Merge remote-tracking branch 'origin/master' into haskell-updates

This commit is contained in:
sternenseemann 2021-12-09 21:32:06 +01:00
commit 33ccff5813
150 changed files with 2706 additions and 2967 deletions

4
.github/CODEOWNERS vendored
View File

@ -219,9 +219,9 @@
# Podman, CRI-O modules and related
/nixos/modules/virtualisation/containers.nix @NixOS/podman @zowoq @adisbladis
/nixos/modules/virtualisation/cri-o.nix @NixOS/podman @zowoq @adisbladis
/nixos/modules/virtualisation/podman.nix @NixOS/podman @zowoq @adisbladis
/nixos/modules/virtualisation/podman @NixOS/podman @zowoq @adisbladis
/nixos/tests/cri-o.nix @NixOS/podman @zowoq @adisbladis
/nixos/tests/podman.nix @NixOS/podman @zowoq @adisbladis
/nixos/tests/podman @NixOS/podman @zowoq @adisbladis
# Docker tools
/pkgs/build-support/docker @roberth @utdemir

View File

@ -385,7 +385,7 @@ def check_results(
sys.exit(1)
def parse_plugin_line(line: str) -> PluginDesc:
branch = "master"
branch = "HEAD"
alias = None
name, repo = line.split("/")
if " as " in repo:

View File

@ -5,7 +5,6 @@ let
cfg = config.hardware.keyboard.zsa;
in
{
# TODO: make group configurable like in https://github.com/NixOS/nixpkgs/blob/0b2b4b8c4e729535a61db56468809c5c2d3d175c/pkgs/tools/security/nitrokey-app/udev-rules.nix ?
options.hardware.keyboard.zsa = {
enable = mkOption {
type = types.bool;
@ -14,7 +13,6 @@ in
Enables udev rules for keyboards from ZSA like the ErgoDox EZ, Planck EZ and Moonlander Mark I.
You need it when you want to flash a new configuration on the keyboard
or use their live training in the browser.
Access to the keyboard is granted to users in the "plugdev" group.
You may want to install the wally-cli package.
'';
};
@ -22,6 +20,5 @@ in
config = mkIf cfg.enable {
services.udev.packages = [ pkgs.zsa-udev-rules ];
users.groups.plugdev = {};
};
}

View File

@ -1192,8 +1192,7 @@
./virtualisation/kvmgt.nix
./virtualisation/openvswitch.nix
./virtualisation/parallels-guest.nix
./virtualisation/podman.nix
./virtualisation/podman-network-socket-ghostunnel.nix
./virtualisation/podman/default.nix
./virtualisation/qemu-guest-agent.nix
./virtualisation/railcar.nix
./virtualisation/spice-usb-redirection.nix

View File

@ -295,9 +295,14 @@ let
};
limits = mkOption {
default = [];
type = limitsType;
description = ''
Attribute set describing resource limits. Defaults to the
value of <option>security.pam.loginLimits</option>.
The meaning of the values is explained in <citerefentry>
<refentrytitle>limits.conf</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>.
'';
};
@ -648,6 +653,51 @@ let
"${domain} ${type} ${item} ${toString value}\n")
limits);
limitsType = with lib.types; listOf (submodule ({ ... }: {
options = {
domain = mkOption {
description = "Username, groupname, or wildcard this limit applies to";
example = "@wheel";
type = str;
};
type = mkOption {
description = "Type of this limit";
type = enum [ "-" "hard" "soft" ];
default = "-";
};
item = mkOption {
description = "Item this limit applies to";
type = enum [
"core"
"data"
"fsize"
"memlock"
"nofile"
"rss"
"stack"
"cpu"
"nproc"
"as"
"maxlogins"
"maxsyslogins"
"priority"
"locks"
"sigpending"
"msgqueue"
"nice"
"rtprio"
];
};
value = mkOption {
description = "Value of this limit";
type = oneOf [ str int ];
};
};
}));
motd = pkgs.writeText "motd" config.users.motd;
makePAMService = name: service:
@ -669,6 +719,7 @@ in
security.pam.loginLimits = mkOption {
default = [];
type = limitsType;
example =
[ { domain = "ftp";
type = "hard";
@ -688,7 +739,8 @@ in
<varname>domain</varname>, <varname>type</varname>,
<varname>item</varname>, and <varname>value</varname>
attribute. The syntax and semantics of these attributes
must be that described in the limits.conf(5) man page.
must be that described in <citerefentry><refentrytitle>limits.conf</refentrytitle>
<manvolnum>5</manvolnum></citerefentry>.
Note that these limits do not apply to systemd services,
whose limits can be changed via <option>systemd.extraConfig</option>

View File

@ -308,6 +308,9 @@ in
inherit user;
group = webserver.group;
# Not yet compatible with php 8 https://www.dokuwiki.org/requirements
# https://github.com/splitbrain/dokuwiki/issues/3545
phpPackage = pkgs.php74;
phpEnv = {
DOKUWIKI_LOCAL_CONFIG = "${dokuwikiLocalConfig hostName cfg}";
DOKUWIKI_PLUGINS_LOCAL_CONFIG = "${dokuwikiPluginsLocalConfig hostName cfg}";
@ -446,5 +449,6 @@ in
meta.maintainers = with maintainers; [
_1000101
onny
dandellion
];
}

View File

@ -823,6 +823,16 @@ let
(assertValueOneOf "OnLink" boolValues)
];
sectionDHCPServerStaticLease = checkUnitConfig "DHCPServerStaticLease" [
(assertOnlyFields [
"MACAddress"
"Address"
])
(assertHasField "MACAddress")
(assertHasField "Address")
(assertMacAddress "MACAddress")
];
};
};
@ -1163,6 +1173,25 @@ let
};
};
dhcpServerStaticLeaseOptions = {
options = {
dhcpServerStaticLeaseConfig = mkOption {
default = {};
example = { MACAddress = "65:43:4a:5b:d8:5f"; Address = "192.168.1.42"; };
type = types.addCheck (types.attrsOf unitOption) check.network.sectionDHCPServerStaticLease;
description = ''
Each attribute in this set specifies an option in the
<literal>[DHCPServerStaticLease]</literal> section of the unit. See
<citerefentry><refentrytitle>systemd.network</refentrytitle>
<manvolnum>5</manvolnum></citerefentry> for details.
Make sure to configure the corresponding client interface to use
<literal>ClientIdentifier=mac</literal>.
'';
};
};
};
networkOptions = commonNetworkOptions // {
linkConfig = mkOption {
@ -1275,6 +1304,17 @@ let
'';
};
dhcpServerStaticLeases = mkOption {
default = [];
example = [ { MACAddress = "65:43:4a:5b:d8:5f"; Address = "192.168.1.42"; } ];
type = with types; listOf (submodule dhcpServerStaticLeaseOptions);
description = ''
A list of DHCPServerStaticLease sections to be added to the unit. See
<citerefentry><refentrytitle>systemd.network</refentrytitle>
<manvolnum>5</manvolnum></citerefentry> for details.
'';
};
ipv6Prefixes = mkOption {
default = [];
example = [ { AddressAutoconfiguration = true; OnLink = true; } ];
@ -1646,6 +1686,10 @@ let
[IPv6Prefix]
${attrsToSection x.ipv6PrefixConfig}
'')
+ flip concatMapStrings def.dhcpServerStaticLeases (x: ''
[DHCPServerStaticLease]
${attrsToSection x.dhcpServerStaticLeaseConfig}
'')
+ def.extraConfig;
};

View File

@ -39,8 +39,8 @@ let
in
{
imports = [
./podman-dnsname.nix
./podman-network-socket.nix
./dnsname.nix
./network-socket.nix
(lib.mkRenamedOptionModule [ "virtualisation" "podman" "libpod" ] [ "virtualisation" "containers" "containersConf" ])
];

View File

@ -9,6 +9,10 @@ let
in
{
imports = [
./network-socket-ghostunnel.nix
];
options.virtualisation.podman.networkSocket = {
enable = mkOption {
type = types.bool;

View File

@ -369,9 +369,9 @@ in
plikd = handleTest ./plikd.nix {};
plotinus = handleTest ./plotinus.nix {};
podgrab = handleTest ./podgrab.nix {};
podman = handleTestOn ["x86_64-linux"] ./podman.nix {};
podman-dnsname = handleTestOn ["x86_64-linux"] ./podman-dnsname.nix {};
podman-tls-ghostunnel = handleTestOn ["x86_64-linux"] ./podman-tls-ghostunnel.nix {};
podman = handleTestOn ["x86_64-linux"] ./podman/default.nix {};
podman-dnsname = handleTestOn ["x86_64-linux"] ./podman/dnsname.nix {};
podman-tls-ghostunnel = handleTestOn ["x86_64-linux"] ./podman/tls-ghostunnel.nix {};
pomerium = handleTestOn ["x86_64-linux"] ./pomerium.nix {};
postfix = handleTest ./postfix.nix {};
postfix-raise-smtpd-tls-security-level = handleTest ./postfix-raise-smtpd-tls-security-level.nix {};
@ -454,6 +454,7 @@ in
systemd-journal = handleTest ./systemd-journal.nix {};
systemd-networkd = handleTest ./systemd-networkd.nix {};
systemd-networkd-dhcpserver = handleTest ./systemd-networkd-dhcpserver.nix {};
systemd-networkd-dhcpserver-static-leases = handleTest ./systemd-networkd-dhcpserver-static-leases.nix {};
systemd-networkd-ipv6-prefix-delegation = handleTest ./systemd-networkd-ipv6-prefix-delegation.nix {};
systemd-networkd-vrf = handleTest ./systemd-networkd-vrf.nix {};
systemd-nspawn = handleTest ./systemd-nspawn.nix {};

View File

@ -53,12 +53,12 @@ let
};
# /etc/nixos/configuration.nix for the vm
configFile = pkgs.writeText "configuration.nix" ''
{config, pkgs, ...}: ({
{config, pkgs, lib, ...}: ({
imports =
[ ./hardware-configuration.nix
<nixpkgs/nixos/modules/testing/test-instrumentation.nix>
];
} // pkgs.lib.importJSON ${
} // lib.importJSON ${
pkgs.writeText "simpleConfig.json" (builtins.toJSON simpleConfig)
})
'';
@ -114,7 +114,7 @@ in {
"${configFile}",
"/etc/nixos/configuration.nix",
)
machine.succeed("nixos-rebuild boot >&2")
machine.succeed("nixos-rebuild boot --show-trace >&2")
machine.succeed("egrep 'menuentry.*debian' /boot/grub/grub.cfg")
'';

