Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: aa440d87866d
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 0c6fb79dd70d
Choose a head ref

Commits on Apr 5, 2019

  1. nixos/printing: fix CUPS SetEnv directive placement

    With CUPS v2.3b5, the configuration directive `SetEnv`
    moved from `cupsd.conf` to `cups-files.conf`.  See also
    apple/cups@d47f6ae .
    
    We have to follow up as `SetEnv` is now ignored in `cupsd.conf`.
    Without this, executables called by cups
    can't find other executables they depend on,
    like `gs` or `perl`.
    Yarny0 committed Apr 5, 2019
    Copy the full SHA
    631c71d View commit details

Commits on May 5, 2019

  1. Copy the full SHA
    4588661 View commit details

Commits on May 7, 2019

  1. nixos/plasma5: Remove phonon-backend-gstreamer pinned to Qt 5.6

    Adds closure size for seemingly no reason
    adisbladis committed May 7, 2019
    Copy the full SHA
    d5887ec View commit details

Commits on May 13, 2019

  1. nixos/desktop-managers: let them work when 'services.xserver.enable =…

    … false'
    
    they can be used by remote desktop software, without X11 running locally
    volth committed May 13, 2019
    Copy the full SHA
    ac6875d View commit details
  2. Copy the full SHA
    b51aae1 View commit details

Commits on May 20, 2019

  1. Copy the full SHA
    bec3cfa View commit details
  2. Copy the full SHA
    d0c125a View commit details
  3. Copy the full SHA
    1191069 View commit details
  4. Copy the full SHA
    ba96e40 View commit details

Commits on May 24, 2019

  1. mautrix-telegram: patch away alembic dependency

    `alembic`[1] is a database migration tool which is invoked from the CLI
    when installing the telegram bridge, but never needed during the
    runtime.
    
    The reason why `alembic` is required here is to ensure that it
    exists in the Python environment when deploying the bridge. However
    `alembic` requires `mautrix-telegram` in its environment to create a
    database schema from the Python models.
    
    Such a dependency relation may be possible with tools like virtualenv,
    however it'll result in an infinite recursion at evaluation time in Nix.
    
    With this patch, `mautrix-telegram` doesn't depend on `alembic` anymore
    and provides a patched alembic (`pkgs.mautrix-telegram.alembic`) which
    has `mautrix-telegram` in its path.
    
    [1] https://alembic.sqlalchemy.org/en/latest/
    Ma27 committed May 24, 2019
    Copy the full SHA
    0a94f89 View commit details

Commits on May 28, 2019

  1. Copy the full SHA
    c9d1a0d View commit details

Commits on May 29, 2019

  1. firejail: 0.9.58.2 -> 0.9.60

    dtzWill committed May 29, 2019
    Copy the full SHA
    aadd2a6 View commit details
  2. mno16: init at 1.0

    dtzWill committed May 29, 2019
    Copy the full SHA
    f0f6972 View commit details
  3. agave: 009 -> v10

    dtzWill committed May 29, 2019
    Copy the full SHA
    94b155a View commit details
  4. dedup: 1.0 -> 2.0

    Update deps, enable tests.
    dtzWill committed May 29, 2019
    Copy the full SHA
    7d4bfca View commit details
  5. rofi-pass: refactor add new optional dependency pass-otp

    Rofi-pass as of a year ago added support for OTP passwords. This
    dependency is "optional" but extremely nice to have as a default.
    
    https://github.com/carnager/rofi-pass#requirements
    costrouc committed May 29, 2019
    Copy the full SHA
    2623df3 View commit details

Commits on May 30, 2019

  1. nixos/malloc: apply allocator settings to systemd units

    This uses systemd's system.conf/user.conf "DefaultEnvironment" feature
    to set the allocator's LD_PRELOAD near-globally.
    delroth committed May 30, 2019
    Copy the full SHA
    9e60eab View commit details
  2. Copy the full SHA
    63fd414 View commit details
  3. Merge pull request #61116 from mmlb/add-gitstatus

    gitAndTools.gitstatus: init at 20190506
    nlewo authored May 30, 2019
    Copy the full SHA
    3213c6c View commit details
  4. Merge pull request #62199 from dtzWill/update/dedup-2.0

    dedup: 1.0 -> 2.0
    Ma27 authored May 30, 2019
    Copy the full SHA
    65a73e0 View commit details
  5. datadog-agent: fix sha256 sum

