Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)

Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
83d6b7a7 b8314a33

+345 -179
+22 -13
maintainers/maintainer-list.nix
··· 7219 7219 githubId = 51356; 7220 7220 name = "Mathieu Boespflug"; 7221 7221 }; 7222 + mbprtpmnr = { 7223 + name = "mbprtpmnr"; 7224 + email = "mbprtpmnr@pm.me"; 7225 + github = "mbprtpmnr"; 7226 + githubId = 88109321; 7227 + }; 7222 7228 mbrgm = { 7223 7229 email = "marius@yeai.de"; 7224 7230 github = "mbrgm"; ··· 9844 9850 github = "rraval"; 9845 9851 githubId = 373566; 9846 9852 name = "Ronuk Raval"; 9853 + }; 9854 + rski = { 9855 + name = "rski"; 9856 + email = "rom.skiad+nix@gmail.com"; 9857 + github = "rski"; 9858 + githubId = 2960312; 9847 9859 }; 9848 9860 rszibele = { 9849 9861 email = "richard@szibele.com"; ··· 12526 12538 fingerprint = "9270 66BD 8125 A45B 4AC4 0326 6180 7181 F60E FCB2"; 12527 12539 }]; 12528 12540 }; 12541 + yuu = { 12542 + email = "yuuyin@protonmail.com"; 12543 + github = "yuuyins"; 12544 + githubId = 86538850; 12545 + name = "Yuu Yin"; 12546 + keys = [{ 12547 + longkeyid = "rsa4096/0x416F303B43C20AC3"; 12548 + fingerprint = "9F19 3AE8 AA25 647F FC31 46B5 416F 303B 43C2 0AC3"; 12549 + }]; 12550 + }; 12529 12551 yvesf = { 12530 12552 email = "yvesf+nix@xapek.org"; 12531 12553 github = "yvesf"; ··· 12989 13011 github = "zupo"; 12990 13012 githubId = 311580; 12991 13013 }; 12992 - rski = { 12993 - name = "rski"; 12994 - email = "rom.skiad+nix@gmail.com"; 12995 - github = "rski"; 12996 - githubId = 2960312; 12997 - }; 12998 - mbprtpmnr = { 12999 - name = "mbprtpmnr"; 13000 - email = "mbprtpmnr@pm.me"; 13001 - github = "mbprtpmnr"; 13002 - githubId = 88109321; 13003 - }; 13004 - 13005 13014 }
+1 -1
nixos/modules/virtualisation/qemu-vm.nix
··· 560 560 package = 561 561 mkOption { 562 562 type = types.package; 563 - default = pkgs.qemu; 563 + default = pkgs.qemu_kvm; 564 564 example = "pkgs.qemu_test"; 565 565 description = "QEMU package to use."; 566 566 };
+1 -2
nixos/tests/all-tests.nix
··· 453 453 tinc = handleTest ./tinc {}; 454 454 tinydns = handleTest ./tinydns.nix {}; 455 455 tor = handleTest ./tor.nix {}; 456 - # traefik test relies on docker-containers 457 456 trac = handleTest ./trac.nix {}; 457 + # traefik test relies on docker-containers 458 458 traefik = handleTestOn ["x86_64-linux"] ./traefik.nix {}; 459 459 trafficserver = handleTest ./trafficserver.nix {}; 460 460 transmission = handleTest ./transmission.nix {}; ··· 466 466 turbovnc-headless-server = handleTest ./turbovnc-headless-server.nix {}; 467 467 tuxguitar = handleTest ./tuxguitar.nix {}; 468 468 ucarp = handleTest ./ucarp.nix {}; 469 - ucg = handleTest ./ucg.nix {}; 470 469 udisks2 = handleTest ./udisks2.nix {}; 471 470 unbound = handleTest ./unbound.nix {}; 472 471 unit-php = handleTest ./web-servers/unit-php.nix {};
+4
nixos/tests/chromium.nix
··· 80 80 binary = pname 81 81 # Add optional CLI options: 82 82 options = [] 83 + major_version = "${versions.major (getVersion chromiumPkg.name)}" 84 + if major_version > "95" and not pname.startswith("google-chrome"): 85 + # Workaround to avoid a GPU crash: 86 + options.append("--use-gl=swiftshader") 83 87 # Launch the process: 84 88 options.append("file://${startupHTML}") 85 89 machine.succeed(ru(f'ulimit -c unlimited; {binary} {shlex.join(options)} & disown'))
-18
nixos/tests/ucg.nix
··· 1 - import ./make-test-python.nix ({ pkgs, ... }: { 2 - name = "ucg"; 3 - meta = with pkgs.lib.maintainers; { 4 - maintainers = [ AndersonTorres ]; 5 - }; 6 - 7 - machine = { pkgs, ... }: { 8 - environment.systemPackages = [ pkgs.ucg ]; 9 - }; 10 - 11 - testScript = '' 12 - machine.succeed("echo 'Lorem ipsum dolor sit amet\n2.7182818284590' > /tmp/foo") 13 - assert "dolor" in machine.succeed("ucg 'dolor' /tmp/foo") 14 - assert "Lorem" in machine.succeed("ucg --ignore-case 'lorem' /tmp/foo") 15 - machine.fail("ucg --word-regexp '2718' /tmp/foo") 16 - machine.fail("ucg 'pisum' /tmp/foo") 17 - ''; 18 - })
+6 -9
pkgs/applications/audio/pocket-casts/default.nix
