From 78b06757c29a0b662e9463a9b4a29162fae8ef65 Mon Sep 17 00:00:00 2001 From: Samuel Leathers Date: Sat, 17 Mar 2018 20:30:44 -0400 Subject: [PATCH 01/33] powerdns: adding disassembler as maintainer --- pkgs/servers/dns/powerdns/default.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/servers/dns/powerdns/default.nix b/pkgs/servers/dns/powerdns/default.nix index cde2fe1a426c..4884cebc8158 100644 --- a/pkgs/servers/dns/powerdns/default.nix +++ b/pkgs/servers/dns/powerdns/default.nix @@ -47,6 +47,6 @@ stdenv.mkDerivation rec { platforms = platforms.linux; # cannot find postgresql libs on macos x license = licenses.gpl2; - maintainers = [ maintainers.mic92 ]; + maintainers = with maintainers; [ mic92 disassembler ]; }; } From f515ca67f5b363c2da4ac9fe2cdd9e4079203e70 Mon Sep 17 00:00:00 2001 From: Samuel Leathers Date: Sat, 17 Mar 2018 19:05:27 -0400 Subject: [PATCH 02/33] nixos/dnsdist: initial service --- nixos/modules/module-list.nix | 1 + nixos/modules/services/networking/dnsdist.nix | 61 +++++++++++++++++++ 2 files changed, 62 insertions(+) create mode 100644 nixos/modules/services/networking/dnsdist.nix diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index 505c5497d36d..4110fb6443ae 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -467,6 +467,7 @@ ./services/networking/dnschain.nix ./services/networking/dnscrypt-proxy.nix ./services/networking/dnscrypt-wrapper.nix + ./services/networking/dnsdist.nix ./services/networking/dnsmasq.nix ./services/networking/ejabberd.nix ./services/networking/fakeroute.nix diff --git a/nixos/modules/services/networking/dnsdist.nix b/nixos/modules/services/networking/dnsdist.nix new file mode 100644 index 000000000000..12eee136e639 --- /dev/null +++ b/nixos/modules/services/networking/dnsdist.nix @@ -0,0 +1,61 @@ +{ config, lib, pkgs, ... }: + +with lib; + +let + cfg = config.services.dnsdist; + configFile = pkgs.writeText "dndist.conf" '' + setLocal('${cfg.listenAddress}:${toString cfg.listenPort}') + ${cfg.extraConfig} + ''; +in { + options = { + services.dnsdist = { + enable = mkEnableOption "dnsdist domain name server"; + + listenAddress = mkOption { + type = types.str; + description = "Listen IP Address"; + default = "0.0.0.0"; + }; + listenPort = mkOption { + type = types.int; + description = "Listen port"; + default = 53; + }; + + extraConfig = mkOption { + type = types.lines; + default = '' + ''; + description = '' + Extra lines to be added verbatim to dnsdist.conf. + ''; + }; + }; + }; + + config = mkIf config.services.dnsdist.enable { + systemd.services.dnsdist = { + description = "dnsdist load balancer"; + wantedBy = [ "multi-user.target" ]; + after = ["network.target"]; + + serviceConfig = { + Restart="on-failure"; + RestartSec="1"; + DynamicUser = true; + StartLimitInterval="0"; + PrivateTmp=true; + PrivateDevices=true; + CapabilityBoundingSet="CAP_NET_BIND_SERVICE CAP_SETGID CAP_SETUID"; + ExecStart = "${pkgs.dnsdist}/bin/dnsdist --supervised --disable-syslog --config ${configFile}"; + ProtectSystem="full"; + ProtectHome=true; + RestrictAddressFamilies="AF_UNIX AF_INET AF_INET6"; + LimitNOFILE="16384"; + TasksMax="8192"; + }; + }; + }; +} From ae1e304a60a702b983fa1890e1ebcbfef96b1f61 Mon Sep 17 00:00:00 2001 From: toonn Date: Sat, 30 Dec 2017 23:23:07 +0100 Subject: [PATCH 03/33] haskell docs: add info about hoogle's --local flag to section 9.5.2.3 Relevant section: 9.5.2.3. How to install a compiler with libraries, hoogle and documentation indexes Since version 5 `hoogle server`s --local flag solves the problem with links from `http:` to `file:` URIs: hoogle server --local -p 8080 --- doc/languages-frameworks/haskell.section.md | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/doc/languages-frameworks/haskell.section.md b/doc/languages-frameworks/haskell.section.md index 3b8971c295bb..e5b725b1d5e2 100644 --- a/doc/languages-frameworks/haskell.section.md +++ b/doc/languages-frameworks/haskell.section.md @@ -337,7 +337,12 @@ Finally, you can run hoogle server -p 8080 --local ``` and navigate to http://localhost:8080/ for your own local -[Hoogle](https://www.haskell.org/hoogle/). +[Hoogle](https://www.haskell.org/hoogle/). Note, however, that Firefox and +possibly other browsers disallow navigation from `http:` to `file:` URIs for +security reasons, which might be quite an inconvenience. Since version 5 hoogle +server has a `--local` flag that solves the problem. For older versions see +[this page](http://kb.mozillazine.org/Links_to_local_pages_do_not_work) for +workarounds. ### How to build a Haskell project using Stack From c17061efd46e71e417cc2d1ffe22a4be48c48370 Mon Sep 17 00:00:00 2001 From: toonn Date: Sun, 31 Dec 2017 01:44:23 +0100 Subject: [PATCH 04/33] haskell docs: add explanation of what the --local flag does and the service --- doc/languages-frameworks/haskell.section.md | 24 ++++++++++++++++----- 1 file changed, 19 insertions(+), 5 deletions(-) diff --git a/doc/languages-frameworks/haskell.section.md b/doc/languages-frameworks/haskell.section.md index e5b725b1d5e2..59951d46a79a 100644 --- a/doc/languages-frameworks/haskell.section.md +++ b/doc/languages-frameworks/haskell.section.md @@ -334,16 +334,30 @@ navigate there. Finally, you can run ```shell -hoogle server -p 8080 --local +hoogle server --local -p 8080 ``` and navigate to http://localhost:8080/ for your own local -[Hoogle](https://www.haskell.org/hoogle/). Note, however, that Firefox and -possibly other browsers disallow navigation from `http:` to `file:` URIs for -security reasons, which might be quite an inconvenience. Since version 5 hoogle -server has a `--local` flag that solves the problem. For older versions see +[Hoogle](https://www.haskell.org/hoogle/). The `--local` flag makes the hoogle +server serve files from your nix store over http, without the flag it will use +`file:\\` URIs. Note, however, that Firefox and possibly other browsers +disallow navigation from `http://` to `file://` URIs for security reasons, +which might be quite an inconvenience. Versions before v5 did not have this +flag. See [this page](http://kb.mozillazine.org/Links_to_local_pages_do_not_work) for workarounds. +For NixOS users there's a service which runs this exact command for you. +Specify the `packages` you want documentation for and the `haskellPackages` set +you want them to come from. Add the following to `configuration.nix`. + +```nix +services.hoogle = { +enable = true; +packages = (hpkgs: with hpkgs; [text cryptonite]); +haskellPackages = pkgs.haskellPackages; +}; +``` + ### How to build a Haskell project using Stack [Stack](http://haskellstack.org) is a popular build tool for Haskell projects. From 6caf7c9d85ca23dd87dd25730137e3cae02949e8 Mon Sep 17 00:00:00 2001 From: toonn Date: Sun, 31 Dec 2017 02:12:16 +0100 Subject: [PATCH 05/33] Flipped URI slashes --- doc/languages-frameworks/haskell.section.