mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-04-13 14:47:34 +00:00
Merge staging-next into staging
This commit is contained in:
commit
fb94da4e9e
@ -101,7 +101,7 @@ See the [Dart documentation](#ssec-dart-applications) for more details on requir
|
||||
`flutter` in Nixpkgs always points to `flutterPackages.stable`, which is the latest packaged version. To avoid unforeseen breakage during upgrade, packages in Nixpkgs should use a specific flutter version, such as `flutter319` and `flutter322`, instead of using `flutter` directly.
|
||||
|
||||
```nix
|
||||
{ flutter, fetchFromGitHub }:
|
||||
{ flutter322, fetchFromGitHub }:
|
||||
|
||||
flutter322.buildFlutterApplication {
|
||||
pname = "firmware-updater";
|
||||
|
@ -7387,12 +7387,6 @@
|
||||
github = "gmacon";
|
||||
githubId = 238853;
|
||||
};
|
||||
gmemstr = {
|
||||
email = "git@gmem.ca";
|
||||
github = "gmemstr";
|
||||
githubId = 1878840;
|
||||
name = "Gabriel Simmer";
|
||||
};
|
||||
gnxlxnxx = {
|
||||
email = "gnxlxnxx@web.de";
|
||||
github = "gnxlxnxx";
|
||||
@ -11310,12 +11304,6 @@
|
||||
github = "LogicalOverflow";
|
||||
githubId = 5919957;
|
||||
};
|
||||
lheckemann = {
|
||||
email = "git@sphalerite.org";
|
||||
github = "lheckemann";
|
||||
githubId = 341954;
|
||||
name = "Linus Heckemann";
|
||||
};
|
||||
lhvwb = {
|
||||
email = "nathaniel.baxter@gmail.com";
|
||||
github = "nathanielbaxter";
|
||||
@ -13432,14 +13420,6 @@
|
||||
githubId = 754512;
|
||||
name = "Mogria";
|
||||
};
|
||||
mohe2015 = {
|
||||
name = "Moritz Hedtke";
|
||||
email = "Moritz.Hedtke@t-online.de";
|
||||
matrix = "@moritz.hedtke:matrix.org";
|
||||
github = "mohe2015";
|
||||
githubId = 13287984;
|
||||
keys = [ { fingerprint = "1248 D3E1 1D11 4A85 75C9 8934 6794 D45A 488C 2EDE"; } ];
|
||||
};
|
||||
momeemt = {
|
||||
name = "Mutsuha Asada";
|
||||
email = "me@momee.mt";
|
||||
@ -18810,14 +18790,6 @@
|
||||
githubId = 53029739;
|
||||
name = "Joshua Ortiz";
|
||||
};
|
||||
Sorixelle = {
|
||||
email = "ruby+nixpkgs@srxl.me";
|
||||
matrix = "@ruby:isincredibly.gay";
|
||||
name = "Ruby Iris Juric";
|
||||
github = "Sorixelle";
|
||||
githubId = 38685302;
|
||||
keys = [ { fingerprint = "2D76 76C7 A28E 16FC 75C7 268D 1B55 6ED8 4B0E 303A"; } ];
|
||||
};
|
||||
sorki = {
|
||||
email = "srk@48.io";
|
||||
github = "sorki";
|
||||
|
@ -42,5 +42,5 @@ in with lib; {
|
||||
};
|
||||
};
|
||||
};
|
||||
meta.maintainers = [ maintainers.lheckemann ];
|
||||
meta.maintainers = [ ];
|
||||
}
|
||||
|
@ -28,7 +28,7 @@ in {
|
||||
|
||||
boot.initrd.kernelModules = lib.optionals cfg.initrd.enable [ "amdgpu" ];
|
||||
|
||||
hardware.opengl = lib.mkIf cfg.opencl.enable {
|
||||
hardware.graphics = lib.mkIf cfg.opencl.enable {
|
||||
enable = lib.mkDefault true;
|
||||
extraPackages = [
|
||||
pkgs.rocmPackages.clr
|
||||
|
@ -646,7 +646,7 @@ in {
|
||||
};
|
||||
|
||||
meta = {
|
||||
maintainers = with lib.maintainers; [ lheckemann qyliss ];
|
||||
maintainers = with lib.maintainers; [ qyliss ];
|
||||
doc = ./mailman.md;
|
||||
};
|
||||
|
||||
|
@ -13,6 +13,9 @@ let
|
||||
ln -s /run/wrappers/bin/slabinfo.plugin $out/libexec/netdata/plugins.d/slabinfo.plugin
|
||||
ln -s /run/wrappers/bin/freeipmi.plugin $out/libexec/netdata/plugins.d/freeipmi.plugin
|
||||
ln -s /run/wrappers/bin/systemd-journal.plugin $out/libexec/netdata/plugins.d/systemd-journal.plugin
|
||||
ln -s /run/wrappers/bin/logs-management.plugin $out/libexec/netdata/plugins.d/logs-management.plugin
|
||||
ln -s /run/wrappers/bin/network-viewer.plugin $out/libexec/netdata/plugins.d/network-viewer.plugin
|
||||
ln -s /run/wrappers/bin/debugfs.plugin $out/libexec/netdata/plugins.d/debugfs.plugin
|
||||
'';
|
||||
|
||||
plugins = [
|
||||
@ -47,6 +50,7 @@ let
|
||||
|
||||
defaultUser = "netdata";
|
||||
|
||||
isThereAnyWireGuardTunnels = config.networking.wireguard.enable || lib.any (c: lib.hasAttrByPath [ "netdevConfig" "Kind" ] c && c.netdevConfig.Kind == "wireguard") (builtins.attrValues config.systemd.network.netdevs);
|
||||
in {
|
||||
options = {
|
||||
services.netdata = {
|
||||
@ -86,6 +90,14 @@ in {
|
||||
Whether to enable python-based plugins
|
||||
'';
|
||||
};
|
||||
recommendedPythonPackages = mkOption {
|
||||
type = types.bool;
|
||||
default = false;
|
||||
description = ''
|
||||
Whether to enable a set of recommended Python plugins
|
||||
by installing extra Python packages.
|
||||
'';
|
||||
};
|
||||
extraPackages = mkOption {
|
||||
type = types.functionTo (types.listOf types.package);
|
||||
default = ps: [];
|
||||
@ -198,13 +210,26 @@ in {
|
||||
}
|
||||
];
|
||||
|
||||
# Includes a set of recommended Python plugins in exchange of imperfect disk consumption.
|
||||
services.netdata.python.extraPackages = lib.mkIf cfg.python.recommendedPythonPackages (ps: [
|
||||
ps.requests
|
||||
ps.pandas
|
||||
ps.numpy
|
||||
ps.psycopg2
|
||||
ps.python-ldap
|
||||
ps.netdata-pandas
|
||||
ps.changefinder
|
||||
]);
|
||||
|
||||
services.netdata.configDir.".opt-out-from-anonymous-statistics" = mkIf (!cfg.enableAnalyticsReporting) (pkgs.writeText ".opt-out-from-anonymous-statistics" "");
|
||||
environment.etc."netdata/netdata.conf".source = configFile;
|
||||
environment.etc."netdata/conf.d".source = configDirectory;
|
||||
|
||||
systemd.services.netdata = {
|
||||
description = "Real time performance monitoring";
|
||||
after = [ "network.target" ];
|
||||
after = [ "network.target" "suid-sgid-wrappers.service" ];
|
||||
# No wrapper means no "useful" netdata.
|
||||
requires = [ "suid-sgid-wrappers.service" ];
