Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
bf39715f f8a407fe

+996 -258
+19
nixos/doc/manual/from_md/release-notes/rl-2111.section.xml
··· 100 100 Notes</link> for details. 101 101 </para> 102 102 </listitem> 103 + <listitem> 104 + <para> 105 + LXD support was greatly improved: 106 + </para> 107 + <itemizedlist spacing="compact"> 108 + <listitem> 109 + <para> 110 + building LXD images from configurations is now directly 111 + possible with just nixpkgs 112 + </para> 113 + </listitem> 114 + <listitem> 115 + <para> 116 + hydra is now building nixOS LXD images that can be used 117 + standalone with full nixos-rebuild support 118 + </para> 119 + </listitem> 120 + </itemizedlist> 121 + </listitem> 103 122 </itemizedlist> 104 123 </section> 105 124 <section xml:id="sec-release-21.11-new-services">
+4
nixos/doc/manual/release-notes/rl-2111.section.md
··· 35 35 36 36 - GNOME has been upgraded to 41. Please take a look at their [Release Notes](https://help.gnome.org/misc/release-notes/41.0/) for details. 37 37 38 + - LXD support was greatly improved: 39 + - building LXD images from configurations is now directly possible with just nixpkgs 40 + - hydra is now building nixOS LXD images that can be used standalone with full nixos-rebuild support 41 + 38 42 ## New Services {#sec-release-21.11-new-services} 39 43 40 44 - [btrbk](https://digint.ch/btrbk/index.html), a backup tool for btrfs subvolumes, taking advantage of btrfs specific capabilities to create atomic snapshots and transfer them incrementally to your backup locations. Available as [services.btrbk](options.html#opt-services.brtbk.instances).
+102
nixos/maintainers/scripts/lxd/lxd-image-inner.nix
··· 1 + # Edit this configuration file to define what should be installed on 2 + # your system. Help is available in the configuration.nix(5) man page 3 + # and in the NixOS manual (accessible by running ‘nixos-help’). 4 + 5 + { config, pkgs, lib, ... }: 6 + 7 + with lib; 8 + 9 + { 10 + imports = 11 + [ # Include the default lxd configuration. 12 + ../../../modules/virtualisation/lxc-container.nix 13 + # Include the container-specific autogenerated configuration. 14 + ./lxd.nix 15 + ]; 16 + 17 + # networking.hostName = mkForce "nixos"; # Overwrite the hostname. 18 + # networking.wireless.enable = true; # Enables wireless support via wpa_supplicant. 19 + 20 + # Set your time zone. 21 + # time.timeZone = "Europe/Amsterdam"; 22 + 23 + # The global useDHCP flag is deprecated, therefore explicitly set to false here. 24 + # Per-interface useDHCP will be mandatory in the future, so this generated config 25 + # replicates the default behaviour. 26 + networking.useDHCP = false; 27 + networking.interfaces.eth0.useDHCP = true; 28 + 29 + # Configure network proxy if necessary 30 + # networking.proxy.default = "http://user:password@proxy:port/"; 31 + # networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain"; 32 + 33 + # Select internationalisation properties. 34 + # i18n.defaultLocale = "en_US.UTF-8"; 35 + # console = { 36 + # font = "Lat2-Terminus16"; 37 + # keyMap = "us"; 38 + # }; 39 + 40 + # Enable the X11 windowing system. 41 + # services.xserver.enable = true; 42 + 43 + # Configure keymap in X11 44 + # services.xserver.layout = "us"; 45 + # services.xserver.xkbOptions = "eurosign:e"; 46 + 47 + # Enable CUPS to print documents. 48 + # services.printing.enable = true; 49 + 50 + # Enable sound. 51 + # sound.enable = true; 52 + # hardware.pulseaudio.enable = true; 53 + 54 + # Enable touchpad support (enabled default in most desktopManager). 55 + # services.xserver.libinput.enable = true; 56 + 57 + # Define a user account. Don't forget to set a password with ‘passwd’. 58 + # users.users.jane = { 59 + # isNormalUser = true; 60 + # extraGroups = [ "wheel" ]; # Enable ‘sudo’ for the user. 61 + # }; 62 + 63 + # List packages installed in system profile. To search, run: 64 + # $ nix search wget 65 + # environment.systemPackages = with pkgs; [ 66 + # vim # Do not forget to add an editor to edit configuration.nix! The Nano editor is also installed by default. 67 + # wget 68 + # firefox 69 + # ]; 70 + 71 + # Some programs need SUID wrappers, can be configured further or are 72 + # started in user sessions. 73 + # programs.mtr.enable = true; 74 + # programs.gnupg.agent = { 75 + # enable = true; 76 + # enableSSHSupport = true; 77 + # }; 78 + 79 + # List services that you want to enable: 80 + 81 + # Enable the OpenSSH daemon. 82 + # services.openssh.enable = true; 83 + 84 + # Open ports in the firewall. 85 + # networking.firewall.allowedTCPPorts = [ ... ]; 86 + # networking.firewall.allowedUDPPorts = [ ... ]; 87 + # Or disable the firewall altogether. 88 + # networking.firewall.enable = false; 89 + 90 + # This value determines the NixOS release from which the default 91 + # settings for stateful data, like file locations and database versions 92 + # on your system were taken. It‘s perfectly fine and recommended to leave 93 + # this value at the release version of the first install of this system. 94 + # Before changing this value read the documentation for this option 95 + # (e.g. man configuration.nix or on https://nixos.org/nixos/options.html). 96 + system.stateVersion = "21.05"; # Did you read the comment? 97 + 98 + # As this is intended as a stadalone image, undo some of the minimal profile stuff 99 + documentation.enable = true; 100 + documentation.nixos.enable = true; 101 + environment.noXlibs = false; 102 + }
+34
nixos/maintainers/scripts/lxd/lxd-image.nix
··· 1 + { lib, config, pkgs, ... }: 2 + 3 + with lib; 4 + 5 + { 6 + imports = [ 7 + ../../../modules/virtualisation/lxc-container.nix 8 + ]; 9 + 10 + virtualisation.lxc.templates.nix = { 11 + enable = true; 12 + target = "/etc/nixos/lxd.nix"; 13 + template = ./nix.tpl; 14 + when = [ "create" "copy" ]; 15 + }; 16 + 17 + # copy the config for nixos-rebuild 18 + system.activationScripts.config = '' 19 + if [ ! -e /etc/nixos/configuration.nix ]; then 20 + mkdir -p /etc/nixos 21 + cat ${./lxd-image-inner.nix} > /etc/nixos/configuration.nix 22 + sed 's|../../../modules/virtualisation/lxc-container.nix|<nixpkgs/nixos/modules/virtualisation/lxc-container.nix>|g' -i /etc/nixos/configuration.nix 23 + fi 24 + ''; 25 + 26 + # Network 27 + networking.useDHCP = false; 28 + networking.interfaces.eth0.useDHCP = true; 29 + 30 + # As this is intended as a stadalone image, undo some of the minimal profile stuff 31 + documentation.enable = true; 32 + documentation.nixos.enable = true; 33 + environment.noXlibs = false; 34 + }
+9
nixos/maintainers/scripts/lxd/nix.tpl
··· 1 + { lib, config, pkgs, ... }: 2 + 3 + with lib; 4 + 5 + # WARNING: THIS CONFIGURATION IS AUTOGENERATED AND WILL BE OVERWRITTEN AUTOMATICALLY 6 + 7 + { 8 + networking.hostName = "{{ container.name }}"; 9 + }
+2 -2
nixos/modules/services/finance/odoo.nix
··· 22 22 type = with types; listOf package; 23 23 default = []; 24 24 example = literalExpression "[ pkgs.odoo_enterprise ]"; 25 - description = "Odoo addons"; 25 + description = "Odoo addons."; 26 26 }; 27 27 28 28 settings = mkOption { 29 29 type = format.type; 30 30 default = {}; 31 31 description = '' 32 - Odoo configuration settings. For more details see https://www.odoo.com/documentation/15.0/administration/install/deploy.html 32 + Odoo configuration settings. For more details see <link xlink:href="https://www.odoo.com/documentation/15.0/administration/install/deploy.html"/> 33 33 ''; 34 34 }; 35 35
+78 -2
nixos/modules/services/monitoring/unifi-poller.nix
··· 6 6 cfg = config.services.unifi-poller; 7 7 8 8 configFile = pkgs.writeText "unifi-poller.json" (generators.toJSON {} { 9 - inherit (cfg) poller influxdb prometheus unifi; 9 + inherit (cfg) poller influxdb loki prometheus unifi; 10 10 }); 11 11 12 12 in { ··· 118 118 }; 119 119 }; 120 120 121 + loki = { 122 + url = mkOption { 123 + type = types.str; 124 + default = ""; 125 + description = '' 126 + URL of the Loki host. 127 + ''; 128 + }; 129 + user = mkOption { 130 + type = types.str; 131 + default = ""; 132 + description = '' 133 + Username for Loki. 134 + ''; 135 + }; 136 + pass = mkOption { 137 + type = types.path; 138 + default = pkgs.writeText "unifi-poller-loki-default.password" ""; 139 + defaultText = "unifi-poller-influxdb-default.password"; 140 + description = '' 141 + Path of a file containing the password for Loki. 142 + This file needs to be readable by the unifi-poller user. 143 + ''; 144 + apply = v: "file://${v}"; 145 + }; 146 + verify_ssl = mkOption { 147 + type = types.bool; 148 + default = false; 149 + description = '' 150 + Verify Loki's certificate. 151 + ''; 152 + }; 153 + tenant_id = mkOption { 154 + type = types.str; 155 + default = ""; 156 + description = '' 157 + Tenant ID to use in Loki. 158 + ''; 159 + }; 160 + interval = mkOption { 161 + type = types.str; 162 + default = "2m"; 163 + description = '' 164 + How often the events are polled and pushed to Loki. 165 + ''; 166 + }; 167 + timeout = mkOption { 168 + type = types.str; 169 + default = "10s"; 170 + description = '' 171 + Should be increased in case of timeout errors. 172 + ''; 173 + }; 174 + }; 175 + 121 176 unifi = let 122 177 controllerOptions = { 123 178 user = mkOption { ··· 157 212 type = types.bool; 158 213 default = false; 159 214 description = '' 160 - Collect and save data from the intrusion detection system to influxdb. 215 + Collect and save data from the intrusion detection system to influxdb and Loki. 216 + ''; 217 + }; 218 + save_events = mkOption { 219 + type = types.bool; 220 + default = false; 221 + description = '' 222 + Collect and save data from UniFi events to influxdb and Loki. 223 + ''; 224 + }; 225 + save_alarms = mkOption { 226 + type = types.bool; 227 + default = false; 228 + description = '' 229 + Collect and save data from UniFi alarms to influxdb and Loki. 230 + ''; 231 + }; 232 + save_anomalies = mkOption { 233 + type = types.bool; 234 + default = false; 235 + description = '' 236 + Collect and save data from UniFi anomalies to influxdb and Loki. 161 237 ''; 162 238 }; 163 239 save_dpi = mkOption {
