nixpkgs mirror (for testing) github.com/NixOS/nixpkgs
nix
fork

Configure Feed

Select the types of activity you want to include in your feed.

Merge master into staging-next

+670 -391
+30
.github/workflows/pending-clear.yml
··· 1 + name: "clear pending status" 2 + 3 + on: 4 + check_suite: 5 + types: [ completed ] 6 + 7 + jobs: 8 + action: 9 + runs-on: ubuntu-latest 10 + steps: 11 + - name: clear pending status 12 + if: github.repository_owner == 'NixOS' && github.event.check_suite.app.name == 'OfBorg' 13 + env: 14 + GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} 15 + GSU_VERSION: "0.5.0" 16 + GSU_URL: "https://github.com/cloudposse/github-status-updater/releases/download" 17 + run: | 18 + curl -sSf -O -L -C - \ 19 + "$GSU_URL/$GSU_VERSION/github-status-updater_linux_amd64" && \ 20 + chmod +x github-status-updater_linux_amd64 && \ 21 + ./github-status-updater_linux_amd64 \ 22 + -action update_state \ 23 + -token "$GITHUB_TOKEN" \ 24 + -owner NixOS \ 25 + -repo nixpkgs \ 26 + -state success \ 27 + -context "Wait for ofborg" \ 28 + -description " " \ 29 + -url " " \ 30 + -ref "${{ github.event.check_suite.head_sha }}"
+29
.github/workflows/pending-set.yml
··· 1 + name: "set pending status" 2 + 3 + on: 4 + pull_request_target: 5 + 6 + jobs: 7 + action: 8 + runs-on: ubuntu-latest 9 + steps: 10 + - name: set pending status 11 + if: github.repository_owner == 'NixOS' 12 + env: 13 + GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} 14 + GSU_VERSION: "0.5.0" 15 + GSU_URL: "https://github.com/cloudposse/github-status-updater/releases/download" 16 + run: | 17 + curl -sSf -O -L -C - \ 18 + "$GSU_URL/$GSU_VERSION/github-status-updater_linux_amd64" && \ 19 + chmod +x github-status-updater_linux_amd64 && \ 20 + ./github-status-updater_linux_amd64 \ 21 + -action update_state \ 22 + -token "$GITHUB_TOKEN" \ 23 + -owner NixOS \ 24 + -repo nixpkgs \ 25 + -state failure \ 26 + -context "Wait for ofborg" \ 27 + -description "This failed status will be cleared when ofborg finishes eval." \ 28 + -url " " \ 29 + -ref "${{ github.event.pull_request.head.sha }}"
-1
lib/tests/release.nix
··· 17 17 export TEST_ROOT=$(pwd)/test-tmp 18 18 export NIX_BUILD_HOOK= 19 19 export NIX_CONF_DIR=$TEST_ROOT/etc 20 - export NIX_DB_DIR=$TEST_ROOT/db 21 20 export NIX_LOCALSTATE_DIR=$TEST_ROOT/var 22 21 export NIX_LOG_DIR=$TEST_ROOT/var/log/nix 23 22 export NIX_STATE_DIR=$TEST_ROOT/var/nix
+6
maintainers/maintainer-list.nix
··· 3733 3733 }]; 3734 3734 name = "Jiri Daněk"; 3735 3735 }; 3736 + jdbaldry = { 3737 + email = "jack.baldry@grafana.com"; 3738 + github = "jdbaldry"; 3739 + githubId = 4599384; 3740 + name = "Jack Baldry"; 3741 + }; 3736 3742 jdehaas = { 3737 3743 email = "qqlq@nullptr.club"; 3738 3744 github = "jeroendehaas";
+2
nixos/doc/manual/release-notes/rl-2009.xml
··· 970 970 </listitem> 971 971 <listitem> 972 972 <para> 973 + Nginx module <literal>nginxModules.fastcgi-cache-purge</literal> renamed to official name <literal>nginxModules.cache-purge</literal>. 974 + Nginx module <literal>nginxModules.ngx_aws_auth</literal> renamed to official name <literal>nginxModules.aws-auth</literal>. 973 975 The packages <package>perl</package>, <package>rsync</package> and <package>strace</package> were removed from <option>systemPackages</option>. If you need them, install them again with <code><xref linkend="opt-environment.systemPackages"/> = with pkgs; [ perl rsync strace ];</code> in your <filename>configuration.nix</filename>. 974 976 </para> 975 977 </listitem>
+1
nixos/modules/module-list.nix
··· 300 300 ./services/desktops/dleyna-renderer.nix 301 301 ./services/desktops/dleyna-server.nix 302 302 ./services/desktops/pantheon/files.nix 303 + ./services/desktops/espanso.nix 303 304 ./services/desktops/flatpak.nix 304 305 ./services/desktops/geoclue2.nix 305 306 ./services/desktops/gsignond.nix
+25
nixos/modules/services/desktops/espanso.nix
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; 4 + let cfg = config.services.espanso; 5 + in { 6 + meta = { maintainers = with lib.maintainers; [ numkem ]; }; 7 + 8 + options = { 9 + services.espanso = { enable = options.mkEnableOption "Espanso"; }; 10 + }; 11 + 12 + config = mkIf cfg.enable { 13 + systemd.user.services.espanso = { 14 + description = "Espanso daemon"; 15 + path = with pkgs; [ espanso libnotify xclip ]; 16 + serviceConfig = { 17 + ExecStart = "${pkgs.espanso}/bin/espanso daemon"; 18 + Restart = "on-failure"; 19 + }; 20 + wantedBy = [ "default.target" ]; 21 + }; 22 + 23 + environment.systemPackages = [ pkgs.espanso ]; 24 + }; 25 + }
+1 -1
nixos/modules/services/development/jupyterhub/default.nix
··· 15 15 jupyterhubConfig = pkgs.writeText "jupyterhub_config.py" '' 16 16 c.JupyterHub.bind_url = "http://${cfg.host}:${toString cfg.port}" 17 17 18 - c.JupyterHub.authentication_class = "${cfg.authentication}" 18 + c.JupyterHub.authenticator_class = "${cfg.authentication}" 19 19 c.JupyterHub.spawner_class = "${cfg.spawner}" 20 20 21 21 c.SystemdSpawner.default_url = '/lab'
+2 -2
nixos/modules/services/misc/octoprint.nix
··· 68 68 plugins = mkOption { 69 69 default = plugins: []; 70 70 defaultText = "plugins: []"; 71 - example = literalExample "plugins: [ m3d-fio ]"; 72 - description = "Additional plugins."; 71 + example = literalExample "plugins: with plugins; [ m33-fio stlviewer ]"; 72 + description = "Additional plugins to be used. Available plugins are passed through the plugins input."; 73 73 }; 74 74 75 75 extraConfig = mkOption {
+2 -2
nixos/modules/system/boot/stage-1.nix
··· 36 36 set -euo pipefail 37 37 38 38 declare -A seen 39 - declare -a left 39 + left=() 40 40 41 41 patchelf="${pkgs.buildPackages.patchelf}/bin/patchelf" 42 42 ··· 48 48 done 49 49 } 50 50 51 - add_needed $1 51 + add_needed "$1" 52 52 53 53 while [ ''${#left[@]} -ne 0 ]; do 54 54 next=''${left[0]}
-1
nixos/modules/tasks/network-interfaces.nix
··· 1129 1129 ++ optionals config.networking.wireless.enable [ 1130 1130 pkgs.wirelesstools # FIXME: obsolete? 1131 1131 pkgs.iw 1132 - pkgs.rfkill 1133 1132 ] 1134 1133 ++ bridgeStp; 1135 1134
+18 -15
nixos/tests/os-prober.nix
··· 1 - import ./make-test.nix ({pkgs, lib, ...}: 1 + import ./make-test-python.nix ({pkgs, lib, ...}: 2 2 let 3 3 # A filesystem image with a (presumably) bootable debian 4 4 debianImage = pkgs.vmTools.diskImageFuns.debian9i386 { ··· 34 34 ''; 35 35 }; 36 36 37 - # options to add the disk to the test vm 38 - QEMU_OPTS = "-drive index=2,file=${debianImage}/disk-image.qcow2,read-only,if=virtio"; 39 - 40 37 # a part of the configuration of the test vm 41 38 simpleConfig = { 42 39 boot.loader.grub = { ··· 68 71 machine = { config, pkgs, ... }: (simpleConfig // { 69 72 imports = [ ../modules/profiles/installation-device.nix 70 73 ../modules/profiles/base.nix ]; 71 - virtualisation.memorySize = 1024; 74 + virtualisation.memorySize = 1300; 72 75 # The test cannot access the network, so any packages 73 76 # nixos-rebuild needs must be included in the VM. 74 77 system.extraDependencies = with pkgs; ··· 96 99 97 100 testScript = '' 98 101 # hack to add the secondary disk 99 - $machine->{startCommand} = "QEMU_OPTS=\"\$QEMU_OPTS \"${lib.escapeShellArg QEMU_OPTS} ".$machine->{startCommand}; 102 + os.environ[ 103 + "QEMU_OPTS" 104 + ] = "-drive index=2,file=${debianImage}/disk-image.qcow2,read-only,if=virtio" 100 105 101 - $machine->start; 102 - $machine->succeed("udevadm settle"); 103 - $machine->waitForUnit("multi-user.target"); 106 + machine.start() 107 + machine.succeed("udevadm settle") 108 + machine.wait_for_unit("multi-user.target") 109 + print(machine.succeed("lsblk")) 104 110 105 111 # check that os-prober works standalone 106 - $machine->succeed("${pkgs.os-prober}/bin/os-prober | grep /dev/vdb1"); 112 + machine.succeed( 113 + "${pkgs.os-prober}/bin/os-prober | grep /dev/vdb1" 114 + ) 107 115 108 116 # rebuild and test that debian is available in the grub menu 109 - $machine->succeed("nixos-generate-config"); 110 - $machine->copyFileFromHost( 117 + machine.succeed("nixos-generate-config") 118 + machine.copy_from_host( 111 119 "${configFile}", 112 - "/etc/nixos/configuration.nix"); 113 - $machine->succeed("nixos-rebuild boot >&2"); 120 + "/etc/nixos/configuration.nix", 121 + ) 122 + machine.succeed("nixos-rebuild boot >&2") 114 123 115 - $machine->succeed("egrep 'menuentry.*debian' /boot/grub/grub.cfg"); 124 + machine.succeed("egrep 'menuentry.*debian' /boot/grub/grub.cfg") 116 125 ''; 117 126 })
+2 -2
pkgs/applications/audio/picard/default.nix
··· 12 12 ; 13 13 in pythonPackages.buildPythonApplication rec { 14 14 pname = "picard"; 15 - version = "2.4.1"; 15 + version = "2.4.2"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "metabrainz"; 19 19 repo = pname; 20 20 rev = "release-${version}"; 21 - sha256 = "0s4jmcg1n6ayxf7x0amq67rgn6y127h98s2k4fcna6n9477krrwf"; 21 + sha256 = "0sbccsisk9w0gnblvhg7wk1c5ydppldjbvaa0zhl3yrid5a363ah"; 22 22 }; 23 23 24 24 nativeBuildInputs = [ gettext qt5.wrapQtAppsHook qt5.qtbase ]
+3 -3
pkgs/applications/editors/android-studio/default.nix
··· 19 19 sha256Hash = "11lkwcbzdl86cyz4lci65cx9z5jjhrc4z40maqx2r5hw1xka9290"; 20 20 }; 21 21 latestVersion = { # canary & dev 22 - version = "4.2.0.5"; # "Android Studio 4.2 Canary 5" 23 - build = "201.6682321"; 24 - sha256Hash = "076q6d7kmi0wcsqak7n6ggp1qns4xj1134xcpdzb92qk3dmg3wrh"; 22 + version = "4.2.0.7"; # "Android Studio 4.2 Canary 7" 23 + build = "201.6720134"; 24 + sha256Hash = "1c9s6rd0z596qr7hbil5rl3fqby7c8h7ma52d1qj5rxra73k77nz"; 25 25 }; 26 26 in { 27 27 # Attributes are named by their corresponding release channels
+2 -2
pkgs/applications/editors/nano/default.nix
