lol

Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
cf7efe11 09634364

+1146 -537
+26 -6
doc/builders/special/mkshell.section.md
··· 1 1 # pkgs.mkShell {#sec-pkgs-mkShell} 2 2 3 - `pkgs.mkShell` is a special kind of derivation that is only useful when using 4 - it combined with `nix-shell`. It will in fact fail to instantiate when invoked 5 - with `nix-build`. 3 + `pkgs.mkShell` is a specialized `stdenv.mkDerivation` that removes some 4 + repetition when using it with `nix-shell` (or `nix develop`). 6 5 7 6 ## Usage {#sec-pkgs-mkShell-usage} 8 7 8 + Here is a common usage example: 9 + 9 10 ```nix 10 11 { pkgs ? import <nixpkgs> {} }: 11 12 pkgs.mkShell { 12 - # specify which packages to add to the shell environment 13 13 packages = [ pkgs.gnumake ]; 14 - # add all the dependencies, of the given packages, to the shell environment 15 - inputsFrom = with pkgs; [ hello gnutar ]; 14 + 15 + inputsFrom = [ pkgs.hello pkgs.gnutar ]; 16 + 17 + shellHook = '' 18 + export DEBUG=1 19 + ''; 16 20 } 17 21 ``` 22 + 23 + ## Attributes 24 + 25 + * `name` (default: `nix-shell`). Set the name of the derivation. 26 + * `packages` (default: `[]`). Add executable packages to the `nix-shell` environment. 27 + * `inputsFrom` (default: `[]`). Add build dependencies of the listed derivations to the `nix-shell` environment. 28 + * `shellHook` (default: `""`). Bash statements that are executed by `nix-shell`. 29 + 30 + ... all the attributes of `stdenv.mkDerivation`. 31 + 32 + ## Building the shell 33 + 34 + This derivation output will contain a text file that contains a reference to 35 + all the build inputs. This is useful in CI where we want to make sure that 36 + every derivation, and its dependencies, build properly. Or when creating a GC 37 + root so that the build dependencies don't get garbage-collected.
+13
maintainers/maintainer-list.nix
··· 3188 3188 githubId = 24791219; 3189 3189 name = "Jakob Neufeld"; 3190 3190 }; 3191 + dsalaza4 = { 3192 + email = "podany270895@gmail.com"; 3193 + github = "dsalaza4"; 3194 + githubId = 11205987; 3195 + name = "Daniel Salazar"; 3196 + }; 3191 3197 dschrempf = { 3192 3198 name = "Dominik Schrempf"; 3193 3199 email = "dominik.schrempf@gmail.com"; ··· 6048 6054 email = "python.bogdan@gmail.com"; 6049 6055 github = "k4leg"; 6050 6056 githubId = 39882583; 6057 + }; 6058 + k900 = { 6059 + name = "Ilya K."; 6060 + email = "me@0upti.me"; 6061 + github = "K900"; 6062 + githubId = 386765; 6063 + matrix = "@k900:0upti.me"; 6051 6064 }; 6052 6065 kaction = { 6053 6066 name = "Dmitry Bogatov";
+32
nixos/modules/installer/sd-card/sd-image-riscv64-qemu.nix
··· 1 + # To build, use: 2 + # nix-build nixos -I nixos-config=nixos/modules/installer/sd-card/sd-image-riscv64-qemu.nix -A config.system.build.sdImage 3 + { config, lib, pkgs, ... }: 4 + 5 + { 6 + imports = [ 7 + ../../profiles/base.nix 8 + ./sd-image.nix 9 + ]; 10 + 11 + boot.loader = { 12 + grub.enable = false; 13 + generic-extlinux-compatible = { 14 + enable = true; 15 + 16 + # Don't even specify FDTDIR - We do not have the correct DT 17 + # The DTB is generated by QEMU at runtime 18 + useGenerationDeviceTree = false; 19 + }; 20 + }; 21 + 22 + boot.consoleLogLevel = lib.mkDefault 7; 23 + boot.kernelParams = [ "console=tty0" "console=ttyS0,115200n8" ]; 24 + 25 + sdImage = { 26 + populateFirmwareCommands = ""; 27 + populateRootCommands = '' 28 + mkdir -p ./files/boot 29 + ${config.boot.loader.generic-extlinux-compatible.populateCmd} -c ${config.system.build.toplevel} -d ./files/boot 30 + ''; 31 + }; 32 + }
+27
nixos/modules/installer/sd-card/sd-image-x86_64.nix
··· 1 + # To build, use: 2 + # nix-build nixos -I nixos-config=nixos/modules/installer/sd-card/sd-image-x86_64.nix -A config.system.build.sdImage 3 + 4 + # This image is primarily used in NixOS tests (boot.nix) to test `boot.loader.generic-extlinux-compatible`. 5 + { config, lib, pkgs, ... }: 6 + 7 + { 8 + imports = [ 9 + ../../profiles/base.nix 10 + ./sd-image.nix 11 + ]; 12 + 13 + boot.loader = { 14 + grub.enable = false; 15 + generic-extlinux-compatible.enable = true; 16 + }; 17 + 18 + boot.consoleLogLevel = lib.mkDefault 7; 19 + 20 + sdImage = { 21 + populateFirmwareCommands = ""; 22 + populateRootCommands = '' 23 + mkdir -p ./files/boot 24 + ${config.boot.loader.generic-extlinux-compatible.populateCmd} -c ${config.system.build.toplevel} -d ./files/boot 25 + ''; 26 + }; 27 + }
+1 -1
nixos/modules/installer/sd-card/sd-image.nix
··· 176 176 177 177 nativeBuildInputs = [ dosfstools e2fsprogs mtools libfaketime util-linux zstd ]; 178 178 179 - inherit (config.sdImage) compressImage; 179 + inherit (config.sdImage) imageName compressImage; 180 180 181 181 buildCommand = '' 182 182 mkdir -p $out/nix-support $out/sd-image
+1
nixos/modules/module-list.nix
··· 364 364 ./services/desktops/malcontent.nix 365 365 ./services/desktops/pipewire/pipewire.nix 366 366 ./services/desktops/pipewire/pipewire-media-session.nix 367 + ./services/desktops/pipewire/wireplumber.nix 367 368 ./services/desktops/gnome/at-spi2-core.nix 368 369 ./services/desktops/gnome/chrome-gnome-shell.nix 369 370 ./services/desktops/gnome/evolution-data-server.nix
+2 -2
nixos/modules/profiles/all-hardware.nix
··· 44 44 "ohci1394" "sbp2" 45 45 46 46 # Virtio (QEMU, KVM etc.) support. 47 - "virtio_net" "virtio_pci" "virtio_blk" "virtio_scsi" "virtio_balloon" "virtio_console" 47 + "virtio_net" "virtio_pci" "virtio_mmio" "virtio_blk" "virtio_scsi" "virtio_balloon" "virtio_console" 48 48 49 49 # VMware support. 50 50 "mptspi" "vmxnet3" "vsock" 51 51 ] ++ lib.optional platform.isx86 "vmw_balloon" 52 - ++ lib.optionals (!platform.isAarch64 && !platform.isAarch32) [ # not sure where else they're missing 52 + ++ lib.optionals (pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64) [ 53 53 "vmw_vmci" "vmwgfx" "vmw_vsock_vmci_transport" 54 54 55 55 # Hyper-V support.
+1
nixos/modules/services/cluster/kubernetes/addon-manager.nix
··· 167 167 }; 168 168 }; 169 169 170 + meta.buildDocsInSandbox = false; 170 171 }
+2
nixos/modules/services/cluster/kubernetes/addons/dns.nix
··· 363 363 364 364 services.kubernetes.kubelet.clusterDns = mkDefault cfg.clusterIp; 365 365 }; 366 + 367 + meta.buildDocsInSandbox = false; 366 368 }
+1
nixos/modules/services/cluster/kubernetes/apiserver.nix
··· 496 496 497 497 ]; 498 498 499 + meta.buildDocsInSandbox = false; 499 500 }
+5 -4
nixos/modules/services/cluster/kubernetes/controller-manager.nix
··· 6 6 top = config.services.kubernetes; 7 7 otop = options.services.kubernetes; 8 8 cfg = top.controllerManager; 9 - klib = options.services.kubernetes.lib.default; 10 9 in 11 10 { 12 11 imports = [ ··· 57 56 type = int; 58 57 }; 59 58 60 - kubeconfig = klib.mkKubeConfigOptions "Kubernetes controller manager"; 59 + kubeconfig = top.lib.mkKubeConfigOptions "Kubernetes controller manager"; 61 60 62 61 leaderElect = mkOption { 63 62 description = "Whether to start leader election before executing main loop."; ··· 130 129 "--cluster-cidr=${cfg.clusterCidr}"} \ 131 130 ${optionalString (cfg.featureGates != []) 132 131 "--feature-gates=${concatMapStringsSep "," (feature: "${feature}=true") cfg.featureGates}"} \ 133 - --kubeconfig=${klib.mkKubeConfig "kube-controller-manager" cfg.kubeconfig} \ 132 + --kubeconfig=${top.lib.mkKubeConfig "kube-controller-manager" cfg.kubeconfig} \ 134 133 --leader-elect=${boolToString cfg.leaderElect} \ 135 134 ${optionalString (cfg.rootCaFile!=null) 136 135 "--root-ca-file=${cfg.rootCaFile}"} \ ··· 157 156 path = top.path; 158 157 }; 159 158 160 - services.kubernetes.pki.certs = with klib; { 159 + services.kubernetes.pki.certs = with top.lib; { 161 160 controllerManager = mkCert { 162 161 name = "kube-controller-manager"; 163 162 CN = "kube-controller-manager"; ··· 172 171 173 172 services.kubernetes.controllerManager.kubeconfig.server = mkDefault top.apiserverAddress; 174 173 }; 174 + 175 + meta.buildDocsInSandbox = false; 175 176 }
+3 -6
nixos/modules/services/cluster/kubernetes/default.nix
··· 26 26 27 27 containerd.runtimes.runc = { 28 28 runtime_type = "io.containerd.runc.v2"; 29 - }; 30 - 31 - containerd.runtimes."io.containerd.runc.v2".options = { 32 - SystemdCgroup = true; 29 + options.SystemdCgroup = true; 33 30 }; 34 31 }; 35 32 }; ··· 193 190 inherit mkKubeConfigOptions; 194 191 }; 195 192 type = types.attrs; 196 - readOnly = true; 197 - internal = true; 198 193 }; 199 194 200 195 secretsPath = mkOption { ··· 315 310 else "${cfg.masterAddress}:${toString cfg.apiserver.securePort}"}"); 316 311 }) 317 312 ]; 313 + 314 + meta.buildDocsInSandbox = false; 318 315 }
+2
nixos/modules/services/cluster/kubernetes/flannel.nix
··· 95 95 96 96 }; 97 97 }; 98 + 99 + meta.buildDocsInSandbox = false; 98 100 }
+5 -6
nixos/modules/services/cluster/kubernetes/kubelet.nix
··· 6 6 top = config.services.kubernetes; 7 7 otop = options.services.kubernetes; 8 8 cfg = top.kubelet; 9 - klib = options.services.kubernetes.lib.default; 10 9 11 10 cniConfig = 12 11 if cfg.cni.config != [] && cfg.cni.configDir != null then ··· 28 27 config.Cmd = ["/bin/pause"]; 29 28 }; 30 29 31 - kubeconfig = klib.mkKubeConfig "kubelet" cfg.kubeconfig; 30 + kubeconfig = top.lib.mkKubeConfig "kubelet" cfg.kubeconfig; 32 31 33 32 manifestPath = "kubernetes/manifests"; 34 33 ··· 178 177 type = str; 179 178 }; 180 179 181 - kubeconfig = klib.mkKubeConfigOptions "Kubelet"; 180 + kubeconfig = top.lib.mkKubeConfigOptions "Kubelet"; 182 181 183 182 manifests = mkOption { 184 183 description = "List of manifests to bootstrap with kubelet (only pods can be created as manifest entry)"; ··· 265 264 "net.bridge.bridge-nf-call-ip6tables" = 1; 266 265 }; 267 266 268 - systemd.enableUnifiedCgroupHierarchy = false; # true breaks node memory metrics 269 - 270 267 systemd.services.kubelet = { 271 268 description = "Kubernetes Kubelet Service"; 272 269 wantedBy = [ "kubernetes.target" ]; ··· 359 356 services.kubernetes.kubelet.hostname = with config.networking; 360 357 mkDefault (hostName + optionalString (domain != null) ".${domain}"); 361 358 362 - services.kubernetes.pki.certs = with klib; { 359 + services.kubernetes.pki.certs = with top.lib; { 363 360 kubelet = mkCert { 364 361 name = "kubelet"; 365 362 CN = top.kubelet.hostname; ··· 396 393 }) 397 394 398 395 ]; 396 + 397 + meta.buildDocsInSandbox = false; 399 398 }
+6 -5
nixos/modules/services/cluster/kubernetes/pki.nix
··· 1 - { config, options, lib, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 3 with lib; 4 4 5 5 let 6 6 top = config.services.kubernetes; 7 7 cfg = top.pki; 8 - klib = options.services.kubernetes.lib; 9 8 10 9 csrCA = pkgs.writeText "kube-pki-cacert-csr.json" (builtins.toJSON { 11 10 key = { ··· 30 29 cfsslAPITokenLength = 32; 31 30 32 31 clusterAdminKubeconfig = with cfg.certs.clusterAdmin; 33 - klib.mkKubeConfig "cluster-admin" { 32 + top.lib.mkKubeConfig "cluster-admin" { 34 33 server = top.apiserverAddress; 35 34 certFile = cert; 36 35 keyFile = key; ··· 251 250 # - it would be better with a more Nix-oriented way of managing addons 252 251 systemd.services.kube-addon-manager = mkIf top.addonManager.enable (mkMerge [{ 253 252 environment.KUBECONFIG = with cfg.certs.addonManager; 254 - klib.mkKubeConfig "addon-manager" { 253 + top.lib.mkKubeConfig "addon-manager" { 255 254 server = top.apiserverAddress; 256 255 certFile = cert; 257 256 keyFile = key; ··· 344 343 ''; 345 344 346 345 services.flannel = with cfg.certs.flannelClient; { 347 - kubeconfig = klib.mkKubeConfig "flannel" { 346 + kubeconfig = top.lib.mkKubeConfig "flannel" { 348 347 server = top.apiserverAddress; 349 348 certFile = cert; 350 349 keyFile = key; ··· 402 401 }; 403 402 }; 404 403 }); 404 + 405 + meta.buildDocsInSandbox = false; 405 406 }
+5 -4
nixos/modules/services/cluster/kubernetes/proxy.nix
··· 6 6 top = config.services.kubernetes; 7 7 otop = options.services.kubernetes; 8 8 cfg = top.proxy; 9 - klib = options.services.kubernetes.lib.default; 10 9 in 11 10 { 12 11 imports = [ ··· 44 43 type = str; 45 44 }; 46 45 47 - kubeconfig = klib.mkKubeConfigOptions "Kubernetes proxy"; 46 + kubeconfig = top.lib.mkKubeConfigOptions "Kubernetes proxy"; 48 47 49 48 verbosity = mkOption { 50 49 description = '' ··· 73 72 ${optionalString (cfg.featureGates != []) 74 73 "--feature-gates=${concatMapStringsSep "," (feature: "${feature}=true") cfg.featureGates}"} \ 75 74 --hostname-override=${cfg.hostname} \ 76 - --kubeconfig=${klib.mkKubeConfig "kube-proxy" cfg.kubeconfig} \ 75 + --kubeconfig=${top.lib.mkKubeConfig "kube-proxy" cfg.kubeconfig} \ 77 76 ${optionalString (cfg.verbosity != null) "--v=${toString cfg.verbosity}"} \ 78 77 ${cfg.extraOpts} 79 78 ''; ··· 89 88 services.kubernetes.proxy.hostname = with config.networking; mkDefault hostName; 90 89 91 90 services.kubernetes.pki.certs = { 92 - kubeProxyClient = klib.mkCert { 91 + kubeProxyClient = top.lib.mkCert { 93 92 name = "kube-proxy-client"; 94 93 CN = "system:kube-proxy"; 95 94 action = "systemctl restart kube-proxy.service"; ··· 98 97 99 98 services.kubernetes.proxy.kubeconfig.server = mkDefault top.apiserverAddress; 100 99 }; 100 + 101 + meta.buildDocsInSandbox = false; 101 102 }
+5 -4
nixos/modules/services/cluster/kubernetes/scheduler.nix
