summaryrefslogtreecommitdiff
path: root/pkgs/tools
diff options
context:
space:
mode:
Diffstat (limited to 'pkgs/tools')
-rw-r--r--pkgs/tools/X11/bumblebee/default.nix1
-rw-r--r--pkgs/tools/X11/oblogout/default.nix36
-rw-r--r--pkgs/tools/X11/oblogout/oblogout-0.3-fixes.patch66
-rw-r--r--pkgs/tools/X11/xpra/default.nix29
-rw-r--r--pkgs/tools/X11/xpra/gtk3.nix2
-rw-r--r--pkgs/tools/admin/cli53/default.nix7
-rw-r--r--pkgs/tools/admin/dehydrated/default.nix31
-rw-r--r--pkgs/tools/admin/gtk-vnc/default.nix20
-rw-r--r--pkgs/tools/admin/salt/default.nix8
-rw-r--r--pkgs/tools/admin/tigervnc/default.nix1
-rw-r--r--pkgs/tools/archivers/dar/default.nix2
-rw-r--r--pkgs/tools/audio/beets/default.nix2
-rw-r--r--pkgs/tools/audio/mpdris2/default.nix4
-rw-r--r--pkgs/tools/audio/qastools/default.nix11
-rw-r--r--pkgs/tools/backup/amazon-glacier-cmd-interface/default.nix29
-rw-r--r--pkgs/tools/backup/bareos/default.nix4
-rw-r--r--pkgs/tools/backup/bup/default.nix10
-rw-r--r--pkgs/tools/backup/duplicity/default.nix8
-rw-r--r--pkgs/tools/backup/rdup/default.nix2
-rw-r--r--pkgs/tools/bluetooth/blueman/default.nix5
-rw-r--r--pkgs/tools/compression/lhasa/default.nix21
-rw-r--r--pkgs/tools/filesystems/afpfs-ng/default.nix24
-rw-r--r--pkgs/tools/filesystems/btrfs-progs/default.nix4
-rw-r--r--pkgs/tools/filesystems/ceph/generic.nix12
-rw-r--r--pkgs/tools/filesystems/darling-dmg/default.nix2
-rw-r--r--pkgs/tools/filesystems/f2fs-tools/default.nix8
-rw-r--r--pkgs/tools/filesystems/gitfs/default.nix13
-rw-r--r--pkgs/tools/filesystems/glusterfs/default.nix4
-rw-r--r--pkgs/tools/filesystems/snapraid/default.nix6
-rw-r--r--pkgs/tools/filesystems/vmfs-tools/default.nix24
-rw-r--r--pkgs/tools/filesystems/zfstools/default.nix4
-rw-r--r--pkgs/tools/graphics/asymptote/default.nix20
-rw-r--r--pkgs/tools/graphics/gnuplot/default.nix2
-rw-r--r--pkgs/tools/inputmethods/fcitx-engines/fcitx-libpinyin/default.nix43
-rw-r--r--pkgs/tools/inputmethods/ibus-engines/ibus-table/default.nix23
-rw-r--r--pkgs/tools/inputmethods/ibus-engines/ibus-uniemoji/default.nix14
-rw-r--r--pkgs/tools/inputmethods/ibus/wrapper.nix22
-rw-r--r--pkgs/tools/misc/alarm-clock-applet/default.nix3
-rw-r--r--pkgs/tools/misc/bibtex2html/default.nix21
-rw-r--r--pkgs/tools/misc/brltty/default.nix18
-rw-r--r--pkgs/tools/misc/brltty/systemd.patch22
-rw-r--r--pkgs/tools/misc/fluentd/default.nix8
-rw-r--r--pkgs/tools/misc/fontforge/default.nix7
-rw-r--r--pkgs/tools/misc/fpp/default.nix4
-rw-r--r--pkgs/tools/misc/geteltorito/default.nix48
-rw-r--r--pkgs/tools/misc/ipxe/default.nix6
-rw-r--r--pkgs/tools/misc/kalibrate-hackrf/default.nix37
-rw-r--r--pkgs/tools/misc/kargo/default.nix36
-rw-r--r--pkgs/tools/misc/lf/default.nix31
-rw-r--r--pkgs/tools/misc/lf/deps.nix20
-rw-r--r--pkgs/tools/misc/logstash/default.nix20
-rw-r--r--pkgs/tools/misc/lolcat/default.nix8
-rw-r--r--pkgs/tools/misc/man-db/default.nix17
-rw-r--r--pkgs/tools/misc/mc/default.nix8
-rw-r--r--pkgs/tools/misc/mysqltuner/default.nix27
-rw-r--r--pkgs/tools/misc/nixbot/default.nix25
-rw-r--r--pkgs/tools/misc/openopc/default.nix14
-rw-r--r--pkgs/tools/misc/ostree/default.nix17
-rw-r--r--pkgs/tools/misc/parted/default.nix4
-rw-r--r--pkgs/tools/misc/peruse/default.nix42
-rw-r--r--pkgs/tools/misc/remind/default.nix25
-rw-r--r--pkgs/tools/misc/rpm-ostree/default.nix49
-rw-r--r--pkgs/tools/misc/screenfetch/default.nix18
-rw-r--r--pkgs/tools/misc/svtplay-dl/default.nix4
-rw-r--r--pkgs/tools/misc/thin-provisioning-tools/default.nix25
-rw-r--r--pkgs/tools/misc/tmuxp/default.nix9
-rw-r--r--pkgs/tools/misc/umlet/default.nix8
-rw-r--r--pkgs/tools/misc/vdirsyncer/default.nix9
-rw-r--r--pkgs/tools/misc/venus/default.nix2
-rw-r--r--pkgs/tools/misc/xdummy/default.nix1
-rw-r--r--pkgs/tools/misc/xtitle/default.nix6
-rw-r--r--pkgs/tools/misc/xvfb-run/default.nix1
-rw-r--r--pkgs/tools/misc/youtube-dl/default.nix4
-rw-r--r--pkgs/tools/networking/aria2/default.nix4
-rw-r--r--pkgs/tools/networking/burpsuite/default.nix38
-rw-r--r--pkgs/tools/networking/cmst/default.nix10
-rw-r--r--pkgs/tools/networking/dnscrypt-wrapper/default.nix6
-rw-r--r--pkgs/tools/networking/fastd/default.nix26
-rw-r--r--pkgs/tools/networking/flannel/default.nix14
-rw-r--r--pkgs/tools/networking/getmail/default.nix4
-rw-r--r--pkgs/tools/networking/gmvault/default.nix6
-rw-r--r--pkgs/tools/networking/host/default.nix26
-rw-r--r--pkgs/tools/networking/httpie/default.nix6
-rw-r--r--pkgs/tools/networking/httpstat/default.nix25
-rw-r--r--pkgs/tools/networking/kea/default.nix50
-rw-r--r--pkgs/tools/networking/kea/dont-create-var.patch28
-rw-r--r--pkgs/tools/networking/lftp/default.nix14
-rw-r--r--pkgs/tools/networking/linkchecker/default.nix16
-rw-r--r--pkgs/tools/networking/linkchecker/no-version-check.patch14
-rw-r--r--pkgs/tools/networking/modemmanager/default.nix10
-rw-r--r--pkgs/tools/networking/nc6/default.nix18
-rw-r--r--pkgs/tools/networking/network-manager-applet/default.nix7
-rw-r--r--pkgs/tools/networking/network-manager/PppdPath.patch13
-rw-r--r--pkgs/tools/networking/network-manager/default.nix6
-rw-r--r--pkgs/tools/networking/network-manager/openconnect.nix5
-rw-r--r--pkgs/tools/networking/network-manager/openvpn.nix7
-rw-r--r--pkgs/tools/networking/network-manager/pptp.nix7
-rw-r--r--pkgs/tools/networking/network-manager/strongswan.nix34
-rw-r--r--pkgs/tools/networking/network-manager/vpnc.nix7
-rw-r--r--pkgs/tools/networking/offlineimap/default.nix4
-rw-r--r--pkgs/tools/networking/openssh/RH-1380296-NEWKEYS-null-pointer-deref.patch37
-rw-r--r--pkgs/tools/networking/openssh/default.nix6
-rw-r--r--pkgs/tools/networking/openssh/fix-CVE-2016-8858.patch11
-rw-r--r--pkgs/tools/networking/openvpn/default.nix5
-rw-r--r--pkgs/tools/networking/p2p/tahoe-lafs/default.nix2
-rw-r--r--pkgs/tools/networking/shadowsocks-libev/default.nix7
-rw-r--r--pkgs/tools/networking/sshpass/default.nix8
-rw-r--r--pkgs/tools/networking/ssldump/default.nix30
-rw-r--r--pkgs/tools/networking/statsd/node-packages.nix110
-rw-r--r--pkgs/tools/networking/swec/default.nix2
-rw-r--r--pkgs/tools/networking/tinc/default.nix4
-rw-r--r--pkgs/tools/networking/unbound/default.nix6
-rw-r--r--pkgs/tools/networking/wicd/default.nix2
-rw-r--r--pkgs/tools/package-management/fpm/default.nix8
-rw-r--r--pkgs/tools/package-management/koji/default.nix8
-rw-r--r--pkgs/tools/package-management/libhif/default.nix36
-rw-r--r--pkgs/tools/package-management/nixops/generic.nix27
-rw-r--r--pkgs/tools/security/ecryptfs/default.nix4
-rw-r--r--pkgs/tools/security/ecryptfs/helper.nix4
-rw-r--r--pkgs/tools/security/enpass/data.json12
-rw-r--r--pkgs/tools/security/enpass/default.nix106
-rw-r--r--pkgs/tools/security/enpass/update_script.py95
-rw-r--r--pkgs/tools/security/fail2ban/default.nix2
-rw-r--r--pkgs/tools/security/fpm2/default.nix25
-rw-r--r--pkgs/tools/security/gencfsm/default.nix7
-rw-r--r--pkgs/tools/security/gnupg/20.nix7
-rw-r--r--pkgs/tools/security/gnupg/21.nix8
-rw-r--r--pkgs/tools/security/gnupg/fix-libusb-include-path.patch11
-rw-r--r--pkgs/tools/security/knockknock/default.nix9
-rw-r--r--pkgs/tools/security/mpw/default.nix36
-rw-r--r--pkgs/tools/security/nitrokey-app/FixInstallDestination.patch57
-rw-r--r--pkgs/tools/security/nitrokey-app/HeaderPath.patch13
-rw-r--r--pkgs/tools/security/nitrokey-app/default.nix37
-rw-r--r--pkgs/tools/security/nmap/default.nix43
-rw-r--r--pkgs/tools/security/pass/default.nix4
-rw-r--r--pkgs/tools/security/pgpdump/default.nix26
-rw-r--r--pkgs/tools/security/pinentry-mac/default.nix4
-rw-r--r--pkgs/tools/security/ssdeep/default.nix2
-rw-r--r--pkgs/tools/security/sslscan/default.nix11
-rw-r--r--pkgs/tools/security/sudo/default.nix4
-rw-r--r--pkgs/tools/security/sudolikeaboss/default.nix33
-rw-r--r--pkgs/tools/security/sudolikeaboss/deps.nix22
-rw-r--r--pkgs/tools/security/tor/default.nix4
-rw-r--r--pkgs/tools/security/tor/tor-arm.nix2
-rw-r--r--pkgs/tools/system/foreman/default.nix25
-rw-r--r--pkgs/tools/system/freeipmi/default.nix4
-rw-r--r--pkgs/tools/system/hiera-eyaml/default.nix23
-rw-r--r--pkgs/tools/system/netdata/default.nix15
-rw-r--r--pkgs/tools/system/netdata/web_access.patch19
-rw-r--r--pkgs/tools/system/r10k/Gemfile5
-rw-r--r--pkgs/tools/system/r10k/Gemfile.lock49
-rw-r--r--pkgs/tools/system/r10k/default.nix33
-rw-r--r--pkgs/tools/system/r10k/gemset.nix130
-rw-r--r--pkgs/tools/text/a2ps/default.nix4
-rw-r--r--pkgs/tools/text/grin/default.nix8
-rw-r--r--pkgs/tools/text/languagetool/default.nix31
-rw-r--r--pkgs/tools/text/ruby-zoom/Gemfile2
-rw-r--r--pkgs/tools/text/ruby-zoom/Gemfile.lock25
-rw-r--r--pkgs/tools/text/ruby-zoom/default.nix18
-rw-r--r--pkgs/tools/text/ruby-zoom/gemset.nix58
-rw-r--r--pkgs/tools/text/shfmt/default.nix6
-rw-r--r--pkgs/tools/text/silver-searcher/default.nix4
-rw-r--r--pkgs/tools/text/zimreader/default.nix49
-rw-r--r--pkgs/tools/typesetting/asciidoctor/Gemfile.lock38
-rw-r--r--pkgs/tools/typesetting/asciidoctor/default.nix14
-rw-r--r--pkgs/tools/typesetting/asciidoctor/gemset.nix52
-rw-r--r--pkgs/tools/typesetting/tex/dblatex/default.nix6
-rw-r--r--pkgs/tools/typesetting/tex/nix/animatedot.sh2
-rw-r--r--pkgs/tools/typesetting/tex/nix/default.nix2
-rw-r--r--pkgs/tools/typesetting/tex/nix/dot2pdf.sh2
-rw-r--r--pkgs/tools/typesetting/tex/nix/dot2ps.sh2
-rw-r--r--pkgs/tools/typesetting/tex/nix/lhs2tex.sh2
-rw-r--r--pkgs/tools/typesetting/tex/nix/run-latex.sh4
-rw-r--r--pkgs/tools/typesetting/tex/texlive/bin.nix4
-rw-r--r--pkgs/tools/video/atomicparsley/default.nix2
-rw-r--r--pkgs/tools/video/mjpegtools/default.nix2
176 files changed, 2410 insertions, 660 deletions
diff --git a/pkgs/tools/X11/bumblebee/default.nix b/pkgs/tools/X11/bumblebee/default.nix
index e58aa7042d09..480c929e941a 100644
--- a/pkgs/tools/X11/bumblebee/default.nix
+++ b/pkgs/tools/X11/bumblebee/default.nix
@@ -122,7 +122,6 @@ in stdenv.mkDerivation rec {
postInstall = ''
wrapProgram "$out/sbin/bumblebeed" \
- --set XKB_BINDIR "${xkbcomp}/bin" \
--prefix PATH : "${bbdPath}" \
--prefix LD_LIBRARY_PATH : "${bbdLibs}"
diff --git a/pkgs/tools/X11/oblogout/default.nix b/pkgs/tools/X11/oblogout/default.nix
new file mode 100644
index 000000000000..26bb32b17b0c
--- /dev/null
+++ b/pkgs/tools/X11/oblogout/default.nix
@@ -0,0 +1,36 @@
+{ stdenv, fetchFromGitHub, intltool, file, pythonPackages, cairo }:
+
+pythonPackages.buildPythonApplication rec {
+ name = "oblogout-unstable-${version}";
+ version = "2009-11-18";
+
+ src = fetchFromGitHub {
+ owner = "nikdoof";
+ repo = "oblogout";
+ rev = "ee023158c03dee720a1af9b1307b14ed5a95f5a0";
+ sha256 = "0nj87q94idb5ki4wnb2xipfgc6k6clr3rmm4xxh46b58z4zhhbmj";
+ };
+
+ nativeBuildInputs = [ intltool file pythonPackages.distutils_extra ];
+
+ buildInputs = [ cairo ];
+
+ propagatedBuildInputs = [ pythonPackages.pygtk pythonPackages.pillow pythonPackages.dbus-python ];
+
+ patches = [ ./oblogout-0.3-fixes.patch ];
+
+ postPatch = ''
+ substituteInPlace data/oblogout --replace sys.prefix \"$out/${pythonPackages.python.sitePackages}\"
+ substituteInPlace oblogout/__init__.py --replace sys.prefix \"$out\"
+ mkdir -p $out/share/doc
+ cp -a README $out/share/doc
+ '';
+
+ meta = {
+ description = "Openbox logout script";
+ homepage = "https://launchpad.net/oblogout";
+ license = stdenv.lib.licenses.gpl2;
+ platforms = stdenv.lib.platforms.linux;
+ maintainers = [ stdenv.lib.maintainers.romildo ];
+ };
+}
diff --git a/pkgs/tools/X11/oblogout/oblogout-0.3-fixes.patch b/pkgs/tools/X11/oblogout/oblogout-0.3-fixes.patch
new file mode 100644
index 000000000000..c58103c6d407
--- /dev/null
+++ b/pkgs/tools/X11/oblogout/oblogout-0.3-fixes.patch
@@ -0,0 +1,66 @@
+diff --git a/data/oblogout b/data/oblogout
+index 8058c4a..dfe5285 100755
+--- a/data/oblogout
++++ b/data/oblogout
+@@ -77,8 +77,10 @@ def main(argv = None):
+ config = 'data/oblogout.conf'
+ elif os.path.isfile('%s/.config/oblogout.conf' % os.getenv("HOME")):
+ config = '%s/.config/oblogout.conf' % os.getenv("HOME")
+- else:
++ elif os.path.isfile('/etc/oblogout.conf'):
+ config = '/etc/oblogout.conf'
++ else:
++ config = sys.prefix + '/etc/oblogout.conf'
+
+ # Check config in local path, if it exists pass it on
+ if not os.path.isfile(config):
+diff --git a/data/oblogout.conf b/data/oblogout.conf
+index 810872c..b1c1009 100644
+--- a/data/oblogout.conf
++++ b/data/oblogout.conf
+@@ -1,11 +1,11 @@
+ [settings]
+-usehal = true
++usehal = false
+
+ [looks]
+ opacity = 70
+ bgcolor = black
+ buttontheme = simplistic
+-buttons = cancel, logout, restart, shutdown, suspend, lock
++buttons = cancel, logout, restart, shutdown, suspend
+
+ [shortcuts]
+ cancel = Escape
+@@ -17,11 +17,11 @@ lock = K
+ hibernate = H
+
+ [commands]
+-shutdown = shutdown -h now
+-restart = reboot
+-suspend = pmi action suspend
+-hibernate = pmi action hibernate
+-safesuspend = safesuspend
+-lock = gnome-screensaver-command -l
+-switchuser = gdm-control --switch-user
++shutdown = systemctl poweroff
++restart = systemctl reboot
++suspend = systemctl suspend
++hibernate = systemctl hibernate
++# safesuspend = safesuspend
++# lock = gnome-screensaver-command -l
++# switchuser = gdm-control --switch-user
+ logout = openbox --exit
+diff --git a/oblogout/__init__.py b/oblogout/__init__.py
+index b9e4e01..12f521f 100644
+--- a/oblogout/__init__.py
++++ b/oblogout/__init__.py
+@@ -138,7 +138,7 @@ class OpenboxLogout():
+ self.logger.debug("Rendering Fade")
+ # Convert Pixbuf to PIL Image
+ wh = (pb.get_width(),pb.get_height())
+- pilimg = Image.fromstring("RGB", wh, pb.get_pixels())
++ pilimg = Image.frombytes("RGB", wh, pb.get_pixels())
+
+ pilimg = pilimg.point(lambda p: (p * self.opacity) / 255 )
+
diff --git a/pkgs/tools/X11/xpra/default.nix b/pkgs/tools/X11/xpra/default.nix
index f3159533931b..871d5a9dbd8c 100644
--- a/pkgs/tools/X11/xpra/default.nix
+++ b/pkgs/tools/X11/xpra/default.nix
@@ -1,17 +1,20 @@
-{ stdenv, fetchurl, pythonPackages, pkgconfig
+{ stdenv, lib, fetchurl, pythonPackages, pkgconfig
, xorg, gtk2, glib, pango, cairo, gdk_pixbuf, atk
, makeWrapper, xkbcomp, xorgserver, getopt, xauth, utillinux, which, fontsConf, xkeyboard_config
, ffmpeg, x264, libvpx, libwebp
-, libfakeXinerama }:
+, libfakeXinerama
+, gst_all_1, pulseaudioLight, gobjectIntrospection }:
+
+with lib;
let
inherit (pythonPackages) python cython buildPythonApplication;
in buildPythonApplication rec {
- name = "xpra-0.17.5";
+ name = "xpra-0.17.6";
namePrefix = "";
src = fetchurl {
url = "http://xpra.org/src/${name}.tar.xz";
- sha256 = "01k5iax42820pblfadig8rqfa1wlcgpakmjp142gx3fg59fnav3i";
+ sha256 = "1z7v58m45g10icpv22qg4dipafcfsdqkxqz73z3rwsb6r0kdyrpj";
};
buildInputs = [
@@ -26,11 +29,19 @@ in buildPythonApplication rec {
ffmpeg libvpx x264 libwebp
+ gobjectIntrospection
+ gst_all_1.gstreamer
+ gst_all_1.gst-plugins-base
+ gst_all_1.gst-plugins-good
+ gst_all_1.gst-plugins-bad
+ gst_all_1.gst-libav
+
makeWrapper
];
propagatedBuildInputs = with pythonPackages; [
pillow pygtk pygobject2 rencode pycrypto cryptography pycups lz4 dbus-python
+ netifaces numpy websockify pygobject3 gst-python
];
preBuild = ''
@@ -46,19 +57,19 @@ in buildPythonApplication rec {
postInstall = ''
wrapProgram $out/bin/xpra \
- --set XKB_BINDIR "${xkbcomp}/bin" \
--set FONTCONFIG_FILE "${fontsConf}" \
--set XPRA_LOG_DIR "\$HOME/.xpra" \
--set XPRA_INSTALL_PREFIX "$out" \
+ --set GI_TYPELIB_PATH "$GI_TYPELIB_PATH" \
+ --set GST_PLUGIN_SYSTEM_PATH_1_0 "$GST_PLUGIN_SYSTEM_PATH_1_0" \
--prefix LD_LIBRARY_PATH : ${libfakeXinerama}/lib \
- --prefix PATH : ${stdenv.lib.makeBinPath [ getopt xorgserver xauth which utillinux ]}
+ --prefix PATH : ${stdenv.lib.makeBinPath [ getopt xorgserver xauth which utillinux pulseaudioLight ]} \
'';
preCheck = "exit 0";
#TODO: replace postInstall with postFixup to avoid double wrapping of xpra; needs more work though
#postFixup = ''
- # sed -i '2iexport XKB_BINDIR="${xkbcomp}/bin"' $out/bin/xpra
# sed -i '3iexport FONTCONFIG_FILE="${fontsConf}"' $out/bin/xpra
# sed -i '4iexport PATH=${stdenv.lib.makeBinPath [ getopt xorgserver xauth which utillinux ]}\${PATH:+:}\$PATH' $out/bin/xpra
#'';
@@ -67,7 +78,7 @@ in buildPythonApplication rec {
meta = {
homepage = http://xpra.org/;
description = "Persistent remote applications for X";
- platforms = stdenv.lib.platforms.linux;
- maintainers = with stdenv.lib.maintainers; [ tstrobel ];
+ platforms = platforms.linux;
+ maintainers = with maintainers; [ tstrobel offline ];
};
}
diff --git a/pkgs/tools/X11/xpra/gtk3.nix b/pkgs/tools/X11/xpra/gtk3.nix
index aece94234a8c..a9ba93507364 100644
--- a/pkgs/tools/X11/xpra/gtk3.nix
+++ b/pkgs/tools/X11/xpra/gtk3.nix
@@ -51,7 +51,6 @@ buildPythonApplication rec {
postInstall = ''
wrapProgram $out/bin/xpra \
- --set XKB_BINDIR "${xkbcomp}/bin" \
--set FONTCONFIG_FILE "${fontsConf}" \
--prefix LD_LIBRARY_PATH : ${libfakeXinerama}/lib \
--prefix PATH : ${stdenv.lib.makeBinPath [ getopt xorgserver xauth which utillinux ]}
@@ -62,7 +61,6 @@ buildPythonApplication rec {
#TODO: replace postInstall with postFixup to avoid double wrapping of xpra; needs more work though
#postFixup = ''
- # sed -i '2iexport XKB_BINDIR="${xkbcomp}/bin"' $out/bin/xpra
# sed -i '3iexport FONTCONFIG_FILE="${fontsConf}"' $out/bin/xpra
# sed -i '4iexport PATH=${stdenv.lib.makeBinPath [ getopt xorgserver xauth which utillinux ]}\${PATH:+:}\$PATH' $out/bin/xpra
#'';
diff --git a/pkgs/tools/admin/cli53/default.nix b/pkgs/tools/admin/cli53/default.nix
index cfee6a8b94c8..bdb9fd2d4772 100644
--- a/pkgs/tools/admin/cli53/default.nix
+++ b/pkgs/tools/admin/cli53/default.nix
@@ -1,8 +1,7 @@
-{ lib, pythonPackages, fetchurl }:
+{ lib, python2Packages, fetchurl }:
-pythonPackages.buildPythonApplication rec {
+python2Packages.buildPythonApplication rec {
name = "cli53-${version}";
- namePrefix = ""; # Suppress "python27-" name prefix
version = "0.4.4";
src = fetchurl {
@@ -10,7 +9,7 @@ pythonPackages.buildPythonApplication rec {
sha256 = "0s9jzigq6a16m2c3qklssx2lz16cf13g5zh80vh24kxazaxqzbig";
};
- propagatedBuildInputs = with pythonPackages; [
+ propagatedBuildInputs = with python2Packages; [
argparse
boto
dns
diff --git a/pkgs/tools/admin/dehydrated/default.nix b/pkgs/tools/admin/dehydrated/default.nix
new file mode 100644
index 000000000000..6bd915e70508
--- /dev/null
+++ b/pkgs/tools/admin/dehydrated/default.nix
@@ -0,0 +1,31 @@
+{ stdenv, bash, coreutils, curl, diffutils, gawk, gnugrep, gnused, openssl, makeWrapper, fetchFromGitHub }:
+let
+ pkgName = "dehydrated";
+ version = "0.3.1";
+in
+stdenv.mkDerivation rec {
+ name = pkgName + "-" + version;
+
+ src = fetchFromGitHub {
+ owner = "lukas2511";
+ repo = "dehydrated";
+ rev = "v${version}";
+ sha256 = "0prg940ykbsfb4w48bc03j5abycg8v7f9rg9x3kcva37y8ml0jsp";
+ };
+
+ buildInputs = [ makeWrapper ];
+
+ installPhase = ''
+ mkdir -p $out/bin
+ cp -a dehydrated $out/bin
+ wrapProgram "$out/bin/dehydrated" --prefix PATH : "${stdenv.lib.makeBinPath [ openssl coreutils gnused gnugrep diffutils curl gawk ]}"
+ '';
+
+ meta = with stdenv.lib; {
+ inherit (src.meta) homepage;
+ description = "Letsencrypt/acme client implemented as a shell-script";
+ license = licenses.mit;
+ platforms = platforms.all;
+ maintainers = [ maintainers.pstn ];
+ };
+}
diff --git a/pkgs/tools/admin/gtk-vnc/default.nix b/pkgs/tools/admin/gtk-vnc/default.nix
index 5d3053b2a3e3..b6185631551a 100644
--- a/pkgs/tools/admin/gtk-vnc/default.nix
+++ b/pkgs/tools/admin/gtk-vnc/default.nix
@@ -1,36 +1,32 @@
{ stdenv, fetchurl, gobjectIntrospection
-, gtk2, gnutls, cairo, libtool, glib, pkgconfig, libtasn1
+, gnutls, cairo, libtool, glib, pkgconfig, libtasn1
, libffi, cyrus_sasl, intltool, perl, perlPackages, libpulseaudio
-, kbproto, libX11, libXext, xextproto, libgcrypt, gtk3, vala_0_23
-, libogg, enableGTK3 ? false, libgpgerror, pythonPackages }:
+, kbproto, libX11, libXext, xextproto, libgcrypt, gtk3, vala_0_32
+, libogg, libgpgerror, pythonPackages }:
let
- inherit (pythonPackages) pygobject3 pygobject2 pygtk python;
+ inherit (pythonPackages) pygobject3 python;
in stdenv.mkDerivation rec {
name = "gtk-vnc-${version}";
- version = "0.5.3";
+ version = "0.6.0";
src = fetchurl {
- url = "mirror://gnome/sources/gtk-vnc/0.5/${name}.tar.xz";
- sha256 = "1bww2ihxb3zzvifdrcsy1lifr664pvikq17hmr1hsm8fyk4ad46l";
+ url = "mirror://gnome/sources/gtk-vnc/0.6/${name}.tar.xz";
+ sha256 = "9559348805e64d130dae569fee466930175dbe150d2649bb868b5c095f130433";
};
buildInputs = [
python gnutls cairo libtool pkgconfig glib libffi libgcrypt
intltool cyrus_sasl libpulseaudio perl perlPackages.TextCSV
gobjectIntrospection libogg libgpgerror
- ] ++ (if enableGTK3 then [ gtk3 vala_0_23 pygobject3 ] else [ gtk2 pygtk pygobject2 ]);
+ gtk3 vala_0_32 pygobject3 ];
NIX_CFLAGS_COMPILE = "-fstack-protector-all";
configureFlags = [
"--with-python"
"--with-examples"
- (if enableGTK3 then "--with-gtk=3.0" else "--with-gtk=2.0")
];
- makeFlags = stdenv.lib.optionalString (!enableGTK3)
- "CODEGENDIR=${pygobject2}/share/pygobject/2.0/codegen/ DEFSDIR=${pygtk}/share/pygtk/2.0/defs/";
-
# Fix broken .la files
preFixup = ''
sed 's,-lgpg-error,-L${libgpgerror.out}/lib -lgpg-error,' -i $out/lib/*.la
diff --git a/pkgs/tools/admin/salt/default.nix b/pkgs/tools/admin/salt/default.nix
index 0e927dfe1c7a..3386ed86a2a0 100644
--- a/pkgs/tools/admin/salt/default.nix
+++ b/pkgs/tools/admin/salt/default.nix
@@ -1,23 +1,21 @@
{
- stdenv, fetchurl, pythonPackages, openssl,
+ stdenv, fetchurl, python2Packages, openssl,
# Many Salt modules require various Python modules to be installed,
# passing them in this array enables Salt to find them.
extraInputs ? []
}:
-pythonPackages.buildPythonApplication rec {
+python2Packages.buildPythonApplication rec {
name = "salt-${version}";
version = "2016.3.3";
- disabled = pythonPackages.isPy3k;
-
src = fetchurl {
url = "mirror://pypi/s/salt/${name}.tar.gz";
sha256 = "1djjglnh6203y8dirziz5w6zh2lgszxp8ivi86nb7fgijj2h61jr";
};
- propagatedBuildInputs = with pythonPackages; [
+ propagatedBuildInputs = with python2Packages; [
futures
jinja2
markupsafe
diff --git a/pkgs/tools/admin/tigervnc/default.nix b/pkgs/tools/admin/tigervnc/default.nix
index cac1b9b3c92c..eeefd4d99b5c 100644
--- a/pkgs/tools/admin/tigervnc/default.nix
+++ b/pkgs/tools/admin/tigervnc/default.nix
@@ -20,7 +20,6 @@ stdenv.mkDerivation rec {
patchPhase = ''
sed -i -e 's,$(includedir)/pixman-1,${if stdenv ? cross then pixman.crossDrv else pixman}/include/pixman-1,' unix/xserver/hw/vnc/Makefile.am
- sed -i -e '/^$pidFile/a$ENV{XKB_BINDIR}="${if stdenv ? cross then xorg.xkbcomp.crossDrv else xorg.xkbcomp}/bin";' unix/vncserver
sed -i -e '/^\$cmd \.= " -pn";/a$cmd .= " -xkbdir ${if stdenv ? cross then xkeyboard_config.crossDrv else xkeyboard_config}/etc/X11/xkb";' unix/vncserver
fontPath=
for i in $fontDirectories; do
diff --git a/pkgs/tools/archivers/dar/default.nix b/pkgs/tools/archivers/dar/default.nix
index b64b6e4ca0a2..83a73eb388f8 100644
--- a/pkgs/tools/archivers/dar/default.nix
+++ b/pkgs/tools/archivers/dar/default.nix
@@ -9,7 +9,7 @@ stdenv.mkDerivation rec {
};
buildInputs = [ zlib bzip2 openssl lzo libgcrypt gpgme xz ]
- ++ stdenv.lib.optional stdenv.isLinux [ attr e2fsprogs ];
+ ++ stdenv.lib.optionals stdenv.isLinux [ attr e2fsprogs ];
configureFlags = [ "--disable-dar-static" ];
diff --git a/pkgs/tools/audio/beets/default.nix b/pkgs/tools/audio/beets/default.nix
index 05d8bd0990f5..c7b1d6950412 100644
--- a/pkgs/tools/audio/beets/default.nix
+++ b/pkgs/tools/audio/beets/default.nix
@@ -92,8 +92,6 @@ in pythonPackages.buildPythonApplication rec {
pythonPackages.pathlib
pythonPackages.pyyaml
pythonPackages.unidecode
- pythonPackages.python.modules.sqlite3
- pythonPackages.python.modules.readline
] ++ optional enableAcoustid pythonPackages.pyacoustid
++ optional (enableFetchart
|| enableEmbyupdate
diff --git a/pkgs/tools/audio/mpdris2/default.nix b/pkgs/tools/audio/mpdris2/default.nix
index beb69db85815..bbec851b25cc 100644
--- a/pkgs/tools/audio/mpdris2/default.nix
+++ b/pkgs/tools/audio/mpdris2/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, autoreconfHook, intltool
-, pythonPackages, pythonFull
+, pythonPackages
}:
stdenv.mkDerivation rec {
@@ -12,7 +12,7 @@ stdenv.mkDerivation rec {
};
buildInputs = [ intltool autoreconfHook pythonPackages.wrapPython ];
- propagatedBuildInputs = with pythonPackages; [ pythonFull pygtk dbus-python ];
+ propagatedBuildInputs = with pythonPackages; [ python pygtk dbus-python ];
pythonPath = with pythonPackages; [ mpd pygtk dbus-python notify ];
postInstall = "wrapPythonPrograms";
diff --git a/pkgs/tools/audio/qastools/default.nix b/pkgs/tools/audio/qastools/default.nix
index 3fe5b4b8d1a6..3456f0986488 100644
--- a/pkgs/tools/audio/qastools/default.nix
+++ b/pkgs/tools/audio/qastools/default.nix
@@ -1,19 +1,20 @@
-{ stdenv, fetchurl, cmake, alsaLib, udev, qt4 }:
+{ stdenv, fetchurl, cmake, alsaLib, udev, qtbase,
+ qtsvg, qttools, makeQtWrapper }:
let
- version = "0.18.1";
+ version = "0.21.0";
in
stdenv.mkDerivation {
name = "qastools-${version}";
src = fetchurl {
- url = "mirror://sourceforge/qastools/qastools_${version}.tar.bz2";
- sha256 = "1sac6a0j1881wgpv4491b2f4jnhqkab6xyldmcg1wfqb5qkdgzvg";
+ url = "mirror://sourceforge/project/qastools/${version}/qastools_${version}.tar.bz2";
+ sha256 = "1zl9cn5h43n63yp3z1an87xvw554k9hlcz75ddb30lvpcczkmwrh";
};
buildInputs = [
- cmake alsaLib udev qt4
+ cmake alsaLib udev qtbase qtsvg qttools makeQtWrapper
];
cmakeFlags = [
diff --git a/pkgs/tools/backup/amazon-glacier-cmd-interface/default.nix b/pkgs/tools/backup/amazon-glacier-cmd-interface/default.nix
new file mode 100644
index 000000000000..d5f47f9a6c0d
--- /dev/null
+++ b/pkgs/tools/backup/amazon-glacier-cmd-interface/default.nix
@@ -0,0 +1,29 @@
+{ stdenv, fetchFromGitHub, python2Packages }:
+
+python2Packages.buildPythonApplication rec {
+ name = "amazon-glacier-cmd-interface-${version}";
+ version = "2016-09-01";
+
+ src = fetchFromGitHub {
+ owner = "uskudnik";
+ repo = "amazon-glacier-cmd-interface";
+ rev = "9f28132f9872e1aad9e956e5613b976504e930c8";
+ sha256 = "1k5z8kda9v6klr4536pf5qbq9zklxvyysv7nc48gllschl09jywc";
+ };
+
+ propagatedBuildInputs = with python2Packages; [
+ argparse
+ boto
+ dateutil
+ prettytable
+ pytz
+ ];
+
+ meta = {
+ description = "Command line interface for Amazon Glacier";
+ homepage = https://github.com/uskudnik/amazon-glacier-cmd-interface;
+ license = stdenv.lib.licenses.gpl2;
+ maintainers = [ stdenv.lib.maintainers.lovek323 ];
+ };
+
+}
diff --git a/pkgs/tools/backup/bareos/default.nix b/pkgs/tools/backup/bareos/default.nix
index 79da3f8cf9bb..ffa119b3c53b 100644
--- a/pkgs/tools/backup/bareos/default.nix
+++ b/pkgs/tools/backup/bareos/default.nix
@@ -12,14 +12,14 @@ let
in
stdenv.mkDerivation rec {
name = "bareos-${version}";
- version = "15.2.1";
+ version = "15.2.4";
src = fetchFromGitHub {
owner = "bareos";
repo = "bareos";
rev = "Release/${version}";
name = "${name}-src";
- sha256 = "01vnqahzjj598jjk4y7qzfnq415jh227v40sgkrdl4qcpn76spxi";
+ sha256 = "02k6wmr2n12dc6vwda8xczmbqidg6fs8nfg9n2cwwpm3k1a21qnd";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/pkgs/tools/backup/bup/default.nix b/pkgs/tools/backup/bup/default.nix
index f1774507225e..075f1653adf8 100644
--- a/pkgs/tools/backup/bup/default.nix
+++ b/pkgs/tools/backup/bup/default.nix
@@ -22,12 +22,6 @@ stdenv.mkDerivation rec {
buildInputs = [ git pythonPackages.python ];
nativeBuildInputs = [ pandoc perl makeWrapper ];
- patches = optional stdenv.isDarwin (fetchurl {
- url = "https://github.com/bup/bup/commit/75d089e7cdb7a7eb4d69c352f56dad5ad3aa1f97.diff";
- sha256 = "05kp47p30a45ip0fg090vijvzc7ijr0alc3y8kjl6bvv3gliails";
- name = "darwin_10_10.patch";
- });
-
postPatch = ''
patchShebangs .
