Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: c747894638a0
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: b64034e1d252
Choose a head ref
  • 16 commits
  • 22 files changed
  • 14 contributors

Commits on Oct 6, 2019

  1. qtpbfimageplugin: 1.4 -> 2.0

    sikmir committed Oct 6, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    d0f87d2 View commit details

Commits on Nov 12, 2019

  1. Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    dtzWill Will Dietz
    Copy the full SHA
    c438510 View commit details

Commits on Nov 13, 2019

  1. Copy the full SHA
    c42f582 View commit details

Commits on Nov 14, 2019

  1. arb: 2.16.0 -> 2.17.0

    * arb: 2.16.0 -> 2.17.0 (#71489)
    
    Semi-automatic update generated by
    https://github.com/ryantm/nixpkgs-update tools. This update was made
    based on information from
    https://repology.org/metapackage/arb/versions
    
    * arb: add meta.homepage
    r-ryantm authored and c0bw3b committed Nov 14, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    davidtwco David Wood
    Copy the full SHA
    dd03c2d View commit details
  2. Merge pull request #73339 from marsam/update-prometheus

    prometheus: 2.13.1 -> 2.14.0
    fpletz authored Nov 14, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    davidtwco David Wood
    Copy the full SHA
    ee0c3b4 View commit details
  3. awslogs: propagate setuptools

     (#71172)
    c0deaddict authored and c0bw3b committed Nov 14, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    davidtwco David Wood
    Copy the full SHA
    1060028 View commit details
  4. rbtools: propagate setuptools

     (#71180)
    c0deaddict authored and c0bw3b committed Nov 14, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    davidtwco David Wood
    Copy the full SHA
    ee0de85 View commit details
  5. passExtensions.pass-genphrase: 0.1 -> 0.2

     (#71032)
    seqizz authored and c0bw3b committed Nov 14, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    fooker Dustin Frisch
    Copy the full SHA
    dc1a1b2 View commit details
  6. Copy the full SHA
    7b77666 View commit details
  7. lorri: init at version unstable-2019-10-30

    Includes user service (nixos/modules/services/development/lorri) that
    starts on demand.
    curiousleo authored and Profpatsch committed Nov 14, 2019
    Copy the full SHA
    ceccff3 View commit details
  8. lorri service module: init

    curiousleo authored and Profpatsch committed Nov 14, 2019
    Copy the full SHA
    e5db97d View commit details
  9. terraform: 0.12.13 -> 0.12.14 (#73393)

    update terraform to it's latest version
    babariviere authored and zimbatm committed Nov 14, 2019

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    nyanloutre Paul TREHIOU
    Copy the full SHA
    136c6c1 View commit details
  10. conmon: v2.0.2 -> v2.0.3

    Signed-off-by: Sascha Grunert <sgrunert@suse.com>
    saschagrunert authored and FRidh committed Nov 14, 2019

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    nyanloutre Paul TREHIOU
    Copy the full SHA
    08fa83c View commit details
  11. Merge pull request #73369 from JohnAZoidberg/argp-standalone-cross

    argp-standalone: Find ar when cross compiling
    c0bw3b authored Nov 14, 2019

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    nyanloutre Paul TREHIOU
    Copy the full SHA
    5b57dd5 View commit details
  12. Merge pull request #70507 from sikmir/qtpbfimageplugin

    qtpbfimageplugin: 1.4 -> 2.0
    c0bw3b authored Nov 14, 2019

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    nyanloutre Paul TREHIOU
    Copy the full SHA
    ab39782 View commit details
  13. python3.pkgs.authlib: init at 0.13

    Co-authored-by: Jonathan Ringer <jonringer117@gmail.com>
    flokli and Jonathan Ringer committed Nov 14, 2019
    Copy the full SHA
    b64034e View commit details
1 change: 1 addition & 0 deletions nixos/modules/module-list.nix
Original file line number Diff line number Diff line change
@@ -316,6 +316,7 @@
./services/development/bloop.nix
./services/development/hoogle.nix
./services/development/jupyter/default.nix
./services/development/lorri.nix
./services/editors/emacs.nix
./services/editors/infinoted.nix
./services/games/factorio.nix
45 changes: 45 additions & 0 deletions nixos/modules/services/development/lorri.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
{ config, lib, pkgs, ... }:

let
cfg = config.services.lorri;
socketPath = "lorri/daemon.socket";
in {
options = {
services.lorri = {
enable = lib.mkOption {
default = false;
type = lib.types.bool;
description = ''
Enables the daemon for `lorri`, a nix-shell replacement for project
development. The socket-activated daemon starts on the first request
issued by the `lorri` command.
'';
};
};
};

