summaryrefslogtreecommitdiffstats
path: root/pkgs/tools
diff options
context:
space:
mode:
Diffstat (limited to 'pkgs/tools')
-rw-r--r--pkgs/tools/audio/abcmidi/default.nix4
-rw-r--r--pkgs/tools/audio/yabridge/default.nix9
-rw-r--r--pkgs/tools/misc/nurl/default.nix6
-rw-r--r--pkgs/tools/misc/plantuml/default.nix4
-rw-r--r--pkgs/tools/misc/pre-commit/default.nix3
-rw-r--r--pkgs/tools/networking/dnscrypt-proxy2/default.nix4
-rw-r--r--pkgs/tools/security/fail2ban/default.nix7
-rw-r--r--pkgs/tools/security/sequoia-chameleon-gnupg/default.nix22
-rw-r--r--pkgs/tools/text/mdbook-emojicodes/default.nix31
-rw-r--r--pkgs/tools/virtualization/multipass/default.nix128
10 files changed, 203 insertions, 15 deletions
diff --git a/pkgs/tools/audio/abcmidi/default.nix b/pkgs/tools/audio/abcmidi/default.nix
index fce137cf3b46..4eafd324deb7 100644
--- a/pkgs/tools/audio/abcmidi/default.nix
+++ b/pkgs/tools/audio/abcmidi/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "abcMIDI";
- version = "2023.01.08";
+ version = "2023.01.21";
src = fetchzip {
url = "https://ifdo.ca/~seymour/runabc/${pname}-${version}.zip";
- hash = "sha256-PUaGjZFMYwG9BduIgmzhi5DTkGfSN9VtAUkqrAZ2xbo=";
+ hash = "sha256-BantnVvIGJ3BKAKjK/6JQS1Kk1E8PDJFP/WuOjYbSy8=";
};
meta = with lib; {
diff --git a/pkgs/tools/audio/yabridge/default.nix b/pkgs/tools/audio/yabridge/default.nix
index 60af9b430a94..9de97fe52f48 100644
--- a/pkgs/tools/audio/yabridge/default.nix
+++ b/pkgs/tools/audio/yabridge/default.nix
@@ -3,6 +3,7 @@
, fetchFromGitHub
, substituteAll
, pkgsi686Linux
+, fetchpatch
, dbus
, meson
, ninja
@@ -103,6 +104,14 @@ in multiStdenv.mkDerivation rec {
# Patch the chainloader to search for libyabridge through NIX_PROFILES
./libyabridge-from-nix-profiles.patch
+
+ # Remove with next yabridge update
+ (fetchpatch {
+ name = "fix-for-wine-8.0.patch";
+ url = "https://github.com/robbert-vdh/yabridge/commit/29acd40a9add635e2cb40ecc54c88d65604a7a2a.patch";
+ sha256 = "sha256-hVxa/FqH7d938Z/VjHdhmYLCLPZoa9C4xKSKRKiVPSU=";
+ includes = [ "meson.build" ];
+ })
];
postPatch = ''
diff --git a/pkgs/tools/misc/nurl/default.nix b/pkgs/tools/misc/nurl/default.nix
index 9154c1eabbe3..4a6cb10b6031 100644
--- a/pkgs/tools/misc/nurl/default.nix
+++ b/pkgs/tools/misc/nurl/default.nix
@@ -12,16 +12,16 @@
rustPlatform.buildRustPackage rec {
pname = "nurl";
- version = "0.3.6";
+ version = "0.3.7";
src = fetchFromGitHub {
owner = "nix-community";
repo = "nurl";
rev = "v${version}";
- hash = "sha256-AJHmHTkKHd99GCBlVv2t8Q9kUlCtOcK+ukYzEs5U3S4=";
+ hash = "sha256-TtH0sfWFWe3oYK/8jJslqjrEY5rR7HGAVDD5iQ2+spY=";
};
- cargoSha256 = "sha256-0QUuYNzKN8dbGiJq2JxElR39zIlqvHXjPzT1dGc6cRM=";
+ cargoSha256 = "sha256-vwLlqRjiJU3ecLURAZabmIBivYW1zAfMLUhaJzh57ig=";
nativeBuildInputs = [
installShellFiles