substituteInPlace Makefile --replace "-Werror" ""
@@ -49,7 +43,9 @@ stdenv.mkDerivation rec {
wrapProgram $out/bin/bup \
--prefix PATH : ${git}/bin \
--prefix PYTHONPATH : ${concatStringsSep ":" (map (x: "$(toPythonPath ${x})")
- (with pythonPackages; [ pyxattr pylibacl setuptools fuse tornado ]))}
+ (with pythonPackages;
+ [ setuptools tornado ]
+ ++ stdenv.lib.optionals (!stdenv.isDarwin) [ pyxattr pylibacl fuse ]))}
'';
meta = {
diff --git a/pkgs/tools/backup/duplicity/default.nix b/pkgs/tools/backup/duplicity/default.nix
index 25bcc6e27ad0..c63e6c515a51 100644
--- a/pkgs/tools/backup/duplicity/default.nix
+++ b/pkgs/tools/backup/duplicity/default.nix
@@ -1,9 +1,9 @@
-{ stdenv, fetchurl, pythonPackages, librsync, ncftp, gnupg, rsync, makeWrapper
+{ stdenv, fetchurl, python2Packages, librsync, ncftp, gnupg, rsync, makeWrapper
}:
let
version = "0.7.07.1";
- inherit (pythonPackages) boto ecdsa lockfile paramiko pycrypto python setuptools;
+ inherit (python2Packages) boto cffi cryptography ecdsa enum idna ipaddress lockfile paramiko pyasn1 pycrypto python setuptools six;
in stdenv.mkDerivation {
name = "duplicity-${version}";
@@ -15,10 +15,10 @@ in stdenv.mkDerivation {
installPhase = ''
python setup.py install --prefix=$out
wrapProgram $out/bin/duplicity \
- --prefix PYTHONPATH : "$(toPythonPath $out):$(toPythonPath ${pycrypto}):$(toPythonPath ${ecdsa}):$(toPythonPath ${paramiko}):$(toPythonPath ${boto}):$(toPythonPath ${lockfile})" \
+ --prefix PYTHONPATH : "$(toPythonPath $out):$(toPythonPath ${idna}):$(toPythonPath ${cffi}):$(toPythonPath ${ipaddress}):$(toPythonPath ${pyasn1}):$(toPythonPath ${six}):$(toPythonPath ${enum}):$(toPythonPath ${setuptools}):$(toPythonPath ${cryptography}):$(toPythonPath ${pycrypto}):$(toPythonPath ${ecdsa}):$(toPythonPath ${paramiko}):$(toPythonPath ${boto}):$(toPythonPath ${lockfile})" \
--prefix PATH : "${stdenv.lib.makeBinPath [ gnupg ncftp rsync ]}"
wrapProgram $out/bin/rdiffdir \
- --prefix PYTHONPATH : "$(toPythonPath $out):$(toPythonPath ${pycrypto}):$(toPythonPath ${ecdsa}):$(toPythonPath ${paramiko}):$(toPythonPath ${boto}):$(toPythonPath ${lockfile})"
+ --prefix PYTHONPATH : "$(toPythonPath $out):$(toPythonPath ${idna}):$(toPythonPath ${cffi}):$(toPythonPath ${ipaddress}):$(toPythonPath ${pyasn1}):$(toPythonPath ${six}):$(toPythonPath ${enum}):$(toPythonPath ${setuptools}):$(toPythonPath ${cryptography}):$(toPythonPath ${pycrypto}):$(toPythonPath ${ecdsa}):$(toPythonPath ${paramiko}):$(toPythonPath ${boto}):$(toPythonPath ${lockfile})"
'';
buildInputs = [ python librsync makeWrapper setuptools ];
diff --git a/pkgs/tools/backup/rdup/default.nix b/pkgs/tools/backup/rdup/default.nix
index 8ca07e2c8235..33e3c77db887 100644
--- a/pkgs/tools/backup/rdup/default.nix
+++ b/pkgs/tools/backup/rdup/default.nix
@@ -19,6 +19,6 @@ stdenv.mkDerivation rec {
homepage = "https://github.com/miekg/rdup";
license = stdenv.lib.licenses.gpl3;
platforms = stdenv.lib.platforms.linux;
- maintainers = with stdenv.lib.maintainers; [ lukasepple ];
+ maintainers = with stdenv.lib.maintainers; [ sternenseemann ];
};
}
diff --git a/pkgs/tools/bluetooth/blueman/default.nix b/pkgs/tools/bluetooth/blueman/default.nix
index 6a668f777941..2efd4660bbcc 100644
--- a/pkgs/tools/bluetooth/blueman/default.nix
+++ b/pkgs/tools/bluetooth/blueman/default.nix
@@ -1,6 +1,6 @@
{ stdenv, lib, fetchurl, intltool, pkgconfig, pythonPackages, bluez, polkit, gtk3
, obex_data_server, xdg_utils, libnotify, dconf, gsettings_desktop_schemas, dnsmasq, dhcp
-, withPulseAudio ? true, libpulseaudio }:
+, hicolor_icon_theme , withPulseAudio ? true, libpulseaudio }:
let
binPath = lib.makeBinPath [ xdg_utils dnsmasq dhcp ];
@@ -16,7 +16,8 @@ in stdenv.mkDerivation rec {
nativeBuildInputs = [ intltool pkgconfig pythonPackages.wrapPython pythonPackages.cython ];
- buildInputs = [ bluez gtk3 pythonPackages.python libnotify dconf gsettings_desktop_schemas ]
+ buildInputs = [ bluez gtk3 pythonPackages.python libnotify dconf
+ gsettings_desktop_schemas hicolor_icon_theme ]
++ pythonPath
++ lib.optional withPulseAudio libpulseaudio;
diff --git a/pkgs/tools/compression/lhasa/default.nix b/pkgs/tools/compression/lhasa/default.nix
new file mode 100644
index 000000000000..f270d29a694f
--- /dev/null
+++ b/pkgs/tools/compression/lhasa/default.nix
@@ -0,0 +1,21 @@
+{stdenv, fetchurl}:
+
+stdenv.mkDerivation {
+ name = "lhasa-0.3.1";
+ src = fetchurl {
+ url = https://soulsphere.org/projects/lhasa/lhasa-0.3.1.tar.gz;
+ sha256 = "092zi9av18ma20c6h9448k0bapvx2plnp292741dvfd9hmgqxc1z";
+ };
+ meta = {
+ description = "Free Software replacement for the Unix LHA tool";
+ longDescription = ''
+ Lhasa is a Free Software replacement for the Unix LHA tool, for
+ decompressing .lzh (LHA / LHarc) and .lzs (LArc) archives. The backend for
+ the tool is a library, so that it can be reused for other purposes.
+ '';
+ license = stdenv.lib.licenses.isc;
+ homepage = http://fragglet.github.io/lhasa;
+ maintainers = with stdenv.lib; [ maintainers.sander ];
+ platforms = stdenv.lib.platforms.linux;
+ };
+}
diff --git a/pkgs/tools/filesystems/afpfs-ng/default.nix b/pkgs/tools/filesystems/afpfs-ng/default.nix
new file mode 100644
index 000000000000..bfa45c9930e4
--- /dev/null
+++ b/pkgs/tools/filesystems/afpfs-ng/default.nix
@@ -0,0 +1,24 @@
+{ stdenv, fetchFromGitHub, fuse, readline, libgcrypt, gmp }:
+
+stdenv.mkDerivation rec {
+ name = "afpfs-ng-${version}";
+ version = "0.8.2";
+
+ src = fetchFromGitHub {
+ owner = "simonvetter";
+ repo = "afpfs-ng";
+ rev = "f6e24eb73c9283732c3b5d9cb101a1e2e4fade3e";
+ sha256 = "125jx1rsqkiifcffyjb05b2s36rllckdgjaf1bay15k9gzhwwldz";
+ };
+
+ buildInputs = [ fuse readline libgcrypt gmp ];
+
+ meta = with stdenv.lib; {
+ homepage = https://github.com/simonvetter/afpfs-ng;
+ description = "A client implementation of the Apple Filing Protocol";
+ license = licenses.gpl2;
+ maintainers = with maintainers; [ rnhmjoj ];
+ platform = platforms.linux;
+ };
+
+}
diff --git a/pkgs/tools/filesystems/btrfs-progs/default.nix b/pkgs/tools/filesystems/btrfs-progs/default.nix
index a58f2b5504b5..525aa2fec28a 100644
--- a/pkgs/tools/filesystems/btrfs-progs/default.nix
+++ b/pkgs/tools/filesystems/btrfs-progs/default.nix
@@ -2,14 +2,14 @@
, asciidoc, xmlto, docbook_xml_dtd_45, docbook_xsl, libxslt
}:
-let version = "4.6.1"; in
+let version = "4.8.2"; in
stdenv.mkDerivation rec {
name = "btrfs-progs-${version}";
src = fetchurl {
url = "mirror://kernel/linux/kernel/people/kdave/btrfs-progs/btrfs-progs-v${version}.tar.xz";
- sha256 = "06c9l6m3w29dndk17jrlpgr01wykl10h34zva8zc2c571z6mrlaf";
+ sha256 = "0pswcfmdnfc586770h74abp67gn2xv8fd46vxlimnmn837sj7h41";
};
buildInputs = [
diff --git a/pkgs/tools/filesystems/ceph/generic.nix b/pkgs/tools/filesystems/ceph/generic.nix
index 07bfec41f477..a5df46b6ba4c 100644
--- a/pkgs/tools/filesystems/ceph/generic.nix
+++ b/pkgs/tools/filesystems/ceph/generic.nix
@@ -1,6 +1,6 @@
{ stdenv, ensureNewerSourcesHook, autoconf, automake, makeWrapper, pkgconfig
, libtool, which, git
-, boost, python, pythonPackages, libxml2, zlib
+, boost, python2Packages, libxml2, zlib
# Optional Dependencies
, snappy ? null, leveldb ? null, yasm ? null, fcgi ? null, expat ? null
@@ -30,6 +30,7 @@ assert cryptopp != null || (nss != null && nspr != null);
with stdenv;
with stdenv.lib;
let
+ inherit (python2Packages) python;
mkFlag = trueStr: falseStr: cond: name: val:
if cond == null then null else
"--${if cond != false then trueStr else falseStr}${name}"
@@ -99,8 +100,7 @@ let
};
wrapArgs = "--set PYTHONPATH \"$(toPythonPath $lib)\""
- + " --prefix PYTHONPATH : \"$(toPythonPath ${python.modules.readline})\""
- + " --prefix PYTHONPATH : \"$(toPythonPath ${pythonPackages.flask})\""
+ + " --prefix PYTHONPATH : \"$(toPythonPath ${python2Packages.flask})\""
+ " --set PATH \"$out/bin\"";
in
stdenv.mkDerivation {
@@ -117,12 +117,12 @@ stdenv.mkDerivation {
(ensureNewerSourcesHook { year = "1980"; })
]
++ optionals (versionAtLeast version "9.0.2") [
- pythonPackages.setuptools pythonPackages.argparse
+ python2Packages.setuptools python2Packages.argparse
];
buildInputs = buildInputs ++ cryptoLibsMap.${cryptoStr} ++ [
- boost python libxml2 optYasm optLibatomic_ops optLibs3 malloc pythonPackages.flask zlib
+ boost python libxml2 optYasm optLibatomic_ops optLibs3 malloc python2Packages.flask zlib
] ++ optionals (versionAtLeast version "9.0.0") [
- pythonPackages.sphinx # Used for docs
+ python2Packages.sphinx # Used for docs
] ++ optionals stdenv.isLinux [
linuxHeaders libuuid udev keyutils optLibaio optLibxfs optZfs
] ++ optionals hasServer [
diff --git a/pkgs/tools/filesystems/darling-dmg/default.nix b/pkgs/tools/filesystems/darling-dmg/default.nix
index 74e7686a3d17..7931df2cc57d 100644
--- a/pkgs/tools/filesystems/darling-dmg/default.nix
+++ b/pkgs/tools/filesystems/darling-dmg/default.nix
@@ -13,8 +13,6 @@ stdenv.mkDerivation rec {
buildInputs = [ cmake fuse openssl zlib bzip2 libxml2 icu ];
- cmakeConfigureFlagFlags = ["-DCMAKE_BUILD_TYPE=RELEASE"];
-
meta = {
homepage = http://www.darlinghq.org/;
description = "Darling lets you open OS X dmgs on Linux";
diff --git a/pkgs/tools/filesystems/f2fs-tools/default.nix b/pkgs/tools/filesystems/f2fs-tools/default.nix
index 3173c13dc574..acc3b5183fe1 100644
--- a/pkgs/tools/filesystems/f2fs-tools/default.nix
+++ b/pkgs/tools/filesystems/f2fs-tools/default.nix
@@ -1,16 +1,16 @@
-{ stdenv, fetchurl, autoreconfHook, libuuid, pkgconfig }:
+{ stdenv, fetchurl, autoreconfHook, libselinux, libuuid, pkgconfig }:
stdenv.mkDerivation rec {
name = "f2fs-tools-${version}";
- version = "1.6.1";
+ version = "1.7.0";
src = fetchurl {
url = "http://git.kernel.org/cgit/linux/kernel/git/jaegeuk/f2fs-tools.git/snapshot/${name}.tar.gz";
- sha256 = "1fkq1iqr5kxs6ihhbmjk4i19q395azcl60mnslqwfrlbrd3p40gm";
+ sha256 = "1m6bn1ibq0p53m0n97il91xqgjgn2pzlz74lb5bfzassx7159m1k";
};
nativeBuildInputs = [ autoreconfHook ];
- buildInputs = [ libuuid pkgconfig ];
+ buildInputs = [ libselinux libuuid pkgconfig ];
meta = with stdenv.lib; {
homepage = "http://git.kernel.org/cgit/linux/kernel/git/jaegeuk/f2fs-tools.git/";
diff --git a/pkgs/tools/filesystems/gitfs/default.nix b/pkgs/tools/filesystems/gitfs/default.nix
index 31c4ceccbc09..bb652c285809 100644
--- a/pkgs/tools/filesystems/gitfs/default.nix
+++ b/pkgs/tools/filesystems/gitfs/default.nix
@@ -1,6 +1,6 @@
-{ stdenv, fetchFromGitHub, pythonPackages }:
+{ stdenv, fetchFromGitHub, python2Packages }:
-pythonPackages.buildPythonApplication rec {
+python2Packages.buildPythonApplication rec {
name = "gitfs-0.2.5";
src = fetchFromGitHub {
@@ -15,7 +15,12 @@ pythonPackages.buildPythonApplication rec {
echo > requirements.txt
'';
- propagatedBuildInputs = with pythonPackages; [ atomiclong fusepy pygit2 ];
+ buildInputs = with python2Packages; [ pytest pytestcov mock ];
+ propagatedBuildInputs = with python2Packages; [ atomiclong fusepy pygit2 ];
+
+ checkPhase = ''
+ py.test
+ '';
meta = {
description = "A FUSE filesystem that fully integrates with git";
@@ -29,4 +34,4 @@ pythonPackages.buildPythonApplication rec {
platforms = stdenv.lib.platforms.linux;
maintainers = [ stdenv.lib.maintainers.robbinch ];
};
-} \ No newline at end of file
+}
diff --git a/pkgs/tools/filesystems/glusterfs/default.nix b/pkgs/tools/filesystems/glusterfs/default.nix
index e97f246e70b9..32c87667ee36 100644
--- a/pkgs/tools/filesystems/glusterfs/default.nix
+++ b/pkgs/tools/filesystems/glusterfs/default.nix
@@ -1,4 +1,4 @@
-{stdenv, fetchurl, fuse, bison, flex_2_5_35, openssl, python, ncurses, readline,
+{stdenv, fetchurl, fuse, bison, flex_2_5_35, openssl, python2, ncurses, readline,
autoconf, automake, libtool, pkgconfig, zlib, libaio, libxml2, acl, sqlite
, liburcu, attr
}:
@@ -13,7 +13,7 @@ let
sha256="0f715r6bf12b37s1l3259qzfbz8l2g3mdsnnh2lflagzazn6jnap";
};
buildInputs = [
- fuse bison flex_2_5_35 openssl python ncurses readline
+ fuse bison flex_2_5_35 openssl python2 ncurses readline
autoconf automake libtool pkgconfig zlib libaio libxml2
acl sqlite liburcu attr
];
diff --git a/pkgs/tools/filesystems/snapraid/default.nix b/pkgs/tools/filesystems/snapraid/default.nix
index c4dc72644d9d..3946d6fcef84 100644
--- a/pkgs/tools/filesystems/snapraid/default.nix
+++ b/pkgs/tools/filesystems/snapraid/default.nix
@@ -2,13 +2,15 @@
stdenv.mkDerivation rec {
name = "snapraid-${version}";
- version = "8.1";
+ version = "10.0";
src = fetchurl {
url = "https://github.com/amadvance/snapraid/releases/download/v${version}/snapraid-${version}.tar.gz";
- sha256 = "0pafqn9ismn4j3fsx8fgf008qwh2c6f8mjfjijah6d5c349rmy3b";
+ sha256 = "1mhs0gl285a5y2bw6k04lrnyg1pp2am7dfcsvg0w4vr5h2ag3p7p";
};
+ doCheck = true;
+
meta = {
homepage = http://www.snapraid.it/;
description = "A backup program for disk arrays";
diff --git a/pkgs/tools/filesystems/vmfs-tools/default.nix b/pkgs/tools/filesystems/vmfs-tools/default.nix
new file mode 100644
index 000000000000..d563f4380209
--- /dev/null
+++ b/pkgs/tools/filesystems/vmfs-tools/default.nix
@@ -0,0 +1,24 @@
+{ stdenv, fetchFromGitHub, pkgconfig
+, asciidoc, docbook_xml_xslt, fuse, libuuid, libxslt }:
+
+stdenv.mkDerivation rec {
+ name = "vmfs-tools";
+
+ src = fetchFromGitHub {
+ owner = "glandium";
+ repo = "vmfs-tools";
+ rev = "4ab76ef5b074bdf06e4b518ff6d50439de05ae7f";
+ sha256 = "14y412ww5hxk336ils62s3fwykfh6mx1j0iiaa5cwc615pi6qvi4";
+ };
+
+ nativeBuildInputs = [ asciidoc docbook_xml_xslt fuse libuuid libxslt pkgconfig ];
+
+ enableParallelBuilding = true;
+
+ meta = with stdenv.lib; {
+ homepage = https://github.com/glandium/vmfs-tools;
+ description = "FUSE-based VMFS (vmware) mounting tools";
+ maintainers = with maintainers; [ peterhoeg ];
+ platforms = platforms.linux;
+ };
+}
diff --git a/pkgs/tools/filesystems/zfstools/default.nix b/pkgs/tools/filesystems/zfstools/default.nix
index 7a056f503e23..518e92814a41 100644
--- a/pkgs/tools/filesystems/zfstools/default.nix
+++ b/pkgs/tools/filesystems/zfstools/default.nix
@@ -1,11 +1,11 @@
{ stdenv, fetchFromGitHub, ruby, zfs }:
-let version = "0.3.3"; in
+let version = "0.3.6"; in
stdenv.mkDerivation rec {
name = "zfstools-${version}";
src = fetchFromGitHub {
- sha256 = "1gj6jksc9crmjvhsx8yp3l06b5vcm415l0bmdjcil7jjbfhwwp2k";
+ sha256 = "16lvw3xbmxp2pr8nixqn7lf4504zaaxvbbdnjkv4dggwd4lsdjyg";
rev = "v${version}";
repo = "zfstools";
owner = "bdrewery";
diff --git a/pkgs/tools/graphics/asymptote/default.nix b/pkgs/tools/graphics/asymptote/default.nix
index 7d191ccaba55..2d73a2680381 100644
--- a/pkgs/tools/graphics/asymptote/default.nix
+++ b/pkgs/tools/graphics/asymptote/default.nix
@@ -4,8 +4,6 @@
, python, zlib, perl, texLive, texinfo, xz
}:
-assert stdenv.isLinux;
-
let
s = # Generated upstream information
rec {
@@ -17,10 +15,12 @@ let
sha256="1dxwvq0xighqckkjkjva8s0igxfgy1j25z81pbwvlz6jzsrxpip9";
};
buildInputs = [
- freeglut ghostscriptX imagemagick fftw
- boehmgc mesa_glu mesa_noglu mesa_noglu.osmesa ncurses readline gsl libsigsegv
- python zlib perl texLive texinfo xz
- ];
+ ghostscriptX imagemagick fftw
+ boehmgc ncurses readline gsl libsigsegv
+ python zlib perl texLive texinfo xz ]
+ ++ stdenv.lib.optionals stdenv.isLinux
+ [ freeglut mesa_glu mesa_noglu mesa_noglu.osmesa ]
+ ;
in
stdenv.mkDerivation {
inherit (s) name version;
@@ -51,11 +51,11 @@ stdenv.mkDerivation {
enableParallelBuilding = true;
- meta = {
+ meta = with stdenv.lib; {
inherit (s) version;
description = "A tool for programming graphics intended to replace Metapost";
- license = stdenv.lib.licenses.gpl3Plus;
- maintainers = [stdenv.lib.maintainers.raskin stdenv.lib.maintainers.peti];
- platforms = stdenv.lib.platforms.linux;
+ license = licenses.gpl3Plus;
+ maintainers = [ maintainers.raskin maintainers.peti ];
+ platforms = platforms.linux ++ platforms.darwin;
};
}
diff --git a/pkgs/tools/graphics/gnuplot/default.nix b/pkgs/tools/graphics/gnuplot/default.nix
index 8fa7af3b1f8e..3b537fad91db 100644
--- a/pkgs/tools/graphics/gnuplot/default.nix
+++ b/pkgs/tools/graphics/gnuplot/default.nix
@@ -33,7 +33,7 @@ stdenv.mkDerivation rec {
++ lib.optional withTeXLive (texlive.combine { inherit (texlive) scheme-small; })
++ lib.optional withLua lua
++ lib.optionals withX [ libX11 libXpm libXt libXaw ]
- ++ lib.optional withQt [ qt ]
+ ++ lib.optional withQt qt
# compiling with wxGTK causes a malloc (double free) error on darwin
++ lib.optional (withWxGTK && !stdenv.isDarwin) wxGTK;
diff --git a/pkgs/tools/inputmethods/fcitx-engines/fcitx-libpinyin/default.nix b/pkgs/tools/inputmethods/fcitx-engines/fcitx-libpinyin/default.nix
new file mode 100644
index 000000000000..c441a4964b82
--- /dev/null
+++ b/pkgs/tools/inputmethods/fcitx-engines/fcitx-libpinyin/default.nix
@@ -0,0 +1,43 @@
+{ stdenv, fetchurl, cmake, pkgconfig, fcitx, gettext, libpinyin, glib, pcre, dbus, qt4 }:
+
+stdenv.mkDerivation rec {
+ name = "fcitx-libpinyin-${version}";
+ version = "0.3.91";
+
+ src = fetchurl {
+ url = "http://download.fcitx-im.org/fcitx-libpinyin/${name}.tar.xz";
+ sha256 = "19h0p1s8bkw24v7x6v19fg7dqpz2kkjlvvrqhypi5bkkvfswf7xn";
+ };
+
+ buildInputs = [ cmake pkgconfig fcitx gettext libpinyin glib pcre dbus qt4 ];
+
+ preInstall = ''
+ substituteInPlace src/cmake_install.cmake \
+ --replace ${fcitx} $out
+ substituteInPlace po/cmake_install.cmake \
+ --replace ${fcitx} $out
+ substituteInPlace data/cmake_install.cmake \
+ --replace ${fcitx} $out
+ substituteInPlace dictmanager/cmake_install.cmake \
+ --replace ${fcitx} $out
+ '';
+
+ preBuild = let
+ store_path = fetchurl {
+ url = https://download.fcitx-im.org/data/model.text.20130308.tar.gz;
+ sha256 = "0s8sazix29z1ilxmkw2f0bv6i349awd89ibylf9ixy615s1vb5a5";
+ };
+ in
+ ''
+ cp -rv ${store_path} $NIX_BUILD_TOP/$name/data/model.text.20130308.tar.gz
+ '';
+
+ meta = with stdenv.lib; {
+ isFcitxEngine = true;
+ description = "Fcitx Wrapper for libpinyin, Library to deal with pinyin";
+ homepage = https://github.com/fcitx/fcitx-libpinyin;
+ license = licenses.gpl3Plus;
+ maintainers = with maintainers; [ ericsagnes ];
+ platforms = platforms.linux;
+ };
+}
diff --git a/pkgs/tools/inputmethods/ibus-engines/ibus-table/default.nix b/pkgs/tools/inputmethods/ibus-engines/ibus-table/default.nix
index b44bea9119a2..c5090e5b949b 100644
--- a/pkgs/tools/inputmethods/ibus-engines/ibus-table/default.nix
+++ b/pkgs/tools/inputmethods/ibus-engines/ibus-table/default.nix
@@ -1,13 +1,17 @@
-{ stdenv, fetchurl, pkgconfig
-, gtk3, dconf, gobjectIntrospection, ibus, python3, pygobject3 }:
+{ stdenv, fetchFromGitHub
+, autoreconfHook, docbook2x, pkgconfig
+, gtk3, dconf, gobjectIntrospection
+, ibus, python3, pygobject3 }:
stdenv.mkDerivation rec {
name = "ibus-table-${version}";
- version = "1.9.11";
+ version = "1.9.14";
- src = fetchurl {
- url = "https://github.com/kaio/ibus-table/releases/download/${version}/${name}.tar.gz";
- sha256 = "14sb89z1inbbhcrbsm5nww8la04ncy2lk32mxfqpi4ghl22ixxqd";
+ src = fetchFromGitHub {
+ owner = "kaio";
+ repo = "ibus-table";
+ rev = version;
+ sha256 = "1mkx03iqrq5yq57y7hjqcmxfh41dsjykyyl70d41dflcgp5q2nhw";
};
postPatch = ''
@@ -28,7 +32,12 @@ stdenv.mkDerivation rec {
dconf gtk3 gobjectIntrospection ibus python3 pygobject3
];
- nativeBuildInputs = [ pkgconfig ];
+ nativeBuildInputs = [ autoreconfHook docbook2x pkgconfig ];
+
+ postUnpack = ''
+ substituteInPlace $sourceRoot/engine/Makefile.am \
+ --replace "docbook2man" "docbook2man --sgml"
+ '';
meta = with stdenv.lib; {
isIbusEngine = true;
diff --git a/pkgs/tools/inputmethods/ibus-engines/ibus-uniemoji/default.nix b/pkgs/tools/inputmethods/ibus-engines/ibus-uniemoji/default.nix
index 3ca6f3ffcfe6..161982ac6186 100644
--- a/pkgs/tools/inputmethods/ibus-engines/ibus-uniemoji/default.nix
+++ b/pkgs/tools/inputmethods/ibus-engines/ibus-uniemoji/default.nix
@@ -4,24 +4,20 @@
stdenv.mkDerivation rec {
name = "ibus-uniemoji-${version}";
- version = "2016-09-20";
+ version = "0.6.0";
src = fetchFromGitHub {
owner = "salty-horse";
repo = "ibus-uniemoji";
- rev = "c8931a4807a721168e45463ecba00805adb3fe8d";
- sha256 = "0fydxkdjsbfbrbb8238rfnshmhp11c38hsa7y2gp1ii6mkjngb1j";
+ rev = "v${version}";
+ sha256 = "121zh3q0li1k537fcvbd4ns4jgl9bbb9gm9ihy8cfxgirv38lcfa";
};
propagatedBuildInputs = with python3Packages; [ pyxdg python-Levenshtein ];
makeFlags = [ "PREFIX=$(out)" "SYSCONFDIR=$(out)/etc"
- "PYTHON=${python3Packages.python.interpreter}" ];
-
- postPatch = ''
- sed -i "s,/etc/xdg/,$out/etc/xdg/," uniemoji.py
- sed -i "s,/usr/share/,$out/share/,g" uniemoji.xml.in
- '';
+ "PYTHON=${python3Packages.python.interpreter}"
+ ];
meta = with stdenv.lib; {
isIbusEngine = true;
diff --git a/pkgs/tools/inputmethods/ibus/wrapper.nix b/pkgs/tools/inputmethods/ibus/wrapper.nix
index 74333c459e8f..f38705cc9d13 100644
--- a/pkgs/tools/inputmethods/ibus/wrapper.nix
+++ b/pkgs/tools/inputmethods/ibus/wrapper.nix
@@ -21,7 +21,7 @@ let
done
done
- for prog in ibus ibus-daemon ibus-setup; do
+ for prog in ibus ibus-setup; do
wrapProgram "$out/bin/$prog" \
--set GDK_PIXBUF_MODULE_FILE ${librsvg.out}/lib/gdk-pixbuf-2.0/2.10.0/loaders.cache \
--prefix GI_TYPELIB_PATH : "$GI_TYPELIB_PATH:$out/lib/girepository-1.0" \
@@ -39,6 +39,26 @@ let
--prefix XDG_DATA_DIRS : "$out/share:$GSETTINGS_SCHEMAS_PATH" \
--suffix XDG_DATA_DIRS : "${hicolor_icon_theme}/share"
done
+
+ for prog in ibus-daemon; do
+ wrapProgram "$out/bin/$prog" \
+ --set GDK_PIXBUF_MODULE_FILE ${librsvg.out}/lib/gdk-pixbuf-2.0/2.10.0/loaders.cache \
+ --prefix GI_TYPELIB_PATH : "$GI_TYPELIB_PATH:$out/lib/girepository-1.0" \
+ --prefix GIO_EXTRA_MODULES : "${dconf}/lib/gio/modules" \
+ --set IBUS_COMPONENT_PATH "$out/share/ibus/component/" \
+ --set IBUS_DATAROOTDIR "$out/share" \
+ --set IBUS_LIBEXECDIR "$out/libexec" \
+ --set IBUS_LOCALEDIR "$out/share/locale" \
+ --set IBUS_PREFIX "$out" \
+ --set IBUS_TABLE_BIN_PATH "$out/bin" \
+ --set IBUS_TABLE_DATA_DIR "$out/share" \
+ --set IBUS_TABLE_LIB_LOCATION "$out/libexec" \
+ --set IBUS_TABLE_LOCATION "$out/share/ibus-table" \
+ --prefix PYTHONPATH : "$PYTHONPATH" \
+ --prefix XDG_DATA_DIRS : "$out/share:$GSETTINGS_SCHEMAS_PATH" \
+ --suffix XDG_DATA_DIRS : "${hicolor_icon_theme}/share" \
+ --add-flags "--cache=refresh"
+ done
'';
in
runCommand name env command
diff --git a/pkgs/tools/misc/alarm-clock-applet/default.nix b/pkgs/tools/misc/alarm-clock-applet/default.nix
index 88992c8e4e30..b089240bcc69 100644
--- a/pkgs/tools/misc/alarm-clock-applet/default.nix
+++ b/pkgs/tools/misc/alarm-clock-applet/default.nix
@@ -29,7 +29,6 @@ stdenv.mkDerivation rec {
glib
gtk2
gst_all_1.gstreamer
- gst_plugins
gnome2.GConf
gnome2.gnome_icon_theme
libnotify
@@ -37,7 +36,7 @@ stdenv.mkDerivation rec {
libunique
intltool
wrapGAppsHook
- ];
+ ] ++ gst_plugins;
propagatedUserEnvPkgs = [ gnome2.GConf.out ];
diff --git a/pkgs/tools/misc/bibtex2html/default.nix b/pkgs/tools/misc/bibtex2html/default.nix
new file mode 100644
index 000000000000..068d3e3866e0
--- /dev/null
+++ b/pkgs/tools/misc/bibtex2html/default.nix
@@ -0,0 +1,21 @@
+{ stdenv, fetchurl, ocaml }:
+
+stdenv.mkDerivation rec {
+ name = "bibtex2html-${version}";
+ version = "1.98";
+
+ src = fetchurl {
+ url = http://www.lri.fr/~filliatr/ftp/bibtex2html/bibtex2html-1.98.tar.gz;
+ sha256 = "1mh6hxmc9qv05hgjc11m2zh5mk9mk0kaqp59pny18ypqgfws09g9";
+ };
+
+ buildInputs = [ ocaml ];
+
+ meta = with stdenv.lib; {
+ description = "A collection of tools for translating from BibTeX to HTML";
+ homepage = https://www.lri.fr/~filliatr/bibtex2html/;
+ licence = licenses.gpl2;
+ platforms = ocaml.meta.platforms or [];
+ maintainers = [ maintainers.scolobb ];
+ };
+}
diff --git a/pkgs/tools/misc/brltty/default.nix b/pkgs/tools/misc/brltty/default.nix
index 4201fb25f98a..f466da91dffe 100644
--- a/pkgs/tools/misc/brltty/default.nix
+++ b/pkgs/tools/misc/brltty/default.nix
@@ -1,17 +1,21 @@
-{ stdenv, fetchurl, pkgconfig, alsaSupport, alsaLib ? null, bluez }:
+{ stdenv, fetchurl, pkgconfig, alsaSupport, alsaLib ? null, bluez, systemdSupport, systemd ? null }:
assert alsaSupport -> alsaLib != null;
+assert systemdSupport -> systemd != null;
stdenv.mkDerivation rec {
- name = "brltty-5.2";
+ name = "brltty-5.4";
src = fetchurl {
url = "http://brltty.com/archive/${name}.tar.gz";
- sha256 = "1zaab5pxkqrv081n23p3am445d30gk0km4azqdirvcpw9z15q0cz";
+ sha256 = "1993brxa76yf7z3ckax0bbmqv6jp8vjwxp19h425v4gpm0m17k7l";
};
+
+ patches = [ ./systemd.patch ];
- buildInputs = [ pkgconfig alsaLib bluez ]
- ++ stdenv.lib.optional alsaSupport alsaLib;
+ buildInputs = [ pkgconfig bluez ]
+ ++ stdenv.lib.optional alsaSupport alsaLib
+ ++ stdenv.lib.optional systemdSupport systemd;
meta = {
description = "Access software for a blind person using a braille display";
@@ -27,7 +31,9 @@ stdenv.mkDerivation rec {
platforms = stdenv.lib.platforms.all;
};
- patchPhase = ''
+ preConfigurePhases = [ "preConfigure" ];
+
+ preConfigure = ''
substituteInPlace configure --replace /sbin/ldconfig ldconfig
'';
}
