Merge master into staging-next

This commit is contained in:
github-actions[bot] 2021-11-21 18:01:07 +00:00 committed by GitHub
commit 18ad263272
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
118 changed files with 640 additions and 198 deletions

View file

@ -241,7 +241,7 @@ let
pkgs.vmTools.override { pkgs.vmTools.override {
rootModules = rootModules =
[ "zfs" "9p" "9pnet_virtio" "virtio_pci" "virtio_blk" ] ++ [ "zfs" "9p" "9pnet_virtio" "virtio_pci" "virtio_blk" ] ++
(pkgs.lib.optional (pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64) "rtc_cmos"); (pkgs.lib.optional pkgs.stdenv.hostPlatform.isx86 "rtc_cmos");
kernel = modulesTree; kernel = modulesTree;
} }
).runInLinuxVM ( ).runInLinuxVM (

View file

@ -17,7 +17,7 @@ rec {
''-netdev vde,id=vlan${toString nic},sock="$QEMU_VDE_SOCKET_${toString net}"'' ''-netdev vde,id=vlan${toString nic},sock="$QEMU_VDE_SOCKET_${toString net}"''
]; ];
qemuSerialDevice = if pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64 then "ttyS0" qemuSerialDevice = if pkgs.stdenv.hostPlatform.isx86 then "ttyS0"
else if (with pkgs.stdenv.hostPlatform; isAarch32 || isAarch64 || isPower) then "ttyAMA0" else if (with pkgs.stdenv.hostPlatform; isAarch32 || isAarch64 || isPower) then "ttyAMA0"
else throw "Unknown QEMU serial device for system '${pkgs.stdenv.hostPlatform.system}'"; else throw "Unknown QEMU serial device for system '${pkgs.stdenv.hostPlatform.system}'";

View file

@ -83,7 +83,7 @@ in {
b43Firmware_5_1_138 b43Firmware_5_1_138
b43Firmware_6_30_163_46 b43Firmware_6_30_163_46
b43FirmwareCutter b43FirmwareCutter
] ++ optional (pkgs.stdenv.hostPlatform.isi686 || pkgs.stdenv.hostPlatform.isx86_64) facetimehd-firmware; ] ++ optional pkgs.stdenv.hostPlatform.isx86 facetimehd-firmware;
}) })
(mkIf cfg.wirelessRegulatoryDatabase { (mkIf cfg.wirelessRegulatoryDatabase {
hardware.firmware = [ pkgs.wireless-regdb ]; hardware.firmware = [ pkgs.wireless-regdb ];

View file

@ -467,7 +467,7 @@ let
throw "Unsupported architecture"; throw "Unsupported architecture";
# Syslinux (and isolinux) only supports x86-based architectures. # Syslinux (and isolinux) only supports x86-based architectures.
canx86BiosBoot = pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64; canx86BiosBoot = pkgs.stdenv.hostPlatform.isx86;
in in

View file

@ -243,7 +243,7 @@ in
"hid_generic" "hid_lenovo" "hid_apple" "hid_roccat" "hid_generic" "hid_lenovo" "hid_apple" "hid_roccat"
"hid_logitech_hidpp" "hid_logitech_dj" "hid_microsoft" "hid_logitech_hidpp" "hid_logitech_dj" "hid_microsoft"
] ++ optionals (pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64) [ ] ++ optionals pkgs.stdenv.hostPlatform.isx86 [
# Misc. x86 keyboard stuff. # Misc. x86 keyboard stuff.
"pcips2" "atkbd" "i8042" "pcips2" "atkbd" "i8042"

View file

@ -76,7 +76,7 @@ in
config = mkIf cfg.enable { config = mkIf cfg.enable {
assertions = [ { assertions = [ {
assertion = pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64; assertion = pkgs.stdenv.hostPlatform.isx86;
message = "Azure not currently supported on ${pkgs.stdenv.hostPlatform.system}"; message = "Azure not currently supported on ${pkgs.stdenv.hostPlatform.system}";
} { } {
assertion = config.networking.networkmanager.enable == false; assertion = config.networking.networkmanager.enable == false;

View file

@ -97,7 +97,7 @@ let
imap1 (idx: drive: drive // { device = driveDeviceName idx; }); imap1 (idx: drive: drive // { device = driveDeviceName idx; });
efiPrefix = efiPrefix =
if (pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64) then "${pkgs.OVMF.fd}/FV/OVMF" if pkgs.stdenv.hostPlatform.isx86 then "${pkgs.OVMF.fd}/FV/OVMF"
else if pkgs.stdenv.isAarch64 then "${pkgs.OVMF.fd}/FV/AAVMF" else if pkgs.stdenv.isAarch64 then "${pkgs.OVMF.fd}/FV/AAVMF"
else throw "No EFI firmware available for platform"; else throw "No EFI firmware available for platform";
efiFirmware = "${efiPrefix}_CODE.fd"; efiFirmware = "${efiPrefix}_CODE.fd";
@ -296,7 +296,7 @@ in
virtualisation.memorySize = virtualisation.memorySize =
mkOption { mkOption {
type = types.ints.positive; type = types.ints.positive;
default = 384; default = 1024;
description = description =
'' ''
The memory size in megabytes of the virtual machine. The memory size in megabytes of the virtual machine.
@ -833,7 +833,7 @@ in
# FIXME: Consolidate this one day. # FIXME: Consolidate this one day.
virtualisation.qemu.options = mkMerge [ virtualisation.qemu.options = mkMerge [
(mkIf (pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64) [ (mkIf pkgs.stdenv.hostPlatform.isx86 [
"-usb" "-device usb-tablet,bus=usb-bus.0" "-usb" "-device usb-tablet,bus=usb-bus.0"
]) ])
(mkIf (pkgs.stdenv.isAarch32 || pkgs.stdenv.isAarch64) [ (mkIf (pkgs.stdenv.isAarch32 || pkgs.stdenv.isAarch64) [

View file

@ -33,7 +33,7 @@ in
config = mkIf cfg.enable (mkMerge [{ config = mkIf cfg.enable (mkMerge [{
assertions = [{ assertions = [{
assertion = pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64; assertion = pkgs.stdenv.hostPlatform.isx86;
message = "Virtualbox not currently supported on ${pkgs.stdenv.hostPlatform.system}"; message = "Virtualbox not currently supported on ${pkgs.stdenv.hostPlatform.system}";
}]; }];

View file

@ -23,7 +23,7 @@ in
config = mkIf cfg.enable { config = mkIf cfg.enable {
assertions = [ { assertions = [ {
assertion = pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64; assertion = pkgs.stdenv.hostPlatform.isx86;
message = "VMWare guest is not currently supported on ${pkgs.stdenv.hostPlatform.system}"; message = "VMWare guest is not currently supported on ${pkgs.stdenv.hostPlatform.system}";
} ]; } ];

View file

@ -11,10 +11,6 @@ import ./make-test-python.nix ({ pkgs, ... }: {
enable = true; enable = true;
maxMemory = 800; maxMemory = 800;
}; };
# Airsonic is a Java application, and unfortunately requires a significant
# amount of memory.
virtualisation.memorySize = 1024;
}; };
testScript = '' testScript = ''

View file

@ -17,7 +17,6 @@ import ./make-test-python.nix ({ pkgs, ...} :
program = "${pkgs.xterm}/bin/xterm -cm -pc -fa Monospace -fs 24"; program = "${pkgs.xterm}/bin/xterm -cm -pc -fa Monospace -fs 24";
}; };
virtualisation.memorySize = 1024;
# Need to switch to a different GPU driver than the default one (-vga std) so that Cage can launch: # Need to switch to a different GPU driver than the default one (-vga std) so that Cage can launch:
virtualisation.qemu.options = [ "-vga none -device virtio-gpu-pci" ]; virtualisation.qemu.options = [ "-vga none -device virtio-gpu-pci" ];
}; };

View file

@ -35,7 +35,6 @@ in
programs.xwayland.enable = true; programs.xwayland.enable = true;
environment.systemPackages = [ pkgs.cagebreak pkgs.wayland-utils ]; environment.systemPackages = [ pkgs.cagebreak pkgs.wayland-utils ];
virtualisation.memorySize = 1024;
# Need to switch to a different GPU driver than the default one (-vga std) so that Cagebreak can launch: # Need to switch to a different GPU driver than the default one (-vga std) so that Cagebreak can launch:
virtualisation.qemu.options = [ "-vga none -device virtio-gpu-pci" ]; virtualisation.qemu.options = [ "-vga none -device virtio-gpu-pci" ];
}; };