+1 -1
nixos/modules/system/boot/systemd.nix
··· 42 42 "systemd-udevd-kernel.socket" 43 43 "systemd-udevd.service" 44 44 "systemd-udev-settle.service" 45 - "systemd-udev-trigger.service" 45 + ] ++ (optional (!config.boot.isContainer) "systemd-udev-trigger.service") ++ [ 46 46 # hwdb.bin is managed by NixOS 47 47 # "systemd-hwdb-update.service" 48 48
+4 -2
nixos/modules/tasks/filesystems/zfs.nix
··· 561 561 then cfgZfs.requestEncryptionCredentials 562 562 else cfgZfs.requestEncryptionCredentials != []) '' 563 563 ${cfgZfs.package}/sbin/zfs list -rHo name,keylocation ${pool} | while IFS=$'\t' read ds kl; do 564 - (${optionalString (!isBool cfgZfs.requestEncryptionCredentials) '' 564 + { 565 + ${optionalString (!isBool cfgZfs.requestEncryptionCredentials) '' 565 566 if ! echo '${concatStringsSep "\n" cfgZfs.requestEncryptionCredentials}' | grep -qFx "$ds"; then 566 567 continue 567 568 fi ··· 575 576 * ) 576 577 ${cfgZfs.package}/sbin/zfs load-key "$ds" 577 578 ;; 578 - esac) < /dev/null # To protect while read ds kl in case anything reads stdin 579 + esac 580 + } < /dev/null # To protect while read ds kl in case anything reads stdin 579 581 done 580 582 ''} 581 583 echo "Successfully imported ${pool}"
+161 -13
nixos/modules/virtualisation/lxc-container.nix
··· 1 - { lib, ... }: 1 + { lib, config, pkgs, ... }: 2 2 3 3 with lib; 4 4 5 + let 6 + templateSubmodule = { ... }: { 7 + options = { 8 + enable = mkEnableOption "this template"; 9 + 10 + target = mkOption { 11 + description = "Path in the container"; 12 + type = types.path; 13 + }; 14 + template = mkOption { 15 + description = ".tpl file for rendering the target"; 16 + type = types.path; 17 + }; 18 + when = mkOption { 19 + description = "Events which trigger a rewrite (create, copy)"; 20 + type = types.listOf (types.str); 21 + }; 22 + properties = mkOption { 23 + description = "Additional properties"; 24 + type = types.attrs; 25 + default = {}; 26 + }; 27 + }; 28 + }; 29 + 30 + toYAML = name: data: pkgs.writeText name (generators.toYAML {} data); 31 + 32 + cfg = config.virtualisation.lxc; 33 + templates = if cfg.templates != {} then let 34 + list = mapAttrsToList (name: value: { inherit name; } // value) 35 + (filterAttrs (name: value: value.enable) cfg.templates); 36 + in 37 + { 38 + files = map (tpl: { 39 + source = tpl.template; 40 + target = "/templates/${tpl.name}.tpl"; 41 + }) list; 42 + properties = listToAttrs (map (tpl: nameValuePair tpl.target { 43 + when = tpl.when; 44 + template = "${tpl.name}.tpl"; 45 + properties = tpl.properties; 46 + }) list); 47 + } 48 + else { files = []; properties = {}; }; 49 + 50 + in 5 51 { 6 52 imports = [ 7 - ../profiles/docker-container.nix # FIXME, shouldn't include something from profiles/ 53 + ../installer/cd-dvd/channel.nix 54 + ../profiles/minimal.nix 55 + ../profiles/clone-config.nix 8 56 ]; 9 57 10 - # Allow the user to login as root without password. 11 - users.users.root.initialHashedPassword = mkOverride 150 ""; 58 + options = { 59 + virtualisation.lxc = { 60 + templates = mkOption { 61 + description = "Templates for LXD"; 62 + type = types.attrsOf (types.submodule (templateSubmodule)); 63 + default = {}; 64 + example = literalExample '' 65 + { 66 + # create /etc/hostname on container creation 67 + "hostname" = { 68 + enable = true; 69 + target = "/etc/hostname"; 70 + template = builtins.writeFile "hostname.tpl" "{{ container.name }}"; 71 + when = [ "create" ]; 72 + }; 73 + # create /etc/nixos/hostname.nix with a configuration for keeping the hostname applied 74 + "hostname-nix" = { 75 + enable = true; 76 + target = "/etc/nixos/hostname.nix"; 77 + template = builtins.writeFile "hostname-nix.tpl" "{ ... }: { networking.hostName = "{{ container.name }}"; }"; 78 + # copy keeps the file updated when the container is changed 79 + when = [ "create" "copy" ]; 80 + }; 81 + # copy allow the user to specify a custom configuration.nix 82 + "configuration-nix" = { 83 + enable = true; 84 + target = "/etc/nixos/configuration.nix"; 85 + template = builtins.writeFile "configuration-nix" "{{ config_get(\"user.user-data\", properties.default) }}"; 86 + when = [ "create" ]; 87 + }; 88 + }; 89 + ''; 90 + }; 91 + }; 92 + }; 12 93 13 - # Some more help text. 14 - services.getty.helpLine = 15 - '' 94 + config = { 95 + boot.isContainer = true; 96 + boot.postBootCommands = 97 + '' 98 + # After booting, register the contents of the Nix store in the Nix 99 + # database. 100 + if [ -f /nix-path-registration ]; then 101 + ${config.nix.package.out}/bin/nix-store --load-db < /nix-path-registration && 102 + rm /nix-path-registration 103 + fi 104 + 105 + # nixos-rebuild also requires a "system" profile 106 + ${config.nix.package.out}/bin/nix-env -p /nix/var/nix/profiles/system --set /run/current-system 107 + ''; 108 + 109 + system.build.metadata = pkgs.callPackage ../../lib/make-system-tarball.nix { 110 + contents = [ 111 + { 112 + source = toYAML "metadata.yaml" { 113 + architecture = builtins.elemAt (builtins.match "^([a-z0-9_]+).+" (toString pkgs.system)) 0; 114 + creation_date = 1; 115 + properties = { 116 + description = "NixOS ${config.system.nixos.codeName} ${config.system.nixos.label} ${pkgs.system}"; 117 + os = "nixos"; 118 + release = "${config.system.nixos.codeName}"; 119 + }; 120 + templates = templates.properties; 121 + }; 122 + target = "/metadata.yaml"; 123 + } 124 + ] ++ templates.files; 125 + }; 126 + 127 + # TODO: build rootfs as squashfs for faster unpack 128 + system.build.tarball = pkgs.callPackage ../../lib/make-system-tarball.nix { 129 + extraArgs = "--owner=0"; 130 + 131 + storeContents = [ 132 + { 133 + object = config.system.build.toplevel; 134 + symlink = "none"; 135 + } 136 + ]; 137 + 138 + contents = [ 139 + { 140 + source = config.system.build.toplevel + "/init"; 141 + target = "/sbin/init"; 142 + } 143 + ]; 144 + 145 + extraCommands = "mkdir -p proc sys dev"; 146 + }; 147 + 148 + # Add the overrides from lxd distrobuilder 149 + systemd.extraConfig = '' 150 + [Service] 151 + ProtectProc=default 152 + ProtectControlGroups=no 153 + ProtectKernelTunables=no 154 + ''; 155 + 156 + # Allow the user to login as root without password. 157 + users.users.root.initialHashedPassword = mkOverride 150 ""; 16 158 17 - Log in as "root" with an empty password. 159 + system.activationScripts.installInitScript = mkForce '' 160 + ln -fs $systemConfig/init /sbin/init 18 161 ''; 19 162 20 - # Containers should be light-weight, so start sshd on demand. 21 - services.openssh.enable = mkDefault true; 22 - services.openssh.startWhenNeeded = mkDefault true; 163 + # Some more help text. 164 + services.getty.helpLine = 165 + '' 166 + 167 + Log in as "root" with an empty password. 168 + ''; 23 169 24 - # Allow ssh connections 25 - networking.firewall.allowedTCPPorts = [ 22 ]; 170 + # Containers should be light-weight, so start sshd on demand. 171 + services.openssh.enable = mkDefault true; 172 + services.openssh.startWhenNeeded = mkDefault true; 173 + }; 26 174 }
+1 -1
nixos/modules/virtualisation/lxd.nix
··· 34 34 35 35 package = mkOption { 36 36 type = types.package; 37 - default = pkgs.lxd.override { nftablesSupport = config.networking.nftables.enable; }; 37 + default = pkgs.lxd; 38 38 defaultText = literalExpression "pkgs.lxd"; 39 39 description = '' 40 40 The LXD package to use.
+31
nixos/release.nix
··· 251 251 252 252 ); 253 253 254 + # An image that can be imported into lxd and used for container creation 255 + lxdImage = forMatchingSystems [ "x86_64-linux" "aarch64-linux" ] (system: 256 + 257 + with import ./.. { inherit system; }; 258 + 259 + hydraJob ((import lib/eval-config.nix { 260 + inherit system; 261 + modules = 262 + [ configuration 263 + versionModule 264 + ./maintainers/scripts/lxd/lxd-image.nix 265 + ]; 266 + }).config.system.build.tarball) 267 + 268 + ); 269 + 270 + # Metadata for the lxd image 271 + lxdMeta = forMatchingSystems [ "x86_64-linux" "aarch64-linux" ] (system: 272 + 273 + with import ./.. { inherit system; }; 274 + 275 + hydraJob ((import lib/eval-config.nix { 276 + inherit system; 277 + modules = 278 + [ configuration 279 + versionModule 280 + ./maintainers/scripts/lxd/lxd-image.nix 281 + ]; 282 + }).config.system.build.metadata) 283 + 284 + ); 254 285 255 286 # Ensure that all packages used by the minimal NixOS config end up in the channel. 256 287 dummy = forAllSystems (system: pkgs.runCommand "dummy"
+1
nixos/tests/all-tests.nix
