lol
0
fork

Configure Feed

Select the types of activity you want to include in your feed.

Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
09a7436f bb7e33ce

+381 -124
+1 -1
nixos/modules/config/krb5/default.nix
··· 84 84 type = types.package; 85 85 default = pkgs.krb5Full; 86 86 defaultText = "pkgs.krb5Full"; 87 - example = literalExample "pkgs.heimdalFull"; 87 + example = literalExample "pkgs.heimdal"; 88 88 description = '' 89 89 The Kerberos implementation that will be present in 90 90 <literal>environment.systemPackages</literal> after enabling this
+9 -2
nixos/modules/programs/atop.nix
··· 141 141 // mkService cfg.atopgpu.enable "atopgpu" [ atop ]; 142 142 timers = mkTimer cfg.atopRotateTimer.enable "atop-rotate" [ atop ]; 143 143 }; 144 - security.wrappers = 145 - lib.mkIf cfg.setuidWrapper.enable { atop = { source = "${atop}/bin/atop"; }; }; 144 + 145 + security.wrappers = lib.mkIf cfg.setuidWrapper.enable { 146 + atop = 147 + { setuid = true; 148 + owner = "root"; 149 + group = "root"; 150 + source = "${atop}/bin/atop"; 151 + }; 152 + }; 146 153 } 147 154 ); 148 155 }
+1 -1
nixos/modules/programs/plotinus.nix
··· 30 30 ###### implementation 31 31 32 32 config = mkIf cfg.enable { 33 - environment.variables.XDG_DATA_DIRS = [ "${pkgs.plotinus}/share/gsettings-schemas/${pkgs.plotinus.name}" ]; 33 + environment.sessionVariables.XDG_DATA_DIRS = [ "${pkgs.plotinus}/share/gsettings-schemas/${pkgs.plotinus.name}" ]; 34 34 environment.variables.GTK3_MODULES = [ "${pkgs.plotinus}/lib/libplotinus.so" ]; 35 35 }; 36 36 }
+23 -18
nixos/modules/services/cluster/kubernetes/default.nix
··· 5 5 let 6 6 cfg = config.services.kubernetes; 7 7 8 - defaultContainerdConfigFile = pkgs.writeText "containerd.toml" '' 9 - version = 2 10 - root = "/var/lib/containerd" 11 - state = "/run/containerd" 12 - oom_score = 0 8 + defaultContainerdSettings = { 9 + version = 2; 10 + root = "/var/lib/containerd"; 11 + state = "/run/containerd"; 12 + oom_score = 0; 13 13 14 - [grpc] 15 - address = "/run/containerd/containerd.sock" 14 + grpc = { 15 + address = "/run/containerd/containerd.sock"; 16 + }; 16 17 17 - [plugins."io.containerd.grpc.v1.cri"] 18 - sandbox_image = "pause:latest" 18 + plugins."io.containerd.grpc.v1.cri" = { 19 + sandbox_image = "pause:latest"; 19 20 20 - [plugins."io.containerd.grpc.v1.cri".cni] 21 - bin_dir = "/opt/cni/bin" 22 - max_conf_num = 0 21 + cni = { 22 + bin_dir = "/opt/cni/bin"; 23 + max_conf_num = 0; 24 + }; 23 25 24 - [plugins."io.containerd.grpc.v1.cri".containerd.runtimes.runc] 25 - runtime_type = "io.containerd.runc.v2" 26 + containerd.runtimes.runc = { 27 + runtime_type = "io.containerd.runc.v2"; 28 + }; 26 29 27 - [plugins."io.containerd.grpc.v1.cri".containerd.runtimes."io.containerd.runc.v2".options] 28 - SystemdCgroup = true 29 - ''; 30 + containerd.runtimes."io.containerd.runc.v2".options = { 31 + SystemdCgroup = true; 32 + }; 33 + }; 34 + }; 30 35 31 36 mkKubeConfig = name: conf: pkgs.writeText "${name}-kubeconfig" (builtins.toJSON { 32 37 apiVersion = "v1"; ··· 248 253 (mkIf cfg.kubelet.enable { 249 254 virtualisation.containerd = { 250 255 enable = mkDefault true; 251 - configFile = mkDefault defaultContainerdConfigFile; 256 + settings = mkDefault defaultContainerdSettings; 252 257 }; 253 258 }) 254 259
+1
nixos/modules/services/networking/dnscrypt-wrapper.nix
··· 217 217 home = "${dataDir}"; 218 218 createHome = true; 219 219 isSystemUser = true; 220 + group = "dnscrypt-wrapper"; 220 221 }; 221 222 users.groups.dnscrypt-wrapper = { }; 222 223
+1 -1
nixos/modules/services/networking/flannel.nix
··· 164 164 path = [ pkgs.iptables ]; 165 165 preStart = optionalString (cfg.storageBackend == "etcd") '' 166 166 echo "setting network configuration" 167 - until ${pkgs.etcdctl}/bin/etcdctl set /coreos.com/network/config '${builtins.toJSON networkConfig}' 167 + until ${pkgs.etcd}/bin/etcdctl set /coreos.com/network/config '${builtins.toJSON networkConfig}' 168 168 do 169 169 echo "setting network configuration, retry" 170 170 sleep 1
+1 -1
nixos/modules/services/search/meilisearch.nix
··· 8 8 in 9 9 { 10 10 11 - meta.maintainers = with maintainers; [ filalex77 ]; 11 + meta.maintainers = with maintainers; [ Br1ght0ne ]; 12 12 13 13 ###### interface 14 14
+1 -1
nixos/modules/services/system/kerberos/heimdal.nix
··· 27 27 { 28 28 # No documentation about correct triggers, so guessing at them. 29 29 30 - config = mkIf (cfg.enable && kerberos == pkgs.heimdalFull) { 30 + config = mkIf (cfg.enable && kerberos == pkgs.heimdal) { 31 31 systemd.services.kadmind = { 32 32 description = "Kerberos Administration Daemon"; 33 33 wantedBy = [ "multi-user.target" ];
-1
nixos/tests/all-tests.nix
··· 223 223 krb5 = discoverTests (import ./krb5 {}); 224 224 ksm = handleTest ./ksm.nix {}; 225 225 kubernetes = handleTestOn ["x86_64-linux"] ./kubernetes {}; 226 - latestKernel.hardened = handleTest ./hardened.nix { latestKernel = true; }; 227 226 latestKernel.login = handleTest ./login.nix { latestKernel = true; }; 228 227 leaps = handleTest ./leaps.nix {}; 229 228 libreddit = handleTest ./libreddit.nix {};