··· 1 - { lib, stdenv, fetchurl, dpkg, autoPatchelfHook, makeWrapper, electron_12, 2 - alsa-lib, gtk3, libXScrnSaver, libXtst, mesa, nss }: 3 - 4 - let 5 - # Using Electron 12 to solve errors regarding threading 6 - electron = electron_12; 1 + { lib, stdenv, fetchurl, dpkg, autoPatchelfHook, makeWrapper, electron 2 + , alsa-lib, gtk3, libXScrnSaver, libXtst, mesa, nss }: 7 3 8 - in stdenv.mkDerivation rec { 4 + stdenv.mkDerivation rec { 9 5 pname = "pocket-casts"; 10 6 version = "0.5.0"; 11 7 ··· 41 37 ''; 42 38 43 39 postFixup = '' 44 - substituteInPlace $out/share/applications/pocket-casts.desktop --replace '"/opt/Pocket Casts/pocket-casts"' $out/bin/pocket-casts 45 - substituteInPlace $out/share/applications/pocket-casts.desktop --replace '/usr/share/icons/hicolor/0x0/apps/pocket-casts.png' "pocket-casts" 40 + substituteInPlace $out/share/applications/pocket-casts.desktop \ 41 + --replace '"/opt/Pocket Casts/pocket-casts"' $out/bin/pocket-casts \ 42 + --replace '/usr/share/icons/hicolor/0x0/apps/pocket-casts.png' "pocket-casts" 46 43 makeWrapper ${electron}/bin/electron \ 47 44 $out/bin/pocket-casts \ 48 45 --add-flags $out/opt/pocket-casts/resources/app.asar
+2 -2
pkgs/applications/audio/qjackctl/default.nix
··· 5 5 }: 6 6 7 7 mkDerivation rec { 8 - version = "0.9.4"; 8 + version = "0.9.5"; 9 9 pname = "qjackctl"; 10 10 11 11 # some dependencies such as killall have to be installed additionally ··· 14 14 owner = "rncbc"; 15 15 repo = "qjackctl"; 16 16 rev = "${pname}_${lib.replaceChars ["."] ["_"] version}"; 17 - sha256 = "sha256-eZKrPQ07Z3pF5dArZ4QSclrRCaPHpPb8S5HANLUS9MM="; 17 + sha256 = "sha256-20oy3R0gbVXO3Da80cTYXu+BG8OfVNRLtAwHk8nRFJk="; 18 18 }; 19 19 20 20 buildInputs = [
+8 -5
pkgs/applications/blockchains/electrs/default.nix
··· 9 9 10 10 rustPlatform.buildRustPackage rec { 11 11 pname = "electrs"; 12 - version = "0.9.1"; 12 + version = "0.9.2"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "romanz"; 16 16 repo = pname; 17 17 rev = "v${version}"; 18 - hash = "sha256-GDO8iGntQncvdJiDMBJk9GrGF9JToasbLRzju3S0TS0="; 18 + hash = "sha256-dYKSc5fU66fu+GdTeWQBrIOJAiBGdYAOS7MCto98Xss="; 19 19 }; 20 20 21 - cargoHash = "sha256-Ms785+3Z4xEUW8FRRu1FIHk7HSWYLBThKlJDFjW6j0I="; 21 + cargoHash = "sha256-M4H5tUbo1f18kk8S53saebSnZhZFr8udw41BUNJbQVI=="; 22 22 23 23 # needed for librocksdb-sys 24 24 nativeBuildInputs = [ llvmPackages.clang ]; 25 25 LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib"; 26 26 27 + # temporarily disable dynamic linking, which broke with rocksdb update 6.23.3 -> 6.25.3 28 + # https://github.com/NixOS/nixpkgs/pull/143524#issuecomment-955053331 29 + # 27 30 # link rocksdb dynamically 28 - ROCKSDB_INCLUDE_DIR = "${rocksdb}/include"; 29 - ROCKSDB_LIB_DIR = "${rocksdb}/lib"; 31 + # ROCKSDB_INCLUDE_DIR = "${rocksdb}/include"; 32 + # ROCKSDB_LIB_DIR = "${rocksdb}/lib"; 30 33 31 34 buildInputs = lib.optionals stdenv.isDarwin [ Security ]; 32 35
+1
pkgs/applications/blockchains/electrs/update.sh
··· 21 21 trap "rm -rf $tmpdir" EXIT 22 22 23 23 git clone --depth 1 --branch v${version} -c advice.detachedHead=false https://github.com/romanz/electrs $repo 24 + git -C $repo checkout tags/v${version} 24 25 25 26 export GNUPGHOME=$tmpdir 26 27 echo
+2 -2
pkgs/applications/misc/qcad/default.nix
··· 17 17 18 18 mkDerivationWith stdenv.mkDerivation rec { 19 19 pname = "qcad"; 20 - version = "3.26.4.7"; 20 + version = "3.26.4.10"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "qcad"; 24 24 repo = "qcad"; 25 25 rev = "v${version}"; 26 - sha256 = "sha256-of0wsuHWM2mzGQmu9P4AHqXCHew45ywnnv/Al2o47ZM="; 26 + sha256 = "sha256-dWpItV18lYjdwUsn2wwA//AUHU5ICGfmih2cJWihvn0="; 27 27 }; 28 28 29 29 patches = [
+5 -5
pkgs/applications/science/logic/elan/0001-dynamically-patchelf-binaries.patch
