Merge remote-tracking branch 'origin/master' into stdenv-updates.

This commit is contained in:
Peter Simons 2013-05-22 12:30:02 +02:00
commit 728e305205
1088 changed files with 7070 additions and 5845 deletions

View file

@ -568,6 +568,11 @@ nothing.</para>
<variablelist> <variablelist>
<title>Variables controlling the build phase</title> <title>Variables controlling the build phase</title>
<varlistentry>
<term><varname>dontBuild</varname></term>
<listitem><para>Set to true to skip the build phase.</para></listitem>
</varlistentry>
<varlistentry> <varlistentry>
<term><varname>makefile</varname></term> <term><varname>makefile</varname></term>
<listitem><para>The file name of the Makefile.</para></listitem> <listitem><para>The file name of the Makefile.</para></listitem>

View file

@ -20,6 +20,8 @@ stdenv.mkDerivation rec {
libxml2 mysql taglib taglib_extras loudmouth kdelibs automoc4 phonon strigi libxml2 mysql taglib taglib_extras loudmouth kdelibs automoc4 phonon strigi
soprano qca2 libmtp liblastfm libgpod pkgconfig qjson ffmpeg libofa ]; soprano qca2 libmtp liblastfm libgpod pkgconfig qjson ffmpeg libofa ];
cmakeFlags = "-DKDE4_BUILD_TESTS=OFF";
postInstall = '' postInstall = ''
mkdir -p $out/nix-support mkdir -p $out/nix-support
echo ${qtscriptgenerator} > $out/nix-support/propagated-user-env-packages echo ${qtscriptgenerator} > $out/nix-support/propagated-user-env-packages

View file

@ -0,0 +1,27 @@
diff -ru monkeys-audio-3.99-u4-b5/src/MACLib/APELink.cpp monkeys-audio-3.99-u4-b5.patched/src/MACLib/APELink.cpp
--- monkeys-audio-3.99-u4-b5/src/MACLib/APELink.cpp 2006-06-01 11:00:57.000000000 +0200
+++ monkeys-audio-3.99-u4-b5.patched/src/MACLib/APELink.cpp 2012-01-05 14:51:47.000000000 +0100
@@ -63,10 +63,10 @@
if (pData != NULL)
{
// parse out the information
- char * pHeader = strstr(pData, APE_LINK_HEADER);
- char * pImageFile = strstr(pData, APE_LINK_IMAGE_FILE_TAG);
- char * pStartBlock = strstr(pData, APE_LINK_START_BLOCK_TAG);
- char * pFinishBlock = strstr(pData, APE_LINK_FINISH_BLOCK_TAG);
+ const char * pHeader = strstr(pData, APE_LINK_HEADER);
+ const char * pImageFile = strstr(pData, APE_LINK_IMAGE_FILE_TAG);
+ const char * pStartBlock = strstr(pData, APE_LINK_START_BLOCK_TAG);
+ const char * pFinishBlock = strstr(pData, APE_LINK_FINISH_BLOCK_TAG);
if (pHeader && pImageFile && pStartBlock && pFinishBlock)
{
@@ -81,7 +81,7 @@
// get the path
char cImageFile[MAX_PATH + 1]; int nIndex = 0;
- char * pImageCharacter = &pImageFile[strlen(APE_LINK_IMAGE_FILE_TAG)];
+ const char * pImageCharacter = &pImageFile[strlen(APE_LINK_IMAGE_FILE_TAG)];
while ((*pImageCharacter != 0) && (*pImageCharacter != '\r') && (*pImageCharacter != '\n'))
cImageFile[nIndex++] = *pImageCharacter++;
cImageFile[nIndex] = 0;

View file

@ -0,0 +1,14 @@
{stdenv, fetchurl}:
stdenv.mkDerivation rec {
version = "3.99-u4-b5";
pname = "monkeys-audio";
name = pname + "-" + version;
patches = [ ./buildfix.diff ];
src = fetchurl {
url = "http://deb-multimedia.org/pool/main/m/${pname}/${pname}_${version}.orig.tar.gz";
sha256 = "0kjfwzfxfx7f958b2b1kf8yj655lp0ppmn0sh57gbkjvj8lml7nz";
};
}

View file

@ -5,12 +5,12 @@
pythonPackages.buildPythonPackage rec { pythonPackages.buildPythonPackage rec {
name = "mopidy-${version}"; name = "mopidy-${version}";
version = "0.12.0"; version = "0.14.1";
src = fetchgit { src = fetchgit {
url = "https://github.com/mopidy/mopidy.git"; url = "https://github.com/mopidy/mopidy.git";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
sha256 = "18b1gsyq1ph1a8gl6m4jmhkvq1gyyhbkbb6rrr3qr4rb5prl1fyi"; sha256 = "0lgd8dpiri9m6sigpf1g1qzvz25lkb38lskgwvb8j7x64y104z0v";
}; };
propagatedBuildInputs = with pythonPackages; [ propagatedBuildInputs = with pythonPackages; [

View file

@ -0,0 +1,59 @@
{ stdenv, fetchurl, cmake, qt4, pkgconfig, x11
# transports
, curl, libmms
# input plugins
, libmad, taglib, libvorbis, libogg, flac, libmpcdec, libmodplug, libsndfile
, libcdio, cdparanoia, libcddb, faad2, ffmpeg, wildmidi
# output plugins
, alsaLib, pulseaudio
# effect plugins
, libsamplerate
}:
# Additional plugins that can be added:
# wavpack (http://www.wavpack.com/)
# gme (Game music support)
# Ogg Opus support
# BS2B effect plugin (http://bs2b.sourceforge.net/)
# JACK audio support
# ProjectM visualization plugin
# To make MIDI work we must tell Qmmp what instrument configuration to use (and
# this can unfortunately not be set at configure time):
# Go to settings (ctrl-p), navigate to the WildMidi plugin and click on
# Preferences. In the instrument configuration field, type the path to
# /nix/store/*wildmidi*/etc/wildmidi.cfg (or your own custom cfg file).
# Qmmp installs working .desktop file(s) all by itself, so we don't need to
# handle that.
stdenv.mkDerivation rec {
name = "qmmp-0.7.0";
src = fetchurl {
url = "http://qmmp.ylsoftware.com/files/${name}.tar.bz2";
sha256 = "0g8qcs82y3dy06lsgam2w6gh2ccx0frlw9fp4xg947vi3a16g6ig";
};
buildInputs =
[ # basic requirements
cmake qt4 pkgconfig x11
# transports
curl libmms
# input plugins
libmad taglib libvorbis libogg flac libmpcdec libmodplug libsndfile
libcdio cdparanoia libcddb faad2 ffmpeg wildmidi
# output plugins
alsaLib pulseaudio
# effect plugins
libsamplerate
];
meta = with stdenv.lib; {
description = "Qt-based audio player that looks like Winamp";
homepage = http://qmmp.ylsoftware.com/;
license = licenses.gpl2;
platforms = platforms.linux;
maintainers = [maintainers.bjornfor];
};
}

View file

@ -3,7 +3,7 @@
assert stdenv.system == "i686-linux" || stdenv.system == "x86_64-linux"; assert stdenv.system == "i686-linux" || stdenv.system == "x86_64-linux";
let let
version = "0.8.8.323"; version = "0.9.0.133";
qt4webkit = qt4webkit =
if stdenv.system == "i686-linux" then if stdenv.system == "i686-linux" then
fetchurl { fetchurl {
@ -25,13 +25,13 @@ stdenv.mkDerivation {
src = src =
if stdenv.system == "i686-linux" then if stdenv.system == "i686-linux" then
fetchurl { fetchurl {
url = "http://repository.spotify.com/pool/non-free/s/spotify/spotify-client_${version}.gd143501.250-1_i386.deb"; url = "http://repository.spotify.com/pool/non-free/s/spotify/spotify-client_${version}.gd18ed58.259-1_i386.deb";
sha256 = "13q803qlvq16yrr7f95izp9mqqdb8kpcsyrb5gc5i2pya68ra906"; sha256 = "15kbwll63pm99262f7xq1z0c5bwmk5cz46pkh8xd5xsqxlsvvv1n";
} }
else if stdenv.system == "x86_64-linux" then else if stdenv.system == "x86_64-linux" then
fetchurl { fetchurl {
url = "http://repository.spotify.com/pool/non-free/s/spotify/spotify-client_${version}.gd143501.250-1_amd64.deb"; url = "http://repository.spotify.com/pool/non-free/s/spotify/spotify-client_${version}.gd18ed58.259-1_amd64.deb";
sha256 = "0ny3z499wks1dhrd3qq4d6cp0zd33198z9vak8ffgm5x24sdpghf"; sha256 = "0l3nikhf4hyj6z7639s668kd806730va005rwqcxvymxddcbcp03";
} }
else throw "Spotify not supported on this platform."; else throw "Spotify not supported on this platform.";

View file

@ -86,12 +86,12 @@ in {
src = src =
if stdenv.system == "x86_64-linux" then if stdenv.system == "x86_64-linux" then
fetchurl { fetchurl {
url = http://ftp.ing.umu.se/mirror/eclipse/eclipse/downloads/drops/R-3.6.2-201102101200/eclipse-SDK-3.6.2-linux-gtk-x86_64.tar.gz; url = http://archive.eclipse.org/eclipse/downloads/drops/R-3.6.2-201102101200/eclipse-SDK-3.6.2-linux-gtk-x86_64.tar.gz;
sha256 = "0dfcfadcd6337c897fbfd5b292de481931dfce12d43289ecb93691fd27dd47f4"; sha256 = "0dfcfadcd6337c897fbfd5b292de481931dfce12d43289ecb93691fd27dd47f4";
} }
else else
fetchurl { fetchurl {
url = http://ftp.ing.umu.se/mirror/eclipse/eclipse/downloads/drops/R-3.6.2-201102101200/eclipse-SDK-3.6.2-linux-gtk.tar.gz; url = http://archive.eclipse.org/eclipse/downloads/drops/R-3.6.2-201102101200/eclipse-SDK-3.6.2-linux-gtk.tar.gz;
sha256 = "1bh8ykliqr8wbciv13vpiy50rvm7yszk7y8dslr796dbwhi5b1cj"; sha256 = "1bh8ykliqr8wbciv13vpiy50rvm7yszk7y8dslr796dbwhi5b1cj";
}; };
}; };
@ -102,12 +102,12 @@ in {
src = src =
if stdenv.system == "x86_64-linux" then if stdenv.system == "x86_64-linux" then
fetchurl { fetchurl {
url = http://ftp-stud.fht-esslingen.de/pub/Mirrors/eclipse/technology/epp/downloads/release/helios/SR2/eclipse-cpp-helios-SR2-linux-gtk-x86_64.tar.gz; url = http://eclipse.ialto.com/technology/epp/downloads/release/helios/SR2/eclipse-cpp-helios-SR2-linux-gtk-x86_64.tar.gz;
sha1 = "6f914e11fa15a900c46825e4aa8299afd76e7e65"; sha1 = "6f914e11fa15a900c46825e4aa8299afd76e7e65";
} }
else else
fetchurl { fetchurl {
url = http://ftp-stud.fht-esslingen.de/pub/Mirrors/eclipse/technology/epp/downloads/release/helios/SR2/eclipse-cpp-helios-SR2-linux-gtk.tar.gz; url = http://eclipse.ialto.com/technology/epp/downloads/release/helios/SR2/eclipse-cpp-helios-SR2-linux-gtk.tar.gz;
sha1 = "1156e4bc0253ae3a3a4e54839e4944dc64d3108f"; sha1 = "1156e4bc0253ae3a3a4e54839e4944dc64d3108f";
}; };
}; };
@ -134,12 +134,12 @@ in {
src = src =
if stdenv.system == "x86_64-linux" then if stdenv.system == "x86_64-linux" then
fetchurl { fetchurl {
url = http://eclipse.ialto.com/eclipse/downloads/drops/R-3.7-201106131736/eclipse-SDK-3.7-linux-gtk-x86_64.tar.gz; url = http://archive.eclipse.org/eclipse/downloads/drops/R-3.7-201106131736/eclipse-SDK-3.7-linux-gtk-x86_64.tar.gz;
sha256 = "00ig3ww98r8imf32sx5npm6csn5nx288gvdk6w653nijni0di16j"; sha256 = "00ig3ww98r8imf32sx5npm6csn5nx288gvdk6w653nijni0di16j";
} }
else else
fetchurl { fetchurl {
url = http://eclipse.ialto.com/eclipse/downloads/drops/R-3.7-201106131736/eclipse-SDK-3.7-linux-gtk.tar.gz; url = http://archive.eclipse.org/eclipse/downloads/drops/R-3.7-201106131736/eclipse-SDK-3.7-linux-gtk.tar.gz;
sha256 = "08rgw85cam51l98mzb39fdc3ykb369v8pap93qhknbs6a3f5dnff"; sha256 = "08rgw85cam51l98mzb39fdc3ykb369v8pap93qhknbs6a3f5dnff";
}; };
}; };
@ -182,12 +182,12 @@ in {
src = src =
if stdenv.system == "x86_64-linux" then if stdenv.system == "x86_64-linux" then
fetchurl { fetchurl {
url = http://eclipse.ialto.com/eclipse/downloads/drops4/R-4.2.1-201209141800/eclipse-SDK-4.2.1-linux-gtk-x86_64.tar.gz; url = http://archive.eclipse.org/eclipse/downloads/drops4/R-4.2.1-201209141800/eclipse-SDK-4.2.1-linux-gtk-x86_64.tar.gz;
sha256 = "1mlyy90lk08lb2971ynglgi3nqvqfq1k70md2kb39jk160wd1xrk"; sha256 = "1mlyy90lk08lb2971ynglgi3nqvqfq1k70md2kb39jk160wd1xrk";
} }
else else
fetchurl { fetchurl {
url = http://eclipse.ialto.com/eclipse/downloads/drops4/R-4.2.1-201209141800/eclipse-SDK-4.2.1-linux-gtk.tar.gz; url = http://archive.eclipse.org/eclipse/downloads/drops4/R-4.2.1-201209141800/eclipse-SDK-4.2.1-linux-gtk.tar.gz;
sha256 = "1av6qm9wkbyk123qqf38f0jq4jv2bj9wp6fmpnl55zg6qr463c1w"; sha256 = "1av6qm9wkbyk123qqf38f0jq4jv2bj9wp6fmpnl55zg6qr463c1w";
}; };
}; };

View file

@ -17,6 +17,13 @@ stdenv.mkDerivation (rec {
-e "s|^\(\(DEST_\)\?PREFIX\)=.*$|\1=$out|g ; \ -e "s|^\(\(DEST_\)\?PREFIX\)=.*$|\1=$out|g ; \
s|/sbin/install-info|install-info|g" s|/sbin/install-info|install-info|g"
# Workaround for bug #458
# ProofGeneral 4.2 byte-compilation fails with Emacs 24.2.90
# http://proofgeneral.inf.ed.ac.uk/trac/ticket/458
sed -i "Makefile" \
-e "s|(setq byte-compile-error-on-warn t)||g"
sed -i "bin/proofgeneral" -e's/which/type -p/g' sed -i "bin/proofgeneral" -e's/which/type -p/g'
# @image{ProofGeneral} fails, so remove it. # @image{ProofGeneral} fails, so remove it.

View file

@ -23,9 +23,6 @@ cabal.mkDerivation (self: {
description = "Haskell IDE written in Haskell"; description = "Haskell IDE written in Haskell";
license = "GPL"; license = "GPL";
platforms = self.stdenv.lib.platforms.linux; platforms = self.stdenv.lib.platforms.linux;
maintainers = [ maintainers = [ self.stdenv.lib.maintainers.andres ];
self.stdenv.lib.maintainers.andres
self.stdenv.lib.maintainers.simons
];
}; };
}) })

View file

@ -38,6 +38,6 @@ stdenv.mkDerivation rec {
platforms = with stdenv.lib.platforms; platforms = with stdenv.lib.platforms;
linux; linux;
maintainers = with stdenv.lib.maintainers; maintainers = with stdenv.lib.maintainers;
[raskin]; [raskin bjornfor];
}; };
} }

View file

@ -7,19 +7,18 @@
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "paraview-3.14.0"; name = "paraview-3.98.1";
src = fetchurl { src = fetchurl {
url = "http://www.paraview.org/files/v3.14/ParaView-3.14.0-Source.tar.gz"; url = "http://paraview.org/files/v3.98/ParaView-3.98.1-source.tar.gz";
sha256 = "168v8zk64pxcd392kb4zqnkbw540d52bx6fs35aqz88i5jc0x9xv"; sha256 = "0i7q3jc4lc40l1zw3fdzv108rpxxfmg3dmmq855fpqyp2g2w9nxp";
}; };
# [ 5%] Generating vtkGLSLShaderLibrary.h # [ 5%] Generating vtkGLSLShaderLibrary.h
# ../../../bin/ProcessShader: error while loading shared libraries: libvtksys.so.pv3.10: cannot open shared object file: No such file or directory # ../../../bin/ProcessShader: error while loading shared libraries: libvtksys.so.pv3.10: cannot open shared object file: No such file or directory
preConfigure = '' preConfigure = ''
export NIX_LDFLAGS="$NIX_LDFLAGS -rpath $out/lib/paraview-3.10 -rpath ../../../bin -rpath ../../bin" export NIX_LDFLAGS="$NIX_LDFLAGS -rpath $out/lib/paraview-3.98 -rpath ../../../../../../lib -rpath ../../../../../lib -rpath ../../../../lib -rpath ../../../lib -rpath ../../lib -rpath ../lib"
''; '';
cmakeFlags = [ cmakeFlags = [
# "-DPARAVIEW_USE_MPI:BOOL=ON"
"-DPARAVIEW_USE_SYSTEM_HDF5:BOOL=ON" "-DPARAVIEW_USE_SYSTEM_HDF5:BOOL=ON"
"-DVTK_USE_SYSTEM_LIBXML2:BOOL=ON" "-DVTK_USE_SYSTEM_LIBXML2:BOOL=ON"
"-DPARAVIEW_ENABLE_PYTHON:BOOL=ON" "-DPARAVIEW_ENABLE_PYTHON:BOOL=ON"
@ -28,8 +27,6 @@ stdenv.mkDerivation rec {
"-DCMAKE_SKIP_BUILD_RPATH=ON" "-DCMAKE_SKIP_BUILD_RPATH=ON"
"-DVTK_USE_RPATH:BOOL=ON" "-DVTK_USE_RPATH:BOOL=ON"
"-DPARAVIEW_INSTALL_DEVELOPMENT=ON" "-DPARAVIEW_INSTALL_DEVELOPMENT=ON"
# "-DPYTHON_INCLUDE_DIR=${python}/include"
# "-DPYTHON_LIBRARY="
]; ];
enableParallelBuilding = true; enableParallelBuilding = true;
@ -40,7 +37,7 @@ stdenv.mkDerivation rec {
homepage = "http://www.paraview.org/"; homepage = "http://www.paraview.org/";
description = "3D Data analysis and visualization application"; description = "3D Data analysis and visualization application";
license = "free"; license = "free";
maintainers = with stdenv.lib.maintainers; [viric]; maintainers = with stdenv.lib.maintainers; [viric guibert];
platforms = with stdenv.lib.platforms; linux; platforms = with stdenv.lib.platforms; linux;
}; };
} }

View file

@ -0,0 +1,23 @@
{ cabal, binary, bytestringProgress, deepseq, filepath
, libXScrnSaver, parsec, pcreLight, strict, terminalProgressBar
, time, transformers, utf8String, X11
}:
cabal.mkDerivation (self: {
pname = "arbtt";
version = "0.7";
sha256 = "05q31fsyrbkcx0mlf2r91zgmpma5sl2a7100h7qsa882sijc2ybn";
isLibrary = false;
isExecutable = true;
buildDepends = [
binary bytestringProgress deepseq filepath parsec pcreLight strict
terminalProgressBar time transformers utf8String X11
];
extraLibraries = [ libXScrnSaver ];
meta = {
homepage = "http://www.joachim-breitner.de/projects#arbtt";
description = "Automatic Rule-Based Time Tracker";
license = "GPL";
platforms = self.ghc.meta.platforms;
};
})

View file

@ -5,11 +5,11 @@
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "blender-2.66a"; name = "blender-2.67";
src = fetchurl { src = fetchurl {
url = "http://download.blender.org/source/${name}.tar.gz"; url = "http://download.blender.org/source/${name}.tar.gz";
sha256 = "0wj8x9xk5irvsjc3rm7wzml1j47xcdpdpy84kidafk02biskcqcb"; sha256 = "066lwrm85455gs187bxr3jhqidc2f6f0791b4216jkagbszd9a8l";
}; };
buildInputs = [ buildInputs = [

View file

@ -1,19 +1,24 @@
{ stdenv, fetchurl, coreutils , unzip, which, pkgconfig , dbus { stdenv, fetchurl, coreutils , unzip, which, pkgconfig , dbus
, freetype, xdg_utils , libXext, glib, pango , cairo, libX11 , freetype, xdg_utils , libXext, glib, pango , cairo, libX11, libnotify
, libxdg_basedir , libXScrnSaver, xproto, libXinerama , perl , libxdg_basedir , libXScrnSaver, xproto, libXinerama , perl, gdk_pixbuf
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "dunst-0.5.0"; version = "1.0.0";
version = "0.5.0"; name = "dunst-${version}";
src = fetchurl { src = fetchurl {
url = "https://github.com/knopwob/dunst/archive/v0.5.0.zip"; url = "https://github.com/knopwob/dunst/archive/v${version}.zip";
sha256 = "08myzhpb1afffcfk3mpmc7gs9305x853b0553fxf3lkgksmg70a6"; sha256 = "1x6k6jrf219v8hmhqhnnfjycldvsnp7ag8a2y8adp5rhfmgyn671";
}; };
patchPhase = ''
substituteInPlace "settings.c" \
--replace "xdgConfigOpen(\"dunst/dunstrc\", \"r\", &xdg" "fopen(\"$out/share/dunst/dunstrc\", \"r\""
'';
buildInputs = buildInputs =
[ coreutils unzip which pkgconfig dbus freetype [ coreutils unzip which pkgconfig dbus freetype libnotify gdk_pixbuf
xdg_utils libXext glib pango cairo libX11 libxdg_basedir xdg_utils libXext glib pango cairo libX11 libxdg_basedir
libXScrnSaver xproto libXinerama perl]; libXScrnSaver xproto libXinerama perl];
@ -29,5 +34,6 @@ stdenv.mkDerivation rec {
license = stdenv.lib.licenses.bsd3; license = stdenv.lib.licenses.bsd3;
# NOTE: 'unix' or even 'all' COULD work too, I'm not sure # NOTE: 'unix' or even 'all' COULD work too, I'm not sure
platforms = stdenv.lib.platforms.linux; platforms = stdenv.lib.platforms.linux;
maintainers = [ stdenv.lib.maintainers.iElectric ];
}; };
} }

View file

@ -12,8 +12,10 @@ stdenv.mkDerivation rec {
rev = "1a50f2479c4775e047f234a24d95dda82441bfbd"; rev = "1a50f2479c4775e047f234a24d95dda82441bfbd";
}; };
meta = { meta = with stdenv.lib; {
description = "Simple tool for input event debugging"; description = "Simple tool for input event debugging";
license = "GPLv2"; license = "GPLv2";
platforms = platforms.linux;
maintainers = [maintainers.bjornfor];
}; };
} }

View file

@ -1,12 +1,12 @@
{ fetchurl, stdenv, db4, boost, gmp, mpfr, miniupnpc, qt4, unzip }: { fetchurl, stdenv, db4, boost, gmp, mpfr, miniupnpc, qt4, unzip }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
version = "0.0.1-3"; version = "0.0.2";
name = "freicoin-${version}"; name = "freicoin-${version}";
src = fetchurl { src = fetchurl {
url = "https://github.com/freicoin/freicoin/archive/v${version}.zip"; url = "https://github.com/freicoin/freicoin/archive/v${version}.zip";
sha256 = "19q4llv67kmvfr0x56rnqcf0d050dayv246q4i51mmkvjijc1qpf"; sha256 = "09izmm85rb64d5hd0hz9hkfvv3qag55sb3mdyp8z4103icqwd6d7";
}; };
# I think that openssl and zlib are required, but come through other # I think that openssl and zlib are required, but come through other

View file

@ -1,6 +1,6 @@
{ stdenv, fetchurl, cmake, qt4, perl, shared_mime_info, libvorbis, taglib { stdenv, fetchurl, cmake, qt4, perl, shared_mime_info, libvorbis, taglib
, flac, libsamplerate, libdvdread, lame, libsndfile, libmad, gettext , flac, libsamplerate, libdvdread, lame, libsndfile, libmad, gettext
, kdelibs, kdemultimedia, automoc4, phonon , kdelibs, kdemultimedia, automoc4, phonon, libkcddb ? null
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
@ -16,6 +16,7 @@ stdenv.mkDerivation rec {
flac libsamplerate libdvdread lame libsndfile flac libsamplerate libdvdread lame libsndfile
libmad gettext stdenv.gcc.libc libmad gettext stdenv.gcc.libc
kdelibs kdemultimedia automoc4 phonon kdelibs kdemultimedia automoc4 phonon
libkcddb
]; ];
enableParallelBuilding = true; enableParallelBuilding = true;
@ -23,7 +24,7 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; { meta = with stdenv.lib; {
description = "CD/DVD Burning Application for KDE"; description = "CD/DVD Burning Application for KDE";
license = licenses.gpl2Plus; license = licenses.gpl2Plus;
maintainers = [ maintainers.sander maintainers.urkud ]; maintainers = [ maintainers.sander maintainers.urkud maintainers.phreedom ];
platforms = with stdenv.lib.platforms; linux; platforms = with stdenv.lib.platforms; linux;
}; };
} }

View file

@ -3,12 +3,12 @@
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
version = "2.0.5.1"; version = "2.0.6";
name = "lyx-${version}"; name = "lyx-${version}";
src = fetchurl { src = fetchurl {
url = "ftp://ftp.lyx.org/pub/lyx/stable/2.0.x/${name}.tar.xz"; url = "ftp://ftp.lyx.org/pub/lyx/stable/2.0.x/${name}.tar.xz";
sha256 = "18k9qbz40v6lqmkfcg98wvcv4wi4p36ach1jz3z2b15gbmv2gr9n"; sha256 = "1llah9d9ymvdk8asmqslcwnicycxrwb27k8si184n5bfxvnjpjx5";
}; };
configureFlags = [ configureFlags = [
@ -23,6 +23,8 @@ stdenv.mkDerivation rec {
enchant # mythes boost enchant # mythes boost
]; ];
doCheck = true;
meta = { meta = {
description = "WYSIWYM frontend for LaTeX, DocBook, etc."; description = "WYSIWYM frontend for LaTeX, DocBook, etc.";
homepage = "http://www.lyx.org"; homepage = "http://www.lyx.org";