··· 20 20 21 21 in stdenv.mkDerivation rec { 22 22 pname = "nano"; 23 - version = "5.0"; 23 + version = "5.2"; 24 24 25 25 src = fetchurl { 26 26 url = "mirror://gnu/nano/${pname}-${version}.tar.xz"; 27 - sha256 = "0dmagj4p1llb1a2w0iwdrqbd9cgp0bda4s18vwh6y1ndd6z983bw"; 27 + sha256 = "1qd7pn9g5dgzbfg4fb3nqxqgi2iqq0g6x33x8d1mx6mfw51xmhij"; 28 28 }; 29 29 30 30 nativeBuildInputs = [ texinfo ] ++ optional enableNls gettext;
+2 -2
pkgs/applications/editors/setzer/default.nix
··· 17 17 18 18 python3.pkgs.buildPythonApplication rec { 19 19 pname = "setzer"; 20 - version = "0.2.8"; 20 + version = "0.3.0"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "cvfosammmm"; 24 24 repo = "Setzer"; 25 25 rev = "v${version}"; 26 - sha256 = "1llxxjj038nd2p857bjdyyhzskn56826qi259v47vaqlv9hkifil"; 26 + sha256 = "0gx5fnyi932lswkhdvxfqs0wxx7hz690cbnpv4m3ysydi96mxwiv"; 27 27 }; 28 28 29 29 format = "other";
+2 -2
pkgs/applications/misc/bemenu/default.nix
··· 11 11 12 12 stdenv.mkDerivation rec { 13 13 pname = "bemenu"; 14 - version = "0.4.1"; 14 + version = "0.5.0"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "Cloudef"; 18 18 repo = pname; 19 19 rev = version; 20 - sha256 = "1fjcs9d3533ay3nz79cx3c0lmy2chgragr2lhsy0xl2ckr0iins0"; 20 + sha256 = "1ifq5bk7782b9m6bl111x33fn38rpppdrww7hfavqia9a9gi2sl5"; 21 21 }; 22 22 23 23 nativeBuildInputs = [ pkgconfig pcre ];
+2 -2
pkgs/applications/misc/blender/default.nix
··· 17 17 18 18 stdenv.mkDerivation rec { 19 19 pname = "blender"; 20 - version = "2.83.4"; 20 + version = "2.83.5"; 21 21 22 22 src = fetchurl { 23 23 url = "https://download.blender.org/source/${pname}-${version}.tar.xz"; 24 - sha256 = "1y4phkzrxy17kpjbg0jbz1236nw8w8p006x1crbqmvwz8wd3dm46"; 24 + sha256 = "0xyawly00a59hfdb6b7va84k5fhcv2mxnzd77vs22bzi9y7sap43"; 25 25 }; 26 26 27 27 patches = lib.optional stdenv.isDarwin ./darwin.patch;
+2 -2
pkgs/applications/misc/cheat/default.nix
··· 3 3 4 4 buildGoModule rec { 5 5 pname = "cheat"; 6 - version = "4.0.3"; 6 + version = "4.0.4"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "cheat"; 10 10 repo = "cheat"; 11 11 rev = version; 12 - sha256 = "1bzlbd8lvagpipyv553icv17bafhaydscrrlly8jz7kfi4d9xvkk"; 12 + sha256 = "0cracw6pja3d7z6ip6lbmpvfxlxcnh3fbgh5ba8c87bhfz99idqn"; 13 13 }; 14 14 15 15 subPackages = [ "cmd/cheat" ];
+2 -2
pkgs/applications/misc/simplenote/default.nix
··· 16 16 17 17 pname = "simplenote"; 18 18 19 - version = "1.21.0"; 19 + version = "1.21.1"; 20 20 21 21 sha256 = { 22 - x86_64-linux = "073dg4agqgimsgs3ia7g0pjv4vxkh24bj7vpmssiysdxhm4li1j1"; 22 + x86_64-linux = "00qx82d17yrrg2mxwhm40av0mpf5hy14j338i5ijhwp79yc8fk8x"; 23 23 }.${system} or throwSystem; 24 24 25 25 meta = with stdenv.lib; {
+2 -2
pkgs/applications/misc/systembus-notify/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "systembus-notify"; 5 - version = "1.0"; 5 + version = "1.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "rfjakob"; 9 9 repo = "systembus-notify"; 10 10 rev = "v${version}"; 11 - sha256 = "11zq84qfmbyl51d3r6294l2bjhlgwa9bx7d263g9fkqrwsg0si0y"; 11 + sha256 = "1pdn45rfpwhrf20hs87qmk2j8sr7ab8161f81019wnypnb1q2fsv"; 12 12 }; 13 13 14 14 buildInputs = [ systemd ];
+2 -1
pkgs/applications/networking/browsers/firefox/common.nix
··· 108 108 dbus dbus-glib pango freetype fontconfig xorg.libXi xorg.libXcursor 109 109 xorg.libX11 xorg.libXrender xorg.libXft xorg.libXt file 110 110 libnotify xorg.pixman yasm libGLU libGL 111 - xorg.libXScrnSaver xorg.xorgproto 111 + xorg.xorgproto 112 112 xorg.libXext unzip makeWrapper 113 113 libevent libstartup_notification /* cairo */ 114 114 libpng jemalloc glib ··· 277 277 patchelf --set-rpath "${lib.getLib libnotify 278 278 }/lib:$(patchelf --print-rpath "$out"/lib/${binaryName}*/libxul.so)" \ 279 279 "$out"/lib/${binaryName}*/libxul.so 280 + patchelf --add-needed ${xorg.libXScrnSaver.out}/lib/libXss.so $out/lib/${binaryName}/${binaryName} 280 281 ''; 281 282 282 283 doInstallCheck = true;
+3 -3
pkgs/applications/networking/cluster/terragrunt/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "terragrunt"; 5 - version = "0.23.32"; 5 + version = "0.23.33"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "gruntwork-io"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "1pa3k0hjdb5bj0bp4aj3lfcgz98l3wd9kfa12rn9zzbcmp087kih"; 11 + sha256 = "0fsyvmdg2llnzy0yzmiihnb865ccq2sn6d3i935dflppnjyp01p4"; 12 12 }; 13 13 14 - vendorSha256 = "1xn7c6y32vpanqvf1sfpw6bs73dbjniavjbf00j0vx83bfyklsr4"; 14 + vendorSha256 = "05p72l724qqf61dn0frahf4awvkkcw8cpl6nhwlacd1jw8c14fjl"; 15 15 16 16 doCheck = false; 17 17
+2
pkgs/applications/networking/irc/weechat/scripts/default.nix
··· 7 7 8 8 weechat-matrix = python3Packages.callPackage ./weechat-matrix { }; 9 9 10 + weechat-notify-send = python3Packages.callPackage ./weechat-notify-send { }; 11 + 10 12 wee-slack = callPackage ./wee-slack { }; 11 13 12 14 weechat-autosort = callPackage ./weechat-autosort { };
+31
pkgs/applications/networking/irc/weechat/scripts/weechat-notify-send/default.nix
··· 1 + { stdenv, fetchFromGitHub, libnotify }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "weechat-notify-send"; 5 + version = "0.9"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "s3rvac"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "1693b7axm9ls5p7hm6kq6avddsisi491khr5irvswr5lpizvys6a"; 12 + }; 13 + 14 + passthru.scripts = [ "notify_send.py" ]; 15 + 16 + dontBuild = true; 17 + doCheck = false; 18 + 19 + installPhase = '' 20 + install -D notify_send.py $out/share/notify_send.py 21 + substituteInPlace $out/share/notify_send.py \ 22 + --replace "'notify-send'" "'${libnotify}/bin/notify-send'" 23 + ''; 24 + 25 + meta = with stdenv.lib; { 26 + description = "A WeeChat script that sends highlight and message notifications through notify-send"; 27 + homepage = "https://github.com/s3rvac/weechat-notify-srnd"; 28 + license = licenses.mit; 29 + maintainers = with maintainers; [ tobim ]; 30 + }; 31 + }
+2 -2
pkgs/applications/networking/mailreaders/notmuch-bower/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "notmuch-bower"; 5 - version = "0.11"; 5 + version = "0.12"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "wangp"; 9 9 repo = "bower"; 10 10 rev = version; 11 - sha256 = "0vhac8yjnhb1gz60jfzg27spyn96c1rr849gc6vjym5xamw7zp0v"; 11 + sha256 = "0hvvlbvad6h73iiyn9xshlj073p2ddchgh0pyizh9gi8niir4fn5"; 12 12 }; 13 13 14 14 nativeBuildInputs = [ gawk mercury pandoc ];
+16 -4
pkgs/applications/office/softmaker/freeoffice.nix
··· 1 - { callPackage, fetchurl, ... } @ args: 1 + { callPackage 2 + , fetchurl 2 3 3 - callPackage ./generic.nix (args // rec { 4 - pname = "freeoffice"; 4 + # This is a bit unusual, but makes version and hash easily 5 + # overridable. This is useful when the upstream archive was replaced 6 + # and nixpkgs is not in sync yet. 7 + , officeVersion ? { 5 8 version = "976"; 6 9 edition = "2018"; 10 + sha256 = "13yh4lyqakbdqf4r8vw8imy5gwpfva697iqfd85qmp3wimqvzskl"; 11 + } 12 + 13 + , ... } @ args: 14 + 15 + callPackage ./generic.nix (args // rec { 16 + inherit (officeVersion) version edition; 17 + 18 + pname = "freeoffice"; 7 19 suiteName = "FreeOffice"; 8 20 9 21 src = fetchurl { 22 + inherit (officeVersion) sha256; 10 23 url = "https://www.softmaker.net/down/softmaker-freeoffice-${version}-amd64.tgz"; 11 - sha256 = "13yh4lyqakbdqf4r8vw8imy5gwpfva697iqfd85qmp3wimqvzskl"; 12 24 }; 13 25 14 26 archive = "freeoffice${edition}.tar.lzma";
+17 -4
pkgs/applications/office/softmaker/softmaker_office.nix
··· 1 - { callPackage, fetchurl, ... } @ args: 1 + { callPackage 2 + , fetchurl 3 + 4 + # This is a bit unusual, but makes version and hash easily 5 + # overridable. This is useful when people have an older version of 6 + # Softmaker Office or when the upstream archive was replaced and 7 + # nixpkgs is not in sync yet. 8 + , officeVersion ? { 9 + version = "1018"; 10 + edition = "2021"; 11 + sha256 = "1g9mcn0z7s3xw7d5bcjxbnamh6knzndcysahydskfcds6czdxg0c"; 12 + } 13 + 14 + , ... } @ args: 2 15 3 16 callPackage ./generic.nix (args // rec { 17 + inherit (officeVersion) version edition; 18 + 4 19 pname = "softmaker-office"; 5 - version = "1016"; 6 - edition = "2021"; 7 20 suiteName = "SoftMaker Office"; 8 21 9 22 src = fetchurl { 23 + inherit (officeVersion) sha256; 10 24 url = "https://www.softmaker.net/down/softmaker-office-${edition}-${version}-amd64.tgz"; 11 - sha256 = "0s8kzpc6w2cjkfqmhb2p1pkmkiq9vk9gnc7z2992kijaf9bwk3qz"; 12 25 }; 13 26 14 27 archive = "office${edition}.tar.lzma";
+6 -5
pkgs/applications/radio/inspectrum/default.nix
··· 8 8 , gnuradio 9 9 , liquid-dsp 10 10 , qtbase 11 + , wrapQtAppsHook 11 12 }: 12 13 13 - mkDerivation { 14 + mkDerivation rec { 14 15 pname = "inspectrum"; 15 - version = "unstable-2017-05-31"; 16 + version = "0.2.2"; 16 17 17 18 src = fetchFromGitHub { 18 19 owner = "miek"; 19 20 repo = "inspectrum"; 20 - rev = "a89d1337efb31673ccb6a6681bb89c21894c76f7"; 21 - sha256 = "1fvnr8gca25i6s9mg9b2hyqs0zzr4jicw13mimc9dhrgxklrr1yv"; 21 + rev = "v${version}"; 22 + sha256 = "1a517y7s1xi66y5kjrpjay450pad9nc228pa8801mxq1c7m1lamm"; 22 23 }; 23 24 24 - nativeBuildInputs = [ cmake pkgconfig ]; 25 + nativeBuildInputs = [ cmake pkgconfig wrapQtAppsHook ]; 25 26 buildInputs = [ 26 27 fftwFloat 27 28 boost
+6
pkgs/applications/science/math/mathematica/l10ns.nix
··· 8 8 # N.B. Versions in this list should be ordered from newest to oldest. 9 9 [ 10 10 { 11 + version = "12.1.1"; 12 + lang = "en"; 13 + language = "English"; 14 + sha256 = "02mk8gmv8idnakva1nc7r7mx8ld02lk7jgsj1zbn962aps3bhixd"; 15 + } 16 + { 11 17 version = "12.1.0"; 12 18 lang = "en"; 13 19 language = "English";
+2 -2
pkgs/applications/virtualization/docker-slim/default.nix