View File

@ -1,6 +1,6 @@
# This test runs podman and checks if simple container starts
import ./make-test-python.nix (
import ../make-test-python.nix (
{ pkgs, lib, ... }: {
name = "podman";
meta = {
@ -48,7 +48,7 @@ import ./make-test-python.nix (
start_all()
with subtest("Run container as root with runc"):
podman.succeed("tar cvf scratchimg.tar --files-from /dev/null && podman import scratchimg.tar scratchimg")
podman.succeed("tar cv --files-from /dev/null | podman import - scratchimg")
podman.succeed(
"podman run --runtime=runc -d --name=sleeping -v /nix/store:/nix/store -v /run/current-system/sw/bin:/bin scratchimg /bin/sleep 10"
)
@ -57,7 +57,7 @@ import ./make-test-python.nix (
podman.succeed("podman rm sleeping")
with subtest("Run container as root with crun"):
podman.succeed("tar cvf scratchimg.tar --files-from /dev/null && podman import scratchimg.tar scratchimg")
podman.succeed("tar cv --files-from /dev/null | podman import - scratchimg")
podman.succeed(
"podman run --runtime=crun -d --name=sleeping -v /nix/store:/nix/store -v /run/current-system/sw/bin:/bin scratchimg /bin/sleep 10"
)
@ -66,7 +66,7 @@ import ./make-test-python.nix (
podman.succeed("podman rm sleeping")
with subtest("Run container as root with the default backend"):
podman.succeed("tar cvf scratchimg.tar --files-from /dev/null && podman import scratchimg.tar scratchimg")
podman.succeed("tar cv --files-from /dev/null | podman import - scratchimg")
podman.succeed(
"podman run -d --name=sleeping -v /nix/store:/nix/store -v /run/current-system/sw/bin:/bin scratchimg /bin/sleep 10"
)
@ -78,7 +78,7 @@ import ./make-test-python.nix (
podman.succeed("loginctl enable-linger alice")
with subtest("Run container rootless with runc"):
podman.succeed(su_cmd("tar cvf scratchimg.tar --files-from /dev/null && podman import scratchimg.tar scratchimg"))
podman.succeed(su_cmd("tar cv --files-from /dev/null | podman import - scratchimg"))
podman.succeed(
su_cmd(
"podman run --runtime=runc -d --name=sleeping -v /nix/store:/nix/store -v /run/current-system/sw/bin:/bin scratchimg /bin/sleep 10"
@ -89,7 +89,7 @@ import ./make-test-python.nix (
podman.succeed(su_cmd("podman rm sleeping"))
with subtest("Run container rootless with crun"):
podman.succeed(su_cmd("tar cvf scratchimg.tar --files-from /dev/null && podman import scratchimg.tar scratchimg"))
podman.succeed(su_cmd("tar cv --files-from /dev/null | podman import - scratchimg"))
podman.succeed(
su_cmd(
"podman run --runtime=crun -d --name=sleeping -v /nix/store:/nix/store -v /run/current-system/sw/bin:/bin scratchimg /bin/sleep 10"
@ -100,7 +100,7 @@ import ./make-test-python.nix (
podman.succeed(su_cmd("podman rm sleeping"))
with subtest("Run container rootless with the default backend"):
podman.succeed(su_cmd("tar cvf scratchimg.tar --files-from /dev/null && podman import scratchimg.tar scratchimg"))
podman.succeed(su_cmd("tar cv --files-from /dev/null | podman import - scratchimg"))
podman.succeed(
su_cmd(
"podman run -d --name=sleeping -v /nix/store:/nix/store -v /run/current-system/sw/bin:/bin scratchimg /bin/sleep 10"
@ -112,7 +112,7 @@ import ./make-test-python.nix (
with subtest("Run container with init"):
podman.succeed(
"tar cvf busybox.tar -C ${pkgs.pkgsStatic.busybox} . && podman import busybox.tar busybox"
"tar cv -C ${pkgs.pkgsStatic.busybox} . | podman import - busybox"
)
pid = podman.succeed("podman run --rm busybox readlink /proc/self").strip()
assert pid == "1"
@ -124,7 +124,7 @@ import ./make-test-python.nix (
with subtest("Run container via docker cli"):
podman.succeed("docker network create default")
podman.succeed("tar cvf scratchimg.tar --files-from /dev/null && podman import scratchimg.tar scratchimg")
podman.succeed("tar cv --files-from /dev/null | podman import - scratchimg")
podman.succeed(
"docker run -d --name=sleeping -v /nix/store:/nix/store -v /run/current-system/sw/bin:/bin scratchimg /bin/sleep 10"
)

View File

@ -1,4 +1,4 @@
import ./make-test-python.nix (
import ../make-test-python.nix (
{ pkgs, lib, ... }:
let
inherit (pkgs) writeTextDir python3 curl;
@ -21,7 +21,7 @@ import ./make-test-python.nix (
podman.wait_for_unit("sockets.target")
with subtest("DNS works"): # also tests inter-container tcp routing
podman.succeed("tar cvf scratchimg.tar --files-from /dev/null && podman import scratchimg.tar scratchimg")
podman.succeed("tar cv --files-from /dev/null | podman import - scratchimg")
podman.succeed(
"podman run -d --name=webserver -v /nix/store:/nix/store -v /run/current-system/sw/bin:/bin -w ${webroot} scratchimg ${python3}/bin/python -m http.server 8000"
)

View File

@ -1,7 +1,7 @@
/*
This test runs podman as a backend for the Docker CLI.
*/
import ./make-test-python.nix (
import ../make-test-python.nix (
{ pkgs, lib, ... }:
let gen-ca = pkgs.writeScript "gen-ca" ''
@ -126,7 +126,7 @@ import ./make-test-python.nix (
client.succeed("docker version")
# via socket would be nicer
podman.succeed("tar cvf scratchimg.tar --files-from /dev/null && podman import scratchimg.tar scratchimg")
podman.succeed("tar cv --files-from /dev/null | podman import - scratchimg")
client.succeed(
"docker run -d --name=sleeping -v /nix/store:/nix/store -v /run/current-system/sw/bin:/bin scratchimg /bin/sleep 10"

View File

@ -0,0 +1,81 @@
# In contrast to systemd-networkd-dhcpserver, this test configures
# the router with a static DHCP lease for the client's MAC address.
import ./make-test-python.nix ({ lib, ... }: {
name = "systemd-networkd-dhcpserver-static-leases";
meta = with lib.maintainers; {
maintainers = [ veehaitch tomfitzhenry ];
};
nodes = {
router = {
virtualisation.vlans = [ 1 ];
systemd.services.systemd-networkd.environment.SYSTEMD_LOG_LEVEL = "debug";
networking = {
useNetworkd = true;
useDHCP = false;
firewall.enable = false;
};
systemd.network = {
networks = {
# systemd-networkd will load the first network unit file
# that matches, ordered lexiographically by filename.
# /etc/systemd/network/{40-eth1,99-main}.network already
# exists. This network unit must be loaded for the test,
# however, hence why this network is named such.
"01-eth1" = {
name = "eth1";
networkConfig = {
DHCPServer = true;
Address = "10.0.0.1/24";
};
dhcpServerStaticLeases = [{
dhcpServerStaticLeaseConfig = {
MACAddress = "02:de:ad:be:ef:01";
Address = "10.0.0.10";
};
}];
};
};
};
};
client = {
virtualisation.vlans = [ 1 ];
systemd.services.systemd-networkd.environment.SYSTEMD_LOG_LEVEL = "debug";
networking = {
useNetworkd = true;
useDHCP = false;
firewall.enable = false;
interfaces.eth1 = {
useDHCP = true;
macAddress = "02:de:ad:be:ef:01";
};
};
# This setting is important to have the router assign the
# configured lease based on the client's MAC address. Also see:
# https://github.com/systemd/systemd/issues/21368#issuecomment-982193546
systemd.network.networks."40-eth1".dhcpV4Config.ClientIdentifier = "mac";
};
};
testScript = ''
start_all()
with subtest("check router network configuration"):
router.wait_for_unit("systemd-networkd-wait-online.service")
eth1_status = router.succeed("networkctl status eth1")
assert "Network File: /etc/systemd/network/01-eth1.network" in eth1_status, \
"The router interface eth1 is not using the expected network file"
assert "10.0.0.1" in eth1_status, "Did not find expected router IPv4"
with subtest("check client network configuration"):
client.wait_for_unit("systemd-networkd-wait-online.service")
eth1_status = client.succeed("networkctl status eth1")
assert "Network File: /etc/systemd/network/40-eth1.network" in eth1_status, \
"The client interface eth1 is not using the expected network file"
assert "10.0.0.10" in eth1_status, "Did not find expected client IPv4"
with subtest("router and client can reach each other"):
client.wait_until_succeeds("ping -c 5 10.0.0.1")
router.wait_until_succeeds("ping -c 5 10.0.0.10")
'';
})

View File

@ -6,11 +6,11 @@
stdenv.mkDerivation rec {
pname = "bitwig-studio";
version = "4.1";
version = "4.1.1";
src = fetchurl {
url = "https://downloads.bitwig.com/stable/${version}/${pname}-${version}.deb";
sha256 = "sha256-h6TNlfKgN7CPhtY8DxESrydtEsdVPT+Uf+VKcqKVuXw=";
sha256 = "sha256-bhd3Ij4y1r5pHrpQkbHuMTNl8Z3w0HsbCkr1C0CVFvQ=";
};
nativeBuildInputs = [ dpkg makeWrapper wrapGAppsHook ];