View file

@ -23,9 +23,11 @@ buildPythonPackage rec {
# runtime. If we use buildInputs it would just build, not run. # runtime. If we use buildInputs it would just build, not run.
propagatedBuildInputs = [ tempita jinja2 pyyaml clepy mock nose decorator docutils ]; propagatedBuildInputs = [ tempita jinja2 pyyaml clepy mock nose decorator docutils ];
meta = { meta = with stdenv.lib; {
description = "Distributed bugtracker"; description = "Distributed bugtracker";
license = stdenv.lib.licenses.bsd3; license = licenses.bsd3;
homepage = http://pitz.tplus1.com/; homepage = http://pitz.tplus1.com/;
platforms = platforms.linux;
maintainers = [maintainers.bjornfor];
}; };
} }

View file

@ -1,11 +1,11 @@
{ stdenv, fetchurl }: { stdenv, fetchurl }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "pstree-2.33"; name = "pstree-2.36";
src = fetchurl { src = fetchurl {
url = "http://www.sfr-fresh.com/unix/misc/${name}.tar.gz"; url = "http://www.sfr-fresh.com/unix/misc/${name}.tar.gz";
sha256 = "1469lrhpy6wghlvbjx6lmvh27rakq00x11cpz4n965fg11i121hg"; sha256 = "1vx4fndmkkx3bmcv71rpzjjbn24hlfs10pl99dsfhbx16a2d41cx";
}; };
unpackPhase = "unpackFile \$src; sourceRoot=."; unpackPhase = "unpackFile \$src; sourceRoot=.";

View file

@ -1,20 +1,18 @@
{ stdenv, fetchurl, fox_1_6, pkgconfig, gettext, x11, gcc, intltool, file, libpng }: { stdenv, fetchurl, fox, pkgconfig, gettext, x11, gcc, intltool, file, libpng }:
let
version = "1.33";
in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "xfe-${version}"; name = "xfe-1.34";
src = fetchurl { src = fetchurl {
url = "http://downloads.sourceforge.net/project/xfe/xfe/${version}/${name}.tar.gz"; url = "mirror://sourceforge/xfe/${name}.tar.gz";
md5 = "fb089ba73add411b08a6560eeb51742d"; sha256 = "0y6gi8vdvw1prz7dv7wadf7v8gl6g75jrlrl5jnsb71l1431ncay";
}; };
buildInputs = [ fox_1_6 pkgconfig gettext x11 gcc intltool file libpng ]; buildInputs = [ fox pkgconfig gettext x11 gcc intltool file libpng ];
doCheck = false; preConfigure = ''
sed -i s,/usr/share/xfe,$out/share/xfe, src/xfedefs.h
'';
enableParallelBuilding = true; enableParallelBuilding = true;

View file

@ -4,8 +4,8 @@
cabal.mkDerivation (self: { cabal.mkDerivation (self: {
pname = "xmobar"; pname = "xmobar";
version = "0.16"; version = "0.17";
sha256 = "1dx4kwygzp4c5j4jj4lsfgjfvhh863v68s106lmwc86a30h60p8i"; sha256 = "0ahb3xqxcfvpgxyb901bpl4i56mnslzwplcqxrr13glngcl7d25s";
isLibrary = false; isLibrary = false;
isExecutable = true; isExecutable = true;
buildDepends = [ buildDepends = [
@ -13,7 +13,6 @@ cabal.mkDerivation (self: {
]; ];
extraLibraries = [ libXrandr wirelesstools ]; extraLibraries = [ libXrandr wirelesstools ];
configureFlags = "-fwith_xft -fwith_iwlib"; configureFlags = "-fwith_xft -fwith_iwlib";
patches = [ ./add-freeration-variable.patch ];
meta = { meta = {
homepage = "http://projects.haskell.org/xmobar/"; homepage = "http://projects.haskell.org/xmobar/";
description = "A Minimalistic Text Based Status Bar"; description = "A Minimalistic Text Based Status Bar";

View file

@ -12,6 +12,5 @@ cabal.mkDerivation (self: {
description = "small dmenu wrapper"; description = "small dmenu wrapper";
license = self.stdenv.lib.licenses.bsd3; license = self.stdenv.lib.licenses.bsd3;
platforms = self.ghc.meta.platforms; platforms = self.ghc.meta.platforms;
maintainers = [ self.stdenv.lib.maintainers.simons ];
}; };
}) })

View file

@ -1,7 +1,6 @@
{ stdenv, fetchurl, patchelf }: { stdenv, fetchurl, patchelf }:
# this package contains the daemon version of bittorrent sync # this package contains the daemon version of bittorrent sync
# it's unfortunately closed source. # it's unfortunately closed source.
let let
@ -15,16 +14,15 @@ let
else if stdenv.system == "i686-linux" then "ld-linux.so.2" else if stdenv.system == "i686-linux" then "ld-linux.so.2"
else throw "Bittorrent Sync for: ${stdenv.system} not supported!"; else throw "Bittorrent Sync for: ${stdenv.system} not supported!";
version = "1.0.116"; version = "1.0.132";
sha256 = if stdenv.system == "x86_64-linux" then "108c11x8lp0a4irq88raclz3zfvmkxsqymxx3y8amc1lc6kc3n8i" sha256 = if stdenv.system == "x86_64-linux" then "04mwzpbibzzbl384ziq07g7xxbc1rb5lyxgc7g8m1x5fvc6g1dk6"
else if stdenv.system == "i686-linux" then "0kkxi04rggq6lrvn7g1xjay2nskqn7z4qkm0h0lcra7h2jz09mf1" else if stdenv.system == "i686-linux" then "0yz1y761gx612lczlqjc3wddnw73qf4b8rna9hmfzan7ikqb81z0"
else throw "Bittorrent Sync for: ${stdenv.system} not supported!"; else throw "Bittorrent Sync for: ${stdenv.system} not supported!";
in stdenv.mkDerivation { in stdenv.mkDerivation {
name = "btsync-bin-${version}"; name = "btsync-bin-${version}";
src = fetchurl { src = fetchurl {
# TODO: using version-specific URL: http://forum.bittorrent.com/topic/18070-versioned-binary-downloads/#entry45868 url = "http://syncapp.bittorrent.com/${version}/btsync_${arch}-${version}.tar.gz";
url = "http://btsync.s3-website-us-east-1.amazonaws.com/btsync_${arch}.tar.gz";
inherit sha256; inherit sha256;
}; };
@ -43,7 +41,7 @@ in stdenv.mkDerivation {
meta = { meta = {
homepage = "http://labs.bittorrent.com/experiments/sync.html"; homepage = "http://labs.bittorrent.com/experiments/sync.html";
description = "Automatically sync files via secure, distributed technology."; description = "Automatically sync files via secure, distributed technology.";
license = stdenv.lib.licenses.unfreeRedistributable; license = stdenv.lib.licenses.unfree;
maintainers = [ stdenv.lib.maintainers.iElectric ]; maintainers = [ stdenv.lib.maintainers.iElectric ];
}; };
} }

View file

@ -86,9 +86,15 @@ let
post26 = !pre27; post26 = !pre27;
post27 = !pre28; post27 = !pre28;
# build paths and release info
packageName = "chromium";
buildType = "Release";
buildPath = "out/${buildType}";
libExecPath = "$out/libexec/${packageName}";
in stdenv.mkDerivation rec { in stdenv.mkDerivation rec {
name = "${packageName}-${version}"; name = "${packageName}-${version}";
packageName = "chromium"; inherit packageName;
version = sourceInfo.version; version = sourceInfo.version;
@ -119,7 +125,8 @@ in stdenv.mkDerivation rec {
prePatch = "patchShebangs ."; prePatch = "patchShebangs .";
patches = optional cupsSupport ./cups_allow_deprecated.patch patches = [ ./sandbox_userns.patch ]
++ optional cupsSupport ./cups_allow_deprecated.patch
++ optional (pulseSupport && pre27) ./pulseaudio_array_bounds.patch ++ optional (pulseSupport && pre27) ./pulseaudio_array_bounds.patch
++ optional pre27 ./glibc-2.16-use-siginfo_t.patch; ++ optional pre27 ./glibc-2.16-use-siginfo_t.patch;
@ -130,7 +137,7 @@ in stdenv.mkDerivation rec {
'' + '' '' + ''
sed -i -e 's|/usr/bin/gcc|gcc|' \ sed -i -e 's|/usr/bin/gcc|gcc|' \
third_party/WebKit/Source/${if post27 third_party/WebKit/Source/${if post27
then "core/core.gyp/core.gyp" then "core/core.gypi"
else "WebCore/WebCore.gyp/WebCore.gyp"} else "WebCore/WebCore.gyp/WebCore.gyp"}
''; '';
@ -146,6 +153,8 @@ in stdenv.mkDerivation rec {
use_openssl = useOpenSSL; use_openssl = useOpenSSL;
selinux = enableSELinux; selinux = enableSELinux;
use_cups = cupsSupport; use_cups = cupsSupport;
linux_sandbox_path="${libExecPath}/${packageName}_sandbox";
linux_sandbox_chrome_path="${libExecPath}/${packageName}";
} // optionalAttrs proprietaryCodecs { } // optionalAttrs proprietaryCodecs {
# enable support for the H.264 codec # enable support for the H.264 codec
proprietary_codecs = true; proprietary_codecs = true;
@ -156,8 +165,6 @@ in stdenv.mkDerivation rec {
target_arch = "ia32"; target_arch = "ia32";
}); });
buildType = "Release";
enableParallelBuilding = true; enableParallelBuilding = true;
configurePhase = '' configurePhase = ''
@ -179,26 +186,28 @@ in stdenv.mkDerivation rec {
"BUILDTYPE=${buildType}" "BUILDTYPE=${buildType}"
"library=shared_library" "library=shared_library"
"chrome" "chrome"
]; ] ++ optional (!enableSELinux) "chrome_sandbox";
installPhase = '' installPhase = ''
mkdir -vp "$out/libexec/${packageName}" mkdir -vp "${libExecPath}"
cp -v "out/${buildType}/"*.pak "$out/libexec/${packageName}/" cp -v "${buildPath}/"*.pak "${libExecPath}/"
cp -vR "out/${buildType}/locales" "out/${buildType}/resources" "$out/libexec/${packageName}/" cp -vR "${buildPath}/locales" "${buildPath}/resources" "${libExecPath}/"
cp -v out/${buildType}/libffmpegsumo.so "$out/libexec/${packageName}/" cp -v ${buildPath}/libffmpegsumo.so "${libExecPath}/"
cp -v "out/${buildType}/chrome" "$out/libexec/${packageName}/${packageName}" cp -v "${buildPath}/chrome" "${libExecPath}/${packageName}"
mkdir -vp "$out/bin" mkdir -vp "$out/bin"
makeWrapper "$out/libexec/${packageName}/${packageName}" "$out/bin/${packageName}" makeWrapper "${libExecPath}/${packageName}" "$out/bin/${packageName}"
cp -v "${buildPath}/chrome_sandbox" "${libExecPath}/${packageName}_sandbox"
mkdir -vp "$out/share/man/man1" mkdir -vp "$out/share/man/man1"
cp -v "out/${buildType}/chrome.1" "$out/share/man/man1/${packageName}.1" cp -v "${buildPath}/chrome.1" "$out/share/man/man1/${packageName}.1"
for icon_file in chrome/app/theme/chromium/product_logo_*[0-9].png; do for icon_file in chrome/app/theme/chromium/product_logo_*[0-9].png; do
num_and_suffix="''${icon_file##*logo_}" num_and_suffix="''${icon_file##*logo_}"
icon_size="''${num_and_suffix%.*}" icon_size="''${num_and_suffix%.*}"
logo_output_path="$out/share/icons/hicolor/''${icon_size}x''${icon_size}/apps" logo_output_prefix="$out/share/icons/hicolor"
logo_output_path="$logo_output_prefix/''${icon_size}x''${icon_size}/apps"
mkdir -vp "$logo_output_path" mkdir -vp "$logo_output_path"
cp -v "$icon_file" "$logo_output_path/${packageName}.png" cp -v "$icon_file" "$logo_output_path/${packageName}.png"
done done

View file

@ -0,0 +1,292 @@
From a242351d8a32ea33e6337b928969cc9f715e314e Mon Sep 17 00:00:00 2001
From: aszlig <aszlig@redmoonstudios.org>
Date: Thu, 16 May 2013 14:17:56 +0200
Subject: [PATCH] zygote: Add support for user namespaces on Linux.
The implementation is done by patching the Zygote host to execute the sandbox
binary with CLONE_NEWUSER and setting the uid and gid mapping so that the child
process is using uid 0 and gid 0 which map to the current user of the parent.
Afterwards, the sandbox will continue as if it was called as a setuid binary.
In addition, this adds new_user_namespace as an option in process_util in order
to set the UID and GID mapping correctly. The reason for this is that just
passing CLONE_NEWUSER to clone_flags doesn't help in LaunchProcess(), because
without setting the mappings exec*() will clear the process's capability sets.
If the kernel doesn't support unprivileged user namespaces and the sandbox
binary doesn't have the setuid flag, the Zygote main process will run without a
sandbox. This is to mimic the behaviour if no SUID sandbox binary path is set.
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
---
base/process_util.h | 4 ++
base/process_util_posix.cc | 71 +++++++++++++++++++++-
.../browser/zygote_host/zygote_host_impl_linux.cc | 28 +++++++--
content/zygote/zygote_main_linux.cc | 7 +++
sandbox/linux/suid/client/setuid_sandbox_client.cc | 8 +++
sandbox/linux/suid/client/setuid_sandbox_client.h | 4 ++
sandbox/linux/suid/common/sandbox.h | 1 +
7 files changed, 117 insertions(+), 6 deletions(-)
diff --git a/base/process_util.h b/base/process_util.h
index 6efc70c..0f0c74c 100644
--- a/base/process_util.h
+++ b/base/process_util.h
@@ -261,3 +261,4 @@ struct LaunchOptions {
+ , new_user_namespace(false)
#endif // OS_LINUX
#if defined(OS_CHROMEOS)
, ctrl_terminal_fd(-1)
@@ -332,6 +333,9 @@ struct LaunchOptions {
#if defined(OS_LINUX)
// If non-zero, start the process using clone(), using flags as provided.
int clone_flags;
+
+ // If true, start the process in a new user namespace.
+ bool new_user_namespace;
#endif // defined(OS_LINUX)
#if defined(OS_CHROMEOS)
diff --git a/base/process_util_posix.cc b/base/process_util_posix.cc
index 6f15130..cea07f0 100644
--- a/base/process_util_posix.cc
+++ b/base/process_util_posix.cc
@@ -34,6 +34,13 @@
#include "base/threading/platform_thread.h"
#include "base/threading/thread_restrictions.h"
+#if defined(OS_LINUX)
+#include <sched.h>
+#if !defined(CLONE_NEWUSER)
+#define CLONE_NEWUSER 0x10000000
+#endif
+#endif
+
#if defined(OS_CHROMEOS)
#include <sys/ioctl.h>
#endif
@@ -621,8 +628,19 @@ bool LaunchProcess(const std::vector<std::string>& argv,
pid_t pid;
#if defined(OS_LINUX)
- if (options.clone_flags) {
- pid = syscall(__NR_clone, options.clone_flags, 0, 0, 0);
+ int map_pipe_fd[2];
+ int flags = options.clone_flags;
+
+ if (options.new_user_namespace) {
+ flags |= CLONE_NEWUSER;
+ if (pipe(map_pipe_fd) < 0) {
+ DPLOG(ERROR) << "user namespace pipe";
+ return false;
+ }
+ }
+
+ if (options.clone_flags || options.new_user_namespace) {
+ pid = syscall(__NR_clone, flags, 0, 0, 0);
} else
#endif
{
@@ -635,6 +653,21 @@ bool LaunchProcess(const std::vector<std::string>& argv,
} else if (pid == 0) {
// Child process
+#if defined(OS_LINUX)
+ if (options.new_user_namespace) {
+ // Close the write end of the pipe so we get an EOF when the parent closes
+ // the FD. This is to avoid race conditions when the UID/GID mappings are
+ // written _after_ execvp().
+ close(map_pipe_fd[1]);
+
+ char dummy;
+ if (HANDLE_EINTR(read(map_pipe_fd[0], &dummy, 1)) != 0) {
+ RAW_LOG(ERROR, "Unexpected input in uid/gid mapping pipe.");
+ _exit(127);
+ }
+ }
+#endif
+
// DANGER: fork() rule: in the child, if you don't end up doing exec*(),
// you call _exit() instead of exit(). This is because _exit() does not
// call any previously-registered (in the parent) exit handlers, which
@@ -749,6 +782,40 @@ bool LaunchProcess(const std::vector<std::string>& argv,
_exit(127);
} else {
// Parent process
+#if defined(OS_LINUX)
+ if (options.new_user_namespace) {
+ // We need to write UID/GID mapping here to map the current user outside
+ // the namespace to the root user inside the namespace in order to
+ // correctly "fool" the child process.
+ char buf[256];
+ int map_fd, map_len;
+
+ snprintf(buf, sizeof(buf), "/proc/%d/uid_map", pid);
+ map_fd = open(buf, O_RDWR);
+ DPCHECK(map_fd >= 0);
+ snprintf(buf, sizeof(buf), "0 %d 1", geteuid());
+ map_len = strlen(buf);
+ if (write(map_fd, buf, map_len) != map_len) {
+ RAW_LOG(WARNING, "Can't write to uid_map.");
+ }
+ close(map_fd);
+
+ snprintf(buf, sizeof(buf), "/proc/%d/gid_map", pid);
+ map_fd = open(buf, O_RDWR);
+ DPCHECK(map_fd >= 0);
+ snprintf(buf, sizeof(buf), "0 %d 1", getegid());
+ map_len = strlen(buf);
+ if (write(map_fd, buf, map_len) != map_len) {
+ RAW_LOG(WARNING, "Can't write to gid_map.");
+ }
+ close(map_fd);
+
+ // Close the pipe on the parent, so the child can continue doing the
+ // execvp() call.
+ close(map_pipe_fd[1]);
+ }
+#endif
+
if (options.wait) {
// While this isn't strictly disk IO, waiting for another process to
// finish is the sort of thing ThreadRestrictions is trying to prevent.
diff --git a/content/browser/zygote_host/zygote_host_impl_linux.cc b/content/browser/zygote_host/zygote_host_impl_linux.cc
index ba7884f8..2a674a0 100644
--- a/content/browser/zygote_host/zygote_host_impl_linux.cc
+++ b/content/browser/zygote_host/zygote_host_impl_linux.cc
@@ -117,6 +117,9 @@ void ZygoteHostImpl::Init(const std::string& sandbox_cmd) {
sandbox_binary_ = sandbox_cmd.c_str();
+ bool userns_sandbox = false;
+ const std::vector<std::string> cmd_line_unwrapped(cmd_line.argv());
+
if (!sandbox_cmd.empty()) {
struct stat st;
if (stat(sandbox_binary_.c_str(), &st) != 0) {
@@ -124,16 +127,21 @@ void ZygoteHostImpl::Init(const std::string& sandbox_cmd) {
<< sandbox_binary_ << " Aborting now.";
}
- if (access(sandbox_binary_.c_str(), X_OK) == 0 &&
- (st.st_uid == 0) &&
- (st.st_mode & S_ISUID) &&
- (st.st_mode & S_IXOTH)) {
+ if (access(sandbox_binary_.c_str(), X_OK) == 0) {
using_suid_sandbox_ = true;
+
cmd_line.PrependWrapper(sandbox_binary_);
scoped_ptr<sandbox::SetuidSandboxClient>
sandbox_client(sandbox::SetuidSandboxClient::Create());
sandbox_client->SetupLaunchEnvironment();
+
+ if (!((st.st_uid == 0) &&
+ (st.st_mode & S_ISUID) &&
+ (st.st_mode & S_IXOTH))) {
+ userns_sandbox = true;
+ sandbox_client->SetNoSuid();
+ }
} else {
LOG(FATAL) << "The SUID sandbox helper binary was found, but is not "
"configured correctly. Rather than run without sandboxing "
@@ -161,7 +169,19 @@ void ZygoteHostImpl::Init(const std::string& sandbox_cmd) {
base::ProcessHandle process = -1;
base::LaunchOptions options;
options.fds_to_remap = &fds_to_map;
+ if (userns_sandbox)
+ options.new_user_namespace = true;
base::LaunchProcess(cmd_line.argv(), options, &process);
+
+ if (process == -1 && userns_sandbox) {
+ LOG(ERROR) << "User namespace sandbox failed to start, running without "
+ << "sandbox! You need at least kernel 3.8.0 with CONFIG_USER_NS "
+ << "enabled in order to use the sandbox without setuid bit.";
+ using_suid_sandbox_ = false;
+ options.new_user_namespace = false;
+ base::LaunchProcess(cmd_line_unwrapped, options, &process);
+ }
+
CHECK(process != -1) << "Failed to launch zygote process";
if (using_suid_sandbox_) {
diff --git a/content/zygote/zygote_main_linux.cc b/content/zygote/zygote_main_linux.cc
index ca75518..d906411 100644
--- a/content/zygote/zygote_main_linux.cc
+++ b/content/zygote/zygote_main_linux.cc
@@ -402,6 +402,13 @@ static bool EnterSandbox(sandbox::SetuidSandboxClient* setuid_sandbox,
*has_started_new_init = true;
}
+ // Don't set non-dumpable, as it causes trouble when the host tries to find
+ // the zygote process (XXX: Not quite sure why this happens with user
+ // namespaces). Fortunately, we also have the seccomp filter sandbox which
+ // should disallow the use of ptrace.
+ if (setuid_sandbox->IsNoSuid())
+ return true;
+
#if !defined(OS_OPENBSD)
// Previously, we required that the binary be non-readable. This causes the
// kernel to mark the process as non-dumpable at startup. The thinking was
diff --git a/sandbox/linux/suid/client/setuid_sandbox_client.cc b/sandbox/linux/suid/client/setuid_sandbox_client.cc
index 7a174ef..633401e 100644
--- a/sandbox/linux/suid/client/setuid_sandbox_client.cc
+++ b/sandbox/linux/suid/client/setuid_sandbox_client.cc
@@ -166,6 +166,10 @@ bool SetuidSandboxClient::IsInNewNETNamespace() const {
return env_->HasVar(kSandboxNETNSEnvironmentVarName);
}
+bool SetuidSandboxClient::IsNoSuid() const {
+ return env_->HasVar(kSandboxNoSuidVarName);
+}
+
bool SetuidSandboxClient::IsSandboxed() const {
return sandboxed_;
}
@@ -175,5 +179,9 @@ void SetuidSandboxClient::SetupLaunchEnvironment() {
SetSandboxAPIEnvironmentVariable(env_);
}
+void SetuidSandboxClient::SetNoSuid() {
+ env_->SetVar(kSandboxNoSuidVarName, "1");
+}
+
} // namespace sandbox
diff --git a/sandbox/linux/suid/client/setuid_sandbox_client.h b/sandbox/linux/suid/client/setuid_sandbox_client.h
index a9f6536..2e8113a 100644
--- a/sandbox/linux/suid/client/setuid_sandbox_client.h
+++ b/sandbox/linux/suid/client/setuid_sandbox_client.h
@@ -39,6 +39,8 @@ class SetuidSandboxClient {
bool IsInNewPIDNamespace() const;
// Did the setuid helper create a new network namespace ?
bool IsInNewNETNamespace() const;
+ // Is sandboxed without SUID binary ?
+ bool IsNoSuid() const;
// Are we done and fully sandboxed ?
bool IsSandboxed() const;
@@ -46,6 +48,8 @@ class SetuidSandboxClient {
// helper.
void SetupLaunchEnvironment();
+ void SetNoSuid();
+
private:
// Holds the environment. Will never be NULL.
base::Environment* env_;
diff --git a/sandbox/linux/suid/common/sandbox.h b/sandbox/linux/suid/common/sandbox.h
index aad4ff8..bd710d5 100644
--- a/sandbox/linux/suid/common/sandbox.h
+++ b/sandbox/linux/suid/common/sandbox.h
@@ -18,6 +18,7 @@ static const char kAdjustLowMemMarginSwitch[] = "--adjust-low-mem";
static const char kSandboxDescriptorEnvironmentVarName[] = "SBX_D";
static const char kSandboxHelperPidEnvironmentVarName[] = "SBX_HELPER_PID";
+static const char kSandboxNoSuidVarName[] = "SBX_NO_SUID";
static const long kSUIDSandboxApiNumber = 1;
static const char kSandboxEnvironmentApiRequest[] = "SBX_CHROME_API_RQ";
--
1.8.2.1

View file

@ -1,14 +1,14 @@
# This file is autogenerated from update.sh in the same directory. # This file is autogenerated from update.sh in the same directory.
{ {
dev = { dev = {
version = "28.0.1485.0"; version = "28.0.1500.5";
url = "http://commondatastorage.googleapis.com/chromium-browser-official/chromium-28.0.1485.0.tar.xz"; url = "http://commondatastorage.googleapis.com/chromium-browser-official/chromium-28.0.1500.5.tar.xz";
sha256 = "04whky5bwsj909cc1ycwrc91d04iynwncwh21cbbbvg93jsj2pq9"; sha256 = "1jpjmqag875bpy4rwvr362nzx0r8ffcrisil9ci2ar6ayjd4lfhd";
}; };
beta = { beta = {
version = "27.0.1453.65"; version = "27.0.1453.81";
url = "http://commondatastorage.googleapis.com/chromium-browser-official/chromium-27.0.1453.65.tar.xz"; url = "http://commondatastorage.googleapis.com/chromium-browser-official/chromium-27.0.1453.81.tar.xz";
sha256 = "1flv9870p0bqglnbm4gfzbxzcvz30k2chxgnlbqgpfk5c4qq9mpb"; sha256 = "1g4gsrcdrp06hqr25fd9l4snjhibp5pi7pc3wv11fp8gd04cpv9w";
}; };
stable = { stable = {
version = "26.0.1410.63"; version = "26.0.1410.63";

