Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
6d75bf65 cfe1e451

+373 -106
+7
nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
··· 238 238 <link xlink:href="options.html#opt-services.headscale.enable">services.headscale</link> 239 239 </para> 240 240 </listitem> 241 + <listitem> 242 + <para> 243 + <link xlink:href="https://0xerr0r.github.io/blocky/">blocky</link>, 244 + fast and lightweight DNS proxy as ad-blocker for local network 245 + with many features. 246 + </para> 247 + </listitem> 241 248 </itemizedlist> 242 249 </section> 243 250 <section xml:id="sec-release-22.05-incompatibilities">
+2
nixos/doc/manual/release-notes/rl-2205.section.md
··· 71 71 72 72 - [headscale](https://github.com/juanfont/headscale), an Open Source implementation of the [Tailscale](https://tailscale.io) Control Server. Available as [services.headscale](options.html#opt-services.headscale.enable) 73 73 74 + - [blocky](https://0xerr0r.github.io/blocky/), fast and lightweight DNS proxy as ad-blocker for local network with many features. 75 + 74 76 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. --> 75 77 76 78 ## Backward Incompatibilities {#sec-release-22.05-incompatibilities}
+8 -1
nixos/lib/test-driver/test_driver/machine.py
··· 241 241 cdrom: Optional[str] = None, 242 242 usb: Optional[str] = None, 243 243 bios: Optional[str] = None, 244 + qemuBinary: Optional[str] = None, 244 245 qemuFlags: Optional[str] = None, 245 246 ): 246 - self._cmd = "qemu-kvm -m 384" 247 + if qemuBinary is not None: 248 + self._cmd = qemuBinary 249 + else: 250 + self._cmd = "qemu-kvm" 251 + 252 + self._cmd += " -m 384" 247 253 248 254 # networking 249 255 net_backend = "-netdev user,id=net0" ··· 381 387 cdrom=args.get("cdrom"), 382 388 usb=args.get("usb"), 383 389 bios=args.get("bios"), 390 + qemuBinary=args.get("qemuBinary"), 384 391 qemuFlags=args.get("qemuFlags"), 385 392 ) 386 393
+1
nixos/modules/module-list.nix
··· 718 718 ./services/networking/bird.nix 719 719 ./services/networking/bitlbee.nix 720 720 ./services/networking/blockbook-frontend.nix 721 + ./services/networking/blocky.nix 721 722 ./services/networking/charybdis.nix 722 723 ./services/networking/cjdns.nix 723 724 ./services/networking/cntlm.nix
+5 -3
nixos/modules/services/misc/airsonic.nix
··· 39 39 default = "127.0.0.1"; 40 40 description = '' 41 41 The host name or IP address on which to bind Airsonic. 42 - Only relevant if you have multiple network interfaces and want 43 - to make Airsonic available on only one of them. The default value 44 - will bind Airsonic to all available network interfaces. 42 + The default value is appropriate for first launch, when the 43 + default credentials are easy to guess. It is also appropriate 44 + if you intend to use the virtualhost option in the service 45 + module. In other cases, you may want to change this to a 46 + specific IP or 0.0.0.0 to listen on all interfaces. 45 47 ''; 46 48 }; 47 49
+40
nixos/modules/services/networking/blocky.nix
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; 4 + 5 + let 6 + cfg = config.services.blocky; 7 + 8 + format = pkgs.formats.yaml { }; 9 + configFile = format.generate "config.yaml" cfg.settings; 10 + in 11 + { 12 + options.services.blocky = { 13 + enable = mkEnableOption "Fast and lightweight DNS proxy as ad-blocker for local network with many features"; 14 + 15 + settings = mkOption { 16 + type = format.type; 17 + default = { }; 18 + description = '' 19 + Blocky configuration. Refer to 20 + <link xlink:href="https://0xerr0r.github.io/blocky/configuration/"/> 21 + for details on supported values. 22 + ''; 23 + }; 24 + }; 25 + 26 + config = mkIf cfg.enable { 27 + systemd.services.blocky = { 28 + description = "A DNS proxy and ad-blocker for the local network"; 29 + wantedBy = [ "multi-user.target" ]; 30 + 31 + serviceConfig = { 32 + DynamicUser = true; 33 + ExecStart = "${pkgs.blocky}/bin/blocky --config ${configFile}"; 34 + 35 + AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" ]; 36 + CapabilityBoundingSet = [ "CAP_NET_BIND_SERVICE" ]; 37 + }; 38 + }; 39 + }; 40 + }
+1
nixos/tests/all-tests.nix
··· 52 52 bitcoind = handleTest ./bitcoind.nix {}; 53 53 bittorrent = handleTest ./bittorrent.nix {}; 54 54 blockbook-frontend = handleTest ./blockbook-frontend.nix {}; 55 + blocky = handleTest ./blocky.nix {}; 55 56 boot = handleTestOn ["x86_64-linux" "aarch64-linux"] ./boot.nix {}; 56 57 boot-stage1 = handleTest ./boot-stage1.nix {}; 57 58 borgbackup = handleTest ./borgbackup.nix {};
+34
nixos/tests/blocky.nix
