Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
eaa58396 050ad0cc

+576 -270
+1 -1
.github/workflows/periodic-merge-24h.yml
··· 11 11 on: 12 12 schedule: 13 13 # * is a special character in YAML so you have to quote this string 14 - # Merge every 6 hours 14 + # Merge every 24 hours 15 15 - cron: '0 0 * * *' 16 16 17 17 jobs:
+110
nixos/doc/manual/from_md/release-notes/rl-2111.section.xml
··· 339 339 release instead of the old 2.31.0 version. 340 340 </para> 341 341 </listitem> 342 + <listitem> 343 + <para> 344 + The <literal>bitwarden_rs</literal> packages and modules were 345 + renamed to <literal>vaultwarden</literal> 346 + <link xlink:href="https://github.com/dani-garcia/vaultwarden/discussions/1642">following 347 + upstream</link>. More specifically, 348 + </para> 349 + <itemizedlist> 350 + <listitem> 351 + <para> 352 + <literal>pkgs.bitwarden_rs</literal>, 353 + <literal>pkgs.bitwarden_rs-sqlite</literal>, 354 + <literal>pkgs.bitwarden_rs-mysql</literal> and 355 + <literal>pkgs.bitwarden_rs-postgresql</literal> were 356 + renamed to <literal>pkgs.vaultwarden</literal>, 357 + <literal>pkgs.vaultwarden-sqlite</literal>, 358 + <literal>pkgs.vaultwarden-mysql</literal> and 359 + <literal>pkgs.vaultwarden-postgresql</literal>, 360 + respectively. 361 + </para> 362 + <itemizedlist spacing="compact"> 363 + <listitem> 364 + <para> 365 + Old names are preserved as aliases for backwards 366 + compatibility, but may be removed in the future. 367 + </para> 368 + </listitem> 369 + <listitem> 370 + <para> 371 + The <literal>bitwarden_rs</literal> executable was 372 + also renamed to <literal>vaultwarden</literal> in all 373 + packages. 374 + </para> 375 + </listitem> 376 + </itemizedlist> 377 + </listitem> 378 + <listitem> 379 + <para> 380 + <literal>pkgs.bitwarden_rs-vault</literal> was renamed to 381 + <literal>pkgs.vaultwarden-vault</literal>. 382 + </para> 383 + <itemizedlist spacing="compact"> 384 + <listitem> 385 + <para> 386 + <literal>pkgs.bitwarden_rs-vault</literal> is 387 + preserved as an alias for backwards compatibility, but 388 + may be removed in the future. 389 + </para> 390 + </listitem> 391 + <listitem> 392 + <para> 393 + The static files were moved from 394 + <literal>/usr/share/bitwarden_rs</literal> to 395 + <literal>/usr/share/vaultwarden</literal>. 396 + </para> 397 + </listitem> 398 + </itemizedlist> 399 + </listitem> 400 + <listitem> 401 + <para> 402 + The <literal>services.bitwarden_rs</literal> config module 403 + was renamed to <literal>services.vaultwarden</literal>. 404 + </para> 405 + <itemizedlist spacing="compact"> 406 + <listitem> 407 + <para> 408 + <literal>services.bitwarden_rs</literal> is preserved 409 + as an alias for backwards compatibility, but may be 410 + removed in the future. 411 + </para> 412 + </listitem> 413 + </itemizedlist> 414 + </listitem> 415 + <listitem> 416 + <para> 417 + <literal>systemd.services.bitwarden_rs</literal>, 418 + <literal>systemd.services.backup-bitwarden_rs</literal> 419 + and <literal>systemd.timers.backup-bitwarden_rs</literal> 420 + were renamed to 421 + <literal>systemd.services.vaultwarden</literal>, 422 + <literal>systemd.services.backup-vaultwarden</literal> and 423 + <literal>systemd.timers.backup-vaultwarden</literal>, 424 + respectively. 425 + </para> 426 + <itemizedlist spacing="compact"> 427 + <listitem> 428 + <para> 429 + Old names are preserved as aliases for backwards 430 + compatibility, but may be removed in the future. 431 + </para> 432 + </listitem> 433 + </itemizedlist> 434 + </listitem> 435 + <listitem> 436 + <para> 437 + <literal>users.users.bitwarden_rs</literal> and 438 + <literal>users.groups.bitwarden_rs</literal> were renamed 439 + to <literal>users.users.vaultwarden</literal> and 440 + <literal>users.groups.vaultwarden</literal>, respectively. 441 + </para> 442 + </listitem> 443 + <listitem> 444 + <para> 445 + The data directory remains located at 446 + <literal>/var/lib/bitwarden_rs</literal>, for backwards 447 + compatibility. 448 + </para> 449 + </listitem> 450 + </itemizedlist> 451 + </listitem> 342 452 </itemizedlist> 343 453 </section> 344 454 <section xml:id="sec-release-21.11-notable-changes">
+26
nixos/doc/manual/release-notes/rl-2111.section.md
··· 85 85 * The `libwnck` package now defaults to the 3.x release instead of the 86 86 old 2.31.0 version. 87 87 88 + * The `bitwarden_rs` packages and modules were renamed to `vaultwarden` 89 + [following upstream](https://github.com/dani-garcia/vaultwarden/discussions/1642). More specifically, 90 + 91 + * `pkgs.bitwarden_rs`, `pkgs.bitwarden_rs-sqlite`, `pkgs.bitwarden_rs-mysql` and 92 + `pkgs.bitwarden_rs-postgresql` were renamed to `pkgs.vaultwarden`, `pkgs.vaultwarden-sqlite`, 93 + `pkgs.vaultwarden-mysql` and `pkgs.vaultwarden-postgresql`, respectively. 94 + * Old names are preserved as aliases for backwards compatibility, but may be removed in the future. 95 + * The `bitwarden_rs` executable was also renamed to `vaultwarden` in all packages. 96 + 97 + * `pkgs.bitwarden_rs-vault` was renamed to `pkgs.vaultwarden-vault`. 98 + * `pkgs.bitwarden_rs-vault` is preserved as an alias for backwards compatibility, but may be removed in the future. 99 + * The static files were moved from `/usr/share/bitwarden_rs` to `/usr/share/vaultwarden`. 100 + 101 + * The `services.bitwarden_rs` config module was renamed to `services.vaultwarden`. 102 + * `services.bitwarden_rs` is preserved as an alias for backwards compatibility, but may be removed in the future. 103 + 104 + * `systemd.services.bitwarden_rs`, `systemd.services.backup-bitwarden_rs` and `systemd.timers.backup-bitwarden_rs` 105 + were renamed to `systemd.services.vaultwarden`, `systemd.services.backup-vaultwarden` and 106 + `systemd.timers.backup-vaultwarden`, respectively. 107 + * Old names are preserved as aliases for backwards compatibility, but may be removed in the future. 108 + 109 + * `users.users.bitwarden_rs` and `users.groups.bitwarden_rs` were renamed to `users.users.vaultwarden` and 110 + `users.groups.vaultwarden`, respectively. 111 + 112 + * The data directory remains located at `/var/lib/bitwarden_rs`, for backwards compatibility. 113 + 88 114 ## Other Notable Changes {#sec-release-21.11-notable-changes} 89 115 90 116 - The setting [`services.openssh.logLevel`](options.html#opt-services.openssh.logLevel) `"VERBOSE"` `"INFO"`. This brings NixOS in line with upstream and other Linux distributions, and reduces log spam on servers due to bruteforcing botnets.