View file

@ -1,4 +1,4 @@
{ stdenv, browser, makeDesktopItem, makeWrapper, plugins, libs { stdenv, browser, makeDesktopItem, makeWrapper, plugins, libs, gtk_modules
, browserName, desktopName, nameSuffix, icon , browserName, desktopName, nameSuffix, icon
}: }:
@ -28,6 +28,7 @@ stdenv.mkDerivation {
"$out/bin/${browserName}${nameSuffix}" \ "$out/bin/${browserName}${nameSuffix}" \
--suffix-each MOZ_PLUGIN_PATH ':' "$plugins" \ --suffix-each MOZ_PLUGIN_PATH ':' "$plugins" \
--suffix-each LD_LIBRARY_PATH ':' "$libs" \ --suffix-each LD_LIBRARY_PATH ':' "$libs" \
--suffix-each GTK_PATH ':' "$gtk_modules" \
--suffix-each LD_PRELOAD ':' "$(cat $(filterExisting $(addSuffix /extra-ld-preload $plugins)))" \ --suffix-each LD_PRELOAD ':' "$(cat $(filterExisting $(addSuffix /extra-ld-preload $plugins)))" \
--prefix-contents PATH ':' "$(filterExisting $(addSuffix /extra-bin-path $plugins))" --prefix-contents PATH ':' "$(filterExisting $(addSuffix /extra-bin-path $plugins))"
@ -43,6 +44,7 @@ stdenv.mkDerivation {
# where to find the plugin in its tree. # where to find the plugin in its tree.
plugins = map (x: x + x.mozillaPlugin) plugins; plugins = map (x: x + x.mozillaPlugin) plugins;
libs = map (x: x + "/lib") libs ++ map (x: x + "/lib64") libs; libs = map (x: x + "/lib") libs ++ map (x: x + "/lib64") libs;
gtk_modules = map (x: x + x.gtkModule) gtk_modules;
meta = { meta = {
description = description =

View file

@ -1,23 +0,0 @@
{ stdenv, fetchurl, kdelibs, cmake, qt4, automoc4, phonon, kde_baseapps, gettext }:
stdenv.mkDerivation rec {
name = "konq-plugins-${version}";
version = "4.4.0";
src = fetchurl {
url = http://ftp.riken.go.jp/pub/FreeBSD/distfiles/KDE/extragear/konq-plugins-4.4.0.tar.bz2;
sha256 = "1hn722rcdcwmhfnn89rnvp2b4d8gds4nm483ps3jkk83d7f2xmbi";
};
buildInputs = [ cmake kdelibs qt4 automoc4 phonon kde_baseapps gettext ];
patches = [ ./qt47.patch ];
meta = with stdenv.lib; {
description = "Various plugins for Konqueror";
license = "GPL";
homepage = http://kde.org/;
maintainers = [ maintainers.phreedom ];
platforms = kdelibs.meta.platforms;
};
}

View file

@ -1,11 +0,0 @@
--- konq-plugins/adblock/adblock.cpp 2010-02-11 22:12:41.000000000 +0000
+++ konq-plugins/adblock/adblock.cpp 2010-07-26 17:12:20.639786002 +0100
@@ -300,7 +300,7 @@
// ----------------------------------------------------------------------------
AdElement::AdElement() :
- m_url(0), m_category(0), m_type(0), m_blocked(false) {}
+ m_url(QString()), m_category(QString()), m_type(QString()), m_blocked(false) {}
AdElement::AdElement(const QString &url, const QString &category,
const QString &type, bool blocked, const DOM::Node&node) :

View file

@ -0,0 +1,20 @@
{ stdenv, fetchgit, kdelibs }:
stdenv.mkDerivation rec {
name = "kwebkitpart-1.3.2";
src = fetchgit {
url = git://anongit.kde.org/kwebkitpart;
rev = "292f32fda933b2ead5a61ff1ec457f839fad5c85";
sha256 = "1b2jar9b1yb3gy9fnq8dn2n4z8lffb6pfrj9jc4rjzv5b3rwh1ak";
};
buildInputs = [ kdelibs ];
meta = with stdenv.lib; {
platforms = platforms.linux;
maintainers = [ maintainers.phreedom ];
description = "a WebKit KPart for Konqueror, Akregator and other KDE applications";
homepage = https://projects.kde.org/projects/extragear/base/kwebkitpart;
};
}

View file

@ -52,6 +52,8 @@ in stdenv.mkDerivation {
patchelf --set-interpreter ${stdenv.glibc}/lib/ld-linux.so.2 $file || true patchelf --set-interpreter ${stdenv.glibc}/lib/ld-linux.so.2 $file || true
patchelf --set-rpath ${rpath}:$out/lib $file || true patchelf --set-rpath ${rpath}:$out/lib $file || true
done done
substituteInPlace $out/share/applications/hipchat.desktop \
--replace /opt/HipChat/bin $out/bin
''; '';
meta = { meta = {

View file

@ -12,14 +12,14 @@
enableOfficialBranding ? false enableOfficialBranding ? false
}: }:
let version = "17.0"; in let version = "17.0.6"; in
stdenv.mkDerivation { stdenv.mkDerivation {
name = "thunderbird-${version}"; name = "thunderbird-${version}";
src = fetchurl { src = fetchurl {
url = "ftp://ftp.mozilla.org/pub/thunderbird/releases/${version}/source/thunderbird-${version}.source.tar.bz2"; url = "ftp://ftp.mozilla.org/pub/thunderbird/releases/${version}/source/thunderbird-${version}.source.tar.bz2";
sha1 = "ccc5f2e155364948945abf6fd27bebeb4d797aa8"; sha1 = "cb5cb5dbfe77179b5853345c826eaa2bc634d48c";
}; };
enableParallelBuilding = false; enableParallelBuilding = false;
@ -89,7 +89,7 @@ stdenv.mkDerivation {
# Official branding implies thunderbird name and logo cannot be reuse, # Official branding implies thunderbird name and logo cannot be reuse,
# see http://www.mozilla.org/foundation/licensing.html # see http://www.mozilla.org/foundation/licensing.html
if enableOfficialBranding then licenses.proprietary else licenses.mpl11; if enableOfficialBranding then licenses.proprietary else licenses.mpl11;
maintainers = maintainers.pierron; maintainers = [ maintainers.pierron maintainers.eelco ];
platforms = platforms.linux; platforms = platforms.linux;
}; };
} }

View file

@ -1,16 +1,17 @@
{ stdenv, fetchurl, perl, pkgconfig, gtk, libpcap, flex, bison { stdenv, fetchurl, perl, pkgconfig, gtk, libpcap, flex, bison
, gnutls, libgcrypt, glib, zlib, libxml2, libxslt, adns, geoip , gnutls, libgcrypt, glib, zlib, libxml2, libxslt, adns, geoip
, heimdal, python, lynx, lua5 , heimdal, python, lynx, lua5
, makeDesktopItem
}: }:
let version = "1.8.5"; in let version = "1.8.7"; in
stdenv.mkDerivation { stdenv.mkDerivation {
name = "wireshark-${version}"; name = "wireshark-${version}";
src = fetchurl { src = fetchurl {
url = "mirror://sourceforge/wireshark/wireshark-${version}.tar.bz2"; url = "mirror://sourceforge/wireshark/wireshark-${version}.tar.bz2";
sha256 = "0wp33qa5yvi60b08iiz55wflhr1vwd7680sbwx2kqjlp2s17kr6l"; sha256 = "0hm8zisy5dg7sfhh7rvgnpffq2qcw0syd8k5kns8j0j13sf44zjw";
}; };
buildInputs = buildInputs =
@ -20,13 +21,30 @@ stdenv.mkDerivation {
configureFlags = "--disable-usr-local --with-ssl --enable-threads --enable-packet-editor"; configureFlags = "--disable-usr-local --with-ssl --enable-threads --enable-packet-editor";
desktopItem = makeDesktopItem {
name = "Wireshark";
exec = "wireshark";
icon = "wireshark";
comment = "Powerful network protocol analysis suite";
desktopName = "Wireshark";
genericName = "Network packet analyzer";
categories = "Network;System";
};
postInstall = ''
mkdir -p "$out"/share/applications/
mkdir -p "$out"/share/icons/
cp "$desktopItem"/share/applications/* "$out"/share/applications/
cp image/wsicon.svg "$out"/share/icons/wireshark.svg
'';
meta = { meta = {
homepage = "http://sourceforge.net/projects/wireshark/"; homepage = http://www.wireshark.org/;
description = "a powerful network protocol analyzer"; description = "a powerful network protocol analyzer";
license = stdenv.lib.licenses.gpl2; license = stdenv.lib.licenses.gpl2;
longDescription = '' longDescription = ''
Wireshark (formerly known as "Etherreal") is a powerful network Wireshark (formerly known as "Ethereal") is a powerful network
protocol analyzer developed by an international team of networking protocol analyzer developed by an international team of networking
experts. It runs on UNIX, OS X and Windows. experts. It runs on UNIX, OS X and Windows.
''; '';

View file

@ -1,11 +1,11 @@
{ stdenv, fetchurl, openssl, protobufc, libconfig }: { stdenv, fetchurl, openssl, protobufc, libconfig }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "umurmur-0.2.10"; name = "umurmur-0.2.12";
src = fetchurl { src = fetchurl {
url = "http://umurmur.googlecode.com/files/${name}.tar.gz"; url = "http://umurmur.googlecode.com/files/${name}.tar.gz";
sha256 = "0c990jvm73a6lajr1qlzw0p6nkshkh2nqwjmz2sq79pj0hm9ckvy"; sha1 = "5be3c765af3c5f518d1e1bbd828b3582ad4097cd";
}; };
buildInputs = [ openssl protobufc libconfig ]; buildInputs = [ openssl protobufc libconfig ];

View file

@ -4,15 +4,17 @@
, libkdcraw, libxslt, fftw, glew, gsl, shared_desktop_ontologies, okular }: , libkdcraw, libxslt, fftw, glew, gsl, shared_desktop_ontologies, okular }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "calligra-2.5.0"; name = "calligra-2.5.5";
src = fetchurl { src = fetchurl {
url = "mirror://kde/stable/${name}/${name}.tar.bz2"; url = "mirror://kde/stable/${name}/${name}.tar.bz2";
sha256 = "0q6ydi7hzrzwqzb38gikdh1l2zf8qp4i3nkgyb01148bjwrhvf21"; sha256 = "0h9idadrcyjvd0mkwri4lg310mzpna6s0pvc7b7r3267wzjbn9kw";
}; };
nativeBuildInputs = [ cmake perl pkgconfig ]; nativeBuildInputs = [ cmake perl pkgconfig ];
patches = [ ./fix-kde4.10-build.patch ];
buildInputs = [ kdelibs attica zlib libpng boost mesa kdepimlibs buildInputs = [ kdelibs attica zlib libpng boost mesa kdepimlibs
createresources eigen qca2 exiv2 soprano marble lcms2 fontconfig freetype createresources eigen qca2 exiv2 soprano marble lcms2 fontconfig freetype
sqlite icu libwpd libwpg popplerQt4 libkdcraw libxslt fftw glew gsl sqlite icu libwpd libwpg popplerQt4 libkdcraw libxslt fftw glew gsl
@ -21,7 +23,7 @@ stdenv.mkDerivation rec {
meta = { meta = {
description = "A Qt/KDE office suite, formely known as koffice"; description = "A Qt/KDE office suite, formely known as koffice";
homepage = http://calligra.org; homepage = http://calligra.org;
maintainers = [ stdenv.lib.maintainers.urkud ]; maintainers = with stdenv.lib.maintainers; [ urkud phreedom ];
inherit (kdelibs.meta) platforms; inherit (kdelibs.meta) platforms;
}; };
} }

View file

@ -0,0 +1,36 @@
From: Andre Woebbeking <Woebbeking@kde.org>
Date: Sun, 13 Jan 2013 15:10:38 +0000
Subject: compile with kdelibs 4.10 (tests are enabled by default)
X-Git-Url: http://quickgit.kde.org/?p=calligra.git&a=commitdiff&h=39fdda6757cbbb35480dec98eac419eb1879cb31
---
compile with kdelibs 4.10 (tests are enabled by default)
---
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -96,11 +96,6 @@
set(SHOULD_BUILD_ACTIVE FALSE)
ENDIF()
-if(KDE4_BUILD_TESTS)
- # only with this definition will the FOO_TEST_EXPORT macro do something
- add_definitions(-DCOMPILING_TESTS)
-endif(KDE4_BUILD_TESTS)
-
########################
#########################
## Look for KDE and Qt ##
@@ -146,6 +141,11 @@
endif(NOT ${KDE_VERSION} VERSION_GREATER 4.6.4)
macro_ensure_out_of_source_build("Compiling Calligra inside the source directory is not possible. Please refer to the build instruction http://community.kde.org/Calligra/Building/Building_Calligra")
+
+if(KDE4_BUILD_TESTS)
+ # only with this definition will the FOO_TEST_EXPORT macro do something
+ add_definitions(-DCOMPILING_TESTS)
+endif(KDE4_BUILD_TESTS)
###########################
############################

View file

@ -1,44 +0,0 @@
{ stdenv, fetchurl, lib, cmake, qt4, perl, lcms, exiv2, libxml2, libxslt, boost, glew
, shared_mime_info, popplerQt4, gsl, gmm, wv2, libwpd, libwpg, giflib, libgsf
, fftw, pkgconfig, openjpeg , kdelibs, kdepimlibs, automoc4, phonon
, qimageblitz, qca2, eigen, soprano , kdegraphics}:
stdenv.mkDerivation rec {
name = "koffice-2.2.2";
src = fetchurl {
url = "mirror://kde/stable/${name}/${name}.tar.bz2";
sha256 = "1jzdq7av4vbfkx987yz54431q3bwrsd7wzyinl9wsznx83v61c75";
};
patchFlags = "-p0";
patches =
let
urlBase = "http://kexi-project.org/download/patches/2.2.2/";
in
[
(fetchurl {
url = "${urlBase}support-large-memo-values-for-msaccess-2.2.2.patch";
sha256 = "1jn6na8c0vdf87p0yv9bcff0kd1jmcxndxmm3s0878l5pak9m8rd";
})
(fetchurl {
url = "${urlBase}fix-crash-on-closing-sqlite-connection-2.2.2.patch";
sha256 = "11h4rxdrv5vakym5786vr4bysi4627m53qqvk1vhxf3rkawvcafj";
})
./wpd.patch
./krita-exiv-0.21.diff
];
buildInputs = [ cmake qt4 perl lcms exiv2 libxml2 libxslt boost glew
shared_mime_info popplerQt4 gsl gmm wv2 libwpd libwpg giflib libgsf
stdenv.gcc.libc fftw pkgconfig kdelibs kdepimlibs automoc4 phonon
qimageblitz qca2 eigen openjpeg soprano kdegraphics ];
meta = {
description = "KDE integrated Office Suite";
license = "GPL";
homepage = http://www.koffice.org;
maintainers = with stdenv.lib.maintainers; [ sander urkud ];
# doesn't build, seems dead and superseded by calligra
#inherit (kdelibs.meta) platforms;
};
}

View file

@ -1,81 +0,0 @@
commit 7f6b2f2b9b2be1e4f257582a04b194c69f705bc7
Author: Casper Boemann <cbr@boemann.dk>
Date: Sat Dec 4 10:44:02 2010 +0000
------------------------------------------------------------------------
r1203267 | rempt | 2010-12-03 14:20:03 +0100 (Fri, 03 Dec 2010) | 1 line
Changed paths:
M /trunk/koffice/krita/ui/kis_aboutdata.h
correct url for animtim
------------------------------------------------------------------------
r1203281 | uzak | 2010-12-03 14:43:32 +0100 (Fri, 03 Dec 2010) | 2 lines
Changed paths:
M /trunk/koffice/filters/kpresenter/powerpoint/pptstyle.cpp
PPT: Fine tuned processing of the TextCFException structure for MS Office 2007.
------------------------------------------------------------------------
r1203296 | danders | 2010-12-03 15:44:01 +0100 (Fri, 03 Dec 2010) | 3 lines
Changed paths:
M /trunk/koffice/kplato/libs/kernel/kptaccount.cpp
Fix data loss on xml load.
BUG: 258685
------------------------------------------------------------------------
r1203344 | bero | 2010-12-03 18:08:24 +0100 (Fri, 03 Dec 2010) | 2 lines
Changed paths:
M /trunk/koffice/krita/ui/kisexiv2/kis_exif_io.cpp
Fix build with exiv2 0.21
svn path=/branches/work/koffice-essen/; revision=1203491
diff krita/ui/kisexiv2/kis_exif_io.cpp krita/ui/kisexiv2/kis_exif_io.cpp
index 6eb7f30..c85da65 100644
--- krita/ui/kisexiv2/kis_exif_io.cpp
+++ krita/ui/kisexiv2/kis_exif_io.cpp
@@ -406,7 +406,11 @@ bool KisExifIO::saveTo(KisMetaData::Store* store, QIODevice* ioDevice, HeaderTyp
v = kmdIntOrderedArrayToExifArray(entry.value());
} else if (exivKey == "Exif.Image.Artist") { // load as dc:creator
KisMetaData::Value creator = entry.value().asArray()[0];
+#if EXIV2_MAJOR_VERSION == 0 && EXIV2_MINOR_VERSION <= 20
v = kmdValueToExivValue(creator, Exiv2::ExifTags::tagType(exifKey.tag(), exifKey.ifdId()));
+#else
+ v = kmdValueToExivValue(creator, exifKey.defaultTypeId());
+#endif
} else if (exivKey == "Exif.Photo.OECF") {
v = kmdOECFStructureToExifOECF(entry.value());
} else if (exivKey == "Exif.Photo.DeviceSettingDescription") {
@@ -419,13 +423,25 @@ bool KisExifIO::saveTo(KisMetaData::Store* store, QIODevice* ioDevice, HeaderTyp
Q_ASSERT(entry.value().type() == KisMetaData::Value::LangArray);
QMap<QString, KisMetaData::Value> langArr = entry.value().asLangArray();
if (langArr.contains("x-default")) {
+#if EXIV2_MAJOR_VERSION == 0 && EXIV2_MINOR_VERSION <= 20
v = kmdValueToExivValue(langArr.value("x-default"), Exiv2::ExifTags::tagType(exifKey.tag(), exifKey.ifdId()));
+#else
+ v = kmdValueToExivValue(langArr.value("x-default"), exifKey.defaultTypeId());
+#endif
} else if (langArr.size() > 0) {
+#if EXIV2_MAJOR_VERSION == 0 && EXIV2_MINOR_VERSION <= 20
v = kmdValueToExivValue(langArr.begin().value(), Exiv2::ExifTags::tagType(exifKey.tag(), exifKey.ifdId()));
+#else
+ v = kmdValueToExivValue(langArr.begin().value(), exifKey.defaultTypeId());
+#endif
}
} else {
dbgFile << exifKey.tag();
+#if EXIV2_MAJOR_VERSION == 0 && EXIV2_MINOR_VERSION <= 20
v = kmdValueToExivValue(entry.value(), Exiv2::ExifTags::tagType(exifKey.tag(), exifKey.ifdId()));
+#else
+ v = kmdValueToExivValue(entry.value(), exifKey.defaultTypeId());
+#endif
}
if (v && v->typeId() != Exiv2::invalidTypeId) {
dbgFile << "Saving key" << exivKey; // << " of KMD value" << entry.value();

View file

@ -1,24 +0,0 @@
diff cmake/modules/FindWPD.cmake cmake/modules/FindWPD.cmake
index 9bd788c..927785a 100644
--- cmake/modules/FindWPD.cmake
+++ cmake/modules/FindWPD.cmake
@@ -19,14 +19,17 @@ if (WPD_INCLUDE_DIR AND WPD_LIBRARIES)
else (WPD_INCLUDE_DIR AND WPD_LIBRARIES)
if(NOT WIN32)
INCLUDE(FindPkgConfig)
- pkg_check_modules(WPD libwpd-0.8)
+ pkg_check_modules(PKG_WPD libwpd-0.8)
endif(NOT WIN32)
FIND_PATH(WPD_INCLUDE_DIR libwpd/libwpd.h
- ${WPD_INCLUDE_DIR}
+ ${PKG_WPD_INCLUDE_DIRS}
/usr/include/libwpd-0.8
)
+ FIND_LIBRARY(WPD_LIBRARIES wpd-0.8
+ ${PKG_WPD_LIBRARY_DIRS}
+ )
include(FindPackageHandleStandardArgs)
FIND_PACKAGE_HANDLE_STANDARD_ARGS(WPD DEFAULT_MSG WPD_INCLUDE_DIR WPD_LIBRARIES )

View file

@ -16,7 +16,7 @@ let
langsSpaces = stdenv.lib.concatStringsSep " " langs; langsSpaces = stdenv.lib.concatStringsSep " " langs;
major = "3"; major = "3";
minor = "6"; minor = "6";
patch = "2"; patch = "6";
tweak = "2"; tweak = "2";
subdir = "${major}.${minor}.${patch}"; subdir = "${major}.${minor}.${patch}";
version = "${subdir}${if tweak == "" then "" else "."}${tweak}"; version = "${subdir}${if tweak == "" then "" else "."}${tweak}";
@ -36,17 +36,17 @@ let
}) ] ++ (map fetchThirdParty (import ./libreoffice-srcs.nix)); }) ] ++ (map fetchThirdParty (import ./libreoffice-srcs.nix));
translations = fetchSrc { translations = fetchSrc {
name = "translations"; name = "translations";
sha256 = "a6ef65d5acfe9be19a3d4d743cd23a1017733f651ffc57f5773a24704a282c33"; sha256 = "1n3yk2077adyxrhs0jpkbm8dg3lxpn3sy63f0dl87ifv7ha1rfpn";
}; };
help = fetchSrc { help = fetchSrc {
name = "help"; name = "help";
sha256 = "55ec6ef5eef4bbf2298c3b864f67c8424ebb5ccbe7bcd6ca59abba2867989e31"; sha256 = "12rb5mw6sbi41w1zaxrj4qffiis9qcx8ibp5cpmwsz07nsdv5sxk";
}; };
core = fetchSrc { core = fetchSrc {
name = "core"; name = "core";
sha256 = "5ec07ffacec09c4dcee9246cb132f7a59a618b395835e781735fd61bf47e8d37"; sha256 = "0xw36sa73cgk3k3fv1spv5pavm95bc02lszn8415ay36lcc098pn";
}; };
}; };
in in

View file

@ -336,8 +336,8 @@
md5 = "d197bd6211669a2fa4ca648faf04bcb1"; md5 = "d197bd6211669a2fa4ca648faf04bcb1";
} }
{ {
name = "mdds_0.5.3.tar.bz2"; name = "mdds_0.6.1.tar.bz2";
md5 = "0ff7d225d087793c8c2c680d77aac3e7"; md5 = "9f9e15966b5624834157fe3d748312bc";
} }
{ {
name = "boost_1_44_0.tar.bz2"; name = "boost_1_44_0.tar.bz2";
@ -352,8 +352,8 @@
md5 = "3bf481ca95109b14435125c0dd1f2217"; md5 = "3bf481ca95109b14435125c0dd1f2217";
} }
{ {
name = "libvisio-0.0.18.tar.bz2"; name = "libvisio-0.0.19.tar.bz2";
md5 = "a9a1db27688bad49418667b434d29c1f"; md5 = "94e7f271e38c976462558b4278590178";
} }
{ {
name = "LinLibertineG-20120116.zip"; name = "LinLibertineG-20120116.zip";
@ -364,15 +364,11 @@
md5 = "0d2dcdfbf28d6208751b33057f5361f0"; md5 = "0d2dcdfbf28d6208751b33057f5361f0";
} }
{ {
name = "libcdr-0.0.8.tar.bz2"; name = "libcdr-0.0.9.tar.bz2";
md5 = "ce5a1def34578b75959ac31210f031f6"; md5 = "3c0037fb07dea2f0bbae8386fa7c6a9a";
} }
{ {
name = "lcms2-2.3.tar.gz"; name = "lcms2-2.3.tar.gz";
md5 = "327348d67c979c88c2dec59a23a17d85"; md5 = "327348d67c979c88c2dec59a23a17d85";
} }
{
name = "libvisio-0.0.19.tar.bz2";
md5 = "94e7f271e38c976462558b4278590178";
}
] ]

View file

@ -1,14 +1,14 @@
{stdenv, fetchurl, cmake, freetype, libpng, mesa, gettext, openssl, qt4, perl, libiconv}: {stdenv, fetchurl, cmake, freetype, libpng, mesa, gettext, openssl, qt4, perl, libiconv}:
let let
name = "stellarium-0.11.4a"; name = "stellarium-0.12.1";
in in
stdenv.mkDerivation { stdenv.mkDerivation {
inherit name; inherit name;
src = fetchurl { src = fetchurl {
url = "mirror://sourceforge/stellarium/${name}.tar.gz"; url = "mirror://sourceforge/stellarium/${name}.tar.gz";
sha256 = "0gs3lf2061chgcyx22xbnn6b284nsnj8xal7jyjzj57s8yk4n619"; sha256 = "02qfp56mkg3bqggv3ndx8v6zfswg51gkczwiqy5c9y4rw28hazla";
}; };
buildInputs = [ cmake freetype libpng mesa gettext openssl qt4 perl libiconv ]; buildInputs = [ cmake freetype libpng mesa gettext openssl qt4 perl libiconv ];

View file

@ -0,0 +1,32 @@
{stdenv, fetchurl, ocaml, perl}:
let
s = # Generated upstream information
rec {
baseName="ekrhyper";
version="1_4_08022013";
name="${baseName}-${version}";
hash="0vni5pq1p99428ii3g13chiqxcs8k1fm6jlvg1jqh4qdcs42w7yb";
url="http://userpages.uni-koblenz.de/~bpelzer/ekrhyper/ekrh_1_4_08022013.tar.gz";
sha256="0vni5pq1p99428ii3g13chiqxcs8k1fm6jlvg1jqh4qdcs42w7yb";
};
buildInputs = [
ocaml perl
];
in
stdenv.mkDerivation {
inherit (s) name version;
inherit buildInputs;
src = fetchurl {
inherit (s) url sha256;
};
setSourceRoot = "export sourceRoot=$(echo */ekrh/src/)";
preInstall = "export INSTALLDIR=$out";
postInstall = ''for i in "$out/casc"/*; do ln -s "$i" "$out/bin/ekrh-casc-$(basename $i)"; done '';
meta = {
inherit (s) version;
description = "Automated first-order theorem prover";
license = stdenv.lib.licenses.gpl2 ;
maintainers = [stdenv.lib.maintainers.raskin];
platforms = stdenv.lib.platforms.linux;
};
}