View file

@ -41,7 +41,6 @@ let
]; ];
}; };
services.cassandra = cassandraCfg ipAddress // extra; services.cassandra = cassandraCfg ipAddress // extra;
virtualisation.memorySize = 1024;
}; };
in in
{ {

View file

@ -37,7 +37,6 @@ let
generateHost = { pkgs, cephConfig, networkConfig, ... }: { generateHost = { pkgs, cephConfig, networkConfig, ... }: {
virtualisation = { virtualisation = {
memorySize = 1024;
emptyDiskImages = [ 20480 ]; emptyDiskImages = [ 20480 ];
vlans = [ 1 ]; vlans = [ 1 ];
}; };

View file

@ -34,7 +34,6 @@ let
generateHost = { pkgs, cephConfig, networkConfig, ... }: { generateHost = { pkgs, cephConfig, networkConfig, ... }: {
virtualisation = { virtualisation = {
memorySize = 1024;
emptyDiskImages = [ 20480 20480 20480 ]; emptyDiskImages = [ 20480 20480 20480 ];
vlans = [ 1 ]; vlans = [ 1 ];
}; };

View file

@ -34,7 +34,6 @@ let
generateHost = { pkgs, cephConfig, networkConfig, ... }: { generateHost = { pkgs, cephConfig, networkConfig, ... }: {
virtualisation = { virtualisation = {
memorySize = 1024;
emptyDiskImages = [ 20480 20480 20480 ]; emptyDiskImages = [ 20480 20480 20480 ];
vlans = [ 1 ]; vlans = [ 1 ];
}; };

View file

@ -8,7 +8,6 @@
}; };
virtualisation = { virtualisation = {
memorySize = 1024;
qemu.options = [ "-vga virtio" ]; qemu.options = [ "-vga virtio" ];
}; };
} }

View file

@ -15,7 +15,6 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
{ pkgs, ... }: { pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ]; { imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true; virtualisation.writableStore = true;
virtualisation.memorySize = 768;
networking.bridges = { networking.bridges = {
br0 = { br0 = {

View file

@ -5,7 +5,6 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
}; };
machine = { pkgs, ... }: { machine = { pkgs, ... }: {
virtualisation.memorySize = 768;
virtualisation.writableStore = true; virtualisation.writableStore = true;
containers.webserver = { containers.webserver = {

View file

@ -8,7 +8,6 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
{ pkgs, ... }: { pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ]; { imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true; virtualisation.writableStore = true;
virtualisation.memorySize = 768;
virtualisation.vlans = []; virtualisation.vlans = [];
networking.useDHCP = false; networking.useDHCP = false;

View file

@ -7,7 +7,6 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
machine = machine =
{ lib, ... }: { lib, ... }:
{ {
virtualisation.memorySize = 256;
virtualisation.vlans = []; virtualisation.vlans = [];
networking.bridges.br0.interfaces = []; networking.bridges.br0.interfaces = [];

View file

@ -14,7 +14,6 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
nix.binaryCaches = []; # don't try to access cache.nixos.org nix.binaryCaches = []; # don't try to access cache.nixos.org
virtualisation.writableStore = true; virtualisation.writableStore = true;
virtualisation.memorySize = 1024;
# Make sure we always have all the required dependencies for creating a # Make sure we always have all the required dependencies for creating a
# container available within the VM, because we don't have network access. # container available within the VM, because we don't have network access.
virtualisation.additionalPaths = let virtualisation.additionalPaths = let

View file

@ -22,7 +22,6 @@ in import ./make-test-python.nix ({ pkgs, lib, ... }: {
imports = [ ../modules/installer/cd-dvd/channel.nix ]; imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation = { virtualisation = {
writableStore = true; writableStore = true;
memorySize = 768;
}; };
containers.webserver4 = webserverFor "10.231.136.1" "10.231.136.2"; containers.webserver4 = webserverFor "10.231.136.1" "10.231.136.2";

View file

@ -15,7 +15,6 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
machine1 = machine1 =
{ lib, ... }: { lib, ... }:
{ {
virtualisation.memorySize = 256;
virtualisation.vlans = [ 1 ]; virtualisation.vlans = [ 1 ];
# To be able to ping containers from the host, it is necessary # To be able to ping containers from the host, it is necessary
@ -55,7 +54,6 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
machine2 = machine2 =
{ ... }: { ... }:
{ {
virtualisation.memorySize = 256;
virtualisation.vlans = [ 1 ]; virtualisation.vlans = [ 1 ];
}; };

View file

@ -7,7 +7,6 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
nodes = { nodes = {
server = { ... }: server = { ... }:
{ {
virtualisation.memorySize = 256;
virtualisation.vlans = [ 1 ]; virtualisation.vlans = [ 1 ];
containers.server = { containers.server = {
@ -23,7 +22,6 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
}; };
}; };
bridged = { ... }: { bridged = { ... }: {
virtualisation.memorySize = 128;
virtualisation.vlans = [ 1 ]; virtualisation.vlans = [ 1 ];
containers.bridged = { containers.bridged = {
@ -41,7 +39,6 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
}; };
bonded = { ... }: { bonded = { ... }: {
virtualisation.memorySize = 128;
virtualisation.vlans = [ 1 ]; virtualisation.vlans = [ 1 ];
containers.bonded = { containers.bonded = {
@ -62,7 +59,6 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
}; };
bridgedbond = { ... }: { bridgedbond = { ... }: {
virtualisation.memorySize = 128;
virtualisation.vlans = [ 1 ]; virtualisation.vlans = [ 1 ];
containers.bridgedbond = { containers.bridgedbond = {

View file

@ -15,7 +15,6 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
{ pkgs, ... }: { pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ]; { imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true; virtualisation.writableStore = true;
virtualisation.memorySize = 768;
containers.webserver = containers.webserver =
{ privateNetwork = true; { privateNetwork = true;

View file

@ -8,7 +8,6 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
{ pkgs, ... }: { pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ]; { imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true; virtualisation.writableStore = true;
virtualisation.memorySize = 768;
containers.tmpfs = containers.tmpfs =
{ {

View file

@ -81,8 +81,6 @@ in
# chromium-based browsers refuse to run as root # chromium-based browsers refuse to run as root
test-support.displayManager.auto.user = "alice"; test-support.displayManager.auto.user = "alice";
# browsers may hang with the default memory
virtualisation.memorySize = 500;
networking.hosts."127.0.0.1" = [ "good.example.com" "bad.example.com" ]; networking.hosts."127.0.0.1" = [ "good.example.com" "bad.example.com" ];
security.pki.certificateFiles = [ "${example-good-cert}/ca.crt" ]; security.pki.certificateFiles = [ "${example-good-cert}/ca.crt" ];

View file

@ -19,7 +19,6 @@ import ./make-test-python.nix ({ pkgs, ...} :
}; };
}; };
hardware.pulseaudio.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then hardware.pulseaudio.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then
virtualisation.memorySize = 1024;
environment.systemPackages = [ pkgs.xdotool ]; environment.systemPackages = [ pkgs.xdotool ];
services.acpid.enable = true; services.acpid.enable = true;
services.connman.enable = true; services.connman.enable = true;

View file

@ -11,7 +11,6 @@ import ../make-test-python.nix (
... ...
}: }:
{ {
virtualisation.memorySize = 1024;
imports = [ imports = [
../common/user-account.nix ../common/user-account.nix

View file

@ -38,7 +38,6 @@ in
gcc gcc
(python3.withPackages (ps: with ps; [ fenics ])) (python3.withPackages (ps: with ps; [ fenics ]))
]; ];
virtualisation.memorySize = 512;
}; };
}; };
testScript = testScript =

View file

@ -13,9 +13,6 @@ import ./make-test-python.nix ({ pkgs, firefoxPackage, ... }: {
pkgs.xdotool pkgs.xdotool
]; ];
# Need some more memory to record audio.
virtualisation.memorySize = 500;
# Create a virtual sound device, with mixing # Create a virtual sound device, with mixing
# and all, for recording audio. # and all, for recording audio.
boot.kernelModules = [ "snd-aloop" ]; boot.kernelModules = [ "snd-aloop" ];

View file

@ -18,7 +18,6 @@ in {
{ config, pkgs, ... }: { { config, pkgs, ... }: {
networking.firewall.allowedTCPPorts = [ 80 2222 ]; networking.firewall.allowedTCPPorts = [ 80 2222 ];
virtualisation.memorySize = 1024;
services.gerrit = { services.gerrit = {
enable = true; enable = true;

View file

@ -40,7 +40,6 @@ import ./make-test-python.nix ({ pkgs, lib, ...} : {
}; };
}; };
virtualisation.memorySize = 1024;
}; };
testScript = { nodes, ... }: let testScript = { nodes, ... }: let