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/doc/languages-frameworks/haskell.section.md b/doc/languages-frameworks/haskell.section.md index 59951d46a79a..74cb0da15700 100644 --- a/doc/languages-frameworks/haskell.section.md +++ b/doc/languages-frameworks/haskell.section.md @@ -339,7 +339,7 @@ hoogle server --local -p 8080 and navigate to http://localhost:8080/ for your own local [Hoogle](https://www.haskell.org/hoogle/). The `--local` flag makes the hoogle server serve files from your nix store over http, without the flag it will use -`file:\\` URIs. Note, however, that Firefox and possibly other browsers +`file://` URIs. Note, however, that Firefox and possibly other browsers disallow navigation from `http://` to `file://` URIs for security reasons, which might be quite an inconvenience. Versions before v5 did not have this flag. See From f9a23fe0a62b00874cd92ef53329ad230046fd5e Mon Sep 17 00:00:00 2001 From: Frank Doepper Date: Mon, 11 Jun 2018 19:30:14 +0200 Subject: [PATCH 06/33] nixos/zfs: fix vdev_id PATH closes #41602 --- pkgs/os-specific/linux/zfs/default.nix | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/pkgs/os-specific/linux/zfs/default.nix b/pkgs/os-specific/linux/zfs/default.nix index b28a5c6416d0..232d647e1220 100644 --- a/pkgs/os-specific/linux/zfs/default.nix +++ b/pkgs/os-specific/linux/zfs/default.nix @@ -6,6 +6,7 @@ , zlib, libuuid, python, attr, openssl , libtirpc , nfs-utils +, gawk, gnugrep, gnused, systemd # Kernel dependencies , kernel ? null, spl ? null, splUnstable ? null, splLegacyCrypto ? null @@ -82,6 +83,9 @@ let do substituteInPlace "$f" --replace "/lib/udev/vdev_id" "$out/lib/udev/vdev_id" done + substituteInPlace ./cmd/vdev_id/vdev_id \ + --replace "PATH=/bin:/sbin:/usr/bin:/usr/sbin" \ + "PATH=${makeBinPath [ coreutils gawk gnused gnugrep systemd ]}" ./autogen.sh configureFlagsArray+=("--libexecdir=$out/libexec") From 38fc5b3200368c5162c6756b784a5921e9e0b099 Mon Sep 17 00:00:00 2001 From: Johan Thomsen Date: Tue, 12 Jun 2018 13:53:46 +0200 Subject: [PATCH 07/33] kubernetes: 1.10.3 -> 1.10.4 --- pkgs/applications/networking/cluster/kubernetes/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/applications/networking/cluster/kubernetes/default.nix b/pkgs/applications/networking/cluster/kubernetes/default.nix index 65fd22cdf47a..59b3ab7e8b4c 100644 --- a/pkgs/applications/networking/cluster/kubernetes/default.nix +++ b/pkgs/applications/networking/cluster/kubernetes/default.nix @@ -16,13 +16,13 @@ with lib; stdenv.mkDerivation rec { name = "kubernetes-${version}"; - version = "1.10.3"; + version = "1.10.4"; src = fetchFromGitHub { owner = "kubernetes"; repo = "kubernetes"; rev = "v${version}"; - sha256 = "1la9cdf5a67kg72xn4bn5mib1caiv5vxsjmnxqsmx0m7vhbv5i4n"; + sha256 = "0q1llnqy83fkx3vhcfjyl3frd41h7g1cvl38lfhsz1z1v9av3bpd"; }; # Build using golang v1.9 in accordance with https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG-1.10.md#external-dependencies From eeeaab8d5e0eb262555313cbb6aaecd772cdc296 Mon Sep 17 00:00:00 2001 From: John Ericson Date: Tue, 12 Jun 2018 13:54:26 -0400 Subject: [PATCH 08/33] haskell generic-builder: Fix setup depends I was referring to the wrong package db in a few places. Thanks @ElvishJerricco for catching. --- .../haskell-modules/generic-builder.nix | 20 +++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/pkgs/development/haskell-modules/generic-builder.nix b/pkgs/development/haskell-modules/generic-builder.nix index 629910fd62e1..17bc8b479c76 100644 --- a/pkgs/development/haskell-modules/generic-builder.nix +++ b/pkgs/development/haskell-modules/generic-builder.nix @@ -167,7 +167,11 @@ let ] ++ crossCabalFlags); setupCompileFlags = [ - (optionalString (!coreSetup) "-${nativePackageDbFlag}=$packageConfDir") + (optionalString (!coreSetup) "-${nativePackageDbFlag}=${ + if setupHaskellDepends != [] + then "$setupPackageConfDir" + else "$packageConfDir" + }") (optionalString (isGhcjs || isHaLVM || versionOlder "7.8" ghc.version) "-j$NIX_BUILD_CORES") # https://github.com/haskell/cabal/issues/2398 (optionalString (versionOlder "7.10" ghc.version && !isHaLVM) "-threaded") @@ -205,9 +209,9 @@ let nativeGhcCommand = "${nativeGhc.targetPrefix}ghc"; - buildPkgDb = ghcName: '' + buildPkgDb = ghcName: packageConfDir: '' if [ -d "$p/lib/${ghcName}/package.conf.d" ]; then - cp -f "$p/lib/${ghcName}/package.conf.d/"*.conf $packageConfDir/ + cp -f "$p/lib/${ghcName}/package.conf.d/"*.conf ${packageConfDir}/ continue fi if [ -d "$p/include" ]; then @@ -280,7 +284,7 @@ stdenv.mkDerivation ({ # pkgs* arrays defined in stdenv/setup.hs + (optionalString (setupHaskellDepends != []) '' for p in "''${pkgsBuildBuild[@]}" "''${pkgsBuildHost[@]}" "''${pkgsBuildTarget[@]}"; do - ${buildPkgDb nativeGhc.name} + ${buildPkgDb nativeGhc.name "$setupPackageConfDir"} done ${nativeGhcCommand}-pkg --${nativePackageDbFlag}="$setupPackageConfDir" recache '') @@ -288,7 +292,7 @@ stdenv.mkDerivation ({ # For normal components + '' for p in "''${pkgsHostHost[@]}" "''${pkgsHostTarget[@]}"; do - ${buildPkgDb ghc.name} + ${buildPkgDb ghc.name "$packageConfDir"} done '' # only use the links hack if we're actually building dylibs. otherwise, the @@ -323,11 +327,7 @@ stdenv.mkDerivation ({ done echo setupCompileFlags: $setupCompileFlags - ${optionalString (setupHaskellDepends != []) - '' - echo GHC_PACKAGE_PATH="$setupPackageConfDir:" - GHC_PACKAGE_PATH="$setupPackageConfDir:" '' - }${nativeGhcCommand} $setupCompileFlags --make -o Setup -odir $TMPDIR -hidir $TMPDIR $i + ${nativeGhcCommand} $setupCompileFlags --make -o Setup -odir $TMPDIR -hidir $TMPDIR $i runHook postCompileBuildDriver ''; From 8d7ea96a13ab569d69aa7feaaa99f0d896b4f97a Mon Sep 17 00:00:00 2001 From: Johan Thomsen Date: Fri, 8 Jun 2018 10:16:43 +0200 Subject: [PATCH 09/33] nixos/kubernetes: improvements - Added option 'cni.configDir' to allow for having CNI config outside of nix-store Existing behavior (writing verbatim CNI conf-files to nix-store) is still available. - Removed unused option 'apiserver.publicAddress' and changed 'apiserver.address' to 'bindAddress' This conforms better to k8s docs and removes existing --bind-address hardcoding to 0.0.0.0 - Fixed c/p mistake in apiserver systemd unit description - Updated 18.09 release notes to reflect changes to existing options And fixed some typos from previous PR - Make docker images for Kubernetes Dashboard and kube-dns configurable --- nixos/doc/manual/release-notes/rl-1809.xml | 15 +++- nixos/modules/rename.nix | 2 + .../services/cluster/kubernetes/dashboard.nix | 35 ++++++---- .../services/cluster/kubernetes/default.nix | 47 ++++++++----- .../services/cluster/kubernetes/dns.nix | 69 +++++++++++-------- 5 files changed, 105 insertions(+), 63 deletions(-) diff --git a/nixos/doc/manual/release-notes/rl-1809.xml b/nixos/doc/manual/release-notes/rl-1809.xml index 72f96f1ca1a2..f57fd75c782d 100644 --- a/nixos/doc/manual/release-notes/rl-1809.xml +++ b/nixos/doc/manual/release-notes/rl-1809.xml @@ -288,11 +288,24 @@ inherit (pkgs.nixos { - Recommented way to access the Kubernetes Dashboard is with HTTPS (TLS) + Recommended way to access the Kubernetes Dashboard is via HTTPS (TLS) Therefore; public service port for the dashboard has changed to 443 (container port 8443) and scheme to https. + + + The option services.kubernetes.apiserver.address + was renamed to services.kubernetes.apiserver.bindAddress. + Note that the default value has changed from 127.0.0.1 to 0.0.0.0. + + + + + The option services.kubernetes.apiserver.publicAddress + was not used and thus has been removed. + + diff --git a/nixos/modules/rename.nix b/nixos/modules/rename.nix index 9b9e9e7109de..2df737452fbc 100644 --- a/nixos/modules/rename.nix +++ b/nixos/modules/rename.nix @@ -32,6 +32,8 @@ with lib; (mkRenamedOptionModule [ "services" "i2pd" "extIp" ] [ "services" "i2pd" "address" ]) (mkRenamedOptionModule [ "services" "kibana" "host" ] [ "services" "kibana" "listenAddress" ]) (mkRenamedOptionModule [ "services" "kubernetes" "apiserver" "admissionControl" ] [ "services" "kubernetes" "apiserver" "enableAdmissionPlugins" ]) + (mkRenamedOptionModule [ "services" "kubernetes" "apiserver" "address" ] ["services" "kubernetes" "apiserver" "bindAddress"]) + (mkRemovedOptionModule [ "services" "kubernetes" "apiserver" "publicAddress" ] "") (mkRenamedOptionModule [ "services" "logstash" "address" ] [ "services" "logstash" "listenAddress" ]) (mkRenamedOptionModule [ "services" "mpd" "network" "host" ] [ "services" "mpd" "network" "listenAddress" ]) (mkRenamedOptionModule [ "services" "neo4j" "host" ] [ "services" "neo4j" "listenAddress" ]) diff --git a/nixos/modules/services/cluster/kubernetes/dashboard.nix b/nixos/modules/services/cluster/kubernetes/dashboard.nix index 8c1f35ec651b..9c1f814b683c 100644 --- a/nixos/modules/services/cluster/kubernetes/dashboard.nix +++ b/nixos/modules/services/cluster/kubernetes/dashboard.nix @@ -4,16 +4,6 @@ with lib; let cfg = config.services.kubernetes.addons.dashboard; - - name = "k8s.gcr.io/kubernetes-dashboard-amd64"; - version = "v1.8.3"; - - image = pkgs.dockerTools.pullImage { - imageName = name; - imageDigest = "sha256:dc4026c1b595435ef5527ca598e1e9c4343076926d7d62b365c44831395adbd0"; - finalImageTag = version; - sha256 = "18ajcg0q1vignfjk2sm4xj4wzphfz8wah69ps8dklqfvv0164mc8"; - }; in { options.services.kubernetes.addons.dashboard = { enable = mkEnableOption "kubernetes dashboard addon"; @@ -23,10 +13,27 @@ in { type = types.bool; default = elem "RBAC" config.services.kubernetes.apiserver.authorizationMode; }; + + version = mkOption { + description = "Which version of the kubernetes dashboard to deploy"; + type = types.str; + default = "v1.8.3"; + }; + + image = mkOption { + description = "Docker image to seed for the kubernetes dashboard container."; + type = types.attrs; + default = { + imageName = "k8s.gcr.io/kubernetes-dashboard-amd64"; + imageDigest = "sha256:dc4026c1b595435ef5527ca598e1e9c4343076926d7d62b365c44831395adbd0"; + finalImageTag = cfg.version; + sha256 = "18ajcg0q1vignfjk2sm4xj4wzphfz8wah69ps8dklqfvv0164mc8"; + }; + }; }; config = mkIf cfg.enable { - services.kubernetes.kubelet.seedDockerImages = [image]; + services.kubernetes.kubelet.seedDockerImages = [(pkgs.dockerTools.pullImage cfg.image)]; services.kubernetes.addonManager.addons = { kubernetes-dashboard-deployment = { @@ -36,7 +43,7 @@ in { labels = { k8s-addon = "kubernetes-dashboard.addons.k8s.io"; k8s-app = "kubernetes-dashboard"; - version = version; + version = cfg.version; "kubernetes.io/cluster-service" = "true"; "addonmanager.kubernetes.io/mode" = "Reconcile"; }; @@ -52,7 +59,7 @@ in { labels = { k8s-addon = "kubernetes-dashboard.addons.k8s.io"; k8s-app = "kubernetes-dashboard"; - version = version; + version = cfg.version; "kubernetes.io/cluster-service" = "true"; }; annotations = { @@ -63,7 +70,7 @@ in { priorityClassName = "system-cluster-critical"; containers = [{ name = "kubernetes-dashboard"; - image = "${name}:${version}"; + image = with cfg.image; "${imageName}:${finalImageTag}"; ports = [{ containerPort = 8443; protocol = "TCP"; diff --git a/nixos/modules/services/cluster/kubernetes/default.nix b/nixos/modules/services/cluster/kubernetes/default.nix index e624f41601b3..20f2308508c6 100644 --- a/nixos/modules/services/cluster/kubernetes/default.nix +++ b/nixos/modules/services/cluster/kubernetes/default.nix @@ -73,7 +73,9 @@ let mkKubeConfigOptions = prefix: { server = mkOption { description = "${prefix} kube-apiserver server address."; - default = "http://${cfg.apiserver.address}:${toString cfg.apiserver.port}"; + default = "http://${if cfg.apiserver.advertiseAddress != null + then cfg.apiserver.advertiseAddress + else "127.0.0.1"}:${toString cfg.apiserver.port}"; type = types.str; }; @@ -103,12 +105,18 @@ let keyFile = mkDefault cfg.kubeconfig.keyFile; }; - cniConfig = pkgs.buildEnv { - name = "kubernetes-cni-config"; - paths = imap (i: entry: - pkgs.writeTextDir "${toString (10+i)}-${entry.type}.conf" (builtins.toJSON entry) - ) cfg.kubelet.cni.config; - }; + cniConfig = + if cfg.kubelet.cni.config != [] && !(isNull cfg.kubelet.cni.configDir) then + throw "Verbatim CNI-config and CNI configDir cannot both be set." + else if !(isNull cfg.kubelet.cni.configDir) then + cfg.kubelet.cni.configDir + else + (pkgs.buildEnv { + name = "kubernetes-cni-config"; + paths = imap (i: entry: + pkgs.writeTextDir "${toString (10+i)}-${entry.type}.conf" (builtins.toJSON entry) + ) cfg.kubelet.cni.config; + }); manifests = pkgs.buildEnv { name = "kubernetes-manifests"; @@ -244,18 +252,13 @@ in { type = types.listOf types.str; }; - address = mkOption { - description = "Kubernetes apiserver listening address."; - default = "127.0.0.1"; - type = types.str; - }; - - publicAddress = mkOption { + bindAddress = mkOption { description = '' - Kubernetes apiserver public listening address used for read only and - secure port. + The IP address on which to listen for the --secure-port port. + The associated interface(s) must be reachable by the rest + of the cluster, and by CLI/web clients. ''; - default = cfg.apiserver.address; + default = "0.0.0.0"; type = types.str; }; @@ -670,6 +673,12 @@ in { }] ''; }; + + configDir = mkOption { + description = "Path to Kubernetes CNI configuration directory."; + type = types.nullOr types.path; + default = null; + }; }; manifests = mkOption { @@ -892,7 +901,7 @@ in { (mkIf cfg.apiserver.enable { systemd.services.kube-apiserver = { - description = "Kubernetes Kubelet Service"; + description = "Kubernetes APIServer Service"; wantedBy = [ "kubernetes.target" ]; after = [ "network.target" "docker.service" ]; serviceConfig = { @@ -906,7 +915,7 @@ in { ${optionalString (cfg.etcd.keyFile != null) "--etcd-keyfile=${cfg.etcd.keyFile}"} \ --insecure-port=${toString cfg.apiserver.port} \ - --bind-address=${toString cfg.apiserver.address} \ + --bind-address=${cfg.apiserver.bindAddress} \ ${optionalString (cfg.apiserver.advertiseAddress != null) "--advertise-address=${cfg.apiserver.advertiseAddress}"} \ --allow-privileged=${boolToString cfg.apiserver.allowPrivileged}\ diff --git a/nixos/modules/services/cluster/kubernetes/dns.nix b/nixos/modules/services/cluster/kubernetes/dns.nix index 9751e5f7cf0a..43bbb50a48d4 100644 --- a/nixos/modules/services/cluster/kubernetes/dns.nix +++ b/nixos/modules/services/cluster/kubernetes/dns.nix @@ -4,28 +4,6 @@ with lib; let version = "1.14.10"; - - k8s-dns-kube-dns = pkgs.dockerTools.pullImage { - imageName = "k8s.gcr.io/k8s-dns-kube-dns-amd64"; - imageDigest = "sha256:b99fc3eee2a9f052f7eb4cc00f15eb12fc405fa41019baa2d6b79847ae7284a8"; - finalImageTag = version; - sha256 = "0x583znk9smqn0fix7ld8sm5jgaxhqhx3fq97b1wkqm7iwhvl3pj"; - }; - - k8s-dns-dnsmasq-nanny = pkgs.dockerTools.pullImage { - imageName = "k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64"; - imageDigest = "sha256:bbb2a290a568125b3b996028958eb773f33b5b87a6b37bf38a28f8b62dddb3c8"; - finalImageTag = version; - sha256 = "1fihml7s2mfwgac51cbqpylkwbivc8nyhgi4vb820s83zvl8a6y1"; - }; - - k8s-dns-sidecar = pkgs.dockerTools.pullImage { - imageName = "k8s.gcr.io/k8s-dns-sidecar-amd64"; - imageDigest = "sha256:4f1ab957f87b94a5ec1edc26fae50da2175461f00afecf68940c4aa079bd08a4"; - finalImageTag = version; - sha256 = "08l1bv5jgrhvjzpqpbinrkgvv52snc4fzyd8ya9v18ns2klyz7m0"; - }; - cfg = config.services.kubernetes.addons.dns; in { options.services.kubernetes.addons.dns = { @@ -48,13 +26,46 @@ in { default = "cluster.local"; type = types.str; }; + + kube-dns = mkOption { + description = "Docker image to seed for the kube-dns main container."; + type = types.attrs; + default = { + imageName = "k8s.gcr.io/k8s-dns-kube-dns-amd64"; + imageDigest = "sha256:b99fc3eee2a9f052f7eb4cc00f15eb12fc405fa41019baa2d6b79847ae7284a8"; + finalImageTag = version; + sha256 = "0x583znk9smqn0fix7ld8sm5jgaxhqhx3fq97b1wkqm7iwhvl3pj"; + }; + }; + + dnsmasq-nanny = mkOption { + description = "Docker image to seed for the kube-dns dnsmasq container."; + type = types.attrs; + default = { + imageName = "k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64"; + imageDigest = "sha256:bbb2a290a568125b3b996028958eb773f33b5b87a6b37bf38a28f8b62dddb3c8"; + finalImageTag = version; + sha256 = "1fihml7s2mfwgac51cbqpylkwbivc8nyhgi4vb820s83zvl8a6y1"; + }; + }; + + sidecar = mkOption { + description = "Docker image to seed for the kube-dns sidecar container."; + type = types.attrs; + default = { + imageName = "k8s.gcr.io/k8s-dns-sidecar-amd64"; + imageDigest = "sha256:4f1ab957f87b94a5ec1edc26fae50da2175461f00afecf68940c4aa079bd08a4"; + finalImageTag = version; + sha256 = "08l1bv5jgrhvjzpqpbinrkgvv52snc4fzyd8ya9v18ns2klyz7m0"; + }; + }; }; config = mkIf cfg.enable { - services.kubernetes.kubelet.seedDockerImages = [ - k8s-dns-kube-dns - k8s-dns-dnsmasq-nanny - k8s-dns-sidecar + services.kubernetes.kubelet.seedDockerImages = with pkgs.dockerTools; [ + (pullImage cfg.kube-dns) + (pullImage cfg.dnsmasq-nanny) + (pullImage cfg.sidecar) ]; services.kubernetes.addonManager.addons = { @@ -88,7 +99,7 @@ in { containers = [ { name = "kubedns"; - image = "k8s.gcr.io/k8s-dns-kube-dns-amd64:${version}"; + image = with cfg.kube-dns; "${imageName}:${finalImageTag}"; resources = { limits.memory = "170Mi"; requests = { @@ -154,7 +165,7 @@ in { } { name = "dnsmasq"; - image = "k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:${version}"; + image = with cfg.dnsmasq-nanny; "${imageName}:${finalImageTag}"; livenessProbe = { httpGet = { path = "/healthcheck/dnsmasq"; @@ -206,7 +217,7 @@ in { } { name = "sidecar"; - image = "k8s.gcr.io/k8s-dns-sidecar-amd64:${version}"; + image = with cfg.sidecar; "${imageName}:${finalImageTag}"; livenessProbe = { httpGet = { path = "/metrics"; From 96d6ef3442e90196b57d208b4d44c92c9ba3e845 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?J=C3=B6rg=20Thalheim?= Date: Tue, 24 Apr 2018 23:39:08 +0100 Subject: [PATCH 10/33] dino: 2018-04-19 -> 2018-06-03 --- .../networking/instant-messengers/dino/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/applications/networking/instant-messengers/dino/default.nix b/pkgs/applications/networking/instant-messengers/dino/default.nix index 32808f720bf1..2cd30ab9604b 100644 --- a/pkgs/applications/networking/instant-messengers/dino/default.nix +++ b/pkgs/applications/networking/instant-messengers/dino/default.nix @@ -13,13 +13,13 @@ }: stdenv.mkDerivation rec { - name = "dino-unstable-2018-04-19"; + name = "dino-unstable-2018-06-03"; src = fetchFromGitHub { owner = "dino"; repo = "dino"; - rev = "e80da806022d8aaa32f77f3c7f0333cc1c80829b"; - sha256 = "04z4k1s4ck6vmbzlbpiw096ny0wpj4zi3cd0iv9vb2iwdj22gibm"; + rev = "52e116ee44be1667660c08858a28fe8fda125f79"; + sha256 = "1yybmjd50r41366clrsw21qybbpjfkvim2n5b3dkcagjnifak0zl"; fetchSubmodules = true; }; From 71f1f9b8ff35191b65d87d572274fa6e71c3cf59 Mon Sep 17 00:00:00 2001 From: obadz Date: Tue, 12 Jun 2018 23:57:18 +0100 Subject: [PATCH 11/33] weechat: fix binary name (was renamed to `weechat-2.1` in af9d10a as discussed in https://github.com/NixOS/nixpkgs/commit/7cd7e4ce267faac9acfa2dd421d3583ec6f43d01#commitcomment-29325227) --- pkgs/applications/networking/irc/weechat/default.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/applications/networking/irc/weechat/default.nix b/pkgs/applications/networking/irc/weechat/default.nix index 0d9320c12e27..dec933489af9 100644 --- a/pkgs/applications/networking/irc/weechat/default.nix +++ b/pkgs/applications/networking/irc/weechat/default.nix @@ -117,7 +117,7 @@ in if configure == null then weechat else ln -s $plugin $out/plugins done ''; - in (writeScriptBin weechat.name '' + in (writeScriptBin "weechat" '' #!${stdenv.shell} export WEECHAT_EXTRA_LIBDIR=${pluginsDir} ${lib.concatMapStringsSep "\n" (p: lib.optionalString (p ? extraEnv) p.extraEnv) plugins} From afad9983e319be2a9c732f53a41cd092b548a0fd Mon Sep 17 00:00:00 2001 From: Shea Levy Date: Tue, 12 Jun 2018 19:01:24 -0400 Subject: [PATCH 12/33] rust: Fix typo in binary build comment. Pointed out by @Havvy. --- pkgs/development/compilers/rust/binaryBuild.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/development/compilers/rust/binaryBuild.nix b/pkgs/development/compilers/rust/binaryBuild.nix index 849917c4a0c4..4c3c5d008f06 100644 --- a/pkgs/development/compilers/rust/binaryBuild.nix +++ b/pkgs/development/compilers/rust/binaryBuild.nix @@ -70,7 +70,7 @@ rec { # Do NOT, I repeat, DO NOT use `wrapProgram` on $out/bin/rustc # (or similar) here. It causes strange effects where rustc loads # the wrong libraries in a bootstrap-build causing failures that - # are very hard to track dow. For details, see + # are very hard to track down. For details, see # https://github.com/rust-lang/rust/issues/34722#issuecomment-232164943 ''; }; From 2483720ad91cfaa278583ad4deea317dc2388319 Mon Sep 17 00:00:00 2001 From: Uli Baum Date: Wed, 13 Jun 2018 01:08:30 +0200 Subject: [PATCH 13/33] xlockmore: disable format hardening to fix build build output was empty since hardening was enabled by default --- pkgs/misc/screensavers/xlockmore/default.nix | 2 ++ 1 file changed, 2 insertions(+) diff --git a/pkgs/misc/screensavers/xlockmore/default.nix b/pkgs/misc/screensavers/xlockmore/default.nix index ddb4235c5dba..b9294e294e9d 100644 --- a/pkgs/misc/screensavers/xlockmore/default.nix +++ b/pkgs/misc/screensavers/xlockmore/default.nix @@ -30,6 +30,8 @@ stdenv.mkDerivation rec { configureFlags+=" --enable-appdefaultdir=$out/share/X11/app-defaults" ''; + hardeningDisable = [ "format" ]; # no build output otherwise + meta = with lib; { description = "Screen locker for the X Window System"; homepage = http://sillycycle.com/xlockmore.html; From 3ae018592de58f234f45f1da44dc5f40a2cd6833 Mon Sep 17 00:00:00 2001 From: volth Date: Tue, 12 Jun 2018 23:27:52 +0000 Subject: [PATCH 14/33] nixos/tinc: minor fixes --- nixos/modules/services/networking/tinc.nix | 10 +++------- 1 file changed, 3 insertions(+), 7 deletions(-) diff --git a/nixos/modules/services/networking/tinc.nix b/nixos/modules/services/networking/tinc.nix index e3c9b5282b8c..77bcdae80191 100644 --- a/nixos/modules/services/networking/tinc.nix +++ b/nixos/modules/services/networking/tinc.nix @@ -163,12 +163,7 @@ in wantedBy = [ "multi-user.target" ]; after = [ "network.target" ]; path = [ data.package ]; - restartTriggers = - let - drvlist = [ config.environment.etc."tinc/${network}/tinc.conf".source ] - ++ mapAttrsToList (host: _: config.environment.etc."tinc/${network}/hosts/${host}".source) data.hosts; - in # drvlist might be too long to be used directly - [ (builtins.hashString "sha256" (concatMapStrings (d: d.outPath) drvlist)) ]; + restartTriggers = [ config.environment.etc."tinc/${network}/tinc.conf".source ]; serviceConfig = { Type = "simple"; Restart = "always"; @@ -207,7 +202,8 @@ in ${concatStringsSep "\n" (mapAttrsToList (network: data: optionalString (versionAtLeast data.package.version "1.1pre") '' makeWrapper ${data.package}/bin/tinc "$out/bin/tinc.${network}" \ - --add-flags "--pidfile=/run/tinc.