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
path = (with pkgs; [
|
||||
curl
|
||||
@ -213,10 +238,16 @@ in {
|
||||
which
|
||||
procps
|
||||
bash
|
||||
nvme-cli # for go.d
|
||||
iw # for charts.d
|
||||
apcupsd # for charts.d
|
||||
# TODO: firehol # for FireQoS -- this requires more NixOS module support.
|
||||
util-linux # provides logger command; required for syslog health alarms
|
||||
])
|
||||
++ lib.optional cfg.python.enable (pkgs.python3.withPackages cfg.python.extraPackages)
|
||||
++ lib.optional config.virtualisation.libvirtd.enable (config.virtualisation.libvirtd.package);
|
||||
++ lib.optional config.virtualisation.libvirtd.enable config.virtualisation.libvirtd.package
|
||||
++ lib.optional config.virtualisation.docker.enable config.virtualisation.docker.package
|
||||
++ lib.optionals config.virtualisation.podman.enable [ pkgs.jq config.virtualisation.podman.package ];
|
||||
environment = {
|
||||
PYTHONPATH = "${cfg.package}/libexec/netdata/python.d/python_modules";
|
||||
NETDATA_PIPENAME = "/run/netdata/ipc";
|
||||
@ -256,6 +287,8 @@ in {
|
||||
# Configuration directory and mode
|
||||
ConfigurationDirectory = "netdata";
|
||||
ConfigurationDirectoryMode = "0755";
|
||||
# AmbientCapabilities
|
||||
AmbientCapabilities = lib.optional isThereAnyWireGuardTunnels "CAP_NET_ADMIN";
|
||||
# Capabilities
|
||||
CapabilityBoundingSet = [
|
||||
"CAP_DAC_OVERRIDE" # is required for freeipmi and slabinfo plugins
|
||||
@ -269,7 +302,7 @@ in {
|
||||
"CAP_SYS_CHROOT" # is required for cgroups plugin
|
||||
"CAP_SETUID" # is required for cgroups and cgroups-network plugins
|
||||
"CAP_SYSLOG" # is required for systemd-journal plugin
|
||||
];
|
||||
] ++ lib.optional isThereAnyWireGuardTunnels "CAP_NET_ADMIN";
|
||||
# Sandboxing
|
||||
ProtectSystem = "full";
|
||||
ProtectHome = "read-only";
|
||||
@ -308,6 +341,14 @@ in {
|
||||
permissions = "u+rx,g+x,o-rwx";
|
||||
};
|
||||
|
||||
"debugfs.plugin" = {
|
||||
source = "${cfg.package}/libexec/netdata/plugins.d/debugfs.plugin.org";
|
||||
capabilities = "cap_dac_read_search+ep";
|
||||
owner = cfg.user;
|
||||
group = cfg.group;
|
||||
permissions = "u+rx,g+x,o-rwx";
|
||||
};
|
||||
|
||||
"cgroup-network" = {
|
||||
source = "${cfg.package}/libexec/netdata/plugins.d/cgroup-network.org";
|
||||
capabilities = "cap_setuid+ep";
|
||||
@ -332,6 +373,14 @@ in {
|
||||
permissions = "u+rx,g+x,o-rwx";
|
||||
};
|
||||
|
||||
"logs-management.plugin" = {
|
||||
source = "${cfg.package}/libexec/netdata/plugins.d/logs-management.plugin.org";
|
||||
capabilities = "cap_dac_read_search,cap_syslog+ep";
|
||||
owner = cfg.user;
|
||||
group = cfg.group;
|
||||
permissions = "u+rx,g+x,o-rwx";
|
||||
};
|
||||
|
||||
"slabinfo.plugin" = {
|
||||
source = "${cfg.package}/libexec/netdata/plugins.d/slabinfo.plugin.org";
|
||||
capabilities = "cap_dac_override+ep";
|
||||
@ -348,6 +397,14 @@ in {
|
||||
group = cfg.group;
|
||||
permissions = "u+rx,g+x,o-rwx";
|
||||
};
|
||||
} // optionalAttrs (cfg.package.withNetworkViewer) {
|
||||
"network-viewer.plugin" = {
|
||||
source = "${cfg.package}/libexec/netdata/plugins.d/network-viewer.plugin.org";
|
||||
capabilities = "cap_sys_admin,cap_dac_read_search,cap_sys_ptrace+ep";
|
||||
owner = cfg.user;
|
||||
group = cfg.group;
|
||||
permissions = "u+rx,g+x,o-rwx";
|
||||
};
|
||||
};
|
||||
|
||||
security.pam.loginLimits = [
|
||||
@ -359,6 +416,8 @@ in {
|
||||
${defaultUser} = {
|
||||
group = defaultUser;
|
||||
isSystemUser = true;
|
||||
extraGroups = lib.optional config.virtualisation.docker.enable "docker"
|
||||
++ lib.optional config.virtualisation.podman.enable "podman";
|
||||
};
|
||||
};
|
||||
|
||||
|
@ -4,7 +4,9 @@ with lib;
|
||||
|
||||
let
|
||||
cfg = config.services.zerotierone;
|
||||
localConfFile = pkgs.writeText "zt-local.conf" (builtins.toJSON cfg.localConf);
|
||||
|
||||
settingsFormat = pkgs.formats.json {};
|
||||
localConfFile = settingsFormat.generate "zt-local.conf" cfg.localConf;
|
||||
localConfFilePath = "/var/lib/zerotier-one/local.conf";
|
||||
in
|
||||
{
|
||||
@ -41,7 +43,7 @@ in
|
||||
example = {
|
||||
settings.allowTcpFallbackRelay = false;
|
||||
};
|
||||
type = types.nullOr types.attrs;
|
||||
type = settingsFormat.type;
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
@ -60,7 +62,7 @@ in
|
||||
chown -R root:root /var/lib/zerotier-one
|
||||
'' + (concatMapStrings (netId: ''
|
||||
touch "/var/lib/zerotier-one/networks.d/${netId}.conf"
|
||||
'') cfg.joinNetworks) + optionalString (cfg.localConf != null) ''
|
||||
'') cfg.joinNetworks) + optionalString (cfg.localConf != {}) ''
|
||||
if [ -L "${localConfFilePath}" ]
|
||||
then
|
||||
rm ${localConfFilePath}
|
||||
|
@ -4,7 +4,7 @@ let
|
||||
settingsFormat = (pkgs.formats.json { });
|
||||
in
|
||||
{
|
||||
meta.maintainers = with lib.maintainers; [ mohe2015 ];
|
||||
meta.maintainers = with lib.maintainers; [ ];
|
||||
|
||||
options = {
|
||||
services.step-ca = {
|
||||
|
@ -219,5 +219,5 @@ in
|
||||
users.groups.zitadel = lib.mkIf (cfg.group == "zitadel") { };
|
||||
};
|
||||
|
||||
meta.maintainers = with lib.maintainers; [ Sorixelle ];
|
||||
meta.maintainers = [ ];
|
||||
}
|
||||
|
@ -71,9 +71,7 @@ in {
|
||||
|
||||
host = mkOption {
|
||||
type = lib.types.str;
|
||||
default = "bluemap.${config.networking.domain}";
|
||||
defaultText = lib.literalExpression "bluemap.\${config.networking.domain}";
|
||||
description = "Domain to configure nginx for";
|
||||
description = "Domain on which nginx will serve the bluemap webapp";
|
||||
};
|
||||
|
||||
onCalendar = mkOption {
|
||||
|
@ -22,5 +22,5 @@
|
||||
};
|
||||
};
|
||||
|
||||
meta.maintainers = [ lib.maintainers.lheckemann ];
|
||||
meta.maintainers = [ ];
|
||||
}
|
||||
|
@ -500,7 +500,8 @@ in {
|
||||
libreddit = handleTest ./libreddit.nix {};
|
||||
librenms = handleTest ./librenms.nix {};
|
||||
libresprite = handleTest ./libresprite.nix {};
|
||||
libreswan = handleTest ./libreswan.nix {};
|
||||
libreswan = runTest ./libreswan.nix;
|
||||
libreswan-nat = runTest ./libreswan-nat.nix;
|
||||
librewolf = handleTest ./firefox.nix { firefoxPackage = pkgs.librewolf; };
|
||||
libuiohook = handleTest ./libuiohook.nix {};
|
||||
libvirtd = handleTest ./libvirtd.nix {};
|
||||
|
@ -9,7 +9,7 @@ let
|
||||
testWithCompressor = compressor: testing.makeTest {
|
||||
name = "initrd-secrets-${compressor}";
|
||||
|
||||
meta.maintainers = [ lib.maintainers.lheckemann ];
|
||||
meta.maintainers = [ ];
|
||||
|
||||
nodes.machine = { ... }: {
|
||||
virtualisation.useBootLoader = true;
|
||||
|
238
nixos/tests/libreswan-nat.nix
Normal file
238
nixos/tests/libreswan-nat.nix
Normal file
@ -0,0 +1,238 @@
|
||||
# This test sets up an IPsec VPN server that allows a client behind an IPv4 NAT
|
||||
# router to access the IPv6 internet. We check that the client initially can't
|
||||
# ping an IPv6 hosts and its connection to the server can be eavesdropped by
|
||||
# the router, but once the IPsec tunnel is enstablished it can talk to an
|
||||
# IPv6-only host and the connection is secure.
|
||||
#
|
||||
# Notes:
|
||||
# - the VPN is implemented using policy-based routing.
|
||||
# - the client is assigned an IPv6 address from the same /64 subnet
|
||||
# of the server, without DHCPv6 or SLAAC.
|
||||
# - the server acts as NDP proxy for the client, so that the latter
|
||||
# becomes reachable at its assigned IPv6 via the server.
|
||||
# - the client falls back to TCP if UDP is blocked
|
||||
|
||||
{ lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
|
||||
# Common network setup
|
||||
baseNetwork = {
|
||||
# shared hosts file
|
||||
networking.extraHosts = lib.mkVMOverride ''
|
||||
203.0.113.1 router
|
||||
203.0.113.2 server
|
||||
2001:db8::2 inner
|
||||
192.168.1.1 client
|
||||
'';
|
||||
# open a port for testing
|
||||
networking.firewall.allowedUDPPorts = [ 1234 ];
|
||||
};
|
||||
|
||||
# Common IPsec configuration
|
||||
baseTunnel = {
|
||||
services.libreswan.enable = true;
|
||||
environment.etc."ipsec.d/tunnel.secrets" =
|
||||
{ text = ''@server %any : PSK "j1JbIi9WY07rxwcNQ6nbyThKCf9DGxWOyokXIQcAQUnafsNTUJxfsxwk9WYK8fHj"'';
|
||||
mode = "600";
|
||||
};
|
||||
};
|
||||
|
||||
# Helpers to add a static IP address on an interface
|
||||
setAddress4 = iface: addr: {
|
||||
networking.interfaces.${iface}.ipv4.addresses =
|
||||
lib.mkVMOverride [ { address = addr; prefixLength = 24; } ];
|
||||
};
|
||||
setAddress6 = iface: addr: {
|
||||
networking.interfaces.${iface}.ipv6.addresses =
|
||||
lib.mkVMOverride [ { address = addr; prefixLength = 64; } ];
|
||||
};
|
||||
|
||||
in
|
||||
|
||||
{
|
||||
name = "libreswan-nat";
|
||||
meta = with lib.maintainers; {
|
||||
maintainers = [ rnhmjoj ];
|
||||
};
|
||||
|
||||
nodes.router = { pkgs, ... }: lib.mkMerge [
|
||||
baseNetwork
|
||||
(setAddress4 "eth1" "203.0.113.1")
|
||||
(setAddress4 "eth2" "192.168.1.1")
|
||||
{
|
||||
virtualisation.vlans = [ 1 2 ];
|
||||
environment.systemPackages = [ pkgs.tcpdump ];
|
||||
networking.nat = {
|
||||
enable = true;
|
||||
externalInterface = "eth1";
|
||||
internalInterfaces = [ "eth2" ];
|
||||
};
|
||||
networking.firewall.trustedInterfaces = [ "eth2" ];
|
||||
}
|
||||
];
|
||||
|
||||
nodes.inner = lib.mkMerge [
|
||||
baseNetwork
|
||||
(setAddress6 "eth1" "2001:db8::2")
|
||||
{ virtualisation.vlans = [ 3 ]; }
|
||||
];
|
||||
|
||||
nodes.server = lib.mkMerge [
|