View File

@ -21,20 +21,20 @@
stdenv.mkDerivation rec {
pname = "gnome-podcasts";
version = "0.4.9";
version = "0.5.0";
src = fetchFromGitLab {
domain = "gitlab.gnome.org";
owner = "World";
repo = "podcasts";
rev = version;
sha256 = "1ah59ac3xm3sqai8zhil8ar30pviw83cm8in1n4id77rv24xkvgm";
hash = "sha256-Jk++/QrQt/fjOz2OaEIr1Imq2DmqTjcormCebjO4/Kk=";
};
cargoDeps = rustPlatform.fetchCargoTarball {
inherit src;
name = "${pname}-${version}";
sha256 = "1iihpfvkli09ysn46cnif53xizkwzk0m91bljmlzsygp3ip5i5yw";
hash = "sha256-jlXpeVabc1h2GU1j9Ff6GZJec+JgFyOdJzsOtdkrEWI=";
};
nativeBuildInputs = [

View File

@ -1,37 +0,0 @@
{ lib, stdenv, fetchurl, makeWrapper, pkg-config, MMA, libjack2, libsmf, python2Packages }:
let
inherit (python2Packages) pyGtkGlade pygtksourceview python;
in stdenv.mkDerivation rec {
version = "12.02.1";
pname = "linuxband";
src = fetchurl {
url = "https://linuxband.org/assets/sources/${pname}-${version}.tar.gz";
sha256 = "1r71h4yg775m4gax4irrvygmrsclgn503ykmc2qwjsxa42ri4n2n";
};
nativeBuildInputs = [ pkg-config makeWrapper ];
buildInputs = [ MMA libjack2 libsmf python pyGtkGlade pygtksourceview ];
patchPhase = ''
sed -i 's@/usr/@${MMA}/@g' src/main/config/linuxband.rc.in
cat src/main/config/linuxband.rc.in
'';
postFixup = ''
PYTHONPATH=$pyGtkGlade/share/:pygtksourceview/share/:$PYTHONPATH
for f in $out/bin/*; do
wrapProgram $f \
--prefix PYTHONPATH : $PYTHONPATH
done
'';
meta = {
description = "A GUI front-end for MMA: Type in the chords, choose the groove and it will play an accompaniment";
homepage = "https://linuxband.org/";
license = lib.licenses.gpl2;
maintainers = [ lib.maintainers.magnetophon ];
platforms = lib.platforms.linux;
};
}

View File

@ -11,13 +11,13 @@
stdenv.mkDerivation rec {
pname = "mpc";
version = "0.33";
version = "0.34";
src = fetchFromGitHub {
owner = "MusicPlayerDaemon";
repo = "mpc";
rev = "v${version}";
sha256 = "1qbi0i9cq54rj8z2kapk8x8g1jkw2jz781niwb9i7kw4xfhvy5zx";
sha256 = "sha256-2FjYBfak0IjibuU+CNQ0y9Ei8hTZhynS/BK2DNerhVw=";
};
buildInputs = [ libmpdclient ] ++ lib.optionals stdenv.isDarwin [ libiconv ];

View File

@ -18,13 +18,13 @@ assert pcreSupport -> pcre != null;
stdenv.mkDerivation rec {
pname = "ncmpc";
version = "0.45";
version = "0.46";
src = fetchFromGitHub {
owner = "MusicPlayerDaemon";
repo = "ncmpc";
rev = "v${version}";
sha256 = "sha256-KDSHbEZ2PJLEIlXqPvBQ2ZPWno+IoajTjkl9faAXIko=";
sha256 = "sha256-FyuN0jkHaJLXqcVbW+OggHkNBjmqH7bS7W/QXUoDjJk=";
};
buildInputs = [ glib ncurses libmpdclient boost ]

View File

@ -8,7 +8,7 @@ stdenv.mkDerivation rec {
version = "27.2";
emacsName = "emacs-${version}";
macportVersion = "8.2";
macportVersion = "8.3";
name = "emacs-mac-${version}-${macportVersion}";
src = fetchurl {
@ -18,7 +18,8 @@ stdenv.mkDerivation rec {
macportSrc = fetchurl {
url = "ftp://ftp.math.s.chiba-u.ac.jp/emacs/${emacsName}-mac-${macportVersion}.tar.gz";
sha256 = "1bgm2g3ky7rkj1l27wnmyzqsqxzjng7y9bf72ym37wiyhyi2a9za";
sha256 = "0q4lbk3nb8rz1ibmf23plgsh8sx2wvhry5bf5mivgz4m4b6s2yij";
name = "${emacsName}-mac-${macportVersion}.tar.xz"; # It's actually compressed with xz, not gz
};
hiresSrc = fetchurl {
@ -37,11 +38,11 @@ stdenv.mkDerivation rec {
postUnpack = ''
mv $sourceRoot $name
tar xzf $macportSrc -C $name --strip-components=1
tar xf $macportSrc -C $name --strip-components=1
mv $name $sourceRoot
# extract retina image resources
tar xzfv $hiresSrc --strip 1 -C $sourceRoot
tar xfv $hiresSrc --strip 1 -C $sourceRoot
'';
postPatch = ''

View File

@ -118,7 +118,7 @@ let
packed="resources/app/node_modules.asar"
unpacked="resources/app/node_modules"
${nodePackages.asar}/bin/asar extract "$packed" "$unpacked"
substituteInPlace $unpacked/sudo-prompt/index.js \
substituteInPlace $unpacked/@vscode/sudo-prompt/index.js \
--replace "/usr/bin/pkexec" "/run/wrappers/bin/pkexec" \
--replace "/bin/bash" "${bash}/bin/bash"
rm -rf "$packed"

View File

@ -14,17 +14,17 @@ let
archive_fmt = if stdenv.isDarwin then "zip" else "tar.gz";
sha256 = {
x86_64-linux = "0wf8bmzag49n81kjb46kj2nkksimm8f7cf4ihpqcw8k5iwasn3j9";
x86_64-darwin = "1s7i5087bvckg66mcb32krv12vxhaw7ii9vm3i6p72wr0sv7dddh";
aarch64-linux = "0yzh5javinvas3zz0lliyc77vbcs1jrmxbkr7nic4snscg6wjhcd";
aarch64-darwin = "13l6ymz7v18s7ikxbwvkwb0f5ff2j82j5pfj04yy75kq9b5gh0vx";
armv7l-linux = "129wffj9cidk9ysjpq3p0ddn6liwkmrkxhxgz7bqzj8sdhwyq8pz";
x86_64-linux = "1w28rmb9fi45s85rrlzzh6r826dnyisd6lh3j8ir4hx6d34cawsf";
x86_64-darwin = "1fyg3ygqk0z3jcj5bskgprlq8k9j134y75xq06z4xbv1dhgwhswj";
aarch64-linux = "0hha9ksbj51zmq0p3d1fwni4jd0yp0wab0w19carmbhnydhrgh22";
aarch64-darwin = "1cmrh621z7ddl4qh95hm0nwzazshl71a43c6113jf4w6b1kvy5m5";
armv7l-linux = "1kipvqc5hrpgsfw7x2ab5jydf7zksdd3q8qr2mg20kjsdi4skwy4";
}.${system};
in
callPackage ./generic.nix rec {
# Please backport all compatible updates to the stable release.
# This is important for the extension ecosystem.
version = "1.62.3";
version = "1.63.0";
pname = "vscode";
executableName = "code" + lib.optionalString isInsiders "-insiders";

View File

@ -13,10 +13,10 @@ let
archive_fmt = if system == "x86_64-darwin" then "zip" else "tar.gz";
sha256 = {
x86_64-linux = "0g1c88i0nkg4hys00vhqp0i2n3kjl395fd2rimi2p49y042b5c9g";
x86_64-darwin = "1521aqrv9zx2r5cy8h2011iz3v5lvayizlgv8j7j8qi272mmvx5k";
aarch64-linux = "1kk0jrhqx6q325zmfg553pqmk6v9cx3a99bsh9rzvdlca94nmpj0";
armv7l-linux = "08hy61a9pp18b1x7lnsc7b9y3bvnjmavazz7qkhp5qxl2gs802wm";
x86_64-linux = "17kck7pkklhifm6hpsd93wmnyk06vi9sa55gp62m3diymp1b129z";
x86_64-darwin = "1japc6yyvw07rll53pf2jfg89m2g9jqj5daghg10v1gqk98j7r3x";
aarch64-linux = "0zg05q0hyldnw5g8b9zdf0ls4s07fixib7v830wa5dyi2sjcv149";
armv7l-linux = "0mky66cyxhx3cfm35sa4vlwh8m1878rc80jml9mqxdhlrpnxgdiy";
}.${system};
sourceRoot = {
@ -31,7 +31,7 @@ in
# Please backport all compatible updates to the stable release.
# This is important for the extension ecosystem.
version = "1.62.3";
version = "1.63.0";
pname = "vscodium";
executableName = "codium";

View File

@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "your-editor";
version = "1206";
version = "1303";
src = fetchFromGitHub {
owner = "kammerdienerb";
owner = "your-editor";
repo = "yed";
rev = "6cdd99fe1359899b26d8967bd376fd5caa5451eb";
sha256 = "0XECSolW/xPXd1v3sv9HbJMWuHGnwCOwmHoPNCUsE+w=";
rev = version;
sha256 = "BWy/icQs8hVtNeM/mCi6LOah1UG0elU/DgCmfaIPD64=";
};
installPhase = ''
@ -21,8 +21,9 @@ stdenv.mkDerivation rec {
meta = with lib; {
description = "Your-editor (yed) is a small and simple terminal editor core that is meant to be extended through a powerful plugin architecture";
homepage = "https://your-editor.org/";
changelog = "https://github.com/your-editor/yed/blob/${version}/CHANGELOG.md";
license = with licenses; [ mit ];
platforms = platforms.linux;
platforms = platforms.unix;
maintainers = with maintainers; [ uniquepointer ];
mainProgram = "yed";
};

View File

@ -2,16 +2,16 @@
buildGoModule rec {
pname = "hugo";
version = "0.89.4";
version = "0.90.0";
src = fetchFromGitHub {
owner = "gohugoio";
repo = pname;
rev = "v${version}";
sha256 = "sha256-yXOe+SCMvr3xi0kd2AuWm1CzzBuODCED6p7kaWGXvpM=";
sha256 = "sha256-1qa7RHSkwQLMJr0l3JtdcHQsmSiKlRjF5ETSVhpo4jY=";
};
vendorSha256 = "sha256-NqWi9n8H5IeMmkBwTX3HN1RLLtWA5sM1iy1L2BZCH7M=";
vendorSha256 = "sha256-hRebd50RQ0JZGDf5zJX21UTjq5JwvPWWF/KA6/7JxVw=";
doCheck = false;