View file

@ -45,7 +45,6 @@ import ./make-test-python.nix ({ pkgs, lib, ...} : {
}; };
}; };
virtualisation.memorySize = 1024;
}; };
testScript = { nodes, ... }: let testScript = { nodes, ... }: let

View file

@ -4,7 +4,6 @@ import ./make-test-python.nix ({ pkgs, ... } :
nodes = { nodes = {
one = one =
{ ... }: { { ... }: {
virtualisation.memorySize = 1024;
time.timeZone = "UTC"; time.timeZone = "UTC";
services.graphite = { services.graphite = {
web = { web = {

View file

@ -95,7 +95,6 @@ import ../make-test-python.nix ({pkgs, ...}: {
# YARN cluster # YARN cluster
rm1 = {pkgs, options, ...}: { rm1 = {pkgs, options, ...}: {
virtualisation.memorySize = 1024;
services.hadoop = { services.hadoop = {
inherit package coreSite hdfsSite; inherit package coreSite hdfsSite;
yarnSite = options.services.hadoop.yarnSite.default // yarnSiteHA; yarnSite = options.services.hadoop.yarnSite.default // yarnSiteHA;
@ -103,7 +102,6 @@ import ../make-test-python.nix ({pkgs, ...}: {
}; };
}; };
rm2 = {pkgs, options, ...}: { rm2 = {pkgs, options, ...}: {
virtualisation.memorySize = 1024;
services.hadoop = { services.hadoop = {
inherit package coreSite hdfsSite; inherit package coreSite hdfsSite;
yarnSite = options.services.hadoop.yarnSite.default // yarnSiteHA; yarnSite = options.services.hadoop.yarnSite.default // yarnSiteHA;

View file

@ -2,7 +2,6 @@
import ../make-test-python.nix ({...}: { import ../make-test-python.nix ({...}: {
nodes = { nodes = {
namenode = {pkgs, ...}: { namenode = {pkgs, ...}: {
virtualisation.memorySize = 1024;
services.hadoop = { services.hadoop = {
package = pkgs.hadoop; package = pkgs.hadoop;
hdfs = { hdfs = {

View file

@ -7,6 +7,5 @@ makeInstalledTest {
services.fwupd.enable = true; services.fwupd.enable = true;
services.fwupd.disabledPlugins = lib.mkForce []; # don't disable test plugin services.fwupd.disabledPlugins = lib.mkForce []; # don't disable test plugin
services.fwupd.enableTestRemote = true; services.fwupd.enableTestRemote = true;
virtualisation.memorySize = 768;
}; };
} }

View file

@ -70,7 +70,7 @@ let
let iface = if grubVersion == 1 then "ide" else "virtio"; let iface = if grubVersion == 1 then "ide" else "virtio";
isEfi = bootLoader == "systemd-boot" || (bootLoader == "grub" && grubUseEfi); isEfi = bootLoader == "systemd-boot" || (bootLoader == "grub" && grubUseEfi);
bios = if pkgs.stdenv.isAarch64 then "QEMU_EFI.fd" else "OVMF.fd"; bios = if pkgs.stdenv.isAarch64 then "QEMU_EFI.fd" else "OVMF.fd";
in if !isEfi && !(pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64) then in if !isEfi && !pkgs.stdenv.hostPlatform.isx86 then
throw "Non-EFI boot methods are only supported on i686 / x86_64" throw "Non-EFI boot methods are only supported on i686 / x86_64"
else '' else ''
def assemble_qemu_flags(): def assemble_qemu_flags():

View file

@ -8,7 +8,6 @@ import ./make-test-python.nix ({ pkgs, ... }: {
client = { nodes, pkgs, ... }: { client = { nodes, pkgs, ... }: {
}; };
server = { config, pkgs, ... }: { server = { config, pkgs, ... }: {
virtualisation.memorySize = 512;
services.jitsi-meet = { services.jitsi-meet = {
enable = true; enable = true;
hostName = "server"; hostName = "server";

View file

@ -19,7 +19,6 @@ let
}; };
networking.firewall.allowedTCPPorts = [ 2181 ]; networking.firewall.allowedTCPPorts = [ 2181 ];
virtualisation.memorySize = 1024;
}; };
kafka = { ... }: { kafka = { ... }: {
services.apache-kafka = { services.apache-kafka = {

View file

@ -17,7 +17,6 @@ let
nodes = { nodes = {
keycloak = { ... }: { keycloak = { ... }: {
virtualisation.memorySize = 1024;
security.pki.certificateFiles = [ security.pki.certificateFiles = [
certs.ca.cert certs.ca.cert

View file

@ -46,8 +46,6 @@ in {
machine = { lib, ... }: { machine = { lib, ... }: {
virtualisation = { virtualisation = {
# OOMs otherwise
memorySize = 1024;
# disk full otherwise # disk full otherwise
diskSize = 2048; diskSize = 2048;

View file

@ -7,7 +7,6 @@ import ./make-test-python.nix ({ pkgs, ... }: {
nodes = { nodes = {
machine = { ... }: { machine = { ... }: {
services.metabase.enable = true; services.metabase.enable = true;
virtualisation.memorySize = 1024;
}; };
}; };

View file

@ -64,10 +64,6 @@ in
{ {
imports = [ users ]; imports = [ users ];
# prevent oom:
# Kernel panic - not syncing: Out of memory: compulsory panic_on_oom is enabled
virtualisation.memorySize = 1024;
services.mysql.enable = true; services.mysql.enable = true;
services.mysql.initialDatabases = [ services.mysql.initialDatabases = [
{ name = "testdb3"; schema = ./testdb.sql; } { name = "testdb3"; schema = ./testdb.sql; }

View file

@ -8,7 +8,6 @@ let default-config = {
services.xserver.enable = false; services.xserver.enable = false;
virtualisation.memorySize = 128;
}; };
in import ./make-test-python.nix ({ pkgs, ...} : { in import ./make-test-python.nix ({ pkgs, ...} : {
name = "networking-proxy"; name = "networking-proxy";

View file

@ -37,7 +37,6 @@ import ./make-test-python.nix {
}; };
client = { pkgs, lib, ... }: { client = { pkgs, lib, ... }: {
virtualisation.memorySize = 512;
environment.systemPackages = let environment.systemPackages = let
testRunner = pkgs.writers.writePython3Bin "test-runner" { testRunner = pkgs.writers.writePython3Bin "test-runner" {
libraries = [ pkgs.python3Packages.selenium ]; libraries = [ pkgs.python3Packages.selenium ];

View file

@ -26,7 +26,6 @@ let
nix.binaryCaches = lib.mkForce [ ]; nix.binaryCaches = lib.mkForce [ ];
users.users.person.isNormalUser = true; users.users.person.isNormalUser = true;
virtualisation.writableStore = true; virtualisation.writableStore = true;
virtualisation.memorySize = 1024 /*MiB*/;
virtualisation.additionalPaths = [ virtualisation.additionalPaths = [
pkgs.hello pkgs.hello
pkgs.figlet pkgs.figlet

View file

@ -39,7 +39,6 @@ import ./make-test-python.nix {
smtp2 = { pkgs, ... }: { smtp2 = { pkgs, ... }: {
imports = [ common/user-account.nix ]; imports = [ common/user-account.nix ];
virtualisation.memorySize = 512;
networking = { networking = {
firewall.allowedTCPPorts = [ 25 143 ]; firewall.allowedTCPPorts = [ 25 143 ];
useDHCP = false; useDHCP = false;

View file

@ -15,7 +15,6 @@ import ./make-test-python.nix ({ pkgs, lib, ...} :
services.xserver.enable = true; services.xserver.enable = true;
services.xserver.desktopManager.pantheon.enable = true; services.xserver.desktopManager.pantheon.enable = true;
virtualisation.memorySize = 1024;
}; };
enableOCR = true; enableOCR = true;

View file

@ -8,7 +8,6 @@ import ./make-test-python.nix ({ lib, ... }: {
enable = true; enable = true;
passwordFile = builtins.toFile "password" "admin"; passwordFile = builtins.toFile "password" "admin";
}; };
virtualisation.memorySize = 1024;
}; };
testScript = '' testScript = ''

View file

@ -21,7 +21,6 @@ import ./make-test-python.nix ({ pkgs, ...} :
user = "alice"; user = "alice";
}; };
}; };
virtualisation.memorySize = 1024;
}; };
testScript = { nodes, ... }: let testScript = { nodes, ... }: let

View file

@ -19,7 +19,6 @@ import ./make-test-python.nix ({ pkgs, ...} :
user = "alice"; user = "alice";
}; };
hardware.pulseaudio.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then hardware.pulseaudio.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then
virtualisation.memorySize = 1024;
}; };
testScript = { nodes, ... }: let testScript = { nodes, ... }: let