diff --git a/pkgs/tools/misc/brltty/systemd.patch b/pkgs/tools/misc/brltty/systemd.patch
new file mode 100644
index 000000000000..24a0d617b306
--- /dev/null
+++ b/pkgs/tools/misc/brltty/systemd.patch
@@ -0,0 +1,22 @@
+diff --git a/config.mk.in b/config.mk.in
+index 5093b9c..b707bd4 100644
+--- a/config.mk.in
++++ b/config.mk.in
+@@ -235,7 +235,7 @@ TUNE_OBJECTS = tune.$O notes.$O $(BEEP_OBJECTS) $(PCM_OBJECTS) $(MIDI_OBJECTS) $
+ ASYNC_OBJECTS = async_handle.$O async_data.$O async_wait.$O async_alarm.$O async_task.$O async_io.$O async_event.$O async_signal.$O thread.$O
+ BASE_OBJECTS = log.$O addresses.$O file.$O device.$O parse.$O variables.$O datafile.$O unicode.$O $(CHARSET_OBJECTS) timing.$O $(ASYNC_OBJECTS) queue.$O lock.$O $(DYNLD_OBJECTS) $(PORTS_OBJECTS) $(SYSTEM_OBJECTS)
+ OPTIONS_OBJECTS = options.$O $(PARAMS_OBJECTS)
+-PROGRAM_OBJECTS = program.$O $(PGMPATH_OBJECTS) $(SERVICE_OBJECTS) $(SERVICE_LIBS) pid.$O $(OPTIONS_OBJECTS) $(BASE_OBJECTS)
++PROGRAM_OBJECTS = program.$O $(PGMPATH_OBJECTS) $(SERVICE_OBJECTS) pid.$O $(OPTIONS_OBJECTS) $(BASE_OBJECTS)
+
+ CC = @CC@
+ CPPFLAGS = -I$(BLD_DIR) -I$(SRC_DIR) -I$(BLD_TOP:/=)/$(PGM_DIR) -I$(SRC_TOP:/=)/$(PGM_DIR) -I$(SRC_TOP:/=)/$(HDR_DIR) -I$(BLD_TOP:/=) -I$(SRC_TOP:/=) @CPPFLAGS@ @DEFS@
+@@ -248,7 +248,7 @@ LIBCXXFLAGS = $(CXXFLAGS) @LIBCXXFLAGS@
+
+ LD = @LD@
+ LDFLAGS = @LDFLAGS@
+-LDLIBS = $(ICU_LIBS) $(POLKIT_LIBS) $(SYSTEM_LIBS) @LIBS@
++LDLIBS = $(ICU_LIBS) $(POLKIT_LIBS) $(SYSTEM_LIBS) $(SERVICE_LIBS) @LIBS@
+
+ MKOBJ = @MKOBJ@
+ MKMOD = @MKMOD@
diff --git a/pkgs/tools/misc/fluentd/default.nix b/pkgs/tools/misc/fluentd/default.nix
index 4c5de7448409..25e083b6bf57 100644
--- a/pkgs/tools/misc/fluentd/default.nix
+++ b/pkgs/tools/misc/fluentd/default.nix
@@ -1,12 +1,10 @@
{ stdenv, lib, bundlerEnv, ruby, curl }:
bundlerEnv {
- name = "fluentd-0.14.0";
-
inherit ruby;
- gemfile = ./Gemfile;
- lockfile = ./Gemfile.lock;
- gemset = ./gemset.nix;
+
+ pname = "fluentd";
+ gemdir = ./.;
meta = with lib; {
description = "A data collector";
diff --git a/pkgs/tools/misc/fontforge/default.nix b/pkgs/tools/misc/fontforge/default.nix
index ba1154ab72d5..2cccee0a4e3b 100644
--- a/pkgs/tools/misc/fontforge/default.nix
+++ b/pkgs/tools/misc/fontforge/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchFromGitHub, fetchpatch, lib
-, autoconf, automake, gnum4, libtool, git, perl, gnulib, uthash, pkgconfig, gettext
+, autoconf, automake, gnum4, libtool, perl, gnulib, uthash, pkgconfig, gettext
, python, freetype, zlib, glib, libungif, libpng, libjpeg, libtiff, libxml2, pango
, withGTK ? false, gtk2
, withPython ? true
@@ -25,9 +25,8 @@ stdenv.mkDerivation rec {
})];
patchFlags = "-p0";
- # FIXME: git isn't really used, but configuration fails without it
buildInputs = [
- git autoconf automake gnum4 libtool perl pkgconfig gettext uthash
+ autoconf automake gnum4 libtool perl pkgconfig gettext uthash
python freetype zlib glib libungif libpng libjpeg libtiff libxml2
]
++ lib.optionals withGTK [ gtk2 pango ]
@@ -38,7 +37,9 @@ stdenv.mkDerivation rec {
++ lib.optional withGTK "--enable-gtk2-use"
++ lib.optional (!withGTK) "--without-x";
+ # work-around: git isn't really used, but configuration fails without it
preConfigure = ''
+ export GIT="$(type -P true)"
cp -r "${gnulib}" ./gnulib
chmod +w -R ./gnulib
./bootstrap --skip-git --gnulib-srcdir=./gnulib
diff --git a/pkgs/tools/misc/fpp/default.nix b/pkgs/tools/misc/fpp/default.nix
index 5261035b35c5..2f43dd40f13e 100644
--- a/pkgs/tools/misc/fpp/default.nix
+++ b/pkgs/tools/misc/fpp/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, python27Full }:
+{ stdenv, fetchFromGitHub, python27 }:
stdenv.mkDerivation rec {
name = "fpp-${version}";
@@ -12,7 +12,7 @@ stdenv.mkDerivation rec {
};
postPatch = ''
- substituteInPlace fpp --replace 'PYTHONCMD="python"' 'PYTHONCMD="${python27Full.interpreter}"'
+ substituteInPlace fpp --replace 'PYTHONCMD="python"' 'PYTHONCMD="${python27.interpreter}"'
'';
installPhase = ''
diff --git a/pkgs/tools/misc/geteltorito/default.nix b/pkgs/tools/misc/geteltorito/default.nix
new file mode 100644
index 000000000000..ec011aaa0079
--- /dev/null
+++ b/pkgs/tools/misc/geteltorito/default.nix
@@ -0,0 +1,48 @@
+{ stdenv, perl, ronn, fetchurl }:
+
+stdenv.mkDerivation rec {
+ name = "geteltorito-${version}";
+ version = "0.6";
+
+ src = fetchurl {
+ url = "https://userpages.uni-koblenz.de/~krienke/ftp/noarch/geteltorito/geteltorito-${version}.tar.gz";
+ sha256 = "1gkbm9ahj2mgqrkrfpibzclsriqgsbsvjh19fr815vpd9f6snkxv";
+ };
+
+ buildInputs = [ perl ronn ];
+
+ unpackCmd = "";
+ dontBuild = true;
+ configurePhase = "";
+ installPhase = ''
+ # reformat README to ronn markdown
+ cat > README.new <<EOF
+ geteltorito -- ${meta.description}
+ ===========
+
+ ## SYNOPSIS
+
+ EOF
+
+ # skip the first two lines
+ # -e reformat function call
+ # -e reformat example
+ # -e make everything else (that is no code) that contains `: ` a list item
+ tail -n +3 README | sed \
+ -e 's/^\(call:\s*\)\(getelt.*\)$/\1`\2`/' \
+ -e 's/^\(example:\s*\)\(getelt.*\)$/\1 `\2`/' \
+ -e 's/^\(.*: \)/- \1/g' \
+ >> README.new
+ mkdir -p $out/man/man1
+ ronn --roff README.new --pipe > $out/man/man1/geteltorito.1
+ install -vD geteltorito $out/bin/geteltorito
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Extract the initial/default boot image from a CD image if existent";
+ homepage = "https://userpages.uni-koblenz.de/~krienke/ftp/noarch/geteltorito/";
+ maintainer = [ maintainers.profpatsch ];
+ license = licenses.gpl2;
+ };
+
+}
diff --git a/pkgs/tools/misc/ipxe/default.nix b/pkgs/tools/misc/ipxe/default.nix
index 1efac3b78441..6cd451264ab4 100644
--- a/pkgs/tools/misc/ipxe/default.nix
+++ b/pkgs/tools/misc/ipxe/default.nix
@@ -27,8 +27,12 @@ stdenv.mkDerivation {
];
+ enabledOptions = [ "DOWNLOAD_PROTO_HTTPS" ];
+
configurePhase = ''
- echo "#define DOWNLOAD_PROTO_HTTPS" >> src/config/general.h
+ runHook preConfigure
+ for opt in $enabledOptions; do echo "#define $opt" >> src/config/general.h; done
+ runHook postConfigure
'';
preBuild = "cd src";
diff --git a/pkgs/tools/misc/kalibrate-hackrf/default.nix b/pkgs/tools/misc/kalibrate-hackrf/default.nix
new file mode 100644
index 000000000000..0bd6f573ead0
--- /dev/null
+++ b/pkgs/tools/misc/kalibrate-hackrf/default.nix
@@ -0,0 +1,37 @@
+{ stdenv, fetchFromGitHub, autoreconfHook, pkgconfig, fftw, hackrf, libusb1 }:
+
+stdenv.mkDerivation rec {
+ name = "kalibrate-hackrf-unstable-20160827";
+
+ # There are no tags/releases, so use the latest commit from git master.
+ # Currently, the latest commit is from 2016-07-03.
+ src = fetchFromGitHub {
+ owner = "scateu";
+ repo = "kalibrate-hackrf";
+ rev = "2492c20822ca6a49dce97967caf394b1d4b2c43e";
+ sha256 = "1jvn1qx7csgycxpx1k804sm9gk5a0c65z9gh8ybp9awq3pziv0nx";
+ };
+
+ nativeBuildInputs = [ autoreconfHook pkgconfig ];
+
+ buildInputs = [ fftw hackrf libusb1 ];
+
+ postInstall = ''
+ mv $out/bin/kal $out/bin/kal-hackrf
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Calculate local oscillator frequency offset in hackrf devices";
+ longDescription = ''
+ Kalibrate, or kal, can scan for GSM base stations in a given frequency
+ band and can use those GSM base stations to calculate the local
+ oscillator frequency offset.
+
+ This package is for hackrf devices.
+ '';
+ homepage = https://github.com/scateu/kalibrate-hackrf;
+ license = licenses.bsd2;
+ platforms = platforms.linux;
+ maintainers = [ maintainers.mog ];
+ };
+}
diff --git a/pkgs/tools/misc/kargo/default.nix b/pkgs/tools/misc/kargo/default.nix
new file mode 100644
index 000000000000..ddc030bcf8da
--- /dev/null
+++ b/pkgs/tools/misc/kargo/default.nix
@@ -0,0 +1,36 @@
+{ stdenv, fetchurl, pythonPackages }:
+
+pythonPackages.buildPythonApplication rec {
+ version = "0.4.6";
+ name = "kargo-${version}";
+
+ src = fetchurl {
+ url = "mirror://pypi/k/kargo/${name}.tar.gz";
+ sha256 = "1sm721c3d4scpc1gj2j3qwssr6jjvw6aq3p7ipvhbd9ywmm9dd7b";
+ };
+
+ doCheck = false;
+
+ propagatedBuildInputs = with pythonPackages; [
+ ansible2
+ boto
+ cffi
+ cryptography
+ libcloud
+ markupsafe
+ netaddr
+ pyasn1
+ requests2
+ setuptools
+ ];
+
+ meta = with stdenv.lib; {
+ homepage = https://github.com/kubespray/kargo-cli;
+ description = "A tool helps to deploy a kubernetes cluster with Ansible.";
+ platforms = platforms.linux;
+ license = licenses.gpl3;
+ maintainers = with maintainers; [
+ jgeerds
+ ];
+ };
+}
diff --git a/pkgs/tools/misc/lf/default.nix b/pkgs/tools/misc/lf/default.nix
new file mode 100644
index 000000000000..80b8457f07f4
--- /dev/null
+++ b/pkgs/tools/misc/lf/default.nix
@@ -0,0 +1,31 @@
+{ stdenv, buildGoPackage, fetchFromGitHub }:
+
+buildGoPackage rec {
+ name = "lf-unstable-${version}";
+ version = "2016-10-02";
+
+ goPackagePath = "github.com/gokcehan/lf";
+
+ src = fetchFromGitHub {
+ owner = "gokcehan";
+ repo = "lf";
+ rev = "7a851f6c720380a6b9f715542906a56334e7e98b"; # nightly
+ sha256 = "0hdxcibly3algz0hgy65xr3dxchf4aarpxdgxsgc67m1knizksjr";
+ };
+
+ goDeps = ./deps.nix;
+
+ meta = with stdenv.lib; {
+ description = "A terminal file manager written in Go and heavily inspired by ranger";
+ longDescription = ''
+ lf (as in "list files") is a terminal file manager written in Go. It is
+ heavily inspired by ranger with some missing and extra features. Some of
+ the missing features are deliberately omitted since it is better if they
+ are handled by external tools.
+ '';
+ homepage = "https://godoc.org/github.com/gokcehan/lf";
+ license = licenses.mit;
+ platforms = platforms.linux;
+ maintainers = with maintainers; [ primeos ];
+ };
+}
diff --git a/pkgs/tools/misc/lf/deps.nix b/pkgs/tools/misc/lf/deps.nix
new file mode 100644
index 000000000000..ebd11853291e
--- /dev/null
+++ b/pkgs/tools/misc/lf/deps.nix
@@ -0,0 +1,20 @@
+[
+ {
+ goPackagePath = "github.com/nsf/termbox-go";
+ fetch = {
+ type = "git";
+ url = "https://github.com/nsf/termbox-go";
+ rev = "b6acae516ace002cb8105a89024544a1480655a5"; # master
+ sha256 = "0zf95qdd5bif9rw03hqk87x7d905p373bvsj0bl4gi16spqjbdil";
+ };
+ }
+ {
+ goPackagePath = "github.com/mattn/go-runewidth";
+ fetch = {
+ type = "git";
+ url = "https://github.com/mattn/go-runewidth";
+ rev = "d6bea18f789704b5f83375793155289da36a3c7f"; # v0.0.1
+ sha256 = "1hnigpn7rjbwd1ircxkyx9hvi0xmxr32b2jdy2jzw6b3jmcnz1fs";
+ };
+ }
+]
diff --git a/pkgs/tools/misc/logstash/default.nix b/pkgs/tools/misc/logstash/default.nix
index e8f3ccf747d6..079e5c7a93bf 100644
--- a/pkgs/tools/misc/logstash/default.nix
+++ b/pkgs/tools/misc/logstash/default.nix
@@ -1,12 +1,12 @@
-{ stdenv, fetchurl }:
+{ stdenv, fetchurl, makeWrapper, jre }:
stdenv.mkDerivation rec {
- version = "2.3.4";
+ version = "2.4.0";
name = "logstash-${version}";
src = fetchurl {
url = "https://download.elasticsearch.org/logstash/logstash/logstash-${version}.tar.gz";
- sha256 = "10wm4f5ygzifk84c1n9yyj285ccn2zd2m61y6hyf6wirvhys0qkz";
+ sha256 = "1k27hb6q1r26rp3y9pb2ry92kicw83mi352dzl2y4h0gbif46b32";
};
dontBuild = true;
@@ -14,10 +14,22 @@ stdenv.mkDerivation rec {
dontStrip = true;
dontPatchShebangs = true;
+ buildInputs = [
+ makeWrapper jre
+ ];
+
installPhase = ''
mkdir -p $out
cp -r {Gemfile*,vendor,lib,bin} $out
- mv $out/bin/plugin $out/bin/logstash-plugin
+
+ wrapProgram $out/bin/logstash \
+ --set JAVA_HOME "${jre}"
+
+ wrapProgram $out/bin/rspec \
+ --set JAVA_HOME "${jre}"
+
+ wrapProgram $out/bin/logstash-plugin \
+ --set JAVA_HOME "${jre}"
'';
meta = with stdenv.lib; {
diff --git a/pkgs/tools/misc/lolcat/default.nix b/pkgs/tools/misc/lolcat/default.nix
index 21355652d3e3..21377d7bfa4a 100644
--- a/pkgs/tools/misc/lolcat/default.nix
+++ b/pkgs/tools/misc/lolcat/default.nix
@@ -2,12 +2,10 @@
, pkgconfig, which }:
bundlerEnv {
- name = "lolcat-42.1.0";
-
inherit ruby;
- gemfile = ./Gemfile;
- lockfile = ./Gemfile.lock;
- gemset = ./gemset.nix;
+
+ pname = "lolcat";
+ gemdir = ./.;
meta = with lib; {
description = "A rainbow version of cat";
diff --git a/pkgs/tools/misc/man-db/default.nix b/pkgs/tools/misc/man-db/default.nix
index b049e0706e9a..9c1dabc75844 100644
--- a/pkgs/tools/misc/man-db/default.nix
+++ b/pkgs/tools/misc/man-db/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, pkgconfig, libpipeline, db, groff }:
+{ stdenv, fetchurl, pkgconfig, libpipeline, db, groff, makeWrapper }:
stdenv.mkDerivation rec {
name = "man-db-2.7.5";
@@ -11,9 +11,8 @@ stdenv.mkDerivation rec {
outputs = [ "out" "doc" ];
outputMan = "out"; # users will want `man man` to work
- nativeBuildInputs = [ pkgconfig ];
+ nativeBuildInputs = [ pkgconfig makeWrapper ];
buildInputs = [ libpipeline db groff ];
- troff="${groff}/bin/groff";
postPatch = ''
substituteInPlace src/man_db.conf.in \
@@ -27,14 +26,14 @@ stdenv.mkDerivation rec {
# Don't try /etc/man_db.conf by default, so we avoid error messages.
"--with-config-file=\${out}/etc/man_db.conf"
"--with-systemdtmpfilesdir=\${out}/lib/tmpfiles.d"
- "--with-eqn=${groff}/bin/eqn"
- "--with-neqn=${groff}/bin/neqn"
- "--with-nroff=${groff}/bin/nroff"
- "--with-pic=${groff}/bin/pic"
- "--with-refer=${groff}/bin/refer"
- "--with-tbl=${groff}/bin/tbl"
];
+ postInstall = ''
+ for i in "$out/bin/"*; do
+ wrapProgram "$i" --prefix PATH : "${groff}/bin"
+ done
+ '';
+
enableParallelBuilding = true;
doCheck = true;
diff --git a/pkgs/tools/misc/mc/default.nix b/pkgs/tools/misc/mc/default.nix
index fbd2c642b9d2..e840aa15ec20 100644
--- a/pkgs/tools/misc/mc/default.nix
+++ b/pkgs/tools/misc/mc/default.nix
@@ -3,11 +3,11 @@
stdenv.mkDerivation rec {
name = "mc-${version}";
- version = "4.8.17";
+ version = "4.8.18";
src = fetchurl {
- url = "http://www.midnight-commander.org/downloads/${name}.tar.bz2";
- sha256 = "0fvqzffppj0aja9hi0k1xdjg5m6s99immlla1y9yzn5fp8vwpl36";
+ url = "http://www.midnight-commander.org/downloads/${name}.tar.xz";
+ sha256 = "1kmysm1x7smxs9k483nin6bx1rx0av8xrqjx9yf73hc7r4anhqzp";
};
buildInputs = [ pkgconfig perl glib gpm slang zip unzip file gettext libX11 libICE e2fsprogs
@@ -18,9 +18,11 @@ stdenv.mkDerivation rec {
meta = {
description = "File Manager and User Shell for the GNU Project";
homepage = http://www.midnight-commander.org;
+ downloadPage = "http://www.midnight-commander.org/downloads/";
repositories.git = git://github.com/MidnightCommander/mc.git;
license = stdenv.lib.licenses.gpl2Plus;
maintainers = [ stdenv.lib.maintainers.sander ];
platforms = stdenv.lib.platforms.linux;
+ updateWalker = true;
};
}
diff --git a/pkgs/tools/misc/mysqltuner/default.nix b/pkgs/tools/misc/mysqltuner/default.nix
new file mode 100644
index 000000000000..38cfa8b19cd1
--- /dev/null
+++ b/pkgs/tools/misc/mysqltuner/default.nix
@@ -0,0 +1,27 @@
+{ stdenv, fetchFromGitHub, perl }:
+
+stdenv.mkDerivation rec {
+ name = "mysqltuner-${version}";
+ version = "1.6.18";
+
+ src = fetchFromGitHub {
+ owner = "major";
+ repo = "MySQLTuner-perl";
+ rev = version;
+ sha256 = "14dblrjqciyx6k7yczfzbaflc7hdxnj0kyy6q0lqfz8imszdkpi2";
+ };
+
+ buildInputs = [ perl ];
+
+ installPhase = ''
+ mkdir -p $out/bin
+ install -m0755 mysqltuner.pl $out/bin/mysqltuner
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Make recommendations for increased performance and stability of MariaDB/MySQL";
+ homepage = http://mysqltuner.com;
+ license = licenses.gpl3;
+ maintainers = with maintainers; [ peterhoeg ];
+ };
+}
diff --git a/pkgs/tools/misc/nixbot/default.nix b/pkgs/tools/misc/nixbot/default.nix
new file mode 100644
index 000000000000..6fb0b9c8201b
--- /dev/null
+++ b/pkgs/tools/misc/nixbot/default.nix
@@ -0,0 +1,25 @@
+{ stdenv, python3Packages, fetchFromGitHub }:
+
+python3Packages.buildPythonApplication rec {
+ name = "nixbot-unstable-2016-10-09";
+
+ src = fetchFromGitHub {
+ owner = "domenkozar";
+ repo = "nixbot";
+ rev = "dc490e4954cb08f0eff97f74ad39dedb54670aa9";
+ sha256 = "1l8rlhd2b7x5m79vb2vgszachygasv0pk8drnwgxyvsn0k88xcan";
+ };
+
+ propagatedBuildInputs = with python3Packages; [
+ pygit2 pyramid waitress github3_py
+ ];
+
+ doCheck = false;
+
+ meta = with stdenv.lib; {
+ desciption = "Github bot for reviewing/testing pull requests with the help of Hydra";
+ maintainers = with maintainers; [ domenkozar fpletz globin ];
+ license = licenses.asl20;
+ homepage = https://github.com/domenkozar/nixbot;
+ };
+}
diff --git a/pkgs/tools/misc/openopc/default.nix b/pkgs/tools/misc/openopc/default.nix
index 2fce3807ca7e..9da59824e292 100644
--- a/pkgs/tools/misc/openopc/default.nix
+++ b/pkgs/tools/misc/openopc/default.nix
@@ -1,6 +1,8 @@
-{ stdenv, fetchurl, pythonFull }:
+{ stdenv, fetchurl, python }:
-stdenv.mkDerivation rec {
+let
+ pythonEnv = python.withPackages(ps: [ps.pyro3]);
+in stdenv.mkDerivation rec {
name = "openopc-${version}";
version = "1.2.0";
@@ -13,16 +15,16 @@ stdenv.mkDerivation rec {
installPhase = ''
mkdir -p "$out/bin"
mkdir -p "$out/share/doc/openopc"
- mkdir -p "$out/${pythonFull.python.sitePackages}"
+ mkdir -p "$out/${pythonEnv.python.sitePackages}"
mkdir -p "$out/libexec/opc"
- cp src/OpenOPC.py "$out/${pythonFull.python.sitePackages}"
+ cp src/OpenOPC.py "$out/${pythonEnv.python.sitePackages}"
cp src/opc.py "$out/libexec/opc/"
cat > "$out/bin/opc" << __EOF__
#!${stdenv.shell}
- export PYTHONPATH="$out/${pythonFull.python.sitePackages}"
- exec ${pythonFull}/bin/${pythonFull.python.executable} "$out/libexec/opc/opc.py" "\$@"
+ export PYTHONPATH="$out/${pythonEnv.python.sitePackages}"
+ exec ${pythonEnv}/bin/${pythonEnv.python.executable} "$out/libexec/opc/opc.py" "\$@"
__EOF__
chmod a+x "$out/bin/opc"
diff --git a/pkgs/tools/misc/ostree/default.nix b/pkgs/tools/misc/ostree/default.nix
index 7d9d5545f406..4655331dbc17 100644
--- a/pkgs/tools/misc/ostree/default.nix
+++ b/pkgs/tools/misc/ostree/default.nix
@@ -7,8 +7,8 @@ let
libglnx-src = fetchFromGitHub {
owner = "GNOME";
repo = "libglnx";
- rev = "769522753c25537e520adc322fa62e5390272add";
- sha256 = "0gfc8dl63xpmf73dwb1plj7cymq7z6w6wq5m06yx8jymwhq7x1l8";
+ rev = "36396b49ad6636c9959f3dfac5e04d41584b1a92";
+ sha256 = "146flrpzybm2s12wg05rnglnfd2f2jx3xzvns2pq28kvg09bgcfn";
};
bsdiff-src = fetchFromGitHub {
@@ -17,15 +17,16 @@ let
rev = "1edf9f656850c0c64dae260960fabd8249ea9c60";
sha256 = "1h71d2h2d3anp4msvpaff445rnzdxii3id2yglqk7af9i43kdsn1";
};
-in stdenv.mkDerivation rec {
- rev = "v2016.5";
- name = "ostree-${rev}";
+
+ version = "2016.11";
+in stdenv.mkDerivation {
+ name = "ostree-${version}";
src = fetchFromGitHub {
- inherit rev;
+ rev = "v${version}";
owner = "ostreedev";
repo = "ostree";
- sha256 = "1dfyhzgv94ldjv2l4jxf4xhks2z5ljljqa3k579qskds755n6kvg";
+ sha256 = "19xmg01mxdykx74r9ra11hc15qd1fjqbxdn23jrn2pcvz8dw9zgc";
};
nativeBuildInputs = [
@@ -43,6 +44,8 @@ in stdenv.mkDerivation rec {
preConfigure = ''
env NOCONFIGURE=1 ./autogen.sh
+
+ configureFlags+="--with-systemdsystemunitdir=$out/lib/systemd/system"
'';
meta = with stdenv.lib; {
diff --git a/pkgs/tools/misc/parted/default.nix b/pkgs/tools/misc/parted/default.nix
index ba179d7af91f..cfce018a2361 100644
--- a/pkgs/tools/misc/parted/default.nix
+++ b/pkgs/tools/misc/parted/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, devicemapper, libuuid, gettext, readline, perl, python
+{ stdenv, fetchurl, devicemapper, libuuid, gettext, readline, perl, python2
, utillinux, check, enableStatic ? false, hurd ? null }:
stdenv.mkDerivation rec {
@@ -20,7 +20,7 @@ stdenv.mkDerivation rec {
++ stdenv.lib.optional (gettext != null) gettext
++ stdenv.lib.optional (devicemapper != null) devicemapper
++ stdenv.lib.optional (hurd != null) hurd
- ++ stdenv.lib.optionals doCheck [ check perl python ];
+ ++ stdenv.lib.optionals doCheck [ check perl python2 ];
configureFlags =
(if (readline != null)
diff --git a/pkgs/tools/misc/peruse/default.nix b/pkgs/tools/misc/peruse/default.nix
new file mode 100644
index 000000000000..865c6b1e842a
--- /dev/null
+++ b/pkgs/tools/misc/peruse/default.nix
@@ -0,0 +1,42 @@
+{
+ kdeDerivation, kdeWrapper, fetchFromGitHub, fetchurl, lib,
+ ecm, kdoctools,
+ baloo, kconfig, kfilemetadata, kinit, kirigami, plasma-framework
+}:
+
+let
+ pname = "peruse";
+ version = "1.1";
+ unarr = fetchFromGitHub {
+ owner = "zeniko";
+ repo = "unarr";
+ rev = "d1be8c43a82a4320306c8e835a86fdb7b2574ca7";
+ sha256 = "03ds5da69zipa25rsp76l6xqivrh3wcgygwyqa5x2rgcz3rjnlpr";
+ };
+ unwrapped = kdeDerivation rec {
+ name = "${pname}-${version}";
+
+ src = fetchurl {
+ url = "mirror://kde/stable/${pname}/${name}.tar.xz";
+ sha256 = "1akk9hg12y6iis0rb5kdkznm3xk7hk04r9ccqyz8lr6y073n5f9j";
+ };
+
+ nativeBuildInputs = [ ecm kdoctools ];
+
+ propagatedBuildInputs = [ baloo kconfig kfilemetadata kinit kirigami plasma-framework ];
+
+ preConfigure = ''
+ rmdir src/qtquick/karchive-rar/external/unarr
+ ln -s ${unarr} src/qtquick/karchive-rar/external/unarr
+ '';
+
+ meta = with lib; {
+ license = licenses.gpl2;
+ maintainers = with maintainers; [ peterhoeg ];
+ };
+
+ };
+
+in kdeWrapper unwrapped {
+ targets = [ "bin/peruse" ];
+}
diff --git a/pkgs/tools/misc/remind/default.nix b/pkgs/tools/misc/remind/default.nix
index 11d6991b89cb..dfda07fda4e4 100644
--- a/pkgs/tools/misc/remind/default.nix
+++ b/pkgs/tools/misc/remind/default.nix
@@ -1,12 +1,33 @@
-{stdenv, fetchurl} :
+{stdenv, fetchurl, tk, tcllib, makeWrapper
+, tkremind ? true
+} :
-stdenv.mkDerivation {
+assert tkremind -> tk != null;
+assert tkremind -> tcllib != null;
+assert tkremind -> makeWrapper != null;
+
+stdenv.mkDerivation rec {
name = "remind-3.1.15";
src = fetchurl {
url = http://www.roaringpenguin.com/files/download/remind-03.01.15.tar.gz;
sha256 = "1hcfcxz5fjzl7606prlb7dgls5kr8z3wb51h48s6qm8ang0b9nla";
};
+ tclLibraries = if tkremind then [ tcllib tk ] else [];
+ tclLibPaths = stdenv.lib.concatStringsSep " "
+ (map (p: "${p}/lib/${p.libPrefix}") tclLibraries);
+
+ buildInputs = if tkremind then [ makeWrapper ] else [];
+ propagatedBuildInputs = tclLibraries;
+
+ postPatch = if tkremind then ''
+ substituteInPlace scripts/tkremind --replace "exec wish" "exec ${tk}/bin/wish"
+ '' else "";
+
+ postInstall = if tkremind then ''
+ wrapProgram $out/bin/tkremind --set TCLLIBPATH "${tclLibPaths}"
+ '' else "";
+
meta = {
homepage = http://www.roaringpenguin.com/products/remind;
description = "Sophisticated calendar and alarm program for the console";
diff --git a/pkgs/tools/misc/rpm-ostree/default.nix b/pkgs/tools/misc/rpm-ostree/default.nix
index f96e70650b7c..3e2953c57334 100644
--- a/pkgs/tools/misc/rpm-ostree/default.nix
+++ b/pkgs/tools/misc/rpm-ostree/default.nix
@@ -1,35 +1,60 @@
{ stdenv, fetchFromGitHub, ostree, rpm, which, autoconf, automake, libtool, pkgconfig,
- libcap, glib, libgsystem, json_glib, libarchive, libhif, librepo, gtk_doc, elfutils,
- libxslt, docbook_xsl, docbook_xml_dtd_42, acl }:
+ libcap, glib, libgsystem, json_glib, libarchive, libsolv, librepo, gtk_doc, elfutils,
+ gperf, cmake, pcre, check, python, libxslt, docbook_xsl, docbook_xml_dtd_42, acl }:
let
libglnx-src = fetchFromGitHub {
owner = "GNOME";
repo = "libglnx";
- rev = "85c9dd5c073a8c0d74c4baa2e4a94f5535984e62";
- sha256 = "08m8wxlkymwq5hsc26k7ndwiqiw1ggaaxyi2qfhqznasgbp4g623";
+ rev = "4ae5e3beaaa674abfabf7404ab6fafcc4ec547db";
+ sha256 = "1npb9zbyb4bl0nxqf0pcqankcwzs3k1x8i2wkdwhgak4qcvxvfqn";
};
-in stdenv.mkDerivation rec {
- rev = "v2016.1";
- name = "rpm-ostree";
+
+ libdnf-src = fetchFromGitHub {
+ owner = "rpm-software-management";
+ repo = "libhif";
+ rev = "b69552b3b3a42fd41698a925d5f5f623667bac63";
+ sha256 = "0h6k09rb4imzbmsn7mspwl0js2awqdpb4ysdqq550vw2nr0dzszr";
+ };
+
+ version = "2016.10";
+in stdenv.mkDerivation {
+ name = "rpm-ostree-${version}";
src = fetchFromGitHub {
- inherit rev;
+ rev = "v${version}";
owner = "projectatomic";
repo = "rpm-ostree";
- sha256 = "19jvnmy9zinx0j5nvy3h5abfv9d988kvyza09gljx16gll8qkbbf";
+ sha256 = "0a0wwklzk1kvk3bbxxfvxgk4ck5dn7a7v32shqidb674fr2d5pvb";
};
buildInputs = [
- which autoconf automake pkgconfig libtool libcap ostree rpm glib libgsystem
- json_glib libarchive libhif librepo gtk_doc libxslt docbook_xsl docbook_xml_dtd_42
+ which autoconf automake pkgconfig libtool libcap ostree rpm glib libgsystem gperf
+ json_glib libarchive libsolv librepo gtk_doc libxslt docbook_xsl docbook_xml_dtd_42
+ cmake pcre check python
# FIXME: get rid of this once libarchive properly propagates this
acl
];
+ dontUseCmakeConfigure = true;
+
prePatch = ''
- rmdir libglnx
+ rmdir libglnx libdnf
cp --no-preserve=mode -r ${libglnx-src} libglnx
+ cp --no-preserve=mode -r ${libdnf-src} libdnf
+
+ # According to #cmake on freenode, libdnf should bundle the FindLibSolv.cmake module
+ cp ${libsolv}/share/cmake/Modules/FindLibSolv.cmake libdnf/cmake/modules/
+
+ # See https://github.com/projectatomic/rpm-ostree/issues/480
+ substituteInPlace src/libpriv/rpmostree-unpacker.c --replace 'include <selinux/selinux.h>' ""
+
+ # libdnf normally wants sphinx to build its hawkey manpages, but we don't care about those manpages since we don't use hawkey
+ substituteInPlace configure.ac --replace 'cmake \' 'cmake -DWITH_MAN=off \'
+
+ # Let's not hardcode the rpm-gpg path...
