Merge staging-next into staging

authored by github-actions[bot] and committed by GitHub 07e0324d 691557fc

+263 -41
+6
maintainers/maintainer-list.nix
··· 10386 10386 githubId = 22803888; 10387 10387 name = "Lu Hongxu"; 10388 10388 }; 10389 + rgnns = { 10390 + email = "jglievano@gmail.com"; 10391 + github = "rgnns"; 10392 + githubId = 811827; 10393 + name = "Gabriel Lievano"; 10394 + }; 10389 10395 rgrunbla = { 10390 10396 email = "remy@grunblatt.org"; 10391 10397 github = "rgrunbla";
+6
nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
··· 773 773 </listitem> 774 774 <listitem> 775 775 <para> 776 + <literal>pkgs._7zz</literal> is now correctly licensed as 777 + LGPL3+ and BSD3 with optional unfree unRAR licensed code 778 + </para> 779 + </listitem> 780 + <listitem> 781 + <para> 776 782 <literal>tilp2</literal> was removed together with its module 777 783 </para> 778 784 </listitem>
+2
nixos/doc/manual/release-notes/rl-2205.section.md
··· 308 308 309 309 - `pkgs.docbookrx` was removed since it's unmaintained 310 310 311 + - `pkgs._7zz` is now correctly licensed as LGPL3+ and BSD3 with optional unfree unRAR licensed code 312 + 311 313 - `tilp2` was removed together with its module 312 314 313 315 - The F-PROT antivirus (`fprot` package) and its service module were removed because it
+1 -1
pkgs/applications/misc/abook/default.nix
··· 25 25 description = "Text-based addressbook program designed to use with mutt mail client"; 26 26 license = lib.licenses.gpl2; 27 27 maintainers = [ lib.maintainers.edwtjo ]; 28 - platforms = with lib.platforms; linux; 28 + platforms = with lib.platforms; unix; 29 29 }; 30 30 }
+2 -2
pkgs/applications/networking/cluster/driftctl/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "driftctl"; 5 - version = "0.23.0"; 5 + version = "0.23.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "snyk"; 9 9 repo = "driftctl"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-TUwTvCsWB+n+shVU1hTzLYROG9Wp4ySzJwAnappK7TY="; 11 + sha256 = "sha256-hGwQdR2LF1uuq11d2BD4hVjcXpPCbRNovOqJpj0J1Sw="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-I0OCRhUvuaF4k5qqPaV6R24mrd9AG5GgQCCF6yodK0E=";
+3 -3
pkgs/data/misc/v2ray-geoip/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "v2ray-geoip"; 5 - version = "202203100039"; 5 + version = "202203170039"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "v2fly"; 9 9 repo = "geoip"; 10 - rev = "564c2c8de36d3680a1d5f209d6bb05e4f3f70dfc"; 11 - sha256 = "sha256-JPpzIppgKQox8T6VC/kzhpLy+YAcuHdH5L6zqciOXow="; 10 + rev = "0b5c94c368dc5f70ebf995e87188aa8f40d45489"; 11 + sha256 = "sha256-iaqU6CkrewICONps43nbZaUiM2aahSwfSD5bZz1P4Zc="; 12 12 }; 13 13 14 14 installPhase = ''
+2 -1
pkgs/development/compilers/go/1.16.nix
··· 45 45 "riscv64" = "riscv64"; 46 46 "s390x" = "s390x"; 47 47 "powerpc64le" = "ppc64le"; 48 - }.${platform.parsed.cpu.name} or (throw "Unsupported system"); 48 + "mips64el" = "mips64le"; 49 + }.${platform.parsed.cpu.name} or (throw "Unsupported system: ${platform.parsed.cpu.name}"); 49 50 50 51 # We need a target compiler which is still runnable at build time, 51 52 # to handle the cross-building case where build != host == target
+2 -1
pkgs/development/compilers/go/1.17.nix
