Merge master into staging-next

authored by github-actions[bot] and committed by GitHub feb117e3 52f84b7e

+342 -190
+23 -1
nixos/modules/programs/java.nix
··· 8 let 9 cfg = config.programs.java; 10 in 11 - 12 { 13 14 options = { ··· 40 type = types.package; 41 }; 42 43 }; 44 45 }; 46 47 config = mkIf cfg.enable { 48 49 environment.systemPackages = [ cfg.package ]; 50
··· 8 let 9 cfg = config.programs.java; 10 in 11 { 12 13 options = { ··· 39 type = types.package; 40 }; 41 42 + binfmt = mkEnableOption (lib.mdDoc "binfmt to execute java jar's and classes"); 43 + 44 }; 45 46 }; 47 48 config = mkIf cfg.enable { 49 + 50 + boot.binfmt.registrations = mkIf cfg.binfmt { 51 + java-class = { 52 + recognitionType = "extension"; 53 + magicOrExtension = "class"; 54 + interpreter = pkgs.writeShellScript "java-class-wrapper" '' 55 + test -e ${cfg.package}/nix-support/setup-hook && source ${cfg.package}/nix-support/setup-hook 56 + classpath=$(dirname "$1") 57 + class=$(basename "''${1%%.class}") 58 + $JAVA_HOME/bin/java -classpath "$classpath" "$class" "''${@:2}" 59 + ''; 60 + }; 61 + java-jar = { 62 + recognitionType = "extension"; 63 + magicOrExtension = "jar"; 64 + interpreter = pkgs.writeShellScript "java-jar-wrapper" '' 65 + test -e ${cfg.package}/nix-support/setup-hook && source ${cfg.package}/nix-support/setup-hook 66 + $JAVA_HOME/bin/java -jar "$@" 67 + ''; 68 + }; 69 + }; 70 71 environment.systemPackages = [ cfg.package ]; 72
+42 -15
nixos/modules/services/backup/btrbk.nix
··· 47 then [ "${name} ${value}" ] 48 else concatLists (mapAttrsToList (genSection name) value); 49 50 - addDefaults = settings: { backend = "btrfs-progs-sudo"; } // settings; 51 52 mkConfigFile = name: settings: pkgs.writeTextFile { 53 name = "btrbk-${name}.conf"; ··· 152 }; 153 config = mkIf (sshEnabled || serviceEnabled) { 154 environment.systemPackages = [ pkgs.btrbk ] ++ cfg.extraPackages; 155 - security.sudo.extraRules = [ 156 - { 157 - users = [ "btrbk" ]; 158 - commands = [ 159 - { command = "${pkgs.btrfs-progs}/bin/btrfs"; options = [ "NOPASSWD" ]; } 160 - { command = "${pkgs.coreutils}/bin/mkdir"; options = [ "NOPASSWD" ]; } 161 - { command = "${pkgs.coreutils}/bin/readlink"; options = [ "NOPASSWD" ]; } 162 - # for ssh, they are not the same than the one hard coded in ${pkgs.btrbk} 163 - { command = "/run/current-system/bin/btrfs"; options = [ "NOPASSWD" ]; } 164 - { command = "/run/current-system/sw/bin/mkdir"; options = [ "NOPASSWD" ]; } 165 - { command = "/run/current-system/sw/bin/readlink"; options = [ "NOPASSWD" ]; } 166 ]; 167 - } 168 - ]; 169 users.users.btrbk = { 170 isSystemUser = true; 171 # ssh needs a home directory ··· 183 "best-effort" = 2; 184 "realtime" = 1; 185 }.${cfg.ioSchedulingClass}; 186 in 187 - ''command="${pkgs.util-linux}/bin/ionice -t -c ${toString ioniceClass} ${optionalString (cfg.niceness >= 1) "${pkgs.coreutils}/bin/nice -n ${toString cfg.niceness}"} ${pkgs.btrbk}/share/btrbk/scripts/ssh_filter_btrbk.sh --sudo ${options}" ${v.key}'' 188 ) 189 cfg.sshAccess; 190 };
··· 47 then [ "${name} ${value}" ] 48 else concatLists (mapAttrsToList (genSection name) value); 49 50 + sudo_doas = 51 + if config.security.sudo.enable then "sudo" 52 + else if config.security.doas.enable then "doas" 53 + else throw "The btrbk nixos module needs either sudo or doas enabled in the configuration"; 54 + 55 + addDefaults = settings: { backend = "btrfs-progs-${sudo_doas}"; } // settings; 56 57 mkConfigFile = name: settings: pkgs.writeTextFile { 58 name = "btrbk-${name}.conf"; ··· 157 }; 158 config = mkIf (sshEnabled || serviceEnabled) { 159 environment.systemPackages = [ pkgs.btrbk ] ++ cfg.extraPackages; 160 + security.sudo = mkIf (sudo_doas == "sudo") { 161 + extraRules = [ 162 + { 163 + users = [ "btrbk" ]; 164 + commands = [ 165 + { command = "${pkgs.btrfs-progs}/bin/btrfs"; options = [ "NOPASSWD" ]; } 166 + { command = "${pkgs.coreutils}/bin/mkdir"; options = [ "NOPASSWD" ]; } 167 + { command = "${pkgs.coreutils}/bin/readlink"; options = [ "NOPASSWD" ]; } 168 + # for ssh, they are not the same than the one hard coded in ${pkgs.btrbk} 169 + { command = "/run/current-system/bin/btrfs"; options = [ "NOPASSWD" ]; } 170 + { command = "/run/current-system/sw/bin/mkdir"; options = [ "NOPASSWD" ]; } 171 + { command = "/run/current-system/sw/bin/readlink"; options = [ "NOPASSWD" ]; } 172 + ]; 173 + } 174 + ]; 175 + }; 176 + security.doas = mkIf (sudo_doas == "doas") { 177 + extraRules = let 178 + doasCmdNoPass = cmd: { users = [ "btrbk" ]; cmd = cmd; noPass = true; }; 179 + in 180 + [ 181 + (doasCmdNoPass "${pkgs.btrfs-progs}/bin/btrfs") 182 + (doasCmdNoPass "${pkgs.coreutils}/bin/mkdir") 183 + (doasCmdNoPass "${pkgs.coreutils}/bin/readlink") 184 + # for ssh, they are not the same than the one hard coded in ${pkgs.btrbk} 185 + (doasCmdNoPass "/run/current-system/bin/btrfs") 186 + (doasCmdNoPass "/run/current-system/sw/bin/mkdir") 187 + (doasCmdNoPass "/run/current-system/sw/bin/readlink") 188 + 189 + # doas matches command, not binary 190 + (doasCmdNoPass "btrfs") 191 + (doasCmdNoPass "mkdir") 192 + (doasCmdNoPass "readlink") 193 ]; 194 + }; 195 users.users.btrbk = { 196 isSystemUser = true; 197 # ssh needs a home directory ··· 209 "best-effort" = 2; 210 "realtime" = 1; 211 }.${cfg.ioSchedulingClass}; 212 + sudo_doas_flag = "--${sudo_doas}"; 213 in 214 + ''command="${pkgs.util-linux}/bin/ionice -t -c ${toString ioniceClass} ${optionalString (cfg.niceness >= 1) "${pkgs.coreutils}/bin/nice -n ${toString cfg.niceness}"} ${pkgs.btrbk}/share/btrbk/scripts/ssh_filter_btrbk.sh ${sudo_doas_flag} ${options}" ${v.key}'' 215 ) 216 cfg.sshAccess; 217 };
+1
nixos/modules/services/x11/desktop-managers/plasma5.nix
··· 448 kio-extras 449 ]; 450 optionalPackages = [ 451 elisa 452 gwenview 453 okular
··· 448 kio-extras 449 ]; 450 optionalPackages = [ 451 + ark 452 elisa 453 gwenview 454 okular
+1
nixos/tests/all-tests.nix
··· 108 breitbandmessung = handleTest ./breitbandmessung.nix {}; 109 brscan5 = handleTest ./brscan5.nix {}; 110 btrbk = handleTest ./btrbk.nix {}; 111 btrbk-no-timer = handleTest ./btrbk-no-timer.nix {}; 112 btrbk-section-order = handleTest ./btrbk-section-order.nix {}; 113 buildbot = handleTest ./buildbot.nix {};
··· 108 breitbandmessung = handleTest ./breitbandmessung.nix {}; 109 brscan5 = handleTest ./brscan5.nix {}; 110 btrbk = handleTest ./btrbk.nix {}; 111 + btrbk-doas = handleTest ./btrbk-doas.nix {}; 112 btrbk-no-timer = handleTest ./btrbk-no-timer.nix {}; 113 btrbk-section-order = handleTest ./btrbk-section-order.nix {}; 114 buildbot = handleTest ./buildbot.nix {};
+114
nixos/tests/btrbk-doas.nix
···