··· 6 6 7 7 buildGoPackage rec { 8 8 pname = "docker-slim"; 9 - version = "1.31.0"; 9 + version = "1.32.0"; 10 10 11 11 goPackagePath = "github.com/docker-slim/docker-slim"; 12 12 ··· 14 14 owner = "docker-slim"; 15 15 repo = "docker-slim"; 16 16 rev = version; 17 - sha256 = "0kj97kwyjs9hksaas0zic4m7w8b17c1d7c8vhiq2862w97ngxrsk"; 17 + sha256 = "0pd2v7df176ca923c4nw9ns5gz442jkb0jhzqjl53rwfwz1vxy9h"; 18 18 }; 19 19 20 20 subPackages = [ "cmd/docker-slim" "cmd/docker-slim-sensor" ];
+32
pkgs/applications/window-managers/i3/lock-fancy-rapid.nix
··· 1 + { stdenv, fetchFromGitHub, xorg, i3lock }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "i3lock-fancy-rapid"; 5 + version = "2019-10-09"; 6 + src = fetchFromGitHub { 7 + owner = "yvbbrjdr"; 8 + repo = "i3lock-fancy-rapid"; 9 + rev = "c67f09bc8a48798c7c820d7d4749240b10865ce0"; 10 + sha256 = "0jhvlj6v6wx70239pgkjxd42z1s2bzfg886ra6n1rzsdclf4rkc6"; 11 + }; 12 + 13 + buildInputs = [ xorg.libX11 ]; 14 + propagatedBuildInputs = [ i3lock ]; 15 + 16 + postPatch = '' 17 + substituteInPlace i3lock-fancy-rapid.c \ 18 + --replace '"i3lock"' '"${i3lock}/bin/i3lock"' 19 + ''; 20 + 21 + installPhase = '' 22 + install -D i3lock-fancy-rapid $out/bin/i3lock-fancy-rapid 23 + ''; 24 + 25 + meta = with stdenv.lib; { 26 + description = "A faster implementation of i3lock-fancy"; 27 + homepage = "https://github.com/yvbbrjdr/i3lock-fancy-rapid"; 28 + maintainers = with maintainers; [ nickhu ]; 29 + license = licenses.bsd3; 30 + platforms = platforms.linux; 31 + }; 32 + }
+2 -2
pkgs/desktops/deepin/dde-api/default.nix
··· 20 20 , librsvg 21 21 , poppler 22 22 , pulseaudio 23 - , rfkill 23 + , utillinux 24 24 , xcur2png 25 25 }: 26 26 ··· 49 49 blur-effect # run (is it really needed?) 50 50 coreutils # run (is it really needed?) 51 51 fontconfig # run (is it really needed?) 52 - rfkill # run 52 + utillinux # run 53 53 xcur2png # run 54 54 grub2 # run (is it really needed?) 55 55 ];
+7 -4
pkgs/development/compilers/aspectj/default.nix
··· 1 1 {stdenv, fetchurl, jre}: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "aspectj-1.5.2"; 4 + pname = "aspectj"; 5 + version = "1.9.6"; 5 6 builder = ./builder.sh; 6 7 7 - src = fetchurl { 8 - url = "http://archive.eclipse.org/tools/aspectj/${name}.jar"; 9 - sha256 = "1b3mx248dc1xka1vgsl0jj4sm0nfjsqdcj9r9036mvixj1zj3nmh"; 8 + src = let 9 + versionSnakeCase = builtins.replaceStrings ["."] ["_"] version; 10 + in fetchurl { 11 + url = "https://github.com/eclipse/org.aspectj/releases/download/V${versionSnakeCase}/aspectj-${version}.jar"; 12 + sha256 = "02jh66l3vw57k9a4dxlga3qh3487r36gyi6k2z2mmqxbpqajslja"; 10 13 }; 11 14 12 15 inherit jre;
+32
pkgs/development/compilers/copper/default.nix
··· 1 + { stdenv 2 + , fetchurl 3 + , libffi 4 + }: 5 + stdenv.mkDerivation rec { 6 + pname = "copper"; 7 + version = "4.4"; 8 + src = fetchurl { 9 + url = "https://tibleiz.net/download/copper-${version}-src.tar.gz"; 10 + sha256 = "1nf0bw143rjhd019yms3k6k531rahl8anidwh6bif0gm7cngfwfw"; 11 + }; 12 + buildInputs = [ 13 + libffi 14 + ]; 15 + postPatch = '' 16 + substituteInPlace Makefile --replace "-s scripts/" "scripts/" 17 + patchShebangs . 18 + ''; 19 + buildPhase = '' 20 + make BACKEND=elf64 boot-elf64 21 + make BACKEND=elf64 COPPER=stage3/copper-elf64 copper-elf64 22 + ''; 23 + installPhase = '' 24 + make BACKEND=elf64 install prefix=$out 25 + ''; 26 + meta = with stdenv.lib; { 27 + description = "Simple imperative language, statically typed with type inference and genericity."; 28 + homepage = "https://tibleiz.net/copper/"; 29 + license = licenses.bsd2; 30 + platforms = platforms.x86_64; 31 + }; 32 + }
+2 -2
pkgs/development/compilers/kotlin/default.nix
··· 1 1 { stdenv, fetchurl, makeWrapper, jre, unzip }: 2 2 3 3 let 4 - version = "1.3.72"; 4 + version = "1.4.0"; 5 5 in stdenv.mkDerivation { 6 6 inherit version; 7 7 pname = "kotlin"; 8 8 9 9 src = fetchurl { 10 10 url = "https://github.com/JetBrains/kotlin/releases/download/v${version}/kotlin-compiler-${version}.zip"; 11 - sha256 = "0v6c4vjiflwbjjc1lmiyzrilxwbqcz5ll6ls40zhw70zk23xpl6c"; 11 + sha256 = "0qgiabpkisqjm9iryidrynqy452vzmpgaw54rd9blr9w7g8r20sr"; 12 12 }; 13 13 14 14 propagatedBuildInputs = [ jre ] ;
+3
pkgs/development/haskell-modules/configuration-common.nix
··· 972 972 # Generate shell completions 973 973 generateOptparseApplicativeCompletion "purs" dontHaddockPurescript; 974 974 975 + # Generate shell completion for spago 976 + spago = generateOptparseApplicativeCompletion "spago" super.spago; 977 + 975 978 # 2020-06-05: HACK: Package can not pass test suite, 976 979 # Upstream Report: https://github.com/kcsongor/generic-lens/issues/83 977 980 generic-lens = dontCheck super.generic-lens;
+2 -2
pkgs/development/interpreters/chibi/default.nix
··· 1 1 { stdenv, fetchFromGitHub, makeWrapper }: 2 2 let 3 - version = "0.9"; 3 + version = "0.9.1"; 4 4 name = "chibi-scheme-${version}"; 5 5 in 6 6 stdenv.mkDerivation { ··· 18 18 owner = "ashinn"; 19 19 repo = "chibi-scheme"; 20 20 rev = version; 21 - sha256 = "1lnap41gl9vg82h557f4rlr69jgmd2gh0iqs6cxm77d39kv1scb8"; 21 + sha256 = "0nd63i924ifh39cba1hd4sbi6vh1cb73v97nrn4bf8rrjh3k8pdi"; 22 22 }; 23 23 24 24 buildInputs = [ makeWrapper ];
+8 -8
pkgs/development/interpreters/perl/default.nix
··· 28 28 29 29 # TODO: Add a "dev" output containing the header files. 30 30 outputs = [ "out" "man" "devdoc" ] ++ 31 - optional crossCompiling "dev"; 31 + optional crossCompiling "mini"; 32 32 setOutputFlags = false; 33 33 34 34 disallowedReferences = [ stdenv.cc ]; ··· 144 144 --replace "$man" /no-such-path 145 145 '' + optionalString crossCompiling 146 146 '' 147 - mkdir -p $dev/lib/perl5/cross_perl/${version} 147 + mkdir -p $mini/lib/perl5/cross_perl/${version} 148 148 for dir in cnf/{stub,cpan}; do 149 - cp -r $dir/* $dev/lib/perl5/cross_perl/${version} 149 + cp -r $dir/* $mini/lib/perl5/cross_perl/${version} 150 150 done 151 151 152 - mkdir -p $dev/bin 153 - install -m755 miniperl $dev/bin/perl 152 + mkdir -p $mini/bin 153 + install -m755 miniperl $mini/bin/perl 154 154 155 155 export runtimeArch="$(ls $out/lib/perl5/site_perl/${version})" 156 156 # wrapProgram should use a runtime-native SHELL by default, but ··· 161 161 # miniperl can't load the native modules there. However, it can 162 162 # (and sometimes needs to) load and run some of the pure perl 163 163 # code there, so we add it anyway. When needed, stubs can be put 164 - # into $dev/lib/perl5/cross_perl/${version}. 165 - wrapProgram $dev/bin/perl --prefix PERL5LIB : \ 166 - "$dev/lib/perl5/cross_perl/${version}:$out/lib/perl5/${version}:$out/lib/perl5/${version}/$runtimeArch" 164 + # into $mini/lib/perl5/cross_perl/${version}. 165 + wrapProgram $mini/bin/perl --prefix PERL5LIB : \ 166 + "$mini/lib/perl5/cross_perl/${version}:$out/lib/perl5/${version}:$out/lib/perl5/${version}/$runtimeArch" 167 167 ''; # */ 168 168 169 169 meta = {
+1 -1
pkgs/development/interpreters/perl/setup-hook-cross.sh
··· 9 9 addToSearchPath PERL5LIB $1/lib/perl5/site_perl/@version@/@runtimeArch@ 10 10 } 11 11 12 - addEnvHooks "$targetOffset" addPerlLibPath 12 + addEnvHooks "$hostOffset" addPerlLibPath
+2 -2
pkgs/development/interpreters/rakudo/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "rakudo"; 5 - version = "2020.07"; 5 + version = "2020.08.1"; 6 6 7 7 src = fetchurl { 8 8 url = "https://www.rakudo.org/dl/rakudo/rakudo-${version}.tar.gz"; 9 - sha256 = "1f6ay09k4n7dbcvvla45yg1lfb7vk2ssymmll2xiagjb77hlsqir"; 9 + sha256 = "1jwlqppm2g6ivzpipkcyihsxzsii3qyx1f35n7wj5dsf99b3hkfm"; 10 10 }; 11 11 12 12 buildInputs = [ icu zlib gmp perl ];
+2 -2
pkgs/development/interpreters/rakudo/moarvm.nix
··· 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "moarvm"; 6 - version = "2020.07"; 6 + version = "2020.08"; 7 7 8 8 src = fetchurl { 9 9 url = "https://www.moarvm.org/releases/MoarVM-${version}.tar.gz"; 10 - sha256 = "1kzp76vqvny8gpp0b4xg1hg4vih4gmic4w1lddc9gqz03dx8hj6s"; 10 + sha256 = "1gq7z4z5lnkai01721waawkkal82sdmyra05nnbfb1986mq5xpiy"; 11 11 }; 12 12 13 13 buildInputs = [ perl ] ++ stdenv.lib.optionals stdenv.isDarwin [ CoreServices ApplicationServices ];
+2 -2
pkgs/development/interpreters/rakudo/nqp.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "nqp"; 5 - version = "2020.07"; 5 + version = "2020.08.1"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/perl6/nqp/releases/download/${version}/nqp-${version}.tar.gz"; 9 - sha256 = "0kian8xsyj51m120nh68c9q359l7iipkddph3r8yzvn41zql3y8v"; 9 + sha256 = "0pxmg22dx6rhfgrxq4gbwqf6d2nahw6iprjvrg8brkbcbyj3ryhd"; 10 10 }; 11 11 12 12 buildInputs = [ perl ];
+4 -4
pkgs/development/interpreters/red/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "red"; 5 - version = "0.6.3"; 5 + version = "0.6.4"; 6 6 src = fetchFromGitHub { 7 - rev = "6a43c767fa2e85d668b83f749158a18e62c30f70"; 7 + rev = "755eb943ccea9e78c2cab0f20b313a52404355cb"; 8 8 owner = "red"; 9 9 repo = "red"; 10 - sha256 = "1zh6xc728bs7r4v5jz1jjrdk0xd838xsxmvy9gfg75a3zffm0slr"; 10 + sha256 = "sha256:045rrg9666zczgrwyyyglivzdzja103s52b0fzj7hqmr1fz68q37"; 11 11 }; 12 12 13 13 rebol = fetchurl { ··· 36 36 ${r2} -qw red.r tests/hello.red 37 37 38 38 # Compiling the Red console... 39 - ${r2} -qw red.r -r environment/console/console.red 39 + ${r2} -qw red.r -r environment/console/CLI/console.red 40 40 41 41 # Generating docs... 42 42 cd docs
+1 -1
pkgs/development/libraries/assimp/default.nix
··· 18 18 homepage = "http://assimp.sourceforge.net/"; 19 19 license = licenses.bsd3; 20 20 maintainers = with maintainers; [ ehmry ]; 21 - platforms = platforms.linux; 21 + platforms = platforms.linux ++ platforms.darwin; 22 22 }; 23 23 }
+2
pkgs/development/libraries/libgdiplus/default.nix
··· 23 23 24 24 configureFlags = stdenv.lib.optional stdenv.cc.isClang "--host=${stdenv.hostPlatform.system}"; 25 25 26 + enableParallelBuilding = true; 27 + 26 28 buildInputs = 27 29 [ glib cairo fontconfig libtiff giflib 28 30 libjpeg libpng libXrender libexif