View file

@ -202,7 +202,6 @@ import ./make-test-python.nix ({ pkgs, ... }:
security.pki.certificateFiles = [ "${tls-cert}/cert.pem" ]; security.pki.certificateFiles = [ "${tls-cert}/cert.pem" ];
networking.extraHosts = hosts nodes; networking.extraHosts = hosts nodes;
networking.firewall.enable = false; networking.firewall.enable = false;
virtualisation.memorySize = 512;
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
provision-db provision-db
provision-secrets provision-secrets

View file

@ -8,7 +8,6 @@ import ./make-test-python.nix ({ pkgs, ...} : rec {
machine = { ... }: { machine = { ... }: {
virtualisation.cores = 2; virtualisation.cores = 2;
virtualisation.memorySize = 512;
services.privacyidea = { services.privacyidea = {
enable = true; enable = true;

View file

@ -464,7 +464,6 @@ let
extraFlags = [ "--lnd.network=regtest" ]; extraFlags = [ "--lnd.network=regtest" ];
}; };
metricProvider = { metricProvider = {
virtualisation.memorySize = 1024;
systemd.services.prometheus-lnd-exporter.serviceConfig.RestartSec = 15; systemd.services.prometheus-lnd-exporter.serviceConfig.RestartSec = 15;
systemd.services.prometheus-lnd-exporter.after = [ "lnd.service" ]; systemd.services.prometheus-lnd-exporter.after = [ "lnd.service" ];
services.bitcoind.regtest = { services.bitcoind.regtest = {
@ -953,7 +952,6 @@ let
}; };
metricProvider = { metricProvider = {
services.rspamd.enable = true; services.rspamd.enable = true;
virtualisation.memorySize = 1024;
}; };
exporterTest = '' exporterTest = ''
wait_for_unit("rspamd.service") wait_for_unit("rspamd.service")

View file

@ -188,7 +188,6 @@ in import ./make-test-python.nix {
# Minio requires at least 1GiB of free disk space to run. # Minio requires at least 1GiB of free disk space to run.
virtualisation = { virtualisation = {
diskSize = 2 * 1024; diskSize = 2 * 1024;
memorySize = 1024;
}; };
networking.firewall.allowedTCPPorts = [ minioPort ]; networking.firewall.allowedTCPPorts = [ minioPort ];

View file

@ -25,7 +25,6 @@ let
machine = { machine = {
services.rspamd.enable = true; services.rspamd.enable = true;
networking.enableIPv6 = enableIPv6; networking.enableIPv6 = enableIPv6;
virtualisation.memorySize = 1024;
}; };
testScript = '' testScript = ''
start_all() start_all()
@ -69,7 +68,6 @@ in
group = "rspamd"; group = "rspamd";
}]; }];
}; };
virtualisation.memorySize = 1024;
}; };
testScript = '' testScript = ''
@ -118,7 +116,6 @@ in
''; '';
}; };
}; };
virtualisation.memorySize = 1024;
}; };
testScript = '' testScript = ''
@ -224,7 +221,6 @@ in
rspamd_logger.infox(rspamd_config, 'Work dammit!!!') rspamd_logger.infox(rspamd_config, 'Work dammit!!!')
''; '';
}; };
virtualisation.memorySize = 1024;
}; };
testScript = '' testScript = ''
${initMachine} ${initMachine}
@ -291,7 +287,6 @@ in
postfix.enable = true; postfix.enable = true;
workers.rspamd_proxy.type = "rspamd_proxy"; workers.rspamd_proxy.type = "rspamd_proxy";
}; };
virtualisation.memorySize = 1024;
}; };
testScript = '' testScript = ''
${initMachine} ${initMachine}

View file

@ -1,7 +1,6 @@
import ./make-test-python.nix ({ pkgs, ... }: import ./make-test-python.nix ({ pkgs, ... }:
let let
client = { config, pkgs, ... }: { client = { config, pkgs, ... }: {
virtualisation.memorySize = 256;
environment.systemPackages = [ pkgs.seafile-shared pkgs.curl ]; environment.systemPackages = [ pkgs.seafile-shared pkgs.curl ];
}; };
in { in {
@ -12,7 +11,6 @@ import ./make-test-python.nix ({ pkgs, ... }:
nodes = { nodes = {
server = { config, pkgs, ... }: { server = { config, pkgs, ... }: {
virtualisation.memorySize = 512;
services.seafile = { services.seafile = {
enable = true; enable = true;
ccnetSettings.General.SERVICE_URL = "http://server"; ccnetSettings.General.SERVICE_URL = "http://server";

View file

@ -29,7 +29,6 @@ in {
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
signal-desktop file sqlite sqlcipher-signal signal-desktop file sqlite sqlcipher-signal
]; ];
virtualisation.memorySize = 1024;
}; };
enableOCR = true; enableOCR = true;

View file

@ -3,7 +3,6 @@ import ../make-test-python.nix ({...}: {
nodes = { nodes = {
worker = { nodes, pkgs, ... }: { worker = { nodes, pkgs, ... }: {
virtualisation.memorySize = 1024;
services.spark.worker = { services.spark.worker = {
enable = true; enable = true;
master = "master:7077"; master = "master:7077";

View file

@ -44,7 +44,6 @@ import ./make-test-python.nix ({ pkgs, lib, ...} :
# To test pinentry via gpg-agent: # To test pinentry via gpg-agent:
programs.gnupg.agent.enable = true; programs.gnupg.agent.enable = true;
virtualisation.memorySize = 1024;
# Need to switch to a different GPU driver than the default one (-vga std) so that Sway can launch: # Need to switch to a different GPU driver than the default one (-vga std) so that Sway can launch:
virtualisation.qemu.options = [ "-vga none -device virtio-gpu-pci" ]; virtualisation.qemu.options = [ "-vga none -device virtio-gpu-pci" ];
}; };

View file

@ -5,7 +5,6 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
machine = machine =
{ ... }: { ... }:
{ {
virtualisation.memorySize = 1024;
services.sympa = { services.sympa = {
enable = true; enable = true;

View file

@ -8,7 +8,6 @@ import ./make-test-python.nix ({ pkgs, ... }: {
environment.systemPackages = [ pkgs.cryptsetup ]; environment.systemPackages = [ pkgs.cryptsetup ];
virtualisation = { virtualisation = {
emptyDiskImages = [ 512 ]; emptyDiskImages = [ 512 ];
memorySize = 1024;
qemu.options = [ qemu.options = [
"-chardev socket,id=chrtpm,path=/tmp/swtpm-sock" "-chardev socket,id=chrtpm,path=/tmp/swtpm-sock"
"-tpmdev emulator,id=tpm0,chardev=chrtpm" "-tpmdev emulator,id=tpm0,chardev=chrtpm"

View file

@ -5,7 +5,6 @@ import ./make-test-python.nix ({ pkgs, ... }: {
imports = [ common/user-account.nix common/x11.nix ]; imports = [ common/user-account.nix common/x11.nix ];
virtualisation.emptyDiskImages = [ 512 512 ]; virtualisation.emptyDiskImages = [ 512 512 ];
virtualisation.memorySize = 1024;
environment.systemPackages = [ pkgs.cryptsetup ]; environment.systemPackages = [ pkgs.cryptsetup ];

View file

@ -12,7 +12,6 @@ import ./make-test-python.nix ({ pkgs, ... }:
maintainers = [ lnl7 roberth ]; maintainers = [ lnl7 roberth ];
}; };
machine = { lib, pkgs, ... }: { machine = { lib, pkgs, ... }: {
virtualisation.memorySize = 512;
environment.systemPackages = [ pkgs.vault ]; environment.systemPackages = [ pkgs.vault ];
environment.variables.VAULT_ADDR = "http://127.0.0.1:8200"; environment.variables.VAULT_ADDR = "http://127.0.0.1:8200";
services.vault.enable = true; services.vault.enable = true;

View file

@ -8,7 +8,6 @@ import ./make-test-python.nix ({ pkgs, ... }:
environment.systemPackages = [ pkgs.vault ]; environment.systemPackages = [ pkgs.vault ];
environment.variables.VAULT_ADDR = "http://127.0.0.1:8200"; environment.variables.VAULT_ADDR = "http://127.0.0.1:8200";
services.vault.enable = true; services.vault.enable = true;
virtualisation.memorySize = 512;
}; };
testScript = testScript =

View file

@ -140,7 +140,6 @@ let
in in
[ pkgs.firefox-unwrapped pkgs.geckodriver testRunner ]; [ pkgs.firefox-unwrapped pkgs.geckodriver testRunner ];
virtualisation.memorySize = 768;
} }
]; ];

