nixpkgs mirror (for testing) github.com/NixOS/nixpkgs
nix
fork

Configure Feed

Select the types of activity you want to include in your feed.

Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
a292b5fe f965d7db

+242 -163
+19 -2
doc/languages-frameworks/dotnet.section.md
··· 73 73 74 74 * `projectFile` has to be used for specifying the dotnet project file relative to the source root. These usually have `.sln` or `.csproj` file extensions. This can be an array of multiple projects as well. 75 75 * `nugetDeps` has to be used to specify the NuGet dependency file. Unfortunately, these cannot be deterministically fetched without a lockfile. This file should be generated using `nuget-to-nix` tool, which is available in nixpkgs. 76 + * `packNupkg` is used to pack project as a `nupkg`, and installs it to `$out/share`. If set to `true`, the derivation can be used as a dependency for another dotnet project by adding it to `projectReferences`. 77 + * `projectReferences` can be used to resolve `ProjectReference` project items. Referenced projects can be packed with `buildDotnetModule` by setting the `packNupkg = true` attribute and passing a list of derivations to `projectReferences`. Since we are sharing referenced projects as NuGets they must be added to csproj/fsproj files as `PackageReference` as well. 78 + For example, your project has a local dependency: 79 + ```xml 80 + <ProjectReference Include="../foo/bar.fsproj" /> 81 + ``` 82 + To enable discovery through `projectReferences` you would need to add: 83 + ```xml 84 + <ProjectReference Include="../foo/bar.fsproj" /> 85 + <PackageReference Include="bar" Version="*" Condition=" '$(ContinuousIntegrationBuild)'=='true' "/> 86 + ``` 76 87 * `executables` is used to specify which executables get wrapped to `$out/bin`, relative to `$out/lib/$pname`. If this is unset, all executables generated will get installed. If you do not want to install any, set this to `[]`. 77 88 * `runtimeDeps` is used to wrap libraries into `LD_LIBRARY_PATH`. This is how dotnet usually handles runtime dependencies. 78 89 * `buildType` is used to change the type of build. Possible values are `Release`, `Debug`, etc. By default, this is set to `Release`. ··· 94 83 * `disabledTests` is used to disable running specific unit tests. This gets passed as: `dotnet test --filter "FullyQualifiedName!={}"`, to ensure compatibility with all unit test frameworks. 95 84 * `dotnetRestoreFlags` can be used to pass flags to `dotnet restore`. 96 85 * `dotnetBuildFlags` can be used to pass flags to `dotnet build`. 97 - * `dotnetTestFlags` can be used to pass flags to `dotnet test`. 86 + * `dotnetTestFlags` can be used to pass flags to `dotnet test`. Used only if `doCheck` is set to `true`. 98 87 * `dotnetInstallFlags` can be used to pass flags to `dotnet install`. 88 + * `dotnetPackFlags` can be used to pass flags to `dotnet pack`. Used only if `packNupkg` is set to `true`. 99 89 * `dotnetFlags` can be used to pass flags to all of the above phases. 100 90 101 91 Here is an example `default.nix`, using some of the previously discussed arguments: 102 92 ```nix 103 93 { lib, buildDotnetModule, dotnetCorePackages, ffmpeg }: 104 94 105 - buildDotnetModule rec { 95 + let 96 + referencedProject = import ../../bar { ... }; 97 + in buildDotnetModule rec { 106 98 pname = "someDotnetApplication"; 107 99 version = "0.1"; 108 100 ··· 113 99 114 100 projectFile = "src/project.sln"; 115 101 nugetDeps = ./deps.nix; # File generated with `nuget-to-nix path/to/src > deps.nix`. 102 + projectReferences = [ referencedProject ]; # `referencedProject` must contain `nupkg` in the folder structure. 116 103 117 104 dotnet-sdk = dotnetCorePackages.sdk_3_1; 118 105 dotnet-runtime = dotnetCorePackages.net_5_0; ··· 121 106 122 107 executables = [ "foo" ]; # This wraps "$out/lib/$pname/foo" to `$out/bin/foo`. 123 108 executables = []; # Don't install any executables. 109 + 110 + packNupkg = true; # This packs the project as "foo-0.1.nupkg" at `$out/share`. 124 111 125 112 runtimeDeps = [ ffmpeg ]; # This will wrap ffmpeg's library path into `LD_LIBRARY_PATH`. 126 113 }
+2 -1
nixos/lib/make-options-doc/default.nix
