lol

Merge remote-tracking branch 'nixpkgs/master' into staging-next

Conflicts:
pkgs/development/libraries/libunwind/default.nix

+933 -289
+1 -1
lib/default.nix
··· 105 105 makeScope makeScopeWithSplicing; 106 106 inherit (self.meta) addMetaAttrs dontDistribute setName updateName 107 107 appendToName mapDerivationAttrset setPrio lowPrio lowPrioSet hiPrio 108 - hiPrioSet; 108 + hiPrioSet getLicenseFromSpdxId; 109 109 inherit (self.sources) pathType pathIsDirectory cleanSourceFilter 110 110 cleanSource sourceByRegex sourceFilesBySuffices 111 111 commitIdFromGitRepo cleanSourceWith pathHasContext
+27
lib/meta.nix
··· 99 99 availableOn = platform: pkg: 100 100 lib.any (platformMatch platform) pkg.meta.platforms && 101 101 lib.all (elem: !platformMatch platform elem) (pkg.meta.badPlatforms or []); 102 + 103 + /* Get the corresponding attribute in lib.licenses 104 + from the SPDX ID. 105 + For SPDX IDs, see 106 + https://spdx.org/licenses 107 + 108 + Type: 109 + getLicenseFromSpdxId :: str -> AttrSet 110 + 111 + Example: 112 + lib.getLicenseFromSpdxId "MIT" == lib.licenses.mit 113 + => true 114 + lib.getLicenseFromSpdxId "mIt" == lib.licenses.mit 115 + => true 116 + lib.getLicenseFromSpdxId "MY LICENSE" 117 + => trace: warning: getLicenseFromSpdxId: No license matches the given SPDX ID: MY LICENSE 118 + => { shortName = "MY LICENSE"; } 119 + */ 120 + getLicenseFromSpdxId = 121 + let 122 + spdxLicenses = lib.mapAttrs (id: ls: assert lib.length ls == 1; builtins.head ls) 123 + (lib.groupBy (l: lib.toLower l.spdxId) (lib.filter (l: l ? spdxId) (lib.attrValues lib.licenses))); 124 + in licstr: 125 + spdxLicenses.${ lib.toLower licstr } or ( 126 + lib.warn "getLicenseFromSpdxId: No license matches the given SPDX ID: ${licstr}" 127 + { shortName = licstr; } 128 + ); 102 129 }
+45 -18
lib/modules.nix
··· 13 13 elem 14 14 filter 15 15 findFirst 16 - flip 17 - foldl 18 16 foldl' 19 17 getAttrFromPath 20 18 head ··· 101 99 check ? true 102 100 }: 103 101 let 102 + withWarnings = x: 103 + lib.warnIf (evalModulesArgs?args) "The args argument to evalModules is deprecated. Please set config._module.args instead." 104 + lib.warnIf (evalModulesArgs?check) "The check argument to evalModules is deprecated. Please set config._module.check instead." 105 + x; 106 + 107 + legacyModules = 108 + optional (evalModulesArgs?args) { 109 + config = { 110 + _module.args = args; 111 + }; 112 + } 113 + ++ optional (evalModulesArgs?check) { 114 + config = { 115 + _module.check = mkDefault check; 116 + }; 117 + }; 118 + regularModules = modules ++ legacyModules; 119 + 104 120 # This internal module declare internal options under the `_module' 105 121 # attribute. These options are fragile, as they are used by the 106 122 # module system to change the interpretation of modules. 123 + # 124 + # When extended with extendModules or moduleType, a fresh instance of 125 + # this module is used, to avoid conflicts and allow chaining of 126 + # extendModules. 107 127 internalModule = rec { 108 128 _file = ./modules.nix; 109 129 ··· 125 145 _module.check = mkOption { 126 146 type = types.bool; 127 147 internal = true; 128 - default = check; 148 + default = true; 129 149 description = "Whether to check whether all option definitions have matching declarations."; 130 150 }; 131 151 ··· 151 171 _module.args = { 152 172 inherit extendModules; 153 173 moduleType = type; 154 - } // args; 174 + }; 155 175 }; 156 176 }; 157 177 158 178 merged = 159 179 let collected = collectModules 160 180 (specialArgs.modulesPath or "") 161 - (modules ++ [ internalModule ]) 181 + (regularModules ++ [ internalModule ]) 162 182 ({ inherit lib options config specialArgs; } // specialArgs); 163 183 in mergeModules prefix (reverseList collected); 164 184 ··· 222 242 prefix ? [], 223 243 }: 224 244 evalModules (evalModulesArgs // { 225 - modules = evalModulesArgs.modules ++ modules; 245 + modules = regularModules ++ modules; 226 246 specialArgs = evalModulesArgs.specialArgs or {} // specialArgs; 227 247 prefix = extendArgs.prefix or evalModulesArgs.prefix; 228 248 }); ··· 231 251 inherit modules specialArgs; 232 252 }; 233 253 234 - result = { 254 + result = withWarnings { 235 255 options = checked options; 236 256 config = checked (removeAttrs config [ "_module" ]); 237 257 _module = checked (config._module); ··· 452 472 [{ inherit (module) file; inherit value; }] 453 473 ) configs; 454 474 455 - resultsByName = flip mapAttrs declsByName (name: decls: 475 + resultsByName = mapAttrs (name: decls: 456 476 # We're descending into attribute ‘name’. 457 477 let 458 478 loc = prefix ++ [name]; ··· 473 493 in 474 494 throw "The option `${showOption loc}' in `${firstOption._file}' is a prefix of options in `${firstNonOption._file}'." 475 495 else 476 - mergeModules' loc decls defns); 496 + mergeModules' loc decls defns) declsByName; 477 497 478 498 matchedOptions = mapAttrs (n: v: v.matchedOptions) resultsByName; 479 499 ··· 487 507 inherit matchedOptions; 488 508 489 509 # Transforms unmatchedDefnsByName into a list of definitions 490 - unmatchedDefns = concatLists (mapAttrsToList (name: defs: 491 - map (def: def // { 492 - # Set this so we know when the definition first left unmatched territory 493 - prefix = [name] ++ (def.prefix or []); 494 - }) defs 495 - ) unmatchedDefnsByName); 510 + unmatchedDefns = 511 + if configs == [] 512 + then 513 + # When no config values exist, there can be no unmatched config, so 514 + # we short circuit and avoid evaluating more _options_ than necessary. 515 + [] 516 + else 517 + concatLists (mapAttrsToList (name: defs: 518 + map (def: def // { 519 + # Set this so we know when the definition first left unmatched territory 520 + prefix = [name] ++ (def.prefix or []); 521 + }) defs 522 + ) unmatchedDefnsByName); 496 523 }; 497 524 498 525 /* Merge multiple option declarations into a single declaration. In ··· 906 933 mkMergedOptionModule = from: to: mergeFn: 907 934 { config, options, ... }: 908 935 { 909 - options = foldl recursiveUpdate {} (map (path: setAttrByPath path (mkOption { 936 + options = foldl' recursiveUpdate {} (map (path: setAttrByPath path (mkOption { 910 937 visible = false; 911 938 # To use the value in mergeFn without triggering errors 912 939 default = "_mkMergedOptionModule"; ··· 1010 1037 1011 1038 /* Use this function to import a JSON file as NixOS configuration. 1012 1039 1013 - importJSON -> path -> attrs 1040 + modules.importJSON :: path -> attrs 1014 1041 */ 1015 1042 importJSON = file: { 1016 1043 _file = file; ··· 1019 1046 1020 1047 /* Use this function to import a TOML file as NixOS configuration. 1021 1048 1022 - importTOML -> path -> attrs 1049 + modules.importTOML :: path -> attrs 1023 1050 */ 1024 1051 importTOML = file: { 1025 1052 _file = file;
+8 -1
lib/tests/modules/declare-attrsOf.nix
··· 1 - { lib, ... }: { 1 + { lib, ... }: 2 + let 3 + deathtrapArgs = lib.mapAttrs 4 + (k: _: throw "The module system is too strict, accessing an unused option's ${k} mkOption-attribute.") 5 + (lib.functionArgs lib.mkOption); 6 + in 7 + { 2 8 options.value = lib.mkOption { 3 9 type = lib.types.attrsOf lib.types.str; 4 10 default = {}; 5 11 }; 12 + options.testing-laziness-so-don't-read-me = lib.mkOption deathtrapArgs; 6 13 }
+8 -1
lib/tests/modules/freeform-nested.nix
··· 1 - { lib, ... }: { 1 + { lib, ... }: 2 + let 3 + deathtrapArgs = lib.mapAttrs 4 + (k: _: throw "The module system is too strict, accessing an unused option's ${k} mkOption-attribute.") 5 + (lib.functionArgs lib.mkOption); 6 + in 7 + { 2 8 options.nest.foo = lib.mkOption { 3 9 type = lib.types.bool; 4 10 default = false; 5 11 }; 12 + options.nest.unused = lib.mkOption deathtrapArgs; 6 13 config.nest.bar = "bar"; 7 14 }
+6
maintainers/maintainer-list.nix
··· 7675 7675 githubId = 21156022; 7676 7676 name = "Michal Minář"; 7677 7677 }; 7678 + michzappa = { 7679 + email = "me@michzappa.com"; 7680 + github = "michzappa"; 7681 + githubId = 59343378; 7682 + name = "Michael Zappa"; 7683 + }; 7678 7684 mickours = { 7679 7685 email = "mickours@gmail.com<"; 7680 7686 github = "mickours";
+7
nixos/doc/manual/from_md/release-notes/rl-2111.section.xml
··· 275 275 </listitem> 276 276 <listitem> 277 277 <para> 278 + <link xlink:href="https://maddy.email">maddy</link>, a 279 + composable all-in-one mail server. Available as 280 + <link xlink:href="options.html#opt-services.maddy.enable">services.maddy</link>. 281 + </para> 282 + </listitem> 283 + <listitem> 284 + <para> 278 285 <link xlink:href="https://sr.ht">sourcehut</link>, a 279 286 collection of tools useful for software development. Available 280 287 as
+2
nixos/doc/manual/release-notes/rl-2111.section.md
··· 74 74 75 75 - [PeerTube](https://joinpeertube.org/), developed by Framasoft, is the free and decentralized alternative to video platforms. Available at [services.peertube](options.html#opt-services.peertube.enable). 76 76 77 + - [maddy](https://maddy.email), a composable all-in-one mail server. Available as [services.maddy](options.html#opt-services.maddy.enable). 78 + 77 79 - [sourcehut](https://sr.ht), a collection of tools useful for software development. Available as [services.sourcehut](options.html#opt-services.sourcehut.enable). 78 80 79 81 - [ucarp](https://download.pureftpd.org/pub/ucarp/README), an userspace implementation of the Common Address Redundancy Protocol (CARP). Available as [networking.ucarp](options.html#opt-networking.ucarp.enable).
