Merge staging-next into staging

authored by github-actions[bot] and committed by GitHub e8dc263c cec59288

+1691 -248
+14 -17
lib/attrsets.nix
··· 3 4 let 5 inherit (builtins) head tail length; 6 - inherit (lib.trivial) and; 7 inherit (lib.strings) concatStringsSep sanitizeDerivationName; 8 - inherit (lib.lists) foldr foldl' concatMap concatLists elemAt; 9 in 10 11 rec { ··· 73 getAttrFromPath ["z" "z"] x 74 => error: cannot find attribute `z.z' 75 */ 76 - getAttrFromPath = attrPath: set: 77 let errorMsg = "cannot find attribute `" + concatStringsSep "." attrPath + "'"; 78 - in attrByPath attrPath (abort errorMsg) set; 79 80 81 /* Return the specified attributes from a set. ··· 154 foldAttrs (n: a: [n] ++ a) [] [{ a = 2; } { a = 3; }] 155 => { a = [ 2 3 ]; } 156 */ 157 - foldAttrs = op: nul: list_of_attrs: 158 foldr (n: a: 159 foldr (name: o: 160 o // { ${name} = op n.${name} (a.${name} or nul); } 161 ) a (attrNames n) 162 - ) {} list_of_attrs; 163 164 165 /* Recursively collect sets that verify a given predicate named `pred' ··· 295 */ 296 mapAttrsRecursiveCond = cond: f: set: 297 let 298 - recurse = path: set: 299 let 300 g = 301 name: value: 302 if isAttrs value && cond value 303 then recurse (path ++ [name]) value 304 else f (path ++ [name]) value; 305 - in mapAttrs g set; 306 in recurse [] set; 307 308 ··· 369 value = f name (catAttrs name sets); 370 }) names); 371 372 - /* Implementation note: Common names appear multiple times in the list of 373 names, hopefully this does not affect the system because the maximal 374 laziness avoid computing twice the same expression and listToAttrs does 375 not care about duplicated attribute names. ··· 420 let f = attrPath: 421 zipAttrsWith (n: values: 422 let here = attrPath ++ [n]; in 423 - if tail values == [] 424 - || pred here (head (tail values)) (head values) then 425 head values 426 else 427 f here values ··· 447 } 448 449 */ 450 - recursiveUpdate = lhs: rhs: 451 - recursiveUpdateUntil (path: lhs: rhs: 452 - !(isAttrs lhs && isAttrs rhs) 453 - ) lhs rhs; 454 455 /* Returns true if the pattern is contained in the set. False otherwise. 456 ··· 459 => true 460 */ 461 matchAttrs = pattern: attrs: assert isAttrs pattern; 462 - foldr and true (attrValues (zipAttrsWithNames (attrNames pattern) (n: values: 463 - let pat = head values; val = head (tail values); in 464 if length values == 1 then false 465 else if isAttrs pat then isAttrs val && matchAttrs pat val 466 else pat == val
··· 3 4 let 5 inherit (builtins) head tail length; 6 + inherit (lib.trivial) id; 7 inherit (lib.strings) concatStringsSep sanitizeDerivationName; 8 + inherit (lib.lists) foldr foldl' concatMap concatLists elemAt all; 9 in 10 11 rec { ··· 73 getAttrFromPath ["z" "z"] x 74 => error: cannot find attribute `z.z' 75 */ 76 + getAttrFromPath = attrPath: 77 let errorMsg = "cannot find attribute `" + concatStringsSep "." attrPath + "'"; 78 + in attrByPath attrPath (abort errorMsg); 79 80 81 /* Return the specified attributes from a set. ··· 154 foldAttrs (n: a: [n] ++ a) [] [{ a = 2; } { a = 3; }] 155 => { a = [ 2 3 ]; } 156 */ 157 + foldAttrs = op: nul: 158 foldr (n: a: 159 foldr (name: o: 160 o // { ${name} = op n.${name} (a.${name} or nul); } 161 ) a (attrNames n) 162 + ) {}; 163 164 165 /* Recursively collect sets that verify a given predicate named `pred' ··· 295 */ 296 mapAttrsRecursiveCond = cond: f: set: 297 let 298 + recurse = path: 299 let 300 g = 301 name: value: 302 if isAttrs value && cond value 303 then recurse (path ++ [name]) value 304 else f (path ++ [name]) value; 305 + in mapAttrs g; 306 in recurse [] set; 307 308 ··· 369 value = f name (catAttrs name sets); 370 }) names); 371 372 + /* Implementation note: Common names appear multiple times in the list of 373 names, hopefully this does not affect the system because the maximal 374 laziness avoid computing twice the same expression and listToAttrs does 375 not care about duplicated attribute names. ··· 420 let f = attrPath: 421 zipAttrsWith (n: values: 422 let here = attrPath ++ [n]; in 423 + if length values == 1 424 + || pred here (elemAt values 1) (head values) then 425 head values 426 else 427 f here values ··· 447 } 448 449 */ 450 + recursiveUpdate = recursiveUpdateUntil (path: lhs: rhs: !(isAttrs lhs && isAttrs rhs)); 451 452 /* Returns true if the pattern is contained in the set. False otherwise. 453 ··· 456 => true 457 */ 458 matchAttrs = pattern: attrs: assert isAttrs pattern; 459 + all id (attrValues (zipAttrsWithNames (attrNames pattern) (n: values: 460 + let pat = head values; val = elemAt values 1; in 461 if length values == 1 then false 462 else if isAttrs pat then isAttrs val && matchAttrs pat val 463 else pat == val
+22
nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
··· 119 <link xlink:href="options.html#opt-services.archisteamfarm.enable">services.archisteamfarm</link>. 120 </para> 121 </listitem> 122 </itemizedlist> 123 </section> 124 <section xml:id="sec-release-22.05-incompatibilities"> ··· 204 <literal>/etc/docker/daemon.json</literal>, you need to 205 incorporate the changes into the new option 206 <literal>virtualisation.docker.daemon.settings</literal>. 207 </para> 208 </listitem> 209 <listitem>
··· 119 <link xlink:href="options.html#opt-services.archisteamfarm.enable">services.archisteamfarm</link>. 120 </para> 121 </listitem> 122 + <listitem> 123 + <para> 124 + <link xlink:href="https://goteleport.com">teleport</link>, 125 + allows engineers and security professionals to unify access 126 + for SSH servers, Kubernetes clusters, web applications, and 127 + databases across all environments. Available at 128 + <link linkend="opt-services.teleport.enable">services.teleport</link>. 129 + </para> 130 + </listitem> 131 + <listitem> 132 + <para> 133 + <link xlink:href="https://loic-sharma.github.io/BaGet/">BaGet</link>, 134 + a lightweight NuGet and symbol server. Available at 135 + <link linkend="opt-services.baget.enable">services.baget</link>. 136 + </para> 137 + </listitem> 138 </itemizedlist> 139 </section> 140 <section xml:id="sec-release-22.05-incompatibilities"> ··· 220 <literal>/etc/docker/daemon.json</literal>, you need to 221 incorporate the changes into the new option 222 <literal>virtualisation.docker.daemon.settings</literal>. 223 + </para> 224 + </listitem> 225 + <listitem> 226 + <para> 227 + opensmtpd-extras is no longer build with python2 scripting 228 + support due to python2 deprecation in nixpkgs 229 </para> 230 </listitem> 231 <listitem>
+6
nixos/doc/manual/release-notes/rl-2205.section.md
··· 37 38 - [ArchiSteamFarm](https://github.com/JustArchiNET/ArchiSteamFarm), a C# application with primary purpose of idling Steam cards from multiple accounts simultaneously. Available as [services.archisteamfarm](options.html#opt-services.archisteamfarm.enable). 39 40 ## Backward Incompatibilities {#sec-release-22.05-incompatibilities} 41 42 - `pkgs.ghc` now refers to `pkgs.targetPackages.haskellPackages.ghc`. ··· 69 Scripts have to be converted to Python 3 for use with `writers.writePython3` or `writers.writePyPy2` needs to be used. 70 71 - If you previously used `/etc/docker/daemon.json`, you need to incorporate the changes into the new option `virtualisation.docker.daemon.settings`. 72 73 - The `autorestic` package has been upgraded from 1.3.0 to 1.5.0 which introduces breaking changes in config file, check [their migration guide](https://autorestic.vercel.app/migration/1.4_1.5) for more details. 74
··· 37 38 - [ArchiSteamFarm](https://github.com/JustArchiNET/ArchiSteamFarm), a C# application with primary purpose of idling Steam cards from multiple accounts simultaneously. Available as [services.archisteamfarm](options.html#opt-services.archisteamfarm.enable). 39 40 + - [teleport](https://goteleport.com), allows engineers and security professionals to unify access for SSH servers, Kubernetes clusters, web applications, and databases across all environments. Available at [services.teleport](#opt-services.teleport.enable). 41 + 42 + - [BaGet](https://loic-sharma.github.io/BaGet/), a lightweight NuGet and symbol server. Available at [services.baget](#opt-services.baget.enable). 43 + 44 ## Backward Incompatibilities {#sec-release-22.05-incompatibilities} 45 46 - `pkgs.ghc` now refers to `pkgs.targetPackages.haskellPackages.ghc`. ··· 73 Scripts have to be converted to Python 3 for use with `writers.writePython3` or `writers.writePyPy2` needs to be used. 74 75 - If you previously used `/etc/docker/daemon.json`, you need to incorporate the changes into the new option `virtualisation.docker.daemon.settings`. 76 + 77 + - opensmtpd-extras is no longer build with python2 scripting support due to python2 deprecation in nixpkgs 78 79 - The `autorestic` package has been upgraded from 1.3.0 to 1.5.0 which introduces breaking changes in config file, check [their migration guide](https://autorestic.vercel.app/migration/1.4_1.5) for more details. 80
+3 -1
nixos/modules/module-list.nix
··· 226 ./programs/zsh/zsh-autosuggestions.nix 227 ./programs/zsh/zsh-syntax-highlighting.nix 228 ./rename.nix 229 - ./security/acme.nix 230 ./security/apparmor.nix 231 ./security/audit.nix 232 ./security/auditd.nix ··· 891 ./services/networking/tcpcrypt.nix 892 ./services/networking/teamspeak3.nix 893 ./services/networking/tedicross.nix 894 ./services/networking/thelounge.nix 895 ./services/networking/tinc.nix 896 ./services/networking/tinydns.nix ··· 991 ./services/web-apps/bookstack.nix 992 ./services/web-apps/calibre-web.nix 993 ./services/web-apps/code-server.nix 994 ./services/web-apps/convos.nix 995 ./services/web-apps/cryptpad.nix 996 ./services/web-apps/dex.nix
··· 226 ./programs/zsh/zsh-autosuggestions.nix 227 ./programs/zsh/zsh-syntax-highlighting.nix 228 ./rename.nix 229 + ./security/acme 230 ./security/apparmor.nix 231 ./security/audit.nix 232 ./security/auditd.nix ··· 891 ./services/networking/tcpcrypt.nix 892 ./services/networking/teamspeak3.nix 893 ./services/networking/tedicross.nix 894 + ./services/networking/teleport.nix 895 ./services/networking/thelounge.nix 896 ./services/networking/tinc.nix 897 ./services/networking/tinydns.nix ··· 992 ./services/web-apps/bookstack.nix 993 ./services/web-apps/calibre-web.nix 994 ./services/web-apps/code-server.nix 995 + ./services/web-apps/baget.nix 996 ./services/web-apps/convos.nix 997 ./services/web-apps/cryptpad.nix 998 ./services/web-apps/dex.nix
+1 -1
nixos/modules/security/acme.nix nixos/modules/security/acme/default.nix
··· 916 917 meta = { 918 maintainers = lib.teams.acme.members; 919 - doc = ./acme.xml; 920 }; 921 }
··· 916 917 meta = { 918 maintainers = lib.teams.acme.members; 919 + doc = ./doc.xml; 920 }; 921 }
nixos/modules/security/acme.xml nixos/modules/security/acme/doc.xml
+4
nixos/modules/security/acme/mk-cert-ownership-assertion.nix
···
··· 1 + { cert, group, groups, user }: { 2 + assertion = cert.group == group || builtins.any (u: u == user) groups.${cert.group}.members; 3 + message = "Group for certificate ${cert.domain} must be ${group}, or user ${user} must be a member of group ${cert.group}"; 4 + }
+99
nixos/modules/services/networking/teleport.nix
···
··· 1 + { config, pkgs, lib, ... }: 2 + 3 + with lib; 4 + 5 + let 6 + cfg = config.services.teleport; 7 + settingsYaml = pkgs.formats.yaml { }; 8 + in 9 + { 10 + options = { 11 + services.teleport = with lib.types; { 12 + enable = mkEnableOption "the Teleport service"; 13 + 14 + settings = mkOption { 15 + type = settingsYaml.type; 16 + default = { }; 17 + example = literalExpression '' 18 + { 19 + teleport = { 20 + nodename = "client"; 21 + advertise_ip = "192.168.1.2"; 22 + auth_token = "60bdc117-8ff4-478d-95e4-9914597847eb"; 23 + auth_servers = [ "192.168.1.1:3025" ]; 24 + log.severity = "DEBUG"; 25 + }; 26 + ssh_service = { 27 + enabled = true; 28 + labels = { 29 + role = "client"; 30 + }; 31 + }; 32 + proxy_service.enabled = false; 33 + auth_service.enabled = false; 34 + } 35 + ''; 36 + description = '' 37 + Contents of the <literal>teleport.yaml</literal> config file. 38 + The <literal>--config</literal> arguments will only be passed if this set is not empty. 39 + 40 + See <link xlink:href="https://goteleport.com/docs/setup/reference/config/"/>. 41 + ''; 42 + }; 43 + 44 + insecure.enable = mkEnableOption '' 45 + starting teleport in insecure mode. 46 + 47 + This is dangerous! 48 + Sensitive information will be logged to console and certificates will not be verified. 49 + Proceed with caution! 50 + 51 + Teleport starts with disabled certificate validation on Proxy Service, validation still occurs on Auth Service 52 + ''; 53 + 54 + diag = { 55 + enable = mkEnableOption '' 56 + endpoints for monitoring purposes. 57 + 58 + See <link xlink:href="https://goteleport.com/docs/setup/admin/troubleshooting/#troubleshooting/"/> 59 + ''; 60 + 61 + addr = mkOption { 62 + type = str; 63 + default = "127.0.0.1"; 64 + description = "Metrics and diagnostics address."; 65 + }; 66 + 67 + port = mkOption { 68 + type = int; 69 + default = 3000; 70 + description = "Metrics and diagnostics port."; 71 + }; 72 + }; 73 + }; 74 + }; 75 + 76 + config = mkIf config.services.teleport.enable { 77 + environment.systemPackages = [ pkgs.teleport ]; 78 + 79 + systemd.services.teleport = { 80 + wantedBy = [ "multi-user.target" ]; 81 + after = [ "network.target" ]; 82 + serviceConfig = { 83 + ExecStart = '' 84 + ${pkgs.teleport}/bin/teleport start \ 85 + ${optionalString cfg.insecure.enable "--insecure"} \ 86 + ${optionalString cfg.diag.enable "--diag-addr=${cfg.diag.addr}:${toString cfg.diag.port}"} \ 87 + ${optionalString (cfg.settings != { }) "--config=${settingsYaml.generate "teleport.yaml" cfg.settings}"} 88 + ''; 89 + ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID"; 90 + LimitNOFILE = 65536; 91 + Restart = "always"; 92 + RestartSec = "5s"; 93 + RuntimeDirectory = "teleport"; 94 + Type = "simple"; 95 + }; 96 + }; 97 + }; 98 + } 99 +
+3 -1
nixos/modules/services/system/nscd.nix
··· 50 systemd.services.nscd = 51 { description = "Name Service Cache Daemon"; 52 53 - wantedBy = [ "nss-lookup.target" "nss-user-lookup.target" ]; 54 55 environment = { LD_LIBRARY_PATH = nssModulesPath; }; 56
··· 50 systemd.services.nscd = 51 { description = "Name Service Cache Daemon"; 52 53 + before = [ "nss-lookup.target" "nss-user-lookup.target" ]; 54 + wants = [ "nss-lookup.target" "nss-user-lookup.target" ]; 55 + wantedBy = [ "multi-user.target" ]; 56 57 environment = { LD_LIBRARY_PATH = nssModulesPath; }; 58
+170
nixos/modules/services/web-apps/baget.nix
···
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; 4 + 5 + let 6 + 7 + cfg = config.services.baget; 8 + 9 + defaultConfig = { 10 + "PackageDeletionBehavior" = "Unlist"; 11 + "AllowPackageOverwrites" = false; 12 + 13 + "Database" = { 14 + "Type" = "Sqlite"; 15 + "ConnectionString" = "Data Source=baget.db"; 16 + }; 17 + 18 + "Storage" = { 19 + "Type" = "FileSystem"; 20 + "Path" = ""; 21 + }; 22 + 23 + "Search" = { 24 + "Type" = "Database"; 25 + }; 26 + 27 + "Mirror" = { 28 + "Enabled" = false; 29 + "PackageSource" = "https://api.nuget.org/v3/index.json"; 30 + }; 31 + 32 + "Logging" = { 33 + "IncludeScopes" = false; 34 + "Debug" = { 35 + "LogLevel" = { 36 + "Default" = "Warning"; 37 + }; 38 + }; 39 + "Console" = { 40 + "LogLevel" = { 41 + "Microsoft.Hosting.Lifetime" = "Information"; 42 + "Default" = "Warning"; 43 + }; 44 + }; 45 + }; 46 + }; 47 + 48 + configAttrs = recursiveUpdate defaultConfig cfg.extraConfig; 49 + 50 + configFormat = pkgs.formats.json {}; 51 + configFile = configFormat.generate "appsettings.json" configAttrs; 52 + 53 + in 54 + { 55 + options.services.baget = { 56 + enable = mkEnableOption "BaGet NuGet-compatible server"; 57 + 58 + apiKeyFile = mkOption { 59 + type = types.path; 60 + example = "/root/baget.key"; 61 + description = '' 62 + Private API key for BaGet. 63 + ''; 64 + }; 65 + 66 + extraConfig = mkOption { 67 + type = configFormat.type; 68 + default = {}; 69 + example = { 70 + "Database" = { 71 + "Type" = "PostgreSql"; 72 + "ConnectionString" = "Server=/run/postgresql;Port=5432;"; 73 + }; 74 + }; 75 + defaultText = literalExpression '' 76 + { 77 + "PackageDeletionBehavior" = "Unlist"; 78 + "AllowPackageOverwrites" = false; 79 + 80 + "Database" = { 81 + "Type" = "Sqlite"; 82 + "ConnectionString" = "Data Source=baget.db"; 83 + }; 84 + 85 + "Storage" = { 86 + "Type" = "FileSystem"; 87 + "Path" = ""; 88 + }; 89 + 90 + "Search" = { 91 + "Type" = "Database"; 92 + }; 93 + 94 + "Mirror" = { 95 + "Enabled" = false; 96 + "PackageSource" = "https://api.nuget.org/v3/index.json"; 97 + }; 98 + 99 + "Logging" = { 100 + "IncludeScopes" = false; 101 + "Debug" = { 102 + "LogLevel" = { 103 + "Default" = "Warning"; 104 + }; 105 + }; 106 + "Console" = { 107 + "LogLevel" = { 108 + "Microsoft.Hosting.Lifetime" = "Information"; 109 + "Default" = "Warning"; 110 + }; 111 + }; 112 + }; 113 + } 114 + ''; 115 + description = '' 116 + Extra configuration options for BaGet. Refer to <link xlink:href="https://loic-sharma.github.io/BaGet/configuration/"/> for details. 117 + Default value is merged with values from here. 118 + ''; 119 + }; 120 + }; 121 + 122 + # implementation 123 + 124 + config = mkIf cfg.enable { 125 + 126 + systemd.services.baget = { 127 + description = "BaGet server"; 128 + wantedBy = [ "multi-user.target" ]; 129 + wants = [ "network-online.target" ]; 130 + after = [ "network.target" "network-online.target" ]; 131 + path = [ pkgs.jq ]; 132 + serviceConfig = { 133 + WorkingDirectory = "/var/lib/baget"; 134 + DynamicUser = true; 135 + StateDirectory = "baget"; 136 + StateDirectoryMode = "0700"; 137 + LoadCredential = "api_key:${cfg.apiKeyFile}"; 138 + 139 + CapabilityBoundingSet = ""; 140 + NoNewPrivileges = true; 141 + PrivateDevices = true; 142 + PrivateTmp = true; 143 + PrivateUsers = true; 144 + PrivateMounts = true; 145 + ProtectHome = true; 146 + ProtectClock = true; 147 + ProtectProc = "noaccess"; 148 + ProcSubset = "pid"; 149 + ProtectKernelLogs = true; 150 + ProtectKernelModules = true; 151 + ProtectKernelTunables = true; 152 + ProtectControlGroups = true; 153 + ProtectHostname = true; 154 + RestrictSUIDSGID = true; 155 + RestrictRealtime = true; 156 + RestrictNamespaces = true; 157 + LockPersonality = true; 158 + RemoveIPC = true; 159 + RestrictAddressFamilies = [ "AF_INET" "AF_INET6" ]; 160 + SystemCallFilter = [ "@system-service" "~@privileged" ]; 161 + }; 162 + script = '' 163 + jq --slurpfile apiKeys <(jq -R . "$CREDENTIALS_DIRECTORY/api_key") '.ApiKey = $apiKeys[0]' ${configFile} > appsettings.json 164 + ln -snf ${pkgs.baget}/lib/BaGet/wwwroot wwwroot 165 + exec ${pkgs.baget}/bin/BaGet 166 + ''; 167 + }; 168 + 169 + }; 170 + }
+7 -1
nixos/modules/services/web-servers/apache-httpd/default.nix
··· 370 cat ${php.phpIni} > $out 371 echo "$options" >> $out 372 ''; 373 in 374 375 ··· 657 `services.httpd.virtualHosts.<name>.useACMEHost` are mutually exclusive. 658 ''; 659 } 660 - ]; 661 662 warnings = 663 mapAttrsToList (name: hostOpts: ''
··· 370 cat ${php.phpIni} > $out 371 echo "$options" >> $out 372 ''; 373 + 374 + mkCertOwnershipAssertion = import ../../../security/acme/mk-cert-ownership-assertion.nix; 375 in 376 377 ··· 659 `services.httpd.virtualHosts.<name>.useACMEHost` are mutually exclusive. 660 ''; 661 } 662 + ] ++ map (name: mkCertOwnershipAssertion { 663 + inherit (cfg) group user; 664 + cert = config.security.acme.certs.${name}; 665 + groups = config.users.groups; 666 + }) dependentCertNames; 667 668 warnings = 669 mapAttrsToList (name: hostOpts: ''
+10 -3
nixos/modules/services/web-servers/caddy/default.nix
··· 38 ''; 39 in 40 if pkgs.stdenv.buildPlatform == pkgs.stdenv.hostPlatform then Caddyfile-formatted else Caddyfile; 41 in 42 { 43 imports = [ ··· 266 { assertion = cfg.adapter != "caddyfile" -> cfg.configFile != configFile; 267 message = "Any value other than 'caddyfile' is only valid when providing your own `services.caddy.configFile`"; 268 } 269 - ]; 270 271 services.caddy.extraConfig = concatMapStringsSep "\n" mkVHostConf virtualHosts; 272 services.caddy.globalConfig = '' ··· 323 324 security.acme.certs = 325 let 326 - eachACMEHost = unique (catAttrs "useACMEHost" acmeVHosts); 327 - reloads = map (useACMEHost: nameValuePair useACMEHost { reloadServices = [ "caddy.service" ]; }) eachACMEHost; 328 in 329 listToAttrs reloads; 330
··· 38 ''; 39 in 40 if pkgs.stdenv.buildPlatform == pkgs.stdenv.hostPlatform then Caddyfile-formatted else Caddyfile; 41 + 42 + acmeHosts = unique (catAttrs "useACMEHost" acmeVHosts); 43 + 44 + mkCertOwnershipAssertion = import ../../../security/acme/mk-cert-ownership-assertion.nix; 45 in 46 { 47 imports = [ ··· 270 { assertion = cfg.adapter != "caddyfile" -> cfg.configFile != configFile; 271 message = "Any value other than 'caddyfile' is only valid when providing your own `services.caddy.configFile`"; 272 } 273 + ] ++ map (name: mkCertOwnershipAssertion { 274 + inherit (cfg) group user; 275 + cert = config.security.acme.certs.${name}; 276 + groups = config.users.groups; 277 + }) acmeHosts; 278 279 services.caddy.extraConfig = concatMapStringsSep "\n" mkVHostConf virtualHosts; 280 services.caddy.globalConfig = '' ··· 331 332 security.acme.certs = 333 let 334 + reloads = map (useACMEHost: nameValuePair useACMEHost { reloadServices = [ "caddy.service" ]; }) acmeHosts; 335 in 336 listToAttrs reloads; 337