··· 118 118 # The actual generation of the xml file is done in nix purely for the convenience 119 119 # of not having to generate the xml some other way 120 120 optionsXML = pkgs.runCommand "options.xml" {} '' 121 + export NIX_STORE_DIR=$TMPDIR/store 122 + export NIX_STATE_DIR=$TMPDIR/state 121 123 ${pkgs.nix}/bin/nix-instantiate \ 122 - --store dummy:// \ 123 124 --eval --xml --strict ${./optionsJSONtoXML.nix} \ 124 125 --argstr file ${optionsJSON}/share/doc/nixos/options.json \ 125 126 > "$out"
+13 -3
nixos/modules/services/databases/couchdb.nix
··· 43 43 44 44 package = mkOption { 45 45 type = types.package; 46 - default = pkgs.couchdb; 47 - defaultText = literalExpression "pkgs.couchdb"; 46 + default = pkgs.couchdb3; 47 + defaultText = literalExpression "pkgs.couchdb3"; 48 48 description = '' 49 49 CouchDB package to use. 50 50 ''; ··· 150 150 ''; 151 151 }; 152 152 153 + argsFile = mkOption { 154 + type = types.path; 155 + default = "${cfg.package}/etc/vm.args"; 156 + description = '' 157 + vm.args configuration. Overrides Couchdb's Erlang VM parameters file. 158 + ''; 159 + }; 160 + 153 161 configFile = mkOption { 154 162 type = types.path; 155 163 description = '' ··· 194 186 ''; 195 187 196 188 environment = { 197 - # we are actually specifying 4 configuration files: 189 + # we are actually specifying 5 configuration files: 198 190 # 1. the preinstalled default.ini 199 191 # 2. the module configuration 200 192 # 3. the extraConfig from the module options 201 193 # 4. the locally writable config file, which couchdb itself writes to 202 194 ERL_FLAGS= ''-couch_ini ${cfg.package}/etc/default.ini ${configFile} ${pkgs.writeText "couchdb-extra.ini" cfg.extraConfig} ${cfg.configFile}''; 195 + # 5. the vm.args file 196 + COUCHDB_ARGS_FILE=''${cfg.argsFile}''; 203 197 }; 204 198 205 199 serviceConfig = {
+3
nixos/tests/couchdb.nix
··· 56 56 couchdb3.succeed( 57 57 "${curlJqCheck testlogin "GET" "_all_dbs" ". | length" "0"}" 58 58 ) 59 + couchdb3.succeed( 60 + "${curlJqCheck testlogin "GET" "_node/couchdb@127.0.0.1" ".couchdb" "Welcome"}" 61 + ) 59 62 ''; 60 63 })
+1 -1
nixos/tests/samba-wsdd.nix
··· 38 38 server_wsdd.wait_for_unit("samba-wsdd") 39 39 40 40 client_wsdd.wait_until_succeeds( 41 - "echo list | ${pkgs.libressl.nc}/bin/nc -U /run/wsdd/wsdd.sock | grep -i SERVER-WSDD" 41 + "echo list | ${pkgs.libressl.nc}/bin/nc -N -U /run/wsdd/wsdd.sock | grep -i SERVER-WSDD" 42 42 ) 43 43 ''; 44 44 })
+1 -1
pkgs/applications/editors/sublime/4/common.nix
··· 23 23 "x86_64-linux" = "x64"; 24 24 }.${stdenv.hostPlatform.system}; 25 25 26 - libPath = lib.makeLibraryPath [ xorg.libX11 xorg.libXtst glib libglvnd openssl gtk3 cairo pango ]; 26 + libPath = lib.makeLibraryPath [ xorg.libX11 xorg.libXtst glib libglvnd openssl gtk3 cairo pango curl ]; 27 27 in let 28 28 binaryPackage = stdenv.mkDerivation { 29 29 pname = "${pname}-bin";
+2 -2
pkgs/applications/misc/logseq/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "logseq"; 5 - version = "0.5.2"; 5 + version = "0.5.3"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/logseq/logseq/releases/download/${version}/logseq-linux-x64-${version}.AppImage"; 9 - sha256 = "ZlyteVTwP5oM32G+yUzCOmu6b/b19RVLmlEvyOz5hu0="; 9 + sha256 = "xHjT2QbZBfPc0i+tsY/hXo+oY8djJiMnM7GraHVvUHs="; 10 10 name = "${pname}-${version}.AppImage"; 11 11 }; 12 12
+1
pkgs/applications/misc/zathura/wrapper.nix
··· 33 33 license = licenses.zlib; 34 34 platforms = platforms.unix; 35 35 maintainers = with maintainers; [ smironov globin TethysSvensson ]; 36 + mainProgram = "zathura"; 36 37 }; 37 38 }
+11 -12
pkgs/applications/networking/cluster/fluxcd/default.nix
··· 1 1 { lib, buildGoModule, fetchFromGitHub, fetchzip, installShellFiles }: 2 2 3 3 let 4 - version = "0.23.0"; 5 - sha256 = "15j4r43hy3slyahx4am7lj7jns4x3axrcbr9qwiznmk8qbvrzrdy"; 6 - manifestsSha256 = "10rh0q1la5dq6n9y1yvw9ilj5lhzx8vh1zi2lznfjsvc5niwx7wf"; 4 + version = "0.24.0"; 5 + sha256 = "025dynxkfqrnpqrvdq39394biky2ra1mfjirrigamngchifav3b3"; 6 + manifestsSha256 = "0sbbvv40c66qdrhlvas42qcdmpgg1mb8zzcdrfr5yrkqwxnzis7x"; 7 7 8 8 manifests = fetchzip { 9 - url = "https://github.com/fluxcd/flux2/releases/download/v${version}/manifests.tar.gz"; 9 + url = 10 + "https://github.com/fluxcd/flux2/releases/download/v${version}/manifests.tar.gz"; 10 11 sha256 = manifestsSha256; 11 12 stripRoot = false; 12 13 }; 13 - in 14 14 15 - buildGoModule rec { 15 + in buildGoModule rec { 16 16 pname = "fluxcd"; 17 17 inherit