Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
aaaf1218 ce14b50f

+131 -112
+22
nixos/modules/services/web-apps/nextcloud.nix
··· 483 483 path = [ occ ]; 484 484 script = '' 485 485 chmod og+x ${cfg.home} 486 + 487 + ${optionalString (c.dbpassFile != null) '' 488 + if [ ! -r "${c.dbpassFile}" ]; then 489 + echo "dbpassFile ${c.dbpassFile} is not readable by nextcloud:nextcloud! Aborting..." 490 + exit 1 491 + fi 492 + if [ -z "$(<${c.dbpassFile})" ]; then 493 + echo "dbpassFile ${c.dbpassFile} is empty!" 494 + exit 1 495 + fi 496 + ''} 497 + ${optionalString (c.adminpassFile != null) '' 498 + if [ ! -r "${c.adminpassFile}" ]; then 499 + echo "adminpassFile ${c.adminpassFile} is not readable by nextcloud:nextcloud! Aborting..." 500 + exit 1 501 + fi 502 + if [ -z "$(<${c.adminpassFile})" ]; then 503 + echo "adminpassFile ${c.adminpassFile} is empty!" 504 + exit 1 505 + fi 506 + ''} 507 + 486 508 ln -sf ${cfg.package}/apps ${cfg.home}/ 487 509 488 510 # create nextcloud directories.
+3 -3
pkgs/applications/blockchains/polkadot/default.nix
··· 7 7 }: 8 8 rustPlatform.buildRustPackage rec { 9 9 pname = "polkadot"; 10 - version = "0.8.27"; 10 + version = "0.8.28"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "paritytech"; 14 14 repo = "polkadot"; 15 15 rev = "v${version}"; 16 - sha256 = "1zkqmsclhnv14s4mxz7h49kfx8wyi3lyi0dik6jn1fh6w8zr962c"; 16 + sha256 = "sha256-t6ULiTY+4jRfkdSN52A8c3YWznqbI2YVicKwfWJ/dGA="; 17 17 }; 18 18 19 - cargoSha256 = "1j0pr09y5pc43a4rz1zq3h9vmd874zz6z0wd279lpm6p2m0077cs"; 19 + cargoSha256 = "sha256-ag+Xvo1i1WR4oCtGsFIRtUGgd5AIBFsIKblY6TAsUV0="; 20 20 21 21 nativeBuildInputs = [ clang ]; 22 22
+2 -2
pkgs/applications/misc/jotta-cli/default.nix
··· 5 5 in 6 6 stdenv.mkDerivation rec { 7 7 pname = "jotta-cli"; 8 - version = "0.9.38023"; 8 + version = "0.9.39536"; 9 9 src = fetchzip { 10 10 url = "https://repo.jotta.us/archives/linux/${arch}/jotta-cli-${version}_linux_${arch}.tar.gz"; 11 - sha256 = "0whbf7sb4i3g1f6yps3a6l3f0z3dg681ypax4snxw5vchi3h99kc"; 11 + sha256 = "sha256-JZtc6Si3ZQoRG3q+ctzPPQm7WbMYRailIuq/Y5Avd2s="; 12 12 stripRoot = false; 13 13 }; 14 14
+2 -2
pkgs/applications/networking/cluster/terragrunt/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "terragrunt"; 5 - version = "0.28.1"; 5 + version = "0.28.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "gruntwork-io"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-uY0J/w7uIVMd+0N0IeWKWWzQENI6oaLCD4+YUz9BOVA="; 11 + sha256 = "sha256-942PlEoR3ljHecg5RNqqq5cvVzfrIqIbSiV172STiGM="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-lRJerUYafpkXAGf8MEM8SeG3aB86mlMo7iLpeHFAnd4=";
+2 -2
pkgs/applications/networking/instant-messengers/skypeforlinux/default.nix