··· 237 237 login = handleTest ./login.nix {}; 238 238 loki = handleTest ./loki.nix {}; 239 239 lxd = handleTest ./lxd.nix {}; 240 + lxd-image = handleTest ./lxd-image.nix {}; 240 241 lxd-nftables = handleTest ./lxd-nftables.nix {}; 241 242 #logstash = handleTest ./logstash.nix {}; 242 243 lorri = handleTest ./lorri/default.nix {};
+91
nixos/tests/lxd-image.nix
··· 1 + # This test ensures that the nixOS lxd images builds and functions properly 2 + # It has been extracted from `lxd.nix` to seperate failures of just the image and the lxd software 3 + 4 + import ./make-test-python.nix ({ pkgs, ...} : let 5 + release = import ../release.nix { 6 + /* configuration = { 7 + environment.systemPackages = with pkgs; [ stdenv ]; # inject stdenv so rebuild test works 8 + }; */ 9 + }; 10 + 11 + metadata = release.lxdMeta.${pkgs.system}; 12 + image = release.lxdImage.${pkgs.system}; 13 + 14 + lxd-config = pkgs.writeText "config.yaml" '' 15 + storage_pools: 16 + - name: default 17 + driver: dir 18 + config: 19 + source: /var/lxd-pool 20 + 21 + networks: 22 + - name: lxdbr0 23 + type: bridge 24 + config: 25 + ipv4.address: auto 26 + ipv6.address: none 27 + 28 + profiles: 29 + - name: default 30 + devices: 31 + eth0: 32 + name: eth0 33 + network: lxdbr0 34 + type: nic 35 + root: 36 + path: / 37 + pool: default 38 + type: disk 39 + ''; 40 + in { 41 + name = "lxd-image"; 42 + 43 + meta = with pkgs.lib.maintainers; { 44 + maintainers = [ mkg20001 ]; 45 + }; 46 + 47 + machine = { lib, ... }: { 48 + virtualisation = { 49 + # OOMs otherwise 50 + memorySize = 1024; 51 + # disk full otherwise 52 + diskSize = 2048; 53 + 54 + lxc.lxcfs.enable = true; 55 + lxd.enable = true; 56 + }; 57 + }; 58 + 59 + testScript = '' 60 + machine.wait_for_unit("sockets.target") 61 + machine.wait_for_unit("lxd.service") 62 + machine.wait_for_file("/var/lib/lxd/unix.socket") 63 + 64 + # It takes additional second for lxd to settle 65 + machine.sleep(1) 66 + 67 + # lxd expects the pool's directory to already exist 68 + machine.succeed("mkdir /var/lxd-pool") 69 + 70 + machine.succeed( 71 + "cat ${lxd-config} | lxd init --preseed" 72 + ) 73 + 74 + # TODO: test custom built container aswell 75 + 76 + with subtest("importing container works"): 77 + machine.succeed("lxc image import ${metadata}/*/*.tar.xz ${image}/*/*.tar.xz --alias nixos") 78 + 79 + with subtest("launching container works"): 80 + machine.succeed("lxc launch nixos machine -c security.nesting=true") 81 + # make sure machine boots up properly 82 + machine.sleep(5) 83 + 84 + with subtest("container shell works"): 85 + machine.succeed("echo true | lxc exec machine /run/current-system/sw/bin/bash -") 86 + machine.succeed("lxc exec machine /run/current-system/sw/bin/true") 87 + 88 + # with subtest("rebuilding works"): 89 + # machine.succeed("lxc exec machine /run/current-system/sw/bin/nixos-rebuild switch") 90 + ''; 91 + })
+3 -9
pkgs/applications/finance/odoo/default.nix
··· 3 3 , fetchurl 4 4 , python3 5 5 , python3Packages 6 + , nodePackages 6 7 , wkhtmltopdf 7 8 }: 8 9 9 10 with python3Packages; 10 - 11 - /* 12 - 13 - TODO: 14 - For languages with right-to-left interface (such as Arabic or Hebrew), the package rtlcss is needed: 15 - $ sudo npm install -g rtlcss 16 - 17 - */ 18 11 19 12 buildPythonApplication rec { 20 13 pname = "odoo"; ··· 40 33 41 34 buildInputs = [ 42 35 wkhtmltopdf 36 + nodePackages.rtlcss 43 37 ]; 44 38 45 39 # needs some investigation 46 40 doCheck = false; 47 41 48 - makeWrapperArgs = [ "--prefix" "PATH" ":" "${wkhtmltopdf}/bin" ]; 42 + makeWrapperArgs = [ "--prefix" "PATH" ":" "${lib.makeBinPath [ wkhtmltopdf nodePackages.rtlcss ]}" ]; 49 43 50 44 propagatedBuildInputs = [ 51 45 Babel
+1
pkgs/applications/graphics/graphicsmagick/default.nix
··· 45 45 description = "Swiss army knife of image processing"; 46 46 license = lib.licenses.mit; 47 47 platforms = lib.platforms.all; 48 + mainProgram = "gm"; 48 49 }; 49 50 }
+2 -2
pkgs/applications/misc/barrier/default.nix
··· 5 5 6 6 mkDerivation rec { 7 7 pname = "barrier"; 8 - version = "2.3.3"; 8 + version = "2.4.0"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "debauchee"; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - sha256 = "11vqkzpcjiv3pq6ps022223j6skgm1d23dj18n4a5nsf53wsvvp4"; 14 + sha256 = "sha256-2tHqLF3zS3C4UnOVIZfpcuzaemC9++nC7lXgFnFSfKU="; 15 15 fetchSubmodules = true; 16 16 }; 17 17
+2 -2
pkgs/applications/misc/seatd/default.nix
··· 10 10 11 11 stdenv.mkDerivation rec { 12 12 pname = "seatd"; 13 - version = "0.6.2"; 13 + version = "0.6.3"; 14 14 15 15 src = fetchFromSourcehut { 16 16 owner = "~kennylevinsen"; 17 17 repo = "seatd"; 18 18 rev = version; 19 - sha256 = "0c07i1nq0k60xmcsnr37ryqs7nzbg4qfq6fzbnzwbh1yhr8kypcm"; 19 + sha256 = "sha256-LLRGi3IACqaIHExLhALnUeiPyUnlhAJzsMFE2p+QSp4="; 20 20 }; 21 21 22 22 outputs = [ "bin" "out" "dev" "man" ];
+2 -2
pkgs/applications/networking/cluster/k0sctl/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "k0sctl"; 8 - version = "0.10.4"; 8 + version = "0.11.4"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "k0sproject"; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-22jZWRnymIYN1LlGOo8abVx8DTUe9VK1xAHddLknt6A="; 14 + sha256 = "sha256-Fk1aYSa3LqzxiHtlzH5pcNtodOprjfnCFh4UMqCa6Rc="; 15 15 }; 16 16 17 17 vendorSha256 = "sha256-N4cU9wzBRZn71mZHkNDXKgSXvlN2QFS6K4MtlR25DJc=";
+2 -2
pkgs/applications/networking/cluster/kubernetes/default.nix
··· 21 21 22 22 stdenv.mkDerivation rec { 23 23 pname = "kubernetes"; 24 - version = "1.22.2"; 24 + version = "1.22.3"; 25 25 26 26 src = fetchFromGitHub { 27 27 owner = "kubernetes"; 28 28 repo = "kubernetes"; 29 29 rev = "v${version}"; 30 - sha256 = "sha256-O+FY9wJ0fztO7i5qJfw+cfhfBgaMWKX7IBBXJV4uuCk="; 30 + sha256 = "sha256-yXis1nq36MO/RnYLxOYBs6xnaTf9lk+VJBzSamrHcEU="; 31 31 }; 32 32 33 33 nativeBuildInputs = [ removeReferencesTo makeWrapper which go rsync installShellFiles ];
+2 -2
pkgs/applications/networking/instant-messengers/signal-cli/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "signal-cli"; 5 - version = "0.9.0"; 5 + version = "0.9.2"; 6 6 7 7 # Building from source would be preferred, but is much more involved. 8 8 src = fetchurl { 9 9 url = "https://github.com/AsamK/signal-cli/releases/download/v${version}/signal-cli-${version}.tar.gz"; 10 - sha256 = "sha256-wk8kk+PG0nw2OE7mccGjP435SEytStRy1unxg6EqP/8="; 10 + sha256 = "sha256-CumrIlOPmvQ3x7Ua5I2G7ZlTSAbhLgAQMPUg4I5WCeQ="; 11 11 }; 12 12 13 13 buildInputs = lib.optionals stdenv.isLinux [ libmatthew_java dbus dbus_java ];
+3 -3
pkgs/applications/networking/sync/rclone/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "rclone"; 8 - version = "1.56.2"; 8 + version = "1.57.0"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = pname; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-cEh1SgIOgX04ECEF0K2pvwJdugapoUzh8xbboRaMdTs="; 14 + sha256 = "0pwbprbkx5y0c93b61k8znan4aimk7dkssapjhkhzw4c38xd4lza"; 15 15 }; 16 16 17 - vendorSha256 = "sha256-wQYVn8yGDIYlnlVTS7tiLEMwkNLF6p3OcY35nw1mvA8="; 17 + vendorSha256 = "0353pff07lwpa1jmi095kb2izcw09z73x6nninnnpyqppwzas6ha"; 18 18 19 19 subPackages = [ "." ]; 20 20
+2 -2
pkgs/applications/radio/sdrangel/default.nix
··· 33 33 34 34 mkDerivation rec { 35 35 pname = "sdrangel"; 36 - version = "6.17.1"; 36 + version = "6.17.2"; 37 37 38 38 src = fetchFromGitHub { 39 39 owner = "f4exb"; 40 40 repo = "sdrangel"; 41 41 rev = "v${version}"; 42 - sha256 = "sha256-VWHFrgJVyI3CtLXUiG3/4/cRTD8jSdunbrro34yLKvs="; 42 + sha256 = "sha256-sMD2JTJJlssMdXCUHdFYjEqGknhGGuG4szfnvFFN7t4="; 43 43 fetchSubmodules = false; 44 44 }; 45 45
+11 -10
pkgs/applications/science/biology/obitools/obitools3.nix
··· 1 - { lib, fetchurl, python3Packages, cmake, python3 }: 2 - 3 - let 4 - pythonPackages = python3Packages; 5 - in 1 + { stdenv, lib, fetchurl, python3Packages, cmake, python3 }: 6 2 7 - pythonPackages.buildPythonApplication rec { 3 + python3Packages.buildPythonApplication rec { 8 4 pname = "obitools3"; 9 5 version = "3.0.1b11"; 10 6 ··· 13 9 sha256 = "1x7a0nrr9agg1pfgq8i1j8r1p6c0jpyxsv196ylix1dd2iivmas1"; 14 10 }; 15 11 12 + disabled = python3Packages.pythonOlder "3.5"; 13 + 14 + nativeBuildInputs = [ python3Packages.cython cmake ]; 15 + 16 + postPatch = lib.optionalString stdenv.isAarch64 '' 17 + substituteInPlace setup.py \ 18 + --replace "'-msse2'," "" 19 + ''; 20 + 16 21 preBuild = '' 17 22 substituteInPlace src/CMakeLists.txt --replace \$'{PYTHONLIB}' "$out/lib/${python3.libPrefix}/site-packages"; 18 23 export NIX_CFLAGS_COMPILE="-L $out/lib/${python3.libPrefix}/site-packages $NIX_CFLAGS_COMPILE" 19 24 ''; 20 - 21 - disabled = !pythonPackages.isPy3k; 22 - 23 - nativeBuildInputs = [ pythonPackages.cython cmake ]; 24 25 25 26 dontConfigure = true; 26 27
+8 -5
pkgs/applications/system/pantheon-tweaks/default.nix
··· 14 14 15 15 stdenv.mkDerivation rec { 16 16 pname = "pantheon-tweaks"; 17 - version = "1.0.1"; 17 + version = "1.0.2"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "pantheon-tweaks"; 21 21 repo = pname; 22 22 rev = version; 23 - sha256 = "sha256-tAfDxX/RD7pO5PN/LaZ92Cj/iZtBI/EHb0+pORfYnPM="; 23 + sha256 = "sha256-2spZ6RQ5PhBNrv/xG1TNbYsJrmuRpaZ72CeH2s8+P8g="; 24 24 }; 25 25 26 26 patches = [ ··· 38 38 buildInputs = [ 39 39 gtk3 40 40 libgee 41 - pantheon.granite 42 - pantheon.switchboard 43 - ]; 41 + ] ++ (with pantheon; [ 42 + elementary-files # settings schemas 43 + elementary-terminal # settings schemas 44 + granite 45 + switchboard 46 + ]); 44 47 45 48 postPatch = '' 46 49 chmod +x meson/post_install.py