+1 -1
nixos/modules/module-list.nix
··· 874 874 ./services/search/hound.nix 875 875 ./services/search/kibana.nix 876 876 ./services/search/solr.nix 877 - ./services/security/bitwarden_rs/default.nix 878 877 ./services/security/certmgr.nix 879 878 ./services/security/cfssl.nix 880 879 ./services/security/clamav.nix ··· 900 899 ./services/security/torsocks.nix 901 900 ./services/security/usbguard.nix 902 901 ./services/security/vault.nix 902 + ./services/security/vaultwarden/default.nix 903 903 ./services/security/yubikey-agent.nix 904 904 ./services/system/cloud-init.nix 905 905 ./services/system/dbus.nix
+63 -34
nixos/modules/services/networking/coturn.nix
··· 16 16 ${lib.optionalString cfg.no-auth "no-auth"} 17 17 ${lib.optionalString cfg.use-auth-secret "use-auth-secret"} 18 18 ${lib.optionalString (cfg.static-auth-secret != null) ("static-auth-secret=${cfg.static-auth-secret}")} 19 + ${lib.optionalString (cfg.static-auth-secret-file != null) ("static-auth-secret=#static-auth-secret#")} 19 20 realm=${cfg.realm} 20 21 ${lib.optionalString cfg.no-udp "no-udp"} 21 22 ${lib.optionalString cfg.no-tcp "no-tcp"} ··· 182 183 by a separate program, so this is why that other mode is 'dynamic'. 183 184 ''; 184 185 }; 186 + static-auth-secret-file = mkOption { 187 + type = types.nullOr types.str; 188 + default = null; 189 + description = '' 190 + Path to the file containing the static authentication secret. 191 + ''; 192 + }; 185 193 realm = mkOption { 186 194 type = types.str; 187 195 default = config.networking.hostName; ··· 293 301 }; 294 302 }; 295 303 296 - config = mkIf cfg.enable { 297 - users.users.turnserver = 298 - { uid = config.ids.uids.turnserver; 299 - description = "coturn TURN server user"; 300 - }; 301 - users.groups.turnserver = 302 - { gid = config.ids.gids.turnserver; 303 - members = [ "turnserver" ]; 304 - }; 304 + config = mkIf cfg.enable (mkMerge ([ 305 + { assertions = [ 306 + { assertion = cfg.static-auth-secret != null -> cfg.static-auth-secret-file == null ; 307 + message = "static-auth-secret and static-auth-secret-file cannot be set at the same time"; 308 + } 309 + ];} 310 + 311 + { 312 + users.users.turnserver = 313 + { uid = config.ids.uids.turnserver; 314 + description = "coturn TURN server user"; 315 + }; 316 + users.groups.turnserver = 317 + { gid = config.ids.gids.turnserver; 318 + members = [ "turnserver" ]; 319 + }; 305 320 306 - systemd.services.coturn = { 307 - description = "coturn TURN server"; 308 - after = [ "network-online.target" ]; 309 - wants = [ "network-online.target" ]; 310 - wantedBy = [ "multi-user.target" ]; 321 + systemd.services.coturn = let 322 + runConfig = "/run/coturn/turnserver.cfg"; 323 + in { 324 + description = "coturn TURN server"; 325 + after = [ "network-online.target" ]; 326 + wants = [ "network-online.target" ]; 327 + wantedBy = [ "multi-user.target" ]; 311 328 312 - unitConfig = { 313 - Documentation = "man:coturn(1) man:turnadmin(1) man:turnserver(1)"; 314 - }; 329 + unitConfig = { 330 + Documentation = "man:coturn(1) man:turnadmin(1) man:turnserver(1)"; 331 + }; 315 332 316 - serviceConfig = { 317 - Type = "simple"; 318 - ExecStart = "${pkgs.coturn}/bin/turnserver -c ${configFile}"; 319 - RuntimeDirectory = "turnserver"; 320 - User = "turnserver"; 321 - Group = "turnserver"; 322 - AmbientCapabilities = 323 - mkIf ( 324 - cfg.listening-port < 1024 || 325 - cfg.alt-listening-port < 1024 || 326 - cfg.tls-listening-port < 1024 || 327 - cfg.alt-tls-listening-port < 1024 || 328 - cfg.min-port < 1024 329 - ) "cap_net_bind_service"; 330 - Restart = "on-abort"; 333 + preStart = '' 334 + cat ${configFile} > ${runConfig} 335 + ${optionalString (cfg.static-auth-secret-file != null) '' 336 + STATIC_AUTH_SECRET="$(head -n1 ${cfg.static-auth-secret-file} || :)" 337 + sed -e "s,#static-auth-secret#,$STATIC_AUTH_SECRET,g" \ 338 + -i ${runConfig} 339 + '' } 340 + chmod 640 ${runConfig} 341 + ''; 342 + serviceConfig = { 343 + Type = "simple"; 344 + ExecStart = "${pkgs.coturn}/bin/turnserver -c ${runConfig}"; 345 + RuntimeDirectory = "turnserver"; 346 + User = "turnserver"; 347 + Group = "turnserver"; 348 + AmbientCapabilities = 349 + mkIf ( 350 + cfg.listening-port < 1024 || 351 + cfg.alt-listening-port < 1024 || 352 + cfg.tls-listening-port < 1024 || 353 + cfg.alt-tls-listening-port < 1024 || 354 + cfg.min-port < 1024 355 + ) "cap_net_bind_service"; 356 + Restart = "on-abort"; 357 + }; 331 358 }; 332 - }; 333 - }; 359 + systemd.tmpfiles.rules = [ 360 + "d /run/coturn 0700 turnserver turnserver - -" 361 + ]; 362 + }])); 334 363 }
+1 -1
nixos/modules/services/security/bitwarden_rs/backup.sh nixos/modules/services/security/vaultwarden/backup.sh
··· 1 1 #!/usr/bin/env bash 2 2 3 - # Based on: https://github.com/dani-garcia/bitwarden_rs/wiki/Backing-up-your-vault 3 + # Based on: https://github.com/dani-garcia/vaultwarden/wiki/Backing-up-your-vault 4 4 if ! mkdir -p "$BACKUP_FOLDER"; then 5 5 echo "Could not create backup folder '$BACKUP_FOLDER'" >&2 6 6 exit 1
+32 -25
nixos/modules/services/security/bitwarden_rs/default.nix nixos/modules/services/security/vaultwarden/default.nix
··· 3 3 with lib; 4 4 5 5 let 6 - cfg = config.services.bitwarden_rs; 7 - user = config.users.users.bitwarden_rs.name; 8 - group = config.users.groups.bitwarden_rs.name; 6 + cfg = config.services.vaultwarden; 7 + user = config.users.users.vaultwarden.name; 8 + group = config.users.groups.vaultwarden.name; 9 9 10 10 # Convert name from camel case (e.g. disable2FARemember) to upper case snake case (e.g. DISABLE_2FA_REMEMBER). 11 11 nameToEnvVar = name: ··· 26 26 if value != null then [ (nameValuePair (nameToEnvVar name) (if isBool value then boolToString value else toString value)) ] else [] 27 27 ) cfg.config)); 28 28 in { DATA_FOLDER = "/var/lib/bitwarden_rs"; } // optionalAttrs (!(configEnv ? WEB_VAULT_ENABLED) || configEnv.WEB_VAULT_ENABLED == "true") { 29 - WEB_VAULT_FOLDER = "${pkgs.bitwarden_rs-vault}/share/bitwarden_rs/vault"; 29 + WEB_VAULT_FOLDER = "${pkgs.vaultwarden-vault}/share/vaultwarden/vault"; 30 30 } // configEnv; 31 31 32 - configFile = pkgs.writeText "bitwarden_rs.env" (concatStrings (mapAttrsToList (name: value: "${name}=${value}\n") configEnv)); 32 + configFile = pkgs.writeText "vaultwarden.env" (concatStrings (mapAttrsToList (name: value: "${name}=${value}\n") configEnv)); 33 33 34 - bitwarden_rs = pkgs.bitwarden_rs.override { inherit (cfg) dbBackend; }; 34 + vaultwarden = pkgs.vaultwarden.override { inherit (cfg) dbBackend; }; 35 35 36 36 in { 37 - options.services.bitwarden_rs = with types; { 38 - enable = mkEnableOption "bitwarden_rs"; 37 + imports = [ 38 + (mkRenamedOptionModule [ "services" "bitwarden_rs" ] [ "services" "vaultwarden" ]) 39 + ]; 40 + 41 + options.services.vaultwarden = with types; { 42 + enable = mkEnableOption "vaultwarden"; 39 43 40 44 dbBackend = mkOption { 41 45 type = enum [ "sqlite" "mysql" "postgresql" ]; 42 46 default = "sqlite"; 43 47 description = '' 44 - Which database backend bitwarden_rs will be using. 48 + Which database backend vaultwarden will be using. 