-2
nixos/tests/atop.nix
··· 105 105 }; 106 106 in 107 107 { 108 - name = "atop"; 109 - 110 108 justThePackage = makeTest { 111 109 name = "atop-justThePackage"; 112 110 machine = {
+1 -1
nixos/tests/cntr.nix
··· 9 9 makeTest { 10 10 name = "cntr-${backend}"; 11 11 12 - meta = { maintainers = with lib.maintainers; [ srk mic92 ]; }; 12 + meta = { maintainers = with lib.maintainers; [ sorki mic92 ]; }; 13 13 14 14 nodes = { 15 15 ${backend} = { pkgs, ... }: {
+5
nixos/tests/ec2.nix
··· 24 24 ln -s vda1 /dev/xvda1 25 25 ''; 26 26 27 + # In a NixOS test the serial console is occupied by the "backdoor" 28 + # (see testing/test-instrumentation.nix) and is incompatible with 29 + # the configuration in virtualisation/amazon-image.nix. 30 + systemd.services."serial-getty@ttyS0".enable = mkForce false; 31 + 27 32 # Needed by nixos-rebuild due to the lack of network 28 33 # access. Determined by trial and error. 29 34 system.extraDependencies = with pkgs; ( [
+2 -2
nixos/tests/enlightenment.nix
··· 11 11 imports = [ ./common/user-account.nix ]; 12 12 services.xserver.enable = true; 13 13 services.xserver.desktopManager.enlightenment.enable = true; 14 - services.xserver.displayManager.lightdm = { 15 - enable = true; 14 + services.xserver.displayManager = { 15 + lightdm.enable = true; 16 16 autoLogin = { 17 17 enable = true; 18 18 user = "alice";
+1 -3
nixos/tests/hardened.nix
··· 1 - import ./make-test-python.nix ({ pkgs, latestKernel ? false, ... } : { 1 + import ./make-test-python.nix ({ pkgs, ... } : { 2 2 name = "hardened"; 3 3 meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ joachifm ]; ··· 10 10 { users.users.alice = { isNormalUser = true; extraGroups = [ "proc" ]; }; 11 11 users.users.sybil = { isNormalUser = true; group = "wheel"; }; 12 12 imports = [ ../modules/profiles/hardened.nix ]; 13 - boot.kernelPackages = 14 - lib.mkIf latestKernel pkgs.linuxPackages_latest_hardened; 15 13 environment.memoryAllocator.provider = "graphene-hardened"; 16 14 nix.useSandbox = false; 17 15 virtualisation.emptyDiskImages = [ 4096 ];
+1 -1
nixos/tests/kerberos/heimdal.nix
··· 9 9 }; 10 10 krb5 = { 11 11 enable = true; 12 - kerberos = pkgs.heimdalFull; 12 + kerberos = pkgs.heimdal; 13 13 libdefaults = { 14 14 default_realm = "FOO.BAR"; 15 15 };
+1 -1
nixos/tests/meilisearch.nix
··· 10 10 ''; 11 11 in { 12 12 name = "meilisearch"; 13 - meta.maintainers = with lib.maintainers; [ filalex77 ]; 13 + meta.maintainers = with lib.maintainers; [ Br1ght0ne ]; 14 14 15 15 machine = { ... }: { 16 16 environment.systemPackages = with pkgs; [ curl jq ];
+4 -1
nixos/tests/minio.nix
··· 28 28 machine = { pkgs, ... }: { 29 29 services.minio = { 30 30 enable = true; 31 - inherit accessKey secretKey; 31 + rootCredentialsFile = pkgs.writeText "minio-credentials" '' 32 + MINIO_ROOT_USER=${accessKey} 33 + MINIO_ROOT_PASSWORD=${secretKey} 34 + ''; 32 35 }; 33 36 environment.systemPackages = [ pkgs.minio-client ]; 34 37
+1 -1
nixos/tests/mpv.nix
··· 14 14 { 15 15 environment.systemPackages = [ 16 16 pkgs.curl 17 - (pkgs.mpv-with-scripts.override { 17 + (pkgs.wrapMpv pkgs.mpv-unwrapped { 18 18 scripts = [ pkgs.mpvScripts.simple-mpv-webui ]; 19 19 }) 20 20 ];
+13 -3
nixos/tests/mysql/mariadb-galera-mariabackup.nix
··· 4 4 mysqlenv-common = pkgs.buildEnv { name = "mysql-path-env-common"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ bash gawk gnutar inetutils which ]; }; 5 5 mysqlenv-mariabackup = pkgs.buildEnv { name = "mysql-path-env-mariabackup"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ gzip iproute2 netcat procps pv socat ]; }; 6 6 7 + # Common user configuration 8 + users = { ... }: 9 + { 10 + users.users.testuser = { 11 + isSystemUser = true; 12 + group = "testusers"; 13 + }; 14 + users.groups.testusers = { }; 15 + }; 16 + 7 17 in { 8 18 name = "mariadb-galera-mariabackup"; 9 19 meta = with pkgs.lib.maintainers; { ··· 17 27 galera_01 = 18 28 { pkgs, ... }: 19 29 { 30 + imports = [ users ]; 20 31 networking = { 21 32 interfaces.eth1 = { 22 33 ipv4.addresses = [ ··· 31 42 firewall.allowedTCPPorts = [ 3306 4444 4567 4568 ]; 32 43 firewall.allowedUDPPorts = [ 4567 ]; 33 44 }; 34 - users.users.testuser = { isSystemUser = true; }; 35 45 systemd.services.mysql = with pkgs; { 36 46 path = [ mysqlenv-common mysqlenv-mariabackup ]; 37 47 }; ··· 75 85 galera_02 = 76 86 { pkgs, ... }: 77 87 { 88 + imports = [ users ]; 78 89 networking = { 79 90 interfaces.eth1 = { 80 91 ipv4.addresses = [ ··· 89 100 firewall.allowedTCPPorts = [ 3306 4444 4567 4568 ]; 90 101 firewall.allowedUDPPorts = [ 4567 ]; 91 102 }; 92 - users.users.testuser = { isSystemUser = true; }; 93 103 systemd.services.mysql = with pkgs; { 94 104 path = [ mysqlenv-common mysqlenv-mariabackup ]; 95 105 }; ··· 122 132 galera_03 = 123 133 { pkgs, ... }: 124 134 { 135 + imports = [ users ]; 125 136 networking = { 126 137 interfaces.eth1 = { 127 138 ipv4.addresses = [ ··· 136 147 firewall.allowedTCPPorts = [ 3306 4444 4567 4568 ]; 137 148 firewall.allowedUDPPorts = [ 4567 ]; 138 149 }; 139 - users.users.testuser = { isSystemUser = true; }; 140 150 systemd.services.mysql = with pkgs; { 141 151 path = [ mysqlenv-common mysqlenv-mariabackup ]; 142 152 };
