lol

Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
0fde33f6 2e57a139

+210 -114
+6 -6
nixos/doc/manual/from_md/installation/installing.chapter.xml
··· 177 177 the boot partition. 178 178 </para> 179 179 <programlisting> 180 - # parted /dev/sda -- mkpart primary 512MiB -8GiB 180 + # parted /dev/sda -- mkpart primary 512MB -8GB 181 181 </programlisting> 182 182 </listitem> 183 183 <listitem> 184 184 <para> 185 185 Next, add a <emphasis>swap</emphasis> partition. The size 186 - required will vary according to needs, here a 8GiB one is 186 + required will vary according to needs, here a 8GB one is 187 187 created. 188 188 </para> 189 189 <programlisting> 190 - # parted /dev/sda -- mkpart primary linux-swap -8GiB 100% 190 + # parted /dev/sda -- mkpart primary linux-swap -8GB 100% 191 191 </programlisting> 192 192 <note> 193 193 <para> ··· 204 204 reserved 512MiB at the start of the disk. 205 205 </para> 206 206 <programlisting> 207 - # parted /dev/sda -- mkpart ESP fat32 1MiB 512MiB 207 + # parted /dev/sda -- mkpart ESP fat32 1MB 512MB 208 208 # parted /dev/sda -- set 3 esp on 209 209 </programlisting> 210 210 </listitem> ··· 242 242 live. 243 243 </para> 244 244 <programlisting> 245 - # parted /dev/sda -- mkpart primary 1MiB -8GiB 245 + # parted /dev/sda -- mkpart primary 1MB -8GB 246 246 </programlisting> 247 247 </listitem> 248 248 <listitem> ··· 252 252 created. 253 253 </para> 254 254 <programlisting> 255 - # parted /dev/sda -- mkpart primary linux-swap -8GiB 100% 255 + # parted /dev/sda -- mkpart primary linux-swap -8GB 100% 256 256 </programlisting> 257 257 <note> 258 258 <para>
+6 -6
nixos/doc/manual/installation/installing.chapter.md
··· 133 133 which will be used by the boot partition. 134 134 135 135 ```ShellSession 136 - # parted /dev/sda -- mkpart primary 512MiB -8GiB 136 + # parted /dev/sda -- mkpart primary 512MB -8GB 137 137 ``` 138 138 139 139 3. Next, add a *swap* partition. The size required will vary according 140 - to needs, here a 8GiB one is created. 140 + to needs, here a 8GB one is created. 141 141 142 142 ```ShellSession 143 - # parted /dev/sda -- mkpart primary linux-swap -8GiB 100% 143 + # parted /dev/sda -- mkpart primary linux-swap -8GB 100% 144 144 ``` 145 145 146 146 ::: {.note} ··· 153 153 reserved 512MiB at the start of the disk. 154 154 155 155 ```ShellSession 156 - # parted /dev/sda -- mkpart ESP fat32 1MiB 512MiB 156 + # parted /dev/sda -- mkpart ESP fat32 1MB 512MB 157 157 # parted /dev/sda -- set 3 esp on 158 158 ``` 159 159 ··· 180 180 end part, where the swap will live. 181 181 182 182 ```ShellSession 183 - # parted /dev/sda -- mkpart primary 1MiB -8GiB 183 + # parted /dev/sda -- mkpart primary 1MB -8GB 184 184 ``` 185 185 186 186 3. Finally, add a *swap* partition. The size required will vary 187 187 according to needs, here a 8GiB one is created. 188 188 189 189 ```ShellSession 190 - # parted /dev/sda -- mkpart primary linux-swap -8GiB 100% 190 + # parted /dev/sda -- mkpart primary linux-swap -8GB 100% 191 191 ``` 192 192 193 193 ::: {.note}
+18 -16
nixos/modules/services/backup/syncoid.nix
