nixpkgs mirror (for testing) github.com/NixOS/nixpkgs
nix
fork

Configure Feed

Select the types of activity you want to include in your feed.

Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
54795a56 17cbd6f8

+213 -120
+6
maintainers/maintainer-list.nix
··· 5896 5896 githubId = 22836301; 5897 5897 name = "Mateusz Mazur"; 5898 5898 }; 5899 + mbaeten = { 5900 + email = "mbaeten@users.noreply.github.com"; 5901 + github = "mbaeten"; 5902 + githubId = 2649304; 5903 + name = "M. Baeten"; 5904 + }; 5899 5905 mbakke = { 5900 5906 email = "mbakke@fastmail.com"; 5901 5907 github = "mbakke";
+1 -6
nixos/doc/manual/installation/installing-virtualbox-guest.xml
··· 83 83 VirtualBox settings (Machine / Settings / Shared Folders, then click on the 84 84 "Add" icon). Add the following to the 85 85 <literal>/etc/nixos/configuration.nix</literal> to auto-mount them. If you do 86 - not add <literal>"nofail"</literal>, the system will not boot properly. The 87 - same goes for disabling <literal>rngd</literal> which is normally used to get 88 - randomness but this does not work in virtual machines. 86 + not add <literal>"nofail"</literal>, the system will not boot properly. 89 87 </para> 90 88 91 89 <programlisting> 92 90 { config, pkgs, ...} : 93 91 { 94 - security.rngd.enable = false; // otherwise vm will not boot 95 - ... 96 - 97 92 fileSystems."/virtualboxshare" = { 98 93 fsType = "vboxsf"; 99 94 device = "nameofthesharedfolder";
+9
nixos/doc/manual/release-notes/rl-2105.xml
··· 509 509 <varname>services.flashpolicyd</varname> module. 510 510 </para> 511 511 </listitem> 512 + <listitem> 513 + <para> 514 + The <literal>security.rngd</literal> module has been removed. 515 + It was disabled by default in 20.09 as it was functionally redundant 516 + with krngd in the linux kernel. It is not necessary for any device that the kernel recognises 517 + as an hardware RNG, as it will automatically run the krngd task to periodically collect random 518 + data from the device and mix it into the kernel's RNG. 519 + </para> 520 + </listitem> 512 521 </itemizedlist> 513 522 </section> 514 523
-2
nixos/modules/config/swap.nix
··· 185 185 { description = "Initialisation of swap device ${sw.device}"; 186 186 wantedBy = [ "${realDevice'}.swap" ]; 187 187 before = [ "${realDevice'}.swap" ]; 188 - # If swap is encrypted, depending on rngd resolves a possible entropy starvation during boot 189 - after = mkIf (config.security.rngd.enable && sw.randomEncryption.enable) [ "rngd.service" ]; 190 188 path = [ pkgs.util-linux ] ++ optional sw.randomEncryption.enable pkgs.cryptsetup; 191 189 192 190 script =
+12 -52
nixos/modules/security/rngd.nix