··· 6 6 top = config.services.kubernetes; 7 7 otop = options.services.kubernetes; 8 8 cfg = top.scheduler; 9 - klib = options.services.kubernetes.lib.default; 10 9 in 11 10 { 12 11 ###### interface ··· 33 32 type = listOf str; 34 33 }; 35 34 36 - kubeconfig = klib.mkKubeConfigOptions "Kubernetes scheduler"; 35 + kubeconfig = top.lib.mkKubeConfigOptions "Kubernetes scheduler"; 37 36 38 37 leaderElect = mkOption { 39 38 description = "Whether to start leader election before executing main loop."; ··· 70 69 --address=${cfg.address} \ 71 70 ${optionalString (cfg.featureGates != []) 72 71 "--feature-gates=${concatMapStringsSep "," (feature: "${feature}=true") cfg.featureGates}"} \ 73 - --kubeconfig=${klib.mkKubeConfig "kube-scheduler" cfg.kubeconfig} \ 72 + --kubeconfig=${top.lib.mkKubeConfig "kube-scheduler" cfg.kubeconfig} \ 74 73 --leader-elect=${boolToString cfg.leaderElect} \ 75 74 --port=${toString cfg.port} \ 76 75 ${optionalString (cfg.verbosity != null) "--v=${toString cfg.verbosity}"} \ ··· 88 87 }; 89 88 90 89 services.kubernetes.pki.certs = { 91 - schedulerClient = klib.mkCert { 90 + schedulerClient = top.lib.mkCert { 92 91 name = "kube-scheduler-client"; 93 92 CN = "system:kube-scheduler"; 94 93 action = "systemctl restart kube-scheduler.service"; ··· 97 96 98 97 services.kubernetes.scheduler.kubeconfig.server = mkDefault top.apiserverAddress; 99 98 }; 99 + 100 + meta.buildDocsInSandbox = false; 100 101 }
+4 -18
nixos/modules/services/desktops/gnome/gnome-settings-daemon.nix
··· 57 57 pkgs.gnome.gnome-settings-daemon 58 58 ]; 59 59 60 - systemd.user.targets."gnome-session-initialized".wants = [ 61 - "gsd-color.target" 62 - "gsd-datetime.target" 63 - "gsd-keyboard.target" 64 - "gsd-media-keys.target" 65 - "gsd-print-notifications.target" 66 - "gsd-rfkill.target" 67 - "gsd-screensaver-proxy.target" 68 - "gsd-sharing.target" 69 - "gsd-smartcard.target" 70 - "gsd-sound.target" 71 - "gsd-wacom.target" 72 - "gsd-wwan.target" 73 - "gsd-a11y-settings.target" 74 - "gsd-housekeeping.target" 75 - "gsd-power.target" 60 + systemd.user.targets."gnome-session-x11-services".wants = [ 61 + "org.gnome.SettingsDaemon.XSettings.service" 76 62 ]; 77 63 78 - systemd.user.targets."gnome-session-x11-services".wants = [ 79 - "gsd-xsettings.target" 64 + systemd.user.targets."gnome-session-x11-services-ready".wants = [ 65 + "org.gnome.SettingsDaemon.XSettings.service" 80 66 ]; 81 67 82 68 };
+41
nixos/modules/services/desktops/pipewire/wireplumber.nix
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + let 4 + cfg = config.services.pipewire.wireplumber; 5 + in 6 + { 7 + meta.maintainers = [ lib.maintainers.k900 ]; 8 + 9 + options = { 10 + services.pipewire.wireplumber = { 11 + enable = lib.mkEnableOption "A modular session / policy manager for PipeWire"; 12 + 13 + package = lib.mkOption { 14 + type = lib.types.package; 15 + default = pkgs.wireplumber; 16 + defaultText = lib.literalExpression "pkgs.wireplumber"; 17 + description = '' 18 + The wireplumber derivation to use. 19 + ''; 20 + }; 21 + }; 22 + }; 23 + 24 + config = lib.mkIf cfg.enable { 25 + assertions = [ 26 + { 27 + assertion = !config.services.pipewire.media-session.enable; 28 + message = "WirePlumber and pipewire-media-session can't be enabled at the same time."; 29 + } 30 + ]; 31 + 32 + environment.systemPackages = [ cfg.package ]; 33 + systemd.packages = [ cfg.package ]; 34 + 35 + systemd.services.wireplumber.enable = config.services.pipewire.systemWide; 36 + systemd.user.services.wireplumber.enable = !config.services.pipewire.systemWide; 37 + 38 + systemd.services.wireplumber.wantedBy = [ "pipewire.service" ]; 39 + systemd.user.services.wireplumber.wantedBy = [ "pipewire.service" ]; 40 + }; 41 + }
+18 -1
nixos/modules/system/boot/loader/generic-extlinux-compatible/default.nix
··· 30 30 ''; 31 31 }; 32 32 33 + useGenerationDeviceTree = mkOption { 34 + default = true; 35 + type = types.bool; 36 + description = '' 37 + Whether to generate Device Tree-related directives in the 38 + extlinux configuration. 39 + 40 + When enabled, the bootloader will attempt to load the device 41 + tree binaries from the generation's kernel. 42 + 43 + Note that this affects all generations, regardless of the 44 + setting value used in their configurations. 45 + ''; 46 + }; 47 + 33 48 configurationLimit = mkOption { 34 49 default = 20; 35 50 example = 10; ··· 54 69 }; 55 70 56 71 config = let 57 - builderArgs = "-g ${toString cfg.configurationLimit} -t ${timeoutStr}" + lib.optionalString (dtCfg.name != null) " -n ${dtCfg.name}"; 72 + builderArgs = "-g ${toString cfg.configurationLimit} -t ${timeoutStr}" 73 + + lib.optionalString (dtCfg.name != null) " -n ${dtCfg.name}" 74 + + lib.optionalString (!cfg.useGenerationDeviceTree) " -r"; 58 75 in 59 76 mkIf cfg.enable { 60 77 system.build.installBootLoader = "${builder} ${builderArgs} -c";
+9 -3
nixos/modules/system/boot/loader/generic-extlinux-compatible/extlinux-conf-builder.sh
··· 6 6 for i in @path@; do PATH=$PATH:$i/bin; done 7 7 8 8 usage() { 9 - echo "usage: $0 -t <timeout> -c <path-to-default-configuration> [-d <boot-dir>] [-g <num-generations>] [-n <dtbName>]" >&2 9 + echo "usage: $0 -t <timeout> -c <path-to-default-configuration> [-d <boot-dir>] [-g <num-generations>] [-n <dtbName>] [-r]" >&2 10 10 exit 1 11 11 } 12 12 ··· 15 15 target=/boot # Target directory 16 16 numGenerations=0 # Number of other generations to include in the menu 17 17 18 - while getopts "t:c:d:g:n:" opt; do 18 + while getopts "t:c:d:g:n:r" opt; do 19 19 case "$opt" in 20 20 t) # U-Boot interprets '0' as infinite and negative as instant boot 21 21 if [ "$OPTARG" -lt 0 ]; then ··· 30 30 d) target="$OPTARG" ;; 31 31 g) numGenerations="$OPTARG" ;; 32 32 n) dtbName="$OPTARG" ;; 33 + r) noDeviceTree=1 ;; 33 34 \?) usage ;; 34 35 esac 35 36 done ··· 96 97 fi 97 98 echo " LINUX ../nixos/$(basename $kernel)" 98 99 echo " INITRD ../nixos/$(basename $initrd)" 100 + echo " APPEND init=$path/init $extraParams" 101 + 102 + if [ -n "$noDeviceTree" ]; then 103 + return 104 + fi 105 + 99 106 if [ -d "$dtbDir" ]; then 100 107 # if a dtbName was specified explicitly, use that, else use FDTDIR 101 108 if [ -n "$dtbName" ]; then ··· 109 116 exit 1 110 117 fi 111 118 fi 112 - echo " APPEND init=$path/init $extraParams" 113 119 } 114 120 115 121 tmpFile="$target/extlinux/extlinux.conf.tmp.$$"
+40 -4
nixos/tests/boot.nix
··· 12 12 iso = 13 13 (import ../lib/eval-config.nix { 14 14 inherit system; 15 - modules = 16 - [ ../modules/installer/cd-dvd/installation-cd-minimal.nix 17 - ../modules/testing/test-instrumentation.nix 18 - ]; 15 + modules = [ 16 + ../modules/installer/cd-dvd/installation-cd-minimal.nix 17 + ../modules/testing/test-instrumentation.nix 18 + ]; 19 19 }).config.system.build.isoImage; 20 + 21 + sd = 22 + (import ../lib/eval-config.nix { 23 + inherit system; 24 + modules = [ 25 + ../modules/installer/sd-card/sd-image-x86_64.nix 26 + ../modules/testing/test-instrumentation.nix 27 + { sdImage.compressImage = false; } 28 + ]; 29 + }).config.system.build.sdImage; 20 30 21 31 pythonDict = params: "\n {\n ${concatStringsSep ",\n " (mapAttrsToList (name: param: "\"${name}\": \"${param}\"") params)},\n }\n"; 22 32 ··· 110 120 }; 111 121 112 122 biosNetboot = makeNetbootTest "bios" {}; 123 + 124 + ubootExtlinux = let 125 + sdImage = "${sd}/sd-image/${sd.imageName}"; 126 + mutableImage = "/tmp/linked-image.qcow2"; 127 + 128 + machineConfig = pythonDict { 129 + bios = "${pkgs.ubootQemuX86}/u-boot.rom"; 130 + qemuFlags = "-m 768 -machine type=pc,accel=tcg -drive file=${mutableImage},if=ide,format=qcow2"; 131 + }; 132 + in makeTest { 133 + name = "boot-uboot-extlinux"; 134 + nodes = { }; 135 + testScript = '' 136 + import os 137 + 138 + # Create a mutable linked image backed by the read-only SD image 139 + if os.system("qemu-img create -f qcow2 -F raw -b ${sdImage} ${mutableImage}") != 0: 140 + raise RuntimeError("Could not create mutable linked image") 141 + 142 + machine = create_machine(${machineConfig}) 143 + machine.start() 144 + machine.wait_for_unit("multi-user.target") 145 + machine.succeed("nix store verify -r --no-trust --option experimental-features nix-command /run/current-system") 146 + machine.shutdown() 147 + ''; 148 + }; 113 149 }
-7
nixos/tests/kubernetes/base.nix
··· 60 60 advertiseAddress = master.ip; 61 61 }; 62 62 masterAddress = "${masterName}.${config.networking.domain}"; 63 - # workaround for: 64 - # https://github.com/kubernetes/kubernetes/issues/102676 65 - # (workaround from) https://github.com/kubernetes/kubernetes/issues/95488 66 - kubelet.extraOpts = ''\ 67 - --cgroups-per-qos=false \ 68 - --enforce-node-allocatable="" \ 69 - ''; 70 63 }; 71 64 } 72 65 (optionalAttrs (any (role: role == "master") machine.roles) {
+3 -3
pkgs/applications/blockchains/go-ethereum/default.nix
··· 9 9 10 10 in buildGoModule rec { 11 11 pname = "go-ethereum"; 12 - version = "1.10.14"; 12 + version = "1.10.15"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "ethereum"; 16 16 repo = pname; 17 17 rev = "v${version}"; 18 - sha256 = "sha256-0DQrcei3FM+X4BYokou7dPNVCcJTbY05YsTvzdtsas8="; 18 + sha256 = "0f6n9rg42ph47mvykc9f0lf99yzwqy4jm7mlzyks4l6i6fl1g3q1"; 19 19 }; 20 20 21 - vendorSha256 = "sha256-zQOpWtQrdn+E1tRWmtEScQ7DDMzNCSr5H+5YL+Z1vug="; 21 + vendorSha256 = "1s5yfpk2yn7f3zwjl2fdrh6c63ki2b8rlmnlss27yxibsidaj0yd"; 22 22 23 23 doCheck = false; 24 24
+7
pkgs/applications/editors/emacs/elisp-packages/ess-R-object-popup/default.nix
··· 2 2 , trivialBuild 3 3 , fetchFromGitHub 4 4 , emacs 5 + , popup 6 + , ess 5 7 }: 6 8 7 9 trivialBuild rec { ··· 14 16 rev = "v${version}"; 15 17 hash = "sha256-YN8ZLXEbwTFdFfovkV2IXV9v6y/PTgCdiRQqbpRaF2E="; 16 18 }; 19 + 20 + packageRequires = [ 21 + popup 22 + ess 23 + ]; 17 24 18 25 meta = { 19 26 homepage = "https://github.com/myuhe/ess-R-object-popup.el";
-2
pkgs/applications/editors/emacs/elisp-packages/manual-packages.nix
··· 225 225 }; 226 226 }; 227 227 228 - railgun = callPackage ./railgun { }; 229 - 230 228 structured-haskell-mode = self.shm; 231 229 232 230 sv-kalender = callPackage ./sv-kalender { };
-25
pkgs/applications/editors/emacs/elisp-packages/railgun/default.nix
··· 1 - { lib 2 - , trivialBuild 3 - , fetchFromGitHub 4 - , emacs 5 - }: 6 - 7 - trivialBuild { 8 - pname = "railgun"; 9 - version= "0.pre+unstable=2012-10-17"; 10 - 11 - src = fetchFromGitHub { 12 - owner = "mbriggs"; 13 - repo = "railgun.el"; 14 - rev = "66aaa1b091baef53a69d0d7425f48d184b865fb8"; 15 - hash = "sha256-0L+jFgrXEPMTptx53RDdyH4BiA+7uInHceXL0eROoAM="; 16 - }; 17 - 18 - buildInputs = [ emacs ]; 19 - 20 - meta = with lib; { 21 - homepage = "https://github.com/mbriggs/railgun.el"; 22 - description = "Propel yourself through a rails project with the power of magnets"; 23 - inherit (emacs.meta) platforms; 24 - }; 25 - }
+2 -2
pkgs/applications/graphics/feh/default.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "feh"; 10 - version = "3.7.2"; 10 + version = "3.8"; 11 11 12 12 src = fetchurl { 13 13 url = "https://feh.finalrewind.org/${pname}-${version}.tar.bz2"; 14 - sha256 = "sha256-hHGP0nIM9UDSRXaElP4OtOWY9Es54jJrrow2ioKcglg="; 14 + sha256 = "1a9bsq5j9sl2drzkab0hdhnamalpaszw9mz2prz6scrr5dak8g3z"; 15 15 }; 16 16 17 17 outputs = [ "out" "man" "doc" ];
+4 -4
pkgs/applications/misc/josm/default.nix
··· 3 3 }: 4 4 let 5 5 pname = "josm"; 6 - version = "18303"; 6 + version = "18360"; 7 7 srcs = { 8 8 jar = fetchurl { 9 9 url = "https://josm.openstreetmap.de/download/josm-snapshot-${version}.jar"; 10 - sha256 = "sha256-+gUJsx238iQKrYx/rdtd8ESVXI0u/kW2s0p33T4MSWU="; 10 + sha256 = "sha256-1OMEPMtUGkxQCgpmyVP1h25gSDa2MKF7l1rodr61O5s="; 11 11 }; 12 12 macosx = fetchurl { 13 13 url = "https://josm.openstreetmap.de/download/macosx/josm-macos-${version}-java17.zip"; 14 - sha256 = "sha256-s8MuXcDl+DwjXOtf6ltpxYSeCE9R2/x9iJs2BoZHgXM="; 14 + sha256 = "sha256-ZCybgaLwPfQVG2gJ+dtElIY7bGZUe9R8a/0B6QK8yK8="; 15 15 }; 16 16 pkg = fetchsvn { 17 17 url = "https://josm.openstreetmap.de/svn/trunk/native/linux/tested"; 18 18 rev = version; 19 - sha256 = "sha256-+zsbksfQPwzVPpKlXdRWachWwjVuhExlyiEKDMkaxp8="; 19 + sha256 = "sha256-GbIWZTJmmUT8r9L63/6mcnRt7dvavqGAVbozxlbF89g="; 20 20 }; 21 21 }; 22 22 in
+5 -5
pkgs/applications/misc/obinskit/default.nix
··· 4 4 , libxkbcommon 5 5 , systemd 6 6 , xorg 7 - , electron_11 7 + , electron_13 8 8 , makeWrapper 9 9 , makeDesktopItem 10 10 }: ··· 17 17 genericName = "Obinskit keyboard configurator"; 18 18 categories = "Utility"; 19 19 }; 20 - electron = electron_11; 20 + electron = electron_13; 21 21 in 22 22 stdenv.mkDerivation rec { 23 23 pname = "obinskit"; 24 - version = "1.1.8"; 24 + version = "1.2.11"; 25 25 26 26 src = fetchurl { 27 - url = "http://releases.obins.net/occ/linux/tar/ObinsKit_${version}_x64.tar.gz"; 28 - sha256 = "MgasbgexOdscQrUte/6OzCSrc74RvaBq44oHplQA/Gc="; 27 + url = "https://s3.hexcore.xyz/occ/linux/tar/ObinsKit_${version}_x64.tar.gz"; 28 + sha256 = "1kcn41wmwcx6q70spa9a1qh7wfrj1sk4v4i58lbnf9kc6vasw41a"; 29 29 }; 30 30 31 31 unpackPhase = "tar -xzf $src";
+2 -2
pkgs/applications/misc/obsidian/default.nix
··· 31 31 32 32 in stdenv.mkDerivation rec { 33 33 pname = "obsidian"; 34 - version = "0.13.14"; 34 + version = "0.13.19"; 35 35 36 36 src = fetchurl { 37 37 url = "https://github.com/obsidianmd/obsidian-releases/releases/download/v${version}/obsidian-${version}.tar.gz"; 38 - sha256 = "0d55lk643yqjz4s6j5lbrdkf9f7wmwlz9ahjx760rzqpzy5190nr"; 38 + sha256 = "1jx1raynr0dgffqwya7cp4yr3szdn9bfwrhzk09bkmn8ys7d426r"; 39 39 }; 40 40 41 41 nativeBuildInputs = [ makeWrapper graphicsmagick ];
+8 -8
pkgs/applications/networking/browsers/chromium/upstream-info.json