View File

@ -2,16 +2,16 @@
buildGoModule rec {
pname = "driftctl";
version = "0.15.0";
version = "0.17";
src = fetchFromGitHub {
owner = "cloudskiff";
repo = "driftctl";
rev = "v${version}";
sha256 = "sha256-rWC4jqquVWJmHV/dnH+DsxlNiAY01xnq9z0/owS4Yis=";
sha256 = "sha256-JloeRoW+1tepSJzhcOQu38TDQfY10NtG2EyeVhP26BQ=";
};
vendorSha256 = "sha256-d8vASP8KnUeUkaHRU8kCE7FCt2QLGu5ET5BN3GM2O9c=";
vendorSha256 = "sha256-aaJ5fpS+BiVq1K8OxN+/CBD96wy3flGDhch8O2ACIh8=";
postUnpack = ''
# Without this, tests fail to locate aws/3.19.0.json

View File

@ -2,13 +2,13 @@
buildGoModule rec {
pname = "kube3d";
version = "5.2.0";
version = "5.2.1";
src = fetchFromGitHub {
owner = "rancher";
repo = "k3d";
rev = "v${version}";
sha256 = "sha256-xtYoyA5tcCjNbDysZn5yFQtMKLIu6DOHKH5vDMDCrZQ=";
sha256 = "sha256-rKiOPpRupoCRtGJ3DVBUY9483EEBxaaECZRdWiyxaEk=";
};
vendorSha256 = null;

View File

@ -27,6 +27,8 @@ let
inherit sha256;
};
ldflags = [ "-s" "-w" ];
postConfigure = ''
# speakeasy hardcodes /bin/stty https://github.com/bgentry/speakeasy/issues/22
substituteInPlace vendor/github.com/bgentry/speakeasy/speakeasy_unix.go \

View File

@ -2,7 +2,7 @@
"name": "element-desktop",
"productName": "Element",
"main": "lib/electron-main.js",
"version": "1.9.5",
"version": "1.9.6",
"description": "A feature-rich client for Matrix.org",
"author": "Element",
"repository": {
@ -54,7 +54,7 @@
"@types/minimist": "^1.2.1",
"@typescript-eslint/eslint-plugin": "^4.17.0",
"@typescript-eslint/parser": "^4.17.0",
"allchange": "^1.0.5",
"allchange": "^1.0.6",
"asar": "^2.0.1",
"chokidar": "^3.5.2",
"electron": "13.5",

View File

@ -1,6 +1,6 @@
{
"version": "1.9.5",
"desktopSrcHash": "8x3TBu0zSNEVWp+ULydule8bPSd01pMkCZHdJbQf82U=",
"desktopYarnHash": "0axz0d5qryd0k89lrziah1r6j1154c1cibf1qsjk1azlri3k4298",
"webHash": "04pabvvb3l88gp866fkbjngl9r20s300pvw7qykynl0ps8fjms0l"
"version": "1.9.6",
"desktopSrcHash": "AJLKp9VbNF0XvcQe6t0/pw1hiVCgRiRb27KJooQ2NlQ=",
"desktopYarnHash": "1xa8vrqj3g3hfhzrk8m7yr57my9ipyyhw8vsx4m86v8i1iqrpmnm",
"webHash": "161w6i122i81jyb23mpxlf7k5wx2v4c6ai2liywn89q74hj3axr5"
}

View File

@ -10,12 +10,12 @@ in
rec {
thunderbird = common rec {
pname = "thunderbird";
version = "91.3.2";
version = "91.4.0";
application = "comm/mail";
binaryName = pname;
src = fetchurl {
url = "mirror://mozilla/thunderbird/releases/${version}/source/thunderbird-${version}.source.tar.xz";
sha512 = "954be27795935e494d27d57da99b49ff61db8a2b26fa8e159a30d6c272033b015790735b40129d7de94f861af23cf748f88a7a45df3861f753d6e15d28fb366c";
sha512 = "f19eba17b8018d11358258f6c9fbe4b2d20858f5afdf82ad5a81de5f6191f833ecf01ee4631297b0880dfa8b76baa1f9cd09a976cab2d2206ca5a902283fa102";
};
patches = [
# The file to be patched is different from firefox's `no-buildconfig-ffx90.patch`.

View File

@ -25,13 +25,13 @@
stdenv.mkDerivation rec {
pname = "torrential";
version = "2.0.0";
version = "2.0.1";
src = fetchFromGitHub {
owner = "davidmhewitt";
repo = "torrential";
rev = version;
sha256 = "sha256-78eNIz7Lgeq4LTog04TMNuL27Gv0UZ0poBaw8ia1R/g=";
sha256 = "sha256-W9Is6l8y5XSlPER2BLlf+cyMPPdEQuaP4xM59VhfDE0=";
};
nativeBuildInputs = [

View File

@ -46,6 +46,7 @@ let
"8.13.2".sha256 = "1884vbmwmqwn9ngibax6dhnqh4cc02l0s2ajc6jb1xgr0i60whjk";
"8.14.0".sha256 = "04y2z0qyvag66zanfyc3f9agvmzbn4lsr0p1l7ck6yjhqx7vbm17";
"8.14.1".sha256 = "0sx78pgx0qw8v7v2r32zzy3l161zipzq95iacda628girim7psnl";
"8.15+rc1".sha256 = "sha256:0v9vnx5z2mbsmhdx08rpg0n8jn0d82mimpghn55vkwsscxmcrgnm";
};
releaseRev = v: "V${v}";
fetched = import ../../../../build-support/coq/meta-fetch/default.nix

View File

@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "proverif";
version = "2.03";
version = "2.04";
src = fetchurl {
url = "https://bblanche.gitlabpages.inria.fr/proverif/proverif${version}.tar.gz";
sha256 = "sha256:1q5mp9il09jylimcaqczb3kh34gb5px88js127gxv0jj5b4bqfc7";
sha256 = "sha256:0xgwnp59779xc40sb7ck8rmfn620pilxyq79l3bymj9m7z0mwvm9";
};
buildInputs = with ocamlPackages; [ ocaml findlib ];

View File

@ -72,7 +72,7 @@ buildGoModule {
meta = with lib; {
homepage = "https://gitlab.com/gitlab-org/gitaly";
description = "A Git RPC service for handling all the git calls made by GitLab";
platforms = platforms.linux;
platforms = platforms.linux ++ [ "x86_64-darwin" ];
maintainers = with maintainers; [ roblabla globin fpletz talyz ];
license = licenses.mit;
};

View File

@ -4,13 +4,13 @@
stdenv.mkDerivation rec {
pname = "obs-nvfbc";
version = "0.0.3";
version = "0.0.4";
src = fetchFromGitLab {
owner = "fzwoch";
repo = "obs-nvfbc";
rev = "v${version}";
sha256 = "0zyvks6gc6fr0a1j5b4y20rcx6ah35v6yiz05f6g3x6bhqi92l33";
sha256 = "sha256-U/zma1BrOTRAJAYMOcmaeL0UqF3ihysDwceyeW1r0b8=";
};
nativeBuildInputs = [ meson pkg-config ninja ];

View File

@ -17,13 +17,13 @@
buildGoModule rec {
pname = "podman";
version = "3.4.3";
version = "3.4.4";
src = fetchFromGitHub {
owner = "containers";
repo = "podman";
rev = "v${version}";
sha256 = "sha256-SZHonZdUTJisFMjvUBst1HErvKWEcYZYhK++G+S4sEg=";
sha256 = "sha256-5Y0+xfoMCe3a6kX+OhmxURZXZLAnrS1t8TFyHqjGCeA=";
};
vendorSha256 = null;

View File

@ -1,7 +1,7 @@
{ lib, fetchzip }:
let
version = "6";
version = "6.2";
in fetchzip {
name = "fira-code-${version}";
@ -13,7 +13,7 @@ in fetchzip {
unzip -j $downloadedFile '*-VF.ttf' -d $out/share/fonts/truetype
'';
sha256 = "h2Q63rT26SxXeZ76CRCcFg+NfDAc0IgYaYD2ok09Jh4=";
sha256 = "0l02ivxz3jbk0rhgaq83cqarqxr07xgp7n27l0fh8fbgxwi52djl";
meta = with lib; {
homepage = "https://github.com/tonsky/FiraCode";

View File

@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "numix-icon-theme-square";
version = "21.04.14";
version = "21.11.29";
src = fetchFromGitHub {
owner = "numixproject";
repo = pname;
rev = version;
sha256 = "0ndxjp173dwz78m41mn818mh4bdsxa2ypv4wrwicx0v4d8z90ddj";
sha256 = "sha256-3zZ/LpjYhYOHPpgRysGYXFLvYux5GgurItuYm7zAZ2M=";
};
nativeBuildInputs = [ gtk3 ];

View File

@ -5,7 +5,7 @@ with lib; mkCoqDerivation {
owner = "uwplse";
inherit version;
defaultVersion = with versions; switch coq.coq-version [
{ case = range "8.6" "8.14"; out = "20210328"; }
{ case = range "8.6" "8.15"; out = "20210328"; }
{ case = range "8.5" "8.13"; out = "20181102"; }
] null;
release."20210328".rev = "179bd5312e9d8b63fc3f4071c628cddfc496d741";

View File

@ -8,6 +8,7 @@ with lib; mkCoqDerivation {
defaultVersion = if versions.isGe "8.5" coq.coq-version
then "${coq.coq-version}.0" else null;
release."8.15.0".sha256 = "093klwlhclgyrba1iv18dyz1qp5f0lwiaa7y0qwvgmai8rll5fns";
release."8.14.0".sha256 = "0jsgdvj0ddhkls32krprp34r64y1rb5mwxl34fgaxk2k4664yq06";
release."8.13.0".sha256 = "1n66i7hd9222b2ks606mak7m4f0dgy02xgygjskmmav6h7g2sx7y";
release."8.12.0".sha256 = "14ijb3qy2hin3g4djx437jmnswxxq7lkfh3dwh9qvrds9a015yg8";

