nixpkgs mirror (for testing) github.com/NixOS/nixpkgs
nix

Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
f61e6f8d 2f395f3c

+821 -508
+17
nixos/doc/manual/from_md/release-notes/rl-2305.section.xml
··· 146 146 </listitem> 147 147 <listitem> 148 148 <para> 149 + In <literal>mastodon</literal> it is now necessary to specify 150 + location of file with <literal>PostgreSQL</literal> database 151 + password. In 152 + <literal>services.mastodon.database.passwordFile</literal> 153 + parameter default value 154 + <literal>/var/lib/mastodon/secrets/db-password</literal> has 155 + been changed to <literal>null</literal>. 156 + </para> 157 + </listitem> 158 + <listitem> 159 + <para> 149 160 The <literal>nix.readOnlyStore</literal> option has been 150 161 renamed to <literal>boot.readOnlyNixStore</literal> to clarify 151 162 that it configures the NixOS boot process, not the Nix daemon. ··· 217 206 <para> 218 207 The minimal ISO image now uses the 219 208 <literal>nixos/modules/profiles/minimal.nix</literal> profile. 209 + </para> 210 + </listitem> 211 + <listitem> 212 + <para> 213 + <literal>mastodon</literal> now supports connection to a 214 + remote <literal>PostgreSQL</literal> database. 220 215 </para> 221 216 </listitem> 222 217 <listitem>
+4
nixos/doc/manual/release-notes/rl-2305.section.md
··· 43 43 44 44 - Qt 5.12 and 5.14 have been removed, as the corresponding branches have been EOL upstream for a long time. This affected under 10 packages in nixpkgs, largely unmaintained upstream as well, however, out-of-tree package expressions may need to be updated manually. 45 45 46 + - In `mastodon` it is now necessary to specify location of file with `PostgreSQL` database password. In `services.mastodon.database.passwordFile` parameter default value `/var/lib/mastodon/secrets/db-password` has been changed to `null`. 47 + 46 48 - The `nix.readOnlyStore` option has been renamed to `boot.readOnlyNixStore` to clarify that it configures the NixOS boot process, not the Nix daemon. 47 49 48 50 ## Other Notable Changes {#sec-release-23.05-notable-changes} ··· 65 63 - To reduce closure size in `nixos/modules/profiles/minimal.nix` profile disabled installation documentations and manuals. Also disabled `logrotate` and `udisks2` services. 66 64 67 65 - The minimal ISO image now uses the `nixos/modules/profiles/minimal.nix` profile. 66 + 67 + - `mastodon` now supports connection to a remote `PostgreSQL` database. 68 68 69 69 - A new `virtualisation.rosetta` module was added to allow running `x86_64` binaries through [Rosetta](https://developer.apple.com/documentation/apple-silicon/about-the-rosetta-translation-environment) inside virtualised NixOS guests on Apple silicon. This feature works by default with the [UTM](https://docs.getutm.app/) virtualisation [package](https://search.nixos.org/packages?channel=unstable&show=utm&from=0&size=1&sort=relevance&type=packages&query=utm). 70 70
+1
nixos/modules/services/audio/roon-server.nix
··· 40 40 wantedBy = [ "multi-user.target" ]; 41 41 42 42 environment.ROON_DATAROOT = "/var/lib/${name}"; 43 + environment.ROON_ID_DIR = "/var/lib/${name}"; 43 44 44 45 serviceConfig = { 45 46 ExecStart = "${pkgs.roon-server}/bin/RoonServer";
+1 -1
nixos/modules/services/networking/cloudflared.nix
··· 258 258 }; 259 259 }; 260 260 261 - config = { 261 + config = mkIf cfg.enable { 262 262 systemd.targets = 263 263 mapAttrs' 264 264 (name: tunnel:
+46 -12
nixos/modules/services/web-apps/mastodon.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { lib, pkgs, config, options, ... }: 2 2 3 3 let 4 4 cfg = config.services.mastodon; 5 + opt = options.services.mastodon; 6 + 5 7 # We only want to create a database if we're actually going to connect to it. 6 8 databaseActuallyCreateLocally = cfg.database.createLocally && cfg.database.host == "/run/postgresql"; 7 9 ··· 25 23 REDIS_HOST = cfg.redis.host; 26 24 REDIS_PORT = toString(cfg.redis.port); 27 25 DB_HOST = cfg.database.host; 28 - DB_PORT = toString(cfg.database.port); 29 26 DB_NAME = cfg.database.name; 30 27 LOCAL_DOMAIN = cfg.localDomain; 31 28 SMTP_SERVER = cfg.smtp.host; ··· 38 37 39 38 TRUSTED_PROXY_IP = cfg.trustedProxy; 40 39 } 41 - // (if cfg.smtp.authenticate then { SMTP_LOGIN = cfg.smtp.user; } else {}) 40 + // lib.optionalAttrs (cfg.database.host != "/run/postgresql" && cfg.database.port != null) { DB_PORT = toString cfg.database.port; } 41 + // lib.optionalAttrs cfg.smtp.authenticate { SMTP_LOGIN = cfg.smtp.user; } 42 42 // cfg.extraConfig; 43 43 44 44 systemCallsList = [ "@cpu-emulation" "@debug" "@keyring" "@ipc" "@mount" "@obsolete" "@privileged" "@setuid" ]; ··· 316 314 }; 317 315 318 316 port = lib.mkOption { 319 - type = lib.types.port; 320 - default = 5432; 317 + type = lib.types.nullOr lib.types.port; 318 + default = if cfg.database.createLocally then null else 5432; 319 + defaultText = lib.literalExpression '' 320 + if config.${opt.database.createLocally} 321 + then null 322 + else 5432 323 + ''; 321 324 description = lib.mdDoc "Database host port."; 322 325 }; 323 326 ··· 340 333 341 334 passwordFile = lib.mkOption { 342 335 type = lib.types.nullOr lib.types.path; 343 - default = "/var/lib/mastodon/secrets/db-password"; 344 - example = "/run/keys/mastodon-db-password"; 336 + default = null; 337 + example = "/var/lib/mastodon/secrets/db-password"; 345 338 description = lib.mdDoc '' 346 339 A file containing the password corresponding to 347 340 {option}`database.user`. ··· 475 468 assertions = [ 476 469 { 477 470 assertion = databaseActuallyCreateLocally -> (cfg.user == cfg.database.user); 478 - message = ''For local automatic database provisioning (services.mastodon.database.createLocally == true) with peer authentication (services.mastodon.database.host == "/run/postgresql") to work services.mastodon.user and services.mastodon.database.user must be identical.''; 471 + message = '' 472 + For local automatic database provisioning (services.mastodon.database.createLocally == true) with peer 473 + authentication (services.mastodon.database.host == "/run/postgresql") to work services.mastodon.user 474 + and services.mastodon.database.user must be identical. 475 + ''; 476 + } 477 + { 478 + assertion = !databaseActuallyCreateLocally -> (cfg.database.host != "/run/postgresql"); 479 + message = '' 480 + <option>services.mastodon.database.host</option> needs to be set if 481 + <option>services.mastodon.database.createLocally</option> is not enabled. 482 + ''; 479 483 } 480 484 { 481 485 assertion = cfg.smtp.authenticate -> (cfg.smtp.user != null); ··· 530 512 OTP_SECRET="$(cat ${cfg.otpSecretFile})" 531 513 VAPID_PRIVATE_KEY="$(cat ${cfg.vapidPrivateKeyFile})" 532 514 VAPID_PUBLIC_KEY="$(cat ${cfg.vapidPublicKeyFile})" 515 + '' + lib.optionalString (cfg.database.passwordFile != null) '' 533 516 DB_PASS="$(cat ${cfg.database.passwordFile})" 534 - '' + (if cfg.smtp.authenticate then '' 517 + '' + lib.optionalString cfg.smtp.authenticate '' 535 518 SMTP_PASSWORD="$(cat ${cfg.smtp.passwordFile})" 536 - '' else "") + '' 519 + '' + '' 537 520 EOF 538 521 ''; 539 522 environment = env; ··· 549 530 }; 550 531 551 532 systemd.services.mastodon-init-db = lib.mkIf cfg.automaticMigrations { 552 - script = '' 533 + script = lib.optionalString (!databaseActuallyCreateLocally) '' 534 + umask 077 535 + 536 + export PGPASSFILE 537 + PGPASSFILE=$(mktemp) 538 + cat > $PGPASSFILE <<EOF 539 + ${cfg.database.host}:${toString cfg.database.port}:${cfg.database.name}:${cfg.database.user}:$(cat ${cfg.database.passwordFile}) 540 + EOF 541 + 542 + '' + '' 553 543 if [ `psql ${cfg.database.name} -c \ 554 544 "select count(*) from pg_class c \ 555 545 join pg_namespace s on s.oid = c.relnamespace \ ··· 569 541 else 570 542 rails db:migrate 571 543 fi 544 + '' + lib.optionalString (!databaseActuallyCreateLocally) '' 545 + rm $PGPASSFILE 546 + unset PGPASSFILE 572 547 ''; 573 548 path = [ cfg.package pkgs.postgresql ]; 574 - environment = env; 549 + environment = env // lib.optionalAttrs (!databaseActuallyCreateLocally) { 550 + PGHOST = cfg.database.host; 551 + PGUSER = cfg.database.user; 552 + }; 575 553 serviceConfig = { 576 554 Type = "oneshot"; 577 555 EnvironmentFile = [ "/var/lib/mastodon/.secrets_env" ];
+1 -1
nixos/tests/all-tests.nix
··· 365 365 mailhog = handleTest ./mailhog.nix {}; 366 366 man = handleTest ./man.nix {}; 367 367 mariadb-galera = handleTest ./mysql/mariadb-galera.nix {}; 368 - mastodon = handleTestOn ["x86_64-linux" "i686-linux" "aarch64-linux"] ./web-apps/mastodon.nix {}; 368 + mastodon = discoverTests (import ./web-apps/mastodon { inherit handleTestOn; }); 369 369 matomo = handleTest ./matomo.nix {}; 370 370 matrix-appservice-irc = handleTest ./matrix/appservice-irc.nix {}; 371 371 matrix-conduit = handleTest ./matrix/conduit.nix {};
-130
nixos/tests/web-apps/mastodon.nix
··· 1 - import ../make-test-python.nix ({pkgs, ...}: 2 - let 3 - cert = pkgs: pkgs.runCommand "selfSignedCerts" { buildInputs = [ pkgs.openssl ]; } '' 4 - openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -nodes -subj '/CN=mastodon.local' -days 36500 5 - mkdir -p $out 6 - cp key.pem cert.pem $out 7 - ''; 8 - 9 - hosts = '' 10 - 192.168.2.101 mastodon.local 11 - ''; 12 - 13 - in 14 - { 15 - name = "mastodon"; 16 - meta.maintainers = with pkgs.lib.maintainers; [ erictapen izorkin turion ]; 17 - 18 - nodes = { 19 - server = { pkgs, ... }: { 20 - 21 - virtualisation.memorySize = 2048; 22 - 23 - networking = { 24 - interfaces.eth1 = { 25 - ipv4.addresses = [ 26 - { address = "192.168.2.101"; prefixLength = 24; } 27 - ]; 28 - }; 29 - extraHosts = hosts; 30 - firewall.allowedTCPPorts = [ 80 443 ]; 31 - }; 32 - 33 - security = { 34 - pki.certificateFiles = [ "${cert pkgs}/cert.pem" ]; 35 - }; 36 - 37 - services.redis.servers.mastodon = { 38 - enable = true; 39 - bind = "127.0.0.1"; 40 - port = 31637; 41 - }; 42 - 43 - services.mastodon = { 44 - enable = true; 45 - configureNginx = true; 46 - localDomain = "mastodon.local"; 47 - enableUnixSocket = false; 48 - smtp = { 49 - createLocally = false; 50 - fromAddress = "mastodon@mastodon.local"; 51 - }; 52 - extraConfig = { 53 - EMAIL_DOMAIN_ALLOWLIST = "example.com"; 54 - }; 55 - }; 56 - 57 - services.nginx = { 58 - virtualHosts."mastodon.local" = { 59 - enableACME = pkgs.lib.mkForce false; 60 - sslCertificate = "${cert pkgs}/cert.pem"; 61 - sslCertificateKey = "${cert pkgs}/key.pem"; 62 - }; 63 - }; 64 - }; 65 - 66 - client = { pkgs, ... }: { 67 - environment.systemPackages = [ pkgs.jq ]; 68 - networking = { 69 - interfaces.eth1 = { 70 - ipv4.addresses = [ 71 - { address = "192.168.2.102"; prefixLength = 24; } 72 - ]; 73 - }; 74 - extraHosts = hosts; 75 - }; 76 - 77 - security = { 78 - pki.certificateFiles = [ "${cert pkgs}/cert.pem" ]; 79 - }; 80 - }; 81 - }; 82 - 83 - testScript = '' 84 - start_all() 85 - 86 - server.wait_for_unit("nginx.service") 87 - server.wait_for_unit("redis-mastodon.service") 88 - server.wait_for_unit("postgresql.service") 89 - server.wait_for_unit("mastodon-sidekiq.service") 90 - server.wait_for_unit("mastodon-streaming.service") 91 - server.wait_for_unit("mastodon-web.service") 92 - server.wait_for_open_port(55000) 93 - server.wait_for_open_port(55001) 94 - 95 - # Check that mastodon-media-auto-remove is scheduled 96 - server.succeed("systemctl status mastodon-media-auto-remove.timer") 97 - 98 - # Check Mastodon version from remote client 99 - client.succeed("curl --fail https://mastodon.local/api/v1/instance | jq -r '.version' | grep '${pkgs.mastodon.version}'") 100 - 101 - # Check access from remote client 102 - client.succeed("curl --fail https://mastodon.local/about | grep 'Mastodon hosted on mastodon.local'") 103 - client.succeed("curl --fail $(curl https://mastodon.local/api/v1/instance 2> /dev/null | jq -r .thumbnail) --output /dev/null") 104 - 105 - # Simple check tootctl commands 106 - # Check Mastodon version 107 - server.succeed("mastodon-tootctl version | grep '${pkgs.mastodon.version}'") 108 - 109 - # Manage accounts 110 - server.succeed("mastodon-tootctl email_domain_blocks add example.com") 111 - server.succeed("mastodon-tootctl email_domain_blocks list | grep example.com") 112 - server.fail("mastodon-tootctl email_domain_blocks list | grep mastodon.local") 113 - server.fail("mastodon-tootctl accounts create alice --email=alice@example.com") 114 - server.succeed("mastodon-tootctl email_domain_blocks remove example.com") 115 - server.succeed("mastodon-tootctl accounts create bob --email=bob@example.com") 116 - server.succeed("mastodon-tootctl accounts approve bob") 117 - server.succeed("mastodon-tootctl accounts delete bob") 118 - 119 - # Manage IP access 120 - server.succeed("mastodon-tootctl ip_blocks add 192.168.0.0/16 --severity=no_access") 121 - server.succeed("mastodon-tootctl ip_blocks export | grep 192.168.0.0/16") 122 - server.fail("mastodon-tootctl ip_blocks export | grep 172.16.0.0/16") 123 - client.fail("curl --fail https://mastodon.local/about") 124 - server.succeed("mastodon-tootctl ip_blocks remove 192.168.0.0/16") 125 - client.succeed("curl --fail https://mastodon.local/about") 126 - 127 - server.shutdown() 128 - client.shutdown() 129 - ''; 130 - })
