From dabac4bf0c5eefbb07402189d9ba6efce3ff7b34 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Janne=20He=C3=9F?= Date: Wed, 18 May 2022 17:37:48 +0200 Subject: [PATCH 01/23] doc: Document that the staging branches may be restricted --- doc/contributing/submitting-changes.chapter.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/doc/contributing/submitting-changes.chapter.md b/doc/contributing/submitting-changes.chapter.md index 6f87e015b9cf..cded53cdd981 100644 --- a/doc/contributing/submitting-changes.chapter.md +++ b/doc/contributing/submitting-changes.chapter.md @@ -238,12 +238,16 @@ The `master` branch is the main development branch. It should only see non-break The `staging` branch is a development branch where mass-rebuilds go. Mass rebuilds are commits that cause rebuilds for many packages, like more than 500 (or perhaps, if it's 'light' packages, 1000). It should only see non-breaking mass-rebuild commits. That means it is not to be used for testing, and changes must have been well tested already. If the branch is already in a broken state, please refrain from adding extra new breakages. +During the process of a releasing a new NixOS version, this branch or the release-critical packages can be restricted to non-breaking changes. + ### Staging-next branch {#submitting-changes-staging-next-branch} The `staging-next` branch is for stabilizing mass-rebuilds submitted to the `staging` branch prior to merging them into `master`. Mass-rebuilds must go via the `staging` branch. It must only see non-breaking commits that are fixing issues blocking it from being merged into the `master ` branch. If the branch is already in a broken state, please refrain from adding extra new breakages. Stabilize it for a few days and then merge into master. +During the process of a releasing a new NixOS version, this branch or the release-critical packages can be restricted to non-breaking changes. + ### Stable release branches {#submitting-changes-stable-release-branches} The same staging workflow applies to stable release branches, but the main branch is called `release-*` instead of `master`. From 698dbb85ae5234a1cdf44970947e76cd6b6e8bc5 Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Sun, 25 Sep 2022 19:37:37 +0000 Subject: [PATCH 02/23] python310Packages.django-debug-toolbar: 3.5 -> 3.7 --- .../python-modules/django-debug-toolbar/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/python-modules/django-debug-toolbar/default.nix b/pkgs/development/python-modules/django-debug-toolbar/default.nix index b4409dc04d4c..bc54eadde8f7 100644 --- a/pkgs/development/python-modules/django-debug-toolbar/default.nix +++ b/pkgs/development/python-modules/django-debug-toolbar/default.nix @@ -11,7 +11,7 @@ buildPythonPackage rec { pname = "django-debug-toolbar"; - version = "3.5"; + version = "3.7"; format = "setuptools"; disabled = pythonOlder "3.7"; @@ -20,7 +20,7 @@ buildPythonPackage rec { owner = "jazzband"; repo = pname; rev = "refs/tags/${version}"; - hash = "sha256-OZWO3tXZ+p+zKtQHCkj0kGSXpDFHFV+HqSgiJvLmMTg="; + hash = "sha256-LGEx21m5TNotbwKHf5in+EDkYqqNOoF7mBstnfLYe9s="; }; propagatedBuildInputs = [ From 18a17d11ff6d201530bc529d65d67ce5940e36cb Mon Sep 17 00:00:00 2001 From: ajs124 Date: Tue, 11 Oct 2022 21:16:37 +0200 Subject: [PATCH 03/23] nixos/jenkins: jdk11 -> jdk17 see https://www.jenkins.io/doc/upgrade-guide/2.361/ we'll need to do this eventually, not sure when the best point in time is --- .../services/continuous-integration/jenkins/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/nixos/modules/services/continuous-integration/jenkins/default.nix b/nixos/modules/services/continuous-integration/jenkins/default.nix index 6cd5718f4227..a9a587b41e88 100644 --- a/nixos/modules/services/continuous-integration/jenkins/default.nix +++ b/nixos/modules/services/continuous-integration/jenkins/default.nix @@ -87,8 +87,8 @@ in { }; packages = mkOption { - default = [ pkgs.stdenv pkgs.git pkgs.jdk11 config.programs.ssh.package pkgs.nix ]; - defaultText = literalExpression "[ pkgs.stdenv pkgs.git pkgs.jdk11 config.programs.ssh.package pkgs.nix ]"; + default = [ pkgs.stdenv pkgs.git pkgs.jdk17 config.programs.ssh.package pkgs.nix ]; + defaultText = literalExpression "[ pkgs.stdenv pkgs.git pkgs.jdk17 config.programs.ssh.package pkgs.nix ]"; type = types.listOf types.package; description = lib.mdDoc '' Packages to add to PATH for the jenkins process. @@ -228,7 +228,7 @@ in { # For reference: https://wiki.jenkins.io/display/JENKINS/JenkinsLinuxStartupScript script = '' - ${pkgs.jdk11}/bin/java ${concatStringsSep " " cfg.extraJavaOptions} -jar ${cfg.package}/webapps/jenkins.war --httpListenAddress=${cfg.listenAddress} \ + ${pkgs.jdk17}/bin/java ${concatStringsSep " " cfg.extraJavaOptions} -jar ${cfg.package}/webapps/jenkins.war --httpListenAddress=${cfg.listenAddress} \ --httpPort=${toString cfg.port} \ --prefix=${cfg.prefix} \ -Djava.awt.headless=true \ From edb08aac6b22f4f6c7f4846db0a946ac66889eee Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Sandro=20J=C3=A4ckel?