Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)

Merge master into haskell-updates

authored by

github-actions[bot] and committed by
GitHub
53e76520 33dfdef1

+1595 -585
+1 -1
doc/languages-frameworks/go.section.md
··· 19 19 To avoid updating this field when dependencies change, run `go mod vendor` in your source repo and set `vendorHash = null;` 20 20 21 21 To obtain the actual hash, set `vendorHash = lib.fakeSha256;` and run the build ([more details here](#sec-source-hashes)). 22 - - `proxyVendor`: Fetches (go mod download) and proxies the vendor directory. This is useful if your code depends on c code and go mod tidy does not include the needed sources to build or if any dependency has case-insensitive conflicts which will produce platform dependant `vendorHash` checksums. 22 + - `proxyVendor`: Fetches (go mod download) and proxies the vendor directory. This is useful if your code depends on c code and go mod tidy does not include the needed sources to build or if any dependency has case-insensitive conflicts which will produce platform-dependent `vendorHash` checksums. 23 23 - `modPostBuild`: Shell commands to run after the build of the go-modules executes `go mod vendor`, and before calculating fixed output derivation's `vendorHash` (or `vendorSha256`). Note that if you change this attribute, you need to update `vendorHash` (or `vendorSha256`) attribute. 24 24 25 25 ```nix
+11
maintainers/maintainer-list.nix
··· 9670 9670 githubId = 346094; 9671 9671 name = "Michael Alyn Miller"; 9672 9672 }; 9673 + mangoiv = { 9674 + email = "contact@mangoiv.com"; 9675 + github = "mangoiv"; 9676 + githubId = 40720523; 9677 + name = "MangoIV"; 9678 + }; 9673 9679 manojkarthick = { 9674 9680 email = "smanojkarthick@gmail.com"; 9675 9681 github = "manojkarthick"; ··· 11043 11049 github = "nalbyuites"; 11044 11050 githubId = 1009523; 11045 11051 name = "Ashijit Pramanik"; 11052 + }; 11053 + name-snrl = { 11054 + github = "name-snrl"; 11055 + githubId = 72071763; 11056 + name = "Yusup Urazaev"; 11046 11057 }; 11047 11058 namore = { 11048 11059 email = "namor@hemio.de";
+6
nixos/doc/manual/release-notes/rl-2311.section.md
··· 10 10 11 11 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. --> 12 12 13 + - [river](https://github.com/riverwm/river), A dynamic tiling wayland compositor. Available as [programs.river](#opt-programs.river.enable). 14 + 13 15 ## Backward Incompatibilities {#sec-release-23.11-incompatibilities} 14 16 15 17 - The latest version of `clonehero` now stores custom content in `~/.clonehero`. See the [migration instructions](https://clonehero.net/2022/11/29/v23-to-v1-migration-instructions.html). Typically, these content files would exist along side the binary, but the previous build used a wrapper script that would store them in `~/.config/unity3d/srylain Inc_/Clone Hero`. 16 18 19 + - `etcd` has been updated to 3.5, you will want to read the [3.3 to 3.4](https://etcd.io/docs/v3.5/upgrades/upgrade_3_4/) and [3.4 to 3.5](https://etcd.io/docs/v3.5/upgrades/upgrade_3_5/) upgrade guides 20 + 17 21 ## Other Notable Changes {#sec-release-23.11-notable-changes} 18 22 19 23 - A new option was added to the virtualisation module that enables specifying explicitly named network interfaces in QEMU VMs. The existing `virtualisation.vlans` is still supported for cases where the name of the network interface is irrelevant. 24 + 25 + - `services.nginx` gained a `defaultListen` option at server-level with support for PROXY protocol listeners, also `proxyProtocol` is now exposed in `services.nginx.virtualHosts.<name>.listen` option. It is now possible to run PROXY listeners and non-PROXY listeners at a server-level, see [#213510](https://github.com/NixOS/nixpkgs/pull/213510/) for more details.
-5
nixos/lib/test-driver/test_driver/driver.py
··· 163 163 machine.wait_for_shutdown() 164 164 165 165 def create_machine(self, args: Dict[str, Any]) -> Machine: 166 - rootlog.warning( 167 - "Using legacy create_machine(), please instantiate the" 168 - "Machine class directly, instead" 169 - ) 170 - 171 166 tmp_dir = get_tmp_dir() 172 167 173 168 if args.get("startCommand"):
+2 -2
nixos/lib/test-driver/test_driver/machine.py
··· 369 369 @staticmethod 370 370 def create_startcommand(args: Dict[str, str]) -> StartCommand: 371 371 rootlog.warning( 372 - "Using legacy create_startcommand()," 373 - "please use proper nix test vm instrumentation, instead" 372 + "Using legacy create_startcommand(), " 373 + "please use proper nix test vm instrumentation, instead " 374 374 "to generate the appropriate nixos test vm qemu startup script" 375 375 ) 376 376 hda = None
+4 -3
nixos/modules/module-list.nix
··· 241 241 ./programs/starship.nix 242 242 ./programs/steam.nix 243 243 ./programs/streamdeck-ui.nix 244 - ./programs/sway.nix 245 244 ./programs/sysdig.nix 246 245 ./programs/system-config-printer.nix 247 246 ./programs/systemtap.nix ··· 256 255 ./programs/usbtop.nix 257 256 ./programs/vim.nix 258 257 ./programs/wavemon.nix 259 - ./programs/waybar.nix 258 + ./programs/wayland/river.nix 259 + ./programs/wayland/sway.nix 260 + ./programs/wayland/waybar.nix 260 261 ./programs/weylus.nix 261 262 ./programs/wireshark.nix 262 263 ./programs/xastir.nix ··· 911 912 ./services/networking/knot.nix 912 913 ./services/networking/kresd.nix 913 914 ./services/networking/lambdabot.nix 915 + ./services/networking/legit.nix 914 916 ./services/networking/libreswan.nix 915 917 ./services/networking/lldpd.nix 916 918 ./services/networking/logmein-hamachi.nix ··· 1309 1311 ./services/x11/window-managers/default.nix 1310 1312 ./services/x11/window-managers/fluxbox.nix 1311 1313 ./services/x11/window-managers/icewm.nix 1312 - ./services/x11/window-managers/bspwm.nix 1313 1314 ./services/x11/window-managers/katriawm.nix 1314 1315 ./services/x11/window-managers/metacity.nix 1315 1316 ./services/x11/window-managers/nimdow.nix
+29 -34
nixos/modules/programs/sway.nix nixos/modules/programs/wayland/sway.nix
··· 123 123 124 124 }; 125 125 126 - config = mkIf cfg.enable { 127 - assertions = [ 126 + config = mkIf cfg.enable 127 + (mkMerge [ 128 128 { 129 - assertion = cfg.extraSessionCommands != "" -> cfg.wrapperFeatures.base; 130 - message = '' 131 - The extraSessionCommands for Sway will not be run if 132 - wrapperFeatures.base is disabled. 133 - ''; 134 - } 135 - ]; 136 - environment = { 137 - systemPackages = optional (cfg.package != null) cfg.package ++ cfg.extraPackages; 138 - # Needed for the default wallpaper: 139 - pathsToLink = optionals (cfg.package != null) [ "/share/backgrounds/sway" ]; 140 - etc = { 141 - "sway/config.d/nixos.conf".source = pkgs.writeText "nixos.conf" '' 142 - # Import the most important environment variables into the D-Bus and systemd 143 - # user environments (e.g. required for screen sharing and Pinentry prompts): 144 - exec dbus-update-activation-environment --systemd DISPLAY WAYLAND_DISPLAY SWAYSOCK XDG_CURRENT_DESKTOP 145 - ''; 146 - } // optionalAttrs (cfg.package != null) { 147 - "sway/config".source = mkOptionDefault "${cfg.package}/etc/sway/config"; 148 - }; 149 - }; 150 - security.polkit.enable = true; 151 - security.pam.services.swaylock = {}; 152 - hardware.opengl.enable = mkDefault true; 153 - fonts.enableDefaultFonts = mkDefault true; 154 - programs.dconf.enable = mkDefault true; 155 - # To make a Sway session available if a display manager like SDDM is enabled: 156 - services.xserver.displayManager.sessionPackages = optionals (cfg.package != null) [ cfg.package ]; 157 - programs.xwayland.enable = mkDefault true; 158 - # For screen sharing (this option only has an effect with xdg.portal.enable): 159 - xdg.portal.extraPortals = [ pkgs.xdg-desktop-portal-wlr ]; 160 - }; 129 + assertions = [ 130 + { 131 + assertion = cfg.extraSessionCommands != "" -> cfg.wrapperFeatures.base; 132 + message = '' 133 + The extraSessionCommands for Sway will not be run if 134 + wrapperFeatures.base is disabled. 135 + ''; 136 + } 137 + ]; 138 + environment = { 139 + systemPackages = optional (cfg.package != null) cfg.package ++ cfg.extraPackages; 140 + # Needed for the default wallpaper: 141 + pathsToLink = optionals (cfg.package != null) [ "/share/backgrounds/sway" ]; 142 + etc = { 143 + "sway/config.d/nixos.conf".source = pkgs.writeText "nixos.conf" '' 144 + # Import the most important environment variables into the D-Bus and systemd 145 + # user environments (e.g. required for screen sharing and Pinentry prompts): 146 + exec dbus-update-activation-environment --systemd DISPLAY WAYLAND_DISPLAY SWAYSOCK XDG_CURRENT_DESKTOP 147 + ''; 148 + } // optionalAttrs (cfg.package != null) { 149 + "sway/config".source = mkOptionDefault "${cfg.package}/etc/sway/config"; 150 + }; 151 + }; 152 + # To make a Sway session available if a display manager like SDDM is enabled: 153 + services.xserver.displayManager.sessionPackages = optionals (cfg.package != null) [ cfg.package ]; } 154 + (import ./wayland-session.nix { inherit lib pkgs; }) 155 + ]); 161 156 162 157 meta.maintainers = with lib.maintainers; [ primeos colemickens ]; 163 158 }
nixos/modules/programs/waybar.nix nixos/modules/programs/wayland/waybar.nix
+59
nixos/modules/programs/wayland/river.nix
··· 1 + { 2 + config, 3 + pkgs, 4 + lib, 5 + ... 6 + }: 7 + with lib; let 8 + cfg = config.programs.river; 9 + in { 10 + options.programs.river = { 11 + enable = mkEnableOption (lib.mdDoc "river, a dynamic tiling Wayland compositor"); 12 + 13 + package = mkOption { 14 + type = with types; nullOr package; 15 + default = pkgs.river; 16 + defaultText = literalExpression "pkgs.river"; 17 + description = lib.mdDoc '' 18 + River package to use. 19 + Set to `null` to not add any River package to your path. 20 + This should be done if you want to use the Home Manager River module to install River. 21 + ''; 22 + }; 23 + 24 + extraPackages = mkOption { 25 + type = with types; listOf package; 26 + default = with pkgs; [ 27 + swaylock 28 + foot 29 + dmenu 30 + ]; 31 + defaultText = literalExpression '' 32 + with pkgs; [ swaylock foot dmenu ]; 33 + ''; 34 + example = literalExpression '' 35 + with pkgs; [ 36 + termite rofi light 37 + ] 38 + ''; 39 + description = lib.mdDoc '' 40 + Extra packages to be installed system wide. See 41 + [Common X11 apps used on i3 with Wayland alternatives](https://github.com/swaywm/sway/wiki/i3-Migration-Guide#common-x11-apps-used-on-i3-with-wayland-alternatives) 42 + for a list of useful software. 43 + ''; 44 + }; 45 + }; 46 + 47 + config = 48 + mkIf cfg.enable (mkMerge [ 49 + { 50 + environment.systemPackages = optional (cfg.package != null) cfg.package ++ cfg.extraPackages; 51 + 52 + # To make a river session available if a display manager like SDDM is enabled: 53 + programs.xwayland.enable = mkDefault true; 54 + } 55 + (import ./wayland-session.nix { inherit lib pkgs; }) 56 + ]); 57 + 58 + meta.maintainers = with lib.maintainers; [ GaetanLepage ]; 59 + }
+23
nixos/modules/programs/wayland/wayland-session.nix
··· 1 + { lib, pkgs, ... }: with lib; { 2 + security = { 3 + polkit.enable = true; 4 + pam.services.swaylock = {}; 5 + }; 6 + 7 + hardware.opengl.enable = mkDefault true; 8 + fonts.enableDefaultFonts = mkDefault true; 9 + 10 + programs = { 11 + dconf.enable = mkDefault true; 12 + xwayland.enable = mkDefault true; 13 + }; 14 + 15 + xdg.portal = { 16 + enable = mkDefault true; 17 + 18 + extraPortals = [ 19 + # For screen sharing 20 + pkgs.xdg-desktop-portal-wlr 21 + ]; 22 + }; 23 + }
+2 -1
nixos/modules/services/matrix/mautrix-facebook.nix
··· 29 29 }; 30 30 31 31 appservice = rec { 32 + id = "facebook"; 32 33 address = "http://${hostname}:${toString port}"; 33 34 hostname = "localhost"; 34 35 port = 29319; ··· 171 172 172 173 services.mautrix-facebook = { 173 174 registrationData = { 174 - id = "mautrix-facebook"; 175 + id = cfg.settings.appservice.id; 175 176 176 177 namespaces = { 177 178 users = [
+4 -2
nixos/modules/services/misc/etcd.nix
··· 15 15 type = types.bool; 16 16 }; 17 17 18 + package = mkPackageOptionMD pkgs "etcd" { }; 19 + 18 20 name = mkOption { 19 21 description = lib.mdDoc "Etcd unique node name."; 20 22 default = config.networking.hostName; ··· 187 189 188 190 serviceConfig = { 189 191 Type = "notify"; 190 - ExecStart = "${pkgs.etcd}/bin/etcd"; 192 + ExecStart = "${cfg.package}/bin/etcd"; 191 193 User = "etcd"; 192 194 LimitNOFILE = 40000; 193 195 }; 194 196 }; 195 197 196 - environment.systemPackages = [ pkgs.etcd ]; 198 + environment.systemPackages = [ cfg.package ]; 197 199 198 200 users.users.etcd = { 199 201 isSystemUser = true;
+182
nixos/modules/services/networking/legit.nix
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + let 4 + inherit (lib) 5 + literalExpression 6 + mkEnableOption 7 + mdDoc 8 + mkIf 9 + mkOption 10 + mkPackageOptionMD 11 + optionalAttrs 12 + optional 13 + types; 14 + 15 + cfg = config.services.legit; 16 + 17 + yaml = pkgs.formats.yaml { }; 18 + configFile = yaml.generate "legit.yaml" cfg.settings; 19 + 20 + defaultStateDir = "/var/lib/legit"; 21 + defaultStaticDir = "${cfg.settings.repo.scanPath}/static"; 22 + defaultTemplatesDir = "${cfg.settings.repo.scanPath}/templates"; 23 + in 24 + { 25 + options.services.legit = { 26 + enable = mkEnableOption (mdDoc "legit git web frontend"); 27 + 28 + package = mkPackageOptionMD pkgs "legit-web" { }; 29 + 30 + user = mkOption { 31 + type = types.str; 32 + default = "legit"; 33 + description = mdDoc "User account under which legit runs."; 34 + }; 35 + 36 + group = mkOption { 37 + type = types.str; 38 + default = "legit"; 39 + description = mdDoc "Group account under which legit runs."; 40 + }; 41 + 42 + settings = mkOption { 43 + default = { }; 44 + description = mdDoc '' 45 + The primary legit configuration. See the 46 + [sample configuration](https://github.com/icyphox/legit/blob/master/config.yaml) 47 + for possible values. 48 + ''; 49 + type = types.submodule { 50 + options.repo = { 51 + scanPath = mkOption { 52 + type = types.path; 53 + default = defaultStateDir; 54 + description = mdDoc "Directory where legit will scan for repositories."; 55 + }; 56 + readme = mkOption { 57 + type = types.listOf types.str; 58 + default = [ ]; 59 + description = mdDoc "Readme files to look for."; 60 + }; 61 + mainBranch = mkOption { 62 + type = types.listOf types.str; 63 + default = [ "main" "master" ]; 64 + description = mdDoc "Main branch to look for."; 65 + }; 66 + ignore = mkOption { 67 + type = types.listOf types.str; 68 + default = [ ]; 69 + description = mdDoc "Repositories to ignore."; 70 + }; 71 + }; 72 + options.dirs = { 73 + templates = mkOption { 74 + type = types.path; 75 + default = "${pkgs.legit-web}/lib/legit/templates"; 76 + defaultText = literalExpression ''"''${pkgs.legit-web}/lib/legit/templates"''; 77 + description = mdDoc "Directories where template files are located."; 78 + }; 79 + static = mkOption { 80 + type = types.path; 81 + default = "${pkgs.legit-web}/lib/legit/static"; 82 + defaultText = literalExpression ''"''${pkgs.legit-web}/lib/legit/static"''; 83 + description = mdDoc "Directories where static files are located."; 84 + }; 85 + }; 86 + options.meta = { 87 + title = mkOption { 88 + type = types.str; 89 + default = "legit"; 90 + description = mdDoc "Website title."; 91 + }; 92 + description = mkOption { 93 + type = types.str; 94 + default = "git frontend"; 95 + description = mdDoc "Website description."; 96 + }; 97 + }; 98 + options.server = { 99 + name = mkOption { 100 + type = types.str; 101 + default = "localhost"; 102 + description = mdDoc "Server name."; 103 + }; 104 + host = mkOption { 105 + type = types.str; 106 + default = "127.0.0.1"; 107 + description = mdDoc "Host address."; 108 + }; 109 + port = mkOption { 110 + type = types.port; 111 + default = 5555; 112 + description = mdDoc "Legit port."; 113 + }; 114 + }; 115 + }; 116 + }; 117 + }; 118 + 119 + config = mkIf cfg.enable { 120 + users.groups = optionalAttrs (cfg.group == "legit") { 121 + "${cfg.group}" = { }; 122 + }; 123 + 124 + users.users = optionalAttrs (cfg.user == "legit") { 125 + "${cfg.user}" = { 126 + group = cfg.group; 127 + isSystemUser = true; 128 + }; 129 + }; 130 + 131 + systemd.services.legit = { 132 + description = "legit git frontend"; 133 + 134 + after = [ "network.target" ]; 135 + wantedBy = [ "multi-user.target" ]; 136 + restartTriggers = [ configFile ]; 137 + 138 + serviceConfig = { 139 + Type = "simple"; 140 + User = cfg.user; 141 + Group = cfg.group; 142 + ExecStart = "${cfg.package}/bin/legit -config ${configFile}"; 143 + Restart = "always"; 144 + 145 + WorkingDirectory = cfg.settings.repo.scanPath; 146 + StateDirectory = [ ] ++ 147 + optional (cfg.settings.repo.scanPath == defaultStateDir) "legit" ++ 148 + optional (cfg.settings.dirs.static == defaultStaticDir) "legit/static" ++ 149 + optional (cfg.settings.dirs.templates == defaultTemplatesDir) "legit/templates"; 150 + 151 + # Hardening 152 + CapabilityBoundingSet = [ "" ]; 153 + DeviceAllow = [ "" ]; 154 + LockPersonality = true; 155 + MemoryDenyWriteExecute = true; 156 + NoNewPrivileges = true; 157 + PrivateDevices = true; 158 + PrivateTmp = true; 159 + PrivateUsers = true; 160 + ProcSubset = "pid"; 161 + ProtectClock = true; 162 + ProtectControlGroups = true; 163 + ProtectHome = true; 164 + ProtectHostname = true; 165 + ProtectKernelLogs = true; 166 + ProtectKernelModules = true; 167 + ProtectKernelTunables = true; 168 + ProtectProc = "invisible"; 169 + ProtectSystem = "strict"; 170 + ReadWritePaths = cfg.settings.repo.scanPath; 171 + RemoveIPC = true; 172 + RestrictAddressFamilies = [ "AF_INET" "AF_INET6" ]; 173 + RestrictNamespaces = true; 174 + RestrictRealtime = true; 175 + RestrictSUIDSGID = true; 176 + SystemCallArchitectures = "native"; 177 + SystemCallFilter = [ "@system-service" "~@privileged" ]; 178 + UMask = "0077"; 179 + }; 180 + }; 181 + }; 182 + }
+94 -6
nixos/modules/services/web-servers/nginx/default.nix