    Izorkin committed May 30, 2019
    Copy the full SHA
    0ed2f02 View commit details
  6. Merge pull request #62218 from costrouc/rofi-pass-new-dependency

    rofi-pass: refactor add new optional dependency pass-otp
    Ma27 authored May 30, 2019
    Copy the full SHA
    479d161 View commit details
  7. Merge pull request #62238 from delroth/hardened-alloc-systemwide

    nixos/malloc: apply allocator settings to systemd units
    joachifm authored May 30, 2019
    Copy the full SHA
    b0500aa View commit details
  8. Merge pull request #59519 from Ma27/improve-mautrix-telegram

    mautrix-telegram: patch away alembic dependency
    Ma27 authored May 30, 2019
    Copy the full SHA
    5949838 View commit details
  9. Copy the full SHA
    7530108 View commit details
  10. Copy the full SHA
    205e488 View commit details
  11. Copy the full SHA
    198afad View commit details
  12. Copy the full SHA
    144a031 View commit details
  13. Merge pull request #62250 from Mic92/ccls

    ccls: 0.20190301 -> 0.20190314.1
    Mic92 authored May 30, 2019
    Copy the full SHA
    ecb9930 View commit details
  14. firefoxPackages.tor-browser: 8.0.9 -> 8.5.0

    Actually, more like -> 8.5.0.1 as this version is made against the
    branch with the pending fixup patch applied.
    SLNOS authored and oxij committed May 30, 2019
    Copy the full SHA
    c4962cd View commit details
  15. chrootenv: make stackable

    The problem with stacking chrootenv before was that CLONE_NEWUSER cannot
    be used when a child uses chroot. So instead of that we use pivot_root
    which replaces root in the whole namespace. This requires our new root
    to be an actual fs so we mount tmpfs.
    abbradar committed May 30, 2019
    Copy the full SHA
    e0d3bc2 View commit details
  16. chrootenv: small improvements

    * Remove unused argument from pivot_root;
    * Factor out tmpdir creation into a separate function;
    * Remove unused fstype from bind mount;
    * Use unlink instead of a treewalk to remove empty temporary directory.
    abbradar committed May 30, 2019
    Copy the full SHA
    7664ffb View commit details
  17. chrootenv: propagate nested chrootenv /host

    To avoid symlink loops to /host in nested chrootenvs we need to remove
    one level of indirection. This is also what's generally expected of
    /host contents.
    abbradar committed May 30, 2019
    Copy the full SHA
    06f27dc View commit details
  18. murmur service: log to journald by default

    Save an option to log to file with new `logFile` option.
    
    As a side effect deprecate `pidfile` option and instead use systemd's
    RuntimeDirectory.
    abbradar committed May 30, 2019
    Copy the full SHA
    f23c110 View commit details
  19. Merge pull request #61740 from abbradar/nested-chrootenv

    Support nested user chrootenv environments
    abbradar authored May 30, 2019
    Copy the full SHA
    6723d59 View commit details
  20. Merge pull request #62257 from oxij/pkgs/tor-browser-85

    firefoxPackages.tor-browser: 8.0.9 -> 8.5.0
    joachifm authored May 30, 2019
    Copy the full SHA
    b5ca236 View commit details
  21. Merge pull request #62246 from Izorkin/fix-datadog

    datadog-agent: fix sha256 sum
    marsam authored May 30, 2019
    Copy the full SHA
    0ced576 View commit details
  22. Merge pull request #59076 from Yarny0/cups-path-fix