··· 1 + import ./make-test-python.nix { 2 + name = "blocky"; 3 + 4 + nodes = { 5 + server = { pkgs, ... }: { 6 + environment.systemPackages = [ pkgs.dnsutils ]; 7 + services.blocky = { 8 + enable = true; 9 + 10 + settings = { 11 + customDNS = { 12 + mapping = { 13 + "printer.lan" = "192.168.178.3,2001:0db8:85a3:08d3:1319:8a2e:0370:7344"; 14 + }; 15 + }; 16 + upstream = { 17 + default = [ "8.8.8.8" "1.1.1.1" ]; 18 + }; 19 + port = 53; 20 + httpPort = 5000; 21 + logLevel = "info"; 22 + }; 23 + }; 24 + }; 25 + }; 26 + 27 + testScript = '' 28 + with subtest("Service test"): 29 + server.wait_for_unit("blocky.service") 30 + server.wait_for_open_port(53) 31 + server.wait_for_open_port(5000) 32 + server.succeed("dig @127.0.0.1 +short -x 192.168.178.3 | grep -qF printer.lan") 33 + ''; 34 + }
+3
pkgs/applications/audio/orca-c/default.nix
··· 13 13 14 14 postPatch = '' 15 15 patchShebangs tool 16 + sed -i tool \ 17 + -e 's@ncurses_dir=.*@ncurses_dir="${ncurses}"@' \ 18 + -e 's@portmidi_dir=.*@portmidi_dir="${portmidi}"@' tool 16 19 ''; 17 20 18 21 installPhase = ''
+9 -2
pkgs/applications/graphics/geeqie/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, pkg-config, autoconf, automake, gettext, intltool 2 2 , gtk3, lcms2, exiv2, libchamplain, clutter-gtk, ffmpegthumbnailer, fbida 3 3 , wrapGAppsHook, fetchpatch, bash, doxygen 4 + , nix-update-script 4 5 }: 5 6 6 7 stdenv.mkDerivation rec { 7 8 pname = "geeqie"; 8 - version = "1.7.1"; 9 + version = "1.7.2"; 9 10 10 11 src = fetchFromGitHub { 11 12 owner = "BestImageViewer"; 12 13 repo = "geeqie"; 13 14 rev = "v${version}"; 14 - sha256 = "sha256-0E1TeAhkiK+hFJ4oMoeZLvfRehTzdGF3AtEVwf/MaF8="; 15 + sha256 = "sha256-Abr7trlms6bxOAqE6xNKRv51TBGNilNdBhUZUg7OTKY="; 15 16 }; 16 17 17 18 patches = [ ··· 46 47 ''; 47 48 48 49 enableParallelBuilding = true; 50 + 51 + passthru = { 52 + updateScript = nix-update-script { 53 + attrPath = pname; 54 + }; 55 + }; 49 56 50 57 meta = with lib; { 51 58 description = "Lightweight GTK based image viewer";
+3 -3
pkgs/applications/graphics/gscan2pdf/default.nix
··· 10 10 11 11 perlPackages.buildPerlPackage rec { 12 12 pname = "gscan2pdf"; 13 - version = "2.12.4"; 13 + version = "2.12.5"; 14 14 15 15 src = fetchurl { 16 - url = "mirror://sourceforge/gscan2pdf/${version}/${pname}-${version}.tar.xz"; 17 - sha256 = "sha256-UrBt0QkSk7IP4mZYFoxFNJQ1Qmcb53CemvlYfsxjZ/s="; 16 + url = "mirror://sourceforge/gscan2pdf/gscan2pdf-${version}.tar.xz"; 17 + sha256 = "sha256-MFWW9DTJ/svtgN3fbw+zeGpgg3pgIoC9jZ1HkG5p6sc="; 18 18 }; 19 19 20 20 nativeBuildInputs = [ wrapGAppsHook ];
+2 -2
pkgs/applications/misc/logseq/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "logseq"; 5 - version = "0.5.4"; 5 + version = "0.5.9"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/logseq/logseq/releases/download/${version}/logseq-linux-x64-${version}.AppImage"; 9 - sha256 = "PGrx2JBYmp5vQ8jLpOfiT1T1+SNeRt0W5oHUjHNKuBE="; 9 + sha256 = "e47aaabcd940b54962625e224961e9b95b7f18b99724adbb6334cdc549617389"; 10 10 name = "${pname}-${version}.AppImage"; 11 11 }; 12 12
+2 -2
pkgs/applications/misc/p2pool/default.nix
··· 14 14 15 15 stdenv.mkDerivation rec { 16 16 pname = "p2pool"; 17 - version = "1.6"; 17 + version = "1.7"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "SChernykh"; 21 21 repo = "p2pool"; 22 22 rev = "v${version}"; 23 - sha256 = "sha256-SumAHliY2cX2Q1umyw0ljCFmgnGKKHqoEFGglNJ/Bfg="; 23 + sha256 = "sha256-ohfC10U7srs5IrFWPF5AKPwXPHaRxlYRK4ZZ0pE8tEs="; 24 24 fetchSubmodules = true; 25 25 }; 26 26
+3
pkgs/applications/networking/blocky/default.nix
··· 1 1 { buildGoModule 2 2 , fetchFromGitHub 3 3 , lib 4 + , nixosTests 4 5 }: 5 6 6 7 buildGoModule rec { ··· 27 28 license = licenses.asl20; 28 29 maintainers = with maintainers; [ ratsclub ]; 29 30 }; 31 + 32 + passthru.tests = { inherit (nixosTests) blocky; }; 30 33 }
+5 -5
pkgs/applications/networking/browsers/firefox/librewolf/src.json
··· 1 1 { 2 - "packageVersion": "97.0-2", 2 + "packageVersion": "97.0.1-1", 3 3 "source": { 4 - "rev": "97.0-2", 5 - "sha256": "00fb7xr6hrcyh3s7g52fs6f7a1iggpibj0xafblnl7118fh73g25" 4 + "rev": "97.0.1-1", 5 + "sha256": "10gbnkmyivawwqn3gf5c98l49b03j70gbniaar8bfl80j8av0v5j" 6 6 }, 7 7 "firefox": { 8 - "version": "97.0", 9 - "sha512": "a913695a42cb06ee9bda2a20e65cc573e40ca93e9f75b7ee0a43ebd1935b371e7e80d5fc8d5f126ad0712ab848635a8624bbeed43807e5c179537aa32c884186" 8 + "version": "97.0.1", 9 + "sha512": "8620aace77167593aab5acd230860eb3e67eeddc49c0aad0491b5dc20bd0ddb6089dbb8975aed241426f57b2ad772238b04d03b95390175f580cbd80bb6d5f6c" 10 10 } 11 11 }