··· 1 + import ./make-test-python.nix ({ pkgs, ... }: 2 + 3 + let 4 + privateKey = '' 5 + -----BEGIN OPENSSH PRIVATE KEY----- 6 + b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW 7 + QyNTUxOQAAACBx8UB04Q6Q/fwDFjakHq904PYFzG9pU2TJ9KXpaPMcrwAAAJB+cF5HfnBe 8 + RwAAAAtzc2gtZWQyNTUxOQAAACBx8UB04Q6Q/fwDFjakHq904PYFzG9pU2TJ9KXpaPMcrw 9 + AAAEBN75NsJZSpt63faCuaD75Unko0JjlSDxMhYHAPJk2/xXHxQHThDpD9/AMWNqQer3Tg 10 + 9gXMb2lTZMn0pelo8xyvAAAADXJzY2h1ZXR6QGt1cnQ= 11 + -----END OPENSSH PRIVATE KEY----- 12 + ''; 13 + publicKey = '' 14 + ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHHxQHThDpD9/AMWNqQer3Tg9gXMb2lTZMn0pelo8xyv 15 + ''; 16 + in 17 + { 18 + name = "btrbk-doas"; 19 + meta = with pkgs.lib; { 20 + maintainers = with maintainers; [ symphorien tu-maurice ]; 21 + }; 22 + 23 + nodes = { 24 + archive = { ... }: { 25 + security.sudo.enable = false; 26 + security.doas.enable = true; 27 + environment.systemPackages = with pkgs; [ btrfs-progs ]; 28 + # note: this makes the privateKey world readable. 29 + # don't do it with real ssh keys. 30 + environment.etc."btrbk_key".text = privateKey; 31 + services.btrbk = { 32 + extraPackages = [ pkgs.lz4 ]; 33 + instances = { 34 + remote = { 35 + onCalendar = "minutely"; 36 + settings = { 37 + ssh_identity = "/etc/btrbk_key"; 38 + ssh_user = "btrbk"; 39 + stream_compress = "lz4"; 40 + volume = { 41 + "ssh://main/mnt" = { 42 + target = "/mnt"; 43 + snapshot_dir = "btrbk/remote"; 44 + subvolume = "to_backup"; 45 + }; 46 + }; 47 + }; 48 + }; 49 + }; 50 + }; 51 + }; 52 + 53 + main = { ... }: { 54 + security.sudo.enable = false; 55 + security.doas.enable = true; 56 + environment.systemPackages = with pkgs; [ btrfs-progs ]; 57 + services.openssh = { 58 + enable = true; 59 + passwordAuthentication = false; 60 + kbdInteractiveAuthentication = false; 61 + }; 62 + services.btrbk = { 63 + extraPackages = [ pkgs.lz4 ]; 64 + sshAccess = [ 65 + { 66 + key = publicKey; 67 + roles = [ "source" "send" "info" "delete" ]; 68 + } 69 + ]; 70 + instances = { 71 + local = { 72 + onCalendar = "minutely"; 73 + settings = { 74 + volume = { 75 + "/mnt" = { 76 + snapshot_dir = "btrbk/local"; 77 + subvolume = "to_backup"; 78 + }; 79 + }; 80 + }; 81 + }; 82 + }; 83 + }; 84 + }; 85 + }; 86 + 87 + testScript = '' 88 + start_all() 89 + 90 + # create btrfs partition at /mnt 91 + for machine in (archive, main): 92 + machine.succeed("dd if=/dev/zero of=/data_fs bs=120M count=1") 93 + machine.succeed("mkfs.btrfs /data_fs") 94 + machine.succeed("mkdir /mnt") 95 + machine.succeed("mount /data_fs /mnt") 96 + 97 + # what to backup and where 98 + main.succeed("btrfs subvolume create /mnt/to_backup") 99 + main.succeed("mkdir -p /mnt/btrbk/{local,remote}") 100 + 101 + # check that local snapshots work 102 + with subtest("local"): 103 + main.succeed("echo foo > /mnt/to_backup/bar") 104 + main.wait_until_succeeds("cat /mnt/btrbk/local/*/bar | grep foo") 105 + main.succeed("echo bar > /mnt/to_backup/bar") 106 + main.succeed("cat /mnt/btrbk/local/*/bar | grep foo") 107 + 108 + # check that btrfs send/receive works and ssh access works 109 + with subtest("remote"): 110 + archive.wait_until_succeeds("cat /mnt/*/bar | grep bar") 111 + main.succeed("echo baz > /mnt/to_backup/bar") 112 + archive.succeed("cat /mnt/*/bar | grep bar") 113 + ''; 114 + })
+2 -2
pkgs/applications/audio/bitwig-studio/bitwig-studio4.nix
··· 24 25 stdenv.mkDerivation rec { 26 pname = "bitwig-studio"; 27 - version = "4.4.6"; 28 29 src = fetchurl { 30 url = "https://downloads.bitwig.com/stable/${version}/${pname}-${version}.deb"; 31 - sha256 = "sha256-VcK74JrVH81sgNeh1FDvCO1jtgkVeLpx5IqlXuzH27A="; 32 }; 33 34 nativeBuildInputs = [ dpkg makeWrapper wrapGAppsHook ];
··· 24 25 stdenv.mkDerivation rec { 26 pname = "bitwig-studio"; 27 + version = "4.4.8"; 28 29 src = fetchurl { 30 url = "https://downloads.bitwig.com/stable/${version}/${pname}-${version}.deb"; 31 + sha256 = "sha256-qdqRvCmp6Q7lcTdOIEHeQKAAOLtJxs867gapopyeHuc="; 32 }; 33 34 nativeBuildInputs = [ dpkg makeWrapper wrapGAppsHook ];
+3 -3
pkgs/applications/audio/ncspot/default.nix
··· 7 8 rustPlatform.buildRustPackage rec { 9 pname = "ncspot"; 10 - version = "0.12.0"; 11 12 src = fetchFromGitHub { 13 owner = "hrkfdn"; 14 repo = "ncspot"; 15 rev = "v${version}"; 16 - sha256 = "sha256-kqGYBaXmGeGuGJ5fcc4OQzHISU8fVuQNGwiD8nyPa/0="; 17 }; 18 19 - cargoSha256 = "sha256-gVXH2pFtyMfYkCqda9NrqOgczvmxiWHe0zArJfnnrgE="; 20 21 nativeBuildInputs = [ pkg-config ]; 22
··· 7 8 rustPlatform.buildRustPackage rec { 9 pname = "ncspot"; 10 + version = "0.13.0"; 11 12 src = fetchFromGitHub { 13 owner = "hrkfdn"; 14 repo = "ncspot"; 15 rev = "v${version}"; 16 + hash = "sha256-YWA8chp33SkMdo+XT/7qikIkgwt8pozC9wMFpY8Dv8Q="; 17 }; 18 19 + cargoHash = "sha256-DB3r6pPtustEQG8QXM6qT1hkd7msC//46bhVP/HMxnY="; 20 21 nativeBuildInputs = [ pkg-config ]; 22
+2 -2
pkgs/applications/audio/strawberry/default.nix
··· 42 in 43 stdenv.mkDerivation rec { 44 pname = "strawberry"; 45 - version = "1.0.14"; 46 47 src = fetchFromGitHub { 48 owner = "jonaski"; 49 repo = pname; 50 rev = version; 51 - hash = "sha256-ThfycS5yNpp6+mE33qPqEWlhSB3OIF7d/t2XvI+rF2E="; 52 }; 53 54 # the big strawberry shown in the context menu is *very* much in your face, so use the grey version instead
··· 42 in 43 stdenv.mkDerivation rec { 44 pname = "strawberry"; 45 + version = "1.0.15"; 46 47 src = fetchFromGitHub { 48 owner = "jonaski"; 49 repo = pname; 50 rev = version; 51 + hash = "sha256-P7M7UIRFr0pABNhb63pV3TqIdTP8Xox4f0BT2ii9rRE="; 52 }; 53 54 # the big strawberry shown in the context menu is *very* much in your face, so use the grey version instead
+3 -3
pkgs/applications/emulators/proton-caller/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "proton-caller"; 5 - version = "3.1.1"; 6 7 src = fetchFromGitHub { 8 owner = "caverym"; 9 repo = pname; 10 rev = version; 11 - sha256 = "sha256-fN/8woLkTFD0aGILwweHhpey3cGQw2NolvpOmdkEEGA="; 12 }; 13 14 - cargoSha256 = "sha256-2zczu9MtsDDbfjbmLXCiPJrxNoNNBN0KAGeN+a53SRg="; 15 16 meta = with lib; { 17 description = "Run Windows programs with Proton";
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "proton-caller"; 5 + version = "3.1.2"; 6 7 src = fetchFromGitHub { 8 owner = "caverym"; 9 repo = pname; 10 rev = version; 11 + sha256 = "sha256-srzahBMihkEP9/+7oRij5POHkCcH6QBh4kGz42Pz0nM="; 12 }; 13 14 + cargoHash = "sha256-LBXCcFqqscCGgtTzt/gr7Lz0ExT9kAWrXPuPuKzKt0E="; 15 16 meta = with lib; { 17 description = "Run Windows programs with Proton";
+2 -2
pkgs/applications/networking/cluster/kubebuilder/default.nix
··· 12 13 buildGoModule rec { 14 pname = "kubebuilder"; 15 - version = "3.9.0"; 16 17 src = fetchFromGitHub { 18 owner = "kubernetes-sigs"; 19 repo = "kubebuilder"; 20 rev = "v${version}"; 21 - hash = "sha256-AT7BrLVe5sSqAnQyhrkDktxVhuh1e0o5eB8oWWVbL8Q="; 22 }; 23 24 vendorHash = "sha256-wxKEywUs5ezeOlIRT2k3C4G0XaX6h1ORt9/G6+FzVic=";
··· 12 13 buildGoModule rec { 14 pname = "kubebuilder"; 15 + version = "3.9.1"; 16 17 src = fetchFromGitHub { 18 owner = "kubernetes-sigs"; 19 repo = "kubebuilder"; 20 rev = "v${version}"; 21 + hash = "sha256-sX+MYMZTRJ3udCtW3yeGBlYpJV35UDQwtcgi7/pXhek="; 22 }; 23 24 vendorHash = "sha256-wxKEywUs5ezeOlIRT2k3C4G0XaX6h1ORt9/G6+FzVic=";
+3 -3
pkgs/applications/networking/cluster/kubelogin-oidc/default.nix