+9
nixos/tests/web-apps/mastodon/default.nix
··· 1 + { system ? builtins.currentSystem, handleTestOn }: 2 + let 3 + supportedSystems = [ "x86_64-linux" "i686-linux" "aarch64-linux" ]; 4 + 5 + in 6 + { 7 + standard = handleTestOn supportedSystems ./standard.nix { inherit system; }; 8 + remote-postgresql = handleTestOn supportedSystems ./remote-postgresql.nix { inherit system; }; 9 + }
+160
nixos/tests/web-apps/mastodon/remote-postgresql.nix
··· 1 + import ../../make-test-python.nix ({pkgs, ...}: 2 + let 3 + cert = pkgs: pkgs.runCommand "selfSignedCerts" { buildInputs = [ pkgs.openssl ]; } '' 4 + openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -nodes -subj '/CN=mastodon.local' -days 36500 5 + mkdir -p $out 6 + cp key.pem cert.pem $out 7 + ''; 8 + 9 + hosts = '' 10 + 192.168.2.103 mastodon.local 11 + ''; 12 + 13 + in 14 + { 15 + name = "mastodon-remote-postgresql"; 16 + meta.maintainers = with pkgs.lib.maintainers; [ erictapen izorkin turion ]; 17 + 18 + nodes = { 19 + database = { 20 + networking = { 21 + interfaces.eth1 = { 22 + ipv4.addresses = [ 23 + { address = "192.168.2.102"; prefixLength = 24; } 24 + ]; 25 + }; 26 + extraHosts = hosts; 27 + firewall.allowedTCPPorts = [ 5432 ]; 28 + }; 29 + 30 + services.postgresql = { 31 + enable = true; 32 + enableTCPIP = true; 33 + authentication = '' 34 + hostnossl mastodon_local mastodon_test 192.168.2.201/32 md5 35 + ''; 36 + initialScript = pkgs.writeText "postgresql_init.sql" '' 37 + CREATE ROLE mastodon_test LOGIN PASSWORD 'SoDTZcISc3f1M1LJsRLT'; 38 + CREATE DATABASE mastodon_local TEMPLATE template0 ENCODING UTF8; 39 + GRANT ALL PRIVILEGES ON DATABASE mastodon_local TO mastodon_test; 40 + ''; 41 + }; 42 + }; 43 + 44 + nginx = { 45 + networking = { 46 + interfaces.eth1 = { 47 + ipv4.addresses = [ 48 + { address = "192.168.2.103"; prefixLength = 24; } 49 + ]; 50 + }; 51 + extraHosts = hosts; 52 + firewall.allowedTCPPorts = [ 80 443 ]; 53 + }; 54 + 55 + security = { 56 + pki.certificateFiles = [ "${cert pkgs}/cert.pem" ]; 57 + }; 58 + 59 + services.nginx = { 60 + enable = true; 61 + recommendedProxySettings = true; 62 + virtualHosts."mastodon.local" = { 63 + root = "/var/empty"; 64 + forceSSL = true; 65 + enableACME = pkgs.lib.mkForce false; 66 + sslCertificate = "${cert pkgs}/cert.pem"; 67 + sslCertificateKey = "${cert pkgs}/key.pem"; 68 + locations."/" = { 69 + tryFiles = "$uri @proxy"; 70 + }; 71 + locations."@proxy" = { 72 + proxyPass = "http://192.168.2.201:55001"; 73 + proxyWebsockets = true; 74 + }; 75 + locations."/api/v1/streaming/" = { 76 + proxyPass = "http://192.168.2.201:55002"; 77 + proxyWebsockets = true; 78 + }; 79 + }; 80 + }; 81 + }; 82 + 83 + server = { pkgs, ... }: { 84 + virtualisation.memorySize = 2048; 85 + 86 + environment = { 87 + etc = { 88 + "mastodon/password-posgressql-db".text = '' 89 + SoDTZcISc3f1M1LJsRLT 90 + ''; 91 + }; 92 + }; 93 + 94 + networking = { 95 + interfaces.eth1 = { 96 + ipv4.addresses = [ 97 + { address = "192.168.2.201"; prefixLength = 24; } 98 + ]; 99 + }; 100 + extraHosts = hosts; 101 + firewall.allowedTCPPorts = [ 55001 55002 ]; 102 + }; 103 + 104 + services.mastodon = { 105 + enable = true; 106 + configureNginx = false; 107 + localDomain = "mastodon.local"; 108 + enableUnixSocket = false; 109 + database = { 110 + createLocally = false; 111 + host = "192.168.2.102"; 112 + port = 5432; 113 + name = "mastodon_local"; 114 + user = "mastodon_test"; 115 + passwordFile = "/etc/mastodon/password-posgressql-db"; 116 + }; 117 + smtp = { 118 + createLocally = false; 119 + fromAddress = "mastodon@mastodon.local"; 120 + }; 121 + extraConfig = { 122 + BIND = "0.0.0.0"; 123 + EMAIL_DOMAIN_ALLOWLIST = "example.com"; 124 + RAILS_SERVE_STATIC_FILES = "true"; 125 + TRUSTED_PROXY_IP = "192.168.2.103"; 126 + }; 127 + }; 128 + }; 129 + 130 + client = { pkgs, ... }: { 131 + environment.systemPackages = [ pkgs.jq ]; 132 + networking = { 133 + interfaces.eth1 = { 134 + ipv4.addresses = [ 135 + { address = "192.168.2.202"; prefixLength = 24; } 136 + ]; 137 + }; 138 + extraHosts = hosts; 139 + }; 140 + 141 + security = { 142 + pki.certificateFiles = [ "${cert pkgs}/cert.pem" ]; 143 + }; 144 + }; 145 + }; 146 + 147 + testScript = import ./script.nix { 148 + inherit pkgs; 149 + extraInit = '' 150 + nginx.wait_for_unit("nginx.service") 151 + nginx.wait_for_open_port(443) 152 + database.wait_for_unit("postgresql.service") 153 + database.wait_for_open_port(5432) 154 + ''; 155 + extraShutdown = '' 156 + nginx.shutdown() 157 + database.shutdown() 158 + ''; 159 + }; 160 + })
+54
nixos/tests/web-apps/mastodon/script.nix
··· 1 + { pkgs 2 + , extraInit ? "" 3 + , extraShutdown ? "" 4 + }: 5 + 6 + '' 7 + start_all() 8 + 9 + ${extraInit} 10 + 11 + server.wait_for_unit("redis-mastodon.service") 12 + server.wait_for_unit("mastodon-sidekiq.service") 13 + server.wait_for_unit("mastodon-streaming.service") 14 + server.wait_for_unit("mastodon-web.service") 15 + server.wait_for_open_port(55000) 16 + server.wait_for_open_port(55001) 17 + 18 + # Check that mastodon-media-auto-remove is scheduled 19 + server.succeed("systemctl status mastodon-media-auto-remove.timer") 20 + 21 + # Check Mastodon version from remote client 22 + client.succeed("curl --fail https://mastodon.local/api/v1/instance | jq -r '.version' | grep '${pkgs.mastodon.version}'") 23 + 24 + # Check access from remote client 25 + client.succeed("curl --fail https://mastodon.local/about | grep 'Mastodon hosted on mastodon.local'") 26 + client.succeed("curl --fail $(curl https://mastodon.local/api/v1/instance 2> /dev/null | jq -r .thumbnail) --output /dev/null") 27 + 28 + # Simple check tootctl commands 29 + # Check Mastodon version 30 + server.succeed("mastodon-tootctl version | grep '${pkgs.mastodon.version}'") 31 + 32 + # Manage accounts 33 + server.succeed("mastodon-tootctl email_domain_blocks add example.com") 34 + server.succeed("mastodon-tootctl email_domain_blocks list | grep example.com") 35 + server.fail("mastodon-tootctl email_domain_blocks list | grep mastodon.local") 36 + server.fail("mastodon-tootctl accounts create alice --email=alice@example.com") 37 + server.succeed("mastodon-tootctl email_domain_blocks remove example.com") 38 + server.succeed("mastodon-tootctl accounts create bob --email=bob@example.com") 39 + server.succeed("mastodon-tootctl accounts approve bob") 40 + server.succeed("mastodon-tootctl accounts delete bob") 41 + 42 + # Manage IP access 43 + server.succeed("mastodon-tootctl ip_blocks add 192.168.0.0/16 --severity=no_access") 44 + server.succeed("mastodon-tootctl ip_blocks export | grep 192.168.0.0/16") 45 + server.fail("mastodon-tootctl ip_blocks export | grep 172.16.0.0/16") 46 + client.fail("curl --fail https://mastodon.local/about") 47 + server.succeed("mastodon-tootctl ip_blocks remove 192.168.0.0/16") 48 + client.succeed("curl --fail https://mastodon.local/about") 49 + 50 + server.shutdown() 51 + client.shutdown() 52 + 53 + ${extraShutdown} 54 + ''
+92
nixos/tests/web-apps/mastodon/standard.nix
··· 1 + import ../../make-test-python.nix ({pkgs, ...}: 2 + let 3 + cert = pkgs: pkgs.runCommand "selfSignedCerts" { buildInputs = [ pkgs.openssl ]; } '' 4 + openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -nodes -subj '/CN=mastodon.local' -days 36500 5 + mkdir -p $out 6 + cp key.pem cert.pem $out 7 + ''; 8 + 9 + hosts = '' 10 + 192.168.2.101 mastodon.local 11 + ''; 12 + 13 + in 14 + { 15 + name = "mastodon-standard"; 16 + meta.maintainers = with pkgs.lib.maintainers; [ erictapen izorkin turion ]; 17 + 18 + nodes = { 19 + server = { pkgs, ... }: { 20 + 21 + virtualisation.memorySize = 2048; 22 + 23 + networking = { 24 + interfaces.eth1 = { 25 + ipv4.addresses = [ 26 + { address = "192.168.2.101"; prefixLength = 24; } 27 + ]; 28 + }; 29 + extraHosts = hosts; 30 + firewall.allowedTCPPorts = [ 80 443 ]; 31 + }; 32 + 33 + security = { 34 + pki.certificateFiles = [ "${cert pkgs}/cert.pem" ]; 35 + }; 36 + 37 + services.redis.servers.mastodon = { 38 + enable = true; 39 + bind = "127.0.0.1"; 40 + port = 31637; 41 + }; 42 + 43 + services.mastodon = { 44 + enable = true; 45 + configureNginx = true; 46 + localDomain = "mastodon.local"; 47 + enableUnixSocket = false; 48 + smtp = { 49 + createLocally = false; 50 + fromAddress = "mastodon@mastodon.local"; 51 + }; 52 + extraConfig = { 53 + EMAIL_DOMAIN_ALLOWLIST = "example.com"; 54 + }; 55 + }; 56 + 57 + services.nginx = { 58 + virtualHosts."mastodon.local" = { 59 + enableACME = pkgs.lib.mkForce false; 60 + sslCertificate = "${cert pkgs}/cert.pem"; 61 + sslCertificateKey = "${cert pkgs}/key.pem"; 62 + }; 63 + }; 64 + }; 65 + 66 + client = { pkgs, ... }: { 67 + environment.systemPackages = [ pkgs.jq ]; 68 + networking = { 69 + interfaces.eth1 = { 70 + ipv4.addresses = [ 71 + { address = "192.168.2.102"; prefixLength = 24; } 72 + ]; 73 + }; 74 + extraHosts = hosts; 75 + }; 76 + 77 + security = { 78 + pki.certificateFiles = [ "${cert pkgs}/cert.pem" ]; 79 + }; 80 + }; 81 + }; 82 + 83 + testScript = import ./script.nix { 84 + inherit pkgs; 85 + extraInit = '' 86 + server.wait_for_unit("nginx.service") 87 + server.wait_for_open_port(443) 88 + server.wait_for_unit("postgresql.service") 89 + server.wait_for_open_port(5432) 90 + ''; 91 + }; 92 + })
+209 -197
pkgs/applications/editors/vim/plugins/generated.nix
··· 185 185 186 186 Navigator-nvim = buildVimPluginFrom2Nix { 187 187 pname = "Navigator.nvim"; 188 - version = "2022-12-12"; 188 + version = "2022-12-13"; 189 189 src = fetchFromGitHub { 190 190 owner = "numToStr"; 191 191 repo = "Navigator.nvim"; 192 - rev = "4a1043074517fc35217f47c7fa3ff320c47f83f5"; 193 - sha256 = "17w2qnaxq0iyhcfv6613zsh4g0plwr5fiv9qvs3m8z049jm5rbiv"; 192 + rev = "a440fea38f8055f0704537a6eea2fae3c04970b6"; 193 + sha256 = "018mg6iw7ynnnd9ikcj6mqxwyz5l5byq3g7b6fvr8a10pa017194"; 194 194 }; 195 195 meta.homepage = "https://github.com/numToStr/Navigator.nvim/"; 196 196 }; ··· 281 281 282 282 SchemaStore-nvim = buildVimPluginFrom2Nix { 283 283 pname = "SchemaStore.nvim"; 284 - version = "2022-12-12"; 284 + version = "2022-12-15"; 285 285 src = fetchFromGitHub { 286 286 owner = "b0o"; 287 287 repo = "SchemaStore.nvim"; 288 - rev = "88a5121859a96c42b75165946e7ff0d318c31a8e"; 289 - sha256 = "10aqwqx9jxc9hpp9ivni4lq91n5zm0qpiqr6f9zz0ch2m8yz3mdv"; 288 + rev = "1e175de11fd7a8e0092d893753b8b797788efa7a"; 289 + sha256 = "0spbn1c28ranm8zpyvsqyjkmhjg28y5vvghvp1m0qscvi52zfmdw"; 290 290 }; 291 291 meta.homepage = "https://github.com/b0o/SchemaStore.nvim/"; 292 292 }; ··· 437 437 438 438 YouCompleteMe = buildVimPluginFrom2Nix { 439 439 pname = "YouCompleteMe"; 440 - version = "2022-12-10"; 440 + version = "2022-12-14"; 441 441 src = fetchFromGitHub { 442 442 owner = "ycm-core"; 443 443 repo = "YouCompleteMe"; 444 - rev = "508b8c64bfbc2ad3106ae67b7828936035b3095e"; 445 - sha256 = "19i19r1z0dqb24fg2z5fpi5m2n155n3v5pw2hq8cq28m0392rbvd"; 444 + rev = "88efc6f6035e4c656e8791f3c3a8a4328a1634dc"; 445 + sha256 = "0krd0rbx5j6wkscsjsf4hmj64cxrqgqwvdzf600cwznfjsnnhb8k"; 446 446 fetchSubmodules = true; 447 447 }; 448 448 meta.homepage = "https://github.com/ycm-core/YouCompleteMe/"; ··· 486 486 487 487 aerial-nvim = buildVimPluginFrom2Nix { 488 488 pname = "aerial.nvim"; 489 - version = "2022-12-12"; 489 + version = "2022-12-15"; 490 490 src = fetchFromGitHub { 491 491 owner = "stevearc"; 492 492 repo = "aerial.nvim"; 493 - rev = "97279a10cc797af96d3e7295026e51e4968d09a1"; 494 - sha256 = "14mylgpk764iac0rwvwgm1k77na7p2df5q1iav5mygl2jfl5amss"; 493 + rev = "086e1904e51fc559673598afbc59842db7981501"; 494 + sha256 = "05ihib3wxjgcvfzg8hldw005iirwglnfzhikf91g3x2yhznmp8g4"; 495 495 fetchSubmodules = true; 496 496 }; 497 497 meta.homepage = "https://github.com/stevearc/aerial.nvim/"; ··· 703 703 704 704 aurora = buildVimPluginFrom2Nix { 705 705 pname = "aurora"; 706 - version = "2022-12-02"; 706 + version = "2022-12-14"; 707 707 src = fetchFromGitHub { 708 708 owner = "ray-x"; 709 709 repo = "aurora"; 710 - rev = "40e5b7d38b08b32a872986959cfad79b2ac00f12"; 711 - sha256 = "0xc6h7kpwjg3nmxlpzg1q2kbr396kq1wirgrrb8lfg6bywr8iari"; 710 + rev = "b60f56ad0bd797eb2f643e4c856b60d898f1435c"; 711 + sha256 = "1x99dwjlzcrl47ykizlg76rvx68633bqzdm1mjx219pd9h7vnsqi"; 712 712 }; 713 713 meta.homepage = "https://github.com/ray-x/aurora/"; 714 714 }; ··· 751 751 752 752 auto-session = buildVimPluginFrom2Nix { 753 753 pname = "auto-session"; 754 - version = "2022-12-11"; 754 + version = "2022-12-13"; 755 755 src = fetchFromGitHub { 756 756 owner = "rmagatti"; 757 757 repo = "auto-session"; 758 - rev = "9639b071d9680764b6e57b08c9fa4a336453558d"; 759 - sha256 = "034ynhab8mq00w6zhdni8qz6fvvwaa33fshk5q36379lamcrlxq4"; 758 + rev = "c8b2f4048f846387361bd04cc185bf1aa7d2e3d1"; 759 + sha256 = "0z02981n9gd5migx774cs4gnwpq9ksd4ava53f4xn973gc8jf4jn"; 760 760 }; 761 761 meta.homepage = "https://github.com/rmagatti/auto-session/"; 762 762 }; ··· 799 799 800 800 barbar-nvim = buildVimPluginFrom2Nix { 801 801 pname = "barbar.nvim"; 802 - version = "2022-12-09"; 802 + version = "2022-12-16"; 803 803 src = fetchFromGitHub { 804 804 