··· 1 1 diff --git a/src/elan-dist/src/component/package.rs b/src/elan-dist/src/component/package.rs 2 - index fd9fe74..0fefa39 100644 2 + index c51e76d..d0a26d7 100644 3 3 --- a/src/elan-dist/src/component/package.rs 4 4 +++ b/src/elan-dist/src/component/package.rs 5 - @@ -50,11 +50,35 @@ fn unpack_without_first_dir<R: Read>(archive: &mut tar::Archive<R>, path: &Path) 6 - }; 7 - 8 - try!(entry.unpack(&full_path).chain_err(|| ErrorKind::ExtractingPackage)); 5 + @@ -56,11 +56,35 @@ fn unpack_without_first_dir<R: Read>(archive: &mut tar::Archive<R>, path: &Path) 6 + entry 7 + .unpack(&full_path) 8 + .chain_err(|| ErrorKind::ExtractingPackage)?; 9 9 + nix_patchelf_if_needed(&full_path); 10 10 } 11 11
+3 -3
pkgs/applications/science/logic/elan/default.nix
··· 7 7 8 8 rustPlatform.buildRustPackage rec { 9 9 pname = "elan"; 10 - version = "1.2.0"; 10 + version = "1.3.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "leanprover"; 14 14 repo = "elan"; 15 15 rev = "v${version}"; 16 - sha256 = "0q3gay0j45c6cmykbis14gmc7xm89d0gqyz7lnysl0pgr5k20j6b"; 16 + sha256 = "0gql015zb3y95v68kmv2dscz7fnh89x1shrqxxqk5a0jhd2z93n1"; 17 17 }; 18 18 19 - cargoSha256 = "1cklpi40fbiwz8m9p0cknmslpj0vwpr0x8j02vam6sng9dsb50i9"; 19 + cargoSha256 = "sha256-rL++3RstCSBMYFj9BeOo6gepfId/sje4ES3Wm+Mb4cQ="; 20 20 21 21 nativeBuildInputs = [ pkg-config makeWrapper ]; 22 22
+4 -1
pkgs/applications/window-managers/sway/wrapper.nix
··· 52 52 ${optionalString (extraOptions != []) "${concatMapStrings (x: " --add-flags " + x) extraOptions}"} 53 53 ''; 54 54 55 - passthru.providedSessions = [ "sway" ]; 55 + passthru = { 56 + inherit (sway.passthru) tests; 57 + providedSessions = [ "sway" ]; 58 + }; 56 59 57 60 inherit (sway) meta; 58 61 }
+3 -3
pkgs/development/compilers/qbe/default.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "qbe"; 9 - version = "unstable-2021-10-26"; 9 + version = "unstable-2021-10-28"; 10 10 11 11 src = fetchgit { 12 12 url = "git://c9x.me/qbe.git"; 13 - rev = "900805a8fe5cfa799966c4ef221524e967c44ca5"; 14 - sha256 = "sha256-ahUpG2JH3Ee6FUGfTYZZ2TLk5tF6ovvMxbsjZjVug2o="; 13 + rev = "0d68986b6f6aa046ab13776f39cc37b67b3477ba"; 14 + sha256 = "sha256-K1XpVoJoY8QuUdP5rKnlAs4yTn5jhh9LKZjHalliNKs="; 15 15 }; 16 16 17 17 makeFlags = [ "PREFIX=$(out)" ];
+48 -5
pkgs/development/libraries/crc32c/default.nix
··· 1 - { stdenv, lib, fetchFromGitHub, cmake, gflags 1 + { stdenv 2 + , lib 3 + , fetchFromGitHub 4 + , cmake 5 + , gflags 2 6 , staticOnly ? stdenv.hostPlatform.isStatic 3 7 }: 4 8 5 9 stdenv.mkDerivation rec { 6 10 pname = "crc32c"; 7 - version = "1.1.0"; 11 + version = "1.1.2"; 8 12 9 13 src = fetchFromGitHub { 10 14 owner = "google"; 11 15 repo = "crc32c"; 12 16 rev = version; 13 - sha256 = "1sazkis9rzbrklfrvk7jn1mqywnq4yghmzg94mxd153h8b1sb149"; 17 + sha256 = "0c383p7vkfq9rblww6mqxz8sygycyl27rr0j3bzb8l8ga71710ii"; 14 18 fetchSubmodules = true; 15 19 }; 16 20 17 21 nativeBuildInputs = [ cmake ]; 18 22 buildInputs = [ gflags ]; 23 + 19 24 NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isAarch64 "-march=armv8-a+crc"; 20 - cmakeFlags = lib.optionals (!staticOnly) [ "-DBUILD_SHARED_LIBS=1" ]; 25 + 26 + cmakeFlags = [ 27 + "-DCRC32C_INSTALL=1" 28 + "-DCRC32C_BUILD_TESTS=1" 29 + "-DCRC32C_BUILD_BENCHMARKS=0" 30 + "-DCRC32C_USE_GLOG=0" 31 + "-DBUILD_SHARED_LIBS=${if staticOnly then "0" else "1"}" 32 + ]; 33 + 34 + doCheck = false; 35 + doInstallCheck = true; 36 + 37 + installCheckPhase = '' 38 + runHook preInstallCheck 39 + 40 + ctest 41 + 42 + runHook postInstallCheck 43 + ''; 44 + 45 + postInstallCheck = '' 46 + # without removing these libraries, dependents will look for 47 + # libgtest/libgmock etc here, which can result in link time errors 48 + rm $out/lib/libg* 49 + ''; 50 + 51 + postFixup = '' 52 + # dependents shouldn't be able to find gtest libraries as dependencies of 53 + # this package 54 + rm -r $out/lib/pkgconfig 55 + 56 + # remove GTest cmake config files 57 + rm -r $out/lib/cmake/GTest 58 + 59 + # fix bogus include paths 60 + for f in $(find $out/lib/cmake -name '*.cmake'); do 61 + substituteInPlace "$f" --replace "\''${_IMPORT_PREFIX}/$out/include" "\''${_IMPORT_PREFIX}/include" 62 + done 63 + ''; 21 64 22 65 meta = with lib; { 23 66 homepage = "https://github.com/google/crc32c"; 24 67 description = "CRC32C implementation with support for CPU-specific acceleration instructions"; 25 68 license = with licenses; [ bsd3 ]; 26 - maintainers = with maintainers; [ andir ]; 69 + maintainers = with maintainers; [ andir cpcloud ]; 27 70 }; 28 71 }
