forked from mirrors/nixpkgs
Merge master into staging-next
This commit is contained in:
commit
4688cd53b6
|
@ -109,6 +109,11 @@ in mkLicense lset) ({
|
||||||
fullName = "Apache License 2.0";
|
fullName = "Apache License 2.0";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
asl20-llvm = {
|
||||||
|
spdxId = "Apache-2.0 WITH LLVM-exception";
|
||||||
|
fullName = "Apache License 2.0 with LLVM Exceptions";
|
||||||
|
};
|
||||||
|
|
||||||
bitstreamVera = {
|
bitstreamVera = {
|
||||||
spdxId = "Bitstream-Vera";
|
spdxId = "Bitstream-Vera";
|
||||||
fullName = "Bitstream Vera Font License";
|
fullName = "Bitstream Vera Font License";
|
||||||
|
@ -657,11 +662,6 @@ in mkLicense lset) ({
|
||||||
url = "https://opensource.franz.com/preamble.html";
|
url = "https://opensource.franz.com/preamble.html";
|
||||||
};
|
};
|
||||||
|
|
||||||
llvm-exception = {
|
|
||||||
spdxId = "LLVM-exception";
|
|
||||||
fullName = "LLVM Exception"; # LLVM exceptions to the Apache 2.0 License
|
|
||||||
};
|
|
||||||
|
|
||||||
lppl12 = {
|
lppl12 = {
|
||||||
spdxId = "LPPL-1.2";
|
spdxId = "LPPL-1.2";
|
||||||
fullName = "LaTeX Project Public License v1.2";
|
fullName = "LaTeX Project Public License v1.2";
|
||||||
|
|
|
@ -1348,6 +1348,15 @@ self: super: {
|
||||||
dependencies = with self; [ vimproc-vim ];
|
dependencies = with self; [ vimproc-vim ];
|
||||||
});
|
});
|
||||||
|
|
||||||
|
vim-trailing-whitespace = super.vim-trailing-whitespace.overrideAttrs (old: {
|
||||||
|
patches = [(fetchpatch {
|
||||||
|
# https://github.com/bronson/vim-trailing-whitespace/pull/30
|
||||||
|
name = "fix-add-dynamic-TerminalOpen-for-both-vim-and-nvim.patch";
|
||||||
|
url = "https://github.com/bronson/vim-trailing-whitespace/commit/99ef803ebdc01d62b418a3e9386d5f10797bfac3.patch";
|
||||||
|
hash = "sha256-cyanHUKxhbY8c6EkAbpUq7QcEBQABCwZ6NoEUOpd2F8=";
|
||||||
|
})];
|
||||||
|
});
|
||||||
|
|
||||||
vim-zettel = super.vim-zettel.overrideAttrs (old: {
|
vim-zettel = super.vim-zettel.overrideAttrs (old: {
|
||||||
dependencies = with self; [ vimwiki fzf-vim ];
|
dependencies = with self; [ vimwiki fzf-vim ];
|
||||||
});
|
});
|
||||||
|
|
|
@ -2597,8 +2597,8 @@ let
|
||||||
mktplcRef = {
|
mktplcRef = {
|
||||||
name = "code-spell-checker";
|
name = "code-spell-checker";
|
||||||
publisher = "streetsidesoftware";
|
publisher = "streetsidesoftware";
|
||||||
version = "2.16.0";
|
version = "2.17.1";
|
||||||
sha256 = "sha256-Qr4cYAEvAkvvE6KytVeInJzcMQJZqr/e/KPfelVzjUA=";
|
sha256 = "sha256-gQSAq63fqniHmA9T0nKpUAzo+kpSCZzblr6FQ33LIPI=";
|
||||||
};
|
};
|
||||||
meta = with lib; {
|
meta = with lib; {
|
||||||
changelog = "https://marketplace.visualstudio.com/items/streetsidesoftware.code-spell-checker/changelog";
|
changelog = "https://marketplace.visualstudio.com/items/streetsidesoftware.code-spell-checker/changelog";
|
||||||
|
|
|
@ -17,14 +17,17 @@
|
||||||
|
|
||||||
stdenv.mkDerivation rec {
|
stdenv.mkDerivation rec {
|
||||||
pname = "palemoon-bin";
|
pname = "palemoon-bin";
|
||||||
version = "32.0.0";
|
version = "32.0.1";
|
||||||
|
|
||||||
src = fetchzip {
|
src = fetchzip {
|
||||||
url = "http://linux.palemoon.org/datastore/release/palemoon-${version}.linux-x86_64-gtk${if withGTK3 then "3" else "2"}.tar.xz";