45 49 ''; 46 50 }; 47 51 ··· 49 53 type = nullOr str; 50 54 default = null; 51 55 description = '' 52 - The directory under which bitwarden_rs will backup its persistent data. 56 + The directory under which vaultwarden will backup its persistent data. 53 57 ''; 54 58 }; 55 59 ··· 65 69 } 66 70 ''; 67 71 description = '' 68 - The configuration of bitwarden_rs is done through environment variables, 72 + The configuration of vaultwarden is done through environment variables, 69 73 therefore the names are converted from camel case (e.g. disable2FARemember) 70 74 to upper case snake case (e.g. DISABLE_2FA_REMEMBER). 71 75 In this conversion digits (0-9) are handled just like upper case characters, ··· 75 79 This allows working around any potential future conflicting naming conventions. 76 80 77 81 Based on the attributes passed to this config option an environment file will be generated 78 - that is passed to bitwarden_rs's systemd service. 82 + that is passed to vaultwarden's systemd service. 79 83 80 84 The available configuration options can be found in 81 - <link xlink:href="https://github.com/dani-garcia/bitwarden_rs/blob/${bitwarden_rs.version}/.env.template">the environment template file</link>. 85 + <link xlink:href="https://github.com/dani-garcia/vaultwarden/blob/${vaultwarden.version}/.env.template">the environment template file</link>. 82 86 ''; 83 87 }; 84 88 85 89 environmentFile = mkOption { 86 90 type = with types; nullOr path; 87 91 default = null; 88 - example = "/root/bitwarden_rs.env"; 92 + example = "/root/vaultwarden.env"; 89 93 description = '' 90 94 Additional environment file as defined in <citerefentry> 91 95 <refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum> ··· 95 99 may be passed to the service without adding them to the world-readable Nix store. 96 100 97 101 Note that this file needs to be available on the host on which 98 - <literal>bitwarden_rs</literal> is running. 102 + <literal>vaultwarden</literal> is running. 99 103 ''; 100 104 }; 101 105 }; ··· 106 110 message = "Backups for database backends other than sqlite will need customization"; 107 111 } ]; 108 112 109 - users.users.bitwarden_rs = { 113 + users.users.vaultwarden = { 110 114 inherit group; 111 115 isSystemUser = true; 112 116 }; 113 - users.groups.bitwarden_rs = { }; 117 + users.groups.vaultwarden = { }; 114 118 115 - systemd.services.bitwarden_rs = { 119 + systemd.services.vaultwarden = { 120 + aliases = [ "bitwarden_rs" ]; 116 121 after = [ "network.target" ]; 117 122 path = with pkgs; [ openssl ]; 118 123 serviceConfig = { 119 124 User = user; 120 125 Group = group; 121 126 EnvironmentFile = [ configFile ] ++ optional (cfg.environmentFile != null) cfg.environmentFile; 122 - ExecStart = "${bitwarden_rs}/bin/bitwarden_rs"; 127 + ExecStart = "${vaultwarden}/bin/vaultwarden"; 123 128 LimitNOFILE = "1048576"; 124 129 PrivateTmp = "true"; 125 130 PrivateDevices = "true"; ··· 131 136 wantedBy = [ "multi-user.target" ]; 132 137 }; 133 138 134 - systemd.services.backup-bitwarden_rs = mkIf (cfg.backupDir != null) { 135 - description = "Backup bitwarden_rs"; 139 + systemd.services.backup-vaultwarden = mkIf (cfg.backupDir != null) { 140 + aliases = [ "backup-bitwarden_rs" ]; 141 + description = "Backup vaultwarden"; 136 142 environment = { 137 143 DATA_FOLDER = "/var/lib/bitwarden_rs"; 138 144 BACKUP_FOLDER = cfg.backupDir; 139 145 }; 140 146 path = with pkgs; [ sqlite ]; 141 147 serviceConfig = { 142 - SyslogIdentifier = "backup-bitwarden_rs"; 148 + SyslogIdentifier = "backup-vaultwarden"; 143 149 Type = "oneshot"; 144 150 User = mkDefault user; 145 151 Group = mkDefault group; ··· 148 154 wantedBy = [ "multi-user.target" ]; 149 155 }; 150 156 151 - systemd.timers.backup-bitwarden_rs = mkIf (cfg.backupDir != null) { 152 - description = "Backup bitwarden_rs on time"; 157 + systemd.timers.backup-vaultwarden = mkIf (cfg.backupDir != null) { 158 + aliases = [ "backup-bitwarden_rs" ]; 159 + description = "Backup vaultwarden on time"; 153 160 timerConfig = { 154 161 OnCalendar = mkDefault "23:00"; 155 162 Persistent = "true"; 156 - Unit = "backup-bitwarden_rs.service"; 163 + Unit = "backup-vaultwarden.service"; 157 164 }; 158 165 wantedBy = [ "multi-user.target" ]; 159 166 };
+2 -1
nixos/tests/all-tests.nix
··· 42 42 bind = handleTest ./bind.nix {}; 43 43 bitcoind = handleTest ./bitcoind.nix {}; 44 44 bittorrent = handleTest ./bittorrent.nix {}; 45 - bitwarden = handleTest ./bitwarden.nix {}; 46 45 blockbook-frontend = handleTest ./blockbook-frontend.nix {}; 47 46 boot = handleTestOn ["x86_64-linux"] ./boot.nix {}; # syslinux is unsupported on aarch64 48 47 boot-stage1 = handleTest ./boot-stage1.nix {}; ··· 88 87 containers-tmpfs = handleTest ./containers-tmpfs.nix {}; 89 88 convos = handleTest ./convos.nix {}; 90 89 corerad = handleTest ./corerad.nix {}; 90 + coturn = handleTest ./coturn.nix {}; 91 91 couchdb = handleTest ./couchdb.nix {}; 92 92 cri-o = handleTestOn ["x86_64-linux"] ./cri-o.nix {}; 93 93 custom-ca = handleTest ./custom-ca.nix {}; ··· 446 446 v2ray = handleTest ./v2ray.nix {}; 447 447 vault = handleTest ./vault.nix {}; 448 448 vault-postgresql = handleTest ./vault-postgresql.nix {}; 449 + vaultwarden = handleTest ./vaultwarden.nix {}; 449 450 vector = handleTest ./vector.nix {}; 450 451 victoriametrics = handleTest ./victoriametrics.nix {}; 451 452 virtualbox = handleTestOn ["x86_64-linux"] ./virtualbox.nix {};
+10 -10
nixos/tests/bitwarden.nix nixos/tests/vaultwarden.nix
··· 4 4 }: 5 5 6 6 # These tests will: 7 - # * Set up a bitwarden-rs server 7 + # * Set up a vaultwarden server 8 8 # * Have Firefox use the web vault to create an account, log in, and save a password to the valut 9 9 # * Have the bw cli log in and read that password from the vault 10 10 # ··· 24 24 25 25 storedPassword = "seeeecret"; 26 26 27 - makeBitwardenTest = backend: makeTest { 28 - name = "bitwarden_rs-${backend}"; 27 + makeVaultwardenTest = backend: makeTest { 28 + name = "vaultwarden-${backend}"; 29 29 meta = { 30 30 maintainers = with pkgs.lib.maintainers; [ jjjollyjim ]; 31 31 }; ··· 45 45 package = pkgs.mariadb; 46 46 }; 47 47 48 - services.bitwarden_rs.config.databaseUrl = "mysql://bitwardenuser:${dbPassword}@localhost/bitwarden"; 48 + services.vaultwarden.config.databaseUrl = "mysql://bitwardenuser:${dbPassword}@localhost/bitwarden"; 49 49 50 - systemd.services.bitwarden_rs.after = [ "mysql.service" ]; 50 + systemd.services.vaultwarden.after = [ "mysql.service" ]; 51 51 }; 52 52 53 53 postgresql = { ··· 60 60 ''; 61 61 }; 62 62 63 - services.bitwarden_rs.config.databaseUrl = "postgresql://bitwardenuser:${dbPassword}@localhost/bitwarden"; 63 + services.vaultwarden.config.databaseUrl = "postgresql://bitwardenuser:${dbPassword}@localhost/bitwarden"; 64 64 65 - systemd.services.bitwarden_rs.after = [ "postgresql.service" ]; 65 + systemd.services.vaultwarden.after = [ "postgresql.service" ]; 66 66 }; 67 67 68 68 sqlite = { }; ··· 71 71 mkMerge [ 72 72 backendConfig.${backend} 73 73 { 74 - services.bitwarden_rs = { 74 + services.vaultwarden = { 75 75 enable = true; 76 76 dbBackend = backend; 77 77 config.rocketPort = 80; ··· 152 152 153 153 testScript = '' 154 154 start_all() 155 - server.wait_for_unit("bitwarden_rs.service") 155 + server.wait_for_unit("vaultwarden.service") 156 156 server.wait_for_open_port(80) 157 157 158 158 with subtest("configure the cli"): ··· 184 184 in 185 185 builtins.listToAttrs ( 186 186 map 187 - (backend: { name = backend; value = makeBitwardenTest backend; }) 187 + (backend: { name = backend; value = makeVaultwardenTest backend; }) 188 188 backends 189 189 )
+29
