Merge master into staging-next

authored by github-actions[bot] and committed by GitHub 28abf69f 1b54e5bb

+283 -361
+3 -1
nixos/modules/installer/netboot/netboot.nix
··· 94 95 system.build.netbootIpxeScript = pkgs.writeTextDir "netboot.ipxe" '' 96 #!ipxe 97 - kernel ${pkgs.stdenv.hostPlatform.linux-kernel.target} init=${config.system.build.toplevel}/init initrd=initrd ${toString config.boot.kernelParams} 98 initrd initrd 99 boot 100 '';
··· 94 95 system.build.netbootIpxeScript = pkgs.writeTextDir "netboot.ipxe" '' 96 #!ipxe 97 + # Use the cmdline variable to allow the user to specify custom kernel params 98 + # when chainloading this script from other iPXE scripts like netboot.xyz 99 + kernel ${pkgs.stdenv.hostPlatform.linux-kernel.target} init=${config.system.build.toplevel}/init initrd=initrd ${toString config.boot.kernelParams} ''${cmdline} 100 initrd initrd 101 boot 102 '';
+1
nixos/tests/all-tests.nix
··· 104 discourse = handleTest ./discourse.nix {}; 105 dnscrypt-proxy2 = handleTestOn ["x86_64-linux"] ./dnscrypt-proxy2.nix {}; 106 dnscrypt-wrapper = handleTestOn ["x86_64-linux"] ./dnscrypt-wrapper {}; 107 doas = handleTest ./doas.nix {}; 108 docker = handleTestOn ["x86_64-linux"] ./docker.nix {}; 109 docker-rootless = handleTestOn ["x86_64-linux"] ./docker-rootless.nix {};
··· 104 discourse = handleTest ./discourse.nix {}; 105 dnscrypt-proxy2 = handleTestOn ["x86_64-linux"] ./dnscrypt-proxy2.nix {}; 106 dnscrypt-wrapper = handleTestOn ["x86_64-linux"] ./dnscrypt-wrapper {}; 107 + dnsdist = handleTest ./dnsdist.nix {}; 108 doas = handleTest ./doas.nix {}; 109 docker = handleTestOn ["x86_64-linux"] ./docker.nix {}; 110 docker-rootless = handleTestOn ["x86_64-linux"] ./docker-rootless.nix {};
+48
nixos/tests/dnsdist.nix
···
··· 1 + import ./make-test-python.nix ( 2 + { pkgs, ... }: { 3 + name = "dnsdist"; 4 + meta = with pkgs.lib; { 5 + maintainers = with maintainers; [ jojosch ]; 6 + }; 7 + 8 + machine = { pkgs, lib, ... }: { 9 + services.bind = { 10 + enable = true; 11 + extraOptions = "empty-zones-enable no;"; 12 + zones = lib.singleton { 13 + name = "."; 14 + master = true; 15 + file = pkgs.writeText "root.zone" '' 16 + $TTL 3600 17 + . IN SOA ns.example.org. admin.example.org. ( 1 3h 1h 1w 1d ) 18 + . IN NS ns.example.org. 19 + 20 + ns.example.org. IN A 192.168.0.1 21 + ns.example.org. IN AAAA abcd::1 22 + 23 + 1.0.168.192.in-addr.arpa IN PTR ns.example.org. 24 + ''; 25 + }; 26 + }; 27 + services.dnsdist = { 28 + enable = true; 29 + listenPort = 5353; 30 + extraConfig = '' 31 + newServer({address="127.0.0.1:53", name="local-bind"}) 32 + ''; 33 + }; 34 + 35 + environment.systemPackages = with pkgs; [ dig ]; 36 + }; 37 + 38 + testScript = '' 39 + machine.wait_for_unit("bind.service") 40 + machine.wait_for_open_port(53) 41 + machine.succeed("dig @127.0.0.1 +short -x 192.168.0.1 | grep -qF ns.example.org") 42 + 43 + machine.wait_for_unit("dnsdist.service") 44 + machine.wait_for_open_port(5353) 45 + machine.succeed("dig @127.0.0.1 -p 5353 +short -x 192.168.0.1 | grep -qF ns.example.org") 46 + ''; 47 + } 48 + )
-2
pkgs/applications/audio/pifi/Gemfile
··· 1 - source 'https://rubygems.org' 2 - gem 'pifi'
···
-39
pkgs/applications/audio/pifi/Gemfile.lock
··· 1 - GEM 2 - remote: https://rubygems.org/ 3 - specs: 4 - daemons (1.3.1) 5 - eventmachine (1.2.7) 6 - json (2.5.1) 7 - mustermann (1.1.1) 8 - ruby2_keywords (~> 0.0.1) 9 - optimist (3.0.1) 10 - pifi (0.4.11) 11 - json (~> 2.2) 12 - optimist (~> 3.0) 13 - ruby-mpd (~> 0.3) 14 - sinatra (~> 2.0) 15 - thin (~> 1.7) 16 - rack (2.2.3) 17 - rack-protection (2.1.0) 18 - rack 19 - ruby-mpd (0.3.3) 20 - ruby2_keywords (0.0.4) 21 - sinatra (2.1.0) 22 - mustermann (~> 1.0) 23 - rack (~> 2.2) 24 - rack-protection (= 2.1.0) 25 - tilt (~> 2.0) 26 - thin (1.8.0) 27 - daemons (~> 1.0, >= 1.0.9) 28 - eventmachine (~> 1.0, >= 1.0.4) 29 - rack (>= 1, < 3) 30 - tilt (2.0.10) 31 - 32 - PLATFORMS 33 - ruby 34 - 35 - DEPENDENCIES 36 - pifi 37 - 38 - BUNDLED WITH 39 - 2.1.4
···
-18
pkgs/applications/audio/pifi/default.nix
··· 1 - { lib, bundlerEnv, ruby }: 2 - 3 - bundlerEnv rec { 4 - pname = "pifi"; 5 - 6 - version = (import ./gemset.nix).pifi.version; 7 - inherit ruby; 8 - # expects Gemfile, Gemfile.lock and gemset.nix in the same directory 9 - gemdir = ./.; 10 - 11 - meta = with lib; { 12 - description = "MPD web client to listen to radio, written in React and Sinatra"; 13 - homepage = "https://github.com/rccavalcanti/pifi-radio"; 14 - license = with licenses; gpl3Only; 15 - maintainers = with maintainers; [ kmein ]; 16 - platforms = platforms.unix; 17 - }; 18 - }
···
-137
pkgs/applications/audio/pifi/gemset.nix
