buildGoModule packages: set doCheck = false

zowoq cea7cd90 cc06d7a2

+546 -2
+2
pkgs/applications/audio/noisetorch/default.nix
··· 15 16 vendorSha256 = null; 17 18 subPackages = [ "." ]; 19 20 buildInputs = [ rnnoise-plugin ];
··· 15 16 vendorSha256 = null; 17 18 + doCheck = false; 19 + 20 subPackages = [ "." ]; 21 22 buildInputs = [ rnnoise-plugin ];
+2
pkgs/applications/blockchains/dcrd.nix
··· 13 14 vendorSha256 = "03aw6mcvp1vr01ppxy673jf5hdryd5032cxndlkaiwg005mxp1dy"; 15 16 subPackages = [ "." "cmd/dcrctl" "cmd/promptsecret" ]; 17 18 meta = {
··· 13 14 vendorSha256 = "03aw6mcvp1vr01ppxy673jf5hdryd5032cxndlkaiwg005mxp1dy"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "." "cmd/dcrctl" "cmd/promptsecret" ]; 19 20 meta = {
+2
pkgs/applications/blockchains/dcrwallet.nix
··· 13 14 vendorSha256 = "0qrrr92cad399xwr64qa9h41wqqaj0dy5mw248g5v53zars541w7"; 15 16 subPackages = [ "." ]; 17 18 meta = {
··· 13 14 vendorSha256 = "0qrrr92cad399xwr64qa9h41wqqaj0dy5mw248g5v53zars541w7"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "." ]; 19 20 meta = {
+2
pkgs/applications/blockchains/go-ethereum.nix
··· 14 runVend = true; 15 vendorSha256 = "1744df059bjksvih4653nnvb4kb1xvzdhypd0nnz36m1wrihqssv"; 16 17 subPackages = [ 18 "cmd/abidump" 19 "cmd/abigen"
··· 14 runVend = true; 15 vendorSha256 = "1744df059bjksvih4653nnvb4kb1xvzdhypd0nnz36m1wrihqssv"; 16 17 + doCheck = false; 18 + 19 subPackages = [ 20 "cmd/abidump" 21 "cmd/abigen"
+2
pkgs/applications/blockchains/lnd.nix
··· 15 16 vendorSha256 = "0a4bk2qry0isnrvl0adwikqn6imxwzlaq5j3nglb5rmwwq2cdz0r"; 17 18 subPackages = ["cmd/lncli" "cmd/lnd"]; 19 20 preBuild = let
··· 15 16 vendorSha256 = "0a4bk2qry0isnrvl0adwikqn6imxwzlaq5j3nglb5rmwwq2cdz0r"; 17 18 + doCheck = false; 19 + 20 subPackages = ["cmd/lncli" "cmd/lnd"]; 21 22 preBuild = let
+2
pkgs/applications/editors/glow/default.nix
··· 13 14 vendorSha256 = "1c16s5xiqr36azh2w90wg14jlw67ca2flbgjijpz7qd0ypxyfqlk"; 15 16 buildFlagsArray = [ "-ldflags=" "-X=main.Version=${version}" ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "1c16s5xiqr36azh2w90wg14jlw67ca2flbgjijpz7qd0ypxyfqlk"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ "-ldflags=" "-X=main.Version=${version}" ]; 19 20 meta = with lib; {
+2
pkgs/applications/graphics/pdfcpu/default.nix
··· 13 14 vendorSha256 = "09alkpfyxapycv6zsaz7prgbr0a1jzd78n7w2mh01mg4hhb2j3k7"; 15 16 subPackages = [ "cmd/pdfcpu" ]; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = "09alkpfyxapycv6zsaz7prgbr0a1jzd78n7w2mh01mg4hhb2j3k7"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/pdfcpu" ]; 19 20 meta = with stdenv.lib; {
+2
pkgs/applications/logging/humioctl/default.nix
··· 11 12 vendorSha256 = vendorSha256; 13 14 src = fetchFromGitHub { 15 owner = "humio"; 16 repo = "cli";
··· 11 12 vendorSha256 = vendorSha256; 13 14 + doCheck = false; 15 + 16 src = fetchFromGitHub { 17 owner = "humio"; 18 repo = "cli";
+2
pkgs/applications/misc/archiver/default.nix
··· 16 17 vendorSha256 = "1ikrgl03r9zkn86kxkqi2kf540g3qzzz24i5wvh6g3d5q49nygl9"; 18 19 meta = with lib; { 20 description = "Easily create & extract archives, and compress & decompress files of various formats"; 21 homepage = "https://github.com/mholt/archiver";
··· 16 17 vendorSha256 = "1ikrgl03r9zkn86kxkqi2kf540g3qzzz24i5wvh6g3d5q49nygl9"; 18 19 + doCheck = false; 20 + 21 meta = with lib; { 22 description = "Easily create & extract archives, and compress & decompress files of various formats"; 23 homepage = "https://github.com/mholt/archiver";
+2
pkgs/applications/misc/cheat/default.nix
··· 23 24 vendorSha256 = null; 25 26 meta = with stdenv.lib; { 27 description = "Create and view interactive cheatsheets on the command-line"; 28 maintainers = with maintainers; [ mic92 ];
··· 23 24 vendorSha256 = null; 25 26 + doCheck = false; 27 + 28 meta = with stdenv.lib; { 29 description = "Create and view interactive cheatsheets on the command-line"; 30 maintainers = with maintainers; [ mic92 ];
+2
pkgs/applications/misc/dstask/default.nix
··· 18 # and <https://github.com/NixOS/nixpkgs/blob/d4226e3a4b5fcf988027147164e86665d382bbfa/pkgs/development/go-modules/generic/default.nix#L18> 19 vendorSha256 = null; 20 21 # The ldflags reduce the executable size by stripping some debug stuff. 22 # The other variables are set so that the output of dstask version shows the 23 # git ref and the release version from github.
··· 18 # and <https://github.com/NixOS/nixpkgs/blob/d4226e3a4b5fcf988027147164e86665d382bbfa/pkgs/development/go-modules/generic/default.nix#L18> 19 vendorSha256 = null; 20 21 + doCheck = false; 22 + 23 # The ldflags reduce the executable size by stripping some debug stuff. 24 # The other variables are set so that the output of dstask version shows the 25 # git ref and the release version from github.
+2
pkgs/applications/misc/exercism/default.nix
··· 13 14 vendorSha256 = "0b2m9xkac60k5rbxmb03cxf530m23av14pnsjk8067l998sm4vqi"; 15 16 subPackages = [ "./exercism" ]; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = "0b2m9xkac60k5rbxmb03cxf530m23av14pnsjk8067l998sm4vqi"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "./exercism" ]; 19 20 meta = with stdenv.lib; {
+2
pkgs/applications/misc/geoipupdate/default.nix
··· 13 14 vendorSha256 = "0q4byhvs1c1xm4qjvs2vyf98vdv121qn0z51arcf7k4ayrys5xcx"; 15 16 meta = with stdenv.lib; { 17 description = "Automatic GeoIP database updater"; 18 homepage = "https://github.com/maxmind/geoipupdate";
··· 13 14 vendorSha256 = "0q4byhvs1c1xm4qjvs2vyf98vdv121qn0z51arcf7k4ayrys5xcx"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "Automatic GeoIP database updater"; 20 homepage = "https://github.com/maxmind/geoipupdate";
+2
pkgs/applications/misc/go-jira/default.nix
··· 13 14 vendorSha256 = "18jwxnkv94lsxfv57ga519knxm077cc8chp5c992ipk58a04nv18"; 15 16 meta = with stdenv.lib; { 17 description = "Simple command line client for Atlassian's Jira service written in Go"; 18 homepage = "https://github.com/go-jira/jira";
··· 13 14 vendorSha256 = "18jwxnkv94lsxfv57ga519knxm077cc8chp5c992ipk58a04nv18"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "Simple command line client for Atlassian's Jira service written in Go"; 20 homepage = "https://github.com/go-jira/jira";
+2
pkgs/applications/misc/gomatrix/default.nix
··· 13 14 vendorSha256 = "1yw0gph4zfg8w4343882l6b9lggwyak2zz8ic1l1m2m44p3aq169"; 15 16 meta = with lib; { 17 description = ''Displays "The Matrix" in a terminal''; 18 license = licenses.bsd2;
··· 13 14 vendorSha256 = "1yw0gph4zfg8w4343882l6b9lggwyak2zz8ic1l1m2m44p3aq169"; 15 16 + doCheck = false; 17 + 18 meta = with lib; { 19 description = ''Displays "The Matrix" in a terminal''; 20 license = licenses.bsd2;
+2
pkgs/applications/misc/gopacked/default.nix
··· 13 14 vendorSha256 = "0fklr3lxh8g7gda65wf2wdkqv15869h7m1bwbzbiv8pasrf5b352"; 15 16 meta = with lib; { 17 description = "A simple text-based Minecraft modpack manager"; 18 license = licenses.agpl3;
··· 13 14 vendorSha256 = "0fklr3lxh8g7gda65wf2wdkqv15869h7m1bwbzbiv8pasrf5b352"; 15 16 + doCheck = false; 17 + 18 meta = with lib; { 19 description = "A simple text-based Minecraft modpack manager"; 20 license = licenses.agpl3;
+3
pkgs/applications/misc/hugo/default.nix
··· 12 }; 13 14 vendorSha256 = "17xn6bdy942g6nx5xky41ixmd5kaz68chj3rb02ibpyraamx04nm"; 15 runVend = true; 16 17 buildFlags = [ "-tags" "extended" ];
··· 12 }; 13 14 vendorSha256 = "17xn6bdy942g6nx5xky41ixmd5kaz68chj3rb02ibpyraamx04nm"; 15 + 16 + doCheck = false; 17 + 18 runVend = true; 19 20 buildFlags = [ "-tags" "extended" ];
+2
pkgs/applications/misc/remarkable/rmapi/default.nix
··· 13 14 vendorSha256 = "077s13pcql5w2m6wzls1q06r7p501kazbwzxgfh6akwza15kb4is"; 15 16 meta = with stdenv.lib; { 17 description = "A Go app that allows access to the ReMarkable Cloud API programmatically"; 18 homepage = "https://github.com/juruen/rmapi";
··· 13 14 vendorSha256 = "077s13pcql5w2m6wzls1q06r7p501kazbwzxgfh6akwza15kb4is"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "A Go app that allows access to the ReMarkable Cloud API programmatically"; 20 homepage = "https://github.com/juruen/rmapi";
+2
pkgs/applications/misc/sampler/default.nix
··· 13 14 vendorSha256 = "04nywhkil5xkipcibrp6vi63rfcvqgv7yxbxmmrhqys2cdxfvazv"; 15 16 subPackages = [ "." ]; 17 18 buildInputs = [ alsaLib ];
··· 13 14 vendorSha256 = "04nywhkil5xkipcibrp6vi63rfcvqgv7yxbxmmrhqys2cdxfvazv"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "." ]; 19 20 buildInputs = [ alsaLib ];
+2
pkgs/applications/misc/terminal-parrot/default.nix
··· 13 14 vendorSha256 = "1qalnhhq3fmyzj0hkzc5gk9wbypr558mz3ik5msw7fid68k2i48c"; 15 16 meta = with stdenv.lib; { 17 description = "Shows colorful, animated party parrot in your terminial"; 18 homepage = "https://github.com/jmhobbs/terminal-parrot";
··· 13 14 vendorSha256 = "1qalnhhq3fmyzj0hkzc5gk9wbypr558mz3ik5msw7fid68k2i48c"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "Shows colorful, animated party parrot in your terminial"; 20 homepage = "https://github.com/jmhobbs/terminal-parrot";
+2
pkgs/applications/misc/todoist/default.nix
··· 13 14 vendorSha256 = "0cznb8glh36dwyyn1gx1ggkwa9zffrrxg52k78brnaczsl0rsmky"; 15 16 meta = { 17 homepage = "https://github.com/sachaos/todoist"; 18 description = "Todoist CLI Client";
··· 13 14 vendorSha256 = "0cznb8glh36dwyyn1gx1ggkwa9zffrrxg52k78brnaczsl0rsmky"; 15 16 + doCheck = false; 17 + 18 meta = { 19 homepage = "https://github.com/sachaos/todoist"; 20 description = "Todoist CLI Client";
+2
pkgs/applications/misc/wtf/default.nix
··· 18 19 vendorSha256 = "09iy148pnbdrzjj2j50lbd8s9mkv7vggrx77mj88p1gnqclz3lip"; 20 21 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 22 23 subPackages = [ "." ];
··· 18 19 vendorSha256 = "09iy148pnbdrzjj2j50lbd8s9mkv7vggrx77mj88p1gnqclz3lip"; 20 21 + doCheck = false; 22 + 23 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 24 25 subPackages = [ "." ];
+2
pkgs/applications/networking/browsers/amfora/default.nix
··· 13 14 vendorSha256 = "0xj2s14dq10fwqqxjn4d8x6zljd5d15gjbja2gb75rfv09s4fdgv"; 15 16 meta = with lib; { 17 description = "A fancy terminal browser for the Gemini protocol"; 18 homepage = "https://github.com/makeworld-the-better-one/amfora";
··· 13 14 vendorSha256 = "0xj2s14dq10fwqqxjn4d8x6zljd5d15gjbja2gb75rfv09s4fdgv"; 15 16 + doCheck = false; 17 + 18 meta = with lib; { 19 description = "A fancy terminal browser for the Gemini protocol"; 20 homepage = "https://github.com/makeworld-the-better-one/amfora";
+2
pkgs/applications/networking/cloudflared/default.nix
··· 13 14 vendorSha256 = null; 15 16 buildFlagsArray = "-ldflags=-X main.Version=${version}"; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = null; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = "-ldflags=-X main.Version=${version}"; 19 20 meta = with stdenv.lib; {
+2
pkgs/applications/networking/cluster/argo/default.nix
··· 30 31 vendorSha256 = "1vqmzz76lcwwnw89n4lyg4jjf7wbdgn9sdzwsgrjwkj8ax7d48cv"; 32 33 subPackages = [ "cmd/argo" ]; 34 35 nativeBuildInputs = [ installShellFiles ];
··· 30 31 vendorSha256 = "1vqmzz76lcwwnw89n4lyg4jjf7wbdgn9sdzwsgrjwkj8ax7d48cv"; 32 33 + doCheck = false; 34 + 35 subPackages = [ "cmd/argo" ]; 36 37 nativeBuildInputs = [ installShellFiles ];
+2
pkgs/applications/networking/cluster/argocd/default.nix
··· 14 15 vendorSha256 = "0r2nh7v00m6zbdnhsgjn01q9pkiz41ckkqgfnpqmkxaqmjz31iyj"; 16 17 nativeBuildInputs = [ packr ]; 18 19 patches = [ ./use-go-module.patch ];
··· 14 15 vendorSha256 = "0r2nh7v00m6zbdnhsgjn01q9pkiz41ckkqgfnpqmkxaqmjz31iyj"; 16 17 + doCheck = false; 18 + 19 nativeBuildInputs = [ packr ]; 20 21 patches = [ ./use-go-module.patch ];
+2
pkgs/applications/networking/cluster/atlantis/default.nix
··· 13 14 vendorSha256 = null; 15 16 subPackages = [ "." ]; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = null; 15 16 + doCheck = false; 17 + 18 subPackages = [ "." ]; 19 20 meta = with stdenv.lib; {
+2
pkgs/applications/networking/cluster/cni/plugins.nix
··· 13 14 vendorSha256 = null; 15 16 buildFlagsArray = [ 17 "-ldflags=-X github.com/containernetworking/plugins/pkg/utils/buildversion.BuildVersion=${version}" 18 ];
··· 13 14 vendorSha256 = null; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ 19 "-ldflags=-X github.com/containernetworking/plugins/pkg/utils/buildversion.BuildVersion=${version}" 20 ];
+1 -1
pkgs/applications/networking/cluster/docker-machine/hyperkit.nix
··· 1 { lib, buildGoModule, minikube }: 2 3 buildGoModule rec { 4 - inherit (minikube) version src nativeBuildInputs buildInputs vendorSha256; 5 6 pname = "docker-machine-hyperkit"; 7
··· 1 { lib, buildGoModule, minikube }: 2 3 buildGoModule rec { 4 + inherit (minikube) version src nativeBuildInputs buildInputs vendorSha256 doCheck; 5 6 pname = "docker-machine-hyperkit"; 7
+1 -1
pkgs/applications/networking/cluster/docker-machine/kvm2.nix
··· 1 { lib, buildGoModule, minikube }: 2 3 buildGoModule rec { 4 - inherit (minikube) version src nativeBuildInputs buildInputs vendorSha256; 5 6 pname = "docker-machine-kvm2"; 7
··· 1 { lib, buildGoModule, minikube }: 2 3 buildGoModule rec { 4 + inherit (minikube) version src nativeBuildInputs buildInputs vendorSha256 doCheck; 5 6 pname = "docker-machine-kvm2"; 7
+2
pkgs/applications/networking/cluster/fluxctl/default.nix
··· 13 14 vendorSha256 = "0a5sv11pb2i6r0ffwaiqdhc0m7gz679yfmqw6ix9imk4ybhf4jp9"; 15 16 subPackages = [ "cmd/fluxctl" ]; 17 18 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ];
··· 13 14 vendorSha256 = "0a5sv11pb2i6r0ffwaiqdhc0m7gz679yfmqw6ix9imk4ybhf4jp9"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/fluxctl" ]; 19 20 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ];
+2
pkgs/applications/networking/cluster/helm/default.nix
··· 12 }; 13 vendorSha256 = "0j25m56cwzjd9b75v7xlb26q81bsmln77k23h9n8v2f2gqwwpkrl"; 14 15 subPackages = [ "cmd/helm" ]; 16 buildFlagsArray = [ "-ldflags=-w -s -X helm.sh/helm/v3/internal/version.version=v${version}" ]; 17
··· 12 }; 13 vendorSha256 = "0j25m56cwzjd9b75v7xlb26q81bsmln77k23h9n8v2f2gqwwpkrl"; 14 15 + doCheck = false; 16 + 17 subPackages = [ "cmd/helm" ]; 18 buildFlagsArray = [ "-ldflags=-w -s -X helm.sh/helm/v3/internal/version.version=v${version}" ]; 19
+2
pkgs/applications/networking/cluster/helmfile/default.nix
··· 13 14 vendorSha256 = "04mga3jc2c01daygjcn245mv30lc2ibax0mpb1wjk3s8lkl4cxcz"; 15 16 nativeBuildInputs = [ makeWrapper ]; 17 18 subPackages = [ "." ];