+13 -3
nixos/tests/mysql/mariadb-galera-rsync.nix
··· 4 4 mysqlenv-common = pkgs.buildEnv { name = "mysql-path-env-common"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ bash gawk gnutar inetutils which ]; }; 5 5 mysqlenv-rsync = pkgs.buildEnv { name = "mysql-path-env-rsync"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ lsof procps rsync stunnel ]; }; 6 6 7 + # Common user configuration 8 + users = { ... }: 9 + { 10 + users.users.testuser = { 11 + isSystemUser = true; 12 + group = "testusers"; 13 + }; 14 + users.groups.testusers = { }; 15 + }; 16 + 7 17 in { 8 18 name = "mariadb-galera-rsync"; 9 19 meta = with pkgs.lib.maintainers; { ··· 17 27 galera_04 = 18 28 { pkgs, ... }: 19 29 { 30 + imports = [ users ]; 20 31 networking = { 21 32 interfaces.eth1 = { 22 33 ipv4.addresses = [ ··· 31 42 firewall.allowedTCPPorts = [ 3306 4444 4567 4568 ]; 32 43 firewall.allowedUDPPorts = [ 4567 ]; 33 44 }; 34 - users.users.testuser = { isSystemUser = true; }; 35 45 systemd.services.mysql = with pkgs; { 36 46 path = [ mysqlenv-common mysqlenv-rsync ]; 37 47 }; ··· 70 80 galera_05 = 71 81 { pkgs, ... }: 72 82 { 83 + imports = [ users ]; 73 84 networking = { 74 85 interfaces.eth1 = { 75 86 ipv4.addresses = [ ··· 84 95 firewall.allowedTCPPorts = [ 3306 4444 4567 4568 ]; 85 96 firewall.allowedUDPPorts = [ 4567 ]; 86 97 }; 87 - users.users.testuser = { isSystemUser = true; }; 88 98 systemd.services.mysql = with pkgs; { 89 99 path = [ mysqlenv-common mysqlenv-rsync ]; 90 100 }; ··· 116 126 galera_06 = 117 127 { pkgs, ... }: 118 128 { 129 + imports = [ users ]; 119 130 networking = { 120 131 interfaces.eth1 = { 121 132 ipv4.addresses = [ ··· 130 141 firewall.allowedTCPPorts = [ 3306 4444 4567 4568 ]; 131 142 firewall.allowedUDPPorts = [ 4567 ]; 132 143 }; 133 - users.users.testuser = { isSystemUser = true; }; 134 144 systemd.services.mysql = with pkgs; { 135 145 path = [ mysqlenv-common mysqlenv-rsync ]; 136 146 };
+29 -7
nixos/tests/mysql/mysql.nix
··· 1 - import ./../make-test-python.nix ({ pkgs, ...} : { 1 + import ./../make-test-python.nix ({ pkgs, ...}: 2 + 3 + 4 + let 5 + # Setup common users 6 + users = { ... }: 7 + { 8 + users.groups.testusers = { }; 9 + 10 + users.users.testuser = { 11 + isSystemUser = true; 12 + group = "testusers"; 13 + }; 14 + 15 + users.users.testuser2 = { 16 + isSystemUser = true; 17 + group = "testusers"; 18 + }; 19 + }; 20 + 21 + in 22 + 23 + { 2 24 name = "mysql"; 3 25 meta = with pkgs.lib.maintainers; { 4 26 maintainers = [ eelco shlevy ]; ··· 9 31 { pkgs, ... }: 10 32 11 33 { 12 - users.users.testuser = { isSystemUser = true; }; 13 - users.users.testuser2 = { isSystemUser = true; }; 34 + imports = [ users ]; 35 + 14 36 services.mysql.enable = true; 15 37 services.mysql.initialDatabases = [ 16 38 { name = "testdb3"; schema = ./testdb.sql; } ··· 40 62 { pkgs, ... }: 41 63 42 64 { 65 + imports = [ users ]; 66 + 43 67 # prevent oom: 44 68 # Kernel panic - not syncing: Out of memory: compulsory panic_on_oom is enabled 45 69 virtualisation.memorySize = 1024; 46 70 47 - users.users.testuser = { isSystemUser = true; }; 48 - users.users.testuser2 = { isSystemUser = true; }; 49 71 services.mysql.enable = true; 50 72 services.mysql.initialDatabases = [ 51 73 { name = "testdb3"; schema = ./testdb.sql; } ··· 75 97 { pkgs, ... }: 76 98 77 99 { 78 - users.users.testuser = { isSystemUser = true; }; 79 - users.users.testuser2 = { isSystemUser = true; }; 100 + imports = [ users ]; 101 + 80 102 services.mysql.enable = true; 81 103 services.mysql.initialScript = pkgs.writeText "mariadb-init.sql" '' 82 104 ALTER USER root@localhost IDENTIFIED WITH unix_socket;
+1 -1
nixos/tests/postfixadmin.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "postfixadmin"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ globin ]; 5 5 }; 6 6
+5 -1
nixos/tests/prometheus-exporters.nix
··· 555 555 WorkingDirectory = "/var/spool/mail"; 556 556 }; 557 557 }; 558 - users.users.mailexporter.isSystemUser = true; 558 + users.users.mailexporter = { 559 + isSystemUser = true; 560 + group = "mailexporter"; 561 + }; 562 + users.groups.mailexporter = {}; 559 563 }; 560 564 exporterTest = '' 561 565 wait_for_unit("postfix.service")
+2
nixos/tests/systemd-networkd-ipv6-prefix-delegation.nix
··· 42 42 # DO NOT COPY THIS TO PRODUCTION AS IS. Think about it at least twice. 43 43 # Everyone on the "isp" machine will be able to add routes to the kernel. 44 44 security.wrappers.add-dhcpd-lease = { 45 + owner = "root"; 46 + group = "root"; 45 47 source = pkgs.writeShellScript "add-dhcpd-lease" '' 46 48 exec ${pkgs.iproute2}/bin/ip -6 route replace "$1" via "$2" 47 49 '';
+1 -1
nixos/tests/tigervnc.nix
··· 6 6 with import ../lib/testing-python.nix { inherit system pkgs; }; 7 7 makeTest { 8 8 name = "tigervnc"; 9 - meta = with pkgs.stdenv.lib.maintainers; { 9 + meta = with pkgs.lib.maintainers; { 10 10 maintainers = [ lheckemann ]; 11 11 }; 12 12