    nixos/printing: fix CUPS `SetEnv` directive placement
    matthewbauer authored May 30, 2019
    Copy the full SHA
    38fdc9f View commit details
  23. Copy the full SHA
    2c074fc View commit details
  24. Copy the full SHA
    f093847 View commit details
  25. Merge pull request #61423 from volth/de-xrdp

    nixos/desktop-managers: let them work when 'services.xserver.enable = false'
    matthewbauer authored May 30, 2019
    Copy the full SHA
    b64b2b5 View commit details
  26. Merge pull request #61104 from adisbladis/plasma5-no-qt56

    nixos/plasma5: Remove phonon-backend-gstreamer pinned to Qt 5.6
    matthewbauer authored May 30, 2019
    Copy the full SHA
    a472b14 View commit details
  27. thefuck: 3.28 -> 3.29

    Synthetica9 committed May 30, 2019
    Copy the full SHA
    5f20b10 View commit details
  28. Merge pull request #62264 from Synthetica9/thefuck329

    thefuck: 3.28 -> 3.29
    Ma27 authored May 30, 2019
    Copy the full SHA
    19195b2 View commit details

Commits on May 31, 2019

  1. python37Packages.eve: 0.8.1 -> 0.9

    Semi-automatic update generated by
    https://github.com/ryantm/nixpkgs-update tools. This update was made
    based on information from
    https://repology.org/metapackage/python3.7-eve/versions
    r-ryantm authored and marsam committed May 31, 2019
    Copy the full SHA
    14cf7cf View commit details
  2. Merge pull request #61896 from r-ryantm/auto-update/python3.7-Eve

    python37Packages.eve: 0.8.1 -> 0.9
    marsam authored May 31, 2019
    Copy the full SHA
    d0ad25a View commit details
  3. crystal_0_26: fix hash

    hash has been changed since initial commit:
    
    https://hydra.nixos.org/build/93668775
    matthewbauer committed May 31, 2019
    Copy the full SHA
    67abc01 View commit details
  4. Merge pull request #62197 from dtzWill/update/agave-10

    agave: 009 -> v10
    dtzWill authored May 31, 2019
    Copy the full SHA
    a5d19a2 View commit details
  5. Merge pull request #62195 from dtzWill/update/mno-1.0

    mno16: init at 1.0
    dtzWill authored May 31, 2019
    Copy the full SHA
    9a0cc07 View commit details
  6. Merge pull request #62186 from dtzWill/update/firejail-0.9.60

