Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 4d1abc44199c
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 5e7bf8c5e9da
Choose a head ref

Commits on Sep 28, 2018

  1. added dysinger as a maintainer

    Signed-off-by: Tim Dysinger <tim@dysinger.net>
    dysinger committed Sep 28, 2018
    Copy the full SHA
    f030011 View commit details

Commits on Sep 30, 2018

  1. nixos/systemd: remove activation dependency

    As far as I can tell, the systemd snippet hasn't depended on groups
    being initialized since 5d02c02 in
    2015, when a `setfacl` call was removed.
    jameysharp committed Sep 30, 2018
    Copy the full SHA
    f449242 View commit details
  2. nixos/stage-2: create empty machine-id at boot

    Previously, the activation script was responsible for ensuring that
    /etc/machine-id exists. However, the only time it could not already
    exist is during stage-2-init, not while switching configurations,
    because one of the first things systemd does when starting up as PID 1
    is to create this file. So I've moved the initialization to
    stage-2-init.
    
    Furthermore, since systemd will do the equivalent of
    systemd-machine-id-setup if /etc/machine-id doesn't have valid contents,
    we don't need to do that ourselves.
    
    We _do_, however, want to ensure that the file at least exists, because
    systemd also uses the non-existence of this file to guess that this is a
    first-boot situation. In that case, systemd tries to create some
    symlinks in /etc/systemd/system according to its presets, which it can't
    do because we've already populated /etc according to the current NixOS
    configuration.
    
    This is not necessary for any other activation script snippets, so it's
    okay to do it after stage-2-init runs the activation script. None of
    them declare a dependency on the "systemd" snippet. Also, most of them
    only create files or directories in ways that obviously don't need the
    machine-id set.
    jameysharp committed Sep 30, 2018
    Copy the full SHA
    8d40083 View commit details
  3. nixos/systemd: let journald create /var/log/journal

    The default value for journald's Storage option is "auto", which
    determines whether to log to /var/log/journal based on whether that
    directory already exists. So NixOS has been unconditionally creating
    that directory in activation scripts.
    
    However, we can get the same behavior by configuring journald.conf to
    set Storage to "persistent" instead. In that case, journald will create
    the directory itself if necessary.
    jameysharp committed Sep 30, 2018
    Copy the full SHA
    10e8650 View commit details
  4. nixos/systemd: don't create /var/lib/udev

    As far as I can tell, systemd has never used this directory, so I think
    this is a holdover from before udev merged into systemd.
    jameysharp committed Sep 30, 2018
    Copy the full SHA
    bbc0f6f View commit details
  5. nixos/polkit: use tmpfiles to clean old dirs

    These don't need to get cleaned up during activation; that can wait
    until systemd-tmpfiles-setup runs.
    jameysharp committed Sep 30, 2018
    Copy the full SHA
    ae3d3b0 View commit details
  6. nixos/activation: don't create /run/nix

    Nix 2.0 no longer uses these directories.
    
    /run/nix/current-load was moved to /nix/var/nix/current-load in 2017
    (Nix commit d7653dfc6dea076ecbe00520c6137977e0fced35). Anyway,
    src/build-remote/build-remote.cc will create the current-load directory
    if it doesn't exist already.
    
    /run/nix/remote-stores seems to have been deprecated since 2014 (Nix
    commit b1af336132cfe8a6e4c54912cc512f8c28d4ebf3) when the documentation
    for $NIX_OTHER_STORES was removed, and support for it was dropped
    entirely in 2016 (Nix commit 4494000e04122f24558e1436e66d20d89028b4bd).
    jameysharp committed Sep 30, 2018
    Copy the full SHA
    dab5c63 View commit details
  7. nixos/opengl: create /run/opengl-driver using tmpfiles.d

    Anything that uses OpenGL starts after sysinit.target, so
    systemd-tmpfiles runs before anything that needs these symlinks.
    jameysharp committed Sep 30, 2018
    Copy the full SHA
    188bdfb View commit details
  8. nixos/pam: create wtmp/lastlog iff using pam_lastlog

    I think pam_lastlog is the only thing that writes to these files in
    practice on a modern Linux system, so in a configuration that doesn't
    use that module, we don't need to create these files.
    