View file

@ -23,7 +23,6 @@ import ./make-test-python.nix ({ pkgs, ...} : {
hardware.pulseaudio.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then hardware.pulseaudio.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then
virtualisation.memorySize = 1024;
}; };
testScript = { nodes, ... }: let testScript = { nodes, ... }: let

View file

@ -32,7 +32,7 @@ mkDerivation rec {
openjpeg opencolorio_1 poppler curl ilmbase openjpeg opencolorio_1 poppler curl ilmbase
qtmultimedia qtx11extras quazip qtmultimedia qtx11extras quazip
python3Packages.pyqt5 python3Packages.pyqt5
] ++ lib.optional (stdenv.hostPlatform.isi686 || stdenv.hostPlatform.isx86_64) vc; ] ++ lib.optional stdenv.hostPlatform.isx86 vc;
NIX_CFLAGS_COMPILE = [ "-I${ilmbase.dev}/include/OpenEXR" ] NIX_CFLAGS_COMPILE = [ "-I${ilmbase.dev}/include/OpenEXR" ]
++ lib.optional stdenv.cc.isGNU "-Wno-deprecated-copy"; ++ lib.optional stdenv.cc.isGNU "-Wno-deprecated-copy";

View file

@ -1,13 +1,15 @@
{ lib { lib
, mkDerivation , stdenv
, fetchFromGitHub , fetchFromGitHub
, substituteAll , substituteAll
, wrapQtAppsHook
, qmake , qmake
, qtsvg
, qtx11extras , qtx11extras
, graphviz , graphviz
}: }:
mkDerivation rec { stdenv.mkDerivation rec {
pname = "qvge"; pname = "qvge";
version = "0.6.3"; version = "0.6.3";
@ -25,15 +27,15 @@ mkDerivation rec {
inherit graphviz; inherit graphviz;
}); });
nativeBuildInputs = [ qmake ]; nativeBuildInputs = [ wrapQtAppsHook qmake ];
buildInputs = [ qtx11extras ]; buildInputs = if stdenv.isDarwin then [ qtsvg ] else [ qtx11extras ];
meta = with lib; { meta = with lib; {
description = "Qt Visual Graph Editor"; description = "Qt Visual Graph Editor";
homepage = "https://github.com/ArsMasiuk/qvge"; homepage = "https://github.com/ArsMasiuk/qvge";
license = licenses.mit; license = licenses.mit;
maintainers = with maintainers; [ sikmir ]; maintainers = with maintainers; [ sikmir ];
platforms = with platforms; linux; platforms = platforms.unix;
}; };
} }

View file

@ -27,7 +27,9 @@
, ltoSupport ? (stdenv.isLinux && stdenv.is64bit), overrideCC, buildPackages , ltoSupport ? (stdenv.isLinux && stdenv.is64bit), overrideCC, buildPackages
, gssSupport ? true, libkrb5 , gssSupport ? true, libkrb5
, pipewireSupport ? waylandSupport && webrtcSupport, pipewire , pipewireSupport ? waylandSupport && webrtcSupport, pipewire
, jemallocSupport ? true, jemalloc # Workaround: disabled since currently jemalloc causes crashes with LLVM 13.
# https://bugzilla.mozilla.org/show_bug.cgi?id=1741454
, jemallocSupport ? false, jemalloc
## privacy-related options ## privacy-related options
@ -71,6 +73,9 @@
# > the experience of Firefox users, you won't have any issues using the # > the experience of Firefox users, you won't have any issues using the
# > official branding. # > official branding.
, enableOfficialBranding ? true , enableOfficialBranding ? true
# On 32bit platforms, we disable adding "-g" for easier linking.
, enableDebugSymbols ? !stdenv.is32bit
}: }:
assert stdenv.cc.libc or null != null; assert stdenv.cc.libc or null != null;
@ -116,12 +121,6 @@ let
}) })
else stdenv; else stdenv;
# --enable-release adds -ffunction-sections & LTO that require a big amount of
# RAM and the 32-bit memory space cannot handle that linking
# We also disable adding "-g" for easier linking
releaseFlags = if stdenv.is32bit
then [ "--disable-release" "--disable-debug-symbols" ]
else [ "--enable-release" ];
in in
buildStdenv.mkDerivation ({ buildStdenv.mkDerivation ({
@ -174,10 +173,6 @@ buildStdenv.mkDerivation ({
AVFoundation MediaToolbox CoreLocation AVFoundation MediaToolbox CoreLocation
Foundation libobjc AddressBook cups ]; Foundation libobjc AddressBook cups ];
NIX_LDFLAGS = lib.optionalString ltoSupport ''
-rpath ${llvmPackages.libunwind.out}/lib
'';
MACH_USE_SYSTEM_PYTHON = "1"; MACH_USE_SYSTEM_PYTHON = "1";
postPatch = '' postPatch = ''
@ -206,6 +201,9 @@ buildStdenv.mkDerivation ({
++ lib.optionals buildStdenv.isDarwin [ xcbuild rsync ] ++ lib.optionals buildStdenv.isDarwin [ xcbuild rsync ]
++ extraNativeBuildInputs; ++ extraNativeBuildInputs;
separateDebugInfo = enableDebugSymbols;
setOutputFlags = false; # `./mach configure` doesn't understand `--*dir=` flags.
preConfigure = '' preConfigure = ''
# remove distributed configuration files # remove distributed configuration files
rm -f configure rm -f configure
@ -229,7 +227,11 @@ buildStdenv.mkDerivation ({
${lib.optionalString buildStdenv.cc.isClang "-idirafter ${buildStdenv.cc.cc.lib}/lib/clang/${lib.getVersion buildStdenv.cc.cc}/include"} \ ${lib.optionalString buildStdenv.cc.isClang "-idirafter ${buildStdenv.cc.cc.lib}/lib/clang/${lib.getVersion buildStdenv.cc.cc}/include"} \
${lib.optionalString buildStdenv.cc.isGNU "-isystem ${lib.getDev buildStdenv.cc.cc}/include/c++/${lib.getVersion buildStdenv.cc.cc} -isystem ${buildStdenv.cc.cc}/include/c++/${lib.getVersion buildStdenv.cc.cc}/${buildStdenv.hostPlatform.config}"} \ ${lib.optionalString buildStdenv.cc.isGNU "-isystem ${lib.getDev buildStdenv.cc.cc}/include/c++/${lib.getVersion buildStdenv.cc.cc} -isystem ${buildStdenv.cc.cc}/include/c++/${lib.getVersion buildStdenv.cc.cc}/${buildStdenv.hostPlatform.config}"} \
$NIX_CFLAGS_COMPILE" $NIX_CFLAGS_COMPILE"
${
# Bindgen doesn't like the flag added by `separateDebugInfo`.
lib.optionalString enableDebugSymbols ''
BINDGEN_CFLAGS="''${BINDGEN_CFLAGS/ -Wa,--compress-debug-sections/}"
''}
echo "ac_add_options BINDGEN_CFLAGS='$BINDGEN_CFLAGS'" >> $MOZCONFIG echo "ac_add_options BINDGEN_CFLAGS='$BINDGEN_CFLAGS'" >> $MOZCONFIG
'' + (lib.optionalString googleAPISupport '' '' + (lib.optionalString googleAPISupport ''
# Google API key used by Chromium and Firefox. # Google API key used by Chromium and Firefox.
@ -273,7 +275,7 @@ buildStdenv.mkDerivation ({
# https://bugzilla.mozilla.org/show_bug.cgi?id=1538724 # https://bugzilla.mozilla.org/show_bug.cgi?id=1538724
# elf-hack is broken when using clang+lld: # elf-hack is broken when using clang+lld:
# https://bugzilla.mozilla.org/show_bug.cgi?id=1482204 # https://bugzilla.mozilla.org/show_bug.cgi?id=1482204
++ lib.optional ltoSupport "--enable-lto" ++ lib.optional ltoSupport "--enable-lto=cross" # Cross-language LTO.
++ lib.optional (ltoSupport && (buildStdenv.isAarch32 || buildStdenv.isi686 || buildStdenv.isx86_64)) "--disable-elf-hack" ++ lib.optional (ltoSupport && (buildStdenv.isAarch32 || buildStdenv.isi686 || buildStdenv.isx86_64)) "--disable-elf-hack"
++ lib.optional (ltoSupport && !buildStdenv.isDarwin) "--enable-linker=lld" ++ lib.optional (ltoSupport && !buildStdenv.isDarwin) "--enable-linker=lld"
@ -287,9 +289,13 @@ buildStdenv.mkDerivation ({
++ lib.optional drmSupport "--enable-eme=widevine" ++ lib.optional drmSupport "--enable-eme=widevine"
++ (if debugBuild then [ "--enable-debug" "--enable-profiling" ] ++ (if debugBuild then [ "--enable-debug" "--enable-profiling" ]
else ([ "--disable-debug" else [ "--disable-debug" "--enable-optimize" ])
"--enable-optimize" # --enable-release adds -ffunction-sections & LTO that require a big amount of
"--enable-strip" ] ++ releaseFlags)) # RAM and the 32-bit memory space cannot handle that linking
++ flag (!debugBuild && !stdenv.is32bit) "release"
++ flag enableDebugSymbols "debug-symbols"
++ lib.optionals enableDebugSymbols [ "--disable-strip" "--disable-install-strip" ]
++ lib.optional enableOfficialBranding "--enable-official-branding" ++ lib.optional enableOfficialBranding "--enable-official-branding"
++ extraConfigureFlags; ++ extraConfigureFlags;
@ -297,14 +303,7 @@ buildStdenv.mkDerivation ({
cd obj-* cd obj-*
''; '';
makeFlags = lib.optionals ltoSupport [ makeFlags = extraMakeFlags;
"AR=${buildStdenv.cc.bintools.bintools}/bin/llvm-ar"
"LLVM_OBJDUMP=${buildStdenv.cc.bintools.bintools}/bin/llvm-objdump"
"NM=${buildStdenv.cc.bintools.bintools}/bin/llvm-nm"
"RANLIB=${buildStdenv.cc.bintools.bintools}/bin/llvm-ranlib"
"STRIP=${buildStdenv.cc.bintools.bintools}/bin/llvm-strip"
]
++ extraMakeFlags;
enableParallelBuilding = true; enableParallelBuilding = true;
doCheck = false; # "--disable-tests" above doCheck = false; # "--disable-tests" above
@ -322,6 +321,42 @@ buildStdenv.mkDerivation ({
gappsWrapperArgs+=(--argv0 "$out/bin/.${binaryName}-wrapped") gappsWrapperArgs+=(--argv0 "$out/bin/.${binaryName}-wrapped")
''; '';
# Workaround: The separateDebugInfo hook skips artifacts whose build ID's length is not 40.
# But we got 16-length build ID here. The function body is mainly copied from pkgs/build-support/setup-hooks/separate-debug-info.sh
# Remove it when PR #146275 is merged.
preFixup = lib.optionalString enableDebugSymbols ''
_separateDebugInfo() {
[ -e "$prefix" ] || return 0
local dst="''${debug:-$out}"
if [ "$prefix" = "$dst" ]; then return 0; fi
dst="$dst/lib/debug/.build-id"
# Find executables and dynamic libraries.
local i
while IFS= read -r -d $'\0' i; do
if ! isELF "$i"; then continue; fi
# Extract the Build ID. FIXME: there's probably a cleaner way.
local id="$($READELF -n "$i" | sed 's/.*Build ID: \([0-9a-f]*\).*/\1/; t; d')"
if [[ -z "$id" ]]; then
echo "could not find build ID of $i, skipping" >&2
continue
fi
# Extract the debug info.
header "separating debug info from $i (build ID $id)"
mkdir -p "$dst/''${id:0:2}"
$OBJCOPY --only-keep-debug "$i" "$dst/''${id:0:2}/''${id:2}.debug"
$STRIP --strip-debug "$i"
# Also a create a symlink <original-name>.debug.
ln -sfn ".build-id/''${id:0:2}/''${id:2}.debug" "$dst/../$(basename "$i")"
done < <(find "$prefix" -type f -print0)
}
'';
doInstallCheck = true; doInstallCheck = true;
installCheckPhase = '' installCheckPhase = ''
# Some basic testing # Some basic testing

