Merge master into staging-next

authored by github-actions[bot] and committed by GitHub 4a997ba4 ad8197eb

+571 -182
+3 -3
nixos/modules/installer/cd-dvd/system-tarball-sheevaplug.nix
··· 87 87 boot.initrd.availableKernelModules = 88 88 [ "mvsdio" "reiserfs" "ext3" "ums-cypress" "rtc_mv" "ext4" ]; 89 89 90 - boot.postBootCommands = 90 + boot.postBootCommands = lib.mkIf (!boot.initrd.systemd.enable) 91 91 '' 92 92 mkdir -p /mnt 93 93 94 94 cp ${dummyConfiguration} /etc/nixos/configuration.nix 95 95 ''; 96 96 97 - boot.initrd.extraUtilsCommands = 97 + boot.initrd.extraUtilsCommands = lib.mkIf (!boot.initrd.systemd.enable) 98 98 '' 99 99 copy_bin_and_libs ${pkgs.util-linux}/sbin/hwclock 100 100 ''; 101 101 102 - boot.initrd.postDeviceCommands = 102 + boot.initrd.postDeviceCommands = lib.mkIf (!boot.initrd.systemd.enable) 103 103 '' 104 104 hwclock -s 105 105 '';
+1 -4
nixos/modules/system/boot/systemd/initrd.nix
··· 65 65 "systemd-kexec.service" 66 66 "systemd-modules-load.service" 67 67 "systemd-poweroff.service" 68 - "systemd-random-seed.service" 69 68 "systemd-reboot.service" 70 69 "systemd-sysctl.service" 71 70 "systemd-tmpfiles-setup-dev.service" ··· 193 192 description = '' 194 193 Store paths to copy into the initrd as well. 195 194 ''; 196 - type = types.listOf types.singleLineStr; 195 + type = with types; listOf (oneOf [ singleLineStr package ]); 197 196 default = []; 198 197 }; 199 198 ··· 396 395 "${cfg.package}/lib/systemd/systemd-journald" 397 396 "${cfg.package}/lib/systemd/systemd-makefs" 398 397 "${cfg.package}/lib/systemd/systemd-modules-load" 399 - "${cfg.package}/lib/systemd/systemd-random-seed" 400 398 "${cfg.package}/lib/systemd/systemd-remount-fs" 401 399 "${cfg.package}/lib/systemd/systemd-shutdown" 402 400 "${cfg.package}/lib/systemd/systemd-sulogin-shell" ··· 507 505 }; 508 506 509 507 boot.kernelParams = lib.mkIf (config.boot.resumeDevice != "") [ "resume=${config.boot.resumeDevice}" ]; 510 - 511 508 }; 512 509 }
+16 -6
nixos/modules/tasks/bcache.nix
··· 1 - { pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 3 { 4 + options.boot.initrd.services.bcache.enable = (lib.mkEnableOption "bcache support in the initrd") // { 5 + visible = false; # only works with systemd stage 1 6 + }; 4 7 5 - environment.systemPackages = [ pkgs.bcache-tools ]; 8 + config = { 6 9 7 - services.udev.packages = [ pkgs.bcache-tools ]; 10 + environment.systemPackages = [ pkgs.bcache-tools ]; 8 11 9 - boot.initrd.extraUdevRulesCommands = '' 10 - cp -v ${pkgs.bcache-tools}/lib/udev/rules.d/*.rules $out/ 11 - ''; 12 + services.udev.packages = [ pkgs.bcache-tools ]; 13 + 14 + boot.initrd.extraUdevRulesCommands = lib.mkIf (!config.boot.initrd.systemd.enable) '' 15 + cp -v ${pkgs.bcache-tools}/lib/udev/rules.d/*.rules $out/ 16 + ''; 12 17 18 + boot.initrd.services.udev = lib.mkIf config.boot.initrd.services.bcache.enable { 19 + packages = [ pkgs.bcache-tools ]; 20 + binPackages = [ pkgs.bcache-tools ]; 21 + }; 22 + }; 13 23 }
+3 -3
nixos/modules/tasks/filesystems/btrfs.nix
··· 66 66 ] 67 67 ); 68 68 69 - boot.initrd.extraUtilsCommands = mkIf inInitrd 69 + boot.initrd.extraUtilsCommands = mkIf (inInitrd && !config.boot.initrd.systemd.enable) 70 70 '' 71 71 copy_bin_and_libs ${pkgs.btrfs-progs}/bin/btrfs 72 72 ln -sv btrfs $out/bin/btrfsck 73 73 ln -sv btrfsck $out/bin/fsck.btrfs 74 74 ''; 75 75 76 - boot.initrd.extraUtilsCommandsTest = mkIf inInitrd 76 + boot.initrd.extraUtilsCommandsTest = mkIf (inInitrd && !config.boot.initrd.systemd.enable) 77 77 '' 78 78 $out/bin/btrfs --version 79 79 ''; 80 80 81 - boot.initrd.postDeviceCommands = mkIf inInitrd 81 + boot.initrd.postDeviceCommands = mkIf (inInitrd && !config.boot.initrd.systemd.enable) 82 82 '' 83 83 btrfs device scan 84 84 '';
+1 -1
nixos/modules/tasks/filesystems/cifs.nix
··· 16 16 boot.initrd.availableKernelModules = mkIf inInitrd 17 17 [ "cifs" "nls_utf8" "hmac" "md4" "ecb" "des_generic" "sha256" ]; 18 18 19 - boot.initrd.extraUtilsCommands = mkIf inInitrd 19 + boot.initrd.extraUtilsCommands = mkIf (inInitrd && !config.boot.initrd.systemd.enable) 20 20 '' 21 21 copy_bin_and_libs ${pkgs.cifs-utils}/sbin/mount.cifs 22 22 '';
+10 -4
nixos/modules/tasks/filesystems/ext.nix
··· 1 - { pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 + 3 + let 4 + 5 + inInitrd = lib.any (fs: fs == "ext2" || fs == "ext3" || fs == "ext4") config.boot.initrd.supportedFilesystems; 6 + 7 + in 2 8 3 9 { 4 10 config = { 5 11 6 - system.fsPackages = [ pkgs.e2fsprogs ]; 12 + system.fsPackages = lib.mkIf (config.boot.initrd.systemd.enable -> inInitrd) [ pkgs.e2fsprogs ]; 7 13 8 14 # As of kernel 4.3, there is no separate ext3 driver (they're also handled by ext4.ko) 9 - boot.initrd.availableKernelModules = [ "ext2" "ext4" ]; 15 + boot.initrd.availableKernelModules = lib.mkIf (config.boot.initrd.systemd.enable -> inInitrd) [ "ext2" "ext4" ]; 10 16 11 - boot.initrd.extraUtilsCommands = 17 + boot.initrd.extraUtilsCommands = lib.mkIf (!config.boot.initrd.systemd.enable) 12 18 '' 13 19 # Copy e2fsck and friends. 14 20 copy_bin_and_libs ${pkgs.e2fsprogs}/sbin/e2fsck
+1 -1
nixos/modules/tasks/filesystems/f2fs.nix
··· 13 13 14 14 boot.initrd.availableKernelModules = mkIf inInitrd [ "f2fs" "crc32" ]; 15 15 16 - boot.initrd.extraUtilsCommands = mkIf inInitrd '' 16 + boot.initrd.extraUtilsCommands = mkIf (inInitrd && !config.boot.initrd.systemd.enable) '' 17 17 copy_bin_and_libs ${pkgs.f2fs-tools}/sbin/fsck.f2fs 18 18 ${optionalString (any (fs: fs.autoResize) fileSystems) '' 19 19 # We need f2fs-tools' tools to resize filesystems
+1 -1
nixos/modules/tasks/filesystems/jfs.nix
··· 12 12 13 13 boot.initrd.kernelModules = mkIf inInitrd [ "jfs" ]; 14 14 15 - boot.initrd.extraUtilsCommands = mkIf inInitrd '' 15 + boot.initrd.extraUtilsCommands = mkIf (inInitrd && !boot.initrd.systemd.enable) '' 16 16 copy_bin_and_libs ${pkgs.jfsutils}/sbin/fsck.jfs 17 17 ''; 18 18 };
