Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)

Merge master into staging-next

authored by github-actions[bot] and committed by GitHub 4e2cf997 bfd28dc5

+787 -369
+6
maintainers/maintainer-list.nix
··· 8559 8559 githubId = 3747396; 8560 8560 name = "Nathan Isom"; 8561 8561 }; 8562 + nelsonjeppesen = { 8563 + email = "nix@jeppesen.io"; 8564 + github = "NelsonJeppesen"; 8565 + githubId = 50854675; 8566 + name = "Nelson Jeppesen"; 8567 + }; 8562 8568 neonfuz = { 8563 8569 email = "neonfuz@gmail.com"; 8564 8570 github = "neonfuz";
+7
nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
··· 170 170 </listitem> 171 171 <listitem> 172 172 <para> 173 + <link xlink:href="https://moosefs.com">moosefs</link>, fault 174 + tolerant petabyte distributed file system. Available as 175 + <link linkend="opt-services.moosefs">moosefs</link>. 176 + </para> 177 + </listitem> 178 + <listitem> 179 + <para> 173 180 <link xlink:href="https://github.com/ThomasLeister/prosody-filer">prosody-filer</link>, 174 181 a server for handling XMPP HTTP Upload requests. Available at 175 182 <link linkend="opt-services.prosody-filer.enable">services.prosody-filer</link>.
+3
nixos/doc/manual/release-notes/rl-2205.section.md
··· 51 51 52 52 - [BaGet](https://loic-sharma.github.io/BaGet/), a lightweight NuGet and symbol server. Available at [services.baget](#opt-services.baget.enable). 53 53 54 + - [moosefs](https://moosefs.com), fault tolerant petabyte distributed file system. 55 + Available as [moosefs](#opt-services.moosefs). 56 + 54 57 - [prosody-filer](https://github.com/ThomasLeister/prosody-filer), a server for handling XMPP HTTP Upload requests. Available at [services.prosody-filer](#opt-services.prosody-filer.enable). 55 58 56 59 - [ethercalc](https://github.com/audreyt/ethercalc), an online collaborative
+1
nixos/modules/module-list.nix
··· 682 682 ./services/network-filesystems/litestream/default.nix 683 683 ./services/network-filesystems/netatalk.nix 684 684 ./services/network-filesystems/nfsd.nix 685 + ./services/network-filesystems/moosefs.nix 685 686 ./services/network-filesystems/openafs/client.nix 686 687 ./services/network-filesystems/openafs/server.nix 687 688 ./services/network-filesystems/orangefs/server.nix
+249
nixos/modules/services/network-filesystems/moosefs.nix
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; 4 + 5 + let 6 + cfg = config.services.moosefs; 7 + 8 + mfsUser = if cfg.runAsUser then "moosefs" else "root"; 9 + 10 + settingsFormat = let 11 + listSep = " "; 12 + allowedTypes = with types; [ bool int float str ]; 13 + valueToString = val: 14 + if isList val then concatStringsSep listSep (map (x: valueToString x) val) 15 + else if isBool val then (if val then "1" else "0") 16 + else toString val; 17 + 18 + in { 19 + type = with types; let 20 + valueType = oneOf ([ 21 + (listOf valueType) 22 + ] ++ allowedTypes) // { 23 + description = "Flat key-value file"; 24 + }; 25 + in attrsOf valueType; 26 + 27 + generate = name: value: 28 + pkgs.writeText name ( lib.concatStringsSep "\n" ( 29 + lib.mapAttrsToList (key: val: "${key} = ${valueToString val}") value )); 30 + }; 31 + 32 + 33 + initTool = pkgs.writeShellScriptBin "mfsmaster-init" '' 34 + if [ ! -e ${cfg.master.settings.DATA_PATH}/metadata.mfs ]; then 35 + cp ${pkgs.moosefs}/var/mfs/metadata.mfs.empty ${cfg.master.settings.DATA_PATH} 36 + chmod +w ${cfg.master.settings.DATA_PATH}/metadata.mfs.empty 37 + ${pkgs.moosefs}/bin/mfsmaster -a -c ${masterCfg} start 38 + ${pkgs.moosefs}/bin/mfsmaster -c ${masterCfg} stop 39 + rm ${cfg.master.settings.DATA_PATH}/metadata.mfs.empty 40 + fi 41 + ''; 42 + 43 + # master config file 44 + masterCfg = settingsFormat.generate 45 + "mfsmaster.cfg" cfg.master.settings; 46 + 47 + # metalogger config file 48 + metaloggerCfg = settingsFormat.generate 49 + "mfsmetalogger.cfg" cfg.metalogger.settings; 50 + 51 + # chunkserver config file 52 + chunkserverCfg = settingsFormat.generate 53 + "mfschunkserver.cfg" cfg.chunkserver.settings; 54 + 55 + # generic template for all deamons 56 + systemdService = name: extraConfig: configFile: { 57 + wantedBy = [ "multi-user.target" ]; 58 + wants = [ "network-online.target" ]; 59 + after = [ "network.target" "network-online.target" ]; 60 + 61 + serviceConfig = { 62 + Type = "forking"; 63 + ExecStart = "${pkgs.moosefs}/bin/mfs${name} -c ${configFile} start"; 64 + ExecStop = "${pkgs.moosefs}/bin/mfs${name} -c ${configFile} stop"; 65 + ExecReload = "${pkgs.moosefs}/bin/mfs${name} -c ${configFile} reload"; 66 + PIDFile = "${cfg."${name}".settings.DATA_PATH}/.mfs${name}.lock"; 67 + } // extraConfig; 68 + }; 69 + 70 + in { 71 + ###### interface 72 + 73 + options = { 74 + services.moosefs = { 75 + masterHost = mkOption { 76 + type = types.str; 77 + default = null; 78 + description = "IP or DNS name of master host."; 79 + }; 80 + 81 + runAsUser = mkOption { 82 + type = types.bool; 83 + default = true; 84 + example = true; 85 + description = "Run daemons as user moosefs instead of root."; 86 + }; 87 + 88 + client.enable = mkEnableOption "Moosefs client."; 89 + 90 + master = { 91 + enable = mkOption { 92 + type = types.bool; 93 + description = '' 94 + Enable Moosefs master daemon. 95 + 96 + You need to run <literal>mfsmaster-init</literal> on a freshly installed master server to 97 + initialize the <literal>DATA_PATH</literal> direcory. 98 + ''; 99 + default = false; 100 + }; 101 + 102 + exports = mkOption { 103 + type = with types; listOf str; 104 + default = null; 105 + description = "Paths to export (see mfsexports.cfg)."; 106 + example = [ 107 + "* / rw,alldirs,admin,maproot=0:0" 108 + "* . rw" 109 + ]; 110 + }; 111 + 112 + openFirewall = mkOption { 113 + type = types.bool; 114 + description = "Whether to automatically open the necessary ports in the firewall."; 115 + default = false; 116 + }; 117 + 118 + settings = mkOption { 119 + type = types.submodule { 120 + freeformType = settingsFormat.type; 121 + 122 + options.DATA_PATH = mkOption { 123 + type = types.str; 124 + default = "/var/lib/mfs"; 125 + description = "Data storage directory."; 126 + }; 127 + }; 128 + 129 + description = "Contents of config file (mfsmaster.cfg)."; 130 + }; 131 + }; 132 + 133 + metalogger = { 134 + enable = mkEnableOption "Moosefs metalogger daemon."; 135 + 136 + settings = mkOption { 137 + type = types.submodule { 138 + freeformType = settingsFormat.type; 139 + 140 + options.DATA_PATH = mkOption { 141 + type = types.str; 142 + default = "/var/lib/mfs"; 143 + description = "Data storage directory"; 144 + }; 145 + }; 146 + 147 + description = "Contents of metalogger config file (mfsmetalogger.cfg)."; 148 + }; 149 + }; 150 + 151 + chunkserver = { 152 + enable = mkEnableOption "Moosefs chunkserver daemon."; 153 + 154 + openFirewall = mkOption { 155 + type = types.bool; 156 + description = "Whether to automatically open the necessary ports in the firewall."; 157 + default = false; 158 + }; 159 + 160 + hdds = mkOption { 161 + type = with types; listOf str; 162 + default = null; 163 + description = "Mount points to be used by chunkserver for storage (see mfshdd.cfg)."; 164 + example = [ "/mnt/hdd1" ]; 165 + }; 166 + 167 + settings = mkOption { 168 + type = types.submodule { 169 + freeformType = settingsFormat.type; 170 + 171 + options.DATA_PATH = mkOption { 172 + type = types.str; 173 + default = "/var/lib/mfs"; 174 + description = "Directory for lock file."; 175 + }; 176 + }; 177 + 178 + description = "Contents of chunkserver config file (mfschunkserver.cfg)."; 179 + }; 180 + }; 181 + }; 182 + }; 183 + 184 + ###### implementation 185 + 186 + config = mkIf ( cfg.client.enable || cfg.master.enable || cfg.metalogger.enable || cfg.chunkserver.enable ) { 187 + 188 + warnings = [ ( mkIf (!cfg.runAsUser) "Running moosefs services as root is not recommended.") ]; 189 + 190 + # Service settings 191 + services.moosefs = { 192 + master.settings = mkIf cfg.master.enable { 193 + WORKING_USER = mfsUser; 194 + EXPORTS_FILENAME = toString ( pkgs.writeText "mfsexports.cfg" 195 + (concatStringsSep "\n" cfg.master.exports)); 196 + }; 197 + 198 + metalogger.settings = mkIf cfg.metalogger.enable { 199 + WORKING_USER = mfsUser; 200 + MASTER_HOST = cfg.masterHost; 201 + }; 202 + 203 + chunkserver.settings = mkIf cfg.chunkserver.enable { 204 + WORKING_USER = mfsUser; 205 + MASTER_HOST = cfg.masterHost; 206 + HDD_CONF_FILENAME = toString ( pkgs.writeText "mfshdd.cfg" 207 + (concatStringsSep "\n" cfg.chunkserver.hdds)); 208 + }; 209 + }; 210 + 211 + # Create system user account for daemons 212 + users = mkIf ( cfg.runAsUser && ( cfg.master.enable || cfg.metalogger.enable || cfg.chunkserver.enable ) ) { 213 + users.moosefs = { 214 + isSystemUser = true; 215 + description = "moosefs daemon user"; 216 + group = "moosefs"; 217 + }; 218 + groups.moosefs = {}; 219 + }; 220 + 221 + environment.systemPackages = 222 + (lib.optional cfg.client.enable pkgs.moosefs) ++ 223 + (lib.optional cfg.master.enable initTool); 224 + 225 + networking.firewall.allowedTCPPorts = 226 + (lib.optionals cfg.master.openFirewall [ 9419 9420 9421 ]) ++ 227 + (lib.optional cfg.chunkserver.openFirewall 9422); 228 + 229 + # Ensure storage directories exist 230 + systemd.tmpfiles.rules = 231 + optional cfg.master.enable "d ${cfg.master.settings.DATA_PATH} 0700 ${mfsUser} ${mfsUser}" 232 + ++ optional cfg.metalogger.enable "d ${cfg.metalogger.settings.DATA_PATH} 0700 ${mfsUser} ${mfsUser}" 233 + ++ optional cfg.chunkserver.enable "d ${cfg.chunkserver.settings.DATA_PATH} 0700 ${mfsUser} ${mfsUser}"; 234 + 235 + # Service definitions 236 + systemd.services.mfs-master = mkIf cfg.master.enable 237 + ( systemdService "master" { 238 + TimeoutStartSec = 1800; 239 + TimeoutStopSec = 1800; 240 + Restart = "no"; 241 + } masterCfg ); 242 + 243 + systemd.services.mfs-metalogger = mkIf cfg.metalogger.enable 244 + ( systemdService "metalogger" { Restart = "on-abnormal"; } metaloggerCfg ); 245 + 246 + systemd.services.mfs-chunkserver = mkIf cfg.chunkserver.enable 247 + ( systemdService "chunkserver" { Restart = "on-abnormal"; } chunkserverCfg ); 248 + }; 249 + }
+1
nixos/tests/all-tests.nix
··· 305 305 moodle = handleTest ./moodle.nix {}; 306 306 morty = handleTest ./morty.nix {}; 307 307 mosquitto = handleTest ./mosquitto.nix {}; 308 + moosefs = handleTest ./moosefs.nix {}; 308 309 mpd = handleTest ./mpd.nix {}; 309 310 mpv = handleTest ./mpv.nix {}; 310 311 mumble = handleTest ./mumble.nix {};
+89
nixos/tests/moosefs.nix
··· 1 + import ./make-test-python.nix ({ pkgs, ... } : 2 + 3 + let 4 + master = { pkgs, ... } : { 5 + # data base is stored in memory 6 + # server crashes with default memory size 7 + virtualisation.memorySize = 1024; 8 + 9 + services.moosefs.master = { 10 + enable = true; 11 + openFirewall = true; 12 + exports = [ 13 + "* / rw,alldirs,admin,maproot=0:0" 14 + "* . rw" 15 + ]; 16 + }; 17 + }; 18 + 19 + chunkserver = { pkgs, ... } : { 20 + virtualisation.emptyDiskImages = [ 4096 ]; 21 + boot.initrd.postDeviceCommands = '' 22 + ${pkgs.e2fsprogs}/bin/mkfs.ext4 -L data /dev/vdb 23 + ''; 24 + 25 + fileSystems = pkgs.lib.mkVMOverride { 26 + "/data" = { 27 + device = "/dev/disk/by-label/data"; 28 + fsType = "ext4"; 29 + }; 30 + }; 31 + 32 + services.moosefs = { 33 + masterHost = "master"; 34 + chunkserver = { 35 + openFirewall = true; 36 + enable = true; 37 + hdds = [ "~/data" ]; 38 + }; 39 + }; 40 + }; 41 + 42 + metalogger = { pkgs, ... } : { 43 + services.moosefs = { 44 + masterHost = "master"; 45 + metalogger.enable = true; 46 + }; 47 + }; 48 + 49 + client = { pkgs, ... } : { 50 + services.moosefs.client.enable = true; 51 + }; 52 + 53 + in { 54 + name = "moosefs"; 55 + 56 + nodes= { 57 + inherit master; 58 + inherit metalogger; 59 + chunkserver1 = chunkserver; 60 + chunkserver2 = chunkserver; 61 + client1 = client; 62 + client2 = client; 63 + }; 64 + 65 + testScript = '' 66 + # prepare master server 67 + master.start() 68 + master.wait_for_unit("multi-user.target") 69 + master.succeed("mfsmaster-init") 70 + master.succeed("systemctl restart mfs-master") 71 + master.wait_for_unit("mfs-master.service") 72 + 73 + metalogger.wait_for_unit("mfs-metalogger.service") 74 + 75 + for chunkserver in [chunkserver1, chunkserver2]: 76 + chunkserver.wait_for_unit("multi-user.target") 77 + chunkserver.succeed("chown moosefs:moosefs /data") 78 + chunkserver.succeed("systemctl restart mfs-chunkserver") 79 + chunkserver.wait_for_unit("mfs-chunkserver.service") 80 + 81 + for client in [client1, client2]: 82 + client.wait_for_unit("multi-user.target") 83 + client.succeed("mkdir /moosefs") 84 + client.succeed("mount -t moosefs master:/ /moosefs") 85 + 86 + client1.succeed("echo test > /moosefs/file") 87 + client2.succeed("grep test /moosefs/file") 88 + ''; 89 + })
+8 -3
pkgs/applications/misc/mediaelch/default.nix
··· 11 11 , qtmultimedia 12 12 , qtsvg 13 13 , qttools 14 + , quazip 14 15 }: 15 16 16 17 mkDerivation rec { 17 18 pname = "mediaelch"; 18 - version = "2.8.12"; 19 + version = "2.8.14"; 19 20 20 21 src = fetchFromGitHub { 21 22 owner = "Komet"; 22 23 repo = "MediaElch"; 23 24 rev = "v${version}"; 24 - sha256 = "1gx4m9cf81d0b2nk2rlqm4misz67f5bpkjqx7d1l76rw2pwc6azf"; 25 + sha256 = "sha256-yHThX5Xs+8SijNKgmg+4Mawbwi3zHA/DJQoIBy0Wchs="; 25 26 fetchSubmodules = true; 26 27 }; 27 28 ··· 29 30 30 31 buildInputs = [ curl libmediainfo libzen ffmpeg qtbase qtdeclarative qtmultimedia qtsvg ]; 31 32 32 - prePatch = '' 33 + qmakeFlags = [ 34 + "USE_EXTERN_QUAZIP=${quazip}/include/quazip5" 35 + ]; 36 + 37 + postPatch = '' 33 38 substituteInPlace MediaElch.pro --replace "/usr" "$out" 34 39 ''; 35 40
+157 -158
pkgs/applications/networking/cluster/terraform-providers/providers.json
··· 3 3 "owner": "CiscoDevNet", 4 4 "provider-source-address": "registry.terraform.io/CiscoDevNet/aci", 5 5 "repo": "terraform-provider-aci", 6 - "rev": "v1.2.0", 7 - "sha256": "1jxnamd701fjz0y62k229njrxa3ijmr1m1dszn0x3mpak5qgw7li", 6 + "rev": "v2.0.0", 7 + "sha256": "1v62lfm9w8d8iq70nwjrry52zxh5ixmxfp0dlmxvck7qjzcng8rg", 8 8 "vendorSha256": null, 9 - "version": "1.2.0" 9 + "version": "2.0.0" 10 10 }, 11 11 "acme": { 12 12 "owner": "vancluever", 13 13 "provider-source-address": "registry.terraform.io/vancluever/acme", 14 14 "repo": "terraform-provider-acme", 15 - "rev": "v2.7.1", 16 - "sha256": "0gnq8jm31v0q2a4v310cjrrdc7y17c9vi326c6x9cs3lgjvn27m2", 17 - "vendorSha256": "1wssw8x8zlrgx51ij0ghhwsbyzfl2r1qy4aqv03v705xipil8yn3", 18 - "version": "2.7.1" 15 + "rev": "v2.8.0", 16 + "sha256": "06wjvjsh8qgncrbdhziqjd4pgp550q21p0xm4igdx80gd7541hr1", 17 + "vendorSha256": "1gpbc72q7mjyjxk75dyfi3j2fk6glgz0a15m2pq7clyc35kapnkc", 18 + "version": "2.8.0" 19 19 }, 20 20 "aiven": { 21 21 "owner": "aiven", 22 22 "provider-source-address": "registry.terraform.io/aiven/aiven", 23 23 "repo": "terraform-provider-aiven", 24 - "rev": "v2.5.0", 25 - "sha256": "1x37bnykn28hmb80qi530zgk6jfqpk97nswrm0hdw8x5vac4v63a", 26 - "vendorSha256": "0ldk06dj72551b6djsq7vil0hzfsp3ixwh3ikqb40shsdq10iplx", 27 - "version": "2.5.0" 24 + "rev": "v2.6.0", 25 + "sha256": "1vbphaxw6qskn7g4jah00cpw2w960x50rpvx5kq143d8b2vbiix4", 26 + "vendorSha256": "1zxs0p2xwxgvxdx65h0yfvzl7qmqlw41ipw0gsf25g0mvs4jckwb", 27 + "version": "2.6.0" 28 28 }, 29 29 "akamai": { 30 30 "owner": "akamai", 31 31 "provider-source-address": "registry.terraform.io/akamai/akamai", 32 32 "repo": "terraform-provider-akamai", 33 - "rev": "v1.9.1", 34 - "sha256": "17a3ml4h1b1480z9dzppig20jx9mgldnmpz8cn2x8qgzbpiqz3hs", 35 - "vendorSha256": "0l50hy4cy360g6adbhhbl4x8hagma9zfb3yyzk6vbslal9m4kd6j", 36 - "version": "1.9.1" 33 + "rev": "v1.10.0", 34 + "sha256": "1nsgdqdg3p08f40427qxk3whwgqw1xdsks55d3j8j94zgrndmpv3", 35 + "vendorSha256": "11q46n36yv56ivdax7w2hsyl65jwylxgwdfvnfz4w3p1bpyy0qxv", 36 + "version": "1.10.0" 37 37 }, 38 38 "alicloud": { 39 39 "deleteVendor": true, 40 40 "owner": "aliyun", 41 41 "provider-source-address": "registry.terraform.io/aliyun/alicloud", 42 42 "repo": "terraform-provider-alicloud", 43 - "rev": "v1.153.0", 44 - "sha256": "1h37sxzkngmikvmyj9isx45vcpd31ml47f4r6ii1h2l69182hsqs", 43 + "rev": "v1.154.0", 44 + "sha256": "1wmmy82c44jdq9xgli24wgh2nb2jg6xw0nlm35psyj0jmmxvisrw", 45 45 "vendorSha256": "18chs2723i2cxhhm649mz52pp6wrfqzxgk12zxq9idrhicchqnzg", 46 - "version": "1.153.0" 46 + "version": "1.154.0" 47 47 }, 48 48 "ansible": { 49 49 "owner": "nbering", ··· 67 67 "owner": "alexkappa", 68 68 "provider-source-address": "registry.terraform.io/alexkappa/auth0", 69 69 "repo": "terraform-provider-auth0", 70 - "rev": "v0.26.1", 71 - "sha256": "03nzwsda6n1nycpk2w87b8fj6aqzid8i2fa29qd9skwplm7hyjfk", 72 - "vendorSha256": "0k6lylkcdvm0piaic8hdbhg1jf1vzc897w1sq7v57brx7586h3sc", 73 - "version": "0.26.1" 70 + "rev": "v0.26.2", 71 + "sha256": "1n9gn7zsdygdr2ybki7xz2snp3fygls6myb1w5zndby497kgxrkw", 72 + "vendorSha256": "1x61f7vz73m2q6pdb6ddy27j4npiwrrlgzvd90zrcc0yj22h6mms", 73 + "version": "0.26.2" 74 74 }, 75 75 "avi": { 76 76 "owner": "vmware", ··· 85 85 "owner": "AviatrixSystems", 86 86 "provider-source-address": "registry.terraform.io/AviatrixSystems/aviatrix", 87 87 "repo": "terraform-provider-aviatrix", 88 - "rev": "v2.20.3", 89 - "sha256": "1k3sdfn0np9nzvc0bfc2wi7ixbrv0ikmzwyh103jfppidkasy5yq", 88 + "rev": "v2.21.0-6.6.ga", 89 + "sha256": "0svims34vw8xplza77flp675r90rsh9gj8cb5c02knnh4lgf7ffv", 90 90 "vendorSha256": null, 91 - "version": "2.20.3" 91 + "version": "2.21.0-6.6.ga" 92 92 }, 93 93 "aws": { 94 94 "owner": "hashicorp", 95 95 "provider-source-address": "registry.terraform.io/hashicorp/aws", 96 96 "repo": "terraform-provider-aws", 97 - "rev": "v3.73.0", 98 - "sha256": "0la188dljw15l09j2farlhgri0vhrlbmsay7q1ar2y4ralqlsgl8", 99 - "vendorSha256": "1h2x1318ax4qdy261wm8pqxq21ra50hymcykhw6mhj5lqxcb5r5z", 100 - "version": "3.73.0" 97 + "rev": "v3.74.0", 98 + "sha256": "1w8xgsc4xb86m2why5wgq3vj48rsz9m4fp9lpdid0x5836dg3wxl", 99 + "vendorSha256": "104a93i9dqcbwr4rzbqlzz6jw68x2bq2w21s5n03i4pf4a170p1l", 100 + "version": "3.74.0" 101 101 }, 102 102 "azuread": { 103 103 "owner": "hashicorp", 104 104 "provider-source-address": "registry.terraform.io/hashicorp/azuread", 105 105 "repo": "terraform-provider-azuread", 106 - "rev": "v2.15.0", 107 - "sha256": "1gjx91svfg25x0hlx6mfam40615x278b9vxsy5p88s3dl6xs3hdv", 106 + "rev": "v2.17.0", 107 + "sha256": "183lpw9d22arw9yap614khbn77w5914rgq5vclscsa4k8jbiszy3", 108 108 "vendorSha256": null, 109 - "version": "2.15.0" 109 + "version": "2.17.0" 110 110 }, 111 111 "azurerm": { 112 112 "owner": "hashicorp", 113 113 "provider-source-address": "registry.terraform.io/hashicorp/azurerm", 114 114 "repo": "terraform-provider-azurerm", 115 - "rev": "v2.93.0", 116 - "sha256": "0akacaih0smdjxh9ssdir1j248m5bpcc4wpwhykb7922yvj581ds", 115 + "rev": "v2.95.0", 116 + "sha256": "1xqfnc7c3ddgpj3mhp9x50kaszc01jwrwhkm0gxn9ixy0bqy4v7m", 117 117 "vendorSha256": null, 118 - "version": "2.93.0" 118 + "version": "2.95.0" 119 119 }, 120 120 "azurestack": { 121 121 "owner": "hashicorp", ··· 148 148 "owner": "brightbox", 149 149 "provider-source-address": "registry.terraform.io/brightbox/brightbox", 150 150 "repo": "terraform-provider-brightbox", 151 - "rev": "v2.0.6", 152 - "sha256": "0k3k6d0rnvs1r2fb22q37g10zi0wq9kvakvj6zw97hkfld9wrqfj", 153 - "vendorSha256": "07mznpp2mr1n9izgk2s8aibfvqsamj533666s46x1k49p0sh7lqx", 154 - "version": "2.0.6" 151 + "rev": "v2.0.7", 152 + "sha256": "0p2gg24yvzghhsa5g1dqd27vkj6p2wyr3wxd964r5kz0sl80xh1y", 153 + "vendorSha256": "05min7zgl9q4qw8v5ivf352pg4i5jnv449jl129vdsqz7p2wrc6d", 154 + "version": "2.0.7" 155 155 }, 156 156 "checkly": { 157 157 "owner": "checkly", 158 158 "provider-source-address": "registry.terraform.io/checkly/checkly", 159 159 "repo": "terraform-provider-checkly", 160 - "rev": "v1.4.0-rc1", 161 - "sha256": "125ng4yzsmnbzgvwn3d2070cxnp3jvzpp8m9sc95q9x7dprbxzvl", 162 - "vendorSha256": "1dkij2anw0cy8h2pv8h9a0cr0r9skpcc0j26bggspigk8qa4nzsx", 163 - "version": "1.4.0-rc1" 160 + "rev": "v1.4.0-rc2", 161 + "sha256": "0n8wlngvz3lnpadsj339gx73jnnfxlhsy091a2lws4s3c9a0ncgb", 162 + "vendorSha256": "1bqwfl5qc0w5qwkg0b42iyrhcchm2zxaxh6qmvk5hynxdwczqvk8", 163 + "version": "1.4.0-rc2" 164 164 }, 165 165 "checkpoint": { 166 166 "deleteVendor": true, ··· 185 185 "owner": "cloudflare", 186 186 "provider-source-address": "registry.terraform.io/cloudflare/cloudflare", 187 187 "repo": "terraform-provider-cloudflare", 188 - "rev": "v3.7.0", 189 - "sha256": "1d1wljk033b9j5sx01xjv5jmclw79f2f21s8zsix036mmzvaiswb", 190 - "vendorSha256": "1g3fyxrdqa4ds6n9pcw2mvi8nfiz4dna57ssvggfwic4jl89q7zm", 191 - "version": "3.7.0" 188 + "rev": "v3.8.0", 189 + "sha256": "1splgbfjwfjx9qv5f526jk7yzfh24crw0xasx42jfia639m6s49c", 190 + "vendorSha256": "0cf96s4xgx2idx7g40qhk16fwhdfnk1pcl6dy3cl2zr4afz5sky1", 191 + "version": "3.8.0" 192 192 }, 193 193 "cloudfoundry": { 194 194 "owner": "cloudfoundry-community", ··· 266 266 "owner": "digitalocean", 267 267 "provider-source-address": "registry.terraform.io/digitalocean/digitalocean", 268 268 "repo": "terraform-provider-digitalocean", 269 - "rev": "v2.17.0", 270 - "sha256": "0in6xg4kgqy1izi8zapdi0f6dsni3i27fxh1l4sqp5kwh3vgpn0d", 269 + "rev": "v2.17.1", 270 + "sha256": "0dfw4sjmsfzrs28gf5k4vqjs6phwa6w3pwi7fpbngnw6l2r4m6h9", 271 271 "vendorSha256": null, 272 - "version": "2.17.0" 272 + "version": "2.17.1" 273 273 }, 274 274 "dme": { 275 275 "owner": "DNSMadeEasy", ··· 302 302 "owner": "kreuzwerker", 303 303 "provider-source-address": "registry.terraform.io/kreuzwerker/docker", 304 304 "repo": "terraform-provider-docker", 305 - "rev": "v2.15.0", 306 - "sha256": "0fk4i8hi0x40rgcnq40j4jv12wsn9kn974h8qwhzxnd66n0xbnv0", 307 - "vendorSha256": "0ax2368nhi6hfs4zwf84dqnf5ijyy93gz0brlfk89m7d2a90gfkp", 308 - "version": "2.15.0" 305 + "rev": "v2.16.0", 306 + "sha256": "0bh27al9s6zczdz208lr70qab517lsazpi708z6711pgns7qhwjm", 307 + "vendorSha256": "0ykfmksffcc62xwni9dqwgj3vlcmzf6paz6kviljib6sv9vqf0pm", 308 + "version": "2.16.0" 309 309 }, 310 310 "dome9": { 311 311 "owner": "dome9", ··· 356 356 "owner": "FlexibleEngineCloud", 357 357 "provider-source-address": "registry.terraform.io/FlexibleEngineCloud/flexibleengine", 358 358 "repo": "terraform-provider-flexibleengine", 359 - "rev": "v1.26.0", 360 - "sha256": "1n22jll76gw3cxnyi2xfzh3mh0g9912rmkqpps7fid0imaz5jlck", 359 + "rev": "v1.27.0", 360 + "sha256": "0xc0a1gzdld039b4vlivf9b8g3pjja6pfzyqhjx0iy01akm1a9cc", 361 361 "vendorSha256": null, 362 - "version": "1.26.0" 362 + "version": "1.27.0" 363 363 }, 364 364 "fortios": { 365 365 "owner": "fortinetdev", 366 366 "provider-source-address": "registry.terraform.io/fortinetdev/fortios", 367 367 "repo": "terraform-provider-fortios", 368 - "rev": "v1.13.2", 369 - "sha256": "042fn5jii9fx7vb6x4kcvmrmiccj7s13xqm91l3b2i9mzh4cgb3k", 368 + "rev": "v1.14.0", 369 + "sha256": "078wvbihrs6j5yrbqsx5g6l7z05y98kwlyanq5w99fsazz78rr4h", 370 370 "vendorSha256": null, 371 - "version": "1.13.2" 371 + "version": "1.14.0" 372 372 }, 373 373 "gandi": { 374 374 "owner": "go-gandi", ··· 383 383 "owner": "integrations", 384 384 "provider-source-address": "registry.terraform.io/integrations/github", 385 385 "repo": "terraform-provider-github", 386 - "rev": "v4.19.2", 387 - "sha256": "0k6w1wxx9a67wkgh4j4aswbpcnlnjcvqnfi0gy2rw9kqbyxb9j0m", 386 + "rev": "v4.20.0", 387 + "sha256": "0cibbzj3nj5dgi2mcr93bdxwvb7r2qscwshjbssbc7avwvhh3171", 388 388 "vendorSha256": null, 389 - "version": "4.19.2" 389 + "version": "4.20.0" 390 390 }, 391 391 "gitlab": { 392 392 "owner": "gitlabhq", 393 393 "provider-source-address": "registry.terraform.io/gitlabhq/gitlab", 394 394 "repo": "terraform-provider-gitlab", 395 - "rev": "v3.8.0", 396 - "sha256": "0ha6lp0z3lqdk05fhggdgdz50dm7z6ksn648khp44n7in0c0c5pj", 397 - "vendorSha256": "143marl3zrqd37cgr6s6fdbx8dfmcchzc1f63140i4m07ygxwhxn", 398 - "version": "3.8.0" 395 + "rev": "v3.9.1", 396 + "sha256": "1pqwgshjrzdw8prgadwq0hf0q72jjjfaas6kgh2as3yn8q24ynca", 397 + "vendorSha256": "04v5hgq23rpz6h242v0m2zhpsfmx4h97pf396w4v6j0kj1wabf87", 398 + "version": "3.9.1" 399 399 }, 400 400 "google": { 401 401 "owner": "hashicorp", 402 402 "provider-source-address": "registry.terraform.io/hashicorp/google", 403 403 "proxyVendor": true, 404 404 "repo": "terraform-provider-google", 405 - "rev": "v4.7.0", 406 - "sha256": "15w69dyr0s818as7v8pwzdbfs82l23qn846a7xlihw2g49xk0cah", 407 - "vendorSha256": "144kv885w2gfsljj8vx7q9pgrpyshpn392162ljzpjb6qx3qzzxj", 408 - "version": "4.7.0" 405 + "rev": "v4.9.0", 406 + "sha256": "17f6d9dhsakllrlxxnp9ysqqqlr876jyjpz1hvk2h99skwp89xg5", 407 + "vendorSha256": "1izwgxv1kplay15p8dbjnkllpnh4ic9di93zyi7wy6lhl8gi83hx", 408 + "version": "4.9.0" 409 409 }, 410 410 "google-beta": { 411 411 "owner": "hashicorp", 412 412 "provider-source-address": "registry.terraform.io/hashicorp/google-beta", 413 413 "proxyVendor": true, 414 414 "repo": "terraform-provider-google-beta", 415 - "rev": "v4.7.0", 416 - "sha256": "0jnz05yvhlawgc188xazv1fvqsqvpm867xf3i93xpl248pr1vqlf", 417 - "vendorSha256": "144kv885w2gfsljj8vx7q9pgrpyshpn392162ljzpjb6qx3qzzxj", 418 - "version": "4.7.0" 415 + "rev": "v4.9.0", 416 + "sha256": "0wv5m9ixhsq3i0vhcc9jcm0xx1mryab2m22wfiy1w8m73gls96r2", 417 + "vendorSha256": "1izwgxv1kplay15p8dbjnkllpnh4ic9di93zyi7wy6lhl8gi83hx", 418 + "version": "4.9.0" 419 419 }, 420 420 "grafana": { 421 421 "owner": "grafana", 422 422 "provider-source-address": "registry.terraform.io/grafana/grafana", 423 423 "repo": "terraform-provider-grafana", 424 - "rev": "v1.18.0", 425 - "sha256": "1qvhdshaiy1v7557nkh869k1wmz604pv2gchv98vrm3cp7zj83zn", 426 - "vendorSha256": "1rgvil2kw38kbgbgcjy8mbkahj6zm91s187x41vd4x7ypc5kgbkn", 427 - "version": "1.18.0" 424 + "rev": "v1.19.0", 425 + "sha256": "1ch4nxva1ixmgm6kjyvbd4ydrl8w39ll0ljpk1m2lrg5pn349mjn", 426 + "vendorSha256": "0z8sd1hq0hhm51fi91ri6dmsq6brba9vd22gxkgzxfdsncq24h2a", 427 + "version": "1.19.0" 428 428 }, 429 429 "gridscale": { 430 430 "owner": "gridscale", ··· 457 457 "owner": "heroku", 458 458 "provider-source-address": "registry.terraform.io/heroku/heroku", 459 459 "repo": "terraform-provider-heroku", 460 - "rev": "v4.8.0", 461 - "sha256": "12v0agcib8bziywaqzn6p04pwxnzyn74kqc5al8n572k0ndw3bps", 460 + "rev": "v4.9.0", 461 + "sha256": "0h61wldnjmmqfhjxvjf6jh0h6v22zx7rmff48pw1dyir19di7mdr", 462 462 "vendorSha256": "183j20my61mqhch87cn455l938jqx4ssbnv8yl416i6bxgcpy6f9", 463 - "version": "4.8.0" 463 + "version": "4.9.0" 464 464 }, 465 465 "http": { 466 466 "owner": "hashicorp", ··· 475 475 "owner": "huaweicloud", 476 476 "provider-source-address": "registry.terraform.io/huaweicloud/huaweicloud", 477 477 "repo": "terraform-provider-huaweicloud", 478 - "rev": "v1.32.1", 479 - "sha256": "05rm1cmpbmavza1pyqjzrd316v6r68427cjhqy6bngb749nc1als", 478 + "rev": "v1.33.0", 479 + "sha256": "07m2kzx4m9gn9j5czlfdsq0a1ki8vfwlywrfgz2jxvz2cqnn4gsx", 480 480 "vendorSha256": null, 481 - "version": "1.32.1" 481 + "version": "1.33.0" 482 482 }, 483 483 "huaweicloudstack": { 484 484 "owner": "huaweicloud", ··· 502 502 "owner": "IBM-Cloud", 503 503 "provider-source-address": "registry.terraform.io/IBM-Cloud/ibm", 504 504 "repo": "terraform-provider-ibm", 505 - "rev": "v1.38.0", 506 - "sha256": "0cbyq74fy3y7ia8lywr8amwcjq53bn3psymyl5cnwqx8y97avx5w", 507 - "vendorSha256": "0cgl87pij4amn77ksbrzl0qlf6a5ga29b64cnasq8lq03lbmqzw4", 508 - "version": "1.38.0" 505 + "rev": "v1.38.1", 506 + "sha256": "08ssvqa4c4f2fnxzi3gfz9ygl6abh13s330q0lwq1zmfy1lzfjvg", 507 + "vendorSha256": "1s77rmqd7igzlhd01jh6l56yar241jhb5ipfkch50yglkr7lqij5", 508 + "version": "1.38.1" 509 509 }, 510 510 "icinga2": { 511 511 "owner": "Icinga", ··· 547 547 "owner": "mrparkers", 548 548 "provider-source-address": "registry.terraform.io/mrparkers/keycloak", 549 549 "repo": "terraform-provider-keycloak", 550 - "rev": "v3.6.0", 551 - "sha256": "1lrnzfjrw0yn4hsklhikf75n6drra7nljlzxf2asfkfaiwgcik99", 552 - "vendorSha256": "17v5h5s2vijfx5yxhindr30g8ilmz7hamkxhmlk0zg5qb80mzqc1", 553 - "version": "3.6.0" 550 + "rev": "v3.7.0", 551 + "sha256": "1qzdm0jgk6f0zyjbv5qaq24h9a37bgb4ghym61vg763lqra69als", 552 + "vendorSha256": "1q5z54rz5lqgdv9gfl20gfnzi4in0d65jkfxnmmsx6fjcb9ih4p6", 553 + "version": "3.7.0" 554 554 }, 555 555 "ksyun": { 556 556 "owner": "kingsoftcloud", ··· 592 592 "owner": "dmacvicar", 593 593 "provider-source-address": "registry.terraform.io/dmacvicar/libvirt", 594 594 "repo": "terraform-provider-libvirt", 595 - "rev": "v0.6.13", 596 - "sha256": "1fvxvijl5vjx7gb4w19pf4gcq97pisiznr2n72ybpma46c2clx2h", 597 - "vendorSha256": "0rck411b4dh2zh4m4m6h2d03zlv5wm94li9dq5ggr0lspfx6nv1i", 598 - "version": "0.6.13" 595 + "rev": "v0.6.14", 596 + "sha256": "1x1xl3blcs4dpjavf4im82l9vrv0plyyiayy475qjf0sl028criy", 597 + "vendorSha256": "1kq0sbz7sv4gw35wl52z7gjv588r82izhrz7ydf5n0c4d2izmg6a", 598 + "version": "0.6.14" 599 599 }, 600 600 "linode": { 601 601 "owner": "linode", 602 602 "provider-source-address": "registry.terraform.io/linode/linode", 603 603 "repo": "terraform-provider-linode", 604 - "rev": "v1.25.1", 605 - "sha256": "1sy3hg9scfidrn3z9ip6ryxghv1s9zlhwccl8k2s2b05xkx43j23", 604 + "rev": "v1.25.2", 605 + "sha256": "18w9x80zary64873d1r824g28l5dhkda1qq0lr895afwh8g11dfp", 606 606 "vendorSha256": "0c882yafydhdhnp5awb8llzbmiljfdbamqlx740347ywpliy0ga2", 607 - "version": "1.25.1" 607 + "version": "1.25.2" 608 608 }, 609 609 "linuxbox": { 610 610 "owner": "numtide", ··· 674 674 "owner": "aminueza", 675 675 "provider-source-address": "registry.terraform.io/aminueza/minio", 676 676 "repo": "terraform-provider-minio", 677 - "rev": "v1.2.0", 678 - "sha256": "07f7kflmy0n8vbcxs2f62iqwm8fw8r97vgwwp38hmz3f1bix42qn", 679 - "vendorSha256": "0pg1m7zp6363c98cww9cv4jsyavq201spc4lxcs5920xz00z86bw", 680 - "version": "1.2.0" 677 + "rev": "v1.3.0", 678 + "sha256": "0cgjcq5fk4cyxrpvqkg7nk9hjzr28nmhmlnhclx9bw2rm3g7i000", 679 + "vendorSha256": "0p3mg2j89jjkhgv57l5pkpyjdhbh41ilb5az5y2m5zz3kbl4y13b", 680 + "version": "1.3.0" 681 681 }, 682 682 "mongodbatlas": { 683 683 "owner": "mongodb", ··· 692 692 "owner": "NaverCloudPlatform", 693 693 "provider-source-address": "registry.terraform.io/NaverCloudPlatform/ncloud", 694 694 "repo": "terraform-provider-ncloud", 695 - "rev": "v2.2.1", 696 - "sha256": "0igzwc1hycnlcvgi0il1z94xlb6rlklr1h7j909im1am3p6s3q1s", 695 + "rev": "v2.2.2", 696 + "sha256": "0f2q0k04bkkqw6qsjfpbmrqgxn504ys0ffg2ids82vzxjsmfpi1n", 697 697 "vendorSha256": "1799i4d32y22v6ywwklm3ncmzir5hg8cw23jzb8d28xiw8vswhs4", 698 - "version": "2.2.1" 698 + "version": "2.2.2" 699 699 }, 700 700 "netlify": { 701 701 "owner": "AegirHealth", ··· 710 710 "owner": "newrelic", 711 711 "provider-source-address": "registry.terraform.io/newrelic/newrelic", 712 712 "repo": "terraform-provider-newrelic", 713 - "rev": "v2.35.0", 714 - "sha256": "0pwy3vsj332v82n3is6xaw4mgvv968ffr8n41s1r7j39r8bpl77f", 715 - "vendorSha256": "13xqrdv0xnza0yxdgk155x4vq8lai9jrjvnfp153jb5p5hfnzwmp", 716 - "version": "2.35.0" 713 + "rev": "v2.36.2", 714 + "sha256": "0gz6yynpmzv2hs85y6a6kfsci1hx25gikbmq35w9kvv91gn7vd22", 715 + "vendorSha256": "1i7zgdh63q8m6267k51xn711vhjx5zyq2xgnfr7i38xczrw6rcsq", 716 + "version": "2.36.2" 717 717 }, 718 718 "nomad": { 719 719 "owner": "hashicorp", ··· 725 725 "version": "1.4.16" 726 726 }, 727 727 "ns1": { 728 - "deleteVendor": true, 729 728 "owner": "ns1-terraform", 730 729 "provider-source-address": "registry.terraform.io/ns1-terraform/ns1", 731 730 "repo": "terraform-provider-ns1", 732 - "rev": "v1.12.2", 733 - "sha256": "01cmfmg429vp7j8xb9fvfvwg9l3pwjrpv9a4jbdbhh8gaarpw8db", 734 - "vendorSha256": "0nk8xs24hwsarr22h5m1qcpixg7ijdkah5686wkp51y8cp69v25r", 735 - "version": "1.12.2" 731 + "rev": "v1.12.5", 732 + "sha256": "0g69jr96ns2h578cmh5zz27m5dkgygrfr6shvx79wal26fpr8413", 733 + "vendorSha256": "0s70626ng7pvqxnx0a4rp22b8spy45y011bvvm77fndm8fc1w9zn", 734 + "version": "1.12.5" 736 735 }, 737 736 "nsxt": { 738 737 "owner": "vmware", ··· 766 765 "owner": "terraform-providers", 767 766 "provider-source-address": "registry.terraform.io/hashicorp/oci", 768 767 "repo": "terraform-provider-oci", 769 - "rev": "v4.60.0", 770 - "sha256": "02wxisy2c9g6kkg6wrgv99qfrds26xwqfj2m3v97y0ldpi2fhbpa", 768 + "rev": "v4.62.0", 769 + "sha256": "1mnk1sk12jk9xsqfarfl0c33h176jhj7c8jdhxv2p8bf92c5jhfn", 771 770 "vendorSha256": null, 772 - "version": "4.60.0" 771 + "version": "4.62.0" 773 772 }, 774 773 "okta": { 775 774 "owner": "okta", 776 775 "provider-source-address": "registry.terraform.io/okta/okta", 777 776 "repo": "terraform-provider-okta", 778 - "rev": "v3.20.3", 779 - "sha256": "0m9y0dagav1pw8cz6pv9zkhag59f9bbn8b6zi1h3lcgvmzf303wv", 780 - "vendorSha256": "156nyjga5q5mgwiq6aynp199i0hn5mvckj2h7j3pfzc1yz8ri5cc", 781 - "version": "3.20.3" 777 + "rev": "v3.20.6", 778 + "sha256": "0v6fmdkdc3bqvqb1jh1z75sk03qy7409anfd2xdxr5nfvmkd9jrr", 779 + "vendorSha256": "1ybwn1v77kq93h9v8ymfmlf1lk4lm4yh9490js583v0kasnm2q5s", 780 + "version": "3.20.6" 782 781 }, 783 782 "oktaasa": { 784 783 "owner": "oktadeveloper", ··· 884 883 "owner": "cyrilgdn", 885 884 "provider-source-address": "registry.terraform.io/cyrilgdn/postgresql", 886 885 "repo": "terraform-provider-postgresql", 887 - "rev": "v1.14.0", 888 - "sha256": "08z8i2y4qmq7zd50hjaiz6vazwb9yszm1c0mxc87sxayj0mcyl6r", 889 - "vendorSha256": null, 890 - "version": "1.14.0" 886 + "rev": "v1.15.0", 887 + "sha256": "04gm7y5qyvipg0a0glgyx257vjrkk4k5pjrvzik6adyrjyidixw1", 888 + "vendorSha256": "0pp9c76zdpfyq57jcwv258gipvmy6hjqi933xdi155hkx45cnixr", 889 + "version": "1.15.0" 891 890 }, 892 891 "powerdns": { 