+1 -1
nixos/tests/wasabibackend.nix
··· 14 14 port = 18332; 15 15 }; 16 16 }; 17 - services.bitcoind = { 17 + services.bitcoind."testnet" = { 18 18 enable = true; 19 19 testnet = true; 20 20 rpc.users = {
+9 -3
pkgs/applications/blockchains/electrs/default.nix
··· 2 2 , rustPlatform 3 3 , fetchFromGitHub 4 4 , llvmPackages 5 + , rocksdb 5 6 }: 6 7 7 8 rustPlatform.buildRustPackage rec { 8 9 pname = "electrs"; 9 - version = "0.8.11"; 10 + version = "0.8.12"; 10 11 11 12 src = fetchFromGitHub { 12 13 owner = "romanz"; 13 14 repo = pname; 14 15 rev = "v${version}"; 15 - sha256 = "024sdyvrx7s4inldamq4c8lv0iijjyd18j1mm9x6xf2clmvicaa6"; 16 + sha256 = "0kd5zki9f1pnwscnvd921dw0lc45nfkwk23l33nzdjn005lmsw7v"; 16 17 }; 17 18 19 + cargoSha256 = "1l8dwjwj21crxampzj5c0k98xnisgy3d9c3dkgf5vaybrcp04k85"; 20 + 18 21 # needed for librocksdb-sys 19 22 nativeBuildInputs = [ llvmPackages.clang ]; 20 23 LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib"; 21 24 22 - cargoSha256 = "0yl50ryxidbs9wkabz919mgbmsgsqjp1bjw792l1lkgncq8z9r5b"; 25 + # link rocksdb dynamically 26 + ROCKSDB_INCLUDE_DIR = "${rocksdb}/include"; 27 + ROCKSDB_LIB_DIR = "${rocksdb}/lib"; 28 + cargoBuildFlags = "--no-default-features"; 23 29 24 30 meta = with lib; { 25 31 description = "An efficient re-implementation of Electrum Server in Rust";
+2 -2
pkgs/applications/blockchains/ledger-live-desktop/default.nix
··· 2 2 3 3 let 4 4 pname = "ledger-live-desktop"; 5 - version = "2.32.2"; 5 + version = "2.33.1"; 6 6 name = "${pname}-${version}"; 7 7 8 8 src = fetchurl { 9 9 url = "https://github.com/LedgerHQ/${pname}/releases/download/v${version}/${pname}-${version}-linux-x86_64.AppImage"; 10 - sha256 = "14agkl6xf0f9s5qldla6p6kzl8zlx61q5m8qy63lq215hrzh9d50"; 10 + sha256 = "1k1h37fbpsib9h8867m2dsfacdjs78gdm61gvrin5gpw1zj10syz"; 11 11 }; 12 12 13 13 appimageContents = appimageTools.extractType2 {
+2 -2
pkgs/applications/misc/wike/default.nix
··· 14 14 ]); 15 15 in stdenv.mkDerivation rec { 16 16 pname = "wike"; 17 - version = "1.5.6"; 17 + version = "1.5.7"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "hugolabe"; 21 21 repo = "Wike"; 22 22 rev = version; 23 - sha256 = "1qnxzxqjj0sn522k15plskwa7nlhhbcipfc3w17fbq3k2zhpr1yy"; 23 + sha256 = "sha256-SB+ApuSovqQCaZYPhH+duf+c07JDSSCRz8hTVhEa4gY="; 24 24 }; 25 25 26 26 nativeBuildInputs = [
+2 -2
pkgs/applications/networking/browsers/vieb/default.nix
··· 2 2 3 3 mkYarnPackage rec { 4 4 pname = "vieb"; 5 - version = "6.0.0"; 5 + version = "6.1.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "Jelmerro"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "sha256-3mX6z/CRUQdyQxYK50yqCZIrhPgitsyus4oLkbPqNvM="; 11 + sha256 = "sha256-MJJeHnwfXouBygRT/wFWFMRHxQVf/3k2c7vp/tkD5co="; 12 12 }; 13 13 14 14 packageJSON = ./package.json;
+12 -4
pkgs/applications/networking/cluster/k3s/default.nix
··· 45 45 let 46 46 k3sVersion = "1.21.4+k3s1"; # k3s git tag 47 47 k3sCommit = "3e250fdbab72d88f7e6aae57446023a0567ffc97"; # k3s git commit at the above version 48 + k3sRepoSha256 = "1w7drvk0bmlmqrxh1y6dxjy7dk6bdrl72pkd25lc1ir6wbzb05h9"; 48 49 49 50 traefikChartVersion = "9.18.2"; # taken from ./scripts/download at TRAEFIK_VERSION 51 + traefikChartSha256 = "sha256-9d7p0ngyMN27u4OPgz7yI14Zj9y36t9o/HMX5wyDpUI="; 52 + 50 53 k3sRootVersion = "0.9.1"; # taken from ./scripts/download at ROOT_VERSION 54 + k3sRootSha256 = "sha256-qI84KYJKY/T6pqWZW9lOTq5NzZiu//v1zrMzUCiRTGQ="; 55 + 51 56 k3sCNIVersion = "0.8.6-k3s1"; # taken from ./scripts/version.sh at VERSION_CNIPLUGINS 57 + k3sCNISha256 = "sha256-uAy17eRRAXPCcnh481KxFMvFQecnnBs24jn5YnVNfY4="; 52 58 53 59 baseMeta = { 54 60 description = "A lightweight Kubernetes distribution"; ··· 61 67 # bundled into the k3s binary 62 68 traefikChart = fetchurl { 63 69 url = "https://helm.traefik.io/traefik/traefik-${traefikChartVersion}.tgz"; 64 - sha256 = "sha256-9d7p0ngyMN27u4OPgz7yI14Zj9y36t9o/HMX5wyDpUI="; 70 + sha256 = traefikChartSha256; 65 71 }; 66 72 # so, k3s is a complicated thing to package 67 73 # This derivation attempts to avoid including any random binaries from the ··· 75 81 k3sRoot = fetchzip { 76 82 # Note: marked as apache 2.0 license 77 83 url = "https://github.com/k3s-io/k3s-root/releases/download/v${k3sRootVersion}/k3s-root-amd64.tar"; 78 - sha256 = "sha256-qI84KYJKY/T6pqWZW9lOTq5NzZiu//v1zrMzUCiRTGQ="; 84 + sha256 = k3sRootSha256; 79 85 stripRoot = false; 80 86 }; 81 87 k3sPlugins = buildGoPackage rec { ··· 89 95 owner = "rancher"; 90 96 repo = "plugins"; 91 97 rev = "v${version}"; 92 - sha256 = "sha256-uAy17eRRAXPCcnh481KxFMvFQecnnBs24jn5YnVNfY4="; 98 + sha256 = k3sCNISha256; 93 99 }; 94 100 95 101 meta = baseMeta // { ··· 101 107 k3sRepo = fetchgit { 102 108 url = "https://github.com/k3s-io/k3s"; 103 109 rev = "v${k3sVersion}"; 104 - sha256 = "1w7drvk0bmlmqrxh1y6dxjy7dk6bdrl72pkd25lc1ir6wbzb05h9"; 110 + sha256 = k3sRepoSha256; 105 111 }; 106 112 # Stage 1 of the k3s build: 107 113 # Let's talk about how k3s is structured. ··· 279 285 installCheckPhase = '' 280 286 $out/bin/k3s --version | grep v${k3sVersion} > /dev/null 281 287 ''; 288 + 289 + passthru.updateScript = ./update.sh; 282 290 283 291 meta = baseMeta; 284 292 }