diff --git a/pkgs/tools/misc/plantuml/default.nix b/pkgs/tools/misc/plantuml/default.nix
index 6b3f42e377ef..a016fb08e3eb 100644
--- a/pkgs/tools/misc/plantuml/default.nix
+++ b/pkgs/tools/misc/plantuml/default.nix
@@ -1,12 +1,12 @@
{ lib, stdenv, fetchurl, makeWrapper, jre, graphviz }:
stdenv.mkDerivation rec {
- version = "1.2023.0";
+ version = "1.2023.1";
pname = "plantuml";
src = fetchurl {
url = "https://github.com/plantuml/plantuml/releases/download/v${version}/plantuml-pdf-${version}.jar";
- sha256 = "sha256-1hP+HJCI1HCqd0qJCthac7cMiEnyUPz1M7fvF8AXh08=";
+ sha256 = "sha256-ObNiuD0le5FOEGvaIr3jl+Lix74Xvpso/YIqyHGGHAs=";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/pkgs/tools/misc/pre-commit/default.nix b/pkgs/tools/misc/pre-commit/default.nix
index 8adb5a02f8c1..593ff2c68bd0 100644
--- a/pkgs/tools/misc/pre-commit/default.nix
+++ b/pkgs/tools/misc/pre-commit/default.nix
@@ -61,7 +61,8 @@ buildPythonPackage rec {
libiconv
];
- doCheck = true;
+ # i686-linux: dotnet-sdk not available
+ doCheck = stdenv.buildPlatform.system != "i686-linux";
postPatch = ''
substituteInPlace pre_commit/resources/hook-tmpl \
diff --git a/pkgs/tools/networking/dnscrypt-proxy2/default.nix b/pkgs/tools/networking/dnscrypt-proxy2/default.nix
index b2cb534de40d..b0f03c093202 100644
--- a/pkgs/tools/networking/dnscrypt-proxy2/default.nix
+++ b/pkgs/tools/networking/dnscrypt-proxy2/default.nix
@@ -2,7 +2,7 @@
buildGoModule rec {
pname = "dnscrypt-proxy2";
- version = "2.1.2";
+ version = "2.1.3";
vendorSha256 = null;
@@ -12,7 +12,7 @@ buildGoModule rec {
owner = "DNSCrypt";
repo = "dnscrypt-proxy";
rev = version;
- sha256 = "sha256-vFUbsgLgwQGb/2rValFRuZXguxyAJzOBMLnbVs0swes=";
+ sha256 = "sha256-5wfxjx8SxynY6DpPIvOLwSsBdM/0zSzfaVDQTI/RUD0=";
};
meta = with lib; {
diff --git a/pkgs/tools/security/fail2ban/default.nix b/pkgs/tools/security/fail2ban/default.nix
index 459f9f12c1ea..daa0e8471158 100644
--- a/pkgs/tools/security/fail2ban/default.nix
+++ b/pkgs/tools/security/fail2ban/default.nix
@@ -1,6 +1,7 @@
{ lib, stdenv, fetchFromGitHub
, python3
, fetchpatch
+, installShellFiles
}:
python3.pkgs.buildPythonApplication rec {
@@ -14,6 +15,10 @@ python3.pkgs.buildPythonApplication rec {
sha256 = "q4U9iWCa1zg8sA+6pPNejt6v/41WGIKN5wITJCrCqQE=";
};
+ outputs = [ "out" "man" ];
+
+ nativeBuildInputs = [ installShellFiles ];
+
pythonPath = with python3.pkgs;
lib.optionals stdenv.isLinux [
systemd
@@ -71,6 +76,8 @@ python3.pkgs.buildPythonApplication rec {
''
# see https://github.com/NixOS/nixpkgs/issues/4968
rm -r "${sitePackages}/etc"
+
+ installManPage man/*.[1-9]
'' + lib.optionalString stdenv.isLinux ''
# see https://github.com/NixOS/nixpkgs/issues/4968
rm -r "${sitePackages}/usr"
diff --git a/pkgs/tools/security/sequoia-chameleon-gnupg/default.nix b/pkgs/tools/security/sequoia-chameleon-gnupg/default.nix