View File

@ -10,7 +10,7 @@ with lib;
inherit version;
defaultVersion = with versions; switch [ coq.version mathcomp.version ] [
{ cases = [ (isGe "8.10") (isGe "1.12.0") ]; out = "1.1.0"; }
{ cases = [ (range "8.10" "8.14") (isGe "1.12.0") ]; out = "1.1.0"; }
{ cases = [ (isGe "8.10") (range "1.11.0" "1.12.0") ]; out = "1.0.5"; }
{ cases = [ (isGe "8.7") "1.11.0" ]; out = "1.0.4"; }
{ cases = [ (isGe "8.7") "1.10.0" ]; out = "1.0.3"; }

View File

@ -6,7 +6,7 @@ with lib; mkCoqDerivation {
owner = "gappa";
domain = "gitlab.inria.fr";
inherit version;
defaultVersion = if versions.isGe "8.8" coq.coq-version then "1.5.0" else null;
defaultVersion = if versions.range "8.8" "8.14" coq.coq-version then "1.5.0" else null;
release."1.5.0".sha256 = "1i1c0gakffxqqqqw064cbvc243yl325hxd50jmczr6mk18igk41n";
release."1.4.5".sha256 = "081hib1d9wfm29kis390qsqch8v6fs3q71g2rgbbzx5y5cf48n9k";
release."1.4.4".sha256 = "114q2hgw64j6kqa9mg3qcp1nlf0ia46z2xadq81fnkxqm856ml7l";

View File

@ -12,7 +12,7 @@ mkCoqDerivation {
inherit version;
defaultVersion = with versions; switch coq.coq-version [
{ case = isGe "8.13"; out = "0.9"; }
{ case = range "8.13" "8.14"; out = "0.9"; }
] null;
propagatedBuildInputs = [ mathcomp-algebra mathcomp-finmap hierarchy-builder ];

View File

@ -6,7 +6,7 @@ mkCoqDerivation rec {
domain = "gitlab.inria.fr";
inherit version;
defaultVersion = with lib.versions; lib.switch coq.coq-version [
{ case = isGe "8.8" ; out = "4.3.0"; }
{ case = range "8.8" "8.14"; out = "4.3.0"; }
{ case = range "8.8" "8.12"; out = "4.0.0"; }
{ case = range "8.7" "8.11"; out = "3.4.2"; }
{ case = range "8.5" "8.6"; out = "3.3.0"; }

View File

@ -6,7 +6,7 @@ with lib; mkCoqDerivation rec {
owner = "iris";
inherit version;
defaultVersion = with versions; switch coq.coq-version [
{ case = isGe "8.14"; out = "3.5.0"; }
{ case = isEq "8.14"; out = "3.5.0"; }
{ case = range "8.11" "8.13"; out = "3.4.0"; }
{ case = range "8.9" "8.10"; out = "3.3.0"; }
] null;

View File

@ -6,7 +6,7 @@ with lib; mkCoqDerivation rec {
domain = "gitlab.mpi-sws.org";
owner = "iris";
defaultVersion = with versions; switch coq.coq-version [
{ case = isGe "8.14"; out = "1.6.0"; }
{ case = isEq "8.14"; out = "1.6.0"; }
{ case = range "8.11" "8.13"; out = "1.5.0"; }
{ case = range "8.8" "8.10"; out = "1.4.0"; }
] null;

View File

@ -10,13 +10,13 @@
stdenv.mkDerivation rec {
pname = "openfpgaloader";
version = "0.5.0";
version = "0.6.0";
src = fetchFromGitHub {
owner = "trabucayre";
repo = "openFPGALoader";
rev = "v${version}";
sha256 = "sha256-g1mr7S9Z70A+dXWptZPLHt90JpuclJAEDwUTicpxtic=";
sha256 = "sha256-gPRBHy7WVra4IlGvzrhNqbEbOQtYtUC+zQ+SnJTMvRA=";
};
nativeBuildInputs = [ cmake pkg-config ];

View File

@ -0,0 +1,84 @@
{ lib
, mkDerivation
, fetchFromGitHub
, gnuradio
, cmake
, pkg-config
, boost
, log4cpp
, python
, swig
, mpir
, gmp
, doxygen
, libpcap
, icu
, thrift
}:
let
# Each GR major version requires us to pull a specific git revision of the repository
version = {
"3.7" = {
# Last git revision from the `maint-3.7` branch:
# https://github.com/ghostop14/gr-grnet/tree/maint-3.7
name = "unstable-2019-08-06";
gitHash = "beb1cd75d006a982c0a9536e923800c5a0575451";
};
"3.8" = {
# Last git revision from the `maint-3.8` branch:
# https://github.com/ghostop14/gr-grnet/tree/maint-3.8
name = "unstable-2020-11-20";
gitHash = "b02016043b67a15f27134a4f0b0d43f5d1b9ed6d";
};
"3.9" = {
# This revision is taken from the `master` branch.
name = "unstable-2020-12-30";
gitHash = "e6dfd140cfda715de9bcef4c1116fcacfeb0c606";
};
}.${gnuradio.versionAttr.major};
src = fetchFromGitHub {
owner = "ghostop14";
repo = "gr-grnet";
rev = "${version.gitHash}";
sha256 = {
"3.7" = "LLQ0Jf0Oapecu9gj4IgxOdK7O/OSbHnwNk000GlODxk=";
"3.8" = "vO8l8nV1/yEQf7pKqBbzIg4KkyCyWu+OkKgISyI3PaQ=";
"3.9" = "NsL7HCOQmGyexzpH2qbzv8Bq4bsfiDTNEUi96QDOA/g=";
}.${gnuradio.versionAttr.major};
};
in
mkDerivation {
pname = "gr-grnet";
version = version.name;
inherit src;
buildInputs = [
boost
log4cpp
doxygen
mpir
gmp
libpcap
icu
] ++ (if lib.versionAtLeast gnuradio.versionAttr.major "3.9" then with python.pkgs; [
pybind11
numpy
] else [
swig
thrift
python.pkgs.thrift
]);
nativeBuildInputs = [
cmake
pkg-config
];
meta = with lib; {
description = "GNURadio TCP/UDP source and sink blocks rewritten in C++/Boost";
homepage = "https://github.com/ghostop14/gr-grnet";
license = licenses.gpl3Plus;
maintainers = with maintainers; [ chuangzhu ];
platforms = platforms.unix;
};
}

View File

@ -20,11 +20,11 @@
stdenv.mkDerivation rec {
pname = "spidermonkey";
version = "91.3.0";
version = "91.4.0";
src = fetchurl {
url = "mirror://mozilla/firefox/releases/${version}esr/source/firefox-${version}esr.source.tar.xz";
sha256 = "0v79c435vfbhsx7pqyq4jm5rv8iysig69wwqhvys1n0jy54m72qj";
sha256 = "09xkzk27krzyj1qx8cjjn2zpnws1cncka75828kk7ychnjfq48p7";
};
outputs = [ "out" "dev" ];

View File

@ -3,7 +3,6 @@
lib
, resholvePackage
, bash
, shellcheck
, doCheck ? true
, doInstallCheck ? true
# variant-specific
@ -50,12 +49,10 @@ resholvePackage rec {
'';
inherit doCheck;
checkInputs = [ shellcheck bash ];
checkInputs = [ bash ];
# check based on https://github.com/bashup/events/blob/master/.dkrc
checkPhase = ''
runHook preCheck
SHELLCHECK_OPTS='-e SC2016,SC2145' ${shellcheck}/bin/shellcheck ./bashup.events
${bash}/bin/bash -n ./bashup.events
${bash}/bin/bash ./bashup.events
runHook postCheck

View File

@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "openwsman";
version = "2.7.0";
version = "2.7.1";
src = fetchFromGitHub {
owner = "Openwsman";
repo = "openwsman";
rev = "v${version}";
sha256 = "19dj38jyzhhhvk863cikcwk5awzlq3337pxmsaqqm4wrcygrkfmx";
sha256 = "sha256-/fSVzpGPObMkJIu7j6eR6A7Gtf2jttoPhcSayBvn3IU=";
};
nativeBuildInputs = [ cmake pkg-config ];

View File

@ -1,5 +1,5 @@
{ lib, stdenv
, fetchurl
, fetchpatch
, fetchFromGitHub
, ncurses
, python3
@ -14,19 +14,25 @@
stdenv.mkDerivation rec {
pname = "spdk";
version = "21.07";
version = "21.10";
src = fetchFromGitHub {
owner = "spdk";
repo = "spdk";
rev = "v${version}";
sha256 = "sha256-/hynuYVdzIfiHUUfuuOY8SBJ18DqJr2Fos2JjQQVvbg=";
sha256 = "sha256-pFynTbbSF1g58VD9bOhe3c4oCozeqE+35kECTQwDBDM=";
};
patches = [
# Backport of upstream patch for ncurses-6.3 support.
# Will be in next release after 21.10.
./ncurses-6.3.patch
# DPDK 21.11 compatibility.
(fetchpatch {
url = "https://github.com/spdk/spdk/commit/f72cab94dd35d7b45ec5a4f35967adf3184ca616.patch";
sha256 = "sha256-sSetvyNjlM/hSOUsUO3/dmPzAliVcteNDvy34yM5d4A=";
})
];
nativeBuildInputs = [