+2 -2
pkgs/applications/version-management/git-and-tools/stgit/default.nix
··· 12 12 13 13 python3Packages.buildPythonApplication rec { 14 14 pname = "stgit"; 15 - version = "1.3"; 15 + version = "1.4"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "stacked-git"; 19 19 repo = "stgit"; 20 20 rev = "v${version}"; 21 - sha256 = "0wa3ba7afnbb1h08n9xr0cqsg93rx0qd9jv8a34mmpp0lpijmjw6"; 21 + sha256 = "0yx81d61kp33h7n0c14wvcrh8vvjjjq4xjh1qwq2sdbmqc43p3hg"; 22 22 }; 23 23 24 24 nativeBuildInputs = [ installShellFiles asciidoc xmlto docbook_xsl docbook_xml_dtd_45 ];
+3 -3
pkgs/applications/version-management/mercurial/default.nix
··· 13 13 14 14 self = python3Packages.buildPythonApplication rec { 15 15 pname = "mercurial"; 16 - version = "5.9.1"; 16 + version = "5.9.3"; 17 17 18 18 src = fetchurl { 19 19 url = "https://mercurial-scm.org/release/mercurial-${version}.tar.gz"; 20 - sha256 = "09wzyhyajy1dbp5kxkmvs9x8jk964wri19p5jgf83mv27i1zkvrj"; 20 + sha256 = "sha256-O0P2iXetD6dap/HlyPCoO6k1YhqyOWEpq7SY5W0b4I4="; 21 21 }; 22 22 23 23 format = "other"; ··· 27 27 cargoDeps = if rustSupport then rustPlatform.fetchCargoTarball { 28 28 inherit src; 29 29 name = "${pname}-${version}"; 30 - sha256 = "1f7q0kmp46rphw38rlzh1yvpn3rdjdnzzbxzjkrjks8n1gm8baca"; 30 + sha256 = "sha256:1d911jaawdrcv2mdhlp2ylr10791zj7dhb69aiw5yy7vn7gry82n"; 31 31 sourceRoot = "${pname}-${version}/rust"; 32 32 } else null; 33 33 cargoRoot = if rustSupport then "rust" else null;
+2 -2
pkgs/applications/virtualization/catatonit/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "catatonit"; 5 - version = "0.1.6"; 5 + version = "0.1.7"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "openSUSE"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-hokG6o7toZxU984EvIlne33Aa2EZVZ3qu1jTZMm5nt4="; 11 + sha256 = "sha256-jX4fYC/rpfd3ro2UZ6OEu4kU5wpusOwmEVPWEjxwlW4="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ autoreconfHook ];
+3 -4
pkgs/applications/window-managers/river/default.nix
··· 19 19 20 20 stdenv.mkDerivation rec { 21 21 pname = "river"; 22 - version = "unstable-2021-11-01"; 22 + version = "0.1.0"; 23 23 24 24 src = fetchFromGitHub { 25 25 owner = "ifreund"; 26 26 repo = pname; 27 - rev = "363fd3f6a466004eec157a40e51684e56992b857"; 28 - sha256 = "sha256-RzReUo1p2z4UQaO5n6PKQlEv0vTBGg+1Wq1UIYii0Mo="; 27 + rev = "v${version}"; 28 + sha256 = "03pdgrcpj8db9s14249815z76dyjwwma8xv6p9hpw79flk6rk7v7"; 29 29 fetchSubmodules = true; 30 30 }; 31 31 ··· 34 34 buildInputs = [ 35 35 wayland-protocols 36 36 wlroots 37 - pixman 38 37 libxkbcommon 39 38 pixman 40 39 udev
+2 -2
pkgs/data/documentation/execline-man-pages/default.nix
··· 2 2 3 3 buildManPages { 4 4 pname = "execline-man-pages"; 5 - version = "2.8.1.0.2"; 6 - sha256 = "1fl3pyjh9328l1h2b6s08j048jl4pfyyc24mjs45qx545kcp65q4"; 5 + version = "2.8.1.0.3"; 6 + sha256 = "1n7c75lmyrjzzcbwjl6fxhfs4k29qlr66r1q35799h942cn4li7v"; 7 7 description = "Port of the documentation for the execline suite to mdoc"; 8 8 maintainers = [ lib.maintainers.sternenseemann ]; 9 9 }
+4 -7
pkgs/data/fonts/public-sans/default.nix
··· 1 1 { lib, fetchzip }: 2 2 3 3 let 4 - version = "1.008"; 4 + version = "2.000"; 5 5 in fetchzip { 6 6 name = "public-sans-${version}"; 7 7 ··· 9 9 10 10 postFetch = '' 11 11 mkdir -p $out/share/fonts 12 - unzip -j $downloadedFile binaries/otf/\*.otf -d $out/share/fonts/opentype 13 - unzip -j $downloadedFile binaries/variable/\*.ttf -d $out/share/fonts/truetype 14 - unzip -j $downloadedFile binaries/webfonts/\*.ttf -d $out/share/fonts/truetype 15 - unzip -j $downloadedFile binaries/webfonts/\*.woff -d $out/share/fonts/woff 16 - unzip -j $downloadedFile binaries/webfonts/\*.woff2 -d $out/share/fonts/woff2 12 + unzip -j $downloadedFile \*.otf -d $out/share/fonts/opentype 13 + unzip -j $downloadedFile \*.ttf -d $out/share/fonts/truetype 17 14 ''; 18 15 19 - sha256 = "1s4xmliri3r1gcn1ws3wa6davj6giliqjdbcv0bh9ryg3dfpjz74"; 16 + sha256 = "0r34h9mim5c3h48cpq2m2ixkdqhv3i594pip10pavkmskldpbha5"; 20 17 21 18 meta = with lib; { 22 19 description = "A strong, neutral, principles-driven, open source typeface for text or display";
+2 -2
pkgs/development/libraries/libpg_query/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libpg_query"; 5 - version = "13-2.0.7"; 5 + version = "13-2.1.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "pganalyze"; 9 9 repo = "libpg_query"; 10 10 rev = version; 11 - sha256 = "sha256-xplp7Z17NlYbXIbBdN7EWDN4numdZUBIIVg5EowFMPA="; 11 + sha256 = "sha256-DpvPmBvpx5pWDlx6T3Kp82ALi6FjOO549Exd8tWXDIk="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ which ];
+2 -2
pkgs/development/libraries/libqalculate/default.nix
··· 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "libqalculate"; 6 - version = "3.20.1"; 6 + version = "3.21.0"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "qalculate"; 10 10 repo = "libqalculate"; 11 11 rev = "v${version}"; 12 - sha256 = "sha256-8SYI8CoeTfZXX0CgLnfl0rHwUZbYM7OGYzFQ41jm5Qs="; 12 + sha256 = "sha256-aKNoLkqpnC+jOvqs7S7SYBu+5VZ+hHHzBkwccg+kYMQ="; 13 13 }; 14 14 15 15 outputs = [ "out" "dev" "doc" ];
+3 -12
pkgs/development/libraries/libsixel/default.nix
··· 3 3 , fetchFromGitHub 4 4 , meson 5 5 , ninja 6 - , libbsd 7 6 , gdk-pixbuf 8 7 , gd 9 8 , libjpeg 10 9 , pkg-config 11 - , fetchpatch 12 10 }: 13 11 stdenv.mkDerivation rec { 14 12 pname = "libsixel"; 15 - version = "1.10.1"; 13 + version = "1.10.3"; 16 14 17 15 src = fetchFromGitHub { 18 16 owner = "libsixel"; 19 17 repo = "libsixel"; 20 18 rev = "v${version}"; 21 - sha256 = "sha256-ACypJTFjXSzBjo4hQzUiJOqnaRaZnYX+/NublN9sbBo="; 19 + sha256 = "1nny4295ipy4ajcxmmh04c796hcds0y7z7rv3qd17mj70y8j0r2d"; 22 20 }; 23 21 24 - patches = [ 25 - (fetchpatch { 26 - url = "https://github.com/libsixel/libsixel/commit/4d3e53ee007f3b71f638875f9fabbba658b2ca8a.patch"; 27 - sha256 = "sha256-iDfsTyUczjtzV3pt1ZErbhVO2rMm2ZYKWSBl+ru+5HA="; 28 - }) 29 - ]; 30 - 31 22 buildInputs = [ 32 - libbsd gdk-pixbuf gd 23 + gdk-pixbuf gd 33 24 ]; 34 25 35 26 nativeBuildInputs = [
+2
pkgs/development/node-packages/node-packages.json
··· 79 79 , "code-theme-converter" 80 80 , "coffee-script" 81 81 , "coinmon" 82 + , "concurrently" 82 83 , "configurable-http-proxy" 83 84 , "conventional-changelog-cli" 84 85 , "cordova" ··· 177 178 , "lua-fmt" 178 179 , "madoko" 179 180 , "markdownlint-cli" 181 + , "markdownlint-cli2" 180 182 , "markdown-link-check" 181 183 , {"markdown-preview-nvim": "../../misc/vim-plugins/markdown-preview-nvim"} 182 184 , "mastodon-bot"
+201 -48
pkgs/development/node-packages/node-packages.nix
··· 9832 9832 sha512 = "2PK+p6dRFuQQM8F4JbBivGetnJxvb8ggQkY7XLeCSl4qVkBeBjX+mRtsiudk28NUTH3JEll7AgmKj2fHfxYpGQ=="; 9833 9833 }; 9834 9834 }; 9835 - "apollo-graphql-0.9.4" = { 9835 + "apollo-graphql-0.9.5" = { 9836 9836 name = "apollo-graphql"; 9837 9837 packageName = "apollo-graphql"; 9838 - version = "0.9.4"; 9838 + version = "0.9.5"; 9839 9839 src = fetchurl { 9840 - url = "https://registry.npmjs.org/apollo-graphql/-/apollo-graphql-0.9.4.tgz"; 9841 - sha512 = "0X2sZxfmn7lJrRknUPBG+L0LP1B0SKX1qtULIWrDbIpyl9LuSyjnDaGtmvc4IQtyKvmQXtAhEHBnprRokkjkyw=="; 9840 + url = "https://registry.npmjs.org/apollo-graphql/-/apollo-graphql-0.9.5.tgz"; 9841 + sha512 = "RGt5k2JeBqrmnwRM0VOgWFiGKlGJMfmiif/4JvdaEqhMJ+xqe/9cfDYzXfn33ke2eWixsAbjEbRfy8XbaN9nTw=="; 9842 9842 }; 9843 9843 }; 9844 9844 "apollo-link-1.2.1" = { ··· 14999 14999 sha512 = "bsTwuIg/BZZK/vreVTYYbSWoe2F+71P7K5QGEX+pT250DZbfU1MQ5prOKpPR+LL6uWKK3KMwMCAS74QB3Um1uw=="; 15000 15000 }; 15001 15001 }; 15002 - "caniuse-lite-1.0.30001274" = { 15002 + "caniuse-lite-1.0.30001275" = { 15003 15003 name = "caniuse-lite"; 15004 15004 packageName = "caniuse-lite"; 15005 - version = "1.0.30001274"; 15005 + version = "1.0.30001275"; 15006 15006 src = fetchurl { 15007 - url = "https://registry.npmjs.org/caniuse-lite/-/caniuse-lite-1.0.30001274.tgz"; 15008 - sha512 = "+Nkvv0fHyhISkiMIjnyjmf5YJcQ1IQHZN6U9TLUMroWR38FNwpsC51Gb68yueafX1V6ifOisInSgP9WJFS13ew=="; 15007 + url = "https://registry.npmjs.org/caniuse-lite/-/caniuse-lite-1.0.30001275.tgz"; 15008 + sha512 = "ihJVvj8RX0kn9GgP43HKhb5q9s2XQn4nEQhdldEJvZhCsuiB2XOq6fAMYQZaN6FPWfsr2qU0cdL0CSbETwbJAg=="; 15009 15009 }; 15010 15010 }; 15011 15011 "canvas-2.8.0" = { ··· 15161 15161 sha512 = "vlNK021QdI7PNeiUh/lKkC/mNHHfV0m/Ad5JoI0TYtlBnJAslM/JIkm/tGC88bkLIwO6OQ5uV6ztS6kVAtCDlg=="; 15162 15162 }; 15163 15163 }; 15164 - "cdk8s-1.1.21" = { 15164 + "cdk8s-1.1.22" = { 15165 15165 name = "cdk8s"; 15166 15166 packageName = "cdk8s"; 15167 - version = "1.1.21"; 15167 + version = "1.1.22"; 15168 15168 src = fetchurl { 15169 - url = "https://registry.npmjs.org/cdk8s/-/cdk8s-1.1.21.tgz"; 15170 - sha512 = "jgPspKVy08Tccc2MioscI0aKU3JmlHlKiYTETvDYtONoitRW76ylK5Im+mX/Zy0nCF0Kwuxs6383RYKjwPaecQ=="; 15169 + url = "https://registry.npmjs.org/cdk8s/-/cdk8s-1.1.22.tgz"; 15170 + sha512 = "Mzhm2kj+z93QrSTH6yzq4M9tDXVsqM5HXnXKaLoDisDcRwjiF3rrqqRHoNhDUKX0wtoYWKy3+o3fyCkzEhVejQ=="; 15171 15171 }; 15172 15172 }; 15173 - "cdk8s-plus-22-1.0.0-beta.28" = { 15173 + "cdk8s-plus-22-1.0.0-beta.29" = { 15174 15174 name = "cdk8s-plus-22"; 15175 15175 packageName = "cdk8s-plus-22"; 15176 - version = "1.0.0-beta.28"; 15176 + version = "1.0.0-beta.29"; 15177 15177 src = fetchurl { 