||||
baseNetwork
|
||||
baseTunnel
|
||||
(setAddress4 "eth1" "203.0.113.2")
|
||||
(setAddress6 "eth2" "2001:db8::1")
|
||||
{
|
||||
virtualisation.vlans = [ 1 3 ];
|
||||
networking.firewall.allowedUDPPorts = [ 500 4500 ];
|
||||
networking.firewall.allowedTCPPorts = [ 993 ];
|
||||
|
||||
# see https://github.com/NixOS/nixpkgs/pull/310857
|
||||
networking.firewall.checkReversePath = false;
|
||||
|
||||
boot.kernel.sysctl = {
|
||||
# enable forwarding packets
|
||||
"net.ipv6.conf.all.forwarding" = 1;
|
||||
"net.ipv4.conf.all.forwarding" = 1;
|
||||
# enable NDP proxy for VPN clients
|
||||
"net.ipv6.conf.all.proxy_ndp" = 1;
|
||||
};
|
||||
|
||||
services.libreswan.configSetup = "listen-tcp=yes";
|
||||
services.libreswan.connections.tunnel = ''
|
||||
# server
|
||||
left=203.0.113.2
|
||||
leftid=@server
|
||||
leftsubnet=::/0
|
||||
leftupdown=${pkgs.writeScript "updown" ''
|
||||
# act as NDP proxy for VPN clients
|
||||
if test "$PLUTO_VERB" = up-client-v6; then
|
||||
ip neigh add proxy "$PLUTO_PEER_CLIENT_NET" dev eth2
|
||||
fi
|
||||
if test "$PLUTO_VERB" = down-client-v6; then
|
||||
ip neigh del proxy "$PLUTO_PEER_CLIENT_NET" dev eth2
|
||||
fi
|
||||
''}
|
||||
|
||||
# clients
|
||||
right=%any
|
||||
rightaddresspool=2001:db8:0:0:c::/97
|
||||
modecfgdns=2001:db8::1
|
||||
|
||||
# clean up vanished clients
|
||||
dpddelay=30
|
||||
|
||||
auto=add
|
||||
keyexchange=ikev2
|
||||
rekey=no
|
||||
narrowing=yes
|
||||
fragmentation=yes
|
||||
authby=secret
|
||||
|
||||
leftikeport=993
|
||||
retransmit-timeout=10s
|
||||
'';
|
||||
}
|
||||
];
|
||||
|
||||
nodes.client = lib.mkMerge [
|
||||
baseNetwork
|
||||
baseTunnel
|
||||
(setAddress4 "eth1" "192.168.1.2")
|
||||
{
|
||||
virtualisation.vlans = [ 2 ];
|
||||
networking.defaultGateway = {
|
||||
address = "192.168.1.1";
|
||||
interface = "eth1";
|
||||
};
|
||||
services.libreswan.connections.tunnel = ''
|
||||
# client
|
||||
left=%defaultroute
|
||||
leftid=@client
|
||||
leftmodecfgclient=yes
|
||||
leftsubnet=::/0
|
||||
|
||||
# server
|
||||
right=203.0.113.2
|
||||
rightid=@server
|
||||
rightsubnet=::/0
|
||||
|
||||
auto=add
|
||||
narrowing=yes
|
||||
rekey=yes
|
||||
fragmentation=yes
|
||||
authby=secret
|
||||
|
||||
# fallback when UDP is blocked
|
||||
enable-tcp=fallback
|
||||
tcp-remoteport=993
|
||||
retransmit-timeout=5s
|
||||
'';
|
||||
}
|
||||
];
|
||||
|
||||
testScript =
|
||||
''
|
||||
def client_to_host(machine, msg: str):
|
||||
"""
|
||||
Sends a message from client to server
|
||||
"""
|
||||
machine.execute("nc -lu :: 1234 >/tmp/msg &")
|
||||
client.sleep(1)
|
||||
client.succeed(f"echo '{msg}' | nc -uw 0 {machine.name} 1234")
|
||||
client.sleep(1)
|
||||
machine.succeed(f"grep '{msg}' /tmp/msg")
|
||||
|
||||
|
||||
def eavesdrop():
|
||||
"""
|
||||
Starts eavesdropping on the router
|
||||
"""
|
||||
match = "udp port 1234"
|
||||
router.execute(f"tcpdump -i eth1 -c 1 -Avv {match} >/tmp/log &")
|
||||
|
||||
|
||||
start_all()
|
||||
|
||||
with subtest("Network is up"):
|
||||
client.wait_until_succeeds("ping -c1 server")
|
||||
client.succeed("systemctl restart ipsec")
|
||||
server.succeed("systemctl restart ipsec")
|
||||
|
||||
with subtest("Router can eavesdrop cleartext traffic"):
|
||||
eavesdrop()
|
||||
client_to_host(server, "I secretly love turnip")
|
||||
router.sleep(1)
|
||||
router.succeed("grep turnip /tmp/log")
|
||||
|
||||
with subtest("Libreswan is ready"):
|
||||
client.wait_for_unit("ipsec")
|
||||
server.wait_for_unit("ipsec")
|
||||
client.succeed("ipsec checkconfig")
|
||||
server.succeed("ipsec checkconfig")
|
||||
|
||||
with subtest("Client can't ping VPN host"):
|
||||
client.fail("ping -c1 inner")
|
||||
|
||||
with subtest("Client can start the tunnel"):
|
||||
client.succeed("ipsec start tunnel")
|
||||
client.succeed("ip -6 addr show lo | grep -q 2001:db8:0:0:c")
|
||||
|
||||
with subtest("Client can ping VPN host"):
|
||||
client.wait_until_succeeds("ping -c1 2001:db8::1")
|
||||
client.succeed("ping -c1 inner")
|
||||
|
||||
with subtest("Eve no longer can eavesdrop"):
|
||||
eavesdrop()
|
||||
client_to_host(inner, "Just kidding, I actually like rhubarb")
|
||||
router.sleep(1)
|
||||
router.fail("grep rhubarb /tmp/log")
|
||||
|
||||
with subtest("TCP fallback is available"):
|
||||
server.succeed("iptables -I nixos-fw -p udp -j DROP")
|
||||
client.succeed("ipsec restart")
|
||||
client.execute("ipsec start tunnel")
|
||||
client.wait_until_succeeds("ping -c1 inner")
|
||||
'';
|
||||
}
|
@ -3,7 +3,7 @@
|
||||
# Eve can eavesdrop the plaintext traffic between Alice and Bob, but once they
|
||||
# enable the secure tunnel Eve's spying becomes ineffective.
|
||||
|
||||
import ./make-test-python.nix ({ lib, pkgs, ... }:
|
||||
{ lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
|
||||
@ -133,4 +133,4 @@ in
|
||||
eve.sleep(1)
|
||||
eve.fail("grep rhubarb /tmp/log")
|
||||
'';
|
||||
})
|
||||
}
|
||||
|
@ -11,7 +11,10 @@ import ./make-test-python.nix ({ pkgs, ...} : {
|
||||
{ pkgs, ... }:
|
||||
{
|
||||
environment.systemPackages = with pkgs; [ curl jq netdata ];
|
||||
services.netdata.enable = true;
|
||||
services.netdata = {
|
||||
enable = true;
|
||||
python.recommendedPythonPackages = true;
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
|
@ -7,7 +7,7 @@ with import ../lib/testing-python.nix { inherit system pkgs; };
|
||||
makeTest {
|
||||
name = "tigervnc";
|
||||
meta = with pkgs.lib.maintainers; {
|
||||
maintainers = [ lheckemann ];
|
||||
maintainers = [ ];
|
||||
};
|
||||
|
||||
nodes = {
|
||||
|
@ -1,6 +1,6 @@
|
||||
import ./make-test-python.nix ({ pkgs, ...} : {
|
||||
name = "timezone";
|
||||
meta.maintainers = with pkgs.lib.maintainers; [ lheckemann ];
|
||||
meta.maintainers = with pkgs.lib.maintainers; [ ];
|
||||
|
||||
nodes = {
|
||||
node_eutz = { pkgs, ... }: {
|
||||
|
@ -202,7 +202,7 @@ stdenv.mkDerivation rec {
|
||||
# Documentation.
|
||||
cc-by-30
|
||||
];
|
||||
maintainers = with maintainers; [ lheckemann veprbl wegank ];
|
||||
maintainers = with maintainers; [ veprbl wegank ];
|
||||
platforms = platforms.unix;
|
||||
};
|
||||
}
|
||||
|
@ -16,7 +16,7 @@ stdenv.mkDerivation {
|
||||
meta = with lib; {
|
||||
homepage = "https://www.parabola.me.uk/alsa/pmidi.html";
|
||||
description = "Straightforward command line program to play midi files through the ALSA sequencer";
|
||||
maintainers = with maintainers; [ lheckemann ];
|
||||
maintainers = with maintainers; [ ];
|
||||
license = licenses.gpl2;
|
||||
mainProgram = "pmidi";
|
||||
};
|
||||
|
@ -152,7 +152,7 @@ stdenv.mkDerivation rec {
|
||||
mainProgram = "tenacity";
|
||||
homepage = "https://tenacityaudio.org/";
|
||||
license = licenses.gpl2Plus;
|
||||
maintainers = with maintainers; [ irenes lheckemann ];
|
||||
maintainers = with maintainers; [ irenes ];
|
||||
platforms = platforms.linux;
|
||||
};
|
||||
}
|
||||
|
@ -436,11 +436,15 @@
|
||||
pname = "codesnap.nvim";
|
||||
inherit version src;
|
||||
|
||||
# - Remove the shipped pre-built binaries
|
||||
# - Copy the resulting binary from the codesnap-lib derivation
|
||||
# Note: the destination should be generator.so, even on darwin
|
||||
# https://github.com/mistricky/codesnap.nvim/blob/main/scripts/build_generator.sh
|
||||
postInstall = let
|
||||
extension = if stdenv.isDarwin then "dylib" else "so";
|
||||
in ''
|
||||
cp ${codesnap-lib}/lib/libgenerator.${extension} lua/generator.so
|
||||
rm -r $out/lua/*.so
|
||||
cp ${codesnap-lib}/lib/libgenerator.${extension} $out/lua/generator.so
|
||||
'';
|
||||
|
||||
doInstallCheck = true;
|
||||
|
@ -26,6 +26,6 @@ mkDerivation {
|
||||
description = "Galactic strategy game";
|
||||
mainProgram = "konquest";
|
||||
license = with lib.licenses; [ gpl2 ];
|
||||
maintainers = with lib.maintainers; [ lheckemann ];
|
||||
maintainers = with lib.maintainers; [ ];
|
||||
};
|
||||
}
|
||||
|
@ -20,6 +20,6 @@ mkDerivation {
|
||||
];
|
||||
meta = {
|
||||
license = with lib.licenses; [ gpl2 ];
|
||||
maintainers = with lib.maintainers; [ lheckemann ];
|
||||
maintainers = with lib.maintainers; [ ];
|
||||
};
|
||||
}
|
||||
|
@ -44,7 +44,7 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
homepage = "https://github.com/Cloudef/bemenu";
|
||||
description = "Dynamic menu library and client program inspired by dmenu";
|
||||
license = licenses.gpl3Plus;
|
||||
maintainers = with maintainers; [ lheckemann ];
|
||||
maintainers = with maintainers; [ ];
|
||||
mainProgram = "bemenu";
|
||||
platforms = with platforms; linux;
|
||||
};
|
||||
|
@ -110,7 +110,7 @@ stdenv.mkDerivation rec {
|
||||
longDescription = "GNOME Calls is a phone dialer and call handler. Setting NixOS option `programs.calls.enable = true` is recommended.";
|
||||
homepage = "https://gitlab.gnome.org/GNOME/calls";
|
||||
license = licenses.gpl3Plus;
|
||||
maintainers = with maintainers; [ craigem lheckemann ];
|
||||
maintainers = with maintainers; [ craigem ];
|
||||
platforms = platforms.linux;
|
||||
mainProgram = "gnome-calls";
|
||||
};
|
||||
|
@ -58,7 +58,6 @@ let
|
||||
changelog = "https://github.com/opentofu/opentofu/blob/v${version}/CHANGELOG.md";
|
||||
license = licenses.mpl20;
|
||||
maintainers = with maintainers; [
|
||||
gmemstr
|
||||
nickcao
|
||||
zowoq
|
||||
];
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -21,13 +21,13 @@
|
||||
rustPlatform.buildRustPackage rec {
|
||||
pname = "cinny-desktop";