-53
pkgs/development/libraries/libressl/CVE-2021-41581.patch
··· 1 - Based on upstream https://github.com/openbsd/src/commit/62ceddea5b1d64a1a362bbb7071d9e15adcde6b1 2 - with paths switched to apply to libressl-portable and CVS header 3 - hunk removed. 4 - 5 - --- a/crypto/x509/x509_constraints.c 6 - +++ b/crypto/x509/x509_constraints.c 7 - @@ -339,16 +339,16 @@ 8 - if (c == '.') 9 - goto bad; 10 - } 11 - - if (wi > DOMAIN_PART_MAX_LEN) 12 - - goto bad; 13 - if (accept) { 14 - + if (wi >= DOMAIN_PART_MAX_LEN) 15 - + goto bad; 16 - working[wi++] = c; 17 - accept = 0; 18 - continue; 19 - } 20 - if (candidate_local != NULL) { 21 - /* We are looking for the domain part */ 22 - - if (wi > DOMAIN_PART_MAX_LEN) 23 - + if (wi >= DOMAIN_PART_MAX_LEN) 24 - goto bad; 25 - working[wi++] = c; 26 - if (i == len - 1) { 27 - @@ -363,7 +363,7 @@ 28 - continue; 29 - } 30 - /* We are looking for the local part */ 31 - - if (wi > LOCAL_PART_MAX_LEN) 32 - + if (wi >= LOCAL_PART_MAX_LEN) 33 - break; 34 - 35 - if (quoted) { 36 - @@ -383,6 +383,8 @@ 37 - */ 38 - if (c == 9) 39 - goto bad; 40 - + if (wi >= LOCAL_PART_MAX_LEN) 41 - + goto bad; 42 - working[wi++] = c; 43 - continue; /* all's good inside our quoted string */ 44 - } 45 - @@ -412,6 +414,8 @@ 46 - } 47 - if (!local_part_ok(c)) 48 - goto bad; 49 - + if (wi >= LOCAL_PART_MAX_LEN) 50 - + goto bad; 51 - working[wi++] = c; 52 - } 53 - if (candidate_local == NULL || candidate_domain == NULL)
+7 -10
pkgs/development/libraries/libressl/default.nix
··· 40 40 # removing ./configure pre-config. 41 41 preConfigure = '' 42 42 rm configure 43 + substituteInPlace CMakeLists.txt \ 44 + --replace 'exec_prefix \''${prefix}' "exec_prefix ${placeholder "bin"}" \ 45 + --replace 'libdir \''${exec_prefix}' 'libdir \''${prefix}' 43 46 ''; 44 47 45 48 inherit patches; ··· 81 84 82 85 in { 83 86 libressl_3_2 = generic { 84 - version = "3.2.5"; 85 - sha256 = "1zkwrs3b19s1ybz4q9hrb7pqsbsi8vxcs44qanfy11fkc7ynb2kr"; 86 - patches = [ 87 - ./CVE-2021-41581.patch 88 - ]; 87 + version = "3.2.7"; 88 + sha256 = "112bjfrwwqlk0lak7fmfhcls18ydf62cp7gxghf4gklpfl1zyckw"; 89 89 }; 90 90 libressl_3_4 = generic { 91 - version = "3.4.0"; 92 - sha256 = "1lhn76nd59p1dfd27b4636zj6wh3f5xsi8b3sxqnl820imsswbp5"; 93 - patches = [ 94 - ./CVE-2021-41581.patch 95 - ]; 91 + version = "3.4.1"; 92 + sha256 = "0766yxb599lx7qmlmsddiw9wgminz9mc311mav5q23l0rbkflz0h"; 96 93 }; 97 94 }
+2 -2
pkgs/development/libraries/libxc/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libxc"; 5 - version = "5.1.6"; 5 + version = "5.1.7"; 6 6 7 7 src = fetchFromGitLab { 8 8 owner = "libxc"; 9 9 repo = "libxc"; 10 10 rev = version; 11 - sha256 = "07iljmv737kx24kd33x9ndf5l854mwslg9x2psqm12k07jmq9wjw"; 11 + sha256 = "0s01q5sh50544s7q2q7kahcqydlyzk1lx3kg1zwl76y90942bjd1"; 12 12 }; 13 13 14 14 nativeBuildInputs = [ perl cmake gfortran ];
+52
pkgs/development/python-modules/django-debug-toolbar/default.nix
··· 1 + { lib 2 + , fetchFromGitHub 3 + , pythonOlder 4 + , buildPythonPackage 5 + , python 6 + , django 7 + , jinja2 8 + , sqlparse 9 + , html5lib 10 + }: 11 + 12 + buildPythonPackage rec { 13 + pname = "django-debug-toolbar"; 14 + version = "3.2.2"; 15 + disabled = pythonOlder "3.6"; 16 + 17 + src = fetchFromGitHub { 18 + owner = "jazzband"; 19 + repo = pname; 20 + rev = version; 21 + sha256 = "1dgb3s449nasbnqd5xfikxrfhwwilwlgrw9nv4bfkapvkzpdszjk"; 22 + }; 23 + 24 + propagatedBuildInputs = [ 25 + django 26 + jinja2 27 + sqlparse 28 + ]; 29 + 30 + DB_BACKEND = "sqlite3"; 31 + DB_NAME = ":memory:"; 32 + TEST_ARGS = "tests"; 33 + DJANGO_SETTINGS_MODULE = "tests.settings"; 34 + 35 + checkInputs = [ 36 + html5lib 37 + ]; 38 + 39 + checkPhase = '' 40 + runHook preCheck 41 + ${python.interpreter} -m django test ${TEST_ARGS} 42 + runHook postCheck 43 + ''; 44 + 45 + meta = { 46 + description = "Configurable set of panels that display debug information about the current request/response"; 47 + homepage = "https://github.com/jazzband/django-debug-toolbar"; 48 + changelog = "https://django-debug-toolbar.readthedocs.io/en/latest/changes.html"; 49 + maintainers = with lib.maintainers; [ yuu ]; 50 + license = lib.licenses.bsd3; 51 + }; 52 + }