nixos/tests/coturn.nix
··· 1 + import ./make-test-python.nix ({ ... }: { 2 + name = "coturn"; 3 + nodes = { 4 + default = { 5 + services.coturn.enable = true; 6 + }; 7 + secretsfile = { 8 + boot.postBootCommands = '' 9 + echo "some-very-secret-string" > /run/coturn-secret 10 + ''; 11 + services.coturn = { 12 + enable = true; 13 + static-auth-secret-file = "/run/coturn-secret"; 14 + }; 15 + }; 16 + }; 17 + 18 + testScript = 19 + '' 20 + start_all() 21 + 22 + with subtest("by default works without configuration"): 23 + default.wait_for_unit("coturn.service") 24 + 25 + with subtest("works with static-auth-secret-file"): 26 + secretsfile.wait_for_unit("coturn.service") 27 + secretsfile.succeed("grep 'some-very-secret-string' /run/coturn/turnserver.cfg") 28 + ''; 29 + })
+1 -1
pkgs/applications/graphics/drawio/default.nix
··· 91 91 homepage = "https://about.draw.io/"; 92 92 license = licenses.asl20; 93 93 changelog = "https://github.com/jgraph/drawio-desktop/releases/tag/v${version}"; 94 - maintainers = with maintainers; [ danieldk ]; 94 + maintainers = with maintainers; [ ]; 95 95 platforms = [ "x86_64-linux" ]; 96 96 }; 97 97 }
+1 -1
pkgs/applications/misc/1password-gui/default.nix
··· 107 107 description = "Multi-platform password manager"; 108 108 homepage = "https://1password.com/"; 109 109 license = licenses.unfree; 110 - maintainers = with maintainers; [ danieldk timstott savannidgerinel ]; 110 + maintainers = with maintainers; [ timstott savannidgerinel ]; 111 111 platforms = [ "x86_64-linux" ]; 112 112 }; 113 113 }
+36
pkgs/applications/misc/otpclient/default.nix
··· 1 + { stdenv 2 + , lib 3 + , fetchFromGitHub 4 + , cmake 5 + , pkg-config 6 + , gtk3 7 + , wrapGAppsHook 8 + , jansson 9 + , libgcrypt 10 + , libzip 11 + , libpng 12 + , libcotp 13 + , zbar 14 + }: 15 + 16 + stdenv.mkDerivation rec { 17 + pname = "otpclient"; 18 + version = "2.4.4"; 19 + 20 + src = fetchFromGitHub { 21 + owner = "paolostivanin"; 22 + repo = pname; 23 + rev = "v${version}"; 24 + sha256 = "0zjvhcx9q8nsf97zikddxriky0kghi4j4i7312s94pl8c7kb4abr"; 25 + }; 26 + 27 + buildInputs = [ gtk3 jansson libgcrypt libzip libpng libcotp zbar ]; 28 + nativeBuildInputs = [ cmake pkg-config wrapGAppsHook ]; 29 + 30 + meta = with lib; { 31 + description = "Highly secure and easy to use OTP client written in C/GTK that supports both TOTP and HOTP"; 32 + homepage = "https://github.com/paolostivanin/OTPClient"; 33 + license = licenses.gpl3Only; 34 + maintainers = with maintainers; [ alexbakker ]; 35 + }; 36 + }
+1 -1
pkgs/applications/networking/browsers/chromium/browser.nix
··· 62 62 -e '/\[Desktop Entry\]/a\' \ 63 63 -e 'StartupWMClass=chromium-browser' \ 64 64 $out/share/applications/chromium-browser.desktop 65 - '' + lib.optionalString (channel == "dev") '' 65 + '' + lib.optionalString (channel != "stable") '' 66 66 cp -v "$buildPath/crashpad_handler" "$libExecPath/" 67 67 ''; 68 68
+3 -3
pkgs/applications/networking/dnscontrol/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "dnscontrol"; 5 - version = "3.10.0"; 5 + version = "3.10.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "StackExchange"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-22wYc6W4a5P9+JW7NW+s85IlQ+tfLhYzDarN6PGkFk4="; 11 + sha256 = "sha256-fYQqH/J027XJPML/qKMpuu2Nxuvb0cyjOu2czLH8SoM="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-TPvO/E/uOyVSMNRQ3zzt15+i0UK0uHvI4qM5PqmHY20="; 14 + vendorSha256 = "sha256-225TR9jTZSGEJZz3csl/pR/v2unUK67l08x5ESQTJzA="; 15 15 16 16 subPackages = [ "." ]; 17 17
+1 -1
pkgs/applications/office/softmaker/generic.nix
··· 123 123 description = "An office suite with a word processor, spreadsheet and presentation program"; 124 124 homepage = "https://www.softmaker.com/"; 125 125 license = licenses.unfree; 126 - maintainers = with maintainers; [ danieldk ]; 126 + maintainers = with maintainers; [ ]; 127 127 platforms = [ "x86_64-linux" ]; 128 128 }; 129 129 }
+2 -2
pkgs/applications/office/super-productivity/default.nix
··· 5 5 in 6 6 stdenv.mkDerivation rec { 7 7 pname = "super-productivity"; 8 - version = "6.5.2"; 8 + version = "7.2.1"; 9 9 10 10 src = fetchurl { 11 11 url = "https://github.com/johannesjo/super-productivity/releases/download/v${version}/superProductivity-${version}.AppImage"; 12 - sha256 = "1ivl7chsv9axgk6nqkf580pav651hchi3di0mrp0pylpsqgk6f1f"; 12 + sha256 = "93eeb56fe923c48a9384cde0633e98a9d9dc5c0869fce63b9724ff74bb400049"; 13 13 name = "${pname}-${version}.AppImage"; 14 14 }; 15 15
+3 -3
pkgs/applications/system/glances/default.nix
··· 9 9 10 10 buildPythonApplication rec { 11 11 pname = "glances"; 12 - version = "3.1.7"; 12 + version = "3.2.0"; 13 13 disabled = isPyPy; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "nicolargo"; 17 17 repo = "glances"; 18 18 rev = "v${version}"; 19 - sha256 = "sha256-82ZD32dqRYGbGM/uyaJ5VqVZbhDZthiEcTihkV43JOU="; 19 + sha256 = "126xpx8i85giy3hkhqh0qcln9i1qj5bfciaqh9486rkl54xm8zsr"; 20 20 }; 21 21 22 22 # Some tests fail in the sandbox (they e.g. require access to /sys/class/power_supply): ··· 48 48 meta = with lib; { 49 49 homepage = "https://nicolargo.github.io/glances/"; 50 50 description = "Cross-platform curses-based monitoring tool"; 51 - changelog = "https://github.com/nicolargo/glances/releases/tag/v${version}"; 51 + changelog = "https://github.com/nicolargo/glances/blob/v${version}/NEWS.rst"; 52 52 license = licenses.lgpl3Only; 53 53 maintainers = with maintainers; [ jonringer primeos koral ]; 54 54 };
+1 -1
pkgs/applications/video/makemkv/default.nix
··· 72 72 license = licenses.unfree; 73 73 homepage = "http://makemkv.com"; 74 74 platforms = [ "x86_64-linux" ]; 75 - maintainers = with maintainers; [ danieldk titanous ]; 75 + maintainers = with maintainers; [ titanous ]; 76 76 }; 77 77 }
+2 -2
pkgs/applications/window-managers/sway/idle.nix
··· 1 1 { lib, stdenv, fetchFromGitHub 2 - , meson, ninja, pkg-config, scdoc 2 + , meson, ninja, pkg-config, scdoc, wayland-scanner 3 3 , wayland, wayland-protocols, systemd 4 4 }: 5 5 ··· 19 19 --replace "version: '1.5'" "version: '${version}'" 20 20 ''; 21 21 22 - nativeBuildInputs = [ meson ninja pkg-config scdoc ]; 22 + nativeBuildInputs = [ meson ninja pkg-config scdoc wayland-scanner ]; 23 23 buildInputs = [ wayland wayland-protocols systemd ]; 24 24 25 25 mesonFlags = [ "-Dman-pages=enabled" "-Dlogind=enabled" ];
+2 -2
pkgs/applications/window-managers/sway/lock.nix
··· 1 1 { lib, stdenv, fetchFromGitHub 2 - , meson, ninja, pkg-config, scdoc 2 + , meson, ninja, pkg-config, scdoc, wayland-scanner 3 3 , wayland, wayland-protocols, libxkbcommon, cairo, gdk-pixbuf, pam 4 4 }: 5 5 ··· 19 19 --replace "version: '1.4'" "version: '${version}'" 20 20 ''; 21 21 22 - nativeBuildInputs = [ meson ninja pkg-config scdoc ]; 22 + nativeBuildInputs = [ meson ninja pkg-config scdoc wayland-scanner ]; 23 23 buildInputs = [ wayland wayland-protocols libxkbcommon cairo gdk-pixbuf pam ]; 24 24 25 25 mesonFlags = [
+2 -1
pkgs/build-support/docker/default.nix
··· 117 117 --tmpdir=$TMPDIR \ 118 118 --override-os ${os} \ 119 119 --override-arch ${arch} \ 120 - copy "$sourceURL" "docker-archive://$out:$destNameTag" 120 + copy "$sourceURL" "docker-archive://$out:$destNameTag" \ 121 + | cat # pipe through cat to force-disable progress bar 121 122 ''; 122 123 123 124 # We need to sum layer.tar, not a directory, hence tarsum instead of nix-hash.
