Merge staging-next into staging

authored by github-actions[bot] and committed by GitHub d3f2c41b e218376e

+50 -36
+18 -5
nixos/modules/services/monitoring/grafana.nix
··· 337 337 defaultText = "pkgs.grafana"; 338 338 type = types.package; 339 339 }; 340 + 340 341 declarativePlugins = mkOption { 341 342 type = with types; nullOr (listOf path); 342 343 default = null; 343 344 description = "If non-null, then a list of packages containing Grafana plugins to install. If set, plugins cannot be manually installed."; 344 345 example = literalExample "with pkgs.grafanaPlugins; [ grafana-piechart-panel ]"; 346 + # Make sure each plugin is added only once; otherwise building 347 + # the link farm fails, since the same path is added multiple 348 + # times. 349 + apply = x: if isList x then lib.unique x else x; 345 350 }; 346 351 347 352 dataDir = mkOption { ··· 635 640 QT_QPA_PLATFORM = "offscreen"; 636 641 } // mapAttrs' (n: v: nameValuePair "GF_${n}" (toString v)) envOptions; 637 642 script = '' 643 + set -o errexit -o pipefail -o nounset -o errtrace 644 + shopt -s inherit_errexit 645 + 638 646 ${optionalString (cfg.auth.google.clientSecretFile != null) '' 639 - export GF_AUTH_GOOGLE_CLIENT_SECRET="$(cat ${escapeShellArg cfg.auth.google.clientSecretFile})" 647 + GF_AUTH_GOOGLE_CLIENT_SECRET="$(<${escapeShellArg cfg.auth.google.clientSecretFile})" 648 + export GF_AUTH_GOOGLE_CLIENT_SECRET 640 649 ''} 641 650 ${optionalString (cfg.database.passwordFile != null) '' 642 - export GF_DATABASE_PASSWORD="$(cat ${escapeShellArg cfg.database.passwordFile})" 651 + GF_DATABASE_PASSWORD="$(<${escapeShellArg cfg.database.passwordFile})" 652 + export GF_DATABASE_PASSWORD 643 653 ''} 644 654 ${optionalString (cfg.security.adminPasswordFile != null) '' 645 - export GF_SECURITY_ADMIN_PASSWORD="$(cat ${escapeShellArg cfg.security.adminPasswordFile})" 655 + GF_SECURITY_ADMIN_PASSWORD="$(<${escapeShellArg cfg.security.adminPasswordFile})" 656 + export GF_SECURITY_ADMIN_PASSWORD 646 657 ''} 647 658 ${optionalString (cfg.security.secretKeyFile != null) '' 648 - export GF_SECURITY_SECRET_KEY="$(cat ${escapeShellArg cfg.security.secretKeyFile})" 659 + GF_SECURITY_SECRET_KEY="$(<${escapeShellArg cfg.security.secretKeyFile})" 660 + export GF_SECURITY_SECRET_KEY 649 661 ''} 650 662 ${optionalString (cfg.smtp.passwordFile != null) '' 651 - export GF_SMTP_PASSWORD="$(cat ${escapeShellArg cfg.smtp.passwordFile})" 663 + GF_SMTP_PASSWORD="$(<${escapeShellArg cfg.smtp.passwordFile})" 664 + export GF_SMTP_PASSWORD 652 665 ''} 653 666 ${optionalString cfg.provision.enable '' 654 667 export GF_PATHS_PROVISIONING=${provisionConfDir};
+3 -2
pkgs/development/libraries/openimagedenoise/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "openimagedenoise"; 5 - version = "1.3.0"; 5 + version = "1.4.0"; 6 6 7 7 # The release tarballs include pretrained weights, which would otherwise need to be fetched with git-lfs 8 8 src = fetchzip { 9 9 url = "https://github.com/OpenImageDenoise/oidn/releases/download/v${version}/oidn-${version}.src.tar.gz"; 10 - sha256 = "sha256-ls0F2D5pC+wqhQn1Zh8m8Q/KoK7rAkhKatTY9k+letQ="; 10 + sha256 = "sha256-UsiZT3ufRVo1BQ/md/A3CXpUfMPrJR1DhZg9hrjOG2A="; 11 11 }; 12 12 13 13 nativeBuildInputs = [ cmake python3 ispc ]; ··· 19 19 license = licenses.asl20; 20 20 maintainers = [ maintainers.leshainc ]; 21 21 platforms = platforms.unix; 22 + changelog = "https://github.com/OpenImageDenoise/oidn/blob/v${version}/CHANGELOG.md"; 22 23 }; 23 24 }
+10 -9
pkgs/development/ocaml-modules/csexp/default.nix