+36 -14
nixos/lib/eval-config.nix
··· 8 8 # as subcomponents (e.g. the container feature, or nixops if network 9 9 # expressions are ever made modular at the top level) can just use 10 10 # types.submodule instead of using eval-config.nix 11 + evalConfigArgs@ 11 12 { # !!! system can be set modularly, would be nice to remove 12 13 system ? builtins.currentSystem 13 14 , # !!! is this argument needed any more? The pkgs argument can ··· 28 29 in if e == "" then [] else [(import e)] 29 30 }: 30 31 31 - let extraArgs_ = extraArgs; pkgs_ = pkgs; 32 + let pkgs_ = pkgs; 32 33 in 33 34 34 35 let ··· 51 52 }; 52 53 }; 53 54 54 - noUserModules = lib.evalModules { 55 - inherit prefix check; 56 - modules = baseModules ++ extraModules ++ [ pkgsModule ]; 57 - args = extraArgs; 55 + withWarnings = x: 56 + lib.warnIf (evalConfigArgs?args) "The extraArgs argument to eval-config.nix is deprecated. Please set config._module.args instead." 57 + lib.warnIf (evalConfigArgs?check) "The check argument to eval-config.nix is deprecated. Please set config._module.check instead." 58 + x; 59 + 60 + legacyModules = 61 + lib.optional (evalConfigArgs?args) { 62 + config = { 63 + _module.args = extraArgs; 64 + }; 65 + } 66 + ++ lib.optional (evalConfigArgs?check) { 67 + config = { 68 + _module.check = lib.mkDefault check; 69 + }; 70 + }; 71 + allUserModules = modules ++ legacyModules; 72 + 73 + noUserModules = lib.evalModules ({ 74 + inherit prefix; 75 + modules = baseModules ++ extraModules ++ [ pkgsModule modulesModule ]; 58 76 specialArgs = 59 77 { modulesPath = builtins.toString ../modules; } // specialArgs; 78 + }); 79 + 80 + # Extra arguments that are useful for constructing a similar configuration. 81 + modulesModule = { 82 + config = { 83 + _module.args = { 84 + inherit noUserModules baseModules extraModules modules; 85 + }; 86 + }; 60 87 }; 61 88 62 - # These are the extra arguments passed to every module. In 63 - # particular, Nixpkgs is passed through the "pkgs" argument. 64 - extraArgs = extraArgs_ // { 65 - inherit noUserModules baseModules extraModules modules; 66 - }; 89 + nixosWithUserModules = noUserModules.extendModules { modules = allUserModules; }; 67 90 68 - in rec { 91 + in withWarnings { 69 92 70 93 # Merge the option definitions in all modules, forming the full 71 94 # system configuration. 72 - inherit (noUserModules.extendModules { inherit modules; }) 73 - config options _module type; 95 + inherit (nixosWithUserModules) config options _module type; 74 96 75 97 inherit extraArgs; 76 98 77 - inherit (_module.args) pkgs; 99 + inherit (nixosWithUserModules._module.args) pkgs; 78 100 }
+7 -13
nixos/modules/misc/documentation.nix
··· 1 - { config, lib, pkgs, baseModules, extraModules, modules, modulesPath, ... }: 1 + { config, lib, pkgs, extendModules, noUserModules, ... }: 2 2 3 3 with lib; 4 4 ··· 6 6 7 7 cfg = config.documentation; 8 8 9 - manualModules = 10 - baseModules 11 - # Modules for which to show options even when not imported 12 - ++ [ ../virtualisation/qemu-vm.nix ] 13 - ++ optionals cfg.nixos.includeAllModules (extraModules ++ modules); 9 + /* Modules for which to show options even when not imported. */ 10 + extraDocModules = [ ../virtualisation/qemu-vm.nix ]; 14 11 15 12 /* For the purpose of generating docs, evaluate options with each derivation 16 13 in `pkgs` (recursively) replaced by a fake with path "\${pkgs.attribute.path}". ··· 24 21 extraSources = cfg.nixos.extraModuleSources; 25 22 options = 26 23 let 27 - scrubbedEval = evalModules { 28 - modules = [ { nixpkgs.localSystem = config.nixpkgs.localSystem; } ] ++ manualModules; 29 - args = (config._module.args) // { modules = [ ]; }; 30 - specialArgs = { 31 - pkgs = scrubDerivations "pkgs" pkgs; 32 - inherit modulesPath; 33 - }; 24 + extendNixOS = if cfg.nixos.includeAllModules then extendModules else noUserModules.extendModules; 25 + scrubbedEval = extendNixOS { 26 + modules = extraDocModules; 27 + specialArgs.pkgs = scrubDerivations "pkgs" pkgs; 34 28 }; 35 29 scrubDerivations = namePrefix: pkgSet: mapAttrs 36 30 (name: value:
+1
nixos/modules/module-list.nix
··· 467 467 ./services/mail/dovecot.nix 468 468 ./services/mail/dspam.nix 469 469 ./services/mail/exim.nix 470 + ./services/mail/maddy.nix 470 471 ./services/mail/mail.nix 471 472 ./services/mail/mailcatcher.nix 472 473 ./services/mail/mailhog.nix
+6 -1
nixos/modules/security/acme.nix
··· 325 325 326 326 # Working directory will be /tmp 327 327 script = '' 328 - set -euxo pipefail 328 + ${optionalString data.enableDebugLogs "set -x"} 329 + set -euo pipefail 329 330 330 331 # This reimplements the expiration date check, but without querying 331 332 # the acme server first. By doing this offline, we avoid errors ··· 437 438 visible = false; 438 439 default = "_mkMergedOptionModule"; 439 440 }; 441 + 442 + enableDebugLogs = mkEnableOption "debug logging for this certificate" // { default = cfg.enableDebugLogs; }; 440 443 441 444 webroot = mkOption { 442 445 type = types.nullOr types.str; ··· 615 618 616 619 options = { 617 620 security.acme = { 621 + 622 + enableDebugLogs = mkEnableOption "debug logging for all certificates by default" // { default = true; }; 618 623 619 624 validMinDays = mkOption { 620 625 type = types.int;
+247
nixos/modules/services/mail/maddy.nix
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; 4 + 5 + let 6 + name = "maddy"; 7 + cfg = config.services.maddy; 8 + defaultConfig = '' 9 + tls off 10 + 11 + auth.pass_table local_authdb { 12 + table sql_table { 13 + driver sqlite3 14 + dsn credentials.db 15 + table_name passwords 16 + } 17 + } 18 + 19 + storage.imapsql local_mailboxes { 20 + driver sqlite3 21 + dsn imapsql.db 22 + } 23 + 24 + table.chain local_rewrites { 25 + optional_step regexp "(.+)\+(.+)@(.+)" "$1@$3" 26 + optional_step static { 27 + entry postmaster postmaster@$(primary_domain) 28 + } 29 + optional_step file /etc/maddy/aliases 30 + } 31 + msgpipeline local_routing { 32 + destination postmaster $(local_domains) { 33 + modify { 34 + replace_rcpt &local_rewrites 35 + } 36 + deliver_to &local_mailboxes 37 + } 38 + default_destination { 39 + reject 550 5.1.1 "User doesn't exist" 40 + } 41 + } 42 + 43 + smtp tcp://0.0.0.0:25 { 44 + limits { 45 + all rate 20 1s 46 + all concurrency 10 47 + } 48 + dmarc yes 49 + check { 50 + require_mx_record 51 + dkim 52 + spf 53 + } 54 + source $(local_domains) { 55 + reject 501 5.1.8 "Use Submission for outgoing SMTP" 56 + } 57 + default_source { 58 + destination postmaster $(local_domains) { 59 + deliver_to &local_routing 60 + } 61 + default_destination { 62 + reject 550 5.1.1 "User doesn't exist" 63 + } 64 + } 65 + } 66 + 67 + submission tcp://0.0.0.0:587 { 68 + limits { 69 + all rate 50 1s 70 + } 71 + auth &local_authdb 72 + source $(local_domains) { 73 + check { 74 + authorize_sender { 75 + prepare_email &local_rewrites 76 + user_to_email identity 77 + } 78 + } 79 + destination postmaster $(local_domains) { 80 + deliver_to &local_routing 81 + } 82 + default_destination { 83 + modify { 84 + dkim $(primary_domain) $(local_domains) default 85 + } 86 + deliver_to &remote_queue 87 + } 88 + } 89 + default_source { 90 + reject 501 5.1.8 "Non-local sender domain" 91 + } 92 + } 93 + 94 + target.remote outbound_delivery { 95 + limits { 96 + destination rate 20 1s 97 + destination concurrency 10 98 + } 99 + mx_auth { 100 + dane 101 + mtasts { 102 + cache fs 103 + fs_dir mtasts_cache/ 104 + } 105 + local_policy { 106 + min_tls_level encrypted 107 + min_mx_level none 108 + } 109 + } 110 + } 111 + 112 + target.queue remote_queue { 113 + target &outbound_delivery 114 + autogenerated_msg_domain $(primary_domain) 115 + bounce { 116 + destination postmaster $(local_domains) { 117 + deliver_to &local_routing 118 + } 119 + default_destination { 120 + reject 550 5.0.0 "Refusing to send DSNs to non-local addresses" 121 + } 122 + } 123 + } 124 + 125 + imap tcp://0.0.0.0:143 { 126 + auth &local_authdb 127 + storage &local_mailboxes 128 + } 129 + ''; 130 + 131 + in { 132 + options = { 133 + services.maddy = { 134 + enable = mkEnableOption "Maddy, a free an open source mail server"; 135 + 136 + user = mkOption { 137 + default = "maddy"; 138 + type = with types; uniq string; 139 + description = '' 140 + Name of the user under which maddy will run. If not specified, a 141 + default user will be created. 142 + ''; 143 + }; 144 + group = mkOption { 145 + default = "maddy"; 146 + type = with types; uniq string; 147 + description = '' 148 + Name of the group under which maddy will run. If not specified, a 149 + default group will be created. 150 + ''; 151 + }; 152 + 153 + hostname = mkOption { 154 + default = "localhost"; 155 + type = with types; uniq string; 156 + example = ''example.com''; 157 + description = '' 158 + Hostname to use. It should be FQDN. 159 + ''; 160 + }; 161 + primaryDomain = mkOption { 162 + default = "localhost"; 163 + type = with types; uniq string; 164 + example = ''mail.example.com''; 165 + description = '' 166 + Primary MX domain to use. It should be FQDN. 167 + ''; 168 + }; 169 + localDomains = mkOption { 170 + type = with types; listOf str; 171 + default = ["$(primary_domain)"]; 172 + example = [ 173 + "$(primary_domain)" 174 + "example.com" 175 + "other.example.com" 176 + ]; 177 + description = '' 178 + Define list of allowed domains. 179 + ''; 180 + }; 181 + config = mkOption { 182 + type = with types; nullOr lines; 183 + default = defaultConfig; 184 + description = '' 185 + Server configuration. 186 + ''; 187 + }; 188 + 189 + openFirewall = mkOption { 190 + type = types.bool; 191 + default = false; 192 + description = '' 193 + Open the configured incoming and outgoing mail server ports. 194 + ''; 195 + }; 196 + 197 + }; 198 + }; 199 + 200 + config = mkIf cfg.enable { 201 + 202 + systemd = { 203 + packages = [ pkgs.maddy ]; 204 + services.maddy = { 205 + serviceConfig = { 206 + User = "${cfg.user}"; 207 + Group = "${cfg.group}"; 208 + }; 209 + wantedBy = [ "multi-user.target" ]; 210 + }; 211 + }; 212 + 213 + environment.etc."maddy/maddy.conf" = { 214 + text = '' 215 + $(hostname) = ${cfg.hostname} 216 + $(primary_domain) = ${cfg.primaryDomain} 217 + $(local_domains) = ${toString cfg.localDomains} 218 + hostname ${cfg.hostname} 219 + ${cfg.config} 220 + ''; 221 + }; 222 + 223 + users.users = optionalAttrs (cfg.user == "maddy") { 224 + maddy = { 225 + description = "Maddy service user"; 226 + group = cfg.group; 227 + home = "/var/lib/maddy"; 228 + createHome = true; 229 + isSystemUser = true; 230 + }; 231 + }; 232 + 233 + users.groups = mkIf (cfg.group == "maddy") { 234 + maddy = pkgs.lib.mkForce { 235 + name = cfg.group; 236 + }; 237 + }; 238 + 239 + networking.firewall = mkIf cfg.openFirewall { 240 + allowedTCPPorts = [ 25 143 587 ]; 241 + }; 242 + 243 + environment.systemPackages = [ 244 + pkgs.maddy 245 + ]; 246 + }; 247 + }
+1 -1
nixos/modules/services/networking/ddclient.nix
··· 29 29 configFile = if (cfg.configFile != null) then cfg.configFile else configFile'; 30 30 31 31 preStart = '' 32 - install --mode=0400 ${configFile} /run/${RuntimeDirectory}/ddclient.conf 32 + install ${configFile} /run/${RuntimeDirectory}/ddclient.conf 33 33 ${lib.optionalString (cfg.configFile == null) (if (cfg.passwordFile != null) then '' 34 34 password=$(printf "%q" "$(head -n 1 "${cfg.passwordFile}")") 35 35 sed -i "s|^password=$|password=$password|" /run/${RuntimeDirectory}/ddclient.conf
+2
nixos/modules/services/networking/freeradius.nix
··· 28 28 ProtectHome = "on"; 29 29 Restart = "on-failure"; 30 30 RestartSec = 2; 31 + LogsDirectory = "radius"; 31 32 }; 32 33 }; 33 34 ··· 73 74 users.radius = { 74 75 /*uid = config.ids.uids.radius;*/ 75 76 description = "Radius daemon user"; 77 + isSystemUser = true; 76 78 }; 77 79 }; 78 80
+9 -2
nixos/modules/services/networking/pleroma.nix
