lol

Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
b30088fc c92b3924

+2804 -1237
+10
lib/licenses.nix
··· 114 114 fullName = "Bitstream Vera Font License"; 115 115 }; 116 116 117 + bitTorrent10 = { 118 + spdxId = "BitTorrent-1.0"; 119 + fullName = " BitTorrent Open Source License v1.0"; 120 + }; 121 + 122 + bitTorrent11 = { 123 + spdxId = "BitTorrent-1.1"; 124 + fullName = " BitTorrent Open Source License v1.1"; 125 + }; 126 + 117 127 bola11 = { 118 128 url = "https://blitiri.com.ar/p/bola/"; 119 129 fullName = "Buena Onda License Agreement 1.1";
+12
maintainers/maintainer-list.nix
··· 13684 13684 githubId = 57048005; 13685 13685 name = "snicket2100"; 13686 13686 }; 13687 + sno2wman = { 13688 + name = "SnO2WMaN"; 13689 + email = "me@sno2wman.net"; 13690 + github = "sno2wman"; 13691 + githubId = 15155608; 13692 + }; 13687 13693 snpschaaf = { 13688 13694 email = "philipe.schaaf@secunet.com"; 13689 13695 name = "Philippe Schaaf"; ··· 15302 15308 github = "Valodim"; 15303 15309 githubId = 27813; 15304 15310 name = "Vincent Breitmoser"; 15311 + }; 15312 + vamega = { 15313 + email = "github@madiathv.com"; 15314 + github = "vamega"; 15315 + githubId = 223408; 15316 + name = "Varun Madiath"; 15305 15317 }; 15306 15318 vandenoever = { 15307 15319 email = "jos@vandenoever.info";
+87 -12
nixos/doc/manual/from_md/release-notes/rl-2305.section.xml
··· 423 423 </listitem> 424 424 <listitem> 425 425 <para> 426 + Nebula now runs as a system user and group created for each 427 + nebula network, using the <literal>CAP_NET_ADMIN</literal> 428 + ambient capability on launch rather than starting as root. 429 + Ensure that any files each Nebula instance needs to access are 430 + owned by the correct user and group, by default 431 + <literal>nebula-${networkName}</literal>. 432 + </para> 433 + </listitem> 434 + <listitem> 435 + <para> 426 436 In <literal>mastodon</literal> it is now necessary to specify 427 437 location of file with <literal>PostgreSQL</literal> database 428 438 password. In ··· 512 522 <para> 513 523 A few openssh options have been moved from extraConfig to the 514 524 new freeform option <literal>settings</literal> and renamed as 515 - follow: 516 - <literal>services.openssh.kbdInteractiveAuthentication</literal> 517 - to 518 - <literal>services.openssh.settings.KbdInteractiveAuthentication</literal>, 519 - <literal>services.openssh.passwordAuthentication</literal> to 520 - <literal>services.openssh.settings.PasswordAuthentication</literal>, 521 - <literal>services.openssh.useDns</literal> to 522 - <literal>services.openssh.settings.UseDns</literal>, 523 - <literal>services.openssh.permitRootLogin</literal> to 524 - <literal>services.openssh.settings.PermitRootLogin</literal>, 525 - <literal>services.openssh.logLevel</literal> to 526 - <literal>services.openssh.settings.LogLevel</literal>. 525 + follows: 527 526 </para> 527 + <itemizedlist spacing="compact"> 528 + <listitem> 529 + <para> 530 + <literal>services.openssh.forwardX11</literal> to 531 + <literal>services.openssh.settings.X11Forwarding</literal> 532 + </para> 533 + </listitem> 534 + <listitem> 535 + <para> 536 + <literal>services.openssh.kbdInteractiveAuthentication</literal> 537 + -&gt; 538 + <literal>services.openssh.settings.KbdInteractiveAuthentication</literal> 539 + </para> 540 + </listitem> 541 + <listitem> 542 + <para> 543 + <literal>services.openssh.passwordAuthentication</literal> 544 + to 545 + <literal>services.openssh.settings.PasswordAuthentication</literal> 546 + </para> 547 + </listitem> 548 + <listitem> 549 + <para> 550 + <literal>services.openssh.useDns</literal> to 551 + <literal>services.openssh.settings.UseDns</literal> 552 + </para> 553 + </listitem> 554 + <listitem> 555 + <para> 556 + <literal>services.openssh.permitRootLogin</literal> to 557 + <literal>services.openssh.settings.PermitRootLogin</literal> 558 + </para> 559 + </listitem> 560 + <listitem> 561 + <para> 562 + <literal>services.openssh.logLevel</literal> to 563 + <literal>services.openssh.settings.LogLevel</literal> 564 + </para> 565 + </listitem> 566 + <listitem> 567 + <para> 568 + <literal>services.openssh.kexAlgorithms</literal> to 569 + <literal>services.openssh.settings.KexAlgorithms</literal> 570 + </para> 571 + </listitem> 572 + <listitem> 573 + <para> 574 + <literal>services.openssh.macs</literal> to 575 + <literal>services.openssh.settings.Macs</literal> 576 + </para> 577 + </listitem> 578 + <listitem> 579 + <para> 580 + <literal>services.openssh.cyphers</literal> to 581 + <literal>services.openssh.settings.Cyphers</literal> 582 + </para> 583 + </listitem> 584 + <listitem> 585 + <para> 586 + <literal>services.openssh.gatewayPorts</literal> to 587 + <literal>services.openssh.settings.GatewayPorts</literal> 588 + </para> 589 + </listitem> 590 + </itemizedlist> 528 591 </listitem> 529 592 <listitem> 530 593 <para> ··· 801 864 <link xlink:href="options.html#opt-services.garage.package">services.garage.package</link> 802 865 or upgrade accordingly 803 866 <link xlink:href="options.html#opt-system.stateVersion">system.stateVersion</link>. 867 + </para> 868 + </listitem> 869 + <listitem> 870 + <para> 871 + Nebula now supports the 872 + <literal>services.nebula.networks.&lt;name&gt;.isRelay</literal> 873 + and 874 + <literal>services.nebula.networks.&lt;name&gt;.relays</literal> 875 + configuration options for setting up or allowing traffic 876 + relaying. See the 877 + <link xlink:href="https://www.defined.net/blog/announcing-relay-support-in-nebula/">announcement</link> 878 + for more details about relays. 804 879 </para> 805 880 </listitem> 806 881 <listitem>
+15 -1
nixos/doc/manual/release-notes/rl-2305.section.md
··· 101 101 102 102 - The [services.wordpress.sites.&lt;name&gt;.plugins](#opt-services.wordpress.sites._name_.plugins) and [services.wordpress.sites.&lt;name&gt;.themes](#opt-services.wordpress.sites._name_.themes) options have been converted from sets to attribute sets to allow for consumers to specify explicit install paths via attribute name. 103 103 104 + - Nebula now runs as a system user and group created for each nebula network, using the `CAP_NET_ADMIN` ambient capability on launch rather than starting as root. Ensure that any files each Nebula instance needs to access are owned by the correct user and group, by default `nebula-${networkName}`. 105 + 104 106 - In `mastodon` it is now necessary to specify location of file with `PostgreSQL` database password. In `services.mastodon.database.passwordFile` parameter default value `/var/lib/mastodon/secrets/db-password` has been changed to `null`. 105 107 106 108 - The `--target-host` and `--build-host` options of `nixos-rebuild` no longer treat the `localhost` value specially – to build on/deploy to local machine, omit the relevant flag. ··· 126 128 127 129 - The module `usbmuxd` now has the ability to change the package used by the daemon. In case you're experiencing issues with `usbmuxd` you can try an alternative program like `usbmuxd2`. Available as [services.usbmuxd.package](#opt-services.usbmuxd.package) 128 130 129 - - A few openssh options have been moved from extraConfig to the new freeform option `settings` and renamed as follow: `services.openssh.kbdInteractiveAuthentication` to `services.openssh.settings.KbdInteractiveAuthentication`, `services.openssh.passwordAuthentication` to `services.openssh.settings.PasswordAuthentication`, `services.openssh.useDns` to `services.openssh.settings.UseDns`, `services.openssh.permitRootLogin` to `services.openssh.settings.PermitRootLogin`, `services.openssh.logLevel` to `services.openssh.settings.LogLevel`. 131 + - A few openssh options have been moved from extraConfig to the new freeform option `settings` and renamed as follows: 132 + - `services.openssh.forwardX11` to `services.openssh.settings.X11Forwarding` 133 + - `services.openssh.kbdInteractiveAuthentication` -> `services.openssh.settings.KbdInteractiveAuthentication` 134 + - `services.openssh.passwordAuthentication` to `services.openssh.settings.PasswordAuthentication` 135 + - `services.openssh.useDns` to `services.openssh.settings.UseDns` 136 + - `services.openssh.permitRootLogin` to `services.openssh.settings.PermitRootLogin` 137 + - `services.openssh.logLevel` to `services.openssh.settings.LogLevel` 138 + - `services.openssh.kexAlgorithms` to `services.openssh.settings.KexAlgorithms` 139 + - `services.openssh.macs` to `services.openssh.settings.Macs` 140 + - `services.openssh.cyphers` to `services.openssh.settings.Cyphers` 141 + - `services.openssh.gatewayPorts` to `services.openssh.settings.GatewayPorts` 130 142 131 143 - `services.mastodon` gained a tootctl wrapped named `mastodon-tootctl` similar to `nextcloud-occ` which can be executed from any user and switches to the configured mastodon user with sudo and sources the environment variables. 132 144 ··· 198 210 - Increased the minimum length of a response that will be gzipped. 199 211 200 212 - [Garage](https://garagehq.deuxfleurs.fr/) version is based on [system.stateVersion](options.html#opt-system.stateVersion), existing installations will keep using version 0.7. New installations will use version 0.8. In order to upgrade a Garage cluster, please follow [upstream instructions](https://garagehq.deuxfleurs.fr/documentation/cookbook/upgrading/) and force [services.garage.package](options.html#opt-services.garage.package) or upgrade accordingly [system.stateVersion](options.html#opt-system.stateVersion). 213 + 214 + - Nebula now supports the `services.nebula.networks.<name>.isRelay` and `services.nebula.networks.<name>.relays` configuration options for setting up or allowing traffic relaying. See the [announcement](https://www.defined.net/blog/announcing-relay-support-in-nebula/) for more details about relays. 201 215 202 216 - `hip` has been separated into `hip`, `hip-common` and `hipcc`. 203 217
+1
nixos/modules/module-list.nix
··· 698 698 ./services/monitoring/arbtt.nix 699 699 ./services/monitoring/bosun.nix 700 700 ./services/monitoring/cadvisor.nix 701 + ./services/monitoring/cockpit.nix 701 702 ./services/monitoring/collectd.nix 702 703 ./services/monitoring/das_watchdog.nix 703 704 ./services/monitoring/datadog-agent.nix
+1 -1
nixos/modules/programs/ssh.nix
··· 282 282 config = { 283 283 284 284 programs.ssh.setXAuthLocation = 285 - mkDefault (config.services.xserver.enable || config.programs.ssh.forwardX11 || config.services.openssh.forwardX11); 285 + mkDefault (config.services.xserver.enable || config.programs.ssh.forwardX11 || config.services.openssh.settings.X11Forwarding); 286 286 287 287 assertions = 288 288 [ { assertion = cfg.forwardX11 -> cfg.setXAuthLocation;
+1 -1
nixos/modules/services/computing/slurm/slurm.nix
··· 383 383 "d /var/spool/slurmd 755 root root -" 384 384 ]; 385 385 386 - services.openssh.forwardX11 = mkIf cfg.client.enable (mkDefault true); 386 + services.openssh.settings.X11Forwarding = mkIf cfg.client.enable (mkDefault true); 387 387 388 388 systemd.services.slurmctld = mkIf (cfg.server.enable) { 389 389 path = with pkgs; [ wrappedSlurm munge coreutils ]
+231
nixos/modules/services/monitoring/cockpit.nix
··· 1 + { pkgs, config, lib, ... }: 2 + 3 + let 4 + cfg = config.services.cockpit; 5 + inherit (lib) types mkEnableOption mkOption mkIf mdDoc literalMD mkPackageOptionMD; 6 + settingsFormat = pkgs.formats.ini {}; 7 + in { 8 + options = { 9 + services.cockpit = { 10 + enable = mkEnableOption (mdDoc "Cockpit"); 11 + 12 + package = mkPackageOptionMD pkgs "Cockpit" { 13 + default = [ "cockpit" ]; 14 + }; 15 + 16 + settings = lib.mkOption { 17 + type = settingsFormat.type; 18 + 19 + default = {}; 20 + 21 + description = mdDoc '' 22 + Settings for cockpit that will be saved in /etc/cockpit/cockpit.conf. 23 + 24 + See the [documentation](https://cockpit-project.org/guide/latest/cockpit.conf.5.html), that is also available with `man cockpit.conf.5` for details. 25 + ''; 26 + }; 27 + 28 + port = mkOption { 29 + description = mdDoc "Port where cockpit will listen."; 30 + type = types.port; 31 + default = 9090; 32 + }; 33 + 34 + openFirewall = mkOption { 35 + description = mdDoc "Open port for cockpit."; 36 + type = types.bool; 37 + default = false; 38 + }; 39 + }; 40 + }; 41 + config = mkIf cfg.enable { 42 + 43 + # expose cockpit-bridge system-wide 44 + environment.systemPackages = [ cfg.package ]; 45 + 46 + # allow cockpit to find its plugins 47 + environment.pathsToLink = [ "/share/cockpit" ]; 48 + 49 + # generate cockpit settings 50 + environment.etc."cockpit/cockpit.conf".source = settingsFormat.generate "cockpit.conf" cfg.settings; 51 + 52 + security.pam.services.cockpit = {}; 53 + 54 + networking.firewall.allowedTCPPorts = mkIf cfg.openFirewall [ cfg.port ]; 55 + 56 + # units are in reverse sort order if you ls $out/lib/systemd/system 57 + # all these units are basically verbatim translated from upstream 58 + 59 + # Translation from $out/lib/systemd/system/systemd-cockpithttps.slice 60 + systemd.slices.system-cockpithttps = { 61 + description = "Resource limits for all cockpit-ws-https@.service instances"; 62 + sliceConfig = { 63 + TasksMax = 200; 64 + MemoryHigh = "75%"; 65 + MemoryMax = "90%"; 66 + }; 67 + }; 68 + 69 + # Translation from $out/lib/systemd/system/cockpit-wsinstance-https@.socket 70 + systemd.sockets."cockpit-wsinstance-https@" = { 71 + unitConfig = { 72 + Description = "Socket for Cockpit Web Service https instance %I"; 73 + BindsTo = [ "cockpit.service" "cockpit-wsinstance-https@%i.service" ]; 74 + # clean up the socket after the service exits, to prevent fd leak 75 + # this also effectively prevents a DoS by starting arbitrarily many sockets, as 76 + # the services are resource-limited by system-cockpithttps.slice 77 + Documentation = "man:cockpit-ws(8)"; 78 + }; 79 + socketConfig = { 80 + ListenStream = "/run/cockpit/wsinstance/https@%i.sock"; 81 + SocketUser = "root"; 82 + SocketMode = "0600"; 83 + }; 84 + }; 85 + 86 + # Translation from $out/lib/systemd/system/cockpit-wsinstance-https@.service 87 + systemd.services."cockpit-wsinstance-https@" = { 88 + description = "Cockpit Web Service https instance %I"; 89 + bindsTo = [ "cockpit.service"]; 90 + path = [ cfg.package ]; 91 + documentation = [ "man:cockpit-ws(8)" ]; 92 + serviceConfig = { 93 + Slice = "system-cockpithttps.slice"; 94 + ExecStart = "${cfg.package}/libexec/cockpit-ws --for-tls-proxy --port=0"; 95 + User = "root"; 96 + Group = ""; 97 + }; 98 + }; 99 + 100 + # Translation from $out/lib/systemd/system/cockpit-wsinstance-http.socket 101 + systemd.sockets.cockpit-wsinstance-http = { 102 + unitConfig = { 103 + Description = "Socket for Cockpit Web Service http instance"; 104 + BindsTo = "cockpit.service"; 105 + Documentation = "man:cockpit-ws(8)"; 106 + }; 107 + socketConfig = { 108 + ListenStream = "/run/cockpit/wsinstance/http.sock"; 109 + SocketUser = "root"; 110 + SocketMode = "0600"; 111 + }; 112 + }; 113 + 114 + # Translation from $out/lib/systemd/system/cockpit-wsinstance-https-factory.socket 115 + systemd.sockets.cockpit-wsinstance-https-factory = { 116 + unitConfig = { 117 + Description = "Socket for Cockpit Web Service https instance factory"; 118 + BindsTo = "cockpit.service"; 119 + Documentation = "man:cockpit-ws(8)"; 120 + }; 121 + socketConfig = { 122 + ListenStream = "/run/cockpit/wsinstance/https-factory.sock"; 123 + Accept = true; 124 + SocketUser = "root"; 125 + SocketMode = "0600"; 126 + }; 127 + }; 128 + 129 + # Translation from $out/lib/systemd/system/cockpit-wsinstance-https-factory@.service 130 + systemd.services."cockpit-wsinstance-https-factory@" = { 131 + description = "Cockpit Web Service https instance factory"; 132 + documentation = [ "man:cockpit-ws(8)" ]; 133 + path = [ cfg.package ]; 134 + serviceConfig = { 135 + ExecStart = "${cfg.package}/libexec/cockpit-wsinstance-factory"; 136 + User = "root"; 137 + }; 138 + }; 139 + 140 + # Translation from $out/lib/systemd/system/cockpit-wsinstance-http.service 141 + systemd.services."cockpit-wsinstance-http" = { 142 + description = "Cockpit Web Service http instance"; 143 + bindsTo = [ "cockpit.service" ]; 144 + path = [ cfg.package ]; 145 + documentation = [ "man:cockpit-ws(8)" ]; 146 + serviceConfig = { 147 + ExecStart = "${cfg.package}/libexec/cockpit-ws --no-tls --port=0"; 148 + User = "root"; 149 + Group = ""; 150 + }; 151 + }; 152 + 153 + # Translation from $out/lib/systemd/system/cockpit.socket 154 + systemd.sockets."cockpit" = { 155 + unitConfig = { 156 + Description = "Cockpit Web Service Socket"; 157 + Documentation = "man:cockpit-ws(8)"; 158 + Wants = "cockpit-motd.service"; 159 + }; 160 + socketConfig = { 161 + ListenStream = cfg.port; 162 + ExecStartPost = [ 163 + "-${cfg.package}/share/cockpit/motd/update-motd \"\" localhost" 164 + "-${pkgs.coreutils}/bin/ln -snf active.motd /run/cockpit/motd" 165 + ]; 166 + ExecStopPost = "-${pkgs.coreutils}/bin/ln -snf inactive.motd /run/cockpit/motd"; 167 + }; 168 + wantedBy = [ "sockets.target" ]; 169 + }; 170 + 171 + # Translation from $out/lib/systemd/system/cockpit.service 172 + systemd.services."cockpit" = { 173 + description = "Cockpit Web Service"; 174 + documentation = [ "man:cockpit-ws(8)" ]; 175 + restartIfChanged = true; 176 + path = with pkgs; [ coreutils cfg.package ]; 177 + requires = [ "cockpit.socket" "cockpit-wsinstance-http.socket" "cockpit-wsinstance-https-factory.socket" ]; 178 + after = [ "cockpit-wsinstance-http.socket" "cockpit-wsinstance-https-factory.socket" ]; 179 + environment = { 180 + G_MESSAGES_DEBUG = "cockpit-ws,cockpit-bridge"; 181 + }; 182 + serviceConfig = { 183 + RuntimeDirectory="cockpit/tls"; 184 + ExecStartPre = [ 185 + # cockpit-tls runs in a more constrained environment, these + means that these commands 186 + # will run with full privilege instead of inside that constrained environment 187 + # See https://www.freedesktop.org/software/systemd/man/systemd.service.html#ExecStart= for details 188 + "+${cfg.package}/libexec/cockpit-certificate-ensure --for-cockpit-tls" 189 + ]; 190 + ExecStart = "${cfg.package}/libexec/cockpit-tls"; 191 + User = "root"; 192 + Group = ""; 193 + NoNewPrivileges = true; 194 + ProtectSystem = "strict"; 195 + ProtectHome = true; 196 + PrivateTmp = true; 197 + PrivateDevices = true; 198 + ProtectKernelTunables = true; 199 + RestrictAddressFamilies = [ "AF_UNIX" "AF_INET" "AF_INET6" ]; 200 + MemoryDenyWriteExecute = true; 201 + }; 202 + }; 203 + 204 + # Translation from $out/lib/systemd/system/cockpit-motd.service 205 + # This part basically implements a motd state machine: 206 + # - If cockpit.socket is enabled then /run/cockpit/motd points to /run/cockpit/active.motd 207 + # - If cockpit.socket is disabled then /run/cockpit/motd points to /run/cockpit/inactive.motd 208 + # - As cockpit.socket is disabled by default, /run/cockpit/motd points to /run/cockpit/inactive.motd 209 + # /run/cockpit/active.motd is generated dynamically by cockpit-motd.service 210 + systemd.services."cockpit-motd" = { 211 + path = with pkgs; [ nettools ]; 212 + serviceConfig = { 213 + Type = "oneshot"; 214 + ExecStart = "${cfg.package}/share/cockpit/motd/update-motd"; 215 + }; 216 + description = "Cockpit motd updater service"; 217 + documentation = [ "man:cockpit-ws(8)" ]; 218 + wants = [ "network.target" ]; 219 + after = [ "network.target" "cockpit.socket" ]; 220 + }; 221 + 222 + systemd.tmpfiles.rules = [ # From $out/lib/tmpfiles.d/cockpit-tmpfiles.conf 223 + "C /run/cockpit/inactive.motd 0640 root root - ${cfg.package}/share/cockpit/motd/inactive.motd" 224 + "f /run/cockpit/active.motd 0640 root root -" 225 + "L+ /run/cockpit/motd - - - - inactive.motd" 226 + "d /etc/cockpit/ws-certs.d 0600 root root 0" 227 + ]; 228 + }; 229 + 230 + meta.maintainers = pkgs.cockpit.meta.maintainers; 231 + }
+53 -18
nixos/modules/services/networking/nebula.nix
··· 68 68 description = lib.mdDoc "Whether this node is a lighthouse."; 69 69 }; 70 70 71 + isRelay = mkOption { 72 + type = types.bool; 73 + default = false; 74 + description = lib.mdDoc "Whether this node is a relay."; 75 + }; 76 + 71 77 lighthouses = mkOption { 72 78 type = types.listOf types.str; 73 79 default = []; 74 80 description = lib.mdDoc '' 75 81 List of IPs of lighthouse hosts this node should report to and query from. This should be empty on lighthouse 76 82 nodes. The IPs should be the lighthouse's Nebula IPs, not their external IPs. 83 + ''; 84 + example = [ "192.168.100.1" ]; 85 + }; 86 + 87 + relays = mkOption { 88 + type = types.listOf types.str; 89 + default = []; 90 + description = lib.mdDoc '' 91 + List of IPs of relays that this node should allow traffic from. 77 92 ''; 78 93 example = [ "192.168.100.1" ]; 79 94 }; ··· 157 172 am_lighthouse = netCfg.isLighthouse; 158 173 hosts = netCfg.lighthouses; 159 174 }; 175 + relay = { 176 + am_relay = netCfg.isRelay; 177 + relays = netCfg.relays; 178 + use_relays = true; 179 + }; 160 180 listen = { 161 181 host = netCfg.listen.host; 162 182 port = netCfg.listen.port; ··· 173 193 configFile = format.generate "nebula-config-${netName}.yml" settings; 174 194 in 175 195 { 176 - # Create systemd service for Nebula. 196 + # Create the systemd service for Nebula. 177 197 "nebula@${netName}" = { 178 198 description = "Nebula VPN service for ${netName}"; 179 199 wants = [ "basic.target" ]; 180 200 after = [ "basic.target" "network.target" ]; 181 201 before = [ "sshd.service" ]; 182 202 wantedBy = [ "multi-user.target" ]; 183 - serviceConfig = mkMerge [ 184 - { 185 - Type = "simple"; 186 - Restart = "always"; 187 - ExecStart = "${netCfg.package}/bin/nebula -config ${configFile}"; 188 - } 189 - # The service needs to launch as root to access the tun device, if it's enabled. 190 - (mkIf netCfg.tun.disable { 191 - User = networkId; 192 - Group = networkId; 193 - }) 194 - ]; 203 + serviceConfig = { 204 + Type = "simple"; 205 + Restart = "always"; 206 + ExecStart = "${netCfg.package}/bin/nebula -config ${configFile}"; 207 + UMask = "0027"; 208 + CapabilityBoundingSet = "CAP_NET_ADMIN"; 209 + AmbientCapabilities = "CAP_NET_ADMIN"; 210 + LockPersonality = true; 211 + NoNewPrivileges = true; 212 + PrivateDevices = false; # needs access to /dev/net/tun (below) 213 + DeviceAllow = "/dev/net/tun rw"; 214 + DevicePolicy = "closed"; 215 + PrivateTmp = true; 216 + PrivateUsers = false; # CapabilityBoundingSet needs to apply to the host namespace 217 + ProtectClock = true; 218 + ProtectControlGroups = true; 219 + ProtectHome = true; 220 + ProtectHostname = true; 221 + ProtectKernelLogs = true; 222 + ProtectKernelModules = true; 223 + ProtectKernelTunables = true; 224 + ProtectProc = "invisible"; 225 + ProtectSystem = "strict"; 226 + RestrictNamespaces = true; 227 + RestrictSUIDSGID = true; 228 + User = networkId; 229 + Group = networkId; 230 + }; 195 231 unitConfig.StartLimitIntervalSec = 0; # ensure Restart=always is always honoured (networks can go down for arbitrarily long) 196 232 }; 197 233 }) enabledNetworks); ··· 202 238 203 239 # Create the service users and groups. 204 240 users.users = mkMerge (mapAttrsToList (netName: netCfg: 205 - mkIf netCfg.tun.disable { 241 + { 206 242 ${nameToId netName} = { 207 243 group = nameToId netName; 208 244 description = "Nebula service user for network ${netName}"; ··· 210 246 }; 211 247 }) enabledNetworks); 212 248 213 - users.groups = mkMerge (mapAttrsToList (netName: netCfg: 214 - mkIf netCfg.tun.disable { 215 - ${nameToId netName} = {}; 216 - }) enabledNetworks); 249 + users.groups = mkMerge (mapAttrsToList (netName: netCfg: { 250 + ${nameToId netName} = {}; 251 + }) enabledNetworks); 217 252 }; 218 253 }
+79 -89
nixos/modules/services/networking/ssh/sshd.nix
··· 13 13 else pkgs.buildPackages.openssh; 14 14 15 15 # reports boolean as yes / no 16 - mkValueStringSshd = v: 16 + mkValueStringSshd = with lib; v: 17 17 if isInt v then toString v 18 18 else if isString v then v 19 19 else if true == v then "yes" 20 20 else if false == v then "no" 21 + else if isList v then concatStringsSep "," v 21 22 else throw "unsupported type ${typeOf v}: ${(lib.generators.toPretty {}) v}"; 22 23 23 24 # dont use the "=" operator ··· 104 105 (mkRenamedOptionModule [ "services" "openssh" "useDns" ] [ "services" "openssh" "settings" "UseDns" ]) 105 106 (mkRenamedOptionModule [ "services" "openssh" "permitRootLogin" ] [ "services" "openssh" "settings" "PermitRootLogin" ]) 106 107 (mkRenamedOptionModule [ "services" "openssh" "logLevel" ] [ "services" "openssh" "settings" "LogLevel" ]) 108 + (mkRenamedOptionModule [ "services" "openssh" "macs" ] [ "services" "openssh" "settings" "Macs" ]) 109 + (mkRenamedOptionModule [ "services" "openssh" "cyphers" ] [ "services" "openssh" "settings" "Cyphers" ]) 110 + (mkRenamedOptionModule [ "services" "openssh" "kexAlgorithms" ] [ "services" "openssh" "settings" "KexAlgorithms" ]) 111 + (mkRenamedOptionModule [ "services" "openssh" "gatewayPorts" ] [ "services" "openssh" "settings" "GatewayPorts" ]) 112 + (mkRenamedOptionModule [ "services" "openssh" "forwardX11" ] [ "services" "openssh" "settings" "X11Forwarding" ]) 107 113 ]; 108 114 109 115 ###### interface ··· 131 137 ''; 132 138 }; 133 139 134 - forwardX11 = mkOption { 135 - type = types.bool; 136 - default = false; 137 - description = lib.mdDoc '' 138 - Whether to allow X11 connections to be forwarded. 139 - ''; 140 - }; 141 - 142 140 allowSFTP = mkOption { 143 141 type = types.bool; 144 142 default = true; ··· 167 165 ''; 168 166 }; 169 167 170 - gatewayPorts = mkOption { 171 - type = types.str; 172 - default = "no"; 173 - description = lib.mdDoc '' 174 - Specifies whether remote hosts are allowed to connect to 175 - ports forwarded for the client. See 176 - {manpage}`sshd_config(5)`. 177 - ''; 178 - }; 179 - 180 168 ports = mkOption { 181 169 type = types.listOf types.port; 182 170 default = [22]; ··· 286 274 ''; 287 275 }; 288 276 289 - kexAlgorithms = mkOption { 290 - type = types.listOf types.str; 291 - default = [ 292 - "sntrup761x25519-sha512@openssh.com" 293 - "curve25519-sha256" 294 - "curve25519-sha256@libssh.org" 295 - "diffie-hellman-group-exchange-sha256" 296 - ]; 297 - description = lib.mdDoc '' 298 - Allowed key exchange algorithms 299 - 300 - Uses the lower bound recommended in both 301 - <https://stribika.github.io/2015/01/04/secure-secure-shell.html> 302 - and 303 - <https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67> 304 - ''; 305 - }; 306 - 307 - ciphers = mkOption { 308 - type = types.listOf types.str; 309 - default = [ 310 - "chacha20-poly1305@openssh.com" 311 - "aes256-gcm@openssh.com" 312 - "aes128-gcm@openssh.com" 313 - "aes256-ctr" 314 - "aes192-ctr" 315 - "aes128-ctr" 316 - ]; 317 - description = lib.mdDoc '' 318 - Allowed ciphers 319 - 320 - Defaults to recommended settings from both 321 - <https://stribika.github.io/2015/01/04/secure-secure-shell.html> 322 - and 323 - <https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67> 324 - ''; 325 - }; 326 - 327 - macs = mkOption { 328 - type = types.listOf types.str; 329 - default = [ 330 - "hmac-sha2-512-etm@openssh.com" 331 - "hmac-sha2-256-etm@openssh.com" 332 - "umac-128-etm@openssh.com" 333 - "hmac-sha2-512" 334 - "hmac-sha2-256" 335 - "umac-128@openssh.com" 336 - ]; 337 - description = lib.mdDoc '' 338 - Allowed MACs 339 - 340 - Defaults to recommended settings from both 341 - <https://stribika.github.io/2015/01/04/secure-secure-shell.html> 342 - and 343 - <https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67> 344 - ''; 345 - }; 346 277 347 278 348 279 settings = mkOption { ··· 374 305 ~/.ssh/authorized_keys from and sshd_config Match Host directives. 375 306 ''; 376 307 }; 377 - 308 + X11Forwarding = mkOption { 309 + type = types.bool; 310 + default = false; 311 + description = lib.mdDoc '' 312 + Whether to allow X11 connections to be forwarded. 313 + ''; 314 + }; 378 315 PasswordAuthentication = mkOption { 379 316 type = types.bool; 380 317 default = true; ··· 394 331 default = true; 395 332 description = lib.mdDoc '' 396 333 Specifies whether keyboard-interactive authentication is allowed. 334 + ''; 335 + }; 336 + GatewayPorts = mkOption { 337 + type = types.str; 338 + default = "no"; 339 + description = lib.mdDoc '' 340 + Specifies whether remote hosts are allowed to connect to 341 + ports forwarded for the client. See 342 + {manpage}`sshd_config(5)`. 343 + ''; 344 + }; 345 + KexAlgorithms = mkOption { 346 + type = types.listOf types.str; 347 + default = [ 348 + "sntrup761x25519-sha512@openssh.com" 349 + "curve25519-sha256" 350 + "curve25519-sha256@libssh.org" 351 + "diffie-hellman-group-exchange-sha256" 352 + ]; 353 + description = lib.mdDoc '' 354 + Allowed key exchange algorithms 355 + 356 + Uses the lower bound recommended in both 357 + <https://stribika.github.io/2015/01/04/secure-secure-shell.html> 358 + and 359 + <https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67> 360 + ''; 361 + }; 362 + Macs = mkOption { 363 + type = types.listOf types.str; 364 + default = [ 365 + "hmac-sha2-512-etm@openssh.com" 366 + "hmac-sha2-256-etm@openssh.com" 367 + "umac-128-etm@openssh.com" 368 + "hmac-sha2-512" 369 + "hmac-sha2-256" 370 + "umac-128@openssh.com" 371 + ]; 372 + description = lib.mdDoc '' 373 + Allowed MACs 374 + 375 + Defaults to recommended settings from both 376 + <https://stribika.github.io/2015/01/04/secure-secure-shell.html> 377 + and 378 + <https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67> 379 + ''; 380 + }; 381 + Ciphers = mkOption { 382 + type = types.listOf types.str; 383 + default = [ 384 + "chacha20-poly1305@openssh.com" 385 + "aes256-gcm@openssh.com" 386 + "aes128-gcm@openssh.com" 387 + "aes256-ctr" 388 + "aes192-ctr" 389 + "aes128-ctr" 390 + ]; 391 + description = lib.mdDoc '' 392 + Allowed ciphers 393 + 394 + Defaults to recommended settings from both 395 + <https://stribika.github.io/2015/01/04/secure-secure-shell.html> 396 + and 397 + <https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67> 397 398 ''; 398 399 }; 399 400 }; ··· 555 556 ${optionalString cfgc.setXAuthLocation '' 556 557 XAuthLocation ${pkgs.xorg.xauth}/bin/xauth 557 558 ''} 558 - 559 - X11Forwarding ${if cfg.forwardX11 then "yes" else "no"} 560 - 561 559 ${optionalString cfg.allowSFTP '' 562 560 Subsystem sftp ${cfg.sftpServerExecutable} ${concatStringsSep " " cfg.sftpFlags} 563 561 ''} 564 - 565 - GatewayPorts ${cfg.gatewayPorts} 566 - 567 562 PrintMotd no # handled by pam_motd 568 - 569 563 AuthorizedKeysFile ${toString cfg.authorizedKeysFiles} 570 564 ${optionalString (cfg.authorizedKeysCommand != "none") '' 571 565 AuthorizedKeysCommand ${cfg.authorizedKeysCommand} ··· 575 569 ${flip concatMapStrings cfg.hostKeys (k: '' 576 570 HostKey ${k.path} 577 571 '')} 578 - 579 - KexAlgorithms ${concatStringsSep "," cfg.kexAlgorithms} 580 - Ciphers ${concatStringsSep "," cfg.ciphers} 581 - MACs ${concatStringsSep "," cfg.macs} 582 572 ''; 583 573 584 - assertions = [{ assertion = if cfg.forwardX11 then cfgc.setXAuthLocation else true; 574 + assertions = [{ assertion = if cfg.settings.X11Forwarding then cfgc.setXAuthLocation else true; 585 575 message = "cannot enable X11 forwarding without setting xauth location";}] 586 576 ++ forEach cfg.listenAddresses ({ addr, ... }: { 587 577 assertion = addr != null;
+1 -1
nixos/modules/services/search/meilisearch.nix
··· 115 115 MEILI_HTTP_ADDR = "${cfg.listenAddress}:${toString cfg.listenPort}"; 116 116 MEILI_NO_ANALYTICS = toString cfg.noAnalytics; 117 117 MEILI_ENV = cfg.environment; 118 - MEILI_DUMPS_DIR = "/var/lib/meilisearch/dumps"; 118 + MEILI_DUMP_DIR = "/var/lib/meilisearch/dumps"; 119 119 MEILI_LOG_LEVEL = cfg.logLevel; 120 120 MEILI_MAX_INDEX_SIZE = cfg.maxIndexSize; 121 121 };
+2 -2
nixos/modules/services/security/privacyidea.nix
··· 6 6 cfg = config.services.privacyidea; 7 7 opt = options.services.privacyidea; 8 8 9 - uwsgi = pkgs.uwsgi.override { plugins = [ "python3" ]; python3 = pkgs.python39; }; 9 + uwsgi = pkgs.uwsgi.override { plugins = [ "python3" ]; python3 = pkgs.python310; }; 10 10 python = uwsgi.python3; 11 11 penv = python.withPackages (const [ pkgs.privacyidea ]); 12 12 logCfg = pkgs.writeText "privacyidea-log.cfg" '' ··· 41 41 42 42 piCfgFile = pkgs.writeText "privacyidea.cfg" '' 43 43 SUPERUSER_REALM = [ '${concatStringsSep "', '" cfg.superuserRealm}' ] 44 - SQLALCHEMY_DATABASE_URI = 'postgresql:///privacyidea' 44 + SQLALCHEMY_DATABASE_URI = 'postgresql+psycopg2:///privacyidea' 45 45 SECRET_KEY = '${cfg.secretKey}' 46 46 PI_PEPPER = '${cfg.pepper}' 47 47 PI_ENCFILE = '${cfg.encFile}'
+2 -1
nixos/modules/services/web-servers/nginx/default.nix
··· 203 203 proxy_send_timeout ${cfg.proxyTimeout}; 204 204 proxy_read_timeout ${cfg.proxyTimeout}; 205 205 proxy_http_version 1.1; 206 - # don't let clients close the keep-alive connection to upstream 206 + # don't let clients close the keep-alive connection to upstream. See the nginx blog for details: 207 + # https://www.nginx.com/blog/avoiding-top-10-nginx-configuration-mistakes/#no-keepalives 207 208 proxy_set_header "Connection" ""; 208 209 include ${recommendedProxyConfig}; 209 210 ''}
+1
nixos/tests/all-tests.nix
··· 134 134 cloud-init-hostname = handleTest ./cloud-init-hostname.nix {}; 135 135 cloudlog = handleTest ./cloudlog.nix {}; 136 136 cntr = handleTestOn ["aarch64-linux" "x86_64-linux"] ./cntr.nix {}; 137 + cockpit = handleTest ./cockpit.nix {}; 137 138 cockroachdb = handleTestOn ["x86_64-linux"] ./cockroachdb.nix {}; 138 139 collectd = handleTest ./collectd.nix {}; 139 140 connman = handleTest ./connman.nix {};