|
urls = [
|
||||||
|
"https://rm-eu.palemoon.org/release/palemoon-${version}.linux-x86_64-gtk${if withGTK3 then "3" else "2"}.tar.xz"
|
||||||
|
"https://rm-us.palemoon.org/release/palemoon-${version}.linux-x86_64-gtk${if withGTK3 then "3" else "2"}.tar.xz"
|
||||||
|
];
|
||||||
hash = if withGTK3 then
|
hash = if withGTK3 then
|
||||||
"sha256-KipzrQEbwd3np3t2oTq2eHHLUPtnC/nnGYMGmFc7arw="
|
"sha256-CSAsZTMIeInuvN7mddiMDtzzNKuYST2zp1XczKAP1mQ="
|
||||||
else
|
else
|
||||||
"sha256-dbHGThzLx23Ws0nfGTEYrQp0g+hYwkk1bOczQwt4NYg=";
|
"sha256-bvdy4tqnuoUxVVz/8zp7VwfS3wH51eKCzXDqgDWMb3A=";
|
||||||
};
|
};
|
||||||
|
|
||||||
preferLocalBuild = true;
|
preferLocalBuild = true;
|
||||||
|
|
|
@ -45,7 +45,7 @@ assert with lib.strings; (
|
||||||
|
|
||||||
stdenv.mkDerivation rec {
|
stdenv.mkDerivation rec {
|
||||||
pname = "palemoon";
|
pname = "palemoon";
|
||||||
version = "32.0.0";
|
version = "32.0.1";
|
||||||
|
|
||||||
src = fetchFromGitea {
|
src = fetchFromGitea {
|
||||||
domain = "repo.palemoon.org";
|
domain = "repo.palemoon.org";
|
||||||
|
@ -53,7 +53,7 @@ stdenv.mkDerivation rec {
|
||||||
repo = "Pale-Moon";
|
repo = "Pale-Moon";
|
||||||
rev = "${version}_Release";
|
rev = "${version}_Release";
|
||||||
fetchSubmodules = true;
|
fetchSubmodules = true;
|
||||||
sha256 = "sha256-0N63Xo8cRIHwEXkT8eeot0DgZU7aPirmVq/iHJjlGRw=";
|
sha256 = "sha256-lz9Ok8i95pVfl4UHy2zWFe9vwJocUvDbueiWdZuz4Bo=";
|
||||||
};
|
};
|
||||||
|
|
||||||
nativeBuildInputs = [
|
nativeBuildInputs = [
|
||||||
|
|
|
@ -1,41 +0,0 @@
|
||||||
From 6f53bd36a40da4c71486e3b79f6e32d53d6eea5d Mon Sep 17 00:00:00 2001
|
|
||||||
From: Euan Kemp <euank@euank.com>
|
|
||||||
Date: Thu, 3 Feb 2022 23:50:40 -0800
|
|
||||||
Subject: [PATCH 2/2] scrips/download: strip downloading, just package CRD
|
|
||||||
|
|
||||||
The CRD packaging is a complicated set of commands, so let's reuse it.
|
|
||||||
---
|
|
||||||
scripts/download | 10 ++--------
|
|
||||||
1 file changed, 2 insertions(+), 8 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/scripts/download b/scripts/download
|
|
||||||
index 5effc0562a..82361803ee 100755
|
|
||||||
--- a/scripts/download
|
|
||||||
+++ b/scripts/download
|
|
||||||
@@ -24,12 +24,6 @@ rm -rf ${CONTAINERD_DIR}
|
|
||||||
mkdir -p ${CHARTS_DIR}
|
|
||||||
mkdir -p ${DATA_DIR}
|
|
||||||
|
|
||||||
-curl --compressed -sfL https://github.com/k3s-io/k3s-root/releases/download/${VERSION_ROOT}/k3s-root-${ARCH}.tar | tar xf - --exclude=bin/socat
|
|
||||||
-
|
|
||||||
-git clone --single-branch --branch=${VERSION_RUNC} --depth=1 https://github.com/opencontainers/runc ${RUNC_DIR}
|
|
||||||
-
|
|
||||||
-git clone --single-branch --branch=${VERSION_CONTAINERD} --depth=1 https://github.com/k3s-io/containerd ${CONTAINERD_DIR}
|
|
||||||
-
|
|
||||||
setup_tmp() {
|
|
||||||
TMP_DIR=$(mktemp -d --tmpdir=${CHARTS_DIR})
|
|
||||||
cleanup() {
|
|
||||||
@@ -44,8 +38,8 @@ setup_tmp() {
|
|
||||||
|
|
||||||
download_and_package_traefik () {
|
|
||||||
echo "Downloading Traefik Helm chart from ${TRAEFIK_URL}"
|
|
||||||
- curl -sfL ${TRAEFIK_URL} -o ${TMP_DIR}/${TRAEFIK_FILE}
|
|
||||||
- code=$?