··· 45 45 } 46 46 }, 47 47 "ungoogled-chromium": { 48 - "version": "96.0.4664.110", 49 - "sha256": "1s3ilq0ik36qgqp7l88gfd1yx97zscn8yr2kprsrjfp9q8lrva9n", 50 - "sha256bin64": "17cyj1jx47fz6y26f196xhlngrw5gnjgcvapvgkgswlwd7y67jcb", 48 + "version": "97.0.4692.71", 49 + "sha256": "0z7ximvm4a78kxyp4j0i2jzklxazpw6jcqi9jkaf8bvq9ga8kqca", 50 + "sha256bin64": "1z1d50i5pvqaw6hjdxwasbznzgqwrnd1z8jmy2x05b6i49vd7r9j", 51 51 "deps": { 52 52 "gn": { 53 - "version": "2021-09-24", 53 + "version": "2021-11-03", 54 54 "url": "https://gn.googlesource.com/gn", 55 - "rev": "0153d369bbccc908f4da4993b1ba82728055926a", 56 - "sha256": "0y4414h8jqsbz5af6pn91c0vkfp4s281s85g992xfyl785c5zbsi" 55 + "rev": "90294ccdcf9334ed25a76ac9b67689468e506342", 56 + "sha256": "0n0jml8s00ayy186jzrf207hbz70pxiq426znxwxd4gjcp60scsa" 57 57 }, 58 58 "ungoogled-patches": { 59 - "rev": "96.0.4664.110-1", 60 - "sha256": "098mfcd1lr2hhlic0i1l5gxsq71axvqnn4gayr4r9j6nbj9byf4h" 59 + "rev": "97.0.4692.71-1", 60 + "sha256": "0a1172kj93lg3ip4im1s5s7bdm2q41w4m6ylyxc92w29rbhbxjxp" 61 61 } 62 62 } 63 63 }
+5 -1
pkgs/applications/networking/cluster/terraform-providers/default.nix
··· 3 3 , fetchFromGitHub 4 4 , callPackage 5 5 , config 6 + 7 + , cdrtools # libvirt 6 8 }: 7 9 let 8 10 list = lib.importJSON ./providers.json; ··· 41 43 special-providers = let archived = throw "the provider has been archived by upstream"; in { 42 44 # Packages that don't fit the default model 43 45 gandi = callPackage ./gandi { }; 44 - libvirt = callPackage ./libvirt { }; 46 + # mkisofs needed to create ISOs holding cloud-init data, 47 + # and wrapped to terraform via deecb4c1aab780047d79978c636eeb879dd68630 48 + libvirt = automated-providers.libvirt.overrideAttrs (_: { propagatedBuildInputs = [ cdrtools ]; }); 45 49 teleport = callPackage ./teleport { }; 46 50 vpsadmin = callPackage ./vpsadmin { }; 47 51 } // (lib.optionalAttrs (config.allowAliases or false) {
-56
pkgs/applications/networking/cluster/terraform-providers/libvirt/default.nix
··· 1 - { buildGoModule, cdrtools, fetchFromGitHub, lib, libvirt, makeWrapper, pkg-config }: 2 - 3 - # USAGE: 4 - # install the following package globally or in nix-shell: 5 - # 6 - # (terraform.withPlugins (p: [p.libvirt])) 7 - # 8 - # configuration.nix: 9 - # 10 - # virtualisation.libvirtd.enable = true; 11 - # 12 - # pick an example from (i.e ubuntu): 13 - # https://github.com/dmacvicar/terraform-provider-libvirt/tree/main/examples 14 - 15 - let 16 - sha256 = "sha256-1l+ARrXHxtSdnQfYV/6gw3BYHVH8NN4pi+Ttk1nwF88="; 17 - vendorSha256 = "sha256-OJa8pQgf5PlECZZkFV9fyCOdh6CrregY1BWycx7JPFE="; 18 - version = "0.6.12"; 19 - in buildGoModule { 20 - inherit version; 21 - inherit vendorSha256; 22 - 23 - pname = "terraform-provider-libvirt"; 24 - 25 - src = fetchFromGitHub { 26 - inherit sha256; 27 - 28 - owner = "dmacvicar"; 29 - repo = "terraform-provider-libvirt"; 30 - rev = "v${version}"; 31 - }; 32 - 33 - nativeBuildInputs = [ pkg-config makeWrapper ]; 34 - 35 - buildInputs = [ libvirt ]; 36 - 37 - # mkisofs needed to create ISOs holding cloud-init data, 38 - # and wrapped to terraform via deecb4c1aab780047d79978c636eeb879dd68630 39 - propagatedBuildInputs = [ cdrtools ]; 40 - 41 - # Terraform allow checking the provider versions, but this breaks 42 - # if the versions are not provided via file paths. 43 - postBuild = "mv $GOPATH/bin/terraform-provider-libvirt{,_v${version}}"; 44 - 45 - ldflags = [ "-X main.version=${version}" ]; 46 - passthru.provider-source-address = "registry.terraform.io/dmacvicar/libvirt"; 47 - 48 - doCheck = false; 49 - 50 - meta = with lib; { 51 - homepage = "https://github.com/dmacvicar/terraform-provider-libvirt"; 52 - description = "Terraform provider for libvirt"; 53 - license = licenses.asl20; 54 - maintainers = with maintainers; [ mic92 ]; 55 - }; 56 - }
+9
pkgs/applications/networking/cluster/terraform-providers/providers.json
··· 579 579 "vendorSha256": "05gx87dwh49zc5mlqnzcqn46pjf9q4wsv9l15pjr3spczzi11cnz", 580 580 "version": "2.2.0" 581 581 }, 582 + "libvirt": { 583 + "owner": "dmacvicar", 584 + "provider-source-address": "registry.terraform.io/dmacvicar/libvirt", 585 + "repo": "terraform-provider-libvirt", 586 + "rev": "v0.6.12", 587 + "sha256": "1kqpy1cr7vg4iclxwd7wa4fmhw63l3z5gn07knfx9in7nm380pyn", 588 + "vendorSha256": "0l9wr4g77chmshcfibdbl23rs8y8bxgiar4n152gkr0z12jvr5iq", 589 + "version": "0.6.12" 590 + }, 582 591 "linode": { 583 592 "owner": "linode", 584 593 "provider-source-address": "registry.terraform.io/linode/linode",
+1 -1
pkgs/applications/office/timedoctor/default.nix
··· 117 117 description = "Employee time tracking software"; 118 118 homepage = "https://www.timedoctor.com"; 119 119 license = licenses.unfree; 120 - maintainers = with maintainers; [ kamadorueda ]; 120 + maintainers = with maintainers; [ dsalaza4 ]; 121 121 platforms = [ "x86_64-linux" ]; 122 122 # gpgme for i686-linux failed to build. 123 123 broken = true;
+3 -3
pkgs/applications/science/logic/lean/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "lean"; 5 - version = "3.36.0"; 5 + version = "3.37.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "leanprover-community"; ··· 11 11 # from. this is then used to check whether an olean file should be 12 12 # rebuilt. don't use a tag as rev because this will get replaced into 13 13 # src/githash.h.in in preConfigure. 14 - rev = "e948149d3d1bbdb8eac9cd103d58626a59fae3b9"; 15 - sha256 = "1lcjif29lfj3myc6j63ifk8fdvylyv8g82g2dv0d85nz7mpbq47b"; 14 + rev = "e69ab934262eb6f141344fdaec98ede68a9102b6"; 15 + sha256 = "19sigzbrdl90jqk7lvl3q8j6n4nnidzwp9zzmzgq3zxxgywa2ghp"; 16 16 }; 17 17 18 18 nativeBuildInputs = [ cmake ];
+4 -4
pkgs/applications/science/math/gmsh/default.nix
··· 5 5 6 6 stdenv.mkDerivation rec { 7 7 pname = "gmsh"; 8 - version = "4.9.0"; 8 + version = "4.9.2"; 9 9 10 10 src = fetchurl { 11 - url = "http://gmsh.info/src/gmsh-${version}-source.tgz"; 12 - sha256 = "sha256-uO8TPJtm/+Et8XR+ctSs8Z8esenNlesPV3y8QIHZvqM="; 11 + url = "https://gmsh.info/src/gmsh-${version}-source.tgz"; 12 + sha256 = "sha256-26KB4DNYT12gfi2Y1656PcSBcjyybCxye2X8ILMBYYw="; 13 13 }; 14 14 15 15 buildInputs = [ blas lapack gmm fltk libjpeg zlib libGLU libGL ··· 22 22 23 23 meta = { 24 24 description = "A three-dimensional finite element mesh generator"; 25 - homepage = "http://gmsh.info/"; 25 + homepage = "https://gmsh.info/"; 26 26 platforms = [ "x86_64-linux" ]; 27 27 license = lib.licenses.gpl2Plus; 28 28 };
+2 -2
pkgs/applications/window-managers/dwm/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "dwm"; 5 - version = "6.2"; 5 + version = "6.3"; 6 6 7 7 src = fetchurl { 8 8 url = "https://dl.suckless.org/dwm/${pname}-${version}.tar.gz"; 9 - sha256 = "03hirnj8saxnsfqiszwl2ds7p0avg20izv9vdqyambks00p2x44p"; 9 + sha256 = "utqgKFKbH7of1/moTztk8xGQRmyFgBG1Pi97cMajB40="; 10 10 }; 11 11 12 12 buildInputs = [ libX11 libXinerama libXft ];
+16 -11
pkgs/build-support/mkshell/default.nix
··· 1 - { lib, stdenv }: 1 + { lib, stdenv, buildEnv }: 2 2 3 3 # A special kind of derivation that is only meant to be consumed by the 4 4 # nix-shell. 5 - { 6 - # a list of packages to add to the shell environment 5 + { name ? "nix-shell" 6 + , # a list of packages to add to the shell environment 7 7 packages ? [ ] 8 8 , # propagate all the inputs from the given derivations 9 9 inputsFrom ? [ ] ··· 15 15 }@attrs: 16 16 let 17 17 mergeInputs = name: 18 - (attrs.${name} or []) ++ 18 + (attrs.${name} or [ ]) ++ 19 19 (lib.subtractLists inputsFrom (lib.flatten (lib.catAttrs name inputsFrom))); 20 20 21 21 rest = builtins.removeAttrs attrs [ 22 + "name" 22 23 "packages" 23 24 "inputsFrom" 24 25 "buildInputs" ··· 30 31 in 31 32 32 33 stdenv.mkDerivation ({ 33 - name = "nix-shell"; 34 - phases = [ "nobuildPhase" ]; 34 + inherit name; 35 35 36 36 buildInputs = mergeInputs "buildInputs"; 37 37 nativeBuildInputs = packages ++ (mergeInputs "nativeBuildInputs"); ··· 41 41 shellHook = lib.concatStringsSep "\n" (lib.catAttrs "shellHook" 42 42 (lib.reverseList inputsFrom ++ [ attrs ])); 43 43 44 - nobuildPhase = '' 45 - echo 46 - echo "This derivation is not meant to be built, aborting"; 47 - echo 48 - exit 1 44 + phases = [ "buildPhase" ]; 45 + 46 + buildPhase = '' 47 + echo "------------------------------------------------------------" >>$out 48 + echo " WARNING: the existence of this path is not guaranteed." >>$out 49 + echo " It is an internal implementation detail for pkgs.mkShell." >>$out 50 + echo "------------------------------------------------------------" >>$out 51 + echo >> $out 52 + # Record all build inputs as runtime dependencies 53 + export >> $out 49 54 ''; 50 55 } // rest)
+87
pkgs/data/themes/graphite/default.nix
··· 1 + { lib 2 + , stdenvNoCC 3 + , fetchFromGitHub 4 + , gnome-themes-extra 5 + , gtk-engine-murrine 6 + , jdupes 7 + , sassc 8 + , themeVariants ? [] # default: blue 9 + , colorVariants ? [] # default: all 10 + , sizeVariants ? [] # default: standard 11 + , tweaks ? [] 12 + , wallpapers ? false 13 + }: 14 + 15 + let 16 + pname = "graphite-gtk-theme"; 17 + 18 + throwIfNotSubList = name: given: valid: 19 + let 20 + unexpected = lib.subtractLists valid given; 21 + in 22 + lib.throwIfNot (unexpected == []) 23 + "${name}: ${builtins.concatStringsSep ", " (builtins.map builtins.toString unexpected)} unexpected; valid ones: ${builtins.concatStringsSep ", " (builtins.map builtins.toString valid)}"; 24 + 25 + in 26 + throwIfNotSubList "${pname}: theme variants" themeVariants [ "default" "purple" "pink" "red" "orange" "yellow" "green" "teal" "blue" "all" ] 27 + throwIfNotSubList "${pname}: color variants" colorVariants [ "standard" "light" "dark" ] 28 + throwIfNotSubList "${pname}: size variants" sizeVariants [ "standard" "compact" ] 29 + throwIfNotSubList "${pname}: tweaks" tweaks [ "nord" "black" "midblack" "rimless" "normal" ] 30 + 31 + stdenvNoCC.mkDerivation { 32 + inherit pname; 33 + version = "unstable-2022-01-04"; 34 + 35 + src = fetchFromGitHub { 36 + owner = "vinceliuice"; 37 + repo = pname; 38 + rev = "947cac4966377d8f5b5a4e2966ec2b9a6041d205"; 39 + sha256 = "11pl8hzk4fwniqdib0ffvjilpspr1n5pg1gw39kal13wxh4sdg28"; 40 + }; 41 + 42 + nativeBuildInputs = [ 43 + jdupes 44 + sassc 45 + ]; 46 + 47 + buildInputs = [ 48 + gnome-themes-extra 49 + ]; 50 + 51 + propagatedUserEnvPkgs = [ 52 + gtk-engine-murrine 53 + ]; 54 + 55 + installPhase = '' 56 + runHook preInstall 57 + 58 + patchShebangs install.sh 59 + 60 + name= ./install.sh \ 61 + ${lib.optionalString (themeVariants != []) "--theme " + builtins.toString themeVariants} \ 62 + ${lib.optionalString (colorVariants != []) "--color " + builtins.toString colorVariants} \ 63 + ${lib.optionalString (sizeVariants != []) "--size " + builtins.toString sizeVariants} \ 64 + ${lib.optionalString (tweaks != []) "--tweaks " + builtins.toString tweaks} \ 65 + --dest $out/share/themes 66 + 67 + ${lib.optionalString wallpapers '' 68 + mkdir -p $out/share/backgrounds 69 + cp -a wallpaper/Graphite-normal/*.png $out/share/backgrounds/ 70 + ${lib.optionalString (builtins.elem "nord" tweaks) '' 71 + cp -a wallpaper/Graphite-nord/*.png $out/share/backgrounds/ 72 + ''} 73 + ''} 74 + 75 + jdupes -L -r $out/share 76 + 77 + runHook postInstall 78 + ''; 79 + 80 + meta = with lib; { 81 + description = "Flat Gtk+ theme based on Elegant Design"; 82 + homepage = "https://github.com/vinceliuice/Graphite-gtk-theme"; 83 + license = licenses.gpl3Only; 84 + platforms = platforms.unix; 85 + maintainers = [ maintainers.romildo ]; 86 + }; 87 + }
+2 -2
pkgs/development/compilers/go/1.17.nix
··· 54 54 55 55 stdenv.mkDerivation rec { 56 56 pname = "go"; 57 - version = "1.17.5"; 57 + version = "1.17.6"; 58 58 59 59 src = fetchurl { 60 60 url = "https://dl.google.com/go/go${version}.src.tar.gz"; 61 - sha256 = "sha256-Pe+5oJvtBCQDGV6HLcvIxvrhSFljMyJ5Zo7FLoCpWi0="; 61 + sha256 = "sha256-TcG78/9h8MH/Kxk1Xm2IFRpwEmJopHx2FHdobvlHSMg="; 62 62 }; 63 63 64 64 # perl is used for testing go vet
+9 -3
pkgs/development/libraries/aws-sdk-cpp/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, cmake, curl, openssl, s2n-tls, zlib 1 + { lib, stdenv, fetchFromGitHub, fetchpatch, cmake, curl, openssl, s2n-tls, zlib 2 2 , aws-crt-cpp 3 3 , aws-c-cal, aws-c-common, aws-c-event-stream, aws-c-io, aws-checksums 4 4 , CoreAudio, AudioToolbox ··· 21 21 version = "1.9.150"; 22 22 23 23 src = fetchFromGitHub { 24 - owner = "awslabs"; 24 + owner = "aws"; 25 25 repo = "aws-sdk-cpp"; 26 26 rev = version; 27 27 sha256 = "sha256-fgLdXWQKHaCwulrw9KV3vpQ71DjnQAL4heIRW7Rk7UY="; ··· 82 82 83 83 patches = [ 84 84 ./cmake-dirs.patch 85 + 86 + # fix cmake config 87 + (fetchpatch { 88 + url = "https://github.com/aws/aws-sdk-cpp/commit/b102aaf5693c4165c84b616ab9ffb9edfb705239.diff"; 89 + sha256 = "sha256-38QBo3MEFpyHPb8jZEURRPkoeu4DqWhVeErJayiHKF0="; 90 + }) 85 91 ]; 86 92 87 93 # Builds in 2+h with 2 cores, and ~10m with a big-parallel builder. ··· 89 95 90 96 meta = with lib; { 91 97 description = "A C++ interface for Amazon Web Services"; 92 - homepage = "https://github.com/awslabs/aws-sdk-cpp"; 98 + homepage = "https://github.com/aws/aws-sdk-cpp"; 93 99 license = licenses.asl20; 94 100 platforms = platforms.unix; 95 101 maintainers = with maintainers; [ eelco orivej ];
+3 -3
pkgs/development/libraries/lensfun/default.nix
··· 25 25 }; 26 26 27 27 # replace database with a more recent snapshot 28 - postUnpack = '' 29 - rm -R source/data/db 30 - cp -R ${lensfunDatabase}/data/db source/data 28 + prePatch = '' 29 + rm -R ./data/db 30 + cp -R ${lensfunDatabase}/data/db ./data 31 31 ''; 32 32 33 33 nativeBuildInputs = [ cmake pkg-config ];
+18 -4
pkgs/development/libraries/libcamera/default.nix