+1 -1
pkgs/data/misc/fedora-backgrounds/generic.nix
··· 38 38 description = "A set of default and supplemental wallpapers for Fedora"; 39 39 license = licenses.cc-by-sa-40; 40 40 platforms = platforms.unix; 41 - maintainers = with maintainers; [ danieldk ]; 41 + maintainers = with maintainers; [ ]; 42 42 }; 43 43 }
+1 -1
pkgs/development/compilers/llvm/rocm/clang.nix
··· 65 65 description = "ROCm fork of the clang C/C++/Objective-C/Objective-C++ LLVM compiler frontend"; 66 66 homepage = "https://llvm.org/"; 67 67 license = with licenses; [ ncsa ]; 68 - maintainers = with maintainers; [ danieldk ]; 68 + maintainers = with maintainers; [ ]; 69 69 platforms = platforms.linux; 70 70 }; 71 71 }
+1 -1
pkgs/development/compilers/llvm/rocm/lld/default.nix
··· 39 39 description = "ROCm fork of the LLVM Linker"; 40 40 homepage = "https://github.com/RadeonOpenCompute/llvm-project"; 41 41 license = licenses.ncsa; 42 - maintainers = with maintainers; [ danieldk ]; 42 + maintainers = with maintainers; [ ]; 43 43 platforms = platforms.linux; 44 44 }; 45 45 }
+1 -1
pkgs/development/compilers/llvm/rocm/llvm/default.nix
··· 91 91 description = "ROCm fork of the LLVM compiler infrastructure"; 92 92 homepage = "https://github.com/RadeonOpenCompute/llvm-project"; 93 93 license = with licenses; [ ncsa ]; 94 - maintainers = with maintainers; [ danieldk ]; 94 + maintainers = with maintainers; [ ]; 95 95 platforms = platforms.linux; 96 96 }; 97 97 }
+2
pkgs/development/haskell-modules/generic-builder.nix
··· 53 53 , enableParallelBuilding ? true 54 54 , maintainers ? null 55 55 , changelog ? null 56 + , mainProgram ? null 56 57 , doCoverage ? false 57 58 , doHaddock ? !(ghc.isHaLVM or false) 58 59 , passthru ? {} ··· 666 667 // optionalAttrs (args ? hydraPlatforms) { inherit hydraPlatforms; } 667 668 // optionalAttrs (args ? badPlatforms) { inherit badPlatforms; } 668 669 // optionalAttrs (args ? changelog) { inherit changelog; } 670 + // optionalAttrs (args ? mainProgram) { inherit mainProgram; } 669 671 ; 670 672 671 673 }
+1 -1
pkgs/development/libraries/amdvlk/default.nix
··· 85 85 changelog = "https://github.com/GPUOpen-Drivers/AMDVLK/releases/tag/v-${version}"; 86 86 license = licenses.mit; 87 87 platforms = [ "x86_64-linux" "i686-linux" ]; 88 - maintainers = with maintainers; [ danieldk Flakebi ]; 88 + maintainers = with maintainers; [ Flakebi ]; 89 89 }; 90 90 }
+22
pkgs/development/libraries/libbaseencode/default.nix
··· 1 + { stdenv, lib, fetchFromGitHub, cmake }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "libbaseencode"; 5 + version = "1.0.11"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "paolostivanin"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "1f52yh052z8k90d1ag6nk01p1gf4i1zxp1daw8mashs8avqr2m7g"; 12 + }; 13 + 14 + nativeBuildInputs = [ cmake ]; 15 + 16 + meta = with lib; { 17 + description = "Library written in C for encoding and decoding data using base32 or base64 (RFC-4648)"; 18 + homepage = "https://github.com/paolostivanin/libbaseencode"; 19 + license = licenses.asl20; 20 + maintainers = with maintainers; [ alexbakker ]; 21 + }; 22 + }
+23
pkgs/development/libraries/libcotp/default.nix
··· 1 + { stdenv, lib, fetchFromGitHub, cmake, pkg-config, libgcrypt, libbaseencode }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "libcotp"; 5 + version = "1.2.3"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "paolostivanin"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "1qq4shwiz1if9vys052dnsbm4dfw1ynlj6nsb0v4zjly3ndspfsk"; 12 + }; 13 + 14 + buildInputs = [ libbaseencode libgcrypt ]; 15 + nativeBuildInputs = [ cmake pkg-config ]; 16 + 17 + meta = with lib; { 18 + description = "C library that generates TOTP and HOTP"; 19 + homepage = "https://github.com/paolostivanin/libcotp"; 20 + license = licenses.asl20; 21 + maintainers = with maintainers; [ alexbakker ]; 22 + }; 23 + }
+1 -1
pkgs/development/libraries/rocclr/default.nix
··· 55 55 description = "Radeon Open Compute common language runtime"; 56 56 homepage = "https://github.com/ROCm-Developer-Tools/ROCclr"; 57 57 license = licenses.mit; 58 - maintainers = with maintainers; [ danieldk ]; 58 + maintainers = with maintainers; [ ]; 59 59 # rocclr seems to have some AArch64 ifdefs, but does not seem 60 60 # to be supported yet by the build infrastructure. Recheck in 61 61 # the future.
+1 -1
pkgs/development/libraries/rocm-comgr/default.nix
··· 40 40 description = "APIs for compiling and inspecting AMDGPU code objects"; 41 41 homepage = "https://github.com/RadeonOpenCompute/ROCm-CompilerSupport/tree/amd-stg-open/lib/comgr"; 42 42 license = licenses.ncsa; 43 - maintainers = with maintainers; [ danieldk ]; 43 + maintainers = with maintainers; [ ]; 44 44 platforms = platforms.linux; 45 45 }; 46 46 }
+1 -1
pkgs/development/libraries/rocm-device-libs/default.nix
··· 34 34 description = "Set of AMD-specific device-side language runtime libraries"; 35 35 homepage = "https://github.com/RadeonOpenCompute/ROCm-Device-Libs"; 36 36 license = licenses.ncsa; 37 - maintainers = with maintainers; [ danieldk ]; 37 + maintainers = with maintainers; [ ]; 38 38 platforms = platforms.linux; 39 39 }; 40 40 }
+1 -1
pkgs/development/libraries/rocm-opencl-icd/default.nix
··· 14 14 meta = with lib; { 15 15 description = "OpenCL ICD definition for AMD GPUs using the ROCm stack"; 16 16 license = licenses.mit; 17 - maintainers = with maintainers; [ danieldk ]; 17 + maintainers = with maintainers; [ ]; 18 18 platforms = platforms.linux; 19 19 }; 20 20 }
+1 -1
pkgs/development/libraries/rocm-opencl-runtime/default.nix
··· 77 77 description = "OpenCL runtime for AMD GPUs, part of the ROCm stack"; 78 78 homepage = "https://github.com/RadeonOpenCompute/ROCm-OpenCL-Runtime"; 79 79 license = with licenses; [ asl20 mit ]; 80 - maintainers = with maintainers; [ danieldk ]; 80 + maintainers = with maintainers; [ ]; 81 81 platforms = platforms.linux; 82 82 }; 83 83 }
+1 -1
pkgs/development/libraries/rocm-runtime/default.nix
··· 43 43 description = "Platform runtime for ROCm"; 44 44 homepage = "https://github.com/RadeonOpenCompute/ROCR-Runtime"; 45 45 license = with licenses; [ ncsa ]; 46 - maintainers = with maintainers; [ danieldk ]; 46 + maintainers = with maintainers; [ ]; 47 47 }; 48 48 }
+1 -1
pkgs/development/libraries/rocm-thunk/default.nix
··· 32 32 description = "Radeon open compute thunk interface"; 33 33 homepage = "https://github.com/RadeonOpenCompute/ROCT-Thunk-Interface"; 34 34 license = with licenses; [ bsd2 mit ]; 35 - maintainers = with maintainers; [ danieldk ]; 35 + maintainers = with maintainers; [ ]; 36 36 }; 37 37 }
-52
pkgs/development/python-modules/dftfit/default.nix