··· 13 14 vendorSha256 = "04mga3jc2c01daygjcn245mv30lc2ibax0mpb1wjk3s8lkl4cxcz"; 15 16 + doCheck = false; 17 + 18 nativeBuildInputs = [ makeWrapper ]; 19 20 subPackages = [ "." ];
+2
pkgs/applications/networking/cluster/helmsman/default.nix
··· 13 14 vendorSha256 = "05vnysr5r3hbayss1pyifgp989kjw81h95iack8ady62k6ys5njl"; 15 16 meta = with lib; { 17 description = "Helm Charts (k8s applications) as Code tool"; 18 homepage = "https://github.com/Praqma/helmsman";
··· 13 14 vendorSha256 = "05vnysr5r3hbayss1pyifgp989kjw81h95iack8ady62k6ys5njl"; 15 16 + doCheck = false; 17 + 18 meta = with lib; { 19 description = "Helm Charts (k8s applications) as Code tool"; 20 homepage = "https://github.com/Praqma/helmsman";
+2
pkgs/applications/networking/cluster/hetzner-kube/default.nix
··· 13 14 vendorSha256 = "1jh2f66ys6rmrrwrf5zqfprgcvziyq6l4z8bfqwxgf1ysnxx525h"; 15 16 buildFlagsArray = '' 17 -ldflags= 18 -X github.com/xetys/hetzner-kube/cmd.version=${version}
··· 13 14 vendorSha256 = "1jh2f66ys6rmrrwrf5zqfprgcvziyq6l4z8bfqwxgf1ysnxx525h"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = '' 19 -ldflags= 20 -X github.com/xetys/hetzner-kube/cmd.version=${version}
+2
pkgs/applications/networking/cluster/istioctl/default.nix
··· 12 }; 13 vendorSha256 = "0cc0lmjsxrn3f78k95wklf3yn5k7h8slwnwmssy1i1h0bkcg1bai"; 14 15 nativeBuildInputs = [ go-bindata installShellFiles ]; 16 17 # Bundle charts
··· 12 }; 13 vendorSha256 = "0cc0lmjsxrn3f78k95wklf3yn5k7h8slwnwmssy1i1h0bkcg1bai"; 14 15 + doCheck = false; 16 + 17 nativeBuildInputs = [ go-bindata installShellFiles ]; 18 19 # Bundle charts
+2
pkgs/applications/networking/cluster/jx/default.nix
··· 13 14 vendorSha256 = "0l9djgvnrgdnw7nsf05yq7qpzzzm3gasgh9a7dyc16pp2kxvza6k"; 15 16 subPackages = [ "cmd/jx" ]; 17 18 nativeBuildInputs = [ installShellFiles ];
··· 13 14 vendorSha256 = "0l9djgvnrgdnw7nsf05yq7qpzzzm3gasgh9a7dyc16pp2kxvza6k"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/jx" ]; 19 20 nativeBuildInputs = [ installShellFiles ];
+2
pkgs/applications/networking/cluster/k9s/default.nix
··· 20 21 vendorSha256 = "1hmqvcvlffd8cpqcnn2f9mnyiwdhw8k46sl2p6rk16yrj06la9mr"; 22 23 meta = with stdenv.lib; { 24 description = "Kubernetes CLI To Manage Your Clusters In Style."; 25 homepage = "https://github.com/derailed/k9s";
··· 20 21 vendorSha256 = "1hmqvcvlffd8cpqcnn2f9mnyiwdhw8k46sl2p6rk16yrj06la9mr"; 22 23 + doCheck = false; 24 + 25 meta = with stdenv.lib; { 26 description = "Kubernetes CLI To Manage Your Clusters In Style."; 27 homepage = "https://github.com/derailed/k9s";
+2
pkgs/applications/networking/cluster/kpt/default.nix
··· 13 14 vendorSha256 = "0l8xdnv2m6byd5dwvs3zgcj1lsci7ax4xvx178a8a78sgkqalvmq"; 15 16 postInstall = '' 17 rm $out/bin/{mdtogo,formula} 18 '';
··· 13 14 vendorSha256 = "0l8xdnv2m6byd5dwvs3zgcj1lsci7ax4xvx178a8a78sgkqalvmq"; 15 16 + doCheck = false; 17 + 18 postInstall = '' 19 rm $out/bin/{mdtogo,formula} 20 '';
+2
pkgs/applications/networking/cluster/kube3d/default.nix
··· 32 33 vendorSha256 = null; 34 35 meta = with stdenv.lib; { 36 homepage = "https://github.com/rancher/k3d"; 37 description = "A helper to run k3s (Lightweight Kubernetes. 5 less than k8s) in a docker container";
··· 32 33 vendorSha256 = null; 34 35 + doCheck = false; 36 + 37 meta = with stdenv.lib; { 38 homepage = "https://github.com/rancher/k3d"; 39 description = "A helper to run k3s (Lightweight Kubernetes. 5 less than k8s) in a docker container";
+2
pkgs/applications/networking/cluster/kubeseal/default.nix
··· 13 14 vendorSha256 = null; 15 16 subPackages = [ "cmd/kubeseal" ]; 17 18 buildFlagsArray = [ "-ldflags=-s -w -X main.VERSION=${version}" ];
··· 13 14 vendorSha256 = null; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/kubeseal" ]; 19 20 buildFlagsArray = [ "-ldflags=-s -w -X main.VERSION=${version}" ];
+2
pkgs/applications/networking/cluster/kubespy/default.nix
··· 13 14 vendorSha256 = "0q85is01cbgxflnqdvxc9w5iqdizgvsc44h8z21j712bm2w7blqq"; 15 16 # TODO: enable after https://github.com/pulumi/kubespy/issues/72 is addressed. 17 # postInstall = '' 18 # for shell in bash zsh; do
··· 13 14 vendorSha256 = "0q85is01cbgxflnqdvxc9w5iqdizgvsc44h8z21j712bm2w7blqq"; 15 16 + doCheck = false; 17 + 18 # TODO: enable after https://github.com/pulumi/kubespy/issues/72 is addressed. 19 # postInstall = '' 20 # for shell in bash zsh; do
+2
pkgs/applications/networking/cluster/kubeval/default.nix
··· 13 14 vendorSha256 = "1kpwvi84i3h1yjprd6m6hn8l9j235931871y3qk9cl0g8q0hv9ja"; 15 16 meta = with lib; { 17 description = "Validate your Kubernetes configuration files"; 18 homepage = "https://github.com/instrumenta/kubeval";
··· 13 14 vendorSha256 = "1kpwvi84i3h1yjprd6m6hn8l9j235931871y3qk9cl0g8q0hv9ja"; 15 16 + doCheck = false; 17 + 18 meta = with lib; { 19 description = "Validate your Kubernetes configuration files"; 20 homepage = "https://github.com/instrumenta/kubeval";
+2
pkgs/applications/networking/cluster/linkerd/default.nix
··· 13 14 vendorSha256 = "0vls58ld50jca5yn73kvg3lx4z83cc7skky54a90pkbj737y58pz"; 15 16 subPackages = [ "cli/cmd" ]; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = "0vls58ld50jca5yn73kvg3lx4z83cc7skky54a90pkbj737y58pz"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cli/cmd" ]; 19 20 meta = with stdenv.lib; {
+2
pkgs/applications/networking/cluster/minikube/default.nix
··· 15 16 vendorSha256 = "0smjj2sq09k1ai79lk74gi056hfls7qy8x08wkq2g24fxi06cr94"; 17 18 src = fetchFromGitHub { 19 owner = "kubernetes"; 20 repo = "minikube";
··· 15 16 vendorSha256 = "0smjj2sq09k1ai79lk74gi056hfls7qy8x08wkq2g24fxi06cr94"; 17 18 + doCheck = false; 19 + 20 src = fetchFromGitHub { 21 owner = "kubernetes"; 22 repo = "minikube";
+2
pkgs/applications/networking/cluster/node-problem-detector/default.nix
··· 13 14 vendorSha256 = null; 15 16 # Optionally, a log counter binary can be created to parse journald logs. 17 # The binary is dynamically linked against systemd libraries, making it a 18 # Linux-only feature. See 'ENABLE_JOURNALD' upstream:
··· 13 14 vendorSha256 = null; 15 16 + doCheck = false; 17 + 18 # Optionally, a log counter binary can be created to parse journald logs. 19 # The binary is dynamically linked against systemd libraries, making it a 20 # Linux-only feature. See 'ENABLE_JOURNALD' upstream:
+2
pkgs/applications/networking/cluster/prow/default.nix
··· 15 16 vendorSha256 = "16fdc5r28andm8my4fxj0f1yygx6j2mvn92i6xdfhbcra0lvr4ql"; 17 18 subPackages = [ 19 "prow/cmd/admission" 20 "prow/cmd/branchprotector"
··· 15 16 vendorSha256 = "16fdc5r28andm8my4fxj0f1yygx6j2mvn92i6xdfhbcra0lvr4ql"; 17 18 + doCheck = false; 19 + 20 subPackages = [ 21 "prow/cmd/admission" 22 "prow/cmd/branchprotector"
+2
pkgs/applications/networking/cluster/qbec/default.nix
··· 13 14 vendorSha256 = "15hbjghi2ifylg7nr85qlk0alsy97h9zj6hf5w84m76dla2bcjf3"; 15 16 buildFlagsArray = '' 17 -ldflags= 18 -s -w
··· 13 14 vendorSha256 = "15hbjghi2ifylg7nr85qlk0alsy97h9zj6hf5w84m76dla2bcjf3"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = '' 19 -ldflags= 20 -s -w
+2
pkgs/applications/networking/cluster/tanka/default.nix
··· 13 14 vendorSha256 = "15x8fqz2d2793ivgxpd9jyr34njzi1xpyxdlfyj1b01n2vr3xg4m"; 15 16 buildFlagsArray = [ "-ldflags=-s -w -X main.Version=${version}" ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "15x8fqz2d2793ivgxpd9jyr34njzi1xpyxdlfyj1b01n2vr3xg4m"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ "-ldflags=-s -w -X main.Version=${version}" ]; 19 20 meta = with lib; {
+2
pkgs/applications/networking/cluster/terraform-providers/elasticsearch/default.nix
··· 12 13 vendorSha256 = "1rdvyypdl3fk6af66gfjhyl271cnlx5xgrl1w68sc6sbvq00bqkd"; 14 15 subPackages = [ "." ]; 16 17 # Terraform allow checking the provider versions, but this breaks
··· 12 13 vendorSha256 = "1rdvyypdl3fk6af66gfjhyl271cnlx5xgrl1w68sc6sbvq00bqkd"; 14 15 + doCheck = false; 16 + 17 subPackages = [ "." ]; 18 19 # Terraform allow checking the provider versions, but this breaks
+3
pkgs/applications/networking/cluster/terraform-providers/keycloak/default.nix
··· 15 }; 16 17 vendorSha256 = "12iary7p5qsbl4xdhfd1wh92mvf2fiylnb3m1d3m7cdcn32rfimq"; 18 postInstall = "mv $out/bin/terraform-provider-keycloak{,_v${version}}"; 19 20 meta = with stdenv.lib; {
··· 15 }; 16 17 vendorSha256 = "12iary7p5qsbl4xdhfd1wh92mvf2fiylnb3m1d3m7cdcn32rfimq"; 18 + 19 + doCheck = false; 20 + 21 postInstall = "mv $out/bin/terraform-provider-keycloak{,_v${version}}"; 22 23 meta = with stdenv.lib; {
+2
pkgs/applications/networking/cluster/terraform-providers/lxd/default.nix
··· 13 14 vendorSha256 = "1shdpl1zsbbpc3mfs0l65ykq2h15ggvqylaixcap4j4lfl7m9my0"; 15 16 postBuild = "mv ../go/bin/terraform-provider-lxd{,_v${version}}"; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = "1shdpl1zsbbpc3mfs0l65ykq2h15ggvqylaixcap4j4lfl7m9my0"; 15 16 + doCheck = false; 17 + 18 postBuild = "mv ../go/bin/terraform-provider-lxd{,_v${version}}"; 19 20 meta = with stdenv.lib; {
+2
pkgs/applications/networking/cluster/terraform-providers/shell/default.nix
··· 12 13 vendorSha256 = "1p2ja6cw3dl7mx41svri6frjpgb9pxsrl7sq0rk1d3sviw0f88sg"; 14 15 subPackages = [ "." ]; 16 17 # Terraform allows checking the provider versions, but this breaks
··· 12 13 vendorSha256 = "1p2ja6cw3dl7mx41svri6frjpgb9pxsrl7sq0rk1d3sviw0f88sg"; 14 15 + doCheck = false; 16 + 17 subPackages = [ "." ]; 18 19 # Terraform allows checking the provider versions, but this breaks
+2
pkgs/applications/networking/cluster/terraform-providers/vpsadmin/default.nix
··· 12 13 vendorSha256 = "0j90fnzba23mwf9bzf9w5h0hszkl3h61p5i780s9v9c0hbzhbqsh"; 14 15 subPackages = [ "." ]; 16 17 # Terraform allow checking the provider versions, but this breaks
··· 12 13 vendorSha256 = "0j90fnzba23mwf9bzf9w5h0hszkl3h61p5i780s9v9c0hbzhbqsh"; 14 15 + doCheck = false; 16 + 17 subPackages = [ "." ]; 18 19 # Terraform allow checking the provider versions, but this breaks
+2
pkgs/applications/networking/cluster/terragrunt/default.nix
··· 13 14 vendorSha256 = "1xn7c6y32vpanqvf1sfpw6bs73dbjniavjbf00j0vx83bfyklsr4"; 15 16 buildInputs = [ makeWrapper ]; 17 18 preBuild = ''
··· 13 14 vendorSha256 = "1xn7c6y32vpanqvf1sfpw6bs73dbjniavjbf00j0vx83bfyklsr4"; 15 16 + doCheck = false; 17 + 18 buildInputs = [ makeWrapper ]; 19 20 preBuild = ''
+2
pkgs/applications/networking/gmailctl/default.nix
··· 16 17 vendorSha256 = "0qp8n7z3vcsbc6safp7i18i0i3r4hy4nidzwl85i981sg12vcg6b"; 18 19 meta = with stdenv.lib; { 20 description = "Declarative configuration for Gmail filters"; 21 homepage = "https://github.com/mbrt/gmailctl";
··· 16 17 vendorSha256 = "0qp8n7z3vcsbc6safp7i18i0i3r4hy4nidzwl85i981sg12vcg6b"; 18 19 + doCheck = false; 20 + 21 meta = with stdenv.lib; { 22 description = "Declarative configuration for Gmail filters"; 23 homepage = "https://github.com/mbrt/gmailctl";
+2
pkgs/applications/networking/hydroxide/default.nix
··· 13 14 vendorSha256 = "1r5qg5cx48yw1l5nil28y4a82fc7g52jmy9pckaxygppmmn539pc"; 15 16 subPackages = [ "cmd/hydroxide" ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "1r5qg5cx48yw1l5nil28y4a82fc7g52jmy9pckaxygppmmn539pc"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/hydroxide" ]; 19 20 meta = with lib; {
+2
pkgs/applications/networking/instant-messengers/go-neb/default.nix
··· 16 17 vendorSha256 = "1k3980yf6zl00dkd1djwhm2f9nnffzrsbs3kq3alpw2gm0aln739"; 18 19 passthru.tests.go-neb = nixosTests.go-neb; 20 21 meta = with lib; {
··· 16 17 vendorSha256 = "1k3980yf6zl00dkd1djwhm2f9nnffzrsbs3kq3alpw2gm0aln739"; 18 19 + doCheck = false; 20 + 21 passthru.tests.go-neb = nixosTests.go-neb; 22 23 meta = with lib; {
+2
pkgs/applications/networking/instant-messengers/gomuks/default.nix
··· 15 16 vendorSha256 = "11rk7pma6dr6fsyz8hpjyr7nc2c7ichh5m7ds07m89gzk6ar55gb"; 17 18 buildInputs = [ olm ]; 19 20 postInstall = ''
··· 15 16 vendorSha256 = "11rk7pma6dr6fsyz8hpjyr7nc2c7ichh5m7ds07m89gzk6ar55gb"; 17 18 + doCheck = false; 19 + 20 buildInputs = [ olm ]; 21 22 postInstall = ''
+2
pkgs/applications/networking/ipfs-cluster/default.nix
··· 7 8 vendorSha256 = "00fkyxxi4iz16v0j33270x8qrspqpsv9j6csnikjy0klyb038pfq"; 9 10 src = fetchFromGitHub { 11 owner = "ipfs"; 12 repo = "ipfs-cluster";
··· 7 8 vendorSha256 = "00fkyxxi4iz16v0j33270x8qrspqpsv9j6csnikjy0klyb038pfq"; 9 10 + doCheck = false; 11 + 12 src = fetchFromGitHub { 13 owner = "ipfs"; 14 repo = "ipfs-cluster";
+2
pkgs/applications/networking/ipfs-migrator/default.nix
··· 13 14 vendorSha256 = null; 15 16 subPackages = [ "." ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = null; 15 16 + doCheck = false; 17 + 18 subPackages = [ "." ]; 19 20 meta = with lib; {
+2
pkgs/applications/networking/ipfs/default.nix
··· 26 27 vendorSha256 = null; 28 29 postInstall = '' 30 install -D misc/systemd/ipfs.service $out/etc/systemd/system/ipfs.service 31 install -D misc/systemd/ipfs-api.socket $out/etc/systemd/system/ipfs-api.socket
··· 26 27 vendorSha256 = null; 28 29 + doCheck = false; 30 + 31 postInstall = '' 32 install -D misc/systemd/ipfs.service $out/etc/systemd/system/ipfs.service 33 install -D misc/systemd/ipfs-api.socket $out/etc/systemd/system/ipfs-api.socket
+2
pkgs/applications/networking/ipget/default.nix
··· 13 14 vendorSha256 = "0vy21pdqk6q5fw7wlcv51myhh9y79n2qhvy61rmblwhxlrkh6sdv"; 15 16 meta = with stdenv.lib; { 17 description = "Retrieve files over IPFS and save them locally"; 18 homepage = "https://ipfs.io/";
··· 13 14 vendorSha256 = "0vy21pdqk6q5fw7wlcv51myhh9y79n2qhvy61rmblwhxlrkh6sdv"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "Retrieve files over IPFS and save them locally"; 20 homepage = "https://ipfs.io/";
+2
pkgs/applications/networking/mailreaders/aerc/default.nix
··· 16 runVend = true; 17 vendorSha256 = "0avdvbhv1jlisiicpi5vshz28a2p2fgnlrag9zngzglcrbhdd1rn"; 18 19 nativeBuildInputs = [ 20 scdoc 21 python3.pkgs.wrapPython
··· 16 runVend = true; 17 vendorSha256 = "0avdvbhv1jlisiicpi5vshz28a2p2fgnlrag9zngzglcrbhdd1rn"; 18 19 + doCheck = false; 20 + 21 nativeBuildInputs = [ 22 scdoc 23 python3.pkgs.wrapPython
+2
pkgs/applications/networking/mailreaders/hasmail/default.nix
··· 21 22 vendorSha256 = "0sblgjmn3i3k31jfq5zy3bx7bv5z2cg6rjzr7aj87c57yhzzcmk7"; 23 24 nativeBuildInputs = [ 25 pkgconfig 26 ];
··· 21 22 vendorSha256 = "0sblgjmn3i3k31jfq5zy3bx7bv5z2cg6rjzr7aj87c57yhzzcmk7"; 23 24 + doCheck = false; 25 + 26 nativeBuildInputs = [ 27 pkgconfig 28 ];
+2
pkgs/applications/networking/nextdns/default.nix
