Merge master into staging-next

authored by github-actions[bot] and committed by GitHub 25043f0f 42840113

+681 -161
+1 -1
nixos/modules/hardware/xpadneo.nix
··· 16 16 extraModprobeConfig = 17 17 mkIf 18 18 (config.hardware.bluetooth.enable && 19 - (lib.versionOlder config.boot.kernelPackages.kernel.version "5.12")) 19 + (lib.versionOlder config.boot.kernelPackages.kernel.version "5.12")) 20 20 "options bluetooth disable_ertm=1"; 21 21 22 22 extraModulePackages = with config.boot.kernelPackages; [ xpadneo ];
+1
nixos/modules/installer/cd-dvd/channel.nix
··· 31 31 in 32 32 33 33 { 34 + nix.registry.nixpkgs.flake.outPath = builtins.path { name = "source"; path = pkgs.path; }; 34 35 # Provide the NixOS/Nixpkgs sources in /etc/nixos. This is required 35 36 # for nixos-install. 36 37 boot.postBootCommands = mkAfter
+1 -1
nixos/modules/programs/rust-motd.nix
··· 69 69 ProtectKernelTunables = true; 70 70 ProtectSystem = "full"; 71 71 StateDirectory = "rust-motd"; 72 - RestrictAddressFamilies = "none"; 72 + RestrictAddressFamilies = [ "AF_UNIX" ]; 73 73 RestrictNamespaces = true; 74 74 RestrictRealtime = true; 75 75 RestrictSUIDSGID = true;
+3 -1
nixos/modules/services/mail/nullmailer.nix
··· 212 212 213 213 systemd.tmpfiles.rules = [ 214 214 "d /var/spool/nullmailer - ${cfg.user} - - -" 215 + "d /var/spool/nullmailer/failed 750 ${cfg.user} - - -" 216 + "d /var/spool/nullmailer/queue 750 ${cfg.user} - - -" 217 + "d /var/spool/nullmailer/tmp 750 ${cfg.user} - - -" 215 218 ]; 216 219 217 220 systemd.services.nullmailer = { ··· 220 223 after = [ "network.target" ]; 221 224 222 225 preStart = '' 223 - mkdir -p /var/spool/nullmailer/{queue,tmp,failed} 224 226 rm -f /var/spool/nullmailer/trigger && mkfifo -m 660 /var/spool/nullmailer/trigger 225 227 ''; 226 228
+14 -2
nixos/modules/services/networking/wireguard.nix
··· 465 465 networking.wireguard = { 466 466 467 467 enable = mkOption { 468 - description = lib.mdDoc "Whether to enable WireGuard."; 468 + description = lib.mdDoc '' 469 + Whether to enable WireGuard. 470 + 471 + Please note that {option}`systemd.network.netdevs` has more features 472 + and is better maintained. When building new things, it is advised to 473 + use that instead. 474 + ''; 469 475 type = types.bool; 470 476 # 2019-05-25: Backwards compatibility. 471 477 default = cfg.interfaces != {}; ··· 474 480 }; 475 481 476 482 interfaces = mkOption { 477 - description = lib.mdDoc "WireGuard interfaces."; 483 + description = lib.mdDoc '' 484 + WireGuard interfaces. 485 + 486 + Please note that {option}`systemd.network.netdevs` has more features 487 + and is better maintained. When building new things, it is advised to 488 + use that instead. 489 + ''; 478 490 default = {}; 479 491 example = { 480 492 wg0 = {
+2 -2
nixos/modules/services/web-apps/code-server.nix
··· 63 63 hashedPassword = mkOption { 64 64 default = ""; 65 65 description = 66 - lib.mdDoc "Create the password with: 'echo -n 'thisismypassword' | npx argon2-cli -e'."; 66 + lib.mdDoc "Create the password with: `echo -n 'thisismypassword' | npx argon2-cli -e`."; 67 67 type = types.str; 68 68 }; 69 69 ··· 109 109 HASHED_PASSWORD = cfg.hashedPassword; 110 110 } // cfg.extraEnvironment; 111 111 serviceConfig = { 112 - ExecStart = "${cfg.package}/bin/code-server --bind-addr ${cfg.host}:${toString cfg.port} --auth ${cfg.auth} " + builtins.concatStringsSep " " cfg.extraArguments; 112 + ExecStart = "${cfg.package}/bin/code-server --bind-addr ${cfg.host}:${toString cfg.port} --auth ${cfg.auth} " + lib.escapeShellArgs cfg.extraArguments; 113 113 ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID"; 114 114 RuntimeDirectory = cfg.user; 115 115 User = cfg.user;
+4
nixos/modules/tasks/network-interfaces.nix
··· 604 604 The configuration for each network interface. If 605 605 {option}`networking.useDHCP` is true, then every 606 606 interface not listed here will be configured using DHCP. 607 + 608 + Please note that {option}`systemd.network.netdevs` has more features 609 + and is better maintained. When building new things, it is advised to 610 + use that instead. 607 611 ''; 608 612 type = with types; attrsOf (submodule interfaceOpts); 609 613 };
+1
nixos/tests/all-tests.nix
··· 678 678 xfce = handleTest ./xfce.nix {}; 679 679 xmonad = handleTest ./xmonad.nix {}; 680 680 xmonad-xdg-autostart = handleTest ./xmonad-xdg-autostart.nix {}; 681 + xpadneo = handleTest ./xpadneo.nix {}; 681 682 xrdp = handleTest ./xrdp.nix {}; 682 683 xss-lock = handleTest ./xss-lock.nix {}; 683 684 xterm = handleTest ./xterm.nix {};
+2 -1
nixos/tests/systemd-machinectl.nix
··· 1 - import ./make-test-python.nix ( 1 + import ./make-test-python.nix ({ pkgs, ... }: 2 2 let 3 3 4 4 container = { ··· 18 18 }; 19 19 20 20 containerSystem = (import ../lib/eval-config.nix { 21 + inherit (pkgs) system; 21 22 modules = [ container ]; 22 23 }).config.system.build.toplevel; 23 24
+18
nixos/tests/xpadneo.nix
··· 1 + import ./make-test-python.nix ({ lib, pkgs, ... }: { 2 + name = "xpadneo"; 3 + meta.maintainers = with lib.maintainers; [ kira-bruneau ]; 4 + 5 + nodes = { 6 + machine = { 7 + config.hardware.xpadneo.enable = true; 8 + }; 9 + }; 10 + 11 + # This is just a sanity check to make sure the module was 12 + # loaded. We'd have to find some way to mock an xbox controller if 13 + # we wanted more in-depth testing. 14 + testScript = '' 15 + machine.start(); 16 + machine.succeed("modinfo hid_xpadneo | grep 'version:\s\+${pkgs.linuxPackages.xpadneo.version}'") 17 + ''; 18 + })
+2 -2
pkgs/applications/blockchains/chia/default.nix
··· 6 6 7 7 let chia = python3Packages.buildPythonApplication rec { 8 8 pname = "chia"; 9 - version = "1.5.1"; 9 + version = "1.6.0"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "Chia-Network"; 13 13 repo = "chia-blockchain"; 14 14 rev = version; 15 15 fetchSubmodules = true; 16 - hash = "sha256-FzKdb6Z/ykKYjpjCr7QR5fxXPNnQbW3bBY97t7DxS90="; 16 + hash = "sha256-TNaHPvN19fkRqkQHtqdeEDwhqbntcVhxXhY8TNIScEg="; 17 17 }; 18 18 19 19 patches = [
+37 -28
pkgs/applications/misc/fsv/default.nix
