lol

Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
613d6026 02a21c89

+443 -137
+7
maintainers/maintainer-list.nix
··· 11667 11667 githubId = 149558; 11668 11668 name = "Merlin Gaillard"; 11669 11669 }; 11670 + mirkolenz = { 11671 + name = "Mirko Lenz"; 11672 + email = "mirko@mirkolenz.com"; 11673 + matrix = "@mlenz:matrix.org"; 11674 + github = "mirkolenz"; 11675 + githubId = 5160954; 11676 + }; 11670 11677 mirrexagon = { 11671 11678 email = "mirrexagon@mirrexagon.com"; 11672 11679 github = "mirrexagon";
+2
nixos/doc/manual/release-notes/rl-2311.section.md
··· 258 258 259 259 - Garage has been upgraded to 0.9.x. `services.garage.package` now needs to be explicitly set, so version upgrades can be done in a controlled fashion. For this, we expose `garage_x_y` attributes which can be set here. 260 260 261 + - `voms` and `xrootd` now moves the `$out/etc` content to the `$etc` output instead of `$out/etc.orig`, when input argument `externalEtc` is not `null`. 262 + 261 263 - The `woodpecker-*` CI packages have been updated to 1.0.0. This release is wildly incompatible with the 0.15.X versions that were previously packaged. Please read [upstream's documentation](https://woodpecker-ci.org/docs/next/migrations#100) to learn how to update your CI configurations. 262 264 263 265 - The Caddy module gained a new option named `services.caddy.enableReload` which is enabled by default. It allows reloading the service instead of restarting it, if only a config file has changed. This option must be disabled if you have turned off the [Caddy admin API](https://caddyserver.com/docs/caddyfile/options#admin). If you keep this option enabled, you should consider setting [`grace_period`](https://caddyserver.com/docs/caddyfile/options#grace-period) to a non-infinite value to prevent Caddy from delaying the reload indefinitely.
+2 -2
nixos/modules/misc/ids.nix
··· 69 69 #dialout = 27; # unused 70 70 polkituser = 28; 71 71 #utmp = 29; # unused 72 - # ddclient = 30; # software removed 72 + # ddclient = 30; # converted to DynamicUser = true 73 73 davfs2 = 31; 74 74 disnix = 33; 75 75 osgi = 34; ··· 394 394 dialout = 27; 395 395 #polkituser = 28; # currently unused, polkitd doesn't need a group 396 396 utmp = 29; 397 - # ddclient = 30; # software removed 397 + # ddclient = 30; # converted to DynamicUser = true 398 398 davfs2 = 31; 399 399 disnix = 33; 400 400 osgi = 34;
+1
nixos/modules/module-list.nix
··· 884 884 ./services/networking/dae.nix 885 885 ./services/networking/dante.nix 886 886 ./services/networking/deconz.nix 887 + ./services/networking/ddclient.nix 887 888 ./services/networking/dhcpcd.nix 888 889 ./services/networking/dnscache.nix 889 890 ./services/networking/dnscrypt-proxy2.nix
-1
nixos/modules/rename.nix
··· 54 54 (mkRemovedOptionModule [ "services" "chronos" ] "The corresponding package was removed from nixpkgs.") 55 55 (mkRemovedOptionModule [ "services" "couchpotato" ] "The corresponding package was removed from nixpkgs.") 56 56 (mkRemovedOptionModule [ "services" "dd-agent" ] "dd-agent was removed from nixpkgs in favor of the newer datadog-agent.") 57 - (mkRemovedOptionModule [ "services" "ddclient" ] "ddclient has been removed on the request of the upstream maintainer because it is unmaintained and has bugs. Please switch to a different software like `inadyn` or `knsupdate`.") # Added 2023-07-04 58 57 (mkRemovedOptionModule [ "services" "dnscrypt-proxy" ] "Use services.dnscrypt-proxy2 instead") 59 58 (mkRemovedOptionModule [ "services" "exhibitor" ] "The corresponding package was removed from nixpkgs.") 60 59 (mkRemovedOptionModule [ "services" "firefox" "syncserver" ] "The corresponding package was removed from nixpkgs.")
nixos/modules/services/misc/confd.nix
+234
nixos/modules/services/networking/ddclient.nix
··· 1 + { config, pkgs, lib, ... }: 2 + 3 + let 4 + cfg = config.services.ddclient; 5 + boolToStr = bool: if bool then "yes" else "no"; 6 + dataDir = "/var/lib/ddclient"; 7 + StateDirectory = builtins.baseNameOf dataDir; 8 + RuntimeDirectory = StateDirectory; 9 + 10 + configFile' = pkgs.writeText "ddclient.conf" '' 11 + # This file can be used as a template for configFile or is automatically generated by Nix options. 