··· 7 7 8 8 # Please keep the version x.y.0.z and do not update to x.y.76.z because the 9 9 # source of the latter disappears much faster. 10 - version = "8.66.0.74"; 10 + version = "8.68.0.100"; 11 11 12 12 rpath = lib.makeLibraryPath [ 13 13 alsaLib ··· 65 65 "https://mirror.cs.uchicago.edu/skype/pool/main/s/skypeforlinux/skypeforlinux_${version}_amd64.deb" 66 66 "https://web.archive.org/web/https://repo.skype.com/deb/pool/main/s/skypeforlinux/skypeforlinux_${version}_amd64.deb" 67 67 ]; 68 - sha256 = "11bpzr3j6fa5x62xrx2q2sr1wxjrn0a37053j4prxjcvdrc5in8f"; 68 + sha256 = "gHjgQRdNABO+R+fcDurHDAQtZpckIxLbODM6Txz+LH4="; 69 69 } 70 70 else 71 71 throw "Skype for linux is not supported on ${stdenv.hostPlatform.system}";
+2 -2
pkgs/applications/networking/mailreaders/neomutt/default.nix
··· 6 6 }: 7 7 8 8 stdenv.mkDerivation rec { 9 - version = "20201127"; 9 + version = "20210205"; 10 10 pname = "neomutt"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "neomutt"; 14 14 repo = "neomutt"; 15 15 rev = version; 16 - sha256 = "sha256-BkDGKZmpwahDw1vD67CyWfxD93H83kcpv5JBGVL5F/o="; 16 + sha256 = "sha256-ADg/+gmndOiuQHsncOzS5K4chthXeUFz6RRJsrZNeZY="; 17 17 }; 18 18 19 19 buildInputs = [
+2 -2
pkgs/applications/science/astronomy/stellarium/default.nix
··· 6 6 7 7 mkDerivation rec { 8 8 pname = "stellarium"; 9 - version = "0.20.3"; 9 + version = "0.20.4"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "Stellarium"; 13 13 repo = "stellarium"; 14 14 rev = "v${version}"; 15 - sha256 = "08abrshrzhdfcg3b2vzfmnq8fhzrasadg1ajs81kcw96yjc59vak"; 15 + sha256 = "sha256-EhlcaMxlDyX2RneBrpbmLScc9vd77Tf7RPblbQqAqZ0="; 16 16 }; 17 17 18 18 nativeBuildInputs = [ cmake perl wrapQtAppsHook ];
+5 -4
pkgs/applications/science/biology/blast/default.nix
··· 1 - { lib, stdenv, fetchurl, zlib, bzip2, perl, cpio, gawk, coreutils, ApplicationServices }: 1 + { lib, stdenv, buildPackages, fetchurl, zlib, bzip2, perl, cpio, gawk, coreutils, ApplicationServices }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "blast"; 5 - version = "2.10.0"; 5 + version = "2.11.0"; 6 6 7 7 src = fetchurl { 8 - url = "ftp://ftp.ncbi.nlm.nih.gov/blast/executables/blast+/${version}/ncbi-blast-${version}+-src.tar.gz"; 9 - sha256 = "09nry5knj5hhxpn0a5ww1gb1704grd4r1y7adbjl6kqwq37dkk9s"; 8 + url = "https://ftp.ncbi.nlm.nih.gov/blast/executables/blast+/${version}/ncbi-blast-${version}+-src.tar.gz"; 9 + sha256 = "0m0r9vkw631ky1za1wilsfk9k9spwqh22nkrb9a57rbwmrc1i3nq"; 10 10 }; 11 11 12 12 sourceRoot = "ncbi-blast-${version}+-src/c++"; ··· 75 75 --replace /bin/date ${coreutils}/bin/date 76 76 ''; 77 77 78 + depsBuildBuild = [ buildPackages.stdenv.cc ]; 78 79 nativeBuildInputs = [ perl ]; 79 80 80 81 # perl is necessary in buildInputs so that installed perl scripts get patched
+1 -7
pkgs/applications/science/biology/blast/no_slash_bin.patch
··· 171 171 GREP = @GREP@ 172 172 --- ncbi-blast-2.9.0+-src/src/build-system/configure 2019-03-05 00:49:08.000000000 +0800 173 173 +++ ncbi-blast-2.9.0+-src.patched/src/build-system/configure 2019-05-15 16:55:40.711795042 +0800 174 - @@ -10417,10 +10417,6 @@ 175 - echo "${ECHO_T}no, using $LN_S" >&6; } 176 - fi 177 - 174 + @@ -10417,4 +10417,0 @@ 178 175 -case "$LN_S" in 179 176 - /*) ;; 180 177 - * ) LN_S=/bin/$LN_S ;; 181 178 -esac 182 - 183 - if test -n "$ac_tool_prefix"; then 184 - # Extract the first word of "${ac_tool_prefix}ranlib", so it can be a program name with args.