View File

@ -15,7 +15,7 @@ buildLuarocksPackage {
pname = "alt-getopt";
version = "0.8.0-1";
knownRockspec = (fetchurl {
url = "https://luarocks.org/alt-getopt-0.8.0-1.rockspec";
url = "https://luafr.org/luarocks/alt-getopt-0.8.0-1.rockspec";
sha256 = "17yxi1lsrbkmwzcn1x48x8758d7v1frsz1bmnpqfv4vfnlh0x210";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
@ -159,7 +159,7 @@ buildLuarocksPackage {
pname = "busted";
version = "2.0.0-1";
knownRockspec = (fetchurl {
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/busted-2.0.0-1.rockspec";
url = "https://luafr.org/luarocks/busted-2.0.0-1.rockspec";
sha256 = "0cbw95bjxl667n9apcgng2kr5hq6bc7gp3vryw4dzixmfabxkcbw";
}).outPath;
src = fetchurl {
@ -184,7 +184,7 @@ buildLuarocksPackage {
pname = "cassowary";
version = "2.3.1-2";
knownRockspec = (fetchurl {
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/cassowary-2.3.1-2.rockspec";
url = "https://luafr.org/luarocks/cassowary-2.3.1-2.rockspec";
sha256 = "04y882f9ai1jhk0zwla2g0fvl56a75rwnxhsl9r3m0qa5i0ia1i5";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
@ -244,7 +244,7 @@ buildLuarocksPackage {
pname = "cosmo";
version = "16.06.04-1";
knownRockspec = (fetchurl {
url = "https://luarocks.org/cosmo-16.06.04-1.rockspec";
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/cosmo-16.06.04-1.rockspec";
sha256 = "0ipv1hrlhvaz1myz6qxabq7b7kb3bz456cya3r292487a3g9h9pb";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
@ -276,7 +276,7 @@ buildLuarocksPackage {
pname = "coxpcall";
version = "1.17.0-1";
knownRockspec = (fetchurl {
url = "https://luarocks.org/coxpcall-1.17.0-1.rockspec";
url = "https://luafr.org/luarocks/coxpcall-1.17.0-1.rockspec";
sha256 = "0mf0nggg4ajahy5y1q5zh2zx9rmgzw06572bxx6k8b736b8j7gca";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
@ -307,7 +307,7 @@ buildLuarocksPackage {
pname = "cqueues";
version = "20200726.52-0";
knownRockspec = (fetchurl {
url = "https://luarocks.org/cqueues-20200726.52-0.rockspec";
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/cqueues-20200726.52-0.rockspec";
sha256 = "0w2kq9w0wda56k02rjmvmzccz6bc3mn70s9v7npjadh85i5zlhhp";
}).outPath;
src = fetchurl {
@ -393,7 +393,7 @@ buildLuarocksPackage {
pname = "dkjson";
version = "2.5-3";
knownRockspec = (fetchurl {
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/dkjson-2.5-3.rockspec";
url = "https://luafr.org/luarocks/dkjson-2.5-3.rockspec";
sha256 = "18xngdzl2q207cil64aj81qi6qvj1g269pf07j5x4pbvamd6a1l3";
}).outPath;
src = fetchurl {
@ -418,7 +418,7 @@ buildLuarocksPackage {
pname = "fifo";
version = "0.2-0";
knownRockspec = (fetchurl {
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/fifo-0.2-0.rockspec";
url = "https://luafr.org/luarocks/fifo-0.2-0.rockspec";
sha256 = "0vr9apmai2cyra2n573nr3dyk929gzcs4nm1096jdxcixmvh2ymq";
}).outPath;
src = fetchurl {
@ -444,10 +444,10 @@ buildLuarocksPackage {
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
"url": "https://github.com/lewis6991/gitsigns.nvim",
"rev": "552f114caeaec4ce97822cb55dfa7c7e5368136b",
"date": "2021-10-15T13:31:44+01:00",
"path": "/nix/store/40vkv3sc4h6gh9ac88k7pilszxmy38yv-gitsigns.nvim",
"sha256": "0qdafm3arjf8bcqpvv085dwzbikad3sr3xzvrn3gfa0dsls8pg6q",
"rev": "5eb87a0b05914d3763277ebe257bd5bafcdde8cd",
"date": "2021-12-06T18:02:22+00:00",
"path": "/nix/store/c5l5bz7m5f48l57p4yrpxfhqga0cxsny-gitsigns.nvim",
"sha256": "02cmgc3fgrwx6v6ylzqxdwgk9jsmd8j2q6fdnfbllg3zjwx3agcd",
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
@ -496,14 +496,14 @@ inspect = callPackage({ buildLuarocksPackage, luaOlder, luaAtLeast
}:
buildLuarocksPackage {
pname = "inspect";
version = "3.1.1-0";
version = "3.1.2-0";
knownRockspec = (fetchurl {
url = "https://luarocks.org/inspect-3.1.1-0.rockspec";
sha256 = "00spibq2h4an8v0204vr1hny4vv6za720c37ipsahpjk198ayf1p";
url = "https://luarocks.org/inspect-3.1.2-0.rockspec";
sha256 = "13jbv3rhj4mv2farrxns88g7j34ljag7vz0kma0fm2pzdz3686vx";
}).outPath;
src = fetchurl {
url = "https://github.com/kikito/inspect.lua/archive/v3.1.1.tar.gz";
sha256 = "1nz0yqhkd0nkymghrj99gb2id40g50drh4a96g3v5k7h1sbg94h2";
url = "https://github.com/kikito/inspect.lua/archive/v3.1.2.tar.gz";
sha256 = "08ln4p5bmvcs8wj8hzs4ny66m63abyxjkmcxhjji5ay99g85cn3b";
};
disabled = with lua; (luaOlder "5.1");
@ -524,14 +524,14 @@ buildLuarocksPackage {
version = "scm-0";
knownRockspec = (fetchurl {
url = "mirror://luarocks/ldbus-scm-0.rockspec";
sha256 = "1yhkw5y8h1qf44vx31934k042cmnc7zcv2k0pv0g27wsmlxrlznx";
sha256 = "1c0h6fx7avzh89hl17v6simy1p4mjg8bimlsbjybks0zxznd8rbm";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
"url": "https://github.com/daurnimator/ldbus.git",
"rev": "9e176fe851006037a643610e6d8f3a8e597d4073",
"date": "2019-08-16T14:26:05+10:00",
"path": "/nix/store/gg4zldd6kx048d6p65b9cimg3arma8yh-ldbus",
"sha256": "06wcz4i5b7kphqbry274q3ivnsh331rxiyf7n4qk3zx2kvarq08s",
"rev": "6d4909c983c8a0e2c7384bac8055c628aa524ea2",
"date": "2021-11-10T23:58:54+11:00",
"path": "/nix/store/j830jk2hkanz7abkdsbvg2warsyr0a2c-ldbus",
"sha256": "18q98b98mfvjzbyssf18bpnlx4hsx4s9lwcwia4z9dxiaiw7b77j",
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
@ -539,7 +539,7 @@ buildLuarocksPackage {
}
'') ["date" "path"]) ;
disabled = with lua; (luaOlder "5.1") || (luaAtLeast "5.4");
disabled = with lua; (luaOlder "5.1") || (luaAtLeast "5.5");
propagatedBuildInputs = [ lua ];
meta = {
@ -585,7 +585,7 @@ buildLuarocksPackage {
pname = "lgi";
version = "0.9.2-1";
knownRockspec = (fetchurl {
url = "https://luarocks.org/lgi-0.9.2-1.rockspec";
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/lgi-0.9.2-1.rockspec";
sha256 = "1gqi07m4bs7xibsy4vx8qgyp3yb1wnh0gdq1cpwqzv35y6hn5ds3";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
@ -666,7 +666,7 @@ buildLuarocksPackage {
pname = "lpeg";
version = "1.0.2-1";
knownRockspec = (fetchurl {
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/lpeg-1.0.2-1.rockspec";
url = "https://luafr.org/luarocks/lpeg-1.0.2-1.rockspec";
sha256 = "08a8p5cwlwpjawk8sczb7bq2whdsng4mmhphahyklf1bkvl2li89";
}).outPath;
src = fetchurl {
@ -692,7 +692,7 @@ buildLuarocksPackage {
pname = "lpeg_patterns";
version = "0.5-0";
knownRockspec = (fetchurl {
url = "https://luarocks.org/lpeg_patterns-0.5-0.rockspec";
url = "https://luafr.org/luarocks/lpeg_patterns-0.5-0.rockspec";
sha256 = "1vzl3ryryc624mchclzsfl3hsrprb9q214zbi1xsjcc4ckq5qfh7";
}).outPath;
src = fetchurl {
@ -716,7 +716,7 @@ buildLuarocksPackage {
pname = "lpeglabel";
version = "1.6.0-1";
knownRockspec = (fetchurl {
url = "https://luarocks.org/lpeglabel-1.6.0-1.rockspec";
url = "https://luafr.org/luarocks/lpeglabel-1.6.0-1.rockspec";
sha256 = "13gc32pggng6f95xx5zw9n9ian518wlgb26mna9kh4q2xa1k42pm";
}).outPath;
src = fetchurl {
@ -741,7 +741,7 @@ buildLuarocksPackage {
pname = "lpty";
version = "1.2.2-1";
knownRockspec = (fetchurl {
url = "https://luarocks.org/lpty-1.2.2-1.rockspec";
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/lpty-1.2.2-1.rockspec";
sha256 = "04af4mhiqrw3br4qzz7yznw9zy2m50wddwzgvzkvhd99ng71fkzg";
}).outPath;
src = fetchurl {
@ -766,7 +766,7 @@ buildLuarocksPackage {
pname = "lrexlib-gnu";
version = "2.9.1-1";
knownRockspec = (fetchurl {
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/lrexlib-gnu-2.9.1-1.rockspec";
url = "https://luafr.org/luarocks/lrexlib-gnu-2.9.1-1.rockspec";
sha256 = "1jfjxh26iwsavipkwmscwv52l77qxzvibfmlvpskcpawyii7xcw8";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
@ -799,7 +799,7 @@ buildLuarocksPackage {
pname = "lrexlib-pcre";
version = "2.9.1-1";
knownRockspec = (fetchurl {
url = "https://luarocks.org/lrexlib-pcre-2.9.1-1.rockspec";
url = "https://luafr.org/luarocks/lrexlib-pcre-2.9.1-1.rockspec";
sha256 = "036k27xaplxn128b3p67xiqm8k40s7bxvh87wc8v2cx1cc4b9ia4";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
@ -833,7 +833,7 @@ buildLuarocksPackage {
pname = "lrexlib-posix";
version = "2.9.1-1";
knownRockspec = (fetchurl {
url = "https://luafr.org/luarocks/lrexlib-posix-2.9.1-1.rockspec";
url = "https://luarocks.org/lrexlib-posix-2.9.1-1.rockspec";
sha256 = "1zxrx9yifm9ry4wbjgv86rlvq3ff6qivldvib3ha4767azla0j0r";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
@ -1111,17 +1111,17 @@ lua-resty-openssl = callPackage({ buildLuarocksPackage, luaOlder, luaAtLeast
, fetchgit}:
buildLuarocksPackage {
pname = "lua-resty-openssl";
version = "0.7.5-1";
version = "0.8.2-1";
knownRockspec = (fetchurl {
url = "https://luarocks.org/lua-resty-openssl-0.7.5-1.rockspec";
sha256 = "13v14in9cgmjgarmy6br9629ns1qlhw7a30c061y6gncjannnv6y";
url = "https://luarocks.org/lua-resty-openssl-0.8.2-1.rockspec";
sha256 = "1dxaxh3l4vhrv5p2pwphl7jn7jpcjq3dmawfl9wbp3a88121gbsx";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
"url": "https://github.com/fffonion/lua-resty-openssl.git",
"rev": "6a7f4a1649da7e0499b542b73c61e8dbdf91f57e",
"date": "2021-09-18T06:15:54+08:00",
"path": "/nix/store/01bninsbgix30zl97lk0p10ycqkc37kx-lua-resty-openssl",
"sha256": "1ypji678lna9z3a48lhxs7wrw8d1prln7yfvqfm96lbmfvr5wfxw",
"rev": "53e2d4ba7e8c31181c1fd71d3817911da0533675",
"date": "2021-11-22T12:07:07+08:00",
"path": "/nix/store/x7s51wf9ysxs2xs4adixf7ypmadfwp5c-lua-resty-openssl",
"sha256": "19cvqz81d0lxql55pgsbgynval0jxh8sicps94nzapvj90xqjviy",
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
@ -1176,7 +1176,7 @@ buildLuarocksPackage {
pname = "lua-term";
version = "0.7-1";
knownRockspec = (fetchurl {
url = "https://luafr.org/luarocks/lua-term-0.7-1.rockspec";
url = "https://luarocks.org/lua-term-0.7-1.rockspec";
sha256 = "0r9g5jw7pqr1dyj6w58dqlr7y7l0jp077n8nnji4phf10biyrvg2";
}).outPath;
src = fetchurl {
@ -1232,7 +1232,7 @@ buildLuarocksPackage {
pname = "lua-yajl";
version = "2.0-1";
knownRockspec = (fetchurl {
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/lua-yajl-2.0-1.rockspec";
url = "https://luarocks.org/lua-yajl-2.0-1.rockspec";
sha256 = "0h600zgq5qc9z3cid1kr35q3qb98alg0m3qf0a3mfj33hya6pcxp";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
@ -1266,7 +1266,7 @@ buildLuarocksPackage {
pname = "lua-zlib";
version = "1.2-1";
knownRockspec = (fetchurl {
url = "https://luafr.org/luarocks/lua-zlib-1.2-1.rockspec";
url = "https://luarocks.org/lua-zlib-1.2-1.rockspec";
sha256 = "18rpbg9b4vsnh3svapiqrvwwshw1abb5l5fd7441byx1nm3fjq9w";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
@ -1385,7 +1385,7 @@ buildLuarocksPackage {
pname = "luacov";
version = "0.15.0-1";
knownRockspec = (fetchurl {
url = "https://luafr.org/luarocks/luacov-0.15.0-1.rockspec";
url = "https://luarocks.org/luacov-0.15.0-1.rockspec";
sha256 = "18byfl23c73pazi60hsx0vd74hqq80mzixab76j36cyn8k4ni9db";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
@ -1484,7 +1484,7 @@ buildLuarocksPackage {
pname = "luadbi-postgresql";
version = "0.7.2-1";
knownRockspec = (fetchurl {
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/luadbi-postgresql-0.7.2-1.rockspec";
url = "https://luarocks.org/luadbi-postgresql-0.7.2-1.rockspec";
sha256 = "07rx4agw4hjyzf8157apdwfqh9s26nqndmkr3wm7v09ygjvdjiix";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
@ -1550,7 +1550,7 @@ buildLuarocksPackage {
pname = "luaepnf";
version = "0.3-2";
knownRockspec = (fetchurl {
url = "https://luafr.org/luarocks/luaepnf-0.3-2.rockspec";
url = "https://luarocks.org/luaepnf-0.3-2.rockspec";
sha256 = "0kqmnj11wmfpc9mz04zzq8ab4mnbkrhcgc525wrq6pgl3p5li8aa";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
@ -1667,7 +1667,7 @@ buildLuarocksPackage {
pname = "luafilesystem";
version = "1.7.0-2";
knownRockspec = (fetchurl {
url = "https://luarocks.org/luafilesystem-1.7.0-2.rockspec";
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/luafilesystem-1.7.0-2.rockspec";
sha256 = "0xivgn8bbkx1g5a30jrjcv4hg5mpiiyrm3fhlz9lndgbh4cnjrq6";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
@ -1699,17 +1699,17 @@ lualogging = callPackage({ buildLuarocksPackage, luaOlder, luaAtLeast
}:
buildLuarocksPackage {
pname = "lualogging";
version = "1.5.2-1";
version = "1.6.0-2";
knownRockspec = (fetchurl {
url = "https://luarocks.org/lualogging-1.5.2-1.rockspec";
sha256 = "0jlqjhr5p9ji51bkmz8n9jc55i3vzqjfwjxvxp2ib9h4gmh2zqk3";
url = "https://luarocks.org/lualogging-1.6.0-2.rockspec";
sha256 = "1235sfss0gmcw744rnhzfffhd1z732g2b2vsbpbz9kcvvhznmamb";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
"url": "https://github.com/lunarmodules/lualogging.git",
"rev": "8b4d8dd5a311245a197890405ba9324b9f5f5ab1",
"date": "2021-08-12T19:29:39+02:00",
"path": "/nix/store/q1v28n04hh3r7aw37cxakzksfa3kw5qa-lualogging",
"sha256": "0nj0ik91lgl9rwgizdkn7vy9brddsz1kxfn70c01x861vaxi63iz",
"rev": "0bc4415de03ff1a99c92c02a5bed14a45b078079",
"date": "2021-11-09T20:20:42+01:00",
"path": "/nix/store/p3cyhqjw12bj7s6y4hndzqdkdfwq3958-lualogging",
"sha256": "18664k4kfi4zq9n0217j57h42li6ws8s3f6d4yj0rcqsl19fxa7c",
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
@ -2060,7 +2060,7 @@ buildLuarocksPackage {
pname = "lyaml";
version = "6.2.7-1";
knownRockspec = (fetchurl {
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/lyaml-6.2.7-1.rockspec";
url = "https://luarocks.org/lyaml-6.2.7-1.rockspec";
sha256 = "0m5bnzg24nyk35gcn4rydgzk0ysk1f6rslxwxd0w3drl1bg64zja";
}).outPath;
src = fetchurl {
@ -2252,10 +2252,10 @@ buildLuarocksPackage {
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
"url": "https://github.com/nvim-lua/plenary.nvim",
"rev": "80bb2b9bb74bdca38a46480b6f2e15af990406e4",
"date": "2021-10-06T19:20:08+02:00",
"path": "/nix/store/mw4r562qxr7giy1n43iylp3qb8ch0jqs-plenary.nvim",
"sha256": "11akcpxcp4m997a2y76ajknnmsifac2hj4nq9i4a8b1j08bxinim",
"rev": "c2bb2d8fd5b44bfc6aad3a5463c84576a98dd4a9",
"date": "2021-12-06T21:11:29+01:00",
"path": "/nix/store/h376md0lpbv31n5wyrq0cilkpx2lkr18-plenary.nvim",
"sha256": "12csjz882yv9wwhzx964fq210655m8820491xjsrjlwccfc09i35",
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,