893 892 "owner": "pan-net", ··· 929 928 "owner": "rundeck", 930 929 "provider-source-address": "registry.terraform.io/rundeck/rundeck", 931 930 "repo": "terraform-provider-rundeck", 932 - "rev": "v0.4.2", 933 - "sha256": "0447hsmdf8k4464m56c7ipn9a05rv6hlrjb7q8b1jdwh2j5yq8pr", 931 + "rev": "v0.4.3", 932 + "sha256": "1bvk5mfjpl57dfglksnz1cnvd5qgk2cnidwiwjwa3ssmm2kzji8s", 934 933 "vendorSha256": null, 935 - "version": "0.4.2" 934 + "version": "0.4.3" 936 935 }, 937 936 "scaleway": { 938 937 "owner": "scaleway", 939 938 "provider-source-address": "registry.terraform.io/scaleway/scaleway", 940 939 "repo": "terraform-provider-scaleway", 941 - "rev": "v2.2.0", 942 - "sha256": "1l9cmdz46rhvbnlyxi3hyk8rszf44xphpz22w56mrbi91z1yr8c1", 943 - "vendorSha256": "0zbz0y3fg94c9794jgfcqngh1xcyqcdhcgmy74pdscrvydjhd5z8", 944 - "version": "2.2.0" 940 + "rev": "v2.2.1-rc.1", 941 + "sha256": "0f4sizgcy3000k67nb3axa8xhpczvzdla3bnpda27jdrx22ckyz8", 942 + "vendorSha256": "11g5v5kvs4qxdg34ai7fpinwbshrjwi9hxzav2vpnzhy8lfqpkzb", 943 + "version": "2.2.1-rc.1" 945 944 }, 946 945 "secret": { 947 946 "owner": "numtide", ··· 983 982 "owner": "splunk-terraform", 984 983 "provider-source-address": "registry.terraform.io/splunk-terraform/signalfx", 985 984 "repo": "terraform-provider-signalfx", 986 - "rev": "v6.7.10", 987 - "sha256": "113q9wwvz0lxn1l948g5mnwbpd76q8j2pm9q90nbkg1yvwsidsqi", 988 - "vendorSha256": "1dd42a9kqsrvvllign6g9kzb0jvav71x7kg9n2w9rs9wvmmang4w", 989 - "version": "6.7.10" 985 + "rev": "v6.8.0", 986 + "sha256": "1hd71ig9m5c2xfnkxqv6kr3jnnh53cz82cd9icx3391rlrswwcbm", 987 + "vendorSha256": "1an1issc7yk9rnx7dl6n2pvnyjqakk1qfg4yz2yk29j1cbrcnjrs", 988 + "version": "6.8.0" 990 989 }, 991 990 "skytap": { 992 991 "owner": "skytap", ··· 1055 1054 "owner": "tencentcloudstack", 1056 1055 "provider-source-address": "registry.terraform.io/tencentcloudstack/tencentcloud", 1057 1056 "repo": "terraform-provider-tencentcloud", 1058 - "rev": "v1.61.2", 1059 - "sha256": "1i9jyz4r344swdvnnpgz2s1ds5b5s2hif3bjr82mmfd7gshyagnq", 1057 + "rev": "v1.61.6", 1058 + "sha256": "10zx8gcvcadc184d3lfmx4ipi54z3a1xa48dki3wibwmvg5nw1mf", 1060 1059 "vendorSha256": null, 1061 - "version": "1.61.2" 1060 + "version": "1.61.6" 1062 1061 }, 1063 1062 "tfe": { 1064 1063 "owner": "hashicorp", 1065 1064 "provider-source-address": "registry.terraform.io/hashicorp/tfe", 1066 1065 "repo": "terraform-provider-tfe", 1067 - "rev": "v0.27.0", 1068 - "sha256": "00lra2d8dzczlmx74cblk7hglj2dvlkkgv30ndb85fbmaq2jqw0n", 1069 - "vendorSha256": "0p2kdf7l6k75c9ngfysj70fqf3my8fsm41gi8d1j1djfsxgzfpxs", 1070 - "version": "0.27.0" 1066 + "rev": "v0.28.1", 1067 + "sha256": "0xvah6qaf6kxgxhgzgh4rqswjda3366i6gqqwaiw4gc3w0ks2i3g", 1068 + "vendorSha256": "1qxbsnay75v6ss3fvi00rif10ra1l23b107d0v5cc1il4smqc36g", 1069 + "version": "0.28.1" 1071 1070 }, 1072 1071 "thunder": { 1073 1072 "owner": "a10networks", ··· 1119 1118 "owner": "ucloud", 1120 1119 "provider-source-address": "registry.terraform.io/ucloud/ucloud", 1121 1120 "repo": "terraform-provider-ucloud", 1122 - "rev": "v1.30.0", 1123 - "sha256": "1difp4nkyr8hp9l3ik5vdxl3kxiq9i342mmpc0j3drmr341djf1s", 1121 + "rev": "v1.31.0", 1122 + "sha256": "0maiqxrr1xl2q4lgpv0d78znsrrl95qi2bgpr5jd14w1kvw2bj73", 1124 1123 "vendorSha256": null, 1125 - "version": "1.30.0" 1124 + "version": "1.31.0" 1126 1125 }, 1127 1126 "vault": { 1128 1127 "owner": "hashicorp", ··· 1165 1164 "owner": "vpsfreecz", 1166 1165 "provider-source-address": "registry.terraform.io/vpsfreecz/vpsadmin", 1167 1166 "repo": "terraform-provider-vpsadmin", 1168 - "rev": "v0.2.0", 1169 - "sha256": "1jb5s8lv8az1az9an8kj8bi0hh71zcaw5mpa4zyba5xk1vqig0kv", 1170 - "vendorSha256": "1xnscd7yir736y913r7nvn3a78h8cwc7m206h0vcc0hrl1jvf45i", 1171 - "version": "0.2.0" 1167 + "rev": "v1.0.0", 1168 + "sha256": "1ci86ikdz8i6gwdiif4ayx15hjm9phr756rvywz8pblaa6niwl9h", 1169 + "vendorSha256": "1wc0kzinz39kv4gib438js2qv07ndm6yj2qpj041d75hnlq06drv", 1170 + "version": "1.0.0" 1172 1171 }, 1173 1172 "vra7": { 1174 1173 "owner": "vmware", 1175 1174 "provider-source-address": "registry.terraform.io/vmware/vra7", 1176 1175 "repo": "terraform-provider-vra7", 1177 - "rev": "v3.0.3", 1178 - "sha256": "0f4mc7gbjbzw4x6rw6cbhc9xrmkhwhvjdzcinvc96pfm2fy3cdxh", 1176 + "rev": "v3.0.4", 1177 + "sha256": "1w16cl27fqpzy1v6cdp61shgrmj787fdfjwhr719n57hqax4pck5", 1179 1178 "vendorSha256": null, 1180 - "version": "3.0.3" 1179 + "version": "3.0.4" 1181 1180 }, 1182 1181 "vsphere": { 1183 1182 "owner": "hashicorp", ··· 1192 1191 "owner": "vultr", 1193 1192 "provider-source-address": "registry.terraform.io/vultr/vultr", 1194 1193 "repo": "terraform-provider-vultr", 1195 - "rev": "v2.9.0", 1196 - "sha256": "0hx1n1wcjx40s94bysr14j0w4bc1xzkrrmkpjcwwbqywn75p6ggw", 1194 + "rev": "v2.9.1", 1195 + "sha256": "1w6699ngk6vcjii9skhrzv93p79mn6rmyqbb7fdchrwcvamk3y9a", 1197 1196 "vendorSha256": null, 1198 - "version": "2.9.0" 1197 + "version": "2.9.1" 1199 1198 }, 1200 1199 "wavefront": { 1201 1200 "owner": "vmware",
+76 -90
pkgs/applications/networking/instant-messengers/mattermost-desktop/default.nix
··· 1 - { lib, stdenv, fetchurl, gnome2, gtk3, pango, atk, cairo, gdk-pixbuf, glib, 2 - freetype, fontconfig, dbus, libX11, xorg, libXi, libXcursor, libXdamage, 3 - libXrandr, libXcomposite, libXext, libXfixes, libXrender, libXtst, 4 - libXScrnSaver, nss, nspr, alsa-lib, cups, expat, udev, wrapGAppsHook, 5 - hicolor-icon-theme, libuuid, at-spi2-core, at-spi2-atk, libappindicator-gtk3 }: 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , atomEnv 5 + , systemd 6 + , pulseaudio 7 + , libxshmfence 8 + , libnotify 9 + , libappindicator-gtk3 10 + , wrapGAppsHook 11 + , autoPatchelfHook 12 + }: 6 13 7 14 let 8 - rpath = lib.makeLibraryPath [ 9 - alsa-lib 10 - at-spi2-atk 11 - at-spi2-core 12 - atk 13 - cairo 14 - cups 15 - dbus 16 - expat 17 - fontconfig 18 - freetype 19 - gdk-pixbuf 20 - glib 21 - gnome2.GConf 22 - gtk3 23 - pango 24 - libappindicator-gtk3 25 - libuuid 26 - libX11 27 - libXScrnSaver 28 - libXcomposite 29 - libXcursor 30 - libXdamage 31 - libXext 32 - libXfixes 33 - libXi 34 - libXrandr 35 - libXrender 36 - libXtst 37 - nspr 38 - nss 39 - stdenv.cc.cc 40 - udev 41 - xorg.libxcb 42 - ]; 15 + 16 + pname = "mattermost-desktop"; 17 + version = "5.0.3"; 18 + 19 + srcs = { 20 + "x86_64-linux" = { 21 + url = "https://releases.mattermost.com/desktop/${version}/${pname}-${version}-linux-x64.tar.gz"; 22 + hash = "sha256-KLSWJpNSMGmfugbkFIJLDnxcZtrtBZOGjLlR+kAoMTA="; 23 + }; 24 + 25 + "i686-linux" = { 26 + url = "https://releases.mattermost.com/desktop/${version}/${pname}-${version}-linux-ia32.tar.gz"; 27 + hash = "sha256-4ofjOsfGbgO1PSqQpigNp90JsvlGP1kGexVAR/h3/88="; 28 + }; 29 + }; 30 + 31 + inherit (stdenv.hostPlatform) system; 43 32 44 33 in 45 - stdenv.mkDerivation rec { 46 - pname = "mattermost-desktop"; 47 - version = "4.6.2"; 48 34 49 - src = 50 - if stdenv.hostPlatform.system == "x86_64-linux" then 51 - fetchurl { 52 - url = "https://releases.mattermost.com/desktop/${version}/${pname}-${version}-linux-x64.tar.gz"; 53 - sha256 = "0i836bc0gx375a9fm2cdxg84k03zhpx1z6jqxndf2m8pkfsblc3x"; 54 - } 55 - else if stdenv.hostPlatform.system == "i686-linux" then 56 - fetchurl { 57 - url = "https://releases.mattermost.com/desktop/${version}/${pname}-${version}-linux-ia32.tar.gz"; 58 - sha256 = "04jv9hkmkh0jipv0fjdprnp5kmkjvf3c0fah6ysi21wmnmp5ab3m"; 59 - } 60 - else 61 - throw "Mattermost-Desktop is not currently supported on ${stdenv.hostPlatform.system}"; 35 + stdenv.mkDerivation { 36 + inherit pname version; 62 37 63 - dontBuild = true; 64 - dontConfigure = true; 65 - dontPatchELF = true; 38 + src = fetchurl (srcs."${system}" or (throw "Unsupported system ${system}")); 66 39 67 - nativeBuildInputs = [ wrapGAppsHook ]; 40 + dontBuild = true; 41 + dontConfigure = true; 42 + dontStrip = true; 68 43 69 - buildInputs = [ gtk3 hicolor-icon-theme ]; 44 + nativeBuildInputs = [ wrapGAppsHook autoPatchelfHook ]; 70 45 71 - installPhase = '' 72 - runHook preInstall 46 + buildInputs = atomEnv.packages ++ [ 47 + libxshmfence 48 + ]; 73 49 74 - mkdir -p $out/share/mattermost-desktop 75 - cp -R . $out/share/mattermost-desktop 50 + runtimeDependencies = [ 51 + (lib.getLib systemd) 52 + pulseaudio 53 + libnotify 54 + libappindicator-gtk3 55 + ]; 76 56 77 - mkdir -p "$out/bin" 78 - ln -s $out/share/mattermost-desktop/mattermost-desktop \ 79 - $out/bin/mattermost-desktop 57 + installPhase = '' 58 + runHook preInstall 59 + 60 + # Mattermost tarball comes with executable bit set for everything. 