··· 13 14 vendorSha256 = "09whpzsn16znyrknfm5zlhla253r69j6d751czza4c83m4r36swj"; 15 16 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "09whpzsn16znyrknfm5zlhla253r69j6d751czza4c83m4r36swj"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 19 20 meta = with lib; {
+2
pkgs/applications/networking/syncthing/default.nix
··· 15 16 vendorSha256 = "1gmdv0g0gymq6khrwvplw6yfp146kg5ar8vqdp5dlp0myxfzi22b"; 17 18 patches = [ 19 ./add-stcli-target.patch 20 ];
··· 15 16 vendorSha256 = "1gmdv0g0gymq6khrwvplw6yfp146kg5ar8vqdp5dlp0myxfzi22b"; 17 18 + doCheck = false; 19 + 20 patches = [ 21 ./add-stcli-target.patch 22 ];
+2
pkgs/applications/networking/websocketd/default.nix
··· 13 14 vendorSha256 = "05k31z4h3b327mh940zh52im4xfk7kf5phb8b7xp4l9bgckhz4lb"; 15 16 meta = with lib; { 17 description = "Turn any program that uses STDIN/STDOUT into a WebSocket server"; 18 homepage = "http://websocketd.com/";
··· 13 14 vendorSha256 = "05k31z4h3b327mh940zh52im4xfk7kf5phb8b7xp4l9bgckhz4lb"; 15 16 + doCheck = false; 17 + 18 meta = with lib; { 19 description = "Turn any program that uses STDIN/STDOUT into a WebSocket server"; 20 homepage = "http://websocketd.com/";
+2
pkgs/applications/version-management/git-and-tools/gh/default.nix
··· 13 14 vendorSha256 = "1xq1n583p0a3j78afprm2hk5f1hchdrx4vvphml95rv9786vjbcc"; 15 16 nativeBuildInputs = [ installShellFiles ]; 17 18 buildPhase = ''
··· 13 14 vendorSha256 = "1xq1n583p0a3j78afprm2hk5f1hchdrx4vvphml95rv9786vjbcc"; 15 16 + doCheck = false; 17 + 18 nativeBuildInputs = [ installShellFiles ]; 19 20 buildPhase = ''
+2
pkgs/applications/version-management/git-and-tools/ghq/default.nix
··· 13 14 vendorSha256 = "0gll132g111vn1hdmdjpkha9rbyppz0qj1ld89gwlk2mqd57jxkd"; 15 16 buildFlagsArray = '' 17 -ldflags= 18 -X=main.Version=${version}
··· 13 14 vendorSha256 = "0gll132g111vn1hdmdjpkha9rbyppz0qj1ld89gwlk2mqd57jxkd"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = '' 19 -ldflags= 20 -X=main.Version=${version}
+2
pkgs/applications/version-management/git-and-tools/git-bug/default.nix
··· 15 16 vendorSha256 = "0c8b47lj4wl3s21lm0vx4z7hznylm8c4fb8b8gxm278kn3zys607"; 17 18 buildFlagsArray = '' 19 -ldflags= 20 -X ${goPackagePath}/commands.GitCommit=${rev}
··· 15 16 vendorSha256 = "0c8b47lj4wl3s21lm0vx4z7hznylm8c4fb8b8gxm278kn3zys607"; 17 18 + doCheck = false; 19 + 20 buildFlagsArray = '' 21 -ldflags= 22 -X ${goPackagePath}/commands.GitCommit=${rev}
+2
pkgs/applications/version-management/git-and-tools/git-subtrac/default.nix
··· 13 14 vendorSha256 = "1ccwbhzwys8sl3m2rs2lp70snzsi2a0ahnnq8kn15rrlvsv5qahf"; 15 16 meta = with lib; { 17 description = "Keep the content for your git submodules all in one place: the parent repo"; 18 homepage = "https://github.com/apenwarr/git-subtrac";
··· 13 14 vendorSha256 = "1ccwbhzwys8sl3m2rs2lp70snzsi2a0ahnnq8kn15rrlvsv5qahf"; 15 16 + doCheck = false; 17 + 18 meta = with lib; { 19 description = "Keep the content for your git submodules all in one place: the parent repo"; 20 homepage = "https://github.com/apenwarr/git-subtrac";
+2
pkgs/applications/version-management/git-and-tools/lab/default.nix
··· 15 16 vendorSha256 = "1lrmafvv5zfn9kc0p8g5vdz351n1zbaqwhwk861fxys0rdpqskyc"; 17 18 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 19 20 postInstall = ''
··· 15 16 vendorSha256 = "1lrmafvv5zfn9kc0p8g5vdz351n1zbaqwhwk861fxys0rdpqskyc"; 17 18 + doCheck = false; 19 + 20 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 21 22 postInstall = ''
+2
pkgs/applications/version-management/git-and-tools/lefthook/default.nix
··· 13 14 vendorSha256 = "1pdrw4vwbj9cka2pjbjvxviigfvnrf8sgws27ixwwiblbkj4isc8"; 15 16 meta = with stdenv.lib; { 17 description = "Fast and powerful Git hooks manager for any type of projects"; 18 homepage = "https://github.com/Arkweid/lefthook";
··· 13 14 vendorSha256 = "1pdrw4vwbj9cka2pjbjvxviigfvnrf8sgws27ixwwiblbkj4isc8"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "Fast and powerful Git hooks manager for any type of projects"; 20 homepage = "https://github.com/Arkweid/lefthook";
+2
pkgs/applications/version-management/sourcehut/builds.nix
··· 12 goPackagePath = "git.sr.ht/~sircmpwn/builds.sr.ht/worker"; 13 14 vendorSha256 = "0prdlihcy5yz760llwyby747yy2981dn3gy401a48df7ndlfj6lp"; 15 }; 16 in buildPythonPackage rec { 17 inherit version;
··· 12 goPackagePath = "git.sr.ht/~sircmpwn/builds.sr.ht/worker"; 13 14 vendorSha256 = "0prdlihcy5yz760llwyby747yy2981dn3gy401a48df7ndlfj6lp"; 15 + 16 + doCheck = false; 17 }; 18 in buildPythonPackage rec { 19 inherit version;
+8
pkgs/applications/version-management/sourcehut/git.nix
··· 12 goPackagePath = "git.sr.ht/~sircmpwn/git.sr.ht/gitsrht-shell"; 13 14 vendorSha256 = "1zvbqn4r940mibn4h1cqz94gbr476scm281ps361n0rfqlimw8g5"; 15 }; 16 17 buildDispatcher = src: buildGoModule { ··· 20 goPackagePath = "git.sr.ht/~sircmpwn/git.sr.ht/gitsrht-dispatch"; 21 22 vendorSha256 = "1lzkf13m54pq0gnn3bcxc80nfg76hgck4l8q8jpaicrsiwgcyrd9"; 23 }; 24 25 buildKeys = src: buildGoModule { ··· 28 goPackagePath = "git.sr.ht/~sircmpwn/git.sr.ht/gitsrht-keys"; 29 30 vendorSha256 = "16j7kpar318s4766pln8xn6d51xqblwig5n1jywhj0sl80qjl5cv"; 31 }; 32 33 buildUpdateHook = src: buildGoModule { ··· 36 goPackagePath = "git.sr.ht/~sircmpwn/git.sr.ht/gitsrht-update-hook"; 37 38 vendorSha256 = "1rmv3p60g6w4h4v9wx99jkyx0q02snslyjrjy9n1flardjs01b63"; 39 }; 40 in buildPythonPackage rec { 41 inherit version;
··· 12 goPackagePath = "git.sr.ht/~sircmpwn/git.sr.ht/gitsrht-shell"; 13 14 vendorSha256 = "1zvbqn4r940mibn4h1cqz94gbr476scm281ps361n0rfqlimw8g5"; 15 + 16 + doCheck = false; 17 }; 18 19 buildDispatcher = src: buildGoModule { ··· 22 goPackagePath = "git.sr.ht/~sircmpwn/git.sr.ht/gitsrht-dispatch"; 23 24 vendorSha256 = "1lzkf13m54pq0gnn3bcxc80nfg76hgck4l8q8jpaicrsiwgcyrd9"; 25 + 26 + doCheck = false; 27 }; 28 29 buildKeys = src: buildGoModule { ··· 32 goPackagePath = "git.sr.ht/~sircmpwn/git.sr.ht/gitsrht-keys"; 33 34 vendorSha256 = "16j7kpar318s4766pln8xn6d51xqblwig5n1jywhj0sl80qjl5cv"; 35 + 36 + doCheck = false; 37 }; 38 39 buildUpdateHook = src: buildGoModule { ··· 42 goPackagePath = "git.sr.ht/~sircmpwn/git.sr.ht/gitsrht-update-hook"; 43 44 vendorSha256 = "1rmv3p60g6w4h4v9wx99jkyx0q02snslyjrjy9n1flardjs01b63"; 45 + 46 + doCheck = false; 47 }; 48 in buildPythonPackage rec { 49 inherit version;
+3
pkgs/applications/virtualization/cri-o/default.nix
··· 23 sha256 = "1csdbyypqwxkfc061pdv7nj52a52b9xxzb6qgxcznd82w7wgfb3g"; 24 }; 25 vendorSha256 = null; 26 outputs = [ "out" "man" ]; 27 nativeBuildInputs = [ installShellFiles pkg-config ]; 28
··· 23 sha256 = "1csdbyypqwxkfc061pdv7nj52a52b9xxzb6qgxcznd82w7wgfb3g"; 24 }; 25 vendorSha256 = null; 26 + 27 + doCheck = false; 28 + 29 outputs = [ "out" "man" ]; 30 nativeBuildInputs = [ installShellFiles pkg-config ]; 31
+2
pkgs/applications/virtualization/firectl/default.nix
··· 15 16 vendorSha256 = "1xbpck1gvzl75xgrajf5yzl199l4f2f6j3mac5586i7b00b9jxqj"; 17 18 meta = with stdenv.lib; { 19 description = "A command-line tool to run Firecracker microVMs"; 20 homepage = "https://github.com/firecracker-microvm/firectl";
··· 15 16 vendorSha256 = "1xbpck1gvzl75xgrajf5yzl199l4f2f6j3mac5586i7b00b9jxqj"; 17 18 + doCheck = false; 19 + 20 meta = with stdenv.lib; { 21 description = "A command-line tool to run Firecracker microVMs"; 22 homepage = "https://github.com/firecracker-microvm/firectl";
+2
pkgs/applications/virtualization/podman/default.nix
··· 27 28 vendorSha256 = null; 29 30 outputs = [ "out" "man" ]; 31 32 nativeBuildInputs = [ pkg-config go-md2man installShellFiles ];
··· 27 28 vendorSha256 = null; 29 30 + doCheck = false; 31 + 32 outputs = [ "out" "man" ]; 33 34 nativeBuildInputs = [ pkg-config go-md2man installShellFiles ];
+2
pkgs/applications/virtualization/umoci/default.nix
··· 18 19 vendorSha256 = null; 20 21 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 22 23 nativeBuildInputs = [ go-md2man installShellFiles ];
··· 18 19 vendorSha256 = null; 20 21 + doCheck = false; 22 + 23 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 24 25 nativeBuildInputs = [ go-md2man installShellFiles ];
+2
pkgs/development/arduino/arduino-cli/default.nix
··· 17 18 vendorSha256 = "1qybym95a38az8lk8bqc53ngn08hijckajv8v2giifc4q7sb17d2"; 19 20 buildFlagsArray = [ 21 "-ldflags=-s -w -X github.com/arduino/arduino-cli/version.versionString=${version} -X github.com/arduino/arduino-cli/version.commit=unknown" 22 ] ++ stdenv.lib.optionals stdenv.isLinux [ "-extldflags '-static'" ];
··· 17 18 vendorSha256 = "1qybym95a38az8lk8bqc53ngn08hijckajv8v2giifc4q7sb17d2"; 19 20 + doCheck = false; 21 + 22 buildFlagsArray = [ 23 "-ldflags=-s -w -X github.com/arduino/arduino-cli/version.versionString=${version} -X github.com/arduino/arduino-cli/version.commit=unknown" 24 ] ++ stdenv.lib.optionals stdenv.isLinux [ "-extldflags '-static'" ];
+2
pkgs/development/compilers/go-jsonnet/default.nix
··· 13 14 vendorSha256 = "0nsm4gsbbn8myz4yfi6m7qc3iizhdambsr18iks0clkdn3mi2jn1"; 15 16 subPackages = [ "cmd/jsonnet" "cmd/jsonnetfmt" ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "0nsm4gsbbn8myz4yfi6m7qc3iizhdambsr18iks0clkdn3mi2jn1"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/jsonnet" "cmd/jsonnetfmt" ]; 19 20 meta = with lib; {
+3
pkgs/development/compilers/tinygo/default.nix
··· 27 preBuild = "cp ${gomod} go.mod"; 28 29 vendorSha256 = "19194dlzpl6zzw2gqybma5pwip71rw8z937f104k6c158qzzgy62"; 30 enableParallelBuilding = true; 31 subPackages = [ "." ]; 32 buildInputs = [ llvm clang-unwrapped makeWrapper ];
··· 27 preBuild = "cp ${gomod} go.mod"; 28 29 vendorSha256 = "19194dlzpl6zzw2gqybma5pwip71rw8z937f104k6c158qzzgy62"; 30 + 31 + doCheck = false; 32 + 33 enableParallelBuilding = true; 34 subPackages = [ "." ]; 35 buildInputs = [ llvm clang-unwrapped makeWrapper ];
+2
pkgs/development/interpreters/joker/default.nix
··· 13 14 vendorSha256 = "031ban30kx84r54fj9aq96pwkz9nqh4p9yzs4l8i1wqmy52rldvl"; 15 16 preBuild = '' 17 go generate ./... 18 '';
··· 13 14 vendorSha256 = "031ban30kx84r54fj9aq96pwkz9nqh4p9yzs4l8i1wqmy52rldvl"; 15 16 + doCheck = false; 17 + 18 preBuild = '' 19 go generate ./... 20 '';
+4
pkgs/development/libraries/packr/default.nix
··· 20 21 vendorSha256 = "12yq121b0bn8z12091fyqhhz421kgx4z1nskrkvbxlhyc47bwyrp"; 22 23 meta = with stdenv.lib; { 24 description = "The simple and easy way to embed static files into Go binaries"; 25 homepage = "https://github.com/gobuffalo/packr"; ··· 41 subPackages = [ "packr" ]; 42 43 vendorSha256 = "0m3yj8ww4a16j56p8d8w0sdnyx0g2bkd8zg0l4d8vb72mvg5asga"; 44 45 meta = with lib; { 46 description = "The simple and easy way to embed static files into Go binaries";
··· 20 21 vendorSha256 = "12yq121b0bn8z12091fyqhhz421kgx4z1nskrkvbxlhyc47bwyrp"; 22 23 + doCheck = false; 24 + 25 meta = with stdenv.lib; { 26 description = "The simple and easy way to embed static files into Go binaries"; 27 homepage = "https://github.com/gobuffalo/packr"; ··· 43 subPackages = [ "packr" ]; 44 45 vendorSha256 = "0m3yj8ww4a16j56p8d8w0sdnyx0g2bkd8zg0l4d8vb72mvg5asga"; 46 + 47 + doCheck = false; 48 49 meta = with lib; { 50 description = "The simple and easy way to embed static files into Go binaries";
+2
pkgs/development/libraries/pkger/default.nix
··· 17 18 vendorSha256 = "1b9gpym6kb4hpdbrixphfh1qylmqr265jrmcd4vxb87ahvrsrvgp"; 19 20 meta = with stdenv.lib; { 21 description = "Embed static files in Go binaries (replacement for gobuffalo/packr) "; 22 homepage = "https://github.com/markbates/pkger";
··· 17 18 vendorSha256 = "1b9gpym6kb4hpdbrixphfh1qylmqr265jrmcd4vxb87ahvrsrvgp"; 19 20 + doCheck = false; 21 + 22 meta = with stdenv.lib; { 23 description = "Embed static files in Go binaries (replacement for gobuffalo/packr) "; 24 homepage = "https://github.com/markbates/pkger";
+2
pkgs/development/libraries/protolock/default.nix
··· 13 14 vendorSha256 = "0ap1iwcapvvvmwgdc4zbsp8mglrhbswkdgm4dw8baw8qk0nlci6y"; 15 16 postInstall = '' 17 rm $out/bin/plugin* 18 '';
··· 13 14 vendorSha256 = "0ap1iwcapvvvmwgdc4zbsp8mglrhbswkdgm4dw8baw8qk0nlci6y"; 15 16 + doCheck = false; 17 + 18 postInstall = '' 19 rm $out/bin/plugin* 20 '';
+2
pkgs/development/tools/analysis/tflint/default.nix
··· 13 14 vendorSha256 = "1khb8rdy5agj904nig6dfhagckvfcx79f028wcvwr625la3pcjfc"; 15 16 subPackages = [ "." ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "1khb8rdy5agj904nig6dfhagckvfcx79f028wcvwr625la3pcjfc"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "." ]; 19 20 meta = with lib; {
+2
pkgs/development/tools/azcopy/default.nix
··· 15 16 vendorSha256 = "10bpzf8f7ibx1wzd0nzh5q1ynwfjr4n1gjygq4zqqxg51ganqj82"; 17 18 postInstall = '' 19 ln -rs "$out/bin/azure-storage-azcopy" "$out/bin/azcopy" 20 '';
··· 15 16 vendorSha256 = "10bpzf8f7ibx1wzd0nzh5q1ynwfjr4n1gjygq4zqqxg51ganqj82"; 17 18 + doCheck = false; 19 + 20 postInstall = '' 21 ln -rs "$out/bin/azure-storage-azcopy" "$out/bin/azcopy" 22 '';
+2
pkgs/development/tools/bazel-gazelle/default.nix
··· 16 17 vendorSha256 = null; 18 19 subPackages = [ "cmd/gazelle" ]; 20 21 meta = with lib; {
··· 16 17 vendorSha256 = null; 18 19 + doCheck = false; 20 + 21 subPackages = [ "cmd/gazelle" ]; 22 23 meta = with lib; {
+2
pkgs/development/tools/bazel-kazel/default.nix
··· 13 14 vendorSha256 = "1pzkjh4n9ai8yqi98bkdhicjdr2l8j3fckl5n90c2gdcwqyxvgkf"; 15 16 subPackages = [ "cmd/kazel" ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "1pzkjh4n9ai8yqi98bkdhicjdr2l8j3fckl5n90c2gdcwqyxvgkf"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/kazel" ]; 19 20 meta = with lib; {
+2
pkgs/development/tools/bazelisk/default.nix
··· 15 16 vendorSha256 = "1jgm6j04glvk7ib5yd0h04p9qxzl1ca100cv909kngx52jp61yxp"; 17 18 buildFlagsArray = [ "-ldflags=-s -w -X main.BazeliskVersion=${version}" ]; 19 20 meta = with stdenv.lib; {
··· 15 16 vendorSha256 = "1jgm6j04glvk7ib5yd0h04p9qxzl1ca100cv909kngx52jp61yxp"; 17 18 + doCheck = false; 19 + 20 buildFlagsArray = [ "-ldflags=-s -w -X main.BazeliskVersion=${version}" ]; 21 22 meta = with stdenv.lib; {
+2
pkgs/development/tools/build-managers/mage/default.nix
··· 13 14 vendorSha256 = "0sjjj9z1dhilhpc8pq4154czrb79z9cm044jvn75kxcjv6v5l2m5"; 15 16 buildFlagsArray = [ 17 "-ldflags=" 18 "-X github.com/magefile/mage/mage.commitHash=v${version}"
··· 13 14 vendorSha256 = "0sjjj9z1dhilhpc8pq4154czrb79z9cm044jvn75kxcjv6v5l2m5"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ 19 "-ldflags=" 20 "-X github.com/magefile/mage/mage.commitHash=v${version}"
+2