    I used tmpfiles.d instead of activation snippets to create the logs.
    It's good enough for upstream and other distros; it's probably good
    enough for us.
    jameysharp committed Sep 30, 2018
    Copy the full SHA
    b63f65a View commit details

Commits on Oct 2, 2018

  1. jetbrains: add libnotify to wrapper to enable notifications

    Philipp Middendorf committed Oct 2, 2018
    Copy the full SHA
    0b2f2f3 View commit details
  2. jshint: depend on phantomjs2

    Philipp Middendorf committed Oct 2, 2018
    Copy the full SHA
    22e9c0a View commit details
  3. Copy the full SHA
    2671acc View commit details
  4. unifiStable: 5.8.28 -> 5.8.30

    bachp committed Oct 2, 2018
    Copy the full SHA
    9cab954 View commit details
  5. unifiTesting: 5.9.22 -> 5.9.29

    bachp committed Oct 2, 2018
    Copy the full SHA
    8fa7b89 View commit details
  6. twa: 1.3.1 -> 1.5.1

    kalbasit committed Oct 2, 2018
    Copy the full SHA
    82b5887 View commit details
  7. Merge pull request #47563 from jameysharp/unscripted

    Replace several activation script snippets with declarative configuration
    Mic92 authored Oct 2, 2018
    Copy the full SHA
    b12c759 View commit details
  8. Merge pull request #47666 from plapadoo/jshint-phantomjs

    jshint: depend on phantomjs2
    Mic92 authored Oct 2, 2018
    Copy the full SHA
    4c5b6d6 View commit details
  9. Copy the full SHA
    9b08685 View commit details
  10. i3lock-color: 2.11-c -> 2.12.c (#47674)

    Note the change in naming scheme, this is intentional
    (Raymo111/i3lock-color#92)
    Synthetica9 authored and xeji committed Oct 2, 2018
    Copy the full SHA
    fbf55e9 View commit details
  11. Merge pull request #47675 from kalbasit/nixpkgs_update-twa

    twa: 1.3.1 -> 1.5.1
    Mic92 authored Oct 2, 2018
    Copy the full SHA
    1de4ebd View commit details
  12. LTS Haskell 12.11

    peti committed Oct 2, 2018
    Copy the full SHA
    d072586 View commit details
  13. hackage-packages.nix: automatic Haskell package set update

    This update was generated by hackage2nix v2.11.1 from Hackage revision
    commercialhaskell/all-cabal-hashes@8d7d987.
    peti committed Oct 2, 2018
    Copy the full SHA
    ab1a64f View commit details
  14. Copy the full SHA
    8841b09 View commit details
  15. Copy the full SHA
    8f40052 View commit details
  16. Copy the full SHA
    a4badb2 View commit details
  17. Merge pull request #47673 from dysinger/feature/dysinger

    added dysinger as a maintainer
    Mic92 authored Oct 2, 2018
    Copy the full SHA
    67c86d8 View commit details
  18. Merge pull request #47656 from plapadoo/jetbrains-libnotify

    jetbrains: add libnotify to wrapper to enable notifications
    Mic92 authored Oct 2, 2018
    Copy the full SHA
    83f6cf8 View commit details
  19. Merge pull request #47668 from jluttine/syncthing-0.14.51

    syncthing: 0.14.50 -> 0.14.51
    Mic92 authored Oct 2, 2018
    Copy the full SHA
    1643967 View commit details
  20. docs: documentation for cleanSource

    Tobias Pflug authored and roberth committed Oct 2, 2018
    Copy the full SHA
    1d68b5e View commit details
  21. docs: lib/options.nix function documentation

    Tobias Pflug authored and roberth committed Oct 2, 2018
    Copy the full SHA
    d516602 View commit details
  22. trivial builders: adding usage documentation for functions

    Samuel Leathers authored and roberth committed Oct 2, 2018
    Copy the full SHA
    024eb9a View commit details
  23. haskell: fix x509-system on mojave

    darwin.security_tool is currently broken in Mojave. See issue #45042
    for more info. Our security_tool stuff comes from 10.9 so I suspect
    that it needs an update.
    
    Here I am putting in a hack to get things working again. This uses the
    system provided security binary at /usr/bin/security to avoid the
    issue in Haskell’s x509-system package. Unfortunately, this will break
    with the sandbox. I am also working on a proper fix, but this requires
    updating lots of Apple stuff (and also copumpkin’s new CF). You can
    follow the progress on this branch:
    
      https://github.com/matthewbauer/nixpkgs/tree/xcode-security
    
    This commit should be backported to release-18.03 and release-18.09.
    