config = lib.mkIf cfg.enable {
systemd.user.sockets.lorri = {
description = "Socket for Lorri Daemon";
wantedBy = [ "sockets.target" ];
socketConfig = {
ListenStream = "%t/${socketPath}";
RuntimeDirectory = "lorri";
};
};

systemd.user.services.lorri = {
description = "Lorri Daemon";
requires = [ "lorri.socket" ];
after = [ "lorri.socket" ];
path = with pkgs; [ config.nix.package gnutar gzip ];
serviceConfig = {
ExecStart = "${pkgs.lorri}/bin/lorri daemon";
PrivateTmp = true;
ProtectSystem = "strict";
ProtectHome = "read-only";
Restart = "on-failure";
};
};
};
}
1 change: 1 addition & 0 deletions nixos/tests/all-tests.nix
Original file line number Diff line number Diff line change
@@ -147,6 +147,7 @@ in
login = handleTest ./login.nix {};
loki = handleTest ./loki.nix {};
#logstash = handleTest ./logstash.nix {};
lorri = handleTest ./lorri/default.nix {};
mailcatcher = handleTest ./mailcatcher.nix {};
mathics = handleTest ./mathics.nix {};
matomo = handleTest ./matomo.nix {};
3 changes: 3 additions & 0 deletions nixos/tests/lorri/builder.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
#!/bin/sh

printf "%s" "${name:?}" > "${out:?}"
26 changes: 26 additions & 0 deletions nixos/tests/lorri/default.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
import ../make-test-python.nix {
machine = { pkgs, ... }: {
imports = [ ../../modules/profiles/minimal.nix ];
environment.systemPackages = [ pkgs.lorri ];
};

testScript = ''
# Copy files over
machine.succeed(
"cp '${./fake-shell.nix}' shell.nix"
)
machine.succeed(
"cp '${./builder.sh}' builder.sh"
)
# Start the daemon and wait until it is ready
machine.execute("lorri daemon > lorri.stdout 2> lorri.stderr &")
machine.wait_until_succeeds("grep --fixed-strings 'lorri: ready' lorri.stdout")
# Ping the daemon
machine.execute("lorri ping_ $(readlink -f shell.nix)")
# Wait for the daemon to finish the build
machine.wait_until_succeeds("grep --fixed-strings 'OutputPaths' lorri.stdout")
'';
}
5 changes: 5 additions & 0 deletions nixos/tests/lorri/fake-shell.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
derivation {
system = builtins.currentSystem;
name = "fake-shell";
builder = ./builder.sh;
}
107 changes: 61 additions & 46 deletions pkgs/applications/networking/cluster/terraform/default.nix
Original file line number Diff line number Diff line change
@@ -1,28 +1,20 @@
{ stdenv
, lib
, buildEnv
, buildGoPackage
, fetchFromGitHub
, makeWrapper
, runCommand
, writeText
, terraform-providers
}:
{ stdenv, lib, buildEnv, buildGoPackage, fetchFromGitHub, makeWrapper
, runCommand, writeText, terraform-providers }:

let
goPackagePath = "github.com/hashicorp/terraform";

generic = { version, sha256, ... }@attrs:
let attrs' = builtins.removeAttrs attrs ["version" "sha256"]; in
buildGoPackage ({
let attrs' = builtins.removeAttrs attrs [ "version" "sha256" ];
in buildGoPackage ({
name = "terraform-${version}";

inherit goPackagePath;

src = fetchFromGitHub {
owner = "hashicorp";
repo = "terraform";
rev = "v${version}";
owner = "hashicorp";
repo = "terraform";
rev = "v${version}";
inherit sha256;
};

@@ -40,10 +32,17 @@ let
'';

meta = with stdenv.lib; {
description = "Tool for building, changing, and versioning infrastructure";
homepage = https://www.terraform.io/;
description =
"Tool for building, changing, and versioning infrastructure";
homepage = "https://www.terraform.io/";
license = licenses.mpl20;
maintainers = with maintainers; [ zimbatm peterhoeg kalbasit marsam ];
maintainers = with maintainers; [
zimbatm
peterhoeg
kalbasit
marsam
babariviere
];
};
} // attrs');

@@ -54,38 +53,54 @@ let
actualPlugins = plugins terraform.plugins;

# Wrap PATH of plugins propagatedBuildInputs, plugins may have runtime dependencies on external binaries
wrapperInputs = lib.unique (lib.flatten (lib.catAttrs "propagatedBuildInputs" (builtins.filter (x: x != null) actualPlugins)));
wrapperInputs = lib.unique (lib.flatten
(lib.catAttrs "propagatedBuildInputs"
(builtins.filter (x: x != null) actualPlugins)));

passthru = {
withPlugins = newplugins: withPlugins (x: newplugins x ++ actualPlugins);
withPlugins = newplugins:
withPlugins (x: newplugins x ++ actualPlugins);
full = withPlugins lib.attrValues;