+11 -4
pkgs/development/libraries/librseq/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "librseq"; 7 - version = "0.1.0pre54_${builtins.substring 0 7 src.rev}"; 7 + version = "0.1.0pre70_${builtins.substring 0 7 src.rev}"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "compudj"; 11 11 repo = "librseq"; 12 - rev = "152600188dd214a0b2c6a8c66380e50c6ad27154"; 13 - sha256 = "0mivjmgdkgrr6z2gz3k6q6wgnvyvw9xzy65f6ipvqva68sxhk0mx"; 12 + rev = "d1cdec98d476b16ca5e2d9d7eabcf9f1c97e6111"; 13 + sha256 = "0vgillrxc1knq591gjj99x2ws6q1xpm5dmfrhsxisngfpcnjr10v"; 14 14 }; 15 15 16 - outputs = [ "out" "dev" ]; 16 + outputs = [ "out" "dev" "man" ]; 17 17 nativeBuildInputs = [ autoreconfHook ]; 18 18 buildInputs = [ linuxHeaders ]; 19 19 20 + installTargets = [ "install" "install-man" ]; 21 + 22 + doCheck = true; 20 23 separateDebugInfo = true; 21 24 enableParallelBuilding = true; 25 + 26 + patchPhase = '' 27 + patchShebangs tests 28 + ''; 22 29 23 30 # The share/ subdir only contains a doc/ with a README.md that just describes 24 31 # how to compile the library, which clearly isn't very useful! So just get
+4 -4
pkgs/development/libraries/libvmaf/default.nix
··· 1 - { stdenv, fetchFromGitHub, meson, ninja }: 1 + { stdenv, fetchFromGitHub, meson, ninja, nasm }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libvmaf"; 5 - version = "1.5.2"; 5 + version = "1.5.3"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "netflix"; 9 9 repo = "vmaf"; 10 10 rev = "v${version}"; 11 - sha256 = "18w0z3w90fdbzsqaa4diwvq0xmvg0aiw4hi3aaa4pq0zgnb8g3mk"; 11 + sha256 = "0x3l3g0hgrrjh3ygmxr1pd3rd5589s07c7id35nvj76ch5b7gy63"; 12 12 }; 13 13 14 14 sourceRoot = "source/libvmaf"; 15 15 16 - nativeBuildInputs = [ meson ninja ]; 16 + nativeBuildInputs = [ meson ninja nasm ]; 17 17 outputs = [ "out" "dev" ]; 18 18 doCheck = true; 19 19
+1 -9
pkgs/development/libraries/qt-5/modules/qtdeclarative.nix
··· 1 - { qtModule, lib, fetchpatch, python3, qtbase, qtsvg }: 1 + { qtModule, lib, python3, qtbase, qtsvg }: 2 2 3 3 with lib; 4 4 ··· 23 23 "bin/qmlscene" 24 24 "bin/qmltestrunner" 25 25 ]; 26 - patches = 27 - # https://mail.kde.org/pipermail/kde-distro-packagers/2020-June/000419.html 28 - lib.optional (lib.versionAtLeast qtbase.version "5.14.2") 29 - (fetchpatch { 30 - url = "https://codereview.qt-project.org/gitweb?p=qt/qtdeclarative.git;a=patch;h=3e47ac319b0f53c43cc02a8356c2dec4f0daeef4"; 31 - sha256 = "0wvncg7047q73nm0svc6kb14sigwk7sc53r4778kn033aj0qqszj"; 32 - name = "qtdeclarative-QQuickItemView-fix-max-extent.patch"; 33 - }); 34 26 }
+2 -2
pkgs/development/libraries/wxsqlite3/default.nix
··· 8 8 9 9 stdenv.mkDerivation rec { 10 10 pname = "wxsqlite3"; 11 - version = "4.5.1"; 11 + version = "4.6.0"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "utelle"; 15 15 repo = "wxsqlite3"; 16 16 rev = "v${version}"; 17 - sha256 = "0090f7r3blks18vifkna4l890fwaya58ajh9qblbw9065zj5hrm3"; 17 + sha256 = "0snsysfrr5h66mybls8r8k781v732dlfn4jdnmk348jgvny275fj"; 18 18 }; 19 19 20 20 nativeBuildInputs = [ autoreconfHook ];
+2 -2
pkgs/development/libraries/yder/default.nix
··· 4 4 assert withSystemd -> systemd != null; 5 5 stdenv.mkDerivation rec { 6 6 pname = "yder"; 7 - version = "1.4.10"; 7 + version = "1.4.11"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "babelouest"; 11 11 repo = pname; 12 12 rev = "v${version}"; 13 - sha256 = "1m1aw4im1vvddkl7mknq0h0nj0x2zpql3r17lxhw4mmib05zbdgj"; 13 + sha256 = "0gm6l9y4jkxbq6vskdv1ivlq795ic28nhiyq21mzk3mx6j8klwip"; 14 14 }; 15 15 16 16 patches = [
+2 -2
pkgs/development/ocaml-modules/mirage-crypto/default.nix
··· 4 4 minimumOCamlVersion = "4.08"; 5 5 6 6 pname = "mirage-crypto"; 7 - version = "0.8.3"; 7 + version = "0.8.4"; 8 8 9 9 src = fetchurl { 10 10 url = "https://github.com/mirage/mirage-crypto/releases/download/v${version}/mirage-crypto-v${version}.tbz"; 11 - sha256 = "08rmhjrk046nnhbdk16vg7w7ink4bj6yq9dsjcky5psn982aqiwi"; 11 + sha256 = "1w09wllls4rp1abq0awffxf69dn0xciy6hsqz413ing5r151wjxr"; 12 12 }; 13 13 14 14 useDune2 = true;
+1 -1
pkgs/development/perl-modules/generic/default.nix
··· 42 42 version = lib.getVersion attrs; # TODO: phase-out `attrs.name` 43 43 builder = ./builder.sh; 44 44 buildInputs = buildInputs ++ [ perl ]; 45 - nativeBuildInputs = nativeBuildInputs ++ [ (perl.dev or perl) ]; 45 + nativeBuildInputs = nativeBuildInputs ++ [ (perl.mini or perl) ]; 46 46 fullperl = buildPerl; 47 47 } 48 48 ))
+6 -1
pkgs/development/python-modules/urwid/default.nix
··· 1 - { stdenv, buildPythonPackage, fetchPypi, isPy27, glibcLocales }: 1 + { stdenv, buildPythonPackage, fetchPypi, isPy3k, isPy27, glibcLocales }: 2 2 3 3 buildPythonPackage rec { 4 4 pname = "urwid"; ··· 13 13 # tests need to be able to set locale 14 14 LC_ALL = "en_US.UTF-8"; 15 15 checkInputs = [ glibcLocales ]; 16 + 17 + # tests which assert on strings don't decode results correctly 18 + doCheck = isPy3k; 19 + 20 + pythonImportsCheck = [ "urwid" ]; 16 21 17 22 meta = with stdenv.lib; { 18 23 description = "A full-featured console (xterm et al.) user interface library";
+3 -3
pkgs/development/tools/continuous-integration/fly/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "fly"; 5 - version = "6.4.1"; 5 + version = "6.5.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "concourse"; 9 9 repo = "concourse"; 10 10 rev = "v${version}"; 11 - sha256 = "16si1qm835yyvk2f0kwn9wnk8vpy5q4whgws1s2p6jr7dswg43h8"; 11 + sha256 = "0x8q1l56h24mmq01j3hib2qg0g44z82mxhmmljy8yv5s2iir0sfh"; 12 12 }; 13 13 14 - vendorSha256 = "0nv9q3j9cja8c6d7ac8fzb8zf82zz1z77f8cxvn3vxjki7fhlavm"; 14 + vendorSha256 = "1fxbxkg7disndlmb065abnfn7sn79qclkcbizmrq49f064w1ijr4"; 15 15 16 16 doCheck = false; 17 17
+22
pkgs/development/tools/ginkgo/default.nix
··· 1 + { stdenv, buildGoModule, fetchFromGitHub }: 2 + 3 + buildGoModule rec { 4 + pname = "ginkgo"; 5 + version = "1.14.0"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "onsi"; 9 + repo = "ginkgo"; 10 + rev = "v${version}"; 11 + sha256 = "0nwvz0pqk2jqscq88fhppad4flrr8avkxfgbci4xklbar4g8i32v"; 12 + }; 13 + vendorSha256 = "072amyw1ir18v9vk268j2y7dhw3lfwvxzvzsdqhnp50rxsa911bx"; 14 + doCheck = false; 15 + 16 + meta = with stdenv.lib; { 17 + description = "BDD Testing Framework for Go"; 18 + homepage = "https://github.com/onsi/ginkgo"; 19 + license = licenses.mit; 20 + maintainers = with maintainers; [ saschagrunert ]; 21 + }; 22 + }
+1 -1
pkgs/development/tools/gopls/default.nix
··· 1 - { stdenv, go, buildGoModule, fetchgit }: 1 + { stdenv, buildGoModule, fetchgit }: 2 2 3 3 buildGoModule rec { 4 4 pname = "gopls";
+2 -2
pkgs/development/tools/misc/terraform-ls/default.nix
··· 2 2 3 3 buildGoPackage rec { 4 4 pname = "terraform-ls"; 5 - version = "0.6.0"; 5 + version = "0.6.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "hashicorp"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "0bb6bpdjp9yzbxvc6mz22lawn41ay0frdpgbd7zrm8nkvspc0rl7"; 11 + sha256 = "0yhpxb9dkwi6rlabr0sd5rk15q0bin6yhww171jrzlnfl036l0sl"; 12 12 }; 13 13 14 14 goPackagePath = "github.com/hashicorp/terraform-ls";
+24
pkgs/development/tools/misc/terraformer/default.nix
··· 1 + { lib, buildGoModule, fetchFromGitHub }: 2 + 3 + buildGoModule rec { 4 + pname = "terraformer"; 5 + version = "0.8.8"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "GoogleCloudPlatform"; 9 + repo = pname; 10 + rev = version; 11 + sha256 = "1lzf30vpa0blbkz4ngnhrn3hpbqflqd4sni4bly9yqh4fnc44nvi"; 12 + }; 13 + 14 + vendorSha256 = "087448wkaw6jxv9d26hck4w3vdh06vcgywna6ydkqvxr0hp011b6"; 15 + 16 + subPackages = [ "." ]; 17 + 18 + meta = with lib; { 19 + description = "CLI tool to generate terraform files from existing infrastructure (reverse Terraform). Infrastructure to Code"; 20 + homepage = "https://github.com/GoogleCloudPlatform/terraformer"; 21 + license = licenses.asl20; 22 + maintainers = [ maintainers.marsam ]; 23 + }; 24 + }
+3 -3
pkgs/development/tools/rust/rust-analyzer/default.nix
··· 2 2 3 3 { 4 4 rust-analyzer-unwrapped = callPackage ./generic.nix rec { 5 - rev = "2020-08-17"; 5 + rev = "2020-08-24"; 6 6 version = "unstable-${rev}"; 7 - sha256 = "1lkqhaygl6wak3hypmn3zb2h0v4n082xbpaywmzqr53vhw678sp0"; 8 - cargoSha256 = "00a2fxq1kwybng3gp33lkad4c7wrz0gypigxkalqkyy4nbg3qil4"; 7 + sha256 = "11q5shrq55krgpj7rjfqw84131j5g55zyrwww3cxcbr8ndi3xdnf"; 8 + cargoSha256 = "15kjcgxmigm0lwbp8p0kdxax86ldjqq9q8ysj6khfhqd0173184n"; 9 9 }; 10 10 11 11 rust-analyzer = callPackage ./wrapper.nix {} {
+2 -2
pkgs/development/tools/skaffold/default.nix
··· 2 2 3 3 buildGoPackage rec { 4 4 pname = "skaffold"; 5 - version = "1.13.1"; 5 + version = "1.13.2"; 6 6 7 7 goPackagePath = "github.com/GoogleContainerTools/skaffold"; 8 8 subPackages = ["cmd/skaffold"]; ··· 19 19 owner = "GoogleContainerTools"; 20 20 repo = "skaffold"; 21 21 rev = "v${version}"; 22 - sha256 = "1v6napcpx8k45s8w55lbxahfc1p0qlvl597zgb4dzyg9w67fwnqk"; 22 + sha256 = "0xicf4bf52fnnwaimxrxv16x15lcmw12a5rrl0xjm4p059jnvy54"; 23 23 }; 24 24 25 25 nativeBuildInputs = [ installShellFiles ];
+2 -2
pkgs/games/osu-lazer/default.nix
··· 13 13 14 14 in stdenv.mkDerivation rec { 15 15 pname = "osu-lazer"; 16 - version = "2020.806.0"; 16 + version = "2020.820.0"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "ppy"; 20 20 repo = "osu"; 21 21 rev = version; 22 - sha256 = "BelmqcDnrGH84fTs6M0krwWz6SHn2hOm7y+PNEOOOZM="; 22 + sha256 = "0vszw0f5x0syshn8bnsbskxvknwpgbnm31kxwh1mfdr7pnxvw922"; 23 23 }; 24 24 25 25 patches = [ ./bypass-tamper-detection.patch ];
+18 -18
pkgs/games/osu-lazer/deps.nix