+135
nixos/tests/cockpit.nix
··· 1 + import ./make-test-python.nix ( 2 + { pkgs, lib, ... }: 3 + 4 + let 5 + user = "alice"; # from ./common/user-account.nix 6 + password = "foobar"; # from ./common/user-account.nix 7 + in { 8 + name = "cockpit"; 9 + meta = { 10 + maintainers = with lib.maintainers; [ lucasew ]; 11 + }; 12 + nodes = { 13 + server = { config, ... }: { 14 + imports = [ ./common/user-account.nix ]; 15 + security.polkit.enable = true; 16 + users.users.${user} = { 17 + extraGroups = [ "wheel" ]; 18 + }; 19 + services.cockpit = { 20 + enable = true; 21 + openFirewall = true; 22 + settings = { 23 + WebService = { 24 + Origins = "https://server:9090"; 25 + }; 26 + }; 27 + }; 28 + }; 29 + client = { config, ... }: { 30 + imports = [ ./common/user-account.nix ]; 31 + environment.systemPackages = let 32 + seleniumScript = pkgs.writers.writePython3Bin "selenium-script" { 33 + libraries = with pkgs.python3Packages; [ selenium ]; 34 + } '' 35 + from selenium import webdriver 36 + from selenium.webdriver.common.by import By 37 + from selenium.webdriver.firefox.options import Options 38 + from selenium.webdriver.support.ui import WebDriverWait 39 + from selenium.webdriver.support import expected_conditions as EC 40 + from time import sleep 41 + 42 + 43 + def log(msg): 44 + from sys import stderr 45 + print(f"[*] {msg}", file=stderr) 46 + 47 + 48 + log("Initializing") 49 + 50 + options = Options() 51 + options.add_argument("--headless") 52 + 53 + driver = webdriver.Firefox(options=options) 54 + 55 + driver.implicitly_wait(10) 56 + 57 + log("Opening homepage") 58 + driver.get("https://server:9090") 59 + 60 + wait = WebDriverWait(driver, 60) 61 + 62 + 63 + def wait_elem(by, query): 64 + wait.until(EC.presence_of_element_located((by, query))) 65 + 66 + 67 + def wait_title_contains(title): 68 + wait.until(EC.title_contains(title)) 69 + 70 + 71 + def find_element(by, query): 72 + return driver.find_element(by, query) 73 + 74 + 75 + def set_value(elem, value): 76 + script = 'arguments[0].value = arguments[1]' 77 + return driver.execute_script(script, elem, value) 78 + 79 + 80 + log("Waiting for the homepage to load") 81 + 82 + # cockpit sets initial title as hostname 83 + wait_title_contains("server") 84 + wait_elem(By.CSS_SELECTOR, 'input#login-user-input') 85 + 86 + log("Homepage loaded!") 87 + 88 + log("Filling out username") 89 + login_input = find_element(By.CSS_SELECTOR, 'input#login-user-input') 90 + set_value(login_input, "${user}") 91 + 92 + log("Filling out password") 93 + password_input = find_element(By.CSS_SELECTOR, 'input#login-password-input') 94 + set_value(password_input, "${password}") 95 + 96 + log("Submiting credentials for login") 97 + driver.find_element(By.CSS_SELECTOR, 'button#login-button').click() 98 + 99 + # driver.implicitly_wait(1) 100 + # driver.get("https://server:9090/system") 101 + 102 + log("Waiting dashboard to load") 103 + wait_title_contains("${user}@server") 104 + 105 + log("Waiting for the frontend to initalize") 106 + sleep(1) 107 + 108 + log("Looking for that banner that tells about limited access") 109 + container_iframe = find_element(By.CSS_SELECTOR, 'iframe.container-frame') 110 + driver.switch_to.frame(container_iframe) 111 + 112 + assert "Web console is running in limited access mode" in driver.page_source 113 + 114 + driver.close() 115 + ''; 116 + in with pkgs; [ firefox-unwrapped geckodriver seleniumScript ]; 117 + }; 118 + }; 119 + 120 + testScript = '' 121 + start_all() 122 + 123 + server.wait_for_open_port(9090) 124 + server.wait_for_unit("network.target") 125 + server.wait_for_unit("multi-user.target") 126 + server.systemctl("start", "polkit") 127 + 128 + client.wait_for_unit("multi-user.target") 129 + 130 + client.succeed("curl -k https://server:9090 -o /dev/stderr") 131 + print(client.succeed("whoami")) 132 + client.succeed('PYTHONUNBUFFERED=1 selenium-script') 133 + ''; 134 + } 135 + )
+1 -1
nixos/tests/cups-pdf.nix
··· 23 23 24 24 testScript = '' 25 25 from subprocess import run 26 - machine.wait_for_unit("cups.service") 26 + machine.wait_for_unit("multi-user.target") 27 27 for name in ("opt", "noopt"): 28 28 text = f"test text {name}".upper() 29 29 machine.wait_until_succeeds(f"lpstat -v {name}")
+143 -58
nixos/tests/nebula.nix
··· 10 10 environment.systemPackages = [ pkgs.nebula ]; 11 11 users.users.root.openssh.authorizedKeys.keys = [ snakeOilPublicKey ]; 12 12 services.openssh.enable = true; 13 + networking.interfaces.eth1.useDHCP = false; 13 14 14 15 services.nebula.networks.smoke = { 15 16 # Note that these paths won't exist when the machine is first booted. ··· 30 31 31 32 lighthouse = { ... } @ args: 32 33 makeNebulaNode args "lighthouse" { 33 - networking.interfaces.eth1.ipv4.addresses = [{ 34 + networking.interfaces.eth1.ipv4.addresses = lib.mkForce [{ 34 35 address = "192.168.1.1"; 35 36 prefixLength = 24; 36 37 }]; 37 38 38 39 services.nebula.networks.smoke = { 39 40 isLighthouse = true; 41 + isRelay = true; 40 42 firewall = { 41 43 outbound = [ { port = "any"; proto = "any"; host = "any"; } ]; 42 44 inbound = [ { port = "any"; proto = "any"; host = "any"; } ]; ··· 44 46 }; 45 47 }; 46 48 47 - node2 = { ... } @ args: 48 - makeNebulaNode args "node2" { 49 - networking.interfaces.eth1.ipv4.addresses = [{ 49 + allowAny = { ... } @ args: 50 + makeNebulaNode args "allowAny" { 51 + networking.interfaces.eth1.ipv4.addresses = lib.mkForce [{ 50 52 address = "192.168.1.2"; 51 53 prefixLength = 24; 52 54 }]; ··· 55 57 staticHostMap = { "10.0.100.1" = [ "192.168.1.1:4242" ]; }; 56 58 isLighthouse = false; 57 59 lighthouses = [ "10.0.100.1" ]; 60 + relays = [ "10.0.100.1" ]; 58 61 firewall = { 59 62 outbound = [ { port = "any"; proto = "any"; host = "any"; } ]; 60 63 inbound = [ { port = "any"; proto = "any"; host = "any"; } ]; ··· 62 65 }; 63 66 }; 64 67 65 - node3 = { ... } @ args: 66 - makeNebulaNode args "node3" { 67 - networking.interfaces.eth1.ipv4.addresses = [{ 68 + allowFromLighthouse = { ... } @ args: 69 + makeNebulaNode args "allowFromLighthouse" { 70 + networking.interfaces.eth1.ipv4.addresses = lib.mkForce [{ 68 71 address = "192.168.1.3"; 69 72 prefixLength = 24; 70 73 }]; ··· 73 76 staticHostMap = { "10.0.100.1" = [ "192.168.1.1:4242" ]; }; 74 77 isLighthouse = false; 75 78 lighthouses = [ "10.0.100.1" ]; 79 + relays = [ "10.0.100.1" ]; 76 80 firewall = { 77 81 outbound = [ { port = "any"; proto = "any"; host = "any"; } ]; 78 82 inbound = [ { port = "any"; proto = "any"; host = "lighthouse"; } ]; ··· 80 84 }; 81 85 }; 82 86 83 - node4 = { ... } @ args: 84 - makeNebulaNode args "node4" { 85 - networking.interfaces.eth1.ipv4.addresses = [{ 87 + allowToLighthouse = { ... } @ args: 88 + makeNebulaNode args "allowToLighthouse" { 89 + networking.interfaces.eth1.ipv4.addresses = lib.mkForce [{ 86 90 address = "192.168.1.4"; 87 91 prefixLength = 24; 88 92 }]; ··· 92 96 staticHostMap = { "10.0.100.1" = [ "192.168.1.1:4242" ]; }; 93 97 isLighthouse = false; 94 98 lighthouses = [ "10.0.100.1" ]; 99 + relays = [ "10.0.100.1" ]; 95 100 firewall = { 96 101 outbound = [ { port = "any"; proto = "any"; host = "lighthouse"; } ]; 97 102 inbound = [ { port = "any"; proto = "any"; host = "any"; } ]; ··· 99 104 }; 100 105 }; 101 106 102 - node5 = { ... } @ args: 103 - makeNebulaNode args "node5" { 104 - networking.interfaces.eth1.ipv4.addresses = [{ 107 + disabled = { ... } @ args: 108 + makeNebulaNode args "disabled" { 109 + networking.interfaces.eth1.ipv4.addresses = lib.mkForce [{ 105 110 address = "192.168.1.5"; 106 111 prefixLength = 24; 107 112 }]; ··· 111 116 staticHostMap = { "10.0.100.1" = [ "192.168.1.1:4242" ]; }; 112 117 isLighthouse = false; 113 118 lighthouses = [ "10.0.100.1" ]; 119 + relays = [ "10.0.100.1" ]; 114 120 firewall = { 115 121 outbound = [ { port = "any"; proto = "any"; host = "lighthouse"; } ]; 116 122 inbound = [ { port = "any"; proto = "any"; host = "any"; } ]; ··· 123 129 testScript = let 124 130 125 131 setUpPrivateKey = name: '' 126 - ${name}.succeed( 127 - "mkdir -p /root/.ssh", 128 - "chown 700 /root/.ssh", 129 - "cat '${snakeOilPrivateKey}' > /root/.ssh/id_snakeoil", 130 - "chown 600 /root/.ssh/id_snakeoil", 131 - ) 132 + ${name}.start() 133 + ${name}.succeed( 134 + "mkdir -p /root/.ssh", 135 + "chown 700 /root/.ssh", 136 + "cat '${snakeOilPrivateKey}' > /root/.ssh/id_snakeoil", 137 + "chown 600 /root/.ssh/id_snakeoil", 138 + "mkdir -p /root" 139 + ) 132 140 ''; 133 141 134 142 # From what I can tell, StrictHostKeyChecking=no is necessary for ssh to work between machines. ··· 146 154 ${name}.succeed( 147 155 "mkdir -p /etc/nebula", 148 156 "nebula-cert keygen -out-key /etc/nebula/${name}.key -out-pub /etc/nebula/${name}.pub", 149 - "scp ${sshOpts} /etc/nebula/${name}.pub 192.168.1.1:/tmp/${name}.pub", 157 + "scp ${sshOpts} /etc/nebula/${name}.pub root@192.168.1.1:/root/${name}.pub", 150 158 ) 151 159 lighthouse.succeed( 152 - 'nebula-cert sign -ca-crt /etc/nebula/ca.crt -ca-key /etc/nebula/ca.key -name "${name}" -groups "${name}" -ip "${ip}" -in-pub /tmp/${name}.pub -out-crt /tmp/${name}.crt', 160 + 'nebula-cert sign -ca-crt /etc/nebula/ca.crt -ca-key /etc/nebula/ca.key -name "${name}" -groups "${name}" -ip "${ip}" -in-pub /root/${name}.pub -out-crt /root/${name}.crt' 153 161 ) 154 162 ${name}.succeed( 155 - "scp ${sshOpts} 192.168.1.1:/tmp/${name}.crt /etc/nebula/${name}.crt", 156 - "scp ${sshOpts} 192.168.1.1:/etc/nebula/ca.crt /etc/nebula/ca.crt", 163 + "scp ${sshOpts} root@192.168.1.1:/root/${name}.crt /etc/nebula/${name}.crt", 164 + "scp ${sshOpts} root@192.168.1.1:/etc/nebula/ca.crt /etc/nebula/ca.crt", 165 + '(id nebula-smoke >/dev/null && chown -R nebula-smoke:nebula-smoke /etc/nebula) || true' 157 166 ) 158 167 ''; 159 168 160 - in '' 161 - start_all() 169 + getPublicIp = node: '' 170 + ${node}.succeed("ip --brief addr show eth1 | awk '{print $3}' | tail -n1 | cut -d/ -f1").strip() 171 + ''; 162 172 173 + # Never do this for anything security critical! (Thankfully it's just a test.) 174 + # Restart Nebula right after the mutual block and/or restore so the state is fresh. 175 + blockTrafficBetween = nodeA: nodeB: '' 176 + node_a = ${getPublicIp nodeA} 177 + node_b = ${getPublicIp nodeB} 178 + ${nodeA}.succeed("iptables -I INPUT -s " + node_b + " -j DROP") 179 + ${nodeB}.succeed("iptables -I INPUT -s " + node_a + " -j DROP") 180 + ${nodeA}.systemctl("restart nebula@smoke.service") 181 + ${nodeB}.systemctl("restart nebula@smoke.service") 182 + ''; 183 + allowTrafficBetween = nodeA: nodeB: '' 184 + node_a = ${getPublicIp nodeA} 185 + node_b = ${getPublicIp nodeB} 186 + ${nodeA}.succeed("iptables -D INPUT -s " + node_b + " -j DROP") 187 + ${nodeB}.succeed("iptables -D INPUT -s " + node_a + " -j DROP") 188 + ${nodeA}.systemctl("restart nebula@smoke.service") 189 + ${nodeB}.systemctl("restart nebula@smoke.service") 190 + ''; 191 + in '' 163 192 # Create the certificate and sign the lighthouse's keys. 164 193 ${setUpPrivateKey "lighthouse"} 165 194 lighthouse.succeed( 166 195 "mkdir -p /etc/nebula", 167 196 'nebula-cert ca -name "Smoke Test" -out-crt /etc/nebula/ca.crt -out-key /etc/nebula/ca.key', 168 197 'nebula-cert sign -ca-crt /etc/nebula/ca.crt -ca-key /etc/nebula/ca.key -name "lighthouse" -groups "lighthouse" -ip "10.0.100.1/24" -out-crt /etc/nebula/lighthouse.crt -out-key /etc/nebula/lighthouse.key', 198 + 'chown -R nebula-smoke:nebula-smoke /etc/nebula' 169 199 ) 170 200 171 201 # Reboot the lighthouse and verify that the nebula service comes up on boot. ··· 175 205 lighthouse.wait_for_unit("nebula@smoke.service") 176 206 lighthouse.succeed("ping -c5 10.0.100.1") 177 207 178 - # Create keys for node2's nebula service and test that it comes up. 179 - ${setUpPrivateKey "node2"} 180 - ${signKeysFor "node2" "10.0.100.2/24"} 181 - ${restartAndCheckNebula "node2" "10.0.100.2"} 208 + # Create keys for allowAny's nebula service and test that it comes up. 209 + ${setUpPrivateKey "allowAny"} 210 + ${signKeysFor "allowAny" "10.0.100.2/24"} 211 + ${restartAndCheckNebula "allowAny" "10.0.100.2"} 182 212 183 - # Create keys for node3's nebula service and test that it comes up. 184 - ${setUpPrivateKey "node3"} 185 - ${signKeysFor "node3" "10.0.100.3/24"} 186 - ${restartAndCheckNebula "node3" "10.0.100.3"} 213 + # Create keys for allowFromLighthouse's nebula service and test that it comes up. 214 + ${setUpPrivateKey "allowFromLighthouse"} 215 + ${signKeysFor "allowFromLighthouse" "10.0.100.3/24"} 216 + ${restartAndCheckNebula "allowFromLighthouse" "10.0.100.3"} 187 217 188 - # Create keys for node4's nebula service and test that it comes up. 189 - ${setUpPrivateKey "node4"} 190 - ${signKeysFor "node4" "10.0.100.4/24"} 191 - ${restartAndCheckNebula "node4" "10.0.100.4"} 218 + # Create keys for allowToLighthouse's nebula service and test that it comes up. 219 + ${setUpPrivateKey "allowToLighthouse"} 220 + ${signKeysFor "allowToLighthouse" "10.0.100.4/24"} 221 + ${restartAndCheckNebula "allowToLighthouse" "10.0.100.4"} 192 222 193 - # Create keys for node4's nebula service and test that it does not come up. 194 - ${setUpPrivateKey "node5"} 195 - ${signKeysFor "node5" "10.0.100.5/24"} 196 - node5.fail("systemctl status nebula@smoke.service") 197 - node5.fail("ping -c5 10.0.100.5") 223 + # Create keys for disabled's nebula service and test that it does not come up. 224 + ${setUpPrivateKey "disabled"} 225 + ${signKeysFor "disabled" "10.0.100.5/24"} 226 + disabled.fail("systemctl status nebula@smoke.service") 227 + disabled.fail("ping -c5 10.0.100.5") 198 228 199 - # The lighthouse can ping node2 and node3 but not node5 229 + # The lighthouse can ping allowAny and allowFromLighthouse but not disabled 200 230 lighthouse.succeed("ping -c3 10.0.100.2") 201 231 lighthouse.succeed("ping -c3 10.0.100.3") 202 232 lighthouse.fail("ping -c3 10.0.100.5") 203 233 204 - # node2 can ping the lighthouse, but not node3 because of its inbound firewall 205 - node2.succeed("ping -c3 10.0.100.1") 206 - node2.fail("ping -c3 10.0.100.3") 234 + # allowAny can ping the lighthouse, but not allowFromLighthouse because of its inbound firewall 235 + allowAny.succeed("ping -c3 10.0.100.1") 236 + allowAny.fail("ping -c3 10.0.100.3") 207 237 208 - # node3 can ping the lighthouse and node2 209 - node3.succeed("ping -c3 10.0.100.1") 210 - node3.succeed("ping -c3 10.0.100.2") 238 + # allowFromLighthouse can ping the lighthouse and allowAny 239 + allowFromLighthouse.succeed("ping -c3 10.0.100.1") 240 + allowFromLighthouse.succeed("ping -c3 10.0.100.2") 241 + 242 + # block allowFromLighthouse <-> allowAny, and allowFromLighthouse -> allowAny should still work. 243 + ${blockTrafficBetween "allowFromLighthouse" "allowAny"} 244 + allowFromLighthouse.succeed("ping -c10 10.0.100.2") 245 + ${allowTrafficBetween "allowFromLighthouse" "allowAny"} 246 + allowFromLighthouse.succeed("ping -c10 10.0.100.2") 247 + 248 + # allowToLighthouse can ping the lighthouse but not allowAny or allowFromLighthouse 249 + allowToLighthouse.succeed("ping -c3 10.0.100.1") 250 + allowToLighthouse.fail("ping -c3 10.0.100.2") 251 + allowToLighthouse.fail("ping -c3 10.0.100.3") 211 252 212 - # node4 can ping the lighthouse but not node2 or node3 213 - node4.succeed("ping -c3 10.0.100.1") 214 - node4.fail("ping -c3 10.0.100.2") 215 - node4.fail("ping -c3 10.0.100.3") 253 + # allowAny can ping allowFromLighthouse now that allowFromLighthouse pinged it first 254 + allowAny.succeed("ping -c3 10.0.100.3") 216 255 217 - # node2 can ping node3 now that node3 pinged it first 218 - node2.succeed("ping -c3 10.0.100.3") 219 - # node4 can ping node2 if node2 pings it first 220 - node2.succeed("ping -c3 10.0.100.4") 221 - node4.succeed("ping -c3 10.0.100.2") 256 + # block allowAny <-> allowFromLighthouse, and allowAny -> allowFromLighthouse should still work. 257 + ${blockTrafficBetween "allowAny" "allowFromLighthouse"} 258 + allowFromLighthouse.succeed("ping -c10 10.0.100.2") 259 + allowAny.succeed("ping -c10 10.0.100.3") 260 + ${allowTrafficBetween "allowAny" "allowFromLighthouse"} 261 + allowFromLighthouse.succeed("ping -c10 10.0.100.2") 262 + allowAny.succeed("ping -c10 10.0.100.3") 263 + 264 + # allowToLighthouse can ping allowAny if allowAny pings it first 265 + allowAny.succeed("ping -c3 10.0.100.4") 266 + allowToLighthouse.succeed("ping -c3 10.0.100.2") 267 + 268 + # block allowToLighthouse <-> allowAny, and allowAny <-> allowToLighthouse should still work. 269 + ${blockTrafficBetween "allowAny" "allowToLighthouse"} 270 + allowAny.succeed("ping -c10 10.0.100.4") 271 + allowToLighthouse.succeed("ping -c10 10.0.100.2") 272 + ${allowTrafficBetween "allowAny" "allowToLighthouse"} 273 + allowAny.succeed("ping -c10 10.0.100.4") 274 + allowToLighthouse.succeed("ping -c10 10.0.100.2") 275 + 276 + # block lighthouse <-> allowFromLighthouse and allowAny <-> allowFromLighthouse; allowFromLighthouse won't get to allowAny 277 + ${blockTrafficBetween "allowFromLighthouse" "lighthouse"} 278 + ${blockTrafficBetween "allowFromLighthouse" "allowAny"} 279 + allowFromLighthouse.fail("ping -c3 10.0.100.2") 280 + ${allowTrafficBetween "allowFromLighthouse" "lighthouse"} 281 + ${allowTrafficBetween "allowFromLighthouse" "allowAny"} 282 + allowFromLighthouse.succeed("ping -c3 10.0.100.2") 283 + 284 + # block lighthouse <-> allowAny, allowAny <-> allowFromLighthouse, and allowAny <-> allowToLighthouse; it won't get to allowFromLighthouse or allowToLighthouse 285 + ${blockTrafficBetween "allowAny" "lighthouse"} 286 + ${blockTrafficBetween "allowAny" "allowFromLighthouse"} 287 + ${blockTrafficBetween "allowAny" "allowToLighthouse"} 288 + allowFromLighthouse.fail("ping -c3 10.0.100.2") 289 + allowAny.fail("ping -c3 10.0.100.3") 290 + allowAny.fail("ping -c3 10.0.100.4") 291 + ${allowTrafficBetween "allowAny" "lighthouse"} 292 + ${allowTrafficBetween "allowAny" "allowFromLighthouse"} 293 + ${allowTrafficBetween "allowAny" "allowToLighthouse"} 294 + allowFromLighthouse.succeed("ping -c3 10.0.100.2") 295 + allowAny.succeed("ping -c3 10.0.100.3") 296 + allowAny.succeed("ping -c3 10.0.100.4") 297 + 298 + # block lighthouse <-> allowToLighthouse and allowToLighthouse <-> allowAny; it won't get to allowAny 299 + ${blockTrafficBetween "allowToLighthouse" "lighthouse"} 300 + ${blockTrafficBetween "allowToLighthouse" "allowAny"} 301 + allowAny.fail("ping -c3 10.0.100.4") 302 + allowToLighthouse.fail("ping -c3 10.0.100.2") 303 + ${allowTrafficBetween "allowToLighthouse" "lighthouse"} 304 + ${allowTrafficBetween "allowToLighthouse" "allowAny"} 305 + allowAny.succeed("ping -c3 10.0.100.4") 306 + allowToLighthouse.succeed("ping -c3 10.0.100.2") 222 307 ''; 223 308 })
+107 -101
nixos/tests/pgadmin4.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, lib, buildDeps ? [ ], pythonEnv ? [ ], ... }: 2 2 3 - /* 3 + /* 4 4 This test suite replaces the typical pytestCheckHook function in python 5 5 packages. Pgadmin4 test suite needs a running and configured postgresql 6 6 server. This is why this test exists. ··· 17 17 18 18 */ 19 19 20 - let 21 - pgadmin4SrcDir = "/pgadmin"; 22 - pgadmin4Dir = "/var/lib/pgadmin"; 23 - pgadmin4LogDir = "/var/log/pgadmin"; 20 + let 21 + pgadmin4SrcDir = "/pgadmin"; 22 + pgadmin4Dir = "/var/lib/pgadmin"; 23 + pgadmin4LogDir = "/var/log/pgadmin"; 24 24 25 - in 26 - { 27 - name = "pgadmin4"; 28 - meta.maintainers = with lib.maintainers; [ gador ]; 25 + in 26 + { 27 + name = "pgadmin4"; 28 + meta.maintainers = with lib.maintainers; [ gador ]; 29 29 30 - nodes.machine = { pkgs, ... }: { 31 - imports = [ ./common/x11.nix ]; 32 - # needed because pgadmin 6.8 will fail, if those dependencies get updated 33 - nixpkgs.overlays = [ 34 - (self: super: { 35 - pythonPackages = pythonEnv; 36 - }) 37 - ]; 30 + nodes.machine = { pkgs, ... }: { 31 + imports = [ ./common/x11.nix ]; 32 + # needed because pgadmin 6.8 will fail, if those dependencies get updated 33 + nixpkgs.overlays = [ 34 + (self: super: { 35 + pythonPackages = pythonEnv; 36 + }) 37 + ]; 38 38 39 - environment.systemPackages = with pkgs; [ 40 - pgadmin4 41 - postgresql 42 - chromedriver 43 - chromium 44 - # include the same packages as in pgadmin minus speaklater3 45 - (python3.withPackages 46 - (ps: buildDeps ++ 47 - [ 48 - # test suite package requirements 49 - pythonPackages.testscenarios 50 - pythonPackages.selenium 51 - ]) 52 - ) 39 + environment.systemPackages = with pkgs; [ 40 + pgadmin4 41 + postgresql 42 + chromedriver 43 + chromium 44 + # include the same packages as in pgadmin minus speaklater3 45 + (python3.withPackages 46 + (ps: buildDeps ++ 47 + [ 48 + # test suite package requirements 49 + pythonPackages.testscenarios 50 + pythonPackages.selenium 51 + ]) 52 + ) 53 + ]; 54 + services.postgresql = { 55 + enable = true; 56 + authentication = '' 57 + host all all localhost trust 58 + ''; 59 + ensureUsers = [ 60 + { 61 + name = "postgres"; 62 + ensurePermissions = { 63 + "DATABASE \"postgres\"" = "ALL PRIVILEGES"; 64 + }; 65 + } 53 66 ]; 54 - services.postgresql = { 55 - enable = true; 56 - authentication = '' 57 - host all all localhost trust 58 - ''; 59 - ensureUsers = [ 60 - { 61 - name = "postgres"; 62 - ensurePermissions = { 63 - "DATABASE \"postgres\"" = "ALL PRIVILEGES"; 64 - }; 65 - } 66 - ]; 67 - }; 68 67 }; 68 + }; 69 69 70 - testScript = '' 71 - machine.wait_for_unit("postgresql") 70 + testScript = '' 71 + machine.wait_for_unit("postgresql") 72 72 73 - # pgadmin4 needs its data and log directories 74 - machine.succeed( 75 - "mkdir -p ${pgadmin4Dir} \ 76 - && mkdir -p ${pgadmin4LogDir} \ 77 - && mkdir -p ${pgadmin4SrcDir}" 78 - ) 73 + # pgadmin4 needs its data and log directories 74 + machine.succeed( 75 + "mkdir -p ${pgadmin4Dir} \ 76 + && mkdir -p ${pgadmin4LogDir} \ 77 + && mkdir -p ${pgadmin4SrcDir}" 78 + ) 79 79 80 - machine.succeed( 81 - "tar xvzf ${pkgs.pgadmin4.src} -C ${pgadmin4SrcDir}" 82 - ) 80 + machine.succeed( 81 + "tar xvzf ${pkgs.pgadmin4.src} -C ${pgadmin4SrcDir}" 82 + ) 83 83 84 - machine.wait_for_file("${pgadmin4SrcDir}/pgadmin4-${pkgs.pgadmin4.version}/README.md") 84 + machine.wait_for_file("${pgadmin4SrcDir}/pgadmin4-${pkgs.pgadmin4.version}/README.md") 85 85 86 - # set paths and config for tests 87 - machine.succeed( 88 - "cd ${pgadmin4SrcDir}/pgadmin4-${pkgs.pgadmin4.version} \ 89 - && cp -v web/regression/test_config.json.in web/regression/test_config.json \ 90 - && sed -i 's|PostgreSQL 9.4|PostgreSQL|' web/regression/test_config.json \ 91 - && sed -i 's|/opt/PostgreSQL/9.4/bin/|${pkgs.postgresql}/bin|' web/regression/test_config.json \ 92 - && sed -i 's|\"headless_chrome\": false|\"headless_chrome\": true|' web/regression/test_config.json" 93 - ) 86 + # set paths and config for tests 87 + # also ensure Server Mode is set to false, which will automatically exclude some unnecessary tests. 88 + # see https://github.com/pgadmin-org/pgadmin4/blob/fd1c26408bbf154fa455a49ee5c12895933833a3/web/regression/runtests.py#L217-L226 89 + machine.succeed( 90 + "cd ${pgadmin4SrcDir}/pgadmin4-${pkgs.pgadmin4.version} \ 91 + && cp -v web/regression/test_config.json.in web/regression/test_config.json \ 92 + && sed -i 's|PostgreSQL 9.4|PostgreSQL|' web/regression/test_config.json \ 93 + && sed -i 's|/opt/PostgreSQL/9.4/bin/|${pkgs.postgresql}/bin|' web/regression/test_config.json \ 94 + && sed -i 's|\"headless_chrome\": false|\"headless_chrome\": true|' web/regression/test_config.json \ 95 + && sed -i 's|builtins.SERVER_MODE = None|builtins.SERVER_MODE = False|' web/regression/runtests.py" 96 + ) 94 97 95 - # adapt chrome config to run within a sandbox without GUI 96 - # see https://stackoverflow.com/questions/50642308/webdriverexception-unknown-error-devtoolsactiveport-file-doesnt-exist-while-t#50642913 97 - # add chrome binary path. use spaces to satisfy python indention (tabs throw an error) 98 - # this works for selenium 3 (currently used), but will need to be updated 99 - # to work with "from selenium.webdriver.chrome.service import Service" in selenium 4 100 - machine.succeed( 101 - "cd ${pgadmin4SrcDir}/pgadmin4-${pkgs.pgadmin4.version} \ 102 - && sed -i '\|options.add_argument(\"--disable-infobars\")|a \ \ \ \ \ \ \ \ options.binary_location = \"${pkgs.chromium}/bin/chromium\"' web/regression/runtests.py \ 103 - && sed -i '\|options.add_argument(\"--no-sandbox\")|a \ \ \ \ \ \ \ \ options.add_argument(\"--headless\")' web/regression/runtests.py \ 104 - && sed -i '\|options.add_argument(\"--disable-infobars\")|a \ \ \ \ \ \ \ \ options.add_argument(\"--disable-dev-shm-usage\")' web/regression/runtests.py \ 105 - && sed -i 's|(chrome_options=options)|(executable_path=\"${pkgs.chromedriver}/bin/chromedriver\", chrome_options=options)|' web/regression/runtests.py \ 106 - && sed -i 's|driver_local.maximize_window()||' web/regression/runtests.py" 107 - ) 98 + # adapt chrome config to run within a sandbox without GUI 99 + # see https://stackoverflow.com/questions/50642308/webdriverexception-unknown-error-devtoolsactiveport-file-doesnt-exist-while-t#50642913 100 + # add chrome binary path. use spaces to satisfy python indention (tabs throw an error) 101 + machine.succeed( 102 + "cd ${pgadmin4SrcDir}/pgadmin4-${pkgs.pgadmin4.version} \ 103 + && sed -i '\|options.add_argument(\"--disable-infobars\")|a \ \ \ \ \ \ \ \ options.binary_location = \"${pkgs.chromium}/bin/chromium\"' web/regression/runtests.py \ 104 + && sed -i '\|options.add_argument(\"--no-sandbox\")|a \ \ \ \ \ \ \ \ options.add_argument(\"--headless\")' web/regression/runtests.py \ 105 + && sed -i '\|options.add_argument(\"--disable-infobars\")|a \ \ \ \ \ \ \ \ options.add_argument(\"--disable-dev-shm-usage\")' web/regression/runtests.py \ 106 + && sed -i 's|(chrome_options=options)|(executable_path=\"${pkgs.chromedriver}/bin/chromedriver\", chrome_options=options)|' web/regression/runtests.py \ 107 + && sed -i 's|driver_local.maximize_window()||' web/regression/runtests.py" 108 + ) 108 109 109 - # Don't bother to test LDAP or kerberos authentication 110 - with subtest("run browser test"): 111 - machine.succeed( 112 - 'cd ${pgadmin4SrcDir}/pgadmin4-${pkgs.pgadmin4.version}/web \ 113 - && python regression/runtests.py \ 114 - --pkg browser \ 115 - --exclude browser.tests.test_ldap_login.LDAPLoginTestCase,browser.tests.test_ldap_login,browser.tests.test_kerberos_with_mocking' 116 - ) 110 + # don't bother to test kerberos authentication 111 + excluded_tests = [ "browser.tests.test_kerberos_with_mocking", 112 + ] 117 113 118 - # fontconfig is necessary for chromium to run 119 - # https://github.com/NixOS/nixpkgs/issues/136207 120 - with subtest("run feature test"): 121 - machine.succeed( 122 - 'cd ${pgadmin4SrcDir}/pgadmin4-${pkgs.pgadmin4.version}/web \ 123 - && export FONTCONFIG_FILE=${pkgs.makeFontsConf { fontDirectories = [];}} \ 124 - && python regression/runtests.py --pkg feature_tests' 125 - ) 114 + with subtest("run browser test"): 115 + machine.succeed( 116 + 'cd ${pgadmin4SrcDir}/pgadmin4-${pkgs.pgadmin4.version}/web \ 117 + && python regression/runtests.py \ 118 + --pkg browser \ 119 + --exclude ' + ','.join(excluded_tests) 120 + ) 126 121 127 - with subtest("run resql test"): 128 - machine.succeed( 129 - 'cd ${pgadmin4SrcDir}/pgadmin4-${pkgs.pgadmin4.version}/web \ 130 - && python regression/runtests.py --pkg resql' 131 - ) 132 - ''; 133 - }) 122 + with subtest("run resql test"): 123 + machine.succeed( 124 + 'cd ${pgadmin4SrcDir}/pgadmin4-${pkgs.pgadmin4.version}/web \ 125 + && python regression/runtests.py --pkg resql' 126 + ) 127 + 128 + # fontconfig is necessary for chromium to run 129 + # https://github.com/NixOS/nixpkgs/issues/136207 130 + # also, the feature_tests require Server Mode = True 131 + with subtest("run feature test"): 132 + machine.succeed( 133 + 'cd ${pgadmin4SrcDir}/pgadmin4-${pkgs.pgadmin4.version}/web \ 134 + && export FONTCONFIG_FILE=${pkgs.makeFontsConf { fontDirectories = [];}} \ 135 + && sed -i \'s|builtins.SERVER_MODE = False|builtins.SERVER_MODE = True|\' regression/runtests.py \ 136 + && python regression/runtests.py --pkg feature_tests' 137 + ) 138 + ''; 139 + })
-1
pkgs/applications/audio/amarok/default.nix
··· 4 4 , karchive, kcmutils, kconfig, kdnssd, kguiaddons, kinit, kirigami2, knewstuff, knotifyconfig, ktexteditor, kwindowsystem 5 5 , fftw, phonon, plasma-framework, threadweaver, breeze-icons 6 6 , curl, ffmpeg, gdk-pixbuf, libaio, liblastfm, libmtp, loudmouth, lzo, lz4, mariadb-embedded, pcre, snappy, taglib, taglib_extras 7 - , pmdk, numactl 8 7 }: 9 8 10 9 mkDerivation rec {
+1 -1
pkgs/applications/editors/vim/plugins/overrides.nix
··· 1198 1198 hexokinase = buildGoModule { 1199 1199 name = "hexokinase"; 1200 1200 src = old.src + "/hexokinase"; 1201 - vendorSha256 = "pQpattmS9VmO3ZIQUFn66az8GSmB4IvYhTTCFn6SUmo="; 1201 + vendorSha256 = null; 1202 1202 }; 1203 1203 in 1204 1204 ''
+6 -4
pkgs/applications/misc/iptsd/default.nix
··· 15 15 16 16 stdenv.mkDerivation rec { 17 17 pname = "iptsd"; 18 - version = "1.0.0"; 18 + version = "1.0.1"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "linux-surface"; 22 22 repo = pname; 23 23 rev = "v${version}"; 24 - hash = "sha256-fd/WZXRvJb6XCATNmPj2xi1UseoZqBT9IN21iwxHGLs="; 24 + hash = "sha256-B5d1OjrRB164BYtFzZoZ3I4elZSKpHg0PCBiwXPnqLs="; 25 25 }; 26 26 27 27 nativeBuildInputs = [ ··· 45 45 # Original installs udev rules and service config into global paths 46 46 postPatch = '' 47 47 substituteInPlace etc/meson.build \ 48 - --replace "install_dir: unitdir" "install_dir: datadir" \ 49 - --replace "install_dir: rulesdir" "install_dir: datadir" \ 48 + --replace "install_dir: unitdir" "install_dir: '$out/etc/systemd/system'" \ 49 + --replace "install_dir: rulesdir" "install_dir: '$out/etc/udev/rules.d'" 50 + substituteInPlace etc/udev/50-ipts.rules \ 51 + --replace "/bin/systemd-escape" "${systemd}/bin/systemd-escape" 50 52 ''; 51 53 52 54 mesonFlags = [
+13 -13
pkgs/applications/misc/pdfsam-basic/default.nix
··· 1 - { lib, stdenv, makeDesktopItem, fetchurl, jdk11, wrapGAppsHook, glib }: 1 + { lib, stdenv, makeDesktopItem, fetchurl, jdk19, wrapGAppsHook, glib }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "pdfsam-basic"; 5 - version = "4.3.4"; 5 + version = "5.0.2"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/torakiki/pdfsam/releases/download/v${version}/pdfsam_${version}-1_amd64.deb"; 9 - sha256 = "sha256-DYCiK5DgWTu1cm4TRsGDCB3LzVCGVkVzSlG3Jeo2WVI="; 9 + hash = "sha256-+nBLmbu1aRnfWYNhTBUJdRmdlud8FK7LZFvDNFDrhiI="; 10 10 }; 11 11 12 12 unpackPhase = '' ··· 18 18 buildInputs = [ glib ]; 19 19 20 20 preFixup = '' 21 - gappsWrapperArgs+=(--set JAVA_HOME "${jdk11}" --set PDFSAM_JAVA_PATH "${jdk11}") 21 + gappsWrapperArgs+=(--set JAVA_HOME "${jdk19}" --set PDFSAM_JAVA_PATH "${jdk19}") 22 22 ''; 23 23 24 24 installPhase = '' ··· 40 40 }; 41 41 42 42 meta = with lib; { 43 - homepage = "https://github.com/torakiki/pdfsam"; 44 - description = "Multi-platform software designed to extract pages, split, merge, mix and rotate PDF files"; 45 - sourceProvenance = with sourceTypes; [ 46 - binaryBytecode 47 - binaryNativeCode 48 - ]; 49 - license = licenses.agpl3; 50 - platforms = platforms.all; 51 - maintainers = with maintainers; [ _1000101 ]; 43 + homepage = "https://github.com/torakiki/pdfsam"; 44 + description = "Multi-platform software designed to extract pages, split, merge, mix and rotate PDF files"; 45 + sourceProvenance = with sourceTypes; [ 46 + binaryBytecode 47 + binaryNativeCode 48 + ]; 49 + license = licenses.agpl3Plus; 50 + platforms = platforms.linux; 51 + maintainers = with maintainers; [ _1000101 ]; 52 52 }; 53 53 }
+76 -15
pkgs/applications/misc/privacyidea/default.nix