12 + cache=${dataDir}/ddclient.cache 13 + foreground=YES 14 + use=${cfg.use} 15 + login=${cfg.username} 16 + password=${if cfg.protocol == "nsupdate" then "/run/${RuntimeDirectory}/ddclient.key" else "@password_placeholder@"} 17 + protocol=${cfg.protocol} 18 + ${lib.optionalString (cfg.script != "") "script=${cfg.script}"} 19 + ${lib.optionalString (cfg.server != "") "server=${cfg.server}"} 20 + ${lib.optionalString (cfg.zone != "") "zone=${cfg.zone}"} 21 + ssl=${boolToStr cfg.ssl} 22 + wildcard=YES 23 + quiet=${boolToStr cfg.quiet} 24 + verbose=${boolToStr cfg.verbose} 25 + ${cfg.extraConfig} 26 + ${lib.concatStringsSep "," cfg.domains} 27 + ''; 28 + configFile = if (cfg.configFile != null) then cfg.configFile else configFile'; 29 + 30 + preStart = '' 31 + install --mode=600 --owner=$USER ${configFile} /run/${RuntimeDirectory}/ddclient.conf 32 + ${lib.optionalString (cfg.configFile == null) (if (cfg.protocol == "nsupdate") then '' 33 + install --mode=600 --owner=$USER ${cfg.passwordFile} /run/${RuntimeDirectory}/ddclient.key 34 + '' else if (cfg.passwordFile != null) then '' 35 + "${pkgs.replace-secret}/bin/replace-secret" "@password_placeholder@" "${cfg.passwordFile}" "/run/${RuntimeDirectory}/ddclient.conf" 36 + '' else '' 37 + sed -i '/^password=@password_placeholder@$/d' /run/${RuntimeDirectory}/ddclient.conf 38 + '')} 39 + ''; 40 + 41 + in 42 + 43 + with lib; 44 + 45 + { 46 + 47 + imports = [ 48 + (mkChangedOptionModule [ "services" "ddclient" "domain" ] [ "services" "ddclient" "domains" ] 49 + (config: 50 + let value = getAttrFromPath [ "services" "ddclient" "domain" ] config; 51 + in optional (value != "") value)) 52 + (mkRemovedOptionModule [ "services" "ddclient" "homeDir" ] "") 53 + (mkRemovedOptionModule [ "services" "ddclient" "password" ] "Use services.ddclient.passwordFile instead.") 54 + (mkRemovedOptionModule [ "services" "ddclient" "ipv6" ] "") 55 + ]; 56 + 57 + ###### interface 58 + 59 + options = { 60 + 61 + services.ddclient = with lib.types; { 62 + 63 + enable = mkOption { 64 + default = false; 65 + type = bool; 66 + description = lib.mdDoc '' 67 + Whether to synchronise your machine's IP address with a dynamic DNS provider (e.g. dyndns.org). 68 + ''; 69 + }; 70 + 71 + package = mkOption { 72 + type = package; 73 + default = pkgs.ddclient; 74 + defaultText = lib.literalExpression "pkgs.ddclient"; 75 + description = lib.mdDoc '' 76 + The ddclient executable package run by the service. 77 + ''; 78 + }; 79 + 80 + domains = mkOption { 81 + default = [ "" ]; 82 + type = listOf str; 83 + description = lib.mdDoc '' 84 + Domain name(s) to synchronize. 85 + ''; 86 + }; 87 + 88 + username = mkOption { 89 + # For `nsupdate` username contains the path to the nsupdate executable 90 + default = lib.optionalString (config.services.ddclient.protocol == "nsupdate") "${pkgs.bind.dnsutils}/bin/nsupdate"; 91 + defaultText = ""; 92 + type = str; 93 + description = lib.mdDoc '' 94 + User name. 95 + ''; 96 + }; 97 + 98 + passwordFile = mkOption { 99 + default = null; 100 + type = nullOr str; 101 + description = lib.mdDoc '' 102 + A file containing the password or a TSIG key in named format when using the nsupdate protocol. 103 + ''; 104 + }; 105 + 106 + interval = mkOption { 107 + default = "10min"; 108 + type = str; 109 + description = lib.mdDoc '' 110 + The interval at which to run the check and update. 111 + See {command}`man 7 systemd.time` for the format. 112 + ''; 113 + }; 114 + 115 + configFile = mkOption { 116 + default = null; 117 + type = nullOr path; 118 + description = lib.mdDoc '' 119 + Path to configuration file. 120 + When set this overrides the generated configuration from module options. 121 + ''; 122 + example = "/root/nixos/secrets/ddclient.conf"; 123 + }; 124 + 125 + protocol = mkOption { 126 + default = "dyndns2"; 127 + type = str; 128 + description = lib.mdDoc '' 129 + Protocol to use with dynamic DNS provider (see https://sourceforge.net/p/ddclient/wiki/protocols). 130 + ''; 131 + }; 132 + 133 + server = mkOption { 134 + default = ""; 135 + type = str; 136 + description = lib.mdDoc '' 137 + Server address. 138 + ''; 139 + }; 140 + 141 + ssl = mkOption { 142 + default = true; 143 + type = bool; 144 + description = lib.mdDoc '' 145 + Whether to use SSL/TLS to connect to dynamic DNS provider. 146 + ''; 147 + }; 148 + 149 + quiet = mkOption { 150 + default = false; 151 + type = bool; 152 + description = lib.mdDoc '' 153 + Print no messages for unnecessary updates. 154 + ''; 155 + }; 156 + 157 + script = mkOption { 158 + default = ""; 159 + type = str; 160 + description = lib.mdDoc '' 161 + script as required by some providers. 162 + ''; 163 + }; 164 + 165 + use = mkOption { 166 + default = "web, web=checkip.dyndns.com/, web-skip='Current IP Address: '"; 167 + type = str; 168 + description = lib.mdDoc '' 169 + Method to determine the IP address to send to the dynamic DNS provider. 170 + ''; 171 + }; 172 + 173 + verbose = mkOption { 174 + default = false; 175 + type = bool; 176 + description = lib.mdDoc '' 177 + Print verbose information. 178 + ''; 179 + }; 180 + 181 + zone = mkOption { 182 + default = ""; 183 + type = str; 184 + description = lib.mdDoc '' 185 + zone as required by some providers. 