··· 1 - { lib, stdenv, fetchurl, fetchFromGitHub, autoreconfHook 2 - , libtool, pkg-config, gtk2, libGLU, file 1 + { lib 2 + , stdenv 3 + , fetchFromGitHub 4 + , meson 5 + , ninja 6 + , pkg-config 7 + , cglm 8 + , gtk3 9 + , libepoxy 10 + , libGLU 3 11 }: 4 12 5 - let 6 - gtkglarea = stdenv.mkDerivation rec { 7 - pname = "gtkglarea"; 8 - version = "2.1.0"; 9 - src = fetchurl { 10 - url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 11 - sha256 = "1pl2vdj6l64j864ilhkq1bcggb3hrlxjwk5m029i7xfjfxc587lf"; 12 - }; 13 - nativeBuildInputs = [ pkg-config ]; 14 - buildInputs = [ gtk2 libGLU ]; 15 - hardeningDisable = [ "format" ]; 16 - }; 17 - 18 - in stdenv.mkDerivation rec { 13 + stdenv.mkDerivation rec { 19 14 pname = "fsv"; 20 - version = "0.9-1"; 15 + version = "3.0"; 21 16 22 17 src = fetchFromGitHub { 23 - owner = "mcuelenaere"; 24 - repo = "fsv"; 25 - rev = "${pname}-${version}"; 26 - sha256 = "0n09jd7yqj18mx6zqbg7kab4idg5llr15g6avafj74fpg1h7iimj"; 18 + owner = "jabl"; 19 + repo = "fsv"; 20 + rev = "${pname}-${version}"; 21 + hash = "sha256-fxsA3qcBPvK4H5P4juGTe6eg1lkygvzFpNW36B9lsE4="; 27 22 }; 28 23 29 - postPatch = '' 30 - # fix build with gettext 0.20 31 - sed -i 's/AM_GNU_GETTEXT/AM_GNU_GETTEXT([external])/' configure.in 32 - ''; 24 + nativeBuildInputs = [ 25 + meson 26 + ninja 27 + pkg-config 28 + ]; 33 29 34 - nativeBuildInputs = [ autoreconfHook libtool pkg-config ]; 35 - buildInputs = [ file gtk2 libGLU gtkglarea ]; 30 + buildInputs = [ 31 + cglm 32 + gtk3 33 + libepoxy 34 + libGLU 35 + ]; 36 + 37 + installPhase = '' 38 + runHook preInstall 39 + 40 + mkdir -p $out/bin 41 + cp src/fsv $out/bin/fsv 42 + 43 + runHook postInstall 44 + ''; 36 45 37 46 meta = with lib; { 38 47 description = "File system visualizer in cyberspace"; ··· 44 53 hard drive, or any arbitrarily large collection of files, limited only 45 54 by the host computer's memory and graphics hardware. 46 55 ''; 47 - homepage = "https://github.com/mcuelenaere/fsv"; 56 + homepage = "https://github.com/jabl/fsv"; 48 57 license = licenses.lgpl2; 49 58 platforms = platforms.linux; 50 59 maintainers = with maintainers; [ rnhmjoj ];
+2 -2
pkgs/applications/misc/heimer/default.nix
··· 2 2 3 3 mkDerivation rec { 4 4 pname = "heimer"; 5 - version = "3.6.0"; 5 + version = "3.6.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "juzzlin"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "sha256-GQf5S7mYuucJS5jsz0upe6DiniY8YXZXYQV7nyrjVmE="; 11 + sha256 = "sha256-i4jgmqRvBX6g6IOitnBnQqWnFY5QoLk6/Cah0wCU8uc="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake ];
+6 -6
pkgs/applications/misc/hugo/default.nix
··· 1 - { lib, buildGoModule, fetchFromGitHub, installShellFiles }: 1 + { stdenv, lib, buildGoModule, fetchFromGitHub, installShellFiles, buildPackages }: 2 2 3 3 buildGoModule rec { 4 4 pname = "hugo"; ··· 25 25 26 26 ldflags = [ "-s" "-w" "-X github.com/gohugoio/hugo/common/hugo.vendorInfo=nixpkgs" ]; 27 27 28 - postInstall = '' 29 - $out/bin/hugo gen man 28 + postInstall = let emulator = stdenv.hostPlatform.emulator buildPackages; in '' 29 + ${emulator} $out/bin/hugo gen man 30 30 installManPage man/* 31 31 installShellCompletion --cmd hugo \ 32 - --bash <($out/bin/hugo completion bash) \ 33 - --fish <($out/bin/hugo completion fish) \ 34 - --zsh <($out/bin/hugo completion zsh) 32 + --bash <(${emulator} $out/bin/hugo completion bash) \ 33 + --fish <(${emulator} $out/bin/hugo completion fish) \ 34 + --zsh <(${emulator} $out/bin/hugo completion zsh) 35 35 ''; 36 36 37 37 meta = with lib; {
+9 -8
pkgs/applications/networking/cluster/kuttl/default.nix
··· 1 - { lib, buildGoModule, fetchFromGitHub}: 1 + { lib, buildGoModule, fetchFromGitHub }: 2 2 3 3 buildGoModule rec { 4 4 pname = "kuttl"; 5 - version = "0.11.1"; 5 + version = "0.13.0"; 6 6 cli = "kubectl-kuttl"; 7 7 8 8 src = fetchFromGitHub { 9 - owner = "kudobuilder"; 10 - repo = "kuttl"; 11 - rev = "v${version}"; 12 - sha256 = "sha256-jvearvhl2fQV5OOVmvf3C4MjE//wkVs8Ly9BIwv15/8="; 9 + owner = "kudobuilder"; 10 + repo = "kuttl"; 11 + rev = "v${version}"; 12 + sha256 = "sha256-liuP8ALcPxbU+hZ54KDFj2r2yZpAbVago0IxIv52N3o="; 13 13 }; 14 14 15 - vendorSha256 = "sha256-EytHUfr6RbgXowYlfuajvNt9VwmGmvw9TBRtwYMAIh4="; 15 + vendorSha256 = "sha256-u8Ezk78CrAhSeeMVXj09/Hiegtx+ZNKlr/Fg0O7+iOY="; 16 16 17 17 subPackages = [ "cmd/kubectl-kuttl" ]; 18 18 19 19 ldflags = [ 20 - "-s" "-w" 20 + "-s" 21 + "-w" 21 22 "-X github.com/kudobuilder/kuttl/pkg/version.gitVersion=${version}" 22 23 ]; 23 24
+3 -3
pkgs/applications/networking/cluster/pluto/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "pluto"; 5 - version = "5.10.7"; 5 + version = "5.11.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "FairwindsOps"; 9 9 repo = "pluto"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-AGzDs2KZt44uBJRBHvBL7nn5TpgWbcdLTEf9Vx9j89U="; 11 + sha256 = "sha256-eyJ81i9kTuojBuo/rwfgnl3BRpiTnKst0SnL+oWfSWQ="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-cA5QxI1lLBdzPOj3pFqqHPfMwJQPPiyqQA4FLwetNUs="; 14 + vendorSha256 = "sha256-QH/mKq7QydYvUHZIPjoBWy015Sghh30VdEWu76KZdPE="; 15 15 16 16 ldflags = [ 17 17 "-w" "-s"
+2 -2
pkgs/applications/networking/cluster/terragrunt/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "terragrunt"; 5 - version = "0.38.9"; 5 + version = "0.39.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "gruntwork-io"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-rfAVgnFAxEguFuY+Gfe/T0NcsD6LmPSquxuTR0bRqXQ="; 11 + sha256 = "sha256-Y8t5rThkPD3FzY25L2lOIvktU5+NwBZtq9Pn3VzQQf4="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-CqImT90jFFLi6XR7jfzFKwhnCHK6B+aM+Ba/L+G3bEg=";
+2 -2
pkgs/applications/networking/cluster/vcluster/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "vcluster"; 5 - version = "0.11.1"; 5 + version = "0.12.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "loft-sh"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-aFTugqWr/9e3wQLL4yre2T8CUKq8P0HZLsES8lFZKHY="; 11 + sha256 = "sha256-KRm6+WRMGzM7L17ABj/g6Nu+eU6F3C4a9CAa0ePC6i8="; 12 12 }; 13 13 14 14 vendorSha256 = null;
+2 -2
pkgs/applications/science/logic/cbmc/default.nix
··· 13 13 14 14 stdenv.mkDerivation rec { 15 15 pname = "cbmc"; 16 - version = "5.65.1"; 16 + version = "5.67.0"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "diffblue"; 20 20 repo = pname; 21 21 rev = "${pname}-${version}"; 22 - sha256 = "sha256-6Cy3yScPl2Ax0N2pmJWJEPXrSlj+F0IAoM5G8rIjbT8="; 22 + sha256 = "sha256-9w6GGi/yW7IYv3NoflpzO/UH712+LWp6f10+ak2hLIA="; 23 23 }; 24 24 25 25 nativeBuildInputs = [