|
|
||||||
+ # nixpkgs: copy in our known traefik chart instead
|
|
||||||
+ cp $TRAEFIK_CHART_FILE ${TMP_DIR}/${TRAEFIK_FILE}
|
|
||||||
|
|
||||||
if [ $code -ne 0 ]; then
|
|
||||||
echo "Error: Failed to download Traefik Helm chart!"
|
|
||||||
--
|
|
||||||
2.34.1
|
|
||||||
|
|
|
@ -0,0 +1,10 @@
|
||||||
|
{
|
||||||
|
traefik-crd = {
|
||||||
|
url = "https://k3s.io/k3s-charts/assets/traefik-crd/traefik-crd-20.3.1+up20.3.0.tgz";
|
||||||
|
sha256 = "1775vjldvqvhzdbzanxhbaqbmkih09yb91im651q8bc7z5sb9ckn";
|
||||||
|
};
|
||||||
|
traefik = {
|
||||||
|
url = "https://k3s.io/k3s-charts/assets/traefik/traefik-20.3.1+up20.3.0.tgz";
|
||||||
|
sha256 = "1rj0f0n0vgjcbzfwzhqmsd501i2f6vw145w9plbp8gwdyzmg2nc6";
|
||||||
|
};
|
||||||
|
}
|
|
@ -47,30 +47,32 @@
|
||||||
# Those pieces of software we entirely ignore upstream's handling of, and just
|
# Those pieces of software we entirely ignore upstream's handling of, and just
|
||||||
# make sure they're in the path if desired.
|
# make sure they're in the path if desired.
|
||||||
let
|
let
|
||||||
k3sVersion = "1.24.4+k3s1"; # k3s git tag
|
k3sVersion = "1.24.10+k3s1"; # k3s git tag
|
||||||
k3sCommit = "c3f830e9b9ed8a4d9d0e2aa663b4591b923a296e"; # k3s git commit at the above version
|
k3sCommit = "546a94e9ae1c3be6f9c0dcde32a6e6672b035bc8"; # k3s git commit at the above version
|
||||||
k3sRepoSha256 = "00ns6n7jxnacah8ahndhgdb160prgsqhswbb5809kkgvig7k8b27";
|
k3sRepoSha256 = "sha256-HfkGb3GtR2wQkVIze26aFh6A6W0fegr8ovpSel7oujQ=";
|
||||||
k3sVendorSha256 = "sha256-ReZvJCgxqffG2H39JlynGPUBSV5ngPkRtAoZ++OQZZI=";
|
k3sVendorSha256 = "sha256-YAerisDr/knlKPaO2fVMZA4FUpwshFmkpi3mJAmLqKM=";
|
||||||
|
|
||||||
# taken from ./manifests/traefik.yaml, extracted from '.spec.chart' https://github.com/k3s-io/k3s/blob/v1.23.3%2Bk3s1/scripts/download#L9
|
# Based on the traefik charts here: https://github.com/k3s-io/k3s/blob/v1.24.10%2Bk3s1/scripts/download#L29-L32
|
||||||
# The 'patch' and 'minor' versions are currently hardcoded as single digits only, so ignore the trailing two digits. Weird, I know.