··· 1 - { config, lib, pkgs, ... }: 2 - 3 - with lib; 4 - 1 + { lib, ... }: 5 2 let 6 - cfg = config.security.rngd; 3 + removed = k: lib.mkRemovedOptionModule [ "security" "rngd" k ]; 7 4 in 8 5 { 9 - options = { 10 - security.rngd = { 11 - enable = mkOption { 12 - type = types.bool; 13 - default = false; 14 - description = '' 15 - Whether to enable the rng daemon. Devices that the kernel recognises 16 - as entropy sources are handled automatically by krngd. 17 - ''; 18 - }; 19 - debug = mkOption { 20 - type = types.bool; 21 - default = false; 22 - description = "Whether to enable debug output (-d)."; 23 - }; 24 - }; 25 - }; 26 - 27 - config = mkIf cfg.enable { 28 - systemd.services.rngd = { 29 - bindsTo = [ "dev-random.device" ]; 30 - 31 - after = [ "dev-random.device" ]; 32 - 33 - # Clean shutdown without DefaultDependencies 34 - conflicts = [ "shutdown.target" ]; 35 - before = [ 36 - "sysinit.target" 37 - "shutdown.target" 38 - ]; 39 - 40 - description = "Hardware RNG Entropy Gatherer Daemon"; 41 - 42 - # rngd may have to start early to avoid entropy starvation during boot with encrypted swap 43 - unitConfig.DefaultDependencies = false; 44 - serviceConfig = { 45 - ExecStart = "${pkgs.rng-tools}/sbin/rngd -f" 46 - + optionalString cfg.debug " -d"; 47 - # PrivateTmp would introduce a circular dependency if /tmp is on tmpfs and swap is encrypted, 48 - # thus depending on rngd before swap, while swap depends on rngd to avoid entropy starvation. 49 - NoNewPrivileges = true; 50 - PrivateNetwork = true; 51 - ProtectSystem = "full"; 52 - ProtectHome = true; 53 - }; 54 - }; 55 - }; 6 + imports = [ 7 + (removed "enable" '' 8 + rngd is not necessary for any device that the kernel recognises 9 + as an hardware RNG, as it will automatically run the krngd task 10 + to periodically collect random data from the device and mix it 11 + into the kernel's RNG. 12 + '') 13 + (removed "debug" 14 + "The rngd module was removed, so its debug option does nothing.") 15 + ]; 56 16 }
-2
nixos/modules/virtualisation/hyperv-guest.nix
··· 40 40 41 41 environment.systemPackages = [ config.boot.kernelPackages.hyperv-daemons.bin ]; 42 42 43 - security.rngd.enable = false; 44 - 45 43 # enable hotadding cpu/memory 46 44 services.udev.packages = lib.singleton (pkgs.writeTextFile { 47 45 name = "hyperv-cpu-and-memory-hotadd-udev-rules";
+103
pkgs/applications/audio/pragha/default.nix
··· 1 + { lib 2 + , intltool 3 + , mkDerivation 4 + , installShellFiles 5 + , pkg-config 6 + , fetchFromGitHub 7 + , dbus-glib 8 + , desktop-file-utils 9 + , hicolor-icon-theme 10 + , pcre 11 + , qtbase 12 + , sqlite 13 + , taglib 14 + , zlib 15 + , gtk3 16 + , libpeas 17 + , libcddb 18 + , libcdio 19 + , gst_all_1, withGstPlugins ? true 20 + , glyr, withGlyr ? true 21 + , liblastfmSF, withLastfm ? true 22 + , libcdio-paranoia, withCD ? true 23 + , keybinder3, withKeybinder ? false 24 + , libnotify, withLibnotify ? false 25 + , libsoup, withLibsoup ? false 26 + , libgudev, withGudev ? false # experimental 27 + , libmtp, withMtp ? false # experimental 28 + , xfce, withXfce4ui ? false 29 + , totem-pl-parser, withTotemPlParser ? false 30 + # , grilo, withGrilo ? false 31 + # , rygel, withRygel ? true 32 + }: 33 + 34 + assert withGlyr -> withLastfm; 35 + assert withLastfm -> withCD; 36 + 37 + mkDerivation rec { 38 + pname = "pragha"; 39 + version = "1.3.4"; 40 + 41 + src = fetchFromGitHub { 42 + owner = "pragha-music-player"; 43 + repo = "pragha"; 44 + rev = "v${version}"; 45 + sha256 = "sha256:0n8gx8amg5l9g4w7s4agjf8mlmpgjydgzx3vryp9lzzs9xrd5vqh"; 46 + }; 47 + 48 + nativeBuildInputs = [ 49 + intltool 50 + pkg-config 51 + xfce.xfce4-dev-tools 52 + desktop-file-utils 53 + installShellFiles 54 + ]; 55 + 56 + buildInputs = with gst_all_1; [ 57 + dbus-glib 58 + gstreamer 59 + gst-plugins-base 60 + gtk3 61 + hicolor-icon-theme 62 + libpeas 63 + pcre 64 + qtbase 65 + sqlite 66 + taglib 67 + zlib 68 + ] 69 + ++ lib.optionals withGstPlugins [ gst-plugins-good gst-plugins-bad gst-plugins-ugly ] 70 + ++ lib.optionals withCD [ libcddb libcdio libcdio-paranoia ] 71 + ++ lib.optional withGudev libgudev 72 + ++ lib.optional withKeybinder keybinder3 73 + ++ lib.optional withLibnotify libnotify 74 + ++ lib.optional withLastfm liblastfmSF 75 + ++ lib.optional withGlyr glyr 76 + ++ lib.optional withLibsoup libsoup 77 + ++ lib.optional withMtp libmtp 78 + ++ lib.optional withXfce4ui xfce.libxfce4ui 79 + ++ lib.optional withTotemPlParser totem-pl-parser 80 + # ++ lib.optional withGrilo grilo 81 + # ++ lib.optional withRygel rygel 82 + ; 83 + 84 + CFLAGS = [ "-DHAVE_PARANOIA_NEW_INCLUDES" ]; 85 + 86 + NIX_CFLAGS_COMPILE = "-I${lib.getDev gst_all_1.gst-plugins-base}/include/gstreamer-1.0"; 87 + 88 + postInstall = '' 89 + qtWrapperArgs+=(--prefix GST_PLUGIN_SYSTEM_PATH_1_0 : "$GST_PLUGIN_SYSTEM_PATH_1_0") 90 + 91 + install -m 444 data/${pname}.desktop $out/share/applications 92 + install -d $out/share/pixmaps 93 + installManPage data/${pname}.1 94 + ''; 95 + 96 + meta = with lib; { 97 + description = "A lightweight GTK+ music manager - fork of Consonance Music Manager"; 98 + homepage = "https://pragha-music-player.github.io/"; 99 + license = licenses.gpl3Plus; 100 + maintainers = with maintainers; [ mbaeten ]; 101 + platforms = platforms.unix; 102 + }; 103 + }
+2 -2
pkgs/applications/misc/cointop/default.nix
··· 2 2 3 3 buildGoPackage rec { 4 4 pname = "cointop"; 5 - version = "1.6.0"; 5 + version = "1.6.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "miguelmota"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-P2LR42Qn5bBF5xcfCbxiGFBwkW/kAKVGiyED37OdZLo="; 11 + sha256 = "sha256-4Ae8lzaec7JeYfmeLleatUS/xQUjea7O4XJ9DOgJIMs="; 12 12 }; 13 13 14 14 goPackagePath = "github.com/miguelmota/cointop";
+10 -3
pkgs/applications/misc/rofi/wrapper.nix