··· 100 100 after = [ "network-online.target" "postgresql.service" ]; 101 101 wantedBy = [ "multi-user.target" ]; 102 102 restartTriggers = [ config.environment.etc."/pleroma/config.exs".source ]; 103 + environment.RELEASE_COOKIE = "/var/lib/pleroma/.cookie"; 103 104 serviceConfig = { 104 105 User = cfg.user; 105 106 Group = cfg.group; ··· 116 117 # has not been updated. But the no-op process is pretty fast. 117 118 # Better be safe than sorry migration-wise. 118 119 ExecStartPre = 119 - let preScript = pkgs.writers.writeBashBin "pleromaStartPre" 120 - "${cfg.package}/bin/pleroma_ctl migrate"; 120 + let preScript = pkgs.writers.writeBashBin "pleromaStartPre" '' 121 + if [ ! -f /var/lib/pleroma/.cookie ] 122 + then 123 + echo "Creating cookie file" 124 + dd if=/dev/urandom bs=1 count=16 | hexdump -e '16/1 "%02x"' > /var/lib/pleroma/.cookie 125 + fi 126 + ${cfg.package}/bin/pleroma_ctl migrate 127 + ''; 121 128 in "${preScript}/bin/pleromaStartPre"; 122 129 123 130 ExecStart = "${cfg.package}/bin/pleroma start";
+27 -15
nixos/modules/services/torrent/transmission.nix
··· 167 167 }; 168 168 169 169 downloadDirPermissions = mkOption { 170 - type = types.str; 171 - default = "770"; 172 - example = "775"; 170 + type = with types; nullOr str; 171 + default = null; 172 + example = "770"; 173 173 description = '' 174 - The permissions set by <literal>systemd.activationScripts.transmission-daemon</literal> 175 - on the directories <xref linkend="opt-services.transmission.settings.download-dir"/> 176 - and <xref linkend="opt-services.transmission.settings.incomplete-dir"/>. 174 + If not <code>null</code>, is used as the permissions 175 + set by <literal>systemd.activationScripts.transmission-daemon</literal> 176 + on the directories <xref linkend="opt-services.transmission.settings.download-dir"/>, 177 + <xref linkend="opt-services.transmission.settings.incomplete-dir"/>. 178 + and <xref linkend="opt-services.transmission.settings.watch-dir"/>. 177 179 Note that you may also want to change 178 180 <xref linkend="opt-services.transmission.settings.umask"/>. 179 181 ''; ··· 246 248 # when /home/foo is not owned by cfg.user. 247 249 # Note also that using an ExecStartPre= wouldn't work either 248 250 # because BindPaths= needs these directories before. 249 - system.activationScripts.transmission-daemon = '' 250 - install -d -m 700 '${cfg.home}/${settingsDir}' 251 - chown -R '${cfg.user}:${cfg.group}' ${cfg.home}/${settingsDir} 252 - install -d -m '${cfg.downloadDirPermissions}' -o '${cfg.user}' -g '${cfg.group}' '${cfg.settings.download-dir}' 253 - '' + optionalString cfg.settings.incomplete-dir-enabled '' 254 - install -d -m '${cfg.downloadDirPermissions}' -o '${cfg.user}' -g '${cfg.group}' '${cfg.settings.incomplete-dir}' 255 - '' + optionalString cfg.settings.watch-dir-enabled '' 256 - install -d -m '${cfg.downloadDirPermissions}' -o '${cfg.user}' -g '${cfg.group}' '${cfg.settings.watch-dir}' 257 - ''; 251 + system.activationScripts = mkIf (cfg.downloadDirPermissions != null) 252 + { transmission-daemon = '' 253 + install -d -m 700 '${cfg.home}/${settingsDir}' 254 + chown -R '${cfg.user}:${cfg.group}' ${cfg.home}/${settingsDir} 255 + install -d -m '${cfg.downloadDirPermissions}' -o '${cfg.user}' -g '${cfg.group}' '${cfg.settings.download-dir}' 256 + '' + optionalString cfg.settings.incomplete-dir-enabled '' 257 + install -d -m '${cfg.downloadDirPermissions}' -o '${cfg.user}' -g '${cfg.group}' '${cfg.settings.incomplete-dir}' 258 + '' + optionalString cfg.settings.watch-dir-enabled '' 259 + install -d -m '${cfg.downloadDirPermissions}' -o '${cfg.user}' -g '${cfg.group}' '${cfg.settings.watch-dir}' 260 + ''; 261 + }; 258 262 259 263 systemd.services.transmission = { 260 264 description = "Transmission BitTorrent Service"; ··· 313 317 cfg.settings.script-torrent-done-filename ++ 314 318 optional (cfg.settings.watch-dir-enabled && !cfg.settings.trash-original-torrent-files) 315 319 cfg.settings.watch-dir; 320 + StateDirectory = [ 321 + "transmission" 322 + "transmission/.config/transmission-daemon" 323 + "transmission/.incomplete" 324 + "transmission/Downloads" 325 + "transmission/watch-dir" 326 + ]; 327 + StateDirectoryMode = mkDefault 750; 316 328 # The following options are only for optimizing: 317 329 # systemd-analyze security transmission 318 330 AmbientCapabilities = "";
+1 -1
nixos/modules/services/web-servers/nginx/location-options.nix
··· 102 102 }; 103 103 104 104 fastcgiParams = mkOption { 105 - type = types.attrsOf types.str; 105 + type = types.attrsOf (types.either types.str types.path); 106 106 default = {}; 107 107 description = '' 108 108 FastCGI parameters to override. Unlike in the Nginx
+1
nixos/tests/all-tests.nix
··· 247 247 lxd-image-server = handleTest ./lxd-image-server.nix {}; 248 248 #logstash = handleTest ./logstash.nix {}; 249 249 lorri = handleTest ./lorri/default.nix {}; 250 + maddy = handleTest ./maddy.nix {}; 250 251 magic-wormhole-mailbox-server = handleTest ./magic-wormhole-mailbox-server.nix {}; 251 252 magnetico = handleTest ./magnetico.nix {}; 252 253 mailcatcher = handleTest ./mailcatcher.nix {};
+58
nixos/tests/maddy.nix
··· 1 + import ./make-test-python.nix ({ pkgs, ... }: { 2 + name = "maddy"; 3 + meta = with pkgs.lib.maintainers; { maintainers = [ onny ]; }; 4 + 5 + nodes = { 6 + server = { ... }: { 7 + services.maddy = { 8 + enable = true; 9 + hostname = "server"; 10 + primaryDomain = "server"; 11 + openFirewall = true; 12 + }; 13 + }; 14 + 15 + client = { ... }: { 16 + environment.systemPackages = [ 17 + (pkgs.writers.writePython3Bin "send-testmail" { } '' 18 + import smtplib 19 + from email.mime.text import MIMEText 20 + 21 + msg = MIMEText("Hello World") 22 + msg['Subject'] = 'Test' 23 + msg['From'] = "postmaster@server" 24 + msg['To'] = "postmaster@server" 25 + with smtplib.SMTP('server', 587) as smtp: 26 + smtp.login('postmaster@server', 'test') 27 + smtp.sendmail('postmaster@server', 'postmaster@server', msg.as_string()) 28 + '') 29 + (pkgs.writers.writePython3Bin "test-imap" { } '' 30 + import imaplib 31 + 32 + with imaplib.IMAP4('server') as imap: 33 + imap.login('postmaster@server', 'test') 34 + imap.select() 35 + status, refs = imap.search(None, 'ALL') 36 + assert status == 'OK' 37 + assert len(refs) == 1 38 + status, msg = imap.fetch(refs[0], 'BODY[TEXT]') 39 + assert status == 'OK' 40 + assert msg[0][1].strip() == b"Hello World" 41 + '') 42 + ]; 43 + }; 44 + }; 45 + 46 + testScript = '' 47 + start_all() 48 + server.wait_for_unit("maddy.service") 49 + server.wait_for_open_port(143) 50 + server.wait_for_open_port(587) 51 + 52 + server.succeed("echo test | maddyctl creds create postmaster@server") 53 + server.succeed("maddyctl imap-acct create postmaster@server") 54 + 55 + client.succeed("send-testmail") 56 + client.succeed("test-imap") 57 + ''; 58 + })
+2 -2
pkgs/applications/audio/ft2-clone/default.nix
··· 13 13 14 14 stdenv.mkDerivation rec { 15 15 pname = "ft2-clone"; 16 - version = "1.47"; 16 + version = "1.48"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "8bitbubsy"; 20 20 repo = "ft2-clone"; 21 21 rev = "v${version}"; 22 - sha256 = "sha256-KLHJROOtRPtGHBYEMByY7LG6FY4vES6WndCiz7okan8="; 22 + sha256 = "sha256-ZE9uid/srHHuTRqzgbtHcfmM0VkVsdrK1CJ3Qwbvtao="; 23 23 }; 24 24 25 25 # Adapt the linux-only CMakeLists to darwin (more reliable than make-macos.sh)
+29
pkgs/applications/editors/emacs/elisp-packages/manual-packages.nix
··· 196 196 197 197 power-mode = callPackage ./power-mode { }; 198 198 199 + prisma-mode = let 200 + rev = "5283ca7403bcb21ca0cac8ecb063600752dfd9d4"; 201 + in melpaBuild { 202 + pname = "prisma-mode"; 203 + version = "20211207.0"; 204 + 205 + commit = rev; 206 + 207 + packageRequires = [ js2-mode ]; 208 + 209 + src = pkgs.fetchFromGitHub { 210 + owner = "pimeys"; 211 + repo = "emacs-prisma-mode"; 212 + inherit rev; 213 + sha256 = "sha256-DJJfjbu27Gi7Nzsa1cdi8nIQowKH8ZxgQBwfXLB0Q/I="; 214 + }; 215 + 216 + recipe = pkgs.writeText "recipe" '' 217 + (prisma-mode 218 + :repo "pimeys/emacs-prisma-mode" 219 + :fetcher github) 220 + ''; 221 + 222 + meta = { 223 + description = "Major mode for Prisma Schema Language"; 224 + license = gpl2Only; 225 + }; 226 + }; 227 + 199 228 railgun = callPackage ./railgun { }; 200 229 201 230 structured-haskell-mode = self.shm;
+3 -3
pkgs/applications/misc/charm/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "charm"; 5 - version = "0.8.6"; 5 + version = "0.9.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "charmbracelet"; 9 9 repo = "charm"; 10 10 rev = "v${version}"; 11 - sha256 = "0mjq0yy60czsw40h5n515qmi6bbvhrddll4sn5r2q1nf9pvviqr6"; 11 + sha256 = "1q5c2qka4srqj82f50iwmcj2j0yw2msz5dmrx2avqppp3fyi9jz3"; 12 12 }; 13 13 14 - vendorSha256 = "1spzawnk2fslc1m14dp8lx4vpnxwz7xgm1hxbpz4bqlqz1hfd6ax"; 14 + vendorSha256 = "1xycgzx706kyz37z3517p98129iy7py7zdizz34k38fvfpila5q5"; 15 15 16 16 doCheck = false; 17 17
+2 -2
pkgs/applications/misc/mob/default.nix
··· 2 2 3 3 buildGoPackage rec { 4 4 pname = "mob"; 5 - version = "2.0.0"; 5 + version = "2.1.0"; 6 6 goPackagePath = "github.com/remotemobprogramming/mob"; 7 7 8 8 src = fetchFromGitHub { 9 9 rev = "v${version}"; 10 10 owner = "remotemobprogramming"; 11 11 repo = pname; 12 - sha256 = "sha256-sSeXL+eHroxDr+91rwmUJ+WwDgefZgJBRTxy4wo6DDM="; 12 + sha256 = "sha256-K8ID8cetzCaMc/PVRNMyIhrshtEUiD6U/jI4e0TcOO4="; 13 13 }; 14 14 15 15 meta = with lib; {
+26
pkgs/applications/misc/skate/default.nix
··· 1 + { lib, buildGoModule, fetchFromGitHub }: 2 + 3 + buildGoModule rec { 4 + pname = "skate"; 5 + version = "0.1.0"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "charmbracelet"; 9 + repo = "skate"; 10 + rev = "v${version}"; 11 + sha256 = "01brxckjz8vlgaq9917l45xf48078d4465qn9l0lyll6hic6p06c"; 12 + }; 13 + 14 + vendorSha256 = "0mvx4rzs0mvb1dyxj105mh2awfy0bmp716x7hpfdwhwz3p11fc7k"; 15 + 16 + doCheck = false; 17 + 18 + ldflags = [ "-s" "-w" "-X=main.Version=${version}" ]; 19 + 20 + meta = with lib; { 21 + description = "A personal multi-machine syncable key value store"; 22 + homepage = "https://github.com/charmbracelet/skate"; 23 + license = licenses.mit; 24 + maintainers = with maintainers; [ penguwin ]; 25 + }; 26 + }
+2 -2
pkgs/applications/misc/spicetify-cli/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "spicetify-cli"; 5 - version = "2.7.1"; 5 + version = "2.8.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "khanhas"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-fWh345J2fD9uoGrDiVZyEBiOlMy8giEGKHGMujT0mjo="; 11 + sha256 = "sha256-YMVB9nKsHYy65McYs1w/ETy+1b8GkjuWFk6PZs4HFko="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-g0RYIVIq4oMXdRZDBDnVYg7ombN5WEo/6O9hChQvOYs=";
+9 -9
pkgs/applications/networking/browsers/chromium/upstream-info.json
··· 1 1 { 2 2 "stable": { 3 - "version": "96.0.4664.45", 4 - "sha256": "01q4fsf2cbx6g9nnaihvc5jj3ap8jq2gf16pnhf7ixzbhgcnm328", 5 - "sha256bin64": "0546i4yd1jahv088hjxpq0jc393pscvl5ap3s2qw5jrybliyfd2g", 3 + "version": "96.0.4664.93", 4 + "sha256": "14rlm91pzpdll6x2r1sxdswiv19h1ykxcq0csi9k9g0a9s71yyvw", 5 + "sha256bin64": "15233njj6ln7q3c112ssfh9s4m3shhp920zw8648z9dr7k8512qb", 6 6 "deps": { 7 7 "gn": { 8 8 "version": "2021-09-24", ··· 12 12 } 13 13 }, 14 14 "chromedriver": { 15 - "version": "96.0.4664.35", 16 - "sha256_linux": "0iq129a4mj4sjs08s68n82wd8563sw8196xda27wk3pfpprr23db", 17 - "sha256_darwin": "1prc7zbgnljqz2d89clpk5c0y48r79zmb9in4vinf3j6p2rxn0vy" 15 + "version": "96.0.4664.45", 16 + "sha256_linux": "15wybxlh38sw7f2bzalf9ivfp8262cpcvhq08nw9d2cj3j39f13m", 17 + "sha256_darwin": "0r3b8wgbd8xjb09f4vc402gp77y2aqjk9hpqvvr6xgdr7nqym20f" 18 18 } 19 19 }, 20 20 "beta": { 21 - "version": "97.0.4692.20", 22 - "sha256": "1njgfz3kz1pyyaaskqc47ldy2gzc3c9a8mjib81nalzrqbmd3372", 23 - "sha256bin64": "0nsaf46a9pl8cxw5v2zsfp2ynja4m55qi1m4mhwhmyr50138655f", 21 + "version": "97.0.4692.36", 22 + "sha256": "0p0f19svnymql8skx6alb6zy4fmc5115dc2avs8h2mca1q8n5r0s", 23 + "sha256bin64": "08p0rwn4jglrzma1vf4jnyqaffnk0c8xwc7jkgfpkasm43d72zim", 24 24 "deps": { 25 25 "gn": { 26 26 "version": "2021-11-03",