··· 309 309 onlySSL = vhost.onlySSL || vhost.enableSSL; 310 310 hasSSL = onlySSL || vhost.addSSL || vhost.forceSSL; 311 311 312 + # First evaluation of defaultListen based on a set of listen lines. 313 + mkDefaultListenVhost = listenLines: 314 + # If this vhost has SSL or is a SSL rejection host. 315 + # We enable a TLS variant for lines without explicit ssl or ssl = true. 316 + optionals (hasSSL || vhost.rejectSSL) 317 + (map (listen: { port = cfg.defaultSSLListenPort; ssl = true; } // listen) 318 + (filter (listen: !(listen ? ssl) || listen.ssl) listenLines)) 319 + # If this vhost is supposed to serve HTTP 320 + # We provide listen lines for those without explicit ssl or ssl = false. 321 + ++ optionals (!onlySSL) 322 + (map (listen: { port = cfg.defaultHTTPListenPort; ssl = false; } // listen) 323 + (filter (listen: !(listen ? ssl) || !listen.ssl) listenLines)); 324 + 312 325 defaultListen = 313 326 if vhost.listen != [] then vhost.listen 314 327 else 328 + if cfg.defaultListen != [] then mkDefaultListenVhost 329 + # Cleanup nulls which will mess up with //. 330 + # TODO: is there a better way to achieve this? i.e. mergeButIgnoreNullPlease? 331 + (map (listenLine: filterAttrs (_: v: (v != null)) listenLine) cfg.defaultListen) 332 + else 315 333 let addrs = if vhost.listenAddresses != [] then vhost.listenAddresses else cfg.defaultListenAddresses; 316 - in optionals (hasSSL || vhost.rejectSSL) (map (addr: { inherit addr; port = cfg.defaultSSLListenPort; ssl = true; }) addrs) 317 - ++ optionals (!onlySSL) (map (addr: { inherit addr; port = cfg.defaultHTTPListenPort; ssl = false; }) addrs); 334 + in mkDefaultListenVhost (map (addr: { inherit addr; }) addrs); 335 + 318 336 319 337 hostListen = 320 338 if vhost.forceSSL 321 339 then filter (x: x.ssl) defaultListen 322 340 else defaultListen; 323 341 324 - listenString = { addr, port, ssl, extraParameters ? [], ... }: 342 + listenString = { addr, port, ssl, proxyProtocol ? false, extraParameters ? [], ... }: 325 343 # UDP listener for QUIC transport protocol. 326 344 (optionalString (ssl && vhost.quic) (" 327 345 listen ${addr}:${toString port} quic " 328 346 + optionalString vhost.default "default_server " 329 347 + optionalString vhost.reuseport "reuseport " 330 - + optionalString (extraParameters != []) (concatStringsSep " " ( 331 - let inCompatibleParameters = [ "ssl" "proxy_protocol" "http2" ]; 348 + + optionalString (extraParameters != []) (concatStringsSep " " 349 + (let inCompatibleParameters = [ "ssl" "proxy_protocol" "http2" ]; 332 350 isCompatibleParameter = param: !(any (p: p == param) inCompatibleParameters); 333 351 in filter isCompatibleParameter extraParameters)) 334 352 + ";")) 335 353 + " 336 - 337 354 listen ${addr}:${toString port} " 338 355 + optionalString (ssl && vhost.http2) "http2 " 339 356 + optionalString ssl "ssl " 340 357 + optionalString vhost.default "default_server " 341 358 + optionalString vhost.reuseport "reuseport " 359 + + optionalString proxyProtocol "proxy_protocol " 342 360 + optionalString (extraParameters != []) (concatStringsSep " " extraParameters) 343 361 + ";"; 344 362 ··· 539 557 ''; 540 558 }; 541 559 560 + defaultListen = mkOption { 561 + type = with types; listOf (submodule { 562 + options = { 563 + addr = mkOption { 564 + type = str; 565 + description = lib.mdDoc "IP address."; 566 + }; 567 + port = mkOption { 568 + type = nullOr port; 569 + description = lib.mdDoc "Port number."; 570 + default = null; 571 + }; 572 + ssl = mkOption { 573 + type = nullOr bool; 574 + default = null; 575 + description = lib.mdDoc "Enable SSL."; 576 + }; 577 + proxyProtocol = mkOption { 578 + type = bool; 579 + description = lib.mdDoc "Enable PROXY protocol."; 580 + default = false; 581 + }; 582 + extraParameters = mkOption { 583 + type = listOf str; 584 + description = lib.mdDoc "Extra parameters of this listen directive."; 585 + default = [ ]; 586 + example = [ "backlog=1024" "deferred" ]; 587 + }; 588 + }; 589 + }); 590 + default = []; 591 + example = literalExpression ''[ 592 + { addr = "10.0.0.12"; proxyProtocol = true; ssl = true; } 593 + { addr = "0.0.0.0"; } 594 + { addr = "[::0]"; } 595 + ]''; 596 + description = lib.mdDoc '' 597 + If vhosts do not specify listen, use these addresses by default. 598 + This option takes precedence over {option}`defaultListenAddresses` and 599 + other listen-related defaults options. 600 + ''; 601 + }; 602 + 542 603 defaultListenAddresses = mkOption { 543 604 type = types.listOf types.str; 544 605 default = [ "0.0.0.0" ] ++ optional enableIPv6 "[::0]"; ··· 546 607 example = literalExpression ''[ "10.0.0.12" "[2002:a00:1::]" ]''; 547 608 description = lib.mdDoc '' 548 609 If vhosts do not specify listenAddresses, use these addresses by default. 610 + This is akin to writing `defaultListen = [ { addr = "0.0.0.0" } ]`. 549 611 ''; 550 612 }; 551 613 ··· 1076 1138 message = '' 1077 1139 services.nginx.service.virtualHosts.<name>.quic requires using nginxQuic package, 1078 1140 which can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`. 1141 + ''; 1142 + } 1143 + 1144 + { 1145 + # The idea is to understand whether there is a virtual host with a listen configuration 1146 + # that requires ACME configuration but has no HTTP listener which will make deterministically fail 1147 + # this operation. 1148 + # Options' priorities are the following at the moment: 1149 + # listen (vhost) > defaultListen (server) > listenAddresses (vhost) > defaultListenAddresses (server) 1150 + assertion = 1151 + let 1152 + hasAtLeastHttpListener = listenOptions: any (listenLine: if listenLine ? proxyProtocol then !listenLine.proxyProtocol else true) listenOptions; 1153 + hasAtLeastDefaultHttpListener = if cfg.defaultListen != [] then hasAtLeastHttpListener cfg.defaultListen else (cfg.defaultListenAddresses != []); 1154 + in 1155 + all (host: 1156 + let 1157 + hasAtLeastVhostHttpListener = if host.listen != [] then hasAtLeastHttpListener host.listen else (host.listenAddresses != []); 1158 + vhostAuthority = host.listen != [] || (cfg.defaultListen == [] && host.listenAddresses != []); 1159 + in 1160 + # Either vhost has precedence and we need a vhost specific http listener 1161 + # Either vhost set nothing and inherit from server settings 1162 + host.enableACME -> ((vhostAuthority && hasAtLeastVhostHttpListener) || (!vhostAuthority && hasAtLeastDefaultHttpListener)) 1163 + ) (attrValues virtualHosts); 1164 + message = '' 1165 + services.nginx.virtualHosts.<name>.enableACME requires a HTTP listener 1166 + to answer to ACME requests. 1079 1167 ''; 1080 1168 } 1081 1169 ] ++ map (name: mkCertOwnershipAssertion {
+30 -7
nixos/modules/services/web-servers/nginx/vhost-options.nix
··· 27 27 }; 28 28 29 29 listen = mkOption { 30 - type = with types; listOf (submodule { options = { 31 - addr = mkOption { type = str; description = lib.mdDoc "IP address."; }; 32 - port = mkOption { type = port; description = lib.mdDoc "Port number."; default = 80; }; 33 - ssl = mkOption { type = bool; description = lib.mdDoc "Enable SSL."; default = false; }; 34 - extraParameters = mkOption { type = listOf str; description = lib.mdDoc "Extra parameters of this listen directive."; default = []; example = [ "backlog=1024" "deferred" ]; }; 35 - }; }); 30 + type = with types; listOf (submodule { 31 + options = { 32 + addr = mkOption { 33 + type = str; 34 + description = lib.mdDoc "IP address."; 35 + }; 36 + port = mkOption { 37 + type = port; 38 + description = lib.mdDoc "Port number."; 39 + default = 80; 40 + }; 41 + ssl = mkOption { 42 + type = bool; 43 + description = lib.mdDoc "Enable SSL."; 44 + default = false; 45 + }; 46 + proxyProtocol = mkOption { 47 + type = bool; 48 + description = lib.mdDoc "Enable PROXY protocol."; 49 + default = false; 50 + }; 51 + extraParameters = mkOption { 52 + type = listOf str; 53 + description = lib.mdDoc "Extra parameters of this listen directive."; 54 + default = [ ]; 55 + example = [ "backlog=1024" "deferred" ]; 56 + }; 57 + }; 58 + }); 36 59 default = []; 37 60 example = [ 38 61 { addr = "195.154.1.1"; port = 443; ssl = true; } ··· 45 68 and `onlySSL`. 46 69 47 70 If you only want to set the addresses manually and not 48 - the ports, take a look at `listenAddresses` 71 + the ports, take a look at `listenAddresses`. 49 72 ''; 50 73 }; 51 74
+2
nixos/modules/system/boot/networkd.nix
··· 25 25 26 26 sectionDHCPv4 = checkUnitConfig "DHCPv4" [ 27 27 (assertOnlyFields [ 28 + "ClientIdentifier" 28 29 "DUIDType" 29 30 "DUIDRawData" 30 31 ]) 32 + (assertValueOneOf "ClientIdentifier" ["mac" "duid" "duid-only"]) 31 33 ]; 32 34 33 35 sectionDHCPv6 = checkUnitConfig "DHCPv6" [
+7 -1
nixos/modules/virtualisation/qemu-vm.nix
··· 893 893 The address must be in the default VLAN (10.0.2.0/24). 894 894 ''; 895 895 } 896 - ])); 896 + ])) ++ [ 897 + { assertion = pkgs.stdenv.hostPlatform.is32bit -> cfg.memorySize < 2047; 898 + message = '' 899 + virtualisation.memorySize is above 2047, but qemu is only able to allocate 2047MB RAM on 32bit max. 900 + ''; 901 + } 902 + ]; 897 903 898 904 warnings = 899 905 optional (
+2
nixos/tests/all-tests.nix
··· 278 278 fsck = handleTest ./fsck.nix {}; 279 279 fsck-systemd-stage-1 = handleTest ./fsck.nix { systemdStage1 = true; }; 280 280 ft2-clone = handleTest ./ft2-clone.nix {}; 281 + legit = handleTest ./legit.nix {}; 281 282 mimir = handleTest ./mimir.nix {}; 282 283 garage = handleTest ./garage {}; 283 284 gemstash = handleTest ./gemstash.nix {}; ··· 521 522 nginx-sandbox = handleTestOn ["x86_64-linux"] ./nginx-sandbox.nix {}; 522 523 nginx-sso = handleTest ./nginx-sso.nix {}; 523 524 nginx-variants = handleTest ./nginx-variants.nix {}; 525 + nginx-proxyprotocol = handleTest ./nginx-proxyprotocol {}; 524 526 nifi = handleTestOn ["x86_64-linux"] ./web-apps/nifi.nix {}; 525 527 nitter = handleTest ./nitter.nix {}; 526 528 nix-ld = handleTest ./nix-ld.nix {};
+14 -11
nixos/tests/etcd-cluster.nix
··· 53 53 [ v3_req ] 54 54 basicConstraints = CA:FALSE 55 55 keyUsage = digitalSignature, keyEncipherment 56 - extendedKeyUsage = serverAuth 56 + extendedKeyUsage = serverAuth, clientAuth 57 57 subjectAltName = @alt_names 58 58 [alt_names] 59 59 DNS.1 = node1 ··· 86 86 }; 87 87 88 88 environment.variables = { 89 - ETCDCTL_CERT_FILE = "${etcd_client_cert}"; 90 - ETCDCTL_KEY_FILE = "${etcd_client_key}"; 91 - ETCDCTL_CA_FILE = "${ca_pem}"; 92 - ETCDCTL_PEERS = "https://127.0.0.1:2379"; 89 + ETCD_CERT_FILE = "${etcd_client_cert}"; 90 + ETCD_KEY_FILE = "${etcd_client_key}"; 91 + ETCD_CA_FILE = "${ca_pem}"; 92 + ETCDCTL_ENDPOINTS = "https://127.0.0.1:2379"; 93 + ETCDCTL_CACERT = "${ca_pem}"; 94 + ETCDCTL_CERT = "${etcd_cert}"; 95 + ETCDCTL_KEY = "${etcd_key}"; 93 96 }; 94 97 95 98 networking.firewall.allowedTCPPorts = [ 2380 ]; ··· 134 137 node2.start() 135 138 node1.wait_for_unit("etcd.service") 136 139 node2.wait_for_unit("etcd.service") 137 - node2.wait_until_succeeds("etcdctl cluster-health") 138 - node1.succeed("etcdctl set /foo/bar 'Hello world'") 140 + node2.wait_until_succeeds("etcdctl endpoint status") 141 + node1.succeed("etcdctl put /foo/bar 'Hello world'") 139 142 node2.succeed("etcdctl get /foo/bar | grep 'Hello world'") 140 143 141 144 with subtest("should add another member"): 142 - node1.wait_until_succeeds("etcdctl member add node3 https://node3:2380") 145 + node1.wait_until_succeeds("etcdctl member add node3 --peer-urls=https://node3:2380") 143 146 node3.start() 144 147 node3.wait_for_unit("etcd.service") 145 148 node3.wait_until_succeeds("etcdctl member list | grep 'node3'") 146 - node3.succeed("etcdctl cluster-health") 149 + node3.succeed("etcdctl endpoint status") 147 150 148 151 with subtest("should survive member crash"): 149 152 node3.crash() 150 - node1.succeed("etcdctl cluster-health") 151 - node1.succeed("etcdctl set /foo/bar 'Hello degraded world'") 153 + node1.succeed("etcdctl endpoint status") 154 + node1.succeed("etcdctl put /foo/bar 'Hello degraded world'") 152 155 node1.succeed("etcdctl get /foo/bar | grep 'Hello degraded world'") 153 156 ''; 154 157 })
+1 -1
nixos/tests/etcd.nix
··· 19 19 node.wait_for_unit("etcd.service") 20 20 21 21 with subtest("should write and read some values to etcd"): 22 - node.succeed("etcdctl set /foo/bar 'Hello world'") 22 + node.succeed("etcdctl put /foo/bar 'Hello world'") 23 23 node.succeed("etcdctl get /foo/bar | grep 'Hello world'") 24 24 ''; 25 25 })
+54
nixos/tests/legit.nix
··· 1 + import ./make-test-python.nix ({ lib, pkgs, ... }: 2 + let 3 + port = 5000; 4 + scanPath = "/var/lib/legit"; 5 + in 6 + { 7 + name = "legit-web"; 8 + meta.maintainers = [ lib.maintainers.ratsclub ]; 9 + 10 + nodes = { 11 + server = { config, pkgs }: { 12 + services.legit = { 13 + enable = true; 14 + settings = { 15 + server.port = 5000; 16 + repo = { inherit scanPath; }; 17 + }; 18 + }; 19 + 20 + environment.systemPackages = [ pkgs.git ]; 21 + }; 22 + }; 23 + 24 + testScript = { nodes, ... }: 25 + let 26 + strPort = builtins.toString port; 27 + in 28 + '' 29 + start_all() 30 + 31 + server.wait_for_unit("network.target") 32 + server.wait_for_unit("legit.service") 33 + 34 + server.wait_until_succeeds( 35 + "curl -f http://localhost:${strPort}" 36 + ) 37 + 38 + server.succeed("${pkgs.writeShellScript "setup-legit-test-repo" '' 39 + set -e 40 + git init --bare -b master ${scanPath}/some-repo 41 + git init -b master reference 42 + cd reference 43 + git remote add origin ${scanPath}/some-repo 44 + date > date.txt 45 + git add date.txt 46 + git -c user.name=test -c user.email=test@localhost commit -m 'add date' 47 + git push -u origin master 48 + ''}") 49 + 50 + server.wait_until_succeeds( 51 + "curl -f http://localhost:${strPort}/some-repo" 52 + ) 53 + ''; 54 + })
+20
nixos/tests/nginx-proxyprotocol/_.test.nix.cert.pem
··· 1 + -----BEGIN CERTIFICATE----- 2 + MIIDLjCCAhagAwIBAgIIP2+4GFxOYMgwDQYJKoZIhvcNAQELBQAwIDEeMBwGA1UE 3 + AxMVbWluaWNhIHJvb3QgY2EgNGU3NTJiMB4XDTIzMDEzMDAzNDExOFoXDTQzMDEz 4 + MDAzNDExOFowFTETMBEGA1UEAwwKKi50ZXN0Lm5peDCCASIwDQYJKoZIhvcNAQEB 5 + BQADggEPADCCAQoCggEBAMarJSCzelnzTMT5GMoIKA/MXBNk5j277uI2Gq2MCky/ 6 + DlBpx+tjSsKsz6QLBduKMF8OH5AgjrVAKQAtsVPDseY0Qcyx/5dgJjkdO4on+DFb 7 + V0SJ3ZhYPKACrqQ1SaoG+Xup37puw7sVR13J7oNvP6fAYRcjYqCiFC7VMjJNG4dR 8 + 251jvWWidSc7v5CYw2AxrngtBgHeQuyG9QCJ1DRH8h6ioV7IeonwReN7noYtTWh8 9 + NDjGnw9HH2nYMcL91E+DWCxWVmbC9/orvYOT7u0Orho0t1w9BB0/zzcdojwQpMCv 10 + HahEmFQmdGbWTuI4caBeaDBJVsSwKlTcxLSS4MAZ0c8CAwEAAaN3MHUwDgYDVR0P 11 + AQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMB 12 + Af8EAjAAMB8GA1UdIwQYMBaAFGyXySYI3gL88d7GHnGMU6wpiBf2MBUGA1UdEQQO 13 + MAyCCioudGVzdC5uaXgwDQYJKoZIhvcNAQELBQADggEBAJ/DpwiLVBgWyozsn++f 14 + kR4m0dUjnuCgpHo2EMoMZh+9og+OC0vq6WITXHaJytB3aBMxFOUTim3vwxPyWPXX 15 + /vy+q6jJ6QMLx1J3VIWZdmXsT+qLGbVzL/4gNoaRsLPGO06p3yVjhas+OBFx1Fee 16 + 6kTHb82S/dzBojOJLRRo18CU9yw0FUXOPqN7HF7k2y+Twe6+iwCuCKGSFcvmRjxe 17 + bWy11C921bTienW0Rmq6ppFWDaUNYP8kKpMN2ViAvc0tyF6wwk5lyOiqCR+pQHJR 18 + H/J4qSeKDchYLKECuzd6SySz8FW/xPKogQ28zba+DBD86hpqiEJOBzxbrcN3cjUn 19 + 7N4= 20 + -----END CERTIFICATE-----
+27
nixos/tests/nginx-proxyprotocol/_.test.nix.key.pem
··· 1 + -----BEGIN RSA PRIVATE KEY----- 2 + MIIEpAIBAAKCAQEAxqslILN6WfNMxPkYyggoD8xcE2TmPbvu4jYarYwKTL8OUGnH 3 + 62NKwqzPpAsF24owXw4fkCCOtUApAC2xU8Ox5jRBzLH/l2AmOR07iif4MVtXRInd 4 + mFg8oAKupDVJqgb5e6nfum7DuxVHXcnug28/p8BhFyNioKIULtUyMk0bh1HbnWO9 5 + ZaJ1Jzu/kJjDYDGueC0GAd5C7Ib1AInUNEfyHqKhXsh6ifBF43uehi1NaHw0OMaf 6 + D0cfadgxwv3UT4NYLFZWZsL3+iu9g5Pu7Q6uGjS3XD0EHT/PNx2iPBCkwK8dqESY 7 + VCZ0ZtZO4jhxoF5oMElWxLAqVNzEtJLgwBnRzwIDAQABAoIBAFuNGOH184cqKJGI 8 + 3RSVJ6kIGtJRKA0A4vfZyPd61nBBhx4lcRyXOCd4LYPCFKP0DZBwWLk5V6pM89gC 9 + NnqMbxnPsRbcXBVtGJAvWXW0L5rHJfMOuVBwMRfnxIUljVnONv/264PlcUtwZd/h 10 + o4lsJeBvNg7MnrG5nyVp1+T4RZxYm1P86HLp5zyT+fdj4Cr82b9j6QpxGXEfm1jV 11 + QA1xr1ZkrV8fgETyaE0TBIKcdt6xNfv1mpI1RE5gaP/YzcCs/mL+G0kMar4l7pO/ 12 + 6OHXTvHz+W3G6Xlha7Wq1ADoqYz2K7VoL/OgSQhIxRNujyWR6lir7eladVrKkCzu 13 + uzFi/HECgYEA0vSNCIK3useSypMPHhYUVNbZ4hbK0WgqSAxfJQtL3nC7KviVMAXj 14 + IKVR90xuzJB+ih88KCJpH84JH90paMpW0Gq1yEae90bnWa8Nj7ULLS/Zuj0WrelU 15 + +DEGbx47IUPOtiLBxooxFKyIVhX3hWRwZ0pokSQzbgb5zYnlM6tqZ3cCgYEA8Rb2 16 + wtt0XmqEQedFacs4fobJoVWMcETjpuxYp0m5Kje/4QkptZIbspXGBgNtPBBRGg51 17 + AYSu8wYkGEueI77KiFDgY8AAkpOk2MrMVPszjOhUiO1oEfbT6ynOY5RDOuXcY6jo 18 + 8RpSk46VkfVxt6LVmappqcVFtVWcAjdGfXeSLmkCgYAWP7SgMSkvidzxgJEXmzyJ 19 + th9EuSKq81GCR8vBHG/kBf+3iIAzkGtkBgufCXCmIpc1+hVeJkLwF8rekXTMmIqP 20 + cLG7bbdWXSQJUW0cuvtyyJkuC0NZFELh6knDbmzOFVi33PKS/gAvLgMzER4J843n 21 + VvGwXSEPeazfAKwrxuhyAQKBgQCOm5TPYlyNVNhy20h18d2zCivOoPn3luhKXtd5 22 + 7OP4kw2PIYpoesqjcnC2MeS1eLlgfli70y5hVqqXLHOYlUzcIWr51iMAkREbo6oG 23 + QqkVmoAWlsfOiICGRC5vPM4f0sPwt4NCyt05p0fWFKd1hn5u7Ryfba90OfWUYfny 24 + UX5IsQKBgQCswer4Qc3UepkiYxGwSTxgIh4kYlmamU2I00Kar4uFAr9JsCbk98f0 25 + kaCUNZjrrvTwgRmdhwcpMDiMW/F4QkNk0I2unHcoAvzNop6c22VhHJU2XJhrQ57h 26 + n1iPiw0NLXiA4RQwMUMjtt3nqlpLOTXGtsF8TmpWPcAN2QcTxOutzw== 27 + -----END RSA PRIVATE KEY-----
+20
nixos/tests/nginx-proxyprotocol/ca.cert.pem
··· 1 + -----BEGIN CERTIFICATE----- 2 + MIIDSzCCAjOgAwIBAgIITnUr3xFw4oEwDQYJKoZIhvcNAQELBQAwIDEeMBwGA1UE 3 + AxMVbWluaWNhIHJvb3QgY2EgNGU3NTJiMCAXDTIzMDEzMDAzNDExOFoYDzIxMjMw 4 + MTMwMDM0MTE4WjAgMR4wHAYDVQQDExVtaW5pY2Egcm9vdCBjYSA0ZTc1MmIwggEi 5 + MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC1SrJT9k3zXIXApEyL5UDlw7F6 6 + MMOqE5d+8ZwMccHbEKLu0ssNRY+j31tnNYQ/r5iCNeNgUZccKBgzdU0ysyw5n4tw 7 + 0y+MTD9fCfUXYcc8pJRPRolo6zxYO9W7WJr0nfJZ+p7zFRAjRCmzXdnZjKz0EGcg 8 + x9mHwn//3SuLt1ItK1n3aZ6im9NlcVtunDe3lCSL0tRgy7wDGNvWDZMO49jk4AFU 9 + BlMqScuiNpUzYgCxNaaGMuH3M0f0YyRAxSs6FWewLtqTIaVql7HL+3PcGAhvlKEZ 10 + fvfaf80F9aWI88sbEddTA0s5837zEoDwGpZl3K5sPU/O3MVEHIhAY5ICG0IBAgMB 11 + AAGjgYYwgYMwDgYDVR0PAQH/BAQDAgKEMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggr 12 + BgEFBQcDAjASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBRsl8kmCN4C/PHe 13 + xh5xjFOsKYgX9jAfBgNVHSMEGDAWgBRsl8kmCN4C/PHexh5xjFOsKYgX9jANBgkq 14 + hkiG9w0BAQsFAAOCAQEAmvgpU+q+TBbz+9Y2rdiIeTfeDXtMNPf+nKI3zxYztRGC 15 + MoKP6jCQaFSQra4BVumFLV38DoqR1pOV1ojkiyO5c/9Iym/1Wmm8LeqgsHNqSgyS 16 + C7wvBcb/N9PzIBQFq/RiboDoC7bqK/0zQguCmBtGceH+AVpQyfXM+P78B1EkHozu 17 + 67igP8GfouPp2s4Vd5P2XGkA6vMgYCtFEnCbtmmo7C8B+ymhD/D9axpMKQ1OaBg9 18 + jfqLOlk+Rc2nYZuaDjnUmlTkYjC6EwCNe9weYkSJgQ9QzoGJLIRARsdQdsp3C2fZ 19 + l2UZKkDJ2GPrrc+TdaGXZTYi0uMmvQsEKZXtqAzorQ== 20 + -----END CERTIFICATE-----
+27
nixos/tests/nginx-proxyprotocol/ca.key.pem
··· 1 + -----BEGIN RSA PRIVATE KEY----- 2 + MIIEpQIBAAKCAQEAtUqyU/ZN81yFwKRMi+VA5cOxejDDqhOXfvGcDHHB2xCi7tLL 3 + DUWPo99bZzWEP6+YgjXjYFGXHCgYM3VNMrMsOZ+LcNMvjEw/Xwn1F2HHPKSUT0aJ 4 + aOs8WDvVu1ia9J3yWfqe8xUQI0Qps13Z2Yys9BBnIMfZh8J//90ri7dSLStZ92me 5 + opvTZXFbbpw3t5Qki9LUYMu8Axjb1g2TDuPY5OABVAZTKknLojaVM2IAsTWmhjLh 6 + 9zNH9GMkQMUrOhVnsC7akyGlapexy/tz3BgIb5ShGX732n/NBfWliPPLGxHXUwNL 7 + OfN+8xKA8BqWZdyubD1PztzFRByIQGOSAhtCAQIDAQABAoIBAQCLeAWs1kWtvTYg 8 + t8UzspC0slItAKrmgt//hvxYDoPmdewC8yPG+AbDOSfmRKOTIxGeyro79UjdHnNP 9 + 0yQqpvCU/AqYJ7/inR37jXuCG3TdUHfQbSF1F9N6xb1tvYKoQYKaelYiB8g8eUnj 10 + dYYM+U5tDNlpvJW6/YTfYFUJzWRo3i8jj5lhbkjcJDvdOhVxMXNXJgJAymu1KysE 11 + N1da2l4fzmuoN82wFE9KMyYSn+LOLWBReQQmXHZPP+2LjRIVrWoFoV49k2Ylp9tH 12 + yeaFx1Ya/wVx3PRnSW+zebWDcc0bAua9XU3Fi42yRq5iXOyoXHyefDfJoId7+GAO 13 + IF2qRw9hAoGBAM1O1l4ceOEDsEBh7HWTvmfwVfkXgT6VHeI6LGEjb88FApXgT+wT 14 + 1s1IWVVOigLl9OKQbrjqlg9xgzrPDHYRwu5/Oz3X2WaH6wlF+d+okoqls6sCEAeo 15 + GfzF3sKOHQyIYjttCXE5G38uhIgVFFFfK97AbUiY8egYBr0zjVXK7xINAoGBAOIN 16 + 1pDBFBQIoKj64opm/G9lJBLUpWLBFdWXhXS6q2jNsdY1mLMRmu/RBaKSfGz7W1a/ 17 + a2WBedjcnTWJ/84tBsn4Qj5tLl8xkcXiN/pslWzg724ZnVsbyxM9KvAdXAma3F0g 18 + 2EsYq8mhvbAEkpE+aoM6jwOJBnMhTRZrNMKN2lbFAoGAHmZWB4lfvLG3H1FgmehO 19 + gUVs9X0tff7GdgD3IUsF+zlasKaOLv6hB7R2xdLjTJqQMBwCyQ6zOYYtUD/oMHNg 20 + 0b+1HesgHbZybuUVorBrQmxWtjOP/BJABtWlrlkso/Zt1S7H/yPdlm9k4GF+qK3W 21 + 6RzFEcLTzvH/zXQcsV9jFuECgYEAhaX+1KiC0XFkY2OpaoCHAOlAUa3NdjyIRzcF 22 + XUU8MINkgCxB8qUXAHCJL1wCGoDluL0FpwbM3m1YuR200tYGLIUNzVDJ2Ng6wk8E 23 + H5fxJGU8ydB1Gzescdx5NWt2Tet0G89ecc/NSTHKL3YUnbDUUm/dvA5YdNscc4PA 24 + tsIdc60CgYEArvU1MwqGQUTDKUmaM2t3qm70fbwmOViHfyTWpn4aAQR3sK16iJMm 25 + V+dka62L/VYs5CIbzXvCioyugUMZGJi/zIwrViRzqJQbNnPADAW4lG88UxXqHHAH 26 + q33ivjgd9omGFb37saKOmR44KmjUIDvSIZF4W3EPwAMEyl5mM31Ryns= 27 + -----END RSA PRIVATE KEY-----