··· 16 16 lib.concatMapStrings (s: if lib.isList s then "-" else s) 17 17 (builtins.split "[^a-zA-Z0-9_.\\-]+" name); 18 18 19 - # Function to build "zfs allow" commands for the filesystems we've 20 - # delegated permissions to. It also checks if the target dataset 21 - # exists before delegating permissions, if it doesn't exist we 22 - # delegate it to the parent dataset. This should solve the case of 23 - # provisoning new datasets. 19 + # Function to build "zfs allow" commands for the filesystems we've delegated 20 + # permissions to. It also checks if the target dataset exists before 21 + # delegating permissions, if it doesn't exist we delegate it to the parent 22 + # dataset (if it exists). This should solve the case of provisoning new 23 + # datasets. 24 24 buildAllowCommand = permissions: dataset: ( 25 25 "-+${pkgs.writeShellScript "zfs-allow-${dataset}" '' 26 26 # Here we explicitly use the booted system to guarantee the stable API needed by ZFS ··· 38 38 (concatStringsSep "," permissions) 39 39 dataset 40 40 ]} 41 - else 42 - ${lib.escapeShellArgs [ 43 - "/run/booted-system/sw/bin/zfs" 44 - "allow" 45 - cfg.user 46 - (concatStringsSep "," permissions) 47 - # Remove the last part of the path 48 - (builtins.dirOf dataset) 49 - ]} 41 + ${lib.optionalString ((builtins.dirOf dataset) != ".") '' 42 + else 43 + ${lib.escapeShellArgs [ 44 + "/run/booted-system/sw/bin/zfs" 45 + "allow" 46 + cfg.user 47 + (concatStringsSep "," permissions) 48 + # Remove the last part of the path 49 + (builtins.dirOf dataset) 50 + ]} 51 + ''} 50 52 fi 51 53 ''}" 52 54 ); ··· 67 69 (concatStringsSep "," permissions) 68 70 dataset 69 71 ]} 70 - ${lib.escapeShellArgs [ 72 + ${lib.optionalString ((builtins.dirOf dataset) != ".") (lib.escapeShellArgs [ 71 73 "/run/booted-system/sw/bin/zfs" 72 74 "unallow" 73 75 cfg.user 74 76 (concatStringsSep "," permissions) 75 77 # Remove the last part of the path 76 78 (builtins.dirOf dataset) 77 - ]} 79 + ])} 78 80 ''}" 79 81 ); 80 82 in
+10 -5
nixos/modules/services/security/vault.nix
··· 104 104 105 105 storagePath = mkOption { 106 106 type = types.nullOr types.path; 107 - default = if cfg.storageBackend == "file" then "/var/lib/vault" else null; 107 + default = if cfg.storageBackend == "file" || cfg.storageBackend == "raft" then "/var/lib/vault" else null; 108 108 defaultText = literalExpression '' 109 - if config.${opt.storageBackend} == "file" 109 + if config.${opt.storageBackend} == "file" || cfg.storageBackend == "raft" 110 110 then "/var/lib/vault" 111 111 else null 112 112 ''; ··· 172 172 173 173 config = mkIf cfg.enable { 174 174 assertions = [ 175 - { assertion = cfg.storageBackend == "inmem" -> (cfg.storagePath == null && cfg.storageConfig == null); 175 + { 176 + assertion = cfg.storageBackend == "inmem" -> (cfg.storagePath == null && cfg.storageConfig == null); 176 177 message = ''The "inmem" storage expects no services.vault.storagePath nor services.vault.storageConfig''; 177 178 } 178 - { assertion = (cfg.storageBackend == "file" -> (cfg.storagePath != null && cfg.storageConfig == null)) && (cfg.storagePath != null -> cfg.storageBackend == "file"); 179 - message = ''You must set services.vault.storagePath only when using the "file" backend''; 179 + { 180 + assertion = ( 181 + (cfg.storageBackend == "file" -> (cfg.storagePath != null && cfg.storageConfig == null)) && 182 + (cfg.storagePath != null -> (cfg.storageBackend == "file" || cfg.storageBackend == "raft")) 183 + ); 184 + message = ''You must set services.vault.storagePath only when using the "file" or "raft" backend''; 180 185 } 181 186 ]; 182 187
+6
nixos/tests/sanoid.nix