··· 45 45 "riscv64" = "riscv64"; 46 46 "s390x" = "s390x"; 47 47 "powerpc64le" = "ppc64le"; 48 - }.${platform.parsed.cpu.name} or (throw "Unsupported system"); 48 + "mips64el" = "mips64le"; 49 + }.${platform.parsed.cpu.name} or (throw "Unsupported system: ${platform.parsed.cpu.name}"); 49 50 50 51 # We need a target compiler which is still runnable at build time, 51 52 # to handle the cross-building case where build != host == target
+2 -1
pkgs/development/compilers/go/1.18.nix
··· 45 45 "riscv64" = "riscv64"; 46 46 "s390x" = "s390x"; 47 47 "powerpc64le" = "ppc64le"; 48 - }.${platform.parsed.cpu.name} or (throw "Unsupported system"); 48 + "mips64el" = "mips64le"; 49 + }.${platform.parsed.cpu.name} or (throw "Unsupported system: ${platform.parsed.cpu.name}"); 49 50 50 51 # We need a target compiler which is still runnable at build time, 51 52 # to handle the cross-building case where build != host == target
+1
pkgs/development/compilers/rust/print-hashes.sh
··· 19 19 aarch64-apple-darwin 20 20 powerpc64le-unknown-linux-gnu 21 21 riscv64gc-unknown-linux-gnu 22 + mips64el-unknown-linux-gnuabi64 22 23 ) 23 24 BASEURL=https://static.rust-lang.org/dist 24 25 VERSION=${1:-}
+27
pkgs/development/python-modules/flatdict/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + }: 5 + 6 + buildPythonPackage rec { 7 + pname = "flatdict"; 8 + version = "4.0.0"; 9 + 10 + src = fetchFromGitHub { 11 + owner = "gmr"; 12 + repo = pname; 13 + rev = version; 14 + hash = "sha256-qH4MMDSXf92BPavnRdCka6lRoWZg+2KnHpHA8kt5JaM="; 15 + }; 16 + 17 + pythonImportsCheck = [ 18 + "flatdict" 19 + ]; 20 + 21 + meta = with lib; { 22 + description = "Python module for interacting with nested dicts as a single level dict with delimited keys"; 23 + homepage = "https://github.com/gmr/flatdict"; 24 + license = licenses.bsd3; 25 + maintainers = with maintainers; [ lovesegfault ]; 26 + }; 27 + }
+9
pkgs/development/python-modules/google-auth/default.nix
··· 59 59 "test_request_headers" 60 60 "test_request_error" 61 61 "test_request_basic" 62 + ] ++ lib.optionals (stdenv.isDarwin && stdenv.isAarch64) [ 63 + # E MemoryError: Cannot allocate write+execute memory for ffi.callback(). 64 + # You might be running on a system that prevents this. 65 + # For more information, see https://cffi.readthedocs.io/en/latest/using.html#callbacks 66 + "test_configure_mtls_channel_with_callback" 67 + "test_configure_mtls_channel_with_metadata" 68 + "TestDecryptPrivateKey" 69 + "TestMakeMutualTlsHttp" 70 + "TestMutualTlsAdapter" 62 71 ]; 63 72 64 73 meta = with lib; {
+2 -2
pkgs/development/python-modules/jax/default.nix
··· 19 19 in 20 20 buildPythonPackage rec { 21 21 pname = "jax"; 22 - version = "0.3.1"; 22 + version = "0.3.3"; 23 23 format = "setuptools"; 24 24 25 25 disabled = pythonOlder "3.7"; ··· 28 28 owner = "google"; 29 29 repo = pname; 30 30 rev = "${pname}-v${version}"; 31 - sha256 = "0bpqmyc4hg25i8cfnrx3y2bwgp6h5rri2a1q9i8gb6r0id97zvcn"; 31 + sha256 = "12k5kzgs2cxf9nvcc10a9ldl4zn68b5cnkhchfj1s7f61abx6nq3"; 32 32 }; 33 33 34 34 patches = [
+44