    firejail: 0.9.58.2 -> 0.9.60
    dtzWill authored May 31, 2019
    Copy the full SHA
    8bc2cb9 View commit details
Showing with 481 additions and 126 deletions.
  1. +2 −0 nixos/modules/config/malloc.nix
  2. +2 −1 nixos/modules/rename.nix
  3. +12 −16 nixos/modules/services/networking/murmur.nix
  4. +4 −0 nixos/modules/services/networking/networkmanager.nix
  5. +2 −2 nixos/modules/services/printing/cupsd.nix
  6. +5 −5 nixos/modules/services/x11/desktop-managers/enlightenment.nix
  7. +1 −1 nixos/modules/services/x11/desktop-managers/lumina.nix
  8. +1 −1 nixos/modules/services/x11/desktop-managers/lxqt.nix
  9. +1 −1 nixos/modules/services/x11/desktop-managers/mate.nix
  10. +1 −1 nixos/modules/services/x11/desktop-managers/maxx.nix
  11. +1 −2 nixos/modules/services/x11/desktop-managers/plasma5.nix
  12. +1 −1 nixos/modules/services/x11/desktop-managers/xterm.nix
  13. +1 −2 nixos/modules/services/x11/xserver.nix
  14. +2 −1 pkgs/applications/editors/neovim/default.nix
  15. +7 −7 pkgs/applications/networking/browsers/firefox/packages.nix
  16. +2 −2 pkgs/applications/networking/browsers/vivaldi/default.nix
  17. +2 −0 pkgs/applications/version-management/git-and-tools/default.nix
  18. +30 −0 pkgs/applications/version-management/git-and-tools/gitstatus/default.nix
  19. +19 −0 pkgs/applications/version-management/git-and-tools/gitstatus/romkatv_libgit2.nix
  20. +50 −37 pkgs/build-support/build-fhs-userenv/chrootenv/chrootenv.c
  21. +2 −2 pkgs/data/fonts/agave/default.nix
  22. +21 −0 pkgs/data/fonts/mno16/default.nix
  23. +7 −4 pkgs/desktops/gnome-3/apps/gnome-todo/default.nix
  24. +1 −1 pkgs/development/compilers/crystal/default.nix
  25. +62 −0 pkgs/development/python-modules/accupy/default.nix
  26. +6 −4 pkgs/development/python-modules/eve/default.nix
  27. +45 −0 pkgs/development/python-modules/perfplot/default.nix
  28. +40 −0 pkgs/development/python-modules/pipdate/default.nix
  29. +41 −0 pkgs/development/python-modules/pyfma/default.nix
  30. +37 −0 pkgs/development/python-modules/pysptk/default.nix
  31. +2 −2 pkgs/development/python-modules/salmon-mail/default.nix
  32. +6 −3 pkgs/development/tools/misc/ccls/default.nix
  33. +0 −1 pkgs/development/tools/rust/rustfmt/default.nix
  34. +4 −4 pkgs/development/tools/skaffold/default.nix
  35. +3 −4 pkgs/os-specific/linux/firejail/default.nix
  36. +19 −3 pkgs/servers/mautrix-telegram/default.nix
  37. +13 −8 pkgs/tools/backup/dedup/default.nix
  38. +2 −2 pkgs/tools/misc/thefuck/default.nix
  39. +1 −2 pkgs/tools/misc/yubikey-manager-qt/default.nix
  40. +7 −0 pkgs/tools/misc/yubikey-manager/default.nix
  41. +1 −1 pkgs/tools/networking/dd-agent/datadog-agent.nix
  42. +1 −1 pkgs/tools/security/pass/rofi-pass.nix
  43. +4 −4 pkgs/top-level/all-packages.nix
  44. +10 −0 pkgs/top-level/python-packages.nix
2 changes: 2 additions & 0 deletions nixos/modules/config/malloc.nix
Original file line number Diff line number Diff line change
@@ -91,5 +91,7 @@ in

config = mkIf (cfg.provider != "libc") {
environment.variables.LD_PRELOAD = providerLibPath;
systemd.extraConfig = "DefaultEnvironment=\"LD_PRELOAD=${providerLibPath}\"";
systemd.user.extraConfig = "DefaultEnvironment=\"LD_PRELOAD=${providerLibPath}\"";
};
}
3 changes: 2 additions & 1 deletion nixos/modules/rename.nix
Original file line number Diff line number Diff line change
@@ -113,9 +113,10 @@ with lib;

# murmur
(mkRenamedOptionModule [ "services" "murmur" "welcome" ] [ "services" "murmur" "welcometext" ])
(mkRemovedOptionModule [ "services" "murmur" "pidfile" ] "Hardcoded to /run/murmur/murmurd.pid now")

# parsoid
(mkRemovedOptionModule [ "services" "parsoid" "interwikis" ] [ "services" "parsoid" "wikis" ])
(mkRemovedOptionModule [ "services" "parsoid" "interwikis" ] "Use services.parsoid.wikis instead")

# plexpy / tautulli
(mkRenamedOptionModule [ "services" "plexpy" ] [ "services" "tautulli" ])
28 changes: 12 additions & 16 deletions nixos/modules/services/networking/murmur.nix
Original file line number Diff line number Diff line change
@@ -4,6 +4,7 @@ with lib;