+7 -1
nixos/modules/services/web-servers/nginx/default.nix
··· 374 ${user}:{PLAIN}${password} 375 '') authDef) 376 ); 377 in 378 379 { ··· 842 services.nginx.virtualHosts.<name>.useACMEHost are mutually exclusive. 843 ''; 844 } 845 - ]; 846 847 systemd.services.nginx = { 848 description = "Nginx Web Server";
··· 374 ${user}:{PLAIN}${password} 375 '') authDef) 376 ); 377 + 378 + mkCertOwnershipAssertion = import ../../../security/acme/mk-cert-ownership-assertion.nix; 379 in 380 381 { ··· 844 services.nginx.virtualHosts.<name>.useACMEHost are mutually exclusive. 845 ''; 846 } 847 + ] ++ map (name: mkCertOwnershipAssertion { 848 + inherit (cfg) group user; 849 + cert = config.security.acme.certs.${name}; 850 + groups = config.users.groups; 851 + }) dependentCertNames; 852 853 systemd.services.nginx = { 854 description = "Nginx Web Server";
+6 -6
nixos/tests/acme.nix
··· 54 baseConfig = { nodes, config, specialConfig ? {} }: lib.mkMerge [ 55 { 56 security.acme = { 57 - defaults = (dnsConfig nodes) // { 58 - inherit group; 59 - }; 60 # One manual wildcard cert 61 certs."example.test" = { 62 domain = "*.example.test"; 63 }; 64 }; 65 66 services."${server}" = { 67 enable = true; ··· 252 } // (let 253 baseCaddyConfig = { nodes, config, ... }: { 254 security.acme = { 255 - defaults = (dnsConfig nodes) // { 256 - group = config.services.caddy.group; 257 - }; 258 # One manual wildcard cert 259 certs."example.test" = { 260 domain = "*.example.test"; 261 }; 262 }; 263 264 services.caddy = { 265 enable = true;
··· 54 baseConfig = { nodes, config, specialConfig ? {} }: lib.mkMerge [ 55 { 56 security.acme = { 57 + defaults = (dnsConfig nodes); 58 # One manual wildcard cert 59 certs."example.test" = { 60 domain = "*.example.test"; 61 }; 62 }; 63 + 64 + users.users."${config.services."${server}".user}".extraGroups = ["acme"]; 65 66 services."${server}" = { 67 enable = true; ··· 252 } // (let 253 baseCaddyConfig = { nodes, config, ... }: { 254 security.acme = { 255 + defaults = (dnsConfig nodes); 256 # One manual wildcard cert 257 certs."example.test" = { 258 domain = "*.example.test"; 259 }; 260 }; 261 + 262 + users.users."${config.services.caddy.user}".extraGroups = ["acme"]; 263 264 services.caddy = { 265 enable = true;
+1
nixos/tests/all-tests.nix
··· 471 systemd-unit-path = handleTest ./systemd-unit-path.nix {}; 472 taskserver = handleTest ./taskserver.nix {}; 473 telegraf = handleTest ./telegraf.nix {}; 474 tiddlywiki = handleTest ./tiddlywiki.nix {}; 475 tigervnc = handleTest ./tigervnc.nix {}; 476 timezone = handleTest ./timezone.nix {};
··· 471 systemd-unit-path = handleTest ./systemd-unit-path.nix {}; 472 taskserver = handleTest ./taskserver.nix {}; 473 telegraf = handleTest ./telegraf.nix {}; 474 + teleport = handleTest ./teleport.nix {}; 475 tiddlywiki = handleTest ./tiddlywiki.nix {}; 476 tigervnc = handleTest ./tigervnc.nix {}; 477 timezone = handleTest ./timezone.nix {};
+99
nixos/tests/teleport.nix
···
··· 1 + { system ? builtins.currentSystem 2 + , config ? { } 3 + , pkgs ? import ../.. { inherit system config; } 4 + }: 5 + 6 + with import ../lib/testing-python.nix { inherit system pkgs; }; 7 + 8 + let 9 + minimal = { config, ... }: { 10 + services.teleport.enable = true; 11 + }; 12 + 13 + client = { config, ... }: { 14 + services.teleport = { 15 + enable = true; 16 + settings = { 17 + teleport = { 18 + nodename = "client"; 19 + advertise_ip = "192.168.1.20"; 20 + auth_token = "8d1957b2-2ded-40e6-8297-d48156a898a9"; 21 + auth_servers = [ "192.168.1.10:3025" ]; 22 + log.severity = "DEBUG"; 23 + }; 24 + ssh_service = { 25 + enabled = true; 26 + labels = { 27 + role = "client"; 28 + }; 29 + }; 30 + proxy_service.enabled = false; 31 + auth_service.enabled = false; 32 + }; 33 + }; 34 + networking.interfaces.eth1.ipv4.addresses = [{ 35 + address = "192.168.1.20"; 36 + prefixLength = 24; 37 + }]; 38 + }; 39 + 40 + server = { config, ... }: { 41 + services.teleport = { 42 + enable = true; 43 + settings = { 44 + teleport = { 45 + nodename = "server"; 46 + advertise_ip = "192.168.1.10"; 47 + }; 48 + ssh_service.enabled = true; 49 + proxy_service.enabled = true; 50 + auth_service = { 51 + enabled = true; 52 + tokens = [ "node:8d1957b2-2ded-40e6-8297-d48156a898a9" ]; 53 + }; 54 + }; 55 + diag.enable = true; 56 + insecure.enable = true; 57 + }; 58 + networking = { 59 + firewall.allowedTCPPorts = [ 3025 ]; 60 + interfaces.eth1.ipv4.addresses = [{ 61 + address = "192.168.1.10"; 62 + prefixLength = 24; 63 + }]; 64 + }; 65 + }; 66 + in 67 + { 68 + minimal = makeTest { 69 + # minimal setup should always work 70 + name = "teleport-minimal-setup"; 71 + meta.maintainers = with pkgs.lib.maintainers; [ ymatsiuk ]; 72 + nodes = { inherit minimal; }; 73 + 74 + testScript = '' 75 + minimal.wait_for_open_port("3025") 76 + minimal.wait_for_open_port("3080") 77 + minimal.wait_for_open_port("3022") 78 + ''; 79 + }; 80 + 81 + basic = makeTest { 82 + # basic server and client test 83 + name = "teleport-server-client"; 84 + meta.maintainers = with pkgs.lib.maintainers; [ ymatsiuk ]; 85 + nodes = { inherit server client; }; 86 + 87 + testScript = '' 88 + with subtest("teleport ready"): 89 + server.wait_for_open_port("3025") 90 + client.wait_for_open_port("3022") 91 + 92 + with subtest("check applied configuration"): 93 + server.wait_until_succeeds("tctl get nodes --format=json | ${pkgs.jq}/bin/jq -e '.[] | select(.spec.hostname==\"client\") | .metadata.labels.role==\"client\"'") 94 + server.wait_for_open_port("3000") 95 + client.succeed("journalctl -u teleport.service --grep='DEBU'") 96 + server.succeed("journalctl -u teleport.service --grep='Starting teleport in insecure mode.'") 97 + ''; 98 + }; 99 + }
+2 -2
pkgs/applications/misc/octoprint/plugins.nix
··· 75 76 costestimation = buildPlugin rec { 77 pname = "CostEstimation"; 78 - version = "3.3.0"; 79 80 src = fetchFromGitHub { 81 owner = "OllisGit"; 82 repo = "OctoPrint-${pname}"; 83 rev = version; 84 - sha256 = "sha256-d7miGMCNJD0siaZb6EnoMZCkKot7vnZjxNZX2TunJcs="; 85 }; 86 87 meta = with lib; {
··· 75 76 costestimation = buildPlugin rec { 77 pname = "CostEstimation"; 78 + version = "3.4.0"; 79 80 src = fetchFromGitHub { 81 owner = "OllisGit"; 82 repo = "OctoPrint-${pname}"; 83 rev = version; 84 + sha256 = "sha256-04OPa/RpM8WehUmOp195ocsAjAvKdVY7iD5ybzQO7Dg="; 85 }; 86 87 meta = with lib; {
+2 -2
pkgs/applications/misc/spicetify-cli/default.nix
··· 2 3 buildGoModule rec { 4 pname = "spicetify-cli"; 5 - version = "2.8.3"; 6 7 src = fetchFromGitHub { 8 owner = "khanhas"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-Ht+EDCoPn1dA8VHTEiq5xPm34lcsiug8jQHvQdCG2yg="; 12 }; 13 14 vendorSha256 = "sha256-g0RYIVIq4oMXdRZDBDnVYg7ombN5WEo/6O9hChQvOYs=";
··· 2 3 buildGoModule rec { 4 pname = "spicetify-cli"; 5 + version = "2.8.4"; 6 7 src = fetchFromGitHub { 8 owner = "khanhas"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-WsNiMlqr9ya06Urvw/m3yPsGLCTOvYFaO0oNHuVKNTs="; 12 }; 13 14 vendorSha256 = "sha256-g0RYIVIq4oMXdRZDBDnVYg7ombN5WEo/6O9hChQvOYs=";
+5
pkgs/applications/networking/mailreaders/notmuch/default.nix
··· 18 sha256 = "wfLO7kf2iXESItcgWvKj/npKnYwy5OCyStZviN9qR9M="; 19 }; 20 21 nativeBuildInputs = [ 22 pkg-config 23 doxygen # (optional) api docs
··· 18 sha256 = "wfLO7kf2iXESItcgWvKj/npKnYwy5OCyStZviN9qR9M="; 19 }; 20 21 + patches = [ 22 + # https://nmbug.notmuchmail.org/nmweb/show/87o84iza9r.fsf%40starbuck.i-did-not-set--mail-host-address--so-tickle-me 23 + ./test-fix-support-for-gpgsm-in-gnupg-2.3.patch 24 + ]; 25 + 26 nativeBuildInputs = [ 27 pkg-config 28 doxygen # (optional) api docs
+28
pkgs/applications/networking/mailreaders/notmuch/test-fix-support-for-gpgsm-in-gnupg-2.3.patch
···
··· 1 + From a642ad542e3d3f34e949c5c66923ca8a6e6cbbd8 Mon Sep 17 00:00:00 2001 2 + From: Stig Palmquist <stig@stig.io> 3 + Date: Tue, 11 Jan 2022 13:23:13 +0100 4 + Subject: [PATCH] test: fix support for gpgsm in gnupg 2.3 5 + 6 + gpgsm --list-keys output changed the label for fingerprints from 7 + "fingerprint: " to "sha[12] fpr: " breaking tests with gnupg 2.3. this 8 + adds support for both. 9 + --- 10 + test/test-lib.sh | 2 +- 11 + 1 file changed, 1 insertion(+), 1 deletion(-) 12 + 13 + diff --git a/test/test-lib.sh b/test/test-lib.sh 14 + index 6bc0b723..3de608f9 100644 15 + --- a/test/test-lib.sh 16 + +++ b/test/test-lib.sh 17 + @@ -145,7 +145,7 @@ add_gpgsm_home () { 18 + mkdir -p -m 0700 "$GNUPGHOME" 19 + gpgsm --batch --no-tty --no-common-certs-import --pinentry-mode=loopback --passphrase-fd 3 \ 20 + --disable-dirmngr --import >"$GNUPGHOME"/import.log 2>&1 3<<<'' <$NOTMUCH_SRCDIR/test/smime/0xE0972A47.p12 21 + - fpr=$(gpgsm --batch --list-key test_suite@notmuchmail.org | sed -n 's/.*fingerprint: //p') 22 + + fpr=$(gpgsm --batch --list-key test_suite@notmuchmail.org | sed -n 's/.*\(fingerprint\|sha1 fpr\): //p') 23 + echo "$fpr S relax" >> "$GNUPGHOME/trustlist.txt" 24 + gpgsm --quiet --batch --no-tty --no-common-certs-import --disable-dirmngr --import < $NOTMUCH_SRCDIR/test/smime/ca.crt 25 + echo "4D:E0:FF:63:C0:E9:EC:01:29:11:C8:7A:EE:DA:3A:9A:7F:6E:C1:0D S" >> "$GNUPGHOME/trustlist.txt" 26 + -- 27 + 2.34.1 28 +
+2 -2
pkgs/applications/radio/gqrx/default.nix
··· 24 25 gnuradio3_8Minimal.pkgs.mkDerivation rec { 26 pname = "gqrx"; 27 - version = "2.15.1"; 28 29 src = fetchFromGitHub { 30 owner = "gqrx-sdr"; 31 repo = "gqrx"; 32 rev = "v${version}"; 33 - sha256 = "sha256-OL83l3A27rggfGbfLT1CUaPAQHEKXgoGS1jYJZ9eHPQ="; 34 }; 35 36 nativeBuildInputs = [
··· 24 25 gnuradio3_8Minimal.pkgs.mkDerivation rec { 26 pname = "gqrx"; 27 + version = "2.15.2"; 28 29 src = fetchFromGitHub { 30 owner = "gqrx-sdr"; 31 repo = "gqrx"; 32 rev = "v${version}"; 33 + sha256 = "sha256-LWuSJbzQKHoCbkyRQ7KqUxFXzA99kuafPibH8Xx7mXs="; 34 }; 35 36 nativeBuildInputs = [
+2 -2
pkgs/applications/video/go-chromecast/default.nix
··· 2 3 buildGoModule rec { 4 pname = "go-chromecast"; 5 - version = "0.2.10"; 6 7 src = fetchFromGitHub { 8 owner = "vishen"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-8216YaDgjy9Fp94Y5SQwEQpAP4NwvEhsJHe6xpQLAk8="; 12 }; 13 14 vendorSha256 = "sha256-idxElk4Sy7SE9G1OMRw8YH4o8orBa80qhBXPA+ar620=";
··· 2 3 buildGoModule rec { 4 pname = "go-chromecast"; 5 + version = "0.2.11"; 6 7 src = fetchFromGitHub { 8 owner = "vishen"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-BCOyeXo3uoR4ry/nFbF+//U62/hHnPK+tbG+8Rv6Rv0="; 12 }; 13 14 vendorSha256 = "sha256-idxElk4Sy7SE9G1OMRw8YH4o8orBa80qhBXPA+ar620=";
+3 -3
pkgs/applications/virtualization/cloud-hypervisor/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "cloud-hypervisor"; 5 - version = "20.1"; 6 7 src = fetchFromGitHub { 8 owner = "cloud-hypervisor"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "1r55ykxwa0xr1f9sp7mnv8nqf0dr7vw62b1w8r7mmyrndwnq6z5b"; 12 }; 13 14 nativeBuildInputs = [ pkg-config ]; 15 buildInputs = [ openssl ] ++ lib.optional stdenv.isAarch64 dtc; 16 17 - cargoSha256 = "07wpfhlp82hp3hr8vc52vhkrxd8xpyvdvfqh1dn1fnhxk3b1z7lz"; 18 19 meta = with lib; { 20 homepage = "https://github.com/cloud-hypervisor/cloud-hypervisor";
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "cloud-hypervisor"; 5 + version = "20.2"; 6 7 src = fetchFromGitHub { 8 owner = "cloud-hypervisor"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-yIp1p8GyBojWKmvFRZ/OeyF2bjlqYsuXUrYTVunYV8Y="; 12 }; 13 14 nativeBuildInputs = [ pkg-config ]; 15 buildInputs = [ openssl ] ++ lib.optional stdenv.isAarch64 dtc; 16 17 + cargoSha256 = "sha256-s2u6e2JbukPo3pXYzQJXP5d2G213u1+1ke9gZFnB+5g="; 18 19 meta = with lib; { 20 homepage = "https://github.com/cloud-hypervisor/cloud-hypervisor";
+2 -2
pkgs/desktops/gnome/core/gnome-software/default.nix
··· 42 43 stdenv.mkDerivation rec { 44 pname = "gnome-software"; 45 - version = "41.2"; 46 47 src = fetchurl { 48 url = "mirror://gnome/sources/gnome-software/${lib.versions.major version}/${pname}-${version}.tar.xz"; 49 - sha256 = "OErdrMh4QlOoeXGBSweS+9LJQfpEiw+UOLv1dJgszBc="; 50 }; 51 52 patches = [
··· 42 43 stdenv.mkDerivation rec { 44 pname = "gnome-software"; 45 + version = "41.3"; 46 47 src = fetchurl { 48 url = "mirror://gnome/sources/gnome-software/${lib.versions.major version}/${pname}-${version}.tar.xz"; 49 + sha256 = "ZQVjN3q2mxAQXfdxuz8hY3lVO7evQISNjDBljgEAmLw="; 50 }; 51 52 patches = [
+2 -2
pkgs/development/libraries/gbenchmark/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "gbenchmark"; 5 - version = "1.6.0"; 6 7 src = fetchFromGitHub { 8 owner = "google"; 9 repo = "benchmark"; 10 rev = "v${version}"; 11 - sha256 = "sha256-EAJk3JhLdkuGKRMtspTLejck8doWPd7Z0Lv/Mvf3KFY="; 12 }; 13 14 nativeBuildInputs = [ cmake ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "gbenchmark"; 5 + version = "1.6.1"; 6 7 src = fetchFromGitHub { 8 owner = "google"; 9 repo = "benchmark"; 10 rev = "v${version}"; 11 + sha256 = "sha256-yUiFxi80FWBmTZgqmqTMf9oqcBeg3o4I4vKd4djyRWY="; 12 }; 13 14 nativeBuildInputs = [ cmake ];
+10 -1
pkgs/development/libraries/liburing/default.nix
··· 4 5 stdenv.mkDerivation rec { 6 pname = "liburing"; 7 - version = "2.1"; 8 9 src = fetchgit { 10 url = "http://git.kernel.dk/${pname}"; ··· 42 '' + lib.optionalString stdenv.hostPlatform.isGnu '' 43 cp ./examples/ucontext-cp $bin/bin/io_uring-ucontext-cp 44 ''; 45 46 meta = with lib; { 47 description = "Userspace library for the Linux io_uring API";
··· 4 5 stdenv.mkDerivation rec { 6 pname = "liburing"; 7 + version = "2.1"; # remove patch when updating 8 9 src = fetchgit { 10 url = "http://git.kernel.dk/${pname}"; ··· 42 '' + lib.optionalString stdenv.hostPlatform.isGnu '' 43 cp ./examples/ucontext-cp $bin/bin/io_uring-ucontext-cp 44 ''; 45 + 46 + # fix for compilation on 32-bit ARM, merged by upstream but not released; remove when 47 + # upstream releases an update 48 + patches = lib.optional stdenv.isAarch32 [ 49 + (fetchpatch { 50 + url = "https://github.com/axboe/liburing/commit/e75a6cfa085fc9b5dbf5140fc1efb5a07b6b829e.diff"; 51 + sha256 = "sha256-qQEQXYm5mkws2klLxwuuoPSPRkpP1s6tuylAAEp7+9E="; 52 + }) 53 + ]; 54 55 meta = with lib; { 56 description = "Userspace library for the Linux io_uring API";
+2 -2
pkgs/development/libraries/umockdev/default.nix
··· 19 20 stdenv.mkDerivation rec { 21 pname = "umockdev"; 22 - version = "0.17.1"; 23 24 outputs = [ "bin" "out" "dev" "devdoc" ]; 25 26 src = fetchurl { 27 url = "https://github.com/martinpitt/umockdev/releases/download/${version}/${pname}-${version}.tar.xz"; 28 - sha256 = "sha256-lq8lVQlSZpFGDL7nGV8pPe+AClK8PjzWoPmhfWvHpJs="; 29 }; 30 31 nativeBuildInputs = [
··· 19 20 stdenv.mkDerivation rec { 21 pname = "umockdev"; 22 + version = "0.17.2"; 23 24 outputs = [ "bin" "out" "dev" "devdoc" ]; 25 26 src = fetchurl { 27 url = "https://github.com/martinpitt/umockdev/releases/download/${version}/${pname}-${version}.tar.xz"; 28 + sha256 = "sha256-D9Kb67HACi8guMoT5n3Yp9INigjuuGAIyKMgcICBJmA="; 29 }; 30 31 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/xgboost/default.nix
··· 16 17 stdenv.mkDerivation rec { 18 pname = "xgboost"; 19 - version = "1.5.0"; 20 21 src = fetchFromGitHub { 22 owner = "dmlc"; 23 repo = pname; 24 rev = "v${version}"; 25 fetchSubmodules = true; 26 - sha256 = "sha256-xrRKpZ6NSBtEL2CBN7KggDwIvQKIPD8EBlA0oCJv8mw="; 27 }; 28 29 nativeBuildInputs = [ cmake ] ++ lib.optional stdenv.isDarwin llvmPackages.openmp;
··· 16 17 stdenv.mkDerivation rec { 18 pname = "xgboost"; 19 + version = "1.5.1"; 20 21 src = fetchFromGitHub { 22 owner = "dmlc"; 23 repo = pname; 24 rev = "v${version}"; 25 fetchSubmodules = true; 26 + sha256 = "sha256-WvYMfJYDF4azXkz2tBI9R9EpSOhFxpEja4RLuAfYAtE="; 27 }; 28 29 nativeBuildInputs = [ cmake ] ++ lib.optional stdenv.isDarwin llvmPackages.openmp;
+2 -2
pkgs/development/python-modules/GitPython/default.nix
··· 11 12 buildPythonPackage rec { 13 pname = "gitpython"; 14 - version = "3.1.24"; 15 disabled = pythonOlder "3.7"; 16 17 src = fetchFromGitHub { 18 owner = "gitpython-developers"; 19 repo = "GitPython"; 20 rev = version; 21 - sha256 = "sha256-KfR14EqXsDgIZUerk/hHDB0Z7IuqncbTNd/yNwrV9I0="; 22 }; 23 24 patches = [
··· 11 12 buildPythonPackage rec { 13 pname = "gitpython"; 14 + version = "3.1.25"; 15 disabled = pythonOlder "3.7"; 16 17 src = fetchFromGitHub { 18 owner = "gitpython-developers"; 19 repo = "GitPython"; 20 rev = version; 21 + sha256 = "sha256-ienc7zvLe6t8rkMtC6wVIewUqQBFdFbLc8iPT6aPVrE="; 22 }; 23 24 patches = [
+2 -2
pkgs/development/python-modules/aiocurrencylayer/default.nix
··· 11 12 buildPythonPackage rec { 13 pname = "aiocurrencylayer"; 14 - version = "1.0.2"; 15 format = "pyproject"; 16 17 disabled = pythonOlder "3.8"; ··· 20 owner = "home-assistant-ecosystem"; 21 repo = pname; 22 rev = version; 23 - sha256 = "EVqnrMatOk2I6hiCkiT5FOWvMY9LEK8LlSHqi0x9kuQ="; 24 }; 25 26 nativeBuildInputs = [
··· 11 12 buildPythonPackage rec { 13 pname = "aiocurrencylayer"; 14 + version = "1.0.3"; 15 format = "pyproject"; 16 17 disabled = pythonOlder "3.8"; ··· 20 owner = "home-assistant-ecosystem"; 21 repo = pname; 22 rev = version; 23 + sha256 = "sha256-t2Pcoakk25vtUYajIZVITsrEUSdwwiA3fbdswy3n9P8="; 24 }; 25 26 nativeBuildInputs = [
+11
pkgs/development/python-modules/aioitertools/default.nix
··· 1 { lib 2 3 , buildPythonPackage 4 , fetchPypi 5 , pythonOlder 6 , typing-extensions 7 , coverage ··· 18 inherit pname version; 19 sha256 = "8b02facfbc9b0f1867739949a223f3d3267ed8663691cc95abd94e2c1d8c2b46"; 20 }; 21 22 propagatedBuildInputs = [ typing-extensions ]; 23 checkInputs = [ coverage toml ];
··· 1 { lib 2 3 , buildPythonPackage 4 + , fetchpatch 5 , fetchPypi 6 + , pythonAtLeast 7 , pythonOlder 8 , typing-extensions 9 , coverage ··· 20 inherit pname version; 21 sha256 = "8b02facfbc9b0f1867739949a223f3d3267ed8663691cc95abd94e2c1d8c2b46"; 22 }; 23 + 24 + patches = lib.optionals (pythonAtLeast "3.10") [ 25 + (fetchpatch { 26 + # Fix TypeError: wait() got an unexpected keyword argument 'loop' 27 + # See https://github.com/omnilib/aioitertools/issues/84 28 + url = "https://raw.githubusercontent.com/archlinux/svntogit-community/packages/python-aioitertools/trunk/python310.patch"; 29 + sha256 = "sha256-F10sduGaLBcxEoP83N/lGpZIlzkM2JTnQnhHKFwc7P0="; 30 + }) 31 + ]; 32 33 propagatedBuildInputs = [ typing-extensions ]; 34 checkInputs = [ coverage toml ];
+2 -2
pkgs/development/python-modules/aioridwell/default.nix
··· 17 18 buildPythonPackage rec { 19 pname = "aioridwell"; 20 - version = "2021.10.0"; 21 format = "pyproject"; 22 23 disabled = pythonOlder "3.8"; ··· 26 owner = "bachya"; 27 repo = pname; 28 rev = version; 29 - sha256 = "sha256-h89gfdZvk7H22xAczaPMscTYZu0YeFxvFfL6/Oz2cJw="; 30 }; 31 32 nativeBuildInputs = [
··· 17 18 buildPythonPackage rec { 19 pname = "aioridwell"; 20 + version = "2021.12.2"; 21 format = "pyproject"; 22 23 disabled = pythonOlder "3.8"; ··· 26 owner = "bachya"; 27 repo = pname; 28 rev = version; 29 + sha256 = "sha256-QFUXWleHRMBgaRsMNt2xFb3XcbCNI2kKQHKCBrUuG6Q="; 30 }; 31 32 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/bleak/default.nix
··· 4 5 buildPythonPackage rec { 6 pname = "bleak"; 7 - version = "0.13.0"; 8 9 disabled = !isPy3k; 10 11 src = fetchPypi { 12 inherit pname version; 13 - sha256 = "1vnwk36qfws9amqrdaynf63dcj2gzxm0ns1l75hrczmd5j2ic1zb"; 14 }; 15 16 postPatch = ''
··· 4 5 buildPythonPackage rec { 6 pname = "bleak"; 7 + version = "0.14.0"; 8 9 disabled = !isPy3k; 10 11 src = fetchPypi { 12 inherit pname version; 13 + sha256 = "b449cc63f769c2d219c67e23ffb9f3a5b5f23eb2d68d05878743dbed83a14360"; 14 }; 15 16 postPatch = ''
+66 -40
pkgs/development/python-modules/cherrypy/default.nix
··· 1 - { lib, stdenv, buildPythonPackage, fetchPypi, isPy3k 2 , setuptools-scm 3 - , cheroot, portend, more-itertools, zc_lockfile, routes 4 - , jaraco_collections 5 - , objgraph, pytest, pytest-cov, pathpy, requests-toolbelt, pytest-services 6 - , fetchpatch 7 }: 8 9 buildPythonPackage rec { 10 pname = "cherrypy"; 11 - version = "18.6.0"; 12 13 - disabled = !isPy3k; 14 15 src = fetchPypi { 16 pname = "CherryPy"; 17 inherit version; 18 - sha256 = "16f410izp2c4qhn4n3l5l3qirmkf43h2amjqms8hkl0shgfqwq2n"; 19 }; 20 21 - patches = [ 22 - # 1/3 Fix compatibility with pytest 6. Will be part of the next release after 18.6 23 - (fetchpatch { 24 - url = "https://github.com/cherrypy/cherrypy/pull/1897/commits/59c0e19d7df8680e36afc96756dce72435121448.patch"; 25 - sha256 = "1jachbvp505gndccdhny0c3grzdrmvmbzq4kw55jx93ay94ni6p0"; 26 - }) 27 - # 2/3 Fix compatibility with pytest 6. Will be part of the next release after 18.6 28 - (fetchpatch { 29 - url = "https://github.com/cherrypy/cherrypy/pull/1897/commits/4a6287b73539adcb7b0ae72d69644a1ced1f7eaa.patch"; 30 - sha256 = "0nz40qmgxknkbjsdzfzcqfxdsmsxx3v104fb0h04yvs76mqvw3i4"; 31 - }) 32 - # 3/3 Fix compatibility with pytest 6. Will be part of the next release after 18.6 33 - (fetchpatch { 34 - url = "https://github.com/cherrypy/cherrypy/commit/3bae7f06868553b006915f05ff14d86163f59a7d.patch"; 35 - sha256 = "1z0bv23ybyw87rf1i8alsdi3gc2bzmdj9d0kjsghdkvi3zdp4n8q"; 36 - }) 37 ]; 38 39 - nativeBuildInputs = [ setuptools-scm ]; 40 - 41 propagatedBuildInputs = [ 42 # required 43 - cheroot portend more-itertools zc_lockfile 44 jaraco_collections 45 # optional 46 routes 47 ]; 48 49 checkInputs = [ 50 - objgraph pytest pytest-cov pathpy requests-toolbelt pytest-services 51 ]; 52 53 - # Keyboard interrupt ends test suite run 54 - # daemonize and autoreload tests have issue with sockets within sandbox 55 - # Disable doctest plugin because times out 56 - checkPhase = '' 57 - substituteInPlace pytest.ini --replace "--doctest-modules" "" 58 - pytest \ 59 - -k 'not KeyboardInterrupt and not daemonize and not Autoreload' \ 60 - --deselect=cherrypy/test/test_static.py::StaticTest::test_null_bytes \ 61 - --deselect=cherrypy/test/test_tools.py::ToolTests::testCombinedTools \ 62 - ${lib.optionalString stdenv.isDarwin 63 - "--deselect=cherrypy/test/test_bus.py::BusMethodTests::test_block --deselect=cherrypy/test/test_config_server.py"} 64 ''; 65 66 __darwinAllowLocalNetworking = true; 67 68 meta = with lib; { 69 homepage = "https://www.cherrypy.org"; 70 - description = "A pythonic, object-oriented HTTP framework"; 71 license = licenses.bsd3; 72 }; 73 }