··· 2 3 buildGoModule rec { 4 pname = "kubelogin"; 5 - version = "1.26.0"; 6 7 src = fetchFromGitHub { 8 owner = "int128"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-A8J381KNhQbWZ+68P8+1xj/lEEc/+YiJ80LqRQatdFQ="; 12 }; 13 14 subPackages = ["."]; 15 16 - vendorSha256 = "sha256-V+O3yFxGJTcFETD2qYOurQUbME5NvRNQTr43OkxXFFE="; 17 18 # Rename the binary instead of symlinking to avoid conflict with the 19 # Azure version of kubelogin
··· 2 3 buildGoModule rec { 4 pname = "kubelogin"; 5 + version = "1.27.0"; 6 7 src = fetchFromGitHub { 8 owner = "int128"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-oBgth4lAQP4UrFIk/AErlfyyCgPrugs5wQJDFxqGum0="; 12 }; 13 14 subPackages = ["."]; 15 16 + vendorHash = "sha256-IJCbh1ryyk0r72SrVEiI7K5nIFf1+UGjTkXaNKpGsmo="; 17 18 # Rename the binary instead of symlinking to avoid conflict with the 19 # Azure version of kubelogin
+2 -2
pkgs/applications/networking/cluster/roxctl/default.nix
··· 2 3 buildGoModule rec { 4 pname = "roxctl"; 5 - version = "3.73.2"; 6 7 src = fetchFromGitHub { 8 owner = "stackrox"; 9 repo = "stackrox"; 10 rev = version; 11 - sha256 = "sha256-5MMSQy7SUFZhUycv1Kfkz46aY2tMldNZOH63wlQjq6o="; 12 }; 13 14 vendorHash = "sha256-YRNOOn/Ei0rHLZrTtQxlBBn48pePDHllnI65Iil160k=";
··· 2 3 buildGoModule rec { 4 pname = "roxctl"; 5 + version = "3.73.3"; 6 7 src = fetchFromGitHub { 8 owner = "stackrox"; 9 repo = "stackrox"; 10 rev = version; 11 + sha256 = "sha256-ri4ir5mOfefB23gVk+XltXNYEz1jMoIVbJ5b0sS444k="; 12 }; 13 14 vendorHash = "sha256-YRNOOn/Ei0rHLZrTtQxlBBn48pePDHllnI65Iil160k=";
+16 -16
pkgs/applications/networking/cluster/terraform-providers/providers.json
··· 128 "vendorHash": null 129 }, 130 "azurerm": { 131 - "hash": "sha256-PvlW3BB2ZATZA18nOGgxMSWzjC8YIjUY9ofw7XwnbmU=", 132 "homepage": "https://registry.terraform.io/providers/hashicorp/azurerm", 133 "owner": "hashicorp", 134 "repo": "terraform-provider-azurerm", 135 - "rev": "v3.46.0", 136 "spdx": "MPL-2.0", 137 "vendorHash": null 138 }, ··· 467 "vendorHash": "sha256-fqVBnAivVekV+4tpkl+E6eNA3wi8mhLevJRCs3W7L2g=" 468 }, 469 "grafana": { 470 - "hash": "sha256-b6vmtr2eHm7YNhRHS96+l6BLHYHgixR8Pw7/jK0tRPI=", 471 "homepage": "https://registry.terraform.io/providers/grafana/grafana", 472 "owner": "grafana", 473 "repo": "terraform-provider-grafana", 474 - "rev": "v1.36.0", 475 "spdx": "MPL-2.0", 476 "vendorHash": "sha256-zPO+TbJsFrgfjSaSrX5YRop/0LDDw/grNNntaIGiBU0=" 477 }, ··· 540 "vendorHash": "sha256-rxh8Me+eOKPCbfHFT3tRsbM7JU67dBqv2JOiWArI/2Y=" 541 }, 542 "huaweicloud": { 543 - "hash": "sha256-x/5jt31yPTJRHSHRZqSrrjNdERWho6l71jvS7x6dR0c=", 544 "homepage": "https://registry.terraform.io/providers/huaweicloud/huaweicloud", 545 "owner": "huaweicloud", 546 "repo": "terraform-provider-huaweicloud", 547 - "rev": "v1.45.0", 548 "spdx": "MPL-2.0", 549 "vendorHash": null 550 }, ··· 648 "vendorHash": null 649 }, 650 "launchdarkly": { 651 - "hash": "sha256-7m5+Fu9UjmGWL4PgYCpI9vMStfmU4oQ1cx+7wAirEbQ=", 652 "homepage": "https://registry.terraform.io/providers/launchdarkly/launchdarkly", 653 "owner": "launchdarkly", 654 "repo": "terraform-provider-launchdarkly", 655 - "rev": "v2.11.0", 656 "spdx": "MPL-2.0", 657 - "vendorHash": "sha256-j8Lit22aWeLvYrq5ao0nIdcVZDSxaAKaW+bxQ/JCSgE=" 658 }, 659 "libvirt": { 660 "hash": "sha256-VO9fbRLz7mDYT8WORodnN4l3II2j+TdpV8cZ9M+NjTM=", ··· 820 "vendorHash": null 821 }, 822 "okta": { 823 - "hash": "sha256-3Ym2Q3Y2f26ioiB3N2HZiPsrgVe4zszJDR7e0gzxOHU=", 824 "homepage": "https://registry.terraform.io/providers/okta/okta", 825 "owner": "okta", 826 "repo": "terraform-provider-okta", 827 - "rev": "v3.43.0", 828 "spdx": "MPL-2.0", 829 - "vendorHash": "sha256-7jA44ZcBGCeLrr+On8F9er+ch2qf6vbijTRtu+aHrB4=" 830 }, 831 "oktaasa": { 832 "hash": "sha256-2LhxgowqKvDDDOwdznusL52p2DKP+UiXALHcs9ZQd0U=", ··· 883 "vendorHash": null 884 }, 885 "pagerduty": { 886 - "hash": "sha256-9aIYGmcbDgSZqtldLBMRjD0qKJZ3USuwNBpK3bvGrFY=", 887 "homepage": "https://registry.terraform.io/providers/PagerDuty/pagerduty", 888 "owner": "PagerDuty", 889 "repo": "terraform-provider-pagerduty", 890 - "rev": "v2.11.1", 891 "spdx": "MPL-2.0", 892 "vendorHash": null 893 }, ··· 964 "vendorHash": null 965 }, 966 "scaleway": { 967 - "hash": "sha256-4xHPQFmOAqEpqfJ6ng5z3wcuNZF8jNqu+4ZNJNxaBaI=", 968 "homepage": "https://registry.terraform.io/providers/scaleway/scaleway", 969 "owner": "scaleway", 970 "repo": "terraform-provider-scaleway", 971 - "rev": "v2.13.0", 972 "spdx": "MPL-2.0", 973 "vendorHash": "sha256-kh1wv7cuWCC1rP0WBQW95pFg53gZTakqGoMIDMDSmt0=" 974 },
··· 128 "vendorHash": null 129 }, 130 "azurerm": { 131 + "hash": "sha256-XcqBkb+de+ikNtrDe33OZHhhv6ed2pXhbXXb7L661RI=", 132 "homepage": "https://registry.terraform.io/providers/hashicorp/azurerm", 133 "owner": "hashicorp", 134 "repo": "terraform-provider-azurerm", 135 + "rev": "v3.47.0", 136 "spdx": "MPL-2.0", 137 "vendorHash": null 138 }, ··· 467 "vendorHash": "sha256-fqVBnAivVekV+4tpkl+E6eNA3wi8mhLevJRCs3W7L2g=" 468 }, 469 "grafana": { 470 + "hash": "sha256-2Ig0ZwU9ZzsfAq5XCFMvL1NCmfnhVjoIrgl74hQypGE=", 471 "homepage": "https://registry.terraform.io/providers/grafana/grafana", 472 "owner": "grafana", 473 "repo": "terraform-provider-grafana", 474 + "rev": "v1.36.1", 475 "spdx": "MPL-2.0", 476 "vendorHash": "sha256-zPO+TbJsFrgfjSaSrX5YRop/0LDDw/grNNntaIGiBU0=" 477 }, ··· 540 "vendorHash": "sha256-rxh8Me+eOKPCbfHFT3tRsbM7JU67dBqv2JOiWArI/2Y=" 541 }, 542 "huaweicloud": { 543 + "hash": "sha256-5Yw1b7tuGg8tDL1rQhqgFMTgtvc2k0n45dR5xvr7Dmo=", 544 "homepage": "https://registry.terraform.io/providers/huaweicloud/huaweicloud", 545 "owner": "huaweicloud", 546 "repo": "terraform-provider-huaweicloud", 547 + "rev": "v1.45.1", 548 "spdx": "MPL-2.0", 549 "vendorHash": null 550 }, ··· 648 "vendorHash": null 649 }, 650 "launchdarkly": { 651 + "hash": "sha256-zi4GzbQmvvfxQ5vL4FbVkqUcwm7Y4ET8GFeIc/LipTY=", 652 "homepage": "https://registry.terraform.io/providers/launchdarkly/launchdarkly", 653 "owner": "launchdarkly", 654 "repo": "terraform-provider-launchdarkly", 655 + "rev": "v2.12.0", 656 "spdx": "MPL-2.0", 657 + "vendorHash": "sha256-Fb2k493XTePXgpCY9ZoMWaCZqq3fx3A2dBRsOp1MDBc=" 658 }, 659 "libvirt": { 660 "hash": "sha256-VO9fbRLz7mDYT8WORodnN4l3II2j+TdpV8cZ9M+NjTM=", ··· 820 "vendorHash": null 821 }, 822 "okta": { 823 + "hash": "sha256-O4ZTGYM9r3XFzr2Nx/Tt2Fs7WOqQuQWfo+ZMmZyg+mo=", 824 "homepage": "https://registry.terraform.io/providers/okta/okta", 825 "owner": "okta", 826 "repo": "terraform-provider-okta", 827 + "rev": "v3.44.0", 828 "spdx": "MPL-2.0", 829 + "vendorHash": "sha256-KYOzbbBjE2C7+1St62rs9mlJFhpIlWQJ0reh5V5tQsk=" 830 }, 831 "oktaasa": { 832 "hash": "sha256-2LhxgowqKvDDDOwdznusL52p2DKP+UiXALHcs9ZQd0U=", ··· 883 "vendorHash": null 884 }, 885 "pagerduty": { 886 + "hash": "sha256-FHGoaWJQ3HRtY/LNCTX+L+jgYMPKkefjpbtfzMVbPQw=", 887 "homepage": "https://registry.terraform.io/providers/PagerDuty/pagerduty", 888 "owner": "PagerDuty", 889 "repo": "terraform-provider-pagerduty", 890 + "rev": "v2.11.2", 891 "spdx": "MPL-2.0", 892 "vendorHash": null 893 }, ··· 964 "vendorHash": null 965 }, 966 "scaleway": { 967 + "hash": "sha256-aWn/w7k+gxCodN7W9GBM9Ontkg6Ir2LNLYkY34ORxzI=", 968 "homepage": "https://registry.terraform.io/providers/scaleway/scaleway", 969 "owner": "scaleway", 970 "repo": "terraform-provider-scaleway", 971 + "rev": "v2.13.1", 972 "spdx": "MPL-2.0", 973 "vendorHash": "sha256-kh1wv7cuWCC1rP0WBQW95pFg53gZTakqGoMIDMDSmt0=" 974 },