pkgs/development/python-modules/keyrings-google-artifactregistry-auth/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchPypi 4 + , google-auth 5 + , keyring 6 + , pluggy 7 + , requests 8 + , setuptools-scm 9 + , toml 10 + }: 11 + 12 + buildPythonPackage rec { 13 + pname = "keyrings.google-artifactregistry-auth"; 14 + version = "1.0.0"; 15 + 16 + src = fetchPypi { 17 + inherit pname version; 18 + sha256 = "sha256-gvoX5SP0A39Ke0VRlplETJF8gIP+QzK6xNReRxM8UnA="; 19 + }; 20 + 21 + buildInputs = [ 22 + setuptools-scm 23 + toml 24 + ]; 25 + 26 + propagatedBuildInputs = [ 27 + google-auth 28 + keyring 29 + pluggy 30 + requests 31 + ]; 32 + 33 + pythonImportsCheck = [ 34 + "keyrings.gauth" 35 + ]; 36 + 37 + 38 + meta = with lib; { 39 + description = "Python package which allows you to configure keyring to interact with Python repositories stored in Artifact Registry"; 40 + homepage = "https://pypi.org/project/keyrings.google-artifactregistry-auth"; 41 + license = licenses.asl20; 42 + maintainers = with maintainers; [ lovesegfault ]; 43 + }; 44 + }
+3 -3
pkgs/development/tools/jql/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "jql"; 5 - version = "3.1.1"; 5 + version = "3.1.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "yamafaktory"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-CntAxOsAaKkCvQanLZ4d99VEGrbsVM+IYOhUuimvjlA="; 11 + sha256 = "sha256-UC+1I87PPDuu+/A5zO2Q/Z5KbO/5jHuxsJ0r7a+uDLM="; 12 12 }; 13 13 14 - cargoSha256 = "sha256-mzHLAmm0wvF35ku+wg6QG/pKwIFjb22fOtBmMhgC0Ik="; 14 + cargoSha256 = "sha256-0ezrcploLboYExcRzNnKj/vWgbJuBhteWi/Imlr4Wsg="; 15 15 16 16 meta = with lib; { 17 17 description = "A JSON Query Language CLI tool built with Rust";
+3 -3
pkgs/development/tools/rust/rust-analyzer/default.nix
··· 11 11 12 12 rustPlatform.buildRustPackage rec { 13 13 pname = "rust-analyzer-unwrapped"; 14 - version = "2022-02-28"; 15 - cargoSha256 = "sha256-dTw6xp99uGtGp6YuqAX3r3GDD6Wto3KHTaO2DUUE2FA="; 14 + version = "2022-03-07"; 15 + cargoSha256 = "sha256-geMzdo5frW5VkuTwBHKHXCTJZrHDUIRSTs2kkCfA5Vc="; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "rust-analyzer"; 19 19 repo = "rust-analyzer"; 20 20 rev = version; 21 - sha256 = "sha256-GQ1cPO4povnozLl0MTFs0ZXpmBn+AZeFWQVnxHHWf9g="; 21 + sha256 = "sha256-/qKh4utesAjlyG8A3hEmSx+HBgh48Uje6ZRtUGz5f0g="; 22 22 }; 23 23 24 24 patches = [
+24
pkgs/development/tools/zld/default.nix
··· 1 + { stdenv, lib, fetchzip }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "zld"; 5 + version = "1.3.3"; 6 + src = fetchzip { 7 + url = "https://github.com/michaeleisel/zld/releases/download/${version}/zld.zip"; 8 + sha256 = "0qb4l7a4vhpnzkgzhw0jivz40jr5gdhqfyynhbkhn7ryh5s52d1p"; 9 + }; 10 + 11 + installPhase = '' 12 + mkdir -p $out/bin 13 + cp zld $out/bin/ 14 + ''; 15 + 16 + meta = with lib; { 17 + description = "A faster version of Apple's linker"; 18 + homepage = "https://github.com/michaeleisel/zld"; 19 + license = licenses.mit; 20 + maintainers = [ maintainers.rgnns ]; 21 + platforms = platforms.darwin; 22 + hydraPlatforms = []; 23 + }; 24 + }
+3 -3
pkgs/servers/dns/coredns/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "coredns"; 5 - version = "1.9.0"; 5 + version = "1.9.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "coredns"; 9 9 repo = "coredns"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-8IYJxb+HssS2xTboBRo3lz9czklt/Sn098ATlDaO7Gs="; 11 + sha256 = "sha256-1lJrbazEgsRHI10qIgA9KgglsxpnMIdxEWpu6RiJ0pQ="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-Vxs+k4WF55xwjgdlW/1NM4NWnYqj2EOLOONflj+BoY4="; 14 + vendorSha256 = "sha256-ueEuduZ76FUs2wE8oiHGON9+s91jaHhS6gOKr7MNh8g="; 15 15 16 16 postPatch = '' 17 17 substituteInPlace test/file_cname_proxy_test.go \