··· 1 + { lib 2 + , stdenv 3 + , buildPythonPackage 4 + , cheroot 5 + , fetchPypi 6 + , jaraco_collections 7 + , more-itertools 8 + , objgraph 9 + , pathpy 10 + , portend 11 + , pytest-forked 12 + , pytest-services 13 + , pytestCheckHook 14 + , pythonAtLeast 15 + , pythonOlder 16 + , requests-toolbelt 17 + , routes 18 , setuptools-scm 19 + , simplejson 20 + , zc_lockfile 21 }: 22 23 buildPythonPackage rec { 24 pname = "cherrypy"; 25 + version = "18.6.1"; 26 + format = "setuptools"; 27 28 + disabled = pythonOlder "3.7"; 29 30 src = fetchPypi { 31 pname = "CherryPy"; 32 inherit version; 33 + hash = "sha256-8z6HKG57PjCeBOciXY5JOC2dd3PmCSJB1/YTiTxWNJU="; 34 }; 35 36 + nativeBuildInputs = [ 37 + setuptools-scm 38 ]; 39 40 propagatedBuildInputs = [ 41 # required 42 + cheroot 43 + portend 44 + more-itertools 45 + zc_lockfile 46 jaraco_collections 47 # optional 48 routes 49 + simplejson 50 ]; 51 52 checkInputs = [ 53 + objgraph 54 + pathpy 55 + pytest-forked 56 + pytest-services 57 + pytestCheckHook 58 + requests-toolbelt 59 ]; 60 61 + preCheck = '' 62 + # Disable doctest plugin because times out 63 + substituteInPlace pytest.ini \ 64 + --replace "--doctest-modules" "-vvv" 65 + sed -i "/--cov/d" pytest.ini 66 ''; 67 68 + pytestFlagsArray = [ 69 + "-W" 70 + "ignore::DeprecationWarning" 71 + ]; 72 + 73 + disabledTests = [ 74 + # Keyboard interrupt ends test suite run 75 + "KeyboardInterrupt" 76 + # daemonize and autoreload tests have issue with sockets within sandbox 77 + "daemonize" 78 + "Autoreload" 79 + ] ++ lib.optionals stdenv.isDarwin [ 80 + "test_block" 81 + ]; 82 + 83 + disabledTestPaths = lib.optionals stdenv.isDarwin [ 84 + "cherrypy/test/test_config_server.py" 85 + ]; 86 + 87 __darwinAllowLocalNetworking = true; 88 89 + pythonImportsCheck = [ 90 + "cherrypy" 91 + ]; 92 + 93 meta = with lib; { 94 + description = "Object-oriented HTTP framework"; 95 homepage = "https://www.cherrypy.org"; 96 license = licenses.bsd3; 97 + maintainers = with maintainers; [ ]; 98 }; 99 }
+2 -2
pkgs/development/python-modules/chiavdf/default.nix
··· 14 15 buildPythonPackage rec { 16 pname = "chiavdf"; 17 - version = "1.0.3"; 18 disabled = pythonOlder "3.7"; 19 20 src = fetchPypi { 21 inherit pname version; 22 - hash = "sha256-XbmK7ZJnUy3Zg9XWt0t/Qb2k5qIlu4vIbxdDFYFjFPI="; 23 }; 24 25 patches = [
··· 14 15 buildPythonPackage rec { 16 pname = "chiavdf"; 17 + version = "1.0.4"; 18 disabled = pythonOlder "3.7"; 19 20 src = fetchPypi { 21 inherit pname version; 22 + hash = "sha256-i6ylxtw1dMtylS4m0mz6rATU1trbMpcmsB2WhD++CeM="; 23 }; 24 25 patches = [
+2 -2
pkgs/development/python-modules/datadog/default.nix
··· 17 18 buildPythonPackage rec { 19 pname = "datadog"; 20 - version = "0.42.0"; 21 22 src = fetchPypi { 23 inherit pname version; 24 - sha256 = "sha256-em+sF6fQnxiDq5pFzk/3oWqhpes8xMbN2sf4xT59Hps="; 25 }; 26 27 postPatch = ''
··· 17 18 buildPythonPackage rec { 19 pname = "datadog"; 20 + version = "0.43.0"; 21 22 src = fetchPypi { 23 inherit pname version; 24 + sha256 = "1f2123083d9e1add6f238c62714b76ac2fc134d7d1c435cd82b976487b191b96"; 25 }; 26 27 postPatch = ''
+10 -1
pkgs/development/python-modules/denonavr/default.nix
··· 16 buildPythonPackage rec { 17 pname = "denonavr"; 18 version = "0.10.9"; 19 disabled = pythonOlder "3.6"; 20 21 src = fetchFromGitHub { ··· 40 pytest-timeout 41 ]; 42 43 - pythonImportsCheck = [ "denonavr" ]; 44 45 meta = with lib; { 46 description = "Automation Library for Denon AVR receivers";
··· 16 buildPythonPackage rec { 17 pname = "denonavr"; 18 version = "0.10.9"; 19 + format = "setuptools"; 20 + 21 disabled = pythonOlder "3.6"; 22 23 src = fetchFromGitHub { ··· 42 pytest-timeout 43 ]; 44 45 + disabledTestPaths = [ 46 + # https://github.com/ol-iver/denonavr/issues/228 47 + "tests/test_denonavr.py" 48 + ]; 49 + 50 + pythonImportsCheck = [ 51 + "denonavr" 52 + ]; 53 54 meta = with lib; { 55 description = "Automation Library for Denon AVR receivers";
+5 -3
pkgs/development/python-modules/devolo-plc-api/default.nix
··· 1 { lib 2 , buildPythonPackage 3 , fetchFromGitHub 4 , httpx 5 , protobuf 6 , pytest-asyncio ··· 14 15 buildPythonPackage rec { 16 pname = "devolo-plc-api"; 17 - version = "0.7.0"; 18 format = "setuptools"; 19 20 disabled = pythonOlder "3.8"; ··· 23 owner = "2Fake"; 24 repo = "devolo_plc_api"; 25 rev = "v${version}"; 26 - sha256 = "sha256-qzjH52bKQ/oSFd580V92uE2/Z2g+2nLh/JXOXYqVfSY="; 27 }; 28 29 SETUPTOOLS_SCM_PRETEND_VERSION = version; ··· 38 zeroconf 39 ]; 40 41 - 42 checkInputs = [ 43 pytest-asyncio 44 pytest-httpx 45 pytest-mock 46 pytestCheckHook 47 ]; 48 49 pythonImportsCheck = [ 50 "devolo_plc_api"
··· 1 { lib 2 , buildPythonPackage 3 , fetchFromGitHub 4 + , fetchpatch 5 , httpx 6 , protobuf 7 , pytest-asyncio ··· 15 16 buildPythonPackage rec { 17 pname = "devolo-plc-api"; 18 + version = "0.7.1"; 19 format = "setuptools"; 20 21 disabled = pythonOlder "3.8"; ··· 24 owner = "2Fake"; 25 repo = "devolo_plc_api"; 26 rev = "v${version}"; 27 + sha256 = "sha256-XR/daDrnfbLBrUTTMFYtndr6+RxPwnF4qbXAdXsXKHk="; 28 }; 29 30 SETUPTOOLS_SCM_PRETEND_VERSION = version; ··· 39 zeroconf 40 ]; 41 42 checkInputs = [ 43 pytest-asyncio 44 pytest-httpx 45 pytest-mock 46 pytestCheckHook 47 ]; 48 + 49 + 50 51 pythonImportsCheck = [ 52 "devolo_plc_api"
+2 -2
pkgs/development/python-modules/django-taggit/default.nix
··· 9 10 buildPythonPackage rec { 11 pname = "django-taggit"; 12 - version = "1.5.1"; 13 format = "setuptools"; 14 disabled = pythonOlder "3.6"; 15 16 src = fetchPypi { 17 inherit pname version; 18 - sha256 = "e5bb62891f458d55332e36a32e19c08d20142c43f74bc5656c803f8af25c084a"; 19 }; 20 21 propagatedBuildInputs = [
··· 9 10 buildPythonPackage rec { 11 pname = "django-taggit"; 12 + version = "2.0.0"; 13 format = "setuptools"; 14 disabled = pythonOlder "3.6"; 15 16 src = fetchPypi { 17 inherit pname version; 18 + sha256 = "a23ca776ee2709b455c3a95625be1e4b891ddf1ffb4173153c41806de4038d72"; 19 }; 20 21 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/flux-led/default.nix
··· 8 9 buildPythonPackage rec { 10 pname = "flux-led"; 11 - version = "0.27.44"; 12 format = "setuptools"; 13 14 disabled = pythonOlder "3.7"; ··· 17 owner = "Danielhiversen"; 18 repo = "flux_led"; 19 rev = version; 20 - sha256 = "sha256-ImtXcT6CxW6bhtL4uJM8PAvQOm36pxgTGZp4BCJXTUQ="; 21 }; 22 23 propagatedBuildInputs = [
··· 8 9 buildPythonPackage rec { 10 pname = "flux-led"; 11 + version = "0.27.45"; 12 format = "setuptools"; 13 14 disabled = pythonOlder "3.7"; ··· 17 owner = "Danielhiversen"; 18 repo = "flux_led"; 19 rev = version; 20 + sha256 = "sha256-0MKcPDn9Jtp7bEbusOHforEBOkM+y0TUG72Ynt5rdfg="; 21 }; 22 23 propagatedBuildInputs = [
+3 -3
pkgs/development/python-modules/formbox/default.nix
··· 2 3 buildPythonPackage rec { 4 pname = "formbox"; 5 - version = "0.1.0"; 6 format = "flit"; 7 - disabled = pythonOlder "3.7"; 8 9 src = fetchFromSourcehut { 10 owner = "~cnx"; 11 repo = pname; 12 rev = version; 13 - sha256 = "sha256-6OzmYqUC3mmrAMeMExI4rdVGUoWrxRuBfjKFYbHUlgE="; 14 }; 15 16 propagatedBuildInputs = [ bleach markdown ];
··· 2 3 buildPythonPackage rec { 4 pname = "formbox"; 5 + version = "0.3.0"; 6 format = "flit"; 7 + disabled = pythonOlder "3.6"; 8 9 src = fetchFromSourcehut { 10 owner = "~cnx"; 11 repo = pname; 12 rev = version; 13 + sha256 = "sha256-K8NqMi80UurirAZaw67nhW5hFC3+dbdoT84hW7iIcaM="; 14 }; 15 16 propagatedBuildInputs = [ bleach markdown ];
+2 -2
pkgs/development/python-modules/glances-api/default.nix
··· 11 12 buildPythonPackage rec { 13 pname = "glances-api"; 14 - version = "0.3.2"; 15 format = "pyproject"; 16 17 disabled = pythonOlder "3.8"; ··· 20 owner = "home-assistant-ecosystem"; 21 repo = "python-glances-api"; 22 rev = version; 23 - sha256 = "sha256-zVK63SI8ZeVrY2iEEkgp8pq6RDheKeApb9/RWgZCKGI="; 24 }; 25 26 nativeBuildInputs = [
··· 11 12 buildPythonPackage rec { 13 pname = "glances-api"; 14 + version = "0.3.3"; 15 format = "pyproject"; 16 17 disabled = pythonOlder "3.8"; ··· 20 owner = "home-assistant-ecosystem"; 21 repo = "python-glances-api"; 22 rev = version; 23 + sha256 = "sha256-F3jmYBZNzI4hRmH1J+S5RwxjouZNcUJOnD3QpX1J39s="; 24 }; 25 26 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/grappelli_safe/default.nix
··· 4 }: 5 6 buildPythonPackage rec { 7 - version = "1.0.0"; 8 pname = "grappelli_safe"; 9 10 src = fetchPypi { 11 inherit pname version; 12 - sha256 = "84c03ec5373341d980a76480d992389e286fbc50048e91bc2e5c876d02873cc5"; 13 }; 14 15 meta = with lib; {
··· 4 }: 5 6 buildPythonPackage rec { 7 + version = "1.1.1"; 8 pname = "grappelli_safe"; 9 10 src = fetchPypi { 11 inherit pname version; 12 + sha256 = "ee34b3e2a3711498b1f8da3d9daa8a1239efdf255a212181742b6a5890fac039"; 13 }; 14 15 meta = with lib; {
+2 -2
pkgs/development/python-modules/hahomematic/default.nix
··· 13 14 buildPythonPackage rec { 15 pname = "hahomematic"; 16 - version = "0.17.1"; 17 format = "setuptools"; 18 19 disabled = pythonOlder "3.9"; ··· 22 owner = "danielperna84"; 23 repo = pname; 24 rev = version; 25 - sha256 = "sha256-Nhl2WLrqqvGaNEgJApcgZhSm4xoq62MzJC0MfEO5Xxw="; 26 }; 27 28 propagatedBuildInputs = [
··· 13 14 buildPythonPackage rec { 15 pname = "hahomematic"; 16 + version = "0.18.0"; 17 format = "setuptools"; 18 19 disabled = pythonOlder "3.9"; ··· 22 owner = "danielperna84"; 23 repo = pname; 24 rev = version; 25 + sha256 = "sha256-SkEI5uWKtszSBZblDBvbEmJh0OdvqDcwY6PG3JK4djY="; 26 }; 27 28 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/holidays/default.nix
··· 11 12 buildPythonPackage rec { 13 pname = "holidays"; 14 - version = "0.11.3.1"; 15 format = "setuptools"; 16 17 disabled = pythonOlder "3.6"; 18 19 src = fetchPypi { 20 inherit pname version; 21 - sha256 = "sha256-SFWv4Ov0KO+8+EhHeCi4ifhRW+f08VriZoKRk2nZJ3Q="; 22 }; 23 24 propagatedBuildInputs = [
··· 11 12 buildPythonPackage rec { 13 pname = "holidays"; 14 + version = "0.12"; 15 format = "setuptools"; 16 17 disabled = pythonOlder "3.6"; 18 19 src = fetchPypi { 20 inherit pname version; 21 + sha256 = "d99f2b6ddc5bfab7b7f8bbed457a82104f8980122a04b982bfc0e4f8820a1d46"; 22 }; 23 24 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/idasen/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "idasen"; 15 - version = "0.8.1"; 16 format = "pyproject"; 17 18 disabled = pythonOlder "3.8"; ··· 21 owner = "newAM"; 22 repo = "idasen"; 23 rev = "v${version}"; 24 - sha256 = "122bhbc3zqqm4x1x7a7mydvxxjrdssnqyxyqg0lbgxgn5rm8wbdd"; 25 }; 26 27 nativeBuildInputs = [
··· 12 13 buildPythonPackage rec { 14 pname = "idasen"; 15 + version = "0.8.2"; 16 format = "pyproject"; 17 18 disabled = pythonOlder "3.8"; ··· 21 owner = "newAM"; 22 repo = "idasen"; 23 rev = "v${version}"; 24 + sha256 = "sha256-s8CnYMUVl2VbGbVxICSaKH5DxTA+NP/zPX1z7vfMqi4="; 25 }; 26 27 nativeBuildInputs = [
+33
pkgs/development/python-modules/json-tricks/default.nix
···
··· 1 + { lib 2 + , fetchFromGitHub 3 + , buildPythonPackage 4 + , pythonOlder 5 + , pytestCheckHook 6 + , numpy 7 + , pandas 8 + , pytz 9 + }: 10 + 11 + buildPythonPackage rec { 12 + pname = "json-tricks"; 13 + version = "3.15.5"; 14 + disabled = pythonOlder "3.5"; 15 + 16 + src = fetchFromGitHub { 17 + owner = "mverleg"; 18 + repo = "pyjson_tricks"; 19 + rev = "v${version}"; 20 + sha256 = "wdpqCqMO0EzKyqE4ishL3CTsSw3sZPGvJ0HEktKFgZU="; 21 + }; 22 + 23 + checkInputs = [ numpy pandas pytz pytestCheckHook ]; 24 + 25 + pythonImportsCheck = [ "json_tricks" ]; 26 + 27 + meta = with lib; { 28 + description = "Extra features for Python JSON handling"; 29 + homepage = "https://github.com/mverleg/pyjson_tricks"; 30 + license = licenses.bsd3; 31 + maintainers = with maintainers; [ bcdarwin ]; 32 + }; 33 + }
+2
pkgs/development/python-modules/kaptan/default.nix
··· 16 17 postPatch = '' 18 sed -i "s/==.*//g" requirements/test.txt 19 ''; 20 21 propagatedBuildInputs = [ pyyaml ];
··· 16 17 postPatch = '' 18 sed -i "s/==.*//g" requirements/test.txt 19 + 20 + substituteInPlace requirements/base.txt --replace 'PyYAML>=3.13,<6' 'PyYAML>=3.13' 21 ''; 22 23 propagatedBuildInputs = [ pyyaml ];
+4 -3
pkgs/development/python-modules/limiter/default.nix
··· 7 8 buildPythonPackage rec { 9 pname = "limiter"; 10 - version = "0.1.2"; 11 12 - disabled = pythonOlder "3.7"; 13 14 src = fetchFromGitHub { 15 owner = "alexdelorenzo"; 16 repo = pname; 17 rev = "v${version}"; 18 - sha256 = "0cdqw08qw3cid1yjknlh4hqfl46xh4madkjrl7sxk2c1pbwils8r"; 19 }; 20 21 propagatedBuildInputs = [
··· 7 8 buildPythonPackage rec { 9 pname = "limiter"; 10 + version = "0.2.0"; 11 + format = "setuptools"; 12 13 + disabled = pythonOlder "3.10"; 14 15 src = fetchFromGitHub { 16 owner = "alexdelorenzo"; 17 repo = pname; 18 rev = "v${version}"; 19 + hash = "sha256-h3XiCR/8rcCBwdhO6ExrrUE9piba5mssad3+t41scSk="; 20 }; 21 22 propagatedBuildInputs = [
+35 -9
pkgs/development/python-modules/loguru/default.nix
··· 1 { lib 2 , stdenv 3 , buildPythonPackage 4 - , fetchPypi 5 - , fetchpatch 6 - , isPy27 7 , colorama 8 , pytestCheckHook 9 }: 10 11 buildPythonPackage rec { 12 pname = "loguru"; 13 version = "0.5.3"; 14 15 - disabled = isPy27; 16 17 src = fetchPypi { 18 inherit pname version; 19 sha256 = "b28e72ac7a98be3d28ad28570299a393dfcd32e5e3f6a353dec94675767b6319"; 20 }; 21 22 patches = [ 23 # Fixes tests with pytest>=6.2.2. Will be part of the next release after 0.5.3 24 (fetchpatch { 25 url = "https://github.com/Delgan/loguru/commit/31cf758ee9d22dbfa125f38153782fe20ac9dce5.patch"; 26 sha256 = "1lzbs8akg1s7s6xjl3samf4c4bpssqvwg5fn3mwlm4ysr7jd5y67"; 27 }) 28 - # fix tests with Python 3.9 29 (fetchpatch { 30 url = "https://github.com/Delgan/loguru/commit/19f518c5f1f355703ffc4ee62f0e1e397605863e.patch"; 31 sha256 = "0yn6smik58wdffr4svqsy2n212fwdlcfcwpgqhl9hq2zlivmsdc6"; 32 }) 33 ]; 34 35 - checkInputs = [ pytestCheckHook colorama ]; 36 37 - disabledTestPaths = lib.optionals stdenv.isDarwin [ "tests/test_multiprocessing.py" ]; 38 - disabledTests = [ "test_time_rotation_reopening" "test_file_buffering" ] 39 - ++ lib.optionals stdenv.isDarwin [ "test_rotation_and_retention" "test_rotation_and_retention_timed_file" "test_renaming" "test_await_complete_inheritance" ]; 40 41 meta = with lib; { 42 homepage = "https://github.com/Delgan/loguru";
··· 1 { lib 2 , stdenv 3 + , aiocontextvars 4 , buildPythonPackage 5 , colorama 6 + , fetchpatch 7 + , fetchPypi 8 , pytestCheckHook 9 + , pythonOlder 10 }: 11 12 buildPythonPackage rec { 13 pname = "loguru"; 14 version = "0.5.3"; 15 + format = "setuptools"; 16 17 + disabled = pythonOlder "3.5"; 18 19 src = fetchPypi { 20 inherit pname version; 21 sha256 = "b28e72ac7a98be3d28ad28570299a393dfcd32e5e3f6a353dec94675767b6319"; 22 }; 23 24 + propagatedBuildInputs = lib.optionals (pythonOlder "3.7") [ 25 + aiocontextvars 26 + ]; 27 + 28 + checkInputs = [ 29 + pytestCheckHook 30 + colorama 31 + ]; 32 + 33 patches = [ 34 # Fixes tests with pytest>=6.2.2. Will be part of the next release after 0.5.3 35 (fetchpatch { 36 url = "https://github.com/Delgan/loguru/commit/31cf758ee9d22dbfa125f38153782fe20ac9dce5.patch"; 37 sha256 = "1lzbs8akg1s7s6xjl3samf4c4bpssqvwg5fn3mwlm4ysr7jd5y67"; 38 }) 39 + # Fix tests with Python 3.9 40 (fetchpatch { 41 url = "https://github.com/Delgan/loguru/commit/19f518c5f1f355703ffc4ee62f0e1e397605863e.patch"; 42 sha256 = "0yn6smik58wdffr4svqsy2n212fwdlcfcwpgqhl9hq2zlivmsdc6"; 43 }) 44 ]; 45 46 + disabledTestPaths = lib.optionals stdenv.isDarwin [ 47 + "tests/test_multiprocessing.py" 48 + ]; 49 50 + disabledTests = [ 51 + "test_time_rotation_reopening" 52 + "test_file_buffering" 53 + # Tests are failing with Python 3.10 54 + "test_exception_others" 55 + "" 56 + ] ++ lib.optionals stdenv.isDarwin [ 57 + "test_rotation_and_retention" 58 + "test_rotation_and_retention_timed_file" 59 + "test_renaming" 60 + "test_await_complete_inheritance" 61 + ]; 62 + 63 + pythonImportsCheck = [ 64 + "loguru" 65 + ]; 66 67 meta = with lib; { 68 homepage = "https://github.com/Delgan/loguru";
+2 -2
pkgs/development/python-modules/luftdaten/default.nix
··· 11 12 buildPythonPackage rec { 13 pname = "luftdaten"; 14 - version = "0.7.1"; 15 format = "pyproject"; 16 17 disabled = pythonOlder "3.8"; ··· 20 owner = "home-assistant-ecosystem"; 21 repo = "python-luftdaten"; 22 rev = version; 23 - sha256 = "sha256-76Y5TJet0WtzYXuK8Og0rmpsUIlXK7b37oesh+MliU8="; 24 }; 25 26 nativeBuildInputs = [
··· 11 12 buildPythonPackage rec { 13 pname = "luftdaten"; 14 + version = "0.7.2"; 15 format = "pyproject"; 16 17 disabled = pythonOlder "3.8"; ··· 20 owner = "home-assistant-ecosystem"; 21 repo = "python-luftdaten"; 22 rev = version; 23 + sha256 = "sha256-tYaY/F4mdO5k+Oj+RkNFWP8xqh1xuDyoAKBFzAhamkA="; 24 }; 25 26 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/luxtronik/default.nix
··· 8 9 buildPythonPackage rec { 10 pname = "luxtronik"; 11 - version = "0.3.9"; 12 format = "setuptools"; 13 14 disabled = pythonOlder "3.7"; ··· 17 owner = "Bouni"; 18 repo = "python-luxtronik"; 19 rev = version; 20 - sha256 = "mScdTQ82tV5fyy1S0YDDOz1UC4VB0OmSXD5gHp53WsE="; 21 }; 22 23 # Project has no tests
··· 8 9 buildPythonPackage rec { 10 pname = "luxtronik"; 11 + version = "0.3.10"; 12 format = "setuptools"; 13 14 disabled = pythonOlder "3.7"; ··· 17 owner = "Bouni"; 18 repo = "python-luxtronik"; 19 rev = version; 20 + sha256 = "sha256-JPY1HbNZanEsUpQ5W2kAwEFvwNGQI2hoogTZUGIg3YY="; 21 }; 22 23 # Project has no tests
+2 -2
pkgs/development/python-modules/netdata/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "netdata"; 15 - version = "1.0.1"; 16 format = "pyproject"; 17 18 disabled = pythonOlder "3.8"; ··· 21 owner = "home-assistant-ecosystem"; 22 repo = "python-netdata"; 23 rev = version; 24 - sha256 = "sha256-4+cTIqytHrCPG7lUZv1IhL7Bk5GlTEveQTtuCkFIepo="; 25 }; 26 27 nativeBuildInputs = [
··· 12 13 buildPythonPackage rec { 14 pname = "netdata"; 15 + version = "1.0.2"; 16 format = "pyproject"; 17 18 disabled = pythonOlder "3.8"; ··· 21 owner = "home-assistant-ecosystem"; 22 repo = "python-netdata"; 23 rev = version; 24 + sha256 = "sha256-D0W+zOpD2+iynhHMZh4obUSJJKmP3DnzA7blNWi6eHk="; 25 }; 26 27 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/pamqp/default.nix
··· 9 }: 10 11 buildPythonPackage rec { 12 - version = "3.0.1"; 13 pname = "pamqp"; 14 15 src = fetchPypi { 16 inherit pname version; 17 - sha256 = "0a9b49bde3f554ec49b47ebdb789133979985f24d5f4698935ed589a2d4392a4"; 18 }; 19 20 buildInputs = [ mock nose pep8 pylint mccabe ];
··· 9 }: 10 11 buildPythonPackage rec { 12 + version = "3.1.0"; 13 pname = "pamqp"; 14 15 src = fetchPypi { 16 inherit pname version; 17 + sha256 = "e4f0886d72c6166637a5513626148bf5a7e818073a558980e9aaed8b4ccf30da"; 18 }; 19 20 buildInputs = [ mock nose pep8 pylint mccabe ];
+40 -11
pkgs/development/python-modules/poetry/default.nix
··· 1 - { lib, buildPythonPackage, fetchFromGitHub, isPy27, pythonOlder, fetchpatch 2 , cachecontrol 3 , cachy 4 , cleo 5 , clikit 6 , html5lib 7 , httpretty 8 , importlib-metadata ··· 12 , pexpect 13 , pkginfo 14 , poetry-core 15 , pytestCheckHook 16 - , pytest-cov 17 - , pytest-mock 18 , requests 19 , requests-toolbelt 20 , shellingham ··· 26 pname = "poetry"; 27 version = "1.1.12"; 28 format = "pyproject"; 29 - disabled = isPy27; 30 31 src = fetchFromGitHub { 32 owner = "python-poetry"; ··· 42 --replace 'version = "^21.2.0"' 'version = ">=21.2"' 43 ''; 44 45 - nativeBuildInputs = [ intreehooks ]; 46 47 propagatedBuildInputs = [ 48 cachecontrol 49 cachy 50 cleo 51 clikit 52 html5lib 53 keyring 54 lockfile ··· 60 shellingham 61 tomlkit 62 virtualenv 63 - ] ++ lib.optionals (pythonOlder "3.8") [ importlib-metadata ]; 64 65 postInstall = '' 66 mkdir -p "$out/share/bash-completion/completions" ··· 71 "$out/bin/poetry" completions fish > "$out/share/fish/vendor_completions.d/poetry.fish" 72 ''; 73 74 - checkInputs = [ pytestCheckHook httpretty pytest-mock pytest-cov ]; 75 - preCheck = "export HOME=$TMPDIR"; 76 disabledTests = [ 77 # touches network 78 "git" ··· 87 "lock" 88 # fs permission errors 89 "test_builder_should_execute_build_scripts" 90 ]; 91 92 patches = [ 93 # The following patch addresses a minor incompatibility with 94 - # pytest-mock. This is addressed upstream in 95 # https://github.com/python-poetry/poetry/pull/3457 96 (fetchpatch { 97 url = "https://github.com/python-poetry/poetry/commit/8ddceb7c52b3b1f35412479707fa790e5d60e691.diff"; ··· 99 }) 100 ]; 101 102 - # allow for package to use pep420's native namespaces 103 - pythonNamespaces = [ "poetry" ]; 104 105 meta = with lib; { 106 homepage = "https://python-poetry.org/";