··· 1 1 { lib, fetchFromGitHub, cacert, openssl, nixosTests 2 - , python39, fetchpatch 2 + , python310, fetchpatch 3 3 }: 4 4 5 5 let 6 - python3' = python39.override { 6 + dropDevOutput = { outputs, ... }: { 7 + outputs = lib.filter (x: x != "doc") outputs; 8 + }; 9 + 10 + python3' = python310.override { 7 11 packageOverrides = self: super: { 8 12 sqlalchemy = super.sqlalchemy.overridePythonAttrs (oldAttrs: rec { 9 13 version = "1.3.24"; ··· 25 29 sha256 = "ae2f05671588762dd83a21d8b18c51fe355e86783e24594995ff8d7380dffe38"; 26 30 }; 27 31 }); 32 + flask-sqlalchemy = super.flask-sqlalchemy.overridePythonAttrs (old: rec { 33 + version = "2.5.1"; 34 + format = "setuptools"; 35 + src = self.fetchPypi { 36 + pname = "Flask-SQLAlchemy"; 37 + inherit version; 38 + hash = "sha256:2bda44b43e7cacb15d4e05ff3cc1f8bc97936cc464623424102bfc2c35e95912"; 39 + }; 40 + }); 28 41 # Taken from by https://github.com/NixOS/nixpkgs/pull/173090/commits/d2c0c7eb4cc91beb0a1adbaf13abc0a526a21708 29 42 werkzeug = super.werkzeug.overridePythonAttrs (old: rec { 30 43 version = "1.0.1"; ··· 44 57 inherit version; 45 58 sha256 = "sha256-ptWEM94K6AA0fKsfowQ867q+i6qdKeZo8cdoy4ejM8Y="; 46 59 }; 60 + patches = [ 61 + # python 3.10 compat fixes. In later upstream releases, but these 62 + # are not compatible with flask 1 which we need here :( 63 + (fetchpatch { 64 + url = "https://github.com/thmo/jinja/commit/1efb4cc918b4f3d097c376596da101de9f76585a.patch"; 65 + sha256 = "sha256-GFaSvYxgzOEFmnnDIfcf0ImScNTh1lR4lxt2Uz1DYdU="; 66 + }) 67 + (fetchpatch { 68 + url = "https://github.com/mkrizek/jinja/commit/bd8bad37d1c0e2d8995a44fd88e234f5340afec5.patch"; 69 + sha256 = "sha256-Uow+gaO+/dH6zavC0X/SsuMAfhTLRWpamVlL87DXDRA="; 70 + excludes = [ "CHANGES.rst" ]; 71 + }) 72 + ]; 47 73 }); 48 74 # Required by jinja2-2.11.3 49 75 markupsafe = super.markupsafe.overridePythonAttrs (old: rec { ··· 84 110 nativeCheckInputs = []; 85 111 doCheck = false; 86 112 }); 113 + # Requires pytest-httpserver as checkInput now which requires Werkzeug>=2 which is not 114 + # supported by current privacyIDEA. 115 + responses = super.responses.overridePythonAttrs (lib.const { 116 + doCheck = false; 117 + }); 118 + flask-babel = (super.flask-babel.override { 119 + sphinxHook = null; 120 + furo = null; 121 + }).overridePythonAttrs (old: (dropDevOutput old) // rec { 122 + pname = "Flask-Babel"; 123 + version = "2.0.0"; 124 + format = "setuptools"; 125 + src = self.fetchPypi { 126 + inherit pname; 127 + inherit version; 128 + hash = "sha256:f9faf45cdb2e1a32ea2ec14403587d4295108f35017a7821a2b1acb8cfd9257d"; 129 + }; 130 + }); 131 + psycopg2 = (super.psycopg2.override { 132 + sphinxHook = null; 133 + sphinx-better-theme = null; 134 + }).overridePythonAttrs dropDevOutput; 135 + hypothesis = super.hypothesis.override { 136 + enableDocumentation = false; 137 + }; 138 + pyjwt = (super.pyjwt.override { 139 + sphinxHook = null; 140 + sphinx-rtd-theme = null; 141 + }).overridePythonAttrs (old: (dropDevOutput old) // { format = "setuptools"; }); 142 + beautifulsoup4 = (super.beautifulsoup4.override { 143 + sphinxHook = null; 144 + }).overridePythonAttrs dropDevOutput; 145 + pydash = (super.pydash.override { 146 + sphinx-rtd-theme = null; 147 + }).overridePythonAttrs (old: rec { 148 + version = "5.1.0"; 149 + src = self.fetchPypi { 150 + inherit (old) pname; 151 + inherit version; 152 + hash = "sha256-GysFCsG64EnNB/WSCxT6u+UmOPSF2a2h6xFanuv/aDU="; 153 + }; 154 + format = "setuptools"; 155 + doCheck = false; 156 + }); 87 157 }; 88 158 }; 89 159 in 90 160 python3'.pkgs.buildPythonPackage rec { 91 161 pname = "privacyIDEA"; 92 - version = "3.7.4"; 162 + version = "3.8"; 93 163 94 164 src = fetchFromGitHub { 95 165 owner = pname; 96 166 repo = pname; 97 167 rev = "v${version}"; 98 - sha256 = "sha256-QoVL6WJjX6+sN5S/iqV3kcfQ5fWTXkTnf6NpZcw3bGo="; 168 + sha256 = "sha256-FCvuWXon8c9LnX1FnCxcSTfBR5/6zijD6ld0iAEVFkU="; 99 169 fetchSubmodules = true; 100 170 }; 101 171 ··· 104 174 defusedxml croniter flask_migrate pyjwt configobj sqlsoup pillow 105 175 python-gnupg passlib pyopenssl beautifulsoup4 smpplib flask-babel 106 176 ldap3 huey pyyaml qrcode oauth2client requests lxml cbor2 psycopg2 107 - pydash ecdsa google-auth importlib-metadata argon2-cffi bcrypt 108 - ]; 109 - 110 - patches = [ 111 - # Apply https://github.com/privacyidea/privacyidea/pull/3304, fixes 112 - # `Exceeds the limit (4300) for integer string conversion` in the tests, 113 - # see https://hydra.nixos.org/build/192932057 114 - (fetchpatch { 115 - url = "https://github.com/privacyidea/privacyidea/commit/0e28f36c0b3291a361669f4a3a77c294f4564475.patch"; 116 - sha256 = "sha256-QqcO8bkt+I2JKce/xk2ZhzEaLZ3E4uZ4x5W9Kk0pMQQ="; 117 - }) 177 + pydash ecdsa google-auth importlib-metadata argon2-cffi bcrypt segno 118 178 ]; 119 179 120 180 passthru.tests = { inherit (nixosTests) privacyidea; }; ··· 128 188 129 189 # Tries to connect to `fcm.googleapis.com`. 130 190 "test_02_api_push_poll" 191 + "test_04_decline_auth_request" 131 192 132 193 # Timezone info not available in build sandbox 133 194 "test_14_convert_timestamp_to_utc"
+7 -6
pkgs/applications/misc/watchmate/default.nix
··· 1 1 { lib 2 2 , rustPlatform 3 - , fetchFromGitLab 3 + , fetchFromGitHub 4 4 , pkg-config 5 5 , gtk4 6 6 , libadwaita ··· 13 13 14 14 rustPlatform.buildRustPackage rec { 15 15 pname = "watchmate"; 16 - version = "0.3.0"; 16 + version = "0.4.0"; 17 17 18 - src = fetchFromGitLab { 18 + src = fetchFromGitHub { 19 19 owner = "azymohliad"; 20 20 repo = "watchmate"; 21 21 rev = "v${version}"; 22 - sha256 = "sha256-HyH+9KMbdiJSmjo2NsAvz8rN3JhYKz1nNqfuZufKjQA="; 22 + hash = "sha256-WRoAQDOsCi9VbshGzdw+qrVFKQhOQwPgxOfWXYJ3nhg="; 23 23 }; 24 24 25 - cargoSha256 = "sha256-HvuxKPIVwVrcsTKgPwNosF/ar8QL9Jlldq7SBe2nh6o="; 25 + cargoHash = "sha256-pEXC5IVcMhqYM+bGyTh/vaSS9LxYE2YbtIaPplc4Al8="; 26 26 27 27 nativeBuildInputs = [ 28 28 pkg-config ··· 46 46 47 47 meta = with lib; { 48 48 description = "PineTime smart watch companion app for Linux phone and desktop"; 49 - homepage = "https://gitlab.com/azymohliad/watchmate"; 49 + homepage = "https://github.com/azymohliad/watchmate"; 50 + changelog = "https://github.com/azymohliad/watchmate/raw/v${version}/CHANGELOG.md"; 50 51 license = licenses.gpl3Plus; 51 52 maintainers = with maintainers; [ chuangzhu ]; 52 53 platforms = platforms.linux;
+2 -2
pkgs/applications/misc/xchm/default.nix
··· 8 8 9 9 stdenv.mkDerivation rec { 10 10 pname = "xchm"; 11 - version = "1.33"; 11 + version = "1.35"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "rzvncj"; 15 15 repo = "xCHM"; 16 16 rev = version; 17 - sha256 = "sha256-8HQaXxZQwfBaWc22GivKri1vZEnZ23anSfriCvmLHHw="; 17 + sha256 = "sha256-ZJvlllhF7KPz+v6KEVPyJjiz+4LHM2Br/oqI54a2Ews="; 18 18 }; 19 19 20 20 nativeBuildInputs = [
+7 -1
pkgs/applications/networking/browsers/chromium/common.nix
··· 34 34 , libva 35 35 , libdrm, wayland, libxkbcommon # Ozone 36 36 , curl 37 + , libffi 37 38 , libepoxy 38 39 # postPatch: 39 40 , glibc # gconv + locale ··· 151 152 libepoxy 152 153 ] ++ lib.optional systemdSupport systemd 153 154 ++ lib.optionals cupsSupport [ libgcrypt cups ] 154 - ++ lib.optional pulseSupport libpulseaudio; 155 + ++ lib.optional pulseSupport libpulseaudio 156 + ++ lib.optional (chromiumVersionAtLeast "110") libffi; 155 157 156 158 patches = [ 157 159 # Optional patch to use SOURCE_DATE_EPOCH in compute_build_timestamp.py (should be upstreamed): ··· 299 301 use_system_libwayland = true; 300 302 # The default value is hardcoded instead of using pkg-config: 301 303 system_wayland_scanner_path = "${wayland.bin}/bin/wayland-scanner"; 304 + } // lib.optionalAttrs (chromiumVersionAtLeast "110") { 305 + # To fix the build as we don't provide libffi_pic.a 306 + # (ld.lld: error: unable to find library -l:libffi_pic.a): 307 + use_system_libffi = true; 302 308 } // lib.optionalAttrs proprietaryCodecs { 303 309 # enable support for the H.264 codec 304 310 proprietary_codecs = true;
+6 -6
pkgs/applications/networking/browsers/chromium/upstream-info.json
··· 19 19 } 20 20 }, 21 21 "beta": { 22 - "version": "110.0.5481.52", 23 - "sha256": "09khb67xl1b2caw0j9lmv6a9iyms9sprn2r7wsgqzjn9dzd9wwcq", 24 - "sha256bin64": "0dv9fxwqn50hl06y7zfqby8hd9lwqwk2q3856fygbn82qppkbl4r", 22 + "version": "110.0.5481.77", 23 + "sha256": "1kl1k29sr5qw8pg7shvizw4b37fxjlgah56p57kq641iqhnsnj73", 24 + "sha256bin64": "0wnzgvwbpmb5ja4ba5mjk4bk0aaxzbw4zi509vw96q6mbqmr4iwr", 25 25 "deps": { 26 26 "gn": { 27 27 "version": "2022-12-12", ··· 32 32 } 33 33 }, 34 34 "dev": { 35 - "version": "111.0.5562.0", 36 - "sha256": "0aviz1cjm00lya530n0wyqn85d3idzn3bbp8065ygvfawqcf163j", 37 - "sha256bin64": "0azkcvbl645c9ph4vn4502qbgfcb7zbs4ycy3q73nj5al642absm", 35 + "version": "111.0.5563.8", 36 + "sha256": "0gflrk5i6dr5vrywhxab73044gryxj49px59blgl6nyphw7swpwy", 37 + "sha256bin64": "1dgfjz9pnziy1zymk7g15i5zdb002g77q8kqhkwgi4m0fndknpmj", 38 38 "deps": { 39 39 "gn": { 40 40 "version": "2022-12-12",
+2 -2
pkgs/applications/networking/browsers/lagrange/default.nix
··· 17 17 18 18 stdenv.mkDerivation (finalAttrs: { 19 19 pname = "lagrange"; 20 - version = "1.14.2"; 20 + version = "1.15.2"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "skyjake"; 24 24 repo = "lagrange"; 25 25 rev = "v${finalAttrs.version}"; 26 - hash = "sha256-9onjQ7fRLlL5/1vMtNHjBBcB7Fyk1ERaHg5IwtwbJQg="; 26 + hash = "sha256-NUgDaBRcgYGLKJhSJLT17VZj/mU0w6ySahIYnud5M6Y="; 27 27 }; 28 28 29 29 nativeBuildInputs = [ cmake pkg-config zip ];
+5 -5
pkgs/applications/networking/browsers/librewolf/src.json
··· 1 1 { 2 - "packageVersion": "109.0-1", 2 + "packageVersion": "109.0.1-2", 3 3 "source": { 4 - "rev": "109.0-1", 5 - "sha256": "18nd0shx1r2y2gn42sa2jlckcymmnx3fkm4fp58c80gcppslh1fs" 4 + "rev": "109.0.1-2", 5 + "sha256": "1b5572i7aqad0pmjw88d3mhmhhhacp505z0d9l4l89r7gadssbwb" 6 6 }, 7 7 "firefox": { 8 - "version": "109.0", 9 - "sha512": "9e2b6e20353e414da3d2eb9dcd3d77757664a98a4438a8e84f19a1c7c203e40136b08bf96a458fac05ddc627347217d32f1f6337980c5ca918874993657a58e7" 8 + "version": "109.0.1", 9 + "sha512": "58b21449a16a794152888f50e7fe9488c28739a7e067729acdc1de9f2e8384e6316cffdfe89f690f0d211189668d940825b4f8a26b8100468ae120772df99d72" 10 10 } 11 11 }
+33
pkgs/applications/networking/cluster/pv-migrate/default.nix
··· 1 + { lib, buildGoModule, fetchFromGitHub }: 2 + 3 + buildGoModule rec { 4 + pname = "pv-migrate"; 5 + version = "1.0.1"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "utkuozdemir"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "sha256-I66J1/N8Ln7KBQfzg39wdZuM6PeJGn1HiNK2YVzDySw"; 12 + }; 13 + 14 + subPackages = [ "cmd/pv-migrate" ]; 15 + 16 + vendorSha256 = "sha256-/klqOfM0ZhbzZWOLm0pA0/RB84kvfEzFJN1OQUVSNEA"; 17 + 18 + ldflags = [ 19 + "-s" 20 + "-w" 21 + "-X main.version=v${version}" 22 + "-X main.commit=${src.rev}" 23 + "-X main.date=1970-01-01-00:00:01" 24 + ]; 25 + 26 + meta = with lib; { 27 + description = "CLI tool to easily migrate Kubernetes persistent volumes "; 28 + homepage = "https://github.com/utkuozdemir/pv-migrate"; 29 + changelog = "https://github.com/utkuozdemir/pv-migrate/releases/tag/${version}"; 30 + license = licenses.afl20; 31 + maintainers = [ maintainers.ivankovnatsky ]; 32 + }; 33 + }
+2 -2
pkgs/applications/networking/cluster/terraform-providers/providers.json
··· 412 412 "vendorHash": "sha256-ZgVA2+2tu17dnAc51Aw3k6v8k7QosNTmFjFhmeknxa8=" 413 413 }, 414 414 "gandi": { 415 - "hash": "sha256-mQ4L2XCudyPGDw21jihF7nkSct7/KWAe/txnbtuJ8Lk=", 415 + "hash": "sha256-eVSMjXSYRedig93Tm2ZLpbuJhG3wKSBwfLli7OWs3dU=", 416 416 "homepage": "https://registry.terraform.io/providers/go-gandi/gandi", 417 417 "owner": "go-gandi", 418 418 "repo": "terraform-provider-gandi", 419 - "rev": "v2.2.2", 419 + "rev": "v2.2.3", 420 420 "spdx": "MPL-2.0", 421 421 "vendorHash": "sha256-uWTY8cFztXFrQQ7GW6/R+x9M6vHmsb934ldq+oeW5vk=" 422 422 },
+2 -2
pkgs/applications/office/portfolio/default.nix
··· 27 27 in 28 28 stdenv.mkDerivation rec { 29 29 pname = "PortfolioPerformance"; 30 - version = "0.60.2"; 30 + version = "0.61.0"; 31 31 32 32 src = fetchurl { 33 33 url = "https://github.com/buchen/portfolio/releases/download/${version}/PortfolioPerformance-${version}-linux.gtk.x86_64.tar.gz"; 34 - hash = "sha256-jSRZZufGi1wmdT7LeNutkO74bqln8uJ5TSEDCJyfPB4="; 34 + hash = "sha256-lpKnhAF/VsbLOHkIy1TFqjT0yKlFMNsN+yMUmpBAZKY="; 35 35 }; 36 36 37 37 nativeBuildInputs = [
+23
pkgs/applications/office/rime-cli/default.nix
··· 1 + { buildGoModule, fetchFromGitHub, lib }: 2 + 3 + buildGoModule rec { 4 + pname = "rime-cli"; 5 + version = "0.0.3"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "puddinging"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + hash = "sha256-CI0Jva7oA/zUGatv+wCdByqbTBNQRw+4clr8IDKX6HQ="; 12 + }; 13 + 14 + vendorHash = null; 15 + 16 + meta = with lib; { 17 + homepage = "https://github.com/puddinging/rime-cli"; 18 + changelog = "https://github.com/puddinging/rime-cli/releases/tag/v${version}"; 19 + description = "A command line tool to add customized vocabulary for Rime IME"; 20 + license = licenses.asl20; 21 + maintainers = with maintainers; [ urandom ]; 22 + }; 23 + }
+2 -2
pkgs/applications/science/biology/stacks/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "stacks"; 5 - version = "2.60"; 5 + version = "2.62"; 6 6 src = fetchurl { 7 7 url = "http://catchenlab.life.illinois.edu/stacks/source/${pname}-${version}.tar.gz"; 8 - sha256 = "sha256-ppKG7Z1TyLwUyqRnGYk3QWPJqKeNcW04GMW7myPFSNM="; 8 + sha256 = "sha256-7uhQVLC/AEPAPUdm3+vABoIwG4uhNy/EngjsrZjT0Ts="; 9 9 }; 10 10 11 11 buildInputs = [ zlib ];
+43
pkgs/applications/science/chemistry/mopac/default.nix
··· 1 + { stdenv 2 + , lib 3 + , gfortran 4 + , fetchFromGitHub 5 + , cmake 6 + , blas 7 + , lapack 8 + , python3Packages 9 + }: 10 + 11 + assert blas.isILP64 == lapack.isILP64; 12 + 13 + stdenv.mkDerivation rec { 14 + pname = "mopac"; 15 + version = "22.0.6"; 16 + 17 + src = fetchFromGitHub { 18 + owner = "openmopac"; 19 + repo = pname; 20 + rev = "v${version}"; 21 + hash = "sha256-j4AP3tki+Ep9Pv+pDg8TwCiJvpF2j5npW3Kpat+7gGg="; 22 + }; 23 + 24 + nativeBuildInputs = [ gfortran cmake ]; 25 + 26 + buildInputs = [ blas lapack ]; 27 + 28 + checkInputs = with python3Packages; [ python numpy ]; 29 + 30 + doCheck = true; 31 + 32 + preCheck = '' 33 + export OMP_NUM_THREADS=2 34 + ''; 35 + 36 + meta = with lib; { 37 + description = "Semiempirical quantum chemistry"; 38 + homepage = "https://github.com/openmopac/mopac"; 39 + license = licenses.lgpl3Plus; 40 + platforms = platforms.linux; 41 + maintainers = with maintainers; [ sheepforce markuskowa ]; 42 + }; 43 + }
+41
pkgs/applications/science/chemistry/wxmacmolplt/default.nix
··· 1 + { stdenv 2 + , lib 3 + , fetchFromGitHub 4 + , wxGTK32 5 + , libGL 6 + , libGLU 7 + , pkg-config 8 + , xorg 9 + , autoreconfHook 10 + }: 11 + 12 + stdenv.mkDerivation rec { 13 + pname = "wxmacmolplt"; 14 + version = "7.7.2"; 15 + 16 + src = fetchFromGitHub { 17 + owner = "brettbode"; 18 + repo = pname; 19 + rev = "v${version}"; 20 + hash = "sha256-sNxCjIEJUrDWtcUqBQqvanNfgNQ7T4cabYy+x9D1U+Q="; 21 + }; 22 + 23 + nativeBuildInputs = [ pkg-config autoreconfHook ]; 24 + buildInputs = [ 25 + wxGTK32 26 + libGL 27 + libGLU 28 + xorg.libX11 29 + xorg.libX11.dev 30 + ]; 31 + 32 + enableParallelBuilding = true; 33 + 34 + meta = with lib; { 35 + description = "Graphical user inteface for GAMESS-US"; 36 + homepage = "https://brettbode.github.io/wxmacmolplt/"; 37 + license = licenses.gpl2Plus; 38 + platforms = platforms.linux; 39 + maintainers = with maintainers; [ sheepforce markuskowa ]; 40 + }; 41 + }
+1 -1
pkgs/applications/science/logic/coq/default.nix
··· 91 91 passthru = { 92 92 inherit coq-version; 93 93 inherit ocamlPackages ocamlNativeBuildInputs; 94 - inherit ocamlPropagatedBuildInputs ocamlPropagatedNativeBuildInputs; 94 + inherit ocamlPropagatedBuildInputs; 95 95 # For compatibility 96 96 inherit (ocamlPackages) ocaml camlp5 findlib num ; 97 97 emacsBufferSetup = pkgs: ''
+2 -2
pkgs/applications/virtualization/conmon/default.nix
··· 11 11 12 12 stdenv.mkDerivation rec { 13 13 pname = "conmon"; 14 - version = "2.1.5"; 14 + version = "2.1.6"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "containers"; 18 18 repo = pname; 19 19 rev = "v${version}"; 20 - sha256 = "sha256-zpZ3hVgnh8gkrSghSvhSZnG9uaN+GTKFGHv+MMcs73Q="; 20 + hash = "sha256-vmZSt0k6h4Zpbf+/Nq19QIkG3Fzjj3K031XnivFDA2s="; 21 21 }; 22 22 23 23 nativeBuildInputs = [ pkg-config ];
+5
pkgs/build-support/go/module.nix
··· 145 145 cp -r --reflink=auto vendor $out 146 146 ''} 147 147 148 + if ! [ "$(ls -A $out)" ]; then 149 + echo "vendor folder is empty, please set 'vendorHash = null;' or 'vendorSha256 = null;' in your expression" 150 + exit 10 151 + fi 152 + 148 153 runHook postInstall 149 154 ''; 150 155
+1 -1
pkgs/data/fonts/iosevka/bin.nix
··· 11 11 (builtins.attrNames (builtins.removeAttrs variantHashes [ "iosevka" ])); 12 12 in stdenv.mkDerivation rec { 13 13 pname = "${name}-bin"; 14 - version = "17.1.0"; 14 + version = "18.0.0"; 15 15 16 16 src = fetchurl { 17 17 url = "https://github.com/be5invis/Iosevka/releases/download/v${version}/ttc-${name}-${version}.zip";
+92 -92
pkgs/data/fonts/iosevka/variants.nix
··· 1 1 # This file was autogenerated. DO NOT EDIT! 2 2 { 3 - iosevka = "0lxcyg93max17fqm6yvxwvr79jz9bggxcmv6qx8sknvjmq89l0pf"; 4 - iosevka-aile = "0pljy65m5zaxbajfmhc3gayz73rbp8vzaqzqcrlm2ir9yxaz21qc"; 5 - iosevka-curly = "0svf6hm0cspydgzjg39f5rp7mrcabb0vc2088r1msipaw8naajqf"; 6 - iosevka-curly-slab = "1afk0ijfciwh9pjy2qsawxw7gq7jxr52li2nwggcq04c9ybh62pg"; 7 - iosevka-etoile = "07zihk9q1ff93ms9gj92hbf2fzw7h4fl28szhrfll3p96y9f81q7"; 8 - iosevka-slab = "18hrv0kc82hfb6ivbdg5k9179k37anjigm8ddh5waiq2is6gmh8l"; 9 - iosevka-ss01 = "127zki1wcd2wjpqr1n2zf57iq44pwcrg2vlrspi3b9lhmxw0rlz9"; 10 - iosevka-ss02 = "0ig7y86c2d9y4bg5cqibbn0wqwwzm5d5qxd8vwhvd323mg3gh6bg"; 11 - iosevka-ss03 = "0zp2nkrl39pvidn846706dp8l12ac66kd9wsyh4cnn08mmm6gl4i"; 12 - iosevka-ss04 = "0r0ylsxj2j9akpxchnldwyddm7vrlpn82sxkgmjhr81hn3q08bgc"; 13 - iosevka-ss05 = "0r9mdhdjndxgm68fg59dbd810ggrpmpkvgcypyqf92l8sf1h55hj"; 14 - iosevka-ss06 = "1c6ga4jaglfp5mx980qy1alkifr1d1lq4qj69xfq6sx4146xn20f"; 15 - iosevka-ss07 = "0h1x2p9finl4482vx6lvs45x5258bpw5avkpgmg66wn16kd95zfq"; 16 - iosevka-ss08 = "1n5m11dlv49jj63s771ny77qpiz178iyvn7pfnhv2mzqwimz5sl2"; 17 - iosevka-ss09 = "1rbs15xsk7fajrm81nacixf18jjx08bpg26fw7pmxjv727zafv05"; 18 - iosevka-ss10 = "1rdpiq5pyzrnxhnsvf08zg0vjhln25vqkyknnv4xf34wr8r9xcc0"; 19 - iosevka-ss11 = "0l9454vx90pj0yva864qfj06ggplia0qdkv3nr14s3wmv5khh9gw"; 20 - iosevka-ss12 = "0cafszj0c7nkcxpbqsrqy5l2v0nzfph6i22w1iayg8bqvpip3x5m"; 21 - iosevka-ss13 = "1mlxh6qikrl0g82difr85lpkxdr83z5iymf0brmgdxkmyig3psr7"; 22 - iosevka-ss14 = "1330p52h94fgr76gll396hb0qalamm8z79hw73ci4ph22dpsd4ni"; 23 - iosevka-ss15 = "0cc5a1187i9idgvz7zhs0byya8c69f0g4pkqlivh37ffj07yv47v"; 24 - iosevka-ss16 = "052nypjppbrbkhjq85nwmx8469prfsbc9f05kw0vi30c8mpcjqwf"; 25 - iosevka-ss17 = "0k5p1qvx8vi8ic7yayky7zdi1hrkwli698ydlfhnk4yx10l0xq8j"; 26 - iosevka-ss18 = "16diyrfpz1kp9vcyq61pbdrrv4pl96kzn8ckv7wb5cnwxwa336c7"; 27 - sgr-iosevka = "0b92jmai9cgxdah74jmks7fwbyb1m722ablf3qaiizc597y031wv"; 28 - sgr-iosevka-aile = "1z5jg74aspkvhw41ihwzbfs4f075gs8ny76m30adp0n3v877nhjz"; 29 - sgr-iosevka-curly = "06bm6jg16sgvxnqbayqa92lvr0bc5vdjybbi467yx57hi83w860q"; 30 - sgr-iosevka-curly-slab = "08kg8imp29sww57mdpfmi86046vqwd4a2ayijcvs511v8nhl478r"; 31 - sgr-iosevka-etoile = "0gybfn95n2b8kn3bvi8pjkps5bmndnbbq9jbfbm81fims0s0496b"; 32 - sgr-iosevka-fixed = "15q4y8cm8cwxcbmjzknc19gyqmd4nb928b26nswm8m17p85zlcq0"; 33 - sgr-iosevka-fixed-curly = "1faci2m7w8cf65mjkigqlyh838r5mqvg7ai4nfdidms6ilhhsf37"; 34 - sgr-iosevka-fixed-curly-slab = "019m3nvsy6vwgf6f0z2l0wxxkqbl30y55jfgi2bsmxhizwzl3csc"; 35 - sgr-iosevka-fixed-slab = "1ps1xi334h7by3nihn3n6d76sbzcvv03dwy4iy5wixlz0lr8id5i"; 36 - sgr-iosevka-fixed-ss01 = "18qdd6qbk8dy6z36lsy89a7g6l1asdzqvlc82j9vk437yjm59vwi"; 37 - sgr-iosevka-fixed-ss02 = "0xm1k1f5hbhjbksshlv7bcdigdrxxhfpc8pgv7dvz7zpy7cx2y4y"; 38 - sgr-iosevka-fixed-ss03 = "1741k3p2mncq9kp1wshpl6dkwqvvg2bpakl91k6ssvj1z63r2zhq"; 39 - sgr-iosevka-fixed-ss04 = "0sw65088yihk2sk2mcdr4cd8rl9l954l2sc3y7dil3jkgw6kf0wq"; 40 - sgr-iosevka-fixed-ss05 = "1cc71vidcljh6k6pw6z5yygi0kir7n235l19as8y1qazmc8kh0ip"; 41 - sgr-iosevka-fixed-ss06 = "0s2f0j0z4dyd23z5mldih03cg8vqwvpqrmagbpx02v2krzn2vb27"; 42 - sgr-iosevka-fixed-ss07 = "07nfdx7bdbsxrmylsja8bvr1n2a116qyfg8pk1wpcax3vf56jamh"; 43 - sgr-iosevka-fixed-ss08 = "0ys6gw2p7vpdv8csxzxjx09m8k0h4s28w7i98iq27ak47xcm8xd7"; 44 - sgr-iosevka-fixed-ss09 = "0vn6vc0byakggyrd6d9mv1l9d4h5g7wcbkkmxzqfjr6xp3k96r88"; 45 - sgr-iosevka-fixed-ss10 = "0llqjvv7m1imvqw41xvmcw9y9c9wsnv2i8swnszr9r5khx3kbp6h"; 46 - sgr-iosevka-fixed-ss11 = "1wwjp1fgl2gxhjkmsz6k0a59kjcapby9y8j5m763ap4ig5djbv8r"; 47 - sgr-iosevka-fixed-ss12 = "1k9ak5dc3s024iz6rp4yz9b73752v93n0kldcnwi0lvbh4hp358k"; 48 - sgr-iosevka-fixed-ss13 = "0rgj38jkj6d7g44wn02k6ycixkwq6lwy756vp9w01aqqn5flw6s1"; 49 - sgr-iosevka-fixed-ss14 = "0lbpwnc40lswlmfwqziz7n3kn95kc5rn4fbq5nxa1z8cxz9dkhvh"; 50 - sgr-iosevka-fixed-ss15 = "034h7af7876q0ni8idj5dhkq1cpl91gvxhwxyw17pgnz8i51a261"; 51 - sgr-iosevka-fixed-ss16 = "0i00nxj0j7yr57b4ccd2yc4x7k8zw1xxpdwfwlm0n38c05iqbvj9"; 52 - sgr-iosevka-fixed-ss17 = "1z21han7l7nwz0qfi6fzvwdiadd9brpna51p24drdi8y3915b8n9"; 53 - sgr-iosevka-fixed-ss18 = "0fjdsx66al0h3spgdivryiw5d871s93s2lbmh7nxwf19lylrkv19"; 54 - sgr-iosevka-slab = "0j42hxgcwy5abf5jv5aqjri6h21k2nkgjj7527f68rgcnl9d980b"; 55 - sgr-iosevka-ss01 = "1m7c8zb3rhxnf9h4v55jv7ns6x74bwfsl6f4sl2b1gkfl50ibwqg"; 56 - sgr-iosevka-ss02 = "05cc3p8lkxl1s27wmgspk93fz8f51daqcfid8vpsvnqw75abivc9"; 57 - sgr-iosevka-ss03 = "0bmh1ijdalss96lkji0dcyl00wc2yw7a3lx0nqbbjl4m0l2mz4yp"; 58 - sgr-iosevka-ss04 = "1jc1y9rgw8hnd7zqrn98b35r01kmr2nykqip63h6qal7l456m4s2"; 59 - sgr-iosevka-ss05 = "06acxqhzfxlhqd083s57b15sx2vgq0r6pl9myp8syh1d9azbk899"; 60 - sgr-iosevka-ss06 = "0g3zaxy9363p28kcv6a52dqb1swnrn3rwl6pfvanz92vrrjspr7n"; 61 - sgr-iosevka-ss07 = "1bmdparw1hg3i8lnx8vwd467pwf4q94q80a62fcy87hppy3afryg"; 62 - sgr-iosevka-ss08 = "16kgj158nhmlql0gkkfya04dy1gp9an4gk691f28n0mqhi7hygcr"; 63 - sgr-iosevka-ss09 = "144x84qmh9pycn9v36q4z074vmnngn0chlyb8a8hyhgsyfqf7q7h"; 64 - sgr-iosevka-ss10 = "0i9hsmw78yg75a3m80jlmdn2rn72snz69m0abvz7z94b7c99ffsb"; 65 - sgr-iosevka-ss11 = "05a9azf7f64jdr5wwiy7djlmarl01mg6rfmzvrdd8a1a0nfcz1iz"; 66 - sgr-iosevka-ss12 = "1nqa88csh170gs3bggs6v5ssaqljvpw1zxaclhmzdvyhcphrwd19"; 67 - sgr-iosevka-ss13 = "1klhp2w99znj9qyz95z8jq3g23fs8jznya9dfzfy2i4hivw2gxv0"; 68 - sgr-iosevka-ss14 = "1w84mqg0x46fbr8v72ccxc9a7sp52g4qb0x6l84wr8cm1fn7n21f"; 69 - sgr-iosevka-ss15 = "05kdxmghhdyvlnc3wxzc5yyp00ybrq63fzh2kz3s4rwh11hhf0lq"; 70 - sgr-iosevka-ss16 = "0a9i7plsfy8fawip70p5w3dkmjh4sy61iwi9pnl0ara7z23783dq"; 71 - sgr-iosevka-ss17 = "1xmaqs54jhag7s18gfll94g0ixjqp2z5s69kwk48nznzpbfbpdsb"; 72 - sgr-iosevka-ss18 = "09nq0a7b4hkiyi1prxpf6vwms9cnmby2dzn9k4y0xcax7m464531"; 73 - sgr-iosevka-term = "1zr8cyq6578n8f3y9yyc0phs26hda1bf0bsd417wqcwsn88wfmx8"; 74 - sgr-iosevka-term-curly = "0xlwljc2gmwh119x83p2pic5zwjqdymg7pbl2ginzilsrgjl2k0q"; 75 - sgr-iosevka-term-curly-slab = "1vmpdws71sf1pf8nz3w7y0a64a5c3mp8f9w57bqmcn9vr22ymcl7"; 76 - sgr-iosevka-term-slab = "1wkqdgy9nd4mvy4rsssvpis1r17ikpbl8mfx6bp80fh0lai97mxw"; 77 - sgr-iosevka-term-ss01 = "1ly5ic5ihj00apb87am3kl38mywns8jizc7f4hniyrd9xhy1186z"; 78 - sgr-iosevka-term-ss02 = "09lisy461dvppfv6sdk4i6vfrqhxyx558zdaflv9vskmfq8iq66d"; 79 - sgr-iosevka-term-ss03 = "0nm84l4xk53l1q96hx8q63nbflgmivj3cq7z5mysv1z8jdp7isx3"; 80 - sgr-iosevka-term-ss04 = "1y9kkasxmpm4n1vs5plsa25cgwvdi4jahn3ggdlxpl35yi4kxnr3"; 81 - sgr-iosevka-term-ss05 = "1drngqgcibv6kfwjn3s2bik286ypj613q4p3fz0b7incniaz372j"; 82 - sgr-iosevka-term-ss06 = "1rkqnj59hv1lzsplss3jk0jgz6q68qkg4a3200hv10rs9i2w2qxk"; 83 - sgr-iosevka-term-ss07 = "1z6jh8qmc2063zgwbd00xi258grdillkc1nja69awdxiamv6hgf9"; 84 - sgr-iosevka-term-ss08 = "022qw6frmmmpwbq6af8rysm8pbq713fiw92hkqi5k3j4v8dwl9v2"; 85 - sgr-iosevka-term-ss09 = "1c32p4d46q3izif68ka6gr1hmq10snrlga5d7ypphmm8yxvavd9c"; 86 - sgr-iosevka-term-ss10 = "1p497kqa386q5rvsfigzxdr0009agiw4bv4xxmb83pg3sl8bf7z9"; 87 - sgr-iosevka-term-ss11 = "19kfvmwijd1kyw4bln0m5z7wpch9h44ny13ccxx0qmiv5y7wwm94"; 88 - sgr-iosevka-term-ss12 = "1pnr7yd431xnym12vnlww6rxm1vfd9x24kqpx0323q3n61yjqzd6"; 89 - sgr-iosevka-term-ss13 = "04nhps95s360vv4qr1pbzs1aj8zdalzv4ajdkawdssxaz1xs57c7"; 90 - sgr-iosevka-term-ss14 = "1xvdpx8sa4ifgy9a3y65qcxj8cavisw4h7hjfivq4y0il79sl7nw"; 91 - sgr-iosevka-term-ss15 = "03rs8b8yb7n1f7cp6zffgr7x20vx6hiag7a22ysx0zr2i4zp37i6"; 92 - sgr-iosevka-term-ss16 = "1s86hmr7a6qwyf5m9q0npzzd25nvh9k1nlja1b8fnnlgchycwfbw"; 93 - sgr-iosevka-term-ss17 = "0y5i99iy7r3z4cv87s3v3mxbadp3np16a3c65w41pjv86llkc30g"; 94 - sgr-iosevka-term-ss18 = "0s5hdh61y5v17jrdpajgkzzrg0cqgcad6gvs9m8v55xi2zlqfxip"; 3 + iosevka = "03f2rabj2w2l7jwqyl2awj42jhh0l3picqgyfcv3q067i34abfyn"; 4 + iosevka-aile = "0p1r5sysy6djfd1sx0pfxf42bv7ayqgk1nvil33jr925w96i2dp6"; 5 + iosevka-curly = "0r33wcgvh315avgkkic27qpf3bavrqwbig1kj4wm5rdr957ldk40"; 6 + iosevka-curly-slab = "0yd7grhnx7z27xmd3wr8x2xx2002hmfi1y3ndmqq1sc9gab5gcb7"; 7 + iosevka-etoile = "0jhd49vxxxaqi1rxfkmpc3v1q96ak1b5wyggchngqi3739pjgqy3"; 8 + iosevka-slab = "00wk15kj9b1nr3b0bmarx6gqx3jg8z1pm9qqf9x09s72b3ng8adm"; 9 + iosevka-ss01 = "1kp6zv8zyx50la7zrfz4fis68s41kplibagny61w5v3w36xpm3cs"; 10 + iosevka-ss02 = "1c0dl28a3wwa5g4793jyb4n4c8p5vjlyh1b8j2i5da31dqrqm9gj"; 11 + iosevka-ss03 = "0vs8x6l8gwqi47g1c5ainsk5fb2i6j4wv7mgdyw5j5l3blnba5yh"; 12 + iosevka-ss04 = "1caf4xqd1dywzbq06ip042rw88833yk9ws7y3vjvsp93g7a2r675"; 13 + iosevka-ss05 = "008aphj4w6ri3fgnydrxavvpm3bfywv4cym10fqi9xgd84jhm9m1"; 14 + iosevka-ss06 = "00dkagqiwzwzvv75zss82yx0gdcbmh9xvr8swhi5zk0y0bc3xk2y"; 15 + iosevka-ss07 = "1acnva081awp76xyspksq9jkvlyswh3q1jy9gnsc6kh4vyn17vjs"; 16 + iosevka-ss08 = "0lmkglcjlppvfd7k2pz57r476fa4c0q5l4gqzfy1mlklh0mc5hqb"; 17 + iosevka-ss09 = "04r2k2z54iszwfnif872p5br0dm4fvc5341cpbxv4almpzxjyqnr"; 18 + iosevka-ss10 = "1c6gs9g8dhywpd2ha7kx2l7g7bwj7i5a78645ipx8126f749y0y9"; 19 + iosevka-ss11 = "0286k56r12a2yjylxynvzd0idrcv4ykrmpkn3b5xv9f74qq6irmf"; 20 + iosevka-ss12 = "0ab4x5lh8spbg0djb092vcq1cnvjhazwkia8byq1q47iwiyh756l"; 21 + iosevka-ss13 = "0kva71mfkl9xzz8khjzgrj47zg2505rg0hv5hxflawxsqwi4iwvl"; 22 + iosevka-ss14 = "1gk7m3xh4v3jm6s5g2prd27w4p0r1blbxsxdy3b020bdwikxcaga"; 23 + iosevka-ss15 = "0frxjc3hhay8izsx4ywff4j39qxp9ljz6hvw0rjcya3vny515jq5"; 24 + iosevka-ss16 = "1g299yhn0kfc7vn8vbgwq4798w5lcl72j6hj91k90i1yq11lg13i"; 25 + iosevka-ss17 = "02z83x73bhpgf44kq0gw46bdnpqzr4vm37h78bh19vydzqaj8hg0"; 26 + iosevka-ss18 = "1b7vhhbspi98xzmk4hpiw08jmscm7f7nibqxhkfmppl6y0ymbm9d"; 27 + sgr-iosevka = "1n60dgprl2p22wwfhxpwy9v9xf6vyv3qwm2jdc0m9m0q9jwjashr"; 28 + sgr-iosevka-aile = "1k195vqv2wajhmyma43xgda3s2z86kl2gksgdrm95s9sx7ijns2s"; 29 + sgr-iosevka-curly = "15yq1fs7knp9gxgqjxslpmlx85c6kvpm31sf81llpf4k5f9dmlcp"; 30 + sgr-iosevka-curly-slab = "0fa68lm6iwlf2s5k8388dwgk015c55zg1wkhhhjmixwn7p8gifxz"; 31 + sgr-iosevka-etoile = "1ry1zc7cdx6g927d1752ipz39v4wsnfrnn8n9cfwamz8v458wld1"; 32 + sgr-iosevka-fixed = "173v09dx5pwsbh9jac5qxi7nk95dqyryg747hl58bchby6kmnc3k"; 33 + sgr-iosevka-fixed-curly = "11y8bj9vmdq48n370f1r4zsk72ci3cq7c9ff6y40hn5w40s8k379"; 34 + sgr-iosevka-fixed-curly-slab = "1a4gmz6sl67l23awkfl8f3xdr8hbb2mi1lsc0ain1wvvyx1bi56m"; 35 + sgr-iosevka-fixed-slab = "11xv18ykrfg2fdvbrlcx7k3qvp5yqbm278ks3gm0gbck1awvfckg"; 36 + sgr-iosevka-fixed-ss01 = "1yb96x53wjks537vs0gd7rss6piszs139k1kgb1swrpq7519awaz"; 37 + sgr-iosevka-fixed-ss02 = "10yy0yg2i9nm00lzpmrfbdh7jjcll37wql3fcsaxha57gcxf9nf0"; 38 + sgr-iosevka-fixed-ss03 = "1fpjfqlqq6lz3gya1q24nzy2xls6nxn567lhglj0ykjnh3prkll8"; 39 + sgr-iosevka-fixed-ss04 = "1kwa5mwd6ihsyj2y70hrrvgy41cs19i0f7nvl4khs3i69a1l58ag"; 40 + sgr-iosevka-fixed-ss05 = "08v8in8s8p2nayazq60w1kc1jpq48nwdwh6wbxv7ij7lfwii8xws"; 41 + sgr-iosevka-fixed-ss06 = "03jzylw99xa3b6hpy6bpwhyii6d9fggy9synfl54sn7smwqk08wr"; 42 + sgr-iosevka-fixed-ss07 = "13yzd6r51gka03fcl3bvx6d97b4m4px2cnsd724maqkqrcxkbxgb"; 43 + sgr-iosevka-fixed-ss08 = "1xghlj7drx9328jr1cb051nkwv47r5ykkyy6ydff1c4amc1xabsq"; 44 + sgr-iosevka-fixed-ss09 = "12l6lbz4m1lwyqqmv583777r9ymssy9x34rz72y3dch0mqhmjjzg"; 45 + sgr-iosevka-fixed-ss10 = "1flrh6a7m0dw7na30nhbxjld54517z77ff3s9fjrpmgyb9wz7i2j"; 46 + sgr-iosevka-fixed-ss11 = "1j4v4h6k505gkxyswcjf61kj9cfgkalxjg1arms9zb351p8rrkda"; 47 + sgr-iosevka-fixed-ss12 = "00qwnsxc08bm5cq3ljz2pjqsiw019ah4z0crqcwaysijicxmbckc"; 48 + sgr-iosevka-fixed-ss13 = "0jrw0amhfi28mc4i7a74qvgjamvymijlf3akskaw9qrmzvks8wn1"; 49 + sgr-iosevka-fixed-ss14 = "0rvh842zkxdrna9nh2ylsjs3q90sq39658l0mafi85b8z5asdwai"; 50 + sgr-iosevka-fixed-ss15 = "0j5yrr1biqfhgj6qg6359xg9rfv6qzqiqdqjgfjwbhijs6xfn8f1"; 51 + sgr-iosevka-fixed-ss16 = "06jrfhb257nmldnxxyc5rh869r5y62v2y034c0r9j7354s7gcq7a"; 52 + sgr-iosevka-fixed-ss17 = "0cgmsh0478963k1dgpkhy6j1b383gx2q09z3shr6j87knjjwqgp0"; 53 + sgr-iosevka-fixed-ss18 = "0r4nyd459aqgna7dyzvxnznclqihxdb888g949kdzhxykfchq53s"; 54 + sgr-iosevka-slab = "1bv8asz66hn80xvjxa7b0vgywha1bpmhd8q95cssc3085dprz1r6"; 55 + sgr-iosevka-ss01 = "0sv19w0adnddzarf8dlz0n73jzqnp0xfb2lgh4xcpjkhm66j3fhh"; 56 + sgr-iosevka-ss02 = "1ih10a666r77pvj57crdgyn7ll15giwxj0nis501r1fkp1bzkscn"; 57 + sgr-iosevka-ss03 = "180hkjzzgasf9a58vi0n0cishnbyjgbjmkh60awcpxwvh85qd4hf"; 58 + sgr-iosevka-ss04 = "1i4rpg9j967xaxg8h9dmachd3896f4jgwxa0mfjlizls2hfvnbsi"; 59 + sgr-iosevka-ss05 = "1ca2z4dincjk7jl16pa6d7dnnzq3w3il7fr2lphvrjvdrxbci615"; 60 + sgr-iosevka-ss06 = "08dj9dcq58grnp6lh16yvvzjqhzlm765v4ci1rys0wbjnp72xxda"; 61 + sgr-iosevka-ss07 = "13k6plhdgxhp5gjs8z98wb480hh5wy6p2zmc4xvhp88y93fy8kk7"; 62 + sgr-iosevka-ss08 = "1zfxamanq6a06fazn1jkaswh5g6iw22qnycg5dnxn4flk8nas1db"; 63 + sgr-iosevka-ss09 = "0qaxp4fsvl26il16h78y2l8013m49cbk2nzxcs1k9g5if11a49d3"; 64 + sgr-iosevka-ss10 = "1qvvm6rvhrbp83qjfb3dfsbam20f6aw52kg1i5ggfrqj35niv0hd"; 65 + sgr-iosevka-ss11 = "1v2b456qj8kyacm7308gsim5p25wnyg8qabyrfvdj00h81s31akl"; 66 + sgr-iosevka-ss12 = "1rsi6ir5vccar0n3ychisc40axiyhqj5yvcx450ppd33f3sd5rc7"; 67 + sgr-iosevka-ss13 = "12x4q5l1pdxi065zs913dqd7zb8qpi4bbgd43h3k5azsrwxwvixr"; 68 + sgr-iosevka-ss14 = "1snzdv23jqmbz25k9i2zl7px7yysk5hn74q1x251s07ghdx3nfdj"; 69 + sgr-iosevka-ss15 = "0hbmj6wij6cv9yh76npp4xrl7fdm8jjx03398anfcsa02gkvg8zz"; 70 + sgr-iosevka-ss16 = "0v6vhg0vp5ig6ngs96q5mxa2snfp08nk68a9772sm1ny61q3chrq"; 71 + sgr-iosevka-ss17 = "0268b85yhdfsbjyhi0vlxwrpwxa8h919np53s060z94094h6jd9x"; 72 + sgr-iosevka-ss18 = "13vnhh8181h36y6iz2p2x6rjgjv5w3d0gqbcdkwhgmvx7s03k122"; 73 + sgr-iosevka-term = "05c2sxb4aris90mhjxyfkw1b0ga0hplfas669076h7yjsimw647l"; 74 + sgr-iosevka-term-curly = "1j0b4fhcivkdgka9zyqf732hcxj8rchqxkwv2bwxib1a17fmwn6c"; 75 + sgr-iosevka-term-curly-slab = "0dvv2n3plfxm8z2xi1ihzn4rncyk1kz8xbgyprnb0lvqiyf18igy"; 76 + sgr-iosevka-term-slab = "0i7wrvq6c96q8v6zw9iym42b6sbm0vc04ysljghpblnnfymq5yv9"; 77 + sgr-iosevka-term-ss01 = "1n23qp50pr466blpn2h9dhjbn0wnbbxyzb0sz751bk8db41lpyqb"; 78 + sgr-iosevka-term-ss02 = "0ghvfhkdsfsjb8yjwvwlwhn66lmy8dx34126ccnvj0g77ww2nwa9"; 79 + sgr-iosevka-term-ss03 = "03hnmy9wijqwsc36cg5b3pxj7mb1cbyacii00pcvrpcns2w1ssbw"; 80 + sgr-iosevka-term-ss04 = "0fv9xhhii0h5ii4yxsdnywn45254494mgq1n5aajasq494cgxhp4"; 81 + sgr-iosevka-term-ss05 = "0qa4l77sjpxd9l4nb555bhgzm0f1c74w6014md2rpljjvyy2mzwg"; 82 + sgr-iosevka-term-ss06 = "05y7rmghvhmzw3spn7b3v6hmpcqg5p32flm437a1aljdr46sbxli"; 83 + sgr-iosevka-term-ss07 = "1lzqgpr1vchi4ricqp1v49nv62rl3anbdvzpvddby81wr5jcyd1y"; 84 + sgr-iosevka-term-ss08 = "1sxicv2gspc39fyja370dpiq12xd1bgndiw5r6cqfkkd8x8dgpdv"; 85 + sgr-iosevka-term-ss09 = "0ax9pgm3d171kksrqd2z8xpr68kdxkqg9h344an55gjk01q7dzay"; 86 + sgr-iosevka-term-ss10 = "1rgvadmvdldcaqa0r76kzmrck814qwksdqficaxcd7wk8bx64n81"; 87 + sgr-iosevka-term-ss11 = "02if14ff5kax4p1aa2wkbidhwlzgyxi7lxir2ildahwfkvkp971y"; 88 + sgr-iosevka-term-ss12 = "0sj8n12is4094nbj67wkk88953jp9235kvvr4230abql1g6s263r"; 89 + sgr-iosevka-term-ss13 = "006sdcj8qw247b63d647ykm8razyb0apsfd0cjmlikj9hdmyzrr2"; 90 + sgr-iosevka-term-ss14 = "0i7d3ldp9rj1f4kwdk8hkxq0s38df6i25qfx6hwfjj1c5bl3a843"; 91 + sgr-iosevka-term-ss15 = "15gjqz7zc6wwy1l61pgpnz7wwyyaij43dcrwcwyi6h10jhm8b3ia"; 92 + sgr-iosevka-term-ss16 = "1c1i1iyqzgh3pz4fzjp26d71lphmcgqbjp2s91yyqg3nfhwbzvyc"; 93 + sgr-iosevka-term-ss17 = "0kr58576vlx81nb2ia5z9226m6h0ybd5vzfj5li9b721l4q0rpky"; 94 + sgr-iosevka-term-ss18 = "1zjs40i4dmw2l45k8wydngl4g3a88nhbmmjwd5lsz8a40pq4bw15"; 95 95 }
+44
pkgs/data/themes/breath-theme/default.nix
··· 1 + { lib 2 + , stdenv 3 + , fetchFromGitLab 4 + , cmake 5 + , extra-cmake-modules 6 + , kdecoration 7 + , plasma-workspace 8 + , qtbase 9 + }: 10 + 11 + stdenv.mkDerivation { 12 + pname = "breath-theme"; 13 + version = "unstable-2022-12-22"; 14 + 15 + src = fetchFromGitLab { 16 + domain = "gitlab.manjaro.org"; 17 + owner = "themes"; 18 + group = "artwork"; 19 + repo = "breath"; 20 + rev = "98822e7d903f16116bfb02ff9921824c139d7bbc"; 21 + sha256 = "sha256-gvzhHOuOhxV3TC3UZeVpxeSDLpCJV+SaapcJ5mbHskY="; 22 + }; 23 + 24 + nativeBuildInputs = [ 25 + cmake 26 + extra-cmake-modules 27 + 28 + kdecoration 29 + plasma-workspace 30 + qtbase 31 + ]; 32 + 33 + dontWrapQtApps = true; 34 + 35 + cmakeFlags = [ "-DBUILD_PLASMA_THEMES=ON" "-DBUILD_SDDM_THEME=ON" ]; 36 + 37 + meta = with lib; { 38 + description = "Manjaro KDE default theme"; 39 + homepage = "https://gitlab.manjaro.org/artwork/themes/breath"; 40 + license = licenses.cc-by-sa-40; 41 + maintainers = with maintainers; [ huantian ]; 42 + platforms = platforms.linux; 43 + }; 44 + }
+5 -11
pkgs/development/interpreters/wasmtime/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "wasmtime"; 5 - version = "4.0.0"; 5 + version = "5.0.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "bytecodealliance"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - hash = "sha256-Vw3+KlAuCQiyBfPOZrUotgrdkG+FRjXg8AxAanfbwJQ="; 11 + hash = "sha256-tHGzXjOOOWgYBMA0skLRNFkVgXc3hcs3F1XNsHxDRhk="; 12 12 fetchSubmodules = true; 13 13 }; 14 14 15 - cargoHash = "sha256-gV3Yf7YL3D3hrymYW1b80uOlp7RYRWFC7GtxAot5Ut0="; 15 + cargoHash = "sha256-92BZdbNz22cZMJkHJwE3lUik6hAhRLCBwYzm2RAvRGo="; 16 16 17 17 cargoBuildFlags = [ 18 18 "--package wasmtime-cli" ··· 28 28 # false positives of this package being broken due to failed runs on 29 29 # Hydra (e.g. https://hydra.nixos.org/build/187667794/) 30 30 doCheck = (stdenv.system != "x86_64-darwin"); 31 - checkFlags = [ 32 - "--skip=cli_tests::run_cwasm" 33 - "--skip=commands::compile::test::test_unsupported_flags_compile" 34 - "--skip=commands::compile::test::test_aarch64_flags_compile" 35 - "--skip=commands::compile::test::test_successful_compile" 36 - "--skip=commands::compile::test::test_x64_flags_compile" 37 - "--skip=commands::compile::test::test_x64_presets_compile" 38 - "--skip=traps::parse_dwarf_info" 31 + cargoTestFlags = [ 32 + "--package wasmtime-runtime" 39 33 ]; 40 34 41 35 postInstall = ''
+14
pkgs/development/libraries/apr/cross-assume-dev-zero-mmappable.patch
··· 1 + based onhttps://830833.bugs.gentoo.org/attachment.cgi?id=761676, 2 + adjusted for 1.7.2 3 + 4 + --- a/configure.in 2022-01-09 00:31:05.552582255 -0800 5 + +++ b/configure.in 2022-01-09 00:31:19.824582533 -0800 6 + @@ -1329,7 +1329,7 @@ 7 + return 3; 8 + } 9 + return 0; 10 + - }], [], [ac_cv_file__dev_zero=no], [ac_cv_file__dev_zero=no])]) 11 + + }], [], [ac_cv_file__dev_zero=no], [:])]) 12 + fi 13 + 14 + # Now we determine which one is our anonymous shmem preference.