+2 -2
pkgs/applications/networking/cluster/assign-lb-ip/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "assign-lb-ip"; 5 - version = "2.2.0"; 5 + version = "2.3.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "Nordix"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-PkMXjFP2brULCnD6mGz9wCufMpiwsmulDpINiwmkeys="; 11 + sha256 = "sha256-VaxzU8HC+LQTyhL9pxvjiPa6T5v77RT2B7A0IuU/CUg="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-j9SweQq45sYk0lH6zkFrmWRlVhhMO8rLJGQxS6smAVw=";
+2 -2
pkgs/applications/networking/cluster/clusterctl/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "clusterctl"; 5 - version = "1.0.1"; 5 + version = "1.0.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "kubernetes-sigs"; 9 9 repo = "cluster-api"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-EkBZZUkr1u0u75WDDFAdLLpS01+3+eyXpu4HRg2Q780="; 11 + sha256 = "sha256-esSpCNvgYhuz9i22AU4ZowU5A5ZOPZ15+XHB4OOfTa4="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-VO1Z4NUWrd4JuFYFg0a01psqoIM8ps3vKd0djR5OELU=";
+2 -2
pkgs/applications/networking/cluster/hubble/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "hubble"; 5 - version = "0.8.2"; 5 + version = "0.9.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "cilium"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "1n1930hlaflx7kzqbz7vvnxw9hrps84kqibaf2ixnjp998kqkl6d"; 11 + sha256 = "sha256-L8sRvIA89RiXjrG0WcH72iYKlNTFvmQrveA9k5EBRKo="; 12 12 }; 13 13 14 14 vendorSha256 = null;
+2 -2
pkgs/applications/networking/cluster/kubedb-cli/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "kubedb-cli"; 5 - version = "0.22.0"; 5 + version = "0.24.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "kubedb"; 9 9 repo = "cli"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-pAvaScbwGJMW3iFS26D71nImWsXcEVx7ONUP82f6QDQ="; 11 + sha256 = "sha256-b5LbA2qEsEA7J0djEMhDeBY9iV1cvGVtxTlmneQGKYY="; 12 12 }; 13 13 14 14 vendorSha256 = null;
+2 -2
pkgs/applications/networking/cluster/kubeone/default.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "kubeone"; 9 - version = "1.3.0"; 9 + version = "1.3.2"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "kubermatic"; 13 13 repo = "kubeone"; 14 14 rev = "v${version}"; 15 - sha256 = "sha256-B/ga5MpjXoLe5H/JosmrS/Wuj1elzQHPsnz/qOm7Hrg="; 15 + sha256 = "sha256-Y0IlTOAfwEp8WkFpXSS02vEhCM4+juAY+Nx/e9Vv0F0="; 16 16 }; 17 17 18 18 vendorSha256 = "sha256-/rhV7JHuqejCTizcjKIkaJlbRcx7AfMcGqQYo6dlg48=";
+2 -2
pkgs/applications/networking/cluster/kubernetes/default.nix
··· 21 21 22 22 stdenv.mkDerivation rec { 23 23 pname = "kubernetes"; 24 - version = "1.22.3"; 24 + version = "1.22.4"; 25 25 26 26 src = fetchFromGitHub { 27 27 owner = "kubernetes"; 28 28 repo = "kubernetes"; 29 29 rev = "v${version}"; 30 - sha256 = "sha256-yXis1nq36MO/RnYLxOYBs6xnaTf9lk+VJBzSamrHcEU="; 30 + sha256 = "sha256-6ivBecOttzbX85+WCttaU5nXjaiEiKU8xRhnCPkjLXg="; 31 31 }; 32 32 33 33 nativeBuildInputs = [ removeReferencesTo makeWrapper which go rsync installShellFiles ];
+3 -3
pkgs/applications/networking/cluster/minikube/default.nix
··· 11 11 12 12 buildGoModule rec { 13 13 pname = "minikube"; 14 - version = "1.23.2"; 14 + version = "1.24.0"; 15 15 16 - vendorSha256 = "sha256-Q6DadAmx/8TM+MrdaKgAjn0sVrKqTYoWdsmnN77yfKA="; 16 + vendorSha256 = "sha256-I23T1eWPTU9QiIVI4qi5mkaS6CkeGbOHKTHwjCnKTIM="; 17 17 18 18 doCheck = false; 19 19 ··· 21 21 owner = "kubernetes"; 22 22 repo = "minikube"; 23 23 rev = "v${version}"; 24 - sha256 = "sha256-PIgzGikVIno2Gd+kSjF4kLHuUKgPrPHoIJxAGblI8RQ="; 24 + sha256 = "sha256-WW5VVjm7cq/3/RGiIE2nn8O+VK0RHCtKkrlboIzhqC4="; 25 25 }; 26 26 27 27 nativeBuildInputs = [ installShellFiles pkg-config which ];
+3 -3
pkgs/applications/networking/cluster/nerdctl/default.nix
··· 10 10 11 11 buildGoModule rec { 12 12 pname = "nerdctl"; 13 - version = "0.13.0"; 13 + version = "0.14.0"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "containerd"; 17 17 repo = pname; 18 18 rev = "v${version}"; 19 - sha256 = "sha256-uyLY2yH/6J0rtra0brBATadPqrNyyuCcaGfOrng9h4Y="; 19 + sha256 = "sha256-Esj1LFf884m9iTJjqqGCMhbgBNSGpYAfi2stPYSNgRA="; 20 20 }; 21 21 22 - vendorSha256 = "sha256-r7xzvntTIJocdYMQpFXunI2XV65eRG+piEEzS5N2xsY="; 22 + vendorSha256 = "sha256-cfxHx4oyIfUX9bGjwZ9Hu3VieIXOB0VGHjaQWm4kYOk="; 23 23 24 24 nativeBuildInputs = [ makeWrapper installShellFiles ]; 25 25
+3 -3
pkgs/applications/networking/cluster/nomad-autoscaler/default.nix
··· 3 3 let 4 4 package = buildGoModule rec { 5 5 pname = "nomad-autoscaler"; 6 - version = "0.3.3"; 6 + version = "0.3.4"; 7 7 8 8 outputs = [ 9 9 "out" ··· 25 25 owner = "hashicorp"; 26 26 repo = "nomad-autoscaler"; 27 27 rev = "v${version}"; 28 - sha256 = "sha256-bN/U6aCf33B88ouQwTGG8CqARzWmIvXNr5JPr3l8cVI="; 28 + sha256 = "sha256-SmlcQH+K/axl6Gj+bX0Quk6K/usP0c1hWnIdFjS1dn8="; 29 29 }; 30 30 31 - vendorSha256 = "sha256-Ls8gkfLyxfQD8krvxjAPnZhf1r1s2MhtQfMMfp8hJII="; 31 + vendorSha256 = "sha256-tO8vi9jBV6rVcGk/OoaXzpnQi4yPdozYZZwAMFCz2+c="; 32 32 33 33 subPackages = [ "." ]; 34 34
+3 -3
pkgs/applications/networking/cluster/terragrunt/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "terragrunt"; 5 - version = "0.35.5"; 5 + version = "0.35.13"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "gruntwork-io"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-VUB1zZwRZ+TUFDcq/lBB9eAeM7d5zWhFy7nxzH5S6oc="; 11 + sha256 = "sha256-B+HdxnTm/LfGvabQiKhZVRIaMpg4zgCVYP8MkKiiSok="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-y84EFmoJS4SeA5YFIVFU0iWa5NnjU5yvOj7OFE+jGN0="; 14 + vendorSha256 = "sha256-tNgEepKqwiqXhmoRCIEg7VJw7Y0TGt+R+6dZzd8aECg="; 15 15 16 16 doCheck = false; 17 17
+3 -3
pkgs/applications/networking/dnscontrol/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "dnscontrol"; 5 - version = "3.12.0"; 5 + version = "3.13.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "StackExchange"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-g3Yb0LAa9Ukp32p0OoXxjmw9RQwyVpi0KXQBIpKunbU="; 11 + sha256 = "sha256-XBpdNQHG90rJWGfXpJgXsj5AR2VhK/3+1U7Zl8XDlsw="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-RBe9XzvdgE5XWBTUhvAokElNwARgwVhkMwPmdKUroC0="; 14 + vendorSha256 = "sha256-Ob4ZPtP14TsNOnGVfR5lFAKpJsjoJDKmiE++DqY32QA="; 15 15 16 16 subPackages = [ "." ]; 17 17
+3 -3
pkgs/applications/networking/hydroxide/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "hydroxide"; 5 - version = "0.2.20"; 5 + version = "0.2.21"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "emersion"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-VTUpiuSsI795XDSxJJvLQlVNPLiekHyKcCazRBky9nU="; 11 + sha256 = "sha256-fF+pQnqAWBktc4NdQFTHeB/sEg5bPTxXtdL1x5JuXU8="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-AuZnHpJ1Xel/L9dG3ATdXnoTeUxtieah/ea+0svw3oA="; 14 + vendorSha256 = "sha256-M5QlhF2Cj1jn5NNiKj1Roh9+sNCWxQEb4vbtsDfapWY="; 15 15 16 16 doCheck = false; 17 17
+2 -2
pkgs/applications/science/logic/logisim-evolution/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "logisim-evolution"; 5 - version = "3.7.1"; 5 + version = "3.7.2"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/logisim-evolution/logisim-evolution/releases/download/v${version}/logisim-evolution-${version}-all.jar"; 9 - sha256 = "04q9bzhnzpi8cgv3ly4ii88qvmlw9n09c4p1qmg8dhxqkskdqj6h"; 9 + sha256 = "sha256-RI+ioOHj13UAGuPzseAAy3oQBQYkja/ucjj4QMeRZhw="; 10 10 }; 11 11 12 12 dontUnpack = true;
+2 -2
pkgs/applications/terminal-emulators/foot/default.nix
··· 27 27 }: 28 28 29 29 let 30 - version = "1.10.1"; 30 + version = "1.10.2"; 31 31 32 32 # build stimuli file for PGO build and the script to generate it 33 33 # independently of the foot's build, so we can cache the result ··· 99 99 owner = "dnkl"; 100 100 repo = pname; 101 101 rev = version; 102 - sha256 = "12n1v9by519fg40xvjf4v0g2phi08lcg0clz7rxs2i2xwlizz7nc"; 102 + sha256 = "00096c2m8pn4gpafvmg9lhyprwgnsis62bq4qmagnbb49bj5kr9v"; 103 103 }; 104 104 105 105 depsBuildBuild = [
+2 -2
pkgs/applications/video/droidcam/default.nix
··· 5 5 6 6 stdenv.mkDerivation rec { 7 7 pname = "droidcam"; 8 - version = "1.8.0"; 8 + version = "1.8.1"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "aramg"; 12 12 repo = "droidcam"; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-A8FHTAeDFaSDp5Bnfv5NmCC7xIFAw3IcHSD4hZp4vwU="; 14 + sha256 = "sha256-3iA7GDTiCx5vHawj8ZBFAK0BIfmxEFuQrVfL7Gi6FhM="; 15 15 }; 16 16 17 17 nativeBuildInputs = [
+23
pkgs/applications/video/f1viewer/default.nix
··· 1 + { lib, buildGoModule, fetchFromGitHub }: 2 + 3 + buildGoModule rec { 4 + pname = "f1viewer"; 5 + version = "2.4.0"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "SoMuchForSubtlety"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "7eXRUG74l9+9nU7EmDvNcHc+2pg5+/amjqtrzT60f94="; 12 + }; 13 + 14 + vendorSha256 = "4pQ8NT0mh3w7naHEHh2w6Csop0uitlWClZ95VlYaPW0="; 15 + 16 + meta = with lib; { 17 + description = 18 + "A TUI to view Formula 1 footage using VLC or another media player"; 19 + homepage = "https://github.com/SoMuchForSubtlety/f1viewer"; 20 + license = licenses.gpl3Only; 21 + maintainers = with maintainers; [ michzappa ]; 22 + }; 23 + }
+2 -2
pkgs/applications/video/minitube/default.nix
··· 6 6 7 7 mkDerivation rec { 8 8 pname = "minitube"; 9 - version = "3.9.1"; 9 + version = "3.9.2"; 10 10 11 11 src = fetchFromGitHub { 12 - sha256 = "sha256-1BVHxB7WtXCAJqP+uADszdVPc+T3ctCCzfoJPCb5ZTE="; 12 + sha256 = "sha256-MIzfo17eAvpWO2HNq9z+D9XiOKTRiUHvaOdxI1EK1f0="; 13 13 rev = version; 14 14 repo = "minitube"; 15 15 owner = "flaviotordini";
+6
pkgs/applications/virtualization/qemu/default.nix
··· 119 119 url = "https://gitlab.com/qemu-project/qemu/-/commit/eb94846280df3f1e2a91b6179fc05f9890b7e384.patch"; 120 120 sha256 = "sha256-p31fd47RTSw928DOMrubQQybnzDAGm23z4Yhe+hGJQ8="; 121 121 }) 122 + # Fixes socket_sockaddr_to_address_unix assertion errors in some setups. Remove with next release. 123 + (fetchpatch { 124 + name = "fix-unix-socket-path-copy-again.patch"; 125 + url = "https://gitlab.com/qemu-project/qemu/-/commit/118d527f2e4baec5fe8060b22a6212468b8e4d3f.patch"; 126 + sha256 = "sha256-ox+JSpc0pqd3bMi5Ot7ljQyk70SX8g+BLufR06mZPps="; 127 + }) 122 128 ] ++ lib.optional nixosTestRunner ./force-uid0-on-9p.patch 123 129 ++ lib.optionals stdenv.hostPlatform.isMusl [ 124 130 ./sigrtminmax.patch
+2 -2
pkgs/data/icons/luna-icons/default.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "luna-icons"; 12 - version = "1.6"; 12 + version = "1.7"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "darkomarko42"; 16 16 repo = pname; 17 17 rev = version; 18 - sha256 = "1iw9wqfs8s3l5k5ngyjmvvxbsxcsya3a6h1xwl6d603swv7h1s02"; 18 + sha256 = "sha256-L8bkO2zGEXfwqoWZRDCm/PdBxwedkx57kduwlMoyAME="; 19 19 }; 20 20 21 21 nativeBuildInputs = [
+2 -2
pkgs/development/compilers/julia/1.0.nix
··· 1 1 { lib, stdenv, fetchpatch, fetchurl, fetchzip 2 2 # build tools 3 - , gfortran, m4, makeWrapper, patchelf, perl, which, python2 3 + , gfortran, m4, makeWrapper, patchelf, perl, which, python3 4 4 , cmake 5 5 # libjulia dependencies 6 6 , libunwind, readline, utf8proc, zlib ··· 74 74 sha256 = src_sha256; 75 75 }; 76 76 77 - nativeBuildInputs = [ cmake curl gfortran m4 makeWrapper patchelf perl python2 which ]; 77 + nativeBuildInputs = [ cmake curl gfortran m4 makeWrapper patchelf perl python3 which ]; 78 78 # cmake is only used to build the bundled deps 79 79 dontUseCmakeConfigure = true; 80 80
+2 -2
pkgs/development/compilers/julia/1.5.nix
