Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
2d8f645c bca98865

+38 -29
+1
nixos/modules/system/boot/luksroot.nix
··· 332 333 if [ $? == 0 ]; then 334 echo -ne "$new_salt\n$new_iterations" > /crypt-storage${dev.yubikey.storage.path} 335 else 336 echo "Warning: Could not update LUKS key, current challenge persists!" 337 fi
··· 332 333 if [ $? == 0 ]; then 334 echo -ne "$new_salt\n$new_iterations" > /crypt-storage${dev.yubikey.storage.path} 335 + sync /crypt-storage${dev.yubikey.storage.path} 336 else 337 echo "Warning: Could not update LUKS key, current challenge persists!" 338 fi
+3 -3
pkgs/applications/audio/ncspot/default.nix
··· 14 in 15 rustPlatform.buildRustPackage rec { 16 pname = "ncspot"; 17 - version = "0.8.2"; 18 19 src = fetchFromGitHub { 20 owner = "hrkfdn"; 21 repo = "ncspot"; 22 rev = "v${version}"; 23 - sha256 = "1rs1jy7zzfgqzr64ld8whn0wlw8n7rk1svxx0xfxm3ynmgc7sd68"; 24 }; 25 26 - cargoSha256 = "10g7gdi1iz751wa60vr4fs0cvfsgs3pfcp8pnywicl0vsdp25fmc"; 27 28 cargoBuildFlags = [ "--no-default-features" "--features" "${lib.concatStringsSep "," features}" ]; 29
··· 14 in 15 rustPlatform.buildRustPackage rec { 16 pname = "ncspot"; 17 + version = "0.9.0"; 18 19 src = fetchFromGitHub { 20 owner = "hrkfdn"; 21 repo = "ncspot"; 22 rev = "v${version}"; 23 + sha256 = "07qqs5q64zaxl3b2091vjihqb35fm0136cm4zibrgpx21akmbvr2"; 24 }; 25 26 + cargoSha256 = "0sdbba32f56z2q7kha5fxw2f00hikbz9sf4zl4wfl2i9b13j7mj0"; 27 28 cargoBuildFlags = [ "--no-default-features" "--features" "${lib.concatStringsSep "," features}" ]; 29
+14 -20
pkgs/build-support/rust/default.nix
··· 1 - { stdenv 2 - , lib 3 - , buildPackages 4 , cacert 5 , cargoBuildHook 6 , cargoCheckHook 7 , cargoInstallHook 8 , cargoSetupHook 9 - , fetchCargoTarball 10 - , importCargoLock 11 - , rustPlatform 12 - , callPackage 13 - , git 14 - , rust 15 , rustc 16 , libiconv 17 , windows ··· 19 20 { name ? "${args.pname}-${args.version}" 21 22 - # SRI hash 23 - , cargoHash ? "" 24 - 25 - # Legacy hash 26 - , cargoSha256 ? "" 27 - 28 # Name for the vendored dependencies tarball 29 , cargoDepsName ? name 30 ··· 56 , buildAndTestSubdir ? null 57 , ... } @ args: 58 59 - assert cargoVendorDir == null && cargoLock == null -> cargoSha256 == "" && cargoHash == "" 60 -> throw "cargoSha256, cargoHash, cargoVendorDir, or cargoLock must be set"; 61 assert buildType == "release" || buildType == "debug"; 62 ··· 68 else fetchCargoTarball ({ 69 inherit src srcs sourceRoot unpackPhase cargoUpdateHook; 70 name = cargoDepsName; 71 - hash = cargoHash; 72 patches = cargoPatches; 73 - sha256 = cargoSha256; 74 } // depsExtraArgs) 75 else null; 76 77 # If we have a cargoSha256 fixed-output derivation, validate it at build time 78 # against the src fixed-output derivation to check consistency. 79 - validateCargoDeps = !(cargoHash == "" && cargoSha256 == ""); 80 81 target = rust.toRustTargetSpec stdenv.hostPlatform; 82 targetIsJSON = lib.hasSuffix ".json" target; ··· 88 (lib.removeSuffix ".json" (builtins.baseNameOf "${target}")) 89 else target; 90 91 - sysroot = (callPackage ./sysroot {}) { 92 inherit target shortTarget; 93 RUSTFLAGS = args.RUSTFLAGS or ""; 94 originalCargoToml = src + /Cargo.toml; # profile info is later extracted
··· 1 + { lib 2 + , importCargoLock 3 + , fetchCargoTarball 4 + , rust 5 + , stdenv 6 + , callPackage 7 , cacert 8 + , git 9 , cargoBuildHook 10 , cargoCheckHook 11 , cargoInstallHook 12 , cargoSetupHook 13 , rustc 14 , libiconv 15 , windows ··· 17 18 { name ? "${args.pname}-${args.version}" 19 20 # Name for the vendored dependencies tarball 21 , cargoDepsName ? name 22 ··· 48 , buildAndTestSubdir ? null 49 , ... } @ args: 50 51 + assert cargoVendorDir == null && cargoLock == null -> !(args ? cargoSha256) && !