+ substituteInPlace libdnf/libdnf/dnf-keyring.c \
+ --replace '"/etc/pki/rpm-gpg"' 'getenv("LIBDNF_RPM_GPG_PATH_OVERRIDE") ? getenv("LIBDNF_RPM_GPG_PATH_OVERRIDE") : "/etc/pki/rpm-gpg"'
'';
preConfigure = ''
diff --git a/pkgs/tools/misc/screenfetch/default.nix b/pkgs/tools/misc/screenfetch/default.nix
index 972e10492784..a68918866641 100644
--- a/pkgs/tools/misc/screenfetch/default.nix
+++ b/pkgs/tools/misc/screenfetch/default.nix
@@ -1,14 +1,15 @@
-{ stdenv, fetchgit, makeWrapper
-, coreutils, gawk, procps, gnused, findutils, xdpyinfo, xprop, gnugrep
+{ stdenv, fetchFromGitHub, makeWrapper, coreutils, gawk, procps, gnused
+, findutils, xdpyinfo, xprop, gnugrep, ncurses
}:
stdenv.mkDerivation {
- name = "screenFetch-2016-01-13";
+ name = "screenFetch-2016-10-11";
- src = fetchgit {
- url = git://github.com/KittyKatt/screenFetch.git;
- rev = "22e5bee7647453d45ec82f543f37b8a6a062835d";
- sha256 = "0xdiz02bqg7ajj547j496qq9adysm1f6zymcy3yyfgw3prnzvdir";
+ src = fetchFromGitHub {
+ owner = "KittyKatt";
+ repo = "screenFetch";
+ rev = "89e51f24018c89b3647deb24406a9af3a78bbe99";
+ sha256 = "0i2k261jj2s4sfhav7vbsd362pa0gghw6qhwafhmicmf8hq2a18v";
};
nativeBuildInputs = [ makeWrapper ];
@@ -28,7 +29,8 @@ stdenv.mkDerivation {
--prefix PATH : "${findutils}/bin" \
--prefix PATH : "${xdpyinfo}/bin" \
--prefix PATH : "${xprop}/bin" \
- --prefix PATH : "${gnugrep}/bin"
+ --prefix PATH : "${gnugrep}/bin" \
+ --prefix PATH : "${ncurses}/bin"
'';
meta = {
diff --git a/pkgs/tools/misc/svtplay-dl/default.nix b/pkgs/tools/misc/svtplay-dl/default.nix
index 437be3a46808..7eba2d2f939c 100644
--- a/pkgs/tools/misc/svtplay-dl/default.nix
+++ b/pkgs/tools/misc/svtplay-dl/default.nix
@@ -5,13 +5,13 @@ let
inherit (pythonPackages) python nose pycrypto requests2 mock;
in stdenv.mkDerivation rec {
name = "svtplay-dl-${version}";
- version = "1.5";
+ version = "1.7";
src = fetchFromGitHub {
owner = "spaam";
repo = "svtplay-dl";
rev = version;
- sha256 = "1hmg49fhvdf7yjybxmky4ymy5s4mgbh9b8pbgyfnhm1i3s544bz2";
+ sha256 = "15vadnyah51pk4d0lx11bymxhfq47l5ijn72pjqr9yjx3pkgpd7w";
};
pythonPaths = [ pycrypto requests2 ];
diff --git a/pkgs/tools/misc/thin-provisioning-tools/default.nix b/pkgs/tools/misc/thin-provisioning-tools/default.nix
new file mode 100644
index 000000000000..5d43679b6fe6
--- /dev/null
+++ b/pkgs/tools/misc/thin-provisioning-tools/default.nix
@@ -0,0 +1,25 @@
+{ stdenv, fetchFromGitHub, autoreconfHook, expat, libaio, boost }:
+
+stdenv.mkDerivation rec {
+ name = "thin-provisioning-tools-${version}";
+ version = "0.6.3";
+
+ src = fetchFromGitHub {
+ owner = "jthornber";
+ repo = "thin-provisioning-tools";
+ rev = "v${version}";
+ sha256 = "0glwhfzwj9afbqdv59ppgfqy7rik8m0vcap7279fpnvwpr1c2p5n";
+ };
+
+ nativeBuildInputs = [ autoreconfHook ];
+
+ buildInputs = [ expat libaio boost ];
+
+ meta = with stdenv.lib; {
+ homepage = https://github.com/jthornber/thin-provisioning-tools/;
+ description = "A suite of tools for manipulating the metadata of the dm-thin device-mapper target";
+ license = licenses.gpl3;
+ platforms = platforms.unix;
+ maintainers = with maintainers; [ globin ];
+ };
+}
diff --git a/pkgs/tools/misc/tmuxp/default.nix b/pkgs/tools/misc/tmuxp/default.nix
index 1f1ec0437f86..3ca01d7e5eb9 100644
--- a/pkgs/tools/misc/tmuxp/default.nix
+++ b/pkgs/tools/misc/tmuxp/default.nix
@@ -2,20 +2,17 @@
pythonPackages.buildPythonApplication rec {
name = "tmuxp-${version}";
- version = "1.2.0";
+ version = "1.2.2";
namePrefix = "";
src = fetchurl {
url = "mirror://pypi/t/tmuxp/${name}.tar.gz";
- sha256 = "05z5ssv9glsqmcy9fdq06bawy1274dnzqsqd3a4z4jd0w6j09smn";
+ sha256 = "1g37pdxs0wmnskqm7qsqm0ygwpc1dxk1d7lrzpgs717zxaak8vln";
};
patchPhase = ''
- # Dependencies required for testing shouldn't pinned to
- # a specific version.
- substituteInPlace requirements/test.txt \
- --replace "==" ">="
+ sed -i 's/==.*$//' requirements/test.txt
'';
buildInputs = with pythonPackages; [
diff --git a/pkgs/tools/misc/umlet/default.nix b/pkgs/tools/misc/umlet/default.nix
index cc51af22f851..8ef357f65eb6 100644
--- a/pkgs/tools/misc/umlet/default.nix
+++ b/pkgs/tools/misc/umlet/default.nix
@@ -1,14 +1,14 @@
{ stdenv, fetchurl, jre, unzip }:
stdenv.mkDerivation rec {
- major = "13";
- minor = "3";
+ major = "14";
+ minor = "2";
version = "${major}.${minor}";
name = "umlet-${version}";
src = fetchurl {
- url = "http://www.umlet.com/umlet_${major}_${minor}/umlet_${version}.zip";
- sha256 = "0fbr51xknk98qz576lcl25qz0s1snns2yb0j54d77xkw7pnxmvzr";
+ url = "http://www.umlet.com/umlet_${major}_${minor}/umlet-standalone-${version}.zip";
+ sha256 = "1fcc7ms92vcc4b8jh56bd3zrqdb0bwhbbzdxycc952fb0j6m62fw";
};
buildInputs = [ unzip ];
diff --git a/pkgs/tools/misc/vdirsyncer/default.nix b/pkgs/tools/misc/vdirsyncer/default.nix
index 51762006b623..633371606a8a 100644
--- a/pkgs/tools/misc/vdirsyncer/default.nix
+++ b/pkgs/tools/misc/vdirsyncer/default.nix
@@ -1,14 +1,17 @@
-{ stdenv, fetchurl, pythonPackages, glibcLocales }:
+{ stdenv, fetchurl, python3Packages, glibcLocales }:
# Packaging documentation at:
# https://github.com/untitaker/vdirsyncer/blob/master/docs/packaging.rst
+let
+ pythonPackages = python3Packages;
+in
pythonPackages.buildPythonApplication rec {
- version = "0.11.3";
+ version = "0.14.0";
name = "vdirsyncer-${version}";
src = fetchurl {
url = "mirror://pypi/v/vdirsyncer/${name}.tar.gz";
- sha256 = "10majl58vdpxgbddjqgwblvl7akvvr4c2c8iaxnf3kgyh01jq6k9";
+ sha256 = "1mbh2gykx9sqsnyfa962ifxksx4afl2lb9rcsbd6rsh3gj2il898";
};
propagatedBuildInputs = with pythonPackages; [
diff --git a/pkgs/tools/misc/venus/default.nix b/pkgs/tools/misc/venus/default.nix
index 6fc4e436153f..9f2e4ce8eecb 100644
--- a/pkgs/tools/misc/venus/default.nix
+++ b/pkgs/tools/misc/venus/default.nix
@@ -28,7 +28,7 @@ stdenv.mkDerivation rec {
doCheck = true;
checkPhase = "python runtests.py";
- buildInputs = [ python python.modules.bsddb libxslt
+ buildInputs = [ python libxslt
libxml2 pythonPackages.genshi pythonPackages.lxml makeWrapper ];
installPhase = ''
diff --git a/pkgs/tools/misc/xdummy/default.nix b/pkgs/tools/misc/xdummy/default.nix
index 1f4dbc863327..8a411d89da5d 100644
--- a/pkgs/tools/misc/xdummy/default.nix
+++ b/pkgs/tools/misc/xdummy/default.nix
@@ -74,7 +74,6 @@ let
in writeScriptBin "xdummy" ''
#!${stdenv.shell}
- export XKB_BINDIR="${xorg.xkbcomp}/bin"
exec ${xorg.xorgserver.out}/bin/Xorg \
-noreset \
-logfile /dev/null \
diff --git a/pkgs/tools/misc/xtitle/default.nix b/pkgs/tools/misc/xtitle/default.nix
index 600f40a67b7d..4be863993901 100644
--- a/pkgs/tools/misc/xtitle/default.nix
+++ b/pkgs/tools/misc/xtitle/default.nix
@@ -1,11 +1,11 @@
{ stdenv, fetchurl, libxcb, xcbutil, xcbutilwm, git }:
stdenv.mkDerivation rec {
- name = "xtitle-0.2";
+ name = "xtitle-0.3";
src = fetchurl {
- url = "https://github.com/baskerville/xtitle/archive/0.2.tar.gz";
- sha256 = "1wyhfwbwqnq4rn6i789gydxlg25ylc37xjrkq758bp55sdgb8fk2";
+ url = "https://github.com/baskerville/xtitle/archive/0.3.tar.gz";
+ sha256 = "07r36f4ad1q0dpkx3ykd49xlmi24d8mjqwh40j228k81wsvzayl1";
};
diff --git a/pkgs/tools/misc/xvfb-run/default.nix b/pkgs/tools/misc/xvfb-run/default.nix
index 838831faaaf8..c33f09529a56 100644
--- a/pkgs/tools/misc/xvfb-run/default.nix
+++ b/pkgs/tools/misc/xvfb-run/default.nix
@@ -16,7 +16,6 @@ stdenv.mkDerivation {
chmod a+x $out/bin/xvfb-run
wrapProgram $out/bin/xvfb-run \
- --set XKB_BINDIR "${xkbcomp}/bin" \
--set FONTCONFIG_FILE "${fontsConf}" \
--prefix PATH : ${stdenv.lib.makeBinPath [ getopt xorgserver xauth which utillinux gawk coreutils ]}
'';
diff --git a/pkgs/tools/misc/youtube-dl/default.nix b/pkgs/tools/misc/youtube-dl/default.nix
index 1233cb09c78d..005915080afe 100644
--- a/pkgs/tools/misc/youtube-dl/default.nix
+++ b/pkgs/tools/misc/youtube-dl/default.nix
@@ -14,11 +14,11 @@ with stdenv.lib;
buildPythonApplication rec {
name = "youtube-dl-${version}";
- version = "2016.09.27";
+ version = "2016.10.25";
src = fetchurl {
url = "https://yt-dl.org/downloads/${version}/${name}.tar.gz";
- sha256 = "dfae0d25cb515d17e7145b7ab0edf0c85f77ef4975aefe46719fdef0a5d4a879";
+ sha256 = "920048c6ff2f7f2c4b55c1ba4810e85f76efd814118e59b3568bdc2c38024697";
};
buildInputs = [ makeWrapper zip ] ++ optional generateManPage pandoc;
diff --git a/pkgs/tools/networking/aria2/default.nix b/pkgs/tools/networking/aria2/default.nix
index 19e87d3a88b7..eec84e103867 100644
--- a/pkgs/tools/networking/aria2/default.nix
+++ b/pkgs/tools/networking/aria2/default.nix
@@ -5,13 +5,13 @@
stdenv.mkDerivation rec {
name = "aria2-${version}";
- version = "1.27.1";
+ version = "1.28.0";
src = fetchFromGitHub {
owner = "aria2";
repo = "aria2";
rev = "release-${version}";
- sha256 = "003m80gdcqfxi5jjzwiszql5y8lrj7a59gjygy0ya72fa9j4l9mi";
+ sha256 = "196prs98sxwwxiszw2m1kbcra7n7fxf758y5dcj2jkddrr37hdkw";
};
nativeBuildInputs = [ pkgconfig autoreconfHook ];
diff --git a/pkgs/tools/networking/burpsuite/default.nix b/pkgs/tools/networking/burpsuite/default.nix
new file mode 100644
index 000000000000..6f7e4ba4b695
--- /dev/null
+++ b/pkgs/tools/networking/burpsuite/default.nix
@@ -0,0 +1,38 @@
+{ stdenv, fetchurl, jre }:
+
+let
+ version = "1.7.06";
+ jar = fetchurl {
+ name = "burpsuite.jar";
+ url = "https://portswigger.net/Burp/Releases/Download?productId=100&version=${version}&type=Jar";
+ sha256 = "13x3x0la2jmm7zr66mvczzlmsy1parfibnl9s4iwi1nls4ikv7kl";
+ };
+ launcher = ''
+ #!${stdenv.shell}
+ exec ${jre}/bin/java -jar ${jar} "$@"
+ '';
+in stdenv.mkDerivation {
+ name = "burpsuite-${version}";
+ buildCommand = ''
+ mkdir -p $out/bin
+ echo "${launcher}" > $out/bin/burpsuite
+ chmod +x $out/bin/burpsuite
+ '';
+
+ meta = {
+ description = "An integrated platform for performing security testing of web applications";
+ longDescription = ''
+ Burp Suite is an integrated platform for performing security testing of web applications.
+ Its various tools work seamlessly together to support the entire testing process, from
+ initial mapping and analysis of an application's attack surface, through to finding and
+ exploiting security vulnerabilities.
+ '';
+ homepage = "https://portswigger.net/burp/";
+ downloadPage = "https://portswigger.net/burp/freedownload";
+ license = [ stdenv.lib.licenses.unfree ];
+ preferLocalBuild = true;
+ platforms = jre.meta.platforms;
+ hydraPlatforms = [];
+ maintainers = [ stdenv.lib.maintainers.bennofs ];
+ };
+}
diff --git a/pkgs/tools/networking/cmst/default.nix b/pkgs/tools/networking/cmst/default.nix
index 08bdb052d639..91472b7c61e5 100644
--- a/pkgs/tools/networking/cmst/default.nix
+++ b/pkgs/tools/networking/cmst/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
name = "cmst-${version}";
- version = "2016.04.03";
+ version = "2016.10.03";
src = fetchFromGitHub {
repo = "cmst";
owner = "andrew-bibb";
rev = name;
- sha256 = "1334ynhq1lxcfqln3bq17hy1awyfnn3zhzpsnymlyp0z3h4ydpp9";
+ sha256 = "1pvk1jg0fiw0j4f1wrnhgirgziliwa44sxfdmcq9ans4zbig4izh";
};
nativeBuildInputs = [ makeWrapper qmakeHook ];
@@ -19,16 +19,14 @@ stdenv.mkDerivation rec {
preConfigure = ''
substituteInPlace ./cmst.pro \
- --replace "/usr/bin" "$out/bin" \
- --replace "/usr/share" "$out/usr/share"
+ --replace "/usr/share" "$out/share"
substituteInPlace ./cmst.pri \
--replace "/usr/lib" "$out/lib" \
--replace "/usr/share" "$out/share"
substituteInPlace ./apps/cmstapp/cmstapp.pro \
- --replace "/usr/bin" "$out/bin" \
- --replace "/usr/share" "$out/share"
+ --replace "/usr/bin" "$out/bin"
substituteInPlace ./apps/rootapp/rootapp.pro \
--replace "/etc" "$out/etc" \
diff --git a/pkgs/tools/networking/dnscrypt-wrapper/default.nix b/pkgs/tools/networking/dnscrypt-wrapper/default.nix
index 491bf3157579..9e7167989e48 100644
--- a/pkgs/tools/networking/dnscrypt-wrapper/default.nix
+++ b/pkgs/tools/networking/dnscrypt-wrapper/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
name = "dnscrypt-wrapper-${version}";
- version = "0.2.1";
+ version = "0.2.2";
src = fetchFromGitHub {
owner = "Cofyc";
repo = "dnscrypt-wrapper";
rev = "v${version}";
- sha256 = "0gysylchvmxvqd4ims2cf2610vmxl80wlk62jhsv13p94yvrl53b";
+ sha256 = "0ip205safbpkmk1z7qf3hshqlc2q2zwhsm3i705m0y7rxc4200ms";
};
nativeBuildInputs = [ pkgconfig autoreconfHook ];
@@ -17,7 +17,7 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
description = "A tool for adding dnscrypt support to any name resolver";
homepage = https://dnscrypt.org/;
- license = licenses.gpl2;
+ license = licenses.isc;
maintainers = with maintainers; [ tstrobel joachifm ];
platforms = platforms.linux;
};
diff --git a/pkgs/tools/networking/fastd/default.nix b/pkgs/tools/networking/fastd/default.nix
new file mode 100644
index 000000000000..3a99adb4a9ef
--- /dev/null
+++ b/pkgs/tools/networking/fastd/default.nix
@@ -0,0 +1,26 @@
+{ stdenv, fetchgit, cmake, bison, pkgconfig
+, libuecc, libsodium, libcap, json_c }:
+
+stdenv.mkDerivation rec {
+ version = "18";
+ name = "fastd-${version}";
+
+ src = fetchgit {
+ url = "git://git.universe-factory.net/fastd";
+ rev = "refs/tags/v${version}";
+ sha256 = "0c9v3igv3812b3jr7jk75a2np658yy00b3i4kpbpdjgvqzc1jrq8";
+ };
+
+ nativeBuildInputs = [ pkgconfig bison cmake ];
+ buildInputs = [ libuecc libsodium libcap json_c ];
+
+ enableParallelBuilding = true;
+
+ meta = with stdenv.lib; {
+ description = "Fast and Secure Tunneling Daemon";
+ homepage = https://projects.universe-factory.net/projects/fastd/wiki;
+ license = with licenses; [ bsd2 bsd3 ];
+ platforms = platforms.linux;
+ maintainers = with maintainers; [ fpletz ];
+ };
+}
diff --git a/pkgs/tools/networking/flannel/default.nix b/pkgs/tools/networking/flannel/default.nix
index 2eea08b92383..732051d8ec78 100644
--- a/pkgs/tools/networking/flannel/default.nix
+++ b/pkgs/tools/networking/flannel/default.nix
@@ -1,8 +1,10 @@
{ stdenv, lib, buildGoPackage, fetchFromGitHub }:
+with lib;
+
buildGoPackage rec {
name = "flannel-${version}";
- version = "0.5.5";
+ version = "0.6.2";
rev = "v${version}";
goPackagePath = "github.com/coreos/flannel";
@@ -13,6 +15,14 @@ buildGoPackage rec {
inherit rev;
owner = "coreos";
repo = "flannel";
- sha256 = "19nrilcc41411rag2qm22vdna4kpqm933ry9m82wkd7sqzb50fpw";
+ sha256 = "03l0zyv9ajda70zw7jgwlmilw26h849jbb9f4slbycphhvbmpvb9";
+ };
+
+ meta = {
+ description = "Network fabric for containers, designed for Kubernetes";
+ license = licenses.asl20;
+ homepage = https://github.com/coreos/flannel;
+ maintainers = with maintainers; [offline];
+ platforms = with platforms; linux;
};
}
diff --git a/pkgs/tools/networking/getmail/default.nix b/pkgs/tools/networking/getmail/default.nix
index 9ffb9a311837..64bad55d88b2 100644
--- a/pkgs/tools/networking/getmail/default.nix
+++ b/pkgs/tools/networking/getmail/default.nix
@@ -1,6 +1,6 @@
-{ stdenv, fetchurl, pythonPackages }:
+{ stdenv, fetchurl, python2Packages }:
-pythonPackages.buildPythonApplication rec {
+python2Packages.buildPythonApplication rec {
version = "4.51.0";
name = "getmail-${version}";
namePrefix = "";
diff --git a/pkgs/tools/networking/gmvault/default.nix b/pkgs/tools/networking/gmvault/default.nix
index 47e1360df8f2..72efc703b108 100644
--- a/pkgs/tools/networking/gmvault/default.nix
+++ b/pkgs/tools/networking/gmvault/default.nix
@@ -1,19 +1,19 @@
{ pkgs, fetchurl, pythonPackages }:
pythonPackages.buildPythonApplication rec {
- version = "1.8.1-beta";
+ version = "1.9.1";
name = "gmvault-${version}";
src = fetchurl {
url = "https://bitbucket.org/gaubert/gmvault-official-download/downloads/gmvault-v${version}-src.tar.gz";
name = "${name}.tar.bz";
- sha256 = "0b575cnrd6jzcpa05mbn2swzcy0r9ck09pkhs4ydj6d3ir52j80c";
+ sha256 = "0ffp8df3gdf6lf3pj75hzsmxmvmscppb6bjda58my1n4ppxp1rji";
};
doCheck = false;
propagatedBuildInputs = with pythonPackages; [ gdata IMAPClient Logbook
- argparse ];
+ argparse chardet ];
startScript = ./gmvault.py;
diff --git a/pkgs/tools/networking/host/default.nix b/pkgs/tools/networking/host/default.nix
deleted file mode 100644
index 85f94ccba105..000000000000
--- a/pkgs/tools/networking/host/default.nix
+++ /dev/null
@@ -1,26 +0,0 @@
-{ fetchurl, stdenv }:
-
-let version = "20000331"; in
-
-stdenv.mkDerivation {
- name = "host-${version}";
-
- src = fetchurl {
- url = "mirror://debian/pool/main/h/host/host_${version}.orig.tar.gz";
- sha256 = "1g352k80arhwyidsa95nk28xjvzyypmwv3kga2451m3g7fmdqki1";
- };
-
- preConfigure = ''
- makeFlagsArray=(DESTBIN=$out/bin DESTMAN=$out/share/man OWNER=$(id -u) GROUP=$(id -g))
- mkdir -p "$out/bin"
- mkdir -p "$out/share/man/man1"
- '';
-
- installTargets = "install man";
-
- meta = {
- description = "DNS resolution utility";
- license = "BSD-style";
- platforms = stdenv.lib.platforms.linux;
- };
-}
diff --git a/pkgs/tools/networking/httpie/default.nix b/pkgs/tools/networking/httpie/default.nix
index c960528322bc..a5c7353905b4 100644
--- a/pkgs/tools/networking/httpie/default.nix
+++ b/pkgs/tools/networking/httpie/default.nix
@@ -1,15 +1,15 @@
{ stdenv, fetchurl, pythonPackages }:
pythonPackages.buildPythonApplication rec {
- name = "httpie-0.9.3";
+ name = "httpie-0.9.6";
namePrefix = "";
src = fetchurl {
url = "mirror://pypi/h/httpie/${name}.tar.gz";
- sha256 = "0jvzxr8r6cy6ipknkw95qf8rz69nqdv5nky87h1vcp5pf8mgza1h";
+ sha256 = "1cch5y0hr9qpfn9m4nw5796c2x7v3m1ni4psjm26ajsl8pw90jx6";
};
- propagatedBuildInputs = with pythonPackages; [ pygments requests2 curses ];
+ propagatedBuildInputs = with pythonPackages; [ pygments requests2 ];
doCheck = false;
diff --git a/pkgs/tools/networking/httpstat/default.nix b/pkgs/tools/networking/httpstat/default.nix
new file mode 100644
index 000000000000..5a29657bd5b1
--- /dev/null
+++ b/pkgs/tools/networking/httpstat/default.nix
@@ -0,0 +1,25 @@
+{ stdenv, fetchFromGitHub, curl, pythonPackages, glibcLocales }:
+
+pythonPackages.buildPythonApplication rec {
+ name = "${pname}-${version}";
+ pname = "httpstat";
+ version = "1.2.1";
+ src = fetchFromGitHub {
+ owner = "reorx";
+ repo = pname;
+ rev = "${version}";
+ sha256 = "1vriibcsq4j1hvm5yigbbmmv21dc40y5c9gvd31dg9qkaz26hml6";
+ };
+ doCheck = false; # No tests
+ buildInputs = [ glibcLocales ];
+ runtimeDeps = [ curl ];
+
+ LC_ALL = "en_US.UTF-8";
+
+ meta = {
+ description = "curl statistics made simple";
+ homepage = https://github.com/reorx/httpstat;
+ license = stdenv.lib.licenses.mit;
+ maintainers = with stdenv.lib.maintainers; [ nequissimus ];
+ };
+ }
diff --git a/pkgs/tools/networking/kea/default.nix b/pkgs/tools/networking/kea/default.nix
new file mode 100644
index 000000000000..ca1846edb04e
--- /dev/null
+++ b/pkgs/tools/networking/kea/default.nix
@@ -0,0 +1,50 @@
+{ stdenv, fetchurl, autoreconfHook, pkgconfig, openssl, botan, log4cplus
+, boost, python3, postgresql, mysql, gmp, bzip2 }:
+
+stdenv.mkDerivation rec {
+ name = "${pname}-${version}";
+ pname = "kea";
+ version = "1.1.0";
+
+ src = fetchurl {
+ url = "https://ftp.isc.org/isc/${pname}/${version}/${name}.tar.gz";
+ sha256 = "0b9w71d7pfgr0asqpffh9h935xpvwabyfdvdzqzna6da9zp7mnf3";
+ };
+
+ patches = [ ./dont-create-var.patch ];
+
+ postPatch = ''
+ substituteInPlace ./src/bin/keactrl/Makefile.am '@sysconfdir@' "$out/etc"
+ substituteInPlace ./src/bin/keactrl/Makefile.am '@(sysconfdir)@' "$out/etc"
+ '';
+
+ configureFlags = [
+ "--localstatedir=/var"
+ "--with-botan-config=${botan}/bin/botan-config-1.10"
+ "--with-dhcp-pgsql=${postgresql}/bin/pg_config"
+ "--with-dhcp-mysql=${mysql.client.dev}/bin/mysql_config"
+ ];
+
+ nativeBuildInputs = [ autoreconfHook pkgconfig ];
+ buildInputs = [
+ openssl log4cplus boost python3 mysql.client
+ botan gmp bzip2
+ ];
+
+ enableParallelBuilding = true;
+
+ meta = with stdenv.lib; {
+ homepage = https://kea.isc.org/;
+ description = "High-performance, extensible DHCP server by ISC";
+ longDescription = ''
+ KEA is a new open source DHCPv4/DHCPv6 server being developed by
+ Internet Systems Consortium. The objective of this project is to
+ provide a very high-performance, extensible DHCP server engine for
+ use by enterprises and service providers, either as is or with
+ extensions and modifications.