+51 -7
pkgs/tools/archivers/7zz/default.nix
··· 1 - { stdenv, lib, fetchurl, p7zip, uasm, useUasm ? stdenv.isx86_64 }: 1 + { stdenv 2 + , lib 3 + , fetchurl 4 + 5 + , uasm 6 + , useUasm ? stdenv.isx86_64 7 + 8 + # RAR code is under non-free unRAR license 9 + # see the meta.license section below for more details 10 + , enableUnfree ? false 11 + }: 2 12 3 13 let 4 14 inherit (stdenv.hostPlatform) system; ··· 14 24 version = "21.07"; 15 25 16 26 src = fetchurl { 17 - url = "https://7-zip.org/a/7z${lib.replaceStrings [ "." ] [ "" ] version}-src.7z"; 18 - sha256 = "sha256-0QdNVvQVqrmdmeWXp7ZtxFXbpjSa6KTInfdkdbahKEw="; 27 + url = "https://7-zip.org/a/7z${lib.replaceStrings [ "." ] [ "" ] version}-src.tar.xz"; 28 + sha256 = { 29 + free = "sha256-SMM6kQ6AZ05s4miJjMoE4NnsXQ0tlkdWx0q2HKjhaM8="; 30 + unfree = "sha256-IT1ZRAfLjvy6NmELFSykkh7aFBYzELQ5A9E+aDE+Hjk="; 31 + }.${if enableUnfree then "unfree" else "free"}; 32 + downloadToTemp = (!enableUnfree); 33 + # remove the unRAR related code from the src drv 34 + # > the license requires that you agree to these use restrictions, 35 + # > or you must remove the software (source and binary) from your hard disks 36 + # https://fedoraproject.org/wiki/Licensing:Unrar 37 + postFetch = lib.optionalString (!enableUnfree) '' 38 + mkdir tmp 39 + tar xf $downloadedFile -C ./tmp 40 + rm -r ./tmp/CPP/7zip/Compress/Rar* 41 + tar cfJ $out -C ./tmp . \ 42 + --sort=name \ 43 + --mtime="@$SOURCE_DATE_EPOCH" \ 44 + --owner=0 --group=0 --numeric-owner \ 45 + --pax-option=exthdr.name=%d/PaxHeaders/%f,delete=atime,delete=ctime 46 + ''; 19 47 }; 20 48 21 49 sourceRoot = "CPP/7zip/Bundles/Alone2"; 22 50 23 - makeFlags = lib.optionals useUasm [ "MY_ASM=uasm" ]; 51 + makeFlags = 52 + lib.optionals useUasm [ "MY_ASM=uasm" ] ++ 53 + # it's the compression code with the restriction, see DOC/License.txt 54 + lib.optionals (!enableUnfree) [ "DISABLE_RAR_COMPRESS=true" ]; 24 55 25 56 makefile = "../../cmpl_gcc${platformSuffix}.mak"; 26 57 27 - nativeBuildInputs = [ p7zip ] ++ lib.optionals useUasm [ uasm ]; 58 + nativeBuildInputs = lib.optionals useUasm [ uasm ]; 28 59 29 60 enableParallelBuilding = true; 30 61 ··· 40 71 doInstallCheck = true; 41 72 42 73 installCheckPhase = '' 74 + runHook preInstallCheck 75 + 43 76 $out/bin/7zz --help | grep ${version} 77 + 78 + runHook postInstallCheck 44 79 ''; 45 80 81 + passthru.updateScript = ./update.sh; 82 + 46 83 meta = with lib; { 47 84 description = "Command line archiver utility"; 48 85 homepage = "https://7-zip.org"; 49 - license = licenses.lgpl21Plus; 50 - maintainers = with maintainers; [ anna328p peterhoeg ]; 86 + license = with licenses; 87 + # 7zip code is largely lgpl2Plus 88 + # CPP/7zip/Compress/LzfseDecoder.cpp is bsd3 89 + [ lgpl2Plus /* and */ bsd3 ] ++ 90 + # and CPP/7zip/Compress/Rar* are unfree with the unRAR license restriction 91 + # the unRAR compression code is disabled by default 92 + lib.optionals enableUnfree [ unfree ]; 93 + maintainers = with maintainers; [ anna328p peterhoeg jk ]; 51 94 platforms = platforms.linux; 95 + mainProgram = "7zz"; 52 96 }; 53 97 }