+1 -1
nixos/modules/tasks/filesystems/reiserfs.nix
··· 15 15 16 16 boot.initrd.kernelModules = mkIf inInitrd [ "reiserfs" ]; 17 17 18 - boot.initrd.extraUtilsCommands = mkIf inInitrd 18 + boot.initrd.extraUtilsCommands = mkIf (inInitrd && !config.boot.initrd.systemd.enable) 19 19 '' 20 20 copy_bin_and_libs ${pkgs.reiserfsprogs}/sbin/reiserfsck 21 21 ln -s reiserfsck $out/bin/fsck.reiserfs
+13 -2
nixos/modules/tasks/filesystems/unionfs-fuse.nix
··· 6 6 (lib.mkIf (lib.any (fs: fs == "unionfs-fuse") config.boot.initrd.supportedFilesystems) { 7 7 boot.initrd.kernelModules = [ "fuse" ]; 8 8 9 - boot.initrd.extraUtilsCommands = '' 9 + boot.initrd.extraUtilsCommands = lib.mkIf (!config.boot.initrd.systemd.enable) '' 10 10 copy_bin_and_libs ${pkgs.fuse}/sbin/mount.fuse 11 11 copy_bin_and_libs ${pkgs.unionfs-fuse}/bin/unionfs 12 12 substitute ${pkgs.unionfs-fuse}/sbin/mount.unionfs-fuse $out/bin/mount.unionfs-fuse \ ··· 16 16 chmod +x $out/bin/mount.unionfs-fuse 17 17 ''; 18 18 19 - boot.initrd.postDeviceCommands = '' 19 + boot.initrd.postDeviceCommands = lib.mkIf (!config.boot.initrd.systemd.enable) '' 20 20 # Hacky!!! fuse hard-codes the path to mount 21 21 mkdir -p /nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-${pkgs.util-linux.name}-bin/bin 22 22 ln -s $(which mount) /nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-${pkgs.util-linux.name}-bin/bin 23 23 ln -s $(which umount) /nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-${pkgs.util-linux.name}-bin/bin 24 24 ''; 25 + 26 + boot.initrd.systemd.extraBin = { 27 + "mount.fuse" = "${pkgs.fuse}/bin/mount.fuse"; 28 + "unionfs" = "${pkgs.unionfs-fuse}/bin/unionfs"; 29 + "mount.unionfs-fuse" = pkgs.runCommand "mount.unionfs-fuse" {} '' 30 + substitute ${pkgs.unionfs-fuse}/sbin/mount.unionfs-fuse $out \ 31 + --replace '${pkgs.bash}/bin/bash' /bin/sh \ 32 + --replace '${pkgs.fuse}/sbin' /bin \ 33 + --replace '${pkgs.unionfs-fuse}/bin' /bin 34 + ''; 35 + }; 25 36 }) 26 37 27 38 (lib.mkIf (lib.any (fs: fs == "unionfs-fuse") config.boot.supportedFilesystems) {
+1 -1
nixos/modules/tasks/filesystems/vfat.nix
··· 15 15 16 16 boot.initrd.kernelModules = mkIf inInitrd [ "vfat" "nls_cp437" "nls_iso8859-1" ]; 17 17 18 - boot.initrd.extraUtilsCommands = mkIf inInitrd 18 + boot.initrd.extraUtilsCommands = mkIf (inInitrd && !config.boot.initrd.systemd.enable) 19 19 '' 20 20 copy_bin_and_libs ${pkgs.dosfstools}/sbin/dosfsck 21 21 ln -sv dosfsck $out/bin/fsck.vfat
+2 -2
nixos/modules/tasks/filesystems/xfs.nix
··· 15 15 16 16 boot.initrd.availableKernelModules = mkIf inInitrd [ "xfs" "crc32c" ]; 17 17 18 - boot.initrd.extraUtilsCommands = mkIf inInitrd 18 + boot.initrd.extraUtilsCommands = mkIf (inInitrd && !boot.initrd.systemd.enable) 19 19 '' 20 20 copy_bin_and_libs ${pkgs.xfsprogs.bin}/bin/fsck.xfs 21 21 copy_bin_and_libs ${pkgs.xfsprogs.bin}/bin/xfs_repair 22 22 ''; 23 23 24 24 # Trick just to set 'sh' after the extraUtils nuke-refs. 25 - boot.initrd.extraUtilsCommandsTest = mkIf inInitrd 25 + boot.initrd.extraUtilsCommandsTest = mkIf (inInitrd && !boot.initrd.systemd.enable) 26 26 '' 27 27 sed -i -e 's,^#!.*,#!'$out/bin/sh, $out/bin/fsck.xfs 28 28 '';
+1
nixos/tests/all-tests.nix
··· 524 524 systemd-confinement = handleTest ./systemd-confinement.nix {}; 525 525 systemd-cryptenroll = handleTest ./systemd-cryptenroll.nix {}; 526 526 systemd-escaping = handleTest ./systemd-escaping.nix {}; 527 + systemd-initrd-btrfs-raid = handleTest ./systemd-initrd-btrfs-raid.nix {}; 527 528 systemd-initrd-luks-keyfile = handleTest ./systemd-initrd-luks-keyfile.nix {}; 528 529 systemd-initrd-luks-password = handleTest ./systemd-initrd-luks-password.nix {}; 529 530 systemd-initrd-shutdown = handleTest ./systemd-shutdown.nix { systemdStage1 = true; };
+45
nixos/tests/systemd-initrd-btrfs-raid.nix
··· 1 + import ./make-test-python.nix ({ lib, pkgs, ... }: { 2 + name = "systemd-initrd-btrfs-raid"; 3 + 4 + nodes.machine = { pkgs, ... }: { 5 + # Use systemd-boot 6 + virtualisation = { 7 + emptyDiskImages = [ 512 512 ]; 8 + useBootLoader = true; 9 + useEFIBoot = true; 10 + }; 11 + boot.loader.systemd-boot.enable = true; 12 + boot.loader.efi.canTouchEfiVariables = true; 13 + 14 + environment.systemPackages = with pkgs; [ btrfs-progs ]; 15 + boot.initrd.systemd = { 16 + enable = true; 17 + emergencyAccess = true; 18 + }; 19 + 20 + specialisation.boot-btrfs-raid.configuration = { 21 + fileSystems = lib.mkVMOverride { 22 + "/".fsType = lib.mkForce "btrfs"; 23 + }; 24 + virtualisation.bootDevice = "/dev/vdc"; 25 + }; 26 + }; 27 + 28 + testScript = '' 29 + # Create RAID 30 + machine.succeed("mkfs.btrfs -d raid0 /dev/vdc /dev/vdd") 31 + machine.succeed("mkdir -p /mnt && mount /dev/vdc /mnt && echo hello > /mnt/test && umount /mnt") 32 + 33 + # Boot from the RAID 34 + machine.succeed("bootctl set-default nixos-generation-1-specialisation-boot-btrfs-raid.conf") 35 + machine.succeed("sync") 36 + machine.crash() 37 + machine.wait_for_unit("multi-user.target") 38 + 39 + # Ensure we have successfully booted from the RAID 40 + assert "(initrd)" in machine.succeed("systemd-analyze") # booted with systemd in stage 1 41 + assert "/dev/vdc on / type btrfs" in machine.succeed("mount") 42 + assert "hello" in machine.succeed("cat /test") 43 + assert "Total devices 2" in machine.succeed("btrfs filesystem show") 44 + ''; 45 + })
+76
pkgs/applications/audio/ChowPhaser/default.nix