+4 -8
pkgs/applications/version-management/gitlint/default.nix
··· 7 8 python3.pkgs.buildPythonApplication rec { 9 pname = "gitlint"; 10 - version = "0.19.0"; 11 format = "pyproject"; 12 13 src = fetchFromGitHub { 14 owner = "jorisroovers"; 15 repo = "gitlint"; 16 - rev = "v${version}"; 17 - sha256 = "sha256-w4v6mcjCX0V3Mj1K23ErpXdyEKQcA4vykns7UwNBEZ4="; 18 }; 19 - 20 - patches = [ 21 - # otherwise hatch tries to run git to collect some metadata about the build 22 - ./dont-try-to-use-git.diff 23 - ]; 24 25 SETUPTOOLS_SCM_PRETEND_VERSION = version; 26 ··· 51 meta = with lib; { 52 description = "Linting for your git commit messages"; 53 homepage = "https://jorisroovers.com/gitlint/"; 54 license = licenses.mit; 55 maintainers = with maintainers; [ ethancedwards8 fab ]; 56 };
··· 7 8 python3.pkgs.buildPythonApplication rec { 9 pname = "gitlint"; 10 + version = "0.19.1"; 11 format = "pyproject"; 12 13 src = fetchFromGitHub { 14 owner = "jorisroovers"; 15 repo = "gitlint"; 16 + rev = "refs/tags/v${version}"; 17 + hash = "sha256-4SGkkC4LjZXTDXwK6jMOIKXR1qX76CasOwSqv8XUrjs="; 18 }; 19 20 SETUPTOOLS_SCM_PRETEND_VERSION = version; 21 ··· 46 meta = with lib; { 47 description = "Linting for your git commit messages"; 48 homepage = "https://jorisroovers.com/gitlint/"; 49 + changelog = "https://github.com/jorisroovers/gitlint/releases/tag/v${version}"; 50 license = licenses.mit; 51 maintainers = with maintainers; [ ethancedwards8 fab ]; 52 };
-14
pkgs/applications/version-management/gitlint/dont-try-to-use-git.diff
··· 1 - --- a/pyproject.toml 2 - +++ b/pyproject.toml 3 - @@ -61,10 +63,3 @@ include = [ 4 - exclude = [ 5 - "/gitlint/tests", # 6 - ] 7 - - 8 - -[tool.hatch.metadata.hooks.vcs.urls] 9 - -Homepage = "https://jorisroovers.github.io/gitlint" 10 - -Documentation = "https://jorisroovers.github.io/gitlint" 11 - -Source = "https://github.com/jorisroovers/gitlint/tree/main/gitlint-core" 12 - -Changelog = "https://github.com/jorisroovers/gitlint/blob/main/CHANGELOG.md" 13 - -'Source Commit' = "https://github.com/jorisroovers/gitlint/tree/{commit_hash}/gitlint-core" 14 - \ No newline at end of file
···
+2 -2
pkgs/applications/virtualization/colima/default.nix
··· 17 18 buildGoModule rec { 19 pname = "colima"; 20 - version = "0.5.3"; 21 22 src = fetchFromGitHub { 23 owner = "abiosoft"; 24 repo = pname; 25 rev = "v${version}"; 26 - sha256 = "sha256-uAstW+LzgT+xEJf4WNVSZsWtE50RU/rRpC7mkkFMIJU="; 27 # We need the git revision 28 leaveDotGit = true; 29 postFetch = ''
··· 17 18 buildGoModule rec { 19 pname = "colima"; 20 + version = "0.5.4"; 21 22 src = fetchFromGitHub { 23 owner = "abiosoft"; 24 repo = pname; 25 rev = "v${version}"; 26 + sha256 = "sha256-oCYHQFajtZXVAVeJ8zvJABlmwmOUgisvVg9eLT7wd0M="; 27 # We need the git revision 28 leaveDotGit = true; 29 postFetch = ''
+2 -2
pkgs/data/fonts/charis-sil/default.nix
··· 2 3 stdenvNoCC.mkDerivation rec { 4 pname = "charis-sil"; 5 - version = "6.101"; 6 7 src = fetchzip { 8 url = "https://software.sil.org/downloads/r/charis/CharisSIL-${version}.zip"; 9 - hash = "sha256-Rf5eKQVZw7zgTv6KkJUdNdd4sSJPdvjy/GDLusvlgzE="; 10 }; 11 12 installPhase = ''
··· 2 3 stdenvNoCC.mkDerivation rec { 4 pname = "charis-sil"; 5 + version = "6.200"; 6 7 src = fetchzip { 8 url = "https://software.sil.org/downloads/r/charis/CharisSIL-${version}.zip"; 9 + hash = "sha256-q451lec/l13Uanmr8K/C55Cr3avRvqQUkPK/ZZ1kgHo="; 10 }; 11 12 installPhase = ''
+2 -2
pkgs/development/compilers/circt/default.nix
··· 13 in 14 stdenv.mkDerivation rec { 15 pname = "circt"; 16 - version = "1.30.0"; 17 src = fetchFromGitHub { 18 owner = "llvm"; 19 repo = "circt"; 20 rev = "firtool-${version}"; 21 - sha256 = "sha256-VP1QwY/gA8wxjpzbAlEV5r2Q8sTt3K2sGdKmxr6ndB8="; 22 fetchSubmodules = true; 23 }; 24
··· 13 in 14 stdenv.mkDerivation rec { 15 pname = "circt"; 16 + version = "1.34.0"; 17 src = fetchFromGitHub { 18 owner = "llvm"; 19 repo = "circt"; 20 rev = "firtool-${version}"; 21 + sha256 = "sha256-QrCli0nNlvOM4taqWZ6GzK5luvXmyxaCgfDlXSRLSQA="; 22 fetchSubmodules = true; 23 }; 24
+2 -2
pkgs/development/libraries/boca/default.nix
··· 14 15 stdenv.mkDerivation rec { 16 pname = "BoCA"; 17 - version = "1.0.6a"; 18 19 src = fetchFromGitHub { 20 owner = "enzo1982"; 21 repo = "boca"; 22 rev = "v${version}"; 23 - sha256 = "sha256-LndlwdM5NlTv73Z1lMkHuIZkVfn48P/LssBnE4X9Sgc="; 24 }; 25 26 nativeBuildInputs = [
··· 14 15 stdenv.mkDerivation rec { 16 pname = "BoCA"; 17 + version = "1.0.7"; 18 19 src = fetchFromGitHub { 20 owner = "enzo1982"; 21 repo = "boca"; 22 rev = "v${version}"; 23 + sha256 = "sha256-HIYUMFj5yiEC+liZLMXD9otPyoEb1sxHlECTYtYXc2I="; 24 }; 25 26 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/libheif/default.nix
··· 22 23 stdenv.mkDerivation rec { 24 pname = "libheif"; 25 - version = "1.14.2"; 26 27 outputs = [ "bin" "out" "dev" "man" ]; 28 ··· 30 owner = "strukturag"; 31 repo = "libheif"; 32 rev = "v${version}"; 33 - sha256 = "sha256-JwPeSNUc++z6RfMe0qAuXdekzLWR/MCmsT+Ykvp9a/s="; 34 }; 35 36 nativeBuildInputs = [
··· 22 23 stdenv.mkDerivation rec { 24 pname = "libheif"; 25 + version = "1.15.1"; 26 27 outputs = [ "bin" "out" "dev" "man" ]; 28 ··· 30 owner = "strukturag"; 31 repo = "libheif"; 32 rev = "v${version}"; 33 + sha256 = "sha256-5908S46hEXhCYcTsqulmUnat0KOlXsnY5LI/l1l7/1Q="; 34 }; 35 36 nativeBuildInputs = [
+6 -6
pkgs/development/libraries/liblouis/default.nix
··· 11 , perl 12 }: 13 14 - stdenv.mkDerivation rec { 15 pname = "liblouis"; 16 - version = "3.24.0"; 17 18 outputs = [ "out" "dev" "info" "doc" ] 19 # configure: WARNING: cannot generate manual pages while cross compiling ··· 22 src = fetchFromGitHub { 23 owner = "liblouis"; 24 repo = "liblouis"; 25 - rev = "v${version}"; 26 - sha256 = "sha256-QSrCQhP3t+WPyBQPLJbZEaDCjXD8Lo6IAGKHsbL2S1o="; 27 }; 28 29 strictDeps = true; ··· 66 67 meta = with lib; { 68 description = "Open-source braille translator and back-translator"; 69 - homepage = "https://liblouis.org/"; 70 license = with licenses; [ 71 lgpl21Plus # library 72 gpl3Plus # tools ··· 74 maintainers = with maintainers; [ jtojnar ]; 75 platforms = platforms.unix; 76 }; 77 - }
··· 11 , perl 12 }: 13 14 + stdenv.mkDerivation (finalAttrs: { 15 pname = "liblouis"; 16 + version = "3.25.0"; 17 18 outputs = [ "out" "dev" "info" "doc" ] 19 # configure: WARNING: cannot generate manual pages while cross compiling ··· 22 src = fetchFromGitHub { 23 owner = "liblouis"; 24 repo = "liblouis"; 25 + rev = "v${finalAttrs.version}"; 26 + hash = "sha256-On5PbBgvDAeD41oGb5EKBtKvi/VXnLsVrTMX7tcwnq4="; 27 }; 28 29 strictDeps = true; ··· 66 67 meta = with lib; { 68 description = "Open-source braille translator and back-translator"; 69 + homepage = "https://liblouis.io/"; 70 license = with licenses; [ 71 lgpl21Plus # library 72 gpl3Plus # tools ··· 74 maintainers = with maintainers; [ jtojnar ]; 75 platforms = platforms.unix; 76 }; 77 + })