··· 1 1 { lib, stdenv, fetchzip 2 2 # build tools 3 - , gfortran, m4, makeWrapper, patchelf, perl, which, python2, cmake 3 + , gfortran, m4, makeWrapper, patchelf, perl, which, python3, cmake 4 4 # libjulia dependencies 5 5 , libunwind, readline, utf8proc, zlib 6 6 # standard library dependencies ··· 48 48 zlib 49 49 ] ++ lib.optionals stdenv.isDarwin [CoreServices ApplicationServices]; 50 50 51 - nativeBuildInputs = [ curl gfortran m4 makeWrapper patchelf perl python2 which cmake ]; 51 + nativeBuildInputs = [ curl gfortran m4 makeWrapper patchelf perl python3 which cmake ]; 52 52 53 53 makeFlags = 54 54 let
+36
pkgs/development/compilers/kaitai-struct-compiler/default.nix
··· 1 + { lib 2 + , stdenv 3 + , fetchzip 4 + , openjdk8 5 + , makeWrapper 6 + }: 7 + 8 + 9 + stdenv.mkDerivation rec { 10 + pname = "kaitai-struct-compiler"; 11 + version = "0.9"; 12 + 13 + src = fetchzip { 14 + url = "https://github.com/kaitai-io/kaitai_struct_compiler/releases/download/${version}/kaitai-struct-compiler-${version}.zip"; 15 + sha256 = "sha256-2HSasigpJDuWNejNVklnpQwaA4MC030S9taF/7YvzgY="; 16 + }; 17 + 18 + nativeBuildInputs = [ makeWrapper ]; 19 + 20 + installPhase = '' 21 + install -D $src/bin/kaitai-struct-compiler $out/bin/kaitai-struct-compiler 22 + ln -s $out/bin/kaitai-struct-compiler $out/bin/ksc 23 + cp -R $src/lib $out/lib 24 + wrapProgram $out/bin/kaitai-struct-compiler --prefix PATH : ${lib.makeBinPath [ openjdk8 ] } 25 + ''; 26 + 27 + meta = with lib; { 28 + homepage = "https://github.com/kaitai-io/kaitai_struct_compiler"; 29 + description = 30 + "Compiler to generate binary data parsers in C++ / C# / Go / Java / JavaScript / Lua / Perl / PHP / Python / Ruby "; 31 + license = licenses.gpl3Only; 32 + maintainers = with maintainers; [ luis ]; 33 + platforms = platforms.unix; 34 + }; 35 + } 36 +
+2 -2
pkgs/development/libraries/amdvlk/default.nix
··· 21 21 22 22 in stdenv.mkDerivation rec { 23 23 pname = "amdvlk"; 24 - version = "2021.Q3.7"; 24 + version = "2021.Q4.1"; 25 25 26 26 src = fetchRepoProject { 27 27 name = "${pname}-src"; 28 28 manifest = "https://github.com/GPUOpen-Drivers/AMDVLK.git"; 29 29 rev = "refs/tags/v-${version}"; 30 - sha256 = "sha256-0Q6c10lQSxgqOB6X6F8LyeF2aoyicmp0tZlknuZjQHE="; 30 + sha256 = "sha256-yvpHLreBNhiSxnZis5+XcTOSZPRLq5K8YNJsjpYqD6s="; 31 31 }; 32 32 33 33 buildInputs = [
+2 -2
pkgs/development/libraries/libqb/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libqb"; 5 - version = "2.0.3"; 5 + version = "2.0.4"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "ClusterLabs"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-a9CnqfrQUL0DdPPOJjfh9tQ0O8iRHPP3iBmy3MKvt/0="; 11 + sha256 = "sha256-s6b2/bCVNzr3IBqiSAjiJ/DHCqkRwR1aA+J4uBP5mO4="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ autoreconfHook pkg-config ];
+2 -2
pkgs/development/libraries/libspng/default.nix
··· 11 11 12 12 stdenv.mkDerivation rec { 13 13 pname = "libspng"; 14 - version = "0.7.0"; 14 + version = "0.7.1"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "randy408"; 18 18 repo = pname; 19 19 rev = "v${version}"; 20 - sha256 = "0zk0w09is4g7gysax4h0f4xj5f40vm6ipc1wi98ymzban89cjjnz"; 20 + sha256 = "sha256-JBNFYmmd1UnoIfV6iWeDIw/kgvl8AArxfHK+TKjZ9rk="; 21 21 }; 22 22 23 23 doCheck = true;
+5 -3
pkgs/development/libraries/libunwind/default.nix
··· 1 - { stdenv, lib, fetchurl, autoreconfHook, xz, coreutils }: 1 + { stdenv, lib, fetchurl, autoreconfHook, xz, buildPackages }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libunwind"; ··· 9 9 sha256 = "sha256-SmrsZmmR+0XQiJxErt6K1usQgHHDVU/N/2cfnJR5SXY="; 10 10 }; 11 11 12 - postPatch = lib.optionalString stdenv.hostPlatform.isMusl '' 12 + postPatch = if stdenv.cc.isClang then '' 13 + substituteInPlace configure.ac --replace "-lgcc_s" "" 14 + '' else lib.optionalString stdenv.hostPlatform.isMusl '' 13 15 substituteInPlace configure.ac --replace "-lgcc_s" "-lgcc_eh" 14 16 ''; 15 17 ··· 19 21 20 22 # Without latex2man, no man pages are installed despite being 21 23 # prebuilt in the source tarball. 22 - configureFlags = [ "LATEX2MAN=${coreutils}/bin/true" ]; 24 + configureFlags = [ "LATEX2MAN=${buildPackages.coreutils}/bin/true" ]; 23 25 24 26 propagatedBuildInputs = [ xz ]; 25 27
+2 -2
pkgs/development/libraries/muparserx/default.nix
··· 5 5 6 6 stdenv.mkDerivation rec { 7 7 pname = "muparserx"; 8 - version = "4.0.8"; 8 + version = "4.0.11"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "beltoforion"; 12 12 repo = "muparserx"; 13 13 rev = "v${version}"; 14 - sha256 = "097pkdffv0phr0345hy06mjm5pfy259z13plsvbxvcmds80wl48v"; 14 + sha256 = "sha256-BWzHlz1mQYsvWa53EtO05Rb4rRHJBSRguJTHLtgqpPw="; 15 15 }; 16 16 17 17 nativeBuildInputs = [ cmake ];
+2 -2
pkgs/development/libraries/qgnomeplatform/default.nix
··· 15 15 16 16 mkDerivation rec { 17 17 pname = "qgnomeplatform"; 18 - version = "0.8.0"; 18 + version = "0.8.3"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "FedoraQt"; 22 22 repo = "QGnomePlatform"; 23 23 rev = version; 24 - sha256 = "C/n8i5j0UWfxhP10c4j89U+LrpPozXnam4fIPYMXZAA="; 24 + sha256 = "sha256-950VEcxhJeBPSQToC8KpBx/KSneARN6Y8X7CAuFyRjo="; 25 25 }; 26 26 27 27 patches = [
+2 -2
pkgs/development/python-modules/dbutils/default.nix
··· 5 5 }: 6 6 7 7 buildPythonPackage rec { 8 - version = "2.0.2"; 8 + version = "3.0.0"; 9 9 pname = "dbutils"; 10 10 11 11 src = fetchPypi { 12 12 inherit version; 13 13 pname = "DBUtils"; 14 - sha256 = "1cc8zyd4lapzf9ny6c2jf1vysphlhr19m8miyvw5spbyq4pxpnsf"; 14 + sha256 = "549d472197b3eef27e7bb2dd2246b28e880ac0ae9fdf63aadfd3b7def153db0c"; 15 15 }; 16 16 17 17 checkInputs = [ pytestCheckHook ];
+2 -2
pkgs/development/python-modules/google-cloud-spanner/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "google-cloud-spanner"; 17 - version = "3.11.1"; 17 + version = "3.12.0"; 18 18 19 19 src = fetchPypi { 20 20 inherit pname version; 21 - sha256 = "b993b4c68f11dd6fe0f66e0c437a71f9bed8d77f6bf1ddc4aad422ce3b330ecb"; 21 + sha256 = "8f1390c3776fcfce71e1ef024d9ccde52c16d1cd728bc587c24065d6e4d21933"; 22 22 }; 23 23 24 24 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/memory-allocator/default.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "memory-allocator"; 9 - version = "0.1.0"; 9 + version = "0.1.2"; 10 10 11 11 src = fetchPypi { 12 12 inherit version; 13 13 pname = "memory_allocator"; 14 - sha256 = "sha256-UUcR71e3eAQIQpmWM+AVQxVtgHvrNjaIlHo5pURUln0="; 14 + sha256 = "ddf42a2dcc678062f30c63c868335204d46a4ecdf4db0dc43ed4529f1d0ffab9"; 15 15 }; 16 16 17 17 propagatedBuildInputs = [ cython ];
+2 -2
pkgs/development/python-modules/pyathena/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "pyathena"; 12 - version = "2.3.0"; 12 + version = "2.3.2"; 13 13 14 14 src = fetchPypi { 15 15 pname = "PyAthena"; 16 16 inherit version; 17 - sha256 = "08fl653yayvqi991zvcai5ifcxwy9ip6xh0cr3lbimggjnjgwsl5"; 17 + sha256 = "20a473c52e76a211c427d2f711af0a04804a70fc036ab884780e42e0dc2025f7"; 18 18 }; 19 19 20 20 # Nearly all tests depend on a working AWS Athena instance,
+2 -2
pkgs/development/python-modules/pytest-snapshot/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "pytest-snapshot"; 5 - version = "0.7.0"; 5 + version = "0.8.0"; 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "427b5ab088b25a1c8b63ce99725040664c840ff1f5a3891252723cce972897f9"; 9 + sha256 = "cf84c88c3e0b4ae08ae797d9ccdc32715b64dd68b2da40f575db56956ed23326"; 10 10 }; 11 11 12 12 nativeBuildInputs = [ setuptools-scm ];
+2 -2
pkgs/development/python-modules/rq/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "rq"; 5 - version = "1.10"; 5 + version = "1.10.1"; 6 6 disabled = isPy27; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "rq"; 10 10 repo = "rq"; 11 11 rev = "v${version}"; 12 - sha256 = "16k5qz5k3v232dzv99bxxw52jr2hb5ra08b6dkhqya98wjviq8l5"; 12 + sha256 = "1f4fi1rvn97d2b524q45k6s10b007pr23k0mf44q7hy8q4vnjmh5"; 13 13 }; 14 14 15 15 # test require a running redis rerver, which is something we can't do yet
+2 -2
pkgs/development/python-modules/spacy-transformers/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "spacy-transformers"; 15 - version = "1.1.2"; 15 + version = "1.1.3"; 16 16 17 17 disabled = pythonOlder "3.6"; 18 18 19 19 src = fetchPypi { 20 20 inherit pname version; 21 - sha256 = "b84c195dc21a28582579dea3f76c90222e29ee0d99b6adf38ade75646ed2746e"; 21 + sha256 = "f4f553d3d2a065147a8c1292b5d9adf050c0f78dd15bb05c9614341cf88c5574"; 22 22 }; 23 23 24 24 postPatch = ''
+2 -2
pkgs/development/tools/analysis/checkov/default.nix
··· 46 46 47 47 buildPythonApplication rec { 48 48 pname = "checkov"; 49 - version = "2.0.628"; 49 + version = "2.0.632"; 50 50 51 51 src = fetchFromGitHub { 52 52 owner = "bridgecrewio"; 53 53 repo = pname; 54 54 rev = version; 55 - sha256 = "sha256-/plAzSkvcQ1pEd62/ZyFMew1c81FTIyCTynxVAPjqAE="; 55 + sha256 = "sha256-SDMp+QOZy2Ml5V8RHLvmTl/3/KB8iYaW0muakE8PnhA="; 56 56 }; 57 57 58 58 nativeBuildInputs = with py.pkgs; [
+3 -3
pkgs/development/tools/build-managers/bazel/bazel-remote/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "bazel-remote"; 8 - version = "2.2.0"; 8 + version = "2.3.0"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "buchgr"; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-zRZlpZWGZpBHc5DtqxeVc4xmJDKTem54/Fx/41i57c4="; 14 + sha256 = "sha256-ILD7uGVzRgFugHYkhvxy0rbWarXgGZXi/SLRSQb8nl4="; 15 15 }; 16 16 17 - vendorSha256 = "sha256-N0UfC/M6EBbnpBpOTNkGgFEJpTA3VQ2jg9M7kxQQQc8="; 17 + vendorSha256 = "sha256-XBsYSA0i0q/mp8sQh9h//pjs+TbEDc7UIdNU24/Qemo="; 18 18 19 19 doCheck = false; 20 20
+2 -2
pkgs/development/tools/build-managers/bazel/buildtools/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "bazel-buildtools"; 5 - version = "4.2.3"; 5 + version = "4.2.4"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "bazelbuild"; 9 9 repo = "buildtools"; 10 10 rev = version; 11 - sha256 = "sha256-FRT8t7bBE98ya5P50UJWhq02XuDGBZCNd3wBOpnDWmo="; 11 + sha256 = "sha256-Tt1inAViAFaV+o2A2yquPXEv5EiC2eJgNUnr7jBYq7w="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-buMkRxVLlS2LBJGaGWeR41BsmE/0vgDS8s1VcRYN0fA=";
+3 -3
pkgs/development/tools/konstraint/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "konstraint"; 5 - version = "0.15.0"; 5 + version = "0.15.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "plexsystems"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-lnbci3SUVp/vyArrfRF1dgv0KnqcmGIalhsZjDOhpSg="; 11 + sha256 = "sha256-vt8/hYsThBoAxMglF8pjdVphmkbHXsuzaHFJhnGXdU4="; 12 12 }; 13 - vendorSha256 = "sha256-hfnpZgGIEpfHjM5J93D/aljN6j5XHGknpYXWeRV4Y4Q="; 13 + vendorSha256 = "sha256-3m+mN90Edb/yMgVmkokRQrDM2EdB7cb2opL0QZJ8L+U="; 14 14 15 15 # Exclude go within .github folder 16 16 excludedPackages = ".github";
+2 -2
pkgs/development/tools/ktlint/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "ktlint"; 5 - version = "0.43.1"; 5 + version = "0.43.2"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/pinterest/ktlint/releases/download/${version}/ktlint"; 9 - sha256 = "1qcalpimgsm5s3xhssrnanryra4dp2if9y4647aimydwvfhi05df"; 9 + sha256 = "sha256-HXTkYwN6U8xyxgFnj69nLSpbDCqWUWeSuqlZbquRD6o="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/development/tools/lazygit/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "lazygit"; 5 - version = "0.31.3"; 5 + version = "0.31.4"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "jesseduffield"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-CgWN7xfWX0aSwNAPt2UDftyD0CbQQSUY6SMlyP9TSjc="; 11 + sha256 = "sha256-yze4UaSEbyHwHSyj0mM7uCzaDED+p4O3HVVlHJi/FKU="; 12 12 }; 13 13 14 14 vendorSha256 = null;
+3 -3
pkgs/development/tools/misc/editorconfig-checker/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "editorconfig-checker"; 5 - version = "2.3.5"; 5 + version = "2.4.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "editorconfig-checker"; 9 9 repo = "editorconfig-checker"; 10 10 rev = version; 11 - sha256 = "sha256-t1qvmTs6hOrAnq5hjU2Qjt33vdW9MuSOvWCCY82db+g="; 11 + sha256 = "sha256-uP+AgQO1k9fic7r0pOKqO5lUHKEf7Pwaw2U2a6ghzz0="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-Rs7u/ZepnMNg5EZ/HWqSdO428KOkxpSbo7rl0treqUY="; 14 + vendorSha256 = "sha256-SrBrYyExeDHXhezvtfGLtm8NM1eX4/8kzwUICQLZDjo="; 15 15 16 16 doCheck = false; 17 17