··· 1 - { symlinkJoin, lib, rofi-unwrapped, makeWrapper, hicolor-icon-theme, theme ? null, plugins ? [] }: 1 + { symlinkJoin, lib, rofi-unwrapped, makeWrapper, wrapGAppsHook, gdk-pixbuf, hicolor-icon-theme, theme ? null, plugins ? [] }: 2 2 3 3 symlinkJoin { 4 4 name = "rofi-${rofi-unwrapped.version}"; ··· 7 7 rofi-unwrapped.out 8 8 ] ++ (lib.forEach plugins (p: p.out)); 9 9 10 - buildInputs = [ makeWrapper ]; 10 + nativeBuildInputs = [ makeWrapper wrapGAppsHook ]; 11 + buildInputs = [ gdk-pixbuf ]; 12 + 11 13 preferLocalBuild = true; 12 14 passthru.unwrapped = rofi-unwrapped; 15 + 16 + dontWrapGApps = true; 17 + 13 18 postBuild = '' 14 19 rm -rf $out/bin 15 20 mkdir $out/bin 16 21 ln -s ${rofi-unwrapped}/bin/* $out/bin 17 - 18 22 rm $out/bin/rofi 23 + 24 + gappsWrapperArgsHook 19 25 makeWrapper ${rofi-unwrapped}/bin/rofi $out/bin/rofi \ 26 + ''${gappsWrapperArgs[@]} \ 20 27 --prefix XDG_DATA_DIRS : ${hicolor-icon-theme}/share \ 21 28 ${lib.optionalString (plugins != []) ''--prefix XDG_DATA_DIRS : ${lib.concatStringsSep ":" (lib.forEach plugins (p: "${p.out}/share"))}''} \ 22 29 ${lib.optionalString (theme != null) ''--add-flags "-theme ${theme}"''} \
+11 -5
pkgs/applications/misc/swappy/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub 1 + { lib 2 + , stdenv 3 + , fetchFromGitHub 2 4 , meson 3 5 , ninja 4 6 , wayland ··· 11 9 , scdoc 12 10 , libnotify 13 11 , glib 12 + , wrapGAppsHook 13 + , hicolor-icon-theme 14 14 }: 15 15 16 16 stdenv.mkDerivation rec { 17 17 pname = "swappy"; 18 - version = "1.3.0"; 18 + version = "1.3.1"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "jtheoof"; 22 22 repo = pname; 23 23 rev = "v${version}"; 24 - sha256 = "1bm184fbzylymh4kr7n8gy9plsdxif8xahc1zmkgdg1a0kwgws2x"; 24 + sha256 = "12z643c7vzffhjsxaz1lak99i4nwm688pha0hh4pg69jf5wz5xx3"; 25 25 }; 26 26 27 - nativeBuildInputs = [ glib meson ninja pkg-config scdoc ]; 27 + nativeBuildInputs = [ glib meson ninja pkg-config scdoc wrapGAppsHook ]; 28 28 29 - buildInputs = [ cairo pango gtk libnotify wayland glib ]; 29 + buildInputs = [ 30 + cairo pango gtk libnotify wayland glib hicolor-icon-theme 31 + ]; 30 32 31 33 strictDeps = true; 32 34
+3 -3
pkgs/applications/networking/dnscontrol/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "dnscontrol"; 5 - version = "3.6.0"; 5 + version = "3.7.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "StackExchange"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-I1PaDHPocQuoSOyfnxDWwIR+7S9l/odX4SCeAae/jv8="; 11 + sha256 = "sha256-el94Iq7/+1FfGpqbhKEO6FGpaCxoueoc/+Se+WfT+G0="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-H0i5MoVX5O0CgHOvefDEyzBWvBZvJZUrC9xBq9CHgeE="; 14 + vendorSha256 = "sha256-MSHg1RWjbXm1pf6HTyJL4FcnLuacL9fO1F6zbouVkWg="; 15 15 16 16 subPackages = [ "." ]; 17 17
+2 -2
pkgs/applications/version-management/git-and-tools/git-cola/default.nix
··· 5 5 6 6 in buildPythonApplication rec { 7 7 pname = "git-cola"; 8 - version = "3.8"; 8 + version = "3.9"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "git-cola"; 12 12 repo = "git-cola"; 13 13 rev = "v${version}"; 14 - sha256 = "1qxv2k8lxcxpqx46ka7f042xk90xns5w9lc4009cxmsqvcdba03a"; 14 + sha256 = "11186pdgaw5p4iv10dqcnynf5pws2v9nhqqqca7z5b7m20fpfjl7"; 15 15 }; 16 16 17 17 buildInputs = [ git gettext ];