+144
nixos/tests/nginx-proxyprotocol/default.nix
··· 1 + let 2 + certs = import ./snakeoil-certs.nix; 3 + in 4 + import ../make-test-python.nix ({ pkgs, ... }: { 5 + name = "nginx-proxyprotocol"; 6 + 7 + nodes = { 8 + webserver = { pkgs, lib, ... }: { 9 + environment.systemPackages = [ pkgs.netcat ]; 10 + security.pki.certificateFiles = [ 11 + certs.ca.cert 12 + ]; 13 + 14 + networking.extraHosts = '' 15 + 127.0.0.5 proxy.test.nix 16 + 127.0.0.5 noproxy.test.nix 17 + 127.0.0.3 direct-nossl.test.nix 18 + 127.0.0.4 unsecure-nossl.test.nix 19 + 127.0.0.2 direct-noproxy.test.nix 20 + 127.0.0.1 direct-proxy.test.nix 21 + ''; 22 + services.nginx = { 23 + enable = true; 24 + defaultListen = [ 25 + { addr = "127.0.0.1"; proxyProtocol = true; ssl = true; } 26 + { addr = "127.0.0.2"; } 27 + { addr = "127.0.0.3"; ssl = false; } 28 + { addr = "127.0.0.4"; ssl = false; proxyProtocol = true; } 29 + ]; 30 + commonHttpConfig = '' 31 + log_format pcombined '(proxy_protocol=$proxy_protocol_addr) - (remote_addr=$remote_addr) - (realip=$realip_remote_addr) - (upstream=) - (remote_user=$remote_user) [$time_local] ' 32 + '"$request" $status $body_bytes_sent ' 33 + '"$http_referer" "$http_user_agent"'; 34 + access_log /var/log/nginx/access.log pcombined; 35 + error_log /var/log/nginx/error.log; 36 + ''; 37 + virtualHosts = 38 + let 39 + commonConfig = { 40 + locations."/".return = "200 '$remote_addr'"; 41 + extraConfig = '' 42 + set_real_ip_from 127.0.0.5/32; 43 + real_ip_header proxy_protocol; 44 + ''; 45 + }; 46 + in 47 + { 48 + "*.test.nix" = commonConfig // { 49 + sslCertificate = certs."*.test.nix".cert; 50 + sslCertificateKey = certs."*.test.nix".key; 51 + forceSSL = true; 52 + }; 53 + "direct-nossl.test.nix" = commonConfig; 54 + "unsecure-nossl.test.nix" = commonConfig // { 55 + extraConfig = '' 56 + real_ip_header proxy_protocol; 57 + ''; 58 + }; 59 + }; 60 + }; 61 + 62 + services.sniproxy = { 63 + enable = true; 64 + config = '' 65 + error_log { 66 + syslog daemon 67 + } 68 + access_log { 69 + syslog daemon 70 + } 71 + listener 127.0.0.5:443 { 72 + protocol tls 73 + source 127.0.0.5 74 + } 75 + table { 76 + ^proxy\.test\.nix$ 127.0.0.1 proxy_protocol 77 + ^noproxy\.test\.nix$ 127.0.0.2 78 + } 79 + ''; 80 + }; 81 + }; 82 + }; 83 + 84 + testScript = '' 85 + def check_origin_ip(src_ip: str, dst_url: str, failure: bool = False, proxy_protocol: bool = False, expected_ip: str | None = None): 86 + check = webserver.fail if failure else webserver.succeed 87 + if expected_ip is None: 88 + expected_ip = src_ip 89 + 90 + return check(f"curl {'--haproxy-protocol' if proxy_protocol else '''} --interface {src_ip} --fail -L {dst_url} | grep '{expected_ip}'") 91 + 92 + webserver.wait_for_unit("nginx") 93 + webserver.wait_for_unit("sniproxy") 94 + # This should be closed by virtue of ssl = true; 95 + webserver.wait_for_closed_port(80, "127.0.0.1") 96 + # This should be open by virtue of no explicit ssl 97 + webserver.wait_for_open_port(80, "127.0.0.2") 98 + # This should be open by virtue of ssl = true; 99 + webserver.wait_for_open_port(443, "127.0.0.1") 100 + # This should be open by virtue of no explicit ssl 101 + webserver.wait_for_open_port(443, "127.0.0.2") 102 + # This should be open by sniproxy 103 + webserver.wait_for_open_port(443, "127.0.0.5") 104 + # This should be closed by sniproxy 105 + webserver.wait_for_closed_port(80, "127.0.0.5") 106 + 107 + # Sanity checks for the NGINX module 108 + # direct-HTTP connection to NGINX without TLS, this checks that ssl = false; works well. 109 + check_origin_ip("127.0.0.10", "http://direct-nossl.test.nix/") 110 + # webserver.execute("openssl s_client -showcerts -connect direct-noproxy.test.nix:443") 111 + # direct-HTTP connection to NGINX with TLS 112 + check_origin_ip("127.0.0.10", "http://direct-noproxy.test.nix/") 113 + check_origin_ip("127.0.0.10", "https://direct-noproxy.test.nix/") 114 + # Well, sniproxy is not listening on 80 and cannot redirect 115 + check_origin_ip("127.0.0.10", "http://proxy.test.nix/", failure=True) 116 + check_origin_ip("127.0.0.10", "http://noproxy.test.nix/", failure=True) 117 + 118 + # Actual PROXY protocol related tests 119 + # Connecting through sniproxy should passthrough the originating IP address. 120 + check_origin_ip("127.0.0.10", "https://proxy.test.nix/") 121 + # Connecting through sniproxy to a non-PROXY protocol enabled listener should not pass the originating IP address. 122 + check_origin_ip("127.0.0.10", "https://noproxy.test.nix/", expected_ip="127.0.0.5") 123 + 124 + # Attack tests against spoofing 125 + # Let's try to spoof our IP address by connecting direct-y to the PROXY protocol listener. 126 + # FIXME(RaitoBezarius): rewrite it using Python + (Scapy|something else) as this is too much broken unfortunately. 127 + # Or wait for upstream curl patch. 128 + # def generate_attacker_request(original_ip: str, target_ip: str, dst_url: str): 129 + # return f"""PROXY TCP4 {original_ip} {target_ip} 80 80 130 + # GET / HTTP/1.1 131 + # Host: {dst_url} 132 + 133 + # """ 134 + # def spoof(original_ip: str, target_ip: str, dst_url: str, tls: bool = False, expect_failure: bool = True): 135 + # method = webserver.fail if expect_failure else webserver.succeed 136 + # port = 443 if tls else 80 137 + # print(webserver.execute(f"cat <<EOF | nc {target_ip} {port}\n{generate_attacker_request(original_ip, target_ip, dst_url)}\nEOF")) 138 + # return method(f"cat <<EOF | nc {target_ip} {port} | grep {original_ip}\n{generate_attacker_request(original_ip, target_ip, dst_url)}\nEOF") 139 + 140 + # check_origin_ip("127.0.0.10", "http://unsecure-nossl.test.nix", proxy_protocol=True) 141 + # spoof("1.1.1.1", "127.0.0.4", "direct-nossl.test.nix") 142 + # spoof("1.1.1.1", "127.0.0.4", "unsecure-nossl.test.nix", expect_failure=False) 143 + ''; 144 + })
+30
nixos/tests/nginx-proxyprotocol/generate-certs.nix
··· 1 + # Minica can provide a CA key and cert, plus a key 2 + # and cert for our fake CA server's Web Front End (WFE). 3 + { 4 + pkgs ? import <nixpkgs> {}, 5 + minica ? pkgs.minica, 6 + runCommandCC ? pkgs.runCommandCC, 7 + }: 8 + let 9 + conf = import ./snakeoil-certs.nix; 10 + domain = conf.domain; 11 + domainSanitized = pkgs.lib.replaceStrings ["*"] ["_"] domain; 12 + in 13 + runCommandCC "generate-tests-certs" { 14 + buildInputs = [ (minica.overrideAttrs (old: { 15 + postPatch = '' 16 + sed -i 's_NotAfter: time.Now().AddDate(2, 0, 30),_NotAfter: time.Now().AddDate(20, 0, 0),_' main.go 17 + ''; 18 + })) ]; 19 + 20 + } '' 21 + minica \ 22 + --ca-key ca.key.pem \ 23 + --ca-cert ca.cert.pem \ 24 + --domains "${domain}" 25 + 26 + mkdir -p $out 27 + mv ca.*.pem $out/ 28 + mv ${domainSanitized}/key.pem $out/${domainSanitized}.key.pem 29 + mv ${domainSanitized}/cert.pem $out/${domainSanitized}.cert.pem 30 + ''
+14
nixos/tests/nginx-proxyprotocol/snakeoil-certs.nix
··· 1 + let 2 + domain = "*.test.nix"; 3 + domainSanitized = "_.test.nix"; 4 + in { 5 + inherit domain; 6 + ca = { 7 + cert = ./ca.cert.pem; 8 + key = ./ca.key.pem; 9 + }; 10 + "${domain}" = { 11 + cert = ./. + "/${domainSanitized}.cert.pem"; 12 + key = ./. + "/${domainSanitized}.key.pem"; 13 + }; 14 + }
+3 -3
pkgs/applications/audio/go-musicfox/default.nix
··· 9 9 10 10 buildGoModule rec { 11 11 pname = "go-musicfox"; 12 - version = "4.0.6"; 12 + version = "4.1.1"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "go-musicfox"; 16 16 repo = pname; 17 17 rev = "v${version}"; 18 - hash = "sha256-ZqB3NL/pLIY1lHl3qMIOciqsOW9jNwjVQAq1j/ydDWs="; 18 + hash = "sha256-A1+JDMT4mHUi10GE4/qV5IMuwNsm4EdBt9VC2ZvJzuU="; 19 19 }; 20 20 21 21 deleteVendor = true; 22 22 23 - vendorHash = "sha256-rJlyrPQS9UKinxIwGGo3EHlmWrzTKIm1jM1UDqnmVyg="; 23 + vendorHash = "sha256-xzLUWqzDVT+Htw/BHygOJM16uQvWXopyxxHBZQKcOQ8="; 24 24 25 25 subPackages = [ "cmd/musicfox.go" ]; 26 26
+2 -2
pkgs/applications/editors/jetbrains/linux.nix
··· 1 1 { stdenv, lib, makeDesktopItem, makeWrapper, patchelf, writeText 2 2 , coreutils, gnugrep, which, git, unzip, libsecret, libnotify, e2fsprogs 3 - , vmopts ? null 3 + , python3, vmopts ? null 4 4 }: 5 5 6 6 { pname, product, productShort ? product, version, src, wmClass, jdk, meta, extraLdPath ? [], extraWrapperArgs ? [] }@args: ··· 71 71 item=${desktopItem} 72 72 73 73 makeWrapper "$out/$pname/bin/${loName}.sh" "$out/bin/${pname}" \ 74 - --prefix PATH : "$out/libexec/${pname}:${lib.makeBinPath [ jdk coreutils gnugrep which git ]}" \ 74 + --prefix PATH : "$out/libexec/${pname}:${lib.makeBinPath [ jdk coreutils gnugrep which git python3 ]}" \ 75 75 --prefix LD_LIBRARY_PATH : "${lib.makeLibraryPath ([ 76 76 # Some internals want libstdc++.so.6 77 77 stdenv.cc.cc.lib libsecret e2fsprogs
+2 -2
pkgs/applications/editors/orbiton/default.nix
··· 4 4 5 5 buildGoModule rec { 6 6 pname = "orbiton"; 7 - version = "2.61.0"; 7 + version = "2.62.0"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "xyproto"; 11 11 repo = "orbiton"; 12 12 rev = "v${version}"; 13 - hash = "sha256-GknQXHwpdIRzSjIc1ITsoiaks4Vi5KmVqL7sHzmfnmQ="; 13 + hash = "sha256-DmS0rn1v9zksSzO7FVl5YsIIXvhQ3zhSBC/i7tosdag="; 14 14 }; 15 15 16 16 vendorHash = null;
+1 -3
pkgs/applications/graphics/gnome-decoder/default.nix
··· 1 1 { lib 2 2 , clangStdenv 3 3 , fetchFromGitLab 4 - , libclang 5 4 , rustPlatform 6 5 , cargo 7 6 , meson ··· 50 49 desktop-file-utils 51 50 cargo 52 51 rustc 52 + rustPlatform.bindgenHook 53 53 rustPlatform.cargoSetupHook 54 54 ]; 55 55 ··· 65 65 gst-plugins-base 66 66 gst-plugins-bad 67 67 ]; 68 - 69 - LIBCLANG_PATH = "${libclang.lib}/lib"; 70 68 71 69 meta = with lib; { 72 70 description = "Scan and Generate QR Codes";
+2 -2
pkgs/applications/misc/cubiomes-viewer/default.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "cubiomes-viewer"; 12 - version = "3.2.1"; 12 + version = "3.3.0"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "Cubitect"; 16 16 repo = pname; 17 17 rev = version; 18 - sha256 = "sha256-67augXXZsriXdndrCFUFWZbL+rVKgTPAyqlbZua2Ul4="; 18 + sha256 = "sha256-V6zPbL1/tP2B38wo4a05+vXCSjPE1YKpMR3zl/BbnY8="; 19 19 fetchSubmodules = true; 20 20 }; 21 21
+2 -2
pkgs/applications/misc/gallery-dl/default.nix
··· 2 2 3 3 buildPythonApplication rec { 4 4 pname = "gallery-dl"; 5 - version = "1.25.4"; 5 + version = "1.25.5"; 6 6 format = "setuptools"; 7 7 8 8 src = fetchPypi { 9 9 inherit version; 10 10 pname = "gallery_dl"; 11 - sha256 = "sha256-4x0XjXriEAJWSmbGjBWxZ5WJW9ruGE9wVrdZYTe6wE4="; 11 + sha256 = "sha256-IFzKVHIuZZ2WLk23ZqyxvwxXF45f2O/VAqQ/j98x4ag="; 12 12 }; 13 13 14 14 propagatedBuildInputs = [
+8 -6
pkgs/applications/misc/makeself/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, which, zstd, pbzip2 }: 1 + { lib, stdenv, fetchFromGitHub, which, zstd, pbzip2, installShellFiles }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 version = "2.4.5"; ··· 11 11 fetchSubmodules = true; 12 12 sha256 = "sha256-15lUtErGsbXF2Gn0f0rvA18mMuVMmkKrGO2poeYZU9g="; 13 13 }; 14 + 15 + nativeBuildInputs = [ installShellFiles ]; 14 16 15 17 postPatch = "patchShebangs test"; 16 18 ··· 22 24 nativeCheckInputs = [ which zstd pbzip2 ]; 23 25 24 26 installPhase = '' 25 - mkdir -p $out/{bin,share/{${pname}-${version},man/man1}} 26 - cp makeself.lsm README.md $out/share/${pname}-${version} 27 - cp makeself.sh $out/bin/makeself 28 - cp makeself.1 $out/share/man/man1/ 29 - cp makeself-header.sh $out/share/${pname}-${version} 27 + runHook preInstall 28 + installManPage makeself.1 29 + install -Dm555 makeself.sh $out/bin/makeself 30 + install -Dm444 -t $out/share/${pname}/ makeself.lsm README.md makeself-header.sh 31 + runHook postInstall 30 32 ''; 31 33 32 34 fixupPhase = ''
+15 -10
pkgs/applications/misc/scli/default.nix
··· 4 4 , dbus 5 5 , signal-cli 6 6 , xclip 7 + , testers 8 + , scli 7 9 }: 8 10 9 11 python3.pkgs.buildPythonApplication rec { ··· 26 28 27 29 dontBuild = true; 28 30 29 - checkPhase = '' 30 - # scli attempts to write to these directories, make sure they're writeable 31 - export XDG_DATA_HOME=$(mktemp -d) 32 - export XDG_CONFIG_HOME=$(mktemp -d) 33 - ./scli --help > /dev/null # don't spam nix-build log 34 - test $? == 0 35 - ''; 36 - 37 31 installPhase = '' 38 - mkdir -p $out/bin 32 + runHook preInstall 33 + 39 34 patchShebangs scli 40 - install -m755 -D scli $out/bin/scli 35 + install -Dm555 scli -t $out/bin 36 + echo "v$version" > $out/bin/VERSION 37 + 38 + runHook postInstall 41 39 ''; 42 40 43 41 makeWrapperArgs = [ 44 42 "--prefix" "PATH" ":" (lib.makeBinPath [ dbus signal-cli xclip ]) 45 43 ]; 44 + 45 + passthru.tests = { 46 + version = testers.testVersion { 47 + package = scli; 48 + command = "HOME=$(mktemp -d) scli --version"; 49 + }; 50 + }; 46 51 47 52 meta = with lib; { 48 53 description = "Simple terminal user interface for Signal";
+2 -2
pkgs/applications/misc/snapmaker-luban/default.nix
··· 8 8 9 9 stdenv.mkDerivation rec { 10 10 pname = "snapmaker-luban"; 11 - version = "4.7.3"; 11 + version = "4.8.0"; 12 12 13 13 src = fetchurl { 14 14 url = "https://github.com/Snapmaker/Luban/releases/download/v${version}/snapmaker-luban-${version}-linux-x64.tar.gz"; 15 - sha256 = "sha256-CPeTTnwykaa58tpA7Aznrvrs0DqxOKjspZjHrT+e9tw="; 15 + sha256 = "sha256-uY8MlLIZrbds5/QdYZFTLSSis0BwRU19XfLiBX+2VCY="; 16 16 }; 17 17 18 18 nativeBuildInputs = [
+3 -3
pkgs/applications/misc/system76-keyboard-configurator/default.nix
··· 6 6 7 7 rustPlatform.buildRustPackage rec { 8 8 pname = "system76-keyboard-configurator"; 9 - version = "1.3.2"; 9 + version = "1.3.3"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "pop-os"; 13 13 repo = "keyboard-configurator"; 14 14 rev = "v${version}"; 15 - sha256 = "sha256-21cn43qyKg8jL6FF8D9H7dgcgSKggqaxb4cJVc0ljl0="; 15 + sha256 = "sha256-8Mb07OlmYl/dNxCdBrAq7mgXZvi0oqtt76UX8TMWUPY="; 16 16 }; 17 17 18 18 nativeBuildInputs = [ ··· 28 28 udev 29 29 ]; 30 30 31 - cargoHash = "sha256-9VjrDE/1VAgNrRmSYxCYKPrnilPQF+OXAYpFkF2lpAE="; 31 + cargoHash = "sha256-3IAljoL4cabZ9rpgqPrgG7ofwETHS/9OlBKjxTwCDTU="; 32 32 33 33 meta = with lib; { 34 34 description = "Keyboard configuration application for System76 keyboards and laptops";
+2 -2
pkgs/applications/networking/cluster/argo-rollouts/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "argo-rollouts"; 5 - version = "1.5.0"; 5 + version = "1.5.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "argoproj"; 9 9 repo = "argo-rollouts"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-bOGC4RAeydPCvqyQZE+K0N01xRIGsoiwKJ4lMwVVgGk="; 11 + sha256 = "sha256-ODcT7dc4xBHOKYTP2pUTq2z3GMUEpZ9OUKKxlbd+Vvk="; 12 12 }; 13 13 14 14 vendorHash = "sha256-IxSLlRsOz/Xamguxm+7jy8qAAEZZFm/NHDIBjm5tnCs=";
+2 -2
pkgs/applications/networking/cluster/kaniko/default.nix
··· 9 9 10 10 buildGoModule rec { 11 11 pname = "kaniko"; 12 - version = "1.9.2"; 12 + version = "1.10.0"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "GoogleContainerTools"; 16 16 repo = "kaniko"; 17 17 rev = "v${version}"; 18 - hash = "sha256-dXQ0/o1qISv+sjNVIpfF85bkbM9sGOGwqVbWZpMWfMY="; 18 + hash = "sha256-SPHayFfYFpg1AOoe003xh7NGQLpvhd1C2k4IilgMqSw="; 19 19 }; 20 20 21 21 vendorHash = null;
+2 -2
pkgs/applications/networking/cluster/kubeshark/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "kubeshark"; 5 - version = "40.2"; 5 + version = "40.5"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "kubeshark"; 9 9 repo = "kubeshark"; 10 10 rev = version; 11 - sha256 = "sha256-E39Hr39fPiRKElploh2EEE35x0vnyAf2eWHr8Ifx0l0="; 11 + sha256 = "sha256-Xm8Tx1m3k+Vz5GlSIGJw8W2PVkZav9U5A52X9HUJFno="; 12 12 }; 13 13 14 14 vendorHash = "sha256-ckIjmrXkn1AVBQRwM6+wdRwwYHytxKm3rKEe+csORdU=";
+2 -14
pkgs/applications/networking/cluster/terraform-providers/default.nix
··· 19 19 , rev 20 20 , spdx ? "UNSET" 21 21 , version ? lib.removePrefix "v" rev 22 - , hash ? throw "use hash instead of sha256" # added 2202/09 23 - , vendorHash ? throw "use vendorHash instead of vendorSha256" # added 2202/09 22 + , hash 23 + , vendorHash 24 24 , deleteVendor ? false 25 25 , proxyVendor ? false 26 26 , mkProviderFetcher ? fetchFromGitHub ··· 88 88 removed-providers = 89 89 let 90 90 archived = name: date: throw "the ${name} terraform provider has been archived by upstream on ${date}"; 91 - license = name: date: throw "the ${name} terraform provider removed from nixpkgs on ${date} because of unclear licensing"; 92 91 removed = name: date: throw "the ${name} terraform provider removed from nixpkgs on ${date}"; 93 92 in 94 93 lib.optionalAttrs config.allowAliases { 95 - b2 = removed "b2" "2022/06"; 96 - checkpoint = removed "checkpoint" "2022/11"; 97 - dome9 = removed "dome9" "2022/08"; 98 94 ksyun = removed "ksyun" "2023/04"; 99 - logicmonitor = license "logicmonitor" "2022/11"; 100 - ncloud = removed "ncloud" "2022/08"; 101 - nsxt = license "nsxt" "2022/11"; 102 - opc = archived "opc" "2022/05"; 103 - oraclepaas = archived "oraclepaas" "2022/05"; 104 - panos = removed "panos" "2022/05"; 105 - template = archived "template" "2022/05"; 106 - vercel = license "vercel" "2022/11"; 107 95 }; 108 96 109 97 # excluding aliases, used by terraform-full
+16 -16
pkgs/applications/networking/cluster/terraform-providers/providers.json