|
# see also https://github.com/k3s-io/k3s/blob/v1.24.10%2Bk3s1/manifests/traefik.yaml#L8-L16
|
||||||
traefikChartVersion = "10.19.3";
|
# At the time of writing, there are two traefik charts, and that's it
|
||||||
traefikChartSha256 = "04zg5li957svgscdmkzmzjkwljaljyav68rzxmhakkwgav6q9058";
|
charts = import ./chart-versions.nix;
|
||||||
|
|
||||||
# taken from ./scripts/version.sh VERSION_ROOT https://github.com/k3s-io/k3s/blob/v1.23.3%2Bk3s1/scripts/version.sh#L47
|
# taken from ./scripts/version.sh VERSION_ROOT https://github.com/k3s-io/k3s/blob/v1.24.10%2Bk3s1/scripts/version.sh#L56
|
||||||
k3sRootVersion = "0.11.0";
|
k3sRootVersion = "0.12.1";
|
||||||
k3sRootSha256 = "016n56vi09xkvjph7wgzb2m86mhd5x65fs4d11pmh20hl249r620";
|
k3sRootSha256 = "sha256-xCXbarWztnvW2xn3cGa84hie3OevVZeGEDWh+Uf3RBw=";
|
||||||
|
|
||||||
# taken from ./scripts/version.sh VERSION_CNIPLUGINS https://github.com/k3s-io/k3s/blob/v1.23.3%2Bk3s1/scripts/version.sh#L45
|
# taken from ./scripts/version.sh VERSION_CNIPLUGINS https://github.com/k3s-io/k3s/blob/v1.24.10%2Bk3s1/scripts/version.sh#L49
|
||||||
k3sCNIVersion = "1.1.1-k3s1";
|
k3sCNIVersion = "1.1.1-k3s1";
|
||||||
k3sCNISha256 = "14mb3zsqibj1sn338gjmsyksbm0mxv9p016dij7zidccx2rzn6nl";
|
k3sCNISha256 = "14mb3zsqibj1sn338gjmsyksbm0mxv9p016dij7zidccx2rzn6nl";
|
||||||
|
|
||||||
# taken from go.mod, the 'github.com/containerd/containerd' line
|
# taken from go.mod, the 'github.com/containerd/containerd' line
|
||||||
# run `grep github.com/containerd/containerd go.mod | head -n1 | awk '{print $4}'`
|
# run `grep github.com/containerd/containerd go.mod | head -n1 | awk '{print $4}'`
|
||||||
containerdVersion = "1.5.13-k3s1";
|
# https://github.com/k3s-io/k3s/blob/v1.24.10%2Bk3s1/go.mod#L10
|
||||||
containerdSha256 = "09bj4ghwbsj9whkv1d5icqs52k64m449j8b73dmak2wz62fbzbvp";
|
containerdVersion = "1.5.16-k3s1";
|
||||||
|
containerdSha256 = "sha256-dxC44qE1A20Hd2j77Ir9Sla8xncttswWIuGGM/5FWi8=";
|
||||||
|
|
||||||
# run `grep github.com/kubernetes-sigs/cri-tools go.mod | head -n1 | awk '{print $4}'` in the k3s repo at the tag
|
# run `grep github.com/kubernetes-sigs/cri-tools go.mod | head -n1 | awk '{print $4}'` in the k3s repo at the tag
|
||||||
|
# https://github.com/k3s-io/k3s/blob/v1.24.10%2Bk3s1/go.mod#L18
|
||||||
criCtlVersion = "1.24.0-k3s1";
|
criCtlVersion = "1.24.0-k3s1";
|
||||||
|
|
||||||
baseMeta = k3s.meta;
|
baseMeta = k3s.meta;
|
||||||
|
@ -93,10 +95,9 @@ let
|
||||||
];
|
];
|
||||||
|
|
||||||
# bundled into the k3s binary
|
# bundled into the k3s binary
|
||||||
traefikChart = fetchurl {
|
traefikChart = fetchurl charts.traefik;
|
||||||
url = "https://helm.traefik.io/traefik/traefik-${traefikChartVersion}.tgz";
|
traefik-crdChart = fetchurl charts.traefik-crd;
|
||||||
sha256 = traefikChartSha256;
|
|
||||||
};
|
|
||||||
# so, k3s is a complicated thing to package
|
# so, k3s is a complicated thing to package
|
||||||
# This derivation attempts to avoid including any random binaries from the
|
# This derivation attempts to avoid including any random binaries from the
|
||||||
# internet. k3s-root is _mostly_ binaries built to be bundled in k3s (which
|
# internet. k3s-root is _mostly_ binaries built to be bundled in k3s (which
|
||||||
|
@ -180,12 +181,13 @@ let
|
||||||
postInstall = ''
|
postInstall = ''
|
||||||
mv $out/bin/server $out/bin/k3s
|
mv $out/bin/server $out/bin/k3s
|
||||||
pushd $out
|
pushd $out
|
||||||
# taken verbatim from https://github.com/k3s-io/k3s/blob/v1.23.3%2Bk3s1/scripts/build#L105-L113
|
# taken verbatim from https://github.com/k3s-io/k3s/blob/v1.24.10%2Bk3s1/scripts/build#L123-L131
|
||||||
ln -s k3s ./bin/k3s-agent
|
ln -s k3s ./bin/k3s-agent
|
||||||
ln -s k3s ./bin/k3s-server
|
ln -s k3s ./bin/k3s-server
|
||||||
ln -s k3s ./bin/k3s-etcd-snapshot
|
ln -s k3s ./bin/k3s-etcd-snapshot
|
||||||
ln -s k3s ./bin/k3s-secrets-encrypt
|
ln -s k3s ./bin/k3s-secrets-encrypt
|
||||||
ln -s k3s ./bin/k3s-certificate
|
ln -s k3s ./bin/k3s-certificate
|
||||||
|
ln -s k3s ./bin/k3s-completion
|
||||||
ln -s k3s ./bin/kubectl
|
ln -s k3s ./bin/kubectl
|
||||||
ln -s k3s ./bin/crictl
|
ln -s k3s ./bin/crictl
|
||||||
ln -s k3s ./bin/ctr
|
ln -s k3s ./bin/ctr
|
||||||
|
@ -218,10 +220,6 @@ buildGoModule rec {
|
||||||
src = k3sRepo;
|
src = k3sRepo;
|
||||||
vendorSha256 = k3sVendorSha256;
|
vendorSha256 = k3sVendorSha256;
|
||||||
|
|
||||||
patches = [
|
|
||||||
./0001-script-download-strip-downloading-just-package-CRD.patch
|
|
||||||
];
|
|
||||||
|
|
||||||
postPatch = ''
|
postPatch = ''