+ '';
+ license = licenses.mpl20;
+ platforms = platforms.unix;
+ maintainers = with maintainers; [ fpletz ];
+ };
+}
diff --git a/pkgs/tools/networking/kea/dont-create-var.patch b/pkgs/tools/networking/kea/dont-create-var.patch
new file mode 100644
index 000000000000..595942673c68
--- /dev/null
+++ b/pkgs/tools/networking/kea/dont-create-var.patch
@@ -0,0 +1,28 @@
+diff --git a/Makefile.am b/Makefile.am
+index 897be34..b146729 100644
+--- a/Makefile.am
++++ b/Makefile.am
+@@ -103,11 +103,6 @@ cppcheck:
+ --template '{file}:{line}: check_fail: {message} ({severity},{id})' \
+ src
+
+-# These steps are necessary during installation
+-install-exec-hook:
+- mkdir -p $(DESTDIR)${localstatedir}/log/
+- mkdir -p $(DESTDIR)${localstatedir}/run/${PACKAGE_NAME}
+-
+ EXTRA_DIST = tools/path_replacer.sh
+ EXTRA_DIST += tools/mk_cfgrpt.sh
+
+diff --git a/src/lib/dhcpsrv/Makefile.am b/src/lib/dhcpsrv/Makefile.am
+index 066b410..16d3135 100755
+--- a/src/lib/dhcpsrv/Makefile.am
++++ b/src/lib/dhcpsrv/Makefile.am
+@@ -210,7 +210,3 @@ EXTRA_DIST += database_backends.dox libdhcpsrv.dox
+ # Specification file
+ EXTRA_DIST += logging.spec
+
+-install-data-local:
+- $(mkinstalldirs) $(DESTDIR)$(dhcp_data_dir)
+-
+-
diff --git a/pkgs/tools/networking/lftp/default.nix b/pkgs/tools/networking/lftp/default.nix
index 23b0d241d17a..d7b7fcb2fdc0 100644
--- a/pkgs/tools/networking/lftp/default.nix
+++ b/pkgs/tools/networking/lftp/default.nix
@@ -1,28 +1,32 @@
-{ stdenv, fetchurl, gnutls, pkgconfig, readline, zlib, libidn }:
+{ stdenv, fetchurl, gnutls, pkgconfig, readline, zlib, libidn, gmp, libiconv }:
stdenv.mkDerivation rec {
- name = "lftp-4.7.1";
+ name = "lftp-4.7.3";
src = fetchurl {
urls = [
"http://lftp.yar.ru/ftp/${name}.tar.bz2"
"http://lftp.yar.ru/ftp/old/${name}.tar.bz2"
];
- sha256 = "0n4l0n6ra6z5lh6v79hc0r0hhrsq0l6c47ir15vmq80sbgc9mmwv";
+ sha256 = "06jmc9x86ga67yyx7655zv96gfv1gdm955a7g4afd3bwf6bzfxac";
};
nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ gnutls readline zlib libidn ];
+ buildInputs = [ gnutls readline zlib libidn gmp libiconv ];
configureFlags = [
"--with-readline=${readline.dev}"
];
+ postPatch = ''
+ substituteInPlace src/lftp_rl.c --replace 'history.h' 'readline/history.h'
+ '';
+
meta = with stdenv.lib; {
description = "A file transfer program supporting a number of network protocols";
homepage = http://lftp.yar.ru/;
license = licenses.gpl3;
- platforms = platforms.linux;
+ platforms = platforms.unix;
maintainers = [ maintainers.bjornfor ];
};
}
diff --git a/pkgs/tools/networking/linkchecker/default.nix b/pkgs/tools/networking/linkchecker/default.nix
index 79566f129019..59699076a3ac 100644
--- a/pkgs/tools/networking/linkchecker/default.nix
+++ b/pkgs/tools/networking/linkchecker/default.nix
@@ -1,26 +1,34 @@
-{ stdenv, lib, fetchurl, python2Packages }:
+{ stdenv, lib, fetchurl, python2Packages, gettext }:
python2Packages.buildPythonApplication rec {
name = "LinkChecker-${version}";
version = "9.3";
- # LinkChecker 9.3 only works with requests 2.9.x
- propagatedBuildInputs = with python2Packages ; [ requests2 ];
+ buildInputs = with python2Packages ; [ pytest ];
+ propagatedBuildInputs = with python2Packages ; [ requests2 ] ++ [ gettext ];
src = fetchurl {
url = "mirror://pypi/L/LinkChecker/${name}.tar.gz";
sha256 = "0v8pavf0bx33xnz1kwflv0r7lxxwj7vg3syxhy2wzza0wh6sc2pf";
};
- # upstream refuses to support ignoring robots.txt
+ # 1. upstream refuses to support ignoring robots.txt
+ # 2. work around requests2 version detection - can be dropped >v9.3
patches = [
./add-no-robots-flag.patch
+ ./no-version-check.patch
];
postInstall = ''
rm $out/bin/linkchecker-gui
'';
+ checkPhase = ''
+ # the mime test fails for me...
+ rm tests/test_mimeutil.py
+ make test PYTESTOPTS="--tb=short" TESTS="tests/test_*.py tests/logger/test_*.py"
+ '';
+
meta = {
description = "Check websites for broken links";
homepage = "https://wummel.github.io/linkchecker/";
diff --git a/pkgs/tools/networking/linkchecker/no-version-check.patch b/pkgs/tools/networking/linkchecker/no-version-check.patch
new file mode 100644
index 000000000000..49b674f37359
--- /dev/null
+++ b/pkgs/tools/networking/linkchecker/no-version-check.patch
@@ -0,0 +1,14 @@
+diff --git a/linkcheck/__init__.py b/linkcheck/__init__.py
+--- a/linkcheck/__init__.py 2014-07-16 13:34:58.000000000 +0800
++++ b/linkcheck/__init__.py 2016-10-11 10:42:08.914085950 +0800
+@@ -26,8 +26,8 @@
+ sys.version_info < (2, 7, 2, 'final', 0)):
+ raise SystemExit("This program requires Python 2.7.2 or later.")
+ import requests
+-if requests.__version__ <= '2.2.0':
+- raise SystemExit("This program requires Python requests 2.2.0 or later.")
++#if requests.__version__ <= '2.2.0':
++# raise SystemExit("This program requires Python requests 2.2.0 or later.")
+
+ import os
+ # add the custom linkcheck_dns directory to sys.path
diff --git a/pkgs/tools/networking/modemmanager/default.nix b/pkgs/tools/networking/modemmanager/default.nix
index 77c71f38331c..9fe4b4421a7f 100644
--- a/pkgs/tools/networking/modemmanager/default.nix
+++ b/pkgs/tools/networking/modemmanager/default.nix
@@ -1,17 +1,18 @@
-{ stdenv, fetchurl, udev, libgudev, polkit, dbus_glib, ppp, intltool, pkgconfig, libmbim, libqmi }:
+{ stdenv, fetchurl, udev, libgudev, polkit, dbus_glib, ppp, intltool, pkgconfig
+, libmbim, libqmi, systemd }:
stdenv.mkDerivation rec {
name = "ModemManager-${version}";
- version = "1.4.6";
+ version = "1.6.2";
src = fetchurl {
url = "http://www.freedesktop.org/software/ModemManager/${name}.tar.xz";
- sha256 = "1kd5nn5rm88c8rgmzwy2fsf3cr7fai7r85mi61kcby0hcgsapv8c";
+ sha256 = "14v31j916h63z7af107rias1zbb2y94p3jg77zhzhrn1v6c46m74";
};
nativeBuildInputs = [ intltool pkgconfig ];
- buildInputs = [ udev libgudev polkit dbus_glib ppp libmbim libqmi ];
+ buildInputs = [ udev libgudev polkit dbus_glib ppp libmbim libqmi systemd ];
configureFlags = [
"--with-polkit"
@@ -19,6 +20,7 @@ stdenv.mkDerivation rec {
"--with-systemdsystemunitdir=$(out)/etc/systemd/system"
"--sysconfdir=/etc"
"--localstatedir=/var"
+ "--with-suspend-resume=systemd"
];
installFlags = [ "DESTDIR=\${out}" ];
diff --git a/pkgs/tools/networking/nc6/default.nix b/pkgs/tools/networking/nc6/default.nix
deleted file mode 100644
index 9c0979294715..000000000000
--- a/pkgs/tools/networking/nc6/default.nix
+++ /dev/null
@@ -1,18 +0,0 @@
-{ stdenv, fetchurl }:
-
-stdenv.mkDerivation {
- name = "nc6-1.0";
-
- src = fetchurl {
- urls = [
- ftp://ftp.deepspace6.net/pub/ds6/sources/nc6/nc6-1.0.tar.bz2
- http://fossies.org/linux/privat/nc6-1.0.tar.bz2
- ];
- sha256 = "01l28zv1yal58ilfnz6albdzqqxzsx3a58vmc14r9gv0bahffdgb";
- };
-
- meta = {
- description = "A netcat implementation with IPv6 support";
- homepage = http://www.deepspace6.net/projects/netcat6.html;
- };
-}
diff --git a/pkgs/tools/networking/network-manager-applet/default.nix b/pkgs/tools/networking/network-manager-applet/default.nix
index 7f6620af4c95..0cb5c92abec8 100644
--- a/pkgs/tools/networking/network-manager-applet/default.nix
+++ b/pkgs/tools/networking/network-manager-applet/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchurl, intltool, pkgconfig, libglade, networkmanager, gnome3
-, libnotify, libsecret, polkit, isocodes
+, libnotify, libsecret, polkit, isocodes, modemmanager
, mobile_broadband_provider_info, glib_networking, gsettings_desktop_schemas
-, makeWrapper, udev, libgudev, hicolor_icon_theme }:
+, makeWrapper, udev, libgudev, hicolor_icon_theme, jansson }:
stdenv.mkDerivation rec {
name = "${pname}-${version}";
@@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${networkmanager.major}/${name}.tar.xz";
- sha256 = "02b42e7c17c9cd6c840563750da92ce58da1ec621df7f0c2402016026e727756";
+ sha256 = "431b7b4876638c6a537c8bf9c91a9250532b3d960b22b056df554695a81e4499";
};
configureFlags = [ "--sysconfdir=/etc" ];
@@ -18,6 +18,7 @@ stdenv.mkDerivation rec {
buildInputs = [
gnome3.gtk libglade networkmanager libnotify libsecret gsettings_desktop_schemas
polkit isocodes makeWrapper udev libgudev gnome3.gconf gnome3.libgnome_keyring
+ modemmanager jansson
];
nativeBuildInputs = [ intltool pkgconfig ];
diff --git a/pkgs/tools/networking/network-manager/PppdPath.patch b/pkgs/tools/networking/network-manager/PppdPath.patch
new file mode 100644
index 000000000000..98c1308e4dbf
--- /dev/null
+++ b/pkgs/tools/networking/network-manager/PppdPath.patch
@@ -0,0 +1,13 @@
+diff --git a/src/ppp-manager/nm-ppp-manager.c b/src/ppp-manager/nm-ppp-manager.c
+index 89a7add..ae99eb4 100644
+--- a/src/ppp-manager/nm-ppp-manager.c
++++ b/src/ppp-manager/nm-ppp-manager.c
+@@ -843,7 +843,7 @@ create_pppd_cmd_line (NMPPPManager *self,
+
+ g_return_val_if_fail (setting != NULL, NULL);
+
+- pppd_binary = nm_utils_find_helper ("pppd", NULL, err);
++ pppd_binary = nm_utils_find_helper ("pppd", PPPD_PATH, err);
+ if (!pppd_binary)
+ return NULL;
+
diff --git a/pkgs/tools/networking/network-manager/default.nix b/pkgs/tools/networking/network-manager/default.nix
index 57bf1a51a1ae..d96bc08495f0 100644
--- a/pkgs/tools/networking/network-manager/default.nix
+++ b/pkgs/tools/networking/network-manager/default.nix
@@ -7,12 +7,12 @@
stdenv.mkDerivation rec {
name = "network-manager-${version}";
pname = "NetworkManager";
- major = "1.2";
+ major = "1.4";
version = "${major}.2";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${major}/${pname}-${version}.tar.xz";
- sha256 = "41d8082e027f58bb5fa4181f93742606ab99c659794a18e2823eff22df0eecd9";
+ sha256 = "a864e347ddf6da8dabd40e0185b8c10a655d4a94b45cbaa2b3bb4b5e8360d204";
};
preConfigure = ''
@@ -56,6 +56,8 @@ stdenv.mkDerivation rec {
"--with-libsoup=yes"
];
+ patches = [ ./PppdPath.patch ];
+
buildInputs = [ systemd libgudev libnl libuuid polkit ppp libndp
bluez5 dnsmasq gobjectIntrospection modemmanager readline newt libsoup ];
diff --git a/pkgs/tools/networking/network-manager/openconnect.nix b/pkgs/tools/networking/network-manager/openconnect.nix
index b1b24bceb576..303ca70aace1 100644
--- a/pkgs/tools/networking/network-manager/openconnect.nix
+++ b/pkgs/tools/networking/network-manager/openconnect.nix
@@ -4,10 +4,11 @@
stdenv.mkDerivation rec {
name = "${pname}${if withGnome then "-gnome" else ""}-${version}";
pname = "NetworkManager-openconnect";
- version = networkmanager.version;
+ major = "1.2";
+ version = "${major}.2";
src = fetchurl {
- url = "mirror://gnome/sources/${pname}/${networkmanager.major}/${pname}-${version}.tar.xz";
+ url = "mirror://gnome/sources/${pname}/${major}/${pname}-${version}.tar.xz";
sha256 = "522979593e21b4e884112816708db9eb66148b3491580dacfad53472b94aafec";
};
diff --git a/pkgs/tools/networking/network-manager/openvpn.nix b/pkgs/tools/networking/network-manager/openvpn.nix
index 6fd1a666f0e8..92dc45ac82c0 100644
--- a/pkgs/tools/networking/network-manager/openvpn.nix
+++ b/pkgs/tools/networking/network-manager/openvpn.nix
@@ -4,11 +4,12 @@
stdenv.mkDerivation rec {
name = "${pname}${if withGnome then "-gnome" else ""}-${version}";
pname = "NetworkManager-openvpn";
- version = networkmanager.version;
+ major = "1.2";
+ version = "${major}.6";
src = fetchurl {
- url = "mirror://gnome/sources/${pname}/${networkmanager.major}/${pname}-${version}.tar.xz";
- sha256 = "47a6d219a781eff8491c7876b7fb95b12dcfb8f8a05f916f95afc65c7babddef";
+ url = "mirror://gnome/sources/${pname}/${major}/${pname}-${version}.tar.xz";
+ sha256 = "2373e2bb0a8a876cb2997cd8b0e3d6e10012d9bef3705ea3ac21f6394b3f1fb0";
};
buildInputs = [ openvpn networkmanager libsecret ]
diff --git a/pkgs/tools/networking/network-manager/pptp.nix b/pkgs/tools/networking/network-manager/pptp.nix
index a9bee0c74811..6cc8107f2c89 100644
--- a/pkgs/tools/networking/network-manager/pptp.nix
+++ b/pkgs/tools/networking/network-manager/pptp.nix
@@ -4,11 +4,12 @@
stdenv.mkDerivation rec {
name = "${pname}${if withGnome then "-gnome" else ""}-${version}";
pname = "NetworkManager-pptp";
- version = networkmanager.version;
+ major = "1.2";
+ version = "${major}.4";
src = fetchurl {
- url = "mirror://gnome/sources/${pname}/${networkmanager.major}/${pname}-${version}.tar.xz";
- sha256 = "a72cb88ecc0a9edec836e8042c592d68b8b290c0d78082e6b25cf08b46c6be5d";
+ url = "mirror://gnome/sources/${pname}/${major}/${pname}-${version}.tar.xz";
+ sha256 = "bd97ce768c34cce6d5b5d43681149a8300bec754397a3f46a0d8d0aea7030c5e";
};
buildInputs = [ networkmanager pptp ppp libsecret ]
diff --git a/pkgs/tools/networking/network-manager/strongswan.nix b/pkgs/tools/networking/network-manager/strongswan.nix
new file mode 100644
index 000000000000..9e0033cca90c
--- /dev/null
+++ b/pkgs/tools/networking/network-manager/strongswan.nix
@@ -0,0 +1,34 @@
+{ stdenv, fetchurl, intltool, pkgconfig, networkmanager, procps
+, gnome3, libgnome_keyring, libsecret }:
+
+stdenv.mkDerivation rec {
+ name = "${pname}-${version}";
+ pname = "NetworkManager-strongswan";
+ version = "1.4.0";
+
+ src = fetchurl {
+ url = "https://download.strongswan.org/NetworkManager/${name}.tar.bz2";
+ sha256 = "0qfnylg949lkyw1nmyggz2ipgmy154ic5q5ljjcwcgi14r90ys02";
+ };
+
+ postPatch = ''
+ sed -i "s,nm_plugindir=.*,nm_plugindir=$out/lib/NetworkManager," "configure"
+ sed -i "s,nm_libexecdir=.*,nm_libexecdir=$out/libexec," "configure"
+ '';
+
+ buildInputs = [ networkmanager libsecret ]
+ ++ (with gnome3; [ gtk libgnome_keyring networkmanagerapplet ]);
+
+ nativeBuildInputs = [ intltool pkgconfig ];
+
+ preConfigure = ''
+ substituteInPlace "configure" \
+ --replace "/sbin/sysctl" "${procps}/bin/sysctl"
+ '';
+
+ meta = {
+ description = "NetworkManager's strongswan plugin";
+ inherit (networkmanager.meta) platforms;
+ };
+}
+
diff --git a/pkgs/tools/networking/network-manager/vpnc.nix b/pkgs/tools/networking/network-manager/vpnc.nix
index b760fe6e4f7d..44233b351290 100644
--- a/pkgs/tools/networking/network-manager/vpnc.nix
+++ b/pkgs/tools/networking/network-manager/vpnc.nix
@@ -4,11 +4,12 @@
stdenv.mkDerivation rec {
name = "${pname}${if withGnome then "-gnome" else ""}-${version}";
pname = "NetworkManager-vpnc";
- version = networkmanager.version;
+ major = "1.2";
+ version = "${major}.4";
src = fetchurl {
- url = "mirror://gnome/sources/${pname}/${networkmanager.major}/${pname}-${version}.tar.xz";
- sha256 = "e900f6500026f8c3ee4feb92e1d0a0c0abbee9ba507dad915b47a8ab7df9e1f3";
+ url = "mirror://gnome/sources/${pname}/${major}/${pname}-${version}.tar.xz";
+ sha256 = "39c7516418e90208cb534c19628ce40fd50eba0a08b2ebaef8da85720b10fb05";
};
buildInputs = [ vpnc networkmanager libsecret ]
diff --git a/pkgs/tools/networking/offlineimap/default.nix b/pkgs/tools/networking/offlineimap/default.nix
index 564eea231841..93541bd06039 100644
--- a/pkgs/tools/networking/offlineimap/default.nix
+++ b/pkgs/tools/networking/offlineimap/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, pythonPackages, sqlite3 }:
+{ stdenv, fetchFromGitHub, pythonPackages, }:
pythonPackages.buildPythonApplication rec {
version = "7.0.6";
@@ -14,7 +14,7 @@ pythonPackages.buildPythonApplication rec {
doCheck = false;
- propagatedBuildInputs = [ sqlite3 pythonPackages.six ];
+ propagatedBuildInputs = [ pythonPackages.six ];
meta = {
description = "Synchronize emails between two repositories, so that you can read the same mailbox from multiple computers";
diff --git a/pkgs/tools/networking/openssh/RH-1380296-NEWKEYS-null-pointer-deref.patch b/pkgs/tools/networking/openssh/RH-1380296-NEWKEYS-null-pointer-deref.patch
new file mode 100644
index 000000000000..665eff864530
--- /dev/null
+++ b/pkgs/tools/networking/openssh/RH-1380296-NEWKEYS-null-pointer-deref.patch
@@ -0,0 +1,37 @@
+diff --git a/kex.c b/kex.c
+index 50c7a0f..823668b 100644
+--- a/kex.c
++++ b/kex.c
+@@ -419,6 +419,8 @@ kex_input_newkeys(int type, u_int32_t seq, void *ctxt)
+ ssh_dispatch_set(ssh, SSH2_MSG_NEWKEYS, &kex_protocol_error);
+ if ((r = sshpkt_get_end(ssh)) != 0)
+ return r;
++ if ((r = ssh_set_newkeys(ssh, MODE_IN)) != 0)
++ return r;
+ kex->done = 1;
+ sshbuf_reset(kex->peer);
+ /* sshbuf_reset(kex->my); */
+diff --git a/packet.c b/packet.c
+index d6dad2d..f96566b 100644
+--- a/packet.c
++++ b/packet.c
+@@ -38,7 +38,7 @@
+ */
+
+ #include "includes.h"
+-
++
+ #include <sys/param.h> /* MIN roundup */
+ #include <sys/types.h>
+ #include "openbsd-compat/sys-queue.h"
+@@ -1907,9 +1907,7 @@ ssh_packet_read_poll2(struct ssh *ssh, u_char *typep, u_int32_t *seqnr_p)
+ return r;
+ return SSH_ERR_PROTOCOL_ERROR;
+ }
+- if (*typep == SSH2_MSG_NEWKEYS)
+- r = ssh_set_newkeys(ssh, MODE_IN);
+- else if (*typep == SSH2_MSG_USERAUTH_SUCCESS && !state->server_side)
++ if (*typep == SSH2_MSG_USERAUTH_SUCCESS && !state->server_side)
+ r = ssh_packet_enable_delayed_compress(ssh);
+ else
+ r = 0;
diff --git a/pkgs/tools/networking/openssh/default.nix b/pkgs/tools/networking/openssh/default.nix
index a6e4b7c4c209..064f68947b80 100644
--- a/pkgs/tools/networking/openssh/default.nix
+++ b/pkgs/tools/networking/openssh/default.nix
@@ -44,16 +44,18 @@ stdenv.mkDerivation rec {
patches =
[
+ ./RH-1380296-NEWKEYS-null-pointer-deref.patch
./locale_archive.patch
./fix-host-key-algorithms-plus.patch
# See discussion in https://github.com/NixOS/nixpkgs/pull/16966
./dont_create_privsep_path.patch
+ ./fix-CVE-2016-8858.patch
]
++ optional withGssapiPatches gssapiSrc;
buildInputs = [ zlib openssl libedit pkgconfig pam ]
- ++ optional withKerberos [ kerberos ];
+ ++ optional withKerberos kerberos;
# I set --disable-strip because later we strip anyway. And it fails to strip
# properly when cross building.
@@ -91,7 +93,7 @@ stdenv.mkDerivation rec {
description = "An implementation of the SSH protocol";
license = stdenv.lib.licenses.bsd2;
platforms = platforms.unix;
- maintainers = with maintainers; [ eelco ];
+ maintainers = with maintainers; [ eelco aneeshusa ];
broken = hpnSupport; # probably after 6.7 update
};
}
diff --git a/pkgs/tools/networking/openssh/fix-CVE-2016-8858.patch b/pkgs/tools/networking/openssh/fix-CVE-2016-8858.patch
new file mode 100644
index 000000000000..e526161083c0
--- /dev/null
+++ b/pkgs/tools/networking/openssh/fix-CVE-2016-8858.patch
@@ -0,0 +1,11 @@
+diff -u -r1.126 -r1.127
+--- ssh/kex.c 2016/09/28 21:44:52 1.126
++++ ssh/kex.c 2016/10/10 19:28:48 1.127
+@@ -461,6 +461,7 @@
+ if (kex == NULL)
+ return SSH_ERR_INVALID_ARGUMENT;
+
++ ssh_dispatch_set(ssh, SSH2_MSG_KEXINIT, NULL);
+ ptr = sshpkt_ptr(ssh, &dlen);
+ if ((r = sshbuf_put(kex->peer, ptr, dlen)) != 0)
+ return r;
diff --git a/pkgs/tools/networking/openvpn/default.nix b/pkgs/tools/networking/openvpn/default.nix
index 73d10014bbfc..13e1c68befda 100644
--- a/pkgs/tools/networking/openvpn/default.nix
+++ b/pkgs/tools/networking/openvpn/default.nix
@@ -24,7 +24,8 @@ stdenv.mkDerivation rec {
"--enable-systemd"
"--enable-iproute2"
"IPROUTE=${iproute}/sbin/ip" ]
- ++ optional pkcs11Support "--enable-pkcs11";
+ ++ optional pkcs11Support "--enable-pkcs11"
+ ++ optional stdenv.isDarwin "--disable-plugin-auth-pam";
postInstall = ''
mkdir -p $out/share/doc/openvpn/examples
@@ -40,6 +41,6 @@ stdenv.mkDerivation rec {
homepage = http://openvpn.net/;
license = stdenv.lib.licenses.gpl2;
maintainers = [ stdenv.lib.maintainers.viric ];
- platforms = stdenv.lib.platforms.linux;
+ platforms = stdenv.lib.platforms.unix;
};
}
diff --git a/pkgs/tools/networking/p2p/tahoe-lafs/default.nix b/pkgs/tools/networking/p2p/tahoe-lafs/default.nix