+2 -2
pkgs/development/python-modules/django/3.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "Django"; 16 - version = "3.2.8"; 16 + version = "3.2.9"; 17 17 18 18 disabled = pythonOlder "3.7"; 19 19 20 20 src = fetchPypi { 21 21 inherit pname version; 22 - sha256 = "f6d2c4069c9b9bfac03bedff927ea1f9e0d29e34525cec8a68fd28eb2a8df7af"; 22 + sha256 = "51284300f1522ffcdb07ccbdf676a307c6678659e1284f0618e5a774127a6a08"; 23 23 }; 24 24 25 25 patches = lib.optional withGdal
+2 -2
pkgs/development/python-modules/github3_py/default.nix
··· 18 18 19 19 buildPythonPackage rec { 20 20 pname = "github3.py"; 21 - version = "2.0.0"; 21 + version = "3.0.0"; 22 22 23 23 src = fetchPypi { 24 24 inherit pname version; 25 - sha256 = "8dd4ac612fd60cb277eaf6e2ce02f68dda54aba06870ca6fa2b28369bf39aa14"; 25 + sha256 = "a9134cb9efd334b1644ad7c5ee3ff3ff488317c4549ffc0e8d82e4d63383a1a4"; 26 26 }; 27 27 28 28 checkInputs = [ betamax pytest betamax-matchers ]
+2 -2
pkgs/development/python-modules/google-re2/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "google-re2"; 5 - version = "0.2.20210901"; 5 + version = "0.2.20211101"; 6 6 disabled = pythonOlder "3.6"; 7 7 8 8 src = fetchPypi { 9 9 inherit pname version; 10 - sha256 = "676fa9ee54e3fb70f290526fc0f4d78d1e5a4add701b5547494eaf7c68c72247"; 10 + sha256 = "305dc0f749c1abad51f8dc59b49b98a58dc06b976727f6b711c87c01944046d9"; 11 11 }; 12 12 13 13 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/hstspreload/default.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "hstspreload"; 9 - version = "2021.10.1"; 9 + version = "2021.11.1"; 10 10 disabled = isPy27; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "sethmlarson"; 14 14 repo = pname; 15 15 rev = version; 16 - sha256 = "sha256-nd3k2enQvYzASFyLy8chBLGX8dXlLyMyg4yv06VSeUA="; 16 + sha256 = "sha256-NpbmW4sWQmIqSllMSC+8uuSzVjUUZL+m5hshv4illCU="; 17 17 }; 18 18 19 19 # tests require network connection
+2 -2
pkgs/development/python-modules/influxdb-client/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "influxdb-client"; 17 - version = "1.21.0"; 17 + version = "1.23.0"; 18 18 disabled = pythonOlder "3.6"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "influxdata"; 22 22 repo = "influxdb-client-python"; 23 23 rev = "v${version}"; 24 - sha256 = "081pwd3aa7kbgxqcl1hfi2ny4iapnxkcp9ypsfslr69d0khvfc4s"; 24 + sha256 = "0n8zflphcj9l17mkqa4acxb0sna0v05zq5y07ayizf84zm93hpbr"; 25 25 }; 26 26 27 27 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/isbnlib/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "isbnlib"; 10 - version = "3.10.8"; 10 + version = "3.10.9"; 11 11 12 12 src = fetchPypi { 13 13 inherit pname version; 14 - sha256 = "sha256-6kBu8uFDiKs5ZJXw9gTS08lstaJWuWvAVW3Ycc19x7Q="; 14 + sha256 = "sha256-P4GH6462+gJ9Jv8HdfKr1CDinOMyeUv1Uqhqa9ukcLg="; 15 15 }; 16 16 17 17 checkInputs = [
+57
pkgs/development/python-modules/qutip/default.nix
··· 1 + { lib, stdenv, fetchFromGitHub, buildPythonPackage, python, packaging, numpy 2 + , cython, scipy, matplotlib, pytestCheckHook, pytest-rerunfailures }: 3 + 4 + buildPythonPackage rec { 5 + pname = "qutip"; 6 + version = "4.6.2"; 7 + 8 + src = fetchFromGitHub { 9 + owner = pname; 10 + repo = pname; 11 + rev = "v${version}"; 12 + sha256 = "04g7ixq1yrrid4lliqbcamnzyw5r0fjbl8ipklps234hvsjfwmxb"; 13 + }; 14 + 15 + # QuTiP says it needs specific (old) Numpy versions. We overwrite them here 16 + # as the tests work perfectly fine with up-to-date packages. 17 + postPatch = '' 18 + substituteInPlace setup.cfg --replace "numpy>=1.16.6,<1.20" "numpy>=1.16.6" 19 + ''; 20 + 21 + # Disabling OpenMP support on Darwin. 