+1 -1
pkgs/development/libraries/libgcrypt/default.nix
··· 39 39 strictDeps = true; 40 40 41 41 configureFlags = [ "--with-libgpg-error-prefix=${libgpgerror.dev}" ] 42 - ++ lib.optional stdenv.hostPlatform.isMusl "--disable-asm"; 42 + ++ lib.optional (stdenv.hostPlatform.isMusl || (stdenv.hostPlatform.isDarwin && stdenv.hostPlatform.isAarch64)) "--disable-asm"; # for darwin see https://dev.gnupg.org/T5157 43 43 44 44 # Necessary to generate correct assembly when compiling for aarch32 on 45 45 # aarch64
+7 -16
pkgs/development/libraries/termbox/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, python3, wafHook, fetchpatch }: 1 + { lib, stdenv, fetchFromGitHub }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "termbox"; 5 - version = "1.1.2"; 5 + version = "1.1.4"; 6 6 src = fetchFromGitHub { 7 - owner = "nsf"; 7 + owner = "termbox"; 8 8 repo = "termbox"; 9 9 rev = "v${version}"; 10 - sha256 = "08yqxzb8fny8806p7x8a6f3phhlbfqdd7dhkv25calswj7w1ssvs"; 10 + sha256 = "075swv6ajx8m424dbmgbf6fs6nd5q004gjpvx48gkxmnf9spvykl"; 11 11 }; 12 12 13 - # patch which updates the `waf` version used to build 14 - # to make the package buildable on Python 3.7 15 - patches = [ 16 - (fetchpatch { 17 - url = "https://github.com/nsf/termbox/commit/6fe63ac3ad63dc2c3ac45b770541cc8b7a1d2db7.patch"; 18 - sha256 = "1s5747v51sdwvpsg6k9y1j60yn9f63qnylkgy8zrsifjzzd5fzl6"; 19 - }) 20 - ]; 21 - 22 - nativeBuildInputs = [ python3 wafHook ]; 13 + makeFlags = [ "prefix=${placeholder "out"}" ]; 23 14 24 15 meta = with lib; { 25 16 description = "Library for writing text-based user interfaces"; 26 17 license = licenses.mit; 27 - homepage = "https://github.com/nsf/termbox#readme"; 28 - downloadPage = "https://github.com/nsf/termbox/releases"; 18 + homepage = "https://github.com/termbox/termbox#readme"; 19 + downloadPage = "https://github.com/termbox/termbox/releases"; 29 20 maintainers = with maintainers; [ fgaz ]; 30 21 }; 31 22 }
+10 -3
pkgs/development/tools/ocaml/ocamlmod/default.nix
··· 1 1 { lib, stdenv, fetchurl, ocaml, findlib, ocamlbuild, ounit }: 2 2 3 + let 4 + # ounit is only available for OCaml >= 4.04 5 + doCheck = lib.versionAtLeast ocaml.version "4.04"; 6 + in 7 + 3 8 stdenv.mkDerivation { 4 9 pname = "ocamlmod"; 5 10 version = "0.0.9"; ··· 14 9 sha256 = "0cgp9qqrq7ayyhddrmqmq1affvfqcn722qiakjq4dkywvp67h4aa"; 15 10 }; 16 11 17 - buildInputs = [ ocaml findlib ocamlbuild ounit ]; 12 + buildInputs = [ ocaml findlib ocamlbuild ]; 18 13 19 - configurePhase = "ocaml setup.ml -configure --prefix $out --enable-tests"; 14 + configurePhase = "ocaml setup.ml -configure --prefix $out" 15 + + lib.optionalString doCheck " --enable-tests"; 20 16 buildPhase = "ocaml setup.ml -build"; 21 17 installPhase = "ocaml setup.ml -install"; 22 18 23 - doCheck = true; 19 + inherit doCheck; 20 + checkInputs = [ ounit ]; 24 21 25 22 checkPhase = "ocaml setup.ml -test"; 26 23