pkgs/development/tools/buildah/default.nix
··· 26 27 vendorSha256 = null; 28 29 nativeBuildInputs = [ installShellFiles pkg-config ]; 30 31 buildInputs = [
··· 26 27 vendorSha256 = null; 28 29 + doCheck = false; 30 + 31 nativeBuildInputs = [ installShellFiles pkg-config ]; 32 33 buildInputs = [
+2
pkgs/development/tools/conftest/default.nix
··· 13 14 vendorSha256 = "150fj2c9qll39wiqk41w0qms0sdqiacb2z015j38kg60r8f6i4lm"; 15 16 buildFlagsArray = '' 17 -ldflags= 18 -X main.version=${version}
··· 13 14 vendorSha256 = "150fj2c9qll39wiqk41w0qms0sdqiacb2z015j38kg60r8f6i4lm"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = '' 19 -ldflags= 20 -X main.version=${version}
+2
pkgs/development/tools/continuous-integration/buildkite-cli/default.nix
··· 13 14 vendorSha256 = "0jxh3yhh0sdvaykhinxngpipk369hw8z1y3g2z4c1115m5rjp2bb"; 15 16 subPackages = [ "cmd/bk" ]; 17 18 buildFlagsArray = [ "-ldflags=-s -w -X main.VERSION=${version}" ];
··· 13 14 vendorSha256 = "0jxh3yhh0sdvaykhinxngpipk369hw8z1y3g2z4c1115m5rjp2bb"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/bk" ]; 19 20 buildFlagsArray = [ "-ldflags=-s -w -X main.VERSION=${version}" ];
+2
pkgs/development/tools/continuous-integration/drone-cli/default.nix
··· 9 10 vendorSha256 = "1zzx5yy0pp0c8pias4sfxfvdzhhrff9f8j51qf6dkif99xwdq3hb"; 11 12 preBuild = '' 13 buildFlagsArray+=("-ldflags" "-X main.version=${version}") 14 '';
··· 9 10 vendorSha256 = "1zzx5yy0pp0c8pias4sfxfvdzhhrff9f8j51qf6dkif99xwdq3hb"; 11 12 + doCheck = false; 13 + 14 preBuild = '' 15 buildFlagsArray+=("-ldflags" "-X main.version=${version}") 16 '';
+2
pkgs/development/tools/continuous-integration/drone/default.nix
··· 7 8 vendorSha256 = "0idf11sr417lxcjryplgb87affr6lgzxazzlyvk0y40hp8zbhwsx"; 9 10 src = fetchFromGitHub { 11 owner = "drone"; 12 repo = "drone";
··· 7 8 vendorSha256 = "0idf11sr417lxcjryplgb87affr6lgzxazzlyvk0y40hp8zbhwsx"; 9 10 + doCheck = false; 11 + 12 src = fetchFromGitHub { 13 owner = "drone"; 14 repo = "drone";
+2
pkgs/development/tools/continuous-integration/fly/default.nix
··· 13 14 vendorSha256 = "0a78cjfj909ic8wci8id2h5f6r34h90myk6z7m918n08vxv60jvw"; 15 16 subPackages = [ "fly" ]; 17 18 buildFlagsArray = ''
··· 13 14 vendorSha256 = "0a78cjfj909ic8wci8id2h5f6r34h90myk6z7m918n08vxv60jvw"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "fly" ]; 19 20 buildFlagsArray = ''
+2
pkgs/development/tools/cue/default.nix
··· 12 13 vendorSha256 = "0l6slaji9nh16jqp1nvib95h2db1xyjh6knk5hj2zaa1rks4b092"; 14 15 subPackages = [ "cmd/cue" ]; 16 17 buildFlagsArray = [
··· 12 13 vendorSha256 = "0l6slaji9nh16jqp1nvib95h2db1xyjh6knk5hj2zaa1rks4b092"; 14 15 + doCheck = false; 16 + 17 subPackages = [ "cmd/cue" ]; 18 19 buildFlagsArray = [
+2
pkgs/development/tools/database/dbmate/default.nix
··· 13 14 vendorSha256 = "00vp925vf9clk5bkw5fvj34id4v548rlssizh52z9psvdizj8q5p"; 15 16 meta = with stdenv.lib; { 17 description = "Database migration tool"; 18 homepage = "https://github.com/amacneil/dbmate";
··· 13 14 vendorSha256 = "00vp925vf9clk5bkw5fvj34id4v548rlssizh52z9psvdizj8q5p"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "Database migration tool"; 20 homepage = "https://github.com/amacneil/dbmate";
+2
pkgs/development/tools/dive/default.nix
··· 13 14 vendorSha256 = "0219q9zjc0i6fbdngqh0wjpmq8wj5bjiz5dls0c1aam0lh4vwkhc"; 15 16 nativeBuildInputs = [ pkg-config ]; 17 18 buildInputs = stdenv.lib.optionals stdenv.isLinux [ btrfs-progs gpgme lvm2 ];
··· 13 14 vendorSha256 = "0219q9zjc0i6fbdngqh0wjpmq8wj5bjiz5dls0c1aam0lh4vwkhc"; 15 16 + doCheck = false; 17 + 18 nativeBuildInputs = [ pkg-config ]; 19 20 buildInputs = stdenv.lib.optionals stdenv.isLinux [ btrfs-progs gpgme lvm2 ];
+2
pkgs/development/tools/doctl/default.nix
··· 6 7 vendorSha256 = null; 8 9 subPackages = [ "cmd/doctl" ]; 10 11 buildFlagsArray = let t = "github.com/digitalocean/doctl"; in ''
··· 6 7 vendorSha256 = null; 8 9 + doCheck = false; 10 + 11 subPackages = [ "cmd/doctl" ]; 12 13 buildFlagsArray = let t = "github.com/digitalocean/doctl"; in ''
+2
pkgs/development/tools/fedora-coreos-config-transpiler/default.nix
··· 15 16 vendorSha256 = null; 17 18 subPackages = [ "internal" ]; 19 20 buildFlagsArray = ''
··· 15 16 vendorSha256 = null; 17 18 + doCheck = false; 19 + 20 subPackages = [ "internal" ]; 21 22 buildFlagsArray = ''
+2
pkgs/development/tools/go-protobuf/default.nix
··· 13 14 vendorSha256 = "04w9vhkrwb2zfqk73xmhignjyvjqmz1j93slkqp7v8jj2dhyla54"; 15 16 meta = with stdenv.lib; { 17 homepage = "https://github.com/golang/protobuf"; 18 description = " Go bindings for protocol buffer";
··· 13 14 vendorSha256 = "04w9vhkrwb2zfqk73xmhignjyvjqmz1j93slkqp7v8jj2dhyla54"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 homepage = "https://github.com/golang/protobuf"; 20 description = " Go bindings for protocol buffer";
+2
pkgs/development/tools/go-swagger/default.nix
··· 13 14 vendorSha256 = "0vvr167spwk7whqzdp5vd8sm0qwc5g3namm4iqw3vff2pifjgs40"; 15 16 subPackages = [ "cmd/swagger" ]; 17 18 buildFlagsArray = [ "-ldflags=-s -w -X github.com/go-swagger/go-swagger/cmd/swagger/commands.Version=${version} -X github.com/go-swagger/go-swagger/cmd/swagger/commands.Commit=${src.rev}" ];
··· 13 14 vendorSha256 = "0vvr167spwk7whqzdp5vd8sm0qwc5g3namm4iqw3vff2pifjgs40"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/swagger" ]; 19 20 buildFlagsArray = [ "-ldflags=-s -w -X github.com/go-swagger/go-swagger/cmd/swagger/commands.Version=${version} -X github.com/go-swagger/go-swagger/cmd/swagger/commands.Commit=${src.rev}" ];
+2
pkgs/development/tools/go-task/default.nix
··· 13 14 vendorSha256 = null; 15 16 subPackages = [ "cmd/task" ]; 17 18 buildFlagsArray = [
··· 13 14 vendorSha256 = null; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/task" ]; 19 20 buildFlagsArray = [
+2
pkgs/development/tools/go-tools/default.nix
··· 16 17 vendorSha256 = "0nbbngsphklzhcmqafrw1im2l1vnfcma9sb4vskdpdrsadv5ss5r"; 18 19 meta = with lib; { 20 description = "A collection of tools and libraries for working with Go code, including linters and static analysis"; 21 homepage = "https://staticcheck.io";
··· 16 17 vendorSha256 = "0nbbngsphklzhcmqafrw1im2l1vnfcma9sb4vskdpdrsadv5ss5r"; 18 19 + doCheck = false; 20 + 21 meta = with lib; { 22 description = "A collection of tools and libraries for working with Go code, including linters and static analysis"; 23 homepage = "https://staticcheck.io";
+2
pkgs/development/tools/godef/default.nix
··· 10 11 vendorSha256 = null; 12 13 src = fetchFromGitHub { 14 inherit rev; 15 owner = "rogpeppe";
··· 10 11 vendorSha256 = null; 12 13 + doCheck = false; 14 + 15 src = fetchFromGitHub { 16 inherit rev; 17 owner = "rogpeppe";
+2
pkgs/development/tools/gofumpt/default.nix
··· 13 14 vendorSha256 = "14a3p163xy861xb6x160wy15hzjc75n36jdyzaxl877i17shba8z"; 15 16 meta = with lib; { 17 description = "A stricter gofmt"; 18 homepage = "https://github.com/mvdan/gofumpt";
··· 13 14 vendorSha256 = "14a3p163xy861xb6x160wy15hzjc75n36jdyzaxl877i17shba8z"; 15 16 + doCheck = false; 17 + 18 meta = with lib; { 19 description = "A stricter gofmt"; 20 homepage = "https://github.com/mvdan/gofumpt";
+2
pkgs/development/tools/gogetdoc/default.nix
··· 10 11 vendorSha256 = null; 12 13 excludedPackages = "\\(testdata\\)"; 14 15 src = fetchFromGitHub {
··· 10 11 vendorSha256 = null; 12 13 + doCheck = false; 14 + 15 excludedPackages = "\\(testdata\\)"; 16 17 src = fetchFromGitHub {
+3
pkgs/development/tools/golangci-lint/default.nix
··· 12 }; 13 14 vendorSha256 = "15wl6xblwyqs7pbbi2yy3y0ysj0k34qf05jfh69k9i9xf9k8hp6a"; 15 subPackages = [ "cmd/golangci-lint" ]; 16 17 nativeBuildInputs = [ installShellFiles ];
··· 12 }; 13 14 vendorSha256 = "15wl6xblwyqs7pbbi2yy3y0ysj0k34qf05jfh69k9i9xf9k8hp6a"; 15 + 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/golangci-lint" ]; 19 20 nativeBuildInputs = [ installShellFiles ];
+2
pkgs/development/tools/gomodifytags/default.nix
··· 6 7 vendorSha256 = null; 8 9 goPackagePath = "github.com/fatih/gomodifytags"; 10 11 src = fetchFromGitHub {
··· 6 7 vendorSha256 = null; 8 9 + doCheck = false; 10 + 11 goPackagePath = "github.com/fatih/gomodifytags"; 12 13 src = fetchFromGitHub {
+2
pkgs/development/tools/gopkgs/default.nix
··· 17 18 vendorSha256 = "1pwsc488ldw039by8nqpni801zry7dnf0rx4hhd73xpv2w7s8n2r"; 19 20 meta = { 21 description = "Tool to get list available Go packages."; 22 homepage = "https://github.com/uudashr/gopkgs";
··· 17 18 vendorSha256 = "1pwsc488ldw039by8nqpni801zry7dnf0rx4hhd73xpv2w7s8n2r"; 19 20 + doCheck = false; 21 + 22 meta = { 23 description = "Tool to get list available Go packages."; 24 homepage = "https://github.com/uudashr/gopkgs";
+2
pkgs/development/tools/gopls/default.nix
··· 13 modRoot = "gopls"; 14 vendorSha256 = "175051d858lsdir2hj5qcimp6hakbi9grpws1ssvk3r2jna27x1z"; 15 16 meta = with stdenv.lib; { 17 description = "Official language server for the Go language"; 18 homepage = "https://github.com/golang/tools/tree/master/gopls";
··· 13 modRoot = "gopls"; 14 vendorSha256 = "175051d858lsdir2hj5qcimp6hakbi9grpws1ssvk3r2jna27x1z"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "Official language server for the Go language"; 20 homepage = "https://github.com/golang/tools/tree/master/gopls";
+2
pkgs/development/tools/gore/default.nix
··· 13 14 vendorSha256 = "3bq6sRKS5dq7WCPpKGm2q5gFajthR3zhrTFGve9zXhY="; 15 16 meta = with stdenv.lib; { 17 description = "Yet another Go REPL that works nicely."; 18 homepage = "https://github.com/motemen/gore";
··· 13 14 vendorSha256 = "3bq6sRKS5dq7WCPpKGm2q5gFajthR3zhrTFGve9zXhY="; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "Yet another Go REPL that works nicely."; 20 homepage = "https://github.com/motemen/gore";
+2
pkgs/development/tools/gosec/default.nix
··· 17 18 vendorSha256 = "063dpq1k5lykp18gshlgg098yvppicv3cz8gjn1mvfhac2rl9yqr"; 19 20 buildFlagsArray = [ "-ldflags=-s -w -X main.Version=${version} -X main.GitTag=${src.rev} -X main.BuildDate=unknown" ]; 21 22 meta = with stdenv.lib; {
··· 17 18 vendorSha256 = "063dpq1k5lykp18gshlgg098yvppicv3cz8gjn1mvfhac2rl9yqr"; 19 20 + doCheck = false; 21 + 22 buildFlagsArray = [ "-ldflags=-s -w -X main.Version=${version} -X main.GitTag=${src.rev} -X main.BuildDate=unknown" ]; 23 24 meta = with stdenv.lib; {
+2
pkgs/development/tools/gotestsum/default.nix
··· 13 14 vendorSha256 = "1injixhllv41glb3yz276gjrkiwwkfimrhb367d2pvjpzqmhplan"; 15 16 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = "1injixhllv41glb3yz276gjrkiwwkfimrhb367d2pvjpzqmhplan"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 19 20 meta = with stdenv.lib; {
+2
pkgs/development/tools/gotools/default.nix
··· 23 24 vendorSha256 = "0pplmqxrnc8qnr5708igx4dm7rb0hicvhg6lh5hj8zkx38nb19s0"; 25 26 postConfigure = '' 27 # Make the builtin tools available here 28 mkdir -p $out/bin
··· 23 24 vendorSha256 = "0pplmqxrnc8qnr5708igx4dm7rb0hicvhg6lh5hj8zkx38nb19s0"; 25 26 + doCheck = false; 27 + 28 postConfigure = '' 29 # Make the builtin tools available here 30 mkdir -p $out/bin
+2
pkgs/development/tools/hcloud/default.nix
··· 17 18 vendorSha256 = "1m96j9cwqz2b67byf53qhgl3s0vfwaklj2pm8364qih0ilvifppj"; 19 20 buildFlagsArray = [ "-ldflags=-s -w -X github.com/hetznercloud/cli/cli.Version=${version}" ]; 21 22 postInstall = ''
··· 17 18 vendorSha256 = "1m96j9cwqz2b67byf53qhgl3s0vfwaklj2pm8364qih0ilvifppj"; 19 20 + doCheck = false; 21 + 22 buildFlagsArray = [ "-ldflags=-s -w -X github.com/hetznercloud/cli/cli.Version=${version}" ]; 23 24 postInstall = ''
+2
pkgs/development/tools/kcli/default.nix
··· 13 14 vendorSha256 = "0whqrms5mc7v14p2h1jfvkawm30xaylivijlsghrsaq468qcgg15"; 15 16 subPackages = [ "." ]; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = "0whqrms5mc7v14p2h1jfvkawm30xaylivijlsghrsaq468qcgg15"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "." ]; 19 20 meta = with stdenv.lib; {
+3
pkgs/development/tools/kind/default.nix
··· 14 }; 15 16 vendorSha256 = "1qvbm8v8yah6r6cw1cvdw79yiwxb2amzdkkzvzbwigy0j4bvn9mi"; 17 goPackagePath = "sigs.k8s.io/kind"; 18 subPackages = [ "." ]; 19
··· 14 }; 15 16 vendorSha256 = "1qvbm8v8yah6r6cw1cvdw79yiwxb2amzdkkzvzbwigy0j4bvn9mi"; 17 + 18 + doCheck = false; 19 + 20 goPackagePath = "sigs.k8s.io/kind"; 21 subPackages = [ "." ]; 22
+2
pkgs/development/tools/kubectx/default.nix
··· 13 14 vendorSha256 = "168hfdc2rfwpz2ls607bz5vsm1aw4brhwm8hmbiq1n1l2dn2dj0y"; 15 16 nativeBuildInputs = [ installShellFiles ]; 17 18 postInstall = ''
··· 13 14 vendorSha256 = "168hfdc2rfwpz2ls607bz5vsm1aw4brhwm8hmbiq1n1l2dn2dj0y"; 15 16 + doCheck = false; 17 + 18 nativeBuildInputs = [ installShellFiles ]; 19 20 postInstall = ''
+2
pkgs/development/tools/kubeprompt/default.nix
··· 21 goPackagePath = "github.com/jlesquembre/kubeprompt"; 22 vendorSha256 = "089lfkvyf00f05kkmr935jbrddf2c0v7m2356whqnz7ad6a2whsi"; 23 24 meta = with stdenv.lib; { 25 description = "Kubernetes prompt"; 26 homepage = "https://github.com/jlesquembre/kubeprompt";
··· 21 goPackagePath = "github.com/jlesquembre/kubeprompt"; 22 vendorSha256 = "089lfkvyf00f05kkmr935jbrddf2c0v7m2356whqnz7ad6a2whsi"; 23 24 + doCheck = false; 25 + 26 meta = with stdenv.lib; { 27 description = "Kubernetes prompt"; 28 homepage = "https://github.com/jlesquembre/kubeprompt";
+2
pkgs/development/tools/kustomize/default.nix
··· 26 deleteVendor = true; 27 vendorSha256 = "01ff3w4hwp4ynqhg8cplv0i2ixs811d2x2j6xbh1lslyyh3z3wc5"; 28 29 meta = with lib; { 30 description = "Customization of kubernetes YAML configurations"; 31 longDescription = ''
··· 26 deleteVendor = true; 27 vendorSha256 = "01ff3w4hwp4ynqhg8cplv0i2ixs811d2x2j6xbh1lslyyh3z3wc5"; 28 29 + doCheck = false; 30 + 31 meta = with lib; { 32 description = "Customization of kubernetes YAML configurations"; 33 longDescription = ''
+2
pkgs/development/tools/misc/act/default.nix
··· 13 14 vendorSha256 = "0qf26g0a2j1mbzlc7xjackww22w9bl1x0iw3q1x6kq7fp8xiwhdn"; 15 16 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "0qf26g0a2j1mbzlc7xjackww22w9bl1x0iw3q1x6kq7fp8xiwhdn"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 19 20 meta = with lib; {
+2
pkgs/development/tools/misc/circleci-cli/default.nix
··· 13 14 vendorSha256 = "0y35ps2pw9z7gi4z50byd1py87bf2jdvj7l7w2gxpppmhi83myc9"; 15 16 buildFlagsArray = [ "-ldflags=-s -w -X github.com/CircleCI-Public/circleci-cli/version.Version=${version}" ]; 17 18 preBuild = ''