··· 1 - { 2 - daemons = { 3 - groups = ["default"]; 4 - platforms = []; 5 - source = { 6 - remotes = ["https://rubygems.org"]; 7 - sha256 = "0l5gai3vd4g7aqff0k1mp41j9zcsvm2rbwmqn115a325k9r7pf4w"; 8 - type = "gem"; 9 - }; 10 - version = "1.3.1"; 11 - }; 12 - eventmachine = { 13 - groups = ["default"]; 14 - platforms = []; 15 - source = { 16 - remotes = ["https://rubygems.org"]; 17 - sha256 = "0wh9aqb0skz80fhfn66lbpr4f86ya2z5rx6gm5xlfhd05bj1ch4r"; 18 - type = "gem"; 19 - }; 20 - version = "1.2.7"; 21 - }; 22 - json = { 23 - groups = ["default"]; 24 - platforms = []; 25 - source = { 26 - remotes = ["https://rubygems.org"]; 27 - sha256 = "0lrirj0gw420kw71bjjlqkqhqbrplla61gbv1jzgsz6bv90qr3ci"; 28 - type = "gem"; 29 - }; 30 - version = "2.5.1"; 31 - }; 32 - mustermann = { 33 - dependencies = ["ruby2_keywords"]; 34 - groups = ["default"]; 35 - platforms = []; 36 - source = { 37 - remotes = ["https://rubygems.org"]; 38 - sha256 = "0ccm54qgshr1lq3pr1dfh7gphkilc19dp63rw6fcx7460pjwy88a"; 39 - type = "gem"; 40 - }; 41 - version = "1.1.1"; 42 - }; 43 - optimist = { 44 - groups = ["default"]; 45 - platforms = []; 46 - source = { 47 - remotes = ["https://rubygems.org"]; 48 - sha256 = "1vg2chy1cfmdj6c1gryl8zvjhhmb3plwgyh1jfnpq4fnfqv7asrk"; 49 - type = "gem"; 50 - }; 51 - version = "3.0.1"; 52 - }; 53 - pifi = { 54 - dependencies = ["json" "optimist" "ruby-mpd" "sinatra" "thin"]; 55 - groups = ["default"]; 56 - platforms = []; 57 - source = { 58 - remotes = ["https://rubygems.org"]; 59 - sha256 = "0xwjaql852m0p7himc3pak1ibc8lfxi29bbgic153wp713xc2cga"; 60 - type = "gem"; 61 - }; 62 - version = "0.4.11"; 63 - }; 64 - rack = { 65 - groups = ["default"]; 66 - platforms = []; 67 - source = { 68 - remotes = ["https://rubygems.org"]; 69 - sha256 = "0i5vs0dph9i5jn8dfc6aqd6njcafmb20rwqngrf759c9cvmyff16"; 70 - type = "gem"; 71 - }; 72 - version = "2.2.3"; 73 - }; 74 - rack-protection = { 75 - dependencies = ["rack"]; 76 - groups = ["default"]; 77 - platforms = []; 78 - source = { 79 - remotes = ["https://rubygems.org"]; 80 - sha256 = "159a4j4kragqh0z0z8vrpilpmaisnlz3n7kgiyf16bxkwlb3qlhz"; 81 - type = "gem"; 82 - }; 83 - version = "2.1.0"; 84 - }; 85 - ruby-mpd = { 86 - groups = ["default"]; 87 - platforms = []; 88 - source = { 89 - remotes = ["https://rubygems.org"]; 90 - sha256 = "0l80gbnma009pfcqgz4azbngkr5jn9nm46fflx5p7c4vz4kwshpc"; 91 - type = "gem"; 92 - }; 93 - version = "0.3.3"; 94 - }; 95 - ruby2_keywords = { 96 - groups = ["default"]; 97 - platforms = []; 98 - source = { 99 - remotes = ["https://rubygems.org"]; 100 - sha256 = "15wfcqxyfgka05v2a7kpg64x57gl1y4xzvnc9lh60bqx5sf1iqrs"; 101 - type = "gem"; 102 - }; 103 - version = "0.0.4"; 104 - }; 105 - sinatra = { 106 - dependencies = ["mustermann" "rack" "rack-protection" "tilt"]; 107 - groups = ["default"]; 108 - platforms = []; 109 - source = { 110 - remotes = ["https://rubygems.org"]; 111 - sha256 = "0dd53rzpkxgs697pycbhhgc9vcnxra4ly4xar8ni6aiydx2f88zk"; 112 - type = "gem"; 113 - }; 114 - version = "2.1.0"; 115 - }; 116 - thin = { 117 - dependencies = ["daemons" "eventmachine" "rack"]; 118 - groups = ["default"]; 119 - platforms = []; 120 - source = { 121 - remotes = ["https://rubygems.org"]; 122 - sha256 = "0g5p3r47qxxfmfagdf8wb68pd24938cgzdfn6pmpysrn296pg5m5"; 123 - type = "gem"; 124 - }; 125 - version = "1.8.0"; 126 - }; 127 - tilt = { 128 - groups = ["default"]; 129 - platforms = []; 130 - source = { 131 - remotes = ["https://rubygems.org"]; 132 - sha256 = "0rn8z8hda4h41a64l0zhkiwz2vxw9b1nb70gl37h1dg2k874yrlv"; 133 - type = "gem"; 134 - }; 135 - version = "2.0.10"; 136 - }; 137 - }
···
-79
pkgs/applications/misc/airtame/default.nix
··· 1 - { stdenv, lib, fetchurl, makeDesktopItem, makeWrapper 2 - , alsa-lib, atk, cairo, cups, curl, dbus, expat, ffmpeg_3, fontconfig, freetype 3 - , gdk-pixbuf, glib, glibc, gnome2, gtk2, libX11, libXScrnSaver, libXcomposite 4 - , libXcursor, libXdamage, libXext, libXfixes, libXi, libXrandr, libXrender 5 - , libXtst, libopus, libpulseaudio, libxcb, nspr, nss, pango, udev, x264 6 - }: 7 - 8 - let libPath = lib.makeLibraryPath [ 9 - alsa-lib atk cairo cups curl dbus expat ffmpeg_3 fontconfig freetype gdk-pixbuf 10 - glib glibc gnome2.GConf gtk2 libopus nspr nss pango stdenv.cc.cc udev x264 11 - libX11 libXScrnSaver libXcomposite libXcursor libXdamage libXext libXfixes 12 - libXi libXrandr libXrender libXtst libpulseaudio libxcb 13 - ]; 14 - in stdenv.mkDerivation rec { 15 - pname = "airtame"; 16 - version = "3.3.0"; 17 - longName = "${pname}-application"; 18 - 19 - src = fetchurl { 20 - url = "https://downloads.airtame.com/application/ga/lin_x64/releases/${longName}-${version}.tar.gz"; 21 - sha256 = "16ca1vcxpka26jcrfbxpq74kcizgrm138j94bby6kzqp2swhrl76"; 22 - }; 23 - 24 - nativeBuildInputs = [ makeWrapper ]; 25 - 26 - desktopItem = makeDesktopItem rec { 27 - name = "airtame"; 28 - exec = longName; 29 - comment = "Airtame Streaming Client"; 30 - desktopName = "Airtame"; 31 - icon = name; 32 - genericName = comment; 33 - categories = "Network;"; 34 - }; 35 - 36 - installPhase = '' 37 - opt="$out/opt/airtame" 38 - mkdir -p "$opt" 39 - cp -R . "$opt" 40 - mkdir -p "$out/bin" 41 - ln -s "$opt/${longName}" "$out/bin/" 42 - mkdir -p "$out/share" 43 - cp -r "${desktopItem}/share/applications" "$out/share/" 44 - mkdir -p "$out/share/icons" 45 - ln -s "$opt/icon.png" "$out/share/icons/airtame.png" 46 - 47 - # Flags and rpath are copied from launch-airtame.sh. 48 - vendorlib="\ 49 - $opt/resources/app.asar.unpacked/modules/streamer/dist/deps/airtame-modules:\ 50 - $opt/resources/app.asar.unpacked/encryption/out/lib:\ 51 - $opt/resources/deps/airtame-core/lib:\ 52 - $opt/resources/deps/airtame-encryption/lib" 53 - 54 - echo $vendorlib 55 - 56 - rpath="${libPath}:$opt:$vendorlib" 57 - 58 - find "$opt" \( -type f -executable -o -name "*.so" -o -name "*.so.*" \) \ 59 - -exec patchelf --set-rpath "$rpath" {} \; 60 - 61 - # The main binary also needs libudev which was removed by --shrink-rpath. 62 - interp="$(< $NIX_CC/nix-support/dynamic-linker)" 63 - patchelf --set-interpreter "$interp" $opt/${longName} 64 - 65 - wrapProgram $opt/${longName} \ 66 - --prefix LD_LIBRARY_PATH=$rpath \ 67 - --add-flags "--disable-gpu --enable-transparent-visuals" 68 - ''; 69 - 70 - dontPatchELF = true; 71 - 72 - meta = with lib; { 73 - homepage = "https://airtame.com/download"; 74 - description = "Wireless streaming client for Airtame devices"; 75 - license = licenses.unfree; 76 - maintainers = with maintainers; [ thanegill ]; 77 - platforms = platforms.linux; 78 - }; 79 - }