= Date: Tue, 18 Oct 2022 23:25:51 +0200 Subject: [PATCH 04/23] docker-compose: 2.11.2 -> 2.12.0 --- pkgs/applications/virtualization/docker/compose.nix | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/pkgs/applications/virtualization/docker/compose.nix b/pkgs/applications/virtualization/docker/compose.nix index ad6a02ec3b02..ab023dc4f02d 100644 --- a/pkgs/applications/virtualization/docker/compose.nix +++ b/pkgs/applications/virtualization/docker/compose.nix @@ -2,16 +2,21 @@ buildGoModule rec { pname = "docker-compose"; - version = "2.11.2"; + version = "2.12.0"; src = fetchFromGitHub { owner = "docker"; repo = "compose"; rev = "v${version}"; - sha256 = "sha256-L43BIkRaPAU0zgdVsf1a3OinbspiU0LfWZPssS91wTE="; + sha256 = "sha256-AwoWCaACq2s9rzvvpAx3GZd3oSZZPykLwYLUiUhEYfg="; }; - vendorSha256 = "sha256-PZumm//BV9iAkq1Kb9xNenqVrx73ZZUHTCUSVNqqEXA="; + postPatch = '' + # entirely separate package that breaks the build + rm -rf e2e/ + ''; + + vendorSha256 = "sha256-C7VgcbDB18dF+u422AFAfoICxGmqjREbOpUXrFlgmiM="; ldflags = [ "-X github.com/docker/compose/v2/internal.Version=${version}" "-s" "-w" ]; From f4e0e749ff2f76d43884602bff65ac42bfa7d3a0 Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Wed, 19 Oct 2022 11:42:04 +0000 Subject: [PATCH 05/23] fsql: 0.5.0 -> 0.5.1 --- pkgs/tools/misc/fsql/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/tools/misc/fsql/default.nix b/pkgs/tools/misc/fsql/default.nix index 192959ec7603..0f2300a74805 100644 --- a/pkgs/tools/misc/fsql/default.nix +++ b/pkgs/tools/misc/fsql/default.nix @@ -2,13 +2,13 @@ buildGoModule rec { pname = "fsql"; - version = "0.5.0"; + version = "0.5.1"; src = fetchFromGitHub { owner = "kshvmdn"; repo = "fsql"; rev = "v${version}"; - sha256 = "sha256-YavkN7n2Nt92T+uMwWRVv3q81DA6fFoNIJt9NYMS3rc="; + sha256 = "sha256-6KqlpFBaAWrlEjkFQhOEic569+eoYVAsnhMrg8AEPV4="; }; vendorSha256 = "sha256-xuD7/gTssf1Iu1VuIRysjtUjve16gozOq0Wz4w6mIB8="; From 687253e0b06b631b06cab600bf105ed81cea2514 Mon Sep 17 00:00:00 2001 From: Gaetan Lepage Date: Wed, 19 Oct 2022 08:34:13 +0200 Subject: [PATCH 06/23] nvitop: init at 0.10.0 --- pkgs/tools/system/nvitop/default.nix | 37 ++++++++++++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 39 insertions(+) create mode 100644 pkgs/tools/system/nvitop/default.nix diff --git a/pkgs/tools/system/nvitop/default.nix b/pkgs/tools/system/nvitop/default.nix new file mode 100644 index 000000000000..70a0311c3e43 --- /dev/null +++ b/pkgs/tools/system/nvitop/default.nix @@ -0,0 +1,37 @@ +{ lib +, stdenv +, python3Packages +, fetchFromGitHub +, makeWrapper +}: + +python3Packages.buildPythonApplication rec { + pname = "nvitop"; + version = "0.10.0"; + + src = fetchFromGitHub { + owner = "XuehaiPan"; + repo = pname; + rev = "v${version}"; + sha256 = "sha256-nGdEMLxpw2Ts0dypkoZg3r2NF4IeT1ykbRmrmf9qxrA="; + }; + + propagatedBuildInputs = with python3Packages; [ + cachetools + psutil + termcolor + nvidia-ml-py + ]; + + checkPhase = '' + $out/bin/nvitop --help + ''; + + meta = with lib; { + description = "An interactive NVIDIA-GPU process viewer, the one-stop solution for GPU process management"; + homepage = "https://github.com/XuehaiPan/nvitop"; + license = licenses.gpl3; + maintainers = with maintainers; [ GaetanLepage ]; + platforms = with platforms; linux; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 6ab36fc6f57d..a003ffab1753 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -21230,6 +21230,8 @@ with pkgs; nvidia-optical-flow-sdk = callPackage ../development/libraries/nvidia-optical-flow-sdk { }; + nvitop = callPackage ../tools/system/nvitop { }; + nvtop = callPackage ../tools/system/nvtop { }; nvtop-nvidia = callPackage ../tools/system/nvtop { amd = false; }; nvtop-amd = callPackage ../tools/system/nvtop { nvidia = false; }; From c5e6503128c12c99ae4ab3a777bb5e6ab411cfea Mon Sep 17 00:00:00 2001 From: Dmitry Bogatov Date: Thu, 25 Aug 2022 20:39:04 -0400 Subject: [PATCH 07/23] deheader: init at 1.8 --- .../tools/misc/deheader/default.nix | 68 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 + 2 files changed, 70 insertions(+) create mode 100644 pkgs/development/tools/misc/deheader/default.nix diff --git a/pkgs/development/tools/misc/deheader/default.nix b/pkgs/development/tools/misc/deheader/default.nix new file mode 100644 index 000000000000..ad1cb909b0de --- /dev/null +++ b/pkgs/development/tools/misc/deheader/default.nix @@ -0,0 +1,68 @@ +{ lib +, stdenv +, python3 +, xmlto +, docbook-xsl-nons +, fetchFromGitLab +, installShellFiles +}: + +stdenv.mkDerivation rec { + pname = "deheader"; + version = "1.8"; + outputs = [ "out" "man" ]; + + src = fetchFromGitLab { + owner = "esr"; + repo = "deheader"; + rev = version; + sha256 = "sha256-sjxgUtdsi/sfxOViDj7l8591TSYwtCzDQcHsk9ClXuM="; + }; + + buildInputs = [ python3 ]; + + nativeBuildInputs = [ xmlto docbook-xsl-nons installShellFiles ]; + + # With upstream Makefile, xmlto is called without "--skip-validation". It + # makes it require a lot of dependencies, yet ultimately it fails + # nevertheless in attempt to fetch something from SourceForge. + # + # Need to set "foundMakefile" so "make check" tests are run. + buildPhase = '' + runHook preBuild + + xmlto man --skip-validation deheader.xml + patchShebangs ./deheader + foundMakefile=1 + + runHook postBuild + ''; + + doCheck = true; + + installPhase = '' + runHook preInstall + + install -Dm755 ./deheader -t $out/bin + installManPage ./deheader.1 + + runHook postInstall + ''; + + meta = with lib; { + description = "Tool to find and optionally remove unneeded includes in C or C++ source files"; + longDescription = '' + This tool takes a list of C or C++ sourcefiles and generates a report + on which #includes can be omitted from them -- the test, for each foo.c + or foo.cc or foo.cpp, is simply whether 'rm foo.o; make foo.o' returns a + zero status. Optionally, with the -r option, the unneeded headers are removed. + The tool also reports on headers required for strict portability. + ''; + homepage = "http://catb.org/~esr/deheader"; + changelog = "https://gitlab.com/esr/deheader/-/blob/master/NEWS.adoc"; + license = licenses.bsd2; + maintainers = with maintainers; [ kaction ]; + + platforms = platforms.linux; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 93554e795c6c..f8e9c723f077 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -3679,6 +3679,8 @@ with pkgs; dedup = callPackage ../tools/backup/dedup { }; + deheader = callPackage ../development/tools/misc/deheader { }; + dehydrated = callPackage ../tools/admin/dehydrated { }; deja-dup = callPackage ../applications/backup/deja-dup { }; From 3b6e2eb68328e622dd4aea63c598adeae22b50a7 Mon Sep 17 00:00:00 2001 From: Bill Huang Date: Tue, 4 Oct 2022 15:18:31 +0800 Subject: [PATCH 08/23] aiorwlock: init at 1.3.0 update aiorwlock hash remove pytest-cov add pythonImportsCheck --- .../python-modules/aiorwlock/default.nix | 31 +++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 pkgs/development/python-modules/aiorwlock/default.nix diff --git a/pkgs/development/python-modules/aiorwlock/default.nix b/pkgs/development/python-modules/aiorwlock/default.nix new file mode 100644 index 000000000000..9ee21f2a7c9b --- /dev/null +++ b/pkgs/development/python-modules/aiorwlock/default.nix @@ -0,0 +1,31 @@ +{ buildPythonPackage +, fetchPypi +, lib +, pytest-asyncio +, pytest-cov +, pytestCheckHook +}: + +buildPythonPackage rec { + pname = "aiorwlock"; + version = "1.3.0"; + + src = fetchPypi { + inherit pname version; + sha256 = "sha256-g/Eth99LlyiguP2hdWWFqw1lKxB7q1nGCE4bGtaSq0U="; + }; + + checkInputs = [ + pytestCheckHook + pytest-asyncio + ]; + + pythonImportsCheck = [ "aiorwlock" ]; + + meta = with lib; { + description = "Read write lock for asyncio"; + homepage = "https://github.com/aio-libs/aiorwlock"; + license = licenses.asl20; + maintainers = with maintainers; [ billhuang ]; + }; +} From e48936d8c46e572bfe7e238efcb6268c7e8d3d2a Mon Sep 17 00:00:00 2001 From: Bill Huang Date: Tue, 4 Oct 2022 15:19:19 +0800 Subject: [PATCH 09/23] opencensus: init at 0.11.0 update hash use python.sitePackage add pythonImportsCheck --- .../python-modules/opencensus/default.nix | 55 +++++++++++++++++++ 1 file changed, 55 insertions(+) create mode 100644 pkgs/development/python-modules/opencensus/default.nix diff --git a/pkgs/development/python-modules/opencensus/default.nix b/pkgs/development/python-modules/opencensus/default.nix new file mode 100644 index 000000000000..0690da3d7ba9 --- /dev/null +++ b/pkgs/development/python-modules/opencensus/default.nix @@ -0,0 +1,55 @@ +{ buildPythonPackage +, fetchPypi +, lib +, python +, unittestCheckHook +, google-api-core +}: + +let + opencensus-context = buildPythonPackage rec { + pname = "opencensus-context"; + version = "0.1.3"; + + checkInputs = [ unittestCheckHook ]; + + src = fetchPypi { + inherit pname version; + sha256 = "sha256-oDEIw8ENjIC7Xd9cih8DMWH6YZcqmRf5ubOhhRfwCIw="; + }; + }; +in +buildPythonPackage rec { + pname = "opencensus"; + version = "0.11.0"; + + src = fetchPypi { + inherit pname version; + sha256 = "sha256-AmIWq6uJ2U2FBJLz3GWVAFXsT4QRX6bHvq/7pEo0bkI="; + }; + + buildInputs = [ + # opencensus-context is embedded in opencensus + opencensus-context + ]; + + propagatedBuildInputs = [ + google-api-core + ]; + + postInstall = '' + ln -sf ${opencensus-context}/${python.sitePackages}/opencensus/common/runtime_context \ + $out/${python.sitePackages}/opencensus/common/ + ''; + + checkInputs = [ unittestCheckHook ]; + + pythonImportsCheck = [ "opencensus" ]; + + meta = with lib; { + description = "A stats collection and distributed tracing framework"; + homepage = "https://github.com/census-instrumentation/opencensus-python"; + license = licenses.asl20; + maintainers = with maintainers; [ billhuang ]; + }; +} From f3101c2c689a72ee27a0cdc32b2ee51697f3bdf6 Mon Sep 17 00:00:00 2001 From: Bill Huang Date: Tue, 4 Oct 2022 15:19:31 +0800 Subject: [PATCH 10/23] gpustat: init at 1.0.0 update gpustat hash remove pytest-runner add pythonImportsCheck --- .../python-modules/gpustat/default.nix | 44 +++++++++++++++++++ 1 file changed, 44 insertions(+) create mode 100644 pkgs/development/python-modules/gpustat/default.nix diff --git a/pkgs/development/python-modules/gpustat/default.nix b/pkgs/development/python-modules/gpustat/default.nix new file mode 100644 index 000000000000..fbfa2faf597b --- /dev/null +++ b/pkgs/development/python-modules/gpustat/default.nix @@ -0,0 +1,44 @@ +{ buildPythonPackage +, blessed +, fetchPypi +, lib +, mockito +, nvidia-ml-py +, psutil +, pytest-runner +, pythonRelaxDepsHook +, pytestCheckHook +}: + +buildPythonPackage rec { + pname = "gpustat"; + version = "1.0.0"; + + src = fetchPypi { + inherit pname version; + sha256 = "sha256-WB6P+FjDLJWjIruPA/HZ3D0Xe07LM93L7Sw3PGf04/E="; + }; + + nativeBuildInputs = [ pythonRelaxDepsHook ]; + pythonRelaxDeps = [ "nvidia-ml-py" ]; + + propagatedBuildInputs = [ + blessed + nvidia-ml-py + psutil + ]; + + checkInputs = [ + mockito + pytestCheckHook + ]; + + pythonImportsCheck = [ "gpustat" ]; + + meta = with lib; { + description = "A simple command-line utility for querying and monitoring GPU status"; + homepage = "https://github.com/wookayin/gpustat"; + license = licenses.mit; + maintainers = with maintainers; [ billhuang ]; + }; +} From 0f2040f80c8e33266655634ee5f780c280caa82d Mon Sep 17 00:00:00 2001 From: Bill Huang Date: Tue, 4 Oct 2022 15:20:28 +0800 Subject: [PATCH 11/23] ray-bin: init at 2.0.0 use the correct redis --- .../python-modules/ray/binary-hashes.nix | 11 ++ .../python-modules/ray/default.nix | 166 ++++++++++++++++++ pkgs/top-level/python-packages.nix | 8 + 3 files changed, 185 insertions(+) create mode 100644 pkgs/development/python-modules/ray/binary-hashes.nix create mode 100644 pkgs/development/python-modules/ray/default.nix diff --git a/pkgs/development/python-modules/ray/binary-hashes.nix b/pkgs/development/python-modules/ray/binary-hashes.nix new file mode 100644 index 000000000000..28f9e2103334 --- /dev/null +++ b/pkgs/development/python-modules/ray/binary-hashes.nix @@ -0,0 +1,11 @@ +{ + cp38 = { + sha256 = "da8adfa33ff54bc61cfe80334a0ee889e0060918db6ff9215aebe32e98b1f939"; + }; + cp39 = { + sha256 = "cab13346650f88171b3f348ed352f04695b96d1ab1090ed3b80bdc93e897dbd4"; + }; + cp310 = { + sha256 = "bcf3bff9517d77ea6c98592fa16e1cfb8bc0cfa345d3be69729bfa9c5bd78a7c"; + }; +} diff --git a/pkgs/development/python-modules/ray/default.nix b/pkgs/development/python-modules/ray/default.nix new file mode 100644 index 000000000000..c6b764181875 --- /dev/null +++ b/pkgs/development/python-modules/ray/default.nix @@ -0,0 +1,166 @@ +{ aiohttp +, aiohttp-cors +, aiorwlock +, aiosignal +, attrs +, autoPatchelfHook +, buildBazelPackage +, buildPythonPackage +, fetchPypi +, click +, cloudpickle +, colorama +, colorful +, cython +, dm-tree +, fastapi +, filelock +, frozenlist +, fsspec +, gpustat +, grpc +, grpcio +, gym +, jsonschema +, lib +, lz4 +, matplotlib +, msgpack +, numpy +, opencensus +, packaging +, pandas +, py-spy +, prometheus-client +, protobuf3_20 +, psutil +, pyarrow +, pydantic +, python +, pythonAtLeast +, pythonOlder +, pythonRelaxDepsHook +, pyyaml +, redis +, requests +, scikitimage +, scipy +, setproctitle +, smart-open +, starlette +, stdenv +, tabulate +, tensorboardx +, uvicorn +, virtualenv +}: + +let + pname = "ray"; + version = "2.0.0"; +in +buildPythonPackage rec { + inherit pname version; + format = "wheel"; + + disabled = pythonOlder "3.8" || pythonAtLeast "3.11"; + + src = + let + pyShortVersion = "cp${builtins.replaceStrings ["."] [""] python.pythonVersion}"; + binary-hash = (import ./binary-hashes.nix)."${pyShortVersion}"; + in + fetchPypi ({ + inherit pname version format; + dist = pyShortVersion; + python = pyShortVersion; + abi = pyShortVersion; + platform = "manylinux2014_x86_64"; + } // binary-hash); + + passthru.optional-dependencies = rec { + data-deps = [ + pandas + pyarrow + fsspec + ]; + + serve-deps = [ + aiorwlock + fastapi + pandas + starlette + uvicorn + ]; + + tune-deps = [ + tabulate + tensorboardx + ]; + + rllib-deps = tune-deps ++ [ + dm-tree + gym + lz4 + matplotlib + scikitimage + pyyaml + scipy + ]; + + air-deps = data-deps ++ serve-deps ++ tune-deps ++ rllib-deps; + }; + + nativeBuildInputs = [ + autoPatchelfHook + pythonRelaxDepsHook + ]; + + pythonRelaxDeps = [ "grpcio" "click" "protobuf" ]; + + propagatedBuildInputs = [ + attrs + aiohttp + aiohttp-cors + aiosignal + click + cloudpickle + colorama + colorful + cython + filelock + frozenlist + gpustat + grpcio + jsonschema + msgpack + numpy + opencensus + packaging + py-spy + prometheus-client + protobuf3_20 + psutil + pydantic + pyyaml + requests + setproctitle + smart-open + virtualenv + ]; + + postInstall = '' + chmod +x $out/${python.sitePackages}/ray/core/src/ray/{gcs/gcs_server,raylet/raylet} + ln -sf ${redis}/bin/redis-server $out/${python.sitePackages}/ray/core/src/ray/thirdparty/redis/src/redis-server + ''; + + pythonImportsCheck = [ "ray" ]; + + meta = with lib; { + description = "A unified framework for scaling AI and Python applications"; + homepage = "https://github.com/ray-project/ray"; + license = licenses.asl20; + maintainers = with maintainers; [ billhuang ]; + platforms = [ "x86_64-linux" ]; + }; +} diff --git a/pkgs/top-level/python-packages.nix b/pkgs/top-level/python-packages.nix index 58b814a21b59..08bcbe26dc0d 100644 --- a/pkgs/top-level/python-packages.nix +++ b/pkgs/top-level/python-packages.nix @@ -433,6 +433,8 @@ in { aiorun = callPackage ../development/python-modules/aiorun { }; + aiorwlock = callPackage ../development/python-modules/aiorwlock { }; + aiosenseme = callPackage ../development/python-modules/aiosenseme { }; aiosenz = callPackage ../development/python-modules/aiosenz { }; @@ -4035,6 +4037,8 @@ in { gpsoauth = callPackage ../development/python-modules/gpsoauth { }; + gpustat = callPackage ../development/python-modules/gpustat { }; + gpxpy = callPackage ../development/python-modules/gpxpy { }; gpy = callPackage ../development/python-modules/gpy { }; @@ -6522,6 +6526,8 @@ in { openbabel = callPackage ../development/libraries/openbabel { inherit (self) python; }; }; + opencensus = callPackage ../development/python-modules/opencensus { }; + opencv3 = toPythonModule (pkgs.opencv3.override { enablePython = true; pythonPackages = self; @@ -9616,6 +9622,8 @@ in { rawkit = callPackage ../development/python-modules/rawkit { }; + ray = callPackage ../development/python-modules/ray { redis = pkgs.redis; }; + rbtools = callPackage ../development/python-modules/rbtools { }; rcssmin = callPackage ../development/python-modules/rcssmin { }; From 042138b3462b011c6679bb053357c9e4a84af756 Mon Sep 17 00:00:00 2001 From: Nikolay Korotkiy Date: Tue, 4 Oct 2022 11:36:50 +0300 Subject: [PATCH 12/23] paho-mqtt-c: init at 1.3.11 --- .../libraries/paho-mqtt-c/default.nix | 33 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 35 insertions(+) create mode 100644 pkgs/development/libraries/paho-mqtt-c/default.nix diff --git a/pkgs/development/libraries/paho-mqtt-c/default.nix b/pkgs/development/libraries/paho-mqtt-c/default.nix new file mode 100644 index 000000000000..37a829088d81 --- /dev/null +++ b/pkgs/development/libraries/paho-mqtt-c/default.nix @@ -0,0 +1,33 @@ +{ lib, stdenv, fetchFromGitHub, cmake, openssl }: + +stdenv.mkDerivation rec { + pname = "paho.mqtt.c"; + version = "1.3.11"; + + src = fetchFromGitHub { + owner = "eclipse"; + repo = "paho.mqtt.c"; + rev = "v${version}"; + hash = "sha256-TGCWA9tOOx0rCb/XQWqLFbXb9gOyGS8u6o9fvSRS6xI="; + }; + + postPatch = '' + substituteInPlace src/MQTTVersion.c \ + --replace "namebuf[60]" "namebuf[120]" \ + --replace "lib%s" "$out/lib/lib%s" + ''; + + nativeBuildInputs = [ cmake ]; + + buildInputs = [ openssl ]; + + cmakeFlags = [ "-DPAHO_WITH_SSL=TRUE" ]; + + meta = with lib; { + description = "Eclipse Paho MQTT C Client Library"; + homepage = "https://www.eclipse.org/paho/"; + license = licenses.epl20; + maintainers = with maintainers; [ sikmir ]; + platforms = platforms.unix; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index ad28e6378f40..f80ac0ed9cb4 