+62
pkgs/applications/networking/cluster/k3s/update.sh
··· 1 + #!/usr/bin/env nix-shell 2 + #!nix-shell -i bash -p curl gnugrep gnused jq 3 + 4 + set -eu -o pipefail 5 + 6 + WORKDIR=$(mktemp -d) 7 + trap "rm -rf ${WORKDIR}" EXIT 8 + 9 + cd $(dirname "${BASH_SOURCE[0]}") 10 + 11 + LATEST_TAG_RAWFILE=${WORKDIR}/latest_tag.json 12 + curl --silent ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} \ 13 + https://api.github.com/repos/k3s-io/k3s/releases/latest > ${LATEST_TAG_RAWFILE} 14 + 15 + LATEST_TAG_NAME=$(jq -r '.tag_name' ${LATEST_TAG_RAWFILE}) 16 + 17 + K3S_VERSION=$(echo ${LATEST_TAG_NAME} | sed 's/^v//') 18 + 19 + LATEST_TAG_TARBALL_URL=$(jq -r '.tarball_url' ${LATEST_TAG_RAWFILE}) 20 + 21 + K3S_COMMIT=$(curl --silent ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} \ 22 + https://api.github.com/repos/k3s-io/k3s/tags \ 23 + | jq -r "map(select(.name == \"${LATEST_TAG_NAME}\")) | .[0] | .commit.sha") 24 + 25 + K3S_REPO_SHA256=$(nix-prefetch-url --quiet --unpack ${LATEST_TAG_TARBALL_URL}) 26 + 27 + FILE_SCRIPTS_DOWNLOAD=${WORKDIR}/scripts-download 28 + curl --silent https://raw.githubusercontent.com/k3s-io/k3s/${K3S_COMMIT}/scripts/download > $FILE_SCRIPTS_DOWNLOAD 29 + 30 + FILE_SCRIPTS_VERSION=${WORKDIR}/scripts-version.sh 31 + curl --silent https://raw.githubusercontent.com/k3s-io/k3s/${K3S_COMMIT}/scripts/version.sh > $FILE_SCRIPTS_VERSION 32 + 33 + TRAEFIK_CHART_VERSION=$(grep TRAEFIK_VERSION= $FILE_SCRIPTS_DOWNLOAD \ 34 + | cut -d'=' -f2 | cut -d' ' -f1) 35 + TRAEFIK_CHART_SHA256=$(nix-prefetch-url --quiet "https://helm.traefik.io/traefik/traefik-${TRAEFIK_CHART_VERSION}.tgz") 36 + 37 + K3S_ROOT_VERSION=$(grep ROOT_VERSION= $FILE_SCRIPTS_DOWNLOAD \ 38 + | cut -d'=' -f2 | cut -d' ' -f1 | sed 's/^v//') 39 + K3S_ROOT_SHA256=$(nix-prefetch-url --quiet --unpack \ 40 + "https://github.com/k3s-io/k3s-root/releases/download/v${K3S_ROOT_VERSION}/k3s-root-amd64.tar") 41 + 42 + CNIPLUGINS_VERSION=$(grep VERSION_CNIPLUGINS= $FILE_SCRIPTS_VERSION \ 43 + | cut -d'=' -f2 | cut -d' ' -f1 | sed -e 's/"//g' -e 's/^v//') 44 + CNIPLUGINS_SHA256=$(nix-prefetch-url --quiet --unpack \ 45 + "https://github.com/rancher/plugins/archive/refs/tags/v${CNIPLUGINS_VERSION}.tar.gz") 46 + 47 + setKV () { 48 + sed -i "s/$1 = \".*\"/$1 = \"$2\"/" ./default.nix 49 + } 50 + 51 + setKV k3sVersion ${K3S_VERSION} 52 + setKV k3sCommit ${K3S_COMMIT} 53 + setKV k3sRepoSha256 ${K3S_REPO_SHA256} 54 + 55 + setKV traefikChartVersion ${TRAEFIK_CHART_VERSION} 56 + setKV traefikChartSha256 ${TRAEFIK_CHART_SHA256} 57 + 58 + setKV k3sRootVersion ${K3S_ROOT_VERSION} 59 + setKV k3sRootSha256 ${K3S_ROOT_SHA256} 60 + 61 + setKV k3sCNIVersion ${CNIPLUGINS_VERSION} 62 + setKV k3sCNISha256 ${CNIPLUGINS_SHA256}
+2 -2
pkgs/applications/office/super-productivity/default.nix
··· 5 5 in 6 6 stdenv.mkDerivation rec { 7 7 pname = "super-productivity"; 8 - version = "7.2.1"; 8 + version = "7.5.1"; 9 9 10 10 src = fetchurl { 11 11 url = "https://github.com/johannesjo/super-productivity/releases/download/v${version}/superProductivity-${version}.AppImage"; 12 - sha256 = "93eeb56fe923c48a9384cde0633e98a9d9dc5c0869fce63b9724ff74bb400049"; 12 + sha256 = "sha256-ezJN/t0iNk0haMLPioEQSNXU4ugVeJe44GNVGd+cOF4="; 13 13 name = "${pname}-${version}.AppImage"; 14 14 }; 15 15
+3 -6
pkgs/applications/version-management/git-and-tools/git-machete/default.nix
··· 1 1 { lib, buildPythonApplication, fetchPypi 2 2 , installShellFiles, pbr 3 - , flake8, mock, pycodestyle, pylint, tox 3 + , flake8, mock, pycodestyle, pylint, stestr, tox 4 4 , nix-update-script 5 5 , testVersion, git-machete 6 6 }: ··· 16 16 17 17 nativeBuildInputs = [ installShellFiles pbr ]; 18 18 19 - # TODO: Add missing check inputs (2019-11-22): 20 - # - stestr 21 - doCheck = false; 22 - checkInputs = [ flake8 mock pycodestyle pylint tox ]; 19 + checkInputs = [ flake8 mock pycodestyle pylint stestr tox ]; 23 20 24 21 postInstall = '' 25 22 installShellCompletion --bash --name git-machete completion/git-machete.completion.bash ··· 43 40 description = "Git repository organizer and rebase/merge workflow automation tool"; 44 41 license = licenses.mit; 45 42 platforms = platforms.all; 46 - maintainers = [ maintainers.blitz ]; 43 + maintainers = with maintainers; [ blitz ]; 47 44 }; 48 45 }
+2 -2
pkgs/development/libraries/symengine/default.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "symengine"; 12 - version = "0.7.0"; 12 + version = "0.8.1"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "symengine"; 16 16 repo = "symengine"; 17 17 rev = "v${version}"; 18 - sha256 = "sha256-aoitTT9fwTIs3ovfqQjKGgrU+kT5mj+vDHt5lg49JHU="; 18 + sha256 = "sha256-HTDOSgdWo9MWmKeXOkOHAJjgvihUAkSXoYTeMz9XXLI="; 19 19 }; 20 20 21 21 nativeBuildInputs = [ cmake ];
+1
pkgs/development/python-modules/cmd2/default.nix