···
+24
pkgs/applications/misc/octoprint/plugins.nix
··· 420 }; 421 }; 422 423 octoprint-dashboard = buildPlugin rec { 424 pname = "OctoPrint-Dashboard"; 425 version = "1.18.3";
··· 420 }; 421 }; 422 423 + octolapse = buildPlugin rec { 424 + pname = "Octolapse"; 425 + version = "0.4.1"; 426 + 427 + src = fetchFromGitHub { 428 + owner = "FormerLurker"; 429 + repo = pname; 430 + rev = "v${version}"; 431 + sha256 = "13q20g7brabplc198jh67lk65rn140r8217iak9b2jy3in8fggv4"; 432 + }; 433 + 434 + # Test fails due to code executed on import, see #136513 435 + #pythonImportsCheck = [ "octoprint_octolapse" ]; 436 + 437 + propagatedBuildInputs = with super; [ awesome-slugify setuptools pillow sarge six psutil file-read-backwards ]; 438 + 439 + meta = with lib; { 440 + description = "Stabilized timelapses for Octoprint"; 441 + homepage = "https://github.com/FormerLurker/OctoLapse"; 442 + license = licenses.agpl3Plus; 443 + maintainers = with maintainers; [ illustris j0hax ]; 444 + }; 445 + }; 446 + 447 octoprint-dashboard = buildPlugin rec { 448 pname = "OctoPrint-Dashboard"; 449 version = "1.18.3";
+3 -3
pkgs/data/misc/v2ray-geoip/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "v2ray-geoip"; 5 - version = "202201060033"; 6 7 src = fetchFromGitHub { 8 owner = "v2fly"; 9 repo = "geoip"; 10 - rev = "57f0e64ece0582314958c027198b8e50daa353d2"; 11 - sha256 = "sha256-RG7sLp9u8k1U5XVFcwAF57UcvwhF3pFKCFLLJ2x7q00="; 12 }; 13 14 installPhase = ''
··· 2 3 stdenv.mkDerivation rec { 4 pname = "v2ray-geoip"; 5 + version = "202201130034"; 6 7 src = fetchFromGitHub { 8 owner = "v2fly"; 9 repo = "geoip"; 10 + rev = "68254f88c97e6ac1ec587bcf6491902ccf29a447"; 11 + sha256 = "sha256-fpwJpXampcHiP68ABcEW5HawPuLwbcmNOY0aiFSzwcs="; 12 }; 13 14 installPhase = ''
+29 -40
pkgs/development/compilers/inklecate/default.nix
··· 1 - { lib, stdenv, fetchurl, unzip, makeWrapper }: 2 3 - stdenv.mkDerivation rec { 4 pname = "inklecate"; 5 version = "1.0.0"; 6 7 - src = 8 - if stdenv.isLinux then 9 - fetchurl { 10 - url = "https://github.com/inkle/ink/releases/download/v${version}/inklecate_linux.zip"; 11 - sha256 = "6e17db766222998ba0ae5a5da9857e34896e683b9ec42fad528c3f8bea7398ea"; 12 - name = "${pname}-${version}"; 13 - } 14 - else if stdenv.isDarwin then 15 - fetchurl { 16 - url = "https://github.com/inkle/ink/releases/download/v${version}/inklecate_mac.zip"; 17 - sha256 = "b6f4dd1f95c180637ce193dbb5fa6d59aeafe49a2121a05b7822e6cbbaa6931f"; 18 - name = "${pname}-${version}"; 19 - } 20 - else throw "Not supported on ${stdenv.hostPlatform.system}."; 21 22 - # Work around the "unpacker appears to have produced no directories" 23 - # case that happens when the archive doesn't have a subdirectory. 24 - setSourceRoot = "sourceRoot=$(pwd)"; 25 26 - nativeBuildInputs = [ unzip makeWrapper ]; 27 - 28 - unpackPhase = '' 29 - unzip -qq -j $src -d $pname-$version 30 - 31 - rm $pname-$version/ink-engine-runtime.dll 32 - rm $pname-$version/ink_compiler.dll 33 - ''; 34 - 35 - installPhase = '' 36 - mkdir -p $out/bin/ 37 - 38 - cp $pname-$version/inklecate $out/bin/inklecate 39 - ''; 40 41 42 meta = with lib; { 43 - description = "Compiler for ink, inkle's scripting language"; 44 longDescription = '' 45 Inklecate is a command-line compiler for ink, inkle's open source 46 scripting language for writing interactive narrative 47 - ''; 48 - homepage = "https://www.inklestudios.com/ink/"; 49 - downloadPage = "https://github.com/inkle/ink/releases"; 50 - license = licenses.mit; 51 - platforms = platforms.unix; 52 - maintainers = with maintainers; [ shreerammodi ]; 53 }; 54 }
··· 1 + { lib 2 + , stdenv 3 + , autoPatchelfHook 4 + , buildDotnetModule 5 + , dotnetCorePackages 6 + , fetchFromGitHub 7 + }: 8 9 + buildDotnetModule rec { 10 pname = "inklecate"; 11 version = "1.0.0"; 12 13 + src = fetchFromGitHub { 14 + owner = "inkle"; 15 + repo = "ink"; 16 + rev = "v${version}"; 17 + sha256 = "00lagmwsbxap5mgnw4gndpavmv3xsgincdaq1zvw7fkc3vn3pxqc"; 18 + }; 19 20 + nativeBuildInputs = [ autoPatchelfHook ]; 21 + buildInputs = [ stdenv.cc.cc.lib ]; 22 23 + projectFile = "inklecate/inklecate.csproj"; 24 + nugetDeps = if stdenv.isDarwin then ./deps-darwin.nix else ./deps-linux.nix; 25 + executables = [ "inklecate" ]; 26 27 + dotnet-runtime = dotnetCorePackages.runtime_3_1; 28 + dotnet-sdk = dotnetCorePackages.sdk_6_0; 29 30 meta = with lib; { 31 + description = "Compiler for ink, inkle's scripting language"; 32 longDescription = '' 33 Inklecate is a command-line compiler for ink, inkle's open source 34 scripting language for writing interactive narrative 35 + ''; 36 + homepage = "https://www.inklestudios.com/ink/"; 37 + downloadPage = "https://github.com/inkle/ink/"; 38 + license = licenses.mit; 39 + platforms = platforms.unix; 40 + badPlatforms = platforms.aarch64; 41 + maintainers = with maintainers; [ shreerammodi ]; 42 }; 43 }