+9 -7
pkgs/applications/video/vdr/plugins.nix
··· 1 1 { lib, stdenv, fetchurl, fetchgit, vdr, fetchFromGitHub 2 - , graphicsmagick, libav, pcre, xorgserver, ffmpeg 2 + , graphicsmagick, pcre, xorgserver, ffmpeg 3 3 , libiconv, boost, libgcrypt, perl, util-linux, groff, libva, xorg, ncurses 4 4 , callPackage 5 5 }: let ··· 53 53 54 54 markad = stdenv.mkDerivation rec { 55 55 pname = "vdr-markad"; 56 - version = "2.0.4"; 56 + version = "3.0.25"; 57 57 58 58 src = fetchFromGitHub { 59 59 repo = "vdr-plugin-markad"; 60 - owner = "jbrundiers"; 61 - sha256 = "sha256-Y4KsEtUq+KoUooXiw9O9RokBxNwWBkiGB31GncmHkYM="; 62 - rev = "288e3dae93421b0176f4f62b68ea4b39d98e8793"; 60 + owner = "kfb77"; 61 + sha256 = "sha256-m7cUAxwXj62spelHYH6uTIoViSavSR0d4psr7+KLJg8="; 62 + rev = "v${version}"; 63 63 }; 64 64 65 - buildInputs = [ vdr libav ]; 65 + buildInputs = [ vdr ffmpeg ]; 66 66 67 67 postPatch = '' 68 68 substituteInPlace command/Makefile --replace '/usr' "" ··· 78 78 buildFlags = [ 79 79 "DESTDIR=$(out)" 80 80 "LIBDIR=/lib/vdr" 81 + "BINDIR=/bin" 82 + "MANDIR=/share/man" 81 83 "APIVERSION=${vdr.version}" 82 84 "VDRDIR=${vdr.dev}/include/vdr" 83 85 "LOCDIR=/share/locale" ··· 86 88 installFlags = buildFlags; 87 89 88 90 meta = with lib; { 89 - homepage = "https://github.com/jbrundiers/vdr-plugin-markad"; 91 + homepage = "https://github.com/kfb77/vdr-plugin-markad"; 90 92 description = "MarkAd marks advertisements in VDR recordings."; 91 93 maintainers = [ maintainers.ck3d ]; 92 94 license = licenses.gpl2;
+2 -2
pkgs/applications/virtualization/distrobox/default.nix
··· 2 2 3 3 stdenvNoCC.mkDerivation rec { 4 4 pname = "distrobox"; 5 - version = "1.4.0"; 5 + version = "1.4.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "89luca89"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "sha256-XYqPwBiMbwG0bTiFRywZRWjp1OabTHcwhmbcx11SgPo="; 11 + sha256 = "sha256-WIpl3eSdResAmWFc8OG8Jm0uLTGaovkItGAZTOEzhuE="; 12 12 }; 13 13 14 14 dontConfigure = true;
+1 -3
pkgs/applications/virtualization/umoci/default.nix
··· 26 26 nativeBuildInputs = [ go-md2man installShellFiles ]; 27 27 28 28 postInstall = '' 29 - substituteInPlace Makefile --replace \ 30 - '$(shell which bash)' '${lib.getBin bash}/bin/bash' 31 - make docs 29 + make docs SHELL="$SHELL" 32 30 installManPage doc/man/*.[1-9] 33 31 ''; 34 32
+4 -3
pkgs/data/fonts/tipa/default.nix
··· 1 1 { stdenv, fetchurl }: 2 2 3 - stdenv.mkDerivation { 4 - name = "tipa-1.3"; 3 + stdenv.mkDerivation rec { 4 + pname = "tipa"; 5 + version = "1.3"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://debian/pool/main/t/tipa/tipa_1.3.orig.tar.gz"; 8 + url = "mirror://debian/pool/main/t/tipa/${pname}_${version}.orig.tar.gz"; 8 9 sha256 = "1q1sisxdcd2zd9b7mnagr2mxf9v3n1r4s5892zx5ly4r0niyya9m"; 9 10 }; 10 11
+2 -2
pkgs/development/libraries/restinio/default.nix
··· 2 2 3 3 let 4 4 pname = "restinio"; 5 - version = "0.6.16"; 5 + version = "0.6.17"; 6 6 in 7 7 fetchzip { 8 8 name = "${pname}-${version}"; 9 9 url = "https://github.com/Stiffstream/restinio/releases/download/v.${version}/${pname}-${version}.tar.bz2"; 10 - hash = "sha256-tl9HUsT9mCupuwp6T4dbPdYOQy3vYyctuwFQPfR8m0Y="; 10 + hash = "sha256-8A13r3Qsn5S+kVWLPENoOjqz2tPMxSo6EWBvHG1cTAE="; 11 11 12 12 stripRoot = false; 13 13 postFetch = ''
+2 -2
pkgs/development/python-modules/autograd/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "autograd"; 5 - version = "1.4"; 5 + version = "1.5"; 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "sha256-OD3g9TfvLji4X/lpJZOwz66JWMmzvUUbUsJV/ZFx/84="; 9 + sha256 = "sha256-2AvSJRVNHbE8tOrM96GMNYvnIJJkG2hxf5b88dFqzQs="; 10 10 }; 11 11 12 12 propagatedBuildInputs = [ numpy future ];
+8
pkgs/development/python-modules/jsonmerge/default.nix
··· 2 2 , buildPythonPackage 3 3 , fetchPypi 4 4 , jsonschema 5 + , pytestCheckHook 5 6 }: 6 7 7 8 buildPythonPackage rec { ··· 14 15 }; 15 16 16 17 propagatedBuildInputs = [ jsonschema ]; 18 + 19 + checkInputs = [ pytestCheckHook ]; 20 + 21 + disabledTests = [ 22 + # Fails with "Unresolvable JSON pointer" 23 + "test_local_reference_in_meta" 24 + ]; 17 25 18 26 meta = with lib; { 19 27 description = "Merge a series of JSON documents";
+2 -2
pkgs/development/tools/analysis/actionlint/default.nix
··· 10 10 11 11 buildGoModule rec { 12 12 pname = "actionlint"; 13 - version = "1.6.19"; 13 + version = "1.6.20"; 14 14 15 15 subPackages = [ "cmd/actionlint" ]; 16 16 ··· 18 18 owner = "rhysd"; 19 19 repo = "actionlint"; 20 20 rev = "v${version}"; 21 - sha256 = "sha256-sWsn5jX4kQbK9rOW5FC94mdBwXNAR2a48XFHe37eK6U="; 21 + sha256 = "sha256-WQqEST5f3yUsvjw86ckS/jRaxcnUd13zb7lmQvfmsjM="; 22 22 }; 23 23 24 24 vendorSha256 = "sha256-vWU3tEC+ZlrrTnX3fbuEuZRoSg1KtfpgpXmK4+HWrNY=";
+3 -3
pkgs/development/tools/misc/act/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "act"; 5 - version = "0.2.31"; 5 + version = "0.2.32"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "nektos"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-6JMWt6svJwW7FNn2sOSUjFtXBqmC02uFEiybj5H9wTw="; 11 + sha256 = "sha256-fHGS05qlRSVTrjEx71hhVridbpbLVyaAOg3uMYIj0TU="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-caFM1A4SGZ8MIIoWnzBdKJOAgzscrf9eGtv/GCSfzag="; 14 + vendorSha256 = "sha256-ctIKaThBIzaBw3/a0pat+G7Zb4Y2F7mk8VZWoM0XdyI="; 15 15 16 16 doCheck = false; 17 17
+45 -12
pkgs/development/tools/misc/ltrace/default.nix
