Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: c94a1e6158ec
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: dc4aa99080a1
Choose a head ref

Commits on Apr 29, 2018

  1. cryptsetup-generator: add postFixup

    This makes cryptsetup-generator link correctly
    to the shared systemd library.
    bachp committed Apr 29, 2018
    Copy the full SHA
    caed187 View commit details

Commits on Apr 30, 2018

  1. Copy the full SHA
    3e37981 View commit details
  2. gitAndTools.gitRemoteGcrypt: 1.0.3 -> 1.1

    Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.
    
    This update was made based on information from https://repology.org/metapackage/git-remote-gcrypt/versions.
    
    These checks were done:
    
    - built on NixOS
    - ran ‘/nix/store/xqncvvl7rynvbw0lf27d68qj879s26bm-git-remote-gcrypt-1.1/bin/git-remote-gcrypt -h’ got 0 exit code
    - ran ‘/nix/store/xqncvvl7rynvbw0lf27d68qj879s26bm-git-remote-gcrypt-1.1/bin/git-remote-gcrypt --help’ got 0 exit code
    - ran ‘/nix/store/xqncvvl7rynvbw0lf27d68qj879s26bm-git-remote-gcrypt-1.1/bin/git-remote-gcrypt help’ got 0 exit code
    - ran ‘/nix/store/xqncvvl7rynvbw0lf27d68qj879s26bm-git-remote-gcrypt-1.1/bin/.git-remote-gcrypt-wrapped -h’ got 0 exit code
    - ran ‘/nix/store/xqncvvl7rynvbw0lf27d68qj879s26bm-git-remote-gcrypt-1.1/bin/.git-remote-gcrypt-wrapped --help’ got 0 exit code
    - ran ‘/nix/store/xqncvvl7rynvbw0lf27d68qj879s26bm-git-remote-gcrypt-1.1/bin/.git-remote-gcrypt-wrapped help’ got 0 exit code
    - found 1.1 with grep in /nix/store/xqncvvl7rynvbw0lf27d68qj879s26bm-git-remote-gcrypt-1.1
    - directory tree listing: https://gist.github.com/f375e7b41aa0075f2c539d2c32748c12
    R. RyanTM committed Apr 30, 2018
    Copy the full SHA
    d86866c View commit details

Commits on May 3, 2018

  1. john: build with recent gcc

    Mic92 committed May 3, 2018
    Copy the full SHA
    07ee2b9 View commit details

Commits on May 4, 2018

  1. ocamlPackages.git: 1.11.4 -> 1.11.5

    Also enable tests
    vbgl committed May 4, 2018

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    vbgl Vincent Laporte
    Copy the full SHA
    d8ebe4f View commit details

Commits on May 5, 2018

  1. nix-pin: 0.2.2 -> 0.3.0

    timbertson committed May 5, 2018
    Copy the full SHA
    3cce9b1 View commit details
  2. powerline-rs: init at 0.1.6

    jD91mZM2 committed May 5, 2018

    Unverified

    The committer email address is not verified.
    Copy the full SHA
    edbf4b0 View commit details
  3. nano-wallet: init at 12.1

    jluttine committed May 5, 2018

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    jluttine Jaakko Luttinen
    Copy the full SHA
    9f31a4d View commit details
  4. Verified

    This commit was signed with the committer’s verified signature.
    jtojnar Jan Tojnar
    Copy the full SHA
    4feaecc View commit details
  5. Verified

    This commit was signed with the committer’s verified signature.
    jtojnar Jan Tojnar
    Copy the full SHA
    8e18b7c View commit details
  6. Merge pull request #40002 from jD91mZM2/powerline-rs

    powerline-rs: init at 0.1.6
    jtojnar authored May 5, 2018

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    7be2768 View commit details
  7. maria-db: Fix mariadb_config include path.

    Fixes #39984.
    