186 + ''; 187 + }; 188 + 189 + extraConfig = mkOption { 190 + default = ""; 191 + type = lines; 192 + description = lib.mdDoc '' 193 + Extra configuration. Contents will be added verbatim to the configuration file. 194 + 195 + ::: {.note} 196 + `daemon` should not be added here because it does not work great with the systemd-timer approach the service uses. 197 + ::: 198 + ''; 199 + }; 200 + }; 201 + }; 202 + 203 + 204 + ###### implementation 205 + 206 + config = mkIf config.services.ddclient.enable { 207 + systemd.services.ddclient = { 208 + description = "Dynamic DNS Client"; 209 + wantedBy = [ "multi-user.target" ]; 210 + after = [ "network.target" ]; 211 + restartTriggers = optional (cfg.configFile != null) cfg.configFile; 212 + path = lib.optional (lib.hasPrefix "if," cfg.use) pkgs.iproute2; 213 + 214 + serviceConfig = { 215 + DynamicUser = true; 216 + RuntimeDirectoryMode = "0700"; 217 + inherit RuntimeDirectory; 218 + inherit StateDirectory; 219 + Type = "oneshot"; 220 + ExecStartPre = "!${pkgs.writeShellScript "ddclient-prestart" preStart}"; 221 + ExecStart = "${lib.getExe cfg.package} -file /run/${RuntimeDirectory}/ddclient.conf"; 222 + }; 223 + }; 224 + 225 + systemd.timers.ddclient = { 226 + description = "Run ddclient"; 227 + wantedBy = [ "timers.target" ]; 228 + timerConfig = { 229 + OnBootSec = cfg.interval; 230 + OnUnitInactiveSec = cfg.interval; 231 + }; 232 + }; 233 + }; 234 + }
pkgs/applications/audio/soundwireserver/default.nix
+3 -3
pkgs/applications/blockchains/snarkos/default.nix
··· 10 10 }: 11 11 rustPlatform.buildRustPackage rec { 12 12 pname = "snarkos"; 13 - version = "2.1.7"; 13 + version = "2.2.1"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "AleoHQ"; 17 17 repo = "snarkOS"; 18 18 rev = "v${version}"; 19 - sha256 = "sha256-kW41SNbl2vckgUth+BZ6/aM03aT6MFeY4Hwi9OVWtTI="; 19 + sha256 = "sha256-vEoEnjVjxVnjZ3Lya1qO2kOypNu07aYSlrSya5NJZzs="; 20 20 }; 21 21 22 - cargoHash = "sha256-znEAb4q9H0Doc+XYCf27hV/z2t74kjQUffl/aJzW6tI="; 22 + cargoHash = "sha256-CVHvBqfcTqWBtLFcEcs9y/LmQ4gXjX+dfqqZSxN+33A="; 23 23 24 24 # buildAndTestSubdir = "cli"; 25 25
pkgs/applications/editors/neovim/neovim-gtk.nix
+2 -2
pkgs/applications/emulators/yuzu/generic.nix
··· 49 49 }: 50 50 51 51 let 52 - tzinfoVersion = "220816"; 52 + tzinfoVersion = "221202"; 53 53 tzinfo = fetchurl { 54 54 url = "https://github.com/lat9nq/tzdb_to_nx/releases/download/${tzinfoVersion}/${tzinfoVersion}.zip"; 55 - hash = "sha256-yv8ykEYPu9upeXovei0u16iqQ7NasH6873KnQy4+KwI="; 55 + hash = "sha256-mRzW+iIwrU1zsxHmf+0RArU8BShAoEMvCz+McXFFK3c="; 56 56 }; 57 57 in stdenv.mkDerivation { 58 58 pname = "yuzu-${branch}";
+7 -7
pkgs/applications/emulators/yuzu/sources.nix
··· 1 1 # Generated by ./update.sh - do not update manually! 2 - # Last updated: 2023-10-07 2 + # Last updated: 2023-10-20 3 3 { 4 4 compatList = { 5 - rev = "156a0a80efc47069ba3360f8a1b268a1c6f2f505"; 5 + rev = "9d17cbd71408476c6a28cbf0fa8177155c511681"; 6 6 hash = "sha256:1hdsza3wf9a0yvj6h55gsl7xqvhafvbz1i8paz9kg7l49b0gnlh1"; 7 7 }; 8 8 9 9 mainline = { 10 - version = "1579"; 11 - hash = "sha256:0689w42as1di8xbh8kq2p0cws8gdwq64zdj3i8wq612nkw0q5s60"; 10 + version = "1595"; 11 + hash = "sha256:09b0w6z4w9z4ms2pvik2vrmklfcx25jxcgs61bff3nflilnw9m97"; 12 12 }; 13 13 14 14 ea = { 15 - version = "3911"; 16 - distHash = "sha256:0xj642kjhj0gp9l15b3ysj3gmyy47rcvzw9amghsfl13bg5ffnwh"; 17 - fullHash = "sha256:13rd6kwnhpvjzp67k6pqgl9fsqzwy5d8043hv6kd93gg8jbxkp38"; 15 + version = "3940"; 16 + distHash = "sha256:0g0vv274sh3iy56n7s324km87g302005ahi9zh2qhwkiirbnc811"; 17 + fullHash = "sha256:0ywppc4z5d4b1zl1cr8yfnba58hgi0z2szficwpinapai7q0pyid"; 18 18 }; 19 19 }
pkgs/applications/graphics/structorizer/default.nix
+2 -2
pkgs/applications/misc/blender/default.nix
··· 31 31 in 32 32 stdenv.mkDerivation (finalAttrs: rec { 33 33 pname = "blender"; 34 - version = "3.6.4"; 34 + version = "3.6.5"; 35 35 36 36 src = fetchurl { 37 37 url = "https://download.blender.org/source/${pname}-${version}.tar.xz"; 38 - hash = "sha256-zFL0GRWAtNC3C+SAspWZmGa8US92EiYQgVfiOsCJRx4="; 38 + hash = "sha256-QAHA/pn22HLsfH6VX4Sp7r25raFxAPS1Gergjez38kM="; 39 39 }; 40 40 41 41 patches = [
pkgs/applications/misc/fluxboxlauncher/default.nix
+4 -2
pkgs/applications/misc/get_iplayer/default.nix
··· 11 11 12 12 perlPackages.buildPerlPackage rec { 13 13 pname = "get_iplayer"; 14 - version = "3.31"; 14 + version = "3.33"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "get-iplayer"; 18 18 repo = "get_iplayer"; 19 19 rev = "v${version}"; 20 - sha256 = "+ChCF27nmPKbqaZVxsZ6TlbzSdEz6RfMs87NE8xaSRw="; 20 + hash = "sha256-cX+ydMvpQNFfQICRVKyhnB5gZkVnOMLPbGgdFymzmeA="; 21 21 }; 22 22 23 23 nativeBuildInputs = [ makeWrapper ] ++ lib.optional stdenv.isDarwin shortenPerlShebang; ··· 32 32 33 33 installPhase = '' 34 34 runHook preInstall 35 + 35 36 mkdir -p $out/bin $out/share/man/man1 36 37 cp get_iplayer $out/bin 37 38 wrapProgram $out/bin/get_iplayer --suffix PATH : ${lib.makeBinPath [ atomicparsley ffmpeg ]} --prefix PERL5LIB : $PERL5LIB 38 39 cp get_iplayer.1 $out/share/man/man1 40 + 39 41 runHook postInstall 40 42 ''; 41 43