··· 1 - { lib 2 - , fetchPypi 3 - , buildPythonPackage 4 - , pymatgen 5 - , marshmallow 6 - , pyyaml 7 - , pygmo 8 - , pandas 9 - , scipy 10 - , numpy 11 - , scikit-learn 12 - , lammps-cython 13 - , pymatgen-lammps 14 - , pytestrunner 15 - , isPy3k 16 - }: 17 - 18 - buildPythonPackage rec { 19 - pname = "dftfit"; 20 - version = "0.5.1"; 21 - disabled = (!isPy3k); 22 - 23 - src = fetchPypi { 24 - inherit pname version; 25 - sha256 = "4dcbde48948835dcf2d49d6628c9df5747a8ec505d517e374b8d6c7fe95892df"; 26 - }; 27 - 28 - buildInputs = [ pytestrunner ]; 29 - propagatedBuildInputs = [ 30 - pymatgen 31 - marshmallow 32 - pyyaml 33 - pygmo 34 - pandas 35 - scipy 36 - numpy 37 - scikit-learn 38 - lammps-cython 39 - pymatgen-lammps 40 - ]; 41 - 42 - # tests require git lfs download. and is quite large so skip tests 43 - doCheck = false; 44 - pythonImportsCheck = [ "dftfit" ]; 45 - 46 - meta = { 47 - description = "Ab-Initio Molecular Dynamics Potential Development"; 48 - homepage = "https://gitlab.com/costrouc/dftfit"; 49 - license = lib.licenses.mit; 50 - maintainers = with lib.maintainers; [ costrouc ]; 51 - }; 52 - }
+2 -2
pkgs/development/python-modules/enaml/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "enaml"; 15 - version = "0.11.2"; 15 + version = "0.13.0"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "nucleic"; 19 19 repo = pname; 20 20 rev = version; 21 - sha256 = "1in5qa5j96qs3gsv8yaxs1l6dbm69xhzvc0pbzg0dd9kpqxfdy1j"; 21 + sha256 = "sha256-8ZahvFDYW7xUTSTZP1UXnQBCg9RVUywoO7EbqtTQPJI="; 22 22 }; 23 23 24 24 # qt bindings cannot be found during tests
-53
pkgs/development/python-modules/lammps-cython/default.nix
··· 1 - { lib 2 - , fetchurl 3 - , buildPythonPackage 4 - , lammps-mpi 5 - , mpi 6 - , mpi4py 7 - , numpy 8 - , cython 9 - , pymatgen 10 - , ase 11 - , pytestrunner 12 - , isPy3k 13 - }: 14 - 15 - buildPythonPackage rec { 16 - pname = "lammps-cython"; 17 - version = "0.5.7"; 18 - disabled = (!isPy3k); 19 - 20 - src = fetchurl { 21 - url = "https://gitlab.com/costrouc/${pname}/-/archive/v${version}/${pname}-v${version}.tar.gz"; 22 - sha256 = "1wj9scmjdl00af13b5ihfccrjpikrdgkzd88ialam1nkxvxi42bl"; 23 - }; 24 - 25 - buildInputs = [ cython pytestrunner ]; 26 - propagatedBuildInputs = [ mpi4py pymatgen ase numpy ]; 27 - 28 - preBuild = '' 29 - echo "Creating lammps.cfg file..." 30 - cat << EOF > lammps.cfg 31 - [lammps] 32 - lammps_include_dir = ${lammps-mpi}/include 33 - lammps_library_dir = ${lammps-mpi}/lib 34 - lammps_library = lammps_mpi 35 - 36 - [mpi] 37 - mpi_include_dir = ${mpi}/include 38 - mpi_library_dir = ${mpi}/lib 39 - mpi_library = mpi 40 - EOF 41 - ''; 42 - 43 - pythonImportsCheck = [ "lammps" ]; 44 - 45 - meta = { 46 - description = "Pythonic Wrapper to LAMMPS using cython"; 47 - homepage = "https://gitlab.com/costrouc/lammps-cython"; 48 - license = lib.licenses.mit; 49 - maintainers = with lib.maintainers; [ costrouc ]; 50 - # fails import check 51 - broken = true; 52 - }; 53 - }
+1 -1
pkgs/development/python-modules/selenium/default.nix
··· 49 49 ''; 50 50 51 51 passthru.tests = { 52 - testing-bitwarden = nixosTests.bitwarden; 52 + testing-vaultwarden = nixosTests.vaultwarden; 53 53 }; 54 54 55 55 meta = with lib; {
+2 -2
pkgs/development/python-modules/zha-quirks/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "zha-quirks"; 12 - version = "0.0.57"; 12 + version = "0.0.58"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "zigpy"; 16 16 repo = "zha-device-handlers"; 17 17 rev = version; 18 - sha256 = "sha256-ajdluj6UIzjJUK30GtoM+e5lsMQRKnn3FPNEg+RS/DM="; 18 + sha256 = "sha256-QU5ssbnT3/gioQ3vM9zvlbwxqSWyKIylsV9NuFkNe+Q="; 19 19 }; 20 20 21 21 propagatedBuildInputs = [
+1 -1
pkgs/development/tools/build-managers/rocm-cmake/default.nix
··· 17 17 description = "CMake modules for common build tasks for the ROCm stack"; 18 18 homepage = "https://github.com/RadeonOpenCompute/rocm-cmake"; 19 19 license = licenses.mit; 20 - maintainers = with maintainers; [ danieldk ]; 20 + maintainers = with maintainers; [ ]; 21 21 platforms = platforms.unix; 22 22 }; 23 23 }
+2 -5
pkgs/development/tools/open-policy-agent/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "open-policy-agent"; 5 - version = "0.29.4"; 5 + version = "0.30.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "open-policy-agent"; ··· 10 10 rev = "v${version}"; 11 11 sha256 = "sha256-AjNr+t30ftF92+cEfvt8iHBDVD/SO52ojJRLAkYF9l4="; 12 12 }; 13 - 14 13 vendorSha256 = null; 15 14 16 15 subPackages = [ "." ]; 17 16 18 - preBuild = '' 19 - buildFlagsArray+=("-ldflags" "-s -w -X github.com/open-policy-agent/opa/version.Version=${version}") 20 - ''; 17 + ldflags = [ "-s" "-w" "-X github.com/open-policy-agent/opa/version.Version=${version}" ]; 21 18 22 19 doInstallCheck = true; 23 20 installCheckPhase = ''
+32
pkgs/development/tools/tapview/default.nix
··· 1 + { asciidoctor 2 + , fetchFromGitLab 3 + , lib 4 + , stdenv 5 + }: 6 + 7 + stdenv.mkDerivation rec { 8 + pname = "tapview"; 9 + version = "1.1"; 10 + 11 + nativeBuildInputs = [ asciidoctor ]; 12 + 13 + src = fetchFromGitLab { 14 + owner = "esr"; 15 + repo = pname; 16 + rev = version; 17 + sha256 = "sha256-inrxICNglZU/tup+YnHaDiVss32K2OXht/7f8lOZI4g="; 18 + }; 19 + 20 + # Remove unecessary `echo` checks: `/bin/echo` fails, and `echo -n` works as expected. 21 + patches = [ ./dont_check_echo.patch ]; 22 + 23 + makeFlags = [ "prefix=$(out)" ]; 24 + 25 + meta = with lib; { 26 + description = "A minimalist pure consumer for TAP (Test Anything Protocol)"; 27 + homepage = "https://gitlab.com/esr/tapview"; 28 + license = licenses.bsd2; 29 + platforms = platforms.all; 30 + maintainers = with maintainers; [ pamplemousse ]; 31 + }; 32 + }
+44
pkgs/development/tools/tapview/dont_check_echo.patch
··· 1 + diff --git a/tapview b/tapview 2 + index ad6a33a66d1..4cf9545d42f 100644 3 + --- a/tapview 4 + +++ b/tapview 5 + @@ -13,21 +13,6 @@ 6 + # 7 + # This is version 1.1 8 + # A newer version may be available at https://gitlab.com/esr/tapview 9 + -# 10 + -# POSIX allows but does not mandate that -n suppresses emission of a 11 + -# trailing newline in echo. Thus, some shell builtin echos don't do 12 + -# that. Cope gracefully. 13 + -# shellcheck disable=SC2039 14 + -if [ "$(echo -n "a"; echo "b")" != "ab" ] 15 + -then 16 + - ECHO="echo" 17 + -elif [ "$(/bin/echo -n "a"; /bin/echo "b")" = "ab" ] 18 + -then 19 + - ECHO="/bin/echo" 20 + -else 21 + - echo "tapview: bailing out, your echo lacks -n support." 22 + - exit 3 23 + -fi 24 + 25 + OK="." 26 + FAIL="F" 27 + @@ -37,7 +22,7 @@ TODO_OK="u" 28 + 29 + ship_char() { 30 + # shellcheck disable=SC2039 31 + - "${ECHO}" -n "$1" 32 + + echo -n "$1" 33 + } 34 + 35 + ship_line() { 36 + @@ -155,7 +140,7 @@ do 37 + fi 38 + done 39 + 40 + -/bin/echo "" 41 + +echo "" 42 + 43 + if [ -z "$expect" ] 44 + then
+2 -2