let
cfg = config.services.murmur;
forking = cfg.logFile != null;
configFile = pkgs.writeText "murmurd.ini" ''
database=/var/lib/murmur/murmur.sqlite
dbDriver=QSQLITE
@@ -12,8 +13,8 @@ let
autobanTimeframe=${toString cfg.autobanTimeframe}
autobanTime=${toString cfg.autobanTime}
logfile=/var/log/murmur/murmurd.log
pidfile=${cfg.pidfile}
logfile=${optionalString (cfg.logFile != null) cfg.logFile}
${optionalString forking "pidfile=/run/murmur/murmurd.pid"}
welcometext="${cfg.welcometext}"
port=${toString cfg.port}
@@ -78,10 +79,11 @@ in
description = "The amount of time an IP ban lasts (in seconds).";
};

pidfile = mkOption {
type = types.path;
default = "/run/murmur/murmurd.pid";
description = "Path to PID file for Murmur daemon.";
logFile = mkOption {
type = types.nullOr types.path;
default = null;
example = "/var/log/murmur/murmurd.log";
description = "Path to the log file for Murmur daemon. Empty means log to journald.";
};

welcometext = mkOption {
@@ -251,19 +253,13 @@ in
after = [ "network-online.target "];

serviceConfig = {
Type = "forking";
RuntimeDirectory = "murmur";
PIDFile = cfg.pidfile;
Restart = "always";
# murmurd doesn't fork when logging to the console.
Type = if forking then "forking" else "simple";
PIDFile = mkIf forking "/run/murmur/murmurd.pid";
RuntimeDirectory = mkIf forking "murmur";
User = "murmur";
ExecStart = "${pkgs.murmur}/bin/murmurd -ini ${configFile}";
PermissionsStartOnly = true;
};

preStart = ''
mkdir -p /var/log/murmur
chown -R murmur /var/log/murmur
'';
};
};
}
4 changes: 4 additions & 0 deletions nixos/modules/services/networking/networkmanager.nix
Original file line number Diff line number Diff line change
@@ -477,6 +477,10 @@ in {
'';
};

systemd.services.NetworkManager-wait-online = {
wantedBy = [ "network-online.target" ];
};

systemd.services.nm-setup-hostsdirs = mkIf dynamicHostsEnabled {
wantedBy = [ "NetworkManager.service" ];
before = [ "NetworkManager.service" ];
4 changes: 2 additions & 2 deletions nixos/modules/services/printing/cupsd.nix
Original file line number Diff line number Diff line change
@@ -60,6 +60,8 @@ let
TempDir ${cfg.tempDir}
SetEnv PATH /var/lib/cups/path/lib/cups/filter:/var/lib/cups/path/bin
# User and group used to run external programs, including
# those that actually send the job to the printer. Note that
# Udev sets the group of printer devices to `lp', so we want
@@ -76,8 +78,6 @@ let
'') cfg.listenAddresses}
Listen /run/cups/cups.sock
SetEnv PATH /var/lib/cups/path/lib/cups/filter:/var/lib/cups/path/bin
DefaultShared ${if cfg.defaultShared then "Yes" else "No"}
Browsing ${if cfg.browsing then "Yes" else "No"}
10 changes: 5 additions & 5 deletions nixos/modules/services/x11/desktop-managers/enlightenment.nix
Original file line number Diff line number Diff line change
@@ -25,7 +25,7 @@ in

};

config = mkIf (xcfg.enable && cfg.enable) {
config = mkIf cfg.enable {

environment.systemPackages = [
e.efl e.enlightenment
@@ -38,10 +38,10 @@ in
pkgs.xorg.xcursorthemes
];

environment.pathsToLink = [
"/etc/enlightenment"
"/share/enlightenment"
"/share/elementary"
environment.pathsToLink = [
"/etc/enlightenment"
"/share/enlightenment"
"/share/elementary"
"/share/locale"
];

2 changes: 1 addition & 1 deletion nixos/modules/services/x11/desktop-managers/lumina.nix
Original file line number Diff line number Diff line change
@@ -21,7 +21,7 @@ in
};


config = mkIf (xcfg.enable && cfg.enable) {
config = mkIf cfg.enable {

services.xserver.desktopManager.session = singleton {
name = "lumina";
2 changes: 1 addition & 1 deletion nixos/modules/services/x11/desktop-managers/lxqt.nix
Original file line number Diff line number Diff line change
@@ -26,7 +26,7 @@ in