+3 -3
pkgs/applications/networking/instant-messengers/teams-for-linux/default.nix
··· 19 19 20 20 stdenv.mkDerivation (finalAttrs: { 21 21 pname = "teams-for-linux"; 22 - version = "1.3.13"; 22 + version = "1.3.14"; 23 23 24 24 src = fetchFromGitHub { 25 25 owner = "IsmaelMartinez"; 26 26 repo = "teams-for-linux"; 27 27 rev = "v${finalAttrs.version}"; 28 - hash = "sha256-WF2jWP6utopAMZPP/ZWOhqVGZJmACwHyLLE+HQaHJjg="; 28 + hash = "sha256-2H7j8e2wPMd4cHXDKxSmyC2Ng/B3jb3/tGVTpUOU3XM="; 29 29 }; 30 30 31 31 offlineCache = fetchYarnDeps { 32 32 yarnLock = "${finalAttrs.src}/yarn.lock"; 33 - hash = "sha256-vgjPGO5qa4IYfW1svClJ+wP/KtIFFd3P02T2sht69C8="; 33 + hash = "sha256-zB6H14VAf13pAHQmsWC51d/qqyfRmAEbltyLD5ucG4Y="; 34 34 }; 35 35 36 36 nativeBuildInputs = [ yarn fixup_yarn_lock nodejs copyDesktopItems makeWrapper ];
pkgs/applications/science/biology/poretools/default.nix
pkgs/applications/science/biology/trimal/default.nix
pkgs/applications/science/biology/vcftools/default.nix
+2 -2
pkgs/applications/science/misc/root/default.nix
··· 58 58 59 59 stdenv.mkDerivation rec { 60 60 pname = "root"; 61 - version = "6.28.06"; 61 + version = "6.28.08"; 62 62 63 63 passthru = { 64 64 tests = import ./tests { inherit callPackage; }; ··· 66 66 67 67 src = fetchurl { 68 68 url = "https://root.cern.ch/download/root_v${version}.source.tar.gz"; 69 - hash = "sha256-rztnO5rKOTpcmuG/huqyZyqvGEG2WMXG56MKuTxYZTM="; 69 + hash = "sha256-o+ZLTAH4fNm75X5h75a0FibkmwRGCVBw1B2b+6NSaGI="; 70 70 }; 71 71 72 72 nativeBuildInputs = [ makeWrapper cmake pkg-config git ];
+2 -2
pkgs/applications/video/kodi/addons/inputstream-adaptive/default.nix
··· 10 10 buildKodiBinaryAddon rec { 11 11 pname = "inputstream-adaptive"; 12 12 namespace = "inputstream.adaptive"; 13 - version = "20.3.9"; 13 + version = "20.3.13"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "xbmc"; 17 17 repo = "inputstream.adaptive"; 18 18 rev = "${version}-${rel}"; 19 - sha256 = "sha256-Z5p/lw7qg6aacJ0eSqswaiwTOsUmuDbNlRRs51LdjRw="; 19 + sha256 = "sha256-xvU+DcVEaQ/1sm6o21/6N1znCtzrct0qDhMxXGFZjL4="; 20 20 }; 21 21 22 22 extraCMakeFlags = [
+2 -2
pkgs/applications/video/kodi/addons/netflix/default.nix
··· 3 3 buildKodiAddon rec { 4 4 pname = "netflix"; 5 5 namespace = "plugin.video.netflix"; 6 - version = "1.20.2"; 6 + version = "1.22.3"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "CastagnaIT"; 10 10 repo = namespace; 11 11 rev = "v${version}"; 12 - sha256 = "sha256-k2O8a0P+TzQVoFQJkzmdqmkKh3Aj7OlsnuhJfUwxOmI="; 12 + sha256 = "sha256-8NGj8n1p8euqYYdPDSeFh2ZE9lly5ThSmg69yXY3Te8="; 13 13 }; 14 14 15 15 propagatedBuildInputs = [
pkgs/applications/virtualization/vmware-workstation/default.nix
+1
pkgs/build-support/fetchdocker/credentials.nix
··· 1 + { lib }: 1 2 # We provide three paths to get the credentials into the builder's 2 3 # environment: 3 4 #
+1 -1
pkgs/build-support/fetchdocker/generic-fetcher.nix
··· 1 1 { stdenv, lib, haskellPackages, writeText, gawk }: 2 2 let 3 3 awk = "${gawk}/bin/awk"; 4 - dockerCredentialsFile = import ./credentials.nix; 4 + dockerCredentialsFile = import ./credentials.nix { inherit lib; }; 5 5 in 6 6 { fetcher 7 7 , name
pkgs/data/fonts/vazir-fonts/default.nix
+5 -7
pkgs/development/libraries/virglrenderer/default.nix
··· 1 - { lib, stdenv, fetchurl, cmake, meson, ninja, pkg-config, python3 1 + { lib, stdenv, fetchurl, meson, ninja, pkg-config, python3 2 2 , libGLU, libepoxy, libX11, libdrm, mesa 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "virglrenderer"; 7 - version = "0.10.4"; 7 + version = "1.0.0"; 8 8 9 9 src = fetchurl { 10 - url = "https://gitlab.freedesktop.org/virgl/virglrenderer/-/archive/virglrenderer-${version}/virglrenderer-virglrenderer-${version}.tar.bz2"; 11 - sha256 = "sha256-qqvnko2sN4bdm9+F0PVjDW5FsiL5k3UAfjPSTqG+73c="; 10 + url = "https://gitlab.freedesktop.org/virgl/virglrenderer/-/archive/${version}/virglrenderer-${version}.tar.bz2"; 11 + hash = "sha256-KMGPP2MeuATHFXKr5oW9HuFOMmmYpmkVLvMvQi0cEdg="; 12 12 }; 13 13 14 14 separateDebugInfo = true; 15 15 16 16 buildInputs = [ libGLU libepoxy libX11 libdrm mesa ]; 17 17 18 - nativeBuildInputs = [ cmake meson ninja pkg-config python3 ]; 19 - 20 - dontUseCmakeConfigure = true; 18 + nativeBuildInputs = [ meson ninja pkg-config python3 ]; 21 19 22 20 meta = with lib; { 23 21 description = "A virtual 3D GPU library that allows a qemu guest to use the host GPU for accelerated 3D rendering";
+2 -2
