Merge staging-next into staging

authored by github-actions[bot] and committed by GitHub e8dc263c cec59288

+1691 -248
+14 -17
lib/attrsets.nix
··· 3 3 4 4 let 5 5 inherit (builtins) head tail length; 6 - inherit (lib.trivial) and; 6 + inherit (lib.trivial) id; 7 7 inherit (lib.strings) concatStringsSep sanitizeDerivationName; 8 - inherit (lib.lists) foldr foldl' concatMap concatLists elemAt; 8 + inherit (lib.lists) foldr foldl' concatMap concatLists elemAt all; 9 9 in 10 10 11 11 rec { ··· 73 73 getAttrFromPath ["z" "z"] x 74 74 => error: cannot find attribute `z.z' 75 75 */ 76 - getAttrFromPath = attrPath: set: 76 + getAttrFromPath = attrPath: 77 77 let errorMsg = "cannot find attribute `" + concatStringsSep "." attrPath + "'"; 78 - in attrByPath attrPath (abort errorMsg) set; 78 + in attrByPath attrPath (abort errorMsg); 79 79 80 80 81 81 /* Return the specified attributes from a set. ··· 154 154 foldAttrs (n: a: [n] ++ a) [] [{ a = 2; } { a = 3; }] 155 155 => { a = [ 2 3 ]; } 156 156 */ 157 - foldAttrs = op: nul: list_of_attrs: 157 + foldAttrs = op: nul: 158 158 foldr (n: a: 159 159 foldr (name: o: 160 160 o // { ${name} = op n.${name} (a.${name} or nul); } 161 161 ) a (attrNames n) 162 - ) {} list_of_attrs; 162 + ) {}; 163 163 164 164 165 165 /* Recursively collect sets that verify a given predicate named `pred' ··· 295 295 */ 296 296 mapAttrsRecursiveCond = cond: f: set: 297 297 let 298 - recurse = path: set: 298 + recurse = path: 299 299 let 300 300 g = 301 301 name: value: 302 302 if isAttrs value && cond value 303 303 then recurse (path ++ [name]) value 304 304 else f (path ++ [name]) value; 305 - in mapAttrs g set; 305 + in mapAttrs g; 306 306 in recurse [] set; 307 307 308 308 ··· 369 369 value = f name (catAttrs name sets); 370 370 }) names); 371 371 372 - /* Implementation note: Common names appear multiple times in the list of 372 + /* Implementation note: Common names appear multiple times in the list of 373 373 names, hopefully this does not affect the system because the maximal 374 374 laziness avoid computing twice the same expression and listToAttrs does 375 375 not care about duplicated attribute names. ··· 420 420 let f = attrPath: 421 421 zipAttrsWith (n: values: 422 422 let here = attrPath ++ [n]; in 423 - if tail values == [] 424 - || pred here (head (tail values)) (head values) then 423 + if length values == 1 424 + || pred here (elemAt values 1) (head values) then 425 425 head values 426 426 else 427 427 f here values ··· 447 447 } 448 448 449 449 */ 450 - recursiveUpdate = lhs: rhs: 451 - recursiveUpdateUntil (path: lhs: rhs: 452 - !(isAttrs lhs && isAttrs rhs) 453 - ) lhs rhs; 450 + recursiveUpdate = recursiveUpdateUntil (path: lhs: rhs: !(isAttrs lhs && isAttrs rhs)); 454 451 455 452 /* Returns true if the pattern is contained in the set. False otherwise. 456 453 ··· 459 456 => true 460 457 */ 461 458 matchAttrs = pattern: attrs: assert isAttrs pattern; 462 - foldr and true (attrValues (zipAttrsWithNames (attrNames pattern) (n: values: 463 - let pat = head values; val = head (tail values); in 459 + all id (attrValues (zipAttrsWithNames (attrNames pattern) (n: values: 460 + let pat = head values; val = elemAt values 1; in 464 461 if length values == 1 then false 465 462 else if isAttrs pat then isAttrs val && matchAttrs pat val 466 463 else pat == val
+22
nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
··· 119 119 <link xlink:href="options.html#opt-services.archisteamfarm.enable">services.archisteamfarm</link>. 120 120 </para> 121 121 </listitem> 122 + <listitem> 123 + <para> 124 + <link xlink:href="https://goteleport.com">teleport</link>, 125 + allows engineers and security professionals to unify access 126 + for SSH servers, Kubernetes clusters, web applications, and 127 + databases across all environments. Available at 128 + <link linkend="opt-services.teleport.enable">services.teleport</link>. 129 + </para> 130 + </listitem> 131 + <listitem> 132 + <para> 133 + <link xlink:href="https://loic-sharma.github.io/BaGet/">BaGet</link>, 134 + a lightweight NuGet and symbol server. Available at 135 + <link linkend="opt-services.baget.enable">services.baget</link>. 136 + </para> 137 + </listitem> 122 138 </itemizedlist> 123 139 </section> 124 140 <section xml:id="sec-release-22.05-incompatibilities"> ··· 204 220 <literal>/etc/docker/daemon.json</literal>, you need to 205 221 incorporate the changes into the new option 206 222 <literal>virtualisation.docker.daemon.settings</literal>. 223 + </para> 224 + </listitem> 225 + <listitem> 226 + <para> 227 + opensmtpd-extras is no longer build with python2 scripting 228 + support due to python2 deprecation in nixpkgs 207 229 </para> 208 230 </listitem> 209 231 <listitem>
+6
nixos/doc/manual/release-notes/rl-2205.section.md
··· 37 37 38 38 - [ArchiSteamFarm](https://github.com/JustArchiNET/ArchiSteamFarm), a C# application with primary purpose of idling Steam cards from multiple accounts simultaneously. Available as [services.archisteamfarm](options.html#opt-services.archisteamfarm.enable). 39 39 40 + - [teleport](https://goteleport.com), allows engineers and security professionals to unify access for SSH servers, Kubernetes clusters, web applications, and databases across all environments. Available at [services.teleport](#opt-services.teleport.enable). 41 + 42 + - [BaGet](https://loic-sharma.github.io/BaGet/), a lightweight NuGet and symbol server. Available at [services.baget](#opt-services.baget.enable). 43 + 40 44 ## Backward Incompatibilities {#sec-release-22.05-incompatibilities} 41 45 42 46 - `pkgs.ghc` now refers to `pkgs.targetPackages.haskellPackages.ghc`. ··· 69 73 Scripts have to be converted to Python 3 for use with `writers.writePython3` or `writers.writePyPy2` needs to be used. 70 74 71 75 - If you previously used `/etc/docker/daemon.json`, you need to incorporate the changes into the new option `virtualisation.docker.daemon.settings`. 76 + 77 + - opensmtpd-extras is no longer build with python2 scripting support due to python2 deprecation in nixpkgs 72 78 73 79 - The `autorestic` package has been upgraded from 1.3.0 to 1.5.0 which introduces breaking changes in config file, check [their migration guide](https://autorestic.vercel.app/migration/1.4_1.5) for more details. 74 80
+3 -1
nixos/modules/module-list.nix
··· 226 226 ./programs/zsh/zsh-autosuggestions.nix 227 227 ./programs/zsh/zsh-syntax-highlighting.nix 228 228 ./rename.nix 229 - ./security/acme.nix 229 + ./security/acme 230 230 ./security/apparmor.nix 231 231 ./security/audit.nix 232 232 ./security/auditd.nix ··· 891 891 ./services/networking/tcpcrypt.nix 892 892 ./services/networking/teamspeak3.nix 893 893 ./services/networking/tedicross.nix 894 + ./services/networking/teleport.nix 894 895 ./services/networking/thelounge.nix 895 896 ./services/networking/tinc.nix 896 897 ./services/networking/tinydns.nix ··· 991 992 ./services/web-apps/bookstack.nix 992 993 ./services/web-apps/calibre-web.nix 993 994 ./services/web-apps/code-server.nix 995 + ./services/web-apps/baget.nix 994 996 ./services/web-apps/convos.nix 995 997 ./services/web-apps/cryptpad.nix 996 998 ./services/web-apps/dex.nix
+1 -1
nixos/modules/security/acme.nix nixos/modules/security/acme/default.nix
··· 916 916 917 917 meta = { 918 918 maintainers = lib.teams.acme.members; 919 - doc = ./acme.xml; 919 + doc = ./doc.xml; 920 920 }; 921 921 }
nixos/modules/security/acme.xml nixos/modules/security/acme/doc.xml
+4
nixos/modules/security/acme/mk-cert-ownership-assertion.nix
··· 1 + { cert, group, groups, user }: { 2 + assertion = cert.group == group || builtins.any (u: u == user) groups.${cert.group}.members; 3 + message = "Group for certificate ${cert.domain} must be ${group}, or user ${user} must be a member of group ${cert.group}"; 4 + }
+99
nixos/modules/services/networking/teleport.nix
··· 1 + { config, pkgs, lib, ... }: 2 + 3 + with lib; 4 + 5 + let 6 + cfg = config.services.teleport; 7 + settingsYaml = pkgs.formats.yaml { }; 8 + in 9 + { 10 + options = { 11 + services.teleport = with lib.types; { 12 + enable = mkEnableOption "the Teleport service"; 13 + 14 + settings = mkOption { 15 + type = settingsYaml.type; 16 + default = { }; 17 + example = literalExpression '' 18 + { 19 + teleport = { 20 + nodename = "client"; 21 + advertise_ip = "192.168.1.2"; 22 + auth_token = "60bdc117-8ff4-478d-95e4-9914597847eb"; 23 + auth_servers = [ "192.168.1.1:3025" ]; 24 + log.severity = "DEBUG"; 25 + }; 26 + ssh_service = { 27 + enabled = true; 28 + labels = { 29 + role = "client"; 30 + }; 31 + }; 32 + proxy_service.enabled = false; 33 + auth_service.enabled = false; 34 + } 35 + ''; 36 + description = '' 37 + Contents of the <literal>teleport.yaml</literal> config file. 38 + The <literal>--config</literal> arguments will only be passed if this set is not empty. 39 + 40 + See <link xlink:href="https://goteleport.com/docs/setup/reference/config/"/>. 41 + ''; 42 + }; 43 + 44 + insecure.enable = mkEnableOption '' 45 + starting teleport in insecure mode. 46 + 47 + This is dangerous! 48 + Sensitive information will be logged to console and certificates will not be verified. 49 + Proceed with caution! 50 + 51 + Teleport starts with disabled certificate validation on Proxy Service, validation still occurs on Auth Service 52 + ''; 53 + 54 + diag = { 55 + enable = mkEnableOption '' 56 + endpoints for monitoring purposes. 57 + 58 + See <link xlink:href="https://goteleport.com/docs/setup/admin/troubleshooting/#troubleshooting/"/> 59 + ''; 60 + 61 + addr = mkOption { 62 + type = str; 63 + default = "127.0.0.1"; 64 + description = "Metrics and diagnostics address."; 65 + }; 66 + 67 + port = mkOption { 68 + type = int; 69 + default = 3000; 70 + description = "Metrics and diagnostics port."; 71 + }; 72 + }; 73 + }; 74 + }; 75 + 76 + config = mkIf config.services.teleport.enable { 77 + environment.systemPackages = [ pkgs.teleport ]; 78 + 79 + systemd.services.teleport = { 80 + wantedBy = [ "multi-user.target" ]; 81 + after = [ "network.target" ]; 82 + serviceConfig = { 83 + ExecStart = '' 84 + ${pkgs.teleport}/bin/teleport start \ 85 + ${optionalString cfg.insecure.enable "--insecure"} \ 86 + ${optionalString cfg.diag.enable "--diag-addr=${cfg.diag.addr}:${toString cfg.diag.port}"} \ 87 + ${optionalString (cfg.settings != { }) "--config=${settingsYaml.generate "teleport.yaml" cfg.settings}"} 88 + ''; 89 + ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID"; 90 + LimitNOFILE = 65536; 91 + Restart = "always"; 92 + RestartSec = "5s"; 93 + RuntimeDirectory = "teleport"; 94 + Type = "simple"; 95 + }; 96 + }; 97 + }; 98 + } 99 +
+3 -1
nixos/modules/services/system/nscd.nix
··· 50 50 systemd.services.nscd = 51 51 { description = "Name Service Cache Daemon"; 52 52 53 - wantedBy = [ "nss-lookup.target" "nss-user-lookup.target" ]; 53 + before = [ "nss-lookup.target" "nss-user-lookup.target" ]; 54 + wants = [ "nss-lookup.target" "nss-user-lookup.target" ]; 55 + wantedBy = [ "multi-user.target" ]; 54 56 55 57 environment = { LD_LIBRARY_PATH = nssModulesPath; }; 56 58
+170
nixos/modules/services/web-apps/baget.nix
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; 4 + 5 + let 6 + 7 + cfg = config.services.baget; 8 + 9 + defaultConfig = { 10 + "PackageDeletionBehavior" = "Unlist"; 11 + "AllowPackageOverwrites" = false; 12 + 13 + "Database" = { 14 + "Type" = "Sqlite"; 15 + "ConnectionString" = "Data Source=baget.db"; 16 + }; 17 + 18 + "Storage" = { 19 + "Type" = "FileSystem"; 20 + "Path" = ""; 21 + }; 22 + 23 + "Search" = { 24 + "Type" = "Database"; 25 + }; 26 + 27 + "Mirror" = { 28 + "Enabled" = false; 29 + "PackageSource" = "https://api.nuget.org/v3/index.json"; 30 + }; 31 + 32 + "Logging" = { 33 + "IncludeScopes" = false; 34 + "Debug" = { 35 + "LogLevel" = { 36 + "Default" = "Warning"; 37 + }; 38 + }; 39 + "Console" = { 40 + "LogLevel" = { 41 + "Microsoft.Hosting.Lifetime" = "Information"; 42 + "Default" = "Warning"; 43 + }; 44 + }; 45 + }; 46 + }; 47 + 48 + configAttrs = recursiveUpdate defaultConfig cfg.extraConfig; 49 + 50 + configFormat = pkgs.formats.json {}; 51 + configFile = configFormat.generate "appsettings.json" configAttrs; 52 + 53 + in 54 + { 55 + options.services.baget = { 56 + enable = mkEnableOption "BaGet NuGet-compatible server"; 57 + 58 + apiKeyFile = mkOption { 59 + type = types.path; 60 + example = "/root/baget.key"; 61 + description = '' 62 + Private API key for BaGet. 63 + ''; 64 + }; 65 + 66 + extraConfig = mkOption { 67 + type = configFormat.type; 68 + default = {}; 69 + example = { 70 + "Database" = { 71 + "Type" = "PostgreSql"; 72 + "ConnectionString" = "Server=/run/postgresql;Port=5432;"; 73 + }; 74 + }; 75 + defaultText = literalExpression '' 76 + { 77 + "PackageDeletionBehavior" = "Unlist"; 78 + "AllowPackageOverwrites" = false; 79 + 80 + "Database" = { 81 + "Type" = "Sqlite"; 82 + "ConnectionString" = "Data Source=baget.db"; 83 + }; 84 + 85 + "Storage" = { 86 + "Type" = "FileSystem"; 87 + "Path" = ""; 88 + }; 89 + 90 + "Search" = { 91 + "Type" = "Database"; 92 + }; 93 + 94 + "Mirror" = { 95 + "Enabled" = false; 96 + "PackageSource" = "https://api.nuget.org/v3/index.json"; 97 + }; 98 + 99 + "Logging" = { 100 + "IncludeScopes" = false; 101 + "Debug" = { 102 + "LogLevel" = { 103 + "Default" = "Warning"; 104 + }; 105 + }; 106 + "Console" = { 107 + "LogLevel" = { 108 + "Microsoft.Hosting.Lifetime" = "Information"; 109 + "Default" = "Warning"; 110 + }; 111 + }; 112 + }; 113 + } 114 + ''; 115 + description = '' 116 + Extra configuration options for BaGet. Refer to <link xlink:href="https://loic-sharma.github.io/BaGet/configuration/"/> for details. 117 + Default value is merged with values from here. 118 + ''; 119 + }; 120 + }; 121 + 122 + # implementation 123 + 124 + config = mkIf cfg.enable { 125 + 126 + systemd.services.baget = { 127 + description = "BaGet server"; 128 + wantedBy = [ "multi-user.target" ]; 129 + wants = [ "network-online.target" ]; 130 + after = [ "network.target" "network-online.target" ]; 131 + path = [ pkgs.jq ]; 132 + serviceConfig = { 133 + WorkingDirectory = "/var/lib/baget"; 134 + DynamicUser = true; 135 + StateDirectory = "baget"; 136 + StateDirectoryMode = "0700"; 137 + LoadCredential = "api_key:${cfg.apiKeyFile}"; 138 + 139 + CapabilityBoundingSet = ""; 140 + NoNewPrivileges = true; 141 + PrivateDevices = true; 142 + PrivateTmp = true; 143 + PrivateUsers = true; 144 + PrivateMounts = true; 145 + ProtectHome = true; 146 + ProtectClock = true; 147 + ProtectProc = "noaccess"; 148 + ProcSubset = "pid"; 149 + ProtectKernelLogs = true; 150 + ProtectKernelModules = true; 151 + ProtectKernelTunables = true; 152 + ProtectControlGroups = true; 153 + ProtectHostname = true; 154 + RestrictSUIDSGID = true; 155 + RestrictRealtime = true; 156 + RestrictNamespaces = true; 157 + LockPersonality = true; 158 + RemoveIPC = true; 159 + RestrictAddressFamilies = [ "AF_INET" "AF_INET6" ]; 160 + SystemCallFilter = [ "@system-service" "~@privileged" ]; 161 + }; 162 + script = '' 163 + jq --slurpfile apiKeys <(jq -R . "$CREDENTIALS_DIRECTORY/api_key") '.ApiKey = $apiKeys[0]' ${configFile} > appsettings.json 164 + ln -snf ${pkgs.baget}/lib/BaGet/wwwroot wwwroot 165 + exec ${pkgs.baget}/bin/BaGet 166 + ''; 167 + }; 168 + 169 + }; 170 + }
+7 -1
nixos/modules/services/web-servers/apache-httpd/default.nix
··· 370 370 cat ${php.phpIni} > $out 371 371 echo "$options" >> $out 372 372 ''; 373 + 374 + mkCertOwnershipAssertion = import ../../../security/acme/mk-cert-ownership-assertion.nix; 373 375 in 374 376 375 377 ··· 657 659 `services.httpd.virtualHosts.<name>.useACMEHost` are mutually exclusive. 658 660 ''; 659 661 } 660 - ]; 662 + ] ++ map (name: mkCertOwnershipAssertion { 663 + inherit (cfg) group user; 664 + cert = config.security.acme.certs.${name}; 665 + groups = config.users.groups; 666 + }) dependentCertNames; 661 667 662 668 warnings = 663 669 mapAttrsToList (name: hostOpts: ''
+10 -3
nixos/modules/services/web-servers/caddy/default.nix
··· 38 38 ''; 39 39 in 40 40 if pkgs.stdenv.buildPlatform == pkgs.stdenv.hostPlatform then Caddyfile-formatted else Caddyfile; 41 + 42 + acmeHosts = unique (catAttrs "useACMEHost" acmeVHosts); 43 + 44 + mkCertOwnershipAssertion = import ../../../security/acme/mk-cert-ownership-assertion.nix; 41 45 in 42 46 { 43 47 imports = [ ··· 266 270 { assertion = cfg.adapter != "caddyfile" -> cfg.configFile != configFile; 267 271 message = "Any value other than 'caddyfile' is only valid when providing your own `services.caddy.configFile`"; 268 272 } 269 - ]; 273 + ] ++ map (name: mkCertOwnershipAssertion { 274 + inherit (cfg) group user; 275 + cert = config.security.acme.certs.${name}; 276 + groups = config.users.groups; 277 + }) acmeHosts; 270 278 271 279 services.caddy.extraConfig = concatMapStringsSep "\n" mkVHostConf virtualHosts; 272 280 services.caddy.globalConfig = '' ··· 323 331 324 332 security.acme.certs = 325 333 let 326 - eachACMEHost = unique (catAttrs "useACMEHost" acmeVHosts); 327 - reloads = map (useACMEHost: nameValuePair useACMEHost { reloadServices = [ "caddy.service" ]; }) eachACMEHost; 334 + reloads = map (useACMEHost: nameValuePair useACMEHost { reloadServices = [ "caddy.service" ]; }) acmeHosts; 328 335 in 329 336 listToAttrs reloads; 330 337
+7 -1
nixos/modules/services/web-servers/nginx/default.nix
··· 374 374 ${user}:{PLAIN}${password} 375 375 '') authDef) 376 376 ); 377 + 378 + mkCertOwnershipAssertion = import ../../../security/acme/mk-cert-ownership-assertion.nix; 377 379 in 378 380 379 381 { ··· 842 844 services.nginx.virtualHosts.<name>.useACMEHost are mutually exclusive. 843 845 ''; 844 846 } 845 - ]; 847 + ] ++ map (name: mkCertOwnershipAssertion { 848 + inherit (cfg) group user; 849 + cert = config.security.acme.certs.${name}; 850 + groups = config.users.groups; 851 + }) dependentCertNames; 846 852 847 853 systemd.services.nginx = { 848 854 description = "Nginx Web Server";
+6 -6
nixos/tests/acme.nix
