Merge staging-next into staging

authored by github-actions[bot] and committed by GitHub 66542bb8 b62bd298

+597 -381
+6
maintainers/maintainer-list.nix
··· 6945 6945 email = "nix@quidecco.pl"; 6946 6946 name = "Isidor Zeuner"; 6947 6947 }; 6948 + gmacon = { 6949 + name = "George Macon"; 6950 + matrix = "@gmacon:matrix.org"; 6951 + github = "gmacon"; 6952 + githubId = 238853; 6953 + }; 6948 6954 gmemstr = { 6949 6955 email = "git@gmem.ca"; 6950 6956 github = "gmemstr";
+1
nixos/tests/kernel-generic.nix
··· 32 32 linux_6_1_hardened 33 33 linux_6_5_hardened 34 34 linux_6_6_hardened 35 + linux_6_7_hardened 35 36 linux_rt_5_4 36 37 linux_rt_5_10 37 38 linux_rt_5_15
+2 -2
pkgs/applications/audio/monkeys-audio/default.nix
··· 5 5 }: 6 6 7 7 stdenv.mkDerivation (finalAttrs: { 8 - version = "10.43"; 8 + version = "10.44"; 9 9 pname = "monkeys-audio"; 10 10 11 11 src = fetchzip { 12 12 url = "https://monkeysaudio.com/files/MAC_${ 13 13 builtins.concatStringsSep "" (lib.strings.splitString "." finalAttrs.version)}_SDK.zip"; 14 - sha256 = "sha256-Y1X0KWf87L8Qjx/G6/RV37iiN7enwXTAaqQ+45FfTT4="; 14 + sha256 = "sha256-1JuzlCp9CI979ZT3a3zYfJIowrtQ42p1f9PPG6clQ4s="; 15 15 stripRoot = false; 16 16 }; 17 17 nativeBuildInputs = [
+2 -2
pkgs/applications/audio/tauon/default.nix
··· 26 26 27 27 stdenv.mkDerivation (finalAttrs: { 28 28 pname = "tauon"; 29 - version = "7.7.0"; 29 + version = "7.7.1"; 30 30 31 31 src = fetchFromGitHub { 32 32 owner = "Taiko2k"; 33 33 repo = "TauonMusicBox"; 34 34 rev = "v${finalAttrs.version}"; 35 - hash = "sha256-FNRG0NKHQpPHb3P1M0eshFuGu9lyWFgmufFC5aqr7n0="; 35 + hash = "sha256-rRYM8wdvwfetoIpS/lzAV/uV5XVpXyXsHSrClPWcsCo="; 36 36 }; 37 37 38 38 postUnpack = ''
+2 -2
pkgs/applications/backup/unifi-protect-backup/default.nix
··· 5 5 6 6 python3.pkgs.buildPythonApplication rec { 7 7 pname = "unifi-protect-backup"; 8 - version = "0.10.3"; 8 + version = "0.10.4"; 9 9 pyproject = true; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "ep1cman"; 13 13 repo = "unifi-protect-backup"; 14 14 rev = "refs/tags/v${version}"; 15 - hash = "sha256-jICnm9EfPyOLVbZfF+TYcQJo0ZXUDpFgYpL5Zf9b8Bc="; 15 + hash = "sha256-KT2saPpkAS/6X491i0Y8+jr8JPD51iQx+YGT5zRTtcU="; 16 16 }; 17 17 18 18 pythonRelaxDeps = [
+3 -3
pkgs/applications/misc/nwg-look/default.nix
··· 15 15 16 16 buildGoModule rec { 17 17 pname = "nwg-look"; 18 - version = "0.2.5"; 18 + version = "0.2.6"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "nwg-piotr"; 22 22 repo = "nwg-look"; 23 23 rev = "v${version}"; 24 - hash = "sha256-Gw0C5PCVwXuwXWF39P7pc8KdnmCYRH24zizShmniynM="; 24 + hash = "sha256-kOoYhJKt7/BsQ0/RuVhj0bWnX9GU8ET3MSq6NMCOw5E="; 25 25 }; 26 26 27 - vendorHash = "sha256-vHqnIkzsoQHiP6mmrwNetq6Pp5UB1CmX7mYvgsbvb0s="; 27 + vendorHash = "sha256-V0KXK6jxBYI+tixBLq24pJJcnu4gDF6nfyns2IBTss4="; 28 28 29 29 # Replace /usr/ directories with the packages output location 30 30 # This means it references the correct path
+2 -2
pkgs/applications/networking/cluster/hubble/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "hubble"; 5 - version = "0.12.3"; 5 + version = "0.13.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "cilium"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-GVfPrKPX/y/trtZjIftUW1bH5Z/O/oIUoIjjEET38Mk="; 11 + sha256 = "sha256-jFzxAzLv3EfqWgbXsN8d0OPY8pDy7OBjJIzr+x5yFF0="; 12 12 }; 13 13 14 14 vendorHash = null;
+2 -2
pkgs/applications/networking/gnmic/default.nix
··· 8 8 9 9 buildGoModule rec { 10 10 pname = "gnmic"; 11 - version = "0.35.0"; 11 + version = "0.35.1"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "openconfig"; 15 15 repo = pname; 16 16 rev = "v${version}"; 17 - hash = "sha256-PGhU8u2dYo9S0yv8/F7YBSHUZWxxFUXIbjQIjsX6AGw="; 17 + hash = "sha256-1Rtq/tRDU8hwrEYhP2/2qPWAYeCPL03m4NpXO3sGUdo="; 18 18 }; 19 19 20 20 vendorHash = "sha256-HoOjVfpowb5jvAYdQ3cbCQmSl1RJKPDjvOaOGfhe5TY=";
+16 -16
pkgs/applications/networking/instant-messengers/discord/default.nix
··· 2 2 let 3 3 versions = 4 4 if stdenv.isLinux then { 5 - stable = "0.0.40"; 6 - ptb = "0.0.64"; 7 - canary = "0.0.248"; 8 - development = "0.0.8"; 5 + stable = "0.0.41"; 6 + ptb = "0.0.66"; 7 + canary = "0.0.257"; 8 + development = "0.0.11"; 9 9 } else { 10 - stable = "0.0.291"; 11 - ptb = "0.0.94"; 12 - canary = "0.0.394"; 13 - development = "0.0.18"; 10 + stable = "0.0.292"; 11 + ptb = "0.0.96"; 12 + canary = "0.0.401"; 13 + development = "0.0.27"; 14 14 }; 15 15 version = versions.${branch}; 16 16 srcs = rec { 17 17 x86_64-linux = { 18 18 stable = fetchurl { 19 19 url = "https://dl.discordapp.net/apps/linux/${version}/discord-${version}.tar.gz"; 20 - hash = "sha256-kKWbD2fvRq+7VnOE3tEQ1LeGneZOQfD/79bG2uElYSw="; 20 + hash = "sha256-yzCOlYIDvbhJRbiqf5NC2iBT2ezlJP81O/wtkWIEp+U="; 21 21 }; 22 22 ptb = fetchurl { 23 23 url = "https://dl-ptb.discordapp.net/apps/linux/${version}/discord-ptb-${version}.tar.gz"; 24 - hash = "sha256-loA/RdT6Y5c6Upius+vO/383FrutsJEYS/1uiR0gfqo="; 24 + hash = "sha256-3ocygqp8eiF3n/BVlTp1T1CRsGj56MGp1yPsvBE7/H4="; 25 25 }; 26 26 canary = fetchurl { 27 27 url = "https://dl-canary.discordapp.net/apps/linux/${version}/discord-canary-${version}.tar.gz"; 28 - hash = "sha256-4BjlvunODUSNq2uBiC82FTlNRO3ByLJzwMsB3LirNIw="; 28 + hash = "sha256-2AUCTWKEB4cy2tFfnJMn8Ywz1B8a3H6yhkVIcB0fLME="; 29 29 }; 30 30 development = fetchurl { 31 31 url = "https://dl-development.discordapp.net/apps/linux/${version}/discord-development-${version}.tar.gz"; 32 - hash = "sha256-FD0qozLyNMPVpdD42A/pziwX7tKP3/9mFDIqdf4lopE="; 32 + hash = "sha256-bN77yfmz/W3ohSKHV4pwnKEET6yi3p29ZfqH1BvFqXs="; 33 33 }; 34 34 }; 35 35 x86_64-darwin = { 36 36 stable = fetchurl { 37 37 url = "https://dl.discordapp.net/apps/osx/${version}/Discord.dmg"; 38 - hash = "sha256-k0A5xBWG8cXhDp/d3dw5Eu1cpqayfOzrnwXK8i2CtVE="; 38 + hash = "sha256-1BKMIWSb7+oQ+B80GUCslKn5VNdM0hPTNyZkI/RsxhM="; 39 39 }; 40 40 ptb = fetchurl { 41 41 url = "https://dl-ptb.discordapp.net/apps/osx/${version}/DiscordPTB.dmg"; 42 - hash = "sha256-SUCVLCorwqQTkJs3UJguBYZwE1lrJgmZ9BU8fHIRgLE="; 42 + hash = "sha256-dG0Wcx8X2+kzrpacFZmMCXfLsuLOLbDK4qVLAMzd4RA="; 43 43 }; 44 44 canary = fetchurl { 45 45 url = "https://dl-canary.discordapp.net/apps/osx/${version}/DiscordCanary.dmg"; 46 - hash = "sha256-lgnZEkXxfn1L5QUBGXcKrIEL5kEehRIc0HF3WXgB8yo="; 46 + hash = "sha256-fz/LDQJ/B8luN6Ffobp82hnycBOLg9Kdi0kXLGltCDc="; 47 47 }; 48 48 development = fetchurl { 49 49 url = "https://dl-development.discordapp.net/apps/osx/${version}/DiscordDevelopment.dmg"; 50 - hash = "sha256-q/8hHRBK9Quj2S1n5QQC3u3yF9OvxqWrC+ge4Jh9i0U="; 50 + hash = "sha256-MRCBPe98Czm1OG2l3c1GAW4a27fV8XMtQ9pPIJMgqzA="; 51 51 }; 52 52 }; 53 53 aarch64-darwin = x86_64-darwin;
+3 -3
pkgs/applications/networking/remote/vmware-horizon-client/default.nix
··· 11 11 , configText ? "" 12 12 }: 13 13 let 14 - version = "2309.1"; 14 + version = "2312"; 15 15 16 16 sysArch = 17 17 if stdenv.hostPlatform.system == "x86_64-linux" then "x64" ··· 36 36 pname = "vmware-horizon-files"; 37 37 inherit version; 38 38 src = fetchurl { 39 - url = "https://download3.vmware.com/software/CART24FQ4_LIN_2309.1_TARBALL/VMware-Horizon-Client-Linux-2309.1-8.11.1-22775487.tar.gz"; 40 - sha256 = "3f66d21c0e97324d1cb85ac75132a69768e8e7ff57da33841e4e8bd37089d245"; 39 + url = "https://download3.vmware.com/software/CART24FQ4_LIN_2312_TARBALL/VMware-Horizon-Client-Linux-2312-8.12.0-23149323.tar.gz"; 40 + sha256 = "15ca1d6028b9ca88e23fa363a2942fd76456c19e95ced4734595c3dc44db38d8"; 41 41 }; 42 42 nativeBuildInputs = [ makeWrapper ]; 43 43 installPhase = ''
+2
pkgs/applications/radio/gnuradio/shared.nix