··· 13 14 vendorSha256 = "0y35ps2pw9z7gi4z50byd1py87bf2jdvj7l7w2gxpppmhi83myc9"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ "-ldflags=-s -w -X github.com/CircleCI-Public/circleci-cli/version.Version=${version}" ]; 19 20 preBuild = ''
+2
pkgs/development/tools/misc/editorconfig-checker/default.nix
··· 13 14 vendorSha256 = "132blcdw3lywxhqslkcpwwvkzl4cpbbkhb7ba8mrvfgl5kvfm1q0"; 15 16 nativeBuildInputs = [ installShellFiles ]; 17 18 buildFlagsArray = [ "-ldflags=-X main.version=${version}" ];
··· 13 14 vendorSha256 = "132blcdw3lywxhqslkcpwwvkzl4cpbbkhb7ba8mrvfgl5kvfm1q0"; 15 16 + doCheck = false; 17 + 18 nativeBuildInputs = [ installShellFiles ]; 19 20 buildFlagsArray = [ "-ldflags=-X main.version=${version}" ];
+2
pkgs/development/tools/misc/go-license-detector/default.nix
··· 13 14 vendorSha256 = "0gan5l7vsq0hixxcymhhs8p07v92w60r0lhgvrr9a99nic12vmia"; 15 16 meta = with lib; { 17 description = "Reliable project licenses detector"; 18 homepage = "https://github.com/src-d/go-license-detector";
··· 13 14 vendorSha256 = "0gan5l7vsq0hixxcymhhs8p07v92w60r0lhgvrr9a99nic12vmia"; 15 16 + doCheck = false; 17 + 18 meta = with lib; { 19 description = "Reliable project licenses detector"; 20 homepage = "https://github.com/src-d/go-license-detector";
+2
pkgs/development/tools/misc/mkcert/default.nix
··· 13 14 vendorSha256 = "0b8ggdpbyxx5n2myhchhlwmm5nndwpykp1ylnzdyw12mdskfvn9h"; 15 16 goPackagePath = "github.com/FiloSottile/mkcert"; 17 buildFlagsArray = '' 18 -ldflags=
··· 13 14 vendorSha256 = "0b8ggdpbyxx5n2myhchhlwmm5nndwpykp1ylnzdyw12mdskfvn9h"; 15 16 + doCheck = false; 17 + 18 goPackagePath = "github.com/FiloSottile/mkcert"; 19 buildFlagsArray = '' 20 -ldflags=
+2
pkgs/development/tools/misc/nix-build-uncached/default.nix
··· 14 goPackagePath = "github.com/Mic92/nix-build-uncached"; 15 vendorSha256 = null; 16 17 nativeBuildInputs = [ makeWrapper ]; 18 19 postInstall = ''
··· 14 goPackagePath = "github.com/Mic92/nix-build-uncached"; 15 vendorSha256 = null; 16 17 + doCheck = false; 18 + 19 nativeBuildInputs = [ makeWrapper ]; 20 21 postInstall = ''
+2
pkgs/development/tools/misc/reviewdog/default.nix
··· 13 14 vendorSha256 = "0cxi01jxg89lsk91dv782746i8g9ksanx8igmgafq9vq25lld7yg"; 15 16 subPackages = [ "cmd/reviewdog" ]; 17 18 buildFlagsArray = [ "-ldflags=-s -w -X github.com/reviewdog/reviewdog/commands.Version=${version}" ];
··· 13 14 vendorSha256 = "0cxi01jxg89lsk91dv782746i8g9ksanx8igmgafq9vq25lld7yg"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/reviewdog" ]; 19 20 buildFlagsArray = [ "-ldflags=-s -w -X github.com/reviewdog/reviewdog/commands.Version=${version}" ];
+2
pkgs/development/tools/misc/terracognita/default.nix
··· 13 14 vendorSha256 = "1dmv16v1c9sydbl1g69pgwvrhznd0a133giwrcbqi4cyg1fdb3sr"; 15 16 subPackages = [ "." ]; 17 18 buildFlagsArray = [ "-ldflags=-s -w -X github.com/cycloidio/terracognita/cmd.Version=${version}" ];
··· 13 14 vendorSha256 = "1dmv16v1c9sydbl1g69pgwvrhznd0a133giwrcbqi4cyg1fdb3sr"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "." ]; 19 20 buildFlagsArray = [ "-ldflags=-s -w -X github.com/cycloidio/terracognita/cmd.Version=${version}" ];
+3
pkgs/development/tools/mockgen/default.nix
··· 9 sha256 = "1lj0dvd6div4jaq1s0afpwqaq9ah8cxhkq93wii2ably1xmp2l0a"; 10 }; 11 vendorSha256 = "1md4cg1zzhc276sc7i2v0xvg5pf6gzy0n9ga2g1lx3d572igq1wy"; 12 subPackages = [ "mockgen" ]; 13 14 meta = with lib; {
··· 9 sha256 = "1lj0dvd6div4jaq1s0afpwqaq9ah8cxhkq93wii2ably1xmp2l0a"; 10 }; 11 vendorSha256 = "1md4cg1zzhc276sc7i2v0xvg5pf6gzy0n9ga2g1lx3d572igq1wy"; 12 + 13 + doCheck = false; 14 + 15 subPackages = [ "mockgen" ]; 16 17 meta = with lib; {
+2
pkgs/development/tools/mod/default.nix
··· 13 14 vendorSha256 = "032s62rjjq7bqiz5fg17yfkq4j4dsbl6vhvs1wf2sg8jvbqmvdwn"; 15 16 subPackages = [ "cmd/mod" ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "032s62rjjq7bqiz5fg17yfkq4j4dsbl6vhvs1wf2sg8jvbqmvdwn"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/mod" ]; 19 20 meta = with lib; {
+2
pkgs/development/tools/operator-sdk/default.nix
··· 13 14 vendorSha256 = "1xk3zw8w2fynww0z4d66nlclhjf52bk4cv3bh51yyd1mr808lip5"; 15 16 subPackages = [ "cmd/operator-sdk" ]; 17 18 buildInputs = [ go makeWrapper ];
··· 13 14 vendorSha256 = "1xk3zw8w2fynww0z4d66nlclhjf52bk4cv3bh51yyd1mr808lip5"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/operator-sdk" ]; 19 20 buildInputs = [ go makeWrapper ];
+2
pkgs/development/tools/out-of-tree/default.nix
··· 14 15 vendorSha256 = "0kg5c4h7xnwfcfshrh5n76xv98wzr73kxzr8q65iphsjimbxcpy3"; 16 17 postFixup = '' 18 wrapProgram $out/bin/out-of-tree \ 19 --prefix PATH : "${stdenv.lib.makeBinPath [ qemu docker which ]}"
··· 14 15 vendorSha256 = "0kg5c4h7xnwfcfshrh5n76xv98wzr73kxzr8q65iphsjimbxcpy3"; 16 17 + doCheck = false; 18 + 19 postFixup = '' 20 wrapProgram $out/bin/out-of-tree \ 21 --prefix PATH : "${stdenv.lib.makeBinPath [ qemu docker which ]}"
+2
pkgs/development/tools/packet-cli/default.nix
··· 17 ln -s $out/bin/packet-cli $out/bin/packet 18 ''; 19 20 meta = with stdenv.lib; { 21 description = "Official Packet CLI"; 22 homepage = "https://github.com/packethost/packet-cli";
··· 17 ln -s $out/bin/packet-cli $out/bin/packet 18 ''; 19 20 + doCheck = false; 21 + 22 meta = with stdenv.lib; { 23 description = "Official Packet CLI"; 24 homepage = "https://github.com/packethost/packet-cli";
+2
pkgs/development/tools/pet/default.nix
··· 13 14 vendorSha256 = "0pnd89iqdj3f719xf4iy5r04n51d0rrrf0qb2zjirpw7vh7g82i9"; 15 16 subPackages = [ "." ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "0pnd89iqdj3f719xf4iy5r04n51d0rrrf0qb2zjirpw7vh7g82i9"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "." ]; 19 20 meta = with lib; {
+2
pkgs/development/tools/proto-contrib/default.nix
··· 13 14 vendorSha256 = "1ivvq5ch9grdrwqq29flv9821kyb16k0cj6wgj5v0dyn63w420aw"; 15 16 meta = with lib; { 17 description = "Contributed tools and other packages on top of the Go proto package"; 18 homepage = "https://github.com/emicklei/proto-contrib";
··· 13 14 vendorSha256 = "1ivvq5ch9grdrwqq29flv9821kyb16k0cj6wgj5v0dyn63w420aw"; 15 16 + doCheck = false; 17 + 18 meta = with lib; { 19 description = "Contributed tools and other packages on top of the Go proto package"; 20 homepage = "https://github.com/emicklei/proto-contrib";
+2
pkgs/development/tools/protoc-gen-doc/default.nix
··· 13 14 vendorSha256 = "17qdpsff8jk7ks5v6ix1rb966x3yvq03vk5bs2zbnxfdra7bv3n6"; 15 16 meta = with lib; { 17 description = "Documentation generator plugin for Google Protocol Buffers"; 18 longDescription = ''
··· 13 14 vendorSha256 = "17qdpsff8jk7ks5v6ix1rb966x3yvq03vk5bs2zbnxfdra7bv3n6"; 15 16 + doCheck = false; 17 + 18 meta = with lib; { 19 description = "Documentation generator plugin for Google Protocol Buffers"; 20 longDescription = ''
+2
pkgs/development/tools/prototool/default.nix
··· 15 16 vendorSha256 = "0gyj0yrri2j4yxmyn4d4vdhaxf2p08srpjcxg9zpaxwv5rrvipav"; 17 18 postInstall = '' 19 wrapProgram "$out/bin/prototool" \ 20 --prefix PROTOTOOL_PROTOC_BIN_PATH : "${protobuf}/bin/protoc" \
··· 15 16 vendorSha256 = "0gyj0yrri2j4yxmyn4d4vdhaxf2p08srpjcxg9zpaxwv5rrvipav"; 17 18 + doCheck = false; 19 + 20 postInstall = '' 21 wrapProgram "$out/bin/prototool" \ 22 --prefix PROTOTOOL_PROTOC_BIN_PATH : "${protobuf}/bin/protoc" \
+2
pkgs/development/tools/reftools/default.nix
··· 10 11 vendorSha256 = null; 12 13 goPackagePath = "github.com/davidrjenni/reftools"; 14 excludedPackages = "\\(cmd/fillswitch/test-fixtures\\)"; 15
··· 10 11 vendorSha256 = null; 12 13 + doCheck = false; 14 + 15 goPackagePath = "github.com/davidrjenni/reftools"; 16 excludedPackages = "\\(cmd/fillswitch/test-fixtures\\)"; 17
+2
pkgs/development/tools/renderizer/default.nix
··· 13 14 vendorSha256 = "13z357ww4j5bmmy8ag6d6gd5b2dib8kby73q8317pqnqzaxrrbcj"; 15 16 meta = with stdenv.lib; { 17 description = "CLI to render Go template text files"; 18 inherit (src.meta) homepage;
··· 13 14 vendorSha256 = "13z357ww4j5bmmy8ag6d6gd5b2dib8kby73q8317pqnqzaxrrbcj"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "CLI to render Go template text files"; 20 inherit (src.meta) homepage;
+2
pkgs/development/tools/richgo/default.nix
··· 13 14 vendorSha256 = "1nvk3akjwfcbvif1w4cglsqplcajlwq3mnvk9b75nmn9qaqfbfjf"; 15 16 subPackages = [ "." ]; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = "1nvk3akjwfcbvif1w4cglsqplcajlwq3mnvk9b75nmn9qaqfbfjf"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "." ]; 19 20 meta = with stdenv.lib; {
+2
pkgs/development/tools/run/default.nix
··· 12 13 vendorSha256 = "1g5rmiiwqpm8gky9yr5f2a7zsjjmm9i12r7yxj9cz7y3rmw9sw8c"; 14 15 meta = with stdenv.lib; { 16 description = "Easily manage and invoke small scripts and wrappers"; 17 homepage = "https://github.com/TekWizely/run";
··· 12 13 vendorSha256 = "1g5rmiiwqpm8gky9yr5f2a7zsjjmm9i12r7yxj9cz7y3rmw9sw8c"; 14 15 + doCheck = false; 16 + 17 meta = with stdenv.lib; { 18 description = "Easily manage and invoke small scripts and wrappers"; 19 homepage = "https://github.com/TekWizely/run";
+2
pkgs/development/tools/skopeo/default.nix
··· 28 29 vendorSha256 = null; 30 31 nativeBuildInputs = [ pkg-config go-md2man installShellFiles makeWrapper ]; 32 33 buildInputs = [ gpgme ]
··· 28 29 vendorSha256 = null; 30 31 + doCheck = false; 32 + 33 nativeBuildInputs = [ pkg-config go-md2man installShellFiles makeWrapper ]; 34 35 buildInputs = [ gpgme ]
+2
pkgs/development/tools/vend/default.nix
··· 16 17 vendorSha256 = null; 18 19 meta = with stdenv.lib; { 20 homepage = "https://github.com/c00w/vend"; 21 description = "A utility which vendors go code including c dependencies";
··· 16 17 vendorSha256 = null; 18 19 + doCheck = false; 20 + 21 meta = with stdenv.lib; { 22 homepage = "https://github.com/c00w/vend"; 23 description = "A utility which vendors go code including c dependencies";
+2
pkgs/development/tools/vultr-cli/default.nix
··· 13 14 vendorSha256 = null; 15 16 meta = with stdenv.lib; { 17 description = "Official command line tool for Vultr services"; 18 homepage = "https://github.com/vultr/vultr-cli";
··· 13 14 vendorSha256 = null; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "Official command line tool for Vultr services"; 20 homepage = "https://github.com/vultr/vultr-cli";
+2
pkgs/development/tools/yq-go/default.nix
··· 13 14 vendorSha256 = "1bjy3qr26zndr3dhh9gd33rhm5gy779525qgzjw4a4mla0p2q6kl"; 15 16 nativeBuildInputs = [ installShellFiles ]; 17 18 postInstall = ''
··· 13 14 vendorSha256 = "1bjy3qr26zndr3dhh9gd33rhm5gy779525qgzjw4a4mla0p2q6kl"; 15 16 + doCheck = false; 17 + 18 nativeBuildInputs = [ installShellFiles ]; 19 20 postInstall = ''
+2
pkgs/development/web/flyctl/default.nix
··· 19 20 vendorSha256 = "1gxz9pp4zl8q7pmwg9z261fjrjfr658k1sn5nq1xzz51wrlzg9ag"; 21 22 buildFlagsArray = [ "-ldflags=-s -w -X github.com/superfly/flyctl/flyctl.Version=${version} -X github.com/superfly/flyctl/flyctl.Commit=${src.rev} -X github.com/superfly/flyctl/flyctl.BuildDate=1970-01-01T00:00:00+0000 -X github.com/superfly/flyctl/flyctl.Environment=production" ]; 23 24 meta = with lib; {
··· 19 20 vendorSha256 = "1gxz9pp4zl8q7pmwg9z261fjrjfr658k1sn5nq1xzz51wrlzg9ag"; 21 22 + doCheck = false; 23 + 24 buildFlagsArray = [ "-ldflags=-s -w -X github.com/superfly/flyctl/flyctl.Version=${version} -X github.com/superfly/flyctl/flyctl.Commit=${src.rev} -X github.com/superfly/flyctl/flyctl.BuildDate=1970-01-01T00:00:00+0000 -X github.com/superfly/flyctl/flyctl.Environment=production" ]; 25 26 meta = with lib; {
+2
pkgs/development/web/minify/default.nix
··· 13 14 vendorSha256 = "120d3nzk8cr5496cxp5p6ydlzw9mmpg7dllqhv1kpgwlbxmd8vr3"; 15 16 buildFlagsArray = [ "-ldflags=-s -w -X main.Version=${version}" ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "120d3nzk8cr5496cxp5p6ydlzw9mmpg7dllqhv1kpgwlbxmd8vr3"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ "-ldflags=-s -w -X main.Version=${version}" ]; 19 20 meta = with lib; {
+2
pkgs/os-specific/darwin/smimesign/default.nix
··· 13 14 vendorSha256 = "00000000000000000hlvwysx045nbw0xr5nngh7zj1wcqxhhm206"; 15 16 buildFlagsArray = "-ldflags=-X main.versionString=${version}"; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "00000000000000000hlvwysx045nbw0xr5nngh7zj1wcqxhhm206"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = "-ldflags=-X main.versionString=${version}"; 19 20 meta = with lib; {
+2
pkgs/os-specific/linux/fscrypt/default.nix
··· 21 22 vendorSha256 = "0yak221mlyfacvlsaq9g3xiyk94n94vqgkbaji8d21pi8hhr38m6"; 23 24 nativeBuildInputs = [ gnum4 ]; 25 buildInputs = [ pam ]; 26
··· 21 22 vendorSha256 = "0yak221mlyfacvlsaq9g3xiyk94n94vqgkbaji8d21pi8hhr38m6"; 23 24 + doCheck = false; 25 + 26 nativeBuildInputs = [ gnum4 ]; 27 buildInputs = [ pam ]; 28
+2
pkgs/servers/blockbook/default.nix
··· 26 runVend = true; 27 vendorSha256 = "0p7vyw61nwvmaz7gz2bdh9fi6wp62i2vnzw6iz2r8cims4sbz53b"; 28 29 nativeBuildInputs = [ packr pkg-config ]; 30 31 buildInputs = [ bzip2 lz4 rocksdb snappy zeromq zlib ];
··· 26 runVend = true; 27 vendorSha256 = "0p7vyw61nwvmaz7gz2bdh9fi6wp62i2vnzw6iz2r8cims4sbz53b"; 28 29 + doCheck = false; 30 + 31 nativeBuildInputs = [ packr pkg-config ]; 32 33 buildInputs = [ bzip2 lz4 rocksdb snappy zeromq zlib ];
+2
pkgs/servers/caddy/default.nix
··· 16 }; 17 vendorSha256 = "09vnci9pp8zp7bvn8zj68wslz2nc54nhcd0ll31sqfjbp00215mj"; 18 19 preBuild = '' 20 cat << EOF > caddy/main.go 21 package main
··· 16 }; 17 vendorSha256 = "09vnci9pp8zp7bvn8zj68wslz2nc54nhcd0ll31sqfjbp00215mj"; 18 19 + doCheck = false; 20 + 21 preBuild = '' 22 cat << EOF > caddy/main.go 23 package main
+2
pkgs/servers/caddy/v2.nix
··· 15 16 vendorSha256 = "0jzx00c2b8y7zwl73r2fh1826spcd15y39nfzr53s5lay3fvkybc"; 17 18 meta = with stdenv.lib; { 19 homepage = "https://caddyserver.com"; 20 description = "Fast, cross-platform HTTP/2 web server with automatic HTTPS";
··· 15 16 vendorSha256 = "0jzx00c2b8y7zwl73r2fh1826spcd15y39nfzr53s5lay3fvkybc"; 17 18 + doCheck = false; 19 + 20 meta = with stdenv.lib; { 21 homepage = "https://caddyserver.com"; 22 description = "Fast, cross-platform HTTP/2 web server with automatic HTTPS";
+3
pkgs/servers/consul/default.nix
··· 27 subPackages = ["." "connect/certgen"]; 28 29 vendorSha256 = "12a2x8j4kc1vi3ip0cz81k6anfwac23iqqyz00wf7wpvgxqzcxn3"; 30 deleteVendor = true; 31 32 preBuild = ''
··· 27 subPackages = ["." "connect/certgen"]; 28 29 vendorSha256 = "12a2x8j4kc1vi3ip0cz81k6anfwac23iqqyz00wf7wpvgxqzcxn3"; 30 + 31 + doCheck = false; 32 + 33 deleteVendor = true; 34 35 preBuild = ''