index b01566bed075..6b88d2d2b7df 100644
--- a/pkgs/tools/networking/p2p/tahoe-lafs/default.nix
+++ b/pkgs/tools/networking/p2p/tahoe-lafs/default.nix
@@ -34,7 +34,7 @@ pythonPackages.buildPythonApplication rec {
# The `backup' command requires `sqlite3'.
propagatedBuildInputs = with pythonPackages; [
- twisted foolscap nevow simplejson zfec pycryptopp sqlite3 darcsver
+ twisted foolscap nevow simplejson zfec pycryptopp darcsver
setuptoolsTrial setuptoolsDarcs pycrypto pyasn1 zope_interface
service-identity
];
diff --git a/pkgs/tools/networking/shadowsocks-libev/default.nix b/pkgs/tools/networking/shadowsocks-libev/default.nix
index 0ac8dca770af..46fd9e54950a 100644
--- a/pkgs/tools/networking/shadowsocks-libev/default.nix
+++ b/pkgs/tools/networking/shadowsocks-libev/default.nix
@@ -11,12 +11,13 @@
, docbook_xml_dtd_45
, docbook_xsl
, libxslt
+, pcre
}:
let
- version = "2.5.0";
- sha256 = "6841e0efa1c01caef5a827f463ee304dc9e48fb4751cc9256316df5ab4490ae0";
+ version = "2.5.5";
+ sha256 = "46a72367b7301145906185f1e4136e39d6792d27643826e409ab708351b6d0dd";
in
@@ -29,7 +30,7 @@ stdenv.mkDerivation rec {
inherit sha256;
};
- buildInputs = [ zlib asciidoc xmlto docbook_xml_dtd_45 docbook_xsl libxslt ]
+ buildInputs = [ zlib asciidoc xmlto docbook_xml_dtd_45 docbook_xsl libxslt pcre ]
++ optional (!withMbedTLS) openssl
++ optional withMbedTLS mbedtls
++ optionals enableSystemSharedLib [libev libsodium udns];
diff --git a/pkgs/tools/networking/sshpass/default.nix b/pkgs/tools/networking/sshpass/default.nix
index 95212b00beb1..f87cecaf4d27 100644
--- a/pkgs/tools/networking/sshpass/default.nix
+++ b/pkgs/tools/networking/sshpass/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
name = "sshpass-${version}";
- version = "1.05";
-
+ version = "1.06";
+
src = fetchurl {
url = "mirror://sourceforge/sshpass/sshpass-${version}.tar.gz";
- sha256 = "0gj8r05h1hy01vh4csygyw21z2hcxb72qcxkxxi3y34alr98gxy3";
+ sha256 = "0q7fblaczb7kwbsz0gdy9267z0sllzgmf0c7z5c9mf88wv74ycn6";
};
-
+
meta = {
homepage = http://sourceforge.net/projects/sshpass/;
description = "Non-interactive ssh password auth";
diff --git a/pkgs/tools/networking/ssldump/default.nix b/pkgs/tools/networking/ssldump/default.nix
new file mode 100644
index 000000000000..dcc78560fa36
--- /dev/null
+++ b/pkgs/tools/networking/ssldump/default.nix
@@ -0,0 +1,30 @@
+{ stdenv, fetchFromGitHub, openssl, libpcap }:
+
+stdenv.mkDerivation rec {
+ name = "ssldump";
+ version = "0.9b3";
+
+ src = fetchFromGitHub {
+ owner = "adulau";
+ repo = "ssldump";
+ rev = "4529d03a50d39d3697c3e39a3d6f6c9b29448aa0";
+ sha256 = "0wwsamzxabfxcil5y2g4v2261vdspxlp12wz4xhji8607jbyjwr1";
+ };
+
+ buildInputs = [ libpcap openssl ];
+ prePatch = ''
+ sed -i -e 's|#include.*net/bpf.h|#include <pcap/bpf.h>|' \
+ base/pcap-snoop.c
+ '';
+ configureFlags = [ "--with-pcap-lib=${libpcap}/lib"
+ "--with-pcap-inc=${libpcap}/include"
+ "--with-openssl-lib=${openssl}/lib"
+ "--with-openssl-inc=${openssl}/include" ];
+ meta = {
+ description = "ssldump is an SSLv3/TLS network protocol analyzer";
+ homepage = http://ssldump.sourceforge.net;
+ license = "BSD-style";
+ maintainers = with stdenv.lib.maintainers; [ aycanirican ];
+ platforms = stdenv.lib.platforms.linux;
+ };
+}
diff --git a/pkgs/tools/networking/statsd/node-packages.nix b/pkgs/tools/networking/statsd/node-packages.nix
index 6cf9e8478d78..fd196c249ae1 100644
--- a/pkgs/tools/networking/statsd/node-packages.nix
+++ b/pkgs/tools/networking/statsd/node-packages.nix
@@ -8,7 +8,7 @@
version = "1.3.1";
bin = false;
src = fetchurl {
- url = "http://registry.npmjs.org/commander/-/commander-1.3.1.tgz";
+ url = "https://registry.npmjs.org/commander/-/commander-1.3.1.tgz";
name = "commander-1.3.1.tgz";
sha1 = "02443e02db96f4b32b674225451abb6e9510000e";
};
@@ -28,7 +28,7 @@
version = "0.0.7";
bin = false;
src = fetchurl {
- url = "http://registry.npmjs.org/connection-parse/-/connection-parse-0.0.7.tgz";
+ url = "https://registry.npmjs.org/connection-parse/-/connection-parse-0.0.7.tgz";
name = "connection-parse-0.0.7.tgz";
sha1 = "18e7318aab06a699267372b10c5226d25a1c9a69";
};
@@ -40,16 +40,35 @@
os = [ ];
cpu = [ ];
};
- by-spec."hashring"."1.0.1" =
- self.by-version."hashring"."1.0.1";
- by-version."hashring"."1.0.1" = self.buildNodePackage {
- name = "hashring-1.0.1";
- version = "1.0.1";
+ by-spec."generic-pool"."2.2.0" =
+ self.by-version."generic-pool"."2.2.0";
+ by-version."generic-pool"."2.2.0" = self.buildNodePackage {
+ name = "generic-pool-2.2.0";
+ version = "2.2.0";
bin = false;
src = fetchurl {
- url = "http://registry.npmjs.org/hashring/-/hashring-1.0.1.tgz";
- name = "hashring-1.0.1.tgz";
- sha1 = "b6a7b8c675a0c715ac0d0071786eb241a28d0a7c";
+ url = "https://registry.npmjs.org/generic-pool/-/generic-pool-2.2.0.tgz";
+ name = "generic-pool-2.2.0.tgz";
+ sha1 = "8b465c1a7588ea9dd2bb133bda0bb66bfef8a63e";
+ };
+ deps = {
+ };
+ optionalDependencies = {
+ };
+ peerDependencies = [];
+ os = [ ];
+ cpu = [ ];
+ };
+ by-spec."hashring"."3.2.0" =
+ self.by-version."hashring"."3.2.0";
+ by-version."hashring"."3.2.0" = self.buildNodePackage {
+ name = "hashring-3.2.0";
+ version = "3.2.0";
+ bin = false;
+ src = fetchurl {
+ url = "https://registry.npmjs.org/hashring/-/hashring-3.2.0.tgz";
+ name = "hashring-3.2.0.tgz";
+ sha1 = "fda4efde8aa22cdb97fb1d2a65e88401e1c144ce";
};
deps = {
"connection-parse-0.0.7" = self.by-version."connection-parse"."0.0.7";
@@ -68,7 +87,7 @@
version = "0.1.0";
bin = false;
src = fetchurl {
- url = "http://registry.npmjs.org/keypress/-/keypress-0.1.0.tgz";
+ url = "https://registry.npmjs.org/keypress/-/keypress-0.1.0.tgz";
name = "keypress-0.1.0.tgz";
sha1 = "4a3188d4291b66b4f65edb99f806aa9ae293592a";
};
@@ -80,16 +99,36 @@
os = [ ];
cpu = [ ];
};
- by-spec."node-syslog"."1.1.7" =
- self.by-version."node-syslog"."1.1.7";
- by-version."node-syslog"."1.1.7" = self.buildNodePackage {
- name = "node-syslog-1.1.7";
- version = "1.1.7";
+ by-spec."modern-syslog"."1.1.2" =
+ self.by-version."modern-syslog"."1.1.2";
+ by-version."modern-syslog"."1.1.2" = self.buildNodePackage {
+ name = "modern-syslog-1.1.2";
+ version = "1.1.2";
+ bin = false;
+ src = fetchurl {
+ url = "https://registry.npmjs.org/modern-syslog/-/modern-syslog-1.1.2.tgz";
+ name = "modern-syslog-1.1.2.tgz";
+ sha1 = "f1fa58899f3f452d788f1573401212a4ef898de5";
+ };
+ deps = {
+ "nan-2.4.0" = self.by-version."nan"."2.4.0";
+ };
+ optionalDependencies = {
+ };
+ peerDependencies = [];
+ os = [ "!win32" ];
+ cpu = [ ];
+ };
+ by-spec."nan"."^2.0.5" =
+ self.by-version."nan"."2.4.0";
+ by-version."nan"."2.4.0" = self.buildNodePackage {
+ name = "nan-2.4.0";
+ version = "2.4.0";
bin = false;
src = fetchurl {
- url = "http://registry.npmjs.org/node-syslog/-/node-syslog-1.1.7.tgz";
- name = "node-syslog-1.1.7.tgz";
- sha1 = "f2b1dfce095c39f5a6d056659862ca134a08a4cb";
+ url = "https://registry.npmjs.org/nan/-/nan-2.4.0.tgz";
+ name = "nan-2.4.0.tgz";
+ sha1 = "fb3c59d45fe4effe215f0b890f8adf6eb32d2232";
};
deps = {
};
@@ -106,7 +145,7 @@
version = "2.2.1";
bin = false;
src = fetchurl {
- url = "http://registry.npmjs.org/sequence/-/sequence-2.2.1.tgz";
+ url = "https://registry.npmjs.org/sequence/-/sequence-2.2.1.tgz";
name = "sequence-2.2.1.tgz";
sha1 = "7f5617895d44351c0a047e764467690490a16b03";
};
@@ -125,7 +164,7 @@
version = "0.0.2";
bin = false;
src = fetchurl {
- url = "http://registry.npmjs.org/simple-lru-cache/-/simple-lru-cache-0.0.2.tgz";
+ url = "https://registry.npmjs.org/simple-lru-cache/-/simple-lru-cache-0.0.2.tgz";
name = "simple-lru-cache-0.0.2.tgz";
sha1 = "d59cc3a193c1a5d0320f84ee732f6e4713e511dd";
};
@@ -144,7 +183,7 @@
version = "0.2.3";
bin = false;
src = fetchurl {
- url = "http://registry.npmjs.org/stackdriver-statsd-backend/-/stackdriver-statsd-backend-0.2.3.tgz";
+ url = "https://registry.npmjs.org/stackdriver-statsd-backend/-/stackdriver-statsd-backend-0.2.3.tgz";
name = "stackdriver-statsd-backend-0.2.3.tgz";
sha1 = "6ffead71e5655d4d787c39da8d1c9eaaa59c91d7";
};
@@ -158,28 +197,29 @@
};
"stackdriver-statsd-backend" = self.by-version."stackdriver-statsd-backend"."0.2.3";
by-spec."statsd"."*" =
- self.by-version."statsd"."0.7.2";
- by-version."statsd"."0.7.2" = self.buildNodePackage {
- name = "statsd-0.7.2";
- version = "0.7.2";
+ self.by-version."statsd"."0.8.0";
+ by-version."statsd"."0.8.0" = self.buildNodePackage {
+ name = "statsd-0.8.0";
+ version = "0.8.0";
bin = true;
src = fetchurl {
- url = "http://registry.npmjs.org/statsd/-/statsd-0.7.2.tgz";
- name = "statsd-0.7.2.tgz";
- sha1 = "88901c5f30fa51da5fa3520468c94d7992ef576e";
+ url = "https://registry.npmjs.org/statsd/-/statsd-0.8.0.tgz";
+ name = "statsd-0.8.0.tgz";
+ sha1 = "92041479e174a214df7147f2fab1348af0839052";
};
deps = {
+ "generic-pool-2.2.0" = self.by-version."generic-pool"."2.2.0";
};
optionalDependencies = {
- "node-syslog-1.1.7" = self.by-version."node-syslog"."1.1.7";
- "hashring-1.0.1" = self.by-version."hashring"."1.0.1";
+ "modern-syslog-1.1.2" = self.by-version."modern-syslog"."1.1.2";
+ "hashring-3.2.0" = self.by-version."hashring"."3.2.0";
"winser-0.1.6" = self.by-version."winser"."0.1.6";
};
peerDependencies = [];
os = [ ];
cpu = [ ];
};
- "statsd" = self.by-version."statsd"."0.7.2";
+ "statsd" = self.by-version."statsd"."0.8.0";
by-spec."statsd-influxdb-backend"."*" =
self.by-version."statsd-influxdb-backend"."0.6.0";
by-version."statsd-influxdb-backend"."0.6.0" = self.buildNodePackage {
@@ -187,7 +227,7 @@
version = "0.6.0";
bin = false;
src = fetchurl {
- url = "http://registry.npmjs.org/statsd-influxdb-backend/-/statsd-influxdb-backend-0.6.0.tgz";
+ url = "https://registry.npmjs.org/statsd-influxdb-backend/-/statsd-influxdb-backend-0.6.0.tgz";
name = "statsd-influxdb-backend-0.6.0.tgz";
sha1 = "25fb83cf0b3af923dfc7d506eb1208def8790d78";
};
@@ -207,7 +247,7 @@
version = "0.1.7";
bin = false;
src = fetchurl {
- url = "http://registry.npmjs.org/statsd-librato-backend/-/statsd-librato-backend-0.1.7.tgz";
+ url = "https://registry.npmjs.org/statsd-librato-backend/-/statsd-librato-backend-0.1.7.tgz";
name = "statsd-librato-backend-0.1.7.tgz";
sha1 = "270dc406481c0e6a6f4e72957681a73015f478f6";
};
@@ -227,7 +267,7 @@
version = "0.1.6";
bin = true;
src = fetchurl {
- url = "http://registry.npmjs.org/winser/-/winser-0.1.6.tgz";
+ url = "https://registry.npmjs.org/winser/-/winser-0.1.6.tgz";
name = "winser-0.1.6.tgz";
sha1 = "08663dc32878a12bbce162d840da5097b48466c9";
};
diff --git a/pkgs/tools/networking/swec/default.nix b/pkgs/tools/networking/swec/default.nix
index 851af6f24f6f..5b7f8f114df3 100644
--- a/pkgs/tools/networking/swec/default.nix
+++ b/pkgs/tools/networking/swec/default.nix
@@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
};
buildInputs = [ makeWrapper perl LWP URI HTMLParser ]
- ++ stdenv.lib.optional doCheck [ HTTPServerSimple Parent ];
+ ++ stdenv.lib.optionals doCheck [ HTTPServerSimple Parent ];
configurePhase = ''
for i in swec tests/{runTests,testServer}
diff --git a/pkgs/tools/networking/tinc/default.nix b/pkgs/tools/networking/tinc/default.nix
index f7085e8f5c52..813290494e2e 100644
--- a/pkgs/tools/networking/tinc/default.nix
+++ b/pkgs/tools/networking/tinc/default.nix
@@ -1,12 +1,12 @@
{stdenv, fetchurl, lzo, openssl, zlib}:
stdenv.mkDerivation rec {
- version = "1.0.28";
+ version = "1.0.29";
name = "tinc-${version}";
src = fetchurl {
url = "http://www.tinc-vpn.org/packages/tinc-${version}.tar.gz";
- sha256 = "0i5kx3hza359nclyhb60kxlzqyx0phmg175350hww28g6scjcl0b";
+ sha256 = "0y1alzxgds067m83qdkg12hsy6disa2ad3y2i0h1pgpvdxy02mq3";
};
buildInputs = [ lzo openssl zlib ];
diff --git a/pkgs/tools/networking/unbound/default.nix b/pkgs/tools/networking/unbound/default.nix
index 1443c9bfb7d7..4362dc57e682 100644
--- a/pkgs/tools/networking/unbound/default.nix
+++ b/pkgs/tools/networking/unbound/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
name = "unbound-${version}";
- version = "1.5.9";
+ version = "1.5.10";
src = fetchurl {
url = "http://unbound.net/downloads/${name}.tar.gz";
- sha256 = "01328cfac99ab5b8c47115151896a244979e442e284eb962c0ea84b7782b6990";
+ sha256 = "11lli8jgq4n917gcx6nw728g1hqc2lszwlxa5mdb78m2ri7qp6x3";
};
outputs = [ "out" "lib" "man" ]; # "dev" would only split ~20 kB
@@ -35,7 +35,7 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
description = "Validating, recursive, and caching DNS resolver";
license = licenses.bsd3;
- homepage = http://www.unbound.net;
+ homepage = https://www.unbound.net;
maintainers = with maintainers; [ ehmry fpletz ];
platforms = stdenv.lib.platforms.unix;
};
diff --git a/pkgs/tools/networking/wicd/default.nix b/pkgs/tools/networking/wicd/default.nix
index d693b8db953a..2613fe7ab097 100644
--- a/pkgs/tools/networking/wicd/default.nix
+++ b/pkgs/tools/networking/wicd/default.nix
@@ -46,7 +46,7 @@ in stdenv.mkDerivation rec {
sed -i "2iexport PATH=${python}/bin\$\{PATH:+:\}\$PATH" in/scripts=wicd-cli.in
sed -i "3iexport PYTHONPATH=$(toPythonPath $out):$(toPythonPath ${pyGtkGlade})/gtk-2.0:$(toPythonPath ${pygobject2}):$(toPythonPath ${pycairo}):$(toPythonPath ${dbus-python})\$\{PYTHONPATH:+:\}\$PYTHONPATH" in/scripts=wicd-cli.in
sed -i "2iexport PATH=${python}/bin\$\{PATH:+:\}\$PATH" in/scripts=wicd-curses.in
- sed -i "3iexport PYTHONPATH=$(toPythonPath $out):$(toPythonPath ${pyGtkGlade})/gtk-2.0:$(toPythonPath ${pygobject2}):$(toPythonPath ${pycairo}):$(toPythonPath ${dbus-python}):$(toPythonPath ${pythonPackages.urwid}):$(toPythonPath ${pythonPackages.curses})\$\{PYTHONPATH:+:\}\$PYTHONPATH" in/scripts=wicd-curses.in
+ sed -i "3iexport PYTHONPATH=$(toPythonPath $out):$(toPythonPath ${pyGtkGlade})/gtk-2.0:$(toPythonPath ${pygobject2}):$(toPythonPath ${pycairo}):$(toPythonPath ${dbus-python}):$(toPythonPath ${pythonPackages.urwid})\$\{PYTHONPATH:+:\}\$PYTHONPATH" in/scripts=wicd-curses.in
rm po/ast.po
'';
diff --git a/pkgs/tools/package-management/fpm/default.nix b/pkgs/tools/package-management/fpm/default.nix
index ca2e44fcaf00..4a18bfb5345f 100644
--- a/pkgs/tools/package-management/fpm/default.nix
+++ b/pkgs/tools/package-management/fpm/default.nix
@@ -1,13 +1,9 @@
{ lib, bundlerEnv, ruby }:
bundlerEnv rec {
- name = "fpm-${version}";
-
- version = (import gemset).fpm.version;
inherit ruby;
- gemfile = ./Gemfile;
- lockfile = ./Gemfile.lock;
- gemset = ./gemset.nix;
+ pname = "fpm";
+ gemdir = ./.;
meta = with lib; {
description = "Tool to build packages for multiple platforms with ease";
diff --git a/pkgs/tools/package-management/koji/default.nix b/pkgs/tools/package-management/koji/default.nix
index 28a1f3d00b72..7d2022ee91bb 100644
--- a/pkgs/tools/package-management/koji/default.nix
+++ b/pkgs/tools/package-management/koji/default.nix
@@ -1,6 +1,8 @@
-{ stdenv, fetchurl, pythonPackages, python }:
+{ stdenv, fetchurl, python2 }:
-stdenv.mkDerivation rec {
+let
+ pythonEnv = python2.withPackages(ps : [ps.pycurl]);
+in stdenv.mkDerivation rec {
name = "koji-1.8";
src = fetchurl {
@@ -8,7 +10,7 @@ stdenv.mkDerivation rec {
sha256 = "10dph209h4jgajb5jmbjhqy4z4hd22i7s2d93vm3ikdf01i8iwf1";
};
- propagatedBuildInputs = [ pythonPackages.pycurl python ];
+ propagatedBuildInputs = [ pythonEnv ];
makeFlags = "DESTDIR=$(out)";
diff --git a/pkgs/tools/package-management/libhif/default.nix b/pkgs/tools/package-management/libhif/default.nix
deleted file mode 100644
index 7736c67007ae..000000000000
--- a/pkgs/tools/package-management/libhif/default.nix
+++ /dev/null
@@ -1,36 +0,0 @@
-{ stdenv, fetchFromGitHub, cmake, pkgconfig, autoconf, automake, libtool, expat, python, sphinx, gobjectIntrospection, librepo, check, rpm, libsolv, pcre, curl, gtk_doc, zlib, xz, elfutils }:
-
-stdenv.mkDerivation rec {
- rev = "87e4cb247f5982fd48636691a955cc566d3110a3";
- name = "libhif-${stdenv.lib.strings.substring 0 7 rev}";
-
- src = fetchFromGitHub {
- inherit rev;
- owner = "rpm-software-management";
- repo = "libhif";
- sha256 = "1g8hrqjawzwcx1gjcnv9sxg5i8l13dab3rr3i641k5vi76vv8miq";
- };
-
- postPatch = ''
- for file in python/hawkey/CMakeLists.txt python/hawkey/tests/module/CMakeLists.txt; do
- substituteInPlace $file --replace ' ''${PYTHON_INSTALL_DIR}' " $out/${python.sitePackages}"
- done
-
- # Until https://github.com/rpm-software-management/libhif/issues/43 is implemented, let's not force users to have this path
- substituteInPlace libhif/hif-keyring.c \
- --replace '"/etc/pki/rpm-gpg"' 'getenv("LIBHIF_RPM_GPG_PATH_OVERRIDE") ? getenv("LIBHIF_RPM_GPG_PATH_OVERRIDE") : "/etc/pki/rpm-gpg"'
- '';
-
- buildInputs = [ cmake pkgconfig pcre expat python sphinx gobjectIntrospection gtk_doc librepo check rpm curl ];
-
- # ibhif/hif-packagedelta.h includes solv/pool.h
- propagatedBuildInputs = [ libsolv ];
-
- meta = with stdenv.lib; {
- description = "A library that provides a high level package-manager. It uses librepo and hawkey under the hood.";
- license = licenses.lgpl2Plus;
- platforms = platforms.linux;
- maintainers = with maintainers; [ copumpkin ];
- };
-}
-
diff --git a/pkgs/tools/package-management/nixops/generic.nix b/pkgs/tools/package-management/nixops/generic.nix
index 7948ebc43fb4..9c4c2600fb40 100644
--- a/pkgs/tools/package-management/nixops/generic.nix
+++ b/pkgs/tools/package-management/nixops/generic.nix
@@ -1,9 +1,9 @@
-{ lib, pythonPackages, fetchurl, libxslt, docbook5_xsl, openssh
+{ lib, python2Packages, fetchurl, libxslt, docbook5_xsl, openssh
# version args
, src, version
}:
-pythonPackages.buildPythonApplication {
+python2Packages.buildPythonApplication {
name = "nixops-${version}";
namePrefix = "";
@@ -11,18 +11,17 @@ pythonPackages.buildPythonApplication {
buildInputs = [ libxslt ];
- pythonPath =
- [ pythonPackages.prettytable
- pythonPackages.boto
- pythonPackages.sqlite3
- pythonPackages.hetzner
- pythonPackages.libcloud
- pythonPackages.azure-storage
- pythonPackages.azure-mgmt-compute
- pythonPackages.azure-mgmt-network
- pythonPackages.azure-mgmt-resource
- pythonPackages.azure-mgmt-storage
- pythonPackages.adal
+ pythonPath = with python2Packages;
+ [ prettytable
+ boto
+ hetzner
+ libcloud
+ azure-storage
+ azure-mgmt-compute
+ azure-mgmt-network
+ azure-mgmt-resource
+ azure-mgmt-storage
+ adal
];
doCheck = false;
diff --git a/pkgs/tools/security/ecryptfs/default.nix b/pkgs/tools/security/ecryptfs/default.nix
index 582b5ceae119..4981d8fa062a 100644
--- a/pkgs/tools/security/ecryptfs/default.nix
+++ b/pkgs/tools/security/ecryptfs/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, pkgconfig, perl, utillinux, keyutils, nss, nspr, python, pam
+{ stdenv, fetchurl, pkgconfig, perl, utillinux, keyutils, nss, nspr, python2, pam
, intltool, makeWrapper, coreutils, bash, gettext, cryptsetup, lvm2, rsync, which, lsof }:
stdenv.mkDerivation rec {
@@ -33,7 +33,7 @@ stdenv.mkDerivation rec {
done
'';
- buildInputs = [ pkgconfig perl nss nspr python pam intltool makeWrapper ];
+ buildInputs = [ pkgconfig perl nss nspr python2 pam intltool makeWrapper ];
propagatedBuildInputs = [ coreutils gettext cryptsetup lvm2 rsync keyutils which ];
postInstall = ''
diff --git a/pkgs/tools/security/ecryptfs/helper.nix b/pkgs/tools/security/ecryptfs/helper.nix
index 40e6771251ab..0d4b37a8efc0 100644
--- a/pkgs/tools/security/ecryptfs/helper.nix
+++ b/pkgs/tools/security/ecryptfs/helper.nix
@@ -1,7 +1,7 @@
{ stdenv
, fetchurl
, makeWrapper
-, python
+, python2
}:
stdenv.mkDerivation rec {
@@ -22,7 +22,7 @@ stdenv.mkDerivation rec {
installPhase = ''
mkdir -p $out/bin $out/libexec
cp $src $out/libexec/ecryptfs-helper.py
- makeWrapper "${python.interpreter} $out/libexec/ecryptfs-helper.py" $out/bin/ecryptfs-helper
+ makeWrapper "${python2.interpreter} $out/libexec/ecryptfs-helper.py" $out/bin/ecryptfs-helper
'';
meta = with stdenv.lib; {
diff --git a/pkgs/tools/security/enpass/data.json b/pkgs/tools/security/enpass/data.json
new file mode 100644
index 000000000000..4e245d1c80fc
--- /dev/null
+++ b/pkgs/tools/security/enpass/data.json
@@ -0,0 +1,12 @@
+{
+ "amd64": {
+ "path": "pool/main/e/enpass/enpass_5.3.0_amd64.deb",
+ "sha256": "d9da061c6456281da836bdd78bdb7baeced4b7f1805bb2495e4f1d15038cf86b",
+ "version": "5.3.0"
+ },
+ "i386": {
+ "path": "pool/main/e/enpass/enpass_5.3.0_i386.deb",
+ "sha256": "58d9f3b83c2da477c13976e1826d112236eabd46a389de7e8767ee99ac41f469",
+ "version": "5.3.0"
+ }
+} \ No newline at end of file
diff --git a/pkgs/tools/security/enpass/default.nix b/pkgs/tools/security/enpass/default.nix
new file mode 100644
index 000000000000..b7f7282d2929
--- /dev/null
+++ b/pkgs/tools/security/enpass/default.nix
@@ -0,0 +1,106 @@
+{stdenv, system, fetchurl, dpkg, openssl, xorg
+, glib, mesa, libpulseaudio, zlib, dbus, fontconfig, freetype
+, gtk2, pango, atk, cairo, gdk_pixbuf, jasper, xkeyboardconfig
+, makeWrapper , makeDesktopItem, python, pythonPackages, lib}:
+assert system == "i686-linux" || system == "x86_64-linux";
+let
+ all_data = (with builtins; fromJSON (readFile ./data.json));
+ system_map = {
+ i686-linux = "i386";
+ x86_64-linux = "amd64";
+ };
+
+ data = (with builtins; getAttr (getAttr system system_map) all_data);
+
+ baseUrl = http://repo.sinew.in;
+
+ # used of both wrappers and libpath
+ libPath = lib.makeLibraryPath (with xorg; [
+ openssl
+ mesa
+ fontconfig
+ freetype
+ libpulseaudio
+ zlib
+ dbus
+ libX11
+ libXi
+ libSM
+ libICE
+ libXext
+ libXrender
+ libXScrnSaver
+ glib
+ gtk2
+ pango
+ cairo
+ atk
+ gdk_pixbuf
+ jasper
+ stdenv.cc.cc
+ ]);
+ package = stdenv.mkDerivation rec {
+
+ inherit (data) version;
+ name = "enpass-${version}";
+
+ desktopItem = makeDesktopItem {
+ name = "Enpass";
+ exec = "$out/bin/Enpass";
+ #icon = "Enpass";
+ desktopName = "Enpass";
+ genericName = "Password manager";
+ categories = "Application;Security;";
+ };
+
+
+ src = fetchurl {
+ inherit (data) sha256;
+ url = "${baseUrl}/${data.path}";
+ };
+
+ meta = {
+ description = "a well known password manager";
+ homepage = https://www.enpass.io/;
+ maintainer = lib.maintainers.ronny;
+ license = lib.licenses.unfree;
+ platforms = lib.platforms.linux;
+ };
+
+ buildInputs = [makeWrapper dpkg];
+ phases = [ "unpackPhase" "installPhase" ];
+
+ unpackPhase = "dpkg -X $src .";
+ installPhase=''
+ mkdir $out
+ cp -r opt/Enpass/* $out
+
+ # Make desktop item
+ mkdir -p "$out"/share/applications
+ cp "$desktopItem"/share/applications/* "$out"/share/applications/
+ mkdir -p "$out"/share/icons
+
+ patchelf \
+ --set-interpreter $(cat $NIX_CC/nix-support/dynamic-linker) \
+ $out/bin/Enpass
+
+ wrapProgram $out/bin/Enpass \
+ --set LD_LIBRARY_PATH "${libPath}:$out/lib:$out/plugins/sqldrivers" \
+ --set QT_PLUGIN_PATH "$out/plugins" \
+ --set QT_QPA_PLATFORM_PLUGIN_PATH "$out/plugins/platforms" \
+ --set QT_XKB_CONFIG_ROOT "${xkeyboardconfig}/share/X11/xkb"
+ '';
+ };
+ updater = {
+ update = stdenv.mkDerivation rec {
+ name = "enpass-update-script";
+ SCRIPT =./update_script.py;
+
+ buildInputs = with pythonPackages; [python requests pathlib2 six attrs ];
+ shellHook = ''
+ exec python $SCRIPT --target pkgs/tools/security/enpass/data.json --repo ${baseUrl}
+ '';
+
+ };
+ };
+in (package // {refresh = updater;})
diff --git a/pkgs/tools/security/enpass/update_script.py b/pkgs/tools/security/enpass/update_script.py
new file mode 100644
index 000000000000..f8ec715cb5e4
--- /dev/null
+++ b/pkgs/tools/security/enpass/update_script.py
@@ -0,0 +1,95 @@
+from __future__ import print_function
+
+
+import argparse
+import bz2
+import email
+import json
+import logging
+
+from itertools import product
+from operator import itemgetter
+
+import attr
+import pkg_resources
+
+from pathlib2 import Path
+from requests import Session
+from six.moves.urllib_parse import urljoin
+
+
+@attr.s
+class ReleaseElement(object):
+ sha256 = attr.ib(repr=False)
+ size = attr.ib(convert=int)
+ path = attr.ib()
+
+log = logging.getLogger('enpass.updater')
+
+
+parser = argparse.ArgumentParser()
+parser.add_argument('--repo')
+parser.add_argument('--target', type=Path)
+
+
+session = Session()
+
+
+def parse_bz2_msg(msg):
+ msg = bz2.decompress(msg)
+ if '\n\n' in msg:
+ parts = msg.split('\n\n')
+ return list(map(email.message_from_string, parts))
+ return email.message_from_string(msg)
+
+
+def fetch_meta(repo, name, parse=email.message_from_string, split=False):
+ url = urljoin(repo, 'dists/stable', name)
+ response = session.get("{repo}/dists/stable/{name}".format(**locals()))
+ return parse(response.content)
+
+
+def fetch_filehashes(repo, path):
+ meta = fetch_meta(repo, path, parse=parse_bz2_msg)
+ for item in meta:
+ yield {
+ 'version': pkg_resources.parse_version(str(item['Version'])),
+ 'path': item['Filename'],
+ 'sha256': item['sha256'],
+ }
+
+
+def fetch_archs(repo):
+ m = fetch_meta(repo, 'Release')
+
+ architectures = m['Architectures'].split()
+ elements = [ReleaseElement(*x.split()) for x in m['SHA256'].splitlines()]
+ elements = [x for x in elements if x.path.endswith('bz2')]
+
+ for arch, elem in product(architectures, elements):
+ if arch in elem.path:
+ yield arch, max(fetch_filehashes(repo, elem.path),
+ key=itemgetter('version'))
+
+
+class OurVersionEncoder(json.JSONEncoder):
+ def default(self, obj):
+ # the other way around to avoid issues with
+ # newer setuptools having strict/legacy versions
+ if not isinstance(obj, (dict, str)):
+ return str(obj)
+ return json.JSONEncoder.default(self, obj)
+
+
+def main(repo, target):
+ logging.basicConfig(level=logging.DEBUG)
+ with target.open(mode='wb') as fp:
+ json.dump(
+ dict(fetch_archs(repo)), fp,
+ cls=OurVersionEncoder,
+ indent=2,
+ sort_keys=True)
+
+
+opts = parser.parse_args()
+main(opts.repo, opts.target)
diff --git a/pkgs/tools/security/fail2ban/default.nix b/pkgs/tools/security/fail2ban/default.nix
index 70dfb9e82c6b..695bfcce3a59 100644
--- a/pkgs/tools/security/fail2ban/default.nix
+++ b/pkgs/tools/security/fail2ban/default.nix
@@ -13,7 +13,7 @@ pythonPackages.buildPythonApplication {
sha256 = "1m8gqj35kwrn30rqwd488sgakaisz22xa5v9llvz6gwf4f7ps0a9";
};
- propagatedBuildInputs = [ python.modules.sqlite3 gamin ]
+ propagatedBuildInputs = [ gamin ]
++ (stdenv.lib.optional stdenv.isLinux pythonPackages.systemd);
preConfigure = ''
diff --git a/pkgs/tools/security/fpm2/default.nix b/pkgs/tools/security/fpm2/default.nix
new file mode 100644
index 000000000000..8bb3cba15c46
--- /dev/null
+++ b/pkgs/tools/security/fpm2/default.nix
@@ -0,0 +1,25 @@
+{ stdenv, fetchurl, pkgconfig, gnupg, gtk2
+, libxml2, intltool
+}:
+
+with stdenv.lib;
+
+stdenv.mkDerivation rec {
+ name = "fpm2-${version}";
+ version = "0.79";
+
+ src = fetchurl {
+ url = "http://als.regnet.cz/fpm2/download/fpm2-${version}.tar.bz2";
+ sha256 = "d55e9ce6be38a44fc1053d82db2d117cf3991a51898bd86d7913bae769f04da7";
+ };
+
+ buildInputs = [ pkgconfig gnupg gtk2 libxml2 intltool ];
+
+ meta = {
+ description = "FPM2 is GTK2 port from Figaro's Password Manager originally developed by John Conneely, with some new enhancements.";
+ homepage = http://als.regnet.cz/fpm2/;
+ license = licenses.gpl2;
+ platforms = platforms.linux;
+ maintainers = with maintainers; [ hce ];
+ };
+}
diff --git a/pkgs/tools/security/gencfsm/default.nix b/pkgs/tools/security/gencfsm/default.nix
index 8441fbbb7613..871ba1d8b854 100644
--- a/pkgs/tools/security/gencfsm/default.nix
+++ b/pkgs/tools/security/gencfsm/default.nix
@@ -1,5 +1,7 @@
{ stdenv, fetchurl, autoconf, automake, intltool, libtool, pkgconfig, encfs
-, glib , gnome3, gtk3, libgnome_keyring, vala_0_23, wrapGAppsHook, xorg }:
+, glib , gnome3, gtk3, libgnome_keyring, vala_0_23, wrapGAppsHook, xorg
+, libgee_0_6
+}:
stdenv.mkDerivation rec {
version = "1.8.16";
@@ -11,7 +13,7 @@ stdenv.mkDerivation rec {
};
buildInputs = [ autoconf automake intltool libtool pkgconfig vala_0_23 glib encfs
- gtk3 libgnome_keyring gnome3.libgee_1 xorg.libSM xorg.libICE
+ gtk3 libgnome_keyring libgee_0_6 xorg.libSM xorg.libICE
wrapGAppsHook ];
patches = [ ./makefile-mkdir.patch ];
@@ -30,5 +32,6 @@ stdenv.mkDerivation rec {
license = licenses.gpl2Plus;
platforms = platforms.linux;
maintainers = [ maintainers.spacefrogg ];
+ broken = true;
};
}
diff --git a/pkgs/tools/security/gnupg/20.nix b/pkgs/tools/security/gnupg/20.nix
index 932bf508c2fa..fd79419d82ac 100644
--- a/pkgs/tools/security/gnupg/20.nix
+++ b/pkgs/tools/security/gnupg/20.nix
@@ -3,13 +3,13 @@
# Each of the dependencies below are optional.
# Gnupg can be built without them at the cost of reduced functionality.
-, pinentry ? null, x11Support ? true
+, pinentry ? null, guiSupport ? true
, openldap ? null, bzip2 ? null, libusb ? null, curl ? null
}:
with stdenv.lib;
-assert x11Support -> pinentry != null;
+assert guiSupport -> pinentry != null;
stdenv.mkDerivation rec {
name = "gnupg-2.0.30";
@@ -35,7 +35,8 @@ stdenv.mkDerivation rec {
patch gl/stdint_.h < ${./clang.patch}
'';
- configureFlags = optional x11Support "--with-pinentry-pgm=${pinentry}/bin/pinentry";
+ pinentryBinaryPath = pinentry.binaryPath or "bin/pinentry";
+ configureFlags = optional guiSupport "--with-pinentry-pgm=${pinentry}/${pinentryBinaryPath}";
postConfigure = "substituteAllInPlace tools/gpgkey2ssh.c";
diff --git a/pkgs/tools/security/gnupg/21.nix b/pkgs/tools/security/gnupg/21.nix
index 34042d802ccb..b7a71332e772 100644
--- a/pkgs/tools/security/gnupg/21.nix
+++ b/pkgs/tools/security/gnupg/21.nix
@@ -3,14 +3,14 @@
# Each of the dependencies below are optional.
# Gnupg can be built without them at the cost of reduced functionality.
-, pinentry ? null, x11Support ? true
+, pinentry ? null, guiSupport ? true
, adns ? null, gnutls ? null, libusb ? null, openldap ? null
, readline ? null, zlib ? null, bzip2 ? null
}:
with stdenv.lib;
-assert x11Support -> pinentry != null;
+assert guiSupport -> pinentry != null;
stdenv.mkDerivation rec {
name = "gnupg-${version}";
@@ -27,11 +27,13 @@ stdenv.mkDerivation rec {
readline libusb gnutls adns openldap zlib bzip2
];
+ patches = [ ./fix-libusb-include-path.patch ];
postPatch = stdenv.lib.optionalString stdenv.isLinux ''
sed -i 's,"libpcsclite\.so[^"]*","${pcsclite}/lib/libpcsclite.so",g' scd/scdaemon.c
''; #" fix Emacs syntax highlighting :-(
- configureFlags = optional x11Support "--with-pinentry-pgm=${pinentry}/bin/pinentry";
+ pinentryBinaryPath = pinentry.binaryPath or "bin/pinentry";
+ configureFlags = optional guiSupport "--with-pinentry-pgm=${pinentry}/${pinentryBinaryPath}";
meta = with stdenv.lib; {
homepage = http://gnupg.org;
diff --git a/pkgs/tools/security/gnupg/fix-libusb-include-path.patch b/pkgs/tools/security/gnupg/fix-libusb-include-path.patch
new file mode 100644
index 000000000000..18c4f1107388
--- /dev/null
+++ b/pkgs/tools/security/gnupg/fix-libusb-include-path.patch
@@ -0,0 +1,11 @@
+--- a/configure
++++ b/configure
+@@ -8872,7 +8872,7 @@
+ { $as_echo "$as_me:${as_lineno-$LINENO}: checking libusb include dir" >&5
+ $as_echo_n "checking libusb include dir... " >&6; }
+ usb_incdir_found="no"
+- for _incdir in "" "/usr/include/libusb-1.0" "/usr/local/include/libusb-1.0"; do
++ for _incdir in "$($PKG_CONFIG --variable=includedir libusb-1.0)/libusb-1.0"; do
+ _libusb_save_cppflags=$CPPFLAGS
+ if test -n "${_incdir}"; then
+ CPPFLAGS="-I${_incdir} ${CPPFLAGS}"
diff --git a/pkgs/tools/security/knockknock/default.nix b/pkgs/tools/security/knockknock/default.nix
index 5ff93ae6a033..ce7663b18cf9 100644
--- a/pkgs/tools/security/knockknock/default.nix
+++ b/pkgs/tools/security/knockknock/default.nix
@@ -1,6 +1,6 @@
-{ stdenv, fetchFromGitHub, pythonPackages, hping }:
+{ stdenv, fetchFromGitHub, python2Packages, hping }:
-pythonPackages.buildPythonApplication rec {
+python2Packages.buildPythonApplication rec {
rev = "bf14bbff";
name = "knockknock-r${rev}";
@@ -11,7 +11,10 @@ pythonPackages.buildPythonApplication rec {
sha256 = "1chpfs3w2vkjrgay69pbdr116z1jldv53fi768a1i05fdqhy1px4";
};
- propagatedBuildInputs = [ pythonPackages.pycrypto ];
+ propagatedBuildInputs = [ python2Packages.pycrypto ];
+
+ # No tests
+ doCheck = false;
patchPhase = ''
sed -i '/build\//d' setup.py
diff --git a/pkgs/tools/security/mpw/default.nix b/pkgs/tools/security/mpw/default.nix
index 813c7e5c06cd..e30866021da6 100644
--- a/pkgs/tools/security/mpw/default.nix
+++ b/pkgs/tools/security/mpw/default.nix
@@ -1,37 +1,41 @@
-{ stdenv, fetchurl, autoconf, automake, openssl, libxml2 }:
+{ stdenv, fetchzip, autoconf, automake, openssl, libxml2, fetchFromGitHub, ncurses }:
let
- scrypt_src = fetchurl {
- url = "http://masterpasswordapp.com/libscrypt-b12b554.tar.gz";
- sha256 = "02vz4i66v1acd15xjgki4ilmmp28m6a5603gi4hf8id3d3ndl9n7";
+ scrypt_src = fetchzip {
+ url = "http://www.tarsnap.com/scrypt/scrypt-1.2.0.tgz";
+ sha256 = "0ahylib2pimlhjcm566kpim6n16jci5v749xwdkr9ivgfjrv3xn4";
};
in stdenv.mkDerivation {
- name = "mpw-2.1-cli4";
+ name = "mpw-2.1-6834f36";
- srcs = [
- (fetchurl {
- url = "https://ssl.masterpasswordapp.com/mpw-2.1-cli4-0-gf6b2287.tar.gz";
- sha256 = "141bzb3nj18rbnbpdvsri8cdwwwxz4d6akyhfa834542xf96b9vf";
- })
- scrypt_src
- ];
-
- sourceRoot = ".";
+ src = fetchFromGitHub {
+ owner = "Lyndir";
+ repo = "MasterPassword";
+ rev = "6834f3689f5dfd4e59ad6959961d349c224977ee";
+ sha256 = "0zlpx3hb1y2l60hg961h05lb9yf3xb5phnyycvazah2674gkwb2p";
+ };
postUnpack = ''
- cp -R libscrypt-b12b554/* lib/scrypt
+ sourceRoot+=/MasterPassword/C
'';
prePatch = ''
patchShebangs .
