about summary refs log tree commit diff
path: root/pkgs/profpatsch/default.nix
Commit message (Collapse)AuthorAgeFilesLines
* pkgs/profpatsch: bump nixperimentsProfpatsch2020-08-301-4/+8
| | | | Improvements to filterSourceGitignore were made.
* pkgs/profpatsch: add lru-dirProfpatsch2020-08-291-0/+4
|
* pkgs/profpatsch: remove erroneously exported symbolsProfpatsch2020-08-201-3/+0
|
* pkgs: Update easy-dhall-nix to latest masteraszlig2020-07-121-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | I'm not familiar with the "easy-dhall-nix" project, but the repository is imported into Vuizvui via import-from-derivation. While this by itself is not a big issue (apart from contributing hugely to evaluation time, we're already at around an hour), the "dhall-nix" derivation is in turn imported again via importDhall, so whenever something breaks with dhall-nix, our evaluation will break as well. Unfortunately, something is broken right now: building '/nix/store/c363947v9qk287d07qj2kpj60rmzwalj-dhall-nix-1.1.14-x86_64-linux.tar.bz2.drv'... trying https://github.com/dhall-lang/dhall-haskell/releases/download/1.32.0/dhall-nix-1.1.14-x86_64-linux.tar.bz2 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 648 100 648 0 0 2592 0 --:--:-- --:--:-- --:--:-- 2581 100 2255k 100 2255k 0 0 1639k 0 0:00:01 0:00:01 --:--:-- 6287k hash mismatch in fixed-output derivation '/nix/store/yhls1ffnvp1nbjsm0xr3l1z6j6x4waqh-dhall-nix-1.1.14-x86_64-linux.tar.bz2': wanted: sha256:1j32jf0is0kikfw7h9w3n8ikw70bargr32d1cyasqgmb7s7mvs1c got: sha256:1qs5p05qfk5xs1ajwyhn27m0bzs96lnlf3b4gnkffajhaq7hiqll cannot build derivation '/nix/store/aj5ag721b9gm4an6yxh2ljg19ixg4alv-dhall-nix-simple.drv': 1 dependencies couldn't be built The reason why this happens is because GitHub's tarballs are not deterministic and whenever GitHub changes something in the way these are generated, we get a hash mismatch. For exactly that reason, the fetchFromGitHub wrapper in nixpkgs uses fetchzip instead of fetchurl, so that file ordering in the archive doesn't matter. Unfortunately, the upstream project still uses fetchurl, but since the URLs and hashes have changed due to a bump to Dhall version 1.33.1, I've choosen to switch to latest master instead of monkeypatching via extraPostFetch. With this bandaid, we shouldn't run into a hash collision until either the next GC or until the upstream project has switched to either fetchFromGitHub or fetchzip. Signed-off-by: aszlig <aszlig@nix.build> Cc: @Profpatsch, @justinwoo
* pkgs/profpatsch.de: add toc.txtProfpatsch2020-07-061-1/+1
|
* pkgs/profpatsch/xdg-open: Prepare decoding http urlsProfpatsch2020-07-061-1/+8
| | | | | | | | | I want to be able to open http(s) links that are e.g. images directly in the right application. Aka web urls should be transparent, instead of always opening everthing in the browser. This adds some silly ways of connecting to the server and parsing out the headers, in order to fetch the content-type.
* pkgs/profpatsch/xdg-open/mini-url: envvar instead of substituteProfpatsch2020-07-061-1/+1
| | | | | | | | It’s a lot simpler to just export the parsed attribute as envvars. Remove the substitute stuff (it already went into the el_substitute lib anyway) and replace the xpathexec0 code with the function from the el_exec lib.
* pkgs/profpatsch/xdg-open: add mini-urlProfpatsch2020-07-061-1/+2
| | | | | A small parser for http/https URLs. Substitutes host/port/path in argv.
* pkgs/profpatsch: move record-get to netencodeProfpatsch2020-07-061-2/+2
|
* pkgs/profpatsch: (fix) export websiteStaticProfpatsch2020-06-291-0/+6
|
* pkgs/profpatsch: export toNetstring from the toplevelProfpatsch2020-06-291-1/+4
|
* pkgs/profpatsch/execline: add el_exec and el_substituteProfpatsch2020-06-281-1/+5
| | | | | | | | | | | el_exec: wraps the various execve wrappers in skalib that are useful for writing execline-like utils. currently only `xpathexec0` is supported, which execs into the argv you give it or errors with the right error if file not found. el_substitute: execline argv substitution! Wraps the execline function, so it will behave exactly the same as the existing execline utils, like `importas`.
* pkgs/profpatsch/netencode: add a netencode.nix to generate netencodeProfpatsch2020-06-271-0/+2
| | | | | We can define a more or less complete generator in less than 50 lines of nix. Nice.
* pkgs/profpatsch/execline: el-semicolon block parsingProfpatsch2020-06-221-0/+6
|
* pkgs/profpatsch: rename encode to netencodeProfpatsch2020-06-061-3/+3
| | | | | Less generic, has the spirit of “netstrings, but extended to a structured encoding format”.
* pkgs/profpatsch: export encode-rsProfpatsch2020-06-021-0/+5
|
* pkgs/profpatsch: add binify helperProfpatsch2020-06-021-1/+15
|
* pkgs/profpatsch: writeRustSimple, wrapper around buildRustCrateProfpatsch2020-06-021-0/+5
|
* pkgs/profpatsch/dhall-flycheck: update to dhall 1.31.0Profpatsch2020-05-111-2/+3
|
* pkgs/profpatsch: add xdg-open, WIPProfpatsch2020-05-091-0/+4
|
* pkgs/profpatsch: add importDhall/importDhall2/readDhallFileAsJsonProfpatsch2020-05-091-0/+6
| | | | | | Like a normal `import`, but for dhall files. `importDhall2` can additionally handle dependencies and additional source files, though the interface is not stable yet.
