Merge staging-next into staging

authored by github-actions[bot] and committed by GitHub 5db8cea3 02dbca8c

+234 -115
+5 -4
nixos/modules/hardware/video/nvidia.nix
··· 361 services.udev.extraRules = 362 '' 363 # Create /dev/nvidia-uvm when the nvidia-uvm module is loaded. 364 - KERNEL=="nvidia", RUN+="${pkgs.runtimeShell} -c 'mknod -m 666 /dev/nvidiactl c $$(grep nvidia-frontend /proc/devices | cut -d \ -f 1) 255'" 365 - KERNEL=="nvidia_modeset", RUN+="${pkgs.runtimeShell} -c 'mknod -m 666 /dev/nvidia-modeset c $$(grep nvidia-frontend /proc/devices | cut -d \ -f 1) 254'" 366 - KERNEL=="card*", SUBSYSTEM=="drm", DRIVERS=="nvidia", RUN+="${pkgs.runtimeShell} -c 'mknod -m 666 /dev/nvidia%n c $$(grep nvidia-frontend /proc/devices | cut -d \ -f 1) %n'" 367 KERNEL=="nvidia_uvm", RUN+="${pkgs.runtimeShell} -c 'mknod -m 666 /dev/nvidia-uvm c $$(grep nvidia-uvm /proc/devices | cut -d \ -f 1) 0'" 368 - KERNEL=="nvidia_uvm", RUN+="${pkgs.runtimeShell} -c 'mknod -m 666 /dev/nvidia-uvm-tools c $$(grep nvidia-uvm /proc/devices | cut -d \ -f 1) 0'" 369 '' + optionalString cfg.powerManagement.finegrained '' 370 # Remove NVIDIA USB xHCI Host Controller devices, if present 371 ACTION=="add", SUBSYSTEM=="pci", ATTR{vendor}=="0x10de", ATTR{class}=="0x0c0330", ATTR{remove}="1"
··· 361 services.udev.extraRules = 362 '' 363 # Create /dev/nvidia-uvm when the nvidia-uvm module is loaded. 364 + KERNEL=="nvidia", RUN+="${pkgs.runtimeShell} -c 'mknod -m 666 /dev/nvidiactl c 195 255'" 365 + KERNEL=="nvidia_modeset", RUN+="${pkgs.runtimeShell} -c 'mknod -m 666 /dev/nvidia-modeset c 195 254'" 366 + KERNEL=="card*", SUBSYSTEM=="drm", DRIVERS=="nvidia", PROGRAM="${pkgs.gnugrep}/bin/grep 'Device Minor:' /proc/driver/nvidia/gpus/%b/information", \ 367 + RUN+="${pkgs.runtimeShell} -c 'mknod -m 666 /dev/nvidia%c{3} c 195 %c{3}" 368 KERNEL=="nvidia_uvm", RUN+="${pkgs.runtimeShell} -c 'mknod -m 666 /dev/nvidia-uvm c $$(grep nvidia-uvm /proc/devices | cut -d \ -f 1) 0'" 369 + KERNEL=="nvidia_uvm", RUN+="${pkgs.runtimeShell} -c 'mknod -m 666 /dev/nvidia-uvm-tools c $$(grep nvidia-uvm /proc/devices | cut -d \ -f 1) 1'" 370 '' + optionalString cfg.powerManagement.finegrained '' 371 # Remove NVIDIA USB xHCI Host Controller devices, if present 372 ACTION=="add", SUBSYSTEM=="pci", ATTR{vendor}=="0x10de", ATTR{class}=="0x0c0330", ATTR{remove}="1"
+3 -1
nixos/modules/module-list.nix
··· 172 ./programs/java.nix 173 ./programs/k40-whisperer.nix 174 ./programs/kclock.nix 175 ./programs/kdeconnect.nix 176 ./programs/kbdlight.nix 177 ./programs/less.nix ··· 1183 ./system/boot/stage-2.nix 1184 ./system/boot/systemd.nix 1185 ./system/boot/systemd/coredump.nix 1186 ./system/boot/systemd/journald.nix 1187 ./system/boot/systemd/logind.nix 1188 ./system/boot/systemd/nspawn.nix 1189 ./system/boot/systemd/shutdown.nix 1190 ./system/boot/systemd/tmpfiles.nix 1191 ./system/boot/systemd/user.nix 1192 - ./system/boot/systemd/initrd.nix 1193 ./system/boot/timesyncd.nix 1194 ./system/boot/tmp.nix 1195 ./system/etc/etc-activation.nix
··· 172 ./programs/java.nix 173 ./programs/k40-whisperer.nix 174 ./programs/kclock.nix 175 + ./programs/k3b.nix 176 ./programs/kdeconnect.nix 177 ./programs/kbdlight.nix 178 ./programs/less.nix ··· 1184 ./system/boot/stage-2.nix 1185 ./system/boot/systemd.nix 1186 ./system/boot/systemd/coredump.nix 1187 + ./system/boot/systemd/initrd-secrets.nix 1188 + ./system/boot/systemd/initrd.nix 1189 ./system/boot/systemd/journald.nix 1190 ./system/boot/systemd/logind.nix 1191 ./system/boot/systemd/nspawn.nix 1192 ./system/boot/systemd/shutdown.nix 1193 ./system/boot/systemd/tmpfiles.nix 1194 ./system/boot/systemd/user.nix 1195 ./system/boot/timesyncd.nix 1196 ./system/boot/tmp.nix 1197 ./system/etc/etc-activation.nix
+52
nixos/modules/programs/k3b.nix
···