+4 -3
pkgs/applications/science/robotics/qgroundcontrol/default.nix
··· 6 6 7 7 mkDerivation rec { 8 8 pname = "qgroundcontrol"; 9 - version = "4.0.11"; 9 + version = "4.1.1"; 10 10 11 11 qtInputs = [ 12 12 qtbase qtcharts qtlocation qtserialport qtsvg qtquickcontrols2 ··· 27 27 ''; 28 28 29 29 qmakeFlags = [ 30 + "CONFIG+=StableBuild" 30 31 # Default install tries to copy Qt files into package 31 32 "CONFIG+=QGC_DISABLE_BUILD_SETUP" 32 33 "../qgroundcontrol.pro" ··· 42 43 cp -v deploy/qgroundcontrol.desktop $out/share/applications 43 44 44 45 mkdir -p $out/bin 45 - cp -v build/release/QGroundControl "$out/bin/" 46 + cp -v build/staging/QGroundControl "$out/bin/" 46 47 47 48 mkdir -p $out/share/qgroundcontrol 48 49 cp -rv resources/ $out/share/qgroundcontrol ··· 62 63 owner = "mavlink"; 63 64 repo = pname; 64 65 rev = "v${version}"; 65 - sha256 = "14pk1vmcpg2cc5p100chbhnynclcwyqmyb2n2w11vvk0l2c9z1gz"; 66 + sha256 = "1dji7jmwsrgcgzhra94wrgz67ydsdra7p10fw8gbw54gf6ncjfjm"; 66 67 fetchSubmodules = true; 67 68 }; 68 69
+7 -11
pkgs/applications/terminal-emulators/st/xst.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, pkg-config, libX11, ncurses, libXext, libXft, fontconfig }: 2 2 3 - with lib; 4 - 5 - let 6 - version = "0.7.2"; 7 - name = "xst-${version}"; 8 - in stdenv.mkDerivation { 9 - inherit name; 3 + stdenv.mkDerivation rec { 4 + pname = "xst"; 5 + version = "0.8.4.1"; 10 6 11 7 src = fetchFromGitHub { 12 8 owner = "gnotclub"; 13 - repo = "xst"; 9 + repo = pname; 14 10 rev = "v${version}"; 15 - sha256 = "1fplgy30gyrwkjsw3z947327r98i13zd1whwkplpj9fzckhb9vs9"; 11 + sha256 = "nOJcOghtzFkl7B/4XeXptn2TdrGQ4QTKBo+t+9npxOA="; 16 12 }; 17 13 18 14 nativeBuildInputs = [ pkg-config ]; ··· 22 18 TERMINFO=$out/share/terminfo make install PREFIX=$out 23 19 ''; 24 20 25 - meta = { 26 - homepage = "https://github.com/neeasade/xst"; 21 + meta = with lib; { 22 + homepage = "https://github.com/gnotclub/xst"; 27 23 description = "Simple terminal fork that can load config from Xresources"; 28 24 license = licenses.mit; 29 25 maintainers = [ maintainers.vyp ];
+3 -4
pkgs/applications/window-managers/labwc/default.nix
··· 20 20 21 21 stdenv.mkDerivation rec { 22 22 pname = "labwc"; 23 - version = "unstable-2021-01-12"; 23 + version = "unstable-2021-02-06"; 24 24 25 25 src = fetchFromGitHub { 26 26 owner = "johanmalm"; 27 27 repo = pname; 28 - rev = "2a7086d9f7367d4a81bce58a6f7fc6614bbfbdb3"; 29 - sha256 = "ECwEbWkCjktNNtbLSCflOVlEyxkg4XTfRevq7+qQ2IA="; 28 + rev = "4a8fcf5c6d0b730b1e2e17e544ce7d7d3c72cd13"; 29 + sha256 = "g1ba8dchUN393eis0VAu1bIjQfthDGLaSijSavz4lfU="; 30 30 }; 31 31 32 32 nativeBuildInputs = [ pkg-config meson ninja pandoc ]; ··· 54 54 platforms = platforms.unix; 55 55 }; 56 56 } 57 - # TODO: report a SIGSEGV when labwc starts inside a started Wayland window
+3 -1
pkgs/development/ocaml-modules/ocaml-migrate-parsetree/1.8.x.nix
··· 1 - { lib, fetchFromGitHub, buildDunePackage, result, ppx_derivers }: 1 + { lib, fetchFromGitHub, buildDunePackage, ocaml, result, ppx_derivers }: 2 2 3 3 buildDunePackage rec { 4 4 pname = "ocaml-migrate-parsetree"; 5 5 version = "1.8.0"; 6 + 7 + useDune2 = lib.versionAtLeast ocaml.version "4.08"; 6 8 7 9 src = fetchFromGitHub { 8 10 owner = "ocaml-ppx";