* pkgs/profpatsch: add exactSourceProfpatsch2020-05-091-0/+2
|
* pkgs/profpatsch: update dhall-flycheckProfpatsch2020-05-091-4/+5
|
* pkgs/profpatsch: update easy-dhall-nix, add dhall-jsonProfpatsch2020-05-091-2/+3
|
* pkgs/profpatsch: add buildDhallPackageProfpatsch2020-05-091-0/+2
|
* machines/shiki: add zoomboxedProfpatsch2020-03-261-3/+1
| | | | Filesystem sandbox around zoom-us.
* pkgs/profpatsch: Fix eval error for dhall-flycheckaszlig2020-02-101-1/+1
| | | | | | | | | | | | | | | The haskellPackages attribute is actually part of the package scope inside pkgs.profpatsch and thus the evaluation fails with the following error: attribute 'vuizvui' missing, at .../pkgs/profpatsch/default.nix:176:20 Referencing the attribute directly from within the recursive attribute set fixes the evaluation error and building dhall-flycheck also succeeds. Signed-off-by: aszlig <aszlig@nix.build> Cc: @Profpatsch
* pkgs/profpatsch: add dhall-flycheckProfpatsch2020-02-101-0/+8
|
* pkgs/profpatsch: add dhall from easy-dhall-nixProfpatsch2020-02-101-0/+10
| | | | | It’s the easiest way to get recent statically compiled dhall executables.
* pkgs/profpatsch/execline: add eProfpatsch2020-01-261-0/+2
|
* pkgs/profpatsch/execline: add runblockProfpatsch2020-01-261-0/+2
|
* pkgs/profpatsch/query-audio-streams: initProfpatsch2019-12-141-0/+4
|
* pkgs/profpatsch: move `writeHaskellInterpret` upwardsProfpatsch2019-12-141-1/+12
|
* machines/profpatsch,pkgs/profpatsch: rm `execlineb-with-builtins`Profpatsch2019-12-081-31/+4
| | | | | | | This has been upstreamed to nixpkgs proper, as a C wrapper script, in https://github.com/NixOS/nixpkgs/pull/71357 So we don’t even need bash to run execline anymore :P
* pkgs/profpatsch: bump nixperimentsProfpatsch2019-12-081-2/+2
| | | | | It previously copied nixpkgs to the store, because a `toString` was missing.
* pkgs/profpatsch: fix stray `runCommandLocal`Profpatsch2019-12-081-1/+1
|
* treewide: use `runCommandLocal` where applicableProfpatsch2019-12-081-7/+1
| | | | | | | `runCommandLocal` was added to nixpkgs in https://github.com/NixOS/nixpkgs/pull/74642 to speed up trivial `runCommand` derivations by always building them locally. We have a few places where that’s good to use.
* pkgs/profpatsch: fixup missing sandbox argProfpatsch2019-12-081-1/+1
|
* pkgs/profpatsch: add sandbox primitiveProfpatsch2019-12-081-9/+3
| | | | | | Small sandboxing utility, which unshares the filesystem via user-namespaces and can optionally bind-mount existing paths into the sandbox.
* pkgs.profpatsch: expose youtube2audiopodcastProfpatsch2019-12-081-0/+3
|
* pkgs.profpatsch: init youtube2audiopodcastProfpatsch2019-12-081-0/+9
| | | | | Minimal PoC of a small application which can download and convert a youtube video with youtube-dl and then serve it via HTTP.
* pkgs/profpatsch: Fix eval error due to wrong pathaszlig2019-10-021-1/+1
| | | | | | | | | | | | Introduced in commit e9975c9a39cb4e654d9132de4b952f51174a0926. The write-execline.nix file is inside the execline/ directory but the import doesn't reflect that, so since there isn't any write-execline.nix in other locations, I assume that this is what the author actually intended. Signed-off-by: aszlig <aszlig@nix.build> Cc: @Profpatsch
* pkgs/profpatsch: writeExecline, writeExeclineLocalProfpatsch2019-10-021-0/+6
| | | | | similar to writeScript, but writes an execline instead. Should be upstreams to `lib.writers` sometimes.
* pkgs/profpatsch: getBinsProfpatsch2019-10-021-7/+9
| | | | | A simple way to reference binary paths in an attribute set without string interpolations everywhere.
* pkgs/profpatsch/execlinebWithBuiltins: fix path amendingProfpatsch2019-09-261-0/+14
| | | | | | | Earlier, it would just append the execline bin path on every invocation, which would clobber the path on nested invocations. We (ab)use the fact that nix paths have a known hash to check whether it was already added before.
* pkgs/profpatsch/runExecline: move to writeCommand formProfpatsch2019-09-261-7/+10
| | | | | | | | It’s conventional that these tools have the form tool name options data so we should adhere to that.
* pkgs/profpatsch/runExecline: move to listProfpatsch2019-09-261-1/+1
| | | | | We can auto-escape execlines correctly if we model them as nix-style lists, so we shoud certainly do so. It also helps abstraction.
* pkgs/profpatsch: export runExeclineLocal & run tests locallyProfpatsch2019-09-241-29/+45
|
* pkgs/profpatsch/display-infos: add sfttime and AC chargerProfpatsch2019-04-201-1/+1
|
* pkgs/profpatsc: add sfttimeProfpatsch2019-04-201-0/+1
|