|
||||
# We have to be using the same version as cinny-web or this isn't going to work.
|
||||
version = "3.1.0";
|
||||
version = "3.2.0";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "cinnyapp";
|
||||
repo = "cinny-desktop";
|
||||
rev = "v${version}";
|
||||
hash = "sha256-v5D0/EHVQ2xo7TGo+jZoRDBVFczkaZu2ka6QpwV4dpw=";
|
||||
hash = "sha256-uHGqvulH7/9JpUjkpcbCh1pPvX4/ndVIKcBXzWmDo+s=";
|
||||
};
|
||||
|
||||
sourceRoot = "${src.name}/src-tauri";
|
||||
|
@ -18,16 +18,16 @@ let
|
||||
in
|
||||
buildNpmPackage rec {
|
||||
pname = "cinny";
|
||||
version = "3.1.0";
|
||||
version = "3.2.0";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "cinnyapp";
|
||||
repo = "cinny";
|
||||
rev = "v${version}";
|
||||
hash = "sha256-GcygxK9NcGlv4rwxQCJqi0BhNlOTFxjGB8mbfTaBMOk=";
|
||||
hash = "sha256-wAa7y2mXPkXAfirRSFqwZYIJK0CKDzZG8ULzXzr4zZ4=";
|
||||
};
|
||||
|
||||
npmDepsHash = "sha256-4R+To2LhcnEM9x1noo6MhCckyBKgPWiAi7zgDqAmaN0=";
|
||||
npmDepsHash = "sha256-dVdylvclUIHvF5syVumdxkXR4bG1FA4LOYg3GmnNzXE=";
|
||||
|
||||
# Fix error: no member named 'aligned_alloc' in the global namespace
|
||||
env.NIX_CFLAGS_COMPILE = lib.optionalString (
|
||||
|
@ -202,7 +202,7 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
'';
|
||||
homepage = "https://www.freerdp.com/";
|
||||
license = licenses.asl20;
|
||||
maintainers = with maintainers; [ peterhoeg lheckemann ];
|
||||
maintainers = with maintainers; [ peterhoeg ];
|
||||
platforms = platforms.unix;
|
||||
};
|
||||
})
|
||||
|
@ -207,7 +207,7 @@ stdenv.mkDerivation rec {
|
||||
homepage = "https://www.freerdp.com/";
|
||||
changelog = "https://github.com/FreeRDP/FreeRDP/releases/tag/${src.rev}";
|
||||
license = licenses.asl20;
|
||||
maintainers = with maintainers; [ peterhoeg lheckemann ];
|
||||
maintainers = with maintainers; [ peterhoeg ];
|
||||
platforms = platforms.unix;
|
||||
};
|
||||
}
|
||||
|
@ -26,7 +26,7 @@ stdenv.mkDerivation rec {
|
||||
meta = {
|
||||
description = "Prepare and store patch revisions as git tags";
|
||||
license = lib.licenses.mit;
|
||||
maintainers = [ lib.maintainers.lheckemann ];
|
||||
maintainers = [ ];
|
||||
homepage = "https://github.com/stefanha/git-publish";
|
||||
mainProgram = "git-publish";
|
||||
};
|
||||
|
@ -12,7 +12,7 @@ rustPlatform.buildRustPackage {
|
||||
meta = {
|
||||
description = "Tool for copying binaries and their dependencies";
|
||||
mainProgram = "make-initrd-ng";
|
||||
maintainers = with lib.maintainers; [ das_j elvishjerricco k900 lheckemann ];
|
||||
maintainers = with lib.maintainers; [ das_j elvishjerricco k900 ];
|
||||
license = lib.licenses.mit;
|
||||
};
|
||||
}
|
||||
|
@ -218,6 +218,10 @@ in
|
||||
buildInputs = [ openssl ];
|
||||
};
|
||||
|
||||
opentelemetry-proto = attrs: {
|
||||
nativeBuildInputs = [ protobuf ];
|
||||
};
|
||||
|
||||
pam-sys = attr: {
|
||||
buildInputs = [ linux-pam ];
|
||||
};
|
||||
@ -236,6 +240,10 @@ in
|
||||
nativeBuildInputs = [ protobuf ];
|
||||
};
|
||||
|
||||
prost-wkt-types = attr: {
|
||||
nativeBuildInputs = [ protobuf ];
|
||||
};
|
||||
|
||||
rdkafka-sys = attr: {
|
||||
nativeBuildInputs = [ pkg-config ];
|
||||
buildInputs = [ rdkafka ];
|
||||
@ -299,6 +307,10 @@ in
|
||||
buildInputs = [ libsodium ];
|
||||
};
|
||||
|
||||
tonic-reflection = attrs: {
|
||||
nativeBuildInputs = [ protobuf ];
|
||||
};
|
||||
|
||||
xcb = attrs: {
|
||||
buildInputs = [ python3 ];
|
||||
};
|
||||
|
@ -9,11 +9,11 @@
|
||||
|
||||
stdenvNoCC.mkDerivation (finalAttrs: {
|
||||
pname = "arc-browser";
|
||||
version = "1.46.0-50665";
|
||||
version = "1.47.1-50893";
|
||||
|
||||
src = fetchurl {
|
||||
url = "https://releases.arc.net/release/Arc-${finalAttrs.version}.dmg";
|
||||
hash = "sha256-k1guZWLeA9obSYRPSKObGhYYjRKxPBQ0wtAGSU2REjA=";
|
||||
hash = "sha256-BiEJDs5cHXkmfT9omxG7uk/6zXdOa/69Zn/Y0HqclQc=";
|
||||
};
|
||||
|
||||
nativeBuildInputs = [ undmg ];
|
||||
|
31
pkgs/by-name/ar/ardugotools/package.nix
Normal file
31
pkgs/by-name/ar/ardugotools/package.nix
Normal file
@ -0,0 +1,31 @@
|
||||
{
|
||||
lib,
|
||||
buildGoModule,
|
||||
fetchFromGitHub,
|
||||
...