+3 -3
pkgs/applications/networking/cluster/kube-score/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "kube-score"; 5 - version = "1.13.0"; 5 + version = "1.14.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "zegl"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-QAtsXNmR+Sg9xmvP7x6b2jAJkUcL/sMYk8i5CSzjVos="; 11 + sha256 = "sha256-6/+S1aj2qoUPz+6+8Z4Z5dpfyOi/DnrLLUpPgBn/OxU="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-kPYvkovzQDmoB67TZHCKZ5jtW6pN3gHxBPKAU8prbgo="; 14 + vendorSha256 = "sha256-0Zi62FmX4rFl3os2ehtussSSUPJtxLq7622CEdeKZCs="; 15 15 16 16 meta = with lib; { 17 17 description = "Kubernetes object analysis with recommendations for improved reliability and security";
+2 -2
pkgs/applications/networking/instant-messengers/session-desktop-appimage/default.nix
··· 5 5 6 6 appimageTools.wrapType2 rec { 7 7 pname = "session-desktop-appimage"; 8 - version = "1.7.6"; 8 + version = "1.7.7"; 9 9 src = fetchurl { 10 10 url = "https://github.com/oxen-io/session-desktop/releases/download/v${version}/session-desktop-linux-x86_64-${version}.AppImage"; 11 - sha256 = "PNjUslqLcSxkRSXFpesBr2sfre4wetZWfUQTjywdClU="; 11 + sha256 = "iMJk7/Q3Kh2KwLs0m+DAPVv471iPZcsIs4+YCSbmeIo="; 12 12 }; 13 13 14 14 meta = with lib; {
+2 -2
pkgs/applications/networking/mailreaders/evolution/evolution/default.nix
··· 42 42 43 43 stdenv.mkDerivation rec { 44 44 pname = "evolution"; 45 - version = "3.42.3"; 45 + version = "3.42.4"; 46 46 47 47 src = fetchurl { 48 48 url = "mirror://gnome/sources/evolution/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 49 - sha256 = "RGKeagIojsEApm/VlBOgaLa5zWJL7TJVqimhZuom0LY="; 49 + sha256 = "+oprem1GsinbXfIv3nZCVFIjV/4b7NexjlNt/piJCmU="; 50 50 }; 51 51 52 52 nativeBuildInputs = [
+2 -1
pkgs/applications/science/logic/coq/default.nix
··· 130 130 131 131 nativeBuildInputs = [ pkg-config ] 132 132 ++ optional buildIde copyDesktopItems 133 + ++ optional (buildIde && versionAtLeast "8.10") wrapGAppsHook 133 134 ++ optional (!versionAtLeast "8.6") gnumake42; 134 135 buildInputs = [ ncurses ] ++ ocamlBuildInputs 135 136 ++ optionals buildIde 136 137 (if versionAtLeast "8.10" 137 - then [ ocamlPackages.lablgtk3-sourceview3 glib gnome.adwaita-icon-theme wrapGAppsHook ] 138 + then [ ocamlPackages.lablgtk3-sourceview3 glib gnome.adwaita-icon-theme ] 138 139 else [ ocamlPackages.lablgtk ]) 139 140 ++ optional (versionAtLeast "8.14") ocamlPackages.dune_2 140 141 ;
+3 -3
pkgs/applications/version-management/mercurial/default.nix
··· 21 21 22 22 self = python3Packages.buildPythonApplication rec { 23 23 pname = "mercurial"; 24 - version = "6.0.2"; 24 + version = "6.0.3"; 25 25 26 26 src = fetchurl { 27 27 url = "https://mercurial-scm.org/release/mercurial-${version}.tar.gz"; 28 - sha256 = "sha256-X7TDbThWKS6/WEBR1ZMG2WrYqjK1U3RSsdnEdvlasRo="; 28 + sha256 = "sha256-Z/E2R6RlF6K1Z83Lc8mHIdddNqBDLeuxUCK3f5wTgzM="; 29 29 }; 30 30 31 31 format = "other"; ··· 35 35 cargoDeps = if rustSupport then rustPlatform.fetchCargoTarball { 36 36 inherit src; 37 37 name = "${pname}-${version}"; 38 - sha256 = "sha256-rIG57oPCTUz4HNJyuMBPlKTSh02ecF5052Q1P9wGq1s="; 38 + sha256 = "sha256-i4WROxezeqLX4hTdcPrqsf6dBqsNZz6fFAPzItYuklE="; 39 39 sourceRoot = "${pname}-${version}/rust"; 40 40 } else null; 41 41 cargoRoot = if rustSupport then "rust" else null;
+2 -2
pkgs/desktops/cinnamon/nemo/default.nix
··· 24 24 25 25 stdenv.mkDerivation rec { 26 26 pname = "nemo"; 27 - version = "5.2.3"; 27 + version = "5.2.4"; 28 28 29 29 # TODO: add plugins support (see https://github.com/NixOS/nixpkgs/issues/78327) 30 30 ··· 32 32 owner = "linuxmint"; 33 33 repo = pname; 34 34 rev = version; 35 - sha256 = "sha256-kPxwWciNf4KQx3JG1qPQcZJeOa4B+udMyQmH8A7JcfQ="; 35 + sha256 = "sha256-v63dFiBKtLCmRnwJ6u814lSv+tfPG+IIJtcWCnOEZjk="; 36 36 }; 37 37 38 38 outputs = [ "out" "dev" ];
+5 -5
pkgs/development/compilers/swift/default.nix