    /cc @copumpkin @LnL7 @pikajude
    matthewbauer committed Oct 2, 2018
    Copy the full SHA
    300ff96 View commit details
  24. Merge pull request #47676 from matthewbauer/security-mojave-fix

    haskell: fix x509-system on mojave
    matthewbauer authored Oct 2, 2018

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    a88b8da View commit details
  25. Merge pull request #47681 from NixOS/docs-lib-sources

    docs: documentation for `cleanSource`
    matthewbauer authored Oct 2, 2018
    Copy the full SHA
    8fd8d72 View commit details
  26. Merge pull request #47682 from NixOS/docs-trivial-builders

    trivial builders: adding usage documentation for functions
    matthewbauer authored Oct 2, 2018
    Copy the full SHA
    33d8ba2 View commit details
  27. Merge pull request #47683 from NixOS/docs-lib-options

    docs: lib/options.nix function documentation
    grahamc authored Oct 2, 2018
    Copy the full SHA
    62b3e55 View commit details
  28. hyperfine: 1.1.0 -> 1.3.0 (#47521)

    dywedir authored and xeji committed Oct 2, 2018
    Copy the full SHA
    bae2f2d View commit details
  29. Merge pull request #47620 from bachp/unifi-update

    Unifi updates
    timokau authored Oct 2, 2018
    Copy the full SHA
    b3e2f32 View commit details
  30. Copy the full SHA
    3c45be7 View commit details
  31. gmm: 5.1 -> 5.3 (#47686)

    c0bw3b authored and xeji committed Oct 2, 2018

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    b6c8246 View commit details
  32. mpv: 0.29.0 -> 0.29.1 (#47689)

    dywedir authored and xeji committed Oct 2, 2018

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    889c720 View commit details

Commits on Oct 3, 2018

  1. nixos/tests/misc: Fix reboot-wtmp subtest

    From commit b63f65a:
    
      I used tmpfiles.d instead of activation snippets to create the logs.
      It's good enough for upstream and other distros; it's probably good
      enough for us.
    
    The "reboot-wtmp" subtest fails because it it assumes that there is a
    reboot record even on the initial boot. This is only the case if wtmp is
    created within the activation script, but the implementation now uses
    tmpfiles.d, so the creation of the file is done at a much later stage.
    
    Apart from that, if you think about the state after the installation as
    "first boot", using the term "reboot" wouldn't probably make sense
    either.
    
    So in our subtest, we now reboot the machine and check the wtmp record
    afterwards as we did before.
    
    Signed-off-by: aszlig <aszlig@nix.build>
    Cc: @edolstra, @jameysharp, @Mic92
    aszlig committed Oct 3, 2018
    Copy the full SHA
    5e7bf8c View commit details
39 changes: 39 additions & 0 deletions lib/options.nix
Original file line number Diff line number Diff line change
@@ -8,7 +8,31 @@ with lib.strings;

rec {

# Returns true when the given argument is an option
#
# Examples:
# isOption 1 // => false
# isOption (mkOption {}) // => true
isOption = lib.isType "option";

# Creates an Option attribute set. mkOption accepts an attribute set with the following keys:
#
# default: Default value used when no definition is given in the configuration.
# defaultText: Textual representation of the default, for in the manual.
# example: Example value used in the manual.
# description: String describing the option.
# type: Option type, providing type-checking and value merging.
# apply: Function that converts the option value to something else.
# internal: Whether the option is for NixOS developers only.
# visible: Whether the option shows up in the manual.
# readOnly: Whether the option can be set only once
# options: Obsolete, used by types.optionSet.
#
# All keys default to `null` when not given.
#
# Examples:
# mkOption { } // => { _type = "option"; }
# mkOption { defaultText = "foo"; } // => { _type = "option"; defaultText = "foo"; }
mkOption =
{ default ? null # Default value used when no definition is given in the configuration.
, defaultText ? null # Textual representation of the default, for in the manual.
@@ -24,6 +48,10 @@ rec {
} @ attrs:
attrs // { _type = "option"; };

