- darwin.apple_sdk.frameworks.SystemConfiguration
- libiconv
+
+ buildInputs = [ openssl ] ++ lib.optionals stdenv.isDarwin [
curl
+ Security
+ SystemConfiguration
];
meta = with lib; {
description = "A cargo subcommand for displaying when Rust dependencies are out of date";
homepage = "https://github.com/kbknapp/cargo-outdated";
+ changelog = "https://github.com/kbknapp/cargo-outdated/blob/${version}/CHANGELOG.md";
license = with licenses; [ asl20 /* or */ mit ];
maintainers = with maintainers; [ sondr3 ivan ];
};
diff --git a/pkgs/tools/package-management/nixui/nixui.nix b/pkgs/tools/package-management/nixui/nixui.nix
index 0bcd0eb4b851..e6ff9b78d386 100644
--- a/pkgs/tools/package-management/nixui/nixui.nix
+++ b/pkgs/tools/package-management/nixui/nixui.nix
@@ -6,7 +6,7 @@
let
nodeEnv = import ../../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv lib python2 runCommand writeTextFile;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/tools/security/onlykey/onlykey.nix b/pkgs/tools/security/onlykey/onlykey.nix
index 6fb86dfd79e7..f9a1999f36d7 100644
--- a/pkgs/tools/security/onlykey/onlykey.nix
+++ b/pkgs/tools/security/onlykey/onlykey.nix
@@ -6,7 +6,7 @@
let
nodeEnv = import ../../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv lib python2 runCommand writeTextFile;
+ inherit (pkgs) stdenv lib python2 runCommand writeTextFile writeShellScript;
inherit pkgs nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix
index 399ebd351989..be9c07bd4940 100644
--- a/pkgs/top-level/all-packages.nix
+++ b/pkgs/top-level/all-packages.nix
@@ -5439,6 +5439,8 @@ with pkgs;
gelasio = callPackage ../data/fonts/gelasio { };
+ gemget = callPackage ../tools/networking/gemget {};
+
gen-oath-safe = callPackage ../tools/security/gen-oath-safe { };
genext2fs = callPackage ../tools/filesystems/genext2fs { };
@@ -12788,7 +12790,9 @@ with pkgs;
cargo-graph = callPackage ../tools/package-management/cargo-graph { };
cargo-license = callPackage ../tools/package-management/cargo-license { };
cargo-llvm-lines = callPackage ../development/tools/rust/cargo-llvm-lines { };
- cargo-outdated = callPackage ../tools/package-management/cargo-outdated {};
+ cargo-outdated = callPackage ../tools/package-management/cargo-outdated {
+ inherit (darwin.apple_sdk.frameworks) Security SystemConfiguration;
+ };
cargo-release = callPackage ../tools/package-management/cargo-release {
inherit (darwin.apple_sdk.frameworks) Security;
};