··· 54 54 baseConfig = { nodes, config, specialConfig ? {} }: lib.mkMerge [ 55 55 { 56 56 security.acme = { 57 - defaults = (dnsConfig nodes) // { 58 - inherit group; 59 - }; 57 + defaults = (dnsConfig nodes); 60 58 # One manual wildcard cert 61 59 certs."example.test" = { 62 60 domain = "*.example.test"; 63 61 }; 64 62 }; 63 + 64 + users.users."${config.services."${server}".user}".extraGroups = ["acme"]; 65 65 66 66 services."${server}" = { 67 67 enable = true; ··· 252 252 } // (let 253 253 baseCaddyConfig = { nodes, config, ... }: { 254 254 security.acme = { 255 - defaults = (dnsConfig nodes) // { 256 - group = config.services.caddy.group; 257 - }; 255 + defaults = (dnsConfig nodes); 258 256 # One manual wildcard cert 259 257 certs."example.test" = { 260 258 domain = "*.example.test"; 261 259 }; 262 260 }; 261 + 262 + users.users."${config.services.caddy.user}".extraGroups = ["acme"]; 263 263 264 264 services.caddy = { 265 265 enable = true;
+1
nixos/tests/all-tests.nix
··· 471 471 systemd-unit-path = handleTest ./systemd-unit-path.nix {}; 472 472 taskserver = handleTest ./taskserver.nix {}; 473 473 telegraf = handleTest ./telegraf.nix {}; 474 + teleport = handleTest ./teleport.nix {}; 474 475 tiddlywiki = handleTest ./tiddlywiki.nix {}; 475 476 tigervnc = handleTest ./tigervnc.nix {}; 476 477 timezone = handleTest ./timezone.nix {};
+99
nixos/tests/teleport.nix
··· 1 + { system ? builtins.currentSystem 2 + , config ? { } 3 + , pkgs ? import ../.. { inherit system config; } 4 + }: 5 + 6 + with import ../lib/testing-python.nix { inherit system pkgs; }; 7 + 8 + let 9 + minimal = { config, ... }: { 10 + services.teleport.enable = true; 11 + }; 12 + 13 + client = { config, ... }: { 14 + services.teleport = { 15 + enable = true; 16 + settings = { 17 + teleport = { 18 + nodename = "client"; 19 + advertise_ip = "192.168.1.20"; 20 + auth_token = "8d1957b2-2ded-40e6-8297-d48156a898a9"; 21 + auth_servers = [ "192.168.1.10:3025" ]; 22 + log.severity = "DEBUG"; 23 + }; 24 + ssh_service = { 25 + enabled = true; 26 + labels = { 27 + role = "client"; 28 + }; 29 + }; 30 + proxy_service.enabled = false; 31 + auth_service.enabled = false; 32 + }; 33 + }; 34 + networking.interfaces.eth1.ipv4.addresses = [{ 35 + address = "192.168.1.20"; 36 + prefixLength = 24; 37 + }]; 38 + }; 39 + 40 + server = { config, ... }: { 41 + services.teleport = { 42 + enable = true; 43 + settings = { 44 + teleport = { 45 + nodename = "server"; 46 + advertise_ip = "192.168.1.10"; 47 + }; 48 + ssh_service.enabled = true; 49 + proxy_service.enabled = true; 50 + auth_service = { 51 + enabled = true; 52 + tokens = [ "node:8d1957b2-2ded-40e6-8297-d48156a898a9" ]; 53 + }; 54 + }; 55 + diag.enable = true; 56 + insecure.enable = true; 57 + }; 58 + networking = { 59 + firewall.allowedTCPPorts = [ 3025 ]; 60 + interfaces.eth1.ipv4.addresses = [{ 61 + address = "192.168.1.10"; 62 + prefixLength = 24; 63 + }]; 64 + }; 65 + }; 66 + in 67 + { 68 + minimal = makeTest { 69 + # minimal setup should always work 70 + name = "teleport-minimal-setup"; 71 + meta.maintainers = with pkgs.lib.maintainers; [ ymatsiuk ]; 72 + nodes = { inherit minimal; }; 73 + 74 + testScript = '' 75 + minimal.wait_for_open_port("3025") 76 + minimal.wait_for_open_port("3080") 77 + minimal.wait_for_open_port("3022") 78 + ''; 79 + }; 80 + 81 + basic = makeTest { 82 + # basic server and client test 83 + name = "teleport-server-client"; 84 + meta.maintainers = with pkgs.lib.maintainers; [ ymatsiuk ]; 85 + nodes = { inherit server client; }; 86 + 87 + testScript = '' 88 + with subtest("teleport ready"): 89 + server.wait_for_open_port("3025") 90 + client.wait_for_open_port("3022") 91 + 92 + with subtest("check applied configuration"): 93 + server.wait_until_succeeds("tctl get nodes --format=json | ${pkgs.jq}/bin/jq -e '.[] | select(.spec.hostname==\"client\") | .metadata.labels.role==\"client\"'") 94 + server.wait_for_open_port("3000") 95 + client.succeed("journalctl -u teleport.service --grep='DEBU'") 96 + server.succeed("journalctl -u teleport.service --grep='Starting teleport in insecure mode.'") 97 + ''; 98 + }; 99 + }
+2 -2
pkgs/applications/misc/octoprint/plugins.nix
··· 75 75 76 76 costestimation = buildPlugin rec { 77 77 pname = "CostEstimation"; 78 - version = "3.3.0"; 78 + version = "3.4.0"; 79 79 80 80 src = fetchFromGitHub { 81 81 owner = "OllisGit"; 82 82 repo = "OctoPrint-${pname}"; 83 83 rev = version; 84 - sha256 = "sha256-d7miGMCNJD0siaZb6EnoMZCkKot7vnZjxNZX2TunJcs="; 84 + sha256 = "sha256-04OPa/RpM8WehUmOp195ocsAjAvKdVY7iD5ybzQO7Dg="; 85 85 }; 86 86 87 87 meta = with lib; {
+2 -2
pkgs/applications/misc/spicetify-cli/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "spicetify-cli"; 5 - version = "2.8.3"; 5 + version = "2.8.4"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "khanhas"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-Ht+EDCoPn1dA8VHTEiq5xPm34lcsiug8jQHvQdCG2yg="; 11 + sha256 = "sha256-WsNiMlqr9ya06Urvw/m3yPsGLCTOvYFaO0oNHuVKNTs="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-g0RYIVIq4oMXdRZDBDnVYg7ombN5WEo/6O9hChQvOYs=";
+5
pkgs/applications/networking/mailreaders/notmuch/default.nix
··· 18 18 sha256 = "wfLO7kf2iXESItcgWvKj/npKnYwy5OCyStZviN9qR9M="; 19 19 }; 20 20 21 + patches = [ 22 + # https://nmbug.notmuchmail.org/nmweb/show/87o84iza9r.fsf%40starbuck.i-did-not-set--mail-host-address--so-tickle-me 23 + ./test-fix-support-for-gpgsm-in-gnupg-2.3.patch 24 + ]; 25 + 21 26 nativeBuildInputs = [ 22 27 pkg-config 23 28 doxygen # (optional) api docs
+28
pkgs/applications/networking/mailreaders/notmuch/test-fix-support-for-gpgsm-in-gnupg-2.3.patch
··· 1 + From a642ad542e3d3f34e949c5c66923ca8a6e6cbbd8 Mon Sep 17 00:00:00 2001 2 + From: Stig Palmquist <stig@stig.io> 3 + Date: Tue, 11 Jan 2022 13:23:13 +0100 4 + Subject: [PATCH] test: fix support for gpgsm in gnupg 2.3 5 + 6 + gpgsm --list-keys output changed the label for fingerprints from 7 + "fingerprint: " to "sha[12] fpr: " breaking tests with gnupg 2.3. this 8 + adds support for both. 9 + --- 10 + test/test-lib.sh | 2 +- 11 + 1 file changed, 1 insertion(+), 1 deletion(-) 12 + 13 + diff --git a/test/test-lib.sh b/test/test-lib.sh 14 + index 6bc0b723..3de608f9 100644 15 + --- a/test/test-lib.sh 16 + +++ b/test/test-lib.sh 17 + @@ -145,7 +145,7 @@ add_gpgsm_home () { 18 + mkdir -p -m 0700 "$GNUPGHOME" 19 + gpgsm --batch --no-tty --no-common-certs-import --pinentry-mode=loopback --passphrase-fd 3 \ 20 + --disable-dirmngr --import >"$GNUPGHOME"/import.log 2>&1 3<<<'' <$NOTMUCH_SRCDIR/test/smime/0xE0972A47.p12 21 + - fpr=$(gpgsm --batch --list-key test_suite@notmuchmail.org | sed -n 's/.*fingerprint: //p') 22 + + fpr=$(gpgsm --batch --list-key test_suite@notmuchmail.org | sed -n 's/.*\(fingerprint\|sha1 fpr\): //p') 23 + echo "$fpr S relax" >> "$GNUPGHOME/trustlist.txt" 24 + gpgsm --quiet --batch --no-tty --no-common-certs-import --disable-dirmngr --import < $NOTMUCH_SRCDIR/test/smime/ca.crt 25 + echo "4D:E0:FF:63:C0:E9:EC:01:29:11:C8:7A:EE:DA:3A:9A:7F:6E:C1:0D S" >> "$GNUPGHOME/trustlist.txt" 26 + -- 27 + 2.34.1 28 +
+2 -2
pkgs/applications/radio/gqrx/default.nix
··· 24 24 25 25 gnuradio3_8Minimal.pkgs.mkDerivation rec { 26 26 pname = "gqrx"; 27 - version = "2.15.1"; 27 + version = "2.15.2"; 28 28 29 29 src = fetchFromGitHub { 30 30 owner = "gqrx-sdr"; 31 31 repo = "gqrx"; 32 32 rev = "v${version}"; 33 - sha256 = "sha256-OL83l3A27rggfGbfLT1CUaPAQHEKXgoGS1jYJZ9eHPQ="; 33 + sha256 = "sha256-LWuSJbzQKHoCbkyRQ7KqUxFXzA99kuafPibH8Xx7mXs="; 34 34 }; 35 35 36 36 nativeBuildInputs = [
+2 -2
pkgs/applications/video/go-chromecast/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "go-chromecast"; 5 - version = "0.2.10"; 5 + version = "0.2.11"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "vishen"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-8216YaDgjy9Fp94Y5SQwEQpAP4NwvEhsJHe6xpQLAk8="; 11 + sha256 = "sha256-BCOyeXo3uoR4ry/nFbF+//U62/hHnPK+tbG+8Rv6Rv0="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-idxElk4Sy7SE9G1OMRw8YH4o8orBa80qhBXPA+ar620=";
+3 -3
pkgs/applications/virtualization/cloud-hypervisor/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "cloud-hypervisor"; 5 - version = "20.1"; 5 + version = "20.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "cloud-hypervisor"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "1r55ykxwa0xr1f9sp7mnv8nqf0dr7vw62b1w8r7mmyrndwnq6z5b"; 11 + sha256 = "sha256-yIp1p8GyBojWKmvFRZ/OeyF2bjlqYsuXUrYTVunYV8Y="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ pkg-config ]; 15 15 buildInputs = [ openssl ] ++ lib.optional stdenv.isAarch64 dtc; 16 16 17 - cargoSha256 = "07wpfhlp82hp3hr8vc52vhkrxd8xpyvdvfqh1dn1fnhxk3b1z7lz"; 17 + cargoSha256 = "sha256-s2u6e2JbukPo3pXYzQJXP5d2G213u1+1ke9gZFnB+5g="; 18 18 19 19 meta = with lib; { 20 20 homepage = "https://github.com/cloud-hypervisor/cloud-hypervisor";
+2 -2
pkgs/desktops/gnome/core/gnome-software/default.nix
··· 42 42 43 43 stdenv.mkDerivation rec { 44 44 pname = "gnome-software"; 45 - version = "41.2"; 45 + version = "41.3"; 46 46 47 47 src = fetchurl { 48 48 url = "mirror://gnome/sources/gnome-software/${lib.versions.major version}/${pname}-${version}.tar.xz"; 49 - sha256 = "OErdrMh4QlOoeXGBSweS+9LJQfpEiw+UOLv1dJgszBc="; 49 + sha256 = "ZQVjN3q2mxAQXfdxuz8hY3lVO7evQISNjDBljgEAmLw="; 50 50 }; 51 51 52 52 patches = [
+2 -2
pkgs/development/libraries/gbenchmark/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "gbenchmark"; 5 - version = "1.6.0"; 5 + version = "1.6.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "google"; 9 9 repo = "benchmark"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-EAJk3JhLdkuGKRMtspTLejck8doWPd7Z0Lv/Mvf3KFY="; 11 + sha256 = "sha256-yUiFxi80FWBmTZgqmqTMf9oqcBeg3o4I4vKd4djyRWY="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake ];
+10 -1
pkgs/development/libraries/liburing/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "liburing"; 7 - version = "2.1"; 7 + version = "2.1"; # remove patch when updating 8 8 9 9 src = fetchgit { 10 10 url = "http://git.kernel.dk/${pname}"; ··· 42 42 '' + lib.optionalString stdenv.hostPlatform.isGnu '' 43 43 cp ./examples/ucontext-cp $bin/bin/io_uring-ucontext-cp 44 44 ''; 45 + 46 + # fix for compilation on 32-bit ARM, merged by upstream but not released; remove when 47 + # upstream releases an update 48 + patches = lib.optional stdenv.isAarch32 [ 49 + (fetchpatch { 50 + url = "https://github.com/axboe/liburing/commit/e75a6cfa085fc9b5dbf5140fc1efb5a07b6b829e.diff"; 51 + sha256 = "sha256-qQEQXYm5mkws2klLxwuuoPSPRkpP1s6tuylAAEp7+9E="; 52 + }) 53 + ]; 45 54 46 55 meta = with lib; { 47 56 description = "Userspace library for the Linux io_uring API";
+2 -2
pkgs/development/libraries/umockdev/default.nix
··· 19 19 20 20 stdenv.mkDerivation rec { 21 21 pname = "umockdev"; 22 - version = "0.17.1"; 22 + version = "0.17.2"; 23 23 24 24 outputs = [ "bin" "out" "dev" "devdoc" ]; 25 25 26 26 src = fetchurl { 27 27 url = "https://github.com/martinpitt/umockdev/releases/download/${version}/${pname}-${version}.tar.xz"; 28 - sha256 = "sha256-lq8lVQlSZpFGDL7nGV8pPe+AClK8PjzWoPmhfWvHpJs="; 28 + sha256 = "sha256-D9Kb67HACi8guMoT5n3Yp9INigjuuGAIyKMgcICBJmA="; 29 29 }; 30 30 31 31 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/xgboost/default.nix
··· 16 16 17 17 stdenv.mkDerivation rec { 18 18 pname = "xgboost"; 19 - version = "1.5.0"; 19 + version = "1.5.1"; 20 20 21 21 src = fetchFromGitHub { 22 22 owner = "dmlc"; 23 23 repo = pname; 24 24 rev = "v${version}"; 25 25 fetchSubmodules = true; 26 - sha256 = "sha256-xrRKpZ6NSBtEL2CBN7KggDwIvQKIPD8EBlA0oCJv8mw="; 26 + sha256 = "sha256-WvYMfJYDF4azXkz2tBI9R9EpSOhFxpEja4RLuAfYAtE="; 27 27 }; 28 28 29 29 nativeBuildInputs = [ cmake ] ++ lib.optional stdenv.isDarwin llvmPackages.openmp;
+2 -2
pkgs/development/python-modules/GitPython/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "gitpython"; 14 - version = "3.1.24"; 14 + version = "3.1.25"; 15 15 disabled = pythonOlder "3.7"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "gitpython-developers"; 19 19 repo = "GitPython"; 20 20 rev = version; 21 - sha256 = "sha256-KfR14EqXsDgIZUerk/hHDB0Z7IuqncbTNd/yNwrV9I0="; 21 + sha256 = "sha256-ienc7zvLe6t8rkMtC6wVIewUqQBFdFbLc8iPT6aPVrE="; 22 22 }; 23 23 24 24 patches = [
+2 -2
pkgs/development/python-modules/aiocurrencylayer/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "aiocurrencylayer"; 14 - version = "1.0.2"; 14 + version = "1.0.3"; 15 15 format = "pyproject"; 16 16 17 17 disabled = pythonOlder "3.8"; ··· 20 20 owner = "home-assistant-ecosystem"; 21 21 repo = pname; 22 22 rev = version; 23 - sha256 = "EVqnrMatOk2I6hiCkiT5FOWvMY9LEK8LlSHqi0x9kuQ="; 23 + sha256 = "sha256-t2Pcoakk25vtUYajIZVITsrEUSdwwiA3fbdswy3n9P8="; 24 24 }; 25 25 26 26 nativeBuildInputs = [
+11
pkgs/development/python-modules/aioitertools/default.nix
··· 1 1 { lib 2 2 3 3 , buildPythonPackage 4 + , fetchpatch 4 5 , fetchPypi 6 + , pythonAtLeast 5 7 , pythonOlder 6 8 , typing-extensions 7 9 , coverage ··· 18 20 inherit pname version; 19 21 sha256 = "8b02facfbc9b0f1867739949a223f3d3267ed8663691cc95abd94e2c1d8c2b46"; 20 22 }; 23 + 24 + patches = lib.optionals (pythonAtLeast "3.10") [ 25 + (fetchpatch { 26 + # Fix TypeError: wait() got an unexpected keyword argument 'loop' 27 + # See https://github.com/omnilib/aioitertools/issues/84 28 + url = "https://raw.githubusercontent.com/archlinux/svntogit-community/packages/python-aioitertools/trunk/python310.patch"; 29 + sha256 = "sha256-F10sduGaLBcxEoP83N/lGpZIlzkM2JTnQnhHKFwc7P0="; 30 + }) 31 + ]; 21 32 22 33 propagatedBuildInputs = [ typing-extensions ]; 23 34 checkInputs = [ coverage toml ];
+2 -2
pkgs/development/python-modules/aioridwell/default.nix
··· 17 17 18 18 buildPythonPackage rec { 19 19 pname = "aioridwell"; 20 - version = "2021.10.0"; 20 + version = "2021.12.2"; 21 21 format = "pyproject"; 22 22 23 23 disabled = pythonOlder "3.8"; ··· 26 26 owner = "bachya"; 27 27 repo = pname; 28 28 rev = version; 29 - sha256 = "sha256-h89gfdZvk7H22xAczaPMscTYZu0YeFxvFfL6/Oz2cJw="; 29 + sha256 = "sha256-QFUXWleHRMBgaRsMNt2xFb3XcbCNI2kKQHKCBrUuG6Q="; 30 30 }; 31 31 32 32 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/bleak/default.nix
··· 4 4 5 5 buildPythonPackage rec { 6 6 pname = "bleak"; 7 - version = "0.13.0"; 7 + version = "0.14.0"; 8 8 9 9 disabled = !isPy3k; 10 10 11 11 src = fetchPypi { 12 12 inherit pname version; 13 - sha256 = "1vnwk36qfws9amqrdaynf63dcj2gzxm0ns1l75hrczmd5j2ic1zb"; 13 + sha256 = "b449cc63f769c2d219c67e23ffb9f3a5b5f23eb2d68d05878743dbed83a14360"; 14 14 }; 15 15 16 16 postPatch = ''
+66 -40
pkgs/development/python-modules/cherrypy/default.nix
··· 1 - { lib, stdenv, buildPythonPackage, fetchPypi, isPy3k 1 + { lib 2 + , stdenv 3 + , buildPythonPackage 4 + , cheroot 5 + , fetchPypi 6 + , jaraco_collections 7 + , more-itertools 8 + , objgraph 9 + , pathpy 10 + , portend 11 + , pytest-forked 12 + , pytest-services 13 + , pytestCheckHook 14 + , pythonAtLeast 15 + , pythonOlder 16 + , requests-toolbelt 17 + , routes 2 18 , setuptools-scm 3 - , cheroot, portend, more-itertools, zc_lockfile, routes 4 - , jaraco_collections 5 - , objgraph, pytest, pytest-cov, pathpy, requests-toolbelt, pytest-services 6 - , fetchpatch 19 + , simplejson 20 + , zc_lockfile 7 21 }: 8 22 9 23 buildPythonPackage rec { 10 24 pname = "cherrypy"; 11 - version = "18.6.0"; 25 + version = "18.6.1"; 26 + format = "setuptools"; 12 27 13 - disabled = !isPy3k; 28 + disabled = pythonOlder "3.7"; 14 29 15 30 src = fetchPypi { 16 31 pname = "CherryPy"; 17 32 inherit version; 18 - sha256 = "16f410izp2c4qhn4n3l5l3qirmkf43h2amjqms8hkl0shgfqwq2n"; 33 + hash = "sha256-8z6HKG57PjCeBOciXY5JOC2dd3PmCSJB1/YTiTxWNJU="; 19 34 }; 20 35 21 - patches = [ 22 - # 1/3 Fix compatibility with pytest 6. Will be part of the next release after 18.6 23 - (fetchpatch { 24 - url = "https://github.com/cherrypy/cherrypy/pull/1897/commits/59c0e19d7df8680e36afc96756dce72435121448.patch"; 25 - sha256 = "1jachbvp505gndccdhny0c3grzdrmvmbzq4kw55jx93ay94ni6p0"; 26 - }) 27 - # 2/3 Fix compatibility with pytest 6. Will be part of the next release after 18.6 28 - (fetchpatch { 29 - url = "https://github.com/cherrypy/cherrypy/pull/1897/commits/4a6287b73539adcb7b0ae72d69644a1ced1f7eaa.patch"; 30 - sha256 = "0nz40qmgxknkbjsdzfzcqfxdsmsxx3v104fb0h04yvs76mqvw3i4"; 31 - }) 32 - # 3/3 Fix compatibility with pytest 6. Will be part of the next release after 18.6 33 - (fetchpatch { 34 - url = "https://github.com/cherrypy/cherrypy/commit/3bae7f06868553b006915f05ff14d86163f59a7d.patch"; 35 - sha256 = "1z0bv23ybyw87rf1i8alsdi3gc2bzmdj9d0kjsghdkvi3zdp4n8q"; 36 - }) 36 + nativeBuildInputs = [ 37 + setuptools-scm 37 38 ]; 38 39 39 - nativeBuildInputs = [ setuptools-scm ]; 40 - 41 40 propagatedBuildInputs = [ 42 41 # required 43 - cheroot portend more-itertools zc_lockfile 42 + cheroot 43 + portend 44 + more-itertools 45 + zc_lockfile 44 46 jaraco_collections 45 47 # optional 46 48 routes 49 + simplejson 47 50 ]; 48 51 49 52 checkInputs = [ 50 - objgraph pytest pytest-cov pathpy requests-toolbelt pytest-services 53 + objgraph 54 + pathpy 55 + pytest-forked 56 + pytest-services 57 + pytestCheckHook 58 + requests-toolbelt 51 59 ]; 52 60 53 - # Keyboard interrupt ends test suite run 54 - # daemonize and autoreload tests have issue with sockets within sandbox 55 - # Disable doctest plugin because times out 56 - checkPhase = '' 57 - substituteInPlace pytest.ini --replace "--doctest-modules" "" 58 - pytest \ 59 - -k 'not KeyboardInterrupt and not daemonize and not Autoreload' \ 60 - --deselect=cherrypy/test/test_static.py::StaticTest::test_null_bytes \ 61 - --deselect=cherrypy/test/test_tools.py::ToolTests::testCombinedTools \ 62 - ${lib.optionalString stdenv.isDarwin 63 - "--deselect=cherrypy/test/test_bus.py::BusMethodTests::test_block --deselect=cherrypy/test/test_config_server.py"} 61 + preCheck = '' 62 + # Disable doctest plugin because times out 63 + substituteInPlace pytest.ini \ 64 + --replace "--doctest-modules" "-vvv" 65 + sed -i "/--cov/d" pytest.ini 64 66 ''; 65 67 68 + pytestFlagsArray = [ 69 + "-W" 70 + "ignore::DeprecationWarning" 71 + ]; 72 + 73 + disabledTests = [ 74 + # Keyboard interrupt ends test suite run 75 + "KeyboardInterrupt" 76 + # daemonize and autoreload tests have issue with sockets within sandbox 77 + "daemonize" 78 + "Autoreload" 79 + ] ++ lib.optionals stdenv.isDarwin [ 80 + "test_block" 81 + ]; 82 + 83 + disabledTestPaths = lib.optionals stdenv.isDarwin [ 84 + "cherrypy/test/test_config_server.py" 85 + ]; 86 + 66 87 __darwinAllowLocalNetworking = true; 67 88 89 + pythonImportsCheck = [ 90 + "cherrypy" 91 + ]; 92 + 68 93 meta = with lib; { 94 + description = "Object-oriented HTTP framework"; 69 95 homepage = "https://www.cherrypy.org"; 70 - description = "A pythonic, object-oriented HTTP framework"; 71 96 license = licenses.bsd3; 97 + maintainers = with maintainers; [ ]; 72 98 }; 73 99 }