|
||||||
# Nix prefers dynamically linked binaries over static binary.
|
# Nix prefers dynamically linked binaries over static binary.
|
||||||
|
|
||||||
|
@ -290,11 +288,9 @@ buildGoModule rec {
|
||||||
ln -vsf ${k3sContainerd}/bin/* ./bin/
|
ln -vsf ${k3sContainerd}/bin/* ./bin/
|
||||||
rsync -a --no-perms --chmod u=rwX ${k3sRoot}/etc/ ./etc/
|
rsync -a --no-perms --chmod u=rwX ${k3sRoot}/etc/ ./etc/
|
||||||
mkdir -p ./build/static/charts
|
mkdir -p ./build/static/charts
|
||||||
# Note, upstream's chart has a 00 suffix. This seems to not matter though, so we're ignoring that naming detail.
|
|
||||||
export TRAEFIK_CHART_FILE=${traefikChart}
|
cp ${traefikChart} ./build/static/charts
|
||||||
# place the traefik chart using their code since it's complicated
|
cp ${traefik-crdChart} ./build/static/charts
|
||||||
# We trim the actual download, see patches
|
|
||||||
./scripts/download
|
|
||||||
|
|
||||||
export ARCH=$GOARCH
|
export ARCH=$GOARCH
|
||||||
export DRONE_TAG="v${k3sVersion}"
|
export DRONE_TAG="v${k3sVersion}"
|
||||||
|
|
53
pkgs/applications/networking/cluster/kaniko/default.nix
Normal file
53
pkgs/applications/networking/cluster/kaniko/default.nix
Normal file
|
@ -0,0 +1,53 @@
|
||||||
|
{ stdenv
|
||||||
|
, lib
|
||||||
|
, fetchFromGitHub
|
||||||
|
, buildGoModule
|
||||||
|
, installShellFiles
|
||||||
|
, testers
|
||||||
|
, kaniko
|
||||||
|
}:
|
||||||
|
|
||||||
|
buildGoModule rec {
|
||||||
|
pname = "kaniko";
|
||||||
|
version = "1.9.1";
|
||||||
|
|
||||||
|
src = fetchFromGitHub {
|
||||||
|
owner = "GoogleContainerTools";
|
||||||
|
repo = "kaniko";
|
||||||
|
rev = "v${version}";
|
||||||
|
hash = "sha256-sPICsDgkijQ7PyeTWQgT553toc4/rWPPo7SY3ptX82U=";
|
||||||
|
};
|
||||||
|
|
||||||
|
vendorHash = null;
|
||||||
|
|
||||||
|
ldflags = [
|
||||||
|
"-s" "-w"
|
||||||
|
"-X github.com/GoogleContainerTools/kaniko/pkg/version.version=${version}"
|
||||||
|
];
|
||||||
|
|
||||||
|
nativeBuildInputs = [ installShellFiles ];
|
||||||
|
|
||||||
|
doCheck = false; # requires docker, container-diff (unpackaged yet)
|
||||||
|
|
||||||
|
postInstall = lib.optionalString (stdenv.hostPlatform == stdenv.buildPlatform) ''
|
||||||
|
for shell in bash fish zsh; do
|
||||||
|
$out/bin/executor completion $shell > executor.$shell
|
||||||
|
installShellCompletion executor.$shell
|
||||||
|
done
|
||||||
|
'';
|
||||||
|
|
||||||
|
passthru.tests.version = testers.testVersion {
|
||||||
|
package = kaniko;
|
||||||
|
version = version;
|
||||||
|
command = "${kaniko}/bin/executor version";
|
||||||
|
};
|
||||||
|
|
||||||
|
meta = {
|
||||||
|
description = "A tool to build container images from a Dockerfile, inside a container or Kubernetes cluster";
|
||||||
|
homepage = "https://github.com/GoogleContainerTools/kaniko";
|
||||||
|
license = lib.licenses.asl20;
|
||||||
|
platforms = lib.platforms.linux;
|
||||||
|
maintainers = [ lib.maintainers.superherointj ];
|
||||||
|
mainProgram = "executor";
|
||||||
|
};
|
||||||
|
}
|
|
@ -2,11 +2,11 @@
|
||||||
|
|
||||||
let
|
let
|