··· 281 281 }) 282 282 (fetchNuGet { 283 283 name = "Markdig"; 284 - version = "0.20.0"; 285 - sha256 = "19qhvyj59i8zcxblpl4vqabb55y5xrk3iipmb656mid1b1m4jfkn"; 284 + version = "0.21.1"; 285 + sha256 = "119v22rvg51ifg54r1ndf2bw7hv1lf5wn3cd04ccg8d7r8c0yhbk"; 286 286 }) 287 287 (fetchNuGet { 288 288 name = "Microsoft.Bcl.AsyncInterfaces"; ··· 306 306 }) 307 307 (fetchNuGet { 308 308 name = "Microsoft.CodeAnalysis.BannedApiAnalyzers"; 309 - version = "3.0.0"; 310 - sha256 = "19zfz84c1860na8qpkzv6va6d7dh1md9wkrb7c6x3brhjnj859hk"; 309 + version = "3.3.0"; 310 + sha256 = "04z03ir9sal5h9ha97isbh660jijslb8zfiaa48w2r2l6pabz5kd"; 311 311 }) 312 312 (fetchNuGet { 313 313 name = "Microsoft.CodeAnalysis.Common"; 314 - version = "3.6.0"; 315 - sha256 = "0i8x90700jr30j580mpawj6d90fngrb2zpkjjbn7f8r2p1mz75y7"; 314 + version = "3.7.0"; 315 + sha256 = "0882492nx6x68b0pkh3q5xaawz0b2l5x35r40722ignyjnvjydph"; 316 316 }) 317 317 (fetchNuGet { 318 318 name = "Microsoft.CodeAnalysis.CSharp"; 319 - version = "3.6.0"; 320 - sha256 = "0c44qp7lfpja6cq5nk7851qrswm2z1k2pnvsw43j9ybf10a27jrn"; 319 + version = "3.7.0"; 320 + sha256 = "0adw6rcag8wxydzyiyhls2mxaqkay5qlz25z1fxrlv5qnchqn0n5"; 321 321 }) 322 322 (fetchNuGet { 323 323 name = "Microsoft.CodeAnalysis.CSharp.Workspaces"; 324 - version = "3.6.0"; 325 - sha256 = "1zc9328invqqpisdljw5vpm1kk416prfczakakw1vwkv9r54sd73"; 324 + version = "3.7.0"; 325 + sha256 = "15rlz65wbky0yq7b9s8xwk68dgrhgsk4rj88q9pyjxbm5938vrav"; 326 326 }) 327 327 (fetchNuGet { 328 328 name = "Microsoft.CodeAnalysis.FxCopAnalyzers"; ··· 336 336 }) 337 337 (fetchNuGet { 338 338 name = "Microsoft.CodeAnalysis.Workspaces.Common"; 339 - version = "3.6.0"; 340 - sha256 = "176faadh1k9xcc8cc2qpkka9j1n426fdff1ax5ikmz2hbrspmigz"; 339 + version = "3.7.0"; 340 + sha256 = "00nm453w4n6kjsicmz5izvkf1ki9rp3xnc9n3y7a9b1g5sxg36fs"; 341 341 }) 342 342 (fetchNuGet { 343 343 name = "Microsoft.CodeAnalysis.Workspaces.MSBuild"; 344 - version = "3.6.0"; 345 - sha256 = "0hxs9x5gpi7yvqf46bxh9niipb0jif7ak5baxw5l920787vysdhc"; 344 + version = "3.7.0"; 345 + sha256 = "1sh8s7b16j06p3gmzsgwd8690vagah4908bpa3gyz2fxgfnj46ax"; 346 346 }) 347 347 (fetchNuGet { 348 348 name = "Microsoft.CodeQuality.Analyzers"; ··· 586 586 }) 587 587 (fetchNuGet { 588 588 name = "ppy.osu.Framework"; 589 - version = "2020.806.0"; 590 - sha256 = "1d4aprz81xbhk5addl1n7jwj8xxny51s6nvpn37alld0x6n7k8nv"; 589 + version = "2020.819.0"; 590 + sha256 = "1ghbbwpjjl0dp6gs1638v880hr7wwrn2jklqwbbckpx8g57bnq2m"; 591 591 }) 592 592 (fetchNuGet { 593 593 name = "ppy.osu.Framework.NativeLibs"; ··· 596 596 }) 597 597 (fetchNuGet { 598 598 name = "ppy.osu.Game.Resources"; 599 - version = "2020.731.0"; 600 - sha256 = "1q58c627p0yz6b2y4c1hrrr4l9hii418y1vk6hv24x1csdsf3x8p"; 599 + version = "2020.812.0"; 600 + sha256 = "0fsg47bsffvk16clwwwav4yly1ykn09pyap46dvdmsxhjrzkvzb7"; 601 601 }) 602 602 (fetchNuGet { 603 603 name = "ppy.osuTK.NS20";
+3 -3
pkgs/games/papermc/default.nix
··· 1 1 { stdenv, fetchurl, jre }: 2 2 let 3 - mcVersion = "1.15.2"; 4 - buildNum = "161"; 3 + mcVersion = "1.16.2"; 4 + buildNum = "141"; 5 5 jar = fetchurl { 6 6 url = "https://papermc.io/api/v1/paper/${mcVersion}/${buildNum}/download"; 7 - sha256 = "1jngj5djs1fjdj25wg9iszw0dsp56f386j8ydms7x4ky8s8kxyms"; 7 + sha256 = "1qhhnaysw9r73fpvj9qcmjah722a6a4s6g4cblna56n1hpz4lw1s"; 8 8 }; 9 9 in stdenv.mkDerivation { 10 10 pname = "papermc";
+2 -2
pkgs/games/shattered-pixel-dungeon/default.nix
··· 10 10 11 11 let 12 12 pname = "shattered-pixel-dungeon"; 13 - version = "0.8.2"; 13 + version = "0.8.2b"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "00-Evan"; 17 17 repo = "shattered-pixel-dungeon"; 18 18 rev = "v${version}"; 19 - sha256 = "1ra697237vnpx8nsy7dzk958vlyf6jpx1k5dpbr8ybg6vgc3kqx3"; 19 + sha256 = "02ksxm7iknxfc7l8dl2pr1kyhfmi7vkchz0lh46w3p5mqf82psfb"; 20 20 }; 21 21 22 22 postPatch = ''
+5
pkgs/misc/ghostscript/default.nix
··· 45 45 }; 46 46 47 47 patches = [ 48 + (fetchpatch { 49 + name = "CVE-2020-15900.patch"; 50 + url = "https://github.com/ArtifexSoftware/ghostpdl/commit/5d499272b95a6b890a1397e11d20937de000d31b.patch"; 51 + sha256 = "1nnnrn8q33x7nc8227ygc60f3mj4bjzrhj40sxp6dah58rb5x5jz"; 52 + }) 48 53 ./urw-font-files.patch 49 54 ./doc-no-ref.diff 50 55 # rebased version of upstream http://git.ghostscript.com/?p=ghostpdl.git;a=patch;h=1b4c3669a20c,
+11 -11
pkgs/os-specific/linux/kernel/hardened/patches.json
··· 1 1 { 2 2 "4.14": { 3 - "name": "linux-hardened-4.14.193.a.patch", 4 - "sha256": "0hxr4v6ph29p0916dh894aknna5qxszcpz5xrci81xla3i50vy9v", 5 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.14.193.a/linux-hardened-4.14.193.a.patch" 3 + "name": "linux-hardened-4.14.194.a.patch", 4 + "sha256": "07z3lr3mbm6c95d7fra2qp071n1c45f9241cl19zs63g00avi11p", 5 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.14.194.a/linux-hardened-4.14.194.a.patch" 6 6 }, 7 7 "4.19": { 8 - "name": "linux-hardened-4.19.140.a.patch", 9 - "sha256": "03y0kp89wka9bjw44y2jqralnwi7rjxbgm7wym1ad5yqd4q29l4d", 10 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.19.140.a/linux-hardened-4.19.140.a.patch" 8 + "name": "linux-hardened-4.19.141.a.patch", 9 + "sha256": "0yiqkkp17pf9r6nakpnqhvmf8awpzp5n27cmh15ril7vn1y71sxw", 10 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.19.141.a/linux-hardened-4.19.141.a.patch" 11 11 }, 12 12 "5.4": { 13 - "name": "linux-hardened-5.4.59.a.patch", 13 + "name": "linux-hardened-5.4.60.a.patch", 14 14 "sha256": "138kms73rlj5zmsb2ivjzz1jr5aa8y8pmwzx02c7j1qk08v82823", 15 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.59.a/linux-hardened-5.4.59.a.patch" 15 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.60.a/linux-hardened-5.4.60.a.patch" 16 16 }, 17 17 "5.7": { 18 - "name": "linux-hardened-5.7.16.a.patch", 19 - "sha256": "1fiyd6qsf8r84p05cxhwma7zwi81xyn9pl6yci93n583z8n1k2sw", 20 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.7.16.a/linux-hardened-5.7.16.a.patch" 18 + "name": "linux-hardened-5.7.17.a.patch", 19 + "sha256": "181b473y0hkw076hsndw6nfynr2yhcaypj48iqnk25hzcj40nnaz", 20 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.7.17.a/linux-hardened-5.7.17.a.patch" 21 21 } 22 22 }
+2 -2
pkgs/os-specific/linux/kernel/linux-5.8.nix
··· 3 3 with stdenv.lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "5.8"; 6 + version = "5.8.3"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "1xgibkwb1yfl6qdlbxyagai0qc1pk5ark7giz1512hh6ma353xz7"; 16 + sha256 = "0y8prifvkywqsx5lk80bh31m505vinmicpvdrirgg0c9scg7x8lf"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-testing.nix
··· 3 3 with stdenv.lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "5.9-rc1"; 6 + version = "5.9-rc2"; 7 7 extraMeta.branch = "5.9"; 8 8 9 9 # modDirVersion needs to be x.y.z, will always add .0 ··· 11 11 12 12 src = fetchurl { 13 13 url = "https://git.kernel.org/torvalds/t/linux-${version}.tar.gz"; 14 - sha256 = "08x6s4wydbrr4rqq3zfxq6qmnha4ikn7m9rmdqd42hmxl2ynqxla"; 14 + sha256 = "0mdh6gsd305kcgfqzyfgl5m886asjm5030ahg63gyias3ywzn5wd"; 15 15 }; 16 16 17 17 # Should the testing kernels ever be built on Hydra?
-20
pkgs/os-specific/linux/rfkill/default.nix
··· 1 - { stdenv, fetchurl }: 2 - 3 - stdenv.mkDerivation rec { 4 - name = "rfkill-0.5"; 5 - 6 - src = fetchurl { 7 - url = "mirror://kernel/software/network/rfkill/${name}.tar.bz2"; 8 - sha256 = "01zs7p9kd92pxgcgwl5w46h3iyx4acfg6m1j5fgnflsaa350q5iy"; 9 - }; 10 - 11 - makeFlags = [ "PREFIX=$(out)" ]; 12 - 13 - meta = with stdenv.lib; { 14 - homepage = "http://wireless.kernel.org/en/users/Documentation/rfkill"; 15 - description = "A tool to query, enable and disable wireless devices"; 16 - platforms = platforms.linux; 17 - maintainers = [ maintainers.eelco ]; 18 - license = licenses.isc; 19 - }; 20 - }
+5 -8
pkgs/servers/etcd/3.4.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "etcd"; 5 - version = "3.4.10"; 6 - 7 - #vendorSha256 = null; revert to `null` for > 3.4.10 8 - 9 - vendorSha256 = "1fhrycl8m8ddb7mwasbyfiwrl4d9lfdk7zd3mxb7ahkipdp2c94z"; 10 - 11 - doCheck = false; 5 + version = "3.4.13"; 12 6 13 7 deleteVendor = true; 8 + vendorSha256 = "0jlnh4789xa2dhbyp33k9r278kc588ykggamnnfqivb27s2646bc"; 9 + 10 + doCheck = false; 14 11 15 12 src = fetchFromGitHub { 16 13 owner = "etcd-io"; 17 14 repo = "etcd"; 18 15 rev = "v${version}"; 19 - sha256 = "07kzgh2rm7kzprlpnay6fq8lziiyhiqyikf1qjx8gjjsdsjy180f"; 16 + sha256 = "0bvky593241i60qf6793sxzsxwfl3f56cgscnva9f2jfhk157wmy"; 20 17 }; 21 18 22 19 buildPhase = ''
+2 -2
pkgs/servers/http/nginx/mainline.nix
··· 1 1 { callPackage, ... }@args: 2 2 3 3 callPackage ./generic.nix args { 4 - version = "1.19.0"; 5 - sha256 = "1j1n3rlvan6l9j3vw8axbbdm96w7s0x6ygmgqvbplzfd3wbid9j4"; 4 + version = "1.19.2"; 5 + sha256 = "0wr4ss4gld7x717m4j3a6l6f7ijblrrd55y563lkwhvr7sqpn7vw"; 6 6 }
+93 -46
pkgs/servers/http/nginx/modules.nix