··· 1 + { config, pkgs, lib, ... }: 2 + 3 + with lib; 4 + 5 + { 6 + # interface 7 + options.programs.k3b = { 8 + enable = mkOption { 9 + type = types.bool; 10 + default = false; 11 + description = '' 12 + Whether to enable k3b, the KDE disk burning application. 13 + 14 + Additionally to installing <package>k3b</package> enabling this will 15 + add <literal>setuid</literal> wrappers in <literal>/run/wrappers/bin</literal> 16 + for both <package>cdrdao</package> and <package>cdrecord</package>. On first 17 + run you must manually configure the path of <package>cdrdae</package> and 18 + <package>cdrecord</package> to correspond to the appropriate paths under 19 + <literal>/run/wrappers/bin</literal> in the "Setup External Programs" menu. 20 + ''; 21 + }; 22 + }; 23 + 24 + # implementation 25 + config = mkIf config.programs.k3b.enable { 26 + 27 + environment.systemPackages = with pkgs; [ 28 + k3b 29 + dvdplusrwtools 30 + cdrdao 31 + cdrkit 32 + ]; 33 + 34 + security.wrappers = { 35 + cdrdao = { 36 + setuid = true; 37 + owner = "root"; 38 + group = "cdrom"; 39 + permissions = "u+wrx,g+x"; 40 + source = "${pkgs.cdrdao}/bin/cdrdao"; 41 + }; 42 + cdrecord = { 43 + setuid = true; 44 + owner = "root"; 45 + group = "cdrom"; 46 + permissions = "u+wrx,g+x"; 47 + source = "${pkgs.cdrkit}/bin/cdrecord"; 48 + }; 49 + }; 50 + 51 + }; 52 + }
+36
nixos/modules/system/boot/systemd/initrd-secrets.nix
···
··· 1 + { config, pkgs, lib, ... }: 2 + 3 + { 4 + config = lib.mkIf (config.boot.initrd.enable && config.boot.initrd.systemd.enable) { 5 + # Copy secrets into the initrd if they cannot be appended 6 + boot.initrd.systemd.contents = lib.mkIf (!config.boot.loader.supportsInitrdSecrets) 7 + (lib.mapAttrs' (dest: source: lib.nameValuePair "/.initrd-secrets/${dest}" { source = if source == null then dest else source; }) config.boot.initrd.secrets); 8 + 9 + # Copy secrets to their respective locations 10 + boot.initrd.systemd.services.initrd-nixos-copy-secrets = lib.mkIf (config.boot.initrd.secrets != {}) { 11 + description = "Copy secrets into place"; 12 + # Run as early as possible 13 + wantedBy = [ "sysinit.target" ]; 14 + before = [ "cryptsetup-pre.target" ]; 15 + unitConfig.DefaultDependencies = false; 16 + 17 + # We write the secrets to /.initrd-secrets and move them because this allows 18 + # secrets to be written to /run. If we put the secret directly to /run and 19 + # drop this service, we'd mount the /run tmpfs over the secret, making it 20 + # invisible in stage 2. 21 + script = '' 22 + for secret in $(cd /.initrd-secrets; find . -type f); do 23 + mkdir -p "$(dirname "/$secret")" 24 + cp "/.initrd-secrets/$secret" "/$secret" 25 + done 26 + ''; 27 + 28 + unitConfig = { 29 + Type = "oneshot"; 30 + RemainAfterExit = true; 31 + }; 32 + }; 33 + # The script needs this 34 + boot.initrd.systemd.extraBin.find = "${pkgs.findutils}/bin/find"; 35 + }; 36 + }
+1 -1
nixos/tests/systemd-initrd-luks-keyfile.nix
··· 32 }; 33 }; 34 virtualisation.bootDevice = "/dev/mapper/cryptroot"; 35 - boot.initrd.systemd.contents."/etc/cryptroot.key".source = keyfile; 36 }; 37 }; 38
··· 32 }; 33 }; 34 virtualisation.bootDevice = "/dev/mapper/cryptroot"; 35 + boot.initrd.secrets."/etc/cryptroot.key" = keyfile; 36 }; 37 }; 38
+3 -3
pkgs/applications/audio/pyradio/default.nix
··· 2 3 python3Packages.buildPythonApplication rec { 4 pname = "pyradio"; 5 - version = "0.8.9.16"; 6 7 propagatedBuildInputs = with python3Packages; [ 8 requests ··· 13 src = fetchFromGitHub { 14 owner = "coderholic"; 15 repo = pname; 16 - rev = version; 17 - sha256 = "sha256-uerQfyGHWhLbO6UkLSMA1tdfW/8fDQkcm6hYIdwwC7I="; 18 }; 19 20 checkPhase = ''
··· 2 3 python3Packages.buildPythonApplication rec { 4 pname = "pyradio"; 5 + version = "0.8.9.17"; 6 7 propagatedBuildInputs = with python3Packages; [ 8 requests ··· 13 src = fetchFromGitHub { 14 owner = "coderholic"; 15 repo = pname; 16 + rev = "refs/tags/${version}"; 17 + sha256 = "sha256-lfDSD1+xbA6tAKeHKciq/n6YHWS4JTOvjIqOn+FQ2yA="; 18 }; 19 20 checkPhase = ''
+2 -2
pkgs/applications/blockchains/btcpayserver/default.nix
··· 3 4 buildDotnetModule rec { 5 pname = "btcpayserver"; 6 - version = "1.4.7"; 7 8 src = fetchFromGitHub { 9 owner = pname; 10 repo = pname; 11 rev = "v${version}"; 12 - sha256 = "sha256-Qz4BNrhK+NPnKBgjXGYl4P2R878LCuMGZxLECawA12E="; 13 }; 14 15 projectFile = "BTCPayServer/BTCPayServer.csproj";
··· 3 4 buildDotnetModule rec { 5 pname = "btcpayserver"; 6 + version = "1.5.1"; 7 8 src = fetchFromGitHub { 9 owner = pname; 10 repo = pname; 11 rev = "v${version}"; 12 + sha256 = "sha256-DcxRrVUen+JxMpiLDPfknpwCe962ifaekBeBnxJ0y88="; 13 }; 14 15 projectFile = "BTCPayServer/BTCPayServer.csproj";
+29 -29
pkgs/applications/blockchains/btcpayserver/deps.nix