+2 -2
pkgs/development/python-modules/chiavdf/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "chiavdf"; 17 - version = "1.0.3"; 17 + version = "1.0.4"; 18 18 disabled = pythonOlder "3.7"; 19 19 20 20 src = fetchPypi { 21 21 inherit pname version; 22 - hash = "sha256-XbmK7ZJnUy3Zg9XWt0t/Qb2k5qIlu4vIbxdDFYFjFPI="; 22 + hash = "sha256-i6ylxtw1dMtylS4m0mz6rATU1trbMpcmsB2WhD++CeM="; 23 23 }; 24 24 25 25 patches = [
+2 -2
pkgs/development/python-modules/datadog/default.nix
··· 17 17 18 18 buildPythonPackage rec { 19 19 pname = "datadog"; 20 - version = "0.42.0"; 20 + version = "0.43.0"; 21 21 22 22 src = fetchPypi { 23 23 inherit pname version; 24 - sha256 = "sha256-em+sF6fQnxiDq5pFzk/3oWqhpes8xMbN2sf4xT59Hps="; 24 + sha256 = "1f2123083d9e1add6f238c62714b76ac2fc134d7d1c435cd82b976487b191b96"; 25 25 }; 26 26 27 27 postPatch = ''
+10 -1
pkgs/development/python-modules/denonavr/default.nix
··· 16 16 buildPythonPackage rec { 17 17 pname = "denonavr"; 18 18 version = "0.10.9"; 19 + format = "setuptools"; 20 + 19 21 disabled = pythonOlder "3.6"; 20 22 21 23 src = fetchFromGitHub { ··· 40 42 pytest-timeout 41 43 ]; 42 44 43 - pythonImportsCheck = [ "denonavr" ]; 45 + disabledTestPaths = [ 46 + # https://github.com/ol-iver/denonavr/issues/228 47 + "tests/test_denonavr.py" 48 + ]; 49 + 50 + pythonImportsCheck = [ 51 + "denonavr" 52 + ]; 44 53 45 54 meta = with lib; { 46 55 description = "Automation Library for Denon AVR receivers";
+5 -3
pkgs/development/python-modules/devolo-plc-api/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchFromGitHub 4 + , fetchpatch 4 5 , httpx 5 6 , protobuf 6 7 , pytest-asyncio ··· 14 15 15 16 buildPythonPackage rec { 16 17 pname = "devolo-plc-api"; 17 - version = "0.7.0"; 18 + version = "0.7.1"; 18 19 format = "setuptools"; 19 20 20 21 disabled = pythonOlder "3.8"; ··· 23 24 owner = "2Fake"; 24 25 repo = "devolo_plc_api"; 25 26 rev = "v${version}"; 26 - sha256 = "sha256-qzjH52bKQ/oSFd580V92uE2/Z2g+2nLh/JXOXYqVfSY="; 27 + sha256 = "sha256-XR/daDrnfbLBrUTTMFYtndr6+RxPwnF4qbXAdXsXKHk="; 27 28 }; 28 29 29 30 SETUPTOOLS_SCM_PRETEND_VERSION = version; ··· 38 39 zeroconf 39 40 ]; 40 41 41 - 42 42 checkInputs = [ 43 43 pytest-asyncio 44 44 pytest-httpx 45 45 pytest-mock 46 46 pytestCheckHook 47 47 ]; 48 + 49 + 48 50 49 51 pythonImportsCheck = [ 50 52 "devolo_plc_api"
+2 -2
pkgs/development/python-modules/django-taggit/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "django-taggit"; 12 - version = "1.5.1"; 12 + version = "2.0.0"; 13 13 format = "setuptools"; 14 14 disabled = pythonOlder "3.6"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "e5bb62891f458d55332e36a32e19c08d20142c43f74bc5656c803f8af25c084a"; 18 + sha256 = "a23ca776ee2709b455c3a95625be1e4b891ddf1ffb4173153c41806de4038d72"; 19 19 }; 20 20 21 21 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/flux-led/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "flux-led"; 11 - version = "0.27.44"; 11 + version = "0.27.45"; 12 12 format = "setuptools"; 13 13 14 14 disabled = pythonOlder "3.7"; ··· 17 17 owner = "Danielhiversen"; 18 18 repo = "flux_led"; 19 19 rev = version; 20 - sha256 = "sha256-ImtXcT6CxW6bhtL4uJM8PAvQOm36pxgTGZp4BCJXTUQ="; 20 + sha256 = "sha256-0MKcPDn9Jtp7bEbusOHforEBOkM+y0TUG72Ynt5rdfg="; 21 21 }; 22 22 23 23 propagatedBuildInputs = [
+3 -3
pkgs/development/python-modules/formbox/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "formbox"; 5 - version = "0.1.0"; 5 + version = "0.3.0"; 6 6 format = "flit"; 7 - disabled = pythonOlder "3.7"; 7 + disabled = pythonOlder "3.6"; 8 8 9 9 src = fetchFromSourcehut { 10 10 owner = "~cnx"; 11 11 repo = pname; 12 12 rev = version; 13 - sha256 = "sha256-6OzmYqUC3mmrAMeMExI4rdVGUoWrxRuBfjKFYbHUlgE="; 13 + sha256 = "sha256-K8NqMi80UurirAZaw67nhW5hFC3+dbdoT84hW7iIcaM="; 14 14 }; 15 15 16 16 propagatedBuildInputs = [ bleach markdown ];
+2 -2
pkgs/development/python-modules/glances-api/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "glances-api"; 14 - version = "0.3.2"; 14 + version = "0.3.3"; 15 15 format = "pyproject"; 16 16 17 17 disabled = pythonOlder "3.8"; ··· 20 20 owner = "home-assistant-ecosystem"; 21 21 repo = "python-glances-api"; 22 22 rev = version; 23 - sha256 = "sha256-zVK63SI8ZeVrY2iEEkgp8pq6RDheKeApb9/RWgZCKGI="; 23 + sha256 = "sha256-F3jmYBZNzI4hRmH1J+S5RwxjouZNcUJOnD3QpX1J39s="; 24 24 }; 25 25 26 26 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/grappelli_safe/default.nix
··· 4 4 }: 5 5 6 6 buildPythonPackage rec { 7 - version = "1.0.0"; 7 + version = "1.1.1"; 8 8 pname = "grappelli_safe"; 9 9 10 10 src = fetchPypi { 11 11 inherit pname version; 12 - sha256 = "84c03ec5373341d980a76480d992389e286fbc50048e91bc2e5c876d02873cc5"; 12 + sha256 = "ee34b3e2a3711498b1f8da3d9daa8a1239efdf255a212181742b6a5890fac039"; 13 13 }; 14 14 15 15 meta = with lib; {
+2 -2
pkgs/development/python-modules/hahomematic/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "hahomematic"; 16 - version = "0.17.1"; 16 + version = "0.18.0"; 17 17 format = "setuptools"; 18 18 19 19 disabled = pythonOlder "3.9"; ··· 22 22 owner = "danielperna84"; 23 23 repo = pname; 24 24 rev = version; 25 - sha256 = "sha256-Nhl2WLrqqvGaNEgJApcgZhSm4xoq62MzJC0MfEO5Xxw="; 25 + sha256 = "sha256-SkEI5uWKtszSBZblDBvbEmJh0OdvqDcwY6PG3JK4djY="; 26 26 }; 27 27 28 28 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/holidays/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "holidays"; 14 - version = "0.11.3.1"; 14 + version = "0.12"; 15 15 format = "setuptools"; 16 16 17 17 disabled = pythonOlder "3.6"; 18 18 19 19 src = fetchPypi { 20 20 inherit pname version; 21 - sha256 = "sha256-SFWv4Ov0KO+8+EhHeCi4ifhRW+f08VriZoKRk2nZJ3Q="; 21 + sha256 = "d99f2b6ddc5bfab7b7f8bbed457a82104f8980122a04b982bfc0e4f8820a1d46"; 22 22 }; 23 23 24 24 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/idasen/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "idasen"; 15 - version = "0.8.1"; 15 + version = "0.8.2"; 16 16 format = "pyproject"; 17 17 18 18 disabled = pythonOlder "3.8"; ··· 21 21 owner = "newAM"; 22 22 repo = "idasen"; 23 23 rev = "v${version}"; 24 - sha256 = "122bhbc3zqqm4x1x7a7mydvxxjrdssnqyxyqg0lbgxgn5rm8wbdd"; 24 + sha256 = "sha256-s8CnYMUVl2VbGbVxICSaKH5DxTA+NP/zPX1z7vfMqi4="; 25 25 }; 26 26 27 27 nativeBuildInputs = [
+33
pkgs/development/python-modules/json-tricks/default.nix
··· 1 + { lib 2 + , fetchFromGitHub 3 + , buildPythonPackage 4 + , pythonOlder 5 + , pytestCheckHook 6 + , numpy 7 + , pandas 8 + , pytz 9 + }: 10 + 11 + buildPythonPackage rec { 12 + pname = "json-tricks"; 13 + version = "3.15.5"; 14 + disabled = pythonOlder "3.5"; 15 + 16 + src = fetchFromGitHub { 17 + owner = "mverleg"; 18 + repo = "pyjson_tricks"; 19 + rev = "v${version}"; 20 + sha256 = "wdpqCqMO0EzKyqE4ishL3CTsSw3sZPGvJ0HEktKFgZU="; 21 + }; 22 + 23 + checkInputs = [ numpy pandas pytz pytestCheckHook ]; 24 + 25 + pythonImportsCheck = [ "json_tricks" ]; 26 + 27 + meta = with lib; { 28 + description = "Extra features for Python JSON handling"; 29 + homepage = "https://github.com/mverleg/pyjson_tricks"; 30 + license = licenses.bsd3; 31 + maintainers = with maintainers; [ bcdarwin ]; 32 + }; 33 + }
+2
pkgs/development/python-modules/kaptan/default.nix
··· 16 16 17 17 postPatch = '' 18 18 sed -i "s/==.*//g" requirements/test.txt 19 + 20 + substituteInPlace requirements/base.txt --replace 'PyYAML>=3.13,<6' 'PyYAML>=3.13' 19 21 ''; 20 22 21 23 propagatedBuildInputs = [ pyyaml ];
+4 -3
pkgs/development/python-modules/limiter/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "limiter"; 10 - version = "0.1.2"; 10 + version = "0.2.0"; 11 + format = "setuptools"; 11 12 12 - disabled = pythonOlder "3.7"; 13 + disabled = pythonOlder "3.10"; 13 14 14 15 src = fetchFromGitHub { 15 16 owner = "alexdelorenzo"; 16 17 repo = pname; 17 18 rev = "v${version}"; 18 - sha256 = "0cdqw08qw3cid1yjknlh4hqfl46xh4madkjrl7sxk2c1pbwils8r"; 19 + hash = "sha256-h3XiCR/8rcCBwdhO6ExrrUE9piba5mssad3+t41scSk="; 19 20 }; 20 21 21 22 propagatedBuildInputs = [
+35 -9
pkgs/development/python-modules/loguru/default.nix
··· 1 1 { lib 2 2 , stdenv 3 + , aiocontextvars 3 4 , buildPythonPackage 4 - , fetchPypi 5 - , fetchpatch 6 - , isPy27 7 5 , colorama 6 + , fetchpatch 7 + , fetchPypi 8 8 , pytestCheckHook 9 + , pythonOlder 9 10 }: 10 11 11 12 buildPythonPackage rec { 12 13 pname = "loguru"; 13 14 version = "0.5.3"; 15 + format = "setuptools"; 14 16 15 - disabled = isPy27; 17 + disabled = pythonOlder "3.5"; 16 18 17 19 src = fetchPypi { 18 20 inherit pname version; 19 21 sha256 = "b28e72ac7a98be3d28ad28570299a393dfcd32e5e3f6a353dec94675767b6319"; 20 22 }; 21 23 24 + propagatedBuildInputs = lib.optionals (pythonOlder "3.7") [ 25 + aiocontextvars 26 + ]; 27 + 28 + checkInputs = [ 29 + pytestCheckHook 30 + colorama 31 + ]; 32 + 22 33 patches = [ 23 34 # Fixes tests with pytest>=6.2.2. Will be part of the next release after 0.5.3 24 35 (fetchpatch { 25 36 url = "https://github.com/Delgan/loguru/commit/31cf758ee9d22dbfa125f38153782fe20ac9dce5.patch"; 26 37 sha256 = "1lzbs8akg1s7s6xjl3samf4c4bpssqvwg5fn3mwlm4ysr7jd5y67"; 27 38 }) 28 - # fix tests with Python 3.9 39 + # Fix tests with Python 3.9 29 40 (fetchpatch { 30 41 url = "https://github.com/Delgan/loguru/commit/19f518c5f1f355703ffc4ee62f0e1e397605863e.patch"; 31 42 sha256 = "0yn6smik58wdffr4svqsy2n212fwdlcfcwpgqhl9hq2zlivmsdc6"; 32 43 }) 33 44 ]; 34 45 35 - checkInputs = [ pytestCheckHook colorama ]; 46 + disabledTestPaths = lib.optionals stdenv.isDarwin [ 47 + "tests/test_multiprocessing.py" 48 + ]; 36 49 37 - disabledTestPaths = lib.optionals stdenv.isDarwin [ "tests/test_multiprocessing.py" ]; 38 - disabledTests = [ "test_time_rotation_reopening" "test_file_buffering" ] 39 - ++ lib.optionals stdenv.isDarwin [ "test_rotation_and_retention" "test_rotation_and_retention_timed_file" "test_renaming" "test_await_complete_inheritance" ]; 50 + disabledTests = [ 51 + "test_time_rotation_reopening" 52 + "test_file_buffering" 53 + # Tests are failing with Python 3.10 54 + "test_exception_others" 55 + "" 56 + ] ++ lib.optionals stdenv.isDarwin [ 57 + "test_rotation_and_retention" 58 + "test_rotation_and_retention_timed_file" 59 + "test_renaming" 60 + "test_await_complete_inheritance" 61 + ]; 62 + 63 + pythonImportsCheck = [ 64 + "loguru" 65 + ]; 40 66 41 67 meta = with lib; { 42 68 homepage = "https://github.com/Delgan/loguru";
+2 -2
pkgs/development/python-modules/luftdaten/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "luftdaten"; 14 - version = "0.7.1"; 14 + version = "0.7.2"; 15 15 format = "pyproject"; 16 16 17 17 disabled = pythonOlder "3.8"; ··· 20 20 owner = "home-assistant-ecosystem"; 21 21 repo = "python-luftdaten"; 22 22 rev = version; 23 - sha256 = "sha256-76Y5TJet0WtzYXuK8Og0rmpsUIlXK7b37oesh+MliU8="; 23 + sha256 = "sha256-tYaY/F4mdO5k+Oj+RkNFWP8xqh1xuDyoAKBFzAhamkA="; 24 24 }; 25 25 26 26 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/luxtronik/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "luxtronik"; 11 - version = "0.3.9"; 11 + version = "0.3.10"; 12 12 format = "setuptools"; 13 13 14 14 disabled = pythonOlder "3.7"; ··· 17 17 owner = "Bouni"; 18 18 repo = "python-luxtronik"; 19 19 rev = version; 20 - sha256 = "mScdTQ82tV5fyy1S0YDDOz1UC4VB0OmSXD5gHp53WsE="; 20 + sha256 = "sha256-JPY1HbNZanEsUpQ5W2kAwEFvwNGQI2hoogTZUGIg3YY="; 21 21 }; 22 22 23 23 # Project has no tests
+2 -2
pkgs/development/python-modules/netdata/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "netdata"; 15 - version = "1.0.1"; 15 + version = "1.0.2"; 16 16 format = "pyproject"; 17 17 18 18 disabled = pythonOlder "3.8"; ··· 21 21 owner = "home-assistant-ecosystem"; 22 22 repo = "python-netdata"; 23 23 rev = version; 24 - sha256 = "sha256-4+cTIqytHrCPG7lUZv1IhL7Bk5GlTEveQTtuCkFIepo="; 24 + sha256 = "sha256-D0W+zOpD2+iynhHMZh4obUSJJKmP3DnzA7blNWi6eHk="; 25 25 }; 26 26 27 27 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/pamqp/default.nix
··· 9 9 }: 10 10 11 11 buildPythonPackage rec { 12 - version = "3.0.1"; 12 + version = "3.1.0"; 13 13 pname = "pamqp"; 14 14 15 15 src = fetchPypi { 16 16 inherit pname version; 17 - sha256 = "0a9b49bde3f554ec49b47ebdb789133979985f24d5f4698935ed589a2d4392a4"; 17 + sha256 = "e4f0886d72c6166637a5513626148bf5a7e818073a558980e9aaed8b4ccf30da"; 18 18 }; 19 19 20 20 buildInputs = [ mock nose pep8 pylint mccabe ];
+40 -11
pkgs/development/python-modules/poetry/default.nix
··· 1 - { lib, buildPythonPackage, fetchFromGitHub, isPy27, pythonOlder, fetchpatch 1 + { lib 2 + , buildPythonPackage 2 3 , cachecontrol 3 4 , cachy 4 5 , cleo 5 6 , clikit 7 + , crashtest 8 + , dataclasses 9 + , entrypoints 10 + , fetchFromGitHub 11 + , fetchpatch 6 12 , html5lib 7 13 , httpretty 8 14 , importlib-metadata ··· 12 18 , pexpect 13 19 , pkginfo 14 20 , poetry-core 21 + , pytest-mock 15 22 , pytestCheckHook 16 - , pytest-cov 17 - , pytest-mock 23 + , pythonAtLeast 24 + , pythonOlder 18 25 , requests 19 26 , requests-toolbelt 20 27 , shellingham ··· 26 33 pname = "poetry"; 27 34 version = "1.1.12"; 28 35 format = "pyproject"; 29 - disabled = isPy27; 36 + 37 + disabled = pythonOlder "3.6"; 30 38 31 39 src = fetchFromGitHub { 32 40 owner = "python-poetry"; ··· 42 50 --replace 'version = "^21.2.0"' 'version = ">=21.2"' 43 51 ''; 44 52 45 - nativeBuildInputs = [ intreehooks ]; 53 + nativeBuildInputs = [ 54 + intreehooks 55 + ]; 46 56 47 57 propagatedBuildInputs = [ 48 58 cachecontrol 49 59 cachy 50 60 cleo 51 61 clikit 62 + crashtest 63 + entrypoints 52 64 html5lib 53 65 keyring 54 66 lockfile ··· 60 72 shellingham 61 73 tomlkit 62 74 virtualenv 63 - ] ++ lib.optionals (pythonOlder "3.8") [ importlib-metadata ]; 75 + ] ++ lib.optionals (pythonOlder "3.7") [ 76 + dataclasses 77 + ] ++ lib.optionals (pythonOlder "3.8") [ 78 + importlib-metadata 79 + ]; 64 80 65 81 postInstall = '' 66 82 mkdir -p "$out/share/bash-completion/completions" ··· 71 87 "$out/bin/poetry" completions fish > "$out/share/fish/vendor_completions.d/poetry.fish" 72 88 ''; 73 89 74 - checkInputs = [ pytestCheckHook httpretty pytest-mock pytest-cov ]; 75 - preCheck = "export HOME=$TMPDIR"; 90 + checkInputs = [ 91 + pytestCheckHook 92 + httpretty 93 + pytest-mock 94 + ]; 95 + 96 + preCheck = '' 97 + export HOME=$TMPDIR 98 + ''; 99 + 76 100 disabledTests = [ 77 101 # touches network 78 102 "git" ··· 87 111 "lock" 88 112 # fs permission errors 89 113 "test_builder_should_execute_build_scripts" 114 + ] ++ lib.optionals (pythonAtLeast "3.10") [ 115 + # RuntimeError: 'auto_spec' might be a typo; use unsafe=True if this is intended 116 + "test_info_setup_complex_pep517_error" 90 117 ]; 91 118 92 119 patches = [ 93 120 # The following patch addresses a minor incompatibility with 94 - # pytest-mock. This is addressed upstream in 121 + # pytest-mock. This is addressed upstream in 95 122 # https://github.com/python-poetry/poetry/pull/3457 96 123 (fetchpatch { 97 124 url = "https://github.com/python-poetry/poetry/commit/8ddceb7c52b3b1f35412479707fa790e5d60e691.diff"; ··· 99 126 }) 100 127 ]; 101 128 102 - # allow for package to use pep420's native namespaces 103 - pythonNamespaces = [ "poetry" ]; 129 + # Allow for package to use pep420's native namespaces 130 + pythonNamespaces = [ 131 + "poetry" 132 + ]; 104 133 105 134 meta = with lib; { 106 135 homepage = "https://python-poetry.org/";
+6
pkgs/development/python-modules/pygls/default.nix
··· 29 29 pydantic 30 30 typeguard 31 31 ]; 32 + # We don't know why an early version of pydantic is required, see: 33 + # https://github.com/openlawlibrary/pygls/issues/221 34 + preBuild = '' 35 + substituteInPlace setup.cfg \ 36 + --replace "pydantic>=1.7,<1.9" "pydantic" 37 + ''; 32 38 33 39 checkInputs = [ 34 40 mock
+2 -2
pkgs/development/python-modules/pyhomematic/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "pyhomematic"; 10 - version = "0.1.76"; 10 + version = "0.1.77"; 11 11 12 12 disabled = !isPy3k; 13 13 14 14 src = fetchPypi { 15 15 inherit pname version; 16 - sha256 = "ea2496c920451ded4561e3758c8f77157fc00c40d1f75d8163e399fd3e0d795a"; 16 + sha256 = "00d95c21b95a17bc07586f69c976fb343a103adc0954d7b2d56c7160665625cb"; 17 17 }; 18 18 19 19 checkPhase = ''
+2 -2
pkgs/development/python-modules/pymelcloud/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "pymelcloud"; 13 - version = "2.5.6"; 13 + version = "2.11.0"; 14 14 format = "setuptools"; 15 15 16 16 disabled = pythonOlder "3.8"; ··· 19 19 owner = "vilppuvuorinen"; 20 20 repo = pname; 21 21 rev = "v${version}"; 22 - sha256 = "sha256-QXOL3MftNibo1wUjz/KTQLNDk7pWL9VH/wd7LpEJOmE="; 22 + sha256 = "1q6ny58cn9qy86blxbk6l2iklab7y11b734l7yb1bp35dmy27w26"; 23 23 }; 24 24 25 25 propagatedBuildInputs = [
+10
pkgs/development/python-modules/pyrmvtransport/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchFromGitHub 4 + , fetchpatch 4 5 , pythonOlder 5 6 , flit 6 7 , async-timeout ··· 39 40 pytestCheckHook 40 41 pytest-asyncio 41 42 pytest-httpx 43 + ]; 44 + 45 + patches = [ 46 + # Can be removed with next release, https://github.com/cgtobi/PyRMVtransport/pull/55 47 + (fetchpatch { 48 + name = "update-tests.patch"; 49 + url = "https://github.com/cgtobi/PyRMVtransport/commit/fe93b3d9d625f9ccf8eb7b0c39e0ff41c72d2e77.patch"; 50 + sha256 = "sha256-t+GP5VG1S86vVSsisl85ZHBtOqxIi7QS83DA+HgRet4="; 51 + }) 42 52 ]; 43 53 44 54 pythonImportsCheck = [
+14 -2
pkgs/development/python-modules/pytest-doctestplus/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 + , fetchpatch 3 4 , fetchPypi 4 - , pythonOlder 5 5 , packaging 6 6 , pytest 7 7 , pytestCheckHook 8 + , pythonOlder 8 9 , setuptools-scm 9 10 }: 10 11 11 12 buildPythonPackage rec { 12 13 pname = "pytest-doctestplus"; 13 14 version = "0.11.2"; 15 + format = "setuptools"; 16 + 14 17 disabled = pythonOlder "3.7"; 15 18 16 19 src = fetchPypi { ··· 34 37 pytestCheckHook 35 38 ]; 36 39 40 + patches = [ 41 + # Removal of distutils, https://github.com/astropy/pytest-doctestplus/pull/172 42 + (fetchpatch { 43 + name = "distutils-removal.patch"; 44 + url = "https://github.com/astropy/pytest-doctestplus/commit/ae2ee14cca0cde0fab355936995fa083529b00ff.patch"; 45 + sha256 = "sha256-uryKV7bWw2oz0glyh2lpGqtDPFvRTo8RmI1N1n15/d4="; 46 + }) 47 + ]; 48 + 37 49 disabledTests = [ 38 50 # ERROR: usage: __main__.py [options] [file_or_dir] [file_or_dir] [...] 39 51 # __main__.py: error: unrecognized arguments: --remote-data ··· 49 61 description = "Pytest plugin with advanced doctest features"; 50 62 homepage = "https://astropy.org"; 51 63 license = licenses.bsd3; 52 - maintainers = [ maintainers.costrouc ]; 64 + maintainers = with maintainers; [ costrouc ]; 53 65 }; 54 66 }