··· 4 4 5 5 http_proxy_connect_module_generic = patchName: rec { 6 6 src = fetchFromGitHub { 7 + name = "http_proxy_connect_module_generic"; 7 8 owner = "chobits"; 8 9 repo = "ngx_http_proxy_connect_module"; 9 - rev = "002f8f9ef15562dc3691b977134518ad216d7a90"; 10 - sha256 = "163wg0xb7w5mwh6wrfarzcgaf6c7gb5qydgpi2wk35k551f7286s"; 10 + rev = "96ae4e06381f821218f368ad0ba964f87cbe0266"; 11 + sha256 = "1nc7z31i7x9dzp67kzgvs34hs6ps749y26wcpi3wf5mm63i803rh"; 11 12 }; 12 13 13 14 patches = [ ··· 19 18 in 20 19 21 20 { 21 + fastcgi-cache-purge = throw "fastcgi-cache-purge was renamed to cache-purge"; 22 + ngx_aws_auth = throw "fastcgi-cache-purge was renamed to aws-auth"; 23 + 24 + aws-auth = { 25 + src = fetchFromGitHub { 26 + name = "aws-auth"; 27 + owner = "anomalizer"; 28 + repo = "ngx_aws_auth"; 29 + rev = "2.1.1"; 30 + sha256 = "10z67g40w7wpd13fwxyknkbg3p6hn61i4v8xw6lh27br29v1y6h9"; 31 + }; 32 + }; 33 + 22 34 brotli = { 23 35 src = let gitsrc = pkgs.fetchFromGitHub { 36 + name = "brotli"; 24 37 owner = "google"; 25 38 repo = "ngx_brotli"; 26 - rev = "e505dce68acc190cc5a1e780a3b0275e39f160ca"; 27 - sha256 = "00j48lffki62y1nmjyy81iklw5nlyzvrjy3z04qch4fp3p57hwla"; 39 + rev = "25f86f0bac1101b6512135eac5f93c49c63609e3"; 40 + sha256 = "02hfvfa6milj40qc2ikpb9f95sxqvxk4hly3x74kqhysbdi06hhv"; 28 41 }; in pkgs.runCommandNoCC "ngx_brotli-src" {} '' 29 42 cp -a ${gitsrc} $out 30 43 substituteInPlace $out/filter/config \ ··· 47 32 inputs = [ pkgs.brotli ]; 48 33 }; 49 34 35 + cache-purge = { 36 + src = fetchFromGitHub { 37 + name = "cache-purge"; 38 + owner = "nginx-modules"; 39 + repo = "ngx_cache_purge"; 40 + rev = "2.5.1"; 41 + sha256 = "0va4jz36mxj76nmq05n3fgnpdad30cslg7c10vnlhdmmic9vqncd"; 42 + }; 43 + }; 44 + 50 45 coolkit = { 51 46 src = fetchFromGitHub { 47 + name = "coolkit"; 52 48 owner = "FRiCKLE"; 53 49 repo = "ngx_coolkit"; 54 50 rev = "0.2"; ··· 69 43 70 44 dav = { 71 45 src = fetchFromGitHub { 46 + name = "dav"; 72 47 owner = "arut"; 73 48 repo = "nginx-dav-ext-module"; 74 49 rev = "v3.0.0"; ··· 80 53 81 54 develkit = { 82 55 src = fetchFromGitHub { 83 - owner = "simpl"; 56 + name = "develkit"; 57 + owner = "vision5"; 84 58 repo = "ngx_devel_kit"; 85 - rev = "v0.3.1rc1"; 86 - sha256 = "00vqvpx67qra2hr85hkvj1dha4h7x7v9sblw7w1df11nq1gzsdbb"; 59 + rev = "v0.3.1"; 60 + sha256 = "1c5zfpvm0hrd9lp8rasmw79dnr2aabh0i6y11wzb783bp8m3p2sq"; 87 61 }; 88 62 }; 89 63 90 64 echo = { 91 65 src = fetchFromGitHub { 66 + name = "echo"; 92 67 owner = "openresty"; 93 68 repo = "echo-nginx-module"; 94 - rev = "v0.61"; 95 - sha256 = "0brjhhphi94ms4gia7za0mfx0png4jbhvq6j0nzjwp537iyiy23k"; 69 + rev = "v0.62"; 70 + sha256 = "0kr1y094yw1a9fyrf4w73ikq18w5ys463wza9n7yfl77xdwirnvl"; 96 71 }; 97 72 }; 98 73 99 74 fancyindex = { 100 75 src = fetchFromGitHub { 76 + name = "fancyindex"; 101 77 owner = "aperezdc"; 102 78 repo = "ngx-fancyindex"; 103 79 rev = "v0.4.4"; ··· 108 78 }; 109 79 }; 110 80 111 - fastcgi-cache-purge = { 112 - src = fetchFromGitHub { 113 - owner = "nginx-modules"; 114 - repo = "ngx_cache_purge"; 115 - rev = "2.5"; 116 - sha256 = "1f4kxagzvz10vqbcjwi57wink6xw3s1h7wlrrlrlpkmhfbf9704y"; 117 - }; 118 - }; 119 - 120 81 fluentd = { 121 82 src = fetchFromGitHub { 83 + name = "fluentd"; 122 84 owner = "fluent"; 123 85 repo = "nginx-fluentd-module"; 124 86 rev = "8af234043059c857be27879bc547c141eafd5c13"; ··· 118 96 }; 119 97 }; 120 98 121 - http_proxy_connect_module_v16 = http_proxy_connect_module_generic "proxy_connect_rewrite_101504" // { 122 - supports = with lib.versions; version: major version == "1" && minor version == "16"; 99 + http_proxy_connect_module_v18 = http_proxy_connect_module_generic "proxy_connect_rewrite_1018" // { 100 + supports = with lib.versions; version: major version == "1" && minor version == "18"; 101 + }; 102 + 103 + http_proxy_connect_module_v19 = http_proxy_connect_module_generic "proxy_connect_rewrite_1018" // { 104 + supports = with lib.versions; version: major version == "1" && minor version == "19"; 123 105 }; 124 106 125 107 ipscrub = { 126 108 src = fetchFromGitHub { 109 + name = "ipscrub"; 127 110 owner = "masonicboom"; 128 111 repo = "ipscrub"; 129 112 rev = "v1.0.1"; ··· 139 112 140 113 limit-speed = { 141 114 src = fetchFromGitHub { 115 + name = "limit-speed"; 142 116 owner = "yaoweibin"; 143 117 repo = "nginx_limit_speed_module"; 144 118 rev = "f77ad4a56fbb134878e75827b40cf801990ed936"; ··· 149 121 150 122 live ={ 151 123 src = fetchFromGitHub { 124 + name = "live"; 152 125 owner = "arut"; 153 126 repo = "nginx-live-module"; 154 127 rev = "5e4a1e3a718e65e5206c24eba00d42b0d1c4b7dd"; ··· 159 130 160 131 lua = { 161 132 src = fetchFromGitHub { 133 + name = "lua"; 162 134 owner = "openresty"; 163 135 repo = "lua-nginx-module"; 164 136 rev = "v0.10.15"; ··· 175 145 176 146 lua-upstream = { 177 147 src = fetchFromGitHub { 148 + name = "lua-upstream"; 178 149 owner = "openresty"; 179 150 repo = "lua-upstream-nginx-module"; 180 151 rev = "v0.07"; ··· 195 164 196 165 modsecurity-nginx = { 197 166 src = fetchFromGitHub { 167 + name = "modsecurity-nginx"; 198 168 owner = "SpiderLabs"; 199 169 repo = "ModSecurity-nginx"; 200 - rev = "v1.0.0"; 201 - sha256 = "0zzpdqhbdqqy8kjkszv0mrq6136ah9v3zwr1jbh312j8izmzdyi7"; 170 + rev = "v1.0.1"; 171 + sha256 = "0cbb3g3g4v6q5zc6an212ia5kjjad62bidnkm8b70i4qv1615pzf"; 202 172 }; 203 173 inputs = [ pkgs.curl pkgs.geoip pkgs.libmodsecurity pkgs.libxml2 pkgs.lmdb pkgs.yajl ]; 204 174 }; 205 175 206 176 moreheaders = { 207 177 src = fetchFromGitHub { 178 + name = "moreheaders"; 208 179 owner = "openresty"; 209 180 repo = "headers-more-nginx-module"; 210 181 rev = "v0.33"; ··· 216 183 217 184 mpeg-ts ={ 218 185 src = fetchFromGitHub { 186 + name = "mpeg-ts"; 219 187 owner = "arut"; 220 188 repo = "nginx-ts-module"; 221 189 rev = "v0.1.1"; ··· 226 192 227 193 naxsi ={ 228 194 src = fetchFromGitHub { 195 + name = "naxsi"; 229 196 owner = "nbs-system"; 230 197 repo = "naxsi"; 231 - rev = "0.56"; 232 - sha256 = "12kn6wbl8xqc19fi05ffprqps4pplg4a6i1cf01xc0d6brx1fg8v"; 198 + rev = "07a056ccd36bc3c5c40dc17991db226cb8cf6241"; 199 + sha256 = "1kdqy7by6ha2pl9lkkjxh4qrwcsrj2alm8fl129831h5y5xy8qx2"; 233 200 } + "/naxsi_src"; 234 - }; 235 - 236 - ngx_aws_auth = { 237 - src = fetchFromGitHub { 238 - owner = "anomalizer"; 239 - repo = "ngx_aws_auth"; 240 - rev = "2.1.1"; 241 - sha256 = "10z67g40w7wpd13fwxyknkbg3p6hn61i4v8xw6lh27br29v1y6h9"; 242 - }; 243 201 }; 244 202 245 203 opentracing = { 246 204 src = 247 205 let src' = fetchFromGitHub { 206 + name = "opentracing"; 248 207 owner = "opentracing-contrib"; 249 208 repo = "nginx-opentracing"; 250 - rev = "v0.7.0"; 251 - sha256 = "16jzxhhsyfjaxb50jy5py9ppscidfx1shvc29ihldp0zs6d8khma"; 209 + rev = "v0.9.0"; 210 + sha256 = "02rf1909grbhvs9mjxrv7pwgbf7b8rpjw7j8rpwxag2rgvlsic3g"; 252 211 }; 253 212 in "${src'}/opentracing"; 254 213 inputs = [ pkgs.opentracing-cpp ]; ··· 252 225 version = pkgs.psol.version; 253 226 254 227 moduleSrc = fetchFromGitHub { 228 + name = "pagespeed"; 255 229 owner = "pagespeed"; 256 230 repo = "ngx_pagespeed"; 257 231 rev = "v${version}-stable"; ··· 281 253 282 254 pam = { 283 255 src = fetchFromGitHub { 256 + name = "pam"; 284 257 owner = "stogh"; 285 258 repo = "ngx_http_auth_pam_module"; 286 - rev = "v1.5.1"; 287 - sha256 = "031q006bcv10dzxi3mzamqiyg14p48v0bzd5mrwz073pbf0ba2fl"; 259 + rev = "v1.5.2"; 260 + sha256 = "06nydxk82rc9yrw4408nakb197flxh4z1yv935crg65fn9706rl7"; 288 261 }; 289 262 inputs = [ pkgs.pam ]; 290 263 }; 291 264 292 265 pinba = { 293 266 src = fetchFromGitHub { 267 + name = "pinba"; 294 268 owner = "tony2001"; 295 269 repo = "ngx_http_pinba_module"; 296 270 rev = "28131255d4797a7e2f82a6a35cf9fc03c4678fe6"; ··· 302 272 303 273 push-stream ={ 304 274 src = fetchFromGitHub { 275 + name = "push-stream"; 305 276 owner = "wandenberg"; 306 277 repo = "nginx-push-stream-module"; 307 - rev = "0.5.4"; 308 - sha256 = "0izn7lqrp2zfl738aqa9i8c5lba97wkhcnqg8qbw3ipp5cysb2hr"; 278 + rev = "1cdc01521ed44dc614ebb5c0d19141cf047e1f90"; 279 + sha256 = "0ijka32b37dl07k2jl48db5a32ix43jaczrpjih84cvq8yph0jjr"; 309 280 }; 310 281 }; 311 282 312 283 rtmp ={ 313 284 src = fetchFromGitHub { 285 + name = "rtmp"; 314 286 owner = "arut"; 315 287 repo = "nginx-rtmp-module"; 316 288 rev = "v1.2.1"; ··· 322 290 323 291 set-misc = { 324 292 src = fetchFromGitHub { 293 + name = "set-misc"; 325 294 owner = "openresty"; 326 295 repo = "set-misc-nginx-module"; 327 296 rev = "v0.32"; ··· 332 299 333 300 shibboleth = { 334 301 src = fetchFromGitHub { 302 + name = "shibboleth"; 335 303 owner = "nginx-shib"; 336 304 repo = "nginx-http-shibboleth"; 337 - rev = "48b70d87bf7796d7813813a837e52b3a86e6f6f4"; 338 - sha256 = "0k8xcln5sf0m4r0m550dkhl07zhncp285dpysk6r4v6vqzqmhzdc"; 305 + rev = "5eadab80b2f5940d8873398bca000d93d3f0cf27"; 306 + sha256 = "1l0h3ic9mfsci89d0k5q3igkfpzq052ia25xj5hc8fq388yrhpap"; 339 307 }; 340 308 }; 341 309 342 310 sla = { 343 311 src = fetchFromGitHub { 312 + name = "sla"; 344 313 owner = "goldenclone"; 345 314 repo = "nginx-sla"; 346 315 rev = "7778f0125974befbc83751d0e1cadb2dcea57601"; ··· 352 317 353 318 slowfs-cache = { 354 319 src = fetchFromGitHub { 320 + name = "slowfs-cache"; 355 321 owner = "FRiCKLE"; 356 322 repo = "ngx_slowfs_cache"; 357 323 rev = "1.10"; ··· 362 326 363 327 sorted-querystring = { 364 328 src = fetchFromGitHub { 329 + name = "sorted-querystring"; 365 330 owner = "wandenberg"; 366 331 repo = "nginx-sorted-querystring-module"; 367 332 rev = "0.3"; ··· 372 335 373 336 statsd = { 374 337 src = fetchFromGitHub { 375 - owner = "apcera"; 338 + name = "statsd"; 339 + owner = "harvesthq"; 376 340 repo = "nginx-statsd"; 377 341 rev = "b970e40467a624ba710c9a5106879a0554413d15"; 378 342 sha256 = "1x8j4i1i2ahrr7qvz03vkldgdjdxi6mx75mzkfizfcc8smr4salr"; ··· 382 344 383 345 stream-sts = { 384 346 src = fetchFromGitHub { 347 + name = "stream-sts"; 385 348 owner = "vozlt"; 386 349 repo = "nginx-module-stream-sts"; 387 350 rev = "v0.1.1"; ··· 392 353 393 354 sts = { 394 355 src = fetchFromGitHub { 356 + name = "sts"; 395 357 owner = "vozlt"; 396 358 repo = "nginx-module-sts"; 397 359 rev = "v0.1.1"; ··· 402 362 403 363 subsFilter = { 404 364 src = fetchFromGitHub { 365 + name = "subsFilter"; 405 366 owner = "yaoweibin"; 406 367 repo = "ngx_http_substitutions_filter_module"; 407 - rev = "bc58cb11844bc42735bbaef7085ea86ace46d05b"; 408 - sha256 = "1q5hr3sqys4f365gzjci549rn9ylhgj4xb29ril04zr5vkhzlnar"; 368 + rev = "b8a71eacc7f986ba091282ab8b1bbbc6ae1807e0"; 369 + sha256 = "027jxzx66q9a6ycn47imjh40xmnqr0z423lz0ds3w4rf1c2x130f"; 409 370 }; 410 371 }; 411 372 412 373 sysguard = { 413 374 src = fetchFromGitHub { 375 + name = "sysguard"; 414 376 owner = "vozlt"; 415 377 repo = "nginx-module-sysguard"; 416 378 rev = "e512897f5aba4f79ccaeeebb51138f1704a58608"; ··· 422 380 423 381 upstream-check = { 424 382 src = fetchFromGitHub { 383 + name = "upstream-check"; 425 384 owner = "yaoweibin"; 426 385 repo = "nginx_upstream_check_module"; 427 - rev = "007f76f7adbcbd6abd9352502af1a4ae463def85"; 428 - sha256 = "1qcg7c9rcl70wr1qf188shnn9s2f7cxnlw05s6scbvlgnf6ik6in"; 386 + rev = "e538034b6ad7992080d2403d6d3da56e4f7ac01e"; 387 + sha256 = "06y7k04072xzqyqyb08m0vaaizkp4rfwm0q7i735imbzw2rxb74l"; 429 388 }; 430 389 }; 431 390 432 391 upstream-tarantool = { 433 392 src = fetchFromGitHub { 393 + name = "upstream-tarantool"; 434 394 owner = "tarantool"; 435 395 repo = "nginx_upstream_module"; 436 396 rev = "v2.7.1"; ··· 443 399 444 400 url = { 445 401 src = fetchFromGitHub { 402 + name = "url"; 446 403 owner = "vozlt"; 447 404 repo = "nginx-module-url"; 448 405 rev = "9299816ca6bc395625c3683fbd2aa7b916bfe91e"; ··· 453 408 454 409 video-thumbextractor = { 455 410 src = fetchFromGitHub { 411 + name = "video-thumbextractor"; 456 412 owner = "wandenberg"; 457 413 repo = "nginx-video-thumbextractor-module"; 458 414 rev = "0.9.0"; ··· 464 418 465 419 vts = { 466 420 src = fetchFromGitHub { 421 + name = "vts"; 467 422 owner = "vozlt"; 468 423 repo = "nginx-module-vts"; 469 424 rev = "v0.1.18";