··· 1 + { alsa-lib, at-spi2-core, cmake, curl, dbus, libepoxy, fetchFromGitHub, freeglut 2 + , freetype, gcc-unwrapped, gtk3, lib, libGL, libXcursor, libXdmcp, libXext 3 + , libXinerama, libXrandr, libXtst, libdatrie, libjack2, libpsl, libselinux 4 + , libsepol, libsysprof-capture, libthai, libxkbcommon, pcre, pkg-config 5 + , python3, sqlite, stdenv }: 6 + 7 + stdenv.mkDerivation rec { 8 + pname = "ChowPhaser"; 9 + version = "1.1.1"; 10 + 11 + src = fetchFromGitHub { 12 + owner = "jatinchowdhury18"; 13 + repo = "ChowPhaser"; 14 + rev = "v${version}"; 15 + fetchSubmodules = true; 16 + sha256 = "sha256-9wo7ZFMruG3QNvlpILSvrFh/Sx6J1qnlWc8+aQyS4tQ="; 17 + }; 18 + 19 + nativeBuildInputs = [ pkg-config cmake ]; 20 + 21 + buildInputs = [ 22 + alsa-lib 23 + at-spi2-core 24 + curl 25 + dbus 26 + libepoxy 27 + freeglut 28 + freetype 29 + gtk3 30 + libGL 31 + libXcursor 32 + libXdmcp 33 + libXext 34 + libXinerama 35 + libXrandr 36 + libXtst 37 + libdatrie 38 + libjack2 39 + libpsl 40 + libselinux 41 + libsepol 42 + libsysprof-capture 43 + libthai 44 + libxkbcommon 45 + pcre 46 + python3 47 + sqlite 48 + gcc-unwrapped 49 + ]; 50 + 51 + cmakeFlags = [ 52 + "-DCMAKE_AR=${gcc-unwrapped}/bin/gcc-ar" 53 + "-DCMAKE_RANLIB=${gcc-unwrapped}/bin/gcc-ranlib" 54 + "-DCMAKE_NM=${gcc-unwrapped}/bin/gcc-nm" 55 + ]; 56 + 57 + installPhase = '' 58 + mkdir -p $out/lib/lv2 $out/lib/vst3 $out/bin $out/share/doc/ChowPhaser/ 59 + cd ChowPhaserMono_artefacts/Release 60 + cp libChowPhaserMono_SharedCode.a $out/lib 61 + cp -r VST3/ChowPhaserMono.vst3 $out/lib/vst3 62 + cp Standalone/ChowPhaserMono $out/bin 63 + cd ../../ChowPhaserStereo_artefacts/Release 64 + cp libChowPhaserStereo_SharedCode.a $out/lib 65 + cp -r VST3/ChowPhaserStereo.vst3 $out/lib/vst3 66 + cp Standalone/ChowPhaserStereo $out/bin 67 + ''; 68 + 69 + meta = with lib; { 70 + homepage = "https://github.com/jatinchowdhury18/ChowPhaser"; 71 + description = "Phaser effect based loosely on the Schulte Compact Phasing 'A'"; 72 + license = with licenses; [ bsd3 ]; 73 + maintainers = with maintainers; [ magnetophon ]; 74 + platforms = platforms.linux; 75 + }; 76 + }
+9 -12
pkgs/applications/audio/shortwave/default.nix
··· 14 14 , ninja 15 15 , openssl 16 16 , pkg-config 17 - , python3 18 17 , rustPlatform 19 18 , sqlite 20 - , wrapGAppsHook 19 + , wrapGAppsHook4 20 + , cmake 21 + , libshumate 21 22 }: 22 23 23 24 stdenv.mkDerivation rec { 24 25 pname = "shortwave"; 25 - version = "2.0.1"; 26 + version = "3.0.0"; 26 27 27 28 src = fetchFromGitLab { 28 29 domain = "gitlab.gnome.org"; 29 30 owner = "World"; 30 31 repo = "Shortwave"; 31 32 rev = version; 32 - sha256 = "sha256-25qPb7qlqCwYJzl4qZxAZYx5asxSlXBlc/0dGyBdk1o="; 33 + sha256 = "sha256-qwk63o9pfqpAm6l9ioj3RccacemQU8R6LF6El4yHkjQ"; 33 34 }; 34 35 35 36 cargoDeps = rustPlatform.fetchCargoTarball { 36 37 inherit src; 37 38 name = "${pname}-${version}"; 38 - hash = "sha256-00dQXcSNmdZb2nSLG3q7jm4sugF9XR4LbH0OmcuHVxA="; 39 + hash = "sha256-YrB322nv9CgZqt5//VMvVwjWA51ePlX2PI6raRJGBxA="; 39 40 }; 40 41 41 42 nativeBuildInputs = [ ··· 46 47 meson 47 48 ninja 48 49 pkg-config 49 - python3 50 50 rustPlatform.rust.cargo 51 51 rustPlatform.cargoSetupHook 52 52 rustPlatform.rust.rustc 53 - wrapGAppsHook 53 + wrapGAppsHook4 54 + cmake 54 55 ]; 55 56 56 57 buildInputs = [ ··· 61 62 libadwaita 62 63 openssl 63 64 sqlite 65 + libshumate 64 66 ] ++ (with gst_all_1; [ 65 67 gstreamer 66 68 gst-plugins-base ··· 68 70 gst-plugins-bad 69 71 ]); 70 72 71 - postPatch = '' 72 - patchShebangs build-aux/meson/postinstall.py 73 - ''; 74 - 75 73 meta = with lib; { 76 74 homepage = "https://gitlab.gnome.org/World/Shortwave"; 77 75 description = "Find and listen to internet radio stations"; ··· 80 78 desktop. It is the successor to the older Gradio application. 81 79 ''; 82 80 maintainers = with maintainers; [ lasandell ]; 83 - broken = true; # incompatible with latest libadwaita 84 81 license = licenses.gpl3Plus; 85 82 platforms = platforms.linux; 86 83 };
+20 -2
pkgs/applications/editors/lapce/default.nix
··· 17 17 , vulkan-loader 18 18 , copyDesktopItems 19 19 , makeDesktopItem 20 + , openssl 21 + , libobjc 22 + , Security 23 + , CoreServices 24 + , ApplicationServices 25 + , Carbon 26 + , AppKit 20 27 }: 21 28 22 29 rustPlatform.buildRustPackage rec { ··· 40 47 copyDesktopItems 41 48 ]; 42 49 50 + # Get openssl-sys to use pkg-config 51 + OPENSSL_NO_VENDOR = 1; 52 + 43 53 buildInputs = [ 54 + openssl 55 + ] ++ lib.optionals stdenv.isLinux [ 44 56 freetype 45 57 fontconfig 46 58 libxkbcommon ··· 50 62 libXrandr 51 63 libXi 52 64 vulkan-loader 65 + ] ++ lib.optionals stdenv.isDarwin [ 66 + libobjc 67 + Security 68 + CoreServices 69 + ApplicationServices 70 + Carbon 71 + AppKit 53 72 ]; 54 73 55 74 # Add missing vulkan dependency to rpath 56 - preFixup = '' 75 + preFixup = lib.optionalString stdenv.isLinux '' 57 76 patchelf --add-needed ${vulkan-loader}/lib/libvulkan.so.1 $out/bin/lapce 58 77 ''; 59 78 ··· 76 95 homepage = "https://github.com/lapce/lapce"; 77 96 license = with licenses; [ asl20 ]; 78 97 maintainers = with maintainers; [ elliot ]; 79 - broken = stdenv.isDarwin; 80 98 }; 81 99 }
+9 -3
pkgs/applications/misc/archivy/default.nix
··· 1 - { lib, stdenv, python3, fetchPypi }: 1 + { lib 2 + , stdenv 3 + , python3 4 + , fetchPypi 5 + }: 2 6 3 7 let 4 8 defaultOverrides = [ ··· 37 41 38 42 buildPythonApplication rec { 39 43 pname = "archivy"; 40 - version = "1.7.1"; 44 + version = "1.7.2"; 45 + format = "setuptools"; 41 46 42 47 src = fetchPypi { 43 48 inherit pname version; 44 - sha256 = "sha256-UNGl5Dl/E3+uQ4HIxzHYliHF4lqD3GYdeoL+DtqUwCo="; 49 + hash = "sha256-o5dVJDbdKgo6hMMU9mKzoouSgVWl7xSAp+Aq61VcfeU="; 45 50 }; 46 51 47 52 # Relax some dependencies ··· 54 59 --replace 'python_frontmatter == 0.5.0' 'python_frontmatter' \ 55 60 --replace 'requests ==' 'requests >=' \ 56 61 --replace 'validators ==' 'validators >=' \ 62 + --replace 'flask-login == ' 'flask-login >= ' \ 57 63 --replace 'tinydb ==' 'tinydb >=' \ 58 64 --replace 'Flask_WTF == 0.14.3' 'Flask_WTF' \ 59 65 --replace 'Flask ==' 'Flask >='
+2
pkgs/applications/misc/nut/default.nix
··· 36 36 37 37 enableParallelBuilding = true; 38 38 39 + NIX_CFLAGS_COMPILE = [ "-std=c++14" ]; 40 + 39 41 postInstall = '' 40 42 wrapProgram $out/bin/nut-scanner --prefix LD_LIBRARY_PATH : \ 41 43 "$out/lib:${neon}/lib:${libusb-compat-0_1.out}/lib:${avahi}/lib:${freeipmi}/lib"