pkgs/development/libraries/zlib-ng/default.nix
··· 5 5 6 6 stdenv.mkDerivation rec { 7 7 pname = "zlib-ng"; 8 - version = "2.1.3"; 8 + version = "2.1.4"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "zlib-ng"; 12 12 repo = "zlib-ng"; 13 13 rev = version; 14 - hash = "sha256-DC4KPPaMuqML0HEhWJmWjyox4WEbExPDfNnpnWzoaHc="; 14 + hash = "sha256-okNmobCVAC9y7tjZqFd0DBhOjs3WWRPK8jvK1j9G29k="; 15 15 }; 16 16 17 17 outputs = [ "out" "dev" "bin" ];
+2 -2
pkgs/development/php-packages/opentelemetry/default.nix
··· 1 1 { lib, buildPecl, fetchFromGitHub }: 2 2 3 3 let 4 - version = "1.0.0RC2"; 4 + version = "1.0.0RC3"; 5 5 in buildPecl { 6 6 inherit version; 7 7 pname = "opentelemetry"; ··· 10 10 owner = "open-telemetry"; 11 11 repo = "opentelemetry-php-instrumentation"; 12 12 rev = version; 13 - hash = "sha256-sCsJ4ZmQXTTG+ZxDzw3b6Su/8QUAVZv7vV6SuLBET+0="; 13 + hash = "sha256-0jHXl+Amjv0vLSuSWhkGAU25pkRXbJgdx02N6o2dUyw="; 14 14 }; 15 15 16 16 sourceRoot = "source/ext";
pkgs/development/python-modules/atlassian-python-api/default.nix
+39
pkgs/development/python-modules/certbot-dns-ovh/default.nix
··· 1 + { buildPythonPackage 2 + , acme 3 + , certbot 4 + , dns-lexicon 5 + , pytestCheckHook 6 + , pythonOlder 7 + }: 8 + 9 + buildPythonPackage rec { 10 + pname = "certbot-dns-ovh"; 11 + 12 + inherit (certbot) src version; 13 + disabled = pythonOlder "3.6"; 14 + 15 + sourceRoot = "${src.name}/certbot-dns-ovh"; 16 + 17 + propagatedBuildInputs = [ 18 + acme 19 + certbot 20 + dns-lexicon 21 + ]; 22 + 23 + nativeCheckInputs = [ 24 + pytestCheckHook 25 + ]; 26 + 27 + pytestFlagsArray = [ 28 + "-o cache_dir=$(mktemp -d)" 29 + 30 + # Monitor https://github.com/certbot/certbot/issues/9606 for a solution 31 + "-W 'ignore:pkg_resources is deprecated as an API:DeprecationWarning'" 32 + "-W 'ignore:Package lexicon.providers is deprecated and will be removed in Lexicon 4>=.:DeprecationWarning'" 33 + "-W 'ignore:Legacy configuration object has been used to load the ConfigResolver.:DeprecationWarning'" 34 + ]; 35 + 36 + meta = certbot.meta // { 37 + description = "OVH DNS Authenticator plugin for Certbot"; 38 + }; 39 + }
+2 -2
pkgs/development/python-modules/gpaw/default.nix
··· 74 74 75 75 in buildPythonPackage rec { 76 76 pname = "gpaw"; 77 - version = "22.8.0"; 77 + version = "23.9.1"; 78 78 79 79 src = fetchFromGitLab { 80 80 owner = "gpaw"; 81 81 repo = pname; 82 82 rev = version; 83 - hash = "sha256-Kgf8yuGua7mcGP+jVVmbE8JCsbrfzewRTRt3ihq9YX4="; 83 + hash = "sha256-9nnK4ksTFATO6HexnxfMiih/yoY/noyJZXZOaDG/2kc="; 84 84 }; 85 85 86 86 # `inetutils` is required because importing `gpaw`, as part of
+2 -2
pkgs/development/python-modules/num2words/default.nix
··· 7 7 }: 8 8 9 9 buildPythonPackage rec { 10 - version = "0.5.12"; 10 + version = "0.5.13"; 11 11 pname = "num2words"; 12 12 13 13 src = fetchPypi { 14 14 inherit pname version; 15 - hash = "sha256-fnwLDwgEBao6HdnTKxypCzvwO6sXuOVNsF4beDAaCYg="; 15 + hash = "sha256-owZHFvu/kNdcRJRQzr+8c6ahPmOyUx0JvezDqxoiCc8="; 16 16 }; 17 17 18 18 propagatedBuildInputs = [ docopt ];
pkgs/development/python-modules/osmnx/default.nix
+2 -2
pkgs/development/python-modules/persim/default.nix
··· 16 16 17 17 buildPythonPackage rec { 18 18 pname = "persim"; 19 - version = "0.3.1"; 19 + version = "0.3.2"; 20 20 format = "setuptools"; 21 21 22 22 disabled = pythonOlder "3.7"; 23 23 24 24 src = fetchPypi { 25 25 inherit pname version; 26 - hash = "sha256-7w8KJHrc9hBOysFBF9sLJFgXEOqKjZZIFoBTlXALSXU="; 26 + hash = "sha256-p6Vumfr+vRDr0D9PnEZItp9vNlCLIb59HpBg1KdyHGE="; 27 27 }; 28 28 29 29 propagatedBuildInputs = [
pkgs/development/python-modules/streamlit/default.nix
+3 -3
pkgs/development/python-modules/vehicle/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "vehicle"; 16 - version = "1.0.1"; 16 + version = "2.0.0"; 17 17 format = "pyproject"; 18 18 19 - disabled = pythonOlder "3.10"; 19 + disabled = pythonOlder "3.11"; 20 20 21 21 src = fetchFromGitHub { 22 22 owner = "frenck"; 23 23 repo = "python-vehicle"; 24 24 rev = "refs/tags/v${version}"; 25 - hash = "sha256-nN7efkN59FCCjCk3svYCTGGdvr2RSM5VektuUkHy3Vo="; 25 + hash = "sha256-EbjrAfbqVY336RHBWq81KM+oHixen+38aUTnWZQ+nCs="; 26 26 }; 27 27 28 28 nativeBuildInputs = [
pkgs/development/python-modules/zstandard/default.nix
+3
pkgs/development/tools/poetry2nix/poetry2nix/overrides/build-systems.json
··· 2732 2732 "certbot-dns-inwx": [ 2733 2733 "setuptools" 2734 2734 ], 2735 + "certbot-dns-ovh": [ 2736 + "setuptools" 2737 + ], 2735 2738 "certbot-dns-rfc2136": [ 2736 2739 "setuptools" 2737 2740 ],
+3 -3
pkgs/development/tools/railway/default.nix