··· 31 }) 32 (fetchNuGet { 33 pname = "BTCPayServer.Lightning.All"; 34 - version = "1.3.2"; 35 - sha256 = "0xcfba8n9zf5m1nb48ilggp03kpki4nv4kx7k7a5w1gxgm6k6j9z"; 36 }) 37 (fetchNuGet { 38 pname = "BTCPayServer.Lightning.Charge"; 39 - version = "1.3.1"; 40 - sha256 = "1xakwnb839dl0qnhqprsnfq8png31iyb0fsngljis5jc8yvb4353"; 41 }) 42 (fetchNuGet { 43 pname = "BTCPayServer.Lightning.CLightning"; 44 - version = "1.3.1"; 45 - sha256 = "0a79p6i3xiq6svv08c4hhihkvqa2ac7fphi3g9i0cwh47ak0k5h2"; 46 }) 47 (fetchNuGet { 48 pname = "BTCPayServer.Lightning.Common"; ··· 51 }) 52 (fetchNuGet { 53 pname = "BTCPayServer.Lightning.Common"; 54 - version = "1.3.1"; 55 - sha256 = "165p1246fn628hlwdrx7sanlxa6qqpn480rq1asn5r1602w21844"; 56 }) 57 (fetchNuGet { 58 pname = "BTCPayServer.Lightning.Eclair"; 59 - version = "1.3.1"; 60 - sha256 = "1vlwm5mw8wffp00xhkx19yavk59b5x540sg81vis3q7hjvvgca5c"; 61 }) 62 (fetchNuGet { 63 pname = "BTCPayServer.Lightning.LNBank"; 64 - version = "1.3.1"; 65 - sha256 = "0qga34vi4fzfr0g4qk0ad8xkqdig2ishmdj9i32s5yrrjrkx7c8d"; 66 }) 67 (fetchNuGet { 68 pname = "BTCPayServer.Lightning.LND"; 69 - version = "1.3.1"; 70 - sha256 = "1b70jlyzy9xjvfywzi6i3l3sd4mkknxpni9akdi0phsfqysmy0wl"; 71 }) 72 (fetchNuGet { 73 pname = "BuildBundlerMinifier"; ··· 90 sha256 = "01y8bhsnxghn3flz0pr11vj6wjrpmia8rpdrsp7kjfc1zmhqlgma"; 91 }) 92 (fetchNuGet { 93 pname = "DigitalRuby.ExchangeSharp"; 94 version = "0.6.3"; 95 sha256 = "1vb7ahafcd3lcbiiz552aisilwm1yq3j600gkf1wik8vhvsk02fs"; ··· 373 pname = "Microsoft.DotNet.PlatformAbstractions"; 374 version = "3.1.6"; 375 sha256 = "0b9myd7gqbpaw9pkd2bx45jhik9mwj0f1ss57sk2cxmag2lkdws5"; 376 - }) 377 - (fetchNuGet { 378 - pname = "Microsoft.EntityFrameworkCore.Abstractions"; 379 - version = "6.0.0"; 380 - sha256 = "1aw13qjkpglc1mm3cv7s73s8fschy8lzdnigsp346b7mycpg7v92"; 381 }) 382 (fetchNuGet { 383 pname = "Microsoft.EntityFrameworkCore.Abstractions"; ··· 831 }) 832 (fetchNuGet { 833 pname = "NBitcoin"; 834 - version = "6.0.15"; 835 - sha256 = "038dcl2k88w4cijws3pdnjflgy4lmqx70z0l7yqz355kmxjz8ain"; 836 }) 837 (fetchNuGet { 838 pname = "NBitcoin"; ··· 856 }) 857 (fetchNuGet { 858 pname = "NBXplorer.Client"; 859 - version = "4.1.3"; 860 - sha256 = "1nh4jj7yg81825hr7cc99qlnfmdm6jibap81qqi8a968b61z4251"; 861 }) 862 (fetchNuGet { 863 pname = "NETStandard.Library"; ··· 931 }) 932 (fetchNuGet { 933 pname = "Npgsql.EntityFrameworkCore.PostgreSQL"; 934 - version = "6.0.1"; 935 - sha256 = "108sc62dqdb6ym2ck651kamcv6qf93cmaqzygfblmiglwzi6frnx"; 936 }) 937 (fetchNuGet { 938 pname = "Npgsql"; 939 - version = "6.0.1"; 940 - sha256 = "150paiwqxp6zsy5v7vl2a9h3ikzfv3pd04whxifmamq0h1ghw0ld"; 941 }) 942 (fetchNuGet { 943 pname = "NSec.Cryptography"; ··· 1086 }) 1087 (fetchNuGet { 1088 pname = "Selenium.WebDriver.ChromeDriver"; 1089 - version = "98.0.4758.10200"; 1090 - sha256 = "10mc50gm78zbxrwvxlygzmj2a29liiacv8haax0534c26vj9dwkl"; 1091 }) 1092 (fetchNuGet { 1093 pname = "Selenium.WebDriver";
··· 31 }) 32 (fetchNuGet { 33 pname = "BTCPayServer.Lightning.All"; 34 + version = "1.3.6"; 35 + sha256 = "0jdpqy6kxg0lyh4n88wsvrcqc0kk7s7zn5lw7ivwys716m69qrdl"; 36 }) 37 (fetchNuGet { 38 pname = "BTCPayServer.Lightning.Charge"; 39 + version = "1.3.2"; 40 + sha256 = "0v5rss6dg7297kq1frhn2pj9gd0rd8g1p5d316x5wkd4w7pmrm2w"; 41 }) 42 (fetchNuGet { 43 pname = "BTCPayServer.Lightning.CLightning"; 44 + version = "1.3.2"; 45 + sha256 = "0qs5p6pm54il23j8yysw0pzvrki37y6z8cd2gdknpz2f3wg7slm9"; 46 }) 47 (fetchNuGet { 48 pname = "BTCPayServer.Lightning.Common"; ··· 51 }) 52 (fetchNuGet { 53 pname = "BTCPayServer.Lightning.Common"; 54 + version = "1.3.2"; 55 + sha256 = "119zplkc7iy9wc95iz1qnyi42fr99ar4hp8a11p708a22w941yi0"; 56 }) 57 (fetchNuGet { 58 pname = "BTCPayServer.Lightning.Eclair"; 59 + version = "1.3.2"; 60 + sha256 = "08gw1gqng1khxzvvhlwsg6lw1w56ylilg738wi6cbcwy7vl7f6bb"; 61 }) 62 (fetchNuGet { 63 pname = "BTCPayServer.Lightning.LNBank"; 64 + version = "1.3.4"; 65 + sha256 = "1vyz63pi5j31y8pz0b4hp9c4j249rszzfcymk3z3b2clwq32s4i4"; 66 }) 67 (fetchNuGet { 68 pname = "BTCPayServer.Lightning.LND"; 69 + version = "1.3.3"; 70 + sha256 = "137azpxxmp2q69bp07ky1jsgnfy9lf0dg5ba8l654flvvrgxaq6y"; 71 }) 72 (fetchNuGet { 73 pname = "BuildBundlerMinifier"; ··· 90 sha256 = "01y8bhsnxghn3flz0pr11vj6wjrpmia8rpdrsp7kjfc1zmhqlgma"; 91 }) 92 (fetchNuGet { 93 + pname = "Dapper"; 94 + version = "2.0.123"; 95 + sha256 = "15hxrchfgiqnmgf8fqhrf4pb4c8l9igg5qnkw9yk3rkagcqfkk91"; 96 + }) 97 + (fetchNuGet { 98 pname = "DigitalRuby.ExchangeSharp"; 99 version = "0.6.3"; 100 sha256 = "1vb7ahafcd3lcbiiz552aisilwm1yq3j600gkf1wik8vhvsk02fs"; ··· 378 pname = "Microsoft.DotNet.PlatformAbstractions"; 379 version = "3.1.6"; 380 sha256 = "0b9myd7gqbpaw9pkd2bx45jhik9mwj0f1ss57sk2cxmag2lkdws5"; 