View file

@ -0,0 +1,3 @@
url http://userpages.uni-koblenz.de/~bpelzer/ekrhyper/
ensure_choice
version '.*[^0-9]_([-0-9_]+)[.].*' '\1'

View file

@ -0,0 +1,47 @@
{stdenv, fetchurl, tcsh, libXaw, libXt, libX11}:
let
s = # Generated upstream information
rec {
version = "3.3f";
name = "otter";
url = "http://www.cs.unm.edu/~mccune/otter/otter-${version}.tar.gz";
sha256 = "16mc1npl7sk9cmqhrf3ghfmvx29inijw76f1b1lsykllaxjqqb1r";
};
buildInputs = [
tcsh libXaw libXt libX11
];
in
stdenv.mkDerivation {
inherit (s) name version;
inherit buildInputs;
src = fetchurl {
inherit (s) url sha256;
};
buildPhase = ''
find . -name Makefile | xargs sed -i -e "s@/bin/rm@$(type -P rm)@g"
find . -name Makefile | xargs sed -i -e "s@/bin/mv@$(type -P mv)@g"
find . -perm +111 -type f | xargs sed -i -e "s@/bin/csh@$(type -P csh)@g"
find . -perm +111 -type f | xargs sed -i -e "s@/bin/rm@$(type -P rm)@g"
find . -perm +111 -type f | xargs sed -i -e "s@/bin/mv@$(type -P mv)@g"
sed -i -e "s/^XLIBS *=.*/XLIBS=-lXaw -lXt -lX11/" source/formed/Makefile
make all
make -C examples all
make -C examples-mace2 all
make -C source/formed realclean
make -C source/formed formed
'';
installPhase = ''
mkdir -p "$out"/{bin,share/otter}
cp bin/* source/formed/formed "$out/bin/"
cp -r examples examples-mace2 documents README* Legal Changelog Contents index.html "$out/share/otter/"
'';
meta = {
inherit (s) version;
description = "A reliable first-order theorem prover";
license = stdenv.lib.licenses.publicDomain ;
maintainers = [stdenv.lib.maintainers.raskin];
platforms = stdenv.lib.platforms.linux;
};
}

View file

@ -2,14 +2,14 @@
let let
name = "wxmaxima"; name = "wxmaxima";
version = "12.09.0"; version = "13.04.1";
in in
stdenv.mkDerivation { stdenv.mkDerivation {
name = "${name}-${version}"; name = "${name}-${version}";
src = fetchurl { src = fetchurl {
url = "mirror://sourceforge/${name}/wxMaxima-${version}.tar.gz"; url = "mirror://sourceforge/${name}/wxMaxima/${version}/wxMaxima-${version}.tar.gz";
sha256 = "5803ab62fc791bcb87f0d0f38357dba6fccc4efa61cb9f709e142c2954b1305d"; sha256 = "0irp1m9vr50ym7wfj1c1vbrzd2pip1vmvn9ykqsdf04afkkwkran";
}; };
buildInputs = [wxGTK maxima makeWrapper]; buildInputs = [wxGTK maxima makeWrapper];

View file

@ -0,0 +1,57 @@
{ stdenv, fetchurl, unzip, buildPythonPackage, makeDesktopItem
# mandatory
, pyside
# recommended
, pyflakes ? null, rope ? null, sphinx ? null, numpy ? null, scipy ? null, matplotlib ? null
# optional
, ipython ? null, pylint ? null, pep8 ? null
}:
buildPythonPackage rec {
name = "spyder-2.1.13.1";
namePrefix = "";
src = fetchurl {
url = "https://spyderlib.googlecode.com/files/${name}.zip";
sha256 = "1sg88shvw6k2v5428k13mah4pyqng43856rzr6ypz5qgwn0677ya";
};
buildInputs = [ unzip ];
propagatedBuildInputs =
[ pyside pyflakes rope sphinx numpy scipy matplotlib ipython pylint pep8 ];
# There is no test for spyder
doCheck = false;
desktopItem = makeDesktopItem {
name = "Spyder";
exec = "spyder";
icon = "spyder";
comment = "Scientific Python Development Environment";
desktopName = "Spyder";
genericName = "Python IDE";
categories = "Application;Development;Editor;IDE;";
};
# Create desktop item
postInstall = ''
mkdir -p $out/share/applications
cp $desktopItem/share/applications/* $out/share/applications/
mkdir -p $out/share/icons
cp spyderlib/images/spyder.svg $out/share/icons/
'';
meta = with stdenv.lib; {
description = "Scientific PYthon Development EnviRonment (SPYDER)";
longDescription = ''
Spyder (previously known as Pydee) is a powerful interactive development
environment for the Python language with advanced editing, interactive
testing, debugging and introspection features.
'';
homepage = https://code.google.com/p/spyderlib/;
license = licenses.mit;
platforms = platforms.linux;
maintainers = [maintainers.bjornfor];
};
}

View file

@ -16,8 +16,8 @@ stdenv.mkDerivation {
name = "git-annex-${version}"; name = "git-annex-${version}";
src = fetchurl { src = fetchurl {
url = "http://git.kitenet.net/?p=git-annex.git;a=snapshot;sf=tgz;h=${version}"; url = "https://github.com/joeyh/git-annex/tarball/${version}";
sha256 = "0g89lmkrs02qdb1k1bfq9gz3j4yv35320vb8ddmj99f4nnhqc6vv"; sha256 = "1280sdj3d3s3k5a1znzl7xzzyncv9kz522bprhwb9if03v6xh2kl";
name = "git-annex-${version}.tar.gz"; name = "git-annex-${version}.tar.gz";
}; };

View file

@ -10,7 +10,7 @@
let let
version = "1.8.2.1"; version = "1.8.2.3";
svn = subversionClient.override { perlBindings = true; }; svn = subversionClient.override { perlBindings = true; };
@ -21,7 +21,7 @@ stdenv.mkDerivation {
src = fetchurl { src = fetchurl {
url = "http://git-core.googlecode.com/files/git-${version}.tar.gz"; url = "http://git-core.googlecode.com/files/git-${version}.tar.gz";
sha1 = "ad9f833e509ba31c83efe336fd3599e89a39394b"; sha1 = "2831f7deec472db4d0d0cdffb4d82d91cecdf295";
}; };
patches = [ ./docbook2texi.patch ./symlinks-in-bin.patch ]; patches = [ ./docbook2texi.patch ./symlinks-in-bin.patch ];

View file

@ -13,10 +13,10 @@ stdenv.mkDerivation rec {
mkdir -p $out/etc/bash_completion.d/ mkdir -p $out/etc/bash_completion.d/
cp contrib/tig-completion.bash $out/etc/bash_completion.d/ cp contrib/tig-completion.bash $out/etc/bash_completion.d/
''; '';
meta = { meta = with stdenv.lib; {
homepage = "http://jonas.nitro.dk/tig/"; homepage = "http://jonas.nitro.dk/tig/";
description = "Tig is a git repository browser that additionally can act as a pager for output from various git commands"; description = "Tig is a git repository browser that additionally can act as a pager for output from various git commands";
maintainers = [ stdenv.lib.maintainers.garbas ]; maintainers = [ maintainers.garbas maintainers.bjornfor ];
license = stdenv.lib.licenses.gpl2; license = licenses.gpl2;
}; };
} }

View file

@ -2,14 +2,15 @@
, guiSupport ? false, tk ? null, curses }: , guiSupport ? false, tk ? null, curses }:
let let
name = "mercurial-2.2.3"; name = "mercurial-2.6.1";
in in
stdenv.mkDerivation { stdenv.mkDerivation {
inherit name; inherit name;
src = fetchurl { src = fetchurl {
url = "http://mercurial.selenic.com/release/${name}.tar.gz"; url = "http://mercurial.selenic.com/release/${name}.tar.gz";
sha256 = "0yv7kn96270fixigry910c1i3zzivimh1xjxywqjn9dshn2y6qbw"; sha256 = "0r4fg269xnqgacc82ppm3wxl9wwvvgwz8z6zi1iai4gx76iklhdn";
}; };
inherit python; # pass it so that the same version can be used in hg2git inherit python; # pass it so that the same version can be used in hg2git
@ -39,6 +40,12 @@ stdenv.mkDerivation {
$WRAP_TK $WRAP_TK
done done
mkdir -p $out/etc/mercurial
cat >> $out/etc/mercurial/hgrc << EOF
[web]
cacerts = /etc/ssl/certs/ca-bundle.crt
EOF
# copy hgweb.cgi to allow use in apache # copy hgweb.cgi to allow use in apache
mkdir -p $out/share/cgi-bin mkdir -p $out/share/cgi-bin
cp -v hgweb.cgi contrib/hgweb.wsgi $out/share/cgi-bin cp -v hgweb.cgi contrib/hgweb.wsgi $out/share/cgi-bin
@ -49,5 +56,6 @@ stdenv.mkDerivation {
description = "A fast, lightweight SCM system for very large distributed projects"; description = "A fast, lightweight SCM system for very large distributed projects";
homepage = "http://www.selenic.com/mercurial/"; homepage = "http://www.selenic.com/mercurial/";
license = "GPLv2"; license = "GPLv2";
maintainers = [ stdenv.lib.maintainers.eelco ];
}; };
} }

View file

@ -4,11 +4,11 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "kdenlive-${version}"; name = "kdenlive-${version}";
version = "0.9.4"; version = "0.9.6";
src = fetchurl { src = fetchurl {
url = "mirror://kde/stable/kdenlive/${version}/src/${name}.tar.bz2"; url = "mirror://kde/stable/kdenlive/${version}/src/${name}.tar.bz2";
sha256 = "1l3axf3y83gdfr6yc1lmy296h09gypkpqsc01w7pprg0y19rrfif"; sha256 = "1rw2cbzy5mabwijvryyzbhpgldn2zy5jy4j87hl4m1i8ah9lgi7x";
}; };
buildInputs = buildInputs =

View file

@ -1,13 +1,19 @@
{ stdenv, fetchurl, pkgconfig, glib, pango, libxml2, libXau }: { stdenv, fetchurl, pkgconfig
, libxml2, libXinerama, libXcursor, libXau, libXrandr
, imlib2, pango, libstartup_notification }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "openbox-3-4-11-2"; name = "openbox-3.5.0";
buildInputs = [ pkgconfig glib pango libxml2 libXau ]; buildInputs = [
pkgconfig libxml2
libXinerama libXcursor libXau libXrandr
imlib2 pango libstartup_notification
];
src = fetchurl { src = fetchurl {
url = http://openbox.org/dist/openbox/openbox-3.4.11.2.tar.gz; url = "http://openbox.org/dist/openbox/${name}.tar.gz";
sha256 = "2e7579389c30e6bb08cc721a2c1af512e049fec2670e71715aa1c4e129ec349d"; sha256 = "02pa1wa2rzvnq1z3xchzafc96hvp3537jh155q8acfhbacb01abg";
}; };
meta = { meta = {

View file

@ -2,7 +2,7 @@ source $stdenv/setup
header "getting $url${tag:+ ($tag)} into $out" header "getting $url${tag:+ ($tag)} into $out"
hg clone ${tag:+-r "$tag"} "$url" "$out" hg clone --insecure ${tag:+-r "$tag"} "$url" "$out"
rm -rf "$out/.hg" rm -rf "$out/.hg"

View file

@ -13,6 +13,7 @@ curl="curl \
--disable-epsv \ --disable-epsv \
--cookie-jar cookies \ --cookie-jar cookies \
--insecure \ --insecure \
$curlOpts \
$NIX_CURL_FLAGS" $NIX_CURL_FLAGS"

View file

@ -47,6 +47,9 @@ in
# locations. They are tried in order. # locations. They are tried in order.
urls ? [] urls ? []
, # Additional curl options needed for the download to succeed.
curlOpts ? ""
, # Name of the file. If empty, use the basename of `url' (or of the , # Name of the file. If empty, use the basename of `url' (or of the
# first element of `urls'). # first element of `urls').
name ? "" name ? ""
@ -97,7 +100,7 @@ stdenv.mkDerivation {
outputHash = if outputHash != "" then outputHash else outputHash = if outputHash != "" then outputHash else
if sha256 != "" then sha256 else if sha1 != "" then sha1 else md5; if sha256 != "" then sha256 else if sha1 != "" then sha1 else md5;
inherit showURLs mirrorsFile impureEnvVars; inherit curlOpts showURLs mirrorsFile impureEnvVars;
# Doing the download on a remote machine just duplicates network # Doing the download on a remote machine just duplicates network
# traffic, so don't do that. # traffic, so don't do that.

View file

@ -0,0 +1,42 @@
{ stdenv, kde4, shared_mime_info, extraLibs ? [] }:
/* Supply a KDE program, and it will have the necessary KDE vars to
get icons, mime types, etc. working.
For example:
packageOverrides = pkgs : {
kdenliveWrapped = kde4.wrapper kde4.kdenlive;
};
*/
program:
let
libs = with kde4; [ kdelibs kde_runtime oxygen_icons shared_mime_info ]
++ extraLibs;
in
stdenv.mkDerivation {
name = program.name + "-wrapped";
inherit libs;
buildCommand = ''
ensureDir $out/bin
KDEDIRS=${program}
QT_PLUGIN_PATH=${program}/lib/qt4/plugins:${program}/lib/kde4/plugins
for a in $libs; do
KDEDIRS=$a''${KDEDIRS:+:}$KDEDIRS
QT_PLUGIN_PATH=$a/lib/qt4/plugins:$a/lib/kde4/plugins''${QT_PLUGIN_PATH:+:}$QT_PLUGIN_PATH
done
for a in ${program}/bin/*; do
PROG=$out/bin/`basename $a`
cat > $PROG << END
#!/bin/sh
export KDEDIRS=$KDEDIRS\''${KDEDIRS:+:}\$KDEDIRS
export QT_PLUGIN_PATH=$QT_PLUGIN_PATH\''${QT_PLUGIN_PATH:+:}\$QT_PLUGIN_PATH
exec $a "\$@"
END
chmod +x $PROG
done
'';
}

View file

@ -9,6 +9,6 @@ relpath="${path#$server}"
echo "URL: $url" >&2 echo "URL: $url" >&2
curl -L -k "$url" | sed -re 's/^/-/;s/[hH][rR][eE][fF]=("([^"]*)"|([^" <>&]+)[ <>&])/\n+\2\3\n-/g' | \ curl -L -k "$url" | sed -re 's/^/-/;s/[hH][rR][eE][fF]=("([^"]*)"|'\''([^'\'']*)'\''|([^"'\'' <>&]+)[ <>&])/\n+\2\3\4\n-/g' | \
sed -e '/^-/d; s/^[+]//; /^#/d;'"s/^\\//$protocol:\\/\\/$server\\//g" | \ sed -e '/^-/d; s/^[+]//; /^#/d;'"s/^\\//$protocol:\\/\\/$server\\//g" | \
sed -re 's`^[^:]*$`'"$protocol://$basepath/&\`" sed -re 's`^[^:]*$`'"$protocol://$basepath/&\`"

View file

@ -46,17 +46,27 @@ sub getDeps {
} }
# Process the "Provides" fields to be able to resolve virtual dependencies. # Process the "Provides" and "Replaces" fields to be able to resolve
# virtual dependencies.
my %provides; my %provides;
foreach my $cdata (values %packages) { foreach my $cdata (values %packages) {
next unless defined $cdata->{Provides}; if (defined $cdata->{Provides}) {
my @provides = getDeps(Dpkg::Deps::deps_parse($cdata->{Provides})); my @provides = getDeps(Dpkg::Deps::deps_parse($cdata->{Provides}));
foreach my $name (@provides) { foreach my $name (@provides) {
#die "conflicting provide: $name\n" if defined $provides{$name}; #die "conflicting provide: $name\n" if defined $provides{$name};
#warn "provide by $cdata->{Package} conflicts with package with the same name: $name\n"; #warn "provide by $cdata->{Package} conflicts with package with the same name: $name\n";
next if defined $packages{$name}; next if defined $packages{$name};
$provides{$name} = $cdata->{Package}; $provides{$name} = $cdata->{Package};
}
}
# Treat "Replaces" like "Provides".
if (defined $cdata->{Replaces}) {
my @replaces = getDeps(Dpkg::Deps::deps_parse($cdata->{Replaces}));
foreach my $name (@replaces) {
next if defined $packages{$name};
$provides{$name} = $cdata->{Package};
}
} }
} }

View file

@ -1,9 +1,9 @@
{ pkgs { pkgs
, linuxKernel ? pkgs.linux , linuxKernel ? pkgs.linux_3_9
, img ? "bzImage" , img ? "bzImage"
, rootModules ? , rootModules ?
[ "cifs" "virtio_net" "virtio_pci" "virtio_blk" "virtio_balloon" "nls_utf8" "ext2" "ext3" [ "cifs" "virtio_net" "virtio_pci" "virtio_blk" "virtio_balloon" "nls_utf8" "ext2" "ext3"
"ext4" "unix" "hmac" "md4" "ecb" "des_generic" "ext4" "unix" "hmac" "md4" "ecb" "des_generic" "sha256"
] ]
}: }:
@ -123,14 +123,14 @@ rec {
echo "mounting Nix store..." echo "mounting Nix store..."
mkdir -p /fs/nix/store mkdir -p /fs/nix/store
mount -t cifs //10.0.2.4/store /fs/nix/store -o guest,sec=none mount -t cifs //10.0.2.4/store /fs/nix/store -o guest,sec=none,sec=ntlm
mkdir -p /fs/tmp mkdir -p /fs/tmp
mount -t tmpfs -o "mode=755" none /fs/tmp mount -t tmpfs -o "mode=755" none /fs/tmp
echo "mounting host's temporary directory..." echo "mounting host's temporary directory..."
mkdir -p /fs/tmp/xchg mkdir -p /fs/tmp/xchg
mount -t cifs //10.0.2.4/xchg /fs/tmp/xchg -o guest,sec=none mount -t cifs //10.0.2.4/xchg /fs/tmp/xchg -o guest,sec=none,sec=ntlm
mkdir -p /fs/proc mkdir -p /fs/proc
mount -t proc none /fs/proc mount -t proc none /fs/proc
@ -302,7 +302,7 @@ rec {
fi fi
touch /mnt/.debug touch /mnt/.debug
mkdir /mnt/proc /mnt/dev /mnt/sys /mnt/bin mkdir /mnt/proc /mnt/dev /mnt/sys
${createDeviceNodes "/mnt/dev"} ${createDeviceNodes "/mnt/dev"}
''; '';
@ -445,7 +445,7 @@ rec {
etc. from the specified filesystem image, which typically is a etc. from the specified filesystem image, which typically is a
filesystem containing a non-NixOS Linux distribution. */ filesystem containing a non-NixOS Linux distribution. */
runInLinuxImage = attrs: runInLinuxVM (attrs // { runInLinuxImage = drv: runInLinuxVM (lib.overrideDerivation drv (attrs: {
mountDisk = true; mountDisk = true;
/* Mount `image' as the root FS, but use a temporary copy-on-write /* Mount `image' as the root FS, but use a temporary copy-on-write
@ -470,7 +470,7 @@ rec {
/* Don't run Nix-specific build steps like patchelf. */ /* Don't run Nix-specific build steps like patchelf. */
fixupPhase = "true"; fixupPhase = "true";
}); }));
/* Create a filesystem image of the specified size and fill it with /* Create a filesystem image of the specified size and fill it with
@ -479,6 +479,7 @@ rec {
fillDiskWithRPMs = fillDiskWithRPMs =
{ size ? 4096, rpms, name, fullName, preInstall ? "", postInstall ? "" { size ? 4096, rpms, name, fullName, preInstall ? "", postInstall ? ""
, runScripts ? true, createRootFS ? defaultCreateRootFS , runScripts ? true, createRootFS ? defaultCreateRootFS
, unifiedSystemDir ? false
}: }:
runInLinuxVM (stdenv.mkDerivation { runInLinuxVM (stdenv.mkDerivation {
@ -491,10 +492,25 @@ rec {
chroot=$(type -tP chroot) chroot=$(type -tP chroot)
# Make the Nix store available in /mnt, because that's where the RPMs live.
mkdir -p /mnt/nix/store
${utillinux}/bin/mount -o bind /nix/store /mnt/nix/store
# Newer distributions like Fedora 18 require /lib etc. to be
# symlinked to /usr.
${lib.optionalString unifiedSystemDir ''
mkdir -p /mnt/usr/bin /mnt/usr/sbin /mnt/usr/lib /mnt/usr/lib64
ln -s /usr/bin /mnt/bin
ln -s /usr/sbin /mnt/sbin
ln -s /usr/lib /mnt/lib
ln -s /usr/lib64 /mnt/lib64
${utillinux}/bin/mount -t proc none /mnt/proc
''}
echo "unpacking RPMs..." echo "unpacking RPMs..."
for i in $rpms; do for i in $rpms; do
echo "$i..." echo "$i..."
${rpm}/bin/rpm2cpio "$i" | (cd /mnt && ${cpio}/bin/cpio -i --make-directories) ${rpm}/bin/rpm2cpio "$i" | (chroot /mnt ${cpio}/bin/cpio -i --make-directories)
done done
eval "$preInstall" eval "$preInstall"
@ -505,9 +521,6 @@ rec {
PATH=/usr/bin:/bin:/usr/sbin:/sbin $chroot /mnt \ PATH=/usr/bin:/bin:/usr/sbin:/sbin $chroot /mnt \
rpm --initdb rpm --initdb
# Make the Nix store available in /mnt, because that's where the RPMs live.
mkdir -p /mnt/nix/store
${utillinux}/bin/mount -o bind /nix/store /mnt/nix/store
${utillinux}/bin/mount -o bind /tmp /mnt/tmp ${utillinux}/bin/mount -o bind /tmp /mnt/tmp
echo "installing RPMs..." echo "installing RPMs..."
@ -519,8 +532,7 @@ rec {
rm /mnt/.debug rm /mnt/.debug
${utillinux}/bin/umount /mnt/nix/store ${utillinux}/bin/umount /mnt/nix/store /mnt/tmp ${lib.optionalString unifiedSystemDir "/mnt/proc"}
${utillinux}/bin/umount /mnt/tmp
${utillinux}/bin/umount /mnt ${utillinux}/bin/umount /mnt
''; '';
@ -726,10 +738,11 @@ rec {
, packagesList ? "", packagesLists ? [packagesList] , packagesList ? "", packagesLists ? [packagesList]
, packages, extraPackages ? [] , packages, extraPackages ? []
, preInstall ? "", postInstall ? "", archs ? ["noarch" "i386"] , preInstall ? "", postInstall ? "", archs ? ["noarch" "i386"]
, runScripts ? true, createRootFS ? defaultCreateRootFS }: , runScripts ? true, createRootFS ? defaultCreateRootFS
, unifiedSystemDir ? false }:
fillDiskWithRPMs { fillDiskWithRPMs {
inherit name fullName size preInstall postInstall runScripts createRootFS; inherit name fullName size preInstall postInstall runScripts createRootFS unifiedSystemDir;
rpms = import (rpmClosureGenerator { rpms = import (rpmClosureGenerator {
inherit name packagesLists urlPrefixes archs; inherit name packagesLists urlPrefixes archs;
packages = packages ++ extraPackages; packages = packages ++ extraPackages;
@ -982,6 +995,32 @@ rec {
packages = commonFedoraPackages ++ [ "cronie" "util-linux" ]; packages = commonFedoraPackages ++ [ "cronie" "util-linux" ];
}; };
fedora18i386 = {
name = "fedora-18-i386";
fullName = "Fedora 18 (i386)";
packagesList = fetchurl {
url = mirror://fedora/linux/releases/18/Everything/i386/os/repodata/935f57e61365047b6aee346792bc68bfd24de30874ce5d26bf730a992d36678d-primary.xml.gz;
sha256 = "935f57e61365047b6aee346792bc68bfd24de30874ce5d26bf730a992d36678d";
};
urlPrefix = mirror://fedora/linux/releases/18/Everything/i386/os;
archs = ["noarch" "i386" "i586" "i686"];
packages = commonFedoraPackages ++ [ "cronie" "util-linux" ];
unifiedSystemDir = true;
};
fedora18x86_64 = {
name = "fedora-18-x86_64";
fullName = "Fedora 18 (x86_64)";
packagesList = fetchurl {
url = mirror://fedora/linux/releases/18/Everything/x86_64/os/repodata/463ac49f2218e404607b2eeb3c04be1a648d90293f4239bbb6a63c2fed672bea-primary.xml.gz;
sha256 = "463ac49f2218e404607b2eeb3c04be1a648d90293f4239bbb6a63c2fed672bea";
};
urlPrefix = mirror://fedora/linux/releases/18/Everything/x86_64/os;
archs = ["noarch" "x86_64"];
packages = commonFedoraPackages ++ [ "cronie" "util-linux" ];
unifiedSystemDir = true;
};
opensuse103i386 = { opensuse103i386 = {
name = "opensuse-10.3-i586"; name = "opensuse-10.3-i586";
fullName = "openSUSE 10.3 (i586)"; fullName = "openSUSE 10.3 (i586)";
@ -1422,6 +1461,28 @@ rec {
packages = commonDebianPackages; packages = commonDebianPackages;
}; };
debian70i386 = {
name = "debian-7.0.0-wheezy-i386";
fullName = "Debian 7.0.0 Wheezy (i386)";
packagesList = fetchurl {
url = mirror://debian/dists/wheezy/main/binary-i386/Packages.bz2;
sha256 = "712939639e2cc82615c85bdf81edf31edef0fda003ac2b32998e438aee403ab8";
};
urlPrefix = mirror://debian;
packages = commonDebianPackages;
};
debian70x86_64 = {
name = "debian-7.0.0-wheezy-amd64";
fullName = "Debian 7.0.0 Wheezy (amd64)";
packagesList = fetchurl {
url = mirror://debian/dists/wheezy/main/binary-amd64/Packages.bz2;
sha256 = "e79132f7db6655013be1f75feb9812b071386525246d8639679b322487d2732a";
};
urlPrefix = mirror://debian;
packages = commonDebianPackages;
};
}; };
@ -1485,6 +1546,7 @@ rec {
"bzip2" "bzip2"
"tar" "tar"
"grep" "grep"
"sed"
"findutils" "findutils"
"g++" "g++"
"make" "make"
@ -1536,14 +1598,14 @@ rec {
name = "redhat-9-i386"; name = "redhat-9-i386";
fullName = "Red Hat Linux 9 (i386)"; fullName = "Red Hat Linux 9 (i386)";
size = 1024; size = 1024;
rpms = import ./rpm/redhat-9-i386.nix {inherit fetchurl;}; rpms = import ./rpm/redhat-9-i386.nix { inherit fetchurl; };
}; };
suse90i386 = fillDiskWithRPMs { suse90i386 = fillDiskWithRPMs {
name = "suse-9.0-i386"; name = "suse-9.0-i386";
fullName = "SUSE Linux 9.0 (i386)"; fullName = "SUSE Linux 9.0 (i386)";
size = 1024; size = 1024;
rpms = import ./rpm/suse-9-i386.nix {inherit fetchurl;}; rpms = import ./rpm/suse-9-i386.nix { inherit fetchurl; };
# Urgh. The /etc/group entries are installed by aaa_base (or # Urgh. The /etc/group entries are installed by aaa_base (or
# something) but due to dependency ordering, that package isn't # something) but due to dependency ordering, that package isn't
# installed yet by the time some other packages refer to these # installed yet by the time some other packages refer to these