# Ouch
overrideDerivation = f: (pluggable (terraform.overrideDerivation f)).withPlugins plugins;
overrideAttrs = f: (pluggable (terraform.overrideAttrs f)).withPlugins plugins;
override = x: (pluggable (terraform.override x)).withPlugins plugins;
overrideDerivation = f:
(pluggable (terraform.overrideDerivation f)).withPlugins plugins;
overrideAttrs = f:
(pluggable (terraform.overrideAttrs f)).withPlugins plugins;
override = x:
(pluggable (terraform.override x)).withPlugins plugins;
};
in
# Don't bother wrapping unless we actually have plugins, since the wrapper will stop automatic downloading
# of plugins, which might be counterintuitive if someone just wants a vanilla Terraform.
if actualPlugins == []
then terraform.overrideAttrs (orig: { passthru = orig.passthru // passthru; })
else lib.appendToName "with-plugins"(stdenv.mkDerivation {
inherit (terraform) name;
buildInputs = [ makeWrapper ];

buildCommand = ''
mkdir -p $out/bin/
makeWrapper "${terraform.bin}/bin/terraform" "$out/bin/terraform" \
--set NIX_TERRAFORM_PLUGIN_DIR "${buildEnv { name = "tf-plugin-env"; paths = actualPlugins; }}/bin" \
--prefix PATH : "${lib.makeBinPath wrapperInputs}"
'';

inherit passthru;
});
in withPlugins (_: []);

plugins = removeAttrs terraform-providers ["override" "overrideDerivation" "recurseForDerivations"];
in if actualPlugins == [ ] then
terraform.overrideAttrs
(orig: { passthru = orig.passthru // passthru; })
else
lib.appendToName "with-plugins" (stdenv.mkDerivation {
inherit (terraform) name;
buildInputs = [ makeWrapper ];

buildCommand = ''
mkdir -p $out/bin/
makeWrapper "${terraform.bin}/bin/terraform" "$out/bin/terraform" \
--set NIX_TERRAFORM_PLUGIN_DIR "${
buildEnv {
name = "tf-plugin-env";
paths = actualPlugins;
}
}/bin" \
--prefix PATH : "${lib.makeBinPath wrapperInputs}"
'';

inherit passthru;
});
in withPlugins (_: [ ]);

plugins = removeAttrs terraform-providers [
"override"
"overrideDerivation"
"recurseForDerivations"
];
in rec {
terraform_0_11 = pluggable (generic {
version = "0.11.14";
@@ -97,8 +112,8 @@ in rec {
terraform_0_11-full = terraform_0_11.full;

terraform_0_12 = pluggable (generic {
version = "0.12.13";
sha256 = "11nbr9avw6jx349jdmxgxiawk8i5mpw3p4rrl89yly0wfhg0fh4a";
version = "0.12.14";
sha256 = "0pq4sfnnlj91gxyxvyzzrgglnvh8xpan90gnc9jvnnb23iv4q96l";
patches = [ ./provider-path.patch ];
passthru = { inherit plugins; };
});
@@ -112,8 +127,8 @@ in rec {
resource "random_id" "test" {}
'';
terraform = terraform_0_11.withPlugins (p: [ p.random ]);
test = runCommand "terraform-plugin-test" { buildInputs = [terraform]; }
''
test =
runCommand "terraform-plugin-test" { buildInputs = [ terraform ]; } ''
set -e
# make it fail outside of sandbox
export HTTP_PROXY=http://127.0.0.1:0 HTTPS_PROXY=https://127.0.0.1:0
Original file line number Diff line number Diff line change
@@ -59,7 +59,7 @@ let

in stdenv.mkDerivation rec {
pname = "signal-desktop";
version = "1.27.4"; # Please backport all updates to the stable channel.
version = "1.28.0"; # Please backport all updates to the stable channel.
# All releases have a limited lifetime and "expire" 90 days after the release.
# When releases "expire" the application becomes unusable until an update is
# applied. The expiration date for the current release can be extracted with:
@@ -69,7 +69,7 @@ in stdenv.mkDerivation rec {

src = fetchurl {
url = "https://updates.signal.org/desktop/apt/pool/main/s/signal-desktop/signal-desktop_${version}_amd64.deb";
sha256 = "1aza1s70xzx9qkv7b5mpfi4zgdn5dq3rl03lx3jixij3x3pxg5sj";
sha256 = "14cd635fax99l5jk70jy0mjnvw01b0gbv666szc4ajamm36l2bkr";
};