+3 -26
pkgs/development/libraries/apr/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "apr"; 5 - version = "1.7.0"; 5 + version = "1.7.2"; 6 6 7 7 src = fetchurl { 8 8 url = "mirror://apache/apr/${pname}-${version}.tar.bz2"; 9 - sha256 = "1spp6r2a3xcl5yajm9safhzyilsdzgagc2dadif8x6z9nbq4iqg2"; 9 + sha256 = "sha256-ded8yGd2wDDApcQI370L8qC3Xu1TUeUtVDn6HlUJpD4="; 10 10 }; 11 11 12 12 patches = [ 13 - (fetchpatch { 14 - name = "CVE-2021-35940.patch"; 15 - url = "https://dist.apache.org/repos/dist/release/apr/patches/apr-1.7.0-CVE-2021-35940.patch"; 16 - sha256 = "1qd511dyqa1b7bj89iihrlbaavbzl6yyblqginghmcnhw8adymbs"; 17 - # convince fetchpatch to restore missing `a/`, `b/` to paths 18 - extraPrefix = ""; 19 - }) 20 - 21 - # Fix cross. 22 - (fetchpatch { 23 - url = "https://github.com/apache/apr/commit/374210c50ee9f4dbf265f0172dcf2d45b97d0550.patch"; 24 - sha256 = "04k62c5dh043jhkgs5qma6yqkq4q7nh0zswr81il4l7q1zil581y"; 25 - }) 26 - (fetchpatch { 27 - url = "https://github.com/apache/apr/commit/866e1df66be6704a584feaf5c3d241e3d631d03a.patch"; 28 - sha256 = "0hhm5v5wx985c28dq6d9ngnyqihpsphq4mw7rwylk39k2p90ppcm"; 29 - }) 30 - 31 - # Cross fix. Patch the /dev/zero mmapable detection logic. https://bugs.gentoo.org/show_bug.cgi?id=830833 32 - (fetchpatch { 33 - url = "https://830833.bugs.gentoo.org/attachment.cgi?id=761676"; 34 - name = "cross-assume-dev-zero-mmappable.patch"; 35 - sha256 = "sha256-rsouJp1o7p0d+AJ5KvyhUU79vAJOcVHEuwSEKaCEGa8="; 36 - }) 13 + ./cross-assume-dev-zero-mmappable.patch 37 14 ]; 38 15 39 16 # This test needs the net
+3 -3
pkgs/development/libraries/sealcurses/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "sealcurses"; 5 - version = "unstable-2022-05-18"; # No release yet 5 + version = "unstable-2023-02-06"; # No release yet 6 6 7 7 src = fetchFromGitea { 8 8 domain = "git.skyjake.fi"; 9 9 owner = "skyjake"; 10 10 repo = pname; 11 - rev = "417d77d790ede990b4c149f21c58fd13b8f273cc"; 12 - hash = "sha256-yOrJYy9vBv5n8yK6u7tfMq56LBBw5rmhUjORINW8gxo="; 11 + rev = "e11026ca34b03c5ab546512f82a6f705d0c29e95"; 12 + hash = "sha256-N+Tvg2oIcfa68FC7rKuLxGgEKz1oBEEb8NGCiBuZ8y4="; 13 13 }; 14 14 15 15 nativeBuildInputs = [ cmake pkg-config ];
+2 -2
pkgs/development/libraries/the-foundation/default.nix
··· 12 12 13 13 stdenv.mkDerivation (finalAttrs: { 14 14 pname = "the-foundation"; 15 - version = "1.5.0"; 15 + version = "1.6.0"; 16 16 17 17 src = fetchFromGitea { 18 18 domain = "git.skyjake.fi"; 19 19 owner = "skyjake"; 20 20 repo = "the_Foundation"; 21 21 rev = "v${finalAttrs.version}"; 22 - hash = "sha256-wPFBKc20/ED58RFpDhmPnlSHCf3FG5sD2ubQOl5NF+o="; 22 + hash = "sha256-+V2WJYEmIZWpioNvvZMiw7Vt9ogEnEcjq+vR7UiBTO0="; 23 23 }; 24 24 25 25 nativeBuildInputs = [ cmake pkg-config ];
+56
pkgs/development/python-modules/bambi/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , pythonOlder 4 + , fetchFromGitHub 5 + , pytestCheckHook 6 + , arviz 7 + , formulae 8 + , graphviz 9 + , numpy 10 + , pandas 11 + , pymc 12 + , scipy 13 + }: 14 + 15 + buildPythonPackage rec { 16 + pname = "bambi"; 17 + version = "0.9.3"; 18 + disabled = pythonOlder "3.8"; 19 + 20 + src = fetchFromGitHub { 21 + owner = "bambinos"; 22 + repo = pname; 23 + rev = "refs/tags/${version}"; 24 + hash = "sha256-f/4CrFmma+Lc6wZm+YyDupDWfPAtuRsZdRf28sYUWTk="; 25 + }; 26 + 27 + propagatedBuildInputs = [ 28 + arviz 29 + formulae 30 + numpy 31 + pandas 32 + pymc 33 + scipy 34 + ]; 35 + 36 + preCheck = ''export HOME=$(mktemp -d)''; 37 + 38 + nativeCheckInputs = [ graphviz pytestCheckHook ]; 39 + disabledTests = [ 40 + # attempt to fetch data: 41 + "test_data_is_copied" 42 + "test_predict_offset" 43 + # require blackjax (not in Nixpkgs), numpyro, and jax: 44 + "test_logistic_regression_categoric_alternative_samplers" 45 + "test_regression_alternative_samplers" 46 + ]; 47 + 48 + pythonImportsCheck = [ "bambi" ]; 49 + 50 + meta = with lib; { 51 + homepage = "https://bambinos.github.io/bambi"; 52 + description = "High-level Bayesian model-building interface"; 53 + license = licenses.mit; 54 + maintainers = with maintainers; [ bcdarwin ]; 55 + }; 56 + }
+38
pkgs/development/python-modules/bencode-py/default.nix
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchPypi, 5 + python, 6 + pbr, 7 + pytestCheckHook, 8 + }: 9 + buildPythonPackage rec { 10 + pname = "beconde-py"; 11 + version = "4.0.0"; 12 + format = "setuptools"; 13 + 14 + src = fetchPypi { 15 + inherit version; 16 + pname = "bencode.py"; 17 + sha256 = "sha256-KiTM2hclpRplCJPQtjJgE4NZ6qKZu256CZYTUKKm4Fw="; 18 + }; 19 + 20 + pythonImportsCheck = [ 21 + "bencodepy" 22 + ]; 23 + 24 + nativeBuildInputs = [ 25 + pbr 26 + ]; 27 + 28 + nativeCheckInputs = [ 29 + pytestCheckHook 30 + ]; 31 + 32 + meta = with lib; { 33 + description = "Simple bencode parser (for Python 2, Python 3 and PyPy)"; 34 + homepage = "https://github.com/fuzeman/bencode.py"; 35 + license = licenses.bitTorrent11; 36 + maintainers = with maintainers; [vamega]; 37 + }; 38 + }
+4 -4
pkgs/development/python-modules/cmsis-pack-manager/default.nix
··· 16 16 }: 17 17 let 18 18 pname = "cmsis-pack-manager"; 19 - version = "0.5.1"; 19 + version = "0.4.0"; 20 20 21 21 src = fetchPypi { 22 - pname = "cmsis_pack_manager"; 23 - inherit version; 24 - sha256 = "sha256-2pKGJlPubR+C4UhdCuMDR9GG2wQOaP6YkMXxeAcaRkk="; 22 + inherit pname version; 23 + hash = "sha256-NeUG6PFI2eTwq5SNtAB6ZMA1M3z1JmMND29V9/O5sgw="; 25 24 }; 26 25 27 26 native = rustPlatform.buildRustPackage { ··· 74 73 homepage = "https://github.com/pyocd/cmsis-pack-manager"; 75 74 license = licenses.asl20; 76 75 maintainers = with maintainers; [ frogamic sbruder ]; 76 + broken = stdenv.isDarwin; 77 77 }; 78 78 }
+43
pkgs/development/python-modules/formulae/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , pythonOlder 4 + , fetchFromGitHub 5 + , pytestCheckHook 6 + , numpy 7 + , pandas 8 + , scipy 9 + }: 10 + 11 + buildPythonPackage rec { 12 + pname = "formulae"; 13 + version = "0.3.4"; 14 + disabled = pythonOlder "3.7"; 15 + 16 + src = fetchFromGitHub { 17 + owner = "bambinos"; 18 + repo = pname; 19 + rev = "refs/tags/v${version}"; 20 + hash = "sha256-6IGTn3griooslN6+qRYLJiWaJhvsxa1xj1+1kQ57yN0="; 21 + }; 22 + 23 + propagatedBuildInputs = [ 24 + numpy 25 + pandas 26 + scipy 27 + ]; 28 + 29 + nativeCheckInputs = [ pytestCheckHook ]; 30 + # use assertions of form `assert pytest.approx(...)`, which is now disallowed: 31 + disabledTests = [ "test_basic" "test_degree" ]; 32 + pythonImportsCheck = [ 33 + "formulae" 34 + "formulae.matrices" 35 + ]; 36 + 37 + meta = with lib; { 38 + homepage = "https://bambinos.github.io/formulae"; 39 + description = "Formulas for mixed-effects models in Python"; 40 + license = licenses.mit; 41 + maintainers = with maintainers; [ bcdarwin ]; 42 + }; 43 + }
+7 -8
pkgs/development/python-modules/humanize/default.nix
··· 6 6 , importlib-metadata 7 7 , pytestCheckHook 8 8 , pythonOlder 9 - , setuptools 10 - , setuptools-scm 9 + , hatch-vcs 10 + , hatchling 11 11 }: 12 12 13 13 buildPythonPackage rec { 14 14 pname = "humanize"; 15 - version = "4.5.0"; 15 + version = "4.6.0"; 16 16 format = "pyproject"; 17 17 18 18 disabled = pythonOlder "3.7"; ··· 21 21 owner = "python-humanize"; 22 22 repo = pname; 23 23 rev = "refs/tags/${version}"; 24 - hash = "sha256-vTfK45sZ9m7TUQJwZpQWhOXgZzO46CwCsnNP+PI1YfA="; 24 + hash = "sha256-sI773uzh+yMiyu1ebsk6zutfyt+tfx/zT/X2AdH5Fyg="; 25 25 }; 26 26 27 27 SETUPTOOLS_SCM_PRETEND_VERSION = version; 28 28 29 29 nativeBuildInputs = [ 30 - setuptools-scm 30 + hatch-vcs 31 + hatchling 31 32 gettext 32 33 ]; 33 34 34 - propagatedBuildInputs = [ 35 - setuptools 36 - ] ++ lib.optionals (pythonOlder "3.8") [ 35 + propagatedBuildInputs = lib.optionals (pythonOlder "3.8") [ 37 36 importlib-metadata 38 37 ]; 39 38
+3 -3
pkgs/development/python-modules/piccata/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "piccata"; 10 - version = "2.0.0"; 10 + version = "2.0.2"; 11 11 12 12 disabled = isPy27; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "NordicSemiconductor"; 16 16 repo = pname; 17 - rev = version; 18 - sha256 = "0pn842jcf2czjks5dphivgp1s7wiifqiv93s0a89h0wxafd6pbsr"; 17 + rev = "refs/tags/${version}"; 18 + sha256 = "sha256-Vuhwt+esTkvyEIRVYaRGvNMTAXVWBBv/6lpaxN5RrBA="; 19 19 }; 20 20 21 21 nativeCheckInputs = [
+36
pkgs/development/python-modules/sphinxcontrib-youtube/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , sphinx 5 + , requests 6 + , flit-core 7 + }: 8 + 9 + buildPythonPackage rec { 10 + pname = "sphinxcontrib-youtube"; 11 + version = "1.2.0"; 12 + format = "pyproject"; 13 + 14 + nativeBuildInputs = [ flit-core ]; 15 + 16 + src = fetchFromGitHub { 17 + owner = "sphinx-contrib"; 18 + repo = "youtube"; 19 + rev = "v${version}"; 20 + hash = "sha256-SUnnrzYJ6cOktE0IdnRWTvPGcL/eVS9obtHBMpS2s4A="; 21 + }; 22 + 23 + propagatedBuildInputs = [ sphinx requests ]; 24 + 25 + # tests require internet access 26 + doCheck = false; 27 + 28 + pythonImportsCheck = [ "sphinxcontrib.youtube" ]; 29 + 30 + meta = with lib; { 31 + description = "Youtube extension for Sphinx"; 32 + homepage = "https://github.com/sphinx-contrib/youtube"; 33 + maintainers = with maintainers; [ gador ]; 34 + license = licenses.bsd3; 35 + }; 36 + }
+1 -1
pkgs/development/tools/analysis/evmdis/default.nix
··· 11 11 hash = "sha256-jfbjXoGT8RtwLlqX13kcKdiFlhrVwA7Ems6abGJVRbA="; 12 12 }; 13 13 14 - vendorHash = "sha256-pQpattmS9VmO3ZIQUFn66az8GSmB4IvYhTTCFn6SUmo="; 14 + vendorHash = null; 15 15 16 16 preBuild = '' 17 17 # Add go modules support
+2 -2
pkgs/development/tools/analysis/include-what-you-use/default.nix
··· 3 3 stdenv.mkDerivation rec { 4 4 pname = "include-what-you-use"; 5 5 # Also bump llvmPackages in all-packages.nix to the supported version! 6 - version = "0.18"; 6 + version = "0.19"; 7 7 8 8 src = fetchurl { 9 - sha256 = "sha256-kQL8hBkpR1ffhqic5uwwX42QqBjR8lmKE50V6xiUuPM="; 10 9 url = "${meta.homepage}/downloads/${pname}-${version}.src.tar.gz"; 10 + hash = "sha256-KxAVe2DqCK3AjjiWtJIcc/yt1exOtlKymjQSnVAeXuA="; 11 11 }; 12 12 13 13 postPatch = ''
+3 -3
pkgs/development/tools/buildah/default.nix
··· 15 15 16 16 buildGoModule rec { 17 17 pname = "buildah"; 18 - version = "1.28.2"; 18 + version = "1.29.0"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "containers"; 22 22 repo = "buildah"; 23 23 rev = "v${version}"; 24 - sha256 = "sha256-1WB+lm2k7q4xViCUBhvCSuMCIlCMlAJ9etRajwGyOQs="; 24 + hash = "sha256-g8Y4ZmQvDbzM7rG1otTxm+SRl/sK3sLM2SOWrBseOPQ="; 25 25 }; 26 26 27 27 outputs = [ "out" "man" ]; 28 28 29 - vendorSha256 = null; 29 + vendorHash = null; 30 30 31 31 doCheck = false; 32 32
+3 -3
pkgs/development/tools/geckodriver/default.nix
··· 7 7 }: 8 8 9 9 rustPlatform.buildRustPackage rec { 10 - version = "0.32.0"; 10 + version = "0.32.1"; 11 11 pname = "geckodriver"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "mozilla"; 15 15 repo = "geckodriver"; 16 16 rev = "refs/tags/v${version}"; 17 - sha256 = "sha256-gYDfCPA2zsscZ4r4FcNgCvIMMm13/HACTvNoiK/c+LA="; 17 + sha256 = "sha256-ts2OGRdz1ajJ36XXUC48Jkygr3LDdZfHJ88peJkjqbg="; 18 18 }; 19 19 20 - cargoSha256 = "sha256-FlttmNHh0UVQ6xbo1eID+Ys34xp6zvKab4eoKIGujCU="; 20 + cargoHash = "sha256-b54/65xYZ9a04dPm90R9tzhdjTwTaXvi4NnQe9k+qvE="; 21 21 22 22 buildInputs = lib.optionals stdenv.isDarwin [ libiconv Security ]; 23 23
+3 -3
pkgs/development/tools/ruff/default.nix
··· 8 8 9 9 rustPlatform.buildRustPackage rec { 10 10 pname = "ruff"; 11 - version = "0.0.241"; 11 + version = "0.0.242"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "charliermarsh"; 15 15 repo = pname; 16 16 rev = "v${version}"; 17 - sha256 = "sha256-yrwrkU19LBM3gac70Y1UamZTdamuJdrMX4U88zGgJJs="; 17 + sha256 = "sha256-TdaFo1U37W0UtGWtRchwdtTvyfljDOvtBJ7vCym1FX4="; 18 18 }; 19 19 20 - cargoSha256 = "sha256-RzGYh0zspP+sG7k+XwDy9kaTIGIEoOEV3ZoqVf0X0GA="; 20 + cargoSha256 = "sha256-3gW9wV6aYVnKNxW79mJCy/lkQUD67G6U47JiOQriT40="; 21 21 22 22 nativeBuildInputs = [ 23 23 installShellFiles
+1 -1
pkgs/development/tools/statik/default.nix
··· 11 11 sha256 = "ahsNiac/3I2+PUqc90E73Brb99M68ewh9nWXoupfE3g="; 12 12 }; 13 13 14 - vendorSha256 = "pQpattmS9VmO3ZIQUFn66az8GSmB4IvYhTTCFn6SUmo="; 14 + vendorSha256 = null; 15 15 16 16 # Avoid building example 17 17 subPackages = [ "." "fs" ];
+24
pkgs/development/tools/yamlfmt/default.nix
··· 1 + { lib, buildGoModule, fetchFromGitHub }: 2 + 3 + buildGoModule rec { 4 + pname = "yamlfmt"; 5 + version = "0.7.1"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "google"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "sha256-oTdBFWISOfaz4ZDbJmyxtaKrjo9DVNJ5N7Qxnu7SwZA="; 12 + }; 13 + 14 + vendorSha256 = "sha256-QRY6mYtrMvjUqXJOOvHL0b0OQ28320UwV8HL4fXpcNQ="; 15 + 16 + doCheck = false; 17 + 18 + meta = with lib; { 19 + description = "An extensible command line tool or library to format yaml files."; 20 + homepage = "https://github.com/google/yamlfmt"; 21 + license = licenses.asl20; 22 + maintainers = with maintainers; [ sno2wman ]; 23 + }; 24 + }
+10 -5
pkgs/misc/frescobaldi/default.nix
··· 2 2 3 3 buildPythonApplication rec { 4 4 pname = "frescobaldi"; 5 - version = "3.1.3"; 5 + version = "3.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "wbsoft"; 9 9 repo = "frescobaldi"; 10 10 rev = "v${version}"; 11 - sha256 = "1p8f4vn2dpqndw1dylmg7wms6vi69zcfj544c908s4r8rrmbycyf"; 11 + sha256 = "sha256-q340ChF7VZcbLMW/nd1so7WScsPfbdeJUjTzsY5dkec="; 12 12 }; 13 13 14 14 propagatedBuildInputs = with python3Packages; [ 15 - lilypond pygame python-ly sip_4 16 - pyqt5 poppler-qt5 15 + qpageview 16 + lilypond 17 + pygame 18 + python-ly 19 + sip_4 20 + pyqt5 21 + poppler-qt5 17 22 pyqtwebengine 18 23 ]; 19 24 ··· 30 35 31 36 dontWrapQtApps = true; 32 37 makeWrapperArgs = [ 33 - "\${qtWrapperArgs[@]}" 38 + "\${qtWrapperArgs[@]}" 34 39 ]; 35 40 36 41 meta = with lib; {
+7 -5
pkgs/misc/logging/beats/7.x.nix
··· 1 - { lib, fetchFromGitHub, elk7Version, buildGoModule, libpcap, nixosTests, systemd }: 1 + { lib, fetchFromGitHub, elk7Version, buildGoModule, libpcap, nixosTests, systemd, config }: 2 2 3 3 let beat = package: extraArgs: buildGoModule (rec { 4 4 pname = package; ··· 36 36 metricbeat7 = beat "metricbeat" { 37 37 meta.description = "Lightweight shipper for metrics"; 38 38 passthru.tests = 39 - assert metricbeat7.drvPath == nixosTests.elk.ELK-7.elkPackages.metricbeat.drvPath; 40 - { 41 - elk = nixosTests.elk.ELK-7; 42 - }; 39 + lib.optionalAttrs config.allowUnfree ( 40 + assert metricbeat7.drvPath == nixosTests.elk.unfree.ELK-7.elkPackages.metricbeat.drvPath; 41 + { 42 + elk = nixosTests.elk.unfree.ELK-7; 43 + } 44 + ); 43 45 }; 44 46 packetbeat7 = beat "packetbeat" { 45 47 buildInputs = [ libpcap ];
+36
pkgs/os-specific/darwin/openwith/default.nix
··· 1 + { lib, stdenv, fetchFromGitHub, swift, AppKit, Foundation, UniformTypeIdentifiers }: 2 + 3 + let 4 + arch = if stdenv.isAarch64 then "arm64" else "x86_64"; 5 + in 6 + stdenv.mkDerivation rec { 7 + pname = "openwith"; 8 + version = "unstable-2022-10-28"; 9 + 10 + src = fetchFromGitHub { 11 + owner = "jdek"; 12 + repo = "openwith"; 13 + rev = "a8a99ba0d1cabee7cb470994a1e2507385c30b6e"; 14 + hash = "sha256-lysleg3qM2MndXeKjNk+Y9Tkk40urXA2ZdxY5KZNANo="; 15 + }; 16 + 17 + nativeBuildInputs = [ swift ]; 18 + 19 + buildInputs = [ AppKit Foundation UniformTypeIdentifiers ]; 20 + 21 + makeFlags = [ "openwith_${arch}" ]; 22 + 23 + installPhase = '' 24 + runHook preInstall 25 + install openwith_${arch} -D $out/bin/openwith 26 + runHook postInstall 27 + ''; 28 + 29 + meta = with lib; { 30 + description = "Utility to specify which application bundle should open specific file extensions"; 31 + homepage = "https://github.com/jdek/openwith"; 32 + license = licenses.unlicense; 33 + maintainers = with maintainers; [ zowoq ]; 34 + platforms = [ "aarch64-darwin" "x86_64-darwin" ]; 35 + }; 36 + }
+4 -4
pkgs/os-specific/linux/kernel/zen-kernels.nix
··· 4 4 # comments with variant added for update script 5 5 # ./update-zen.py zen 6 6 zenVariant = { 7 - version = "6.1.9"; #zen 7 + version = "6.1.10"; #zen 8 8 suffix = "zen1"; #zen 9 - sha256 = "0fsmcjsawxr32fxhpp6sgwfwwj8kqymy0rc6vh4qli42fqmwdjgv"; #zen 9 + sha256 = "0dfn449v3lzz1clxbsypakd0sfii9iycy1hq9x52fr9xf8wy3cxk"; #zen 10 10 isLqx = false; 11 11 }; 12 12 # ./update-zen.py lqx 13 13 lqxVariant = { 14 - version = "6.1.9"; #lqx 14 + version = "6.1.10"; #lqx 15 15 suffix = "lqx1"; #lqx 16 - sha256 = "167qr1mxsr5llmzixsijsn72d8jyphhgg2k8qsf369m7y58sz0s9"; #lqx 16 + sha256 = "1ka94z0wvq90vfzd4ncjrzk5xcb5gvaldaph7mc25jxgh6pal822"; #lqx 17 17 isLqx = true; 18 18 }; 19 19 zenKernelsFor = { version, suffix, sha256, isLqx }: buildLinux (args // {
+2 -2
pkgs/os-specific/linux/trace-cmd/kernelshark.nix
··· 5 5 6 6 mkDerivation rec { 7 7 pname = "kernelshark"; 8 - version = "2.1.1"; 8 + version = "2.2.0"; 9 9 10 10 src = fetchgit { 11 11 url = "https://git.kernel.org/pub/scm/utils/trace-cmd/kernel-shark.git/"; 12 12 rev = "kernelshark-v${version}"; 13 - sha256 = "sha256-1M35y3EkMHbGkVv93Xwo4zApvy9usIcz1spm5Z+1iUs="; 13 + sha256 = "sha256-VkUah8qAlOck9245f/zngtVpHmJdx6eQXqwzLwK2xjU="; 14 14 }; 15 15 16 16 outputs = [ "out" ];
+4 -2
pkgs/servers/geospatial/mapcache/default.nix
··· 5 5 6 6 stdenv.mkDerivation rec { 7 7 pname = "mapcache"; 8 - version = "1.12.1"; 8 + version = "1.14.0"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "MapServer"; 12 12 repo = pname; 13 13 rev = "rel-${lib.replaceStrings [ "." ] [ "-" ] version}"; 14 - sha256 = "sha256-NuiZMWcmsN5wDCd37Hvj3cazwT3Ea+OknV/YR3urZB0="; 14 + sha256 = "sha256-+QP4xXhP+MNqnhMUtMdtKrcuJ0M2BXWu3mbxXzj5ybc="; 15 15 }; 16 16 17 17 nativeBuildInputs = [ ··· 47 47 "-DWITH_PCRE=ON" 48 48 "-DAPACHE_MODULE_DIR=${placeholder "out"}/modules" 49 49 ]; 50 + 51 + NIX_CFLAGS_COMPILE = "-std=c99"; 50 52 51 53 meta = with lib; { 52 54 description = "A server that implements tile caching to speed up access to WMS layers";
+226
pkgs/servers/monitoring/cockpit/default.nix
··· 1 + { lib 2 + , stdenv 3 + , fetchzip 4 + , fetchurl 5 + , fetchFromGitHub 6 + , autoreconfHook 7 + , bashInteractive 8 + , cacert 9 + , coreutils 10 + , dbus 11 + , docbook_xml_dtd_43 12 + , docbook_xsl 13 + , findutils 14 + , gettext 15 + , git 16 + , glib 17 + , glibc 18 + , glib-networking 19 + , gnused 20 + , gnutls 21 + , json-glib 22 + , krb5 23 + , libssh 24 + , libxcrypt 25 + , libxslt 26 + , makeWrapper 27 + , nodejs 28 + , nixosTests 29 + , openssh 30 + , openssl 31 + , pam 32 + , pkg-config 33 + , polkit 34 + , python3Packages 35 + , ripgrep 36 + , runtimeShell 37 + , systemd 38 + , udev 39 + , xmlto 40 + }: 41 + 42 + let 43 + pythonWithGobject = python3Packages.python.withPackages (p: with p; [ 44 + pygobject3 45 + ]); 46 + in 47 + 48 + stdenv.mkDerivation rec { 49 + pname = "cockpit"; 50 + version = "284"; 51 + 52 + src = fetchFromGitHub { 53 + owner = "cockpit-project"; 54 + repo = "cockpit"; 55 + rev = "80a7c7cfed9157915067666fe95b298896f2aea8"; 56 + sha256 = "sha256-iAIW6nVUk1FJD2dQvDMREPVqrq0JkExJ7lVio//ALts="; 57 + fetchSubmodules = true; 58 + }; 59 + 60 + nativeBuildInputs = [ 61 + autoreconfHook 62 + makeWrapper 63 + docbook_xml_dtd_43 64 + docbook_xsl 65 + findutils 66 + gettext 67 + git 68 + (lib.getBin libxslt) 69 + nodejs 70 + openssl 71 + pam 72 + pkg-config 73 + pythonWithGobject.python 74 + python3Packages.setuptools 75 + systemd 76 + ripgrep 77 + xmlto 78 + ]; 79 + 80 + buildInputs = [ 81 + (lib.getDev glib) 82 + libxcrypt 83 + gnutls 84 + json-glib 85 + krb5 86 + libssh 87 + polkit 88 + udev 89 + ]; 90 + 91 + patches = [ 92 + # Instead of requiring Internet access to do an npm install to generate the package-lock.json 93 + # it copies the package-lock.json already present in the node_modules folder fetched as a git 94 + # submodule. 95 + ./nerf-node-modules.patch 96 + 97 + # sysconfdir is $(prefix)/etc by default and it breaks the configuration file loading feature 98 + # changing sysconfdir to /etc breaks the build in this part of the makefile because it tries 99 + # to write to /etc inside the sandbox 100 + # this patch redirects it to write to $out/etc instead of /etc 101 + ./fix-makefiles.patch 102 + ]; 103 + 104 + postPatch = '' 105 + # instruct users with problems to create a nixpkgs issue instead of nagging upstream directly 106 + substituteInPlace configure.ac \ 107 + --replace 'devel@lists.cockpit-project.org' 'https://github.com/NixOS/nixpkgs/issues/new?assignees=&labels=0.kind%3A+bug&template=bug_report.md&title=cockpit%25' 108 + patchShebangs \ 109 + test/common/pixel-tests \ 110 + test/common/run-tests \ 111 + test/common/tap-cdp \ 112 + test/static-code \ 113 + tools/escape-to-c \ 114 + tools/make-compile-commands \ 115 + tools/node-modules \ 116 + tools/termschutz \ 117 + tools/webpack-make 118 + 119 + for f in node_modules/.bin/*; do 120 + patchShebangs $(realpath $f) 121 + done 122 + 123 + export HOME=$(mktemp -d) 124 + 125 + cp node_modules/.package-lock.json package-lock.json 126 + 127 + substituteInPlace src/systemd_ctypes/libsystemd.py \ 128 + --replace libsystemd.so.0 ${systemd}/lib/libsystemd.so.0 129 + 130 + for f in pkg/**/*.js pkg/**/*.jsx test/**/* src/**/*; do 131 + # some files substituteInPlace report as missing and it's safe to ignore them 132 + substituteInPlace "$(realpath "$f")" \ 133 + --replace '"/usr/bin/' '"' \ 134 + --replace '"/bin/' '"' || true 135 + done 136 + 137 + substituteInPlace src/common/Makefile-common.am \ 138 + --replace 'TEST_PROGRAM += test-pipe' "" # skip test-pipe because it hangs the build 139 + 140 + substituteInPlace test/pytest/*.py \ 141 + --replace "'bash" "'${bashInteractive}/bin/bash" 142 + 143 + echo "m4_define(VERSION_NUMBER, [${version}])" > version.m4 144 + ''; 145 + 146 + configureFlags = [ 147 + "--enable-prefix-only=yes" 148 + "--sysconfdir=/etc" 149 + "--disable-pcp" # TODO: figure out how to package its dependency 150 + "--with-default-session-path=/run/wrappers/bin:/run/current-system/sw/bin" 151 + ]; 152 + 153 + enableParallelBuilding = true; 154 + 155 + preBuild = '' 156 + patchShebangs \ 157 + tools/test-driver 158 + ''; 159 + 160 + postBuild = '' 161 + find | grep cockpit-bridge 162 + chmod +x \ 163 + src/systemd/update-motd \ 164 + src/tls/cockpit-certificate-helper \ 165 + src/ws/cockpit-desktop 166 + 167 + patchShebangs \ 168 + src/systemd/update-motd \ 169 + src/tls/cockpit-certificate-helper \ 170 + src/ws/cockpit-desktop 171 + 172 + PATH=${pythonWithGobject}/bin patchShebangs src/client/cockpit-client 173 + 174 + substituteInPlace src/ws/cockpit-desktop \ 175 + --replace ' /bin/bash' ' ${runtimeShell}' 176 + ''; 177 + 178 + fixupPhase = '' 179 + runHook preFixup 180 + 181 + wrapProgram $out/libexec/cockpit-certificate-helper \ 182 + --prefix PATH : ${lib.makeBinPath [ coreutils openssl ]} \ 183 + --run 'cd $(mktemp -d)' 184 + 185 + wrapProgram $out/share/cockpit/motd/update-motd \ 186 + --prefix PATH : ${lib.makeBinPath [ gnused ]} 187 + 188 + substituteInPlace $out/share/polkit-1/actions/org.cockpit-project.cockpit-bridge.policy \ 189 + --replace /usr $out 190 + 191 + runHook postFixup 192 + ''; 193 + 194 + doCheck = true; 195 + checkInputs = [ 196 + bashInteractive 197 + cacert 198 + dbus 199 + glib-networking 200 + openssh 201 + python3Packages.pytest 202 + python3Packages.vulture 203 + ]; 204 + checkPhase = '' 205 + export GIO_EXTRA_MODULES=$GIO_EXTRA_MODULES:${glib-networking}/lib/gio/modules 206 + export G_DEBUG=fatal-criticals 207 + export G_MESSAGES_DEBUG=cockpit-ws,cockpit-wrapper,cockpit-bridge 208 + export PATH=$PATH:$(pwd) 209 + 210 + cockpit-bridge --version 211 + make pytest -j$NIX_BUILD_CORES || true 212 + make check -j$NIX_BUILD_CORES || true 213 + test/static-code 214 + npm run eslint 215 + npm run stylelint 216 + ''; 217 + 218 + passthru.tests = { inherit (nixosTests) cockpit; }; 219 + 220 + meta = with lib; { 221 + description = "Web-based graphical interface for servers"; 222 + homepage = "https://cockpit-project.org/"; 223 + license = licenses.lgpl21; 224 + maintainers = with maintainers; [ lucasew ]; 225 + }; 226 + }
+34
pkgs/servers/monitoring/cockpit/fix-makefiles.patch
··· 1 + diff --git a/src/systemd/Makefile.am b/src/systemd/Makefile.am 2 + index f28ea41df..684b82006 100644 3 + --- a/src/systemd/Makefile.am 4 + +++ b/src/systemd/Makefile.am 5 + @@ -23,10 +23,10 @@ dist_motd_SCRIPTS = src/systemd/update-motd 6 + 7 + # Automake: 'Variables using ... ‘sysconf’ ... are installed by install-exec.' 8 + install-exec-hook:: 9 + - mkdir -p $(DESTDIR)$(sysconfdir)/motd.d 10 + - ln -sTfr $(DESTDIR)/run/cockpit/motd $(DESTDIR)$(sysconfdir)/motd.d/cockpit 11 + - mkdir -p $(DESTDIR)$(sysconfdir)/issue.d 12 + - ln -sTfr $(DESTDIR)/run/cockpit/motd $(DESTDIR)$(sysconfdir)/issue.d/cockpit.issue 13 + + mkdir -p $(DESTDIR)$(prefix)$(sysconfdir)/motd.d 14 + + ln -sTfr $(DESTDIR)$(prefix)/run/cockpit/motd $(DESTDIR)$(prefix)$(sysconfdir)/motd.d/cockpit 15 + + mkdir -p $(DESTDIR)$(prefix)$(sysconfdir)/issue.d 16 + + ln -sTfr $(DESTDIR)$(prefix)/run/cockpit/motd $(DESTDIR)$(prefix)$(sysconfdir)/issue.d/cockpit.issue 17 + 18 + tempconfdir = $(prefix)/lib/tmpfiles.d 19 + nodist_tempconf_DATA = src/systemd/cockpit-tempfiles.conf 20 + diff --git a/src/ws/Makefile-ws.am b/src/ws/Makefile-ws.am 21 + index ed4e4363e..77a35b0e5 100644 22 + --- a/src/ws/Makefile-ws.am 23 + +++ b/src/ws/Makefile-ws.am 24 + @@ -169,8 +169,8 @@ install-tests:: 25 + $(INSTALL_DATA) mock-pam-conv-mod.so $(DESTDIR)$(pamdir)/ 26 + 27 + install-exec-hook:: 28 + - mkdir -p $(DESTDIR)$(sysconfdir)/cockpit/ws-certs.d $(DESTDIR)$(sysconfdir)/cockpit/machines.d 29 + - chmod 755 $(DESTDIR)$(sysconfdir)/cockpit/ws-certs.d $(DESTDIR)$(sysconfdir)/cockpit/machines.d 30 + + mkdir -p $(DESTDIR)$(prefix)$(sysconfdir)/cockpit/ws-certs.d $(DESTDIR)$(prefix)$(sysconfdir)/cockpit/machines.d 31 + + chmod 755 $(DESTDIR)$(prefix)$(sysconfdir)/cockpit/ws-certs.d $(DESTDIR)$(prefix)$(sysconfdir)/cockpit/machines.d 32 + 33 + dist_check_DATA += \ 34 + src/ws/mock-combined.crt \
+12
pkgs/servers/monitoring/cockpit/nerf-node-modules.patch
··· 1 + diff --git a/tools/node-modules b/tools/node-modules 2 + index 518875d..72b51e0 100755 3 + --- a/tools/node-modules 4 + +++ b/tools/node-modules 5 + @@ -7,6 +7,7 @@ V="${V-0}" # default to friendly messages 6 + 7 + set -eu 8 + cd "${0%/*}/.." 9 + +exit 0 10 + . tools/git-utils.sh 11 + 12 + cmd_remove() {
+3 -3
pkgs/servers/search/meilisearch/default.nix
··· 8 8 , nixosTests 9 9 }: 10 10 11 - let version = "0.30.5"; 11 + let version = "1.0.0"; 12 12 in 13 13 rustPlatform.buildRustPackage { 14 14 pname = "meilisearch"; ··· 18 18 owner = "meilisearch"; 19 19 repo = "MeiliSearch"; 20 20 rev = "v${version}"; 21 - hash = "sha256-DvMMBF5Z2VdV3ObuD/gquZeimglyzFFVzgUq+/ra+Hc="; 21 + hash = "sha256-XWPJldWxe8iply7XtmDem1gfbNuuaWuFdMfuCbcU6tc="; 22 22 }; 23 23 24 - cargoHash = "sha256-vA3DhGc0EuSdUeXYyG5iuuy7yK+22xPJjI67+/ctUFA="; 24 + cargoHash = "sha256-v8P4pbTJ/t9TgB07tyhn3y8q65xILFTbBgziw5kuxUQ="; 25 25 26 26 # Default features include mini dashboard which downloads something from the internet. 27 27 buildNoDefaultFeatures = true;
+3 -3
pkgs/servers/sftpgo/default.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "sftpgo"; 9 - version = "2.4.3"; 9 + version = "2.4.4"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "drakkan"; 13 13 repo = "sftpgo"; 14 14 rev = "refs/tags/v${version}"; 15 - hash = "sha256-cSA7ndpIV3VvIZTBa9NCIlJn57EtT1qxrB0UsMENUS0="; 15 + hash = "sha256-gB3r7Q4M4pXHB9cfCRU8hMccWaJ170es0CJfbo/7lsg="; 16 16 }; 17 17 18 - vendorHash = "sha256-C45KA+9tdj+fR3DUBLdG2dGzT59zuAJczpKVoiAZ7lg="; 18 + vendorHash = "sha256-og3mn0iYl6aubcSAUohqG4ZSqdBB4AQYZtpKfbp7kcQ="; 19 19 20 20 ldflags = [ 21 21 "-s"
+2 -2
pkgs/servers/sql/pgpool/default.nix
··· 10 10 11 11 stdenv.mkDerivation rec { 12 12 pname = "pgpool-II"; 13 - version = "4.4.1"; 13 + version = "4.4.2"; 14 14 15 15 src = fetchurl { 16 16 url = "https://www.pgpool.net/mediawiki/download.php?f=pgpool-II-${version}.tar.gz"; 17 17 name = "pgpool-II-${version}.tar.gz"; 18 - sha256 = "sha256-Szebu6jheBKKHO5KW9GuEW3ts9phIbcowY8PVMiB8yg="; 18 + sha256 = "sha256-Pmx4jnDwZyx7OMiKbKdvMfN4axJWiZgMwGOrdSylgjQ="; 19 19 }; 20 20 21 21 buildInputs = [
+2 -2
pkgs/servers/sql/postgresql/ext/timescaledb.nix
··· 13 13 14 14 stdenv.mkDerivation rec { 15 15 pname = "timescaledb"; 16 - version = "2.9.2"; 16 + version = "2.9.3"; 17 17 18 18 nativeBuildInputs = [ cmake ]; 19 19 buildInputs = [ postgresql openssl libkrb5 ]; ··· 22 22 owner = "timescale"; 23 23 repo = "timescaledb"; 24 24 rev = version; 25 - sha256 = "sha256-3n3nqAVow8nIocXPsgCZcNkV+jr/G5/CmnSUfj2WMWo="; 25 + sha256 = "sha256-eUn/sk2l/2aEGXupRPNDrbrIpUA3aNPo3tBJhmBoeXk="; 26 26 }; 27 27 28 28 cmakeFlags = [ "-DSEND_TELEMETRY_DEFAULT=OFF" "-DREGRESS_CHECKS=OFF" "-DTAP_CHECKS=OFF" ]
+3 -1
pkgs/servers/web-apps/freshrss/default.nix
··· 17 17 hash = "sha256-l1SOaQA4C8yXbrfi7pEE1PpUO4DVmLTTDUSACCSQ5LE="; 18 18 }; 19 19 20 - passthru.tests = nixosTests.freshrss; 20 + passthru.tests = { 21 + inherit (nixosTests) freshrss-sqlite freshrss-pgsql; 22 + }; 21 23 22 24 buildInputs = [ php ]; 23 25
+1 -1
pkgs/servers/web-apps/phylactery/default.nix
··· 11 11 hash = "sha256-HQN6wJ/4YeuQaDcNgdHj0RgYnn2NxXGRfxybmv60EdQ="; 12 12 }; 13 13 14 - vendorHash = "sha256-pQpattmS9VmO3ZIQUFn66az8GSmB4IvYhTTCFn6SUmo="; 14 + vendorHash = null; 15 15 16 16 preBuild = '' 17 17 cp ${./go.mod} go.mod
+6 -3
pkgs/tools/admin/pgadmin/default.nix
··· 11 11 12 12 let 13 13 pname = "pgadmin"; 14 - version = "6.18"; 14 + version = "6.19"; 15 15 16 16 src = fetchurl { 17 17 url = "https://ftp.postgresql.org/pub/pgadmin/pgadmin4/v${version}/source/pgadmin4-${version}.tar.gz"; 18 - sha256 = "sha256-qqilmJLpJ3XNd8dwk7bDAAPxt8sou5zydFMPcJGcGoo="; 18 + sha256 = "sha256-xHvdqVpNU9ZzTA6Xl2Bv044l6Tbvf4fjqyz4TmS9gmI="; 19 19 }; 20 20 21 21 yarnDeps = mkYarnModules { ··· 70 70 azure-mgmt-rdbms 71 71 azure-mgmt-resource 72 72 azure-identity 73 + sphinxcontrib-youtube 74 + dnspython 75 + greenlet 73 76 ]; 74 77 75 78 # keep the scope, as it is used throughout the derivation and tests ··· 104 107 hash = "sha256-K9pEtD58rLFdTgX/PMH4vJeTbMRkYjQkECv8LDXpWRI="; 105 108 }; 106 109 }); 107 - # pgadmin 6.18 is incompatible with the major flask-security-too update to 5.0.x 110 + # pgadmin 6.19 is incompatible with the major flask-security-too update to 5.0.x 108 111 flask-security-too = prev.flask-security-too.overridePythonAttrs (oldAttrs: rec { 109 112 version = "4.1.5"; 110 113 src = oldAttrs.src.override {
+2 -6
pkgs/tools/admin/pgadmin/package.json
··· 112 112 "classnames": "^2.2.6", 113 113 "closest": "^0.0.1", 114 114 "codemirror": "^5.59.2", 115 - "context-menu": "^2.0.0", 116 115 "convert-units": "^2.3.4", 117 116 "cssnano": "^5.0.2", 118 117 "dagre": "^0.8.4", ··· 123 122 "insert-if": "^1.1.0", 124 123 "ip-address": "^7.1.0", 125 124 "jquery": "^3.6.0", 126 - "jquery-contextmenu": "^2.9.2", 127 - "jquery-ui": "^1.13.2", 128 125 "json-bignumber": "^1.0.1", 129 126 "jsoneditor": "^9.5.4", 130 127 "jsoneditor-react": "^3.1.1", ··· 140 137 "path-fx": "^2.0.0", 141 138 "pathfinding": "^0.4.18", 142 139 "paths-js": "^0.4.9", 143 - "pgadmin4-tree": "git+https://github.com/EnterpriseDB/pgadmin4-treeview/#96ceb7f27f43660a804e61d23a76aeb9aa188bb6", 144 140 "postcss": "^8.2.15", 145 141 "raf": "^3.4.1", 146 142 "rc-dock": "^3.2.9", 147 143 "react": "^17.0.1", 148 144 "react-aspen": "^1.1.0", 149 145 "react-checkbox-tree": "^1.7.2", 150 - "react-data-grid": "git+https://github.com/EnterpriseDB/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8", 146 + "react-data-grid": "git+https://github.com/pgadmin-org/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8", 151 147 "react-dnd": "^16.0.1", 152 148 "react-dnd-html5-backend": "^16.0.1", 153 149 "react-dom": "^17.0.1", ··· 169 165 "tempusdominus-bootstrap-4": "^5.1.2", 170 166 "tempusdominus-core": "^5.19.3", 171 167 "valid-filename": "^2.0.1", 172 - "webcabin-docker": "git+https://github.com/EnterpriseDB/wcDocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8", 168 + "webcabin-docker": "git+https://github.com/pgadmin-org/wcdocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8", 173 169 "wkx": "^0.5.0", 174 170 "xterm": "^4.11.0", 175 171 "xterm-addon-fit": "^0.5.0",
+14 -81
pkgs/tools/admin/pgadmin/yarn.lock