View file

@ -1,11 +1,11 @@
{ stdenv, fetchurl }: { stdenv, fetchurl }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "cacert-20120628"; name = "cacert-20121229";
src = fetchurl { src = fetchurl {
url = "http://nixos.org/tarballs/${name}.pem.bz2"; url = "http://nixos.org/tarballs/${name}.pem.bz2";
sha256 = "0xg9f1w2pmsv221lgc60c07bs0xf2rr189a2yp2y9an95h3gx7ir"; sha256 = "031s86pqvn620zkj6w97hqgjvkp6vsvlymzz7rwvkv25zvrjsgif";
}; };
unpackPhase = "true"; unpackPhase = "true";

View file

@ -0,0 +1,24 @@
{ stdenv, fetchurl }:
stdenv.mkDerivation rec {
name = "freepats-20060219";
src = fetchurl {
url = "http://freepats.zenvoid.org/${name}.tar.bz2";
sha256 = "12iw36rd94zirll96cd5k0va7p5hxmf2shvjlhzihcmjaw8flq82";
};
installPhase = ''mkdir "$out"; cp -r . "$out"'';
meta = with stdenv.lib; {
description = "Instrument patches, for MIDI synthesizers";
longDescription = ''
Freepats is a project to create a free and open set of instrument
patches, in any format, that can be used with softsynths.
'';
homepage = http://freepats.zenvoid.org/;
license = licenses.gpl2;
platforms = platforms.all;
maintainers = [maintainers.bjornfor];
};
}

View file

@ -1,8 +1,8 @@
{ kde, kdelibs, kactivities, qjson, pyqt4, sip }: { kde, kdelibs, kactivities, qjson, pyqt4, sip, python, pykde4 }:
kde { kde {
#todo: PythonLibrary, SIP, PyQt4, PyKDE4
buildInputs = [ kdelibs kactivities qjson pyqt4 sip ]; buildInputs = [ kdelibs kactivities qjson pyqt4 sip python pykde4];
meta = { meta = {
description = "Kate, the KDE Advanced Text Editor, as well as KWrite"; description = "Kate, the KDE Advanced Text Editor, as well as KWrite";

View file

@ -1,7 +1,7 @@
{ callPackage, callPackageOrig, stdenv, qt48 }: { callPackage, callPackageOrig, stdenv, qt48 }:
let let
release = "4.10.2"; release = "4.10.3";
# Need callPackageOrig to avoid infinite cycle # Need callPackageOrig to avoid infinite cycle
kde = callPackageOrig ./kde-package { kde = callPackageOrig ./kde-package {
@ -25,12 +25,12 @@ let
kdesdk = [ kdesdk = [
{ name="cervisia"; } { name="cervisia"; }
{ name="lokalize"; } { name="lokalize"; }
{ name = "kioslave-svn"; sane = "kioslave_svn"; subdir = "kioslave"; } { name = "kioslave-svn"; sane = "kioslave_svn"; subdir = "kdesdk-kioslaves"; }
{ name = "kioslave-perldoc"; sane = "kioslave_perldoc"; subdir = "kioslave"; } { name = "kioslave-perldoc"; sane = "kioslave_perldoc"; subdir = "kdesdk-kioslaves"; }
{ name="dolphin-plugins-svn"; sane="dolphin_plugins_svn";subdir="dolphin-plugins/svn"; } { name="dolphin-plugins-svn"; sane="dolphin_plugins_svn";subdir="dolphin-plugins"; }
{ name="dolphin-plugins-git"; sane="dolphin_plugins_git";subdir="dolphin-plugins/git"; } { name="dolphin-plugins-git"; sane="dolphin_plugins_git";subdir="dolphin-plugins"; }
{ name="dolphin-plugins-hg"; sane="dolphin_plugins_hg";subdir="dolphin-plugins/hg"; } { name="dolphin-plugins-hg"; sane="dolphin_plugins_hg";subdir="dolphin-plugins"; }
{ name="dolphin-plugins-bazaar"; sane="dolphin_plugins_bazaar";subdir="dolphin-plugins/bazaar"; } { name="dolphin-plugins-bazaar"; sane="dolphin_plugins_bazaar";subdir="dolphin-plugins"; }
{ name="kcachegrind"; } { name="kcachegrind"; }
{ name="kapptemplate"; } { name="kapptemplate"; }
{ name="kdesdk-strigi-analyzers"; sane="kdesdk_strigi_analyzers";} { name="kdesdk-strigi-analyzers"; sane="kdesdk_strigi_analyzers";}

View file

@ -1,399 +0,0 @@
{stable=true;
hashes=builtins.listToAttrs[
{name="analitza";value="1k950n7rq081qy2pv7cbwzr81qp6bifll7cddgwgxk9kv16wrmh1";}
{name="ark";value="11jfdw4hkma564r6b9mn6vn2h5s6b6mf4imjad6iw7z3lxq6v7w9";}
{name="audiocd-kio";value="0zgil29ig2n5km3wzsx0gpwxk7l6zpcnxqgws9mgaqm3vnfqcjh6";}
{name="blinken";value="19jxlqalxfbxh1dshgpdyjkb8n7bynfr09p4hy38kv6nfil890y8";}
{name="bomber";value="08g82id9sf1m9zg38k47vannqcpm3fmskpgz4j41bcn24yfwynvf";}
{name="bovo";value="1zsbly04bcn00gyl751vszw82pvakdlw6l1n67hsgg3h5wa5z1fb";}
{name="cantor";value="1f3xwl9da0cz25qrx47p9b1bkcsbdj4i740py6awvhrrq60s0870";}
{name="dragon";value="0f9ma8aaglxh91inm711y64xqscxlqfil53gpk8c1bbanb8m99xp";}
{name="ffmpegthumbs";value="12fljrxyv8zgr1vl0ki8hxahwm4dn15pqhb1xgkw5pld0lvcq4sy";}
{name="filelight";value="0jiahda52k4knka4b0an4g2brbp263b2q8c09ayzmcd4mp9a4cgv";}
{name="granatier";value="0npp24j7bxmnfi743qsjn4ymi5b5icli0fb6g4x2f713z7i6raf8";}
{name="gwenview";value="1bznjfki05mydgjb3bmj5dymh33rac9lxrzlczqmah87c0f8fbc7";}
{name="jovie";value="17fbyja7ffsx0q6wlls9lagfcv8b21cnjnww06k90cyg0vn7sng4";}
{name="juk";value="0ni0iqprfrypx1iwgphhxwyw9216nc5s7hb0hv5j3v2kl1v2ir2n";}
{name="kaccessible";value="1zqbs26nl6wxnkya6nqzvnjfwmsqciraixi1awra4nzzx7n736rg";}
{name="kactivities";value="1d0xalwk2hlz0xxfgkrkfp0kgl347psgfhixsl8axhjgfxxi3bmx";}
{name="kajongg";value="1k401zxhkw8nha69kqr5igfwfgzlbmlvsy24fn4m2h2k1sh3vdcj";}
{name="kalgebra";value="1dzj9m6rm07xfr7plf9f7qrs44fzs4j9ncj02h9hzjli7zb44c3p";}
{name="kalzium";value="03zwwsbnizqm23zrhh5iagayw7jynmx87fwv0piiz65mgn4kxr5p";}
{name="kamera";value="1qvq4flqw1hw3513mcqdhsdvvr12sac272lhaf3jzxsm7p1qc3p1";}
{name="kanagram";value="0b5h2b8jm9zssn1hcl0wzf3mh11yh5hhaiay1i5db9k9g6y2nbn1";}
{name="kapman";value="1ghlfhmjivxnbga255x2lcdi6kxddyb3hnq93n6bzpg30m4j95sx";}
{name="kate";value="0cfdpg5j0zfi1zi0cjq8m3lgnbc9pwb2wlr9dvm4m0hy7byp88p3";}
{name="katomic";value="1r2nxya5c6dazvi7810hr24ydkyyb11ganbxkc4d1m8735i6fbqw";}
{name="kblackbox";value="0hslyixnw5bb2z71jncahjhnnf08baid8vxsp9n6a4ckcvbmldw4";}
{name="kblocks";value="1ds06amafp2igkhcjlwmaszbdvx4kfzlqpx57r5r4nlypnqfvv7k";}
{name="kbounce";value="0qp5ayyv3vacr2vak797wzxvkl5b9wn3db1rrzldiixb067f8jzy";}
{name="kbreakout";value="1ywk8zwpgqichq12idracld1gjv8gzhfyzxfi1n7165jyqqf9ba6";}
{name="kbruch";value="0vr1pbh7ds30vys3gd71c056fc96m5jpi7ihdbvm96p0bz94s7s4";}
{name="kcalc";value="1wni970xvd0inpxgw6mb85h6j9acp8vv62v7ipxcm4s4ay5jj9n1";}
{name="kcharselect";value="1rigpqyykd9s3gsai61y0jm6vbcza9gafwr2a4kgr72w7rn767fk";}
{name="kcolorchooser";value="0k60hbx41snpx83ivmnakl0a4li72pdimbgg987pl9ydjb7ja8gy";}
{name="kdeadmin";value="1a6412g8083g9b1xf75cwf0x3x3szadcqw3r4415vxww6kmb8br1";}
{name="kdeartwork";value="0a12fcmvhbc11vlmgds43mqbc6zf5j00dpsnj27ylz0nckjlajlb";}
{name="kde-baseapps";value="1gmyy9lkgcjhhbffzq51rjqr4m59x16qcsplcyywz218zr28gpfs";}
{name="kde-base-artwork";value="1vz5y6qb1wy3vcinnbsxydy39gz2ifls56dyg082j2f709hijzy3";}
{name="kdegraphics-mobipocket";value="0nf2k94bz8iqrr60zrql5mg14q14przq5lxscm71kk1bhdh711si";}
{name="kdegraphics-strigi-analyzer";value="10l1bmnskmfrwln78pzagfhz5kc2nipdm57i1c3fyp15d0msdgjz";}
{name="kdegraphics-thumbnailers";value="0p6bmllgzamfc3f9vigdq8knlblsmp4308lhh4f5bw5wkncjglqg";}
{name="kdelibs";value="1bylppbp6bzqyhkw5cavccmxh6zixjzc3z4g28d2lqixga1l16qz";}
{name="kdenetwork";value="0kjjwj69a79rfx7z3qxp5gjpykqq3nkwr5cm50f0phsfnflzx9l8";}
{name="kdepim";value="14q30gf3al23sx7cf8mhp89xa5c5xd1ns7dwq26igzkvji79kwlk";}
{name="kdepimlibs";value="1m56ljhssdj581hsb4irkgi6dwx25s5x8axk4fpipzvj6dq6yplz";}
{name="kdepim-runtime";value="1c9wv2wr843090jg41dwhqmvvvzqw875asmvydhj6kw625k62hr1";}
{name="kdeplasma-addons";value="1n1yar1rqw3swfnjmazqs1qm7yg19pki97204xa8dnlispbqk21s";}
{name="kde-runtime";value="0gmirvzs5cvh6rzps59hqkj4zk3nixh7i5hrxmm1ib7g1qnh0kfg";}
{name="kdesdk";value="1nyff19fv186n1j14qpvgslnaphl5y4rls8rn0yc0vxh31x769d9";}
{name="kdetoys";value="12c4h8vv5fd12k1wkbpmsf95c0gqa8nnwhszri72danal1qak7jj";}
{name="kde-wallpapers";value="17kavdzxql2cgpqrw0v9c2aflajv0l1qgllsg0l5qr7w68fqdjn7";}
{name="kdewebdev";value="0hv4ly6323f64wiqvizdn1ia0z50chhravm796wczb8xw8mcidh8";}
{name="kde-workspace";value="0rv8gdwlkvhajbn5s8mybrqc4ilpq4b0v7r55zp9dcb27c8jkr1n";}
{name="kdf";value="1bkj5yr7ds74gqlfsvyxf26kdqsyac8kg04phnc2rkzp31dvgldg";}
{name="kdiamond";value="1y1fyv211mvh5sbw55f827b7nx4da3aaly7c1bm2c13nnj7j5r9s";}
{name="kfloppy";value="063zzya13jmcdr2y3vig5k54hx1asnzs6lg2r5sckqp5lsmpdaz5";}
{name="kfourinline";value="1af58yrhpjhj61ppxfymw5z43ks9j5cz6ldagxiblp67w4bpa468";}
{name="kgamma";value="167z8ycnvi59kvmyar856hkcpb4znwhkkxvn4gg4g74byjzwlf3a";}
{name="kgeography";value="04p6ypf72gd2k54qaarsgyvji0bvsi0iqbbjr4qdyd9dhxihhzzp";}
{name="kgoldrunner";value="13m1j31fjiz6j0wfivkvgcmicz274h0jvdm8mkjzlp10g3691x4p";}
{name="kgpg";value="00zs8x2dhli8dlmj0365gq9517pzkpyf31kb4398zfrrcmja2qip";}
{name="khangman";value="1wj439z0n6sy1l5vknh9nrq2d1q2bq5sh0963g1zb9hp8l13bf8a";}
{name="kig";value="0hhfvl38czabramgyxjlazqp4dlkkc859fs36wq042iip05kyy3q";}
{name="kigo";value="0bvcqsq8w983lnrgi85pjajb7phbg826ky50w5wk5vql1afl02c6";}
{name="killbots";value="08j9p8wyqpjj78b9sj13f4vhlkcrhc7sgzwakcv4bg2dvmpr95mp";}
{name="kimono";value="14z3ca8s7swwxwnm198bq4ndfsl2m0brc9k465k7rj50l15y0rhl";}
{name="kiriki";value="13cay0dllcf5618yjjs1hz3392hcig8bj7r09b0hbqhay65z9l5y";}
{name="kiten";value="0lrdkha6xmlxfq9f36rb5ysk8hg9m5zmc9x1y206gxk3rf3k1wzj";}
{name="kjumpingcube";value="179p3lw1vl9vxvsdwzx8qjfrahii0igakw0qrdpkcmx4yr0a9gfx";}
{name="klettres";value="149xgrxqbp2bq8v2abzhmb8w2b2ssd7xmb06j6k1s707wc9kcs5g";}
{name="klickety";value="00x4f4nxfi9xasrddnc84vayn36dd0chyl8jxryswg8dabzazb25";}
{name="klines";value="0vamlsz3a945zcm34gb3w0iq2rknwkh9cbv1syh3cc2s9dn5sg29";}
{name="kmag";value="06jcp2nhgqbw6yrr5xhajsy2lxklk31kjfmq0pphssfs9yhi1pan";}
{name="kmahjongg";value="07hj806mix703h9x676rnwmklrfms04hfxidvzl0324idjw6v5m9";}
{name="kmines";value="07nrv4qn7wg590id83dgw7l5kyh4prj3nbi9np4x9ik1rr5bq9nm";}
{name="kmix";value="1hwmn4rvr7jid4y3gycsvxvvfxmkv128jxsdfjdhzqz8lcp2q87q";}
{name="kmousetool";value="1mrhppgrwwr3cyr3fna0hgypclssixhw9yx6wvqgqj3sc5wd6n4f";}
{name="kmouth";value="1s7789qsvg18548bdhmmgcs3w9843naxhcwsiqhc8x0dvaxlgd5r";}
{name="kmplot";value="0jzrc47c4v6hvrs6p0yhki70diyfgs55vnjac4gfrfn17jgh562w";}
{name="knavalbattle";value="1mqvlvhqd7sa4qsz6cf6gffysamgfml3nd4h71x5qzw8qqw778yq";}
{name="knetwalk";value="14nizf7nrvsmqg6d5vaazl8wf74q64gwxq6nmj86brinf7d5nn5h";}
{name="kolf";value="1qghkmzbpaajb91xcwd22fx87cfpmgmjjwqisdzkjz4qn3z5mpx0";}
{name="kollision";value="1z0xg967q3l2gxmnigjbrnqwvw5fm7cpscpfavn31zp4vbmk937m";}
{name="kolourpaint";value="135i7h1lf23cggzx7l2p2hsh7s4zrik3298fwwbhly0jl564ribb";}
{name="konquest";value="133zjqqpzwrai34f8gb4nk3im50i61c2my8hnqzr61pbbgd61ff3";}
{name="konsole";value="1iaih9c6i5ad0bvalwykrdgrwz6wb7k6x808na1df0yynw76r4s7";}
{name="korundum";value="1h8rr229hwkckrvpz6zkkxpfkrpg18fvyxsqb01sjaky7c6i4649";}
{name="kpat";value="1imr9w6jymx4379ba7drpa9nmaq6z28hrf5jwi06crhp5fyi08dh";}
{name="kremotecontrol";value="0zzhjgpy17wrgcrr70z582zh7rj0n4vgbxksz7gl3qm543y15kry";}
{name="kreversi";value="0dmfsg38hhav78j4s34arjr09ahfblv4k7s8llpafg7cicm8g0iv";}
{name="kross-interpreters";value="043wpb05di9pw3h206lpccgpfghc4v23s0n2bwv30246ig75rmk1";}
{name="kruler";value="1g7f810d7940j9lylzj0k7d89mbblz8ai9gs5cc7n0mkrczb9ws9";}
{name="ksaneplugin";value="1svsfgsvd21f9fhrsvi2fasffrx0r5rf8a8r4jx19hlzcvha0kza";}
{name="kscd";value="1ipl9sq8zikdjs044lbi519jyvdaahi0f8a877zfdp0xspzqi398";}
{name="kshisen";value="06qkl8fwh8rql6hdl8fygvfybp7w6c3ys0qsnjpxk5bz4m5xap1d";}
{name="ksirk";value="1hqp00dilzkbkada7dc5j56sh2rp19xcirhvj26560whlwdxhcj5";}
{name="ksnakeduel";value="0nbn1pn0hzh6wmhxkabrga50y06k4gv4pbb5235jbynjmk539n31";}
{name="ksnapshot";value="09na29nydwi0cmgg9g6yqr3wl9npgiqpvdq3wxc5jk1kxadlb0aj";}
{name="kspaceduel";value="1xf5qb8a08ar0v0ws1iyiqbax6qc8crbhn59nzy2hrc12451lbkc";}
{name="ksquares";value="1iz9r80mnkyq5mx4i95gx5a5qk5y5by8bwq9599ypamrb9fr1zpl";}
{name="kstars";value="0p86fpcyb1ipgmi2ypckdb5zzwanky9b3c1n5ddcr25y84b2m7iy";}
{name="ksudoku";value="0k5qdy0i20kxcsqdwzxhrw6rn3lzh2mgbw97rlxw5gmr3619irdz";}
{name="ktimer";value="149zlkpdz38pfg0yy9mi6xkrc3wcz790kc3026x1c5zyvb2nnwm7";}
{name="ktouch";value="109dwxxz1hcwj5506k33a0zy86ky50rp058x6pgqh1m0a6ljvswi";}
{name="ktuberling";value="1vsdkx7kz4gz35g3ggn6h5gmk43sww7mawdfl4r11q5rq7r2nlnx";}
{name="kturtle";value="1jvj34jlbvzvwmr7q8c12rh9q47d78dl6vx6lhjhvs1b0969zzrq";}
{name="kubrick";value="1vqjbf6p6adrmnrl4i4y1jh80rimzlp4fyfmgscpfncdnc5pzgb0";}
{name="kwallet";value="0sc6xn1gyl2jvfqqvln2x4cb68b2x5cjmb8gvxhgwizx93jmwkc1";}
{name="kwordquiz";value="1i7kdfp8x1r109jmj1a86bmn69cgjc8q9c4n92j1imr17ig063is";}
{name="libkcddb";value="1krr3jh46q3q02rps3wawv59bv9jzri7i4gi4qgszk5v8gn67nqb";}
{name="libkcompactdisc";value="1y7sznz6sdrgs8jiqxs2y7imqywq91l46w1dv8fkc9mcpx5233zb";}
{name="libkdcraw";value="1nhhnj6hir347g6jp20k5jq0faygp8x9k3lic9ixdw2byigy9c3p";}
{name="libkdeedu";value="0m0ipprcldg1l2yi0hpq87npvqic9vfh6pn60fg4wvl56syn0sfg";}
{name="libkdegames";value="1qs59v68nwli5438ax3am6694r1c04i7crv34bs9hksnmr51l499";}
{name="libkexiv2";value="0n93d4s37m2jdg04wgvmljrs7j14967bjjk6mk7fibv0jqmp65i5";}
{name="libkipi";value="0kjp9y2rngvhskzk63az6zfzjrysir2qlapy56ynscdgq3yl0ygm";}
{name="libkmahjongg";value="0g7fp0wzrhxfyhj46bv0in8z4iwal6ipjjcm38qz1j4ric71l1kf";}
{name="libksane";value="0pqgh21ymq0pclbvq411aglclak6afqll5d0y8hz8m6afkmjhqxc";}
{name="lskat";value="04gvh3266hllfzl5syai3qw7zvkd7jipqdrwzynqvzpdg725a05g";}
{name="marble";value="0v4c1psyl5342f01n0794wk0ckg5chblibvap0vicanlq16pp65f";}
{name="mplayerthumbs";value="198b8f3s7zv4sprbj22flzdpxsag91p283iym5q9mkialf51789y";}
{name="nepomuk-core";value="15zzraacig4qqmwabw7xy38ddvcxam7djw96yhxc0z8zr3xffysj";}
{name="nepomuk-widgets";value="1kjzp7px5l7q9bal0dxpm24wq05s0wbjgqli6bhx7d5hipfr53w2";}
{name="okular";value="0zvmfh9ijwx10zy9nq6295x1w9x1xljkdcsz5269m230ff6wwmnh";}
{name="oxygen-icons";value="1z46zmazg1hf6yy2krfqpb5i5xmf7kpw9l7wvh3ihfqsdh77qmn8";}
{name="pairs";value="0i9wg6a3y71m3bdp5qjk6f9bmmd45r9hi7b8fqxp8srxcqn5hzx1";}
{name="palapeli";value="1cq8vggcc1358nf4n15pycmbn7m50lndd1w0541c85qirlnrq7wm";}
{name="parley";value="0cqdmjcsjqa8p42p7j8ni9mkf898p5hs3wdb757b4c1vyzkkdlpx";}
{name="perlkde";value="0w628fdxqmwv8k0x22307a4cpwlvq3lfsbhl5b3bv7naqjnwf549";}
{name="perlqt";value="11g5rh32i2x8klg5y5bapg581k4gm38jdfsmqsrjdcmxfw94bjil";}
{name="picmi";value="0y3s3k1x78z2asbcrcl8xkrk7kkz2ci4lbh1jfbnd66bx7lmwv0l";}
{name="print-manager";value="0x8lqjndi3ln90n8bgw26k09kz5ghkfm2xgqi4y0295ggbm3cm24";}
{name="pykde4";value="02qih6jw13mv9x4wf85ff9m5akdmxrz2jf2nlldyimh879dn0hxr";}
{name="qtruby";value="15wv6rh8d1f0d96f42bawyljlkpnamwxqng69jfd3q44j54gjkc5";}
{name="qyoto";value="1jpk5vp4ymvy8hhqia7b4mw0pzgdskb3aff30ik154mngzaqbdzc";}
{name="rocs";value="131gb6xfcrmwnl7nbxpm1rip9q2r8wzw8pb8f8a47vvswf200n7g";}
{name="smokegen";value="1vcc7yz6j7ndk8ppg7zr546cji6x5w38nlfc1lanq1pb3lbsddwn";}
{name="smokekde";value="1ib1xj6lkh2z80l9dci6w58f62f2mmpfz6hm81hygxqyxbf8rl64";}
{name="smokeqt";value="1fpv9c1qsl08p8s5a86ql0342hbalbh2inxv9a3risqg6qd0is6l";}
{name="step";value="1iayd98rqsl5qm1r4jiabnhw68691kakajgp9kpmn302ljn2wx5j";}
{name="superkaramba";value="1g86gacs1ss2sa3vdyg1ciwbpcd6d3i8yfb7fjmgvjm4qiyl3npg";}
{name="svgpart";value="0iy01cl4p37bfmr5779shbp202w25ik3phsqq6yjzfb7521xbm4r";}
{name="sweeper";value="1np09is041rb7bk8q1bhl0wmv3dypmsgyvd5yxg1qlsibn8mwbiw";}
];
modules=[
{
module="kdemultimedia";
split=true;
pkgs=[
{ name="audiocd-kio"; sane="audiocd_kio"; }
{ name="dragon"; }
{ name="ffmpegthumbs"; }
{ name="juk"; }
{ name="kmix"; }
{ name="kscd"; }
{ name="libkcddb"; }
{ name="libkcompactdisc"; }
{ name="mplayerthumbs"; }
];
}
{
module="kdegraphics";
split=true;
pkgs=[
{ name="gwenview"; }
{ name="kamera"; }
{ name="kcolorchooser"; }
{ name="kdegraphics-mobipocket"; sane="kdegraphics_mobipocket"; }
{ name="kdegraphics-strigi-analyzer"; sane="kdegraphics_strigi_analyzer"; }
{ name="kdegraphics-thumbnailers"; sane="kdegraphics_thumbnailers"; }
{ name="kgamma"; }
{ name="kolourpaint"; }
{ name="kruler"; }
{ name="ksaneplugin"; }
{ name="ksnapshot"; }
{ name="libkdcraw"; }
{ name="libkexiv2"; }
{ name="libkipi"; }
{ name="libksane"; }
{ name="okular"; }
{ name="svgpart"; }
];
}
{
module="kdelibs";
split=true;
pkgs=[
{ name="kdelibs"; }
{ name="nepomuk-core"; sane="nepomuk_core"; }
{ name="nepomuk-widgets"; sane="nepomuk_widgets"; }
];
}
{
module="kdeutils";
split=true;
pkgs=[
{ name="ark"; }
{ name="filelight"; }
{ name="kcalc"; }
{ name="kcharselect"; }
{ name="kdf"; }
{ name="kfloppy"; }
{ name="kgpg"; }
{ name="kremotecontrol"; }
{ name="ktimer"; }
{ name="kwallet"; }
{ name="print-manager"; sane="print_manager"; }
{ name="superkaramba"; }
{ name="sweeper"; }
];
}
{
module="applications";
split=true;
pkgs=[
{ name="kate"; }
{ name="konsole"; }
];
}
{
module="kdegames";
split=true;
pkgs=[
{ name="bomber"; }
{ name="bovo"; }
{ name="granatier"; }
{ name="kajongg"; }
{ name="kapman"; }
{ name="katomic"; }
{ name="kblackbox"; }
{ name="kblocks"; }
{ name="kbounce"; }
{ name="kbreakout"; }
{ name="kdiamond"; }
{ name="kfourinline"; }
{ name="kgoldrunner"; }
{ name="kigo"; }
{ name="killbots"; }
{ name="kiriki"; }
{ name="kjumpingcube"; }
{ name="klickety"; }
{ name="klines"; }
{ name="kmahjongg"; }
{ name="kmines"; }
{ name="knavalbattle"; }
{ name="knetwalk"; }
{ name="kolf"; }
{ name="kollision"; }
{ name="konquest"; }
{ name="kpat"; }
{ name="kreversi"; }
{ name="kshisen"; }
{ name="ksirk"; }
{ name="ksnakeduel"; }
{ name="kspaceduel"; }
{ name="ksquares"; }
{ name="ksudoku"; }
{ name="ktuberling"; }
{ name="kubrick"; }
{ name="libkdegames"; }
{ name="libkmahjongg"; }
{ name="lskat"; }
{ name="palapeli"; }
{ name="picmi"; }
];
}
{
module="kdeedu";
split=true;
pkgs=[
{ name="analitza"; }
{ name="blinken"; }
{ name="cantor"; }
{ name="kalgebra"; }
{ name="kalzium"; }
{ name="kanagram"; }
{ name="kbruch"; }
{ name="kgeography"; }
{ name="khangman"; }
{ name="kig"; }
{ name="kiten"; }
{ name="klettres"; }
{ name="kmplot"; }
{ name="kstars"; }
{ name="ktouch"; }
{ name="kturtle"; }
{ name="kwordquiz"; }
{ name="libkdeedu"; }
{ name="marble"; }
{ name="pairs"; }
{ name="parley"; }
{ name="rocs"; }
{ name="step"; }
];
}
{
module="kdebindings";
split=true;
pkgs=[
{ name="kimono"; }
{ name="korundum"; }
{ name="kross-interpreters"; sane="kross_interpreters"; }
{ name="perlkde"; }
{ name="perlqt"; }
{ name="pykde4"; }
{ name="qtruby"; }
{ name="qyoto"; }
{ name="smokegen"; }
{ name="smokekde"; }
{ name="smokeqt"; }
];
}
{
module="kdeaccessibility";
split=true;
pkgs=[
{ name="jovie"; }
{ name="kaccessible"; }
{ name="kmag"; }
{ name="kmousetool"; }
{ name="kmouth"; }
];
}
{
module="kde-baseapps";
sane="kde_baseapps"; split=true;
pkgs=[
{ name="kde-baseapps"; sane="kde_baseapps"; }
];
}
{ module="kactivities"; split=false;}
{ module="kdeadmin"; split=false;
pkgs=[
{ name="strigi-analyzer"; sane="strigi_analyzer";}
{ name="kuser"; }
{ name="kcron"; }
{ name="ksystemlog"; }
];
}
{ module="kdeartwork"; split=false;
pkgs=[
{ name="ColorSchemes"; }
{ name="IconThemes"; }
{ name="emoticons"; }
{ name="kscreensaver"; }
{ name="kwin-styles"; sane="kwin_styles";}
{ name="sounds"; }
{ name="styles"; }
{ name="wallpapers"; }
{ name="HighResolutionWallpapers"; }
{ name="WeatherWallpapers"; }
{ name="desktopthemes"; }
];
}
{ module="kde-base-artwork"; sane="kde_base_artwork"; split=false;}
{ module="kdenetwork"; split=false;
pkgs=[
{ name="kfile-plugins"; sane="kfile_plugins";}
{ name="kget"; }
{ name="kopete"; }
{ name="krdc"; }
{ name="kppp"; }
{ name="krfb"; }
{ name="kdnssd"; }
{ name="filesharing"; }
];
}
{ module="kdepim"; split=false;}
{ module="kdepimlibs"; split=false;}
{ module="kdepim-runtime"; sane="kdepim_runtime"; split=false;}
{ module="kdeplasma-addons"; sane="kdeplasma_addons"; split=false;}
{ module="kde-runtime"; sane="kde_runtime"; split=false;}
#had to add fake pkgs to kdesdk to get it to be treated like a split module
{ module="kdesdk"; split=false; pkgs = [{ name="fake"; }]; }
{ module="kdetoys"; split=false;
pkgs=[
{ name="kteatime"; }
{ name="ktux"; }
{ name="amor"; }
];
}
{ module="kde-wallpapers"; sane="kde_wallpapers"; split=false;}
{ module="kdewebdev"; split=false;
pkgs=[
{ name="klinkstatus"; }
{ name="kfilereplace"; }
{ name="kimagemapeditor"; }
{ name="kommander"; }
];
}
{ module="kde-workspace"; sane="kde_workspace"; split=false;}
{ module="oxygen-icons"; sane="oxygen_icons"; split=false;}
];
}