··· 48 48 }; 49 49 # Take snapshot and sync 50 50 "pool/syncoid".target = "root@target:pool/syncoid"; 51 + 52 + # Test pool without parent (regression test for https://github.com/NixOS/nixpkgs/pull/180111) 53 + "pool".target = "root@target:pool/full-pool"; 51 54 }; 52 55 }; 53 56 }; ··· 104 107 target.succeed("cat /mnt/pool/sanoid/test.txt") 105 108 source.systemctl("start --wait syncoid-pool-syncoid.service") 106 109 target.succeed("cat /mnt/pool/syncoid/test.txt") 110 + 111 + source.systemctl("start --wait syncoid-pool.service") 112 + target.succeed("[[ -d /mnt/pool/full-pool/syncoid ]]") 107 113 108 114 assert len(source.succeed("zfs allow pool")) == 0, "Pool shouldn't have delegated permissions set after syncing snapshots" 109 115 assert len(source.succeed("zfs allow pool/sanoid")) == 0, "Sanoid dataset shouldn't have delegated permissions set after syncing snapshots"
+4
pkgs/applications/editors/micro/default.nix
··· 24 24 "-X ${t}/util.CommitHash=${src.rev}" 25 25 ]; 26 26 27 + preBuild = '' 28 + go generate ./runtime 29 + ''; 30 + 27 31 postInstall = '' 28 32 installManPage assets/packaging/micro.1 29 33 install -Dt $out/share/applications assets/packaging/micro.desktop
+1 -1
pkgs/applications/graphics/epick/default.nix
··· 22 22 owner = "vv9k"; 23 23 repo = pname; 24 24 rev = version; 25 - sha256 = "sha256-JSKenJEM+FUk/2BtAstIhJ26kFBRDvvFAlBsb0ltUsY="; 25 + sha256 = "sha256-BrJkG1OYpkAfBYUfLn/CNDBc0n1tW5OLnpobkPABQow="; 26 26 }; 27 27 28 28 cargoSha256 = "sha256-hFay+XL2oqA7SC+I3wlrzhUmUitO2vbeqfoArU9Jsp4=";
+3 -3
pkgs/applications/networking/nali/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "nali"; 5 - version = "0.5.0"; 5 + version = "0.5.3"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "zu1k"; 9 9 repo = "nali"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-rK+UKECwG+2WcltV4zhODSFZ1EGkmLTBggLgKGMCAGI="; 11 + sha256 = "sha256-mKZQe+VuhXm5N2SAOfHUlPK6wJPa8Cd+wgDjqSGbR7I="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-pIJsCBevCVMg6NXc96f6hAbFK5VKwjFwCe34A+54NW8="; 14 + vendorSha256 = "sha256-iNgYU/OgdbKscIA9dIVKqV5tiyLaC3Q4D3W1QsW7CWg="; 15 15 subPackages = [ "." ]; 16 16 17 17 meta = with lib; {
+5 -5
pkgs/applications/video/mpv/scripts/thumbnail.nix
··· 1 - { fetchFromGitHub, lib, python3, stdenvNoCC }: 1 + { lib, stdenvNoCC, fetchFromGitHub, python3 }: 2 2 3 3 stdenvNoCC.mkDerivation rec { 4 4 pname = "mpv_thumbnail_script"; 5 - version = "unstable-2020-01-16"; 5 + version = "0.4.9"; 6 6 7 7 src = fetchFromGitHub { 8 - owner = "theamm"; 8 + owner = "marzzzello"; 9 9 repo = pname; 10 - rev = "682becf5b5115c2a206b4f0bdee413d4be8b5bef"; 10 + rev = version; 11 11 sha256 = "0dgfrb8ypc5vlq35kzn423fm6l6348ivl85vb6j3ccc9a51xprw3"; 12 12 }; 13 13 ··· 28 28 29 29 meta = with lib; { 30 30 description = "A lua script to show preview thumbnails in mpv's OSC seekbar"; 31 - homepage = "https://github.com/theamm/mpv_thumbnail_script"; 31 + homepage = "https://github.com/marzzzello/mpv_thumbnail_script"; 32 32 license = licenses.gpl3Plus; 33 33 platforms = platforms.all; 34 34 maintainers = with maintainers; [ figsoda ];
+9 -11
pkgs/development/compilers/gcl/2.6.13-pre.nix