owner = "romgrk"; 805 805 repo = "barbar.nvim"; 806 - rev = "bfb2ab023499251c72f922b584e28ba52b0f7791"; 807 - sha256 = "1gzlcmag12gk7xy0rvsxfix9d6g7s50fsvcqwp4rk70y83dl5ijq"; 806 + rev = "637a9d4b5f0ae203e4ab7e9d45297f85d3cce207"; 807 + sha256 = "0d201rb76qgsaq6y04gzcybvifsqbdybgx2b6rddsf8waa11633n"; 808 808 }; 809 809 meta.homepage = "https://github.com/romgrk/barbar.nvim/"; 810 810 }; ··· 1735 1735 1736 1736 coc-nvim = buildVimPluginFrom2Nix { 1737 1737 pname = "coc.nvim"; 1738 - version = "2022-12-12"; 1738 + version = "2022-12-14"; 1739 1739 src = fetchFromGitHub { 1740 1740 owner = "neoclide"; 1741 1741 repo = "coc.nvim"; 1742 - rev = "45346d5a2591c55ac464e4060a281d6b09a9fed3"; 1743 - sha256 = "04sm1kaav6m1m72bwzkvr1scr8m36vxw9pgjk65nbahraiasf71p"; 1742 + rev = "66d910665d7fef9e441293bab0fa08f77d6c004e"; 1743 + sha256 = "1kr8s5dxfq80hf8gdx3q3cji25ci4jj81b8mp3zyr7041xmd8pgq"; 1744 1744 }; 1745 1745 meta.homepage = "https://github.com/neoclide/coc.nvim/"; 1746 1746 }; ··· 1807 1807 1808 1808 command-t = buildVimPluginFrom2Nix { 1809 1809 pname = "command-t"; 1810 - version = "2022-12-01"; 1810 + version = "2022-12-14"; 1811 1811 src = fetchFromGitHub { 1812 1812 owner = "wincent"; 1813 1813 repo = "command-t"; 1814 - rev = "429b6b7b77764f5a660bd1d0c356029e32d71062"; 1815 - sha256 = "0d6854rm5q782hvapais9lnhrblmr9vvwanhc6jqa42g7946d61p"; 1814 + rev = "ba2a995c72287ac9469fbf79235917d4b8f343ce"; 1815 + sha256 = "0h085vl01v5g1gz4fbgcijpf9hr956k47d0k2dgx765x9vxwxi7b"; 1816 1816 }; 1817 1817 meta.homepage = "https://github.com/wincent/command-t/"; 1818 1818 }; ··· 2023 2023 2024 2024 coq-artifacts = buildVimPluginFrom2Nix { 2025 2025 pname = "coq.artifacts"; 2026 - version = "2022-12-12"; 2026 + version = "2022-12-16"; 2027 2027 src = fetchFromGitHub { 2028 2028 owner = "ms-jpq"; 2029 2029 repo = "coq.artifacts"; 2030 - rev = "9a227a77325daaaba4605e5423d70302724a2b9c"; 2031 - sha256 = "0w4gxph7lfn2l5hsipnqxa4lzsy4zw54c66ws78kkj2hgf4l7g8w"; 2030 + rev = "b346640db78186f26c6314e2d079e70051abb288"; 2031 + sha256 = "001jch8haq6jl0i1y7hkr4vv7aibrjyrf83s5vjvqjcp5mr1f5b9"; 2032 2032 }; 2033 2033 meta.homepage = "https://github.com/ms-jpq/coq.artifacts/"; 2034 2034 }; 2035 2035 2036 2036 coq-thirdparty = buildVimPluginFrom2Nix { 2037 2037 pname = "coq.thirdparty"; 2038 - version = "2022-12-12"; 2038 + version = "2022-12-16"; 2039 2039 src = fetchFromGitHub { 2040 2040 owner = "ms-jpq"; 2041 2041 repo = "coq.thirdparty"; 2042 - rev = "4c8ccb671c03903bae9af3c5c4f9af72957dfc98"; 2043 - sha256 = "1kl6cjr0hvciwpg18q7bmqvi71i1pirxdcv09vp4zk6mi7f9d9qm"; 2042 + rev = "e84c7319f90e4ccc557a635ba440eac5727445fb"; 2043 + sha256 = "0adhmc5mw7i1c8liw2fzygfmrk54lg2bfg1kcp1drlrm1hqkicwq"; 2044 2044 }; 2045 2045 meta.homepage = "https://github.com/ms-jpq/coq.thirdparty/"; 2046 2046 }; ··· 2059 2059 2060 2060 coq_nvim = buildVimPluginFrom2Nix { 2061 2061 pname = "coq_nvim"; 2062 - version = "2022-12-12"; 2062 + version = "2022-12-16"; 2063 2063 src = fetchFromGitHub { 2064 2064 owner = "ms-jpq"; 2065 2065 repo = "coq_nvim"; 2066 - rev = "000dab4a373bc9ca86bb9392578edefbb90e33fe"; 2067 - sha256 = "03niqwmnkn3dz4n1hi7mjn290hnmvcn3nxg17nzr8akj6ks8cxv1"; 2066 + rev = "d363d976a9583f1ad0fa85d96349423483b69901"; 2067 + sha256 = "0mdl90imaqwhx67z043c5f79c71gdigf4qwc80gkm3104g30sv0s"; 2068 2068 }; 2069 2069 meta.homepage = "https://github.com/ms-jpq/coq_nvim/"; 2070 2070 }; ··· 2421 2421 2422 2422 deoplete-lsp = buildVimPluginFrom2Nix { 2423 2423 pname = "deoplete-lsp"; 2424 - version = "2022-10-31"; 2424 + version = "2022-12-13"; 2425 2425 src = fetchFromGitHub { 2426 2426 owner = "deoplete-plugins"; 2427 2427 repo = "deoplete-lsp"; 2428 - rev = "09a476e0301c7253e7cf459cea605878c51c370d"; 2429 - sha256 = "1px4wnnd3fg5ri5m57l57d296zks6xardyv6fwny22mnx6nfhngl"; 2428 + rev = "bc41a2f523909f852251e9d179bdf6433892bdda"; 2429 + sha256 = "061352gf9wv2bvf4bqn3pip0lwdxdv92m8i2y55wjrhfvmmq52xx"; 2430 2430 }; 2431 2431 meta.homepage = "https://github.com/deoplete-plugins/deoplete-lsp/"; 2432 2432 }; ··· 2589 2589 2590 2590 diffview-nvim = buildVimPluginFrom2Nix { 2591 2591 pname = "diffview.nvim"; 2592 - version = "2022-12-08"; 2592 + version = "2022-12-14"; 2593 2593 src = fetchFromGitHub { 2594 2594 owner = "sindrets"; 2595 2595 repo = "diffview.nvim"; 2596 - rev = "85903aa26257a4ea42c4bdbf3c998a2006aaaec5"; 2597 - sha256 = "1032blq53y5zdlg4y3zpbi1lmk07qg3p6061dia2hjmfhbkcdzs4"; 2596 + rev = "c6a3d3f1de85bc67b2da62eaf266d4f8cf714fab"; 2597 + sha256 = "0jdsyn9idkjf5lb57nl4p8dir8cisxhp34v9jq5iyn8z0ba8j59m"; 2598 2598 }; 2599 2599 meta.homepage = "https://github.com/sindrets/diffview.nvim/"; 2600 2600 }; ··· 2637 2637 2638 2638 dressing-nvim = buildVimPluginFrom2Nix { 2639 2639 pname = "dressing.nvim"; 2640 - version = "2022-12-05"; 2640 + version = "2022-12-13"; 2641 2641 src = fetchFromGitHub { 2642 2642 owner = "stevearc"; 2643 2643 repo = "dressing.nvim"; 2644 - rev = "ed44aa798ab07dc298f43f35c8e0c93a1b335abb"; 2645 - sha256 = "0di5cwq25in8q9vj8ww8blrvf76hsm5qd1bac67blx3z8qsdpb16"; 2644 + rev = "4436d6f41e2f6b8ada57588acd1a9f8b3d21453c"; 2645 + sha256 = "1iwxqfqp3x09wz3rnvli3y80n38rw149cmjj9pmbkhiqgsm9p461"; 2646 2646 }; 2647 2647 meta.homepage = "https://github.com/stevearc/dressing.nvim/"; 2648 2648 }; ··· 2661 2661 2662 2662 edge = buildVimPluginFrom2Nix { 2663 2663 pname = "edge"; 2664 - version = "2022-11-21"; 2664 + version = "2022-12-13"; 2665 2665 src = fetchFromGitHub { 2666 2666 owner = "sainnhe"; 2667 2667 repo = "edge"; 2668 - rev = "2c8026cd5b1eaca890739799dc57ca8d3ca733b0"; 2669 - sha256 = "0dvfzkz8kr39w18jhms1y32lngwibicgbh9w8hgn7r203f6g027l"; 2668 + rev = "a60ef7702c77288e79cc4c2bcd6fddf96e100db1"; 2669 + sha256 = "17z2y8dwzn7ildd6gjbrfink4jy48h1di7b40d1csbci4ayfa2fc"; 2670 2670 }; 2671 2671 meta.homepage = "https://github.com/sainnhe/edge/"; 2672 2672 }; ··· 2747 2747 2748 2748 everforest = buildVimPluginFrom2Nix { 2749 2749 pname = "everforest"; 2750 - version = "2022-12-07"; 2750 + version = "2022-12-13"; 2751 2751 src = fetchFromGitHub { 2752 2752 owner = "sainnhe"; 2753 2753 repo = "everforest"; 2754 - rev = "478b697fb5605956da781bfe7c1de7a89f4a1628"; 2755 - sha256 = "03n2f5nvnjkz9h74wqc5bl04v9snq285dg75gj0lrxcrg0y6j63q"; 2754 + rev = "8c1f892e31d22a0d99876793788d323eed68f3cd"; 2755 + sha256 = "0npczribj3lv0irpb0ka001r3sfqx93d981hm8aqi4wd1nsaqbvh"; 2756 2756 }; 2757 2757 meta.homepage = "https://github.com/sainnhe/everforest/"; 2758 2758 }; ··· 2976 2976 2977 2977 friendly-snippets = buildVimPluginFrom2Nix { 2978 2978 pname = "friendly-snippets"; 2979 - version = "2022-12-12"; 2979 + version = "2022-12-13"; 2980 2980 src = fetchFromGitHub { 2981 2981 owner = "rafamadriz"; 2982 2982 repo = "friendly-snippets"; 2983 - rev = "6e527e04b003739b67bcf62152282e658de16063"; 2984 - sha256 = "1ji0k854gjvf5qd6brcbwvz7kp9whl12yjmfvnji6cldwhaprx0q"; 2983 + rev = "2379c6245be10fbf0ebd057f0d1f89fe356bf8bc"; 2984 + sha256 = "10xxrx62mb71mh6q2zm82zkgbghlgq39fnqsaig3p947qjlinndn"; 2985 2985 }; 2986 2986 meta.homepage = "https://github.com/rafamadriz/friendly-snippets/"; 2987 2987 }; ··· 3084 3084 3085 3085 fzf-lua = buildVimPluginFrom2Nix { 3086 3086 pname = "fzf-lua"; 3087 - version = "2022-11-30"; 3087 + version = "2022-12-13"; 3088 3088 src = fetchFromGitHub { 3089 3089 owner = "ibhagwan"; 3090 3090 repo = "fzf-lua"; 3091 - rev = "0c8b3389ec433089ebbe9d138c2ec20a6a542ce0"; 3092 - sha256 = "1x70d6k7z9q1dnif67359xm86k9fhb8lbycm5rywh1a39c5skbg8"; 3091 + rev = "b1dea843c2f4c623ac974afc074ce832a29f8548"; 3092 + sha256 = "1gfxk41h5ywv0i3xwf05mrrvnjs8h253saazm32if0sci7m6x99s"; 3093 3093 }; 3094 3094 meta.homepage = "https://github.com/ibhagwan/fzf-lua/"; 3095 3095 }; ··· 3240 3240 3241 3241 gitsigns-nvim = buildNeovimPluginFrom2Nix { 3242 3242 pname = "gitsigns.nvim"; 3243 - version = "2022-11-30"; 3243 + version = "2022-12-15"; 3244 3244 src = fetchFromGitHub { 3245 3245 owner = "lewis6991"; 3246 3246 repo = "gitsigns.nvim"; 3247 - rev = "d076301a634198e0ae3efee3b298fc63c055a871"; 3248 - sha256 = "12990v2zcsas8575nf6ln1byw3zg473s5jpizk4g3v9ikfdvjbfr"; 3247 + rev = "683187285385a0dde6c62e2e6b16e325effdcf04"; 3248 + sha256 = "1j4kwrbvgf9q4n4lphx36ml7ic94f7x34w5chl7dbr7ljpv1372w"; 3249 3249 }; 3250 3250 meta.homepage = "https://github.com/lewis6991/gitsigns.nvim/"; 3251 3251 }; ··· 3384 3384 3385 3385 gruvbox-material = buildVimPluginFrom2Nix { 3386 3386 pname = "gruvbox-material"; 3387 - version = "2022-11-21"; 3387 + version = "2022-12-13"; 3388 3388 src = fetchFromGitHub { 3389 3389 owner = "sainnhe"; 3390 3390 repo = "gruvbox-material"; 3391 - rev = "af9a1d60ca4d7e2ca34c55c46d1dbea0769d9244"; 3392 - sha256 = "11lvqr8g9rwkpb768l2pc65j1r55lrb7410hbprca5qdcpz3n720"; 3391 + rev = "dca3fbce664de8d52ed5fcfbc0f0bc09d2f8a560"; 3392 + sha256 = "114zhhi9amkrdb9q6amasd81qbal7hlh9ywj4fvhgrqka7l5qazb"; 3393 3393 }; 3394 3394 meta.homepage = "https://github.com/sainnhe/gruvbox-material/"; 3395 3395 }; ··· 3658 3658 3659 3659 impatient-nvim = buildVimPluginFrom2Nix { 3660 3660 pname = "impatient.nvim"; 3661 - version = "2022-11-12"; 3661 + version = "2022-12-15"; 3662 3662 src = fetchFromGitHub { 3663 3663 owner = "lewis6991"; 3664 3664 repo = "impatient.nvim"; 3665 - rev = "d3dd30ff0b811756e735eb9020609fa315bfbbcc"; 3666 - sha256 = "04wv6hzmdwcd563kl68n33yyyydhr0rdbjc93874dlh2nlfm7ixn"; 3665 + rev = "9f7eed8133d62457f7ad2ca250eb9b837a4adeb7"; 3666 + sha256 = "0kzghqbidarjabmn1i0vwkz3jfnwpfzj36ild15y77l673acwdcj"; 3667 3667 }; 3668 3668 meta.homepage = "https://github.com/lewis6991/impatient.nvim/"; 3669 3669 }; ··· 4043 4043 4044 4044 leap-nvim = buildVimPluginFrom2Nix { 4045 4045 pname = "leap.nvim"; 4046 - version = "2022-12-12"; 4046 + version = "2022-12-14"; 4047 4047 src = fetchFromGitHub { 4048 4048 owner = "ggandor"; 4049 4049 repo = "leap.nvim"; 4050 - rev = "3336057e841e1adcf1daf9430c9b435a9a010b84"; 4051 - sha256 = "1c0dasxgq057z2jv1cngrk2gqrwzci2rx5mhizwixk2g40n6d4xy"; 4050 + rev = "5e7e4462cc4b9e6a13e0f25b81d88d8b331cb29f"; 4051 + sha256 = "1dp35q869qiw94jwfvc174vq7siggxz263srqs31gd9ivl6c2q7q"; 4052 4052 }; 4053 4053 meta.homepage = "https://github.com/ggandor/leap.nvim/"; 4054 4054 }; ··· 4414 4414 4415 4415 lsp_signature-nvim = buildVimPluginFrom2Nix { 4416 4416 pname = "lsp_signature.nvim"; 4417 - version = "2022-12-04"; 4417 + version = "2022-12-15"; 4418 4418 src = fetchFromGitHub { 4419 4419 owner = "ray-x"; 4420 4420 repo = "lsp_signature.nvim"; 4421 - rev = "9a7e5a093a58b2eefcf77f4a84b8d8c274725d0f"; 4422 - sha256 = "0pmghzzqjm5bvcmaqfq65rabc0p0n6fc5x3j682glm0fjrnlgzj9"; 4421 + rev = "e528f7313dc67aa1f8caa796a56232af5a569871"; 4422 + sha256 = "16cfgkring4g01aam7plw0rgrqvq8xxkmlvax0kfbjlviw4qfbwl"; 4423 4423 }; 4424 4424 meta.homepage = "https://github.com/ray-x/lsp_signature.nvim/"; 4425 4425 }; ··· 4967 4967 4968 4968 neoconf-nvim = buildVimPluginFrom2Nix { 4969 4969 pname = "neoconf.nvim"; 4970 - version = "2022-12-12"; 4970 + version = "2022-12-16"; 4971 4971 src = fetchFromGitHub { 4972 4972 owner = "folke"; 4973 4973 repo = "neoconf.nvim"; 4974 - rev = "7b6ec340b347fe560e77db25785ffd0b215ff138"; 4975 - sha256 = "0sqsn7amvlfgg4avwwp0vjay1l867g6wf8d7g8971hp1dssz4x51"; 4974 + rev = "456cb79ad62081bf5965628398774be0ea9d1f29"; 4975 + sha256 = "1946bg5b95flabd8h2l2z15w4alm06i7q0sh17vddaqhgf912psf"; 4976 4976 }; 4977 4977 meta.homepage = "https://github.com/folke/neoconf.nvim/"; 4978 4978 }; ··· 4991 4991 4992 4992 neodev-nvim = buildVimPluginFrom2Nix { 4993 4993 pname = "neodev.nvim"; 4994 - version = "2022-12-12"; 4994 + version = "2022-12-14"; 4995 4995 src = fetchFromGitHub { 4996 4996 owner = "folke"; 4997 4997 repo = "neodev.nvim"; 4998 - rev = "17c6f31af8cb4c561275e89cd93d2cedda896706"; 4999 - sha256 = "0r5d0zfq3ch6l5khrggb7b6c7lammgbq5bl787rscvmvdmcngf6c"; 4998 + rev = "c87f3c9ffb256846e2a51f0292537073ca62d4d0"; 4999 + sha256 = "0b61x4sjp5lrvywbdqwis6v7wmh1cvhddpl9dhiq0ysjpj1gf8ww"; 5000 5000 }; 5001 5001 meta.homepage = "https://github.com/folke/neodev.nvim/"; 5002 5002 }; ··· 5015 5015 5016 5016 neogit = buildVimPluginFrom2Nix { 5017 5017 pname = "neogit"; 5018 - version = "2022-12-12"; 5018 + version = "2022-12-14"; 5019 5019 src = fetchFromGitHub { 5020 5020 owner = "TimUntersberger"; 5021 5021 repo = "neogit"; 5022 - rev = "66030fc1c3b7b6d5bc31ece188bc472ee2d91ee1"; 5023 - sha256 = "1mfap26fpfh4ynxgg7m6a8k132d5h07iv6hfmpd55csfa19prvp5"; 5022 + rev = "0d6002c6af432343937283fb70791fc76fa7227c"; 5023 + sha256 = "1lkxz1dl2i5ip4cn5xik7zls7skskik055m35l1y0ms3icjszfd1"; 5024 5024 }; 5025 5025 meta.homepage = "https://github.com/TimUntersberger/neogit/"; 5026 5026 }; ··· 5135 5135 5136 5136 neotest = buildVimPluginFrom2Nix { 5137 5137 pname = "neotest"; 5138 - version = "2022-12-10"; 5138 + version = "2022-12-15"; 5139 5139 src = fetchFromGitHub { 5140 5140 owner = "nvim-neotest"; 5141 5141 repo = "neotest"; 5142 - rev = "21f4b943ea3a39c3046aac9d286bdc13be6f50da"; 5143 - sha256 = "0g79qsa34d7xz45cn6apcp1npkkbjwbijkgzylxllaz27pd7g2k4"; 5142 + rev = "de2f68fb13a05c361e0c096e167f7f79712f3a5c"; 5143 + sha256 = "1wxm69zpglm504jjcqg7v4bcqi1a81w0b4m0rvdv84yidi5nfm4c"; 