version; 18 18 ··· 23 23 inherit sha256; 24 24 }; 25 25 26 - vendorSha256 = "sha256-vFm9ai+VWOPLRckKJ7gfD/0iQ8b4o5HNQE4cekb0vA0="; 26 + vendorSha256 = "0w1qzsri3dkyzwfh6s13np52j3xzxxhk02pqgfh7297djwbppnbs"; 27 27 28 28 postUnpack = '' 29 29 cp -r ${manifests} source/cmd/flux/manifests 30 30 ''; 31 31 32 - patches = [ 33 - ./patches/disable-tests-ssh_key.patch 34 - ]; 32 + patches = [ ./patches/disable-tests-ssh_key.patch ]; 35 33 36 34 ldflags = [ "-s" "-w" "-X main.VERSION=${version}" ]; 37 35 ··· 37 39 38 40 # Required to workaround test error: 39 41 # panic: mkdir /homeless-shelter: permission denied 40 - HOME="$TMPDIR"; 42 + HOME = "$TMPDIR"; 41 43 42 44 nativeBuildInputs = [ installShellFiles ]; 43 45 ··· 56 58 passthru.updateScript = ./update.sh; 57 59 58 60 meta = with lib; { 59 - description = "Open and extensible continuous delivery solution for Kubernetes"; 61 + description = 62 + "Open and extensible continuous delivery solution for Kubernetes"; 60 63 longDescription = '' 61 64 Flux is a tool for keeping Kubernetes clusters in sync 62 65 with sources of configuration (like Git repositories), and automating
+5 -7
pkgs/applications/networking/cluster/fluxcd/patches/disable-tests-ssh_key.patch
··· 1 - diff --git a/cmd/flux/create_secret_git_test.go b/cmd/flux/create_secret_git_test.go 2 - index afa34ba..0d22cce 100644 3 - --- a/cmd/flux/create_secret_git_test.go 4 - +++ b/cmd/flux/create_secret_git_test.go 5 - @@ -20,16 +20,6 @@ func TestCreateGitSecret(t *testing.T) { 1 + --- flux/cmd/flux/create_secret_git_test.go.orig 2021-12-07 13:46:21.196278468 +0100 2 + +++ flux/cmd/flux/create_secret_git_test.go 2021-12-07 13:49:51.668566955 +0100 3 + @@ -20,16 +20,6 @@ 6 4 args: "create secret git podinfo-auth --url=https://github.com/stefanprodan/podinfo --username=my-username --password=my-password --namespace=my-namespace --export", 7 5 assert: assertGoldenFile("./testdata/create_secret/git/secret-git-basic.yaml"), 8 6 }, 9 7 - { 10 8 - name: "ssh key", 11 - - args: "create secret git podinfo-auth --url=ssh://git@github.com/stefanprodan/podinfo --private-key-file=./testdata/create_secret/git/rsa.private --namespace=my-namespace --export", 9 + - args: "create secret git podinfo-auth --url=ssh://git@github.com/stefanprodan/podinfo --private-key-file=./testdata/create_secret/git/ecdsa.private --namespace=my-namespace --export", 12 10 - assert: assertGoldenFile("testdata/create_secret/git/git-ssh-secret.yaml"), 13 11 - }, 14 12 - { 15 13 - name: "ssh key with password", 16 - - args: "create secret git podinfo-auth --url=ssh://git@github.com/stefanprodan/podinfo --private-key-file=./testdata/create_secret/git/rsa-password.private --password=password --namespace=my-namespace --export", 14 + - args: "create secret git podinfo-auth --url=ssh://git@github.com/stefanprodan/podinfo --private-key-file=./testdata/create_secret/git/ecdsa-password.private --password=password --namespace=my-namespace --export", 17 15 - assert: assertGoldenFile("testdata/create_secret/git/git-ssh-secret-password.yaml"), 18 16 - }, 19 17 }
+2 -2
pkgs/applications/networking/cluster/fn-cli/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "fn"; 5 - version = "0.6.8"; 5 + version = "0.6.11"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "fnproject"; 9 9 repo = "cli"; 10 10 rev = version; 11 - sha256 = "sha256-8b1VyukVMTXLAnvYcjXgTdPtMq3YxJgTpxe25Kj+Wpw="; 11 + sha256 = "sha256-mBPRsLBIwahKm2RR22pNXxJhdLaWHCKx0TKc4H4YIVY="; 12 12 }; 13 13 14 14 vendorSha256 = null;
+2 -2
pkgs/applications/networking/irc/catgirl/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "catgirl"; 5 - version = "1.9a"; 5 + version = "2.0"; 6 6 7 7 src = fetchurl { 8 8 url = "https://git.causal.agency/catgirl/snapshot/${pname}-${version}.tar.gz"; 9 - sha256 = "sha256-MEm5mrrWfNp+mBHFjGSOGvvfvBJ+Ho/K+mPUxzJDkV0="; 9 + sha256 = "sha256-rk6nvfyaFxJ/7JN92L5tDraTngffVb6u/U7dbNjK9jI="; 10 10 }; 11 11 12 12 # catgirl's configure script uses pkg-config --variable exec_prefix openssl
+2 -2
pkgs/applications/networking/owncloud-client/default.nix
··· 2 2 3 3 mkDerivation rec { 4 4 pname = "owncloud-client"; 5 - version = "2.9.1.5500"; 5 + version = "2.9.2.6206"; 6 6 7 7 src = fetchurl { 8 8 url = "https://download.owncloud.com/desktop/ownCloud/stable/${version}/source/ownCloud-${version}.tar.xz"; 9 - sha256 = "0h4dclxr6kmhmx318wvxz36lhyqw84q0mg4c6di6p230mp8b1l4v"; 9 + sha256 = "sha256-i6TmJFEuH4A1jTyoKiJoVU7yC+AXZIH4miYSk3XzVEo="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ pkg-config cmake extra-cmake-modules ];