15178 - url = "https://registry.npmjs.org/cdk8s-plus-22/-/cdk8s-plus-22-1.0.0-beta.28.tgz"; 15179 - sha512 = "14QKJGI1PTtf9l5n+r03pDLPerxlS49xGPz2nerGIczUpfFVed5PdoeXWtWRDWjfBjPN2IcGPCy/8gdsmDTVEg=="; 15178 + url = "https://registry.npmjs.org/cdk8s-plus-22/-/cdk8s-plus-22-1.0.0-beta.29.tgz"; 15179 + sha512 = "FgucgLJJujYWYa9KhpSAapCbGn+cpXUyd7n4wZI6vKsai0Pq2fYTid/9iYKOoDbM+Hq4W81T0ythQlVx+HqUeg=="; 15180 15180 }; 15181 15181 }; 15182 15182 "cdktf-0.7.0" = { ··· 34724 34724 sha512 = "F7GLNdoHBAYN4eqw7c6Tv12lqGOoMazsjuXDJRubjjbbwZ0tM6a78rHhrZwE4w1XV7mIkTxKmkj4DnbSIPW8wg=="; 34725 34725 }; 34726 34726 }; 34727 - "jsii-srcmak-0.1.386" = { 34727 + "jsii-srcmak-0.1.387" = { 34728 34728 name = "jsii-srcmak"; 34729 34729 packageName = "jsii-srcmak"; 34730 - version = "0.1.386"; 34730 + version = "0.1.387"; 34731 34731 src = fetchurl { 34732 - url = "https://registry.npmjs.org/jsii-srcmak/-/jsii-srcmak-0.1.386.tgz"; 34733 - sha512 = "cKGLruiv9J6dB8g2PEem2OQtpxG4HsUU5rhaon9J4H58rVaPIEskXVpeUn3/9DJ8hLQSMCV0QUM7JtzG/SeOyg=="; 34732 + url = "https://registry.npmjs.org/jsii-srcmak/-/jsii-srcmak-0.1.387.tgz"; 34733 + sha512 = "c9KlJZRHlBBZa8v46Hw/fMZBrjXyiVQvnRe8//6T8lkBC2gUAys0j3su2pxiIiuX/FxT1r5Zae+oc5VdTGNVlQ=="; 34734 34734 }; 34735 34735 }; 34736 34736 "json-bigint-1.0.0" = { ··· 39196 39196 src = fetchurl { 39197 39197 url = "https://registry.npmjs.org/markdownlint/-/markdownlint-0.24.0.tgz"; 39198 39198 sha512 = "OJIGsGFV/rC9irI5E1FMy6v9hdACSwaa+EN3224Y5KG8zj2EYzdHOw0pOJovIYmjNfEZ9BtxUY4P7uYHTSNnbQ=="; 39199 + }; 39200 + }; 39201 + "markdownlint-cli2-formatter-default-0.0.2" = { 39202 + name = "markdownlint-cli2-formatter-default"; 39203 + packageName = "markdownlint-cli2-formatter-default"; 39204 + version = "0.0.2"; 39205 + src = fetchurl { 39206 + url = "https://registry.npmjs.org/markdownlint-cli2-formatter-default/-/markdownlint-cli2-formatter-default-0.0.2.tgz"; 39207 + sha512 = "jIz1X3SIC8sX4NDFqQFUXL+JEtfnDoN4i+xocEu+etcxGX455pHb6sx86f/yVk4mKJ2o7aNe2ydSx9an22BfBg=="; 39199 39208 }; 39200 39209 }; 39201 39210 "markdownlint-rule-helpers-0.15.0" = { ··· 57004 57013 sha1 = "ff4ae6e68656056ba4b3e792ab3334d38273ca11"; 57005 57014 }; 57006 57015 }; 57016 + "spawn-command-0.0.2" = { 57017 + name = "spawn-command"; 57018 + packageName = "spawn-command"; 57019 + version = "0.0.2"; 57020 + src = fetchurl { 57021 + url = "https://registry.npmjs.org/spawn-command/-/spawn-command-0.0.2.tgz"; 57022 + sha1 = "9544e1a43ca045f8531aac1a48cb29bdae62338e"; 57023 + }; 57024 + }; 57007 57025 "spawn-please-1.0.0" = { 57008 57026 name = "spawn-please"; 57009 57027 packageName = "spawn-please"; ··· 57760 57778 sha512 = "zZ/Q1M+9ZWlrchgh4QauD/MEUFa6eC6H6FYq6T8Of/y82JqsQBLwN6YlzbO09evE7Rx6x0oliXDCnQSjwGwQRA=="; 57761 57779 }; 57762 57780 }; 57763 - "sscaff-1.2.115" = { 57781 + "sscaff-1.2.116" = { 57764 57782 name = "sscaff"; 57765 57783 packageName = "sscaff"; 57766 - version = "1.2.115"; 57784 + version = "1.2.116"; 57767 57785 src = fetchurl { 57768 - url = "https://registry.npmjs.org/sscaff/-/sscaff-1.2.115.tgz"; 57769 - sha512 = "bEjTWtrXR+fOgJ9Oak+zP4DXUBWl3GmZ03QVLkL+/LC8SkfC+1p/+wcMWo2fij9HVTXlhsEgDnDyL7x0BFXf4A=="; 57786 + url = "https://registry.npmjs.org/sscaff/-/sscaff-1.2.116.tgz"; 57787 + sha512 = "ecCtXu5ZXFn4VjrDLTWGIOo/2E8qqso1H5JmwV3eLiuYtl+KUi9DtpwkPqi0tqzXnT48dSUkkaH5s92CW+Q3bw=="; 57770 57788 }; 57771 57789 }; 57772 57790 "ssh-config-1.1.6" = { ··· 71283 71301 sources."buffer-5.7.1" 71284 71302 sources."buffer-from-1.1.2" 71285 71303 sources."callsites-3.1.0" 71286 - sources."caniuse-lite-1.0.30001274" 71304 + sources."caniuse-lite-1.0.30001275" 71287 71305 sources."chalk-3.0.0" 71288 71306 sources."chardet-0.7.0" 71289 71307 sources."chokidar-3.5.2" ··· 71817 71835 sources."ansi-styles-3.2.1" 71818 71836 sources."apollo-cache-control-0.14.0" 71819 71837 sources."apollo-datasource-0.9.0" 71820 - sources."apollo-graphql-0.9.4" 71838 + sources."apollo-graphql-0.9.5" 71821 71839 sources."apollo-link-1.2.14" 71822 71840 sources."apollo-reporting-protobuf-0.8.0" 71823 71841 (sources."apollo-server-caching-0.7.0" // { ··· 71919 71937 sources."call-bind-1.0.2" 71920 71938 sources."call-me-maybe-1.0.1" 71921 71939 sources."camelcase-5.3.1" 71922 - sources."caniuse-lite-1.0.30001274" 71940 + sources."caniuse-lite-1.0.30001275" 71923 71941 sources."caseless-0.12.0" 71924 71942 sources."caw-2.0.1" 71925 71943 sources."chalk-2.4.2" ··· 73061 73079 sources."balanced-match-1.0.2" 73062 73080 sources."brace-expansion-1.1.11" 73063 73081 sources."browserslist-4.17.6" 73064 - sources."caniuse-lite-1.0.30001274" 73082 + sources."caniuse-lite-1.0.30001275" 73065 73083 sources."chalk-2.4.2" 73066 73084 sources."color-convert-1.9.3" 73067 73085 sources."color-name-1.1.3" ··· 73201 73219 }; 73202 73220 dependencies = [ 73203 73221 sources."browserslist-4.17.6" 73204 - sources."caniuse-lite-1.0.30001274" 73222 + sources."caniuse-lite-1.0.30001275" 73205 73223 sources."electron-to-chromium-1.3.887" 73206 73224 sources."escalade-3.1.1" 73207 73225 sources."fraction.js-4.1.1" ··· 76588 76606 sources."call-bind-1.0.2" 76589 76607 sources."camelcase-6.2.0" 76590 76608 sources."case-1.6.3" 76591 - sources."cdk8s-1.1.21" 76592 - sources."cdk8s-plus-22-1.0.0-beta.28" 76609 + sources."cdk8s-1.1.22" 76610 + sources."cdk8s-plus-22-1.0.0-beta.29" 76593 76611 sources."chalk-4.1.2" 76594 76612 sources."cliui-7.0.4" 76595 76613 sources."clone-2.1.2" ··· 76682 76700 sources."yargs-16.2.0" 76683 76701 ]; 76684 76702 }) 76685 - (sources."jsii-srcmak-0.1.386" // { 76703 + (sources."jsii-srcmak-0.1.387" // { 76686 76704 dependencies = [ 76687 76705 sources."fs-extra-9.1.0" 76688 76706 ]; ··· 76727 76745 sources."snake-case-3.0.4" 76728 76746 sources."sort-json-2.0.0" 76729 76747 sources."spdx-license-list-6.4.0" 76730 - sources."sscaff-1.2.115" 76748 + sources."sscaff-1.2.116" 76731 76749 (sources."streamroller-2.2.4" // { 76732 76750 dependencies = [ 76733 76751 sources."date-format-2.1.0" ··· 76917 76935 ]; 76918 76936 }) 76919 76937 sources."apollo-datasource-3.2.0" 76920 - sources."apollo-graphql-0.9.4" 76938 + sources."apollo-graphql-0.9.5" 76921 76939 sources."apollo-reporting-protobuf-3.1.0" 76922 76940 sources."apollo-server-caching-3.2.0" 76923 76941 (sources."apollo-server-core-3.4.0" // { ··· 77369 77387 sources."sort-json-2.0.0" 77370 77388 sources."source-map-0.5.7" 77371 77389 sources."spdx-license-list-6.4.0" 77372 - sources."sscaff-1.2.115" 77390 + sources."sscaff-1.2.116" 77373 77391 (sources."stack-utils-2.0.5" // { 77374 77392 dependencies = [ 77375 77393 sources."escape-string-regexp-2.0.0" ··· 78390 78408 sources."callsites-3.1.0" 78391 78409 sources."camelcase-2.1.1" 78392 78410 sources."camelcase-keys-2.1.0" 78393 - sources."caniuse-lite-1.0.30001274" 78411 + sources."caniuse-lite-1.0.30001275" 78394 78412 sources."capture-stack-trace-1.0.1" 78395 78413 sources."ccount-1.1.0" 78396 78414 (sources."chalk-4.1.2" // { ··· 79503 79521 sources."callsites-3.1.0" 79504 79522 sources."camelcase-5.3.1" 79505 79523 sources."camelcase-keys-6.2.2" 79506 - sources."caniuse-lite-1.0.30001274" 79524 + sources."caniuse-lite-1.0.30001275" 79507 79525 (sources."chalk-4.1.2" // { 79508 79526 dependencies = [ 79509 79527 sources."ansi-styles-4.3.0" ··· 80496 80514 bypassCache = true; 80497 80515 reconstructLock = true; 80498 80516 }; 80517 + concurrently = nodeEnv.buildNodePackage { 80518 + name = "concurrently"; 80519 + packageName = "concurrently"; 80520 + version = "6.3.0"; 80521 + src = fetchurl { 80522 + url = "https://registry.npmjs.org/concurrently/-/concurrently-6.3.0.tgz"; 80523 + sha512 = "k4k1jQGHHKsfbqzkUszVf29qECBrkvBKkcPJEUDTyVR7tZd1G/JOfnst4g1sYbFvJ4UjHZisj1aWQR8yLKpGPw=="; 80524 + }; 80525 + dependencies = [ 80526 + sources."ansi-regex-5.0.1" 80527 + sources."ansi-styles-4.3.0" 80528 + (sources."chalk-4.1.2" // { 80529 + dependencies = [ 80530 + sources."supports-color-7.2.0" 80531 + ]; 80532 + }) 80533 + sources."cliui-7.0.4" 80534 + sources."color-convert-2.0.1" 80535 + sources."color-name-1.1.4" 80536 + sources."date-fns-2.25.0" 80537 + sources."emoji-regex-8.0.0" 80538 + sources."escalade-3.1.1" 80539 + sources."get-caller-file-2.0.5" 80540 + sources."has-flag-4.0.0" 80541 + sources."is-fullwidth-code-point-3.0.0" 80542 + sources."lodash-4.17.21" 80543 + sources."require-directory-2.1.1" 80544 + sources."rxjs-6.6.7" 80545 + sources."spawn-command-0.0.2" 80546 + sources."string-width-4.2.3" 80547 + sources."strip-ansi-6.0.1" 80548 + sources."supports-color-8.1.1" 80549 + sources."tree-kill-1.2.2" 80550 + sources."tslib-1.14.1" 80551 + sources."wrap-ansi-7.0.0" 80552 + sources."y18n-5.0.8" 80553 + sources."yargs-16.2.0" 80554 + sources."yargs-parser-20.2.9" 80555 + ]; 80556 + buildInputs = globalBuildInputs; 80557 + meta = { 80558 + description = "Run commands concurrently"; 80559 + homepage = "https://github.com/open-cli-tools/concurrently#readme"; 80560 + license = "MIT"; 80561 + }; 80562 + production = true; 80563 + bypassCache = true; 80564 + reconstructLock = true; 80565 + }; 80499 80566 configurable-http-proxy = nodeEnv.buildNodePackage { 80500 80567 name = "configurable-http-proxy"; 80501 80568 packageName = "configurable-http-proxy"; ··· 82949 83016 ]; 82950 83017 }) 82951 83018 sources."call-bind-1.0.2" 82952 - sources."caniuse-lite-1.0.30001274" 83019 + sources."caniuse-lite-1.0.30001275" 82953 83020 sources."chalk-2.4.2" 82954 83021 sources."chokidar-2.1.8" 82955 83022 (sources."class-utils-0.3.6" // { ··· 84469 84536 sources."callsites-2.0.0" 84470 84537 sources."camelcase-5.3.1" 84471 84538 sources."camelcase-keys-6.2.2" 84472 - sources."caniuse-lite-1.0.30001274" 84539 + sources."caniuse-lite-1.0.30001275" 84473 84540 sources."chalk-2.4.2" 84474 84541 sources."ci-info-2.0.0" 84475 84542 sources."cli-boxes-2.2.1" ··· 87103 87170 }) 87104 87171 sources."camelcase-6.2.0" 87105 87172 sources."caniuse-api-3.0.0" 87106 - sources."caniuse-lite-1.0.30001274" 87173 + sources."caniuse-lite-1.0.30001275" 87107 87174 sources."caseless-0.12.0" 87108 87175 (sources."chalk-4.1.2" // { 87109 87176 dependencies = [ ··· 89023 89090 sources."callsites-2.0.0" 89024 89091 sources."camelcase-5.3.1" 89025 89092 sources."camelcase-keys-6.2.2" 89026 - sources."caniuse-lite-1.0.30001274" 89093 + sources."caniuse-lite-1.0.30001275" 89027 89094 sources."chalk-2.4.2" 89028 89095 sources."chownr-1.1.4" 89029 89096 sources."ci-info-2.0.0" ··· 91971 92038 sources."call-bind-1.0.2" 91972 92039 sources."camel-case-4.1.2" 91973 92040 sources."camelcase-6.2.0" 91974 - sources."caniuse-lite-1.0.30001274" 92041 + sources."caniuse-lite-1.0.30001275" 91975 92042 sources."ccount-1.1.0" 91976 92043 (sources."chalk-4.1.2" // { 91977 92044 dependencies = [ ··· 99421 99488 sources."bytes-3.1.0" 99422 99489 sources."bytesish-0.4.4" 99423 99490 sources."call-bind-1.0.2" 99424 - sources."caniuse-lite-1.0.30001274" 99491 + sources."caniuse-lite-1.0.30001275" 99425 99492 sources."caseless-0.12.0" 99426 99493 sources."chalk-2.4.2" 99427 99494 sources."chardet-1.4.0" ··· 102323 102390 sources."cached-path-relative-1.0.2" 102324 102391 sources."call-bind-1.0.2" 102325 102392 sources."camelcase-5.3.1" 102326 - sources."caniuse-lite-1.0.30001274" 102393 + sources."caniuse-lite-1.0.30001275" 102327 102394 sources."capture-exit-2.0.0" 102328 102395 sources."caseless-0.12.0" 102329 102396 (sources."chalk-3.0.0" // { ··· 103285 103352 bypassCache = true; 103286 103353 reconstructLock = true; 103287 103354 }; 103355 + markdownlint-cli2 = nodeEnv.buildNodePackage { 103356 + name = "markdownlint-cli2"; 103357 + packageName = "markdownlint-cli2"; 103358 + version = "0.3.2"; 103359 + src = fetchurl { 103360 + url = "https://registry.npmjs.org/markdownlint-cli2/-/markdownlint-cli2-0.3.2.tgz"; 103361 + sha512 = "Wj4iQy2J49m9CVkWkLTdFxMTPDqD3AyL3NbLQgz/nUnTu8LnDguFCbQtFhdzQPvncHVjrKT2vYqg7DifzVP4tA=="; 103362 + }; 103363 + dependencies = [ 103364 + sources."@nodelib/fs.scandir-2.1.5" 103365 + sources."@nodelib/fs.stat-2.0.5" 103366 + sources."@nodelib/fs.walk-1.2.8" 103367 + sources."argparse-2.0.1" 103368 + sources."array-union-2.1.0" 103369 + sources."braces-3.0.2" 103370 + sources."dir-glob-3.0.1" 103371 + sources."entities-2.1.0" 103372 + sources."fast-glob-3.2.7" 103373 + sources."fastq-1.13.0" 103374 + sources."fill-range-7.0.1" 103375 + sources."glob-parent-5.1.2" 103376 + sources."globby-11.0.4" 103377 + sources."ignore-5.1.8" 103378 + sources."is-extglob-2.1.1" 103379 + sources."is-glob-4.0.3" 103380 + sources."is-number-7.0.0" 103381 + sources."linkify-it-3.0.3" 103382 + sources."markdown-it-12.2.0" 103383 + sources."markdownlint-0.24.0" 103384 + sources."markdownlint-cli2-formatter-default-0.0.2" 103385 + sources."markdownlint-rule-helpers-0.15.0" 103386 + sources."mdurl-1.0.1" 103387 + sources."merge2-1.4.1" 103388 + sources."micromatch-4.0.4" 103389 + sources."path-type-4.0.0" 103390 + sources."picomatch-2.3.0" 103391 + sources."queue-microtask-1.2.3" 103392 + sources."reusify-1.0.4" 103393 + sources."run-parallel-1.2.0" 103394 + sources."slash-3.0.0" 103395 + sources."strip-json-comments-3.1.1" 103396 + sources."to-regex-range-5.0.1" 103397 + sources."uc.micro-1.0.6" 103398 + sources."yaml-1.10.2" 103399 + ]; 103400 + buildInputs = globalBuildInputs; 103401 + meta = { 103402 + description = "A fast, flexible, configuration-based command-line interface for linting Markdown/CommonMark files with the `markdownlint` library"; 103403 + homepage = "https://github.com/DavidAnson/markdownlint-cli2"; 103404 + license = "MIT"; 103405 + }; 103406 + production = true; 103407 + bypassCache = true; 103408 + reconstructLock = true; 103409 + }; 103288 103410 markdown-link-check = nodeEnv.buildNodePackage { 103289 103411 name = "markdown-link-check"; 103290 103412 packageName = "markdown-link-check"; ··· 106999 107121 sources."caller-path-2.0.0" 107000 107122 sources."callsites-2.0.0" 107001 107123 sources."caniuse-api-3.0.0" 107002 - sources."caniuse-lite-1.0.30001274" 107124 + sources."caniuse-lite-1.0.30001275" 107003 107125 sources."caseless-0.12.0" 107004 107126 sources."chalk-2.4.2" 107005 107127 sources."chokidar-2.1.8" ··· 110785 110907 sources."camel-case-3.0.0" 110786 110908 sources."camelcase-5.3.1" 110787 110909 sources."caniuse-api-3.0.0" 110788 - sources."caniuse-lite-1.0.30001274" 110910 + sources."caniuse-lite-1.0.30001275" 110789 110911 sources."case-sensitive-paths-webpack-plugin-2.4.0" 110790 110912 sources."caw-2.0.1" 110791 110913 sources."chalk-2.4.2" ··· 113339 113461 bypassCache = true; 113340 113462 reconstructLock = true; 113341 113463 }; 113464 + rtlcss = nodeEnv.buildNodePackage { 113465 + name = "rtlcss"; 113466 + packageName = "rtlcss"; 113467 + version = "3.5.0"; 113468 + src = fetchurl { 113469 + url = "https://registry.npmjs.org/rtlcss/-/rtlcss-3.5.0.tgz"; 113470 + sha512 = "wzgMaMFHQTnyi9YOwsx9LjOxYXJPzS8sYnFaKm6R5ysvTkwzHiB0vxnbHwchHQT65PTdBjDG21/kQBWI7q9O7A=="; 113471 + }; 113472 + dependencies = [ 113473 + sources."find-up-5.0.0" 113474 + sources."locate-path-6.0.0" 113475 + sources."nanoid-3.1.30" 113476 + sources."p-limit-3.1.0" 113477 + sources."p-locate-5.0.0" 113478 + sources."path-exists-4.0.0" 113479 + sources."picocolors-1.0.0" 113480 + sources."postcss-8.3.11" 113481 + sources."source-map-js-0.6.2" 113482 + sources."strip-json-comments-3.1.1" 113483 + sources."yocto-queue-0.1.0" 113484 + ]; 113485 + buildInputs = globalBuildInputs; 113486 + meta = { 113487 + description = "Framework for transforming cascading style sheets (CSS) from left-to-right (LTR) to right-to-left (RTL)"; 113488 + homepage = "https://rtlcss.com/"; 113489 + license = "MIT"; 113490 + }; 113491 + production = true; 113492 + bypassCache = true; 113493 + reconstructLock = true; 113494 + }; 113342 113495 s3http = nodeEnv.buildNodePackage { 113343 113496 name = "s3http"; 113344 113497 packageName = "s3http"; ··· 121847 122000 sources."buffer-from-1.1.2" 121848 122001 sources."call-bind-1.0.2" 121849 122002 sources."camelcase-6.2.0" 121850 - sources."caniuse-lite-1.0.30001274" 122003 + sources."caniuse-lite-1.0.30001275" 121851 122004 (sources."chalk-4.1.2" // { 121852 122005 dependencies = [ 121853 122006 sources."supports-color-7.2.0" ··· 124227 124380 sources."ajv-keywords-3.5.2" 124228 124381 sources."browserslist-4.17.6" 124229 124382 sources."buffer-from-1.1.2" 124230 - sources."caniuse-lite-1.0.30001274" 124383 + sources."caniuse-lite-1.0.30001275" 124231 124384 sources."chrome-trace-event-1.0.3" 124232 124385 sources."commander-2.20.3" 124233 124386 sources."electron-to-chromium-1.3.887"
+2 -2
pkgs/development/python-modules/lightgbm/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "lightgbm"; 13 - version = "3.3.0"; 13 + version = "3.3.1"; 14 14 15 15 src = fetchPypi { 16 16 inherit pname version; 17 - sha256 = "107ae7babbbda2c2f0e07484f0c53cdeb455e9219235f79dc4e1685d7541e505"; 17 + sha256 = "5b9f31759ab4e94d9409deb03104c55b0a40058a6ccea804022046d926bc4904"; 18 18 }; 19 19 20 20 nativeBuildInputs = [
+31
pkgs/development/python-modules/stashy/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , decorator 4 + , fetchPypi 5 + , pythonOlder 6 + , requests 7 + }: 8 + 9 + buildPythonPackage rec { 10 + pname = "stashy"; 11 + version = "0.7"; 12 + disabled = pythonOlder "3.4"; 13 + 14 + src = fetchPypi { 15 + inherit pname version; 16 + sha256 = "1x89zazwxnsx6rdfw8nfr372hj4sk8nrcs5hsjxpcxcva0calrcr"; 17 + }; 18 + 19 + propagatedBuildInputs = [ decorator requests ]; 20 + 21 + # Tests require internet connection 22 + doCheck = false; 23 + pythonImportsCheck = [ "stashy" ]; 24 + 25 + meta = with lib; { 26 + description = "Python client for the Atlassian Bitbucket Server (formerly known as Stash) REST API."; 27 + homepage = "https://github.com/cosmin/stashy"; 28 + license = licenses.asl20; 29 + maintainers = with maintainers; [ mupdt ]; 30 + }; 31 + }
+3 -3
pkgs/development/tools/analysis/cargo-tarpaulin/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "cargo-tarpaulin"; 5 - version = "0.18.2"; 5 + version = "0.18.3"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "xd009642"; 9 9 repo = "tarpaulin"; 10 10 rev = version; 11 - sha256 = "sha256-3ep90G6LW83XGyS9b465u8/SznJRZBhEV/YQU8fua1s="; 11 + sha256 = "sha256-n43n9rmLWmGF7JXz/jspT6Stn0fQnkbkxqbuqXiZLHA="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ ··· 17 17 buildInputs = [ openssl ] 18 18 ++ lib.optionals stdenv.isDarwin [ curl Security ]; 19 19 20 - cargoSha256 = "sha256-UtFGuJ6HEUtonH43iuum1hrhnYesQpkyqPTVcqWAoiA="; 20 + cargoSha256 = "sha256-dJey7z0gRUu5MRKOfR909eQNTt3zpZnoWYvRhHzZlGs="; 21 21 #checkFlags = [ "--test-threads" "1" ]; 22 22 doCheck = false; 23 23