··· 68 68 meta = with lib; { 69 69 description = "Enhancements for standard library's cmd module"; 70 70 homepage = "https://github.com/python-cmd2/cmd2"; 71 + license = with licenses; [ mit ]; 71 72 maintainers = with maintainers; [ teto ]; 72 73 }; 73 74 }
+42
pkgs/development/python-modules/maxcube-api/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , pythonOlder 4 + , fetchFromGitHub 5 + , python 6 + }: 7 + 8 + buildPythonPackage rec { 9 + pname = "maxcube-api"; 10 + version = "0.4.3"; 11 + format = "setuptools"; 12 + disabled = pythonOlder "3.7"; 13 + 14 + src = fetchFromGitHub { 15 + owner = "hackercowboy"; 16 + repo = "python-${pname}"; 17 + rev = "V${version}"; 18 + sha256 = "10k61gfpnqljf3p3qxr97xq7j67a9cr4ivd9v72hdni0znrbx6ym"; 19 + }; 20 + 21 + postPatch = '' 22 + substituteInPlace setup.py --replace "license=license" "license='MIT'" 23 + ''; 24 + 25 + pythonImportsCheck = [ 26 + "maxcube" 27 + "maxcube.cube" 28 + ]; 29 + 30 + checkPhase = '' 31 + runHook preCheck 32 + ${python.interpreter} -m unittest discover 33 + runHook postCheck 34 + ''; 35 + 36 + meta = with lib; { 37 + description = "eQ-3/ELV MAX! Cube Python API"; 38 + homepage = "https://github.com/hackercowboy/python-maxcube-api"; 39 + license = licenses.mit; 40 + maintainers = with maintainers; [ hexa ]; 41 + }; 42 + }
+56
pkgs/development/python-modules/notus-scanner/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , fetchpatch 5 + , paho-mqtt 6 + , poetry-core 7 + , psutil 8 + , pytestCheckHook 9 + , pythonOlder 10 + }: 11 + 12 + buildPythonPackage rec { 13 + pname = "notus-scanner"; 14 + version = "unstable-2021-09-05"; 15 + format = "pyproject"; 16 + 17 + disabled = pythonOlder "3.7"; 18 + 19 + src = fetchFromGitHub { 20 + owner = "greenbone"; 21 + repo = pname; 22 + rev = "049f9a5e6439e4e5113e3b8f30b25ead12d42a56"; 23 + sha256 = "1fjxyn8wg2kf6xy3pbh7d7yn20dk529p03xpqyz7s40n9nsxhnza"; 24 + }; 25 + 26 + nativeBuildInputs = [ 27 + poetry-core 28 + ]; 29 + 30 + propagatedBuildInputs = [ 31 + paho-mqtt 32 + psutil 33 + ]; 34 + 35 + checkInputs = [ 36 + pytestCheckHook 37 + ]; 38 + 39 + patches = [ 40 + # Switch to poetry-core, https://github.com/greenbone/notus-scanner/pull/31 41 + (fetchpatch { 42 + name = "switch-to-poetry-core.patch"; 43 + url = "https://github.com/greenbone/notus-scanner/commit/b52eea317faca30d411096044f9e5ea20b58da65.patch"; 44 + sha256 = "0q11aslhva47kkpsnpayra7spa849j894vqv34pjqhcnlyipqw6d"; 45 + }) 46 + ]; 47 + 48 + pythonImportsCheck = [ "notus.scanner" ]; 49 + 50 + meta = with lib; { 51 + description = "Helper to create results from local security checks"; 52 + homepage = "https://github.com/greenbone/notus-scanner"; 53 + license = with licenses; [ agpl3Plus ]; 54 + maintainers = with maintainers; [ fab ]; 55 + }; 56 + }
+15 -3
pkgs/development/python-modules/pyspnego/default.nix
··· 2 2 , buildPythonPackage 3 3 , cryptography 4 4 , fetchFromGitHub 5 + , gssapi 6 + , krb5 7 + , ruamel-yaml 5 8 , pytest-mock 6 9 , pytestCheckHook 7 10 , pythonOlder ··· 10 13 11 14 buildPythonPackage rec { 12 15 pname = "pyspnego"; 13 - version = "0.1.6"; 14 - disabled = pythonOlder "3.6"; 16 + version = "0.2.0"; 17 + 18 + disabled = pythonOlder "3.7"; 15 19 16 20 src = fetchFromGitHub { 17 21 owner = "jborean93"; 18 22 repo = pname; 19 23 rev = "v${version}"; 20 - sha256 = "0pfh2x0539f0k2qi2pbjm64b2fqp64c63xxpinvg1yfaw915kgpb"; 24 + sha256 = "sha256-puv9aq53NbjSuN561XFou404N9pIxvvMjZMgnNx3SjM="; 21 25 }; 22 26 23 27 propagatedBuildInputs = [ 24 28 cryptography 29 + gssapi 30 + krb5 31 + ruamel-yaml 25 32 ]; 26 33 27 34 checkInputs = [ 28 35 glibcLocales 29 36 pytest-mock 30 37 pytestCheckHook 38 + ]; 39 + 40 + disabledTests = [ 41 + # struct.error: unpack requires a buffer of 1 bytes 42 + "test_credssp_invalid_client_authentication" 31 43 ]; 32 44 33 45 LC_ALL = "en_US.UTF-8";
+4 -3
pkgs/development/python-modules/symengine/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "symengine"; 14 - version = "0.7.2"; 14 + version = "0.8.1"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "symengine"; 18 18 repo = "symengine.py"; 19 19 rev = "v${version}"; 20 - sha256 = "1xaclpvk7m6mbp70zrsvi3blz4v89pbsf7b6rpmx5903m6kxqr4m"; 20 + sha256 = "0yyi3w03fk19i32jmns1baq3rpmf7xfykzkivc7dmnxmjmxvq2gr"; 21 21 }; 22 22 23 23 postConfigure = '' 24 24 substituteInPlace setup.py \ 25 - --replace "\"cmake\"" "\"${cmake}/bin/cmake\"" 25 + --replace "\"cmake\"" "\"${cmake}/bin/cmake\"" \ 26 + --replace "'cython>=0.29.24'" "'cython'" 26 27 27 28 substituteInPlace cmake/FindCython.cmake \ 28 29 --replace "SET(CYTHON_BIN cython" "SET(CYTHON_BIN ${cython}/bin/cython"
+3 -3
pkgs/development/tools/protoc-gen-twirp_php/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "protoc-gen-twirp_php"; 5 - version = "0.7.1"; 5 + version = "0.7.5"; 6 6 7 7 # fetchFromGitHub currently not possible, because go.mod and go.sum are export-ignored 8 8 src = fetchgit { 9 9 url = "https://github.com/twirphp/twirp.git"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-94GN/Gq3RXXg83eUsmIcdF4VuK4syCgD0Zkc5eDiVYE="; 11 + sha256 = "sha256-pHGGZaMBggBUu2CZCxWrZ592K5V93vPI2sZnFkqku2k="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-gz4JELCffuh7dyFdBex8/SFZ1/PDXuC/93m3WNHwRss="; 14 + vendorSha256 = "sha256-p7t+2QgPkcTmsK+jKcPCPDCchNup9F326yKc6JbJHOE="; 15 15 16 16 subPackages = [ "protoc-gen-twirp_php" ]; 17 17