    Co-authored-by: Ekaitz Zarraga <ekaitz.zarraga@protonmail.com>
    picnoir and Ekaitz Zarraga committed May 5, 2018
    Copy the full SHA
    c462aa0 View commit details
  8. Merge pull request #40003 from timbertson/nix-pin

    nix-pin: 0.2.2 -> 0.3.0
    xeji authored May 5, 2018

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    8f22baa View commit details
  9. Merge pull request #38961 from bachp/cryptsetup-generator

    cryptsetup-generator: add postFixup
    xeji authored May 5, 2018

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    e450d9f View commit details
  10. Merge pull request #39749 from Synthetica9/i3lock-color-2.11

    i3lock-color: 2.10.1-1-c -> 2.11-c
    xeji authored May 5, 2018

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    76d0e61 View commit details
  11. nixos/lib/make-ext4-fs: Add a sanity check

    I ended up with a corrupted image with the debugfs contraption once, and
    given I couldn't reproduce the problem I suppose that happens if the
    filesystem of the builder runs out of space.
    
    At least in this instance fsck could detect it, so let's add it as a
    sanity check.
    dezgeg committed May 5, 2018
    Copy the full SHA
    bc82872 View commit details
  12. Verified

    This commit was signed with the committer’s verified signature.
    vcunat Vladimír Čunát
    Copy the full SHA
    89bed5b View commit details
  13. john: disable aarch64

    Mic92 committed May 5, 2018
    Copy the full SHA
    7ac652d View commit details
  14. Merge pull request #39295 from jluttine/add-nano-wallet

    nano-wallet: init at 12.1
    srhb authored May 5, 2018

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    1d9330d View commit details
  15. Merge pull request #39929 from Mic92/john

    john: build with recent gcc
    xeji authored May 5, 2018

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    38ae210 View commit details
  16. Merge pull request #39961 from vbgl/ocaml-git-1.11.5

    ocamlPackages.git: 1.11.4 -> 1.11.5
    xeji authored May 5, 2018

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    ae148ea View commit details
  17. Merge pull request #39770 from r-ryantm/auto-update/git-remote-gcrypt

    gitAndTools.gitRemoteGcrypt: 1.0.3 -> 1.1
    xeji authored May 5, 2018

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    dc4aa99 View commit details
5 changes: 5 additions & 0 deletions maintainers/maintainer-list.nix
Original file line number Diff line number Diff line change
@@ -1740,6 +1740,11 @@
github = "jdagilliland";
name = "Jason Gilliland";
};
jD91mZM2 = {
email = "me@krake.one";
github = "jD91mZM2";
name = "jD91mZM2";
};
jefdaj = {
email = "jefdaj@gmail.com";
github = "jefdaj";
9 changes: 8 additions & 1 deletion nixos/lib/make-ext4-fs.nix
Original file line number Diff line number Diff line change
@@ -14,7 +14,7 @@ in
pkgs.stdenv.mkDerivation {
name = "ext4-fs.img";

nativeBuildInputs = with pkgs; [e2fsprogs libfaketime perl];
nativeBuildInputs = with pkgs; [e2fsprogs.bin libfaketime perl];

buildCommand =
''
@@ -83,5 +83,12 @@ pkgs.stdenv.mkDerivation {
echo "--- Failed to create EXT4 image of $bytes bytes (numInodes=$numInodes, numDataBlocks=$numDataBlocks) ---"
return 1
fi
# I have ended up with corrupted images sometimes, I suspect that happens when the build machine's disk gets full during the build.
if ! fsck.ext4 -n -f $out; then
echo "--- Fsck failed for EXT4 image of $bytes bytes (numInodes=$numInodes, numDataBlocks=$numDataBlocks) ---"
cat errorlog
return 1
fi
'';
}
13 changes: 13 additions & 0 deletions pkgs/applications/altcoins/nano-wallet/CMakeLists.txt.patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
diff --git a/CMakeLists.txt b/CMakeLists.txt
index b43f02f6..4470abbf 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -119,7 +119,7 @@ endif (RAIBLOCKS_SECURE_RPC)

include_directories (${CMAKE_SOURCE_DIR})