View file

@ -20,6 +20,7 @@ stdenv.mkDerivation rec {
homepage = "http://hmmer.org/"; homepage = "http://hmmer.org/";
license = licenses.gpl3; license = licenses.gpl3;
maintainers = [ maintainers.iimog ]; maintainers = [ maintainers.iimog ];
platforms = platforms.unix; # at least SSE is *required*
platforms = platforms.x86_64;
}; };
} }

View file

@ -31,7 +31,7 @@ let
# source behind __linux__ check assumes system is also x86 and # source behind __linux__ check assumes system is also x86 and
# tries to disable x86/x87-specific extended precision mode # tries to disable x86/x87-specific extended precision mode
# https://github.com/sambayless/monosat/issues/33 # https://github.com/sambayless/monosat/issues/33
commonPostPatch = lib.optionalString (!(stdenv.isi686 || stdenv.isx86_64)) '' commonPostPatch = lib.optionalString (!stdenv.hostPlatform.isx86) ''
substituteInPlace src/monosat/Main.cc \ substituteInPlace src/monosat/Main.cc \
--replace 'defined(__linux__)' '0' --replace 'defined(__linux__)' '0'
''; '';

View file

@ -174,7 +174,7 @@ stdenv.mkDerivation rec {
(useUnfreeCodecs && codecs != null && !crossBuild) (useUnfreeCodecs && codecs != null && !crossBuild)
"--codecsdir=${codecs}" "--codecsdir=${codecs}"
++ optional ++ optional
((stdenv.hostPlatform.isi686 || stdenv.hostPlatform.isx86_64) && !crossBuild) (stdenv.hostPlatform.isx86 && !crossBuild)
"--enable-runtime-cpudetection" "--enable-runtime-cpudetection"
++ optional fribidiSupport "--enable-fribidi" ++ optional fribidiSupport "--enable-fribidi"
++ optional stdenv.isLinux "--enable-vidix" ++ optional stdenv.isLinux "--enable-vidix"

View file

@ -151,6 +151,7 @@
cpan = [ cpan = [
"https://cpan.metacpan.org/" "https://cpan.metacpan.org/"
"https://cpan.perl.org/" "https://cpan.perl.org/"
"https://mirrors.kernel.org/CPAN/"
"https://backpan.perl.org/" # for old releases "https://backpan.perl.org/" # for old releases
]; ];
@ -171,6 +172,7 @@
debian = [ debian = [
"https://httpredir.debian.org/debian/" "https://httpredir.debian.org/debian/"
"https://ftp.debian.org/debian/" "https://ftp.debian.org/debian/"
"https://mirrors.edge.kernel.org/debian/"
"ftp://ftp.de.debian.org/debian/" "ftp://ftp.de.debian.org/debian/"
"ftp://ftp.fr.debian.org/debian/" "ftp://ftp.fr.debian.org/debian/"
"ftp://ftp.nl.debian.org/debian/" "ftp://ftp.nl.debian.org/debian/"
@ -183,6 +185,7 @@
ubuntu = [ ubuntu = [
"https://nl.archive.ubuntu.com/ubuntu/" "https://nl.archive.ubuntu.com/ubuntu/"
"https://old-releases.ubuntu.com/ubuntu/" "https://old-releases.ubuntu.com/ubuntu/"
"https://mirrors.edge.kernel.org/ubuntu/"
"http://de.archive.ubuntu.com/ubuntu/" "http://de.archive.ubuntu.com/ubuntu/"
"http://archive.ubuntu.com/ubuntu/" "http://archive.ubuntu.com/ubuntu/"
]; ];
@ -206,6 +209,7 @@
"https://ftp.funet.fi/pub/linux/mirrors/opensuse/distribution/" "https://ftp.funet.fi/pub/linux/mirrors/opensuse/distribution/"
"https://ftp.opensuse.org/pub/opensuse/distribution/" "https://ftp.opensuse.org/pub/opensuse/distribution/"
"https://ftp5.gwdg.de/pub/opensuse/discontinued/distribution/" "https://ftp5.gwdg.de/pub/opensuse/discontinued/distribution/"
"https://mirrors.edge.kernel.org/opensuse/distribution/"
"http://ftp.hosteurope.de/mirror/ftp.opensuse.org/discontinued/" "http://ftp.hosteurope.de/mirror/ftp.opensuse.org/discontinued/"
]; ];

View file

@ -749,7 +749,7 @@ rec {
{ package, { package,
command ? "${package.meta.mainProgram or package.pname or package.name} --version", command ? "${package.meta.mainProgram or package.pname or package.name} --version",
version ? package.version, version ? package.version,
}: runCommand "test-version" { nativeBuildInputs = [ package ]; meta.timeout = 60; } '' }: runCommand "${package.name}-test-version" { nativeBuildInputs = [ package ]; meta.timeout = 60; } ''
${command} |& grep -Fw ${version} ${command} |& grep -Fw ${version}
touch $out touch $out
''; '';