··· 3 3 4 4 rustPlatform.buildRustPackage rec { 5 5 pname = "railway"; 6 - version = "3.4.0"; 6 + version = "3.5.0"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "railwayapp"; 10 10 repo = "cli"; 11 11 rev = "v${version}"; 12 - hash = "sha256-pydnIUqUBMLHonEGcvB+K+48QQYQuFfZxbAETJjU+3o="; 12 + hash = "sha256-I32DC0hzVM/LCSqS878sZd+UYZ0NfBuzBgd9Aed/Sq0="; 13 13 }; 14 14 15 - cargoHash = "sha256-VgLQfUk1xeAwr9KUo1Vz4Ndw0FAnYGw3af0v3ueNPuA="; 15 + cargoHash = "sha256-CYy0YEWK9sHAr0yFIH9yzxPnzG6x/EcE8ZLkueYgSiE="; 16 16 17 17 nativeBuildInputs = [ pkg-config ]; 18 18
pkgs/misc/uq/default.nix
+2 -2
pkgs/os-specific/linux/minimal-bootstrap/stage0-posix/bootstrap-sources.nix
··· 1 - { 1 + { hostPlatform 2 2 }: 3 3 4 4 rec { ··· 65 65 */ 66 66 minimal-bootstrap-sources = derivation { 67 67 inherit name; 68 - system = builtins.currentSystem; 68 + system = hostPlatform.system; 69 69 outputHashMode = "recursive"; 70 70 inherit outputHashAlgo outputHash; 71 71
+2 -1
pkgs/os-specific/linux/minimal-bootstrap/stage0-posix/make-bootstrap-sources.nix
··· 12 12 # 13 13 14 14 { lib 15 + , hostPlatform 15 16 , fetchFromGitHub 16 17 , fetchpatch 17 18 }: 18 19 19 20 let 20 - expected = import ./bootstrap-sources.nix { }; 21 + expected = import ./bootstrap-sources.nix { inherit hostPlatform; }; 21 22 in 22 23 23 24 fetchFromGitHub {
+2 -2
pkgs/os-specific/linux/oci-seccomp-bpf-hook/default.nix
··· 10 10 11 11 buildGoModule rec { 12 12 pname = "oci-seccomp-bpf-hook"; 13 - version = "1.2.9"; 13 + version = "1.2.10"; 14 14 src = fetchFromGitHub { 15 15 owner = "containers"; 16 16 repo = "oci-seccomp-bpf-hook"; 17 17 rev = "v${version}"; 18 - sha256 = "sha256-KPO9xqLgPML6smoO7P50yP81b4iCvRFIR74ciUiva7o="; 18 + sha256 = "sha256-bWlm+JYNf7+faKSQfW5fhxoH/D2I8ujjakswH+1r49o="; 19 19 }; 20 20 vendorHash = null; 21 21
+2 -2
pkgs/servers/http/apache-httpd/2.4.nix
··· 13 13 14 14 stdenv.mkDerivation rec { 15 15 pname = "apache-httpd"; 16 - version = "2.4.57"; 16 + version = "2.4.58"; 17 17 18 18 src = fetchurl { 19 19 url = "mirror://apache/httpd/httpd-${version}.tar.bz2"; 20 - sha256 = "sha256-28y4Su6V4JXt+7geXrkmzNJOatpV3Ng8rssmLlz5TSo="; 20 + sha256 = "sha256-+hbXKgeCEKVMR91b7y+Lm4oB2UkJpRRTlWs+xkQupMU="; 21 21 }; 22 22 23 23 # FIXME: -dev depends on -doc
+2 -13
pkgs/servers/http/lighttpd/default.nix
··· 15 15 16 16 stdenv.mkDerivation rec { 17 17 pname = "lighttpd"; 18 - version = "1.4.71"; 18 + version = "1.4.72"; 19 19 20 20 src = fetchurl { 21 21 url = "https://download.lighttpd.net/lighttpd/releases-${lib.versions.majorMinor version}.x/${pname}-${version}.tar.xz"; 22 - sha256 = "sha256-uLaRXaIDlv3DVN8zJNXkQBabLl6nhZ46d1IThBMlr6w="; 22 + sha256 = "sha256-98reTWm3VKB0jAFGPDPNi0VsqcwDuwnoWnG8vNVOVew="; 23 23 }; 24 24 25 - patches = [ 26 - # disable tests for des/md5, which we don't support any more 27 - ./disable-legacy-crypt-tests.patch 28 - ]; 29 - 30 25 postPatch = '' 31 26 patchShebangs tests 32 - # Linux sandbox has an empty hostname and not /etc/hosts, which fails some tests 33 - sed -ire '/[$]self->{HOSTNAME} *=/i if(length($name)==0) { $name = "127.0.0.1" }' tests/LightyTest.pm 34 - # it's difficult to prevent this test from trying to use /var/tmp (which 35 - # the sandbox doesn't have) so until libredirect has support for mkstemp 36 - # calls it's easiest to disable it 37 - sed -i '/test_mod_ssi/d' src/t/test_mod.c 38 27 ''; 39 28 40 29 depsBuildBuild = [ buildPackages.stdenv.cc ];
-35
pkgs/servers/http/lighttpd/disable-legacy-crypt-tests.patch
··· 1 - diff -uNr lighttpd-1.4.71.orig/tests/mod-fastcgi.t lighttpd-1.4.71.new/tests/mod-fastcgi.t 2 - --- lighttpd-1.4.71.orig/tests/mod-fastcgi.t 2023-05-27 21:56:16.000000000 +0200 3 - +++ lighttpd-1.4.71.new/tests/mod-fastcgi.t 2023-06-01 07:01:59.789873512 +0200 4 - @@ -79,7 +79,7 @@ 5 - ok($tf->handle_http($t) == 0, 'FastCGI + bin-copy-environment'); 6 - 7 - SKIP: { 8 - - skip "no crypt-des under openbsd or MS Visual Studio", 2 if $^O eq 'openbsd' || $tf->{'win32native'}; 9 - + skip "no crypt-des", 2; 10 - 11 - $t->{REQUEST} = ( <<EOF 12 - GET /get-server-env.php?env=REMOTE_USER HTTP/1.0 13 - diff -uNr lighttpd-1.4.71.orig/tests/request.t lighttpd-1.4.71.new/tests/request.t 14 - --- lighttpd-1.4.71.orig/tests/request.t 2023-05-27 21:56:16.000000000 +0200 15 - +++ lighttpd-1.4.71.new/tests/request.t 2023-06-01 07:02:39.855940048 +0200 16 - @@ -1106,7 +1106,7 @@ 17 - ok($tf->handle_http($t) == 0, 'Basic-Auth: Valid Auth-token - plain'); 18 - 19 - SKIP: { 20 - - skip "no crypt-des under openbsd or MS Visual Studio", 2 if $^O eq 'openbsd' || $tf->{'win32native'}; 21 - + skip "no crypt-des", 2; 22 - $t->{REQUEST} = ( <<EOF 23 - GET /server-config HTTP/1.0 24 - Host: auth-htpasswd.example.org 25 - @@ -1163,9 +1163,7 @@ 26 - ok($tf->handle_http($t) == 0, 'Basic-Auth: Valid Auth-token - htpasswd (apr-md5, wrong password)'); 27 - 28 - SKIP: { 29 - - skip "no crypt-md5 under cygwin", 1 if $^O eq 'cygwin'; 30 - - skip "no crypt-md5 under darwin", 1 if $^O eq 'darwin'; 31 - - skip "no crypt-md5 under openbsd",1 if $^O eq 'openbsd'; 32 - + skip "no crypt-md5", 1; 33 - $t->{REQUEST} = ( <<EOF 34 - GET /server-config HTTP/1.0 35 - Host: auth-htpasswd.example.org