+13 -5
pkgs/development/python-modules/pytest-httpx/default.nix
··· 5 5 , pytest 6 6 , pytest-asyncio 7 7 , pytestCheckHook 8 + , pythonOlder 8 9 }: 9 10 10 11 buildPythonPackage rec { 11 12 pname = "pytest-httpx"; 12 - version = "0.15.0"; 13 + version = "0.17.3"; 14 + format = "setuptools"; 15 + 16 + disabled = pythonOlder "3.6"; 13 17 14 18 src = fetchFromGitHub { 15 19 owner = "Colin-b"; 16 20 repo = "pytest_httpx"; 17 21 rev = "v${version}"; 18 - sha256 = "08dxvjkxlnam3r0yp17495d1vksyawzzkpykacjql1gi6hqlfrwg"; 22 + sha256 = "sha256-cJRzjNIN9Fc8vcjmndW+akjxDSp+wFahY2MEslgXIwM="; 19 23 }; 20 24 21 - buildInputs = [ pytest ]; 25 + buildInputs = [ 26 + pytest 27 + ]; 22 28 23 29 propagatedBuildInputs = [ 24 30 httpx ··· 29 35 pytestCheckHook 30 36 ]; 31 37 32 - pythonImportsCheck = [ "pytest_httpx" ]; 38 + pythonImportsCheck = [ 39 + "pytest_httpx" 40 + ]; 33 41 34 42 meta = with lib; { 35 43 description = "Send responses to httpx"; 36 44 homepage = "https://github.com/Colin-b/pytest_httpx"; 37 45 license = licenses.mit; 38 - maintainers = with maintainers; [ SuperSandro2000 ]; 46 + maintainers = with maintainers; [ fab SuperSandro2000 ]; 39 47 }; 40 48 }
+2 -2
pkgs/development/python-modules/scikit-survival/default.nix
··· 15 15 16 16 buildPythonPackage rec { 17 17 pname = "scikit-survival"; 18 - version = "0.16.0"; 18 + version = "0.17.0"; 19 19 20 20 src = fetchPypi { 21 21 inherit pname version; 22 - sha256 = "d3573eb1df9d516c75994a8a82108b6c7a5ca7ea8a9af60b38f3f65c3e227fa7"; 22 + sha256 = "ba49325f6a31e8bdccfb88337aa85218d209e88a6a704e9c41ef13bf749e0f46"; 23 23 }; 24 24 25 25 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/screenlogicpy/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "screenlogicpy"; 11 - version = "0.5.3"; 11 + version = "0.5.4"; 12 12 format = "setuptools"; 13 13 14 14 disabled = pythonOlder "3.6"; ··· 17 17 owner = "dieselrabbit"; 18 18 repo = pname; 19 19 rev = "v${version}"; 20 - sha256 = "1ic19l0xr2wlnc8q6nhvv747k0f4j9k94ix14zkrwpp9nl09sm8j"; 20 + sha256 = "0r9227s4v17jm5n0j31ssnak9f5p7xfvz4r1fwy61286is3j5gbb"; 21 21 }; 22 22 23 23 checkInputs = [
+2 -2
pkgs/development/python-modules/smart-meter-texas/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "smart-meter-texas"; 13 - version = "0.4.7"; 13 + version = "0.5.0"; 14 14 15 15 disabled = pythonOlder "3.6"; 16 16 ··· 18 18 owner = "grahamwetzler"; 19 19 repo = "smart-meter-texas"; 20 20 rev = "v${version}"; 21 - sha256 = "1hfvv3kpkc7i9mn58bjgvwjj0mi2syr8fv4r8bwbhq5sailma27j"; 21 + sha256 = "1f5blmz3w549qjqn5xmdk1fx2pqd76hnlc9p439r7yc473nhw69w"; 22 22 }; 23 23 24 24 postPatch = ''
+4 -3
pkgs/development/python-modules/sounddevice/default.nix
··· 1 1 { lib 2 + , stdenv 2 3 , buildPythonPackage 3 4 , fetchPypi 4 5 , isPy27 ··· 10 11 11 12 buildPythonPackage rec { 12 13 pname = "sounddevice"; 13 - version = "0.4.3"; 14 + version = "0.4.4"; 14 15 disabled = isPy27; 15 16 16 17 src = fetchPypi { 17 18 inherit pname version; 18 - sha256 = "f1667a7467b65fac4c4ebf668b4e9698eb7333fc3d32bc3c7ec9839ea7cb6c20"; 19 + sha256 = "sha256-9pD1qkGKViaMe9vJfWl8ha3QE0xcedRLiirXobhdp4k="; 19 20 }; 20 21 21 22 propagatedBuildInputs = [ cffi numpy portaudio ]; ··· 28 29 patches = [ 29 30 (substituteAll { 30 31 src = ./fix-portaudio-library-path.patch; 31 - portaudio = "${portaudio}/lib/libportaudio.so.2"; 32 + portaudio = "${portaudio}/lib/libportaudio${stdenv.hostPlatform.extensions.sharedLibrary}"; 32 33 }) 33 34 ]; 34 35
+3 -1
pkgs/development/python-modules/spyse-python/default.nix
··· 11 11 buildPythonPackage rec { 12 12 pname = "spyse-python"; 13 13 version = "2.2.3"; 14 + format = "setuptools"; 14 15 15 16 disabled = pythonOlder "3.8"; 16 17 ··· 34 35 postPatch = '' 35 36 substituteInPlace setup.py \ 36 37 --replace "'dataclasses~=0.6'," "" \ 37 - --replace "responses~=0.13.3" "responses>=0.13.3" 38 + --replace "responses~=0.13.3" "responses>=0.13.3" \ 39 + --replace "limiter~=0.1.2" "limiter>=0.1.2" 38 40 ''; 39 41 40 42 pythonImportsCheck = [
+28
pkgs/development/python-modules/syslog-rfc5424-formatter/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + }: 5 + 6 + buildPythonPackage rec { 7 + pname = "syslog-rfc5424-formatter"; 8 + version = "1.2.2"; 9 + 10 + src = fetchFromGitHub { 11 + owner = "easypost"; 12 + repo = pname; 13 + rev = "v${version}"; 14 + sha256 = "17ym5ls5r6dd9pg9frdz8myfq5fxyqlwdq1gygc9vnrxbgw2c9kb"; 15 + }; 16 + 17 + # Tests are not picked up, review later again 18 + doCheck = false; 19 + 20 + pythonImportsCheck = [ "syslog_rfc5424_formatter" ]; 21 + 22 + meta = with lib; { 23 + description = "Python logging formatter for emitting RFC5424 Syslog messages"; 24 + homepage = "https://github.com/easypost/syslog-rfc5424-formatter"; 25 + license = with licenses; [ isc ]; 26 + maintainers = with maintainers; [ fab ]; 27 + }; 28 + }
+7 -2
pkgs/development/python-modules/types-requests/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchPypi 4 + , types-urllib3 4 5 }: 5 6 6 7 buildPythonPackage rec { 7 8 pname = "types-requests"; 8 - version = "2.27.2"; 9 + version = "2.27.5"; 9 10 format = "setuptools"; 10 11 11 12 src = fetchPypi { 12 13 inherit pname version; 13 - sha256 = "c902c5433ad103053011c6ac036317ac6f6a8e8a6926fc470a8d2ef791236da7"; 14 + sha256 = "sha256-pn3BqFEjErjLifO6lfmg5p7zQ2rnfJvU8yjNiPF63aI="; 14 15 }; 16 + 17 + propagatedBuildInputs = [ 18 + types-urllib3 19 + ]; 15 20 16 21 # Module doesn't have tests 17 22 doCheck = false;
+29
pkgs/development/python-modules/types-urllib3/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchPypi 4 + }: 5 + 6 + buildPythonPackage rec { 7 + pname = "types-urllib3"; 8 + version = "1.26.4"; 9 + format = "setuptools"; 10 + 11 + src = fetchPypi { 12 + inherit pname version; 13 + hash = "sha256-NcF74J4bzvOx4hAcUXK5fNt4MwkVlzx0H0wZedhAXvk="; 14 + }; 15 + 16 + # Module doesn't have tests 17 + doCheck = false; 18 + 19 + pythonImportsCheck = [ 20 + "urllib3-stubs" 21 + ]; 22 + 23 + meta = with lib; { 24 + description = "Typing stubs for urllib3"; 25 + homepage = "https://github.com/python/typeshed"; 26 + license = licenses.asl20; 27 + maintainers = with maintainers; [ fab ]; 28 + }; 29 + }
+21 -3
pkgs/development/python-modules/versionfinder/default.nix
··· 1 - { lib, buildPythonPackage, fetchFromGitHub, GitPython, pytestCheckHook, backoff, requests }: 1 + { lib 2 + , backoff 3 + , buildPythonPackage 4 + , fetchFromGitHub 5 + , GitPython 6 + , pytestCheckHook 7 + , pythonOlder 8 + , requests 9 + }: 2 10 3 11 buildPythonPackage rec { 4 12 pname = "versionfinder"; 5 13 version = "1.1.1"; 14 + format = "setuptools"; 15 + 16 + disabled = pythonOlder "3.7"; 6 17 7 18 src = fetchFromGitHub { 8 19 owner = "jantman"; ··· 22 33 ]; 23 34 24 35 disabledTestPaths = [ 25 - # acceptance tests use the network 36 + # Acceptance tests use the network 26 37 "versionfinder/tests/test_acceptance.py" 27 38 ]; 28 39 29 - pythonImportsCheck = [ "versionfinder" ]; 40 + disabledTests = [ 41 + # Tests are out-dated 42 + "TestFindPipInfo" 43 + ]; 44 + 45 + pythonImportsCheck = [ 46 + "versionfinder" 47 + ]; 30 48 31 49 meta = with lib; { 32 50 description = "Find the version of another package, whether installed via pip, setuptools or git";
+8 -1
pkgs/development/python-modules/zeep/default.nix
··· 28 28 buildPythonPackage rec { 29 29 pname = "zeep"; 30 30 version = "4.1.0"; 31 + 31 32 disabled = pythonOlder "3.6"; 32 33 33 34 src = fetchFromGitHub { ··· 71 72 disabledTests = [ 72 73 # lxml.etree.XMLSyntaxError: Extra content at the end of the document, line 2, column 64 73 74 "test_mime_content_serialize_text_xml" 75 + # Tests are outdated 76 + "test_load" 77 + "test_load_cache" 78 + "test_post" 74 79 ]; 75 80 76 - pythonImportsCheck = [ "zeep" ]; 81 + pythonImportsCheck = [ 82 + "zeep" 83 + ]; 77 84 78 85 meta = with lib; { 79 86 description = "Python SOAP client";
+2 -2
pkgs/development/python-modules/zstd/default.nix
··· 4 4 5 5 buildPythonPackage rec { 6 6 pname = "zstd"; 7 - version = "1.5.0.4"; 7 + version = "1.5.1.0"; 8 8 9 9 src = fetchPypi { 10 10 inherit pname version; 11 - sha256 = "0d048f03fc6354c565ac1e36bb6bf697cfe9941217717fc6a2076529d8b860c3"; 11 + sha256 = "9519bb0cd91c4498cd8cf66ef88fb22e5d6a442317704e6afd00b12726d17d0a"; 12 12 }; 13 13 14 14 postPatch = ''
+9 -1
pkgs/development/tools/build-managers/jam/default.nix
··· 16 16 ''; 17 17 18 18 buildPhase = '' 19 + runHook preBuild 20 + 19 21 make jam0 20 - ./jam0 -j$NIX_BUILD_CORES -sBINDIR=$out/bin install 22 + 23 + runHook postBuild 21 24 ''; 22 25 23 26 installPhase = '' 27 + runHook preInstall 28 + 29 + ./jam0 -j$NIX_BUILD_CORES -sBINDIR=$out/bin install 24 30 mkdir -p $out/doc/jam 25 31 cp *.html $out/doc/jam 32 + 33 + runHook postInstall 26 34 ''; 27 35 28 36 enableParallelBuilding = true;
+52
pkgs/development/tools/build-managers/jam/ftjam.nix
··· 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , bison 5 + }: 6 + 7 + stdenv.mkDerivation rec { 8 + pname = "ftjam"; 9 + version = "2.5.2"; 10 + 11 + src = fetchurl { 12 + url = "https://downloads.sourceforge.net/project/freetype/${pname}/${version}/${pname}-${version}.tar.bz2"; 13 + hash = "sha256-6JdzUAqSkS3pGOn+v/q+S2vOedaa8ZRDX04DK4ptZqM="; 14 + }; 15 + 16 + nativeBuildInputs = [ 17 + bison 18 + ]; 19 + 20 + preConfigure = '' 21 + unset AR 22 + ''; 23 + 24 + buildPhase = '' 25 + runHook preBuild 26 + 27 + make jam0 28 + 29 + runHook postBuild 30 + ''; 31 + 32 + installPhase = '' 33 + runHook preInstall 34 + 35 + ./jam0 -j$NIX_BUILD_CORES -sBINDIR=$out/bin install 36 + mkdir -p $out/doc/jam 37 + cp *.html $out/doc/jam 38 + 39 + runHook postInstall 40 + ''; 41 + 42 + enableParallelBuilding = true; 43 + 44 + meta = with lib; { 45 + homepage = "https://freetype.org/jam/"; 46 + description = "Freetype's enhanced, backwards-compatible Jam clone"; 47 + license = licenses.free; 48 + maintainers = with maintainers; [ AndersonTorres ]; 49 + platforms = platforms.unix; 50 + }; 51 + } 52 + # TODO: setup hook for Jam
+3 -3
pkgs/development/tools/gofumpt/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "gofumpt"; 5 - version = "0.2.0"; 5 + version = "0.2.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "mvdan"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-Kgj3f90bAtaVl4mby6FQr4t4BT4I3QLtHhvO10f1BOk="; 11 + sha256 = "sha256-NkflJwFdVcFTjXkDr8qqAFUlKwGNPTso6hvu7Vikn2U="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-gxxK2eUmYUqHjt8HP6OANaHsO43wCaodUDR4BlMY8Zw="; 14 + vendorSha256 = "sha256-RZPfdj+rimKGvRZKaXOirkd7ietri55rBofwa/l2z8s="; 15 15 16 16 doCheck = false; 17 17
+2 -2
pkgs/development/tools/jo/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "jo"; 5 - version = "1.4"; 5 + version = "1.6"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "jpmens"; 9 9 repo = "jo"; 10 10 rev = version; 11 - sha256 ="1jnv3g38vaa66m83hqibyki31ii81xfpvjw6wgdv18ci3iwvsz3v"; 11 + sha256 ="sha256-aATCeJV0x+XHOQbwulutxivPzGVQ0mJj90vA+6IM124="; 12 12 }; 13 13 14 14 enableParallelBuilding = true;
+7 -5
pkgs/development/tools/misc/clojure-lsp/default.nix
··· 2 2 3 3 buildGraalvmNativeImage rec { 4 4 pname = "clojure-lsp"; 5 - version = "2021.11.02-15.24.47"; 5 + version = "2022.01.03-19.46.10"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = pname; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "sha256-PBbo8yx4g4SsViUA1jnwqF8q9Dfn3lrgK2CP026Bm4Q="; 11 + sha256 = "sha256-BbhT4I4M7PwHHFwNDNY4mJxsreJVOEwlValZTgS0Zs8="; 12 12 }; 13 13 14 14 jar = fetchurl { 15 15 url = "https://github.com/clojure-lsp/clojure-lsp/releases/download/${version}/clojure-lsp.jar"; 16 - sha256 = "sha256-k0mzibcLAspklCPE6f2qsUm9bwSvcJRgWecMBq7mpF0="; 16 + sha256 = "sha256-QG9Z4wkzh1kaX44oee325BvY2XqXRo4iBjY5LPnkLBQ="; 17 17 }; 18 18 19 19 # https://github.com/clojure-lsp/clojure-lsp/blob/2021.11.02-15.24.47/graalvm/native-unix-compile.sh#L18-L27 ··· 35 35 36 36 export HOME="$(mktemp -d)" 37 37 ./${pname} --version | fgrep -q '${version}' 38 - ${babashka}/bin/bb integration-test ./${pname} 39 - 38 + '' 39 + # TODO: fix classpath issue per https://github.com/NixOS/nixpkgs/pull/153770 40 + #${babashka}/bin/bb integration-test ./${pname} 41 + + '' 40 42 runHook postCheck 41 43 ''; 42 44
+2 -2
pkgs/development/tools/misc/strace/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "strace"; 5 - version = "5.15"; 5 + version = "5.16"; 6 6 7 7 src = fetchurl { 8 8 url = "https://strace.io/files/${version}/${pname}-${version}.tar.xz"; 9 - sha256 = "sha256-68rCLylzNSlNxlRCXLw84BM0O+zm2iaZ467Iau6Nctw="; 9 + sha256 = "sha256-3H2yMP8+V8JJgwupSsqyuGLaH8qsVUF+m4UEGoM8ooU="; 10 10 }; 11 11 12 12 depsBuildBuild = [ buildPackages.stdenv.cc ];
+59
pkgs/games/blockattack/default.nix
··· 1 + { lib 2 + , stdenv 3 + , fetchFromGitHub 4 + , SDL2 5 + , SDL2_image 6 + , SDL2_mixer 7 + , SDL2_ttf 8 + , boost 9 + , cmake 10 + , gettext 11 + , physfs 12 + , pkg-config 13 + , zip 14 + }: 15 + 16 + stdenv.mkDerivation rec { 17 + pname = "blockattack"; 18 + version = "2.7.0"; 19 + 20 + src = fetchFromGitHub { 21 + name = "${pname}-${version}-src"; 22 + owner = "blockattack"; 23 + repo = "blockattack-game"; 24 + rev = "v${version}"; 25 + hash = "sha256-ySLm3AdoJRiMRdla45OJh8ZIFYNh+HzjG2VnFqoWuZA="; 26 + }; 27 + 28 + nativeBuildInputs = [ 29 + cmake 30 + pkg-config 31 + gettext 32 + zip 33 + ]; 34 + 35 + buildInputs = [ 36 + SDL2 37 + SDL2_image 38 + SDL2_mixer 39 + SDL2_ttf 40 + SDL2_ttf 41 + boost 42 + physfs 43 + ]; 44 + 45 + preConfigure = '' 46 + patchShebangs packdata.sh source/misc/translation/*.sh 47 + chmod +x ./packdata.sh 48 + ./packdata.sh 49 + ''; 50 + 51 + meta = with lib; { 52 + homepage = "https://blockattack.net/"; 53 + description = "An open source clone of Panel de Pon (aka Tetris Attack)"; 54 + license = licenses.gpl2Plus; 55 + maintainers = with maintainers; [ AndersonTorres ]; 56 + platforms = platforms.unix; 57 + broken = stdenv.isDarwin; 58 + }; 59 + }
+75
pkgs/games/the-legend-of-edgar/default.nix
··· 1 + { lib 2 + , stdenv 3 + , fetchFromGitHub 4 + , SDL2 5 + , SDL2_image 6 + , SDL2_mixer 7 + , SDL2_ttf 8 + , gettext 9 + , libpng 10 + , pkg-config 11 + , zlib 12 + }: 13 + 14 + stdenv.mkDerivation rec { 15 + pname = "the-legend-of-edgar"; 16 + version = "1.35"; 17 + 18 + src = fetchFromGitHub { 19 + name = "${pname}-${version}-src"; 20 + owner = "riksweeney"; 21 + repo = "edgar"; 22 + rev = version; 23 + hash = "sha256-ojy4nEW9KiSte/AoFUMPrKCxvIeQpMVIL4ileHiBydo="; 24 + }; 25 + 26 + nativeBuildInputs = [ 27 + pkg-config 28 + gettext 29 + ]; 30 + 31 + buildInputs = [ 32 + SDL2 33 + SDL2_image 34 + SDL2_mixer 35 + SDL2_ttf 36 + libpng 37 + zlib 38 + ]; 39 + 40 + dontConfigure = true; 41 + 42 + makefile = "makefile"; 43 + 44 + makeFlags = [ 45 + "PREFIX=${placeholder "out"}" 46 + "BIN_DIR=${placeholder "out"}/bin/" 47 + ]; 48 + 49 + # TODO: remove the setting below when the next version arrives 50 + # https://github.com/riksweeney/edgar/pull/57 51 + preBuild = '' 52 + export CFLAGS=$(sdl2-config --cflags) 53 + ''; 54 + 55 + meta = with lib; { 56 + homepage = "https://www.parallelrealities.co.uk/games/edgar"; 57 + description = "A 2D platform game with a persistent world"; 58 + longDescription = '' 59 + When Edgar's father fails to return home after venturing out one dark and 60 + stormy night, Edgar fears the worst: he has been captured by the evil 61 + sorcerer who lives in a fortress beyond the forbidden swamp. 62 + 63 + Donning his armour, Edgar sets off to rescue him, but his quest will not 64 + be easy... 65 + 66 + The Legend of Edgar is a platform game, not unlike those found on the 67 + Amiga and SNES. Edgar must battle his way across the world, solving 68 + puzzles and defeating powerful enemies to achieve his quest. 69 + ''; 70 + license = licenses.gpl1Plus; 71 + maintainers = with maintainers; [ AndersonTorres ]; 72 + platforms = platforms.unix; 73 + broken = stdenv.isDarwin; 74 + }; 75 + }
+3 -3
pkgs/misc/emulators/wine/sources.nix
··· 44 44 45 45 unstable = fetchurl rec { 46 46 # NOTE: Don't forget to change the SHA256 for staging as well. 47 - version = "7.0-rc2"; 47 + version = "7.0-rc5"; 48 48 url = "https://dl.winehq.org/wine/source/7.0/wine-${version}.tar.xz"; 49 - sha256 = "sha256-D92OOa9fFdBd0wZbtRLz9oOhhJ3AtHcSZP0EaWyW7X0="; 49 + sha256 = "sha256-jQjHneYAZ3H26EXje9cyoduXN7TakiLksDdzNoi3d1g="; 50 50 inherit (stable) gecko32 gecko64; 51 51 52 52 ## see http://wiki.winehq.org/Mono ··· 65 65 staging = fetchFromGitHub rec { 66 66 # https://github.com/wine-staging/wine-staging/releases 67 67 inherit (unstable) version; 68 - sha256 = "sha256-UkwvKKRXyFjLfYbL8Ienpp5pxUzMQY1bEyAkoP7Xdz4="; 68 + sha256 = "sha256-RFwDI8eGw9BikQ8X+S1+EPHKAgNaYHuZOJzmlg12ROI="; 69 69 owner = "wine-staging"; 70 70 repo = "wine-staging"; 71 71 rev = "v${version}";
+15
pkgs/misc/vscode-extensions/default.nix
··· 144 144 }; 145 145 }; 146 146 147 + antyos.openscad = buildVscodeMarketplaceExtension { 148 + mktplcRef = { 149 + name = "openscad"; 150 + publisher = "Antyos"; 151 + version = "1.1.1"; 152 + sha256 = "1adcw9jj3npk3l6lnlfgji2l529c4s5xp9jl748r9naiy3w3dpjv"; 153 + }; 154 + meta = with lib; { 155 + changelog = "https://marketplace.visualstudio.com/items/Antyos.openscad/changelog"; 156 + description = "OpenSCAD highlighting, snippets, and more for VSCode"; 157 + homepage = "https://github.com/Antyos/vscode-openscad"; 158 + license = licenses.gpl3; 159 + }; 160 + }; 161 + 147 162 apollographql.vscode-apollo = buildVscodeMarketplaceExtension { 148 163 mktplcRef = { 149 164 name = "vscode-apollo";
+2 -2
pkgs/os-specific/linux/android-udev-rules/default.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "android-udev-rules"; 9 - version = "20210501"; 9 + version = "20220102"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "M0Rf30"; 13 13 repo = "android-udev-rules"; 14 14 rev = version; 15 - sha256 = "sha256-rlTulWclPqMl9LdHdcAtLARXGItiSeF3RX+neZrjgV4="; 15 + sha256 = "sha256-D2dPFvuFcZtosfTfsW0lmK5y8zqHdIxJBlvmP/R91CE="; 16 16 }; 17 17 18 18 installPhase = ''