+2 -2
pkgs/development/python-modules/buildbot/default.nix
··· 25 25 26 26 package = buildPythonPackage rec { 27 27 pname = "buildbot"; 28 - version = "2.10.0"; 28 + version = "2.10.1"; 29 29 30 30 src = fetchPypi { 31 31 inherit pname version; 32 - sha256 = "06fgp5gpacyx1sqh1f6590r792d5lhzspwmjli592ajx69ckzzwf"; 32 + sha256 = "0jmgpvgn36kfc1sa27a1l1g26dawhl99a1wl8gn4ajbcbcvc2pkh"; 33 33 }; 34 34 35 35 propagatedBuildInputs = [
+1 -1
pkgs/development/python-modules/buildbot/pkg.nix
··· 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "1wr8fxa80c6vq55zv7k9rf61r805flrhd2v28qfl05jz1inghysb"; 9 + sha256 = "0ymqkjz1zk4gs0hkxjh07napc4k24xxb8f3pganw27fca60xcii0"; 10 10 }; 11 11 12 12 postPatch = ''
+5 -5
pkgs/development/python-modules/buildbot/plugins.nix
··· 7 7 8 8 src = fetchPypi { 9 9 inherit pname version; 10 - sha256 = "0bzn00qqx0xd9r4rrz01y9zmiwjlhcanrs13r1yzp2mycn9q5865"; 10 + sha256 = "0x2k95lwx2gz2zj2ys646qiylhyqzlbiqf1k3q1l8w1wlggwv3xp"; 11 11 }; 12 12 13 13 # Remove unneccessary circular dependency on buildbot ··· 34 34 35 35 src = fetchPypi { 36 36 inherit pname version; 37 - sha256 = "0yh0dpg27gl3pk3nimj1yb6rw7kxvsv1bvzc6hbcfx3a9qdajicj"; 37 + sha256 = "0fpam6x8x207la1xrr8m45yx35r646iizrs4gsaghlysmr95jb3i"; 38 38 }; 39 39 40 40 buildInputs = [ buildbot-pkg ]; ··· 56 56 57 57 src = fetchPypi { 58 58 inherit pname version; 59 - sha256 = "0b9fffr53wfq328csrqgdinafbs1v5s7yn4ky8faw6sqyd8l197v"; 59 + sha256 = "0ari338hmi1bb1pln3mxv4k9aclbcby6z3km61wg3va511qhrrbq"; 60 60 }; 61 61 62 62 buildInputs = [ buildbot-pkg ]; ··· 78 78 79 79 src = fetchPypi { 80 80 inherit pname version; 81 - sha256 = "0pz1kmq731ap79l05l13f10r81lzgif5aydpsfz3k5fa9flvxjxs"; 81 + sha256 = "0a5nrklyzfasaa119y4ivr7449rvsgifpkyravinacrl1g9phlls"; 82 82 }; 83 83 84 84 buildInputs = [ buildbot-pkg ]; ··· 100 100 101 101 src = fetchPypi { 102 102 inherit pname version; 103 - sha256 = "1jf72dzmgwrkqbr2f8s2dvf0zpvl3vbdq0qsf0g8xal272l7cmca"; 103 + sha256 = "0rris2p7ic9p9ms3qcczia4nn5mb1yx2gv5mlnmg2yligjad2jaf"; 104 104 }; 105 105 106 106 buildInputs = [ buildbot-pkg ];
+1 -1
pkgs/development/python-modules/buildbot/worker.nix
··· 7 7 8 8 src = fetchPypi { 9 9 inherit pname version; 10 - sha256 = "1s51ycgnvjbxc2y358vw6rnw8xsx9grj6pxzfxjrph784igy22r0"; 10 + sha256 = "10ap7jlxs9vcmnyafr62mxlgsp709165nw55xmv9sw18r7m8wsm6"; 11 11 }; 12 12 13 13 propagatedBuildInputs = [ twisted future ];
+1 -2
pkgs/development/python-modules/cytoolz/default.nix
··· 22 22 checkInputs = [ nose ]; 23 23 propagatedBuildInputs = [ toolz ]; 24 24 25 - # Failing test https://github.com/pytoolz/cytoolz/issues/122 26 25 checkPhase = '' 27 - NOSE_EXCLUDE=test_introspect_builtin_modules nosetests -v $out/${python.sitePackages} 26 + nosetests -v $out/${python.sitePackages} 28 27 ''; 29 28 30 29 meta = {
+2 -2
pkgs/development/python-modules/django/2.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "Django"; 9 - version = "2.2.17"; 9 + version = "2.2.18"; 10 10 11 11 disabled = !isPy3k; 12 12 13 13 src = fetchPypi { 14 14 inherit pname version; 15 - sha256 = "cf5370a4d7765a9dd6d42a7b96b53c74f9446cd38209211304b210fe0404b861"; 15 + sha256 = "1d0b91343i9n0qz8xia1fbm4s3q8wi98nyc9a3acncm0w3sr9jf9"; 16 16 }; 17 17 18 18 patches = lib.optional withGdal