··· 2340 2340 p-series "^1.1.0" 2341 2341 path-fx "^2.1.1" 2342 2342 2343 - aspen-decorations@^1.0.2, aspen-decorations@^1.1.1: 2343 + aspen-decorations@^1.0.2: 2344 2344 version "1.1.1" 2345 2345 resolved "https://registry.yarnpkg.com/aspen-decorations/-/aspen-decorations-1.1.1.tgz#7d0ca740efab1aa4fd91a1f3db81ac29186607a3" 2346 2346 integrity sha512-Ej2tv0Gz3bnhkNCyzzjDeG2V5vd49T30ca0SKywHuLA5RKrZ1NutEyZnUYku4WmUV1/TdpHRiSJ759nbZK4xtQ== ··· 3384 3384 version "1.0.4" 3385 3385 resolved "https://registry.yarnpkg.com/content-type/-/content-type-1.0.4.tgz#e138cc75e040c727b1966fe5e5f8c9aee256fe3b" 3386 3386 integrity sha512-hIP3EEPs8tB9AT1L+NUqtwOAps4mk2Zob89MWXMHjHWg9milF/j4osnnQLXBCBFBk/tvIG/tUc9mOUJiPBhPXA== 3387 - 3388 - context-menu@^2.0.0: 3389 - version "2.0.0" 3390 - resolved "https://registry.yarnpkg.com/context-menu/-/context-menu-2.0.0.tgz#565f13210248e3442700e6b1a2d63406f2b08552" 3391 - integrity sha512-VQrkvcJDevuq+sde0QADRLOdIRpa4a1ti4knstrPILDLfWU/RB4ZIGpj32Chh/mURjrbi0CoLT1eonr3X86Khg== 3392 - dependencies: 3393 - tiny-emitter "^2.0.2" 3394 3387 3395 3388 convert-source-map@^1.5.0, convert-source-map@^1.7.0, convert-source-map@^1.8.0: 3396 3389 version "1.9.0" ··· 6133 6126 resolved "https://registry.yarnpkg.com/jmespath/-/jmespath-0.16.0.tgz#b15b0a85dfd4d930d43e69ed605943c802785076" 6134 6127 integrity sha512-9FzQjJ7MATs1tSpnco1K6ayiYE3figslrXA72G2HQ/n76RzvYlofyi5QM+iX4YRs/pu3yzxlVQSST23+dMDknw== 6135 6128 6136 - jquery-contextmenu@^2.6.4, jquery-contextmenu@^2.9.2: 6129 + jquery-contextmenu@^2.6.4: 6137 6130 version "2.9.2" 6138 6131 resolved "https://registry.yarnpkg.com/jquery-contextmenu/-/jquery-contextmenu-2.9.2.tgz#f9dc362e45871dda2e50fa45de2243e917446ced" 6139 6132 integrity sha512-6S6sH/08owDStC/7zNwcN366yR0ydX6PmMB0RnjLRQOp7Nc/rqwEHglshfHrrw2kdTev97GXwRXrayDUmToIOw== 6140 6133 dependencies: 6141 6134 jquery "^3.5.0" 6142 6135 6143 - jquery-ui@^1.13.2: 6144 - version "1.13.2" 6145 - resolved "https://registry.yarnpkg.com/jquery-ui/-/jquery-ui-1.13.2.tgz#de03580ae6604773602f8d786ad1abfb75232034" 6146 - integrity sha512-wBZPnqWs5GaYJmo1Jj0k/mrSkzdQzKDwhXNtHKcBdAcKVxMM3KNYFq+iJ2i1rwiG53Z8M4mTn3Qxrm17uH1D4Q== 6147 - dependencies: 6148 - jquery ">=1.8.0 <4.0.0" 6149 - 6150 - "jquery@>=1.7.1 <4.0.0", "jquery@>=1.8.0 <4.0.0", jquery@^3.3.1, jquery@^3.5.0, jquery@^3.6.0: 6136 + "jquery@>=1.7.1 <4.0.0", jquery@^3.3.1, jquery@^3.5.0, jquery@^3.6.0: 6151 6137 version "3.6.1" 6152 6138 resolved "https://registry.yarnpkg.com/jquery/-/jquery-3.6.1.tgz#fab0408f8b45fc19f956205773b62b292c147a16" 6153 6139 integrity sha512-opJeO4nCucVnsjiXOE+/PcCgYw9Gwpvs/a6B1LL/lQhwWwpbVEVYDZ1FokFr8PRc7ghYlrFPuyHuiiDNTQxmcw== ··· 6238 6224 integrity sha512-Bdboy+l7tA3OGW6FjyFHWkP5LuByj1Tk33Ljyq0axyzdk9//JSi2u3fP1QSmd1KNwq6VOKYGlAu87CisVir6Pw== 6239 6225 6240 6226 json5@^1.0.1: 6241 - version "1.0.1" 6242 - resolved "https://registry.yarnpkg.com/json5/-/json5-1.0.1.tgz#779fb0018604fa854eacbf6252180d83543e3dbe" 6243 - integrity sha512-aKS4WQjPenRxiQsC93MNfjx+nbF4PAdYzmd/1JIj8HYzqfbu86beTuNgXDzPknWk0n0uARlyewZo4s++ES36Ow== 6227 + version "1.0.2" 6228 + resolved "https://registry.yarnpkg.com/json5/-/json5-1.0.2.tgz#63d98d60f21b313b77c4d6da18bfa69d80e1d593" 6229 + integrity sha512-g1MWMLBiz8FKi1e4w0UyVL3w+iJceWAFBAaBnnGKOpNa5f8TLktkbre1+s6oICydWAm+HRUGTmI+//xv2hvXYA== 6244 6230 dependencies: 6245 6231 minimist "^1.2.0" 6246 6232 6247 6233 json5@^2.1.2, json5@^2.2.1: 6248 - version "2.2.1" 6249 - resolved "https://registry.yarnpkg.com/json5/-/json5-2.2.1.tgz#655d50ed1e6f95ad1a3caababd2b0efda10b395c" 6250 - integrity sha512-1hqLFMSrGHRHxav9q9gNjJ5EXznIxGVO09xQRrwplcS8qs28pZ8s8hupZAmqDwZUmVZ2Qb2jnyPOWcDH8m8dlA== 6234 + version "2.2.3" 6235 + resolved "https://registry.yarnpkg.com/json5/-/json5-2.2.3.tgz#78cd6f1a19bdc12b73db5ad0c61efd66c1e29283" 6236 + integrity "sha1-eM1vGhm9wStz21rQxh79ZsHikoM= sha512-XmOWe7eyHYH14cLdVPoyg+GOH3rYX++KpzrylJwSW98t3Nk+U8XOl8FWKOgwtzdb8lXGf6zYwDUzeHMWfxasyg==" 6251 6237 6252 6238 jsoneditor-react@^3.1.1: 6253 6239 version "3.1.2" ··· 7831 7817 resolved "https://registry.yarnpkg.com/performance-now/-/performance-now-2.1.0.tgz#6309f4e0e5fa913ec1c69307ae364b4b377c9e7b" 7832 7818 integrity sha512-7EAHlyLHI56VEIdK57uwHdHKIaAGbnXPiw0yWbarQZOKaKpvUIgW0jWRVLiatnM+XXlSwsanIBH/hzGMJulMow== 7833 7819 7834 - "pgadmin4-tree@git+https://github.com/EnterpriseDB/pgadmin4-treeview/#96ceb7f27f43660a804e61d23a76aeb9aa188bb6": 7835 - version "1.0.0" 7836 - resolved "git+https://github.com/EnterpriseDB/pgadmin4-treeview/#96ceb7f27f43660a804e61d23a76aeb9aa188bb6" 7837 - dependencies: 7838 - "@types/classnames" "^2.2.6" 7839 - "@types/react" "^16.7.18" 7840 - "@types/react-dom" "^16.0.11" 7841 - aspen-decorations "^1.1.1" 7842 - browserfs "^1.4.3" 7843 - classnames "^2.2.6" 7844 - context-menu "^2.0.0" 7845 - insert-if "^1.1.0" 7846 - lodash "4.*" 7847 - notificar "^1.0.1" 7848 - path-fx "^2.0.0" 7849 - react "^16.6.3" 7850 - react-aspen "^1.2.0" 7851 - react-dom "^16.6.3" 7852 - react-virtualized-auto-sizer "^1.0.6" 7853 - valid-filename "^2.0.1" 7854 - 7855 7820 picocolors@^1.0.0: 7856 7821 version "1.0.0" 7857 7822 resolved "https://registry.yarnpkg.com/picocolors/-/picocolors-1.0.0.tgz#cb5bdc74ff3f51892236eaf79d68bc44564ab81c" ··· 8531 8496 dependencies: 8532 8497 fast-memoize "^2.5.1" 8533 8498 8534 - react-aspen@^1.1.0, react-aspen@^1.2.0: 8499 + react-aspen@^1.1.0: 8535 8500 version "1.2.0" 8536 8501 resolved "https://registry.yarnpkg.com/react-aspen/-/react-aspen-1.2.0.tgz#375fa82a8db627542fc8b9e6e421baa49a65ab95" 8537 8502 integrity sha512-w+vUn4ScCzcxDB5xEsKIuIkUnySEQXlp/zqPFChWEpYG12mPO7h7z/LWuK2QXUoDbIP96Fcf1+UAI9I/cstPqg== ··· 8552 8517 nanoid "^3.0.0" 8553 8518 prop-types "^15.5.8" 8554 8519 8555 - "react-data-grid@git+https://github.com/EnterpriseDB/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8": 8520 + "react-data-grid@git+https://github.com/pgadmin-org/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8": 8556 8521 version "7.0.0-beta.14" 8557 - resolved "git+https://github.com/EnterpriseDB/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8" 8522 + resolved "git+https://github.com/pgadmin-org/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8" 8558 8523 dependencies: 8559 8524 clsx "^1.1.1" 8560 8525 ··· 8575 8540 dnd-core "^16.0.1" 8576 8541 fast-deep-equal "^3.1.3" 8577 8542 hoist-non-react-statics "^3.3.2" 8578 - 8579 - react-dom@^16.6.3: 8580 - version "16.14.0" 8581 - resolved "https://registry.yarnpkg.com/react-dom/-/react-dom-16.14.0.tgz#7ad838ec29a777fb3c75c3a190f661cf92ab8b89" 8582 - integrity sha512-1gCeQXDLoIqMgqD3IO2Ah9bnf0w9kzhwN5q4FGnHZ67hBm9yePzB5JJAIQCc8x3pFnNlwFq4RidZggNAAkzWWw== 8583 - dependencies: 8584 - loose-envify "^1.1.0" 8585 - object-assign "^4.1.1" 8586 - prop-types "^15.6.2" 8587 - scheduler "^0.19.1" 8588 8543 8589 8544 react-dom@^17.0.1: 8590 8545 version "17.0.2" ··· 8747 8702 "@babel/runtime" "^7.0.0" 8748 8703 memoize-one ">=3.1.1 <6" 8749 8704 8750 - react@^16.6.3: 8751 - version "16.14.0" 8752 - resolved "https://registry.yarnpkg.com/react/-/react-16.14.0.tgz#94d776ddd0aaa37da3eda8fc5b6b18a4c9a3114d" 8753 - integrity sha512-0X2CImDkJGApiAlcf0ODKIneSwBPhqJawOa5wCtKbu7ZECrmS26NvtSILynQ66cgkT/RJ4LidJOc3bUESwmU8g== 8754 - dependencies: 8755 - loose-envify "^1.1.0" 8756 - object-assign "^4.1.1" 8757 - prop-types "^15.6.2" 8758 - 8759 8705 react@^17.0.1: 8760 8706 version "17.0.2" 8761 8707 resolved "https://registry.yarnpkg.com/react/-/react-17.0.2.tgz#d0b5cc516d29eb3eee383f75b62864cfb6800037" ··· 9116 9062 version "1.2.4" 9117 9063 resolved "https://registry.yarnpkg.com/sax/-/sax-1.2.4.tgz#2816234e2378bddc4e5354fab5caa895df7100d9" 9118 9064 integrity sha512-NqVDv9TpANUjFm0N8uM5GxL36UgKi9/atZw+x7YFnQ8ckwFGKrl4xX4yWtrey3UJm5nP1kUbnYgLopqWNSRhWw== 9119 - 9120 - scheduler@^0.19.1: 9121 - version "0.19.1" 9122 - resolved "https://registry.yarnpkg.com/scheduler/-/scheduler-0.19.1.tgz#4f3e2ed2c1a7d65681f4c854fa8c5a1ccb40f196" 9123 - integrity sha512-n/zwRWRYSUj0/3g/otKDRPMh6qv2SYMWNq85IEa8iZyAv8od9zDYpGSnpBEjNgcMNq6Scbu5KfIPxNF72R/2EA== 9124 - dependencies: 9125 - loose-envify "^1.1.0" 9126 - object-assign "^4.1.1" 9127 9065 9128 9066 scheduler@^0.20.2: 9129 9067 version "0.20.2" ··· 9997 9935 dependencies: 9998 9936 process "~0.11.0" 9999 9937 10000 - tiny-emitter@^2.0.2: 10001 - version "2.1.0" 10002 - resolved "https://registry.yarnpkg.com/tiny-emitter/-/tiny-emitter-2.1.0.tgz#1d1a56edfc51c43e863cbb5382a72330e3555423" 10003 - integrity sha512-NB6Dk1A9xgQPMoGqC5CVXn123gWyte215ONT5Pp5a0yt4nlEoO1ZWeCwpncaekPHXO60i47ihFnZPiRPjRMq4Q== 10004 - 10005 9938 tiny-warning@^1.0.2: 10006 9939 version "1.0.3" 10007 9940 resolved "https://registry.yarnpkg.com/tiny-warning/-/tiny-warning-1.0.3.tgz#94a30db453df4c643d0fd566060d60a875d84754" ··· 10404 10337 glob-to-regexp "^0.4.1" 10405 10338 graceful-fs "^4.1.2" 10406 10339 10407 - "webcabin-docker@git+https://github.com/EnterpriseDB/wcDocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8": 10340 + "webcabin-docker@git+https://github.com/pgadmin-org/wcdocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8": 10408 10341 version "2.2.5" 10409 - resolved "git+https://github.com/EnterpriseDB/wcDocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8" 10342 + resolved "git+https://github.com/pgadmin-org/wcdocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8" 10410 10343 dependencies: 10411 10344 "@fortawesome/fontawesome-free" "^5.14.0" 10412 10345 FileSaver "^0.10.0"
+29 -97
pkgs/tools/admin/pgadmin/yarn.nix
··· 3434 3434 }; 3435 3435 } 3436 3436 { 3437 - name = "context_menu___context_menu_2.0.0.tgz"; 3438 - path = fetchurl { 3439 - name = "context_menu___context_menu_2.0.0.tgz"; 3440 - url = "https://registry.yarnpkg.com/context-menu/-/context-menu-2.0.0.tgz"; 3441 - sha512 = "VQrkvcJDevuq+sde0QADRLOdIRpa4a1ti4knstrPILDLfWU/RB4ZIGpj32Chh/mURjrbi0CoLT1eonr3X86Khg=="; 3442 - }; 3443 - } 3444 - { 3445 3437 name = "convert_source_map___convert_source_map_1.9.0.tgz"; 3446 3438 path = fetchurl { 3447 3439 name = "convert_source_map___convert_source_map_1.9.0.tgz"; ··· 6386 6378 }; 6387 6379 } 6388 6380 { 6389 - name = "jquery_ui___jquery_ui_1.13.2.tgz"; 6390 - path = fetchurl { 6391 - name = "jquery_ui___jquery_ui_1.13.2.tgz"; 6392 - url = "https://registry.yarnpkg.com/jquery-ui/-/jquery-ui-1.13.2.tgz"; 6393 - sha512 = "wBZPnqWs5GaYJmo1Jj0k/mrSkzdQzKDwhXNtHKcBdAcKVxMM3KNYFq+iJ2i1rwiG53Z8M4mTn3Qxrm17uH1D4Q=="; 6394 - }; 6395 - } 6396 - { 6397 6381 name = "jquery___jquery_3.6.1.tgz"; 6398 6382 path = fetchurl { 6399 6383 name = "jquery___jquery_3.6.1.tgz"; ··· 6530 6514 }; 6531 6515 } 6532 6516 { 6533 - name = "json5___json5_1.0.1.tgz"; 6517 + name = "json5___json5_1.0.2.tgz"; 6534 6518 path = fetchurl { 6535 - name = "json5___json5_1.0.1.tgz"; 6536 - url = "https://registry.yarnpkg.com/json5/-/json5-1.0.1.tgz"; 6537 - sha512 = "aKS4WQjPenRxiQsC93MNfjx+nbF4PAdYzmd/1JIj8HYzqfbu86beTuNgXDzPknWk0n0uARlyewZo4s++ES36Ow=="; 6519 + name = "json5___json5_1.0.2.tgz"; 6520 + url = "https://registry.yarnpkg.com/json5/-/json5-1.0.2.tgz"; 6521 + sha512 = "g1MWMLBiz8FKi1e4w0UyVL3w+iJceWAFBAaBnnGKOpNa5f8TLktkbre1+s6oICydWAm+HRUGTmI+//xv2hvXYA=="; 6538 6522 }; 6539 6523 } 6540 6524 { 6541 - name = "json5___json5_2.2.1.tgz"; 6525 + name = "json5___json5_2.2.3.tgz"; 6542 6526 path = fetchurl { 6543 - name = "json5___json5_2.2.1.tgz"; 6544 - url = "https://registry.yarnpkg.com/json5/-/json5-2.2.1.tgz"; 6545 - sha512 = "1hqLFMSrGHRHxav9q9gNjJ5EXznIxGVO09xQRrwplcS8qs28pZ8s8hupZAmqDwZUmVZ2Qb2jnyPOWcDH8m8dlA=="; 6527 + name = "json5___json5_2.2.3.tgz"; 6528 + url = "https://registry.yarnpkg.com/json5/-/json5-2.2.3.tgz"; 6529 + sha512 = "XmOWe7eyHYH14cLdVPoyg+GOH3rYX++KpzrylJwSW98t3Nk+U8XOl8FWKOgwtzdb8lXGf6zYwDUzeHMWfxasyg=="; 6546 6530 }; 6547 6531 } 6548 6532 { ··· 8362 8346 }; 8363 8347 } 8364 8348 { 8365 - name = "pgadmin4-treeview"; 8366 - path = 8367 - let 8368 - repo = fetchgit { 8369 - url = "https://github.com/EnterpriseDB/pgadmin4-treeview/"; 8370 - rev = "96ceb7f27f43660a804e61d23a76aeb9aa188bb6"; 8371 - sha256 = "1hvr7arywz8rql19ma6w6lj5hrfn8xr4cyiia4bw5l8d061ak1gj"; 8372 - }; 8373 - in 8374 - runCommand "pgadmin4-treeview" { buildInputs = [gnutar]; } '' 8375 - # Set u+w because tar-fs can't unpack archives with read-only dirs 8376 - # https://github.com/mafintosh/tar-fs/issues/79 8377 - tar cf $out --mode u+w -C ${repo} . 8378 - ''; 8379 - } 8380 - { 8381 8349 name = "picocolors___picocolors_1.0.0.tgz"; 8382 8350 path = fetchurl { 8383 8351 name = "picocolors___picocolors_1.0.0.tgz"; ··· 9148 9116 { 9149 9117 name = "react-data-grid.git"; 9150 9118 path = 9151 - let 9152 - repo = fetchgit { 9153 - url = "https://github.com/EnterpriseDB/react-data-grid.git/"; 9154 - rev = "200d2f5e02de694e3e9ffbe177c279bc40240fb8"; 9155 - sha256 = "0s4k8s8ackr5lrvhv7ljbhd90679wh34p2wv71xqn8yy1ykjwm15"; 9156 - }; 9157 - in 9158 - runCommand "react-data-grid.git" { buildInputs = [gnutar]; } '' 9159 - # Set u+w because tar-fs can't unpack archives with read-only dirs 9160 - # https://github.com/mafintosh/tar-fs/issues/79 9161 - tar cf $out --mode u+w -C ${repo} . 9162 - ''; 9119 + let repo = fetchgit { 9120 + url = "https://github.com/pgadmin-org/react-data-grid.git/"; 9121 + rev = "200d2f5e02de694e3e9ffbe177c279bc40240fb8"; 9122 + sha256 = "0s4k8s8ackr5lrvhv7ljbhd90679wh34p2wv71xqn8yy1ykjwm15"; 9123 + }; 9124 + in runCommand "react-data-grid.git" { buildInputs = [gnutar]; } '' 9125 + # Set u+w because tar-fs can't unpack archives with read-only dirs 9126 + # https://github.com/mafintosh/tar-fs/issues/79 9127 + tar cf $out --mode u+w -C ${repo} . 9128 + ''; 9163 9129 } 9164 9130 { 9165 9131 name = "react_dnd_html5_backend___react_dnd_html5_backend_16.0.1.tgz"; ··· 9175 9141 name = "react_dnd___react_dnd_16.0.1.tgz"; 9176 9142 url = "https://registry.yarnpkg.com/react-dnd/-/react-dnd-16.0.1.tgz"; 9177 9143 sha512 = "QeoM/i73HHu2XF9aKksIUuamHPDvRglEwdHL4jsp784BgUuWcg6mzfxT0QDdQz8Wj0qyRKx2eMg8iZtWvU4E2Q=="; 9178 - }; 9179 - } 9180 - { 9181 - name = "react_dom___react_dom_16.14.0.tgz"; 9182 - path = fetchurl { 9183 - name = "react_dom___react_dom_16.14.0.tgz"; 9184 - url = "https://registry.yarnpkg.com/react-dom/-/react-dom-16.14.0.tgz"; 9185 - sha512 = "1gCeQXDLoIqMgqD3IO2Ah9bnf0w9kzhwN5q4FGnHZ67hBm9yePzB5JJAIQCc8x3pFnNlwFq4RidZggNAAkzWWw=="; 9186 9144 }; 9187 9145 } 9188 9146 { ··· 9359 9317 name = "react_window___react_window_1.8.8.tgz"; 9360 9318 url = "https://registry.yarnpkg.com/react-window/-/react-window-1.8.8.tgz"; 9361 9319 sha512 = "D4IiBeRtGXziZ1n0XklnFGu7h9gU684zepqyKzgPNzrsrk7xOCxni+TCckjg2Nr/DiaEEGVVmnhYSlT2rB47dQ=="; 9362 - }; 9363 - } 9364 - { 9365 - name = "react___react_16.14.0.tgz"; 9366 - path = fetchurl { 9367 - name = "react___react_16.14.0.tgz"; 9368 - url = "https://registry.yarnpkg.com/react/-/react-16.14.0.tgz"; 9369 - sha512 = "0X2CImDkJGApiAlcf0ODKIneSwBPhqJawOa5wCtKbu7ZECrmS26NvtSILynQ66cgkT/RJ4LidJOc3bUESwmU8g=="; 9370 9320 }; 9371 9321 } 9372 9322 { ··· 9783 9733 name = "sax___sax_1.2.4.tgz"; 9784 9734 url = "https://registry.yarnpkg.com/sax/-/sax-1.2.4.tgz"; 9785 9735 sha512 = "NqVDv9TpANUjFm0N8uM5GxL36UgKi9/atZw+x7YFnQ8ckwFGKrl4xX4yWtrey3UJm5nP1kUbnYgLopqWNSRhWw=="; 9786 - }; 9787 - } 9788 - { 9789 - name = "scheduler___scheduler_0.19.1.tgz"; 9790 - path = fetchurl { 9791 - name = "scheduler___scheduler_0.19.1.tgz"; 9792 - url = "https://registry.yarnpkg.com/scheduler/-/scheduler-0.19.1.tgz"; 9793 - sha512 = "n/zwRWRYSUj0/3g/otKDRPMh6qv2SYMWNq85IEa8iZyAv8od9zDYpGSnpBEjNgcMNq6Scbu5KfIPxNF72R/2EA=="; 9794 9736 }; 9795 9737 } 9796 9738 { ··· 10770 10712 }; 10771 10713 } 10772 10714 { 10773 - name = "tiny_emitter___tiny_emitter_2.1.0.tgz"; 10774 - path = fetchurl { 10775 - name = "tiny_emitter___tiny_emitter_2.1.0.tgz"; 10776 - url = "https://registry.yarnpkg.com/tiny-emitter/-/tiny-emitter-2.1.0.tgz"; 10777 - sha512 = "NB6Dk1A9xgQPMoGqC5CVXn123gWyte215ONT5Pp5a0yt4nlEoO1ZWeCwpncaekPHXO60i47ihFnZPiRPjRMq4Q=="; 10778 - }; 10779 - } 10780 - { 10781 10715 name = "tiny_warning___tiny_warning_1.0.3.tgz"; 10782 10716 path = fetchurl { 10783 10717 name = "tiny_warning___tiny_warning_1.0.3.tgz"; ··· 11290 11224 }; 11291 11225 } 11292 11226 { 11293 - name = "wcDocker"; 11227 + name = "wcdocker"; 11294 11228 path = 11295 - let 11296 - repo = fetchgit { 11297 - url = "https://github.com/EnterpriseDB/wcDocker/"; 11298 - rev = "3df8aac825ee2892f4d824de273b779cc6dbcad8"; 11299 - sha256 = "1dihm56s7a34s132a6rh69lri93avz9bwja8bjd9hvpds20phmsg"; 11300 - }; 11301 - in 11302 - runCommand "wcDocker" { buildInputs = [gnutar]; } '' 11303 - # Set u+w because tar-fs can't unpack archives with read-only dirs 11304 - # https://github.com/mafintosh/tar-fs/issues/79 11305 - tar cf $out --mode u+w -C ${repo} . 11306 - ''; 11229 + let repo = fetchgit { 11230 + url = "https://github.com/pgadmin-org/wcdocker/"; 11231 + rev = "3df8aac825ee2892f4d824de273b779cc6dbcad8"; 11232 + sha256 = "1dihm56s7a34s132a6rh69lri93avz9bwja8bjd9hvpds20phmsg"; 11233 + }; 11234 + in runCommand "wcdocker" { buildInputs = [gnutar]; } '' 11235 + # Set u+w because tar-fs can't unpack archives with read-only dirs 11236 + # https://github.com/mafintosh/tar-fs/issues/79 11237 + tar cf $out --mode u+w -C ${repo} . 11238 + ''; 11307 11239 } 11308 11240 { 11309 11241 name = "webfonts_loader___webfonts_loader_7.5.2.tgz";
+3 -3
pkgs/tools/misc/dua/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "dua"; 5 - version = "2.19.0"; 5 + version = "2.19.1"; 6 6 7 7 buildInputs = lib.optionals stdenv.isDarwin [ libiconv Foundation ]; 8 8 ··· 10 10 owner = "Byron"; 11 11 repo = "dua-cli"; 12 12 rev = "v${version}"; 13 - sha256 = "sha256-cb2WW0FpY5GMzll7sgbDRcgiKYSVZjJ8e8BabywF9wg="; 13 + sha256 = "sha256-GNVmrFY/qWInP0qT9Y+UurIyK3rBhj2OyAcH+Sw3smo="; 14 14 # Remove unicode file names which leads to different checksums on HFS+ 15 15 # vs. other filesystems because of unicode normalisation. 16 16 postFetch = '' ··· 18 18 ''; 19 19 }; 20 20 21 - cargoSha256 = "sha256-79dUeQOf6hiSRzz5mLWcSP5bLXMOU5YcE9ecd/t9VaI="; 21 + cargoHash = "sha256-xhNHvTVOBwAkMn/lLUShhZkBih1zX5b/udeJaEcZGgs="; 22 22 23 23 doCheck = false; 24 24
+2 -1
pkgs/tools/misc/ldapvi/default.nix
··· 2 2 3 3 stdenv.mkDerivation { 4 4 pname = "ldapvi"; 5 - version = "0lz1sb5r0y9ypy8d7hm0l2wfa8l69f8ll0i5c78c0apz40nyjqkg"; 5 + version = "unstable-2012-04-28"; 6 6 7 7 # use latest git, it includes some important patches since 2007 release 8 8 src = fetchgit { 9 9 url = "http://www.lichteblau.com/git/ldapvi.git"; 10 + rev = "f1d42bad66cc4623d1ff21fbd5dddbf5009d3e40"; 10 11 sha256 = "3ef3103030ecb04d7fe80180e3fd490377cf81fb2af96782323fddabc3225030"; 11 12 }; 12 13
+1 -1
pkgs/tools/misc/lnch/default.nix
··· 11 11 sha256 = "sha256-Iro/FjPFMqulcK90MbludnOXkMEHW0QSCoQRL01/LDE"; 12 12 }; 13 13 14 - vendorSha256 = "sha256-pQpattmS9VmO3ZIQUFn66az8GSmB4IvYhTTCFn6SUmo"; 14 + vendorSha256 = null; 15 15 16 16 ldflags = [ "-s" "-w" ]; 17 17
+1 -1
pkgs/tools/misc/rlwrap/default.nix
··· 25 25 homepage = "https://github.com/hanslub42/rlwrap"; 26 26 license = licenses.gpl2Plus; 27 27 platforms = platforms.unix; 28 - maintainers = with maintainers; [ SuperSandro2000 srapenne ]; 28 + maintainers = with maintainers; [ srapenne ]; 29 29 }; 30 30 }
+2 -2
pkgs/tools/misc/sharedown/default.nix
··· 17 17 18 18 stdenvNoCC.mkDerivation rec { 19 19 pname = "Sharedown"; 20 - version = "5.1.0"; 20 + version = "5.2.2"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "kylon"; 24 24 repo = pname; 25 25 rev = version; 26 - sha256 = "sha256-cD+xq2LVaTZGjFj+SleQlNT3sAV6N4nG4RVbH015OOA="; 26 + sha256 = "sha256-kdntnzGpu1NUP6rrBaH7ASwE7XT18vHcgf39bp5A4ds="; 27 27 }; 28 28 29 29 nativeBuildInputs = [
+349 -228
pkgs/tools/misc/sharedown/yarn.lock
··· 7 7 resolved "https://registry.yarnpkg.com/7zip-bin/-/7zip-bin-5.1.1.tgz#9274ec7460652f9c632c59addf24efb1684ef876" 8 8 integrity sha512-sAP4LldeWNz0lNzmTird3uWfFDWWTeg6V/MsmyyLR9X1idwKBWIgt/ZvinqQldJm3LecKEs1emkbquO6PCiLVQ== 9 9 10 + "@babel/code-frame@^7.0.0": 11 + version "7.18.6" 12 + resolved "https://registry.yarnpkg.com/@babel/code-frame/-/code-frame-7.18.6.tgz#3b25d38c89600baa2dcc219edfa88a74eb2c427a" 13 + integrity sha512-TDCmlK5eOvH+eH7cdAFlNXeVJqWIQ7gW9tY1GJIpUtFb6CmjVyq2VM3u71bOyR8CRihcCgMUYoDNyLXao3+70Q== 14 + dependencies: 15 + "@babel/highlight" "^7.18.6" 16 + 17 + "@babel/helper-validator-identifier@^7.18.6": 18 + version "7.19.1" 19 + resolved "https://registry.yarnpkg.com/@babel/helper-validator-identifier/-/helper-validator-identifier-7.19.1.tgz#7eea834cf32901ffdc1a7ee555e2f9c27e249ca2" 20 + integrity sha512-awrNfaMtnHUr653GgGEs++LlAvW6w+DcPrOliSMXWCKo597CwL5Acf/wWdNkf/tfEQE3mjkeD1YOVZOUV/od1w== 21 + 22 + "@babel/highlight@^7.18.6": 23 + version "7.18.6" 24 + resolved "https://registry.yarnpkg.com/@babel/highlight/-/highlight-7.18.6.tgz#81158601e93e2563795adcbfbdf5d64be3f2ecdf" 25 + integrity sha512-u7stbOuYjaPezCuLj29hNW1v64M2Md2qupEKP1fHc7WdOA3DgLh37suiSrZYY7haUB7iBeQZ9P1uiRF359do3g== 26 + dependencies: 27 + "@babel/helper-validator-identifier" "^7.18.6" 28 + chalk "^2.0.0" 29 + js-tokens "^4.0.0" 30 + 10 31 "@develar/schema-utils@~2.6.5": 11 32 version "2.6.5" 12 33 resolved "https://registry.yarnpkg.com/@develar/schema-utils/-/schema-utils-2.6.5.tgz#3ece22c5838402419a6e0425f85742b961d9b6c6" ··· 15 36 ajv "^6.12.0" 16 37 ajv-keywords "^3.4.1" 17 38 18 - "@electron/get@^1.14.1": 19 - version "1.14.1" 20 - resolved "https://registry.yarnpkg.com/@electron/get/-/get-1.14.1.tgz#16ba75f02dffb74c23965e72d617adc721d27f40" 21 - integrity sha512-BrZYyL/6m0ZXz/lDxy/nlVhQz+WF+iPS6qXolEU8atw7h6v1aYkjwJZ63m+bJMBTxDE66X+r2tPS4a/8C82sZw== 39 + "@electron/get@^2.0.0": 40 + version "2.0.2" 41 + resolved "https://registry.yarnpkg.com/@electron/get/-/get-2.0.2.tgz#ae2a967b22075e9c25aaf00d5941cd79c21efd7e" 42 + integrity sha512-eFZVFoRXb3GFGd7Ak7W4+6jBl9wBtiZ4AaYOse97ej6mKj5tkyO0dUnUChs1IhJZtx1BENo4/p4WUTXpi6vT+g== 22 43 dependencies: 23 44 debug "^4.1.1" 24 45 env-paths "^2.2.0" 25 46 fs-extra "^8.1.0" 26 - got "^9.6.0" 47 + got "^11.8.5" 27 48 progress "^2.0.3" 28 49 semver "^6.2.0" 29 50 sumchecker "^3.0.1" 30 51 optionalDependencies: 31 52 global-agent "^3.0.0" 32 - global-tunnel-ng "^2.7.1" 33 53 34 54 "@electron/universal@1.2.1": 35 55 version "1.2.1" ··· 44 64 minimatch "^3.0.4" 45 65 plist "^3.0.4" 46 66 47 - "@fortawesome/fontawesome-free@^6.2.0": 48 - version "6.2.0" 49 - resolved "https://registry.yarnpkg.com/@fortawesome/fontawesome-free/-/fontawesome-free-6.2.0.tgz#ba3510825b332816fe7190f28827f8cb33a298b5" 50 - integrity sha512-CNR7qRIfCwWHNN7FnKUniva94edPdyQzil/zCwk3v6k4R6rR2Fr8i4s3PM7n/lyfPA6Zfko9z5WDzFxG9SW1uQ== 67 + "@fortawesome/fontawesome-free@6.2.1": 68 + version "6.2.1" 69 + resolved "https://registry.yarnpkg.com/@fortawesome/fontawesome-free/-/fontawesome-free-6.2.1.tgz#344baf6ff9eaad7a73cff067d8c56bfc11ae5304" 70 + integrity sha512-viouXhegu/TjkvYQoiRZK3aax69dGXxgEjpvZW81wIJdxm5Fnvp3VVIP4VHKqX4SvFw6qpmkILkD4RJWAdrt7A== 51 71 52 72 "@malept/cross-spawn-promise@^1.1.0": 53 73 version "1.1.1" ··· 66 86 lodash "^4.17.15" 67 87 tmp-promise "^3.0.2" 68 88 69 - "@sindresorhus/is@^0.14.0": 70 - version "0.14.0" 71 - resolved "https://registry.yarnpkg.com/@sindresorhus/is/-/is-0.14.0.tgz#9fb3a3cf3132328151f353de4632e01e52102bea" 72 - integrity sha512-9NET910DNaIPngYnLLPeg+Ogzqsi9uM4mSboU5y6p8S5DzMTVEsJZrawi+BoDNUVBa2DhJqQYUFvMDfgU062LQ== 89 + "@sindresorhus/is@^4.0.0": 90 + version "4.6.0" 91 + resolved "https://registry.yarnpkg.com/@sindresorhus/is/-/is-4.6.0.tgz#3c7c9c46e678feefe7a2e5bb609d3dbd665ffb3f" 92 + integrity sha512-t09vSN3MdfsyCHoFcTRCH/iUtG7OJ0CsjzB8cjAmKc/va/kIgeDI/TxsigdncE/4be734m0cvIYwNaV4i2XqAw== 73 93 74 - "@szmarczak/http-timer@^1.1.2": 75 - version "1.1.2" 76 - resolved "https://registry.yarnpkg.com/@szmarczak/http-timer/-/http-timer-1.1.2.tgz#b1665e2c461a2cd92f4c1bbf50d5454de0d4b421" 77 - integrity sha512-XIB2XbzHTN6ieIjfIMV9hlVcfPU26s2vafYWQcZHWXHOxiaRZYEDKEwdl129Zyg50+foYV2jCgtrqSA6qNuNSA== 94 + "@szmarczak/http-timer@^4.0.5": 95 + version "4.0.6" 96 + resolved "https://registry.yarnpkg.com/@szmarczak/http-timer/-/http-timer-4.0.6.tgz#b4a914bb62e7c272d4e5989fe4440f812ab1d807" 97 + integrity sha512-4BAffykYOgO+5nzBWYwE3W90sBgLJoUPRWWcL8wlyiM8IB8ipJz3UMJ9KXQd1RKQXpKp8Tutn80HZtWsu2u76w== 78 98 dependencies: 79 - defer-to-connect "^1.0.1" 99 + defer-to-connect "^2.0.0" 80 100 81 101 "@tootallnate/once@2": 82 102 version "2.0.0" 83 103 resolved "https://registry.yarnpkg.com/@tootallnate/once/-/once-2.0.0.tgz#f544a148d3ab35801c1f633a7441fd87c2e484bf" 84 104 integrity sha512-XCuKFP5PS55gnMVu3dty8KPatLqUoy/ZYzDzAGCQ8JNFCkLXzmI7vNHCR+XpbZaMWQK/vQubr7PkYq8g470J/A== 85 105 106 + "@types/cacheable-request@^6.0.1": 107 + version "6.0.3" 108 + resolved "https://registry.yarnpkg.com/@types/cacheable-request/-/cacheable-request-6.0.3.tgz#a430b3260466ca7b5ca5bfd735693b36e7a9d183" 109 + integrity sha512-IQ3EbTzGxIigb1I3qPZc1rWJnH0BmSKv5QYTalEwweFvyBDLSAe24zP0le/hyi7ecGfZVlIVAg4BZqb8WBwKqw== 110 + dependencies: 111 + "@types/http-cache-semantics" "*" 112 + "@types/keyv" "^3.1.4" 113 + "@types/node" "*" 114 + "@types/responselike" "^1.0.0" 115 + 86 116 "@types/debug@^4.1.6": 87 117 version "4.1.7" 88 118 resolved "https://registry.yarnpkg.com/@types/debug/-/debug-4.1.7.tgz#7cc0ea761509124709b8b2d1090d8f6c17aadb82" ··· 105 135 "@types/minimatch" "*" 106 136 "@types/node" "*" 107 137 138 + "@types/http-cache-semantics@*": 139 + version "4.0.1" 140 + resolved "https://registry.yarnpkg.com/@types/http-cache-semantics/-/http-cache-semantics-4.0.1.tgz#0ea7b61496902b95890dc4c3a116b60cb8dae812" 141 + integrity sha512-SZs7ekbP8CN0txVG2xVRH6EgKmEm31BOxA07vkFaETzZz1xh+cbt8BcI0slpymvwhx5dlFnQG2rTlPVQn+iRPQ== 142 + 143 + "@types/keyv@^3.1.4": 144 + version "3.1.4" 145 + resolved "https://registry.yarnpkg.com/@types/keyv/-/keyv-3.1.4.tgz#3ccdb1c6751b0c7e52300bcdacd5bcbf8faa75b6" 146 + integrity sha512-BQ5aZNSCpj7D6K2ksrRCTmKRLEpnPvWDiLPfoGyhZ++8YtiK9d/3DBKPJgry359X/P1PfruyYwvnvwFjuEiEIg== 147 + dependencies: 148 + "@types/node" "*" 149 + 108 150 "@types/minimatch@*": 109 151 version "5.1.2" 110 152 resolved "https://registry.yarnpkg.com/@types/minimatch/-/minimatch-5.1.2.tgz#07508b45797cb81ec3f273011b054cd0755eddca" ··· 116 158 integrity sha512-iiUgKzV9AuaEkZqkOLDIvlQiL6ltuZd9tGcW3gwpnX8JbuiuhFlEGmmFXEXkN50Cvq7Os88IY2v0dkDqXYWVgA== 117 159 118 160 "@types/node@*": 119 - version "18.11.3" 120 - resolved "https://registry.yarnpkg.com/@types/node/-/node-18.11.3.tgz#78a6d7ec962b596fc2d2ec102c4dd3ef073fea6a" 121 - integrity sha512-fNjDQzzOsZeKZu5NATgXUPsaFaTxeRgFXoosrHivTl8RGeV733OLawXsGfEk9a8/tySyZUyiZ6E8LcjPFZ2y1A== 161 + version "18.11.19" 162 + resolved "https://registry.yarnpkg.com/@types/node/-/node-18.11.19.tgz#35e26df9ec441ab99d73e99e9aca82935eea216d" 163 + integrity sha512-YUgMWAQBWLObABqrvx8qKO1enAvBUdjZOAWQ5grBAkp5LQv45jBvYKZ3oFS9iKRCQyFjqw6iuEa1vmFqtxYLZw== 122 164 123 165 "@types/node@^16.11.26": 124 - version "16.11.68" 125 - resolved "https://registry.yarnpkg.com/@types/node/-/node-16.11.68.tgz#30ee923f4d940793e0380f5ce61c0bd4b7196b6c" 126 - integrity sha512-JkRpuVz3xCNCWaeQ5EHLR/6woMbHZz/jZ7Kmc63AkU+1HxnoUugzSWMck7dsR4DvNYX8jp9wTi9K7WvnxOIQZQ== 166 + version "16.18.12" 167 + resolved "https://registry.yarnpkg.com/@types/node/-/node-16.18.12.tgz#e3bfea80e31523fde4292a6118f19ffa24fd6f65" 168 + integrity sha512-vzLe5NaNMjIE3mcddFVGlAXN1LEWueUsMsOJWaT6wWMJGyljHAWHznqfnKUQWGzu7TLPrGvWdNAsvQYW+C0xtw== 127 169 128 170 "@types/plist@^3.0.1": 129 171 version "3.0.2" ··· 133 175 "@types/node" "*" 134 176 xmlbuilder ">=11.0.1" 135 177 178 + "@types/responselike@^1.0.0": 179 + version "1.0.0" 180 + resolved "https://registry.yarnpkg.com/@types/responselike/-/responselike-1.0.0.tgz#251f4fe7d154d2bad125abe1b429b23afd262e29" 181 + integrity sha512-85Y2BjiufFzaMIlvJDvTTB8Fxl2xfLo4HgmHzVBz08w4wDePCTjYw66PdrolO0kzli3yam/YCgRufyo1DdQVTA== 182 + dependencies: 183 + "@types/node" "*" 184 + 136 185 "@types/verror@^1.10.3": 137 186 version "1.10.6" 138 187 resolved "https://registry.yarnpkg.com/@types/verror/-/verror-1.10.6.tgz#3e600c62d210c5826460858f84bcbb65805460bb" ··· 144 193 integrity sha512-iO9ZQHkZxHn4mSakYV0vFHAVDyEOIJQrV2uZ06HxEPcx+mt8swXoZHIbaaJ2crJYFfErySgktuTZ3BeLz+XmFA== 145 194 146 195 "@types/yargs@^17.0.1": 147 - version "17.0.13" 148 - resolved "https://registry.yarnpkg.com/@types/yargs/-/yargs-17.0.13.tgz#34cced675ca1b1d51fcf4d34c3c6f0fa142a5c76" 149 - integrity sha512-9sWaruZk2JGxIQU+IhI1fhPYRcQ0UuTNuKuCW9bR5fp7qi2Llf7WDzNa17Cy7TKnh3cdxDOiyTu6gaLS0eDatg== 196 + version "17.0.22" 197 + resolved "https://registry.yarnpkg.com/@types/yargs/-/yargs-17.0.22.tgz#7dd37697691b5f17d020f3c63e7a45971ff71e9a" 198 + integrity sha512-pet5WJ9U8yPVRhkwuEIp5ktAeAqRZOq4UdAyWLWzxbtpyXnzbtLdKiXAjJzi/KLmPGS9wk86lUFWZFN6sISo4g== 150 199 dependencies: 151 200 "@types/yargs-parser" "*" 152 201 ··· 184 233 resolved "https://registry.yarnpkg.com/ansi-regex/-/ansi-regex-5.0.1.tgz#082cb2c89c9fe8659a311a53bd6a4dc5301db304" 185 234 integrity sha512-quJQXlTSUGL2LH9SUXo8VwsY4soanhgo6LNSm84E1LBcE8s3O0wpdiRzyR9z/ZZJMlMWv37qOOb9pdJlMUEKFQ== 186 235 236 + ansi-styles@^3.2.1: 237 + version "3.2.1" 238 + resolved "https://registry.yarnpkg.com/ansi-styles/-/ansi-styles-3.2.1.tgz#41fbb20243e50b12be0f04b8dedbf07520ce841d" 239 + integrity sha512-VT0ZI6kZRdTh8YyJw3SMbYm/u+NqfsAxEpWO0Pf9sq8/e94WxxOpPKx9FR1FlyCtOVDNOQ+8ntlqFxiRc+r5qA== 240 + dependencies: 241 + color-convert "^1.9.0" 242 + 187 243 ansi-styles@^4.0.0, ansi-styles@^4.1.0: 188 244 version "4.3.0" 189 245 resolved "https://registry.yarnpkg.com/ansi-styles/-/ansi-styles-4.3.0.tgz#edd803628ae71c04c85ae7a0906edad34b648937" ··· 280 336 resolved "https://registry.yarnpkg.com/at-least-node/-/at-least-node-1.0.0.tgz#602cd4b46e844ad4effc92a8011a3c46e0238dc2" 281 337 integrity sha512-+q/t7Ekv1EDY2l6Gda6LLiX14rU9TV20Wa3ofeQmwPFZbOMo9DXrLbOjFaaclkXKWidIaopwAObQDqwWtGUjqg== 282 338 283 - axios@^1.1.3: 284 - version "1.1.3" 285 - resolved "https://registry.yarnpkg.com/axios/-/axios-1.1.3.tgz#8274250dada2edf53814ed7db644b9c2866c1e35" 286 - integrity sha512-00tXVRwKx/FZr/IDVFt4C+f9FYairX517WoGCL6dpOntqLkZofjhu43F/Xl44UOpqa+9sLFDrG/XAnFsUYgkDA== 339 + axios@^1.2.1: 340 + version "1.3.2" 341 + resolved "https://registry.yarnpkg.com/axios/-/axios-1.3.2.tgz#7ac517f0fa3ec46e0e636223fd973713a09c72b3" 342 + integrity sha512-1M3O703bYqYuPhbHeya5bnhpYVsDDRyQSabNja04mZtboLNSuZ4YrltestrLXfHgmzua4TpUqRiVKbiQuo2epw== 287 343 dependencies: 288 344 follow-redirects "^1.15.0" 289 345 form-data "^4.0.0" ··· 325 381 resolved "https://registry.yarnpkg.com/boolean/-/boolean-3.2.0.tgz#9e5294af4e98314494cbb17979fa54ca159f116b" 326 382 integrity sha512-d0II/GO9uf9lfUHH2BQsjxzRJZBdsjgsBiW4BvhWk/3qoKwQFjIDVN19PfX8F2D/r9PCMTtLWjYVCFrpeYUzsw== 327 383 328 - bootstrap@5.2.2: 329 - version "5.2.2" 330 - resolved "https://registry.yarnpkg.com/bootstrap/-/bootstrap-5.2.2.tgz#834e053eed584a65e244d8aa112a6959f56e27a0" 331 - integrity sha512-dEtzMTV71n6Fhmbg4fYJzQsw1N29hJKO1js5ackCgIpDcGid2ETMGC6zwSYw09v05Y+oRdQ9loC54zB1La3hHQ== 384 + bootstrap@5.2.3: 385 + version "5.2.3" 386 + resolved "https://registry.yarnpkg.com/bootstrap/-/bootstrap-5.2.3.tgz#54739f4414de121b9785c5da3c87b37ff008322b" 387 + integrity sha512-cEKPM+fwb3cT8NzQZYEu4HilJ3anCrWqh3CHAok1p9jXqMPsPTBhU25fBckEJHJ/p+tTxTFTsFQGM+gaHpi3QQ== 332 388 333 389 brace-expansion@^1.1.7: 334 390 version "1.1.11" ··· 417 473 stat-mode "^1.0.0" 418 474 temp-file "^3.4.0" 419 475 420 - cacheable-request@^6.0.0: 421 - version "6.1.0" 422 - resolved "https://registry.yarnpkg.com/cacheable-request/-/cacheable-request-6.1.0.tgz#20ffb8bd162ba4be11e9567d823db651052ca912" 423 - integrity sha512-Oj3cAGPCqOZX7Rz64Uny2GYAZNliQSqfbePrgAQ1wKAihYmCUnraBtJtKcGR4xz7wF+LoJC+ssFZvv5BgF9Igg== 476 + cacheable-lookup@^5.0.3: 477 + version "5.0.4" 478 + resolved "https://registry.yarnpkg.com/cacheable-lookup/-/cacheable-lookup-5.0.4.tgz#5a6b865b2c44357be3d5ebc2a467b032719a7005" 479 + integrity sha512-2/kNscPhpcxrOigMZzbiWF7dz8ilhb/nIHU3EyZiXWXpeq/au8qJ8VhdftMkty3n7Gj6HIGalQG8oiBNB3AJgA== 480 + 481 + cacheable-request@^7.0.2: 482 + version "7.0.2" 483 + resolved "https://registry.yarnpkg.com/cacheable-request/-/cacheable-request-7.0.2.tgz#ea0d0b889364a25854757301ca12b2da77f91d27" 484 + integrity sha512-pouW8/FmiPQbuGpkXQ9BAPv/Mo5xDGANgSNXzTzJ8DrKGuXOssM4wIQRjfanNRh3Yu5cfYPvcorqbhg2KIJtew== 424 485 dependencies: 425 486 clone-response "^1.0.2" 426 487 get-stream "^5.1.0" 427 488 http-cache-semantics "^4.0.0" 428 - keyv "^3.0.0" 489 + keyv "^4.0.0" 429 490 lowercase-keys "^2.0.0" 430 - normalize-url "^4.1.0" 431 - responselike "^1.0.2" 491 + normalize-url "^6.0.1" 492 + responselike "^2.0.0" 493 + 494 + callsites@^3.0.0: 495 + version "3.1.0" 496 + resolved "https://registry.yarnpkg.com/callsites/-/callsites-3.1.0.tgz#b3630abd8943432f54b3f0519238e33cd7df2f73" 497 + integrity sha512-P8BjAsXvZS+VIDUI11hHCQEv74YT67YUi5JJFNWIqL235sBmjX4+qx9Muvls5ivyNENctx46xQLQ3aTuE7ssaQ== 498 + 499 + chalk@^2.0.0: 500 + version "2.4.2" 501 + resolved "https://registry.yarnpkg.com/chalk/-/chalk-2.4.2.tgz#cd42541677a54333cf541a49108c1432b44c9424" 502 + integrity sha512-Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ== 503 + dependencies: 504 + ansi-styles "^3.2.1" 505 + escape-string-regexp "^1.0.5" 506 + supports-color "^5.3.0" 432 507 433 508 chalk@^4.0.2, chalk@^4.1.1: 434 509 version "4.1.2" ··· 454 529 integrity sha512-1R5Fho+jBq0DDydt+/vHWj5KJNJCKdARKOCwZUen84I5BreWoLqRLANH1U87eJy1tiASPtMnGqJJq0ZsLoRPOw== 455 530 456 531 ci-info@^3.2.0: 457 - version "3.5.0" 458 - resolved "https://registry.yarnpkg.com/ci-info/-/ci-info-3.5.0.tgz#bfac2a29263de4c829d806b1ab478e35091e171f" 459 - integrity sha512-yH4RezKOGlOhxkmhbeNuC4eYZKAUsEaGtBuBzDDP1eFUKiccDWzBABxBfOx31IDwDIXMTxWuwAxUGModvkbuVw== 532 + version "3.7.1" 533 + resolved "https://registry.yarnpkg.com/ci-info/-/ci-info-3.7.1.tgz#708a6cdae38915d597afdf3b145f2f8e1ff55f3f" 534 + integrity sha512-4jYS4MOAaCIStSRwiuxc4B8MYhIe676yO1sYGzARnjXkWpmzZMMYxY6zu8WYWDhSuth5zhrQ1rhNSibyyvv4/w== 460 535 461 536 cli-truncate@^2.1.0: 462 537 version "2.1.0" ··· 491 566 dependencies: 492 567 mimic-response "^1.0.0" 493 568 569 + color-convert@^1.9.0: 570 + version "1.9.3" 571 + resolved "https://registry.yarnpkg.com/color-convert/-/color-convert-1.9.3.tgz#bb71850690e1f136567de629d2d5471deda4c1e8" 572 + integrity sha512-QfAUtd+vFdAtFQcC8CCyYt1fYWxSqAiK2cSD6zDB8N3cpsEBAvRxp9zOGg6G/SHHJYAT88/az/IuDGALsNVbGg== 573 + dependencies: 574 + color-name "1.1.3" 575 + 494 576 color-convert@^2.0.1: 495 577 version "2.0.1" 496 578 resolved "https://registry.yarnpkg.com/color-convert/-/color-convert-2.0.1.tgz#72d3a68d598c9bdb3af2ad1e84f21d896abd4de3" 497 579 integrity sha512-RRECPsj7iu/xb5oKYcsFHSppFNnsj/52OVTRKb4zP5onXwVF3zVmmToNcOfGC+CRDpfK/U584fMg38ZHCaElKQ== 498 580 dependencies: 499 581 color-name "~1.1.4" 582 + 583 + color-name@1.1.3: 584 + version "1.1.3" 585 + resolved "https://registry.yarnpkg.com/color-name/-/color-name-1.1.3.tgz#a7d0558bd89c42f795dd42328f740831ca53bc25" 586 + integrity sha512-72fSenhMw2HZMTVHeCA9KCmpEIbzWiQsjN+BHcBbS9vr1mtt+vJjPdksIBNUmKAW8TFUDPJK5SUU3QhE9NEXDw== 500 587 501 588 color-name@~1.1.4: 502 589 version "1.1.4" ··· 537 624 resolved "https://registry.yarnpkg.com/concat-map/-/concat-map-0.0.1.tgz#d8a96bd77fd68df7793a73036a3ba0d5405d477b" 538 625 integrity sha512-/Srv4dswyQNBfohGpz9o6Yb3Gz3SrUDqBH5rTuhGR7ahtlbYKnVxw2bCFMRljaA7EXHaXZ8wsHdodFvbkhKmqg== 539 626 540 - config-chain@^1.1.11: 541 - version "1.1.13" 542 - resolved "https://registry.yarnpkg.com/config-chain/-/config-chain-1.1.13.tgz#fad0795aa6a6cdaff9ed1b68e9dff94372c232f4" 543 - integrity sha512-qj+f8APARXHrM0hraqXYb2/bOVSV4PvJQlNZ/DVj0QrmNM2q2euizkeuVckQ57J+W0mRH6Hvi+k50M4Jul2VRQ== 544 - dependencies: 545 - ini "^1.3.4" 546 - proto-list "~1.2.1" 547 - 548 627 core-util-is@1.0.2: 549 628 version "1.0.2" 550 629 resolved "https://registry.yarnpkg.com/core-util-is/-/core-util-is-1.0.2.tgz#b5fd54220aa2bc5ab57aab7140c940754503c1a7" 551 630 integrity sha512-3lqz5YjWTYnW6dlDa5TLaTCcShfar1e40rmcJVwCBJC6mWlFuj0eCHIElmG1g5kyuJ/GD+8Wn4FFCcz4gJPfaQ== 631 + 632 + cosmiconfig@8.0.0: 633 + version "8.0.0" 634 + resolved "https://registry.yarnpkg.com/cosmiconfig/-/cosmiconfig-8.0.0.tgz#e9feae014eab580f858f8a0288f38997a7bebe97" 635 + integrity sha512-da1EafcpH6b/TD8vDRaWV7xFINlHlF6zKsGwS1TsuVJTZRkquaS5HTMq7uq6h31619QjbsYl21gVDOm32KM1vQ== 636 + dependencies: 637 + import-fresh "^3.2.1" 638 + js-yaml "^4.1.0" 639 + parse-json "^5.0.0" 640 + path-type "^4.0.0" 552 641 553 642 crc@^3.8.0: 554 643 version "3.8.0" ··· 598 687 dependencies: 599 688 ms "2.0.0" 600 689 601 - decompress-response@^3.3.0: 602 - version "3.3.0" 603 - resolved "https://registry.yarnpkg.com/decompress-response/-/decompress-response-3.3.0.tgz#80a4dd323748384bfa248083622aedec982adff3" 604 - integrity sha512-BzRPQuY1ip+qDonAOz42gRm/pg9F768C+npV/4JOsxRC2sq+Rlk+Q4ZCAsOhnIaMrgarILY+RMUIvMmmX1qAEA== 605 - dependencies: 606 - mimic-response "^1.0.0" 607 - 608 690 decompress-response@^6.0.0: 609 691 version "6.0.0" 610 692 resolved "https://registry.yarnpkg.com/decompress-response/-/decompress-response-6.0.0.tgz#ca387612ddb7e104bd16d85aab00d5ecf09c66fc" ··· 617 699 resolved "https://registry.yarnpkg.com/deep-extend/-/deep-extend-0.6.0.tgz#c4fa7c95404a17a9c3e8ca7e1537312b736330ac" 618 700 integrity sha512-LOHxIOaPYdHlJRtCQfDIVZtfw/ufM8+rVj649RIHzcm/vGwQRXFt6OPqIFWsm2XEMrNIEtWR64sY1LEKD2vAOA== 619 701 620 - defer-to-connect@^1.0.1: 621 - version "1.1.3" 622 - resolved "https://registry.yarnpkg.com/defer-to-connect/-/defer-to-connect-1.1.3.tgz#331ae050c08dcf789f8c83a7b81f0ed94f4ac591" 623 - integrity sha512-0ISdNousHvZT2EiFlZeZAHBUvSxmKswVCEf8hW7KWgG4a8MVEu/3Vb6uWYozkjylyCxe0JBIiRB1jV45S70WVQ== 702 + defer-to-connect@^2.0.0: 703 + version "2.0.1" 704 + resolved "https://registry.yarnpkg.com/defer-to-connect/-/defer-to-connect-2.0.1.tgz#8016bdb4143e4632b77a3449c6236277de520587" 705 + integrity sha512-4tvttepXG1VaYGrRibk5EwJd1t4udunSOVMdLSAL6mId1ix438oPwPZMALY41FCijukO1L0twNcGsdzS7dHgDg== 624 706 625 707 define-properties@^1.1.3: 626 708 version "1.1.4" ··· 645 727 resolved "https://registry.yarnpkg.com/detect-node/-/detect-node-2.1.0.tgz#c9c70775a49c3d03bc2c06d9a73be550f978f8b1" 646 728 integrity sha512-T0NIuQpnTvFDATNuHN5roPwSBG83rFsuO+MXXH9/3N1eFbn4wcPjttvjMLEPWJ0RGUYgQE7cGgS3tNxbqCGM7g== 647 729 648 - devtools-protocol@0.0.1045489: 649 - version "0.0.1045489" 650 - resolved "https://registry.yarnpkg.com/devtools-protocol/-/devtools-protocol-0.0.1045489.tgz#f959ad560b05acd72d55644bc3fb8168a83abf28" 651 - integrity sha512-D+PTmWulkuQW4D1NTiCRCFxF7pQPn0hgp4YyX4wAQ6xYXKOadSWPR3ENGDQ47MW/Ewc9v2rpC/UEEGahgBYpSQ== 730 + devtools-protocol@0.0.1068969: 731 + version "0.0.1068969" 732 + resolved "https://registry.yarnpkg.com/devtools-protocol/-/devtools-protocol-0.0.1068969.tgz#8b9a4bc48aed1453bed08d62b07481f9abf4d6d8" 733 + integrity sha512-ATFTrPbY1dKYhPPvpjtwWKSK2mIwGmRwX54UASn9THEuIZCe2n9k3vVuMmt6jWeL+e5QaaguEv/pMyR+JQB7VQ== 652 734 653 735 dir-compare@^2.4.0: 654 736 version "2.4.0" ··· 698 780 resolved "https://registry.yarnpkg.com/dotenv/-/dotenv-9.0.2.tgz#dacc20160935a37dea6364aa1bef819fb9b6ab05" 699 781 integrity sha512-I9OvvrHp4pIARv4+x9iuewrWycX6CcZtoAu1XrzPxc5UygMJXJZYmBsynku8IkrJwgypE5DGNjDPmPRhDCptUg== 700 782 701 - duplexer3@^0.1.4: 702 - version "0.1.5" 703 - resolved "https://registry.yarnpkg.com/duplexer3/-/duplexer3-0.1.5.tgz#0b5e4d7bad5de8901ea4440624c8e1d20099217e" 704 - integrity sha512-1A8za6ws41LQgv9HrE/66jyC5yuSjQ3L/KOpFtoBilsAK2iA2wuS5rTt1OCzIvtS2V7nVmedsUU+DGRcjBmOYA== 705 - 706 783 ejs@^3.1.7: 707 784 version "3.1.8" 708 785 resolved "https://registry.yarnpkg.com/ejs/-/ejs-3.1.8.tgz#758d32910c78047585c7ef1f92f9ee041c1c190b" ··· 753 830 lazy-val "^1.0.5" 754 831 mime "^2.5.2" 755 832 756 - electron@^21.0.1: 757 - version "21.2.0" 758 - resolved "https://registry.yarnpkg.com/electron/-/electron-21.2.0.tgz#8eb65d69b36aa8dac0ee7330eab70181df211c8b" 759 - integrity sha512-oKV4fo8l6jlOZ1cYZ4RpZz02ZxLuBo3SO7DH+FrJ8uDyCirP+eVJ/qlzu23odtNe0P7S/mYAZbC6abZHWoqtLg== 833 + electron@^22.0.0: 834 + version "22.2.0" 835 + resolved "https://registry.yarnpkg.com/electron/-/electron-22.2.0.tgz#1aa321415d8b8021a4b0807641f0ad56028feaf5" 836 + integrity sha512-puRZSF2vWJ4pz3oetL5Td8LcuivTWz3MoAk/gjImHSN1B/2VJNEQlw1jGdkte+ppid2craOswE2lmCOZ7SwF1g== 760 837 dependencies: 761 - "@electron/get" "^1.14.1" 838 + "@electron/get" "^2.0.0" 762 839 "@types/node" "^16.11.26" 763 840 extract-zip "^2.0.1" 764 841 ··· 767 844 resolved "https://registry.yarnpkg.com/emoji-regex/-/emoji-regex-8.0.0.tgz#e818fd69ce5ccfcb404594f842963bf53164cc37" 768 845 integrity sha512-MSjYzcWNOA0ewAHpz0MxpYFvwg6yjy1NG3xteoqz644VCo/RPgnr1/GGt+ic3iJTzQ8Eu3TdM14SawnVUmGE6A== 769 846 770 - encodeurl@^1.0.2: 771 - version "1.0.2" 772 - resolved "https://registry.yarnpkg.com/encodeurl/-/encodeurl-1.0.2.tgz#ad3ff4c86ec2d029322f5a02c3a9a606c95b3f59" 773 - integrity sha512-TPJXq8JqFaVYm2CWmPvnP2Iyo4ZSM7/QKcSmuMLDObfpH5fi7RUGmd/rTDf+rut/saiDiQEeVTNgAmJEdAOx0w== 774 - 775 847 end-of-stream@^1.1.0, end-of-stream@^1.4.1: 776 848 version "1.4.4" 777 849 resolved "https://registry.yarnpkg.com/end-of-stream/-/end-of-stream-1.4.4.tgz#5ae64a5f45057baf3626ec14da0ca5e4b2431eb0" ··· 784 856 resolved "https://registry.yarnpkg.com/env-paths/-/env-paths-2.2.1.tgz#420399d416ce1fbe9bc0a07c62fa68d67fd0f8f2" 785 857 integrity sha512-+h1lkLKhZMTYjog1VEpJNG7NZJWcuc2DDk/qsqSTRRCOXiLjeQ1d1/udrUGhqMxUgAlwKNZ0cf2uqan5GLuS2A== 786 858 859 + error-ex@^1.3.1: 860 + version "1.3.2" 861 + resolved "https://registry.yarnpkg.com/error-ex/-/error-ex-1.3.2.tgz#b4ac40648107fdcdcfae242f428bea8a14d4f1bf" 862 + integrity sha512-7dFHNmqeFSEt2ZBsCriorKnn3Z2pj+fd9kmI6QoWw4//DL+icEBfc0U7qJCisqrTsKTjw4fNFy2pW9OqStD84g== 863 + dependencies: 864 + is-arrayish "^0.2.1" 865 + 787 866 es6-error@^4.1.1: 788 867 version "4.1.1" 789 868 resolved "https://registry.yarnpkg.com/es6-error/-/es6-error-4.1.1.tgz#9e3af407459deed47e9a91f9b885a84eb05c561d" ··· 793 872 version "3.1.1" 794 873 resolved "https://registry.yarnpkg.com/escalade/-/escalade-3.1.1.tgz#d8cfdc7000965c5a0174b4a82eaa5c0552742e40" 795 874 integrity sha512-k0er2gUkLf8O0zKJiAhmkTnJlTvINGv7ygDNPbeIsX/TJjGJZHuh9B2UxbsaEkmlEo9MfhrSzmhIlhRlI2GXnw== 875 + 876 + escape-string-regexp@^1.0.5: 877 + version "1.0.5" 878 + resolved "https://registry.yarnpkg.com/escape-string-regexp/-/escape-string-regexp-1.0.5.tgz#1b61c0562190a8dff6ae3bb2cf0200ca130b86d4" 879 + integrity sha512-vbRorB5FUQWvla16U8R/qgaFIya2qGzwDrNmCZuYKrbdSUMG6I1ZCGQRefkRVhuOkIGVne7BQ35DSfo1qvJqFg== 796 880 797 881 escape-string-regexp@^4.0.0: 798 882 version "4.0.0" ··· 932 1016 integrity sha512-DyFP3BM/3YHTQOCUL/w0OZHR0lpKeGrxotcHWcqNEdnltqFwXVfhEBQ94eIo34AfQpo0rGki4cyIiftY06h2Fg== 933 1017 934 1018 get-intrinsic@^1.1.1: 935 - version "1.1.3" 936 - resolved "https://registry.yarnpkg.com/get-intrinsic/-/get-intrinsic-1.1.3.tgz#063c84329ad93e83893c7f4f243ef63ffa351385" 937 - integrity sha512-QJVz1Tj7MS099PevUG5jvnt9tSkXN8K14dxQlikJuPt4uD9hHAHjLyLBiLR5zELelBdD9QNRAXZzsJx0WaDL9A== 1019 + version "1.2.0" 1020 + resolved "https://registry.yarnpkg.com/get-intrinsic/-/get-intrinsic-1.2.0.tgz#7ad1dc0535f3a2904bba075772763e5051f6d05f" 1021 + integrity sha512-L049y6nFOuom5wGyRc3/gdTLO94dySVKRACj1RmJZBQXlbTMhtNIgkWkUHq+jYmZvKf14EW1EoJnnjbmoHij0Q== 938 1022 dependencies: 939 1023 function-bind "^1.1.1" 940 1024 has "^1.0.3" 941 1025 has-symbols "^1.0.3" 942 1026 943 - get-stream@^4.0.0, get-stream@^4.1.0: 1027 + get-stream@^4.0.0: 944 1028 version "4.1.0" 945 1029 resolved "https://registry.yarnpkg.com/get-stream/-/get-stream-4.1.0.tgz#c1b255575f3dc21d59bfc79cd3d2b46b1c3a54b5" 946 1030 integrity sha512-GMat4EJ5161kIy2HevLlr4luNjBgvmj413KaQA7jt4V8B4RDsfpHk7WQ9GVqfYyyx8OS/L66Kox+rJRNklLK7w== ··· 983 1067 semver "^7.3.2" 984 1068 serialize-error "^7.0.1" 985 1069 986 - global-tunnel-ng@^2.7.1: 987 - version "2.7.1" 988 - resolved "https://registry.yarnpkg.com/global-tunnel-ng/-/global-tunnel-ng-2.7.1.tgz#d03b5102dfde3a69914f5ee7d86761ca35d57d8f" 989 - integrity sha512-4s+DyciWBV0eK148wqXxcmVAbFVPqtc3sEtUE/GTQfuU80rySLcMhUmHKSHI7/LDj8q0gDYI1lIhRRB7ieRAqg== 990 - dependencies: 991 - encodeurl "^1.0.2" 992 - lodash "^4.17.10" 993 - npm-conf "^1.1.3" 994 - tunnel "^0.0.6" 995 - 996 1070 globalthis@^1.0.1: 997 1071 version "1.0.3" 998 1072 resolved "https://registry.yarnpkg.com/globalthis/-/globalthis-1.0.3.tgz#5852882a52b80dc301b0660273e1ed082f0b6ccf" ··· 1000 1074 dependencies: 1001 1075 define-properties "^1.1.3" 1002 1076 1003 - got@^9.6.0: 1004 - version "9.6.0" 1005 - resolved "https://registry.yarnpkg.com/got/-/got-9.6.0.tgz#edf45e7d67f99545705de1f7bbeeeb121765ed85" 1006 - integrity sha512-R7eWptXuGYxwijs0eV+v3o6+XH1IqVK8dJOEecQfTmkncw9AV4dcw/Dhxi8MdlqPthxxpZyizMzyg8RTmEsG+Q== 1077 + got@^11.8.5: 1078 + version "11.8.6" 1079 + resolved "https://registry.yarnpkg.com/got/-/got-11.8.6.tgz#276e827ead8772eddbcfc97170590b841823233a" 1080 + integrity sha512-6tfZ91bOr7bOXnK7PRDCGBLa1H4U080YHNaAQ2KsMGlLEzRbk44nsZF2E1IeRc3vtJHPVbKCYgdFbaGO2ljd8g== 1007 1081 dependencies: 1008 - "@sindresorhus/is" "^0.14.0" 1009 - "@szmarczak/http-timer" "^1.1.2" 1010 - cacheable-request "^6.0.0" 1011 - decompress-response "^3.3.0" 1012 - duplexer3 "^0.1.4" 1013 - get-stream "^4.1.0" 1014 - lowercase-keys "^1.0.1" 1015 - mimic-response "^1.0.1" 1016 - p-cancelable "^1.0.0" 1017 - to-readable-stream "^1.0.0" 1018 - url-parse-lax "^3.0.0" 1082 + "@sindresorhus/is" "^4.0.0" 1083 + "@szmarczak/http-timer" "^4.0.5" 1084 + "@types/cacheable-request" "^6.0.1" 1085 + "@types/responselike" "^1.0.0" 1086 + cacheable-lookup "^5.0.3" 1087 + cacheable-request "^7.0.2" 1088 + decompress-response "^6.0.0" 1089 + http2-wrapper "^1.0.0-beta.5.2" 1090 + lowercase-keys "^2.0.0" 1091 + p-cancelable "^2.0.0" 1092 + responselike "^2.0.0" 1019 1093 1020 1094 graceful-fs@^4.1.6, graceful-fs@^4.2.0: 1021 1095 version "4.2.10" ··· 1026 1100 version "1.0.1" 1027 1101 resolved "https://registry.yarnpkg.com/graceful-readlink/-/graceful-readlink-1.0.1.tgz#4cafad76bc62f02fa039b2f94e9a3dd3a391a725" 1028 1102 integrity sha512-8tLu60LgxF6XpdbK8OW3FA+IfTNBn1ZHGHKF4KQbEeSkajYw5PlYJcKluntgegDPTg8UkHjpet1T82vk6TQ68w== 1103 + 1104 + has-flag@^3.0.0: 1105 + version "3.0.0" 1106 + resolved "https://registry.yarnpkg.com/has-flag/-/has-flag-3.0.0.tgz#b5d454dc2199ae225699f3467e5a07f3b955bafd" 1107 + integrity sha512-sKJf1+ceQBr4SMkvQnBDNDtf4TXpVhVGateu0t918bl30FnbE2m4vNLX+VWe/dpjlb+HugGYzW7uQXH98HPEYw== 1029 1108 1030 1109 has-flag@^4.0.0: 1031 1110 version "4.0.0" ··· 1059 1138 lru-cache "^6.0.0" 1060 1139 1061 1140 http-cache-semantics@^4.0.0: 1062 - version "4.1.0" 1063 - resolved "https://registry.yarnpkg.com/http-cache-semantics/-/http-cache-semantics-4.1.0.tgz#49e91c5cbf36c9b94bcfcd71c23d5249ec74e390" 1064 - integrity sha512-carPklcUh7ROWRK7Cv27RPtdhYhUsela/ue5/jKzjegVvXDqM2ILE9Q2BGn9JZJh1g87cp56su/FgQSzcWS8cQ== 1141 + version "4.1.1" 1142 + resolved "https://registry.yarnpkg.com/http-cache-semantics/-/http-cache-semantics-4.1.1.tgz#abe02fcb2985460bf0323be664436ec3476a6d5a" 1143 + integrity sha512-er295DKPVsV82j5kw1Gjt+ADA/XYHsajl82cGNQG2eyoPkvgUhX+nDIyelzhIWbbsXP39EHcI6l5tYs2FYqYXQ== 1065 1144 1066 1145 http-proxy-agent@^5.0.0: 1067 1146 version "5.0.0" ··· 1071 1150 "@tootallnate/once" "2" 1072 1151 agent-base "6" 1073 1152 debug "4" 1153 + 1154 + http2-wrapper@^1.0.0-beta.5.2: 1155 + version "1.0.3" 1156 + resolved "https://registry.yarnpkg.com/http2-wrapper/-/http2-wrapper-1.0.3.tgz#b8f55e0c1f25d4ebd08b3b0c2c079f9590800b3d" 1157 + integrity sha512-V+23sDMr12Wnz7iTcDeJr3O6AIxlnvT/bmaAAAP/Xda35C90p9599p0F1eHR/N1KILWSoWVAiOMFjBBXaXSMxg== 1158 + dependencies: 1159 + quick-lru "^5.1.1" 1160 + resolve-alpn "^1.0.0" 1074 1161 1075 1162 https-proxy-agent@5.0.1, https-proxy-agent@^5.0.0: 1076 1163 version "5.0.1" ··· 1100 1187 resolved "https://registry.yarnpkg.com/ieee754/-/ieee754-1.2.1.tgz#8eb7a10a63fff25d15a57b001586d177d1b0d352" 1101 1188 integrity sha512-dcyqhDvX1C46lXZcVqCpK+FtMRQVdIMN6/Df5js2zouUsqG7I6sFxitIC+7KYK29KdXOLHdu9zL4sFnoVQnqaA== 1102 1189 1190 + import-fresh@^3.2.1: 1191 + version "3.3.0" 1192 + resolved "https://registry.yarnpkg.com/import-fresh/-/import-fresh-3.3.0.tgz#37162c25fcb9ebaa2e6e53d5b4d88ce17d9e0c2b" 1193 + integrity sha512-veYYhQa+D1QBKznvhUHxb8faxlrwUnxseDAbAp457E0wLNio2bOSKnjYDhMj+YiAq61xrMGhQk9iXVk5FzgQMw== 1194 + dependencies: 1195 + parent-module "^1.0.0" 1196 + resolve-from "^4.0.0" 1197 + 1103 1198 inflight@^1.0.4: 1104 1199 version "1.0.6" 1105 1200 resolved "https://registry.yarnpkg.com/inflight/-/inflight-1.0.6.tgz#49bd6331d7d02d0c09bc910a1075ba8165b56df9" ··· 1113 1208 resolved "https://registry.yarnpkg.com/inherits/-/inherits-2.0.4.tgz#0fa2c64f932917c3433a0ded55363aae37416b7c" 1114 1209 integrity sha512-k/vGaX4/Yla3WzyMCvTQOXYeIHvqOKtnqBduzTHpzpQZzAskKMhZ2K+EnBiSM9zGSoIFeMpXKxa4dYeZIQqewQ== 1115 1210 1116 - ini@^1.3.4, ini@~1.3.0: 1211 + ini@~1.3.0: 1117 1212 version "1.3.8" 1118 1213 resolved "https://registry.yarnpkg.com/ini/-/ini-1.3.8.tgz#a29da425b48806f34767a4efce397269af28432c" 1119 1214 integrity sha512-JV/yugV2uzW5iMRSiZAyDtQd+nxtUnjeLt0acNdw98kKLrvuRVyB80tsREOE7yvGVgalhZ6RNXCmEHkUKBKxew== 1215 + 1216 + is-arrayish@^0.2.1: 1217 + version "0.2.1" 1218 + resolved "https://registry.yarnpkg.com/is-arrayish/-/is-arrayish-0.2.1.tgz#77c99840527aa8ecb1a8ba697b80645a7a926a9d" 1219 + integrity sha512-zz06S8t0ozoDXMG+ube26zeCTNXcKIPJZJi8hBrF4idCLms4CG9QtK7qBl1boi5ODzFpjswb5JPmHCbMpjaYzg== 1120 1220 1121 1221 is-ci@^3.0.0: 1122 1222 version "3.0.1" ··· 1179 1279 filelist "^1.0.1" 1180 1280 minimatch "^3.0.4" 1181 1281 1282 + js-tokens@^4.0.0: 1283 + version "4.0.0" 1284 + resolved "https://registry.yarnpkg.com/js-tokens/-/js-tokens-4.0.0.tgz#19203fb59991df98e3a287050d4647cdeaf32499" 1285 + integrity sha512-RdJUflcE3cUzKiMqQgsCu06FPu9UdIJO0beYbPhHN4k6apgJtifcoCtT9bcxOpYBtpD2kCM6Sbzg4CausW/PKQ== 1286 + 1182 1287 js-yaml@^4.1.0: 1183 1288 version "4.1.0" 1184 1289 resolved "https://registry.yarnpkg.com/js-yaml/-/js-yaml-4.1.0.tgz#c1fb65f8f5017901cdd2c951864ba18458a10602" ··· 1186 1291 dependencies: 1187 1292 argparse "^2.0.1" 1188 1293 1189 - json-buffer@3.0.0: 1190 - version "3.0.0" 1191 - resolved "https://registry.yarnpkg.com/json-buffer/-/json-buffer-3.0.0.tgz#5b1f397afc75d677bde8bcfc0e47e1f9a3d9a898" 1192 - integrity sha512-CuUqjv0FUZIdXkHPI8MezCnFCdaTAacej1TZYulLoAg1h/PhwkdXFN4V/gzY4g+fMBCOV2xF+rp7t2XD2ns/NQ== 1294 + json-buffer@3.0.1: 1295 + version "3.0.1" 1296 + resolved "https://registry.yarnpkg.com/json-buffer/-/json-buffer-3.0.1.tgz#9338802a30d3b6605fbe0613e094008ca8c05a13" 1297 + integrity sha512-4bV5BfR2mqfQTJm+V5tPPdf+ZpuhiIvTuAB5g8kcrXOZpTT/QwwVRWBywX1ozr6lEuPdbHxwaJlm9G6mI2sfSQ== 1298 + 1299 + json-parse-even-better-errors@^2.3.0: 1300 + version "2.3.1" 1301 + resolved "https://registry.yarnpkg.com/json-parse-even-better-errors/-/json-parse-even-better-errors-2.3.1.tgz#7c47805a94319928e05777405dc12e1f7a4ee02d" 1302 + integrity sha512-xyFwyhro/JEof6Ghe2iz2NcXoj2sloNsWr/XsERDK/oiPCfaNhl5ONfp+jQdAZRQQ0IJWNzH9zIZF7li91kh2w== 1193 1303 1194 1304 json-schema-traverse@^0.4.1: 1195 1305 version "0.4.1" ··· 1202 1312 integrity sha512-ZClg6AaYvamvYEE82d3Iyd3vSSIjQ+odgjaTzRuO3s7toCdFKczob2i0zCh7JE8kWn17yvAWhUVxvqGwUalsRA== 1203 1313 1204 1314 json5@^2.2.0: 1205 - version "2.2.1" 1206 - resolved "https://registry.yarnpkg.com/json5/-/json5-2.2.1.tgz#655d50ed1e6f95ad1a3caababd2b0efda10b395c" 1207 - integrity sha512-1hqLFMSrGHRHxav9q9gNjJ5EXznIxGVO09xQRrwplcS8qs28pZ8s8hupZAmqDwZUmVZ2Qb2jnyPOWcDH8m8dlA== 1315 + version "2.2.3" 1316 + resolved "https://registry.yarnpkg.com/json5/-/json5-2.2.3.tgz#78cd6f1a19bdc12b73db5ad0c61efd66c1e29283" 1317 + integrity sha512-XmOWe7eyHYH14cLdVPoyg+GOH3rYX++KpzrylJwSW98t3Nk+U8XOl8FWKOgwtzdb8lXGf6zYwDUzeHMWfxasyg== 1208 1318 1209 1319 jsonfile@^4.0.0: 1210 1320 version "4.0.0" ··· 1230 1340 node-addon-api "^4.3.0" 1231 1341 prebuild-install "^7.0.1" 1232 1342 1233 - keyv@^3.0.0: 1234 - version "3.1.0" 1235 - resolved "https://registry.yarnpkg.com/keyv/-/keyv-3.1.0.tgz#ecc228486f69991e49e9476485a5be1e8fc5c4d9" 1236 - integrity sha512-9ykJ/46SN/9KPM/sichzQ7OvXyGDYKGTaDlKMGCAlg2UK8KRy4jb0d8sFc+0Tt0YYnThq8X2RZgCg74RPxgcVA== 1343 + keyv@^4.0.0: 1344 + version "4.5.2" 1345 + resolved "https://registry.yarnpkg.com/keyv/-/keyv-4.5.2.tgz#0e310ce73bf7851ec702f2eaf46ec4e3805cce56" 1346 + integrity sha512-5MHbFaKn8cNSmVW7BYnijeAVlE4cYA/SVkifVgrh7yotnfhKmjuXpDKjrABLnT0SfHWV21P8ow07OGfRrNDg8g== 1237 1347 dependencies: 1238 - json-buffer "3.0.0" 1348 + json-buffer "3.0.1" 1239 1349 1240 1350 lazy-val@^1.0.4, lazy-val@^1.0.5: 1241 1351 version "1.0.5" 1242 1352 resolved "https://registry.yarnpkg.com/lazy-val/-/lazy-val-1.0.5.tgz#6cf3b9f5bc31cee7ee3e369c0832b7583dcd923d" 1243 1353 integrity sha512-0/BnGCCfyUMkBpeDgWihanIAF9JmZhHBgUhEqzvf+adhNGLoP6TaiI5oF8oyb3I45P+PcnrqihSf01M0l0G5+Q== 1244 1354 1245 - lodash@^4.17.10, lodash@^4.17.15: 1355 + lines-and-columns@^1.1.6: 1356 + version "1.2.4" 1357 + resolved "https://registry.yarnpkg.com/lines-and-columns/-/lines-and-columns-1.2.4.tgz#eca284f75d2965079309dc0ad9255abb2ebc1632" 1358 + integrity sha512-7ylylesZQ/PV29jhEDl3Ufjo6ZX7gCqJr5F7PKrqc93v7fzSymt1BpwEU8nAUXs8qzzvqhbjhK5QZg6Mt/HkBg== 1359 + 1360 + lodash@^4.17.15: 1246 1361 version "4.17.21" 1247 1362 resolved "https://registry.yarnpkg.com/lodash/-/lodash-4.17.21.tgz#679591c564c3bffaae8454cf0b3df370c3d6911c" 1248 1363 integrity sha512-v2kDEe57lecTulaDIuNTPy3Ry4gLGJ6Z1O3vE1krgXZNrsQ+LFTGHVxVjcXPs17LhbZVGedAJv8XZ1tvj5FvSg== 1249 1364 1250 - lowercase-keys@^1.0.0, lowercase-keys@^1.0.1: 1251 - version "1.0.1" 1252 - resolved "https://registry.yarnpkg.com/lowercase-keys/-/lowercase-keys-1.0.1.tgz#6f9e30b47084d971a7c820ff15a6c5167b74c26f" 1253 - integrity sha512-G2Lj61tXDnVFFOi8VZds+SoQjtQC3dgokKdDG2mTm1tx4m50NUHBOZSBwQQHyy0V12A0JTG4icfZQH+xPyh8VA== 1254 - 1255 1365 lowercase-keys@^2.0.0: 1256 1366 version "2.0.0" 1257 1367 resolved "https://registry.yarnpkg.com/lowercase-keys/-/lowercase-keys-2.0.0.tgz#2603e78b7b4b0006cbca2fbcc8a3202558ac9479" ··· 1288 1398 resolved "https://registry.yarnpkg.com/mime/-/mime-2.6.0.tgz#a2a682a95cd4d0cb1d6257e28f83da7e35800367" 1289 1399 integrity sha512-USPkMeET31rOMiarsBNIHZKLGgvKc/LrjofAnBlOttf5ajRvqiRA8QsenbcooctK6d6Ts6aqZXBA+XbkKthiQg== 1290 1400 1291 - mimic-response@^1.0.0, mimic-response@^1.0.1: 1401 + mimic-response@^1.0.0: 1292 1402 version "1.0.1" 1293 1403 resolved "https://registry.yarnpkg.com/mimic-response/-/mimic-response-1.0.1.tgz#4923538878eef42063cb8a3e3b0798781487ab1b" 1294 1404 integrity sha512-j5EctnkH7amfV/q5Hgmoal1g2QHFJRraOtmx0JpIqkxhBhI/lJSl1nMpQ45hVarwNETOoWEimndZ4QK0RHxuxQ== ··· 1313 1423 brace-expansion "^1.1.7" 1314 1424 1315 1425 minimatch@^5.0.1: 1316 - version "5.1.0" 1317 - resolved "https://registry.yarnpkg.com/minimatch/-/minimatch-5.1.0.tgz#1717b464f4971b144f6aabe8f2d0b8e4511e09c7" 1318 - integrity sha512-9TPBGGak4nHfGZsPBohm9AWg6NoT7QTCehS3BIJABslyZbzxfV78QM2Y6+i741OPZIafFAaiiEMh5OyIrJPgtg== 1426 + version "5.1.6" 1427 + resolved "https://registry.yarnpkg.com/minimatch/-/minimatch-5.1.6.tgz#1cfcb8cf5522ea69952cd2af95ae09477f122a96" 1428 + integrity sha512-lKwV/1brpG6mBUFHtb7NUmtABCb2WZZmm2wNiOA5hAb8VdCS4B3dtMWyvcoViccwAW/COERjXLt0zP1zXUN26g== 1319 1429 dependencies: 1320 1430 brace-expansion "^2.0.1" 1321 1431 ··· 1325 1435 integrity sha512-bzfL1YUZsP41gmu/qjrEk0Q6i2ix/cVeAhbCbqH9u3zYutS1cLg00qhrD0M2MVdCcx4Sc0UpP2eBWo9rotpq6g== 1326 1436 1327 1437 minipass@^3.0.0: 1328 - version "3.3.4" 1329 - resolved "https://registry.yarnpkg.com/minipass/-/minipass-3.3.4.tgz#ca99f95dd77c43c7a76bf51e6d200025eee0ffae" 1330 - integrity sha512-I9WPbWHCGu8W+6k1ZiGpPu0GkoKBeorkfKNuAFBNS1HNFJvke82sxvI5bzcCNpWPorkOO5QQ+zomzzwRxejXiw== 1438 + version "3.3.6" 1439 + resolved "https://registry.yarnpkg.com/minipass/-/minipass-3.3.6.tgz#7bba384db3a1520d18c9c0e5251c3444e95dd94a" 1440 + integrity sha512-DxiNidxSEK+tHG6zOIklvNOwm3hvCrbUrdtzY74U6HKTJxvIDfOUL5W5P2Ghd3DTkhhKPYGqeNUIh5qcM4YBfw== 1331 1441 dependencies: 1332 1442 yallist "^4.0.0" 1333 1443 1444 + minipass@^4.0.0: 1445 + version "4.0.2" 1446 + resolved "https://registry.yarnpkg.com/minipass/-/minipass-4.0.2.tgz#26fc3364d5ea6cb971c6e5259eac67a0887510d1" 1447 + integrity sha512-4Hbzei7ZyBp+1aw0874YWpKOubZd/jc53/XU+gkYry1QV+VvrbO8icLM5CUtm4F0hyXn85DXYKEMIS26gitD3A== 1448 + 1334 1449 minizlib@^2.1.1: 1335 1450 version "2.1.2" 1336 1451 resolved "https://registry.yarnpkg.com/minizlib/-/minizlib-2.1.2.tgz#e90d3466ba209b932451508a11ce3d3632145931" ··· 1370 1485 integrity sha512-1nh45deeb5olNY7eX82BkPO7SSxR5SSYJiPTrTdFUVYwAl8CKMA5N9PjTYkHiRjisVcxcQ1HXdLhx2qxxJzLNQ== 1371 1486 1372 1487 node-abi@^3.3.0: 1373 - version "3.28.0" 1374 - resolved "https://registry.yarnpkg.com/node-abi/-/node-abi-3.28.0.tgz#b0df8b317e1c4f2f323756c5fc8ffccc5bca4718" 1375 - integrity sha512-fRlDb4I0eLcQeUvGq7IY3xHrSb0c9ummdvDSYWfT9+LKP+3jCKw/tKoqaM7r1BAoiAC6GtwyjaGnOz6B3OtF+A== 1488 + version "3.31.0" 1489 + resolved "https://registry.yarnpkg.com/node-abi/-/node-abi-3.31.0.tgz#dfb2ea3d01188eb80859f69bb4a4354090c1b355" 1490 + integrity sha512-eSKV6s+APenqVh8ubJyiu/YhZgxQpGP66ntzUb3lY1xB9ukSRaGnx0AIxI+IM+1+IVYC1oWobgG5L3Lt9ARykQ== 1376 1491 dependencies: 1377 1492 semver "^7.3.5" 1378 1493 ··· 1393 1508 dependencies: 1394 1509 whatwg-url "^5.0.0" 1395 1510 1396 - normalize-url@^4.1.0: 1397 - version "4.5.1" 1398 - resolved "https://registry.yarnpkg.com/normalize-url/-/normalize-url-4.5.1.tgz#0dd90cf1288ee1d1313b87081c9a5932ee48518a" 1399 - integrity sha512-9UZCFRHQdNrfTpGg8+1INIg93B6zE0aXMVFkw1WFwvO4SlZywU6aLg5Of0Ap/PgcbSw4LNxvMWXMeugwMCX0AA== 1400 - 1401 - npm-conf@^1.1.3: 1402 - version "1.1.3" 1403 - resolved "https://registry.yarnpkg.com/npm-conf/-/npm-conf-1.1.3.tgz#256cc47bd0e218c259c4e9550bf413bc2192aff9" 1404 - integrity sha512-Yic4bZHJOt9RCFbRP3GgpqhScOY4HH3V2P8yBj6CeYq118Qr+BLXqT2JvpJ00mryLESpgOxf5XlFv4ZjXxLScw== 1405 - dependencies: 1406 - config-chain "^1.1.11" 1407 - pify "^3.0.0" 1511 + normalize-url@^6.0.1: 1512 + version "6.1.0" 1513 + resolved "https://registry.yarnpkg.com/normalize-url/-/normalize-url-6.1.0.tgz#40d0885b535deffe3f3147bec877d05fe4c5668a" 1514 + integrity sha512-DlL+XwOy3NxAQ8xuC0okPgK46iuVNAK01YN7RueYBqqFeGsBjV9XmCAzAdgt+667bCl5kPh9EqKKDwnaPG1I7A== 1408 1515 1409 1516 npm-run-path@^2.0.0: 1410 1517 version "2.0.2" ··· 1425 1532 dependencies: 1426 1533 wrappy "1" 1427 1534 1428 - p-cancelable@^1.0.0: 1429 - version "1.1.0" 1430 - resolved "https://registry.yarnpkg.com/p-cancelable/-/p-cancelable-1.1.0.tgz#d078d15a3af409220c886f1d9a0ca2e441ab26cc" 1431 - integrity sha512-s73XxOZ4zpt1edZYZzvhqFa6uvQc1vwUa0K0BdtIZgQMAJj9IbebH+JkgKZc9h+B05PKHLOTl4ajG1BmNrVZlw== 1535 + p-cancelable@^2.0.0: 1536 + version "2.1.1" 1537 + resolved "https://registry.yarnpkg.com/p-cancelable/-/p-cancelable-2.1.1.tgz#aab7fbd416582fa32a3db49859c122487c5ed2cf" 1538 + integrity sha512-BZOr3nRQHOntUjTrH8+Lh54smKHoHyur8We1V8DSMVrl5A2malOOwuJRnKRDjSnkoeBh4at6BwEnb5I7Jl31wg== 1432 1539 1433 1540 p-finally@^1.0.0: 1434 1541 version "1.0.0" 1435 1542 resolved "https://registry.yarnpkg.com/p-finally/-/p-finally-1.0.0.tgz#3fbcfb15b899a44123b34b6dcc18b724336a2cae" 1436 1543 integrity sha512-LICb2p9CB7FS+0eR1oqWnHhp0FljGLZCWBE9aix0Uye9W8LTQPwMTYVGWQWIw9RdQiDg4+epXQODwIYJtSJaow== 1437 1544 1545 + parent-module@^1.0.0: 1546 + version "1.0.1" 1547 + resolved "https://registry.yarnpkg.com/parent-module/-/parent-module-1.0.1.tgz#691d2709e78c79fae3a156622452d00762caaaa2" 1548 + integrity sha512-GQ2EWRpQV8/o+Aw8YqtfZZPfNRWZYkbidE9k5rpl/hC3vtHHBfGm2Ifi6qWV+coDGkrUKZAxE3Lot5kcsRlh+g== 1549 + dependencies: 1550 + callsites "^3.0.0" 1551 + 1552 + parse-json@^5.0.0: 1553 + version "5.2.0" 1554 + resolved "https://registry.yarnpkg.com/parse-json/-/parse-json-5.2.0.tgz#c76fc66dee54231c962b22bcc8a72cf2f99753cd" 1555 + integrity sha512-ayCKvm/phCGxOkYRSCM82iDwct8/EonSEgCSxWxD7ve6jHggsFl4fZVQBPRNgQoKiuV/odhFrGzQXZwbifC8Rg== 1556 + dependencies: 1557 + "@babel/code-frame" "^7.0.0" 1558 + error-ex "^1.3.1" 1559 + json-parse-even-better-errors "^2.3.0" 1560 + lines-and-columns "^1.1.6" 1561 + 1438 1562 path-is-absolute@^1.0.0: 1439 1563 version "1.0.1" 1440 1564 resolved "https://registry.yarnpkg.com/path-is-absolute/-/path-is-absolute-1.0.1.tgz#174b9268735534ffbc7ace6bf53a5a9e1b5c5f5f" ··· 1449 1573 version "3.1.1" 1450 1574 resolved "https://registry.yarnpkg.com/path-key/-/path-key-3.1.1.tgz#581f6ade658cbba65a0d3380de7753295054f375" 1451 1575 integrity sha512-ojmeN0qd+y0jszEtoY48r0Peq5dwMEkIlCOu6Q5f41lfkswXuKtYrhgoTpLnyIcHm24Uhqx+5Tqm2InSwLhE6Q== 1576 + 1577 + path-type@^4.0.0: 1578 + version "4.0.0" 1579 + resolved "https://registry.yarnpkg.com/path-type/-/path-type-4.0.0.tgz#84ed01c0a7ba380afe09d90a8c180dcd9d03043b" 1580 + integrity sha512-gDKb8aZMDeD/tZWs9P6+q0J9Mwkdl6xMV8TjnGP3qJVJ06bdMgkbBlLU8IdfOsIsFz2BW1rNVT3XuNEl8zPAvw== 1452 1581 1453 1582 pend@~1.2.0: 1454 1583 version "1.2.0" 1455 1584 resolved "https://registry.yarnpkg.com/pend/-/pend-1.2.0.tgz#7a57eb550a6783f9115331fcf4663d5c8e007a50" 1456 1585 integrity sha512-F3asv42UuXchdzt+xXqfW1OGlVBe+mxa2mqI0pg5yAHZPvFmY3Y6drSf/GQ1A86WgWEN9Kzh/WrgKa6iGcHXLg== 1457 1586 1458 - pify@^3.0.0: 1459 - version "3.0.0" 1460 - resolved "https://registry.yarnpkg.com/pify/-/pify-3.0.0.tgz#e5a4acd2c101fdf3d9a4d07f0dbc4db49dd28176" 1461 - integrity sha512-C3FsVNH1udSEX48gGX1xfvwTWfsYWj5U+8/uK15BGzIGrKoUpghX8hWZwa/OFnakBiiVNmBvemTJR5mcy7iPcg== 1462 - 1463 1587 plist@^3.0.1, plist@^3.0.4: 1464 1588 version "3.0.6" 1465 1589 resolved "https://registry.yarnpkg.com/plist/-/plist-3.0.6.tgz#7cfb68a856a7834bca6dbfe3218eb9c7740145d3" ··· 1486 1610 tar-fs "^2.0.0" 1487 1611 tunnel-agent "^0.6.0" 1488 1612 1489 - prepend-http@^2.0.0: 1490 - version "2.0.0" 1491 - resolved "https://registry.yarnpkg.com/prepend-http/-/prepend-http-2.0.0.tgz#e92434bfa5ea8c19f41cdfd401d741a3c819d897" 1492 - integrity sha512-ravE6m9Atw9Z/jjttRUZ+clIXogdghyZAuWJ3qEzjT+jI/dL1ifAqhZeC5VHzQp1MSt1+jxKkFNemj/iO7tVUA== 1493 - 1494 1613 progress@2.0.3, progress@^2.0.3: 1495 1614 version "2.0.3" 1496 1615 resolved "https://registry.yarnpkg.com/progress/-/progress-2.0.3.tgz#7e8cf8d8f5b8f239c1bc68beb4eb78567d572ef8" 1497 1616 integrity sha512-7PiHtLll5LdnKIMw100I+8xJXR5gW2QwWYkT6iJva0bXitZKa/XMrSbdmg3r2Xnaidz9Qumd0VPaMrZlF9V9sA== 1498 - 1499 - proto-list@~1.2.1: 1500 - version "1.2.4" 1501 - resolved "https://registry.yarnpkg.com/proto-list/-/proto-list-1.2.4.tgz#212d5bfe1318306a420f6402b8e26ff39647a849" 1502 - integrity sha512-vtK/94akxsTMhe0/cbfpR+syPuszcuwhqVjJq26CuNDgFGj682oRBXOP5MJpv2r7JtE8MsiepGIqvvOTBwn2vA== 1503 1617 1504 1618 proxy-from-env@1.1.0, proxy-from-env@^1.1.0: 1505 1619 version "1.1.0" ··· 1515 1629 once "^1.3.1" 1516 1630 1517 1631 punycode@^2.1.0: 1518 - version "2.1.1" 1519 - resolved "https://registry.yarnpkg.com/punycode/-/punycode-2.1.1.tgz#b58b010ac40c22c5657616c8d2c2c02c7bf479ec" 1520 - integrity sha512-XRsRjdf+j5ml+y/6GKHPZbrF/8p2Yga0JPtdqTIY2Xe5ohJPD9saDJJLPvp9+NSBprVvevdXZybnj2cv8OEd0A== 1632 + version "2.3.0" 1633 + resolved "https://registry.yarnpkg.com/punycode/-/punycode-2.3.0.tgz#f67fa67c94da8f4d0cfff981aee4118064199b8f" 1634 + integrity sha512-rRV+zQD8tVFys26lAGR9WUuS4iUAngJScM+ZRSKtvl5tKeZ2t5bvdNFdNHBW9FWR4guGHlgmsZ1G7BSm2wTbuA== 1521 1635 1522 - puppeteer-core@19.0.0: 1523 - version "19.0.0" 1524 - resolved "https://registry.yarnpkg.com/puppeteer-core/-/puppeteer-core-19.0.0.tgz#8d0198550e04c7d5e0847200ba257b2a777dbd3b" 1525 - integrity sha512-OljQ9W5M4cBX68vnOAGbcRkVENDHn6lfj6QYoGsnLQsxPAh6ExTQAhHauwdFdQkhYdDExZFWlKArnBONzeHY+g== 1636 + puppeteer-core@19.4.0: 1637 + version "19.4.0" 1638 + resolved "https://registry.yarnpkg.com/puppeteer-core/-/puppeteer-core-19.4.0.tgz#3f52945d8cfa20cf8721a7902afcd8a1a299b54d" 1639 + integrity sha512-gG/jxseleZStinBn86x8r7trjcE4jcjx1hIQWOpACQhquHYMuKnrWxkzg+EDn8sN3wUtF/Ry9mtJgjM49oUOFQ== 1526 1640 dependencies: 1527 1641 cross-fetch "3.1.5" 1528 1642 debug "4.3.4" 1529 - devtools-protocol "0.0.1045489" 1643 + devtools-protocol "0.0.1068969" 1530 1644 extract-zip "2.0.1" 1531 1645 https-proxy-agent "5.0.1" 1532 1646 proxy-from-env "1.1.0" 1533 1647 rimraf "3.0.2" 1534 1648 tar-fs "2.1.1" 1535 1649 unbzip2-stream "1.4.3" 1536 - ws "8.9.0" 1650 + ws "8.10.0" 1537 1651 1538 - puppeteer@19.0.0: 1539 - version "19.0.0" 1540 - resolved "https://registry.yarnpkg.com/puppeteer/-/puppeteer-19.0.0.tgz#848986e6ecec37b19cd5a7327ad2fcf1f1cb83fd" 1541 - integrity sha512-3Ga5IVerQQ2hKU9q7T28RmcUsd8F2kL6cYuPcPCzeclSjmHhGydPBZL/KJKC02sG6J6Wfry85uiWpbkjQ5qBiw== 1652 + puppeteer@19.4.0: 1653 + version "19.4.0" 1654 + resolved "https://registry.yarnpkg.com/puppeteer/-/puppeteer-19.4.0.tgz#3adfcb415e96d7b5900a66a1097947272313ee9f" 1655 + integrity sha512-sRzWEfFSZCCcFUJflGtYI2V7A6qK4Jht+2JiI2LZgn+Nv/LOZZsBDEaGl98ZrS8oEcUA5on4p2yJbE0nzHNzIg== 1542 1656 dependencies: 1657 + cosmiconfig "8.0.0" 1658 + devtools-protocol "0.0.1068969" 1543 1659 https-proxy-agent "5.0.1" 1544 1660 progress "2.0.3" 1545 1661 proxy-from-env "1.1.0" 1546 - puppeteer-core "19.0.0" 1662 + puppeteer-core "19.4.0" 1663 + 1664 + quick-lru@^5.1.1: 1665 + version "5.1.1" 1666 + resolved "https://registry.yarnpkg.com/quick-lru/-/quick-lru-5.1.1.tgz#366493e6b3e42a3a6885e2e99d18f80fb7a8c932" 1667 + integrity sha512-WuyALRjWPDGtt/wzJiadO5AXY+8hZ80hVpe6MyivgraREW751X3SbhRvG3eLKOYN+8VEvqLcf3wdnt44Z4S4SA== 1547 1668 1548 1669 rc@^1.2.7: 1549 1670 version "1.2.8" ··· 1580 1701 resolved "https://registry.yarnpkg.com/require-directory/-/require-directory-2.1.1.tgz#8c64ad5fd30dab1c976e2344ffe7f792a6a6df42" 1581 1702 integrity sha512-fGxEI7+wsG9xrvdjsrlmL22OMTTiHRwAMroiEeMgq8gzoLC/PQr7RsRDSTLUg/bZAZtF+TVIkHc6/4RIKrui+Q== 1582 1703 1583 - responselike@^1.0.2: 1584 - version "1.0.2" 1585 - resolved "https://registry.yarnpkg.com/responselike/-/responselike-1.0.2.tgz#918720ef3b631c5642be068f15ade5a46f4ba1e7" 1586 - integrity sha512-/Fpe5guzJk1gPqdJLJR5u7eG/gNY4nImjbRDaVWVMRhne55TCmj2i9Q+54PBRfatRC8v/rIiv9BN0pMd9OV5EQ== 1704 + resolve-alpn@^1.0.0: 1705 + version "1.2.1" 1706 + resolved "https://registry.yarnpkg.com/resolve-alpn/-/resolve-alpn-1.2.1.tgz#b7adbdac3546aaaec20b45e7d8265927072726f9" 1707 + integrity sha512-0a1F4l73/ZFZOakJnQ3FvkJ2+gSTQWz/r2KE5OdDY0TxPm5h4GkqkWWfM47T7HsbnOtcJVEF4epCVy6u7Q3K+g== 1708 + 1709 + resolve-from@^4.0.0: 1710 + version "4.0.0" 1711 + resolved "https://registry.yarnpkg.com/resolve-from/-/resolve-from-4.0.0.tgz#4abcd852ad32dd7baabfe9b40e00a36db5f392e6" 1712 + integrity sha512-pb/MYmXstAkysRFx8piNI1tGFNQIFA3vkE3Gq4EuA1dF6gHp/+vgZqsCGJapvy8N3Q+4o7FwvquPJcnZ7RYy4g== 1713 + 1714 + responselike@^2.0.0: 1715 + version "2.0.1" 1716 + resolved "https://registry.yarnpkg.com/responselike/-/responselike-2.0.1.tgz#9a0bc8fdc252f3fb1cca68b016591059ba1422bc" 1717 + integrity sha512-4gl03wn3hj1HP3yzgdI7d3lCkF95F21Pz4BPGvKHinyQzALR5CapwC8yIi0Rh58DEMQ/SguC03wFj2k0M/mHhw== 1587 1718 dependencies: 1588 - lowercase-keys "^1.0.0" 1719 + lowercase-keys "^2.0.0" 1589 1720 1590 1721 rimraf@3.0.2, rimraf@^3.0.0: 1591 1722 version "3.0.2" ··· 1706 1837 simple-concat "^1.0.0" 1707 1838 1708 1839 simple-update-notifier@^1.0.7: 1709 - version "1.0.7" 1710 - resolved "https://registry.yarnpkg.com/simple-update-notifier/-/simple-update-notifier-1.0.7.tgz#7edf75c5bdd04f88828d632f762b2bc32996a9cc" 1711 - integrity sha512-BBKgR84BJQJm6WjWFMHgLVuo61FBDSj1z/xSFUIozqO6wO7ii0JxCqlIud7Enr/+LhlbNI0whErq96P2qHNWew== 1840 + version "1.1.0" 1841 + resolved "https://registry.yarnpkg.com/simple-update-notifier/-/simple-update-notifier-1.1.0.tgz#67694c121de354af592b347cdba798463ed49c82" 1842 + integrity sha512-VpsrsJSUcJEseSbMHkrsrAVSdvVS5I96Qo1QAQ4FxQ9wXFcB+pjj7FB7/us9+GcgfW4ziHtYMc1J0PLczb55mg== 1712 1843 dependencies: 1713 1844 semver "~7.0.0" 1714 1845 ··· 1789 1920 dependencies: 1790 1921 debug "^4.1.0" 1791 1922 1923 + supports-color@^5.3.0: 1924 + version "5.5.0" 1925 + resolved "https://registry.yarnpkg.com/supports-color/-/supports-color-5.5.0.tgz#e2e69a44ac8772f78a1ec0b35b689df6530efc8f" 1926 + integrity sha512-QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow== 1927 + dependencies: 1928 + has-flag "^3.0.0" 1929 + 1792 1930 supports-color@^7.1.0: 1793 1931 version "7.2.0" 1794 1932 resolved "https://registry.yarnpkg.com/supports-color/-/supports-color-7.2.0.tgz#1b7dcdcb32b8138801b3e478ba6a51caa89648da" ··· 1818 1956 readable-stream "^3.1.1" 1819 1957 1820 1958 tar@^6.1.11: 1821 - version "6.1.11" 1822 - resolved "https://registry.yarnpkg.com/tar/-/tar-6.1.11.tgz#6760a38f003afa1b2ffd0ffe9e9abbd0eab3d621" 1823 - integrity sha512-an/KZQzQUkZCkuoAA64hM92X0Urb6VpRhAFllDzz44U2mcD5scmT3zBc4VgVpkugF580+DQn8eAFSyoQt0tznA== 1959 + version "6.1.13" 1960 + resolved "https://registry.yarnpkg.com/tar/-/tar-6.1.13.tgz#46e22529000f612180601a6fe0680e7da508847b" 1961 + integrity sha512-jdIBIN6LTIe2jqzay/2vtYLlBHa3JF42ot3h1dW8Q0PaAG4v8rm0cvpVePtau5C6OKXGGcgO9q2AMNSWxiLqKw== 1824 1962 dependencies: 1825 1963 chownr "^2.0.0" 1826 1964 fs-minipass "^2.0.0" 1827 - minipass "^3.0.0" 1965 + minipass "^4.0.0" 1828 1966 minizlib "^2.1.1" 1829 1967 mkdirp "^1.0.3" 1830 1968 yallist "^4.0.0" ··· 1856 1994 dependencies: 1857 1995 rimraf "^3.0.0" 1858 1996 1859 - to-readable-stream@^1.0.0: 1860 - version "1.0.0" 1861 - resolved "https://registry.yarnpkg.com/to-readable-stream/-/to-readable-stream-1.0.0.tgz#ce0aa0c2f3df6adf852efb404a783e77c0475771" 1862 - integrity sha512-Iq25XBt6zD5npPhlLVXGFN3/gyR2/qODcKNNyTMd4vbm39HUaOiAM4PMq0eMVC/Tkxz+Zjdsc55g9yyz+Yq00Q== 1863 - 1864 1997 tr46@~0.0.3: 1865 1998 version "0.0.3" 1866 1999 resolved "https://registry.yarnpkg.com/tr46/-/tr46-0.0.3.tgz#8184fd347dac9cdc185992f3a6622e14b9d9ab6a" ··· 1880 2013 dependencies: 1881 2014 safe-buffer "^5.0.1" 1882 2015 1883 - tunnel@^0.0.6: 1884 - version "0.0.6" 1885 - resolved "https://registry.yarnpkg.com/tunnel/-/tunnel-0.0.6.tgz#72f1314b34a5b192db012324df2cc587ca47f92c" 1886 - integrity sha512-1h/Lnq9yajKY2PEbBadPXj3VxsDDu844OnaAo52UVmIzIvwwtBPIuNvkjuzBlTWpfJyUbG3ez0KSBibQkj4ojg== 1887 - 1888 2016 type-fest@^0.13.1: 1889 2017 version "0.13.1" 1890 2018 resolved "https://registry.yarnpkg.com/type-fest/-/type-fest-0.13.1.tgz#0172cb5bce80b0bd542ea348db50c7e21834d934" ··· 1914 2042 integrity sha512-7rKUyy33Q1yc98pQ1DAmLtwX109F7TIfWlW1Ydo8Wl1ii1SeHieeh0HHfPeL2fMXK6z0s8ecKs9frCuLJvndBg== 1915 2043 dependencies: 1916 2044 punycode "^2.1.0" 1917 - 1918 - url-parse-lax@^3.0.0: 1919 - version "3.0.0" 1920 - resolved "https://registry.yarnpkg.com/url-parse-lax/-/url-parse-lax-3.0.0.tgz#16b5cafc07dbe3676c1b1999177823d6503acb0c" 1921 - integrity sha512-NjFKA0DidqPa5ciFcSrXnAltTtzz84ogy+NebPvfEgAck0+TNg4UJ4IN+fB7zRZfbgUf0syOo9MDxFkDSMuFaQ== 1922 - dependencies: 1923 - prepend-http "^2.0.0" 1924 2045 1925 2046 utf8-byte-length@^1.0.1: 1926 2047 version "1.0.4" ··· 1982 2103 resolved "https://registry.yarnpkg.com/wrappy/-/wrappy-1.0.2.tgz#b5243d8f3ec1aa35f1364605bc0d1036e30ab69f" 1983 2104 integrity sha512-l4Sp/DRseor9wL6EvV2+TuQn63dMkPjZ/sp9XkghTEbV9KlPS1xUsZ3u7/IQO4wxtcFB4bgpQPRcR3QCvezPcQ== 1984 2105 1985 - ws@8.9.0: 1986 - version "8.9.0" 1987 - resolved "https://registry.yarnpkg.com/ws/-/ws-8.9.0.tgz#2a994bb67144be1b53fe2d23c53c028adeb7f45e" 1988 - integrity sha512-Ja7nszREasGaYUYCI2k4lCKIRTt+y7XuqVoHR44YpI49TtryyqbqvDMn5eqfW7e6HzTukDRIsXqzVHScqRcafg== 2106 + ws@8.10.0: 2107 + version "8.10.0" 2108 + resolved "https://registry.yarnpkg.com/ws/-/ws-8.10.0.tgz#00a28c09dfb76eae4eb45c3b565f771d6951aa51" 2109 + integrity sha512-+s49uSmZpvtAsd2h37vIPy1RBusaLawVe8of+GyEPsaJTCMpj/2v8NpeK1SHXjBlQ95lQTmQofOJnFiLoaN3yw== 1989 2110 1990 2111 xmlbuilder@>=11.0.1, xmlbuilder@^15.1.1: 1991 2112 version "15.1.1" ··· 2002 2123 resolved "https://registry.yarnpkg.com/yallist/-/yallist-4.0.0.tgz#9bb92790d9c0effec63be73519e11a35019a3a72" 2003 2124 integrity sha512-3wdGidZyq5PB084XLES5TpOSRA3wjXAlIWMhum2kRcv/41Sn2emQ0dycQW4uZXLejwKvg6EsvbdlVL+FYEct7A== 2004 2125 2005 - yargs-parser@^21.0.0: 2126 + yargs-parser@^21.1.1: 2006 2127 version "21.1.1" 2007 2128 resolved "https://registry.yarnpkg.com/yargs-parser/-/yargs-parser-21.1.1.tgz#9096bceebf990d21bb31fa9516e0ede294a77d35" 2008 2129 integrity sha512-tVpsJW7DdjecAiFpbIB1e3qxIQsE6NoPc5/eTdrbbIC4h0LVsWhnoa3g+m2HclBIujHzsxZ4VJVA+GUuc2/LBw== 2009 2130 2010 2131 yargs@^17.5.1: 2011 - version "17.6.0" 2012 - resolved "https://registry.yarnpkg.com/yargs/-/yargs-17.6.0.tgz#e134900fc1f218bc230192bdec06a0a5f973e46c" 2013 - integrity sha512-8H/wTDqlSwoSnScvV2N/JHfLWOKuh5MVla9hqLjK3nsfyy6Y4kDSYSvkU5YCUEPOSnRXfIyx3Sq+B/IWudTo4g== 2132 + version "17.6.2" 2133 + resolved "https://registry.yarnpkg.com/yargs/-/yargs-17.6.2.tgz#2e23f2944e976339a1ee00f18c77fedee8332541" 2134 + integrity sha512-1/9UrdHjDZc0eOU0HxOHoS78C69UD3JRMvzlJ7S79S2nTaWRA/whGCTV8o9e/N/1Va9YIV7Q4sOxD8VV4pCWOw== 2014 2135 dependencies: 2015 2136 cliui "^8.0.1" 2016 2137 escalade "^3.1.1" ··· 2018 2139 require-directory "^2.1.1" 2019 2140 string-width "^4.2.3" 2020 2141 y18n "^5.0.5" 2021 - yargs-parser "^21.0.0" 2142 + yargs-parser "^21.1.1" 2022 2143 2023 2144 yauzl@^2.10.0: 2024 2145 version "2.10.0"
+380 -236
pkgs/tools/misc/sharedown/yarndeps.nix
··· 10 10 }; 11 11 } 12 12 { 13 + name = "_babel_code_frame___code_frame_7.18.6.tgz"; 14 + path = fetchurl { 15 + name = "_babel_code_frame___code_frame_7.18.6.tgz"; 16 + url = "https://registry.yarnpkg.com/@babel/code-frame/-/code-frame-7.18.6.tgz"; 17 + sha512 = "TDCmlK5eOvH+eH7cdAFlNXeVJqWIQ7gW9tY1GJIpUtFb6CmjVyq2VM3u71bOyR8CRihcCgMUYoDNyLXao3+70Q=="; 18 + }; 19 + } 20 + { 21 + name = "_babel_helper_validator_identifier___helper_validator_identifier_7.19.1.tgz"; 22 + path = fetchurl { 23 + name = "_babel_helper_validator_identifier___helper_validator_identifier_7.19.1.tgz"; 24 + url = "https://registry.yarnpkg.com/@babel/helper-validator-identifier/-/helper-validator-identifier-7.19.1.tgz"; 25 + sha512 = "awrNfaMtnHUr653GgGEs++LlAvW6w+DcPrOliSMXWCKo597CwL5Acf/wWdNkf/tfEQE3mjkeD1YOVZOUV/od1w=="; 26 + }; 27 + } 28 + { 29 + name = "_babel_highlight___highlight_7.18.6.tgz"; 30 + path = fetchurl { 31 + name = "_babel_highlight___highlight_7.18.6.tgz"; 32 + url = "https://registry.yarnpkg.com/@babel/highlight/-/highlight-7.18.6.tgz"; 33 + sha512 = "u7stbOuYjaPezCuLj29hNW1v64M2Md2qupEKP1fHc7WdOA3DgLh37suiSrZYY7haUB7iBeQZ9P1uiRF359do3g=="; 34 + }; 35 + } 36 + { 13 37 name = "_develar_schema_utils___schema_utils_2.6.5.tgz"; 14 38 path = fetchurl { 15 39 name = "_develar_schema_utils___schema_utils_2.6.5.tgz"; ··· 18 42 }; 19 43 } 20 44 { 21 - name = "_electron_get___get_1.14.1.tgz"; 45 + name = "_electron_get___get_2.0.2.tgz"; 22 46 path = fetchurl { 23 - name = "_electron_get___get_1.14.1.tgz"; 24 - url = "https://registry.yarnpkg.com/@electron/get/-/get-1.14.1.tgz"; 25 - sha512 = "BrZYyL/6m0ZXz/lDxy/nlVhQz+WF+iPS6qXolEU8atw7h6v1aYkjwJZ63m+bJMBTxDE66X+r2tPS4a/8C82sZw=="; 47 + name = "_electron_get___get_2.0.2.tgz"; 48 + url = "https://registry.yarnpkg.com/@electron/get/-/get-2.0.2.tgz"; 49 + sha512 = "eFZVFoRXb3GFGd7Ak7W4+6jBl9wBtiZ4AaYOse97ej6mKj5tkyO0dUnUChs1IhJZtx1BENo4/p4WUTXpi6vT+g=="; 26 50 }; 27 51 } 28 52 { ··· 34 58 }; 35 59 } 36 60 { 37 - name = "_fortawesome_fontawesome_free___fontawesome_free_6.2.0.tgz"; 61 + name = "_fortawesome_fontawesome_free___fontawesome_free_6.2.1.tgz"; 38 62 path = fetchurl { 39 - name = "_fortawesome_fontawesome_free___fontawesome_free_6.2.0.tgz"; 40 - url = "https://registry.yarnpkg.com/@fortawesome/fontawesome-free/-/fontawesome-free-6.2.0.tgz"; 41 - sha512 = "CNR7qRIfCwWHNN7FnKUniva94edPdyQzil/zCwk3v6k4R6rR2Fr8i4s3PM7n/lyfPA6Zfko9z5WDzFxG9SW1uQ=="; 63 + name = "_fortawesome_fontawesome_free___fontawesome_free_6.2.1.tgz"; 64 + url = "https://registry.yarnpkg.com/@fortawesome/fontawesome-free/-/fontawesome-free-6.2.1.tgz"; 65 + sha512 = "viouXhegu/TjkvYQoiRZK3aax69dGXxgEjpvZW81wIJdxm5Fnvp3VVIP4VHKqX4SvFw6qpmkILkD4RJWAdrt7A=="; 42 66 }; 43 67 } 44 68 { ··· 58 82 }; 59 83 } 60 84 { 61 - name = "_sindresorhus_is___is_0.14.0.tgz"; 85 + name = "_sindresorhus_is___is_4.6.0.tgz"; 62 86 path = fetchurl { 63 - name = "_sindresorhus_is___is_0.14.0.tgz"; 64 - url = "https://registry.yarnpkg.com/@sindresorhus/is/-/is-0.14.0.tgz"; 65 - sha512 = "9NET910DNaIPngYnLLPeg+Ogzqsi9uM4mSboU5y6p8S5DzMTVEsJZrawi+BoDNUVBa2DhJqQYUFvMDfgU062LQ=="; 87 + name = "_sindresorhus_is___is_4.6.0.tgz"; 88 + url = "https://registry.yarnpkg.com/@sindresorhus/is/-/is-4.6.0.tgz"; 89 + sha512 = "t09vSN3MdfsyCHoFcTRCH/iUtG7OJ0CsjzB8cjAmKc/va/kIgeDI/TxsigdncE/4be734m0cvIYwNaV4i2XqAw=="; 66 90 }; 67 91 } 68 92 { 69 - name = "_szmarczak_http_timer___http_timer_1.1.2.tgz"; 93 + name = "_szmarczak_http_timer___http_timer_4.0.6.tgz"; 70 94 path = fetchurl { 71 - name = "_szmarczak_http_timer___http_timer_1.1.2.tgz"; 72 - url = "https://registry.yarnpkg.com/@szmarczak/http-timer/-/http-timer-1.1.2.tgz"; 73 - sha512 = "XIB2XbzHTN6ieIjfIMV9hlVcfPU26s2vafYWQcZHWXHOxiaRZYEDKEwdl129Zyg50+foYV2jCgtrqSA6qNuNSA=="; 95 + name = "_szmarczak_http_timer___http_timer_4.0.6.tgz"; 96 + url = "https://registry.yarnpkg.com/@szmarczak/http-timer/-/http-timer-4.0.6.tgz"; 97 + sha512 = "4BAffykYOgO+5nzBWYwE3W90sBgLJoUPRWWcL8wlyiM8IB8ipJz3UMJ9KXQd1RKQXpKp8Tutn80HZtWsu2u76w=="; 74 98 }; 75 99 } 76 100 { ··· 82 106 }; 83 107 } 84 108 { 109 + name = "_types_cacheable_request___cacheable_request_6.0.3.tgz"; 110 + path = fetchurl { 111 + name = "_types_cacheable_request___cacheable_request_6.0.3.tgz"; 112 + url = "https://registry.yarnpkg.com/@types/cacheable-request/-/cacheable-request-6.0.3.tgz"; 113 + sha512 = "IQ3EbTzGxIigb1I3qPZc1rWJnH0BmSKv5QYTalEwweFvyBDLSAe24zP0le/hyi7ecGfZVlIVAg4BZqb8WBwKqw=="; 114 + }; 115 + } 116 + { 85 117 name = "_types_debug___debug_4.1.7.tgz"; 86 118 path = fetchurl { 87 119 name = "_types_debug___debug_4.1.7.tgz"; ··· 106 138 }; 107 139 } 108 140 { 141 + name = "_types_http_cache_semantics___http_cache_semantics_4.0.1.tgz"; 142 + path = fetchurl { 143 + name = "_types_http_cache_semantics___http_cache_semantics_4.0.1.tgz"; 144 + url = "https://registry.yarnpkg.com/@types/http-cache-semantics/-/http-cache-semantics-4.0.1.tgz"; 145 + sha512 = "SZs7ekbP8CN0txVG2xVRH6EgKmEm31BOxA07vkFaETzZz1xh+cbt8BcI0slpymvwhx5dlFnQG2rTlPVQn+iRPQ=="; 146 + }; 147 + } 148 + { 149 + name = "_types_keyv___keyv_3.1.4.tgz"; 150 + path = fetchurl { 151 + name = "_types_keyv___keyv_3.1.4.tgz"; 152 + url = "https://registry.yarnpkg.com/@types/keyv/-/keyv-3.1.4.tgz"; 153 + sha512 = "BQ5aZNSCpj7D6K2ksrRCTmKRLEpnPvWDiLPfoGyhZ++8YtiK9d/3DBKPJgry359X/P1PfruyYwvnvwFjuEiEIg=="; 154 + }; 155 + } 156 + { 109 157 name = "_types_minimatch___minimatch_5.1.2.tgz"; 110 158 path = fetchurl { 111 159 name = "_types_minimatch___minimatch_5.1.2.tgz"; ··· 122 170 }; 123 171 } 124 172 { 125 - name = "_types_node___node_18.11.3.tgz"; 173 + name = "_types_node___node_18.11.19.tgz"; 126 174 path = fetchurl { 127 - name = "_types_node___node_18.11.3.tgz"; 128 - url = "https://registry.yarnpkg.com/@types/node/-/node-18.11.3.tgz"; 129 - sha512 = "fNjDQzzOsZeKZu5NATgXUPsaFaTxeRgFXoosrHivTl8RGeV733OLawXsGfEk9a8/tySyZUyiZ6E8LcjPFZ2y1A=="; 175 + name = "_types_node___node_18.11.19.tgz"; 176 + url = "https://registry.yarnpkg.com/@types/node/-/node-18.11.19.tgz"; 177 + sha512 = "YUgMWAQBWLObABqrvx8qKO1enAvBUdjZOAWQ5grBAkp5LQv45jBvYKZ3oFS9iKRCQyFjqw6iuEa1vmFqtxYLZw=="; 130 178 }; 131 179 } 132 180 { 133 - name = "_types_node___node_16.11.68.tgz"; 181 + name = "_types_node___node_16.18.12.tgz"; 134 182 path = fetchurl { 135 - name = "_types_node___node_16.11.68.tgz"; 136 - url = "https://registry.yarnpkg.com/@types/node/-/node-16.11.68.tgz"; 137 - sha512 = "JkRpuVz3xCNCWaeQ5EHLR/6woMbHZz/jZ7Kmc63AkU+1HxnoUugzSWMck7dsR4DvNYX8jp9wTi9K7WvnxOIQZQ=="; 183 + name = "_types_node___node_16.18.12.tgz"; 184 + url = "https://registry.yarnpkg.com/@types/node/-/node-16.18.12.tgz"; 185 + sha512 = "vzLe5NaNMjIE3mcddFVGlAXN1LEWueUsMsOJWaT6wWMJGyljHAWHznqfnKUQWGzu7TLPrGvWdNAsvQYW+C0xtw=="; 138 186 }; 139 187 } 140 188 { ··· 146 194 }; 147 195 } 148 196 { 197 + name = "_types_responselike___responselike_1.0.0.tgz"; 198 + path = fetchurl { 199 + name = "_types_responselike___responselike_1.0.0.tgz"; 200 + url = "https://registry.yarnpkg.com/@types/responselike/-/responselike-1.0.0.tgz"; 201 + sha512 = "85Y2BjiufFzaMIlvJDvTTB8Fxl2xfLo4HgmHzVBz08w4wDePCTjYw66PdrolO0kzli3yam/YCgRufyo1DdQVTA=="; 202 + }; 203 + } 204 + { 149 205 name = "_types_verror___verror_1.10.6.tgz"; 150 206 path = fetchurl { 151 207 name = "_types_verror___verror_1.10.6.tgz"; ··· 162 218 }; 163 219 } 164 220 { 165 - name = "_types_yargs___yargs_17.0.13.tgz"; 221 + name = "_types_yargs___yargs_17.0.22.tgz"; 166 222 path = fetchurl { 167 - name = "_types_yargs___yargs_17.0.13.tgz"; 168 - url = "https://registry.yarnpkg.com/@types/yargs/-/yargs-17.0.13.tgz"; 169 - sha512 = "9sWaruZk2JGxIQU+IhI1fhPYRcQ0UuTNuKuCW9bR5fp7qi2Llf7WDzNa17Cy7TKnh3cdxDOiyTu6gaLS0eDatg=="; 223 + name = "_types_yargs___yargs_17.0.22.tgz"; 224 + url = "https://registry.yarnpkg.com/@types/yargs/-/yargs-17.0.22.tgz"; 225 + sha512 = "pet5WJ9U8yPVRhkwuEIp5ktAeAqRZOq4UdAyWLWzxbtpyXnzbtLdKiXAjJzi/KLmPGS9wk86lUFWZFN6sISo4g=="; 170 226 }; 171 227 } 172 228 { ··· 210 266 }; 211 267 } 212 268 { 269 + name = "ansi_styles___ansi_styles_3.2.1.tgz"; 270 + path = fetchurl { 271 + name = "ansi_styles___ansi_styles_3.2.1.tgz"; 272 + url = "https://registry.yarnpkg.com/ansi-styles/-/ansi-styles-3.2.1.tgz"; 273 + sha512 = "VT0ZI6kZRdTh8YyJw3SMbYm/u+NqfsAxEpWO0Pf9sq8/e94WxxOpPKx9FR1FlyCtOVDNOQ+8ntlqFxiRc+r5qA=="; 274 + }; 275 + } 276 + { 213 277 name = "ansi_styles___ansi_styles_4.3.0.tgz"; 214 278 path = fetchurl { 215 279 name = "ansi_styles___ansi_styles_4.3.0.tgz"; ··· 306 370 }; 307 371 } 308 372 { 309 - name = "axios___axios_1.1.3.tgz"; 373 + name = "axios___axios_1.3.2.tgz"; 310 374 path = fetchurl { 311 - name = "axios___axios_1.1.3.tgz"; 312 - url = "https://registry.yarnpkg.com/axios/-/axios-1.1.3.tgz"; 313 - sha512 = "00tXVRwKx/FZr/IDVFt4C+f9FYairX517WoGCL6dpOntqLkZofjhu43F/Xl44UOpqa+9sLFDrG/XAnFsUYgkDA=="; 375 + name = "axios___axios_1.3.2.tgz"; 376 + url = "https://registry.yarnpkg.com/axios/-/axios-1.3.2.tgz"; 377 + sha512 = "1M3O703bYqYuPhbHeya5bnhpYVsDDRyQSabNja04mZtboLNSuZ4YrltestrLXfHgmzua4TpUqRiVKbiQuo2epw=="; 314 378 }; 315 379 } 316 380 { ··· 362 426 }; 363 427 } 364 428 { 365 - name = "bootstrap___bootstrap_5.2.2.tgz"; 429 + name = "bootstrap___bootstrap_5.2.3.tgz"; 366 430 path = fetchurl { 367 - name = "bootstrap___bootstrap_5.2.2.tgz"; 368 - url = "https://registry.yarnpkg.com/bootstrap/-/bootstrap-5.2.2.tgz"; 369 - sha512 = "dEtzMTV71n6Fhmbg4fYJzQsw1N29hJKO1js5ackCgIpDcGid2ETMGC6zwSYw09v05Y+oRdQ9loC54zB1La3hHQ=="; 431 + name = "bootstrap___bootstrap_5.2.3.tgz"; 432 + url = "https://registry.yarnpkg.com/bootstrap/-/bootstrap-5.2.3.tgz"; 433 + sha512 = "cEKPM+fwb3cT8NzQZYEu4HilJ3anCrWqh3CHAok1p9jXqMPsPTBhU25fBckEJHJ/p+tTxTFTsFQGM+gaHpi3QQ=="; 370 434 }; 371 435 } 372 436 { ··· 458 522 }; 459 523 } 460 524 { 461 - name = "cacheable_request___cacheable_request_6.1.0.tgz"; 525 + name = "cacheable_lookup___cacheable_lookup_5.0.4.tgz"; 462 526 path = fetchurl { 463 - name = "cacheable_request___cacheable_request_6.1.0.tgz"; 464 - url = "https://registry.yarnpkg.com/cacheable-request/-/cacheable-request-6.1.0.tgz"; 465 - sha512 = "Oj3cAGPCqOZX7Rz64Uny2GYAZNliQSqfbePrgAQ1wKAihYmCUnraBtJtKcGR4xz7wF+LoJC+ssFZvv5BgF9Igg=="; 527 + name = "cacheable_lookup___cacheable_lookup_5.0.4.tgz"; 528 + url = "https://registry.yarnpkg.com/cacheable-lookup/-/cacheable-lookup-5.0.4.tgz"; 529 + sha512 = "2/kNscPhpcxrOigMZzbiWF7dz8ilhb/nIHU3EyZiXWXpeq/au8qJ8VhdftMkty3n7Gj6HIGalQG8oiBNB3AJgA=="; 530 + }; 531 + } 532 + { 533 + name = "cacheable_request___cacheable_request_7.0.2.tgz"; 534 + path = fetchurl { 535 + name = "cacheable_request___cacheable_request_7.0.2.tgz"; 536 + url = "https://registry.yarnpkg.com/cacheable-request/-/cacheable-request-7.0.2.tgz"; 537 + sha512 = "pouW8/FmiPQbuGpkXQ9BAPv/Mo5xDGANgSNXzTzJ8DrKGuXOssM4wIQRjfanNRh3Yu5cfYPvcorqbhg2KIJtew=="; 538 + }; 539 + } 540 + { 541 + name = "callsites___callsites_3.1.0.tgz"; 542 + path = fetchurl { 543 + name = "callsites___callsites_3.1.0.tgz"; 544 + url = "https://registry.yarnpkg.com/callsites/-/callsites-3.1.0.tgz"; 545 + sha512 = "P8BjAsXvZS+VIDUI11hHCQEv74YT67YUi5JJFNWIqL235sBmjX4+qx9Muvls5ivyNENctx46xQLQ3aTuE7ssaQ=="; 546 + }; 547 + } 548 + { 549 + name = "chalk___chalk_2.4.2.tgz"; 550 + path = fetchurl { 551 + name = "chalk___chalk_2.4.2.tgz"; 552 + url = "https://registry.yarnpkg.com/chalk/-/chalk-2.4.2.tgz"; 553 + sha512 = "Mti+f9lpJNcwF4tWV8/OrTTtF1gZi+f8FqlyAdouralcFWFQWF2+NgCHShjkCb+IFBLq9buZwE1xckQU4peSuQ=="; 466 554 }; 467 555 } 468 556 { ··· 498 586 }; 499 587 } 500 588 { 501 - name = "ci_info___ci_info_3.5.0.tgz"; 589 + name = "ci_info___ci_info_3.7.1.tgz"; 502 590 path = fetchurl { 503 - name = "ci_info___ci_info_3.5.0.tgz"; 504 - url = "https://registry.yarnpkg.com/ci-info/-/ci-info-3.5.0.tgz"; 505 - sha512 = "yH4RezKOGlOhxkmhbeNuC4eYZKAUsEaGtBuBzDDP1eFUKiccDWzBABxBfOx31IDwDIXMTxWuwAxUGModvkbuVw=="; 591 + name = "ci_info___ci_info_3.7.1.tgz"; 592 + url = "https://registry.yarnpkg.com/ci-info/-/ci-info-3.7.1.tgz"; 593 + sha512 = "4jYS4MOAaCIStSRwiuxc4B8MYhIe676yO1sYGzARnjXkWpmzZMMYxY6zu8WYWDhSuth5zhrQ1rhNSibyyvv4/w=="; 506 594 }; 507 595 } 508 596 { ··· 538 626 }; 539 627 } 540 628 { 629 + name = "color_convert___color_convert_1.9.3.tgz"; 630 + path = fetchurl { 631 + name = "color_convert___color_convert_1.9.3.tgz"; 632 + url = "https://registry.yarnpkg.com/color-convert/-/color-convert-1.9.3.tgz"; 633 + sha512 = "QfAUtd+vFdAtFQcC8CCyYt1fYWxSqAiK2cSD6zDB8N3cpsEBAvRxp9zOGg6G/SHHJYAT88/az/IuDGALsNVbGg=="; 634 + }; 635 + } 636 + { 541 637 name = "color_convert___color_convert_2.0.1.tgz"; 542 638 path = fetchurl { 543 639 name = "color_convert___color_convert_2.0.1.tgz"; 544 640 url = "https://registry.yarnpkg.com/color-convert/-/color-convert-2.0.1.tgz"; 545 641 sha512 = "RRECPsj7iu/xb5oKYcsFHSppFNnsj/52OVTRKb4zP5onXwVF3zVmmToNcOfGC+CRDpfK/U584fMg38ZHCaElKQ=="; 642 + }; 643 + } 644 + { 645 + name = "color_name___color_name_1.1.3.tgz"; 646 + path = fetchurl { 647 + name = "color_name___color_name_1.1.3.tgz"; 648 + url = "https://registry.yarnpkg.com/color-name/-/color-name-1.1.3.tgz"; 649 + sha512 = "72fSenhMw2HZMTVHeCA9KCmpEIbzWiQsjN+BHcBbS9vr1mtt+vJjPdksIBNUmKAW8TFUDPJK5SUU3QhE9NEXDw=="; 546 650 }; 547 651 } 548 652 { ··· 602 706 }; 603 707 } 604 708 { 605 - name = "config_chain___config_chain_1.1.13.tgz"; 709 + name = "core_util_is___core_util_is_1.0.2.tgz"; 606 710 path = fetchurl { 607 - name = "config_chain___config_chain_1.1.13.tgz"; 608 - url = "https://registry.yarnpkg.com/config-chain/-/config-chain-1.1.13.tgz"; 609 - sha512 = "qj+f8APARXHrM0hraqXYb2/bOVSV4PvJQlNZ/DVj0QrmNM2q2euizkeuVckQ57J+W0mRH6Hvi+k50M4Jul2VRQ=="; 711 + name = "core_util_is___core_util_is_1.0.2.tgz"; 712 + url = "https://registry.yarnpkg.com/core-util-is/-/core-util-is-1.0.2.tgz"; 713 + sha512 = "3lqz5YjWTYnW6dlDa5TLaTCcShfar1e40rmcJVwCBJC6mWlFuj0eCHIElmG1g5kyuJ/GD+8Wn4FFCcz4gJPfaQ=="; 610 714 }; 611 715 } 612 716 { 613 - name = "core_util_is___core_util_is_1.0.2.tgz"; 717 + name = "cosmiconfig___cosmiconfig_8.0.0.tgz"; 614 718 path = fetchurl { 615 - name = "core_util_is___core_util_is_1.0.2.tgz"; 616 - url = "https://registry.yarnpkg.com/core-util-is/-/core-util-is-1.0.2.tgz"; 617 - sha512 = "3lqz5YjWTYnW6dlDa5TLaTCcShfar1e40rmcJVwCBJC6mWlFuj0eCHIElmG1g5kyuJ/GD+8Wn4FFCcz4gJPfaQ=="; 719 + name = "cosmiconfig___cosmiconfig_8.0.0.tgz"; 720 + url = "https://registry.yarnpkg.com/cosmiconfig/-/cosmiconfig-8.0.0.tgz"; 721 + sha512 = "da1EafcpH6b/TD8vDRaWV7xFINlHlF6zKsGwS1TsuVJTZRkquaS5HTMq7uq6h31619QjbsYl21gVDOm32KM1vQ=="; 618 722 }; 619 723 } 620 724 { ··· 666 770 }; 667 771 } 668 772 { 669 - name = "decompress_response___decompress_response_3.3.0.tgz"; 670 - path = fetchurl { 671 - name = "decompress_response___decompress_response_3.3.0.tgz"; 672 - url = "https://registry.yarnpkg.com/decompress-response/-/decompress-response-3.3.0.tgz"; 673 - sha512 = "BzRPQuY1ip+qDonAOz42gRm/pg9F768C+npV/4JOsxRC2sq+Rlk+Q4ZCAsOhnIaMrgarILY+RMUIvMmmX1qAEA=="; 674 - }; 675 - } 676 - { 677 773 name = "decompress_response___decompress_response_6.0.0.tgz"; 678 774 path = fetchurl { 679 775 name = "decompress_response___decompress_response_6.0.0.tgz"; ··· 690 786 }; 691 787 } 692 788 { 693 - name = "defer_to_connect___defer_to_connect_1.1.3.tgz"; 789 + name = "defer_to_connect___defer_to_connect_2.0.1.tgz"; 694 790 path = fetchurl { 695 - name = "defer_to_connect___defer_to_connect_1.1.3.tgz"; 696 - url = "https://registry.yarnpkg.com/defer-to-connect/-/defer-to-connect-1.1.3.tgz"; 697 - sha512 = "0ISdNousHvZT2EiFlZeZAHBUvSxmKswVCEf8hW7KWgG4a8MVEu/3Vb6uWYozkjylyCxe0JBIiRB1jV45S70WVQ=="; 791 + name = "defer_to_connect___defer_to_connect_2.0.1.tgz"; 792 + url = "https://registry.yarnpkg.com/defer-to-connect/-/defer-to-connect-2.0.1.tgz"; 793 + sha512 = "4tvttepXG1VaYGrRibk5EwJd1t4udunSOVMdLSAL6mId1ix438oPwPZMALY41FCijukO1L0twNcGsdzS7dHgDg=="; 698 794 }; 699 795 } 700 796 { ··· 730 826 }; 731 827 } 732 828 { 733 - name = "devtools_protocol___devtools_protocol_0.0.1045489.tgz"; 829 + name = "devtools_protocol___devtools_protocol_0.0.1068969.tgz"; 734 830 path = fetchurl { 735 - name = "devtools_protocol___devtools_protocol_0.0.1045489.tgz"; 736 - url = "https://registry.yarnpkg.com/devtools-protocol/-/devtools-protocol-0.0.1045489.tgz"; 737 - sha512 = "D+PTmWulkuQW4D1NTiCRCFxF7pQPn0hgp4YyX4wAQ6xYXKOadSWPR3ENGDQ47MW/Ewc9v2rpC/UEEGahgBYpSQ=="; 831 + name = "devtools_protocol___devtools_protocol_0.0.1068969.tgz"; 832 + url = "https://registry.yarnpkg.com/devtools-protocol/-/devtools-protocol-0.0.1068969.tgz"; 833 + sha512 = "ATFTrPbY1dKYhPPvpjtwWKSK2mIwGmRwX54UASn9THEuIZCe2n9k3vVuMmt6jWeL+e5QaaguEv/pMyR+JQB7VQ=="; 738 834 }; 739 835 } 740 836 { ··· 778 874 }; 779 875 } 780 876 { 781 - name = "duplexer3___duplexer3_0.1.5.tgz"; 782 - path = fetchurl { 783 - name = "duplexer3___duplexer3_0.1.5.tgz"; 784 - url = "https://registry.yarnpkg.com/duplexer3/-/duplexer3-0.1.5.tgz"; 785 - sha512 = "1A8za6ws41LQgv9HrE/66jyC5yuSjQ3L/KOpFtoBilsAK2iA2wuS5rTt1OCzIvtS2V7nVmedsUU+DGRcjBmOYA=="; 786 - }; 787 - } 788 - { 789 877 name = "ejs___ejs_3.1.8.tgz"; 790 878 path = fetchurl { 791 879 name = "ejs___ejs_3.1.8.tgz"; ··· 818 906 }; 819 907 } 820 908 { 821 - name = "electron___electron_21.2.0.tgz"; 909 + name = "electron___electron_22.2.0.tgz"; 822 910 path = fetchurl { 823 - name = "electron___electron_21.2.0.tgz"; 824 - url = "https://registry.yarnpkg.com/electron/-/electron-21.2.0.tgz"; 825 - sha512 = "oKV4fo8l6jlOZ1cYZ4RpZz02ZxLuBo3SO7DH+FrJ8uDyCirP+eVJ/qlzu23odtNe0P7S/mYAZbC6abZHWoqtLg=="; 911 + name = "electron___electron_22.2.0.tgz"; 912 + url = "https://registry.yarnpkg.com/electron/-/electron-22.2.0.tgz"; 913 + sha512 = "puRZSF2vWJ4pz3oetL5Td8LcuivTWz3MoAk/gjImHSN1B/2VJNEQlw1jGdkte+ppid2craOswE2lmCOZ7SwF1g=="; 826 914 }; 827 915 } 828 916 { ··· 834 922 }; 835 923 } 836 924 { 837 - name = "encodeurl___encodeurl_1.0.2.tgz"; 838 - path = fetchurl { 839 - name = "encodeurl___encodeurl_1.0.2.tgz"; 840 - url = "https://registry.yarnpkg.com/encodeurl/-/encodeurl-1.0.2.tgz"; 841 - sha512 = "TPJXq8JqFaVYm2CWmPvnP2Iyo4ZSM7/QKcSmuMLDObfpH5fi7RUGmd/rTDf+rut/saiDiQEeVTNgAmJEdAOx0w=="; 842 - }; 843 - } 844 - { 845 925 name = "end_of_stream___end_of_stream_1.4.4.tgz"; 846 926 path = fetchurl { 847 927 name = "end_of_stream___end_of_stream_1.4.4.tgz"; ··· 858 938 }; 859 939 } 860 940 { 941 + name = "error_ex___error_ex_1.3.2.tgz"; 942 + path = fetchurl { 943 + name = "error_ex___error_ex_1.3.2.tgz"; 944 + url = "https://registry.yarnpkg.com/error-ex/-/error-ex-1.3.2.tgz"; 945 + sha512 = "7dFHNmqeFSEt2ZBsCriorKnn3Z2pj+fd9kmI6QoWw4//DL+icEBfc0U7qJCisqrTsKTjw4fNFy2pW9OqStD84g=="; 946 + }; 947 + } 948 + { 861 949 name = "es6_error___es6_error_4.1.1.tgz"; 862 950 path = fetchurl { 863 951 name = "es6_error___es6_error_4.1.1.tgz"; ··· 874 962 }; 875 963 } 876 964 { 965 + name = "escape_string_regexp___escape_string_regexp_1.0.5.tgz"; 966 + path = fetchurl { 967 + name = "escape_string_regexp___escape_string_regexp_1.0.5.tgz"; 968 + url = "https://registry.yarnpkg.com/escape-string-regexp/-/escape-string-regexp-1.0.5.tgz"; 969 + sha512 = "vbRorB5FUQWvla16U8R/qgaFIya2qGzwDrNmCZuYKrbdSUMG6I1ZCGQRefkRVhuOkIGVne7BQ35DSfo1qvJqFg=="; 970 + }; 971 + } 972 + { 877 973 name = "escape_string_regexp___escape_string_regexp_4.0.0.tgz"; 878 974 path = fetchurl { 879 975 name = "escape_string_regexp___escape_string_regexp_4.0.0.tgz"; ··· 1034 1130 }; 1035 1131 } 1036 1132 { 1037 - name = "get_intrinsic___get_intrinsic_1.1.3.tgz"; 1133 + name = "get_intrinsic___get_intrinsic_1.2.0.tgz"; 1038 1134 path = fetchurl { 1039 - name = "get_intrinsic___get_intrinsic_1.1.3.tgz"; 1040 - url = "https://registry.yarnpkg.com/get-intrinsic/-/get-intrinsic-1.1.3.tgz"; 1041 - sha512 = "QJVz1Tj7MS099PevUG5jvnt9tSkXN8K14dxQlikJuPt4uD9hHAHjLyLBiLR5zELelBdD9QNRAXZzsJx0WaDL9A=="; 1135 + name = "get_intrinsic___get_intrinsic_1.2.0.tgz"; 1136 + url = "https://registry.yarnpkg.com/get-intrinsic/-/get-intrinsic-1.2.0.tgz"; 1137 + sha512 = "L049y6nFOuom5wGyRc3/gdTLO94dySVKRACj1RmJZBQXlbTMhtNIgkWkUHq+jYmZvKf14EW1EoJnnjbmoHij0Q=="; 1042 1138 }; 1043 1139 } 1044 1140 { ··· 1082 1178 }; 1083 1179 } 1084 1180 { 1085 - name = "global_tunnel_ng___global_tunnel_ng_2.7.1.tgz"; 1086 - path = fetchurl { 1087 - name = "global_tunnel_ng___global_tunnel_ng_2.7.1.tgz"; 1088 - url = "https://registry.yarnpkg.com/global-tunnel-ng/-/global-tunnel-ng-2.7.1.tgz"; 1089 - sha512 = "4s+DyciWBV0eK148wqXxcmVAbFVPqtc3sEtUE/GTQfuU80rySLcMhUmHKSHI7/LDj8q0gDYI1lIhRRB7ieRAqg=="; 1090 - }; 1091 - } 1092 - { 1093 1181 name = "globalthis___globalthis_1.0.3.tgz"; 1094 1182 path = fetchurl { 1095 1183 name = "globalthis___globalthis_1.0.3.tgz"; ··· 1098 1186 }; 1099 1187 } 1100 1188 { 1101 - name = "got___got_9.6.0.tgz"; 1189 + name = "got___got_11.8.6.tgz"; 1102 1190 path = fetchurl { 1103 - name = "got___got_9.6.0.tgz"; 1104 - url = "https://registry.yarnpkg.com/got/-/got-9.6.0.tgz"; 1105 - sha512 = "R7eWptXuGYxwijs0eV+v3o6+XH1IqVK8dJOEecQfTmkncw9AV4dcw/Dhxi8MdlqPthxxpZyizMzyg8RTmEsG+Q=="; 1191 + name = "got___got_11.8.6.tgz"; 1192 + url = "https://registry.yarnpkg.com/got/-/got-11.8.6.tgz"; 1193 + sha512 = "6tfZ91bOr7bOXnK7PRDCGBLa1H4U080YHNaAQ2KsMGlLEzRbk44nsZF2E1IeRc3vtJHPVbKCYgdFbaGO2ljd8g=="; 1106 1194 }; 1107 1195 } 1108 1196 { ··· 1119 1207 name = "graceful_readlink___graceful_readlink_1.0.1.tgz"; 1120 1208 url = "https://registry.yarnpkg.com/graceful-readlink/-/graceful-readlink-1.0.1.tgz"; 1121 1209 sha512 = "8tLu60LgxF6XpdbK8OW3FA+IfTNBn1ZHGHKF4KQbEeSkajYw5PlYJcKluntgegDPTg8UkHjpet1T82vk6TQ68w=="; 1210 + }; 1211 + } 1212 + { 1213 + name = "has_flag___has_flag_3.0.0.tgz"; 1214 + path = fetchurl { 1215 + name = "has_flag___has_flag_3.0.0.tgz"; 1216 + url = "https://registry.yarnpkg.com/has-flag/-/has-flag-3.0.0.tgz"; 1217 + sha512 = "sKJf1+ceQBr4SMkvQnBDNDtf4TXpVhVGateu0t918bl30FnbE2m4vNLX+VWe/dpjlb+HugGYzW7uQXH98HPEYw=="; 1122 1218 }; 1123 1219 } 1124 1220 { ··· 1162 1258 }; 1163 1259 } 1164 1260 { 1165 - name = "http_cache_semantics___http_cache_semantics_4.1.0.tgz"; 1261 + name = "http_cache_semantics___http_cache_semantics_4.1.1.tgz"; 1166 1262 path = fetchurl { 1167 - name = "http_cache_semantics___http_cache_semantics_4.1.0.tgz"; 1168 - url = "https://registry.yarnpkg.com/http-cache-semantics/-/http-cache-semantics-4.1.0.tgz"; 1169 - sha512 = "carPklcUh7ROWRK7Cv27RPtdhYhUsela/ue5/jKzjegVvXDqM2ILE9Q2BGn9JZJh1g87cp56su/FgQSzcWS8cQ=="; 1263 + name = "http_cache_semantics___http_cache_semantics_4.1.1.tgz"; 1264 + url = "https://registry.yarnpkg.com/http-cache-semantics/-/http-cache-semantics-4.1.1.tgz"; 1265 + sha512 = "er295DKPVsV82j5kw1Gjt+ADA/XYHsajl82cGNQG2eyoPkvgUhX+nDIyelzhIWbbsXP39EHcI6l5tYs2FYqYXQ=="; 1170 1266 }; 1171 1267 } 1172 1268 { ··· 1175 1271 name = "http_proxy_agent___http_proxy_agent_5.0.0.tgz"; 1176 1272 url = "https://registry.yarnpkg.com/http-proxy-agent/-/http-proxy-agent-5.0.0.tgz"; 1177 1273 sha512 = "n2hY8YdoRE1i7r6M0w9DIw5GgZN0G25P8zLCRQ8rjXtTU3vsNFBI/vWK/UIeE6g5MUUz6avwAPXmL6Fy9D/90w=="; 1274 + }; 1275 + } 1276 + { 1277 + name = "http2_wrapper___http2_wrapper_1.0.3.tgz"; 1278 + path = fetchurl { 1279 + name = "http2_wrapper___http2_wrapper_1.0.3.tgz"; 1280 + url = "https://registry.yarnpkg.com/http2-wrapper/-/http2-wrapper-1.0.3.tgz"; 1281 + sha512 = "V+23sDMr12Wnz7iTcDeJr3O6AIxlnvT/bmaAAAP/Xda35C90p9599p0F1eHR/N1KILWSoWVAiOMFjBBXaXSMxg=="; 1178 1282 }; 1179 1283 } 1180 1284 { ··· 1207 1311 name = "ieee754___ieee754_1.2.1.tgz"; 1208 1312 url = "https://registry.yarnpkg.com/ieee754/-/ieee754-1.2.1.tgz"; 1209 1313 sha512 = "dcyqhDvX1C46lXZcVqCpK+FtMRQVdIMN6/Df5js2zouUsqG7I6sFxitIC+7KYK29KdXOLHdu9zL4sFnoVQnqaA=="; 1314 + }; 1315 + } 1316 + { 1317 + name = "import_fresh___import_fresh_3.3.0.tgz"; 1318 + path = fetchurl { 1319 + name = "import_fresh___import_fresh_3.3.0.tgz"; 1320 + url = "https://registry.yarnpkg.com/import-fresh/-/import-fresh-3.3.0.tgz"; 1321 + sha512 = "veYYhQa+D1QBKznvhUHxb8faxlrwUnxseDAbAp457E0wLNio2bOSKnjYDhMj+YiAq61xrMGhQk9iXVk5FzgQMw=="; 1210 1322 }; 1211 1323 } 1212 1324 { ··· 1234 1346 }; 1235 1347 } 1236 1348 { 1349 + name = "is_arrayish___is_arrayish_0.2.1.tgz"; 1350 + path = fetchurl { 1351 + name = "is_arrayish___is_arrayish_0.2.1.tgz"; 1352 + url = "https://registry.yarnpkg.com/is-arrayish/-/is-arrayish-0.2.1.tgz"; 1353 + sha512 = "zz06S8t0ozoDXMG+ube26zeCTNXcKIPJZJi8hBrF4idCLms4CG9QtK7qBl1boi5ODzFpjswb5JPmHCbMpjaYzg=="; 1354 + }; 1355 + } 1356 + { 1237 1357 name = "is_ci___is_ci_3.0.1.tgz"; 1238 1358 path = fetchurl { 1239 1359 name = "is_ci___is_ci_3.0.1.tgz"; ··· 1314 1434 }; 1315 1435 } 1316 1436 { 1437 + name = "js_tokens___js_tokens_4.0.0.tgz"; 1438 + path = fetchurl { 1439 + name = "js_tokens___js_tokens_4.0.0.tgz"; 1440 + url = "https://registry.yarnpkg.com/js-tokens/-/js-tokens-4.0.0.tgz"; 1441 + sha512 = "RdJUflcE3cUzKiMqQgsCu06FPu9UdIJO0beYbPhHN4k6apgJtifcoCtT9bcxOpYBtpD2kCM6Sbzg4CausW/PKQ=="; 1442 + }; 1443 + } 1444 + { 1317 1445 name = "js_yaml___js_yaml_4.1.0.tgz"; 1318 1446 path = fetchurl { 1319 1447 name = "js_yaml___js_yaml_4.1.0.tgz"; ··· 1322 1450 }; 1323 1451 } 1324 1452 { 1325 - name = "json_buffer___json_buffer_3.0.0.tgz"; 1453 + name = "json_buffer___json_buffer_3.0.1.tgz"; 1454 + path = fetchurl { 1455 + name = "json_buffer___json_buffer_3.0.1.tgz"; 1456 + url = "https://registry.yarnpkg.com/json-buffer/-/json-buffer-3.0.1.tgz"; 1457 + sha512 = "4bV5BfR2mqfQTJm+V5tPPdf+ZpuhiIvTuAB5g8kcrXOZpTT/QwwVRWBywX1ozr6lEuPdbHxwaJlm9G6mI2sfSQ=="; 1458 + }; 1459 + } 1460 + { 1461 + name = "json_parse_even_better_errors___json_parse_even_better_errors_2.3.1.tgz"; 1326 1462 path = fetchurl { 1327 - name = "json_buffer___json_buffer_3.0.0.tgz"; 1328 - url = "https://registry.yarnpkg.com/json-buffer/-/json-buffer-3.0.0.tgz"; 1329 - sha512 = "CuUqjv0FUZIdXkHPI8MezCnFCdaTAacej1TZYulLoAg1h/PhwkdXFN4V/gzY4g+fMBCOV2xF+rp7t2XD2ns/NQ=="; 1463 + name = "json_parse_even_better_errors___json_parse_even_better_errors_2.3.1.tgz"; 1464 + url = "https://registry.yarnpkg.com/json-parse-even-better-errors/-/json-parse-even-better-errors-2.3.1.tgz"; 1465 + sha512 = "xyFwyhro/JEof6Ghe2iz2NcXoj2sloNsWr/XsERDK/oiPCfaNhl5ONfp+jQdAZRQQ0IJWNzH9zIZF7li91kh2w=="; 1330 1466 }; 1331 1467 } 1332 1468 { ··· 1346 1482 }; 1347 1483 } 1348 1484 { 1349 - name = "json5___json5_2.2.1.tgz"; 1485 + name = "json5___json5_2.2.3.tgz"; 1350 1486 path = fetchurl { 1351 - name = "json5___json5_2.2.1.tgz"; 1352 - url = "https://registry.yarnpkg.com/json5/-/json5-2.2.1.tgz"; 1353 - sha512 = "1hqLFMSrGHRHxav9q9gNjJ5EXznIxGVO09xQRrwplcS8qs28pZ8s8hupZAmqDwZUmVZ2Qb2jnyPOWcDH8m8dlA=="; 1487 + name = "json5___json5_2.2.3.tgz"; 1488 + url = "https://registry.yarnpkg.com/json5/-/json5-2.2.3.tgz"; 1489 + sha512 = "XmOWe7eyHYH14cLdVPoyg+GOH3rYX++KpzrylJwSW98t3Nk+U8XOl8FWKOgwtzdb8lXGf6zYwDUzeHMWfxasyg=="; 1354 1490 }; 1355 1491 } 1356 1492 { ··· 1378 1514 }; 1379 1515 } 1380 1516 { 1381 - name = "keyv___keyv_3.1.0.tgz"; 1517 + name = "keyv___keyv_4.5.2.tgz"; 1382 1518 path = fetchurl { 1383 - name = "keyv___keyv_3.1.0.tgz"; 1384 - url = "https://registry.yarnpkg.com/keyv/-/keyv-3.1.0.tgz"; 1385 - sha512 = "9ykJ/46SN/9KPM/sichzQ7OvXyGDYKGTaDlKMGCAlg2UK8KRy4jb0d8sFc+0Tt0YYnThq8X2RZgCg74RPxgcVA=="; 1519 + name = "keyv___keyv_4.5.2.tgz"; 1520 + url = "https://registry.yarnpkg.com/keyv/-/keyv-4.5.2.tgz"; 1521 + sha512 = "5MHbFaKn8cNSmVW7BYnijeAVlE4cYA/SVkifVgrh7yotnfhKmjuXpDKjrABLnT0SfHWV21P8ow07OGfRrNDg8g=="; 1386 1522 }; 1387 1523 } 1388 1524 { ··· 1394 1530 }; 1395 1531 } 1396 1532 { 1397 - name = "lodash___lodash_4.17.21.tgz"; 1533 + name = "lines_and_columns___lines_and_columns_1.2.4.tgz"; 1398 1534 path = fetchurl { 1399 - name = "lodash___lodash_4.17.21.tgz"; 1400 - url = "https://registry.yarnpkg.com/lodash/-/lodash-4.17.21.tgz"; 1401 - sha512 = "v2kDEe57lecTulaDIuNTPy3Ry4gLGJ6Z1O3vE1krgXZNrsQ+LFTGHVxVjcXPs17LhbZVGedAJv8XZ1tvj5FvSg=="; 1535 + name = "lines_and_columns___lines_and_columns_1.2.4.tgz"; 1536 + url = "https://registry.yarnpkg.com/lines-and-columns/-/lines-and-columns-1.2.4.tgz"; 1537 + sha512 = "7ylylesZQ/PV29jhEDl3Ufjo6ZX7gCqJr5F7PKrqc93v7fzSymt1BpwEU8nAUXs8qzzvqhbjhK5QZg6Mt/HkBg=="; 1402 1538 }; 1403 1539 } 1404 1540 { 1405 - name = "lowercase_keys___lowercase_keys_1.0.1.tgz"; 1541 + name = "lodash___lodash_4.17.21.tgz"; 1406 1542 path = fetchurl { 1407 - name = "lowercase_keys___lowercase_keys_1.0.1.tgz"; 1408 - url = "https://registry.yarnpkg.com/lowercase-keys/-/lowercase-keys-1.0.1.tgz"; 1409 - sha512 = "G2Lj61tXDnVFFOi8VZds+SoQjtQC3dgokKdDG2mTm1tx4m50NUHBOZSBwQQHyy0V12A0JTG4icfZQH+xPyh8VA=="; 1543 + name = "lodash___lodash_4.17.21.tgz"; 1544 + url = "https://registry.yarnpkg.com/lodash/-/lodash-4.17.21.tgz"; 1545 + sha512 = "v2kDEe57lecTulaDIuNTPy3Ry4gLGJ6Z1O3vE1krgXZNrsQ+LFTGHVxVjcXPs17LhbZVGedAJv8XZ1tvj5FvSg=="; 1410 1546 }; 1411 1547 } 1412 1548 { ··· 1490 1626 }; 1491 1627 } 1492 1628 { 1493 - name = "minimatch___minimatch_5.1.0.tgz"; 1629 + name = "minimatch___minimatch_5.1.6.tgz"; 1494 1630 path = fetchurl { 1495 - name = "minimatch___minimatch_5.1.0.tgz"; 1496 - url = "https://registry.yarnpkg.com/minimatch/-/minimatch-5.1.0.tgz"; 1497 - sha512 = "9TPBGGak4nHfGZsPBohm9AWg6NoT7QTCehS3BIJABslyZbzxfV78QM2Y6+i741OPZIafFAaiiEMh5OyIrJPgtg=="; 1631 + name = "minimatch___minimatch_5.1.6.tgz"; 1632 + url = "https://registry.yarnpkg.com/minimatch/-/minimatch-5.1.6.tgz"; 1633 + sha512 = "lKwV/1brpG6mBUFHtb7NUmtABCb2WZZmm2wNiOA5hAb8VdCS4B3dtMWyvcoViccwAW/COERjXLt0zP1zXUN26g=="; 1498 1634 }; 1499 1635 } 1500 1636 { ··· 1506 1642 }; 1507 1643 } 1508 1644 { 1509 - name = "minipass___minipass_3.3.4.tgz"; 1645 + name = "minipass___minipass_3.3.6.tgz"; 1646 + path = fetchurl { 1647 + name = "minipass___minipass_3.3.6.tgz"; 1648 + url = "https://registry.yarnpkg.com/minipass/-/minipass-3.3.6.tgz"; 1649 + sha512 = "DxiNidxSEK+tHG6zOIklvNOwm3hvCrbUrdtzY74U6HKTJxvIDfOUL5W5P2Ghd3DTkhhKPYGqeNUIh5qcM4YBfw=="; 1650 + }; 1651 + } 1652 + { 1653 + name = "minipass___minipass_4.0.2.tgz"; 1510 1654 path = fetchurl { 1511 - name = "minipass___minipass_3.3.4.tgz"; 1512 - url = "https://registry.yarnpkg.com/minipass/-/minipass-3.3.4.tgz"; 1513 - sha512 = "I9WPbWHCGu8W+6k1ZiGpPu0GkoKBeorkfKNuAFBNS1HNFJvke82sxvI5bzcCNpWPorkOO5QQ+zomzzwRxejXiw=="; 1655 + name = "minipass___minipass_4.0.2.tgz"; 1656 + url = "https://registry.yarnpkg.com/minipass/-/minipass-4.0.2.tgz"; 1657 + sha512 = "4Hbzei7ZyBp+1aw0874YWpKOubZd/jc53/XU+gkYry1QV+VvrbO8icLM5CUtm4F0hyXn85DXYKEMIS26gitD3A=="; 1514 1658 }; 1515 1659 } 1516 1660 { ··· 1570 1714 }; 1571 1715 } 1572 1716 { 1573 - name = "node_abi___node_abi_3.28.0.tgz"; 1717 + name = "node_abi___node_abi_3.31.0.tgz"; 1574 1718 path = fetchurl { 1575 - name = "node_abi___node_abi_3.28.0.tgz"; 1576 - url = "https://registry.yarnpkg.com/node-abi/-/node-abi-3.28.0.tgz"; 1577 - sha512 = "fRlDb4I0eLcQeUvGq7IY3xHrSb0c9ummdvDSYWfT9+LKP+3jCKw/tKoqaM7r1BAoiAC6GtwyjaGnOz6B3OtF+A=="; 1719 + name = "node_abi___node_abi_3.31.0.tgz"; 1720 + url = "https://registry.yarnpkg.com/node-abi/-/node-abi-3.31.0.tgz"; 1721 + sha512 = "eSKV6s+APenqVh8ubJyiu/YhZgxQpGP66ntzUb3lY1xB9ukSRaGnx0AIxI+IM+1+IVYC1oWobgG5L3Lt9ARykQ=="; 1578 1722 }; 1579 1723 } 1580 1724 { ··· 1602 1746 }; 1603 1747 } 1604 1748 { 1605 - name = "normalize_url___normalize_url_4.5.1.tgz"; 1606 - path = fetchurl { 1607 - name = "normalize_url___normalize_url_4.5.1.tgz"; 1608 - url = "https://registry.yarnpkg.com/normalize-url/-/normalize-url-4.5.1.tgz"; 1609 - sha512 = "9UZCFRHQdNrfTpGg8+1INIg93B6zE0aXMVFkw1WFwvO4SlZywU6aLg5Of0Ap/PgcbSw4LNxvMWXMeugwMCX0AA=="; 1610 - }; 1611 - } 1612 - { 1613 - name = "npm_conf___npm_conf_1.1.3.tgz"; 1749 + name = "normalize_url___normalize_url_6.1.0.tgz"; 1614 1750 path = fetchurl { 1615 - name = "npm_conf___npm_conf_1.1.3.tgz"; 1616 - url = "https://registry.yarnpkg.com/npm-conf/-/npm-conf-1.1.3.tgz"; 1617 - sha512 = "Yic4bZHJOt9RCFbRP3GgpqhScOY4HH3V2P8yBj6CeYq118Qr+BLXqT2JvpJ00mryLESpgOxf5XlFv4ZjXxLScw=="; 1751 + name = "normalize_url___normalize_url_6.1.0.tgz"; 1752 + url = "https://registry.yarnpkg.com/normalize-url/-/normalize-url-6.1.0.tgz"; 1753 + sha512 = "DlL+XwOy3NxAQ8xuC0okPgK46iuVNAK01YN7RueYBqqFeGsBjV9XmCAzAdgt+667bCl5kPh9EqKKDwnaPG1I7A=="; 1618 1754 }; 1619 1755 } 1620 1756 { ··· 1642 1778 }; 1643 1779 } 1644 1780 { 1645 - name = "p_cancelable___p_cancelable_1.1.0.tgz"; 1781 + name = "p_cancelable___p_cancelable_2.1.1.tgz"; 1646 1782 path = fetchurl { 1647 - name = "p_cancelable___p_cancelable_1.1.0.tgz"; 1648 - url = "https://registry.yarnpkg.com/p-cancelable/-/p-cancelable-1.1.0.tgz"; 1649 - sha512 = "s73XxOZ4zpt1edZYZzvhqFa6uvQc1vwUa0K0BdtIZgQMAJj9IbebH+JkgKZc9h+B05PKHLOTl4ajG1BmNrVZlw=="; 1783 + name = "p_cancelable___p_cancelable_2.1.1.tgz"; 1784 + url = "https://registry.yarnpkg.com/p-cancelable/-/p-cancelable-2.1.1.tgz"; 1785 + sha512 = "BZOr3nRQHOntUjTrH8+Lh54smKHoHyur8We1V8DSMVrl5A2malOOwuJRnKRDjSnkoeBh4at6BwEnb5I7Jl31wg=="; 1650 1786 }; 1651 1787 } 1652 1788 { ··· 1658 1794 }; 1659 1795 } 1660 1796 { 1797 + name = "parent_module___parent_module_1.0.1.tgz"; 1798 + path = fetchurl { 1799 + name = "parent_module___parent_module_1.0.1.tgz"; 1800 + url = "https://registry.yarnpkg.com/parent-module/-/parent-module-1.0.1.tgz"; 1801 + sha512 = "GQ2EWRpQV8/o+Aw8YqtfZZPfNRWZYkbidE9k5rpl/hC3vtHHBfGm2Ifi6qWV+coDGkrUKZAxE3Lot5kcsRlh+g=="; 1802 + }; 1803 + } 1804 + { 1805 + name = "parse_json___parse_json_5.2.0.tgz"; 1806 + path = fetchurl { 1807 + name = "parse_json___parse_json_5.2.0.tgz"; 1808 + url = "https://registry.yarnpkg.com/parse-json/-/parse-json-5.2.0.tgz"; 1809 + sha512 = "ayCKvm/phCGxOkYRSCM82iDwct8/EonSEgCSxWxD7ve6jHggsFl4fZVQBPRNgQoKiuV/odhFrGzQXZwbifC8Rg=="; 1810 + }; 1811 + } 1812 + { 1661 1813 name = "path_is_absolute___path_is_absolute_1.0.1.tgz"; 1662 1814 path = fetchurl { 1663 1815 name = "path_is_absolute___path_is_absolute_1.0.1.tgz"; ··· 1682 1834 }; 1683 1835 } 1684 1836 { 1685 - name = "pend___pend_1.2.0.tgz"; 1837 + name = "path_type___path_type_4.0.0.tgz"; 1686 1838 path = fetchurl { 1687 - name = "pend___pend_1.2.0.tgz"; 1688 - url = "https://registry.yarnpkg.com/pend/-/pend-1.2.0.tgz"; 1689 - sha512 = "F3asv42UuXchdzt+xXqfW1OGlVBe+mxa2mqI0pg5yAHZPvFmY3Y6drSf/GQ1A86WgWEN9Kzh/WrgKa6iGcHXLg=="; 1839 + name = "path_type___path_type_4.0.0.tgz"; 1840 + url = "https://registry.yarnpkg.com/path-type/-/path-type-4.0.0.tgz"; 1841 + sha512 = "gDKb8aZMDeD/tZWs9P6+q0J9Mwkdl6xMV8TjnGP3qJVJ06bdMgkbBlLU8IdfOsIsFz2BW1rNVT3XuNEl8zPAvw=="; 1690 1842 }; 1691 1843 } 1692 1844 { 1693 - name = "pify___pify_3.0.0.tgz"; 1845 + name = "pend___pend_1.2.0.tgz"; 1694 1846 path = fetchurl { 1695 - name = "pify___pify_3.0.0.tgz"; 1696 - url = "https://registry.yarnpkg.com/pify/-/pify-3.0.0.tgz"; 1697 - sha512 = "C3FsVNH1udSEX48gGX1xfvwTWfsYWj5U+8/uK15BGzIGrKoUpghX8hWZwa/OFnakBiiVNmBvemTJR5mcy7iPcg=="; 1847 + name = "pend___pend_1.2.0.tgz"; 1848 + url = "https://registry.yarnpkg.com/pend/-/pend-1.2.0.tgz"; 1849 + sha512 = "F3asv42UuXchdzt+xXqfW1OGlVBe+mxa2mqI0pg5yAHZPvFmY3Y6drSf/GQ1A86WgWEN9Kzh/WrgKa6iGcHXLg=="; 1698 1850 }; 1699 1851 } 1700 1852 { ··· 1714 1866 }; 1715 1867 } 1716 1868 { 1717 - name = "prepend_http___prepend_http_2.0.0.tgz"; 1718 - path = fetchurl { 1719 - name = "prepend_http___prepend_http_2.0.0.tgz"; 1720 - url = "https://registry.yarnpkg.com/prepend-http/-/prepend-http-2.0.0.tgz"; 1721 - sha512 = "ravE6m9Atw9Z/jjttRUZ+clIXogdghyZAuWJ3qEzjT+jI/dL1ifAqhZeC5VHzQp1MSt1+jxKkFNemj/iO7tVUA=="; 1722 - }; 1723 - } 1724 - { 1725 1869 name = "progress___progress_2.0.3.tgz"; 1726 1870 path = fetchurl { 1727 1871 name = "progress___progress_2.0.3.tgz"; 1728 1872 url = "https://registry.yarnpkg.com/progress/-/progress-2.0.3.tgz"; 1729 1873 sha512 = "7PiHtLll5LdnKIMw100I+8xJXR5gW2QwWYkT6iJva0bXitZKa/XMrSbdmg3r2Xnaidz9Qumd0VPaMrZlF9V9sA=="; 1730 - }; 1731 - } 1732 - { 1733 - name = "proto_list___proto_list_1.2.4.tgz"; 1734 - path = fetchurl { 1735 - name = "proto_list___proto_list_1.2.4.tgz"; 1736 - url = "https://registry.yarnpkg.com/proto-list/-/proto-list-1.2.4.tgz"; 1737 - sha512 = "vtK/94akxsTMhe0/cbfpR+syPuszcuwhqVjJq26CuNDgFGj682oRBXOP5MJpv2r7JtE8MsiepGIqvvOTBwn2vA=="; 1738 1874 }; 1739 1875 } 1740 1876 { ··· 1754 1890 }; 1755 1891 } 1756 1892 { 1757 - name = "punycode___punycode_2.1.1.tgz"; 1893 + name = "punycode___punycode_2.3.0.tgz"; 1894 + path = fetchurl { 1895 + name = "punycode___punycode_2.3.0.tgz"; 1896 + url = "https://registry.yarnpkg.com/punycode/-/punycode-2.3.0.tgz"; 1897 + sha512 = "rRV+zQD8tVFys26lAGR9WUuS4iUAngJScM+ZRSKtvl5tKeZ2t5bvdNFdNHBW9FWR4guGHlgmsZ1G7BSm2wTbuA=="; 1898 + }; 1899 + } 1900 + { 1901 + name = "puppeteer_core___puppeteer_core_19.4.0.tgz"; 1758 1902 path = fetchurl { 1759 - name = "punycode___punycode_2.1.1.tgz"; 1760 - url = "https://registry.yarnpkg.com/punycode/-/punycode-2.1.1.tgz"; 1761 - sha512 = "XRsRjdf+j5ml+y/6GKHPZbrF/8p2Yga0JPtdqTIY2Xe5ohJPD9saDJJLPvp9+NSBprVvevdXZybnj2cv8OEd0A=="; 1903 + name = "puppeteer_core___puppeteer_core_19.4.0.tgz"; 1904 + url = "https://registry.yarnpkg.com/puppeteer-core/-/puppeteer-core-19.4.0.tgz"; 1905 + sha512 = "gG/jxseleZStinBn86x8r7trjcE4jcjx1hIQWOpACQhquHYMuKnrWxkzg+EDn8sN3wUtF/Ry9mtJgjM49oUOFQ=="; 1762 1906 }; 1763 1907 } 1764 1908 { 1765 - name = "puppeteer_core___puppeteer_core_19.0.0.tgz"; 1909 + name = "puppeteer___puppeteer_19.4.0.tgz"; 1766 1910 path = fetchurl { 1767 - name = "puppeteer_core___puppeteer_core_19.0.0.tgz"; 1768 - url = "https://registry.yarnpkg.com/puppeteer-core/-/puppeteer-core-19.0.0.tgz"; 1769 - sha512 = "OljQ9W5M4cBX68vnOAGbcRkVENDHn6lfj6QYoGsnLQsxPAh6ExTQAhHauwdFdQkhYdDExZFWlKArnBONzeHY+g=="; 1911 + name = "puppeteer___puppeteer_19.4.0.tgz"; 1912 + url = "https://registry.yarnpkg.com/puppeteer/-/puppeteer-19.4.0.tgz"; 1913 + sha512 = "sRzWEfFSZCCcFUJflGtYI2V7A6qK4Jht+2JiI2LZgn+Nv/LOZZsBDEaGl98ZrS8oEcUA5on4p2yJbE0nzHNzIg=="; 1770 1914 }; 1771 1915 } 1772 1916 { 1773 - name = "puppeteer___puppeteer_19.0.0.tgz"; 1917 + name = "quick_lru___quick_lru_5.1.1.tgz"; 1774 1918 path = fetchurl { 1775 - name = "puppeteer___puppeteer_19.0.0.tgz"; 1776 - url = "https://registry.yarnpkg.com/puppeteer/-/puppeteer-19.0.0.tgz"; 1777 - sha512 = "3Ga5IVerQQ2hKU9q7T28RmcUsd8F2kL6cYuPcPCzeclSjmHhGydPBZL/KJKC02sG6J6Wfry85uiWpbkjQ5qBiw=="; 1919 + name = "quick_lru___quick_lru_5.1.1.tgz"; 1920 + url = "https://registry.yarnpkg.com/quick-lru/-/quick-lru-5.1.1.tgz"; 1921 + sha512 = "WuyALRjWPDGtt/wzJiadO5AXY+8hZ80hVpe6MyivgraREW751X3SbhRvG3eLKOYN+8VEvqLcf3wdnt44Z4S4SA=="; 1778 1922 }; 1779 1923 } 1780 1924 { ··· 1810 1954 }; 1811 1955 } 1812 1956 { 1813 - name = "responselike___responselike_1.0.2.tgz"; 1957 + name = "resolve_alpn___resolve_alpn_1.2.1.tgz"; 1814 1958 path = fetchurl { 1815 - name = "responselike___responselike_1.0.2.tgz"; 1816 - url = "https://registry.yarnpkg.com/responselike/-/responselike-1.0.2.tgz"; 1817 - sha512 = "/Fpe5guzJk1gPqdJLJR5u7eG/gNY4nImjbRDaVWVMRhne55TCmj2i9Q+54PBRfatRC8v/rIiv9BN0pMd9OV5EQ=="; 1959 + name = "resolve_alpn___resolve_alpn_1.2.1.tgz"; 1960 + url = "https://registry.yarnpkg.com/resolve-alpn/-/resolve-alpn-1.2.1.tgz"; 1961 + sha512 = "0a1F4l73/ZFZOakJnQ3FvkJ2+gSTQWz/r2KE5OdDY0TxPm5h4GkqkWWfM47T7HsbnOtcJVEF4epCVy6u7Q3K+g=="; 1962 + }; 1963 + } 1964 + { 1965 + name = "resolve_from___resolve_from_4.0.0.tgz"; 1966 + path = fetchurl { 1967 + name = "resolve_from___resolve_from_4.0.0.tgz"; 1968 + url = "https://registry.yarnpkg.com/resolve-from/-/resolve-from-4.0.0.tgz"; 1969 + sha512 = "pb/MYmXstAkysRFx8piNI1tGFNQIFA3vkE3Gq4EuA1dF6gHp/+vgZqsCGJapvy8N3Q+4o7FwvquPJcnZ7RYy4g=="; 1970 + }; 1971 + } 1972 + { 1973 + name = "responselike___responselike_2.0.1.tgz"; 1974 + path = fetchurl { 1975 + name = "responselike___responselike_2.0.1.tgz"; 1976 + url = "https://registry.yarnpkg.com/responselike/-/responselike-2.0.1.tgz"; 1977 + sha512 = "4gl03wn3hj1HP3yzgdI7d3lCkF95F21Pz4BPGvKHinyQzALR5CapwC8yIi0Rh58DEMQ/SguC03wFj2k0M/mHhw=="; 1818 1978 }; 1819 1979 } 1820 1980 { ··· 1970 2130 }; 1971 2131 } 1972 2132 { 1973 - name = "simple_update_notifier___simple_update_notifier_1.0.7.tgz"; 2133 + name = "simple_update_notifier___simple_update_notifier_1.1.0.tgz"; 1974 2134 path = fetchurl { 1975 - name = "simple_update_notifier___simple_update_notifier_1.0.7.tgz"; 1976 - url = "https://registry.yarnpkg.com/simple-update-notifier/-/simple-update-notifier-1.0.7.tgz"; 1977 - sha512 = "BBKgR84BJQJm6WjWFMHgLVuo61FBDSj1z/xSFUIozqO6wO7ii0JxCqlIud7Enr/+LhlbNI0whErq96P2qHNWew=="; 2135 + name = "simple_update_notifier___simple_update_notifier_1.1.0.tgz"; 2136 + url = "https://registry.yarnpkg.com/simple-update-notifier/-/simple-update-notifier-1.1.0.tgz"; 2137 + sha512 = "VpsrsJSUcJEseSbMHkrsrAVSdvVS5I96Qo1QAQ4FxQ9wXFcB+pjj7FB7/us9+GcgfW4ziHtYMc1J0PLczb55mg=="; 1978 2138 }; 1979 2139 } 1980 2140 { ··· 2074 2234 }; 2075 2235 } 2076 2236 { 2237 + name = "supports_color___supports_color_5.5.0.tgz"; 2238 + path = fetchurl { 2239 + name = "supports_color___supports_color_5.5.0.tgz"; 2240 + url = "https://registry.yarnpkg.com/supports-color/-/supports-color-5.5.0.tgz"; 2241 + sha512 = "QjVjwdXIt408MIiAqCX4oUKsgU2EqAGzs2Ppkm4aQYbjm+ZEWEcW4SfFNTr4uMNZma0ey4f5lgLrkB0aX0QMow=="; 2242 + }; 2243 + } 2244 + { 2077 2245 name = "supports_color___supports_color_7.2.0.tgz"; 2078 2246 path = fetchurl { 2079 2247 name = "supports_color___supports_color_7.2.0.tgz"; ··· 2098 2266 }; 2099 2267 } 2100 2268 { 2101 - name = "tar___tar_6.1.11.tgz"; 2269 + name = "tar___tar_6.1.13.tgz"; 2102 2270 path = fetchurl { 2103 - name = "tar___tar_6.1.11.tgz"; 2104 - url = "https://registry.yarnpkg.com/tar/-/tar-6.1.11.tgz"; 2105 - sha512 = "an/KZQzQUkZCkuoAA64hM92X0Urb6VpRhAFllDzz44U2mcD5scmT3zBc4VgVpkugF580+DQn8eAFSyoQt0tznA=="; 2271 + name = "tar___tar_6.1.13.tgz"; 2272 + url = "https://registry.yarnpkg.com/tar/-/tar-6.1.13.tgz"; 2273 + sha512 = "jdIBIN6LTIe2jqzay/2vtYLlBHa3JF42ot3h1dW8Q0PaAG4v8rm0cvpVePtau5C6OKXGGcgO9q2AMNSWxiLqKw=="; 2106 2274 }; 2107 2275 } 2108 2276 { ··· 2138 2306 }; 2139 2307 } 2140 2308 { 2141 - name = "to_readable_stream___to_readable_stream_1.0.0.tgz"; 2142 - path = fetchurl { 2143 - name = "to_readable_stream___to_readable_stream_1.0.0.tgz"; 2144 - url = "https://registry.yarnpkg.com/to-readable-stream/-/to-readable-stream-1.0.0.tgz"; 2145 - sha512 = "Iq25XBt6zD5npPhlLVXGFN3/gyR2/qODcKNNyTMd4vbm39HUaOiAM4PMq0eMVC/Tkxz+Zjdsc55g9yyz+Yq00Q=="; 2146 - }; 2147 - } 2148 - { 2149 2309 name = "tr46___tr46_0.0.3.tgz"; 2150 2310 path = fetchurl { 2151 2311 name = "tr46___tr46_0.0.3.tgz"; ··· 2167 2327 name = "tunnel_agent___tunnel_agent_0.6.0.tgz"; 2168 2328 url = "https://registry.yarnpkg.com/tunnel-agent/-/tunnel-agent-0.6.0.tgz"; 2169 2329 sha512 = "McnNiV1l8RYeY8tBgEpuodCC1mLUdbSN+CYBL7kJsJNInOP8UjDDEwdk6Mw60vdLLrr5NHKZhMAOSrR2NZuQ+w=="; 2170 - }; 2171 - } 2172 - { 2173 - name = "tunnel___tunnel_0.0.6.tgz"; 2174 - path = fetchurl { 2175 - name = "tunnel___tunnel_0.0.6.tgz"; 2176 - url = "https://registry.yarnpkg.com/tunnel/-/tunnel-0.0.6.tgz"; 2177 - sha512 = "1h/Lnq9yajKY2PEbBadPXj3VxsDDu844OnaAo52UVmIzIvwwtBPIuNvkjuzBlTWpfJyUbG3ez0KSBibQkj4ojg=="; 2178 2330 }; 2179 2331 } 2180 2332 { ··· 2218 2370 }; 2219 2371 } 2220 2372 { 2221 - name = "url_parse_lax___url_parse_lax_3.0.0.tgz"; 2222 - path = fetchurl { 2223 - name = "url_parse_lax___url_parse_lax_3.0.0.tgz"; 2224 - url = "https://registry.yarnpkg.com/url-parse-lax/-/url-parse-lax-3.0.0.tgz"; 2225 - sha512 = "NjFKA0DidqPa5ciFcSrXnAltTtzz84ogy+NebPvfEgAck0+TNg4UJ4IN+fB7zRZfbgUf0syOo9MDxFkDSMuFaQ=="; 2226 - }; 2227 - } 2228 - { 2229 2373 name = "utf8_byte_length___utf8_byte_length_1.0.4.tgz"; 2230 2374 path = fetchurl { 2231 2375 name = "utf8_byte_length___utf8_byte_length_1.0.4.tgz"; ··· 2298 2442 }; 2299 2443 } 2300 2444 { 2301 - name = "ws___ws_8.9.0.tgz"; 2445 + name = "ws___ws_8.10.0.tgz"; 2302 2446 path = fetchurl { 2303 - name = "ws___ws_8.9.0.tgz"; 2304 - url = "https://registry.yarnpkg.com/ws/-/ws-8.9.0.tgz"; 2305 - sha512 = "Ja7nszREasGaYUYCI2k4lCKIRTt+y7XuqVoHR44YpI49TtryyqbqvDMn5eqfW7e6HzTukDRIsXqzVHScqRcafg=="; 2447 + name = "ws___ws_8.10.0.tgz"; 2448 + url = "https://registry.yarnpkg.com/ws/-/ws-8.10.0.tgz"; 2449 + sha512 = "+s49uSmZpvtAsd2h37vIPy1RBusaLawVe8of+GyEPsaJTCMpj/2v8NpeK1SHXjBlQ95lQTmQofOJnFiLoaN3yw=="; 2306 2450 }; 2307 2451 } 2308 2452 { ··· 2338 2482 }; 2339 2483 } 2340 2484 { 2341 - name = "yargs___yargs_17.6.0.tgz"; 2485 + name = "yargs___yargs_17.6.2.tgz"; 2342 2486 path = fetchurl { 2343 - name = "yargs___yargs_17.6.0.tgz"; 2344 - url = "https://registry.yarnpkg.com/yargs/-/yargs-17.6.0.tgz"; 2345 - sha512 = "8H/wTDqlSwoSnScvV2N/JHfLWOKuh5MVla9hqLjK3nsfyy6Y4kDSYSvkU5YCUEPOSnRXfIyx3Sq+B/IWudTo4g=="; 2487 + name = "yargs___yargs_17.6.2.tgz"; 2488 + url = "https://registry.yarnpkg.com/yargs/-/yargs-17.6.2.tgz"; 2489 + sha512 = "1/9UrdHjDZc0eOU0HxOHoS78C69UD3JRMvzlJ7S79S2nTaWRA/whGCTV8o9e/N/1Va9YIV7Q4sOxD8VV4pCWOw=="; 2346 2490 }; 2347 2491 } 2348 2492 {
+2 -2
pkgs/tools/misc/tbls/default.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "tbls"; 10 - version = "1.60.0"; 10 + version = "1.61.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "k1LoW"; 14 14 repo = "tbls"; 15 15 rev = "v${version}"; 16 - hash = "sha256-5/YAJl01ARralsBEV6ZJqcYfMMudCmcQcdQD1jn1I+M="; 16 + hash = "sha256-yXD/LILWaXtjd3etdWINglZtvIYE6i6qmCSR3FUUQeM="; 17 17 }; 18 18 19 19 vendorHash = "sha256-AeaTAjo1wRl7Ymg/fyoijaa9UXf9SiNR447WJtZeN5o=";
+11 -22
pkgs/tools/networking/mozillavpn/default.nix
··· 1 1 { buildGoModule 2 2 , cmake 3 3 , fetchFromGitHub 4 - , fetchpatch 5 4 , go 6 5 , lib 6 + , libsecret 7 7 , pkg-config 8 8 , polkit 9 9 , python3 ··· 15 15 , qtwebsockets 16 16 , rustPlatform 17 17 , stdenv 18 - , which 19 18 , wireguard-tools 20 19 , wrapQtAppsHook 21 20 }: 22 21 23 22 let 24 23 pname = "mozillavpn"; 25 - version = "2.12.0"; 24 + version = "2.13.0"; 26 25 src = fetchFromGitHub { 27 26 owner = "mozilla-mobile"; 28 27 repo = "mozilla-vpn-client"; 29 28 rev = "v${version}"; 30 29 fetchSubmodules = true; 31 - hash = "sha256-T8dPM90X4soVG/plKsf7DM9XgdX5Vcp0i6zTE60gbq0="; 30 + hash = "sha256-EwHuNJZpTb7oFOKKDv0zWgklUe95Th97KP9G5DqRokA="; 32 31 }; 33 - patches = [ 34 - # vpnglean: Add Cargo.lock file 35 - (fetchpatch { 36 - url = "https://github.com/mozilla-mobile/mozilla-vpn-client/pull/5236/commits/6fdc689001619a06b752fa629647642ea66f4e26.patch"; 37 - hash = "sha256-j666Z31D29WIL3EXbek2aLzA4Fui/9VZvupubMDG24Q="; 38 - }) 39 - ]; 40 32 41 33 netfilter-go-modules = (buildGoModule { 42 34 inherit pname version src; ··· 48 40 inherit src; 49 41 name = "${pname}-${version}-extension-bridge"; 50 42 preBuild = "cd extension/bridge"; 51 - hash = "sha256-/DmKSV0IKxZV0Drh6dTsiqgZhuxt6CoegXpYdqN4UzQ="; 43 + hash = "sha256-q6Wf+jrGjGMiDEmnErnDau6Li64Dyq8t2SN1I4rspBY="; 52 44 }; 53 45 signatureDeps = rustPlatform.fetchCargoTarball { 54 46 inherit src; 55 47 name = "${pname}-${version}-signature"; 56 48 preBuild = "cd signature"; 57 - hash = "sha256-6qyMARhPPgTryEtaBNrIPN9ja/fe7Fyx38iGuTd+Dk8="; 49 + hash = "sha256-Dbu4WX2u3uDDUuZzS/hczypSFkQNnvuj2Su2X0QvSN4="; 58 50 }; 59 51 vpngleanDeps = rustPlatform.fetchCargoTarball { 60 - inherit src patches; 52 + inherit src; 61 53 name = "${pname}-${version}-vpnglean"; 62 54 preBuild = "cd vpnglean"; 63 - hash = "sha256-8OLTQmRvy6pATEBX2za6f9vMEqwkf9L5VyERtAN2BDQ="; 55 + hash = "sha256-FDkziDDup+D7Bh+Wclqxn8Dhm/T2DanhjKXIAEFDhzc="; 64 56 }; 65 57 66 58 in 67 59 stdenv.mkDerivation { 68 - inherit pname version src patches; 60 + inherit pname version src; 69 61 70 62 buildInputs = [ 63 + libsecret 71 64 polkit 72 65 qt5compat 73 66 qtbase ··· 81 74 pkg-config 82 75 python3 83 76 python3.pkgs.glean-parser 84 - python3.pkgs.lxml 85 77 python3.pkgs.pyyaml 86 78 python3.pkgs.setuptools 87 79 rustPlatform.cargoSetupHook 88 80 rustPlatform.rust.cargo 89 81 rustPlatform.rust.rustc 90 - which 91 82 wrapQtAppsHook 92 83 ]; 93 84 ··· 110 101 dontCargoSetupPostUnpack = true; 111 102 112 103 postPatch = '' 113 - for file in linux/*.service linux/extra/*.desktop src/platforms/linux/daemon/*.service; do 114 - substituteInPlace "$file" --replace /usr/bin/mozillavpn "$out/bin/mozillavpn" 115 - done 104 + substituteInPlace src/apps/vpn/platforms/linux/daemon/org.mozilla.vpn.dbus.service --replace /usr/bin/mozillavpn "$out/bin/mozillavpn" 116 105 117 106 substituteInPlace scripts/addon/build.py \ 118 107 --replace 'qtbinpath = args.qtpath' 'qtbinpath = "${qttools.dev}/bin"' \ 119 108 --replace 'rcc = os.path.join(qtbinpath, rcc_bin)' 'rcc = "${qtbase.dev}/libexec/rcc"' 120 109 121 - substituteInPlace src/cmake/linux.cmake \ 110 + substituteInPlace src/apps/vpn/cmake/linux.cmake \ 122 111 --replace '/etc/xdg/autostart' "$out/etc/xdg/autostart" \ 123 112 --replace '${"$"}{POLKIT_POLICY_DIR}' "$out/share/polkit-1/actions" \ 124 113 --replace '/usr/share/dbus-1' "$out/share/dbus-1" \
+5 -1
pkgs/tools/networking/nebula/default.nix
··· 1 - { lib, buildGoModule, fetchFromGitHub }: 1 + { lib, buildGoModule, fetchFromGitHub, nixosTests }: 2 2 3 3 buildGoModule rec { 4 4 pname = "nebula"; ··· 16 16 subPackages = [ "cmd/nebula" "cmd/nebula-cert" ]; 17 17 18 18 ldflags = [ "-X main.Build=${version}" ]; 19 + 20 + passthru.tests = { 21 + inherit (nixosTests) nebula; 22 + }; 19 23 20 24 meta = with lib; { 21 25 description = "A scalable overlay networking tool with a focus on performance, simplicity and security";
+2 -2
pkgs/tools/networking/ssldump/default.nix
··· 10 10 11 11 stdenv.mkDerivation rec { 12 12 pname = "ssldump"; 13 - version = "1.5"; 13 + version = "1.6"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "adulau"; 17 17 repo = "ssldump"; 18 18 rev = "v${version}"; 19 - sha256 = "sha256-nk1sXQN9cPIZD7Xlg8CHmKySfvfWl2j0CGxmIyvA6z4="; 19 + sha256 = "sha256-mK8n+Dn7fUzmclUzlIqGjO2zzIVKQEhSRvYeuFwVJx8="; 20 20 }; 21 21 22 22 nativeBuildInputs = [
+2 -2
pkgs/tools/system/stress-ng/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "stress-ng"; 7 - version = "0.15.01"; 7 + version = "0.15.03"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "ColinIanKing"; 11 11 repo = pname; 12 12 rev = "V${version}"; 13 - hash = "sha256-reHO426jUI0/jGhVFfurQ5dsRol4e9YlcE7p7nZyBCU="; 13 + hash = "sha256-ryZoW2N93f1jDNF+qZ8y9brPGrTLiOFi2ciIEh1Lt1c="; 14 14 }; 15 15 16 16 postPatch = ''
+64
pkgs/tools/typesetting/tex/advi/default.nix
··· 1 + { fetchurl 2 + , lib 3 + , makeWrapper 4 + , writeShellScriptBin 5 + , ghostscriptX 6 + , ocamlPackages 7 + , texlive 8 + , which 9 + }: 10 + 11 + let 12 + # simplified fake-opam edited from tweag's opam-nix 13 + fake-opam = writeShellScriptBin "opam" '' 14 + case "$1 $2" in 15 + "config var") 16 + case "$3" in 17 + man) echo "$out/share/man";; 18 + etc) echo "$out/etc";; 19 + doc) echo "$out/share/doc";; 20 + share) echo "$out/share";; 21 + prefix) echo "$out";; 22 + *) echo "fake-opam does not understand arguments: $@" ; exit 1 ;; 23 + esac;; 24 + *) echo "fake-opam does not understand arguments: $@" ; exit 1 ;; 25 + esac 26 + ''; 27 + 28 + # texlive currently does not symlink kpsexpand 29 + kpsexpand = writeShellScriptBin "kpsexpand" '' 30 + exec kpsetool -v 31 + ''; 32 + in 33 + ocamlPackages.buildDunePackage rec { 34 + pname = "advi"; 35 + version = "2.0.0"; 36 + 37 + useDune2 = true; 38 + 39 + minimalOCamlVersion = "4.11"; 40 + 41 + src = fetchurl { 42 + url = "http://advi.inria.fr/advi-${version}.tar.gz"; 43 + hash = "sha256-c0DQHlvdekJyXCxmR4+Ut/njtoCzmqX6hNazNv8PpBQ="; 44 + }; 45 + 46 + nativeBuildInputs = [ fake-opam kpsexpand makeWrapper texlive.combined.scheme-medium which ]; 47 + buildInputs = with ocamlPackages; [ camlimages ghostscriptX graphics ]; 48 + 49 + # TODO: ghostscript linked from texlive.combine will override ghostscriptX and break advi 50 + preInstall = '' 51 + make install 52 + wrapProgram "$out/bin/advi" --prefix PATH : "${lib.makeBinPath [ ghostscriptX ]}" 53 + ''; 54 + 55 + # TODO: redirect /share/advi/tex/latex to tex output compatible with texlive.combine 56 + # (requires patching check() in advi-latex-files) 57 + 58 + meta = with lib; { 59 + homepage = "http://advi.inria.fr/"; 60 + description = "Active-DVI is a Unix-platform DVI previewer and a programmable presenter for slides written in LaTeX."; 61 + license = licenses.lgpl21Only; 62 + maintainers = [ maintainers.xworld21 ]; 63 + }; 64 + }
+19 -5
pkgs/top-level/all-packages.nix
··· 4640 4640 4641 4641 ### TOOLS/TYPESETTING/TEX 4642 4642 4643 + advi = callPackage ../tools/typesetting/tex/advi { }; 4644 + 4643 4645 auctex = callPackage ../tools/typesetting/tex/auctex { }; 4644 4646 4645 4647 blahtexml = callPackage ../tools/typesetting/tex/blahtexml { }; ··· 13606 13608 13607 13609 yamlfix = with python3Packages; toPythonApplication yamlfix; 13608 13610 13611 + yamlfmt = callPackage ../development/tools/yamlfmt {}; 13612 + 13609 13613 yamllint = with python3Packages; toPythonApplication yamllint; 13610 13614 13611 13615 yamlpath = callPackage ../development/tools/yamlpath { }; ··· 17891 17895 img = callPackage ../development/tools/img { }; 17892 17896 17893 17897 include-what-you-use = callPackage ../development/tools/analysis/include-what-you-use { 17894 - llvmPackages = llvmPackages_14; 17898 + llvmPackages = llvmPackages_15; 17895 17899 }; 17896 17900 17897 17901 indent = callPackage ../development/tools/misc/indent { }; ··· 24227 24231 24228 24232 clickhouse-backup = callPackage ../development/tools/database/clickhouse-backup { }; 24229 24233 24234 + cockpit = callPackage ../servers/monitoring/cockpit { }; 24235 + 24230 24236 codeowners = callPackage ../development/tools/codeowners { }; 24231 24237 24232 24238 couchdb3 = callPackage ../servers/http/couchdb/3.nix { }; ··· 25648 25654 25649 25655 fwupd-efi = callPackage ../os-specific/linux/firmware/fwupd-efi { }; 25650 25656 25651 - firmware-manager = callPackage ../os-specific/linux/firmware/firmware-manager { 25652 - openssl = openssl_1_1; 25653 - }; 25657 + firmware-manager = callPackage ../os-specific/linux/firmware/firmware-manager { }; 25654 25658 25655 25659 firmware-updater = callPackage ../os-specific/linux/firmware/firmware-updater { }; 25656 25660 ··· 26873 26877 26874 26878 blackout = callPackage ../data/fonts/blackout { }; 26875 26879 26880 + breath-theme = libsForQt5.callPackage ../data/themes/breath-theme { }; 26881 + 26876 26882 brise = callPackage ../data/misc/brise { }; 26877 26883 26878 26884 cacert = callPackage ../data/misc/cacert { }; ··· 31610 31616 polyphone = libsForQt5.callPackage ../applications/audio/polyphone { }; 31611 31617 31612 31618 portfolio = callPackage ../applications/office/portfolio { 31613 - jre = openjdk11; 31619 + jre = openjdk17; 31614 31620 }; 31615 31621 31616 31622 prevo = callPackage ../applications/misc/prevo { }; ··· 31626 31632 qbec = callPackage ../applications/networking/cluster/qbec { }; 31627 31633 31628 31634 qemacs = callPackage ../applications/editors/qemacs { }; 31635 + 31636 + rime-cli = callPackage ../applications/office/rime-cli {}; 31629 31637 31630 31638 roxctl = callPackage ../applications/networking/cluster/roxctl { 31631 31639 }; ··· 35999 36007 36000 36008 molden = callPackage ../applications/science/chemistry/molden { }; 36001 36009 36010 + mopac = callPackage ../applications/science/chemistry/mopac { }; 36011 + 36002 36012 octopus = callPackage ../applications/science/chemistry/octopus { }; 36003 36013 36004 36014 openlp = libsForQt5.callPackage ../applications/misc/openlp { }; ··· 36022 36032 siesta = callPackage ../applications/science/chemistry/siesta { }; 36023 36033 36024 36034 siesta-mpi = callPackage ../applications/science/chemistry/siesta { useMpi = true; }; 36035 + 36036 + wxmacmolplt = callPackage ../applications/science/chemistry/wxmacmolplt { }; 36025 36037 36026 36038 ### SCIENCE/GEOMETRY 36027 36039 ··· 38183 38195 jx = callPackage ../applications/networking/cluster/jx {}; 38184 38196 38185 38197 prow = callPackage ../applications/networking/cluster/prow { }; 38198 + 38199 + pv-migrate = callPackage ../applications/networking/cluster/pv-migrate { }; 38186 38200 38187 38201 tagref = callPackage ../tools/misc/tagref { }; 38188 38202
+4
pkgs/top-level/darwin-packages.nix
··· 170 170 171 171 opencflite = callPackage ../os-specific/darwin/opencflite { }; 172 172 173 + openwith = pkgs.darwin.apple_sdk_11_0.callPackage ../os-specific/darwin/openwith { 174 + inherit (apple_sdk_11_0.frameworks) AppKit Foundation UniformTypeIdentifiers; 175 + }; 176 + 173 177 stubs = pkgs.callPackages ../os-specific/darwin/stubs { }; 174 178 175 179 trash = callPackage ../os-specific/darwin/trash { };
+8
pkgs/top-level/python-packages.nix
··· 1101 1101 1102 1102 babelgladeextractor = callPackage ../development/python-modules/babelgladeextractor { }; 1103 1103 1104 + bambi = callPackage ../development/python-modules/bambi { }; 1105 + 1104 1106 pad4pi = callPackage ../development/python-modules/pad4pi { }; 1105 1107 1106 1108 pulumi = callPackage ../development/python-modules/pulumi { inherit (pkgs) pulumi; }; ··· 1217 1219 behave = callPackage ../development/python-modules/behave { }; 1218 1220 1219 1221 bellows = callPackage ../development/python-modules/bellows { }; 1222 + 1223 + bencode-py = callPackage ../development/python-modules/bencode-py { }; 1220 1224 1221 1225 bencoder = callPackage ../development/python-modules/bencoder { }; 1222 1226 ··· 3568 3572 forecast-solar = callPackage ../development/python-modules/forecast-solar { }; 3569 3573 3570 3574 formbox = callPackage ../development/python-modules/formbox { }; 3575 + 3576 + formulae = callPackage ../development/python-modules/formulae { }; 3571 3577 3572 3578 fortiosapi = callPackage ../development/python-modules/fortiosapi { }; 3573 3579 ··· 10879 10885 }; 10880 10886 10881 10887 sphinxcontrib-websupport = callPackage ../development/python-modules/sphinxcontrib-websupport { }; 10888 + 10889 + sphinxcontrib-youtube = callPackage ../development/python-modules/sphinxcontrib-youtube { }; 10882 10890 10883 10891 sphinx = callPackage ../development/python-modules/sphinx { }; 10884 10892