··· 1 + { lib 2 + , buildPythonPackage 3 , cachecontrol 4 , cachy 5 , cleo 6 , clikit 7 + , crashtest 8 + , dataclasses 9 + , entrypoints 10 + , fetchFromGitHub 11 + , fetchpatch 12 , html5lib 13 , httpretty 14 , importlib-metadata ··· 18 , pexpect 19 , pkginfo 20 , poetry-core 21 + , pytest-mock 22 , pytestCheckHook 23 + , pythonAtLeast 24 + , pythonOlder 25 , requests 26 , requests-toolbelt 27 , shellingham ··· 33 pname = "poetry"; 34 version = "1.1.12"; 35 format = "pyproject"; 36 + 37 + disabled = pythonOlder "3.6"; 38 39 src = fetchFromGitHub { 40 owner = "python-poetry"; ··· 50 --replace 'version = "^21.2.0"' 'version = ">=21.2"' 51 ''; 52 53 + nativeBuildInputs = [ 54 + intreehooks 55 + ]; 56 57 propagatedBuildInputs = [ 58 cachecontrol 59 cachy 60 cleo 61 clikit 62 + crashtest 63 + entrypoints 64 html5lib 65 keyring 66 lockfile ··· 72 shellingham 73 tomlkit 74 virtualenv 75 + ] ++ lib.optionals (pythonOlder "3.7") [ 76 + dataclasses 77 + ] ++ lib.optionals (pythonOlder "3.8") [ 78 + importlib-metadata 79 + ]; 80 81 postInstall = '' 82 mkdir -p "$out/share/bash-completion/completions" ··· 87 "$out/bin/poetry" completions fish > "$out/share/fish/vendor_completions.d/poetry.fish" 88 ''; 89 90 + checkInputs = [ 91 + pytestCheckHook 92 + httpretty 93 + pytest-mock 94 + ]; 95 + 96 + preCheck = '' 97 + export HOME=$TMPDIR 98 + ''; 99 + 100 disabledTests = [ 101 # touches network 102 "git" ··· 111 "lock" 112 # fs permission errors 113 "test_builder_should_execute_build_scripts" 114 + ] ++ lib.optionals (pythonAtLeast "3.10") [ 115 + # RuntimeError: 'auto_spec' might be a typo; use unsafe=True if this is intended 116 + "test_info_setup_complex_pep517_error" 117 ]; 118 119 patches = [ 120 # The following patch addresses a minor incompatibility with 121 + # pytest-mock. This is addressed upstream in 122 # https://github.com/python-poetry/poetry/pull/3457 123 (fetchpatch { 124 url = "https://github.com/python-poetry/poetry/commit/8ddceb7c52b3b1f35412479707fa790e5d60e691.diff"; ··· 126 }) 127 ]; 128 129 + # Allow for package to use pep420's native namespaces 130 + pythonNamespaces = [ 131 + "poetry" 132 + ]; 133 134 meta = with lib; { 135 homepage = "https://python-poetry.org/";
+6
pkgs/development/python-modules/pygls/default.nix
··· 29 pydantic 30 typeguard 31 ]; 32 33 checkInputs = [ 34 mock
··· 29 pydantic 30 typeguard 31 ]; 32 + # We don't know why an early version of pydantic is required, see: 33 + # https://github.com/openlawlibrary/pygls/issues/221 34 + preBuild = '' 35 + substituteInPlace setup.cfg \ 36 + --replace "pydantic>=1.7,<1.9" "pydantic" 37 + ''; 38 39 checkInputs = [ 40 mock
+2 -2
pkgs/development/python-modules/pyhomematic/default.nix
··· 7 8 buildPythonPackage rec { 9 pname = "pyhomematic"; 10 - version = "0.1.76"; 11 12 disabled = !isPy3k; 13 14 src = fetchPypi { 15 inherit pname version; 16 - sha256 = "ea2496c920451ded4561e3758c8f77157fc00c40d1f75d8163e399fd3e0d795a"; 17 }; 18 19 checkPhase = ''
··· 7 8 buildPythonPackage rec { 9 pname = "pyhomematic"; 10 + version = "0.1.77"; 11 12 disabled = !isPy3k; 13 14 src = fetchPypi { 15 inherit pname version; 16 + sha256 = "00d95c21b95a17bc07586f69c976fb343a103adc0954d7b2d56c7160665625cb"; 17 }; 18 19 checkPhase = ''
+2 -2
pkgs/development/python-modules/pymelcloud/default.nix
··· 10 11 buildPythonPackage rec { 12 pname = "pymelcloud"; 13 - version = "2.5.6"; 14 format = "setuptools"; 15 16 disabled = pythonOlder "3.8"; ··· 19 owner = "vilppuvuorinen"; 20 repo = pname; 21 rev = "v${version}"; 22 - sha256 = "sha256-QXOL3MftNibo1wUjz/KTQLNDk7pWL9VH/wd7LpEJOmE="; 23 }; 24 25 propagatedBuildInputs = [
··· 10 11 buildPythonPackage rec { 12 pname = "pymelcloud"; 13 + version = "2.11.0"; 14 format = "setuptools"; 15 16 disabled = pythonOlder "3.8"; ··· 19 owner = "vilppuvuorinen"; 20 repo = pname; 21 rev = "v${version}"; 22 + sha256 = "1q6ny58cn9qy86blxbk6l2iklab7y11b734l7yb1bp35dmy27w26"; 23 }; 24 25 propagatedBuildInputs = [
+10
pkgs/development/python-modules/pyrmvtransport/default.nix
··· 1 { lib 2 , buildPythonPackage 3 , fetchFromGitHub 4 , pythonOlder 5 , flit 6 , async-timeout ··· 39 pytestCheckHook 40 pytest-asyncio 41 pytest-httpx 42 ]; 43 44 pythonImportsCheck = [
··· 1 { lib 2 , buildPythonPackage 3 , fetchFromGitHub 4 + , fetchpatch 5 , pythonOlder 6 , flit 7 , async-timeout ··· 40 pytestCheckHook 41 pytest-asyncio 42 pytest-httpx 43 + ]; 44 + 45 + patches = [ 46 + # Can be removed with next release, https://github.com/cgtobi/PyRMVtransport/pull/55 47 + (fetchpatch { 48 + name = "update-tests.patch"; 49 + url = "https://github.com/cgtobi/PyRMVtransport/commit/fe93b3d9d625f9ccf8eb7b0c39e0ff41c72d2e77.patch"; 50 + sha256 = "sha256-t+GP5VG1S86vVSsisl85ZHBtOqxIi7QS83DA+HgRet4="; 51 + }) 52 ]; 53 54 pythonImportsCheck = [
+14 -2
pkgs/development/python-modules/pytest-doctestplus/default.nix
··· 1 { lib 2 , buildPythonPackage 3 , fetchPypi 4 - , pythonOlder 5 , packaging 6 , pytest 7 , pytestCheckHook 8 , setuptools-scm 9 }: 10 11 buildPythonPackage rec { 12 pname = "pytest-doctestplus"; 13 version = "0.11.2"; 14 disabled = pythonOlder "3.7"; 15 16 src = fetchPypi { ··· 34 pytestCheckHook 35 ]; 36 37 disabledTests = [ 38 # ERROR: usage: __main__.py [options] [file_or_dir] [file_or_dir] [...] 39 # __main__.py: error: unrecognized arguments: --remote-data ··· 49 description = "Pytest plugin with advanced doctest features"; 50 homepage = "https://astropy.org"; 51 license = licenses.bsd3; 52 - maintainers = [ maintainers.costrouc ]; 53 }; 54 }
··· 1 { lib 2 , buildPythonPackage 3 + , fetchpatch 4 , fetchPypi 5 , packaging 6 , pytest 7 , pytestCheckHook 8 + , pythonOlder 9 , setuptools-scm 10 }: 11 12 buildPythonPackage rec { 13 pname = "pytest-doctestplus"; 14 version = "0.11.2"; 15 + format = "setuptools"; 16 + 17 disabled = pythonOlder "3.7"; 18 19 src = fetchPypi { ··· 37 pytestCheckHook 38 ]; 39 40 + patches = [ 41 + # Removal of distutils, https://github.com/astropy/pytest-doctestplus/pull/172 42 + (fetchpatch { 43 + name = "distutils-removal.patch"; 44 + url = "https://github.com/astropy/pytest-doctestplus/commit/ae2ee14cca0cde0fab355936995fa083529b00ff.patch"; 45 + sha256 = "sha256-uryKV7bWw2oz0glyh2lpGqtDPFvRTo8RmI1N1n15/d4="; 46 + }) 47 + ]; 48 + 49 disabledTests = [ 50 # ERROR: usage: __main__.py [options] [file_or_dir] [file_or_dir] [...] 51 # __main__.py: error: unrecognized arguments: --remote-data ··· 61 description = "Pytest plugin with advanced doctest features"; 62 homepage = "https://astropy.org"; 63 license = licenses.bsd3; 64 + maintainers = with maintainers; [ costrouc ]; 65 }; 66 }
+13 -5
pkgs/development/python-modules/pytest-httpx/default.nix
··· 5 , pytest 6 , pytest-asyncio 7 , pytestCheckHook 8 }: 9 10 buildPythonPackage rec { 11 pname = "pytest-httpx"; 12 - version = "0.15.0"; 13 14 src = fetchFromGitHub { 15 owner = "Colin-b"; 16 repo = "pytest_httpx"; 17 rev = "v${version}"; 18 - sha256 = "08dxvjkxlnam3r0yp17495d1vksyawzzkpykacjql1gi6hqlfrwg"; 19 }; 20 21 - buildInputs = [ pytest ]; 22 23 propagatedBuildInputs = [ 24 httpx ··· 29 pytestCheckHook 30 ]; 31 32 - pythonImportsCheck = [ "pytest_httpx" ]; 33 34 meta = with lib; { 35 description = "Send responses to httpx"; 36 homepage = "https://github.com/Colin-b/pytest_httpx"; 37 license = licenses.mit; 38 - maintainers = with maintainers; [ SuperSandro2000 ]; 39 }; 40 }
··· 5 , pytest 6 , pytest-asyncio 7 , pytestCheckHook 8 + , pythonOlder 9 }: 10 11 buildPythonPackage rec { 12 pname = "pytest-httpx"; 13 + version = "0.17.3"; 14 + format = "setuptools"; 15 + 16 + disabled = pythonOlder "3.6"; 17 18 src = fetchFromGitHub { 19 owner = "Colin-b"; 20 repo = "pytest_httpx"; 21 rev = "v${version}"; 22 + sha256 = "sha256-cJRzjNIN9Fc8vcjmndW+akjxDSp+wFahY2MEslgXIwM="; 23 }; 24 25 + buildInputs = [ 26 + pytest 27 + ]; 28 29 propagatedBuildInputs = [ 30 httpx ··· 35 pytestCheckHook 36 ]; 37 38 + pythonImportsCheck = [ 39 + "pytest_httpx" 40 + ]; 41 42 meta = with lib; { 43 description = "Send responses to httpx"; 44 homepage = "https://github.com/Colin-b/pytest_httpx"; 45 license = licenses.mit; 46 + maintainers = with maintainers; [ fab SuperSandro2000 ]; 47 }; 48 }
+2 -2
pkgs/development/python-modules/scikit-survival/default.nix
··· 15 16 buildPythonPackage rec { 17 pname = "scikit-survival"; 18 - version = "0.16.0"; 19 20 src = fetchPypi { 21 inherit pname version; 22 - sha256 = "d3573eb1df9d516c75994a8a82108b6c7a5ca7ea8a9af60b38f3f65c3e227fa7"; 23 }; 24 25 nativeBuildInputs = [
··· 15 16 buildPythonPackage rec { 17 pname = "scikit-survival"; 18 + version = "0.17.0"; 19 20 src = fetchPypi { 21 inherit pname version; 22 + sha256 = "ba49325f6a31e8bdccfb88337aa85218d209e88a6a704e9c41ef13bf749e0f46"; 23 }; 24 25 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/screenlogicpy/default.nix
··· 8 9 buildPythonPackage rec { 10 pname = "screenlogicpy"; 11 - version = "0.5.3"; 12 format = "setuptools"; 13 14 disabled = pythonOlder "3.6"; ··· 17 owner = "dieselrabbit"; 18 repo = pname; 19 rev = "v${version}"; 20 - sha256 = "1ic19l0xr2wlnc8q6nhvv747k0f4j9k94ix14zkrwpp9nl09sm8j"; 21 }; 22 23 checkInputs = [
··· 8 9 buildPythonPackage rec { 10 pname = "screenlogicpy"; 11 + version = "0.5.4"; 12 format = "setuptools"; 13 14 disabled = pythonOlder "3.6"; ··· 17 owner = "dieselrabbit"; 18 repo = pname; 19 rev = "v${version}"; 20 + sha256 = "0r9227s4v17jm5n0j31ssnak9f5p7xfvz4r1fwy61286is3j5gbb"; 21 }; 22 23 checkInputs = [
+2 -2
pkgs/development/python-modules/smart-meter-texas/default.nix
··· 10 11 buildPythonPackage rec { 12 pname = "smart-meter-texas"; 13 - version = "0.4.7"; 14 15 disabled = pythonOlder "3.6"; 16 ··· 18 owner = "grahamwetzler"; 19 repo = "smart-meter-texas"; 20 rev = "v${version}"; 21 - sha256 = "1hfvv3kpkc7i9mn58bjgvwjj0mi2syr8fv4r8bwbhq5sailma27j"; 22 }; 23 24 postPatch = ''
··· 10 11 buildPythonPackage rec { 12 pname = "smart-meter-texas"; 13 + version = "0.5.0"; 14 15 disabled = pythonOlder "3.6"; 16 ··· 18 owner = "grahamwetzler"; 19 repo = "smart-meter-texas"; 20 rev = "v${version}"; 21 + sha256 = "1f5blmz3w549qjqn5xmdk1fx2pqd76hnlc9p439r7yc473nhw69w"; 22 }; 23 24 postPatch = ''
+4 -3
pkgs/development/python-modules/sounddevice/default.nix
··· 1 { lib 2 , buildPythonPackage 3 , fetchPypi 4 , isPy27 ··· 10 11 buildPythonPackage rec { 12 pname = "sounddevice"; 13 - version = "0.4.3"; 14 disabled = isPy27; 15 16 src = fetchPypi { 17 inherit pname version; 18 - sha256 = "f1667a7467b65fac4c4ebf668b4e9698eb7333fc3d32bc3c7ec9839ea7cb6c20"; 19 }; 20 21 propagatedBuildInputs = [ cffi numpy portaudio ]; ··· 28 patches = [ 29 (substituteAll { 30 src = ./fix-portaudio-library-path.patch; 31 - portaudio = "${portaudio}/lib/libportaudio.so.2"; 32 }) 33 ]; 34
··· 1 { lib 2 + , stdenv 3 , buildPythonPackage 4 , fetchPypi 5 , isPy27 ··· 11 12 buildPythonPackage rec { 13 pname = "sounddevice"; 14 + version = "0.4.4"; 15 disabled = isPy27; 16 17 src = fetchPypi { 18 inherit pname version; 19 + sha256 = "sha256-9pD1qkGKViaMe9vJfWl8ha3QE0xcedRLiirXobhdp4k="; 20 }; 21 22 propagatedBuildInputs = [ cffi numpy portaudio ]; ··· 29 patches = [ 30 (substituteAll { 31 src = ./fix-portaudio-library-path.patch; 32 + portaudio = "${portaudio}/lib/libportaudio${stdenv.hostPlatform.extensions.sharedLibrary}"; 33 }) 34 ]; 35
+3 -1
pkgs/development/python-modules/spyse-python/default.nix
··· 11 buildPythonPackage rec { 12 pname = "spyse-python"; 13 version = "2.2.3"; 14 15 disabled = pythonOlder "3.8"; 16 ··· 34 postPatch = '' 35 substituteInPlace setup.py \ 36 --replace "'dataclasses~=0.6'," "" \ 37 - --replace "responses~=0.13.3" "responses>=0.13.3" 38 ''; 39 40 pythonImportsCheck = [
··· 11 buildPythonPackage rec { 12 pname = "spyse-python"; 13 version = "2.2.3"; 14 + format = "setuptools"; 15 16 disabled = pythonOlder "3.8"; 17 ··· 35 postPatch = '' 36 substituteInPlace setup.py \ 37 --replace "'dataclasses~=0.6'," "" \ 38 + --replace "responses~=0.13.3" "responses>=0.13.3" \ 39 + --replace "limiter~=0.1.2" "limiter>=0.1.2" 40 ''; 41 42 pythonImportsCheck = [
+28
pkgs/development/python-modules/syslog-rfc5424-formatter/default.nix
···
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + }: 5 + 6 + buildPythonPackage rec { 7 + pname = "syslog-rfc5424-formatter"; 8 + version = "1.2.2"; 9 + 10 + src = fetchFromGitHub { 11 + owner = "easypost"; 12 + repo = pname; 13 + rev = "v${version}"; 14 + sha256 = "17ym5ls5r6dd9pg9frdz8myfq5fxyqlwdq1gygc9vnrxbgw2c9kb"; 15 + }; 16 + 17 + # Tests are not picked up, review later again 18 + doCheck = false; 19 + 20 + pythonImportsCheck = [ "syslog_rfc5424_formatter" ]; 21 + 22 + meta = with lib; { 23 + description = "Python logging formatter for emitting RFC5424 Syslog messages"; 24 + homepage = "https://github.com/easypost/syslog-rfc5424-formatter"; 25 + license = with licenses; [ isc ]; 26 + maintainers = with maintainers; [ fab ]; 27 + }; 28 + }
+7 -2
pkgs/development/python-modules/types-requests/default.nix
··· 1 { lib 2 , buildPythonPackage 3 , fetchPypi 4 }: 5 6 buildPythonPackage rec { 7 pname = "types-requests"; 8 - version = "2.27.2"; 9 format = "setuptools"; 10 11 src = fetchPypi { 12 inherit pname version; 13 - sha256 = "c902c5433ad103053011c6ac036317ac6f6a8e8a6926fc470a8d2ef791236da7"; 14 }; 15 16 # Module doesn't have tests 17 doCheck = false;
··· 1 { lib 2 , buildPythonPackage 3 , fetchPypi 4 + , types-urllib3 5 }: 6 7 buildPythonPackage rec { 8 pname = "types-requests"; 9 + version = "2.27.5"; 10 format = "setuptools"; 11 12 src = fetchPypi { 13 inherit pname version; 14 + sha256 = "sha256-pn3BqFEjErjLifO6lfmg5p7zQ2rnfJvU8yjNiPF63aI="; 15 }; 16 + 17 + propagatedBuildInputs = [ 18 + types-urllib3 19 + ]; 20 21 # Module doesn't have tests 22 doCheck = false;
+29
pkgs/development/python-modules/types-urllib3/default.nix
···
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchPypi 4 + }: 5 + 6 + buildPythonPackage rec { 7 + pname = "types-urllib3"; 8 + version = "1.26.4"; 9 + format = "setuptools"; 10 + 11 + src = fetchPypi { 12 + inherit pname version; 13 + hash = "sha256-NcF74J4bzvOx4hAcUXK5fNt4MwkVlzx0H0wZedhAXvk="; 14 + }; 15 + 16 + # Module doesn't have tests 17 + doCheck = false; 18 + 19 + pythonImportsCheck = [ 20 + "urllib3-stubs" 21 + ]; 22 + 23 + meta = with lib; { 24 + description = "Typing stubs for urllib3"; 25 + homepage = "https://github.com/python/typeshed"; 26 + license = licenses.asl20; 27 + maintainers = with maintainers; [ fab ]; 28 + }; 29 + }
+21 -3
pkgs/development/python-modules/versionfinder/default.nix
··· 1 - { lib, buildPythonPackage, fetchFromGitHub, GitPython, pytestCheckHook, backoff, requests }: 2 3 buildPythonPackage rec { 4 pname = "versionfinder"; 5 version = "1.1.1"; 6 7 src = fetchFromGitHub { 8 owner = "jantman"; ··· 22 ]; 23 24 disabledTestPaths = [ 25 - # acceptance tests use the network 26 "versionfinder/tests/test_acceptance.py" 27 ]; 28 29 - pythonImportsCheck = [ "versionfinder" ]; 30 31 meta = with lib; { 32 description = "Find the version of another package, whether installed via pip, setuptools or git";
··· 1 + { lib 2 + , backoff 3 + , buildPythonPackage 4 + , fetchFromGitHub 5 + , GitPython 6 + , pytestCheckHook 7 + , pythonOlder 8 + , requests 9 + }: 10 11 buildPythonPackage rec { 12 pname = "versionfinder"; 13 version = "1.1.1"; 14 + format = "setuptools"; 15 + 16 + disabled = pythonOlder "3.7"; 17 18 src = fetchFromGitHub { 19 owner = "jantman"; ··· 33 ]; 34 35 disabledTestPaths = [ 36 + # Acceptance tests use the network 37 "versionfinder/tests/test_acceptance.py" 38 ]; 39 40 + disabledTests = [ 41 + # Tests are out-dated 42 + "TestFindPipInfo" 43 + ]; 44 + 45 + pythonImportsCheck = [ 46 + "versionfinder" 47 + ]; 48 49 meta = with lib; { 50 description = "Find the version of another package, whether installed via pip, setuptools or git";
+8 -1
pkgs/development/python-modules/zeep/default.nix
··· 28 buildPythonPackage rec { 29 pname = "zeep"; 30 version = "4.1.0"; 31 disabled = pythonOlder "3.6"; 32 33 src = fetchFromGitHub { ··· 71 disabledTests = [ 72 # lxml.etree.XMLSyntaxError: Extra content at the end of the document, line 2, column 64 73 "test_mime_content_serialize_text_xml" 74 ]; 75 76 - pythonImportsCheck = [ "zeep" ]; 77 78 meta = with lib; { 79 description = "Python SOAP client";
··· 28 buildPythonPackage rec { 29 pname = "zeep"; 30 version = "4.1.0"; 31 + 32 disabled = pythonOlder "3.6"; 33 34 src = fetchFromGitHub { ··· 72 disabledTests = [ 73 # lxml.etree.XMLSyntaxError: Extra content at the end of the document, line 2, column 64 74 "test_mime_content_serialize_text_xml" 75 + # Tests are outdated 76 + "test_load" 77 + "test_load_cache" 78 + "test_post" 79 ]; 80 81 + pythonImportsCheck = [ 82 + "zeep" 83 + ]; 84 85 meta = with lib; { 86 description = "Python SOAP client";
+2 -2
pkgs/development/python-modules/zstd/default.nix
··· 4 5 buildPythonPackage rec { 6 pname = "zstd"; 7 - version = "1.5.0.4"; 8 9 src = fetchPypi { 10 inherit pname version; 11 - sha256 = "0d048f03fc6354c565ac1e36bb6bf697cfe9941217717fc6a2076529d8b860c3"; 12 }; 13 14 postPatch = ''
··· 4 5 buildPythonPackage rec { 6 pname = "zstd"; 7 + version = "1.5.1.0"; 8 9 src = fetchPypi { 10 inherit pname version; 11 + sha256 = "9519bb0cd91c4498cd8cf66ef88fb22e5d6a442317704e6afd00b12726d17d0a"; 12 }; 13 14 postPatch = ''
+9 -1
pkgs/development/tools/build-managers/jam/default.nix
··· 16 ''; 17 18 buildPhase = '' 19 make jam0 20 - ./jam0 -j$NIX_BUILD_CORES -sBINDIR=$out/bin install 21 ''; 22 23 installPhase = '' 24 mkdir -p $out/doc/jam 25 cp *.html $out/doc/jam 26 ''; 27 28 enableParallelBuilding = true;
··· 16 ''; 17 18 buildPhase = '' 19 + runHook preBuild 20 + 21 make jam0 22 + 23 + runHook postBuild 24 ''; 25 26 installPhase = '' 27 + runHook preInstall 28 + 29 + ./jam0 -j$NIX_BUILD_CORES -sBINDIR=$out/bin install 30 mkdir -p $out/doc/jam 31 cp *.html $out/doc/jam 32 + 33 + runHook postInstall 34 ''; 35 36 enableParallelBuilding = true;
+52
pkgs/development/tools/build-managers/jam/ftjam.nix
···
··· 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , bison 5 + }: 6 + 7 + stdenv.mkDerivation rec { 8 + pname = "ftjam"; 9 + version = "2.5.2"; 10 + 11 + src = fetchurl { 12 + url = "https://downloads.sourceforge.net/project/freetype/${pname}/${version}/${pname}-${version}.tar.bz2"; 13 + hash = "sha256-6JdzUAqSkS3pGOn+v/q+S2vOedaa8ZRDX04DK4ptZqM="; 14 + }; 15 + 16 + nativeBuildInputs = [ 17 + bison 18 + ]; 19 + 20 + preConfigure = '' 21 + unset AR 22 + ''; 23 + 24 + buildPhase = '' 25 + runHook preBuild 26 + 27 + make jam0 28 + 29 + runHook postBuild 30 + ''; 31 + 32 + installPhase = '' 33 + runHook preInstall 34 + 35 + ./jam0 -j$NIX_BUILD_CORES -sBINDIR=$out/bin install 36 + mkdir -p $out/doc/jam 37 + cp *.html $out/doc/jam 38 + 39 + runHook postInstall 40 + ''; 41 + 42 + enableParallelBuilding = true; 43 + 44 + meta = with lib; { 45 + homepage = "https://freetype.org/jam/"; 46 + description = "Freetype's enhanced, backwards-compatible Jam clone"; 47 + license = licenses.free; 48 + maintainers = with maintainers; [ AndersonTorres ]; 49 + platforms = platforms.unix; 50 + }; 51 + } 52 + # TODO: setup hook for Jam
+3 -3
pkgs/development/tools/gofumpt/default.nix
··· 2 3 buildGoModule rec { 4 pname = "gofumpt"; 5 - version = "0.2.0"; 6 7 src = fetchFromGitHub { 8 owner = "mvdan"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-Kgj3f90bAtaVl4mby6FQr4t4BT4I3QLtHhvO10f1BOk="; 12 }; 13 14 - vendorSha256 = "sha256-gxxK2eUmYUqHjt8HP6OANaHsO43wCaodUDR4BlMY8Zw="; 15 16 doCheck = false; 17
··· 2 3 buildGoModule rec { 4 pname = "gofumpt"; 5 + version = "0.2.1"; 6 7 src = fetchFromGitHub { 8 owner = "mvdan"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-NkflJwFdVcFTjXkDr8qqAFUlKwGNPTso6hvu7Vikn2U="; 12 }; 13 14 + vendorSha256 = "sha256-RZPfdj+rimKGvRZKaXOirkd7ietri55rBofwa/l2z8s="; 15 16 doCheck = false; 17
+2 -2
pkgs/development/tools/jo/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "jo"; 5 - version = "1.4"; 6 7 src = fetchFromGitHub { 8 owner = "jpmens"; 9 repo = "jo"; 10 rev = version; 11 - sha256 ="1jnv3g38vaa66m83hqibyki31ii81xfpvjw6wgdv18ci3iwvsz3v"; 12 }; 13 14 enableParallelBuilding = true;
··· 2 3 stdenv.mkDerivation rec { 4 pname = "jo"; 5 + version = "1.6"; 6 7 src = fetchFromGitHub { 8 owner = "jpmens"; 9 repo = "jo"; 10 rev = version; 11 + sha256 ="sha256-aATCeJV0x+XHOQbwulutxivPzGVQ0mJj90vA+6IM124="; 12 }; 13 14 enableParallelBuilding = true;
+7 -5
pkgs/development/tools/misc/clojure-lsp/default.nix
··· 2 3 buildGraalvmNativeImage rec { 4 pname = "clojure-lsp"; 5 - version = "2021.11.02-15.24.47"; 6 7 src = fetchFromGitHub { 8 owner = pname; 9 repo = pname; 10 rev = version; 11 - sha256 = "sha256-PBbo8yx4g4SsViUA1jnwqF8q9Dfn3lrgK2CP026Bm4Q="; 12 }; 13 14 jar = fetchurl { 15 url = "https://github.com/clojure-lsp/clojure-lsp/releases/download/${version}/clojure-lsp.jar"; 16 - sha256 = "sha256-k0mzibcLAspklCPE6f2qsUm9bwSvcJRgWecMBq7mpF0="; 17 }; 18 19 # https://github.com/clojure-lsp/clojure-lsp/blob/2021.11.02-15.24.47/graalvm/native-unix-compile.sh#L18-L27 ··· 35 36 export HOME="$(mktemp -d)" 37 ./${pname} --version | fgrep -q '${version}' 38 - ${babashka}/bin/bb integration-test ./${pname} 39 - 40 runHook postCheck 41 ''; 42