··· 4 4 , meson 5 5 , ninja 6 6 , pkg-config 7 + , makeFontsConf 7 8 , boost 8 9 , gnutls 9 10 , openssl 11 + , libdrm 10 12 , libevent 11 13 , lttng-ust 12 14 , gst_all_1 ··· 15 17 , doxygen 16 18 , python3 17 19 , python3Packages 20 + , systemd # for libudev 18 21 }: 19 22 20 23 stdenv.mkDerivation { 21 24 pname = "libcamera"; 22 - version = "unstable-2021-09-24"; 25 + version = "unstable-2022-01-03"; 23 26 24 27 src = fetchgit { 25 28 url = "https://git.libcamera.org/libcamera/libcamera.git"; 26 - rev = "40f5fddca7f774944a53f58eeaebc4db79c373d8"; 27 - sha256 = "0jklgdv5ma4nszxibms5lkf5d2ips7ncynwa1flglrhl5bl4wkzz"; 29 + rev = "1db1e31e664c1f613dc964d8519fe75d67b154b6"; 30 + hash = "sha256-pXYPIU9xDWA870Gp1Jgizi5xnUHRvTqEq/ofFXdVZdg="; 28 31 }; 29 32 30 33 postPatch = '' ··· 44 47 45 48 # cam integration 46 49 libevent 50 + libdrm 51 + 52 + # hotplugging 53 + systemd 47 54 48 55 # lttng tracing 49 56 lttng-ust ··· 65 72 openssl 66 73 ]; 67 74 68 - mesonFlags = [ "-Dv4l2=true" "-Dqcam=disabled" ]; 75 + mesonFlags = [ 76 + "-Dv4l2=true" 77 + "-Dqcam=disabled" 78 + "-Dlc-compliance=disabled" # tries unconditionally to download gtest when enabled 79 + ]; 69 80 70 81 # Fixes error on a deprecated declaration 71 82 NIX_CFLAGS_COMPILE = "-Wno-error=deprecated-declarations"; 83 + 84 + # Silence fontconfig warnings about missing config 85 + FONTCONFIG_FILE = makeFontsConf { fontDirectories = []; }; 72 86 73 87 meta = with lib; { 74 88 description = "An open source camera stack and framework for Linux, Android, and ChromeOS";
+27 -30
pkgs/development/libraries/ncurses/default.nix
··· 1 - { lib, stdenv, fetchurl, pkg-config 2 - 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , buildPackages 5 + , pkg-config 3 6 , abiVersion ? "6" 4 - , mouseSupport ? false 5 - , unicode ? true 6 7 , enableStatic ? stdenv.hostPlatform.isStatic 7 - , enableShared ? !enableStatic 8 8 , withCxx ? !stdenv.hostPlatform.useAndroidPrebuilt 9 - 10 - , gpm 11 - 12 - , buildPackages 9 + , mouseSupport ? false, gpm 10 + , unicodeSupport ? true 13 11 }: 14 12 15 13 stdenv.mkDerivation rec { ··· 31 29 setOutputFlags = false; # some aren't supported 32 30 33 31 configureFlags = [ 34 - (lib.withFeature enableShared "shared") 32 + (lib.withFeature (!enableStatic) "shared") 35 33 "--without-debug" 36 34 "--enable-pc-files" 37 35 "--enable-symlinks" 38 36 "--with-manpage-format=normal" 39 37 "--disable-stripping" 40 - ] ++ lib.optional unicode "--enable-widec" 38 + ] ++ lib.optional unicodeSupport "--enable-widec" 41 39 ++ lib.optional (!withCxx) "--without-cxx" 42 40 ++ lib.optional (abiVersion == "5") "--with-abi-version=5" 43 41 ++ lib.optional stdenv.hostPlatform.isNetBSD "--enable-rpath" ··· 49 47 # Only the C compiler, and explicitly not C++ compiler needs this flag on solaris: 50 48 CFLAGS = lib.optionalString stdenv.isSunOS "-D_XOPEN_SOURCE_EXTENDED"; 51 49 52 - depsBuildBuild = [ buildPackages.stdenv.cc ]; 50 + depsBuildBuild = [ 51 + buildPackages.stdenv.cc 52 + ]; 53 + 53 54 nativeBuildInputs = [ 54 55 pkg-config 55 56 ] ++ lib.optionals (stdenv.buildPlatform != stdenv.hostPlatform) [ 56 57 buildPackages.ncurses 57 58 ]; 59 + 58 60 buildInputs = lib.optional (mouseSupport && stdenv.isLinux) gpm; 59 61 60 62 preConfigure = '' ··· 147 149 rm "$out"/lib/*.a 148 150 ''; 149 151 150 - meta = { 152 + meta = with lib; { 153 + homepage = "https://www.gnu.org/software/ncurses/"; 151 154 description = "Free software emulation of curses in SVR4 and more"; 152 - 153 155 longDescription = '' 154 - The Ncurses (new curses) library is a free software emulation of 155 - curses in System V Release 4.0, and more. It uses Terminfo 156 - format, supports pads and color and multiple highlights and 157 - forms characters and function-key mapping, and has all the other 158 - SYSV-curses enhancements over BSD Curses. 156 + The Ncurses (new curses) library is a free software emulation of curses in 157 + System V Release 4.0, and more. It uses Terminfo format, supports pads and 158 + color and multiple highlights and forms characters and function-key 159 + mapping, and has all the other SYSV-curses enhancements over BSD Curses. 159 160 160 - The ncurses code was developed under GNU/Linux. It has been in 161 - use for some time with OpenBSD as the system curses library, and 162 - on FreeBSD and NetBSD as an external package. It should port 163 - easily to any ANSI/POSIX-conforming UNIX. It has even been 164 - ported to OS/2 Warp! 161 + The ncurses code was developed under GNU/Linux. It has been in use for 162 + some time with OpenBSD as the system curses library, and on FreeBSD and 163 + NetBSD as an external package. It should port easily to any 164 + ANSI/POSIX-conforming UNIX. It has even been ported to OS/2 Warp! 165 165 ''; 166 - 167 - homepage = "https://www.gnu.org/software/ncurses/"; 168 - 169 - license = lib.licenses.mit; 170 - platforms = lib.platforms.all; 166 + license = licenses.mit; 167 + platforms = platforms.all; 171 168 }; 172 169 173 170 passthru = { 174 171 ldflags = "-lncurses"; 175 - inherit unicode abiVersion; 172 + inherit unicodeSupport abiVersion; 176 173 }; 177 174 }
+21 -1
pkgs/development/libraries/opencv/4.x.nix
··· 275 275 propagatedBuildInputs = lib.optional enablePython pythonPackages.numpy 276 276 ++ lib.optionals enableCuda [ cudatoolkit nvidia-optical-flow-sdk ]; 277 277 278 - nativeBuildInputs = [ cmake pkg-config unzip ]; 278 + nativeBuildInputs = [ cmake pkg-config unzip ] 279 + ++ lib.optionals enablePython [ 280 + pythonPackages.pip 281 + pythonPackages.wheel 282 + pythonPackages.setuptools 283 + ]; 279 284 280 285 NIX_CFLAGS_COMPILE = lib.optionalString enableEXR "-I${ilmbase.dev}/include/OpenEXR"; 281 286 ··· 333 338 postInstall = '' 334 339 sed -i "s|{exec_prefix}/$out|{exec_prefix}|;s|{prefix}/$out|{prefix}|" \ 335 340 "$out/lib/pkgconfig/opencv4.pc" 341 + '' 342 + # install python distribution information, so other packages can `import opencv` 343 + + lib.optionalString enablePython '' 344 + pushd $NIX_BUILD_TOP/$sourceRoot/modules/python/package 345 + python -m pip wheel --verbose --no-index --no-deps --no-clean --no-build-isolation --wheel-dir dist . 346 + 347 + pushd dist 348 + python -m pip install ./*.whl --no-index --no-warn-script-location --prefix="$out" --no-cache 349 + 350 + # the cv2/__init__.py just tries to check provide "nice user feedback" if the installation is bad 351 + # however, this also causes infinite recursion when used by other packages 352 + rm -r $out/${pythonPackages.python.sitePackages}/cv2 353 + 354 + popd 355 + popd 336 356 ''; 337 357 338 358 passthru = lib.optionalAttrs enablePython { pythonPath = [ ]; };
+16 -30
pkgs/development/libraries/pipewire/default.nix
··· 60 60 }: 61 61 62 62 let 63 - fontsConf = makeFontsConf { 64 - fontDirectories = [ ]; 65 - }; 66 - 67 - mesonEnable = b: if b then "enabled" else "disabled"; 63 + mesonEnableFeature = b: if b then "enabled" else "disabled"; 68 64 mesonList = l: "[" + lib.concatStringsSep "," l + "]"; 69 65 70 66 self = stdenv.mkDerivation rec { 71 67 pname = "pipewire"; 72 - version = "0.3.42"; 68 + version = "0.3.43"; 73 69 74 70 outputs = [ 75 71 "out" ··· 87 83 owner = "pipewire"; 88 84 repo = "pipewire"; 89 85 rev = version; 90 - sha256 = "sha256-Iyd5snOt+iCT7W0+FlfvhMUZo/gF+zr9JX4HIGVdHto="; 86 + sha256 = "sha256-vjMA9dQvZe7dPbF9BNtCYf1V240RUBdtxeyqFjWA4j4="; 91 87 }; 92 88 93 89 patches = [ ··· 103 99 ./0090-pipewire-config-template-paths.patch 104 100 # Place SPA data files in lib output to avoid dependency cycles 105 101 ./0095-spa-data-dir.patch 106 - # Fix attempt to put system service units into pkgs.systemd. 107 - (fetchpatch { 108 - url = "https://gitlab.freedesktop.org/pipewire/pipewire/-/commit/b666edde787b167c6e19b9356257d48007357acc.diff"; 109 - sha256 = "1pmnyyvrjykr46ld4a5frq3cc739f8h4jwvfj414lyx8c6ybm63s"; 110 - }) 111 - (fetchpatch { 112 - url = "https://gitlab.freedesktop.org/pipewire/pipewire/-/commit/5054b48c9de655b4b48f7c801cb305d9eb122520.diff"; 113 - sha256 = "0myhb7h4g7x2nr08dpx8d7nqhsmzp90yanmkvm627r1xxnnr3ivn"; 114 - }) 115 102 ]; 116 103 117 104 nativeBuildInputs = [ ··· 159 146 "-Dinstalled_test_prefix=${placeholder "installedTests"}" 160 147 "-Dpipewire_pulse_prefix=${placeholder "pulse"}" 161 148 "-Dlibjack-path=${placeholder "jack"}/lib" 162 - "-Dlibcamera=${mesonEnable libcameraSupport}" 163 - "-Droc=${mesonEnable rocSupport}" 164 - "-Dlibpulse=${mesonEnable pulseTunnelSupport}" 165 - "-Davahi=${mesonEnable zeroconfSupport}" 166 - "-Dgstreamer=${mesonEnable gstreamerSupport}" 149 + "-Dlibcamera=${mesonEnableFeature libcameraSupport}" 150 + "-Droc=${mesonEnableFeature rocSupport}" 151 + "-Dlibpulse=${mesonEnableFeature pulseTunnelSupport}" 152 + "-Davahi=${mesonEnableFeature zeroconfSupport}" 153 + "-Dgstreamer=${mesonEnableFeature gstreamerSupport}" 167 154 "-Dsystemd-system-service=enabled" 168 - "-Dffmpeg=${mesonEnable ffmpegSupport}" 169 - "-Dbluez5=${mesonEnable bluezSupport}" 170 - "-Dbluez5-backend-hsp-native=${mesonEnable nativeHspSupport}" 171 - "-Dbluez5-backend-hfp-native=${mesonEnable nativeHfpSupport}" 172 - "-Dbluez5-backend-ofono=${mesonEnable ofonoSupport}" 173 - "-Dbluez5-backend-hsphfpd=${mesonEnable hsphfpdSupport}" 155 + "-Dffmpeg=${mesonEnableFeature ffmpegSupport}" 156 + "-Dbluez5=${mesonEnableFeature bluezSupport}" 157 + "-Dbluez5-backend-hsp-native=${mesonEnableFeature nativeHspSupport}" 158 + "-Dbluez5-backend-hfp-native=${mesonEnableFeature nativeHfpSupport}" 159 + "-Dbluez5-backend-ofono=${mesonEnableFeature ofonoSupport}" 160 + "-Dbluez5-backend-hsphfpd=${mesonEnableFeature hsphfpdSupport}" 174 161 "-Dsysconfdir=/etc" 175 162 "-Dpipewire_confdata_dir=${placeholder "lib"}/share/pipewire" 176 163 "-Dsession-managers=" 177 164 "-Dvulkan=enabled" 178 165 ]; 179 166 180 - FONTCONFIG_FILE = fontsConf; # Fontconfig error: Cannot load default config file 167 + # Fontconfig error: Cannot load default config file 168 + FONTCONFIG_FILE = makeFontsConf { fontDirectories = [ ]; }; 181 169 182 170 doCheck = true; 183 171 184 172 postUnpack = '' 185 - patchShebangs source/doc/strip-static.sh 186 173 patchShebangs source/doc/input-filter.sh 187 174 patchShebangs source/doc/input-filter-h.sh 188 - patchShebangs source/spa/tests/gen-cpp-test.py 189 175 ''; 190 176 191 177 postInstall = ''
+82
pkgs/development/libraries/pipewire/wireplumber.nix
··· 1 + { lib 2 + , stdenv 3 + , fetchFromGitLab 4 + , nix-update-script 5 + , # base build deps 6 + meson 7 + , pkg-config 8 + , ninja 9 + , # docs build deps 10 + python3 11 + , doxygen 12 + , graphviz 13 + , # GI build deps 14 + gobject-introspection 15 + , # runtime deps 16 + glib 17 + , systemd 18 + , lua5_4 19 + , pipewire 20 + , # options 21 + enableDocs ? true 22 + , enableGI ? stdenv.hostPlatform == stdenv.buildPlatform 23 + }: 24 + let 25 + mesonEnableFeature = b: if b then "enabled" else "disabled"; 26 + in 27 + stdenv.mkDerivation rec { 28 + pname = "wireplumber"; 29 + version = "0.4.6"; 30 + 31 + outputs = [ "out" "dev" ] ++ lib.optional enableDocs "doc"; 32 + 33 + src = fetchFromGitLab { 34 + domain = "gitlab.freedesktop.org"; 35 + owner = "pipewire"; 36 + repo = "wireplumber"; 37 + rev = version; 38 + sha256 = "sha256-y+Gj9EZn67W3U81zXgp+6JAFxZSZTwwT0TB3Kueb/Tw="; 39 + }; 40 + 41 + nativeBuildInputs = [ 42 + meson 43 + pkg-config 44 + ninja 45 + ] ++ lib.optionals enableDocs [ 46 + graphviz 47 + ] ++ lib.optionals enableGI [ 48 + gobject-introspection 49 + ] ++ lib.optionals (enableDocs || enableGI) [ 50 + doxygen 51 + (python3.withPackages (ps: with ps; 52 + lib.optionals enableDocs [ sphinx sphinx_rtd_theme breathe ] ++ 53 + lib.optionals enableGI [ lxml ] 54 + )) 55 + ]; 56 + 57 + buildInputs = [ 58 + glib 59 + systemd 60 + lua5_4 61 + pipewire 62 + ]; 63 + 64 + mesonFlags = [ 65 + "-Dsystem-lua=true" 66 + "-Delogind=disabled" 67 + "-Ddoc=${mesonEnableFeature enableDocs}" 68 + "-Dintrospection=${mesonEnableFeature enableGI}" 69 + ]; 70 + 71 + passthru.updateScript = nix-update-script { 72 + attrPath = pname; 73 + }; 74 + 75 + meta = with lib; { 76 + description = "A modular session / policy manager for PipeWire"; 77 + homepage = "https://pipewire.org"; 78 + license = licenses.mit; 79 + platforms = platforms.linux; 80 + maintainers = with maintainers; [ k900 ]; 81 + }; 82 + }
+2 -2
pkgs/development/python-modules/awscrt/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "awscrt"; 5 - version = "0.12.6"; 5 + version = "0.13.0"; 6 6 7 7 buildInputs = lib.optionals stdenv.isDarwin [ CoreFoundation Security ]; 8 8 ··· 22 22 23 23 src = fetchPypi { 24 24 inherit pname version; 25 - sha256 = "65d71b4cd78165bea962dfbda361b47b9b5a6198d8074046b8667da9653d0752"; 25 + sha256 = "f8c46335bdf94a5e48d3df2018edbd07c4c903635501c62c1bea4153f407531a"; 26 26 }; 27 27 28 28 meta = with lib; {
+28 -16
pkgs/development/python-modules/diskcache/default.nix