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -10025,6 +10025,8 @@ with pkgs; pagmo2 = callPackage ../development/libraries/pagmo2 { }; + paho-mqtt-c = callPackage ../development/libraries/paho-mqtt-c { }; + pakcs = callPackage ../development/compilers/pakcs { # Doesn't compile with GHC 9.0 due to whitespace syntax changes # see also https://github.com/NixOS/nixpkgs/issues/166108 From 34a34da2c7c7a3f87694c13dc6267e4ba6e199e4 Mon Sep 17 00:00:00 2001 From: Nikolay Korotkiy Date: Tue, 4 Oct 2022 11:59:17 +0300 Subject: [PATCH 13/23] paho-mqtt-cpp: init at 1.2.0 --- .../libraries/paho-mqtt-cpp/default.nix | 25 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 27 insertions(+) create mode 100644 pkgs/development/libraries/paho-mqtt-cpp/default.nix diff --git a/pkgs/development/libraries/paho-mqtt-cpp/default.nix b/pkgs/development/libraries/paho-mqtt-cpp/default.nix new file mode 100644 index 000000000000..b62e774ba513 --- /dev/null +++ b/pkgs/development/libraries/paho-mqtt-cpp/default.nix @@ -0,0 +1,25 @@ +{ lib, stdenv, fetchFromGitHub, cmake, openssl, paho-mqtt-c }: + +stdenv.mkDerivation rec { + pname = "paho.mqtt.cpp"; + version = "1.2.0"; + + src = fetchFromGitHub { + owner = "eclipse"; + repo = "paho.mqtt.cpp"; + rev = "v${version}"; + hash = "sha256-tcq0a4X5dKE4rnczRMAVe3Wt43YzUKbxsv9Sk+q+IB8="; + }; + + nativeBuildInputs = [ cmake ]; + + buildInputs = [ openssl paho-mqtt-c ]; + + meta = with lib; { + description = "Eclipse Paho MQTT C++ Client Library"; + homepage = "https://www.eclipse.org/paho/"; + license = licenses.epl10; + maintainers = with maintainers; [ sikmir ]; + platforms = platforms.unix; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index f80ac0ed9cb4..feaaf8b56a3e 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -10027,6 +10027,8 @@ with pkgs; paho-mqtt-c = callPackage ../development/libraries/paho-mqtt-c { }; + paho-mqtt-cpp = callPackage ../development/libraries/paho-mqtt-cpp { }; + pakcs = callPackage ../development/compilers/pakcs { # Doesn't compile with GHC 9.0 due to whitespace syntax changes # see also https://github.com/NixOS/nixpkgs/issues/166108 From abdcfec3a0ebe00a8fd2b3689bd8b2f3920886eb Mon Sep 17 00:00:00 2001 From: Izorkin Date: Tue, 13 Sep 2022 14:12:19 +0300 Subject: [PATCH 14/23] nixos/peertube: add nginx configuration --- nixos/modules/services/web-apps/peertube.nix | 288 ++++++++++++++++++- 1 file changed, 285 insertions(+), 3 deletions(-) diff --git a/nixos/modules/services/web-apps/peertube.nix b/nixos/modules/services/web-apps/peertube.nix index 1ac6c15dace9..a42d1a1a932e 100644 --- a/nixos/modules/services/web-apps/peertube.nix +++ b/nixos/modules/services/web-apps/peertube.nix @@ -67,6 +67,12 @@ let node ~/dist/server/tools/peertube.js $@ ''; + nginxCommonHeaders = '' + add_header Access-Control-Allow-Origin '*'; + add_header Access-Control-Allow-Methods 'GET, OPTIONS'; + add_header Access-Control-Allow-Headers 'Range,DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type'; + ''; + in { options.services.peertube = { enable = lib.mkEnableOption (lib.mdDoc "Enable Peertube’s service"); @@ -145,6 +151,12 @@ in { description = lib.mdDoc "Configuration for peertube."; }; + configureNginx = lib.mkOption { + type = lib.types.bool; + default = false; + description = lib.mdDoc "Configure nginx as a reverse proxy for peertube."; + }; + database = { createLocally = lib.mkOption { type = lib.types.bool; @@ -351,6 +363,8 @@ in { systemd.tmpfiles.rules = [ "d '/var/lib/peertube/config' 0700 ${cfg.user} ${cfg.group} - -" "z '/var/lib/peertube/config' 0700 ${cfg.user} ${cfg.group} - -" + "d '/var/lib/peertube/www' 0750 ${cfg.user} ${cfg.group} - -" + "z '/var/lib/peertube/www' 0750 ${cfg.user} ${cfg.group} - -" ]; systemd.services.peertube-init-db = lib.mkIf cfg.database.createLocally { @@ -410,8 +424,11 @@ in { password: '$(cat ${cfg.smtp.passwordFile})' ''} EOF - ln -sf ${cfg.package}/config/default.yaml /var/lib/peertube/config/default.yaml + umask 027 ln -sf ${configFile} /var/lib/peertube/config/production.json + ln -sf ${cfg.package}/config/default.yaml /var/lib/peertube/config/default.yaml + ln -sf ${cfg.package}/client/dist -T /var/lib/peertube/www/client + ln -sf ${cfg.settings.storage.client_overrides} -T /var/lib/peertube/www/client-overrides npm start ''; serviceConfig = { @@ -441,6 +458,269 @@ in { } // cfgService; }; + services.nginx = lib.mkIf cfg.configureNginx { + enable = true; + virtualHosts."${cfg.localDomain}" = { + root = "/var/lib/peertube"; + + # Application + locations."/" = { + tryFiles = "/dev/null @api"; + priority = 1110; + }; + + locations."= /api/v1/videos/upload-resumable" = { + tryFiles = "/dev/null @api"; + priority = 1120; + + extraConfig = '' + client_max_body_size 0; + proxy_request_buffering off; + ''; + }; + + locations."~ ^/api/v1/videos/(upload|([^/]+/studio/edit))$" = { + tryFiles = "/dev/null @api"; + root = cfg.settings.storage.tmp; + priority = 1130; + + extraConfig = '' + client_max_body_size 12G; + add_header X-File-Maximum-Size 8G always; + ''; + }; + + locations."~ ^/api/v1/(videos|video-playlists|video-channels|users/me)" = { + tryFiles = "/dev/null @api"; + priority = 1140; + + extraConfig = '' + client_max_body_size 6M; + add_header X-File-Maximum-Size 4M always; + ''; + }; + + locations."@api" = { + proxyPass = "http://127.0.0.1:${toString cfg.listenHttp}"; + priority = 1150; + + extraConfig = '' + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header Host $host; + proxy_set_header X-Real-IP $remote_addr; + + proxy_connect_timeout 10m; + + proxy_send_timeout 10m; + proxy_read_timeout 10m; + + client_max_body_size 100k; + send_timeout 10m; + ''; + }; + + # Websocket + locations."/socket.io" = { + tryFiles = "/dev/null @api_websocket"; + priority = 1210; + }; + + locations."