··· 104 104 featuresInfo 105 105 python 106 106 ; 107 + gnuradioOlder = lib.versionOlder versionAttr.major; 108 + gnuradioAtLeast = lib.versionAtLeast versionAttr.major; 107 109 } // lib.optionalAttrs (hasFeature "gr-qtgui") { 108 110 inherit qt; 109 111 } // lib.optionalAttrs (hasFeature "gnuradio-companion") {
+2 -2
pkgs/applications/science/chemistry/jmol/default.nix
··· 25 25 }; 26 26 in 27 27 stdenv.mkDerivation rec { 28 - version = "16.1.49"; 28 + version = "16.1.51"; 29 29 pname = "jmol"; 30 30 31 31 src = let 32 32 baseVersion = "${lib.versions.major version}.${lib.versions.minor version}"; 33 33 in fetchurl { 34 34 url = "mirror://sourceforge/jmol/Jmol/Version%20${baseVersion}/Jmol%20${version}/Jmol-${version}-binary.tar.gz"; 35 - hash = "sha256-rzW0dB6LkKnbqHMLII6u3a6iJ1nz6gys/TN0fZFcrBk="; 35 + hash = "sha256-7YOBpUeGutFPbMlQ1NnJ6BNyLbw54Meezwfs6mL71BQ="; 36 36 }; 37 37 38 38 patchPhase = ''
+2 -1
pkgs/applications/science/logic/easycrypt/default.nix
··· 22 22 batteries 23 23 dune-build-info 24 24 inifiles 25 + why3 25 26 yojson 26 27 zarith 27 28 ]; 28 29 29 - propagatedBuildInputs = [ why3 ]; 30 + propagatedBuildInputs = [ why3.out ]; 30 31 31 32 strictDeps = true; 32 33
+20 -4
pkgs/applications/science/logic/why3/default.nix
··· 1 1 { callPackage, fetchurl, lib, stdenv 2 2 , ocamlPackages, coqPackages, rubber, hevea, emacs 3 - , version ? "1.7.0" 3 + , version ? "1.7.1" 4 + , ideSupport ? true 5 + , wrapGAppsHook 4 6 }: 5 7 6 8 stdenv.mkDerivation rec { ··· 10 12 src = fetchurl { 11 13 url = "https://why3.gitlabpages.inria.fr/releases/${pname}-${version}.tar.gz"; 12 14 hash = { 13 - "1.7.0" = "sha256-rygrjzuJVukOvpuXTG/yeoEP98ZFkLQHObgc3My1PVY="; 15 + "1.7.1" = "sha256-rG1hcxFhQ2PlE9RTz9ELliDjCuSzLnJ1togRY637cU4="; 14 16 "1.6.0" = "sha256-hFvM6kHScaCtcHCc6Vezl9CR7BFbiKPoTEh7kj0ZJxw="; 15 17 }."${version}"; 16 18 }; 17 19 18 20 strictDeps = true; 19 21 20 - nativeBuildInputs = with ocamlPackages; [ 22 + nativeBuildInputs = lib.optional ideSupport 23 + wrapGAppsHook 24 + ++ (with ocamlPackages; [ 21 25 ocaml findlib menhir 26 + ]) ++ [ 22 27 # Coq Support 23 28 coqPackages.coq 24 29 ]; ··· 29 34 emacs 30 35 # Documentation 31 36 rubber hevea 37 + ] ++ lib.optional ideSupport 32 38 # GUI 33 39 lablgtk3-sourceview3 40 + ++ [ 34 41 # WebIDE 35 42 js_of_ocaml js_of_ocaml-ppx 36 43 # S-expression output for why3pp ··· 44 51 45 52 enableParallelBuilding = true; 46 53 47 - configureFlags = [ "--enable-verbose-make" ]; 54 + configureFlags = [ "--enable-verbose-make" 55 + (lib.enableFeature ideSupport "ide") 56 + ]; 57 + 58 + outputs = [ "out" "dev" ]; 48 59 49 60 installTargets = [ "install" "install-lib" ]; 61 + 62 + postInstall = '' 63 + mkdir -p $dev/lib 64 + mv $out/lib/ocaml $dev/lib/ 65 + ''; 50 66 51 67 passthru.withProvers = callPackage ./with-provers.nix {}; 52 68
+3 -3
pkgs/applications/virtualization/docker/compose.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "docker-compose"; 5 - version = "2.24.0"; 5 + version = "2.24.3"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "docker"; 9 9 repo = "compose"; 10 10 rev = "v${version}"; 11 - hash = "sha256-6wa4kIl65z3kk+wzDX+WhS50J+e0AZ+W8A++bdnRc2M="; 11 + hash = "sha256-B6hJXm4SABYTIFPd9unTNkDtQxeMPBk98/2Q1TQedEA="; 12 12 }; 13 13 14 14 postPatch = '' ··· 16 16 rm -rf e2e/ 17 17 ''; 18 18 19 - vendorHash = "sha256-03jlomVb3jS+SkmIxRtPsaMx2VKLYX/Lp9JH/mlJvK4="; 19 + vendorHash = "sha256-ymNd8DMkttSiF167RSIWQbL8RHPYXp4D8ctFoSPC0io="; 20 20 21 21 ldflags = [ "-X github.com/docker/compose/v2/internal.Version=${version}" "-s" "-w" ]; 22 22
+3
pkgs/applications/virtualization/virt-viewer/default.nix
··· 5 5 , fetchpatch 6 6 , gdbm 7 7 , glib 8 + , gst_all_1 8 9 , gsettings-desktop-schemas 9 10 , gtk-vnc 10 11 , gtk3 ··· 64 65 ]; 65 66 66 67 buildInputs = [ 68 + gst_all_1.gst-plugins-base 69 + gst_all_1.gst-plugins-good 67 70 bash-completion 68 71 glib 69 72 gsettings-desktop-schemas
+72
pkgs/by-name/bo/bobcat/package.nix
··· 1 + { lib 2 + , stdenv 3 + , fetchFromGitLab 4 + , icmake 5 + , yodl 6 + , libmilter 7 + , libX11 8 + , openssl 9 + , readline 10 + , util-linux 11 + }: 12 + 13 + stdenv.mkDerivation rec { 14 + pname = "bobcat"; 15 + version = "5.11.01"; 16 + 17 + src = fetchFromGitLab { 18 + domain = "gitlab.com"; 19 + owner = "fbb-git"; 20 + repo = "bobcat"; 21 + rev = version; 22 + hash = "sha256-JLJKaJmztputIon9JkKzpm3Ch60iwm4Imh9p42crYzA="; 23 + }; 24 + 25 + sourceRoot = "${src.name}/bobcat"; 26 + 27 + postPatch = '' 28 + substituteInPlace INSTALL.im \ 29 + --replace "/usr" "$out" 30 + sed -i "6i #include <cstdint>" logbuf/logbuf 31 + patchShebangs . 32 + ''; 33 + 34 + strictDeps = true; 35 + 36 + nativeBuildInputs = [ 37 + icmake 38 + yodl 39 + ]; 40 + 41 + buildInputs = [ 42 + libmilter 43 + libX11 44 + openssl 45 + readline 46 + util-linux 47 + ]; 48 + 49 + buildPhase = '' 50 + runHook preBuild 51 + 52 + ./build libraries all 53 + ./build man 54 + 55 + runHook postBuild 56 + ''; 57 + 58 + installPhase = '' 59 + runHook preBuild 60 + 61 + ./build install x 62 + 63 + runHook postBuild 64 + ''; 65 + 66 + meta = with lib; { 67 + description = "Brokken's Own Base Classes And Templates"; 68 + homepage = "https://fbb-git.gitlab.io/bobcat/"; 69 + license = licenses.gpl3Only; 70 + platforms = platforms.linux; 71 + }; 72 + }
+3 -3
pkgs/by-name/na/namespace-cli/package.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "namespace-cli"; 8 - version = "0.0.328"; 8 + version = "0.0.332"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "namespacelabs"; 12 12 repo = "foundation"; 13 13 rev = "v${version}"; 14 - hash = "sha256-M6hX+muUC4v7Nmu2N8cONCLPJc6pVv6UJ1WO/uSDYnM="; 14 + hash = "sha256-6pTL3mvW8O3vly1a+LUTMBnD5D907CfQIqDwTnUqT1s="; 15 15 }; 16 16 17 - vendorHash = "sha256-AVbRqgk5UldpaqyEmdYDpwzaZEo5r+M3Kwxb3Sh1jLQ="; 17 + vendorHash = "sha256-DcGp/5Ohk9gbviA31a1FTu/xglLjrz2S50A5DBAE+lc="; 18 18 19 19 subPackages = ["cmd/nsc" "cmd/ns" "cmd/docker-credential-nsc"]; 20 20
+2 -2
pkgs/by-name/ni/nimlsp/package.nix
··· 2 2 3 3 buildNimPackage (finalAttrs: { 4 4 pname = "nimlsp"; 5 - version = "0.4.4"; 5 + version = "0.4.6"; 6 6 7 7 requiredNimVersion = 1; 8 8 ··· 10 10 owner = "PMunch"; 11 11 repo = "nimlsp"; 12 12 rev = "v${finalAttrs.version}"; 13 - sha256 = "sha256-Z67iKlL+dnRbxdFt/n/fsUcb2wpZwzPpL/G29jfCaMY="; 13 + hash = "sha256-MCtpCx8jMQp0VXuMowh69d1DQreU5cDftBf0lww7PUM="; 14 14 }; 15 15 16 16 lockFile = ./lock.json;
+69
pkgs/by-name/pr/prowler/package.nix
··· 1 + { lib 2 + , python3 3 + , fetchFromGitHub 4 + }: 5 + 6 + python3.pkgs.buildPythonApplication rec { 7 + pname = "prowler"; 8 + version = "3.12.1"; 9 + pyproject = true; 10 + 11 + src = fetchFromGitHub { 12 + owner = "prowler-cloud"; 13 + repo = "prowler"; 14 + rev = "refs/tags/${version}"; 15 + hash = "sha256-QauDqeCa499AcZurGjn2Yv4GH04F/pahAH2ms7gAca4="; 16 + }; 17 + 18 + pythonRelaxDeps = [ 19 + "azure-mgmt-security" 20 + "boto3" 21 + "botocore" 22 + "google-api-python-client" 23 + "slack-sdk" 24 + ]; 25 + 26 + nativeBuildInputs = with python3.pkgs; [ 27 + poetry-core 28 + pythonRelaxDepsHook 29 + ]; 30 + 31 + propagatedBuildInputs = with python3.pkgs; [ 32 + alive-progress 33 + awsipranges 34 + azure-identity 35 + azure-mgmt-authorization 36 + azure-mgmt-security 37 + azure-mgmt-sql 38 + azure-mgmt-storage 39 + azure-mgmt-subscription 40 + azure-storage-blob 41 + boto3 42 + botocore 43 + colorama 44 + detect-secrets 45 + google-api-python-client 46 + google-auth-httplib2 47 + jsonschema 48 + msgraph-core 49 + msrestazure 50 + pydantic_1 51 + schema 52 + shodan 53 + slack-sdk 54 + tabulate 55 + ]; 56 + 57 + pythonImportsCheck = [ 58 + "prowler" 59 + ]; 60 + 61 + meta = with lib; { 62 + description = "Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments"; 63 + homepage = "https://github.com/prowler-cloud/prowler"; 64 + changelog = "https://github.com/prowler-cloud/prowler/releases/tag/${version}"; 65 + license = licenses.asl20; 66 + maintainers = with maintainers; [ fab ]; 67 + mainProgram = "prowler"; 68 + }; 69 + }