381 }) 382 (fetchNuGet { 383 pname = "Microsoft.EntityFrameworkCore.Abstractions"; ··· 831 }) 832 (fetchNuGet { 833 pname = "NBitcoin"; 834 + version = "6.0.18"; 835 + sha256 = "1dr669h68cx6yfzr3n97yzzwbgnsv5g2008diyxngdjm55nh3q9s"; 836 }) 837 (fetchNuGet { 838 pname = "NBitcoin"; ··· 856 }) 857 (fetchNuGet { 858 pname = "NBXplorer.Client"; 859 + version = "4.2.0"; 860 + sha256 = "1adbn5cbr42cjfvijaf1lffhcrcn0ws1arfi7mrg3kjshbzfgims"; 861 }) 862 (fetchNuGet { 863 pname = "NETStandard.Library"; ··· 931 }) 932 (fetchNuGet { 933 pname = "Npgsql.EntityFrameworkCore.PostgreSQL"; 934 + version = "6.0.3"; 935 + sha256 = "0mgwm9psxvrq6vs2cy7m72wnknydgrs71hir2jqal5wbdh8g01np"; 936 }) 937 (fetchNuGet { 938 pname = "Npgsql"; 939 + version = "6.0.3"; 940 + sha256 = "1crzgi4dfbn8r381m9rvkma5xi2q7gqdzgxhc36hy3r0y63v1l8q"; 941 }) 942 (fetchNuGet { 943 pname = "NSec.Cryptography"; ··· 1086 }) 1087 (fetchNuGet { 1088 pname = "Selenium.WebDriver.ChromeDriver"; 1089 + version = "100.0.4896.6000"; 1090 + sha256 = "1pfdvxjy4xiw1j7787lf07w9nr0dmj589vf6p4aqmk2cfz8j35c6"; 1091 }) 1092 (fetchNuGet { 1093 pname = "Selenium.WebDriver";
+2 -2
pkgs/applications/blockchains/lnd/default.nix
··· 6 7 buildGoModule rec { 8 pname = "lnd"; 9 - version = "0.14.2-beta"; 10 11 src = fetchFromGitHub { 12 owner = "lightningnetwork"; 13 repo = "lnd"; 14 rev = "v${version}"; 15 - sha256 = "sha256-JOKitxxWcTlGlxYR1XpySZlI2fT9jgBrOxNUwT/sqdQ="; 16 }; 17 18 vendorSha256 = "sha256-shDmJcEyobY7Ih1MHMEY2GQnzAffsH/y4J1bme/bT7I=";
··· 6 7 buildGoModule rec { 8 pname = "lnd"; 9 + version = "0.14.3-beta"; 10 11 src = fetchFromGitHub { 12 owner = "lightningnetwork"; 13 repo = "lnd"; 14 rev = "v${version}"; 15 + sha256 = "sha256-ZTvGFmjhQBIWqMGatMAlX59uVyl1oUKo7L5jiz571Gc"; 16 }; 17 18 vendorSha256 = "sha256-shDmJcEyobY7Ih1MHMEY2GQnzAffsH/y4J1bme/bT7I=";
+2 -2
pkgs/applications/blockchains/nbxplorer/default.nix
··· 2 3 buildDotnetModule rec { 4 pname = "nbxplorer"; 5 - version = "2.2.20"; 6 7 src = fetchFromGitHub { 8 owner = "dgarage"; 9 repo = "NBXplorer"; 10 rev = "v${version}"; 11 - sha256 = "sha256-C3REnfecNwf3dtk6aLYAEsedHRlIrQZAokXtf6KI8U0="; 12 }; 13 14 projectFile = "NBXplorer/NBXplorer.csproj";
··· 2 3 buildDotnetModule rec { 4 pname = "nbxplorer"; 5 + version = "2.3.20"; 6 7 src = fetchFromGitHub { 8 owner = "dgarage"; 9 repo = "NBXplorer"; 10 rev = "v${version}"; 11 + sha256 = "sha256-cAko5s1bFSI7HOcXg/tZtdMMe0S9zkRBeZ6bispxgwc="; 12 }; 13 14 projectFile = "NBXplorer/NBXplorer.csproj";
+15
pkgs/applications/blockchains/nbxplorer/deps.nix
··· 1 { fetchNuGet }: [ 2 (fetchNuGet { 3 pname = "DBTrie"; 4 version = "1.0.39"; 5 sha256 = "0kbvl3kf73hrh1w2n3d2wshlxpqsv1pwydhwv2wxigmvs70fn1xp"; ··· 248 pname = "NicolasDorier.StandardConfiguration"; 249 version = "1.0.0.18"; 250 sha256 = "0lgssxafv6cqlw21fb79fm0fcln0clgsk6zadcwrnjv9vampfw7b"; 251 }) 252 (fetchNuGet { 253 pname = "NuGet.Frameworks"; ··· 753 pname = "System.Runtime.CompilerServices.Unsafe"; 754 version = "4.5.0"; 755 sha256 = "17labczwqk3jng3kkky73m0jhi8wc21vbl7cz5c0hj2p1dswin43"; 756 }) 757 (fetchNuGet { 758 pname = "System.Runtime.Extensions";
··· 1 { fetchNuGet }: [ 2 (fetchNuGet { 3 + pname = "Dapper"; 4 + version = "2.0.123"; 5 + sha256 = "15hxrchfgiqnmgf8fqhrf4pb4c8l9igg5qnkw9yk3rkagcqfkk91"; 6 + }) 7 + (fetchNuGet { 8 pname = "DBTrie"; 9 version = "1.0.39"; 10 sha256 = "0kbvl3kf73hrh1w2n3d2wshlxpqsv1pwydhwv2wxigmvs70fn1xp"; ··· 253 pname = "NicolasDorier.StandardConfiguration"; 254 version = "1.0.0.18"; 255 sha256 = "0lgssxafv6cqlw21fb79fm0fcln0clgsk6zadcwrnjv9vampfw7b"; 256 + }) 257 + (fetchNuGet { 258 + pname = "Npgsql"; 259 + version = "6.0.3"; 260 + sha256 = "1crzgi4dfbn8r381m9rvkma5xi2q7gqdzgxhc36hy3r0y63v1l8q"; 261 }) 262 (fetchNuGet { 263 pname = "NuGet.Frameworks"; ··· 763 pname = "System.Runtime.CompilerServices.Unsafe"; 764 version = "4.5.0"; 765 sha256 = "17labczwqk3jng3kkky73m0jhi8wc21vbl7cz5c0hj2p1dswin43"; 766 + }) 767 + (fetchNuGet { 768 + pname = "System.Runtime.CompilerServices.Unsafe"; 769 + version = "6.0.0"; 770 + sha256 = "0qm741kh4rh57wky16sq4m0v05fxmkjjr87krycf5vp9f0zbahbc"; 771 }) 772 (fetchNuGet { 773 pname = "System.Runtime.Extensions";
+2 -3
pkgs/applications/misc/fspy/default.nix