+2
pkgs/servers/dgraph/default.nix
··· 13 14 vendorSha256 = "0n442nsa2whwb22dl0cjxspl8dc00rqv29zivcw9liwdzara81bw"; 15 16 nativeBuildInputs = [ installShellFiles ]; 17 18 # see licensing
··· 13 14 vendorSha256 = "0n442nsa2whwb22dl0cjxspl8dc00rqv29zivcw9liwdzara81bw"; 15 16 + doCheck = false; 17 + 18 nativeBuildInputs = [ installShellFiles ]; 19 20 # see licensing
+2
pkgs/servers/dns/coredns/default.nix
··· 15 16 vendorSha256 = "17znl3vkg73hnrfl697rw201nsd5sijgalnbkljk1b4m0a01zik1"; 17 18 meta = with stdenv.lib; { 19 homepage = "https://coredns.io"; 20 description = "A DNS server that runs middleware";
··· 15 16 vendorSha256 = "17znl3vkg73hnrfl697rw201nsd5sijgalnbkljk1b4m0a01zik1"; 17 18 + doCheck = false; 19 + 20 meta = with stdenv.lib; { 21 homepage = "https://coredns.io"; 22 description = "A DNS server that runs middleware";
+2
pkgs/servers/documize-community/default.nix
··· 13 14 vendorSha256 = null; 15 16 nativeBuildInputs = [ go-bindata go-bindata-assetfs ]; 17 18 # This is really weird, but they've managed to screw up
··· 13 14 vendorSha256 = null; 15 16 + doCheck = false; 17 + 18 nativeBuildInputs = [ go-bindata go-bindata-assetfs ]; 19 20 # This is really weird, but they've managed to screw up
+2
pkgs/servers/echoip/default.nix
··· 13 14 vendorSha256 = "0vvs717pl5gzggxpbn2vkyxmpiw5zjdfnpbh8i81xidbqvlnm22h"; 15 16 outputs = [ "out" "index" ]; 17 18 postInstall = ''
··· 13 14 vendorSha256 = "0vvs717pl5gzggxpbn2vkyxmpiw5zjdfnpbh8i81xidbqvlnm22h"; 15 16 + doCheck = false; 17 + 18 outputs = [ "out" "index" ]; 19 20 postInstall = ''
+3
pkgs/servers/etcd/3.4.nix
··· 7 #vendorSha256 = null; revert to `null` for > 3.4.10 8 9 vendorSha256 = "1fhrycl8m8ddb7mwasbyfiwrl4d9lfdk7zd3mxb7ahkipdp2c94z"; 10 deleteVendor = true; 11 12 src = fetchFromGitHub {
··· 7 #vendorSha256 = null; revert to `null` for > 3.4.10 8 9 vendorSha256 = "1fhrycl8m8ddb7mwasbyfiwrl4d9lfdk7zd3mxb7ahkipdp2c94z"; 10 + 11 + doCheck = false; 12 + 13 deleteVendor = true; 14 15 src = fetchFromGitHub {
+2
pkgs/servers/gobetween/default.nix
··· 23 24 vendorSha256 = "1nkni9ikpc0wngh5v0qmlpn5s9v85lb2ih22f3h3lih7nc29yv87"; 25 26 installPhase = '' 27 mkdir -p $out/bin 28 cp bin/gobetween $out/bin
··· 23 24 vendorSha256 = "1nkni9ikpc0wngh5v0qmlpn5s9v85lb2ih22f3h3lih7nc29yv87"; 25 26 + doCheck = false; 27 + 28 installPhase = '' 29 mkdir -p $out/bin 30 cp bin/gobetween $out/bin
+2
pkgs/servers/gortr/default.nix
··· 12 }; 13 vendorSha256 = "1nwrzbpqycr4ixk8a90pgaxcwakv5nlfnql6hmcc518qrva198wp"; 14 15 meta = with lib; { 16 description = "The RPKI-to-Router server used at Cloudflare"; 17 homepage = "https://github.com/cloudflare/gortr/";
··· 12 }; 13 vendorSha256 = "1nwrzbpqycr4ixk8a90pgaxcwakv5nlfnql6hmcc518qrva198wp"; 14 15 + doCheck = false; 16 + 17 meta = with lib; { 18 description = "The RPKI-to-Router server used at Cloudflare"; 19 homepage = "https://github.com/cloudflare/gortr/";
+2
pkgs/servers/gotify/default.nix
··· 23 24 vendorSha256 = import ./vendor-sha.nix; 25 26 postPatch = '' 27 substituteInPlace app.go \ 28 --replace 'Version = "unknown"' 'Version = "${version}"'
··· 23 24 vendorSha256 = import ./vendor-sha.nix; 25 26 + doCheck = false; 27 + 28 postPatch = '' 29 substituteInPlace app.go \ 30 --replace 'Version = "unknown"' 'Version = "${version}"'
+2
pkgs/servers/hasura/cli.nix
··· 12 13 vendorSha256 = "0a3mlkl00r680v8x3hy24ykggq5qm7k3101krlyfrb5y4karp75a"; 14 15 buildFlagsArray = [''-ldflags= 16 -X github.com/hasura/graphql-engine/cli/version.BuildVersion=${version} 17 -s
··· 12 13 vendorSha256 = "0a3mlkl00r680v8x3hy24ykggq5qm7k3101krlyfrb5y4karp75a"; 14 15 + doCheck = false; 16 + 17 buildFlagsArray = [''-ldflags= 18 -X github.com/hasura/graphql-engine/cli/version.BuildVersion=${version} 19 -s
+2
pkgs/servers/imgproxy/default.nix
··· 13 14 vendorSha256 = "1pvyr3lazza89njdl6q3h2nd0mkvjvbryyrfqv11kd3s52055ckz"; 15 16 nativeBuildInputs = [ pkg-config ]; 17 18 buildInputs = [ gobject-introspection vips ];
··· 13 14 vendorSha256 = "1pvyr3lazza89njdl6q3h2nd0mkvjvbryyrfqv11kd3s52055ckz"; 15 16 + doCheck = false; 17 + 18 nativeBuildInputs = [ pkg-config ]; 19 20 buildInputs = [ gobject-introspection vips ];
+2
pkgs/servers/kapow/default.nix
··· 17 18 vendorSha256 = "159s46rhg67mgglaxgddx3k8kssl0cqiq8yjdqgjhhxppf16r7dy"; 19 20 meta = with stdenv.lib; { 21 homepage = "https://github.com/BBVA/kapow"; 22 description = "Expose command-line tools over HTTP";
··· 17 18 vendorSha256 = "159s46rhg67mgglaxgddx3k8kssl0cqiq8yjdqgjhhxppf16r7dy"; 19 20 + doCheck = false; 21 + 22 meta = with stdenv.lib; { 23 homepage = "https://github.com/BBVA/kapow"; 24 description = "Expose command-line tools over HTTP";
+2
pkgs/servers/matterbridge/default.nix
··· 7 goPackagePath = "github.com/42wim/matterbridge"; 8 vendorSha256 = null; 9 10 src = fetchurl { 11 url = "https://github.com/42wim/matterbridge/archive/v${version}.tar.gz"; 12 sha256 = "1p89ik5zr1qq1abd9k1xfa4j62b11zdnl2gm52y0s5yx8slap4w0";
··· 7 goPackagePath = "github.com/42wim/matterbridge"; 8 vendorSha256 = null; 9 10 + doCheck = false; 11 + 12 src = fetchurl { 13 url = "https://github.com/42wim/matterbridge/archive/v${version}.tar.gz"; 14 sha256 = "1p89ik5zr1qq1abd9k1xfa4j62b11zdnl2gm52y0s5yx8slap4w0";
+3
pkgs/servers/mautrix-whatsapp/default.nix
··· 14 buildInputs = [ olm ]; 15 16 vendorSha256 = "05cqwprd1rcciw27wyz7lj1s3zmz2vq093vw1cx3kkjyf6lq8sk6"; 17 runVend = true; 18 19 meta = with stdenv.lib; {
··· 14 buildInputs = [ olm ]; 15 16 vendorSha256 = "05cqwprd1rcciw27wyz7lj1s3zmz2vq093vw1cx3kkjyf6lq8sk6"; 17 + 18 + doCheck = false; 19 + 20 runVend = true; 21 22 meta = with stdenv.lib; {
+2
pkgs/servers/minio/default.nix
··· 13 14 vendorSha256 = "15yx5nkyf424v42glg3cx0gkqckdfv1xn25570s9cwf8zid0zlxd"; 15 16 subPackages = [ "." ]; 17 18 buildFlagsArray = [''-ldflags=
··· 13 14 vendorSha256 = "15yx5nkyf424v42glg3cx0gkqckdfv1xn25570s9cwf8zid0zlxd"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "." ]; 19 20 buildFlagsArray = [''-ldflags=
+2
pkgs/servers/monitoring/do-agent/default.nix
··· 18 19 vendorSha256 = null; 20 21 postInstall = '' 22 install -Dm444 -t $out/lib/systemd/system $src/packaging/etc/systemd/system/do-agent.service 23 '';
··· 18 19 vendorSha256 = null; 20 21 + doCheck = false; 22 + 23 postInstall = '' 24 install -Dm444 -t $out/lib/systemd/system $src/packaging/etc/systemd/system/do-agent.service 25 '';
+2
pkgs/servers/monitoring/grafana/default.nix
··· 20 21 vendorSha256 = "00xvpxhnvxdf030978paywl794mlmgqzd94b64hh67946acnbjcl"; 22 23 postPatch = '' 24 substituteInPlace pkg/cmd/grafana-server/main.go \ 25 --replace 'var version = "5.0.0"' 'var version = "${version}"'
··· 20 21 vendorSha256 = "00xvpxhnvxdf030978paywl794mlmgqzd94b64hh67946acnbjcl"; 22 23 + doCheck = false; 24 + 25 postPatch = '' 26 substituteInPlace pkg/cmd/grafana-server/main.go \ 27 --replace 'var version = "5.0.0"' 'var version = "${version}"'
+3
pkgs/servers/monitoring/mtail/default.nix
··· 12 }; 13 14 vendorSha256 = "02fnvy897cygmipc5snza556qihjwrp1lf9qi9f5dzarphd6d0pw"; 15 subPackages = [ "cmd/mtail" ]; 16 17 preBuild = ''
··· 12 }; 13 14 vendorSha256 = "02fnvy897cygmipc5snza556qihjwrp1lf9qi9f5dzarphd6d0pw"; 15 + 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/mtail" ]; 19 20 preBuild = ''
+2
pkgs/servers/monitoring/prometheus/apcupsd-exporter.nix
··· 13 14 vendorSha256 = "09x8y8pmgfn897hvnk122ry460y12b8a7y5fafri5wn9vxab9r82"; 15 16 passthru.tests = { inherit (nixosTests.prometheus-exporters) apcupsd; }; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = "09x8y8pmgfn897hvnk122ry460y12b8a7y5fafri5wn9vxab9r82"; 15 16 + doCheck = false; 17 + 18 passthru.tests = { inherit (nixosTests.prometheus-exporters) apcupsd; }; 19 20 meta = with stdenv.lib; {
+2
pkgs/servers/monitoring/prometheus/dnsmasq-exporter.nix
··· 13 14 vendorSha256 = "1dqpa180pbdi2gcmp991d4cry560mx5rm5l9x065s9n9gnd38hvl"; 15 16 passthru.tests = { inherit (nixosTests.prometheus-exporters) dnsmasq; }; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = "1dqpa180pbdi2gcmp991d4cry560mx5rm5l9x065s9n9gnd38hvl"; 15 16 + doCheck = false; 17 + 18 passthru.tests = { inherit (nixosTests.prometheus-exporters) dnsmasq; }; 19 20 meta = with stdenv.lib; {
+2
pkgs/servers/monitoring/prometheus/keylight-exporter.nix
··· 13 14 vendorSha256 = "0w065ls8dp687jmps4xdffcarss1wyls14dngr43g58xjw6519gb"; 15 16 passthru.tests = { inherit (nixosTests.prometheus-exporters) keylight; }; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = "0w065ls8dp687jmps4xdffcarss1wyls14dngr43g58xjw6519gb"; 15 16 + doCheck = false; 17 + 18 passthru.tests = { inherit (nixosTests.prometheus-exporters) keylight; }; 19 20 meta = with stdenv.lib; {
+2
pkgs/servers/monitoring/prometheus/lnd-exporter.nix
··· 13 14 vendorSha256 = "083h2ksnqmcr48958r5pag9a28xvljpc3prip6wn70ifp2wpjpin"; 15 16 passthru.tests = { inherit (nixosTests.prometheus-exporters) lnd; }; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = "083h2ksnqmcr48958r5pag9a28xvljpc3prip6wn70ifp2wpjpin"; 15 16 + doCheck = false; 17 + 18 passthru.tests = { inherit (nixosTests.prometheus-exporters) lnd; }; 19 20 meta = with stdenv.lib; {
+2
pkgs/servers/monitoring/prometheus/mikrotik-exporter.nix
··· 13 14 vendorSha256 = "0i5x4d3ra0s41knmybbg8gnjxgraxkid6y3gfkjwa65xcbp7hr7q"; 15 16 passthru.tests = { inherit (nixosTests.prometheus-exporters) mikrotik; }; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = "0i5x4d3ra0s41knmybbg8gnjxgraxkid6y3gfkjwa65xcbp7hr7q"; 15 16 + doCheck = false; 17 + 18 passthru.tests = { inherit (nixosTests.prometheus-exporters) mikrotik; }; 19 20 meta = with stdenv.lib; {
+2
pkgs/servers/monitoring/prometheus/modemmanager-exporter.nix
··· 13 14 vendorSha256 = "0f6v97cvzdz7wygswpm87wf8r169x5rw28908vqhmqk644hli4zy"; 15 16 passthru.tests = { inherit (nixosTests.prometheus-exporters) modemmanager; }; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = "0f6v97cvzdz7wygswpm87wf8r169x5rw28908vqhmqk644hli4zy"; 15 16 + doCheck = false; 17 + 18 passthru.tests = { inherit (nixosTests.prometheus-exporters) modemmanager; }; 19 20 meta = with stdenv.lib; {
+2
pkgs/servers/monitoring/sensu-go/default.nix
··· 20 21 vendorSha256 = "06yfaj9k5n3jw8a142sscaqrvdw2lq51v884lp65wjdwy5c3jbba"; 22 23 buildFlagsArray = let 24 versionPkg = "github.com/sensu/sensu-go/version"; 25 in ''
··· 20 21 vendorSha256 = "06yfaj9k5n3jw8a142sscaqrvdw2lq51v884lp65wjdwy5c3jbba"; 22 23 + doCheck = false; 24 + 25 buildFlagsArray = let 26 versionPkg = "github.com/sensu/sensu-go/version"; 27 in ''
+2
pkgs/servers/monitoring/telegraf/default.nix
··· 20 runVend = true; 21 vendorSha256 = "0c2sayg49b2rq3fnrbf741b6zy8byhwxlnxkhf5160gzqn6jy2rw"; 22 23 buildFlagsArray = [ ''-ldflags= 24 -w -s -X main.version=${version} 25 '' ];
··· 20 runVend = true; 21 vendorSha256 = "0c2sayg49b2rq3fnrbf741b6zy8byhwxlnxkhf5160gzqn6jy2rw"; 22 23 + doCheck = false; 24 + 25 buildFlagsArray = [ ''-ldflags= 26 -w -s -X main.version=${version} 27 '' ];
+2
pkgs/servers/monitoring/thanos/default.nix
··· 12 13 vendorSha256 = "0ixriy5i1qc8hnslmiyd3qfw1g14zlmcslqwn2a9fpk7h0hwinba"; 14 15 subPackages = "cmd/thanos"; 16 17 buildFlagsArray = let t = "github.com/prometheus/common/version"; in ''
··· 12 13 vendorSha256 = "0ixriy5i1qc8hnslmiyd3qfw1g14zlmcslqwn2a9fpk7h0hwinba"; 14 15 + doCheck = false; 16 + 17 subPackages = "cmd/thanos"; 18 19 buildFlagsArray = let t = "github.com/prometheus/common/version"; in ''
+2
pkgs/servers/nosql/influxdb/default.nix
··· 13 14 vendorSha256 = "097x3z1fhdl5s3ni2qzbqxqr60l6lqcrbikq20fs052dp287q0sp"; 15 16 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 17 18 excludedPackages = "test";
··· 13 14 vendorSha256 = "097x3z1fhdl5s3ni2qzbqxqr60l6lqcrbikq20fs052dp287q0sp"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 19 20 excludedPackages = "test";
+2
pkgs/servers/sql/dolt/default.nix
··· 15 subPackages = [ "cmd/dolt" "cmd/git-dolt" "cmd/git-dolt-smudge" ]; 16 vendorSha256 = "1pvf63cxwq4jj5gi2xalrsk2z1f7i53f0z6qc2p7aibwx9i1k9cz"; 17 18 meta = with lib; { 19 description = "Relational database with version control and CLI a-la Git."; 20 homepage = "https://github.com/liquidata-inc/dolt";
··· 15 subPackages = [ "cmd/dolt" "cmd/git-dolt" "cmd/git-dolt-smudge" ]; 16 vendorSha256 = "1pvf63cxwq4jj5gi2xalrsk2z1f7i53f0z6qc2p7aibwx9i1k9cz"; 17 18 + doCheck = false; 19 + 20 meta = with lib; { 21 description = "Relational database with version control and CLI a-la Git."; 22 homepage = "https://github.com/liquidata-inc/dolt";
+3
pkgs/servers/tailscale/default.nix
··· 17 18 goPackagePath = "tailscale.com"; 19 vendorSha256 = "0l9lzwwvshg9a2kmmq1cvvlaxncbas78a9hjhvjjar89rjr2k2sv"; 20 subPackages = [ "cmd/tailscale" "cmd/tailscaled" ]; 21 22 postInstall = ''
··· 17 18 goPackagePath = "tailscale.com"; 19 vendorSha256 = "0l9lzwwvshg9a2kmmq1cvvlaxncbas78a9hjhvjjar89rjr2k2sv"; 20 + 21 + doCheck = false; 22 + 23 subPackages = [ "cmd/tailscale" "cmd/tailscaled" ]; 24 25 postInstall = ''
+3
pkgs/servers/traefik/default.nix
··· 12 }; 13 14 vendorSha256 = "0kz7y64k07vlybzfjg6709fdy7krqlv1gkk01nvhs84sk8bnrcvn"; 15 subPackages = [ "cmd/traefik" ]; 16 17 nativeBuildInputs = [ go-bindata ];
··· 12 }; 13 14 vendorSha256 = "0kz7y64k07vlybzfjg6709fdy7krqlv1gkk01nvhs84sk8bnrcvn"; 15 + 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/traefik" ]; 19 20 nativeBuildInputs = [ go-bindata ];
+2
pkgs/servers/web-apps/shiori/default.nix
··· 6 7 vendorSha256 = "1ik5faysc880kz7nymvbmjj006l1fsqfy76036szwzg314v78643"; 8 9 src = fetchFromGitHub { 10 owner = "go-shiori"; 11 repo = pname;
··· 6 7 vendorSha256 = "1ik5faysc880kz7nymvbmjj006l1fsqfy76036szwzg314v78643"; 8 9 + doCheck = false; 10 + 11 src = fetchFromGitHub { 12 owner = "go-shiori"; 13 repo = pname;
+2
pkgs/shells/elvish/default.nix
··· 17 18 vendorSha256 = "1f971n17h9bc0qcgs9ipiaw0x9807mz761fqm605br4ch1kp0897"; 19 20 meta = with stdenv.lib; { 21 description = "A friendly and expressive command shell"; 22 longDescription = ''
··· 17 18 vendorSha256 = "1f971n17h9bc0qcgs9ipiaw0x9807mz761fqm605br4ch1kp0897"; 19 20 + doCheck = false; 21 + 22 meta = with stdenv.lib; { 23 description = "A friendly and expressive command shell"; 24 longDescription = ''
+2
pkgs/shells/zsh/antibody/default.nix
··· 13 14 vendorSha256 = "0z8fma3v2dph8nv3q4lmv43s6p5sc338xb7kcmnpwcc0iw7b4vyj"; 15 16 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "0z8fma3v2dph8nv3q4lmv43s6p5sc338xb7kcmnpwcc0iw7b4vyj"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 19 20 meta = with lib; {