# Creates a Option attribute set for a boolean value option i.e an option to be toggled on or off:
#
# Examples:
# mkEnableOption "foo" // => { _type = "option"; default = false; description = "Whether to enable foo."; example = true; type = { ... }; }
mkEnableOption = name: mkOption {
default = false;
example = true;
@@ -74,7 +102,18 @@ rec {
else
val) (head defs).value defs;

# Extracts values of all "value" keys of the given list
#
# Examples:
# getValues [ { value = 1; } { value = 2; } ] // => [ 1 2 ]
# getValues [ ] // => [ ]
getValues = map (x: x.value);

# Extracts values of all "file" keys of the given list
#
# Examples:
# getFiles [ { file = "file1"; } { file = "file2"; } ] // => [ "file1" "file2" ]
# getFiles [ ] // => [ ]
getFiles = map (x: x.file);

# Generate documentation template from the list of option declaration like
4 changes: 4 additions & 0 deletions lib/sources.nix
Original file line number Diff line number Diff line change
@@ -26,6 +26,10 @@ rec {
(type == "symlink" && lib.hasPrefix "result" baseName)
);

# Filters a source tree removing version control files and directories using cleanSourceWith
#
# Example:
# cleanSource ./.
cleanSource = src: cleanSourceWith { filter = cleanSourceFilter; inherit src; };

# Like `builtins.filterSource`, except it will compose with itself,
5 changes: 5 additions & 0 deletions maintainers/maintainer-list.nix
Original file line number Diff line number Diff line change
@@ -1135,6 +1135,11 @@
github = "dtzWill";
name = "Will Dietz";
};
dysinger = {
email = "tim@dysinger.net";
github = "dysinger";
name = "Tim Dysinger";
};
dywedir = {
email = "dywedir@protonmail.ch";
github = "dywedir";
22 changes: 11 additions & 11 deletions nixos/modules/hardware/opengl.nix
Original file line number Diff line number Diff line change
@@ -129,17 +129,17 @@ in
message = "Option driSupport32Bit only makes sense on a 64-bit system.";
};

system.activationScripts.setup-opengl =
''
ln -sfn ${package} /run/opengl-driver
${if pkgs.stdenv.isi686 then ''
ln -sfn opengl-driver /run/opengl-driver-32
'' else if cfg.driSupport32Bit then ''
ln -sfn ${package32} /run/opengl-driver-32
'' else ''
rm -f /run/opengl-driver-32
''}
'';
systemd.tmpfiles.rules = [
"L+ /run/opengl-driver - - - - ${package}"
(
if pkgs.stdenv.isi686 then
"L+ /run/opengl-driver-32 - - - - opengl-driver"
else if cfg.driSupport32Bit then
"L+ /run/opengl-driver-32 - - - - ${package32}"
else
"r /run/opengl-driver-32"
)
];

environment.sessionVariables.LD_LIBRARY_PATH =
[ "/run/opengl-driver/lib" ] ++ optional cfg.driSupport32Bit "/run/opengl-driver-32/lib";
7 changes: 7 additions & 0 deletions nixos/modules/security/pam.nix
Original file line number Diff line number Diff line change
@@ -548,6 +548,13 @@ in
environment.etc =
mapAttrsToList (n: v: makePAMService v) config.security.pam.services;

systemd.tmpfiles.rules = optionals
(any (s: s.updateWtmp) (attrValues config.security.pam.services))
[
"f /var/log/wtmp"
"f /var/log/lastlog"
];

security.pam.services =
{ other.text =
''
10 changes: 5 additions & 5 deletions nixos/modules/security/polkit.nix
Original file line number Diff line number Diff line change
@@ -88,11 +88,11 @@ in
"polkit-agent-helper-1".source = "${pkgs.polkit.out}/lib/polkit-1/polkit-agent-helper-1";
};

system.activationScripts.polkit =
''
# Probably no more needed, clean up
rm -rf /var/lib/{polkit-1,PolicyKit}
'';
systemd.tmpfiles.rules = [
# Probably no more needed, clean up
"R /var/lib/polkit-1"
"R /var/lib/PolicyKit"
];