+50
pkgs/tools/archivers/7zz/update.sh
··· 1 + #! /usr/bin/env nix-shell 2 + #! nix-shell -i bash -p coreutils gnused curl jq 3 + set -euo pipefail 4 + cd "$(dirname "${BASH_SOURCE[0]}")" 5 + 6 + DRV_DIR="$PWD" 7 + 8 + OLD_VERSION="$(sed -nE 's/\s*version = "(.*)".*/\1/p' ./default.nix)" 9 + 10 + NEW_VERSION="$(curl "https://sourceforge.net/projects/sevenzip/best_release.json" | jq '.platform_releases.linux.filename' -r | cut -d/ -f3)" 11 + 12 + echo "comparing versions $OLD_VERSION => $NEW_VERSION" 13 + if [[ "$OLD_VERSION" == "$NEW_VERSION" ]]; then 14 + echo "Already up to date! Doing nothing" 15 + exit 0 16 + fi 17 + 18 + NIXPKGS_ROOT="$(realpath "$DRV_DIR/../../../..")" 19 + 20 + echo "getting free source hash" 21 + OLD_FREE_HASH="$(nix-instantiate --eval --strict -E "with import $NIXPKGS_ROOT {}; _7zz.src.drvAttrs.outputHash" | tr -d '"')" 22 + echo "getting unfree source hash" 23 + OLD_UNFREE_HASH="$(nix-instantiate --eval --strict -E "with import $NIXPKGS_ROOT {}; (_7zz.override { enableUnfree = true; }).src.drvAttrs.outputHash" | tr -d '"')" 24 + 25 + NEW_VERSION_FORMATTED="$(echo "$NEW_VERSION" | tr -d '.')" 26 + URL="https://7-zip.org/a/7z${NEW_VERSION_FORMATTED}-src.tar.xz" 27 + 28 + 29 + NEW_FREE_HASH=$(nix-prefetch -f "$NIXPKGS_ROOT" -E "_7zz.src" --url "$URL") 30 + 31 + NEW_UNFREE_OUT=$(nix-prefetch -f "$NIXPKGS_ROOT" -E "(_7zz.override { enableUnfree = true; }).src" --url "$URL" --output raw --print-path) 32 + # first line of raw output is the hash 33 + NEW_UNFREE_HASH="$(echo "$NEW_UNFREE_OUT" | sed -n 1p)" 34 + # second line of raw output is the src path 35 + NEW_UNFREE_SRC="$(echo "$NEW_UNFREE_OUT" | sed -n 2p)" 36 + # make sure to nuke the unfree src from the updater's machine 37 + # > the license requires that you agree to these use restrictions, or you must remove the software (source and binary) from your hard disks 38 + # https://fedoraproject.org/wiki/Licensing:Unrar 39 + nix-store --delete "$NEW_UNFREE_SRC" 40 + 41 + 42 + echo "updating version" 43 + sed -i "s/version = \"$OLD_VERSION\";/version = \"$NEW_VERSION\";/" "$DRV_DIR/default.nix" 44 + 45 + echo "updating free hash" 46 + sed -i "s@free = \"$OLD_FREE_HASH\";@free = \"$NEW_FREE_HASH\";@" "$DRV_DIR/default.nix" 47 + echo "updating unfree hash" 48 + sed -i "s@unfree = \"$OLD_UNFREE_HASH\";@unfree = \"$NEW_UNFREE_HASH\";@" "$DRV_DIR/default.nix" 49 + 50 + echo "done"
+3 -3
pkgs/tools/misc/apkeep/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "apkeep"; 5 - version = "0.9.0"; 5 + version = "0.10.0"; 6 6 7 7 src = fetchCrate { 8 8 inherit pname version; 9 - sha256 = "sha256-ST1ifON25mizKZQX3fKeqBloXWW9LXDq5JkZIeiguRY="; 9 + sha256 = "14vm3b2gbmn9pil0aagwchn4kyvi9311id6qv4a376qfb6r1aybf"; 10 10 }; 11 11 12 - cargoSha256 = "sha256-/Xh1s4PO336B1ioKe0IKVGDACpMuXOpxA82U6zn2lj0="; 12 + cargoSha256 = "0i8wzc58ji317kjdw3ls1908z4bqlh1cgjph0fxsvs5i552qjkzp"; 13 13 14 14 prePatch = '' 15 15 rm .cargo/config.toml
+3 -3
pkgs/tools/misc/opentelemetry-collector/default.nix