+21 -9
pkgs/applications/networking/cluster/helm/default.nix
··· 1 - { lib, buildGoModule, fetchFromGitHub, installShellFiles }: 1 + { lib, stdenv, buildGoModule, fetchFromGitHub, installShellFiles }: 2 2 3 3 buildGoModule rec { 4 - pname = "helm"; 5 - version = "3.8.1"; 6 - gitCommit = "5cb9af4b1b271d11d7a97a71df3ac337dd94ad37"; 4 + pname = "kubernetes-helm"; 5 + version = "3.8.2"; 6 + gitCommit = "6e3701edea09e5d55a8ca2aae03a68917630e91b"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "helm"; 10 10 repo = "helm"; 11 11 rev = "v${version}"; 12 - sha256 = "sha256-AjNrn46l9gVC7MtGF59QWv+l6qYn+jzopsZtM/2faXY="; 12 + sha256 = "sha256-lFAzp7ZxyMZAEO1cNFkEPLgTLEGa6azv36xiTIz4FZY="; 13 13 }; 14 - vendorSha256 = "sha256-ffbp7J8XDxo/s79pjoiDVbft0pr/lJpuJuKiMpQwkT0="; 15 - 16 - doCheck = false; 14 + vendorSha256 = "sha256-FLEydmR+UEZ80VYLxBU1ZdwpdLgTjUpqiMItnt9UuLY="; 17 15 18 16 subPackages = [ "cmd/helm" ]; 19 17 ldflags = [ ··· 23 21 "-X helm.sh/helm/v3/internal/version.gitCommit=${gitCommit}" 24 22 ]; 25 23 24 + preCheck = '' 25 + # skipping version tests because they require dot git directory 26 + substituteInPlace cmd/helm/version_test.go \ 27 + --replace "TestVersion" "SkipVersion" 28 + '' + lib.optionalString stdenv.isLinux '' 29 + # skipping plugin tests on linux 30 + substituteInPlace cmd/helm/plugin_test.go \ 31 + --replace "TestPluginDynamicCompletion" "SkipPluginDynamicCompletion" \ 32 + --replace "TestLoadPlugins" "SkipLoadPlugins" 33 + substituteInPlace cmd/helm/helm_test.go \ 34 + --replace "TestPluginExitCode" "SkipPluginExitCode" 35 + ''; 36 + 26 37 nativeBuildInputs = [ installShellFiles ]; 27 38 postInstall = '' 28 39 $out/bin/helm completion bash > helm.bash ··· 33 44 meta = with lib; { 34 45 homepage = "https://github.com/kubernetes/helm"; 35 46 description = "A package manager for kubernetes"; 47 + mainProgram = "helm"; 36 48 license = licenses.asl20; 37 - maintainers = with maintainers; [ rlupton20 edude03 saschagrunert Frostman Chili-Man ]; 49 + maintainers = with maintainers; [ rlupton20 edude03 saschagrunert Frostman Chili-Man techknowlogick ]; 38 50 }; 39 51 }
+2 -1
pkgs/applications/networking/instant-messengers/jitsi-meet-electron/default.nix
··· 46 46 postFixup = '' 47 47 makeWrapper ${electron}/bin/electron $out/bin/${pname} \ 48 48 --add-flags $out/share/${pname}/resources/app.asar \ 49 - --prefix LD_LIBRARY_PATH : "${lib.makeLibraryPath [ stdenv.cc.cc xorg.libXtst pipewire ]}" 49 + --prefix LD_LIBRARY_PATH : "${lib.makeLibraryPath [ stdenv.cc.cc xorg.libXtst pipewire ]}" \ 50 + --add-flags "\''${NIXOS_OZONE_WL:+\''${WAYLAND_DISPLAY:+--enable-features=UseOzonePlatform --ozone-platform=wayland}}" 50 51 ''; 51 52 52 53 meta = with lib; {
+2 -2
pkgs/applications/virtualization/docker-slim/default.nix
··· 6 6 7 7 buildGoPackage rec { 8 8 pname = "docker-slim"; 9 - version = "1.37.5"; 9 + version = "1.37.6"; 10 10 11 11 goPackagePath = "github.com/docker-slim/docker-slim"; 12 12 ··· 14 14 owner = "docker-slim"; 15 15 repo = "docker-slim"; 16 16 rev = version; 17 - sha256 = "sha256-MBs0ybBXsanNFt6R7+ZYvtCh7iHE3FtWXE9uy9tbrE4="; 17 + sha256 = "sha256-Jzi6JC6DRklZhNqmFx6eHx6qR8/fb/JuSpgwtPThcc4="; 18 18 }; 19 19 20 20 subPackages = [ "cmd/docker-slim" "cmd/docker-slim-sensor" ];
+2 -2
pkgs/development/python-modules/deezer-python/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "deezer-python"; 16 - version = "5.3.0"; 16 + version = "5.3.1"; 17 17 format = "pyproject"; 18 18 19 19 disabled = pythonOlder "3.6"; ··· 22 22 owner = "browniebroke"; 23 23 repo = pname; 24 24 rev = "refs/tags/v${version}"; 25 - sha256 = "sha256-Y3nn7q6wGBqWN2JxfpGYd/KDxW5yeuwkos0w1AENkJA="; 25 + sha256 = "sha256-x1iZP+dGHeWwIr/AwQr1rYSFECtM6iDXEq9DrGH5J+s="; 26 26 }; 27 27 28 28 nativeBuildInputs = [
+36 -10
pkgs/development/python-modules/dropbox/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 + , pythonOlder 3 4 , fetchFromGitHub 4 5 , requests 5 - , urllib3 6 - , mock 7 - , setuptools 6 + , six 8 7 , stone 9 - , pythonOlder 8 + , mock 9 + , pytest-mock 10 + , pytestCheckHook 10 11 }: 11 12 12 13 buildPythonPackage rec { ··· 20 21 owner = "dropbox"; 21 22 repo = "dropbox-sdk-python"; 22 23 rev = "v${version}"; 23 - sha256 = "sha256-pq/LkyOCS0PnujfN9aIx42aeZ8tw4XvRQ4Vid/nXgWE="; 24 + hash = "sha256-w07r95MBAClf0F3SICiZsHLdslzf+JuxC+BVdTACCog="; 24 25 }; 25 26 26 27 propagatedBuildInputs = [ 27 28 requests 28 - urllib3 29 + six 30 + stone 31 + ]; 32 + 33 + checkInputs = [ 29 34 mock 30 - setuptools 31 - stone 35 + pytest-mock 36 + pytestCheckHook 32 37 ]; 33 38 34 39 postPatch = '' ··· 36 41 --replace "'pytest-runner == 5.2.0'," "" 37 42 ''; 38 43 39 - # Set DROPBOX_TOKEN environment variable to a valid token. 40 - doCheck = false; 44 + doCheck = true; 41 45 42 46 pythonImportsCheck = [ 43 47 "dropbox" 48 + ]; 49 + 50 + # Set SCOPED_USER_DROPBOX_TOKEN environment variable to a valid value. 51 + disabledTests = [ 52 + "test_default_oauth2_urls" 53 + "test_bad_auth" 54 + "test_multi_auth" 55 + "test_refresh" 56 + "test_app_auth" 57 + "test_downscope" 58 + "test_rpc" 59 + "test_upload_download" 60 + "test_bad_upload_types" 61 + "test_clone_when_user_linked" 62 + "test_with_path_root_constructor" 63 + "test_path_root" 64 + "test_path_root_err" 65 + "test_versioned_route" 66 + "test_team" 67 + "test_as_user" 68 + "test_as_admin" 69 + "test_clone_when_team_linked" 44 70 ]; 45 71 46 72 meta = with lib; {
+9 -4
pkgs/development/python-modules/flake8-bugbear/default.nix