pkgs/os-specific/linux/bpftrace/default.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "bpftrace"; 9 - version = "0.12.1"; 9 + version = "0.13.0"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "iovisor"; 13 13 repo = "bpftrace"; 14 14 rev = "v${version}"; 15 - sha256 = "sha256-DZO47AH506DBVH/AuvOF3JfpRxv/D/lmzVg8WOH9Dqo="; 15 + sha256 = "sha256-BKWBdFzj0j7rAfG30A0fwyYCpOG/5NFRPODW46EP1u0="; 16 16 }; 17 17 18 18 buildInputs = with llvmPackages;
+3
pkgs/servers/coturn/default.nix
··· 8 8 , libprom 9 9 , libpromhttp 10 10 , libmicrohttpd 11 + , nixosTests 11 12 }: 12 13 13 14 stdenv.mkDerivation rec { ··· 33 34 patches = [ 34 35 ./pure-configure.patch 35 36 ]; 37 + 38 + passthru.tests.coturn = nixosTests.coturn; 36 39 37 40 meta = with lib; { 38 41 homepage = "https://coturn.net/";
+7 -13
pkgs/servers/sip/freeswitch/default.nix
··· 1 - { fetchFromGitHub, fetchpatch, stdenv, lib, pkg-config, autoreconfHook 1 + { fetchFromGitHub, stdenv, lib, pkg-config, autoreconfHook 2 2 , ncurses, gnutls, readline 3 3 , openssl, perl, sqlite, libjpeg, speex, pcre, libuuid 4 4 , ldns, libedit, yasm, which, libsndfile, libtiff ··· 88 88 89 89 stdenv.mkDerivation rec { 90 90 pname = "freeswitch"; 91 - version = "1.10.5"; 91 + version = "1.10.6"; 92 92 src = fetchFromGitHub { 93 93 owner = "signalwire"; 94 94 repo = pname; 95 95 rev = "v${version}"; 96 - sha256 = "18dhyb19k28dcm1i8mhqvvgm2phsrmrwyjmfn79glk8pdlalvcha"; 96 + sha256 = "1i5n06pds3kvzhhzfwvhwxnvcb2p2fcr8k52157aplm2i7prl4q2"; 97 97 }; 98 98 99 - patches = [ 100 - # https://github.com/signalwire/freeswitch/pull/812 fix mod_spandsp, mod_gsmopen build, drop when updating from 1.10.5 101 - (fetchpatch { 102 - url = "https://github.com/signalwire/freeswitch/commit/51fba83ed3ed2d9753d8e6b13e13001aca50b493.patch"; 103 - sha256 = "0h2bmifsyyasxjka3pczbmqym1chvz91fmb589njrdbwpkjyvqh3"; 104 - }) 105 - ]; 106 99 postPatch = '' 107 100 patchShebangs libs/libvpx/build/make/rtcd.pl 108 101 substituteInPlace libs/libvpx/build/make/configure.sh \ ··· 117 110 done 118 111 ''; 119 112 120 - nativeBuildInputs = [ pkg-config autoreconfHook ]; 113 + strictDeps = true; 114 + nativeBuildInputs = [ pkg-config autoreconfHook perl which yasm ]; 121 115 buildInputs = [ 122 - openssl ncurses gnutls readline perl libjpeg 123 - sqlite pcre speex ldns libedit yasm which 116 + openssl ncurses gnutls readline libjpeg 117 + sqlite pcre speex ldns libedit 124 118 libsndfile libtiff 125 119 libuuid 126 120 ]
+2 -2
pkgs/tools/admin/exoscale-cli/default.nix
··· 2 2 3 3 buildGoPackage rec { 4 4 pname = "exoscale-cli"; 5 - version = "1.32.2"; 5 + version = "1.34.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "exoscale"; 9 9 repo = "cli"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-Yx+GA959AB6m62hDlZKYjsuT9Y9TJbIdzUVBMM8OgTg="; 11 + sha256 = "sha256-Gu9o1aUDlhcEZPZZsfVF0FnlzT1DvbEXMXjnOxhY8tY="; 12 12 }; 13 13 14 14 goPackagePath = "github.com/exoscale/cli";
+1 -1
pkgs/tools/misc/broot/default.nix
··· 75 75 meta = with lib; { 76 76 description = "An interactive tree view, a fuzzy search, a balanced BFS descent and customizable commands"; 77 77 homepage = "https://dystroy.org/broot/"; 78 - maintainers = with maintainers; [ danieldk ]; 78 + maintainers = with maintainers; [ ]; 79 79 license = with licenses; [ mit ]; 80 80 }; 81 81 }
+5 -2
pkgs/tools/misc/mslink/default.nix
··· 1 - { stdenv 1 + { gccStdenv 2 2 , lib 3 3 , fetchurl 4 4 }: 5 5 6 - stdenv.mkDerivation rec { 6 + gccStdenv.mkDerivation rec { 7 7 pname = "mslink"; 8 8 version = "1.3"; 9 9 ··· 17 17 ''; 18 18 19 19 installPhase = '' 20 + if [[ "$(uname)" == "Darwin" ]]; then 21 + mv mslink.exe mslink 22 + fi 20 23 install -D mslink $out/bin/mslink 21 24 ''; 22 25
+8 -7
pkgs/tools/security/bitwarden_rs/default.nix pkgs/tools/security/vaultwarden/default.nix
··· 1 - { lib, stdenv, rustPlatform, fetchFromGitHub, nixosTests 1 + { lib, stdenv, rustPlatform, fetchFromGitHub, fetchurl, nixosTests 2 2 , pkg-config, openssl 3 3 , libiconv, Security, CoreServices 4 4 , dbBackend ? "sqlite", libmysqlclient, postgresql }: ··· 7 7 featuresFlag = "--features ${dbBackend}"; 8 8 9 9 in rustPlatform.buildRustPackage rec { 10 - pname = "bitwarden_rs"; 11 - version = "1.20.0"; 10 + pname = "vaultwarden"; 11 + version = "1.22.1"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "dani-garcia"; 15 15 repo = pname; 16 16 rev = version; 17 - sha256 = "1ncy4iwmdzdp8rv1gc5i4s1rp97d94n4l4bh08v6w4zdpx0zn8b9"; 17 + sha256 = "sha256-aXbnNO3mTAgE1yNx7YVDo1vPpO8ACZpBGHQ633fNZ3k="; 18 18 }; 19 19 20 + cargoSha256 = "sha256-SFzq3OU0a0s3zlEzUkqGdZb/knYafqDamLy4ghH4i8I="; 21 + 20 22 nativeBuildInputs = [ pkg-config ]; 21 23 buildInputs = with lib; [ openssl ] 22 24 ++ optionals stdenv.isDarwin [ libiconv Security CoreServices ] ··· 25 27 26 28 RUSTC_BOOTSTRAP = 1; 27 29 28 - cargoSha256 = "0vdi792bzqxj8g215r9r5anzs4qhqsm6sjzwpj1l9861bn7j4xsz"; 29 30 cargoBuildFlags = [ featuresFlag ]; 30 31 31 32 checkPhase = '' ··· 35 36 runHook postCheck 36 37 ''; 37 38 38 - passthru.tests = nixosTests.bitwarden; 39 + passthru.tests = nixosTests.vaultwarden; 39 40 40 41 meta = with lib; { 41 42 description = "Unofficial Bitwarden compatible server written in Rust"; 42 - homepage = "https://github.com/dani-garcia/bitwarden_rs"; 43 + homepage = "https://github.com/dani-garcia/vaultwarden"; 43 44 license = licenses.gpl3Only; 44 45 maintainers = with maintainers; [ msteen ]; 45 46 };
+5 -5
pkgs/tools/security/bitwarden_rs/vault.nix pkgs/tools/security/vaultwarden/vault.nix
··· 1 1 { lib, stdenv, fetchurl, nixosTests }: 2 2 3 3 stdenv.mkDerivation rec { 4 - pname = "bitwarden_rs-vault"; 4 + pname = "vaultwarden-vault"; 5 5 version = "2.19.0"; 6 6 7 7 src = fetchurl { ··· 10 10 }; 11 11 12 12 buildCommand = '' 13 - mkdir -p $out/share/bitwarden_rs/ 14 - cd $out/share/bitwarden_rs/ 13 + mkdir -p $out/share/vaultwarden/ 14 + cd $out/share/vaultwarden/ 15 15 tar xf $src 16 16 mv web-vault vault 17 17 ''; 18 18 19 - passthru.tests = nixosTests.bitwarden; 19 + passthru.tests = nixosTests.vaultwarden; 20 20 21 21 meta = with lib; { 22 - description = "Integrates the web vault into bitwarden_rs"; 22 + description = "Integrates the web vault into vaultwarden"; 23 23 homepage = "https://github.com/dani-garcia/bw_web_builds"; 24 24 platforms = platforms.all; 25 25 license = licenses.gpl3Plus;
+2 -2
pkgs/tools/security/cfssl/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "cfssl"; 5 - version = "1.5.0"; 5 + version = "1.6.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "cloudflare"; 9 9 repo = "cfssl"; 10 10 rev = "v${version}"; 11 - sha256 = "1yzxz2l7h2d3f8j6l9xlm7g9659gsa17zf4q0883s0jh3l3xgs5n"; 11 + sha256 = "sha256-29HEaW5LCoHcuJrfVUN2hnsRtaSTrvIBo8ok2UJbfuQ="; 12 12 }; 13 13 14 14 subPackages = [
+1 -1
pkgs/tools/system/rocm-smi/default.nix