index c83c7fb4cfe3..345e36756f66 100644
--- a/pkgs/tools/security/sequoia-chameleon-gnupg/default.nix
+++ b/pkgs/tools/security/sequoia-chameleon-gnupg/default.nix
@@ -1,25 +1,37 @@
{ lib
+, stdenv
, rustPlatform
, fetchFromGitLab
, pkg-config
, nettle
+, openssl
+, darwin
}:
rustPlatform.buildRustPackage rec {
pname = "sequoia-chameleon-gnupg";
- version = "0.1.1";
+ version = "0.2.0";
src = fetchFromGitLab {
owner = "sequoia-pgp";
repo = pname;
rev = "v${version}";
- hash = "sha256-liQNz833/3hi3eMi+/iEZ8fT9FFi+MrDIYbQD+dQ/p0=";
+ hash = "sha256-8aKT39gq6o7dnbhKbDxewd4R2e2IsbYU8vaDwYemes8=";
};
- cargoHash = "sha256-bnScLSI94obYQH5YzoHY4DtGScKc4m24+SIg1d2kAKw=";
+ cargoHash = "sha256-Z6cXCHLrK+BcIeVCKH2l8n9SivZsZPhXGhaMObn6rjo=";
- nativeBuildInputs = [ rustPlatform.bindgenHook pkg-config ];
- buildInputs = [ nettle ];
+ nativeBuildInputs = [
+ rustPlatform.bindgenHook
+ pkg-config
+ ];
+
+ buildInputs = [
+ nettle
+ openssl
+ ] ++ lib.optionals stdenv.isDarwin [
+ darwin.apple_sdk.frameworks.Security
+ ];
# gpgconf: error creating socket directory
doCheck = false;
diff --git a/pkgs/tools/text/mdbook-emojicodes/default.nix b/pkgs/tools/text/mdbook-emojicodes/default.nix
new file mode 100644
index 000000000000..01ce8fb3e9db
--- /dev/null
+++ b/pkgs/tools/text/mdbook-emojicodes/default.nix
@@ -0,0 +1,31 @@
+{ lib
+, rustPlatform
+, fetchFromGitHub
+, stdenv
+, darwin
+}:
+
+rustPlatform.buildRustPackage rec {
+ pname = "mdbook-emojicodes";
+ version = "0.1.3";
+
+ src = fetchFromGitHub {
+ owner = "blyxyas";
+ repo = "mdbook-emojicodes";
+ rev = "${version}.1";
+ hash = "sha256-SWT01R/+FuzkkOUd/2wpRo0HIaPEtzDelTSh7ewo9gQ=";
+ };
+
+ cargoHash = "sha256-z9UKBBCr8R1I9k48JsEBnVokQDfaj9lt+qfIUvJ/5lE=";
+
+ buildInputs = lib.optionals stdenv.isDarwin [
+ darwin.apple_sdk.frameworks.CoreFoundation
+ ];
+
+ meta = with lib; {
+ description = "MDBook preprocessor for converting emojicodes (e.g. `: cat :`) into emojis 🐱";
+ homepage = "https://github.com/blyxyas/mdbook-emojicodes";
+ license = licenses.mit;
+ maintainers = with maintainers; [ blaggacao ];
+ };
+}
diff --git a/pkgs/tools/virtualization/multipass/default.nix b/pkgs/tools/virtualization/multipass/default.nix
new file mode 100644
index 000000000000..d8d003b2064f
--- /dev/null
+++ b/pkgs/tools/virtualization/multipass/default.nix
@@ -0,0 +1,128 @@
+{ cmake
+, dnsmasq
+, fetchFromGitHub
+, git
+, gtest
+, iproute2
+, iptables
+, lib
+, libapparmor
+, libvirt
+, libxml2
+, nixosTests
+, openssl
+, OVMF
+, pkg-config
+, qemu
+, qemu-utils
+, qtbase
+, qtx11extras
+, slang
+, stdenv
+, wrapQtAppsHook
+, xterm
+}:
+
+let
+ pname = "multipass";
+ version = "1.11.0";
+in
+stdenv.mkDerivation {
+ inherit pname version;
+
+ src = fetchFromGitHub {