··· 52 52 # - integration-tests 53 53 54 54 versions = { 55 - swift = "5.5.2"; 55 + swift = "5.5.3"; 56 56 yams = "4.0.2"; 57 57 argumentParser = "0.4.3"; 58 58 format = "swift-5.5-branch"; ··· 79 79 80 80 swift = fetchSwiftRelease { 81 81 repo = "swift"; 82 - sha256 = "1a9ja3r6ap4cappbvlk18krlvwi0q75z21j5yx5rhbnw4ihh7lda"; 82 + sha256 = "0ma96sfvwiv2f4qhzrvcwxi9igzd80930gnaw4r7ra4w190cnag7"; 83 83 }; 84 84 cmark = fetchSwiftRelease { 85 85 repo = "swift-cmark"; ··· 99 99 }; 100 100 swiftpm = fetchSwiftRelease { 101 101 repo = "swift-package-manager"; 102 - sha256 = "0hdjvb2asfi6h3x9bjssxkc3bgjn3idlmyga3dl3lscfq88hjxr9"; 102 + sha256 = "0z90mg837jzwh516pypn48r3wsjf0lqymsyigdhgr7j2sgcckrr1"; 103 103 }; 104 104 syntax = fetchSwiftRelease { 105 105 repo = "swift-syntax"; ··· 111 111 }; 112 112 corelibsFoundation = fetchSwiftRelease { 113 113 repo = "swift-corelibs-foundation"; 114 - sha256 = "1f7qcdx8597gwqa9pwl38d31w6w4d84c5hadj4ycj99msrm2f32x"; 114 + sha256 = "06gkdliihl1l86jx5khzwkjmjk45fq290x033rscramzcdxh7d1b"; 115 115 }; 116 116 corelibsLibdispatch = fetchSwiftRelease { 117 117 repo = "swift-corelibs-libdispatch"; ··· 128 128 }; 129 129 llvmProject = fetchSwiftRelease { 130 130 repo = "llvm-project"; 131 - sha256 = "1gvqps5f9jh6lbhcjh1fyzp3bc0h9chbljzaspcrdi2qp878prlx"; 131 + sha256 = "18rn5xg5hpxxsacs0ygjmjpzpc8pq85898kknzc0s0z5m55h45z8"; 132 132 }; 133 133 134 134 # Projects that have their own versions during each release
+33 -2
pkgs/development/interpreters/racket/default.nix
··· 78 78 # fail to detect its variant at runtime. 79 79 # See: https://github.com/NixOS/nixpkgs/issues/114993#issuecomment-812951247 80 80 ./force-cs-variant.patch 81 + 82 + # The entry point binary $out/bin/racket is codesigned at least once. The 83 + # following error is triggered as a result. 84 + # (error 'add-ad-hoc-signature "file already has a signature") 85 + # We always remove the existing signature then call add-ad-hoc-signature to 86 + # circumvent this error. 87 + ./force-remove-codesign-then-add.patch 81 88 ]; 82 89 83 90 preConfigure = '' ··· 90 97 --replace /bin/rm ${coreutils}/bin/rm \ 91 98 --replace /bin/true ${coreutils}/bin/true 92 99 done 100 + 101 + # The configure script forces using `libtool -o` as AR on Darwin. But, the 102 + # `-o` option is only available from Apple libtool. GNU ar works here. 103 + substituteInPlace src/ChezScheme/zlib/configure \ 104 + --replace 'ARFLAGS="-o"' 'AR=ar; ARFLAGS="rc"' 105 + 93 106 mkdir src/build 94 107 cd src/build 95 108 96 - gappsWrapperArgs+=("--prefix" "LD_LIBRARY_PATH" ":" ${LD_LIBRARY_PATH}) 109 + '' + lib.optionalString stdenv.isLinux '' 110 + gappsWrapperArgs+=("--prefix" "LD_LIBRARY_PATH" ":" ${libPath}) 111 + '' + lib.optionalString stdenv.isDarwin '' 112 + gappsWrapperArgs+=("--prefix" "DYLD_LIBRARY_PATH" ":" ${libPath}) 113 + '' 114 + ; 115 + 116 + preBuild = lib.optionalString stdenv.isDarwin '' 117 + # Cannot set DYLD_LIBRARY_PATH as an attr of this drv, becasue dynamic 118 + # linker environment variables like this are purged. 119 + # See: https://apple.stackexchange.com/a/212954/167199 120 + 121 + # Make builders feed it to dlopen(...). Do not expose all of $libPath to 122 + # DYLD_LIBRARY_PATH as the order of looking up symbols like 123 + # `__cg_jpeg_resync_to_restart` will be messed up. Our libJPEG.dyllib 124 + # expects it from our libTIFF.dylib, but instead it could not be found from 125 + # the system `libTIFF.dylib`. DYLD_FALLBACK_LIBRARY_PATH has its own problem 126 + # , too. 127 + export DYLD_FALLBACK_LIBRARY_PATH="${libPath}" 97 128 ''; 98 129 99 130 shared = if stdenv.isDarwin then "dylib" else "shared"; ··· 119 150 homepage = "https://racket-lang.org/"; 120 151 license = with licenses; [ asl20 /* or */ mit ]; 121 152 maintainers = with maintainers; [ kkallio henrytill vrthra ]; 122 - platforms = [ "x86_64-darwin" "x86_64-linux" "aarch64-linux" ]; 153 + platforms = [ "x86_64-darwin" "x86_64-linux" "aarch64-linux" "aarch64-darwin" ]; 123 154 }; 124 155 }
+11
pkgs/development/interpreters/racket/force-remove-codesign-then-add.patch
··· 1 + --- old/src/mac/codesign.rkt 2022-01-08 18:25:53.000000000 -0500 2 + +++ new/src/mac/codesign.rkt 2022-02-15 15:49:51.000000000 -0500 3 + @@ -17,6 +17,5 @@ 4 + #:args (file) 5 + file)) 6 + 7 + -(if remove? 8 + - (remove-signature file) 9 + - (add-ad-hoc-signature file)) 10 + +(remove-signature file) 11 + +(add-ad-hoc-signature file)
+1 -1
pkgs/development/interpreters/racket/minimal.nix
··· 14 14 as well as libraries that live in collections. In particular, raco 15 15 and the pkg library are still bundled. 16 16 ''; 17 - platforms = [ "x86_64-linux" "aarch64-linux" "x86_64-darwin" ]; 17 + platforms = [ "x86_64-linux" "aarch64-linux" "x86_64-darwin" "aarch64-darwin" ]; 18 18 broken = false; # Minimal build does not require working FFI 19 19 }; 20 20 })
+10 -1
pkgs/development/libraries/exiv2/default.nix