+2 -2
pkgs/applications/office/grisbi/default.nix
··· 12 12 13 13 stdenv.mkDerivation rec { 14 14 pname = "grisbi"; 15 - version = "2.0.4"; 15 + version = "2.0.5"; 16 16 17 17 src = fetchurl { 18 18 url = "mirror://sourceforge/grisbi/${pname}-${version}.tar.bz2"; 19 - sha256 = "sha256-4ykG310He1aFaUNo5fClaM3QWFBzKERGihYfqaxR1Vo="; 19 + sha256 = "sha256-vTrbq/xLTfwF7/YtKzZFiiSw8A0HzzWin2ry8gPHej8="; 20 20 }; 21 21 22 22 nativeBuildInputs = [ pkg-config wrapGAppsHook ];
+2 -12
pkgs/applications/office/pympress/default.nix
··· 1 1 { lib 2 2 , stdenv 3 - , fetchpatch 4 3 , python3Packages 5 4 , wrapGAppsHook 6 5 , gtk3 ··· 12 13 13 14 python3Packages.buildPythonApplication rec { 14 15 pname = "pympress"; 15 - version = "1.6.3"; 16 + version = "1.7.0"; 16 17 17 18 src = python3Packages.fetchPypi { 18 19 inherit pname version; 19 - sha256 = "sha256-f+OjE0x/3yfJYHCLB+on7TT7MJ2vNu87SHRi67qFDCM="; 20 + sha256 = "sha256-AxH0PyAWYEEIqQAx9gG2eYyXMijLZGZqXkRhld32ieE="; 20 21 }; 21 - 22 - patches = [ 23 - # Should not be needed once v1.6.4 is released 24 - (fetchpatch { 25 - name = "fix-setuptools-version-parsing.patch"; 26 - url = "https://github.com/Cimbali/pympress/commit/474514d71396ac065e210fd846e07ed1139602d0.diff"; 27 - sha256 = "sha256-eiw54sjMrXrNrhtkAXxiSTatzoA0NDA03L+HpTDax58="; 28 - }) 29 - ]; 30 22 31 23 nativeBuildInputs = [ 32 24 wrapGAppsHook
+2 -2
pkgs/applications/science/biology/seaview/default.nix
··· 1 1 { lib, stdenv, fetchurl, coreutils, fltk, libjpeg }: 2 2 3 3 stdenv.mkDerivation rec { 4 - version = "5.0.4"; 4 + version = "5.0.5"; 5 5 pname = "seaview"; 6 6 7 7 src = fetchurl { 8 8 url = "ftp://pbil.univ-lyon1.fr/pub/mol_phylogeny/seaview/archive/seaview_${version}.tar.gz"; 9 - sha256 = "09yp8467h49qnj7gg0mbcdha4ai3bn6vgs00gb76dd6h3pzfflz1"; 9 + sha256 = "sha256-zo9emLpHiDv6kekbx55NOibxWN2Zg7XngzGkUqSx+PI="; 10 10 }; 11 11 12 12 buildInputs = [ fltk libjpeg ];
+8
pkgs/applications/science/math/sage/sage-src.nix
··· 125 125 sha256 = "sha256-3eJPfWfCrCAQ5filIn7FbzjRQeO9QyTIVl/HyRuqFtE="; 126 126 }) 127 127 128 + # https://trac.sagemath.org/ticket/32567 129 + (fetchSageDiff { 130 + base = "9.5.beta2"; 131 + name = "arb-2.21.0-update.patch"; 132 + rev = "eb3304dd521a3d5a9334e747a08e234bbf16b4eb"; 133 + sha256 = "sha256-XDkaY4VQGyESXI6zuD7nCNzyQOl/fmBFvAESH9+RRvk="; 134 + }) 135 + 128 136 # https://trac.sagemath.org/ticket/32797 129 137 (fetchSageDiff { 130 138 base = "9.5.beta7";
+1 -1
pkgs/applications/version-management/sublime-merge/common.nix
··· 17 17 archSha256 = sha256; 18 18 arch = "x64"; 19 19 20 - libPath = lib.makeLibraryPath [ xorg.libX11 glib gtk3 cairo pango curl.out ]; 20 + libPath = lib.makeLibraryPath [ xorg.libX11 glib gtk3 cairo pango curl ]; 21 21 redirects = [ "/usr/bin/pkexec=${pkexecPath}" "/bin/true=${coreutils}/bin/true" ]; 22 22 in let 23 23 binaryPackage = stdenv.mkDerivation {
+28 -1
pkgs/build-support/build-dotnet-module/default.nix
··· 14 14 , dotnetTestFlags ? [] 15 15 # Flags to pass to `dotnet install`. 16 16 , dotnetInstallFlags ? [] 17 + # Flags to pass to `dotnet pack`. 18 + , dotnetPackFlags ? [] 17 19 # Flags to pass to dotnet in all phases. 18 20 , dotnetFlags ? [] 19 21 ··· 23 21 # Unfortunately, dotnet has no method for doing this automatically. 24 22 # If unset, all executables in the projects root will get installed. This may cause bloat! 25 23 , executables ? null 24 + # Packs a project as a `nupkg`, and installs it to `$out/share`. If set to `true`, the derivation can be used as a dependency for another dotnet project by adding it to `projectReferences`. 25 + , packNupkg ? false 26 26 # The packages project file, which contains instructions on how to compile it. This can be an array of multiple project files as well. 27 27 , projectFile ? null 28 28 # The NuGet dependency file. This locks all NuGet dependency versions, as otherwise they cannot be deterministically fetched. 29 29 # This can be generated using the `nuget-to-nix` tool. 30 30 , nugetDeps ? null 31 + # A list of derivations containing nupkg packages for local project references. 