-1
pkgs/servers/monitoring/librenms/default.nix
··· 23 23 let 24 24 phpPackage = php82.withExtensions ({ enabled, all }: enabled ++ [ all.memcached ]); 25 25 in phpPackage.buildComposerProject rec { 26 - name = pname + "-" + version; 27 26 pname = "librenms"; 28 27 version = "23.9.1"; 29 28
pkgs/servers/unifi-video/default.nix
+13 -11
pkgs/tools/X11/xssstate/default.nix
··· 4 4 , libX11 5 5 , libXScrnSaver 6 6 }: 7 - stdenv.mkDerivation rec { 7 + stdenv.mkDerivation (finalAttrs: { 8 8 pname = "xssstate"; 9 - # 10 - # Use the date of the last commit, since there were bug fixes after the 1.1 11 - # release. 12 - # 13 - version = "unstable-2022-09-24"; 9 + version = "1.1-unstable-2022-09-24"; 10 + 14 11 src = fetchgit { 15 12 url = "https://git.suckless.org/xssstate/"; 16 13 rev = "5d8e9b49ce2970f786f1e5aa12bbaae83900453f"; 17 14 hash = "sha256-Aor12tU1I/qNZCdBhZcvNK1FWFh0HYK8CEI29X5yoeA="; 18 15 }; 19 16 20 - makeFlags = [ "VERSION=${version}" ]; 21 - 22 - installFlags = [ "PREFIX=$(out)" ]; 17 + buildInputs = [ 18 + libX11 19 + libXScrnSaver 20 + ]; 23 21 24 - buildInputs = [ libX11 libXScrnSaver ]; 22 + makeFlags = [ 23 + "PREFIX=${placeholder "out"}" 24 + "VERSION=${finalAttrs.version}" 25 + ]; 25 26 26 27 meta = with lib; { 27 28 description = "A simple tool to retrieve the X screensaver state"; 28 29 license = licenses.mit; 29 30 maintainers = with maintainers; [ onemoresuza ]; 30 31 platforms = platforms.linux; 32 + mainProgram = "xssstate"; 31 33 }; 32 - } 34 + })
pkgs/tools/archivers/payload-dumper-go/default.nix
+2 -2
pkgs/tools/misc/esphome/default.nix
··· 16 16 in 17 17 python.pkgs.buildPythonApplication rec { 18 18 pname = "esphome"; 19 - version = "2023.9.3"; 19 + version = "2023.10.1"; 20 20 format = "setuptools"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = pname; 24 24 repo = pname; 25 25 rev = "refs/tags/${version}"; 26 - hash = "sha256-SyXEiGh1/s9EJ0UPYC8R04JUYkCPhCtNUcGvVCycKGM="; 26 + hash = "sha256-XKZYnZYXETv0UXrKtjQvDXyv8lwqfO19jc5Fs3KMhEY="; 27 27 }; 28 28 29 29 postPatch = ''
pkgs/tools/misc/starfetch/default.nix
pkgs/tools/misc/szyszka/default.nix
+53
pkgs/tools/networking/ddclient/default.nix
··· 1 + { lib, fetchFromGitHub, perlPackages, autoreconfHook, iproute2, perl, curl }: 2 + 3 + let 4 + myPerl = perl.withPackages (ps: [ ps.JSONPP ]); 5 + in 6 + perlPackages.buildPerlPackage rec { 7 + pname = "ddclient"; 8 + version = "3.11.0_1"; 9 + 10 + outputs = [ "out" ]; 11 + 12 + src = fetchFromGitHub { 13 + owner = "ddclient"; 14 + repo = "ddclient"; 15 + rev = "v${version}"; 16 + sha256 = "sha256-pl1kbzY5nUIvx1QiDdL9TP4vKtQnnv3RWklE4gbxXCw="; 17 + }; 18 + 19 + postPatch = '' 20 + touch Makefile.PL 21 + ''; 22 + 23 + nativeBuildInputs = [ autoreconfHook ]; 24 + 25 + buildInputs = [ curl myPerl ]; 26 + 27 + # Prevent ddclient from picking up build time perl which is implicitly added 28 + # by buildPerlPackage. 29 + configureFlags = [ 30 + "--with-perl=${lib.getExe myPerl}" 31 + ]; 32 + 33 + installPhase = '' 34 + runHook preInstall 35 + 36 + install -Dm755 ddclient $out/bin/ddclient 37 + install -Dm644 -t $out/share/doc/ddclient COP* README.* ChangeLog.md 38 + 39 + runHook postInstall 40 + ''; 41 + 42 + # TODO: run upstream tests 43 + doCheck = false; 44 + 45 + meta = with lib; { 46 + description = "Client for updating dynamic DNS service entries"; 47 + homepage = "https://ddclient.net/"; 48 + license = licenses.gpl2Plus; 49 + platforms = platforms.linux; 50 + maintainers = with maintainers; [ bjornfor ]; 51 + mainProgram = "ddclient"; 52 + }; 53 + }
pkgs/tools/networking/ipfetch/default.nix
+8 -7
pkgs/tools/networking/voms/default.nix
··· 13 13 , zlib 14 14 # Configuration overridable with .override 15 15 # If not null, the builder will 16 - # move "$out/etc" to "$out/etc.orig" and symlink "$out/etc" to externalEtc. 16 + # create a new output "etc", move "$out/etc" to "$etc/etc" 17 + # and symlink "$out/etc" to externalEtc. 17 18 , externalEtc ? "/etc" 18 19 }: 19 20 ··· 46 47 zlib 47 48 ]; 48 49 49 - outputs = [ "bin" "out" "dev" "man" ]; 50 + outputs = [ "bin" "out" "dev" "man" ] 51 + ++ lib.optional (externalEtc != null) "etc"; 50 52 51 53 preAutoreconf = '' 52 54 mkdir -p aux src/autogen ··· 65 67 66 68 configureFlags = [ 67 69 "--with-gsoap-wsdl2h=${gsoap}/bin/wsdl2h" 70 + "--sysconfdir=${placeholder "out"}/etc" 68 71 ]; 69 72 70 - postFixup = '' 71 - ${lib.optionalString (externalEtc != null) '' 72 - mv "$out"/etc{,.orig} 73 - ln -s ${lib.escapeShellArg externalEtc} "$out/etc" 74 - ''} 73 + postFixup = lib.optionalString (externalEtc != null) '' 74 + moveToOutput etc "$etc" 75 + ln -s ${lib.escapeShellArg externalEtc} "$out/etc" 75 76 ''; 76 77 77 78 meta = with lib; {