+1 -1
pkgs/development/libraries/migraphx/default.nix
··· 46 }; 47 in stdenv.mkDerivation (finalAttrs: { 48 pname = "migraphx"; 49 - version = "5.4.2"; 50 51 outputs = [ 52 "out"
··· 46 }; 47 in stdenv.mkDerivation (finalAttrs: { 48 pname = "migraphx"; 49 + version = "5.4.3"; 50 51 outputs = [ 52 "out"
+2 -17
pkgs/development/libraries/minizip-ng/default.nix
··· 14 15 stdenv.mkDerivation (finalAttrs: { 16 pname = "minizip-ng"; 17 - version = "3.0.7"; 18 19 src = fetchFromGitHub { 20 owner = "zlib-ng"; 21 repo = finalAttrs.pname; 22 rev = finalAttrs.version; 23 - sha256 = "sha256-m/zSVx8vYzLA23Cusd1p/ZSGd1mV3gM6UqDnmEXqpq4="; 24 }; 25 - 26 - patches = [ 27 - (fetchpatch { 28 - name = "find-system-gtest.patch"; 29 - url = "https://github.com/zlib-ng/minizip-ng/commit/be23c8d3b7e2cb5ba619e60517cad277ee510fb7.patch"; 30 - sha256 = "sha256-azwrGj6kgTyTepGAmOlxDOFOwJKQE5J2bwUIn6sgKUY="; 31 - }) 32 - 33 - # otherwise signing unit tests fail 34 - (fetchpatch { 35 - name = "disable-mz-signing-by-default.patch"; 36 - url = "https://github.com/zlib-ng/minizip-ng/commit/60649ada97581afc0bc2fffc50ce402ff1e6df5d.patch"; 37 - sha256 = "sha256-bHGM4H8RPYkfAjxcS1bPohR9IFOFT0Mx4Mg34UnnD+w="; 38 - }) 39 - ]; 40 41 nativeBuildInputs = [ cmake pkg-config ]; 42 buildInputs = [ zlib bzip2 xz zstd openssl ];
··· 14 15 stdenv.mkDerivation (finalAttrs: { 16 pname = "minizip-ng"; 17 + version = "3.0.8"; 18 19 src = fetchFromGitHub { 20 owner = "zlib-ng"; 21 repo = finalAttrs.pname; 22 rev = finalAttrs.version; 23 + sha256 = "sha256-Vzp+5fQBJoO1pG7j8LwC2/B/cOgM/exhKyb3zHuy89Y="; 24 }; 25 26 nativeBuildInputs = [ cmake pkg-config ]; 27 buildInputs = [ zlib bzip2 xz zstd openssl ];
+2 -2
pkgs/development/libraries/qxmpp/default.nix
··· 9 10 mkDerivation rec { 11 pname = "qxmpp"; 12 - version = "1.5.1"; 13 14 src = fetchFromGitHub { 15 owner = "qxmpp-project"; 16 repo = pname; 17 rev = "v${version}"; 18 - sha256 = "sha256-6iI+s+iSKK8TeocvyOxou7cF9ZXlWr5prUbPhoHOoSM="; 19 }; 20 21 nativeBuildInputs = [
··· 9 10 mkDerivation rec { 11 pname = "qxmpp"; 12 + version = "1.5.2"; 13 14 src = fetchFromGitHub { 15 owner = "qxmpp-project"; 16 repo = pname; 17 rev = "v${version}"; 18 + sha256 = "sha256-nwU0Iw3aLv4EyNdblTOQKcCYVYfK8i54c0piks4DoUo="; 19 }; 20 21 nativeBuildInputs = [
+12 -3
pkgs/development/python-modules/django-ipware/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, django }: 2 3 buildPythonPackage rec { 4 pname = "django-ipware"; 5 - version = "4.0.2"; 6 7 src = fetchPypi { 8 inherit pname version; 9 - sha256 = "602a58325a4808bd19197fef2676a0b2da2df40d0ecf21be414b2ff48c72ad05"; 10 }; 11 12 propagatedBuildInputs = [ django ]; ··· 20 meta = with lib; { 21 description = "A Django application to retrieve user's IP address"; 22 homepage = "https://github.com/un33k/django-ipware"; 23 license = licenses.mit; 24 maintainers = with maintainers; [ ]; 25 };
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchPypi 4 + , django 5 + , pythonOlder 6 + }: 7 8 buildPythonPackage rec { 9 pname = "django-ipware"; 10 + version = "5.0.0"; 11 + format = "setuptools"; 12 + 13 + disabled = pythonOlder "3.7"; 14 15 src = fetchPypi { 16 inherit pname version; 17 + hash = "sha256-T6VgfuheEu5eFYvHVp/x4TT7FXloGqH/Pw7QS+Ib4VM="; 18 }; 19 20 propagatedBuildInputs = [ django ]; ··· 28 meta = with lib; { 29 description = "A Django application to retrieve user's IP address"; 30 homepage = "https://github.com/un33k/django-ipware"; 31 + changelog = "https://github.com/un33k/django-ipware/blob/v${version}/CHANGELOG.md"; 32 license = licenses.mit; 33 maintainers = with maintainers; [ ]; 34 };
+2 -2
pkgs/development/python-modules/peaqevcore/default.nix
··· 6 7 buildPythonPackage rec { 8 pname = "peaqevcore"; 9 - version = "13.0.0"; 10 format = "setuptools"; 11 12 disabled = pythonOlder "3.7"; 13 14 src = fetchPypi { 15 inherit pname version; 16 - hash = "sha256-uQ5e85KHFaJCgpALFCYVs+nY0fZIE4UIYdNOn6VrIWM="; 17 }; 18 19 postPatch = ''
··· 6 7 buildPythonPackage rec { 8 pname = "peaqevcore"; 9 + version = "13.0.1"; 10 format = "setuptools"; 11 12 disabled = pythonOlder "3.7"; 13 14 src = fetchPypi { 15 inherit pname version; 16 + hash = "sha256-2V0+F0S2i7paBDN8FmsT1wV4qdJ4XmkOyZ3EDfyjGks="; 17 }; 18 19 postPatch = ''
+2 -2
pkgs/development/python-modules/pydeconz/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "pydeconz"; 15 - version = "108"; 16 format = "setuptools"; 17 18 disabled = pythonOlder "3.9"; ··· 21 owner = "Kane610"; 22 repo = "deconz"; 23 rev = "refs/tags/v${version}"; 24 - hash = "sha256-CPFkfVwvk0AO/DoE1Nj1jLdLvuOpRzndmRK/M6SSGtk="; 25 }; 26 27 propagatedBuildInputs = [
··· 12 13 buildPythonPackage rec { 14 pname = "pydeconz"; 15 + version = "110"; 16 format = "setuptools"; 17 18 disabled = pythonOlder "3.9"; ··· 21 owner = "Kane610"; 22 repo = "deconz"; 23 rev = "refs/tags/v${version}"; 24 + hash = "sha256-2eHKFq+urzJS3K55O0hca0h4ElowJZD6nIkYkzyBFCM="; 25 }; 26 27 propagatedBuildInputs = [
+2 -2
pkgs/development/tools/altair-graphql-client/default.nix
··· 2 3 let 4 pname = "altair"; 5 - version = "5.0.14"; 6 7 src = fetchurl { 8 url = "https://github.com/imolorhe/altair/releases/download/v${version}/altair_${version}_x86_64_linux.AppImage"; 9 - sha256 = "sha256-gd7aSBNhTO1ira76lL+1apLlXYXRfGWAbGAsJEUtEqw="; 10 }; 11 12 appimageContents = appimageTools.extract { inherit pname version src; };
··· 2 3 let 4 pname = "altair"; 5 + version = "5.0.17"; 6 7 src = fetchurl { 8 url = "https://github.com/imolorhe/altair/releases/download/v${version}/altair_${version}_x86_64_linux.AppImage"; 9 + sha256 = "sha256-UX7WqQt5inVldrXG3bIVmR8ucCvbHdyVLgQ/srhpCak="; 10 }; 11 12 appimageContents = appimageTools.extract { inherit pname version src; };
+3 -3
pkgs/development/tools/database/dbmate/default.nix
··· 2 3 buildGoModule rec { 4 pname = "dbmate"; 5 - version = "1.16.2"; 6 7 src = fetchFromGitHub { 8 owner = "amacneil"; 9 repo = "dbmate"; 10 rev = "v${version}"; 11 - sha256 = "sha256-5hjAP2+0hbYcA9G7YJyRqqp1ZC8LzFDomjeFjl4z4FY="; 12 }; 13 14 - vendorHash = "sha256-7fC1jJMY/XK+GX5t2/o/k+EjFxAlRAmiemMcWaZhL9o="; 15 16 doCheck = false; 17
··· 2 3 buildGoModule rec { 4 pname = "dbmate"; 5 + version = "2.0.1"; 6 7 src = fetchFromGitHub { 8 owner = "amacneil"; 9 repo = "dbmate"; 10 rev = "v${version}"; 11 + sha256 = "sha256-zARaxjzVTi90BkwPOyfGYk3mBHRoAGMOe2LPlJB4Mvo="; 12 }; 13 14 + vendorHash = "sha256-NZ2HVFViU8Vzwyo33cueNJwdCT4exZlB7g4WgoWKZBE="; 15 16 doCheck = false; 17
+3 -3