··· 110 110 "vendorHash": null 111 111 }, 112 112 "aws": { 113 - "hash": "sha256-I0iGgrvgjdqjeoiRMzItg2FELC/X2ACP5qLW5HguP78=", 113 + "hash": "sha256-eHU3dsu/aJ72BTwe4CAWhf29ZueUhyg10Ncs9yUxi80=", 114 114 "homepage": "https://registry.terraform.io/providers/hashicorp/aws", 115 115 "owner": "hashicorp", 116 116 "repo": "terraform-provider-aws", 117 - "rev": "v5.0.0", 117 + "rev": "v5.0.1", 118 118 "spdx": "MPL-2.0", 119 119 "vendorHash": "sha256-53BHSeRBgnT5LuSuTUA5R/bbeozd2gOxsXd/2tlrbYU=" 120 120 }, ··· 128 128 "vendorHash": null 129 129 }, 130 130 "azurerm": { 131 - "hash": "sha256-4gNXamhda8EyEyOQXnxYNy+S5SyGqtYaxRk/fAG7vvA=", 131 + "hash": "sha256-GVxIr57y5tlOrZYtu09FI0IYG2cLkHkYMMofdqdCans=", 132 132 "homepage": "https://registry.terraform.io/providers/hashicorp/azurerm", 133 133 "owner": "hashicorp", 134 134 "repo": "terraform-provider-azurerm", 135 - "rev": "v3.57.0", 135 + "rev": "v3.58.0", 136 136 "spdx": "MPL-2.0", 137 137 "vendorHash": null 138 138 }, ··· 665 665 "vendorHash": "sha256-4jAJf2FC83NdH4t1l7EA26yQ0pqteWmTIyrZDJdi7fg=" 666 666 }, 667 667 "linode": { 668 - "hash": "sha256-4cUmKscy0KrhG3CbQo/Uz0BI3tq/MUyDtzNqeXwUtxg=", 668 + "hash": "sha256-dVoITwVwvWX6gXNgNv8fpCT2d19nYN893L8CL/TvcPc=", 669 669 "homepage": "https://registry.terraform.io/providers/linode/linode", 670 670 "owner": "linode", 671 671 "repo": "terraform-provider-linode", 672 - "rev": "v2.2.0", 672 + "rev": "v2.3.0", 673 673 "spdx": "MPL-2.0", 674 - "vendorHash": "sha256-MsVYFt8u9czVs1vGCqBrw3BZ5C4OFNrEuZZ57GEVBqE=" 674 + "vendorHash": "sha256-a8IjMAojj15yl1sh/6r5WJsuqzWqHeDZLEqib7xOCw0=" 675 675 }, 676 676 "linuxbox": { 677 677 "hash": "sha256-MzasMVtXO7ZeZ+qEx2Z+7881fOIA0SFzSvXVHeEROtg=", ··· 801 801 }, 802 802 "nutanix": { 803 803 "deleteVendor": true, 804 - "hash": "sha256-szqvEU1cxEIBKIeHmeqT6YAEsXZDvINxfDyp76qswzw=", 804 + "hash": "sha256-kxLsQeseSncGRJCeh/1yD7oouS5OYwo5N5YorzwQdBs=", 805 805 "homepage": "https://registry.terraform.io/providers/nutanix/nutanix", 806 806 "owner": "nutanix", 807 807 "repo": "terraform-provider-nutanix", 808 - "rev": "v1.8.1", 808 + "rev": "v1.9.0", 809 809 "spdx": "MPL-2.0", 810 810 "vendorHash": "sha256-LRIfxQGwG988HE5fftGl6JmBG7tTknvmgpm4Fu1NbWI=" 811 811 }, ··· 864 864 "vendorHash": "sha256-2EuGZxHrpPwDicSrIf/Jx/c4LhOtE5HvTz9LkJ4xCSY=" 865 865 }, 866 866 "opsgenie": { 867 - "hash": "sha256-vwHymj6kNTfxpqLEJixB55SeET1wtlkoN8RH8Uw0iPA=", 867 + "hash": "sha256-fcQChRIwxAeAdYPTYC9rPSdbrmXaBIOotF7vQhO9Sl0=", 868 868 "homepage": "https://registry.terraform.io/providers/opsgenie/opsgenie", 869 869 "owner": "opsgenie", 870 870 "repo": "terraform-provider-opsgenie", 871 - "rev": "v0.6.22", 871 + "rev": "v0.6.23", 872 872 "spdx": "MPL-2.0", 873 873 "vendorHash": null 874 874 }, ··· 1044 1044 "vendorHash": "sha256-NO1r/EWLgH1Gogru+qPeZ4sW7FuDENxzNnpLSKstnE8=" 1045 1045 }, 1046 1046 "spotinst": { 1047 - "hash": "sha256-fNJhshwaMX0w5SuL/B8MDMrUN/que8H8UXqiPfKuIVg=", 1047 + "hash": "sha256-VzIQqxEZl3+cRk19vxJGF0DbzutrfOWeP27TMat//Es=", 1048 1048 "homepage": "https://registry.terraform.io/providers/spotinst/spotinst", 1049 1049 "owner": "spotinst", 1050 1050 "repo": "terraform-provider-spotinst", 1051 - "rev": "v1.119.1", 1051 + "rev": "v1.120.0", 1052 1052 "spdx": "MPL-2.0", 1053 - "vendorHash": "sha256-VZlTrUcfE7ZoAU3wWrM31pZbKSsUc1Oph7b8wb6k8cY=" 1053 + "vendorHash": "sha256-/sXd/qAChMpVTY/JN45fb2XFG0nsqc1ytC2FjXpva3c=" 1054 1054 }, 1055 1055 "stackpath": { 1056 1056 "hash": "sha256-7KQUddq+M35WYyAIAL8sxBjAaXFcsczBRO1R5HURUZg=", ··· 1098 1098 "vendorHash": "sha256-GNSKSlaFBj2P+z40U+0uwPSOuQBy+9vOVFfPe8p0A24=" 1099 1099 }, 1100 1100 "tencentcloud": { 1101 - "hash": "sha256-fHcEVQZLLmtaKsAaeFcnRxzPBcGv/UUZOpNHsB9VGXA=", 1101 + "hash": "sha256-2xyJ6rrgQKIhdtGNSnSYbL+fQhaqlEsWfGA2vYZeQBQ=", 1102 1102 "homepage": "https://registry.terraform.io/providers/tencentcloudstack/tencentcloud", 1103 1103 "owner": "tencentcloudstack", 1104 1104 "repo": "terraform-provider-tencentcloud", 1105 - "rev": "v1.81.1", 1105 + "rev": "v1.81.2", 1106 1106 "spdx": "MPL-2.0", 1107 1107 "vendorHash": null 1108 1108 },
+3 -3
pkgs/applications/networking/cluster/werf/default.nix
··· 10 10 11 11 buildGoModule rec { 12 12 pname = "werf"; 13 - version = "1.2.235"; 13 + version = "1.2.238"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "werf"; 17 17 repo = "werf"; 18 18 rev = "v${version}"; 19 - hash = "sha256-fEo/hHVV+xv60VNe9AqjrP4JGzGXcM8yr/KjhRfOAhk="; 19 + hash = "sha256-cMjekqIZnZMcDEEdeBs/jkPh/mqgox4gV+LkqP3IR5g="; 20 20 }; 21 21 22 - vendorHash = "sha256-1r32uT98I/pd6lxCb3bKy6uxJJodsaslwy9wynE4Pmg="; 22 + vendorHash = "sha256-67J7AaS0kUu42BqFWMsC+ZXL2DnrBWwhz/oGmyMvpyo="; 23 23 24 24 proxyVendor = true; 25 25
+2 -2
pkgs/applications/networking/coreth/default.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "coreth"; 9 - version = "0.12.1"; 9 + version = "0.12.2"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "ava-labs"; 13 13 repo = pname; 14 14 rev = "v${version}"; 15 - hash = "sha256-Wf4abvBOX98A2IjALkMMOAqDvEtXtLddxhrV2LQM1dU="; 15 + hash = "sha256-WkSZ+7ygg2dkotv3vwTrWaVsSQvgmPJ0xhPCqZdQit8="; 16 16 }; 17 17 18 18 # go mod vendor has a bug, see: golang/go#57529
+4 -22
pkgs/applications/networking/flexget/default.nix
··· 4 4 , fetchFromGitHub 5 5 }: 6 6 7 - let 8 - python = python3.override { 9 - packageOverrides = self: super: { 10 - sqlalchemy = super.sqlalchemy.overridePythonAttrs (old: rec { 11 - version = "1.4.48"; 12 - src = fetchPypi { 13 - pname = "SQLAlchemy"; 14 - inherit version; 15 - hash = "sha256-tHvChwltmJoIOM6W99jpZpFKJNqHftQadTHUS1XNuN8="; 16 - }; 17 - }); 18 - }; 19 - }; 20 - in 21 - python.pkgs.buildPythonApplication rec { 7 + python3.pkgs.buildPythonApplication rec { 22 8 pname = "flexget"; 23 - version = "3.7.0"; 9 + version = "3.7.2"; 24 10 format = "pyproject"; 25 11 26 12 # Fetch from GitHub in order to use `requirements.in` ··· 28 14 owner = "Flexget"; 29 15 repo = "Flexget"; 30 16 rev = "refs/tags/v${version}"; 31 - hash = "sha256-H+R2NPHJbpQToKI1Op+DqPt82+w2xHxHC9NPpiF3aF0="; 17 + hash = "sha256-K71nawQhFYLPRg79rcZKJ+US+3M5JAU0eg+ZiFwB6n8="; 32 18 }; 33 19 34 20 postPatch = '' 35 21 # remove dependency constraints but keep environment constraints 36 22 sed 's/[~<>=][^;]*//' -i requirements.txt 37 - 38 - # "zxcvbn-python" was renamed to "zxcvbn", and we don't have the former in 39 - # nixpkgs. See: https://github.com/NixOS/nixpkgs/issues/62110 40 - substituteInPlace requirements.txt --replace "zxcvbn-python" "zxcvbn" 41 23 ''; 42 24 43 25 # ~400 failures 44 26 doCheck = false; 45 27 46 - propagatedBuildInputs = with python.pkgs; [ 28 + propagatedBuildInputs = with python3.pkgs; [ 47 29 # See https://github.com/Flexget/Flexget/blob/master/requirements.txt 48 30 apscheduler 49 31 beautifulsoup4
+2 -2
pkgs/applications/networking/instant-messengers/signal-cli/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "signal-cli"; 5 - version = "0.11.10"; 5 + version = "0.11.11"; 6 6 7 7 # Building from source would be preferred, but is much more involved. 8 8 src = fetchurl { 9 9 url = "https://github.com/AsamK/signal-cli/releases/download/v${version}/signal-cli-${version}-Linux.tar.gz"; 10 - hash = "sha256-8iWUhneAialoEn3igxxTGJBmopbZHHqkvtJPZEESWM0="; 10 + hash = "sha256-IKKWJBe6A3TVWIRTDyWbfRYMwgRNhSqSJK0ZRZNCVkA="; 11 11 }; 12 12 13 13 buildInputs = lib.optionals stdenv.isLinux [ libmatthew_java dbus dbus_java ];
+3 -3
pkgs/applications/networking/netmaker/default.nix
··· 10 10 11 11 buildGoModule rec { 12 12 pname = "netmaker"; 13 - version = "0.19.0"; 13 + version = "0.20.0"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "gravitl"; 17 17 repo = pname; 18 18 rev = "v${version}"; 19 - hash = "sha256-wiexultPliYD3WrLVtWUdLs762OzLAmoH66phwjOuUw="; 19 + hash = "sha256-pzU9MiUL5M7EkGIXjZ0VqJmk4qOlbgCLCg84iPIXG70="; 20 20 }; 21 21 22 - vendorHash = "sha256-Msvonap1soJExzBymouY8kZJnHT4SIwpfJjBgpkO2Rw="; 22 + vendorHash = "sha256-euqQztEUEejCWy7WqtzMEIZrBDZpD/6dqnFsYhXajdE="; 23 23 24 24 inherit subPackages; 25 25
+1 -4
pkgs/applications/networking/remote/rustdesk/default.nix
··· 20 20 , libyuv 21 21 , libopus 22 22 , libsciter 23 - , llvmPackages 24 23 , wrapGAppsHook 25 24 , writeText 26 25 }: ··· 40 39 # based on https://github.com/rustdesk/rustdesk/pull/1900 41 40 ./fix-for-rust-1.65.diff 42 41 ]; 43 - 44 - LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib"; 45 42 46 43 cargoLock = { 47 44 lockFile = ./Cargo.lock; ··· 98 95 ln -s ${libyuv.out}/lib/* $VCPKG_ROOT/installed/${vcpkg_target}/lib/ 99 96 ''; 100 97 101 - nativeBuildInputs = [ pkg-config cmake makeWrapper copyDesktopItems yasm nasm clang wrapGAppsHook ]; 98 + nativeBuildInputs = [ pkg-config cmake makeWrapper copyDesktopItems yasm nasm clang wrapGAppsHook rustPlatform.bindgenHook ]; 102 99 buildInputs = [ alsa-lib pulseaudio libXfixes libxcb xdotool gtk3 libvpx libopus libXtst libyuv ]; 103 100 104 101 # Checks require an active X display.
+83
pkgs/applications/science/logic/sharpsat-td/default.nix
··· 1 + { lib 2 + , stdenv 3 + , fetchFromGitHub 4 + , fetchzip 5 + , cmake 6 + , gmp 7 + , mpfr 8 + }: 9 + 10 + let 11 + satlib-bmc = fetchzip { 12 + url = "https://www.cs.ubc.ca/~hoos/SATLIB/Benchmarks/SAT/BMC/bmc.tar.gz"; 13 + stripRoot = false; 14 + sha256 = "sha256-F1Jfrj4iMMf/3LFCShIDMs4JfLkJ51Z4wkL1FDT9b/A="; 15 + }; 16 + 17 + # needed for mpfr 4.2.0+ support 18 + mpreal = fetchFromGitHub { 19 + owner = "advanpix"; 20 + repo = "mpreal"; 21 + rev = "mpfrc++-3.6.9"; 22 + sha256 = "sha256-l61SKEx4pBocADrEGPVacQ6F2ep9IuvNZ8W08dKeZKg="; 23 + }; 24 + 25 + in stdenv.mkDerivation rec { 26 + pname = "sharpsat-td"; 27 + version = "unstable-2021-09-05"; 28 + 29 + src = fetchFromGitHub { 30 + owner = "Laakeri"; 31 + repo = pname; 32 + rev = "b9bb015305ea5d4e1ac7141691d0fe55ca983d31"; 33 + sha256 = "sha256-FE+DUd58eRr5w9RFw0fMHfjIiNDWIcG7XbyWJ/pI28U="; 34 + }; 35 + 36 + postPatch = '' 37 + # just say no to bundled binaries 38 + rm bin/* 39 + 40 + # ensure resultant build calls its own binaries 41 + substituteInPlace src/decomposition.cpp \ 42 + --replace '"../../../flow-cutter-pace17/flow_cutter_pace17"' '"'"$out"'/bin/flow_cutter_pace17"' 43 + substituteInPlace src/preprocessor/treewidth.cpp \ 44 + --replace '"./flow_cutter_pace17"' '"'"$out"'/bin/flow_cutter_pace17"' 45 + 46 + # replace bundled version of mpreal/mpfrc++ 47 + rm -r src/mpfr 48 + cp -r ${mpreal} src/mpfr 49 + ''; 50 + 51 + nativeBuildInputs = [ cmake ]; 52 + buildInputs = [ gmp mpfr ]; 53 + 54 + installPhase = '' 55 + runHook preInstall 56 + 57 + mkdir -p $out/bin 58 + install -Dm755 sharpSAT $out/bin/sharpSAT-td 59 + install -Dm755 flow_cutter_pace17 $out/bin/flow_cutter_pace17 60 + 61 + runHook postInstall 62 + ''; 63 + 64 + doInstallCheck = true; 65 + installCheckPhase = '' 66 + runHook preInstallCheck 67 + 68 + # "correct" answer from https://sites.google.com/site/marcthurley/sharpsat/benchmarks/collected-model-counts 69 + $out/bin/sharpSAT-td -decot 1 -decow 100 -cs 3500 -tmpdir "$TMPDIR" \ 70 + ${satlib-bmc}/bmc-ibm-1.cnf | grep -F 'c s exact arb int 7333984412904350856728851870196181665291102236046537207120878033973328441091390427157620940515935993557837912658856672133150412904529478729364681871717139154252602322050981277183916105207406949425074710972297902317183503443350157267211568852295978718386711142950559533715161449971311118966214098944000' 71 + 72 + runHook postInstallCheck 73 + ''; 74 + 75 + meta = { 76 + description = "A fast solver for the #SAT model counting problem"; 77 + homepage = "https://github.com/Laakeri/sharpsat-td"; 78 + license = with lib.licenses; [ mit asl20 ]; 79 + maintainers = with lib.maintainers; [ ris ]; 80 + # uses clhash, which is non-portable 81 + platforms = [ "x86_64-linux" "x86_64-darwin" ]; 82 + }; 83 + }
+33
pkgs/applications/version-management/legit-web/default.nix
··· 1 + { lib 2 + , buildGoModule 3 + , fetchFromGitHub 4 + }: 5 + 6 + buildGoModule rec { 7 + pname = "legit"; 8 + version = "0.2.1"; 9 + 10 + src = fetchFromGitHub { 11 + repo = "legit"; 12 + owner = "icyphox"; 13 + rev = "v${version}"; 14 + hash = "sha256-Y0lfbe4xBCj80z07mLFIiX+shvntYAHiW2Uw7h94jrE="; 15 + }; 16 + 17 + vendorHash = "sha256-RAUSYCtP4rcJ2zIBXfPAEZWD1VSfr3d4MrmUMiPpjK8="; 18 + 19 + postInstall = '' 20 + mkdir -p $out/lib/legit/templates 21 + mkdir -p $out/lib/legit/static 22 + 23 + cp -r $src/templates/* $out/lib/legit/templates 24 + cp -r $src/static/* $out/lib/legit/static 25 + ''; 26 + 27 + meta = { 28 + description = "Web frontend for git"; 29 + homepage = "https://github.com/icyphox/legit"; 30 + license = lib.licenses.mit; 31 + maintainers = [ lib.maintainers.ratsclub ]; 32 + }; 33 + }
+3 -3
pkgs/applications/virtualization/flintlock/default.nix
··· 10 10 11 11 buildGoModule rec{ 12 12 pname = "flintlock"; 13 - version = "0.4.0"; 13 + version = "0.6.0"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "weaveworks"; 17 17 repo = "flintlock"; 18 18 rev = "v${version}"; 19 - sha256 = "sha256-kHrVpQ4E8b1YV+ofZwd4iGJ9ucVUUam6rxdpOGmvRR4="; 19 + sha256 = "sha256-jZi58mewQ2hlH/9H4iAF4Mvf9UK4F7sUR0xcCEaLzX0="; 20 20 }; 21 21 22 - vendorSha256 = "sha256-A3LrikB2KrnSI+OREiLmlkTFpRKQWRB8w4OJ6ApX7oY="; 22 + vendorHash = "sha256-IGfNMe1fQfAGAOVsxmn/oxleHfniqL1TJKllCwpuWOU="; 23 23 24 24 subPackages = [ "cmd/flintlock-metrics" "cmd/flintlockd" ]; 25 25
+40 -29
pkgs/applications/window-managers/weston/default.nix
··· 1 1 { lib, stdenv, fetchurl 2 2 , meson, ninja, pkg-config, python3, wayland-scanner 3 - , cairo, colord, dbus, lcms2, libGL, libXcursor, libdrm, libevdev, libinput 4 - , libjpeg, seatd, libxcb, libxkbcommon, mesa, mtdev, pam, udev, wayland 5 - , wayland-protocols 6 - , pipewire ? null, pango ? null, libunwind ? null, freerdp ? null, vaapi ? null 7 - , libva ? null, libwebp ? null, xwayland ? null 8 - # beware of null defaults, as the parameters *are* supplied by callPackage by default 9 - , buildDemo ? true 10 - , buildRemoting ? true, gst_all_1 3 + , cairo, dbus, lcms2, libdrm, libevdev, libinput, libjpeg, libxkbcommon, mesa 4 + , seatd, wayland, wayland-protocols, xcbutilcursor 5 + 6 + , demoSupport ? true 7 + , hdrSupport ? true, libdisplay-info 8 + , pangoSupport ? true, pango 9 + , pipewireSupport ? true, pipewire 10 + , rdpSupport ? true, freerdp 11 + , remotingSupport ? true, gst_all_1 12 + , vaapiSupport ? true, libva 13 + , vncSupport ? true, aml, neatvnc, pam 14 + , webpSupport ? true, libwebp 15 + , xwaylandSupport ? true, libXcursor, xwayland 11 16 }: 12 17 13 18 stdenv.mkDerivation rec { 14 19 pname = "weston"; 15 - version = "11.0.2"; 20 + version = "12.0.1"; 16 21 17 22 src = fetchurl { 18 23 url = "https://gitlab.freedesktop.org/wayland/weston/-/releases/${version}/downloads/weston-${version}.tar.xz"; 19 - hash = "sha256-ckB1LO8LfeYiuvi9U0jmP8axnwLvgklhsq3Rd9llKVI="; 24 + hash = "sha256-sYWR6rJ4vBkXIPbAkVgEC3lecRivHV3cpqzZqOIDlTU="; 20 25 }; 21 26 22 27 depsBuildBuild = [ pkg-config ]; 23 28 nativeBuildInputs = [ meson ninja pkg-config python3 wayland-scanner ]; 24 29 buildInputs = [ 25 - cairo colord dbus freerdp lcms2 libGL libXcursor libdrm libevdev libinput 26 - libjpeg seatd libunwind libva libwebp libxcb libxkbcommon mesa mtdev pam 27 - pango pipewire udev vaapi wayland wayland-protocols 28 - ] ++ lib.optionals buildRemoting [ 29 - gst_all_1.gstreamer 30 - gst_all_1.gst-plugins-base 31 - ]; 30 + cairo lcms2 libdrm libevdev libinput libjpeg libxkbcommon mesa seatd 31 + wayland wayland-protocols 32 + ] ++ lib.optional hdrSupport libdisplay-info 33 + ++ lib.optional pangoSupport pango 34 + ++ lib.optional pipewireSupport pipewire 35 + ++ lib.optional rdpSupport freerdp 36 + ++ lib.optionals remotingSupport [ gst_all_1.gstreamer gst_all_1.gst-plugins-base ] 37 + ++ lib.optional vaapiSupport libva 38 + ++ lib.optionals vncSupport [ aml neatvnc pam ] 39 + ++ lib.optional webpSupport libwebp 40 + ++ lib.optionals xwaylandSupport [ libXcursor xcbutilcursor xwayland ]; 32 41 33 42 mesonFlags= [ 34 - "-Dbackend-drm-screencast-vaapi=${lib.boolToString (vaapi != null)}" 35 - "-Dbackend-rdp=${lib.boolToString (freerdp != null)}" 36 - "-Dxwayland=${lib.boolToString (xwayland != null)}" # Default is true! 37 - (lib.mesonBool "remoting" buildRemoting) 38 - "-Dpipewire=${lib.boolToString (pipewire != null)}" 39 - "-Dimage-webp=${lib.boolToString (libwebp != null)}" 40 - (lib.mesonBool "demo-clients" buildDemo) 41 - "-Dsimple-clients=" 42 - "-Dtest-junit-xml=false" 43 - ] ++ lib.optionals (xwayland != null) [ 44 - "-Dxwayland-path=${xwayland.out}/bin/Xwayland" 43 + (lib.mesonBool "backend-drm-screencast-vaapi" vaapiSupport) 44 + (lib.mesonBool "backend-pipewire" pipewireSupport) 45 + (lib.mesonBool "backend-rdp" rdpSupport) 46 + (lib.mesonBool "backend-vnc" vncSupport) 47 + (lib.mesonBool "demo-clients" demoSupport) 48 + (lib.mesonBool "image-webp" webpSupport) 49 + (lib.mesonBool "pipewire" pipewireSupport) 50 + (lib.mesonBool "remoting" remotingSupport) 51 + (lib.mesonOption "simple-clients" "") 52 + (lib.mesonBool "test-junit-xml" false) 53 + (lib.mesonBool "xwayland" xwaylandSupport) 54 + ] ++ lib.optionals xwaylandSupport [ 55 + (lib.mesonOption "xwayland-path" (lib.getExe xwayland)) 45 56 ]; 46 57 47 58 passthru.providedSessions = [ "weston" ]; ··· 61 72 homepage = "https://gitlab.freedesktop.org/wayland/weston"; 62 73 license = licenses.mit; # Expat version 63 74 platforms = platforms.linux; 64 - maintainers = with maintainers; [ primeos ]; 75 + maintainers = with maintainers; [ primeos qyliss ]; 65 76 }; 66 77 }
+7 -8
pkgs/build-support/go/module.nix
··· 54 54 let 55 55 args = removeAttrs args' [ "overrideModAttrs" "vendorSha256" "vendorHash" ]; 56 56 57 - go-modules = if (vendorHash != null) then stdenv.mkDerivation (let modArgs = { 57 + go-modules = if (vendorHash == null) then "" else 58 + (stdenv.mkDerivation { 58 59 59 60 name = "${name}-go-modules"; 60 61 ··· 138 139 ''; 139 140 140 141 dontFixup = true; 141 - }; in modArgs // ( 142 - { 143 - outputHashMode = "recursive"; 144 - outputHash = vendorHash; 145 - outputHashAlgo = if args' ? vendorSha256 || vendorHash == "" then "sha256" else null; 146 - } 147 - ) // overrideModAttrs modArgs) else ""; 142 + 143 + outputHashMode = "recursive"; 144 + outputHash = vendorHash; 145 + outputHashAlgo = if args' ? vendorSha256 || vendorHash == "" then "sha256" else null; 146 + }).overrideAttrs overrideModAttrs; 148 147 149 148 package = stdenv.mkDerivation (args // { 150 149 nativeBuildInputs = [ go ] ++ nativeBuildInputs;
+2 -2
pkgs/data/themes/orchis-theme/default.nix
··· 26 26 stdenvNoCC.mkDerivation 27 27 rec { 28 28 inherit pname; 29 - version = "2023-04-08"; 29 + version = "2023-05-27"; 30 30 31 31 src = fetchFromGitHub { 32 32 repo = "Orchis-theme"; 33 33 owner = "vinceliuice"; 34 34 rev = version; 35 - hash = "sha256-/X4Hr2M/7pf6JxTUvPoG5VkQd+rweEPeTNe9glSLh78="; 35 + hash = "sha256-I1a8y9dAJqFgnhyMqfupSdGvbbScf6tSYKlAhAzY4Dk="; 36 36 }; 37 37 38 38 nativeBuildInputs = [ gtk3 sassc ];
+1 -1
pkgs/desktops/gnome/core/mutter/43/default.nix
··· 74 74 "-Dinstalled_tests=false" # TODO: enable these 75 75 "-Dwayland_eglstream=true" 76 76 "-Dprofiler=true" 77 - "-Dxwayland_path=${xwayland}/bin/Xwayland" 77 + "-Dxwayland_path=${lib.getExe xwayland}" 78 78 # This should be auto detected, but it looks like it manages a false 79 79 # positive. 80 80 "-Dxwayland_initfd=disabled"
+1 -1
pkgs/desktops/gnome/core/mutter/default.nix
··· 81 81 "-Dtests=false" 82 82 "-Dwayland_eglstream=true" 83 83 "-Dprofiler=true" 84 - "-Dxwayland_path=${xwayland}/bin/Xwayland" 84 + "-Dxwayland_path=${lib.getExe xwayland}" 85 85 # This should be auto detected, but it looks like it manages a false 86 86 # positive. 87 87 "-Dxwayland_initfd=disabled"
+1 -1
pkgs/desktops/plasma-5/kwin/default.nix
··· 144 144 ]; 145 145 146 146 CXXFLAGS = [ 147 - ''-DNIXPKGS_XWAYLAND=\"${lib.getBin xwayland}/bin/Xwayland\"'' 147 + ''-DNIXPKGS_XWAYLAND=\"${lib.getExe xwayland}\"'' 148 148 ]; 149 149 150 150 postInstall = ''
+9 -9
pkgs/development/compilers/dotnet/versions/7.0.nix