··· 1 - { lib, stdenv, fetchurl, elfutils, libunwind }: 1 + { lib, stdenv, fetchurl, fetchgit, autoreconfHook, dejagnu, elfutils }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "ltrace"; 5 - version = "0.7.3"; 5 + version = "0.7.91"; 6 6 7 7 src = fetchurl { 8 - url = "mirror://debian/pool/main/l/${pname}/${pname}_${version}.orig.tar.bz2"; 9 - sha256 = "00wmbdghqbz6x95m1mcdd3wd46l6hgcr4wggdp049dbifh3qqvqf"; 8 + url = "https://src.fedoraproject.org/repo/pkgs/ltrace/ltrace-0.7.91.tar.bz2/9db3bdee7cf3e11c87d8cc7673d4d25b/ltrace-0.7.91.tar.bz2"; 9 + sha256 = "sha256-HqellbKh2ZDHxslXl7SSIXtpjV1sodtgVwh8hgTC3Dc="; 10 10 }; 11 11 12 - buildInputs = [ elfutils libunwind ]; 12 + nativeBuildInputs = [ autoreconfHook ]; # Some patches impact ./configure. 13 + buildInputs = [ elfutils ]; 14 + checkInputs = [ dejagnu ]; 13 15 16 + # Import Fedora's (very) large patch series: bug fixes, architecture support, 17 + # etc. RH/Fedora are currently working with upstream to merge all these 18 + # patches for the next major branch. 14 19 prePatch = let 15 - debian = fetchurl { 16 - url = "mirror://debian/pool/main/l/ltrace/ltrace_0.7.3-6.debian.tar.xz"; 17 - sha256 = "0xc4pfd8qw53crvdxr29iwl8na53zmknca082kziwpvlzsick4kp"; 20 + fedora = fetchgit { 21 + url = "https://src.fedoraproject.org/rpms/ltrace.git"; 22 + rev = "00f430ccbebdbd13bdd4d7ee6303b091cf005542"; 23 + sha256 = "sha256-FBGEgmaslu7xrJtZ2WsYwu9Cw1ZQrWRV1+Eu9qLXO4s="; 18 24 }; 19 25 in '' 20 - tar xf '${debian}' 21 - patches="$patches $(cat debian/patches/series | sed 's|^|debian/patches/|')" 26 + # Order matters, read the patch list from the RPM spec. Our own patches 27 + # are applied on top of the Fedora baseline. 28 + fedorapatches="" 29 + for p in $(grep '^Patch[0-9]\+:' ${fedora}/ltrace.spec | awk '{ print $2 }'); do 30 + fedorapatches="$fedorapatches ${fedora}/$p" 31 + done 32 + patches="$fedorapatches $patches" 22 33 ''; 23 34 35 + # Cherry-pick extra patches for recent glibc support in the test suite. 36 + patches = [ 37 + # https://gitlab.com/cespedes/ltrace/-/merge_requests/14 38 + ./testsuite-newfstatat.patch 39 + # https://gitlab.com/cespedes/ltrace/-/merge_requests/15 40 + ./sysdeps-x86.patch 41 + ]; 42 + 43 + doCheck = true; 44 + checkPhase = '' 45 + # Hardening options interfere with some of the low-level expectations in 46 + # the test suite (e.g. printf ends up redirected to __printf_chk). 47 + NIX_HARDENING_ENABLE="" \ 48 + # Disable test that requires ptrace-ing a non-child process, this might be 49 + # forbidden by YAMA ptrace policy on the build host. 50 + RUNTESTFLAGS="--host=${stdenv.hostPlatform.config} \ 51 + --target=${stdenv.targetPlatform.config} \ 52 + --ignore attach-process.exp" \ 53 + make check 54 + ''; 55 + 24 56 meta = with lib; { 25 57 description = "Library call tracer"; 26 58 homepage = "https://www.ltrace.org/"; 27 - platforms = [ "i686-linux" "x86_64-linux" ]; 28 - license = licenses.gpl2; 59 + platforms = platforms.linux; 60 + license = licenses.gpl2Plus; 61 + maintainers = with maintainers; [ delroth ]; 29 62 }; 30 63 }
+328
pkgs/development/tools/misc/ltrace/sysdeps-x86.patch
··· 1 + diff --git a/sysdeps/linux-gnu/x86/syscallent.h b/sysdeps/linux-gnu/x86/syscallent.h 2 + index 345fe20..66ac522 100644 3 + --- a/sysdeps/linux-gnu/x86/syscallent.h 4 + +++ b/sysdeps/linux-gnu/x86/syscallent.h 5 + @@ -238,7 +238,7 @@ 6 + "setfsgid32", /* 216 */ 7 + "pivot_root", /* 217 */ 8 + "mincore", /* 218 */ 9 + - "madvise1", /* 219 */ 10 + + "madvise", /* 219 */ 11 + "getdents64", /* 220 */ 12 + "fcntl64", /* 221 */ 13 + "222", /* 222 */ 14 + @@ -279,14 +279,14 @@ 15 + "remap_file_pages", /* 257 */ 16 + "set_tid_address", /* 258 */ 17 + "timer_create", /* 259 */ 18 + - "260", /* 260 */ 19 + - "261", /* 261 */ 20 + - "262", /* 262 */ 21 + - "263", /* 263 */ 22 + - "264", /* 264 */ 23 + - "265", /* 265 */ 24 + - "266", /* 266 */ 25 + - "267", /* 267 */ 26 + + "timer_settime", /* 260 */ 27 + + "timer_gettime", /* 261 */ 28 + + "timer_getoverrun", /* 262 */ 29 + + "timer_delete", /* 263 */ 30 + + "clock_settime", /* 264 */ 31 + + "clock_gettime", /* 265 */ 32 + + "clock_getres", /* 266 */ 33 + + "clock_nanosleep", /* 267 */ 34 + "statfs64", /* 268 */ 35 + "fstatfs64", /* 269 */ 36 + "tgkill", /* 270 */ 37 + @@ -297,11 +297,11 @@ 38 + "get_mempolicy", /* 275 */ 39 + "set_mempolicy", /* 276 */ 40 + "mq_open", /* 277 */ 41 + - "278", /* 278 */ 42 + - "279", /* 279 */ 43 + - "280", /* 280 */ 44 + - "281", /* 281 */ 45 + - "282", /* 282 */ 46 + + "mq_unlink", /* 278 */ 47 + + "mq_timedsend", /* 279 */ 48 + + "mq_timedreceive", /* 280 */ 49 + + "mq_notify", /* 281 */ 50 + + "mq_getsetattr", /* 282 */ 51 + "kexec_load", /* 283 */ 52 + "waitid", /* 284 */ 53 + "285", /* 285 */ 54 + @@ -368,3 +368,105 @@ 55 + "setns", /* 346 */ 56 + "process_vm_readv", /* 347 */ 57 + "process_vm_writev", /* 348 */ 58 + + "kcmp", /* 349 */ 59 + + "finit_module", /* 350 */ 60 + + "sched_setattr", /* 351 */ 61 + + "sched_getattr", /* 352 */ 62 + + "renameat2", /* 353 */ 63 + + "seccomp", /* 354 */ 64 + + "getrandom", /* 355 */ 65 + + "memfd_create", /* 356 */ 66 + + "bpf", /* 357 */ 67 + + "execveat", /* 358 */ 68 + + "socket", /* 359 */ 69 + + "socketpair", /* 360 */ 70 + + "bind", /* 361 */ 71 + + "connect", /* 362 */ 72 + + "listen", /* 363 */ 73 + + "accept4", /* 364 */ 74 + + "getsockopt", /* 365 */ 75 + + "setsockopt", /* 366 */ 76 + + "getsockname", /* 367 */ 77 + + "getpeername", /* 368 */ 78 + + "sendto", /* 369 */ 79 + + "sendmsg", /* 370 */ 80 + + "recvfrom", /* 371 */ 81 + + "recvmsg", /* 372 */ 82 + + "shutdown", /* 373 */ 83 + + "userfaultfd", /* 374 */ 84 + + "membarrier", /* 375 */ 85 + + "mlock2", /* 376 */ 86 + + "copy_file_range", /* 377 */ 87 + + "preadv2", /* 378 */ 88 + + "pwritev2", /* 379 */ 89 + + "pkey_mprotect", /* 380 */ 90 + + "pkey_alloc", /* 381 */ 91 + + "pkey_free", /* 382 */ 92 + + "statx", /* 383 */ 93 + + "arch_prctl", /* 384 */ 94 + + "io_pgetevents", /* 385 */ 95 + + "rseq", /* 386 */ 96 + + "387", /* 387 */ 97 + + "388", /* 388 */ 98 + + "389", /* 389 */ 99 + + "390", /* 390 */ 100 + + "391", /* 391 */ 101 + + "392", /* 392 */ 102 + + "semget", /* 393 */ 103 + + "semctl", /* 394 */ 104 + + "shmget", /* 395 */ 105 + + "shmctl", /* 396 */ 106 + + "shmat", /* 397 */ 107 + + "shmdt", /* 398 */ 108 + + "msgget", /* 399 */ 109 + + "msgsnd", /* 400 */ 110 + + "msgrcv", /* 401 */ 111 + + "msgctl", /* 402 */ 112 + + "clock_gettime64", /* 403 */ 113 + + "clock_settime64", /* 404 */ 114 + + "clock_adjtime64", /* 405 */ 115 + + "clock_getres_time64", /* 406 */ 116 + + "clock_nanosleep_time64", /* 407 */ 117 + + "timer_gettime64", /* 408 */ 118 + + "timer_settime64", /* 409 */ 119 + + "timerfd_gettime64", /* 410 */ 120 + + "timerfd_settime64", /* 411 */ 121 + + "utimensat_time64", /* 412 */ 122 + + "pselect6_time64", /* 413 */ 123 + + "ppoll_time64", /* 414 */ 124 + + "415", /* 415 */ 125 + + "io_pgetevents_time64", /* 416 */ 126 + + "recvmmsg_time64", /* 417 */ 127 + + "mq_timedsend_time64", /* 418 */ 128 + + "mq_timedreceive_time64", /* 