61 + # We’ll apply it only to files that need it. 62 + find . -type f -print0 | xargs -0 chmod -x 63 + find . -type f \( -name '*.so.*' -o -name '*.s[oh]' \) -print0 | xargs -0 chmod +x 64 + chmod +x mattermost-desktop chrome-sandbox 80 65 81 - patchShebangs $out/share/mattermost-desktop/create_desktop_file.sh 82 - $out/share/mattermost-desktop/create_desktop_file.sh 83 - rm $out/share/mattermost-desktop/create_desktop_file.sh 84 - mkdir -p $out/share/applications 85 - mv Mattermost.desktop $out/share/applications/Mattermost.desktop 86 - substituteInPlace \ 87 - $out/share/applications/Mattermost.desktop \ 88 - --replace /share/mattermost-desktop/mattermost-desktop /bin/mattermost-desktop 66 + mkdir -p $out/share/mattermost-desktop 67 + cp -R . $out/share/mattermost-desktop 68 + 69 + mkdir -p "$out/bin" 70 + ln -s $out/share/mattermost-desktop/mattermost-desktop $out/bin/mattermost-desktop 89 71 90 - patchelf \ 91 - --set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" \ 92 - --set-rpath "${rpath}:$out/share/mattermost-desktop" \ 93 - $out/share/mattermost-desktop/mattermost-desktop 72 + patchShebangs $out/share/mattermost-desktop/create_desktop_file.sh 73 + $out/share/mattermost-desktop/create_desktop_file.sh 74 + rm $out/share/mattermost-desktop/create_desktop_file.sh 75 + mkdir -p $out/share/applications 76 + chmod -x Mattermost.desktop 77 + mv Mattermost.desktop $out/share/applications/Mattermost.desktop 78 + substituteInPlace $out/share/applications/Mattermost.desktop \ 79 + --replace /share/mattermost-desktop/mattermost-desktop /bin/mattermost-desktop 94 80 95 - runHook postInstall 96 - ''; 81 + runHook postInstall 82 + ''; 97 83 98 - meta = with lib; { 99 - description = "Mattermost Desktop client"; 100 - homepage = "https://about.mattermost.com/"; 101 - license = licenses.asl20; 102 - platforms = [ "x86_64-linux" "i686-linux" ]; 103 - maintainers = [ maintainers.joko ]; 104 - }; 105 - } 84 + meta = with lib; { 85 + description = "Mattermost Desktop client"; 86 + homepage = "https://about.mattermost.com/"; 87 + license = licenses.asl20; 88 + platforms = [ "x86_64-linux" "i686-linux" ]; 89 + maintainers = [ maintainers.joko ]; 90 + }; 91 + }
+2 -2
pkgs/applications/version-management/gitea/default.nix
··· 16 16 17 17 buildGoPackage rec { 18 18 pname = "gitea"; 19 - version = "1.16.0"; 19 + version = "1.16.1"; 20 20 21 21 # not fetching directly from the git repo, because that lacks several vendor files for the web UI 22 22 src = fetchurl { 23 23 url = "https://github.com/go-gitea/gitea/releases/download/v${version}/gitea-src-${version}.tar.gz"; 24 - sha256 = "sha256-gvhfdA5JBFY81f0UmVodJMWBYeFSDaDdoV723MSYeB4="; 24 + sha256 = "sha256-CaJ6Br8Sy+8GuoI8UWxsn3oGEp6R3X5kvl9vDKZB1bc="; 25 25 }; 26 26 27 27 unpackPhase = ''
+72 -51
pkgs/development/compilers/swift/default.nix
··· 36 36 }: 37 37 38 38 let 39 - version = "5.4.2"; 39 + # The Swift toolchain script builds projects with separate repos. By convention, some of them share 40 + # the same version with the main Swift compiler project per release. We fetch these with 41 + # `fetchSwiftRelease`. The rest have their own versions locked to each Swift release, as defined in the 42 + # Swift compiler repo: 43 + # utils/update_checkout/update_checkout-config.json. 44 + # 45 + # ... among projects listed in that file, we provide our own: 46 + # - CMake 47 + # - ninja 48 + # - icu 49 + # 50 + # ... we'd like to include the following in the future: 51 + # - stress-tester 52 + # - integration-tests 40 53 41 - # These dependency versions can be found in utils/update_checkout/update-checkout-config.json. 42 - swiftArgumentParserVersion = "0.3.0"; 43 - yamsVersion = "3.0.1"; 44 - swiftFormatVersion = "0.50400.0"; 54 + versions = { 55 + swift = "5.5.2"; 56 + yams = "4.0.2"; 57 + argumentParser = "0.4.3"; 58 + format = "swift-5.5-branch"; 59 + crypto = "1.1.5"; 60 + }; 61 + 62 + fetchAppleRepo = { repo, rev, sha256 }: 63 + fetchFromGitHub { 64 + owner = "apple"; 65 + inherit repo rev sha256; 66 + name = "${repo}-${rev}-src"; 67 + }; 45 68 46 69 fetchSwiftRelease = { repo, sha256, fetchSubmodules ? false }: 47 70 fetchFromGitHub { 48 71 owner = "apple"; 49 72 inherit repo sha256 fetchSubmodules; 50 - rev = "swift-${version}-RELEASE"; 51 - name = "${repo}-${version}-src"; 73 + rev = "swift-${versions.swift}-RELEASE"; 74 + name = "${repo}-${versions.swift}-src"; 52 75 }; 53 76 54 - # Sources based on utils/update_checkout/update_checkout-config.json. 55 77 sources = { 78 + # Projects that share `versions.swift` for each release. 79 + 56 80 swift = fetchSwiftRelease { 57 81 repo = "swift"; 58 - sha256 = "0qrkqkwpmk312fi12kwwyihin01qb7sphhdz5c6an8j1rjfd9wbv"; 82 + sha256 = "1a9ja3r6ap4cappbvlk18krlvwi0q75z21j5yx5rhbnw4ihh7lda"; 59 83 }; 60 84 cmark = fetchSwiftRelease { 61 85 repo = "swift-cmark"; ··· 63 87 }; 64 88 llbuild = fetchSwiftRelease { 65 89 repo = "swift-llbuild"; 66 - sha256 = "0d7sj5a9b5c1ry2209cpccic5radf9s48sp1lahqzmd1pdx3n7pi"; 67 - }; 68 - argumentParser = fetchFromGitHub { 69 - owner = "apple"; 70 - repo = "swift-argument-parser"; 71 - rev = swiftArgumentParserVersion; 72 - sha256 = "15vv7hnffa84142q97dwjcn196p2bg8nfh89d6nnix0i681n1qfd"; 73 - name = "swift-argument-parser-${swiftArgumentParserVersion}"; 90 + sha256 = "1xmiv7yp9r9iscx3fc3zdp25mriz134k9ny2rchxzi4kifz8h0zc"; 74 91 }; 75 92 driver = fetchSwiftRelease { 76 93 repo = "swift-driver"; 77 - sha256 = "1j08273haqv7786rkwsmw7g103glfwy1d2807490id9lagq3r66z"; 94 + sha256 = "1pb7fidgdqxzragqkillkv03vdilrwmcx6x2r4czqvdqj37gy6b6"; 78 95 }; 79 96 toolsSupportCore = fetchSwiftRelease { 80 97 repo = "swift-tools-support-core"; 81 - sha256 = "07gm28ki4px7xzrplvk9nd1pp5r9nyi87l21i0rcbb3r6wrikxb4"; 98 + sha256 = "0a63193nycir4lffvmb3ky8cfly5kdr2libki2gx4fn6fxmb3a2f"; 82 99 }; 83 100 swiftpm = fetchSwiftRelease { 84 101 repo = "swift-package-manager"; 85 - sha256 = "05linnzlidxamzl3723zhyrfm24pk2cf1x66a3nk0cxgnajw0vzx"; 102 + sha256 = "0hdjvb2asfi6h3x9bjssxkc3bgjn3idlmyga3dl3lscfq88hjxr9"; 86 103 }; 87 104 syntax = fetchSwiftRelease { 88 105 repo = "swift-syntax"; 89 - sha256 = "1y9agx9bg037xjhkwc28xm28kjyqydgv21s4ijgy5l51yg1g0daj"; 106 + sha256 = "0kdgh9a8n28yh12hj8lbz2j66ag83l0lcfyfdg7zdr614zs6i3p1"; 90 107 }; 91 - # TODO: possibly re-add stress-tester. 92 108 corelibsXctest = fetchSwiftRelease { 93 109 repo = "swift-corelibs-xctest"; 94 - sha256 = "00c68580yr12yxshl0hxyhp8psm15fls3c7iqp52hignyl4v745r"; 110 + sha256 = "12fp3xzsqwcrmyc55h91d3dm64wn3wln47x2fl7sj0s8cn7q12b3"; 95 111 }; 96 112 corelibsFoundation = fetchSwiftRelease { 97 113 repo = "swift-corelibs-foundation"; 98 - sha256 = "1jyadm2lm7hhik8n8wacfiffpdwqsgnilwmcw22qris5s2drj499"; 114 + sha256 = "1f7qcdx8597gwqa9pwl38d31w6w4d84c5hadj4ycj99msrm2f32x"; 99 115 }; 100 116 corelibsLibdispatch = fetchSwiftRelease { 101 117 repo = "swift-corelibs-libdispatch"; 102 - sha256 = "1s46c0hrxi42r43ff5f1pq2imb3hs05adfpwfxkilgqyb5svafsp"; 118 + sha256 = "1bim5x9z9bqfgs6gdm4nlz1zrwl2x7xh4dn6i5md9ygsplr4ibzf"; 103 119 fetchSubmodules = true; 104 120 }; 105 - # TODO: possibly re-add integration-tests. 106 - # Linux does not support Xcode playgrounds. 107 - # We provide our own ninja. 108 - # We provider our own icu. 109 - yams = fetchFromGitHub { 110 - owner = "jpsim"; 111 - repo = "Yams"; 112 - rev = yamsVersion; 113 - sha256 = "13md54y7lalrpynrw1s0w5yw6rrjpw46fml9dsk2m3ph1bnlrqrq"; 114 - name = "Yams-${yamsVersion}"; 115 - }; 116 - # We provide our own CMake. 