5144 5144 }; 5145 5145 meta.homepage = "https://github.com/nvim-neotest/neotest/"; 5146 5146 }; ··· 5279 5279 5280 5280 nightfox-nvim = buildVimPluginFrom2Nix { 5281 5281 pname = "nightfox.nvim"; 5282 - version = "2022-12-06"; 5282 + version = "2022-12-14"; 5283 5283 src = fetchFromGitHub { 5284 5284 owner = "EdenEast"; 5285 5285 repo = "nightfox.nvim"; 5286 - rev = "0903c4886535d97e6e62f710ab97119d2e09aa0b"; 5287 - sha256 = "1s9rrqii367bgi31gnir8vnjhw5wvnxlsyzv6q9myix5zjq5kkml"; 5286 + rev = "9c3756ae21743c9634923cea788c4cca0eafccf2"; 5287 + sha256 = "1acb6n6j1fc3dafyvjfl4q5181szxidlq2yx3kqvj508g8r1fh5f"; 5288 5288 }; 5289 5289 meta.homepage = "https://github.com/EdenEast/nightfox.nvim/"; 5290 5290 }; ··· 5299 5299 sha256 = "1vf3af8b85rjsccvclkb6aw9zgkwfpxd43jgnkbx6wrsv9bfz034"; 5300 5300 }; 5301 5301 meta.homepage = "https://github.com/zah/nim.vim/"; 5302 + }; 5303 + 5304 + nlsp-settings-nvim = buildVimPluginFrom2Nix { 5305 + pname = "nlsp-settings.nvim"; 5306 + version = "2022-12-15"; 5307 + src = fetchFromGitHub { 5308 + owner = "tamago324"; 5309 + repo = "nlsp-settings.nvim"; 5310 + rev = "3a32b1585c2af4b782074a2570b5d0c406a30914"; 5311 + sha256 = "0cv1c4z47ld0q0mw6fr49iymxa854ai2r1dkk6nwif1sl73hxz02"; 5312 + }; 5313 + meta.homepage = "https://github.com/tamago324/nlsp-settings.nvim/"; 5302 5314 }; 5303 5315 5304 5316 nlua-nvim = buildVimPluginFrom2Nix { ··· 5363 5351 5364 5352 nord-nvim = buildVimPluginFrom2Nix { 5365 5353 pname = "nord.nvim"; 5366 - version = "2022-12-12"; 5354 + version = "2022-12-14"; 5367 5355 src = fetchFromGitHub { 5368 5356 owner = "shaunsingh"; 5369 5357 repo = "nord.nvim"; 5370 - rev = "11445b5a28155baaf289c2212b5eb6a3e29e0e57"; 5371 - sha256 = "0bs5cck14hyipxxmpvpw5vlifhl1cn3hfajxz87hhvlw6bgsghzs"; 5358 + rev = "8bbb85992dc6a92625e3b567884a120e194204c4"; 5359 + sha256 = "1qh4v3s8xxv3ma37ydipnprhvjncdk4g3hq7mhx8336hvr1rakyx"; 5372 5360 }; 5373 5361 meta.homepage = "https://github.com/shaunsingh/nord.nvim/"; 5374 5362 }; ··· 5399 5387 5400 5388 nui-nvim = buildVimPluginFrom2Nix { 5401 5389 pname = "nui.nvim"; 5402 - version = "2022-12-09"; 5390 + version = "2022-12-15"; 5403 5391 src = fetchFromGitHub { 5404 5392 owner = "MunifTanjim"; 5405 5393 repo = "nui.nvim"; 5406 - rev = "2a6533fb798efad7dd783311315bab8dc5eb381b"; 5407 - sha256 = "08r8ddpxs6zf13vkdjcvhczh6g4r4hkfag5yqkc3pa57wfrda8f2"; 5394 + rev = "7427f979cc0dc991d8d177028e738463f17bcfcb"; 5395 + sha256 = "0z2yxlvm10wcbgjbbyyl6zranv5f81mn29vq6b4q32l84ah8kvpw"; 5408 5396 }; 5409 5397 meta.homepage = "https://github.com/MunifTanjim/nui.nvim/"; 5410 5398 }; 5411 5399 5412 5400 null-ls-nvim = buildVimPluginFrom2Nix { 5413 5401 pname = "null-ls.nvim"; 5414 - version = "2022-12-12"; 5402 + version = "2022-12-14"; 5415 5403 src = fetchFromGitHub { 5416 5404 owner = "jose-elias-alvarez"; 5417 5405 repo = "null-ls.nvim"; 5418 - rev = "623cc25016647eb62392aead7612f27d539c33de"; 5419 - sha256 = "0kxjd17qxs6x18r5hxg9ii7mlcj1nwvj6j0d3rdplp2bqbrx6hb1"; 5406 + rev = "5d8e925d31d8ef8462832308c016ac4ace17597a"; 5407 + sha256 = "0vb6s4djzj4vyh5k0b3rs3vf01c4wy6q6w6rksgmjv6szh76zmav"; 5420 5408 }; 5421 5409 meta.homepage = "https://github.com/jose-elias-alvarez/null-ls.nvim/"; 5422 5410 }; ··· 5531 5519 5532 5520 nvim-cmp = buildNeovimPluginFrom2Nix { 5533 5521 pname = "nvim-cmp"; 5534 - version = "2022-11-27"; 5522 + version = "2022-12-15"; 5535 5523 src = fetchFromGitHub { 5536 5524 owner = "hrsh7th"; 5537 5525 repo = "nvim-cmp"; 5538 - rev = "93f385c17611039f3cc35e1399f1c0a8cf82f1fb"; 5539 - sha256 = "0c9931rb4pf9vj51gqxizvbamq9ycjzy08vq2arm1jkrrr8fkmfc"; 5526 + rev = "8bbaeda725d5db6e4e1be2867a64b43bf547cf06"; 5527 + sha256 = "1ldbvspz6aam78d47ldpa7bv4z419bzsk5nhli75mz0vzidfvrw5"; 5540 5528 }; 5541 5529 meta.homepage = "https://github.com/hrsh7th/nvim-cmp/"; 5542 5530 }; 5543 5531 5544 5532 nvim-code-action-menu = buildVimPluginFrom2Nix { 5545 5533 pname = "nvim-code-action-menu"; 5546 - version = "2022-10-07"; 5534 + version = "2022-12-14"; 5547 5535 src = fetchFromGitHub { 5548 5536 owner = "weilbith"; 5549 5537 repo = "nvim-code-action-menu"; 5550 - rev = "58e12501ea028ff1171f8f06ea53891f7c6e1c3f"; 5551 - sha256 = "18vfrfkwr27jswflwrsppv17ylvi1l2rgxrv4p14cmyr03h8zx22"; 5538 + rev = "885105039b30f90096e5cc3b09e2fac9316604a8"; 5539 + sha256 = "17cp12pv7gb1pk93p9gchmsdsa3dfp9zqs6irisr3vb0azda4k8k"; 5552 5540 }; 5553 5541 meta.homepage = "https://github.com/weilbith/nvim-code-action-menu/"; 5554 5542 }; ··· 5651 5639 5652 5640 nvim-dap-go = buildVimPluginFrom2Nix { 5653 5641 pname = "nvim-dap-go"; 5654 - version = "2022-12-10"; 5642 + version = "2022-12-15"; 5655 5643 src = fetchFromGitHub { 5656 5644 owner = "leoluz"; 5657 5645 repo = "nvim-dap-go"; 5658 - rev = "4dd9c899997599c93a28aadf864a7924a4031f3e"; 5659 - sha256 = "19r5fhn9iy6bis84q373dslb15pi30ca2dv85ll7dwizyz8kvdac"; 5646 + rev = "bd9823da22165ea4aa7ec232e8c3a9b3158e017a"; 5647 + sha256 = "0ii1867shcmwzzjkljhcyyfinl8y4xw8pl22ah5kydap4ra1s24p"; 5660 5648 }; 5661 5649 meta.homepage = "https://github.com/leoluz/nvim-dap-go/"; 5662 5650 }; ··· 5807 5795 5808 5796 nvim-jdtls = buildVimPluginFrom2Nix { 5809 5797 pname = "nvim-jdtls"; 5810 - version = "2022-12-08"; 5798 + version = "2022-12-14"; 5811 5799 src = fetchFromGitHub { 5812 5800 owner = "mfussenegger"; 5813 5801 repo = "nvim-jdtls"; 5814 - rev = "e0147c1b0f94708392783bbb44db8cd8bf8c84d4"; 5815 - sha256 = "1m015d36yxq3q5f2pw9bpn3jrr35gi333c78x8brzng7l592zs8j"; 5802 + rev = "69ad133ef7296b26f6f05ed5d0960628fbb15a83"; 5803 + sha256 = "0z3xsn52lgvcdfgc06w4b4m2hyyd6nzdlygwk5n97ryjaahhm07j"; 5816 5804 }; 5817 5805 meta.homepage = "https://github.com/mfussenegger/nvim-jdtls/"; 5818 5806 }; ··· 5867 5855 5868 5856 nvim-lint = buildVimPluginFrom2Nix { 5869 5857 pname = "nvim-lint"; 5870 - version = "2022-12-08"; 5858 + version = "2022-12-15"; 5871 5859 src = fetchFromGitHub { 5872 5860 owner = "mfussenegger"; 5873 5861 repo = "nvim-lint"; 5874 - rev = "5b6d0463e956b625cd17b51ad391bae9ee5bea92"; 5875 - sha256 = "0ignv8w27jzxg1a3c884j0xgy10bwkbdk1inip9jrv3hpai2x9rj"; 5862 + rev = "d60514f14baf8eacef4166070783d26c28fe3699"; 5863 + sha256 = "0fxk2gwq1dpmjsk9vwb8vh54xv7wh21skw1c4wg8pz9fcar3790w"; 5876 5864 }; 5877 5865 meta.homepage = "https://github.com/mfussenegger/nvim-lint/"; 5878 5866 }; ··· 5891 5879 5892 5880 nvim-lspconfig = buildVimPluginFrom2Nix { 5893 5881 pname = "nvim-lspconfig"; 5894 - version = "2022-12-12"; 5882 + version = "2022-12-16"; 5895 5883 src = fetchFromGitHub { 5896 5884 owner = "neovim"; 5897 5885 repo = "nvim-lspconfig"; 5898 - rev = "0c038493b37e67bed287ff99722a9ced5cdfe617"; 5899 - sha256 = "1hpxvmm407dhzaqb531wz1147y28m9z62lsz8s8ry60zc5s8rqhd"; 5886 + rev = "e95c12cea141632d3502fad4fb1c9260a91a65f4"; 5887 + sha256 = "19xmj232j9lir27486qksf86f1wwblv7v9b7lpmial1p1nfj8m50"; 5900 5888 }; 5901 5889 meta.homepage = "https://github.com/neovim/nvim-lspconfig/"; 5902 5890 }; ··· 6047 6035 6048 6036 nvim-scrollview = buildVimPluginFrom2Nix { 6049 6037 pname = "nvim-scrollview"; 6050 - version = "2022-12-04"; 6038 + version = "2022-12-12"; 6051 6039 src = fetchFromGitHub { 6052 6040 owner = "dstein64"; 6053 6041 repo = "nvim-scrollview"; 6054 - rev = "f51cd5543c9369dc76a226a1b16068abaf604876"; 6055 - sha256 = "1ss4s4m3aqxrqawvlsf6qvg1nk36l3y5vyldm1hzvqa5f6bcm8dv"; 6042 + rev = "c0699da2f00976943d39c7b32c015c768f68e74b"; 6043 + sha256 = "1pji89p1f49ag7n46iq3rsl9n8ssnw29d8m5p5b02sk3i8ppsnn3"; 6056 6044 }; 6057 6045 meta.homepage = "https://github.com/dstein64/nvim-scrollview/"; 6058 6046 }; ··· 6119 6107 6120 6108 nvim-tree-lua = buildVimPluginFrom2Nix { 6121 6109 pname = "nvim-tree.lua"; 6122 - version = "2022-12-12"; 6110 + version = "2022-12-16"; 6123 6111 src = fetchFromGitHub { 6124 6112 owner = "nvim-tree"; 6125 6113 repo = "nvim-tree.lua"; 6126 - rev = "0cd8ac4751c39440a1c28c6be4704f3597807d29"; 6127 - sha256 = "1avm9ds7lbi2fjpqcq7v05j7h91d0id3absdc95q4bgrfx3rnw5w"; 6114 + rev = "87409bb4afd0093193e1364faa47327fbfdfca87"; 6115 + sha256 = "0bsajg0d6fwzj6jgxkq9z44rf7jzd31yfn7wc8wkzhhlcc1fx69i"; 6128 6116 }; 6129 6117 meta.homepage = "https://github.com/nvim-tree/nvim-tree.lua/"; 6130 6118 }; 6131 6119 6132 6120 nvim-treesitter = buildVimPluginFrom2Nix { 6133 6121 pname = "nvim-treesitter"; 6134 - version = "2022-12-12"; 6122 + version = "2022-12-16"; 6135 6123 src = fetchFromGitHub { 6136 6124 owner = "nvim-treesitter"; 6137 6125 repo = "nvim-treesitter"; 6138 - rev = "ae0317d78a9f6fad78870d6645b60528e13ae6fa"; 6139 - sha256 = "16d70n17fli233y4aigsr4ddm2h6myj85p4lsl2xk5sypd5bkczc"; 6126 + rev = "36c6826274ac85e04558e875a30e82aca676e3fe"; 6127 + sha256 = "196klrl7yzawafzklrwcpz7qwrklwaaki653r40k95ljxsc5bf2r"; 6140 6128 }; 6141 6129 meta.homepage = "https://github.com/nvim-treesitter/nvim-treesitter/"; 6142 6130 }; 6143 6131 6144 6132 nvim-treesitter-context = buildVimPluginFrom2Nix { 6145 6133 pname = "nvim-treesitter-context"; 6146 - version = "2022-11-23"; 6134 + version = "2022-12-14"; 6147 6135 src = fetchFromGitHub { 6148 6136 owner = "nvim-treesitter"; 6149 6137 repo = "nvim-treesitter-context"; 6150 - rev = "5fda0b9a2a9049ecc9900e2d86d9ddebab95b0c5"; 6151 - sha256 = "084j8bbvs0f1rah92ddbb5qpj4y4m7nq5rn0ga8bsjpyqnx04q7j"; 6138 + rev = "5d0367be7471f50c6b5f8338521b9e851b1d177d"; 6139 + sha256 = "0dqnxka1ihyvvx1l8h968k2a5h3045zwwp9hzqk4b5c3q1qyrgc8"; 6152 6140 }; 6153 6141 meta.homepage = "https://github.com/nvim-treesitter/nvim-treesitter-context/"; 6154 6142 }; ··· 6179 6167 6180 6168 nvim-treesitter-textobjects = buildVimPluginFrom2Nix { 6181 6169 pname = "nvim-treesitter-textobjects"; 6182 - version = "2022-12-12"; 6170 + version = "2022-12-15"; 6183 6171 src = fetchFromGitHub { 6184 6172 owner = "nvim-treesitter"; 6185 6173 repo = "nvim-treesitter-textobjects"; 6186 - rev = "731be7f2358fb9f3e2bc7d8698b82c882cf132a4"; 6187 - sha256 = "08wfd3ykas1pzqmfljk0945fp78337jfnl0maqws6il5f5l8lbzg"; 6174 + rev = "e0d2c72894db60001650b36357d3480f17e1c340"; 6175 + sha256 = "14c8m1s6c8hwn71797ir3rvwpjw1hgjcn28w1mb14w6781c8710k"; 6188 6176 }; 6189 6177 meta.homepage = "https://github.com/nvim-treesitter/nvim-treesitter-textobjects/"; 6190 6178 }; ··· 6311 6299 6312 6300 octo-nvim = buildVimPluginFrom2Nix { 6313 6301 pname = "octo.nvim"; 6314 - version = "2022-10-18"; 6302 + version = "2022-12-13"; 6315 6303 src = fetchFromGitHub { 6316 6304 owner = "pwntester"; 6317 6305 repo = "octo.nvim"; 6318 - rev = "b75630f93822a569f3fc2360bb2066ec1b205bd0"; 6319 - sha256 = "1wddcdgy8gs3449ww9kgh4kd5y3xwcsi6rm14z3wsqxc03m2ji7i"; 6306 + rev = "cb9314d358dc9f1d50e553a3c8e237ce713cbc57"; 6307 + sha256 = "0m57d7v2n2v9sxsiynsbgr4q56fhiq1l5vld5670j1xp63v8x1gr"; 6320 6308 }; 6321 6309 meta.homepage = "https://github.com/pwntester/octo.nvim/"; 6322 6310 }; ··· 6371 6359 6372 6360 onedarkpro-nvim = buildVimPluginFrom2Nix { 6373 6361 pname = "onedarkpro.nvim"; 6374 - version = "2022-12-11"; 6362 + version = "2022-12-15"; 6375 6363 src = fetchFromGitHub { 6376 6364 owner = "olimorris"; 6377 6365 repo = "onedarkpro.nvim"; 6378 - rev = "74275ddff64746b311b0f1ee1a60b01f857ff2c8"; 6379 - sha256 = "0ib109jrz6jvag8jghr21jjd4rrsql9iqk1bl8gjd4ylhjsb38li"; 6366 + rev = "99e0808b21cb3c7815c0a3ec17a4fc0e555d5997"; 6367 + sha256 = "09vqfg9dwlwq32b4xzhlgqw48l63qpq86pv291pp3jaghldgbcjb"; 6380 6368 }; 6381 6369 meta.homepage = "https://github.com/olimorris/onedarkpro.nvim/"; 6382 6370 }; ··· 6395 6383 6396 6384 onenord-nvim = buildVimPluginFrom2Nix { 6397 6385 pname = "onenord.nvim"; 6398 - version = "2022-12-10"; 6386 + version = "2022-12-14"; 6399 6387 src = fetchFromGitHub { 6400 6388 owner = "rmehri01"; 6401 6389 repo = "onenord.nvim"; 6402 - rev = "d6ff2f0f4b4e16cc458a45abafa80718f3101db9"; 6403 - sha256 = "1whk7afv98yc786a12dls2x9x0x6i2ydmy6lgqjqls8c89q30j19"; 6390 + rev = "9a8ca2030c8b4c1a577da3b3e2e396458272953b"; 6391 + sha256 = "16n0cymqs44g2fl90kr3hdgfy913pxfxxh5nrfkmyl9jyir5s790"; 6404 6392 }; 6405 6393 meta.homepage = "https://github.com/rmehri01/onenord.nvim/"; 6406 6394 }; ··· 6431 6419 6432 6420 orgmode = buildVimPluginFrom2Nix { 6433 6421 pname = "orgmode"; 6434 - version = "2022-12-12"; 6422 + version = "2022-12-13"; 6435 6423 src = fetchFromGitHub { 6436 6424 owner = "nvim-orgmode"; 6437 6425 repo = "orgmode"; 6438 - rev = "1b8819bc6201b0a32c64ca13852c82186c2b2119"; 6439 - sha256 = "0dnv47ai6f9rcbr1q345smj3nxhyqfmb92a17w5hqfpifgsmsaim"; 6426 + rev = "dadf56334d2be7d9e8ad1e22c697a6e75f0164b7"; 6427 + sha256 = "19bp9mbjldxi2qzsa364rw86zp450zr2ajnnflp2sr0hhdvg620f"; 6440 6428 }; 6441 6429 meta.homepage = "https://github.com/nvim-orgmode/orgmode/"; 6442 6430 }; ··· 6853 6841 6854 6842 refactoring-nvim = buildVimPluginFrom2Nix { 6855 6843 pname = "refactoring.nvim"; 6856 - version = "2022-09-03"; 6844 + version = "2022-12-15"; 6857 6845 src = fetchFromGitHub { 6858 6846 owner = "theprimeagen"; 6859 6847 repo = "refactoring.nvim"; 6860 - rev = "c9ca8e3bbf7218101f16e6a03b15bf72b99b2cae"; 6861 - sha256 = "10b7235ia2klad1vdriw24g4vvjb8lcbw8z878h5hd1q9nryn7bs"; 6848 + rev = "2677bcc52a13ef43e24c3bd7739bce2ec5ebf66b"; 6849 + sha256 = "1di0y9yhv2nq9bk6xpbmkwr0gh1kjsxn8qp0hp4a9hk8k4fkpc1s"; 