+12
pkgs/by-name/sn/snicat/deps.nix
··· 1 + [ 2 + { 3 + goPackagePath = "github.com/therootcompany/sclient"; 4 + fetch = { 5 + type = "FromGitHub"; 6 + owner = "therootcompany"; 7 + repo = "sclient"; 8 + rev = "v1.5.0"; 9 + sha256 = "sha256-NAFTOx2sm92K+d746Z5UpB1HGsJI6cJgmh+YTyVkJ0w="; 10 + }; 11 + } 12 + ]
+45
pkgs/by-name/sn/snicat/package.nix
··· 1 + { lib 2 + , stdenv 3 + , buildGoPackage 4 + , fetchFromGitHub 5 + }: 6 + buildGoPackage rec { 7 + pname = "snicat"; 8 + version = "0.0.1"; 9 + 10 + src = fetchFromGitHub { 11 + owner = "CTFd"; 12 + repo = "snicat"; 13 + rev = version; 14 + hash = "sha256-fFlTBOz127le2Y7F9KKhbcldcyFEpAU5QiJ4VCAPs9Y="; 15 + }; 16 + 17 + patchPhase = '' 18 + runHook prePatch 19 + 20 + substituteInPlace snicat.go \ 21 + --replace-warn "v0.0.0" "v${version}" 22 + 23 + runHook postPatch 24 + ''; 25 + 26 + goPackagePath = "github.com/CTFd/snicat"; 27 + 28 + goDeps = ./deps.nix; 29 + 30 + installPhase = '' 31 + runHook preInstall 32 + 33 + install -Dm555 go/bin/snicat $out/bin/sc 34 + 35 + runHook postInstall 36 + ''; 37 + 38 + meta = with lib; { 39 + description = "TLS & SNI aware netcat"; 40 + homepage = "https://github.com/CTFd/snicat"; 41 + license = licenses.asl20; 42 + mainProgram = "sc"; 43 + maintainers = with maintainers; [ felixalbrigtsen ]; 44 + }; 45 + }
+2 -2
pkgs/by-name/ta/tailscale-nginx-auth/package.nix
··· 1 1 { lib, stdenv, buildGoModule, fetchFromGitHub }: 2 2 3 3 let 4 - version = "1.58.0"; 4 + version = "1.58.2"; 5 5 in 6 6 buildGoModule { 7 7 pname = "tailscale-nginx-auth"; ··· 11 11 owner = "tailscale"; 12 12 repo = "tailscale"; 13 13 rev = "v${version}"; 14 - hash = "sha256-ue1opjT8wkL+hYzMxU/GtOrJd3/KPSOptU8A8nklacY="; 14 + hash = "sha256-FiFFfUtse0CKR4XJ82HEjpZNxCaa4FnwSJfEzJ5kZgk="; 15 15 }; 16 16 vendorHash = "sha256-BK1zugKGtx2RpWHDvFZaFqz/YdoewsG8SscGt25uwtQ="; 17 17
+2 -1
pkgs/development/gnuradio-modules/ais/default.nix
··· 14 14 , icu 15 15 , gnuradio 16 16 , thrift 17 + , gnuradioAtLeast 17 18 }: 18 19 19 20 mkDerivation rec { ··· 25 26 rev = "2162103226f3dae43c8c2ab23b79483b84346665"; 26 27 sha256 = "1vackka34722d8pcspfwj0j6gc9ic7dqq64sgkrpjm94sh3bmb0b"; 27 28 }; 28 - disabledForGRafter = "3.9"; 29 + disabled = gnuradioAtLeast "3.9"; 29 30 30 31 nativeBuildInputs = [ 31 32 cmake
+3 -2
pkgs/development/gnuradio-modules/grnet/default.nix
··· 15 15 , libpcap 16 16 , icu 17 17 , thrift 18 + , gnuradioAtLeast 18 19 }: 19 20 20 21 let ··· 53 54 pname = "gr-grnet"; 54 55 version = version.name; 55 56 inherit src; 56 - disabledForGRafter = "3.10"; 57 + disabled = gnuradioAtLeast "3.10"; 57 58 58 59 patches = [ 59 60 # Use cross platform struct ip instead of iphdr ··· 73 74 gmp 74 75 libpcap 75 76 icu 76 - ] ++ (if lib.versionAtLeast gnuradio.versionAttr.major "3.9" then with python.pkgs; [ 77 + ] ++ (if gnuradioAtLeast "3.9" then with python.pkgs; [ 77 78 pybind11 78 79 numpy 79 80 ] else [
+2 -1
pkgs/development/gnuradio-modules/gsm/default.nix
··· 10 10 , python 11 11 , libosmocore 12 12 , osmosdr 13 + , gnuradioAtLeast 13 14 }: 14 15 15 16 mkDerivation { ··· 21 22 rev = "3ca05e6914ef29eb536da5dbec323701fbc2050d"; 22 23 sha256 = "13nnq927kpf91iqccr8db9ripy5czjl5jiyivizn6bia0bam2pvx"; 23 24 }; 24 - disabledForGRafter = "3.8"; 25 + disabled = gnuradioAtLeast "3.8"; 25 26 26 27 nativeBuildInputs = [ 27 28 cmake
+2 -1
pkgs/development/gnuradio-modules/limesdr/default.nix
··· 14 14 , gmp 15 15 , icu 16 16 , limesuite 17 + , gnuradioAtLeast 17 18 }: 18 19 19 20 let ··· 33 34 in mkDerivation { 34 35 pname = "gr-limesdr"; 35 36 inherit version src; 36 - disabledForGRafter = "3.9"; 37 + disabled = gnuradioAtLeast "3.9"; 37 38 38 39 nativeBuildInputs = [ 39 40 cmake
+8 -2
pkgs/development/gnuradio-modules/mkDerivation.nix
··· 7 7 args: 8 8 9 9 # Check if it's supposed to not get built for the current gnuradio version 10 - if (builtins.hasAttr "disabledForGRafter" args) && 11 - (lib.versionAtLeast unwrapped.versionAttr.major args.disabledForGRafter) then 10 + if (builtins.hasAttr "disabled" args) && args.disabled then 12 11 let name = args.name or "${args.pname}"; in 13 12 throw "Package ${name} is incompatible with GNURadio ${unwrapped.versionAttr.major}" 13 + else 14 + 15 + if builtins.hasAttr "disabledForGRafter" args then 16 + throw '' 17 + `disabledForGRafter` is superseded by `disabled`. 18 + Use `disabled = gnuradioAtLeast "${unwrapped.versionAttr.major}";` instead. 19 + '' 14 20 else 15 21 16 22 let
+2 -1
pkgs/development/gnuradio-modules/nacl/default.nix
··· 9 9 , logLib 10 10 , python 11 11 , libsodium 12 + , gnuradioAtLeast 12 13 }: 13 14 14 15 mkDerivation { ··· 20 21 rev = "15276bb0fcabf5fe4de4e58df3d579b5be0e9765"; 21 22 sha256 = "018np0qlk61l7mlv3xxx5cj1rax8f1vqrsrch3higsl25yydbv7v"; 22 23 }; 23 - disabledForGRafter = "3.8"; 24 + disabled = gnuradioAtLeast "3.8"; 24 25 25 26 nativeBuildInputs = [ 26 27 cmake
+2 -1
pkgs/development/gnuradio-modules/osmosdr/default.nix
··· 22 22 , libbladeRF 23 23 , rtl-sdr 24 24 , soapysdr-with-plugins 25 + , gnuradioAtLeast 25 26 }: 26 27 27 28 let ··· 44 45 in mkDerivation { 45 46 pname = "gr-osmosdr"; 46 47 inherit version src; 47 - disabledForGRafter = "3.11"; 48 + disabled = gnuradioAtLeast "3.11"; 48 49 49 50 outputs = [ "out" "dev" ]; 50 51
+2 -1
pkgs/development/gnuradio-modules/rds/default.nix
··· 12 12 , boost 13 13 , gmp 14 14 , icu 15 + , gnuradioAtLeast 15 16 }: 16 17 17 18 let ··· 33 34 in mkDerivation { 34 35 pname = "gr-rds"; 35 36 inherit version src; 36 - disabledForGRafter = "3.9"; 37 + disabled = gnuradioAtLeast "3.9"; 37 38 38 39 buildInputs = [ 39 40 logLib
+32 -56
pkgs/development/interpreters/j/default.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , fetchFromGitHub 4 - , bc 5 - , libedit 6 - , readline 7 - , avxSupport ? stdenv.hostPlatform.avxSupport 4 + , which 5 + , gmp 6 + , avx2Support ? stdenv.hostPlatform.avx2Support 8 7 }: 9 8 10 9 stdenv.mkDerivation rec { 11 10 pname = "j"; 12 - version = "904-beta-c"; 11 + version = "9.5.1"; 13 12 14 13 src = fetchFromGitHub { 15 - name = "${pname}-source"; 16 14 owner = "jsoftware"; 17 15 repo = "jsource"; 18 - rev = "j${version}"; 19 - hash = "sha256-MzEO/saHEBl1JwVlFC6P2UKm9RZnV7KVrNd9h4cPV/w="; 16 + rev = "${version}"; 17 + hash = "sha256-QRQhE8138+zaGQOdq9xUOrifkVIprzbJWbmMK+WhEOU="; 20 18 }; 21 19 22 - buildInputs = [ 23 - readline 24 - libedit 25 - bc 26 - ]; 20 + nativeBuildInputs = [ which ]; 21 + buildInputs = [ gmp ]; 27 22 28 23 patches = [ 29 24 ./fix-install-path.patch 30 25 ]; 31 26 27 + enableParallelBuilding = true; 28 + 32 29 dontConfigure = true; 33 30 34 - # emulating build_all.sh configuration variables 31 + # Emulate jplatform64.sh configuration variables 35 32 jplatform = 36 33 if stdenv.isDarwin then "darwin" 37 34 else if stdenv.hostPlatform.isAarch then "raspberry" ··· 41 38 j64x = 42 39 if stdenv.is32bit then "j32" 43 40 else if stdenv.isx86_64 then 44 - if (stdenv.isLinux && avxSupport) then "j64avx" else "j64" 41 + if stdenv.isLinux && avx2Support then "j64avx2" else "j64" 45 42 else if stdenv.isAarch64 then 46 43 if stdenv.isDarwin then "j64arm" else "j64" 47 44 else "unsupported"; 48 45 46 + env.NIX_LDFLAGS = "-lgmp"; 47 + 49 48 buildPhase = '' 50 49 runHook preBuild 51 - 52 - export SRCDIR=$(pwd) 53 - export HOME=$TMPDIR 54 - export JLIB=$SRCDIR/jlibrary 55 - export CC=cc 56 - 57 - cd make2 58 - 59 - patchShebangs . 