··· 1 - { stdenv 2 - , lib 1 + { lib 2 + , stdenv 3 3 , buildPythonPackage 4 4 , fetchFromGitHub 5 + , pytest-django 6 + , pytest-xdist 5 7 , pytestCheckHook 6 - , pytest-cov 7 - , pytest-xdist 8 - , pytest-django 9 - , mock 8 + , pythonOlder 10 9 }: 11 10 12 11 buildPythonPackage rec { 13 12 pname = "diskcache"; 14 - version = "5.2.1"; 13 + version = "5.4.0"; 14 + format = "setuptools"; 15 + 16 + disabled = pythonOlder "3.6"; 15 17 16 18 src = fetchFromGitHub { 17 19 owner = "grantjenks"; 18 20 repo = "python-diskcache"; 19 21 rev = "v${version}"; 20 - sha256 = "sha256-dWtEyyWpg0rxEwyhBdPyApzgS9o60HVGbtY76ELHvX8="; 22 + hash = "sha256-c/k8mx/T4RkseDobJ2gtcuom0A6Ewyw4aP2Bk9pxV+o="; 21 23 }; 22 24 23 25 checkInputs = [ 24 - pytestCheckHook 25 - pytest-cov 26 - pytest-xdist 27 26 pytest-django 28 - mock 27 + pytest-xdist 28 + pytestCheckHook 29 29 ]; 30 30 31 - # Darwin sandbox causes most tests to fail. 31 + postPatch = '' 32 + sed -i "/--cov/d" tox.ini 33 + ''; 34 + 35 + # Darwin sandbox causes most tests to fail 32 36 doCheck = !stdenv.isDarwin; 33 - pythonImportsCheck = [ "diskcache" ]; 34 37 35 38 disabledTests = [ 36 - # very time sensitive, can fail on over subscribed machines 39 + # Very time sensitive, can fail on over subscribed machines 37 40 "test_incr_update_keyerror" 41 + # AssertionError: 'default' is not None 42 + "test_decr_version" 43 + "test_incr_version" 44 + "test_get_or_set" 45 + "test_get_many" 38 46 ]; 39 47 40 48 pytestFlagsArray = [ 41 49 "-n $NIX_BUILD_CORES" 42 50 ]; 43 51 52 + pythonImportsCheck = [ 53 + "diskcache" 54 + ]; 55 + 44 56 meta = with lib; { 45 57 description = "Disk and file backed persistent cache"; 46 58 homepage = "http://www.grantjenks.com/docs/diskcache/"; 47 59 license = licenses.asl20; 48 - maintainers = [ maintainers.costrouc ]; 60 + maintainers = with maintainers; [ costrouc ]; 49 61 }; 50 62 }
+2 -2
pkgs/development/python-modules/django-allauth/default.nix
··· 3 3 4 4 buildPythonPackage rec { 5 5 pname = "django-allauth"; 6 - version = "0.40.0"; 6 + version = "0.47.0"; 7 7 8 8 # no tests on PyPI 9 9 src = fetchFromGitHub { 10 10 owner = "pennersr"; 11 11 repo = pname; 12 12 rev = version; 13 - sha256 = "10id4k01p1hg5agb8cmllg8mv4kc7ryl75br10idwxabqqp4vla1"; 13 + sha256 = "sha256-wKrsute6TCl331UrxNEBf/zTtGnyGHsOZQwdiicbg2o="; 14 14 }; 15 15 16 16 propagatedBuildInputs = [ requests requests_oauthlib django python3-openid ];
+43 -7
pkgs/development/python-modules/django-oauth-toolkit/default.nix
··· 1 - { lib, buildPythonPackage, fetchFromGitHub 2 - , django, requests, oauthlib 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + 5 + # propagates 6 + , django 7 + , jwcrypto 8 + , requests 9 + , oauthlib 10 + 11 + # tests 12 + , djangorestframework 13 + , pytest-django 14 + , pytest-xdist 15 + , pytest-mock 16 + , pytestCheckHook 3 17 }: 4 18 5 19 buildPythonPackage rec { 6 20 pname = "django-oauth-toolkit"; 7 - version = "1.2.0"; 21 + version = "1.6.1"; 22 + format = "setuptools"; 8 23 9 24 src = fetchFromGitHub { 10 25 owner = "jazzband"; 11 26 repo = pname; 12 27 rev = version; 13 - sha256 = "1zbksxrcxlqnapmlvx4rgvpqc4plgnq0xnf45cjwzwi1626zs8g6"; 28 + sha256 = "sha256-TOrFxQULwiuwpVFqRwRkfTW+GRudLNy6F/gIjUYjZhI="; 14 29 }; 15 30 16 - propagatedBuildInputs = [ django requests oauthlib ]; 31 + postPatch = '' 32 + sed -i '/cov/d' tox.ini 33 + ''; 17 34 18 - # django.core.exceptions.ImproperlyConfigured: Requested setting OAUTH2_PROVIDER, but settings are not configured. You must either define the environment variable DJANGO_SETTINGS_MODULE or call settings.configure() before accessing settings 19 - doCheck = false; 35 + propagatedBuildInputs = [ 36 + django 37 + jwcrypto 38 + oauthlib 39 + requests 40 + ]; 41 + 42 + DJANGO_SETTINGS_MODULE = "tests.settings"; 43 + 44 + checkInputs = [ 45 + djangorestframework 46 + pytest-django 47 + pytest-xdist 48 + pytest-mock 49 + pytestCheckHook 50 + ]; 51 + 52 + disabledTests = [ 53 + # Failed to get a valid response from authentication server. Status code: 404, Reason: Not Found. 54 + "test_response_when_auth_server_response_return_404" 55 + ]; 20 56 21 57 meta = with lib; { 22 58 description = "OAuth2 goodies for the Djangonauts";
+2 -2
pkgs/development/python-modules/django_guardian/default.nix
··· 1 1 { lib, buildPythonPackage, fetchPypi 2 - , django_environ, mock, django 2 + , django-environ, mock, django 3 3 , pytest, pytest-runner, pytest-django 4 4 }: 5 5 buildPythonPackage rec { ··· 11 11 sha256 = "c58a68ae76922d33e6bdc0e69af1892097838de56e93e78a8361090bcd9f89a0"; 12 12 }; 13 13 14 - checkInputs = [ pytest pytest-runner pytest-django django_environ mock ]; 14 + checkInputs = [ pytest pytest-runner pytest-django django-environ mock ]; 15 15 propagatedBuildInputs = [ django ]; 16 16 17 17 meta = with lib; {
+4 -2
pkgs/development/python-modules/fastapi/default.nix
··· 19 19 20 20 buildPythonPackage rec { 21 21 pname = "fastapi"; 22 - version = "0.70.1"; 22 + version = "0.71.0"; 23 23 format = "flit"; 24 24 25 25 disabled = pythonOlder "3.6"; ··· 28 28 owner = "tiangolo"; 29 29 repo = pname; 30 30 rev = version; 31 - sha256 = "sha256-iwjxcAe8h38PPTTDGCxIJSB7zCS0FA0gOcKUjPpk3yg="; 31 + sha256 = "sha256-J4j7lQm22pbwfMkQGF1s2xyFU4MCwXrAqDmRJmLmKGg="; 32 32 }; 33 33 34 34 propagatedBuildInputs = [ ··· 64 64 disabledTestPaths = [ 65 65 # Disabled tests require orjson which requires rust nightly 66 66 "tests/test_default_response_class.py" 67 + # Don't test docs and examples 68 + "docs_src" 67 69 ]; 68 70 69 71 disabledTests = [
+2 -2
pkgs/development/python-modules/flux-led/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "flux-led"; 11 - version = "0.27.40"; 11 + version = "0.27.43"; 12 12 format = "setuptools"; 13 13 14 14 disabled = pythonOlder "3.7"; ··· 17 17 owner = "Danielhiversen"; 18 18 repo = "flux_led"; 19 19 rev = version; 20 - sha256 = "sha256-imfdLomMjeGAyVBSygx+TV0DA9OrMreeSlzzrJ2B9cc="; 20 + sha256 = "sha256-g1K5NoZm9nd1M17who0LtRa5n1P7P/XRs6Qz63vmTxw="; 21 21 }; 22 22 23 23 propagatedBuildInputs = [
+77
pkgs/development/python-modules/gql/default.nix
··· 1 + { lib 2 + , aiofiles 3 + , aiohttp 4 + , botocore 5 + , buildPythonPackage 6 + , fetchFromGitHub 7 + , graphql-core 8 + , mock 9 + , parse 10 + , pytest-asyncio 11 + , pytestCheckHook 12 + , pythonOlder 13 + , requests 14 + , requests-toolbelt 15 + , urllib3 16 + , vcrpy 17 + , websockets 18 + , yarl 19 + }: 20 + 21 + buildPythonPackage rec { 22 + pname = "gql"; 23 + version = "3.0.0rc0"; 24 + format = "setuptools"; 25 + 26 + disabled = pythonOlder "3.6"; 27 + 28 + src = fetchFromGitHub { 29 + owner = "graphql-python"; 30 + repo = pname; 31 + rev = "v${version}"; 32 + hash = "sha256-yr1DyMj/0C9XPTyGdbQbn7nMRKr4JwItFDsqvl/goqU="; 33 + }; 34 + 35 + propagatedBuildInputs = [ 36 + aiohttp 37 + botocore 38 + graphql-core 39 + requests 40 + requests-toolbelt 41 + urllib3 42 + websockets 43 + yarl 44 + ]; 45 + 46 + checkInputs = [ 47 + aiofiles 48 + mock 49 + parse 50 + pytest-asyncio 51 + pytestCheckHook 52 + vcrpy 53 + ]; 54 + 55 + disabledTests = [ 56 + # Tests requires network access 57 + "test_execute_result_error" 58 + "test_http_transport" 59 + ]; 60 + 61 + disabledTestPaths = [ 62 + # Exclude linter tests 63 + "gql-checker/tests/test_flake8_linter.py" 64 + "gql-checker/tests/test_pylama_linter.py" 65 + ]; 66 + 67 + pythonImportsCheck = [ 68 + "gql" 69 + ]; 70 + 71 + meta = with lib; { 72 + description = "GraphQL client in Python"; 73 + homepage = "https://github.com/graphql-python/gql"; 74 + license = with licenses; [ mit ]; 75 + maintainers = with maintainers; [ fab ]; 76 + }; 77 + }
+16 -15
pkgs/development/python-modules/gradient-utils/default.nix
··· 7 7 , poetry-core 8 8 , prometheus-client 9 9 , pytestCheckHook 10 + , pythonOlder 10 11 , requests 11 12 }: 12 13 ··· 15 16 version = "0.5.0"; 16 17 format = "pyproject"; 17 18 19 + disabled = pythonOlder "3.6"; 20 + 18 21 src = fetchFromGitHub { 19 22 owner = "Paperspace"; 20 23 repo = pname; ··· 22 25 sha256 = "19plkgwwfs6298vjplgsvhirixi3jbngq5y07x9c0fjxk39fa2dk"; 23 26 }; 24 27 25 - postPatch = '' 26 - substituteInPlace pyproject.toml \ 27 - --replace 'numpy = "1.18.5"' 'numpy = "^1.18.5"' \ 28 - --replace 'hyperopt = "0.1.2"' 'hyperopt = ">=0.1.2"' \ 29 - --replace 'wheel = "^0.35.1"' 'wheel = "*"' \ 30 - --replace 'prometheus-client = ">=0.8,<0.10"' 'prometheus-client = "*"' 31 - ''; 32 - 33 - nativeBuildInputs = [ poetry-core ]; 28 + nativeBuildInputs = [ 29 + poetry-core 30 + ]; 34 31 35 32 propagatedBuildInputs = [ 36 33 hyperopt ··· 44 41 pytestCheckHook 45 42 ]; 46 43 44 + postPatch = '' 45 + substituteInPlace pyproject.toml \ 46 + --replace 'wheel = "^0.35.1"' 'wheel = "*"' \ 47 + --replace 'prometheus-client = ">=0.8,<0.10"' 'prometheus-client = "*"' 48 + ''; 49 + 47 50 preCheck = '' 48 51 export HOSTNAME=myhost-experimentId 49 52 ''; 50 53 51 - disabledTests = [ 52 - "test_add_metrics_pushes_metrics" # requires a working prometheus push gateway 53 - ]; 54 - 55 54 disabledTestPaths = [ 56 - # needs network access 55 + # Requires a working Prometheus push gateway 57 56 "tests/integration/test_metrics.py" 58 57 ]; 59 58 60 - pythonImportsCheck = [ "gradient_utils" ]; 59 + pythonImportsCheck = [ 60 + "gradient_utils" 61 + ]; 61 62 62 63 meta = with lib; { 63 64 description = "Python utils and helpers library for Gradient";
+13 -6
pkgs/development/python-modules/gradient/default.nix
··· 9 9 , fetchPypi 10 10 , gradient_statsd 11 11 , gradient-utils 12 + , gql 12 13 , halo 13 14 , marshmallow 14 15 , progressbar2 ··· 22 23 23 24 buildPythonPackage rec { 24 25 pname = "gradient"; 25 - version = "1.9.0"; 26 + version = "1.9.1"; 27 + format = "setuptools"; 26 28 27 29 src = fetchPypi { 28 30 inherit pname version; 29 - sha256 = "47be02511d7ea66a13559598851cb435d435fb3f7676f6de17292d06daad8947"; 31 + hash = "sha256-zimOh4bc9EQGpqMky/etwnAF04onJ2m/KAl29IaAeAY="; 30 32 }; 31 33 32 34 postPatch = '' 33 35 substituteInPlace setup.py \ 34 36 --replace 'attrs<=' 'attrs>=' \ 35 37 --replace 'colorama==' 'colorama>=' \ 38 + --replace 'gql[requests]==3.0.0a6' 'gql' \ 36 39 --replace 'PyYAML==' 'PyYAML>=' \ 37 40 --replace 'marshmallow<' 'marshmallow>=' \ 38 41 --replace 'websocket-client==' 'websocket-client>=' ··· 45 48 click-didyoumean 46 49 click-help-colors 47 50 colorama 51 + gql 48 52 gradient_statsd 49 53 gradient-utils 50 54 halo ··· 58 62 websocket-client 59 63 ]; 60 64 61 - # tries to use /homeless-shelter to mimic container usage, etc 65 + # Tries to use /homeless-shelter to mimic container usage, etc 62 66 doCheck = false; 63 67 68 + # marshmallow.exceptions.StringNotCollectionError: "only" should be a collection of strings. 69 + # Support for marshmallow > 3 70 + # pythonImportsCheck = [ 71 + # "gradient" 72 + # ]; 73 + 64 74 meta = with lib; { 65 75 description = "The command line interface for Gradient"; 66 76 homepage = "https://github.com/Paperspace/gradient-cli"; 67 77 license = licenses.isc; 68 78 platforms = platforms.unix; 69 79 maintainers = with maintainers; [ thoughtpolice ]; 70 - # There is no support for click > 8 71 - # https://github.com/Paperspace/gradient-cli/issues/368 72 - broken = true; 73 80 }; 74 81 }
+2 -2
pkgs/development/python-modules/hahomematic/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "hahomematic"; 16 - version = "0.14.0"; 16 + version = "0.15.0"; 17 17 format = "setuptools"; 18 18 19 19 disabled = pythonOlder "3.9"; ··· 22 22 owner = "danielperna84"; 23 23 repo = pname; 24 24 rev = version; 25 - sha256 = "sha256-Olwol/DhsVJznxpiMB57zkPuco0RBxMy8cfzSQMZZrU="; 25 + sha256 = "sha256-jTUMnBtV0wVFWe+4MWOAvFDLvminM0gVTm0hkBOvnH8="; 26 26 }; 27 27 28 28 propagatedBuildInputs = [
+20 -8
pkgs/development/python-modules/jupyterlab/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "jupyterlab"; 13 - version = "3.2.5"; 14 - disabled = pythonOlder "3.5"; 13 + version = "3.2.6"; 14 + format = "setuptools"; 15 + 16 + disabled = pythonOlder "3.7"; 15 17 16 18 src = fetchPypi { 17 19 inherit pname version; 18 - sha256 = "31b28f473b0f5826d2020583973c385526f0559b5b26efac6b8035ac1562874a"; 20 + sha256 = "04e763974010f0f424ee889238fa488ee11708d0546e6df6e2cad9e0fc724bdb"; 19 21 }; 20 22 21 - nativeBuildInputs = [ jupyter-packaging ]; 23 + nativeBuildInputs = [ 24 + jupyter-packaging 25 + ]; 22 26 23 - propagatedBuildInputs = [ jupyterlab_server notebook nbclassic ]; 27 + propagatedBuildInputs = [ 28 + jupyterlab_server 29 + notebook 30 + nbclassic 31 + ]; 24 32 25 33 makeWrapperArgs = [ 26 - "--set" "JUPYTERLAB_DIR" "$out/share/jupyter/lab" 34 + "--set" 35 + "JUPYTERLAB_DIR" 36 + "$out/share/jupyter/lab" 27 37 ]; 28 38 29 39 # Depends on npm 30 40 doCheck = false; 31 41 32 - pythonImportsCheck = [ "jupyterlab" ]; 42 + pythonImportsCheck = [ 43 + "jupyterlab" 44 + ]; 33 45 34 46 meta = with lib; { 35 - description = "Jupyter lab environment notebook server extension."; 47 + description = "Jupyter lab environment notebook server extension"; 36 48 license = with licenses; [ bsd3 ]; 37 49 homepage = "https://jupyter.org/"; 38 50 maintainers = with maintainers; [ zimbatm costrouc ];
+2 -2
pkgs/development/python-modules/makefun/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "makefun"; 10 - version = "1.13.0"; 10 + version = "1.13.1"; 11 11 12 12 src = fetchPypi { 13 13 inherit pname version; 14 - sha256 = "2c673d2b4f0ef809347513cb45e3b23a04228588af7c9ac859e99247abac516a"; 14 + sha256 = "985bb8b670ffbbb95d2a8aa996d318e6e9a3f26fc6f3ef2da93ebdf8f9c616bf"; 15 15 }; 16 16 17 17 postPatch = ''
+20 -11
pkgs/development/python-modules/oauthlib/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchFromGitHub 4 - , mock 5 - , pytest 6 - , cryptography 4 + 5 + # propagates 7 6 , blinker 7 + , cryptography 8 8 , pyjwt 9 + 10 + # test 11 + , mock 12 + , pytestCheckHook 9 13 }: 10 14 11 15 buildPythonPackage rec { 12 16 pname = "oauthlib"; 13 - version = "unstable-2020-05-08"; 17 + version = "3.1.1"; 18 + format = "setuptools"; 14 19 15 20 # master supports pyjwt==1.7.1 16 21 src = fetchFromGitHub { 17 22 owner = pname; 18 23 repo = pname; 19 - rev = "46647402896db5f0d979eba9594623e889739060"; 20 - sha256 = "1wrdjdvlfcd74lckcgascnasrffg8sip0z673si4ag5kv4afiz3l"; 24 + rev = "v${version}"; 25 + hash = "sha256:1bgxpzh11i0x7h9py3a29cz5z714b3p498b62znnn5ciy0cr80sv"; 21 26 }; 22 27 23 - checkInputs = [ mock pytest ]; 24 - propagatedBuildInputs = [ cryptography blinker pyjwt ]; 28 + propagatedBuildInputs = [ 29 + blinker 30 + cryptography 31 + pyjwt 32 + ]; 25 33 26 - checkPhase = '' 27 - py.test tests/ 28 - ''; 34 + checkInputs = [ 35 + mock 36 + pytestCheckHook 37 + ]; 29 38 30 39 meta = with lib; { 31 40 homepage = "https://github.com/idan/oauthlib";