View File

@ -2,7 +2,7 @@
{pkgs ? import <nixpkgs> {
inherit system;
}, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-12_x"}:
}, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-14_x"}:
let
nodeEnv = import ./node-env.nix {

View File

@ -1,9 +1,20 @@
#!/usr/bin/env bash
set -eu -o pipefail
cd "$( dirname "${BASH_SOURCE[0]}" )"
node2nix=$(nix-build ../../.. -A nodePackages.node2nix)
rm -f ./node-env.nix
${node2nix}/bin/node2nix -i node-packages.json -o node-packages.nix -c composition.nix
# Track the latest active nodejs LTS here: https://nodejs.org/en/about/releases/
${node2nix}/bin/node2nix \
-i node-packages.json \
-o node-packages.nix \
-c composition.nix \
--pkg-name nodejs-14_x
# using --no-out-link in nix-build argument would cause the
# gc to run before the script finishes
# which would cause a failure

File diff suppressed because it is too large Load Diff

View File

@ -3,13 +3,13 @@
buildDunePackage rec {
pname = "graphics";
version = "5.1.1";
version = "5.1.2";
useDune2 = true;
src = fetchurl {
url = "https://github.com/ocaml/graphics/releases/download/${version}/graphics-${version}.tbz";
sha256 = "sha256-KGyD497ZKHA2xeXHezmh3P1zoSlre1h5N9zjkAFmMo4=";
sha256 = "sha256-QA/YHSPxy0FGuWl5NCwkeXHdVPWHn/0vgOx80CEuMtQ=";
};
buildInputs = [ dune-configurator ];

View File

@ -1,4 +1,4 @@
{ buildDunePackage, jsonrpc, lsp, re, makeWrapper, dot-merlin-reader }:
{ lib, buildDunePackage, jsonrpc, lsp, re, makeWrapper, dot-merlin-reader, spawn }:
buildDunePackage {
pname = "ocaml-lsp-server";
@ -7,7 +7,8 @@ buildDunePackage {
inherit (lsp) preBuild;
buildInputs = lsp.buildInputs ++ [ lsp re ];
buildInputs = lsp.buildInputs ++ [ lsp re ]
++ lib.optional (lib.versionAtLeast jsonrpc.version "1.9") spawn;
nativeBuildInputs = [ makeWrapper ];