22 + setupPyGlobalFlags = lib.optional (!stdenv.isDarwin) "--with-openmp"; 23 + 24 + propagatedBuildInputs = [ 25 + packaging 26 + numpy 27 + cython 28 + scipy 29 + matplotlib 30 + ]; 31 + 32 + checkInputs = [ 33 + pytestCheckHook 34 + pytest-rerunfailures 35 + ]; 36 + 37 + # - QuTiP tries to access the home directory to create an rc file for us. 38 + # This of course fails and therefore, we provide a writable temp dir as HOME. 39 + # - We need to go to another directory to run the tests from there. 40 + # This is due to the Cython-compiled modules not being in the correct location 41 + # of the source tree. 42 + # - For running tests, see: 43 + # https://qutip.org/docs/latest/installation.html#verifying-the-installation 44 + checkPhase = '' 45 + export OMP_NUM_THREADS=$NIX_BUILD_CORES 46 + export HOME=$(mktemp -d) 47 + mkdir -p test && cd test 48 + ${python.interpreter} -c "import qutip.testing; qutip.testing.run()" 49 + ''; 50 + 51 + meta = with lib; { 52 + description = "Open-source software for simulating the dynamics of closed and open quantum systems"; 53 + homepage = "https://qutip.org/"; 54 + license = licenses.bsd3; 55 + maintainers = [ maintainers.fabiangd ]; 56 + }; 57 + }
+2 -2
pkgs/development/python-modules/rapidfuzz/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "rapidfuzz"; 13 - version = "1.8.0"; 13 + version = "1.8.2"; 14 14 15 15 disabled = pythonOlder "3.5"; 16 16 ··· 19 19 repo = "RapidFuzz"; 20 20 rev = "v${version}"; 21 21 fetchSubmodules = true; 22 - sha256 = "sha256-rInlaLWpPKmjihEp0iacg2nASxURGKxmJHH5jr+crM4="; 22 + sha256 = "sha256-lIpi7GGKJSNgmX64K3xXvrzcu469Kxe3rW71Lp3LKms="; 23 23 }; 24 24 25 25 propagatedBuildInputs = [
+3 -3
pkgs/games/anki/bin.nix
··· 3 3 let 4 4 pname = "anki-bin"; 5 5 # Update hashes for both Linux and Darwin! 6 - version = "2.1.48"; 6 + version = "2.1.49"; 7 7 8 8 sources = { 9 9 linux = fetchurl { 10 10 url = "https://github.com/ankitects/anki/releases/download/${version}/anki-${version}-linux.tar.bz2"; 11 - sha256 = "sha256-1ZvC8CPnYMzCxxrko1FfmTvKiJT+7BhOdk52zLTnLGE="; 11 + sha256 = "sha256-uG39g9CXnquArFsxtFHWWoDaNwu8y2KKh+SqGt8aqi0="; 12 12 }; 13 13 darwin = fetchurl { 14 14 url = "https://github.com/ankitects/anki/releases/download/${version}/anki-${version}-mac.dmg"; 15 - sha256 = "sha256-HXYTpOxFxjQoqjs+04diy5d+GmS69dFNEfLI/E4NCXw="; 15 + sha256 = "sha256-sEVWZQpICL7RYrOuPm1Y5XhzPxCwNk1WGP1rctTtE4Y="; 16 16 }; 17 17 }; 18 18
+3 -3
pkgs/misc/emulators/ryujinx/default.nix
··· 6 6 7 7 buildDotnetModule rec { 8 8 pname = "ryujinx"; 9 - version = "1.0.7086"; # Versioning is based off of the official appveyor builds: https://ci.appveyor.com/project/gdkchan/ryujinx 9 + version = "1.0.7094"; # Versioning is based off of the official appveyor builds: https://ci.appveyor.com/project/gdkchan/ryujinx 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "Ryujinx"; 13 13 repo = "Ryujinx"; 14 - rev = "85d8d1d7cab5615e6911b7b570c8dd0b94a521ab"; 15 - sha256 = "11j54c7qrb7vcay8bjpv2jykdnwsjhf5cmqds43wvbicigbbds54"; 14 + rev = "c6015daf8ddbd8a08e0adff8d39ffc38c7b339a2"; 15 + sha256 = "088il16rxkk74fdpqrbw1fq5f2c23921zi7v544iw8c62hqxxzv1"; 16 16 }; 17 17 18 18 projectFile = "Ryujinx.sln";
+1 -1
pkgs/misc/vim-plugins/overrides.nix
··· 535 535 postPatch = '' 536 536 # check that version is up to date 537 537 grep 'pname = "statix-vim"' -A 1 flake.nix \ 538 - | grep -F 'version = "${version}"' flake.nix 538 + | grep -F 'version = "${version}"' 539 539 540 540 cd vim-plugin 541 541 substituteInPlace ftplugin/nix.vim --replace statix ${statix}/bin/statix
+18 -5
pkgs/os-specific/linux/kernel/generic.nix