+3 -3
pkgs/development/tools/rust/cargo-watch/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "cargo-watch"; 5 - version = "8.0.0"; 5 + version = "8.1.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "passcod"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-3IgzMUCkcKUkhTb/ZNRONdvB6Ci0OBB1dcjtc65U8xE="; 11 + sha256 = "sha256-Vvr/O0Xk9hmUVUFoOk/MzTlEvR0Spx5n/9lsE2HfkF8="; 12 12 }; 13 13 14 - cargoSha256 = "sha256-Xp/pxPKs41TXO/EUY5x8Bha7NUioMabbb73///fFr6U="; 14 + cargoSha256 = "sha256-kX9CE95Z2nLb6VM19bu+UkOZ/hsjHUo/JMu0Y0xont0="; 15 15 16 16 buildInputs = lib.optionals stdenv.isDarwin [ CoreServices Foundation libiconv ]; 17 17
+2 -2
pkgs/os-specific/linux/kernel/linux-4.14.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "4.14.246"; 6 + version = "4.14.247"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz"; 16 - sha256 = "0fpgig84shpas1jc0h4s3aw9brkcq1as84gjbk4bfhc48bpi4mlw"; 16 + sha256 = "1kdhlsqpmw68xnfiyx98id8wis6kkxca2d4n7w2ncax0kyzrwyz7"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-4.19.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "4.19.206"; 6 + version = "4.19.207"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz"; 16 - sha256 = "1h44lvzxd0cngj71bk8qba9dz7jlqj68ir6xjwfafglb81ppgsxp"; 16 + sha256 = "1fb658n89xf9asnaqi0bnh64ir2f78bdqyjvfb983qad9wqsadym"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-4.4.nix
··· 1 1 { buildPackages, fetchurl, perl, buildLinux, nixosTests, stdenv, ... } @ args: 2 2 3 3 buildLinux (args // rec { 4 - version = "4.4.283"; 4 + version = "4.4.284"; 5 5 extraMeta.branch = "4.4"; 6 6 extraMeta.broken = stdenv.isAarch64; 7 7 8 8 src = fetchurl { 9 9 url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz"; 10 - sha256 = "1d9v4h4cbc4i371lhhwpxbmg88gna6xyi2ahfvv0clz60802y982"; 10 + sha256 = "00xkd2p181cfkys4nri93xy7snmn8g2481x3qz0js7g9p3kz5bqf"; 11 11 }; 12 12 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-4.9.nix
··· 1 1 { buildPackages, fetchurl, perl, buildLinux, nixosTests, stdenv, ... } @ args: 2 2 3 3 buildLinux (args // rec { 4 - version = "4.9.282"; 4 + version = "4.9.283"; 5 5 extraMeta.branch = "4.9"; 6 6 extraMeta.broken = stdenv.isAarch64; 7 7 8 8 src = fetchurl { 9 9 url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz"; 10 - sha256 = "059fin4si93ya13xy831w84q496ksxidpd3kyw38918sfy4p6wk7"; 10 + sha256 = "0pdh1lyhdp5c5n39wpr622kgchgf30iqk853a2rv9m3s3fry50lm"; 11 11 }; 12 12 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.10.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "5.10.67"; 6 + version = "5.10.68"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "10lap66d84s1cfakbgfsbabgxm42060c4wcvpzxbi4r5g2m40mwc"; 16 + sha256 = "08cl4bg9k331apj5fjl3jx6s6l543dnbjc1cfvin951m7l787ahv"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.14.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "5.14.6"; 6 + version = "5.14.7"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "1v6cicakpg0fdp74r2a4h46sj7rzpjdf4cscbr8y67kpd098r12l"; 16 + sha256 = "1avypasvic298823xzpzzkjbmfv9s8bjnmq92ri62qbakx23j9dg"; 17 17 }; 18 18 } // (args.argsOverride or { }))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.4.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "5.4.147"; 6 + version = "5.4.148"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "07242nlxf4s73ffdir3dsi37cjmm6bw9w7kac0j7x1s1j8sh9h7n"; 16 + sha256 = "1cwibh0y112hip5yd0n692rv44jh4sk2g6mj5n44g754k4i366a6"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+1 -1
pkgs/servers/home-assistant/component-packages.nix
··· 493 493 "marytts" = ps: with ps; [ ]; # missing inputs: speak2mary 494 494 "mastodon" = ps: with ps; [ mastodon-py ]; 495 495 "matrix" = ps: with ps; [ matrix-client ]; 496 - "maxcube" = ps: with ps; [ ]; # missing inputs: maxcube-api 496 + "maxcube" = ps: with ps; [ maxcube-api ]; 497 497 "mazda" = ps: with ps; [ pymazda ]; 498 498 "mcp23017" = ps: with ps; [ ]; # missing inputs: RPi.GPIO adafruit-circuitpython-mcp230xx 499 499 "media_extractor" = ps: with ps; [ aiohttp-cors youtube-dl-light ];
+1
pkgs/servers/home-assistant/default.nix
··· 486 486 "mailbox" 487 487 "manual" 488 488 "manual_mqtt" 489 + "maxcube" 489 490 "mazda" 490 491 "media_player" 491 492 "media_source"
+2 -1
pkgs/servers/nosql/redis/default.nix
··· 1 1 { lib, stdenv, fetchurl, lua, pkg-config, nixosTests 2 2 , withSystemd ? stdenv.isLinux && !stdenv.hostPlatform.isMusl, systemd 3 - , tlsSupport ? true, openssl 3 + # dependency ordering is broken at the moment when building with openssl 4 + , tlsSupport ? !stdenv.hostPlatform.isStatic, openssl 4 5 }: 5 6 6 7 stdenv.mkDerivation rec {
+3 -3