/tracker/socket" = { + tryFiles = "/dev/null @api_websocket"; + priority = 1220; + + extraConfig = '' + proxy_read_timeout 15m; + ''; + }; + + locations."@api_websocket" = { + proxyPass = "http://127.0.0.1:${toString cfg.listenHttp}"; + priority = 1230; + + extraConfig = '' + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + proxy_set_header Host $host; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header Upgrade $http_upgrade; + proxy_set_header Connection 'upgrade'; + + proxy_http_version 1.1; + ''; + }; + + # Bypass PeerTube for performance reasons. + locations."~ ^/client/(assets/images/(icons/icon-36x36\.png|icons/icon-48x48\.png|icons/icon-72x72\.png|icons/icon-96x96\.png|icons/icon-144x144\.png|icons/icon-192x192\.png|icons/icon-512x512\.png|logo\.svg|favicon\.png|default-playlist\.jpg|default-avatar-account\.png|default-avatar-account-48x48\.png|default-avatar-video-channel\.png|default-avatar-video-channel-48x48\.png))$" = { + tryFiles = "/www/client-overrides/$1 /www/client/$1 $1"; + priority = 1310; + }; + + locations."~ ^/client/(.*\.(js|css|png|svg|woff2|otf|ttf|woff|eot))$" = { + alias = "${cfg.package}/client/dist/$1"; + priority = 1320; + extraConfig = '' + add_header Cache-Control 'public, max-age=604800, immutable'; + ''; + }; + + locations."~ ^/lazy-static/(avatars|banners)/" = { + tryFiles = "$uri @api"; + root = cfg.settings.storage.avatars; + priority = 1330; + extraConfig = '' + if ($request_method = 'OPTIONS') { + ${nginxCommonHeaders} + add_header Access-Control-Max-Age 1728000; + add_header Cache-Control 'no-cache'; + add_header Content-Type 'text/plain charset=UTF-8'; + add_header Content-Length 0; + return 204; + } + + ${nginxCommonHeaders} + add_header Cache-Control 'public, max-age=7200'; + + rewrite ^/lazy-static/avatars/(.*)$ /$1 break; + rewrite ^/lazy-static/banners/(.*)$ /$1 break; + ''; + }; + + locations."^~ /lazy-static/previews/" = { + tryFiles = "$uri @api"; + root = cfg.settings.storage.previews; + priority = 1340; + extraConfig = '' + if ($request_method = 'OPTIONS') { + ${nginxCommonHeaders} + add_header Access-Control-Max-Age 1728000; + add_header Cache-Control 'no-cache'; + add_header Content-Type 'text/plain charset=UTF-8'; + add_header Content-Length 0; + return 204; + } + + ${nginxCommonHeaders} + add_header Cache-Control 'public, max-age=7200'; + + rewrite ^/lazy-static/previews/(.*)$ /$1 break; + ''; + }; + + locations."^~ /static/thumbnails/" = { + tryFiles = "$uri @api"; + root = cfg.settings.storage.thumbnails; + priority = 1350; + extraConfig = '' + if ($request_method = 'OPTIONS') { + ${nginxCommonHeaders} + add_header Access-Control-Max-Age 1728000; + add_header Cache-Control 'no-cache'; + add_header Content-Type 'text/plain charset=UTF-8'; + add_header Content-Length 0; + return 204; + } + + ${nginxCommonHeaders} + add_header Cache-Control 'public, max-age=7200'; + + rewrite ^/static/thumbnails/(.*)$ /$1 break; + ''; + }; + + locations."^~ /static/redundancy/" = { + tryFiles = "$uri @api"; + root = cfg.settings.storage.redundancy; + priority = 1360; + extraConfig = '' + if ($request_method = 'OPTIONS') { + ${nginxCommonHeaders} + add_header Access-Control-Max-Age 1728000; + add_header Content-Type 'text/plain charset=UTF-8'; + add_header Content-Length 0; + return 204; + } + if ($request_method = 'GET') { + ${nginxCommonHeaders} + + access_log off; + } + aio threads; + sendfile on; + sendfile_max_chunk 1M; + + limit_rate_after 5M; + + set $peertube_limit_rate 800k; + set $limit_rate $peertube_limit_rate; + + rewrite ^/static/redundancy/(.*)$ /$1 break; + ''; + }; + + locations."^~ /static/streaming-playlists/" = { + tryFiles = "$uri @api"; + root = cfg.settings.storage.streaming_playlists; + priority = 1370; + extraConfig = '' + if ($request_method = 'OPTIONS') { + ${nginxCommonHeaders} + add_header Access-Control-Max-Age 1728000; + add_header Content-Type 'text/plain charset=UTF-8'; + add_header Content-Length 0; + return 204; + } + if ($request_method = 'GET') { + ${nginxCommonHeaders} + + access_log off; + } + + aio threads; + sendfile on; + sendfile_max_chunk 1M; + + limit_rate_after 5M; + + set $peertube_limit_rate 5M; + set $limit_rate $peertube_limit_rate; + + rewrite ^/static/streaming-playlists/(.*)$ /$1 break; + ''; + }; + + locations."~ ^/static/webseed/" = { + tryFiles = "$uri @api"; + root = cfg.settings.storage.videos; + priority = 1380; + extraConfig = '' + if ($request_method = 'OPTIONS') { + ${nginxCommonHeaders} + add_header Access-Control-Max-Age 1728000; + add_header Content-Type 'text/plain charset=UTF-8'; + add_header Content-Length 0; + return 204; + } + if ($request_method = 'GET') { + ${nginxCommonHeaders} + + access_log off; + } + + aio threads; + sendfile on; + sendfile_max_chunk 1M; + + limit_rate_after 5M; + + set $peertube_limit_rate 800k; + set $limit_rate $peertube_limit_rate; + + rewrite ^/static/webseed/(.*)$ /$1 break; + ''; + }; + }; + }; + services.postgresql = lib.mkIf cfg.database.createLocally { enable = true; }; @@ -476,8 +756,10 @@ in { (lib.mkIf cfg.redis.enableUnixSocket {${config.services.peertube.user}.extraGroups = [ "redis-peertube" ];}) ]; - users.groups = lib.optionalAttrs (cfg.group == "peertube") { - peertube = { }; + users.groups = { + ${cfg.group} = { + members = lib.optional cfg.configureNginx config.services.nginx.user; + }; }; }; } From 1a73877305f32ff158173878dda6b86f378ff3c8 Mon Sep 17 00:00:00 2001 From: Dave Nicponski Date: Wed, 12 Oct 2022 19:47:36 -0400 Subject: [PATCH 15/23] Tweak nginx config for Let's Encrypt ACME challenges MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Currently, this is using a "URI prefix match", but per nginx docs, ``` [...] the location with the longest matching prefix is selected and remembered. Then