View file

@ -0,0 +1,399 @@
{stable=true;
hashes=builtins.listToAttrs[
{name="analitza";value="0y8481jrb4bklwrcadska1rdqrbbknml6i9gcvkp8sibjnj0hz7y";}
{name="ark";value="0y4adimbsax8g5q9nffd22icskxpjcqhr4ws2p1857znlxxc9prh";}
{name="audiocd-kio";value="1pwfdb989yf5kjni8y2irzys8qdcw9ipwszmds7ss9ycdv1mc9p7";}
{name="blinken";value="1scywjdj6sjlzwbpxnarik3wypw7f6fcdmcgiql1sa1df1bdbh41";}
{name="bomber";value="0jxl93adfv3pf2xkkazh1yfkiixz49yhbg9kblnav44np9wydpzk";}
{name="bovo";value="0plm0g75qyx6lgdmzaml650nm7v1kjss5cq1v4dpmicahw9mgqfd";}
{name="cantor";value="05rd4jm5w9l4i16qrx5vqrszk666gzvmndn9w4f80jgzdsal0h45";}
{name="dragon";value="0xmxjicj8bg43d7mlmw5hwl5mqn9r2xm9kqh47cmlili9g90hklx";}
{name="ffmpegthumbs";value="0i4qbfa954qsirpq6ywwspfi7y26j8jkrx4x7h73ywqmilbw7gab";}
{name="filelight";value="0p840l6nw9hm25ndcr87g9pykhajzj99kzdqbirwancgj77rgn14";}
{name="granatier";value="0b50dnyvq0qgldg9jp9dsig0yh7xmmbfbza3vv6b0bwr8i7q3zcd";}
{name="gwenview";value="199yafvaz9bgd6wg49n9l5f90bvq61z0pc46h4p3fpfp0lp66r6p";}
{name="jovie";value="1fay1czn7s9412gh8dda889bcxcphclj66xd1snmxyq80avpyilr";}
{name="juk";value="0k9b745kqa3w3lzwibrh9aawpd1xdzqv6mf6ik9yy3r25wkj22sy";}
{name="kaccessible";value="13391w38l3k7b4il3spsrzniwiw1hq7lhqsl1wl2zfigz47hv288";}
{name="kactivities";value="00fdnw2rwpk8q6xgydwshawl23l76igdr6v8p69d5fmaj93nbqb8";}
{name="kajongg";value="1pkdjc54ydzxlbjp63s2cz5fzg56isrjyym0wlgiqlhgiqjf48qn";}
{name="kalgebra";value="09gsbn4aj4i52q670ginj0n2y26iqnsh12sh09642g9jkhdmigik";}
{name="kalzium";value="0rd3yz0q0158m158n20qmd9h0xmrc53wnhjc7g17lj2l605svkkv";}
{name="kamera";value="1s9znmi6ka8r2wyylp9pwlv3pg313yzc0k3j50c18c529nbx1dsx";}
{name="kanagram";value="0jxjz4zz7vivqdpm9c4lvi2pgvf5v16fhn0np8sdzaiv7rj2sl3j";}
{name="kapman";value="0f6nd2f56qy1c704451lxz57fzlnxry5njbid80wn8rv6c9c6m6k";}
{name="kate";value="07nchlm93860rwwbcllcj92w7p8dx06dimc6vclgn640d19j3ac2";}
{name="katomic";value="053l57z8l68r4vrrcj3rh4gn36f9qcqwysk0k34lh0szaii81qjw";}
{name="kblackbox";value="0lr7k2d0ml2aqga9md05kddm9zik7n18b622v57jim54id9i8iyl";}
{name="kblocks";value="1fylcrwaziksw2f17nbwmprk5psb5b292qwfc09y2i2ykx734gc8";}
{name="kbounce";value="0n7bgcldblmy9123ls5d7cpa7qajhpskpl0nv83n2dyfz4pa70dp";}
{name="kbreakout";value="13vjzna3n7m0hnc2glnz931j9pcwwzb4vnyhs6bjszrj422k6r5d";}
{name="kbruch";value="00a999gjzgd5cffjrkpdin8y9qqppir591w53yp1layvv080370j";}
{name="kcalc";value="0k84r6g0iz30g7ff39kgrcxx1xjnw6p5khzvikj79y9b56sd0g19";}
{name="kcharselect";value="0drah7js6r6zl6nii2bmpxhxzn78y04sqj013bzyblskqibxh0zz";}
{name="kcolorchooser";value="1crk5dxfxgyh3wz286hd69rhcf0s9jnq5pqcnhgcrsjpfjk9hahs";}
{name="kdeadmin";value="1iq93in2wvmqjgz1wqmr0vn9rd1pzdrl202n3qhass0rfm0vsv7w";}
{name="kdeartwork";value="0qcypdzyh5pqp70b2m32hqhcnv4gwpyawdhb2nphmgv64v9s2b8z";}
{name="kde-baseapps";value="1p2qfghvyi0pglp88p351c6lm54i3ibp7h2yxh27phwdi0j9lbzx";}
{name="kde-base-artwork";value="12zgimngxcp96bcw2mffrk6fsy34mbll5pp4blm3c59ya7b50nq1";}
{name="kdegraphics-mobipocket";value="1qcddcc5h3108i2xkp4ibjmgg3k0sxyr30i9nkbaawaid66l36lk";}
{name="kdegraphics-strigi-analyzer";value="0ixj0gqjdqrwqk0zc3p0kdkd0wg1rwkyxzndq459y8xpnbyn3pvi";}
{name="kdegraphics-thumbnailers";value="03pc1ybbnpybp85jc4gn45lr61q5x8yf541qnkap1mrs658f57d1";}
{name="kdelibs";value="1vrcawx3w5cdr4yapim0j2zx4lmlcpjg6866wd70bhp6fary1gaz";}
{name="kdenetwork";value="1xz57fb3dpllydi4jhbv5z5y710k2fdk1jl516ixihhbjbbr4phg";}
{name="kdepim";value="1myznqi7dggxkkd59vil16514biydrvlihksl8b3njfif2f4ifkj";}
{name="kdepimlibs";value="0r7qvq0rvkl5a76xq28f56fqd7hfxbin541qw9gniygnlddnhjvq";}
{name="kdepim-runtime";value="01cxrf9541fsga5c9fjzarzja2p58vrpwll6gx4dk49hmx1hwvjb";}
{name="kdeplasma-addons";value="1s1rxhd8apnww0z4hsawlvib126p3lj0m5jg29kgh4xwbkrwi2qa";}
{name="kde-runtime";value="01gjyhvymf0a0ishhdwy6mfvv20sj2b182q1r410miq5zjl3l79n";}
{name="kdesdk";value="1y4qxvcgl9zg0cqgaqc77hhpqlrbb6panpicarm766vas3pw78na";}
{name="kdetoys";value="0nspyll9if2jk8r2b65z9hahwcawmyhkl3pfi38drxqxzaqkpcq0";}
{name="kde-wallpapers";value="1ik0lmkzyml63dgh6inv3qa9wbj3ylk2rjkfafmqc2anzsgpjmxk";}
{name="kdewebdev";value="05g308cl6njl5vrnks2jv87xvqwphppfgy9mkgmm7brwkk0n25ny";}
{name="kde-workspace";value="17g4zjf6sich990i8s22m54i534p4hyzbbnc2566vv6w74pxnw6q";}
{name="kdf";value="1r19lfsxps177nc5ys4mqfa8y43b4rcsj4wiigvry6vmwvxnqy4j";}
{name="kdiamond";value="0hd4zn8xyk12idkwjv0h4rlfzdyx0m03i054h99z2ls4vfxixb6v";}
{name="kfloppy";value="037gng2bx7lv7zki7n56yxbcqrl4aj4y2zn1milm5dv1r33ga4k0";}
{name="kfourinline";value="1aav3b4snqj3ah2cwyl02mmvdnk3hsw2wcxbabijkbd2anaijbvg";}
{name="kgamma";value="1ccbjbfjljcndz39f1qhjcisbihk8v407hcl3nnwf25sgcvqygiz";}
{name="kgeography";value="00dsl70d7w7kfwam39pjwd624zs9fwbwbb8kn7gas3m9kc435drs";}
{name="kgoldrunner";value="1r2lrv63ks2c39nzfgc4bj9prlqcd1jqrywahxla6l8fpp299r05";}
{name="kgpg";value="1xg1axd8gvcn8w9haywjfi0lk044vi7z3klp2y93rwxdidxjjjji";}
{name="khangman";value="1a27n9m9js8j3rn112dg0aqj58qxjs8rb6mylzwi99a6w6jl44ka";}
{name="kig";value="1ns3d7lk96lr9l8kipdz92xq0q7q5lpbbqip6f55wcvazb4280r3";}
{name="kigo";value="1hbxx8ivwbw7mpkz3hsb5lwci2cxd48kiia4jd2859znjza5hz70";}
{name="killbots";value="1idczq2f1g7maxlf0fyc4dpm3f9lbsqgnsyf6j48hm0aicsazmcj";}
{name="kimono";value="1a0m6gk25qhx88z7y17154b8i9r9s3ry6zx21mxr7zz42d1ng5by";}
{name="kiriki";value="1307xbyxhxzqv294x99712h269p3k3cw34mpq8b5nv0102ig4pwl";}
{name="kiten";value="1n27cl8g4r7i60hrwfpc7nl7d118f2kyby0wgbwil6ip5q9ak71w";}
{name="kjumpingcube";value="0mw6bns7b9dwf7kbcpk0ilgvqbmak9765wffqhx52ykj7c993x1i";}
{name="klettres";value="0ymy4a0172fym2b0pvfgjb07waivb610z7cpnnrdw0qyzxks7131";}
{name="klickety";value="1mln3hb97isy2v71bxk0ijbqrlx31s1483ziajnlva7j7mc44pi2";}
{name="klines";value="0ylhz4nvwgc0ilgpv1fpf2vgcnypwgd0bslmg1sh2cc3gczxkdx8";}
{name="kmag";value="123a329sx3d3h3vk3w4400w5g9nsl6r2c7lv8i8xvcp7xcxixls7";}
{name="kmahjongg";value="1ahjdwwglp24a9g75cpq4c9bbqcwl50630ys94za94j5lj4sbrg4";}
{name="kmines";value="1pgpfhj5008vckpplmvwngm34wl1m3pz2ig9x12j20rcd0sy0k27";}
{name="kmix";value="0qkmnjlscsggmcfkj2xqfawrv2zn56byhzczn94piva28pcxcvps";}
{name="kmousetool";value="0khxn5qnzgdjba1d229kqfd3vf5bjdpj8i2zahwynxvgghmmg6cz";}
{name="kmouth";value="05wvwkj5xhjn3g5c1shviqfl284zfqf8qbgcc7a980f453sr8bbr";}
{name="kmplot";value="0pv41r9bygw895azcnf22r3lfddzf1xplnx1li88038gp9vzrybv";}
{name="knavalbattle";value="0hgralml3xhd487zi4gac60738arlb1xi3kzm1vlq7f5vp2dllaj";}
{name="knetwalk";value="0r6l3n3jzl3mabjn8v7mk41j5gcbh5xnajngk075vk0v7mp4xasj";}
{name="kolf";value="1wfvcz3hy8a9v07qs1427bqxniaai3iv8r63x1ia0sim5j33xlgq";}
{name="kollision";value="0g98icgnazlqjbbgcqa4i6gp5zm5wwzab7rd93cf5jvd81g5ymys";}
{name="kolourpaint";value="01qccaavpb3fp15ajfrmmimg0mwx8jbmq5gndmd0qrfymqvdwfm2";}
{name="konquest";value="0i5jbnm46mj3055d471zfs7j9c2sr6y39a311485mk24yf31pcif";}
{name="konsole";value="1kcg2lmnqbamhgik3bpynq8gf4jl78fhlq9ydh1m0vlqwj38vs36";}
{name="korundum";value="08bkgqj3r51jsvss517v74ikl7vdrzd15wn5fbcrkz625y8blcv6";}
{name="kpat";value="0l41dnjd2smrxjgkldsrscn5550kzaf5byv686f5iavb60nlr36x";}
{name="kremotecontrol";value="0p2z0q0l2wdlg5zij053cvimdkijwy949f1k1ma00z8gf881y3ix";}
{name="kreversi";value="0w0q11m5n39p80p38p6x3q3xlz19xnd2xnmkvx1zwq2sy8hwc06w";}
{name="kross-interpreters";value="1irw7wca7wlvv8ap9ypzn13zvjdijlyzf5mxkikdh23hhbhmmvn5";}
{name="kruler";value="0cqlidxwsg08am32nlgxdknzj0iwlg35z786ms6dqxax9rjzqs31";}
{name="ksaneplugin";value="0w08r33l5k3dn6vvm0ss49b84ffp04yc0aakx772ywp7shx1fkim";}
{name="kscd";value="13f7xb4kp24hq6wyvd7r55002r86fjh2c4sl2p5sh05glscw361f";}
{name="kshisen";value="0v6rplsxj8c60p2798w85llvfwdlhc4n6sck3m3kb70h725i3vnw";}
{name="ksirk";value="1bppikyznpwfy82bx22wacayrvsbzsqzrckrysmh6w8zadbalmmf";}
{name="ksnakeduel";value="09lyviv79ki1qld18854wpkrv6xb1g99jql8x7mfpafhsfqh3x9f";}
{name="ksnapshot";value="16qz4rmmx6901jmvc998izdr9q6p5jv5296ynwj3x6hlx4n4h21x";}
{name="kspaceduel";value="0nkwpny631fxvgg7h29pdgy8ikdfvynfa7bbn6vpaf56d4n5rj4s";}
{name="ksquares";value="0pxcm9i7j0g5cxrij3ir2bbqv5yla5n3m1fxig2qxa084a45d6nb";}
{name="kstars";value="01pv6aryk4wknjfh270ynrr3v5j308l3m55ca16f68njfndh7wi1";}
{name="ksudoku";value="1cb3ahkvjm2mps11spw1vbrxh2fal16mix5d2kjlayj0pmm6yhvc";}
{name="ktimer";value="0lnbzjqj0xbhhaw53z2a0sdfd1i1kzckczbfjy3ab2bg6xwfyb4y";}
{name="ktouch";value="08am04nirzh05rdh0mh2xixrd5w04xnnc7r8rfzcxra6s84jlsns";}
{name="ktuberling";value="0b206b4whhivhbn41fg0hwidn9m0acs5jfdjnv269x58vh79w7dj";}
{name="kturtle";value="1i19ksrac0k65xqj8yhb5n53x4qxj93zanb546gqirrgvhlhh573";}
{name="kubrick";value="1s5p1f8b30iqpngkxzkv29qc078nxncqlwlvfyq18gn27zdwcy2g";}
{name="kwallet";value="0v6c356ysv9xf6gg3ivlshqsd06rxsmvfcvq4igp7z4l9cz4cdya";}
{name="kwordquiz";value="1v061nq5scwgamshpkajq2cgp5dqipa3qlq5xl393kvp89zfl2bp";}
{name="libkcddb";value="09s6s779k6lq2pnb4iy4qnny2h8mbiy4w12nvw791gid1670vng7";}
{name="libkcompactdisc";value="06mm2im3rllwvrv2ph9smgbjfh2lhm3r3j8gmzikdqhzpyqp2kpc";}
{name="libkdcraw";value="0v2ji0jdzqpy54z60gq4p1k7zdw3bdsa0xd711gzbyxh34k5i1dg";}
{name="libkdeedu";value="1f8wqc0lfvgych011pg1smxyqsh9vwjhr13wcnmkf35hfwh81vfm";}
{name="libkdegames";value="16lz2mj93myl5wr7xyird9kwqml0na9h9c5vnxhig18vqvxs64ca";}
{name="libkexiv2";value="1sjpndx5d5w9dllh1f5cjg4z2gl0v827qjnnwnbm1lvps2s1kmm3";}
{name="libkipi";value="02ymmx97nbpwbhq786kcxi2cfr8f6vwyicskywv01f0qv4qh5llg";}
{name="libkmahjongg";value="0z9ahgfbf6ymbhzg6xcgcrl4qqadc986hi9xx38rcr1v3hm21pld";}
{name="libksane";value="17ahz4zm0lh52295nzdjvhafnlfixyi8p1xl9dyan6zwr2hbq9i2";}
{name="lskat";value="0qgsfy67pvvg058i1ik4h45d8n4x7npbvbhwcv9p29ar57vg1xd9";}
{name="marble";value="0fclzqvda5jjqy0mqbbq1wsb6s3xjbcx6nwzmc72f2ni2qas3yyx";}
{name="mplayerthumbs";value="04a8rccs0amgkmvgzqfz01ng13s287gyllppsqhxfr8ndpqdxp06";}
{name="nepomuk-core";value="1hj2z2sxghk71cqaz62v7b1lab0c3hh8cb6bb6fm6abg3gcb4z7g";}
{name="nepomuk-widgets";value="1w11va7m2665xlm1lgg7jx7qqxkpicr9mblf53vlvssljq96qak0";}
{name="okular";value="0lgri7y5zf2hx7zyi8i02i1amqcsn6k7nwbq77cgs2xlmj9kr7dn";}
{name="oxygen-icons";value="1wsac10jdxc7ywwm46mdvsxnil7bnzpdrcn3yjjdrkjjsn4kgj1i";}
{name="pairs";value="0gfq7cgxs3k2449fa5rdklwamrs5brj23zi19jns6x6mgasnl5ww";}
{name="palapeli";value="1grj7bm0im94crjzav3vlgqn9w014n55v6mms51r0issa2lpcblx";}
{name="parley";value="0wfcmrgzygz7pwgpsi5wzswk3wnimrxkdhby5jcdpaphwcn7pml2";}
{name="perlkde";value="0l3bz1l2s5p7kq785a9yvgnr28xlq2sddd7kzdbwahb0jrbhbyra";}
{name="perlqt";value="0j1a38qm3iqgdxx28flaam8v49r7l4lwg89by3vqsymc9bd787r8";}
{name="picmi";value="0p18667nybyr41b3n55s0862vvnhy1fw3gm7n0xa6r57dlkcsxjs";}
{name="print-manager";value="18scysv26jrzm36wrhjcad7qrf98hy2yq3b14j5ra1vdnr1n8nkk";}
{name="pykde4";value="1zq4xivx4xiwkdpz54llahjvfvx89bpf09jr275mj1rxayl2plma";}
{name="qtruby";value="0rbkqdvn36bgac6zv552jpgh8np6mf90hckf8g07npbf4sirgawa";}
{name="qyoto";value="0zbf7mpabazqwqh8g1dkg41bp06mvk9pcfh5m2br95wixcd6hv4g";}
{name="rocs";value="1ia1qfnhdic9py12nycp8v5lpyr6py4x5vvmj51b5w7h1m841dnd";}
{name="smokegen";value="1ybpxhh9fldzxha9307x8dq45zizqlj3cjwap3b4j4darvmsm0ky";}
{name="smokekde";value="1r0vq064afr6ih0is90wlidl0pxllk00hrzsqy5hgvr5c2yhaynk";}
{name="smokeqt";value="0df2js5k9vwzakcix06k1sprsrm1jl6fgnpsxs9r05a3mkkdl37q";}
{name="step";value="1dgqfycsf0d2fzrlkpw9d2s6aw11ik4cv9m37xdaciw1qkfjc6w2";}
{name="superkaramba";value="0mrk1vipxh65r9gwys89y1iacb7423mqx031abpry78jsa4prc4d";}
{name="svgpart";value="0bkbp7qd6xq3fdsn68r74a92r7pw97v494h78w4vrc06xx4v912w";}
{name="sweeper";value="1azvnv32r2fg8ha0ly3bkp2xc3s4kdvyyj9vl0p8az1q86x0z3jj";}
];
modules=[
{
module="kdemultimedia";
split=true;
pkgs=[
{ name="audiocd-kio"; sane="audiocd_kio"; }
{ name="dragon"; }
{ name="ffmpegthumbs"; }
{ name="juk"; }
{ name="kmix"; }
{ name="kscd"; }
{ name="libkcddb"; }
{ name="libkcompactdisc"; }
{ name="mplayerthumbs"; }
];
}
{
module="kdegraphics";
split=true;
pkgs=[
{ name="gwenview"; }
{ name="kamera"; }
{ name="kcolorchooser"; }
{ name="kdegraphics-mobipocket"; sane="kdegraphics_mobipocket"; }
{ name="kdegraphics-strigi-analyzer"; sane="kdegraphics_strigi_analyzer"; }
{ name="kdegraphics-thumbnailers"; sane="kdegraphics_thumbnailers"; }
{ name="kgamma"; }
{ name="kolourpaint"; }
{ name="kruler"; }
{ name="ksaneplugin"; }
{ name="ksnapshot"; }
{ name="libkdcraw"; }
{ name="libkexiv2"; }
{ name="libkipi"; }
{ name="libksane"; }
{ name="okular"; }
{ name="svgpart"; }
];
}
{
module="kdelibs";
split=true;
pkgs=[
{ name="kdelibs"; }
{ name="nepomuk-core"; sane="nepomuk_core"; }
{ name="nepomuk-widgets"; sane="nepomuk_widgets"; }
];
}
{
module="kdeutils";
split=true;
pkgs=[
{ name="ark"; }
{ name="filelight"; }
{ name="kcalc"; }
{ name="kcharselect"; }
{ name="kdf"; }
{ name="kfloppy"; }
{ name="kgpg"; }
{ name="kremotecontrol"; }
{ name="ktimer"; }
{ name="kwallet"; }
{ name="print-manager"; sane="print_manager"; }
{ name="superkaramba"; }
{ name="sweeper"; }
];
}
{
module="applications";
split=true;
pkgs=[
{ name="kate"; }
{ name="konsole"; }
];
}
{
module="kdegames";
split=true;
pkgs=[
{ name="bomber"; }
{ name="bovo"; }
{ name="granatier"; }
{ name="kajongg"; }
{ name="kapman"; }
{ name="katomic"; }
{ name="kblackbox"; }
{ name="kblocks"; }
{ name="kbounce"; }
{ name="kbreakout"; }
{ name="kdiamond"; }
{ name="kfourinline"; }
{ name="kgoldrunner"; }
{ name="kigo"; }
{ name="killbots"; }
{ name="kiriki"; }
{ name="kjumpingcube"; }
{ name="klickety"; }
{ name="klines"; }
{ name="kmahjongg"; }
{ name="kmines"; }
{ name="knavalbattle"; }
{ name="knetwalk"; }
{ name="kolf"; }
{ name="kollision"; }
{ name="konquest"; }
{ name="kpat"; }
{ name="kreversi"; }
{ name="kshisen"; }
{ name="ksirk"; }
{ name="ksnakeduel"; }
{ name="kspaceduel"; }
{ name="ksquares"; }
{ name="ksudoku"; }
{ name="ktuberling"; }
{ name="kubrick"; }
{ name="libkdegames"; }
{ name="libkmahjongg"; }
{ name="lskat"; }
{ name="palapeli"; }
{ name="picmi"; }
];
}
{
module="kdeedu";
split=true;
pkgs=[
{ name="analitza"; }
{ name="blinken"; }
{ name="cantor"; }
{ name="kalgebra"; }
{ name="kalzium"; }
{ name="kanagram"; }
{ name="kbruch"; }
{ name="kgeography"; }
{ name="khangman"; }
{ name="kig"; }
{ name="kiten"; }
{ name="klettres"; }
{ name="kmplot"; }
{ name="kstars"; }
{ name="ktouch"; }
{ name="kturtle"; }
{ name="kwordquiz"; }
{ name="libkdeedu"; }
{ name="marble"; }
{ name="pairs"; }
{ name="parley"; }
{ name="rocs"; }
{ name="step"; }
];
}
{
module="kdebindings";
split=true;
pkgs=[
{ name="kimono"; }
{ name="korundum"; }
{ name="kross-interpreters"; sane="kross_interpreters"; }
{ name="perlkde"; }
{ name="perlqt"; }
{ name="pykde4"; }
{ name="qtruby"; }
{ name="qyoto"; }
{ name="smokegen"; }
{ name="smokekde"; }
{ name="smokeqt"; }
];
}
{
module="kdeaccessibility";
split=true;
pkgs=[
{ name="jovie"; }
{ name="kaccessible"; }
{ name="kmag"; }
{ name="kmousetool"; }
{ name="kmouth"; }
];
}
{
module="kde-baseapps";
sane="kde_baseapps"; split=true;
pkgs=[
{ name="kde-baseapps"; sane="kde_baseapps"; }
];
}
{ module="kactivities"; split=false;}
{ module="kdeadmin"; split=false;
pkgs=[
{ name="strigi-analyzer"; sane="strigi_analyzer";}
{ name="kuser"; }
{ name="kcron"; }
{ name="ksystemlog"; }
];
}
{ module="kdeartwork"; split=false;
pkgs=[
{ name="ColorSchemes"; }
{ name="IconThemes"; }
{ name="emoticons"; }
{ name="kscreensaver"; }
{ name="kwin-styles"; sane="kwin_styles";}
{ name="sounds"; }
{ name="styles"; }
{ name="wallpapers"; }
{ name="HighResolutionWallpapers"; }
{ name="WeatherWallpapers"; }
{ name="desktopthemes"; }
];
}
{ module="kde-base-artwork"; sane="kde_base_artwork"; split=false;}
{ module="kdenetwork"; split=false;
pkgs=[
{ name="kfile-plugins"; sane="kfile_plugins";}
{ name="kget"; }
{ name="kopete"; }
{ name="krdc"; }
{ name="kppp"; }
{ name="krfb"; }
{ name="kdnssd"; }
{ name="filesharing"; }
];
}
{ module="kdepim"; split=false;}
{ module="kdepimlibs"; split=false;}
{ module="kdepim-runtime"; sane="kdepim_runtime"; split=false;}
{ module="kdeplasma-addons"; sane="kdeplasma_addons"; split=false;}
{ module="kde-runtime"; sane="kde_runtime"; split=false;}
#had to add fake pkgs to kdesdk to get it to be treated like a split module
{ module="kdesdk"; split=false; pkgs = [{ name="fake"; }]; }
{ module="kdetoys"; split=false;
pkgs=[
{ name="kteatime"; }
{ name="ktux"; }
{ name="amor"; }
];
}
{ module="kde-wallpapers"; sane="kde_wallpapers"; split=false;}
{ module="kdewebdev"; split=false;
pkgs=[
{ name="klinkstatus"; }
{ name="kfilereplace"; }
{ name="kimagemapeditor"; }
{ name="kommander"; }
];
}
{ module="kde-workspace"; sane="kde_workspace"; split=false;}
{ module="oxygen-icons"; sane="oxygen_icons"; split=false;}
];
}