pkgs/servers/sql/dolt/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "dolt"; 5 - version = "0.27.4.2"; 5 + version = "0.28.4"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "liquidata-inc"; 9 9 repo = "dolt"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-nEIYt9yPDxPbJ/IHH8eQpVSNtC5pYiagCC5TliqX11M="; 11 + sha256 = "sha256-J/4YEiSmoWhs+pnJN21CwNwpujZ1cldLmgwajBB+IRU="; 12 12 }; 13 13 14 14 modRoot = "./go"; 15 15 subPackages = [ "cmd/dolt" "cmd/git-dolt" "cmd/git-dolt-smudge" ]; 16 - vendorSha256 = "sha256-XbKaPbPIgUxqJB8kgd3fJIESO9XvNREExdp06Th2bu0="; 16 + vendorSha256 = "sha256-l3jRQ4Z7xku1nMfYfc6nJ3qF6A1maY0tRfZpHCtsujI="; 17 17 18 18 doCheck = false; 19 19
+3 -3
pkgs/tools/graphics/svgbob/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "svgbob"; 5 - version = "0.5.4"; 5 + version = "0.6.2"; 6 6 7 7 src = fetchCrate { 8 8 inherit version; 9 9 crateName = "svgbob_cli"; 10 - sha256 = "0qq7hkg32bqyw3vz3ibip7yrjg5m2ch9kdnwqrzaqqy9wb8d7154"; 10 + sha256 = "sha256-9JASoUN/VzZS8ihepTQL2SXZitxKBMSJEv+13vzQd3w="; 11 11 }; 12 12 13 - cargoSha256 = "0p37qkgh1xpqmkr2p88njwhifpyqfh27qcwmmhwxdqcpzmmmkjhr"; 13 + cargoSha256 = "sha256-pkdiow+9gsQ9rrSHwukd17r5CfsaJgYj6KA4wYKbtA0="; 14 14 15 15 meta = with lib; { 16 16 description = "Convert your ascii diagram scribbles into happy little SVG";
+3 -3
pkgs/tools/misc/dust/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "du-dust"; 5 - version = "0.6.2"; 5 + version = "0.7.5"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "bootandy"; 9 9 repo = "dust"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-5GhoL3by4sXhFJrNZi/UlERBa+s2oqDVVJODY0kdfxI="; 11 + sha256 = "sha256-0r0cDzW18uF7DHvzkUCHHHN+2M21xdi2ffPwDGMtyw8="; 12 12 # Remove unicode file names which leads to different checksums on HFS+ 13 13 # vs. other filesystems because of unicode normalisation. 14 14 extraPostFetch = '' ··· 16 16 ''; 17 17 }; 18 18 19 - cargoSha256 = "sha256-cgH3jrZPGUHiBDeJ9qj80dU+Vbz+wHMOsCaGAvJY6mg="; 19 + cargoSha256 = "sha256-LAow4DVqON5vrYBU8v8wzg/HcHxm1GqS9DMre3y12Jo="; 20 20 21 21 doCheck = false; 22 22
+2 -2
pkgs/tools/misc/svtplay-dl/default.nix
··· 9 9 10 10 in stdenv.mkDerivation rec { 11 11 pname = "svtplay-dl"; 12 - version = "4.3"; 12 + version = "4.5"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "spaam"; 16 16 repo = "svtplay-dl"; 17 17 rev = version; 18 - sha256 = "04gmiqg6mq96fw4v1v6947i216fsf0vcnjp3ya8bbii5na91y1aa"; 18 + sha256 = "sha256-TiJWy5WU1VsseodfgfemAsUc5/hDwSlM03ITRYTvJbg="; 19 19 }; 20 20 21 21 pythonPaths = [ cryptography pyyaml requests ];
+3 -3
pkgs/tools/security/kubescape/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "kubescape"; 8 - version = "1.0.77"; 8 + version = "1.0.85"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "armosec"; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-g2Mco4NuPVjS4/6KNhtb8864e7RiuzlrdIbM6NLJK7I="; 14 + sha256 = "19r7dgr0y1k9qa4llxbgaf69j88vs9h2gx29bwbh6dq17q58sfdl"; 15 15 }; 16 16 17 - vendorSha256 = "sha256-FtglYTCLjQfDKxdnQZnpWm3QjJCiHGsPC/gW88DZu6I="; 17 + vendorSha256 = "18mvv70g65pq1c7nn752j26d0vasx6cl2rqp5g1hg3cb61hjbn0n"; 18 18 19 19 # One test is failing, disabling for now 20 20 doCheck = false;
+2 -2
pkgs/tools/system/java-service-wrapper/default.nix
··· 5 5 6 6 stdenv.mkDerivation rec { 7 7 pname = "java-service-wrapper"; 8 - version = "3.5.45"; 8 + version = "3.5.46"; 9 9 10 10 src = fetchurl { 11 11 url = "https://wrapper.tanukisoftware.com/download/${version}/wrapper_${version}_src.tar.gz"; 12 - sha256 = "sha256-rnlloa0DicWT1RlP2szDvBINvT5/RZ17GOarUzvX1AI="; 12 + sha256 = "sha256-guHQyFSI0TidAuOr4zWaf3WRGeNW4+Or1sbWdhWuWtg="; 13 13 }; 14 14 15 15 buildInputs = [ jdk ];
+2 -2
pkgs/tools/typesetting/sile/default.nix
··· 38 38 39 39 stdenv.mkDerivation rec { 40 40 pname = "sile"; 41 - version = "0.11.1"; 41 + version = "0.12.0"; 42 42 43 43 src = fetchurl { 44 44 url = "https://github.com/sile-typesetter/sile/releases/download/v${version}/${pname}-${version}.tar.xz"; 45 - sha256 = "06bx94zx6skhizk2bbrid82sldwgxfycvjh6zx1zy1xz8gajgrm3"; 45 + sha256 = "1rkdzf4khyvsn5qg455mdhnlacxlqgi9vchy369a66qp5nrs50y9"; 46 46 }; 47 47 48 48 configureFlags = [
+2
pkgs/top-level/all-packages.nix
··· 30491 30491 30492 30492 nota = haskellPackages.callPackage ../applications/science/math/nota { }; 30493 30493 30494 + notus-scanner = with python3Packages; toPythonApplication notus-scanner; 30495 + 30494 30496 openblas = callPackage ../development/libraries/science/math/openblas { }; 30495 30497 30496 30498 # A version of OpenBLAS using 32-bit integers on all platforms for compatibility with
+4
pkgs/top-level/python-packages.nix
··· 4492 4492 4493 4493 mautrix-appservice = self.mautrix; # alias 2019-12-28 4494 4494 4495 + maxcube-api = callPackage ../development/python-modules/maxcube-api { }; 4496 + 4495 4497 maxminddb = callPackage ../development/python-modules/maxminddb { }; 4496 4498 4497 4499 maya = callPackage ../development/python-modules/maya { }; ··· 5003 5005 }; 5004 5006 5005 5007 nototools = callPackage ../data/fonts/noto-fonts/tools.nix { }; 5008 + 5009 + notus-scanner = callPackage ../development/python-modules/notus-scanner { }; 5006 5010 5007 5011 nplusone = callPackage ../development/python-modules/nplusone { }; 5008 5012