pkgs/development/tools/language-servers/nil/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "nil"; 5 - version = "2023-03-01"; 6 7 src = fetchFromGitHub { 8 owner = "oxalica"; 9 repo = pname; 10 rev = version; 11 - hash = "sha256-HGd/TV8ZHVAVBx+ndrxAfS/Nz+VHOQjNWjtKkkgYkqA="; 12 }; 13 14 - cargoHash = "sha256-A6Go1OYAaoDvQtAcK5BL5Tz00iLPOft0VLH6usWtb9g="; 15 16 CFG_RELEASE = version; 17
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "nil"; 5 + version = "2023-03-11"; 6 7 src = fetchFromGitHub { 8 owner = "oxalica"; 9 repo = pname; 10 rev = version; 11 + hash = "sha256-5WEdrN+ABrNOdfQc2k2mf+fj+ZvZR1Dp/PtypEdlFWA="; 12 }; 13 14 + cargoHash = "sha256-ISkw0lhUKJG8nWUHcR93sLUFt5dDEyK7EORcOXEmVbE="; 15 16 CFG_RELEASE = version; 17
+2 -2
pkgs/development/tools/marksman/default.nix
··· 8 9 buildDotnetModule rec { 10 pname = "marksman"; 11 - version = "2023-01-29"; 12 13 src = fetchFromGitHub { 14 owner = "artempyanykh"; 15 repo = "marksman"; 16 rev = version; 17 - sha256 = "sha256-UPPO4ueu7gMR7a573M2/xT3N0QgRSNBshJAqoyXEZpc="; 18 }; 19 20 projectFile = "Marksman/Marksman.fsproj";
··· 8 9 buildDotnetModule rec { 10 pname = "marksman"; 11 + version = "2023-03-04"; 12 13 src = fetchFromGitHub { 14 owner = "artempyanykh"; 15 repo = "marksman"; 16 rev = version; 17 + sha256 = "sha256-jBZC2z1wtDMIssgRrKkZpl9NQ3XkRCcxo5eylwB2OBQ="; 18 }; 19 20 projectFile = "Marksman/Marksman.fsproj";
+5 -5
pkgs/development/tools/misc/cmake-language-server/default.nix
··· 11 12 buildPythonApplication rec { 13 pname = "cmake-language-server"; 14 - version = "unstable-2023-01-08"; 15 format = "pyproject"; 16 17 src = fetchFromGitHub { 18 owner = "regen100"; 19 - repo = pname; 20 - rev = "60c376a5fda29835060687569cb212350a292116"; 21 - hash = "sha256-vNG43sZy2wMetY5mbgxIoei5jCCj1f8vWiovWtwzbPc="; 22 }; 23 24 - PDM_PEP517_SCM_VERSION = "2023.1"; 25 26 patches = [ 27 # Test timeouts occasionally cause the build to fail
··· 11 12 buildPythonApplication rec { 13 pname = "cmake-language-server"; 14 + version = "0.1.7"; 15 format = "pyproject"; 16 17 src = fetchFromGitHub { 18 owner = "regen100"; 19 + repo = "cmake-language-server"; 20 + rev = "refs/tags/v${version}"; 21 + hash = "sha256-ExEAi47hxxEJeoT3FCwpRwJrf3URnI47/5FDL7fS5sY="; 22 }; 23 24 + PDM_PEP517_SCM_VERSION = version; 25 26 patches = [ 27 # Test timeouts occasionally cause the build to fail
+4 -4
pkgs/development/tools/misc/cmake-language-server/disable-test-timeouts.patch
··· 1 diff --git a/tests/test_server.py b/tests/test_server.py 2 - index 2d09bb2..59a122a 100644 3 --- a/tests/test_server.py 4 +++ b/tests/test_server.py 5 - @@ -26,7 +26,7 @@ from pygls.lsp.types import ( 6 - ) 7 - from pygls.server import LanguageServer 8 9 -CALL_TIMEOUT = 2 10 +CALL_TIMEOUT = None
··· 1 diff --git a/tests/test_server.py b/tests/test_server.py 2 + index f349329..d130a2e 100644 3 --- a/tests/test_server.py 4 +++ b/tests/test_server.py 5 + @@ -27,7 +27,7 @@ from pygls.server import LanguageServer 6 + 7 + from cmake_language_server.server import CMakeLanguageServer 8 9 -CALL_TIMEOUT = 2 10 +CALL_TIMEOUT = None
+2 -2
pkgs/development/tools/opcr-policy/default.nix
··· 5 6 buildGoModule rec { 7 pname = "opcr-policy"; 8 - version = "0.1.50"; 9 10 src = fetchFromGitHub { 11 owner = "opcr-io"; 12 repo = "policy"; 13 rev = "v${version}"; 14 - sha256 = "sha256-u7epE09WcbXAX1W+zkCOTDECnBTIOFC3gjNowtpuYtI="; 15 }; 16 vendorHash = "sha256-QoD6J+is+InumLiFdbL/y1tuWwBCdBebx6RrIZ4Irik="; 17
··· 5 6 buildGoModule rec { 7 pname = "opcr-policy"; 8 + version = "0.1.51"; 9 10 src = fetchFromGitHub { 11 owner = "opcr-io"; 12 repo = "policy"; 13 rev = "v${version}"; 14 + sha256 = "sha256-RpjuKtxiZA6l0ZW0TsEUn2AMLjU/V2RRfQLmfa0imW4="; 15 }; 16 vendorHash = "sha256-QoD6J+is+InumLiFdbL/y1tuWwBCdBebx6RrIZ4Irik="; 17
+2 -2
pkgs/development/tools/xc/default.nix
··· 2 3 buildGoModule rec { 4 pname = "xc"; 5 - version = "0.0.175"; 6 7 src = fetchFromGitHub { 8 owner = "joerdav"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-Uc9MTxl32xQ7u6N0mocDAoD9tgv/YOPCzhonsavX9Vo="; 12 }; 13 14 vendorHash = "sha256-cySflcTuAzbFZbtXmzZ98nfY8HUq1UedONTtKP4EICs=";
··· 2 3 buildGoModule rec { 4 pname = "xc"; 5 + version = "0.1.181"; 6 7 src = fetchFromGitHub { 8 owner = "joerdav"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-C6qZdO6+n9BWm69y09kvnEBF45sB6bfOfmteNO2x68I="; 12 }; 13 14 vendorHash = "sha256-cySflcTuAzbFZbtXmzZ98nfY8HUq1UedONTtKP4EICs=";
+2 -2
pkgs/development/web/flyctl/default.nix
··· 2 3 buildGoModule rec { 4 pname = "flyctl"; 5 - version = "0.0.483"; 6 7 src = fetchFromGitHub { 8 owner = "superfly"; 9 repo = "flyctl"; 10 rev = "v${version}"; 11 - hash = "sha256-z6FBJ8cE8UeOP/3ojzQo3LjEJr5bBshf+4CgMmb1RTQ="; 12 }; 13 14 vendorHash = "sha256-2y671bvOmkKEqbcttcCG1L1by/J8gkGZxts7kFyTIxk=";
··· 2 3 buildGoModule rec { 4 pname = "flyctl"; 5 + version = "0.0.484"; 6 7 src = fetchFromGitHub { 8 owner = "superfly"; 9 repo = "flyctl"; 10 rev = "v${version}"; 11 + hash = "sha256-2//mxYTF6lAolj5aQOXF12NOwEa/VPoen9LNxD7gYDo="; 12 }; 13 14 vendorHash = "sha256-2y671bvOmkKEqbcttcCG1L1by/J8gkGZxts7kFyTIxk=";
+2 -2
pkgs/games/unciv/default.nix
··· 25 in 26 stdenv.mkDerivation rec { 27 pname = "unciv"; 28 - version = "4.5.2"; 29 30 src = fetchurl { 31 url = "https://github.com/yairm210/Unciv/releases/download/${version}/Unciv.jar"; 32 - hash = "sha256-HhMccVlpIJoGW3LLqg1clw+dWcRUVHwCgtrmBcOXFSE="; 33 }; 34 35 dontUnpack = true;
··· 25 in 26 stdenv.mkDerivation rec { 27 pname = "unciv"; 28 + version = "4.5.5"; 29 30 src = fetchurl { 31 url = "https://github.com/yairm210/Unciv/releases/download/${version}/Unciv.jar"; 32 + hash = "sha256-m7wyWxTKXrxJUtUpG2Dwg4s91TBbE0eFNAyDhS98ggo="; 33 }; 34 35 dontUnpack = true;
+2 -2
pkgs/games/vassal/default.nix
··· 9 10 stdenv.mkDerivation rec { 11 pname = "VASSAL"; 12 - version = "3.6.13"; 13 14 src = fetchzip { 15 url = "https://github.com/vassalengine/vassal/releases/download/${version}/${pname}-${version}-linux.tar.bz2"; 16 - sha256 = "sha256-5YswOh2jnOafctp7q8INtIqQwx1ugGm0QP9vDfal7t0="; 17 }; 18 19 buildInputs = [
··· 9 10 stdenv.mkDerivation rec { 11 pname = "VASSAL"; 12 + version = "3.6.14"; 13 14 src = fetchzip { 15 url = "https://github.com/vassalengine/vassal/releases/download/${version}/${pname}-${version}-linux.tar.bz2"; 16 + sha256 = "sha256-0/QJyntLV1DLzLJ8p4f+tCXPKl3DMf+j4/gkI+Mt+rc="; 17 }; 18 19 buildInputs = [
+6 -6
pkgs/os-specific/linux/kernel/zen-kernels.nix
··· 4 # comments with variant added for update script 5 # ./update-zen.py zen 6 zenVariant = { 7 - version = "6.2.2"; #zen 8 - suffix = "zen2"; #zen 9 - sha256 = "0hbsd8id1f27zlxffid7pyycm5dlh6hw8y6f8dv6czd8k9v1qngs"; #zen 10 isLqx = false; 11 }; 12 # ./update-zen.py lqx 13 lqxVariant = { 14 - version = "6.1.15"; #lqx 15 - suffix = "lqx2"; #lqx 16 - sha256 = "1z3bwn2pmbaa8cqld4fsxkzkdb5213n83bgb8jkm9v4943pa220i"; #lqx 17 isLqx = true; 18 }; 19 zenKernelsFor = { version, suffix, sha256, isLqx }: buildLinux (args // {