419 */ 129 + + "semtimedop_time64", /* 420 */ 130 + + "rt_sigtimedwait_time64", /* 421 */ 131 + + "futex_time64", /* 422 */ 132 + + "sched_rr_get_interval_time64", /* 423 */ 133 + + "pidfd_send_signal", /* 424 */ 134 + + "io_uring_setup", /* 425 */ 135 + + "io_uring_enter", /* 426 */ 136 + + "io_uring_register", /* 427 */ 137 + + "open_tree", /* 428 */ 138 + + "move_mount", /* 429 */ 139 + + "fsopen", /* 430 */ 140 + + "fsconfig", /* 431 */ 141 + + "fsmount", /* 432 */ 142 + + "fspick", /* 433 */ 143 + + "pidfd_open", /* 434 */ 144 + + "clone3", /* 435 */ 145 + + "close_range", /* 436 */ 146 + + "openat2", /* 437 */ 147 + + "pidfd_getfd", /* 438 */ 148 + + "faccessat2", /* 439 */ 149 + + "process_madvise", /* 440 */ 150 + + "epoll_pwait2", /* 441 */ 151 + + "mount_setattr", /* 442 */ 152 + + "quotactl_fd", /* 443 */ 153 + + "landlock_create_ruleset", /* 444 */ 154 + + "landlock_add_rule", /* 445 */ 155 + + "landlock_restrict_self", /* 446 */ 156 + + "memfd_secret", /* 447 */ 157 + + "process_mrelease", /* 448 */ 158 + + "futex_waitv", /* 449 */ 159 + + "set_mempolicy_home_node", /* 450 */ 160 + diff --git a/sysdeps/linux-gnu/x86/syscallent1.h b/sysdeps/linux-gnu/x86/syscallent1.h 161 + index 91ae8d6..f8b15f7 100644 162 + --- a/sysdeps/linux-gnu/x86/syscallent1.h 163 + +++ b/sysdeps/linux-gnu/x86/syscallent1.h 164 + @@ -36,8 +36,8 @@ 165 + "rt_sigprocmask", /* 14 */ 166 + "rt_sigreturn", /* 15 */ 167 + "ioctl", /* 16 */ 168 + - "pread", /* 17 */ 169 + - "pwrite", /* 18 */ 170 + + "pread64", /* 17 */ 171 + + "pwrite64", /* 18 */ 172 + "readv", /* 19 */ 173 + "writev", /* 20 */ 174 + "access", /* 21 */ 175 + @@ -233,8 +233,8 @@ 176 + "get_thread_area", /* 211 */ 177 + "lookup_dcookie", /* 212 */ 178 + "epoll_create", /* 213 */ 179 + - "epoll_ctl", /* 214 */ 180 + - "epoll_wait", /* 215 */ 181 + + "epoll_ctl_old", /* 214 */ 182 + + "epoll_wait_old", /* 215 */ 183 + "remap_file_pages", /* 216 */ 184 + "getdents64", /* 217 */ 185 + "set_tid_address", /* 218 */ 186 + @@ -331,3 +331,142 @@ 187 + "getcpu", /* 309 */ 188 + "process_vm_readv", /* 310 */ 189 + "process_vm_writev", /* 311 */ 190 + + "kcmp", /* 312 */ 191 + + "finit_module", /* 313 */ 192 + + "sched_setattr", /* 314 */ 193 + + "sched_getattr", /* 315 */ 194 + + "renameat2", /* 316 */ 195 + + "seccomp", /* 317 */ 196 + + "getrandom", /* 318 */ 197 + + "memfd_create", /* 319 */ 198 + + "kexec_file_load", /* 320 */ 199 + + "bpf", /* 321 */ 200 + + "execveat", /* 322 */ 201 + + "userfaultfd", /* 323 */ 202 + + "membarrier", /* 324 */ 203 + + "mlock2", /* 325 */ 204 + + "copy_file_range", /* 326 */ 205 + + "preadv2", /* 327 */ 206 + + "pwritev2", /* 328 */ 207 + + "pkey_mprotect", /* 329 */ 208 + + "pkey_alloc", /* 330 */ 209 + + "pkey_free", /* 331 */ 210 + + "statx", /* 332 */ 211 + + "io_pgetevents", /* 333 */ 212 + + "rseq", /* 334 */ 213 + + "335", /* 335 */ 214 + + "336", /* 336 */ 215 + + "337", /* 337 */ 216 + + "338", /* 338 */ 217 + + "339", /* 339 */ 218 + + "340", /* 340 */ 219 + + "341", /* 341 */ 220 + + "342", /* 342 */ 221 + + "343", /* 343 */ 222 + + "344", /* 344 */ 223 + + "345", /* 345 */ 224 + + "346", /* 346 */ 225 + + "347", /* 347 */ 226 + + "348", /* 348 */ 227 + + "349", /* 349 */ 228 + + "350", /* 350 */ 229 + + "351", /* 351 */ 230 + + "352", /* 352 */ 231 + + "353", /* 353 */ 232 + + "354", /* 354 */ 233 + + "355", /* 355 */ 234 + + "356", /* 356 */ 235 + + "357", /* 357 */ 236 + + "358", /* 358 */ 237 + + "359", /* 359 */ 238 + + "360", /* 360 */ 239 + + "361", /* 361 */ 240 + + "362", /* 362 */ 241 + + "363", /* 363 */ 242 + + "364", /* 364 */ 243 + + "365", /* 365 */ 244 + + "366", /* 366 */ 245 + + "367", /* 367 */ 246 + + "368", /* 368 */ 247 + + "369", /* 369 */ 248 + + "370", /* 370 */ 249 + + "371", /* 371 */ 250 + + "372", /* 372 */ 251 + + "373", /* 373 */ 252 + + "374", /* 374 */ 253 + + "375", /* 375 */ 254 + + "376", /* 376 */ 255 + + "377", /* 377 */ 256 + + "378", /* 378 */ 257 + + "379", /* 379 */ 258 + + "380", /* 380 */ 259 + + "381", /* 381 */ 260 + + "382", /* 382 */ 261 + + "383", /* 383 */ 262 + + "384", /* 384 */ 263 + + "385", /* 385 */ 264 + + "386", /* 386 */ 265 + + "387", /* 387 */ 266 + + "388", /* 388 */ 267 + + "389", /* 389 */ 268 + + "390", /* 390 */ 269 + + "391", /* 391 */ 270 + + "392", /* 392 */ 271 + + "393", /* 393 */ 272 + + "394", /* 394 */ 273 + + "395", /* 395 */ 274 + + "396", /* 396 */ 275 + + "397", /* 397 */ 276 + + "398", /* 398 */ 277 + + "399", /* 399 */ 278 + + "400", /* 400 */ 279 + + "401", /* 401 */ 280 + + "402", /* 402 */ 281 + + "403", /* 403 */ 282 + + "404", /* 404 */ 283 + + "405", /* 405 */ 284 + + "406", /* 406 */ 285 + + "407", /* 407 */ 286 + + "408", /* 408 */ 287 + + "409", /* 409 */ 288 + + "410", /* 410 */ 289 + + "411", /* 411 */ 290 + + "412", /* 412 */ 291 + + "413", /* 413 */ 292 + + "414", /* 414 */ 293 + + "415", /* 415 */ 294 + + "416", /* 416 */ 295 + + "417", /* 417 */ 296 + + "418", /* 418 */ 297 + + "419", /* 419 */ 298 + + "420", /* 420 */ 299 + + "421", /* 421 */ 300 + + "422", /* 422 */ 301 + + "423", /* 423 */ 302 + + "pidfd_send_signal", /* 424 */ 303 + + "io_uring_setup", /* 425 */ 304 + + "io_uring_enter", /* 426 */ 305 + + "io_uring_register", /* 427 */ 306 + + "open_tree", /* 428 */ 307 + + "move_mount", /* 429 */ 308 + + "fsopen", /* 430 */ 309 + + "fsconfig", /* 431 */ 310 + + "fsmount", /* 432 */ 311 + + "fspick", /* 433 */ 312 + + "pidfd_open", /* 434 */ 313 + + "clone3", /* 435 */ 314 + + "close_range", /* 436 */ 315 + + "openat2", /* 437 */ 316 + + "pidfd_getfd", /* 438 */ 317 + + "faccessat2", /* 439 */ 318 + + "process_madvise", /* 440 */ 319 + + "epoll_pwait2", /* 441 */ 320 + + "mount_setattr", /* 442 */ 321 + + "quotactl_fd", /* 443 */ 322 + + "landlock_create_ruleset", /* 444 */ 323 + + "landlock_add_rule", /* 445 */ 324 + + "landlock_restrict_self", /* 446 */ 325 + + "memfd_secret", /* 447 */ 326 + + "process_mrelease", /* 448 */ 327 + + "futex_waitv", /* 449 */ 328 + + "set_mempolicy_home_node", /* 450 */
+13
pkgs/development/tools/misc/ltrace/testsuite-newfstatat.patch