··· 4 4 , attrs 5 5 , flake8 6 6 , pytestCheckHook 7 + , pythonOlder 7 8 , hypothesis 8 9 , hypothesmith 9 10 }: 10 11 11 12 buildPythonPackage rec { 12 13 pname = "flake8-bugbear"; 13 - version = "22.3.23"; 14 + version = "22.4.25"; 15 + format = "setuptools"; 16 + 17 + disabled = pythonOlder "3.6"; 14 18 15 19 src = fetchFromGitHub { 16 20 owner = "PyCQA"; 17 21 repo = pname; 18 - rev = version; 19 - sha256 = "sha256-s1EnPM2He+R+vafu14XI1Xuft8Rg6W3vPH2Atc6N7I0="; 22 + rev = "refs/tags/${version}"; 23 + hash = "sha256-y/hpBlIQ3aJj3Y1snpArOCIv2w1ncQNMSYJ+G0CeM84="; 20 24 }; 21 25 22 26 propagatedBuildInputs = [ ··· 32 36 ]; 33 37 34 38 meta = with lib; { 39 + description = "Plugin for Flake8 to find bugs and design problems"; 35 40 homepage = "https://github.com/PyCQA/flake8-bugbear"; 36 41 changelog = "https://github.com/PyCQA/flake8-bugbear/blob/${version}/README.rst#change-log"; 37 - description = '' 42 + longDescription = '' 38 43 A plugin for flake8 finding likely bugs and design problems in your 39 44 program. 40 45 '';
+8 -7
pkgs/development/python-modules/pyrogram/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , pythonOlder 4 - , fetchPypi 4 + , fetchFromGitHub 5 5 , pyaes 6 6 , pysocks 7 7 , async-lru ··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "pyrogram"; 15 - version = "1.4.16"; 15 + version = "2.0.13"; 16 16 17 - disabled = pythonOlder "3.6"; 17 + disabled = pythonOlder "3.7"; 18 18 19 - src = fetchPypi { 20 - pname = "Pyrogram"; 21 - inherit version; 22 - hash = "sha256-ZYAPaAa92z3KtciVHOexdZf9bwZjKQ9WKg6+We0dW+Q="; 19 + src = fetchFromGitHub { 20 + owner = "pyrogram"; 21 + repo = "pyrogram"; 22 + rev = "v${version}"; 23 + hash = "sha256-8mnGfW8/2RbU4gFS8e72KAxMGGkb8XrhsyK01wD97rI="; 23 24 }; 24 25 25 26 propagatedBuildInputs = [
+48 -10
pkgs/development/python-modules/pytest-isort/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, isPy27, mock, pytest, isort }: 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , fetchpatch 5 + , importlib-metadata 6 + , isort 7 + , poetry-core 8 + , pytest 9 + , pytestCheckHook 10 + , pythonOlder 11 + }: 2 12 3 13 buildPythonPackage rec { 4 14 pname = "pytest-isort"; 5 15 version = "3.0.0"; 16 + format = "pyproject"; 17 + 18 + disabled = pythonOlder "3.7"; 6 19 7 - src = fetchPypi { 8 - inherit pname version; 9 - sha256 = "sha256-T+Sybq0q93ZzDsI/WHDXQh81qs4ipBxOk4WG702Hh8s="; 20 + src = fetchFromGitHub { 21 + owner = "stephrdev"; 22 + repo = pname; 23 + rev = version; 24 + hash = "sha256-gbEO3HBDeZ+nUACzpeV6iVuCdNHS5956wFzIYkbam+M="; 10 25 }; 11 26 12 - propagatedBuildInputs = [ isort ]; 27 + nativeBuildInputs = [ 28 + poetry-core 29 + ]; 13 30 14 - checkInputs = [ pytest ] 15 - ++ lib.optionals isPy27 [ mock ]; 31 + buildInputs = [ 32 + pytest 33 + ]; 16 34 17 - checkPhase = '' 18 - py.test -vs --cache-clear 19 - ''; 35 + propagatedBuildInputs = [ 36 + isort 37 + ] ++ lib.optionals (pythonOlder "3.8") [ 38 + importlib-metadata 39 + ]; 40 + 41 + checkInputs = [ 42 + pytestCheckHook 43 + ]; 44 + 45 + patches = [ 46 + # Can be removed with the next release, https://github.com/stephrdev/pytest-isort/pull/44 47 + (fetchpatch { 48 + name = "switch-to-poetry-core.patch"; 49 + url = "https://github.com/stephrdev/pytest-isort/commit/f17ed2d294ae90e415d051e1c720982e3dd01bff.patch"; 50 + sha256 = "sha256-PiOs0c61BNx/tZN11DYblOd7tNzGthNnlkmYMTI9v18="; 51 + }) 52 + ]; 53 + 54 + pythonImportsCheck = [ 55 + "pytest_isort" 56 + ]; 20 57 21 58 meta = with lib; { 22 59 description = "Pytest plugin to perform isort checks (import ordering)"; 23 60 homepage = "https://github.com/moccu/pytest-isort/"; 24 61 license = licenses.bsd3; 62 + maintainers = with maintainers; [ ]; 25 63 }; 26 64 }
+37
pkgs/development/python-modules/rjpl/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , requests 4 + , fetchPypi 5 + , pythonOlder 6 + }: 7 + 8 + buildPythonPackage rec { 9 + pname = "rjpl"; 10 + version = "0.3.6"; 11 + format = "setuptools"; 12 + 13 + disabled = pythonOlder "3.7"; 14 + 15 + src = fetchPypi { 16 + inherit pname version; 17 + hash = "sha256-GLNIpZuM3yuCnPyjBa8KjdaL5cFK8InluuY+LTCrimc="; 18 + }; 19 + 20 + propagatedBuildInputs = [ 21 + requests 22 + ]; 23 + 24 + # Module has no tests 25 + doCheck = false; 26 + 27 + pythonImportsCheck = [ 28 + "rjpl" 29 + ]; 30 + 31 + meta = with lib; { 32 + description = "Library for interacting with the Rejseplanen API"; 33 + homepage = "https://github.com/tomatpasser/python-rejseplanen"; 34 + license = with licenses; [ mit ]; 35 + maintainers = with maintainers; [ fab ]; 36 + }; 37 + }
+1
pkgs/development/python-modules/scikit-learn-extra/default.nix
··· 38 38 ]; 39 39 disabledTests = [ 40 40 "build" # needs network connection 41 + "test_all_estimators" # sklearn.exceptions.NotFittedError: Estimator fails to pass `check_is_fitted` even though it has been fit. 41 42 ]; 42 43 43 44 # Check packages with cythonized modules
+27 -3
pkgs/development/python-modules/vivisect/default.nix
··· 2 2 , buildPythonPackage 3 3 , isPy3k 4 4 , fetchPypi 5 + , wrapQtAppsHook 6 + 7 + # propagates 5 8 , pyasn1 6 9 , pyasn1-modules 7 10 , cxxfilt 8 11 , msgpack 9 12 , pycparser 13 + 14 + # extras: gui 15 + , pyqt5 16 + , pyqtwebengine 17 + 18 + # knobs 19 + , withGui ? false 10 20 }: 21 + 11 22 buildPythonPackage rec { 12 23 pname = "vivisect"; 13 24 version = "1.0.7"; 14 - disabled = isPy3k; 15 25 16 26 src = fetchPypi { 17 27 inherit pname version; 18 28 sha256 = "727a27ac1eb95d5a41f4430f6912e79940525551314fe68a2811fc9d51eaf2e9"; 19 29 }; 20 30 31 + postPatch = '' 32 + substituteInPlace setup.py \ 33 + --replace 'cxxfilt>=0.2.1,<0.3.0' 'cxxfilt' 34 + ''; 35 + 36 + nativeBuildInputs = [ 37 + wrapQtAppsHook 38 + ]; 39 + 21 40 propagatedBuildInputs = [ 22 41 pyasn1 23 42 pyasn1-modules 24 43 cxxfilt 25 44 msgpack 26 45 pycparser 46 + ] ++ lib.optionals (withGui) passthru.extras-require.gui; 47 + 48 + passthru.extras-require.gui = [ 49 + pyqt5 50 + pyqtwebengine 27 51 ]; 28 52 29 - preBuild = '' 30 - sed "s@==.*'@'@" -i setup.py 53 + postFixup = '' 54 + wrapQtApp $out/bin/vivbin 31 55 ''; 32 56 33 57 # requires another repo for test files