+9 -8
pkgs/development/python-modules/html2text/default.nix
··· 1 - { lib, buildPythonPackage, fetchFromGitHub, pythonOlder 2 - , pytest 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , pythonOlder 5 + , pytestCheckHook 3 6 }: 4 7 5 8 buildPythonPackage rec { ··· 14 17 sha256 = "1y924clp2hiqg3a9437z808p29mqcx537j5fmz71plx8qrcm5jf9"; 15 18 }; 16 19 17 - # python setup.py test is broken, use pytest 18 - checkInputs = [ pytest ]; 19 - checkPhase = '' 20 - pytest 21 - ''; 20 + checkInputs = [ pytestCheckHook ]; 21 + 22 + pythonImportsCheck = [ "html2text" ]; 22 23 23 24 meta = with lib; { 24 25 description = "Turn HTML into equivalent Markdown-structured text"; 25 26 homepage = "https://github.com/Alir3z4/html2text/"; 26 - license = licenses.gpl3; 27 + license = licenses.gpl3Only; 27 28 }; 28 29 }
+4 -2
pkgs/development/python-modules/pelican/default.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "pelican"; 9 - version = "4.5.0"; 9 + version = "4.5.4"; 10 10 11 11 disabled = isPy27; 12 12 ··· 14 14 owner = "getpelican"; 15 15 repo = "pelican"; 16 16 rev = version; 17 - sha256 = "0p8p84fcpkr19d54dhxvldd8ijbg334wmrmkr99pnbrdl1gf64qi"; 17 + sha256 = "08l8kk3c7ca1znxmgdmfgzn28dzjcziwflzq80fn9zigqj0y7fi8"; 18 18 # Remove unicode file names which leads to different checksums on HFS+ 19 19 # vs. other filesystems because of unicode normalisation. 20 20 extraPostFetch = '' ··· 27 27 # Exclude custom locale test, which files were removed above to fix the source checksum 28 28 checkPhase = '' 29 29 nosetests -s \ 30 + --exclude=test_basic_generation_works \ 31 + --exclude=test_custom_generation_works \ 30 32 --exclude=test_custom_locale_generation_works \ 31 33 --exclude=test_log_filter \ 32 34 pelican
+2 -2
pkgs/development/tools/jbang/default.nix
··· 1 1 { stdenv, lib, fetchzip, jdk, makeWrapper, coreutils, curl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - version = "0.63.0"; 4 + version = "0.65.1"; 5 5 pname = "jbang"; 6 6 7 7 src = fetchzip { 8 8 url = "https://github.com/jbangdev/jbang/releases/download/v${version}/${pname}-${version}.tar"; 9 - sha256 = "sha256-g3ARa69FvCfs8a3vbQuse8JvRlPXT6ysfmvZAUYnnA4="; 9 + sha256 = "sha256-Puddnem03RGORKkvcLy5o/eOzKzrOuRvqPk5FsjQ3Lw="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/development/tools/misc/clojure-lsp/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "clojure-lsp"; 5 - version = "2021.02.02-14.02.23"; 5 + version = "2021.02.05-15.32.53"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/clojure-lsp/clojure-lsp/releases/download/${version}/${pname}.jar"; 9 - sha256 = "sha256-NwaUIaGkSB+oVd/OArp+bs01ZDAFy5JJ4ic5sMDYg8s="; 9 + sha256 = "sha256-kKjgAO3DEpZOm91Tzkhj4rmNOaacZi74o/qfp8n11Z4="; 10 10 }; 11 11 12 12 dontUnpack = true;
+3 -3
pkgs/development/tools/misc/terraform-ls/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "terraform-ls"; 5 - version = "0.12.0"; 5 + version = "0.13.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "hashicorp"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "w9PLKLFjKehtub1LbVX9TbvKkj/S1t0MwZIZurF2x18="; 11 + sha256 = "sha256-0WbUJYNRBKixRFl+YM1uSEltQneB6FYPFHNVVhmdseA="; 12 12 }; 13 - vendorSha256 = "J8ovcUeQsb58Bq/EM9mvYqtuDY1bXTEVCC9/AH+UttU="; 13 + vendorSha256 = "sha256-WYTn2QoI1Z3L4Wxjrq0YT++X9vMA1Wm3zgl08CYiU1Y="; 14 14 15 15 # tests fail in sandbox mode because of trying to download stuff from releases.hashicorp.com 16 16 doCheck = false;