32 + # Referenced derivations can be built with `buildDotnetModule` with `packNupkg=true` flag. 33 + # Since we are sharing them as nugets they must be added to csproj/fsproj files as `PackageReference` as well. 34 + # For example, your project has a local dependency: 35 + # <ProjectReference Include="../foo/bar.fsproj" /> 36 + # To enable discovery through `projectReferences` you would need to add a line: 37 + # <ProjectReference Include="../foo/bar.fsproj" /> 38 + # <PackageReference Include="bar" Version="*" Condition=" '$(ContinuousIntegrationBuild)'=='true' "/> 39 + , projectReferences ? [] 31 40 # Libraries that need to be available at runtime should be passed through this. 32 41 # These get wrapped into `LD_LIBRARY_PATH`. 33 42 , runtimeDeps ? [] ··· 73 60 inherit sha256; 74 61 }; 75 62 }); 63 + _localDeps = linkFarmFromDrvs "${name}-local-nuget-deps" projectReferences; 76 64 77 65 nuget-source = stdenvNoCC.mkDerivation rec { 78 66 name = "${args.pname}-nuget-source"; ··· 86 72 87 73 nuget sources Add -Name nixos -Source "$out/lib" 88 74 nuget init "${_nugetDeps}" "$out/lib" 75 + ${lib.optionalString (projectReferences != []) 76 + "nuget init \"${_localDeps}\" \"$out/lib\""} 89 77 90 78 # Generates a list of all unique licenses' spdx ids. 91 79 find "$out/lib" -name "*.nuspec" -exec sh -c \ ··· 183 167 "''${dotnetInstallFlags[@]}" \ 184 168 "''${dotnetFlags[@]}" 185 169 done 186 - '' + (if executables != null then '' 170 + '' + (lib.optionalString packNupkg '' 171 + for project in ''${projectFile[@]}; do 172 + dotnet pack "$project" \ 173 + -p:ContinuousIntegrationBuild=true \ 174 + -p:Deterministic=true \ 175 + --output $out/share \ 176 + --configuration "$buildType" \ 177 + --no-build \ 178 + "''${dotnetPackFlags[@]}" \ 179 + "''${dotnetFlags[@]}" 180 + done 181 + '') + (if executables != null then '' 187 182 for executable in $executables; do 188 183 execPath="$out/lib/${args.pname}/$executable" 189 184
+28
pkgs/data/misc/v2ray-geoip/default.nix
··· 1 + { lib, stdenv, fetchFromGitHub }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "v2ray-geoip"; 5 + version = "202112090029"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "v2fly"; 9 + repo = "geoip"; 10 + rev = "97f4acb31d926ae31bb3cdc5c8948d8dcdddca79"; 11 + sha256 = "sha256-kYMp/D7xVpBTu35YXq45bR2XebpVOW57UAc7H/6px/U="; 12 + }; 13 + 14 + installPhase = '' 15 + runHook preInstall 16 + install -m 0644 geoip.dat -D $out/share/v2ray/geoip.dat 17 + runHook postInstall 18 + ''; 19 + 20 + passthru.updateScript = ./update.sh; 21 + 22 + meta = with lib; { 23 + description = "GeoIP for V2Ray"; 24 + homepage = "https://github.com/v2fly/geoip"; 25 + license = licenses.cc-by-sa-40; 26 + maintainers = with maintainers; [ nickcao ]; 27 + }; 28 + }
+6
pkgs/data/misc/v2ray-geoip/update.sh
··· 1 + #! /usr/bin/env nix-shell 2 + #! nix-shell -i bash -p common-updater-scripts curl jq 3 + set -euo pipefail 4 + 5 + COMMIT=$(curl "https://api.github.com/repos/v2fly/geoip/commits/release?per_page=1") 6 + update-source-version v2ray-geoip "$(echo $COMMIT | jq -r .commit.message)" --file=pkgs/data/misc/v2ray-geoip/default.nix --rev="$(echo $COMMIT | jq -r .sha)"
+2 -2
pkgs/development/libraries/arb/default.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "arb"; 12 - version = "2.20.0"; 12 + version = "2.21.1"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "fredrik-johansson"; 16 16 repo = pname; 17 17 rev = version; 18 - sha256 = "sha256-HOIbdkVV7NKowIGhDdn/S8unIRV469OnRHiuiCGaWgk="; 18 + sha256 = "sha256-OBY2gKVnvrZLVrv+d6rXQLo026mrGB9eyNV4LESgrNI="; 19 19 }; 20 20 21 21 buildInputs = [ mpir gmp mpfr flint ];
+1 -1
pkgs/development/libraries/qt-5/5.15/srcs.nix
··· 42 42 rev = "v${branchName}-lts"; 43 43 in 44 44 { 45 - version = "${branchName}-${lib.substring 0 7 rev}"; 45 + version = branchName; 46 46 47 47 src = fetchgit { 48 48 url = "https://github.com/qt/qtwebengine.git";
-25
pkgs/development/ocaml-modules/pa_bench/default.nix