+31
pkgs/development/compilers/inklecate/deps-darwin.nix
···
··· 1 + { fetchNuGet }: [ 2 + (fetchNuGet { pname = "Microsoft.AspNetCore.App.Ref"; version = "3.1.10"; sha256 = "0xn4zh7shvijqlr03fqsmps6gz856isd9bg9rk4z2c4599ggal77"; }) 3 + (fetchNuGet { pname = "Microsoft.NETCore.App.Host.osx-x64"; version = "3.1.21"; sha256 = "1s5g9gk0hvs268q2zpc32m0my2m2ivlmsmza86797a9vkxr6pzw6"; }) 4 + (fetchNuGet { pname = "Microsoft.NETCore.App.Ref"; version = "3.1.0"; sha256 = "08svsiilx9spvjamcnjswv0dlpdrgryhr3asdz7cvnl914gjzq4y"; }) 5 + (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "1.1.0"; sha256 = "08vh1r12g6ykjygq5d3vq09zylgb84l63k49jc4v8faw9g93iqqm"; }) 6 + (fetchNuGet { pname = "Microsoft.NETCore.Targets"; version = "1.1.0"; sha256 = "193xwf33fbm0ni3idxzbr5fdq3i2dlfgihsac9jj7whj0gd902nh"; }) 7 + (fetchNuGet { pname = "NETStandard.Library"; version = "1.6.1"; sha256 = "1z70wvsx2d847a2cjfii7b83pjfs34q05gb037fdjikv5kbagml8"; }) 8 + (fetchNuGet { pname = "NETStandard.Library"; version = "2.0.3"; sha256 = "1fn9fxppfcg4jgypp2pmrpr6awl3qz1xmnri0cygpkwvyx27df1y"; }) 9 + (fetchNuGet { pname = "System.Collections"; version = "4.3.0"; sha256 = "19r4y64dqyrq6k4706dnyhhw7fs24kpp3awak7whzss39dakpxk9"; }) 10 + (fetchNuGet { pname = "System.Diagnostics.Debug"; version = "4.3.0"; sha256 = "00yjlf19wjydyr6cfviaph3vsjzg3d5nvnya26i2fvfg53sknh3y"; }) 11 + (fetchNuGet { pname = "System.Diagnostics.Tools"; version = "4.3.0"; sha256 = "0in3pic3s2ddyibi8cvgl102zmvp9r9mchh82ns9f0ms4basylw1"; }) 12 + (fetchNuGet { pname = "System.Globalization"; version = "4.3.0"; sha256 = "1cp68vv683n6ic2zqh2s1fn4c2sd87g5hpp6l4d4nj4536jz98ki"; }) 13 + (fetchNuGet { pname = "System.IO"; version = "4.3.0"; sha256 = "05l9qdrzhm4s5dixmx68kxwif4l99ll5gqmh7rqgw554fx0agv5f"; }) 14 + (fetchNuGet { pname = "System.Linq.Expressions"; version = "4.3.0"; sha256 = "0ky2nrcvh70rqq88m9a5yqabsl4fyd17bpr63iy2mbivjs2nyypv"; }) 15 + (fetchNuGet { pname = "System.Linq"; version = "4.3.0"; sha256 = "1w0gmba695rbr80l1k2h4mrwzbzsyfl2z4klmpbsvsg5pm4a56s7"; }) 16 + (fetchNuGet { pname = "System.Net.Primitives"; version = "4.3.0"; sha256 = "0c87k50rmdgmxx7df2khd9qj7q35j9rzdmm2572cc55dygmdk3ii"; }) 17 + (fetchNuGet { pname = "System.ObjectModel"; version = "4.3.0"; sha256 = "191p63zy5rpqx7dnrb3h7prvgixmk168fhvvkkvhlazncf8r3nc2"; }) 18 + (fetchNuGet { pname = "System.Reflection.Extensions"; version = "4.3.0"; sha256 = "02bly8bdc98gs22lqsfx9xicblszr2yan7v2mmw3g7hy6miq5hwq"; }) 19 + (fetchNuGet { pname = "System.Reflection.Primitives"; version = "4.3.0"; sha256 = "04xqa33bld78yv5r93a8n76shvc8wwcdgr1qvvjh959g3rc31276"; }) 20 + (fetchNuGet { pname = "System.Reflection"; version = "4.3.0"; sha256 = "0xl55k0mw8cd8ra6dxzh974nxif58s3k1rjv1vbd7gjbjr39j11m"; }) 21 + (fetchNuGet { pname = "System.Resources.ResourceManager"; version = "4.3.0"; sha256 = "0sjqlzsryb0mg4y4xzf35xi523s4is4hz9q4qgdvlvgivl7qxn49"; }) 22 + (fetchNuGet { pname = "System.Runtime.Extensions"; version = "4.3.0"; sha256 = "1ykp3dnhwvm48nap8q23893hagf665k0kn3cbgsqpwzbijdcgc60"; }) 23 + (fetchNuGet { pname = "System.Runtime"; version = "4.3.0"; sha256 = "066ixvgbf2c929kgknshcxqj6539ax7b9m570cp8n179cpfkapz7"; }) 24 + (fetchNuGet { pname = "System.Text.Encoding.Extensions"; version = "4.3.0"; sha256 = "11q1y8hh5hrp5a3kw25cb6l00v5l5dvirkz8jr3sq00h1xgcgrxy"; }) 25 + (fetchNuGet { pname = "System.Text.Encoding"; version = "4.3.0"; sha256 = "1f04lkir4iladpp51sdgmis9dj4y8v08cka0mbmsy0frc9a4gjqr"; }) 26 + (fetchNuGet { pname = "System.Text.RegularExpressions"; version = "4.3.0"; sha256 = "1bgq51k7fwld0njylfn7qc5fmwrk2137gdq7djqdsw347paa9c2l"; }) 27 + (fetchNuGet { pname = "System.Threading.Tasks"; version = "4.3.0"; sha256 = "134z3v9abw3a6jsw17xl3f6hqjpak5l682k2vz39spj4kmydg6k7"; }) 28 + (fetchNuGet { pname = "System.Threading"; version = "4.3.0"; sha256 = "0rw9wfamvhayp5zh3j7p1yfmx9b5khbf4q50d8k5rk993rskfd34"; }) 29 + (fetchNuGet { pname = "System.Xml.ReaderWriter"; version = "4.3.0"; sha256 = "0c47yllxifzmh8gq6rq6l36zzvw4kjvlszkqa9wq3fr59n0hl3s1"; }) 30 + (fetchNuGet { pname = "System.Xml.XDocument"; version = "4.3.0"; sha256 = "08h8fm4l77n0nd4i4fk2386y809bfbwqb7ih9d7564ifcxr5ssxd"; }) 31 + ]
+31
pkgs/development/compilers/inklecate/deps-linux.nix
···
··· 1 + { fetchNuGet }: [ 2 + (fetchNuGet { pname = "Microsoft.AspNetCore.App.Ref"; version = "3.1.10"; sha256 = "0xn4zh7shvijqlr03fqsmps6gz856isd9bg9rk4z2c4599ggal77"; }) 3 + (fetchNuGet { pname = "Microsoft.NETCore.App.Host.linux-x64"; version = "3.1.21"; sha256 = "01kbhi29lhv6mg1zfsyakz3z8hfbxnc0kxy0fczl8xqviik9svx7"; }) 4 + (fetchNuGet { pname = "Microsoft.NETCore.App.Ref"; version = "3.1.0"; sha256 = "08svsiilx9spvjamcnjswv0dlpdrgryhr3asdz7cvnl914gjzq4y"; }) 5 + (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "1.1.0"; sha256 = "08vh1r12g6ykjygq5d3vq09zylgb84l63k49jc4v8faw9g93iqqm"; }) 6 + (fetchNuGet { pname = "Microsoft.NETCore.Targets"; version = "1.1.0"; sha256 = "193xwf33fbm0ni3idxzbr5fdq3i2dlfgihsac9jj7whj0gd902nh"; }) 7 + (fetchNuGet { pname = "NETStandard.Library"; version = "1.6.1"; sha256 = "1z70wvsx2d847a2cjfii7b83pjfs34q05gb037fdjikv5kbagml8"; }) 8 + (fetchNuGet { pname = "NETStandard.Library"; version = "2.0.3"; sha256 = "1fn9fxppfcg4jgypp2pmrpr6awl3qz1xmnri0cygpkwvyx27df1y"; }) 9 + (fetchNuGet { pname = "System.Collections"; version = "4.3.0"; sha256 = "19r4y64dqyrq6k4706dnyhhw7fs24kpp3awak7whzss39dakpxk9"; }) 10 + (fetchNuGet { pname = "System.Diagnostics.Debug"; version = "4.3.0"; sha256 = "00yjlf19wjydyr6cfviaph3vsjzg3d5nvnya26i2fvfg53sknh3y"; }) 11 + (fetchNuGet { pname = "System.Diagnostics.Tools"; version = "4.3.0"; sha256 = "0in3pic3s2ddyibi8cvgl102zmvp9r9mchh82ns9f0ms4basylw1"; }) 12 + (fetchNuGet { pname = "System.Globalization"; version = "4.3.0"; sha256 = "1cp68vv683n6ic2zqh2s1fn4c2sd87g5hpp6l4d4nj4536jz98ki"; }) 13 + (fetchNuGet { pname = "System.IO"; version = "4.3.0"; sha256 = "05l9qdrzhm4s5dixmx68kxwif4l99ll5gqmh7rqgw554fx0agv5f"; }) 14 + (fetchNuGet { pname = "System.Linq"; version = "4.3.0"; sha256 = "1w0gmba695rbr80l1k2h4mrwzbzsyfl2z4klmpbsvsg5pm4a56s7"; }) 15 + (fetchNuGet { pname = "System.Linq.Expressions"; version = "4.3.0"; sha256 = "0ky2nrcvh70rqq88m9a5yqabsl4fyd17bpr63iy2mbivjs2nyypv"; }) 16 + (fetchNuGet { pname = "System.Net.Primitives"; version = "4.3.0"; sha256 = "0c87k50rmdgmxx7df2khd9qj7q35j9rzdmm2572cc55dygmdk3ii"; }) 17 + (fetchNuGet { pname = "System.ObjectModel"; version = "4.3.0"; sha256 = "191p63zy5rpqx7dnrb3h7prvgixmk168fhvvkkvhlazncf8r3nc2"; }) 18 + (fetchNuGet { pname = "System.Reflection"; version = "4.3.0"; sha256 = "0xl55k0mw8cd8ra6dxzh974nxif58s3k1rjv1vbd7gjbjr39j11m"; }) 19 + (fetchNuGet { pname = "System.Reflection.Extensions"; version = "4.3.0"; sha256 = "02bly8bdc98gs22lqsfx9xicblszr2yan7v2mmw3g7hy6miq5hwq"; }) 20 + (fetchNuGet { pname = "System.Reflection.Primitives"; version = "4.3.0"; sha256 = "04xqa33bld78yv5r93a8n76shvc8wwcdgr1qvvjh959g3rc31276"; }) 21 + (fetchNuGet { pname = "System.Resources.ResourceManager"; version = "4.3.0"; sha256 = "0sjqlzsryb0mg4y4xzf35xi523s4is4hz9q4qgdvlvgivl7qxn49"; }) 22 + (fetchNuGet { pname = "System.Runtime"; version = "4.3.0"; sha256 = "066ixvgbf2c929kgknshcxqj6539ax7b9m570cp8n179cpfkapz7"; }) 23 + (fetchNuGet { pname = "System.Runtime.Extensions"; version = "4.3.0"; sha256 = "1ykp3dnhwvm48nap8q23893hagf665k0kn3cbgsqpwzbijdcgc60"; }) 24 + (fetchNuGet { pname = "System.Text.Encoding"; version = "4.3.0"; sha256 = "1f04lkir4iladpp51sdgmis9dj4y8v08cka0mbmsy0frc9a4gjqr"; }) 25 + (fetchNuGet { pname = "System.Text.Encoding.Extensions"; version = "4.3.0"; sha256 = "11q1y8hh5hrp5a3kw25cb6l00v5l5dvirkz8jr3sq00h1xgcgrxy"; }) 26 + (fetchNuGet { pname = "System.Text.RegularExpressions"; version = "4.3.0"; sha256 = "1bgq51k7fwld0njylfn7qc5fmwrk2137gdq7djqdsw347paa9c2l"; }) 27 + (fetchNuGet { pname = "System.Threading"; version = "4.3.0"; sha256 = "0rw9wfamvhayp5zh3j7p1yfmx9b5khbf4q50d8k5rk993rskfd34"; }) 28 + (fetchNuGet { pname = "System.Threading.Tasks"; version = "4.3.0"; sha256 = "134z3v9abw3a6jsw17xl3f6hqjpak5l682k2vz39spj4kmydg6k7"; }) 29 + (fetchNuGet { pname = "System.Xml.ReaderWriter"; version = "4.3.0"; sha256 = "0c47yllxifzmh8gq6rq6l36zzvw4kjvlszkqa9wq3fr59n0hl3s1"; }) 30 + (fetchNuGet { pname = "System.Xml.XDocument"; version = "4.3.0"; sha256 = "08h8fm4l77n0nd4i4fk2386y809bfbwqb7ih9d7564ifcxr5ssxd"; }) 31 + ]
+2
pkgs/development/libraries/accountsservice/default.nix
··· 41 buildInputs = [ 42 glib 43 polkit 44 ]; 45 46 mesonFlags = [ 47 "-Dadmin_group=wheel" 48 "-Dlocalstatedir=/var" 49 "-Dsystemdsystemunitdir=${placeholder "out"}/etc/systemd/system" 50 ]; 51 52 postPatch = ''
··· 41 buildInputs = [ 42 glib 43 polkit 44 + systemd 45 ]; 46 47 mesonFlags = [ 48 "-Dadmin_group=wheel" 49 "-Dlocalstatedir=/var" 50 "-Dsystemdsystemunitdir=${placeholder "out"}/etc/systemd/system" 51 + "-Dsystemd=true" 52 ]; 53 54 postPatch = ''
+22
pkgs/development/python-modules/file-read-backwards/default.nix
···
··· 1 + { lib, buildPythonPackage, fetchPypi, mock }: 2 + 3 + buildPythonPackage rec { 4 + pname = "file-read-backwards"; 5 + version = "2.0.0"; 6 + 7 + src = fetchPypi { 8 + pname = "file_read_backwards"; 9 + inherit version; 10 + sha256 = "fd50d9089b412147ea3c6027e2ad905f977002db2918cf315d64eed23d6d6eb8"; 11 + }; 12 + 13 + checkInputs = [ mock ]; 14 + pythonImportsCheck = [ "file_read_backwards" ]; 15 + 16 + meta = with lib; { 17 + homepage = "https://github.com/RobinNil/file_read_backwards"; 18 + description = "Memory efficient way of reading files line-by-line from the end of file"; 19 + license = licenses.mit; 20 + maintainers = with maintainers; [ j0hax ]; 21 + }; 22 + }
+2 -2
pkgs/development/python-modules/torchinfo/default.nix
··· 10 11 buildPythonPackage rec { 12 pname = "torchinfo"; 13 - version = "1.6.2"; 14 disabled = pythonOlder "3.7"; 15 16 src = fetchPypi { 17 inherit pname version; 18 - sha256 = "sha256-vf3TADqIX4RtCU3dN/lBK4aRg3wud/KkK9u5XGnBbO4="; 19 }; 20 21 propagatedBuildInputs = [
··· 10 11 buildPythonPackage rec { 12 pname = "torchinfo"; 13 + version = "1.6.3"; 14 disabled = pythonOlder "3.7"; 15 16 src = fetchPypi { 17 inherit pname version; 18 + sha256 = "sha256-g1xhtdwygzPTTswP8iZ364ynBQE7D+aAsZ3d9EpyvIA="; 19 }; 20 21 propagatedBuildInputs = [
+1
pkgs/development/python-modules/types-freezegun/default.nix
··· 6 buildPythonPackage rec { 7 pname = "types-freezegun"; 8 version = "1.1.6"; 9 10 src = fetchPypi { 11 inherit pname version;
··· 6 buildPythonPackage rec { 7 pname = "types-freezegun"; 8 version = "1.1.6"; 9 + format = "setuptools"; 10 11 src = fetchPypi { 12 inherit pname version;
+5 -1
pkgs/development/python-modules/types-tabulate/default.nix