6862 6850 }; 6863 6851 meta.homepage = "https://github.com/theprimeagen/refactoring.nvim/"; 6864 6852 }; 6865 6853 6866 6854 registers-nvim = buildVimPluginFrom2Nix { 6867 6855 pname = "registers.nvim"; 6868 - version = "2022-12-03"; 6856 + version = "2022-12-15"; 6869 6857 src = fetchFromGitHub { 6870 6858 owner = "tversteeg"; 6871 6859 repo = "registers.nvim"; 6872 - rev = "76bf496da0c5e2c71820d93319e468b84b689be4"; 6873 - sha256 = "1sn39ia2n951rj52c596q1sbmzb23224c3zvrmzzrb2ifbfj3f7f"; 6860 + rev = "667ae447d2c7efb64461a2c58f5311d1248cdb5f"; 6861 + sha256 = "0j2mp8kan6gf1ynv90pkwghjpsqzhxdfxs1v0kh55vmld2r31r56"; 6874 6862 }; 6875 6863 meta.homepage = "https://github.com/tversteeg/registers.nvim/"; 6876 6864 }; ··· 6889 6877 6890 6878 rest-nvim = buildNeovimPluginFrom2Nix { 6891 6879 pname = "rest.nvim"; 6892 - version = "2022-11-29"; 6880 + version = "2022-12-12"; 6893 6881 src = fetchFromGitHub { 6894 6882 owner = "rest-nvim"; 6895 6883 repo = "rest.nvim"; 6896 - rev = "966b4a32f47475908b0fe88ea7b99042da7e2d86"; 6897 - sha256 = "1sv4zlmbrqxy04dm3v8x4xncz6kkgr51apcgv4lb16wj000bqvgp"; 6884 + rev = "0f26e2afc65d030c5fb7444303b55b9a334202c6"; 6885 + sha256 = "1sln2b4kji9cszc225cakiq7h6zm6wsqnfl4ai4py85l1aw43xj8"; 6898 6886 }; 6899 6887 meta.homepage = "https://github.com/rest-nvim/rest.nvim/"; 6900 6888 }; ··· 7226 7214 7227 7215 sonokai = buildVimPluginFrom2Nix { 7228 7216 pname = "sonokai"; 7229 - version = "2022-11-21"; 7217 + version = "2022-12-13"; 7230 7218 src = fetchFromGitHub { 7231 7219 owner = "sainnhe"; 7232 7220 repo = "sonokai"; 7233 - rev = "f53ac94c857e2119403ce12bfba200cd6ecc2e33"; 7234 - sha256 = "08syrady97mjp9zjwjp69p0vnd3fx1s8i5cbff7dzglww1ibl3iw"; 7221 + rev = "aca74a49f192935349c55f4d4e9b531bc1c96052"; 7222 + sha256 = "1kqbcd3g16h01wzh6pfmfkv9ka8cjyrq6a4yni8wi5khxk16vmrq"; 7235 7223 }; 7236 7224 meta.homepage = "https://github.com/sainnhe/sonokai/"; 7237 7225 }; ··· 7371 7359 7372 7360 srcery-vim = buildVimPluginFrom2Nix { 7373 7361 pname = "srcery-vim"; 7374 - version = "2022-11-02"; 7362 + version = "2022-12-15"; 7375 7363 src = fetchFromGitHub { 7376 7364 owner = "srcery-colors"; 7377 7365 repo = "srcery-vim"; 7378 - rev = "cdb0bc36fda80eb58d38ecddfb1c7b2fab3a4d53"; 7379 - sha256 = "0x055kynvxym614vzxi1vv2zcndfadzjhwk92f4h6z5zvld7fpxj"; 7366 + rev = "7af46a5b032e3275dc6d3c993d72fb290d51f74d"; 7367 + sha256 = "1v5xld3v3i7i2xkp3r1nqcghriikpb2ak7d0a021hjbasm74fbgc"; 7380 7368 }; 7381 7369 meta.homepage = "https://github.com/srcery-colors/srcery-vim/"; 7382 7370 }; ··· 7709 7697 7710 7698 taskwiki = buildVimPluginFrom2Nix { 7711 7699 pname = "taskwiki"; 7712 - version = "2022-10-21"; 7700 + version = "2022-12-14"; 7713 7701 src = fetchFromGitHub { 7714 7702 owner = "tools-life"; 7715 7703 repo = "taskwiki"; 7716 - rev = "c8e379f8acab92e77b9378c03758976bdc79bcab"; 7717 - sha256 = "0d1za9qab4h7wia13pvlkisl6cc2zg5655q88vl2dy1y0pkpjxbr"; 7704 + rev = "7a74ad8ed3743142830ba29a599c7bd23dd2b158"; 7705 + sha256 = "0nj5ndfd0rlvmr6h7mb1vzlka3d0ybj7m70ly521na17j9q4vlg0"; 7718 7706 }; 7719 7707 meta.homepage = "https://github.com/tools-life/taskwiki/"; 7720 7708 }; ··· 8166 8154 8167 8155 todo-comments-nvim = buildVimPluginFrom2Nix { 8168 8156 pname = "todo-comments.nvim"; 8169 - version = "2022-11-16"; 8157 + version = "2022-12-14"; 8170 8158 src = fetchFromGitHub { 8171 8159 owner = "folke"; 8172 8160 repo = "todo-comments.nvim"; 8173 - rev = "1b9df577262b2c4c4ea422161742927f80ffa131"; 8174 - sha256 = "14yiibv5qh89y8d7ps1rv65sxq2ckj7mky5wv9fkzhplvjzg84zi"; 8161 + rev = "c1760010f46992165995aaa52ca967f473a2e8e6"; 8162 + sha256 = "0r7nx0bfw9cn8xjbwxi8gzds768lmcbwwfvivmy0hib82xprf674"; 8175 8163 }; 8176 8164 meta.homepage = "https://github.com/folke/todo-comments.nvim/"; 8177 8165 }; ··· 8215 8203 8216 8204 tokyonight-nvim = buildVimPluginFrom2Nix { 8217 8205 pname = "tokyonight.nvim"; 8218 - version = "2022-12-06"; 8206 + version = "2022-12-14"; 8219 8207 src = fetchFromGitHub { 8220 8208 owner = "folke"; 8221 8209 repo = "tokyonight.nvim"; 8222 - rev = "0f7b6a5b6cf232f34cb8f51123a084a6eee96b89"; 8223 - sha256 = "0h7msjgg5zg0zza8fasb2km3pcijlb5w69hlb3vfxxb33kjv8104"; 8210 + rev = "ecae454c303d5190fb0ded096205a99fae16c6d4"; 8211 + sha256 = "0h6s5pvsjlrkp0brwrqaib5zijpqqs352v89jjr60kylb36clfb5"; 8224 8212 }; 8225 8213 meta.homepage = "https://github.com/folke/tokyonight.nvim/"; 8226 8214 }; ··· 8815 8803 8816 8804 vim-airline = buildVimPluginFrom2Nix { 8817 8805 pname = "vim-airline"; 8818 - version = "2022-12-07"; 8806 + version = "2022-12-16"; 8819 8807 src = fetchFromGitHub { 8820 8808 owner = "vim-airline"; 8821 8809 repo = "vim-airline"; 8822 - rev = "5f5e00faad728f12f9ca9d9200208d8a39fd60f4"; 8823 - sha256 = "0z3rkdf0k95789x5yqrvkq2jfnl8hc1h4pxbfnhy9hc1l0kxhc9n"; 8810 + rev = "6a4c82c950cc10388117e927b89a72a557e5944c"; 8811 + sha256 = "1mqlynscx1qhd2gxbz9bry6v4i28schhqcd1h4vvqc1lkcv3y4kw"; 8824 8812 }; 8825 8813 meta.homepage = "https://github.com/vim-airline/vim-airline/"; 8826 8814 }; ··· 9479 9467 src = fetchFromGitHub { 9480 9468 owner = "tpope"; 9481 9469 repo = "vim-dadbod"; 9482 - rev = "1ad079ed63d9934174fec918cc0abc7e020eb02c"; 9483 - sha256 = "0zmnvwg28bw1pnbf3bx675bssjiab8brcabdkl8vfqgnyibw2pm7"; 9470 + rev = "34151ccce9f5ff16229b8e482a97e46997914cb3"; 9471 + sha256 = "09lia66yimk8h9y1bj50ar45c9r13k92jw009nxp1kfkb9nsk83y"; 9484 9472 }; 9485 9473 meta.homepage = "https://github.com/tpope/vim-dadbod/"; 9486 9474 }; ··· 11194 11182 11195 11183 vim-nickel = buildVimPluginFrom2Nix { 11196 11184 pname = "vim-nickel"; 11197 - version = "2022-03-16"; 11185 + version = "2022-12-15"; 11198 11186 src = fetchFromGitHub { 11199 11187 owner = "nickel-lang"; 11200 11188 repo = "vim-nickel"; 11201 - rev = "2f0f5f8ce2a8e719a5e39d7210ca914ae403374c"; 11202 - sha256 = "1li3wc5164mcqrvj42dc8zh3j8wml10gpgffapnjilwa5c85kv3q"; 11189 + rev = "55e7d1b6a723115497ec214d3d72e37a6114a767"; 11190 + sha256 = "1424vw1hrp4v45vp8skygvn53437ln3c44zal8jl0nflvmpkc9z6"; 11203 11191 }; 11204 11192 meta.homepage = "https://github.com/nickel-lang/vim-nickel/"; 11205 11193 }; ··· 11290 11278 11291 11279 vim-ocaml = buildVimPluginFrom2Nix { 11292 11280 pname = "vim-ocaml"; 11293 - version = "2022-11-14"; 11281 + version = "2022-12-15"; 11294 11282 src = fetchFromGitHub { 11295 11283 owner = "ocaml"; 11296 11284 repo = "vim-ocaml"; 11297 - rev = "284c37e2607446ef798c4b61a4691c41a5661f03"; 11298 - sha256 = "17d094gqm5ixlgadrd6fplg2zrx761m091mw7gjpi7bdh1nzw1bw"; 11285 + rev = "8d30ed73ce7583b31224ab206ec158f547dd25db"; 11286 + sha256 = "041wv3n3w1bfabgwpswwvpc4rsnmib3520cv7rkrvw7dqpywk7dn"; 11299 11287 }; 11300 11288 meta.homepage = "https://github.com/ocaml/vim-ocaml/"; 11301 11289 }; ··· 12286 12274 12287 12275 vim-startuptime = buildVimPluginFrom2Nix { 12288 12276 pname = "vim-startuptime"; 12289 - version = "2022-11-18"; 12277 + version = "2022-12-12"; 12290 12278 src = fetchFromGitHub { 12291 12279 owner = "dstein64"; 12292 12280 repo = "vim-startuptime"; 12293 - rev = "1acb5fa4aa29a24c36d559474b672cda9b9a9b6d"; 12294 - sha256 = "1rvga45kgz5sh7yc5nqsxm6ndhdamvq8a67pw8ci1zi3n53j9xij"; 12281 + rev = "cb4c112b9e0f224236ee4eab6bf5153406b3f88b"; 12282 + sha256 = "1n1m27vvqcik4c9f80d0blqggyh29s8h20jn3v7gy1fx94bi2n2w"; 12295 12283 }; 12296 12284 meta.homepage = "https://github.com/dstein64/vim-startuptime/"; 12297 12285 }; ··· 12467 12455 12468 12456 vim-test = buildVimPluginFrom2Nix { 12469 12457 pname = "vim-test"; 12470 - version = "2022-12-08"; 12458 + version = "2022-12-14"; 12471 12459 src = fetchFromGitHub { 12472 12460 owner = "vim-test"; 12473 12461 repo = "vim-test"; 12474 - rev = "99894e398e6b3c797bda2d0390f36d265ad0ab58"; 12475 - sha256 = "070755cb9sfbcxcq122gqblsrqng2xvgjvv6rgwfkg32rn7dbsfz"; 12462 + rev = "c6e5d249241342fd4592a67113cb539427d57e23"; 12463 + sha256 = "1053wq3rffcb8lihv3qn2a5pwq0jsk27pvb985l1kr0jp5sxw04s"; 12476 12464 }; 12477 12465 meta.homepage = "https://github.com/vim-test/vim-test/"; 12478 12466 }; ··· 12887 12875 12888 12876 vim-wayland-clipboard = buildVimPluginFrom2Nix { 12889 12877 pname = "vim-wayland-clipboard"; 12890 - version = "2022-12-07"; 12878 + version = "2022-12-15"; 12891 12879 src = fetchFromGitHub { 12892 12880 owner = "jasonccox"; 12893 12881 repo = "vim-wayland-clipboard"; 12894 - rev = "c16b7cfed0c4ec22cc6a7f67dfbdd4d8c4ab1848"; 12895 - sha256 = "1l9wcgsj8wrmhcxkw4s82i68954060xafb7jkym3519bx4kq4jxi"; 12882 + rev = "64e7a3cfd210e0ffe4b3d103b2662aec6b0e2407"; 12883 + sha256 = "1gbjh7r2n4w7lq3bvzziq01bmdi6cwa1s1hl25wbgpdj6kzrnda6"; 12896 12884 }; 12897 12885 meta.homepage = "https://github.com/jasonccox/vim-wayland-clipboard/"; 12898 12886 }; ··· 13007 12995 13008 12996 vim-zettel = buildVimPluginFrom2Nix { 13009 12997 pname = "vim-zettel"; 13010 - version = "2022-09-05"; 12998 + version = "2022-12-15"; 13011 12999 src = fetchFromGitHub { 13012 13000 owner = "michal-h21"; 13013 13001 repo = "vim-zettel"; 13014 - rev = "e38119f98c888b6fc700f97e363254ddafc950ba"; 13015 - sha256 = "1a4rc7blj7lh318x8cgyyi9q3m5szdz2f1frn6yga5vqd9cyv877"; 13002 + rev = "9c6fe4cbb2a2d84300afadcc112318fbf7adad1f"; 13003 + sha256 = "0d3sv19d6karyxilpjfaab8lg37qbwx5arzr9daclky9762ipkf0"; 13016 13004 }; 13017 13005 meta.homepage = "https://github.com/michal-h21/vim-zettel/"; 13018 13006 }; ··· 13561 13549 13562 13550 catppuccin-nvim = buildVimPluginFrom2Nix { 13563 13551 pname = "catppuccin-nvim"; 13564 - version = "2022-12-11"; 13552 + version = "2022-12-14"; 13565 13553 src = fetchFromGitHub { 13566 13554 owner = "catppuccin"; 13567 13555 repo = "nvim"; 13568 - rev = "e7fbf2496ce0f1cdf9883a6b99d86afc2f3efadc"; 13569 - sha256 = "0y7scdkzn3j580vk0m3n4vksnhdnq3fgx6qr9vygk15jn1qxdga8"; 13556 + rev = "26e498db297607fe17a6206c5a28f0f4cb532954"; 13557 + sha256 = "0ixgg83kkr4r5mdkw1m44svkd31qdbvaliycrgasyhbw8k774m4x"; 13570 13558 }; 13571 13559 meta.homepage = "https://github.com/catppuccin/nvim/"; 13572 13560 }; ··· 13585 13573 13586 13574 chad = buildVimPluginFrom2Nix { 13587 13575 pname = "chad"; 13588 - version = "2022-12-12"; 13576 + version = "2022-12-16"; 13589 13577 src = fetchFromGitHub { 13590 13578 owner = "ms-jpq"; 13591 13579 repo = "chadtree"; 13592 - rev = "ac29dc7e06b340baeee7273d3232cca346f6f7cd"; 13593 - sha256 = "0chxw8cm8x9v0nawasipsx5f7fapfp5b31jfz217nydhhwwvfr2h"; 13580 + rev = "0cd715bd487f300320d963c6bb291fd2e5eacc3f"; 13581 + sha256 = "0vfs2c3q2kx28x5i089drvrmqfdn6n4031lip4zbpg1dsf9rf07i"; 13594 13582 }; 13595 13583 meta.homepage = "https://github.com/ms-jpq/chadtree/"; 13596 13584 }; ··· 13633 13621 13634 13622 lspsaga-nvim-original = buildVimPluginFrom2Nix { 13635 13623 pname = "lspsaga-nvim-original"; 13636 - version = "2022-12-12"; 13624 + version = "2022-12-13"; 13637 13625 src = fetchFromGitHub { 13638 13626 owner = "glepnir"; 13639 13627 repo = "lspsaga.nvim"; 13640 - rev = "db0c1414efb928a9387e0a3271d75dcc3370822f"; 13641 - sha256 = "0gg6vyrj13iwn4kj5jinm8799i6smyxnyrqz8qm7bay4lzbsg7mr"; 13628 + rev = "b7b4777369b441341b2dcd45c738ea4167c11c9e"; 13629 + sha256 = "16gygs2dggjv2kfapm9r5qrdssnagqyqxw8m7dc8vk9iygyrgj5i"; 13642 13630 }; 13643 13631 meta.homepage = "https://github.com/glepnir/lspsaga.nvim/"; 13644 13632 };
+33 -33
pkgs/applications/editors/vim/plugins/nvim-treesitter/generated.nix