··· 2 3 buildGraalvmNativeImage rec { 4 pname = "clojure-lsp"; 5 + version = "2022.01.03-19.46.10"; 6 7 src = fetchFromGitHub { 8 owner = pname; 9 repo = pname; 10 rev = version; 11 + sha256 = "sha256-BbhT4I4M7PwHHFwNDNY4mJxsreJVOEwlValZTgS0Zs8="; 12 }; 13 14 jar = fetchurl { 15 url = "https://github.com/clojure-lsp/clojure-lsp/releases/download/${version}/clojure-lsp.jar"; 16 + sha256 = "sha256-QG9Z4wkzh1kaX44oee325BvY2XqXRo4iBjY5LPnkLBQ="; 17 }; 18 19 # https://github.com/clojure-lsp/clojure-lsp/blob/2021.11.02-15.24.47/graalvm/native-unix-compile.sh#L18-L27 ··· 35 36 export HOME="$(mktemp -d)" 37 ./${pname} --version | fgrep -q '${version}' 38 + '' 39 + # TODO: fix classpath issue per https://github.com/NixOS/nixpkgs/pull/153770 40 + #${babashka}/bin/bb integration-test ./${pname} 41 + + '' 42 runHook postCheck 43 ''; 44
+2 -2
pkgs/development/tools/misc/strace/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "strace"; 5 - version = "5.15"; 6 7 src = fetchurl { 8 url = "https://strace.io/files/${version}/${pname}-${version}.tar.xz"; 9 - sha256 = "sha256-68rCLylzNSlNxlRCXLw84BM0O+zm2iaZ467Iau6Nctw="; 10 }; 11 12 depsBuildBuild = [ buildPackages.stdenv.cc ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "strace"; 5 + version = "5.16"; 6 7 src = fetchurl { 8 url = "https://strace.io/files/${version}/${pname}-${version}.tar.xz"; 9 + sha256 = "sha256-3H2yMP8+V8JJgwupSsqyuGLaH8qsVUF+m4UEGoM8ooU="; 10 }; 11 12 depsBuildBuild = [ buildPackages.stdenv.cc ];
+59
pkgs/games/blockattack/default.nix
···
··· 1 + { lib 2 + , stdenv 3 + , fetchFromGitHub 4 + , SDL2 5 + , SDL2_image 6 + , SDL2_mixer 7 + , SDL2_ttf 8 + , boost 9 + , cmake 10 + , gettext 11 + , physfs 12 + , pkg-config 13 + , zip 14 + }: 15 + 16 + stdenv.mkDerivation rec { 17 + pname = "blockattack"; 18 + version = "2.7.0"; 19 + 20 + src = fetchFromGitHub { 21 + name = "${pname}-${version}-src"; 22 + owner = "blockattack"; 23 + repo = "blockattack-game"; 24 + rev = "v${version}"; 25 + hash = "sha256-ySLm3AdoJRiMRdla45OJh8ZIFYNh+HzjG2VnFqoWuZA="; 26 + }; 27 + 28 + nativeBuildInputs = [ 29 + cmake 30 + pkg-config 31 + gettext 32 + zip 33 + ]; 34 + 35 + buildInputs = [ 36 + SDL2 37 + SDL2_image 38 + SDL2_mixer 39 + SDL2_ttf 40 + SDL2_ttf 41 + boost 42 + physfs 43 + ]; 44 + 45 + preConfigure = '' 46 + patchShebangs packdata.sh source/misc/translation/*.sh 47 + chmod +x ./packdata.sh 48 + ./packdata.sh 49 + ''; 50 + 51 + meta = with lib; { 52 + homepage = "https://blockattack.net/"; 53 + description = "An open source clone of Panel de Pon (aka Tetris Attack)"; 54 + license = licenses.gpl2Plus; 55 + maintainers = with maintainers; [ AndersonTorres ]; 56 + platforms = platforms.unix; 57 + broken = stdenv.isDarwin; 58 + }; 59 + }
+75
pkgs/games/the-legend-of-edgar/default.nix
···
··· 1 + { lib 2 + , stdenv 3 + , fetchFromGitHub 4 + , SDL2 5 + , SDL2_image 6 + , SDL2_mixer 7 + , SDL2_ttf 8 + , gettext 9 + , libpng 10 + , pkg-config 11 + , zlib 12 + }: 13 + 14 + stdenv.mkDerivation rec { 15 + pname = "the-legend-of-edgar"; 16 + version = "1.35"; 17 + 18 + src = fetchFromGitHub { 19 + name = "${pname}-${version}-src"; 20 + owner = "riksweeney"; 21 + repo = "edgar"; 22 + rev = version; 23 + hash = "sha256-ojy4nEW9KiSte/AoFUMPrKCxvIeQpMVIL4ileHiBydo="; 24 + }; 25 + 26 + nativeBuildInputs = [ 27 + pkg-config 28 + gettext 29 + ]; 30 + 31 + buildInputs = [ 32 + SDL2 33 + SDL2_image 34 + SDL2_mixer 35 + SDL2_ttf 36 + libpng 37 + zlib 38 + ]; 39 + 40 + dontConfigure = true; 41 + 42 + makefile = "makefile"; 43 + 44 + makeFlags = [ 45 + "PREFIX=${placeholder "out"}" 46 + "BIN_DIR=${placeholder "out"}/bin/" 47 + ]; 48 + 49 + # TODO: remove the setting below when the next version arrives 50 + # https://github.com/riksweeney/edgar/pull/57 51 + preBuild = '' 52 + export CFLAGS=$(sdl2-config --cflags) 53 + ''; 54 + 55 + meta = with lib; { 56 + homepage = "https://www.parallelrealities.co.uk/games/edgar"; 57 + description = "A 2D platform game with a persistent world"; 58 + longDescription = '' 59 + When Edgar's father fails to return home after venturing out one dark and 60 + stormy night, Edgar fears the worst: he has been captured by the evil 61 + sorcerer who lives in a fortress beyond the forbidden swamp. 62 + 63 + Donning his armour, Edgar sets off to rescue him, but his quest will not 64 + be easy... 65 + 66 + The Legend of Edgar is a platform game, not unlike those found on the 67 + Amiga and SNES. Edgar must battle his way across the world, solving 68 + puzzles and defeating powerful enemies to achieve his quest. 69 + ''; 70 + license = licenses.gpl1Plus; 71 + maintainers = with maintainers; [ AndersonTorres ]; 72 + platforms = platforms.unix; 73 + broken = stdenv.isDarwin; 74 + }; 75 + }
+3 -3
pkgs/misc/emulators/wine/sources.nix
··· 44 45 unstable = fetchurl rec { 46 # NOTE: Don't forget to change the SHA256 for staging as well. 47 - version = "7.0-rc2"; 48 url = "https://dl.winehq.org/wine/source/7.0/wine-${version}.tar.xz"; 49 - sha256 = "sha256-D92OOa9fFdBd0wZbtRLz9oOhhJ3AtHcSZP0EaWyW7X0="; 50 inherit (stable) gecko32 gecko64; 51 52 ## see http://wiki.winehq.org/Mono ··· 65 staging = fetchFromGitHub rec { 66 # https://github.com/wine-staging/wine-staging/releases 67 inherit (unstable) version; 68 - sha256 = "sha256-UkwvKKRXyFjLfYbL8Ienpp5pxUzMQY1bEyAkoP7Xdz4="; 69 owner = "wine-staging"; 70 repo = "wine-staging"; 71 rev = "v${version}";
··· 44 45 unstable = fetchurl rec { 46 # NOTE: Don't forget to change the SHA256 for staging as well. 47 + version = "7.0-rc5"; 48 url = "https://dl.winehq.org/wine/source/7.0/wine-${version}.tar.xz"; 49 + sha256 = "sha256-jQjHneYAZ3H26EXje9cyoduXN7TakiLksDdzNoi3d1g="; 50 inherit (stable) gecko32 gecko64; 51 52 ## see http://wiki.winehq.org/Mono ··· 65 staging = fetchFromGitHub rec { 66 # https://github.com/wine-staging/wine-staging/releases 67 inherit (unstable) version; 68 + sha256 = "sha256-RFwDI8eGw9BikQ8X+S1+EPHKAgNaYHuZOJzmlg12ROI="; 69 owner = "wine-staging"; 70 repo = "wine-staging"; 71 rev = "v${version}";
+15
pkgs/misc/vscode-extensions/default.nix
··· 144 }; 145 }; 146 147 apollographql.vscode-apollo = buildVscodeMarketplaceExtension { 148 mktplcRef = { 149 name = "vscode-apollo";
··· 144 }; 145 }; 146 147 + antyos.openscad = buildVscodeMarketplaceExtension { 148 + mktplcRef = { 149 + name = "openscad"; 150 + publisher = "Antyos"; 151 + version = "1.1.1"; 152 + sha256 = "1adcw9jj3npk3l6lnlfgji2l529c4s5xp9jl748r9naiy3w3dpjv"; 153 + }; 154 + meta = with lib; { 155 + changelog = "https://marketplace.visualstudio.com/items/Antyos.openscad/changelog"; 156 + description = "OpenSCAD highlighting, snippets, and more for VSCode"; 157 + homepage = "https://github.com/Antyos/vscode-openscad"; 158 + license = licenses.gpl3; 159 + }; 160 + }; 161 + 162 apollographql.vscode-apollo = buildVscodeMarketplaceExtension { 163 mktplcRef = { 164 name = "vscode-apollo";
+2 -2
pkgs/os-specific/linux/android-udev-rules/default.nix
··· 6 7 stdenv.mkDerivation rec { 8 pname = "android-udev-rules"; 9 - version = "20210501"; 10 11 src = fetchFromGitHub { 12 owner = "M0Rf30"; 13 repo = "android-udev-rules"; 14 rev = version; 15 - sha256 = "sha256-rlTulWclPqMl9LdHdcAtLARXGItiSeF3RX+neZrjgV4="; 16 }; 17 18 installPhase = ''
··· 6 7 stdenv.mkDerivation rec { 8 pname = "android-udev-rules"; 9 + version = "20220102"; 10 11 src = fetchFromGitHub { 12 owner = "M0Rf30"; 13 repo = "android-udev-rules"; 14 rev = version; 15 + sha256 = "sha256-D2dPFvuFcZtosfTfsW0lmK5y8zqHdIxJBlvmP/R91CE="; 16 }; 17 18 installPhase = ''
+3 -11
pkgs/servers/mail/opensmtpd/extras.nix
··· 1 - { lib, stdenv, fetchurl, openssl, libevent, libasr, 2 - python2, pkg-config, lua5, perl, libmysqlclient, postgresql, sqlite, hiredis, 3 - enablePython ? true, 4 enableLua ? true, 5 enablePerl ? true, 6 enableMysql ? true, ··· 20 21 nativeBuildInputs = [ pkg-config ]; 22 buildInputs = [ openssl libevent 23 - libasr python2 lua5 perl libmysqlclient postgresql sqlite hiredis ]; 24 25 configureFlags = [ 26 "--sysconfdir=/etc" ··· 47 "--with-table-stub" 48 "--with-scheduler-ram" 49 "--with-scheduler-stub" 50 - 51 - ] ++ lib.optionals enablePython [ 52 - "--with-python=${python2}" 53 - "--with-filter-python" 54 - "--with-queue-python" 55 - "--with-table-python" 56 - "--with-scheduler-python" 57 58 ] ++ lib.optionals enableLua [ 59 "--with-lua=${pkg-config}"
··· 1 + { lib, stdenv, fetchurl, openssl, libevent, libasr, ncurses, 2 + pkg-config, lua5, perl, libmysqlclient, postgresql, sqlite, hiredis, 3 enableLua ? true, 4 enablePerl ? true, 5 enableMysql ? true, ··· 19 20 nativeBuildInputs = [ pkg-config ]; 21 buildInputs = [ openssl libevent 22 + libasr lua5 perl libmysqlclient postgresql sqlite hiredis ]; 23 24 configureFlags = [ 25 "--sysconfdir=/etc" ··· 46 "--with-table-stub" 47 "--with-scheduler-ram" 48 "--with-scheduler-stub" 49 50 ] ++ lib.optionals enableLua [ 51 "--with-lua=${pkg-config}"
+3
pkgs/servers/teleport/default.nix
··· 6 , protobuf 7 , stdenv 8 , xdg-utils 9 10 , withRoleTester ? true 11 }: ··· 94 $out/bin/tctl version | grep ${version} > /dev/null 95 $out/bin/teleport version | grep ${version} > /dev/null 96 ''; 97 98 meta = with lib; { 99 description = "Certificate authority and access plane for SSH, Kubernetes, web applications, and databases";
··· 6 , protobuf 7 , stdenv 8 , xdg-utils 9 + , nixosTests 10 11 , withRoleTester ? true 12 }: ··· 95 $out/bin/tctl version | grep ${version} > /dev/null 96 $out/bin/teleport version | grep ${version} > /dev/null 97 ''; 98 + 99 + passthru.tests = nixosTests.teleport; 100 101 meta = with lib; { 102 description = "Certificate authority and access plane for SSH, Kubernetes, web applications, and databases";
+29
pkgs/servers/web-apps/baget/default.nix
···
··· 1 + { buildDotnetModule, lib, fetchFromGitHub, dotnetCorePackages }: 2 + 3 + buildDotnetModule rec { 4 + pname = "BaGet"; 5 + version = "0.4.0-preview2"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "loic-sharma"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "S/3CjXB/fBDzxLuQBQB3CKgEkmzUA8ZzzvzXLN8hfBU="; 12 + }; 13 + 14 + projectFile = "src/BaGet/BaGet.csproj"; 15 + nugetDeps = ./deps.nix; 16 + 17 + dotnet-sdk = dotnetCorePackages.sdk_3_1; 18 + dotnet-runtime = dotnetCorePackages.aspnetcore_3_1; 19 + 20 + passthru.updateScript = ./updater.sh; 21 + 22 + meta = with lib; { 23 + description = "A lightweight NuGet and symbol server"; 24 + license = licenses.mit; 25 + homepage = "https://loic-sharma.github.io/BaGet/"; 26 + platforms = platforms.all; 27 + maintainers = [ maintainers.abbradar ]; 28 + }; 29 + }
+396
pkgs/servers/web-apps/baget/deps.nix
···
··· 1 + { fetchNuGet }: [ 2 + (fetchNuGet { pname = "Aliyun.OSS.SDK.NetCore"; version = "2.9.1"; sha256 = "0j07j6cr0lqmmdwgz5alxlq5ifa5vzb58r1rqkgvf49nirz6jhfs"; }) 3 + (fetchNuGet { pname = "AWSSDK.Core"; version = "3.3.104.22"; sha256 = "1930axxsbiahv0rrav34zj355fwxx4nzbvd93sp5g94z6pdh0438"; }) 4 + (fetchNuGet { pname = "AWSSDK.S3"; version = "3.3.110.20"; sha256 = "0i8vcyxmszhsdm73fvg17yx6hfslml3y1sw0cd1lzv10avqfb7v9"; }) 5 + (fetchNuGet { pname = "AWSSDK.SecurityToken"; version = "3.3.104.27"; sha256 = "13ywh3d8fc8ndyg40yh386fw54s1w4sw9qqbjvmh40nb20s4wwrv"; }) 6 + (fetchNuGet { pname = "Google.Api.Gax"; version = "2.5.0"; sha256 = "0q6pi53px998i3gdndla8v0zqdpyi9gnsy9mdcfpkrg09vfbdsl9"; }) 7 + (fetchNuGet { pname = "Google.Api.Gax.Rest"; version = "2.5.0"; sha256 = "1zkjl5zh6qwdz4qmnxnk5877pas638i2qi25znilhqqf3mrkp0rp"; }) 8 + (fetchNuGet { pname = "Google.Apis"; version = "1.35.1"; sha256 = "1022l8m7v9f3rkjc9l11mkzwsbmqx9sk5f4aym035vn9hdr16d49"; }) 9 + (fetchNuGet { pname = "Google.Apis.Auth"; version = "1.35.1"; sha256 = "1qdnd1nq9bfgyljmiww91pfi0iz1n29rz2dlizhxcijqya2ldha3"; }) 10 + (fetchNuGet { pname = "Google.Apis.Core"; version = "1.35.1"; sha256 = "01dfw2kxknlc5pm7x1q88lv9j979509lkkgvlffjry5bawsxsja4"; }) 11 + (fetchNuGet { pname = "Google.Apis.Storage.v1"; version = "1.35.1.1266"; sha256 = "16wmqv0nqw8s0cmv2zmjd8raz2swygqn9jqg18ja1bfaz88r5c3l"; }) 12 + (fetchNuGet { pname = "Google.Cloud.Storage.V1"; version = "2.2.1"; sha256 = "0jpzca4xs82p3yyni8c1chq2pzzvmpf3j25ch0wj1w2ha36r9acj"; }) 13 + (fetchNuGet { pname = "Humanizer"; version = "2.11.10"; sha256 = "057pqzvdxsbpnnc5f1xkqg7j3ywp68ggia3w74fgqp0158dm6rdk"; }) 14 + (fetchNuGet { pname = "Humanizer.Core"; version = "2.11.10"; sha256 = "0z7kmd5rh1sb6izq0vssk6c2p63n00xglk45s7ga9z18z9aaskxv"; }) 15 + (fetchNuGet { pname = "Humanizer.Core.af"; version = "2.11.10"; sha256 = "18fiixfvjwn8m1i8z2cz4aqykzylvfdqmmpwc2zcd8sr1a2xm86z"; }) 16 + (fetchNuGet { pname = "Humanizer.Core.ar"; version = "2.11.10"; sha256 = "009fpm4jd325izm82ipipsvlwd31824gvskda68bdwi4yqmycz4p"; }) 17 + (fetchNuGet { pname = "Humanizer.Core.az"; version = "2.11.10"; sha256 = "144b9diwprabxwgi5a98k5iy95ajq4p7356phdqi2lhzwbz7b6a9"; }) 18 + (fetchNuGet { pname = "Humanizer.Core.bg"; version = "2.11.10"; sha256 = "1b9y40gvq2kwnj5wa40f8cbywv79jkajcwknagrgr27sykpfadl2"; }) 19 + (fetchNuGet { pname = "Humanizer.Core.bn-BD"; version = "2.11.10"; sha256 = "18pn4jcp36ygcx283l3fi9bs5d7q1a384b72a10g5kl0qckn88ay"; }) 20 + (fetchNuGet { pname = "Humanizer.Core.cs"; version = "2.11.10"; sha256 = "03crw1lnzp32v2kcdmllkrsqh07r4ggw9gyc96qw7cv0nk5ch1h8"; }) 21 + (fetchNuGet { pname = "Humanizer.Core.da"; version = "2.11.10"; sha256 = "0glby12zra3y3yiq4cwq1m6wjcjl8f21v8ghi6s20r48glm8vzy9"; }) 22 + (fetchNuGet { pname = "Humanizer.Core.de"; version = "2.11.10"; sha256 = "0a35xrm1f9p74x0fkr52bw9sd54vdy9d5rnvf565yh8ww43xfk7b"; }) 23 + (fetchNuGet { pname = "Humanizer.Core.el"; version = "2.11.10"; sha256 = "0bhwwdx5vc48zikdsbrkghdhwahxxc2lkff0yaa5nxhbhasl84h8"; }) 24 + (fetchNuGet { pname = "Humanizer.Core.es"; version = "2.11.10"; sha256 = "07bw07qy8nyzlgxl7l2lxv9f78qmkfppgzx7iyq5ikrcnpvc7i9q"; }) 25 + (fetchNuGet { pname = "Humanizer.Core.fa"; version = "2.11.10"; sha256 = "00d4hc1pfmhfkc5wmx9p7i00lgi4r0k6wfcns9kl1syjxv3bs5f2"; }) 26 + (fetchNuGet { pname = "Humanizer.Core.fi-FI"; version = "2.11.10"; sha256 = "0z4is7pl5jpi4pfdvd2zvx5mp00bj26d9l9ksqyc0liax8nfzyik"; }) 27 + (fetchNuGet { pname = "Humanizer.Core.fr"; version = "2.11.10"; sha256 = "0sybpg6kbbhrnk7gxcdk7ppan89lsfqsdssrg4i1dm8w48wgicap"; }) 28 + (fetchNuGet { pname = "Humanizer.Core.fr-BE"; version = "2.11.10"; sha256 = "1s25c86nl9wpsn6fydzwv4rfmdx5sm0vgyd7xhw5344k20gazvhv"; }) 29 + (fetchNuGet { pname = "Humanizer.Core.he"; version = "2.11.10"; sha256 = "1nx61qkjd6p9r36dmnm4942khyv35fpdqmb2w69gz6463g4d7z29"; }) 30 + (fetchNuGet { pname = "Humanizer.Core.hr"; version = "2.11.10"; sha256 = "02jhcyj72prkqsjxyilv04drm0bknqjh2r893jlbsfi9vjg2zay3"; }) 31 + (fetchNuGet { pname = "Humanizer.Core.hu"; version = "2.11.10"; sha256 = "0yb6ly4s1wdyaf96h2dvifqyb575aid6irwl3qx8gcvrs0xpcxdp"; }) 32 + (fetchNuGet { pname = "Humanizer.Core.hy"; version = "2.11.10"; sha256 = "0b7vaqldn7ca3xi4gkvkhjk900kw2zwb0m0d20bg45a83zdlx79c"; }) 33 + (fetchNuGet { pname = "Humanizer.Core.id"; version = "2.11.10"; sha256 = "1yqxirknwga4j18k7ixwgqxlv20479afanhariy3c5mkwvglsr9b"; }) 34 + (fetchNuGet { pname = "Humanizer.Core.it"; version = "2.11.10"; sha256 = "1skwgj5a6kkx3pm9w4f29psch69h1knmwbkdydlmx13h452p1w4l"; }) 35 + (fetchNuGet { pname = "Humanizer.Core.ja"; version = "2.11.10"; sha256 = "1wpc3yz9v611dqbw8j5yimk8dpz0rvpnls4rmlnp1m47gavpj8x4"; }) 36 + (fetchNuGet { pname = "Humanizer.Core.ko-KR"; version = "2.11.10"; sha256 = "1df0kd7vwdc3inxfkb3wsl1aw3d6vbab99dzh08p4m04g7i2c1a9"; }) 37 + (fetchNuGet { pname = "Humanizer.Core.ku"; version = "2.11.10"; sha256 = "17b66xfgwjr0sffx0hw4c6l90h43z7ffylrs26hgav0n110q2nwg"; }) 38 + (fetchNuGet { pname = "Humanizer.Core.lv"; version = "2.11.10"; sha256 = "0czxx4b9g0w7agykdl82wds09zasa9y58dmgjm925amlfz4wkyzs"; }) 39 + (fetchNuGet { pname = "Humanizer.Core.ms-MY"; version = "2.11.10"; sha256 = "0kix95nbw94fx0dziyz80y59i7ii7d21b63f7f94niarljjq36i3"; }) 40 + (fetchNuGet { pname = "Humanizer.Core.mt"; version = "2.11.10"; sha256 = "1rwy6m22pq65gxn86xlr9lv818fp5kb0wz98zxxfljc2iviw1f4p"; }) 41 + (fetchNuGet { pname = "Humanizer.Core.nb"; version = "2.11.10"; sha256 = "0ra2cl0avvv4sylha7z76jxnb4pdiqfbpr5m477snr04dsjxd9q9"; }) 42 + (fetchNuGet { pname = "Humanizer.Core.nb-NO"; version = "2.11.10"; sha256 = "1qszib03pvmjkrg8za7jjd2vzrs9p4fn2rmy82abnzldkhvifipq"; }) 43 + (fetchNuGet { pname = "Humanizer.Core.nl"; version = "2.11.10"; sha256 = "1i9bvy0i2yyasl9mgxiiwrkmfpm2c53d3wwdp9270r6120sxyy63"; }) 44 + (fetchNuGet { pname = "Humanizer.Core.pl"; version = "2.11.10"; sha256 = "0kggh4wgcic7wzgxy548n6w61schss2ccf9kz8alqshfi42xifby"; }) 45 + (fetchNuGet { pname = "Humanizer.Core.pt"; version = "2.11.10"; sha256 = "09j90s8x1lpvhfiy3syfnj8slkgcacf3xjy3pnkgxa6g4mi4f4bd"; }) 46 + (fetchNuGet { pname = "Humanizer.Core.ro"; version = "2.11.10"; sha256 = "1jgidmqfly91v1k22gn687mfql5bz7gjzp1aapi93vq5x635qssy"; }) 47 + (fetchNuGet { pname = "Humanizer.Core.ru"; version = "2.11.10"; sha256 = "13mmlh0ibxfyc85xrz3vx4mcg56mkzqql184iwdryq94p0g5ahil"; }) 48 + (fetchNuGet { pname = "Humanizer.Core.sk"; version = "2.11.10"; sha256 = "04ja06y5jaz1jwkwn117wx9cib04gpbi0vysn58a8sd5jrxmxai5"; }) 49 + (fetchNuGet { pname = "Humanizer.Core.sl"; version = "2.11.10"; sha256 = "05hxk9v3a7fn7s4g9jp5zxk2z6a33b9fkavyb1hjqnl2i37q2wja"; }) 50 + (fetchNuGet { pname = "Humanizer.Core.sr"; version = "2.11.10"; sha256 = "0x6l2msimrx72iywa1g0rqklgy209sdwg0r77i2lz0s1rvk5klm5"; }) 51 + (fetchNuGet { pname = "Humanizer.Core.sr-Latn"; version = "2.11.10"; sha256 = "01hdyn7mmbyy7f3aglawgnsj3nblcdpqjgzdcvniy73l536mira0"; }) 52 + (fetchNuGet { pname = "Humanizer.Core.sv"; version = "2.11.10"; sha256 = "0cbgchivw3d5ndib1zmgzmnymhyvfh9g9f0hijc860g5vaa9fkvh"; }) 53 + (fetchNuGet { pname = "Humanizer.Core.th-TH"; version = "2.11.10"; sha256 = "1v7f9x3b04iwhz9lb3ir8az8128nvcw1gi4park5zh3fg0f3mni0"; }) 54 + (fetchNuGet { pname = "Humanizer.Core.tr"; version = "2.11.10"; sha256 = "02c4ky0dskxkdrkc7vy8yzmvwjr1wqll1kzx0k21afhlx8xynjd4"; }) 55 + (fetchNuGet { pname = "Humanizer.Core.uk"; version = "2.11.10"; sha256 = "0900ilhwj8yvhyzpg1pjr7f5vrl62wp8dsnhk4c2igs20qvnv079"; }) 56 + (fetchNuGet { pname = "Humanizer.Core.uz-Cyrl-UZ"; version = "2.11.10"; sha256 = "09b7p2m8y49j49ckrmx2difgyj6y7fm2mwca093j8psxclsykcyr"; }) 57 + (fetchNuGet { pname = "Humanizer.Core.uz-Latn-UZ"; version = "2.11.10"; sha256 = "029kvkawqhlln52vpjpvr52dhr18ylk01cgsj2z8lxnqaka0q9hk"; }) 58 + (fetchNuGet { pname = "Humanizer.Core.vi"; version = "2.11.10"; sha256 = "0q4d47plsj956ivn82qwyidfxppjr9dp13m8c66aamrvhy4q8ny5"; }) 59 + (fetchNuGet { pname = "Humanizer.Core.zh-CN"; version = "2.11.10"; sha256 = "01dy5kf6ai8id77px92ji4kcxjc8haj39ivv55xy1afcg3qiy7mh"; }) 60 + (fetchNuGet { pname = "Humanizer.Core.zh-Hans"; version = "2.11.10"; sha256 = "16gcxgw2g6gck3nc2hxzlkbsg7wkfaqsjl87kasibxxh47zdqqv2"; }) 61 + (fetchNuGet { pname = "Humanizer.Core.zh-Hant"; version = "2.11.10"; sha256 = "1rjg2xvkwjjw3c7z9mdjjvbnl9lcvvhh4fr7l61rla2ynzdk46cj"; }) 62 + (fetchNuGet { pname = "Markdig"; version = "0.26.0"; sha256 = "1pg0yica8h1c2kx10pqzc5iclmlfll5wbw1bxa8l251w1qnfglv2"; }) 63 + (fetchNuGet { pname = "McMaster.Extensions.CommandLineUtils"; version = "2.5.0"; sha256 = "010vqyg5mb3cjzxznawxz7wvidj1yv664xgz93vf1zrww5vz6aal"; }) 64 + (fetchNuGet { pname = "Microsoft.AspNetCore.Mvc.Razor.Extensions"; version = "3.1.18"; sha256 = "0s168gac3g8666pllnmjdbq1v981qgc1wqypyl6pp92jvzvkndp6"; }) 65 + (fetchNuGet { pname = "Microsoft.AspNetCore.Mvc.Razor.RuntimeCompilation"; version = "3.1.18"; sha256 = "0069qv17rapqhp2hjzzqim5zxb6clmr9bj4vmfd2pm4byp215flj"; }) 66 + (fetchNuGet { pname = "Microsoft.AspNetCore.Razor.Language"; version = "3.1.18"; sha256 = "0rm6a5hsj4d2a1nlzfb34bm5z7wr826zg25xfbg51a3zvbgva9m7"; }) 67 + (fetchNuGet { pname = "Microsoft.Azure.Cosmos.Table"; version = "1.0.0"; sha256 = "0ms3nkifj3j7i1h6bxw49fha2iamxdxkzi51q37n0czcszx36apg"; }) 68 + (fetchNuGet { pname = "Microsoft.Azure.DocumentDB.Core"; version = "2.1.3"; sha256 = "017jq5a5ba4wmrrfr7daa07asnjl8xgvncgxlcyy83mln0xm67a5"; }) 69 + (fetchNuGet { pname = "Microsoft.Azure.KeyVault.Core"; version = "2.0.4"; sha256 = "0rv7z989zxk5myqd4n2a9ccxx9jr4jb3fslc6b4w3p0570af60hn"; }) 70 + (fetchNuGet { pname = "Microsoft.Azure.Search"; version = "5.0.1"; sha256 = "1xpwgcwahflrq5qa2acn0y5x1660qlh5iy0xmn6bisf9pbs6g7hr"; }) 71 + (fetchNuGet { pname = "Microsoft.Azure.Search.Common"; version = "5.0.1"; sha256 = "1ybbvm3iyi7r6v6j19jb16lqlq3am51wg68mzk3jdflk5czn28p7"; }) 72 + (fetchNuGet { pname = "Microsoft.Azure.Search.Data"; version = "5.0.1"; sha256 = "05skk65y8miwjzwvrr5br94byqipygi3mccl9x5wzbxqdhma7chq"; }) 73 + (fetchNuGet { pname = "Microsoft.Azure.Search.Service"; version = "5.0.1"; sha256 = "00767bbdi1zxb3vvw8k4666iv7wfb3fyxcligrin04qn9spjd2h7"; }) 74 + (fetchNuGet { pname = "Microsoft.Azure.Storage.Blob"; version = "9.4.1"; sha256 = "11273cf1a6rir6z016sa8r8jmrxc66zyhicciyyzanph6jwdfbf6"; }) 75 + (fetchNuGet { pname = "Microsoft.Azure.Storage.Common"; version = "9.4.1"; sha256 = "0kwrsfw0g8bciy53qrmgff8b8ik8wgn92szx0hdnvaqnv5dphsij"; }) 76 + (fetchNuGet { pname = "Microsoft.Bcl.AsyncInterfaces"; version = "1.0.0"; sha256 = "00dx5armvkqjxvkldz3invdlck9nj7w21dlsr2aqp1rqbyrbsbbh"; }) 77 + (fetchNuGet { pname = "Microsoft.Bcl.AsyncInterfaces"; version = "1.1.0"; sha256 = "1dq5yw7cy6s42193yl4iqscfw5vzkjkgv0zyy32scr4jza6ni1a1"; }) 78 + (fetchNuGet { pname = "Microsoft.Bcl.AsyncInterfaces"; version = "1.1.1"; sha256 = "0a1ahssqds2ympr7s4xcxv5y8jgxs7ahd6ah6fbgglj4rki1f1vw"; }) 79 + (fetchNuGet { pname = "Microsoft.Bcl.HashCode"; version = "1.1.0"; sha256 = "1ggsadahlp76zcn1plapszd5v5ja8rh479fwrahqd3knql4dfnr0"; }) 80 + (fetchNuGet { pname = "Microsoft.Bcl.HashCode"; version = "1.1.1"; sha256 = "0xwfph92p92d8hgrdiaka4cazqsjpg4ywfxfx6qbk3939f29kzl0"; }) 81 + (fetchNuGet { pname = "Microsoft.Build.Tasks.Git"; version = "1.0.0"; sha256 = "0avwja8vk56f2kr2pmrqx3h60bnwbs7ds062lhvhcxv87m5yfqnj"; }) 82 + (fetchNuGet { pname = "Microsoft.CodeAnalysis.Analyzers"; version = "2.9.3"; sha256 = "1kskwc9gyd2sx3zwx52qwfsl7s0xhaclmlnxvjsb4jgvpydv3xii"; }) 83 + (fetchNuGet { pname = "Microsoft.CodeAnalysis.Common"; version = "3.3.0"; sha256 = "1vwhsp3pjgcfnpapkps9a3z9n2ryiv5bbhzycfljngj5grj63rg2"; }) 84 + (fetchNuGet { pname = "Microsoft.CodeAnalysis.CSharp"; version = "3.3.0"; sha256 = "09nmd5h1r2q0dwp1dfpn4anvs8sfi3rwcgpcv28lrhky8vc51424"; }) 85 + (fetchNuGet { pname = "Microsoft.CodeAnalysis.Razor"; version = "3.1.18"; sha256 = "1fa10n15mifbwq2yilpkmag6apaix1nxb643306a4cmcjvr9nvp1"; }) 86 + (fetchNuGet { pname = "Microsoft.CSharp"; version = "4.0.1"; sha256 = "0zxc0apx1gcx361jlq8smc9pfdgmyjh6hpka8dypc9w23nlsh6yj"; }) 87 + (fetchNuGet { pname = "Microsoft.CSharp"; version = "4.3.0"; sha256 = "0gw297dgkh0al1zxvgvncqs0j15lsna9l1wpqas4rflmys440xvb"; }) 88 + (fetchNuGet { pname = "Microsoft.CSharp"; version = "4.5.0"; sha256 = "01i28nvzccxbqmiz217fxs6hnjwmd5fafs37rd49a6qp53y6623l"; }) 89 + (fetchNuGet { pname = "Microsoft.CSharp"; version = "4.7.0"; sha256 = "0gd67zlw554j098kabg887b5a6pq9kzavpa3jjy5w53ccjzjfy8j"; }) 90 + (fetchNuGet { pname = "Microsoft.Data.SqlClient"; version = "1.1.3"; sha256 = "18mfc77xbi84iga9zrh227hl3jv7p0mbarxvz4qrws0fknsbx4r9"; }) 91 + (fetchNuGet { pname = "Microsoft.Data.Sqlite.Core"; version = "3.1.18"; sha256 = "1vh9jjpgqr33kyp72n7k6xkqsd0q978p84lf54rm50krlkx31q0h"; }) 92 + (fetchNuGet { pname = "Microsoft.DotNet.PlatformAbstractions"; version = "3.1.6"; sha256 = "0b9myd7gqbpaw9pkd2bx45jhik9mwj0f1ss57sk2cxmag2lkdws5"; }) 93 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore"; version = "3.1.0"; sha256 = "1l12lsk1xfrv5pjnm0b9w9kncgdh0pcjcbxl4zrsg82s7bs7dhda"; }) 94 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore"; version = "3.1.18"; sha256 = "1y3g71d2i3azsnb995379rspchhbr1ivi1b1kfm0gx8swrp1j1wy"; }) 95 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore"; version = "3.1.1"; sha256 = "1ymnxrd79fx4q3aq0d7m8dpx4gyqkbjm960knm4yd3889mlxkish"; }) 96 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Abstractions"; version = "3.1.0"; sha256 = "1bd6hilnwp47z3l14qspdxi5f5nhv6rivarc6w8wil425bq0h3pd"; }) 97 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Abstractions"; version = "3.1.18"; sha256 = "0d00d6wx2mm5bav39bjsikjq0sx6qmp183dbwimfda7wav2bwya8"; }) 98 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Abstractions"; version = "3.1.1"; sha256 = "0ddjfxp7k5jgk1fmzjcfxiijcf59mpi5y9lvcr7ly7dhkpx2gsg8"; }) 99 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Analyzers"; version = "3.1.0"; sha256 = "1pjn4wwhxgsiap7byld114kx6m0nm6696r8drspqic7lskm4y305"; }) 100 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Analyzers"; version = "3.1.18"; sha256 = "10h1w3lv3gxcf24hhy5av4fvdjxdm2iimzp7kz9zh9cm1jg5n0vl"; }) 101 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Analyzers"; version = "3.1.1"; sha256 = "0vh2i1wc8514wa5brspn53sa2l034cpjswsvi0d84dnb04aw3b4b"; }) 102 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Design"; version = "3.1.18"; sha256 = "0vfn4kni1sgcw8js60gc4cs3g6chfw1mar2jz07bvgjv8wxlv7qw"; }) 103 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Relational"; version = "3.1.0"; sha256 = "0javqw6c27ppcysigjvcjcw3mk0gg1pv2pmwfpvvryr1pb4a9n55"; }) 104 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Relational"; version = "3.1.18"; sha256 = "0mlq9gmxrmix68mdh0lv803cx15lzrhs5d9622vj8wwdlngg3xdx"; }) 105 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Relational"; version = "3.1.1"; sha256 = "1qzw1rd5isa45xbyyq9vg2p04rnbfb2dinfllaaf7qaxy7mhxv65"; }) 106 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Sqlite"; version = "3.1.18"; sha256 = "0fs2900masv6j7j8n4kc05n2g55k7cgkhfkp5vb9pn7s2aw90kzi"; }) 107 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.Sqlite.Core"; version = "3.1.18"; sha256 = "1m6v8g8jacrsfdl3i5q82g3k9y4wb2r3fh739ih66nlv9jbb81q6"; }) 108 + (fetchNuGet { pname = "Microsoft.EntityFrameworkCore.SqlServer"; version = "3.1.18"; sha256 = "08slvfh5p06rwr1n93x44ka54f5qcnkc5b0qig887dxy4yl3kiwk"; }) 109 + (fetchNuGet { pname = "Microsoft.Extensions.Caching.Abstractions"; version = "3.1.0"; sha256 = "0j5m2a48rwyzzvbz0hpr2md35iv78b86zyqjnrjq0y4vb7sairc0"; }) 110 + (fetchNuGet { pname = "Microsoft.Extensions.Caching.Abstractions"; version = "3.1.18"; sha256 = "0qb3csiz02mh85x1yv0wh6x0c4c9d7kml5nhs9n6z0mykpfybqpc"; }) 111 + (fetchNuGet { pname = "Microsoft.Extensions.Caching.Abstractions"; version = "3.1.1"; sha256 = "1m303nrhcjydw8ij3fmf1w8zxpli84l6k1d4ml56yrpc1n6zxmjq"; }) 112 + (fetchNuGet { pname = "Microsoft.Extensions.Caching.Memory"; version = "3.1.0"; sha256 = "1hi61647apn25kqjcb37nqafp8fikymdrk43j3kxjbwwwx507jy1"; }) 113 + (fetchNuGet { pname = "Microsoft.Extensions.Caching.Memory"; version = "3.1.18"; sha256 = "0fdnk16nas3gdkcjqiq3h0rkqv6ajvbp7lvrssa21av258wnvm3w"; }) 114 + (fetchNuGet { pname = "Microsoft.Extensions.Caching.Memory"; version = "3.1.1"; sha256 = "0nyq1iwjql9w2w83sjimsry8chl53372rbvq9jwng3mdzv9qzni4"; }) 115 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration"; version = "3.1.0"; sha256 = "1rszgz0rd5kvib5fscz6ss3pkxyjwqy0xpd4f2ypgzf5z5g5d398"; }) 116 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration"; version = "3.1.18"; sha256 = "0fpvm1h9n0vib4fwvvify2zkc8yzgg8p2qbqrqlp5fd3ppqivjqh"; }) 117 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration"; version = "3.1.1"; sha256 = "1dmhci4qlwqmfgya02yi02xzv31v8g45mq1c4ffigs8jq8qn4f77"; }) 118 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration.Abstractions"; version = "3.1.0"; sha256 = "1f7h52kamljglx5k08ccryilvk6d6cvr9c26lcb6b2c091znzk0q"; }) 119 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration.Abstractions"; version = "3.1.18"; sha256 = "1aycn9rwfygdaw5wnb68ql96sb6midm6mj4742dcl9ibkrgks43w"; }) 120 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration.Abstractions"; version = "3.1.1"; sha256 = "1a1bixlm8wxf2fsr67qdm7k6p441sx2sfjpcjd3rm5df2v2y9zbv"; }) 121 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration.Binder"; version = "3.1.0"; sha256 = "13jj7jxihiswmhmql7r5jydbca4x5qj6h7zq10z17gagys6dc7pw"; }) 122 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration.Binder"; version = "3.1.18"; sha256 = "1bxcqfh75xypiqq2ljf1rwy7yq58a07g9g12jnlh4x7xba9xd4j0"; }) 123 + (fetchNuGet { pname = "Microsoft.Extensions.Configuration.Binder"; version = "3.1.1"; sha256 = "1brd1cxhkp5cg2wfkjkkyyvkzi4mdzyjafq94rbndzcxn9gxvz39"; }) 124 + (fetchNuGet { pname = "Microsoft.Extensions.DependencyInjection"; version = "3.1.0"; sha256 = "1xc61dy07bn2q73mx1z3ylrw80xpa682qjby13gklnqq636a3gab"; }) 125 + (fetchNuGet { pname = "Microsoft.Extensions.DependencyInjection"; version = "3.1.18"; sha256 = "0r8fs4pax5pyfny3ppav4v4by3l7r0xpkax9gvq91w3pzvlfvriz"; }) 126 + (fetchNuGet { pname = "Microsoft.Extensions.DependencyInjection"; version = "3.1.1"; sha256 = "01x8a8djyxcqv3fhp1q647b9y720xbbp1922vw9by4zh8f0lzs2w"; }) 127 + (fetchNuGet { pname = "Microsoft.Extensions.DependencyInjection.Abstractions"; version = "3.1.0"; sha256 = "1pvms778xkyv1a3gfwrxnh8ja769cxi416n7pcidn9wvg15ifvbh"; }) 128 + (fetchNuGet { pname = "Microsoft.Extensions.DependencyInjection.Abstractions"; version = "3.1.18"; sha256 = "0kvxyhhs5k7xx51ihc8hppbzpcn34bdzmnp42gy2m359wl3iq0c3"; }) 129 + (fetchNuGet { pname = "Microsoft.Extensions.DependencyInjection.Abstractions"; version = "3.1.1"; sha256 = "1k6k6h00p9hpr9jjq5vy4zwn9ggzldzm97gwjil6hpr3kxawb37n"; }) 130 + (fetchNuGet { pname = "Microsoft.Extensions.DependencyModel"; version = "3.1.6"; sha256 = "13m2na8a5mglbbjjp0dxb8ifkf23grkyk1g8585mr7v6cbj098ac"; }) 131 + (fetchNuGet { pname = "Microsoft.Extensions.Logging"; version = "3.1.0"; sha256 = "1d3yhqj1rav7vswm747j7w8fh8paybji4rz941hhlq4b12mfqfh4"; }) 132 + (fetchNuGet { pname = "Microsoft.Extensions.Logging"; version = "3.1.18"; sha256 = "0llw82p6crp0329n3rsyrqka21c3dqyjk8lbk25y5848vzi0bzbv"; }) 133 + (fetchNuGet { pname = "Microsoft.Extensions.Logging"; version = "3.1.1"; sha256 = "1y78bn463mrl8vy7iwafrmq4x0vg4pqjd3xaiznfg9lpxjgjl9j3"; }) 134 + (fetchNuGet { pname = "Microsoft.Extensions.Logging.Abstractions"; version = "3.1.0"; sha256 = "1zyalrcksszmn9r5xjnirfh7847axncgzxkk3k5srbvlcch8fw8g"; }) 135 + (fetchNuGet { pname = "Microsoft.Extensions.Logging.Abstractions"; version = "3.1.18"; sha256 = "0pq1kw77zz9ygcdw87wxd1rkcij084jj1cgp6p4b8zpl0a73ba6b"; }) 136 + (fetchNuGet { pname = "Microsoft.Extensions.Logging.Abstractions"; version = "3.1.1"; sha256 = "0pyk6g2qs1lrjhj1qz4bqbqpbmbgqlah1b6ynlvv5bdsrb7157zf"; }) 137 + (fetchNuGet { pname = "Microsoft.Extensions.Options"; version = "3.1.0"; sha256 = "0akccwhpn93a4qrssyb3rszdsp3j4p9hlxbsb7yhqb78xydaqhyh"; }) 138 + (fetchNuGet { pname = "Microsoft.Extensions.Options"; version = "3.1.18"; sha256 = "0iv79m9grl28b5zcng14v5nrgic3rgy74ws9l92fw2f194qbdy6h"; }) 139 + (fetchNuGet { pname = "Microsoft.Extensions.Options"; version = "3.1.1"; sha256 = "15iik4hqm5ywzv9lvlfqk6d7drgdm87h6x9gliy9ks6snyhbnpb3"; }) 140 + (fetchNuGet { pname = "Microsoft.Extensions.Options.ConfigurationExtensions"; version = "3.1.18"; sha256 = "0id3s26s7grlzfvqmknz3ir7agns680ad8d0kv6mr9dfrqj6ca1l"; }) 141 + (fetchNuGet { pname = "Microsoft.Extensions.PlatformAbstractions"; version = "1.1.0"; sha256 = "0r4j8v2vvp3kalvb11ny9cvpls3nrvqj0c81rxbkh99ynd2dbscp"; }) 142 + (fetchNuGet { pname = "Microsoft.Extensions.Primitives"; version = "3.1.0"; sha256 = "1w1y22njywwysi8qjnj4m83qhbq0jr4mmjib0hfawz6cwamh7xrb"; }) 143 + (fetchNuGet { pname = "Microsoft.Extensions.Primitives"; version = "3.1.18"; sha256 = "1xcwb09acn6w3jv3s0bp0f7q9vq3rzp7cg2jhbn3a9h9pzk8haa2"; }) 144 + (fetchNuGet { pname = "Microsoft.Extensions.Primitives"; version = "3.1.1"; sha256 = "07rkb1xl7y59qjg9j3bms0fi09gmjrf9f4ipckxlx64k8ciilw9f"; }) 145 + (fetchNuGet { pname = "Microsoft.Identity.Client"; version = "3.0.8"; sha256 = "0g7j08fqk8svch31jg0vg32chgmxgbsin0i85whsd42hkjd4l8lg"; }) 146 + (fetchNuGet { pname = "Microsoft.IdentityModel.JsonWebTokens"; version = "5.5.0"; sha256 = "0ahkybdfiwnj5h25j5x2dylz3wfg2194cgqmsiqkaz93gbqibyw0"; }) 147 + (fetchNuGet { pname = "Microsoft.IdentityModel.Logging"; version = "5.5.0"; sha256 = "1a3bvzaas5d653l0yphl95xclj4yvdz5v08g0psj9i137yncn639"; }) 148 + (fetchNuGet { pname = "Microsoft.IdentityModel.Protocols"; version = "5.5.0"; sha256 = "029i1fz9y5gzrh68364ga1wm7gmk4h58lkdp5g77rsxa24rhshpl"; }) 149 + (fetchNuGet { pname = "Microsoft.IdentityModel.Protocols.OpenIdConnect"; version = "5.5.0"; sha256 = "0hxh6j4z1ha7r0pnh9lnnx54h6s3lkj0dv99n2h5pcsk0pbx91kf"; }) 150 + (fetchNuGet { pname = "Microsoft.IdentityModel.Tokens"; version = "5.5.0"; sha256 = "1ixdbn6ia6df4qqg89ihcmjz5jjnp9jjcdjifqzaccy37bvxk8dj"; }) 151 + (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "1.0.1"; sha256 = "01al6cfxp68dscl15z7rxfw9zvhm64dncsw09a1vmdkacsa2v6lr"; }) 152 + (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "1.1.0"; sha256 = "08vh1r12g6ykjygq5d3vq09zylgb84l63k49jc4v8faw9g93iqqm"; }) 153 + (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "2.0.0"; sha256 = "1fk2fk2639i7nzy58m9dvpdnzql4vb8yl8vr19r2fp8lmj9w2jr0"; }) 154 + (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "2.1.2"; sha256 = "1507hnpr9my3z4w1r6xk5n0s1j3y6a2c2cnynj76za7cphxi1141"; }) 155 + (fetchNuGet { pname = "Microsoft.NETCore.Targets"; version = "1.0.1"; sha256 = "0ppdkwy6s9p7x9jix3v4402wb171cdiibq7js7i13nxpdky7074p"; }) 156 + (fetchNuGet { pname = "Microsoft.NETCore.Targets"; version = "1.1.0"; sha256 = "193xwf33fbm0ni3idxzbr5fdq3i2dlfgihsac9jj7whj0gd902nh"; }) 157 + (fetchNuGet { pname = "Microsoft.OData.Core"; version = "7.5.0"; sha256 = "0xl3pl7433w2qdcdqnizmwpzavsbip5fv2izw583b99zbyhjxzmx"; }) 158 + (fetchNuGet { pname = "Microsoft.OData.Edm"; version = "7.5.0"; sha256 = "1xsab22g60q04dscnvswzhjig5ydly37kq205dsk4jm4b1df9dip"; }) 159 + (fetchNuGet { pname = "Microsoft.Rest.ClientRuntime"; version = "2.3.11"; sha256 = "0iqxxyiyi057c92nlf2aiva59c13bhg93w2gp0qh0777gb750hbx"; }) 160 + (fetchNuGet { pname = "Microsoft.Rest.ClientRuntime.Azure"; version = "3.3.12"; sha256 = "01r0swv029wwxn1h4paqlyc4chmqg04wi2h0h74bh7lcgjsm9qb1"; }) 161 + (fetchNuGet { pname = "Microsoft.SourceLink.Common"; version = "1.0.0"; sha256 = "1zxkpx01zdv17c39iiy8fx25ran89n14qwddh1f140v1s4dn8z9c"; }) 162 + (fetchNuGet { pname = "Microsoft.SourceLink.GitHub"; version = "1.0.0"; sha256 = "029ixyaqn48cjza87m5qf0g1ynyhlm6irgbx1n09src9g666yhpd"; }) 163 + (fetchNuGet { pname = "Microsoft.Spatial"; version = "7.2.0"; sha256 = "15a2lv7305729mdffh6r2qff5c1dk9b0w5a60kclw1a580vipzk2"; }) 164 + (fetchNuGet { pname = "Microsoft.Spatial"; version = "7.5.0"; sha256 = "1zxjy5f4bksgf0ilgrqhxpy5g1nzbz54pcp9dx0smvc9yqlacy97"; }) 165 + (fetchNuGet { pname = "Microsoft.Win32.Primitives"; version = "4.0.1"; sha256 = "1n8ap0cmljbqskxpf8fjzn7kh1vvlndsa75k01qig26mbw97k2q7"; }) 166 + (fetchNuGet { pname = "Microsoft.Win32.Primitives"; version = "4.3.0"; sha256 = "0j0c1wj4ndj21zsgivsc24whiya605603kxrbiw6wkfdync464wq"; }) 167 + (fetchNuGet { pname = "Microsoft.Win32.Registry"; version = "4.5.0"; sha256 = "1zapbz161ji8h82xiajgriq6zgzmb1f3ar517p2h63plhsq5gh2q"; }) 168 + (fetchNuGet { pname = "MySqlConnector"; version = "0.61.0"; sha256 = "0b0mc41dsih4p1ky3kcmibsz4bw14w439nraq5732wjfkq2sqdxg"; }) 169 + (fetchNuGet { pname = "NETStandard.Library"; version = "2.0.3"; sha256 = "1fn9fxppfcg4jgypp2pmrpr6awl3qz1xmnri0cygpkwvyx27df1y"; }) 170 + (fetchNuGet { pname = "Newtonsoft.Json"; version = "10.0.1"; sha256 = "15ncqic3p2rzs8q8ppi0irl2miq75kilw4lh8yfgjq96id0ds3hv"; }) 171 + (fetchNuGet { pname = "Newtonsoft.Json"; version = "10.0.2"; sha256 = "03zb1k50mgzvznp9sfv371fdvx82bqpgq99dj61paan8a30prj6y"; }) 172 + (fetchNuGet { pname = "Newtonsoft.Json"; version = "11.0.2"; sha256 = "1784xi44f4k8v1fr696hsccmwpy94bz7kixxqlri98zhcxn406b2"; }) 173 + (fetchNuGet { pname = "Newtonsoft.Json"; version = "9.0.1"; sha256 = "0mcy0i7pnfpqm4pcaiyzzji4g0c8i3a5gjz28rrr28110np8304r"; }) 174 + (fetchNuGet { pname = "Npgsql"; version = "4.1.3"; sha256 = "08515af6g0d8v1d2r493xdxc74y1bg8ngbhck0wq4jhh109ndg97"; }) 175 + (fetchNuGet { pname = "Npgsql.EntityFrameworkCore.PostgreSQL"; version = "3.1.1.2"; sha256 = "0ng4cyzmbh1x8jshx55x3h5azif4zb3v4d3n3sxkqavbq8j2phhs"; }) 176 + (fetchNuGet { pname = "NuGet.Common"; version = "5.10.0"; sha256 = "0qy6blgppgvxpfcricmvva3qzddk18dza5vy851jrbqshvf9g7kx"; }) 177 + (fetchNuGet { pname = "NuGet.Configuration"; version = "5.10.0"; sha256 = "0xb1n94lrwa6k83i9xcsq68202086p2gj74gzlbhlvb8c2pw6lbb"; }) 178 + (fetchNuGet { pname = "NuGet.Frameworks"; version = "5.10.0"; sha256 = "0gb6n8rg2jpjp52icgpb3wjdfs3qllh5vbcz8hbcix3l7dncy3v2"; }) 179 + (fetchNuGet { pname = "NuGet.Packaging"; version = "5.10.0"; sha256 = "11g0v061axhp0nisclq5cm2mc92d69z92giz9l40ih478c5nishw"; }) 180 + (fetchNuGet { pname = "NuGet.Protocol"; version = "5.10.0"; sha256 = "0cs9qp169zx6g2w5bzrlhxv0q1i8mb8dxlb2nkiq7pkvah86rxkc"; }) 181 + (fetchNuGet { pname = "NuGet.Versioning"; version = "5.10.0"; sha256 = "10vvw6vjpx0c26rlxh7dnpyp4prahn25717ccd8bzkjmyzhm90cs"; }) 182 + (fetchNuGet { pname = "Pomelo.EntityFrameworkCore.MySql"; version = "3.1.0"; sha256 = "0a8ysdwsa0kds5zbfmcdnk8imaqf2hisjms951h1smnlnii9kyds"; }) 183 + (fetchNuGet { pname = "Pomelo.JsonObject"; version = "2.2.1"; sha256 = "1w6s9wjbsyvq8cnqknkdzm9chnv0g5gcsrq5i94zp6br9vg7c627"; }) 184 + (fetchNuGet { pname = "runtime.debian.8-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "16rnxzpk5dpbbl1x354yrlsbvwylrq456xzpsha1n9y3glnhyx9d"; }) 185 + (fetchNuGet { pname = "runtime.debian.8-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "0rwpqngkqiapqc5c2cpkj7idhngrgss5qpnqg0yh40mbyflcxf8i"; }) 186 + (fetchNuGet { pname = "runtime.fedora.23-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0hkg03sgm2wyq8nqk6dbm9jh5vcq57ry42lkqdmfklrw89lsmr59"; }) 187 + (fetchNuGet { pname = "runtime.fedora.23-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1n06gxwlinhs0w7s8a94r1q3lwqzvynxwd3mp10ws9bg6gck8n4r"; }) 188 + (fetchNuGet { pname = "runtime.fedora.24-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0c2p354hjx58xhhz7wv6div8xpi90sc6ibdm40qin21bvi7ymcaa"; }) 189 + (fetchNuGet { pname = "runtime.fedora.24-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "0404wqrc7f2yc0wxv71y3nnybvqx8v4j9d47hlscxy759a525mc3"; }) 190 + (fetchNuGet { pname = "runtime.native.System"; version = "4.0.0"; sha256 = "1ppk69xk59ggacj9n7g6fyxvzmk1g5p4fkijm0d7xqfkig98qrkf"; }) 191 + (fetchNuGet { pname = "runtime.native.System"; version = "4.3.0"; sha256 = "15hgf6zaq9b8br2wi1i3x0zvmk410nlmsmva9p0bbg73v6hml5k4"; }) 192 + (fetchNuGet { pname = "runtime.native.System.Data.SqlClient.sni"; version = "4.4.0"; sha256 = "15wnpyy506q3vyk1yzdjjf49zpdynr7ghh0x5fbz4pcc1if0p9ky"; }) 193 + (fetchNuGet { pname = "runtime.native.System.Net.Http"; version = "4.0.1"; sha256 = "1hgv2bmbaskx77v8glh7waxws973jn4ah35zysnkxmf0196sfxg6"; }) 194 + (fetchNuGet { pname = "runtime.native.System.Net.Http"; version = "4.3.0"; sha256 = "1n6rgz5132lcibbch1qlf0g9jk60r0kqv087hxc0lisy50zpm7kk"; }) 195 + (fetchNuGet { pname = "runtime.native.System.Net.Security"; version = "4.3.0"; sha256 = "0dnqjhw445ay3chpia9p6vy4w2j6s9vy3hxszqvdanpvvyaxijr3"; }) 196 + (fetchNuGet { pname = "runtime.native.System.Security.Cryptography"; version = "4.0.0"; sha256 = "0k57aa2c3b10wl3hfqbgrl7xq7g8hh3a3ir44b31dn5p61iiw3z9"; }) 197 + (fetchNuGet { pname = "runtime.native.System.Security.Cryptography.Apple"; version = "4.3.0"; sha256 = "1b61p6gw1m02cc1ry996fl49liiwky6181dzr873g9ds92zl326q"; }) 198 + (fetchNuGet { pname = "runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "18pzfdlwsg2nb1jjjjzyb5qlgy6xjxzmhnfaijq5s2jw3cm3ab97"; }) 199 + (fetchNuGet { pname = "runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "0zy5r25jppz48i2bkg8b9lfig24xixg6nm3xyr1379zdnqnpm8f6"; }) 200 + (fetchNuGet { pname = "runtime.opensuse.13.2-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0qyynf9nz5i7pc26cwhgi8j62ps27sqmf78ijcfgzab50z9g8ay3"; }) 201 + (fetchNuGet { pname = "runtime.opensuse.13.2-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "096ch4n4s8k82xga80lfmpimpzahd2ip1mgwdqgar0ywbbl6x438"; }) 202 + (fetchNuGet { pname = "runtime.opensuse.42.1-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "1klrs545awhayryma6l7g2pvnp9xy4z0r1i40r80zb45q3i9nbyf"; }) 203 + (fetchNuGet { pname = "runtime.opensuse.42.1-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1dm8fifl7rf1gy7lnwln78ch4rw54g0pl5g1c189vawavll7p6rj"; }) 204 + (fetchNuGet { pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.Apple"; version = "4.3.0"; sha256 = "10yc8jdrwgcl44b4g93f1ds76b176bajd3zqi2faf5rvh1vy9smi"; }) 205 + (fetchNuGet { pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0zcxjv5pckplvkg0r6mw3asggm7aqzbdjimhvsasb0cgm59x09l3"; }) 206 + (fetchNuGet { pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1m9z1k9kzva9n9kwinqxl97x2vgl79qhqjlv17k9s2ymcyv2bwr6"; }) 207 + (fetchNuGet { pname = "runtime.rhel.7-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0vhynn79ih7hw7cwjazn87rm9z9fj0rvxgzlab36jybgcpcgphsn"; }) 208 + (fetchNuGet { pname = "runtime.rhel.7-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1cpx56mcfxz7cpn57wvj18sjisvzq8b5vd9rw16ihd2i6mcp3wa1"; }) 209 + (fetchNuGet { pname = "runtime.ubuntu.14.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "160p68l2c7cqmyqjwxydcvgw7lvl1cr0znkw8fp24d1by9mqc8p3"; }) 210 + (fetchNuGet { pname = "runtime.ubuntu.14.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "15gsm1a8jdmgmf8j5v1slfz8ks124nfdhk2vxs2rw3asrxalg8hi"; }) 211 + (fetchNuGet { pname = "runtime.ubuntu.16.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "15zrc8fgd8zx28hdghcj5f5i34wf3l6bq5177075m2bc2j34jrqy"; }) 212 + (fetchNuGet { pname = "runtime.ubuntu.16.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "0q0n5q1r1wnqmr5i5idsrd9ywl33k0js4pngkwq9p368mbxp8x1w"; }) 213 + (fetchNuGet { pname = "runtime.ubuntu.16.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "1p4dgxax6p7rlgj4q73k73rslcnz4wdcv8q2flg1s8ygwcm58ld5"; }) 214 + (fetchNuGet { pname = "runtime.ubuntu.16.