··· 1 1 { lib, stdenv, fetchgit, mpfr, m4, binutils, emacs, zlib, which 2 - , texinfo, libX11, xorgproto, libXi, gmp, readline, strace 2 + , texinfo, libX11, xorgproto, libXi, gmp, readline 3 3 , libXext, libXt, libXaw, libXmu } : 4 4 5 5 assert stdenv ? cc ; ··· 7 7 assert stdenv.cc ? libc ; 8 8 assert stdenv.cc.libc != null ; 9 9 10 - stdenv.mkDerivation { 10 + stdenv.mkDerivation rec { 11 11 pname = "gcl"; 12 - version = "2.6.13pre50"; 12 + version = "2.6.13pre124"; 13 13 14 14 src = fetchgit { 15 - sha256 = "0vpxb6z5g9fjavrgx8gz8fsjvskfz64f63qibh5s00fvvndlwi88"; 15 + sha256 = "sha256-e4cUQlNSfdz+B3urlZ82pf7fTc6aoloUyDDorAUi5kc="; 16 16 url = "https://git.savannah.gnu.org/r/gcl.git"; 17 - rev = "refs/tags/Version_2_6_13pre50"; 17 + rev = "refs/tags/Version_${builtins.replaceStrings ["."] ["_"] version}"; 18 18 }; 19 19 20 20 postPatch = '' 21 21 sed -e 's/<= obj-date/<= (if (= 0 obj-date) 1 obj-date)/' -i lsp/make.lisp 22 - '' 23 - # https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=902475 24 - + '' 25 - substituteInPlace h/elf64_i386_reloc.h \ 26 - --replace 'case R_X86_64_PC32:' 'case R_X86_64_PC32: case R_X86_64_PLT32:' 27 22 ''; 28 23 29 24 sourceRoot = "gcl/gcl"; 30 25 26 + # breaks when compiling in parallel 27 + enableParallelBuilding = false; 28 + 31 29 patches = []; 32 30 33 31 buildInputs = [ 34 32 mpfr m4 binutils emacs gmp 35 33 libX11 xorgproto libXi 36 34 libXext libXt libXaw libXmu 37 - zlib which texinfo readline strace 35 + zlib which texinfo readline 38 36 ]; 39 37 40 38 configureFlags = [
+2 -2
pkgs/development/libraries/folly/default.nix
··· 22 22 23 23 stdenv.mkDerivation rec { 24 24 pname = "folly"; 25 - version = "2022.08.08.00"; 25 + version = "2022.08.15.00"; 26 26 27 27 src = fetchFromGitHub { 28 28 owner = "facebook"; 29 29 repo = "folly"; 30 30 rev = "v${version}"; 31 - sha256 = "sha256-shgqM7hUz0uHOtaXSSdnsQW0eUvCUAo3mtq0EISeQgU="; 31 + sha256 = "sha256-GJYjilN2nwKEpuWj2NJQ25hT9lI2pdkWzgfLBph5mmU="; 32 32 }; 33 33 34 34 nativeBuildInputs = [
+4 -3
pkgs/development/libraries/pcre2/default.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , fetchurl 4 + , withJitSealloc ? true 4 5 }: 5 6 6 7 stdenv.mkDerivation rec { ··· 17 18 "--enable-pcre2-32" 18 19 # only enable jit on supported platforms which excludes Apple Silicon, see https://github.com/zherczeg/sljit/issues/51 19 20 "--enable-jit=auto" 20 - # fix pcre jit in systemd units that set MemoryDenyWriteExecute=true like gitea 21 - "--enable-jit-sealloc" 22 - ]; 21 + ] 22 + # fix pcre jit in systemd units that set MemoryDenyWriteExecute=true like gitea 23 + ++ lib.optional withJitSealloc "--enable-jit-sealloc"; 23 24 24 25 outputs = [ "bin" "dev" "out" "doc" "man" "devdoc" ]; 25 26
+4
pkgs/development/libraries/qt-6/modules/qtwebengine.nix
··· 3 3 , qtwebchannel 4 4 , qtpositioning 5 5 , qtwebsockets 6 + , buildPackages 6 7 , bison 7 8 , coreutils 8 9 , flex ··· 104 105 --replace "/usr/bin/env -S deno" "/usr/bin/deno" || true 105 106 patchShebangs . 106 107 ) 108 + 109 + substituteInPlace cmake/Functions.cmake \ 110 + --replace "/bin/bash" "${buildPackages.bash}/bin/bash" 107 111 108 112 sed -i -e '/lib_loader.*Load/s!"\(libudev\.so\)!"${lib.getLib systemd}/lib/\1!' \ 109 113 src/3rdparty/chromium/device/udev_linux/udev?_loader.cc
+2 -2
pkgs/development/python-modules/Wand/default.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "Wand"; 9 - version = "0.6.9"; 9 + version = "0.6.10"; 10 10 11 11 src = fetchPypi { 12 12 inherit pname version; 13 - sha256 = "sha256-QCdOiCmo21P9vjKPWAV6Wrfi664Hx3uJ8V44B2mLtbw="; 13 + sha256 = "sha256-Nz9KfyhmyGjDHOkQ4fmzapLRMmQKIAaOwXzqMoT+3Fc="; 14 14 }; 15 15 16 16 postPatch = ''
+2 -2