··· 2 let 3 pname = "fspy"; 4 version = "1.0.3"; 5 - name = "${pname}-v${version}"; 6 7 src = fetchurl { 8 url = "https://github.com/stuffmatic/fSpy/releases/download/v${version}/${pname}-${version}-x86_64.AppImage"; ··· 10 }; 11 12 in appimageTools.wrapType2 { 13 - inherit name src; 14 15 extraInstallCommands = '' 16 - mv $out/bin/${name} $out/bin/${pname} 17 ''; 18 19 meta = with lib; {
··· 2 let 3 pname = "fspy"; 4 version = "1.0.3"; 5 6 src = fetchurl { 7 url = "https://github.com/stuffmatic/fSpy/releases/download/v${version}/${pname}-${version}-x86_64.AppImage"; ··· 9 }; 10 11 in appimageTools.wrapType2 { 12 + inherit pname version src; 13 14 extraInstallCommands = '' 15 + mv $out/bin/${pname}-v${version} $out/bin/${pname} 16 ''; 17 18 meta = with lib; {
+3 -3
pkgs/applications/misc/hugo/default.nix
··· 2 3 buildGoModule rec { 4 pname = "hugo"; 5 - version = "0.96.0"; 6 7 src = fetchFromGitHub { 8 owner = "gohugoio"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-3O+ZdOloh5gILPQssztt7s/MwRgDOnpJItwLn7FXnPU="; 12 }; 13 14 - vendorSha256 = "sha256-TgE/ToHBg2QBgtk0gPZTV/icIbQN14RpVAbL/8b+W0U="; 15 16 doCheck = false; 17
··· 2 3 buildGoModule rec { 4 pname = "hugo"; 5 + version = "0.98.0"; 6 7 src = fetchFromGitHub { 8 owner = "gohugoio"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-oZzjnuu6C522qBs/A83jKIZ3dUrJRmKJ/C8NRX31yvw="; 12 }; 13 14 + vendorSha256 = "sha256-HM5IE/rVNWyTfjUtVOlw+69+YoWYlLtU2FOXeH2BAi8="; 15 16 doCheck = false; 17
+5 -1
pkgs/applications/networking/browsers/chromium/common.nix
··· 162 ./patches/widevine-79.patch 163 ]; 164 165 - postPatch = '' 166 # remove unused third-party 167 for lib in ${toString gnSystemLibraries}; do 168 if [ -d "third_party/$lib" ]; then
··· 162 ./patches/widevine-79.patch 163 ]; 164 165 + postPatch = optionalString (chromiumVersionAtLeast "102") '' 166 + # Workaround/fix for https://bugs.chromium.org/p/chromium/issues/detail?id=1313361: 167 + substituteInPlace BUILD.gn \ 168 + --replace '"//infra/orchestrator:orchestrator_all",' "" 169 + '' + '' 170 # remove unused third-party 171 for lib in ${toString gnSystemLibraries}; do 172 if [ -d "third_party/$lib" ]; then
+31 -24
pkgs/applications/networking/cluster/fluxcd/update.sh
··· 3 4 set -x -eu -o pipefail 5 6 - cd $(dirname "${BASH_SOURCE[0]}") 7 8 - TAG=$(curl ${GITHUB_TOKEN:+" -u \":$GITHUB_TOKEN\""} --silent https://api.github.com/repos/fluxcd/flux2/releases/latest | jq -r '.tag_name') 9 10 - VERSION=$(echo ${TAG} | sed 's/^v//') 11 12 - SHA256=$(nix-prefetch-url --quiet --unpack https://github.com/fluxcd/flux2/archive/refs/tags/${TAG}.tar.gz) 13 14 - SPEC_SHA256=$(nix-prefetch-url --quiet --unpack https://github.com/fluxcd/flux2/releases/download/${TAG}/manifests.tar.gz) 15 16 - setKV () { 17 - sed -i "s|$1 = \".*\"|$1 = \"${2:-}\"|" ./default.nix 18 - } 19 20 - setKV version ${VERSION} 21 - setKV sha256 ${SHA256} 22 - setKV manifestsSha256 ${SPEC_SHA256} 23 - setKV vendorSha256 "0000000000000000000000000000000000000000000000000000" # The same as lib.fakeSha256 24 25 - cd ../../../../../ 26 - set +e 27 - VENDOR_SHA256=$(nix-build --no-out-link -A fluxcd 2>&1 >/dev/null | grep "got:" | cut -d':' -f2 | sed 's| ||g') 28 - set -e 29 - 30 - cd - > /dev/null 31 - 32 - if [ -n "${VENDOR_SHA256:-}" ]; then 33 - setKV vendorSha256 ${VENDOR_SHA256} 34 else 35 - echo "Update failed. VENDOR_SHA256 is empty." 36 - exit 1 37 fi 38 -
··· 3 4 set -x -eu -o pipefail 5 6 + NIXPKGS_PATH="$(git rev-parse --show-toplevel)" 7 + FLUXCD_PATH="$( cd -- "$(dirname "$0")" >/dev/null 2>&1 ; pwd -P )" 8 9 + OLD_VERSION="$(nix-instantiate --eval -E "with import $NIXPKGS_PATH {}; fluxcd.version or (builtins.parseDrvName fluxcd.name).version" | tr -d '"')" 10 + LATEST_TAG=$(curl ${GITHUB_TOKEN:+" -u \":$GITHUB_TOKEN\""} --silent https://api.github.com/repos/fluxcd/flux2/releases/latest | jq -r '.tag_name') 11 + LATEST_VERSION=$(echo ${LATEST_TAG} | sed 's/^v//') 12 13 + if [ ! "$OLD_VERSION" = "$LATEST_VERSION" ]; then 14 + SHA256=$(nix-prefetch-url --quiet --unpack https://github.com/fluxcd/flux2/archive/refs/tags/${LATEST_TAG}.tar.gz) 15 + SPEC_SHA256=$(nix-prefetch-url --quiet --unpack https://github.com/fluxcd/flux2/releases/download/${LATEST_TAG}/manifests.tar.gz) 16 17 + setKV () { 18 + sed -i "s|$1 = \".*\"|$1 = \"${2:-}\"|" "${FLUXCD_PATH}/default.nix" 19 + } 20 21 + setKV version ${LATEST_VERSION} 22 + setKV sha256 ${SHA256} 23 + setKV manifestsSha256 ${SPEC_SHA256} 24 + setKV vendorSha256 "0000000000000000000000000000000000000000000000000000" # The same as lib.fakeSha256 25 26 + set +e 27 + VENDOR_SHA256=$(nix-build --no-out-link -A fluxcd $NIXPKGS_PATH 2>&1 >/dev/null | grep "got:" | cut -d':' -f2 | sed 's| ||g') 28 + set -e 29 30 + if [ -n "${VENDOR_SHA256:-}" ]; then 31 + setKV vendorSha256 ${VENDOR_SHA256} 32 + else 33 + echo "Update failed. VENDOR_SHA256 is empty." 34 + exit 1 35 + fi 36 37 + # `git` flag here is to be used by local maintainers to speed up the bump process 38 + if [ "$1" = "git" ]; then 39 + git switch -c "package-fluxcd-${LATEST_VERSION}" 40 + git add "$FLUXCD_PATH"/default.nix 41 + git commit -m "fluxcd: ${OLD_VERSION} -> ${LATEST_VERSION}" 42 + fi 43 else 44 + echo "fluxcd is already up-to-date at $OLD_VERSION" 45 fi