··· 1 + diff --git a/testsuite/ltrace.main/system_calls.exp b/testsuite/ltrace.main/system_calls.exp 2 + index 1b64cb0..af19916 100644 3 + --- a/testsuite/ltrace.main/system_calls.exp 4 + +++ b/testsuite/ltrace.main/system_calls.exp 5 + @@ -133,7 +133,7 @@ Match [Diff [Calls [ltraceRun -L -S -- $bin]] \ 6 + { {^write$} == 1 } 7 + { {^unlink(at)?$} >= 2 } 8 + { {^open(at)?$} == 1 } 9 + - { {^(new|f)?stat(64)?$} >= 1 } 10 + + { {^(new)?f?statx?(at)?(64)?$} >= 1 } 11 + { {^close$} == 1 } 12 + { {^getcwd$} == 1 } 13 + { {^chdir$} == 1 }
+2 -2
pkgs/os-specific/linux/acpid/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "acpid"; 5 - version = "2.0.33"; 5 + version = "2.0.34"; 6 6 7 7 src = fetchurl { 8 8 url = "mirror://sourceforge/acpid2/acpid-${version}.tar.xz"; 9 - sha256 = "sha256-CFb3Gz6zShtmPQqOY2Pfy8UZ5j2EczBJiJhljily2+g="; 9 + sha256 = "sha256-LQlcjPy8hHyux0bWLNyNC/8ewbxy73xnTHIeBNpqszM="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ autoreconfHook ];
+2 -2
pkgs/os-specific/linux/conky/default.nix
··· 68 68 69 69 stdenv.mkDerivation rec { 70 70 pname = "conky"; 71 - version = "1.12.2"; 71 + version = "1.13.1"; 72 72 73 73 src = fetchFromGitHub { 74 74 owner = "brndnmtthws"; 75 75 repo = "conky"; 76 76 rev = "v${version}"; 77 - sha256 = "sha256-x6bR5E5LIvKWiVM15IEoUgGas/hcRp3F/O4MTOhVPb8="; 77 + sha256 = "sha256-3eCRzjfHGFiKuxmRHvnzqAg/+ApUKnHhsumWnio/Qxg="; 78 78 }; 79 79 80 80 postPatch = ''
+3 -3
pkgs/os-specific/linux/firmware/system76-firmware/default.nix
··· 2 2 rustPlatform.buildRustPackage rec { 3 3 pname = "system76-firmware"; 4 4 # Check Makefile when updating, make sure postInstall matches make install 5 - version = "1.0.42"; 5 + version = "1.0.43"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "pop-os"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "sha256-8raRfmNAvgxBVsFeOu/XPs5YU1wPpRBo3Cog/UpE5/o="; 11 + sha256 = "sha256-0NlM5ugpJzwzXgm8TqM6/aj3b+lDYbLeYOHNHM3g8aw="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ pkg-config makeWrapper ]; ··· 17 17 18 18 cargoBuildFlags = [ "--workspace" ]; 19 19 20 - cargoSha256 = "sha256-aKyLAISZlQz5e8MvOoydAZ4bwCEZ1K3FldyoG6R9FJU="; 20 + cargoSha256 = "sha256-oyHnEWtQ0pl4SaJsnao+oTDBuu9PJdU3uqLTDowRWQw="; 21 21 22 22 # Purposefully don't install systemd unit file, that's for NixOS 23 23 postInstall = ''
+18 -8
pkgs/os-specific/linux/xpadneo/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, kernel, bluez }: 1 + { lib 2 + , stdenv 3 + , fetchFromGitHub 4 + , kernel 5 + , bluez 6 + , nixosTests 7 + }: 2 8 3 - stdenv.mkDerivation rec { 9 + stdenv.mkDerivation (finalAttrs: { 4 10 pname = "xpadneo"; 5 - version = "0.9.4"; 11 + version = "0.9.5"; 6 12 7 13 src = fetchFromGitHub { 8 14 owner = "atar-axis"; 9 - repo = pname; 10 - rev = "refs/tags/v${version}"; 11 - sha256 = "sha256-4zd+x9uYl0lJgePM9LEgLYFqvcw6VPF/CbR1XiYSwGE="; 15 + repo = "xpadneo"; 16 + rev = "refs/tags/v${finalAttrs.version}"; 17 + sha256 = "sha256-rT2Mq40fE055FemDG7PBjt+cxgIHJG9tTjtw2nW6B98="; 12 18 }; 13 19 14 20 setSourceRoot = '' ··· 22 28 "-C" 23 29 "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 24 30 "M=$(sourceRoot)" 25 - "VERSION=${version}" 31 + "VERSION=${finalAttrs.version}" 26 32 ]; 27 33 28 34 buildFlags = [ "modules" ]; 29 35 installFlags = [ "INSTALL_MOD_PATH=${placeholder "out"}" ]; 30 36 installTargets = [ "modules_install" ]; 31 37 38 + passthru.tests = { 39 + xpadneo = nixosTests.xpadneo; 40 + }; 41 + 32 42 meta = with lib; { 33 43 description = "Advanced Linux driver for Xbox One wireless controllers"; 34 44 homepage = "https://atar-axis.github.io/xpadneo"; ··· 36 46 maintainers = with maintainers; [ kira-bruneau ]; 37 47 platforms = platforms.linux; 38 48 }; 39 - } 49 + })
+2 -2
pkgs/servers/computing/slurm/default.nix
··· 14 14 15 15 stdenv.mkDerivation rec { 16 16 pname = "slurm"; 17 - version = "22.05.3.1"; 17 + version = "22.05.4.1"; 18 18 19 19 # N.B. We use github release tags instead of https://www.schedmd.com/downloads.php 20 20 # because the latter does not keep older releases. ··· 23 23 repo = "slurm"; 24 24 # The release tags use - instead of . 25 25 rev = "${pname}-${builtins.replaceStrings ["."] ["-"] version}"; 26 - sha256 = "113l23zf98r2rz4smyb0lk68p5jj2gx2y2j11vvf5wq4apzyz8jf"; 26 + sha256 = "100ixhpi4ahx5w7b1ncgmmg1ar48brp095lrxhcxr55fq2wqlv35"; 27 27 }; 28 28 29 29 outputs = [ "out" "dev" ];
+3 -3
pkgs/servers/nosql/influxdb2/cli.nix
··· 5 5 }: 6 6 7 7 let 8 - version = "2.3.0"; 8 + version = "2.4.0"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "influxdata"; 12 12 repo = "influx-cli"; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-i3PN0mvSzPX/hu6fF2oizfioHZ2qU2V+mRwuxT1AYWo="; 14 + sha256 = "sha256-l27BAHQtMA4kE7VEZLdOPFnSXtyWUOrcUFitaWqwvTw="; 15 15 }; 16 16 17 17 in buildGoModule { ··· 19 19 version = version; 20 20 src = src; 21 21 22 - vendorSha256 = "sha256-Boz1G8g0fjjlflxZh4V8sd/v0bE9Oy3DpqywOpKxjd0="; 22 + vendorSha256 = "sha256-GnVLr9mWehgw8vs4RiOrFHVlPpPT/LP6XvCq94aJxJQ="; 23 23 subPackages = [ "cmd/influx" ]; 24 24 25 25 ldflags = [ "-X main.commit=v${version}" "-X main.version=${version}" ];
+12 -9
pkgs/servers/nosql/influxdb2/default.nix
··· 12 12 }: 13 13 14 14 let 15 - version = "2.1.1"; 16 - ui_version = "2.1.2"; 17 - libflux_version = "0.139.0"; 15 + version = "2.4.0"; 16 + # Despite the name, this is not a rolling release. This is the 17 + # version of the UI assets for 2.4.0, as specified in 18 + # scripts/fetch-ui-assets.sh in the 2.4.0 tag of influxdb. 19 + ui_version = "Master"; 20 + libflux_version = "0.179.0"; 18 21 19 22 src = fetchFromGitHub { 20 23 owner = "influxdata"; 21 24 repo = "influxdb"; 22 25 rev = "v${version}"; 23 - sha256 = "sha256-wf01DhB1ampZuWPkHUEOf3KJK4GjeOAPL3LG2+g4NGY="; 26 + sha256 = "sha256-ufJnrVWVfia2/xLRmFkauCw8ktdSJUybJkv42Gd0npg="; 24 27 }; 25 28 26 29 ui = fetchurl { 27 30 url = "https://github.com/influxdata/ui/releases/download/OSS-${ui_version}/build.tar.gz"; 28 - sha256 = "sha256-fXjShNJfKN/ZQNQHoX9/Ou4XBrXavCN+rcO+8AMc5Ug="; 31 + sha256 = "sha256-YKDp1jLyo4n+YTeMaWl8dhN4Lr3H8FXV7stJ3p3zFe8="; 29 32 }; 30 33 31 34 flux = rustPlatform.buildRustPackage { ··· 35 38 owner = "influxdata"; 36 39 repo = "flux"; 37 40 rev = "v${libflux_version}"; 38 - sha256 = "sha256-cELeWZXGVLFoPYfBoBP8NeLBVFIb5o+lWyto42BLyXY="; 41 + sha256 = "sha256-xcsmvT8Ve1WbfwrdVPnJcj7RAvrk795N3C95ubbGig0="; 39 42 }; 40 43 sourceRoot = "source/libflux"; 41 - cargoSha256 = "sha256-wFgawxgqZqoPnOXJD3r5t2n7Y2bTAkBbBxeBtFEF7N4="; 44 + cargoSha256 = "sha256-+hJQFV0tWeTQDN560DzROUNpdkcZ5h2sc13akHCgqPc="; 42 45 nativeBuildInputs = [ llvmPackages.libclang ]; 43 46 buildInputs = lib.optional stdenv.isDarwin libiconv; 44 47 LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib"; ··· 67 70 68 71 nativeBuildInputs = [ go-bindata pkg-config ]; 69 72 70 - vendorSha256 = "sha256-GVLAzVJzSsC10ZWDZPP8upydwZG21E+zQ6sMKm1lCY0="; 73 + vendorSha256 = "sha256-DZsd6qPKfRbnvz0UAww+ubaeTEqQxLeil1S3SZAmmJk="; 71 74 subPackages = [ "cmd/influxd" "cmd/telemetryd" ]; 72 75 73 76 PKG_CONFIG_PATH = "${flux}/pkgconfig"; ··· 81 84 exit 1 82 85 fi 83 86 84 - ui_ver=$(grep influxdata/ui/releases scripts/fetch-ui-assets.sh | ${perl}/bin/perl -pe 's#.