··· 11 11 , graphviz 12 12 , libxslt 13 13 , libiconv 14 + , removeReferencesTo 14 15 }: 15 16 16 17 stdenv.mkDerivation rec { 17 18 pname = "exiv2"; 18 19 version = "0.27.5"; 19 20 20 - outputs = [ "out" "dev" "doc" "man" ]; 21 + outputs = [ "out" "lib" "dev" "doc" "man" "static" ]; 21 22 22 23 src = fetchFromGitHub { 23 24 owner = "exiv2"; ··· 32 33 gettext 33 34 graphviz 34 35 libxslt 36 + removeReferencesTo 35 37 ]; 36 38 37 39 buildInputs = lib.optional stdenv.isDarwin libiconv; ··· 94 96 rm * 95 97 mv .exiv2 exiv2 96 98 ) 99 + 100 + mkdir -p $static/lib 101 + mv $lib/lib/*.a $static/lib/ 102 + 103 + remove-references-to -t ${stdenv.cc.cc} $lib/lib/*.so.*.*.* $out/bin/exiv2 $static/lib/*.a 97 104 ''; 105 + 106 + disallowedReferences = [ stdenv.cc.cc ]; 98 107 99 108 meta = with lib; { 100 109 homepage = "https://www.exiv2.org/";
+2 -2
pkgs/development/libraries/qtstyleplugin-kvantum/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "qtstyleplugin-kvantum"; 7 - version = "1.0.0"; 7 + version = "1.0.1"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "tsujan"; 11 11 repo = "Kvantum"; 12 12 rev = "V${version}"; 13 - sha256 = "0yvxj7r9z890nfq5cadw7ys144c2mnvaplvx4v4ndv7238b741l8"; 13 + sha256 = "0k3j74klvd386ijsd4j09ccxlhga54z4pgnh36s9cv3rs7ab39qm"; 14 14 }; 15 15 16 16 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/google-cloud-bigquery/default.nix
··· 18 18 19 19 buildPythonPackage rec { 20 20 pname = "google-cloud-bigquery"; 21 - version = "2.32.0"; 21 + version = "2.33.0"; 22 22 format = "setuptools"; 23 23 24 24 src = fetchPypi { 25 25 inherit pname version; 26 - sha256 = "sha256-84Y6xCk/CkWF5ERh2CuR+SOXIe8z/JV11AG02n3BJ70="; 26 + sha256 = "sha256-4VIlDMUmpwWE+AIAZs7L3y+i35hEF7a76/+Wqtwy498="; 27 27 }; 28 28 29 29 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/google-cloud-error-reporting/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "google-cloud-error-reporting"; 15 - version = "1.4.1"; 15 + version = "1.5.0"; 16 16 17 17 src = fetchPypi { 18 18 inherit pname version; 19 - sha256 = "4a72a65586178daaacf6bbc4b718db0765b99a719fce88a95c2be4f82689b7c1"; 19 + sha256 = "sha256-qvhZU7T2fHA2uRyXJjRxqeEAFwShH+TpGwICczgX7Sk="; 20 20 }; 21 21 22 22 postPatch = ''
+6
pkgs/development/python-modules/httpx-socks/default.nix
··· 56 56 "httpx_socks" 57 57 ]; 58 58 59 + disabledTests = [ 60 + # Tests don't work in the sandbox 61 + "test_proxy" 62 + "test_secure_proxy" 63 + ]; 64 + 59 65 meta = with lib; { 60 66 description = "Proxy (HTTP, SOCKS) transports for httpx"; 61 67 homepage = "https://github.com/romis2012/httpx-socks";
+12 -10
pkgs/development/python-modules/pyinsteon/default.nix
··· 1 1 { lib 2 - , buildPythonPackage 3 - , fetchFromGitHub 4 2 , aiofiles 5 3 , aiohttp 6 4 , async_generator 5 + , buildPythonPackage 6 + , fetchFromGitHub 7 7 , pypubsub 8 8 , pyserial 9 9 , pyserial-asyncio 10 - , pyyaml 10 + , pytest-asyncio 11 + , pytest-timeout 11 12 , pytestCheckHook 12 13 , pythonOlder 13 - , pytest-cov 14 - , pytest-asyncio 15 - , pytest-timeout 14 + , pyyaml 16 15 }: 17 16 18 17 buildPythonPackage rec { 19 18 pname = "pyinsteon"; 20 19 version = "1.0.15"; 20 + format = "setuptools"; 21 + 21 22 disabled = pythonOlder "3.6"; 22 23 23 24 src = fetchFromGitHub { 24 25 owner = pname; 25 26 repo = pname; 26 27 rev = version; 27 - sha256 = "sha256-bR+2885JdGoVHBIZQG8iF0OXsECew7m5N9vopKtGp3I="; 28 + hash = "sha256-bR+2885JdGoVHBIZQG8iF0OXsECew7m5N9vopKtGp3I="; 28 29 }; 29 30 30 31 propagatedBuildInputs = [ 31 32 aiofiles 32 33 aiohttp 33 - async_generator 34 34 pypubsub 35 35 pyserial 36 36 pyserial-asyncio ··· 38 38 ]; 39 39 40 40 checkInputs = [ 41 + async_generator 41 42 pytest-asyncio 42 - pytest-cov 43 43 pytest-timeout 44 44 pytestCheckHook 45 45 ]; 46 46 47 - pythonImportsCheck = [ "pyinsteon" ]; 47 + pythonImportsCheck = [ 48 + "pyinsteon" 49 + ]; 48 50 49 51 meta = with lib; { 50 52 description = "Python library to support Insteon home automation projects";
+17
pkgs/development/python-modules/python-manilaclient/default.nix
··· 1 1 { lib 2 2 , buildPythonApplication 3 3 , fetchPypi 4 + , installShellFiles 4 5 , pbr 6 + , openstackdocstheme 5 7 , oslo-config 6 8 , oslo-log 7 9 , oslo-serialization ··· 9 11 , prettytable 10 12 , requests 11 13 , simplejson 14 + , sphinx 15 + , sphinxcontrib-programoutput 12 16 , Babel 13 17 , osc-lib 14 18 , python-keystoneclient ··· 25 29 sha256 = "sha256-6iAed0mtEYHguYq4Rlh4YWT8E5hNqBYPcnG9/8RMspo="; 26 30 }; 27 31 32 + nativeBuildInputs = [ 33 + installShellFiles 34 + openstackdocstheme 35 + sphinx 36 + sphinxcontrib-programoutput 37 + ]; 38 + 28 39 propagatedBuildInputs = [ 29 40 pbr 30 41 oslo-config ··· 39 50 python-keystoneclient 40 51 debtcollector 41 52 ]; 53 + 54 + postInstall = '' 55 + export PATH=$out/bin:$PATH 56 + sphinx-build -a -E -d doc/build/doctrees -b man doc/source doc/build/man 57 + installManPage doc/build/man/python-manilaclient.1 58 + ''; 42 59 43 60 # Checks moved to 'passthru.tests' to workaround infinite recursion 44 61 doCheck = false;