+3 -3
pkgs/development/tools/the-way/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "the-way"; 5 - version = "0.12.1"; 5 + version = "0.13.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "out-of-cheese-error"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "0lvkrfszmn594n9qkf518c38c0fwzm32y997wlf28l3hpj6yqddq"; 11 + sha256 = "sha256-OqJceRO1RFOLgNi3SbTKLw62tSfJSO7T2/u0RTX89AM="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ installShellFiles ]; 15 15 16 16 buildInputs = lib.optionals stdenv.isDarwin [ AppKit Security ]; 17 17 18 - cargoSha256 = "1aiyfsvmrqcmlw0z1944i9s5g3yxc39na5mf16pb9a4bhw8zcwjr"; 18 + cargoSha256 = "sha256-jTZso61Lyt6jprBxBAhvchgOsgM9y1qBleTxUx1jCnE="; 19 19 checkFlagsArray = lib.optionals stdenv.isDarwin [ "--skip=copy" ]; 20 20 cargoParallelTestThreads = false; 21 21
+2 -2
pkgs/os-specific/solo5/default.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, libseccomp, util-linux, qemu }: 2 2 3 - let version = "0.6.7"; 3 + let version = "0.6.8"; 4 4 in stdenv.mkDerivation { 5 5 pname = "solo5"; 6 6 inherit version; ··· 11 11 src = fetchurl { 12 12 url = 13 13 "https://github.com/Solo5/solo5/releases/download/v${version}/solo5-v${version}.tar.gz"; 14 - sha256 = "05k9adg3440zk5baa6ry8z5dj8d8r8hvzafh2469pdgcnr6h45gr"; 14 + sha256 = "sha256-zrxNCXJIuEbtE3YNRK8Bxu2koHsQkcF+xItoIyhj9Uc="; 15 15 }; 16 16 17 17 hardeningEnable = [ "pie" ];
+2 -2
pkgs/servers/nextcloud/default.nix
··· 58 58 }; 59 59 60 60 nextcloud20 = generic { 61 - version = "20.0.6"; 62 - sha256 = "859167170402b876b6ef1a37fa4aaa5617b6bf847bb5d50a94f636bae65a34b9"; 61 + version = "20.0.7"; 62 + sha256 = "sha256-jO2Ct3K/CvZ9W+EyPkD5d0KbwKK8yGQJXvx4dnUAtys="; 63 63 }; 64 64 }
+3 -3
pkgs/servers/swego/default.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "swego"; 9 - version = "0.7"; 9 + version = "0.9"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "nodauf"; 13 13 repo = "Swego"; 14 14 rev = "v${version}"; 15 - sha256 = "14qww4ndvrxmrgkggr8hyvfpz2v7fw0vq6s8715mxa28f8pfi78b"; 15 + sha256 = "sha256-Wt+2spZfgBWzZEQP+SiDYI5DdLKrwFMgYT1ukbF4x0I="; 16 16 }; 17 17 18 - vendorSha256 = "068drahh0aysrm8cr5pgik27jqyk28bsx5130mc2v3xd0xmk8yp1"; 18 + vendorSha256 = "sha256-EPcyhnTis7g0uVl+cJdG7iMbisjh7iuMhpzM/SSOeFI="; 19 19 20 20 postInstall = '' 21 21 mv $out/bin/src $out/bin/$pname
+3 -3
pkgs/servers/traefik/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "traefik"; 5 - version = "2.3.4"; 5 + version = "2.4.2"; 6 6 7 7 src = fetchzip { 8 8 url = "https://github.com/traefik/traefik/releases/download/v${version}/traefik-v${version}.src.tar.gz"; 9 - sha256 = "1vdnd6nb8bfiwd51rrqhrc9p8lh3fhny49lapgbzk36ynqc97bi5"; 9 + sha256 = "sha256-W6NtlIxeRg432RTiaJHu25Izv1VWNqYetzilCr2gPjU="; 10 10 stripRoot = false; 11 11 }; 12 12 13 - vendorSha256 = "0h3j0b034yh70c9bscj1k1jy8igsr7p0i014yr0zl7wlc6s6c9bp"; 13 + vendorSha256 = "sha256-kwA0MtmlUEO1eQFr4NpdsMikEFQc3N3Meolw/xw9dgM="; 14 14 15 15 doCheck = false; 16 16