regular expressions are checked, in the order of their appearance in the configuration file. The search of regular expressions terminates on the first match, and the corresponding configuration is used. If no match with a regular expression is found then the configuration of the prefix location remembered earlier is used. ``` which means a config like this (from wordpress service) will override that ``` locations = { "~ /\\." = { priority = 800; extraConfig = "deny all;"; }; }; ``` 😱 Luckily, from nginx docs: ``` If the longest matching prefix location has the “^~” modifier then regular expressions are not checked. ``` Whew! --- nixos/modules/services/web-servers/nginx/default.nix | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/nixos/modules/services/web-servers/nginx/default.nix b/nixos/modules/services/web-servers/nginx/default.nix index aa782b4267e8..9cbac370612f 100644 --- a/nixos/modules/services/web-servers/nginx/default.nix +++ b/nixos/modules/services/web-servers/nginx/default.nix @@ -275,7 +275,10 @@ let redirectListen = filter (x: !x.ssl) defaultListen; acmeLocation = optionalString (vhost.enableACME || vhost.useACMEHost != null) '' - location /.well-known/acme-challenge { + # Rule for legitimate ACME Challenge requests (like /.well-known/acme-challenge/xxxxxxxxx) + # We use ^~ here, so that we don't check any regexes (which could + # otherwise easily override this intended match accidentally). + location ^~ /.well-known/acme-challenge/ { ${optionalString (vhost.acmeFallbackHost != null) "try_files $uri @acme-fallback;"} ${optionalString (vhost.acmeRoot != null) "root ${vhost.acmeRoot};"} auth_basic off; From b12821971d907a8789af1382e54716163e250fb7 Mon Sep 17 00:00:00 2001 From: figsoda Date: Thu, 20 Oct 2022 16:39:09 -0400 Subject: [PATCH 16/23] felix-fm: 1.3.0 -> 1.3.1 --- pkgs/applications/file-managers/felix-fm/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/applications/file-managers/felix-fm/default.nix b/pkgs/applications/file-managers/felix-fm/default.nix index 104cb9d9367e..0209a72cce25 100644 --- a/pkgs/applications/file-managers/felix-fm/default.nix +++ b/pkgs/applications/file-managers/felix-fm/default.nix @@ -2,16 +2,16 @@ rustPlatform.buildRustPackage rec { pname = "felix"; - version = "1.3.0"; + version = "1.3.1"; src = fetchFromGitHub { owner = "kyoheiu"; repo = pname; rev = "v${version}"; - sha256 = "sha256-ewPDbrOxinu+GXegunZjumTCnkflXQk74Ovr8QStDBM="; + sha256 = "sha256-yMuV7a8nkdymgJTPuVcZ/PEA2/Vr7rQf8mpikNe3e1w="; }; - cargoSha256 = "sha256-wD0h8tXnqQOuBbFmpjMu0ZK7+omcOSqno6wFnSMTSjk="; + cargoSha256 = "sha256-yePPIehyv11f58HQzFoPh7izSPjmbhdVu9xlHD6PGRY="; checkInputs = [ zoxide ]; From 02ff423121c4a3dc62edc4c51b2a48f03e95598f Mon Sep 17 00:00:00 2001 From: Alexis Praga Date: Sat, 13 Aug 2022 16:49:20 +0000 Subject: [PATCH 17/23] bioextalign: init at 1.5.1 Part of BioPerl Extensions (BioPerl-Ext) distribution, a collection of Bioperl C-compiled extensions. These are no longer maintained but needed for Ensembl-VEP (annotation for genomics). Co-authored-by: Sandro --- .../perl-modules/Bio-Ext-Align/default.nix | 36 +++++++++++++++++++ .../perl-modules/Bio-Ext-Align/fprintf.patch | 13 +++++++ pkgs/top-level/perl-packages.nix | 2 ++ 3 files changed, 51 insertions(+) create mode 100644 pkgs/development/perl-modules/Bio-Ext-Align/default.nix create mode 100644 pkgs/development/perl-modules/Bio-Ext-Align/fprintf.patch diff --git a/pkgs/development/perl-modules/Bio-Ext-Align/default.nix b/pkgs/development/perl-modules/Bio-Ext-Align/default.nix new file mode 100644 index 000000000000..237a4be03614 --- /dev/null +++ b/pkgs/development/perl-modules/Bio-Ext-Align/default.nix @@ -0,0 +1,36 @@ +{ lib, buildPerlPackage, fetchFromGitHub }: + +buildPerlPackage rec { + pname = "BioExtAlign"; + version = "1.5.1"; + + outputs = [ "out" "dev" ]; + + src = fetchFromGitHub { + owner = "bioperl"; + repo = "bioperl-ext"; + rev = "bioperl-ext-release-${lib.replaceStrings ["."] ["-"] version}"; + sha256 = "sha256-+0tZ6q3PFem8DWa2vq+njOLmjDvMB0JhD0FGk00lVMA="; + }; + + patches = [ ./fprintf.patch ]; + + # Do not install other Bio-ext packages + preConfigure = '' + cd Bio/Ext/Align + ''; + + # Disable tests as it requires Bio::Tools::Align which is in a different directory + buildPhase = '' + make + ''; + + meta = { + homepage = "https://github.com/bioperl/bioperl-ext"; + description = "Write Perl Subroutines in Other Programming Languages"; + longDescription = '' + Part of BioPerl Extensions (BioPerl-Ext) distribution, a collection of Bioperl C-compiled extensions. + ''; + license = with lib.licenses; [ artistic1 ]; + }; +} diff --git a/pkgs/development/perl-modules/Bio-Ext-Align/fprintf.patch b/pkgs/development/perl-modules/Bio-Ext-Align/fprintf.patch new file mode 100644 index 000000000000..f62004a9a338 --- /dev/null +++ b/pkgs/development/perl-modules/Bio-Ext-Align/fprintf.patch @@ -0,0 +1,13 @@ +diff --git a/libs/dpalign.c b/libs/dpalign.c +index 0e07b67..0eab932 100644 +--- a/Bio/Ext/Align/libs/dpalign.c ++++ b/Bio/Ext/Align/libs/dpalign.c +@@ -40,7 +40,7 @@ int blosum62[24][24] = { + void + dpAlign_fatal(char * s) + { +- fprintf(stderr, s); ++ fputs(stderr, s); + exit(-1); + } + diff --git a/pkgs/top-level/perl-packages.nix b/pkgs/top-level/perl-packages.nix index 73a753bae296..f71f736a697c 100644 --- a/pkgs/top-level/perl-packages.nix +++ b/pkgs/top-level/perl-packages.nix @@ -1594,6 +1594,8 @@ let }; }; + BioExtAlign = callPackage ../development/perl-modules/Bio-Ext-Align { }; + BioPerl = buildPerlPackage { pname = "BioPerl"; version = "1.7.8"; From e9b1dbb4b5f45ea3e05a3f629d6a623175a57566 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Sandro=20J=C3=A4ckel?