60 - 61 - j64x="${j64x}" jplatform="${jplatform}" ./build_all.sh 62 - 63 - cp -v $SRCDIR/bin/${jplatform}/${j64x}/* "$JLIB/bin" 64 - 50 + MAKEFLAGS+=" ''${enableParallelBuilding:+-j$NIX_BUILD_CORES}" \ 51 + jplatform=${jplatform} j64x=${j64x} make2/build_all.sh 52 + cp -v bin/${jplatform}/${j64x}/* jlibrary/bin/ 65 53 runHook postBuild 66 - ''; 67 - 68 - doCheck = true; 69 - 70 - checkPhase = '' 71 - runHook preCheck 72 - 73 - echo "Smoke test" 74 - echo 'i. 10' | $JLIB/bin/jconsole | fgrep "0 1 2 3 4 5 6 7 8 9" 75 - 76 - # Now run the real tests 77 - pushd $SRCDIR/test 78 - for f in *.ijs 79 - do 80 - echo -n "test $f: " 81 - $JLIB/bin/jconsole < $f > /dev/null || echo FAIL && echo PASS 82 - done 83 - popd 84 - 85 - runHook postCheck 86 54 ''; 87 55 88 56 installPhase = '' 89 57 runHook preInstall 58 + mkdir -p $out/share/j 59 + cp -r jlibrary/{addons,system} $out/share/j/ 60 + cp -r jlibrary/bin $out/ 61 + runHook postInstall 62 + ''; 90 63 91 - mkdir -p "$out/share/j/" 92 - cp -r $JLIB/{addons,system} "$out/share/j" 93 - cp -r $JLIB/bin "$out" 64 + doInstallCheck = false; # The "gregex" test fails due to not finding PCRE2 94 65 95 - runHook postInstall 66 + installCheckPhase = '' 67 + runHook preInstallCheck 68 + HOME="$TMPDIR" $out/bin/jconsole -lib $out/bin/libj* script/testga.ijs 69 + runHook postInstallCheck 96 70 ''; 97 71 98 72 meta = with lib; { 99 - homepage = "http://jsoftware.com/"; 73 + homepage = "https://jsoftware.com/"; 100 74 description = "J programming language, an ASCII-based APL successor"; 101 75 longDescription = '' 102 76 J is a high-level, general-purpose programming language that is ··· 104 78 of data. It is a powerful tool for developing algorithms and exploring 105 79 problems that are not already well understood. 106 80 ''; 107 - license = licenses.gpl3Plus; 81 + license = licenses.gpl3Only; 108 82 maintainers = with maintainers; [ raskin synthetica AndersonTorres ]; 109 - platforms = with platforms; unix; 83 + broken = stdenv.isDarwin; 84 + platforms = platforms.all; 85 + mainProgram = "jconsole"; 110 86 }; 111 87 }
-44
pkgs/development/libraries/bobcat/default.nix
··· 1 - { lib, stdenv, fetchFromGitLab, icmake 2 - , libmilter, libX11, openssl, readline 3 - , util-linux, yodl }: 4 - 5 - stdenv.mkDerivation rec { 6 - pname = "bobcat"; 7 - version = "5.11.01"; 8 - 9 - src = fetchFromGitLab { 10 - sha256 = "sha256-JLJKaJmztputIon9JkKzpm3Ch60iwm4Imh9p42crYzA="; 11 - domain = "gitlab.com"; 12 - rev = version; 13 - repo = "bobcat"; 14 - owner = "fbb-git"; 15 - }; 16 - 17 - buildInputs = [ libmilter libX11 openssl readline util-linux ]; 18 - nativeBuildInputs = [ icmake yodl ]; 19 - 20 - setSourceRoot = '' 21 - sourceRoot=$(echo */bobcat) 22 - ''; 23 - 24 - postPatch = '' 25 - substituteInPlace INSTALL.im --replace /usr $out 26 - patchShebangs . 27 - ''; 28 - 29 - buildPhase = '' 30 - ./build libraries all 31 - ./build man 32 - ''; 33 - 34 - installPhase = '' 35 - ./build install x 36 - ''; 37 - 38 - meta = with lib; { 39 - description = "Brokken's Own Base Classes And Templates"; 40 - homepage = "https://fbb-git.gitlab.io/bobcat/"; 41 - license = licenses.gpl3; 42 - platforms = platforms.linux; 43 - }; 44 - }
+15
pkgs/development/libraries/libhwy/default.nix
··· 4 4 , ninja 5 5 , gtest 6 6 , fetchFromGitHub 7 + , fetchpatch 7 8 }: 8 9 9 10 stdenv.mkDerivation rec { ··· 16 17 rev = version; 17 18 hash = "sha256-Z+mAR9nSAbCskUvo6oK79Yd85bu0HtI2aR5THS1EozM="; 18 19 }; 20 + 21 + patches = lib.optional stdenv.hostPlatform.isRiscV 22 + # Adds CMake option HWY_CMAKE_RVV 23 + # https://github.com/google/highway/pull/1743 24 + (fetchpatch { 25 + name = "libhwy-add-rvv-optout.patch"; 26 + url = "https://github.com/google/highway/commit/5d58d233fbcec0c6a39df8186a877329147324b3.patch"; 27 + hash = "sha256-ileSNYddOt1F5rooRB0fXT20WkVlnG+gP5w7qJdBuww="; 28 + }); 19 29 20 30 nativeBuildInputs = [ cmake ninja ]; 21 31 ··· 43 53 # HwyMathTestGroup/HwyMathTest.TestAllAtanh/EMU128 44 54 # HwyMathTestGroup/HwyMathTest.TestAllLog1p/EMU128 45 55 "-DHWY_CMAKE_SSE2=ON" 56 + ] ++ lib.optionals stdenv.hostPlatform.isRiscV [ 57 + # Runtime dispatch is not implemented https://github.com/google/highway/issues/838 58 + # so tests (and likely normal operation) fail with SIGILL on processors without V. 59 + # Until the issue is resolved, we disable RVV completely. 60 + "-DHWY_CMAKE_RVV=OFF" 46 61 ]; 47 62 48 63 # hydra's darwin machines run into https://github.com/libjxl/libjxl/issues/408
+6
pkgs/development/libraries/maplibre-gl-native/default.nix
··· 2 2 , mkDerivation 3 3 , fetchFromGitHub 4 4 , fetchpatch 5 + , fetchpatch2 5 6 , cmake 6 7 , pkg-config 7 8 , qtbase ··· 29 30 name = "skip-license-check.patch"; 30 31 url = "https://git.alpinelinux.org/aports/plain/testing/mapbox-gl-native/0002-skip-license-check.patch?id=6751a93dca26b0b3ceec9eb151272253a2fe497e"; 31 32 sha256 = "1yybwzxbvn0lqb1br1fyg7763p2h117s6mkmywkl4l7qg9daa7ba"; 33 + }) 34 + (fetchpatch2 { 35 + name = "cstdint.patch"; 36 + url = "https://git.alpinelinux.org/aports/plain/community/maplibre-gl-native/cstdint.patch?id=ae8edc6b02df388ef37a69c12a5df25dd8550238"; 37 + hash = "sha256-o7wT/rk5vgwxEutAyIEAxwfKNxCoBtkhVcLjc7uTsYc="; 32 38 }) 33 39 ]; 34 40
+2 -2
pkgs/development/libraries/protobuf/25.nix
··· 1 1 { callPackage, ... } @ args: 2 2 3 3 callPackage ./generic.nix ({ 4 - version = "25.1"; 5 - hash = "sha256-w6556kxftVZ154LrZB+jv9qK+QmMiUOGj6EcNwiV+yo="; 4 + version = "25.2"; 5 + hash = "sha256-Bw7xOgcGLshFppH4qD8E48D8v21ZJRaRkK19LPSATMg="; 6 6 } // args)
+1 -2
pkgs/development/ocaml-modules/lambdapi/default.nix
··· 19 19 pname = "lambdapi"; 20 20 version = "2.3.1"; 21 21 22 - minimalOCamlVersion = "4.08"; 23 - duneVersion = "3"; 22 + minimalOCamlVersion = "4.12"; 24 23 25 24 src = fetchurl { 26 25 url = "https://github.com/Deducteam/lambdapi/releases/download/${version}/lambdapi-${version}.tbz";
+4 -3
pkgs/development/ocaml-modules/tiny_httpd/default.nix
··· 5 5 6 6 buildDunePackage rec { 7 7 pname = "tiny_httpd"; 8 - version = "0.12"; 8 + version = "0.16"; 9 9 10 - minimalOCamlVersion = "4.04"; 10 + minimalOCamlVersion = "4.08"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "c-cube"; 14 14 repo = pname; 15 15 rev = "v${version}"; 16 - sha256 = "sha256:1z9hzc0ib7pg9fsjmpggjqwrnip57izr2v0na7vc7s25lxsiag6a"; 16 + sha256 = "sha256-9L4WCduQNj5Jd/u3SozuXiGTkgojwfGIP5KgQmnWgQw="; 17 17 }; 18 18 19 19 buildInputs = [ result ]; ··· 24 24 inherit (src.meta) homepage; 25 25 license = lib.licenses.mit; 26 26 maintainers = [ lib.maintainers.vbgl ]; 27 + mainProgram = "http_of_dir"; 27 28 }; 28 29 }
+14 -5
pkgs/development/python-modules/alive-progress/default.nix
··· 5 5 , fetchFromGitHub 6 6 , grapheme 7 7 , pytestCheckHook 8 + , pythonOlder 9 + , setuptools 8 10 }: 9 11 10 12 buildPythonPackage rec { 11 13 pname = "alive-progress"; 12 - version = "3.1.4"; 13 - format = "setuptools"; 14 + version = "3.1.5"; 15 + pyproject = true; 16 + 17 + disabled = pythonOlder "3.7"; 14 18 15 19 src = fetchFromGitHub { 16 20 owner = "rsalmei"; 17 - repo = pname; 18 - rev = "v${version}"; 19 - hash = "sha256-27PgxQ9nw8p5hfaSf/jPYG7419o3i8B8R09o93szSOk="; 21 + repo = "alive-progress"; 22 + rev = "refs/tags/v${version}"; 23 + hash = "sha256-yJhl0QrMHET9ISDc/D5AEQ7dTJkmcV2SWqy/xmG18uY="; 20 24 }; 25 + 26 + nativeBuildInputs = [ 27 + setuptools 28 + ]; 21 29 22 30 propagatedBuildInputs = [ 23 31 about-time ··· 36 44 meta = with lib; { 37 45 description = "A new kind of Progress Bar, with real-time throughput, ETA, and very cool animations"; 38 46 homepage = "https://github.com/rsalmei/alive-progress"; 47 + changelog = "https://github.com/rsalmei/alive-progress/blob/v${version}/CHANGELOG.md"; 39 48 license = licenses.mit; 40 49 maintainers = with maintainers; [ thiagokokada ]; 41 50 };
