1
0
Fork 1
mirror of https://github.com/NixOS/nixpkgs.git synced 2024-11-25 15:11:35 +00:00
Commit graph

222358 commits

Author SHA1 Message Date
zowoq 3037b6d1ef fuse-overlayfs: 0.7.8 -> 1.0.0
https://github.com/containers/fuse-overlayfs/releases/tag/v1.0.0
2020-04-18 21:25:51 +10:00
Michael Weiss e5450d9d00
androidStudioPackages.{dev,canary}: 4.1.0.5 -> 4.1.0.6 2020-04-18 12:29:11 +02:00
Michael Weiss b7b1022fb2
android-studio: 3.6.2 -> 3.6.3 2020-04-18 12:29:05 +02:00
Mario Rodas 6d02fcb2c2
zeek: 3.1.1 -> 3.1.2 2020-04-18 04:20:00 -05:00
Mario Rodas f37c9226fc
lean: 3.8.0 -> 3.9.0 2020-04-18 04:20:00 -05:00
Robert Helgesson 730ecad048
msmtp: 1.8.7 -> 1.8.8 2020-04-18 10:46:11 +02:00
Edmund Wu 4727e95eb6
manual/rl-2009.xml: fix build (#85478)
16a4332d60 (diff-43de86228df91216c5cfc9446cb041feL249)
2020-04-18 07:51:06 +02:00
Vladimír Čunát d96487b9ca
Merge branch 'master' into staging-next
Hydra nixpkgs: ?compare=1582510
2020-04-18 07:42:26 +02:00
Vladimír Čunát 312e9037f4
python2.pkgs.cryptography: fixup build of dependants
... most notably fix pyopenssl.  I can't say I really understand this,
but the commit seems safe enough.
2020-04-18 07:39:10 +02:00
John Ericson eb4acb6ca9
Merge pull request #85468 from Ericson2314/no-dumpmachine
treewide: Get rid of -dumpmachine in favor of static info
2020-04-18 00:35:19 -04:00
Emily 21f183a3fe nixos/tests/common/acme: don't set nameservers for client
The resolver is mainly useful for the ACME server, and acme.nix uses its
own DNS server to test DNS-01 challenges.
2020-04-18 05:15:47 +01:00
Emily e6d5e83cf1 nixos/tests/common/acme: enable Pebble strict mode
This lets us get early warning about any bugs or backwards-compatibility
hazards in lego.

Pebble will default to this in the future, but doesn't currently;
see https://github.com/letsencrypt/pebble/blob/v2.3.0/README.md#strict-mode.
2020-04-18 05:15:47 +01:00
Emily 695fd78ac4 nixos/tests/acme: use CAP_NET_BIND_SERVICE 2020-04-18 05:15:47 +01:00
Emily d0f04c1623 nixos/tests/acme: use *.test domains
Shimming out the Let's Encrypt domain name to reuse client configuration
doesn't work properly (Pebble uses different endpoint URL formats), is
recommended against by upstream,[1] and is unnecessary now that the ACME
module supports specifying an ACME server. This commit changes the tests
to use the domain name acme.test instead, and renames the letsencrypt
node to acme to reflect that it has nothing to do with the ACME server
that Let's Encrypt runs. The imports are renamed for clarity:

* nixos/tests/common/{letsencrypt => acme}/{common.nix => client}
* nixos/tests/common/{letsencrypt => acme}/{default.nix => server}

The test's other domain names are also adjusted to use *.test for
consistency (and to avoid misuse of non-reserved domain names such
as standalone.com).