··· 47 47 }; 48 48 49 49 sdk_7_0 = buildNetSdk { 50 - version = "7.0.203"; 50 + version = "7.0.302"; 51 51 srcs = { 52 52 x86_64-linux = { 53 - url = "https://download.visualstudio.microsoft.com/download/pr/ebfd0bf8-79bd-480a-9e81-0b217463738d/9adc6bf0614ce02670101e278a2d8555/dotnet-sdk-7.0.203-linux-x64.tar.gz"; 54 - sha512 = "ed1ae7cd88591ec52e1515c4a25d9a832eca29e8a0889549fea35a320e6e356e3806a17289f71fc0b04c36b006ae74446c53771d976c170fcbe5977ac7db1cb6"; 53 + url = "https://download.visualstudio.microsoft.com/download/pr/351400ef-f2e6-4ee7-9d1b-4c246231a065/9f7826270fb36ada1bdb9e14bc8b5123/dotnet-sdk-7.0.302-linux-x64.tar.gz"; 54 + sha512 = "9387bd804ed980ba1bc33093598ddbafa3a761e07d28916c94442cc329533d78a03bfc59d3066a1a861244302414e7e658b4e721b5bc825f623f8f908e748b7e"; 55 55 }; 56 56 aarch64-linux = { 57 - url = "https://download.visualstudio.microsoft.com/download/pr/6cd2eaa7-4c06-4168-b90b-ee2d6bb40b10/4a8387eb07e17d262bfb9965f6d34462/dotnet-sdk-7.0.203-linux-arm64.tar.gz"; 58 - sha512 = "f5e1b5a63b51af664b852435fc5631ff3fbeafbfac9f34c025da016218b0e6fb9a24e816035a44f4b4a16f28bc696821b1aa6f181966754318bc45cde7f439bf"; 57 + url = "https://download.visualstudio.microsoft.com/download/pr/142603ad-0df5-4aef-bdc2-87b6140c90ed/2cce467e6c954d01024942b8370aaf70/dotnet-sdk-7.0.302-linux-arm64.tar.gz"; 58 + sha512 = "7f6372faa348c84560e3f1139605dc08d888b14b98c400724f628b52156fe31c20a50dc2a2f8673e29239d04ef06744e16c6f8bd8eb1756f99274c73eda74621"; 59 59 }; 60 60 x86_64-darwin = { 61 - url = "https://download.visualstudio.microsoft.com/download/pr/de3e24bd-f677-4d9e-9717-859ce6659b5d/80c21bb06ca64d9408d11a32f858c7c6/dotnet-sdk-7.0.203-osx-x64.tar.gz"; 62 - sha512 = "a69ec597bc5b0a59ccfc9cc63c4883037eb9293600e98ea420c879242ec6c3fae6a81a3a08bf7d5d2ab93f750debffb224ad5628c9abd53bc44cfcb02ca77136"; 61 + url = "https://download.visualstudio.microsoft.com/download/pr/34ce4803-1444-48a2-9955-e2a9b9061b03/e18c978b55226240ca037cf8b1770064/dotnet-sdk-7.0.302-osx-x64.tar.gz"; 62 + sha512 = "cafb8e2839a8c91f58e8bda519d27f622a7a4062aea9247d743d64a3de3acad6ddd4f80d011fd416a3e3622f0ece8cd2e70e65f48331ae321b5ff23d282787b3"; 63 63 }; 64 64 aarch64-darwin = { 65 - url = "https://download.visualstudio.microsoft.com/download/pr/ad0ad533-6970-4099-a0c6-ee1d089a381d/2d7ea966c6d032111389b7686ccc0d9a/dotnet-sdk-7.0.203-osx-arm64.tar.gz"; 66 - sha512 = "e41de76f6be00de587cedaed2b0c6e2c2871b2ebf03c89375b4c69cd3fdd14df0dc49b5fe83970868a25d14aa19deafbfe66ee6790383b77f7da3d8dea939664"; 65 + url = "https://download.visualstudio.microsoft.com/download/pr/fc7ed56d-3afe-4aa6-81bb-b4b0f5df56b5/d199f43f7421c6677ba25544b442b6b7/dotnet-sdk-7.0.302-osx-arm64.tar.gz"; 66 + sha512 = "28cc5fcc9651fc75f9b2f864672e5fdaead28feb262696c305d00a71c828004e46f0b9b4a6bb6b21b9ea475b1c601e1724df302eea4d63f604e4fcdc9c97dd63"; 67 67 }; 68 68 }; 69 69 packages = { fetchNuGet }: [
+25
pkgs/development/compilers/fleng/default.nix
··· 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + }: 5 + 6 + stdenv.mkDerivation (finalAttrs: { 7 + pname = "fleng"; 8 + version = "14"; 9 + 10 + src = fetchurl { 11 + url = "http://www.call-with-current-continuation.org/fleng/fleng-${finalAttrs.version}.tgz"; 12 + hash = "sha256-Js9bllX/399t9oeiRrqJNUFyYJwJVb/xSzwrcMrdi08="; 13 + }; 14 + 15 + doCheck = true; 16 + 17 + meta = { 18 + homepage = "http://www.call-with-current-continuation.org/fleng/fleng.html"; 19 + description = "A low level concurrent logic programming language descended from Prolog"; 20 + license = lib.licenses.publicDomain; 21 + maintainers = with lib.maintainers; [ AndersonTorres ]; 22 + platforms = lib.platforms.unix; 23 + }; 24 + }) 25 + # TODO: bootstrap
+11 -9
pkgs/development/embedded/avrdude/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, cmake, bison, flex, libusb-compat-0_1, libelf, libftdi1, readline 2 - # docSupport is a big dependency, disabled by default 3 - , docSupport ? false, texLive ? null, texinfo ? null, texi2html ? null 4 - }: 5 - 6 - assert docSupport -> texLive != null && texinfo != null && texi2html != null; 1 + { lib, stdenv, fetchFromGitHub, cmake, bison, flex, libusb-compat-0_1, libelf 2 + , libftdi1, readline 3 + # documentation building is broken on darwin 4 + , docSupport ? (!stdenv.isDarwin), texlive, texinfo, texi2html, unixtools }: 7 5 8 6 stdenv.mkDerivation rec { 9 7 pname = "avrdude"; ··· 16 14 sha256 = "sha256-pGjOefWnf11kG/zFGwYGet1OjAhKsULNGgh6vqvIQ7c="; 17 15 }; 18 16 19 - nativeBuildInputs = [ cmake bison flex ]; 17 + nativeBuildInputs = [ cmake bison flex ] ++ lib.optionals docSupport [ 18 + unixtools.more 19 + texlive.combined.scheme-medium 20 + texinfo 21 + texi2html 22 + ]; 20 23 21 - buildInputs = [ libusb-compat-0_1 libelf libftdi1 readline ] 22 - ++ lib.optionals docSupport [ texLive texinfo texi2html ]; 24 + buildInputs = [ libusb-compat-0_1 libelf libftdi1 readline ]; 23 25 24 26 cmakeFlags = lib.optionals docSupport [ 25 27 "-DBUILD_DOC=ON"
+2 -2
pkgs/development/embedded/stm32/stm32cubemx/default.nix
··· 9 9 in 10 10 stdenv.mkDerivation rec { 11 11 pname = "stm32cubemx"; 12 - version = "6.8.0"; 12 + version = "6.8.1"; 13 13 14 14 src = fetchzip { 15 15 url = "https://sw-center.st.com/packs/resource/library/stm32cube_mx_v${builtins.replaceStrings ["."] [""] version}-lin.zip"; 16 - sha256 = "sha256-jJeJTg2cCO6fqQ4vFq2dXsfsWmlN5ncZJWMoekJXkLQ="; 16 + sha256 = "sha256-0WzdyRP09rRZzVZhwMOxA/SwHrQOYGBnv8UwvjMT22Q="; 17 17 stripRoot = false; 18 18 }; 19 19
+3 -3
pkgs/development/interpreters/wasmtime/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "wasmtime"; 5 - version = "9.0.1"; 5 + version = "9.0.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "bytecodealliance"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - hash = "sha256-6pZZawygFxE5rWkdJUaJLxTd5pZiC0o1Rvc5Zl6YJpw="; 11 + hash = "sha256-Fnc3iepxHr7WjorFoabHE6ZM/zK1T5W/gkxL+AEcVgU="; 12 12 fetchSubmodules = true; 13 13 }; 14 14 15 - cargoHash = "sha256-GUYd5/1pekOHG1e0WBxjOe3/foZ5YdU2ovF0btZ6+ec="; 15 + cargoHash = "sha256-7Q5aJU0sYzRLgjiSNLIrydYRJ3ozABjDo4VtmexS3po="; 16 16 17 17 cargoBuildFlags = [ "--package" "wasmtime-cli" "--package" "wasmtime-c-api" ]; 18 18
+11
pkgs/development/libraries/libb64/default.nix
··· 19 19 url = "https://github.com/libb64/libb64/commit/4fe47c052e9123da8f751545deb48be08c3411f6.patch"; 20 20 sha256 = "18b3np3gpyzimqmk6001riqv5n70wfbclky6zzsrvj5zl1dj4ljf"; 21 21 }) 22 + # Fix i686-linux build failure. 23 + (fetchpatch { 24 + name = "elif.patch"; 25 + url = "https://github.com/libb64/libb64/commit/819e43c8b34261ea3ee694bdc27865a033966083.patch"; 26 + hash = "sha256-r2jI6Q3rWDtArLlkAuyy7vcjsuRvX+2fBd5yk8XOMcc"; 27 + }) 28 + (fetchpatch { 29 + name = "size_t.patch"; 30 + url = "https://github.com/libb64/libb64/commit/b5edeafc89853c48fa41a4c16393a1fdc8638ab6.patch"; 31 + hash = "sha256-+bqfOOlT/t0FLQEMHuxW1BxJcx9rk0yYM3wD43mcymo"; 32 + }) 22 33 ] ++ lib.optional (stdenv.buildPlatform != stdenv.hostPlatform) (fetchpatch { 23 34 name = "0001-example-Do-not-run-the-tests.patch"; 24 35 url = "https://cgit.openembedded.org/meta-openembedded/plain/meta-oe/recipes-support/libb64/libb64/0001-example-Do-not-run-the-tests.patch?id=484e0de1e4ee107f21ae2a5c5f976ed987978baf";
+2 -2
pkgs/development/libraries/libcpr/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, cmake, curl }: 2 2 3 - let version = "1.10.3"; in 3 + let version = "1.10.4"; in 4 4 stdenv.mkDerivation { 5 5 pname = "libcpr"; 6 6 inherit version; ··· 11 11 owner = "libcpr"; 12 12 repo = "cpr"; 13 13 rev = version; 14 - hash = "sha256-NueZPBiICrh8GXXdCqNtVaB7PfqwtQ0WolvRij8SYbE="; 14 + hash = "sha256-8qRNlZgBB71t/FSFPnxFhr02OuD2erLVeoc6wAx3LKk="; 15 15 }; 16 16 17 17 nativeBuildInputs = [ cmake ];
+1 -1
pkgs/development/libraries/libwacom/default.nix
··· 41 41 libgudev 42 42 ]; 43 43 44 - doCheck = stdenv.hostPlatform == stdenv.buildPlatform; 44 + doCheck = stdenv.hostPlatform == stdenv.buildPlatform && lib.meta.availableOn stdenv.hostPlatform valgrind; 45 45 46 46 mesonFlags = [ 47 47 "-Dtests=${if doCheck then "enabled" else "disabled"}"
+36
pkgs/development/mobile/fdroidcl/default.nix
··· 1 + { lib 2 + , buildGoModule 3 + , fetchFromGitHub 4 + , android-tools 5 + }: 6 + 7 + buildGoModule rec { 8 + pname = "fdroidcl"; 9 + version = "0.7.0"; 10 + 11 + src = fetchFromGitHub { 12 + owner = "mvdan"; 13 + repo = "fdroidcl"; 14 + rev = "v${version}"; 15 + hash = "sha256-tqhs3b/DHfnGOm9qcM56NSzt1GJflJfbemkp7+nXbug="; 16 + }; 17 + 18 + patches = [ ./go_mod_version_update.patch ]; 19 + 20 + vendorHash = "sha256-BWbwhHjfmMjiRurrZfW/YgIzJUH/hn+7qonD0BcTLxs="; 21 + 22 + postPatch = '' 23 + substituteInPlace adb/{server,device}.go \ 24 + --replace 'exec.Command("adb"' 'exec.Command("${android-tools}/bin/adb"' 25 + ''; 26 + 27 + # TestScript/search attempts to connect to fdroid 28 + doCheck = false; 29 + 30 + meta = with lib; { 31 + description = "F-Droid command line interface written in Go"; 32 + homepage = "https://github.com/mvdan/fdroidcl"; 33 + license = licenses.bsd3; 34 + maintainers = with maintainers; [ aleksana ]; 35 + }; 36 + }
+47
pkgs/development/mobile/fdroidcl/go_mod_version_update.patch
··· 1 + diff --git a/go.mod b/go.mod 2 + index a482585..5c836dd 100644 3 + --- a/go.mod 4 + +++ b/go.mod 5 + @@ -1,10 +1,19 @@ 6 + module mvdan.cc/fdroidcl 7 + 8 + -go 1.16 9 + +go 1.18 10 + 11 + require ( 12 + github.com/kr/pretty v0.3.0 13 + github.com/rogpeppe/go-internal v1.9.0 14 + github.com/schollz/progressbar/v3 v3.13.0 15 + - gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15 // indirect 16 + +) 17 + + 18 + +require ( 19 + + github.com/kr/text v0.2.0 // indirect 20 + + github.com/mattn/go-runewidth v0.0.14 // indirect 21 + + github.com/mitchellh/colorstring v0.0.0-20190213212951-d06e56a500db // indirect 22 + + github.com/pkg/diff v0.0.0-20210226163009-20ebb0f2a09e // indirect 23 + + github.com/rivo/uniseg v0.4.3 // indirect 24 + + golang.org/x/sys v0.4.0 // indirect 25 + + golang.org/x/term v0.4.0 // indirect 26 + ) 27 + diff --git a/go.sum b/go.sum 28 + index 7befc16..d8523cb 100644 29 + --- a/go.sum 30 + +++ b/go.sum 31 + @@ -23,8 +23,6 @@ github.com/rivo/uniseg v0.2.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJ 32 + github.com/rivo/uniseg v0.4.3 h1:utMvzDsuh3suAEnhH0RdHmoPbU648o6CvXxTx4SBMOw= 33 + github.com/rivo/uniseg v0.4.3/go.mod h1:FN3SvrM+Zdj16jyLfmOkMNblXMcoc8DfTHruCPUcx88= 34 + github.com/rogpeppe/go-internal v1.6.1/go.mod h1:xXDCJY+GAPziupqXw64V24skbSoqbTEfhy4qGm1nDQc= 35 + -github.com/rogpeppe/go-internal v1.8.1 h1:geMPLpDpQOgVyCg5z5GoRwLHepNdb71NXb67XFkP+Eg= 36 + -github.com/rogpeppe/go-internal v1.8.1/go.mod h1:JeRgkft04UBgHMgCIwADu4Pn6Mtm5d4nPKWu0nJ5d+o= 37 + github.com/rogpeppe/go-internal v1.9.0 h1:73kH8U+JUqXU8lRuOHeVHaa/SZPifC7BkcraZVejAe8= 38 + github.com/rogpeppe/go-internal v1.9.0/go.mod h1:WtVeX8xhTBvf0smdhujwtBcq4Qrzq/fJaraNFVN+nFs= 39 + github.com/schollz/progressbar/v3 v3.13.0 h1:9TeeWRcjW2qd05I8Kf9knPkW4vLM/hYoa6z9ABvxje8= 40 + @@ -38,7 +36,4 @@ golang.org/x/sys v0.4.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= 41 + golang.org/x/term v0.4.0 h1:O7UWfv5+A2qiuulQk30kVinPoMtoIPeVaKLEgLpVkvg= 42 + golang.org/x/term v0.4.0/go.mod h1:9P2UbLfCdcvo3p/nzKvsmas4TnlujnuoV9hGgYzW1lQ= 43 + gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= 44 + -gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15 h1:YR8cESwS4TdDjEe65xsg0ogRM/Nc3DYOhEAlW+xobZo= 45 + -gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= 46 + -gopkg.in/errgo.v2 v2.1.0 h1:0vLT13EuvQ0hNvakwLuFZ/jYrLp5F3kcWHXdRggjCE8= 47 + gopkg.in/errgo.v2 v2.1.0/go.mod h1:hNsd1EY+bozCKY1Ytp96fpM3vjJbqLJn88ws8XvfDNI=
+2 -2
pkgs/development/python-modules/acquire/default.nix
··· 17 17 18 18 buildPythonPackage rec { 19 19 pname = "acquire"; 20 - version = "3.5"; 20 + version = "3.6"; 21 21 format = "pyproject"; 22 22 23 23 disabled = pythonOlder "3.7"; ··· 26 26 owner = "fox-it"; 27 27 repo = "acquire"; 28 28 rev = "refs/tags/${version}"; 29 - hash = "sha256-F0kKydFDL2XafK7A66qn3Ad/mGZU8x3UKtXtKpxHZqU="; 29 + hash = "sha256-oH+uxu61+d6qEQmT7joxwlyfpv7mF8ug6OzHmyUa95Y="; 30 30 }; 31 31 32 32 SETUPTOOLS_SCM_PRETEND_VERSION = version;
+3 -3
pkgs/development/python-modules/adafruit-pureio/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "adafruit-pureio"; 10 - version = "1.1.10"; 11 - format = "setuptools"; 10 + version = "1.1.11"; 11 + format = "pyproject"; 12 12 13 13 disabled = pythonOlder "3.7"; 14 14 15 15 src = fetchPypi { 16 16 pname = "Adafruit_PureIO"; 17 17 inherit version; 18 - hash = "sha256-EgaIN1PAlmMJ5tAtqXBnbpvHtQO7Sib3NuAXOfVqZLk="; 18 + hash = "sha256-xM+7NlcxlC0fEJKhFvR9/a4K7xjFsn8QcrWCStXqjHw="; 19 19 }; 20 20 21 21 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/aliyun-python-sdk-config/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "aliyun-python-sdk-config"; 10 - version = "2.2.8"; 10 + version = "2.2.9"; 11 11 format = "setuptools"; 12 12 13 13 disabled = pythonOlder "3.7"; 14 14 15 15 src = fetchPypi { 16 16 inherit pname version; 17 - hash = "sha256-0rGI2YMT78gstfHmQD63hdvICQ3WlKgkx8unsDegaXw="; 17 + hash = "sha256-5uRiOJAxq1zcJX+CyDnTG5BG1eFcJ43HdfpWUoZ5FSM="; 18 18 }; 19 19 20 20 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/dominate/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "dominate"; 10 - version = "2.7.0"; 10 + version = "2.8.0"; 11 11 format = "setuptools"; 12 12 13 13 disabled = pythonOlder "3.7"; 14 14 15 15 src = fetchPypi { 16 16 inherit pname version; 17 - hash = "sha256-UgEBNgiS6/nQVT9n0341n/kkA9ih4zgUAwUDCIoF2kk="; 17 + hash = "sha256-TJDDvvr4jmErcfSzmve8vviXes+oVc7JVyJaj79QQAc="; 18 18 }; 19 19 20 20 nativeCheckInputs = [
+4 -2
pkgs/development/python-modules/faraday-plugins/default.nix
··· 6 6 , fetchFromGitHub 7 7 , html2text 8 8 , lxml 9 + , markdown 9 10 , pytestCheckHook 10 11 , python-dateutil 11 12 , pythonOlder ··· 17 18 18 19 buildPythonPackage rec { 19 20 pname = "faraday-plugins"; 20 - version = "1.11.0"; 21 + version = "1.12.0"; 21 22 format = "setuptools"; 22 23 23 24 disabled = pythonOlder "3.7"; ··· 26 27 owner = "infobyte"; 27 28 repo = "faraday_plugins"; 28 29 rev = "refs/tags/${version}"; 29 - hash = "sha256-rbmD+UeMzsccYq7AzANziUZCgKtShRe/fJersODMrF8="; 30 + hash = "sha256-dtSGNLQUG4Co+p/sPBgKxMhB7drZAMxUas+eH6g/cS8="; 30 31 }; 31 32 32 33 postPatch = '' ··· 40 41 colorama 41 42 html2text 42 43 lxml 44 + markdown 43 45 python-dateutil 44 46 pytz 45 47 requests
+6
pkgs/development/python-modules/fenics/default.nix
··· 73 73 rm test/unit/test_quadrature.py 74 74 rm test/unit/test_reference_element.py 75 75 rm test/unit/test_fiat.py 76 + 77 + # Fix `np.float` deprecation in Numpy 1.20 78 + grep -lr 'np.float(' test/ | while read -r fn; do 79 + substituteInPlace "$fn" \ 80 + --replace "np.float(" "np.float64(" 81 + done 76 82 ''; 77 83 checkPhase = '' 78 84 runHook preCheck
+1 -4
pkgs/development/python-modules/johnnycanencrypt/default.nix
··· 3 3 , fetchFromGitHub 4 4 , buildPythonPackage 5 5 , rustPlatform 6 - , llvmPackages 7 6 , pkg-config 8 7 , pcsclite 9 8 , nettle ··· 35 34 36 35 format = "pyproject"; 37 36 38 - LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib"; 39 - 40 37 propagatedBuildInputs = [ 41 38 httpx 42 39 ]; 43 40 44 41 nativeBuildInputs = [ 45 - llvmPackages.clang 46 42 pkg-config 47 43 ] ++ (with rustPlatform; [ 44 + bindgenHook 48 45 cargoSetupHook 49 46 maturinBuildHook 50 47 ]);
+2 -2
pkgs/development/python-modules/miniaudio/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "miniaudio"; 15 - version = "1.57"; 15 + version = "1.58"; 16 16 17 17 disabled = pythonOlder "3.6"; 18 18 ··· 22 22 owner = "irmen"; 23 23 repo = "pyminiaudio"; 24 24 rev = "refs/tags/v${version}"; 25 - hash = "sha256-jAGJEXNDclcGHnoDYMjQXz5ZS9U9pmIWEHzgYKp49/o="; 25 + hash = "sha256-uIjQerxMU4hMCJtpqYPt2kicql3s7jyho9r6/kRHTbk="; 26 26 }; 27 27 28 28 postPatch = ''
+2 -2
pkgs/development/python-modules/nbsphinx/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "nbsphinx"; 15 - version = "0.9.1"; 15 + version = "0.9.2"; 16 16 format = "setuptools"; 17 17 18 18 disabled = pythonOlder "3.7"; 19 19 20 20 src = fetchPypi { 21 21 inherit pname version; 22 - hash = "sha256-Wbv7e8Z2pmR4Bfs8qDSQM4rn+WwWdKnl5wfwVcJyxZ0="; 22 + hash = "sha256-VA239AZjR/I9BlDEro59hTNMaa33SeAwr2TBLplv+I4="; 23 23 }; 24 24 25 25 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/onvif-zeep-async/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "onvif-zeep-async"; 12 - version = "3.1.7"; 12 + version = "3.1.8"; 13 13 format = "setuptools"; 14 14 15 15 disabled = pythonOlder "3.7"; 16 16 17 17 src = fetchPypi { 18 18 inherit pname version; 19 - hash = "sha256-ra/1qKKmuWWvJCrr1uTCU5Awv5+GShgDHlHw0igLc4c="; 19 + hash = "sha256-UiONj4ANsB5l2/ypWWfUK5ELoLsnUuyrFeldgITwIo4="; 20 20 }; 21 21 22 22 propagatedBuildInputs = [
+3 -3
pkgs/development/python-modules/pyatv/default.nix
··· 23 23 24 24 buildPythonPackage rec { 25 25 pname = "pyatv"; 26 - version = "0.11.0"; 26 + version = "0.12.0"; 27 27 format = "setuptools"; 28 28 29 29 disabled = pythonOlder "3.7"; ··· 31 31 src = fetchFromGitHub { 32 32 owner = "postlund"; 33 33 repo = pname; 34 - rev = "v${version}"; 35 - hash = "sha256-HWr+Pu/tMuCDFC2mV3R/Wqe0PfVw/DDgEIYBRnfYx/I="; 34 + rev = "refs/tags/v${version}"; 35 + hash = "sha256-t7H4ut4atc2XDnpBzV03Q/OrCHMVmZk38r/iWcLKL7Q="; 36 36 }; 37 37 38 38 postPatch = ''
+2 -2
pkgs/development/python-modules/pydeps/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "pydeps"; 14 - version = "1.12.7"; 14 + version = "1.12.8"; 15 15 format = "setuptools"; 16 16 17 17 disabled = pythonOlder "3.7"; ··· 20 20 owner = "thebjorn"; 21 21 repo = pname; 22 22 rev = "refs/tags/v${version}"; 23 - hash = "sha256-D57IO+1KS/budIjScEjVKP/5IbEx9KSDS46URuymC4s="; 23 + hash = "sha256-6NxI67K1gw6VRO10T2o+5pwMsvCqIgMnHueLbg88XSQ="; 24 24 }; 25 25 26 26 buildInputs = [
+2 -2
pkgs/development/python-modules/pysigma-backend-insightidr/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "pysigma-backend-insightidr"; 13 - version = "0.1.8"; 13 + version = "0.1.9"; 14 14 format = "pyproject"; 15 15 16 16 disabled = pythonOlder "3.8"; ··· 19 19 owner = "SigmaHQ"; 20 20 repo = "pySigma-backend-insightidr"; 21 21 rev = "refs/tags/v${version}"; 22 - hash = "sha256-3Tr6WvYuHddc0vGb8li6hZLk2GgfXr67/T2AnYQ7qeo="; 22 + hash = "sha256-/oHwWe8EcE1CS/hOmzJm9smfRLS/wShfbSGqOuvp8rU="; 23 23 }; 24 24 25 25 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/python-otbr-api/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "python-otbr-api"; 15 - version = "1.1.0"; 15 + version = "1.2.0"; 16 16 format = "pyproject"; 17 17 18 18 disabled = pythonOlder "3.9"; ··· 21 21 owner = "home-assistant-libs"; 22 22 repo = pname; 23 23 rev = "refs/tags/${version}"; 24 - hash = "sha256-0JPniehl4cnoTWgqmq1fMZwU8FFl2Zx4CF81az6iaxQ="; 24 + hash = "sha256-IPglUB+Xla+IjWzHhfG+SDHY/jucg46ppnhHBHKTEiE="; 25 25 }; 26 26 27 27 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/subarulink/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "subarulink"; 14 - version = "0.7.6"; 14 + version = "0.7.6-1"; 15 15 format = "setuptools"; 16 16 17 17 disabled = pythonOlder "3.7"; ··· 20 20 owner = "G-Two"; 21 21 repo = pname; 22 22 rev = "refs/tags/v${version}"; 23 - hash = "sha256-D2nwzj7uYL/v5Ew2+LfJBLH904Htam4Fa3Gs6t8Hbyo="; 23 + hash = "sha256-/VaGiOnPyTHSwkxlQtwyIZohD3QK897kapmM3S8bHtM="; 24 24 }; 25 25 26 26 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/textual/default.nix