+ mkdir lib/scrypt/src
+ cp -R --no-preserve=ownership ${scrypt_src}/* lib/scrypt/src
+ chmod +w -R lib/scrypt/src
+ substituteInPlace lib/scrypt/src/libcperciva/cpusupport/Build/cpusupport.sh \
+ --replace dirname "$(type -P dirname)"
+ substituteInPlace lib/scrypt/src/Makefile.in --replace "command -p mv" "mv"
'';
NIX_CFLAGS_COMPILE = "-I${libxml2.dev}/include/libxml2";
- buildInputs = [ autoconf automake openssl libxml2 ];
+ buildInputs = [ autoconf automake openssl libxml2 ncurses ];
buildPhase = ''
+ substituteInPlace build --replace '"curses"' '"ncurses"'
targets="mpw mpw-tests" ./build
'';
diff --git a/pkgs/tools/security/nitrokey-app/FixInstallDestination.patch b/pkgs/tools/security/nitrokey-app/FixInstallDestination.patch
new file mode 100644
index 000000000000..74e466069d93
--- /dev/null
+++ b/pkgs/tools/security/nitrokey-app/FixInstallDestination.patch
@@ -0,0 +1,57 @@
+--- a/CMakeLists.txt
++++ b/CMakeLists.txt
+@@ -251,23 +251,23 @@
+ # ${CMAKE_SOURCE_DIR}/data/icons/48x48
+ # ${CMAKE_SOURCE_DIR}/data/icons/128x128
+ ${CMAKE_SOURCE_DIR}/data/icons/
+- DESTINATION usr/share/icons/
++ DESTINATION share/icons/
+ )
+
+ install(FILES
+ ${CMAKE_SOURCE_DIR}/data/nitrokey-app.desktop
+- DESTINATION usr/share/applications
++ DESTINATION share/applications
+ )
+
+ install(FILES
+ ${CMAKE_SOURCE_DIR}/data/icons/hicolor/128x128/apps/nitrokey-app.png
+- DESTINATION usr/share/pixmaps
++ DESTINATION share/pixmaps
+ )
+
+ # Install Nitrokey udev rules
+ install(FILES
+ ${CMAKE_SOURCE_DIR}/data/40-nitrokey.rules
+- DESTINATION usr/lib/udev/rules.d
++ DESTINATION lib/udev/rules.d
+ )
+
+ # Install autocompletion scripts
+@@ -278,7 +278,7 @@
+
+ install(FILES
+ ${CMAKE_SOURCE_DIR}/po/de_DE/nitrokey-app.mo
+- DESTINATION usr/share/locale/de_DE/LC_MESSAGES
++ DESTINATION share/locale/de_DE/LC_MESSAGES
+ )
+
+ install(FILES
+@@ -286,7 +286,7 @@
+ ${CMAKE_SOURCE_DIR}/images/quit.png
+ ${CMAKE_SOURCE_DIR}/images/safe_zahlenkreis.png
+ ${CMAKE_SOURCE_DIR}/images/settings.png
+- DESTINATION usr/share/nitrokey
++ DESTINATION share/nitrokey
+ )
+
+ ENDIF () # NOT WIN32
+@@ -299,7 +299,7 @@
+ ${resources_ouput}
+ )
+
+-INSTALL(TARGETS nitrokey-app DESTINATION usr/bin)
++INSTALL(TARGETS nitrokey-app DESTINATION bin)
+
+ TARGET_LINK_LIBRARIES(nitrokey-app
+ ${QT_LIBRARIES}
diff --git a/pkgs/tools/security/nitrokey-app/HeaderPath.patch b/pkgs/tools/security/nitrokey-app/HeaderPath.patch
new file mode 100644
index 000000000000..695b7559116c
--- /dev/null
+++ b/pkgs/tools/security/nitrokey-app/HeaderPath.patch
@@ -0,0 +1,13 @@
+diff --git a/src/utils/hid_libusb.c b/src/utils/hid_libusb.c
+index bd8c14e..537292d 100644
+--- a/src/utils/hid_libusb.c
++++ b/src/utils/hid_libusb.c
+@@ -44,7 +44,7 @@
+ #include <wchar.h>
+
+ /* GNU / LibUSB */
+-#include "libusb.h"
++#include "libusb-1.0/libusb.h"
+ #include "iconv.h"
+
+ #include "hidapi.h"
diff --git a/pkgs/tools/security/nitrokey-app/default.nix b/pkgs/tools/security/nitrokey-app/default.nix
new file mode 100644
index 000000000000..91d5e75272bc
--- /dev/null
+++ b/pkgs/tools/security/nitrokey-app/default.nix
@@ -0,0 +1,37 @@
+{ stdenv, cmake, fetchFromGitHub, libusb1, pkgconfig, qt5 }:
+
+stdenv.mkDerivation rec {
+ name = "nitrokey-app";
+ version = "0.5.1";
+
+ src = fetchFromGitHub {
+ owner = "Nitrokey";
+ repo = "nitrokey-app";
+ rev = "v${version}";
+ sha256 = "0acb2502r3wa0mry6h8sz1k16zaa4bgnhxwxqd1vd1y42xc6g9bw";
+ };
+
+ buildInputs = [
+ cmake
+ libusb1
+ pkgconfig
+ qt5.qtbase
+ ];
+ patches = [
+ ./FixInstallDestination.patch
+ ./HeaderPath.patch
+ ];
+ cmakeFlags = "-DHAVE_LIBAPPINDICATOR=NO";
+ meta = {
+ description = "Provides extra functionality for the Nitrokey Pro and Storage";
+ longDescription = ''
+ The nitrokey-app provides a QT system tray widget with wich you can
+ access the extra functionality of a Nitrokey Storage or Nitrokey Pro.
+ See https://www.nitrokey.com/ for more information.
+ '';
+ homepage = https://github.com/Nitrokey/nitrokey-app;
+ repositories.git = https://github.com/Nitrokey/nitrokey-app.git;
+ license = stdenv.lib.licenses.gpl3;
+ maintainer = stdenv.lib.maintainers.kaiha;
+ };
+}
diff --git a/pkgs/tools/security/nmap/default.nix b/pkgs/tools/security/nmap/default.nix
index 3bc5d4158346..9413f9920866 100644
--- a/pkgs/tools/security/nmap/default.nix
+++ b/pkgs/tools/security/nmap/default.nix
@@ -1,38 +1,45 @@
{ stdenv, fetchurl, libpcap, pkgconfig, openssl
, graphicalSupport ? false
-, libX11 ? null
, gtk2 ? null
-, pythonPackages
-, makeWrapper ? null
+, libX11 ? null
+, withPython ? false # required for the `ndiff` binary
+, python2 ? null
}:
+assert withPython -> python2 != null;
+
with stdenv.lib;
let
- inherit (pythonPackages) python pygtk pygobject2 pycairo pysqlite;
+
+ # Zenmap (the graphical program) also requires Python,
+ # so automatically enable pythonSupport if graphicalSupport is requested.
+ pythonSupport = withPython || graphicalSupport;
+
+ pythonEnv = python2.withPackages(ps: with ps; []
+ ++ optionals graphicalSupport [ pycairo pygobject2 pygtk pysqlite ]
+ );
+
in stdenv.mkDerivation rec {
name = "nmap${optionalString graphicalSupport "-graphical"}-${version}";
- version = "7.12";
+ version = "7.31";
src = fetchurl {
- url = "http://nmap.org/dist/nmap-${version}.tar.bz2";
- sha256 = "014vagh9ak10hidwzp9s6g30y5h5fhsh8wykcnc1hnn9hwm0ipv3";
+ url = "https://nmap.org/dist/nmap-${version}.tar.bz2";
+ sha256 = "0hiqb28950kn4bjsmw0ksfyss7j2qdmgrj3xsjf7073pq01lx7yb";
};
patches = ./zenmap.patch;
- configureFlags = optionalString (!graphicalSupport) "--without-zenmap";
-
- postInstall = ''
- wrapProgram $out/bin/ndiff --prefix PYTHONPATH : "$(toPythonPath $out)" --prefix PYTHONPATH : "$PYTHONPATH"
- '' + optionalString graphicalSupport ''
- wrapProgram $out/bin/zenmap --prefix PYTHONPATH : "$(toPythonPath $out)" --prefix PYTHONPATH : "$PYTHONPATH" --prefix PYTHONPATH : $(toPythonPath ${pygtk})/gtk-2.0 --prefix PYTHONPATH : $(toPythonPath ${pygobject2})/gtk-2.0 --prefix PYTHONPATH : $(toPythonPath ${pycairo})/gtk-2.0
- '';
+ configureFlags = []
+ ++ optional (!pythonSupport) "--without-ndiff"
+ ++ optional (!graphicalSupport) "--without-zenmap"
+ ;
- buildInputs = [ libpcap pkgconfig openssl makeWrapper python ]
- ++ optionals graphicalSupport [
- libX11 gtk2 pygtk pysqlite pygobject2 pycairo
- ];
+ buildInputs = [ libpcap pkgconfig openssl ]
+ ++ optional pythonSupport pythonEnv
+ ++ optionals graphicalSupport [ gtk2 libX11 ]
+ ;
meta = {
description = "A free and open source utility for network discovery and security auditing";
diff --git a/pkgs/tools/security/pass/default.nix b/pkgs/tools/security/pass/default.nix
index 01d5dff4d751..b0137619f0c1 100644
--- a/pkgs/tools/security/pass/default.nix
+++ b/pkgs/tools/security/pass/default.nix
@@ -68,11 +68,11 @@ stdenv.mkDerivation rec {
git
gnupg
gnused
- procps
pwgen
tree
which
- ] ++ ifEnable x11Support [ dmenu xclip xdotool ]);
+ ] ++ stdenv.lib.optional stdenv.isLinux procps
+ ++ ifEnable x11Support [ dmenu xclip xdotool ]);
postFixup = ''
# Fix program name in --help
diff --git a/pkgs/tools/security/pgpdump/default.nix b/pkgs/tools/security/pgpdump/default.nix
new file mode 100644
index 000000000000..1e33c18753a6
--- /dev/null
+++ b/pkgs/tools/security/pgpdump/default.nix
@@ -0,0 +1,26 @@
+{ stdenv, fetchFromGitHub }:
+
+stdenv.mkDerivation rec {
+ name = "pgpdump-${version}";
+ version = "0.31";
+
+ src = fetchFromGitHub {
+ owner = "kazu-yamamoto";
+ repo = "pgpdump";
+ rev = "v${version}";
+ sha256 = "05ywdgxzq3976dsy95vgdx3nnhd9i9vypzyrkabpmnxphfnjfrb4";
+ };
+
+ meta = with stdenv.lib; {
+ description = "A PGP packet visualizer";
+ longDescription = ''
+ pgpdump is a PGP packet visualizer which displays the packet format of
+ OpenPGP (RFC 4880) and PGP version 2 (RFC 1991).
+ '';
+ homepage = "http://www.mew.org/~kazu/proj/pgpdump/en/";
+ license = licenses.bsd3;
+ platforms = platforms.linux;
+ maintainers = with maintainers; [ primeos ];
+ };
+}
+
diff --git a/pkgs/tools/security/pinentry-mac/default.nix b/pkgs/tools/security/pinentry-mac/default.nix
index faf8c613ea83..7116d1777d6d 100644
--- a/pkgs/tools/security/pinentry-mac/default.nix
+++ b/pkgs/tools/security/pinentry-mac/default.nix
@@ -17,6 +17,10 @@ stdenv.mkDerivation rec {
mv build/Release/pinentry-mac.app $out/Applications
'';
+ passthru = {
+ binaryPath = "Applications/pinentry-mac.app/Contents/MacOS/pinentry-mac";
+ };
+
meta = {
description = "Pinentry for GPG on Mac";
license = stdenv.lib.licenses.gpl2Plus;
diff --git a/pkgs/tools/security/ssdeep/default.nix b/pkgs/tools/security/ssdeep/default.nix
index 4f2cf551816b..b581d8007947 100644
--- a/pkgs/tools/security/ssdeep/default.nix
+++ b/pkgs/tools/security/ssdeep/default.nix
@@ -9,8 +9,6 @@ stdenv.mkDerivation rec {
sha256 = "1igqy0j7jrklb8fdlrm6ald4cyl1fda5ipfl8crzyl6bax2ajk3f";
};
- buildInputs = stdenv.lib.optional (!stdenv.isDarwin) [ patchelf ];
-
# For some reason (probably a build system bug), the binary isn't
# properly linked to $out/lib to find libfuzzy.so
postFixup = stdenv.lib.optionalString (!stdenv.isDarwin) ''
diff --git a/pkgs/tools/security/sslscan/default.nix b/pkgs/tools/security/sslscan/default.nix
index f6777a0e979f..6b205d845340 100644
--- a/pkgs/tools/security/sslscan/default.nix
+++ b/pkgs/tools/security/sslscan/default.nix
@@ -1,12 +1,14 @@
-{ stdenv, fetchurl, openssl }:
+{ stdenv, fetchFromGitHub, openssl }:
stdenv.mkDerivation rec {
name = "sslscan-${version}";
version = "1.11.7";
- src = fetchurl {
- url = "https://github.com/rbsec/sslscan/archive/${version}-rbsec.tar.gz";
- sha256 = "0wygz2gm9asvhpfy44333y4pkdja1sbr41hc6mhkxg7a4ys8f9qs";
+ src = fetchFromGitHub {
+ owner = "rbsec";
+ repo = "sslscan";
+ rev = "${version}-rbsec";
+ sha256 = "007lf3rxcn9nz6jrki3mavgd9sd2hmm9nzp2g13h0ri51yc3bkp0";
};
buildInputs = [ openssl ];
@@ -23,4 +25,3 @@ stdenv.mkDerivation rec {
platforms = platforms.all;
};
}
-
diff --git a/pkgs/tools/security/sudo/default.nix b/pkgs/tools/security/sudo/default.nix
index b31d60247d8d..b430fd8aad09 100644
--- a/pkgs/tools/security/sudo/default.nix
+++ b/pkgs/tools/security/sudo/default.nix
@@ -4,14 +4,14 @@
}:
stdenv.mkDerivation rec {
- name = "sudo-1.8.18";
+ name = "sudo-1.8.18p1";
src = fetchurl {
urls =
[ "ftp://ftp.sudo.ws/pub/sudo/${name}.tar.gz"
"ftp://ftp.sudo.ws/pub/sudo/OLD/${name}.tar.gz"
];
- sha256 = "04xywg2f9x2kfw81abdf8gsraldaz5v0w0x2zi8aqlgsjygfj6c5";
+ sha256 = "0d4l6y03khmzdd8vhfnq8lrb8gcxplzf7gav0a9sd08jf8f4g875";
};
configureFlags = [
diff --git a/pkgs/tools/security/sudolikeaboss/default.nix b/pkgs/tools/security/sudolikeaboss/default.nix
new file mode 100644
index 000000000000..6e2d6888f2e7
--- /dev/null
+++ b/pkgs/tools/security/sudolikeaboss/default.nix
@@ -0,0 +1,33 @@
+{ stdenv, buildGoPackage, fetchFromGitHub, fixDarwinDylibNames, darwin }:
+buildGoPackage rec {
+ name = "sudolikeaboss-${version}";
+ version = "0.2.1";
+
+ goPackagePath = "github.com/ravenac95/sudolikeaboss";
+ src = fetchFromGitHub {
+ owner = "ravenac95";
+ repo = "sudolikeaboss";
+ rev = "v${version}";
+ sha256 = "1zsmy67d334nax76sq0g2sczp4zi19d94d3xfwgadzk7sxvw1z0m";
+ };
+ goDeps = ./deps.nix;
+
+ propagatedBuildInputs = with darwin.apple_sdk.frameworks; [
+ Cocoa
+ fixDarwinDylibNames
+ ];
+
+ postInstall = ''
+ install_name_tool -delete_rpath $out/lib -add_rpath $bin $bin/bin/sudolikeaboss
+ '';
+
+ meta = with stdenv.lib; {
+ inherit version;
+ inherit (src.meta) homepage;
+ description = "Get 1password access from iterm2";
+ license = licenses.mit;
+ maintainers = [ maintainers.grahamc ];
+ platforms = platforms.darwin;
+ };
+
+}
diff --git a/pkgs/tools/security/sudolikeaboss/deps.nix b/pkgs/tools/security/sudolikeaboss/deps.nix
new file mode 100644
index 000000000000..04f831675fac
--- /dev/null
+++ b/pkgs/tools/security/sudolikeaboss/deps.nix
@@ -0,0 +1,22 @@
+# This file was generated by go2nix: https://github.com/kamilchm/go2nix
+# v1.1.0 or 1.1.1, not 100% sure
+[
+ {
+ goPackagePath = "github.com/urfave/cli";
+ fetch = {
+ type = "git";
+ url = "https://github.com/urfave/cli";
+ rev = "55f715e28c46073d0e217e2ce8eb46b0b45e3db6";
+ sha256 = "0fvqxh1dx4f189y90fhrjapb4g51d7cp203jahxfb19k1k8c3942";
+ };
+ }
+ {
+ goPackagePath = "golang.org/x/net";
+ fetch = {
+ type = "git";
+ url = "https://go.googlesource.com/net";
+ rev = "2a824cf9226006580a06d9fa8f10901c17b49ed5";
+ sha256 = "19hc83dsa8k1zbzb16v9yc44grscl9r4fxlpwqi3f6zqfrv0qk4n";
+ };
+ }
+]
diff --git a/pkgs/tools/security/tor/default.nix b/pkgs/tools/security/tor/default.nix
index 0e69729a2262..8fbf35caf1d2 100644
--- a/pkgs/tools/security/tor/default.nix
+++ b/pkgs/tools/security/tor/default.nix
@@ -3,11 +3,11 @@
}:
stdenv.mkDerivation rec {
- name = "tor-0.2.8.8";
+ name = "tor-0.2.8.9";
src = fetchurl {
url = "https://archive.torproject.org/tor-package-archive/${name}.tar.gz";
- sha256 = "1pp3h0a1cl25fv04b3j6wp8aw1sfpbd2lmag397dpp2k2b305bxi";
+ sha256 = "3f5c273bb887be4aff11f4d99b9e2e52d293b81ff4f6302b730161ff16dc5316";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/pkgs/tools/security/tor/tor-arm.nix b/pkgs/tools/security/tor/tor-arm.nix
index 1857cfcbe22e..432b1cbfceee 100644
--- a/pkgs/tools/security/tor/tor-arm.nix
+++ b/pkgs/tools/security/tor/tor-arm.nix
@@ -40,7 +40,7 @@ stdenv.mkDerivation rec {
cp -R src/TorCtl $out/libexec
wrapProgram $out/bin/arm \
- --prefix PYTHONPATH : "$(toPythonPath $out):$(toPythonPath ${pythonPackages.curses}):$out/libexec:$PYTHONPATH" \
+ --prefix PYTHONPATH : "$(toPythonPath $out):$out/libexec:$PYTHONPATH" \
--set TERMINFO "${ncurses.out}/share/terminfo" \
--set TERM "xterm"
'';
diff --git a/pkgs/tools/system/foreman/default.nix b/pkgs/tools/system/foreman/default.nix
index 594947c265a3..e97d71f5c84a 100644
--- a/pkgs/tools/system/foreman/default.nix
+++ b/pkgs/tools/system/foreman/default.nix
@@ -1,24 +1,9 @@
-{ stdenv, lib, ruby, bundlerEnv, makeWrapper }:
+{ bundlerEnv, lib, ruby }:
-stdenv.mkDerivation rec {
- name = "foreman-${env.gems.foreman.version}";
-
- env = bundlerEnv {
- inherit ruby;
- name = "${name}-gems";
- gemfile = ./Gemfile;
- lockfile = ./Gemfile.lock;
- gemset = ./gemset.nix;
- };
-
- phases = ["installPhase"];
-
- nativeBuildInputs = [ makeWrapper ];
-
- installPhase = ''
- mkdir -p $out/bin
- makeWrapper ${env}/bin/foreman $out/bin/foreman
- '';
+bundlerEnv {
+ inherit ruby;
+ pname = "foreman";
+ gemdir = ./.;
meta = with lib; {
description = "Process manager for applications with multiple components";
diff --git a/pkgs/tools/system/freeipmi/default.nix b/pkgs/tools/system/freeipmi/default.nix
index 76f640711a88..cd8485e25737 100644
--- a/pkgs/tools/system/freeipmi/default.nix
+++ b/pkgs/tools/system/freeipmi/default.nix
@@ -1,12 +1,12 @@
{ fetchurl, stdenv, libgcrypt, readline }:
stdenv.mkDerivation rec {
- version = "1.5.3";
+ version = "1.5.4";
name = "freeipmi-${version}";
src = fetchurl {
url = "mirror://gnu/freeipmi/${name}.tar.gz";
- sha256 = "0s4q7imc4r3g9lkd92bnvw70679q83b0irrlw895i5nc05dj4djx";
+ sha256 = "1m8zvnyjyjap07vvc5z90nyghabbb6bjcyyc7qswj66qsmssf135";
};
buildInputs = [ libgcrypt readline ];
diff --git a/pkgs/tools/system/hiera-eyaml/default.nix b/pkgs/tools/system/hiera-eyaml/default.nix
index 615a66f86551..e0ff7d5ca8b4 100644
--- a/pkgs/tools/system/hiera-eyaml/default.nix
+++ b/pkgs/tools/system/hiera-eyaml/default.nix
@@ -1,22 +1,9 @@
-{ lib, bundlerEnv, stdenv }:
+{ lib, bundlerEnv, ruby }:
-let
- name = "hiera-eyaml-${env.gems.hiera-eyaml.version}";
-
- env = bundlerEnv {
- inherit name;
- gemfile = ./Gemfile;
- lockfile = ./Gemfile.lock;
- gemset = ./gemset.nix;
- };
-
-in stdenv.mkDerivation {
- inherit name;
-
- buildCommand = ''
- mkdir -p $out/bin
- ln -s ${env}/bin/eyaml $out/bin/eyaml
- '';
+bundlerEnv {
+ inherit ruby;
+ pname = "hiera-eyaml";
+ gemdir = ./.;
meta = with lib; {
description = "Per-value asymmetric encryption of sensitive data for Hiera";
diff --git a/pkgs/tools/system/netdata/default.nix b/pkgs/tools/system/netdata/default.nix
index 28ec7f1be427..13c50fe3ec9e 100644
--- a/pkgs/tools/system/netdata/default.nix
+++ b/pkgs/tools/system/netdata/default.nix
@@ -1,19 +1,24 @@
-{ stdenv, fetchFromGitHub, autoreconfHook, zlib, pkgconfig }:
+{ stdenv, fetchFromGitHub, autoreconfHook, zlib, pkgconfig, libuuid }:
stdenv.mkDerivation rec{
- version = "1.0.0";
+ version = "1.4.0";
name = "netdata-${version}";
src = fetchFromGitHub {
rev = "v${version}";
owner = "firehol";
repo = "netdata";
- sha256 = "03107ny98zks05p44jzypkk4lw8lbvmqja5b537ln6cnrgp20yvq";
+ sha256 = "1wknxci2baj6f7rl8z8j7haaz122jmbb74aw7i3xbj2y61cs58n8";
};
- buildInputs = [ autoreconfHook zlib pkgconfig ];
+ buildInputs = [ autoreconfHook zlib pkgconfig libuuid ];
- patches = [ ./web_access.patch ];
+ preConfigure = ''
+ export ZLIB_CFLAGS=" "
+ export ZLIB_LIBS="-lz"
+ export UUID_CFLAGS=" "
+ export UUID_LIBS="-luuid"
+ '';
meta = with stdenv.lib; {
description = "Real-time performance monitoring tool";
diff --git a/pkgs/tools/system/netdata/web_access.patch b/pkgs/tools/system/netdata/web_access.patch
deleted file mode 100644
index 3c0fbf7507d7..000000000000
--- a/pkgs/tools/system/netdata/web_access.patch
+++ /dev/null
@@ -1,19 +0,0 @@
---- a/src/web_client.c.orig 2016-04-17 11:34:20.044455323 +0200
-+++ b/src/web_client.c 2016-04-17 11:34:47.432897957 +0200
-@@ -291,14 +291,14 @@
- buffer_sprintf(w->response.data, "File '%s' does not exist, or is not accessible.", filename);
- return 404;
- }
--
-+#if 0
- // check if the file is owned by us
- if(stat.st_uid != web_files_uid()) {
- error("%llu: File '%s' is owned by user %d (I run as user %d). Access Denied.", w->id, webfilename, stat.st_uid, getuid());
- buffer_sprintf(w->response.data, "Access to file '%s' is not permitted.", filename);
- return 403;
- }
--
-+#endif
- if((stat.st_mode & S_IFMT) == S_IFDIR) {
- snprintf(webfilename, FILENAME_MAX+1, "%s/index.html", filename);
- return mysendfile(w, webfilename);
diff --git a/pkgs/tools/system/r10k/Gemfile b/pkgs/tools/system/r10k/Gemfile
new file mode 100644
index 000000000000..c9363ff3dbdf
--- /dev/null
+++ b/pkgs/tools/system/r10k/Gemfile
@@ -0,0 +1,5 @@
+# frozen_string_literal: true
+# A sample Gemfile
+source "https://rubygems.org"
+
+gem "r10k"
diff --git a/pkgs/tools/system/r10k/Gemfile.lock b/pkgs/tools/system/r10k/Gemfile.lock
new file mode 100644
index 000000000000..e095d48fb63c
--- /dev/null
+++ b/pkgs/tools/system/r10k/Gemfile.lock
@@ -0,0 +1,49 @@
+GEM
+ remote: https://rubygems.org/
+ specs:
+ colored (1.2)
+ cri (2.6.1)
+ colored (~> 1.2)
+ faraday (0.9.2)
+ multipart-post (>= 1.2, < 3)
+ faraday_middleware (0.10.0)
+ faraday (>= 0.7.4, < 0.10)
+ fast_gettext (1.1.0)
+ gettext (3.2.2)
+ locale (>= 2.0.5)
+ text (>= 1.3.0)
+ gettext-setup (0.7)
+ fast_gettext (~> 1.1.0)
+ gettext (>= 3.0.2)
+ locale (2.1.2)
+ log4r (1.1.10)
+ minitar (0.5.4)
+ multi_json (1.12.1)
+ multipart-post (2.0.0)
+ puppet_forge (2.2.2)
+ faraday (~> 0.9.0)
+ faraday_middleware (>= 0.9.0, < 0.11.0)
+ gettext-setup (>= 0.3)
+ minitar
+ semantic_puppet (~> 0.1.0)
+ r10k (2.4.3)
+ colored (= 1.2)
+ cri (~> 2.6.1)
+ gettext-setup (~> 0.5)
+ log4r (= 1.1.10)
+ minitar
+ multi_json (~> 1.10)
+ puppet_forge (~> 2.2)
+ semantic_puppet (~> 0.1.0)
+ semantic_puppet (0.1.4)
+ gettext-setup (>= 0.3)
+ text (1.3.1)
+
+PLATFORMS
+ ruby
+
+DEPENDENCIES
+ r10k
+
+BUNDLED WITH
+ 1.12.5
diff --git a/pkgs/tools/system/r10k/default.nix b/pkgs/tools/system/r10k/default.nix
new file mode 100644
index 000000000000..0695504cc012
--- /dev/null
+++ b/pkgs/tools/system/r10k/default.nix
@@ -0,0 +1,33 @@
+{ stdenv, lib, bundlerEnv, makeWrapper, git, gnutar, gzip, ruby }:
+
+stdenv.mkDerivation rec {
+ name = "r10k-${version}";
+
+ version = "2.4.3";
+
+ env = bundlerEnv {
+ name = "${name}-gems";
+
+ gemfile = ./Gemfile;
+ lockfile = ./Gemfile.lock;
+ gemset = ./gemset.nix;
+ inherit ruby;
+ };
+
+ phases = ["installPhase"];
+
+ buildInputs = [ makeWrapper ];
+
+ installPhase = ''
+ mkdir -p $out/bin
+ makeWrapper ${env}/bin/r10k $out/bin/r10k \
+ --set PATH ${stdenv.lib.makeBinPath [ git gnutar gzip ]}
+ '';
+
+ meta = with lib; {
+ description = "Puppet environment and module deployment";
+ homepage = https://github.com/puppetlabs/r10k;
+ license = licenses.asl20;
+ maintainers = with maintainers; [ zimbatm ];
+ };
+}
diff --git a/pkgs/tools/system/r10k/gemset.nix b/pkgs/tools/system/r10k/gemset.nix
new file mode 100644
index 000000000000..5dfad45f5c85
--- /dev/null
+++ b/pkgs/tools/system/r10k/gemset.nix
@@ -0,0 +1,130 @@
+{
+ colored = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0b0x5jmsyi0z69bm6sij1k89z7h0laag3cb4mdn7zkl9qmxb90lx";
+ type = "gem";
+ };
+ version = "1.2";
+ };
+ cri = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0zzwvwzrrlmx6c5j7bqc63ib952h37i357xn97m3h8bjd7zyv79l";
+ type = "gem";
+ };
+ version = "2.6.1";
+ };
+ faraday = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1kplqkpn2s2yl3lxdf6h7sfldqvkbkpxwwxhyk7mdhjplb5faqh6";
+ type = "gem";
+ };
+ version = "0.9.2";
+ };
+ faraday_middleware = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0nxia26xzy8i56qfyz1bg8dg9yb26swpgci8n5jry8mh4bnx5r5h";
+ type = "gem";
+ };
+ version = "0.10.0";
+ };
+ fast_gettext = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0mxahyywhml3c206am11h6d93rk358l2vl0j764i8ndzir5z5h75";
+ type = "gem";
+ };
+ version = "1.1.0";
+ };
+ gettext = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1d2i1zfqvaxqi01g9vvkfkf5r85c5nfj2zwpd2ib9vvkjavhn9cx";
+ type = "gem";
+ };
+ version = "3.2.2";
+ };
+ gettext-setup = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "116frghrvcpzqhgi6skpmr56lzk35z44sbjkjn3lnlpr33sav03l";
+ type = "gem";
+ };
+ version = "0.7";
+ };
+ locale = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1sls9bq4krx0fmnzmlbn64dw23c4d6pz46ynjzrn9k8zyassdd0x";
+ type = "gem";
+ };
+ version = "2.1.2";
+ };
+ log4r = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0ri90q0frfmigkirqv5ihyrj59xm8pq5zcmf156cbdv4r4l2jicv";
+ type = "gem";
+ };
+ version = "1.1.10";
+ };
+ minitar = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1vpdjfmdq1yc4i620frfp9af02ia435dnpj8ybsd7dc3rypkvbka";
+ type = "gem";
+ };
+ version = "0.5.4";
+ };
+ multi_json = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1wpc23ls6v2xbk3l1qncsbz16npvmw8p0b38l8czdzri18mp51xk";
+ type = "gem";
+ };
+ version = "1.12.1";
+ };
+ multipart-post = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "09k0b3cybqilk1gwrwwain95rdypixb2q9w65gd44gfzsd84xi1x";
+ type = "gem";
+ };
+ version = "2.0.0";
+ };
+ puppet_forge = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1m2npid04dvli2r9h5cm2ccjmq0275xn4swi3x8wx5yzrixw98wv";
+ type = "gem";
+ };
+ version = "2.2.2";
+ };
+ r10k = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0cqwci30r2566xcf8wz7dgamj6i4q9cblgkgmmdm9w2klqzx30j7";
+ type = "gem";
+ };
+ version = "2.4.3";
+ };
+ semantic_puppet = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1zs19rsyv3f2zwhqi8cqbs87a6fzyl30aw2zqcxb8iz5m7xkd4kc";
+ type = "gem";
+ };
+ version = "0.1.4";
+ };
+ text = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1x6kkmsr49y3rnrin91rv8mpc3dhrf3ql08kbccw8yffq61brfrg";
+ type = "gem";
+ };
+ version = "1.3.1";
+ };
+} \ No newline at end of file
diff --git a/pkgs/tools/text/a2ps/default.nix b/pkgs/tools/text/a2ps/default.nix
index e38de5e6bd89..2535354aa229 100644
--- a/pkgs/tools/text/a2ps/default.nix
+++ b/pkgs/tools/text/a2ps/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, fetchpatch, libpaper, gperf, file, perl }:
+{ stdenv, fetchurl, fetchpatch, autoconf, bison, libpaper, gperf, file, perl }:
stdenv.mkDerivation rec {
name = "a2ps-4.14";
@@ -27,7 +27,7 @@ stdenv.mkDerivation rec {
substituteInPlace tests/defs.in --replace "/bin/rm" "rm"
'';
- nativeBuildInputs = [ file perl ];
+ nativeBuildInputs = [ autoconf file bison perl ];
buildInputs = [ libpaper gperf ];
meta = with stdenv.lib; {
diff --git a/pkgs/tools/text/grin/default.nix b/pkgs/tools/text/grin/default.nix
index 149af7baa2d7..7c1df7f8819c 100644
--- a/pkgs/tools/text/grin/default.nix
+++ b/pkgs/tools/text/grin/default.nix
@@ -1,6 +1,6 @@
-{ stdenv, fetchurl, pythonPackages }:
+{ stdenv, fetchurl, python2Packages }:
-pythonPackages.buildPythonApplication rec {
+python2Packages.buildPythonApplication rec {
name = "grin-1.2.1";
namePrefix = "";
@@ -9,8 +9,8 @@ pythonPackages.buildPythonApplication rec {
sha256 = "1swzwb17wibam8jszdv98h557hlx44pg6psv6rjz7i33qlxk0fdz";
};
- buildInputs = with pythonPackages; [ nose ];
- propagatedBuildInputs = with pythonPackages; [ argparse ];
+ buildInputs = with python2Packages; [ nose ];
+ propagatedBuildInputs = with python2Packages; [ argparse ];
meta = {
homepage = https://pypi.python.org/pypi/grin;
diff --git a/pkgs/tools/text/languagetool/default.nix b/pkgs/tools/text/languagetool/default.nix
new file mode 100644
index 000000000000..d2929ab90f42
--- /dev/null
+++ b/pkgs/tools/text/languagetool/default.nix
@@ -0,0 +1,31 @@
+{ stdenv, lib, fetchurl, unzip, jdk }:
+
+stdenv.mkDerivation rec {
+ pname = "LanguageTool";
+ version = "3.5";
+ name = pname + "-" + version;
+ src = fetchurl {
+ url = "https://www.languagetool.org/download/${name}.zip";
+ sha256 = "1axw8fqg2wlkmv45s71q5pg44sg1s06szpkjhyscy704i7d2jc34";
+ };
+ buildInputs = [ unzip jdk ];
+ installPhase =
+ ''
+ mkdir -p $out/{bin,share}
+ mv * $out/share/.