··· 2 2 3 3 buildDunePackage rec { 4 4 pname = "csexp"; 5 - version = "1.4.0"; 6 - 7 - useDune2 = true; 8 - 9 - minimumOCamlVersion = "4.02.3"; 5 + version = "1.5.1"; 10 6 11 7 src = fetchurl { 12 8 url = "https://github.com/ocaml-dune/csexp/releases/download/${version}/csexp-${version}.tbz"; 13 - sha256 = "sha256-jj1vyofxAqEm3ui3KioNFG8QQ5xHIY38FJ1Rvz7fNk4="; 9 + sha256 = "sha256-1gXkBl+pCliABEDvLzOi2TE5i/LCIGGorLffhFwKrAI="; 14 10 }; 15 11 16 - propagatedBuildInputs = [ result ]; 12 + minimumOCamlVersion = "4.03"; 13 + useDune2 = true; 14 + 15 + propagatedBuildInputs = [ 16 + result 17 + ]; 17 18 18 19 meta = with lib; { 19 - homepage = "https://github.com/ocaml-dune/csexp"; 20 + homepage = "https://github.com/ocaml-dune/csexp/"; 20 21 description = "Minimal support for Canonical S-expressions"; 21 22 license = licenses.mit; 22 - maintainers = [ maintainers.marsam ]; 23 + maintainers = with maintainers; [ marsam ]; 23 24 }; 24 25 }
+8 -9
pkgs/development/ocaml-modules/repr/default.nix
··· 1 - { lib, buildDunePackage, fetchurl, fmt, uutf, jsonm, base64, either }: 1 + { lib, buildDunePackage, fetchurl, base64, either, fmt, jsonm, uutf }: 2 2 3 3 buildDunePackage rec { 4 4 pname = "repr"; 5 - version = "0.2.1"; 6 - 7 - minimumOCamlVersion = "4.08"; 5 + version = "0.3.0"; 8 6 9 7 src = fetchurl { 10 8 url = "https://github.com/mirage/${pname}/releases/download/${version}/${pname}-fuzz-${version}.tbz"; 11 - sha256 = "1cbzbawbn71mmpw8y84s1p2pbhc055w1znz64jvr00c7fdr9p8hc"; 9 + sha256 = "sha256-2b0v5RwutvyidzEDTEb5p33IvJ+3t2IW+KVxYD1ufXQ="; 12 10 }; 13 11 12 + minimumOCamlVersion = "4.08"; 14 13 useDune2 = true; 15 14 16 15 propagatedBuildInputs = [ 17 - fmt 18 - uutf 19 - jsonm 20 16 base64 21 17 either 18 + fmt 19 + jsonm 20 + uutf 22 21 ]; 23 22 24 23 meta = with lib; { 25 24 description = "Dynamic type representations. Provides no stability guarantee"; 26 25 homepage = "https://github.com/mirage/repr"; 27 26 license = licenses.isc; 28 - maintainers = [ maintainers.sternenseemann ]; 27 + maintainers = with maintainers; [ sternenseemann ]; 29 28 }; 30 29 }
+3 -3
pkgs/development/ocaml-modules/repr/ppx.nix
··· 1 - { buildDunePackage, repr, ppxlib, ppx_deriving, alcotest, hex }: 1 + { buildDunePackage, ppx_deriving, ppxlib, repr, alcotest, hex }: 2 2 3 3 buildDunePackage { 4 4 pname = "ppx_repr"; ··· 6 6 inherit (repr) src version useDune2; 7 7 8 8 propagatedBuildInputs = [ 9 - repr 10 - ppxlib 11 9 ppx_deriving 10 + ppxlib 11 + repr 12 12 ]; 13 13 14 14 doCheck = true;
+4 -4
pkgs/development/tools/zls/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "zls"; 5 - version = "0.1.0"; 5 + version = "unstable-2021-06-06"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "zigtools"; 9 9 repo = pname; 10 - rev = version; 11 - sha256 = "sha256-A4aOdmlIxBUeKyczzLxH4y1Rl9TgE1EeiKGbWY4p/00="; 10 + rev = "39d87188647bd8c8eed304ee18f2dd1df6942f60"; 11 + sha256 = "sha256-22N508sVkP1OLySAijhtTPzk2fGf+FVnX9LTYRbRpB4="; 12 12 fetchSubmodules = true; 13 13 }; 14 14 ··· 19 19 ''; 20 20 21 21 installPhase = '' 22 - zig build -Drelease-safe -Dtarget=${stdenv.hostPlatform.parsed.cpu.name}-native --prefix $out install 22 + zig build -Drelease-safe -Dcpu=baseline --prefix $out install 23 23 ''; 24 24 25 25 meta = with lib; {
+1 -1
pkgs/stdenv/native/default.nix
··· 132 132 inherit lib nativePrefix; 133 133 bintools = import ../../build-support/bintools-wrapper { 134 134 name = "bintools"; 135 - inherit stdenvNoCC nativePrefix; 135 + inherit lib stdenvNoCC nativePrefix; 136 136 nativeTools = true; 137 137 nativeLibc = true; 138 138 };
+3 -3
pkgs/tools/misc/dua/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "dua"; 5 - version = "2.12.1"; 5 + version = "2.12.2"; 6 6 7 7 buildInputs = lib.optionals stdenv.isDarwin [ libiconv ]; 8 8 ··· 10 10 owner = "Byron"; 11 11 repo = "dua-cli"; 12 12 rev = "v${version}"; 13 - sha256 = "sha256-ZJCixDh2+H+G+lVgxw9H61Xy4hMg+3MbhI+e7sU4GQU="; 13 + sha256 = "sha256-0w9RKkoKWwPrVLkQieL69HIsSWbqS0vQesi7yijwXRw="; 14 14 # Remove unicode file names which leads to different checksums on HFS+ 15 15 # vs. other filesystems because of unicode normalisation. 16 16 extraPostFetch = '' ··· 18 18 ''; 19 19 }; 20 20 21 - cargoSha256 = "sha256-rwgvyfjCBPe20xN6gNXBexjN/BwNhZjT1RtabKhCkJs="; 21 + cargoSha256 = "sha256-JqOblCWJSKuTzE4XQzk5nCQL7NIwC5ZDhue1HA7JdzA="; 22 22 23 23 doCheck = false; 24 24