+2 -2
pkgs/development/python-modules/simplefix/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "simplefix"; 5 - version = "1.0.14"; 5 + version = "1.0.15"; 6 6 7 7 src = fetchFromGitHub { 8 8 repo = "simplefix"; 9 9 owner = "da4089"; 10 10 rev = "v${version}"; 11 - sha256 = "1qccb63w6swq7brp0zinkkngpazmb25r21adry5cq6nniqs5g5zx"; 11 + sha256 = "sha256-GQHMotxNRuRv6zXhrD02T+aFgfYe3RnvUGADsBeSPbA="; 12 12 }; 13 13 14 14 checkPhase = ''
+32
pkgs/development/python-modules/sphinxcontrib-programoutput/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchPypi 4 + , sphinx 5 + , sphinxcontrib-serializinghtml 6 + }: 7 + 8 + buildPythonPackage rec { 9 + pname = "sphinxcontrib-programoutput"; 10 + version = "0.17"; 11 + 12 + src = fetchPypi { 13 + inherit pname version; 14 + sha256 = "sha256-MA7puMrug1XSXMdLTRx+/RLmCNKtFl4xQdMeb7wVK38="; 15 + }; 16 + 17 + buildInputs = [ 18 + sphinx 19 + ]; 20 + 21 + # fails to import sphinxcontrib.serializinghtml 22 + doCheck = false; 23 + 24 + pythonImportsCheck = [ "sphinxcontrib.programoutput" ]; 25 + 26 + meta = with lib; { 27 + description = "Sphinx extension to include program output"; 28 + homepage = "https://github.com/NextThought/sphinxcontrib-programoutput"; 29 + license = licenses.bsd2; 30 + maintainers = with maintainers; [ SuperSandro2000 ]; 31 + }; 32 + }
+1 -1
pkgs/development/tools/analysis/radare2/default.nix
··· 62 62 ''; 63 63 64 64 postFixup = lib.optionalString stdenv.isDarwin '' 65 - for file in $out/bin/rasm2 $out/bin/ragg2 $out/bin/rabin2 $out/lib/libr_asm.${version}.dylib; do 65 + for file in $out/bin/rasm2 $out/bin/ragg2 $out/bin/rabin2 $out/lib/libr_asm.${version}.dylib $out/lib/libr_anal.${version}.dylib; do 66 66 install_name_tool -change libcapstone.4.dylib ${capstone}/lib/libcapstone.4.dylib $file 67 67 done 68 68 '';
+13 -9
pkgs/development/tools/buf/default.nix
··· 10 10 11 11 buildGoModule rec { 12 12 pname = "buf"; 13 - version = "1.0.0-rc12"; 13 + version = "1.0.0"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "bufbuild"; 17 17 repo = pname; 18 18 rev = "v${version}"; 19 - sha256 = "sha256-UqyWQdlCDTSjW348f87W7g2kwB5nzIOviSE5/1T1soY="; 19 + sha256 = "sha256-jJaob2eaozMFRsXwW6ulgM5De3UmpLZddTHwq6PnaeE="; 20 20 }; 21 - vendorSha256 = "sha256-qBgGZTok3G0Pgku76uiV9bZperhiSNoWSrzxrHe4QXw="; 21 + 22 + vendorSha256 = "sha256-wPnrkfv6pJB6tkZo2oeMbWHbF9njGh1ZEWu8tkHDhGo="; 22 23 23 24 patches = [ 24 25 # Skip a test that requires networking to be available to work. ··· 27 28 ./skip_test_requiring_dotgit.patch 28 29 ]; 29 30 30 - nativeBuildInputs = [ protobuf installShellFiles ]; 31 - # Required for TestGitCloner 32 - checkInputs = [ git ]; 31 + nativeBuildInputs = [ installShellFiles ]; 33 32 34 33 ldflags = [ "-s" "-w" ]; 35 34 35 + checkInputs = [ 36 + git # Required for TestGitCloner 37 + protobuf # Required for buftesting.GetProtocFilePaths 38 + ]; 39 + 36 40 preCheck = '' 37 41 # The tests need access to some of the built utilities 38 42 export PATH="$PATH:$GOPATH/bin" ··· 55 59 56 60 # Completions 57 61 installShellCompletion --cmd buf \ 58 - --bash <($GOPATH/bin/buf bash-completion) \ 59 - --fish <($GOPATH/bin/buf fish-completion) \ 60 - --zsh <($GOPATH/bin/buf zsh-completion) 62 + --bash <($GOPATH/bin/buf completion bash) \ 63 + --fish <($GOPATH/bin/buf completion fish) \ 64 + --zsh <($GOPATH/bin/buf completion zsh) 61 65 62 66 # Man Pages 63 67 mkdir man && $GOPATH/bin/buf manpages man
+2 -2
pkgs/development/tools/ko/default.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "ko"; 10 - version = "0.9.3"; 10 + version = "0.10.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "google"; 14 14 repo = pname; 15 15 rev = "v${version}"; 16 - sha256 = "sha256-cIrlhhk5Lt0Qt7q7rKw8EXrJqZWZEjrEUyHOvHiT6bs="; 16 + sha256 = "sha256-Xhe5WNHQ+Oa1m/6VwC3zCwWzXRc1spSfPp4jySsOcuU="; 17 17 }; 18 18 vendorSha256 = null; 19 19
+3 -3
pkgs/development/tools/stylua/default.nix
··· 8 8 9 9 rustPlatform.buildRustPackage rec { 10 10 pname = "stylua"; 11 - version = "0.12.2"; 11 + version = "0.12.3"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "johnnymorganz"; 15 15 repo = pname; 16 16 rev = "v${version}"; 17 - sha256 = "sha256-Nry6P4nwcCmvJ4kdzeGEkaP1fm2LgnAwrINTBFK23tY="; 17 + sha256 = "sha256-bgfG1cPhauU85FG/ZX1n2KqfydMeh92q347UsREkOGo="; 18 18 }; 19 19 20 - cargoSha256 = "sha256-i5wOGPOe1lDZknrVzZGxC8dUgTGiZJSzLqkxSRt0mQ8="; 20 + cargoSha256 = "sha256-njZTD6O67v787Z1tJ7G0QzxJLhqU2sfpOVw6r4woE9s="; 21 21 22 22 buildFeatures = lib.optional lua52Support "lua52" 23 23 ++ lib.optional luauSupport "luau";