··· 60 60 , kernelTests ? [] 61 61 , nixosTests 62 62 , ... 63 - }: 63 + }@args: 64 64 65 65 # Note: this package is used for bootstrapping fetchurl, and thus 66 66 # cannot use fetchpatch! All mutable patches (generated by GitHub or ··· 70 70 assert stdenv.isLinux; 71 71 72 72 let 73 + # Dirty hack to make sure that `version` & `src` have 74 + # `<nixpkgs/pkgs/os-specific/linux/kernel/linux-x.y.nix>` as position 75 + # when using `builtins.unsafeGetAttrPos`. 76 + # 77 + # This is to make sure that ofborg actually detects changes in the kernel derivation 78 + # and pings all maintainers. 79 + # 80 + # For further context, see https://github.com/NixOS/nixpkgs/pull/143113#issuecomment-953319957 81 + basicArgs = builtins.removeAttrs 82 + args 83 + (lib.filter (x: ! (builtins.elem x [ "version" "src" ])) (lib.attrNames args)); 84 + 73 85 # Combine the `features' attribute sets of all the kernel patches. 74 86 kernelFeatures = lib.foldr (x: y: (x.features or {}) // y) ({ 75 87 iwlwifi = true; ··· 180 192 }; 181 193 }; # end of configfile derivation 182 194 183 - kernel = (callPackage ./manual-config.nix { inherit buildPackages; }) { 184 - inherit version modDirVersion src kernelPatches randstructSeed lib stdenv extraMakeFlags extraMeta configfile; 195 + kernel = (callPackage ./manual-config.nix { inherit buildPackages; }) (basicArgs // { 196 + inherit modDirVersion kernelPatches randstructSeed lib stdenv extraMakeFlags extraMeta configfile; 197 + pos = builtins.unsafeGetAttrPos "version" args; 185 198 186 199 config = { CONFIG_MODULES = "y"; CONFIG_FW_LOADER = "m"; }; 187 - }; 200 + }); 188 201 189 - passthru = { 202 + passthru = basicArgs // { 190 203 features = kernelFeatures; 191 204 inherit commonStructuredConfig structuredExtraConfig extraMakeFlags isZen isHardened isLibre modDirVersion; 192 205 isXen = lib.warn "The isXen attribute is deprecated. All Nixpkgs kernels that support it now have Xen enabled." true;
+3 -1
pkgs/os-specific/linux/kernel/manual-config.nix
··· 19 19 stdenv, 20 20 # The kernel version 21 21 version, 22 + # Position of the Linux build expression 23 + pos ? null, 22 24 # Additional kernel make flags 23 25 extraMakeFlags ? [], 24 26 # The version of the kernel module directory ··· 339 341 ] ++ extraMakeFlags; 340 342 341 343 karch = stdenv.hostPlatform.linuxArch; 342 - }) 344 + } // (optionalAttrs (pos != null) { inherit pos; }))
+26
pkgs/servers/home-assistant/default.nix
··· 21 21 22 22 let 23 23 defaultOverrides = [ 24 + # aiounify 29 breaks integration tests 25 + (self: super: { 26 + aiounifi = super.aiounifi.overridePythonAttrs (oldAttrs: rec { 27 + version = "28"; 28 + src = fetchFromGitHub { 29 + owner = "Kane610"; 30 + repo = "aiounifi"; 31 + rev = "v${version}"; 32 + sha256 = "1r86pk80sa1la2s7c6v9svh5cpkci6jcw1xziz0h09jdvv5j5iff"; 33 + }; 34 + }); 35 + }) 36 + 24 37 # Override the version of some packages pinned in Home Assistant's setup.py and requirements_all.txt 25 38 (mkOverride "python-slugify" "4.0.1" "69a517766e00c1268e5bbfc0d010a0a8508de0b18d30ad5a1ff357f8ae724270") 26 39 ··· 49 62 sha256 = "0c8ckbbr1n8gx5k63ymgyfkbz3d0rbdvghg8fqdvbg4nrigrs5v0"; 50 63 }; 51 64 checkInputs = oldAttrs.checkInputs ++ [ python3.pkgs.asynctest ]; 65 + }); 66 + }) 67 + 68 + # Pinned due to API changes in influxdb-client>1.21.0 69 + (self: super: { 70 + influxdb-client = super.influxdb-client.overridePythonAttrs (oldAttrs: rec { 71 + version = "1.21.0"; 72 + src = fetchFromGitHub { 73 + owner = "influxdata"; 74 + repo = "influxdb-client-python"; 75 + rev = "v${version}"; 76 + sha256 = "081pwd3aa7kbgxqcl1hfi2ny4iapnxkcp9ypsfslr69d0khvfc4s"; 77 + }; 52 78 }); 53 79 }) 54 80
+2 -2
pkgs/tools/misc/bitwise/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "bitwise"; 5 - version = "0.42"; 5 + version = "0.43"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "mellowcandle"; 9 9 repo = "bitwise"; 10 10 rev = "v${version}"; 11 - sha256 = "154y0sn3z64z56k84ghsazkyihbkaz40hfwxcxdymnhvhh6m9f3g"; 11 + sha256 = "18sz7bfpq83s2zhw7c35snz6k3b6rzad2mmfq2qwmyqwypbp1g7l"; 12 12 }; 13 13 14 14 buildInputs = [ ncurses readline ];
+10 -3
pkgs/tools/networking/flannel/plugin.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "cni-plugin-flannel"; 5 - version = "1.1"; 5 + version = "1.0.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "flannel-io"; 9 9 repo = "cni-plugin"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-DZC6uJR6TIHdmu8kZcbM+RC7pdejqLCOep0v3PM8/QY="; 11 + sha256 = "sha256-zWxw4LZIlkT88yGTnxdupq7cUSacNRxPzzp01O9USDw="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-TLAwE3pTnJYOi1AsOQfsG6t3xLKOah/7DvYjsqyltKs="; 14 + vendorSha256 = "sha256-zteMlrvRTVxOFlBy+z/qfiSii8+c8PMapwIsdbN+Aig="; 15 15 16 16 postInstall = '' 17 17 mv $out/bin/cni-plugin $out/bin/flannel 18 18 ''; 19 19 20 20 doCheck = false; 21 + doInstallCheck = true; 22 + 23 + installCheckPhase = '' 24 + runHook preInstallCheck 25 + $out/bin/flannel 2>&1 | fgrep -q v$version 26 + runHook postInstallCheck 27 + ''; 21 28 22 29 meta = with lib; { 23 30 description = "flannel CNI plugin";