(args ? cargoHash) 52 -> throw "cargoSha256, cargoHash, cargoVendorDir, or cargoLock must be set"; 53 assert buildType == "release" || buildType == "debug"; 54 ··· 60 else fetchCargoTarball ({ 61 inherit src srcs sourceRoot unpackPhase cargoUpdateHook; 62 name = cargoDepsName; 63 patches = cargoPatches; 64 + } // lib.optionalAttrs (args ? cargoHash) { 65 + hash = args.cargoHash; 66 + } // lib.optionalAttrs (args ? cargoSha256) { 67 + sha256 = args.cargoSha256; 68 } // depsExtraArgs) 69 else null; 70 71 # If we have a cargoSha256 fixed-output derivation, validate it at build time 72 # against the src fixed-output derivation to check consistency. 73 + validateCargoDeps = args ? cargoHash || args ? cargoSha256; 74 75 target = rust.toRustTargetSpec stdenv.hostPlatform; 76 targetIsJSON = lib.hasSuffix ".json" target; ··· 82 (lib.removeSuffix ".json" (builtins.baseNameOf "${target}")) 83 else target; 84 85 + sysroot = callPackage ./sysroot { } { 86 inherit target shortTarget; 87 RUSTFLAGS = args.RUSTFLAGS or ""; 88 originalCargoToml = src + /Cargo.toml; # profile info is later extracted
+2 -4
pkgs/build-support/rust/fetchCargoTarball.nix
··· 22 , srcs ? [] 23 , patches ? [] 24 , sourceRoot ? "" 25 - , hash ? "" 26 - , sha256 ? "" 27 , cargoUpdateHook ? "" 28 , ... 29 } @ args: 30 31 let hash_ = 32 - if hash != "" then { outputHashAlgo = null; outputHash = hash; } 33 - else if sha256 != "" then { outputHashAlgo = "sha256"; outputHash = sha256; } 34 else throw "fetchCargoTarball requires a hash for ${name}"; 35 in stdenv.mkDerivation ({ 36 name = "${name}-vendor.tar.gz";
··· 22 , srcs ? [] 23 , patches ? [] 24 , sourceRoot ? "" 25 , cargoUpdateHook ? "" 26 , ... 27 } @ args: 28 29 let hash_ = 30 + if args ? hash then { outputHashAlgo = null; outputHash = args.hash; } 31 + else if args ? sha256 then { outputHashAlgo = "sha256"; outputHash = args.sha256; } 32 else throw "fetchCargoTarball requires a hash for ${name}"; 33 in stdenv.mkDerivation ({ 34 name = "${name}-vendor.tar.gz";
+9
pkgs/development/libraries/SDL2_mixer/default.nix
··· 13 , mpg123 14 , opusfile 15 , smpeg2 16 }: 17 18 stdenv.mkDerivation rec { ··· 42 mpg123 43 opusfile 44 smpeg2 45 ]; 46 47 configureFlags = [ 48 "--disable-music-ogg-shared"
··· 13 , mpg123 14 , opusfile 15 , smpeg2 16 + , timidity 17 }: 18 19 stdenv.mkDerivation rec { ··· 43 mpg123 44 opusfile 45 smpeg2 46 + # MIDI patterns 47 + timidity 48 ]; 49 + 50 + # fix default path to timidity.cfg so MIDI files could be played 51 + postPatch = '' 52 + substituteInPlace timidity/options.h \ 53 + --replace "/usr/share/timidity" "${timidity}/share/timidity" 54 + ''; 55 56 configureFlags = [ 57 "--disable-music-ogg-shared"
+6
pkgs/misc/uboot/default.nix
··· 171 filesToInstall = ["u-boot-spl.kwb"]; 172 }; 173 174 ubootGuruplug = buildUBoot { 175 defconfig = "guruplug_defconfig"; 176 extraMeta.platforms = ["armv5tel-linux"];
··· 171 filesToInstall = ["u-boot-spl.kwb"]; 172 }; 173 174 + ubootCubieboard2 = buildUBoot { 175 + defconfig = "Cubieboard2_defconfig"; 176 + extraMeta.platforms = ["armv7l-linux"]; 177 + filesToInstall = ["u-boot-sunxi-with-spl.bin"]; 178 + }; 179 + 180 ubootGuruplug = buildUBoot { 181 defconfig = "guruplug_defconfig"; 182 extraMeta.platforms = ["armv5tel-linux"];
+2 -2
pkgs/servers/hqplayerd/default.nix
··· 17 18 stdenv.mkDerivation rec { 19 pname = "hqplayerd"; 20 - version = "4.25.2-66"; 21 22 src = fetchurl { 23 url = "https://www.signalyst.eu/bins/${pname}/fc34/${pname}-${version}.fc34.x86_64.rpm"; 24 - sha256 = "sha256-BZGtv/Bumkltk6fJw3+RG1LZc3pGpd8e4DvgLxOTvcQ="; 25 }; 26 27 unpackPhase = ''
··· 17 18 stdenv.mkDerivation rec { 19 pname = "hqplayerd"; 20 + version = "4.26.0-67"; 21 22 src = fetchurl { 23 url = "https://www.signalyst.eu/bins/${pname}/fc34/${pname}-${version}.fc34.x86_64.rpm"; 24 + sha256 = "sha256-Wbtt1yO/CE2cewOE5RynwEm+fCdOV1cxzR/XiCwj0NU="; 25 }; 26 27 unpackPhase = ''
+1
pkgs/top-level/all-packages.nix
··· 22420 ubootBananaPim64 22421 ubootAmx335xEVM 22422 ubootClearfog 22423 ubootGuruplug 22424 ubootJetsonTK1 22425 ubootNanoPCT4
··· 22420 ubootBananaPim64 22421 ubootAmx335xEVM 22422 ubootClearfog 22423 + ubootCubieboard2 22424 ubootGuruplug 22425 ubootJetsonTK1 22426 ubootNanoPCT4