View file

@ -1,11 +1,11 @@
{ kde, kdelibs, shared_desktop_ontologies, bzip2, libssh, exiv2, attica { kde, kdelibs, shared_desktop_ontologies, bzip2, libssh, exiv2, attica
, libcanberra, virtuoso, samba, libjpeg, ntrack, pkgconfig, qca2, xz, pulseaudio , libcanberra, virtuoso, samba, libjpeg, ntrack, pkgconfig, qca2, xz, pulseaudio
, networkmanager, nepomuk_core, kactivities, kdepimlibs , networkmanager, kactivities, kdepimlibs
}: }:
kde { kde {
buildInputs = [ buildInputs = [
kdelibs attica xz bzip2 nepomuk_core libssh libjpeg exiv2 ntrack kdelibs attica xz bzip2 libssh libjpeg exiv2 ntrack
qca2 samba (libcanberra.override { gtk = null; }) pulseaudio qca2 samba (libcanberra.override { gtk = null; }) pulseaudio
networkmanager kactivities kdepimlibs networkmanager kactivities kdepimlibs
#todo: add openslp, openexr #todo: add openslp, openexr

View file

@ -9,7 +9,7 @@ kde {
outputHashAlgo = "sha256"; outputHashAlgo = "sha256";
outputHashMode = "recursive"; outputHashMode = "recursive";
outputHash = "1qpnv4f8f2aga3i1w9k0f0s6myilnm0f9mja8ikkkgi2qpv1q66f"; outputHash = "01k4rr7xkay5j0g8qwmfmvf4d0rjc9sdk121wravsagbidz3s9ci";
meta = { meta = {
description = "Wallpapers for KDE"; description = "Wallpapers for KDE";

View file

@ -1,5 +1,5 @@
{ kde, kdelibs, kdepimlibs, nepomuk_core }: { kde, kdelibs, kdepimlibs }:
kde { kde {
buildInputs = [ kdelibs kdepimlibs nepomuk_core]; buildInputs = [ kdelibs kdepimlibs ];
} }

View file

@ -1,19 +1,21 @@
{ kde, kdelibs, python, sip, pyqt4, kdepimlibs, shared_desktop_ontologies, { kde, kdelibs, python, sip, pyqt4, kdepimlibs, shared_desktop_ontologies,
boost, lndir }: polkit_qt_1, boost, lndir, pkgconfig }:
let pydir = "lib/python${python.majorVersion}"; in let pydir = "lib/python${python.majorVersion}"; in
kde { kde {
#todo: doesn't build
buildInputs = [ python kdepimlibs # todo: polkit isn't found by the build system
# shared_desktop_ontologies boost
]; buildInputs = [
python kdepimlibs shared_desktop_ontologies
boost polkit_qt_1 pkgconfig
];
propagatedBuildInputs = [ pyqt4 sip ]; propagatedBuildInputs = [ pyqt4 sip ];
# patches = [ ./pykde4-hardcode-lib-python.patch ]; # patches = [ ./pykde4-hardcode-lib-python.patch ];
# cmakeFlags = "-DHARDCODE_LIB_PYTHON_PATH=ON ";
cmakeFlags = "-DHARDCODE_LIB_PYTHON_PATH=ON ";
preConfigure = preConfigure =
'' ''

View file

@ -1,5 +1,5 @@
{ kde, cmake, smokeqt, kdelibs, akonadi, kdepimlibs, okular { kde, cmake, smokeqt, kdelibs, akonadi, kdepimlibs, okular
, shared_desktop_ontologies, attica, nepomuk_core }: , shared_desktop_ontologies, attica }:
kde { kde {
# attica, akonadi and kdepimlibs are disabled due to smokegen crash # attica, akonadi and kdepimlibs are disabled due to smokegen crash

View file

@ -1,7 +1,7 @@
{ kde, kdelibs, eigen, xplanet, indilib }: { kde, kdelibs, eigen, xplanet, indilib }:
kde { kde {
#todo:wcslib, doesn't build #todo:wcslib
buildInputs = [ kdelibs eigen xplanet indilib ]; buildInputs = [ kdelibs eigen xplanet indilib ];
meta = { meta = {

View file

@ -1,6 +1,6 @@
{ kde, kdelibs, libkdegames, pythonPackages, sqlite, pykde4 }: { kde, kdelibs, libkdegames, pythonPackages, sqlite, pykde4 }:
kde rec { kde rec {
#todo: doesn't build
buildInputs = [ kdelibs libkdegames pythonPackages.python pythonPackages.wrapPython sqlite ] ++ pythonPath; buildInputs = [ kdelibs libkdegames pythonPackages.python pythonPackages.wrapPython sqlite ] ++ pythonPath;
pythonPath = [ pythonPackages.twisted pykde4 ]; pythonPath = [ pythonPackages.twisted pykde4 ];

View file

@ -57,6 +57,8 @@ kde {
"-DHUPNP_ENABLED=ON" "-DHUPNP_ENABLED=ON"
]; ];
passthru.wantsUdisks2 = false;
meta = { meta = {
description = "KDE libraries"; description = "KDE libraries";
license = "LGPL"; license = "LGPL";

View file

@ -1,14 +1,14 @@
{ kde, kdelibs, speex, libmsn, libotr, kdepimlibs, qimageblitz, libktorrent, { kde, kdelibs, speex, libmsn, libotr, kdepimlibs, qimageblitz, libktorrent,
jasper, libidn, mediastreamer, msilbc, pkgconfig, libxslt, giflib, jasper, libidn, mediastreamer, msilbc, pkgconfig, libxslt, giflib,
libgadu, boost, qca2, gpgme, sqlite, telepathy_qt, shared_desktop_ontologies, libgadu, boost, qca2, gpgme, sqlite, telepathy_qt, shared_desktop_ontologies,
libjpeg, nepomuk_core, libmms }: libjpeg, libmms }:
kde { kde {
#todo: libmeanwhile, xmms #todo: libmeanwhile, xmms
buildInputs = [ buildInputs = [
kdelibs telepathy_qt shared_desktop_ontologies qca2 gpgme libgadu mediastreamer kdelibs telepathy_qt shared_desktop_ontologies qca2 gpgme libgadu mediastreamer
kdepimlibs qimageblitz libktorrent libjpeg sqlite jasper giflib libmsn libotr kdepimlibs qimageblitz libktorrent libjpeg sqlite jasper giflib libmsn libotr
libxslt libidn speex nepomuk_core boost libmms msilbc libxslt libidn speex boost libmms msilbc
]; ];
nativeBuildInputs = [ pkgconfig ]; nativeBuildInputs = [ pkgconfig ];

View file

@ -1,7 +1,7 @@
{ kde, kdelibs, libvncserver, libjpeg }: { kde, kdelibs, libvncserver, libjpeg }:
kde { kde {
#todo: doesn't build
buildInputs = [ kdelibs libvncserver libjpeg ]; buildInputs = [ kdelibs libvncserver libjpeg ];
patches = [ ./kdenetwork.patch ]; patches = [ ./kdenetwork.patch ];

View file

@ -1,10 +1,10 @@
{ kde, fetchurl, cmake, kdelibs, libxslt, boost, kdepimlibs, akonadi { kde, fetchurl, cmake, kdelibs, libxslt, boost, kdepimlibs, akonadi
, shared_desktop_ontologies, nepomuk_core }: , shared_desktop_ontologies }:
kde { kde {
buildInputs = [ buildInputs = [
kdepimlibs akonadi boost shared_desktop_ontologies kdepimlibs akonadi boost shared_desktop_ontologies
libxslt nepomuk_core libxslt
]; ];
#todo: libkgapi, libkolab, libkolabxml #todo: libkgapi, libkolab, libkolabxml
meta = { meta = {

View file

@ -1,11 +1,11 @@
{ kde, boost, gpgme, libassuan, libxslt, kdepimlibs, kdepim_runtime { kde, boost, gpgme, libassuan, libxslt, kdepimlibs, kdepim_runtime
, akonadi, shared_desktop_ontologies, cyrus_sasl, grantlee, prison , akonadi, shared_desktop_ontologies, cyrus_sasl, grantlee, prison
, nepomuk_core, nepomuk_widgets, dblatex }: , nepomuk_widgets, dblatex }:
kde { kde {
#todo: update grantlee to 0.3 #todo: update grantlee to 0.3
buildInputs = buildInputs =
[ kdepimlibs boost akonadi shared_desktop_ontologies nepomuk_core nepomuk_widgets [ kdepimlibs boost akonadi shared_desktop_ontologies nepomuk_widgets
libxslt cyrus_sasl gpgme libassuan grantlee prison dblatex libxslt cyrus_sasl gpgme libassuan grantlee prison dblatex
]; ];

View file

@ -4,11 +4,11 @@
kde { kde {
buildInputs = buildInputs =
[ boost gpgme libical libxslt nepomuk_core qjson [ boost gpgme libical libxslt qjson
openldap cyrus_sasl akonadi shared_desktop_ontologies openldap cyrus_sasl akonadi shared_desktop_ontologies
]; ];
propagatedBuildInputs = [ kdelibs ]; propagatedBuildInputs = [ kdelibs nepomuk_core ];
meta = { meta = {
description = "KDE PIM libraries"; description = "KDE PIM libraries";

View file

@ -1,7 +1,7 @@
{ kde, kdelibs, marble, shared_desktop_ontologies, pkgconfig { kde, kdelibs, marble, shared_desktop_ontologies, pkgconfig
, boost, eigen, kde_workspace, attica, python, qca2, qimageblitz , boost, eigen, kde_workspace, attica, python, qca2, qimageblitz
, kdepimlibs, libkexiv2, libqalculate, libXtst, libdbusmenu_qt , kdepimlibs, libkexiv2, libqalculate, libXtst, libdbusmenu_qt
, qjson, qoauth, nepomuk_core }: , qjson, qoauth }:
# TODO: qwt, scim, ibus # TODO: qwt, scim, ibus
kde { kde {
@ -9,7 +9,7 @@ kde {
KDEDIRS=marble; KDEDIRS=marble;
buildInputs = [ kdelibs boost kde_workspace kdepimlibs attica qjson qoauth buildInputs = [ kdelibs boost kde_workspace kdepimlibs attica qjson qoauth
eigen qca2 libXtst qimageblitz nepomuk_core eigen qca2 libXtst qimageblitz
libqalculate shared_desktop_ontologies marble libkexiv2 libdbusmenu_qt libqalculate shared_desktop_ontologies marble libkexiv2 libdbusmenu_qt
]; ];

View file

@ -1,11 +1,15 @@
{ kde, kdelibs, kde_baseapps }: { kde, kdelibs, kde_baseapps }:
kde { kde {
#todo: doesn't build
# Needs kdebase for libkonq # Needs kdebase for libkonq
buildInputs = [ kdelibs kde_baseapps ]; buildInputs = [ kdelibs kde_baseapps ];
patchPhase = ''
sed -i 's@macro_optional_add_subdirectory(bazaar)@add_subdirectory(bazaar)@' dolphin-plugins/CMakeLists.txt
'';
meta = { meta = {
description = "Svn plugin for dolphin"; description = "Bazaar plugin for dolphin";
}; };
} }

View file

@ -1,10 +1,14 @@
{ kde, kdelibs, kde_baseapps }: { kde, kdelibs, kde_baseapps }:
kde { kde {
#todo: doesn't build
# Needs kdebase for libkonq # Needs kdebase for libkonq
buildInputs = [ kdelibs kde_baseapps ]; buildInputs = [ kdelibs kde_baseapps ];
patchPhase = ''
sed -i 's@macro_optional_add_subdirectory(git)@add_subdirectory(git)@' dolphin-plugins/CMakeLists.txt
'';
meta = { meta = {
description = "Git plugin for dolphin"; description = "Git plugin for dolphin";
}; };

View file

@ -1,11 +1,15 @@
{ kde, kdelibs, kde_baseapps }: { kde, kdelibs, kde_baseapps }:
kde { kde {
#todo: doesn't build
# Needs kdebase for libkonq # Needs kdebase for libkonq
buildInputs = [ kdelibs kde_baseapps ]; buildInputs = [ kdelibs kde_baseapps ];
patchPhase = ''
sed -i 's@macro_optional_add_subdirectory(hg)@add_subdirectory(hg)@' dolphin-plugins/CMakeLists.txt
'';
meta = { meta = {
description = "Svn plugin for dolphin"; description = "Mercurial plugin for dolphin";
}; };
} }

View file

@ -1,10 +1,14 @@
{ kde, kdelibs, kde_baseapps }: { kde, kdelibs, kde_baseapps }:
kde { kde {
#todo: doesn't build
# Needs kdebase for libkonq # Needs kdebase for libkonq
buildInputs = [ kdelibs kde_baseapps ]; buildInputs = [ kdelibs kde_baseapps ];
patchPhase = ''
sed -i 's@macro_optional_add_subdirectory(svn)@add_subdirectory(svn)@' dolphin-plugins/CMakeLists.txt
'';
meta = { meta = {
description = "Svn plugin for dolphin"; description = "Svn plugin for dolphin";
}; };

View file

@ -1,57 +0,0 @@
diff --git a/cmake/modules/FindSVN.cmake b/cmake/modules/FindSVN.cmake
index 59bcb96..2eac05d 100644
--- a/cmake/modules/FindSVN.cmake
+++ b/cmake/modules/FindSVN.cmake
@@ -17,6 +17,9 @@ FIND_PROGRAM(SVNCONFIG_EXECUTABLE NAMES svn-config PATHS
FIND_PROGRAM(APRCONFIG_EXECUTABLE NAMES apr-1-config apr-config PATHS
/usr/local/apr/bin
)
+find_program(APUCONFIG_EXECUTABLE NAMES apu-1-config apu-config PATHS
+ /usr/local/apr/bin
+)
if(SVNCONFIG_EXECUTABLE)
@@ -56,15 +59,8 @@ else(SVNCONFIG_EXECUTABLE)
set(SVN_INCLUDES ${SVN_INCLUDES} ${_INCLUDES})
else(APRCONFIG_EXECUTABLE)
FIND_PATH(_INCLUDES apr_pools.h
- ${SVN_INCLUDES}/apr-0/
- ${SVN_INCLUDES}/apr-1/
- ${SVN_INCLUDES}/apr-1.0/
- /usr/include/apr-0/
- /usr/include/apr-1/
- /usr/include/apr-1.0/
- /usr/local/include/apr-0/
- /usr/local/include/apr-1/
- /usr/local/include/apr-1.0/
+ HINTS ${SVN_INCLUDES}
+ SUFFIXES apr-0 apr-1 apr-1.0
)
if(_INCLUDES)
set(SVN_INCLUDES ${SVN_INCLUDES} ${_INCLUDES})
@@ -72,6 +69,24 @@ else(SVNCONFIG_EXECUTABLE)
set(SVN_FOUND FALSE) # no apr == can't compile!
endif(_INCLUDES)
endif(APRCONFIG_EXECUTABLE)
+
+ # Use apu-config if it exists
+ if(APUCONFIG_EXECUTABLE)
+ EXEC_PROGRAM(${APUCONFIG_EXECUTABLE} ARGS --includes RETURN_VALUE _return_VALUE OUTPUT_VARIABLE _INCLUDES)
+ string(REPLACE "-I" "" _INCLUDES ${_INCLUDES})
+ string(REPLACE " " ";" _INCLUDES ${_INCLUDES})
+ set(SVN_INCLUDES ${SVN_INCLUDES} ${_INCLUDES})
+ else(APUCONFIG_EXECUTABLE)
+ FIND_PATH(_INCLUDES apu.h
+ HINTS ${SVN_INCLUDES}
+ SUFFIXES apr-0 apr-1 apr-1.0
+ )
+ if(_INCLUDES)
+ set(SVN_INCLUDES ${SVN_INCLUDES} ${_INCLUDES})
+ else(_INCLUDES)
+ set(SVN_FOUND FALSE) # no apr == can't compile!
+ endif(_INCLUDES)
+ endif(APUCONFIG_EXECUTABLE)
FIND_LIBRARY(SVN_LIBRARIES NAMES svn_client-1)
if(SVN_LIBRARIES)
FIND_LIBRARY(_LIBRARIES NAMES svn_subr-1)

View file

@ -1,9 +1,11 @@
{ kde, kdelibs, gettext }: { kde, kdelibs, gettext }:
kde { kde {
#todo: doesn't build
buildInputs = [ kdelibs gettext ]; buildInputs = [ kdelibs gettext ];
patches = [ ./thumbnailers-add-subdirectory.patch ];
meta = { meta = {
description = "PO file format thumbnailer"; description = "PO file format thumbnailer";
}; };

View file

@ -1,7 +1,7 @@
{ kde, kdelibs, perl }: { kde, kdelibs, perl }:
kde { kde {
#todo: doesn't build
buildInputs = [ kdelibs perl ]; buildInputs = [ kdelibs perl ];
cmakeFlags = [ "-DBUILD_perldoc=ON" ]; cmakeFlags = [ "-DBUILD_perldoc=ON" ];

View file

@ -1,10 +1,8 @@
{ kde, kdelibs, subversionClient, apr, aprutil }: { kde, kdelibs, subversionClient, apr, aprutil }:
kde { kde {
#todo: doesn't build
buildInputs = [ kdelibs subversionClient apr aprutil ];
patches = [ ./find-svn.patch ]; buildInputs = [ kdelibs subversionClient apr aprutil ];
meta = { meta = {
description = "Subversion kioslave"; description = "Subversion kioslave";

View file

@ -0,0 +1,12 @@
diff -Naur kdesdk-4.10.2-upstream/kdesdk-thumbnailers/CMakeLists.txt kdesdk-4.10.2/kdesdk-thumbnailers/CMakeLists.txt
--- kdesdk-4.10.2-upstream/kdesdk-thumbnailers/CMakeLists.txt 2013-05-02 21:05:56.446226846 -0430
+++ kdesdk-4.10.2/kdesdk-thumbnailers/CMakeLists.txt 2013-05-02 21:09:58.504053136 -0430
@@ -9,7 +9,7 @@
macro_log_feature(GETTEXTPO_FOUND "gettext-po" "A library for processing PO files" "www.gnu.org/software/gettext" FALSE "" "Required to build the PO thumbnailer")
if(GETTEXTPO_FOUND)
-macro_optional_add_subdirectory(po_thumbnailer)
+add_subdirectory(po_thumbnailer)
endif(GETTEXTPO_FOUND)
macro_display_feature_log()

View file

@ -1,7 +1,7 @@
{ kde, kdelibs, kdepimlibs, nepomuk_core }: { kde, kdelibs, kdepimlibs }:
kde { kde {
buildInputs = [ kdelibs kdepimlibs nepomuk_core ]; buildInputs = [ kdelibs kdepimlibs ];
meta = { meta = {
description = "Simple KDE GUI for GPG"; description = "Simple KDE GUI for GPG";

View file

@ -1,5 +1,5 @@
{ kde, kdelibs { kde, kdelibs
, pythonPackages, sip, pyqt4, pykde4, pycups, rhpl, system_config_printer , pythonPackages, cups, sip, pyqt4, pykde4, pycups, rhpl, system_config_printer
, pythonDBus, makeWrapper }: , pythonDBus, makeWrapper }:
let s_c_p = system_config_printer.override { withGUI = false; }; in let s_c_p = system_config_printer.override { withGUI = false; }; in
@ -8,7 +8,7 @@ kde rec {
buildInputs = [ kdelibs pythonPackages.python pythonPackages.wrapPython buildInputs = [ kdelibs pythonPackages.python pythonPackages.wrapPython
] ++ pythonPath; ] ++ pythonPath;
pythonPath = [ pyqt4 pykde4 pycups s_c_p ]; pythonPath = [ cups pyqt4 pykde4 pycups s_c_p ];
passthru.propagatedUserEnvPackages = [ s_c_p ]; passthru.propagatedUserEnvPackages = [ s_c_p ];

View file

@ -1,9 +1,9 @@
{ kde, kdelibs, libxml2, libxslt, kdepimlibs, nepomuk_core, htmlTidy, boost }: { kde, kdelibs, libxml2, libxslt, kdepimlibs, htmlTidy, boost }:
kde { kde {
#todo: ruby is not found. needed for some example scripts #todo: ruby is not found. needed for some example scripts
buildInputs = buildInputs =
[ kdelibs kdepimlibs htmlTidy nepomuk_core boost ]; [ kdelibs kdepimlibs htmlTidy boost ];
meta = { meta = {
description = "A KDE link checker"; description = "A KDE link checker";