-97
pkgs/shells/rssh/default.nix
··· 1 - # CAVEATS: 2 - # - Have only tested this with rsync, scp, and sftp. cvs support should work, but chroot integration is unlikely to function without further work 3 - # - It is compiled without rdist support because rdist is ludicrously ancient (and not already in nixpkgs) 4 - 5 - { stdenv, fetchurl, openssh, rsync, cvs }: 6 - 7 - stdenv.mkDerivation rec { 8 - pname = "rssh"; 9 - version = "2.3.4"; 10 - 11 - src = fetchurl { 12 - url = "mirror://sourceforge/rssh/rssh/${version}/${pname}-${version}.tar.gz"; 13 - sha256 = "f30c6a760918a0ed39cf9e49a49a76cb309d7ef1c25a66e77a41e2b1d0b40cd9"; 14 - }; 15 - 16 - patches = [ 17 - ./fix-config-path.patch 18 - 19 - # Patches from AUR 20 - (fetchurl { 21 - url = "https://aur.archlinux.org/cgit/aur.git/plain/0001-fail-logging.patch?h=rssh"; 22 - name = "0001-fail-logging.patch"; 23 - sha256 = "d30f2f4fdb1b57f94773f5b0968a4da3356b14a040efe69ec1e976c615035c65"; 24 - }) 25 - (fetchurl { 26 - url = "https://aur.archlinux.org/cgit/aur.git/plain/0002-info-to-debug.patch?h=rssh"; 27 - name = "0002-info-to-debug.patch"; 28 - sha256 = "86f6ecf34f62415b0d6204d4cbebc47322dc2ec71732d06aa27758e35d688fcd"; 29 - }) 30 - (fetchurl { 31 - url = "https://aur.archlinux.org/cgit/aur.git/plain/0003-man-page-spelling.patch?h=rssh"; 32 - name = "0003-man-page-spelling.patch"; 33 - sha256 = "455b3bbccddf1493999d00c2cd46e62930ef4fd8211e0b7d3a89d8010d6a5431"; 34 - }) 35 - (fetchurl { 36 - url = "https://aur.archlinux.org/cgit/aur.git/plain/0004-mkchroot.patch?h=rssh"; 37 - name = "0004-mkchroot.patch"; 38 - sha256 = "f7fd8723d2aa94e64e037c13c2f263a52104af680ab52bfcaea73dfa836457c2"; 39 - }) 40 - (fetchurl { 41 - url = "https://aur.archlinux.org/cgit/aur.git/plain/0005-mkchroot-arch.patch?h=rssh"; 42 - name = "0005-mkchroot-arch.patch"; 43 - sha256 = "ac8894c4087a063ae8267d2fdfcde69c2fe6b67a8ff5917e4518b8f73f08ba3f"; 44 - }) 45 - (fetchurl { 46 - url = "https://aur.archlinux.org/cgit/aur.git/plain/0006-mkchroot-symlink.patch?h=rssh"; 47 - name = "0006-mkchroot-symlink.patch"; 48 - sha256 = "bce98728cb9b55c92182d4901c5f9adf49376a07c5603514b0004e3d1c85e9c7"; 49 - }) 50 - (fetchurl { 51 - url = "https://aur.archlinux.org/cgit/aur.git/plain/0007-destdir.patch?h=rssh"; 52 - name = "0007-destdir.patch"; 53 - sha256 = "7fa03644f81dc37d77cc7e2cad994f17f91b2b8a49b1a74e41030a4ac764385e"; 54 - }) 55 - (fetchurl { 56 - url = "https://aur.archlinux.org/cgit/aur.git/plain/0008-rsync-protocol.patch?h=rssh"; 57 - name = "0008-rsync-protocol.patch"; 58 - sha256 = "0c772afe9088eeded129ead86775ef18e58c318bbc58fc3e2585e7ff09cc5e91"; 59 - }) 60 - ]; 61 - 62 - # Run this after to avoid conflict with patches above 63 - postPatch = '' 64 - sed -i '/chmod u+s/d' Makefile.in 65 - ''; 66 - 67 - 68 - buildInputs = [ openssh rsync cvs ]; 69 - 70 - configureFlags = [ 71 - "--with-sftp-server=${openssh}/libexec/sftp-server" 72 - "--with-scp=${openssh}/bin/scp" 73 - "--with-rsync=${rsync}/bin/rsync" 74 - "--with-cvs=${cvs}/bin/cvs" 75 - ]; 76 - 77 - 78 - meta = with stdenv.lib; { 79 - description = "A restricted shell for use with OpenSSH, allowing only scp and/or sftp"; 80 - longDescription = '' 81 - rssh also includes support for rsync and cvs. For example, if you have a server which you only want to allow users to copy files off of via scp, without providing shell access, you can use rssh to do that. 82 - ''; 83 - homepage = "http://www.pizzashack.org/rssh/"; 84 - license = licenses.bsd2; 85 - platforms = platforms.linux; 86 - maintainers = with maintainers; [ arobyn ]; 87 - knownVulnerabilities = [ 88 - "CVE-2019-1000018" 89 - "CVE-2019-3463" 90 - "CVE-2019-3464" 91 - ]; 92 - }; 93 - 94 - passthru = { 95 - shellPath = "/bin/rssh"; 96 - }; 97 - }
-12
pkgs/shells/rssh/fix-config-path.patch
··· 1 - diff -Naur rssh-2.3.4/Makefile.in rssh-2.3.4-fixed/Makefile.in 2 - --- rssh-2.3.4/Makefile.in 2012-11-27 11:19:34.000000000 +1100 3 - +++ rssh-2.3.4-fixed/Makefile.in 2015-11-11 21:13:58.516651742 +1100 4 - @@ -186,7 +186,7 @@ 5 - sysconfdir = @sysconfdir@ 6 - target_alias = @target_alias@ 7 - AUTOMAKE_OPTIONS = nostdinc 8 - -ourdefs = -DPATH_RSSH_CONFIG=\"@sysconfdir@/rssh.conf\" -DPATH_CHROOT_HELPER=\"@libexecdir@/rssh_chroot_helper\" 9 - +ourdefs = -DPATH_RSSH_CONFIG=\"/etc/rssh.conf\" -DPATH_CHROOT_HELPER=\"@libexecdir@/rssh_chroot_helper\" 10 - ourflags = @defcflags@ @static@ 11 - AM_CFLAGS = $(ourflags) 12 - nodist_rssh_SOURCES = main.c pathnames.h config.h
+3 -3
pkgs/shells/zsh/oh-my-zsh/default.nix
··· 4 4 { stdenv, fetchgit }: 5 5 6 6 stdenv.mkDerivation rec { 7 - version = "2020-08-20"; 7 + version = "2020-08-24"; 8 8 pname = "oh-my-zsh"; 9 - rev = "03b6a72576cb0f0b53abde25d409e8026d5c4ee9"; 9 + rev = "cfb86cd08d3b24fd4b59d0d35b3af1f589c891fa"; 10 10 11 11 src = fetchgit { inherit rev; 12 12 url = "https://github.com/ohmyzsh/ohmyzsh"; 13 - sha256 = "0bm043r3pffbv74drrv2xa66rsadrrsayscwwnfgp24svdmx7a6z"; 13 + sha256 = "0af37smv0bqw37bng2halzgszf8y3m2sxahdff54m16asm0py2cr"; 14 14 }; 15 15 16 16 pathsToLink = [ "/share/oh-my-zsh" ];
+3 -3
pkgs/tools/admin/eksctl/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "eksctl"; 5 - version = "0.25.0"; 5 + version = "0.26.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "weaveworks"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "1p3dzzbf840csqlgxyykmyg13z0nkzy4nkqq9y8jlpdm745vcryv"; 11 + sha256 = "1av5w32ia68j2xrw4m16mzm9jn6xlap93kwi8iqw0s6wgihzadds"; 12 12 }; 13 13 14 - vendorSha256 = "1msid4857wsh4qp1f7nyrmpzjv3sklh49cl7a9c1a3qr9m99w4yb"; 14 + vendorSha256 = "13sc4yrzgx2sm98whibfy2kjia3yy9cdvibvhbvg2lz2spprjb9v"; 15 15 16 16 doCheck = false; 17 17
+2 -2
pkgs/tools/backup/bup/default.nix
··· 5 5 6 6 assert par2Support -> par2cmdline != null; 7 7 8 - let version = "0.30.1"; in 8 + let version = "0.31"; in 9 9 10 10 with stdenv.lib; 11 11 ··· 17 17 repo = "bup"; 18 18 owner = "bup"; 19 19 rev = version; 20 - sha256 = "0z9rpmmi6mbm48ynd6izr0f8l3cklfyar6gjy0c8z9zal1ac9r55"; 20 + sha256 = "03kmmdlgg0p5z39bhckkf91mmq55wghb93ghqvv9f9gaby1diw4z"; 21 21 }; 22 22 23 23 buildInputs = [
+4 -4
pkgs/tools/bluetooth/blueberry/default.nix
··· 8 8 , intltool 9 9 , pavucontrol 10 10 , python3Packages 11 - , rfkill 11 + , utillinux 12 12 , wrapGAppsHook 13 13 }: 14 14 ··· 34 34 cinnamon.xapps 35 35 gnome3.gnome-bluetooth 36 36 python3Packages.python 37 - rfkill 37 + utillinux 38 38 ]; 39 39 40 40 pythonPath = with python3Packages; [ ··· 68 68 --replace /usr/lib/blueberry $out/lib/blueberry \ 69 69 --replace /usr/share $out/share 70 70 substituteInPlace $out/lib/blueberry/rfkillMagic.py \ 71 - --replace /usr/bin/rfkill ${rfkill}/bin/rfkill \ 72 - --replace /usr/sbin/rfkill ${rfkill}/bin/rfkill \ 71 + --replace /usr/bin/rfkill ${utillinux}/bin/rfkill \ 72 + --replace /usr/sbin/rfkill ${utillinux}/bin/rfkill \ 73 73 --replace /usr/lib/blueberry $out/lib/blueberry 74 74 substituteInPlace $out/share/applications/blueberry.desktop \ 75 75 --replace Exec=blueberry Exec=$out/bin/blueberry
+2 -2
pkgs/tools/filesystems/avfs/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "avfs"; 5 - version = "1.1.2"; 5 + version = "1.1.3"; 6 6 src = fetchurl { 7 7 url = "mirror://sourceforge/avf/${version}/${pname}-${version}.tar.bz2"; 8 - sha256 = "035b6y49nzgswf5n70aph8pm48sbv9nqwlnp3wwbq892c39kk4xn"; 8 + sha256 = "1psh8k7g7rb0gn7aygbjv86kxyi9xq07barxksa99nnmq3lc2kjg"; 9 9 }; 10 10 11 11 nativeBuildInputs = [ pkgconfig ];
+2 -2
pkgs/tools/filesystems/bashmount/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "bashmount"; 5 - version = "4.3.0"; 5 + version = "4.3.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "jamielinux"; 9 9 repo = "bashmount"; 10 10 rev = version; 11 - sha256 = "1idjyl5dr8a72w3lg15qx03wgc5mj2ga2v2jkyb8v9gi5ahl03mn"; 11 + sha256 = "0pqjaib0qiwjq0ral5yjz4iq8hpaj9mqkhlihgfz0xigcn9lxwpf"; 12 12 }; 13 13 14 14 installPhase = ''
+3 -3
pkgs/tools/misc/chezmoi/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "chezmoi"; 5 - version = "1.8.4"; 5 + version = "1.8.5"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "twpayne"; 9 9 repo = "chezmoi"; 10 10 rev = "v${version}"; 11 - sha256 = "0m8ik01y1lag3mgg3g4rxvzndh86b972hv2702dqs28l5zy5h3mv"; 11 + sha256 = "16sv1kbd66rllnnl851y3x54wkl0p7g0qsblprvfr9715svk1835"; 12 12 }; 13 13 14 - vendorSha256 = "18s60k7y64z12lx9lgj13fl1jh0aiqinwxrsz751d2iqhgdi2jja"; 14 + vendorSha256 = "1i9d672mzmb97s26n0v01m70g4viyl9pdk25haxr6ny4rab2wbi7"; 15 15 16 16 doCheck = false; 17 17
+27
pkgs/tools/misc/colorpicker/default.nix