+3 -11
pkgs/servers/mail/opensmtpd/extras.nix
··· 1 - { lib, stdenv, fetchurl, openssl, libevent, libasr, 2 - python2, pkg-config, lua5, perl, libmysqlclient, postgresql, sqlite, hiredis, 3 - enablePython ? true, 1 + { lib, stdenv, fetchurl, openssl, libevent, libasr, ncurses, 2 + pkg-config, lua5, perl, libmysqlclient, postgresql, sqlite, hiredis, 4 3 enableLua ? true, 5 4 enablePerl ? true, 6 5 enableMysql ? true, ··· 20 19 21 20 nativeBuildInputs = [ pkg-config ]; 22 21 buildInputs = [ openssl libevent 23 - libasr python2 lua5 perl libmysqlclient postgresql sqlite hiredis ]; 22 + libasr lua5 perl libmysqlclient postgresql sqlite hiredis ]; 24 23 25 24 configureFlags = [ 26 25 "--sysconfdir=/etc" ··· 47 46 "--with-table-stub" 48 47 "--with-scheduler-ram" 49 48 "--with-scheduler-stub" 50 - 51 - ] ++ lib.optionals enablePython [ 52 - "--with-python=${python2}" 53 - "--with-filter-python" 54 - "--with-queue-python" 55 - "--with-table-python" 56 - "--with-scheduler-python" 57 49 58 50 ] ++ lib.optionals enableLua [ 59 51 "--with-lua=${pkg-config}"
+3
pkgs/servers/teleport/default.nix
··· 6 6 , protobuf 7 7 , stdenv 8 8 , xdg-utils 9 + , nixosTests 9 10 10 11 , withRoleTester ? true 11 12 }: ··· 94 95 $out/bin/tctl version | grep ${version} > /dev/null 95 96 $out/bin/teleport version | grep ${version} > /dev/null 96 97 ''; 98 + 99 + passthru.tests = nixosTests.teleport; 97 100 98 101 meta = with lib; { 99 102 description = "Certificate authority and access plane for SSH, Kubernetes, web applications, and databases";
+29
pkgs/servers/web-apps/baget/default.nix
··· 1 + { buildDotnetModule, lib, fetchFromGitHub, dotnetCorePackages }: 2 + 3 + buildDotnetModule rec { 4 + pname = "BaGet"; 5 + version = "0.4.0-preview2"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "loic-sharma"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "S/3CjXB/fBDzxLuQBQB3CKgEkmzUA8ZzzvzXLN8hfBU="; 12 + }; 13 + 14 + projectFile = "src/BaGet/BaGet.csproj"; 15 + nugetDeps = ./deps.nix; 16 + 17 + dotnet-sdk = dotnetCorePackages.sdk_3_1; 18 + dotnet-runtime = dotnetCorePackages.aspnetcore_3_1; 19 + 20 + passthru.updateScript = ./updater.sh; 21 + 22 + meta = with lib; { 23 + description = "A lightweight NuGet and symbol server"; 24 + license = licenses.mit; 25 + homepage = "https://loic-sharma.github.io/BaGet/"; 26 + platforms = platforms.all; 27 + maintainers = [ maintainers.abbradar ]; 28 + }; 29 + }
+396
pkgs/servers/web-apps/baget/deps.nix
··· 1 + { fetchNuGet }: [ 2 + (fetchNuGet { pname = "Aliyun.OSS.SDK.NetCore"; version = "2.9.1"; sha256 = "0j07j6cr0lqmmdwgz5alxlq5ifa5vzb58r1rqkgvf49nirz6jhfs"; }) 3 + (fetchNuGet { pname = "AWSSDK.Core"; version = "3.3.104.22"; sha256 = "1930axxsbiahv0rrav34zj355fwxx4nzbvd93sp5g94z6pdh0438"; }) 4 + (fetchNuGet { pname = "AWSSDK.S3"; version = "3.3.110.20"; sha256 = "0i8vcyxmszhsdm73fvg17yx6hfslml3y1sw0cd1lzv10avqfb7v9"; }) 5 + (fetchNuGet { pname = "AWSSDK.SecurityToken"; version = "3.3.104.27"; sha256 = "13ywh3d8fc8ndyg40yh386fw54s1w4sw9qqbjvmh40nb20s4wwrv"; }) 6 + (fetchNuGet { pname = "Google.Api.Gax"; version = "2.5.0"; sha256 = "0q6pi53px998i3gdndla8v0zqdpyi9gnsy9mdcfpkrg09vfbdsl9"; }) 7 + (fetchNuGet { pname = "Google.Api.Gax.Rest"; version = "2.5.0"; sha256 = "1zkjl5zh6qwdz4qmnxnk5877pas638i2qi25znilhqqf3mrkp0rp"; }) 8 + (fetchNuGet { pname = "Google.Apis"; version = "1.35.1"; sha256 = "1022l8m7v9f3rkjc9l11mkzwsbmqx9sk5f4aym035vn9hdr16d49"; }) 9 + (fetchNuGet { pname = "Google.Apis.Auth"; version = "1.35.1"; sha256 = "1qdnd1nq9bfgyljmiww91pfi0iz1n29rz2dlizhxcijqya2ldha3"; }) 10 + (fetchNuGet { pname = "Google.Apis.Core"; version = "1.35.1"; sha256 = "01dfw2kxknlc5pm7x1q88lv9j979509lkkgvlffjry5bawsxsja4"; }) 11 + (fetchNuGet { pname = "Google.Apis.Storage.v1"; version = "1.35.1.1266"; sha256 = "16wmqv0nqw8s0cmv2zmjd8raz2swygqn9jqg18ja1bfaz88r5c3l"; }) 12 + (fetchNuGet { pname = "Google.Cloud.Storage.V1"; version = "2.2.1"; sha256 = "0jpzca4xs82p3yyni8c1chq2pzzvmpf3j25ch0wj1w2ha36r9acj"; }) 13 + (fetchNuGet { pname = "Humanizer"; version = "2.11.10"; sha256 = "057pqzvdxsbpnnc5f1xkqg7j3ywp68ggia3w74fgqp0158dm6rdk"; }) 14 + (fetchNuGet { pname = "Humanizer.Core"; version = "2.11.10"; sha256 = "0z7kmd5rh1sb6izq0vssk6c2p63n00xglk45s7ga9z18z9aaskxv"; }) 15 + (fetchNuGet { pname = "Humanizer.Core.af"; version = "2.11.10"; sha256 = "18fiixfvjwn8m1i8z2cz4aqykzylvfdqmmpwc2zcd8sr1a2xm86z"; }) 16 + (fetchNuGet { pname = "Humanizer.Core.ar"; version = "2.11.10"; sha256 = "009fpm4jd325izm82ipipsvlwd31824gvskda68bdwi4yqmycz4p"; }) 17 + (fetchNuGet { pname = "Humanizer.Core.az"; version = "2.11.10"; sha256 = "144b9diwprabxwgi5a98k5iy95ajq4p7356phdqi2lhzwbz7b6a9"; }) 18 + (fetchNuGet { pname = "Humanizer.Core.bg"; version = "2.11.10"; sha256 = "1b9y40gvq2kwnj5wa40f8cbywv79jkajcwknagrgr27sykpfadl2"; }) 19 + (fetchNuGet { pname = "Humanizer.Core.bn-BD"; version = "2.11.10"; sha256 = "18pn4jcp36ygcx283l3fi9bs5d7q1a384b72a10g5kl0qckn88ay"; }) 20 + (fetchNuGet { pname = "Humanizer.Core.cs"; version = "2.11.10"; sha256 = "03crw1lnzp32v2kcdmllkrsqh07r4ggw9gyc96qw7cv0nk5ch1h8"; }) 21 + (fetchNuGet { pname = "Humanizer.Core.da"; version = "2.11.10"; sha256 = "0glby12zra3y3yiq4cwq1m6wjcjl8f21v8ghi6s20r48glm8vzy9"; }) 22 + (fetchNuGet { pname = "Humanizer.Core.de"; version = "2.11.10"; sha256 = "0a35xrm1f9p74x0fkr52bw9sd54vdy9d5rnvf565yh8ww43xfk7b"; }) 23 + (fetchNuGet { pname = "Humanizer.Core.el"; version = "2.11.10"; sha256 = "0bhwwdx5vc48zikdsbrkghdhwahxxc2lkff0yaa5nxhbhasl84h8"; }) 24 + (fetchNuGet { pname = "Humanizer.Core.es"; version = "2.11.10"; sha256 = "07bw07qy8nyzlgxl7l2lxv9f78qmkfppgzx7iyq5ikrcnpvc7i9q"; }) 25 + (fetchNuGet { pname = "Humanizer.Core.fa"; version = "2.11.10"; sha256 = "00d4hc1pfmhfkc5wmx9p7i00lgi4r0k6wfcns9kl1syjxv3bs5f2"; }) 26 + (fetchNuGet { pname = "Humanizer.Core.fi-FI"; version = "2.11.10"; sha256 = "0z4is7pl5jpi4pfdvd2zvx5mp00bj26d9l9ksqyc0liax8nfzyik"; }) 27 + (fetchNuGet { pname = "Humanizer.Core.fr"; version = "2.11.10"; sha256 = "0sybpg6kbbhrnk7gxcdk7ppan89lsfqsdssrg4i1dm8w48wgicap"; }) 28 + (fetchNuGet { pname = "Humanizer.Core.fr-BE"; version = "2.11.10"; sha256 = "1s25c86nl9wpsn6fydzwv4rfmdx5sm0vgyd7xhw5344k20gazvhv"; }) 29 + (fetchNuGet { pname = "Humanizer.Core.he"; version = "2.11.10"; sha256 = "1nx61qkjd6p9r36dmnm4942khyv35fpdqmb2w69gz6463g4d7z29"; }) 30 + (fetchNuGet { pname = "Humanizer.Core.hr"; version = "2.11.10"; sha256 = "02jhcyj72prkqsjxyilv04drm0bknqjh2r893jlbsfi9vjg2zay3"; }) 31 + (fetchNuGet { pname = "Humanizer.Core.hu"; version = "2.11.10"; sha256 = "0yb6ly4s1wdyaf96h2dvifqyb575aid6irwl3qx8gcvrs0xpcxdp"; }) 32 + (fetchNuGet { pname = "Humanizer.Core.hy"; version = "2.11.10"; sha256 = "0b7vaqldn7ca3xi4gkvkhjk900kw2zwb0m0d20bg45a83zdlx79c"; }) 33 + (fetchNuGet { pname = "Humanizer.Core.id"; version = "2.11.10"; sha256 = "1yqxirknwga4j18k7ixwgqxlv20479afanhariy3c5mkwvglsr9b"; }) 34 + (fetchNuGet { pname = "Humanizer.Core.it"; version = "2.11.10"; sha256 = "1skwgj5a6kkx3pm9w4f29psch69h1knmwbkdydlmx13h452p1w4l"; }) 35 + (fetchNuGet { pname = "Humanizer.Core.ja"; version = "2.11.10"; sha256 = "1wpc3yz9v611dqbw8j5yimk8dpz0rvpnls4rmlnp1m47gavpj8x4"; }) 36 + (fetchNuGet { pname = "Humanizer.Core.ko-KR"; version = "2.11.10"; sha256 = "1df0kd7vwdc3inxfkb3wsl1aw3d6vbab99dzh08p4m04g7i2c1a9"; }) 37 + (fetchNuGet { pname = "Humanizer.Core.ku"; version = "2.11.10"; sha256 = "17b66xfgwjr0sffx0hw4c6l90h43z7ffylrs26hgav0n110q2nwg"; }) 38 + (fetchNuGet { pname = "Humanizer.Core.lv"; version = "2.11.10"; sha256 = "0czxx4b9g0w7agykdl82wds09zasa9y58dmgjm925amlfz4wkyzs"; }) 39 + (fetchNuGet { pname = "Humanizer.Core.ms-MY"; version = "2.11.10"; sha256 = "0kix95nbw94fx0dziyz80y59i7ii7d21b63f7f94niarljjq36i3"; }) 40 + (fetchNuGet { pname = "Humanizer.Core.mt"; version = "2.11.10"; sha256 = "1rwy6m22pq65gxn86xlr9lv818fp5kb0wz98zxxfljc2iviw1f4p"; }) 41 + (fetchNuGet { pname = "Humanizer.Core.nb"; version = "2.11.10"; sha256 = "0ra2cl0avvv4sylha7z76jxnb4pdiqfbpr5m477snr04dsjxd9q9"; }) 42 + (fetchNuGet { pname = "Humanizer.Core.nb-NO"; version = "2.11.10"; sha256 = "1qszib03pvmjkrg8za7jjd2vzrs9p4fn2rmy82abnzldkhvifipq"; }) 43 + (fetchNuGet { pname = "Humanizer.Core.nl"; version = "2.11.10"; sha256 = "1i9bvy0i2yyasl9mgxiiwrkmfpm2c53d3wwdp9270r6120sxyy63"; }) 44 + (fetchNuGet { pname = "Humanizer.Core.pl"; version = "2.11.10"; sha256 = "0kggh4wgcic7wzgxy548n6w61schss2ccf9kz8alqshfi42xifby"; }) 45 + (fetchNuGet { pname = "Humanizer.Core.pt"; version = "2.11.10"; sha256 = "09j90s8x1lpvhfiy3syfnj8slkgcacf3xjy3pnkgxa6g4mi4f4bd"; }) 46 + (fetchNuGet { pname = "Humanizer.Core.ro"; version = "2.11.10"; sha256 = "1jgidmqfly91v1k22gn687mfql5bz7gjzp1aapi93vq5x635qssy"; }) 47 + (fetchNuGet { pname = "Humanizer.Core.ru"; version = "2.11.10"; sha256 = "13mmlh0ibxfyc85xrz3vx4mcg56mkzqql184iwdryq94p0g5ahil"; }) 48 + (fetchNuGet { pname = "Humanizer.Core.sk"; version = "2.11.10"; sha256 = "04ja06y5jaz1jwkwn117wx9cib04gpbi0vysn58a8sd5jrxmxai5"; }) 49 + (fetchNuGet { pname = "Humanizer.Core.sl"; version = "2.11.10"; sha256 = "05hxk9v3a7fn7s4g9jp5zxk2z6a33b9fkavyb1hjqnl2i37q2wja"; }) 50 + (fetchNuGet { pname = "Humanizer.Core.sr"; version = "2.11.10"; sha256 = "0x6l2msimrx72iywa1g0rqklgy209sdwg0r77i2lz0s1rvk5klm5"; }) 51 + (fetchNuGet { pname = "Humanizer.Core.sr-Latn"; version = "2.11.10"; sha256 = "01hdyn7mmbyy7f3aglawgnsj3nblcdpqjgzdcvniy73l536mira0"; }) 52 + (fetchNuGet { pname = "Humanizer.Core.sv"; version = "2.11.10"; sha256 = "0cbgchivw3d5ndib1zmgzmnymhyvfh9g9f0hijc860g5vaa9fkvh"; }) 53 + (fetchNuGet { pname = "Humanizer.Core.th-TH"; version = "2.11.10"; sha256 = "1v7f9x3b04iwhz9lb3ir8az8128nvcw1gi4park5zh3fg0f3mni0"; }) 54 + (fetchNuGet { pname = "Humanizer.Core.tr"; version = "2.11.10"; sha256 = "02c4ky0dskxkdrkc7vy8yzmvwjr1wqll1kzx0k21afhlx8xynjd4"; }) 55 + (fetchNuGet { pname = "Humanizer.Core.uk"; version = "2.11.10"; sha256 = "0900ilhwj8yvhyzpg1pjr7f5vrl62wp8dsnhk4c2igs20qvnv079"; }) 56 + (fetchNuGet { pname = "Humanizer.Core.uz-Cyrl-UZ"; version = "2.11.10"; sha256 = "09b7p2m8y49j49ckrmx2difgyj6y7fm2mwca093j8psxclsykcyr"; }) 57 + (fetchNuGet { pname = "Humanizer.Core.uz-Latn-UZ"; version = "2.11.10"; sha256 = "029kvkawqhlln52vpjpvr52dhr18ylk01cgsj2z8lxnqaka0q9hk"; }) 58 + (fetchNuGet { pname = "Humanizer.Core.vi"; version = "2.11.10"; sha256 = "0q4d47plsj956ivn82qwyidfxppjr9dp13m8c66aamrvhy4q8ny5"; }) 59 + (fetchNuGet { pname = "Humanizer.Core.zh-CN"; version = "2.11.10"; sha256 = "01dy5kf6ai8id77px92ji4kcxjc8haj39ivv55xy1afcg3qiy7mh"; }) 60 + (fetchNuGet { pname = "Humanizer.Core.zh-Hans"; version = "2.11.10"; sha256 = "16gcxgw2g6gck3nc2hxzlkbsg7wkfaqsjl87kasibxxh47zdqqv2"; }) 61 + (fetchNuGet { pname = "Humanizer.Core.zh-Hant"; version = "2.11.10"; sha256 = "1rjg2xvkwjjw3c7z9mdjjvbnl9lcvvhh4fr7l61rla2ynzdk46cj"; }) 62 + (fetchNuGet { pname = "Markdig"; version = "0.26.0"; sha256 = "1pg0yica8h1c2kx10pqzc5iclmlfll5wbw1bxa8l251w1qnfglv2"; }) 63 + (fetchNuGet { pname = "McMaster.Extensions.CommandLineUtils"; version = "2.5.0"; sha256 = "010vqyg5mb3cjzxznawxz7wvidj1yv664xgz93vf1zrww5vz6aal"; }) 64 + (fetchNuGet { pname = "Microsoft.AspNetCore.Mvc.Razor.Extensions"; version = "3.1.18"; sha256 = "0s168gac3g8666pllnmjdbq1v981qgc1wqypyl6pp92jvzvkndp6"; }) 65 + (fetchNuGet { pname = "Microsoft.AspNetCore.Mvc.Razor.RuntimeCompilation"; version = "3.1.18"; sha256 = "0069qv17rapqhp2hjzzqim5zxb6clmr9bj4vmfd2pm4byp215flj"; }) 66 + (fetchNuGet { pname = "Microsoft.AspNetCore.Razor.Language"; version = "3.1.18"; sha256 = "0rm6a5hsj4d2a1nlzfb34bm5z7wr826zg25xfbg51a3zvbgva9m7"; }) 67 + (fetchNuGet { pname = "Microsoft.Azure.Cosmos.Table"; version = "1.0.0"; sha256 = "0ms3nkifj3j7i1h6bxw49fha2iamxdxkzi51q37n0czcszx36apg"; }) 68 + (fetchNuGet { pname = "Microsoft.Azure.DocumentDB.Core"; version = "2.1.3"; sha256 = "017jq5a5ba4wmrrfr7daa07asnjl8xgvncgxlcyy83mln0xm67a5"; }) 69 + (fetchNuGet { pname = "Microsoft.Azure.KeyVault.Core"; version = "2.0.4"; sha256 = "0rv7z989zxk5myqd4n2a9ccxx9jr4jb3fslc6b4w3p0570af60hn"; }) 70 + (fetchNuGet { pname = "Microsoft.Azure.Search"; version = "5.0.1"; sha256 = "1xpwgcwahflrq5qa2acn0y5x1660qlh5iy0xmn6bisf9pbs6g7hr"; }) 71 + (fetchNuGet { pname = "Microsoft.Azure.Search.Common"; version = "5.0.1"; sha256 = "1ybbvm3iyi7r6v6j19jb16lqlq3am51wg68mzk3jdflk5czn28p7"; }) 72 + (fetchNuGet { pname = "Microsoft.Azure.Search.Data"; version = "5.0.1"; sha256 = "05skk65y8miwjzwvrr5br94byqipygi3mccl9x5wzbxqdhma7chq"; }) 73 + (fetchNuGet { pname = "Microsoft.Azure.Search.Service"; version = "5.0.1"; sha256 = "00767bbdi1zxb3vvw8k4666iv7wfb3fyxcligrin04qn9spjd2h7"; }) 74 + (fetchNuGet { pname = "Microsoft.Azure.Storage.Blob"; version = "9.4.1"; sha256 = "11273cf1a6rir6z016sa8r8jmrxc66zyhicciyyzanph6jwdfbf6"; }) 75 + (fetchNuGet { pname = "Microsoft.Azure.Storage.Common"; version = "9.4.1"; sha256 = "0kwrsfw0g8bciy53qrmgff8b8ik8wgn92szx0hdnvaqnv5dphsij"; }) 76 + (fetchNuGet { pname = "Microsoft.Bcl.AsyncInterfaces"; version = "1.0.0"; sha256 = "00dx5armvkqjxvkldz3invdlck9nj7w21dlsr2aqp1rqbyrbsbbh"; }) 77 + (fetchNuGet { pname = "Microsoft.Bcl.AsyncInterfaces"; version = "1.1.0"; sha256 = "1dq5yw7cy6s42193yl4iqscfw5vzkjkgv0zyy32scr4jza6ni1a1"; }) 78 + (fetchNuGet { pname = "Microsoft.Bcl.AsyncInterfaces"; version = "1.1.1"; sha256 = "0a1ahssqds2ympr7s4xcxv5y8jgxs7ahd6ah6fbgglj4rki1f1vw"; }) 79 + (fetchNuGet { pname = "Microsoft.Bcl.HashCode"; version = "1.1.0"; sha256 = "1ggsadahlp76zcn1plapszd5v5ja8rh479fwrahqd3knql4dfnr0"; }) 80 + (fetchNuGet { pname = "Microsoft.Bcl.HashCode"; version = "1.1.1"; sha256 = "0xwfph92p92d8hgrdiaka4cazqsjpg4ywfxfx6qbk3939f29kzl0"; }) 81 + (fetchNuGet { pname = "Microsoft.Build.Tasks.Git"; version = "1.0.0"; sha256 = "0avwja8vk56f2kr2pmrqx3h60bnwbs7ds062lhvhcxv87m5yfqnj"; }) 82 + (fetchNuGet { pname = "Microsoft.CodeAnalysis.Analyzers"; version = "2.9.3"; sha256 = "1kskwc9gyd2sx3zwx52qwfsl7s0xhaclmlnxvjsb4jgvpydv3xii"; }) 83 + (fetchNuGet { pname = "Microsoft.CodeAnalysis.Common"; version = "3.3.0"; sha256 = "1vwhsp3pjgcfnpapkps9a3z9n2ryiv5bbhzycfljngj5grj63rg2"; }) 84 + (fetchNuGet { pname = "Microsoft.CodeAnalysis.CSharp"; version = "3.3.0"; sha256 = "09nmd5h1r2q0dwp1dfpn4anvs8sfi3rwcgpcv28lrhky8vc51424"; }) 85 + (fetchNuGet { pname = "Microsoft.CodeAnalysis.Razor"; version = "3.1.18"; sha256 = "1fa10n15mifbwq2yilpkmag6apaix1nxb643306a4cmcjvr9nvp1"; }) 86 + (fetchNuGet { pname = "Microsoft.CSharp"; version = "4.0.1"; sha256 = "0zxc0apx1gcx361jlq8smc9pfdgmyjh6hpka8dypc9w23nlsh6yj"; }) 87 + (fetchNuGet { pname = "Microsoft.CSharp"; version = "4.3.0"; sha256 = "0gw297dgkh0al1zxvgvncqs0j15lsna9l1wpqas4rflmys440xvb"; }) 88 + (fetchNuGet { pname = "Microsoft.CSharp"; version = "4.5.0"; sha256 = "01i28nvzccxbqmiz217fxs6hnjwmd5fafs37rd49a6qp53y6623l"; }) 89 + (fetchNuGet { pname = "Microsoft.CSharp"; version = "4.7.0"; sha256 = "0gd67zlw554j098kabg887b5a6pq9kzavpa3jjy5w53ccjzjfy8j"; }) 90 + (fetchNuGet { pname = "Microsoft.Data.SqlClient"; version = "1.1.3"; sha256 = "18mfc77xbi84iga9zrh227hl3jv7p0mbarxvz4qrws0fknsbx4r9"; }) 91 + (fetchNuGet { pname = "Microsoft.Data.Sqlite.Core"; version = "3.1.18"; sha256 = "1vh9jjpgqr33kyp72n7k6xkqsd0q978p84lf54rm50krlkx31q0h"; }) 92 + (fetchNuGet { pname = "Microsoft.DotNet.PlatformAbstractions"; version = "3.1.6"; sha256 = "0b9myd7gqbpaw9pkd2bx45jhik9mwj0f1ss57sk2cxmag2lkdws5"; }) 93 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore"; version = "3.1.0"; sha256 = "1l12lsk1xfrv5pjnm0b9w9kncgdh0pcjcbxl4zrsg82s7bs7dhda"; }) 94 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore"; version = "3.1.18"; sha256 = "1y3g71d2i3azsnb995379rspchhbr1ivi1b1kfm0gx8swrp1j1wy"; }) 95 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore"; version = "3.1.1"; sha256 = "1ymnxrd79fx4q3aq0d7m8dpx4gyqkbjm960knm4yd3889mlxkish"; }) 96 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Abstractions"; version = "3.1.0"; sha256 = "1bd6hilnwp47z3l14qspdxi5f5nhv6rivarc6w8wil425bq0h3pd"; }) 97 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Abstractions"; version = "3.1.18"; sha256 = "0d00d6wx2mm5bav39bjsikjq0sx6qmp183dbwimfda7wav2bwya8"; }) 98 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Abstractions"; version = "3.1.1"; sha256 = "0ddjfxp7k5jgk1fmzjcfxiijcf59mpi5y9lvcr7ly7dhkpx2gsg8"; }) 99 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Analyzers"; version = "3.1.0"; sha256 = "1pjn4wwhxgsiap7byld114kx6m0nm6696r8drspqic7lskm4y305"; }) 100 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Analyzers"; version = "3.1.18"; sha256 = "10h1w3lv3gxcf24hhy5av4fvdjxdm2iimzp7kz9zh9cm1jg5n0vl"; }) 101 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Analyzers"; version = "3.1.1"; sha256 = "0vh2i1wc8514wa5brspn53sa2l034cpjswsvi0d84dnb04aw3b4b"; }) 102 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Design"; version = "3.1.18"; sha256 = "0vfn4kni1sgcw8js60gc4cs3g6chfw1mar2jz07bvgjv8wxlv7qw"; }) 103 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Relational"; version = "3.1.0"; sha256 = "0javqw6c27ppcysigjvcjcw3mk0gg1pv2pmwfpvvryr1pb4a9n55"; }) 104 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Relational"; version = "3.1.18"; sha256 = "0mlq9gmxrmix68mdh0lv803cx15lzrhs5d9622vj8wwdlngg3xdx"; }) 105 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Relational"; version = "3.1.1"; sha256 = "1qzw1rd5isa45xbyyq9vg2p04rnbfb2dinfllaaf7qaxy7mhxv65"; }) 106 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Sqlite"; version = "3.1.18"; sha256 = "0fs2900masv6j7j8n4kc05n2g55k7cgkhfkp5vb9pn7s2aw90kzi"; }) 107 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Sqlite.Core"; version = "3.1.18"; sha256 = "1m6v8g8jacrsfdl3i5q82g3k9y4wb2r3fh739ih66nlv9jbb81q6"; }) 108 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.SqlServer"; version = "3.1.18"; sha256 = "08slvfh5p06rwr1n93x44ka54f5qcnkc5b0qig887dxy4yl3kiwk"; }) 109 + (fetchNuGet { pname = "Microsoft.Extensions.Caching.Abstractions"; version = "3.1.0"; sha256 = "0j5m2a48rwyzzvbz0hpr2md35iv78b86zyqjnrjq0y4vb7sairc0"; }) 110 + (fetchNuGet { pname = "Microsoft.Extensions.Caching.Abstractions"; version = "3.1.18"; sha256 = "0qb3csiz02mh85x1yv0wh6x0c4c9d7kml5nhs9n6z0mykpfybqpc"; }) 