[1] https://github.com/letsencrypt/pebble/issues/283#issuecomment-545123242

Co-authored-by: Yegor Timoshenko <yegortimoshenko@riseup.net>
2020-04-18 05:15:47 +01:00
Emily 352e30df8a nixos/tests/acme: don't restrict to x86_64
This was added in aade4e577b, but the
implementation of the ACME module has been entirely rewritten since
then, and the test seems to run fine on AArch64.
2020-04-18 05:15:47 +01:00
Emily 6285d5eabd pebble: v2.2.2 -> v2.3.0
Also add myself to maintainers and correct meta.homepage.
2020-04-18 05:15:47 +01:00
John Ericson e3d50e5cb0 Merge branch 'master' of github.com:NixOS/nixpkgs into staging 2020-04-18 00:10:08 -04:00
Dmitry Kalinkin 68a4ca45e0
Merge pull request #85406 from eadwu/sourcehut/update-5
sourcehut: 2020.04.16
2020-04-18 00:02:18 -04:00
Benjamin Hipple 3d902a8263
Merge pull request #84925 from NilsIrl/ghidra_9.1.2
ghidra: 9.1 -> 9.1.2
2020-04-17 22:56:46 -04:00
John Ericson 6b9c0adc24
Merge pull request #85470 from petabyteboy/feature/blas-fix-build
blas: fix build
2020-04-17 21:31:39 -04:00
Mario Rodas 1d3de252ff
Merge pull request #85380 from filalex77/packet-cli-0.0.6
packet-cli: init at 0.0.6
2020-04-17 20:24:13 -05:00
Markus Wamser 7bac5db6f7
maintainers: add wamserma
Signed-off-by: Markus S. Wamser <github-dev@mail2013.wamser.eu>
2020-04-17 21:14:15 -04:00
Milan Pässler fc5090b315 blas: fix build 2020-04-18 03:06:47 +02:00
lewo b8cd08a927
Merge pull request #85467 from zowoq/yq
yq-go: 3.2.1 -> 3.3.0
2020-04-18 02:42:18 +02:00
Bruno Bigras 11be0cd745 spotifyd: add withMpris and withKeyring optionals 2020-04-17 20:29:56 -04:00
Milan Pässler 16a4332d60 nixos/deluge: support 2.x 2020-04-18 02:00:04 +02:00
Will Dietz fee776aae4 deluge: remove use of deprecated alias 2020-04-18 02:00:04 +02:00
Will Dietz 9ae8499342 deluge: 1.3.15 -> 2.0.3
* let's try 2.0 version now, no time better than the present! Maybe!
* bz2 -> xz
* maybe python3
* disable pyGtkGlade for deps, maybe not needed?
* fix gtk/etc deps, deluge-gtk works! \o/
* restore installation of images and such

The old version is kept available as some torrent trackers have not
updated their whitelists yet.
2020-04-18 02:00:04 +02:00
Will Dietz ca722c5e2b libtorrent-rasterbar: 1.1.11 -> 1.2.5
https://raw.githubusercontent.com/arvidn/libtorrent/libtorrent-1_2_5/ChangeLog

The old release is kept available as libtorrentRasterbar-1_1_x for deluge 1.x.
2020-04-18 02:00:04 +02:00
Milan Pässler 69e73264a9 Partially revert "libtorrent-raster: 1.1.11 -> 1.2.5; qbittorrent: 4.2.1 -> 4.2.2"
This partially reverts commit cc03fb4210.
The libtorrentRasterbar update broke deluge 1.x, the hash was not
updated and obsolete dependencies and flags were not removed.
2020-04-18 02:00:04 +02:00
Jeff Labonte 094c35b920 brave: 1.5.123 -> 1.7.92 2020-04-17 19:50:17 -04:00
John Ericson cc880cd91f Merge remote-tracking branch 'upstream/master' into staging 2020-04-17 18:50:55 -04:00
John Ericson e99a409065
Merge pull request #85190 from Ericson2314/fwupdate
fwupdate: Clean up -I flags
2020-04-17 18:50:22 -04:00
zowoq 95847e6405 yq-go: 3.2.1 -> 3.3.0
https://github.com/mikefarah/yq/releases/tag/3.3.0
2020-04-18 08:49:49 +10:00
adisbladis ce283f055b
Merge pull request #85448 from bhipple/fix/mesa-glu
mesa-glu: use HTTPS instead of FTP
2020-04-18 00:46:20 +02:00
John Ericson 33c2a76c5e Merge remote-tracking branch 'upstream/master' into staging 2020-04-17 18:40:51 -04:00
John Ericson cdfda4b455
Merge pull request #83888 from matthewbauer/blas-alternatives
Add BLAS/LAPACK switching mechanism
2020-04-17 18:38:41 -04:00
adisbladis 3fe18a5b4e
emacsPackages.pod-mode: Fix platforms meta 2020-04-17 23:27:06 +01:00
adisbladis d31a6f34dd
Merge pull request #85461 from adisbladis/systemfd
systemfd: init at 0.3.0
2020-04-17 23:40:54 +02:00
Matthew Bauer 97fc083fd4 giac: broken on 64-bit blas 2020-04-17 16:24:31 -05:00
Matthew Bauer fcf33e2499 scs: breaks on 64bit blas 2020-04-17 16:24:31 -05:00
Matthew Bauer 98fb0ede70 arrayfire: remove mkl
This is unfree.
2020-04-17 16:24:30 -05:00
Matthew Bauer d83e9c9573 setup-hooks/audit-blas.sh: init
Add a simple hook that makes sure blas and lapack are linked to the
right place.
2020-04-17 16:24:25 -05:00
Matthew Bauer 7841b4290f pkgs/release-alternatives.nix: create
Add some ability to test the different BLAS/LAPACK implementations
together.
2020-04-17 16:24:16 -05:00
Matthew Bauer 1c8aba8334 treewide: use blas and lapack
This makes packages use lapack and blas, which can wrap different
BLAS/LAPACK implementations.