+3
pkgs/shells/zsh/zsh-history/default.nix
··· 14 nativeBuildInputs = [ installShellFiles ]; 15 16 vendorSha256 = "13rc1afds5xg30faqz35haha4kxg73b5nvjirbrkc6kna0vhb54z"; 17 goPackagePath = "github.com/b4b4r07/history"; 18 19 postInstall = ''
··· 14 nativeBuildInputs = [ installShellFiles ]; 15 16 vendorSha256 = "13rc1afds5xg30faqz35haha4kxg73b5nvjirbrkc6kna0vhb54z"; 17 + 18 + doCheck = false; 19 + 20 goPackagePath = "github.com/b4b4r07/history"; 21 22 postInstall = ''
+3
pkgs/tools/admin/aws-vault/default.nix
··· 11 }; 12 13 vendorSha256 = "0jlraq480llamns6yw8yjkzxsndyqiyzy120djni8sw5h0bz65j7"; 14 subPackages = [ "." ]; 15 16 # set the version. see: aws-vault's Makefile
··· 11 }; 12 13 vendorSha256 = "0jlraq480llamns6yw8yjkzxsndyqiyzy120djni8sw5h0bz65j7"; 14 + 15 + doCheck = false; 16 + 17 subPackages = [ "." ]; 18 19 # set the version. see: aws-vault's Makefile
+2
pkgs/tools/admin/awsweeper/default.nix
··· 19 20 vendorSha256 = "0hnpb1xp135z2qpn1b6xad59739hffhs8dfpr3n5drmrvajpn4xp"; 21 22 meta = with lib; { 23 description = "A tool to clean out your AWS account"; 24 homepage = "https://github.com/cloudetc/awsweeper/";
··· 19 20 vendorSha256 = "0hnpb1xp135z2qpn1b6xad59739hffhs8dfpr3n5drmrvajpn4xp"; 21 22 + doCheck = false; 23 + 24 meta = with lib; { 25 description = "A tool to clean out your AWS account"; 26 homepage = "https://github.com/cloudetc/awsweeper/";
+2
pkgs/tools/admin/berglas/default.nix
··· 13 14 vendorSha256 = null; 15 16 meta = with stdenv.lib; { 17 description = "A tool for managing secrets on Google Cloud"; 18 homepage = "https://github.com/GoogleCloudPlatform/berglas";
··· 13 14 vendorSha256 = null; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "A tool for managing secrets on Google Cloud"; 20 homepage = "https://github.com/GoogleCloudPlatform/berglas";
+2
pkgs/tools/admin/certigo/default.nix
··· 13 14 vendorSha256 = "1l6ajfl04rfbssvijgd5jrppmqc5svfrswdx01x007lr8rvdfd94"; 15 16 meta = with stdenv.lib; { 17 description = "A utility to examine and validate certificates in a variety of formats"; 18 homepage = "https://github.com/square/certigo";
··· 13 14 vendorSha256 = "1l6ajfl04rfbssvijgd5jrppmqc5svfrswdx01x007lr8rvdfd94"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "A utility to examine and validate certificates in a variety of formats"; 20 homepage = "https://github.com/square/certigo";
+2
pkgs/tools/admin/clair/default.nix
··· 13 14 vendorSha256 = "0x31n50vd8660z816as6kms5dkv87b0mhblccpkvd9cbvcv2n37a"; 15 16 nativeBuildInputs = [ makeWrapper ]; 17 18 postInstall = ''
··· 13 14 vendorSha256 = "0x31n50vd8660z816as6kms5dkv87b0mhblccpkvd9cbvcv2n37a"; 15 16 + doCheck = false; 17 + 18 nativeBuildInputs = [ makeWrapper ]; 19 20 postInstall = ''
+2
pkgs/tools/admin/eksctl/default.nix
··· 13 14 vendorSha256 = "1msid4857wsh4qp1f7nyrmpzjv3sklh49cl7a9c1a3qr9m99w4yb"; 15 16 subPackages = [ "cmd/eksctl" ]; 17 18 buildFlags = [ "-tags netgo" "-tags release" ];
··· 13 14 vendorSha256 = "1msid4857wsh4qp1f7nyrmpzjv3sklh49cl7a9c1a3qr9m99w4yb"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/eksctl" ]; 19 20 buildFlags = [ "-tags netgo" "-tags release" ];
+2
pkgs/tools/admin/iamy/default.nix
··· 15 16 vendorSha256 = "0c4g1zr0wl118g41hqri0vwvfin39yvgs214w3spw8ggjcj6bzph"; 17 18 buildFlagsArray = [''-ldflags= 19 -X main.Version=v${version} -s -w 20 ''];
··· 15 16 vendorSha256 = "0c4g1zr0wl118g41hqri0vwvfin39yvgs214w3spw8ggjcj6bzph"; 17 18 + doCheck = false; 19 + 20 buildFlagsArray = [''-ldflags= 21 -X main.Version=v${version} -s -w 22 ''];
+3
pkgs/tools/admin/lego/default.nix
··· 12 }; 13 14 vendorSha256 = "14453iiya6algkympyvwm03qgjcwk79z8bbrij7qhnp52qfrbmrp"; 15 subPackages = [ "cmd/lego" ]; 16 17 buildFlagsArray = [
··· 12 }; 13 14 vendorSha256 = "14453iiya6algkympyvwm03qgjcwk79z8bbrij7qhnp52qfrbmrp"; 15 + 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/lego" ]; 19 20 buildFlagsArray = [
+2
pkgs/tools/audio/mpd-mpris/default.nix
··· 13 14 vendorSha256 = "108yjymp64iqx1b2wqjbkmbm2w199wq46g7hrmqhcziv6f4aqljp"; 15 16 subPackages = [ "cmd/${pname}" ]; 17 18 postInstall = ''
··· 13 14 vendorSha256 = "108yjymp64iqx1b2wqjbkmbm2w199wq46g7hrmqhcziv6f4aqljp"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/${pname}" ]; 19 20 postInstall = ''
+3
pkgs/tools/backup/kopia/default.nix
··· 12 }; 13 14 vendorSha256 = "11az7zgwzbcx4dknwqiwmdbrbkdzhpwzqnyk8vw9mkbda0xaif3k"; 15 subPackages = [ "." ]; 16 17 postConfigure = ''
··· 12 }; 13 14 vendorSha256 = "11az7zgwzbcx4dknwqiwmdbrbkdzhpwzqnyk8vw9mkbda0xaif3k"; 15 + 16 + doCheck = false; 17 + 18 subPackages = [ "." ]; 19 20 postConfigure = ''
+2
pkgs/tools/misc/3mux/default.nix
··· 13 14 vendorSha256 = "1hjzpg3q4znvgzk0wbl8rq6cq877xxdsf950bcsks92cs8386847"; 15 16 meta = with stdenv.lib; { 17 description = "Terminal multiplexer inspired by i3"; 18 homepage = "https://github.com/aaronjanse/3mux";
··· 13 14 vendorSha256 = "1hjzpg3q4znvgzk0wbl8rq6cq877xxdsf950bcsks92cs8386847"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "Terminal multiplexer inspired by i3"; 20 homepage = "https://github.com/aaronjanse/3mux";
+2
pkgs/tools/misc/chezmoi/default.nix
··· 13 14 vendorSha256 = "1gzg73lrx73rhb9yj6yakv95m8rz1rhjgqjl1a78c8nvaii27a9x"; 15 16 buildFlagsArray = [ 17 "-ldflags=-s -w -X main.version=${version} -X main.builtBy=nixpkgs" 18 ];
··· 13 14 vendorSha256 = "1gzg73lrx73rhb9yj6yakv95m8rz1rhjgqjl1a78c8nvaii27a9x"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ 19 "-ldflags=-s -w -X main.version=${version} -X main.builtBy=nixpkgs" 20 ];
+2
pkgs/tools/misc/clipman/default.nix
··· 13 14 vendorSha256 = "18jw4z0lcrh00yjr3qdkgvlrpfwqbsm0ncz7fp1h72pzkh41byv7"; 15 16 nativeBuildInputs = [ makeWrapper ]; 17 18 postInstall = ''
··· 13 14 vendorSha256 = "18jw4z0lcrh00yjr3qdkgvlrpfwqbsm0ncz7fp1h72pzkh41byv7"; 15 16 + doCheck = false; 17 + 18 nativeBuildInputs = [ makeWrapper ]; 19 20 postInstall = ''
+2
pkgs/tools/misc/direnv/default.nix
··· 6 7 vendorSha256 = null; 8 9 src = fetchFromGitHub { 10 owner = "direnv"; 11 repo = "direnv";
··· 6 7 vendorSha256 = null; 8 9 + doCheck = false; 10 + 11 src = fetchFromGitHub { 12 owner = "direnv"; 13 repo = "direnv";
+2
pkgs/tools/misc/docui/default.nix
··· 13 14 vendorSha256 = "1ggdczvv03lj0g6cq26vrk1rba6pk0805n85w9hkbjx9c4r3j577"; 15 16 meta = with stdenv.lib; { 17 description = "TUI Client for Docker"; 18 homepage = "https://github.com/skanehira/docui";
··· 13 14 vendorSha256 = "1ggdczvv03lj0g6cq26vrk1rba6pk0805n85w9hkbjx9c4r3j577"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "TUI Client for Docker"; 20 homepage = "https://github.com/skanehira/docui";
+2
pkgs/tools/misc/go.rice/default.nix
··· 13 14 vendorSha256 = "0cb5phyl2zm1xnkhvisv0lzgknsi93yzmpayg30w7jc6z4icwnw7"; 15 16 subPackages = [ "." "rice" ]; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = "0cb5phyl2zm1xnkhvisv0lzgknsi93yzmpayg30w7jc6z4icwnw7"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "." "rice" ]; 19 20 meta = with stdenv.lib; {
+2
pkgs/tools/misc/gotify-cli/default.nix
··· 13 14 vendorSha256 = "1lhhsf944gm1p6qxn05g2s3hdnra5dggj7pdrdq6qr6r2xg7f5qh"; 15 16 postInstall = '' 17 mv $out/bin/cli $out/bin/gotify 18 '';
··· 13 14 vendorSha256 = "1lhhsf944gm1p6qxn05g2s3hdnra5dggj7pdrdq6qr6r2xg7f5qh"; 15 16 + doCheck = false; 17 + 18 postInstall = '' 19 mv $out/bin/cli $out/bin/gotify 20 '';
+2
pkgs/tools/misc/lf/default.nix
··· 13 14 vendorSha256 = "10na3jzvln353ygcvbhj4243yr83skw5zf3r2n8p6d7i83i86c8w"; 15 16 nativeBuildInputs = [ installShellFiles ]; 17 18 # TODO: Setting buildFlags probably isn't working properly. I've tried a few
··· 13 14 vendorSha256 = "10na3jzvln353ygcvbhj4243yr83skw5zf3r2n8p6d7i83i86c8w"; 15 16 + doCheck = false; 17 + 18 nativeBuildInputs = [ installShellFiles ]; 19 20 # TODO: Setting buildFlags probably isn't working properly. I've tried a few
+2
pkgs/tools/misc/libgen-cli/default.nix
··· 12 13 vendorSha256 = "0smb83mq711b2pby57ijcllccn7y2l10zb4fbf779xibb2g09608"; 14 15 subPackages = [ "." ]; 16 17 nativeBuildInputs = [ installShellFiles ];
··· 12 13 vendorSha256 = "0smb83mq711b2pby57ijcllccn7y2l10zb4fbf779xibb2g09608"; 14 15 + doCheck = false; 16 + 17 subPackages = [ "." ]; 18 19 nativeBuildInputs = [ installShellFiles ];
+2
pkgs/tools/misc/lokalise2-cli/default.nix
··· 13 14 vendorSha256 = "06y1v0v1kkbd5vxa8h0qvasm9ibwwhz0v4x03k3nb5xlwn0x9jx8"; 15 16 postInstall = '' 17 mv $out/bin/lokalise-cli-2-go $out/bin/lokalise2 18 '';
··· 13 14 vendorSha256 = "06y1v0v1kkbd5vxa8h0qvasm9ibwwhz0v4x03k3nb5xlwn0x9jx8"; 15 16 + doCheck = false; 17 + 18 postInstall = '' 19 mv $out/bin/lokalise-cli-2-go $out/bin/lokalise2 20 '';
+2
pkgs/tools/misc/mutagen/default.nix
··· 13 14 vendorSha256 = "0szs9yc49fyh55ra1wf8zj76kdah0x49d45cgivk3gqh2hl17j6l"; 15 16 subPackages = [ "cmd/mutagen" "cmd/mutagen-agent" ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "0szs9yc49fyh55ra1wf8zj76kdah0x49d45cgivk3gqh2hl17j6l"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/mutagen" "cmd/mutagen-agent" ]; 19 20 meta = with lib; {
+2
pkgs/tools/misc/neo-cowsay/default.nix
··· 13 14 vendorSha256 = "1clar59x2dvn7yj4fbylby9nrzy8kdixi48hkbmrv8g5l8n0wdl2"; 15 16 subPackages = [ "cmd/cowsay" "cmd/cowthink" ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "1clar59x2dvn7yj4fbylby9nrzy8kdixi48hkbmrv8g5l8n0wdl2"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/cowsay" "cmd/cowthink" ]; 19 20 meta = with lib; {
+2
pkgs/tools/misc/pg_flame/default.nix
··· 13 14 vendorSha256 = "1rkx20winh66y2m7i7q13jpr83044i2d1pfd5p5l5kkpsix5mra5"; 15 16 meta = with lib; { 17 description = "Flamegraph generator for Postgres EXPLAIN ANALYZE output"; 18 homepage = "https://github.com/mgartner/pg_flame";
··· 13 14 vendorSha256 = "1rkx20winh66y2m7i7q13jpr83044i2d1pfd5p5l5kkpsix5mra5"; 15 16 + doCheck = false; 17 + 18 meta = with lib; { 19 description = "Flamegraph generator for Postgres EXPLAIN ANALYZE output"; 20 homepage = "https://github.com/mgartner/pg_flame";
+2
pkgs/tools/misc/pgcenter/default.nix
··· 13 14 vendorSha256 = "1mzvpr12qh9668iz97p62zl4zhlrcyfgwr4a9zg9irj585pkb5x2"; 15 16 meta = with stdenv.lib; { 17 homepage = "https://pgcenter.org/"; 18 description = "Command-line admin tool for observing and troubleshooting PostgreSQL";
··· 13 14 vendorSha256 = "1mzvpr12qh9668iz97p62zl4zhlrcyfgwr4a9zg9irj585pkb5x2"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 homepage = "https://pgcenter.org/"; 20 description = "Command-line admin tool for observing and troubleshooting PostgreSQL";
+2
pkgs/tools/misc/pgmetrics/default.nix
··· 13 14 vendorSha256 = "16x33fmh4q993rw0jr65337yimska4fwgyyw3kmq84q0x28a3zg5"; 15 16 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = "16x33fmh4q993rw0jr65337yimska4fwgyyw3kmq84q0x28a3zg5"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 19 20 meta = with stdenv.lib; {
+2
pkgs/tools/misc/pistol/default.nix
··· 17 18 vendorSha256 = "0dg4f9g6895nv3c6d74ijl6hzsyn620ndspbcq7ynvb1z0hsg6iz"; 19 20 subPackages = [ "cmd/pistol" ]; 21 22 buildInputs = [
··· 17 18 vendorSha256 = "0dg4f9g6895nv3c6d74ijl6hzsyn620ndspbcq7ynvb1z0hsg6iz"; 19 20 + doCheck = false; 21 + 22 subPackages = [ "cmd/pistol" ]; 23 24 buildInputs = [
+2
pkgs/tools/misc/powerline-go/default.nix
··· 13 14 vendorSha256 = "0dkgp9vlb76la0j439w0rb548qg5v8648zryk3rqgfhd4qywlk11"; 15 16 meta = with stdenv.lib; { 17 description = "A Powerline like prompt for Bash, ZSH and Fish"; 18 license = licenses.gpl3;
··· 13 14 vendorSha256 = "0dkgp9vlb76la0j439w0rb548qg5v8648zryk3rqgfhd4qywlk11"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "A Powerline like prompt for Bash, ZSH and Fish"; 20 license = licenses.gpl3;
+2
pkgs/tools/misc/up/default.nix
··· 15 16 vendorSha256 = "1h3w4i7dyh6yagqmdclvflfq6fx0z880jdnpf28assv7fxd9rjsx"; 17 18 meta = with lib; { 19 description = "Ultimate Plumber is a tool for writing Linux pipes with instant live preview"; 20 homepage = "https://github.com/akavel/up";
··· 15 16 vendorSha256 = "1h3w4i7dyh6yagqmdclvflfq6fx0z880jdnpf28assv7fxd9rjsx"; 17 18 + doCheck = false; 19 + 20 meta = with lib; { 21 description = "Ultimate Plumber is a tool for writing Linux pipes with instant live preview"; 22 homepage = "https://github.com/akavel/up";
+2
pkgs/tools/networking/amass/default.nix
··· 16 17 vendorSha256 = "1s8g0qqg3m6hdvc5v3s86l3ba5grmyhx0lf2ymi39k5dpcg8l19s"; 18 19 outputs = [ "out" "wordlists" ]; 20 21 postInstall = ''
··· 16 17 vendorSha256 = "1s8g0qqg3m6hdvc5v3s86l3ba5grmyhx0lf2ymi39k5dpcg8l19s"; 18 19 + doCheck = false; 20 + 21 outputs = [ "out" "wordlists" ]; 22 23 postInstall = ''
+2
pkgs/tools/networking/assh/default.nix
··· 13 14 vendorSha256 = "03ycjhal4g7bs9fhzrq01ijj48czvs272qcqkd9farsha5gf0q0b"; 15 16 nativeBuildInputs = [ makeWrapper ]; 17 18 postInstall = ''
··· 13 14 vendorSha256 = "03ycjhal4g7bs9fhzrq01ijj48czvs272qcqkd9farsha5gf0q0b"; 15 16 + doCheck = false; 17 + 18 nativeBuildInputs = [ makeWrapper ]; 19 20 postInstall = ''
+2
pkgs/tools/networking/cassowary/default.nix
··· 13 14 vendorSha256 = "1qgilmkai9isbbg4pzqic6i8v5z8cay0ilw1gb69z4a6f2q4zhkp"; 15 16 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "1qgilmkai9isbbg4pzqic6i8v5z8cay0ilw1gb69z4a6f2q4zhkp"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 19 20 meta = with lib; {
+2
pkgs/tools/networking/clash/default.nix
··· 14 goPackagePath = "github.com/Dreamacro/clash"; 15 vendorSha256 = "0ap6wsx23s4q730s6d5cgc4ginh8zj5sd32k0za49fh50v8k8zbh"; 16 17 buildFlagsArray = [ 18 "-ldflags=" 19 "-X ${goPackagePath}/constant.Version=${version}"
··· 14 goPackagePath = "github.com/Dreamacro/clash"; 15 vendorSha256 = "0ap6wsx23s4q730s6d5cgc4ginh8zj5sd32k0za49fh50v8k8zbh"; 16 17 + doCheck = false; 18 + 19 buildFlagsArray = [ 20 "-ldflags=" 21 "-X ${goPackagePath}/constant.Version=${version}"
+2
pkgs/tools/networking/corerad/default.nix
··· 13 14 vendorSha256 = "1ra4yfplmgzxzs1nlbm0izg339fjnkfrw071y8w4m6q6wnzdhljb"; 15 16 # Since the tarball pulled from GitHub doesn't contain git tag information, 17 # we fetch the expected tag's timestamp from a file in the root of the 18 # repository.
··· 13 14 vendorSha256 = "1ra4yfplmgzxzs1nlbm0izg339fjnkfrw071y8w4m6q6wnzdhljb"; 15 16 + doCheck = false; 17 + 18 # Since the tarball pulled from GitHub doesn't contain git tag information, 19 # we fetch the expected tag's timestamp from a file in the root of the 20 # repository.