··· 12 12 in 13 13 buildGoModule rec { 14 14 pname = "opentelemetry-collector"; 15 - version = "0.46.0"; 15 + version = "0.47.0"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "open-telemetry"; 19 19 repo = "opentelemetry-collector"; 20 20 rev = "v${version}"; 21 - sha256 = "sha256-ibaA9oCSsId9A4ul5sfM+L8ExBl+Wv7rhGnb6TZ4WJw="; 21 + sha256 = "sha256-1dMdQWV+gxbMc/2iVsB1LCsYxR0bt5AJEvoFq2/KHCg="; 22 22 }; 23 23 # there is a nested go.mod 24 24 sourceRoot = "source/cmd/otelcorecol"; 25 - vendorSha256 = "sha256-Okmsd/skfBmkyLv9oPFH0QvewFZFPpUH2ahWxHt7cy8="; 25 + vendorSha256 = "sha256-ps6fUVg7vhGgy47WTJv/U1qHQ2MGXIWXNZ5Rddo1yQY="; 26 26 27 27 preBuild = '' 28 28 # set the build version, can't be done via ldflags
+5 -5
pkgs/tools/networking/boundary/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "boundary"; 5 - version = "0.7.5"; 5 + version = "0.7.6"; 6 6 7 7 src = 8 8 let ··· 15 15 aarch64-darwin = "darwin_arm64"; 16 16 }; 17 17 sha256 = selectSystem { 18 - x86_64-linux = "sha256-wqNeeEQhR8cj7Gpbzp7UQV0j+w0peo41uKqgK9BoLH4="; 19 - aarch64-linux = "sha256-HK/6eMBWUW1IbYE5RpInhcQuIw16X9vQEZmOBje9Yzk="; 20 - x86_64-darwin = "sha256-ghgkPlEN9DHFviQzcGS/+oG+9Qqy2AfJ2IEyiSMJwwY="; 21 - aarch64-darwin = "sha256-F4iOCxAm8s34KktuS5PRPkIg9A0179H6zlOM3OuTyUw="; 18 + x86_64-linux = "sha256-nsc8S63OUEo9db/hs9oA53Lk+amIsxB/O4TJCs4zdNw="; 19 + aarch64-linux = "sha256-KttqYuF7xC88L49f7JKKr77FbKBihptoBIoemgFInm0="; 20 + x86_64-darwin = "sha256-ov4CtiWsOU/AWfAo7x99RshW6+eU9lFD5ypo6MKyPM0="; 21 + aarch64-darwin = "sha256-3E9fv8BSu7XXIwRmTrDECLNQKdoeUqitKbsTrXs+tTE="; 22 22 }; 23 23 in 24 24 fetchzip {
+3 -3
pkgs/tools/package-management/cargo-about/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "cargo-about"; 5 - version = "0.4.8"; 5 + version = "0.5.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "EmbarkStudios"; 9 9 repo = "cargo-about"; 10 10 rev = version; 11 - sha256 = "sha256-cKzGg3fAXKqnBZES3YUMbv1ZAcLqo6AdrXKXSFSAnis="; 11 + sha256 = "sha256-M09X7UwrTtrOhOphhpGHSAqxneY50jNrFKJCeBQhRfc="; 12 12 }; 13 13 14 14 # enable pkg-config feature of zstd 15 15 cargoPatches = [ ./zstd-pkg-config.patch ]; 16 16 17 - cargoSha256 = "sha256-OLrxqbTIhHMNPEnSAUbTqoYnaZi/BxbWUCxaTo9Zyww="; 17 + cargoSha256 = "sha256-E1+OfVAzrezXoUz9Nlyhdq1xxEWm4UJhVyp+nG7UmYY="; 18 18 19 19 nativeBuildInputs = [ pkg-config ]; 20 20
+2
pkgs/top-level/all-packages.nix
··· 11565 11565 11566 11566 zimwriterfs = callPackage ../tools/text/zimwriterfs { }; 11567 11567 11568 + zld = callPackage ../development/tools/zld { }; 11569 + 11568 11570 par = callPackage ../tools/text/par { }; 11569 11571 11570 11572 zip = callPackage ../tools/archivers/zip { };
+4
pkgs/top-level/python-packages.nix
··· 3026 3026 inherit (pkgs) flatbuffers; 3027 3027 }; 3028 3028 3029 + flatdict = callPackage ../development/python-modules/flatdict { }; 3030 + 3029 3031 flatten-dict = callPackage ../development/python-modules/flatten-dict { }; 3030 3032 3031 3033 flax = callPackage ../development/python-modules/flax { }; ··· 4462 4464 keyring = callPackage ../development/python-modules/keyring { }; 4463 4465 4464 4466 keyrings-cryptfile = callPackage ../development/python-modules/keyrings-cryptfile { }; 4467 + 4468 + keyrings-google-artifactregistry-auth = callPackage ../development/python-modules/keyrings-google-artifactregistry-auth { }; 4465 4469 4466 4470 keyrings-alt = callPackage ../development/python-modules/keyrings-alt { }; 4467 4471