+53 -8
pkgs/games/mudlet/default.nix
··· 1 - { fetchFromGitHub, lib, stdenv, wrapQtAppsHook, git, pcre, pugixml, qtbase, libsForQt5, libsecret, qtmultimedia, qttools, yajl, libzip, hunspell 2 - , boost, libGLU, lua, cmake, which, pkg-config, }: 1 + { lib 2 + , stdenv 3 + , fetchFromGitHub 4 + , cmake 5 + , git 6 + , pkg-config 7 + , qttools 8 + , which 9 + , wrapQtAppsHook 10 + , boost 11 + , hunspell 12 + , libGLU 13 + , libsForQt5 14 + , libsecret 15 + , libzip 16 + , lua 17 + , pcre 18 + , pugixml 19 + , qtbase 20 + , qtmultimedia 21 + , yajl 22 + }: 3 23 4 24 let 5 25 luaEnv = lua.withPackages(ps: with ps; [ ··· 8 28 in 9 29 stdenv.mkDerivation rec { 10 30 pname = "mudlet"; 11 - version = "4.12.0"; 31 + version = "4.15.1"; 12 32 13 33 src = fetchFromGitHub { 14 34 owner = "Mudlet"; 15 35 repo = "Mudlet"; 16 36 rev = "Mudlet-${version}"; 17 37 fetchSubmodules = true; 18 - sha256 = "023plm5mwm15xikmdh1mq3gx1n7y4a0r0kw9fvk3rvm9brm78hzp"; 38 + hash = "sha256-GnTQc0Jh4YaQnfy7fYsTCACczlzWCQ+auKYoU9ET83M="; 19 39 }; 20 40 21 - nativeBuildInputs = [ pkg-config cmake wrapQtAppsHook git qttools which ]; 41 + nativeBuildInputs = [ 42 + cmake 43 + git 44 + pkg-config 45 + qttools 46 + which 47 + wrapQtAppsHook 48 + ]; 49 + 22 50 buildInputs = [ 23 - pcre pugixml qtbase libsForQt5.qtkeychain qtmultimedia luaEnv libsecret libzip libGLU yajl boost hunspell 51 + boost 52 + hunspell 53 + libGLU 54 + libsForQt5.qtkeychain 55 + libsecret 56 + libzip 57 + luaEnv 58 + pcre 59 + pugixml 60 + qtbase 61 + qtmultimedia 62 + yajl 24 63 ]; 25 64 26 65 WITH_FONTS = "NO"; 27 66 WITH_UPDATER = "NO"; 28 67 29 68 installPhase = '' 69 + runHook preInstall 70 + 30 71 mkdir -pv $out/lib 31 72 cp 3rdparty/edbee-lib/edbee-lib/qslog/lib/libQsLog.so $out/lib 32 73 mkdir -pv $out/bin ··· 41 82 cp -r ../mudlet.png $out/share/pixmaps/ 42 83 43 84 makeQtWrapper $out/mudlet $out/bin/mudlet \ 85 + --set LUA_CPATH "${luaEnv}/lib/lua/${lua.luaversion}/?.so" \ 86 + --prefix LUA_PATH : "$NIX_LUA_PATH" \ 44 87 --prefix LD_LIBRARY_PATH : "${libsForQt5.qtkeychain}/lib/" \ 45 88 --run "cd $out"; 89 + 90 + runHook postInstall 46 91 ''; 47 92 48 93 meta = with lib; { 49 94 description = "Crossplatform mud client"; 50 - homepage = "https://mudlet.org"; 95 + homepage = "https://www.mudlet.org/"; 51 96 maintainers = [ maintainers.wyvie maintainers.pstn ]; 52 97 platforms = platforms.linux; 53 - license = licenses.gpl2; 98 + license = licenses.gpl2Plus; 54 99 }; 55 100 }
+4 -4
pkgs/os-specific/linux/apparmor/default.nix
··· 304 304 meta = apparmor-meta "kernel patches"; 305 305 }; 306 306 307 - # Generate generic AppArmor rules in a file, 308 - # from the closure of given rootPaths. 309 - # To be included in an AppArmor profile like so: 310 - # include "$(apparmorRulesFromClosure {} [pkgs.hello]}" 307 + # Generate generic AppArmor rules in a file, from the closure of given 308 + # rootPaths. To be included in an AppArmor profile like so: 309 + # 310 + # include "${apparmorRulesFromClosure { } [ pkgs.hello ]}" 311 311 apparmorRulesFromClosure = 312 312 { # The store path of the derivation is given in $path 313 313 additionalRules ? []
+4 -4
pkgs/servers/monitoring/grafana/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "grafana"; 5 - version = "8.3.6"; 5 + version = "8.4.1"; 6 6 7 7 excludedPackages = "\\(alert_webhook_listener\\|clean-swagger\\|release_publisher\\|slow_proxy\\|slow_proxy_mac\\|macaron\\)"; 8 8 ··· 10 10 rev = "v${version}"; 11 11 owner = "grafana"; 12 12 repo = "grafana"; 13 - sha256 = "sha256-XYgSXgZJKsVYMtlvMq84OuQBbrbFJUh6m/lKCbOlzus="; 13 + sha256 = "sha256-RVEgqFEwvXTHE8Kvc1q+0o+V3mEHtURQR/7x3Qcmtpg="; 14 14 }; 15 15 16 16 srcStatic = fetchurl { 17 17 url = "https://dl.grafana.com/oss/release/grafana-${version}.linux-amd64.tar.gz"; 18 - sha256 = "sha256-8gR95+xCJD3e25WxbmtXBMsS7HdbB+vwrcZ9sApSxFk="; 18 + sha256 = "sha256-RTupkQ9LlppJeyfmgGMztMW2m+sJXkJuDAdtpcyRGe0="; 19 19 }; 20 20 21 - vendorSha256 = "sha256:0bj9a45jciaayqlrakdndzjdw4x600xw48wwy1id4n50h2mkrbp8"; 21 + vendorSha256 = "sha256-RugV5cHlpR739CA1C/7FkXasvkv18m7pPsK6mxfSkC0="; 22 22 23 23 nativeBuildInputs = [ wire ]; 24 24
+4 -4
pkgs/servers/ombi/default.nix