+24 -8
pkgs/development/python-modules/pixelmatch/default.nix
··· 1 - { lib, buildPythonPackage, fetchgit, poetry-core, pytestCheckHook, pytest-benchmark, pytest-mypy, pillow }: 1 + { lib 2 + , buildPythonPackage 3 + , fetchgit 4 + , pillow 5 + , poetry-core 6 + , pytest-benchmark 7 + , pytest-mypy 8 + , pytestCheckHook 9 + , pythonOlder 10 + }: 2 11 3 12 buildPythonPackage rec { 4 13 pname = "pixelmatch"; 5 - version = "0.2.2"; 14 + version = "0.2.3"; 6 15 format = "pyproject"; 7 16 8 - # test fixtures are stored in LFS 17 + disabled = pythonOlder "3.6"; 18 + 19 + # Test fixtures are stored in LFS 9 20 src = fetchgit { 10 21 url = "https://github.com/whtsky/pixelmatch-py"; 11 22 rev = "v${version}"; 12 - sha256 = "1dsix507dxqik9wvgzscvf2pifbg7gx74krrsalqbfcmm7d1i7xl"; 23 + hash = "sha256-/zRQhwz+HjT0Hs4CunsqHxHWEtoIH9qMBowRb0Pps6Y="; 13 24 fetchLFS = true; 14 25 }; 15 26 ··· 18 29 ]; 19 30 20 31 checkInputs = [ 21 - pytestCheckHook 32 + pillow 22 33 pytest-benchmark 23 34 pytest-mypy 24 - pillow 35 + pytestCheckHook 25 36 ]; 26 37 27 38 pytestFlagsArray = [ 28 - "--mypy" 39 + # Incompatible types in assignment 40 + #"--mypy" 29 41 "--benchmark-disable" 30 42 ]; 31 43 44 + pythonImportsCheck = [ 45 + "pixelmatch" 46 + ]; 47 + 32 48 meta = with lib; { 33 - description = "A pixel-level image comparison library."; 49 + description = "Pixel-level image comparison library"; 34 50 homepage = "https://github.com/whtsky/pixelmatch-py"; 35 51 license = licenses.isc; 36 52 maintainers = with maintainers; [ petabyteboy ];
+17 -9
pkgs/development/python-modules/ppscore/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchFromGitHub 4 - , isPy27 5 4 , pandas 6 - , scikit-learn 7 5 , pytestCheckHook 6 + , pythonOlder 7 + , scikit-learn 8 8 }: 9 9 10 10 buildPythonPackage rec { 11 11 pname = "ppscore"; 12 - version = "1.1.1"; 13 - disabled = isPy27; 12 + version = "unstable-2021-11-25"; 13 + format = "setuptools"; 14 + 15 + disabled = pythonOlder "3.6"; 14 16 15 17 src = fetchFromGitHub { 16 18 owner = "8080labs"; 17 19 repo = pname; 18 - rev = version; 19 - sha256 = "11y6axhj0nlagf7ax6gas1g06krrmddb1jlmf0mmrmyi7z0vldk2"; 20 + rev = "c9268c16b6305c5c38e2fe2fd84f43d97ec1aaca"; 21 + hash = "sha256-qiogjUgcLFauAMpVf2CKNC27c9xR9q7nY69n8/go1ms="; 20 22 }; 21 - 22 - checkInputs = [ pytestCheckHook ]; 23 23 24 24 propagatedBuildInputs = [ 25 25 pandas 26 26 scikit-learn 27 27 ]; 28 28 29 + checkInputs = [ 30 + pytestCheckHook 31 + ]; 32 + 33 + pythonImportsCheck = [ 34 + "ppscore" 35 + ]; 36 + 29 37 meta = with lib; { 30 - description = "A Python implementation of the Predictive Power Score (PPS)"; 38 + description = "Python implementation of the Predictive Power Score (PPS)"; 31 39 homepage = "https://github.com/8080labs/ppscore/"; 32 40 license = licenses.mit; 33 41 maintainers = with maintainers; [ evax ];
+24 -13
pkgs/development/python-modules/pydub/default.nix
··· 1 - { lib, stdenv, buildPythonPackage, fetchFromGitHub, scipy, ffmpeg-full }: 1 + { lib 2 + , stdenv 3 + , buildPythonPackage 4 + , fetchFromGitHub 5 + 6 + # tests 7 + , ffmpeg-full 8 + , python 9 + }: 2 10 3 11 buildPythonPackage rec { 4 12 pname = "pydub"; 5 13 version = "0.25.1"; 14 + format = "setuptools"; 15 + 6 16 # pypi version doesn't include required data files for tests 7 17 src = fetchFromGitHub { 8 18 owner = "jiaaro"; ··· 11 21 sha256 = "0xskllq66wqndjfmvp58k26cv3w480sqsil6ifwp4gghir7hqc8m"; 12 22 }; 13 23 24 + pythonImportsCheck = [ 25 + "pydub" 26 + "pydub.audio_segment" 27 + "pydub.playback" 28 + ]; 14 29 15 - # disable a test that fails on aarch64 due to rounding errors 16 - postPatch = lib.optionalString stdenv.isAarch64 '' 17 - substituteInPlace test/test.py \ 18 - --replace "test_overlay_with_gain_change" "notest_overlay_with_gain_change" 19 - ''; 20 - 21 - checkInputs = [ scipy ffmpeg-full ]; 30 + checkInputs = [ 31 + ffmpeg-full 32 + ]; 22 33 23 34 checkPhase = '' 24 - python test/test.py 35 + ${python.interpreter} test/test.py 25 36 ''; 26 37 27 38 meta = with lib; { 28 - description = "Manipulate audio with a simple and easy high level interface."; 29 - homepage = "http://pydub.com/"; 30 - license = licenses.mit; 31 - platforms = platforms.all; 39 + description = "Manipulate audio with a simple and easy high level interface"; 40 + homepage = "http://pydub.com"; 41 + license = licenses.mit; 42 + maintainers = with maintainers; [ hexa ]; 32 43 }; 33 44 }
+2 -2
pkgs/development/python-modules/pykeyatome/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "pykeyatome"; 16 - version = "1.3.0"; 16 + version = "1.3.1"; 17 17 format = "setuptools"; 18 18 19 19 disabled = pythonOlder "3.8"; ··· 22 22 owner = "jugla"; 23 23 repo = "pyKeyAtome"; 24 24 rev = "V${version}"; 25 - sha256 = "1brcfgqj0bana6yii4083kppz822fgk9xf4mg141b0zfvx2gyjw9"; 25 + sha256 = "1lvwxcr2ay8h5sr4lmjgs7xgszl1q8ciaqdn6cmrlra27jssl5ax"; 26 26 }; 27 27 28 28 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/pylgnetcast/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "pylgnetcast"; 10 - version = "0.3.5"; 10 + version = "0.3.7"; 11 11 format = "setuptools"; 12 12 13 13 disabled = pythonOlder "3.6"; ··· 16 16 owner = "Drafteed"; 17 17 repo = "python-lgnetcast"; 18 18 rev = "v${version}"; 19 - sha256 = "11g7ya4ppqxjiv3fkz9mi6h1afw9icy6xyn4jzm63kjvxqhrwnw4"; 19 + sha256 = "0pmz52k2sfxj5x2wcwdjks2lqh1gb5zfrjgc6xij8jal4l9xd2dz"; 20 20 }; 21 21 22 22 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/pynetbox/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "pynetbox"; 13 - version = "6.4.1"; 13 + version = "6.5.0"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "netbox-community"; 17 17 repo = pname; 18 18 rev = "v${version}"; 19 - sha256 = "08k2zxfz23gzbk49r3hmh6r3m5rgx1gk7w83qxi1v4gbm4wr0v9m"; 19 + sha256 = "1fk64bi7aswsmfqsciamml2wydgfg464h6i7479xfim4mwmkkik4"; 20 20 }; 21 21 22 22 SETUPTOOLS_SCM_PRETEND_VERSION = version;
+2 -2
pkgs/development/python-modules/pytest-cases/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "pytest-cases"; 13 - version = "3.6.7"; 13 + version = "3.6.8"; 14 14 format = "setuptools"; 15 15 16 16 disabled = pythonOlder "3.6"; 17 17 18 18 src = fetchPypi { 19 19 inherit pname version; 20 - sha256 = "sha256-ZUAXmIww/tdm7nDAj2VDXq0B6raHeDX1ywxnnv3EVIE="; 20 + sha256 = "d423e87b30e1080cc162d86c72bfa35861cccfe3539125e81c68ba142ab974bc"; 21 21 }; 22 22 23 23 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/types-decorator/default.nix
··· 5 5 6 6 buildPythonPackage rec { 7 7 pname = "types-decorator"; 8 - version = "5.1.2"; 8 + version = "5.1.3"; 9 9 format = "setuptools"; 10 10 11 11 src = fetchPypi { 12 12 inherit pname version; 13 - sha256 = "b3dd9027af1131b4e55ccd09248b7accc7a02d567139e2009ed20db13cf90600"; 13 + sha256 = "15d859bec0adca9edd948e94a5773c32710ee5dd4ad14ec983f08f979a821610"; 14 14 }; 15 15 16 16 # Modules doesn't have tests
+2 -2
pkgs/development/python-modules/types-protobuf/default.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "types-protobuf"; 9 - version = "3.18.3"; 9 + version = "3.18.4"; 10 10 format = "setuptools"; 11 11 12 12 src = fetchPypi { 13 13 inherit pname version; 14 - sha256 = "d3e253ebc1ba5e78932fef703dc4316afb7e5facd0ce8661b3921c9d541e16a7"; 14 + sha256 = "2aed45e5257e9adebce306637179bfa111d42ecdd523e2a13d30cf8b2ee3cc84"; 15 15 }; 16 16 17 17 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/types-requests/default.nix
··· 5 5 6 6 buildPythonPackage rec { 7 7 pname = "types-requests"; 8 - version = "2.27.0"; 8 + version = "2.27.2"; 9 9 format = "setuptools"; 10 10 11 11 src = fetchPypi { 12 12 inherit pname version; 13 - sha256 = "sha256-vFztDc8GdOPx+d7XNM7p+kXFfPZEsInmLI+xLKKOshU="; 13 + sha256 = "c902c5433ad103053011c6ac036317ac6f6a8e8a6926fc470a8d2ef791236da7"; 14 14 }; 15 15 16 16 # Module doesn't have tests
+2 -2
pkgs/development/python-modules/types-toml/default.nix
··· 5 5 6 6 buildPythonPackage rec { 7 7 pname = "types-toml"; 8 - version = "0.10.1"; 8 + version = "0.10.2"; 9 9 format = "setuptools"; 10 10 11 11 src = fetchPypi { 12 12 inherit pname version; 13 - sha256 = "1jqh0vki1hccj391gnxpblim429sj56npgq2z749f8v9ay6qy7sw"; 13 + sha256 = "cd38b802e9c84c7a2e9b61e99a217e794bc01874586b292222e9764c6c7ca75c"; 14 14 }; 15 15 16 16 # Module doesn't have tests
+11 -5
pkgs/development/python-modules/urlextract/default.nix
··· 1 1 { lib 2 - , appdirs 3 2 , buildPythonPackage 4 3 , dnspython 5 4 , fetchPypi 6 5 , filelock 7 6 , idna 7 + , platformdirs 8 8 , pytestCheckHook 9 + , pythonOlder 9 10 , uritools 10 11 }: 11 12 12 13 buildPythonPackage rec { 13 14 pname = "urlextract"; 14 - version = "1.4.0"; 15 + version = "1.5.0"; 16 + format = "setuptools"; 17 + 18 + disabled = pythonOlder "3.7"; 15 19 16 20 src = fetchPypi { 17 21 inherit pname version; 18 - sha256 = "669f07192584b841b49ba8868fbd6b00e7ddc28367d36a3d8ca8c8e429420748"; 22 + hash = "sha256-QKXIQ9HXJTdY9W8NZ0jF6iekoUVl46kvJakW3cTB5B8="; 19 23 }; 20 24 21 25 propagatedBuildInputs = [ 22 - appdirs 23 26 filelock 24 27 idna 28 + platformdirs 25 29 uritools 26 30 ]; 27 31 ··· 39 43 "test_dns_cache_reuse" 40 44 ]; 41 45 42 - pythonImportsCheck = [ "urlextract" ]; 46 + pythonImportsCheck = [ 47 + "urlextract" 48 + ]; 43 49 44 50 meta = with lib; { 45 51 description = "Collects and extracts URLs from given text";
+8 -6
pkgs/development/tools/kubepug/default.nix
··· 1 - { lib, buildGoModule, fetchFromGitHub }: 1 + { lib, buildGo117Module, fetchFromGitHub }: 2 2 3 - buildGoModule rec { 3 + buildGo117Module rec { 4 4 pname = "kubepug"; 5 - version = "1.2.2"; 5 + version = "1.3.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "rikatz"; 9 9 repo = "kubepug"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-jQ/LzwxYxfCKiu+2VhjQ3YWwLEqZkYrH7+olBOMUA1A="; 11 + sha256 = "sha256-cjL718xTgtYev/lYL24vwZcB+joY3wIY4ixRCwAHQ4E="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-P5HoU9AAGFrSrp9iymjW+r8w5L90KUOrmaXM8p+Wn44="; 14 + vendorSha256 = "0hynxj3q4aa1gx3w4ak56z6j5iplxi2hzqzsjkgz20fy34nfd41s"; 15 15 16 16 ldflags = [ 17 17 "-s" "-w" "-X=github.com/rikatz/kubepug/version.Version=${src.rev}" 18 18 ]; 19 19 20 - subPackages = [ "cmd/kubepug.go" ]; 20 + patches = [ 21 + ./skip-external-network-tests.patch 22 + ]; 21 23 22 24 meta = with lib; { 23 25 description = "Checks a Kubernetes cluster for objects using deprecated API versions";
+12
pkgs/development/tools/kubepug/skip-external-network-tests.patch
··· 1 + diff --git a/pkg/utils/downloader_test.go b/pkg/utils/downloader_test.go 2 + index b227760..b72dee9 100644 3 + --- a/pkg/utils/downloader_test.go 4 + +++ b/pkg/utils/downloader_test.go 5 + @@ -7,6 +7,7 @@ import ( 6 + ) 7 + 8 + func TestDownloadSwaggerFile(t *testing.T) { 9 + + t.Skipf("Nix sandbox does not have networking") 10 + var tmpdir string 11 + // Github actions does not have a temporary dir :/ 12 + tmpdir = os.Getenv("RUNNER_TEMP")
+3 -3
pkgs/development/tools/rust/cargo-llvm-lines/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "cargo-llvm-lines"; 5 - version = "0.4.12"; 5 + version = "0.4.13"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "dtolnay"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "sha256-D4blt8kGD0mxysedRMZo/VNfwfYdJs8T2zoNjHRi0ng="; 11 + sha256 = "sha256-sN0i2oo0XuxneIK/w+jpxkcdm2rtqhyH2Y3CMPnH+ro="; 12 12 }; 13 13 14 - cargoSha256 = "sha256-H2APBu9oHmtRGSB+VQT9V5C36awPy8fi6A2Qf1RsIbU="; 14 + cargoSha256 = "sha256-Gv7C4NFThNawhT+IYO0ZbpOh6w/yPeIJKZjzTyM/GJw="; 15 15 16 16 meta = with lib; { 17 17 description = "Count the number of lines of LLVM IR across all instantiations of a generic function";
+20
pkgs/misc/uboot/default.nix
··· 352 352 filesToInstall = ["u-boot.bin"]; 353 353 }; 354 354 355 + ubootQemuX86 = buildUBoot { 356 + defconfig = "qemu-x86_defconfig"; 357 + extraConfig = '' 358 + CONFIG_USB_UHCI_HCD=y 359 + CONFIG_USB_EHCI_HCD=y 360 + CONFIG_USB_EHCI_GENERIC=y 361 + CONFIG_USB_XHCI_HCD=y 362 + ''; 363 + extraPatches = [ 364 + # https://patchwork.ozlabs.org/project/uboot/list/?series=268007&state=%2A&archive=both 365 + # Remove when upgrading to 2022.01 366 + (fetchpatch { 367 + url = "https://patchwork.ozlabs.org/series/268007/mbox/"; 368 + sha256 = "sha256-xn4Q959dgoB63zlmJepI41AXAf1kCycIGcmu4IIVjmE="; 369 + }) 370 + ]; 371 + extraMeta.platforms = [ "i686-linux" "x86_64-linux" ]; 372 + filesToInstall = [ "u-boot.rom" ]; 373 + }; 374 + 355 375 ubootRaspberryPi = buildUBoot { 356 376 defconfig = "rpi_defconfig"; 357 377 extraMeta.platforms = ["armv6l-linux"];
+9 -4
pkgs/misc/vscode-extensions/default.nix
··· 1285 1285 mktplcRef = { 1286 1286 name = "color-highlight"; 1287 1287 publisher = "naumovs"; 1288 - version = "2.3.0"; 1289 - sha256 = "1syzf43ws343z911fnhrlbzbx70gdn930q67yqkf6g0mj8lf2za2"; 1288 + version = "2.5.0"; 1289 + sha256 = "sha256-dYMDV84LEGXUjt/fbsSy3BVM5SsBHcPaDDll8KjPIWY="; 1290 1290 }; 1291 - meta = { 1292 - license = lib.licenses.mit; 1291 + meta = with lib; { 1292 + changelog = "https://marketplace.visualstudio.com/items/naumovs.color-highlight/changelog"; 1293 + description = "Highlight web colors in your editor"; 1294 + downloadPage = "https://marketplace.visualstudio.com/items?itemName=naumovs.color-highlight"; 1295 + homepage = "https://github.com/enyancc/vscode-ext-color-highlight"; 1296 + license = licenses.gpl3Only; 1297 + maintainers = with maintainers; [ datafoo ]; 1293 1298 }; 1294 1299 }; 1295 1300