··· 1 - { lib, buildOcaml, fetchFromGitHub, type_conv, pa_ounit }: 2 - 3 - buildOcaml rec { 4 - pname = "pa_bench"; 5 - version = "113.00.00"; 6 - 7 - minimumSupportedOcamlVersion = "4.00"; 8 - 9 - src = fetchFromGitHub { 10 - owner = "janestreet"; 11 - repo = "pa_bench"; 12 - rev = version; 13 - sha256 = "sha256-WaXB3lgNPHy/z6D7uHxfD5W4HYuTZ+ieRbxxHlPao7c="; 14 - }; 15 - 16 - buildInputs = [ pa_ounit ]; 17 - propagatedBuildInputs = [ type_conv ]; 18 - 19 - meta = with lib; { 20 - homepage = "https://github.com/janestreet/pa_bench"; 21 - description = "Syntax extension for inline benchmarks"; 22 - license = licenses.asl20; 23 - maintainers = [ maintainers.ericbmerritt ]; 24 - }; 25 - }
-26
pkgs/development/ocaml-modules/pa_ounit/default.nix
··· 1 - { lib, buildOcaml, ocaml, fetchFromGitHub, ounit }: 2 - 3 - if lib.versionAtLeast ocaml.version "4.06" 4 - then throw "pa_ounit is not available for OCaml ${ocaml.version}" 5 - else 6 - 7 - buildOcaml rec { 8 - pname = "pa_ounit"; 9 - version = "113.00.00"; 10 - 11 - src = fetchFromGitHub { 12 - owner = "janestreet"; 13 - repo = "pa_ounit"; 14 - rev = version; 15 - sha256 = "sha256-zzXN+mSJtlnQ3e1QoEukCiyfDEoe8cBdkAQ3U1dkvEk="; 16 - }; 17 - 18 - propagatedBuildInputs = [ ounit ]; 19 - 20 - meta = with lib; { 21 - homepage = "https://github.com/janestreet/pa_ounit"; 22 - description = "OCaml inline testing"; 23 - license = licenses.asl20; 24 - maintainers = [ maintainers.ericbmerritt ]; 25 - }; 26 - }
+2 -2
pkgs/development/python-modules/faraday-agent-parameters-types/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "faraday-agent-parameters-types"; 10 - version = "1.0.2"; 10 + version = "1.0.3"; 11 11 12 12 src = fetchPypi { 13 13 pname = "faraday_agent_parameters_types"; 14 14 inherit version; 15 - sha256 = "sha256-zH/ZkqL+kL3J1o7dhB4WYy2tbofFZm+kxEGn5+nRgjc="; 15 + sha256 = "6155669db477c3330c0850814eabe231bbbadf9d2ec57b4f734994f76eaee0e7"; 16 16 }; 17 17 18 18 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/faraday-plugins/default.nix
··· 16 16 17 17 buildPythonPackage rec { 18 18 pname = "faraday-plugins"; 19 - version = "1.5.7"; 19 + version = "1.5.8"; 20 20 format = "setuptools"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "infobyte"; 24 24 repo = "faraday_plugins"; 25 25 rev = "v${version}"; 26 - sha256 = "sha256-EW9p5r7RwWohNGwbITtDrEd1FYLtOwWXhVWFgPCG+Po="; 26 + sha256 = "1r415g2f0cid8nr3y27ipx9hvwzh70l5wp0d7nv25qblc7g38mms"; 27 27 }; 28 28 29 29 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/google-cloud-vision/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "google-cloud-vision"; 14 - version = "2.6.2"; 14 + version = "2.6.3"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "542a300f4b79ed9574cdeb4eb47cf8899f0915041e8bf0058e8192a620087d30"; 18 + sha256 = "54b7f63c746ab95a504bd6b9b1d806192483976a3452a1a59a7faa0eaaa03491"; 19 19 }; 20 20 21 21 propagatedBuildInputs = [ libcst google-api-core proto-plus];
+5 -6
pkgs/development/tools/kustomize/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "kustomize"; 5 - version = "4.4.0"; 5 + version = "4.4.1"; 6 6 # rev is the commit of the tag, mainly for kustomize version command output 7 - rev = "9e8e7a7fe99ec9fbf801463e8607928322fc5245"; 7 + rev = "b2d65ddc98e09187a8e38adc27c30bab078c1dbf"; 8 8 9 9 ldflags = let t = "sigs.k8s.io/kustomize/api/provenance"; in 10 10 [ ··· 17 17 owner = "kubernetes-sigs"; 18 18 repo = pname; 19 19 rev = "kustomize/v${version}"; 20 - sha256 = "sha256-dHCUuKEUJ4xKMfeR629y/cdM7ZBgP3GxUSKGQYj9Ahg="; 20 + sha256 = "sha256-gq5SrI1f6ctGIL0Arf8HQMfgnlglwWlsn1r27Ug70gs="; 21 21 }; 22 22 23 - # TODO: Remove once https://github.com/kubernetes-sigs/kustomize/pull/3708 got merged. 24 - doCheck = false; 23 + doCheck = true; 25 24 26 25 # avoid finding test and development commands 27 26 sourceRoot = "source/kustomize"; 28 27 29 - vendorSha256 = "sha256-jP3Jf8QtdNnCrXO3JfyQNCfMwz9d3UaKVTh8DSbx6vA="; 28 + vendorSha256 = "sha256-2GbRk7A8VwGONmL74cc2TA+MLyJrSSOQPLaded5s90k="; 30 29 31 30 meta = with lib; { 32 31 description = "Customization of kubernetes YAML configurations";
+3 -3
pkgs/development/tools/rust/bindgen/default.nix
··· 5 5 6 6 rustPlatform.buildRustPackage rec { 7 7 pname = "rust-bindgen"; 8 - version = "0.59.1"; 8 + version = "0.59.2"; 9 9 10 10 RUSTFLAGS = "--cap-lints warn"; # probably OK to remove after update 11 11 ··· 13 13 owner = "rust-lang"; 14 14 repo = pname; 15 15 rev = "v${version}"; 16 - sha256 = "sha256-nCww9sr6kF7nCQeIGtOXddxD3dR/SJ0rqAc+RlZnUkQ="; 16 + sha256 = "sha256-bJYdyf5uZgWe7fQ80/3QsRV0qyExYn6P9UET3tzwPFs="; 17 17 }; 18 18 19 - cargoSha256 = "sha256-3EXYC/mwzVxo/ginvF1WFtS7ABE/ybyuKb58uMqfTDs="; 19 + cargoSha256 = "sha256-zhENlrqj611RkKDvpDtDFWc58wfQVamkJnpe2nvRieE="; 20 20 21 21 #for substituteAll 22 22 libclang = llvmPackages_latest.libclang.lib;