|
||||
}:
|
||||
let
|
||||
version = "0.5.1";
|
||||
in
|
||||
buildGoModule {
|
||||
pname = "ardugotools";
|
||||
inherit version;
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "randomouscrap98";
|
||||
repo = "ardugotools";
|
||||
rev = "refs/tags/v${version}";
|
||||
hash = "sha256-c+sJoE5NML06bl6ch+OiN1vO0rdyE2gf/z4pzY7i5Qk=";
|
||||
};
|
||||
|
||||
vendorHash = "sha256-Z9ObsS+GwVsz6ZlXCgN0WlShHzbmx4WLa/1/XLSSAAs=";
|
||||
|
||||
meta = {
|
||||
description = "CLI toolset for Arduboy";
|
||||
changelog = "https://github.com/randomouscrap98/ardugotools/releases/tag/v${version}";
|
||||
homepage = "https://github.com/randomouscrap98/ardugotools";
|
||||
license = lib.licenses.mit;
|
||||
maintainers = with lib.maintainers; [ luftmensch-luftmensch ];
|
||||
mainProgram = "ardugotools";
|
||||
};
|
||||
}
|
@ -7,11 +7,10 @@
|
||||
imagemagick,
|
||||
copyDesktopItems,
|
||||
makeDesktopItem,
|
||||
electron_28,
|
||||
electron
|
||||
}:
|
||||
|
||||
let
|
||||
electron = electron_28;
|
||||
electronDist = "${electron}/${if stdenv.isDarwin then "Applications" else "libexec/electron"}";
|
||||
in
|
||||
buildNpmPackage rec {
|
||||
|
@ -6,11 +6,11 @@
|
||||
|
||||
stdenv.mkDerivation (finalAttrs: {
|
||||
pname = "cdk";
|
||||
version = "5.0-20230201";
|
||||
version = "5.0-20240619";
|
||||
|
||||
src = fetchurl {
|
||||
url = "https://invisible-mirror.net/archives/cdk/cdk-${finalAttrs.version}.tgz";
|
||||
hash = "sha256-oxJ7Wf5QX16Jjao90VsM9yShJ0zmgWW3eb4vKdTE8vY=";
|
||||
hash = "sha256-Q28U6KdW5j3f9ZJ+73DJ3PceTFnVZYfiYwKk9yahnv8=";
|
||||
};
|
||||
|
||||
buildInputs = [
|
||||
|
@ -23,6 +23,6 @@ stdenv.mkDerivation {
|
||||
mainProgram = "encled";
|
||||
homepage = "https://github.com/amarao/sdled";
|
||||
license = lib.licenses.gpl2Plus;
|
||||
maintainers = [ lib.maintainers.lheckemann ];
|
||||
maintainers = [ ];
|
||||
};
|
||||
}
|
||||
|
@ -5,12 +5,12 @@
|
||||
|
||||
appimageTools.wrapType2 rec {
|
||||
pname = "kchat";
|
||||
version = "2.4.0";
|
||||
version = "3.3.1";
|
||||
|
||||
src = fetchurl {
|
||||
url = "https://download.storage5.infomaniak.com/kchat/kchat-desktop-${version}-linux-x86_64.AppImage";
|
||||
name = "kchat-${version}.AppImage";
|
||||
hash = "sha256-8mkkHod7iBhHVAL/vQCVnmwVlPGikdHhtiEaFVIayrU=";
|
||||
hash = "sha256-f9wWgZSPSMP7bLZGfR5F6l/eAVHVhRmF1c7S6/qLgIA=";
|
||||
};
|
||||
|
||||
extraInstallCommands =
|
||||
@ -24,7 +24,8 @@ appimageTools.wrapType2 rec {
|
||||
cp -r ${contents}/usr/* "$out"
|
||||
cp "${contents}/kchat-desktop.desktop" "$out/share/applications/"
|
||||
mv "$out/bin/kchat" "$out/bin/${meta.mainProgram}" || true
|
||||
substituteInPlace $out/share/applications/kchat-desktop.desktop --replace 'Exec=AppRun' 'Exec=${meta.mainProgram}'
|
||||
install -m 444 -D ${contents}/kchat-desktop.desktop $out/share/applications/kchat-desktop.desktop
|
||||
substituteInPlace $out/share/applications/kchat-desktop.desktop --replace-fail 'Exec=AppRun' 'Exec=${meta.mainProgram}'
|
||||
'';
|
||||
|
||||
meta = with lib; {
|
||||
|
@ -5,12 +5,12 @@
|
||||
|
||||
appimageTools.wrapType2 rec {
|
||||
pname = "miru";
|
||||
version = "5.1.3";
|
||||
version = "5.1.4";
|
||||
|
||||
src = fetchurl {
|
||||
url = "https://github.com/ThaUnknown/miru/releases/download/v${version}/linux-Miru-${version}.AppImage";
|
||||
name = "${pname}-${version}.AppImage";
|
||||
sha256 = "sha256-F2wFCZvuANoeBNO+o3Rs/DJtyIVQl46MQCpXQcRiDHs=";
|
||||
sha256 = "sha256-aPutbJthUhZtBYkYuUB5v88OdhOrcnqw4AhnepfO1B4=";
|
||||
};
|
||||
|
||||
extraInstallCommands =
|
||||
|
@ -48,7 +48,7 @@ stdenv.mkDerivation rec {
|
||||
];
|
||||
|
||||
platforms = lib.platforms.all;
|
||||
maintainers = with lib.maintainers; [ lheckemann alva melkor333 ];
|
||||
maintainers = with lib.maintainers; [ alva melkor333 ];
|
||||
changelog = "https://www.oilshell.org/release/${version}/changelog.html";
|
||||
};
|
||||
|
||||
|
@ -58,7 +58,7 @@ stdenv.mkDerivation rec {
|
||||
license = lib.licenses.asl20;
|
||||
|
||||
platforms = lib.platforms.all;
|
||||
maintainers = with lib.maintainers; [ lheckemann alva mkg20001 melkor333 ];
|
||||
maintainers = with lib.maintainers; [ alva mkg20001 melkor333 ];
|
||||
changelog = "https://www.oilshell.org/release/${version}/changelog.html";
|
||||
};
|
||||
|
||||
|
@ -31,13 +31,13 @@
|
||||
let
|
||||
pname = "ollama";
|
||||
# don't forget to invalidate all hashes each update
|
||||
version = "0.1.44";
|
||||
version = "0.1.45";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "ollama";
|
||||
repo = "ollama";
|
||||
rev = "v${version}";
|
||||
hash = "sha256-HM7xtVdhRwhsLEBLvCgjU1iwdaqowRdrxh/Z0BzTPn8=";
|
||||
hash = "sha256-AKAuySyReG6kkwwgWodAso44+kri2Gz5VSLco8GBoIw=";
|
||||
fetchSubmodules = true;
|
||||
};
|
||||
|
||||
@ -47,11 +47,11 @@ let
|
||||
# `ollama/llm/generate/gen_common.sh` -> "apply temporary patches until fix is upstream"
|
||||
# each update, these patches should be synchronized with the contents of `ollama/llm/patches/`
|
||||
llamacppPatches = [
|
||||
(preparePatch "01-load-progress.diff" "sha256-3QxyKX1n5NeMLU8d7wI/96wCM1Cvb5X5sQL5CFhMFo4=")
|
||||
(preparePatch "01-load-progress.diff" "sha256-K4GryCH/1cl01cyxaMLX3m4mTE79UoGwLMMBUgov+ew=")
|
||||
(preparePatch "02-clip-log.diff" "sha256-rMWbl3QgrPlhisTeHwD7EnGRJyOhLB4UeS7rqa0tdXM=")
|
||||
(preparePatch "03-load_exception.diff" "sha256-0XfMtMyg17oihqSFDBakBtAF0JwhsR188D+cOodgvDk=")
|
||||
(preparePatch "04-metal.diff" "sha256-Ne8J9R8NndUosSK0qoMvFfKNwqV5xhhce1nSoYrZo7Y=")
|
||||
(preparePatch "05-default-pretokenizer.diff" "sha256-NrQ0Fv5DAZYtRM0NBEeM2JLVTLFmb4Fs9RhwXhdMCC4=")
|
||||
(preparePatch "05-default-pretokenizer.diff" "sha256-JnCmFzAkmuI1AqATG3jbX7nGIam4hdDKqqbG5oh7h70=")
|
||||
(preparePatch "06-qwen2.diff" "sha256-nMtoAQUsjYuJv45uTlz8r/K1oF5NUsc75SnhgfSkE30=")
|
||||
];
|
||||
|
||||
|
@ -33,6 +33,6 @@ buildBazelPackage rec {
|
||||
platforms = platforms.linux ++ platforms.darwin;
|
||||
license = with licenses; [ asl20 bsd3 ];
|
||||
sourceProvenance = [ sourceTypes.fromSource ];
|
||||
maintainers = with maintainers; [ Sorixelle ];
|
||||
maintainers = [ ];
|
||||
};
|
||||
}
|
||||
|
@ -88,7 +88,7 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
license = licenses.lgpl3Only;
|
||||
platforms = platforms.all;
|
||||
changelog = "https://codeberg.org/redict/redict/releases/tag/${finalAttrs.version}";
|
||||
maintainers = with maintainers; [ yuka gmemstr ];
|
||||
maintainers = with maintainers; [ yuka ];
|
||||
mainProgram = "redict-cli";
|
||||
};
|
||||
})
|
||||
|
@ -28,6 +28,6 @@ rustPlatform.buildRustPackage {
|
||||
description = "Open source Linux client for Checkpoint VPN tunnels";
|
||||
homepage = "https://github.com/ancwrd1/snx-rs";
|
||||
license = lib.licenses.agpl3Plus;
|
||||
maintainers = [ lib.maintainers.lheckemann ];
|
||||
maintainers = [ ];
|
||||
};
|
||||
}
|
||||
|
48
pkgs/by-name/sx/sxcs/package.nix
Normal file
48
pkgs/by-name/sx/sxcs/package.nix
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
lib,
|
||||
stdenv,
|
||||
fetchFromGitea,
|
||||
xorg,
|
||||
installShellFiles
|
||||
}:
|
||||
|
||||
stdenv.mkDerivation (finalAttrs: {
|
||||
name = "sxcs";
|
||||
version = "1.1.0";
|
||||
|
||||
src = fetchFromGitea {
|
||||
domain = "codeberg.org";
|
||||
owner = "NRK";
|
||||
repo = "sxcs";
|
||||
rev = "refs/tags/v${finalAttrs.version}";
|
||||
hash = "sha256-rYmbbdZjeLCvGvNocI3+KVU2KBkYvRisayTyScTRay8=";
|
||||
};
|
||||
|
||||
buildInputs = [ xorg.libX11 xorg.libXcursor ];
|
||||
nativeBuildInputs = [ installShellFiles ];
|
||||
|
||||
buildPhase = ''
|
||||
runHook preBuild
|
||||
${stdenv.cc.targetPrefix}cc -o sxcs sxcs.c -O3 -s -l X11 -l Xcursor
|
||||
runHook postBuild
|
||||
'';
|
||||
|
||||
outputs = [ "out" "man" ];
|
||||
|
||||
installPhase = ''
|
||||
runHook preInstall
|
||||
|
||||
install -Dm755 sxcs -t $out/bin
|
||||
installManPage sxcs.1
|
||||
|
||||
runHook postInstall
|
||||
'';
|
||||
|
||||
meta = {
|
||||
description = "Minimal X11 Color Picker and Magnifier";
|
||||
homepage = "https://codeberg.org/NRK/sxcs";
|
||||
license = lib.licenses.gpl3Plus;
|
||||
maintainers = with lib.maintainers; [ sigmanificient ];
|
||||
platforms = lib.platforms.linux;
|
||||
};
|
||||
})
|
@ -29,12 +29,15 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
|
||||
nativeBuildInputs = [
|
||||
cmake
|
||||
cmakerc
|
||||
fmt
|
||||
ninja
|
||||
makeWrapper
|
||||
];
|
||||
|
||||
buildInputs = [
|
||||
cmakerc
|
||||
fmt
|
||||
];
|
||||
|
||||
patches = [
|
||||
./change-lock-location.patch
|
||||
];
|
||||
|
@ -8,18 +8,18 @@
|
||||
|
||||
rustPlatform.buildRustPackage rec {
|
||||
pname = "wttrbar";
|
||||
version = "0.10.2";
|
||||
version = "0.10.4";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "bjesus";