+3 -3
pkgs/development/python-modules/approvaltests/default.nix
··· 19 19 20 20 buildPythonPackage rec { 21 21 pname = "approvaltests"; 22 - version = "10.2.0"; 22 + version = "10.3.0"; 23 23 pyproject = true; 24 24 25 - disabled = pythonOlder "3.7"; 25 + disabled = pythonOlder "3.8"; 26 26 27 27 src = fetchFromGitHub { 28 28 owner = "approvals"; 29 29 repo = "ApprovalTests.Python"; 30 30 rev = "refs/tags/v${version}"; 31 - hash = "sha256-2NaqqgrHXJovoVExvbr0s86eRbcxy+DUrsdRH/vak3E="; 31 + hash = "sha256-1f0iTwLREF20Khkd4/xEfxXINJIpc4LfszsvCblS/yM="; 32 32 }; 33 33 34 34 nativeBuildInputs = [
+51
pkgs/development/python-modules/awsipranges/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , poetry-core 5 + , pyopenssl 6 + , pytestCheckHook 7 + , pythonOlder 8 + }: 9 + 10 + buildPythonPackage rec { 11 + pname = "awsipranges"; 12 + version = "0.3.3"; 13 + pyproject = true; 14 + 15 + disabled = pythonOlder "3.7"; 16 + 17 + src = fetchFromGitHub { 18 + owner = "aws-samples"; 19 + repo = "awsipranges"; 20 + rev = "refs/tags/${version}"; 21 + hash = "sha256-ve1+0zkDDUGswtQoXhfESMcBzoNgUutxEhz43HXL4H8="; 22 + }; 23 + 24 + nativeBuildInputs = [ 25 + poetry-core 26 + ]; 27 + 28 + nativeCheckInputs = [ 29 + pyopenssl 30 + pytestCheckHook 31 + ]; 32 + 33 + pythonImportsCheck = [ 34 + "awsipranges" 35 + ]; 36 + 37 + disabledTestPaths = [ 38 + # Tests require network access 39 + "tests/data/test_syntax_and_semantics.py" 40 + "tests/integration/test_package_apis.py" 41 + "tests/unit/test_data_loading.py" 42 + ]; 43 + 44 + meta = with lib; { 45 + description = "Module to work with the AWS IP address ranges"; 46 + homepage = "https://github.com/aws-samples/awsipranges"; 47 + changelog = "https://github.com/aws-samples/awsipranges/releases/tag/${version}"; 48 + license = licenses.asl20; 49 + maintainers = with maintainers; [ fab ]; 50 + }; 51 + }
+2 -2
pkgs/development/python-modules/awswrangler/default.nix
··· 25 25 26 26 buildPythonPackage rec { 27 27 pname = "awswrangler"; 28 - version = "3.5.1"; 28 + version = "3.5.2"; 29 29 format = "pyproject"; 30 30 31 31 disabled = pythonOlder "3.8"; ··· 34 34 owner = "aws"; 35 35 repo = "aws-sdk-pandas"; 36 36 rev = "refs/tags/${version}"; 37 - hash = "sha256-USHRs/NRCPACvVxsQyRF1yQsQefAXSTwdHJqQqKe6bQ="; 37 + hash = "sha256-lIEitS/pyOq4RjyUqPzfKOcNtAIWp14sQcLfQ1FwEoE="; 38 38 }; 39 39 40 40 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/google-ai-generativelanguage/default.nix
··· 15 15 16 16 buildPythonPackage rec { 17 17 pname = "google-ai-generativelanguage"; 18 - version = "0.4.0"; 18 + version = "0.5.0"; 19 19 format = "setuptools"; 20 20 21 21 disabled = pythonOlder "3.7"; 22 22 23 23 src = fetchPypi { 24 24 inherit pname version; 25 - hash = "sha256-yBmQZsCPdMTpEpB3gym7nzV7oepdb4LeK8DRBVK/T4w="; 25 + hash = "sha256-fF7pjNpfSeCnhbDUz+gVn+NKBQKdCEAVLzlRQUEpXX8="; 26 26 }; 27 27 28 28 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/mkdocs-swagger-ui-tag/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "mkdocs-swagger-ui-tag"; 14 - version = "0.6.7"; 14 + version = "0.6.8"; 15 15 format = "setuptools"; 16 16 17 17 disabled = pythonOlder "3.7"; ··· 20 20 owner = "Blueswen"; 21 21 repo = "mkdocs-swagger-ui-tag"; 22 22 rev = "refs/tags/v${version}"; 23 - hash = "sha256-lvE/mN56X2fx835GFNDYQc7ptxBYqwjrJ9Z6Flcvufg="; 23 + hash = "sha256-TV7V1PttzyLeVQ/Ag/tMV2aqtCys1mlYpj6i0x+ko/w="; 24 24 }; 25 25 26 26 propagatedBuildInputs = [
+4 -8
pkgs/development/python-modules/nibabel/default.nix
··· 20 20 21 21 buildPythonPackage rec { 22 22 pname = "nibabel"; 23 - version = "5.1.0"; 24 - format = "pyproject"; 23 + version = "5.2.0"; 24 + pyproject = true; 25 25 26 26 disabled = pythonOlder "3.8"; 27 27 28 28 src = fetchPypi { 29 29 inherit pname version; 30 - hash = "sha256-znPKXpVyCechmiI8tx93I1yd8qz00/J/hhujjpSBrFM="; 30 + hash = "sha256-Pfjxq5gdG9kvQzHVZVKNEmq5cX/b1M/mj0P80cK/P1I="; 31 31 }; 32 32 33 33 nativeBuildInputs = [ ··· 77 77 export PATH=$out/bin:$PATH 78 78 ''; 79 79 80 - disabledTests = [ 81 - # https://github.com/nipy/nibabel/issues/951 82 - "test_filenames" 83 - ]; 84 - 85 80 meta = with lib; { 86 81 homepage = "https://nipy.org/nibabel"; 82 + changelog = "https://github.com/nipy/nibabel/blob/${version}/Changelog"; 87 83 description = "Access a multitude of neuroimaging data formats"; 88 84 license = licenses.mit; 89 85 maintainers = with maintainers; [ ashgillman ];
+2 -2
pkgs/development/python-modules/pytrafikverket/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "pytrafikverket"; 12 - version = "0.3.9.2"; 12 + version = "0.3.10"; 13 13 pyproject = true; 14 14 15 15 disabled = pythonOlder "3.7"; 16 16 17 17 src = fetchPypi { 18 18 inherit pname version; 19 - hash = "sha256-NxxuyLnzJ8T2jaQ761O943rpBbNwp/F4PygyQULkXzw="; 19 + hash = "sha256-B3K9wDFj7uSgs6BsJUnD6r2JVcH7u7UrbVXUTMGqmQE="; 20 20 }; 21 21 22 22 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/reptor/default.nix
··· 32 32 33 33 buildPythonPackage rec { 34 34 pname = "reptor"; 35 - version = "0.8"; 35 + version = "0.9"; 36 36 pyproject = true; 37 37 38 38 disabled = pythonOlder "3.8"; ··· 41 41 owner = "Syslifters"; 42 42 repo = "reptor"; 43 43 rev = "refs/tags/${version}"; 44 - hash = "sha256-YnDAjbj3TTr+WajuW6Dq3f+fjeJxrWk7VNWKhh9O7Zw="; 44 + hash = "sha256-CjTedIl7ZkSFfKKhHmCadTd7zdz3gP7Q4uCscv5An38="; 45 45 }; 46 46 47 47 pythonRelaxDeps = true;
+3 -18
pkgs/development/python-modules/robotframework-seleniumlibrary/default.nix
··· 41 41 robotstatuschecker 42 42 ]; 43 43 44 - disabledTestPaths = [ 45 - # https://github.com/robotframework/SeleniumLibrary/issues/1804 46 - "utest/test/keywords/test_webdrivercache.py" 47 - ]; 48 - 49 - disabledTests = [ 50 - "test_create_opera_executable_path_not_set" 51 - "test_create_opera_executable_path_set" 52 - "test_create_opera_with_options" 53 - "test_create_opera_with_service_log_path_real_path" 54 - "test_get_executable_path" 55 - "test_get_ff_profile_instance_FirefoxProfile" 56 - "test_has_options" 57 - "test_importer" 58 - "test_log_file_with_index_exist" 59 - "test_opera" 60 - "test_single_method" 61 - ]; 44 + preCheck = '' 45 + mkdir utest/output_dir 46 + ''; 62 47 63 48 meta = with lib; { 64 49 changelog = "https://github.com/robotframework/SeleniumLibrary/blob/${src.rev}/docs/SeleniumLibrary-${version}.rst";
+1 -16
pkgs/development/python-modules/tables/default.nix
··· 1 1 { lib 2 2 , fetchPypi 3 - , fetchpatch 4 3 , buildPythonPackage 5 4 , pythonOlder 6 5 , blosc2 ··· 23 22 buildPythonPackage rec { 24 23 pname = "tables"; 25 24 version = "3.9.2"; 26 - pyproject = true; 25 + format = "setuptools"; 27 26 28 27 disabled = pythonOlder "3.8"; 29 28 ··· 31 30 inherit pname version; 32 31 hash = "sha256-1HAmPC5QxLfIY1oNmawf8vnnBMJNceX6M8RSnn0K2cM="; 33 32 }; 34 - 35 - patches = [ 36 - (fetchpatch { 37 - name = "numpy-1.25-compatibility.patch"; 38 - url = "https://github.com/PyTables/PyTables/commit/337792561e5924124efd20d6fea6bbbd2428b2aa.patch"; 39 - hash = "sha256-pz3A/jTPWXXlzr+Yl5PRUvdSAinebFsoExfek4RUHkc="; 40 - }) 41 - (fetchpatch { 42 - name = "numexpr-2.8.5-compatibility.patch"; 43 - url = "https://github.com/PyTables/PyTables/commit/1a235490ebe1a138da1139cfa19829b5f0a2af37.patch"; 44 - includes = [ "tables/tests/test_queries.py" ]; 45 - hash = "sha256-uMS+Z2Zcz68ILMQaBdIDMnCyasozCaCGOiGIyw0+Evc="; 46 - }) 47 - ]; 48 33 49 34 nativeBuildInputs = [ 50 35 blosc2