phases = [ "unpackPhase" "installPhase" ];
4 changes: 2 additions & 2 deletions pkgs/applications/virtualization/conmon/default.nix
Original file line number Diff line number Diff line change
@@ -9,13 +9,13 @@
stdenv.mkDerivation rec {
project = "conmon";
name = "${project}-${version}";
version = "2.0.2";
version = "2.0.3";

src = fetchFromGitHub {
owner = "containers";
repo = project;
rev = "v${version}";
sha256 = "1ha5vhjlb12kshh0j1vpl1vjk8ym9w2j1x762y6zdspkdha1w3dv";
sha256 = "0xsirdsgq84bsjb1xgzv3pnjhm9l13vwj79zd8rjdd7p28wsxb0y";
};

nativeBuildInputs = [ pkgconfig ];
5 changes: 3 additions & 2 deletions pkgs/development/libraries/arb/default.nix
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
{stdenv, fetchFromGitHub, mpir, gmp, mpfr, flint}:
stdenv.mkDerivation rec {
pname = "arb";
version = "2.16.0";
version = "2.17.0";
src = fetchFromGitHub {
owner = "fredrik-johansson";
repo = pname;
rev = version;
sha256 = "0478671wfwy3gl26sbxh1jq1ih36z4k72waa8y2y2lvn649gb7cd";
sha256 = "05lpy3hkl5f8ik19aw40cqydrb932xaf2n8hbq9ib5dnk7f010p1";
};
buildInputs = [mpir gmp mpfr flint];
configureFlags = [
@@ -19,6 +19,7 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
inherit version;
description = ''A library for arbitrary-precision interval arithmetic'';
homepage = "http://arblib.org/";
license = stdenv.lib.licenses.lgpl21Plus;
maintainers = with maintainers; [ raskin timokau ];
platforms = stdenv.lib.platforms.unix;
2 changes: 2 additions & 0 deletions pkgs/development/libraries/argp-standalone/default.nix
Original file line number Diff line number Diff line change
@@ -43,6 +43,8 @@ stdenv.mkDerivation {

doCheck = true;

makeFlags = [ "AR:=$(AR)" ];

enableParallelBuilding = true;

meta = with stdenv.lib; {
8 changes: 4 additions & 4 deletions pkgs/development/libraries/qtpbfimageplugin/default.nix
Original file line number Diff line number Diff line change
@@ -2,13 +2,13 @@

stdenv.mkDerivation rec {
pname = "qtpbfimageplugin";
version = "1.4";
version = "2.0";

src = fetchFromGitHub {
owner = "tumic0";
repo = "QtPBFImagePlugin";
rev = version;
sha256 = "0d39i7rmhrmm2df49gd47zm37gnz3fmyr6hfc6hhzvk08jb6956r";
sha256 = "16qsax1p09gldbg83df77ixaz7bkxl8wm806lc55y19pwnid9m7p";
};

nativeBuildInputs = [ qmake ];
@@ -31,9 +31,9 @@ stdenv.mkDerivation rec {
displaying raster MBTiles maps or raster XYZ online maps to also display PBF
vector tiles without (almost) any application modifications.
'';
homepage = https://github.com/tumic0/QtPBFImagePlugin;
homepage = "https://github.com/tumic0/QtPBFImagePlugin";
license = licenses.lgpl3;
maintainers = [ maintainers.sikmir ];
maintainers = with maintainers; [ sikmir ];
platforms = platforms.unix;
};
}
35 changes: 35 additions & 0 deletions pkgs/development/python-modules/authlib/default.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
{ stdenv
, buildPythonPackage
, fetchFromGitHub
, pytest
, mock
, cryptography
, requests
}:

buildPythonPackage rec {
version = "0.13";
pname = "authlib";

src = fetchFromGitHub {
owner = "lepture";
repo = "authlib";
rev = "v${version}";
sha256 = "1nv0jbsaqr9qjn7nnl55s42iyx655k7fsj8hs69652lqnfn5y3d5";
};

propagatedBuildInputs = [ cryptography requests ];

checkInputs = [ mock pytest ];

checkPhase = ''
PYTHONPATH=$PWD:$PYTHONPATH pytest tests/{core,files}
'';

meta = with stdenv.lib; {
homepage = https://github.com/lepture/authlib;
description = "The ultimate Python library in building OAuth and OpenID Connect servers. JWS,JWE,JWK,JWA,JWT included.";
maintainers = with maintainers; [ flokli ];
license = licenses.bsd3;
};
}
Loading