+3 -2
pkgs/tools/networking/xrootd/default.nix
··· 39 39 hash = "sha256-SLmxv8opN7z4V07S9kLGo8HG7Ql62iZQLtf3zGemwA8="; 40 40 }; 41 41 42 - outputs = [ "bin" "out" "dev" "man" ]; 42 + outputs = [ "bin" "out" "dev" "man" ] 43 + ++ lib.optional (externalEtc != null) "etc"; 43 44 44 45 passthru.fetchxrd = callPackage ./fetchxrd.nix { xrootd = finalAttrs.finalPackage; }; 45 46 passthru.tests = ··· 118 119 wrapProgram "$FILE" "''${makeWrapperArgs[@]}" 119 120 done < <(find "$bin/bin" -mindepth 1 -maxdepth 1 -type f,l -perm -a+x) 120 121 '' + lib.optionalString (externalEtc != null) '' 121 - mv "$out"/etc{,.orig} 122 + moveToOutput etc "$etc" 122 123 ln -s ${lib.escapeShellArg externalEtc} "$out/etc" 123 124 ''; 124 125
+2 -2
pkgs/tools/security/scrypt/default.nix
··· 8 8 9 9 stdenv.mkDerivation rec { 10 10 pname = "scrypt"; 11 - version = "1.3.1"; 11 + version = "1.3.2"; 12 12 13 13 src = fetchurl { 14 14 url = "https://www.tarsnap.com/scrypt/${pname}-${version}.tgz"; 15 - sha256 = "1hnl0r6pmyxiy4dmafmqk1db7wpc0x9rqpzqcwr9d2cmghcj6byz"; 15 + sha256 = "sha256-1jLBGTQgrG+uv5SC5l4z06VmTszWQ7CaUJ0h0cHym+I="; 16 16 }; 17 17 18 18 outputs = [ "out" "lib" "dev" ];
-1
pkgs/top-level/aliases.nix
··· 92 92 bird2 = bird; # Added 2022-02-21 93 93 bitwig-studio1 = throw "bitwig-studio1 has been removed, you can upgrade to 'bitwig-studio'"; # Added 2023-01-03 94 94 bitwig-studio2 = throw "bitwig-studio2 has been removed, you can upgrade to 'bitwig-studio'"; # Added 2023-01-03 95 - ddclient = throw "ddclient has been removed on the request of the upstream maintainer because it is unmaintained and has bugs. Please switch to a different software like `inadyn` or `knsupdate`."; # Added 2023-07-04 96 95 bluezFull = throw "'bluezFull' has been renamed to/replaced by 'bluez'"; # Converted to throw 2023-09-10 97 96 boost168 = throw "boost168 has been deprecated in favor of the latest version"; # Added 2023-06-08 98 97 boost169 = throw "boost169 has been deprecated in favor of the latest version"; # Added 2023-06-08
+10 -2
pkgs/top-level/all-packages.nix
··· 7425 7425 7426 7426 ddcutil = callPackage ../tools/misc/ddcutil { }; 7427 7427 7428 + ddclient = callPackage ../tools/networking/ddclient { }; 7429 + 7428 7430 dd_rescue = callPackage ../tools/system/dd_rescue { }; 7429 7431 7430 7432 ddh = callPackage ../tools/system/ddh { }; ··· 20840 20842 20841 20843 certbot-full = certbot.withPlugins (cp: with cp; [ 20842 20844 certbot-dns-cloudflare 20845 + certbot-dns-google 20846 + certbot-dns-ovh 20843 20847 certbot-dns-rfc2136 20844 20848 certbot-dns-route53 20845 20849 ]); ··· 28331 28335 checkMeta = callPackage ../stdenv/generic/check-meta.nix { }; 28332 28336 }); 28333 28337 minimal-bootstrap-sources = callPackage ../os-specific/linux/minimal-bootstrap/stage0-posix/bootstrap-sources.nix { }; 28334 - make-minimal-bootstrap-sources = callPackage ../os-specific/linux/minimal-bootstrap/stage0-posix/make-bootstrap-sources.nix { }; 28338 + make-minimal-bootstrap-sources = callPackage ../os-specific/linux/minimal-bootstrap/stage0-posix/make-bootstrap-sources.nix { 28339 + inherit (stdenv) hostPlatform; 28340 + }; 28335 28341 28336 28342 mingetty = callPackage ../os-specific/linux/mingetty { }; 28337 28343 ··· 28456 28462 28457 28463 golint = callPackage ../development/tools/golint { }; 28458 28464 28459 - golangci-lint = callPackage ../development/tools/golangci-lint { }; 28465 + golangci-lint = callPackage ../development/tools/golangci-lint { 28466 + buildGoModule = buildGo121Module; 28467 + }; 28460 28468 28461 28469 golangci-lint-langserver = callPackage ../development/tools/golangci-lint-langserver { }; 28462 28470
+4 -2
pkgs/top-level/python-packages.nix
··· 1876 1876 1877 1877 certbot-dns-cloudflare = callPackage ../development/python-modules/certbot-dns-cloudflare { }; 1878 1878 1879 + certbot-dns-google = callPackage ../development/python-modules/certbot-dns-google { }; 1880 + 1879 1881 certbot-dns-inwx = callPackage ../development/python-modules/certbot-dns-inwx { }; 1880 1882 1881 - certbot-dns-rfc2136 = callPackage ../development/python-modules/certbot-dns-rfc2136 { }; 1883 + certbot-dns-ovh = callPackage ../development/python-modules/certbot-dns-ovh { }; 1882 1884 1883 - certbot-dns-google = callPackage ../development/python-modules/certbot-dns-google { }; 1885 + certbot-dns-rfc2136 = callPackage ../development/python-modules/certbot-dns-rfc2136 { }; 1884 1886 1885 1887 certbot-dns-route53 = callPackage ../development/python-modules/certbot-dns-route53 { }; 1886 1888