View file

@ -1,282 +0,0 @@
[
{
lang = "ar";
saneName = "ar";
sha256 = "1si3hkxag2s93vywr8spiwaz8rr287b8ms0akw7ba4hr3mccgllz";
}
{
lang = "bg";
saneName = "bg";
sha256 = "1dfp2zkzj5h0qqz03sicdvw024afc49vlj59k973vqnziwqwkvil";
}
{
lang = "bs";
saneName = "bs";
sha256 = "0v56by3jxpn76dcbrz89np6par2ndmz6l9lgpyzi3qgh7c1flh3k";
}
{
lang = "ca";
saneName = "ca";
sha256 = "0xj157l9h6frac4pnfsirh06j7kdq37wlikm7rnybnpdg7nv4kls";
}
{
lang = "ca@valencia";
saneName = "ca_valencia";
sha256 = "0zrc3cpbiarsfh2jqrrhxalmz62k5bb9wf9vbfcvbh90a0v5csaw";
}
{
lang = "cs";
saneName = "cs";
sha256 = "1scy726cxyv6gmh77wnfb8qb00vhhxxg1wwg8lk56r79jsh77pbh";
}
{
lang = "da";
saneName = "da";
sha256 = "1qdhzw9v1q188bky8phv3wj0sj3imf08j3bqqf2gcniw2zr0nkhq";
}
{
lang = "de";
saneName = "de";
sha256 = "13r97in3yl17scq41fncbzp3s99c2ahspxixcjb5b066c9ln4n4z";
}
{
lang = "el";
saneName = "el";
sha256 = "0c3w2cxmv46l85kg9d68v037br0ck423k0zfkyi01hgh76jixhnm";
}
{
lang = "en_GB";
saneName = "en_GB";
sha256 = "158i25z1b5hj5fhhsczf52l2369xmzyxfjjr1xp9pp5aga2kp3dc";
}
{
lang = "es";
saneName = "es";
sha256 = "0vm2sr5nqzjssm2mzjw56wwsygzasrr04pl77y4mvq1d573gaks3";
}
{
lang = "et";
saneName = "et";
sha256 = "0w4dqvgain4m14cr8vmr49a890lmjiz203vw347fyq6mvqg57f3z";
}
{
lang = "eu";
saneName = "eu";
sha256 = "1809g1jdbrp22572h68zr7a5riymzv240hpmh633v8qmdqyzmnlk";
}
{
lang = "fa";
saneName = "fa";
sha256 = "1y1m9zagw1wras6vfrw6zbhy08xm1djfg7wg0fqvr2pnw01b903f";
}
{
lang = "fi";
saneName = "fi";
sha256 = "0fd6zbxn1dcq3i8vp6m4ifsrfhpghbgvwrh0gqmpw60kr9ms72pj";
}
{
lang = "fr";
saneName = "fr";
sha256 = "1ybdnvsb2fi8hymad4fj7dhgfqjabbhgjgmcs4g0px583gbx38ys";
}
{
lang = "ga";
saneName = "ga";
sha256 = "1hcdx82213dhy6v2hy9c543fci8pj3p5lz2bb0sds14wscryngiy";
}
{
lang = "gl";
saneName = "gl";
sha256 = "0p0k0r42wqp9ww0w4k4dp0cp9mv4is1zffsnpb1vdj8fr4n73lms";
}
{
lang = "he";
saneName = "he";
sha256 = "0wfyx7w2igz078f9s3nf2gr2s2bj6kdrpsd4cycdrvi7lpkv97mg";
}
{
lang = "hi";
saneName = "hi";
sha256 = "0nr6lskvq4v885hlnwyn5c6r76lj923lnmzz7f3ymxsm8ahgy9i1";
}
{
lang = "hr";
saneName = "hr";
sha256 = "1zg11q416rlcwygbapllmhwy577gwrvxyrr2hv0knz8r6jdwxnxj";
}
{
lang = "hu";
saneName = "hu";
sha256 = "1km3w6m7m3w3315ivy80rwmn82g41cfw3id21ks8sykqray60jyf";
}
{
lang = "ia";
saneName = "ia";
sha256 = "1rb6qsvhp8r7ivsjcp2980vdkb5pczxky6wix884xdd2jyb4dqbs";
}
{
lang = "is";
saneName = "is";
sha256 = "0kngwsasyw36g05xbxcgn71mkl89xs3sg8lx3qzd6g7drk2s5r1w";
}
{
lang = "it";
saneName = "it";
sha256 = "1ckb7alln8f72x9q6hi4ji7xylaipd3zwilnrr7978y1q5b8297l";
}
{
lang = "ja";
saneName = "ja";
sha256 = "1s0m6kl0wdd22pbnrnmxq19y1nzyvmln64g5gqr9c33x08lwd3jz";
}
{
lang = "kk";
saneName = "kk";
sha256 = "1jn3pd4j5jpw8ing7hi0npkrk4cy5vbfp62jcpn93dizq71g0cis";
}
{
lang = "km";
saneName = "km";
sha256 = "1y6492rmh8hw3fw8yss80j8dnn6gah4mp207wnjx7savxdganrk9";
}
{
lang = "ko";
saneName = "ko";
sha256 = "05r7cslynx4yxlkaqq2lhjg2rmvjzz74h41if5fj3lkm9p848663";
}
{
lang = "lt";
saneName = "lt";
sha256 = "1xa7jc3jbhicqzikayssmm08mnqwhwy3gbr2xp2wyxvrwgy0vd7b";
}
{
lang = "lv";
saneName = "lv";
sha256 = "1xr2938yqkl81rwcfg43mqksm9r6zcw5bp49cm5ybrrr1np08d4p";
}
{
lang = "mr";
saneName = "mr";
sha256 = "0w4g863da74vabbx6dc7hpf6lqa09bsxm5bdl33bqp6wxz0qbrxf";
}
{
lang = "nb";
saneName = "nb";
sha256 = "1axqkkwgm3x12fpfnvxzm2bf22rh2fxic15rrk70sjc0xzkmbfc2";
}
{
lang = "nds";
saneName = "nds";
sha256 = "1y72jrw7s6afznj0axwrxczvcxm2i3m9dldjjb32w8lr2gbibhz9";
}
{
lang = "nl";
saneName = "nl";
sha256 = "01ps3fgwhzffsb52zcjgi4frgy719wlgjmrva9hl320wgi6bgs30";
}
{
lang = "nn";
saneName = "nn";
sha256 = "0a9zrn54x38c4jn2p59s3wiv42g1f7nwar2gppn992q2awq05m6x";
}
{
lang = "pa";
saneName = "pa";
sha256 = "1782vpj199ck5fswv3jc0adff0k7bv699b4la604kb0a7dl43cf2";
}
{
lang = "pl";
saneName = "pl";
sha256 = "0lldhl2jd51j3srf2dqq6gd4nxy6y3qxd585bgxpclvnmz7zqq9b";
}
{
lang = "pt";
saneName = "pt";
sha256 = "10w740h5h3ag2jpj44xyclpya59d8jmgv5ma1rz27wcvwl38jggx";
}
{
lang = "pt_BR";
saneName = "pt_BR";
sha256 = "1rn5jc9dihi0mwvly1rk1fqzdbhyg9gxax1bip0l80wg8mj9d0h5";
}
{
lang = "ro";
saneName = "ro";
sha256 = "1l1b9j9ixianyvbg2msc4d4bkm2km3w0h6xkbcyl7rg0cja9ys8l";
}
{
lang = "ru";
saneName = "ru";
sha256 = "0rgasg2c0ds96yqky1rnqj7fc9w3g6p0ng27v5vq3ja7paij1yv9";
}
{
lang = "si";
saneName = "si";
sha256 = "0124dhn1ng225zhyz8lmc2lf6cpxbbirr3bl3h6cq8lyjs4p078l";
}
{
lang = "sk";
saneName = "sk";
sha256 = "0xfp2wh1qyyh1cixypam9qnni0zin580vcbnhpmbx5disy3znmga";
}
{
lang = "sl";
saneName = "sl";
sha256 = "1hfqq8k5n48hjypj5sribh761gpgn930410qbdnrxjmm0l95rzlp";
}
{
lang = "sr";
saneName = "sr";
sha256 = "1rma3l9mpm1xakkf2mkjpa6nxhl076hnm6fiirna7nsgvsk2c3jz";
}
{
lang = "sv";
saneName = "sv";
sha256 = "02rg9hm0j1lfdv9nb80bh4yy41z3rvfh39w8xwrmv941y6k58q7w";
}
{
lang = "tg";
saneName = "tg";
sha256 = "16731c2bjg3c8r7i6lm6j3gsj9yqs2yd69sl04y9nv5yh1i0km15";
}
{
lang = "th";
saneName = "th";
sha256 = "032zwwn5za8cknmqxd8yzr3djylnvrzjldgygqlshf0pxkryjkrp";
}
{
lang = "tr";
saneName = "tr";
sha256 = "1bp8bndwyw33rkkv2dhs1l9qbzkhccsrqcflxnjrm98shks2vgzr";
}
{
lang = "ug";
saneName = "ug";
sha256 = "0hhdj4yb208rmpd9a77jf7x9p5iq35iyvn68sr6n1m228pncddi6";
}
{
lang = "uk";
saneName = "uk";
sha256 = "0sw07alwjw7qiss93bgf4h5ix9kpz2czfwbbgdydfwqcwz5nzvcy";
}
{
lang = "vi";
saneName = "vi";
sha256 = "06fchmphkp7rpg6i0gd50qyjlfr6drj0xnlkdczw54iy1zklrlmh";
}
{
lang = "wa";
saneName = "wa";
sha256 = "1pm3wvs88h03gch6nzn5hd268r2q4jd13slh6bh2nvhq719g8zsa";
}
{
lang = "zh_CN";
saneName = "zh_CN";
sha256 = "0k8j3dprpzxi87rd6xhp1qr93jg91i0hym87y7wlqb239aqz41dn";
}
{
lang = "zh_TW";
saneName = "zh_TW";
sha256 = "05ks7gdl3x6wkxs2rdj6f48bpd4cishw9zfh0a264kix6mh2fzcq";
}
]

View file

@ -0,0 +1,282 @@
[
{
lang = "ar";
saneName = "ar";
sha256 = "0m9zzggcq9ril1wklq1w94hgqdzg78m9v932j1hv1h1nvsjf2gkl";
}
{
lang = "bg";
saneName = "bg";
sha256 = "1c6y2b249sh8k76q1ahw1z4lfn9riqhngxhmrjc6qsi3lpfd851n";
}
{
lang = "bs";
saneName = "bs";
sha256 = "0q7jcw0085cm8wnr5fykim6yvvvps4hn9z9anb8dmgxrzyvvr2p4";
}
{
lang = "ca";
saneName = "ca";
sha256 = "1mzcmxqlabgfhdq4bkwcc5gv2dpx0yxkwln5whyjzy7jz5wz5hhl";
}
{
lang = "ca@valencia";
saneName = "ca_valencia";
sha256 = "1laz6av9xssdmkd3xcz68bbjdp1b61py0xpqhj90ma1bhza9rk5v";
}
{
lang = "cs";
saneName = "cs";
sha256 = "12smzrr5chavlg0xis993f60hwqrh1hrbkh0n6n5m3mdsfi5dwix";
}
{
lang = "da";
saneName = "da";
sha256 = "0a0hm328lvw9ahw4xmbwsyngidpawjcc3fi9kinqsss4srm257jc";
}
{
lang = "de";
saneName = "de";
sha256 = "1wz9ly4yqs20s3c6lb92p8v1hylidkp57j8v02qys7883j5rii8w";
}
{
lang = "el";
saneName = "el";
sha256 = "0954c5jar0lmjnivnnbbs2b04xd58l7s0s3adbnrg392cvq92ca7";
}
{
lang = "en_GB";
saneName = "en_GB";
sha256 = "15y0s4y9rqqc8g0qm9v4l9w2km6589xckyd9c21bqhx0nsk2dm5k";
}
{
lang = "es";
saneName = "es";
sha256 = "0d7blp0xc808gfhyjww60zdr9wbp5lx1m4i8cca8l683rbxqcbvb";
}
{
lang = "et";
saneName = "et";
sha256 = "07l9w9mk4xylk5s00xs1i8vpa0fhy2fxngqayqyr3n0ljj0ls9my";
}
{
lang = "eu";
saneName = "eu";
sha256 = "1g8yap82jz9nvj25bihrw4xrbjq6669l3qlikjsb89x9jxdslncj";
}
{
lang = "fa";
saneName = "fa";
sha256 = "0492aps0xvw8krcq5h0rx7farm96k0s3apc3lhxxx9g1flxpjffa";
}
{
lang = "fi";
saneName = "fi";
sha256 = "0pnmjikbn077h6p2inkpisgyrkmfy0wphbmif3spli07nakd1kaw";
}
{
lang = "fr";
saneName = "fr";
sha256 = "1hs53c35fpxkrgfpdfp3qxyy6sh6wv2zcb078rrpc1yc8vjxs31q";
}
{
lang = "ga";
saneName = "ga";
sha256 = "1d6ch6hkc7vncpwkqg5prm1ngkgckr8ynk32w6vi5lkhcc1lmi2g";
}
{
lang = "gl";
saneName = "gl";
sha256 = "16jrf6zb4glsighllq7n1hg73la6g3gzbzs4c56yhgyyi8x02i7h";
}
{
lang = "he";
saneName = "he";
sha256 = "0gjhnypd2lrrx2v0kn2h2iqclhy8fh38z5fzry2m0dgzxqpj7nmw";
}
{
lang = "hi";
saneName = "hi";
sha256 = "0pplwd10jancgfilywl12fifsnng1dw1j87ph1khgx786q0fncwj";
}
{
lang = "hr";
saneName = "hr";
sha256 = "1a33p1pic8g9cfjx1inry1dxf2lsz91cw7v3niwv5a3xsyd1p5sw";
}
{
lang = "hu";
saneName = "hu";
sha256 = "08q62d900hyfzf2lnysjk4bg7gg5lgna80x537fkpz5klbmhipar";
}
{
lang = "ia";
saneName = "ia";
sha256 = "010gjkpky3arbfhhhwb51px2qwcn35ppfg1rhm16vvpmi4whz768";
}
{
lang = "is";
saneName = "is";
sha256 = "1pdla5xvx0jqs0bzz8ncgjllg39wa4a67lzz9mr2j4w51c4y2s5p";
}
{
lang = "it";
saneName = "it";
sha256 = "1i2cvvyknjmznag1raf1i3d6s91m084whk2vk5kywlbncmncx3bm";
}
{
lang = "ja";
saneName = "ja";
sha256 = "18b5j98ysg9ps232wj5b3rkxqhj002rr2yzkffsysmqm6232azw6";
}
{
lang = "kk";
saneName = "kk";
sha256 = "14n8y8wy8pbvxix4zgs2lvffcppya491y79pgr4zfgjbckz8hbw9";
}
{
lang = "km";
saneName = "km";
sha256 = "0qy7xzn8asv8nxq899fisbjdflz2dmg1kx8zmw78xxjyl6kdiqrc";
}
{
lang = "ko";
saneName = "ko";
sha256 = "0l9h9q8c6z8g4hc2vk6vla85gjk9ghkwpwd7mpqsa8q60qbqa1r3";
}
{
lang = "lt";
saneName = "lt";
sha256 = "0xq83xnx533075ml5xg4mnhi8a5k41v16riqd9rfgbwj82w098xz";
}
{
lang = "lv";
saneName = "lv";
sha256 = "1x1afwssvxzkk605j9895c3h363gnra9zjyw5fyvgh02hrfysv7f";
}
{
lang = "mr";
saneName = "mr";
sha256 = "1akl0l8dmsshwsvy0m9hlprkxlx345v1r5wh2zbyad3nzz1sa2ig";
}
{
lang = "nb";
saneName = "nb";
sha256 = "1div9bf6hhisrvcrlmdiwkzk4wnff2gdzwjp81nqldfhaw098hip";
}
{
lang = "nds";
saneName = "nds";
sha256 = "1ll2m6jxkwqg6z7bp816j04gf7a0x98yk3qxlp7an4khacqy60pl";
}
{
lang = "nl";
saneName = "nl";
sha256 = "0dchxgsr8m1awwahwqyrbrq55035rpkv6387z9qwmz8098yx1vgf";
}
{
lang = "nn";
saneName = "nn";
sha256 = "1liv2q1yblq55lk20sg4qma4kfa05c1wsp1y8zqv456h10ksmh67";
}
{
lang = "pa";
saneName = "pa";
sha256 = "031idmcpkcnr3qmbg94zwpzf8vw5wia8mndggis6shrf9gnnkhs2";
}
{
lang = "pl";
saneName = "pl";
sha256 = "1k5ng4gxn7gnhhh674fzwhhzwmawnxx5bn94dhizsqx3ix533vlw";
}
{
lang = "pt";
saneName = "pt";
sha256 = "0v4nv8d1v8fvsgb6mhxkymcbndjdc9qgx8kd5b2hpyqnppgib4vm";
}
{
lang = "pt_BR";
saneName = "pt_BR";
sha256 = "1i7siqyh0ds1g6w7vzsys6zdvgphs14hd4xxh66qn5s5zmrr0l83";
}
{
lang = "ro";
saneName = "ro";
sha256 = "02vf365r6mr0bghkj58f6d6ivkd4fcp6mxy9jz7ap8km8jjbiyky";
}
{
lang = "ru";
saneName = "ru";
sha256 = "0rjm6c6aw1kim61rgp8fkqgi9915d6kh1jk4kas064gkwwxl3q2p";
}
{
lang = "si";
saneName = "si";
sha256 = "12z8bvd1a0hzr9x05pv09lznnfh9mngxw86rhfyhx382zrbz1vha";
}
{
lang = "sk";
saneName = "sk";
sha256 = "16xbin5c8slxxdag7zl8xigmmklm6fl3icy4qdhaglvim07xf995";
}
{
lang = "sl";
saneName = "sl";
sha256 = "09flw3yr3slhqgjl3aq2p25rl46a90q7gd3p7812lmw3lwpcaxh6";
}
{
lang = "sr";
saneName = "sr";
sha256 = "1p4xlshvz6avnr9dc7yggn53lfh1i5hz14dr8i1ndwj8bhgrzy6m";
}
{
lang = "sv";
saneName = "sv";
sha256 = "10ma8f1csc2akg0vfwh1wmhj9bwwq0yfn1s5x5ighn67z4jxbp0s";
}
{
lang = "tg";
saneName = "tg";
sha256 = "065x638nr5wsxs9y0hldbdkp0wgyfnrjlsmyvhg96abrlbs4kgid";
}
{
lang = "th";
saneName = "th";
sha256 = "1qk9khh63qqj5pz92w6l1c1ailcm02mhka215b7qw3waackab3iq";
}
{
lang = "tr";
saneName = "tr";
sha256 = "1n7w8pmn4r4d3hqm88ya2j3phxsvgy8d57skym3lv30y4116yzkj";
}
{
lang = "ug";
saneName = "ug";
sha256 = "068s6ilx62l33iandrdisqd2405hhp5gpxpl7x95avrsy016ni1c";
}
{
lang = "uk";
saneName = "uk";
sha256 = "1jvs7bmppzzw1wahcmdy4cq7sblsl6vhrfz91ryc4jcr4klxy7k4";
}
{
lang = "vi";
saneName = "vi";
sha256 = "0knnc1f7pwfm10xiykajax1xp41psvak1n479n6dji3na0larf5s";
}
{
lang = "wa";
saneName = "wa";
sha256 = "0fw8d3ia3pxpkn6q03188z636z3gk2xciq3igkyjdyfmf14nbwv6";
}
{
lang = "zh_CN";
saneName = "zh_CN";
sha256 = "0s16ns3zjcabq3s27ak9isyqikd6gw5gyvxji5fly9mgcs1dkgmr";
}
{
lang = "zh_TW";
saneName = "zh_TW";
sha256 = "0fy6cib6c7xnacjybyizb3chynqd1fv70447glvjwls9v8avgcpl";
}
]

View file

@ -3,7 +3,7 @@
kde { kde {
outputHashAlgo = "sha256"; outputHashAlgo = "sha256";
outputHashMode = "recursive"; outputHashMode = "recursive";
outputHash = "10dpbgidn7rwdhm044ydd294dv97hrhaz7jakf1yncszqbhbxksc"; outputHash = "13fyib1v03n3fpq27n2q1yg130qjnz80kwdqccq46za96xb6yrs9";
nativeBuildInputs = [ cmake ]; nativeBuildInputs = [ cmake ];

View file

@ -0,0 +1,91 @@
commit 017822bd0dfc83fe9a7a483ecc33f4aab839a3c6
Author: Luca Beltrame <lbeltrame@kde.org>
Date: Mon Oct 1 20:47:56 2012 +0200
Remove duplicated QVector<int> definition, since it's in PyQt now.
Simon, if you have time, please review if everything is OK.
CCMAIL: simon@simonzone.com
diff --git a/sip/kdecore/typedefs.sip b/sip/kdecore/typedefs.sip
index 5a0a080..73dad01 100644
--- a/sip/kdecore/typedefs.sip
+++ b/sip/kdecore/typedefs.sip
@@ -951,77 +951,3 @@ template <TYPE1>
%End
};
-%MappedType QVector<int>
-{
-%TypeHeaderCode
-#include <qvector.h>
-%End
-
-%ConvertFromTypeCode
- // Create the list.
- PyObject *l;
-
- if ((l = PyList_New(sipCpp->size())) == NULL)
- return NULL;
-
- // Set the list elements.
- for (int i = 0; i < sipCpp->size(); ++i)
- {
- int t = (sipCpp->at(i));
-
-#if PY_MAJOR_VERSION >= 3
- PyObject *tobj = PyLong_FromLong(t);
-#else
- PyObject *tobj = PyInt_FromLong(t);
-#endif
-
- PyList_SET_ITEM(l, i, tobj);
- }
-
- return l;
-%End
-
-%ConvertToTypeCode
- // Check the type if that is all that is required.
- if (sipIsErr == NULL)
- {
- if (!PyList_Check(sipPy))
- return 0;
-
- for (int i = 0; i < PyList_GET_SIZE(sipPy); ++i) {
- PyObject *tobj = PyList_GET_ITEM(sipPy, i);
-#if PY_MAJOR_VERSION >= 3
- if (!PyNumber_Check(tobj))
-#else
- if (!PyInt_Check(tobj))
-#endif
- return 0;
- }
- return 1;
- }
-
- QVector<int> *qv = new QVector<int>;
-
- for (int i = 0; i < PyList_GET_SIZE(sipPy); ++i)
- {
- PyObject *tobj = PyList_GET_ITEM(sipPy, i);
- #if PY_MAJOR_VERSION >= 3
- int t = PyLong_AsLong (tobj);
-#else
- int t = PyInt_AS_LONG (tobj);
-#endif
-
- if (*sipIsErr)
- {
- delete qv;
- return 0;
- }
-
- qv->append(t);
- }
-
- *sipCppPtr = qv;
-
- return sipGetState(sipTransferObj);
-%End
-};

View file

@ -10,7 +10,7 @@ kde {
#NIX_CFLAGS_COMPILE = "-I${phonon}/include/phonon"; #NIX_CFLAGS_COMPILE = "-I${phonon}/include/phonon";
patches = [ ./pykde-purity.patch ]; patches = [ ./pykde-purity.patch ./pykde4-new-sip.patch ];
cmakeFlags = "-DHARDCODE_LIB_PYTHON_PATH=ON"; cmakeFlags = "-DHARDCODE_LIB_PYTHON_PATH=ON";

View file

@ -0,0 +1,91 @@
commit 017822bd0dfc83fe9a7a483ecc33f4aab839a3c6
Author: Luca Beltrame <lbeltrame@kde.org>
Date: Mon Oct 1 20:47:56 2012 +0200
Remove duplicated QVector<int> definition, since it's in PyQt now.
Simon, if you have time, please review if everything is OK.
CCMAIL: simon@simonzone.com
diff --git a/sip/kdecore/typedefs.sip b/sip/kdecore/typedefs.sip
index 5a0a080..73dad01 100644
--- a/sip/kdecore/typedefs.sip
+++ b/sip/kdecore/typedefs.sip
@@ -951,77 +951,3 @@ template <TYPE1>
%End
};
-%MappedType QVector<int>
-{
-%TypeHeaderCode
-#include <qvector.h>
-%End
-
-%ConvertFromTypeCode
- // Create the list.
- PyObject *l;
-
- if ((l = PyList_New(sipCpp->size())) == NULL)
- return NULL;
-
- // Set the list elements.
- for (int i = 0; i < sipCpp->size(); ++i)
- {
- int t = (sipCpp->at(i));
-
-#if PY_MAJOR_VERSION >= 3
- PyObject *tobj = PyLong_FromLong(t);
-#else
- PyObject *tobj = PyInt_FromLong(t);
-#endif
-
- PyList_SET_ITEM(l, i, tobj);
- }
-
- return l;
-%End
-
-%ConvertToTypeCode
- // Check the type if that is all that is required.
- if (sipIsErr == NULL)
- {
- if (!PyList_Check(sipPy))
- return 0;
-
- for (int i = 0; i < PyList_GET_SIZE(sipPy); ++i) {
- PyObject *tobj = PyList_GET_ITEM(sipPy, i);
-#if PY_MAJOR_VERSION >= 3
- if (!PyNumber_Check(tobj))
-#else
- if (!PyInt_Check(tobj))
-#endif
- return 0;
- }
- return 1;
- }
-
- QVector<int> *qv = new QVector<int>;
-
- for (int i = 0; i < PyList_GET_SIZE(sipPy); ++i)
- {
- PyObject *tobj = PyList_GET_ITEM(sipPy, i);
- #if PY_MAJOR_VERSION >= 3
- int t = PyLong_AsLong (tobj);
-#else
- int t = PyInt_AS_LONG (tobj);
-#endif
-
- if (*sipIsErr)
- {
- delete qv;
- return 0;
- }
-
- qv->append(t);
- }
-
- *sipCppPtr = qv;
-
- return sipGetState(sipTransferObj);
-%End
-};

Some files were not shown because too many files have changed in this diff Show more