*/OSS-([^/]+)/.*#$1#') 87 + ui_ver=$(egrep 'influxdata/ui/releases/.*/sha256.txt' scripts/fetch-ui-assets.sh | ${perl}/bin/perl -pe 's#.*/OSS-([^/]+)/.*#$1#') 85 88 if [ "$ui_ver" != "${ui_version}" ]; then 86 89 echo "scripts/fetch-ui-assets.sh wants UI $ui_ver, but nix derivation provides ${ui_version}" 87 90 exit 1
+2 -2
pkgs/servers/snappymail/default.nix
··· 2 2 , dataPath ? "/var/lib/snappymail" }: 3 3 stdenv.mkDerivation rec { 4 4 pname = "snappymail"; 5 - version = "2.18.1"; 5 + version = "2.18.3"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/the-djmaze/snappymail/releases/download/v${version}/snappymail-${version}.tar.gz"; 9 - sha256 = "sha256-0NsDm1dDMg0HbAmuGIrNRkwtjvaZ9QYh7GUXkOJNoKw="; 9 + sha256 = "sha256-QAdR7fhF05taVtoUqqbw6EELnSDwRtX2O43VN8p6L7Q="; 10 10 }; 11 11 12 12 sourceRoot = "snappymail";
+2 -2
pkgs/tools/admin/eksctl/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "eksctl"; 5 - version = "0.112.0"; 5 + version = "0.113.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "weaveworks"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "sha256-kY2AE5lLP1awxfPj16MAhcxO59S3lOZOUXV2EzXDHTY="; 11 + sha256 = "sha256-sHknZg34FHhYcf4l2oPQG6RGpybF0lC4n816YoVPeGk="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-z/3aUSuAZSVsQ67JgUy6z3T91vKHlBjjQS4oSljl/nk=";
+2 -2
pkgs/tools/filesystems/ceph-csi/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "ceph-csi"; 5 - version = "3.7.0"; 5 + version = "3.7.1"; 6 6 7 7 nativeBuildInputs = [ go ]; 8 8 buildInputs = [ ceph ]; ··· 11 11 owner = "ceph"; 12 12 repo = "ceph-csi"; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-DmYwLhJoWPsqtXQp2+vpUuEBfo7dTQkxMVa+/oR6LZk="; 14 + sha256 = "sha256-VlOKN2PjHM0MdDz6t/AAjcFx4F15+7p3+25tLkRQH1Q="; 15 15 }; 16 16 17 17 preConfigure = ''
+2 -2
pkgs/tools/graphics/vips/default.nix
··· 38 38 39 39 stdenv.mkDerivation rec { 40 40 pname = "vips"; 41 - version = "8.13.0"; 41 + version = "8.13.2"; 42 42 43 43 outputs = [ "bin" "out" "man" "dev" ]; 44 44 ··· 46 46 owner = "libvips"; 47 47 repo = "libvips"; 48 48 rev = "v${version}"; 49 - sha256 = "sha256-N2jq68Vs/D+lZcIJVdjBLVaz2gK/TwqKeNfHUWdS3NA="; 49 + sha256 = "sha256-Tff+M2qJ/FPxU7Y5gUnuF+Kbwh8DIW5Tb7fe0Lbi0m4="; 50 50 # Remove unicode file names which leads to different checksums on HFS+ 51 51 # vs. other filesystems because of unicode normalisation. 52 52 postFetch = ''
+2 -2
pkgs/tools/misc/birdfont/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "birdfont"; 7 - version = "2.32.0"; 7 + version = "2.32.3"; 8 8 9 9 src = fetchurl { 10 10 url = "https://birdfont.org/releases/${pname}-${version}.tar.xz"; 11 - sha256 = "sha256-OnbLDKBxk1IGZZlSM/zK6xus6zmzV7OygfvHFBujHUk="; 11 + sha256 = "sha256-ZsYwDS7pgs635P3wPX/PCTuHLX3/Iu97HgVe+qFyjZw="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ python3 pkg-config vala gobject-introspection wrapGAppsHook ];
+4
pkgs/tools/misc/diffoscope/default.nix
··· 82 82 83 83 # disable formatting tests because they can break on black updates 84 84 "test_code_is_black_clean" 85 + 86 + # fails at 2022-09-30 87 + "test_identification" 88 + "test_diff" 85 89 ] ++ lib.optionals stdenv.isDarwin [ 86 90 # Disable flaky tests on Darwin 87 91 "test_non_unicode_filename"
+4 -2
pkgs/tools/misc/minipro/default.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "minipro"; 10 - version = "0.5"; 10 + version = "0.6"; 11 11 12 12 src = fetchFromGitLab { 13 13 owner = "DavidGriffith"; 14 14 repo = "minipro"; 15 15 rev = version; 16 - sha256 = "sha256-Hyj2LyY7W8opjigH+QLHHbDyelC0LMgGgdN+u3nNoJc="; 16 + sha256 = "sha256-6i4PYzSm6lcO/Nb6n3holrNe4TtAnG2o81ZIMAIGqOE="; 17 17 }; 18 18 19 19 nativeBuildInputs = [ pkg-config ]; 20 20 buildInputs = [ libusb1 ]; 21 21 makeFlags = [ 22 + "VERSION=${version}" 22 23 "PREFIX=$(out)" 23 24 "UDEV_DIR=$(out)/lib/udev" 24 25 "COMPLETIONS_DIR=$(out)/share/bash-completion/completions" 25 26 "PKG_CONFIG=${pkg-config}/bin/${pkg-config.targetPrefix}pkg-config" 26 27 "CC=${stdenv.cc.targetPrefix}cc" 28 + "CFLAGS=-O2" 27 29 ]; 28 30 29 31 meta = with lib; {
+73
pkgs/tools/misc/plantuml/plantuml-c4.nix
··· 1 + { lib, stdenv, makeWrapper, fetchzip, runCommand, plantuml, plantuml-c4, jre }: 2 + 3 + # The C4-PlantUML docs say that it suffices to run plantuml with the 4 + # -DRELATIVE_INCLUDE="..." arg to make plantuml find the C4 templates 5 + # when included like "!include C4_Container.puml". 6 + # Unfortunately, this is not sufficient in practise, when the path is not ".". 7 + # What helps is setting -Dplantuml.include.path="..." *before* the jar 8 + # parameter. 9 + # The -DRELATIVE_INCLUDE param then *still* needs to be set (*after* the jar 10 + # argument), because the C4 template vars check for existence of this variable 11 + # and if it is not set, reference paths in the internet. 12 + 13 + let 14 + c4-lib = fetchzip { 15 + url = "https://github.com/plantuml-stdlib/C4-PlantUML/archive/88a3f99150c6ff7953c4a99b184d03412ffdedb1.zip"; 16 + sha256 = "sha256-vk4YWdGb47OsI9mApGTQ7OfELRZdBouzKfUZq3kchcM="; 17 + }; 18 + 19 + sprites = fetchzip { 20 + url = "https://github.com/tupadr3/plantuml-icon-font-sprites/archive/fa3f885dbd45c9cd0cdf6c0e5e4fb51ec8b76582.zip"; 21 + sha256 = "sha256-lt9+NNMIaZSkKNsGyHoqXUCTlKmZFGfNYYGjer6X0Xc="; 22 + }; 23 + 24 + # In order to pre-fix the plantuml.jar parameter with the argument 25 + # -Dplantuml.include.path=..., we post-fix the java command using a wrapper. 26 + # This way the plantuml derivation can remain unchanged. 