··· 104 104 }; 105 105 c_sharp = buildGrammar { 106 106 language = "c_sharp"; 107 - version = "3ef3f7f"; 107 + version = "8e4ec08"; 108 108 source = fetchFromGitHub { 109 109 owner = "tree-sitter"; 110 110 repo = "tree-sitter-c-sharp"; 111 - rev = "3ef3f7f99e16e528e6689eae44dff35150993307"; 112 - hash = "sha256-xBRSwuodQTrKHjwx3JVgnwsAkp9EO+6su3hc2d+6DBQ="; 111 + rev = "8e4ec08f1dae1d72f082df0f7e1176772f553d47"; 112 + hash = "sha256-BIqfaFFwco3aE65N9tRtawxFEXvaVwQvoMgM3cg10/k="; 113 113 }; 114 114 meta.homepage = "https://github.com/tree-sitter/tree-sitter-c-sharp"; 115 115 }; ··· 736 736 }; 737 737 jsonnet = buildGrammar { 738 738 language = "jsonnet"; 739 - version = "0475a50"; 739 + version = "768a384"; 740 740 source = fetchFromGitHub { 741 741 owner = "sourcegraph"; 742 742 repo = "tree-sitter-jsonnet"; 743 - rev = "0475a5017ad7dc84845d1d33187f2321abcb261d"; 744 - hash = "sha256-7LdIA+tsFUIvAk9GoqJwSU5tJDNPtsziv0rbiiLmCLY="; 743 + rev = "768a384989391237c6d55ff3d878a0d1e0d2b4fa"; 744 + hash = "sha256-kSG0YwtkzGVz8RIYBrE0ZyUMc6YTtQO8XvHHiwy5GL4="; 745 745 }; 746 746 meta.homepage = "https://github.com/sourcegraph/tree-sitter-jsonnet"; 747 747 }; 748 748 julia = buildGrammar { 749 749 language = "julia"; 750 - version = "91ba1c3"; 750 + version = "36b099e"; 751 751 source = fetchFromGitHub { 752 752 owner = "tree-sitter"; 753 753 repo = "tree-sitter-julia"; 754 - rev = "91ba1c3c9b50f388d4b67518c04bc9a003ed3475"; 755 - hash = "sha256-NLUVDfZUjvTnbYwxwij+f9WL7qhduEGrfAUKvEZh/QU="; 754 + rev = "36b099e9ea577f64ba53323115028dadd2991d2c"; 755 + hash = "sha256-sd6Ue7Ur6Juq2kZbuC/E/gK9JJPVG/5UTToQ+5hdTD0="; 756 756 }; 757 757 meta.homepage = "https://github.com/tree-sitter/tree-sitter-julia"; 758 758 }; ··· 892 892 }; 893 893 meson = buildGrammar { 894 894 language = "meson"; 895 - version = "153d225"; 895 + version = "6c5f7ef"; 896 896 source = fetchFromGitHub { 897 897 owner = "Decodetalkers"; 898 898 repo = "tree-sitter-meson"; 899 - rev = "153d22588fb5c1eee16a165a084f9ea30f29d941"; 900 - hash = "sha256-q0qcRe94+zFvNzZV6vGGihL5xLl8Vr0lwDZAIYKPq2A="; 899 + rev = "6c5f7ef944f9c6ae8a0fc28b9071a4b493652238"; 900 + hash = "sha256-r/H7v6a1blsendVBxx9Qy4f2i4V3LsxSwe+9/PRbfG8="; 901 901 }; 902 902 meta.homepage = "https://github.com/Decodetalkers/tree-sitter-meson"; 903 903 }; ··· 947 947 }; 948 948 ocaml = buildGrammar { 949 949 language = "ocaml"; 950 - version = "cc26b1e"; 950 + version = "de07323"; 951 951 source = fetchFromGitHub { 952 952 owner = "tree-sitter"; 953 953 repo = "tree-sitter-ocaml"; 954 - rev = "cc26b1ef111100f26a137bcbcd39fd4e35be9a59"; 955 - hash = "sha256-gTmRBFFCBrA48Yn1MO2mMQPpa6u3uv5McC4BDuMXKuM="; 954 + rev = "de07323343946c32759933cb3b7c78e821098cad"; 955 + hash = "sha256-JhJSg6Ht3dy94hAP2yy0fg9U/IeYNGaHYoys/++yOwg="; 956 956 }; 957 957 location = "ocaml"; 958 958 meta.homepage = "https://github.com/tree-sitter/tree-sitter-ocaml"; 959 959 }; 960 960 ocaml_interface = buildGrammar { 961 961 language = "ocaml_interface"; 962 - version = "cc26b1e"; 962 + version = "de07323"; 963 963 source = fetchFromGitHub { 964 964 owner = "tree-sitter"; 965 965 repo = "tree-sitter-ocaml"; 966 - rev = "cc26b1ef111100f26a137bcbcd39fd4e35be9a59"; 967 - hash = "sha256-gTmRBFFCBrA48Yn1MO2mMQPpa6u3uv5McC4BDuMXKuM="; 966 + rev = "de07323343946c32759933cb3b7c78e821098cad"; 967 + hash = "sha256-JhJSg6Ht3dy94hAP2yy0fg9U/IeYNGaHYoys/++yOwg="; 968 968 }; 969 969 location = "interface"; 970 970 meta.homepage = "https://github.com/tree-sitter/tree-sitter-ocaml"; ··· 1016 1016 }; 1017 1017 php = buildGrammar { 1018 1018 language = "php"; 1019 - version = "64a2abb"; 1019 + version = "47dd353"; 1020 1020 source = fetchFromGitHub { 1021 1021 owner = "tree-sitter"; 1022 1022 repo = "tree-sitter-php"; 1023 - rev = "64a2abb98a0cbf2bce23e4af6c05c78f06068886"; 1024 - hash = "sha256-iAi+Cr7bW4mEbFHba+rv0afhY4v1suPGhsCK4IhcMLo="; 1023 + rev = "47dd3532df8204a444dd6eb042135f1e7964f9cb"; 1024 + hash = "sha256-YU21aRugPfwlYuj+9xJAFD44Btopnln7QEoxANIlcLs="; 1025 1025 }; 1026 1026 meta.homepage = "https://github.com/tree-sitter/tree-sitter-php"; 1027 1027 }; ··· 1236 1236 }; 1237 1237 scheme = buildGrammar { 1238 1238 language = "scheme"; 1239 - version = "bdcd2c8"; 1239 + version = "16bdcf0"; 1240 1240 source = fetchFromGitHub { 1241 1241 owner = "6cdh"; 1242 1242 repo = "tree-sitter-scheme"; 1243 - rev = "bdcd2c8496701153506a9e3e1b76dfed852873ba"; 1244 - hash = "sha256-KfcWGE92nx9lrs3V/lKeE0pPqCqFC/mHamkyryrcdoo="; 1243 + rev = "16bdcf0495865e17ae5b995257458e31e8b7f450"; 1244 + hash = "sha256-+K+T5IgcEdTZK4s60AmkPg7L6Aw0mj36FMsWaRxUT0I="; 1245 1245 }; 1246 1246 meta.homepage = "https://github.com/6cdh/tree-sitter-scheme"; 1247 1247 }; ··· 1291 1291 }; 1292 1292 sql = buildGrammar { 1293 1293 language = "sql"; 1294 - version = "a4dd131"; 1294 + version = "8dc7fa0"; 1295 1295 source = fetchFromGitHub { 1296 1296 owner = "derekstride"; 1297 1297 repo = "tree-sitter-sql"; 1298 - rev = "a4dd131eeb9fe7f3c9c2ca0f506f6d58d9986a97"; 1299 - hash = "sha256-Z1x1XPecXt3a4mL40Fyt5+1wrD+0L3Hh9aWjI0vIhIc="; 1298 + rev = "8dc7fa0e51145f0312eedbb5aff9945bd967fb8f"; 1299 + hash = "sha256-L6mur9BnDzA1mgtsWdyMC52IY9sKwt/xDkfPv2VKPPs="; 1300 1300 }; 1301 1301 generate = true; 1302 1302 meta.homepage = "https://github.com/derekstride/tree-sitter-sql"; ··· 1336 1336 }; 1337 1337 swift = buildGrammar { 1338 1338 language = "swift"; 1339 - version = "4443b12"; 1339 + version = "693411c"; 1340 1340 source = fetchFromGitHub { 1341 1341 owner = "alex-pinkus"; 1342 1342 repo = "tree-sitter-swift"; 1343 - rev = "4443b125240d7ae7e50d35d8415fae5be61bdaf2"; 1344 - hash = "sha256-Hym56WVG5QIic+pd6Hvae5ETM6UNaTo4Sr9mTUVFt0Q="; 1343 + rev = "693411cb5a1167311ccd84708348281630562726"; 1344 + hash = "sha256-KNmRR2Od2uTOHiENeCXoTKAp2jvzSsEhzqf9WmiL3Vo="; 1345 1345 }; 1346 1346 generate = true; 1347 1347 meta.homepage = "https://github.com/alex-pinkus/tree-sitter-swift"; ··· 1382 1382 }; 1383 1383 tlaplus = buildGrammar { 1384 1384 language = "tlaplus"; 1385 - version = "deaf0e5"; 1385 + version = "27e6d23"; 1386 1386 source = fetchFromGitHub { 1387 1387 owner = "tlaplus-community"; 1388 1388 repo = "tree-sitter-tlaplus"; 1389 - rev = "deaf0e5c573ad4e2bbfc9a29abb7b6dcb572556e"; 1390 - hash = "sha256-D4A2k14SpVR4iKCMwql403XjHGg7p17EYazvAUiJ2gY="; 1389 + rev = "27e6d238a5708b0490f43351f6e0baeaab4c9c1f"; 1390 + hash = "sha256-4RwHJN1N2DupVIYqWk2sioiiTtEKBmuLT+t+THr71os="; 1391 1391 }; 1392 1392 meta.homepage = "https://github.com/tlaplus-community/tree-sitter-tlaplus"; 1393 1393 };
+1
pkgs/applications/editors/vim/plugins/vim-plugin-names
··· 446 446 https://github.com/chr4/nginx.vim/,, 447 447 https://github.com/EdenEast/nightfox.nvim/,, 448 448 https://github.com/zah/nim.vim/,, 449 + https://github.com/tamago324/nlsp-settings.nvim/,main, 449 450 https://github.com/tjdevries/nlua.nvim/,, 450 451 https://github.com/mcchrish/nnn.vim/,, 451 452 https://github.com/folke/noice.nvim/,HEAD,
+2 -2
pkgs/applications/misc/calibre/default.nix
··· 30 30 31 31 stdenv.mkDerivation rec { 32 32 pname = "calibre"; 33 - version = "6.9.0"; 33 + version = "6.10.0"; 34 34 35 35 src = fetchurl { 36 36 url = "https://download.calibre-ebook.com/${version}/${pname}-${version}.tar.xz"; 37 - hash = "sha256-pAZy9YgAzEks5o4R5r46iGLTcitBrOHyltWg2ZyfzwA="; 37 + hash = "sha256-JE5AnaCMfe9mI+qLe1LdbbHAdC5X5wLo/zFhcJLLAhk="; 38 38 }; 39 39 40 40 # https://sources.debian.org/patches/calibre/${version}+dfsg-1
+2 -2
pkgs/applications/networking/instant-messengers/signalbackup-tools/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "signalbackup-tools"; 5 - version = "20221130"; 5 + version = "20221208"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "bepaald"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "sha256-xz9HSqDrkPP+5L499cT7cF/S3JYpBirTUze1Apkw120="; 11 + sha256 = "sha256-GSZy2zW9Ek9nP9zoBfvq3wLghEsaGqmC1f4cs+OVaFE="; 12 12 }; 13 13 14 14 postPatch = ''
+2 -2
pkgs/applications/video/ffmpeg-normalize/default.nix
··· 7 7 8 8 buildPythonApplication rec { 9 9 pname = "ffmpeg-normalize"; 10 - version = "1.25.3"; 10 + version = "1.26.0"; 11 11 12 12 src = fetchPypi { 13 13 inherit pname version; 14 - sha256 = "sha256-sEA6faoxuFA355ftI5xL3AXZD+6UYSDxRdQXA9nH5wY="; 14 + sha256 = "sha256-+WpWcQnnAUiARLZBkv51AblZDz9g8bM5MQTkm2kYsPQ="; 15 15 }; 16 16 17 17 propagatedBuildInputs = [ ffmpeg ffmpeg-progress-yield ];
+2 -2
pkgs/build-support/fetchzip/default.nix
··· 63 63 chmod -R +w "$unpackDir" 64 64 '' 65 65 + (if stripRoot then '' 66 - if [ $(ls "$unpackDir" | wc -l) != 1 ]; then 66 + if [ $(ls -A "$unpackDir" | wc -l) != 1 ]; then 67 67 echo "error: zip file must contain a single file or directory." 68 68 echo "hint: Pass stripRoot=false; to fetchzip to assume flat list of files." 69 69 exit 1 70 70 fi 71 - fn=$(cd "$unpackDir" && echo *) 71 + fn=$(cd "$unpackDir" && ls -A) 72 72 if [ -f "$unpackDir/$fn" ]; then 73 73 mkdir $out 74 74 fi
+10 -2
pkgs/build-support/fetchzip/tests.nix
··· 1 - { testers, fetchzip, ... }: 1 + { testers, fetchzip, runCommand, ... }: 2 2 3 3 let 4 4 url = "https://gist.github.com/glandium/01d54cefdb70561b5f6675e08f2990f2/archive/2f430f0c136a69b0886281d0c76708997d8878af.zip"; ··· 12 12 postFetch = testers.invalidateFetcherByDrvHash fetchzip { 13 13 inherit url; 14 14 sha256 = "sha256-7sAOzKa+9vYx5XyndHxeY2ffWAjOsgCkXC9anK6cuV0="; 15 - postFetch = ''touch $out/filee''; 15 + postFetch = "touch $out/filee"; 16 + }; 17 + 18 + hiddenDir = testers.invalidateFetcherByDrvHash fetchzip { 19 + url = "file://${runCommand "hiddendir.tar" {} '' 20 + mkdir .foo 21 + tar -cf $out .foo 22 + ''}"; 23 + sha256 = "sha256-pQpattmS9VmO3ZIQUFn66az8GSmB4IvYhTTCFn6SUmo="; 16 24 }; 17 25 }
+3 -1
pkgs/development/libraries/libjxl/default.nix
··· 108 108 LDFLAGS = lib.optionalString stdenv.hostPlatform.isRiscV "-latomic"; 109 109 CXXFLAGS = lib.optionalString stdenv.hostPlatform.isAarch32 "-mfp16-format=ieee"; 110 110 111 - doCheck = !stdenv.hostPlatform.isi686; 111 + # FIXME x86_64-darwin: 112 + # https://github.com/NixOS/nixpkgs/pull/204030#issuecomment-1352768690 113 + doCheck = with stdenv; !(hostPlatform.isi686 || isDarwin && isx86_64); 112 114 113 115 meta = with lib; { 114 116 homepage = "https://github.com/libjxl/libjxl";
+31 -17
pkgs/development/libraries/science/chemistry/openmm/default.nix
··· 6 6 , fftwSinglePrec 7 7 , doxygen 8 8 , swig 9 - , python3Packages, enablePython ? false 10 - , opencl-headers, ocl-icd, enableOpencl ? false 11 - , clang, enableClang ? true 12 - , cudatoolkit, enableCuda ? false 9 + , enablePython ? false 10 + , python3Packages 11 + , enableOpencl ? true 12 + , opencl-headers 13 + , ocl-icd 14 + , enableCuda ? false 15 + , cudaPackages 16 + , addOpenGLRunpath 13 17 }: 14 18 15 19 stdenv.mkDerivation rec { ··· 35 31 serialization/tests/TestSerializeIntegrator.cpp 36 32 ''; 37 33 38 - nativeBuildInputs = [ cmake gfortran swig doxygen python3Packages.python ]; 34 + nativeBuildInputs = [ 35 + cmake 36 + gfortran 37 + swig 38 + doxygen 39 + python3Packages.python 40 + ] ++ lib.optional enableCuda addOpenGLRunpath; 39 41 40 42 buildInputs = [ fftwSinglePrec ] 41 43 ++ lib.optionals enableOpencl [ ocl-icd opencl-headers ] 42 - ++ lib.optional enableCuda cudatoolkit; 44 + ++ lib.optional enableCuda cudaPackages.cudatoolkit; 43 45 44 46 propagatedBuildInputs = lib.optionals enablePython (with python3Packages; [ 45 47 python ··· 64 54 "-DOPENMM_BUILD_SHARED_LIB=ON" 65 55 ] ++ lib.optionals enablePython [ 66 56 "-DOPENMM_BUILD_PYTHON_WRAPPERS=ON" 67 - ] ++ lib.optionals enableClang [ 68 - "-DCMAKE_C_COMPILER=${clang}/bin/clang" 69 - "-DCMAKE_CXX_COMPILER=${clang}/bin/clang++" 70 57 ] ++ lib.optionals enableOpencl [ 71 58 "-DOPENMM_BUILD_OPENCL_LIB=ON" 72 59 "-DOPENMM_BUILD_AMOEBA_OPENCL_LIB=ON" 73 60 "-DOPENMM_BUILD_DRUDE_OPENCL_LIB=ON" 74 61 "-DOPENMM_BUILD_RPMD_OPENCL_LIB=ON" 75 62 ] ++ lib.optionals enableCuda [ 76 - "-DCUDA_SDK_ROOT_DIR=${cudatoolkit}" 63 + "-DCUDA_SDK_ROOT_DIR=${cudaPackages.cudatoolkit}" 77 64 "-DOPENMM_BUILD_AMOEBA_CUDA_LIB=ON" 78 65 "-DOPENMM_BUILD_CUDA_LIB=ON" 79 66 "-DOPENMM_BUILD_DRUDE_CUDA_LIB=ON" 80 67 "-DOPENMM_BUILD_RPMD_CUDA_LIB=ON" 81 - "-DCMAKE_LIBRARY_PATH=${cudatoolkit}/lib64/stubs" 68 + "-DCMAKE_LIBRARY_PATH=${cudaPackages.cudatoolkit}/lib64/stubs" 82 69 ]; 83 70 84 71 postInstall = lib.strings.optionalString enablePython '' 85 - export OPENMM_LIB_PATH=$out/lib 86 - export OPENMM_INCLUDE_PATH=$out/include 87 - cd python 88 - ${python3Packages.python.interpreter} setup.py build 89 - ${python3Packages.python.interpreter} setup.py install --prefix=$out 72 + export OPENMM_LIB_PATH=$out/lib 73 + export OPENMM_INCLUDE_PATH=$out/include 74 + cd python 75 + ${python3Packages.python.interpreter} setup.py build 76 + ${python3Packages.python.interpreter} setup.py install --prefix=$out 77 + ''; 78 + 79 + postFixup = '' 80 + for lib in $out/lib/plugins/*CUDA.so $out/lib/plugins/*Cuda*.so; do 81 + addOpenGLRunpath "$lib" 82 + done 90 83 ''; 91 84 92 - doCheck = true; 85 + # Couldn't get CUDA to run properly in the sandbox 86 + doCheck = !enableCuda && !enableOpencl; 93 87 94 88 meta = with lib; { 95 89 description = "Toolkit for molecular simulation using high performance GPU code";
-2
pkgs/development/libraries/subunit/default.nix
··· 23 23 homepage = "https://launchpad.net/subunit"; 24 24 license = licenses.asl20; 25 25 platforms = platforms.all; 26 - # never built on aarch64-darwin since first introduction in nixpkgs 27 - broken = stdenv.isDarwin && stdenv.isAarch64; 28 26 }; 29 27 }
+2 -2
pkgs/development/python-modules/pikepdf/default.nix
··· 24 24 25 25 buildPythonPackage rec { 26 26 pname = "pikepdf"; 27 - version = "6.2.5"; 27 + version = "6.2.6"; 28 28 format = "setuptools"; 29 29 30 30 disabled = pythonOlder "3.7"; ··· 39 39 postFetch = '' 40 40 rm "$out/.git_archival.txt" 41 41 ''; 42 - hash = "sha256-5ADRKFGQ1k/O/r9CgEWCbOZLgasUJVXtPm+5ocRE4Fk="; 42 + hash = "sha256-SqGWXuRwz79ZoDFL6sU9hX3FG/VLwLhQYzZOtT3tqvE="; 43 43 }; 44 44 45 45 patches = [
+2 -2
pkgs/development/tools/ddosify/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "ddosify"; 5 - version = "0.9.1"; 5 + version = "0.10.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = pname; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-CUCIY3tDkmNPnHFgfjWa5wVFvaSWV9DAyPFx3+dHxZQ="; 11 + sha256 = "sha256-90qC0oWUC2nHDbTZsoDeiKuoHVl3YGRyFm0qj42DnOA="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-mq82KNa01gHvW+RUREra+ysaJ1YWIwX0v/uYMxmFN4M=";
+3 -3
pkgs/development/tools/ruff/default.nix
··· 8 8 9 9 rustPlatform.buildRustPackage rec { 10 10 pname = "ruff"; 11 - version = "0.0.182"; 11 + version = "0.0.183"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "charliermarsh"; 15 15 repo = pname; 16 16 rev = "v${version}"; 17 - sha256 = "sha256-/ZivsD9PQPgF5Q/r6nYwth1MEyT5qOqy1HPvMibDZpI="; 17 + sha256 = "sha256-xZSPRSqtf62BSfNw3eJEvsxqGBpy/v5DKWz6mipjsAY="; 18 18 }; 19 19 20 - cargoSha256 = "sha256-mijDys0Zmh+2+WwcMCq3Fouyhzqlr36ziB0vuSafT+o="; 20 + cargoSha256 = "sha256-s7IQtfcRvcLgvzep0Ya6i7+OfFlQwFNG67SQe5D0/Ec="; 21 21 22 22 buildInputs = lib.optionals stdenv.isDarwin [ 23 23 CoreServices