+2 -2
pkgs/development/python-modules/types-docutils/default.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "types-docutils"; 9 - version = "0.20.0.20240125"; 9 + version = "0.20.0.20240126"; 10 10 pyproject = true; 11 11 12 12 src = fetchPypi { 13 13 inherit pname version; 14 - hash = "sha256-r3YOMR2Jrz+PtiVD6FCZ1v2dwDttGjva9mlXNnXVitg="; 14 + hash = "sha256-zFp+7UY6CZH44K/7/een2JoxopbmhzLLOzHPLLRO6o0="; 15 15 }; 16 16 17 17 nativeBuildInputs = [
+2 -2
pkgs/development/tools/analysis/checkov/default.nix
··· 5 5 6 6 python3.pkgs.buildPythonApplication rec { 7 7 pname = "checkov"; 8 - version = "3.1.70"; 8 + version = "3.2.0"; 9 9 pyproject = true; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "bridgecrewio"; 13 13 repo = "checkov"; 14 14 rev = "refs/tags/${version}"; 15 - hash = "sha256-6HR6Hfv8dAo3/GT1OZQmH7yq4fY9Xi8SKkGUjG9914I="; 15 + hash = "sha256-mNmOU64UyvHSM7Jo9d4plgT1hcLM156CZk36iHDMZN8="; 16 16 }; 17 17 18 18 patches = [
+1 -1
pkgs/development/tools/analysis/frama-c/default.nix
··· 20 20 ppx_deriving_yojson 21 21 ppx_import 22 22 stdlib-shims 23 - why3 23 + why3.dev 24 24 re 25 25 result 26 26 seq
+3 -3
pkgs/development/tools/continuous-integration/woodpecker-plugin-git/default.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "woodpecker-plugin-git"; 10 - version = "2.4.0"; 10 + version = "2.5.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "woodpecker-ci"; 14 14 repo = "plugin-git"; 15 15 rev = "refs/tags/${version}"; 16 - hash = "sha256-9aK6c2uUBhTzBni6S4XwevdVRxswiMYGJKwmKOGHIbg="; 16 + hash = "sha256-vQcHEsOJFMbrt5KpoHB59g5gIxwXQuJpudhu2qbgCY8="; 17 17 }; 18 18 19 - vendorHash = "sha256-ol5k37gGFsyeEnGOVcJaerkIejShHyNCBu4RZ8WyHvU="; 19 + vendorHash = "sha256-nPeF6Z+d69o1JwCUlzVREx8DyIqokHIfTRC1/S5XG6A="; 20 20 21 21 CGO_ENABLED = "0"; 22 22
+2 -2
pkgs/development/tools/uftrace/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "uftrace"; 5 - version = "0.15.1"; 5 + version = "0.15.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "namhyung"; 9 9 repo = "uftrace"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-5P8CshSCK1Ugkg9+MJB8G31n4iyhZF0oVayouQU0CaA="; 11 + sha256 = "sha256-FfTt1S7X7FakKXWbmJJ1HMYcu/tG/UFknz8XmEPbPUo="; 12 12 }; 13 13 14 14 postUnpack = ''
+40 -30
pkgs/os-specific/linux/kernel/hardened/patches.json
··· 2 2 "4.19": { 3 3 "patch": { 4 4 "extra": "-hardened1", 5 - "name": "linux-hardened-4.19.305-hardened1.patch", 6 - "sha256": "1lrz04mxcp82qmfmwsahi5amv9j5j5qv7xjq9jcrycwcj0ljrfcv", 7 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.19.305-hardened1/linux-hardened-4.19.305-hardened1.patch" 5 + "name": "linux-hardened-4.19.306-hardened1.patch", 6 + "sha256": "0g38iy5vw9glqmqhmj5y8nnx8gbdj312yb14qnwcl21m78k63mxk", 7 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.19.306-hardened1/linux-hardened-4.19.306-hardened1.patch" 8 8 }, 9 - "sha256": "1s6srmhd3visqchshg566c7gq5wnxr3m74854kxksqhhfif450ns", 10 - "version": "4.19.305" 9 + "sha256": "06dy270xw4frnrc9p2qjh8chgp02fr5ll5g2b0lx9xqzlq7y86xr", 10 + "version": "4.19.306" 11 11 }, 12 12 "5.10": { 13 13 "patch": { 14 14 "extra": "-hardened1", 15 - "name": "linux-hardened-5.10.208-hardened1.patch", 16 - "sha256": "0aniccfyi81wwfzva3i2vxairnkdwrypislphf8r9wg49sya2z7f", 17 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.10.208-hardened1/linux-hardened-5.10.208-hardened1.patch" 15 + "name": "linux-hardened-5.10.209-hardened1.patch", 16 + "sha256": "1vccxrwi8a8fz3fcjxxqbkdbfjjhzwqpcibfg0nrydcix79ixgyw", 17 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.10.209-hardened1/linux-hardened-5.10.209-hardened1.patch" 18 18 }, 19 - "sha256": "0vpvy47cmcinhs76cjl2n81zrlhbqgpi4v29izn2hzsl15x189ch", 20 - "version": "5.10.208" 19 + "sha256": "1mc8rssk5aypgb58jz6i2bbflfr6qh1kgqpam0k8fqvwcjnjzqj4", 20 + "version": "5.10.209" 21 21 }, 22 22 "5.15": { 23 23 "patch": { 24 24 "extra": "-hardened1", 25 - "name": "linux-hardened-5.15.147-hardened1.patch", 26 - "sha256": "1z37g4gwxhdsbqh0yy7m9wlglayrmypsrdjgx0vk3shgvaiwx2il", 27 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.15.147-hardened1/linux-hardened-5.15.147-hardened1.patch" 25 + "name": "linux-hardened-5.15.148-hardened1.patch", 26 + "sha256": "0pryxvr058fisns01w52xsfbx4aqx2ssfk9n1r575lgywp6q03fj", 27 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.15.148-hardened1/linux-hardened-5.15.148-hardened1.patch" 28 28 }, 29 - "sha256": "1m7wznqiakarpar4a0nbwxql0hkvds0s79zx3r1xn0fj4mbfdhan", 30 - "version": "5.15.147" 29 + "sha256": "1n75lrck581mppx84cds1a1l5vj05cdkp8ahpry7dx6rgz4pb1f4", 30 + "version": "5.15.148" 31 31 }, 32 32 "5.4": { 33 33 "patch": { 34 34 "extra": "-hardened1", 35 - "name": "linux-hardened-5.4.267-hardened1.patch", 36 - "sha256": "12jyk0dmrs8kmmh8ca4s3jr2pk6m0izhm5yvncgjwff3xybzyj5p", 37 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.267-hardened1/linux-hardened-5.4.267-hardened1.patch" 35 + "name": "linux-hardened-5.4.268-hardened1.patch", 36 + "sha256": "1lz9i5iaa6pchnk1bw9dg85n82j9hvjdh8pb7vxjg05fxvwgn7jh", 37 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.268-hardened1/linux-hardened-5.4.268-hardened1.patch" 38 38 }, 39 - "sha256": "0hqw8ww7y9mjrh1wgdkiwk8llxpf4lxwmsmzxm8j4l615kpqvlj2", 40 - "version": "5.4.267" 39 + "sha256": "081695lgkdwlrp6gpp6pyflgh76zax1w52shys4s9zjnrfkarj5g", 40 + "version": "5.4.268" 41 41 }, 42 42 "6.1": { 43 43 "patch": { 44 44 "extra": "-hardened1", 45 - "name": "linux-hardened-6.1.74-hardened1.patch", 46 - "sha256": "0j7qbbf5s1khzbmsjh5i0nskj9nlw5224sz6zrvv5a1aw6bad976", 47 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/6.1.74-hardened1/linux-hardened-6.1.74-hardened1.patch" 45 + "name": "linux-hardened-6.1.75-hardened1.patch", 46 + "sha256": "157fl991y8fsllwa0ny851vij3418fcs4nng02qzkc1rqzj625dz", 47 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/6.1.75-hardened1/linux-hardened-6.1.75-hardened1.patch" 48 48 }, 49 - "sha256": "08i0pgmmdnrmlha6ncl6if39rqg44c9dqyggf0swxlmfkzbx3yxp", 50 - "version": "6.1.74" 49 + "sha256": "0mis14ll6xmhw71vfpw1aahi5z207qysha7x316fq4qc6c899lbc", 50 + "version": "6.1.75" 51 51 }, 52 52 "6.5": { 53 53 "patch": { ··· 62 62 "6.6": { 63 63 "patch": { 64 64 "extra": "-hardened1", 65 - "name": "linux-hardened-6.6.13-hardened1.patch", 66 - "sha256": "108cpr6nidjha98g0x05vsqmdidjb9ikx4ggxjric76c5dsddg2l", 67 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/6.6.13-hardened1/linux-hardened-6.6.13-hardened1.patch" 65 + "name": "linux-hardened-6.6.14-hardened1.patch", 66 + "sha256": "1r8aw6lb43fgayhdnk10hkllh8kanfww5xzfi5qzkbly28wr8abv", 67 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/6.6.14-hardened1/linux-hardened-6.6.14-hardened1.patch" 68 + }, 69 + "sha256": "110mz8fjlg1j9wnhhq2ik5alayhf61adajd8jqmcsqprncnnpsgv", 70 + "version": "6.6.14" 71 + }, 72 + "6.7": { 73 + "patch": { 74 + "extra": "-hardened1", 75 + "name": "linux-hardened-6.7.2-hardened1.patch", 76 + "sha256": "1mkmqf8fc3dg77an9fkqp41141m01x93rydfmdn5ys5336mix8pi", 77 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/6.7.2-hardened1/linux-hardened-6.7.2-hardened1.patch" 68 78 }, 69 - "sha256": "1g60hblf4mywq3rivkqmz2n7a9arinxwh4g4n4x4xb8ysiyrxf48", 70 - "version": "6.6.13" 79 + "sha256": "0wd6pxh7wy9bzjzwd0rdsdnghpr53qbs722fhg07bi19m8dy8kf3", 80 + "version": "6.7.2" 71 81 } 72 82 }
+2 -2
pkgs/os-specific/linux/rdma-core/default.nix