+4 -4
pkgs/games/mindustry/default.nix
··· 29 29 # Note: when raising the version, ensure that all SNAPSHOT versions in 30 30 # build.gradle are replaced by a fixed version 31 31 # (the current one at the time of release) (see postPatch). 32 - version = "126.1"; 32 + version = "126.2"; 33 33 buildVersion = makeBuildVersion version; 34 34 35 35 Mindustry = fetchFromGitHub { 36 36 owner = "Anuken"; 37 37 repo = "Mindustry"; 38 38 rev = "v${version}"; 39 - sha256 = "cyg4TofSSFLv8pM3zzvc0FxXMiTm+OIchBJF9PDQrkg="; 39 + sha256 = "URmjmfzQAVVl6erbh3+FVFdN7vGTNwYKPtcrwtt9vkg="; 40 40 }; 41 41 Arc = fetchFromGitHub { 42 42 owner = "Anuken"; 43 43 repo = "Arc"; 44 44 rev = "v${version}"; 45 - sha256 = "uBIm82mt1etBB/HrNY6XGa7mmBfwd1E3RtqN8Rk5qeY="; 45 + sha256 = "pUUak5P9t4RmSdT+/oH/8oo6l7rjIN08XDJ06TcUn8I="; 46 46 }; 47 47 soloud = fetchFromGitHub { 48 48 owner = "Anuken"; ··· 113 113 ''; 114 114 outputHashAlgo = "sha256"; 115 115 outputHashMode = "recursive"; 116 - outputHash = "Mw8LZ1iW6vn4RkBBs8SWHp6mo2Bhj7tMZjLbyuJUqSI="; 116 + outputHash = "+7vSwQT6LwHgKE9DubISznq4G4DgvlnD7WaF1KywBzU="; 117 117 }; 118 118 119 119 in
+53 -16
pkgs/misc/emulators/vice/default.nix
··· 1 - { lib, stdenv, fetchurl, bison, flex, perl, libpng, giflib, libjpeg, alsa-lib, readline, libGLU, libGL, libXaw 2 - , pkg-config, gtk2, SDL, autoreconfHook, makeDesktopItem 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , bison 5 + , flex 6 + , perl 7 + , libpng 8 + , giflib 9 + , libjpeg 10 + , alsa-lib 11 + , readline 12 + , libGLU 13 + , libGL 14 + , libXaw 15 + , pkg-config 16 + , gtk2 17 + , SDL 18 + , SDL_image 19 + , autoreconfHook 20 + , makeDesktopItem 21 + , dos2unix 22 + , xa 23 + , file 3 24 }: 4 25 5 26 stdenv.mkDerivation rec { 6 27 pname = "vice"; 7 - version = "3.1"; 28 + version = "3.5"; 8 29 9 30 src = fetchurl { 10 31 url = "mirror://sourceforge/vice-emu/vice-${version}.tar.gz"; 11 - sha256 = "0h0jbml02s2a36hr78dxv1zshmfhxp1wadpcdl09aq416fb1bf1y"; 32 + sha256 = "sha256-Vrl4+q64solgMr1gTQPDUBACGH7vHKWM7O1A8Rpl3A4="; 12 33 }; 13 34 14 - buildInputs = [ bison flex perl libpng giflib libjpeg alsa-lib readline libGLU libGL 15 - pkg-config gtk2 SDL autoreconfHook libXaw ]; 35 + nativeBuildInputs = [ 36 + autoreconfHook 37 + bison 38 + dos2unix 39 + file 40 + flex 41 + pkg-config 42 + ]; 43 + 44 + buildInputs = [ 45 + alsa-lib 46 + giflib 47 + gtk2 48 + libGL 49 + libGLU 50 + libXaw 51 + libjpeg 52 + libpng 53 + perl 54 + readline 55 + SDL 56 + SDL_image 57 + xa 58 + ]; 16 59 dontDisableStatic = true; 17 - configureFlags = [ "--enable-fullscreen --enable-gnomeui" ]; 60 + configureFlags = [ "--enable-fullscreen" "--enable-gnomeui" "--disable-pdf-docs" ]; 18 61 19 62 desktopItem = makeDesktopItem { 20 63 name = "vice"; ··· 71 28 preBuild = '' 72 29 for i in src/resid src/resid-dtv 73 30 do 74 - mkdir -pv $i/src 75 - ln -sv ../../wrap-u-ar.sh $i/src 31 + mkdir -pv $i/src 32 + ln -sv ../../wrap-u-ar.sh $i/src 76 33 done 77 34 ''; 78 - patchPhase = '' 79 - # Disable font-cache update 80 - sed -i -e "s|install: install-data-am|install-no: install-data-am|" data/fonts/Makefile.am 81 - ''; 82 - 83 - #NIX_LDFLAGS = "-lX11 -L${libX11}/lib"; 84 35 85 36 postInstall = '' 86 37 mkdir -p $out/share/applications ··· 83 46 84 47 meta = { 85 48 description = "Commodore 64, 128 and other emulators"; 86 - homepage = "http://www.viceteam.org"; 49 + homepage = "https://vice-emu.sourceforge.io/"; 87 50 license = lib.licenses.gpl2Plus; 88 51 maintainers = [ lib.maintainers.sander ]; 89 52 platforms = lib.platforms.linux;
+2 -2
pkgs/servers/keycloak/default.nix
··· 18 18 in 19 19 stdenv.mkDerivation rec { 20 20 pname = "keycloak"; 21 - version = "15.0.2"; 21 + version = "15.1.0"; 22 22 23 23 src = fetchzip { 24 24 url = "https://github.com/keycloak/keycloak/releases/download/${version}/keycloak-${version}.zip"; 25 - sha256 = "sha256-GlnSsvAYBjRTtabMVrpWUH0EWEdLIe6ud+HIXJqTsqY="; 25 + sha256 = "0s8nvp1ca30569k1a7glbn2zvvchz35s2r8d08fbs5zjngnz3276"; 26 26 }; 27 27 28 28 nativeBuildInputs = [ makeWrapper ];
+3 -3
pkgs/servers/nosql/apache-jena/binary.nix