${network}.pid" + --add-flags "--pidfile=/run/tinc.${network}.pid" \ + --add-flags "--config=/etc/tinc/${network}" '') cfg.networks)} ''; }; From f9f0307f7a82902b457b665dbdc80c9bcda96303 Mon Sep 17 00:00:00 2001 From: Ben Gamari Date: Sun, 10 Jun 2018 21:30:23 -0400 Subject: [PATCH 15/33] cmake: Only apply application-services.patch with 3.11 The patch doesn't apply with earlier versions. Fixes #41816. --- pkgs/development/tools/build-managers/cmake/default.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/development/tools/build-managers/cmake/default.nix b/pkgs/development/tools/build-managers/cmake/default.nix index 051b8107703d..438aa81a9d0a 100644 --- a/pkgs/development/tools/build-managers/cmake/default.nix +++ b/pkgs/development/tools/build-managers/cmake/default.nix @@ -58,7 +58,7 @@ stdenv.mkDerivation rec { # Don't search in non-Nix locations such as /usr, but do search in our libc. patches = [ ./search-path-3.9.patch ] # Don't depend on frameworks. - ++ optional useSharedLibraries ./application-services.patch # TODO: remove conditional + ++ optional (useSharedLibraries && majorVersion == "3.11") ./application-services.patch # TODO: remove conditional ++ optional stdenv.isCygwin ./3.2.2-cygwin.patch; outputs = [ "out" ]; From f4d4f5e65a2e4878829cf5fd1c5e5008e4d01f2b Mon Sep 17 00:00:00 2001 From: Ben Gamari Date: Sun, 10 Jun 2018 21:36:47 -0400 Subject: [PATCH 16/33] kicad-unstable: 2018-03-10 -> 2018-06-12 --- pkgs/applications/science/electronics/kicad/unstable.nix | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/pkgs/applications/science/electronics/kicad/unstable.nix b/pkgs/applications/science/electronics/kicad/unstable.nix index 7209ee3edf60..eca3ddd32e8b 100644 --- a/pkgs/applications/science/electronics/kicad/unstable.nix +++ b/pkgs/applications/science/electronics/kicad/unstable.nix @@ -12,13 +12,13 @@ assert ngspiceSupport -> libngspice != null; with lib; stdenv.mkDerivation rec { name = "kicad-unstable-${version}"; - version = "2018-03-10"; + version = "2018-06-12"; src = fetchFromGitHub { owner = "KICad"; repo = "kicad-source-mirror"; - rev = "17c0917dac12ea0be50ff95cee374a0cd8b7f862"; - sha256 = "1yn5hj5hjnpb5fkzzlyawg62a96fbfvha49395s22dcp95riqvf0"; + rev = "bc7bd107d980da147ad515aeae0469ddd55c2368"; + sha256 = "11nsx52pd3jr2wbzr11glmcs1a9r7z1mqkqx6yvlm0awbgd8qlv8"; }; postPatch = '' @@ -38,7 +38,8 @@ stdenv.mkDerivation rec { "-DCMAKE_CXX_FLAGS=-I${wxPython}/include/wx-3.0" ]; - nativeBuildInputs = [ cmake doxygen pkgconfig ]; + # https://www.mail-archive.com/kicad-developers@lists.launchpad.net/msg29840.html + nativeBuildInputs = [ (cmake.override {majorVersion = "3.10";}) doxygen pkgconfig ]; buildInputs = [ libGLU_combined zlib libX11 wxGTK pcre libXdmcp gettext glew glm libpthreadstubs cairo curl openssl boost From 1cb1b9193b64c74df3b269dabb520c9ae73ee8d5 Mon Sep 17 00:00:00 2001 From: Matthew Bauer Date: Tue, 12 Jun 2018 15:58:26 -0400 Subject: [PATCH 17/33] llvm: use native cmake for libc++abi --- pkgs/development/compilers/llvm/3.9/libc++abi.nix | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/pkgs/development/compilers/llvm/3.9/libc++abi.nix b/pkgs/development/compilers/llvm/3.9/libc++abi.nix index 1ad2cb102950..65345ca69925 100644 --- a/pkgs/development/compilers/llvm/3.9/libc++abi.nix +++ b/pkgs/development/compilers/llvm/3.9/libc++abi.nix @@ -5,7 +5,9 @@ stdenv.mkDerivation { src = fetch "libcxxabi" "1qi9q06zanqm8awzq83810avmvi52air6gr9zfip8mbg5viqn3cj"; - buildInputs = [ cmake ] ++ stdenv.lib.optional (!stdenv.isDarwin && !stdenv.isFreeBSD) libunwind; + nativeBuildInputs = [ cmake ]; + + buildInputs = stdenv.lib.optional (!stdenv.isDarwin && !stdenv.isFreeBSD) libunwind; postUnpack = '' unpackFile ${libcxx.src} From 274bb96073d9b263821dc68a1d2d65bec24b99f2 Mon Sep 17 00:00:00 2001 From: Uri Baghin Date: Wed, 23 May 2018 17:18:44 +1000 Subject: [PATCH 18/33] bazel: add darwin support --- pkgs/build-support/trivial-builders.nix | 18 ++++++++++ .../tools/build-managers/bazel/default.nix | 35 +++++++++++++++---- pkgs/top-level/all-packages.nix | 4 ++- 3 files changed, 50 insertions(+), 7 deletions(-) diff --git a/pkgs/build-support/trivial-builders.nix b/pkgs/build-support/trivial-builders.nix index 73da775f7f56..bce5436353c3 100644 --- a/pkgs/build-support/trivial-builders.nix +++ b/pkgs/build-support/trivial-builders.nix @@ -72,6 +72,24 @@ rec { ''; }; + # Create a C binary + writeCBin = name: code: + runCommandCC name + { + inherit name code; + executable = true; + passAsFile = ["code"]; + # Pointless to do this on a remote machine. + preferLocalBuild = true; + allowSubstitutes = false; + } + '' + n=$out/bin/$name + mkdir -p "$(dirname "$n")" + mv "$codePath" code.c + $CC -x c code.c -o "$n" + ''; + # Create a forest of symlinks to the files in `paths'. symlinkJoin = args_@{ name diff --git a/pkgs/development/tools/build-managers/bazel/default.nix b/pkgs/development/tools/build-managers/bazel/default.nix index d5eaa24c1675..e641e69bae6d 100644 --- a/pkgs/development/tools/build-managers/bazel/default.nix +++ b/pkgs/development/tools/build-managers/bazel/default.nix @@ -1,7 +1,9 @@ -{ stdenv, lib, fetchurl, jdk, zip, unzip, bash, writeScriptBin, coreutils, makeWrapper, which, python +{ stdenv, lib, fetchurl, jdk, zip, unzip, bash, writeCBin, coreutils, makeWrapper, which, python # Always assume all markers valid (don't redownload dependencies). # Also, don't clean up environment variables. , enableNixHacks ? false +# Apple dependencies +, libcxx, CoreFoundation, CoreServices, Foundation }: stdenv.mkDerivation rec { @@ -13,7 +15,7 @@ stdenv.mkDerivation rec { description = "Build tool that builds code quickly and reliably"; license = licenses.asl20; maintainers = [ maintainers.philandstuff ]; - platforms = platforms.linux; + platforms = platforms.linux ++ platforms.darwin; }; name = "bazel-${version}"; @@ -29,9 +31,30 @@ stdenv.mkDerivation rec { # Bazel expects several utils to be available in Bash even without PATH. Hence this hack. - customBash = writeScriptBin "bash" '' - #!${stdenv.shell} - PATH="$PATH:${lib.makeBinPath [ coreutils ]}" exec ${bash}/bin/bash "$@" + customBash = writeCBin "bash" '' + #include + #include + #include + #include + + extern char **environ; + + int main(int argc, char *argv[]) { + printf("environ: %s\n", environ[0]); + char *path = getenv("PATH"); + char *pathToAppend = "${lib.makeBinPath [ coreutils ]}"; + char *newPath; + if (path != NULL) { + int length = strlen(path) + 1 + strlen(pathToAppend) + 1; + newPath = malloc(length * sizeof(char)); + snprintf(newPath, length, "%s:%s", path, pathToAppend); + } else { + newPath = pathToAppend; + } + setenv("PATH", newPath, 1); + execve("${bash}/bin/bash", argv, environ); + return 0; + } ''; postPatch = '' @@ -54,7 +77,7 @@ stdenv.mkDerivation rec { makeWrapper which customBash - ]; + ] ++ lib.optionals (stdenv.isDarwin) [ libcxx CoreFoundation CoreServices Foundation ]; # If TMPDIR is in the unpack dir we run afoul of blaze's infinite symlink # detector (see com.google.devtools.build.lib.skyframe.FileFunction). diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 718041ee753b..94ebd20a0f5b 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -7711,7 +7711,9 @@ with pkgs; bam = callPackage ../development/tools/build-managers/bam {}; bazel_0_4 = callPackage ../development/tools/build-managers/bazel/0.4.nix { }; - bazel = callPackage ../development/tools/build-managers/bazel { }; + bazel = callPackage ../development/tools/build-managers/bazel { + inherit (darwin.apple_sdk.frameworks) CoreFoundation CoreServices Foundation; + }; bazel-buildtools = callPackage ../development/tools/build-managers/bazel/buildtools { }; buildifier = bazel-buildtools; From b346b0226d703699bd389ad742b1a4592eeb4c52 Mon Sep 17 00:00:00 2001 From: adisbladis Date: Wed, 13 Jun 2018 11:51:23 +0800 Subject: [PATCH 19/33] go-ethereum: 1.8.10 -> 1.8.11 --- pkgs/applications/altcoins/go-ethereum.