pkgs/development/python-modules/bleak-retry-connector/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "bleak-retry-connector"; 14 - version = "1.7.2"; 14 + version = "1.8.0"; 15 15 format = "pyproject"; 16 16 17 17 disabled = pythonOlder "3.7"; ··· 20 20 owner = "Bluetooth-Devices"; 21 21 repo = pname; 22 22 rev = "v${version}"; 23 - hash = "sha256-qRUS+JJWd2MPXa5Bs2WzZIHk6VcPe75yBoArFGk2yHQ="; 23 + hash = "sha256-wtzZ94nHfVtX8YakMLGxhqvn95v93qL2Qz9OeBRB520="; 24 24 }; 25 25 26 26 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/google-cloud-access-context-manager/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "google-cloud-access-context-manager"; 10 - version = "0.1.13"; 10 + version = "0.1.14"; 11 11 format = "setuptools"; 12 12 13 13 disabled = pythonOlder "3.7"; 14 14 15 15 src = fetchPypi { 16 16 inherit pname version; 17 - hash = "sha256-AnWAJyvLU4vurVv9uJvi2fkl0Sk1nCK5iNxSplxflHs="; 17 + hash = "sha256-GFS9VvdXHxP1KvJzQkgjmYXO3qpMXl8yICGZEr18O8M="; 18 18 }; 19 19 20 20 propagatedBuildInputs = [
+15 -4
pkgs/development/python-modules/pymanopt/default.nix
··· 3 3 , buildPythonPackage 4 4 , numpy 5 5 , scipy 6 + , pytorch 6 7 , autograd 7 8 , nose2 9 + , matplotlib 10 + , tensorflow 8 11 }: 9 12 10 13 buildPythonPackage rec { ··· 18 21 sha256 = "sha256-dqyduExNgXIbEFlgkckaPfhLFSVLqPgwAOyBUdowwiQ="; 19 22 }; 20 23 21 - propagatedBuildInputs = [ numpy scipy ]; 22 - checkInputs = [ nose2 autograd ]; 24 + propagatedBuildInputs = [ numpy scipy pytorch ]; 25 + checkInputs = [ nose2 autograd matplotlib tensorflow ]; 23 26 24 27 checkPhase = '' 25 - # nose2 doesn't properly support excludes 26 - rm tests/test_{problem,tensorflow,theano}.py 28 + runHook preCheck 29 + # FIXME: Some numpy regression? 30 + # Traceback (most recent call last): 31 + # File "/build/source/tests/manifolds/test_hyperbolic.py", line 270, in test_second_order_function_approximation 32 + # self.run_hessian_approximation_test() 33 + # File "/build/source/tests/manifolds/_manifold_tests.py", line 29, in run_hessian_approximation_test 34 + # assert np.allclose(np.linalg.norm(error), 0) or (2.95 <= slope <= 3.05) 35 + # AssertionError 36 + rm tests/manifolds/test_hyperbolic.py 27 37 28 38 nose2 tests -v 39 + runHook postCheck 29 40 ''; 30 41 31 42 pythonImportsCheck = [ "pymanopt" ];
+15 -6
pkgs/development/tools/backblaze-b2/default.nix
··· 2 2 3 3 python3Packages.buildPythonApplication rec { 4 4 pname = "backblaze-b2"; 5 - version = "3.2.0"; 5 + version = "3.5.0"; 6 6 7 7 src = python3Packages.fetchPypi { 8 8 inherit version; 9 9 pname = "b2"; 10 - sha256 = "sha256-dE4eLTNU6O0DscwN8+m1UaG46dbI0DiWzeJK49GUvKA="; 10 + sha256 = "sha256-vyqExulsV0wDijLotPO3RAOk9o4ne0Vq74KJKhSBrvo="; 11 11 }; 12 12 13 13 postPatch = '' 14 14 substituteInPlace requirements.txt \ 15 - --replace 'docutils==0.16' 'docutils' 15 + --replace 'tabulate==0.8.10' 'tabulate' 16 16 substituteInPlace setup.py \ 17 17 --replace 'setuptools_scm<6.0' 'setuptools_scm' 18 18 ''; ··· 27 27 setuptools 28 28 docutils 29 29 rst2ansi 30 + tabulate 30 31 ]; 31 32 32 33 checkInputs = with python3Packages; [ 34 + backoff 33 35 pytestCheckHook 34 36 ]; 35 37 38 + preCheck = '' 39 + export HOME=$(mktemp -d) 40 + ''; 41 + 36 42 disabledTests = [ 37 43 # require network 38 44 "test_files_headers" 39 - "test_copy_file_by_id" 40 45 "test_integration" 41 - "test_get_account_info" 46 + ]; 47 + 48 + disabledTestPaths = [ 49 + # requires network 50 + "test/integration/test_b2_command_line.py" 42 51 ]; 43 52 44 53 postInstall = '' ··· 54 63 description = "Command-line tool for accessing the Backblaze B2 storage service"; 55 64 homepage = "https://github.com/Backblaze/B2_Command_Line_Tool"; 56 65 license = licenses.mit; 57 - maintainers = with maintainers; [ hrdinka kevincox ]; 66 + maintainers = with maintainers; [ hrdinka kevincox tomhoule ]; 58 67 }; 59 68 }