|
||||
repo = "wttrbar";
|
||||
rev = version;
|
||||
hash = "sha256-lwlfarnu2PC5toAf6FAefnpxDlzzwphrP+zXRQ2DQeQ=";
|
||||
hash = "sha256-2DaFbwzxpV5vNOey9me/Tj5t9idszTZHoj1cl4RkoeE=";
|
||||
};
|
||||
|
||||
buildInputs = lib.optionals stdenv.isDarwin (with darwin.apple_sdk_11_0.frameworks; [ Security SystemConfiguration ]);
|
||||
|
||||
cargoHash = "sha256-H3UpBRf97JsHudq6naZxMnpIzda0v7teDjgDdgluul0=";
|
||||
cargoHash = "sha256-rbsRW+c3rzHCMwFQAS22tIfbwudaqpVmRsGXFKOEWkQ=";
|
||||
|
||||
passthru.updateScript = nix-update-script { };
|
||||
|
||||
|
@ -27,14 +27,14 @@
|
||||
|
||||
stdenv.mkDerivation (finalAttrs: {
|
||||
pname = "xemu";
|
||||
version = "0.7.123";
|
||||
version = "0.7.127";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "xemu-project";
|
||||
repo = "xemu";
|
||||
rev = "v${finalAttrs.version}";
|
||||
fetchSubmodules = true;
|
||||
hash = "sha256-8Nfy6x3+8n1AlXnZmbISZrncnU04iaQPx69e46XgxUU=";
|
||||
hash = "sha256-qf4zc+qZSLZLjqpKUVgSEhb5VGAzkiRlJSsSCCbNImU=";
|
||||
};
|
||||
|
||||
nativeBuildInputs =
|
||||
|
@ -148,6 +148,6 @@ buildGoModule rec {
|
||||
platforms = platforms.linux ++ platforms.darwin;
|
||||
license = licenses.asl20;
|
||||
sourceProvenance = [ sourceTypes.fromSource ];
|
||||
maintainers = with maintainers; [ Sorixelle ];
|
||||
maintainers = [ ];
|
||||
};
|
||||
}
|
||||
|
@ -25,6 +25,6 @@ stdenv.mkDerivation rec {
|
||||
description = "Collection of video game music file emulators";
|
||||
license = licenses.lgpl21Plus;
|
||||
platforms = platforms.all;
|
||||
maintainers = with maintainers; [ luc65r lheckemann ];
|
||||
maintainers = with maintainers; [ luc65r ];
|
||||
};
|
||||
}
|
||||
|
@ -26,13 +26,13 @@ assert (blas.isILP64 == lapack.isILP64 &&
|
||||
|
||||
stdenv.mkDerivation (finalAttrs: {
|
||||
pname = "igraph";
|
||||
version = "0.10.11";
|
||||
version = "0.10.12";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "igraph";
|
||||
repo = finalAttrs.pname;
|
||||
rev = finalAttrs.version;
|
||||
hash = "sha256-RUxA9j2VDzwuYO/1HtyF3/ejGCJ7Gdjm7U8/Q8JxTbI=";
|
||||
hash = "sha256-ITXkdCyUtuFhgHHmy3P4ZX6GgzyxVUYz4knCCPHGClc=";
|
||||
};
|
||||
|
||||
postPatch = ''
|
||||
|
@ -16,7 +16,7 @@ stdenv.mkDerivation {
|
||||
lgpl21Plus # library
|
||||
gpl2Plus # examples
|
||||
];
|
||||
maintainers = with lib.maintainers; [ lheckemann ];
|
||||
maintainers = with lib.maintainers; [ ];
|
||||
platforms = lib.platforms.linux;
|
||||
};
|
||||
}
|
||||
|
@ -4,13 +4,13 @@
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
pname = "libva-utils";
|
||||
version = "2.21.0";
|
||||
version = "2.22.0";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "intel";
|
||||
repo = "libva-utils";
|
||||
rev = version;
|
||||
sha256 = "sha256-+Ayx5Csgeip2qj1ywE7cBxupXiYJTNXhRo17009vG4I=";
|
||||
sha256 = "sha256-CmhdhNNRO2j8lH7awp9YiKWMvV17GTBsXdrNY06jT2w=";
|
||||
};
|
||||
|
||||
nativeBuildInputs = [ meson ninja pkg-config ];
|
||||
|
@ -110,7 +110,7 @@ in stdenv.mkDerivation {
|
||||
description = "Open source libraries for 3D computer graphics, image processing and visualization";
|
||||
homepage = "https://www.vtk.org/";
|
||||
license = licenses.bsd3;
|
||||
maintainers = with maintainers; [ knedlsepp tfmoraes lheckemann ];
|
||||
maintainers = with maintainers; [ knedlsepp tfmoraes ];
|
||||
platforms = with platforms; unix;
|
||||
};
|
||||
}
|
||||
|
40
pkgs/development/python-modules/changefinder/default.nix
Normal file
40
pkgs/development/python-modules/changefinder/default.nix
Normal file
@ -0,0 +1,40 @@
|
||||
{ lib
|
||||
, buildPythonPackage
|
||||
, fetchFromGitHub
|
||||
, setuptools
|
||||
, numpy
|
||||
, scipy
|
||||
, statsmodels
|
||||
}:
|
||||
|
||||
buildPythonPackage {
|
||||
pname = "changefinder";
|
||||
version = "unstable-2024-03-24";
|
||||
pyproject = true;
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "shunsukeaihara";
|
||||
repo = "changefinder";
|
||||
rev = "58c8c32f127b9e46f9823f36221f194bdb6f3f8b";
|
||||
hash = "sha256-1If0gIsMU8673fKSSHVMvDgR1UnYgM/4HiyvZJ9T6VM=";
|
||||
};
|
||||
|
||||
nativeBuildInputs = [
|
||||
setuptools
|
||||
];
|
||||
|
||||
propagatedBuildInputs = [
|
||||
numpy
|
||||
scipy
|
||||
statsmodels
|
||||
];
|
||||
|
||||
pythonImportsCheck = [ "changefinder" ];
|
||||
|
||||
meta = with lib; {
|
||||
description = "Online Change-Point Detection library based on ChangeFinder algorithm";
|
||||
homepage = "https://github.com/shunsukeaihara/changefinder";
|
||||
license = licenses.mit;
|
||||
maintainers = with maintainers; [ raitobezarius ];
|
||||
};
|
||||
}
|
@ -1,35 +0,0 @@
|
||||
{
|
||||
lib,
|
||||
buildPythonPackage,
|
||||
fetchPypi,
|
||||
nose,
|
||||
six,
|
||||
lxml,
|
||||
}:
|
||||
|
||||
buildPythonPackage rec {
|
||||
pname = "htmllaundry";
|
||||
version = "2.2";
|
||||
format = "setuptools";
|
||||
|
||||
src = fetchPypi {
|
||||
inherit pname version;
|
||||
sha256 = "9124f067d3c06ef2613e2cc246b2fde2299802280a8b0e60dc504137085f0334";
|
||||
};
|
||||
|
||||
buildInputs = [ nose ];
|
||||
propagatedBuildInputs = [
|
||||
six
|
||||
lxml
|
||||
];
|
||||
|
||||
# some tests fail, probably because of changes in lxml
|
||||
# not relevant for me, if releavnt for you, fix it...
|
||||
doCheck = false;
|
||||
|
||||
meta = with lib; {
|
||||
description = "Simple HTML cleanup utilities";
|
||||
license = licenses.bsd3;
|
||||
homepage = "https://pypi.org/project/htmllaundry/";
|
||||
};
|
||||
}
|
42
pkgs/development/python-modules/netdata-pandas/default.nix
Normal file
42
pkgs/development/python-modules/netdata-pandas/default.nix
Normal file
@ -0,0 +1,42 @@
|
||||
{ lib
|
||||
, buildPythonPackage
|
||||
, fetchFromGitHub
|
||||
, setuptools
|
||||
, pandas
|
||||
, requests
|
||||
, trio
|
||||
, asks
|
||||
}:
|
||||
|
||||
buildPythonPackage rec {
|
||||
pname = "netdata-pandas";
|
||||
version = "0.0.41";
|
||||
pyproject = true;
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "netdata";
|
||||
repo = "netdata-pandas";
|
||||
rev = "v${version}";
|
||||
hash = "sha256-AXt8BKWyM3glm5hrRryb+vBzs3z2x61HhbR6DDZkh9o=";
|
||||
};
|
||||
|
||||
nativeBuildInputs = [
|
||||
setuptools
|
||||
];
|
||||
|
||||
propagatedBuildInputs = [
|
||||
pandas
|
||||
requests
|
||||
trio
|
||||
asks
|
||||
];
|
||||
|
||||
pythonImportsCheck = [ "netdata_pandas" ];
|
||||
|
||||
meta = with lib; {
|
||||
description = "A helper library to pull data from the netdata REST API into a pandas dataframe.";
|
||||
homepage = "https://github.com/netdata/netdata-pandas";
|
||||
license = licenses.asl20;
|
||||
maintainers = with maintainers; [ raitobezarius ];
|
||||
};
|
||||
}
|
@ -44,6 +44,6 @@ buildPythonPackage rec {
|
||||
mainProgram = "nltk";
|
||||
homepage = "http://nltk.org/";
|
||||
license = licenses.asl20;
|
||||
maintainers = with maintainers; [ lheckemann ];
|
||||
maintainers = with maintainers; [ ];
|
||||
};
|
||||
}
|
||||
|
@ -45,7 +45,6 @@ buildPythonPackage rec {
|
||||
homepage = "https://gitlab.com/kraxel/virt-firmware";
|
||||
license = licenses.gpl2;
|
||||
maintainers = with maintainers; [
|
||||
lheckemann
|
||||
raitobezarius
|
||||
];
|
||||
};
|
||||
|
@ -2,17 +2,17 @@
|
||||
|
||||
buildGoModule rec {
|
||||
pname = "gopls";
|
||||
version = "0.15.3";
|
||||
version = "0.16.0";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "golang";
|
||||
repo = "tools";
|
||||
rev = "gopls/v${version}";
|
||||
hash = "sha256-JUqw2qJFxiuZyXgrmirrOuwG9mtcW1e1+SS0CaZY8VA=";
|
||||
hash = "sha256-X5XBYTD+DIbHFBMWkLGosZUORexYt83mML/akUzrnFk=";
|
||||
};
|
||||
|
||||
modRoot = "gopls";
|
||||
vendorHash = "sha256-j2jMkVvsZ6UjcziSKtxGfwr7eRiTlEPW7LQCaEIa3I0=";
|
||||
vendorHash = "sha256-XH3kSfnlwmbOLkWJCjKmU1ghCkarn23M0q0vJQHkCe0=";
|
||||
|
||||
# https://github.com/golang/tools/blob/9ed98faa/gopls/main.go#L27-L30
|
||||
ldflags = [ "-X main.version=v${version}" ];
|
||||
|
@ -256,6 +256,6 @@ stdenv.mkDerivation rec {
|
||||
homepage = "https://nixos.org/hydra";
|
||||
license = licenses.gpl3;
|
||||
platforms = platforms.linux;
|
||||
maintainers = with maintainers; [ lheckemann mindavi ] ++ teams.helsinki-systems.members;
|
||||
maintainers = with maintainers; [ mindavi ] ++ teams.helsinki-systems.members;
|
||||
};
|
||||
}
|
||||
|
@ -24,14 +24,14 @@ let
|
||||
|
||||
in buildPythonApplication rec {
|
||||
pname = "pipenv";
|
||||
version = "2023.2.4";
|
||||
version = "2023.10.24";
|
||||
format = "pyproject";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "pypa";
|
||||
repo = "pipenv";
|
||||
rev = "refs/tags/v${version}";
|
||||
hash = "sha256-jZOBu4mWyu8U6CGqtYgfcCCDSa0pGqoZEFnXl5IO+JY=";
|
||||
hash = "sha256-b1EqCrgGygdG08zzastgcYGnXDKoEYNvm5xjDLzlAXo=";
|
||||
};
|
||||
|
||||
env.LC_ALL = "en_US.UTF-8";