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/applications/altcoins/go-ethereum.nix b/pkgs/applications/altcoins/go-ethereum.nix index 9917ffdf9c01..74d38b59fc23 100644 --- a/pkgs/applications/altcoins/go-ethereum.nix +++ b/pkgs/applications/altcoins/go-ethereum.nix @@ -2,7 +2,7 @@ buildGoPackage rec { name = "go-ethereum-${version}"; - version = "1.8.10"; + version = "1.8.11"; goPackagePath = "github.com/ethereum/go-ethereum"; # Fix for usb-related segmentation faults on darwin @@ -27,7 +27,7 @@ buildGoPackage rec { owner = "ethereum"; repo = "go-ethereum"; rev = "v${version}"; - sha256 = "1n36pz4y3xa4d46mynym98bra79qx5n9lb29chyxfpvi5fmprdg1"; + sha256 = "1b4za0hszb95jnj97g4xkrgcl0bydllznm0wj6rpi6cwmdr0h8na"; }; meta = with stdenv.lib; { From 04a4f6d57c6b53061925479812841ee93e78ca68 Mon Sep 17 00:00:00 2001 From: Mario Rodas Date: Tue, 12 Jun 2018 23:57:54 -0500 Subject: [PATCH 20/33] remarshal: supports darwin --- pkgs/development/tools/remarshal/default.nix | 1 - 1 file changed, 1 deletion(-) diff --git a/pkgs/development/tools/remarshal/default.nix b/pkgs/development/tools/remarshal/default.nix index 79cca444a1e9..6632d0626339 100644 --- a/pkgs/development/tools/remarshal/default.nix +++ b/pkgs/development/tools/remarshal/default.nix @@ -20,6 +20,5 @@ python3Packages.buildPythonApplication rec { license = licenses.mit; homepage = https://github.com/dbohdan/remarshal; maintainers = with maintainers; [ offline ]; - platforms = platforms.linux; }; } From 1897c352f55f5c5e7b63f252456d091d0fbdbcf7 Mon Sep 17 00:00:00 2001 From: Antoine Eiche Date: Tue, 12 Jun 2018 21:13:11 +0200 Subject: [PATCH 21/33] libxml2: add static output --- pkgs/development/libraries/libxml2/default.nix | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/libxml2/default.nix b/pkgs/development/libraries/libxml2/default.nix index be2f83cb498e..1551d4032471 100644 --- a/pkgs/development/libraries/libxml2/default.nix +++ b/pkgs/development/libraries/libxml2/default.nix @@ -17,7 +17,7 @@ in stdenv.mkDerivation rec { sha256 = "0ci7is75bwqqw2p32vxvrk6ds51ik7qgx73m920rakv5jlayax0b"; }; - outputs = [ "bin" "dev" "out" "man" "doc" ] + outputs = [ "bin" "dev" "out" "man" "doc" "static" ] ++ lib.optional pythonSupport "py"; propagatedBuildOutputs = "out bin" + lib.optionalString pythonSupport " py"; @@ -32,7 +32,7 @@ in stdenv.mkDerivation rec { configureFlags = lib.optional pythonSupport "--with-python=${python}" ++ lib.optional icuSupport "--with-icu" - ++ [ "--exec_prefix=$dev" ]; + ++ [ "--exec_prefix=$dev" "--enable-static" ]; enableParallelBuilding = true; @@ -59,6 +59,11 @@ in stdenv.mkDerivation rec { moveToOutput share/man/man1 "$bin" ''; + postInstall = '' + mkdir -p $static/lib + cp .libs/libxml2.a $static/lib/ + ''; + passthru = { inherit version; pythonSupport = pythonSupport; }; meta = { From b8c6d8f971da7d28d679859115b31394e20d861d Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?S=C3=A9bastien=20Maccagnoni?= Date: Wed, 13 Jun 2018 12:48:15 +0200 Subject: [PATCH 22/33] Update default.nix (#41842) --- pkgs/development/tools/packer/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/tools/packer/default.nix b/pkgs/development/tools/packer/default.nix index b7757b474716..ae624c549eb1 100644 --- a/pkgs/development/tools/packer/default.nix +++ b/pkgs/development/tools/packer/default.nix @@ -1,7 +1,7 @@ { stdenv, buildGoPackage, fetchFromGitHub }: buildGoPackage rec { name = "packer-${version}"; - version = "1.2.0"; + version = "1.2.4"; goPackagePath = "github.com/hashicorp/packer"; @@ -11,7 +11,7 @@ buildGoPackage rec { owner = "hashicorp"; repo = "packer"; rev = "v${version}"; - sha256 = "05qsyh6d4qsvabr543ggd4b09fipxzr270cawsx0glmkgw82nkzi"; + sha256 = "06prn2mq199476zlxi5hxk5yn21mqzbqk8v0fy8s6h91g8h6205n"; }; meta = with stdenv.lib; { From 99bce98dd6f26295b22b9fb91af1ae429473d57d Mon Sep 17 00:00:00 2001 From: Nick Novitski Date: Wed, 13 Jun 2018 04:09:56 -0700 Subject: [PATCH 23/33] yarn: 1.7.0 -> 1.8.0 (#41895) --- pkgs/development/tools/yarn/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/tools/yarn/default.nix b/pkgs/development/tools/yarn/default.nix index 535ab7b45fa3..635c9efa40e8 100644 --- a/pkgs/development/tools/yarn/default.nix +++ b/pkgs/development/tools/yarn/default.nix @@ -2,11 +2,11 @@ stdenv.mkDerivation rec { name = "yarn-${version}"; - version = "1.7.0"; + version = "1.8.0"; src = fetchzip { url = "https://github.com/yarnpkg/yarn/releases/download/v${version}/yarn-v${version}.tar.gz"; - sha256 = "00fxihv9ih40k6f21a7hb6vkx4h4m6ks0fbai5h9ssi0p4m5j3by"; + sha256 = "145z9i935kab5pv3pldgs3b1i9ppplc928c71c2lbz8my1z6j77w"; }; buildInputs = [makeWrapper nodejs]; From 0cc43968185f947d1ea9b499e207629d65416ee4 Mon Sep 17 00:00:00 2001 From: spacefrogg Date: Wed, 13 Jun 2018 13:21:34 +0200 Subject: [PATCH 24/33] xcircuit: init at 3.9.73 (#41891) --- .../science/electronics/xcircuit/default.nix | 31 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 1 + 2 files changed, 32 insertions(+) create mode 100644 pkgs/applications/science/electronics/xcircuit/default.nix diff --git a/pkgs/applications/science/electronics/xcircuit/default.nix b/pkgs/applications/science/electronics/xcircuit/default.nix new file mode 100644 index 000000000000..ba2a170e6255 --- /dev/null +++ b/pkgs/applications/science/electronics/xcircuit/default.nix @@ -0,0 +1,31 @@ +{ stdenv, fetchurl, autoreconfHook, automake, pkgconfig +, cairo, ghostscript, ngspice, tcl, tk, xorg, zlib }: + +let + version = "3.9.73"; + name = "xcircuit-${version}"; + inherit (stdenv.lib) getBin; + +in stdenv.mkDerivation { + inherit name version; + + src = fetchurl { + url = "http://opencircuitdesign.com/xcircuit/archive/${name}.tgz"; + sha256 = "1kj9hayipplzm4960kx48vxddqj154qnxkccaqj9cnkp62b7q3jg"; + }; + + nativeBuildInputs = [ autoreconfHook automake pkgconfig ]; + hardeningDisable = [ "format" ]; + + configureFlags = "--with-tcl=${tcl}/lib --with-tk=${tk}/lib --with-ngspice=${getBin ngspice}/bin/ngspice"; + + buildInputs = with xorg; [ cairo ghostscript libSM libXt libICE libX11 libXpm tcl tk zlib ]; + + meta = with stdenv.lib; { + description = "Generic drawing program tailored to circuit diagrams"; + homepage = http://opencircuitdesign.com/xcircuit; + license = licenses.gpl2; + platforms = platforms.linux; + maintainers = [ maintainers.spacefrogg ]; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 94ebd20a0f5b..b148565ba51c 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -20492,6 +20492,7 @@ with pkgs; qucs = callPackage ../applications/science/electronics/qucs { }; + xcircuit = callPackage ../applications/science/electronics/xcircuit { }; xoscope = callPackage ../applications/science/electronics/xoscope { }; From 15b5643023550b0c3fb71929e44c97a5595ff35a Mon Sep 17 00:00:00 2001 From: averelld Date: Wed, 13 Jun 2018 13:27:29 +0200 Subject: [PATCH 25/33] mattermost-desktop: init at 4.1.1 (#40794) --- .../mattermost-desktop/default.nix | 81 