··· 4 # comments with variant added for update script 5 # ./update-zen.py zen 6 zenVariant = { 7 + version = "6.2.5"; #zen 8 + suffix = "zen1"; #zen 9 + sha256 = "0ilkb8rqww30nl4sa01jy97s8gs67y96qwf9r0z0z7xy3w05s8bl"; #zen 10 isLqx = false; 11 }; 12 # ./update-zen.py lqx 13 lqxVariant = { 14 + version = "6.1.18"; #lqx 15 + suffix = "lqx1"; #lqx 16 + sha256 = "1gyjy01ys74apa65abgvxcj0y51vf5ixampyj3jd8lxzn4vvkih6"; #lqx 17 isLqx = true; 18 }; 19 zenKernelsFor = { version, suffix, sha256, isLqx }: buildLinux (args // {
+14 -14
pkgs/servers/adguardhome/bins.nix
··· 1 { fetchurl, fetchzip }: 2 { 3 x86_64-darwin = fetchzip { 4 - sha256 = "sha256-mOn0RYWmGzIeHyVwVTGPUvFyVQ8Zu57KW7UkGMWRejA="; 5 - url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.25/AdGuardHome_darwin_amd64.zip"; 6 }; 7 aarch64-darwin = fetchzip { 8 - sha256 = "sha256-urdLtEOMJ2ZeaWezihpv5UU8Li2gnmYk6+gzn9E/3Nw="; 9 - url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.25/AdGuardHome_darwin_arm64.zip"; 10 }; 11 i686-linux = fetchurl { 12 - sha256 = "sha256-yWlo7adaQcPrM4zOPq5BLw6rZPYg2Qr2T1R7H8QZuvA="; 13 - url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.25/AdGuardHome_linux_386.tar.gz"; 14 }; 15 x86_64-linux = fetchurl { 16 - sha256 = "sha256-pD1vs4NHWByZmEozdgpzBXDeSzbEBouyawd41Emf8QE="; 17 - url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.25/AdGuardHome_linux_amd64.tar.gz"; 18 }; 19 aarch64-linux = fetchurl { 20 - sha256 = "sha256-BpknO9qL4Jo31d/vRXjuU/wJWfCVvLfgh6tZLG/6ipI="; 21 - url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.25/AdGuardHome_linux_arm64.tar.gz"; 22 }; 23 armv6l-linux = fetchurl { 24 - sha256 = "sha256-yUyRz/2hqvN8XkuzfMfG6ibYOb68WjJaqgAIAfoZH0s="; 25 - url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.25/AdGuardHome_linux_armv6.tar.gz"; 26 }; 27 armv7l-linux = fetchurl { 28 - sha256 = "sha256-MOvDKvq24+NFmgseZZA3zz0z6Vr/7OvO8sHpsDWvMuo="; 29 - url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.25/AdGuardHome_linux_armv7.tar.gz"; 30 }; 31 }
··· 1 { fetchurl, fetchzip }: 2 { 3 x86_64-darwin = fetchzip { 4 + sha256 = "sha256-hGa1SrueZWGokeJb+p/6eaYv1AP1a2TUiGo+rcJBw3Y="; 5 + url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.26/AdGuardHome_darwin_amd64.zip"; 6 }; 7 aarch64-darwin = fetchzip { 8 + sha256 = "sha256-wm8scjBaQuKJQu2OfYWDQqF2TLdPEZQEGSgaLzoGTb0="; 9 + url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.26/AdGuardHome_darwin_arm64.zip"; 10 }; 11 i686-linux = fetchurl { 12 + sha256 = "sha256-nie5WOeMajq8ucOwLHDXMG1FU7wBS3GTQHKCn0XjBCQ="; 13 + url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.26/AdGuardHome_linux_386.tar.gz"; 14 }; 15 x86_64-linux = fetchurl { 16 + sha256 = "sha256-Ai6QzmNrALHKxJIX5gx5GQiLlcpKRuT+ALxN0PDJQ9E="; 17 + url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.26/AdGuardHome_linux_amd64.tar.gz"; 18 }; 19 aarch64-linux = fetchurl { 20 + sha256 = "sha256-cJ7vvv4Yyo0r01eOuZI6jqc4LFmSDmVl84aJjwxkuR4="; 21 + url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.26/AdGuardHome_linux_arm64.tar.gz"; 22 }; 23 armv6l-linux = fetchurl { 24 + sha256 = "sha256-DfeSBIOO/vZQExbrqku28s8a9s22tfuojccIwe37tS4="; 25 + url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.26/AdGuardHome_linux_armv6.tar.gz"; 26 }; 27 armv7l-linux = fetchurl { 28 + sha256 = "sha256-OHoU8dP5b2jqFTfn4FCxL88HrQntcxZ5enMFr/YN1zI="; 29 + url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.26/AdGuardHome_linux_armv7.tar.gz"; 30 }; 31 }
+2 -2
pkgs/servers/adguardhome/default.nix
··· 7 8 stdenv.mkDerivation rec { 9 pname = "adguardhome"; 10 - version = "0.107.25"; 11 src = sources.${system} or (throw "Source for ${pname} is not available for ${system}"); 12 13 installPhase = '' ··· 16 17 passthru = { 18 updateScript = ./update.sh; 19 - schema_version = 16; 20 tests.adguardhome = nixosTests.adguardhome; 21 }; 22
··· 7 8 stdenv.mkDerivation rec { 9 pname = "adguardhome"; 10 + version = "0.107.26"; 11 src = sources.${system} or (throw "Source for ${pname} is not available for ${system}"); 12 13 installPhase = '' ··· 16 17 passthru = { 18 updateScript = ./update.sh; 19 + schema_version = 17; 20 tests.adguardhome = nixosTests.adguardhome; 21 }; 22
+2 -2
pkgs/servers/komga/default.nix
··· 8 9 stdenvNoCC.mkDerivation rec { 10 pname = "komga"; 11 - version = "0.162.0"; 12 13 src = fetchurl { 14 url = "https://github.com/gotson/${pname}/releases/download/v${version}/${pname}-${version}.jar"; 15 - sha256 = "sha256-RcEAqMfpXH7PudLOROpSZw/5HrEeuBFBkllOjGdXZCU="; 16 }; 17 18 nativeBuildInputs = [
··· 8 9 stdenvNoCC.mkDerivation rec { 10 pname = "komga"; 11 + version = "0.163.0"; 12 13 src = fetchurl { 14 url = "https://github.com/gotson/${pname}/releases/download/v${version}/${pname}-${version}.jar"; 15 + sha256 = "sha256-dKbdzfjb+brY++uflVvuF1LaOIaYn1UqIGIjCsyLMv8="; 16 }; 17 18 nativeBuildInputs = [
+3 -3
pkgs/servers/pocketbase/default.nix
··· 5 6 buildGoModule rec { 7 pname = "pocketbase"; 8 - version = "0.12.3"; 9 10 src = fetchFromGitHub { 11 owner = "pocketbase"; 12 repo = pname; 13 rev = "v${version}"; 14 - sha256 = "sha256-/uqUOuNHFyah6nrQI3lRNkB2vpV9vKXJog1ck0zoruo="; 15 }; 16 17 - vendorHash = "sha256-8NBudXcU3cjSbo6qpGZVLtbrLedzwijwrbiTgC+OMcU="; 18 19 # This is the released subpackage from upstream repo 20 subPackages = [ "examples/base" ];
··· 5 6 buildGoModule rec { 7 pname = "pocketbase"; 8 + version = "0.13.2"; 9 10 src = fetchFromGitHub { 11 owner = "pocketbase"; 12 repo = pname; 13 rev = "v${version}"; 14 + sha256 = "sha256-P150wEJHTC294LcRhSHF5/+w08WKBvhUZsJ9ENi1EM8="; 15 }; 16 17 + vendorHash = "sha256-hvziOq5zyYwWcvqa23IzHXj/DT27MAcNVegYR38beJ4="; 18 19 # This is the released subpackage from upstream repo 20 subPackages = [ "examples/base" ];
+2 -2
pkgs/tools/audio/openai-whisper-cpp/default.nix
··· 11 12 stdenv.mkDerivation rec { 13 pname = "whisper-cpp"; 14 - version = "1.2.0"; 15 16 src = fetchFromGitHub { 17 owner = "ggerganov"; 18 repo = "whisper.cpp"; 19 rev = "refs/tags/v${version}" ; 20 - hash = "sha256-7/10t1yE7Gbs+cyj8I9vJoDeaxEz9Azc2j3f6QCjDGM="; 21 }; 22 23 # The upstream download script tries to download the models to the
··· 11 12 stdenv.mkDerivation rec { 13 pname = "whisper-cpp"; 14 + version = "1.2.1"; 15 16 src = fetchFromGitHub { 17 owner = "ggerganov"; 18 repo = "whisper.cpp"; 19 rev = "refs/tags/v${version}" ; 20 + hash = "sha256-gcw+tcrwCt2CynNXQZxb+WxN/0chIQIJnwUAw9JGkYA="; 21 }; 22 23 # The upstream download script tries to download the models to the
+1 -1
pkgs/tools/backup/btrbk/default.nix
··· 54 ''; 55 56 passthru.tests = { 57 - inherit (nixosTests) btrbk btrbk-no-timer btrbk-section-order; 58 }; 59 60 passthru.updateScript = genericUpdater {
··· 54 ''; 55 56 passthru.tests = { 57 + inherit (nixosTests) btrbk btrbk-no-timer btrbk-section-order btrbk-doas; 58 }; 59 60 passthru.updateScript = genericUpdater {
+2 -2
pkgs/tools/games/minecraft/fabric-installer/default.nix
··· 6 7 stdenv.mkDerivation rec { 8 pname = "fabric-installer"; 9 - version = "0.11.1"; 10 11 src = fetchurl { 12 url = "https://maven.fabricmc.net/net/fabricmc/fabric-installer/${version}/fabric-installer-${version}.jar"; 13 - sha256 = "sha256-eRf5+hS+babvPNt/5r87Y6WToOuHO9Yn6YGn45iM1zo="; 14 }; 15 16 dontUnpack = true;