+2 -2
pkgs/development/tools/analysis/flow/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "flow"; 5 - version = "0.176.2"; 5 + version = "0.176.3"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "facebook"; 9 9 repo = "flow"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-/4wEafdmrXj4ALUVYx8DM9XyRP/wvbwAl0St1S/+9Ws="; 11 + sha256 = "sha256-ZjWIaZ4XT7v66ozjQu+ld0Tz2gVjQFUD6JoL1nW/DmE="; 12 12 }; 13 13 14 14 makeFlags = [ "FLOW_RELEASE=1" ];
+2 -2
pkgs/development/tools/build-managers/bazel/bazel-remote/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "bazel-remote"; 8 - version = "2.3.6"; 8 + version = "2.3.7"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "buchgr"; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-geb7uHCBvhmqyaDr8wK9sQUcHT3xVgSclovFDpHhIiw="; 14 + sha256 = "sha256-5VxPCfartTRYCmjwNrH7SM0o7IQ4+Tq8Q2IM8hFWyVc="; 15 15 }; 16 16 17 17 vendorSha256 = "sha256-wXgW7HigMIeUZAcZpm5TH9thfCHmpz+M42toWHgwIYo=";
+15 -8
pkgs/development/tools/dapr/cli/default.nix
··· 1 - { buildGoModule, fetchFromGitHub, lib }: 1 + { buildGoModule, fetchFromGitHub, installShellFiles, lib }: 2 2 3 3 buildGoModule rec { 4 - pname = "dapr"; 5 - version = "1.1.0"; 6 - 7 - vendorSha256 = "0fng5a1pvpbwil79xapdalzgkgc9dwsdxs6bznjfwnkyd1vvw6fm"; 4 + pname = "dapr-cli"; 5 + version = "1.7.0"; 8 6 9 7 src = fetchFromGitHub { 10 - sha256 = "0x2mvlzlmcik6ys6xp722px9l4lj9ssyxb06bzxd7yj7m1wwcwp9"; 11 - 12 8 owner = "dapr"; 13 9 repo = "cli"; 14 10 rev = "v${version}"; 11 + sha256 = "sha256-+P1oXG+uvnFDGis5pz9VUQ4n1C7mjuetXz1OtN7IIrg="; 15 12 }; 16 13 17 - doCheck = false; 14 + vendorSha256 = "sha256-EvOyOy7DFQtFavOC9eBUZRJsj3pNdx7jumVmZ/THdaM="; 15 + 16 + nativeBuildInputs = [ installShellFiles ]; 17 + 18 + preCheck = '' 19 + export HOME=$(mktemp -d) 20 + ''; 18 21 19 22 postInstall = '' 20 23 mv $out/bin/cli $out/bin/dapr 24 + 25 + installShellCompletion --cmd dapr \ 26 + --bash <($out/bin/dapr completion bash) \ 27 + --zsh <($out/bin/dapr completion zsh) 21 28 ''; 22 29 23 30 meta = with lib; {
-2
pkgs/development/tools/go-protobuf/default.nix
··· 13 13 14 14 vendorSha256 = "sha256-CcJjFMslSUiZMM0LLMM3BR53YMxyWk8m7hxjMI9tduE="; 15 15 16 - doCheck = false; 17 - 18 16 meta = with lib; { 19 17 homepage = "https://github.com/golang/protobuf"; 20 18 description = " Go bindings for protocol buffer";
+7 -7
pkgs/development/tools/misc/go-license-detector/default.nix
··· 1 - { lib, buildGoModule, fetchFromGitHub }: 1 + { lib, buildGoModule, fetchFromGitHub, git }: 2 2 3 3 buildGoModule rec { 4 4 pname = "go-license-detector"; 5 - version = "3.1.0"; 5 + version = "4.3.0"; 6 6 7 7 src = fetchFromGitHub { 8 - owner = "src-d"; 8 + owner = "go-enry"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "0ln1z3y9q5igf9djkxw05ql2hb1ijcvvz0mrbwz11cdv9xrsa4z4"; 11 + sha256 = "sha256-MubQpxpUCPDBVsEz4NmY8MFEoECXQtzAaZJ89vv5bDc="; 12 12 }; 13 13 14 - vendorSha256 = "0gan5l7vsq0hixxcymhhs8p07v92w60r0lhgvrr9a99nic12vmia"; 14 + vendorSha256 = "sha256-a9yCnGg+4f+UoHbGG8a47z2duBD3qXcAzPKnE4PQsvM="; 15 15 16 - doCheck = false; 16 + checkInputs = [ git ]; 17 17 18 18 meta = with lib; { 19 19 description = "Reliable project licenses detector"; 20 - homepage = "https://github.com/src-d/go-license-detector"; 20 + homepage = "https://github.com/go-enry/go-license-detector"; 21 21 license = licenses.asl20; 22 22 maintainers = with maintainers; [ dtzWill ]; 23 23 mainProgram = "license-detector";
+8 -3
pkgs/development/tools/mockgen/default.nix
··· 1 - { buildGoModule, lib, fetchFromGitHub }: 1 + { buildGoModule, fetchFromGitHub, lib }: 2 + 2 3 buildGoModule rec { 3 4 pname = "mockgen"; 4 5 version = "1.6.0"; 6 + 5 7 src = fetchFromGitHub { 6 8 owner = "golang"; 7 9 repo = "mock"; 8 10 rev = "v${version}"; 9 11 sha256 = "sha256-5Kp7oTmd8kqUN+rzm9cLqp9nb3jZdQyltGGQDiRSWcE="; 10 12 }; 13 + 11 14 vendorSha256 = "sha256-5gkrn+OxbNN8J1lbgbxM8jACtKA7t07sbfJ7gVJWpJM="; 12 15 13 - doCheck = false; 16 + subPackages = [ "mockgen" ]; 14 17 15 - subPackages = [ "mockgen" ]; 18 + preCheck = '' 19 + export GOROOT="$(go env GOROOT)" 20 + ''; 16 21 17 22 meta = with lib; { 18 23 description = "GoMock is a mocking framework for the Go programming language";
+4 -6
pkgs/development/tools/protoc-gen-doc/default.nix
··· 1 1 { buildGoModule, fetchFromGitHub, lib }: 2 2 3 3 buildGoModule rec { 4 - pname = "protoc-gen-doc-unstable"; 5 - version = "1.5.0"; 4 + pname = "protoc-gen-doc"; 5 + version = "1.5.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "pseudomuto"; 9 9 repo = "protoc-gen-doc"; 10 10 rev = "v${version}"; 11 - sha256 = "1bpb5wv76p0sjffh5d1frbygp3q1p07sdh5c8pznl5bdh5pd7zxq"; 11 + sha256 = "sha256-19CN62AwqQGq5Gb5kQqVYhs+LKsJ9K2L0VAakwzPD5Y="; 12 12 }; 13 13 14 - vendorSha256 = "08pk9nxsl28dw3qmrlb7vsm8xbdzmx98qwkxgg93ykrhzx235k1b"; 15 - 16 - doCheck = false; 14 + vendorSha256 = "sha256-K0rZBERSKob5ubZW28QpbcPhgFKOOASkd9UyC9f8gyQ="; 17 15 18 16 meta = with lib; { 19 17 description = "Documentation generator plugin for Google Protocol Buffers";
+3 -1
pkgs/servers/calibre-web/default.nix
··· 53 53 54 54 substituteInPlace setup.cfg \ 55 55 --replace "cps = calibreweb:main" "calibre-web = calibreweb:main" \ 56 + --replace "Flask>=1.0.2,<2.1.0" "Flask>=1.0.2" \ 57 + --replace "Flask-Login>=0.3.2,<0.5.1" "Flask-Login>=0.3.2" \ 56 58 --replace "flask-wtf>=0.14.2,<0.16.0" "flask-wtf>=0.14.2" \ 57 - --replace "lxml>=3.8.0,<4.7.0" "lxml>=3.8.0" \ 59 + --replace "lxml>=3.8.0,<4.8.0" "lxml>=3.8.0" \ 58 60 --replace "PyPDF3>=1.0.0,<1.0.4" "PyPDF3>=1.0.0" \ 59 61 --replace "requests>=2.11.1,<2.25.0" "requests" \ 60 62 --replace "unidecode>=0.04.19,<1.3.0" "unidecode>=0.04.19"
+1 -2
pkgs/servers/gortr/default.nix