users.users.polkituser = {
description = "PolKit daemon";
8 changes: 0 additions & 8 deletions nixos/modules/system/activation/activation-script.nix
Original file line number Diff line number Diff line change
@@ -128,14 +128,6 @@ in
''
# Various log/runtime directories.
mkdir -m 0755 -p /run/nix/current-load # for distributed builds
mkdir -m 0700 -p /run/nix/remote-stores
mkdir -m 0755 -p /var/log
touch /var/log/wtmp /var/log/lastlog # must exist
chmod 644 /var/log/wtmp /var/log/lastlog
mkdir -m 1777 -p /var/tmp
# Empty, immutable home directory of many system accounts.
8 changes: 8 additions & 0 deletions nixos/modules/system/boot/stage-2-init.sh
Original file line number Diff line number Diff line change
@@ -152,6 +152,14 @@ ln -sfn /run/booted-system /nix/var/nix/gcroots/booted-system
@shell@ @postBootCommands@
# Ensure systemd doesn't try to populate /etc, by forcing its first-boot
# heuristic off. It doesn't matter what's in /etc/machine-id for this purpose,
# and systemd will immediately fill in the file when it starts, so just
# creating it is enough. This `: >>` pattern avoids forking and avoids changing
# the mtime if the file already exists.
: >> /etc/machine-id
# Reset the logging file descriptors.
exec 1>&$logOutFd 2>&$logErrFd
exec {logOutFd}>&- {logErrFd}>&-
14 changes: 1 addition & 13 deletions nixos/modules/system/boot/systemd.nix
Original file line number Diff line number Diff line change
@@ -747,6 +747,7 @@ in

"systemd/journald.conf".text = ''
[Journal]
Storage=persistent
RateLimitInterval=${config.services.journald.rateLimitInterval}
RateLimitBurst=${toString config.services.journald.rateLimitBurst}
${optionalString (config.services.journald.console != "") ''
@@ -783,19 +784,6 @@ in

services.dbus.enable = true;

system.activationScripts.systemd = stringAfter [ "groups" ]
''
mkdir -m 0755 -p /var/lib/udev
if ! [ -e /etc/machine-id ]; then
${systemd}/bin/systemd-machine-id-setup
fi
# Keep a persistent journal. Note that systemd-tmpfiles will
# set proper ownership/permissions.
mkdir -m 0700 -p /var/log/journal
'';

users.users.systemd-network.uid = config.ids.uids.systemd-network;
users.groups.systemd-network.gid = config.ids.gids.systemd-network;
users.users.systemd-resolve.uid = config.ids.uids.systemd-resolve;
2 changes: 2 additions & 0 deletions nixos/tests/misc.nix
Original file line number Diff line number Diff line change
@@ -78,6 +78,8 @@ import ./make-test.nix ({ pkgs, ...} : rec {
# Test whether we have a reboot record in wtmp.
subtest "reboot-wtmp", sub {
$machine->shutdown;
$machine->waitForUnit('multi-user.target');
$machine->succeed("last | grep reboot >&2");
};
3 changes: 2 additions & 1 deletion pkgs/applications/editors/jetbrains/common.nix
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{ stdenv, makeDesktopItem, makeWrapper, patchelf, p7zip
, coreutils, gnugrep, which, git, unzip, libsecret
, coreutils, gnugrep, which, git, unzip, libsecret, libnotify
}:

{ name, product, version, src, wmClass, jdk, meta }:
@@ -67,6 +67,7 @@ with stdenv; lib.makeOverridable mkDerivation rec {
--prefix LD_LIBRARY_PATH : "${stdenv.lib.makeLibraryPath [
# Some internals want libstdc++.so.6
stdenv.cc.cc.lib libsecret
libnotify
]}" \
--set JDK_HOME "$jdk" \
--set ${hiName}_JDK "$jdk" \
4 changes: 2 additions & 2 deletions pkgs/applications/networking/syncthing/default.nix
Original file line number Diff line number Diff line change
@@ -3,14 +3,14 @@
let
common = { stname, target, patches ? [], postInstall ? "" }:
stdenv.mkDerivation rec {
version = "0.14.50";
version = "0.14.51";
name = "${stname}-${version}";

src = fetchFromGitHub {
owner = "syncthing";
repo = "syncthing";
rev = "v${version}";
sha256 = "10lilw20mq1zshysb9zrszcpl4slyyxvnbxfqk04nhz0b1gmm9ri";
sha256 = "1ycly3vh10s04pk0fk9hb0my7w5b16dfgmnk1mi0zjylcii3yzi5";
};