= Date: Fri, 21 Oct 2022 19:32:14 +0200 Subject: [PATCH 18/23] mdcat: 0.28.0 -> 0.29.0 --- pkgs/tools/text/mdcat/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/tools/text/mdcat/default.nix b/pkgs/tools/text/mdcat/default.nix index 0b2a4acd0b59..cc46a5acf5f9 100644 --- a/pkgs/tools/text/mdcat/default.nix +++ b/pkgs/tools/text/mdcat/default.nix @@ -12,20 +12,20 @@ rustPlatform.buildRustPackage rec { pname = "mdcat"; - version = "0.28.0"; + version = "0.29.0"; src = fetchFromGitHub { owner = "lunaryorn"; repo = "mdcat"; rev = "mdcat-${version}"; - sha256 = "sha256-l64gRoWYYLbPA0n6vNQf14CCUtnkfMnQdqbetIbWvBU="; + sha256 = "sha256-Fh2OVb4d6WHuoJM503jaN9lan/JCrxMXZjCVpvuYbRQ="; }; nativeBuildInputs = [ pkg-config asciidoctor installShellFiles ]; buildInputs = [ openssl ] ++ lib.optional stdenv.isDarwin Security; - cargoSha256 = "sha256-MCldDRleFfl4UrITuMEmLo0JyR+eoi6S6zGvFOMnIBE="; + cargoSha256 = "sha256-ZwJX+kXpj6nARFDx/+LsHWLzMUGBYJvM0DA0+WZukpI="; checkInputs = [ ansi2html ]; # Skip tests that use the network and that include files. From 177e532253560cb71d992b1eec418ecc00f6b23b Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Sandro=20J=C3=A4ckel?= Date: Fri, 21 Oct 2022 20:09:35 +0200 Subject: [PATCH 19/23] playwright.browsers: fix build --- pkgs/development/python-modules/playwright/default.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/development/python-modules/playwright/default.nix b/pkgs/development/python-modules/playwright/default.nix index cea762819573..24c5107f83de 100644 --- a/pkgs/development/python-modules/playwright/default.nix +++ b/pkgs/development/python-modules/playwright/default.nix @@ -114,7 +114,7 @@ let jq ]; } ('' - BROWSERS_JSON=${driver}/share/playwright-driver/package/browsers.json + BROWSERS_JSON=${driver}/package/browsers.json '' + lib.optionalString withChromium '' CHROMIUM_REVISION=$(jq -r '.browsers[] | select(.name == "chromium").revision' $BROWSERS_JSON) mkdir -p $out/chromium-$CHROMIUM_REVISION/chrome-linux From aa00343cbce0170993db248f9c837131a227dcd4 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Sandro=20J=C3=A4ckel?= Date: Fri, 21 Oct 2022 20:20:05 +0200 Subject: [PATCH 20/23] python310Packages.playwright: test driver,browsers with ofborg --- pkgs/development/python-modules/playwright/default.nix | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/pkgs/development/python-modules/playwright/default.nix b/pkgs/development/python-modules/playwright/default.nix index 24c5107f83de..3852bb3c5e90 100644 --- a/pkgs/development/python-modules/playwright/default.nix +++ b/pkgs/development/python-modules/playwright/default.nix @@ -200,7 +200,7 @@ buildPythonPackage rec { "playwright" ]; - passthru = { + passthru = rec { inherit driver; browsers = { x86_64-linux = browsers-linux { }; @@ -210,6 +210,10 @@ buildPythonPackage rec { }.${system} or throwSystem; browsers-chromium = browsers-linux { withFirefox = false; }; browsers-firefox = browsers-linux { withChromium = false; }; + + tests = { + inherit driver browsers; + }; }; meta = with lib; { From 688794c4ca9f87919c397d67789b086102e2e7ca Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Sandro=20J=C3=A4ckel?= Date: Fri, 21 Oct 2022 23:20:40 +0200 Subject: [PATCH 21/23] python310Packages.playwright: fix x86_64-darwin hash --- pkgs/development/python-modules/playwright/default.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/development/python-modules/playwright/default.nix b/pkgs/development/python-modules/playwright/default.nix index 3852bb3c5e90..d9adb09e0db1 100644 --- a/pkgs/development/python-modules/playwright/default.nix +++ b/pkgs/development/python-modules/playwright/default.nix @@ -43,7 +43,7 @@ let sha256 = { x86_64-linux = "0x71b4kb8hlyacixipgfbgjgrbmhckxpbmrs2xk8iis7n5kg7539"; aarch64-linux = "125lih7g2gj91k7j196wy5a5746wyfr8idj3ng369yh5wl7lfcfv"; - x86_64-darwin = "0z2kww4iby1izkwn6z2ai94y87bkjvwak8awdmjm8sgg00pa9l1a"; + x86_64-darwin = "sha256-TzprR95KHYBu9SruI4BgwCaqI7KKe3HuzgCO1A5YFiM="; aarch64-darwin = "0qajh4ac5lr1sznb2c471r5c5g2r0dk2pyqz8vhvnbk36r524h1h"; }.${system} or throwSystem; }; From 4bf5284ef49a6fa9e73c58eaec0d43f7f669fa1c Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Thu, 20 Oct 2022 22:19:25 +0000 Subject: [PATCH 22/23] treesheets: unstable-2022-10-11 -> unstable-2022-10-20 --- pkgs/applications/office/treesheets/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/applications/office/treesheets/default.nix b/pkgs/applications/office/treesheets/default.nix index 6a0bb48c7ded..2920ae3ccf8c 100644 --- a/pkgs/applications/office/treesheets/default.nix +++ b/pkgs/applications/office/treesheets/default.nix @@ -12,13 +12,13 @@ stdenv.mkDerivation rec { pname = "treesheets"; - version = "unstable-2022-10-11"; + version = "unstable-2022-10-20"; src = fetchFromGitHub { owner = "aardappel"; repo = "treesheets"; - rev = "be79e537c148d961d40137a7f83d7bdcc4119dd6"; - sha256 = "GKRxb6W9PDY7nzgPTPRPmA9GBvD4zLaZwnalZan3+m0="; + rev = "12580ce39ee89f0ae6b9bdb304f7bc68a74ecdf7"; + sha256 = "Z1BAYRcoeYOWomfwgBS/CQbejARs6sqsyZorhbJ/RdI="; }; nativeBuildInputs = [ From 949be351f6200a16ef82487864bd38c7a386f979 Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Sun, 31 Jul 2022 08:58:42 +0000 Subject: [PATCH 23/23] gpsd: 3.23.1 -> 3.24 --- pkgs/servers/gpsd/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/servers/gpsd/default.nix b/pkgs/servers/gpsd/default.nix index 1327ea5d7399..d1b11dfd3d55 100644 --- a/pkgs/servers/gpsd/default.nix +++ b/pkgs/servers/gpsd/default.nix @@ -32,11 +32,11 @@ stdenv.mkDerivation rec { pname = "gpsd"; - version = "3.23.1"; + version = "3.24"; src = fetchurl { url = "mirror://savannah/${pname}/${pname}-${version}.tar.gz"; - sha256 = "sha256-C5kc6aRlOMTqRQ96juQo/0T7T41mX93y/+QP4K6abAk="; + sha256 = "sha256-AO4T9hVlUoSHSmYb4TVTq+ZhKObetc1kivm8DLNF/lw="; }; # TODO: render & install HTML documentation using asciidoctor