+11 -7
pkgs/applications/radio/rtl-sdr/default.nix
··· 1 { lib 2 , stdenv 3 - , fetchgit 4 , cmake 5 , pkg-config 6 , libusb1 ··· 8 9 stdenv.mkDerivation rec { 10 pname = "rtl-sdr"; 11 - version = "0.6.0"; 12 13 - src = fetchgit { 14 - url = "git://git.osmocom.org/rtl-sdr.git"; 15 - rev = "refs/tags/${version}"; 16 - sha256 = "0lmvsnb4xw4hmz6zs0z5ilsah5hjz29g1s0050n59fllskqr3b8k"; 17 }; 18 19 postPatch = '' ··· 28 29 buildInputs = [ libusb1 ]; 30 31 - cmakeFlags = lib.optional stdenv.isLinux "-DINSTALL_UDEV_RULES=ON"; 32 33 meta = with lib; { 34 description = "Turns your Realtek RTL2832 based DVB dongle into a SDR receiver";
··· 1 { lib 2 , stdenv 3 + , fetchFromGitHub 4 , cmake 5 , pkg-config 6 , libusb1 ··· 8 9 stdenv.mkDerivation rec { 10 pname = "rtl-sdr"; 11 + version = "0.8.0"; 12 13 + src = fetchFromGitHub { 14 + owner = "librtlsdr"; 15 + repo = "librtlsdr"; 16 + rev = "v${version}"; 17 + sha256 = "1fgxlkgmdchbrf0nn98ivjr6css5hak3608nr4xrf2qzf7xy2kdk"; 18 }; 19 20 postPatch = '' ··· 29 30 buildInputs = [ libusb1 ]; 31 32 + cmakeFlags = lib.optional stdenv.isLinux [ 33 + "-DINSTALL_UDEV_RULES=ON" 34 + "-DWITH_RPC=ON" 35 + ]; 36 37 meta = with lib; { 38 description = "Turns your Realtek RTL2832 based DVB dongle into a SDR receiver";
+4 -4
pkgs/data/themes/flat-remix-gnome/default.nix
··· 7 let 8 # make install will use dconf to find desktop background file uri. 9 # consider adding an args to allow specify pictures manually. 10 - # https://github.com/daniruiz/flat-remix-gnome/blob/20220407/Makefile#L38 11 fake-dconf = writeScriptBin "dconf" "echo -n"; 12 in 13 stdenv.mkDerivation rec { 14 pname = "flat-remix-gnome"; 15 - version = "20220407"; 16 17 src = fetchFromGitHub { 18 owner = "daniruiz"; 19 repo = pname; 20 rev = version; 21 - hash = "sha256-Q54uF49NbvupN6LH80bgRtvyW7Cqm9vqsWXDkQrF4HQ="; 22 }; 23 24 nativeBuildInputs = [ glib fake-dconf ]; 25 makeFlags = [ "PREFIX=$(out)" ]; 26 preInstall = '' 27 # make install will back up this file, it will fail if the file doesn't exist. 28 - # https://github.com/daniruiz/flat-remix-gnome/blob/20220407/Makefile#L56 29 mkdir -p $out/share/gnome-shell/ 30 touch $out/share/gnome-shell/gnome-shell-theme.gresource 31 '';
··· 7 let 8 # make install will use dconf to find desktop background file uri. 9 # consider adding an args to allow specify pictures manually. 10 + # https://github.com/daniruiz/flat-remix-gnome/blob/20220422/Makefile#L38 11 fake-dconf = writeScriptBin "dconf" "echo -n"; 12 in 13 stdenv.mkDerivation rec { 14 pname = "flat-remix-gnome"; 15 + version = "20220422"; 16 17 src = fetchFromGitHub { 18 owner = "daniruiz"; 19 repo = pname; 20 rev = version; 21 + hash = "sha256-W/BNn10SggtBacelNljPh42jVMBfykJFRWBCaj/ar7U="; 22 }; 23 24 nativeBuildInputs = [ glib fake-dconf ]; 25 makeFlags = [ "PREFIX=$(out)" ]; 26 preInstall = '' 27 # make install will back up this file, it will fail if the file doesn't exist. 28 + # https://github.com/daniruiz/flat-remix-gnome/blob/20220422/Makefile#L56 29 mkdir -p $out/share/gnome-shell/ 30 touch $out/share/gnome-shell/gnome-shell-theme.gresource 31 '';
+2 -2
pkgs/data/themes/flat-remix-gtk/default.nix
··· 6 7 stdenv.mkDerivation rec { 8 pname = "flat-remix-gtk"; 9 - version = "20220330"; 10 11 src = fetchFromGitHub { 12 owner = "daniruiz"; 13 repo = pname; 14 rev = version; 15 - sha256 = "sha256-TRBjttAYpx3M/Qza6N9dJy50vQtUOJGmdLNdobnAt2Y="; 16 }; 17 18 dontBuild = true;
··· 6 7 stdenv.mkDerivation rec { 8 pname = "flat-remix-gtk"; 9 + version = "20220412"; 10 11 src = fetchFromGitHub { 12 owner = "daniruiz"; 13 repo = pname; 14 rev = version; 15 + sha256 = "sha256-LIGYPsOoPN3KIe0XrjCIf7yV3p3Gfzx8zci57+HzW18="; 16 }; 17 18 dontBuild = true;
+3 -3
pkgs/development/libraries/ffmpegthumbnailer/default.nix