··· 9 10 src = fetchPypi { 11 inherit pname version; 12 - sha256 = "sha256-A/KDvzhOoSG3tqWK+zj03vl/MHBPyhOg2mhpNrDzkqw="; 13 }; 14 15 # Module doesn't have tests 16 doCheck = false; 17 18 meta = with lib; { 19 description = "Typing stubs for tabulate";
··· 9 10 src = fetchPypi { 11 inherit pname version; 12 + hash = "sha256-A/KDvzhOoSG3tqWK+zj03vl/MHBPyhOg2mhpNrDzkqw="; 13 }; 14 15 # Module doesn't have tests 16 doCheck = false; 17 + 18 + pythonImportsCheck = [ 19 + "tabulate-stubs" 20 + ]; 21 22 meta = with lib; { 23 description = "Typing stubs for tabulate";
+2 -2
pkgs/development/web/nodejs/v17.nix
··· 7 in 8 buildNodejs { 9 inherit enableNpm; 10 - version = "17.3.1"; 11 - sha256 = "070xy8rk5z6jmxiay95sjw0jld6pp2ymig7ryypday5aaiw8y26g"; 12 patches = [ 13 ./disable-darwin-v8-system-instrumentation.patch 14 # Fixes node incorrectly building vendored OpenSSL when we want system OpenSSL.
··· 7 in 8 buildNodejs { 9 inherit enableNpm; 10 + version = "17.4.0"; 11 + sha256 = "1ch1hc5qc13qbk7gmpw729wb7s9kmda6sjlhzdw53iq6fzq7336g"; 12 patches = [ 13 ./disable-darwin-v8-system-instrumentation.patch 14 # Fixes node incorrectly building vendored OpenSSL when we want system OpenSSL.
+2 -2
pkgs/games/vassal/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "VASSAL"; 5 - version = "3.5.8"; 6 7 src = fetchzip { 8 url = "https://github.com/vassalengine/vassal/releases/download/${version}/${pname}-${version}-linux.tar.bz2"; 9 - sha256 = "sha256-IJ3p7+0fs/2dCbE1BOb2580upR9W/1R2/e3xmkAsJ+M="; 10 }; 11 12 nativeBuildInputs = [ makeWrapper ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "VASSAL"; 5 + version = "3.6.1"; 6 7 src = fetchzip { 8 url = "https://github.com/vassalengine/vassal/releases/download/${version}/${pname}-${version}-linux.tar.bz2"; 9 + sha256 = "sha256-elcSwm7KvDpGVBF7Gs6GFreQPyVwWBxYN0NO1N6JWDM="; 10 }; 11 12 nativeBuildInputs = [ makeWrapper ];
+3
pkgs/os-specific/linux/kernel/common-config.nix
··· 462 SECURITY_SELINUX_BOOTPARAM_VALUE = whenOlder "5.1" (freeform "0"); # Disable SELinux by default 463 # Prevent processes from ptracing non-children processes 464 SECURITY_YAMA = option yes; 465 DEVKMEM = whenOlder "5.13" no; # Disable /dev/kmem 466 467 USER_NS = yes; # Support for user namespaces
··· 462 SECURITY_SELINUX_BOOTPARAM_VALUE = whenOlder "5.1" (freeform "0"); # Disable SELinux by default 463 # Prevent processes from ptracing non-children processes 464 SECURITY_YAMA = option yes; 465 + # The goal of Landlock is to enable to restrict ambient rights (e.g. global filesystem access) for a set of processes. 466 + # This does not have any effect if a program does not support it 467 + SECURITY_LANDLOCK = whenAtLeast "5.13" yes; 468 DEVKMEM = whenOlder "5.13" no; # Disable /dev/kmem 469 470 USER_NS = yes; # Support for user namespaces
+15 -15
pkgs/os-specific/linux/kernel/hardened/patches.json
··· 22 "5.10": { 23 "patch": { 24 "extra": "-hardened1", 25 - "name": "linux-hardened-5.10.91-hardened1.patch", 26 - "sha256": "0sswrl880155vphcfm3nb0smjgcgprqmr1baabhwfn62iz5sv29q", 27 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.10.91-hardened1/linux-hardened-5.10.91-hardened1.patch" 28 }, 29 - "sha256": "1lcmhp6njj4ypwkq471mdjapbqvcn6jfqx7z422h8fn6q62gpkk2", 30 - "version": "5.10.91" 31 }, 32 "5.15": { 33 "patch": { 34 "extra": "-hardened1", 35 - "name": "linux-hardened-5.15.14-hardened1.patch", 36 - "sha256": "1vxcdzrnnsgrxk5a9qinqffmgrm1rdd4m68d9kqjrmxg7cnabj65", 37 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.15.14-hardened1/linux-hardened-5.15.14-hardened1.patch" 38 }, 39 - "sha256": "0kbayz4k72hx9b0l9yz2mbgb2xpnpm13snms06r2absv3gkv9wid", 40 - "version": "5.15.14" 41 }, 42 "5.4": { 43 "patch": { 44 "extra": "-hardened1", 45 - "name": "linux-hardened-5.4.171-hardened1.patch", 46 - "sha256": "1wq9r5bs42zyc06zac59rfl1987lwrwm4vi7wnmgvd4ygmvibc8k", 47 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.171-hardened1/linux-hardened-5.4.171-hardened1.patch" 48 }, 49 - "sha256": "0n29bd1kv4rk3ji05vkvxkrzyzq50dxk0zsnk7r5lj45gpnwig5g", 50 - "version": "5.4.171" 51 } 52 }
··· 22 "5.10": { 23 "patch": { 24 "extra": "-hardened1", 25 + "name": "linux-hardened-5.10.92-hardened1.patch", 26 + "sha256": "08vhk7vzwd9r76mphyphc5n718kdpg3l2i0smrr92w5mx19pvs8g", 27 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.10.92-hardened1/linux-hardened-5.10.92-hardened1.patch" 28 }, 29 + "sha256": "0lmvdskxk1r18p6rn2dhw23wj8g3a8blar6xn5x1sgqxln006xfm", 30 + "version": "5.10.92" 31 }, 32 "5.15": { 33 "patch": { 34 "extra": "-hardened1", 35 + "name": "linux-hardened-5.15.15-hardened1.patch", 36 + "sha256": "0js9fz2xx8gshxb5dc6ycmgycmcfqpxdkbpbmx92d397qdnj0460", 37 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.15.15-hardened1/linux-hardened-5.15.15-hardened1.patch" 38 }, 39 + "sha256": "0nisr3i9sxpp0s25wg6sb45287l0v9vmsgnz6d4igbvih37mfg0x", 40 + "version": "5.15.15" 41 }, 42 "5.4": { 43 "patch": { 44 "extra": "-hardened1", 45 + "name": "linux-hardened-5.4.172-hardened1.patch", 46 + "sha256": "124l2b3km1278dc4lgm35f50jfxnbdia1127j27w3b3dhs37baw9", 47 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.172-hardened1/linux-hardened-5.4.172-hardened1.patch" 48 }, 49 + "sha256": "1r3ci123dmijk0n3z91xqri89rbvnk51hd9d4q430ag8cw5qk7mi", 50 + "version": "5.4.172" 51 } 52 }
+2 -2