};

config = mkIf (xcfg.enable && cfg.enable) {
config = mkIf cfg.enable {

services.xserver.desktopManager.session = singleton {
name = "lxqt";
2 changes: 1 addition & 1 deletion nixos/modules/services/x11/desktop-managers/mate.nix
Original file line number Diff line number Diff line change
@@ -42,7 +42,7 @@ in

};

config = mkIf (xcfg.enable && cfg.enable) {
config = mkIf cfg.enable {

services.xserver.desktopManager.session = singleton {
name = "mate";
2 changes: 1 addition & 1 deletion nixos/modules/services/x11/desktop-managers/maxx.nix
Original file line number Diff line number Diff line change
@@ -10,7 +10,7 @@ in {
enable = mkEnableOption "MaXX desktop environment";
};

config = mkIf (xcfg.enable && cfg.enable) {
config = mkIf cfg.enable {
environment.systemPackages = [ pkgs.maxx ];

# there is hardcoded path in binaries
3 changes: 1 addition & 2 deletions nixos/modules/services/x11/desktop-managers/plasma5.nix
Original file line number Diff line number Diff line change
@@ -36,7 +36,7 @@ in


config = mkMerge [
(mkIf (xcfg.enable && cfg.enable) {
(mkIf cfg.enable {
services.xserver.desktopManager.session = singleton {
name = "plasma5";
bgSupport = true;
@@ -161,7 +161,6 @@ in

qtvirtualkeyboard

libsForQt56.phonon-backend-gstreamer
libsForQt5.phonon-backend-gstreamer

xdg-user-dirs # Update user dirs as described in https://freedesktop.org/wiki/Software/xdg-user-dirs/
2 changes: 1 addition & 1 deletion nixos/modules/services/x11/desktop-managers/xterm.nix
Original file line number Diff line number Diff line change
@@ -19,7 +19,7 @@ in

};

config = mkIf (config.services.xserver.enable && cfg.enable) {
config = mkIf cfg.enable {

services.xserver.desktopManager.session = singleton
{ name = "xterm";
3 changes: 1 addition & 2 deletions nixos/modules/services/x11/xserver.nix
Original file line number Diff line number Diff line change
@@ -347,6 +347,7 @@ in

xkbDir = mkOption {
type = types.path;
default = "${pkgs.xkeyboard_config}/etc/X11/xkb";
description = ''
Path used for -xkbdir xserver parameter.
'';
@@ -708,8 +709,6 @@ in
xorg.xf86inputevdev.out
];

services.xserver.xkbDir = mkDefault "${pkgs.xkeyboard_config}/etc/X11/xkb";

system.extraDependencies = singleton (pkgs.runCommand "xkb-validated" {
inherit (cfg) xkbModel layout xkbVariant xkbOptions;
nativeBuildInputs = [ pkgs.xkbvalidate ];
3 changes: 2 additions & 1 deletion pkgs/applications/editors/neovim/default.nix
Original file line number Diff line number Diff line change
@@ -37,6 +37,7 @@ in
./system_rplugin_manifest.patch
];

dontFixCmake = true;
enableParallelBuilding = true;

buildInputs = [
@@ -76,7 +77,7 @@ in
disallowedReferences = [ stdenv.cc ];

cmakeFlags = [
"-DLUA_PRG=${neovimLuaEnv}/bin/lua"
"-DLUA_PRG=${neovimLuaEnv.interpreter}"
"-DGPERF_PRG=${gperf}/bin/gperf"
]
++ optional doCheck "-DBUSTED_PRG=${neovimLuaEnv}/bin/busted"
14 changes: 7 additions & 7 deletions pkgs/applications/networking/browsers/firefox/packages.nix
Original file line number Diff line number Diff line change
@@ -244,24 +244,24 @@ in rec {
gtk3Support = false;
};

tor-browser-8-0 = tbcommon rec {
ffversion = "60.6.1esr";
tbversion = "8.0.9";
tor-browser-8-5 = tbcommon rec {
ffversion = "60.7.0esr";
tbversion = "8.5.0";