··· 10 10 "Unsupported system: ${stdenv.hostPlatform.system}"); 11 11 12 12 hash = { 13 - x64-linux_hash = "sha256-BLtoT6UHsur+jFp4KBlE10/Z/V6RDy0k16H10IC98WQ="; 14 - arm64-linux_hash = "sha256-s8EV/VqiUXWRTNxacx4sy6r+TIAqkqhESAYYa9s0uAQ="; 15 - x64-osx_hash = "sha256-woXFYmX+499NTtWmmGBpZ12PxTUazJ8klA6IPQIDjLE="; 13 + x64-linux_hash = "sha256-O/dfLZst7RFnqDZj8UX6ejL2EBjGnCBY3e8JB3peRgY="; 14 + arm64-linux_hash = "sha256-DkCOK1A7L1gMqY/XPIJFFz7qvUvxA6aJa24Hrh3dT/U="; 15 + x64-osx_hash = "sha256-4N0/FTVhxUooauhh+7u527aViSBILiCb+a4cI17QTAg="; 16 16 }."${arch}-${os}_hash"; 17 17 18 18 in stdenv.mkDerivation rec { 19 19 pname = "ombi"; 20 - version = "4.3.3"; 20 + version = "4.10.2"; 21 21 22 22 sourceRoot = "."; 23 23
+2 -2
pkgs/servers/ombi/update.sh
··· 15 15 16 16 url="https://github.com/Ombi-app/Ombi/releases/download/v$version/$os-$arch.tar.gz" 17 17 hash=$(nix-prefetch-url --type sha256 $url) 18 - sriHash="$(nix --extra-experimental-features nix-command hash to-sri --type sha256 $hash)" 18 + sriHash="$(nix hash to-sri --type sha256 $hash)" 19 19 20 20 sed -i "s|$hashKey = \"[a-zA-Z0-9\/+-=]*\";|$hashKey = \"$sriHash\";|g" "$dirname/default.nix" 21 21 } ··· 25 25 sed -i "s/version = \"[0-9.]*\";/version = \"$1\";/g" "$dirname/default.nix" 26 26 } 27 27 28 - currentVersion=$(cd $dirname && nix eval --raw '(with import ../../.. {}; ombi.version)') 28 + currentVersion=$(cd $dirname && nix eval --raw -f ../../.. ombi.version) 29 29 30 30 latestTag=$(curl https://api.github.com/repos/Ombi-App/Ombi/releases/latest | jq -r ".tag_name") 31 31 latestVersion="$(expr $latestTag : 'v\(.*\)')"
+3 -3
pkgs/tools/admin/fits-cloudctl/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "fits-cloudctl"; 8 - version = "0.10.7"; 8 + version = "0.10.8"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "fi-ts"; 12 12 repo = "cloudctl"; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-oqG9E1sSmpV2S7ywLCBRFs9d3Tbv5uxrbRh5DwpktkA="; 14 + sha256 = "sha256-vqzHZ7DW4ev5soFMcafgL/81k6vCsm6Ds5yto/VheX8="; 15 15 }; 16 16 17 - vendorSha256 = "sha256-+2KgRGQIkTHbVzFIv0FVLWuDegk7pZ/H+u07A1PjM/4="; 17 + vendorSha256 = "sha256-f35Asf9l6ZfixpjMGzesTsxmANreilMxH2CULMH3b2o="; 18 18 19 19 meta = with lib; { 20 20 description = "Command-line client for FI-TS Finance Cloud Native services";
+3 -3
pkgs/tools/security/kbs2/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "kbs2"; 5 - version = "0.4.0"; 5 + version = "0.5.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "woodruffw"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "1bipphrzfz4dfzaqn1q60qazs7ylcx0b34gyl4q6d6jivsrhi8a4"; 11 + sha256 = "sha256-GKjumkeo7aAYaECa6NoXCiXU2kqekBX3wCysRz8seW4="; 12 12 }; 13 13 14 - cargoSha256 = "0r254k85hqf2v8kdhwld8k7b350qjvkwfw2v22ikk2b41b2g4gbw"; 14 + cargoSha256 = "sha256-rJ110kd18V2VGj0AHix3/vI09FG2kJ+TTOYKIthIrjQ="; 15 15 16 16 nativeBuildInputs = [ installShellFiles ] 17 17 ++ lib.optionals stdenv.isLinux [ python3 ];
+4 -4
pkgs/tools/security/rekor/default.nix
··· 4 4 generic = { pname, packageToBuild, description }: 5 5 buildGoModule rec { 6 6 inherit pname; 7 - version = "0.4.0"; 7 + version = "0.5.0"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "sigstore"; 11 11 repo = "rekor"; 12 12 rev = "v${version}"; 13 - sha256 = "sha256-15p4hm4Cvs/yLaQIcxctVdMKRWPjIIFwBcbru6QcjXo="; 13 + sha256 = "sha256-y8klkb0hyITxLhcNWF7RYRVwF8rclDKzQF/MJs6y//Y="; 14 14 }; 15 15 16 - vendorSha256 = "sha256-XCCO4Vamzj5pJFmu1A8mpTLlVAtocrn20myYJVWtBrY="; 16 + vendorSha256 = "sha256-0PPdnE3ND/YNIk50XkgBROpe5OhFiFre5Lwsml02DQU="; 17 17 18 18 nativeBuildInputs = [ installShellFiles ]; 19 19 20 20 subPackages = [ packageToBuild ]; 21 21 22 - ldflags = [ "-s" "-w" "-X github.com/sigstore/rekor/${packageToBuild}/app.GitVersion=v${version}" ]; 22 + ldflags = [ "-s" "-w" "-X github.com/sigstore/rekor/pkg/api.GitVersion=v${version}" ]; 23 23 24 24 postInstall = '' 25 25 installShellCompletion --cmd ${pname} \
+1 -1
pkgs/top-level/all-packages.nix
··· 1238 1238 lilo = callPackage ../tools/misc/lilo { }; 1239 1239 1240 1240 logseq = callPackage ../applications/misc/logseq { 1241 - electron = electron_16; 1241 + electron = electron_15; 1242 1242 }; 1243 1243 1244 1244 natls = callPackage ../tools/misc/natls { };
+2
pkgs/top-level/python-packages.nix
··· 9332 9332 inherit (pkgs) plantuml; 9333 9333 }; 9334 9334 9335 + sphinxcontrib-programoutput = callPackage ../development/python-modules/sphinxcontrib-programoutput { }; 9336 + 9335 9337 sphinxcontrib-qthelp = callPackage ../development/python-modules/sphinxcontrib-qthelp { }; 9336 9338 9337 9339 sphinxcontrib-serializinghtml = callPackage ../development/python-modules/sphinxcontrib-serializinghtml { };