-set(Boost_USE_STATIC_LIBS ON)
+add_definitions(-DBOOST_LOG_DYN_LINK)
set(Boost_USE_MULTITHREADED ON)

if (BOOST_CUSTOM)
57 changes: 57 additions & 0 deletions pkgs/applications/altcoins/nano-wallet/default.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,57 @@
{lib, pkgs, stdenv, fetchFromGitHub, cmake, pkgconfig, boost, libGL, qtbase}:

stdenv.mkDerivation rec {

name = "nano-wallet-${version}";
version = "12.1";

src = fetchFromGitHub {
owner = "nanocurrency";
repo = "raiblocks";
rev = "V${version}";
sha256 = "10ng7qn6y31s2bjahmpivw2plx90ljjjzb87j3l7zmppsjd2iq03";
fetchSubmodules = true;
};

# Use a patch to force dynamic linking
patches = [
./CMakeLists.txt.patch
];

cmakeFlags = let
options = {
BOOST_ROOT = "${boost}";
Boost_USE_STATIC_LIBS = "OFF";
RAIBLOCKS_GUI = "ON";
RAIBLOCKS_TEST = "ON";
Qt5_DIR = "${qtbase.dev}/lib/cmake/Qt5";
Qt5Core_DIR = "${qtbase.dev}/lib/cmake/Qt5Core";
Qt5Gui_INCLUDE_DIRS = "${qtbase.dev}/include/QtGui";
Qt5Widgets_INCLUDE_DIRS = "${qtbase.dev}/include/QtWidgets";
};
optionToFlag = name: value: "-D${name}=${value}";
in lib.mapAttrsToList optionToFlag options;

nativeBuildInputs = [ cmake pkgconfig ];
buildInputs = [ boost libGL qtbase ];

buildPhase = ''
make nano_wallet
'';

checkPhase = ''
./core_test
'';

meta = {
inherit version;
description = "Wallet for Nano cryptocurrency";
homepage = https://nano.org/en/wallet/;
license = lib.licenses.bsd2;
# Fails on Darwin. See:
# https://github.com/NixOS/nixpkgs/pull/39295#issuecomment-386800962
platforms = lib.platforms.linux;
maintainers = with lib.maintainers; [ jluttine ];
};

}
Original file line number Diff line number Diff line change
@@ -2,14 +2,14 @@

stdenv.mkDerivation rec {
name = "git-remote-gcrypt-${version}";
version = "1.0.3";
version = "1.1";
rev = version;

src = fetchFromGitHub {
inherit rev;
owner = "spwhitton";
repo = "git-remote-gcrypt";
sha256 = "1vay3204729c7wajgn3nxf0s0hzwpdrw14pl6kd8w2ss25gvw2k1";
sha256 = "0mhz5mqnr35rk7j4wyhp7hzmqgv8r554n9qlm4iw565bz7acvq24";
};

outputs = [ "out" "man" ];
6 changes: 3 additions & 3 deletions pkgs/applications/window-managers/i3/lock-color.nix
Original file line number Diff line number Diff line change
@@ -4,14 +4,14 @@
}:

stdenv.mkDerivation rec {
version = "2.10.1-1-c";
version = "2.11-c";
name = "i3lock-color-${version}";

src = fetchFromGitHub {
owner = "PandorasFox";
repo = "i3lock-color";
rev = "01476c56333cccae80cdd3f125b0b9f3a0fe2cb3";
sha256 = "06ca8496fkdkvh4ycg0b7kd3r1bjdqdwfimb51v4nj1lm87pdkdf";
rev = version;
sha256 = "1myq9fazkwd776agrnj27bm5nwskvss9v9a5qb77n037dv8d0rdw";
};