View file

@ -5,7 +5,7 @@
, storeDir ? builtins.storeDir , storeDir ? builtins.storeDir
, rootModules ? , rootModules ?
[ "virtio_pci" "virtio_mmio" "virtio_blk" "virtio_balloon" "virtio_rng" "ext4" "unix" "9p" "9pnet_virtio" "crc32c_generic" ] [ "virtio_pci" "virtio_mmio" "virtio_blk" "virtio_balloon" "virtio_rng" "ext4" "unix" "9p" "9pnet_virtio" "crc32c_generic" ]
++ pkgs.lib.optional (pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64) "rtc_cmos" ++ pkgs.lib.optional pkgs.stdenv.hostPlatform.isx86 "rtc_cmos"
}: }:
let let

View file

@ -37,7 +37,7 @@
}: }:
let let
withFwupd = stdenv.isx86_64 || stdenv.isi686; withFwupd = stdenv.hostPlatform.isx86;
in in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {

View file

@ -4,7 +4,7 @@
}: }:
let let
useX11 = stdenv.isi686 || stdenv.isx86_64; useX11 = stdenv.hostPlatform.isx86;
x11deps = [ libX11 xorgproto ]; x11deps = [ libX11 xorgproto ];
inherit (lib) optionals; inherit (lib) optionals;

View file

@ -2,8 +2,8 @@
{ lib, stdenv, fetchurl, fetchpatch, writeText, sbclBootstrap { lib, stdenv, fetchurl, fetchpatch, writeText, sbclBootstrap
, sbclBootstrapHost ? "${sbclBootstrap}/bin/sbcl --disable-debugger --no-userinit --no-sysinit" , sbclBootstrapHost ? "${sbclBootstrap}/bin/sbcl --disable-debugger --no-userinit --no-sysinit"
, threadSupport ? (stdenv.isi686 || stdenv.isx86_64 || "aarch64-linux" == stdenv.hostPlatform.system || "aarch64-darwin" == stdenv.hostPlatform.system) , threadSupport ? (stdenv.hostPlatform.isx86 || "aarch64-linux" == stdenv.hostPlatform.system || "aarch64-darwin" == stdenv.hostPlatform.system)
, linkableRuntime ? (stdenv.isi686 || stdenv.isx86_64) , linkableRuntime ? stdenv.hostPlatform.isx86
, disableImmobileSpace ? false , disableImmobileSpace ? false
# Meant for sbcl used for creating binaries portable to non-NixOS via save-lisp-and-die. # Meant for sbcl used for creating binaries portable to non-NixOS via save-lisp-and-die.
# Note that the created binaries still need `patchelf --set-interpreter ...` # Note that the created binaries still need `patchelf --set-interpreter ...`

View file

@ -9,8 +9,8 @@
, libffcall , libffcall
, coreutils , coreutils
# build options # build options
, threadSupport ? (stdenv.isi686 || stdenv.isx86_64) , threadSupport ? stdenv.hostPlatform.isx86
, x11Support ? (stdenv.isi686 || stdenv.isx86_64) , x11Support ? stdenv.hostPlatform.isx86
, dllSupport ? true , dllSupport ? true
, withModules ? [ , withModules ? [
"pcre" "pcre"

View file

@ -8,8 +8,8 @@
, libffi, libffcall, automake , libffi, libffcall, automake
, coreutils , coreutils
# build options # build options
, threadSupport ? (stdenv.isi686 || stdenv.isx86_64) , threadSupport ? stdenv.hostPlatform.isx86
, x11Support ? (stdenv.isi686 || stdenv.isx86_64) , x11Support ? stdenv.hostPlatform.isx86
, dllSupport ? true , dllSupport ? true
, withModules ? [ , withModules ? [
"pcre" "pcre"

View file

@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
buildInputs = [ SDL2 ] buildInputs = [ SDL2 ]
++ lib.optional stdenv.isDarwin darwin.libobjc; ++ lib.optional stdenv.isDarwin darwin.libobjc;
configureFlags = [(if stdenv.isi686 || stdenv.isx86_64 then "--enable-mmx" else "--disable-mmx")] configureFlags = [(if stdenv.hostPlatform.isx86 then "--enable-mmx" else "--disable-mmx")]
++ lib.optional stdenv.isDarwin "--disable-sdltest"; ++ lib.optional stdenv.isDarwin "--disable-sdltest";
meta = with lib; { meta = with lib; {

View file

@ -161,7 +161,7 @@ stdenv.mkDerivation ({
"--enable-bind-now" "--enable-bind-now"
(lib.withFeatureAs withLinuxHeaders "headers" "${linuxHeaders}/include") (lib.withFeatureAs withLinuxHeaders "headers" "${linuxHeaders}/include")
(lib.enableFeature profilingLibraries "profile") (lib.enableFeature profilingLibraries "profile")
] ++ lib.optionals (stdenv.hostPlatform.isx86_64 || stdenv.hostPlatform.isi686 || stdenv.hostPlatform.isAarch64) [ ] ++ lib.optionals (stdenv.hostPlatform.isx86 || stdenv.hostPlatform.isAarch64) [
# This feature is currently supported on # This feature is currently supported on
# i386, x86_64 and x32 with binutils 2.29 or later, # i386, x86_64 and x32 with binutils 2.29 or later,
# and on aarch64 with binutils 2.30 or later. # and on aarch64 with binutils 2.30 or later.

View file

@ -1,7 +1,9 @@
{ lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, gettext { lib, stdenv, fetchFromGitHub, buildPackages
, autoreconfHook, pkg-config, gettext
, libusb1 , libusb1
, libtool , libtool
, libexif , libexif
, libgphoto2
, libjpeg , libjpeg
}: }:
@ -16,17 +18,17 @@ stdenv.mkDerivation rec {
sha256 = "sha256-c7fBl6GBLAU+RL5WFC4PL+n/nEHZUfqIJ9qq1+qNNCg="; sha256 = "sha256-c7fBl6GBLAU+RL5WFC4PL+n/nEHZUfqIJ9qq1+qNNCg=";
}; };
patches = []; depsBuildBuild = [ pkg-config ];
nativeBuildInputs = [ nativeBuildInputs = [
autoreconfHook autoreconfHook
pkg-config
gettext gettext
libtool libtool
]; ];
buildInputs = [ buildInputs = [
libjpeg libjpeg
libtool # for libltdl
libusb1 libusb1
]; ];
@ -35,9 +37,16 @@ stdenv.mkDerivation rec {
hardeningDisable = [ "format" ]; hardeningDisable = [ "format" ];
postInstall = '' postInstall = let
executablePrefix = if stdenv.buildPlatform == stdenv.hostPlatform then
"$out"
else
buildPackages.libgphoto2;
in ''
mkdir -p $out/lib/udev/rules.d mkdir -p $out/lib/udev/rules.d
$out/lib/libgphoto2/print-camera-list udev-rules version 175 group camera >$out/lib/udev/rules.d/40-gphoto2.rules ${executablePrefix}/lib/libgphoto2/print-camera-list \
udev-rules version 175 group camera \
>$out/lib/udev/rules.d/40-gphoto2.rules
''; '';
meta = { meta = {

View file

@ -15,7 +15,7 @@ stdenv.mkDerivation rec {
patchShebangs ./configure patchShebangs ./configure
''; '';
configureFlags = lib.optionals (!stdenv.isi686 && !stdenv.isx86_64) [ "--disable-sse" ]; configureFlags = lib.optionals (!stdenv.hostPlatform.isx86) [ "--disable-sse" ];
meta = with lib; { meta = with lib; {
homepage = "https://pngquant.org/lib/"; homepage = "https://pngquant.org/lib/";

View file

@ -15,7 +15,6 @@ stdenv.mkDerivation rec {
buildInputs = [ libconfuse ]; buildInputs = [ libconfuse ];
meta = with lib; { meta = with lib; {
inherit (src.meta) homepage;
description = "Lightweight library of frog DNA"; description = "Lightweight library of frog DNA";
longDescription = '' longDescription = ''
Libite is a lightweight library of frog DNA. It can be used to fill Libite is a lightweight library of frog DNA. It can be used to fill
@ -29,7 +28,8 @@ stdenv.mkDerivation rec {
_SAFE macros in the BSD sys/queue.h API highly recommended when _SAFE macros in the BSD sys/queue.h API highly recommended when
traversing lists to delete/free nodes. traversing lists to delete/free nodes.
''; '';
platforms = platforms.unix; homepage = "https://github.com/troglobit/libite";
platforms = with platforms; linux ++ netbsd;
maintainers = with maintainers; [ fpletz ]; maintainers = with maintainers; [ fpletz ];
license = with licenses; [ mit isc bsd2 bsd3 ]; license = with licenses; [ mit isc bsd2 bsd3 ];
}; };