··· 3 4 stdenv.mkDerivation rec { 5 pname = "ffmpegthumbnailer"; 6 - version = "unstable-2021-09-02"; 7 8 src = fetchFromGitHub { 9 owner = "dirkvdb"; 10 repo = "ffmpegthumbnailer"; 11 - rev = "d92e191dd793b12cee0a0f685f5a8d8252988399"; 12 - sha256 = "1ysfq3g74b8ivivrdpfi4vm23d3cyc3rfla5i6y8q9aycis9xv6q"; 13 }; 14 15 nativeBuildInputs = [ cmake pkg-config ];
··· 3 4 stdenv.mkDerivation rec { 5 pname = "ffmpegthumbnailer"; 6 + version = "unstable-2022-02-18"; 7 8 src = fetchFromGitHub { 9 owner = "dirkvdb"; 10 repo = "ffmpegthumbnailer"; 11 + rev = "3db9fe895b2fa656bb40ddb7a62e27604a688171"; 12 + sha256 = "0606pbg391l4s8mpyyalm9zrcnm75fwqdlrxy2gif9n21i2fm3rc"; 13 }; 14 15 nativeBuildInputs = [ cmake pkg-config ];
+2 -2
pkgs/development/python-modules/bleak/default.nix
··· 4 5 buildPythonPackage rec { 6 pname = "bleak"; 7 - version = "0.14.2"; 8 9 disabled = !isPy3k; 10 11 src = fetchPypi { 12 inherit pname version; 13 - sha256 = "1fkq8q54s9apqiamdd8vgrhk5p02w5w281q93dfnrd37xv7ysk6h"; 14 }; 15 16 postPatch = ''
··· 4 5 buildPythonPackage rec { 6 pname = "bleak"; 7 + version = "0.14.3"; 8 9 disabled = !isPy3k; 10 11 src = fetchPypi { 12 inherit pname version; 13 + sha256 = "sha256-dg5bsegECH92JXa5uVY9Y7R9UhsWUpiOKMPLXmS2GZA="; 14 }; 15 16 postPatch = ''
+2 -2
pkgs/development/python-modules/types-decorator/default.nix
··· 5 6 buildPythonPackage rec { 7 pname = "types-decorator"; 8 - version = "5.1.6"; 9 format = "setuptools"; 10 11 src = fetchPypi { 12 inherit pname version; 13 - sha256 = "sha256-OZ+qczvJMstRtQ08odfpV7KuAvPE1xGcdpYxKCo4aKY="; 14 }; 15 16 # Modules doesn't have tests
··· 5 6 buildPythonPackage rec { 7 pname = "types-decorator"; 8 + version = "5.1.7"; 9 format = "setuptools"; 10 11 src = fetchPypi { 12 inherit pname version; 13 + sha256 = "sha256-srf0f9AcoY+JyMAmSDnZLl95oezAes5Hu5AO/XzQL1k="; 14 }; 15 16 # Modules doesn't have tests
+3 -4
pkgs/development/tools/altair-graphql-client/default.nix
··· 3 let 4 pname = "altair"; 5 version = "4.1.0"; 6 - name = "${pname}-v${version}"; 7 8 src = fetchurl { 9 url = "https://github.com/imolorhe/altair/releases/download/v${version}/altair_${version}_x86_64_linux.AppImage"; 10 sha256 = "sha256-YuG7H+7FXYGbNNhM5vxps72dqltcj3bA325e7ZbW8aI="; 11 }; 12 13 - appimageContents = appimageTools.extract { inherit name src; }; 14 in 15 appimageTools.wrapType2 { 16 - inherit src name; 17 18 profile = '' 19 export XDG_DATA_DIRS=${gsettings-desktop-schemas}/share/gsettings-schemas/${gsettings-desktop-schemas.name}:${gtk3}/share/gsettings-schemas/${gtk3.name}:$XDG_DATA_DIRS 20 ''; 21 22 extraInstallCommands = '' 23 - mv $out/bin/${name} $out/bin/${pname} 24 25 install -m 444 -D ${appimageContents}/${pname}.desktop -t $out/share/applications 26 substituteInPlace $out/share/applications/${pname}.desktop \
··· 3 let 4 pname = "altair"; 5 version = "4.1.0"; 6 7 src = fetchurl { 8 url = "https://github.com/imolorhe/altair/releases/download/v${version}/altair_${version}_x86_64_linux.AppImage"; 9 sha256 = "sha256-YuG7H+7FXYGbNNhM5vxps72dqltcj3bA325e7ZbW8aI="; 10 }; 11 12 + appimageContents = appimageTools.extract { inherit pname version src; }; 13 in 14 appimageTools.wrapType2 { 15 + inherit src pname version; 16 17 profile = '' 18 export XDG_DATA_DIRS=${gsettings-desktop-schemas}/share/gsettings-schemas/${gsettings-desktop-schemas.name}:${gtk3}/share/gsettings-schemas/${gtk3.name}:$XDG_DATA_DIRS 19 ''; 20 21 extraInstallCommands = '' 22 + mv $out/bin/${pname}-${version} $out/bin/${pname} 23 24 install -m 444 -D ${appimageContents}/${pname}.desktop -t $out/share/applications 25 substituteInPlace $out/share/applications/${pname}.desktop \
+3 -3
pkgs/development/tools/database/pg_activity/default.nix
··· 2 3 python3Packages.buildPythonApplication rec { 4 pname = "pg_activity"; 5 - version = "2.3.0"; 6 disabled = python3Packages.pythonOlder "3.6"; 7 8 src = fetchFromGitHub { 9 owner = "dalibo"; 10 repo = pname; 11 - rev = "v${version}"; 12 - sha256 = "sha256-O5ACTWsHoIty+QLTGaSuk985qduH7xBjviiH4yCrY2o="; 13 }; 14 15 propagatedBuildInputs = with python3Packages; [
··· 2 3 python3Packages.buildPythonApplication rec { 4 pname = "pg_activity"; 5 + version = "2.3.1"; 6 disabled = python3Packages.pythonOlder "3.6"; 7 8 src = fetchFromGitHub { 9 owner = "dalibo"; 10 repo = pname; 11 + rev = "refs/tags/v${version}"; 12 + sha256 = "sha256-oStoZVFf0g1Dj2m+T+8caiKS0o1CnhtQNe/GbnlVUCM="; 13 }; 14 15 propagatedBuildInputs = with python3Packages; [