+16 -1
pkgs/development/tools/ocaml/camlp4/default.nix
··· 1 1 { lib, stdenv, fetchzip, which, ocaml, ocamlbuild }: 2 2 3 - if lib.versionAtLeast ocaml.version "4.09" 3 + if lib.versionAtLeast ocaml.version "4.14" 4 4 then throw "camlp4 is not available for OCaml ${ocaml.version}" 5 5 else 6 6 ··· 26 26 "4.08" = { 27 27 version = "4.08+1"; 28 28 sha256 = "0qplawvxwai25bi27niw2cgz2al01kcnkj8wxwhxslpi21z6pyx1"; }; 29 + "4.09" = { 30 + version = "4.09+1"; 31 + sha256 = "1gr33x6xs1rs0bpyq4vzyfxd6vn47jfkg8imi81db2r0cbs0kxx1"; }; 32 + "4.10" = { 33 + version = "4.10+1"; 34 + sha256 = "093bc1c28wid5li0jwglnd4p3csxw09fmbs9ffybq2z41a5mgay6"; }; 35 + "4.11" = { 36 + version = "4.11+1"; 37 + sha256 = "0sn7f6im940qh0ixmx1k738xrwwdvy9g7r19bv5218jb6mh0g068"; }; 38 + "4.12" = { 39 + version = "4.12+1"; 40 + sha256 = "1cfk5ppnd511vzsr9gc0grxbafmh0m3m897aij198rppzxps5kyz"; }; 41 + "4.13" = { 42 + version = "4.13+1"; 43 + sha256 = "0fzxa1zdhk74mlxpin7p90flks6sp4gkc0mfclmj9zak15rii55n"; }; 29 44 }.${ocaml.meta.branch}; 30 45 in 31 46
+2 -2
pkgs/development/tools/open-policy-agent/default.nix
··· 8 8 9 9 buildGoModule rec { 10 10 pname = "open-policy-agent"; 11 - version = "0.34.0"; 11 + version = "0.35.0"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "open-policy-agent"; 15 15 repo = "opa"; 16 16 rev = "v${version}"; 17 - sha256 = "sha256-T8eFCFzDU0GTd7n141XKT34lRXoU2LOrl0Rlh1WLsmo="; 17 + sha256 = "sha256-IiYEDvTHb25xolE/IfpFgcJArxU6c89P5oNgt1T2VXA="; 18 18 }; 19 19 vendorSha256 = null; 20 20
+1 -1
pkgs/development/tools/selenium/server/default.nix
··· 26 26 cp $src $out/share/lib/${pname}-${version}/${pname}-${version}.jar 27 27 makeWrapper ${jre}/bin/java $out/bin/selenium-server \ 28 28 --add-flags "-cp $out/share/lib/${pname}-${version}/${pname}-${version}.jar:${htmlunit-driver}/share/lib/${htmlunit-driver.name}/${htmlunit-driver.name}.jar" \ 29 - --add-flags ${optionalString chromeSupport "-Dwebdriver.chrome.driver=${chromedriver}/bin/chromedriver"} \ 29 + ${optionalString chromeSupport "--add-flags -Dwebdriver.chrome.driver=${chromedriver}/bin/chromedriver"} \ 30 30 --add-flags "org.openqa.grid.selenium.GridLauncherV3" 31 31 ''; 32 32
+14 -11
pkgs/development/tools/yarn2nix-moretea/yarn2nix/default.nix
··· 1 1 { pkgs ? import <nixpkgs> {} 2 2 , nodejs ? pkgs.nodejs 3 3 , yarn ? pkgs.yarn 4 + , allowAliases ? pkgs.config.allowAliases or true 4 5 }: 5 6 6 7 let ··· 9 10 compose = f: g: x: f (g x); 10 11 id = x: x; 11 12 composeAll = builtins.foldl' compose id; 13 + 14 + # https://docs.npmjs.com/files/package.json#license 15 + # TODO: support expression syntax (OR, AND, etc) 16 + getLicenseFromSpdxId = licstr: 17 + if licstr == "UNLICENSED" then 18 + lib.licenses.unfree 19 + else 20 + lib.getLicenseFromSpdxId licstr; 12 21 in rec { 13 22 # Export yarn again to make it easier to find out which yarn was used. 14 23 inherit yarn; ··· 30 39 non-null = builtins.filter (x: x != null) parts; 31 40 in builtins.concatStringsSep "-" non-null; 32 41 33 - # https://docs.npmjs.com/files/package.json#license 34 - # TODO: support expression syntax (OR, AND, etc) 35 - spdxLicense = licstr: 36 - if licstr == "UNLICENSED" then 37 - lib.licenses.unfree 38 - else 39 - lib.findFirst 40 - (l: l ? spdxId && l.spdxId == licstr) 41 - { shortName = licstr; } 42 - (builtins.attrValues lib.licenses); 42 + inherit getLicenseFromSpdxId; 43 43 44 44 # Generates the yarn.nix from the yarn.lock file 45 45 mkYarnNix = { yarnLock, flags ? [] }: ··· 369 369 description = packageJSON.description or ""; 370 370 homepage = packageJSON.homepage or ""; 371 371 version = packageJSON.version or ""; 372 - license = if packageJSON ? license then spdxLicense packageJSON.license else ""; 372 + license = if packageJSON ? license then getLicenseFromSpdxId packageJSON.license else ""; 373 373 } // (attrs.meta or {}); 374 374 }); 375 375 ··· 437 437 438 438 patchShebangs $out 439 439 ''; 440 + } // lib.optionalAttrs allowAliases { 441 + # Aliases 442 + spdxLicense = getLicenseFromSpdxId; # added 2021-12-01 440 443 }
+10 -6
pkgs/misc/emulators/pcsx2/default.nix
··· 6 6 , glib 7 7 , gtk3 8 8 , harfbuzz 9 + , lib 9 10 , libaio 10 11 , libpcap 11 12 , libpng ··· 17 18 , portaudio 18 19 , SDL2 19 20 , soundtouch 20 - , lib, stdenv 21 + , stdenv 21 22 , udev 22 23 , wrapGAppsHook 23 24 , wxGTK 24 25 , zlib 26 + , wayland 25 27 }: 26 28 27 - stdenv.mkDerivation { 29 + stdenv.mkDerivation rec { 28 30 pname = "pcsx2"; 29 - version = "unstable-2021-10-28"; 31 + version = "1.7.2105"; 30 32 31 33 src = fetchFromGitHub { 32 34 owner = "PCSX2"; 33 35 repo = "pcsx2"; 34 36 fetchSubmodules = true; 35 - rev = "52eab493591137d830b45337e04c75ff525a31f9"; 36 - sha256 = "RhAo5Fob8G16jzb9MOAS43vwTkFzf5XupymN0dzeGJU="; 37 + rev = "v${version}"; 38 + hash = "sha256-/A8u7oDIVs0Zmne0ebaXxOeIQbM9pr62KEH6FJR2umk="; 37 39 }; 38 40 39 41 cmakeFlags = [ 40 42 "-DDISABLE_ADVANCE_SIMD=TRUE" 41 43 "-DDISABLE_PCSX2_WRAPPER=TRUE" 42 44 "-DPACKAGE_MODE=TRUE" 45 + "-DWAYLAND_API=TRUE" 43 46 "-DXDG_STD=TRUE" 44 47 ]; 45 48 ··· 62 65 SDL2 63 66 soundtouch 64 67 udev 68 + wayland 65 69 wxGTK 66 70 zlib 67 71 ]; 68 72 69 73 meta = with lib; { 70 74 description = "Playstation 2 emulator"; 71 - longDescription= '' 75 + longDescription = '' 72 76 PCSX2 is an open-source PlayStation 2 (AKA PS2) emulator. Its purpose 73 77 is to emulate the PS2 hardware, using a combination of MIPS CPU 74 78 Interpreters, Recompilers and a Virtual Machine which manages hardware
+2 -2
pkgs/os-specific/linux/iw/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "iw"; 5 - version = "5.9"; 5 + version = "5.16"; 6 6 7 7 src = fetchurl { 8 8 url = "https://www.kernel.org/pub/software/network/${pname}/${pname}-${version}.tar.xz"; 9 - sha256 = "1wp1ky1v353qqy5fnrk67apgzsap53jkr7pmghk3czpbk880ffi9"; 9 + sha256 = "sha256-TETkJ2L5A/kJS6WlmJmMgAqXpir9b9MeweCnmeMIZZw="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ pkg-config ];
+5 -18
pkgs/servers/ftp/pure-ftpd/default.nix
··· 1 - { lib, stdenv, fetchurl, openssl, fetchpatch }: 1 + { lib, stdenv, fetchurl, openssl, pam, fetchpatch }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "pure-ftpd"; 5 - version = "1.0.49"; 5 + version = "1.0.50"; 6 6 7 7 src = fetchurl { 8 8 url = "https://download.pureftpd.org/pub/pure-ftpd/releases/pure-ftpd-${version}.tar.gz"; 9 - sha256 = "19cjr262n6h560fi9nm7l1srwf93k34bp8dp1c6gh90bqxcg8yvn"; 9 + sha256 = "08zas1kg5pnckl28gs7q29952pjfyj8rj59bq96hscqbni7gkqmb"; 10 10 }; 11 11 12 - patches = [ 13 - (fetchpatch { 14 - name = "CVE-2020-9274.patch"; 15 - url = "https://github.com/jedisct1/pure-ftpd/commit/8d0d42542e2cb7a56d645fbe4d0ef436e38bcefa.patch"; 16 - sha256 = "1yd84p6bd4rf21hg3kqpi2a02cac6dz5ag4xx3c2dl5vbzhr5a8k"; 17 - }) 18 - (fetchpatch { 19 - name = "CVE-2020-9365.patch"; 20 - url = "https://github.com/jedisct1/pure-ftpd/commit/bf6fcd4935e95128cf22af5924cdc8fe5c0579da.patch"; 21 - sha256 = "003klx7j82qf92qr1dxg32v5r2bhhywplynd3xil1lbcd3s3mqhi"; 22 - }) 23 - ]; 24 - 25 - buildInputs = [ openssl ]; 12 + buildInputs = [ openssl pam ]; 26 13 27 14 configureFlags = [ "--with-tls" ]; 28 15 ··· 31 18 homepage = "https://www.pureftpd.org"; 32 19 license = licenses.isc; # with some parts covered by BSD3(?) 33 20 maintainers = [ ]; 34 - platforms = platforms.linux; 21 + platforms = platforms.unix; 35 22 }; 36 23 }
+3 -1
pkgs/servers/maddy/default.nix
··· 1 - { lib, buildGoModule, fetchFromGitHub, coreutils, installShellFiles, scdoc }: 1 + { lib, buildGoModule, fetchFromGitHub, coreutils, installShellFiles, scdoc, nixosTests }: 2 2 3 3 buildGoModule rec { 4 4 pname = "maddy"; ··· 36 36 --replace "/usr/local/bin/maddy" "$out/bin/maddy" \ 37 37 --replace "/bin/kill" "${coreutils}/bin/kill" 38 38 ''; 39 + 40 + passthru.tests.nixos = nixosTests.maddy; 39 41 40 42 meta = with lib; { 41 43 description = "Composable all-in-one mail server";
+2 -2
pkgs/servers/mail/dovecot/default.nix
··· 11 11 12 12 stdenv.mkDerivation rec { 13 13 pname = "dovecot"; 14 - version = "2.3.17"; 14 + version = "2.3.17.1"; 15 15 16 16 nativeBuildInputs = [ perl pkg-config ]; 17 17 buildInputs = ··· 24 24 25 25 src = fetchurl { 26 26 url = "https://dovecot.org/releases/${lib.versions.majorMinor version}/${pname}-${version}.tar.gz"; 27 - sha256 = "1y9dpn4jgzrfjibp5zrc11bdk0q843d998kxhpxkyfm2fz6i4i12"; 27 + sha256 = "1f525bvpjvi4rnwqjsqaqrbdii08sqmc1v8xq03m19w1vk6cqrqw"; 28 28 }; 29 29 30 30 enableParallelBuilding = true;
+2 -2
pkgs/servers/mail/dovecot/plugins/pigeonhole/default.nix
··· 3 3 dovecotMajorMinor = lib.versions.majorMinor dovecot.version; 4 4 in stdenv.mkDerivation rec { 5 5 pname = "dovecot-pigeonhole"; 6 - version = "0.5.17"; 6 + version = "0.5.17.1"; 7 7 8 8 src = fetchurl { 9 9 url = "https://pigeonhole.dovecot.org/releases/${dovecotMajorMinor}/dovecot-${dovecotMajorMinor}-pigeonhole-${version}.tar.gz"; 10 - sha256 = "0j6ng173hh5iiqxdkxfb5v9djpn39gxdrv5ki7i22cf5cqwq47h3"; 10 + sha256 = "04j5z3y8yyci4ni9j9i7cy0zg1qj2sm9zfarmjcvs9vydpga7i1w"; 11 11 }; 12 12 13 13 buildInputs = [ dovecot openssl ];
+3 -3
pkgs/servers/minio/default.nix
··· 15 15 in 16 16 buildGoModule rec { 17 17 pname = "minio"; 18 - version = "2021-10-27T16-29-42Z"; 18 + version = "2021-11-24T23-19-33Z"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "minio"; 22 22 repo = "minio"; 23 23 rev = "RELEASE.${version}"; 24 - sha256 = "sha256-U/1NuWyNX0OUrtysV3ShvbyxiSiYzMFNK3lmAVs6D3Y="; 24 + sha256 = "sha256-cYoeCjkCLnlp5BVp3BOj7okA1yX+rDp0Rbwcn+ji+Ak="; 25 25 }; 26 26 27 - vendorSha256 = "sha256-GLooogUglKxEk7X9UI4VZvj+mJ9LXLZEjFsxCpzm61I="; 27 + vendorSha256 = "sha256-DdsLQ87tvh8gbiLh6uLCXiGmnkcE+LcLwvdgDJxXbc8="; 28 28 29 29 doCheck = false; 30 30
+3 -3
pkgs/servers/monitoring/grafana/default.nix
··· 2 2 3 3 buildGo117Module rec { 4 4 pname = "grafana"; 5 - version = "8.3.0"; 5 + version = "8.3.1"; 6 6 7 7 excludedPackages = "\\(alert_webhook_listener\\|clean-swagger\\|release_publisher\\|slow_proxy\\|slow_proxy_mac\\|macaron\\)"; 8 8 ··· 10 10 rev = "v${version}"; 11 11 owner = "grafana"; 12 12 repo = "grafana"; 13 - sha256 = "sha256-I+jfWHkTm11qIm6CdDFOFHs/qR9pswbjAdfejkxZnrQ="; 13 + sha256 = "sha256-KnTk14//uC8T6gqU6IvSQ28fL/h0THVAA6smTspZiVs="; 14 14 }; 15 15 16 16 srcStatic = fetchurl { 17 17 url = "https://dl.grafana.com/oss/release/grafana-${version}.linux-amd64.tar.gz"; 18 - sha256 = "sha256-o8uw9VRuK93IbZgcZmFmZ2zbgKdryGbeaPAlQr8wJXw="; 18 + sha256 = "sha256-CX2F6yymmCvs6o7MtyhVrBGr9D6JSvakbWS7x3kiM5s="; 19 19 }; 20 20 21 21 vendorSha256 = "sha256-aS9yz0JODZtichaIkiBJLiMjbjGY93eSYwuactbRqOY=";
+3 -3
pkgs/servers/plex/raw.nix
··· 12 12 # server, and the FHS userenv and corresponding NixOS module should 13 13 # automatically pick up the changes. 14 14 stdenv.mkDerivation rec { 15 - version = "1.24.5.5173-8dcc73a59"; 15 + version = "1.25.0.5282-2edd3c44d"; 16 16 pname = "plexmediaserver"; 17 17 18 18 # Fetch the source 19 19 src = if stdenv.hostPlatform.system == "aarch64-linux" then fetchurl { 20 20 url = "https://downloads.plex.tv/plex-media-server-new/${version}/debian/plexmediaserver_${version}_arm64.deb"; 21 - sha256 = "0yjnqvy2maym7dmfabj0zjd1gwjnnjwqxzk7j24a1vhwyy0dmjcf"; 21 + sha256 = "0yjy6gdgrimd82qk7n36rqa9lc8giff4p96zzxpb0lblq5b3dxzb"; 22 22 } else fetchurl { 23 23 url = "https://downloads.plex.tv/plex-media-server-new/${version}/debian/plexmediaserver_${version}_amd64.deb"; 24 - sha256 = "1k2plcqlklch2k8akj8m411i3cm0jvzj02f5x43yhjgjpmwww95z"; 24 + sha256 = "1jlq76h3wiaf1d91x0l6cxv44k7l47xdy86qkqvxvwnsv1kc0r86"; 25 25 }; 26 26 27 27 outputs = [ "out" "basedb" ];
+33
pkgs/servers/soft-serve/default.nix