inherit patches;
13 changes: 3 additions & 10 deletions pkgs/applications/video/mpv/default.nix
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{ stdenv, fetchpatch, fetchurl, fetchFromGitHub, makeWrapper
{ stdenv, fetchurl, fetchFromGitHub, makeWrapper
, docutils, perl, pkgconfig, python3, which, ffmpeg_4
, freefont_ttf, freetype, libass, libpthreadstubs
, lua, luasocket, libuchardet, libiconv ? null, darwin
@@ -89,22 +89,15 @@ let
};
in stdenv.mkDerivation rec {
name = "mpv-${version}";
version = "0.29.0";
version = "0.29.1";

src = fetchFromGitHub {
owner = "mpv-player";
repo = "mpv";
rev = "v${version}";
sha256 = "0i2nl65diqsjyz28dj07h6d8gq6ix72ysfm0nhs8514hqccaihs3";
sha256 = "138921kx8g6qprim558xin09xximjhsj9ss8b71ifg2m6kclym8m";
};

# FIXME: Remove this patch for building on macOS if it gets released in
# the future.
patches = optional stdenv.isDarwin (fetchpatch {
url = https://github.com/mpv-player/mpv/commit/dc553c8cf4349b2ab5d2a373ad2fac8bdd229ebb.patch;
sha256 = "0pa8vlb8rsxvd1s39c4iv7gbaqlkn3hx21a6xnpij99jdjkw3pg8";
});

postPatch = ''
patchShebangs ./TOOLS/
'';
8 changes: 4 additions & 4 deletions pkgs/applications/window-managers/i3/lock-color.nix
Original file line number Diff line number Diff line change
@@ -1,22 +1,22 @@
{ stdenv, fetchFromGitHub, autoreconfHook, pkgconfig, libxcb,
xcbutilkeysyms , xcbutilimage, pam, libX11, libev, cairo, libxkbcommon,
libxkbfile, libjpeg_turbo
libxkbfile, libjpeg_turbo, xcbutilxrm
}:

stdenv.mkDerivation rec {
version = "2.11-c";
version = "2.12.c";
name = "i3lock-color-${version}";

src = fetchFromGitHub {
owner = "PandorasFox";
repo = "i3lock-color";
rev = version;
sha256 = "1myq9fazkwd776agrnj27bm5nwskvss9v9a5qb77n037dv8d0rdw";
sha256 = "08fhnchf187b73h52xgzb86g6byzxz085zs9galsvl687g5zxk34";
};

nativeBuildInputs = [ autoreconfHook pkgconfig ];
buildInputs = [ libxcb xcbutilkeysyms xcbutilimage pam libX11
libev cairo libxkbcommon libxkbfile libjpeg_turbo ];
libev cairo libxkbcommon libxkbfile libjpeg_turbo xcbutilxrm ];

makeFlags = "all";
preInstall = ''
12 changes: 6 additions & 6 deletions pkgs/applications/window-managers/i3/status-rust.nix
Original file line number Diff line number Diff line change
@@ -1,21 +1,21 @@
{ stdenv, rustPlatform, fetchFromGitHub, pkgconfig, dbus, gperftools }:
{ stdenv, rustPlatform, fetchFromGitHub, pkgconfig, dbus }:

rustPlatform.buildRustPackage rec {
name = "i3status-rust-${version}";
version = "0.9.0.2018-09-30";
version = "0.9.0.2018-10-02";

src = fetchFromGitHub {
owner = "greshake";
repo = "i3status-rust";
rev = "82ea033250c3fc51a112ac68c389da5264840492";
sha256 = "06r1nnv3a5vq3s17rgavq639wrq09z0nd2ck50bj1c8i2ggkpvq9";
rev = "11c2a21693ffcd0b6c2e0ac919b2232918293963";
sha256 = "019m9qpw7djq6g7lzbm7gjcavlgsp93g3cd7cb408nxnfsi7i9dp";
};

cargoSha256 = "02in0hz2kgbmrd8i8s21vbm9pgfnn4axcji5f2a14pha6lx5rnvv";
cargoSha256 = "1wnify730f7c3cb8wllqvs7pzrq54g5x81xspvz5gq0iqr0q38zc";

nativeBuildInputs = [ pkgconfig ];

buildInputs = [ dbus gperftools ];
buildInputs = [ dbus ];

meta = with stdenv.lib; {
description = "Very resource-friendly and feature-rich replacement for i3status";
Loading