||||||
pname = "rambox";
|
pname = "rambox";
|
||||||
version = "2.0.10";
|
version = "2.1.0";
|
||||||
|
|
||||||
src = fetchurl {
|
src = fetchurl {
|
||||||
url = "https://github.com/ramboxapp/download/releases/download/v${version}/Rambox-${version}-linux-x64.AppImage";
|
url = "https://github.com/ramboxapp/download/releases/download/v${version}/Rambox-${version}-linux-x64.AppImage";
|
||||||
sha256 = "sha256-NvsrWkdINrQV7V9SLfjtlN+obgQb0u8d/QgjGpZ+fpc=";
|
sha256 = "sha256-MQBDX4gCpEERdgimAAhKvnN76L1ckpsfWIHZqIsSJOE=";
|
||||||
};
|
};
|
||||||
|
|
||||||
desktopItem = (makeDesktopItem {
|
desktopItem = (makeDesktopItem {
|
||||||
|
|
|
@ -18,13 +18,13 @@ lib.checkListOfEnum "${pname}: theme variants" [ "default" "manjaro" "ubuntu" "a
|
||||||
|
|
||||||
stdenvNoCC.mkDerivation rec {
|
stdenvNoCC.mkDerivation rec {
|
||||||
inherit pname;
|
inherit pname;
|
||||||
version = "2022-11-05";
|
version = "2023-02-23";
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
src = fetchFromGitHub {
|
||||||
owner = "vinceliuice";
|
owner = "vinceliuice";
|
||||||
repo = pname;
|
repo = pname;
|
||||||
rev = version;
|
rev = version;
|
||||||
sha256 = "sha256-KQ3NmxNtJTURjH15hyZzngJ6aVTwlze28xQbRTlQmPE=";
|
sha256 = "sha256-yXpHm/iXtBdEo6m8W7Itp3N9vrWRTb7S3aKi0X2RObo=";
|
||||||
};
|
};
|
||||||
|
|
||||||
nativeBuildInputs = [ gtk3 jdupes ];
|
nativeBuildInputs = [ gtk3 jdupes ];
|
||||||
|
|
|
@ -84,7 +84,7 @@ in let
|
||||||
inherit (releaseInfo) release_version version;
|
inherit (releaseInfo) release_version version;
|
||||||
|
|
||||||
llvm_meta = {
|
llvm_meta = {
|
||||||
license = with lib.licenses; [ ncsa llvm-exception ];
|
license = with lib.licenses; [ ncsa asl20-llvm ];
|
||||||
maintainers = lib.teams.llvm.members;
|
maintainers = lib.teams.llvm.members;
|
||||||
platforms = lib.platforms.all;
|
platforms = lib.platforms.all;
|
||||||
};
|
};
|
||||||
|
|
|
@ -52,7 +52,7 @@ stdenv.mkDerivation rec {
|
||||||
meta = with lib; {
|
meta = with lib; {
|
||||||
description = "ABI Generic Analysis and Instrumentation Library";
|
description = "ABI Generic Analysis and Instrumentation Library";
|
||||||
homepage = "https://sourceware.org/libabigail/";
|
homepage = "https://sourceware.org/libabigail/";
|
||||||
license = with licenses; [ asl20 llvm-exception ];
|
license = licenses.asl20-llvm;
|
||||||
maintainers = with maintainers; [ jtojnar ];
|
maintainers = with maintainers; [ jtojnar ];
|
||||||
platforms = platforms.linux;
|
platforms = platforms.linux;
|
||||||
};
|
};
|
||||||
|
|
|
@ -63,6 +63,6 @@ stdenv.mkDerivation {
|
||||||
homepage = "https://wasi.dev";
|
homepage = "https://wasi.dev";
|
||||||
platforms = platforms.wasi;
|
platforms = platforms.wasi;
|
||||||
maintainers = with maintainers; [ matthewbauer rvolosatovs ];
|
maintainers = with maintainers; [ matthewbauer rvolosatovs ];
|
||||||
license = with licenses; [ asl20 mit llvm-exception ];
|
license = with licenses; [ asl20-llvm mit ];
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -22,12 +22,12 @@
|
||||||
|
|
||||||