··· 22 22 23 23 buildPythonPackage rec { 24 24 pname = "textual"; 25 - version = "0.24.1"; 25 + version = "0.26.0"; 26 26 format = "pyproject"; 27 27 28 28 disabled = pythonOlder "3.7"; ··· 31 31 owner = "Textualize"; 32 32 repo = pname; 33 33 rev = "refs/tags/v${version}"; 34 - hash = "sha256-nFio45LxoVQK/IzVo2ZHGYzG6bHHr3yvA7P3kMZOUso="; 34 + hash = "sha256-l4zSSROeI55hFnf0C64bbAB+1cATUkS59Uybf7ZmSfs="; 35 35 }; 36 36 37 37 nativeBuildInputs = [
+21
pkgs/development/python-modules/torrent_parser/default.nix
··· 1 + { buildPythonPackage, lib, fetchFromGitHub }: 2 + 3 + buildPythonPackage rec { 4 + pname = "torrent_parser"; 5 + version = "0.4.1"; 6 + 7 + # No tarballs on Pypi 8 + src = fetchFromGitHub { 9 + owner = "7sDream"; 10 + repo = "torrent_parser"; 11 + rev = "v${version}"; 12 + sha256 = "sha256-zM738r3o9dGZYoWLN7fM4E06m6YPcAODEkgDS6wU/Sc="; 13 + }; 14 + 15 + meta = { 16 + description = "A .torrent file parser and creator for both Python 2 and 3"; 17 + homepage = "https://github.com/7sDream/torrent_parser"; 18 + license = lib.licenses.mit; 19 + maintainers = with lib.maintainers; [ ]; 20 + }; 21 + }
+3 -3
pkgs/development/python-modules/uptime-kuma-api/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "uptime-kuma-api"; 10 - version = "0.13.0"; 10 + version = "1.0.1"; 11 11 format = "setuptools"; 12 12 13 - disabled = pythonOlder "3.6"; 13 + disabled = pythonOlder "3.7"; 14 14 15 15 src = fetchPypi { 16 16 pname = "uptime_kuma_api"; 17 17 inherit version; 18 - hash = "sha256-MoHE6Y7x1F1l70tuCHNIPt+vpqfJ00EUIMHnE4476Co="; 18 + hash = "sha256-6Cwo71pgwBk5B6MaFFs9XlbocJLL/s4+7m7Gi13ddlM="; 19 19 }; 20 20 21 21 propagatedBuildInputs = [
+2 -2
pkgs/development/tools/build-managers/rebar3/default.nix
··· 3 3 writeScript, common-updater-scripts, coreutils, git, gnused, nix, rebar3-nix }: 4 4 5 5 let 6 - version = "3.21.0"; 6 + version = "3.22.0"; 7 7 owner = "erlang"; 8 8 deps = import ./rebar-deps.nix { inherit fetchFromGitHub fetchgit fetchHex; }; 9 9 rebar3 = stdenv.mkDerivation rec { ··· 16 16 inherit owner; 17 17 repo = pname; 18 18 rev = version; 19 - sha256 = "QRQlqzYxRD4W63CawXBQ9ysPHzHQ5JrfjPqAivFyJAM="; 19 + sha256 = "OCd9wGwnwOuv/Ojf1S4ALLn73AGKuXlRtukIiTSE2rs="; 20 20 }; 21 21 22 22 buildInputs = [ erlang ];
+4 -3
pkgs/development/tools/continuous-integration/agola/default.nix
··· 4 4 }: 5 5 6 6 let 7 - version = "0.7.0"; 7 + version = "0.8.0"; 8 8 in 9 9 10 10 buildGoModule { ··· 15 15 owner = "agola-io"; 16 16 repo = "agola"; 17 17 rev = "v${version}"; 18 - sha256 = "sha256-AiD7mVogWk/TOYy7Ed1aT31h1kbrRwseue5qc3wLOCI="; 18 + hash = "sha256-nU04MVkUC+m6Ga4qDUH9KrA0zbYmttAicpvdxbaBG0Y="; 19 19 }; 20 20 21 - vendorSha256 = "sha256-Y3ck7Qdo9uq3YuLzZUe+RZkKQqWpSko3q+f4bfkSz6g="; 21 + vendorHash = "sha256-k3Sip9CqTGRTWxr3RzZf0jCrm4AfUrpY/wSTmHy+yik="; 22 22 23 23 ldflags = [ 24 + "-s" 24 25 "-w" 25 26 "-X agola.io/agola/cmd.Version=${version}" 26 27 ];
-7
pkgs/development/tools/database/surrealdb-migrations/default.nix
··· 24 24 25 25 cargoSha256 = "sha256-1+cvOhDeH9vx/8J1RwKLPdkBmqBKFmbNXv3H44pZfj0="; 26 26 27 - 28 - # nativeBuildInputs = [ 29 - # pkg-config 30 - # # needed on top of LIBCLANG_PATH to compile rquickjs 31 - # llvmPackages.clang 32 - # ]; 33 - 34 27 buildInputs = [ ] 35 28 ++ lib.optionals stdenv.isDarwin [ Security ]; 36 29
+2 -2
pkgs/development/tools/dtools/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "dtools"; 5 - version = "2.095.1"; 5 + version = "2.103.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "dlang"; 9 9 repo = "tools"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256:0rdfk3mh3fjrb0h8pr8skwlq6ac9hdl1fkrkdl7n1fa2806b740b"; 11 + sha256 = "sha256-XM4gUxcarQCOBR8W/o0iWAI54PyLDkH6CsDce22Cnu4="; 12 12 name = "dtools"; 13 13 }; 14 14
+3 -3
pkgs/development/tools/frugal/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "frugal"; 5 - version = "3.16.19"; 5 + version = "3.16.21"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "Workiva"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-PEWjZeFIEfnAGVsv+oyF4R08FI+LzKBWlrlBmiXhJCQ="; 11 + sha256 = "sha256-iNj3E5JtvOHAiEC+81KnAb32TWi+Zq8Av24oLm01ty4="; 12 12 }; 13 13 14 14 subPackages = [ "." ]; 15 15 16 - vendorHash = "sha256-OnPQZk+VpOx97mSNRx9lGtC03OXGGz9JwUSZYX0Ofkc="; 16 + vendorHash = "sha256-29LwvekhevOn/1zrtQEZWqeQMEAN2xPxSRzas/5EhVM="; 17 17 18 18 meta = with lib; { 19 19 description = "Thrift improved";
+3 -3
pkgs/development/tools/ginkgo/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "ginkgo"; 5 - version = "2.9.4"; 5 + version = "2.9.5"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "onsi"; 9 9 repo = "ginkgo"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-groih0LxtmB8k4/vfw2Ivtzm+SOyQqK1o7XASNplFvQ="; 11 + sha256 = "sha256-1Hb8pCvPs/L5UU280XwwEOnQ1CjJjgw0+GdCbtLkIpg="; 12 12 }; 13 - vendorHash = "sha256-Rm5fpiTZMo/B9+yIpmEniJVRfKgHjpFIagELEjgFYwc="; 13 + vendorHash = "sha256-IxyPRUS7aqkfZ+hjtuopCd95dgiTgVdg1thSiTBZArg="; 14 14 15 15 # integration tests expect more file changes 16 16 # types tests are missing CodeLocation
+3 -3
pkgs/development/tools/go-toml/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "go-toml"; 5 - version = "2.0.7"; 5 + version = "2.0.8"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "pelletier"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-bGLJSzSwcoKRMRwLSmGEWoQaC9NVwcKyFKpcEw+/Nag="; 11 + sha256 = "sha256-pMy/cYyB9ncOuYysX0a9PmTuJdIrMcKL///57bniixI="; 12 12 }; 13 13 14 - vendorHash = "sha256-MMCyFKqsL9aSQqK9VtPzUbgfLTFpzD5g8QYx8qIwktg="; 14 + vendorHash = "sha256-44mxDswHIfVfAyvtyDHS4MnHCTPRlUvdhzHALICUJR4="; 15 15 16 16 excludedPackages = [ "cmd/gotoml-test-decoder" "cmd/tomltestgen" ]; 17 17
+2 -2
pkgs/development/tools/godot/4/default.nix
··· 53 53 in 54 54 stdenv.mkDerivation rec { 55 55 pname = "godot"; 56 - version = "4.0.2-stable"; 56 + version = "4.0.3-stable"; 57 57 58 58 src = fetchFromGitHub { 59 59 owner = "godotengine"; 60 60 repo = "godot"; 61 61 rev = version; 62 - hash = "sha256-kFIpY8kHa8ds/JgYWcUMB4RhwcJDebfeWFnI3BkFWiI="; 62 + hash = "sha256-g9+CV3HsiJqiSJpZvK0N7BqKzp2Pvi6otjRLsFdmWGk="; 63 63 }; 64 64 65 65 nativeBuildInputs = [
+3 -3
pkgs/development/tools/ls-lint/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "ls-lint"; 5 - version = "1.11.2"; 5 + version = "2.0.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "loeffel-io"; 9 9 repo = "ls-lint"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-mt1SvRHtAA0lChZ//8XIQGDPg1l1EOMkPIAe8YKhMSs="; 11 + sha256 = "sha256-eEP/l3vdObdxUYIp8eSSCn3W0ypcmykbwQTDP083MVE="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-OEwN9kj1npI+H7DY+e3tl5TIY/qr4y2CgAV5fwNA9l4="; 14 + vendorHash = "sha256-nSHhU6z3ItCKBZy8ENBcAkXqSVo3DU6hAyezQczKShM="; 15 15 16 16 meta = with lib; { 17 17 description = "An extremely fast file and directory name linter";
+3 -3
pkgs/development/tools/misc/terracognita/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "terracognita"; 5 - version = "0.8.3"; 5 + version = "0.8.4"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "cycloidio"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - hash = "sha256-ipPJMh88R9Ddo1QzN+No9H2bBsLSPARUI2HRaYvK6jc="; 11 + hash = "sha256-pPY8y+pQdk9/F7dnUBz/y4lvcR1k/EClywcZATArZVA="; 12 12 }; 13 13 14 - vendorHash = "sha256-7fGqChud9dcgA9BXyJysUgvvG7zI+ByA0oFlSMd+rps="; 14 + vendorHash = "sha256-ApnJH0uIClXbfXK+k4t9Tcayc2mfndoG9iMqZY3iWys="; 15 15 16 16 doCheck = false; 17 17
+4 -4
pkgs/development/tools/ocaml/opam/default.nix
··· 71 71 sha256 = "0jnqsv6pqp5b5g7lcjwgd75zqqvcwcl5a32zi03zg1kvj79p5gxs"; 72 72 }; 73 73 opam = fetchurl { 74 - url = "https://github.com/ocaml/opam/archive/2.1.4.zip"; 75 - sha256 = "0zp8sb75pw1kyqlm7bsiagfwq46mv41mxh5q2prn2cwg6xri2wrg"; 74 + url = "https://github.com/ocaml/opam/archive/2.1.5.zip"; 75 + sha256 = "0s8r5gfs2zsyfn3jzqnvns3g0rkik3pw628n0dik55fwq3zjgg4a"; 76 76 }; 77 77 }; 78 78 in stdenv.mkDerivation { 79 79 pname = "opam"; 80 - version = "2.1.4"; 80 + version = "2.1.5"; 81 81 82 82 strictDeps = true; 83 83 ··· 144 144 platforms = platforms.all; 145 145 }; 146 146 } 147 - # Generated by: ./opam.nix.pl -v 2.1.4 -p opam-shebangs.patch 147 + # Generated by: ./opam.nix.pl -v 2.1.5 -p opam-shebangs.patch
+2 -2
pkgs/development/tools/okteto/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "okteto"; 5 - version = "2.15.2"; 5 + version = "2.15.3"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "okteto"; 9 9 repo = "okteto"; 10 10 rev = version; 11 - hash = "sha256-PxCVBi/GMzyTs9GfIAAPHNbinexw4guSO8ZsyZIOmr4="; 11 + hash = "sha256-BzyKmM5Yp9zdNonkDZoJBAmy8jSDwt85Wr9/1nbD7V8="; 12 12 }; 13 13 14 14 vendorHash = "sha256-dZ6gzW5R5na5qcHFQqQvKfYb0Bu0kVvVMOaRdtTgkhE=";
+1 -3
pkgs/development/tools/parinfer-rust/default.nix
··· 13 13 14 14 cargoSha256 = "1lam4gwzcj6w0pyxf61l2cpbvvf5gmj2gwi8dangnhd60qhlnvrx"; 15 15 16 - nativeBuildInputs = [ llvmPackages.clang ]; 17 - buildInputs = [ llvmPackages.libclang ]; 18 - LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib"; 16 + nativeBuildInputs = [ llvmPackages.clang rustPlatform.bindgenHook ]; 19 17 20 18 postInstall = '' 21 19 mkdir -p $out/share/kak/autoload/plugins
+2 -2
pkgs/development/tools/quick-lint-js/default.nix
··· 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "quick-lint-js"; 6 - version = "2.12.0"; 6 + version = "2.14.0"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "quick-lint"; 10 10 repo = "quick-lint-js"; 11 11 rev = version; 12 - sha256 = "sha256-OxzemfWYItYb4XWpW2tNUn4yZHUIpS8MJXaP8+3z4YY="; 12 + sha256 = "sha256-TzkJupn2oy7zUZybAuTnXZXVLSe72GM7XByo0Kd66Qs="; 13 13 }; 14 14 15 15 nativeBuildInputs = [ cmake ninja ];
+8 -13
pkgs/development/tools/rbspy/default.nix
··· 4 4 , fetchFromGitHub 5 5 , ruby 6 6 , which 7 - , runCommand 8 - , darwin 9 7 }: 10 8 11 9 rustPlatform.buildRustPackage rec { ··· 20 18 }; 21 19 22 20 cargoHash = "sha256-JzspNL4T28awa/1Uajw0gLM3bYyUBYTjnfCXn9qG7SY="; 21 + 22 + # error: linker `aarch64-linux-gnu-gcc` not found 23 + postPatch = '' 24 + rm .cargo/config 25 + ''; 26 + 23 27 doCheck = true; 24 28 25 29 # The current implementation of rbspy fails to detect the version of ruby ··· 39 43 "--skip=test_sample_subprocesses" 40 44 ]; 41 45 42 - nativeBuildInputs = [ ruby which ]; 43 - 44 - buildInputs = lib.optionals (stdenv.isDarwin && stdenv.isx86_64) [ 45 - # Pull a header that contains a definition of proc_pid_rusage(). 46 - (runCommand "${pname}_headers" { } '' 47 - install -Dm444 ${lib.getDev darwin.apple_sdk.sdk}/include/libproc.h $out/include/libproc.h 48 - '') 49 - ]; 50 - 51 - LIBCLANG_PATH = lib.optionalString stdenv.isDarwin "${stdenv.cc.cc.lib}/lib"; 46 + nativeBuildInputs = [ ruby which ] 47 + ++ lib.optional stdenv.isDarwin rustPlatform.bindgenHook; 52 48 53 49 meta = with lib; { 54 - broken = (stdenv.isLinux && stdenv.isAarch64); 55 50 homepage = "https://rbspy.github.io/"; 56 51 description = '' 57 52 A Sampling CPU Profiler for Ruby.
+7 -10
pkgs/development/tools/rust-code-analysis/default.nix
··· 1 - { lib, rustPlatform, fetchFromGitHub }: 1 + { lib, rustPlatform, fetchCrate }: 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "rust-code-analysis"; 5 - version = "0.0.23"; 5 + version = "0.0.25"; 6 6 7 - src = fetchFromGitHub { 8 - owner = "mozilla"; 9 - repo = pname; 10 - rev = "v${version}"; 11 - sha256 = "1l9qr5rvbj542fx6g6h9p38z31kvwli39vipbmd3pvic2mpi6mzx"; 7 + src = fetchCrate { 8 + pname = "rust-code-analysis-cli"; 9 + inherit version; 10 + hash = "sha256-/Irmtsy1PdRWQ7dTAHLZJ9M0J7oi2IiJyW6HeTIDOCs="; 12 11 }; 13 12 14 - cargoSha256 = "sha256-++d/czDJVGzY8GvBpBKpP0Rum4J4RpT95S81IRUWY2M="; 15 - 16 - cargoBuildFlags = [ "--workspace" ]; 13 + cargoHash = "sha256-axrtFZQOm1/UUBq1CDFkaZCks1mWoLWmfajDfsqSBmY="; 17 14 18 15 meta = with lib; { 19 16 description = "Analyze and collect metrics on source code";
+3 -3
pkgs/development/tools/rust/cargo-binstall/default.nix
··· 11 11 12 12 rustPlatform.buildRustPackage rec { 13 13 pname = "cargo-binstall"; 14 - version = "0.23.0"; 14 + version = "0.23.1"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "cargo-bins"; 18 18 repo = "cargo-binstall"; 19 19 rev = "v${version}"; 20 - hash = "sha256-PB7EZMJ9wXVneLTc8wiZVxeyE/XybuwUvcVkN6q04lo="; 20 + hash = "sha256-Dpo/J6FTW95rODWeIqD+8YnN4dt5yhLPxoezA1CTM4A="; 21 21 }; 22 22 23 - cargoHash = "sha256-SxQSzY31m3eTDO38jRpvzwmV9d6puIZ3DwBlC2Zb4b0="; 23 + cargoHash = "sha256-Nc/kdrLsAooM41pwlkZ3zWsLvFlnxHG/2ZQhPsEyPkI="; 24 24 25 25 nativeBuildInputs = [ 26 26 pkg-config
+4 -3
pkgs/development/tools/rust/cargo-show-asm/default.nix
··· 9 9 10 10 rustPlatform.buildRustPackage rec { 11 11 pname = "cargo-asm"; 12 - version = "0.2.0"; 12 + version = "0.2.18"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "pacak"; 16 16 repo = "cargo-show-asm"; 17 17 rev = version; 18 - hash = "sha256-qsr28zuvu+i7P/MpwhDKQFFXTyFFo+vWrjBrpD1V8PY="; 18 + hash = "sha256-K7hWXRS6bb9XZxIgZQeu22Gtt3WmXI63Xd97Unm6mHs="; 19 19 }; 20 20 21 - cargoHash = "sha256-IL+BB08uZr5fm05ITxpm66jTb+pYYlLKOwQ8uf5rKSs="; 21 + cargoHash = "sha256-PJ5v8uuRZZV2jcVS+a8/CAABekdsB+nvSJWI4cUHq0A="; 22 22 23 23 nativeBuildInputs = [ 24 24 installShellFiles ··· 43 43 homepage = "https://github.com/pacak/cargo-show-asm"; 44 44 license = with licenses; [ asl20 mit ]; 45 45 maintainers = with maintainers; [ figsoda oxalica ]; 46 + mainProgram = "cargo-asm"; 46 47 }; 47 48 }
+2 -3
pkgs/development/tools/rust/cargo-spellcheck/default.nix
··· 1 1 { lib 2 2 , rustPlatform 3 3 , fetchFromGitHub 4 - , libclang 5 4 , stdenv 6 5 , Security 7 6 }: ··· 19 18 20 19 cargoSha256 = "sha256-hYCDpSKi7HlqwdnMnfnKw46VpO+bhsV11kIu/4yMaBw="; 21 20 22 - buildInputs = lib.optional stdenv.isDarwin Security; 21 + nativeBuildInputs = [ rustPlatform.bindgenHook ]; 23 22 24 - LIBCLANG_PATH = "${libclang.lib}/lib"; 23 + buildInputs = lib.optional stdenv.isDarwin Security; 25 24 26 25 preCheck = "HOME=$(mktemp -d)"; 27 26
+3 -3
pkgs/development/tools/rust/cargo-zigbuild/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "cargo-zigbuild"; 5 - version = "0.16.9"; 5 + version = "0.16.10"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "messense"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-AimdMEdqNbcNE47mHb4KOYQBtZqtpxFDHCnMbheynFU="; 11 + sha256 = "sha256-d7RA6sOM5zHAhM51pBc0ahblVaT/+fzLUPtbGcxIqfA="; 12 12 }; 13 13 14 - cargoSha256 = "sha256-k403T+31dwjEkdXEvAiwrguSUBksXGZz+pCu2BiJbsQ="; 14 + cargoSha256 = "sha256-Frs4BvD562RUSwyjlmJIihqFTtPjYTdpUlDGXKkg/9U="; 15 15 16 16 nativeBuildInputs = [ makeWrapper ]; 17 17
+3 -3
pkgs/development/tools/sentry-cli/default.nix
··· 9 9 }: 10 10 rustPlatform.buildRustPackage rec { 11 11 pname = "sentry-cli"; 12 - version = "2.18.0"; 12 + version = "2.18.1"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "getsentry"; 16 16 repo = "sentry-cli"; 17 17 rev = version; 18 - sha256 = "sha256-ZHhx31V67cZEusbOKFfgNWxXlriS9brlExYG6Z3JjlE="; 18 + sha256 = "sha256-RIZLXJIc5a8jgJ2snos6AOqnWmbiKiRlFomvsKg/9rw="; 19 19 }; 20 20 doCheck = false; 21 21 ··· 25 25 buildInputs = [ openssl ] ++ lib.optionals stdenv.isDarwin [ Security SystemConfiguration ]; 26 26 nativeBuildInputs = [ pkg-config ]; 27 27 28 - cargoHash = "sha256-ovRdso1ke4e4rQijORxMixSDdjns6tEIK+SLjLv+AV4="; 28 + cargoHash = "sha256-b4WKszoxBlm0fZzK4YkwwY3+Jff8mXxxoyqwepg1MLo="; 29 29 30 30 meta = with lib; { 31 31 homepage = "https://docs.sentry.io/cli/";
+3 -3
pkgs/development/tools/supabase-cli/default.nix
··· 9 9 10 10 buildGoModule rec { 11 11 pname = "supabase-cli"; 12 - version = "1.63.1"; 12 + version = "1.64.2"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "supabase"; 16 16 repo = "cli"; 17 17 rev = "v${version}"; 18 - sha256 = "sha256-wFWILST5PYvs1bXWK44yiRWVidwZcczLVdtEI418+F8="; 18 + sha256 = "sha256-xqH4twh65nOcB+IqqYjGRdbCYC7MZjAVKeIJARGTG3U="; 19 19 }; 20 20 21 - vendorSha256 = "sha256-fRocOWnjYocTUXnTOvzTosdgKlQGfgyPLVN7FVGnW2o="; 21 + vendorSha256 = "sha256-sQ4lJKQaSUWlet3dEnD8bKLYtkEtdnLuGHVfqCTdFyg="; 22 22 23 23 ldflags = [ 24 24 "-s"
-43
pkgs/development/tools/uniffi-bindgen/default.nix
··· 1 - { lib 2 - , rustPlatform 3 - , fetchCrate 4 - , makeWrapper 5 - , ktlint 6 - , yapf 7 - , rubocop 8 - , rustfmt 9 - , nix-update-script 10 - }: 11 - 12 - rustPlatform.buildRustPackage rec { 13 - pname = "uniffi-bindgen"; 14 - version = "0.22.0"; 15 - 16 - src = fetchCrate { 17 - inherit pname version; 18 - sha256 = "sha256-cUJsfAlzdoGMeFcdXwdPU0JcruneY60pssJPkJtb5gs="; 19 - }; 20 - 21 - cargoSha256 = "sha256-k5uIR5rO4T1Xsu50vdLxCgSsVkNcxXHT4MitnMZkY6g="; 22 - 23 - nativeBuildInputs = [ makeWrapper ]; 24 - 25 - checkFlags = [ 26 - # this test assumes it is run from the repository 27 - "--skip=test::test_guessing_of_crate_root_directory_from_udl_file" 28 - ]; 29 - 30 - postFixup = '' 31 - wrapProgram "$out/bin/uniffi-bindgen" \ 32 - --suffix PATH : ${lib.strings.makeBinPath [ ktlint yapf rubocop rustfmt ] } 33 - ''; 34 - 35 - passthru.updateScript = nix-update-script { }; 36 - 37 - meta = with lib; { 38 - description = "Toolkit for building cross-platform software components in Rust"; 39 - homepage = "https://mozilla.github.io/uniffi-rs/"; 40 - license = licenses.mpl20; 41 - maintainers = with maintainers; [ figsoda vtuan10 ]; 42 - }; 43 - }
+2 -2
pkgs/games/unciv/default.nix
··· 25 25 in 26 26 stdenv.mkDerivation rec { 27 27 pname = "unciv"; 28 - version = "4.6.13"; 28 + version = "4.6.14-patch1"; 29 29 30 30 src = fetchurl { 31 31 url = "https://github.com/yairm210/Unciv/releases/download/${version}/Unciv.jar"; 32 - hash = "sha256-CNtaaMvBXJ6Fl5FJIWva5nAs/zniPA2rcfcf+RegymY="; 32 + hash = "sha256-CVwME8lvRjJ0ugps0lcO8FRk8AsFYs8w0oGNAB9TCnM="; 33 33 }; 34 34 35 35 dontUnpack = true;
+2 -2
pkgs/os-specific/linux/powerstat/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "powerstat"; 5 - version = "0.03.01"; 5 + version = "0.03.03"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "ColinIanKing"; 9 9 repo = pname; 10 10 rev = "V${version}"; 11 - hash = "sha256-+3b6yH5CuFdtjjTmW2mwuvNyhO8/8N7vv6st+ttztBQ="; 11 + hash = "sha256-D8VwczXHUHQ8p03IgYW3t8hOIGHKp0n1c7FpAUWua74="; 12 12 }; 13 13 14 14 installFlags = [
+4 -4
pkgs/os-specific/linux/rtl8821cu/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "rtl8821cu"; 5 - version = "${kernel.version}-unstable-2022-12-07"; 5 + version = "${kernel.version}-unstable-2023-04-28"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "morrownr"; 9 - repo = "8821cu-20210118"; 10 - rev = "7b8c45a270454f05e2dbf3beeb4afcf817db65da"; 11 - hash = "sha256-Dg+At0iHvi4pl8umhQyml1bODhkeK8YWYpEckqqzNcQ="; 9 + repo = "8821cu-20210916"; 10 + rev = "e49409f22ceea0d5b5ef431e6170580028b84c9d"; 11 + hash = "sha256-mElZRr4RkRFiraBM8BxT8yesYgvDaj6xP+9T3P+0Ns4="; 12 12 }; 13 13 14 14 hardeningDisable = [ "pic" ];
+1 -5
pkgs/os-specific/linux/system76-scheduler/default.nix
··· 1 1 { lib 2 2 , fetchFromGitHub 3 3 , rustPlatform 4 - , llvm 5 - , clang 6 - , libclang 7 4 , pipewire 8 5 , pkg-config 9 6 , bcc ··· 22 19 }; 23 20 cargoSha256 = "sha256-hpFDAhOzm4v3lBWwAl/10pS5xvKCScdKsp5wpCeQ+FE="; 24 21 25 - nativeBuildInputs = [ pkg-config llvm clang ]; 22 + nativeBuildInputs = [ pkg-config rustPlatform.bindgenHook ]; 26 23 buildInputs = [ dbus pipewire ]; 27 24 28 - LIBCLANG_PATH = "${libclang.lib}/lib"; 29 25 EXECSNOOP_PATH = "${bcc}/bin/execsnoop"; 30 26 31 27 # tests don't build