··· 10 10 rev = "v${version}"; 11 11 sha256 = "10dq42d3hb6a3ln3x1rag1lqzhwqb66xn4q8k4igjkn5my81nr6q"; 12 12 }; 13 - vendorSha256 = "1nwrzbpqycr4ixk8a90pgaxcwakv5nlfnql6hmcc518qrva198wp"; 14 13 15 - doCheck = false; 14 + vendorSha256 = "1nwrzbpqycr4ixk8a90pgaxcwakv5nlfnql6hmcc518qrva198wp"; 16 15 17 16 meta = with lib; { 18 17 description = "The RPKI-to-Router server used at Cloudflare";
+2 -1
pkgs/servers/home-assistant/component-packages.nix
··· 2146 2146 praw 2147 2147 ]; 2148 2148 "rejseplanen" = ps: with ps; [ 2149 - ]; # missing inputs: rjpl 2149 + rjpl 2150 + ]; 2150 2151 "remember_the_milk" = ps: with ps; [ 2151 2152 httplib2 2152 2153 ]; # missing inputs: RtmAPI
+3 -3
pkgs/servers/routinator/default.nix
··· 7 7 8 8 rustPlatform.buildRustPackage rec { 9 9 pname = "routinator"; 10 - version = "0.11.1"; 10 + version = "0.11.2"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "NLnetLabs"; 14 14 repo = pname; 15 15 rev = "v${version}"; 16 - sha256 = "sha256-8rILHWxUrQQx/ZpZQECa3JBCGD+a5Po8jdqb/rTx6WA="; 16 + sha256 = "sha256-C6BY+Ba5KQgi+jMUKRi7osZNEDMLMDOhA4TQlbqb9jY="; 17 17 }; 18 18 19 - cargoSha256 = "sha256-TYVpi4ZyM0Nl2RWRMEwLM+TeAEzk1IUCQTXZLG92vt4="; 19 + cargoSha256 = "sha256-5ZBE7jbhO4j4FwGSXLIbYjmtmNxFpiME9JqXBqwHSUA="; 20 20 21 21 buildInputs = lib.optionals stdenv.isDarwin [ Security ]; 22 22
+30 -9
pkgs/tools/admin/awslogs/default.nix
··· 1 - { lib, fetchFromGitHub, python3Packages }: 1 + { lib 2 + , fetchFromGitHub 3 + , python3 4 + }: 2 5 3 - python3Packages.buildPythonApplication rec { 6 + python3.pkgs.buildPythonApplication rec { 4 7 pname = "awslogs"; 5 8 version = "0.14.0"; 9 + format = "setuptools"; 6 10 7 11 src = fetchFromGitHub { 8 12 owner = "jorgebastida"; 9 - repo = "awslogs"; 13 + repo = pname; 10 14 rev = version; 11 - sha256 = "1gyry8b64psvmjcb2lb3yilpa7b17yllga06svls4hi69arvrd8f"; 15 + sha256 = "sha256-DrW8s0omQqLp1gaoR6k/YR11afRjUbGYrFtfYhby2b8="; 12 16 }; 13 17 14 - propagatedBuildInputs = with python3Packages; [ 15 - boto3 termcolor python-dateutil docutils setuptools jmespath 18 + propagatedBuildInputs = with python3.pkgs; [ 19 + boto3 20 + termcolor 21 + python-dateutil 22 + docutils 23 + setuptools 24 + jmespath 25 + ]; 26 + 27 + checkInputs = with python3.pkgs; [ 28 + pytestCheckHook 16 29 ]; 17 30 18 - checkInputs = [ python3Packages.pytestCheckHook ]; 31 + postPatch = '' 32 + substituteInPlace setup.py \ 33 + --replace "jmespath>=0.7.1,<1.0.0" "jmespath>=0.7.1" 34 + ''; 35 + 19 36 disabledTests = [ 20 37 "test_main_get_query" 21 38 "test_main_get_with_color" 39 + ]; 40 + 41 + pythonImportsCheck = [ 42 + "awslogs" 22 43 ]; 23 44 24 45 meta = with lib; { 25 - homepage = "https://github.com/jorgebastida/awslogs"; 26 46 description = "AWS CloudWatch logs for Humans"; 27 - maintainers = with maintainers; [ dbrock ]; 47 + homepage = "https://github.com/jorgebastida/awslogs"; 28 48 license = licenses.bsd3; 49 + maintainers = with maintainers; [ dbrock ]; 29 50 }; 30 51 }
+3 -3
pkgs/tools/misc/czkawka/default.nix
··· 14 14 15 15 rustPlatform.buildRustPackage rec { 16 16 pname = "czkawka"; 17 - version = "4.0.0"; 17 + version = "4.1.0"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "qarmin"; 21 21 repo = "czkawka"; 22 22 rev = version; 23 - sha256 = "sha256-UIgyKWMVSKAgUNqfxFYSfP+l9x52XAzrXr1nnfKub9I="; 23 + sha256 = "sha256-N7fCYcjhYlFVkvWdFpR5cu98Vy+jStlBkR/vz/k1lLY="; 24 24 }; 25 25 26 - cargoSha256 = "sha256-jPrkNKFmdVk3LEa20jtXSx+7S98fSrX7Rt/lexC0Gwo="; 26 + cargoSha256 = "sha256-4L7OjJ26Qpl5YuHil7JEYU8xWH65jiyFz0a/ufr7wYQ="; 27 27 28 28 nativeBuildInputs = [ 29 29 pkg-config
+4 -4
pkgs/tools/misc/dotter/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "dotter"; 5 - version = "0.12.9"; 5 + version = "0.12.10"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "SuperCuber"; 9 9 repo = "dotter"; 10 - rev = version; 11 - sha256 = "0rxinrm110i5cbkl7c7vgk7dl0x79cg6g23bdjixsg7h0572c2gi"; 10 + rev = "v${version}"; 11 + hash = "sha256-uSM7M//3LHzdLSOruTyu46sp1a6LeodT2cCEFsuoPW4="; 12 12 }; 13 13 14 - cargoSha256 = "0fr2dvzbpwqvf98wwrxv76nwbrv4m9ppx7br4x78gm8dhf2nj4zx"; 14 + cargoHash = "sha256-JpMEC2HjAQLQiXHSE6L0HBDc0vLhd465wDK2+35aBXA="; 15 15 16 16 checkInputs = [ which ]; 17 17
+2 -2
pkgs/tools/misc/nix-direnv/default.nix
··· 7 7 }: 8 8 stdenv.mkDerivation rec { 9 9 pname = "nix-direnv"; 10 - version = "2.0.0"; 10 + version = "2.0.1"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "nix-community"; 14 14 repo = "nix-direnv"; 15 15 rev = version; 16 - sha256 = "sha256-0gBb/U7tNNSjazJE/Z2qAxHPX53wRSPMJ8rHc7HtCNg="; 16 + sha256 = "sha256-edRdnMNYB5N9v9QlfSFNqJl93X0rSCllmzSZO9+sCOg="; 17 17 }; 18 18 19 19 # Substitute instead of wrapping because the resulting file is
+18 -15
pkgs/tools/security/chntpw/00-chntpw-build-arch-autodetect.patch
··· 1 - diff -urN chntpw-140201.orig/Makefile chntpw-140201/Makefile 2 - --- chntpw-140201.orig/Makefile 2014-02-01 20:54:37.000000000 +0400 3 - +++ chntpw-140201/Makefile 2014-08-03 20:26:56.497161881 +0400 4 - @@ -12,14 +12,13 @@ 1 + --- chntpw-140201.orig/Makefile 2014-02-01 17:54:37.000000000 +0100 2 + +++ chntpw-140201/Makefile 2022-04-21 00:14:45.000000000 +0200 3 + @@ -6,24 +6,7 @@ 4 + # See INSTALL for more info. 5 + # 5 6 6 - CC=gcc 7 - 7 + -#SSLPATH=/usr/local/ssl 8 + -OSSLPATH=/usr 9 + -OSSLINC=$(OSSLPATH)/include 10 + - 11 + -CC=gcc 12 + - 8 13 -# Force 32 bit 9 14 -CFLAGS= -DUSEOPENSSL -g -I. -I$(OSSLINC) -Wall -m32 10 15 -OSSLLIB=$(OSSLPATH)/lib ··· 13 18 -#CFLAGS= -DUSEOPENSSL -g -I. -I$(OSSLINC) -Wall 14 19 -#OSSLLIB=$(OSSLPATH)/lib64 15 20 - 16 - +ifeq '$(shell gcc -dumpmachine)' 'x86_64-unknown-linux-gnu' 17 - + CFLAGS= -DUSEOPENSSL -g -I. -I$(OSSLINC) -Wall 18 - + OSSLLIB=$(OSSLPATH)/lib64 19 - +else ifeq '$(shell gcc -dumpmachine)' 'i686-unknown-linux-gnu' 20 - + CFLAGS= -DUSEOPENSSL -g -I. -I$(OSSLINC) -Wall -m32 21 - + OSSLLIB=$(OSSLPATH)/lib 22 - +endif 21 + - 22 + -# This is to link with whatever we have, SSL crypto lib we put in static 23 + -#LIBS=-L$(OSSLLIB) $(OSSLLIB)/libcrypto.a 24 + -LIBS=-L$(OSSLLIB) 25 + +CFLAGS= -DUSEOPENSSL -g -I. -Wall 23 26 24 - # This is to link with whatever we have, SSL crypto lib we put in static 25 - #LIBS=-L$(OSSLLIB) $(OSSLLIB)/libcrypto.a 27 + 28 + all: chntpw chntpw.static cpnt reged reged.static samusrgrp samusrgrp.static sampasswd sampasswd.static