+ for lt in languagetool{,-commandline,-server};do
+ cat > $out/bin/$lt <<EXE
+ #!${stdenv.shell}
+ ${jdk}/bin/java -cp $out/share/ -jar $out/share/$lt.jar $@
+ EXE
+ chmod +x $out/bin/$lt
+ done
+ '';
+
+ meta = with stdenv.lib; {
+ homepage = "https://languagetool.org";
+ license = licenses.lgpl21Plus;
+ maintainers = with maintainers; [ edwtjo ];
+ descrption = "A proofreading program for English, French German, Polish, and more";
+ };
+}
diff --git a/pkgs/tools/text/ruby-zoom/Gemfile b/pkgs/tools/text/ruby-zoom/Gemfile
new file mode 100644
index 000000000000..4bb5d8c175d7
--- /dev/null
+++ b/pkgs/tools/text/ruby-zoom/Gemfile
@@ -0,0 +1,2 @@
+source 'https://rubygems.org'
+gem 'ruby-zoom'
diff --git a/pkgs/tools/text/ruby-zoom/Gemfile.lock b/pkgs/tools/text/ruby-zoom/Gemfile.lock
new file mode 100644
index 000000000000..29d5fe1da5ba
--- /dev/null
+++ b/pkgs/tools/text/ruby-zoom/Gemfile.lock
@@ -0,0 +1,25 @@
+GEM
+ remote: https://rubygems.org/
+ specs:
+ djinni (2.0.1)
+ fagin (~> 0.1, >= 0.1.2)
+ ruby-terminfo (~> 0.1, >= 0.1.1)
+ fagin (0.1.2)
+ hilighter (0.1.7)
+ json_config (0.1.2)
+ ruby-terminfo (0.1.1)
+ ruby-zoom (4.1.0)
+ djinni (~> 2.0, >= 2.0.1)
+ hilighter (~> 0.1, >= 0.1.3)
+ json_config (~> 0.1, >= 0.1.2)
+ scoobydoo (~> 0.1, >= 0.1.4)
+ scoobydoo (0.1.4)
+
+PLATFORMS
+ ruby
+
+DEPENDENCIES
+ ruby-zoom
+
+BUNDLED WITH
+ 1.13.1
diff --git a/pkgs/tools/text/ruby-zoom/default.nix b/pkgs/tools/text/ruby-zoom/default.nix
new file mode 100644
index 000000000000..eb3968a0db93
--- /dev/null
+++ b/pkgs/tools/text/ruby-zoom/default.nix
@@ -0,0 +1,18 @@
+{ lib, bundlerEnv, ruby, stdenv }:
+
+bundlerEnv {
+ pname = "ruby-zoom";
+
+ inherit ruby;
+ gemfile = ./Gemfile;
+ lockfile = ./Gemfile.lock;
+ gemset = ./gemset.nix;
+
+ meta = with lib; {
+ description = "Quickly open CLI search results in your favorite editor!";
+ homepage = https://gitlab.com/mjwhitta/zoom;
+ license = with licenses; gpl3;
+ maintainers = with stdenv.lib.maintainers; [ vmandela ];
+ platforms = platforms.unix;
+ };
+}
diff --git a/pkgs/tools/text/ruby-zoom/gemset.nix b/pkgs/tools/text/ruby-zoom/gemset.nix
new file mode 100644
index 000000000000..7d3836a3c33a
--- /dev/null
+++ b/pkgs/tools/text/ruby-zoom/gemset.nix
@@ -0,0 +1,58 @@
+{
+ djinni = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0wl4q4qs1nyla5n2b2ys6n3i35gvli8xb8mxz2xv0ik306cikqm6";
+ type = "gem";
+ };
+ version = "2.0.1";
+ };
+ fagin = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "17d419vkfr26gdbad97fg2ikskhn82vs3bnxlzd27w6lwyf13qxk";
+ type = "gem";
+ };
+ version = "0.1.2";
+ };
+ hilighter = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1a9a9clgd6kx63a82msjzi6abznfqivsgmds7qaqwb1dsl1nznbh";
+ type = "gem";
+ };
+ version = "0.1.7";
+ };
+ json_config = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "16q3q0j9s8w93lzxa7rrvh5wqk11np7s2nmgmdlrh8gl3w76xcz6";
+ type = "gem";
+ };
+ version = "0.1.2";
+ };
+ ruby-terminfo = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "0rl4ic5pzvrpgd42z0c1s2n3j39c9znksblxxvmhkzrc0ckyg2cm";
+ type = "gem";
+ };
+ version = "0.1.1";
+ };
+ ruby-zoom = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "132pk0zp3rayvvbccfs5ksigg9zpflp9734b4r0jz5aimmv2qpvp";
+ type = "gem";
+ };
+ version = "4.1.0";
+ };
+ scoobydoo = {
+ source = {
+ remotes = ["https://rubygems.org"];
+ sha256 = "1w83zgip3qvh20pgqgcp9yp0k35ypn7ny0d61xcv1ik0r3ab8ga0";
+ type = "gem";
+ };
+ version = "0.1.4";
+ };
+} \ No newline at end of file
diff --git a/pkgs/tools/text/shfmt/default.nix b/pkgs/tools/text/shfmt/default.nix
index aef12ed97439..cac9bbb168b8 100644
--- a/pkgs/tools/text/shfmt/default.nix
+++ b/pkgs/tools/text/shfmt/default.nix
@@ -2,8 +2,8 @@
buildGoPackage rec {
name = "shfmt-${version}";
- version = "2016-06-16";
- rev = "8add0072d6abdc892e4617c95e8bba21ebe0beeb";
+ version = "0.2.0";
+ rev = "v${version}";
goPackagePath = "github.com/mvdan/sh";
@@ -11,7 +11,7 @@ buildGoPackage rec {
owner = "mvdan";
repo = "sh";
inherit rev;
- sha256 = "1m2lkcw6m5gdqjp17m01d822cj1p04qk6hm9m94ni2x19f16qs8m";
+ sha256 = "07jf9v6583vvmk07fp7xdlnh7rvgl6f06ib2588g3xf1wk9vrq3d";
};
meta = with stdenv.lib; {
diff --git a/pkgs/tools/text/silver-searcher/default.nix b/pkgs/tools/text/silver-searcher/default.nix
index fcd7d350f308..2f12020afc39 100644
--- a/pkgs/tools/text/silver-searcher/default.nix
+++ b/pkgs/tools/text/silver-searcher/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
name = "silver-searcher-${version}";
- version = "0.32.0";
+ version = "0.33.0";
src = fetchFromGitHub {
owner = "ggreer";
repo = "the_silver_searcher";
rev = "${version}";
- sha256 = "0mz0i41fb6yrvn5x99bwaa66wqv5c8s5wd9pbnn90mgppxbn1037";
+ sha256 = "19705cgn8h476hkfyal3s5kx9mnz64hiz6dihnrx22fa3xvjfzlg";
};
NIX_LDFLAGS = stdenv.lib.optionalString stdenv.isLinux "-lgcc_s";
diff --git a/pkgs/tools/text/zimreader/default.nix b/pkgs/tools/text/zimreader/default.nix
index 2e51e7d7f9ea..449b1e9c3398 100644
--- a/pkgs/tools/text/zimreader/default.nix
+++ b/pkgs/tools/text/zimreader/default.nix
@@ -1,36 +1,27 @@
-{ stdenv, fetchgit, fetchurl, automake, autoconf, libtool
-, zlib, openssl, zip, zimlib
+{ stdenv, fetchFromGitHub, fetchpatch, automake, autoconf, libtool
+, zlib, openssl, zip, zimlib, cxxtools, tntnet
}:
-let
- cxxtools = stdenv.mkDerivation rec {
- name = "cxxtools-${version}";
- version = "2.1.1";
- src = fetchurl {
- url = "http://www.tntnet.org/download/cxxtools-${version}.tar.gz";
- sha256 = "0jh5wrk9mviz4xrp1wv617gwgl4b5mc21h21wr2688kjmc0i1q4d";
- };
- };
- tntnet = stdenv.mkDerivation rec {
- name = "tntnet-${version}";
- version = "2.1";
- src = fetchurl {
- url = "http://www.tntnet.org/download/tntnet-${version}.tar.gz";
- sha256 = "1dhs10yhpmdqyykyh8jc67m5xgsgm1wrpd58fdps2cp5g1gjf8w6";
- };
- buildInputs = [ zlib cxxtools openssl zip ];
- };
+stdenv.mkDerivation rec {
+ name = "zimreader-0.92";
-in stdenv.mkDerivation rec {
- name = "zimreader-${version}";
- version = "20150710";
-
- src = fetchgit {
- url = https://gerrit.wikimedia.org/r/p/openzim.git;
- rev = "165eab3e154c60b5b6436d653dc7c90f56cf7456";
- sha256 = "076ixsq4lis0rkk7p049g02bidc7bggl9kf2wzmgmsnx396mqymf";
+ src = fetchFromGitHub {
+ owner = "wikimedia";
+ repo = "openzim";
+ rev = "r1.3"; # there multiple tools with different version in the repo
+ sha256 = "0x529137rxy6ld64xqa6xmn93121ripxvkf3sc7hv3wg6km182sw";
};
+ patchFlags = "-p2";
+ patches = [
+ (fetchpatch {
+ name = "zimreader_tntnet221.patch";
+ url = "https://github.com/wikimedia/openzim/compare/r1.3...juliendehos:3ee5f11eaa811284d340451e6f466529c00f6ef2.patch";
+ sha256 = "0rc5n20svyyndqh7hsynjyblfraphgi0f6khw6f5jq89w9i1j1hd";
+ })
+ ];
+
+ enableParallelBuilding = true;
buildInputs = [ automake autoconf libtool zimlib cxxtools tntnet ];
setSourceRoot = "cd openzim-*/zimreader; export sourceRoot=`pwd`";
preConfigurePhases = [ "./autogen.sh" ];
@@ -38,7 +29,7 @@ in stdenv.mkDerivation rec {
meta = {
description = "A tool to serve ZIM files using HTTP";
homepage = http://git.wikimedia.org/log/openzim;
- maintainers = with stdenv.lib.maintainers; [ robbinch ];
+ maintainers = with stdenv.lib.maintainers; [ robbinch juliendehos ];
platforms = [ "x86_64-linux" ];
};
}
diff --git a/pkgs/tools/typesetting/asciidoctor/Gemfile.lock b/pkgs/tools/typesetting/asciidoctor/Gemfile.lock
index fc0abf038a92..0212db3816a1 100644
--- a/pkgs/tools/typesetting/asciidoctor/Gemfile.lock
+++ b/pkgs/tools/typesetting/asciidoctor/Gemfile.lock
@@ -4,33 +4,33 @@ GEM
Ascii85 (1.0.2)
addressable (2.4.0)
afm (0.2.2)
- asciidoctor (1.5.4)
+ asciidoctor (1.5.5)
asciidoctor-bespoke (1.0.0.alpha.1)
asciidoctor (>= 1.5.0)
slim (~> 3.0.6)
thread_safe (~> 0.3.5)
- asciidoctor-diagram (1.4.0)
+ asciidoctor-diagram (1.5.2)
asciidoctor (~> 1.5.0)
- asciidoctor-latex (1.5.0.8.dev)
+ asciidoctor-latex (1.5.0.17.dev)
asciidoctor (~> 1.5, >= 1.5.2)
htmlentities (~> 4.3)
opal (~> 0.6.3)
- asciidoctor-pdf (1.5.0.alpha.11)
- asciidoctor (~> 1.5.0)
+ asciidoctor-pdf (1.5.0.alpha.13)
+ asciidoctor (>= 1.5.0)
prawn (>= 1.3.0, < 3.0.0)
- prawn-icon (= 1.0.0)
- prawn-svg (= 0.21.0)
+ prawn-icon (= 1.2.0)
+ prawn-svg (>= 0.21.0, < 0.26.0)
prawn-table (= 0.2.2)
prawn-templates (= 0.0.3)
safe_yaml (~> 1.0.4)
thread_safe (~> 0.3.5)
treetop (= 1.5.3)
concurrent-ruby (1.0.2)
- css_parser (1.4.1)
+ css_parser (1.4.6)
addressable
hashery (2.1.2)
htmlentities (4.3.4)
- json (1.8.3)
+ json (2.0.2)
opal (0.6.3)
source_map
sprockets
@@ -45,30 +45,30 @@ GEM
prawn (2.1.0)
pdf-core (~> 0.6.1)
ttfunk (~> 1.4.0)
- prawn-icon (1.0.0)
+ prawn-icon (1.2.0)
prawn (>= 1.1.0, < 3.0.0)
- prawn-svg (0.21.0)
+ prawn-svg (0.25.2)
css_parser (~> 1.3)
- prawn (>= 0.8.4, < 3)
+ prawn (>= 0.11.1, < 3)
prawn-table (0.2.2)
prawn (>= 1.3.0, < 3.0.0)
prawn-templates (0.0.3)
pdf-reader (~> 1.3)
prawn (>= 0.15.0)
- rack (1.6.4)
+ rack (2.0.1)
ruby-rc4 (0.1.5)
safe_yaml (1.0.4)
- slim (3.0.6)
- temple (~> 0.7.3)
+ slim (3.0.7)
+ temple (~> 0.7.6)
tilt (>= 1.3.3, < 2.1)
source_map (3.0.1)
json
- sprockets (3.6.0)
+ sprockets (3.7.0)
concurrent-ruby (~> 1.0)
rack (> 1, < 3)
- temple (0.7.6)
+ temple (0.7.7)
thread_safe (0.3.5)
- tilt (2.0.2)
+ tilt (2.0.5)
treetop (1.5.3)
polyglot (~> 0.3)
ttfunk (1.4.0)
@@ -84,4 +84,4 @@ DEPENDENCIES
asciidoctor-pdf
BUNDLED WITH
- 1.11.2
+ 1.13.6
diff --git a/pkgs/tools/typesetting/asciidoctor/default.nix b/pkgs/tools/typesetting/asciidoctor/default.nix
index dd90444d6af6..495a5fcf8821 100644
--- a/pkgs/tools/typesetting/asciidoctor/default.nix
+++ b/pkgs/tools/typesetting/asciidoctor/default.nix
@@ -1,19 +1,9 @@
{ stdenv, lib, bundlerEnv, ruby_2_2, curl }:
bundlerEnv rec {
- name = "asciidoctor-${version}";
- version = "1.5.4";
-
+ pname = "asciidoctor";
ruby = ruby_2_2;
- gemfile = ./Gemfile;
- lockfile = ./Gemfile.lock;
- gemset = ./gemset.nix;
-
- # Delete dependencies' executables
- postBuild = ''
- find $out/bin -type f -not -wholename '*bin/asciidoctor*' -print0 \
- | xargs -0 rm
- '';
+ gemdir = ./.;
meta = with lib; {
description = "A faster Asciidoc processor written in Ruby";
diff --git a/pkgs/tools/typesetting/asciidoctor/gemset.nix b/pkgs/tools/typesetting/asciidoctor/gemset.nix
index 0c67be72e8ad..4c26c6a434a0 100644
--- a/pkgs/tools/typesetting/asciidoctor/gemset.nix
+++ b/pkgs/tools/typesetting/asciidoctor/gemset.nix
@@ -26,10 +26,10 @@
asciidoctor = {
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0xrli1fjsf1f0h6d9g55vzivxbqac2ygawcacx5ijnqn522wg9qc";
+ sha256 = "0kj2lls8f83nlhfkdkmbf7k5q9c9kk1cc15b1a4dy6arx4yzmvw7";
type = "gem";
};
- version = "1.5.4";
+ version = "1.5.5";
};
asciidoctor-bespoke = {
source = {
@@ -42,26 +42,26 @@
asciidoctor-diagram = {
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0yb2gqzzbvgf5im0bhv26s3h09m9m6a0pjlq3swqcvwi1szc64k5";
+ sha256 = "1di271v0ic6d5xkqbbwg6scjyj1ypklgy211gdmhf18xzpka3fvi";
type = "gem";
};
- version = "1.4.0";
+ version = "1.5.2";
};
asciidoctor-latex = {
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0wdrhcxz0sz9kx2zxn3qbqm5p664n9gzvv3lmg3214pj3si5wxnn";
+ sha256 = "02qvn1ngp4s9y22vk23zzssd4w1bpyk84akjwiq6nqn8im6s4awz";
type = "gem";
};
- version = "1.5.0.8.dev";
+ version = "1.5.0.17.dev";
};
asciidoctor-pdf = {
source = {
remotes = ["https://rubygems.org"];
- sha256 = "06jsbn1yiavg6r07k93rmjxj6ah8csqla5mpymqjzslrkgjg5brs";
+ sha256 = "0lp1q1yxy4y9k3znxxgj6pl0cbymz0yk5hsif73sg2bnpk62id9i";
type = "gem";
};
- version = "1.5.0.alpha.11";
+ version = "1.5.0.alpha.13";
};
concurrent-ruby = {
source = {
@@ -74,10 +74,10 @@
css_parser = {
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1ql5q4n39278prbdjdsxx9wkxkxblgzzn0qcdqnwibgd1dkvb5av";
+ sha256 = "0zsldn0ihmzl7nqk4lww9h8ijv1zb3l8g92y7b4w0da2d6cnyjw8";
type = "gem";
};
- version = "1.4.1";
+ version = "1.4.6";
};
hashery = {
source = {
@@ -98,10 +98,10 @@
json = {
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1nsby6ry8l9xg3yw4adlhk2pnc7i0h0rznvcss4vk3v74qg0k8lc";
+ sha256 = "1lhinj9vj7mw59jqid0bjn2hlfcnq02bnvsx9iv81nl2han603s0";
type = "gem";
};
- version = "1.8.3";
+ version = "2.0.2";
};
opal = {
source = {
@@ -146,18 +146,18 @@
prawn-icon = {
source = {
remotes = ["https://rubygems.org"];
- sha256 = "07dcsvxg52zdywhg28p6zsbj7ybz3xzbklawc1n7jwym2mli3916";
+ sha256 = "101npavqvv5w44vgphlkqn3gdawxmsnd4j8bk6lzbxz7niqgaqny";
type = "gem";
};
- version = "1.0.0";
+ version = "1.2.0";
};
prawn-svg = {
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1p5fsamh33xqp2gld0j4ii80awsxmm4ffp5pq13m0s1gavzaapc3";
+ sha256 = "19zc7i6jxycs9m00frvv9g3x98sgzsyb1xf1xnn3h1ki574ibnip";
type = "gem";
};
- version = "0.21.0";
+ version = "0.25.2";
};
prawn-table = {
source = {
@@ -178,10 +178,10 @@
rack = {
source = {
remotes = ["https://rubygems.org"];
- sha256 = "09bs295yq6csjnkzj7ncj50i6chfxrhmzg1pk6p0vd2lb9ac8pj5";
+ sha256 = "053bqbrxr5gjw5k3rrmh6i35s83kgdycxv292lid072vpwrq1xv1";
type = "gem";
};
- version = "1.6.4";
+ version = "2.0.1";
};
ruby-rc4 = {
source = {
@@ -202,10 +202,10 @@
slim = {
source = {
remotes = ["https://rubygems.org"];
- sha256 = "1szs71hh0msm5gj6qbcxw44m3hqnwybx4yh02scwixnwg576058k";
+ sha256 = "122hmc2kn3g151m8c41imadw29mghnsjwyzj8wav5zb1q69y4iqp";
type = "gem";
};
- version = "3.0.6";
+ version = "3.0.7";
};
source_map = {
source = {
@@ -218,18 +218,18 @@
sprockets = {
source = {
remotes = ["https://rubygems.org"];
- sha256 = "16fnlp4fqzrdxlbalbx3r0bir7dwyr1asg7s9lsmmczngl0x7fw7";
+ sha256 = "0jzsfiladswnzbrwqfiaj1xip68y58rwx0lpmj907vvq47k87gj1";
type = "gem";
};
- version = "3.6.0";
+ version = "3.7.0";
};
temple = {
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0ysraljv7lkb04z5vdyrkijab7j1jzj1mgz4bj82744dp7d0rhb0";
+ sha256 = "0xlf1if32xj14mkfwh8nxy3zzjzd9lipni0v2bghknp2kfc1hcz6";
type = "gem";
};
- version = "0.7.6";
+ version = "0.7.7";
};
thread_safe = {
source = {
@@ -242,10 +242,10 @@
tilt = {
source = {
remotes = ["https://rubygems.org"];
- sha256 = "0lkd40xfdqkp333vdfhrfjmi2y7k2hjs4azawfb62mrkfp7ivj84";
+ sha256 = "0lgk8bfx24959yq1cn55php3321wddw947mgj07bxfnwyipy9hqf";
type = "gem";
};
- version = "2.0.2";
+ version = "2.0.5";
};
treetop = {
source = {
diff --git a/pkgs/tools/typesetting/tex/dblatex/default.nix b/pkgs/tools/typesetting/tex/dblatex/default.nix
index ce65a587ddf2..7ffccde2c035 100644
--- a/pkgs/tools/typesetting/tex/dblatex/default.nix
+++ b/pkgs/tools/typesetting/tex/dblatex/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, python, libxslt, texlive
+{ stdenv, fetchurl, python2, libxslt, texlive
, enableAllFeatures ? false, imagemagick ? null, transfig ? null, inkscape ? null, fontconfig ? null, ghostscript ? null
, tex ? texlive.combine { # satisfy all packages that ./configure mentions
@@ -28,7 +28,7 @@ stdenv.mkDerivation rec {
sha256 = "0bkjgrn03dy5c7438s429wnv6z5ynxkr4pbhp2z49kynskgkzkjr";
};
- buildInputs = [ python libxslt tex ]
+ buildInputs = [ python2 libxslt tex ]
++ stdenv.lib.optionals enableAllFeatures [ imagemagick transfig ];
# TODO: dblatex tries to execute texindy command, but nixpkgs doesn't have
@@ -58,7 +58,7 @@ stdenv.mkDerivation rec {
dontBuild = true;
installPhase = ''
- python ./setup.py install --prefix="$out" --use-python-path --verbose
+ ${python2.interpreter} ./setup.py install --prefix="$out" --use-python-path --verbose
'';
passthru = { inherit tex; };
diff --git a/pkgs/tools/typesetting/tex/nix/animatedot.sh b/pkgs/tools/typesetting/tex/nix/animatedot.sh
index 46a2c515e03a..f038b83ff7ad 100644
--- a/pkgs/tools/typesetting/tex/nix/animatedot.sh
+++ b/pkgs/tools/typesetting/tex/nix/animatedot.sh
@@ -4,6 +4,6 @@ mkdir -p $out
for ((i = 1; i <= $nrFrames; i++)); do
echo "producing frame $i...";
- targetName=$out/$(basename $(stripHash $dotGraph; echo $strippedName) .dot)-f-$i.dot
+ targetName=$out/$(basename $(stripHash $dotGraph) .dot)-f-$i.dot
cpp -DFRAME=$i < $dotGraph > $targetName
done
diff --git a/pkgs/tools/typesetting/tex/nix/default.nix b/pkgs/tools/typesetting/tex/nix/default.nix
index ce5c025475a0..0566e5118705 100644
--- a/pkgs/tools/typesetting/tex/nix/default.nix
+++ b/pkgs/tools/typesetting/tex/nix/default.nix
@@ -185,7 +185,7 @@ rec {
if test -d $postscript; then
input=$(ls $postscript/*.ps)
else
- input=$(stripHash $postscript; echo $strippedName)
+ input=$(stripHash $postscript)
ln -s $postscript $input
fi
diff --git a/pkgs/tools/typesetting/tex/nix/dot2pdf.sh b/pkgs/tools/typesetting/tex/nix/dot2pdf.sh
index c416bf235a14..71cf601dfac0 100644
--- a/pkgs/tools/typesetting/tex/nix/dot2pdf.sh
+++ b/pkgs/tools/typesetting/tex/nix/dot2pdf.sh
@@ -4,7 +4,7 @@ mkdir -p $out
dot2pdf() {
sourceFile=$1
- targetName=$out/$(basename $(stripHash $sourceFile; echo $strippedName) .dot).pdf
+ targetName=$out/$(basename $(stripHash $sourceFile) .dot).pdf
echo "converting $sourceFile to $targetName..."
export FONTCONFIG_FILE=$fontsConf
dot -Tpdf $sourceFile > $targetName
diff --git a/pkgs/tools/typesetting/tex/nix/dot2ps.sh b/pkgs/tools/typesetting/tex/nix/dot2ps.sh
index c70e76ce4c73..dd8de4a23dbc 100644
--- a/pkgs/tools/typesetting/tex/nix/dot2ps.sh
+++ b/pkgs/tools/typesetting/tex/nix/dot2ps.sh
@@ -4,7 +4,7 @@ mkdir -p $out
dot2ps() {
sourceFile=$1
- targetName=$out/$(basename $(stripHash $sourceFile; echo $strippedName) .dot).ps
+ targetName=$out/$(basename $(stripHash $sourceFile) .dot).ps
echo "converting $sourceFile to $targetName..."
dot -Tps $sourceFile > $targetName
}
diff --git a/pkgs/tools/typesetting/tex/nix/lhs2tex.sh b/pkgs/tools/typesetting/tex/nix/lhs2tex.sh
index f34b3944c8ef..bfef3df6b0e1 100644
--- a/pkgs/tools/typesetting/tex/nix/lhs2tex.sh
+++ b/pkgs/tools/typesetting/tex/nix/lhs2tex.sh
@@ -10,7 +10,7 @@ cd $startDir
lhstex() {
sourceFile=$1
- targetName=$out/$(basename $(stripHash $sourceFile; echo $strippedName) .lhs).tex
+ targetName=$out/$(basename $(stripHash $sourceFile) .lhs).tex
echo "converting $sourceFile to $targetName..."
lhs2TeX -o "$targetName" $flags "$sourceFile"
}
diff --git a/pkgs/tools/typesetting/tex/nix/run-latex.sh b/pkgs/tools/typesetting/tex/nix/run-latex.sh
index fa27520d11cd..3941fdcac4a4 100644
--- a/pkgs/tools/typesetting/tex/nix/run-latex.sh
+++ b/pkgs/tools/typesetting/tex/nix/run-latex.sh
@@ -16,11 +16,11 @@ for i in $extraFiles; do
if test -d $i; then
ln -s $i/* .
else
- ln -s $i $(stripHash $i; echo $strippedName)
+ ln -s $i $(stripHash $i)
fi
done
-rootName=$(basename $(stripHash "$rootFile"; echo $strippedName))
+rootName=$(basename $(stripHash "$rootFile"))
rootNameBase=$(echo "$rootName" | sed 's/\..*//')
diff --git a/pkgs/tools/typesetting/tex/texlive/bin.nix b/pkgs/tools/typesetting/tex/texlive/bin.nix
index fe3c0b71b9bd..d41dbcfef0d6 100644
--- a/pkgs/tools/typesetting/tex/texlive/bin.nix
+++ b/pkgs/tools/typesetting/tex/texlive/bin.nix
@@ -1,6 +1,6 @@
{ stdenv, lib, fetchurl
, texlive
-, zlib, bzip2, ncurses, libpng, flex, bison, libX11, libICE, xproto
+, zlib, bzip2, ncurses, libiconv, libpng, flex, bison, libX11, libICE, xproto
, freetype, t1lib, gd, libXaw, icu, ghostscript, ed, libXt, libXpm, libXmu, libXext
, xextproto, perl, libSM, ruby, expat, curl, libjpeg, python, fontconfig, pkgconfig
, poppler, libpaper, graphite2, zziplib, harfbuzz, texinfo, potrace, gmp, mpfr
@@ -296,7 +296,7 @@ xindy = stdenv.mkDerivation {
pkgconfig perl
(texlive.combine { inherit (texlive) scheme-basic cyrillic ec; })
];
- buildInputs = [ clisp ];
+ buildInputs = [ clisp libiconv ];
configureFlags = [ "--with-clisp-runtime=system" "--disable-xindy-docs" ];
diff --git a/pkgs/tools/video/atomicparsley/default.nix b/pkgs/tools/video/atomicparsley/default.nix
index bb44fe044e81..835cacf0098c 100644
--- a/pkgs/tools/video/atomicparsley/default.nix
+++ b/pkgs/tools/video/atomicparsley/default.nix
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
};
buildInputs = with pkgs; [ unzip ]
- ++ stdenv.lib.optional stdenv.isDarwin [ darwin.apple_sdk.frameworks.Cocoa ];
+ ++ stdenv.lib.optionals stdenv.isDarwin [ darwin.apple_sdk.frameworks.Cocoa ];
patches = [ ./casts.patch ];
setSourceRoot = "sourceRoot=${product}-source-${version}";
buildPhase = "bash build";
diff --git a/pkgs/tools/video/mjpegtools/default.nix b/pkgs/tools/video/mjpegtools/default.nix
index 71b1b43f6535..1ab0a9ae2738 100644
--- a/pkgs/tools/video/mjpegtools/default.nix
+++ b/pkgs/tools/video/mjpegtools/default.nix
@@ -18,7 +18,7 @@ stdenv.mkDerivation rec {
hardeningDisable = [ "format" ];
buildInputs = [ libdv libjpeg libpng pkgconfig ]
- ++ lib.optional (!withMinimal) [ gtk2 libX11 SDL SDL_gfx ];
+ ++ lib.optionals (!withMinimal) [ gtk2 libX11 SDL SDL_gfx ];
NIX_CFLAGS_COMPILE = lib.optional (!withMinimal) "-I${SDL.dev}/include/SDL";