+2 -3
pkgs/servers/etcd/3.3.nix
··· 1 - { lib, buildGoPackage, fetchFromGitHub, nixosTests, stdenv }: 1 + { lib, buildGoPackage, fetchFromGitHub, stdenv }: 2 2 3 3 buildGoPackage rec { 4 4 pname = "etcd"; ··· 24 24 install -Dm755 bin/* bin/functional/cmd/* -t $out/bin 25 25 ''; 26 26 27 - passthru.tests = { inherit (nixosTests) etcd etcd-cluster; }; 28 - 29 27 meta = with lib; { 30 28 description = "Distributed reliable key-value store for the most critical data of a distributed system"; 31 29 license = licenses.asl20; 32 30 homepage = "https://etcd.io/"; 33 31 maintainers = with maintainers; [ offline zowoq ]; 34 32 broken = stdenv.isDarwin; # outdated golang.org/x/sys 33 + knownVulnerabilities = [ "CVE-2023-32082" ]; 35 34 }; 36 35 }
+5 -2
pkgs/servers/etcd/3.5.nix
··· 1 - { lib, buildGoModule, fetchFromGitHub, symlinkJoin }: 1 + { lib, buildGoModule, fetchFromGitHub, symlinkJoin, nixosTests }: 2 2 3 3 let 4 4 version = "3.5.9"; ··· 65 65 66 66 inherit meta version; 67 67 68 - passthru = { inherit etcdserver etcdutl etcdctl; }; 68 + passthru = { 69 + inherit etcdserver etcdutl etcdctl; 70 + tests = { inherit (nixosTests) etcd etcd-cluster; }; 71 + }; 69 72 70 73 paths = [ 71 74 etcdserver
+1 -1
pkgs/servers/http/nginx/generic.nix
··· 178 178 passthru = { 179 179 inherit modules; 180 180 tests = { 181 - inherit (nixosTests) nginx nginx-auth nginx-etag nginx-globalredirect nginx-http3 nginx-pubhtml nginx-sandbox nginx-sso; 181 + inherit (nixosTests) nginx nginx-auth nginx-etag nginx-globalredirect nginx-http3 nginx-pubhtml nginx-sandbox nginx-sso nginx-proxyprotocol; 182 182 variants = lib.recurseIntoAttrs nixosTests.nginx-variants; 183 183 acme-integration = nixosTests.acme; 184 184 } // passthru.tests;
+3 -3
pkgs/servers/mediamtx/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "mediamtx"; 8 - version = "0.23.0"; 8 + version = "0.23.3"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "aler9"; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - hash = "sha256-wqTES0E8HMBxMAmOiewSne1p9/ZI/Ikf1cr34lTqjwI="; 14 + hash = "sha256-z9fqR2iK7HOpWNFnrIkNzy0peY6v9QLOyUYbVXp1aNU="; 15 15 }; 16 16 17 - vendorHash = "sha256-C7j5jvRB4/GS0A05YZX8u62xvjevcKHpJFxuhzUX1+M="; 17 + vendorHash = "sha256-az2jHhd3YzI7phRRXBWRcAsISgipPN20SRncsfu58fM="; 18 18 19 19 # Tests need docker 20 20 doCheck = false;
+2 -2
pkgs/servers/metabase/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "metabase"; 5 - version = "0.46.2"; 5 + version = "0.46.4"; 6 6 7 7 src = fetchurl { 8 8 url = "https://downloads.metabase.com/v${version}/metabase.jar"; 9 - hash = "sha256-FHI8QUZIPMhBNOd0RfdSKGkILaRlS4he8EVSrQxjD0s="; 9 + hash = "sha256-sWmX1k581t7Owjt2ksE0xno0q8sDW9WgSLmjjadf5QY="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ makeWrapper ];
+1 -1
pkgs/servers/mir/default.nix
··· 86 86 87 87 # Fix Xwayland default 88 88 substituteInPlace src/miral/x11_support.cpp \ 89 - --replace '/usr/bin/Xwayland' '${xwayland}/bin/Xwayland' 89 + --replace '/usr/bin/Xwayland' '${lib.getExe xwayland}' 90 90 91 91 # Fix paths for generating drm-formats 92 92 substituteInPlace src/platform/graphics/CMakeLists.txt \
+3 -1
pkgs/servers/monitoring/prometheus/default.nix
··· 120 120 moveToOutput bin/promtool $cli 121 121 ''; 122 122 123 - doCheck = !stdenv.isDarwin; # https://hydra.nixos.org/build/130673870/nixlog/1 123 + # https://hydra.nixos.org/build/130673870/nixlog/1 124 + # Test mock data uses 64 bit data without an explicit (u)int64 125 + doCheck = !(stdenv.isDarwin || stdenv.hostPlatform.parsed.cpu.bits < 64); 124 126 125 127 passthru.tests = { inherit (nixosTests) prometheus; }; 126 128
+3 -3
pkgs/servers/nats-server/default.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "nats-server"; 9 - version = "2.9.16"; 9 + version = "2.9.17"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "nats-io"; 13 13 repo = pname; 14 14 rev = "v${version}"; 15 - hash = "sha256-tkOhPa163hiuk2sbfhHL6JTD7do3rrDZTkLYvwuue+o="; 15 + hash = "sha256-tWCZq6OwcjVaeaL4CrxSPwGaCKNZ2eN5s3vOoU9oT1I="; 16 16 }; 17 17 18 - vendorHash = "sha256-OixJhKaPZ58L+eN/cZnsXUPuGhYhFxfMKtqiV/mWLak="; 18 + vendorHash = "sha256-Qn1FkZLo3EC7KX7ZsQLDu26fbMFiwvy7cjlsFlgMtmo="; 19 19 20 20 doCheck = false; 21 21
+2 -3
pkgs/servers/nosql/influxdb/default.nix
··· 1 - { lib, buildGoModule, fetchFromGitHub, stdenv, pkg-config, rustPlatform, llvmPackages, libiconv, fetchpatch, nixosTests }: 1 + { lib, buildGoModule, fetchFromGitHub, stdenv, pkg-config, rustPlatform, libiconv, fetchpatch, nixosTests }: 2 2 3 3 let 4 4 libflux_version = "0.170.1"; ··· 25 25 ]; 26 26 sourceRoot = "source/libflux"; 27 27 cargoSha256 = "sha256-kYiZ5ZRiFHRf1RQeeUGjIhnEkTvhNSZ0t4tidpRIDyk="; 28 - nativeBuildInputs = [ llvmPackages.libclang ]; 28 + nativeBuildInputs = [ rustPlatform.bindgenHook ]; 29 29 buildInputs = lib.optional stdenv.isDarwin libiconv; 30 - LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib"; 31 30 pkgcfg = '' 32 31 Name: flux 33 32 Version: ${libflux_version}
+1 -4
pkgs/servers/nosql/influxdb2/default.nix
··· 1 1 { buildGoModule 2 2 , fetchFromGitHub 3 3 , fetchurl 4 - , fetchpatch 5 4 , go-bindata 6 5 , lib 7 - , llvmPackages 8 6 , perl 9 7 , pkg-config 10 8 , rustPlatform ··· 43 41 }; 44 42 sourceRoot = "source/libflux"; 45 43 cargoSha256 = "sha256-9rPW0lgi3lXJARa1KXgSY8LVJsoFjppok5ODGlqYeYw="; 46 - nativeBuildInputs = [ llvmPackages.libclang ]; 44 + nativeBuildInputs = [ rustPlatform.bindgenHook ]; 47 45 buildInputs = lib.optional stdenv.isDarwin libiconv; 48 - LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib"; 49 46 pkgcfg = '' 50 47 Name: flux 51 48 Version: ${libflux_version}
+5 -4
pkgs/servers/nosql/surrealdb/default.nix
··· 4 4 , fetchFromGitHub 5 5 , pkg-config 6 6 , openssl 7 - , llvmPackages 8 7 , rocksdb 9 8 , testers 10 9 , surrealdb ··· 25 24 26 25 cargoSha256 = "sha256-eLJ+sxsK45pkgNUYrNuUOAqutwIjvEhGGjsvwGzfVKI="; 27 26 28 - LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib"; 27 + # error: linker `aarch64-linux-gnu-gcc` not found 28 + postPatch = '' 29 + rm .cargo/config.toml 30 + ''; 29 31 30 32 PROTOC = "${protobuf}/bin/protoc"; 31 33 PROTOC_INCLUDE = "${protobuf}/include"; ··· 35 37 36 38 nativeBuildInputs = [ 37 39 pkg-config 38 - # needed on top of LIBCLANG_PATH to compile rquickjs 39 - llvmPackages.clang 40 + rustPlatform.bindgenHook 40 41 ]; 41 42 42 43 buildInputs = [ openssl ]
+1 -7
pkgs/servers/search/sonic-server/default.nix
··· 1 1 { lib 2 2 , rustPlatform 3 - , llvmPackages 4 - , clang 5 3 , fetchFromGitHub 6 4 }: 7 5 ··· 21 19 doCheck = false; 22 20 23 21 nativeBuildInputs = [ 24 - llvmPackages.libclang 25 - llvmPackages.libcxxClang 26 - clang 22 + rustPlatform.bindgenHook 27 23 ]; 28 - LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib"; 29 - BINDGEN_EXTRA_CLANG_ARGS = "-isystem ${llvmPackages.libclang.lib}/lib/clang/${lib.getVersion clang}/include"; 30 24 31 25 postPatch = '' 32 26 substituteInPlace src/main.rs --replace "./config.cfg" "$out/etc/sonic/config.cfg"
+3
pkgs/servers/teleport/generic.nix
··· 160 160 license = licenses.asl20; 161 161 maintainers = with maintainers; [ arianvp justinas sigma tomberek freezeboy ]; 162 162 platforms = platforms.unix; 163 + # go-libfido2 is broken on platforms with less than 64-bit because it defines an array 164 + # which occupies more than 31 bits of address space. 165 + broken = stdenv.hostPlatform.parsed.cpu.bits < 64; 163 166 }; 164 167 }
+1
pkgs/servers/x11/xorg/xwayland.nix
··· 108 108 description = "An X server for interfacing X11 apps with the Wayland protocol"; 109 109 homepage = "https://wayland.freedesktop.org/xserver.html"; 110 110 license = licenses.mit; 111 + mainProgram = "Xwayland"; 111 112 maintainers = with maintainers; [ emantor ]; 112 113 platforms = platforms.linux; 113 114 };
+2 -2
pkgs/shells/zsh/zsh-autocomplete/default.nix
··· 2 2 3 3 stdenvNoCC.mkDerivation rec { 4 4 pname = "zsh-autocomplete"; 5 - version = "23.05.02"; 5 + version = "23.05.24"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "marlonrichert"; 9 9 repo = "zsh-autocomplete"; 10 10 rev = version; 11 - sha256 = "sha256-HVt7JGkNxg9Kb29x95mxq/vtQ1dBbNeQlb9lK2qTBSI="; 11 + sha256 = "sha256-/6V6IHwB5p0GT1u5SAiUa20LjFDSrMo731jFBq/bnpw="; 12 12 }; 13 13 14 14 strictDeps = true;
+2 -2
pkgs/shells/zsh/zsh-nix-shell/default.nix
··· 5 5 6 6 stdenv.mkDerivation rec { 7 7 pname = "zsh-nix-shell"; 8 - version = "0.6.0"; 8 + version = "0.7.0"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "chisui"; 12 12 repo = "zsh-nix-shell"; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-B0mdmIqefbm5H8wSG1h41c/J4shA186OyqvivmSK42Q="; 14 + sha256 = "sha256-oQpYKBt0gmOSBgay2HgbXiDoZo5FoUKwyHSlUrOAP5E="; 15 15 }; 16 16 17 17 strictDeps = true;
+7 -2
pkgs/tools/admin/lxd/default.nix
··· 28 28 , bash 29 29 , installShellFiles 30 30 , nixosTests 31 + , gitUpdater 31 32 }: 32 33 33 34 buildGoModule rec { 34 35 pname = "lxd"; 35 - version = "5.13"; 36 + version = "5.14"; 36 37 37 38 src = fetchurl { 38 39 urls = [ 39 40 "https://linuxcontainers.org/downloads/lxd/lxd-${version}.tar.gz" 40 41 "https://github.com/lxc/lxd/releases/download/lxd-${version}/lxd-${version}.tar.gz" 41 42 ]; 42 - hash = "sha256-kys8zfqhkpJqq4ICg6dOsoJEoxJ209GwdjGRrfrZ7j0="; 43 + hash = "sha256-EtVZ0g9LD6dWA70/E1Ad/RWJjbvrAzU2hF3n6CdTMBE="; 43 44 }; 44 45 45 46 vendorHash = null; ··· 98 99 99 100 passthru.tests.lxd = nixosTests.lxd; 100 101 passthru.tests.lxd-nftables = nixosTests.lxd-nftables; 102 + passthru.updateScript = gitUpdater { 103 + url = "https://github.com/lxc/lxd.git"; 104 + rev-prefix = "lxd-"; 105 + }; 101 106 102 107 meta = with lib; { 103 108 description = "Daemon based on liblxc offering a REST API to manage containers";
+2 -3
pkgs/tools/admin/procs/default.nix
··· 13 13 14 14 cargoHash = "sha256-B+LpUErsvtLYn+Xvq4KNBpLR9WYe38yMWHUNsd9jIs8="; 15 15 16 - nativeBuildInputs = [ installShellFiles ]; 17 - 18 - LIBCLANG_PATH = lib.optionals stdenv.isDarwin "${stdenv.cc.cc.lib}/lib/"; 16 + nativeBuildInputs = [ installShellFiles ] 17 + ++ lib.optionals stdenv.isDarwin [ rustPlatform.bindgenHook ]; 19 18 20 19 postInstall = '' 21 20 for shell in bash fish zsh; do
+2 -6
pkgs/tools/backup/rdedup/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, rustPlatform, pkg-config, openssl, libsodium 2 - , llvmPackages, clang, xz 2 + , xz 3 3 , Security }: 4 4 5 5 rustPlatform.buildRustPackage rec { ··· 15 15 16 16 cargoSha256 = "sha256-I6d3IyPBcUsrvlzF7W0hFM4hcXi4wWro9bCeP4eArHI="; 17 17 18 - nativeBuildInputs = [ pkg-config llvmPackages.libclang clang ]; 18 + nativeBuildInputs = [ pkg-config rustPlatform.bindgenHook ]; 19 19 buildInputs = [ openssl libsodium xz ] 20 20 ++ (lib.optional stdenv.isDarwin Security); 21 - 22 - configurePhase = '' 23 - export LIBCLANG_PATH="${llvmPackages.libclang.lib}/lib" 24 - ''; 25 21 26 22 meta = with lib; { 27 23 description = "Data deduplication with compression and public key encryption";
+3 -3
pkgs/tools/graphics/resvg/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "resvg"; 5 - version = "0.33.0"; 5 + version = "0.34.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "RazrFalcon"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - hash = "sha256-x2lsEYPv6FtARdRd5r+vvV+/S4uZkRXPhsoXmplgIAM="; 11 + hash = "sha256-S0HhaZ8zHcuMmo9mSJwmUXnDExMBsv176lrM9YmSEg8="; 12 12 }; 13 13 14 - cargoHash = "sha256-toUS1JAbJ8gbOsi87SXiqoaW0X7enAh4Iha3VeCa3WY="; 14 + cargoHash = "sha256-SFQ2w/Um1hgpy+cz+OZoaLjvJPcOa5Wc29v66pt+k3g="; 15 15 16 16 cargoBuildFlags = [ 17 17 "--package=resvg"
+25
pkgs/tools/misc/bkt/default.nix
··· 1 + { rustPlatform 2 + , fetchFromGitHub 3 + , lib 4 + }: rustPlatform.buildRustPackage rec { 5 + 6 + pname = "bkt"; 7 + version = "0.6.1"; 8 + 9 + src = fetchFromGitHub { 10 + owner = "dimo414"; 11 + repo = pname; 12 + rev = version; 13 + sha256 = "sha256-NgNXuTpI1EzgmxKRsqzxTOlQi75BHCcbjFnouhnfDDM="; 14 + }; 15 + 16 + cargoSha256 = "sha256-PvcKviyXtiHQCHgJLGR2Mr+mPpTd06eKWQ5h6eGdl40="; 17 + 18 + meta = { 19 + description = "A subprocess caching utility"; 20 + homepage = "https://github.com/dimo414/bkt"; 21 + license = lib.licenses.mit; 22 + maintainers = [ lib.maintainers.mangoiv ]; 23 + mainProgram = "bkt"; 24 + }; 25 + }
+4 -3
pkgs/tools/misc/coreboot-utils/default.nix
··· 54 54 intelmetool = generic { 55 55 pname = "intelmetool"; 56 56 meta.description = "Dump interesting things about Management Engine"; 57 - buildInputs = [ pciutils zlib ]; 58 57 meta.platforms = [ "x86_64-linux" "i686-linux" ]; 58 + buildInputs = [ pciutils zlib ]; 59 59 }; 60 60 cbfstool = generic { 61 61 pname = "cbfstool"; ··· 68 68 superiotool = generic { 69 69 pname = "superiotool"; 70 70 meta.description = "User-space utility to detect Super I/O of a mainboard and provide detailed information about the register contents of the Super I/O"; 71 + meta.platforms = [ "x86_64-linux" "i686-linux" ]; 71 72 buildInputs = [ pciutils zlib ]; 72 73 }; 73 74 ectool = generic { ··· 79 80 inteltool = generic { 80 81 pname = "inteltool"; 81 82 meta.description = "Provides information about Intel CPU/chipset hardware configuration (register contents, MSRs, etc)"; 82 - buildInputs = [ pciutils zlib ]; 83 83 meta.platforms = [ "x86_64-linux" "i686-linux" ]; 84 + buildInputs = [ pciutils zlib ]; 84 85 }; 85 86 amdfwtool = generic { 86 87 pname = "amdfwtool"; ··· 119 120 utils // { 120 121 coreboot-utils = (buildEnv { 121 122 name = "coreboot-utils-${version}"; 122 - paths = lib.attrValues utils; 123 + paths = lib.filter (lib.meta.availableOn stdenv.hostPlatform) (lib.attrValues utils); 123 124 postBuild = "rm -rf $out/sbin"; 124 125 }) // { 125 126 inherit version;
+11 -2
pkgs/tools/misc/fzf/default.nix
··· 10 10 , glibcLocales 11 11 , testers 12 12 , fzf 13 + , fetchpatch 13 14 }: 14 15 15 16 let ··· 24 25 in 25 26 buildGoModule rec { 26 27 pname = "fzf"; 27 - version = "0.41.0"; 28 + version = "0.41.1"; 28 29 29 30 src = fetchFromGitHub { 30 31 owner = "junegunn"; 31 32 repo = pname; 32 33 rev = version; 33 - hash = "sha256-NUaGuRfXtt/kY4u5uxM30Blg+ngkcvS2/2rcGP/WNtE="; 34 + hash = "sha256-YnWc+yStyoZoCKxEMhQC6Z4FZ/OVRaVsAJPtAzGiJVk="; 34 35 }; 36 + 37 + patches = [ 38 + (fetchpatch { 39 + name = "update-test-case.patch"; 40 + url = "https://github.com/junegunn/fzf/commit/448d7e0c5a717128d499f6a09a978b7addd1d925.patch"; 41 + hash = "sha256-54UYW8x78ZcjPwDWmGLVLxw2E910wme2TkBN7YAr1L8="; 42 + }) 43 + ]; 35 44 36 45 vendorHash = "sha256-O6OjBbrVAxDQd27ar2mmFkU1XyVM2C8SJWJ54rgaf2s="; 37 46
+3 -3
pkgs/tools/misc/grass-sass/default.nix
··· 5 5 6 6 rustPlatform.buildRustPackage rec { 7 7 pname = "grass"; 8 - version = "0.12.3"; 8 + version = "0.12.4"; 9 9 10 10 src = fetchCrate { 11 11 inherit pname version; 12 - hash = "sha256-qx63icK4g/5LqKUsJpXs2Jpv30RuvIeLF6JNrTTkcLs="; 12 + hash = "sha256-tp3L8TDIG/92RupRAyRWSiALqE1XBK8jespKcSdSzsM="; 13 13 }; 14 14 15 - cargoHash = "sha256-v2ikP+zujj6GWN1ZwPIKK0jtF8Na5PaR1ZNelGdLzMM="; 15 + cargoHash = "sha256-hxVcHD5k1YwXCOq1UdiivPLwtY2egGvf/T3NrZTAB/k="; 16 16 17 17 # tests require rust nightly 18 18 doCheck = false;
+3 -3
pkgs/tools/misc/killport/default.nix
··· 5 5 6 6 rustPlatform.buildRustPackage rec { 7 7 pname = "killport"; 8 - version = "0.8.0"; 8 + version = "0.9.0"; 9 9 10 10 src = fetchCrate { 11 11 inherit pname version; 12 - hash = "sha256-ip7Ndy4i4P6n20COfSL/EtG1Y+xoab8Gox4gcNHH1/o="; 12 + hash = "sha256-aGnjLgDn86OUFQGj7K7+DUSGJuNEIL52yXJz/Mt5DT0="; 13 13 }; 14 14 15 - cargoHash = "sha256-M4riyvGueCQDKOj+lgYPm2lZ8UjCp1y/SyG692vZbS4="; 15 + cargoHash = "sha256-Z3+hqssm5g7rl3XCnrmjuPhsG8E0Yc2Qg8/mjGlnaT4="; 16 16 17 17 nativeBuildInputs = [ rustPlatform.bindgenHook ]; 18 18
+3 -3
pkgs/tools/misc/opentelemetry-collector/contrib.nix
··· 8 8 9 9 buildGoModule rec { 10 10 pname = "opentelemetry-collector-contrib"; 11 - version = "0.77.0"; 11 + version = "0.78.0"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "open-telemetry"; 15 15 repo = "opentelemetry-collector-contrib"; 16 16 rev = "v${version}"; 17 - sha256 = "sha256-9OFNJgzMiTNRXuK4joPxnVfCI5mVGqgfKBGI1xpnhCY="; 17 + sha256 = "sha256-5oTXPQU1aT8Xm1bTjbnauBUqzBqBH+yBzC1tmLHA0v0="; 18 18 }; 19 19 # proxy vendor to avoid hash missmatches between linux and macOS 20 20 proxyVendor = true; 21 - vendorHash = "sha256-1an0PB2CV83DDWcw+1irT2gFLKuMkXYok5uglyyrprs="; 21 + vendorHash = "sha256-ABaRedZXPr2q2AmslVNIJUvONZa4tv7OkxBLR9GuBRE="; 22 22 23 23 # there is a nested go.mod 24 24 sourceRoot = "source/cmd/otelcontribcol";
+3 -3
pkgs/tools/misc/pipe-rename/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "pipe-rename"; 5 - version = "1.6.3"; 5 + version = "1.6.4"; 6 6 7 7 src = fetchCrate { 8 8 inherit pname version; 9 - hash = "sha256-vpSzyDswIIKVFEHwTvFvPq3SRoBePHSv4A31rlj4ymU="; 9 + hash = "sha256-LSkUZ90lS2QGF6f8sFvunuYpw8Cmx8s6JCCOJYo2j7g="; 10 10 }; 11 11 12 - cargoHash = "sha256-tlG2Vk1YJBZs2mX1/QqIyFqOsnaK9oa+PsYcmKISC4E="; 12 + cargoHash = "sha256-wvs1uYqm9kb4hp4tgOR3UZzW1rButEWQYpv0Ca9CXe0="; 13 13 14 14 nativeCheckInputs = [ python3 ]; 15 15
+2 -2
pkgs/tools/misc/plantuml-server/default.nix
··· 1 1 { lib, stdenv, fetchurl }: 2 2 3 3 let 4 - version = "1.2023.7"; 4 + version = "1.2023.8"; 5 5 in 6 6 stdenv.mkDerivation rec { 7 7 pname = "plantuml-server"; 8 8 inherit version; 9 9 src = fetchurl { 10 10 url = "https://github.com/plantuml/plantuml-server/releases/download/v${version}/plantuml-v${version}.war"; 11 - sha256 = "sha256-JsMO2aef9DTo94uQNJN4jdiT5vnBTE8XDc4TtTTixVk="; 11 + sha256 = "sha256-2rvYoDna9zV+KAsSNYsThWLyu0BTtFm5GMBTXB7DRkA="; 12 12 }; 13 13 14 14 dontUnpack = true;
+8 -6
pkgs/tools/misc/proximity-sort/default.nix
··· 1 - { lib, rustPlatform, fetchCrate }: 1 + { lib, rustPlatform, fetchFromGitHub }: 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "proximity-sort"; 5 - version = "1.2.0"; 5 + version = "1.3.0"; 6 6 7 - src = fetchCrate { 8 - inherit pname version; 9 - sha256 = "sha256-So3cvL2F7wfcPVPEBspMLH4f5KSbVQeUKLJve/BXLA4="; 7 + src = fetchFromGitHub { 8 + owner = "jonhoo"; 9 + repo = "proximity-sort"; 10 + rev = "v${version}"; 11 + hash = "sha256-MRLQvspv6kjirljhAkk1KT+hPA4hdjA1b7RL9eEyglQ="; 10 12 }; 11 13 12 - cargoSha256 = "sha256-VGxU3CD5pj0Hrt6nUbNU7eNEpNrzHp/WaFHAKPUz8DA="; 14 + cargoHash = "sha256-0hP6qa8d5CaqtBHCWBJ8UjtVJc6Z0GmL8DvdTWDMM8g="; 13 15 14 16 meta = with lib; { 15 17 description = "Simple command-line utility for sorting inputs by proximity to a path argument";
+2 -2
pkgs/tools/misc/rpm-ostree/default.nix
··· 40 40 41 41 stdenv.mkDerivation rec { 42 42 pname = "rpm-ostree"; 43 - version = "2023.3"; 43 + version = "2023.4"; 44 44 45 45 outputs = [ "out" "dev" "man" "devdoc" ]; 46 46 47 47 src = fetchurl { 48 48 url = "https://github.com/coreos/${pname}/releases/download/v${version}/${pname}-${version}.tar.xz"; 49 - hash = "sha256-qIkGQqU+6EbSKmHwjZe+A1XsIZVnBQyM28DN9GFP/qE="; 49 + hash = "sha256-xk06T4A451o5C5rquCvQEpGKCw8AcBVf49Lg8VD0GdE="; 50 50 }; 51 51 52 52 nativeBuildInputs = [