··· 1 + { stdenv, fetchFromGitHub, pkg-config, gtk2 }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "colorpicker"; 5 + version = "git-2018-01-14"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "Ancurio"; 9 + repo = "colorpicker"; 10 + rev = "287676947e6e3b5b0cee784aeb1638cf22f0ce17"; 11 + sha256 = "1kj1dpb79llrfpszraaz6r7ci114zqi5rmqxwsvq2dnnpjxyi29r"; 12 + }; 13 + 14 + nativeBuildInputs = [ pkg-config ]; 15 + buildInputs = [ gtk2 ]; 16 + 17 + installPhase = '' 18 + install -Dt $out/bin colorpicker 19 + ''; 20 + 21 + meta = with stdenv.lib; { 22 + description = "Click on a pixel on your screen and print its color value in RGB"; 23 + homepage = "https://github.com/Ancurio/colorpicker"; 24 + maintainers = with maintainers; [ jb55 ]; 25 + license = licenses.mit; 26 + }; 27 + }
+2 -2
pkgs/tools/networking/chrony/default.nix
··· 5 5 6 6 stdenv.mkDerivation rec { 7 7 pname = "chrony"; 8 - version = "3.5"; 8 + version = "3.5.1"; 9 9 10 10 src = fetchurl { 11 11 url = "https://download.tuxfamily.org/chrony/${pname}-${version}.tar.gz"; 12 - sha256 = "1d9r2dhslll4kzdmxrj0qfgwq1b30d4l3s5cwr8yr93029dpj0jf"; 12 + sha256 = "19ywl8a3lb2id7lcna5hp2g4pjnfwdc9ihr0fk6i9m45vdq2za0v"; 13 13 }; 14 14 15 15 patches = [
+3 -3
pkgs/tools/networking/oneshot/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "oneshot"; 5 - version = "1.1.3"; 5 + version = "1.2.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "raphaelreyna"; 9 9 repo = "oneshot"; 10 10 rev = "v${version}"; 11 - sha256 = "14s5cl1g0rgqj7fj699xgz2kmkzym1zpckhv3h33ypsn4dq7gjh2"; 11 + sha256 = "11xmvqj7md970rjhkg1zj2w6yqpw6cj83aw37a82sfdn90kyhg9d"; 12 12 }; 13 13 14 - vendorSha256 = "0v53dsj0w959pmvk6v1i7rwlfd2y0vrghxlwkgidw0sf775qpgvy"; 14 + vendorSha256 = "1cxr96yrrmz37r542mc5376jll9lqjqm18k8761h9jqfbzmh9rkp"; 15 15 16 16 doCheck = false; 17 17
+25
pkgs/tools/networking/vpn-slice/default.nix
··· 1 + { lib, buildPythonApplication, python3Packages, fetchFromGitHub }: 2 + 3 + buildPythonApplication rec { 4 + pname = "vpn-slice"; 5 + version = "0.14"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "dlenski"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "1z2mdl3arzl95zrj4ir57f762gcimmmq5nk91j679cshxz4snxyr"; 12 + }; 13 + 14 + propagatedBuildInputs = with python3Packages; [ setproctitle dnspython ]; 15 + 16 + doCheck = false; 17 + 18 + meta = with lib; { 19 + homepage = "https://github.com/dlenski/vpn-slice"; 20 + description = 21 + "vpnc-script replacement for easy and secure split-tunnel VPN setup"; 22 + license = licenses.gpl3; 23 + maintainers = with maintainers; [ jdbaldry ]; 24 + }; 25 + }
+2 -2
pkgs/tools/system/bpytop/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "bpytop"; 5 - version = "1.0.13"; 5 + version = "1.0.21"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "aristocratos"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "1mrzl5ry5janifykp58gf5g7xw7522wvpp8hgq2hpfx52z6my1bj"; 11 + sha256 = "10cygn4srmzk1b279hrlp4rjbldkzq7354fhm0jbmd3rp15b454p"; 12 12 }; 13 13 14 14 buildInputs = [ makeWrapper ];
+2 -2
pkgs/tools/text/ugrep/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "ugrep"; 5 - version = "2.5.1"; 5 + version = "2.5.3"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "Genivia"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "0z62rqcvcz8iy6ig7y05gn90m0pn99jc0ll9b82kdbr257kz91r1"; 11 + sha256 = "16ly1dz8wxnjk6kc88dl2x0ijmzw5v87fhai9fnardwfmycn7ivc"; 12 12 }; 13 13 14 14 buildInputs = [ boost bzip2 lz4 pcre2 xz zlib ];
+2 -2
pkgs/tools/text/vale/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "vale"; 5 - version = "2.3.2"; 5 + version = "2.3.3"; 6 6 7 7 subPackages = [ "." ]; 8 8 outputs = [ "out" "data" ]; ··· 11 11 owner = "errata-ai"; 12 12 repo = "vale"; 13 13 rev = "v${version}"; 14 - sha256 = "0accs8ygg2h5hk8n4d5hs1fpxp9mlbzic6f4dwrygi463z7c3icc"; 14 + sha256 = "13b565l87nm3gpxxhw1bpjx7yqcgf5124k3wh7r149z38xyqc3wk"; 15 15 }; 16 16 17 17 vendorSha256 = null;
+2
pkgs/top-level/aliases.nix
··· 467 467 robomongo = robo3t; #added 2017-09-28 468 468 rocm-runtime-ext = throw "rocm-runtime-ext has been removed, since its functionality was added to rocm-runtime"; #added 2020-08-21 469 469 rssglx = rss-glx; #added 2015-03-25 470 + rssh = throw "rssh has been removed from nixpkgs: no upstream releases since 2012, several known CVEs"; # added 2020-08-25 470 471 recordmydesktop = throw "recordmydesktop has been removed from nixpkgs, as it's unmaintained and uses deprecated libraries"; # added 2019-12-10 471 472 gtk-recordmydesktop = throw "gtk-recordmydesktop has been removed from nixpkgs, as it's unmaintained and uses deprecated libraries"; # added 2019-12-10 472 473 qt-recordmydesktop = throw "qt-recordmydesktop has been removed from nixpkgs, as it's abandoned and uses deprecated libraries"; # added 2019-12-10 474 + rfkill = throw "rfkill has been removed, as it's included in util-linux"; # added 2020-08-23 473 475 rkt = throw "rkt was archived by upstream"; # added 2020-05-16 474 476 ruby_2_0_0 = throw "deprecated 2018-0213: use a newer version of ruby"; 475 477 ruby_2_1_0 = throw "deprecated 2018-0213: use a newer version of ruby";
+14 -6
pkgs/top-level/all-packages.nix
··· 180 180 181 181 colorz = callPackage ../tools/misc/colorz { }; 182 182 183 + colorpicker = callPackage ../tools/misc/colorpicker { }; 184 + 183 185 comedilib = callPackage ../development/libraries/comedilib { }; 184 186 185 187 cpu-x = callPackage ../applications/misc/cpu-x { }; ··· 3986 3984 gocryptfs = callPackage ../tools/filesystems/gocryptfs { }; 3987 3985 3988 3986 godot = callPackage ../development/tools/godot {}; 3989 - 3987 + 3990 3988 godot-headless = callPackage ../development/tools/godot/headless.nix { }; 3991 3989 3992 3990 godot-server = callPackage ../development/tools/godot/server.nix { }; ··· 7631 7629 7632 7630 vpnc = callPackage ../tools/networking/vpnc { }; 7633 7631 7632 + vpn-slice = python3Packages.callPackage ../tools/networking/vpn-slice { }; 7633 + 7634 7634 vp = callPackage ../applications/misc/vp { 7635 7635 # Enable next line for console graphics. Note that 7636 7636 # it requires `sixel` enabled terminals such as mlterm ··· 8261 8257 8262 8258 tcsh = callPackage ../shells/tcsh { }; 8263 8259 8264 - rssh = callPackage ../shells/rssh { }; 8265 - 8266 8260 rush = callPackage ../shells/rush { }; 8267 8261 8268 8262 xonsh = callPackage ../shells/xonsh { }; ··· 8469 8467 echo "--gcc-toolchain=${gccForLibs}" >> $out/nix-support/cc-cflags 8470 8468 ''; 8471 8469 }; 8470 + 8471 + copper = callPackage ../development/compilers/copper {}; 8472 8472 8473 8473 inherit (callPackages ../development/compilers/crystal { 8474 8474 inherit (llvmPackages_10) stdenv clang llvm; ··· 11453 11449 11454 11450 terraform-lsp = callPackage ../development/tools/misc/terraform-lsp { }; 11455 11451 terraform-ls = callPackage ../development/tools/misc/terraform-ls { }; 11452 + 11453 + terraformer = callPackage ../development/tools/misc/terraformer { }; 11456 11454 11457 11455 texinfo413 = callPackage ../development/tools/misc/texinfo/4.13a.nix { }; 11458 11456 texinfo4 = texinfo413; ··· 16839 16833 enableMDNS = true; 16840 16834 enableDomainController = true; 16841 16835 enableRegedit = true; 16842 - enableCephFS = true; 16836 + enableCephFS = !pkgs.stdenv.hostPlatform.isAarch64; 16843 16837 enableGlusterFS = true; 16844 16838 }); 16845 16839 ··· 17997 17991 17998 17992 iferr = callPackage ../development/tools/iferr { }; 17999 17993 17994 + ginkgo = callPackage ../development/tools/ginkgo { }; 17995 + 18000 17996 go-bindata = callPackage ../development/tools/go-bindata { }; 18001 17997 18002 17998 go-bindata-assetfs = callPackage ../development/tools/go-bindata-assetfs { }; ··· 18181 18173 raspberrypi-tools = callPackage ../os-specific/linux/firmware/raspberrypi/tools.nix {}; 18182 18174 18183 18175 regionset = callPackage ../os-specific/linux/regionset { }; 18184 - 18185 - rfkill = callPackage ../os-specific/linux/rfkill { }; 18186 18176 18187 18177 rfkill_udev = callPackage ../os-specific/linux/rfkill/udev.nix { }; 18188 18178 ··· 20907 20901 i3lock-color = callPackage ../applications/window-managers/i3/lock-color.nix { }; 20908 20902 20909 20903 i3lock-fancy = callPackage ../applications/window-managers/i3/lock-fancy.nix { }; 20904 + 20905 + i3lock-fancy-rapid = callPackage ../applications/window-managers/i3/lock-fancy-rapid.nix { }; 20910 20906 20911 20907 i3lock-pixeled = callPackage ../misc/screensavers/i3lock-pixeled { }; 20912 20908
-1
pkgs/top-level/make-tarball.nix
··· 40 40 checkPhase = '' 41 41 set -o pipefail 42 42 43 - export NIX_DB_DIR=$TMPDIR 44 43 export NIX_STATE_DIR=$TMPDIR 45 44 export NIX_PATH=nixpkgs=$TMPDIR/barf.nix 46 45 opts=(--option build-users-group "")
-1
pkgs/top-level/metrics.nix
··· 7 7 requiredSystemFeatures = [ "benchmark" ]; 8 8 } 9 9 '' 10 - export NIX_DB_DIR=$TMPDIR 11 10 export NIX_STATE_DIR=$TMPDIR 12 11 nix-store --init 13 12
+17
pkgs/top-level/perl-packages.nix
··· 4039 4039 }; 4040 4040 }; 4041 4041 4042 + CryptSodium = buildPerlPackage { 4043 + pname = "Crypt-Sodium"; 4044 + version = "0.11"; 4045 + src = fetchurl { 4046 + url = "mirror://cpan/authors/id/M/MG/MGREGORO/Crypt-Sodium-0.11.tar.gz"; 4047 + sha256 = "0y3c24zv4iwnvlf9zwxambk8ddram54fm6l1m5yhbskc0nhp6z4h"; 4048 + }; 4049 + NIX_CFLAGS_COMPILE = "-I${pkgs.libsodium.dev}/include"; 4050 + NIX_CFLAGS_LINK = "-L${pkgs.libsodium.out}/lib -lsodium"; 4051 + meta = { 4052 + homepage = "https://metacpan.org/release/Crypt-Sodium"; 4053 + description = "Perl bindings for libsodium (NaCL)"; 4054 + license = with stdenv.lib.licenses; [ artistic1 gpl1Plus ]; 4055 + maintainers = [ maintainers.sgo ]; 4056 + }; 4057 + }; 4058 + 4042 4059 CryptTwofish = buildPerlPackage { 4043 4060 pname = "Crypt-Twofish"; 4044 4061 version = "2.17";