··· 1 + { lib, buildGoModule, fetchFromGitHub, makeWrapper, git }: 2 + 3 + buildGoModule rec { 4 + pname = "soft-serve"; 5 + version = "0.1.0"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "charmbracelet"; 9 + repo = "soft-serve"; 10 + rev = "v${version}"; 11 + sha256 = "0z88699q34a9cbhcz12y2qs2qrspfd8yx4ay0r8jzvkgax9ylrlk"; 12 + }; 13 + 14 + vendorSha256 = "1g2iznfh08l23i81x7g2bhc7l8cppshzlyynxik4jshswlpv80sr"; 15 + 16 + doCheck = false; 17 + 18 + ldflags = [ "-s" "-w" "-X=main.Version=${version}" ]; 19 + 20 + nativeBuildInputs = [ makeWrapper ]; 21 + 22 + postInstall = '' 23 + wrapProgram $out/bin/soft \ 24 + --prefix PATH : "${lib.makeBinPath [ git ]}" 25 + ''; 26 + 27 + meta = with lib; { 28 + description = "A tasty, self-hosted Git server for the command line"; 29 + homepage = "https://github.com/charmbracelet/soft-serve"; 30 + license = licenses.mit; 31 + maintainers = with maintainers; [ penguwin ]; 32 + }; 33 + }
+1
pkgs/servers/tmate-ssh-server/default.nix
··· 23 23 license = licenses.mit; 24 24 platforms = platforms.unix; 25 25 maintainers = with maintainers; [ ]; 26 + knownVulnerabilities = [ "CVE-2021-44513" "CVE-2021-44512" ]; 26 27 }; 27 28 } 28 29
+2 -2
pkgs/tools/admin/fits-cloudctl/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "fits-cloudctl"; 8 - version = "0.10.3"; 8 + version = "0.10.4"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "fi-ts"; 12 12 repo = "cloudctl"; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-FbKULHBzx4HcOFhIRdy7DiewOQzBdac3B+N34M/Kbzk="; 14 + sha256 = "sha256-D5LICE7CAwCqvaHIYfRWC8Te4W0tGhKAETmus2qa0UM="; 15 15 }; 16 16 17 17 vendorSha256 = "sha256-ImKN3rNotgUkQaKzoetAEG6Q/zlfH8FTK4HTIO0xn4s=";
+3 -3
pkgs/tools/backup/kopia/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "kopia"; 5 - version = "0.9.6"; 5 + version = "0.9.7"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = pname; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-lfzlYpkAGGY7fs9PYPSg2XYgW92WV1/zh2oRz4Qw7vs="; 11 + sha256 = "sha256-nHMsh+2Wpca2SJSy1XRMWwHHcdjpnb1u9JS6wM4E65Y="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-xa6B3gGgJc7E8VCfpRXlE8Jw3ylNnfynK+QEiqy2yF4="; 14 + vendorSha256 = "sha256-SJKsTZMppu6eit4ssMSwJOkeaheEYUwWRDPyPjirNHM="; 15 15 16 16 doCheck = false; 17 17
+3 -3
pkgs/tools/filesystems/lfs/default.nix
··· 5 5 6 6 rustPlatform.buildRustPackage rec { 7 7 pname = "lfs"; 8 - version = "1.2.1"; 8 + version = "1.3.0"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "Canop"; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-Cf9W0LnlvMm0XZe6lvx8hQejcwyfxBC6VKltAAfRD5I="; 14 + sha256 = "sha256-nRJ73j3l3xaFImhrHEGmfqESEEjVKhIwdNZNc/RqOcU="; 15 15 }; 16 16 17 - cargoSha256 = "sha256-skP9VJuRMCyA06YjGbyNIt/DljP3fQQOIQDy6k10zGI="; 17 + cargoSha256 = "sha256-iAz2s92hWkLCXoQ09mKCyI0yHvH55WaTSl+a5gz44bU="; 18 18 19 19 meta = with lib; { 20 20 description = "Get information on your mounted disks";
+1
pkgs/tools/misc/atuin/default.nix
··· 27 27 homepage = "https://github.com/ellie/atuin"; 28 28 license = licenses.mit; 29 29 maintainers = [ maintainers.onsails ]; 30 + broken = stdenv.isDarwin && stdenv.isAarch64; 30 31 }; 31 32 }
+2 -2
pkgs/tools/misc/bash_unit/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "bash_unit"; 7 - version = "1.7.2"; 7 + version = "1.8.0"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "pgrange"; 11 11 repo = pname; 12 12 rev = "v${version}"; 13 - sha256 = "sha256-+hEgag5H7PaBwZSBp3D17q3TZRO2SVBe5M1Ep/jeg1w="; 13 + sha256 = "sha256-QWZnzliiqUfg6kXq1VGTNczupxNCgz1gFURrB/K2b4A="; 14 14 }; 15 15 16 16 installPhase = ''
+10 -2
pkgs/tools/misc/cloc/default.nix
··· 8 8 owner = "AlDanial"; 9 9 repo = "cloc"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-tFARxNGXzWw+EN2qwBOhJEj7zwYfC9tVP0sAHqeGwcM="; 11 + sha256 = if stdenv.isDarwin then 12 + "1hy1hskiw02b7xaxn2qz0v7znj14l49w1anx20z6rkcps7212l5l" 13 + else 14 + "sha256-tFARxNGXzWw+EN2qwBOhJEj7zwYfC9tVP0sAHqeGwcM="; 12 15 }; 13 16 14 17 setSourceRoot = '' ··· 16 19 ''; 17 20 18 21 nativeBuildInputs = [ makeWrapper ]; 19 - buildInputs = (with perlPackages; [ perl AlgorithmDiff ParallelForkManager RegexpCommon ]); 22 + buildInputs = with perlPackages; [ 23 + perl 24 + AlgorithmDiff 25 + ParallelForkManager 26 + RegexpCommon 27 + ]; 20 28 21 29 makeFlags = [ "prefix=" "DESTDIR=$(out)" "INSTALL=install" ]; 22 30
+23
pkgs/tools/misc/datefmt/default.nix
··· 1 + { lib, stdenv, fetchurl, datefmt, testVersion }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "datefmt"; 5 + version = "0.2.1"; 6 + 7 + src = fetchurl { 8 + url = "http://cdn.jb55.com/tarballs/datefmt/datefmt-${version}.tar.gz"; 9 + sha256 = "5d5e765380afe39eb39d48f752aed748b57dfd843a4947b2a6d18ab9b5e68092"; 10 + }; 11 + 12 + makeFlags = [ "PREFIX=$(out)" ]; 13 + 14 + passthru.tests.version = testVersion { package = datefmt; }; 15 + 16 + meta = with lib; { 17 + homepage = "https://jb55.com/datefmt"; 18 + description = "A tool that formats timestamps in text streams"; 19 + platforms = platforms.all; 20 + license = licenses.gpl3Plus; 21 + maintainers = with maintainers; [ jb55 ]; 22 + }; 23 + }
+3 -3
pkgs/tools/misc/macchina/default.nix
··· 3 3 4 4 rustPlatform.buildRustPackage rec { 5 5 pname = "macchina"; 6 - version = "5.0.2"; 6 + version = "5.0.5"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "Macchina-CLI"; 10 10 repo = pname; 11 11 rev = "v${version}"; 12 - sha256 = "sha256-9T1baNmgzB3RBlFaaIQ47Yc9gJAgtS42NNEY1Tk/hBs="; 12 + sha256 = "sha256-si+5LvRUIWp48vsD1WxGWl2O/2bpaBX+ArkZPbBqtME="; 13 13 }; 14 14 15 - cargoSha256 = "sha256-A5C/B9R58p/DR6cONIRTSkmtXEOobtYHGBHxjdwagRA="; 15 + cargoSha256 = "sha256-CN7PxPUkfyDGxVaf879Sp6w0UbqwL/is15xcfH2fm1w="; 16 16 17 17 nativeBuildInputs = [ installShellFiles ]; 18 18 buildInputs = lib.optionals stdenv.isDarwin [ libiconv Foundation ];
+3 -3
pkgs/tools/misc/mcfly/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "mcfly"; 5 - version = "0.5.9"; 5 + version = "0.5.10"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "cantino"; 9 9 repo = "mcfly"; 10 10 rev = "v${version}"; 11 - sha256 = "0i3qjgq1b8h3bzc7rxa60kq1yc2im9m6dgzrvial086a1zk8s81r"; 11 + sha256 = "sha256-auIerSfEKBK47mIhfmjREJohnhCmtzruobRXaoz5fqA="; 12 12 }; 13 13 14 14 postPatch = '' ··· 17 17 substituteInPlace mcfly.fish --replace '(which mcfly)' '${placeholder "out"}/bin/mcfly' 18 18 ''; 19 19 20 - cargoSha256 = "084v4fsdi25ahz068ssq29z7d5d3k3jh3s8b07irwybdsy18c629"; 20 + cargoSha256 = "sha256-f9kpD295syRCntwvyjZ9AeAUV61RMbfRRMgNxKAJL8g="; 21 21 22 22 meta = with lib; { 23 23 homepage = "https://github.com/cantino/mcfly";
+2 -2
pkgs/tools/misc/remind/default.nix
··· 16 16 in 17 17 tcl.mkTclDerivation rec { 18 18 pname = "remind"; 19 - version = "03.03.09"; 19 + version = "03.03.10"; 20 20 21 21 src = fetchurl { 22 22 url = "https://dianne.skoll.ca/projects/remind/download/remind-${version}.tar.gz"; 23 - sha256 = "sha256-yQh6jGkRNkQvPoguRmd6025pCEsvO7w8W3YNO2vztvM="; 23 + sha256 = "sha256-BqFt3f4+hfz4njzOI1mkrUJhR7zOqzT/TNWS+sk2XEc="; 24 24 }; 25 25 26 26 propagatedBuildInputs = tclLibraries;
+3 -3
pkgs/tools/networking/minio-client/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "minio-client"; 5 - version = "2021-10-07T04-19-58Z"; 5 + version = "2021-11-16T20-37-36Z"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "minio"; 9 9 repo = "mc"; 10 10 rev = "RELEASE.${version}"; 11 - sha256 = "sha256-FF4blsNzr2M/ZZ2epTBhFkoj6s9Iw5GGXY65mKftojk="; 11 + sha256 = "sha256-nNsvHVsVyJNm5ZUU58cymeJCO7uhvVKGpgxaQWCEYvI="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-GFxB5Gxnc6m91EjF2z108J1WmggCQrUhxwEA+Sih+94="; 14 + vendorSha256 = "sha256-DBRqWgqBv2x/KRATrQ2olDhhWwlSgzckWkRIqmW5+js="; 15 15 16 16 subPackages = [ "." ]; 17 17
+3 -3
pkgs/tools/networking/tendermint/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "tendermint"; 5 - version = "0.34.14"; 5 + version = "0.35.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "tendermint"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-/FYkwHamJTty/h80KaNAmyNg0wCqiOAA3o2whouAOZc="; 11 + sha256 = "sha256-fSDmwZNKAHXcMtNZlqJmUFkuFdZLkDbnn+ZrNtnszgU="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-9wjiL8/fhWLuGglFkS8OH026zwbrmuadB3goBqFqnvc="; 14 + vendorSha256 = "sha256-DktuZ0NUyg8LbYklxde2ZZJ8/WOyBq50E9yEHtS+Hqw="; 15 15 16 16 subPackages = [ "cmd/tendermint" ]; 17 17
+4 -1
pkgs/tools/nix/statix/default.nix
··· 1 - { lib, rustPlatform, fetchFromGitHub, withJson ? true }: 1 + { lib, rustPlatform, fetchFromGitHub, withJson ? true, stdenv }: 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "statix"; ··· 16 16 cargoSha256 = "sha256-15C/ye8nYLtriBlqbf1ul41IFtShGY2LTX10z1/08Po="; 17 17 18 18 buildFeatures = lib.optional withJson "json"; 19 + 20 + # tests are failing on darwin 21 + doCheck = !stdenv.isDarwin; 19 22 20 23 meta = with lib; { 21 24 description = "Lints and suggestions for the nix programming language";
+2 -2
pkgs/tools/security/exploitdb/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "exploitdb"; 5 - version = "2021-12-04"; 5 + version = "2021-12-07"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "offensive-security"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "sha256-3MP6lmh/eQ1cIxiCw0Y2TtCXXQTUij5Q8FDFVWOG/IM="; 11 + sha256 = "sha256-6rc3c4i1X6b6CgsJPUx/pMT6sE6jc/Sy8Ffw5mVVgEU="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/tools/security/libtpms/default.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "libtpms"; 10 - version = "0.9.0"; 10 + version = "0.9.1"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "stefanberger"; 14 14 repo = "libtpms"; 15 15 rev = "v${version}"; 16 - sha256 = "sha256-9u5Yq9PXMADvyWZo5aFa0GNzqVsbyN25o/cYQdbrUO0="; 16 + sha256 = "sha256-30P/YggrPEVpsh2qo751aW6RtrpIVe1XQWyYZm8P4yA="; 17 17 }; 18 18 19 19 nativeBuildInputs = [
+3 -3
pkgs/tools/security/step-ca/default.nix
··· 12 12 13 13 buildGoModule rec { 14 14 pname = "step-ca"; 15 - version = "0.17.6"; 15 + version = "0.18.0"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "smallstep"; 19 19 repo = "certificates"; 20 20 rev = "v${version}"; 21 - sha256 = "sha256-hZdsxSEfb+DwnVOnnp9cT6diQWkFVPSa/T8YDsGlg3k="; 21 + sha256 = "sha256-f9sp5sAWysOOoIdCiCJxTWRhyt0wfpO5p4pxW6jj0xc="; 22 22 }; 23 23 24 - vendorSha256 = "sha256-OcnqMEotc18rX6BYs3oj8+83MRf7iJJNwjjXUQ5xfp4="; 24 + vendorSha256 = "sha256-iDfPCRU91cuZsKqNOjkLGYmWf8i5FO4NmDsfD5Xqip0="; 25 25 26 26 ldflags = [ "-buildid=" ]; 27 27
+1 -1
pkgs/tools/system/bpytop/default.nix
··· 47 47 platforms = with platforms; linux ++ freebsd ++ darwin; 48 48 49 49 # https://github.com/NixOS/nixpkgs/pull/94625#issuecomment-668509399 50 - broken = stdenv.isDarwin; 50 + broken = stdenv.isDarwin && stdenv.isx86_64; 51 51 }; 52 52 }
+2 -2
pkgs/tools/system/htop/default.nix
··· 11 11 12 12 stdenv.mkDerivation rec { 13 13 pname = "htop"; 14 - version = "3.1.1"; 14 + version = "3.1.2"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "htop-dev"; 18 18 repo = pname; 19 19 rev = version; 20 - sha256 = "JnpuBa09U086wWp0OtsDnStF4aLjhvtEj371u5XFtqc="; 20 + sha256 = "sha256-RKYS8UYZTVKMR/3DG31eqkG4knPRl8WXsZU/XGmGmAg="; 21 21 }; 22 22 23 23 nativeBuildInputs = [ autoreconfHook ];
+3 -3
pkgs/tools/text/mdcat/default.nix
··· 12 12 13 13 rustPlatform.buildRustPackage rec { 14 14 pname = "mdcat"; 15 - version = "0.24.1"; 15 + version = "0.24.2"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "lunaryorn"; 19 19 repo = pname; 20 20 rev = "mdcat-${version}"; 21 - sha256 = "sha256-fAbiPzyPaHy0KQb/twCovjgqIRzib7JZslb9FdVlQEg="; 21 + sha256 = "sha256-9XVKLe1Kyq5SpJFpXg/GD/V+uiieljk7UoDzJ1MZBlA="; 22 22 }; 23 23 24 24 nativeBuildInputs = [ pkg-config asciidoctor installShellFiles ]; 25 25 buildInputs = [ openssl ] 26 26 ++ lib.optional stdenv.isDarwin Security; 27 27 28 - cargoSha256 = "sha256-UgCFlzihBvZywDNir/92lub9R6yYPJSK8S4mlMk2sMk="; 28 + cargoSha256 = "sha256-cgX/jPmOU3o5gAwbneGeQLU2hIrGdrAvOaA/TOXSZgg="; 29 29 30 30 checkInputs = [ ansi2html ]; 31 31 # Skip tests that use the network and that include files.