+3 -3
pkgs/development/tools/analysis/tflint/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "tflint"; 5 - version = "0.33.0"; 5 + version = "0.33.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "terraform-linters"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "1cq84ggp32xx79sgrxyqysqs34lhzyv8jdg7d46d9hdvjcwjb5af"; 11 + sha256 = "1n1xw2h544r6bap2drgrip9i8nl5zg5gcdic8qj3y93ppisgzqml"; 12 12 }; 13 13 14 - vendorSha256 = "1ay3vf4dqlbizq98nxz2cgi67ck1c6lw7wi28w56607qzbx0yvmg"; 14 + vendorSha256 = "0fq4nbd0w1nb98g321mns76a60dwwhf4w7g589qz87z29vdy0jbk"; 15 15 16 16 doCheck = false; 17 17
+3 -3
pkgs/development/tools/azcopy/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "azure-storage-azcopy"; 5 - version = "10.12.2"; 5 + version = "10.13.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "Azure"; 9 9 repo = "azure-storage-azcopy"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-NmWCaTmQlCAKaVDumDlubHQhUjhY7uYawkjrP2ggczk="; 11 + sha256 = "sha256-L5gfS2hwk1uaWEygn+liupdANL9qizHAjxNz25KBwaY="; 12 12 }; 13 13 14 14 subPackages = [ "." ]; 15 15 16 - vendorSha256 = "sha256-4Jz57VjdQX+LJexEZau4pd8nIQPt0HGzCjHRj7uPox4="; 16 + vendorSha256 = "sha256-ePEpc18Y99Moe/aj8n1+no6D70vZoIEjC023Uup98Uo="; 17 17 18 18 doCheck = false; 19 19
+2 -2
pkgs/development/tools/bazel-gazelle/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "bazel-gazelle"; 8 - version = "0.21.1"; 8 + version = "0.24.0"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "bazelbuild"; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - sha256 = "12ffrildgx4lah7bdnhr7i8z5jp05lll6gmmpzshmzz8dsgf39y4"; 14 + sha256 = "sha256-WWAOhV1H/OnARjhoWQYNmd9/y8pD3bRkhncmzt/36mA="; 15 15 }; 16 16 17 17 vendorSha256 = null;
+2 -2
pkgs/development/tools/continuous-integration/github-runner/default.nix
··· 37 37 in 38 38 stdenv.mkDerivation rec { 39 39 pname = "github-runner"; 40 - version = "2.283.3"; 40 + version = "2.284.0"; 41 41 42 42 src = fetchFromGitHub { 43 43 owner = "actions"; 44 44 repo = "runner"; 45 45 rev = "v${version}"; 46 - sha256 = "sha256-B2dn3AIGk+xMFqRsKv4pvlZ6K4xySsS0klk8vN8giso="; 46 + sha256 = "sha256-JR0OzbT5gGhO/dxb/eSjP/d/VxW/aLmTs/oPwN8b8Rc="; 47 47 }; 48 48 49 49 nativeBuildInputs = [
+3 -3
pkgs/development/tools/krew/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "krew"; 5 - version = "0.4.1"; 5 + version = "0.4.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "kubernetes-sigs"; 9 9 repo = "krew"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-+YwBkXrj5sWlMA01GfBhu12st+es5YygkD16jc+blt8="; 11 + sha256 = "sha256-P4b8HMkqxzYKz9OgI4pNCjR9Wakh+kIIAnUAkayzGEo="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-49kWaU5dYqd86DvHi3mh5jYUQVmFlI8zsWtAFseYriE="; 14 + vendorSha256 = "sha256-FQQCHq9f0yY8vSsvWIR7WKq+0c+dgGEnoQmXtoN6Ep0="; 15 15 16 16 subPackages = [ "cmd/krew" ]; 17 17
+2 -2
pkgs/development/tools/lazygit/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "lazygit"; 5 - version = "0.29"; 5 + version = "0.30.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "jesseduffield"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-rw03K21Ay/+XKs06cUBybXLp8Rxrlz8T8YKrSGroyDU="; 11 + sha256 = "sha256-8oyUI8jqJOJT1bZE25HlFA39gs3dcZbTL/vrL40K1IM="; 12 12 }; 13 13 14 14 vendorSha256 = null;
+2 -2
pkgs/development/tools/misc/saleae-logic-2/default.nix
··· 1 1 { lib, fetchurl, makeDesktopItem, appimageTools, gtk3 }: 2 2 let 3 3 name = "saleae-logic-2"; 4 - version = "2.3.38"; 4 + version = "2.3.39"; 5 5 src = fetchurl { 6 6 url = "https://downloads.saleae.com/logic2/Logic-${version}-master.AppImage"; 7 - sha256 = "0y3ys3q6gd9fxgaf36q5av0kgvy7jv5anyjxb4cva8d95l4k3ask"; 7 + sha256 = "1p31i8xillc5vrl2nli74b7p7cv2yz2qafp2gnyjfn0nbx5ij52g"; 8 8 }; 9 9 desktopItem = makeDesktopItem { 10 10 inherit name;
+3 -3
pkgs/development/tools/skaffold/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "skaffold"; 5 - version = "1.32.0"; 5 + version = "1.34.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "GoogleContainerTools"; 9 9 repo = "skaffold"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-LvTAM3uYzSEhX7zz7Z+VcMYV5p80EnyaEIu0CmAUaSg="; 11 + sha256 = "sha256-y9y1aUy2fDvMuYCKU2g2lBSmX53NDy9v0XImHXqdJqM="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-TUpHg4yvZ0WKcUFXjWh4Q4/gRtJ93xNa/gLkj5PYo/w="; 14 + vendorSha256 = "sha256-h5UybTcvr9Zxpfw7zBCeSAG2oAZzFWpuYugqXUCMtjs="; 15 15 16 16 subPackages = ["cmd/skaffold"]; 17 17
+59 -10
pkgs/misc/emulators/citra/default.nix
··· 1 - { mkDerivation, lib, fetchgit, cmake, SDL2, qtbase, qtmultimedia, boost 2 - , wrapQtAppsHook }: 1 + { lib 2 + , stdenv 3 + , fetchFromGitHub 4 + , cmake 5 + , wrapQtAppsHook 6 + , SDL2 7 + , qtbase 8 + , qtmultimedia 9 + , boost17x 10 + , libpulseaudio 11 + , pkg-config 12 + , libusb1 13 + , zstd 14 + , libressl 15 + , alsa-lib 16 + , rapidjson 17 + , aacHleDecoding ? true 18 + , fdk_aac 19 + , ffmpeg-full 20 + }: 3 21 4 - mkDerivation { 22 + stdenv.mkDerivation { 5 23 pname = "citra"; 6 24 version = "2021-11-01"; 7 25 8 - # Submodules 9 - src = fetchgit { 10 - url = "https://github.com/citra-emu/citra"; 26 + src = fetchFromGitHub { 27 + owner = "citra-emu"; 28 + repo = "citra"; 11 29 rev = "5a7d80172dd115ad9bc6e8e85cee6ed9511c48d0"; 12 30 sha256 = "sha256-vy2JMizBsnRK9NBEZ1dxT7fP/HFhOZSsC+5P+Dzi27s="; 31 + fetchSubmodules = true; 13 32 }; 14 33 15 - nativeBuildInputs = [ cmake wrapQtAppsHook ]; 16 - buildInputs = [ SDL2 qtbase qtmultimedia boost ]; 34 + nativeBuildInputs = [ cmake wrapQtAppsHook pkg-config ]; 35 + buildInputs = [ 36 + SDL2 37 + qtbase 38 + qtmultimedia 39 + libpulseaudio 40 + boost17x 41 + libusb1 42 + alsa-lib 43 + rapidjson # for discord-rpc 44 + ] ++ lib.optional aacHleDecoding [ fdk_aac ffmpeg-full ]; 17 45 18 - preConfigure = '' 46 + cmakeFlags = [ 47 + "-DUSE_SYSTEM_BOOST=ON" 48 + "-DUSE_DISCORD_PRESENCE=ON" 49 + ] ++ lib.optionals aacHleDecoding [ 50 + "-DENABLE_FFMPEG_AUDIO_DECODER=ON" 51 + "-DCITRA_USE_BUNDLED_FFMPEG=OFF" 52 + ]; 53 + 54 + postPatch = '' 55 + # we already know the submodules are present 56 + substituteInPlace CMakeLists.txt \ 57 + --replace "check_submodules_present()" "" 58 + 19 59 # Trick configure system. 20 60 sed -n 's,^ *path = \(.*\),\1,p' .gitmodules | while read path; do 21 - mkdir "$path/.git" 61 + mkdir "$path/.git" 22 62 done 63 + 64 + rm -rf externals/zstd externals/libressl 65 + cp -r ${zstd.src} externals/zstd 66 + tar xf ${libressl.src} -C externals/ 67 + mv externals/${libressl.name} externals/libressl 68 + chmod -R a+w externals/zstd 23 69 ''; 70 + 71 + # Todo: cubeb audio backend (the default one) doesn't work on the SDL interface. 72 + # Note that the two interfaces have two separate configuration files. 24 73 25 74 meta = with lib; { 26 75 homepage = "https://citra-emu.org";
-11
pkgs/os-specific/linux/bridge-utils/add-ip6-header.patch
··· 1 - diff --git a/libbridge/libbridge.h b/libbridge/libbridge.h 2 - index 39964f2..dd14bae 100644 3 - --- a/libbridge/libbridge.h 4 - +++ b/libbridge/libbridge.h 5 - @@ -20,6 +20,7 @@ 6 - #define _LIBBRIDGE_H 7 - 8 - #include <sys/socket.h> 9 - +#include <netinet/in.h> 10 - #include <linux/if.h> 11 - #include <linux/if_bridge.h>
+2 -6
pkgs/os-specific/linux/bridge-utils/autoconf-ar.patch
··· 1 - diff --git a/configure.in b/configure.in 2 - index 5e3f89b..19be6d9 100644 3 - --- a/configure.in 4 - +++ b/configure.in 1 + --- a/configure.ac 2 + +++ b/configure.ac 5 3 @@ -9,6 +9,7 @@ dnl Checks for programs. 6 4 AC_PROG_CC 7 5 AC_PROG_INSTALL ··· 10 8 11 9 dnl Checks for header files. 12 10 AC_HEADER_STDC 13 - diff --git a/libbridge/Makefile.in b/libbridge/Makefile.in 14 - index 20512c4..83c802b 100644 15 11 --- a/libbridge/Makefile.in 16 12 +++ b/libbridge/Makefile.in 17 13 @@ -1,7 +1,7 @@
+5 -15
pkgs/os-specific/linux/bridge-utils/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "bridge-utils"; 5 - version = "1.5"; 5 + version = "1.7.1"; 6 6 7 7 src = fetchurl { 8 - url = "mirror://sourceforge/bridge/bridge-utils-${version}.tar.gz"; 9 - sha256 = "42f9e5fb8f6c52e63a98a43b81bd281c227c529f194913e1c51ec48a393b6688"; 8 + url = "https://kernel.org/pub/linux/utils/net/bridge-utils/bridge-utils-${version}.tar.xz"; 9 + sha256 = "sha256-ph2L5PGhQFxgyO841UTwwYwFszubB+W0sxAzU2Fl5g4="; 10 10 }; 11 11 12 - patches = [ 13 - ./autoconf-ar.patch 14 - ./add-ip6-header.patch # Remove patch once the kernel headers are updated 15 - ]; 12 + patches = [ ./autoconf-ar.patch ]; 16 13 17 14 nativeBuildInputs = [ autoreconfHook ]; 18 15 19 - postInstall = '' 20 - # The bridge utils build does not fail even if the brctl binary 21 - # is not build. This test ensures that we fail if we don't produce a brctl 22 - # binary. 23 - test -f $out/sbin/brctl 24 - ''; 25 - 26 16 meta = { 27 - description = "https://sourceforge.net/projects/bridge/"; 17 + description = "An userspace tool to configure linux bridges (deprecated in favour or iproute2)."; 28 18 homepage = "https://wiki.linuxfoundation.org/networking/bridge"; 29 19 license = lib.licenses.gpl2Plus; 30 20 platforms = lib.platforms.linux;
+2 -2