# FIXME: fetchFromGitHub is not ideal, unpacked source is >900Mb
src = fetchFromGitHub {
owner = "SLNOS";
repo = "tor-browser";
# branch "tor-browser-60.6.1esr-8.0-1-r2-slnos"
rev = "d311540ce07f1f4f5e5789f9107f6e6ecc23988d";
sha256 = "0nz8vxv53vnqyk3ahakrr5xg6sgapvlmsb6s1pwwsb86fxk6pm5f";
# branch "tor-browser-60.7.0esr-8.5-1-slnos"
rev = "8c69066856962116205c5c7508a0991dfb8ccd11";
sha256 = "1dshn7g9y6233vdqidrkg886ad6qjnl13vz2382ymbx180r2j73k";
};

patches = [
missing-documentation-patch
];
};

tor-browser = tor-browser-8-0;
tor-browser = tor-browser-8-5;

})
4 changes: 2 additions & 2 deletions pkgs/applications/networking/browsers/vivaldi/default.nix
Original file line number Diff line number Diff line change
@@ -16,11 +16,11 @@ let
vivaldiName = if isSnapshot then "vivaldi-snapshot" else "vivaldi";
in stdenv.mkDerivation rec {
pname = "vivaldi";
version = "2.5.1525.46-1";
version = "2.5.1525.48-1";

src = fetchurl {
url = "https://downloads.vivaldi.com/${branch}/vivaldi-${branch}_${version}_amd64.deb";
sha256 = "0hxmpd4j1cq4643x17syzqxfxki6jngvf28jd71pp58hngffh3g4";
sha256 = "19izljczg22cvymfim97x48fnxbdfql9ik5ixrs990zxq65hznzn";
};

unpackPhase = ''
Original file line number Diff line number Diff line change
@@ -127,6 +127,8 @@ let

gitflow = callPackage ./gitflow { };

gitstatus = callPackage ./gitstatus { };

grv = callPackage ./grv { };

hub = callPackage ./hub {
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
{callPackage, stdenv, fetchFromGitHub, ...}:

stdenv.mkDerivation rec {
pname = "gitstatus";
version = "unstable-2019-05-06";

src = fetchFromGitHub {
owner = "romkatv";
repo = "gitstatus";
rev = "9c791f93c23c04dadfab8b4309a863b62a6ee424";
sha256 = "0jbdrgl62x6j920h72n2q6304fb6gdgnmllpv4aa76m13b9qhgq6";
};

buildInputs = [ (callPackage ./romkatv_libgit2.nix {}) ];
patchPhase = ''
sed -i "s|local daemon.*|local daemon=$out/bin/gitstatusd|" gitstatus.plugin.zsh
'';
installPhase = ''
install -Dm755 gitstatusd $out/bin/gitstatusd
install -Dm444 gitstatus.plugin.zsh $out
'';

meta = with stdenv.lib; {
description = "10x faster implementation of `git status` command";
homepage = https://github.com/romkatv/gitstatus;
license = [ licenses.gpl3 ];

maintainers = [ maintainers.mmlb ];
};
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
{fetchFromGitHub, libgit2_0_27, ...}:

libgit2_0_27.overrideAttrs (oldAttrs: rec {
cmakeFlags = oldAttrs.cmakeFlags ++ [
"-DUSE_BUNDLED_ZLIB=ON"
"-DUSE_ICONV=OFF"
"-DBUILD_CLAR=OFF"
"-DUSE_SSH=OFF"
"-DUSE_HTTPS=OFF"
"-DBUILD_SHARED_LIBS=OFF"
"-DUSE_EXT_HTTP_PARSER=OFF"
];
src = fetchFromGitHub {
owner = "romkatv";
repo = "libgit2";
rev = "aab6c56e6766fa752bef00c745067d875925fc89";
sha256 = "1yqqhpi5xi6s86411sixw4yq5c6n2v8pdh447c8b7q5lfc089lvl";
};
})
Loading