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 + 2 files changed, 83 insertions(+) create mode 100644 pkgs/applications/networking/instant-messengers/mattermost-desktop/default.nix diff --git a/pkgs/applications/networking/instant-messengers/mattermost-desktop/default.nix b/pkgs/applications/networking/instant-messengers/mattermost-desktop/default.nix new file mode 100644 index 000000000000..b65995ff86a4 --- /dev/null +++ b/pkgs/applications/networking/instant-messengers/mattermost-desktop/default.nix @@ -0,0 +1,81 @@ +{ stdenv, lib, fetchurl, gnome2, atk, cairo, gdk_pixbuf, glib, freetype, +fontconfig, dbus, libX11, xorg, libXi, libXcursor, libXdamage, libXrandr, +libXcomposite, libXext, libXfixes, libXrender, libXtst, libXScrnSaver, nss, +nspr, alsaLib, cups, expat, udev }: +let + rpath = lib.makeLibraryPath [ + alsaLib + atk + cairo + cups + dbus + expat + fontconfig + freetype + gdk_pixbuf + glib + gnome2.GConf + gnome2.gtk + gnome2.pango + libX11 + libXScrnSaver + libXcomposite + libXcursor + libXdamage + libXext + libXfixes + libXi + libXrandr + libXrender + libXtst + nspr + nss + stdenv.cc.cc + udev + xorg.libxcb + ]; + +in + stdenv.mkDerivation rec { + name = "mattermost-desktop-${version}"; + version = "4.1.1"; + + src = + if stdenv.system == "x86_64-linux" then + fetchurl { + url = "https://releases.mattermost.com/desktop/${version}/${name}-linux-x64.tar.gz"; + sha256 = "0kq89xylfv2rfmd4wj08d02gjzywlq1p8xmk313i58334xm7srja"; + } + else if stdenv.system == "i686-linux" then + fetchurl { + url = "https://releases.mattermost.com/desktop/${version}/${name}-linux-ia32.tar.gz"; + sha256 = "1jiknxpb44bhxrl0xa57kf3wxlzifbpnn3vblp8l4pr2wx146pzx"; + } + else + throw "Mattermost-Desktop is not currently supported on ${stdenv.system}"; + + phases = [ "unpackPhase" "installPhase" ]; + installPhase = '' + mkdir -p $out + cp -R . $out + + patchelf --set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" \ + --set-rpath ${rpath}:$out $out/mattermost-desktop + + patchShebangs $out/create_desktop_file.sh + $out/create_desktop_file.sh + + mkdir -p $out/{bin,share/applications} + cp Mattermost.desktop $out/share/applications/Mattermost.desktop + ln -s $out/mattermost-desktop $out/bin/mattermost-desktop + ''; + + meta = { + description = "Mattermost Desktop client"; + homepage = https://about.mattermost.com/; + license = lib.licenses.asl20; + platforms = [ + "x86_64-linux" "i686-linux" + ]; + }; + } diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index b148565ba51c..dcfc3646bcc6 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -12654,6 +12654,8 @@ with pkgs; matterircd = callPackage ../servers/mattermost/matterircd.nix { }; matterbridge = callPackage ../servers/matterbridge { }; + mattermost-desktop = callPackage ../applications/networking/instant-messengers/mattermost-desktop { }; + mediatomb = callPackage ../servers/mediatomb { }; meguca = callPackage ../servers/meguca { }; From 0b475d300c57dd112b75df73d8f311448a7deace Mon Sep 17 00:00:00 2001 From: spacefrogg Date: Wed, 13 Jun 2018 13:48:15 +0200 Subject: [PATCH 26/33] ngspice: Fix regression due to missing X libs (#41890) --- pkgs/applications/science/electronics/ngspice/default.nix | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/pkgs/applications/science/electronics/ngspice/default.nix b/pkgs/applications/science/electronics/ngspice/default.nix index 73e770b63e2d..af2ee49daee9 100644 --- a/pkgs/applications/science/electronics/ngspice/default.nix +++ b/pkgs/applications/science/electronics/ngspice/default.nix @@ -1,4 +1,5 @@ -{stdenv, fetchurl, readline, bison, flex, libX11, libICE, libXaw, libXext, fftw}: +{stdenv, fetchurl, bison, flex +, readline, libX11, libICE, libXaw, libXmu, libXext, libXt, fftw }: stdenv.mkDerivation { name = "ngspice-28"; @@ -9,7 +10,7 @@ stdenv.mkDerivation { }; nativeBuildInputs = [ flex bison ]; - buildInputs = [ readline libX11 libICE libXaw libXext fftw ]; + buildInputs = [ readline libX11 libICE libXaw libXmu libXext libXt fftw ]; configureFlags = [ "--enable-x" "--with-x" "--with-readline" "--enable-xspice" "--enable-cider" ]; From d23da8229b31385ab1d6b5fd5177f5ff7e7eacf0 Mon Sep 17 00:00:00 2001 From: Yuriy Taraday Date: Wed, 13 Jun 2018 16:28:18 +0400 Subject: [PATCH 27/33] chromium: 67.0.3396.62 -> 67.0.3396.87 Contains fixes for CVE-2018-6148 [0] and CVE-2018-6149 [1]. Also add a patch to fix one problem with 68 (Beta) build. I'm still working on fixing Beta. [0] https://chromereleases.googleblog.com/2018/06/stable-channel-update-for-desktop.html [1] https://chromereleases.googleblog.com/2018/06/stable-channel-update-for-desktop_12.html --- .../networking/browsers/chromium/common.nix | 1 + .../browsers/chromium/upstream-info.nix | 18 +++++++++--------- 2 files changed, 10 insertions(+), 9 deletions(-) diff --git a/pkgs/applications/networking/browsers/chromium/common.nix b/pkgs/applications/networking/browsers/chromium/common.nix index a2d8a24ec5e6..7803a530a92a 100644 --- a/pkgs/applications/networking/browsers/chromium/common.nix +++ b/pkgs/applications/networking/browsers/chromium/common.nix @@ -149,6 +149,7 @@ let ./patches/nix_plugin_paths_52.patch ] ++ optionals (versionAtLeast version "68") [ ./patches/nix_plugin_paths_68.patch + (githubPatch "56cb5f7da1025f6db869e840ed34d3b98b9ab899" "04mp5r1yvdvdx6m12g3lw3z51bzh7m3gr73mhblkn4wxdbvi3dcs") ] ++ optional enableWideVine ./patches/widevine.patch; postPatch = '' diff --git a/pkgs/applications/networking/browsers/chromium/upstream-info.nix b/pkgs/applications/networking/browsers/chromium/upstream-info.nix index 2113b9cdbed7..a1aba0da2d68 100644 --- a/pkgs/applications/networking/browsers/chromium/upstream-info.nix +++ b/pkgs/applications/networking/browsers/chromium/upstream-info.nix @@ -1,18 +1,18 @@ # This file is autogenerated from update.sh in the same directory. { beta = { - sha256 = "03bpznpnr22lphixvvc1cr0pn4p7fxjlz0wwysjw9j7i5y9n7vnm"; - sha256bin64 = "06gmn0clhll91pmph07db043006gf2x6nfgxlir4qwqsj2qgdch0"; - version = "67.0.3396.62"; + sha256 = "1jfhdisp4j6rrb8zxj2am7vlkjfbwvq1si7cacjwfy624hlhxpxz"; + sha256bin64 = "0j3aw4zyg0alizgh73dp3fz8f6y71srdkycnzjm037p3p8m364j1"; + version = "68.0.3440.17"; }; dev = { - sha256 = "0hy36r938k6c89alam4a8yy2wynnlcc0zqhhb0jgy3qlnqrksvrc"; - sha256bin64 = "0liqgz8sip5fz5mxb54zagz3p8s24j96p26i5dql935bic7p3lhw"; - version = "68.0.3440.7"; + sha256 = "0acgpi7slwvq5lxaagmn57a6jpz508hwa690ypny8zlhsiaqlxaz"; + sha256bin64 = "1vjmi9lm8xrkhmzv9sqnln867sm4b80y2z3djz7mj05hkzsb0zr9"; + version = "69.0.3452.0"; }; stable = { - sha256 = "03bpznpnr22lphixvvc1cr0pn4p7fxjlz0wwysjw9j7i5y9n7vnm"; - sha256bin64 = "16fljvrq2gcpjpyhf1w8s3rv805mknmy2i88n43v2cg7hl35241c"; - version = "67.0.3396.62"; + sha256 = "07fvfarlzl4dcr0vbklzbg08iwvzfkczsqsg0d1p695q1hpsf9sx"; + sha256bin64 = "1c2xn84vs1v7gph7l4s408ml6l6c7lnlg4z2vcx20phxmlsgs1xg"; + version = "67.0.3396.87"; }; } From 5bf8fd57e18b94f3c7fe80d9353246cd3490f71c Mon Sep 17 00:00:00 2001 From: Josef Kemetmueller Date: Wed, 13 Jun 2018 13:16:33 +0000 Subject: [PATCH 28/33] texlive: Fix 'match-parens' ruby dependency --- pkgs/tools/typesetting/tex/texlive/combine.