+2 -2
pkgs/misc/vscode-extensions/terraform/default.nix
··· 3 3 mktplcRef = { 4 4 name = "terraform"; 5 5 publisher = "hashicorp"; 6 - version = "2.17.0"; 7 - sha256 = "sha256-IZlw1lYibbBw3rcSiWEKP8rObxnMCE1ppogwmigNgwE="; 6 + version = "2.18.0"; 7 + sha256 = "sha256-jQ4fwsAwuGDbfSb/qCV58ETtH+2e7zD/jGISGNYPxZk="; 8 8 }; 9 9 10 10 patches = [ ./fix-terraform-ls.patch ];
+15 -15
pkgs/os-specific/linux/kernel/hardened/patches.json
··· 2 2 "4.14": { 3 3 "patch": { 4 4 "extra": "-hardened1", 5 - "name": "linux-hardened-4.14.260-hardened1.patch", 6 - "sha256": "13r6lx3rcbaz2wvhwa950gsjharzq1n61bl9l3nm8v66j7gab3l0", 7 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.14.260-hardened1/linux-hardened-4.14.260-hardened1.patch" 5 + "name": "linux-hardened-4.14.261-hardened1.patch", 6 + "sha256": "0m5bb9lpaxw1kq01s9hqsxkmmsyj4ag8s5swrgdca1cf6q84r7bb", 7 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.14.261-hardened1/linux-hardened-4.14.261-hardened1.patch" 8 8 }, 9 - "sha256": "1bylxn6hsq17cann2w02ggz6xz3b3synrapcwlwfcfydf71hzj9f", 10 - "version": "4.14.260" 9 + "sha256": "08s7idxpsjb29ccj0gkrj87xhbdqj9nc417qc7gd2kmbjd6amymz", 10 + "version": "4.14.261" 11 11 }, 12 12 "4.19": { 13 13 "patch": { 14 14 "extra": "-hardened1", 15 - "name": "linux-hardened-4.19.223-hardened1.patch", 16 - "sha256": "1jrg8fkb8kc3m1zcgyw99mnmgvyxi3yp33x9jh1s4babxcr7w4g3", 17 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.19.223-hardened1/linux-hardened-4.19.223-hardened1.patch" 15 + "name": "linux-hardened-4.19.224-hardened1.patch", 16 + "sha256": "0sma7hwznyf8h3fr7r63nbfb85120nz8xq95ynp6m0lxayj5alxs", 17 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.19.224-hardened1/linux-hardened-4.19.224-hardened1.patch" 18 18 }, 19 - "sha256": "1cnjk49g8sxsbzk375ji47lnx36drqh1x2pbfiqdwgrbjcb043sz", 20 - "version": "4.19.223" 19 + "sha256": "0c8h457n52qzpw4kgr16ndhsl35si99amc6fadb31fy32csgrk01", 20 + "version": "4.19.224" 21 21 }, 22 22 "5.10": { 23 23 "patch": { ··· 42 42 "5.4": { 43 43 "patch": { 44 44 "extra": "-hardened1", 45 - "name": "linux-hardened-5.4.169-hardened1.patch", 46 - "sha256": "19mghwh66rmbjd7i0hxhysabarpz8l4wadw8schwc8q9kxy33py4", 47 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.169-hardened1/linux-hardened-5.4.169-hardened1.patch" 45 + "name": "linux-hardened-5.4.170-hardened1.patch", 46 + "sha256": "0sy1114vw8lrbf4a1p3skg67am1f9bvl15d81mplx2bd98cpx0y8", 47 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.170-hardened1/linux-hardened-5.4.170-hardened1.patch" 48 48 }, 49 - "sha256": "068sw1p50vcygi422bfjpahf2fxy3ifyp4ljnkwxbbvibzcq4hsm", 50 - "version": "5.4.169" 49 + "sha256": "0b1qdmp2q0lpngfvvnwb248cnqn9akk2z4xawrfwziszrzh797xh", 50 + "version": "5.4.170" 51 51 } 52 52 }
+2 -2
pkgs/os-specific/linux/kernel/linux-4.14.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "4.14.260"; 6 + version = "4.14.261"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz"; 16 - sha256 = "1bylxn6hsq17cann2w02ggz6xz3b3synrapcwlwfcfydf71hzj9f"; 16 + sha256 = "08s7idxpsjb29ccj0gkrj87xhbdqj9nc417qc7gd2kmbjd6amymz"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-4.19.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "4.19.223"; 6 + version = "4.19.224"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz"; 16 - sha256 = "1cnjk49g8sxsbzk375ji47lnx36drqh1x2pbfiqdwgrbjcb043sz"; 16 + sha256 = "0c8h457n52qzpw4kgr16ndhsl35si99amc6fadb31fy32csgrk01"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-4.4.nix
··· 1 1 { buildPackages, fetchurl, perl, buildLinux, nixosTests, stdenv, ... } @ args: 2 2 3 3 buildLinux (args // rec { 4 - version = "4.4.297"; 4 + version = "4.4.298"; 5 5 extraMeta.branch = "4.4"; 6 6 extraMeta.broken = stdenv.isAarch64; 7 7 8 8 src = fetchurl { 9 9 url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz"; 10 - sha256 = "116346nkbhaz8jc1118gh40y6pw1kq7c7hm74f8bjga1p0gjqn0c"; 10 + sha256 = "1q56ch8p53in5rl5i7mvsyf0jimchrh48w3l416x3yi0n5cyvjc6"; 11 11 }; 12 12 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-4.9.nix
··· 1 1 { buildPackages, fetchurl, perl, buildLinux, nixosTests, stdenv, ... } @ args: 2 2 3 3 buildLinux (args // rec { 4 - version = "4.9.295"; 4 + version = "4.9.296"; 5 5 extraMeta.branch = "4.9"; 6 6 extraMeta.broken = stdenv.isAarch64; 7 7 8 8 src = fetchurl { 9 9 url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz"; 10 - sha256 = "095am71hl7qryrcn1blvxsq5zsy0gixmj7062p7vvz5ypcvqcd52"; 10 + sha256 = "1a5ws21dk5wp397zmd7msl4zbhzm2xxgbxd09wrdcwilpv4dnjzx"; 11 11 }; 12 12 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.10.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "5.10.89"; 6 + version = "5.10.90"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "0c5v8fsv9sazdmdw4m1canm54x2p8777yavxq2gcpw8q98d8n8cj"; 16 + sha256 = "0997ijkmvf9iz4hn8m8naiagphhyvl4r6qx4q3gxk8qlq1j44pll"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.15.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "5.15.12"; 6 + version = "5.15.13"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "182iwy2288layl2290cxla0k6y436lxlx43yaa8par325dviksbx"; 16 + sha256 = "0shmrx33crnhi0wr5v6ly85pza1mmdcm8arkrdzf6plz5xm1n4qa"; 17 17 }; 18 18 } // (args.argsOverride or { }))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.4.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "5.4.169"; 6 + version = "5.4.170"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "068sw1p50vcygi422bfjpahf2fxy3ifyp4ljnkwxbbvibzcq4hsm"; 16 + sha256 = "0b1qdmp2q0lpngfvvnwb248cnqn9akk2z4xawrfwziszrzh797xh"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+3 -3
pkgs/os-specific/linux/kernel/linux-rt-5.10.nix
··· 6 6 , ... } @ args: 7 7 8 8 let 9 - version = "5.10.87-rt59"; # updated by ./update-rt.sh 9 + version = "5.10.90-rt60"; # updated by ./update-rt.sh 10 10 branch = lib.versions.majorMinor version; 11 11 kversion = builtins.elemAt (lib.splitString "-" version) 0; 12 12 in buildLinux (args // { ··· 18 18 19 19 src = fetchurl { 20 20 url = "mirror://kernel/linux/kernel/v5.x/linux-${kversion}.tar.xz"; 21 - sha256 = "0jz6xhph7x0x11cjmypaw5gh8z4d53dcgx2gmg7k6d06ydq8n4h3"; 21 + sha256 = "0997ijkmvf9iz4hn8m8naiagphhyvl4r6qx4q3gxk8qlq1j44pll"; 22 22 }; 23 23 24 24 kernelPatches = let rt-patch = { 25 25 name = "rt"; 26 26 patch = fetchurl { 27 27 url = "mirror://kernel/linux/kernel/projects/rt/${branch}/older/patch-${version}.patch.xz"; 28 - sha256 = "04sr3n3ilvqq0dl59l92qmn3p7fjlsxxvbs3qls7b4pncb2xyyj3"; 28 + sha256 = "0533s01ckjjw45b08zs9nhpszdcrqgfpwvnjs2dfjmc6yg9d13pi"; 29 29 }; 30 30 }; in [ rt-patch ] ++ kernelPatches; 31 31
+1 -2
pkgs/os-specific/linux/nixos-rebuild/default.nix
··· 3 3 , coreutils 4 4 , gnused 5 5 , gnugrep 6 - , jq 7 6 , nix 8 7 , lib 9 8 }: ··· 19 18 nix_x86_64_linux = fallback.x86_64-linux; 20 19 nix_i686_linux = fallback.i686-linux; 21 20 nix_aarch64_linux = fallback.aarch64-linux; 22 - path = lib.makeBinPath [ coreutils jq gnused gnugrep ]; 21 + path = lib.makeBinPath [ coreutils gnused gnugrep ]; 23 22 }
-5
pkgs/os-specific/linux/nixos-rebuild/nixos-rebuild.sh
··· 343 343 fi 344 344 fi 345 345 346 - # Resolve the flake. 347 - if [[ -n $flake ]]; then 348 - flake=$(nix "${flakeFlags[@]}" flake metadata --json "${extraBuildFlags[@]}" "${lockFlags[@]}" -- "$flake" | jq -r .url) 349 - fi 350 - 351 346 # Find configuration.nix and open editor instead of building. 352 347 if [ "$action" = edit ]; then 353 348 if [[ -z $flake ]]; then
pkgs/servers/etcd/default.nix pkgs/servers/etcd/3.3.nix
+2 -2
pkgs/servers/web-apps/wordpress/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "wordpress"; 5 - version = "5.8.2"; 5 + version = "5.8.3"; 6 6 7 7 src = fetchurl { 8 8 url = "https://wordpress.org/${pname}-${version}.tar.gz"; 9 - sha256 = "sha256-o9KeTmZXTHtqa/Z2KOo1n6gVCFuna42dFrvf9OBC8v8="; 9 + sha256 = "sha256-1OuhoP+QRZrbdThI/npWbOchLR3MnrH7+lFRf5oVPaU="; 10 10 }; 11 11 12 12 installPhase = ''
+1 -1
pkgs/tools/misc/dialog/default.nix
··· 8 8 }: 9 9 10 10 assert withLibrary -> libtool != null; 11 - assert unicodeSupport -> ncurses.unicode && ncurses != null; 11 + assert unicodeSupport -> ncurses.unicodeSupport && ncurses != null; 12 12 13 13 stdenv.mkDerivation rec { 14 14 pname = "dialog";
+34 -16
pkgs/tools/misc/spigot/default.nix
··· 1 1 { lib 2 2 , stdenv 3 - , buildPackages 4 - , fetchgit 5 - , autoreconfHook 3 + , fetchurl 4 + , cmake 6 5 , gmp 6 + , halibut 7 7 , ncurses 8 - , halibut 9 8 , perl 10 9 }: 11 10 12 11 stdenv.mkDerivation rec { 13 12 pname = "spigot"; 14 - version = "20200901"; 15 - src = fetchgit { 16 - url = "https://git.tartarus.org/simon/spigot.git"; 17 - rev = "9910e5bdc203bae6b7bbe1ed4a93f13755c1cae"; 18 - sha256 = "1az6v9gk0g2k197lr288nmr9jv20bvgc508vn9ic3v7mav7hf5bf"; 13 + version = "20210527"; 14 + srcVersion = "20210527.7dd3cfd"; 15 + 16 + src = fetchurl { 17 + url = "https://www.chiark.greenend.org.uk/~sgtatham/spigot/${pname}-${srcVersion}.tar.gz"; 18 + hash = "sha256-EBS3lgfLtsyBQ8mzoJPyZhRBJNmkVSeF5XecGgcvqtw="; 19 19 }; 20 20 21 - nativeBuildInputs = [ autoreconfHook halibut perl ]; 21 + nativeBuildInputs = [ 22 + cmake 23 + halibut 24 + perl 25 + ]; 22 26 23 - configureFlags = [ "--with-gmp" ]; 27 + buildInputs = [ 28 + gmp 29 + ncurses 30 + ]; 24 31 25 - buildInputs = [ gmp ncurses ]; 32 + outputs = [ "out" "man" ]; 26 33 27 34 strictDeps = true; 28 35 36 + doInstallCheck = true; 37 + installCheckPhase = '' 38 + runHook preInstallCheck 39 + 40 + [ `$out/bin/spigot -b 10 -d 10 e` == "2.7182818284" ] || exit 1 41 + [ `$out/bin/spigot -b 10 -d 10 pi` == "3.1415926535" ] || exit 1 42 + [ `$out/bin/spigot -b 10 -d 10 sqrt\(2\)` == "1.4142135623" ] || exit 1 43 + 44 + runHook postInstallCheck 45 + ''; 46 + 29 47 meta = with lib; { 30 - description = "A command-line exact real calculator"; 31 48 homepage = "https://www.chiark.greenend.org.uk/~sgtatham/spigot/"; 32 - license = lib.licenses.mit; 33 - platforms = lib.platforms.all; 34 - maintainers = with maintainers; [ mcbeth ]; 49 + description = "A command-line exact real calculator"; 50 + license = licenses.mit; 51 + maintainers = with maintainers; [ AndersonTorres mcbeth ]; 52 + platforms = platforms.unix; 35 53 }; 36 54 }
+2 -2
pkgs/tools/security/exploitdb/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "exploitdb"; 5 - version = "2021-12-21"; 5 + version = "2022-01-06"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "offensive-security"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "sha256-HTs8dGDSYU/Ih/8CS+4C4AtERxQHwlmpfrA0YrrKoyY="; 11 + sha256 = "sha256-SvzrUVuOzqcc4YzBYxuE8S0tFNb2Pr2FEj8KSpuKKGU="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ makeWrapper ];
+3 -3
pkgs/tools/security/gitleaks/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "gitleaks"; 8 - version = "8.2.5"; 8 + version = "8.2.7"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "zricethezav"; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-lHKdIQyGbQt6PmMaTRIUx1q/81Q4KOfQ8zLnpt9aGbk="; 14 + sha256 = "sha256-kCKkPx0JEzmQn0y6UbVuwZXre7rDd4vKTudh6J3AxYA="; 15 15 }; 16 16 17 - vendorSha256 = "sha256-cIwte59AdVOWMBUWE4gKZSHhU37HgEW4k0v+jUUyj1Q="; 17 + vendorSha256 = "sha256-zJ9Xl4tRUWntQwco+EHzqmL1aVcOjp70LCCmRsboxQ4="; 18 18 19 19 ldflags = [ 20 20 "-s"
+1 -1
pkgs/tools/security/metasploit/Gemfile
··· 1 1 # frozen_string_literal: true 2 2 source "https://rubygems.org" 3 3 4 - gem "metasploit-framework", git: "https://github.com/rapid7/metasploit-framework", ref: "refs/tags/6.1.22" 4 + gem "metasploit-framework", git: "https://github.com/rapid7/metasploit-framework", ref: "refs/tags/6.1.23"
+21 -17
pkgs/tools/security/metasploit/Gemfile.lock
··· 1 1 GIT 2 2 remote: https://github.com/rapid7/metasploit-framework 3 - revision: 3bfd2d8eeab3f8ab7efd7a46f8125a7a3bb5f2f0 4 - ref: refs/tags/6.1.22 3 + revision: 7682d9ab9c404b55cfc4a221db22f74a740a6f7f 4 + ref: refs/tags/6.1.23 5 5 specs: 6 - metasploit-framework (6.1.22) 6 + metasploit-framework (6.1.23) 7 7 actionpack (~> 6.0) 8 8 activerecord (~> 6.0) 9 9 activesupport (~> 6.0) ··· 75 75 rex-text 76 76 rex-zip 77 77 ruby-macho 78 - ruby_smb (~> 2.0) 78 + ruby_smb (~> 3.0) 79 79 rubyntlm 80 80 rubyzip 81 81 sinatra ··· 128 128 arel-helpers (2.14.0) 129 129 activerecord (>= 3.1.0, < 8) 130 130 aws-eventstream (1.2.0) 131 - aws-partitions (1.543.0) 132 - aws-sdk-core (3.125.0) 131 + aws-partitions (1.547.0) 132 + aws-sdk-core (3.125.1) 133 133 aws-eventstream (~> 1, >= 1.0.2) 134 134 aws-partitions (~> 1, >= 1.525.0) 135 135 aws-sigv4 (~> 1.1) 136 136 jmespath (~> 1.0) 137 - aws-sdk-ec2 (1.288.0) 137 + aws-sdk-ec2 (1.290.0) 138 138 aws-sdk-core (~> 3, >= 3.125.0) 139 139 aws-sigv4 (~> 1.1) 140 140 aws-sdk-iam (1.65.0) ··· 143 143 aws-sdk-kms (1.53.0) 144 144 aws-sdk-core (~> 3, >= 3.125.0) 145 145 aws-sigv4 (~> 1.1) 146 - aws-sdk-s3 (1.110.0) 146 + aws-sdk-s3 (1.111.1) 147 147 aws-sdk-core (~> 3, >= 3.125.0) 148 148 aws-sdk-kms (~> 1) 149 149 aws-sigv4 (~> 1.4) ··· 175 175 eventmachine (1.2.7) 176 176 faker (2.19.0) 177 177 i18n (>= 1.6, < 2) 178 - faraday (1.8.0) 178 + faraday (1.9.3) 179 179 faraday-em_http (~> 1.0) 180 180 faraday-em_synchrony (~> 1.0) 181 181 faraday-excon (~> 1.1) 182 - faraday-httpclient (~> 1.0.1) 182 + faraday-httpclient (~> 1.0) 183 + faraday-multipart (~> 1.0) 183 184 faraday-net_http (~> 1.0) 184 - faraday-net_http_persistent (~> 1.1) 185 + faraday-net_http_persistent (~> 1.0) 185 186 faraday-patron (~> 1.0) 186 187 faraday-rack (~> 1.0) 187 - multipart-post (>= 1.2, < 3) 188 + faraday-retry (~> 1.0) 188 189 ruby2_keywords (>= 0.0.4) 189 190 faraday-em_http (1.0.0) 190 191 faraday-em_synchrony (1.0.0) 191 192 faraday-excon (1.1.0) 192 193 faraday-httpclient (1.0.1) 194 + faraday-multipart (1.0.2) 195 + multipart-post (>= 1.2, < 3) 193 196 faraday-net_http (1.0.1) 194 197 faraday-net_http_persistent (1.2.0) 195 198 faraday-patron (1.0.0) 196 199 faraday-rack (1.0.0) 200 + faraday-retry (1.0.3) 197 201 faye-websocket (0.11.1) 198 202 eventmachine (>= 0.12.0) 199 203 websocket-driver (>= 0.5.1) ··· 260 264 webrick 261 265 metasploit_payloads-mettle (1.0.17) 262 266 method_source (1.0.0) 263 - mini_portile2 (2.6.1) 267 + mini_portile2 (2.7.1) 264 268 minitest (5.15.0) 265 269 mqtt (0.5.0) 266 270 msgpack (1.4.2) ··· 274 278 network_interface (0.0.2) 275 279 nexpose (7.3.0) 276 280 nio4r (2.5.8) 277 - nokogiri (1.12.5) 278 - mini_portile2 (~> 2.6.1) 281 + nokogiri (1.13.0) 282 + mini_portile2 (~> 2.7.0) 279 283 racc (~> 1.4) 280 284 nori (2.6.0) 281 285 octokit (4.21.0) ··· 375 379 ruby-macho (2.5.1) 376 380 ruby-rc4 (0.1.5) 377 381 ruby2_keywords (0.0.5) 378 - ruby_smb (2.0.13) 382 + ruby_smb (3.0.0) 379 383 bindata 380 384 openssl-ccm 381 385 openssl-cmac ··· 400 404 daemons (~> 1.0, >= 1.0.9) 401 405 eventmachine (~> 1.0, >= 1.0.4) 402 406 rack (>= 1, < 3) 403 - thor (1.1.0) 407 + thor (1.2.1) 404 408 tilt (2.0.10) 405 409 ttfunk (1.7.0) 406 410 tzinfo (2.0.4)