+ owner = "canonical";
+ repo = "multipass";
+ rev = "refs/tags/v${version}";
+ sha256 = "sha256-2d8piIIecoSI3BfOgAVlXl5P2UYDaNlxUgHXWbnSdkg=";
+ fetchSubmodules = true;
+ };
+
+ preConfigure = ''
+ substituteInPlace ./CMakeLists.txt \
+ --replace "determine_version(MULTIPASS_VERSION)" "" \
+ --replace 'set(MULTIPASS_VERSION ''${MULTIPASS_VERSION})' 'set(MULTIPASS_VERSION "v${version}")'
+
+ substituteInPlace ./src/platform/backends/qemu/linux/qemu_platform_detail_linux.cpp \
+ --replace "OVMF.fd" "${OVMF.fd}/FV/OVMF.fd" \
+ --replace "QEMU_EFI.fd" "${OVMF.fd}/FV/QEMU_EFI.fd"
+ '';
+
+ postPatch = ''
+ # Patch all of the places where Multipass expects the LXD socket to be provided by a snap
+ substituteInPlace ./src/network/network_access_manager.cpp \
+ --replace "/var/snap/lxd/common/lxd/unix.socket" "/var/lib/lxd/unix.socket"
+
+ substituteInPlace ./src/platform/backends/lxd/lxd_virtual_machine.cpp \
+ --replace "/var/snap/lxd/common/lxd/unix.socket" "/var/lib/lxd/unix.socket"
+
+ substituteInPlace ./src/platform/backends/lxd/lxd_request.h \
+ --replace "/var/snap/lxd/common/lxd/unix.socket" "/var/lib/lxd/unix.socket"
+
+ substituteInPlace ./tests/CMakeLists.txt \
+ --replace "FetchContent_MakeAvailable(googletest)" ""
+
+ cat >> tests/CMakeLists.txt <<'EOF'
+ add_library(gtest INTERFACE)
+ target_include_directories(gtest INTERFACE ${gtest.dev}/include)
+ target_link_libraries(gtest INTERFACE ${gtest}/lib/libgtest.so ''${CMAKE_THREAD_LIBS_INIT})
+ add_dependencies(gtest GMock)
+
+ add_library(gtest_main INTERFACE)
+ target_include_directories(gtest_main INTERFACE ${gtest.dev}/include)
+ target_link_libraries(gtest_main INTERFACE ${gtest}/lib/libgtest_main.so gtest)
+
+ add_library(gmock INTERFACE)
+ target_include_directories(gmock INTERFACE ${gtest.dev}/include)
+ target_link_libraries(gmock INTERFACE ${gtest}/lib/libgmock.so gtest)
+
+ add_library(gmock_main INTERFACE)
+ target_include_directories(gmock_main INTERFACE ${gtest.dev}/include)
+ target_link_libraries(gmock_main INTERFACE ${gtest}/lib/libgmock_main.so gmock gtest_main)
+ EOF
+ '';
+
+ buildInputs = [
+ gtest
+ libapparmor
+ libvirt
+ libxml2
+ openssl
+ qtbase
+ qtx11extras
+ ];
+
+ nativeBuildInputs = [
+ cmake
+ git
+ pkg-config
+ slang
+ wrapQtAppsHook
+ ];
+
+ nativeCheckInputs = [ gtest ];
+
+ postInstall = ''
+ wrapProgram $out/bin/multipassd --prefix PATH : ${lib.makeBinPath [
+ dnsmasq
+ iproute2
+ iptables
+ OVMF.fd
+ qemu
+ qemu-utils
+ xterm
+ ]}
+ '';
+
+ passthru.tests = {
+ multipass = nixosTests.multipass;
+ };
+
+ meta = with lib; {
+ description = "Ubuntu VMs on demand for any workstation.";
+ homepage = "https://multipass.run";
+ license = licenses.gpl3Plus;
+ maintainers = with maintainers; [ jnsgruk ];
+ platforms = [ "x86_64-linux" ];
+ };
+}