117 121 indexstoreDb = fetchSwiftRelease { 118 122 repo = "indexstore-db"; 119 - sha256 = "1ap3hiq2jd3cn10d8d674xysq27by878mvq087a80681r8cdivn3"; 123 + sha256 = "1l1xlzf5kx7x80kf4b7r36glv0jc64d08d1688kmzjq1cfgn6gm2"; 120 124 }; 121 125 sourcekitLsp = fetchSwiftRelease { 122 126 repo = "sourcekit-lsp"; 123 - sha256 = "02m9va0lsn2hnwkmgrbgj452sbyaswwmq14lqvxgnb7gssajv4gc"; 127 + sha256 = "00fcmd7x5v62n6ajsc0dmzwz6nzy2p72mcs9w6p90adcx7pffqkn"; 128 + }; 129 + llvmProject = fetchSwiftRelease { 130 + repo = "llvm-project"; 131 + sha256 = "1gvqps5f9jh6lbhcjh1fyzp3bc0h9chbljzaspcrdi2qp878prlx"; 132 + }; 133 + 134 + # Projects that have their own versions during each release 135 + 136 + argumentParser = fetchAppleRepo { 137 + repo = "swift-argument-parser"; 138 + rev = "${versions.argumentParser}"; 139 + sha256 = "1jkq72fphxzsnynjxk72azp0iz5r2ji7adxrz6w1y2a19pgjdqrp"; 124 140 }; 125 - format = fetchFromGitHub { 126 - owner = "apple"; 141 + format = fetchAppleRepo { 127 142 repo = "swift-format"; 128 - rev = swiftFormatVersion; 129 - sha256 = "0skmmggsh31f3rnqcrx43178bc7scrjihibnwn68axagasgbqn4k"; 130 - name = "swift-format-${swiftFormatVersion}-src"; 143 + rev = "${versions.format}"; 144 + sha256 = "1hg888ps3fk23q2zf6djkvxyk6zndqvwypmy0s800hmnyf0hzgv4"; 145 + }; 146 + crypto = fetchAppleRepo { 147 + repo = "swift-crypto"; 148 + rev = "${versions.crypto}"; 149 + sha256 = "0918pj3x3wgli3bnrjbvpzck2n6qz5n6f4yc5kljky45wd15f34g"; 131 150 }; 132 - llvmProject = fetchSwiftRelease { 133 - repo = "llvm-project"; 134 - sha256 = "166hd9d2i55zj70xjb1qmbblbfyk8hdb2qv974i07j6cvynn30lm"; 151 + yams = fetchFromGitHub { 152 + owner = "jpsim"; 153 + repo = "Yams"; 154 + rev = versions.yams; 155 + sha256 = "1nk9b7l6m3wwjkl81npl2l1iwpsxaxb9za53jpwwsbbi1h1h4fbi"; 156 + name = "Yams-${versions.yams}-src"; 135 157 }; 136 158 }; 137 159 ··· 160 182 161 183 in 162 184 stdenv.mkDerivation { 163 - name = "swift-${version}"; 185 + name = "swift-${versions.swift}"; 164 186 165 187 nativeBuildInputs = [ 166 188 autoconf ··· 207 229 cp -r ${sources.toolsSupportCore} swift-tools-support-core 208 230 cp -r ${sources.swiftpm} swiftpm 209 231 cp -r ${sources.syntax} swift-syntax 210 - # TODO: possibly re-add stress-tester. 211 232 cp -r ${sources.corelibsXctest} swift-corelibs-xctest 212 233 cp -r ${sources.corelibsFoundation} swift-corelibs-foundation 213 234 cp -r ${sources.corelibsLibdispatch} swift-corelibs-libdispatch 214 - # TODO: possibly re-add integration-tests. 215 235 cp -r ${sources.yams} yams 216 236 cp -r ${sources.indexstoreDb} indexstore-db 217 237 cp -r ${sources.sourcekitLsp} sourcekit-lsp 218 238 cp -r ${sources.format} swift-format 239 + cp -r ${sources.crypto} swift-crypto 219 240 cp -r ${sources.llvmProject} llvm-project 220 241 221 242 chmod -R u+w . ··· 378 399 meta = with lib; { 379 400 description = "The Swift Programming Language"; 380 401 homepage = "https://github.com/apple/swift"; 381 - maintainers = with maintainers; [ dtzWill trepetti ]; 402 + maintainers = with maintainers; [ dtzWill trepetti dduan ]; 382 403 license = licenses.asl20; 383 404 # Swift doesn't support 32-bit Linux, unknown on other platforms. 384 405 platforms = platforms.linux;
+18 -7
pkgs/development/python-modules/chirpstack-api/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 - , fetchPypi 3 + , fetchFromGitHub 4 4 , google-api-core 5 5 , grpcio 6 + , pythonOlder 6 7 }: 7 8 8 9 buildPythonPackage rec { 9 10 pname = "chirpstack-api"; 10 - version = "3.9.4"; 11 + version = "3.12.4"; 12 + format = "setuptools"; 13 + 14 + disabled = pythonOlder "3.7"; 11 15 12 - src = fetchPypi { 13 - inherit pname version; 14 - sha256 = "08djidy3fyhghyzvndcjas3hb1s9d7719gvmgbl8bzxjm4h2c433"; 16 + src = fetchFromGitHub { 17 + owner = "brocaar"; 18 + repo = pname; 19 + rev = "v${version}"; 20 + hash = "sha256-69encHMk0eXE2Av87ysKvxoiXog5o68qCUlOx/lgHFU="; 15 21 }; 22 + 23 + sourceRoot = "source/python/src"; 16 24 17 25 propagatedBuildInputs = [ 18 26 google-api-core 19 27 grpcio 20 28 ]; 21 29 22 - # Project has no tests 30 + # Module has no tests 23 31 doCheck = false; 24 - pythonImportsCheck = [ "chirpstack_api" ]; 32 + 33 + pythonImportsCheck = [ 34 + "chirpstack_api" 35 + ]; 25 36 26 37 meta = with lib; { 27 38 description = "ChirpStack gRPC API message and service wrappers for Python";
+2 -2
pkgs/development/python-modules/icmplib/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "icmplib"; 11 - version = "3.0.2"; 11 + version = "3.0.3"; 12 12 disabled = pythonOlder "3.7"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "ValentinBELYN"; 16 16 repo = pname; 17 17 rev = "v${version}"; 18 - sha256 = "sha256-4aq89Nw55OL7JQx3Ra6Ppp5yKLdS6Lc0YA8UJxVhz84="; 18 + sha256 = "sha256-EQyu7lV8F/U8cZklYYIMk9ut1FTcoBvGc8Ggx6JerDk="; 19 19 }; 20 20 21 21 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/pynetbox/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "pynetbox"; 13 - version = "6.5.0"; 13 + version = "6.6.0"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "netbox-community"; 17 17 repo = pname; 18 18 rev = "v${version}"; 19 - sha256 = "1fk64bi7aswsmfqsciamml2wydgfg464h6i7479xfim4mwmkkik4"; 19 + sha256 = "sha256-vgknnFnmRLIpBLdv1iFGkuql2NOLurOgF2CDKoo8WGg="; 20 20 }; 21 21 22 22 SETUPTOOLS_SCM_PRETEND_VERSION = version;
+7
pkgs/development/python-modules/spectral-cube/default.nix
··· 12 12 , pytestCheckHook 13 13 , pytest-astropy 14 14 , astropy-helpers 15 + , setuptools-scm 15 16 }: 16 17 17 18 buildPythonPackage rec { ··· 23 24 inherit pname version; 24 25 sha256 = "1c0pp82wgl680w2vcwlrrz46sy83z1qs74w5bd691wg0512hv2jx"; 25 26 }; 27 + 28 + SETUPTOOLS_SCM_PRETEND_VERSION = version; 29 + 30 + nativeBuildInputs = [ 31 + setuptools-scm 32 + ]; 26 33 27 34 propagatedBuildInputs = [ astropy casa-formats-io radio_beam joblib six dask ]; 28 35 checkInputs = [ pytestCheckHook aplpy pytest-astropy ];
+7
pkgs/development/python-modules/titlecase/default.nix
··· 4 4 , pytestCheckHook 5 5 , pythonOlder 6 6 , regex 7 + , setuptools-scm 7 8 }: 8 9 9 10 buildPythonPackage rec { ··· 19 20 rev = "v${version}"; 20 21 sha256 = "169ywzn5wfzwyknqavspkdpwbx31nycxsxkl7iywwk71gs1lskkw"; 21 22 }; 23 + 24 + SETUPTOOLS_SCM_PRETEND_VERSION = version; 25 + 26 + nativeBuildInputs = [ 27 + setuptools-scm 28 + ]; 22 29 23 30 propagatedBuildInputs = [ 24 31 regex
+3 -2
pkgs/development/tools/analysis/checkov/default.nix
··· 22 22 23 23 buildPythonApplication rec { 24 24 pname = "checkov"; 25 - version = "2.0.793"; 25 + version = "2.0.795"; 26 26 27 27 src = fetchFromGitHub { 28 28 owner = "bridgecrewio"; 29 29 repo = pname; 30 30 rev = version; 31 - hash = "sha256-puOP0gXPtX67ZT2bANkjJpi4pCBOhK199ukfU2BsnRM="; 31 + hash = "sha256-Mlyjw9ngLlzhhgtNARWaA1KCuZkKUEcElPIH8tjmlBQ="; 32 32 }; 33 33 34 34 nativeBuildInputs = with py.pkgs; [ ··· 97 97 # Will probably be fixed in one of the next releases 98 98 "test_valid_cyclonedx_bom" 99 99 "test_record_relative_path_with_direct_oberlay" 100 + "test_record_relative_path_with_direct_prod2_oberlay" 100 101 # Requires prettytable release which is only available in staging 101 102 "test_skipped_check_exists" 102 103 "test_record_relative_path_with_relative_dir"
+4
pkgs/development/tools/build-managers/bazel/bazel_3/default.nix
··· 613 613 # runtime dependencies. 614 614 echo "${python27}" >> $out/nix-support/depends 615 615 echo "${python3}" >> $out/nix-support/depends 616 + # The string literal specifying the path to the bazel-rc file is sometimes 617 + # stored non-contiguously in the binary due to gcc optimisations, which leads 618 + # Nix to miss the hash when scanning for dependencies 619 + echo "${bazelRC}" >> $out/nix-support/depends 616 620 '' + lib.optionalString stdenv.isDarwin '' 617 621 echo "${cctools}" >> $out/nix-support/depends 618 622 '';
+4
pkgs/development/tools/build-managers/bazel/bazel_4/default.nix
··· 660 660 postFixup = '' 661 661 mkdir -p $out/nix-support 662 662 echo "${defaultShellPath}" >> $out/nix-support/depends 663 + # The string literal specifying the path to the bazel-rc file is sometimes 664 + # stored non-contiguously in the binary due to gcc optimisations, which leads 665 + # Nix to miss the hash when scanning for dependencies 666 + echo "${bazelRC}" >> $out/nix-support/depends 663 667 '' + lib.optionalString stdenv.isDarwin '' 664 668 echo "${cctools}" >> $out/nix-support/depends 665 669 '';
+27
pkgs/misc/kitty-themes/default.nix
··· 1 + { fetchFromGitHub, lib, stdenv }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "kitty-themes"; 5 + version = "unstable-2022-02-03"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "kovidgoyal"; 9 + repo = pname; 10 + rev = "337d6fcb3ad7e38544edfb8d0f6447894b7e5f58"; 11 + sha256 = "ZP5GrT2QCdXtC5swqI0SXzIlqIcQNsxBlzEplj/hpz4="; 12 + }; 13 + 14 + installPhase = '' 15 + mkdir -p $out/themes 16 + mv themes.json $out 17 + mv themes/*.conf $out/themes 18 + ''; 19 + 20 + meta = with lib; { 21 + homepage = "https://github.com/kovidgoyal/kitty-themes"; 22 + description = "Themes for the kitty terminal emulator"; 23 + license = licenses.gpl3Only; 24 + platforms = platforms.all; 25 + maintainers = with maintainers; [ nelsonjeppesen ]; 26 + }; 27 + }