+3 -3
pkgs/development/tools/rust/cargo-deny/default.nix
··· 7 7 8 8 rustPlatform.buildRustPackage rec { 9 9 pname = "cargo-deny"; 10 - version = "0.8.5"; 10 + version = "0.8.7"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "EmbarkStudios"; 14 14 repo = pname; 15 15 rev = version; 16 - sha256 = "01czsnhlvs78fpx1kpi75386657jmlrqpsj4474nxmgcs75igncx"; 16 + sha256 = "sha256-LXc4PFJ1FbdF3yotqqOkhhe+MKGZ4sqJgxAvDml9GeA="; 17 17 }; 18 18 19 - cargoSha256 = "1d5vh6cifkvqxmbgc2z9259q8879fjw016z959hfivv38rragqbr"; 19 + cargoSha256 = "sha256-4FFyRhmMpzKmKrvU2bmGHWUnLAbTDU1bPv7RfhQfYeY="; 20 20 21 21 doCheck = false; 22 22
+3 -3
pkgs/development/tools/yq-go/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "yq-go"; 5 - version = "4.5.0"; 5 + version = "4.6.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "mikefarah"; 9 9 rev = "v${version}"; 10 10 repo = "yq"; 11 - sha256 = "sha256-ehr9mCUbwQQSLR0iYoiJ3Xvgu+7Ue9Xvru9kAUkPCuQ="; 11 + sha256 = "sha256-9D00I34pfoiI5cqXjsVLTT6XbFUYxgGit0ZuYeWSEyE="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-CUELy6ajaoVzomY5lMen24DFJke3IyFzqWYyF7sws5g="; 14 + vendorSha256 = "sha256-66ccHSKpl6yB/NVhZ1X0dv4wnGCJAMvZhpKu2vF+QT4="; 15 15 16 16 doCheck = false; 17 17
+2 -2
pkgs/os-specific/linux/kernel/linux-lqx.nix
··· 1 1 { lib, fetchFromGitHub, buildLinux, linux_zen, ... } @ args: 2 2 3 3 let 4 - version = "5.10.10"; 4 + version = "5.10.15"; 5 5 suffix = "lqx2"; 6 6 in 7 7 ··· 14 14 owner = "zen-kernel"; 15 15 repo = "zen-kernel"; 16 16 rev = "v${version}-${suffix}"; 17 - sha256 = "1cjgx9qjfkiaalqkcdmibsrq2frwd621rwcg6w05ms4w9lnwi3af"; 17 + sha256 = "11dgaqj1xr5hq6wxscrkln68dwqq4lakvfkr646x2yfynry1jqjk"; 18 18 }; 19 19 20 20 extraMeta = {
+3 -3
pkgs/os-specific/linux/kernel/linux-zen.nix
··· 1 1 { lib, fetchFromGitHub, buildLinux, ... } @ args: 2 2 3 3 let 4 - version = "5.10.10"; 5 - suffix = "zen1"; 4 + version = "5.10.15"; 5 + suffix = "zen2"; 6 6 in 7 7 8 8 buildLinux (args // { ··· 14 14 owner = "zen-kernel"; 15 15 repo = "zen-kernel"; 16 16 rev = "v${version}-${suffix}"; 17 - sha256 = "0jsi2q8k1w5zs5l6z1brm2mxpl9arv6n6linc8yj6xc75nydw6w4"; 17 + sha256 = "18qgh79hi1ph6x16sbvq36icv7c5bkdvh193wqjnbvwf0yph09as"; 18 18 }; 19 19 20 20 extraMeta = {
+10 -4
pkgs/tools/misc/bdf2psf/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "bdf2psf"; 5 - version = "1.200"; 5 + version = "1.201"; 6 6 7 7 src = fetchurl { 8 8 url = "mirror://debian/pool/main/c/console-setup/bdf2psf_${version}_all.deb"; 9 - sha256 = "07z686h2fv9b3446fcym0sfzxwgkm9cc4bd3zhpv6j8bdfadnjxw"; 9 + sha256 = "sha256-XVaROIxyNBBFoXf+K1mv4mW8wWozqMcs1cgaWj8L8Q0="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ dpkg ]; ··· 14 14 dontConfigure = true; 15 15 dontBuild = true; 16 16 17 - unpackPhase = "dpkg-deb -x $src ."; 17 + unpackPhase = '' 18 + runHook preUnpack 19 + dpkg-deb -x $src . 