nativeBuildInputs = [ autoreconfHook pkgconfig ];
16 changes: 4 additions & 12 deletions pkgs/desktops/gnome-3/core/evolution-data-server/default.nix
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{ fetchurl, stdenv, pkgconfig, gnome3, python3, dconf, gobjectIntrospection
{ fetchurl, stdenv, pkgconfig, gnome3, python3, gobjectIntrospection
, intltool, libsoup, libxml2, libsecret, icu, sqlite
, p11-kit, db, nspr, nss, libical, gperf, makeWrapper
, p11-kit, db, nspr, nss, libical, gperf, wrapGAppsHook, glib-networking
, vala, cmake, ninja, kerberos, openldap, webkitgtk, libaccounts-glib, json-glib }:

stdenv.mkDerivation rec {
@@ -15,12 +15,12 @@ stdenv.mkDerivation rec {
};

nativeBuildInputs = [
cmake ninja pkgconfig intltool python3 gperf makeWrapper gobjectIntrospection vala
cmake ninja pkgconfig intltool python3 gperf wrapGAppsHook gobjectIntrospection vala
];
buildInputs = with gnome3; [
glib libsoup libxml2 gtk gnome-online-accounts
gcr p11-kit libgweather libgdata libaccounts-glib json-glib
icu sqlite kerberos openldap webkitgtk
icu sqlite kerberos openldap webkitgtk glib-networking
];

propagatedBuildInputs = [ libsecret nss nspr libical db ];
@@ -36,14 +36,6 @@ stdenv.mkDerivation rec {
cmakeFlags="-DINCLUDE_INSTALL_DIR=$dev/include $cmakeFlags"
'';

preFixup = ''
for f in $(find $out/libexec/ -type f -executable); do
wrapProgram "$f" \
--prefix XDG_DATA_DIRS : "$GSETTINGS_SCHEMAS_PATH" \
--prefix GIO_EXTRA_MODULES : "${stdenv.lib.getLib dconf}/lib/gio/modules"
done
'';

passthru = {
updateScript = gnome3.updateScript {
packageName = "evolution-data-server";
9 changes: 7 additions & 2 deletions pkgs/development/ocaml-modules/git-http/default.nix
Original file line number Diff line number Diff line change
@@ -1,17 +1,22 @@
{ stdenv, ocaml, findlib, jbuilder, git, cohttp-lwt }:
{ stdenv, ocaml, findlib, jbuilder, git, cohttp-lwt
, alcotest, mtime, nocrypto
}:

stdenv.mkDerivation rec {
name = "ocaml${ocaml.version}-git-http-${version}";
inherit (git) version src;

buildInputs = [ ocaml findlib jbuilder ];
buildInputs = [ ocaml findlib jbuilder alcotest mtime nocrypto ];

propagatedBuildInputs = [ git cohttp-lwt ];

buildPhase = "jbuilder build -p git-http";

inherit (jbuilder) installPhase;

doCheck = true;
checkPhase = "jbuilder runtest -p git-http";

meta = {
description = "Client implementation of the “Smart” HTTP Git protocol in pure OCaml";
inherit (git.meta) homepage license maintainers platforms;
10 changes: 7 additions & 3 deletions pkgs/development/ocaml-modules/git/default.nix
Original file line number Diff line number Diff line change
@@ -1,26 +1,30 @@
{ stdenv, fetchFromGitHub, ocaml, findlib, jbuilder, opam
, astring, decompress, fmt, hex, logs, mstruct, ocaml_lwt, ocamlgraph, uri
, alcotest, mtime, nocrypto
}:

stdenv.mkDerivation rec {
version = "1.11.4";
version = "1.11.5";
name = "ocaml${ocaml.version}-git-${version}";