+2 -2
pkgs/tools/backup/dump/default.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "dump"; 9 - version = "0.4b46"; 9 + version = "0.4b47"; 10 10 11 11 src = fetchurl { 12 12 url = "mirror://sourceforge/dump/dump-${version}.tar.gz"; 13 - sha256 = "15rg5y15ak0ppqlhcih78layvg7cwp6hc16p3c58xs8svlkxjqc0"; 13 + sha256 = "sha256-0CGs3k+77T2T662YFCL2cfSNZrKeyI196DZC7Pv/T9A="; 14 14 }; 15 15 16 16 buildInputs = [ e2fsprogs pkg-config ncurses readline ];
+2 -2
pkgs/tools/misc/docker-ls/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "docker-ls"; 5 - version = "0.5.0"; 5 + version = "0.5.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "mayflower"; 9 9 repo = "docker-ls"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-VyVrCBdIZAQ+p0leD6i4sMxD4p6nEXG9Si+nJGdUQPM="; 11 + sha256 = "sha256-4+REt0NH4S367qFsyJncVedUrC4t1zw5o0CLTiQfIz8="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-UulcjQOLEIP++eoYQTEIbCJW51jyE312dMxB8+AKcdU=";
+2 -2
pkgs/tools/misc/oppai-ng/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "oppai-ng"; 7 - version = "3.3.0"; 7 + version = "4.0.0"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "Francesco149"; 11 11 repo = pname; 12 12 rev = version; 13 - sha256 = "0ymprwyv92pr58851wzryymhfznnpwcbg4m1yri0c9cyzvabwmfk"; 13 + sha256 = "sha256-fUtyQaHcNBmDs1BPbFGieKY/CFyETqBxYzzIXSERFJY="; 14 14 }; 15 15 16 16 buildPhase = ''
+2 -2
pkgs/tools/misc/wob/default.nix
··· 5 5 6 6 stdenv.mkDerivation rec { 7 7 pname = "wob"; 8 - version = "0.10"; 8 + version = "0.11"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "francma"; 12 12 repo = pname; 13 13 rev = version; 14 - sha256 = "0v7xm8zd9237v5j5h79pd0x6dkal5fgg1ly9knssjpv3hswwyv40"; 14 + sha256 = "13mx6nzab6msp57s9mv9ambz53a4zkafms9v97xv5zvd6xarnrya"; 15 15 }; 16 16 17 17 nativeBuildInputs = [ meson ninja pkg-config scdoc wayland ];
+3 -3
pkgs/tools/networking/tendermint/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "tendermint"; 5 - version = "0.34.0"; 5 + version = "0.34.3"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "tendermint"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "1fnykdk35937ld8dyzjs571klz187jr8wlj8ljn78pajx1cd84k6"; 11 + sha256 = "sha256-tkIoLYfqlnyyAAgEKyQgE317uwyhc8xRTCTUXi+9r9s="; 12 12 }; 13 13 14 - vendorSha256 = "19qx7ab6ar609cxxdsb9i2c3h7icqgf5bhi28lnsdk3bdjxr27vz"; 14 + vendorSha256 = "sha256-DviK+MkJwcv2Dhwmqra5G/fTaWxXFbUSUVnAkSHjeII="; 15 15 16 16 doCheck = false; 17 17
+3 -3
pkgs/tools/networking/tox-node/default.nix
··· 7 7 8 8 buildRustPackage rec { 9 9 pname = "tox-node"; 10 - version = "0.1.0"; 10 + version = "0.1.1"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "tox-rs"; 14 14 repo = "tox-node"; 15 15 rev = "v${version}"; 16 - sha256 = "0bar42nigjwn7dq48rmg74sm3gnfqvb6gnd9g1n0i8nmynd00wvn"; 16 + sha256 = "sha256-tB6v2NEBdTNHf89USdQOr/pV0mbxxb8ftOYPPJMvz5Y="; 17 17 }; 18 18 19 19 buildInputs = [ libsodium openssl ]; ··· 31 31 32 32 doCheck = false; 33 33 34 - cargoSha256 = "087ccb824hmmxmnn5c2bzww2q888a8zy6y7rwgsdfr8rbay2c909"; 34 + cargoSha256 = "sha256-kCT2ulB+c2OlsABkyXyzrHfD/G92EPCdTO34FR5oSws="; 35 35 36 36 meta = with lib; { 37 37 description = "A server application to run tox node written in pure Rust";