View file

@ -20,6 +20,6 @@ stdenv.mkDerivation rec {
homepage = "http://www.freedesktop.org/wiki/Software/kmscon/libtsm/"; homepage = "http://www.freedesktop.org/wiki/Software/kmscon/libtsm/";
license = licenses.mit; license = licenses.mit;
maintainers = with maintainers; [ cstrahan ]; maintainers = with maintainers; [ cstrahan ];
platforms = with platforms; unix; platforms = platforms.linux;
}; };
} }

View file

@ -29,7 +29,7 @@ stdenv.mkDerivation rec {
# External libyamlcpp 0.6.* not compatible: https://github.com/imageworks/OpenColorIO/issues/517 # External libyamlcpp 0.6.* not compatible: https://github.com/imageworks/OpenColorIO/issues/517
"-DUSE_EXTERNAL_YAML=OFF" "-DUSE_EXTERNAL_YAML=OFF"
] ++ lib.optional stdenv.isDarwin "-DOCIO_USE_BOOST_PTR=ON" ] ++ lib.optional stdenv.isDarwin "-DOCIO_USE_BOOST_PTR=ON"
++ lib.optional (!stdenv.hostPlatform.isi686 && !stdenv.hostPlatform.isx86_64) "-DOCIO_USE_SSE=OFF"; ++ lib.optional (!stdenv.hostPlatform.isx86) "-DOCIO_USE_SSE=OFF";
postInstall = '' postInstall = ''
mkdir -p $bin/bin; mv $out/bin $bin/ mkdir -p $bin/bin; mv $out/bin $bin/

View file

@ -34,7 +34,7 @@ stdenv.mkDerivation rec {
# remove attempt to prevent (x86/x87-specific) extended precision use # remove attempt to prevent (x86/x87-specific) extended precision use
# when SSE not detected # when SSE not detected
postPatch = lib.optionalString (!(stdenv.isi686 || stdenv.isx86_64)) '' postPatch = lib.optionalString (!stdenv.hostPlatform.isx86) ''
sed -i '/-ffloat-store/d' cmake/pcl_find_sse.cmake sed -i '/-ffloat-store/d' cmake/pcl_find_sse.cmake
''; '';

View file

@ -37,7 +37,7 @@ stdenv.mkDerivation rec {
++ lib.optional (!stdenv.isi686) "--enable-pic" ++ lib.optional (!stdenv.isi686) "--enable-pic"
++ lib.optional (stdenv.buildPlatform != stdenv.hostPlatform) "--cross-prefix=${stdenv.cc.targetPrefix}"; ++ lib.optional (stdenv.buildPlatform != stdenv.hostPlatform) "--cross-prefix=${stdenv.cc.targetPrefix}";
nativeBuildInputs = lib.optional (stdenv.hostPlatform.isx86_64 || stdenv.hostPlatform.isi686) nasm; nativeBuildInputs = lib.optional stdenv.hostPlatform.isx86 nasm;
meta = with lib; { meta = with lib; {
description = "Library for encoding H264/AVC video streams"; description = "Library for encoding H264/AVC video streams";

View file

@ -9,7 +9,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "casbin"; pname = "casbin";
version = "1.9.7"; version = "1.11.1";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.6"; disabled = pythonOlder "3.6";
@ -18,7 +18,7 @@ buildPythonPackage rec {
owner = pname; owner = pname;
repo = "pycasbin"; repo = "pycasbin";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-wNygKs37PtMLij3f+pAh6PNLqQ45cvrpF43Aj+cO8p8="; sha256 = "sha256-gFGYpHd1kp4JMtoe47VbJ0uDnuGQegggbjXaw6nEMR4=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View file

@ -8,18 +8,22 @@
, pillow , pillow
, pytestCheckHook , pytestCheckHook
, python-dateutil , python-dateutil
, pythonOlder
, voluptuous , voluptuous
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "env-canada"; pname = "env-canada";
version = "0.5.16"; version = "0.5.17";
format = "setuptools";
disabled = pythonOlder "3.8";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "michaeldavie"; owner = "michaeldavie";
repo = "env_canada"; repo = "env_canada";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-5Cxpl5iwbBtpwQ9//yhEZNCIzBZgTm/fqAo9PNNxoG4="; sha256 = "sha256-viuBuyGzAUcfb4qSecZsDvoAU++FNhuwNJET/s0qyOI=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [
@ -49,7 +53,9 @@ buildPythonPackage rec {
"test_ecradar" "test_ecradar"
]; ];
pythonImportsCheck = [ "env_canada" ]; pythonImportsCheck = [
"env_canada"
];
meta = with lib; { meta = with lib; {
description = "Python library to get Environment Canada weather data"; description = "Python library to get Environment Canada weather data";

View file

@ -7,8 +7,9 @@
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "flux_led"; pname = "flux-led";
version = "0.24.24"; version = "0.24.25";
format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -16,7 +17,7 @@ buildPythonPackage rec {
owner = "Danielhiversen"; owner = "Danielhiversen";
repo = "flux_led"; repo = "flux_led";
rev = version; rev = version;
sha256 = "sha256-99EHmhyc6lAjYPHFvvqnd5r8HeEEJM6W3VK0/yLsz7I="; sha256 = "sha256-HhoqsdaqNKdKH63glYEl5mRBFImu6Nxw5gwF7JAJABk=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View file

@ -12,6 +12,10 @@ buildPythonPackage rec {
sha256 = "0pfqfr5xqgsqkxzrmj8xl2glyl4nbq0irs0k6ik7iy3gd3mxf5g1"; sha256 = "0pfqfr5xqgsqkxzrmj8xl2glyl4nbq0irs0k6ik7iy3gd3mxf5g1";
}; };
postPatch = ''
substituteInPlace setup.py --replace '"pytest-runner"' ""
'';
buildInputs = [ keyutils ]; buildInputs = [ keyutils ];
checkInputs = [ pytest pytest-runner ]; checkInputs = [ pytest pytest-runner ];

View file

@ -1,16 +1,25 @@
{ lib { lib
, buildPythonPackage , buildPythonPackage
, fetchPypi , fetchPypi
, pytestCheckHook
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "oath"; pname = "oath";
version = "1.4.3"; version = "1.4.4";
format = "setuptools";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
sha256 = "1xqgcqgx6aa0j21hwsdb3aqpqhviwj756bcqjjjcm1h1aij11p6m"; sha256 = "sha256-vWsg0g8sTj9TUj7pACEdynWu7KcvT1qf2NyswXX+HAs=";
}; };
checkInputs = [
pytestCheckHook
];
pythonImportsCheck = [
"oath"
];
meta = with lib; { meta = with lib; {
description = "Python implementation of the three main OATH specifications: HOTP, TOTP and OCRA"; description = "Python implementation of the three main OATH specifications: HOTP, TOTP and OCRA";

View file

@ -8,14 +8,16 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pyads"; pname = "pyads";
version = "3.3.8"; version = "3.3.9";
disabled = pythonOlder "3.6"; format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "stlehmann"; owner = "stlehmann";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "sha256-jhEVBndUOKM8rBX0LEqPTMLqbpizCiD7T+OCzbVgLM8="; sha256 = "sha256-eNouFJQDgp56fgkA7wZKfosKWOKU6OvXRjFwjCMvZqI=";
}; };
buildInputs = [ buildInputs = [
@ -31,7 +33,9 @@ buildPythonPackage rec {
pytestCheckHook pytestCheckHook
]; ];
pythonImportsCheck = [ "pyads" ]; pythonImportsCheck = [
"pyads"
];
meta = with lib; { meta = with lib; {
description = "Python wrapper for TwinCAT ADS library"; description = "Python wrapper for TwinCAT ADS library";

View file

@ -15,6 +15,11 @@ buildPythonPackage rec {
sha256 = "13x3718if28l50474xrz1b9709kvnvdg3nzm6y8bh7mc9a4zyss5"; sha256 = "13x3718if28l50474xrz1b9709kvnvdg3nzm6y8bh7mc9a4zyss5";
}; };
postPatch = ''
substituteInPlace unittests.py \
--replace '(tmp, "test.dat")' "(\"$TMPDIR\", \"test.dat\")"
'';
checkInputs = [ pytestCheckHook ]; checkInputs = [ pytestCheckHook ];
pytestFlagsArray = [ "unittests.py" ]; pytestFlagsArray = [ "unittests.py" ];

Some files were not shown because too many files have changed in this diff Show more