|
||||
@ -47,7 +47,7 @@ in buildPythonApplication rec {
|
||||
# and to call setup.py.
|
||||
# It would use sys.executable, which in our case points to a python that
|
||||
# does not have the required dependencies.
|
||||
substituteInPlace pipenv/core.py \
|
||||
substituteInPlace pipenv/utils/virtualenv.py \
|
||||
--replace "sys.executable" "'${pythonEnv.interpreter}'"
|
||||
'';
|
||||
|
||||
|
@ -163,7 +163,6 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
homepage = "https://github.com/RedisInsight/RedisInsight";
|
||||
license = lib.licenses.sspl;
|
||||
maintainers = with lib.maintainers; [
|
||||
gmemstr
|
||||
tomasajt
|
||||
];
|
||||
platforms = lib.platforms.linux;
|
||||
|
@ -82,7 +82,7 @@ stdenv.mkDerivation {
|
||||
mainProgram = "EmptyEpsilon";
|
||||
homepage = "https://daid.github.io/EmptyEpsilon/";
|
||||
license = licenses.gpl2Plus;
|
||||
maintainers = with maintainers; [ fpletz lheckemann ma27 ];
|
||||
maintainers = with maintainers; [ fpletz ma27 ];
|
||||
platforms = platforms.linux;
|
||||
};
|
||||
}
|
||||
|
@ -63,7 +63,7 @@ stdenv.mkDerivation rec {
|
||||
cc-by-sa-40
|
||||
publicDomain
|
||||
];
|
||||
maintainers = with maintainers; [ lheckemann _360ied ];
|
||||
maintainers = with maintainers; [ _360ied ];
|
||||
platforms = platforms.linux; # Maybe other non-darwin Unix
|
||||
};
|
||||
}
|
||||
|
@ -24,7 +24,7 @@ stdenv.mkDerivation rec {
|
||||
enableParallelBuilding = true;
|
||||
|
||||
meta = {
|
||||
maintainers = [ lib.maintainers.lheckemann ];
|
||||
maintainers = [ ];
|
||||
description = "Free OpenSource 2D MMORPG client";
|
||||
homepage = "https://manaplus.org/";
|
||||
license = lib.licenses.gpl2;
|
||||
|
@ -55,7 +55,7 @@ in stdenv.mkDerivation rec {
|
||||
homepage = "https://www.openclonk.org";
|
||||
license = if enableSoundtrack then licenses.unfreeRedistributable else licenses.isc;
|
||||
mainProgram = "openclonk";
|
||||
maintainers = with maintainers; [ lheckemann ];
|
||||
maintainers = with maintainers; [ ];
|
||||
platforms = [ "x86_64-linux" "i686-linux" ];
|
||||
};
|
||||
}
|
||||
|
@ -17,7 +17,7 @@ stdenv.mkDerivation rec {
|
||||
meta = with lib; {
|
||||
description = "Bash on Ubuntu on macOS";
|
||||
homepage = "https://github.com/linux-noah/noah";
|
||||
license = [ licenses.mit licenses.gpl2 ];
|
||||
license = [ licenses.mit licenses.gpl2Only ];
|
||||
maintainers = [ ];
|
||||
platforms = platforms.darwin;
|
||||
# never built on aarch64-darwin since first introduction in nixpkgs
|
||||
|
@ -24,7 +24,7 @@ stdenv.mkDerivation rec {
|
||||
meta = with lib; {
|
||||
description = "Outputs current CPU temperature for OSX";
|
||||
homepage = "https://github.com/lavoiesl/osx-cpu-temp";
|
||||
license = licenses.gpl2;
|
||||
license = licenses.gpl2Plus;
|
||||
maintainers = with maintainers; [ virusdave ];
|
||||
platforms = platforms.darwin;
|
||||
};
|
||||
|
@ -24,7 +24,7 @@ stdenv.mkDerivation rec {
|
||||
meta = {
|
||||
description = "Automounter in userspace";
|
||||
homepage = "https://github.com/pcarrier/afuse";
|
||||
license = lib.licenses.gpl2;
|
||||
license = lib.licenses.gpl2Only;
|
||||
maintainers = [ lib.maintainers.marcweber ];
|
||||
platforms = lib.platforms.unix;
|
||||
};
|
||||
|
@ -165,7 +165,7 @@ stdenv.mkDerivation rec {
|
||||
meta = with lib; {
|
||||
homepage = "https://anbox.io";
|
||||
description = "Android in a box";
|
||||
license = licenses.gpl2;
|
||||
license = licenses.gpl2Only;
|
||||
maintainers = with maintainers; [ edwtjo ];
|
||||
platforms = [ "armv7l-linux" "aarch64-linux" "x86_64-linux" ];
|
||||
};
|
||||
|
@ -27,7 +27,7 @@ stdenv.mkDerivation rec {
|
||||
meta = with lib; {
|
||||
description = "Linux HWMON sensors driver for ASUS motherboards to read sensor data from the embedded controller";
|
||||
homepage = "https://github.com/zeule/asus-ec-sensors";
|
||||
license = licenses.gpl2;
|
||||
license = licenses.gpl2Only;
|
||||
platforms = [ "x86_64-linux" ];
|
||||
maintainers = with maintainers; [ nickhu ];
|
||||
broken = kernel.kernelOlder "5.11";
|
||||
|
@ -29,7 +29,7 @@ stdenv.mkDerivation rec {
|
||||
meta = with lib; {
|
||||
description = "Linux HWMON (lmsensors) sensors driver for various ASUS Ryzen and Threadripper motherboards";
|
||||
homepage = "https://github.com/electrified/asus-wmi-sensors";
|
||||
license = licenses.gpl2;
|
||||
license = licenses.gpl2Only;
|
||||
platforms = [ "x86_64-linux" "i686-linux" ];
|
||||
maintainers = with maintainers; [ Frostman ];
|
||||
broken = versionOlder kernel.version "4.12";
|
||||
|
@ -44,7 +44,7 @@ stdenv.mkDerivation {
|
||||
description = "ASIX AX99100 Serial and Parallel Port driver";
|
||||
homepage = "https://www.asix.com.tw/en/product/Interface/PCIe_Bridge/AX99100";
|
||||
# According to the source code in the tarball, the license is gpl2.
|
||||
license = lib.licenses.gpl2;
|
||||
license = lib.licenses.gpl2Plus;
|
||||
platforms = lib.platforms.linux;