+3 -3
pkgs/tools/security/terrascan/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "terrascan"; 8 - version = "1.2.0"; 8 + version = "1.3.2"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "accurics"; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - sha256 = "1kjis0ylvmv1gvzp5qvi9a7x4611bjv8yx5mb6nkc0a8lscwb4c3"; 14 + sha256 = "sha256-RZFh9RVU8RwtLGIP7OWnf0yNsXfElqWSXieljqp8ahU="; 15 15 }; 16 16 17 - vendorSha256 = "0yfybzwjvnan4qf5w25k22iwh5hp9v8si93p4jv9bx25rw91swws"; 17 + vendorSha256 = "sha256-Ya/33ocPhY5OSnCEyULsOIHaxwb1yNEle3JEYo/7/Yk="; 18 18 19 19 # tests want to download a vulnerable Terraform project 20 20 doCheck = false;
+2 -2
pkgs/tools/security/vault/default.nix
··· 2 2 3 3 buildGoPackage rec { 4 4 pname = "vault"; 5 - version = "1.6.1"; 5 + version = "1.6.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "hashicorp"; 9 9 repo = "vault"; 10 10 rev = "v${version}"; 11 - sha256 = "1pgyyl2zgnr3wy4k8c5xsk2s5dpl97xdfq67lpfss7fz1bij8x47"; 11 + sha256 = "1g6fz6dl90cb5pnvvmkndqgncfjy50j9jw3xzn8s91yzvvld8ds7"; 12 12 }; 13 13 14 14 goPackagePath = "github.com/hashicorp/vault";
+5 -5
pkgs/tools/security/vault/vault-bin.nix
··· 1 1 { lib, stdenv, fetchurl, unzip }: 2 2 3 3 let 4 - version = "1.6.1"; 4 + version = "1.6.2"; 5 5 6 6 sources = let 7 7 base = "https://releases.hashicorp.com/vault/${version}"; 8 8 in { 9 9 x86_64-linux = fetchurl { 10 10 url = "${base}/vault_${version}_linux_amd64.zip"; 11 - sha256 = "1la2pylcj9y5gr7hr4aaa49427y3lgxi2phhl46pqmr7an62pkbm"; 11 + sha256 = "1vcxnky8qnn2ib33r9604cbjrgm939ddrhwqcjylbv217cmc9alf"; 12 12 }; 13 13 i686-linux = fetchurl { 14 14 url = "${base}/vault_${version}_linux_386.zip"; 15 - sha256 = "1a2rhv5bpv43qp74a49msrwr7djzy86irsn73jl0xnkh0k6ijci1"; 15 + sha256 = "0mcav36dcmvky8v4y65jvh837i72aqz7arv2ivjpajym3gf7qrq1"; 16 16 }; 17 17 x86_64-darwin = fetchurl { 18 18 url = "${base}/vault_${version}_darwin_amd64.zip"; 19 - sha256 = "0snswwai2ya26crm3ksifrmbdnajr36v4vamh7g65plg6vzban9a"; 19 + sha256 = "1is7s445jc4ll2lyfxgjwwl89fly1l8kskqp2p8z179d8hhgd0ms"; 20 20 }; 21 21 aarch64-linux = fetchurl { 22 22 url = "${base}/vault_${version}_linux_arm64.zip"; 23 - sha256 = "0ix99da3xd4z200dgvpfc2h1sfx6l8cipichvfjlj39md45grs89"; 23 + sha256 = "0i5d87a393464r68rjv83bjhg51yaysccqbwaaydmzk1m45icg7x"; 24 24 }; 25 25 }; 26 26
+2
pkgs/tools/system/gotop/default.nix
··· 14 14 runVend = true; 15 15 vendorSha256 = "sha256-GcIaUIuTiSY1aKxRtclfl7hMNaZZx4uoVG7ahjF/4Hs="; 16 16 17 + buildFlagsArray = [ "-ldflags=-s -w -X main.Version=v${version}" ]; 18 + 17 19 preCheck = '' 18 20 export HOME=$(mktemp -d) 19 21 '';
+2 -2
pkgs/tools/typesetting/lowdown/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "lowdown"; 5 - version = "0.7.9"; 5 + version = "0.8.0"; 6 6 7 7 outputs = [ "out" "lib" "dev" "man" ]; 8 8 9 9 src = fetchurl { 10 10 url = "https://kristaps.bsd.lv/lowdown/snapshots/lowdown-${version}.tar.gz"; 11 - sha512 = "18q8i8lh8w127vzw697n0bzv4mchhna1p4s672hjvy39l3ls8rlj5nwq5npr5fry06yil62sjmq4652vw29r8l49wwk5j82a8l2nr7c"; 11 + sha512 = "17w0hldlg7x0f4946bz1pmgkpp08dha3myz8pk0rx8n2lqlw76f3n9giq69kw82sgzg7qqy31sl9mxvgaxyf6hcdgmxnkr7h8d9xmak"; 12 12 }; 13 13 14 14 nativeBuildInputs = [ which ]