+89 -89
pkgs/tools/admin/pulumi-bin/data.nix
··· 1 1 # DO NOT EDIT! This file is generated automatically by update.sh 2 2 { }: 3 3 { 4 - version = "3.46.0"; 4 + version = "3.49.0"; 5 5 pulumiPkgs = { 6 6 x86_64-linux = [ 7 7 { 8 - url = "https://get.pulumi.com/releases/sdk/pulumi-v3.46.0-linux-x64.tar.gz"; 9 - sha256 = "1q80kp680ilvj9w51m90v6lzj11p3xvzvihf2g5c9lr5r0f4zkaz"; 8 + url = "https://get.pulumi.com/releases/sdk/pulumi-v3.49.0-linux-x64.tar.gz"; 9 + sha256 = "1wz24hhxjhyl0gsv166k0661gckc4xzpgxns99vsd2hgrj0ccsnr"; 10 10 } 11 11 { 12 12 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-aiven-v5.4.0-linux-amd64.tar.gz"; ··· 29 29 sha256 = "1rp0kdsrljlyzp58zrzvs8ifygrlz3qz6wqi1cxmf482gn1ck3xg"; 30 30 } 31 31 { 32 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-aws-v5.19.0-linux-amd64.tar.gz"; 33 - sha256 = "182281jvafg0ixd6k17y6zvnkfpfi57khf42jsdgn6q97xz9bvfs"; 32 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-aws-v5.23.0-linux-amd64.tar.gz"; 33 + sha256 = "05w5ryi3wsqnnsswpjd2x0dsfaqcd7wx32q67p8p8gh49r3xayhb"; 34 34 } 35 35 { 36 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azure-v5.23.0-linux-amd64.tar.gz"; 37 - sha256 = "13xwgv9rbzm8n240qc5z6qm93wb662mmvvmvk0pk6c2ypmfsbyhg"; 36 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azure-v5.27.0-linux-amd64.tar.gz"; 37 + sha256 = "1n7i5y7baxb7wlr16z664ykd9v3rjm0c0ds5fa8zjqg198hi5lkm"; 38 38 } 39 39 { 40 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azuread-v5.30.0-linux-amd64.tar.gz"; 41 - sha256 = "1gbjfcs35p6cc999p0hnzdgv6c7fzhd5ngg5qmrgc9f3q4f41bqp"; 40 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azuread-v5.32.0-linux-amd64.tar.gz"; 41 + sha256 = "1fah3b9xp14qmwywnd08j1hmpcqjnyhzv9qwvsn5pxgdl9k6kk5c"; 42 42 } 43 43 { 44 44 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azuredevops-v2.5.0-linux-amd64.tar.gz"; 45 45 sha256 = "12sxvvjzf9761cag1kah7sdvjg98mi05jrfy0g06xf7lghlyxpcr"; 46 46 } 47 47 { 48 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-cloudflare-v4.12.1-linux-amd64.tar.gz"; 49 - sha256 = "177s1vi6ci4v04gyck8c2p9r17w8538migw6d1n7yzyf74qjdwhl"; 48 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-cloudflare-v4.13.0-linux-amd64.tar.gz"; 49 + sha256 = "10ssqnd4njspvj9s8450hiiya9p6pkxpvhlzk6fws1mc3x6w8hdv"; 50 50 } 51 51 { 52 52 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-consul-v3.7.0-linux-amd64.tar.gz"; ··· 61 61 sha256 = "0dwnrqng4w02wcmznksdxksak9kgfrj6pg2jny175a1lr6584blf"; 62 62 } 63 63 { 64 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-docker-v3.5.0-linux-amd64.tar.gz"; 65 - sha256 = "1wkz9lr1q668kf71gz38n6wd11rxc5np0akw91i5fln5z9wd2jcf"; 64 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-docker-v3.6.1-linux-amd64.tar.gz"; 65 + sha256 = "1zbjvvza1ikh5ag50r2m08nqnzmylanwfrgxw75nm7r9phpi1i9n"; 66 66 } 67 67 { 68 68 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-equinix-metal-v3.2.1-linux-amd64.tar.gz"; ··· 73 73 sha256 = "1w8sclkkzaj88kzx3g4lxg490v5hawv68j6y7a10a11v69qjv6lb"; 74 74 } 75 75 { 76 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-gcp-v6.41.0-linux-amd64.tar.gz"; 77 - sha256 = "0ic4irg658w5y24xisxj7707llx28p8rs2d351va2g21sqgzfnh2"; 76 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-gcp-v6.45.0-linux-amd64.tar.gz"; 77 + sha256 = "1p9jkanm30wvqhy19dl4qm89xyldks2a8dvxpbpm1nqn1ilppicy"; 78 78 } 79 79 { 80 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-github-v5.0.0-linux-amd64.tar.gz"; 81 - sha256 = "1n7hmbqc3a4z44wa8pzmfxqzg895pynqsjk0php9z052nkl034kz"; 80 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-github-v5.1.0-linux-amd64.tar.gz"; 81 + sha256 = "02qlpxndk8p5slpvn2cq7mkj8k8w5zwn5n66cbnb6rh5c43jcwx5"; 82 82 } 83 83 { 84 84 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-gitlab-v4.9.0-linux-amd64.tar.gz"; ··· 93 93 sha256 = "09i6lh9wfsfpa5jkj2nb80f3gvmpg3m3flfgfcc794khlrikqmib"; 94 94 } 95 95 { 96 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-kubernetes-v3.22.1-linux-amd64.tar.gz"; 97 - sha256 = "1iiri83hvsvx9nz9whsjj9gswrs06ihywh8lf58rjzmr7bw141ln"; 96 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-kubernetes-v3.23.0-linux-amd64.tar.gz"; 97 + sha256 = "04akrli4cg21w3rhsj7vsgjhn5saal0ikk5jbdw58d4bc28vicji"; 98 98 } 99 99 { 100 100 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-linode-v3.10.1-linux-amd64.tar.gz"; ··· 141 141 sha256 = "1yq72jgvarbh754a1ym9b8jk40jmk25ly78cw2wj31a96rxv1qp9"; 142 142 } 143 143 { 144 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-vault-v5.7.0-linux-amd64.tar.gz"; 145 - sha256 = "1826nmjjqyf4yim4axni2qf7l6anyr62fdd81nw7qz52117kl8ig"; 144 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-vault-v5.7.2-linux-amd64.tar.gz"; 145 + sha256 = "1y05aaj5nw5aqg7bv3sn4hkiq7d5grnsh4dw5v6yr3s564hl0lbl"; 146 146 } 147 147 { 148 148 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-venafi-v1.4.1-linux-amd64.tar.gz"; ··· 153 153 sha256 = "1rkn9l16mfr97h9hi5i0kfm4lh6xm5wwxj4mwz8rwwiwfr963zw9"; 154 154 } 155 155 { 156 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-wavefront-v1.1.1-linux-amd64.tar.gz"; 157 - sha256 = "0vwlpczrzpgh274r300ilmm0z3vhg1fdlbx8p5j91p3cp86sj2s1"; 156 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-wavefront-v1.2.0-linux-amd64.tar.gz"; 157 + sha256 = "11yvdszdd35hz3cd7l2vs5m45pf4zv7lvbmrsfr3i00s3d5rmzj0"; 158 158 } 159 159 { 160 160 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-yandex-v0.13.0-linux-amd64.tar.gz"; ··· 163 163 ]; 164 164 x86_64-darwin = [ 165 165 { 166 - url = "https://get.pulumi.com/releases/sdk/pulumi-v3.46.0-darwin-x64.tar.gz"; 167 - sha256 = "076bf9pj5k9n0gvyvms59x13dwdf9s0sqfmjrv3f3pq52676bycr"; 166 + url = "https://get.pulumi.com/releases/sdk/pulumi-v3.49.0-darwin-x64.tar.gz"; 167 + sha256 = "1sp4q9n2kfiw3sj30k6kcya6jvj52bjim6dy0bz7z23ibrn50psm"; 168 168 } 169 169 { 170 170 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-aiven-v5.4.0-darwin-amd64.tar.gz"; ··· 187 187 sha256 = "1ss0si046ikx60l94121vfd80h2axcbddiak3pnwq3cikabyw8r7"; 188 188 } 189 189 { 190 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-aws-v5.19.0-darwin-amd64.tar.gz"; 191 - sha256 = "02jcdmmgm2v5abdqhi4l2w6nd76xh5r12sz7i27ifrq92y67hdwi"; 190 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-aws-v5.23.0-darwin-amd64.tar.gz"; 191 + sha256 = "16vkcr4iilv4lz0sz9hsj9s6yp7lvkaivx8890xs3ckkhqpi778f"; 192 192 } 193 193 { 194 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azure-v5.23.0-darwin-amd64.tar.gz"; 195 - sha256 = "1rr4hh1kr3cnd55mx2awzykz8m4a491lq1gxw6f01x7csxd7khwb"; 194 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azure-v5.27.0-darwin-amd64.tar.gz"; 195 + sha256 = "002f5gbjrmhkrvj73r7fv3ccfflfry143mp9rcf9rwhmsfgz5r2f"; 196 196 } 197 197 { 198 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azuread-v5.30.0-darwin-amd64.tar.gz"; 199 - sha256 = "15cza4ak8vliyz615fwjmzis17xsjvbgk7ngv5bjgz627vw7jn9h"; 198 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azuread-v5.32.0-darwin-amd64.tar.gz"; 199 + sha256 = "0rymhyr4a16s0xsw07g45mslfsq2l1rav27vlp8b4k1kshja2g13"; 200 200 } 201 201 { 202 202 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azuredevops-v2.5.0-darwin-amd64.tar.gz"; 203 203 sha256 = "026i7hxa80b7mipw792anv1wplmz2w23irfy26bsh77an36hk46y"; 204 204 } 205 205 { 206 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-cloudflare-v4.12.1-darwin-amd64.tar.gz"; 207 - sha256 = "18k9gzsbx48q17y9p8i5wqbjcq9bq94ha96lxvljcyf0jmsklkj6"; 206 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-cloudflare-v4.13.0-darwin-amd64.tar.gz"; 207 + sha256 = "1nhgf3qwvhxl2akl3y7spwirb34cbch7fvz5rjbb0f8680r59sd3"; 208 208 } 209 209 { 210 210 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-consul-v3.7.0-darwin-amd64.tar.gz"; ··· 219 219 sha256 = "08v8s77plv9fv5bjx6g6wfq1fxknmmacws33zgl06vqdgdsfg1gx"; 220 220 } 221 221 { 222 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-docker-v3.5.0-darwin-amd64.tar.gz"; 223 - sha256 = "07kxf42j2a4z1ph161mqll2vlzhgw1ibrvd69gzqwr4d4098s7sb"; 222 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-docker-v3.6.1-darwin-amd64.tar.gz"; 223 + sha256 = "0jj56yy8sywkszsbznjbbydxdqra63n6igffd6c1nknrh7161pcd"; 224 224 } 225 225 { 226 226 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-equinix-metal-v3.2.1-darwin-amd64.tar.gz"; ··· 231 231 sha256 = "015wqmygcagx3abwwisf5iyi6xaakw2wxs2nc4clis9q0g6dnw3y"; 232 232 } 233 233 { 234 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-gcp-v6.41.0-darwin-amd64.tar.gz"; 235 - sha256 = "0c04cc85qvpxk7yp10728rl5xjzx5lyl36r6fpkvip16si0frqzl"; 234 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-gcp-v6.45.0-darwin-amd64.tar.gz"; 235 + sha256 = "0jdjfzc5abl01z8n07vcb3vk82x87rhpmkrk9ra7i57p8f5rhyfr"; 236 236 } 237 237 { 238 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-github-v5.0.0-darwin-amd64.tar.gz"; 239 - sha256 = "0kz7ah6a1lai12n0lq0lygvszs8fh7fnnz92na06p517bl5dbink"; 238 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-github-v5.1.0-darwin-amd64.tar.gz"; 239 + sha256 = "03a3lbmr737aql53wjavbh474g4cwxil6dvs47d71akp9mbn38f6"; 240 240 } 241 241 { 242 242 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-gitlab-v4.9.0-darwin-amd64.tar.gz"; ··· 251 251 sha256 = "1jp9cfw8jj1wms73b5d1xhkmnylly061fxilxzvnpd49glam7da6"; 252 252 } 253 253 { 254 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-kubernetes-v3.22.1-darwin-amd64.tar.gz"; 255 - sha256 = "15dhf48k3vwg5ralcaljzg20vssvl4r615z3la852s9hlyr0rvzz"; 254 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-kubernetes-v3.23.0-darwin-amd64.tar.gz"; 255 + sha256 = "08a135hg0xkfcx9dvfgxxyl2gp87aybq3np53ni85rwbja297zqn"; 256 256 } 257 257 { 258 258 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-linode-v3.10.1-darwin-amd64.tar.gz"; ··· 299 299 sha256 = "0g1kh5zkkr9m1k5qmmmkay089j0yqbz9qap6k7gii1k601mm09sf"; 300 300 } 301 301 { 302 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-vault-v5.7.0-darwin-amd64.tar.gz"; 303 - sha256 = "0k39q57wwdcxgpmv6sfifkmcc1rplqabjxk8fg3bvna6zias81yn"; 302 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-vault-v5.7.2-darwin-amd64.tar.gz"; 303 + sha256 = "1pxvsxk0w4q9fqrf3q4a93ah4plhwsdwy9sapwwmh2nld489y5ld"; 304 304 } 305 305 { 306 306 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-venafi-v1.4.1-darwin-amd64.tar.gz"; ··· 311 311 sha256 = "0bmdfvdh2smwpdmz8jhkn4cl4zrn7jqw8nmf7y7zkpwpiw8647ir"; 312 312 } 313 313 { 314 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-wavefront-v1.1.1-darwin-amd64.tar.gz"; 315 - sha256 = "1ldksyxgwbg6fswfakgy3gdm5y50kc0bk74pxcza7w7ncirr9cvg"; 314 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-wavefront-v1.2.0-darwin-amd64.tar.gz"; 315 + sha256 = "03wn8hm42xn6rnnfinckhfznz4i1mpb6h37kgchpv0s4akapv97r"; 316 316 } 317 317 { 318 318 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-yandex-v0.13.0-darwin-amd64.tar.gz"; ··· 321 321 ]; 322 322 aarch64-linux = [ 323 323 { 324 - url = "https://get.pulumi.com/releases/sdk/pulumi-v3.46.0-linux-arm64.tar.gz"; 325 - sha256 = "137ngy26ag04yw1k3hzhmadqphw7ipfz1dcg2aal0vq8rk0xrfnb"; 324 + url = "https://get.pulumi.com/releases/sdk/pulumi-v3.49.0-linux-arm64.tar.gz"; 325 + sha256 = "1jrn74dp61kv4dppf0aav4fwjc9nzyhn8xss1z5l6xklls4sm7gv"; 326 326 } 327 327 { 328 328 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-aiven-v5.4.0-linux-arm64.tar.gz"; ··· 345 345 sha256 = "1r8rq9m2rayylspz38x8wqj7d9nlks3ynr5ifdiqf10a5xchcw96"; 346 346 } 347 347 { 348 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-aws-v5.19.0-linux-arm64.tar.gz"; 349 - sha256 = "13bkgsb8wqy9jcmmwignx7609m5qhmj2ghsprwmmbjnmcnsc21k7"; 348 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-aws-v5.23.0-linux-arm64.tar.gz"; 349 + sha256 = "105dz76dx9zscmhsb02iykj98lrbjavlkl65a6885crjvr48dwg5"; 350 350 } 351 351 { 352 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azure-v5.23.0-linux-arm64.tar.gz"; 353 - sha256 = "0bgzqn0wwb823bwm3vkblwnqhfsha5rvq6ab5gnr8zk2phzfjq3a"; 352 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azure-v5.27.0-linux-arm64.tar.gz"; 353 + sha256 = "0jjvmsaa3g6mf905d6sv3rgl78vylvpmbb9pzx1ymyainx8pd1df"; 354 354 } 355 355 { 356 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azuread-v5.30.0-linux-arm64.tar.gz"; 357 - sha256 = "1s5b0hjzvnmc1y6hl2zqi1m7a3gc6394d87valnqvxrix8jxlw5w"; 356 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azuread-v5.32.0-linux-arm64.tar.gz"; 357 + sha256 = "1fyhmcmnzbghhj8q0p4zsfqh69g9arfwgipakq5qrcmcpw9kij6f"; 358 358 } 359 359 { 360 360 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azuredevops-v2.5.0-linux-arm64.tar.gz"; 361 361 sha256 = "1bxrh89hkw9b0g20d4apwhswl1dxb4v4nn5rkkkjd91ykin5idp2"; 362 362 } 363 363 { 364 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-cloudflare-v4.12.1-linux-arm64.tar.gz"; 365 - sha256 = "0gr30lgad0xf7f4acxj9v7r69gncfzh1x7rn7nvyibsfy7ggn80z"; 364 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-cloudflare-v4.13.0-linux-arm64.tar.gz"; 365 + sha256 = "0fzgwyqn55n4x6v36dzjvkw4xj4z27vpzm70bfnc5b0arq67hddl"; 366 366 } 367 367 { 368 368 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-consul-v3.7.0-linux-arm64.tar.gz"; ··· 377 377 sha256 = "0bx2dczfm1zqpkclyf1pj0m0iv2w7c3dlqdajfgism3inyb6313c"; 378 378 } 379 379 { 380 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-docker-v3.5.0-linux-arm64.tar.gz"; 381 - sha256 = "0600s9hyvxxqbbcaikmwqg0ib6ibjz9wxadlpd9ch50kvsmfi0w4"; 380 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-docker-v3.6.1-linux-arm64.tar.gz"; 381 + sha256 = "1c53lw2hh2ppvz9nkhg1fdblnfbd5vbas6zm92iqz859gi6a23z1"; 382 382 } 383 383 { 384 384 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-equinix-metal-v3.2.1-linux-arm64.tar.gz"; ··· 389 389 sha256 = "1j4qp9pf9iy7hzq5pvj2ysk149s5012bi03il2qz3qcz2ga983p7"; 390 390 } 391 391 { 392 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-gcp-v6.41.0-linux-arm64.tar.gz"; 393 - sha256 = "0i6v54m7xg8wss8733zdvghx5mfhqzryv1d1ybhpqvj7650kmw38"; 392 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-gcp-v6.45.0-linux-arm64.tar.gz"; 393 + sha256 = "1vrr17vc0n0f60w898c9s77car0yq39srhh0xb23lpi2v37ina8m"; 394 394 } 395 395 { 396 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-github-v5.0.0-linux-arm64.tar.gz"; 397 - sha256 = "0nf5s17x2k57rbmfi0b7lyicmsnm1gq1y5vfy5gpb0wxrcmnyadm"; 396 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-github-v5.1.0-linux-arm64.tar.gz"; 397 + sha256 = "1zpqpja1264w5gvr20g15vccdv44rc8mcair0w78gx32anxnxwfy"; 398 398 } 399 399 { 400 400 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-gitlab-v4.9.0-linux-arm64.tar.gz"; ··· 409 409 sha256 = "0gis39k5kgdxl0i4afy78hkcmwpzm1shh4x713p7dg6h8w0afdmi"; 410 410 } 411 411 { 412 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-kubernetes-v3.22.1-linux-arm64.tar.gz"; 413 - sha256 = "16if0nrj433b7xclg2mv9lcq2p5phkj4lviyi5xb655mapyzkqg2"; 412 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-kubernetes-v3.23.0-linux-arm64.tar.gz"; 413 + sha256 = "1w43js5nxzwah046y54a1h72cqz6n701sns8zppssgzidr2cqvjv"; 414 414 } 415 415 { 416 416 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-linode-v3.10.1-linux-arm64.tar.gz"; ··· 457 457 sha256 = "11n751m4z2gjslvf28xazhq123yfqyyhshni97ad5ki23i1v785l"; 458 458 } 459 459 { 460 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-vault-v5.7.0-linux-arm64.tar.gz"; 461 - sha256 = "0x3xdqd623q83fr67byhnqbx7gz8p8j65myygmjr14p2rfh1jvvb"; 460 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-vault-v5.7.2-linux-arm64.tar.gz"; 461 + sha256 = "0h80hzx69bl61zbh25lqjsjvffc2b7l1nf6dlny5vnb4yk17wfxi"; 462 462 } 463 463 { 464 464 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-venafi-v1.4.1-linux-arm64.tar.gz"; ··· 469 469 sha256 = "065bcvm1p6fbhnhq4r0l5km7z7srd6yfpj05qd070lp5iaz90mp7"; 470 470 } 471 471 { 472 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-wavefront-v1.1.1-linux-arm64.tar.gz"; 473 - sha256 = "13ys3i7anpvbmikzxlj44kw8shp9x4cg6nlqijx80vwl3hwk5qpw"; 472 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-wavefront-v1.2.0-linux-arm64.tar.gz"; 473 + sha256 = "0rp3gdng2gnskddwlkkglig3dssdvg9x71pq6ab8mhr4afhza4f8"; 474 474 } 475 475 { 476 476 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-yandex-v0.13.0-linux-arm64.tar.gz"; ··· 479 479 ]; 480 480 aarch64-darwin = [ 481 481 { 482 - url = "https://get.pulumi.com/releases/sdk/pulumi-v3.46.0-darwin-arm64.tar.gz"; 483 - sha256 = "1id3l0dycqf8rwxzf2nx11xg2qcvzgpp3373l4qfab68251cw15d"; 482 + url = "https://get.pulumi.com/releases/sdk/pulumi-v3.49.0-darwin-arm64.tar.gz"; 483 + sha256 = "0ykpgk3ngczzyv8vnwya937p51q463xm0pr69vdannc8jpn7w7ds"; 484 484 } 485 485 { 486 486 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-aiven-v5.4.0-darwin-arm64.tar.gz"; ··· 503 503 sha256 = "0dvcbni3s6gpcizgdilsjnks7z3srvdmzqlcdd61dzv0j5jkfshp"; 504 504 } 505 505 { 506 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-aws-v5.19.0-darwin-arm64.tar.gz"; 507 - sha256 = "0hszy2nsw88qirnf58yrbmsgra98j2zla635y58ap10f7am1x69x"; 506 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-aws-v5.23.0-darwin-arm64.tar.gz"; 507 + sha256 = "096hmgpfx5hq8m4b7m3zxym2szvrdyhy041wqg6v5rzhhm23ra6n"; 508 508 } 509 509 { 510 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azure-v5.23.0-darwin-arm64.tar.gz"; 511 - sha256 = "1mcpw2nikllhb5nnniazamfs469m6kc5x1abngz469mr41zl4qr4"; 510 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azure-v5.27.0-darwin-arm64.tar.gz"; 511 + sha256 = "015s2sskdgifx22p66zzga3qzsqvh87anfb9429akm4h8wflz3rn"; 512 512 } 513 513 { 514 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azuread-v5.30.0-darwin-arm64.tar.gz"; 515 - sha256 = "14ysglr53893glmyfv59dy4kqibqc9nl4v477bd1rynnxickdm38"; 514 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azuread-v5.32.0-darwin-arm64.tar.gz"; 515 + sha256 = "1zagcsbn1blja0g8yk5bp7l20dhrpg8f84q2xck1py7yi0dgb8si"; 516 516 } 517 517 { 518 518 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-azuredevops-v2.5.0-darwin-arm64.tar.gz"; 519 519 sha256 = "030fyfj5yd4p0f7ffwdsqvkjwxihz96vgy2qqibhyyv3p6ymdpym"; 520 520 } 521 521 { 522 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-cloudflare-v4.12.1-darwin-arm64.tar.gz"; 523 - sha256 = "0jp50xcv9ss156i3v173j28ia7ykslmcv8nb4a8bz10jmhkxg52v"; 522 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-cloudflare-v4.13.0-darwin-arm64.tar.gz"; 523 + sha256 = "0qy88ngn3z716r2rjramgj11fggh86zcpcx0cfldmwjn2hkyhqab"; 524 524 } 525 525 { 526 526 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-consul-v3.7.0-darwin-arm64.tar.gz"; ··· 535 535 sha256 = "1gzh37b5jmpz3ih7s7r11vx7wpph7pvn3iidy6gckrs9rw9jp7l4"; 536 536 } 537 537 { 538 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-docker-v3.5.0-darwin-arm64.tar.gz"; 539 - sha256 = "0bl2sqinn5bf3hp7maw7092n08v0pnjrcjpxhls7n234kq124rlk"; 538 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-docker-v3.6.1-darwin-arm64.tar.gz"; 539 + sha256 = "0wkipvz6w8x3acn36kh871c5f4sfi5yb2x6hhwwls7vfbm402n5j"; 540 540 } 541 541 { 542 542 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-equinix-metal-v3.2.1-darwin-arm64.tar.gz"; ··· 547 547 sha256 = "0vdrj3w6w9qw823fwr1i8j3gqirknvx5yiinp8sglsx9xb6p9q5i"; 548 548 } 549 549 { 550 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-gcp-v6.41.0-darwin-arm64.tar.gz"; 551 - sha256 = "07g75akxm7lsah20pvv2mmvgc6lfzrilky3ny32ra7cm591kdxsk"; 550 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-gcp-v6.45.0-darwin-arm64.tar.gz"; 551 + sha256 = "17r1fprf7gbymmwyw2vqalj6x34iqhqx0jvrcm5g93qwgcimhi5g"; 552 552 } 553 553 { 554 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-github-v5.0.0-darwin-arm64.tar.gz"; 555 - sha256 = "0246m5df3xbh5kjfj2g3lifk443daphq0sccs1rbmvfzhb8lm7yv"; 554 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-github-v5.1.0-darwin-arm64.tar.gz"; 555 + sha256 = "06y4ciy227kfck89av48dbnhd4mfac9gycgiqxn7nfsq8klabf2d"; 556 556 } 557 557 { 558 558 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-gitlab-v4.9.0-darwin-arm64.tar.gz"; ··· 567 567 sha256 = "1679zpv2r3i2acjmx2a6i7dc47p73gf3jw1k1aclasd5cyjf46jf"; 568 568 } 569 569 { 570 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-kubernetes-v3.22.1-darwin-arm64.tar.gz"; 571 - sha256 = "1q5xx4d1kk8hm39bnagq9f4y78ganrnw7380bsgm1qxkbq3k1lcm"; 570 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-kubernetes-v3.23.0-darwin-arm64.tar.gz"; 571 + sha256 = "1m2p7xhfw8lxmdc9s16bq501ssyw7gyxmci1ci4grnk11id5a2x2"; 572 572 } 573 573 { 574 574 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-linode-v3.10.1-darwin-arm64.tar.gz"; ··· 615 615 sha256 = "0yyr5dv612ar8c12w74zwp0n1v77lry548fs6b0d20cc3a6d10gb"; 616 616 } 617 617 { 618 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-vault-v5.7.0-darwin-arm64.tar.gz"; 619 - sha256 = "16kkhfaskk4rq00h3h6gpndam64py7swk199v4l9w29rg4wl5v3q"; 618 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-vault-v5.7.2-darwin-arm64.tar.gz"; 619 + sha256 = "0ss4q1l4x0jwagcqcjkb65ksrfai8j4lb3xdbbfk58yxcmk5wwr3"; 620 620 } 621 621 { 622 622 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-venafi-v1.4.1-darwin-arm64.tar.gz"; ··· 627 627 sha256 = "02739v2jq70s9vxvibffd9xnhfpy0zp3724n79pdcjygj5xw32g9"; 628 628 } 629 629 { 630 - url = "https://api.pulumi.com/releases/plugins/pulumi-resource-wavefront-v1.1.1-darwin-arm64.tar.gz"; 631 - sha256 = "02zj0d1cc9qmmql27licsm33ygvgcmj19blxkhn8zxwr666jf6kw"; 630 + url = "https://api.pulumi.com/releases/plugins/pulumi-resource-wavefront-v1.2.0-darwin-arm64.tar.gz"; 631 + sha256 = "1dlf93xbx643kh3np3v8vg3n82rcsc7k90qf2rcqikyyzqqlr886"; 632 632 } 633 633 { 634 634 url = "https://api.pulumi.com/releases/plugins/pulumi-resource-yandex-v0.13.0-darwin-arm64.tar.gz";
+1 -1
pkgs/tools/admin/pulumi-bin/update.sh
··· 12 12 13 13 # Version of Pulumi from 14 14 # https://www.pulumi.com/docs/get-started/install/versions/ 15 - VERSION="3.46.0" 15 + VERSION="3.49.0" 16 16 17 17 # An array of plugin names. The respective repository inside Pulumi's 18 18 # Github organization is called pulumi-$name by convention.
+2 -2
pkgs/tools/audio/abcmidi/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "abcMIDI"; 5 - version = "2022.12.05"; 5 + version = "2022.12.09"; 6 6 7 7 src = fetchzip { 8 8 url = "https://ifdo.ca/~seymour/runabc/${pname}-${version}.zip"; 9 - hash = "sha256-DLPew6pz+ABgdxSdHSX62VieRnTvbaj2sY3ujti1aj0="; 9 + hash = "sha256-sDJBfDH8RgoaFtOvO01jzqbYkGtmDGRQps7axXttYQI="; 10 10 }; 11 11 12 12 meta = with lib; {
+2
pkgs/tools/graphics/vulkan-tools-lunarg/default.nix
··· 81 81 done 82 82 ''; 83 83 84 + patches = [ ./gtest.patch ]; 85 + 84 86 # Same as vulkan-validation-layers 85 87 dontPatchELF = true; 86 88
+34
pkgs/tools/graphics/vulkan-tools-lunarg/gtest.patch
··· 1 + diff --git a/external/googletest/googlemock/CMakeLists.txt b/external/googletest/googlemock/CMakeLists.txt 2 + index e7df8ec53d..869bfcb716 100644 3 + --- a/external/googletest/googlemock/CMakeLists.txt 4 + +++ b/external/googletest/googlemock/CMakeLists.txt 5 + @@ -111,10 +111,10 @@ endif() 6 + if (DEFINED CMAKE_VERSION AND NOT "${CMAKE_VERSION}" VERSION_LESS "2.8.11") 7 + target_include_directories(gmock SYSTEM INTERFACE 8 + "$<BUILD_INTERFACE:${gmock_build_include_dirs}>" 9 + - "$<INSTALL_INTERFACE:$<INSTALL_PREFIX>/${CMAKE_INSTALL_INCLUDEDIR}>") 10 + + "$<INSTALL_INTERFACE:${CMAKE_INSTALL_FULL_INCLUDEDIR}>") 11 + target_include_directories(gmock_main SYSTEM INTERFACE 12 + "$<BUILD_INTERFACE:${gmock_build_include_dirs}>" 13 + - "$<INSTALL_INTERFACE:$<INSTALL_PREFIX>/${CMAKE_INSTALL_INCLUDEDIR}>") 14 + + "$<INSTALL_INTERFACE:${CMAKE_INSTALL_FULL_INCLUDEDIR}>") 15 + endif() 16 + 17 + ######################################################################## 18 + diff --git a/external/googletest/googletest/CMakeLists.txt b/external/googletest/googletest/CMakeLists.txt 19 + index abdd98b79a..7ae174d566 100644 20 + --- a/external/googletest/googletest/CMakeLists.txt 21 + +++ b/external/googletest/googletest/CMakeLists.txt 22 + @@ -138,10 +138,10 @@ set_target_properties(gtest_main PROPERTIES VERSION ${GOOGLETEST_VERSION}) 23 + if (DEFINED CMAKE_VERSION AND NOT "${CMAKE_VERSION}" VERSION_LESS "2.8.11") 24 + target_include_directories(gtest SYSTEM INTERFACE 25 + "$<BUILD_INTERFACE:${gtest_build_include_dirs}>" 26 + - "$<INSTALL_INTERFACE:$<INSTALL_PREFIX>/${CMAKE_INSTALL_INCLUDEDIR}>") 27 + + "$<INSTALL_INTERFACE:${CMAKE_INSTALL_FULL_INCLUDEDIR}>") 28 + target_include_directories(gtest_main SYSTEM INTERFACE 29 + "$<BUILD_INTERFACE:${gtest_build_include_dirs}>" 30 + - "$<INSTALL_INTERFACE:$<INSTALL_PREFIX>/${CMAKE_INSTALL_INCLUDEDIR}>") 31 + + "$<INSTALL_INTERFACE:${CMAKE_INSTALL_FULL_INCLUDEDIR}>") 32 + endif() 33 + target_link_libraries(gtest_main PUBLIC gtest) 34 +
+2 -2
pkgs/tools/misc/esphome/default.nix
··· 15 15 in 16 16 with python.pkgs; buildPythonApplication rec { 17 17 pname = "esphome"; 18 - version = "2022.12.0"; 18 + version = "2022.12.1"; 19 19 format = "setuptools"; 20 20 21 21 src = fetchFromGitHub { 22 22 owner = pname; 23 23 repo = pname; 24 24 rev = "refs/tags/${version}"; 25 - hash = "sha256-ZFu9txZTdCOhDpsjz7cjmWkY+Fdd07masd0YA/tRS80="; 25 + hash = "sha256-gDAwZhfkXMqU4dbowpPhNl52Kg3Kx9lgBNzhzkQPrN0="; 26 26 }; 27 27 28 28 postPatch = ''
+4 -3
pkgs/tools/package-management/nix-update/default.nix
··· 8 8 9 9 buildPythonApplication rec { 10 10 pname = "nix-update"; 11 - version = "0.10.0"; 11 + version = "0.11.0"; 12 12 format = "setuptools"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "Mic92"; 16 16 repo = pname; 17 17 rev = version; 18 - sha256 = "sha256-BChN92gZ1Ga7hIPWmdzkrg31S0iqWwXGkWb3mmRugY8="; 18 + sha256 = "sha256-nBLNMQKLgx5m5VyxTdSLBE9kNhUPdaRzVi5BQx83m+4="; 19 19 }; 20 20 21 21 makeWrapperArgs = [ ··· 29 29 meta = with lib; { 30 30 description = "Swiss-knife for updating nix packages"; 31 31 inherit (src.meta) homepage; 32 + changelog = "https://github.com/Mic92/nix-update/releases/tag/${version}"; 32 33 license = licenses.mit; 33 - maintainers = with maintainers; [ mic92 zowoq ]; 34 + maintainers = with maintainers; [ figsoda mic92 zowoq ]; 34 35 platforms = platforms.all; 35 36 }; 36 37 }