··· 15 15 16 16 stdenv.mkDerivation (finalAttrs: { 17 17 pname = "rdma-core"; 18 - version = "49.1"; 18 + version = "50.0"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "linux-rdma"; 22 22 repo = "rdma-core"; 23 23 rev = "v${finalAttrs.version}"; 24 - hash = "sha256-fAEHugGRlrn0rRazyeC649H4vc0V3dqTTSDAo1HY22A="; 24 + hash = "sha256-PJlbY7QR9b2eVaALpuq/67kRTc91HEhs9Wl7WXtSLmA="; 25 25 }; 26 26 27 27 strictDeps = true;
+2 -2
pkgs/servers/osmocom/osmo-pcu/default.nix
··· 13 13 14 14 stdenv.mkDerivation rec { 15 15 pname = "osmo-pcu"; 16 - version = "1.3.1"; 16 + version = "1.4.0"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "osmocom"; 20 20 repo = "osmo-pcu"; 21 21 rev = version; 22 - hash = "sha256-p5gBOHw/3NJ482EX5LcmaWkwz/ikcK7EEeio/puNTFo="; 22 + hash = "sha256-rE5/wtzABEd6OVSRVrBvIJuo/CSfK19nf7tm+QQzljY="; 23 23 }; 24 24 25 25 postPatch = ''
+4 -4
pkgs/servers/readarr/default.nix
··· 8 8 x86_64-darwin = "x64"; 9 9 }."${stdenv.hostPlatform.system}" or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 10 10 hash = { 11 - x64-linux_hash = "sha256-i5ZlLHTV44hia3Vkm8Ht0vEN5XWjd9KJ4xOVNxrNxVE="; 12 - arm64-linux_hash = "sha256-sX2Dn5/PfWdxh2qPDm2UbkqBIVpk+mb5CfuBwdPwloU="; 13 - x64-osx_hash = "sha256-pBw0MnzxQ+dmRKARKB/Flr4ILS37Y2TVgIkRkjZyITo="; 11 + x64-linux_hash = "sha256-Li8q1JY9e7NkNUMly+hCLAHPibqIdVO9Eijcsc0YKEc="; 12 + arm64-linux_hash = "sha256-kPZ5seqYzHjINzFzUbZm7L5Uh5saa+WDSwNpmcYnYX0="; 13 + x64-osx_hash = "sha256-R2WZAAJs/XG8C0DTvSEZ2c9ao78FTS9B7lieOKkUWRs="; 14 14 }."${arch}-${os}_hash"; 15 15 in stdenv.mkDerivation rec { 16 16 pname = "readarr"; 17 - version = "0.3.14.2358"; 17 + version = "0.3.17.2409"; 18 18 19 19 src = fetchurl { 20 20 url = "https://github.com/Readarr/Readarr/releases/download/v${version}/Readarr.develop.${version}.${os}-core-${arch}.tar.gz";
+22 -13
pkgs/tools/backup/tarsnapper/default.nix
··· 1 1 { lib 2 2 , python3Packages 3 3 , fetchFromGitHub 4 + , fetchpatch 4 5 , tarsnap 5 6 }: 6 7 7 8 python3Packages.buildPythonApplication rec { 8 9 pname = "tarsnapper"; 9 - version = "0.4"; 10 + version = "0.5"; 11 + pyproject = true; 10 12 11 13 src = fetchFromGitHub { 12 14 owner = "miracle2k"; 13 15 repo = pname; 14 16 rev = version; 15 - sha256 = "03db49188f4v1946c8mqqj30ah10x68hbg3a58js0syai32v12pm"; 17 + hash = "sha256-5i9eum9hbh6VFhvEIDq5Uapy6JtIbf9jZHhRYZVoC1w="; 16 18 }; 17 19 20 + patches = [ 21 + # Fix failing tests when default_deltas is None 22 + (fetchpatch { 23 + url = "https://github.com/miracle2k/tarsnapper/commit/2ee33ce748b9bb42d559cc2c0104115732cb4150.patch"; 24 + hash = "sha256-fEXGhzlfB+J5lw1pcsC5Ne7I8UMnDzwyyCx/zm15+fU="; 25 + }) 26 + ]; 27 + 28 + nativeBuildInputs = with python3Packages; [ 29 + pythonRelaxDepsHook 30 + setuptools 31 + ]; 32 + 18 33 propagatedBuildInputs = with python3Packages; [ 19 34 pyyaml 20 35 python-dateutil ··· 22 37 ]; 23 38 24 39 nativeCheckInputs = with python3Packages; [ 40 + pytestCheckHook 25 41 nose 26 42 ]; 27 43 28 - patches = [ 29 - # Remove standard module argparse from requirements 30 - ./remove-argparse.patch 31 - ]; 44 + # Remove standard module argparse from requirements 45 + pythonRemoveDeps = [ "argparse" ]; 32 46 33 47 makeWrapperArgs = [ "--prefix PATH : ${lib.makeBinPath [ tarsnap ]}" ]; 34 48 35 - checkPhase = '' 36 - runHook preCheck 37 - nosetests tests 38 - runHook postCheck 39 - ''; 40 - 41 49 pythonImportsCheck = [ "tarsnapper" ]; 42 50 43 51 meta = with lib; { 44 52 description = "Wrapper which expires backups using a gfs-scheme"; 45 53 homepage = "https://github.com/miracle2k/tarsnapper"; 46 54 license = licenses.bsd2; 47 - maintainers = with maintainers; [ ]; 55 + maintainers = with maintainers; [ gmacon ]; 56 + mainProgram = "tarsnapper"; 48 57 }; 49 58 }
-10
pkgs/tools/backup/tarsnapper/remove-argparse.patch
··· 1 - --- tarsnapper-0.4-src.org/setup.py 1980-01-02 00:00:00.000000000 +0000 2 - +++ tarsnapper-0.4-src/setup.py 2017-07-16 10:54:36.596499451 +0100 3 - @@ -45,6 +45,6 @@ 4 - url='https://github.com/miracle2k/tarsnapper', 5 - license='BSD', 6 - packages=['tarsnapper'], 7 - - install_requires = ['argparse>=1.1', 'pyyaml>=3.09', 'python-dateutil>=2.4.0', 'pexpect>=3.1'], 8 - + install_requires = ['pyyaml>=3.09', 'python-dateutil>=2.4.0', 'pexpect>=3.1'], 9 - **kw 10 - )
+2 -2
pkgs/tools/games/minecraft/mcaselector/default.nix
··· 7 7 8 8 stdenvNoCC.mkDerivation (finalAttrs: { 9 9 pname = "mcaselector"; 10 - version = "2.2.2"; 10 + version = "2.3"; 11 11 12 12 src = fetchurl { 13 13 url = "https://github.com/Querz/mcaselector/releases/download/${finalAttrs.version}/mcaselector-${finalAttrs.version}.jar"; 14 - hash = "sha256-tOSdzLFxvEJ9LXliwfosMkgcrQLsrW7qDS8vrgPzQoI="; 14 + hash = "sha256-8ivqTqgO6hvEgwnAfnPXuruFGS3s/wD/WKt+5Bg/5Z0="; 15 15 }; 16 16 17 17 dontUnpack = true;
+2 -2
pkgs/tools/misc/asdf-vm/default.nix
··· 37 37 ''; 38 38 in stdenv.mkDerivation rec { 39 39 pname = "asdf-vm"; 40 - version = "0.13.1"; 40 + version = "0.14.0"; 41 41 42 42 src = fetchFromGitHub { 43 43 owner = "asdf-vm"; 44 44 repo = "asdf"; 45 45 rev = "v${version}"; 46 - sha256 = "sha256-9Levs1Wr7Lohhvpy+1Xq3AYyf7+VsBalvAAA7qq6heI="; 46 + sha256 = "sha256-DmwKzW0oHjokMxj2RMT4iogurEMKeAcl7MWlPTOqMmg="; 47 47 }; 48 48 49 49 nativeBuildInputs = [
+3 -3
pkgs/tools/misc/mise/default.nix
··· 17 17 18 18 rustPlatform.buildRustPackage rec { 19 19 pname = "mise"; 20 - version = "2024.1.24"; 20 + version = "2024.1.30"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "jdx"; 24 24 repo = "mise"; 25 25 rev = "v${version}"; 26 - hash = "sha256-Lp1TGY6Ct4LHSsvhF/58NrO/whxiMOH1YjsBbGWDhh4="; 26 + hash = "sha256-1MvnxH+6xN7uQAhf2OEO+OjBISUSiTrYtfdulSe8Cxg="; 27 27 }; 28 28 29 - cargoHash = "sha256-sEnO8uKaPXFUMmIR0VJESQWITwxh68/+R4kqJYx/boA="; 29 + cargoHash = "sha256-Hm8cpj0tk5bQ4NBHPGf6Fwpwq6zGJEwfE6psDkenxCQ="; 30 30 31 31 nativeBuildInputs = [ installShellFiles pkg-config ]; 32 32 buildInputs = [ openssl ] ++ lib.optionals stdenv.isDarwin [ Security SystemConfiguration ];
+40 -63
pkgs/tools/networking/openvpn/default.nix
··· 2 2 , stdenv 3 3 , fetchurl 4 4 , pkg-config 5 - , iproute2 6 5 , libcap_ng 7 6 , libnl 8 7 , lz4 ··· 18 17 }: 19 18 20 19 let 21 - inherit (lib) versionOlder optional optionals optionalString; 20 + inherit (lib) optional optionals optionalString; 21 + in 22 + stdenv.mkDerivation (finalAttrs: { 23 + pname = "openvpn"; 24 + version = "2.6.8"; 22 25 23 - generic = { version, sha256, extraBuildInputs ? [ ] }: 24 - let 25 - withIpRoute = stdenv.isLinux && (versionOlder version "2.5.4"); 26 - in 27 - stdenv.mkDerivation 28 - rec { 29 - pname = "openvpn"; 30 - inherit version; 26 + src = fetchurl { 27 + url = "https://swupdate.openvpn.net/community/releases/openvpn-${finalAttrs.version}.tar.gz"; 28 + hash = "sha256-Xt4VZcim2IAQD38jUxen7p7qg9UFLbVUfxOp52r3gF0="; 29 + }; 31 30 32 - src = fetchurl { 33 - url = "https://swupdate.openvpn.net/community/releases/${pname}-${version}.tar.gz"; 34 - inherit sha256; 35 - }; 31 + nativeBuildInputs = [ pkg-config ]; 36 32 37 - nativeBuildInputs = [ pkg-config ]; 33 + buildInputs = [ lz4 lzo openssl ] 34 + ++ optionals stdenv.isLinux [ libcap_ng libnl pam ] 35 + ++ optional useSystemd systemd 36 + ++ optional pkcs11Support pkcs11helper; 38 37 39 - buildInputs = [ lz4 lzo ] 40 - ++ optionals stdenv.isLinux [ libcap_ng libnl pam ] 41 - ++ optional withIpRoute iproute2 42 - ++ optional useSystemd systemd 43 - ++ optional pkcs11Support pkcs11helper 44 - ++ extraBuildInputs; 38 + configureFlags = optional useSystemd "--enable-systemd" 39 + ++ optional pkcs11Support "--enable-pkcs11" 40 + ++ optional stdenv.isDarwin "--disable-plugin-auth-pam"; 45 41 46 - configureFlags = optionals withIpRoute [ 47 - "--enable-iproute2" 48 - "IPROUTE=${iproute2}/sbin/ip" 49 - ] 50 - ++ optional useSystemd "--enable-systemd" 51 - ++ optional pkcs11Support "--enable-pkcs11" 52 - ++ optional stdenv.isDarwin "--disable-plugin-auth-pam"; 42 + # We used to vendor the update-systemd-resolved script inside libexec, 43 + # but a separate package was made, that uses libexec/openvpn. Copy it 44 + # into libexec in case any consumers expect it to be there even though 45 + # they should use the update-systemd-resolved package instead. 