20 + runHook postUnpack 21 + ''; 18 22 installPhase = " 23 + runHook preInstall 19 24 substituteInPlace usr/bin/bdf2psf --replace /usr/bin/perl ${perl}/bin/perl 20 25 mv usr $out 26 + runHook postInstall 21 27 "; 22 28 23 29 meta = with lib; { ··· 32 26 longDescription = '' 33 27 Font converter to generate console fonts from BDF source fonts 34 28 ''; 35 - license = licenses.gpl2; 29 + license = licenses.gpl2Plus; 36 30 maintainers = with maintainers; [ rnhmjoj vrthra ]; 37 31 platforms = platforms.unix; 38 32 };
+7 -2
pkgs/tools/misc/powerline-go/default.nix
··· 1 - { lib, buildGoModule, fetchFromGitHub }: 1 + { lib 2 + , buildGoModule 3 + , fetchFromGitHub 4 + }: 2 5 3 6 buildGoModule rec { 4 7 pname = "powerline-go"; ··· 20 17 21 18 meta = with lib; { 22 19 description = "A Powerline like prompt for Bash, ZSH and Fish"; 23 - license = licenses.gpl3; 20 + homepage = "https://github.com/justjanne/powerline-go"; 21 + changelog = "https://github.com/justjanne/powerline-go/releases/tag/v${version}"; 22 + license = licenses.gpl3Plus; 24 23 platforms = platforms.unix; 25 24 maintainers = with maintainers; [ sifmelcara ]; 26 25 };
+3 -3
pkgs/tools/package-management/emplace/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "emplace"; 5 - version = "1.0.0"; 5 + version = "1.1.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "tversteeg"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-dDFc13IVD4f5UgiHXAcqRKoZEPTn/iBOogT3XfdstK0="; 11 + sha256 = "sha256-FO3N5Dyk87GzPEhQDX2QVDulw15BnpsljawY2RFy2Qk="; 12 12 }; 13 13 14 - cargoSha256 = "sha256-QsYOR7tk5cRCF0+xkpJ/F+Z3pjBPxTDFvA1gEi82AOQ="; 14 + cargoSha256 = "sha256-/XZ88ChOCLP5/pZ9UkAAWqO/jFUwbo5FJQ2GZip1gP4="; 15 15 16 16 meta = with lib; { 17 17 description = "Mirror installed software on multiple machines";
+3 -3
pkgs/tools/security/terrascan/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "terrascan"; 8 - version = "1.3.2"; 8 + version = "1.3.3"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "accurics"; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-RZFh9RVU8RwtLGIP7OWnf0yNsXfElqWSXieljqp8ahU="; 14 + sha256 = "sha256-mPd4HsWbPUNJTUNjQ5zQztoXZy2b9iLksdGKAjp0A58="; 15 15 }; 16 16 17 - vendorSha256 = "sha256-Ya/33ocPhY5OSnCEyULsOIHaxwb1yNEle3JEYo/7/Yk="; 17 + vendorSha256 = "sha256-eNQTJHqOCOTAPO+vil6rkV9bNWZIdXxGQPE4IpETFtA="; 18 18 19 19 # tests want to download a vulnerable Terraform project 20 20 doCheck = false;
+2
pkgs/top-level/all-packages.nix
··· 23814 23814 23815 23815 ncmpcpp = callPackage ../applications/audio/ncmpcpp { }; 23816 23816 23817 + pragha = libsForQt5.callPackage ../applications/audio/pragha { }; 23818 + 23817 23819 rofi-mpd = callPackage ../applications/audio/rofi-mpd { }; 23818 23820 23819 23821 rofi-calc = callPackage ../applications/science/math/rofi-calc { };