buildPythonPackage rec {
|
buildPythonPackage rec {
|
||||||
pname = "python-manilaclient";
|
pname = "python-manilaclient";
|
||||||
version = "4.2.0";
|
version = "4.3.0";
|
||||||
format = "setuptools";
|
format = "setuptools";
|
||||||
|
|
||||||
src = fetchPypi {
|
src = fetchPypi {
|
||||||
inherit pname version;
|
inherit pname version;
|
||||||
hash = "sha256-Hf/U3LFcIsT00lIzvvZaowfMth/zj5WY6UAxYWjC1JA=";
|
hash = "sha256-Ek/RW7ZAZJhkgR6IJRvKGjtUKeHic8l5v1BuNECPiEQ=";
|
||||||
};
|
};
|
||||||
|
|
||||||
nativeBuildInputs = [
|
nativeBuildInputs = [
|
||||||
|
|
|
@ -12,14 +12,14 @@
|
||||||
|
|
||||||
buildPythonPackage rec {
|
buildPythonPackage rec {
|
||||||
pname = "python-swiftclient";
|
pname = "python-swiftclient";
|
||||||
version = "4.1.0";
|
version = "4.2.0";
|
||||||
format = "setuptools";
|
format = "setuptools";
|
||||||
|
|
||||||
disabled = pythonOlder "3.6";
|
disabled = pythonOlder "3.6";
|
||||||
|
|
||||||
src = fetchPypi {
|
src = fetchPypi {
|
||||||
inherit pname version;
|
inherit pname version;
|
||||||
hash = "sha256-+CKY5KSPfL3WgPJjjIXRynrhp27b4wA20htM16KcCes=";
|
hash = "sha256-o/Ynzp+1S1fTD9tB3DBb1eYFM+62mueeSWrU7F6EjIU=";
|
||||||
};
|
};
|
||||||
|
|
||||||
nativeBuildInputs = [
|
nativeBuildInputs = [
|
||||||
|
|
|
@ -4,42 +4,62 @@
|
||||||
, pkg-config
|
, pkg-config
|
||||||
, libgit2
|
, libgit2
|
||||||
, openssl
|
, openssl
|
||||||
|
, zlib
|
||||||
, stdenv
|
, stdenv
|
||||||
, darwin
|
, darwin
|
||||||
|
, git
|
||||||
}:
|
}:
|
||||||
|
|
||||||
rustPlatform.buildRustPackage rec {
|
rustPlatform.buildRustPackage rec {
|
||||||
pname = "cargo-semver-checks";
|
pname = "cargo-semver-checks";
|
||||||
version = "0.18.1";
|
version = "0.18.3";
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
src = fetchFromGitHub {
|
||||||
owner = "obi1kenobi";
|
owner = "obi1kenobi";
|
||||||
repo = pname;
|
repo = pname;
|
||||||
rev = "v${version}";
|
rev = "v${version}";
|
||||||
sha256 = "sha256-nxQ060M5TEUMKtJZ1j3A3v3s1cW1mnHy0/2ZXbxoaMc=";
|
sha256 = "sha256-PR8+4SK0Bb7+0fDwdvJBYERvhjWLXRGswNoEdRo5JiM=";
|
||||||
};
|
};
|
||||||
|
|
||||||
cargoSha256 = "sha256-D/rY9d50uKkheEeHe6S04TSdmTyUVgrABIYrFOuZudY=";
|
cargoSha256 = "sha256-wZR5ylhtdAUvpJ0raTM5IrbdmaHLPAYrAKU31oE8Bbg=";
|
||||||
|
|
||||||
nativeBuildInputs = [ pkg-config ];
|
nativeBuildInputs = [ pkg-config ];
|
||||||
|
|
||||||
buildInputs = [ libgit2 openssl ] ++ lib.optionals stdenv.isDarwin [
|
buildInputs = [
|
||||||
|
libgit2
|
||||||
|
openssl
|
||||||
|
zlib
|
||||||
|
] ++ lib.optionals stdenv.isDarwin [
|
||||||
darwin.apple_sdk.frameworks.Security
|
darwin.apple_sdk.frameworks.Security
|
||||||
];
|
];
|
||||||
|
|
||||||
|
nativeCheckInputs = [
|
||||||
|
git
|
||||||
|
];
|
||||||
|
|
||||||
checkFlags = [
|
checkFlags = [
|
||||||
# requires nightly version of cargo-rustdoc
|
# requires nightly version of cargo-rustdoc
|
||||||
"--skip=query::tests"
|
"--skip=both_passing_manifest_path_and_directory_works"
|
||||||
"--skip=verify_binary_contains_lints"
|
|
||||||
"--skip=rustdoc_cmd::tests"
|