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1x0g58pbpjrmj2x2qw17rdwwnrcl0wvim2hdwz48lixvwvp22n9c"; }) 215 + (fetchNuGet { pname = "runtime.win-arm64.runtime.native.System.Data.SqlClient.sni"; version = "4.4.0"; sha256 = "07byf1iyqb7jkb17sp0mmjk46fwq6fx8mlpzywxl7qk09sma44gk"; }) 216 + (fetchNuGet { pname = "runtime.win-x64.runtime.native.System.Data.SqlClient.sni"; version = "4.4.0"; sha256 = "0167s4mpq8bzk3y11pylnynzjr2nc84w96al9x4l8yrf34ccm18y"; }) 217 + (fetchNuGet { pname = "runtime.win-x86.runtime.native.System.Data.SqlClient.sni"; version = "4.4.0"; sha256 = "0k3rkfrlm9jjz56dra61jgxinb8zsqlqzik2sjwz7f8v6z6ddycc"; }) 218 + (fetchNuGet { pname = "SQLitePCLRaw.bundle_e_sqlite3"; version = "2.0.2"; sha256 = "00p7n7ndmmh45fhhd3clb11igpzklm1n7r50sdrgnbi5yifv1lxl"; }) 219 + (fetchNuGet { pname = "SQLitePCLRaw.core"; version = "2.0.2"; sha256 = "11mnbnsiirpgmilskqh1issvgzgg08ndq3p3nkrw73hyqr7kl958"; }) 220 + (fetchNuGet { pname = "SQLitePCLRaw.lib.e_sqlite3"; version = "2.0.2"; sha256 = "0967w6r6n94hj0fma3kidb9fx1m2p3fgrw6gpsy6q6jbb33qw6vj"; }) 221 + (fetchNuGet { pname = "SQLitePCLRaw.provider.dynamic_cdecl"; version = "2.0.2"; sha256 = "1lzs8yfjygrwfm3hjmkhnbnpsjzq53ijwx9whmii2r9kjg2a46if"; }) 222 + (fetchNuGet { pname = "SQLitePCLRaw.provider.e_sqlite3"; version = "2.0.2"; sha256 = "0ak8jlkva1mnmvyvwhk9zmc4c5b08n4a7l8g9g5mj3ly161hfzm6"; }) 223 + (fetchNuGet { pname = "System.Buffers"; version = "4.4.0"; sha256 = "183f8063w8zqn99pv0ni0nnwh7fgx46qzxamwnans55hhs2l0g19"; }) 224 + (fetchNuGet { pname = "System.Buffers"; version = "4.5.0"; sha256 = "1ywfqn4md6g3iilpxjn5dsr0f5lx6z0yvhqp4pgjcamygg73cz2c"; }) 225 + (fetchNuGet { pname = "System.Buffers"; version = "4.5.1"; sha256 = "04kb1mdrlcixj9zh1xdi5as0k0qi8byr5mi3p3jcxx72qz93s2y3"; }) 226 + (fetchNuGet { pname = "System.Collections"; version = "4.0.11"; sha256 = "1ga40f5lrwldiyw6vy67d0sg7jd7ww6kgwbksm19wrvq9hr0bsm6"; }) 227 + (fetchNuGet { pname = "System.Collections"; version = "4.3.0"; sha256 = "19r4y64dqyrq6k4706dnyhhw7fs24kpp3awak7whzss39dakpxk9"; }) 228 + (fetchNuGet { pname = "System.Collections.Concurrent"; version = "4.0.12"; sha256 = "07y08kvrzpak873pmyxs129g1ch8l27zmg51pcyj2jvq03n0r0fc"; }) 229 + (fetchNuGet { pname = "System.Collections.Concurrent"; version = "4.3.0"; sha256 = "0wi10md9aq33jrkh2c24wr2n9hrpyamsdhsxdcnf43b7y86kkii8"; }) 230 + (fetchNuGet { pname = "System.Collections.Immutable"; version = "1.5.0"; sha256 = "1d5gjn5afnrf461jlxzawcvihz195gayqpcfbv6dd7pxa9ialn06"; }) 231 + (fetchNuGet { pname = "System.Collections.Immutable"; version = "1.7.0"; sha256 = "1gik4sn9jsi1wcy1pyyp0r4sn2g17cwrsh24b2d52vif8p2h24zx"; }) 232 + (fetchNuGet { pname = "System.Collections.Immutable"; version = "1.7.1"; sha256 = "1nh4nlxfc7lbnbl86wwk1a3jwl6myz5j6hvgh5sp4krim9901hsq"; }) 233 + (fetchNuGet { pname = "System.Collections.NonGeneric"; version = "4.0.1"; sha256 = "19994r5y5bpdhj7di6w047apvil8lh06lh2c2yv9zc4fc5g9bl4d"; }) 234 + (fetchNuGet { pname = "System.Collections.NonGeneric"; version = "4.3.0"; sha256 = "07q3k0hf3mrcjzwj8fwk6gv3n51cb513w4mgkfxzm3i37sc9kz7k"; }) 235 + (fetchNuGet { pname = "System.Collections.Specialized"; version = "4.0.1"; sha256 = "1wbv7y686p5x169rnaim7sln67ivmv6r57falrnx8aap9y33mam9"; }) 236 + (fetchNuGet { pname = "System.Collections.Specialized"; version = "4.3.0"; sha256 = "1sdwkma4f6j85m3dpb53v9vcgd0zyc9jb33f8g63byvijcj39n20"; }) 237 + (fetchNuGet { pname = "System.ComponentModel"; version = "4.3.0"; sha256 = "0986b10ww3nshy30x9sjyzm0jx339dkjxjj3401r3q0f6fx2wkcb"; }) 238 + (fetchNuGet { pname = "System.ComponentModel.Annotations"; version = "4.7.0"; sha256 = "06x1m46ddxj0ng28d7gry9gjkqdg2kp89jyf480g5gznyybbs49z"; }) 239 + (fetchNuGet { pname = "System.ComponentModel.Primitives"; version = "4.3.0"; sha256 = "1svfmcmgs0w0z9xdw2f2ps05rdxmkxxhf0l17xk9l1l8xfahkqr0"; }) 240 + (fetchNuGet { pname = "System.ComponentModel.TypeConverter"; version = "4.3.0"; sha256 = "17ng0p7v3nbrg3kycz10aqrrlw4lz9hzhws09pfh8gkwicyy481x"; }) 241 + (fetchNuGet { pname = "System.Configuration.ConfigurationManager"; version = "4.5.0"; sha256 = "1frpy24mn6q7hgwayj98kkx89z861f5dmia4j6zc0a2ydgx8x02c"; }) 242 + (fetchNuGet { pname = "System.Diagnostics.Debug"; version = "4.0.11"; sha256 = "0gmjghrqmlgzxivd2xl50ncbglb7ljzb66rlx8ws6dv8jm0d5siz"; }) 243 + (fetchNuGet { pname = "System.Diagnostics.Debug"; version = "4.3.0"; sha256 = "00yjlf19wjydyr6cfviaph3vsjzg3d5nvnya26i2fvfg53sknh3y"; }) 244 + (fetchNuGet { pname = "System.Diagnostics.DiagnosticSource"; version = "4.0.0"; sha256 = "1n6c3fbz7v8d3pn77h4v5wvsfrfg7v1c57lg3nff3cjyh597v23m"; }) 245 + (fetchNuGet { pname = "System.Diagnostics.DiagnosticSource"; version = "4.3.0"; sha256 = "0z6m3pbiy0qw6rn3n209rrzf9x1k4002zh90vwcrsym09ipm2liq"; }) 246 + (fetchNuGet { pname = "System.Diagnostics.DiagnosticSource"; version = "4.5.0"; sha256 = "1y8m0p3127nak5yspapfnz25qc9x53gqpvwr3hdpsvrcd2r1pgyj"; }) 247 + (fetchNuGet { pname = "System.Diagnostics.DiagnosticSource"; version = "4.7.0"; sha256 = "0cr0v5dz8l5ackxv6b772fjcyj2nimqmrmzanjs4cw2668v568n1"; }) 248 + (fetchNuGet { pname = "System.Diagnostics.DiagnosticSource"; version = "4.7.1"; sha256 = "1mivaifniyrqwlnvzsfaxzrh2sd981bwzs3cbvs5wi7jjzbcqr4p"; }) 249 + (fetchNuGet { pname = "System.Diagnostics.Tools"; version = "4.0.1"; sha256 = "19cknvg07yhakcvpxg3cxa0bwadplin6kyxd8mpjjpwnp56nl85x"; }) 250 + (fetchNuGet { pname = "System.Diagnostics.Tools"; version = "4.3.0"; sha256 = "0in3pic3s2ddyibi8cvgl102zmvp9r9mchh82ns9f0ms4basylw1"; }) 251 + (fetchNuGet { pname = "System.Diagnostics.TraceSource"; version = "4.0.0"; sha256 = "1mc7r72xznczzf6mz62dm8xhdi14if1h8qgx353xvhz89qyxsa3h"; }) 252 + (fetchNuGet { pname = "System.Diagnostics.Tracing"; version = "4.1.0"; sha256 = "1d2r76v1x610x61ahfpigda89gd13qydz6vbwzhpqlyvq8jj6394"; }) 253 + (fetchNuGet { pname = "System.Diagnostics.Tracing"; version = "4.3.0"; sha256 = "1m3bx6c2s958qligl67q7grkwfz3w53hpy7nc97mh6f7j5k168c4"; }) 254 + (fetchNuGet { pname = "System.Dynamic.Runtime"; version = "4.0.11"; sha256 = "1pla2dx8gkidf7xkciig6nifdsb494axjvzvann8g2lp3dbqasm9"; }) 255 + (fetchNuGet { pname = "System.Dynamic.Runtime"; version = "4.3.0"; sha256 = "1d951hrvrpndk7insiag80qxjbf2y0y39y8h5hnq9612ws661glk"; }) 256 + (fetchNuGet { pname = "System.Formats.Asn1"; version = "5.0.0"; sha256 = "1axc8z0839yvqi2cb63l73l6d9j6wd20lsbdymwddz9hvrsgfwpn"; }) 257 + (fetchNuGet { pname = "System.Globalization"; version = "4.0.11"; sha256 = "070c5jbas2v7smm660zaf1gh0489xanjqymkvafcs4f8cdrs1d5d"; }) 258 + (fetchNuGet { pname = "System.Globalization"; version = "4.3.0"; sha256 = "1cp68vv683n6ic2zqh2s1fn4c2sd87g5hpp6l4d4nj4536jz98ki"; }) 259 + (fetchNuGet { pname = "System.Globalization.Calendars"; version = "4.0.1"; sha256 = "0bv0alrm2ck2zk3rz25lfyk9h42f3ywq77mx1syl6vvyncnpg4qh"; }) 260 + (fetchNuGet { pname = "System.Globalization.Calendars"; version = "4.3.0"; sha256 = "1xwl230bkakzzkrggy1l1lxmm3xlhk4bq2pkv790j5lm8g887lxq"; }) 261 + (fetchNuGet { pname = "System.Globalization.Extensions"; version = "4.0.1"; sha256 = "0hjhdb5ri8z9l93bw04s7ynwrjrhx2n0p34sf33a9hl9phz69fyc"; }) 262 + (fetchNuGet { pname = "System.Globalization.Extensions"; version = "4.3.0"; sha256 = "02a5zfxavhv3jd437bsncbhd2fp1zv4gxzakp1an9l6kdq1mcqls"; }) 263 + (fetchNuGet { pname = "System.IdentityModel.Tokens.Jwt"; version = "5.5.0"; sha256 = "0p6ybl5ik2glwcfhiqlqdggl0qd6027kdxaqy5xmp7qq055qiq6k"; }) 264 + (fetchNuGet { pname = "System.Interactive.Async"; version = "3.1.1"; sha256 = "03iq20gq0n2b2sdzs5jhxf46nzkfgvzip6q5248vka2rcvn1yanh"; }) 265 + (fetchNuGet { pname = "System.IO"; version = "4.1.0"; sha256 = "1g0yb8p11vfd0kbkyzlfsbsp5z44lwsvyc0h3dpw6vqnbi035ajp"; }) 266 + (fetchNuGet { pname = "System.IO"; version = "4.3.0"; sha256 = "05l9qdrzhm4s5dixmx68kxwif4l99ll5gqmh7rqgw554fx0agv5f"; }) 267 + (fetchNuGet { pname = "System.IO.FileSystem"; version = "4.0.1"; sha256 = "0kgfpw6w4djqra3w5crrg8xivbanh1w9dh3qapb28q060wb9flp1"; }) 268 + (fetchNuGet { pname = "System.IO.FileSystem"; version = "4.3.0"; sha256 = "0z2dfrbra9i6y16mm9v1v6k47f0fm617vlb7s5iybjjsz6g1ilmw"; }) 269 + (fetchNuGet { pname = "System.IO.FileSystem.Primitives"; version = "4.0.1"; sha256 = "1s0mniajj3lvbyf7vfb5shp4ink5yibsx945k6lvxa96r8la1612"; }) 270 + (fetchNuGet { pname = "System.IO.FileSystem.Primitives"; version = "4.3.0"; sha256 = "0j6ndgglcf4brg2lz4wzsh1av1gh8xrzdsn9f0yznskhqn1xzj9c"; }) 271 + (fetchNuGet { pname = "System.Linq"; version = "4.1.0"; sha256 = "1ppg83svb39hj4hpp5k7kcryzrf3sfnm08vxd5sm2drrijsla2k5"; }) 272 + (fetchNuGet { pname = "System.Linq"; version = "4.3.0"; sha256 = "1w0gmba695rbr80l1k2h4mrwzbzsyfl2z4klmpbsvsg5pm4a56s7"; }) 273 + (fetchNuGet { pname = "System.Linq.Expressions"; version = "4.1.0"; sha256 = "1gpdxl6ip06cnab7n3zlcg6mqp7kknf73s8wjinzi4p0apw82fpg"; }) 274 + (fetchNuGet { pname = "System.Linq.Expressions"; version = "4.3.0"; sha256 = "0ky2nrcvh70rqq88m9a5yqabsl4fyd17bpr63iy2mbivjs2nyypv"; }) 275 + (fetchNuGet { pname = "System.Linq.Queryable"; version = "4.0.1"; sha256 = "11jn9k34g245yyf260gr3ldzvaqa9477w2c5nhb1p8vjx4xm3qaw"; }) 276 + (fetchNuGet { pname = "System.Memory"; version = "4.5.0"; sha256 = "1layqpcx1q4l805fdnj2dfqp6ncx2z42ca06rgsr6ikq4jjgbv30"; }) 277 + (fetchNuGet { pname = "System.Memory"; version = "4.5.1"; sha256 = "0f07d7hny38lq9w69wx4lxkn4wszrqf9m9js6fh9is645csm167c"; }) 278 + (fetchNuGet { pname = "System.Memory"; version = "4.5.2"; sha256 = "1g24dwqfcmf4gpbgbhaw1j49xmpsz389l6bw2xxbsmnzvsf860ld"; }) 279 + (fetchNuGet { pname = "System.Memory"; version = "4.5.3"; sha256 = "0naqahm3wljxb5a911d37mwjqjdxv9l0b49p5dmfyijvni2ppy8a"; }) 280 + (fetchNuGet { pname = "System.Memory"; version = "4.5.4"; sha256 = "14gbbs22mcxwggn0fcfs1b062521azb9fbb7c113x0mq6dzq9h6y"; }) 281 + (fetchNuGet { pname = "System.Net.Http"; version = "4.1.0"; sha256 = "1i5rqij1icg05j8rrkw4gd4pgia1978mqhjzhsjg69lvwcdfg8yb"; }) 282 + (fetchNuGet { pname = "System.Net.Http"; version = "4.3.0"; sha256 = "1i4gc757xqrzflbk7kc5ksn20kwwfjhw9w7pgdkn19y3cgnl302j"; }) 283 + (fetchNuGet { pname = "System.Net.NameResolution"; version = "4.0.0"; sha256 = "0dj3pvpv069nyia28gkl4a0fb7q33hbxz2dg25qvpah3l7pbl0qh"; }) 284 + (fetchNuGet { pname = "System.Net.NameResolution"; version = "4.3.0"; sha256 = "15r75pwc0rm3vvwsn8rvm2krf929mjfwliv0mpicjnii24470rkq"; }) 285 + (fetchNuGet { pname = "System.Net.NetworkInformation"; version = "4.1.0"; sha256 = "17ia8gyr0aq76z9cv37yjmpna7nx30xfppw0lifvi9s2q3yjspd2"; }) 286 + (fetchNuGet { pname = "System.Net.Primitives"; version = "4.0.11"; sha256 = "10xzzaynkzkakp7jai1ik3r805zrqjxiz7vcagchyxs2v26a516r"; }) 287 + (fetchNuGet { pname = "System.Net.Primitives"; version = "4.3.0"; sha256 = "0c87k50rmdgmxx7df2khd9qj7q35j9rzdmm2572cc55dygmdk3ii"; }) 288 + (fetchNuGet { pname = "System.Net.Requests"; version = "4.0.11"; sha256 = "13mka55sa6dg6nw4zdrih44gnp8hnj5azynz47ljsh2791lz3d9h"; }) 289 + (fetchNuGet { pname = "System.Net.Security"; version = "4.3.2"; sha256 = "1aw1ca1vssqrillrh4qkarx0lxwc8wcaqdkfdima8376wb98j2q8"; }) 290 + (fetchNuGet { pname = "System.Net.Sockets"; version = "4.1.0"; sha256 = "1385fvh8h29da5hh58jm1v78fzi9fi5vj93vhlm2kvqpfahvpqls"; }) 291 + (fetchNuGet { pname = "System.Net.WebHeaderCollection"; version = "4.0.1"; sha256 = "10bxpxj80c4z00z3ksrfswspq9qqsw8jwxcbzvymzycb97m9b55q"; }) 292 + (fetchNuGet { pname = "System.Numerics.Vectors"; version = "4.4.0"; sha256 = "0rdvma399070b0i46c4qq1h2yvjj3k013sqzkilz4bz5cwmx1rba"; }) 293 + (fetchNuGet { pname = "System.Numerics.Vectors"; version = "4.5.0"; sha256 = "1kzrj37yzawf1b19jq0253rcs8hsq1l2q8g69d7ipnhzb0h97m59"; }) 294 + (fetchNuGet { pname = "System.ObjectModel"; version = "4.0.12"; sha256 = "1sybkfi60a4588xn34nd9a58png36i0xr4y4v4kqpg8wlvy5krrj"; }) 295 + (fetchNuGet { pname = "System.ObjectModel"; version = "4.3.0"; sha256 = "191p63zy5rpqx7dnrb3h7prvgixmk168fhvvkkvhlazncf8r3nc2"; }) 296 + (fetchNuGet { pname = "System.Private.DataContractSerialization"; version = "4.3.0"; sha256 = "06fjipqvjp559rrm825x6pll8gimdj9x1n3larigh5hsm584gndw"; }) 297 + (fetchNuGet { pname = "System.Reflection"; version = "4.1.0"; sha256 = "1js89429pfw79mxvbzp8p3q93il6rdff332hddhzi5wqglc4gml9"; }) 298 + (fetchNuGet { pname = "System.Reflection"; version = "4.3.0"; sha256 = "0xl55k0mw8cd8ra6dxzh974nxif58s3k1rjv1vbd7gjbjr39j11m"; }) 299 + (fetchNuGet { pname = "System.Reflection.Emit"; version = "4.0.1"; sha256 = "0ydqcsvh6smi41gyaakglnv252625hf29f7kywy2c70nhii2ylqp"; }) 300 + (fetchNuGet { pname = "System.Reflection.Emit"; version = "4.3.0"; sha256 = "11f8y3qfysfcrscjpjym9msk7lsfxkk4fmz9qq95kn3jd0769f74"; }) 301 + (fetchNuGet { pname = "System.Reflection.Emit.ILGeneration"; version = "4.0.1"; sha256 = "1pcd2ig6bg144y10w7yxgc9d22r7c7ww7qn1frdfwgxr24j9wvv0"; }) 302 + (fetchNuGet { pname = "System.Reflection.Emit.ILGeneration"; version = "4.3.0"; sha256 = "0w1n67glpv8241vnpz1kl14sy7zlnw414aqwj4hcx5nd86f6994q"; }) 303 + (fetchNuGet { pname = "System.Reflection.Emit.Lightweight"; version = "4.0.1"; sha256 = "1s4b043zdbx9k39lfhvsk68msv1nxbidhkq6nbm27q7sf8xcsnxr"; }) 304 + (fetchNuGet { pname = "System.Reflection.Emit.Lightweight"; version = "4.3.0"; sha256 = "0ql7lcakycrvzgi9kxz1b3lljd990az1x6c4jsiwcacrvimpib5c"; }) 305 + (fetchNuGet { pname = "System.Reflection.Extensions"; version = "4.0.1"; sha256 = "0m7wqwq0zqq9gbpiqvgk3sr92cbrw7cp3xn53xvw7zj6rz6fdirn"; }) 306 + (fetchNuGet { pname = "System.Reflection.Extensions"; version = "4.3.0"; sha256 = "02bly8bdc98gs22lqsfx9xicblszr2yan7v2mmw3g7hy6miq5hwq"; }) 307 + (fetchNuGet { pname = "System.Reflection.Metadata"; version = "1.6.0"; sha256 = "1wdbavrrkajy7qbdblpbpbalbdl48q3h34cchz24gvdgyrlf15r4"; }) 308 + (fetchNuGet { pname = "System.Reflection.Primitives"; version = "4.0.1"; sha256 = "1bangaabhsl4k9fg8khn83wm6yial8ik1sza7401621jc6jrym28"; }) 309 + (fetchNuGet { pname = "System.Reflection.Primitives"; version = "4.3.0"; sha256 = "04xqa33bld78yv5r93a8n76shvc8wwcdgr1qvvjh959g3rc31276"; }) 310 + (fetchNuGet { pname = "System.Reflection.TypeExtensions"; version = "4.1.0"; sha256 = "1bjli8a7sc7jlxqgcagl9nh8axzfl11f4ld3rjqsyxc516iijij7"; }) 311 + (fetchNuGet { pname = "System.Reflection.TypeExtensions"; version = "4.3.0"; sha256 = "0y2ssg08d817p0vdag98vn238gyrrynjdj4181hdg780sif3ykp1"; }) 312 + (fetchNuGet { pname = "System.Resources.ResourceManager"; version = "4.0.1"; sha256 = "0b4i7mncaf8cnai85jv3wnw6hps140cxz8vylv2bik6wyzgvz7bi"; }) 313 + (fetchNuGet { pname = "System.Resources.ResourceManager"; version = "4.3.0"; sha256 = "0sjqlzsryb0mg4y4xzf35xi523s4is4hz9q4qgdvlvgivl7qxn49"; }) 314 + (fetchNuGet { pname = "System.Runtime"; version = "4.1.0"; sha256 = "02hdkgk13rvsd6r9yafbwzss8kr55wnj8d5c7xjnp8gqrwc8sn0m"; }) 315 + (fetchNuGet { pname = "System.Runtime"; version = "4.3.0"; sha256 = "066ixvgbf2c929kgknshcxqj6539ax7b9m570cp8n179cpfkapz7"; }) 316 + (fetchNuGet { pname = "System.Runtime.Caching"; version = "4.5.0"; sha256 = "07ijp8j0cplcw1ns0fpkfsavppask164jn51lasiji4sfkjy592r"; }) 317 + (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.5.0"; sha256 = "17labczwqk3jng3kkky73m0jhi8wc21vbl7cz5c0hj2p1dswin43"; }) 318 + (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.5.2"; sha256 = "1vz4275fjij8inf31np78hw50al8nqkngk04p3xv5n4fcmf1grgi"; }) 319 + (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.5.3"; sha256 = "1afi6s2r1mh1kygbjmfba6l4f87pi5sg13p4a48idqafli94qxln"; }) 320 + (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.6.0"; sha256 = "0xmzi2gpbmgyfr75p24rqqsba3cmrqgmcv45lsqp5amgrdwd0f0m"; }) 321 + (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.7.0"; sha256 = "16r6sn4czfjk8qhnz7bnqlyiaaszr0ihinb7mq9zzr1wba257r54"; }) 322 + (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.7.1"; sha256 = "119br3pd85lq8zcgh4f60jzmv1g976q1kdgi3hvqdlhfbw6siz2j"; }) 323 + (fetchNuGet { pname = "System.Runtime.Extensions"; version = "4.1.0"; sha256 = "0rw4rm4vsm3h3szxp9iijc3ksyviwsv6f63dng3vhqyg4vjdkc2z"; }) 324 + (fetchNuGet { pname = "System.Runtime.Extensions"; version = "4.3.0"; sha256 = "1ykp3dnhwvm48nap8q23893hagf665k0kn3cbgsqpwzbijdcgc60"; }) 325 + (fetchNuGet { pname = "System.Runtime.Handles"; version = "4.0.1"; sha256 = "1g0zrdi5508v49pfm3iii2hn6nm00bgvfpjq1zxknfjrxxa20r4g"; }) 326 + (fetchNuGet { pname = "System.Runtime.Handles"; version = "4.3.0"; sha256 = "0sw2gfj2xr7sw9qjn0j3l9yw07x73lcs97p8xfc9w1x9h5g5m7i8"; }) 327 + (fetchNuGet { pname = "System.Runtime.InteropServices"; version = "4.1.0"; sha256 = "01kxqppx3dr3b6b286xafqilv4s2n0gqvfgzfd4z943ga9i81is1"; }) 328 + (fetchNuGet { pname = "System.Runtime.InteropServices"; version = "4.3.0"; sha256 = "00hywrn4g7hva1b2qri2s6rabzwgxnbpw9zfxmz28z09cpwwgh7j"; }) 329 + (fetchNuGet { pname = "System.Runtime.Numerics"; version = "4.0.1"; sha256 = "1y308zfvy0l5nrn46mqqr4wb4z1xk758pkk8svbz8b5ij7jnv4nn"; }) 330 + (fetchNuGet { pname = "System.Runtime.Numerics"; version = "4.3.0"; sha256 = "19rav39sr5dky7afygh309qamqqmi9kcwvz3i0c5700v0c5cg61z"; }) 331 + (fetchNuGet { pname = "System.Runtime.Serialization.Formatters"; version = "4.3.0"; sha256 = "114j35n8gcvn3sqv9ar36r1jjq0y1yws9r0yk8i6wm4aq7n9rs0m"; }) 332 + (fetchNuGet { pname = "System.Runtime.Serialization.Json"; version = "4.3.0"; sha256 = "1qp8ghr70smspnjdmlcbl5vwb7fm2iy1b7wx1p53lbpl35w4kz4a"; }) 333 + (fetchNuGet { pname = "System.Runtime.Serialization.Primitives"; version = "4.1.1"; sha256 = "042rfjixknlr6r10vx2pgf56yming8lkjikamg3g4v29ikk78h7k"; }) 334 + (fetchNuGet { pname = "System.Runtime.Serialization.Primitives"; version = "4.3.0"; sha256 = "01vv2p8h4hsz217xxs0rixvb7f2xzbh6wv1gzbfykcbfrza6dvnf"; }) 335 + (fetchNuGet { pname = "System.Security.AccessControl"; version = "4.5.0"; sha256 = "1wvwanz33fzzbnd2jalar0p0z3x0ba53vzx1kazlskp7pwyhlnq0"; }) 336 + (fetchNuGet { pname = "System.Security.Claims"; version = "4.0.1"; sha256 = "03dw0ls49bvsrffgwycyifjgz0qzr9r85skqhdyhfd51fqf398n6"; }) 337 + (fetchNuGet { pname = "System.Security.Claims"; version = "4.3.0"; sha256 = "0jvfn7j22l3mm28qjy3rcw287y9h65ha4m940waaxah07jnbzrhn"; }) 338 + (fetchNuGet { pname = "System.Security.Cryptography.Algorithms"; version = "4.2.0"; sha256 = "148s9g5dgm33ri7dnh19s4lgnlxbpwvrw2jnzllq2kijj4i4vs85"; }) 339 + (fetchNuGet { pname = "System.Security.Cryptography.Algorithms"; version = "4.3.0"; sha256 = "03sq183pfl5kp7gkvq77myv7kbpdnq3y0xj7vi4q1kaw54sny0ml"; }) 340 + (fetchNuGet { pname = "System.Security.Cryptography.Cng"; version = "4.2.0"; sha256 = "118jijz446kix20blxip0f0q8mhsh9bz118mwc2ch1p6g7facpzc"; }) 341 + (fetchNuGet { pname = "System.Security.Cryptography.Cng"; version = "4.3.0"; sha256 = "1k468aswafdgf56ab6yrn7649kfqx2wm9aslywjam1hdmk5yypmv"; }) 342 + (fetchNuGet { pname = "System.Security.Cryptography.Cng"; version = "4.5.0"; sha256 = "1pm4ykbcz48f1hdmwpia432ha6qbb9kbrxrrp7cg3m8q8xn52ngn"; }) 343 + (fetchNuGet { pname = "System.Security.Cryptography.Cng"; version = "5.0.0"; sha256 = "06hkx2za8jifpslkh491dfwzm5dxrsyxzj5lsc0achb6yzg4zqlw"; }) 344 + (fetchNuGet { pname = "System.Security.Cryptography.Csp"; version = "4.0.0"; sha256 = "1cwv8lqj8r15q81d2pz2jwzzbaji0l28xfrpw29kdpsaypm92z2q"; }) 345 + (fetchNuGet { pname = "System.Security.Cryptography.Csp"; version = "4.3.0"; sha256 = "1x5wcrddf2s3hb8j78cry7yalca4lb5vfnkrysagbn6r9x6xvrx1"; }) 346 + (fetchNuGet { pname = "System.Security.Cryptography.Encoding"; version = "4.0.0"; sha256 = "0a8y1a5wkmpawc787gfmnrnbzdgxmx1a14ax43jf3rj9gxmy3vk4"; }) 347 + (fetchNuGet { pname = "System.Security.Cryptography.Encoding"; version = "4.3.0"; sha256 = "1jr6w70igqn07k5zs1ph6xja97hxnb3mqbspdrff6cvssgrixs32"; }) 348 + (fetchNuGet { pname = "System.Security.Cryptography.OpenSsl"; version = "4.0.0"; sha256 = "16sx3cig3d0ilvzl8xxgffmxbiqx87zdi8fc73i3i7zjih1a7f4q"; }) 349 + (fetchNuGet { pname = "System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0givpvvj8yc7gv4lhb6s1prq6p2c4147204a0wib89inqzd87gqc"; }) 350 + (fetchNuGet { pname = "System.Security.Cryptography.Pkcs"; version = "5.0.0"; sha256 = "0hb2mndac3xrw3786bsjxjfh19bwnr991qib54k6wsqjhjyyvbwj"; }) 351 + (fetchNuGet { pname = "System.Security.Cryptography.Primitives"; version = "4.0.0"; sha256 = "0i7cfnwph9a10bm26m538h5xcr8b36jscp9sy1zhgifksxz4yixh"; }) 352 + (fetchNuGet { pname = "System.Security.Cryptography.Primitives"; version = "4.3.0"; sha256 = "0pyzncsv48zwly3lw4f2dayqswcfvdwq2nz0dgwmi7fj3pn64wby"; }) 353 + (fetchNuGet { pname = "System.Security.Cryptography.ProtectedData"; version = "4.4.0"; sha256 = "1q8ljvqhasyynp94a1d7jknk946m20lkwy2c3wa8zw2pc517fbj6"; }) 354 + (fetchNuGet { pname = "System.Security.Cryptography.ProtectedData"; version = "4.5.0"; sha256 = "11qlc8q6b7xlspayv07718ibzvlj6ddqqxkvcbxv5b24d5kzbrb7"; }) 355 + (fetchNuGet { pname = "System.Security.Cryptography.X509Certificates"; version = "4.1.0"; sha256 = "0clg1bv55mfv5dq00m19cp634zx6inm31kf8ppbq1jgyjf2185dh"; }) 356 + (fetchNuGet { pname = "System.Security.Cryptography.X509Certificates"; version = "4.3.0"; sha256 = "0valjcz5wksbvijylxijjxb1mp38mdhv03r533vnx1q3ikzdav9h"; }) 357 + (fetchNuGet { pname = "System.Security.Permissions"; version = "4.5.0"; sha256 = "192ww5rm3c9mirxgl1nzyrwd18am3izqls0hzm0fvcdjl5grvbhm"; }) 358 + (fetchNuGet { pname = "System.Security.Principal"; version = "4.0.1"; sha256 = "1nbzdfqvzzbgsfdd5qsh94d7dbg2v4sw0yx6himyn52zf8z6007p"; }) 359 + (fetchNuGet { pname = "System.Security.Principal"; version = "4.3.0"; sha256 = "12cm2zws06z4lfc4dn31iqv7072zyi4m910d4r6wm8yx85arsfxf"; }) 360 + (fetchNuGet { pname = "System.Security.Principal.Windows"; version = "4.0.0"; sha256 = "1d3vc8i0zss9z8p4qprls4gbh7q4218l9845kclx7wvw41809k6z"; }) 361 + (fetchNuGet { pname = "System.Security.Principal.Windows"; version = "4.5.0"; sha256 = "0rmj89wsl5yzwh0kqjgx45vzf694v9p92r4x4q6yxldk1cv1hi86"; }) 362 + (fetchNuGet { pname = "System.Security.SecureString"; version = "4.0.0"; sha256 = "026q5f46585hgisz4svhnjc7q0ljprz43v15rybqizlyli5585jz"; }) 363 + (fetchNuGet { pname = "System.Security.SecureString"; version = "4.3.0"; sha256 = "1dypfbw7mxd8cbpcxs3jrp7i5wm1vnp43bv823mk2z94r36ixqfc"; }) 364 + (fetchNuGet { pname = "System.Text.Encoding"; version = "4.0.11"; sha256 = "1dyqv0hijg265dwxg6l7aiv74102d6xjiwplh2ar1ly6xfaa4iiw"; }) 