46 + postInstall = '' 47 + mkdir -p $out/share/doc/openvpn/examples 48 + cp -r sample/sample-{config-files,keys,scripts}/ $out/share/doc/openvpn/examples 49 + '' + optionalString useSystemd '' 50 + install -Dm555 -t $out/libexec ${update-systemd-resolved}/libexec/openvpn/* 51 + ''; 53 52 54 - # We used to vendor the update-systemd-resolved script inside libexec, 55 - # but a separate package was made, that uses libexec/openvpn. Copy it 56 - # into libexec in case any consumers expect it to be there even though 57 - # they should use the update-systemd-resolved package instead. 58 - postInstall = '' 59 - mkdir -p $out/share/doc/openvpn/examples 60 - cp -r sample/sample-{config-files,keys,scripts}/ $out/share/doc/openvpn/examples 61 - '' + optionalString useSystemd '' 62 - install -Dm555 -t $out/libexec ${update-systemd-resolved}/libexec/openvpn/* 63 - ''; 53 + enableParallelBuilding = true; 64 54 65 - enableParallelBuilding = true; 55 + passthru.tests = { 56 + inherit (nixosTests) initrd-network-openvpn systemd-initrd-networkd-openvpn; 57 + }; 66 58 67 - meta = with lib; { 68 - description = "A robust and highly flexible tunneling application"; 69 - mainProgram = "openvpn"; 70 - downloadPage = "https://openvpn.net/community-downloads/"; 71 - homepage = "https://openvpn.net/"; 72 - license = licenses.gpl2Only; 73 - maintainers = with maintainers; [ viric peterhoeg ]; 74 - platforms = platforms.unix; 75 - }; 76 - }; 77 - 78 - in 79 - { 80 - openvpn = (generic { 81 - version = "2.6.8"; 82 - sha256 = "sha256-Xt4VZcim2IAQD38jUxen7p7qg9UFLbVUfxOp52r3gF0="; 83 - extraBuildInputs = [ openssl ]; 84 - }).overrideAttrs 85 - (_: { 86 - passthru.tests = { 87 - inherit (nixosTests) initrd-network-openvpn systemd-initrd-networkd-openvpn; 88 - }; 89 - }); 90 - } 59 + meta = with lib; { 60 + description = "A robust and highly flexible tunneling application"; 61 + downloadPage = "https://openvpn.net/community-downloads/"; 62 + homepage = "https://openvpn.net/"; 63 + license = licenses.gpl2Only; 64 + maintainers = with maintainers; [ viric peterhoeg ]; 65 + platforms = platforms.unix; 66 + }; 67 + })
+10 -5
pkgs/tools/security/tlsx/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "tlsx"; 8 - version = "1.1.5"; 8 + version = "1.1.6"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "projectdiscovery"; 12 - repo = pname; 13 - rev = "v${version}"; 14 - hash = "sha256-lS/D3p8Q6Zu3/XxwkC77fPS9cXVrUTkDPGd46Y+krbo="; 12 + repo = "tlsx"; 13 + rev = "refs/tags/v${version}"; 14 + hash = "sha256-FF5/STjf8joyJM6qPds1wFeRfncSamy/wWfNRZcG5kc="; 15 15 }; 16 16 17 - vendorHash = "sha256-aEsq9LwU/ZWvuZGGzZ4NEvMWFk1m/Sr9LOXiCA/X388="; 17 + vendorHash = "sha256-sJravmpvwOSZiVNWFUTLlTA4xk6drItDj4JzR8JNrOo="; 18 + 19 + ldflags = [ 20 + "-s" 21 + "-w" 22 + ]; 18 23 19 24 # Tests require network access 20 25 doCheck = false;
+7 -8
pkgs/top-level/all-packages.nix
··· 5197 5197 5198 5198 easyabc = callPackage ../applications/audio/easyabc { }; 5199 5199 5200 - easycrypt = callPackage ../applications/science/logic/easycrypt { }; 5200 + easycrypt = callPackage ../applications/science/logic/easycrypt { 5201 + why3 = pkgs.why3.override { ideSupport = false; }; 5202 + }; 5201 5203 5202 5204 easycrypt-runtest = callPackage ../applications/science/logic/easycrypt/runtest.nix { }; 5203 5205 ··· 11670 11672 11671 11673 opentsdb = callPackage ../tools/misc/opentsdb { }; 11672 11674 11673 - inherit (callPackages ../tools/networking/openvpn {}) 11674 - openvpn; 11675 + openvpn = callPackage ../tools/networking/openvpn {}; 11675 11676 11676 11677 openvpn3 = callPackage ../tools/networking/openvpn3 { }; 11677 11678 ··· 17634 17635 17635 17636 ivy = callPackage ../development/interpreters/ivy { }; 17636 17637 17637 - j = callPackage ../development/interpreters/j { 17638 - stdenv = clangStdenv; 17639 - }; 17638 + j = callPackage ../development/interpreters/j { }; 17640 17639 17641 17640 jacinda = haskell.lib.compose.justStaticExecutables haskellPackages.jacinda; 17642 17641 ··· 20643 20642 then pkgs."androidndkPkgs_${stdenv.hostPlatform.ndkVer}".libraries 20644 20643 else callPackage ../os-specific/linux/bionic-prebuilt { }; 20645 20644 20646 - 20647 - bobcat = pin-to-gcc12-if-gcc13 (callPackage ../development/libraries/bobcat { }); 20648 20645 20649 20646 boehmgc = callPackage ../development/libraries/boehm-gc { }; 20650 20647 ··· 28105 28102 linux_6_5_hardened = linuxKernel.kernels.linux_6_5_hardened; 28106 28103 linuxPackages_6_6_hardened = linuxKernel.packages.linux_6_6_hardened; 28107 28104 linux_6_6_hardened = linuxKernel.kernels.linux_6_6_hardened; 28105 + linuxPackages_6_7_hardened = linuxKernel.packages.linux_6_7_hardened; 28106 + linux_6_7_hardened = linuxKernel.kernels.linux_6_7_hardened; 28108 28107 28109 28108 # GNU Linux-libre kernels 28110 28109 linuxPackages-libre = linuxKernel.packages.linux_libre;
+1
pkgs/top-level/gnuradio-packages.nix
··· 24 24 ; 25 25 inherit mkDerivationWith mkDerivation; 26 26 inherit gnuradio; 27 + inherit (gnuradio) gnuradioOlder gnuradioAtLeast; 27 28 } // lib.optionalAttrs (gnuradio.hasFeature "gr-uhd") { 28 29 inherit (gnuradio) uhd; 29 30 });
+2
pkgs/top-level/linux-kernels.nix
··· 260 260 linux_6_1_hardened = hardenedKernelFor kernels.linux_6_1 { }; 261 261 linux_6_5_hardened = hardenedKernelFor kernels.linux_6_5 { }; 262 262 linux_6_6_hardened = hardenedKernelFor kernels.linux_6_6 { }; 263 + linux_6_7_hardened = hardenedKernelFor kernels.linux_6_7 { }; 263 264 264 265 } // lib.optionalAttrs config.allowAliases { 265 266 linux_4_9 = throw "linux 4.9 was removed because it will reach its end of life within 22.11"; ··· 635 636 linux_6_1_hardened = recurseIntoAttrs (packagesFor kernels.linux_6_1_hardened); 636 637 linux_6_5_hardened = recurseIntoAttrs (packagesFor kernels.linux_6_5_hardened); 637 638 linux_6_6_hardened = recurseIntoAttrs (packagesFor kernels.linux_6_6_hardened); 639 + linux_6_7_hardened = recurseIntoAttrs (packagesFor kernels.linux_6_7_hardened); 638 640 639 641 linux_zen = recurseIntoAttrs (packagesFor kernels.linux_zen); 640 642 linux_lqx = recurseIntoAttrs (packagesFor kernels.linux_lqx);
+3 -1
pkgs/top-level/ocaml-packages.nix
··· 922 922 923 923 lambda-term = callPackage ../development/ocaml-modules/lambda-term { }; 924 924 925 - lambdapi = callPackage ../development/ocaml-modules/lambdapi { }; 925 + lambdapi = callPackage ../development/ocaml-modules/lambdapi { 926 + why3 = pkgs.why3.override { ocamlPackages = self; }; 927 + }; 926 928 927 929 lambdasoup = callPackage ../development/ocaml-modules/lambdasoup { }; 928 930
+2
pkgs/top-level/python-packages.nix
··· 1016 1016 1017 1017 awsiotpythonsdk = callPackage ../development/python-modules/awsiotpythonsdk { }; 1018 1018 1019 + awsipranges = callPackage ../development/python-modules/awsipranges { }; 1020 + 1019 1021 awslambdaric = callPackage ../development/python-modules/awslambdaric { }; 1020 1022 1021 1023 awswrangler = callPackage ../development/python-modules/awswrangler { };