"--skip=rustdoc_cmd::tests"
|
||||||
|
"--skip=verify_binary_contains_lints"
|
||||||
|
|
||||||
|
# requires internet access
|
||||||
|
"--skip=detects_target_dependencies"
|
||||||
];
|
];
|
||||||
|
|
||||||
|
preCheck = ''
|
||||||
|
patchShebangs scripts/regenerate_test_rustdocs.sh
|
||||||
|
git init
|
||||||
|
scripts/regenerate_test_rustdocs.sh
|
||||||
|
'';
|
||||||
|
|
||||||
# use system openssl
|
# use system openssl
|
||||||
OPENSSL_NO_VENDOR = true;
|
OPENSSL_NO_VENDOR = true;
|
||||||
|
|
||||||
meta = with lib; {
|
meta = with lib; {
|
||||||
description = "A tool to scan your Rust crate for semver violations";
|
description = "A tool to scan your Rust crate for semver violations";
|
||||||
homepage = "https://github.com/obi1kenobi/cargo-semver-checks";
|
homepage = "https://github.com/obi1kenobi/cargo-semver-checks";
|
||||||
|
changelog = "https://github.com/obi1kenobi/cargo-semver-checks/releases/tag/v${version}";
|
||||||
license = with licenses; [ mit /* or */ asl20 ];
|
license = with licenses; [ mit /* or */ asl20 ];
|
||||||
maintainers = with maintainers; [ figsoda matthiasbeyer ];
|
maintainers = with maintainers; [ figsoda matthiasbeyer ];
|
||||||
};
|
};
|
||||||
|
|
|
@ -22,6 +22,11 @@ let
|
||||||
rev = "3.0.1+driver";
|
rev = "3.0.1+driver";
|
||||||
sha256 = "sha256-bK9wv17bVl93rOqw7JICnMOM0fDtPIErfMmUmNKOD5c=";
|
sha256 = "sha256-bK9wv17bVl93rOqw7JICnMOM0fDtPIErfMmUmNKOD5c=";
|
||||||
};
|
};
|
||||||
|
# Workaround for scap-driver compilation error on kernel 6.2: https://github.com/falcosecurity/libs/issues/918
|
||||||
|
driverPatch = fetchpatch {
|
||||||
|
url = "https://github.com/falcosecurity/libs/commit/b8ec3e8637c850066d01543616fe413e8deb9e1f.patch";
|
||||||
|
hash = "sha256-s7iHbOjVqHSWRY4gktZldgrU5OClqRmbqmDtUgFIeh0=";
|
||||||
|
};
|
||||||
|
|
||||||
in
|
in
|
||||||
stdenv.mkDerivation rec {
|
stdenv.mkDerivation rec {
|
||||||
|
@ -67,6 +72,7 @@ stdenv.mkDerivation rec {
|
||||||
chmod -R +w libs
|
chmod -R +w libs
|
||||||
cp -r ${driver} driver-src
|
cp -r ${driver} driver-src
|
||||||
chmod -R +w driver-src
|
chmod -R +w driver-src
|
||||||
|
patch -p1 -d driver-src < ${driverPatch}
|
||||||
cmakeFlagsArray+=(
|
cmakeFlagsArray+=(
|
||||||
"-DFALCOSECURITY_LIBS_SOURCE_DIR=$(pwd)/libs"
|
"-DFALCOSECURITY_LIBS_SOURCE_DIR=$(pwd)/libs"
|
||||||
"-DVALIJSON_INCLUDE=${valijson}/include"
|
"-DVALIJSON_INCLUDE=${valijson}/include"
|
||||||
|
|
|
@ -8773,6 +8773,8 @@ with pkgs;
|
||||||
|
|
||||||
kakoune-cr = callPackage ../tools/misc/kakoune-cr { crystal = crystal_1_2; };
|
kakoune-cr = callPackage ../tools/misc/kakoune-cr { crystal = crystal_1_2; };
|
||||||
|
|
||||||
|
kaniko = callPackage ../applications/networking/cluster/kaniko { };
|
||||||
|
|
||||||
katana = callPackage ../tools/security/katana { };
|
katana = callPackage ../tools/security/katana { };
|
||||||
|
|
||||||
katriawm = callPackage ../applications/window-managers/katriawm { };
|
katriawm = callPackage ../applications/window-managers/katriawm { };
|
||||||
|
|
Loading…
Reference in a new issue