··· 6 7 stdenv.mkDerivation rec { 8 pname = "fabric-installer"; 9 + version = "0.11.2"; 10 11 src = fetchurl { 12 url = "https://maven.fabricmc.net/net/fabricmc/fabric-installer/${version}/fabric-installer-${version}.jar"; 13 + sha256 = "sha256-xq1b7xuxK1pyJ74+5UDCyQav30rIEUt44KygsUYAXCc="; 14 }; 15 16 dontUnpack = true;
+2 -2
pkgs/tools/graphics/directx-shader-compiler/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "directx-shader-compiler"; 5 - version = "1.7.2212"; 6 7 # Put headers in dev, there are lot of them which aren't necessary for 8 # using the compiler binary. ··· 12 owner = "microsoft"; 13 repo = "DirectXShaderCompiler"; 14 rev = "v${version}"; 15 - hash = "sha256-/FuG6ThvA3XMlHhnshRJpKC+vf4LM8/hurUoPagpTqA="; 16 fetchSubmodules = true; 17 }; 18
··· 2 3 stdenv.mkDerivation rec { 4 pname = "directx-shader-compiler"; 5 + version = "1.7.2212.1"; 6 7 # Put headers in dev, there are lot of them which aren't necessary for 8 # using the compiler binary. ··· 12 owner = "microsoft"; 13 repo = "DirectXShaderCompiler"; 14 rev = "v${version}"; 15 + hash = "sha256-old/vGNoj0mimuvd/RkwNeynBp+gBrkwQ7ah2oUZll0="; 16 fetchSubmodules = true; 17 }; 18
+2 -2
pkgs/tools/misc/rpm-ostree/default.nix
··· 40 41 stdenv.mkDerivation rec { 42 pname = "rpm-ostree"; 43 - version = "2023.1"; 44 45 outputs = [ "out" "dev" "man" "devdoc" ]; 46 47 src = fetchurl { 48 url = "https://github.com/coreos/${pname}/releases/download/v${version}/${pname}-${version}.tar.xz"; 49 - hash = "sha256-JNLp1IHbIRpe3Au2iUsx7x065rirQlzT9bg7CoqHCyg="; 50 }; 51 52 nativeBuildInputs = [
··· 40 41 stdenv.mkDerivation rec { 42 pname = "rpm-ostree"; 43 + version = "2023.2"; 44 45 outputs = [ "out" "dev" "man" "devdoc" ]; 46 47 src = fetchurl { 48 url = "https://github.com/coreos/${pname}/releases/download/v${version}/${pname}-${version}.tar.xz"; 49 + hash = "sha256-/C5la0b1plfqnsfSnfoSkSROIlAcvAfeg4m/PYV2UnY="; 50 }; 51 52 nativeBuildInputs = [
+4
pkgs/tools/misc/turbo/default.nix
··· 12 , extra-cmake-modules 13 , fontconfig 14 , go 15 }: 16 let 17 version = "1.8.3"; ··· 81 82 # Browser tests time out with chromium and google-chrome 83 doCheck = false; 84 85 meta = with lib; { 86 description = "High-performance build system for JavaScript and TypeScript codebases";
··· 12 , extra-cmake-modules 13 , fontconfig 14 , go 15 + , testers 16 + , turbo 17 }: 18 let 19 version = "1.8.3"; ··· 83 84 # Browser tests time out with chromium and google-chrome 85 doCheck = false; 86 + 87 + passthru.tests.version = testers.testVersion { package = turbo; }; 88 89 meta = with lib; { 90 description = "High-performance build system for JavaScript and TypeScript codebases";
+7
pkgs/tools/networking/opensnitch/daemon.nix
··· 11 , iptables 12 , makeWrapper 13 , protoc-gen-go-grpc 14 }: 15 16 buildGoModule rec { ··· 69 wrapProgram $out/bin/opensnitchd \ 70 --prefix PATH : ${lib.makeBinPath [ iptables ]} 71 ''; 72 73 meta = with lib; { 74 description = "An application firewall";
··· 11 , iptables 12 , makeWrapper 13 , protoc-gen-go-grpc 14 + , testers 15 + , opensnitch 16 }: 17 18 buildGoModule rec { ··· 71 wrapProgram $out/bin/opensnitchd \ 72 --prefix PATH : ${lib.makeBinPath [ iptables ]} 73 ''; 74 + 75 + passthru.tests.version = testers.testVersion { 76 + package = opensnitch; 77 + command = "opensnitchd -version"; 78 + }; 79 80 meta = with lib; { 81 description = "An application firewall";
+3 -3
pkgs/tools/security/browserpass/default.nix
··· 1 { lib, buildGoModule, fetchFromGitHub, makeWrapper, gnupg }: 2 buildGoModule rec { 3 pname = "browserpass"; 4 - version = "3.0.10"; 5 6 src = fetchFromGitHub { 7 owner = "browserpass"; 8 repo = "browserpass-native"; 9 rev = version; 10 - sha256 = "8eAwUwcRTnhVDkQc3HsvTP0TqC4LfVrUelxdbJxe9t0="; 11 }; 12 13 nativeBuildInputs = [ makeWrapper ]; 14 15 - vendorSha256 = "gWXcYyIp86b/Pn6vj7qBj/VZS9rTr4weVw0YWmg+36c="; 16 17 doCheck = false; 18
··· 1 { lib, buildGoModule, fetchFromGitHub, makeWrapper, gnupg }: 2 buildGoModule rec { 3 pname = "browserpass"; 4 + version = "3.1.0"; 5 6 src = fetchFromGitHub { 7 owner = "browserpass"; 8 repo = "browserpass-native"; 9 rev = version; 10 + sha256 = "sha256-UZzOPRRiCUIG7uSSp9AEPMDN/+4cgyK47RhrI8oUx8U="; 11 }; 12 13 nativeBuildInputs = [ makeWrapper ]; 14 15 + vendorHash = "sha256-CjuH4ANP2bJDeA+o+1j+obbtk5/NVLet/OFS3Rms4r0="; 16 17 doCheck = false; 18
+3 -3
pkgs/tools/security/step-cli/default.nix
··· 5 6 buildGoModule rec { 7 pname = "step-cli"; 8 - version = "0.23.3"; 9 10 src = fetchFromGitHub { 11 owner = "smallstep"; 12 repo = "cli"; 13 rev = "refs/tags/v${version}"; 14 - hash = "sha256-gJsezi7yczVagR7faQvehyGWW6E7sfDXrJEVdsUSSp0="; 15 }; 16 17 ldflags = [ ··· 25 rm command/certificate/remote_test.go 26 ''; 27 28 - vendorHash = "sha256-YsZGs5/QQLdnXOeEnDXevlnJrOBoLkdYqTj2ZIoUOkA="; 29 30 meta = with lib; { 31 description = "A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc";
··· 5 6 buildGoModule rec { 7 pname = "step-cli"; 8 + version = "0.23.4"; 9 10 src = fetchFromGitHub { 11 owner = "smallstep"; 12 repo = "cli"; 13 rev = "refs/tags/v${version}"; 14 + hash = "sha256-RNuYqmfMrIrWodrn7lpM0YO+HVxz+gKr5IregRqo5ak="; 15 }; 16 17 ldflags = [ ··· 25 rm command/certificate/remote_test.go 26 ''; 27 28 + vendorHash = "sha256-drIVwsqgJsYDXSuu5AhnBnKwwgkhVyNS/HS9FcoJeLM="; 29 30 meta = with lib; { 31 description = "A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc";
+3 -3
pkgs/tools/system/zfxtop/default.nix
··· 5 6 buildGoModule rec { 7 pname = "zfxtop"; 8 - version = "0.2.1"; 9 10 src = fetchFromGitHub { 11 owner = "ssleert"; 12 repo = "zfxtop"; 13 rev = version; 14 - hash = "sha256-9o32sryffcCt/sBnaT5QzD5oLRfJHgq1yKP8d0pk2JQ="; 15 }; 16 17 - vendorHash = "sha256-H1X7j77Wp8ipgNTMZbFwoSA7NrILahFK8YwoP1W3h2c="; 18 19 meta = with lib; { 20 description = "fetch top for gen Z with X written by bubbletea enjoyer";
··· 5 6 buildGoModule rec { 7 pname = "zfxtop"; 8 + version = "0.3.0"; 9 10 src = fetchFromGitHub { 11 owner = "ssleert"; 12 repo = "zfxtop"; 13 rev = version; 14 + hash = "sha256-auq5NvpI7De9/QBUDPFtXwsAeX/D2RmlVaKe/lrs1MQ="; 15 }; 16 17 + vendorHash = "sha256-VKBRgDu9xVbZrC5fadkdFjd1OETNwaxgraRnA34ETzE="; 18 19 meta = with lib; { 20 description = "fetch top for gen Z with X written by bubbletea enjoyer";
+2 -2
pkgs/tools/text/xml/html-xml-utils/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "html-xml-utils"; 5 - version = "8.4"; 6 7 src = fetchurl { 8 url = "https://www.w3.org/Tools/HTML-XML-utils/${pname}-${version}.tar.gz"; 9 - sha256 = "sha256-QbubFOH0zWEC4/jft55xRqJMCWk4aYcxZcQhdppX0Tc="; 10 }; 11 12 buildInputs = [curl libiconv];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "html-xml-utils"; 5 + version = "8.5"; 6 7 src = fetchurl { 8 url = "https://www.w3.org/Tools/HTML-XML-utils/${pname}-${version}.tar.gz"; 9 + sha256 = "sha256-8gpGrE7TDQKM14R25fIPXikXqVy3vOfffxfY+z5Peec="; 10 }; 11 12 buildInputs = [curl libiconv];