+4 -6
pkgs/development/tools/misc/binutils/default.nix
··· 21 , enableGold ? execFormatIsELF stdenv.targetPlatform 22 , enableShared ? !stdenv.hostPlatform.isStatic 23 # WARN: Enabling all targets increases output size to a multiple. 24 - , withAllTargets ? false, libbfd, libopcodes 25 }: 26 27 # WARN: configure silently disables ld.gold if it's unsupported, so we need to ··· 183 # Fails 184 doCheck = false; 185 186 - postFixup = lib.optionalString (enableShared && withAllTargets) '' 187 - rm "$out"/lib/lib{bfd,opcodes}-${version}.so 188 - ln -s '${lib.getLib libbfd}/lib/libbfd-${version}.so' "$out/lib/" 189 - ln -s '${lib.getLib libopcodes}/lib/libopcodes-${version}.so' "$out/lib/" 190 - ''; 191 192 # INFO: Otherwise it fails with: 193 # `./sanity.sh: line 36: $out/bin/size: not found`
··· 21 , enableGold ? execFormatIsELF stdenv.targetPlatform 22 , enableShared ? !stdenv.hostPlatform.isStatic 23 # WARN: Enabling all targets increases output size to a multiple. 24 + , withAllTargets ? false 25 }: 26 27 # WARN: configure silently disables ld.gold if it's unsupported, so we need to ··· 183 # Fails 184 doCheck = false; 185 186 + # Remove on next bump. It's a vestige of past conditional. Stays here to avoid 187 + # mass rebuild. 188 + postFixup = ""; 189 190 # INFO: Otherwise it fails with: 191 # `./sanity.sh: line 36: $out/bin/size: not found`
+3
pkgs/games/dwarf-fortress/dfhack/default.nix
··· 131 132 patches = [ ./fix-stonesense.patch ]; 133 134 # As of 135 # https://github.com/DFHack/dfhack/commit/56e43a0dde023c5a4595a22b29d800153b31e3c4, 136 # dfhack gets its goodies from the directory above the Dwarf_Fortress
··· 131 132 patches = [ ./fix-stonesense.patch ]; 133 134 + # gcc 11 fix 135 + NIX_CFLAGS_COMPILE = "-fpermissive"; 136 + 137 # As of 138 # https://github.com/DFHack/dfhack/commit/56e43a0dde023c5a4595a22b29d800153b31e3c4, 139 # dfhack gets its goodies from the directory above the Dwarf_Fortress
+2 -2
pkgs/os-specific/linux/sgx/ssl/default.nix
··· 14 in 15 stdenv.mkDerivation rec { 16 pname = "sgx-ssl" + lib.optionalString debug "-debug"; 17 - version = "lin_${sgxVersion}_${opensslVersion}"; 18 19 src = fetchFromGitHub { 20 owner = "intel"; 21 repo = "intel-sgx-ssl"; 22 - rev = version; 23 hash = "sha256-ibPXs90ni2fkxJ09fNO6wWVpfCFdko6MjBFkEsyIih8="; 24 }; 25
··· 14 in 15 stdenv.mkDerivation rec { 16 pname = "sgx-ssl" + lib.optionalString debug "-debug"; 17 + version = "${sgxVersion}_${opensslVersion}"; 18 19 src = fetchFromGitHub { 20 owner = "intel"; 21 repo = "intel-sgx-ssl"; 22 + rev = "lin_${sgxVersion}_${opensslVersion}"; 23 hash = "sha256-ibPXs90ni2fkxJ09fNO6wWVpfCFdko6MjBFkEsyIih8="; 24 }; 25
+4 -5
pkgs/tools/admin/lxd/default.nix
··· 11 12 buildGo118Package rec { 13 pname = "lxd"; 14 - version = "5.0.0"; 15 16 goPackagePath = "github.com/lxc/lxd"; 17 18 src = fetchurl { 19 url = "https://linuxcontainers.org/downloads/lxd/lxd-${version}.tar.gz"; 20 - sha256 = "sha256-qZt+37UsgZWy3kmIhE0y1zvmQm9s/yhAglBReyOP3vk="; 21 }; 22 23 postPatch = '' ··· 25 --replace "/usr/share/misc/usb.ids" "${hwdata}/share/hwdata/usb.ids" 26 ''; 27 28 preBuild = '' 29 # required for go-dqlite. See: https://github.com/lxc/lxd/pull/8939 30 export CGO_LDFLAGS_ALLOW="(-Wl,-wrap,pthread_create)|(-Wl,-z,now)" ··· 33 ''; 34 35 postInstall = '' 36 - # test binaries, code generation 37 - rm $out/bin/{deps,macaroon-identity,generate} 38 - 39 wrapProgram $out/bin/lxd --prefix PATH : ${lib.makeBinPath ( 40 [ iptables ] 41 ++ [ acl rsync gnutar xz btrfs-progs gzip dnsmasq squashfsTools iproute2 bash criu attr ]
··· 11 12 buildGo118Package rec { 13 pname = "lxd"; 14 + version = "5.1"; 15 16 goPackagePath = "github.com/lxc/lxd"; 17 18 src = fetchurl { 19 url = "https://linuxcontainers.org/downloads/lxd/lxd-${version}.tar.gz"; 20 + sha256 = "sha256-MZ9Ok1BuIUTtqigLAYX7N8Q3TPfXRopeXIwbZ4GJJQo="; 21 }; 22 23 postPatch = '' ··· 25 --replace "/usr/share/misc/usb.ids" "${hwdata}/share/hwdata/usb.ids" 26 ''; 27 28 + excludedPackages = [ "test" "lxd/db/generate" ]; 29 + 30 preBuild = '' 31 # required for go-dqlite. See: https://github.com/lxc/lxd/pull/8939 32 export CGO_LDFLAGS_ALLOW="(-Wl,-wrap,pthread_create)|(-Wl,-z,now)" ··· 35 ''; 36 37 postInstall = '' 38 wrapProgram $out/bin/lxd --prefix PATH : ${lib.makeBinPath ( 39 [ iptables ] 40 ++ [ acl rsync gnutar xz btrfs-progs gzip dnsmasq squashfsTools iproute2 bash criu attr ]