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/tools/typesetting/tex/texlive/combine.nix b/pkgs/tools/typesetting/tex/texlive/combine.nix index 35fee64ba54f..3bf7ee1fdfec 100644 --- a/pkgs/tools/typesetting/tex/texlive/combine.nix +++ b/pkgs/tools/typesetting/tex/texlive/combine.nix @@ -30,7 +30,7 @@ let pkgNeedsRuby = pkg: pkg.tlType == "run" && pkg.pname == "match-parens"; extraInputs = lib.optional (lib.any pkgNeedsPython splitBin.wrong) python - ++ lib.optional (lib.any pkgNeedsPython splitBin.wrong) ruby; + ++ lib.optional (lib.any pkgNeedsRuby splitBin.wrong) ruby; }; mkUniquePkgs = pkgs: fastUnique (a: b: a < b) # highlighting hack: > From 41f3dee1767e88e497a2dbe139f5e1ffdfee04c5 Mon Sep 17 00:00:00 2001 From: Uli Baum Date: Wed, 13 Jun 2018 12:08:15 +0200 Subject: [PATCH 29/33] nixos/tests/morty: fix non-deterministic failure ... due to improper timing --- nixos/tests/morty.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/nixos/tests/morty.nix b/nixos/tests/morty.nix index e052ee988060..0a5324259ada 100644 --- a/nixos/tests/morty.nix +++ b/nixos/tests/morty.nix @@ -22,9 +22,9 @@ import ./make-test.nix ({ pkgs, ... }: testScript = { nodes , ... }: '' - startAll; + $mortyProxyWithKey->waitForUnit("default.target"); - $mortyProxyWithKey->waitForUnit("morty"); + $mortyProxyWithKey->waitForOpenPort(3001); $mortyProxyWithKey->succeed("curl -L 127.0.0.1:3001 | grep MortyProxy"); ''; From 529a0f74edc0b9a0e7f4cdb8932ac0b53f5179a0 Mon Sep 17 00:00:00 2001 From: John Ericson Date: Wed, 13 Jun 2018 11:32:44 -0400 Subject: [PATCH 30/33] haskell generic-builder: Use separate setup db in more cases Use for cross and GHCJS whether or not there are setup depends. --- pkgs/development/haskell-modules/generic-builder.nix | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/pkgs/development/haskell-modules/generic-builder.nix b/pkgs/development/haskell-modules/generic-builder.nix index 17bc8b479c76..1cc385864585 100644 --- a/pkgs/development/haskell-modules/generic-builder.nix +++ b/pkgs/development/haskell-modules/generic-builder.nix @@ -166,9 +166,11 @@ let "--configure-option=--host=${hostPlatform.config}" ] ++ crossCabalFlags); + useSeparateSetupDb = setupHaskellDepends != [] || isCross || isGhcjs; + setupCompileFlags = [ (optionalString (!coreSetup) "-${nativePackageDbFlag}=${ - if setupHaskellDepends != [] + if useSeparateSetupDb then "$setupPackageConfDir" else "$packageConfDir" }") @@ -268,7 +270,7 @@ stdenv.mkDerivation ({ echo "Build with ${ghc}." ${optionalString (hasActiveLibrary && hyperlinkSource) "export PATH=${hscolour}/bin:$PATH"} - '' + (optionalString (setupHaskellDepends != []) '' + '' + (optionalString useSeparateSetupDb '' setupPackageConfDir="$TMPDIR/setup-package.conf.d" mkdir -p $setupPackageConfDir '') + '' @@ -282,7 +284,7 @@ stdenv.mkDerivation ({ # dependencies for the build machine. # # pkgs* arrays defined in stdenv/setup.hs - + (optionalString (setupHaskellDepends != []) '' + + (optionalString useSeparateSetupDb '' for p in "''${pkgsBuildBuild[@]}" "''${pkgsBuildHost[@]}" "''${pkgsBuildTarget[@]}"; do ${buildPkgDb nativeGhc.name "$setupPackageConfDir"} done From a8e867f9905b65adb6448d84c1a35c35fb6a2e87 Mon Sep 17 00:00:00 2001 From: "R. RyanTM" Date: Wed, 13 Jun 2018 08:56:09 -0700 Subject: [PATCH 31/33] yoshimi: 1.5.8 -> 1.5.8.2 (#41925) Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/yoshimi/versions. These checks were done: - built on NixOS - /nix/store/k0c0kks60fdnismml72d956yca922nv4-yoshimi-1.5.8.2/bin/yoshimi passed the binary check. - 1 of 1 passed binary check by having a zero exit code. - 0 of 1 passed binary check by having the new version present in output. - found 1.5.8.2 with grep in /nix/store/k0c0kks60fdnismml72d956yca922nv4-yoshimi-1.5.8.2 - directory tree listing: https://gist.github.com/cba4c23026b96fbb6a4cd4ee08212a0f - du listing: https://gist.github.com/867590c63053855dd8091a35257291d2 --- pkgs/applications/audio/yoshimi/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/applications/audio/yoshimi/default.nix b/pkgs/applications/audio/yoshimi/default.nix index 0c85d72cc901..65a3bbfdc011 100644 --- a/pkgs/applications/audio/yoshimi/default.nix +++ b/pkgs/applications/audio/yoshimi/default.nix @@ -6,11 +6,11 @@ assert stdenv ? glibc; stdenv.mkDerivation rec { name = "yoshimi-${version}"; - version = "1.5.8"; + version = "1.5.8.2"; src = fetchurl { url = "mirror://sourceforge/yoshimi/${name}.tar.bz2"; - sha256 = "0gwsr5srzy28hwqhfzrc8pswysmyra8kbww3bxfx8bq4mdjifdj6"; + sha256 = "1kg7d6mnzdwzsqhrf7pmrf1hzgfpbpm5lv8xkaz32wiv391qrnxc"; }; buildInputs = [ From d707021f234a7d8f3d216b6db2f9a74f523ba92f Mon Sep 17 00:00:00 2001 From: "R. RyanTM" Date: Wed, 13 Jun 2018 09:05:40 -0700 Subject: [PATCH 32/33] yq: 2.5.0 -> 2.6.0 (#41926) Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/yq/versions. These checks were done: - built on NixOS - /nix/store/11iw84skak8ag78s93klhmn4mhz1v3qh-yq-2.6.0/bin/.xq-wrapped passed the binary check. - /nix/store/11iw84skak8ag78s93klhmn4mhz1v3qh-yq-2.6.0/bin/xq passed the binary check. - /nix/store/11iw84skak8ag78s93klhmn4mhz1v3qh-yq-2.6.0/bin/.yq-wrapped passed the binary check. - /nix/store/11iw84skak8ag78s93klhmn4mhz1v3qh-yq-2.6.0/bin/yq passed the binary check. - 4 of 4 passed binary check by having a zero exit code. - 4 of 4 passed binary check by having the new version present in output. - found 2.6.0 with grep in /nix/store/11iw84skak8ag78s93klhmn4mhz1v3qh-yq-2.6.0 - directory tree listing: https://gist.github.com/d6c1ce31dff71d43e23d27c6d98e1925 - du listing: https://gist.github.com/a08a8e4ca7caa376a53ad39da72ba921 --- pkgs/development/tools/yq/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/tools/yq/default.nix b/pkgs/development/tools/yq/default.nix index 201e85985d82..52231d0a8318 100644 --- a/pkgs/development/tools/yq/default.nix +++ b/pkgs/development/tools/yq/default.nix @@ -2,7 +2,7 @@ buildPythonApplication rec { pname = "yq"; - version = "2.5.0"; + version = "2.6.0"; propagatedBuildInputs = [ pyyaml xmltodict jq ]; @@ -11,7 +11,7 @@ buildPythonApplication rec { src = fetchPypi { inherit pname version; - sha256 = "e9fd2aa32defcd051058e3b6f665873282aa4eed19e11b1db94fe70847535d4c"; + sha256 = "0wyzg6lwxmzqsblljg9hddkadda7qdpw54sp0pmmbv89hhz7cky6"; }; meta = with lib; { From ea69fba953841a94d15339cae32604cece655b54 Mon Sep 17 00:00:00 2001 From: Orivej Desh Date: Wed, 13 Jun 2018 16:07:54 +0000 Subject: [PATCH 33/33] Revert "libxml2: add static output" This reverts commit 1897c352f55f5c5e7b63f252456d091d0fbdbcf7 on master. This is a mass rebuild that should go through staging. --- pkgs/development/libraries/libxml2/default.nix | 9 ++------- 1 file changed, 2 insertions(+), 7 deletions(-) diff --git a/pkgs/development/libraries/libxml2/default.nix b/pkgs/development/libraries/libxml2/default.nix index 1551d4032471..be2f83cb498e 100644 --- a/pkgs/development/libraries/libxml2/default.nix +++ b/pkgs/development/libraries/libxml2/default.nix @@ -17,7 +17,7 @@ in stdenv.mkDerivation rec { sha256 = "0ci7is75bwqqw2p32vxvrk6ds51ik7qgx73m920rakv5jlayax0b"; }; - outputs = [ "bin" "dev" "out" "man" "doc" "static" ] + outputs = [ "bin" "dev" "out" "man" "doc" ] ++ lib.optional pythonSupport "py"; propagatedBuildOutputs = "out bin" + lib.optionalString pythonSupport " py"; @@ -32,7 +32,7 @@ in stdenv.mkDerivation rec { configureFlags = lib.optional pythonSupport "--with-python=${python}" ++ lib.optional icuSupport "--with-icu" - ++ [ "--exec_prefix=$dev" "--enable-static" ]; + ++ [ "--exec_prefix=$dev" ]; enableParallelBuilding = true; @@ -59,11 +59,6 @@ in stdenv.mkDerivation rec { moveToOutput share/man/man1 "$bin" ''; - postInstall = '' - mkdir -p $static/lib - cp .libs/libxml2.a $static/lib/ - ''; - passthru = { inherit version; pythonSupport = pythonSupport; }; meta = {