pkgs/os-specific/linux/kernel/linux-5.10.nix
··· 3 with lib; 4 5 buildLinux (args // rec { 6 - version = "5.10.91"; 7 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 14 src = fetchurl { 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "1lcmhp6njj4ypwkq471mdjapbqvcn6jfqx7z422h8fn6q62gpkk2"; 17 }; 18 } // (args.argsOverride or {}))
··· 3 with lib; 4 5 buildLinux (args // rec { 6 + version = "5.10.92"; 7 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 14 src = fetchurl { 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 + sha256 = "0lmvdskxk1r18p6rn2dhw23wj8g3a8blar6xn5x1sgqxln006xfm"; 17 }; 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.15.nix
··· 3 with lib; 4 5 buildLinux (args // rec { 6 - version = "5.15.14"; 7 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 14 src = fetchurl { 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "0kbayz4k72hx9b0l9yz2mbgb2xpnpm13snms06r2absv3gkv9wid"; 17 }; 18 } // (args.argsOverride or { }))
··· 3 with lib; 4 5 buildLinux (args // rec { 6 + version = "5.15.15"; 7 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 14 src = fetchurl { 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 + sha256 = "0nisr3i9sxpp0s25wg6sb45287l0v9vmsgnz6d4igbvih37mfg0x"; 17 }; 18 } // (args.argsOverride or { }))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.16.nix
··· 3 with lib; 4 5 buildLinux (args // rec { 6 - version = "5.16"; 7 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 14 src = fetchurl { 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "1fq86dbx2p124vi4j8nan68gj4zyw4xnqh4jxq9aqsdvi24pwz82"; 17 }; 18 } // (args.argsOverride or { }))
··· 3 with lib; 4 5 buildLinux (args // rec { 6 + version = "5.16.1"; 7 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 14 src = fetchurl { 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 + sha256 = "0i9mfapsyf9lp8j0g329lgwf6kyi61a00al0hdrfd8bf3hikdgy7"; 17 }; 18 } // (args.argsOverride or { }))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.4.nix
··· 3 with lib; 4 5 buildLinux (args // rec { 6 - version = "5.4.171"; 7 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 14 src = fetchurl { 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "0n29bd1kv4rk3ji05vkvxkrzyzq50dxk0zsnk7r5lj45gpnwig5g"; 17 }; 18 } // (args.argsOverride or {}))
··· 3 with lib; 4 5 buildLinux (args // rec { 6 + version = "5.4.172"; 7 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 14 src = fetchurl { 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 + sha256 = "1r3ci123dmijk0n3z91xqri89rbvnk51hd9d4q430ag8cw5qk7mi"; 17 }; 18 } // (args.argsOverride or {}))
+15 -4
pkgs/servers/dns/dnsdist/default.nix
··· 1 { lib, stdenv, fetchurl, pkg-config, systemd 2 , boost, libsodium, libedit, re2 3 , net-snmp, lua, protobuf, openssl, zlib, h2o 4 }: 5 6 stdenv.mkDerivation rec { 7 pname = "dnsdist"; 8 - version = "1.5.2"; 9 10 src = fetchurl { 11 url = "https://downloads.powerdns.com/releases/dnsdist-${version}.tar.bz2"; 12 - sha256 = "sha256-K9e1M9Lae7RWY8amLkftDS8Zigd/WNxzDEY7eXNjZ0k="; 13 }; 14 15 nativeBuildInputs = [ pkg-config protobuf ]; 16 - buildInputs = [ systemd boost libsodium libedit re2 net-snmp lua openssl zlib h2o ]; 17 18 configureFlags = [ 19 "--with-libsodium" ··· 32 33 enableParallelBuilding = true; 34 35 meta = with lib; { 36 description = "DNS Loadbalancer"; 37 homepage = "https://dnsdist.org"; 38 license = licenses.gpl2; 39 - maintainers = with maintainers; [ SuperSandro2000 ]; 40 }; 41 }
··· 1 { lib, stdenv, fetchurl, pkg-config, systemd 2 , boost, libsodium, libedit, re2 3 , net-snmp, lua, protobuf, openssl, zlib, h2o 4 + , nghttp2, nixosTests 5 }: 6 7 stdenv.mkDerivation rec { 8 pname = "dnsdist"; 9 + version = "1.7.0"; 10 11 src = fetchurl { 12 url = "https://downloads.powerdns.com/releases/dnsdist-${version}.tar.bz2"; 13 + sha256 = "sha256-eMxyywzPf7Xz8vrgnHntplpSVjdNoJu1Qbc16mho/GQ="; 14 }; 15 16 + patches = [ 17 + # Disable tests requiring networking: 18 + # "Error connecting to new server with address 192.0.2.1:53: connecting socket to 192.0.2.1:53: Network is unreachable" 19 + ./disable-network-tests.patch 20 + ]; 21 + 22 nativeBuildInputs = [ pkg-config protobuf ]; 23 + buildInputs = [ systemd boost libsodium libedit re2 net-snmp lua openssl zlib h2o nghttp2 ]; 24 25 configureFlags = [ 26 "--with-libsodium" ··· 39 40 enableParallelBuilding = true; 41 42 + passthru.tests = { 43 + inherit (nixosTests) dnsdist; 44 + }; 45 + 46 meta = with lib; { 47 description = "DNS Loadbalancer"; 48 homepage = "https://dnsdist.org"; 49 license = licenses.gpl2; 50 + maintainers = with maintainers; [ jojosch ]; 51 }; 52 }
+28
pkgs/servers/dns/dnsdist/disable-network-tests.patch
···
··· 1 + diff --git a/test-dnsdisttcp_cc.cc b/test-dnsdisttcp_cc.cc 2 + index 1fbb00e..dc04137 100644 3 + --- a/test-dnsdisttcp_cc.cc 4 + +++ b/test-dnsdisttcp_cc.cc 5 + @@ -848,6 +848,7 @@ BOOST_AUTO_TEST_CASE(test_IncomingConnectionWithProxyProtocol_SelfAnswered) 6 + 7 + BOOST_AUTO_TEST_CASE(test_IncomingConnection_BackendNoOOOR) 8 + { 9 + + return; 10 + auto local = getBackendAddress("1", 80); 11 + ClientState localCS(local, true, false, false, "", {}); 12 + auto tlsCtx = std::make_shared<MockupTLSCtx>(); 13 + @@ -1711,6 +1712,7 @@ BOOST_AUTO_TEST_CASE(test_IncomingConnection_BackendNoOOOR) 14 + 15 + BOOST_AUTO_TEST_CASE(test_IncomingConnectionOOOR_BackendOOOR) 16 + { 17 + + return; 18 + auto local = getBackendAddress("1", 80); 19 + ClientState localCS(local, true, false, false, "", {}); 20 + /* enable out-of-order on the front side */ 21 + @@ -3677,6 +3679,7 @@ BOOST_AUTO_TEST_CASE(test_IncomingConnectionOOOR_BackendOOOR) 22 + 23 + BOOST_AUTO_TEST_CASE(test_IncomingConnectionOOOR_BackendNotOOOR) 24 + { 25 + + return; 26 + auto local = getBackendAddress("1", 80); 27 + ClientState localCS(local, true, false, false, "", {}); 28 + /* enable out-of-order on the front side */