treewide: cleanup from blas/lapack changes

A few issues in the original treewide:

- can’t assume blas64 is a bool
- unused commented code
2020-04-17 16:24:09 -05:00
Matthew Bauer 43873351ff blas/lapack: add wrapper for “alternative”s of BLAS/LAPACK provider
This is based on previous work for switching between BLAS and LAPACK
implementation in Debian[1] and Gentoo[2]. The goal is to have one way
to depend on the BLAS/LAPACK libraries that all packages must use. The
attrs “blas” and “lapack” are used to represent a wrapped BLAS/LAPACK
provider. Derivations that don’t care how BLAS and LAPACK are
implemented can just use blas and lapack directly. If you do care what
you get (perhaps for some CPP), you should verify that blas and lapack
match what you expect with an assertion.

The “blas” package collides with the old “blas” reference
implementation. This has been renamed to “blas-reference”. In
addition, “lapack-reference” is also included, corresponding to
“liblapack” from Netlib.org.

Currently, there are 3 providers of the BLAS and LAPACK interfaces:

- lapack-reference: the BLAS/LAPACK implementation maintained by netlib.org
- OpenBLAS: an optimized version of BLAS and LAPACK
- MKL: Intel’s unfree but highly optimized BLAS/LAPACK implementation

By default, the above implementations all use the “LP64” BLAS and
LAPACK ABI. This corresponds to “openblasCompat” and is the safest way
to use BLAS/LAPACK. You may received some benefits from “ILP64” or
8-byte integer BLAS at the expense of breaking compatibility with some
packages.

This can be switched at build time with an override like:

    import <nixpkgs> {
        config.allowUnfree = true;
        overlays = [(self: super: {
          lapack = super.lapack.override {
            lapackProvider = super.lapack-reference;
          };
          blas = super.blas.override {
            blasProvider = super.lapack-reference;
          };
        })];
      }

or, switched at runtime via LD_LIBRARY_PATH like:

    $ LD_LIBRARY_PATH=$(nix-build -E '(with import <nixpkgs> {}).lapack.override { lapackProvider = pkgs.mkl; is64bit = true; })')/lib:$(nix-build -E '(with import <nixpkgs> {}).blas.override { blasProvider = pkgs.mkl; is64bit = true; })')/lib ./your-blas-linked-binary

By default, we use OpenBLAS LP64 also known in Nixpkgs as
openblasCompat.

[1]: https://wiki.debian.org/DebianScience/LinearAlgebraLibraries
[2]: https://wiki.gentoo.org/wiki/Blas-lapack-switch
2020-04-17 16:23:55 -05:00
Matthew Bauer 90326ba624 lapack: enable shared libraries, cblas, and tests 2020-04-17 16:17:12 -05:00
adisbladis 04afb68ad7
systemfd: init at 0.3.0 2020-04-17 22:10:18 +01:00
Peter Simons 10100a97c8 ghc-8.10.x: add plenty of overrides to fix builds 2020-04-17 22:50:43 +02:00
Ismaël Bouya 8e88b8dce2
nixos/acme: Fix postRun in acme certificate being ran at every run 2020-04-17 22:16:50 +02:00