+2 -2
pkgs/development/tools/esbuild/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "esbuild"; 5 - version = "0.15.2"; 5 + version = "0.15.3"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "evanw"; 9 9 repo = "esbuild"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-VYW3XQvwxeUnfNMXFcqB6xhh45YgTv4Iu6ce6MEclpw="; 11 + sha256 = "sha256-UjvVaBeKrZ9T/pFQVdIYFHCsmAO+332Q8Gz0bPEfzgw="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-+BfxCyg0KkDQpHt/wycy/8CTG6YBA/VJvJFhhzUnSiQ=";
+2 -2
pkgs/development/tools/misc/universal-ctags/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "universal-ctags"; 5 - version = "5.9.20220710.0"; 5 + version = "5.9.20220814.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "universal-ctags"; 9 9 repo = "ctags"; 10 10 rev = "p${version}"; 11 - sha256 = "sha256-/7g1AGLbl49s8hbwy3IGwshKAGKRJrdbECau2acMtjE="; 11 + sha256 = "sha256-U1PjmBb99v7N+Dd7n2r1Xx09yflf0OxRlb4f1Sg0UvI="; 12 12 }; 13 13 14 14 depsBuildBuild = [ buildPackages.stdenv.cc ];
+3 -3
pkgs/development/tools/refinery-cli/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "refinery-cli"; 5 - version = "0.8.5"; 5 + version = "0.8.6"; 6 6 7 7 src = fetchCrate { 8 8 pname = "refinery_cli"; 9 9 inherit version; 10 - sha256 = "sha256-I9YjMsl70eiws4ea0P9oqOsNzN+gfO5Jwr7VlFCltq8="; 10 + sha256 = "sha256-vT/iM+o9ZrotiBz6mq9IVVJAkK97QUlOiZp6tg3O8pI="; 11 11 }; 12 12 13 - cargoSha256 = "sha256-Ehofdr6UNtOwRT0QVFaXDrWFRPqdF9eA8eL/hRwIJUM="; 13 + cargoSha256 = "sha256-DMQr0Qtr2c3BHWqTb+IW2cV1fwWIFMY5koR2GPceYHQ="; 14 14 15 15 nativeBuildInputs = [ pkg-config ]; 16 16
+37
pkgs/servers/snappymail/default.nix
··· 1 + { lib, stdenv, fetchurl, writeText 2 + , dataPath ? "/var/lib/snappymail" }: 3 + stdenv.mkDerivation rec { 4 + pname = "snappymail"; 5 + version = "2.17.0"; 6 + 7 + src = fetchurl { 8 + url = "https://github.com/the-djmaze/snappymail/releases/download/v${version}/snappymail-${version}.tar.gz"; 9 + sha256 = "sha256-Z8By/X4IheOyCT7F4KArBN+CFUTcSn0VZchcYhAJsCU="; 10 + }; 11 + 12 + sourceRoot = "snappymail"; 13 + 14 + includeScript = writeText "include.php" '' 15 + <?php 16 + 17 + # the trailing `/` is important here 18 + define('APP_DATA_FOLDER_PATH', '${dataPath}/'); 19 + ''; 20 + 21 + installPhase = '' 22 + mkdir $out 23 + cp -r ../* $out 24 + rm -rf $out/{data,env-vars,_include.php} 25 + cp ${includeScript} $out/include.php 26 + ''; 27 + 28 + meta = with lib; { 29 + description = "Simple, modern & fast web-based email client"; 30 + 31 + homepage = "https://snappymail.eu"; 32 + downloadPage = "https://github.com/the-djmaze/snappymail/releases"; 33 + license = licenses.agpl3; 34 + platforms = platforms.all; 35 + maintainers = with maintainers; [ mic92 ]; 36 + }; 37 + }
+2 -2