365 + (fetchNuGet { pname = "System.Text.Encoding"; version = "4.3.0"; sha256 = "1f04lkir4iladpp51sdgmis9dj4y8v08cka0mbmsy0frc9a4gjqr"; }) 366 + (fetchNuGet { pname = "System.Text.Encoding.CodePages"; version = "4.5.0"; sha256 = "19x38911pawq4mrxrm04l2bnxwxxlzq8v8rj4cbxnfjj8pnd3vj3"; }) 367 + (fetchNuGet { pname = "System.Text.Encoding.CodePages"; version = "4.5.1"; sha256 = "1z21qyfs6sg76rp68qdx0c9iy57naan89pg7p6i3qpj8kyzn921w"; }) 368 + (fetchNuGet { pname = "System.Text.Encoding.Extensions"; version = "4.0.11"; sha256 = "08nsfrpiwsg9x5ml4xyl3zyvjfdi4mvbqf93kjdh11j4fwkznizs"; }) 369 + (fetchNuGet { pname = "System.Text.Encoding.Extensions"; version = "4.3.0"; sha256 = "11q1y8hh5hrp5a3kw25cb6l00v5l5dvirkz8jr3sq00h1xgcgrxy"; }) 370 + (fetchNuGet { pname = "System.Text.Encodings.Web"; version = "4.6.0"; sha256 = "0j61vkkcz390zbqsqqzdrzk4siqipi4359bgkh6icxli671k479l"; }) 371 + (fetchNuGet { pname = "System.Text.Encodings.Web"; version = "4.7.1"; sha256 = "1wj7r07mjwbf9a79kapy2l9m8mcq8b3nbhg0zaprlsav09k85fmb"; }) 372 + (fetchNuGet { pname = "System.Text.Json"; version = "4.6.0"; sha256 = "0ism236hwi0k6axssfq58s1d8lihplwiz058pdvl8al71hagri39"; }) 373 + (fetchNuGet { pname = "System.Text.Json"; version = "4.7.2"; sha256 = "10xj1pw2dgd42anikvj9qm23ccssrcp7dpznpj4j7xjp1ikhy3y4"; }) 374 + (fetchNuGet { pname = "System.Text.RegularExpressions"; version = "4.1.0"; sha256 = "1mw7vfkkyd04yn2fbhm38msk7dz2xwvib14ygjsb8dq2lcvr18y7"; }) 375 + (fetchNuGet { pname = "System.Text.RegularExpressions"; version = "4.3.0"; sha256 = "1bgq51k7fwld0njylfn7qc5fmwrk2137gdq7djqdsw347paa9c2l"; }) 376 + (fetchNuGet { pname = "System.Threading"; version = "4.0.11"; sha256 = "19x946h926bzvbsgj28csn46gak2crv2skpwsx80hbgazmkgb1ls"; }) 377 + (fetchNuGet { pname = "System.Threading"; version = "4.3.0"; sha256 = "0rw9wfamvhayp5zh3j7p1yfmx9b5khbf4q50d8k5rk993rskfd34"; }) 378 + (fetchNuGet { pname = "System.Threading.Overlapped"; version = "4.0.1"; sha256 = "0fi79az3vmqdp9mv3wh2phblfjls89zlj6p9nc3i9f6wmfarj188"; }) 379 + (fetchNuGet { pname = "System.Threading.Tasks"; version = "4.0.11"; sha256 = "0nr1r41rak82qfa5m0lhk9mp0k93bvfd7bbd9sdzwx9mb36g28p5"; }) 380 + (fetchNuGet { pname = "System.Threading.Tasks"; version = "4.3.0"; sha256 = "134z3v9abw3a6jsw17xl3f6hqjpak5l682k2vz39spj4kmydg6k7"; }) 381 + (fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.0.0"; sha256 = "1cb51z062mvc2i8blpzmpn9d9mm4y307xrwi65di8ri18cz5r1zr"; }) 382 + (fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.3.0"; sha256 = "1xxcx2xh8jin360yjwm4x4cf5y3a2bwpn2ygkfkwkicz7zk50s2z"; }) 383 + (fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.5.2"; sha256 = "1sh63dz0dymqcwmprp0nadm77b83vmm7lyllpv578c397bslb8hj"; }) 384 + (fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.5.3"; sha256 = "0g7r6hm572ax8v28axrdxz1gnsblg6kszq17g51pj14a5rn2af7i"; }) 385 + (fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.5.4"; sha256 = "0y6ncasgfcgnjrhynaf0lwpkpkmv4a07sswwkwbwb5h7riisj153"; }) 386 + (fetchNuGet { pname = "System.Threading.Thread"; version = "4.0.0"; sha256 = "1gxxm5fl36pjjpnx1k688dcw8m9l7nmf802nxis6swdaw8k54jzc"; }) 387 + (fetchNuGet { pname = "System.Threading.ThreadPool"; version = "4.0.10"; sha256 = "0fdr61yjcxh5imvyf93n2m3n5g9pp54bnw2l1d2rdl9z6dd31ypx"; }) 388 + (fetchNuGet { pname = "System.Threading.ThreadPool"; version = "4.3.0"; sha256 = "027s1f4sbx0y1xqw2irqn6x161lzj8qwvnh2gn78ciiczdv10vf1"; }) 389 + (fetchNuGet { pname = "System.ValueTuple"; version = "4.5.0"; sha256 = "00k8ja51d0f9wrq4vv5z2jhq8hy31kac2rg0rv06prylcybzl8cy"; }) 390 + (fetchNuGet { pname = "System.Xml.ReaderWriter"; version = "4.0.11"; sha256 = "0c6ky1jk5ada9m94wcadih98l6k1fvf6vi7vhn1msjixaha419l5"; }) 391 + (fetchNuGet { pname = "System.Xml.ReaderWriter"; version = "4.3.0"; sha256 = "0c47yllxifzmh8gq6rq6l36zzvw4kjvlszkqa9wq3fr59n0hl3s1"; }) 392 + (fetchNuGet { pname = "System.Xml.XDocument"; version = "4.0.11"; sha256 = "0n4lvpqzy9kc7qy1a4acwwd7b7pnvygv895az5640idl2y9zbz18"; }) 393 + (fetchNuGet { pname = "System.Xml.XDocument"; version = "4.3.0"; sha256 = "08h8fm4l77n0nd4i4fk2386y809bfbwqb7ih9d7564ifcxr5ssxd"; }) 394 + (fetchNuGet { pname = "System.Xml.XmlDocument"; version = "4.3.0"; sha256 = "0bmz1l06dihx52jxjr22dyv5mxv6pj4852lx68grjm7bivhrbfwi"; }) 395 + (fetchNuGet { pname = "System.Xml.XmlSerializer"; version = "4.3.0"; sha256 = "07pa4sx196vxkgl3csvdmw94nydlsm9ir38xxcs84qjn8cycd912"; }) 396 + ]
+40
pkgs/servers/web-apps/baget/updater.sh
···
··· 1 + #!/usr/bin/env nix-shell 2 + #!nix-shell -i bash -p gnused jq common-updater-scripts nuget-to-nix dotnet-sdk_3 nix-prefetch-github 3 + set -eo pipefail 4 + cd "$(dirname "${BASH_SOURCE[0]}")" 5 + 6 + deps_file="$(realpath ./deps.nix)" 7 + 8 + new_version="$(curl -s "https://api.github.com/repos/loic-sharma/BaGet/releases?per_page=1" | jq -r '.[0].name' | sed 's,^v,,')" 9 + old_version="$(sed -nE 's/\s*version = "(.*)".*/\1/p' ./default.nix)" 10 + 11 + if [[ "$new_version" == "$old_version" ]]; then 12 + echo "Already up to date!" 13 + exit 0 14 + fi 15 + 16 + new_rev="v$new_version" 17 + nix-prefetch-github loic-sharma BaGet --rev "$new_rev" > repo_info 18 + new_hash="$(jq -r ".sha256" < repo_info)" 19 + rm repo_info 20 + 21 + pushd ../../../.. 22 + 23 + update-source-version baget "$new_version" "$new_hash" 24 + store_src="$(nix-build -A baget.src --no-out-link)" 25 + src="$(mktemp -d /tmp/baget-src.XXX)" 26 + cp -rT "$store_src" "$src" 27 + 28 + trap 'rm -r "$src"' EXIT 29 + 30 + chmod -R +w "$src" 31 + 32 + pushd "$src" 33 + 34 + export DOTNET_NOLOGO=1 35 + export DOTNET_CLI_TELEMETRY_OPTOUT=1 36 + 37 + mkdir ./nuget_pkgs 38 + dotnet restore src/BaGet/BaGet.csproj --packages ./nuget_pkgs 39 + 40 + nuget-to-nix ./nuget_pkgs > "$deps_file"
+1 -3
pkgs/shells/zsh/default.nix
··· 55 checkFlags = map (T: "TESTNUM=${T}") (lib.stringToCharacters "ABCDEVW"); 56 57 # XXX: think/discuss about this, also with respect to nixos vs nix-on-X 58 - postInstall = lib.optionalString stdenv.isDarwin '' 59 - make install.bin install.modules install.fns 60 - '' + lib.optionalString stdenv.isLinux '' 61 make install.info install.html 62 '' + '' 63 mkdir -p $out/etc/
··· 55 checkFlags = map (T: "TESTNUM=${T}") (lib.stringToCharacters "ABCDEVW"); 56 57 # XXX: think/discuss about this, also with respect to nixos vs nix-on-X 58 + postInstall = lib.optionalString stdenv.isLinux '' 59 make install.info install.html 60 '' + '' 61 mkdir -p $out/etc/
+3 -3
pkgs/tools/filesystems/lfs/default.nix
··· 5 6 rustPlatform.buildRustPackage rec { 7 pname = "lfs"; 8 - version = "1.3.1"; 9 10 src = fetchFromGitHub { 11 owner = "Canop"; 12 repo = pname; 13 rev = "v${version}"; 14 - sha256 = "sha256-3zGCVT3SfQm72CF2MasT7k5r1Jx9DRUrXKHBSpvcv10="; 15 }; 16 17 - cargoSha256 = "sha256-Q4eNvOY5c4KybDKVhcOznxGPUgyjgEYPD8+9r6sECXA="; 18 19 meta = with lib; { 20 description = "Get information on your mounted disks";
··· 5 6 rustPlatform.buildRustPackage rec { 7 pname = "lfs"; 8 + version = "1.4.0"; 9 10 src = fetchFromGitHub { 11 owner = "Canop"; 12 repo = pname; 13 rev = "v${version}"; 14 + sha256 = "sha256-mTgJ2DbSQprKKy7wTMXwmUAvHS9tacs9Nk1cmEJW9Sg="; 15 }; 16 17 + cargoSha256 = "sha256-Oiiz7I2eCtNMauvr0K2NtB49NJ/6XWVsJ0mMyEgFb7U="; 18 19 meta = with lib; { 20 description = "Get information on your mounted disks";
+3 -3
pkgs/tools/graphics/gifski/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "gifski"; 5 - version = "1.5.1"; 6 7 src = fetchFromGitHub { 8 owner = "ImageOptim"; 9 repo = "gifski"; 10 rev = version; 11 - sha256 = "sha256-x2p+6m1pwXhmI9JvGUgLhxrGwpJa/e2wb5wOFdKQ2xg="; 12 }; 13 14 - cargoSha256 = "sha256-8t7VhPby56UX2LlD2xcJKkWamuJxN9LiVEQPEa78EQQ="; 15 16 nativeBuildInputs = [ pkg-config ]; 17
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "gifski"; 5 + version = "1.6.1"; 6 7 src = fetchFromGitHub { 8 owner = "ImageOptim"; 9 repo = "gifski"; 10 rev = version; 11 + sha256 = "sha256-mM+gxBmMsdPUBOYyRdomd5+v+bqGN+udcuXI/stMZ4Y="; 12 }; 13 14 + cargoSha256 = "sha256-5effx4tgMbnoVMO2Fza1naGFnMCvm0vhx6njo9/8bq0="; 15 16 nativeBuildInputs = [ pkg-config ]; 17
+3 -3
pkgs/tools/misc/code-minimap/default.nix
··· 7 8 rustPlatform.buildRustPackage rec { 9 pname = "code-minimap"; 10 - version = "0.6.2"; 11 12 src = fetchFromGitHub { 13 owner = "wfxr"; 14 repo = pname; 15 rev = "v${version}"; 16 - sha256 = "sha256-nUEmlKqCskPEQCOS2NC6jF4yVDarJeb3p+BKZq/2qvw="; 17 }; 18 19 - cargoSha256 = "sha256-yjjoQYYWK9/9fOP5ICnhpuF/07SyCszB9GCDr0GJ0v0="; 20 21 buildInputs = lib.optional stdenv.isDarwin libiconv; 22
··· 7 8 rustPlatform.buildRustPackage rec { 9 pname = "code-minimap"; 10 + version = "0.6.4"; 11 12 src = fetchFromGitHub { 13 owner = "wfxr"; 14 repo = pname; 15 rev = "v${version}"; 16 + sha256 = "sha256-XhewfU3l/n2wiF9pKm1OOKQ7REzz3WzcBiVgOiYnAYU="; 17 }; 18 19 + cargoSha256 = "sha256-Z3bc0w8slI9lHbDbrIK65xurtmTK4Y4caF7kxxJBA3Q="; 20 21 buildInputs = lib.optional stdenv.isDarwin libiconv; 22
+3 -3
pkgs/tools/misc/dua/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "dua"; 5 - version = "2.14.11"; 6 7 buildInputs = lib.optionals stdenv.isDarwin [ libiconv Foundation ]; 8 ··· 10 owner = "Byron"; 11 repo = "dua-cli"; 12 rev = "v${version}"; 13 - sha256 = "sha256-XMhgTJiP4whw1r+WtdG5CsQl/GIZPEg7/ElIEMZyWqM="; 14 # Remove unicode file names which leads to different checksums on HFS+ 15 # vs. other filesystems because of unicode normalisation. 16 extraPostFetch = '' ··· 18 ''; 19 }; 20 21 - cargoSha256 = "sha256-B4e8wT/RhpwtCb11HqN8vksshBaF/CmpMPT62aBuFnw="; 22 23 doCheck = false; 24
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "dua"; 5 + version = "2.16.0"; 6 7 buildInputs = lib.optionals stdenv.isDarwin [ libiconv Foundation ]; 8 ··· 10 owner = "Byron"; 11 repo = "dua-cli"; 12 rev = "v${version}"; 13 + sha256 = "sha256-16qe5FKMC8cpGDR5HRVslYfG/OA8NSCuAbHpG7dfb3A="; 14 # Remove unicode file names which leads to different checksums on HFS+ 15 # vs. other filesystems because of unicode normalisation. 16 extraPostFetch = '' ··· 18 ''; 19 }; 20 21 + cargoSha256 = "sha256-FX8fkG+Ecx9ZnbpX8UlLKYh4V6IJ98IbvBln0gCdD2M="; 22 23 doCheck = false; 24
+3 -3
pkgs/tools/misc/kalker/default.nix
··· 6 }: 7 rustPlatform.buildRustPackage rec { 8 pname = "kalker"; 9 - version = "1.0.1-2"; 10 11 src = fetchFromGitHub { 12 owner = "PaddiM8"; 13 repo = pname; 14 rev = "v${version}"; 15 - sha256 = "sha256-fXTsCHqm+wO/ygyg0y+44G9pgaaEEH9fgePCDH86/vU="; 16 }; 17 18 - cargoSha256 = "sha256-Ul21otEYCJuX5GnfV9OTpk/+3y32biASYZQpOecr8aU="; 19 20 buildInputs = [ gmp mpfr libmpc ]; 21
··· 6 }: 7 rustPlatform.buildRustPackage rec { 8 pname = "kalker"; 9 + version = "1.1.0"; 10 11 src = fetchFromGitHub { 12 owner = "PaddiM8"; 13 repo = pname; 14 rev = "v${version}"; 15 + sha256 = "sha256-NnX4+VmV4oZg/8Z3ZCWHGZ6dqDfvH30XErnrvKMxyls="; 16 }; 17 18 + cargoSha256 = "sha256-nSLbe3EhcLYylvyzOWuLIehBnD6mMofsNpFQVEybV8k="; 19 20 buildInputs = [ gmp mpfr libmpc ]; 21
+30
pkgs/tools/networking/qodem/default.nix
···
··· 1 + { lib, stdenv, fetchFromGitHub, autoconf, automake, ncurses, SDL, gpm, miniupnpc }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "qodem"; 5 + version = "1.0.1"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "klamonte"; 9 + repo = "qodem"; 10 + rev = "v${version}"; 11 + sha256 = "NAdcTVmNrDa3rbsbxJxFoI7sz5NK5Uw+TbP+a1CdB+Q="; 12 + }; 13 + 14 + nativeBuildInputs = [ autoconf automake ]; 15 + buildInputs = [ ncurses SDL gpm miniupnpc ]; 16 + 17 + meta = with lib; { 18 + homepage = "http://qodem.sourceforge.net/"; 19 + description = "Re-implementation of the DOS-era Qmodem serial communications package"; 20 + longDescription = '' 21 + Qodem is a from-scratch clone implementation of the Qmodem 22 + communications program made popular in the days when Bulletin Board 23 + Systems ruled the night. Qodem emulates the dialing directory and the 24 + terminal screen features of Qmodem over both modem and Internet 25 + connections. 26 + ''; 27 + maintainers = with maintainers; [ embr ]; 28 + license = licenses.publicDomain; 29 + }; 30 + }
+3 -3
pkgs/tools/security/b3sum/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "b3sum"; 5 - version = "1.2.0"; 6 7 src = fetchCrate { 8 inherit version pname; 9 - sha256 = "sha256-v6OCUXes8jaBh+sKqj1yCNOTb1NQY/ENGzKf5XWGZ3w="; 10 }; 11 12 - cargoSha256 = "sha256-y5QVgu716p8TFoEeWIzX9aJWeT3FKwlh5vUQkKR6pdE="; 13 14 meta = { 15 description = "BLAKE3 cryptographic hash function";
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "b3sum"; 5 + version = "1.3.0"; 6 7 src = fetchCrate { 8 inherit version pname; 9 + sha256 = "sha256-mnX5ZetwOo0VMBIOqJEBpqnSX6EqBEO7qwfgtGclReQ="; 10 }; 11 12 + cargoSha256 = "sha256-SUoreAuWLxtBWmFdLDviDz16oVDB2ubTY3a3m+t8xx0="; 13 14 meta = { 15 description = "BLAKE3 cryptographic hash function";
+2 -2
pkgs/tools/security/exploitdb/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "exploitdb"; 5 - version = "2022-01-06"; 6 7 src = fetchFromGitHub { 8 owner = "offensive-security"; 9 repo = pname; 10 rev = version; 11 - sha256 = "sha256-SvzrUVuOzqcc4YzBYxuE8S0tFNb2Pr2FEj8KSpuKKGU="; 12 }; 13 14 nativeBuildInputs = [ makeWrapper ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "exploitdb"; 5 + version = "2022-01-11"; 6 7 src = fetchFromGitHub { 8 owner = "offensive-security"; 9 repo = pname; 10 rev = version; 11 + sha256 = "sha256-uvjn/n+w5Zv/RwvQmE7bl4PFXdN2OO6FrrEVKdGNsgo="; 12 }; 13 14 nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/tools/security/gomapenum/default.nix
··· 5 6 buildGoModule rec { 7 pname = "gomapenum"; 8 - version = "1.0.0"; 9 10 src = fetchFromGitHub { 11 owner = "nodauf"; 12 repo = "GoMapEnum"; 13 rev = "v${version}"; 14 - sha256 = "sha256-6WZTmRse3mj1bimHE81JdSc4VKpMFbcJN3U4zgHMzJc="; 15 }; 16 17 vendorSha256 = "sha256-Z/uLZIPKd75P9nI7kTFOwzWFkRTVwUojYEQms4OJ6Bk=";
··· 5 6 buildGoModule rec { 7 pname = "gomapenum"; 8 + version = "1.0.2"; 9 10 src = fetchFromGitHub { 11 owner = "nodauf"; 12 repo = "GoMapEnum"; 13 rev = "v${version}"; 14 + sha256 = "sha256-6AwbG3rs3ZjCGpCDeesddXW63OOxsoWdRtueNx35K38="; 15 }; 16 17 vendorSha256 = "sha256-Z/uLZIPKd75P9nI7kTFOwzWFkRTVwUojYEQms4OJ6Bk=";
+3 -3
pkgs/tools/security/grype/default.nix
··· 2 3 buildGoModule rec { 4 pname = "grype"; 5 - version = "0.30.0"; 6 7 src = fetchFromGitHub { 8 owner = "anchore"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-nUNjC1NNscqv+cirC/4/FlrbOomBXxnOoHvCVpBUOUs="; 12 }; 13 14 - vendorSha256 = "sha256-XUj9Az/N/ZzCJF6a7EipPTntwlFYuVhg8JoS+GJES+w="; 15 16 nativeBuildInputs = [ installShellFiles ]; 17
··· 2 3 buildGoModule rec { 4 pname = "grype"; 5 + version = "0.31.1"; 6 7 src = fetchFromGitHub { 8 owner = "anchore"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-3V8qBgRIogZNisUshhs9Va9cbZ5D2hBJwqXPvqSmEWw="; 12 }; 13 14 + vendorSha256 = "sha256-/Z0tRzd7v84h8TSfbT4EqwyHWpAb30VNr4EDrNlHyd4="; 15 16 nativeBuildInputs = [ installShellFiles ]; 17
+3 -3
pkgs/tools/security/httpx/default.nix
··· 5 6 buildGoModule rec { 7 pname = "httpx"; 8 - version = "1.1.4"; 9 10 src = fetchFromGitHub { 11 owner = "projectdiscovery"; 12 repo = "httpx"; 13 rev = "v${version}"; 14 - sha256 = "sha256-Mis3DQwcTazHVF7hkTRQ2OtQxeGut5LRUAloBXCdq3s="; 15 }; 16 17 - vendorSha256 = "sha256-53Mvc637J306MJLw+l1amAuZhUE/NdDvuWEe0fg4Hog="; 18 19 meta = with lib; { 20 description = "Fast and multi-purpose HTTP toolkit";
··· 5 6 buildGoModule rec { 7 pname = "httpx"; 8 + version = "1.1.5"; 9 10 src = fetchFromGitHub { 11 owner = "projectdiscovery"; 12 repo = "httpx"; 13 rev = "v${version}"; 14 + sha256 = "sha256-XA099gBp52g0RUbbFSE8uFa7gh56bO8H66KaFAtK1RU="; 15 }; 16 17 + vendorSha256 = "sha256-rmuRZ8jRwSaAYgrOBgJwsEOAaUNJwhPJX9hEaJTX6/E="; 18 19 meta = with lib; { 20 description = "Fast and multi-purpose HTTP toolkit";
+2 -2
pkgs/tools/security/kubescape/default.nix
··· 6 7 buildGoModule rec { 8 pname = "kubescape"; 9 - version = "1.0.138"; 10 11 src = fetchFromGitHub { 12 owner = "armosec"; 13 repo = pname; 14 rev = "v${version}"; 15 - sha256 = "sha256-/Rp4eNlvlONiH3F6Zv9GDUF26tmSuhFGUL1MoKOFSEc="; 16 }; 17 18 nativeBuildInputs = [
··· 6 7 buildGoModule rec { 8 pname = "kubescape"; 9 + version = "1.0.139"; 10 11 src = fetchFromGitHub { 12 owner = "armosec"; 13 repo = pname; 14 rev = "v${version}"; 15 + sha256 = "sha256-CsIdr/+orDTGdEs4R069+PF3ZKuXx8uLxEsymFOLfOY="; 16 }; 17 18 nativeBuildInputs = [
+2 -2
pkgs/tools/system/thermald/default.nix
··· 18 19 stdenv.mkDerivation rec { 20 pname = "thermald"; 21 - version = "2.4.6"; 22 23 outputs = [ "out" "devdoc" ]; 24 ··· 26 owner = "intel"; 27 repo = "thermal_daemon"; 28 rev = "v${version}"; 29 - sha256 = "sha256-ZknZznoYVX3dNBIUvER6odv5eNrCV3//CXH1ypCf6tE="; 30 }; 31 32 nativeBuildInputs = [
··· 18 19 stdenv.mkDerivation rec { 20 pname = "thermald"; 21 + version = "2.4.7"; 22 23 outputs = [ "out" "devdoc" ]; 24 ··· 26 owner = "intel"; 27 repo = "thermal_daemon"; 28 rev = "v${version}"; 29 + sha256 = "sha256-1vRIpX4qH9QbinzZr//u7D9CZ6cUHirhXwnUuQyCEdg="; 30 }; 31 32 nativeBuildInputs = [
+10
pkgs/top-level/all-packages.nix
··· 2126 2127 badvpn = callPackage ../tools/networking/badvpn {}; 2128 2129 barcode = callPackage ../tools/graphics/barcode {}; 2130 2131 bashmount = callPackage ../tools/filesystems/bashmount {}; ··· 9050 9051 qmk = callPackage ../tools/misc/qmk { }; 9052 9053 qosmic = libsForQt5.callPackage ../applications/graphics/qosmic { }; 9054 9055 qownnotes = libsForQt514.callPackage ../applications/office/qownnotes { }; ··· 14894 itstool = callPackage ../development/tools/misc/itstool { }; 14895 14896 jam = callPackage ../development/tools/build-managers/jam { }; 14897 14898 javacc = callPackage ../development/tools/parsing/javacc { 14899 jdk = jdk8; ··· 30248 30249 ballerburg = callPackage ../games/ballerburg { } ; 30250 30251 colobot = callPackage ../games/colobot {}; 30252 30253 doom-bcc = callPackage ../games/zdoom/bcc-git.nix { }; ··· 31165 taisei = callPackage ../games/taisei { }; 31166 31167 tcl2048 = callPackage ../games/tcl2048 { }; 31168 31169 the-powder-toy = callPackage ../games/the-powder-toy { 31170 lua = lua5_1;
··· 2126 2127 badvpn = callPackage ../tools/networking/badvpn {}; 2128 2129 + baget = callPackage ../servers/web-apps/baget { }; 2130 + 2131 barcode = callPackage ../tools/graphics/barcode {}; 2132 2133 bashmount = callPackage ../tools/filesystems/bashmount {}; ··· 9052 9053 qmk = callPackage ../tools/misc/qmk { }; 9054 9055 + qodem = callPackage ../tools/networking/qodem { }; 9056 + 9057 qosmic = libsForQt5.callPackage ../applications/graphics/qosmic { }; 9058 9059 qownnotes = libsForQt514.callPackage ../applications/office/qownnotes { }; ··· 14898 itstool = callPackage ../development/tools/misc/itstool { }; 14899 14900 jam = callPackage ../development/tools/build-managers/jam { }; 14901 + 14902 + ftjam = callPackage ../development/tools/build-managers/jam/ftjam.nix { }; 14903 14904 javacc = callPackage ../development/tools/parsing/javacc { 14905 jdk = jdk8; ··· 30254 30255 ballerburg = callPackage ../games/ballerburg { } ; 30256 30257 + blockattack = callPackage ../games/blockattack { } ; 30258 + 30259 colobot = callPackage ../games/colobot {}; 30260 30261 doom-bcc = callPackage ../games/zdoom/bcc-git.nix { }; ··· 31173 taisei = callPackage ../games/taisei { }; 31174 31175 tcl2048 = callPackage ../games/tcl2048 { }; 31176 + 31177 + the-legend-of-edgar = callPackage ../games/the-legend-of-edgar { }; 31178 31179 the-powder-toy = callPackage ../games/the-powder-toy { 31180 lua = lua5_1;
+6
pkgs/top-level/python-packages.nix
··· 4215 4216 jsonstreams = callPackage ../development/python-modules/jsonstreams { }; 4217 4218 jug = callPackage ../development/python-modules/jug { }; 4219 4220 junitparser = callPackage ../development/python-modules/junitparser { }; ··· 9469 9470 synologydsm-api = callPackage ../development/python-modules/synologydsm-api { }; 9471 9472 systembridge = callPackage ../development/python-modules/systembridge { }; 9473 9474 systemd = callPackage ../development/python-modules/systemd { ··· 9939 types-toml = callPackage ../development/python-modules/types-toml { }; 9940 9941 types-typed-ast = callPackage ../development/python-modules/types-typed-ast { }; 9942 9943 typesentry = callPackage ../development/python-modules/typesentry { }; 9944
··· 4215 4216 jsonstreams = callPackage ../development/python-modules/jsonstreams { }; 4217 4218 + json-tricks = callPackage ../development/python-modules/json-tricks { }; 4219 + 4220 jug = callPackage ../development/python-modules/jug { }; 4221 4222 junitparser = callPackage ../development/python-modules/junitparser { }; ··· 9471 9472 synologydsm-api = callPackage ../development/python-modules/synologydsm-api { }; 9473 9474 + syslog-rfc5424-formatter = callPackage ../development/python-modules/syslog-rfc5424-formatter { }; 9475 + 9476 systembridge = callPackage ../development/python-modules/systembridge { }; 9477 9478 systemd = callPackage ../development/python-modules/systemd { ··· 9943 types-toml = callPackage ../development/python-modules/types-toml { }; 9944 9945 types-typed-ast = callPackage ../development/python-modules/types-typed-ast { }; 9946 + 9947 + types-urllib3 = callPackage ../development/python-modules/types-urllib3 { }; 9948 9949 typesentry = callPackage ../development/python-modules/typesentry { }; 9950