27 + plantumlWithExtraPath = 28 + let 29 + plantumlIncludePath = lib.concatStringsSep ":" [ c4-lib sprites ]; 30 + includeFlag = "-Dplantuml.include.path=${lib.escapeShellArg plantumlIncludePath}"; 31 + postFixedJre = 32 + runCommand "jre-postfixed" { nativeBuildInputs = [ makeWrapper ]; } '' 33 + mkdir -p $out/bin 34 + 35 + makeWrapper ${jre}/bin/java $out/bin/java \ 36 + --add-flags ${lib.escapeShellArg includeFlag} 37 + ''; 38 + in 39 + plantuml.override { jre = postFixedJre; }; 40 + in 41 + 42 + stdenv.mkDerivation rec { 43 + pname = "plantuml-c4"; 44 + version = "unstable-2022-08-21"; 45 + 46 + nativeBuildInputs = [ makeWrapper ]; 47 + 48 + buildCommand = '' 49 + mkdir -p $out/bin 50 + 51 + makeWrapper ${plantumlWithExtraPath}/bin/plantuml $out/bin/plantuml \ 52 + --add-flags "-DRELATIVE_INCLUDE=\"${c4-lib}\"" 53 + 54 + $out/bin/plantuml -help 55 + ''; 56 + 57 + passthru.tests.example-c4-diagram = 58 + runCommand "c4-plantuml-sample.png" { nativeBuildInputs = [ plantuml-c4 ]; } '' 59 + sed 's/https:.*\///' "${c4-lib}/samples/C4_Context Diagram Sample - enterprise.puml" > sample.puml 60 + plantuml sample.puml -o $out 61 + 62 + sed 's/!include ..\//!include /' ${sprites}/examples/complex-example.puml > sprites.puml 63 + plantuml sprites.puml -o $out 64 + ''; 65 + 66 + meta = with lib; { 67 + description = "PlantUML bundled with C4-Plantuml and plantuml sprites library"; 68 + homepage = "https://github.com/plantuml-stdlib/C4-PlantUML"; 69 + license = licenses.mit; 70 + maintainers = with maintainers; [ tfc ]; 71 + platforms = platforms.unix; 72 + }; 73 + }
+2 -2
pkgs/tools/misc/snapper/default.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "snapper"; 9 - version = "0.10.2"; 9 + version = "0.10.3"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "openSUSE"; 13 13 repo = "snapper"; 14 14 rev = "v${version}"; 15 - sha256 = "0x9anracaa19yqkc0x8wangrkdrx01kdy07c55lvlqrjyimfm4ih"; 15 + sha256 = "sha256-pi2S5dKUB2pjBQjaSJr789Ke5WU1uKp1RYMPKd0W4J0="; 16 16 }; 17 17 18 18 nativeBuildInputs = [
+2 -2
pkgs/tools/networking/davix/default.nix
··· 29 29 boolToUpper = b: lib.toUpper (lib.boolToString b); 30 30 in 31 31 stdenv.mkDerivation rec { 32 - version = "0.8.2"; 32 + version = "0.8.3"; 33 33 pname = "davix" + lib.optionalString enableThirdPartyCopy "-copy"; 34 34 nativeBuildInputs = [ cmake pkg-config python3 ]; 35 35 buildInputs = [ ··· 45 45 # https://github.com/cern-fts/davix/releases/tag/R_0_8_0 46 46 src = fetchurl { 47 47 url = "https://github.com/cern-fts/davix/releases/download/R_${lib.replaceStrings ["."] ["_"] version}/davix-${version}.tar.gz"; 48 - sha256 = "sha256-iBeiTCPxMJud4jO5qIJFX0V8Qu3CpknccP4lJM922Uw="; 48 + sha256 = "sha256-fjC1VB4I0y2/WuA8a8q+rsBjrsEKZkd4eCIie0VBrj4="; 49 49 }; 50 50 51 51 preConfigure = ''
+3 -3
pkgs/tools/security/passphrase2pgp/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "passphrase2pgp"; 5 - version = "1.2.0"; 5 + version = "1.2.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "skeeto"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - hash = "sha256-VNOoYYnHsSgiSbVxlBwYUq0JsLa4BwZQSvMVSiyB6rg="; 11 + hash = "sha256-Ik/W3gGvrOyUvYgMYqT8FIFoxp62BXd2GpV14pYXEuY="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-7q5nwkj4TP7VgHmV9YBbCB11yTPL7tK4gD+uN4Vw3Cs="; 14 + vendorSha256 = "sha256-2H9YRVCaari47ppSkcQYg/P4Dzb4k5PLjKAtfp39NR8="; 15 15 16 16 postInstall = '' 17 17 mkdir -p $out/share/doc/$name
+2 -2
pkgs/tools/system/tree/default.nix
··· 18 18 in 19 19 stdenv.mkDerivation rec { 20 20 pname = "tree"; 21 - version = "2.0.2"; 21 + version = "2.0.4"; 22 22 23 23 src = fetchFromGitLab { 24 24 owner = "OldManProgrammer"; 25 25 repo = "unix-tree"; 26 26 rev = version; 27 - sha256 = "sha256-ex4fD8dZJGplL3oMaSokMBn6PRJ8/s83CnWQaAjBcao="; 27 + sha256 = "sha256-2voXL31JHh09yBBLuHhYyZsUapiPVF/cgRmTU6wSXk4="; 28 28 }; 29 29 30 30 preConfigure = ''
+8 -12
pkgs/top-level/all-packages.nix
··· 3980 3980 3981 3981 fx_cast_bridge = callPackage ../tools/misc/fx_cast { }; 3982 3982 3983 - fzf = callPackage ../tools/misc/fzf { }; 3983 + fzf = callPackage ../tools/misc/fzf { 3984 + buildGoModule = buildGo119Module; 3985 + }; 3984 3986 3985 3987 fzf-obc = callPackage ../shells/bash/fzf-obc { }; 3986 3988 ··· 10124 10126 pk2cmd = callPackage ../tools/misc/pk2cmd { }; 10125 10127 10126 10128 plantuml = callPackage ../tools/misc/plantuml { }; 10129 + 10130 + plantuml-c4 = callPackage ../tools/misc/plantuml/plantuml-c4.nix { }; 10127 10131 10128 10132 plantuml-server = callPackage ../tools/misc/plantuml-server { }; 10129 10133 ··· 27816 27820 27817 27821 fritzprofiles = with python3.pkgs; toPythonApplication fritzprofiles; 27818 27822 27819 - fsv = callPackage ../applications/misc/fsv { 27820 - autoreconfHook = buildPackages.autoreconfHook269; 27821 - }; 27823 + fsv = callPackage ../applications/misc/fsv { }; 27822 27824 27823 27825 ft2-clone = callPackage ../applications/audio/ft2-clone { 27824 27826 inherit (darwin.apple_sdk.frameworks) CoreAudio CoreMIDI CoreServices Cocoa; ··· 29127 29129 29128 29130 k3sup = callPackage ../applications/networking/cluster/k3sup {}; 29129 29131 29130 - kconf = callPackage ../applications/networking/cluster/kconf { 29131 - # pinned due to build failure or vendoring problems. When unpinning double check with: nix-build -A $name.go-modules --rebuild 29132 - buildGoModule = buildGo117Module; 29133 - }; 29132 + kconf = callPackage ../applications/networking/cluster/kconf { }; 29134 29133 29135 29134 kail = callPackage ../tools/networking/kail { }; 29136 29135 ··· 29277 29276 29278 29277 kubebuilder = callPackage ../applications/networking/cluster/kubebuilder { }; 29279 29278 29280 - kuttl = callPackage ../applications/networking/cluster/kuttl { 29281 - # pinned due to build failure or vendoring problems. When unpinning double check with: nix-build -A $name.go-modules --rebuild 29282 - buildGoModule = buildGo117Module; 29283 - }; 29279 + kuttl = callPackage ../applications/networking/cluster/kuttl { }; 29284 29280 29285 29281 kubectl-doctor = callPackage ../applications/networking/cluster/kubectl-doctor { 29286 29282 # pinned due to build failure or vendoring problems. When unpinning double check with: nix-build -A $name.go-modules --rebuild