pkgs/tools/X11/xprintidle/default.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "xprintidle"; 12 - version = "0.2.4"; 12 + version = "0.2.5"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "g0hl1n"; 16 16 repo = "xprintidle"; 17 17 rev = version; 18 - sha256 = "sha256-CgjHTvwQKR/TPQyEWKxN5j97Sh2iec0BQPhC96sfyoI="; 18 + sha256 = "sha256-bafDUZoSFsJ3g6mtLCRechGizfrWg2qW2vnlfIzj7mQ="; 19 19 }; 20 20 21 21 nativeBuildInputs = [
+29 -7
pkgs/tools/misc/didyoumean/default.nix
··· 2 2 , stdenv 3 3 , rustPlatform 4 4 , fetchFromGitHub 5 + , installShellFiles 6 + , pkg-config 5 7 , libxcb 6 - # Darwin dependencies 8 + , openssl 9 + # Darwin dependencies 7 10 , AppKit 8 11 }: 9 12 10 13 rustPlatform.buildRustPackage rec { 11 14 pname = "didyoumean"; 12 - version = "1.1.0"; 15 + version = "1.1.3"; 13 16 14 17 src = fetchFromGitHub { 15 18 owner = "hisbaan"; 16 19 repo = "didyoumean"; 17 20 rev = "v${version}"; 18 - sha256 = "sha256-t2bmvz05vWIxQhC474q/9uky1kAQoFN8Z+qflw5Vj68="; 21 + sha256 = "sha256-hHl9PGNDFN7Dad2JOlAy99dz0pC9OmphwYMJHBBwx7Y="; 19 22 }; 20 23 21 - cargoSha256 = "sha256-4DbziI9enib4pm9/P4WEu15glIxtejaV2GCqbzuxxyw="; 24 + cargoSha256 = "sha256-rjkj9MO6fXVOk3fA87olGt/iIaJ8Zv/cy/Cqy/pg6yI="; 22 25 23 - buildInputs = lib.optional stdenv.isLinux [ libxcb ] 24 - ++ lib.optionals stdenv.isDarwin [ AppKit ]; 26 + nativeBuildInputs = [ 27 + installShellFiles 28 + ] ++ lib.optionals stdenv.isLinux [ 29 + pkg-config 30 + ]; 31 + 32 + buildInputs = lib.optionals stdenv.isLinux [ 33 + libxcb 34 + openssl 35 + ] ++ lib.optionals stdenv.isDarwin [ 36 + AppKit 37 + ]; 38 + 39 + postInstall = '' 40 + installManPage man/dym.1 41 + installShellCompletion completions/dym.{bash,fish} 42 + installShellCompletion --zsh completions/_dym 43 + ''; 44 + 45 + # Clipboard doesn't exist in test environment 46 + doCheck = false; 25 47 26 48 meta = with lib; { 27 49 description = "A CLI spelling corrector for when you're unsure"; 28 50 homepage = "https://github.com/hisbaan/didyoumean"; 29 51 license = licenses.gpl3Plus; 30 - maintainers = with maintainers; [ evanjs ]; 52 + maintainers = with maintainers; [ evanjs wegank ]; 31 53 mainProgram = "dym"; 32 54 }; 33 55 }
+5 -16
pkgs/tools/misc/starship/default.nix
··· 4 4 , rustPlatform 5 5 , installShellFiles 6 6 , libiconv 7 - , libgit2 8 7 , cmake 9 8 , fetchpatch 10 - , pkg-config 11 9 , nixosTests 12 10 , Security 13 11 , Foundation ··· 16 14 17 15 rustPlatform.buildRustPackage rec { 18 16 pname = "starship"; 19 - version = "1.10.0"; 17 + version = "1.10.1"; 20 18 21 19 src = fetchFromGitHub { 22 20 owner = "starship"; 23 21 repo = pname; 24 22 rev = "v${version}"; 25 - sha256 = "sha256-mumlnY9KGKdS3x4U84J4I8m5uMJI7SZR52aT6DPi/MM="; 23 + sha256 = "sha256-ujv2lqhzsug9Qpco+4doMGH+0yG5cZZzLmSLr0MBmZk="; 26 24 }; 27 25 28 - nativeBuildInputs = [ installShellFiles cmake ] 29 - ++ lib.optionals stdenv.isLinux [ pkg-config ]; 26 + nativeBuildInputs = [ installShellFiles cmake ]; 30 27 31 - buildInputs = [ libgit2 ] ++ lib.optionals stdenv.isDarwin [ libiconv Security Foundation Cocoa ]; 28 + buildInputs = lib.optionals stdenv.isDarwin [ libiconv Security Foundation Cocoa ]; 32 29 33 30 buildNoDefaultFeatures = true; 34 31 # the "notify" feature is currently broken on darwin ··· 41 38 --zsh <($out/bin/starship completions zsh) 42 39 ''; 43 40 44 - cargoPatches = [ 45 - # Bump chrono dependency to fix panic when no timezone 46 - (fetchpatch { 47 - url = "https://github.com/starship/starship/commit/e652e8643310c3b41ce19ad05b8168abc29bb683.patch"; 48 - sha256 = "sha256-iGYLJuptPMc45E7o+GXjIx7y2PxuO1mGM7xSopDBve0="; 49 - }) 50 - ]; 51 - 52 - cargoSha256 = "sha256-w7UCExSkgEY52D98SSe2EkuiwtjM6t0/uTiafrtEBaU="; 41 + cargoSha256 = "sha256-iZvjU/GzC/ssXcd+UeV57IA0hKT45cQ09VBB4BNYw50="; 53 42 54 43 preCheck = '' 55 44 HOME=$TMPDIR