··· 46 46 description = "System management interface for AMD GPUs supported by ROCm"; 47 47 homepage = "https://github.com/RadeonOpenCompute/ROC-smi"; 48 48 license = with licenses; [ mit ]; 49 - maintainers = with maintainers; [ danieldk ]; 49 + maintainers = with maintainers; [ ]; 50 50 platforms = [ "x86_64-linux" ]; 51 51 }; 52 52 }
+1 -1
pkgs/tools/text/hottext/default.nix
··· 67 67 68 68 nimFlags = [ "-d:release" ] ++ map (lib: "--path:${lib}/src") nimLibs; 69 69 70 - HOTTEXT_FONT_PATH = "${gentium}/share/fonts/truetype/GentiumPlus-R.ttf"; 70 + HOTTEXT_FONT_PATH = "${gentium}/share/fonts/truetype/GentiumPlus-Regular.ttf"; 71 71 72 72 buildPhase = '' 73 73 runHook preBuild
+2 -2
pkgs/tools/text/languagetool/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "LanguageTool"; 5 - version = "5.3"; 5 + version = "5.4"; 6 6 7 7 src = fetchzip { 8 8 url = "https://www.languagetool.org/download/${pname}-${version}.zip"; 9 - sha256 = "1km20ajqb65vkhkrf94zy5srcss66ix8padp7ng59pa8pj11wmi2"; 9 + sha256 = "sha256-2khadADfzwkW+J0uafPWJ6xUQRSQDm8seiBHueQGmKI="; 10 10 }; 11 11 nativeBuildInputs = [ makeWrapper ]; 12 12 buildInputs = [ jre ];
+37
pkgs/tools/wayland/wayland-proxy-virtwl/default.nix
··· 1 + { lib 2 + , fetchFromGitHub 3 + , ocamlPackages 4 + }: 5 + 6 + ocamlPackages.buildDunePackage rec { 7 + pname = "wayland-proxy-virtwl"; 8 + version = "unstable-2021-04-15"; 9 + 10 + src = fetchFromGitHub { 11 + owner = "talex5"; 12 + repo = pname; 13 + rev = "09321a28f3d4c0fa7e41ebb3014106b62090b649"; 14 + sha256 = "03rc2jp5d2y9y7mfis6kk9gchd49gvq0jg6fq5gi9r21ckb4k5v4"; 15 + }; 16 + 17 + postPatch = '' 18 + # no need to vendor 19 + rm -r ocaml-wayland 20 + ''; 21 + 22 + useDune2 = true; 23 + minimumOCamlVersion = "4.08"; 24 + 25 + buildInputs = with ocamlPackages; [ 26 + wayland 27 + cmdliner 28 + logs 29 + ]; 30 + 31 + meta = { 32 + homepage = "https://github.com/talex5/wayland-virtwl-proxy"; 33 + description = "Proxy Wayland connections across a VM boundary"; 34 + license = lib.licenses.asl20; 35 + maintainers = [ lib.maintainers.sternenseemann ]; 36 + }; 37 + }
+8
pkgs/top-level/aliases.nix
··· 88 88 bittorrentSync = throw "bittorrentSync has been deprecated by resilio-sync."; # added 2019-06-03 89 89 bittorrentSync14 = throw "bittorrentSync14 has been deprecated by resilio-sync."; # added 2019-06-03 90 90 bittorrentSync20 = throw "bittorrentSync20 has been deprecated by resilio-sync."; # added 2019-06-03 91 + 92 + # bitwarden_rs renamed to vaultwarden with release 1.21.0 (2021-04-30) 93 + bitwarden_rs = vaultwarden; 94 + bitwarden_rs-sqlite = vaultwarden-sqlite; 95 + bitwarden_rs-mysql = vaultwarden-mysql; 96 + bitwarden_rs-postgresql = vaultwarden-postgresql; 97 + bitwarden_rs-vault = vaultwarden-vault; 98 + 91 99 bs1770gain = throw "bs1770gain has been removed from nixpkgs, as it had no maintainer or reverse dependencies."; # added 2021-01-02 92 100 btc1 = throw "btc1 has been removed, it was abandoned by upstream"; # added 2020-11-03 93 101 buildPerlPackage = perlPackages.buildPerlPackage; # added 2018-10-12
+19 -9
pkgs/top-level/all-packages.nix
··· 474 474 475 475 pkger = callPackage ../development/libraries/pkger { }; 476 476 477 + tapview = callPackage ../development/tools/tapview { }; 478 + 477 479 run = callPackage ../development/tools/run { }; 478 480 479 481 mod = callPackage ../development/tools/mod { }; ··· 1309 1311 bitwarden = callPackage ../tools/security/bitwarden { }; 1310 1312 1311 1313 inherit (nodePackages) bitwarden-cli; 1312 - 1313 - bitwarden_rs = callPackage ../tools/security/bitwarden_rs { 1314 - inherit (darwin.apple_sdk.frameworks) Security CoreServices; 1315 - }; 1316 - bitwarden_rs-sqlite = bitwarden_rs; 1317 - bitwarden_rs-mysql = bitwarden_rs.override { dbBackend = "mysql"; }; 1318 - bitwarden_rs-postgresql = bitwarden_rs.override { dbBackend = "postgresql"; }; 1319 - 1320 - bitwarden_rs-vault = callPackage ../tools/security/bitwarden_rs/vault.nix { }; 1321 1314 1322 1315 bkyml = callPackage ../tools/misc/bkyml { }; 1323 1316 ··· 2300 2293 swaycwd = callPackage ../tools/wayland/swaycwd { }; 2301 2294 2302 2295 wayland-utils = callPackage ../tools/wayland/wayland-utils { }; 2296 + 2297 + wayland-proxy-virtwl = callPackage ../tools/wayland/wayland-proxy-virtwl { }; 2303 2298 2304 2299 wev = callPackage ../tools/wayland/wev { }; 2305 2300 ··· 7672 7667 7673 7668 otfcc = callPackage ../tools/misc/otfcc { }; 7674 7669 7670 + otpclient = callPackage ../applications/misc/otpclient { }; 7671 + 7675 7672 otpw = callPackage ../os-specific/linux/otpw { }; 7676 7673 7677 7674 ovftool = callPackage ../tools/virtualization/ovftool { }; ··· 16035 16032 inherit (ocaml-ng.ocamlPackages) bap ocaml findlib ctypes; 16036 16033 }; 16037 16034 16035 + libbaseencode = callPackage ../development/libraries/libbaseencode { }; 16036 + 16038 16037 libbass = (callPackage ../development/libraries/audio/libbass { }).bass; 16039 16038 libbass_fx = (callPackage ../development/libraries/audio/libbass { }).bass_fx; 16040 16039 ··· 16147 16146 libctb = callPackage ../development/libraries/libctb { }; 16148 16147 16149 16148 libctemplate = callPackage ../development/libraries/libctemplate { }; 16149 + 16150 + libcotp = callPackage ../development/libraries/libcotp { }; 16150 16151 16151 16152 libcouchbase = callPackage ../development/libraries/libcouchbase { }; 16152 16153 ··· 31572 31573 vaultenv = haskellPackages.vaultenv; 31573 31574 31574 31575 vazir-code-font = callPackage ../data/fonts/vazir-code-font { }; 31576 + 31577 + vaultwarden = callPackage ../tools/security/vaultwarden { 31578 + inherit (darwin.apple_sdk.frameworks) Security CoreServices; 31579 + }; 31580 + vaultwarden-sqlite = vaultwarden; 31581 + vaultwarden-mysql = vaultwarden.override { dbBackend = "mysql"; }; 31582 + vaultwarden-postgresql = vaultwarden.override { dbBackend = "postgresql"; }; 31583 + 31584 + vaultwarden-vault = callPackage ../tools/security/vaultwarden/vault.nix { }; 31575 31585 31576 31586 vazir-fonts = callPackage ../data/fonts/vazir-fonts { }; 31577 31587
-4
pkgs/top-level/python-packages.nix
··· 1905 1905 1906 1906 devpi-common = callPackage ../development/python-modules/devpi-common { }; 1907 1907 1908 - dftfit = callPackage ../development/python-modules/dftfit { }; 1909 - 1910 1908 diagrams = callPackage ../development/python-modules/diagrams { }; 1911 1909 1912 1910 diceware = callPackage ../development/python-modules/diceware { }; ··· 3913 3911 labgrid = callPackage ../development/python-modules/labgrid { }; 3914 3912 3915 3913 labmath = callPackage ../development/python-modules/labmath { }; 3916 - 3917 - lammps-cython = callPackage ../development/python-modules/lammps-cython { }; 3918 3914 3919 3915 langcodes = callPackage ../development/python-modules/langcodes { }; 3920 3916