··· 3 3 s = # Generated upstream information 4 4 rec { 5 5 baseName="apache-jena"; 6 - version = "4.2.0"; 6 + version = "4.3.1"; 7 7 name="${baseName}-${version}"; 8 - url="http://archive.apache.org/dist/jena/binaries/apache-jena-${version}.tar.gz"; 9 - sha256 = "1yiqlsp1g2fladal8mj164b9s0qsl5csllg54p7x7w63wf7gixnq"; 8 + url="https://dlcdn.apache.org/jena/binaries/apache-jena-${version}.tar.gz"; 9 + sha256 = "02asp88smayn68hc019fwp0si9mc79vxn8py7qhx3qzwjk6j9p71"; 10 10 }; 11 11 buildInputs = [ 12 12 makeWrapper
+3 -3
pkgs/servers/nosql/apache-jena/fuseki-binary.nix
··· 3 3 s = # Generated upstream information 4 4 rec { 5 5 baseName="apache-jena-fuseki"; 6 - version = "4.2.0"; 6 + version = "4.3.1"; 7 7 name="${baseName}-${version}"; 8 - url="http://archive.apache.org/dist/jena/binaries/apache-jena-fuseki-${version}.tar.gz"; 9 - sha256 = "1x3va4yqmxh55lhr6ms85ks9v0lqkl3y41h0bpjdycp8j96lsy3h"; 8 + url="https://dlcdn.apache.org/jena/binaries/apache-jena-fuseki-${version}.tar.gz"; 9 + sha256 = "1r0vfa7d55lzw22yfx46mxxmz8x8pkr666vggqw2m1rzzj52z9nx"; 10 10 }; 11 11 buildInputs = [ 12 12 makeWrapper
+5 -1
pkgs/servers/web-apps/dokuwiki/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, writeText }: 1 + { lib, stdenv, fetchFromGitHub, writeText, nixosTests }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "dokuwiki"; ··· 44 44 cp ${phpLocalConfig} $out/share/dokuwiki/conf/local.php 45 45 cp ${phpPluginsLocalConfig} $out/share/dokuwiki/conf/plugins.local.php 46 46 ''; 47 + 48 + passthru.tests = { 49 + inherit (nixosTests) dokuwiki; 50 + }; 47 51 48 52 meta = with lib; { 49 53 description = "Simple to use and highly versatile Open Source wiki software that doesn't require a database";
+2 -2
pkgs/tools/networking/i2pd/default.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "i2pd"; 12 - version = "2.39.0"; 12 + version = "2.40.0"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "PurpleI2P"; 16 16 repo = pname; 17 17 rev = version; 18 - sha256 = "sha256-j8kHuX5Ca90ODjmF94HpGvjSpocDSuSxfVmvbIYRAKo="; 18 + sha256 = "sha256-Cld5TP2YoLzm73q7uP/pwqEeUsT5uMPAUx9HABOVeZA="; 19 19 }; 20 20 21 21 buildInputs = with lib; [ boost zlib openssl ]
+10 -6
pkgs/tools/package-management/dpkg/default.nix
··· 1 - { lib, stdenv, fetchurl, perl, zlib, bzip2, xz, makeWrapper, coreutils }: 1 + { lib, stdenv, fetchurl, perl, zlib, bzip2, xz, zstd 2 + , makeWrapper, coreutils, autoreconfHook, pkg-config 3 + }: 2 4 3 5 stdenv.mkDerivation rec { 4 6 pname = "dpkg"; 5 - version = "1.20.9"; 7 + version = "1.20.9ubuntu2"; 6 8 7 9 src = fetchurl { 8 - url = "mirror://debian/pool/main/d/dpkg/dpkg_${version}.tar.xz"; 9 - sha256 = "sha256-XOJCgw8hO1Yg8I5sQYOtse9Nydoo0xmIonyHxx/lNM4="; 10 + url = "mirror://ubuntu/pool/main/d/dpkg/dpkg_${version}.tar.xz"; 11 + sha256 = "sha256-BuCofGpi9R0cyhvkZqu9IxupqZvZhbE2J/B4wgUqMQw="; 10 12 }; 11 13 12 14 configureFlags = [ ··· 18 16 (lib.optionalString stdenv.isDarwin "--disable-linker-optimisations") 19 17 (lib.optionalString stdenv.isDarwin "--disable-start-stop-daemon") 20 18 ]; 19 + 20 + enableParallelBuilding = true; 21 21 22 22 preConfigure = '' 23 23 # Nice: dpkg has a circular dependency on itself. Its configure ··· 53 49 --replace '"diff"' \"${coreutils}/bin/diff\" 54 50 ''; 55 51 56 - buildInputs = [ perl zlib bzip2 xz ]; 57 - nativeBuildInputs = [ makeWrapper perl ]; 52 + buildInputs = [ perl zlib bzip2 xz zstd ]; 53 + nativeBuildInputs = [ makeWrapper perl autoreconfHook pkg-config ]; 58 54 59 55 postInstall = 60 56 ''
+2
pkgs/top-level/all-packages.nix
··· 10463 10463 10464 10464 v2ray-domain-list-community = callPackage ../data/misc/v2ray-domain-list-community { }; 10465 10465 10466 + v2ray-geoip = callPackage ../data/misc/v2ray-geoip { }; 10467 + 10466 10468 vacuum = callPackage ../applications/networking/instant-messengers/vacuum {}; 10467 10469 10468 10470 vampire = callPackage ../applications/science/logic/vampire {};
-4
pkgs/top-level/ocaml-packages.nix
··· 1126 1126 1127 1127 ocurl = callPackage ../development/ocaml-modules/ocurl { }; 1128 1128 1129 - pa_ounit = callPackage ../development/ocaml-modules/pa_ounit { }; 1130 - 1131 - pa_bench = callPackage ../development/ocaml-modules/pa_bench { }; 1132 - 1133 1129 parany = callPackage ../development/ocaml-modules/parany { }; 1134 1130 1135 1131 pipebang = callPackage ../development/ocaml-modules/pipebang { };