···1717 # These environment variables are read in bazel/build-version.py to create
1818 # a build string shown in the tools --version output.
1919 # If env variables not set, it would attempt to extract it from .git/.
2020- GIT_DATE = "2023-02-02";
2121- GIT_VERSION = "v0.0-2821-gb2180bfa";
2020+ GIT_DATE = "2023-04-14";
2121+ GIT_VERSION = "v0.0-3179-g525ffaf7";
22222323 # Derive nix package version from GIT_VERSION: "v1.2-345-abcde" -> "1.2.345"
2424 version = builtins.concatStringsSep "." (lib.take 3 (lib.drop 1 (builtins.splitVersion GIT_VERSION)));
···2727 owner = "chipsalliance";
2828 repo = "verible";
2929 rev = "${GIT_VERSION}";
3030- sha256 = "sha256-etcimvInhebH2zRPyZnWUq6m3VnCq44w32GJrIacULo=";
3030+ sha256 = "sha256-IXS8yeyryBNpPkCpMcOUsdIlKo447d0a8aZKroFJOzM=";
3131 };
32323333 patches = [
···4949 # of the output derivation ? Is there a more robust way to do this ?
5050 # (Hashes extracted from the ofborg build logs)
5151 sha256 = {
5252- aarch64-linux = "sha256-dYJoae3+u+gpULHS8nteFzzL974cVJ+cJzeG/Dz2HaQ=";
5353- x86_64-linux = "sha256-Jd99+nhqgZ2Gwd78eyXfnSSfbl8C3hoWkiUnzJG1jqM=";
5252+ aarch64-linux = "sha256-BrJyFeq3BB4sHIXMMxRIaYV+VJAfTs2bvK7pnw6faBY=";
5353+ x86_64-linux = "sha256-G6tqHWeQBi2Ph3IDFNu2sp+UU2BO93+lcyJ+kvpuRJo=";
5454 }.${system} or (throw "No hash for system: ${system}");
5555 };
5656