+2
pkgs/tools/networking/croc/default.nix
··· 13 14 vendorSha256 = "1d6gg7c0rb45zy9rilacn2xyr3kcb7acsh389hk6lppipmhpzr5a"; 15 16 subPackages = [ "." ]; 17 18 meta = with stdenv.lib; {
··· 13 14 vendorSha256 = "1d6gg7c0rb45zy9rilacn2xyr3kcb7acsh389hk6lppipmhpzr5a"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "." ]; 19 20 meta = with stdenv.lib; {
+2
pkgs/tools/networking/curlie/default.nix
··· 13 14 vendorSha256 = "1mxgf004czf65a2mv99gfp27g98xhllmfcz4ynfv66nfkbfz6a8n"; 15 16 meta = with lib; { 17 description = "Curlie is a frontend to curl that adds the ease of use of httpie, without compromising on features and performance"; 18 homepage = "https://curlie.io/";
··· 13 14 vendorSha256 = "1mxgf004czf65a2mv99gfp27g98xhllmfcz4ynfv66nfkbfz6a8n"; 15 16 + doCheck = false; 17 + 18 meta = with lib; { 19 description = "Curlie is a frontend to curl that adds the ease of use of httpie, without compromising on features and performance"; 20 homepage = "https://curlie.io/";
+2
pkgs/tools/networking/dnscrypt-proxy2/default.nix
··· 6 7 vendorSha256 = null; 8 9 src = fetchFromGitHub { 10 owner = "DNSCrypt"; 11 repo = "dnscrypt-proxy";
··· 6 7 vendorSha256 = null; 8 9 + doCheck = false; 10 + 11 src = fetchFromGitHub { 12 owner = "DNSCrypt"; 13 repo = "dnscrypt-proxy";
+2
pkgs/tools/networking/dnsproxy/default.nix
··· 13 14 vendorSha256 = null; 15 16 meta = with stdenv.lib; { 17 description = "Simple DNS proxy with DoH, DoT, and DNSCrypt support"; 18 homepage = "https://github.com/AdguardTeam/dnsproxy";
··· 13 14 vendorSha256 = null; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "Simple DNS proxy with DoH, DoT, and DNSCrypt support"; 20 homepage = "https://github.com/AdguardTeam/dnsproxy";
+2
pkgs/tools/networking/frp/default.nix
··· 13 14 vendorSha256 = "0pi661mb5vwj16wwxnyx9b0ic7gzby6qfs3y4w00agn6sn5nahx2"; 15 16 subPackages = [ "cmd/frpc" "cmd/frps" ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "0pi661mb5vwj16wwxnyx9b0ic7gzby6qfs3y4w00agn6sn5nahx2"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/frpc" "cmd/frps" ]; 19 20 meta = with lib; {
+2
pkgs/tools/networking/grpcui/default.nix
··· 13 14 vendorSha256 = "0wih9xvpgqqd82v1pxy5rslrsd6wsl0ys1bi1mf373dnfq5vh5a9"; 15 16 subPackages = [ "cmd/grpcui" ]; 17 18 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ];
··· 13 14 vendorSha256 = "0wih9xvpgqqd82v1pxy5rslrsd6wsl0ys1bi1mf373dnfq5vh5a9"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/grpcui" ]; 19 20 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ];
+2
pkgs/tools/networking/hey/default.nix
··· 13 14 vendorSha256 = null; 15 16 meta = with lib; { 17 description = "HTTP load generator, ApacheBench (ab) replacement"; 18 homepage = "https://github.com/rakyll/hey";
··· 13 14 vendorSha256 = null; 15 16 + doCheck = false; 17 + 18 meta = with lib; { 19 description = "HTTP load generator, ApacheBench (ab) replacement"; 20 homepage = "https://github.com/rakyll/hey";
+2
pkgs/tools/networking/minio-client/default.nix
··· 13 14 vendorSha256 = "0nfcxz47v5gl0wih59xarhz82nd8wy61c3ijvg2v08ipk29zivcc"; 15 16 subPackages = [ "." ]; 17 18 buildFlagsArray = [ "-ldflags=-s -w -X github.com/minio/mc/cmd.Version=${version}" ];
··· 13 14 vendorSha256 = "0nfcxz47v5gl0wih59xarhz82nd8wy61c3ijvg2v08ipk29zivcc"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "." ]; 19 20 buildFlagsArray = [ "-ldflags=-s -w -X github.com/minio/mc/cmd.Version=${version}" ];
+2
pkgs/tools/networking/nebula/default.nix
··· 13 14 vendorSha256 = "094mn1r69c40w7k3lsggjh0dpws9l0j7mgiyjy1lpblkvkyk2azm"; 15 16 subPackages = [ "cmd/nebula" "cmd/nebula-cert" ]; 17 18 buildFlagsArray = [ "-ldflags='-X main.Build=${version}'" ];
··· 13 14 vendorSha256 = "094mn1r69c40w7k3lsggjh0dpws9l0j7mgiyjy1lpblkvkyk2azm"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/nebula" "cmd/nebula-cert" ]; 19 20 buildFlagsArray = [ "-ldflags='-X main.Build=${version}'" ];
+2
pkgs/tools/networking/obfs4/default.nix
··· 12 13 vendorSha256 = "0h3gjxv26pc6cysvy1hny2f4abw6i847dk8fx0m113ixx9qghk87"; 14 15 meta = with lib; { 16 description = "A pluggable transport proxy"; 17 homepage = "https://www.torproject.org/projects/obfsproxy";
··· 12 13 vendorSha256 = "0h3gjxv26pc6cysvy1hny2f4abw6i847dk8fx0m113ixx9qghk87"; 14 15 + doCheck = false; 16 + 17 meta = with lib; { 18 description = "A pluggable transport proxy"; 19 homepage = "https://www.torproject.org/projects/obfsproxy";
+2
pkgs/tools/networking/oneshot/default.nix
··· 14 goPackagePath = "github.com/raphaelreyna/oneshot"; 15 vendorSha256 = "0v53dsj0w959pmvk6v1i7rwlfd2y0vrghxlwkgidw0sf775qpgvy"; 16 17 subPackages = [ "." ]; 18 19 meta = with lib; {
··· 14 goPackagePath = "github.com/raphaelreyna/oneshot"; 15 vendorSha256 = "0v53dsj0w959pmvk6v1i7rwlfd2y0vrghxlwkgidw0sf775qpgvy"; 16 17 + doCheck = false; 18 + 19 subPackages = [ "." ]; 20 21 meta = with lib; {
+3
pkgs/tools/networking/pixiecore/default.nix
··· 13 }; 14 15 vendorSha256 = "08n3m6fkwh8jmmzky3ygij4gxlcqidqk5ywi8ki8bkyzzs2lqaw7"; 16 subPackages = [ "cmd/pixiecore" ]; 17 18 meta = {
··· 13 }; 14 15 vendorSha256 = "08n3m6fkwh8jmmzky3ygij4gxlcqidqk5ywi8ki8bkyzzs2lqaw7"; 16 + 17 + doCheck = false; 18 + 19 subPackages = [ "cmd/pixiecore" ]; 20 21 meta = {
+2
pkgs/tools/networking/shadowfox/default.nix
··· 15 16 vendorSha256 = "06ar9ivry9b01609izjbl6hqgg0cy7aqd8n2cqpyq0g7my0l0lbj"; 17 18 buildFlags = [ "--tags" "release" ]; 19 20 meta = with stdenv.lib; {
··· 15 16 vendorSha256 = "06ar9ivry9b01609izjbl6hqgg0cy7aqd8n2cqpyq0g7my0l0lbj"; 17 18 + doCheck = false; 19 + 20 buildFlags = [ "--tags" "release" ]; 21 22 meta = with stdenv.lib; {
+2
pkgs/tools/networking/tendermint/default.nix
··· 13 14 vendorSha256 = "0i0n89lal99fqnzva51kp9f7wzqsfmncpshwxhq26kvykp7ji7sw"; 15 16 subPackages = [ "cmd/tendermint" ]; 17 18 buildFlagsArray = [ "-ldflags=-s -w -X github.com/tendermint/tendermint/version.GitCommit=${src.rev}" ];
··· 13 14 vendorSha256 = "0i0n89lal99fqnzva51kp9f7wzqsfmncpshwxhq26kvykp7ji7sw"; 15 16 + doCheck = false; 17 + 18 subPackages = [ "cmd/tendermint" ]; 19 20 buildFlagsArray = [ "-ldflags=-s -w -X github.com/tendermint/tendermint/version.GitCommit=${src.rev}" ];
+2
pkgs/tools/networking/termshark/default.nix
··· 16 17 vendorSha256 = "14apff3vcbndr30765lzi4qswakavb4396bjixxvpxv6i5c04dq7"; 18 19 postFixup = '' 20 wrapProgram $out/bin/termshark --prefix PATH : ${stdenv.lib.makeBinPath [ wireshark-cli ]} 21 '';
··· 16 17 vendorSha256 = "14apff3vcbndr30765lzi4qswakavb4396bjixxvpxv6i5c04dq7"; 18 19 + doCheck = false; 20 + 21 postFixup = '' 22 wrapProgram $out/bin/termshark --prefix PATH : ${stdenv.lib.makeBinPath [ wireshark-cli ]} 23 '';
+2
pkgs/tools/networking/v2ray/generic.nix
··· 15 16 inherit vendorSha256; 17 18 buildPhase = '' 19 runHook preBuild 20
··· 15 16 inherit vendorSha256; 17 18 + doCheck = false; 19 + 20 buildPhase = '' 21 runHook preBuild 22
+2
pkgs/tools/networking/wormhole-william/default.nix
··· 13 14 vendorSha256 = "1niky252gcxai6vz0cx7pvflg530bc1lmcd2wm2hqg6446r1yxsq"; 15 16 meta = with stdenv.lib; { 17 homepage = "https://github.com/psanford/wormhole-william"; 18 description = "End-to-end encrypted file transfers";
··· 13 14 vendorSha256 = "1niky252gcxai6vz0cx7pvflg530bc1lmcd2wm2hqg6446r1yxsq"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 homepage = "https://github.com/psanford/wormhole-william"; 20 description = "End-to-end encrypted file transfers";
+2
pkgs/tools/networking/yggdrasil/default.nix
··· 13 14 vendorSha256 = "09xv2p9rydnsb185x61fxhyjqx41wz285c1gdd47ad3s08ay1qc7"; 15 16 # Change the default location of the management socket on Linux 17 # systems so that the yggdrasil system service unit does not have to 18 # be granted write permission to /run.
··· 13 14 vendorSha256 = "09xv2p9rydnsb185x61fxhyjqx41wz285c1gdd47ad3s08ay1qc7"; 15 16 + doCheck = false; 17 + 18 # Change the default location of the management socket on Linux 19 # systems so that the yggdrasil system service unit does not have to 20 # be granted write permission to /run.
+2
pkgs/tools/package-management/mynewt-newt/default.nix
··· 24 25 vendorSha256 = "1sh9mx3lc28fzvc1yrhz58rlbaac7aq1dqyvxwj98vld3kigpv1z"; 26 27 meta = with stdenv.lib; { 28 homepage = "https://mynewt.apache.org/"; 29 description = "Build and package management tool for embedded development.";
··· 24 25 vendorSha256 = "1sh9mx3lc28fzvc1yrhz58rlbaac7aq1dqyvxwj98vld3kigpv1z"; 26 27 + doCheck = false; 28 + 29 meta = with stdenv.lib; { 30 homepage = "https://mynewt.apache.org/"; 31 description = "Build and package management tool for embedded development.";
+2
pkgs/tools/package-management/nfpm/default.nix
··· 13 14 vendorSha256 = "11ab1w89zn3m81swzsnyiw1x10v58phid4y68rralkp6bhisz25b"; 15 16 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "11ab1w89zn3m81swzsnyiw1x10v58phid4y68rralkp6bhisz25b"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 19 20 meta = with lib; {
+2
pkgs/tools/security/age/default.nix
··· 6 goPackagePath = "github.com/FiloSottile/age"; 7 vendorSha256 = "0km7a2826j3fk2nrkmgc990chrkcfz006wfw14yilsa4p2hmfl7m"; 8 9 subPackages = [ 10 "cmd/age" 11 "cmd/age-keygen"
··· 6 goPackagePath = "github.com/FiloSottile/age"; 7 vendorSha256 = "0km7a2826j3fk2nrkmgc990chrkcfz006wfw14yilsa4p2hmfl7m"; 8 9 + doCheck = false; 10 + 11 subPackages = [ 12 "cmd/age" 13 "cmd/age-keygen"
+2
pkgs/tools/security/bettercap/default.nix
··· 21 22 vendorSha256 = "0yfs1f18d8frbkrshsajzzbj4wh2azd89g2h35wm6wqknvlipwr0"; 23 24 nativeBuildInputs = [ pkg-config ]; 25 buildInputs = [ libpcap libnfnetlink libnetfilter_queue libusb1 ]; 26
··· 21 22 vendorSha256 = "0yfs1f18d8frbkrshsajzzbj4wh2azd89g2h35wm6wqknvlipwr0"; 23 24 + doCheck = false; 25 + 26 nativeBuildInputs = [ pkg-config ]; 27 buildInputs = [ libpcap libnfnetlink libnetfilter_queue libusb1 ]; 28
+2
pkgs/tools/security/browserpass/default.nix
··· 14 15 vendorSha256 = "1wcbn0ip596f2dp68y6jmxgv20l0dgrcxg5cwclkawigj05416zj"; 16 17 postPatch = '' 18 # Because this Makefile will be installed to be used by the user, patch 19 # variables to be valid by default
··· 14 15 vendorSha256 = "1wcbn0ip596f2dp68y6jmxgv20l0dgrcxg5cwclkawigj05416zj"; 16 17 + doCheck = false; 18 + 19 postPatch = '' 20 # Because this Makefile will be installed to be used by the user, patch 21 # variables to be valid by default
+2
pkgs/tools/security/cfssl/default.nix
··· 24 25 vendorSha256 = null; 26 27 nativeBuildInputs = [ go-rice ]; 28 29 preBuild = ''
··· 24 25 vendorSha256 = null; 26 27 + doCheck = false; 28 + 29 nativeBuildInputs = [ go-rice ]; 30 31 preBuild = ''
+2
pkgs/tools/security/gobuster/default.nix
··· 16 17 vendorSha256 = "0kr9i2nm5csf3070hwaiss137pfa3088xbw2zigp7aqb2naky036"; 18 19 meta = with lib; { 20 description = "Tool used to brute-force URIs, DNS subdomains, Virtual Host names on target web servers"; 21 homepage = "https://github.com/OJ/gobuster";
··· 16 17 vendorSha256 = "0kr9i2nm5csf3070hwaiss137pfa3088xbw2zigp7aqb2naky036"; 18 19 + doCheck = false; 20 + 21 meta = with lib; { 22 description = "Tool used to brute-force URIs, DNS subdomains, Virtual Host names on target web servers"; 23 homepage = "https://github.com/OJ/gobuster";
+2
pkgs/tools/security/gopass/default.nix
··· 22 23 vendorSha256 = "1wn20bh7ma4pblsf6qnlbz5bx4p9apig3d1yz7cpsqv4z3w07baw"; 24 25 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version} -X main.commit=${src.rev}" ]; 26 27 wrapperPath = stdenv.lib.makeBinPath ([
··· 22 23 vendorSha256 = "1wn20bh7ma4pblsf6qnlbz5bx4p9apig3d1yz7cpsqv4z3w07baw"; 24 25 + doCheck = false; 26 + 27 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version} -X main.commit=${src.rev}" ]; 28 29 wrapperPath = stdenv.lib.makeBinPath ([
+2
pkgs/tools/security/saml2aws/default.nix
··· 14 runVend = true; 15 vendorSha256 = "1kzihyx44sx6php4z58fzy6c3g0y713939yzxpgk3n03snn2x8sf"; 16 17 subPackages = [ "." "cmd/saml2aws" ]; 18 19 buildFlagsArray = ''
··· 14 runVend = true; 15 vendorSha256 = "1kzihyx44sx6php4z58fzy6c3g0y713939yzxpgk3n03snn2x8sf"; 16 17 + doCheck = false; 18 + 19 subPackages = [ "." "cmd/saml2aws" ]; 20 21 buildFlagsArray = ''
+2
pkgs/tools/security/sops/default.nix
··· 13 14 vendorSha256 = "0475y95qma5m346ng898n80xv2rxzndx89c9ygjcvjs513yzcba2"; 15 16 meta = with stdenv.lib; { 17 homepage = "https://github.com/mozilla/sops"; 18 description = "Mozilla sops (Secrets OPerationS) is an editor of encrypted files";
··· 13 14 vendorSha256 = "0475y95qma5m346ng898n80xv2rxzndx89c9ygjcvjs513yzcba2"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 homepage = "https://github.com/mozilla/sops"; 20 description = "Mozilla sops (Secrets OPerationS) is an editor of encrypted files";
+2
pkgs/tools/security/verifpal/default.nix
··· 16 17 vendorSha256 = "0cmj6h103igg5pcs9c9wrcmrsf0mwp9vbgzf5amsnj1206ryb1p2"; 18 19 nativeBuildInputs = [ pigeon ]; 20 21 subPackages = [ "cmd/verifpal" ];
··· 16 17 vendorSha256 = "0cmj6h103igg5pcs9c9wrcmrsf0mwp9vbgzf5amsnj1206ryb1p2"; 18 19 + doCheck = false; 20 + 21 nativeBuildInputs = [ pigeon ]; 22 23 subPackages = [ "cmd/verifpal" ];
+2
pkgs/tools/security/yubikey-agent/default.nix
··· 27 28 vendorSha256 = "128mlsagj3im6h0p0ndhzk29ya47g19im9dldx3nmddf2jlccj2h"; 29 30 subPackages = [ "." ]; 31 32 # On macOS, there isn't a choice of pinentry program, so let's
··· 27 28 vendorSha256 = "128mlsagj3im6h0p0ndhzk29ya47g19im9dldx3nmddf2jlccj2h"; 29 30 + doCheck = false; 31 + 32 subPackages = [ "." ]; 33 34 # On macOS, there isn't a choice of pinentry program, so let's
+2
pkgs/tools/system/ctop/default.nix
··· 13 14 vendorSha256 = "1x4li44vg0l1x205v9a971cgphplxhsrn59q97gmj9cfy4m7jdfw"; 15 16 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version} -X main.build=v${version}" ]; 17 18 meta = with lib; {
··· 13 14 vendorSha256 = "1x4li44vg0l1x205v9a971cgphplxhsrn59q97gmj9cfy4m7jdfw"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version} -X main.build=v${version}" ]; 19 20 meta = with lib; {
+2
pkgs/tools/system/gotop/default.nix
··· 13 14 vendorSha256 = "1crphp41bfivfmfp3cl7pjca3ypds6mr3847msd4wvfq4g6imk55"; 15 16 meta = with stdenv.lib; { 17 description = "A terminal based graphical activity monitor inspired by gtop and vtop"; 18 homepage = "https://github.com/xxxserxxx/gotop";
··· 13 14 vendorSha256 = "1crphp41bfivfmfp3cl7pjca3ypds6mr3847msd4wvfq4g6imk55"; 15 16 + doCheck = false; 17 + 18 meta = with stdenv.lib; { 19 description = "A terminal based graphical activity monitor inspired by gtop and vtop"; 20 homepage = "https://github.com/xxxserxxx/gotop";
+2
pkgs/tools/system/jump/default.nix
··· 13 14 vendorSha256 = "1500vim2lmkkls758pwhlx3piqbw6ap0nnhdwz9pcxih4s4as2nk"; 15 16 outputs = [ "out" "man"]; 17 postInstall = '' 18 install -D --mode=444 man/j.1 man/jump.1 -t $man/man/man1/
··· 13 14 vendorSha256 = "1500vim2lmkkls758pwhlx3piqbw6ap0nnhdwz9pcxih4s4as2nk"; 15 16 + doCheck = false; 17 + 18 outputs = [ "out" "man"]; 19 postInstall = '' 20 install -D --mode=444 man/j.1 man/jump.1 -t $man/man/man1/
+2
pkgs/tools/system/netdata/go.d.plugin.nix
··· 13 14 vendorSha256 = "1k84l97fw4s9jdwbka4p168m7l7wil0c4cpijis8ypj3g1xfrw90"; 15 16 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 17 18 postInstall = ''
··· 13 14 vendorSha256 = "1k84l97fw4s9jdwbka4p168m7l7wil0c4cpijis8ypj3g1xfrw90"; 15 16 + doCheck = false; 17 + 18 buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ]; 19 20 postInstall = ''
+2
pkgs/tools/text/vale/default.nix
··· 16 17 vendorSha256 = null; 18 19 postInstall = '' 20 mkdir -p $data/share/vale 21 cp -r styles $data/share/vale
··· 16 17 vendorSha256 = null; 18 19 + doCheck = false; 20 + 21 postInstall = '' 22 mkdir -p $data/share/vale 23 cp -r styles $data/share/vale
+2
pkgs/tools/virtualization/cri-tools/default.nix
··· 17 18 vendorSha256 = null; 19 20 nativeBuildInputs = [ installShellFiles ]; 21 22 buildPhase = ''
··· 17 18 vendorSha256 = null; 19 20 + doCheck = false; 21 + 22 nativeBuildInputs = [ installShellFiles ]; 23 24 buildPhase = ''