+3 -3
pkgs/tools/nix/statix/default.nix
··· 4 4 pname = "statix"; 5 5 # also update version of the vim plugin in pkgs/misc/vim-plugins/overrides.nix 6 6 # the version can be found in flake.nix of the source code 7 - version = "0.3.4"; 7 + version = "0.3.5"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "nerdypepper"; 11 11 repo = pname; 12 12 rev = "v${version}"; 13 - sha256 = "sha256-8xWtwa9ZtkcpWvLG2QS3jPlz2c+E5MjYWhZ/g5bjhkc="; 13 + sha256 = "sha256-vJvHmg6X/B6wQYjeX1FZC4MDGo0HkKbTmQH+l4tZAwg="; 14 14 }; 15 15 16 - cargoSha256 = "sha256-f8f5wJyK+q6zTfNiCRN89ptlSWfSnrzLyefTIpw5mts="; 16 + cargoSha256 = "sha256-OfLpnVe1QIjpjpD4ticG/7AxPGFMMjBWN3DdLZq6pA8="; 17 17 18 18 cargoBuildFlags = lib.optionals withJson [ "--features" "json" ]; 19 19
+27 -9
pkgs/tools/text/ucg/default.nix
··· 3 3 , pkg-config 4 4 , autoreconfHook 5 5 , pcre 6 - , nixosTests 7 6 }: 8 7 9 - let 8 + stdenv.mkDerivation rec { 10 9 pname = "ucg"; 11 - version = "20190225"; 12 - in stdenv.mkDerivation { 13 - inherit pname version; 10 + version = "0.3.3+date=2019-02-25"; 14 11 15 12 src = fetchFromGitHub { 16 13 owner = "gvansickle"; ··· 19 16 sha256 = "sha256-/wU1PmI4ejlv7gZzZNasgROYXFiDiIxE9BFoCo6+G5Y="; 20 17 }; 21 18 22 - nativeBuildInputs = [ autoreconfHook pkg-config ]; 23 - buildInputs = [ pcre ]; 19 + nativeBuildInputs = [ 20 + autoreconfHook 21 + pkg-config 22 + ]; 23 + 24 + buildInputs = [ 25 + pcre 26 + ]; 27 + 28 + doInstallCheck = true; 29 + installCheckPhase = '' 30 + runHook preInstallCheck 31 + 32 + testFile=$(mktemp /tmp/ucg-test.XXXX) 33 + echo -ne 'Lorem ipsum dolor sit amet\n2.7182818284590' > $testFile 34 + $out/bin/ucg 'dolor' $testFile || { rm $testFile; exit -1; } 35 + $out/bin/ucg --ignore-case 'lorem' $testFile || { rm $testFile; exit -1; } 36 + $out/bin/ucg --word-regexp '2718' $testFile && { rm $testFile; exit -1; } 37 + $out/bin/ucg 'pisum' $testFile && { rm $testFile; exit -1; } 38 + rm $testFile 39 + 40 + runHook postInstallCheck 41 + ''; 24 42 25 43 meta = with lib; { 26 44 homepage = "https://github.com/gvansickle/ucg/"; ··· 34 52 license = licenses.gpl3Plus; 35 53 maintainers = with maintainers; [ AndersonTorres ]; 36 54 platforms = with platforms; unix; 55 + broken = stdenv.isAarch64; # cpuid.h: no such file or directory 37 56 }; 38 - 39 - passthru.tests = { inherit (nixosTests) ucg; }; 40 57 } 58 + # TODO: report upstream
+3 -1
pkgs/top-level/all-packages.nix
··· 3412 3412 3413 3413 pn = callPackage ../tools/text/pn { }; 3414 3414 3415 - pocket-casts = callPackage ../applications/audio/pocket-casts { }; 3415 + pocket-casts = callPackage ../applications/audio/pocket-casts { 3416 + electron = electron_12; 3417 + }; 3416 3418 3417 3419 poweralertd = callPackage ../tools/misc/poweralertd { }; 3418 3420
+4
pkgs/top-level/python-packages.nix
··· 2110 2110 2111 2111 django-csp = callPackage ../development/python-modules/django-csp { }; 2112 2112 2113 + django-debug-toolbar = callPackage ../development/python-modules/django-debug-toolbar { }; 2114 + 2113 2115 django-discover-runner = callPackage ../development/python-modules/django-discover-runner { }; 2114 2116 2115 2117 django-dynamic-preferences = callPackage ../development/python-modules/django-dynamic-preferences { }; ··· 7895 7897 questionary = callPackage ../development/python-modules/questionary { }; 7896 7898 7897 7899 queuelib = callPackage ../development/python-modules/queuelib { }; 7900 + 7901 + qutip = callPackage ../development/python-modules/qutip { }; 7898 7902 7899 7903 qmk-dotty-dict = callPackage ../development/python-modules/qmk-dotty-dict { }; 7900 7904