+3 -3
pkgs/tools/misc/shopware-cli/default.nix
··· 8 8 9 9 buildGoModule rec { 10 10 pname = "shopware-cli"; 11 - version = "0.1.71"; 11 + version = "0.1.73"; 12 12 src = fetchFromGitHub { 13 13 repo = "shopware-cli"; 14 14 owner = "FriendsOfShopware"; 15 15 rev = version; 16 - hash = "sha256-prn/22H2fVXJF/4YjrjyMoyD8JbhayXdPX06ea6VnFE="; 16 + hash = "sha256-yjWLWTM6ybrNUMTMHQ3oHXTEp8MGI/qH7Y+gft5RXY8="; 17 17 }; 18 18 19 19 nativeBuildInputs = [ installShellFiles makeWrapper ]; 20 20 21 - vendorSha256 = "sha256-yQM0nRbrKvopIl78YKIF7mc5jLQ/02vVKTzE+rO6/QU="; 21 + vendorHash = "sha256-eaD2vdiAmP2/cMtc1wN0qaMBRvrEckGBf0p5MI1T4gI="; 22 22 23 23 postInstall = '' 24 24 export HOME="$(mktemp -d)"
+2 -6
pkgs/tools/misc/tremor-rs/default.nix
··· 2 2 , rustPlatform 3 3 , pkg-config 4 4 , cmake 5 - , llvmPackages 6 5 , openssl 7 6 , fetchFromGitHub 8 7 , installShellFiles ··· 33 32 }; 34 33 }; 35 34 36 - nativeBuildInputs = [ cmake pkg-config installShellFiles ]; 35 + nativeBuildInputs = [ cmake pkg-config installShellFiles rustPlatform.bindgenHook ]; 37 36 38 37 buildInputs = [ openssl ] 39 38 ++ lib.optionals stdenv.hostPlatform.isDarwin [ Security libiconv ]; ··· 57 56 --zsh <($out/bin/tremor completions zsh) 58 57 ''; 59 58 60 - LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib"; 61 - 62 59 # OPENSSL_NO_VENDOR - If set, always find OpenSSL in the system, even if the vendored feature is enabled. 63 60 OPENSSL_NO_VENDOR = 1; 64 61 ··· 80 77 cargoBuildFlags = [ "-p tremor-cli" ]; 81 78 82 79 meta = with lib; { 83 - broken = stdenv.isDarwin; 80 + broken = stdenv.isDarwin && stdenv.isx86_64; 84 81 description = '' 85 82 Early stage event processing system for unstructured data with rich 86 83 support for structural pattern matching, filtering and transformation 87 84 ''; 88 85 homepage = "https://www.tremor.rs/"; 89 86 license = licenses.asl20; 90 - platforms = platforms.x86_64; 91 87 maintainers = with maintainers; [ humancalico happysalada ]; 92 88 }; 93 89 }
+1 -3
pkgs/tools/misc/tremor-rs/ls.nix
··· 1 1 { lib 2 2 , rustPlatform 3 3 , fetchFromGitHub 4 - , llvmPackages 5 4 }: 6 5 7 6 rustPlatform.buildRustPackage rec { ··· 15 14 sha256 = "sha256-odYhpb3FkbIF1dc2DSpz3Lg+r39lhDKml9KGmbqJAtA="; 16 15 }; 17 16 18 - LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib"; 17 + nativeBuildInputs = [ rustPlatform.bindgenHook ]; 19 18 20 19 cargoSha256 = "sha256-/RKwmslhMm30QxviVV7HthDHSmTmaGZn1hdt6bNF3d4="; 21 20 ··· 23 22 description = "Tremor Language Server (Trill)"; 24 23 homepage = "https://www.tremor.rs/docs/next/getting-started/tooling"; 25 24 license = licenses.asl20; 26 - platforms = platforms.x86_64; 27 25 maintainers = with maintainers; [ happysalada ]; 28 26 }; 29 27 }
+2 -5
pkgs/tools/misc/vector/default.nix
··· 1 1 { stdenv 2 2 , lib 3 3 , fetchFromGitHub 4 - , fetchpatch 5 4 , rustPlatform 6 5 , pkg-config 7 - , llvmPackages 8 6 , openssl 9 7 , protobuf 10 8 , rdkafka ··· 24 22 # TODO investigate adding "vrl-cli" and various "vendor-*" 25 23 # "disk-buffer" is using leveldb TODO: investigate how useful 26 24 # it would be, perhaps only for massive scale? 27 - , features ? ([ "api" "api-client" "enrichment-tables" "sinks" "sources" "transforms" "vrl-cli" ] 25 + , features ? ([ "api" "api-client" "enrichment-tables" "sinks" "sources" "sources-dnstap" "transforms" "vrl-cli" ] 28 26 # the second feature flag is passed to the rdkafka dependency 29 27 # building on linux fails without this feature flag (both x86_64 and AArch64) 30 28 ++ lib.optionals enableKafka [ "rdkafka?/gssapi-vendored" ] ··· 58 56 "tracing-0.2.0" = "sha256-YAxeEofFA43PX2hafh3RY+C81a2v6n1fGzYz2FycC3M="; 59 57 }; 60 58 }; 61 - nativeBuildInputs = [ pkg-config cmake perl git ]; 59 + nativeBuildInputs = [ pkg-config cmake perl git rustPlatform.bindgenHook ]; 62 60 buildInputs = [ oniguruma openssl protobuf rdkafka zstd ] 63 61 ++ lib.optionals stdenv.isDarwin [ Security libiconv coreutils CoreServices ]; 64 62 ··· 66 64 PROTOC = "${protobuf}/bin/protoc"; 67 65 PROTOC_INCLUDE = "${protobuf}/include"; 68 66 RUSTONIG_SYSTEM_LIBONIG = true; 69 - LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib"; 70 67 71 68 TZDIR = "${tzdata}/share/zoneinfo"; 72 69
+3 -3
pkgs/tools/misc/vtm/default.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "vtm"; 9 - version = "0.9.9i"; 9 + version = "0.9.9k"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "netxs-group"; 13 13 repo = "vtm"; 14 14 rev = "v${version}"; 15 - sha256 = "sha256-pkso0Bpb+0Zua3MIXXEbaJDl/oENa51157mXTJXJC/A="; 15 + sha256 = "sha256-vmgjonMjhVEfsujWUuX+50NPAzgIfJADp8qjnDmfV1E="; 16 16 }; 17 17 18 18 nativeBuildInputs = [ cmake ]; ··· 23 23 description = "Terminal multiplexer with window manager and session sharing"; 24 24 homepage = "https://vtm.netxs.online/"; 25 25 license = licenses.mit; 26 - platforms = [ "x86_64-linux" ]; 26 + platforms = platforms.all; 27 27 maintainers = with maintainers; [ ahuzik ]; 28 28 }; 29 29 }
+2 -2
pkgs/tools/networking/easyrsa/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "easyrsa"; 5 - version = "3.1.2"; 5 + version = "3.1.4"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "OpenVPN"; 9 9 repo = "easy-rsa"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-nZjEBAJnho2Qis5uzQs1sVZVFHHSgJVa5aJS+dAfFCg="; 11 + sha256 = "sha256-2UIeHc5I6cvuD9DAFxwFbWOKNjV1StIBItxARohe0qk="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/tools/networking/grpc_cli/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "grpc_cli"; 5 - version = "1.54.1"; 5 + version = "1.55.0"; 6 6 src = fetchFromGitHub { 7 7 owner = "grpc"; 8 8 repo = "grpc"; 9 9 rev = "v${version}"; 10 - hash = "sha256-svQxWHCoDHYZSvSrzUuwO0+6WMtgKsu+uVDV1mP/nL4="; 10 + hash = "sha256-xEfYNqtMKeJpztUm39PaUrE8OKa8TQhtLBny2/D99VM="; 11 11 fetchSubmodules = true; 12 12 }; 13 13 nativeBuildInputs = [ automake cmake autoconf ];
+2 -2
pkgs/tools/networking/lldpd/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "lldpd"; 7 - version = "1.0.16"; 7 + version = "1.0.17"; 8 8 9 9 src = fetchurl { 10 10 url = "https://media.luffy.cx/files/lldpd/${pname}-${version}.tar.gz"; 11 - sha256 = "sha256-47ORZQx7pnzqL+hNZ/201/yKoexc+G64u5hHEd+EZak="; 11 + sha256 = "sha256-k0MXfxRdK8pm7wPVlSgHnT8WY8YkseK50IJo79xhJ84="; 12 12 }; 13 13 14 14 configureFlags = [
+3 -3
pkgs/tools/security/cnspec/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "cnspec"; 8 - version = "8.10.0"; 8 + version = "8.11.0"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "mondoohq"; 12 12 repo = "cnspec"; 13 13 rev = "refs/tags/v${version}"; 14 - hash = "sha256-xgDHpLnbTAC0OL7Z5JQsOWlarIHqvr7xrDBg6hlWRRw="; 14 + hash = "sha256-ypDosK+vA7EEQsfZh9PUZrXY0uO+mPI1GC6RS80gP1o="; 15 15 }; 16 16 17 17 proxyVendor = true; 18 - vendorHash = "sha256-LlLnkJc+bIRG1s6AHBYL6r5guYXPDo0moQwMSmHX3Zg="; 18 + vendorHash = "sha256-Iyi1OoJEHHeCS+W922e+3o+pru/UhTUWwkkY2nurRGY="; 19 19 20 20 subPackages = [ 21 21 "apps/cnspec"
+5
pkgs/tools/security/pinentry/mac.nix
··· 32 32 chmod -R u+w macosx/*.nib 33 33 ''; 34 34 35 + # Unfortunately, PlistBuddy from xcbuild is not compatible enough pinentry-mac’s build process. 36 + sandboxProfile = '' 37 + (allow process-exec (literal "/usr/libexec/PlistBuddy")) 38 + ''; 39 + 35 40 nativeBuildInputs = [ autoreconfHook texinfo ]; 36 41 buildInputs = [ libassuan libgpg-error libiconv Cocoa ]; 37 42
+3 -3
pkgs/tools/system/automatic-timezoned/default.nix
··· 5 5 6 6 rustPlatform.buildRustPackage rec { 7 7 pname = "automatic-timezoned"; 8 - version = "1.0.91"; 8 + version = "1.0.92"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "maxbrunet"; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-kXpOJPlsfmpTAUkgNsFb7OZWCAok7i/ku+3u2XHwQV8="; 14 + sha256 = "sha256-4axtrwCmtc33pInOsb1W3VIfXmUP59j0mFByCl//1z0="; 15 15 }; 16 16 17 - cargoHash = "sha256-5XGrFgv9XLEQGfzkUpg7o6Czb4Ha/45nNZ9OCkZAmzo="; 17 + cargoHash = "sha256-V/6SaSk10LLuyPuf3fnyqF2rQlZwG9FRGcQ+3Ao4xQs="; 18 18 19 19 meta = with lib; { 20 20 description = "Automatically update system timezone based on location";
+2 -2
pkgs/tools/system/fio/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "fio"; 7 - version = "3.34"; 7 + version = "3.35"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "axboe"; 11 11 repo = "fio"; 12 12 rev = "fio-${version}"; 13 - sha256 = "sha256-+csIerzwYOmXfmykYI0DHzbJf4iUCkEy1f7SFmAiuv4="; 13 + sha256 = "sha256-8LMpgayxBebHb0MXYmjlqqtndSiL42/yEQpgamxt9kI="; 14 14 }; 15 15 16 16 buildInputs = [ python3 zlib ]
+3 -3
pkgs/tools/system/netdata/go.d.plugin.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "netdata-go-plugins"; 5 - version = "0.52.2"; 5 + version = "0.53.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "netdata"; 9 9 repo = "go.d.plugin"; 10 10 rev = "v${version}"; 11 - hash = "sha256-/oDUB6EGRq26cRdHwkuTgCRZ+XtNy238TnOYMX1H22s="; 11 + hash = "sha256-FHcETEAQArzNyvlzEaOYzwtXk6jPA2b6Kp8pI7FeTo8="; 12 12 }; 13 13 14 - vendorHash = "sha256-hxsLCiti/IiTjYPKm/9fWk3CNzDM1+gRgncFXgB/whk="; 14 + vendorHash = "sha256-8JpeP2p09j45dkuQMtBj1j0C5CjNMshofHFVnvZvNQY="; 15 15 16 16 doCheck = false; 17 17
+2 -2
pkgs/tools/text/frogmouth/default.nix
··· 5 5 6 6 python3.pkgs.buildPythonApplication rec { 7 7 pname = "frogmouth"; 8 - version = "0.5.0"; 8 + version = "0.6.0"; 9 9 format = "pyproject"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "Textualize"; 13 13 repo = "frogmouth"; 14 14 rev = "v${version}"; 15 - hash = "sha256-5MNQ78zwjtenHDjy2g1rjiq4HvFie7uUSlMwZu6RmXg="; 15 + hash = "sha256-BgJdcdIgYNZUJLWDgUWIDyiSSAkLdePYus3IYQo/QpY="; 16 16 }; 17 17 18 18 nativeBuildInputs = [
+56
pkgs/tools/text/languagetool-rust/default.nix
··· 1 + { lib 2 + , stdenv 3 + , fetchFromGitHub 4 + , rustPlatform 5 + , installShellFiles 6 + , pkg-config 7 + , openssl 8 + , Security 9 + }: 10 + 11 + rustPlatform.buildRustPackage rec { 12 + pname = "languagetool-rust"; 13 + version = "2.1.1"; 14 + 15 + src = fetchFromGitHub { 16 + owner = "jeertmans"; 17 + repo = pname; 18 + rev = "v${version}"; 19 + hash = "sha256-tgx1LcVAlBcgYAdtn4n5TiLzinmOImLoatGowUFHpUM="; 20 + }; 21 + 22 + cargoHash = "sha256-8Q+Li4wLkS9/HlSdtfOFnojtUBojO3oUpNHkyOu5clA="; 23 + 24 + buildFeatures = [ "full" ]; 25 + 26 + nativeBuildInputs = [ installShellFiles pkg-config ]; 27 + buildInputs = [ openssl ] ++ lib.optionals stdenv.isDarwin [ Security ]; 28 + 29 + checkFlags = [ 30 + # requires network access 31 + "--skip=server::tests::test_server_check_data" 32 + "--skip=server::tests::test_server_check_text" 33 + "--skip=server::tests::test_server_languages" 34 + "--skip=server::tests::test_server_ping" 35 + "--skip=test_match_positions_1" 36 + "--skip=test_match_positions_2" 37 + "--skip=test_match_positions_3" 38 + "--skip=test_match_positions_4" 39 + "--skip=src/lib/lib.rs" 40 + ]; 41 + 42 + postInstall = '' 43 + installShellCompletion --cmd ltrs \ 44 + --bash <($out/bin/ltrs completions bash) \ 45 + --fish <($out/bin/ltrs completions fish) \ 46 + --zsh <($out/bin/ltrs completions zsh) 47 + ''; 48 + 49 + meta = with lib; { 50 + description = "LanguageTool API in Rust"; 51 + homepage = "https://github.com/jeertmans/languagetool-rust"; 52 + license = licenses.mit; 53 + maintainers = with maintainers; [ name-snrl ]; 54 + mainProgram = "ltrs"; 55 + }; 56 + }
+4 -7
pkgs/tools/text/mdbook-katex/default.nix
··· 1 - { lib, stdenv, fetchCrate, rustPlatform, openssl, CoreServices }: 1 + { lib, rustPlatform, fetchCrate, stdenv, CoreServices }: 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "mdbook-katex"; 5 - version = "0.4.2"; 5 + version = "0.5.1"; 6 6 7 7 src = fetchCrate { 8 8 inherit pname version; 9 - hash = "sha256-aEtmHihncs+Z+VRtUVsiRLK72bDWJQNjy/Q5xBvM1d0="; 9 + hash = "sha256-RDNZ6+d+UbiQ/Eb2+YbhPyGVcM8079UFsnNvch/1oAs="; 10 10 }; 11 11 12 - cargoHash = "sha256-L5bdR1khL3AHRNtFhy1GWRqMxdpNxrYGX3TELCUB4mQ="; 13 - 14 - OPENSSL_DIR = "${lib.getDev openssl}"; 15 - OPENSSL_LIB_DIR = "${lib.getLib openssl}/lib"; 12 + cargoHash = "sha256-An2mQ4kWGF3qk2v9VeQh700n7n/+3ShPqMfCnZmiIuc="; 16 13 17 14 buildInputs = lib.optionals stdenv.isDarwin [ CoreServices ]; 18 15
+4 -13
pkgs/tools/text/par/default.nix
··· 1 1 {lib, stdenv, fetchurl, fetchpatch}: 2 2 3 - stdenv.mkDerivation { 3 + stdenv.mkDerivation rec { 4 4 pname = "par"; 5 - version = "1.52"; 5 + version = "1.53.0"; 6 6 7 7 src = fetchurl { 8 - url = "http://www.nicemice.net/par/Par152.tar.gz"; 9 - sha256 = "33dcdae905f4b4267b4dc1f3efb032d79705ca8d2122e17efdecfd8162067082"; 8 + url = "http://www.nicemice.net/par/Par-${version}.tar.gz"; 9 + sha256 = "sha256-yAnGIOuCtYlVOsVLmJjI2lUZbSYjOdE8BG8r5ErEeAQ="; 10 10 }; 11 - 12 - patches = [ 13 - # A patch by Jérôme Pouiller that adds support for multibyte 14 - # charsets (like UTF-8), plus Debian packaging. 15 - (fetchpatch { 16 - url = "http://sysmic.org/dl/par/par-1.52-i18n.4.patch"; 17 - sha256 = "0alw44lf511jmr38jnh4j0mpp7vclgy0grkxzqf7q158vzdb6g23"; 18 - }) 19 - ]; 20 11 21 12 makefile = "protoMakefile"; 22 13 preBuild = ''
+1
pkgs/top-level/aliases.nix
··· 1690 1690 ufraw = throw "ufraw is unmaintained and has been removed from nixpkgs. Its successor, nufraw, doesn't seem to be stable enough. Consider using Darktable for now"; # Added 2020-01-11 1691 1691 ultrastardx-beta = throw "'ultrastardx-beta' has been renamed to/replaced by 'ultrastardx'"; # Converted to throw 2022-02-22 1692 1692 unicorn-emu = unicorn; # Added 2020-10-29 1693 + uniffi-bindgen = throw "uniffi-bindgen has been removed since upstream no longer provides a standalone package for the CLI"; 1693 1694 unifi-poller = unpoller; # Added 2022-11-24 1694 1695 unifiStable = unifi6; # Added 2020-12-28 1695 1696 unity3d = throw "'unity3d' is unmaintained, has seen no updates in years and depends on deprecated GTK2"; # Added 2022-06-16
+29 -15
pkgs/top-level/all-packages.nix
··· 2152 2152 2153 2153 legit = callPackage ../applications/version-management/legit { }; 2154 2154 2155 + legit-web = callPackage ../applications/version-management/legit-web { }; 2156 + 2155 2157 lucky-commit = callPackage ../applications/version-management/lucky-commit { 2156 2158 inherit (darwin.apple_sdk.frameworks) OpenCL; 2157 2159 }; ··· 2287 2289 flycast = callPackage ../applications/emulators/flycast { }; 2288 2290 2289 2291 flix = callPackage ../development/compilers/flix { }; 2292 + 2293 + fleng = callPackage ../development/compilers/fleng { }; 2290 2294 2291 2295 fsrx = callPackage ../tools/misc/fsrx { }; 2292 2296 ··· 3157 3161 inherit (nodePackages) concurrently; 3158 3162 3159 3163 bklk = callPackage ../applications/misc/bklk { }; 3164 + 3165 + bkt = callPackage ../tools/misc/bkt { }; 3160 3166 3161 3167 bkyml = callPackage ../tools/misc/bkyml { }; 3162 3168 ··· 4857 4863 4858 4864 fd = callPackage ../tools/misc/fd { }; 4859 4865 4866 + fdroidcl = pkgs.callPackage ../development/mobile/fdroidcl { }; 4867 + 4860 4868 fdroidserver = python3Packages.callPackage ../development/tools/fdroidserver { }; 4861 4869 4862 4870 fetch-scm = callPackage ../tools/misc/fetch-scm { }; ··· 5309 5317 5310 5318 languagetool = callPackage ../tools/text/languagetool { }; 5311 5319 5320 + languagetool-rust = callPackage ../tools/text/languagetool-rust { 5321 + inherit (darwin.apple_sdk.frameworks) Security; 5322 + }; 5323 + 5312 5324 ldtk = callPackage ../applications/editors/ldtk { }; 5313 5325 5314 5326 lepton = callPackage ../tools/graphics/lepton { }; ··· 6328 6340 u3-tool = callPackage ../tools/filesystems/u3-tool { }; 6329 6341 6330 6342 unifdef = callPackage ../development/tools/misc/unifdef { }; 6331 - 6332 - uniffi-bindgen = callPackage ../development/tools/uniffi-bindgen { }; 6333 6343 6334 6344 unify = with python3Packages; toPythonApplication unify; 6335 6345 ··· 13559 13569 SDL = SDL_sixel; 13560 13570 }; 13561 13571 13562 - vtm = callPackage ../tools/misc/vtm { }; 13572 + vtm = callPackage ../tools/misc/vtm { 13573 + stdenv = if stdenv.isDarwin then clang16Stdenv else stdenv; 13574 + }; 13563 13575 13564 13576 witness = callPackage ../tools/security/witness { }; 13565 13577 ··· 25308 25320 25309 25321 ergochat = callPackage ../servers/irc/ergochat { }; 25310 25322 25311 - etcd = etcd_3_3; 25323 + etcd = etcd_3_5; 25312 25324 etcd_3_3 = callPackage ../servers/etcd/3.3.nix { }; 25313 25325 etcd_3_4 = callPackage ../servers/etcd/3.4.nix { }; 25314 25326 etcd_3_5 = callPackage ../servers/etcd/3.5.nix { }; ··· 34268 34280 snd = darwin.apple_sdk_11_0.callPackage ../applications/audio/snd { 34269 34281 inherit (darwin.apple_sdk_11_0.frameworks) CoreServices CoreMIDI; 34270 34282 }; 34283 + 34284 + sharpsat-td = callPackage ../applications/science/logic/sharpsat-td { }; 34271 34285 34272 34286 shntool = callPackage ../applications/audio/shntool { }; 34273 34287 ··· 35206 35220 weechatScripts = recurseIntoAttrs (callPackage ../applications/networking/irc/weechat/scripts { }); 35207 35221 35208 35222 westonLite = weston.override { 35209 - pango = null; 35210 - freerdp = null; 35211 - libunwind = null; 35212 - vaapi = null; 35213 - libva = null; 35214 - libwebp = null; 35215 - xwayland = null; 35216 - pipewire = null; 35217 - buildDemo = false; 35218 - buildRemoting = false; 35223 + demoSupport = false; 35224 + hdrSupport = false; 35225 + pangoSupport = false; 35226 + pipewireSupport = false; 35227 + rdpSupport = false; 35228 + remotingSupport = false; 35229 + vaapiSupport = false; 35230 + vncSupport = false; 35231 + webpSupport = false; 35232 + xwaylandSupport = false; 35219 35233 }; 35220 35234 35221 35235 chatterino2 = libsForQt5.callPackage ../applications/networking/instant-messengers/chatterino2 { ··· 39558 39572 39559 39573 rauc = callPackage ../tools/misc/rauc { }; 39560 39574 39561 - rbspy = callPackage ../development/tools/rbspy { }; 39575 + rbspy = darwin.apple_sdk_11_0.callPackage ../development/tools/rbspy { }; 39562 39576 39563 39577 redprl = callPackage ../applications/science/logic/redprl { }; 39564 39578
+2 -2
pkgs/top-level/perl-packages.nix
··· 12593 12593 12594 12594 ImageExifTool = buildPerlPackage rec { 12595 12595 pname = "Image-ExifTool"; 12596 - version = "12.55"; 12596 + version = "12.62"; 12597 12597 12598 12598 src = fetchurl { 12599 12599 url = "https://exiftool.org/Image-ExifTool-${version}.tar.gz"; 12600 - hash = "sha256-CFgb16GnYPIKG0PLbTiSfm7FRdWZBtroXH32c5Ru6gg="; 12600 + hash = "sha256-SZCkbGm2VoiNfVcyuvQDnalkaI7d33ocLutRQEmZ7B0="; 12601 12601 }; 12602 12602 12603 12603 nativeBuildInputs = lib.optional stdenv.isDarwin shortenPerlShebang;
+2
pkgs/top-level/python-packages.nix
··· 12229 12229 12230 12230 torpy = callPackage ../development/python-modules/torpy { }; 12231 12231 12232 + torrent_parser = callPackage ../development/python-modules/torrent_parser { }; 12233 + 12232 12234 torrequest = callPackage ../development/python-modules/torrequest { }; 12233 12235 12234 12236 total-connect-client = callPackage ../development/python-modules/total-connect-client { };