111 + (fetchNuGet { pname = "Microsoft.Extensions.Caching.Abstractions"; version = "3.1.1"; sha256 = "1m303nrhcjydw8ij3fmf1w8zxpli84l6k1d4ml56yrpc1n6zxmjq"; }) 112 + (fetchNuGet { pname = "Microsoft.Extensions.Caching.Memory"; version = "3.1.0"; sha256 = "1hi61647apn25kqjcb37nqafp8fikymdrk43j3kxjbwwwx507jy1"; }) 113 + (fetchNuGet { pname = "Microsoft.Extensions.Caching.Memory"; version = "3.1.18"; sha256 = "0fdnk16nas3gdkcjqiq3h0rkqv6ajvbp7lvrssa21av258wnvm3w"; }) 114 + (fetchNuGet { pname = "Microsoft.Extensions.Caching.Memory"; version = "3.1.1"; sha256 = "0nyq1iwjql9w2w83sjimsry8chl53372rbvq9jwng3mdzv9qzni4"; }) 115 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration"; version = "3.1.0"; sha256 = "1rszgz0rd5kvib5fscz6ss3pkxyjwqy0xpd4f2ypgzf5z5g5d398"; }) 116 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration"; version = "3.1.18"; sha256 = "0fpvm1h9n0vib4fwvvify2zkc8yzgg8p2qbqrqlp5fd3ppqivjqh"; }) 117 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration"; version = "3.1.1"; sha256 = "1dmhci4qlwqmfgya02yi02xzv31v8g45mq1c4ffigs8jq8qn4f77"; }) 118 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration.Abstractions"; version = "3.1.0"; sha256 = "1f7h52kamljglx5k08ccryilvk6d6cvr9c26lcb6b2c091znzk0q"; }) 119 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration.Abstractions"; version = "3.1.18"; sha256 = "1aycn9rwfygdaw5wnb68ql96sb6midm6mj4742dcl9ibkrgks43w"; }) 120 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration.Abstractions"; version = "3.1.1"; sha256 = "1a1bixlm8wxf2fsr67qdm7k6p441sx2sfjpcjd3rm5df2v2y9zbv"; }) 121 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration.Binder"; version = "3.1.0"; sha256 = "13jj7jxihiswmhmql7r5jydbca4x5qj6h7zq10z17gagys6dc7pw"; }) 122 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration.Binder"; version = "3.1.18"; sha256 = "1bxcqfh75xypiqq2ljf1rwy7yq58a07g9g12jnlh4x7xba9xd4j0"; }) 123 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration.Binder"; version = "3.1.1"; sha256 = "1brd1cxhkp5cg2wfkjkkyyvkzi4mdzyjafq94rbndzcxn9gxvz39"; }) 124 + (fetchNuGet { pname = "Microsoft.Extensions.DependencyInjection"; version = "3.1.0"; sha256 = "1xc61dy07bn2q73mx1z3ylrw80xpa682qjby13gklnqq636a3gab"; }) 125 + (fetchNuGet { pname = "Microsoft.Extensions.DependencyInjection"; version = "3.1.18"; sha256 = "0r8fs4pax5pyfny3ppav4v4by3l7r0xpkax9gvq91w3pzvlfvriz"; }) 126 + (fetchNuGet { pname = "Microsoft.Extensions.DependencyInjection"; version = "3.1.1"; sha256 = "01x8a8djyxcqv3fhp1q647b9y720xbbp1922vw9by4zh8f0lzs2w"; }) 127 + (fetchNuGet { pname = "Microsoft.Extensions.DependencyInjection.Abstractions"; version = "3.1.0"; sha256 = "1pvms778xkyv1a3gfwrxnh8ja769cxi416n7pcidn9wvg15ifvbh"; }) 128 + (fetchNuGet { pname = "Microsoft.Extensions.DependencyInjection.Abstractions"; version = "3.1.18"; sha256 = "0kvxyhhs5k7xx51ihc8hppbzpcn34bdzmnp42gy2m359wl3iq0c3"; }) 129 + (fetchNuGet { pname = "Microsoft.Extensions.DependencyInjection.Abstractions"; version = "3.1.1"; sha256 = "1k6k6h00p9hpr9jjq5vy4zwn9ggzldzm97gwjil6hpr3kxawb37n"; }) 130 + (fetchNuGet { pname = "Microsoft.Extensions.DependencyModel"; version = "3.1.6"; sha256 = "13m2na8a5mglbbjjp0dxb8ifkf23grkyk1g8585mr7v6cbj098ac"; }) 131 + (fetchNuGet { pname = "Microsoft.Extensions.Logging"; version = "3.1.0"; sha256 = "1d3yhqj1rav7vswm747j7w8fh8paybji4rz941hhlq4b12mfqfh4"; }) 132 + (fetchNuGet { pname = "Microsoft.Extensions.Logging"; version = "3.1.18"; sha256 = "0llw82p6crp0329n3rsyrqka21c3dqyjk8lbk25y5848vzi0bzbv"; }) 133 + (fetchNuGet { pname = "Microsoft.Extensions.Logging"; version = "3.1.1"; sha256 = "1y78bn463mrl8vy7iwafrmq4x0vg4pqjd3xaiznfg9lpxjgjl9j3"; }) 134 + (fetchNuGet { pname = "Microsoft.Extensions.Logging.Abstractions"; version = "3.1.0"; sha256 = "1zyalrcksszmn9r5xjnirfh7847axncgzxkk3k5srbvlcch8fw8g"; }) 135 + (fetchNuGet { pname = "Microsoft.Extensions.Logging.Abstractions"; version = "3.1.18"; sha256 = "0pq1kw77zz9ygcdw87wxd1rkcij084jj1cgp6p4b8zpl0a73ba6b"; }) 136 + (fetchNuGet { pname = "Microsoft.Extensions.Logging.Abstractions"; version = "3.1.1"; sha256 = "0pyk6g2qs1lrjhj1qz4bqbqpbmbgqlah1b6ynlvv5bdsrb7157zf"; }) 137 + (fetchNuGet { pname = "Microsoft.Extensions.Options"; version = "3.1.0"; sha256 = "0akccwhpn93a4qrssyb3rszdsp3j4p9hlxbsb7yhqb78xydaqhyh"; }) 138 + (fetchNuGet { pname = "Microsoft.Extensions.Options"; version = "3.1.18"; sha256 = "0iv79m9grl28b5zcng14v5nrgic3rgy74ws9l92fw2f194qbdy6h"; }) 139 + (fetchNuGet { pname = "Microsoft.Extensions.Options"; version = "3.1.1"; sha256 = "15iik4hqm5ywzv9lvlfqk6d7drgdm87h6x9gliy9ks6snyhbnpb3"; }) 140 + (fetchNuGet { pname = "Microsoft.Extensions.Options.ConfigurationExtensions"; version = "3.1.18"; sha256 = "0id3s26s7grlzfvqmknz3ir7agns680ad8d0kv6mr9dfrqj6ca1l"; }) 141 + (fetchNuGet { pname = "Microsoft.Extensions.PlatformAbstractions"; version = "1.1.0"; sha256 = "0r4j8v2vvp3kalvb11ny9cvpls3nrvqj0c81rxbkh99ynd2dbscp"; }) 142 + (fetchNuGet { pname = "Microsoft.Extensions.Primitives"; version = "3.1.0"; sha256 = "1w1y22njywwysi8qjnj4m83qhbq0jr4mmjib0hfawz6cwamh7xrb"; }) 143 + (fetchNuGet { pname = "Microsoft.Extensions.Primitives"; version = "3.1.18"; sha256 = "1xcwb09acn6w3jv3s0bp0f7q9vq3rzp7cg2jhbn3a9h9pzk8haa2"; }) 144 + (fetchNuGet { pname = "Microsoft.Extensions.Primitives"; version = "3.1.1"; sha256 = "07rkb1xl7y59qjg9j3bms0fi09gmjrf9f4ipckxlx64k8ciilw9f"; }) 145 + (fetchNuGet { pname = "Microsoft.Identity.Client"; version = "3.0.8"; sha256 = "0g7j08fqk8svch31jg0vg32chgmxgbsin0i85whsd42hkjd4l8lg"; }) 146 + (fetchNuGet { pname = "Microsoft.IdentityModel.JsonWebTokens"; version = "5.5.0"; sha256 = "0ahkybdfiwnj5h25j5x2dylz3wfg2194cgqmsiqkaz93gbqibyw0"; }) 147 + (fetchNuGet { pname = "Microsoft.IdentityModel.Logging"; version = "5.5.0"; sha256 = "1a3bvzaas5d653l0yphl95xclj4yvdz5v08g0psj9i137yncn639"; }) 148 + (fetchNuGet { pname = "Microsoft.IdentityModel.Protocols"; version = "5.5.0"; sha256 = "029i1fz9y5gzrh68364ga1wm7gmk4h58lkdp5g77rsxa24rhshpl"; }) 149 + (fetchNuGet { pname = "Microsoft.IdentityModel.Protocols.OpenIdConnect"; version = "5.5.0"; sha256 = "0hxh6j4z1ha7r0pnh9lnnx54h6s3lkj0dv99n2h5pcsk0pbx91kf"; }) 150 + (fetchNuGet { pname = "Microsoft.IdentityModel.Tokens"; version = "5.5.0"; sha256 = "1ixdbn6ia6df4qqg89ihcmjz5jjnp9jjcdjifqzaccy37bvxk8dj"; }) 151 + (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "1.0.1"; sha256 = "01al6cfxp68dscl15z7rxfw9zvhm64dncsw09a1vmdkacsa2v6lr"; }) 152 + (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "1.1.0"; sha256 = "08vh1r12g6ykjygq5d3vq09zylgb84l63k49jc4v8faw9g93iqqm"; }) 153 + (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "2.0.0"; sha256 = "1fk2fk2639i7nzy58m9dvpdnzql4vb8yl8vr19r2fp8lmj9w2jr0"; }) 154 + (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "2.1.2"; sha256 = "1507hnpr9my3z4w1r6xk5n0s1j3y6a2c2cnynj76za7cphxi1141"; }) 155 + (fetchNuGet { pname = "Microsoft.NETCore.Targets"; version = "1.0.1"; sha256 = "0ppdkwy6s9p7x9jix3v4402wb171cdiibq7js7i13nxpdky7074p"; }) 156 + (fetchNuGet { pname = "Microsoft.NETCore.Targets"; version = "1.1.0"; sha256 = "193xwf33fbm0ni3idxzbr5fdq3i2dlfgihsac9jj7whj0gd902nh"; }) 157 + (fetchNuGet { pname = "Microsoft.OData.Core"; version = "7.5.0"; sha256 = "0xl3pl7433w2qdcdqnizmwpzavsbip5fv2izw583b99zbyhjxzmx"; }) 158 + (fetchNuGet { pname = "Microsoft.OData.Edm"; version = "7.5.0"; sha256 = "1xsab22g60q04dscnvswzhjig5ydly37kq205dsk4jm4b1df9dip"; }) 159 + (fetchNuGet { pname = "Microsoft.Rest.ClientRuntime"; version = "2.3.11"; sha256 = "0iqxxyiyi057c92nlf2aiva59c13bhg93w2gp0qh0777gb750hbx"; }) 160 + (fetchNuGet { pname = "Microsoft.Rest.ClientRuntime.Azure"; version = "3.3.12"; sha256 = "01r0swv029wwxn1h4paqlyc4chmqg04wi2h0h74bh7lcgjsm9qb1"; }) 161 + (fetchNuGet { pname = "Microsoft.SourceLink.Common"; version = "1.0.0"; sha256 = "1zxkpx01zdv17c39iiy8fx25ran89n14qwddh1f140v1s4dn8z9c"; }) 162 + (fetchNuGet { pname = "Microsoft.SourceLink.GitHub"; version = "1.0.0"; sha256 = "029ixyaqn48cjza87m5qf0g1ynyhlm6irgbx1n09src9g666yhpd"; }) 163 + (fetchNuGet { pname = "Microsoft.Spatial"; version = "7.2.0"; sha256 = "15a2lv7305729mdffh6r2qff5c1dk9b0w5a60kclw1a580vipzk2"; }) 164 + (fetchNuGet { pname = "Microsoft.Spatial"; version = "7.5.0"; sha256 = "1zxjy5f4bksgf0ilgrqhxpy5g1nzbz54pcp9dx0smvc9yqlacy97"; }) 165 + (fetchNuGet { pname = "Microsoft.Win32.Primitives"; version = "4.0.1"; sha256 = "1n8ap0cmljbqskxpf8fjzn7kh1vvlndsa75k01qig26mbw97k2q7"; }) 166 + (fetchNuGet { pname = "Microsoft.Win32.Primitives"; version = "4.3.0"; sha256 = "0j0c1wj4ndj21zsgivsc24whiya605603kxrbiw6wkfdync464wq"; }) 167 + (fetchNuGet { pname = "Microsoft.Win32.Registry"; version = "4.5.0"; sha256 = "1zapbz161ji8h82xiajgriq6zgzmb1f3ar517p2h63plhsq5gh2q"; }) 168 + (fetchNuGet { pname = "MySqlConnector"; version = "0.61.0"; sha256 = "0b0mc41dsih4p1ky3kcmibsz4bw14w439nraq5732wjfkq2sqdxg"; }) 169 + (fetchNuGet { pname = "NETStandard.Library"; version = "2.0.3"; sha256 = "1fn9fxppfcg4jgypp2pmrpr6awl3qz1xmnri0cygpkwvyx27df1y"; }) 170 + (fetchNuGet { pname = "Newtonsoft.Json"; version = "10.0.1"; sha256 = "15ncqic3p2rzs8q8ppi0irl2miq75kilw4lh8yfgjq96id0ds3hv"; }) 171 + (fetchNuGet { pname = "Newtonsoft.Json"; version = "10.0.2"; sha256 = "03zb1k50mgzvznp9sfv371fdvx82bqpgq99dj61paan8a30prj6y"; }) 172 + (fetchNuGet { pname = "Newtonsoft.Json"; version = "11.0.2"; sha256 = "1784xi44f4k8v1fr696hsccmwpy94bz7kixxqlri98zhcxn406b2"; }) 173 + (fetchNuGet { pname = "Newtonsoft.Json"; version = "9.0.1"; sha256 = "0mcy0i7pnfpqm4pcaiyzzji4g0c8i3a5gjz28rrr28110np8304r"; }) 174 + (fetchNuGet { pname = "Npgsql"; version = "4.1.3"; sha256 = "08515af6g0d8v1d2r493xdxc74y1bg8ngbhck0wq4jhh109ndg97"; }) 175 + (fetchNuGet { pname = "Npgsql.EntityFrameworkCore.PostgreSQL"; version = "3.1.1.2"; sha256 = "0ng4cyzmbh1x8jshx55x3h5azif4zb3v4d3n3sxkqavbq8j2phhs"; }) 176 + (fetchNuGet { pname = "NuGet.Common"; version = "5.10.0"; sha256 = "0qy6blgppgvxpfcricmvva3qzddk18dza5vy851jrbqshvf9g7kx"; }) 177 + (fetchNuGet { pname = "NuGet.Configuration"; version = "5.10.0"; sha256 = "0xb1n94lrwa6k83i9xcsq68202086p2gj74gzlbhlvb8c2pw6lbb"; }) 178 + (fetchNuGet { pname = "NuGet.Frameworks"; version = "5.10.0"; sha256 = "0gb6n8rg2jpjp52icgpb3wjdfs3qllh5vbcz8hbcix3l7dncy3v2"; }) 179 + (fetchNuGet { pname = "NuGet.Packaging"; version = "5.10.0"; sha256 = "11g0v061axhp0nisclq5cm2mc92d69z92giz9l40ih478c5nishw"; }) 180 + (fetchNuGet { pname = "NuGet.Protocol"; version = "5.10.0"; sha256 = "0cs9qp169zx6g2w5bzrlhxv0q1i8mb8dxlb2nkiq7pkvah86rxkc"; }) 181 + (fetchNuGet { pname = "NuGet.Versioning"; version = "5.10.0"; sha256 = "10vvw6vjpx0c26rlxh7dnpyp4prahn25717ccd8bzkjmyzhm90cs"; }) 182 + (fetchNuGet { pname = "Pomelo.EntityFrameworkCore.MySql"; version = "3.1.0"; sha256 = "0a8ysdwsa0kds5zbfmcdnk8imaqf2hisjms951h1smnlnii9kyds"; }) 183 + (fetchNuGet { pname = "Pomelo.JsonObject"; version = "2.2.1"; sha256 = "1w6s9wjbsyvq8cnqknkdzm9chnv0g5gcsrq5i94zp6br9vg7c627"; }) 184 + (fetchNuGet { pname = "runtime.debian.8-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "16rnxzpk5dpbbl1x354yrlsbvwylrq456xzpsha1n9y3glnhyx9d"; }) 185 + (fetchNuGet { pname = "runtime.debian.8-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "0rwpqngkqiapqc5c2cpkj7idhngrgss5qpnqg0yh40mbyflcxf8i"; }) 186 + (fetchNuGet { pname = "runtime.fedora.23-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0hkg03sgm2wyq8nqk6dbm9jh5vcq57ry42lkqdmfklrw89lsmr59"; }) 187 + (fetchNuGet { pname = "runtime.fedora.23-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1n06gxwlinhs0w7s8a94r1q3lwqzvynxwd3mp10ws9bg6gck8n4r"; }) 188 + (fetchNuGet { pname = "runtime.fedora.24-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0c2p354hjx58xhhz7wv6div8xpi90sc6ibdm40qin21bvi7ymcaa"; }) 189 + (fetchNuGet { pname = "runtime.fedora.24-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "0404wqrc7f2yc0wxv71y3nnybvqx8v4j9d47hlscxy759a525mc3"; }) 190 + (fetchNuGet { pname = "runtime.native.System"; version = "4.0.0"; sha256 = "1ppk69xk59ggacj9n7g6fyxvzmk1g5p4fkijm0d7xqfkig98qrkf"; }) 191 + (fetchNuGet { pname = "runtime.native.System"; version = "4.3.0"; sha256 = "15hgf6zaq9b8br2wi1i3x0zvmk410nlmsmva9p0bbg73v6hml5k4"; }) 192 + (fetchNuGet { pname = "runtime.native.System.Data.SqlClient.sni"; version = "4.4.0"; sha256 = "15wnpyy506q3vyk1yzdjjf49zpdynr7ghh0x5fbz4pcc1if0p9ky"; }) 193 + (fetchNuGet { pname = "runtime.native.System.Net.Http"; version = "4.0.1"; sha256 = "1hgv2bmbaskx77v8glh7waxws973jn4ah35zysnkxmf0196sfxg6"; }) 194 + (fetchNuGet { pname = "runtime.native.System.Net.Http"; version = "4.3.0"; sha256 = "1n6rgz5132lcibbch1qlf0g9jk60r0kqv087hxc0lisy50zpm7kk"; }) 195 + (fetchNuGet { pname = "runtime.native.System.Net.Security"; version = "4.3.0"; sha256 = "0dnqjhw445ay3chpia9p6vy4w2j6s9vy3hxszqvdanpvvyaxijr3"; }) 196 + (fetchNuGet { pname = "runtime.native.System.Security.Cryptography"; version = "4.0.0"; sha256 = "0k57aa2c3b10wl3hfqbgrl7xq7g8hh3a3ir44b31dn5p61iiw3z9"; }) 197 + (fetchNuGet { pname = "runtime.native.System.Security.Cryptography.Apple"; version = "4.3.0"; sha256 = "1b61p6gw1m02cc1ry996fl49liiwky6181dzr873g9ds92zl326q"; }) 198 + (fetchNuGet { pname = "runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "18pzfdlwsg2nb1jjjjzyb5qlgy6xjxzmhnfaijq5s2jw3cm3ab97"; }) 199 + (fetchNuGet { pname = "runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "0zy5r25jppz48i2bkg8b9lfig24xixg6nm3xyr1379zdnqnpm8f6"; }) 200 + (fetchNuGet { pname = "runtime.opensuse.13.2-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0qyynf9nz5i7pc26cwhgi8j62ps27sqmf78ijcfgzab50z9g8ay3"; }) 201 + (fetchNuGet { pname = "runtime.opensuse.13.2-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "096ch4n4s8k82xga80lfmpimpzahd2ip1mgwdqgar0ywbbl6x438"; }) 202 + (fetchNuGet { pname = "runtime.opensuse.42.1-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "1klrs545awhayryma6l7g2pvnp9xy4z0r1i40r80zb45q3i9nbyf"; }) 203 + (fetchNuGet { pname = "runtime.opensuse.42.1-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1dm8fifl7rf1gy7lnwln78ch4rw54g0pl5g1c189vawavll7p6rj"; }) 204 + (fetchNuGet { pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.Apple"; version = "4.3.0"; sha256 = "10yc8jdrwgcl44b4g93f1ds76b176bajd3zqi2faf5rvh1vy9smi"; }) 205 + (fetchNuGet { pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0zcxjv5pckplvkg0r6mw3asggm7aqzbdjimhvsasb0cgm59x09l3"; }) 206 + (fetchNuGet { pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1m9z1k9kzva9n9kwinqxl97x2vgl79qhqjlv17k9s2ymcyv2bwr6"; }) 207 + (fetchNuGet { pname = "runtime.rhel.7-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0vhynn79ih7hw7cwjazn87rm9z9fj0rvxgzlab36jybgcpcgphsn"; }) 208 + (fetchNuGet { pname = "runtime.rhel.7-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1cpx56mcfxz7cpn57wvj18sjisvzq8b5vd9rw16ihd2i6mcp3wa1"; }) 209 + (fetchNuGet { pname = "runtime.ubuntu.14.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "160p68l2c7cqmyqjwxydcvgw7lvl1cr0znkw8fp24d1by9mqc8p3"; }) 210 + (fetchNuGet { pname = "runtime.ubuntu.14.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "15gsm1a8jdmgmf8j5v1slfz8ks124nfdhk2vxs2rw3asrxalg8hi"; }) 211 + (fetchNuGet { pname = "runtime.ubuntu.16.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "15zrc8fgd8zx28hdghcj5f5i34wf3l6bq5177075m2bc2j34jrqy"; }) 212 + (fetchNuGet { pname = "runtime.ubuntu.16.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "0q0n5q1r1wnqmr5i5idsrd9ywl33k0js4pngkwq9p368mbxp8x1w"; }) 213 + (fetchNuGet { pname = "runtime.ubuntu.16.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "1p4dgxax6p7rlgj4q73k73rslcnz4wdcv8q2flg1s8ygwcm58ld5"; }) 214 + (fetchNuGet { pname = "runtime.ubuntu.16.