+7 -13
pkgs/tools/security/chntpw/01-chntpw-install-target.patch
··· 1 - diff -urN chntpw-140201.orig/Makefile chntpw-140201/Makefile 2 - --- chntpw-140201.orig/Makefile 2014-08-03 20:26:56.497161881 +0400 3 - +++ chntpw-140201/Makefile 2014-08-04 12:57:16.563818342 +0400 4 - @@ -10,6 +10,8 @@ 5 - OSSLPATH=/usr 6 - OSSLINC=$(OSSLPATH)/include 1 + --- chntpw-140201/Makefile 2022-04-21 00:14:45.000000000 +0200 2 + +++ chntpw-140201.new/Makefile 2022-04-21 09:15:42.000000000 +0200 3 + @@ -6,10 +6,16 @@ 4 + # See INSTALL for more info. 5 + # 7 6 8 7 +PREFIX ?= /usr 9 8 + 10 - CC=gcc 11 - 12 - ifeq '$(shell gcc -dumpmachine)' 'x86_64-unknown-linux-gnu' 13 - @@ -24,8 +26,12 @@ 14 - #LIBS=-L$(OSSLLIB) $(OSSLLIB)/libcrypto.a 15 - LIBS=-L$(OSSLLIB) 9 + CFLAGS= -DUSEOPENSSL -g -I. -Wall 16 10 17 - +BINARIES := chntpw chntpw.static cpnt reged reged.static samusrgrp samusrgrp.static sampasswd sampasswd.static 11 + +BINARIES := chntpw cpnt reged samusrgrp sampasswd 18 12 19 13 -all: chntpw chntpw.static cpnt reged reged.static samusrgrp samusrgrp.static sampasswd sampasswd.static 20 14 +all: $(BINARIES)
+39 -3
pkgs/tools/security/chntpw/default.nix
··· 1 - { lib, stdenv, fetchurl, unzip }: 1 + { lib, stdenv, fetchurl, unzip, fetchpatch }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "chntpw"; ··· 11 11 }; 12 12 13 13 nativeBuildInputs = [ unzip ]; 14 - buildInputs = lib.optionals stdenv.isLinux [ stdenv.glibc.out stdenv.glibc.static ]; 15 14 16 15 patches = [ 17 16 ./00-chntpw-build-arch-autodetect.patch 18 17 ./01-chntpw-install-target.patch 18 + # Import various bug fixes from debian 19 + (fetchpatch { 20 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/04_get_abs_path"; 21 + sha256 = "17h0gaczqd5b792481synr1ny72frwslb779lm417pyrz6kh9q8n"; 22 + }) 23 + (fetchpatch { 24 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/06_correct_test_open_syscall"; 25 + sha256 = "00lg83bimbki988n71w54mmhjp9529r0ngm40d7fdmnc2dlpj3hd"; 26 + }) 27 + (fetchpatch { 28 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/07_detect_failure_to_write_key"; 29 + sha256 = "0pk6xnprh2pqyx4n4lw3836z6fqsw3mclkzppl5rhjaahriwxw4l"; 30 + }) 31 + (fetchpatch { 32 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/08_no_deref_null"; 33 + sha256 = "1g7pfmjaj0c2sm64s3api2kglj7jbgddjjd3r4drw6phwdkah0zs"; 34 + }) 35 + (fetchpatch { 36 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/09_improve_robustness"; 37 + sha256 = "1nszkdy01ixnain7cwdmfbhjngphw1300ifagc1wgl9wvghzviaa"; 38 + }) 39 + (fetchpatch { 40 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/11_improve_documentation"; 41 + sha256 = "0yql6hj72q7cq69rrspsjkpiipdhcwb0b9w5j8nhq40cnx9mgqgg"; 42 + }) 43 + (fetchpatch { 44 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/12_readonly_filesystem"; 45 + sha256 = "1kxcy7f2pl6fqgmjg8bnl3pl5wgiw5xnbyx12arinmqkkggp4fa4"; 46 + }) 47 + (fetchpatch { 48 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/13_write_to_hive"; 49 + sha256 = "1638lcyxjkrkmbr3n28byixny0qrxvkciw1xd97x48mj6bnwqrkv"; 50 + }) 51 + (fetchpatch { 52 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/14_improve_description"; 53 + sha256 = "11y5kc4dh4zv24nkb0jw2zwlifx6nzsd4jbizn63l6dbpqgb25rs"; 54 + }) 19 55 ]; 20 56 21 57 installPhase = '' ··· 27 63 description = "An utility to reset the password of any user that has a valid local account on a Windows system"; 28 64 maintainers = with lib.maintainers; [ deepfire ]; 29 65 license = licenses.gpl2; 30 - platforms = with lib.platforms; linux; 66 + platforms = lib.platforms.unix; 31 67 }; 32 68 }
+8 -1
pkgs/top-level/all-packages.nix
··· 3749 3749 inherit (darwin.apple_sdk.frameworks) Security; 3750 3750 }; 3751 3751 3752 - lapce = callPackage ../applications/editors/lapce { }; 3752 + lapce = callPackage ../applications/editors/lapce { 3753 + inherit (darwin) libobjc; 3754 + inherit (darwin.apple_sdk.frameworks) Security CoreServices ApplicationServices Carbon AppKit; 3755 + }; 3753 3756 3754 3757 lcdproc = callPackage ../servers/monitoring/lcdproc { }; 3755 3758 ··· 25405 25408 25406 25409 ChowKick = callPackage ../applications/audio/ChowKick { }; 25407 25410 25411 + ChowPhaser = callPackage ../applications/audio/ChowPhaser { }; 25412 + 25408 25413 CHOWTapeModel = callPackage ../applications/audio/CHOWTapeModel { }; 25409 25414 25410 25415 chromium = callPackage ../applications/networking/browsers/chromium (config.chromium or {}); ··· 34661 34666 virglrenderer = callPackage ../development/libraries/virglrenderer { }; 34662 34667 34663 34668 vivid = callPackage ../tools/misc/vivid { }; 34669 + 34670 + vivisect = with python3Packages; toPythonApplication (vivisect.override { withGui = true; }); 34664 34671 34665 34672 vokoscreen = libsForQt5.callPackage ../applications/video/vokoscreen { }; 34666 34673
+5 -1
pkgs/top-level/python-packages.nix
··· 8957 8957 python3 = python; 8958 8958 }); 8959 8959 8960 + rjpl = callPackage ../development/python-modules/rjpl { }; 8961 + 8960 8962 rjsmin = callPackage ../development/python-modules/rjsmin { }; 8961 8963 8962 8964 rki-covid-parser = callPackage ../development/python-modules/rki-covid-parser { }; ··· 10675 10677 10676 10678 vispy = callPackage ../development/python-modules/vispy { }; 10677 10679 10678 - vivisect = callPackage ../development/python-modules/vivisect { }; 10680 + vivisect = callPackage ../development/python-modules/vivisect { 10681 + inherit (pkgs.libsForQt5) wrapQtAppsHook; 10682 + }; 10679 10683 10680 10684 viv-utils = callPackage ../development/python-modules/viv-utils { }; 10681 10685