+2 -2
pkgs/tools/system/bfs/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "bfs"; 5 - version = "2.2.1"; 6 7 src = fetchFromGitHub { 8 repo = "bfs"; 9 owner = "tavianator"; 10 rev = version; 11 - sha256 = "sha256-3E1EXtI8QvHRDoVSV21K1/Rknp3E+GV1n5iorrv5jNY="; 12 }; 13 14 buildInputs = lib.optionals stdenv.isLinux [ libcap acl ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "bfs"; 5 + version = "2.3"; 6 7 src = fetchFromGitHub { 8 repo = "bfs"; 9 owner = "tavianator"; 10 rev = version; 11 + sha256 = "sha256-ng8/Cgo54MRtrYHRRU9b1v+O1yN5ji/VuV87BWABIMM="; 12 }; 13 14 buildInputs = lib.optionals stdenv.isLinux [ libcap acl ];
+2 -2
pkgs/tools/text/vale/default.nix
··· 2 3 buildGoModule rec { 4 pname = "vale"; 5 - version = "2.13.0"; 6 7 subPackages = [ "cmd/vale" ]; 8 outputs = [ "out" "data" ]; ··· 11 owner = "errata-ai"; 12 repo = "vale"; 13 rev = "v${version}"; 14 - sha256 = "sha256-I1hrmlNZUDhjWTsOzmp8xIc8rv2gTGRx2/yiAmCy9IY="; 15 }; 16 17 vendorSha256 = "sha256-tZarz6xwZo9IFfKB9qGxqezYaFrPyQp3wcug5jGaElY=";
··· 2 3 buildGoModule rec { 4 pname = "vale"; 5 + version = "2.14.0"; 6 7 subPackages = [ "cmd/vale" ]; 8 outputs = [ "out" "data" ]; ··· 11 owner = "errata-ai"; 12 repo = "vale"; 13 rev = "v${version}"; 14 + sha256 = "sha256-4kFd2ULap9kcMu81Lu0SxER7xDAnVVyi9yAVsS1yhnw="; 15 }; 16 17 vendorSha256 = "sha256-tZarz6xwZo9IFfKB9qGxqezYaFrPyQp3wcug5jGaElY=";
+2
pkgs/top-level/aliases.nix
··· 42 aesop = throw "aesop has been removed from nixpkgs, as it was unmaintained."; # added 2021-08-05 43 ag = silver-searcher; # added 2018-04-25 44 aircrackng = aircrack-ng; # added 2016-01-14 45 aleth = throw "aleth (previously packaged as cpp_ethereum) has been removed; abandoned upstream."; # added 2020-11-30 46 alienfx = throw "alienfx has been removed."; # added 2019-12-08 47 alsaLib = alsa-lib; # added 2021-06-09 ··· 766 pidginotr = pidgin-otr; # added 2018-01-08 767 pidginsipe = pidgin-sipe; # added 2018-01-08 768 pidginwindowmerge = pidgin-window-merge; # added 2018-01-08 769 piwik = matomo; # added 2018-01-16 770 pkgconfig = pkg-config; # added 2018-02-02, moved to aliases.nix 2021-01-18 771 pkgconfigUpstream = pkg-configUpstream; # added 2018-02-02
··· 42 aesop = throw "aesop has been removed from nixpkgs, as it was unmaintained."; # added 2021-08-05 43 ag = silver-searcher; # added 2018-04-25 44 aircrackng = aircrack-ng; # added 2016-01-14 45 + airtame = throw "airtame has been removed due to being unmaintained."; # added 2022-01-19 46 aleth = throw "aleth (previously packaged as cpp_ethereum) has been removed; abandoned upstream."; # added 2020-11-30 47 alienfx = throw "alienfx has been removed."; # added 2019-12-08 48 alsaLib = alsa-lib; # added 2021-06-09 ··· 767 pidginotr = pidgin-otr; # added 2018-01-08 768 pidginsipe = pidgin-sipe; # added 2018-01-08 769 pidginwindowmerge = pidgin-window-merge; # added 2018-01-08 770 + pifi = throw "pifi has been removed from nixpkgs, as it is no longer developed."; # added 2022-01-19 771 piwik = matomo; # added 2018-01-16 772 pkgconfig = pkg-config; # added 2018-02-02, moved to aliases.nix 2021-01-18 773 pkgconfigUpstream = pkg-configUpstream; # added 2018-02-02
-4
pkgs/top-level/all-packages.nix
··· 972 973 airspyhf = callPackage ../applications/radio/airspyhf { }; 974 975 - airtame = callPackage ../applications/misc/airtame { }; 976 - 977 aj-snapshot = callPackage ../applications/audio/aj-snapshot { }; 978 979 ajour = callPackage ../tools/games/ajour { ··· 8930 past-time = python3Packages.callPackage ../tools/misc/past-time { }; 8931 8932 pastebinit = callPackage ../tools/misc/pastebinit { }; 8933 - 8934 - pifi = callPackage ../applications/audio/pifi { }; 8935 8936 pmacct = callPackage ../tools/networking/pmacct { }; 8937
··· 972 973 airspyhf = callPackage ../applications/radio/airspyhf { }; 974 975 aj-snapshot = callPackage ../applications/audio/aj-snapshot { }; 976 977 ajour = callPackage ../tools/games/ajour { ··· 8928 past-time = python3Packages.callPackage ../tools/misc/past-time { }; 8929 8930 pastebinit = callPackage ../tools/misc/pastebinit { }; 8931 8932 pmacct = callPackage ../tools/networking/pmacct { }; 8933
+2
pkgs/top-level/python-packages.nix
··· 2796 2797 fields = callPackage ../development/python-modules/fields { }; 2798 2799 filebrowser_safe = callPackage ../development/python-modules/filebrowser_safe { }; 2800 2801 filebytes = callPackage ../development/python-modules/filebytes { };
··· 2796 2797 fields = callPackage ../development/python-modules/fields { }; 2798 2799 + file-read-backwards = callPackage ../development/python-modules/file-read-backwards { }; 2800 + 2801 filebrowser_safe = callPackage ../development/python-modules/filebrowser_safe { }; 2802 2803 filebytes = callPackage ../development/python-modules/filebytes { };