pkgs/os-specific/linux/iotop-c/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "iotop-c"; 5 - version = "1.19"; 5 + version = "1.20"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "Tomas-M"; 9 9 repo = "iotop"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-CuZwOIhjl6fpEvfw/4CTjKQkxazLL/NGujmNcx1Jrbc="; 11 + sha256 = "sha256-6Pg2CLWzsD6EPRKD2xMMgKFkpbSheiMMkd0BvHh9onA="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ pkg-config ];
+2 -2
pkgs/shells/zsh/spaceship-prompt/default.nix
··· 2 2 3 3 stdenvNoCC.mkDerivation rec { 4 4 pname = "spaceship-prompt"; 5 - version = "3.14.1"; 5 + version = "3.15.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "denysdovhan"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-/Q2vsCIDsHUSBavJoHX3L0NQ7REoQmaiRgHVGiLtNPE="; 11 + sha256 = "sha256-/9c4o9tdXtDefZ1fA62Y9Sg2cv54YVZGlZ1n6EfQWC4="; 12 12 }; 13 13 14 14 dontBuild = true;
+2 -2
pkgs/tools/admin/exoscale-cli/default.nix
··· 2 2 3 3 buildGoPackage rec { 4 4 pname = "exoscale-cli"; 5 - version = "1.45.2"; 5 + version = "1.46.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "exoscale"; 9 9 repo = "cli"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-bzm8UNFWAXHBdarovNMyARW2xA4tSXIgIHpxROx4nOI="; 11 + sha256 = "sha256-dWbuzzFCBJuSUUQFXY3axK+T9rsMaIMOCKa0ig96bJE="; 12 12 }; 13 13 14 14 goPackagePath = "github.com/exoscale/cli";
+3 -3
pkgs/tools/admin/stripe-cli/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "stripe-cli"; 5 - version = "1.7.3"; 5 + version = "1.7.4"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "stripe"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-Hlh2nfqQD+HMoJ2n1vfffn5ieEKSMtXpdoM0ydFQqrc="; 11 + sha256 = "sha256-2wiry3bBrxrhyyPT/81VpAS34XBZgZsz8Wlq8Qeybgk="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-DTNwgerJ7qZxH4imdrST7TaR20oevDluEDgAlubg5hw="; 14 + vendorSha256 = "sha256-Lgd1vGXlZw0s4dVC0TlGEYoGOLrJPc/bZ75Mzke4rrg="; 15 15 16 16 subPackages = [ 17 17 "cmd/stripe"
+8 -7
pkgs/tools/package-management/cargo-edit/default.nix
··· 1 - { stdenv 2 - , lib 1 + { lib 3 2 , rustPlatform 4 3 , fetchFromGitHub 5 4 , pkg-config 6 5 , openssl 6 + , zlib 7 + , stdenv 7 8 , libiconv 8 9 , Security 9 - , zlib 10 10 }: 11 11 12 12 rustPlatform.buildRustPackage rec { 13 13 pname = "cargo-edit"; 14 - version = "0.7.0"; 14 + version = "0.8.0"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "killercup"; 18 18 repo = pname; 19 19 rev = "v${version}"; 20 - hash = "sha256:0fh1lq793k4ddpqsf2av447hcb74vcq53afkm3g4672k48mjjw1y"; 20 + hash = "sha256-n9Ei1kpbDqOogNJJVvg9DRAPMVGNChCGGiuCVsuK3/8="; 21 21 }; 22 22 23 - cargoSha256 = "0ah3zjx36ibax4gi66g13finh4m2k0aidxkg2nxx1c2aqj847mm1"; 23 + cargoSha256 = "sha256-6546jD+zDoScrJmpw5xtNdWeIPJ9Ma0bcIdnI1kFmu8="; 24 24 25 25 nativeBuildInputs = [ pkg-config ]; 26 26 ··· 34 34 meta = with lib; { 35 35 description = "A utility for managing cargo dependencies from the command line"; 36 36 homepage = "https://github.com/killercup/cargo-edit"; 37 + changelog = "https://github.com/killercup/cargo-edit/blob/v${version}/CHANGELOG.md"; 37 38 license = with licenses; [ asl20 /* or */ mit ]; 38 - maintainers = with maintainers; [ gerschtli jb55 Br1ght0ne killercup ]; 39 + maintainers = with maintainers; [ Br1ght0ne figsoda gerschtli jb55 killercup ]; 39 40 }; 40 41 }
+2 -2
pkgs/tools/security/keybase/default.nix
··· 6 6 7 7 buildGoPackage rec { 8 8 pname = "keybase"; 9 - version = "5.7.1"; 9 + version = "5.8.1"; 10 10 11 11 goPackagePath = "github.com/keybase/client"; 12 12 subPackages = [ "go/kbnm" "go/keybase" ]; ··· 17 17 owner = "keybase"; 18 18 repo = "client"; 19 19 rev = "v${version}"; 20 - sha256 = "sha256-72rVk8pYIQFESQqBu4bmFBPpAOB0oG2Iu36TbAdecBw="; 20 + sha256 = "sha256-SeBZtrRsWTv5yBBsp18daKCNAr70OalH3shlKf+aiEU="; 21 21 }; 22 22 23 23 patches = [
+12 -3
pkgs/tools/security/rbw/default.nix
··· 22 22 # pass-import 23 23 , withPass ? false 24 24 , pass 25 + 26 + # git-credential-helper 27 + , withGitCredential ? false 25 28 }: 26 29 27 30 rustPlatform.buildRustPackage rec { 28 31 pname = "rbw"; 29 - version = "1.4.0"; 32 + version = "1.4.1"; 30 33 31 34 src = fetchCrate { 32 35 inherit version; 33 36 crateName = pname; 34 - sha256 = "sha256-6O33rn/MTo7Dymwh57xQJ5v7n4yNSoICyR9gRwF4AH4="; 37 + sha256 = "sha256-RNdxAp3Q/xNrK1XcKZPMfuqxWzDtdhwT+nqG25SjJhI="; 35 38 }; 36 39 37 - cargoSha256 = "sha256-BrjKUovVV6BDZXtILVC0qaAF5xzE3715u9w9OYIJFbk="; 40 + cargoSha256 = "sha256-I0KwHCmfYxgSF5IMHiPooaf2bypd6eYCOPSB+qnEBJY="; 38 41 39 42 nativeBuildInputs = [ 40 43 pkg-config ··· 58 61 patchShebangs bin/pass-import 59 62 substituteInPlace bin/pass-import \ 60 63 --replace pass ${pass}/bin/pass 64 + '' + lib.optionalString withGitCredential '' 65 + patchShebangs bin/git-credential-rbw 66 + substituteInPlace bin/git-credential-rbw \ 67 + --replace rbw $out/bin/rbw 61 68 ''; 62 69 63 70 preConfigure = '' ··· 76 83 cp bin/rbw-rofi $out/bin 77 84 '' + lib.optionalString withPass '' 78 85 cp bin/pass-import $out/bin 86 + '' + lib.optionalString withGitCredential '' 87 + cp bin/git-credential-rbw $out/bin 79 88 ''; 80 89 81 90 meta = with lib; {
+2 -2
pkgs/tools/system/rsyslog/default.nix
··· 14 14 in 15 15 stdenv.mkDerivation rec { 16 16 pname = "rsyslog"; 17 - version = "8.2108.0"; 17 + version = "8.2110.0"; 18 18 19 19 src = fetchurl { 20 20 url = "https://www.rsyslog.com/files/download/rsyslog/${pname}-${version}.tar.gz"; 21 - sha256 = "sha256-SCbCttCBqclfRp+wEVvj+VEgZSl9PeAOxRN1jNswsdk="; 21 + sha256 = "sha256-P5BOwTfKZBLoJz94ltli7LWJ99DFib3xaxcJ7CfiTzE="; 22 22 }; 23 23 24 24 #patches = [ ./fix-gnutls-detection.patch ];
+2 -2
pkgs/tools/system/syslog-ng/default.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "syslog-ng"; 10 - version = "3.33.2"; 10 + version = "3.34.1"; 11 11 12 12 src = fetchurl { 13 13 url = "https://github.com/${pname}/${pname}/releases/download/${pname}-${version}/${pname}-${version}.tar.gz"; 14 - sha256 = "sha256-C3hqBgd7kVAZHXFPRaG0s3kpUstYFjo68zbwdNqfsUs="; 14 + sha256 = "sha256-zs457BxoyI1JNwXgpSi4PQONo4TonUg4OTzMdfYqLUw="; 15 15 }; 16 16 17 17 nativeBuildInputs = [ pkg-config which ];
+17 -22
pkgs/tools/text/chroma/default.nix
··· 1 1 { lib, buildGoModule, fetchFromGitHub }: 2 2 3 + let 4 + srcInfo = builtins.fromJSON (builtins.readFile ./src.json); 5 + in 6 + 3 7 buildGoModule rec { 4 8 pname = "chroma"; 5 - version = "0.9.2"; 9 + version = "0.9.4"; 6 10 11 + # To update: 12 + # nix-prefetch-git --rev v${version} https://github.com/alecthomas/chroma.git > src.json 7 13 src = fetchFromGitHub { 8 14 owner = "alecthomas"; 9 15 repo = pname; 10 16 rev = "v${version}"; 11 - sha256 = "19d7yr6q8kwrm91yyglmw9n7wa861sgi6dbwn8sl6dp55czfwvaq"; 12 - # populate values otherwise taken care of by goreleaser, 13 - # unfortunately these require us to use git. By doing 14 - # this in postFetch we can delete .git afterwards and 15 - # maintain better reproducibility of the src. 16 - leaveDotGit = true; 17 - postFetch = '' 18 - cd "$out" 17 + inherit (srcInfo) sha256; 18 + }; 19 19 20 - commit="$(git rev-parse HEAD)" 21 - date=$(git show -s --format=%aI "$commit") 20 + vendorSha256 = "1l5ryhwifhff41r4z1d2lifpvjcc4yi1vzrzlvkx3iy9dmxqcssl"; 22 21 23 - substituteInPlace "$out/cmd/chroma/main.go" \ 24 - --replace 'version = "?"' 'version = "${version}"' \ 25 - --replace 'commit = "?"' "commit = \"$commit\"" \ 26 - --replace 'date = "?"' "date = \"$date\"" 22 + modRoot = "./cmd/chroma"; 27 23 28 - find "$out" -name .git -print0 | xargs -0 rm -rf 29 - ''; 30 - }; 31 - 32 - vendorSha256 = "0y8mp08zccn9qxrsj9j7vambz8dwzsxbbgrlppzam53rg8rpxhrg"; 33 - 34 - subPackages = [ "cmd/chroma" ]; 24 + # substitute version info as done in goreleaser builds 25 + ldflags = [ 26 + "-X" "main.version=${version}" 27 + "-X" "main.commit=${srcInfo.rev}" 28 + "-X" "main.date=${srcInfo.date}" 29 + ]; 35 30 36 31 meta = with lib; { 37 32 homepage = "https://github.com/alecthomas/chroma";
+11
pkgs/tools/text/chroma/src.json
··· 1 + { 2 + "url": "https://github.com/alecthomas/chroma.git", 3 + "rev": "6520148857c2ae3106ff371e527abea815b23915", 4 + "date": "2021-10-17T08:46:20+11:00", 5 + "path": "/nix/store/0s8a46d1nyjl3yhsgni2jz5vdv95cka8-chroma", 6 + "sha256": "1iy6mymdjxbl5wbll1mivv7gqdyqhl6xpfqps99z307m7y38r1ni", 7 + "fetchLFS": false, 8 + "fetchSubmodules": false, 9 + "deepClone": false, 10 + "leaveDotGit": false 11 + }
+5
pkgs/tools/text/crowdin-cli/default.nix
··· 7 7 , installShellFiles 8 8 , jre 9 9 , makeWrapper 10 + , crowdin-cli 11 + , testVersion 10 12 , unzip 11 13 }: 12 14 ··· 36 38 runHook postInstall 37 39 ''; 38 40 41 + passthru.tests.version = testVersion { package = crowdin-cli; }; 42 + 39 43 meta = with lib; { 44 + mainProgram = "crowdin"; 40 45 homepage = "https://github.com/crowdin/crowdin-cli/"; 41 46 description = "A command-line client for the Crowdin API"; 42 47 license = licenses.mit;
+2
pkgs/top-level/all-packages.nix
··· 1469 1469 1470 1470 inherit (nodePackages) bitwarden-cli; 1471 1471 1472 + inherit (nodePackages) concurrently; 1473 + 1472 1474 inherit (nodePackages) hyperspace-cli; 1473 1475 1474 1476 bklk = callPackage ../applications/misc/bklk { };
+2
pkgs/top-level/python-packages.nix
··· 8879 8879 8880 8880 starline = callPackage ../development/python-modules/starline { }; 8881 8881 8882 + stashy = callPackage ../development/python-modules/stashy { }; 8883 + 8882 8884 staticjinja = callPackage ../development/python-modules/staticjinja { }; 8883 8885 8884 8886 statistics = callPackage ../development/python-modules/statistics { };