src = fetchFromGitHub {
owner = "mirage";
repo = "ocaml-git";
rev = version;
sha256 = "182b6shcfcq50r5snm01hwalnmck43x1xgdd4fvjb6q78pbwag2x";
sha256 = "0r1bxpxjjnl9hh8xbabsxl7svzvd19hfy73a2y1m4kljmw64dpfh";
};

buildInputs = [ ocaml findlib jbuilder ];
buildInputs = [ ocaml findlib jbuilder alcotest mtime nocrypto ];

propagatedBuildInputs = [ astring decompress fmt hex logs mstruct ocaml_lwt ocamlgraph uri ];

buildPhase = "jbuilder build -p git";

inherit (jbuilder) installPhase;

doCheck = true;
checkPhase = "jbuilder runtest -p git";

meta = {
description = "Git format and protocol in pure OCaml";
license = stdenv.lib.licenses.isc;
11 changes: 11 additions & 0 deletions pkgs/os-specific/linux/systemd/cryptsetup-generator.nix
Original file line number Diff line number Diff line change
@@ -11,6 +11,17 @@ stdenv.lib.overrideDerivation systemd (p: {
ninja systemd-cryptsetup systemd-cryptsetup-generator
'';

# As ninja install is not used here, the rpath needs to be manually fixed.
# Otherwise the resulting binary doesn't properly link against systemd-shared.so
postFixup = ''
sharedLib=libsystemd-shared-${p.version}.so
for prog in `find $out -type f -executable`; do
(patchelf --print-needed $prog | grep $sharedLib > /dev/null) && (
patchelf --set-rpath `patchelf --print-rpath $prog`:"$out/lib/systemd" $prog
) || true
done
'';

installPhase = ''
mkdir -p $out/lib/systemd/
cp systemd-cryptsetup $out/lib/systemd/systemd-cryptsetup
2 changes: 1 addition & 1 deletion pkgs/servers/sql/mariadb/default.nix
Original file line number Diff line number Diff line change
@@ -34,7 +34,7 @@ common = rec { # attributes common to both builds
sed -i 's,[^"]*/var/log,/var/log,g' storage/mroonga/vendor/groonga/CMakeLists.txt
'';

patches = [ ./cmake-includedir.patch ]
patches = [ ./cmake-includedir.patch ./include-dirs-path.patch ]
++ stdenv.lib.optional stdenv.cc.isClang ./clang-isfinite.patch;

cmakeFlags = [
13 changes: 13 additions & 0 deletions pkgs/servers/sql/mariadb/include-dirs-path.patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
diff --git a/libmariadb/mariadb_config/mariadb_config.c.in b/libmariadb/mariadb_config/mariadb_config.c.in
index 45d2f4e..e5666db 100644
--- a/libmariadb/mariadb_config/mariadb_config.c.in
+++ b/libmariadb/mariadb_config/mariadb_config.c.in
@@ -5,7 +5,7 @@

static char *mariadb_progname;

-#define INCLUDE "-I@CMAKE_INSTALL_PREFIX@/@INSTALL_INCLUDEDIR@ -I@CMAKE_INSTALL_PREFIX@/@INSTALL_INCLUDEDIR@/mysql"
+#define INCLUDE "-I@INSTALL_INCLUDEDIR@ -I@INSTALL_INCLUDEDIR@/mysql"
#define LIBS "-L@CMAKE_INSTALL_PREFIX@/@INSTALL_LIBDIR@/ -lmariadb @extra_dynamic_LDFLAGS@"
#define LIBS_SYS "@extra_dynamic_LDFLAGS@"
#define CFLAGS INCLUDE
25 changes: 25 additions & 0 deletions pkgs/tools/misc/powerline-rs/default.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
{ lib, rustPlatform, fetchFromGitHub, pkgconfig, file, perl, cmake, libgit2, openssl_1_1_0, libssh2, libzip }:
rustPlatform.buildRustPackage rec {
name = "powerline-rs-${version}";
version = "0.1.6";

src = fetchFromGitHub {
owner = "jD91mZM2";
repo = "powerline-rs";
rev = version;