+6 -6
pkgs/misc/vscode-extensions/default.nix
··· 503 503 mktplcRef = { 504 504 name = "vscode-markdownlint"; 505 505 publisher = "DavidAnson"; 506 - version = "0.45.0"; 507 - sha256 = "sha256-L7y+Lsx1DMS12JtxSl7WkT8jGQLipebNKxknF/Y1ke0="; 506 + version = "0.46.0"; 507 + sha256 = "sha256-2FvE+6fnZPtR0At4NjLKSMCbPu8T7o8xtpvYiEjh7ck="; 508 508 }; 509 509 meta = with lib; { 510 510 changelog = "https://marketplace.visualstudio.com/items/DavidAnson.vscode-markdownlint/changelog"; ··· 1718 1718 mktplcRef = { 1719 1719 publisher = "stkb"; 1720 1720 name = "rewrap"; 1721 - version = "1.16.0"; 1722 - sha256 = "sha256-351zYmMupAv/8fQ+lOc0pYzy/wsE3JqTuxfKD+AdBAc="; 1721 + version = "1.16.1"; 1722 + sha256 = "sha256-OTPNbwoQmKd73g8IwLKMIbe6c7E2jKNkzwuBU/f8dmY="; 1723 1723 }; 1724 1724 meta = with lib; { 1725 1725 changelog = "https://github.com/stkb/Rewrap/blob/master/CHANGELOG.md"; ··· 1735 1735 mktplcRef = { 1736 1736 name = "code-spell-checker"; 1737 1737 publisher = "streetsidesoftware"; 1738 - version = "2.1.4"; 1739 - sha256 = "sha256-V8ug/EtDczjiofuL7HhpN1B+qbedpnvIlXnwiXJzD/g="; 1738 + version = "2.1.5"; 1739 + sha256 = "sha256-nIR3PtbtnSbAU0rS+qVtPsj++Dbfp/k86dWkx4xYcno="; 1740 1740 }; 1741 1741 meta = with lib; { 1742 1742 changelog = "https://marketplace.visualstudio.com/items/streetsidesoftware.code-spell-checker/changelog";
+11 -11
pkgs/servers/softether/4.29.nix pkgs/servers/softether/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "softether"; 7 - version = "4.29"; 8 - build = "9680"; 7 + version = "4.38"; 8 + build = "9760"; 9 9 10 10 src = fetchurl { 11 11 url = "https://github.com/SoftEtherVPN/SoftEtherVPN_Stable/releases/download/v${version}-${build}-rtm/softether-src-v${version}-${build}-rtm.tar.gz"; 12 - sha256 = "1r169s5dr31060r2mxkmm08riy6zrxgapmrc6kdrpxdav6kmy0z6"; 12 + sha256 = "0d8zahi9lkv72jh8yj66pwrsi4451vk113d3khzrzgbic6s2i0g6"; 13 13 }; 14 14 15 15 buildInputs = [ openssl readline ncurses zlib ]; 16 16 17 17 preConfigure = '' 18 - ./configure 18 + ./configure 19 19 ''; 20 20 21 21 buildPhase = '' 22 - mkdir -p $out/bin 23 - sed -i \ 24 - -e "/INSTALL_BINDIR=/s|/usr/bin|/bin|g" \ 25 - -e "/_DIR=/s|/usr|${dataDir}|g" \ 26 - -e "s|\$(INSTALL|$out/\$(INSTALL|g" \ 27 - -e "/echo/s|echo $out/|echo |g" \ 28 - Makefile 22 + mkdir -p $out/bin 23 + sed -i \ 24 + -e "/INSTALL_BINDIR=/s|/usr/bin|/bin|g" \ 25 + -e "/_DIR=/s|/usr|${dataDir}|g" \ 26 + -e "s|\$(INSTALL|$out/\$(INSTALL|g" \ 27 + -e "/echo/s|echo $out/|echo |g" \ 28 + Makefile 29 29 ''; 30 30 31 31 meta = with lib; {
+9 -11
pkgs/tools/networking/gping/default.nix
··· 2 2 , stdenv 3 3 , rustPlatform 4 4 , fetchFromGitHub 5 - , fetchpatch 6 5 , libiconv 6 + , Security 7 7 }: 8 8 9 9 rustPlatform.buildRustPackage rec { 10 10 pname = "gping"; 11 - version = "1.2.6"; 11 + version = "1.2.7"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "orf"; 15 15 repo = "gping"; 16 16 rev = "gping-v${version}"; 17 - sha256 = "sha256-Sxmwuf+iTBTlpfMFCEUp6JyEaoHgmLIKB/gws2KY/xc="; 17 + sha256 = "sha256-7o7Tj0jWFIOLmpHXWT6zcyowm7vnqMDTf0S4zHkWQ2Q="; 18 18 }; 19 19 20 - cargoSha256 = "sha256-xEASs6r5zxYJXS+at6aX5n0whGp5qwuNwq6Jh0GM+/4="; 20 + cargoSha256 = "sha256-t+68Rea74RE43TXTSyhZCLXCdBfh7K92Z/amO+wBUuI="; 21 21 22 - patches = [ 23 - (fetchpatch { 24 - url = "https://github.com/orf/gping/commit/b843beb9617e4b7b98d4f6d3942067cad59c9d60.patch"; 25 - sha256 = "sha256-9DIeeweCuGqymvUj4EBct82XVevkFSbHWaV76ExjGbs="; 26 - }) 27 - ]; 22 + buildInputs = lib.optionals stdenv.isDarwin [ libiconv Security ]; 28 23 29 - buildInputs = lib.optional stdenv.isDarwin libiconv; 24 + doInstallCheck = true; 25 + installCheckPhase = '' 26 + $out/bin/gping --version | grep "${version}" 27 + ''; 30 28 31 29 meta = with lib; { 32 30 description = "Ping, but with a graph";
+7 -18
pkgs/tools/networking/wifite2/default.nix
··· 3 3 , hcxdumptool, which, bully, pixiewps }: 4 4 5 5 python3.pkgs.buildPythonApplication rec { 6 - version = "2.5.7"; 6 + version = "2.6.0"; 7 7 pname = "wifite2"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "kimocoder"; 11 11 repo = "wifite2"; 12 12 rev = version; 13 - sha256 = "sha256-dJ+UOSIR48m8nGoci/6iblLsX296ZGL1hZ74RUsa9lw="; 13 + sha256 = "sha256-q8aECegyIoAtYFsm8QEr8OnX+GTqjEeWfYQyESk27SA="; 14 14 }; 15 15 16 16 patches = [ 17 - # Fix issue when missing optional pyrit dependency: https://github.com/kimocoder/wifite2/pull/76 18 17 (fetchpatch { 19 - url = "https://github.com/kimocoder/wifite2/commit/2e5d76c794f2e5493cf5048384d6564727ae2c19.patch"; 20 - sha256 = "0lawk8s1md98g061xg6ma37wqyqc4j2ag0gmf7insf4kvlgg3l9z"; 18 + url = "https://salsa.debian.org/pkg-security-team/wifite/raw/debian/2.5.8-2/debian/patches/Disable-aircrack-failing-test.patch"; 19 + sha256 = "1kj2m973l067fdg9dj61vbjf4ym9x1m9kn0q8ci9r6bb30yg6sv2"; 21 20 }) 22 21 (fetchpatch { 23 - url = "https://salsa.debian.org/pkg-security-team/wifite/raw/debian/${version}-1/debian/patches/Disable-aircrack-failing-test.patch"; 24 - sha256 = "04qql8w27c1lqk59ghkr1n6r08jwdrb1dcam5k88szkk2bxv8yx1"; 25 - }) 26 - (fetchpatch { 27 - url = "https://salsa.debian.org/pkg-security-team/wifite/raw/debian/${version}-1/debian/patches/Disable-two-failing-tests.patch"; 28 - sha256 = "1sixcqz1kbkhxf38yq55pwycm54adjx22bq46dfnl44mg69nx356"; 22 + url = "https://salsa.debian.org/pkg-security-team/wifite/raw/debian/2.5.8-2/debian/patches/Disable-two-failing-tests.patch"; 23 + sha256 = "15vas7zvpdk2lr1pzv8hli6jhdib0dibp7cmikiai53idjxay56z"; 29 24 }) 30 25 (fetchpatch { 31 26 url = "https://salsa.debian.org/pkg-security-team/wifite/raw/debian/2.5.8-2/debian/patches/fix-for-new-which.patch"; ··· 47 42 pixiewps 48 43 ]; 49 44 50 - postFixup = let 51 - sitePackagesDir = "$out/lib/python3.${lib.versions.minor python3.version}/site-packages"; 52 - in '' 53 - mv ${sitePackagesDir}/wifite/__main__.py ${sitePackagesDir}/wifite/wifite.py 54 - ''; 55 - 56 45 checkInputs = propagatedBuildInputs; 57 46 checkPhase = "python -m unittest discover tests -v"; 58 47 59 48 meta = with lib; { 60 - homepage = "https://github.com/derv82/wifite2"; 49 + homepage = "https://github.com/kimocoder/wifite2"; 61 50 description = "Rewrite of the popular wireless network auditor, wifite"; 62 51 license = licenses.gpl2; 63 52 platforms = platforms.linux;
+3 -3
pkgs/tools/networking/yggdrasil/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "yggdrasil"; 5 - version = "0.4.2"; 5 + version = "0.4.3"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "yggdrasil-network"; 9 9 repo = "yggdrasil-go"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-5bx9KGZD7m+FX9hWU1pu8uJ2FU+P/TetRS3kJL5jhhI="; 11 + sha256 = "sha256-dI+KJblSvsBC3CrUzjaDsIZ6N2QEXRTXRbEXolBK5ko="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-QQN8ePOQ7DT9KeuY4ohFuPtocuinh3Y3us6QMnCQ4gc="; 14 + vendorSha256 = "sha256-yhPArisADhP5Uop4zZVbqED76uWeBZJlV6IkKbL4EFI="; 15 15 16 16 # Change the default location of the management socket on Linux 17 17 # systems so that the yggdrasil system service unit does not have to
+6 -3
pkgs/top-level/all-packages.nix
··· 1146 1146 inherit (darwin.apple_sdk.frameworks) Cocoa CoreGraphics Foundation IOKit Kernel OpenGL; 1147 1147 }; 1148 1148 1149 + kitty-themes = callPackage ../misc/kitty-themes {}; 1150 + 1149 1151 lxterminal = callPackage ../applications/terminal-emulators/lxterminal { }; 1150 1152 1151 1153 microcom = callPackage ../applications/terminal-emulators/microcom { }; ··· 3251 3253 3252 3254 gotify-desktop = callPackage ../tools/misc/gotify-desktop { }; 3253 3255 3254 - gping = callPackage ../tools/networking/gping { }; 3256 + gping = callPackage ../tools/networking/gping { 3257 + inherit (darwin.apple_sdk.frameworks) Security; 3258 + }; 3255 3259 3256 3260 gpu-burn = callPackage ../applications/misc/gpu-burn { }; 3257 3261 ··· 21786 21790 21787 21791 openfire = callPackage ../servers/xmpp/openfire { }; 21788 21792 21789 - softether_4_29 = callPackage ../servers/softether/4.29.nix { }; 21790 - softether = softether_4_29; 21793 + softether = callPackage ../servers/softether { }; 21791 21794 21792 21795 qboot = pkgsi686Linux.callPackage ../applications/virtualization/qboot { }; 21793 21796