+2 -2
pkgs/tools/text/miller/default.nix
··· 3 3 stdenv.mkDerivation rec { 4 4 pname = "miller"; 5 5 6 - version = "5.10.2"; 6 + version = "5.10.3"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "johnkerl"; 10 10 repo = "miller"; 11 11 rev = "v${version}"; 12 - sha256 = "sha256-NI57U3FpUfQ6ouBEYrzzG+9kpL58BD4HoAuRAFJMO9k="; 12 + sha256 = "sha256-Mag7bIfZNdp+sM54yKp8HdH3kWjwWRfyPBGthej2jd8="; 13 13 }; 14 14 15 15 nativeBuildInputs = [ autoreconfHook flex libtool ];
+28 -18
pkgs/top-level/all-packages.nix
··· 2366 2366 ''; 2367 2367 }; 2368 2368 2369 - stack2nix = with haskell.lib; overrideCabal (justStaticExecutables haskellPackages.stack2nix) (drv: { 2369 + stack2nix = with haskell.lib; overrideCabal (justStaticExecutables haskellPackages.stack2nix) (_: { 2370 2370 executableToolDepends = [ makeWrapper ]; 2371 2371 postInstall = '' 2372 2372 wrapProgram $out/bin/stack2nix \ ··· 2680 2680 datasette = with python3Packages; toPythonApplication datasette; 2681 2681 2682 2682 howard-hinnant-date = callPackage ../development/libraries/howard-hinnant-date { }; 2683 + 2684 + datefmt = callPackage ../tools/misc/datefmt { }; 2683 2685 2684 2686 datefudge = callPackage ../tools/system/datefudge { }; 2685 2687 ··· 4206 4208 4207 4209 mozc = callPackage ../tools/inputmethods/ibus-engines/ibus-mozc { 4208 4210 stdenv = clangStdenv; 4209 - protobuf = pkgs.protobuf3_8.overrideDerivation (oldAttrs: { stdenv = clangStdenv; }); 4211 + protobuf = pkgs.protobuf3_8.overrideDerivation (_: { stdenv = clangStdenv; }); 4210 4212 }; 4211 4213 4212 4214 rime = callPackage ../tools/inputmethods/ibus-engines/ibus-rime { }; ··· 5142 5144 mozc = callPackage ../tools/inputmethods/fcitx-engines/fcitx-mozc { 5143 5145 python = python2; 5144 5146 inherit (python2Packages) gyp; 5145 - protobuf = pkgs.protobuf3_8.overrideDerivation (oldAttrs: { stdenv = clangStdenv; }); 5147 + protobuf = pkgs.protobuf3_8.overrideDerivation (_: { stdenv = clangStdenv; }); 5146 5148 }; 5147 5149 5148 5150 table-extra = callPackage ../tools/inputmethods/fcitx-engines/fcitx-table-extra { }; ··· 6066 6068 6067 6069 grub2_full = callPackage ../tools/misc/grub/2.0x.nix { 6068 6070 # update breaks grub2 6069 - gnulib = pkgs.gnulib.overrideAttrs (oldAttrs: rec { 6071 + gnulib = pkgs.gnulib.overrideAttrs (_: rec { 6070 6072 version = "20200223"; 6071 6073 src = fetchgit { 6072 6074 url = "https://git.savannah.gnu.org/r/gnulib.git"; ··· 6466 6468 6467 6469 jupyter = python3.withPackages (ps: [ ps.jupyter ps.notebook ]); 6468 6470 6469 - packages = config.ihaskell.packages or (self: []); 6471 + packages = config.ihaskell.packages or (_: []); 6470 6472 }; 6471 6473 6472 6474 ijq = callPackage ../development/tools/ijq { }; ··· 10897 10899 10898 10900 wget2 = callPackage ../tools/networking/wget2 { 10899 10901 # update breaks grub2 10900 - gnulib = pkgs.gnulib.overrideAttrs (oldAttrs: rec { 10902 + gnulib = pkgs.gnulib.overrideAttrs (_: rec { 10901 10903 version = "20210208"; 10902 10904 src = fetchgit { 10903 10905 url = "https://git.savannah.gnu.org/r/gnulib.git"; ··· 14891 14893 lttv = callPackage ../development/tools/misc/lttv { }; 14892 14894 14893 14895 luaformatter = callPackage ../development/tools/luaformatter 14894 - (lib.optionalAttrs stdenv.isDarwin { 14896 + (lib.optionalAttrs (stdenv.cc.isClang && lib.versionOlder stdenv.cc.version "9") { 14895 14897 stdenv = overrideCC stdenv llvmPackages_9.clang; 14896 14898 }); 14897 14899 ··· 16426 16428 inherit (darwin.apple_sdk.frameworks) Security; 16427 16429 }; 16428 16430 16429 - libgit2_0_27 = libgit2.overrideAttrs (oldAttrs: rec { 16431 + libgit2_0_27 = libgit2.overrideAttrs (_: rec { 16430 16432 version = "0.27.10"; 16431 16433 src = fetchFromGitHub { 16432 16434 owner = "libgit2"; ··· 16440 16442 ]; 16441 16443 }); 16442 16444 16443 - libgit2_1_1 = libgit2.overrideAttrs (oldAttrs: rec { 16445 + libgit2_1_1 = libgit2.overrideAttrs (_: rec { 16444 16446 version = "1.1.1"; 16445 16447 src = fetchFromGitHub { 16446 16448 owner = "libgit2"; ··· 19143 19145 inherit (darwin.apple_sdk.frameworks) AudioToolbox AudioUnit CoreAudio CoreServices Carbon; 19144 19146 }; 19145 19147 19146 - portaudio2014 = portaudio.overrideAttrs (oldAttrs: { 19148 + portaudio2014 = portaudio.overrideAttrs (_: { 19147 19149 src = fetchurl { 19148 19150 url = "http://www.portaudio.com/archives/pa_stable_v19_20140130.tgz"; 19149 19151 sha256 = "0mwddk4qzybaf85wqfhxqlf0c5im9il8z03rd4n127k8y2jj9q4g"; ··· 19443 19445 19444 19446 rocksdb_lite = rocksdb.override { enableLite = true; }; 19445 19447 19446 - rocksdb_6_23 = rocksdb.overrideAttrs (old: rec { 19448 + rocksdb_6_23 = rocksdb.overrideAttrs (_: rec { 19447 19449 pname = "rocksdb"; 19448 19450 version = "6.23.3"; 19449 19451 src = fetchFromGitHub { ··· 20528 20530 20529 20531 sqitchMysql = (callPackage ../development/tools/misc/sqitch { 20530 20532 mysqlSupport = true; 20531 - }).overrideAttrs (oldAttrs: { pname = "sqitch-mysql"; }); 20533 + }).overrideAttrs (_: { pname = "sqitch-mysql"; }); 20532 20534 20533 20535 sqitchPg = (callPackage ../development/tools/misc/sqitch { 20534 20536 postgresqlSupport = true; 20535 - }).overrideAttrs (oldAttrs: { pname = "sqitch-pg"; }); 20537 + }).overrideAttrs (_: { pname = "sqitch-pg"; }); 20536 20538 20537 20539 ### DEVELOPMENT / R MODULES 20538 20540 ··· 20566 20568 }; 20567 20569 20568 20570 rPackages = dontRecurseIntoAttrs (callPackage ../development/r-modules { 20569 - overrides = (config.rPackageOverrides or (p: {})) pkgs; 20571 + overrides = (config.rPackageOverrides or (_: {})) pkgs; 20570 20572 }); 20571 20573 20572 20574 ### SERVERS ··· 21133 21135 pshs = callPackage ../servers/http/pshs { }; 21134 21136 21135 21137 quark = callPackage ../servers/http/quark { }; 21138 + 21139 + soft-serve = callPackage ../servers/soft-serve { }; 21136 21140 21137 21141 sympa = callPackage ../servers/mail/sympa { }; 21138 21142 ··· 22306 22310 lockdep = callPackage ../os-specific/linux/lockdep { }; 22307 22311 22308 22312 lsiutil = callPackage ../os-specific/linux/lsiutil { }; 22313 + 22314 + kaitai-struct-compiler = callPackage ../development/compilers/kaitai-struct-compiler { }; 22309 22315 22310 22316 kmod = callPackage ../os-specific/linux/kmod { }; 22311 22317 ··· 24942 24948 24943 24949 exrtools = callPackage ../applications/graphics/exrtools { }; 24944 24950 24951 + f1viewer = callPackage ../applications/video/f1viewer {}; 24952 + 24945 24953 fasttext = callPackage ../applications/science/machine-learning/fasttext { }; 24946 24954 24947 24955 fbmenugen = callPackage ../applications/misc/fbmenugen { }; ··· 25888 25896 pmbootstrap = python3Packages.callPackage ../tools/misc/pmbootstrap { }; 25889 25897 25890 25898 shepherd = nodePackages."@nerdwallet/shepherd"; 25899 + 25900 + skate = callPackage ../applications/misc/skate { }; 25891 25901 25892 25902 slack = callPackage ../applications/networking/instant-messengers/slack { }; 25893 25903 ··· 28903 28913 darwin = true; 28904 28914 }; 28905 28915 }; 28906 - }).overrideAttrs (oldAttrs: rec { 28916 + }).overrideAttrs (_: rec { 28907 28917 pname = "vim-darwin"; 28908 28918 meta = { 28909 28919 platforms = lib.platforms.darwin; ··· 29456 29466 29457 29467 xmonad-with-packages = callPackage ../applications/window-managers/xmonad/wrapper.nix { 29458 29468 inherit (haskellPackages) ghcWithPackages; 29459 - packages = self: [ haskellPackages.xmonad-contrib ]; 29469 + packages = _: [ haskellPackages.xmonad-contrib ]; 29460 29470 }; 29461 29471 29462 29472 xmonad_log_applet = callPackage ../applications/window-managers/xmonad/log-applet { ··· 31636 31646 }; 31637 31647 31638 31648 cvc3 = callPackage ../applications/science/logic/cvc3 { 31639 - gmp = lib.overrideDerivation gmp (a: { dontDisableStatic = true; }); 31649 + gmp = lib.overrideDerivation gmp (_: { dontDisableStatic = true; }); 31640 31650 stdenv = gccStdenv; 31641 31651 }; 31642 31652 cvc4 = callPackage ../applications/science/logic/cvc4 { ··· 31680 31690 ifstat-legacy = callPackage ../tools/networking/ifstat-legacy { }; 31681 31691 31682 31692 isabelle = callPackage ../applications/science/logic/isabelle { 31683 - polyml = lib.overrideDerivation polyml (attrs: { 31693 + polyml = lib.overrideDerivation polyml (_: { 31684 31694 configureFlags = [ "--enable-intinf-as-int" "--with-gmp" "--disable-shared" ]; 31685 31695 }); 31686 31696