sha256 = "11rhirnk8zh4vf00df9cgy9vw5h8n7kgnhjbjbnlpl9i6wal9nvl";
};

cargoSha256 = "184s432a6damzvl0lv6jar1iml9dq60r190aqjy44lcg938981zc";

nativeBuildInputs = [ pkgconfig file perl cmake ];
buildInputs = [ libgit2 ];
propagatedBuildInputs = [ openssl_1_1_0 libssh2 libzip ];

meta = with lib; {
description = "powerline-shell rewritten in Rust, inspired by powerline-go";
maintainers = with maintainers; [ jD91mZM2 ];
platforms = platforms.unix;
};
}
12 changes: 7 additions & 5 deletions pkgs/tools/package-management/nix-pin/default.nix
Original file line number Diff line number Diff line change
@@ -1,20 +1,22 @@
{ pkgs, stdenv, fetchFromGitHub, mypy, python3 }:
{ lib, pkgs, stdenv, fetchFromGitHub, mypy, python3, nix, git, makeWrapper }:
let self = stdenv.mkDerivation rec {
name = "nix-pin-${version}";
version = "0.2.2";
version = "0.3.0";
src = fetchFromGitHub {
owner = "timbertson";
repo = "nix-pin";
rev = "version-0.2.2";
sha256 = "1kw43kzy4m6lnnif51r2a8i4vcgr7d4vqb1c75p7pk2b9y3jwxsz";
rev = "version-0.3.0";
sha256 = "1kq50v8m8y1wji63b7y3wh6nv3ahvdxvvbsb07day2zzf5ysy8kj";
};
buildInputs = [ python3 mypy ];
buildInputs = [ python3 mypy makeWrapper ];
buildPhase = ''
mypy bin/*
'';
installPhase = ''
mkdir "$out"
cp -r bin share "$out"
wrapProgram $out/bin/nix-pin \
--prefix PATH : "${lib.makeBinPath [ nix git ]}"
'';
passthru =
let
2 changes: 1 addition & 1 deletion pkgs/tools/security/john/default.nix
Original file line number Diff line number Diff line change
@@ -69,6 +69,6 @@ stdenv.mkDerivation rec {
license = licenses.gpl2;
homepage = https://github.com/magnumripper/JohnTheRipper/;
maintainers = with maintainers; [ offline ];
platforms = platforms.unix;
platforms = [ "x86_64-linux" "x86_64-darwin"];
};
}
10 changes: 7 additions & 3 deletions pkgs/top-level/all-packages.nix
Original file line number Diff line number Diff line change
@@ -3145,9 +3145,7 @@ with pkgs;

go-jira = callPackage ../applications/misc/go-jira { };

john = callPackage ../tools/security/john {
gcc = gcc49; # doesn't build with gcc5
};
john = callPackage ../tools/security/john { };

journalbeat = callPackage ../tools/system/journalbeat { };

@@ -3846,6 +3844,8 @@ with pkgs;

namazu = callPackage ../tools/text/namazu { };

nano-wallet = libsForQt5.callPackage ../applications/altcoins/nano-wallet { };

nasty = callPackage ../tools/security/nasty { };

nat-traverse = callPackage ../tools/networking/nat-traverse { };
@@ -14578,6 +14578,8 @@ with pkgs;

powerline-go = callPackage ../tools/misc/powerline-go { };

powerline-rs = callPackage ../tools/misc/powerline-rs { };

profont = callPackage ../data/fonts/profont { };

proggyfonts = callPackage ../data/fonts/proggyfonts { };
@@ -17948,6 +17950,8 @@ with pkgs;
inherit sbcl lispPackages;
};

sublime = callPackage ../applications/editors/sublime/2 { };

sublime3Packages = recurseIntoAttrs (callPackage ../applications/editors/sublime/3/packages.nix { });

sublime3 = sublime3Packages.sublime3;