|
||||
|
||||
# Older Linux versions need more patches to work.
|
||||
|
@ -21,7 +21,7 @@ stdenv.mkDerivation rec {
|
||||
meta = {
|
||||
homepage = "https://www.open-mesh.org/projects/batman-adv/wiki/Wiki";
|
||||
description = "B.A.T.M.A.N. routing protocol in a linux kernel module for layer 2, information distribution tool";
|
||||
license = lib.licenses.gpl2;
|
||||
license = lib.licenses.gpl2Only;
|
||||
maintainers = with lib.maintainers; [ fpletz ];
|
||||
platforms = with lib.platforms; linux;
|
||||
};
|
||||
|
@ -22,7 +22,7 @@ stdenv.mkDerivation rec {
|
||||
homepage = "https://www.open-mesh.org/projects/batman-adv/wiki/Wiki";
|
||||
description = "B.A.T.M.A.N. routing protocol in a linux kernel module for layer 2, control tool";
|
||||
mainProgram = "batctl";
|
||||
license = lib.licenses.gpl2;
|
||||
license = lib.licenses.gpl2Only;
|
||||
maintainers = with lib.maintainers; [ fpletz ];
|
||||
platforms = with lib.platforms; linux;
|
||||
};
|
||||
|
@ -30,7 +30,7 @@ stdenv.mkDerivation rec {
|
||||
meta = {
|
||||
homepage = "https://www.open-mesh.org/projects/batman-adv/wiki/Wiki";
|
||||
description = "B.A.T.M.A.N. routing protocol in a linux kernel module for layer 2";
|
||||
license = lib.licenses.gpl2;
|
||||
license = lib.licenses.gpl2Only;
|
||||
maintainers = with lib.maintainers; [ fpletz philiptaron ];
|
||||
platforms = with lib.platforms; linux;
|
||||
};
|
||||
|
@ -1,16 +1,16 @@
|
||||
{
|
||||
version = "2024.1";
|
||||
version = "2024.2";
|
||||
|
||||
# To get these, run:
|
||||
#
|
||||
# ```
|
||||
# for tool in alfred batctl batman-adv; do
|
||||
# nix-prefetch-url https://downloads.open-mesh.org/batman/releases/batman-adv-2024.1/$tool-2024.1.tar.gz --type sha256 | xargs nix hash to-sri --type sha256
|
||||
# nix-prefetch-url https://downloads.open-mesh.org/batman/releases/batman-adv-2024.2/$tool-2024.2.tar.gz --type sha256 | xargs nix hash to-sri --type sha256
|
||||
# done
|
||||
# ```
|
||||
sha256 = {
|
||||
alfred = "sha256-Ji2tOcm+EirH8GFwXIo+O21GJ4K74zcubfyazgw4Tbk=";
|
||||
batctl = "sha256-aD3anWBU6yYKGsACLGQnmP9ASNbFOmcuoLMXjmt1egk=";
|
||||
batman-adv = "sha256-pxQynGJR9IMOnPA/U8v7IoDwZ4RxtUxdRvrmGngtQyU=";
|
||||
alfred = "sha256-Kpvr62fIh1n+31fRjm79qtDECPIGikYlIBfCJ8sQlnI=";
|
||||
batctl = "sha256-ywKVMJP/wscA0SLAOj2eTYZ/ZG0wOPMdCpAeWP+ZXQc=";
|
||||
batman-adv = "sha256-dpKm3uei8/ZnMumuyMcWTgwYGBZ/OvBjv/P/+7AZlkM=";
|
||||
};
|
||||
}
|
||||
|
@ -45,7 +45,7 @@ stdenv.mkDerivation rec {
|
||||
meta = with lib; {
|
||||
homepage = "https://github.com/libbpf/bpftool";
|
||||
description = "Debugging/program analysis tools for the eBPF subsystem";
|
||||
license = [ licenses.gpl2 licenses.bsd2 ];
|
||||
license = [ licenses.gpl2Only licenses.bsd2 ];
|
||||
platforms = platforms.linux;
|
||||
maintainers = with maintainers; [ thoughtpolice ];
|
||||
};
|
||||
|
@ -27,7 +27,7 @@ stdenv.mkDerivation {
|
||||
broken = kernel.kernelAtLeast "5.16";
|
||||
description = "Kernel module for ISO-TP (ISO 15765-2)";
|
||||
homepage = "https://github.com/hartkopp/can-isotp";
|
||||
license = licenses.gpl2;
|
||||
license = licenses.gpl2Only;
|
||||
platforms = platforms.linux;
|
||||
maintainers = [ maintainers.evck ];
|
||||
};
|
||||
|
@ -38,7 +38,7 @@ stdenv.mkDerivation {
|
||||
meta = with lib; {
|
||||
description = "Tool to examine and tune power saving features";
|
||||
homepage = "https://www.kernel.org/";
|
||||
license = licenses.gpl2;
|
||||
license = licenses.gpl2Only;
|
||||
mainProgram = "cpupower";
|
||||
platforms = platforms.linux;
|
||||
};
|
||||
|
@ -29,7 +29,7 @@ stdenv.mkDerivation rec {
|
||||
meta = with lib; {
|
||||
description = "Tools to create, check, and extract content of CramFs images";
|
||||
homepage = "https://packages.debian.org/jessie/cramfsprogs";
|
||||
license = licenses.gpl2;
|
||||
license = licenses.gpl2Plus;
|
||||
maintainers = with maintainers; [ pamplemousse ];
|
||||
platforms = platforms.linux;
|
||||
};
|
||||
|
@ -97,7 +97,7 @@ stdenv.mkDerivation rec {
|
||||
meta = with lib; {
|
||||
description = "Userspace checkpoint/restore for Linux";
|
||||
homepage = "https://criu.org";
|
||||
license = licenses.gpl2;
|
||||
license = licenses.gpl2Plus;
|
||||
platforms = [ "x86_64-linux" "aarch64-linux" "armv7l-linux" ];
|
||||
maintainers = [ maintainers.thoughtpolice ];
|
||||
};
|
||||
|
@ -80,7 +80,7 @@ stdenv.mkDerivation rec {
|
||||
homepage = "https://gitlab.com/cryptsetup/cryptsetup/";
|
||||
description = "LUKS for dm-crypt";
|
||||
changelog = "https://gitlab.com/cryptsetup/cryptsetup/-/raw/v${version}/docs/v${version}-ReleaseNotes";
|
||||
license = lib.licenses.gpl2;
|
||||
license = lib.licenses.gpl2Plus;
|
||||
mainProgram = "cryptsetup";
|
||||
maintainers = with lib.maintainers; [ raitobezarius ];
|
||||
platforms = with lib.platforms; linux;
|
||||
|
@ -43,7 +43,7 @@ stdenv.mkDerivation rec {
|
||||
meta = with lib; {
|
||||
description = "DIGImend graphics tablet drivers for the Linux kernel";
|
||||
homepage = "https://digimend.github.io/";
|
||||
license = licenses.gpl2;
|
||||
license = licenses.gpl2Plus;
|
||||
maintainers = with maintainers; [ gebner ];
|
||||
platforms = platforms.linux;
|
||||
};
|
||||
|
@ -29,7 +29,7 @@ stdenv.mkDerivation {
|
||||
meta = with lib; {
|
||||
description = "DirectFB VNC client";
|
||||
homepage = "http://drinkmilk.github.io/directvnc/";
|
||||
license = licenses.gpl2;
|
||||
license = licenses.gpl2Plus;
|
||||
maintainers = [ maintainers.raskin ];
|
||||
platforms = platforms.linux;
|
||||
};
|
||||
|
@ -82,7 +82,7 @@ stdenv.mkDerivation rec {
|
||||
meta = with lib; {
|
||||
description = "Set of libraries and drivers for fast packet processing";
|
||||
homepage = "http://dpdk.org/";
|
||||
license = with licenses; [ lgpl21 gpl2 bsd2 ];
|
||||
license = with licenses; [ lgpl21 gpl2Only bsd2 ];
|
||||
platforms = platforms.linux;
|
||||
maintainers = with maintainers; [ magenbluten orivej mic92 zhaofengli ];
|
||||
};
|
||||
|
@ -35,7 +35,7 @@ python3Packages.buildPythonApplication rec {
|
||||
homepage = "http://dag.wieers.com/home-made/dstat/";
|
||||
description = "Versatile resource statistics tool";
|
||||
mainProgram = "dstat";
|
||||
license = licenses.gpl2;
|
||||
license = licenses.gpl2Plus;
|
||||
platforms = platforms.linux;
|
||||
maintainers = with maintainers; [ ];
|
||||
changelog = "https://github.com/dstat-real/dstat/blob/v${version}/ChangeLog";
|
||||
|
@ -32,6 +32,6 @@ stdenv.mkDerivation rec {
|
||||
meta = {
|
||||
description = "Linux kernel drivers for Intel Ethernet adapters and LOMs (LAN On Motherboard)";
|
||||
homepage = "http://e1000.sf.net/";
|
||||
license = lib.licenses.gpl2;
|
||||
license = lib.licenses.gpl2Only;
|
||||
};
|
||||
}
|
||||
|
@ -28,7 +28,7 @@ stdenv.mkDerivation rec {
|
||||
meta = with lib; {
|
||||
description = "Filtering tool for Linux-based bridging firewalls";
|
||||
homepage = "http://ebtables.sourceforge.net/";
|
||||
license = licenses.gpl2;
|
||||
license = licenses.gpl2Plus;
|
||||
platforms = platforms.linux;
|
||||
};
|
||||
}
|
||||
|
@ -32,7 +32,7 @@ stdenv.mkDerivation {
|
||||
meta = with lib; {
|
||||
homepage = "https://github.com/grondo/edac-utils";
|
||||
description = "Handles the reporting of hardware-related memory errors";
|
||||
license = licenses.gpl2;
|
||||
license = licenses.gpl2Plus;
|
||||
platforms = platforms.linux;
|
||||
};
|
||||
}
|
||||
|
@ -22,7 +22,7 @@ stdenv.mkDerivation rec {
|
||||
description = "Simple monitoring of system events";
|
||||
mainProgram = "eventstat";
|
||||
homepage = "https://github.com/ColinIanKing/eventstat";
|
||||
license = licenses.gpl2;
|
||||
license = licenses.gpl2Plus;
|
||||
platforms = platforms.linux;
|
||||
maintainers = with maintainers; [ ];
|
||||
};
|
||||
|
@ -29,7 +29,7 @@ stdenv.mkDerivation rec {
|
||||
meta = {
|
||||
description = "exfat kernel module";
|
||||
inherit (src.meta) homepage;
|
||||
license = lib.licenses.gpl2;
|
||||
license = lib.licenses.gpl2Plus;
|
||||
maintainers = with lib.maintainers; [ makefu ];
|
||||
platforms = lib.platforms.linux;
|
||||
broken = true;
|
||||
|
@ -36,7 +36,7 @@ stdenv.mkDerivation rec {
|
||||
meta = with lib; {
|
||||
homepage = "https://github.com/patjak/bcwc_pcie";
|
||||
description = "Linux driver for the Facetime HD (Broadcom 1570) PCIe webcam";
|
||||
license = licenses.gpl2;
|
||||
license = licenses.gpl2Only;
|
||||
maintainers = with maintainers; [ womfoo grahamc kraem ];
|
||||
platforms = [ "i686-linux" "x86_64-linux" ];
|
||||
};
|
||||
|
@ -99,7 +99,7 @@ stdenv.mkDerivation rec {
|
||||
mainProgram = "fbterm";
|
||||
homepage = "https://salsa.debian.org/debian/fbterm";
|
||||
maintainers = with maintainers; [ lovesegfault raskin ];
|
||||
license = licenses.gpl2;
|
||||
license = licenses.gpl2Plus;
|
||||
platforms = platforms.linux;
|
||||
};
|
||||
}
|
||||
|
@ -24,7 +24,7 @@ stdenvNoCC.mkDerivation rec {
|
||||
meta = {
|
||||
description = "Firmware for the ZyDAS ZD1211(b) 802.11a/b/g USB WLAN chip";
|
||||
homepage = "https://sourceforge.net/projects/zd1211/";
|
||||
license = lib.licenses.gpl2;
|
||||
license = lib.licenses.gpl2Only;
|
||||
platforms = lib.platforms.linux;
|
||||
};
|
||||
}
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user