+2 -2
pkgs/tools/security/metasploit/default.nix
··· 15 15 }; 16 16 in stdenv.mkDerivation rec { 17 17 pname = "metasploit-framework"; 18 - version = "6.1.22"; 18 + version = "6.1.23"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "rapid7"; 22 22 repo = "metasploit-framework"; 23 23 rev = version; 24 - sha256 = "sha256-D3OmkXEqOgDOf1fvMtWiFT4bLw38SNHp2A25xAkq7Ew="; 24 + sha256 = "sha256-um2WDbc7SHhbPSTamOTB0tRWl0tkkNGnY0lm+dU7iIA="; 25 25 }; 26 26 27 27 nativeBuildInputs = [ makeWrapper ];
+41 -21
pkgs/tools/security/metasploit/gemset.nix
··· 104 104 platforms = []; 105 105 source = { 106 106 remotes = ["https://rubygems.org"]; 107 - sha256 = "07ydbhiyncl0l1dwy09z8inf72x1k961qlcwwg62l4yacv0a74wq"; 107 + sha256 = "1fi4irlxam3bmvafm6iiqj0vlzqg10vc4bzznl4c5w6zmg0lzp6b"; 108 108 type = "gem"; 109 109 }; 110 - version = "1.543.0"; 110 + version = "1.547.0"; 111 111 }; 112 112 aws-sdk-core = { 113 113 groups = ["default"]; 114 114 platforms = []; 115 115 source = { 116 116 remotes = ["https://rubygems.org"]; 117 - sha256 = "06mkw688mrhz4j2d2ajzigr87041hxczy2w45j0iv1mnvs5yrhan"; 117 + sha256 = "17v517dkrazxs9n64c8qdkwhb5fj9flnc2lp99gph6307ciz47w1"; 118 118 type = "gem"; 119 119 }; 120 - version = "3.125.0"; 120 + version = "3.125.1"; 121 121 }; 122 122 aws-sdk-ec2 = { 123 123 groups = ["default"]; 124 124 platforms = []; 125 125 source = { 126 126 remotes = ["https://rubygems.org"]; 127 - sha256 = "0s67sgpv7b6asg3am157brsclq15p8r3fm2gc741zz546xfbfpm3"; 127 + sha256 = "147z6prv5cj5scnd3rpjqw0pvbj7yvp9b7lzl786c0jil1pvjm0p"; 128 128 type = "gem"; 129 129 }; 130 - version = "1.288.0"; 130 + version = "1.290.0"; 131 131 }; 132 132 aws-sdk-iam = { 133 133 groups = ["default"]; ··· 154 154 platforms = []; 155 155 source = { 156 156 remotes = ["https://rubygems.org"]; 157 - sha256 = "1587v0xh0hcrxn0ki0ahx70kkpny4pm32fj4bh7500wzvjki6d6v"; 157 + sha256 = "1pgh6zd07r9sfzkdz4bf6piq4n8gzl0f76h68l2zxchc1g9z4lqw"; 158 158 type = "gem"; 159 159 }; 160 - version = "1.110.0"; 160 + version = "1.111.1"; 161 161 }; 162 162 aws-sigv4 = { 163 163 groups = ["default"]; ··· 344 344 platforms = []; 345 345 source = { 346 346 remotes = ["https://rubygems.org"]; 347 - sha256 = "0afhlqgby2cizcwgh7h2sq5f77q01axjbdl25bsvfwsry9n7gyyi"; 347 + sha256 = "0y32gj994ll3zlcqjmwp78r7s03iiwayij6fz2pjpkfywgvp71s6"; 348 348 type = "gem"; 349 349 }; 350 - version = "1.8.0"; 350 + version = "1.9.3"; 351 351 }; 352 352 faraday-em_http = { 353 353 groups = ["default"]; ··· 389 389 }; 390 390 version = "1.0.1"; 391 391 }; 392 + faraday-multipart = { 393 + groups = ["default"]; 394 + platforms = []; 395 + source = { 396 + remotes = ["https://rubygems.org"]; 397 + sha256 = "0ih6nkjx4ph00iybicn0ssjkjnhnjd2xsl9g83lkg64w8q5s0i87"; 398 + type = "gem"; 399 + }; 400 + version = "1.0.2"; 401 + }; 392 402 faraday-net_http = { 393 403 groups = ["default"]; 394 404 platforms = []; ··· 429 439 }; 430 440 version = "1.0.0"; 431 441 }; 442 + faraday-retry = { 443 + groups = ["default"]; 444 + platforms = []; 445 + source = { 446 + remotes = ["https://rubygems.org"]; 447 + sha256 = "153i967yrwnswqgvnnajgwp981k9p50ys1h80yz3q94rygs59ldd"; 448 + type = "gem"; 449 + }; 450 + version = "1.0.3"; 451 + }; 432 452 faye-websocket = { 433 453 groups = ["default"]; 434 454 platforms = []; ··· 664 684 platforms = []; 665 685 source = { 666 686 fetchSubmodules = false; 667 - rev = "3bfd2d8eeab3f8ab7efd7a46f8125a7a3bb5f2f0"; 668 - sha256 = "0k7c584w9f8dv3lx2j7w1lpinghmlbak5vspgz700fiaf68scwqg"; 687 + rev = "7682d9ab9c404b55cfc4a221db22f74a740a6f7f"; 688 + sha256 = "10487gazjrj9cfkx34349fbmdm6jq7j9ini47mdphj1vnw6rcvds"; 669 689 type = "git"; 670 690 url = "https://github.com/rapid7/metasploit-framework"; 671 691 }; 672 - version = "6.1.22"; 692 + version = "6.1.23"; 673 693 }; 674 694 metasploit-model = { 675 695 groups = ["default"]; ··· 726 746 platforms = []; 727 747 source = { 728 748 remotes = ["https://rubygems.org"]; 729 - sha256 = "1lvxm91hi0pabnkkg47wh1siv56s6slm2mdq1idfm86dyfidfprq"; 749 + sha256 = "0d3ga166pahsxavzwj19yjj4lr13rw1vsb36s2qs8blcxigrdp6z"; 730 750 type = "gem"; 731 751 }; 732 - version = "2.6.1"; 752 + version = "2.7.1"; 733 753 }; 734 754 minitest = { 735 755 groups = ["default"]; ··· 857 877 platforms = []; 858 878 source = { 859 879 remotes = ["https://rubygems.org"]; 860 - sha256 = "1v02g7k7cxiwdcahvlxrmizn3avj2q6nsjccgilq1idc89cr081b"; 880 + sha256 = "1cvx23d8z1nf5nsr5cv55m5dhr3f1bnvgdfqqfnjvhcd8cfnkgcd"; 861 881 type = "gem"; 862 882 }; 863 - version = "1.12.5"; 883 + version = "1.13.0"; 864 884 }; 865 885 nori = { 866 886 groups = ["default"]; ··· 1337 1357 platforms = []; 1338 1358 source = { 1339 1359 remotes = ["https://rubygems.org"]; 1340 - sha256 = "1bjsh4qi6ii4zl0g0na004ylk991ar9rg5kz9rq1q7r5crxy2rw7"; 1360 + sha256 = "1klfrp56qid5fr1kzsi62bkhpp2yn6pbv0yg4ikf0lgzg5nq781w"; 1341 1361 type = "gem"; 1342 1362 }; 1343 - version = "2.0.13"; 1363 + version = "3.0.0"; 1344 1364 }; 1345 1365 rubyntlm = { 1346 1366 groups = ["default"]; ··· 1437 1457 platforms = []; 1438 1458 source = { 1439 1459 remotes = ["https://rubygems.org"]; 1440 - sha256 = "18yhlvmfya23cs3pvhr1qy38y41b6mhr5q9vwv5lrgk16wmf3jna"; 1460 + sha256 = "0inl77jh4ia03jw3iqm5ipr76ghal3hyjrd6r8zqsswwvi9j2xdi"; 1441 1461 type = "gem"; 1442 1462 }; 1443 - version = "1.1.0"; 1463 + version = "1.2.1"; 1444 1464 }; 1445 1465 tilt = { 1446 1466 groups = ["default"];
+9 -4
pkgs/tools/system/fio/default.nix
··· 16 16 buildInputs = [ python3 zlib ] 17 17 ++ lib.optional (!stdenv.isDarwin) libaio; 18 18 19 - nativeBuildInputs = [ makeWrapper ]; 19 + nativeBuildInputs = [ makeWrapper python3.pkgs.wrapPython ]; 20 20 21 21 strictDeps = true; 22 22 ··· 29 29 substituteInPlace tools/plot/fio2gnuplot --replace /usr/share/fio $out/share/fio 30 30 ''; 31 31 32 - postInstall = lib.optionalString withGnuplot '' 33 - wrapProgram $out/bin/fio2gnuplot \ 34 - --prefix PATH : ${lib.makeBinPath [ gnuplot ]} 32 + pythonPath = [ python3.pkgs.six ]; 33 + 34 + makeWrapperArgs = lib.optional withGnuplot [ 35 + "--prefix PATH : ${lib.makeBinPath [ gnuplot ]}" 36 + ]; 37 + 38 + postInstall = '' 39 + wrapPythonProgramsIn "$out/bin" "$out $pythonPath" 35 40 ''; 36 41 37 42 meta = with lib; {
+2 -2
pkgs/tools/system/netdata/default.nix
··· 16 16 let 17 17 go-d-plugin = callPackage ./go.d.plugin.nix {}; 18 18 in stdenv.mkDerivation rec { 19 - version = "1.31.0"; 19 + version = "1.32.1"; 20 20 pname = "netdata"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "netdata"; 24 24 repo = "netdata"; 25 25 rev = "v${version}"; 26 - sha256 = "0735cxmljrp8zlkcq7hcxizy4j4xiv7vf782zkz5chn06n38mcik"; 26 + sha256 = "sha256-DbuR3x7d6synJELOxI+frK4LY9zFgPKmY7hGY8B5z7o="; 27 27 fetchSubmodules = true; 28 28 }; 29 29
+3 -3
pkgs/tools/system/netdata/go.d.plugin.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "netdata-go.d.plugin"; 5 - version = "0.28.1"; 5 + version = "0.31.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "netdata"; 9 9 repo = "go.d.plugin"; 10 10 rev = "v${version}"; 11 - sha256 = "0i77nvqi3dcby0gr3b06bai170q2ibp5390qfjijrk1yqz6x6sd5"; 11 + sha256 = "sha256-wS8+C03K/qn8zKIAQvZ7nF7CmFfIvKU/dtm80bTeniM="; 12 12 }; 13 13 14 - vendorSha256 = "1q8z4smaxzqd5iwvbnkkr33c3b94rjwa3xjirwlr595g0wn93wc7"; 14 + vendorSha256 = "sha256-17/f6tAxDD5TgjmwnqAlnQSxDhnFidjsN55/sUMDej8="; 15 15 16 16 doCheck = false; 17 17
+18 -6
pkgs/tools/system/netdata/no-files-in-etc-and-var.patch
··· 25 25 26 26 chartsconfigdir=$(libconfigdir)/charts.d 27 27 diff --git a/collectors/ebpf.plugin/Makefile.am b/collectors/ebpf.plugin/Makefile.am 28 - index 18b1fc6c8..b4b0c7852 100644 28 + index 2d5f92a6b..8b11c7502 100644 29 29 --- a/collectors/ebpf.plugin/Makefile.am 30 30 +++ b/collectors/ebpf.plugin/Makefile.am 31 - @@ -13,7 +13,7 @@ SUFFIXES = .in 31 + @@ -9,7 +9,7 @@ SUFFIXES = .in 32 32 userebpfconfigdir=$(configdir)/ebpf.d 33 33 34 34 # Explicitly install directories to avoid permission issues due to umask ··· 36 36 +no-install-exec-local: 37 37 $(INSTALL) -d $(DESTDIR)$(userebpfconfigdir) 38 38 39 - dist_plugins_SCRIPTS = \ 39 + dist_noinst_DATA = \ 40 40 diff --git a/collectors/node.d.plugin/Makefile.am b/collectors/node.d.plugin/Makefile.am 41 41 index c3142d433..95e324455 100644 42 42 --- a/collectors/node.d.plugin/Makefile.am ··· 75 75 +no-install-exec-local: 76 76 $(INSTALL) -d $(DESTDIR)$(userstatsdconfigdir) 77 77 diff --git a/health/Makefile.am b/health/Makefile.am 78 - index b963ea0cd..6979e69bf 100644 78 + index 349b86d61..514f1874f 100644 79 79 --- a/health/Makefile.am 80 80 +++ b/health/Makefile.am 81 81 @@ -19,7 +19,7 @@ dist_userhealthconfig_DATA = \ ··· 88 88 89 89 healthconfigdir=$(libconfigdir)/health.d 90 90 diff --git a/system/Makefile.am b/system/Makefile.am 91 - index 5323738c9..06e1b6a73 100644 91 + index a88ccab65..bda6ee2b6 100644 92 92 --- a/system/Makefile.am 93 93 +++ b/system/Makefile.am 94 - @@ -20,11 +20,10 @@ include $(top_srcdir)/build/subst.inc 94 + @@ -3,7 +3,6 @@ 95 + 96 + MAINTAINERCLEANFILES = $(srcdir)/Makefile.in 97 + CLEANFILES = \ 98 + - edit-config \ 99 + netdata-openrc \ 100 + netdata.logrotate \ 101 + netdata.service \ 102 + @@ -20,15 +19,13 @@ include $(top_srcdir)/build/subst.inc 95 103 SUFFIXES = .in 96 104 97 105 dist_config_SCRIPTS = \ 98 106 - edit-config \ 107 + $(NULL) 108 + 109 + dist_config_DATA = \ 110 + - .install-type \ 99 111 $(NULL) 100 112 101 113 # Explicitly install directories to avoid permission issues due to umask
+6 -1
pkgs/top-level/all-packages.nix
··· 13765 13765 pipewire = callPackage ../development/libraries/pipewire {}; 13766 13766 pipewire-media-session = callPackage ../development/libraries/pipewire/media-session.nix {}; 13767 13767 pipewire_0_2 = callPackage ../development/libraries/pipewire/0.2.nix {}; 13768 + wireplumber = callPackage ../development/libraries/pipewire/wireplumber.nix {}; 13768 13769 13769 13770 pyradio = callPackage ../applications/audio/pyradio {}; 13770 13771 ··· 20942 20943 gn = gn1924; 20943 20944 }; 20944 20945 20945 - etcd = callPackage ../servers/etcd { }; 20946 + etcd = etcd_3_3; 20947 + etcd_3_3 = callPackage ../servers/etcd/3.3.nix { }; 20946 20948 etcd_3_4 = callPackage ../servers/etcd/3.4.nix { }; 20947 20949 20948 20950 ejabberd = callPackage ../servers/xmpp/ejabberd { }; ··· 23050 23052 ubootQemuAarch64 23051 23053 ubootQemuArm 23052 23054 ubootQemuRiscv64Smode 23055 + ubootQemuX86 23053 23056 ubootRaspberryPi 23054 23057 ubootRaspberryPi2 23055 23058 ubootRaspberryPi3_32bit ··· 23451 23454 gnome-icon-theme = callPackage ../data/icons/gnome-icon-theme { }; 23452 23455 23453 23456 go-font = callPackage ../data/fonts/go-font { }; 23457 + 23458 + graphite-gtk-theme = callPackage ../data/themes/graphite { }; 23454 23459 23455 23460 greybird = callPackage ../data/themes/greybird { }; 23456 23461
+1
pkgs/top-level/python-aliases.nix
··· 44 44 diff_cover = diff-cover; # added 2021-07-02 45 45 discogs_client = discogs-client; # added 2021-07-02 46 46 djangorestframework-jwt = drf-jwt; # added 2021-07-20 47 + django_environ = django-environ; # added 2021-12-25 47 48 django_redis = django-redis; # added 2021-10-11 48 49 django_taggit = django-taggit; # added 2021-10-11 49 50 dns = dnspython; # added 2017-12-10
+3 -1
pkgs/top-level/python-packages.nix
··· 2208 2208 2209 2209 django-dynamic-preferences = callPackage ../development/python-modules/django-dynamic-preferences { }; 2210 2210 2211 - django_environ = callPackage ../development/python-modules/django_environ { }; 2211 + django-environ = callPackage ../development/python-modules/django_environ { }; 2212 2212 2213 2213 django_extensions = callPackage ../development/python-modules/django-extensions { }; 2214 2214 ··· 3428 3428 gpy = callPackage ../development/python-modules/gpy { }; 3429 3429 3430 3430 gpyopt = callPackage ../development/python-modules/gpyopt { }; 3431 + 3432 + gql = callPackage ../development/python-modules/gql { }; 3431 3433 3432 3434 gradient = callPackage ../development/python-modules/gradient { }; 3433 3435