+3 -3
pkgs/tools/networking/rustcat/default.nix
··· 7 7 8 8 rustPlatform.buildRustPackage rec { 9 9 pname = "rustcat"; 10 - version = "2.0.0"; 10 + version = "3.0.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "robiot"; 14 14 repo = pname; 15 15 rev = "v${version}"; 16 - sha256 = "sha256-aoeinz1XVJ+MNt8ndV/HnKLdwa7rXwxIZucCkZCnNaM="; 16 + sha256 = "sha256-/6vNFh7n6WvYerrL8m9sgUKsO2KKj7/f8xc4rzHy9Io="; 17 17 }; 18 18 19 - cargoSha256 = "sha256-cQxBM8m0sy9WKvKqyY/sNE3p4l2v9zdx80mReQEAoc8="; 19 + cargoSha256 = "sha256-wqoU9UfXDmf7KIHgFif5rZfZY8Zu0SsaMVfwTtXLzHg="; 20 20 21 21 buildInputs = lib.optional stdenv.isDarwin Security; 22 22
+2 -2
pkgs/tools/system/netdata/default.nix
··· 19 19 let 20 20 go-d-plugin = callPackage ./go.d.plugin.nix {}; 21 21 in stdenv.mkDerivation rec { 22 - version = "1.36.0"; 22 + version = "1.36.1"; 23 23 pname = "netdata"; 24 24 25 25 src = fetchFromGitHub { 26 26 owner = "netdata"; 27 27 repo = "netdata"; 28 28 rev = "v${version}"; 29 - sha256 = "sha256-ir8NO150PgDEaWjTvXuSZMIK3qwZrGyPuGHxLIBfCfU="; 29 + sha256 = "sha256-Msbzfcxq9hqerA9eXuMle+pAhDAAWWE/v0DKXgnhEnM="; 30 30 fetchSubmodules = true; 31 31 }; 32 32
+3 -3
pkgs/tools/virtualization/google-guest-agent/default.nix
··· 4 4 5 5 buildGoModule rec { 6 6 pname = "guest-agent"; 7 - version = "20220104.00"; 7 + version = "20220713.00"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "GoogleCloudPlatform"; 11 11 repo = pname; 12 12 rev = version; 13 - sha256 = "sha256-BC2qpnGJU/D0z8jlmAEwvmFwBk1n0ZvqPBB6Zon9N/U="; 13 + sha256 = "sha256-6N6ikAIpqbtNgD6TTASbMzCJcBc7D3ziE4YvQmTb1Go="; 14 14 }; 15 15 16 - vendorSha256 = "sha256-YcWKSiN715Z9lmNAQx+sHEgxWnhFhenCNXBS7gdMV4M="; 16 + vendorSha256 = "sha256-JZfplQGwe+UCzdMLMD+9JJ2ksK9dZ6scz2jl0XoZ9rI="; 17 17 18 18 patches = [ ./disable-etc-mutation.patch ]; 19 19
+8
pkgs/top-level/all-packages.nix
··· 14912 14912 # Import PHP81 interpreter, extensions and packages 14913 14913 php81 = callPackage ../development/interpreters/php/8.1.nix { 14914 14914 stdenv = if stdenv.cc.isClang then llvmPackages.stdenv else stdenv; 14915 + pcre2 = pcre2.override { 14916 + withJitSealloc = false; # Needed to avoid crashes, see https://bugs.php.net/bug.php?id=78630 14917 + }; 14915 14918 }; 14916 14919 php81Extensions = recurseIntoAttrs php81.extensions; 14917 14920 php81Packages = recurseIntoAttrs php81.packages; ··· 14919 14922 # Import PHP80 interpreter, extensions and packages 14920 14923 php80 = callPackage ../development/interpreters/php/8.0.nix { 14921 14924 stdenv = if stdenv.cc.isClang then llvmPackages.stdenv else stdenv; 14925 + pcre2 = pcre2.override { 14926 + withJitSealloc = false; # Needed to avoid crashes, see https://bugs.php.net/bug.php?id=78630 14927 + }; 14922 14928 }; 14923 14929 php80Extensions = recurseIntoAttrs php80.extensions; 14924 14930 php80Packages = recurseIntoAttrs php80.packages; ··· 21255 21261 smpeg2 = callPackage ../development/libraries/smpeg2 { }; 21256 21262 21257 21263 snappy = callPackage ../development/libraries/snappy { }; 21264 + 21265 + snappymail = callPackage ../servers/snappymail { }; 21258 21266 21259 21267 snow = callPackage ../tools/security/snow { }; 21260 21268