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1x0g58pbpjrmj2x2qw17rdwwnrcl0wvim2hdwz48lixvwvp22n9c"; }) 215 + (fetchNuGet { pname = "runtime.win-arm64.runtime.native.System.Data.SqlClient.sni"; version = "4.4.0"; sha256 = "07byf1iyqb7jkb17sp0mmjk46fwq6fx8mlpzywxl7qk09sma44gk"; }) 216 + (fetchNuGet { pname = "runtime.win-x64.runtime.native.System.Data.SqlClient.sni"; version = "4.4.0"; sha256 = "0167s4mpq8bzk3y11pylnynzjr2nc84w96al9x4l8yrf34ccm18y"; }) 217 + (fetchNuGet { pname = "runtime.win-x86.runtime.native.System.Data.SqlClient.sni"; version = "4.4.0"; sha256 = "0k3rkfrlm9jjz56dra61jgxinb8zsqlqzik2sjwz7f8v6z6ddycc"; }) 218 + (fetchNuGet { pname = "SQLitePCLRaw.bundle_e_sqlite3"; version = "2.0.2"; sha256 = "00p7n7ndmmh45fhhd3clb11igpzklm1n7r50sdrgnbi5yifv1lxl"; }) 219 + (fetchNuGet { pname = "SQLitePCLRaw.core"; version = "2.0.2"; sha256 = "11mnbnsiirpgmilskqh1issvgzgg08ndq3p3nkrw73hyqr7kl958"; }) 220 + (fetchNuGet { pname = "SQLitePCLRaw.lib.e_sqlite3"; version = "2.0.2"; sha256 = "0967w6r6n94hj0fma3kidb9fx1m2p3fgrw6gpsy6q6jbb33qw6vj"; }) 221 + (fetchNuGet { pname = "SQLitePCLRaw.provider.dynamic_cdecl"; version = "2.0.2"; sha256 = "1lzs8yfjygrwfm3hjmkhnbnpsjzq53ijwx9whmii2r9kjg2a46if"; }) 222 + (fetchNuGet { pname = "SQLitePCLRaw.provider.e_sqlite3"; version = "2.0.2"; sha256 = "0ak8jlkva1mnmvyvwhk9zmc4c5b08n4a7l8g9g5mj3ly161hfzm6"; }) 223 + (fetchNuGet { pname = "System.Buffers"; version = "4.4.0"; sha256 = "183f8063w8zqn99pv0ni0nnwh7fgx46qzxamwnans55hhs2l0g19"; }) 224 + (fetchNuGet { pname = "System.Buffers"; version = "4.5.0"; sha256 = "1ywfqn4md6g3iilpxjn5dsr0f5lx6z0yvhqp4pgjcamygg73cz2c"; }) 225 + (fetchNuGet { pname = "System.Buffers"; version = "4.5.1"; sha256 = "04kb1mdrlcixj9zh1xdi5as0k0qi8byr5mi3p3jcxx72qz93s2y3"; }) 226 + (fetchNuGet { pname = "System.Collections"; version = "4.0.11"; sha256 = "1ga40f5lrwldiyw6vy67d0sg7jd7ww6kgwbksm19wrvq9hr0bsm6"; }) 227 + (fetchNuGet { pname = "System.Collections"; version = "4.3.0"; sha256 = "19r4y64dqyrq6k4706dnyhhw7fs24kpp3awak7whzss39dakpxk9"; }) 228 + (fetchNuGet { pname = "System.Collections.Concurrent"; version = "4.0.12"; sha256 = "07y08kvrzpak873pmyxs129g1ch8l27zmg51pcyj2jvq03n0r0fc"; }) 229 + (fetchNuGet { pname = "System.Collections.Concurrent"; version = "4.3.0"; sha256 = "0wi10md9aq33jrkh2c24wr2n9hrpyamsdhsxdcnf43b7y86kkii8"; }) 230 + (fetchNuGet { pname = "System.Collections.Immutable"; version = "1.5.0"; sha256 = "1d5gjn5afnrf461jlxzawcvihz195gayqpcfbv6dd7pxa9ialn06"; }) 231 + (fetchNuGet { pname = "System.Collections.Immutable"; version = "1.7.0"; sha256 = "1gik4sn9jsi1wcy1pyyp0r4sn2g17cwrsh24b2d52vif8p2h24zx"; }) 232 + (fetchNuGet { pname = "System.Collections.Immutable"; version = "1.7.1"; sha256 = "1nh4nlxfc7lbnbl86wwk1a3jwl6myz5j6hvgh5sp4krim9901hsq"; }) 233 + (fetchNuGet { pname = "System.Collections.NonGeneric"; version = "4.0.1"; sha256 = "19994r5y5bpdhj7di6w047apvil8lh06lh2c2yv9zc4fc5g9bl4d"; }) 234 + (fetchNuGet { pname = "System.Collections.NonGeneric"; version = "4.3.0"; sha256 = "07q3k0hf3mrcjzwj8fwk6gv3n51cb513w4mgkfxzm3i37sc9kz7k"; }) 235 + (fetchNuGet { pname = "System.Collections.Specialized"; version = "4.0.1"; sha256 = "1wbv7y686p5x169rnaim7sln67ivmv6r57falrnx8aap9y33mam9"; }) 236 + (fetchNuGet { pname = "System.Collections.Specialized"; version = "4.3.0"; sha256 = "1sdwkma4f6j85m3dpb53v9vcgd0zyc9jb33f8g63byvijcj39n20"; }) 237 + (fetchNuGet { pname = "System.ComponentModel"; version = "4.3.0"; sha256 = "0986b10ww3nshy30x9sjyzm0jx339dkjxjj3401r3q0f6fx2wkcb"; }) 238 + (fetchNuGet { pname = "System.ComponentModel.Annotations"; version = "4.7.0"; sha256 = "06x1m46ddxj0ng28d7gry9gjkqdg2kp89jyf480g5gznyybbs49z"; }) 239 + (fetchNuGet { pname = "System.ComponentModel.Primitives"; version = "4.3.0"; sha256 = "1svfmcmgs0w0z9xdw2f2ps05rdxmkxxhf0l17xk9l1l8xfahkqr0"; }) 240 + (fetchNuGet { pname = "System.ComponentModel.TypeConverter"; version = "4.3.0"; sha256 = "17ng0p7v3nbrg3kycz10aqrrlw4lz9hzhws09pfh8gkwicyy481x"; }) 241 + (fetchNuGet { pname = "System.Configuration.ConfigurationManager"; version = "4.5.0"; sha256 = "1frpy24mn6q7hgwayj98kkx89z861f5dmia4j6zc0a2ydgx8x02c"; }) 242 + (fetchNuGet { pname = "System.Diagnostics.Debug"; version = "4.0.11"; sha256 = "0gmjghrqmlgzxivd2xl50ncbglb7ljzb66rlx8ws6dv8jm0d5siz"; }) 243 + (fetchNuGet { pname = "System.Diagnostics.Debug"; version = "4.3.0"; sha256 = "00yjlf19wjydyr6cfviaph3vsjzg3d5nvnya26i2fvfg53sknh3y"; }) 244 + (fetchNuGet { pname = "System.Diagnostics.DiagnosticSource"; version = "4.0.0"; sha256 = "1n6c3fbz7v8d3pn77h4v5wvsfrfg7v1c57lg3nff3cjyh597v23m"; }) 245 + (fetchNuGet { pname = "System.Diagnostics.DiagnosticSource"; version = "4.3.0"; sha256 = "0z6m3pbiy0qw6rn3n209rrzf9x1k4002zh90vwcrsym09ipm2liq"; }) 246 + (fetchNuGet { pname = "System.Diagnostics.DiagnosticSource"; version = "4.5.0"; sha256 = "1y8m0p3127nak5yspapfnz25qc9x53gqpvwr3hdpsvrcd2r1pgyj"; }) 247 + (fetchNuGet { pname = "System.Diagnostics.DiagnosticSource"; version = "4.7.0"; sha256 = "0cr0v5dz8l5ackxv6b772fjcyj2nimqmrmzanjs4cw2668v568n1"; }) 248 + (fetchNuGet { pname = "System.Diagnostics.DiagnosticSource"; version = "4.7.1"; sha256 = "1mivaifniyrqwlnvzsfaxzrh2sd981bwzs3cbvs5wi7jjzbcqr4p"; }) 249 + (fetchNuGet { pname = "System.Diagnostics.Tools"; version = "4.0.1"; sha256 = "19cknvg07yhakcvpxg3cxa0bwadplin6kyxd8mpjjpwnp56nl85x"; }) 250 + (fetchNuGet { pname = "System.Diagnostics.Tools"; version = "4.3.0"; sha256 = "0in3pic3s2ddyibi8cvgl102zmvp9r9mchh82ns9f0ms4basylw1"; }) 251 + (fetchNuGet { pname = "System.Diagnostics.TraceSource"; version = "4.0.0"; sha256 = "1mc7r72xznczzf6mz62dm8xhdi14if1h8qgx353xvhz89qyxsa3h"; }) 252 + (fetchNuGet { pname = "System.Diagnostics.Tracing"; version = "4.1.0"; sha256 = "1d2r76v1x610x61ahfpigda89gd13qydz6vbwzhpqlyvq8jj6394"; }) 253 + (fetchNuGet { pname = "System.Diagnostics.Tracing"; version = "4.3.0"; sha256 = "1m3bx6c2s958qligl67q7grkwfz3w53hpy7nc97mh6f7j5k168c4"; }) 254 + (fetchNuGet { pname = "System.Dynamic.Runtime"; version = "4.0.11"; sha256 = "1pla2dx8gkidf7xkciig6nifdsb494axjvzvann8g2lp3dbqasm9"; }) 255 + (fetchNuGet { pname = "System.Dynamic.Runtime"; version = "4.3.0"; sha256 = "1d951hrvrpndk7insiag80qxjbf2y0y39y8h5hnq9612ws661glk"; }) 256 + (fetchNuGet { pname = "System.Formats.Asn1"; version = "5.0.0"; sha256 = "1axc8z0839yvqi2cb63l73l6d9j6wd20lsbdymwddz9hvrsgfwpn"; }) 257 + (fetchNuGet { pname = "System.Globalization"; version = "4.0.11"; sha256 = "070c5jbas2v7smm660zaf1gh0489xanjqymkvafcs4f8cdrs1d5d"; }) 258 + (fetchNuGet { pname = "System.Globalization"; version = "4.3.0"; sha256 = "1cp68vv683n6ic2zqh2s1fn4c2sd87g5hpp6l4d4nj4536jz98ki"; }) 259 + (fetchNuGet { pname = "System.Globalization.Calendars"; version = "4.0.1"; sha256 = "0bv0alrm2ck2zk3rz25lfyk9h42f3ywq77mx1syl6vvyncnpg4qh"; }) 260 + (fetchNuGet { pname = "System.Globalization.Calendars"; version = "4.3.0"; sha256 = "1xwl230bkakzzkrggy1l1lxmm3xlhk4bq2pkv790j5lm8g887lxq"; }) 261 + (fetchNuGet { pname = "System.Globalization.Extensions"; version = "4.0.1"; sha256 = "0hjhdb5ri8z9l93bw04s7ynwrjrhx2n0p34sf33a9hl9phz69fyc"; }) 262 + (fetchNuGet { pname = "System.Globalization.Extensions"; version = "4.3.0"; sha256 = "02a5zfxavhv3jd437bsncbhd2fp1zv4gxzakp1an9l6kdq1mcqls"; }) 263 + (fetchNuGet { pname = "System.IdentityModel.Tokens.Jwt"; version = "5.5.0"; sha256 = "0p6ybl5ik2glwcfhiqlqdggl0qd6027kdxaqy5xmp7qq055qiq6k"; }) 264 + (fetchNuGet { pname = "System.Interactive.Async"; version = "3.1.1"; sha256 = "03iq20gq0n2b2sdzs5jhxf46nzkfgvzip6q5248vka2rcvn1yanh"; }) 265 + (fetchNuGet { pname = "System.IO"; version = "4.1.0"; sha256 = "1g0yb8p11vfd0kbkyzlfsbsp5z44lwsvyc0h3dpw6vqnbi035ajp"; }) 266 + (fetchNuGet { pname = "System.IO"; version = "4.3.0"; sha256 = "05l9qdrzhm4s5dixmx68kxwif4l99ll5gqmh7rqgw554fx0agv5f"; }) 267 + (fetchNuGet { pname = "System.IO.FileSystem"; version = "4.0.1"; sha256 = "0kgfpw6w4djqra3w5crrg8xivbanh1w9dh3qapb28q060wb9flp1"; }) 268 + (fetchNuGet { pname = "System.IO.FileSystem"; version = "4.3.0"; sha256 = "0z2dfrbra9i6y16mm9v1v6k47f0fm617vlb7s5iybjjsz6g1ilmw"; }) 269 + (fetchNuGet { pname = "System.IO.FileSystem.Primitives"; version = "4.0.1"; sha256 = "1s0mniajj3lvbyf7vfb5shp4ink5yibsx945k6lvxa96r8la1612"; }) 270 + (fetchNuGet { pname = "System.IO.FileSystem.Primitives"; version = "4.3.0"; sha256 = "0j6ndgglcf4brg2lz4wzsh1av1gh8xrzdsn9f0yznskhqn1xzj9c"; }) 271 + (fetchNuGet { pname = "System.Linq"; version = "4.1.0"; sha256 = "1ppg83svb39hj4hpp5k7kcryzrf3sfnm08vxd5sm2drrijsla2k5"; }) 272 + (fetchNuGet { pname = "System.Linq"; version = "4.3.0"; sha256 = "1w0gmba695rbr80l1k2h4mrwzbzsyfl2z4klmpbsvsg5pm4a56s7"; }) 273 + (fetchNuGet { pname = "System.Linq.Expressions"; version = "4.1.0"; sha256 = "1gpdxl6ip06cnab7n3zlcg6mqp7kknf73s8wjinzi4p0apw82fpg"; }) 274 + (fetchNuGet { pname = "System.Linq.Expressions"; version = "4.3.0"; sha256 = "0ky2nrcvh70rqq88m9a5yqabsl4fyd17bpr63iy2mbivjs2nyypv"; }) 275 + (fetchNuGet { pname = "System.Linq.Queryable"; version = "4.0.1"; sha256 = "11jn9k34g245yyf260gr3ldzvaqa9477w2c5nhb1p8vjx4xm3qaw"; }) 276 + (fetchNuGet { pname = "System.Memory"; version = "4.5.0"; sha256 = "1layqpcx1q4l805fdnj2dfqp6ncx2z42ca06rgsr6ikq4jjgbv30"; }) 277 + (fetchNuGet { pname = "System.Memory"; version = "4.5.1"; sha256 = "0f07d7hny38lq9w69wx4lxkn4wszrqf9m9js6fh9is645csm167c"; }) 278 + (fetchNuGet { pname = "System.Memory"; version = "4.5.2"; sha256 = "1g24dwqfcmf4gpbgbhaw1j49xmpsz389l6bw2xxbsmnzvsf860ld"; }) 279 + (fetchNuGet { pname = "System.Memory"; version = "4.5.3"; sha256 = "0naqahm3wljxb5a911d37mwjqjdxv9l0b49p5dmfyijvni2ppy8a"; }) 280 + (fetchNuGet { pname = "System.Memory"; version = "4.5.4"; sha256 = "14gbbs22mcxwggn0fcfs1b062521azb9fbb7c113x0mq6dzq9h6y"; }) 281 + (fetchNuGet { pname = "System.Net.Http"; version = "4.1.0"; sha256 = "1i5rqij1icg05j8rrkw4gd4pgia1978mqhjzhsjg69lvwcdfg8yb"; }) 282 + (fetchNuGet { pname = "System.Net.Http"; version = "4.3.0"; sha256 = "1i4gc757xqrzflbk7kc5ksn20kwwfjhw9w7pgdkn19y3cgnl302j"; }) 283 + (fetchNuGet { pname = "System.Net.NameResolution"; version = "4.0.0"; sha256 = "0dj3pvpv069nyia28gkl4a0fb7q33hbxz2dg25qvpah3l7pbl0qh"; }) 284 + (fetchNuGet { pname = "System.Net.NameResolution"; version = "4.3.0"; sha256 = "15r75pwc0rm3vvwsn8rvm2krf929mjfwliv0mpicjnii24470rkq"; }) 285 + (fetchNuGet { pname = "System.Net.NetworkInformation"; version = "4.1.0"; sha256 = "17ia8gyr0aq76z9cv37yjmpna7nx30xfppw0lifvi9s2q3yjspd2"; }) 286 + (fetchNuGet { pname = "System.Net.Primitives"; version = "4.0.11"; sha256 = "10xzzaynkzkakp7jai1ik3r805zrqjxiz7vcagchyxs2v26a516r"; }) 287 + (fetchNuGet { pname = "System.Net.Primitives"; version = "4.3.0"; sha256 = "0c87k50rmdgmxx7df2khd9qj7q35j9rzdmm2572cc55dygmdk3ii"; }) 288 + (fetchNuGet { pname = "System.Net.Requests"; version = "4.0.11"; sha256 = "13mka55sa6dg6nw4zdrih44gnp8hnj5azynz47ljsh2791lz3d9h"; }) 289 + (fetchNuGet { pname = "System.Net.Security"; version = "4.3.2"; sha256 = "1aw1ca1vssqrillrh4qkarx0lxwc8wcaqdkfdima8376wb98j2q8"; }) 290 + (fetchNuGet { pname = "System.Net.Sockets"; version = "4.1.0"; sha256 = "1385fvh8h29da5hh58jm1v78fzi9fi5vj93vhlm2kvqpfahvpqls"; }) 291 + (fetchNuGet { pname = "System.Net.WebHeaderCollection"; version = "4.0.1"; sha256 = "10bxpxj80c4z00z3ksrfswspq9qqsw8jwxcbzvymzycb97m9b55q"; }) 292 + (fetchNuGet { pname = "System.Numerics.Vectors"; version = "4.4.0"; sha256 = "0rdvma399070b0i46c4qq1h2yvjj3k013sqzkilz4bz5cwmx1rba"; }) 293 + (fetchNuGet { pname = "System.Numerics.Vectors"; version = "4.5.0"; sha256 = "1kzrj37yzawf1b19jq0253rcs8hsq1l2q8g69d7ipnhzb0h97m59"; }) 294 + (fetchNuGet { pname = "System.ObjectModel"; version = "4.0.12"; sha256 = "1sybkfi60a4588xn34nd9a58png36i0xr4y4v4kqpg8wlvy5krrj"; }) 295 + (fetchNuGet { pname = "System.ObjectModel"; version = "4.3.0"; sha256 = "191p63zy5rpqx7dnrb3h7prvgixmk168fhvvkkvhlazncf8r3nc2"; }) 296 + (fetchNuGet { pname = "System.Private.DataContractSerialization"; version = "4.3.0"; sha256 = "06fjipqvjp559rrm825x6pll8gimdj9x1n3larigh5hsm584gndw"; }) 297 + (fetchNuGet { pname = "System.Reflection"; version = "4.1.0"; sha256 = "1js89429pfw79mxvbzp8p3q93il6rdff332hddhzi5wqglc4gml9"; }) 298 + (fetchNuGet { pname = "System.Reflection"; version = "4.3.0"; sha256 = "0xl55k0mw8cd8ra6dxzh974nxif58s3k1rjv1vbd7gjbjr39j11m"; }) 299 + (fetchNuGet { pname = "System.Reflection.Emit"; version = "4.0.1"; sha256 = "0ydqcsvh6smi41gyaakglnv252625hf29f7kywy2c70nhii2ylqp"; }) 300 + (fetchNuGet { pname = "System.Reflection.Emit"; version = "4.3.0"; sha256 = "11f8y3qfysfcrscjpjym9msk7lsfxkk4fmz9qq95kn3jd0769f74"; }) 301 + (fetchNuGet { pname = "System.Reflection.Emit.ILGeneration"; version = "4.0.1"; sha256 = "1pcd2ig6bg144y10w7yxgc9d22r7c7ww7qn1frdfwgxr24j9wvv0"; }) 302 + (fetchNuGet { pname = "System.Reflection.Emit.ILGeneration"; version = "4.3.0"; sha256 = "0w1n67glpv8241vnpz1kl14sy7zlnw414aqwj4hcx5nd86f6994q"; }) 303 + (fetchNuGet { pname = "System.Reflection.Emit.Lightweight"; version = "4.0.1"; sha256 = "1s4b043zdbx9k39lfhvsk68msv1nxbidhkq6nbm27q7sf8xcsnxr"; }) 304 + (fetchNuGet { pname = "System.Reflection.Emit.Lightweight"; version = "4.3.0"; sha256 = "0ql7lcakycrvzgi9kxz1b3lljd990az1x6c4jsiwcacrvimpib5c"; }) 305 + (fetchNuGet { pname = "System.Reflection.Extensions"; version = "4.0.1"; sha256 = "0m7wqwq0zqq9gbpiqvgk3sr92cbrw7cp3xn53xvw7zj6rz6fdirn"; }) 306 + (fetchNuGet { pname = "System.Reflection.Extensions"; version = "4.3.0"; sha256 = "02bly8bdc98gs22lqsfx9xicblszr2yan7v2mmw3g7hy6miq5hwq"; }) 307 + (fetchNuGet { pname = "System.Reflection.Metadata"; version = "1.6.0"; sha256 = "1wdbavrrkajy7qbdblpbpbalbdl48q3h34cchz24gvdgyrlf15r4"; }) 308 + (fetchNuGet { pname = "System.Reflection.Primitives"; version = "4.0.1"; sha256 = "1bangaabhsl4k9fg8khn83wm6yial8ik1sza7401621jc6jrym28"; }) 309 + (fetchNuGet { pname = "System.Reflection.Primitives"; version = "4.3.0"; sha256 = "04xqa33bld78yv5r93a8n76shvc8wwcdgr1qvvjh959g3rc31276"; }) 310 + (fetchNuGet { pname = "System.Reflection.TypeExtensions"; version = "4.1.0"; sha256 = "1bjli8a7sc7jlxqgcagl9nh8axzfl11f4ld3rjqsyxc516iijij7"; }) 311 + (fetchNuGet { pname = "System.Reflection.TypeExtensions"; version = "4.3.0"; sha256 = "0y2ssg08d817p0vdag98vn238gyrrynjdj4181hdg780sif3ykp1"; }) 312 + (fetchNuGet { pname = "System.Resources.ResourceManager"; version = "4.0.1"; sha256 = "0b4i7mncaf8cnai85jv3wnw6hps140cxz8vylv2bik6wyzgvz7bi"; }) 313 + (fetchNuGet { pname = "System.Resources.ResourceManager"; version = "4.3.0"; sha256 = "0sjqlzsryb0mg4y4xzf35xi523s4is4hz9q4qgdvlvgivl7qxn49"; }) 314 + (fetchNuGet { pname = "System.Runtime"; version = "4.1.0"; sha256 = "02hdkgk13rvsd6r9yafbwzss8kr55wnj8d5c7xjnp8gqrwc8sn0m"; }) 315 + (fetchNuGet { pname = "System.Runtime"; version = "4.3.0"; sha256 = "066ixvgbf2c929kgknshcxqj6539ax7b9m570cp8n179cpfkapz7"; }) 316 + (fetchNuGet { pname = "System.Runtime.Caching"; version = "4.5.0"; sha256 = "07ijp8j0cplcw1ns0fpkfsavppask164jn51lasiji4sfkjy592r"; }) 317 + (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.5.0"; sha256 = "17labczwqk3jng3kkky73m0jhi8wc21vbl7cz5c0hj2p1dswin43"; }) 318 + (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.5.2"; sha256 = "1vz4275fjij8inf31np78hw50al8nqkngk04p3xv5n4fcmf1grgi"; }) 319 + (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.5.3"; sha256 = "1afi6s2r1mh1kygbjmfba6l4f87pi5sg13p4a48idqafli94qxln"; }) 320 + (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.6.0"; sha256 = "0xmzi2gpbmgyfr75p24rqqsba3cmrqgmcv45lsqp5amgrdwd0f0m"; }) 321 + (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.7.0"; sha256 = "16r6sn4czfjk8qhnz7bnqlyiaaszr0ihinb7mq9zzr1wba257r54"; }) 322 + (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.7.1"; sha256 = "119br3pd85lq8zcgh4f60jzmv1g976q1kdgi3hvqdlhfbw6siz2j"; }) 323 + (fetchNuGet { pname = "System.Runtime.Extensions"; version = "4.1.0"; sha256 = "0rw4rm4vsm3h3szxp9iijc3ksyviwsv6f63dng3vhqyg4vjdkc2z"; }) 324 + (fetchNuGet { pname = "System.Runtime.Extensions"; version = "4.3.0"; sha256 = "1ykp3dnhwvm48nap8q23893hagf665k0kn3cbgsqpwzbijdcgc60"; }) 325 + (fetchNuGet { pname = "System.Runtime.Handles"; version = "4.0.1"; sha256 = "1g0zrdi5508v49pfm3iii2hn6nm00bgvfpjq1zxknfjrxxa20r4g"; }) 326 + (fetchNuGet { pname = "System.Runtime.Handles"; version = "4.3.0"; sha256 = "0sw2gfj2xr7sw9qjn0j3l9yw07x73lcs97p8xfc9w1x9h5g5m7i8"; }) 327 + (fetchNuGet { pname = "System.Runtime.InteropServices"; version = "4.1.0"; sha256 = "01kxqppx3dr3b6b286xafqilv4s2n0gqvfgzfd4z943ga9i81is1"; }) 328 + (fetchNuGet { pname = "System.Runtime.InteropServices"; version = "4.3.0"; sha256 = "00hywrn4g7hva1b2qri2s6rabzwgxnbpw9zfxmz28z09cpwwgh7j"; }) 329 + (fetchNuGet { pname = "System.Runtime.Numerics"; version = "4.0.1"; sha256 = "1y308zfvy0l5nrn46mqqr4wb4z1xk758pkk8svbz8b5ij7jnv4nn"; }) 330 + (fetchNuGet { pname = "System.Runtime.Numerics"; version = "4.3.0"; sha256 = "19rav39sr5dky7afygh309qamqqmi9kcwvz3i0c5700v0c5cg61z"; }) 331 + (fetchNuGet { pname = "System.Runtime.Serialization.Formatters"; version = "4.3.0"; sha256 = "114j35n8gcvn3sqv9ar36r1jjq0y1yws9r0yk8i6wm4aq7n9rs0m"; }) 332 + (fetchNuGet { pname = "System.Runtime.Serialization.Json"; version = "4.3.0"; sha256 = "1qp8ghr70smspnjdmlcbl5vwb7fm2iy1b7wx1p53lbpl35w4kz4a"; }) 333 + (fetchNuGet { pname = "System.Runtime.Serialization.Primitives"; version = "4.1.1"; sha256 = "042rfjixknlr6r10vx2pgf56yming8lkjikamg3g4v29ikk78h7k"; }) 334 + (fetchNuGet { pname = "System.Runtime.Serialization.Primitives"; version = "4.3.0"; sha256 = "01vv2p8h4hsz217xxs0rixvb7f2xzbh6wv1gzbfykcbfrza6dvnf"; }) 335 + (fetchNuGet { pname = "System.Security.AccessControl"; version = "4.5.0"; sha256 = "1wvwanz33fzzbnd2jalar0p0z3x0ba53vzx1kazlskp7pwyhlnq0"; }) 336 + (fetchNuGet { pname = "System.Security.Claims"; version = "4.0.1"; sha256 = "03dw0ls49bvsrffgwycyifjgz0qzr9r85skqhdyhfd51fqf398n6"; }) 337 + (fetchNuGet { pname = "System.Security.Claims"; version = "4.3.0"; sha256 = "0jvfn7j22l3mm28qjy3rcw287y9h65ha4m940waaxah07jnbzrhn"; }) 338 + (fetchNuGet { pname = "System.Security.Cryptography.Algorithms"; version = "4.2.0"; sha256 = "148s9g5dgm33ri7dnh19s4lgnlxbpwvrw2jnzllq2kijj4i4vs85"; }) 339 + (fetchNuGet { pname = "System.Security.Cryptography.Algorithms"; version = "4.3.0"; sha256 = "03sq183pfl5kp7gkvq77myv7kbpdnq3y0xj7vi4q1kaw54sny0ml"; }) 340 + (fetchNuGet { pname = "System.Security.Cryptography.Cng"; version = "4.2.0"; sha256 = "118jijz446kix20blxip0f0q8mhsh9bz118mwc2ch1p6g7facpzc"; }) 341 + (fetchNuGet { pname = "System.Security.Cryptography.Cng"; version = "4.3.0"; sha256 = "1k468aswafdgf56ab6yrn7649kfqx2wm9aslywjam1hdmk5yypmv"; }) 342 + (fetchNuGet { pname = "System.Security.Cryptography.Cng"; version = "4.5.0"; sha256 = "1pm4ykbcz48f1hdmwpia432ha6qbb9kbrxrrp7cg3m8q8xn52ngn"; }) 343 + (fetchNuGet { pname = "System.Security.Cryptography.Cng"; version = "5.0.0"; sha256 = "06hkx2za8jifpslkh491dfwzm5dxrsyxzj5lsc0achb6yzg4zqlw"; }) 344 + (fetchNuGet { pname = "System.Security.Cryptography.Csp"; version = "4.0.0"; sha256 = "1cwv8lqj8r15q81d2pz2jwzzbaji0l28xfrpw29kdpsaypm92z2q"; }) 345 + (fetchNuGet { pname = "System.Security.Cryptography.Csp"; version = "4.3.0"; sha256 = "1x5wcrddf2s3hb8j78cry7yalca4lb5vfnkrysagbn6r9x6xvrx1"; }) 346 + (fetchNuGet { pname = "System.Security.Cryptography.Encoding"; version = "4.0.0"; sha256 = "0a8y1a5wkmpawc787gfmnrnbzdgxmx1a14ax43jf3rj9gxmy3vk4"; }) 347 + (fetchNuGet { pname = "System.Security.Cryptography.Encoding"; version = "4.3.0"; sha256 = "1jr6w70igqn07k5zs1ph6xja97hxnb3mqbspdrff6cvssgrixs32"; }) 348 + (fetchNuGet { pname = "System.Security.Cryptography.OpenSsl"; version = "4.0.0"; sha256 = "16sx3cig3d0ilvzl8xxgffmxbiqx87zdi8fc73i3i7zjih1a7f4q"; }) 349 + (fetchNuGet { pname = "System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0givpvvj8yc7gv4lhb6s1prq6p2c4147204a0wib89inqzd87gqc"; }) 350 + (fetchNuGet { pname = "System.Security.Cryptography.Pkcs"; version = "5.0.0"; sha256 = "0hb2mndac3xrw3786bsjxjfh19bwnr991qib54k6wsqjhjyyvbwj"; }) 351 + (fetchNuGet { pname = "System.Security.Cryptography.Primitives"; version = "4.0.0"; sha256 = "0i7cfnwph9a10bm26m538h5xcr8b36jscp9sy1zhgifksxz4yixh"; }) 352 + (fetchNuGet { pname = "System.Security.Cryptography.Primitives"; version = "4.3.0"; sha256 = "0pyzncsv48zwly3lw4f2dayqswcfvdwq2nz0dgwmi7fj3pn64wby"; }) 353 + (fetchNuGet { pname = "System.Security.Cryptography.ProtectedData"; version = "4.4.0"; sha256 = "1q8ljvqhasyynp94a1d7jknk946m20lkwy2c3wa8zw2pc517fbj6"; }) 354 + (fetchNuGet { pname = "System.Security.Cryptography.ProtectedData"; version = "4.5.0"; sha256 = "11qlc8q6b7xlspayv07718ibzvlj6ddqqxkvcbxv5b24d5kzbrb7"; }) 355 + (fetchNuGet { pname = "System.Security.Cryptography.X509Certificates"; version = "4.1.0"; sha256 = "0clg1bv55mfv5dq00m19cp634zx6inm31kf8ppbq1jgyjf2185dh"; }) 356 + (fetchNuGet { pname = "System.Security.Cryptography.X509Certificates"; version = "4.3.0"; sha256 = "0valjcz5wksbvijylxijjxb1mp38mdhv03r533vnx1q3ikzdav9h"; }) 357 + (fetchNuGet { pname = "System.Security.Permissions"; version = "4.5.0"; sha256 = "192ww5rm3c9mirxgl1nzyrwd18am3izqls0hzm0fvcdjl5grvbhm"; }) 358 + (fetchNuGet { pname = "System.Security.Principal"; version = "4.0.1"; sha256 = "1nbzdfqvzzbgsfdd5qsh94d7dbg2v4sw0yx6himyn52zf8z6007p"; }) 359 + (fetchNuGet { pname = "System.Security.Principal"; version = "4.3.0"; sha256 = "12cm2zws06z4lfc4dn31iqv7072zyi4m910d4r6wm8yx85arsfxf"; }) 360 + (fetchNuGet { pname = "System.Security.Principal.Windows"; version = "4.0.0"; sha256 = "1d3vc8i0zss9z8p4qprls4gbh7q4218l9845kclx7wvw41809k6z"; }) 361 + (fetchNuGet { pname = "System.Security.Principal.Windows"; version = "4.5.0"; sha256 = "0rmj89wsl5yzwh0kqjgx45vzf694v9p92r4x4q6yxldk1cv1hi86"; }) 362 + (fetchNuGet { pname = "System.Security.SecureString"; version = "4.0.0"; sha256 = "026q5f46585hgisz4svhnjc7q0ljprz43v15rybqizlyli5585jz"; }) 363 + (fetchNuGet { pname = "System.Security.SecureString"; version = "4.3.0"; sha256 = "1dypfbw7mxd8cbpcxs3jrp7i5wm1vnp43bv823mk2z94r36ixqfc"; }) 364 + (fetchNuGet { pname = "System.Text.Encoding"; version = "4.0.11"; sha256 = "1dyqv0hijg265dwxg6l7aiv74102d6xjiwplh2ar1ly6xfaa4iiw"; }) 365 + (fetchNuGet { pname = "System.Text.Encoding"; version = "4.3.0"; sha256 = "1f04lkir4iladpp51sdgmis9dj4y8v08cka0mbmsy0frc9a4gjqr"; }) 366 + (fetchNuGet { pname = "System.Text.Encoding.CodePages"; version = "4.5.0"; sha256 = "19x38911pawq4mrxrm04l2bnxwxxlzq8v8rj4cbxnfjj8pnd3vj3"; }) 367 + (fetchNuGet { pname = "System.Text.Encoding.CodePages"; version = "4.5.1"; sha256 = "1z21qyfs6sg76rp68qdx0c9iy57naan89pg7p6i3qpj8kyzn921w"; }) 368 + (fetchNuGet { pname = "System.Text.Encoding.Extensions"; version = "4.0.11"; sha256 = "08nsfrpiwsg9x5ml4xyl3zyvjfdi4mvbqf93kjdh11j4fwkznizs"; }) 369 + (fetchNuGet { pname = "System.Text.Encoding.Extensions"; version = "4.3.0"; sha256 = "11q1y8hh5hrp5a3kw25cb6l00v5l5dvirkz8jr3sq00h1xgcgrxy"; }) 370 + (fetchNuGet { pname = "System.Text.Encodings.Web"; version = "4.6.0"; sha256 = "0j61vkkcz390zbqsqqzdrzk4siqipi4359bgkh6icxli671k479l"; }) 371 + (fetchNuGet { pname = "System.Text.Encodings.Web"; version = "4.7.1"; sha256 = "1wj7r07mjwbf9a79kapy2l9m8mcq8b3nbhg0zaprlsav09k85fmb"; }) 372 + (fetchNuGet { pname = "System.Text.Json"; version = "4.6.0"; sha256 = "0ism236hwi0k6axssfq58s1d8lihplwiz058pdvl8al71hagri39"; }) 373 + (fetchNuGet { pname = "System.Text.Json"; version = "4.7.2"; sha256 = "10xj1pw2dgd42anikvj9qm23ccssrcp7dpznpj4j7xjp1ikhy3y4"; }) 374 + (fetchNuGet { pname = "System.Text.RegularExpressions"; version = "4.1.0"; sha256 = "1mw7vfkkyd04yn2fbhm38msk7dz2xwvib14ygjsb8dq2lcvr18y7"; }) 375 + (fetchNuGet { pname = "System.Text.RegularExpressions"; version = "4.3.0"; sha256 = "1bgq51k7fwld0njylfn7qc5fmwrk2137gdq7djqdsw347paa9c2l"; }) 376 + (fetchNuGet { pname = "System.Threading"; version = "4.0.11"; sha256 = "19x946h926bzvbsgj28csn46gak2crv2skpwsx80hbgazmkgb1ls"; }) 377 + (fetchNuGet { pname = "System.Threading"; version = "4.3.0"; sha256 = "0rw9wfamvhayp5zh3j7p1yfmx9b5khbf4q50d8k5rk993rskfd34"; }) 378 + (fetchNuGet { pname = "System.Threading.Overlapped"; version = "4.0.1"; sha256 = "0fi79az3vmqdp9mv3wh2phblfjls89zlj6p9nc3i9f6wmfarj188"; }) 379 + (fetchNuGet { pname = "System.Threading.Tasks"; version = "4.0.11"; sha256 = "0nr1r41rak82qfa5m0lhk9mp0k93bvfd7bbd9sdzwx9mb36g28p5"; }) 380 + (fetchNuGet { pname = "System.Threading.Tasks"; version = "4.3.0"; sha256 = "134z3v9abw3a6jsw17xl3f6hqjpak5l682k2vz39spj4kmydg6k7"; }) 381 + (fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.0.0"; sha256 = "1cb51z062mvc2i8blpzmpn9d9mm4y307xrwi65di8ri18cz5r1zr"; }) 382 + (fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.3.0"; sha256 = "1xxcx2xh8jin360yjwm4x4cf5y3a2bwpn2ygkfkwkicz7zk50s2z"; }) 383 + (fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.5.2"; sha256 = "1sh63dz0dymqcwmprp0nadm77b83vmm7lyllpv578c397bslb8hj"; }) 384 + (fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.5.3"; sha256 = "0g7r6hm572ax8v28axrdxz1gnsblg6kszq17g51pj14a5rn2af7i"; }) 385 + (fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.5.4"; sha256 = "0y6ncasgfcgnjrhynaf0lwpkpkmv4a07sswwkwbwb5h7riisj153"; }) 386 + (fetchNuGet { pname = "System.Threading.Thread"; version = "4.0.0"; sha256 = "1gxxm5fl36pjjpnx1k688dcw8m9l7nmf802nxis6swdaw8k54jzc"; }) 387 + (fetchNuGet { pname = "System.Threading.ThreadPool"; version = "4.0.10"; sha256 = "0fdr61yjcxh5imvyf93n2m3n5g9pp54bnw2l1d2rdl9z6dd31ypx"; }) 388 + (fetchNuGet { pname = "System.Threading.ThreadPool"; version = "4.3.0"; sha256 = "027s1f4sbx0y1xqw2irqn6x161lzj8qwvnh2gn78ciiczdv10vf1"; }) 389 + (fetchNuGet { pname = "System.ValueTuple"; version = "4.5.0"; sha256 = "00k8ja51d0f9wrq4vv5z2jhq8hy31kac2rg0rv06prylcybzl8cy"; }) 390 + (fetchNuGet { pname = "System.Xml.ReaderWriter"; version = "4.0.11"; sha256 = "0c6ky1jk5ada9m94wcadih98l6k1fvf6vi7vhn1msjixaha419l5"; }) 391 + (fetchNuGet { pname = "System.Xml.ReaderWriter"; version = "4.3.0"; sha256 = "0c47yllxifzmh8gq6rq6l36zzvw4kjvlszkqa9wq3fr59n0hl3s1"; }) 392 + (fetchNuGet { pname = "System.Xml.XDocument"; version = "4.0.11"; sha256 = "0n4lvpqzy9kc7qy1a4acwwd7b7pnvygv895az5640idl2y9zbz18"; }) 393 + (fetchNuGet { pname = "System.Xml.XDocument"; version = "4.3.0"; sha256 = "08h8fm4l77n0nd4i4fk2386y809bfbwqb7ih9d7564ifcxr5ssxd"; }) 394 + (fetchNuGet { pname = "System.Xml.XmlDocument"; version = "4.3.0"; sha256 = "0bmz1l06dihx52jxjr22dyv5mxv6pj4852lx68grjm7bivhrbfwi"; }) 395 + (fetchNuGet { pname = "System.Xml.XmlSerializer"; version = "4.3.0"; sha256 = "07pa4sx196vxkgl3csvdmw94nydlsm9ir38xxcs84qjn8cycd912"; }) 396 + ]
+40
pkgs/servers/web-apps/baget/updater.sh
··· 1 + #!/usr/bin/env nix-shell 2 + #!nix-shell -i bash -p gnused jq common-updater-scripts nuget-to-nix dotnet-sdk_3 nix-prefetch-github 3 + set -eo pipefail 4 + cd "$(dirname "${BASH_SOURCE[0]}")" 5 + 6 + deps_file="$(realpath ./deps.nix)" 7 + 8 + new_version="$(curl -s "https://api.github.com/repos/loic-sharma/BaGet/releases?per_page=1" | jq -r '.[0].name' | sed 's,^v,,')" 9 + old_version="$(sed -nE 's/\s*version = "(.*)".*/\1/p' ./default.nix)" 10 + 11 + if [[ "$new_version" == "$old_version" ]]; then 12 + echo "Already up to date!" 13 + exit 0 14 + fi 15 + 16 + new_rev="v$new_version" 17 + nix-prefetch-github loic-sharma BaGet --rev "$new_rev" > repo_info 18 + new_hash="$(jq -r ".sha256" < repo_info)" 19 + rm repo_info 20 + 21 + pushd ../../../.. 22 + 23 + update-source-version baget "$new_version" "$new_hash" 24 + store_src="$(nix-build -A baget.src --no-out-link)" 25 + src="$(mktemp -d /tmp/baget-src.XXX)" 26 + cp -rT "$store_src" "$src" 27 + 28 + trap 'rm -r "$src"' EXIT 29 + 30 + chmod -R +w "$src" 31 + 32 + pushd "$src" 33 + 34 + export DOTNET_NOLOGO=1 35 + export DOTNET_CLI_TELEMETRY_OPTOUT=1 36 + 37 + mkdir ./nuget_pkgs 38 + dotnet restore src/BaGet/BaGet.csproj --packages ./nuget_pkgs 39 + 40 + nuget-to-nix ./nuget_pkgs > "$deps_file"
+1 -3
pkgs/shells/zsh/default.nix
··· 55 55 checkFlags = map (T: "TESTNUM=${T}") (lib.stringToCharacters "ABCDEVW"); 56 56 57 57 # XXX: think/discuss about this, also with respect to nixos vs nix-on-X 58 - postInstall = lib.optionalString stdenv.isDarwin '' 59 - make install.bin install.modules install.fns 60 - '' + lib.optionalString stdenv.isLinux '' 58 + postInstall = lib.optionalString stdenv.isLinux '' 61 59 make install.info install.html 62 60 '' + '' 63 61 mkdir -p $out/etc/
+3 -3
pkgs/tools/filesystems/lfs/default.nix
··· 5 5 6 6 rustPlatform.buildRustPackage rec { 7 7 pname = "lfs"; 8 - version = "1.3.1"; 8 + version = "1.4.0"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "Canop"; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-3zGCVT3SfQm72CF2MasT7k5r1Jx9DRUrXKHBSpvcv10="; 14 + sha256 = "sha256-mTgJ2DbSQprKKy7wTMXwmUAvHS9tacs9Nk1cmEJW9Sg="; 15 15 }; 16 16 17 - cargoSha256 = "sha256-Q4eNvOY5c4KybDKVhcOznxGPUgyjgEYPD8+9r6sECXA="; 17 + cargoSha256 = "sha256-Oiiz7I2eCtNMauvr0K2NtB49NJ/6XWVsJ0mMyEgFb7U="; 18 18 19 19 meta = with lib; { 20 20 description = "Get information on your mounted disks";
+3 -3
pkgs/tools/graphics/gifski/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "gifski"; 5 - version = "1.5.1"; 5 + version = "1.6.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "ImageOptim"; 9 9 repo = "gifski"; 10 10 rev = version; 11 - sha256 = "sha256-x2p+6m1pwXhmI9JvGUgLhxrGwpJa/e2wb5wOFdKQ2xg="; 11 + sha256 = "sha256-mM+gxBmMsdPUBOYyRdomd5+v+bqGN+udcuXI/stMZ4Y="; 12 12 }; 13 13 14 - cargoSha256 = "sha256-8t7VhPby56UX2LlD2xcJKkWamuJxN9LiVEQPEa78EQQ="; 14 + cargoSha256 = "sha256-5effx4tgMbnoVMO2Fza1naGFnMCvm0vhx6njo9/8bq0="; 15 15 16 16 nativeBuildInputs = [ pkg-config ]; 17 17
+3 -3
pkgs/tools/misc/code-minimap/default.nix
··· 7 7 8 8 rustPlatform.buildRustPackage rec { 9 9 pname = "code-minimap"; 10 - version = "0.6.2"; 10 + version = "0.6.4"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "wfxr"; 14 14 repo = pname; 15 15 rev = "v${version}"; 16 - sha256 = "sha256-nUEmlKqCskPEQCOS2NC6jF4yVDarJeb3p+BKZq/2qvw="; 16 + sha256 = "sha256-XhewfU3l/n2wiF9pKm1OOKQ7REzz3WzcBiVgOiYnAYU="; 17 17 }; 18 18 19 - cargoSha256 = "sha256-yjjoQYYWK9/9fOP5ICnhpuF/07SyCszB9GCDr0GJ0v0="; 19 + cargoSha256 = "sha256-Z3bc0w8slI9lHbDbrIK65xurtmTK4Y4caF7kxxJBA3Q="; 20 20 21 21 buildInputs = lib.optional stdenv.isDarwin libiconv; 22 22
+3 -3
pkgs/tools/misc/dua/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "dua"; 5 - version = "2.14.11"; 5 + version = "2.16.0"; 6 6 7 7 buildInputs = lib.optionals stdenv.isDarwin [ libiconv Foundation ]; 8 8 ··· 10 10 owner = "Byron"; 11 11 repo = "dua-cli"; 12 12 rev = "v${version}"; 13 - sha256 = "sha256-XMhgTJiP4whw1r+WtdG5CsQl/GIZPEg7/ElIEMZyWqM="; 13 + sha256 = "sha256-16qe5FKMC8cpGDR5HRVslYfG/OA8NSCuAbHpG7dfb3A="; 14 14 # Remove unicode file names which leads to different checksums on HFS+ 15 15 # vs. other filesystems because of unicode normalisation. 16 16 extraPostFetch = '' ··· 18 18 ''; 19 19 }; 20 20 21 - cargoSha256 = "sha256-B4e8wT/RhpwtCb11HqN8vksshBaF/CmpMPT62aBuFnw="; 21 + cargoSha256 = "sha256-FX8fkG+Ecx9ZnbpX8UlLKYh4V6IJ98IbvBln0gCdD2M="; 22 22 23 23 doCheck = false; 24 24
+3 -3
pkgs/tools/misc/kalker/default.nix
··· 6 6 }: 7 7 rustPlatform.buildRustPackage rec { 8 8 pname = "kalker"; 9 - version = "1.0.1-2"; 9 + version = "1.1.0"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "PaddiM8"; 13 13 repo = pname; 14 14 rev = "v${version}"; 15 - sha256 = "sha256-fXTsCHqm+wO/ygyg0y+44G9pgaaEEH9fgePCDH86/vU="; 15 + sha256 = "sha256-NnX4+VmV4oZg/8Z3ZCWHGZ6dqDfvH30XErnrvKMxyls="; 16 16 }; 17 17 18 - cargoSha256 = "sha256-Ul21otEYCJuX5GnfV9OTpk/+3y32biASYZQpOecr8aU="; 18 + cargoSha256 = "sha256-nSLbe3EhcLYylvyzOWuLIehBnD6mMofsNpFQVEybV8k="; 19 19 20 20 buildInputs = [ gmp mpfr libmpc ]; 21 21
+30
pkgs/tools/networking/qodem/default.nix
··· 1 + { lib, stdenv, fetchFromGitHub, autoconf, automake, ncurses, SDL, gpm, miniupnpc }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "qodem"; 5 + version = "1.0.1"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "klamonte"; 9 + repo = "qodem"; 10 + rev = "v${version}"; 11 + sha256 = "NAdcTVmNrDa3rbsbxJxFoI7sz5NK5Uw+TbP+a1CdB+Q="; 12 + }; 13 + 14 + nativeBuildInputs = [ autoconf automake ]; 15 + buildInputs = [ ncurses SDL gpm miniupnpc ]; 16 + 17 + meta = with lib; { 18 + homepage = "http://qodem.sourceforge.net/"; 19 + description = "Re-implementation of the DOS-era Qmodem serial communications package"; 20 + longDescription = '' 21 + Qodem is a from-scratch clone implementation of the Qmodem 22 + communications program made popular in the days when Bulletin Board 23 + Systems ruled the night. Qodem emulates the dialing directory and the 24 + terminal screen features of Qmodem over both modem and Internet 25 + connections. 26 + ''; 27 + maintainers = with maintainers; [ embr ]; 28 + license = licenses.publicDomain; 29 + }; 30 + }
+3 -3
pkgs/tools/security/b3sum/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "b3sum"; 5 - version = "1.2.0"; 5 + version = "1.3.0"; 6 6 7 7 src = fetchCrate { 8 8 inherit version pname; 9 - sha256 = "sha256-v6OCUXes8jaBh+sKqj1yCNOTb1NQY/ENGzKf5XWGZ3w="; 9 + sha256 = "sha256-mnX5ZetwOo0VMBIOqJEBpqnSX6EqBEO7qwfgtGclReQ="; 10 10 }; 11 11 12 - cargoSha256 = "sha256-y5QVgu716p8TFoEeWIzX9aJWeT3FKwlh5vUQkKR6pdE="; 12 + cargoSha256 = "sha256-SUoreAuWLxtBWmFdLDviDz16oVDB2ubTY3a3m+t8xx0="; 13 13 14 14 meta = { 15 15 description = "BLAKE3 cryptographic hash function";
+2 -2
pkgs/tools/security/exploitdb/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "exploitdb"; 5 - version = "2022-01-06"; 5 + version = "2022-01-11"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "offensive-security"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "sha256-SvzrUVuOzqcc4YzBYxuE8S0tFNb2Pr2FEj8KSpuKKGU="; 11 + sha256 = "sha256-uvjn/n+w5Zv/RwvQmE7bl4PFXdN2OO6FrrEVKdGNsgo="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/tools/security/gomapenum/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "gomapenum"; 8 - version = "1.0.0"; 8 + version = "1.0.2"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "nodauf"; 12 12 repo = "GoMapEnum"; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-6WZTmRse3mj1bimHE81JdSc4VKpMFbcJN3U4zgHMzJc="; 14 + sha256 = "sha256-6AwbG3rs3ZjCGpCDeesddXW63OOxsoWdRtueNx35K38="; 15 15 }; 16 16 17 17 vendorSha256 = "sha256-Z/uLZIPKd75P9nI7kTFOwzWFkRTVwUojYEQms4OJ6Bk=";
+3 -3
pkgs/tools/security/grype/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "grype"; 5 - version = "0.30.0"; 5 + version = "0.31.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "anchore"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-nUNjC1NNscqv+cirC/4/FlrbOomBXxnOoHvCVpBUOUs="; 11 + sha256 = "sha256-3V8qBgRIogZNisUshhs9Va9cbZ5D2hBJwqXPvqSmEWw="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-XUj9Az/N/ZzCJF6a7EipPTntwlFYuVhg8JoS+GJES+w="; 14 + vendorSha256 = "sha256-/Z0tRzd7v84h8TSfbT4EqwyHWpAb30VNr4EDrNlHyd4="; 15 15 16 16 nativeBuildInputs = [ installShellFiles ]; 17 17
+3 -3
pkgs/tools/security/httpx/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "httpx"; 8 - version = "1.1.4"; 8 + version = "1.1.5"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "projectdiscovery"; 12 12 repo = "httpx"; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-Mis3DQwcTazHVF7hkTRQ2OtQxeGut5LRUAloBXCdq3s="; 14 + sha256 = "sha256-XA099gBp52g0RUbbFSE8uFa7gh56bO8H66KaFAtK1RU="; 15 15 }; 16 16 17 - vendorSha256 = "sha256-53Mvc637J306MJLw+l1amAuZhUE/NdDvuWEe0fg4Hog="; 17 + vendorSha256 = "sha256-rmuRZ8jRwSaAYgrOBgJwsEOAaUNJwhPJX9hEaJTX6/E="; 18 18 19 19 meta = with lib; { 20 20 description = "Fast and multi-purpose HTTP toolkit";
+2 -2
pkgs/tools/security/kubescape/default.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "kubescape"; 9 - version = "1.0.138"; 9 + version = "1.0.139"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "armosec"; 13 13 repo = pname; 14 14 rev = "v${version}"; 15 - sha256 = "sha256-/Rp4eNlvlONiH3F6Zv9GDUF26tmSuhFGUL1MoKOFSEc="; 15 + sha256 = "sha256-CsIdr/+orDTGdEs4R069+PF3ZKuXx8uLxEsymFOLfOY="; 16 16 }; 17 17 18 18 nativeBuildInputs = [
+2 -2
pkgs/tools/system/thermald/default.nix
··· 18 18 19 19 stdenv.mkDerivation rec { 20 20 pname = "thermald"; 21 - version = "2.4.6"; 21 + version = "2.4.7"; 22 22 23 23 outputs = [ "out" "devdoc" ]; 24 24 ··· 26 26 owner = "intel"; 27 27 repo = "thermal_daemon"; 28 28 rev = "v${version}"; 29 - sha256 = "sha256-ZknZznoYVX3dNBIUvER6odv5eNrCV3//CXH1ypCf6tE="; 29 + sha256 = "sha256-1vRIpX4qH9QbinzZr//u7D9CZ6cUHirhXwnUuQyCEdg="; 30 30 }; 31 31 32 32 nativeBuildInputs = [
+10
pkgs/top-level/all-packages.nix
··· 2126 2126 2127 2127 badvpn = callPackage ../tools/networking/badvpn {}; 2128 2128 2129 + baget = callPackage ../servers/web-apps/baget { }; 2130 + 2129 2131 barcode = callPackage ../tools/graphics/barcode {}; 2130 2132 2131 2133 bashmount = callPackage ../tools/filesystems/bashmount {}; ··· 9050 9052 9051 9053 qmk = callPackage ../tools/misc/qmk { }; 9052 9054 9055 + qodem = callPackage ../tools/networking/qodem { }; 9056 + 9053 9057 qosmic = libsForQt5.callPackage ../applications/graphics/qosmic { }; 9054 9058 9055 9059 qownnotes = libsForQt514.callPackage ../applications/office/qownnotes { }; ··· 14894 14898 itstool = callPackage ../development/tools/misc/itstool { }; 14895 14899 14896 14900 jam = callPackage ../development/tools/build-managers/jam { }; 14901 + 14902 + ftjam = callPackage ../development/tools/build-managers/jam/ftjam.nix { }; 14897 14903 14898 14904 javacc = callPackage ../development/tools/parsing/javacc { 14899 14905 jdk = jdk8; ··· 30248 30254 30249 30255 ballerburg = callPackage ../games/ballerburg { } ; 30250 30256 30257 + blockattack = callPackage ../games/blockattack { } ; 30258 + 30251 30259 colobot = callPackage ../games/colobot {}; 30252 30260 30253 30261 doom-bcc = callPackage ../games/zdoom/bcc-git.nix { }; ··· 31165 31173 taisei = callPackage ../games/taisei { }; 31166 31174 31167 31175 tcl2048 = callPackage ../games/tcl2048 { }; 31176 + 31177 + the-legend-of-edgar = callPackage ../games/the-legend-of-edgar { }; 31168 31178 31169 31179 the-powder-toy = callPackage ../games/the-powder-toy { 31170 31180 lua = lua5_1;
+6
pkgs/top-level/python-packages.nix
··· 4215 4215 4216 4216 jsonstreams = callPackage ../development/python-modules/jsonstreams { }; 4217 4217 4218 + json-tricks = callPackage ../development/python-modules/json-tricks { }; 4219 + 4218 4220 jug = callPackage ../development/python-modules/jug { }; 4219 4221 4220 4222 junitparser = callPackage ../development/python-modules/junitparser { }; ··· 9469 9471 9470 9472 synologydsm-api = callPackage ../development/python-modules/synologydsm-api { }; 9471 9473 9474 + syslog-rfc5424-formatter = callPackage ../development/python-modules/syslog-rfc5424-formatter { }; 9475 + 9472 9476 systembridge = callPackage ../development/python-modules/systembridge { }; 9473 9477 9474 9478 systemd = callPackage ../development/python-modules/systemd { ··· 9939 9943 types-toml = callPackage ../development/python-modules/types-toml { }; 9940 9944 9941 9945 types-typed-ast = callPackage ../development/python-modules/types-typed-ast { }; 9946 + 9947 + types-urllib3 = callPackage ../development/python-modules/types-urllib3 { }; 9942 9948 9943 9949 typesentry = callPackage ../development/python-modules/typesentry { }; 9944 9950