View File

@ -10,10 +10,14 @@
}:
let params =
if lib.versionAtLeast ocaml.version "4.12"
if lib.versionAtLeast ocaml.version "4.13"
then {
version = "1.8.3";
sha256 = "sha256-WO9ap78XZxJCi04LEBX+r21nfL2UdPiCLRMrJSI7FOk=";
version = "1.9.1";
sha256 = "sha256:1vnwdpjppihprc8q2i5zcqq7vp67255jclg90ldfvwafgljxn76g";
} else if lib.versionAtLeast ocaml.version "4.12"
then {
version = "1.9.0";
sha256 = "sha256:1ac44n6g3rf84gvhcca545avgf9vpkwkkkm0s8ipshfhp4g4jikh";
} else {
version = "1.4.1";
sha256 = "1ssyazc0yrdng98cypwa9m3nzfisdzpp7hqnx684rqj8f0g3gs6f";
@ -29,7 +33,7 @@ buildDunePackage rec {
};
useDune2 = true;
minimumOCamlVersion = "4.06";
minimalOCamlVersion = "4.06";
buildInputs =
if lib.versionAtLeast version "1.7.0" then

View File

@ -1,22 +0,0 @@
{ lib, buildPythonPackage, fetchPypi }:
buildPythonPackage rec {
pname = "zc.buildout";
version = "2.13.4";
src = fetchPypi {
inherit pname version;
sha256 = "b978b2f9317b317ee4191f78fcc4f05b1ac41bdaaae47f0956f14c8285feef63";
};
patches = [ ./nix.patch ];
postInstall = "mv $out/bin/buildout{,-nix}";
meta = with lib; {
homepage = "http://www.buildout.org";
description = "A software build and configuration system";
license = licenses.zpl21;
maintainers = [ maintainers.goibhniu ];
};
}

View File

@ -1,28 +0,0 @@
--- a/src/zc/buildout/buildout.py 2017-08-18 10:06:24.946428977 +0300
+++ b/src/zc/buildout/buildout.py 2017-08-18 10:08:49.115613364 +0300
@@ -382,6 +382,10 @@
if k not in versions
))
+ # Override versions with available (nix) system packages
+ for dist in pkg_resources.working_set:
+ versions[dist.project_name] = SectionKey(dist.version, dist.location)
+
# Absolutize some particular directory, handling also the ~/foo form,
# and considering the location of the configuration file that generated
# the setting as the base path, falling back to the main configuration
--- a/src/zc/buildout/easy_install.py 2017-08-18 10:06:24.948428980 +0300
+++ b/src/zc/buildout/easy_install.py 2017-08-18 10:07:37.462521740 +0300
@@ -321,6 +321,12 @@
def _satisfied(self, req, source=None):
dists = [dist for dist in self._env[req.project_name] if dist in req]
+ try:
+ dists = ([dist for dist in dists
+ if dist.precedence == pkg_resources.DEVELOP_DIST]
+ + [pkg_resources.get_distribution(req.project_name)])
+ except pkg_resources.DistributionNotFound:
+ pass
if not dists:
logger.debug('We have no distributions for %s that satisfies %r.',
req.project_name, str(req))

View File

@ -8,12 +8,12 @@
buildPythonPackage rec {
pname = "cartopy";
version = "0.20.0";
version = "0.20.1";
src = fetchPypi {
inherit version;
pname = "Cartopy";
sha256 = "eae58aff26806e63cf115b2bce9477cedc4aa9f578c5e477b2c25cfa404f2b7a";
sha256 = "91f87b130e2574547a20cd634498df97d797abd12dcfd0235bc0cdbcec8b05e3";
};
postPatch = ''

View File

@ -9,13 +9,13 @@
buildPythonPackage rec {
pname = "certbot";
version = "1.21.0";
version = "1.22.0";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "v${version}";
sha256 = "0sbhg8gdcszi4q5091s1by0hz6qxpkdfazs5lbfrlw33fkck2d3i";
sha256 = "1wrk5rhds6a69vbs1bda0zhwpvjhd8i20did6j3kydbas3zbr516";
};
sourceRoot = "source/${pname}";

View File

@ -17,7 +17,7 @@
buildPythonPackage rec {
pname = "cloudsplaining";
version = "0.4.8";
version = "0.4.9";
disabled = pythonOlder "3.6";
@ -25,7 +25,7 @@ buildPythonPackage rec {
owner = "salesforce";
repo = pname;
rev = version;
sha256 = "sha256-t1eSPa1KqzUB2xYGkU10lVIZQ3CcIHiZZtTa0j2TUGc=";
sha256 = "sha256-87ZUYHN64gnbF2g9BjPFNbwMaGFxAy3Yb8UdT3BUqC0=";
};
propagatedBuildInputs = [

View File

@ -2,13 +2,13 @@
buildPythonPackage rec {
pname = "cpyparsing";
version = "2.4.7.1.0.0";
version = "2.4.7.1.1.0";
src = fetchFromGitHub {
owner = "evhub";
repo = pname;
rev = "09073751d92cb40fb71c927c006baddc082df1db"; # No tags on repo
sha256 = "O9IdHipAxxbFcDFYNvmczue/wT4AF9Xb5uc3ZTAlTlo=";
rev = "v${version}";
sha256 = "1rqj89mb4dz0xk8djh506nrlqfqqdva9qgb5llrvvwjqv3vqnrj4";
};
nativeBuildInputs = [ cython ];

View File

@ -13,7 +13,7 @@
buildPythonPackage rec {
pname = "deezer-python";
version = "4.1.0";
version = "4.2.0";
format = "pyproject";
disabled = pythonOlder "3.6";
@ -22,7 +22,7 @@ buildPythonPackage rec {
owner = "browniebroke";
repo = pname;
rev = "v${version}";
sha256 = "sha256-E1xXtvAcYIi2xxaX+3yMkkvRz+Gt6Nx0JRqV1nI/Ldo=";
sha256 = "0wljf3ri8jcg4df6m61k8s5nm9rncwa8c46pfv901bc737kyslpl";
};
nativeBuildInputs = [

View File

@ -6,6 +6,7 @@
, pynacl
, pythonOlder
, withVoice ? true
, ffmpeg
}:
buildPythonPackage rec {
@ -24,9 +25,10 @@ buildPythonPackage rec {
propagatedBuildInputs = [
aiohttp
] ++ lib.optionalString withVoice [
] ++ lib.optionals withVoice [
libopus
pynacl
ffmpeg
];
patchPhase = ''
@ -34,6 +36,9 @@ buildPythonPackage rec {
--replace "ctypes.util.find_library('opus')" "'${libopus}/lib/libopus.so.0'"
substituteInPlace requirements.txt \
--replace "aiohttp>=3.6.0,<3.8.0" "aiohttp>=3.6.0,<4"
'' + lib.optionalString withVoice ''
substituteInPlace "discord/player.py" \
--replace "executable='ffmpeg'" "executable='${ffmpeg}/bin/ffmpeg'"
'';
# Only have integration tests with discord

View File

@ -6,13 +6,13 @@
buildPythonPackage rec {
pname = "emoji";
version = "1.6.1";
version = "1.6.2";
src = fetchFromGitHub {
owner = "carpedm20";
repo = pname;
rev = "v${version}";
sha256 = "0x18l8jgbki9yqx994w97dagfaqrbxi3sy2l2101is1dfjr0kib6";
sha256 = "1g927w9l3j5mycg6pqa4vjk2lyy35sppfp8pbzb6mvca500001rk";
};
checkInputs = [

View File

@ -10,14 +10,14 @@
buildPythonPackage rec {
pname = "jc";
version = "1.17.1";
version = "1.17.3";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "kellyjonbrazil";
repo = pname;
rev = "v${version}";
sha256 = "sha256-ISggj6oOF0B7TKIQAlZtauRrDAWP88OOFezLJK6edjI=";
sha256 = "sha256-LoefoKrYZF0REF3EEd9/rxd5VQfpU+lYX/siRlQw00o=";
};
propagatedBuildInputs = [ ruamel-yaml xmltodict pygments ];

View File

@ -13,12 +13,12 @@
buildPythonPackage rec {
pname = "keyring";
version = "23.3.0";
version = "23.4.0";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-Ct7Khr6zoveTYtksf7cZSb51HnJGPywTUOKrXA+9NwE=";
sha256 = "sha256-iPIGAkKV48b7FrsKYPtLt+wRhWKdxacp8SqnwjbQE4c=";
};
nativeBuildInputs = [

View File

@ -8,14 +8,14 @@
buildPythonPackage rec {
pname = "lc7001";
version = "1.0.4";
version = "1.0.5";
format = "pyproject";
disabled = pythonOlder "3.8";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-1qObmGpu6mU3gdxS8stH+4Zc2NA7W1+pS7fOXALC0Ug=";
sha256 = "sha256-I4I3vwW1kJsgLFPMGpe9hkD3iEeC3AqI4pCi6SCWPx4=";
};
nativeBuildInputs = [

View File

@ -6,11 +6,11 @@
buildPythonPackage rec {
pname = "monkeyhex";
version = "1.7.2";
version = "1.7.3";
src = fetchPypi {
inherit pname version;
sha256 = "e2add1f7f1f620be9ccec0618342e6a9e47de50e0d2252628bffd452bfd3762b";
sha256 = "c121e734ccae8f1be6f1ecaf9100f3f8bde0a2dd03979b8ba42c474b1978806e";
};
propagatedBuildInputs = [ future ];

View File

@ -6,12 +6,12 @@
buildPythonPackage rec {
pname = "phonenumbers";
version = "8.12.38";
version = "8.12.39";
format = "setuptools";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-PNodHOqaaAG6v4JebA9ql3bqbYpouBslYXj45aqBM0Q=";
sha256 = "0f7745e1f108654db347d885e814cbb5f225b8c5f5ce336024b193c79291ddaa";
};
checkInputs = [

View File

@ -8,11 +8,11 @@
buildPythonPackage rec {
pname = "plaid-python";
version = "8.6.0";
version = "8.7.0";
src = fetchPypi {
inherit pname version;
sha256 = "da3570fedbc096aa058affa72fc71905401b373a5b0d28b7c27e7af7998859d9";
sha256 = "16b23f61deab24d406536a1fd172da77bcbb28b3ca322245b8ee9203350fb57d";
};
propagatedBuildInputs = [

View File

@ -2,12 +2,12 @@
buildPythonPackage rec {
pname = "pyatspi";
version = "2.38.1";
version = "2.38.2";
format = "other";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
sha256 = "0lc1p6p296c9q3lffi03v902jlsj34i7yyl3rcyaq94wwbljg7z4";
sha256 = "DnCJwLYwlhS1NiCDazRi1/kShOQ2/kkpuhYZqEHPEYU=";
};
nativeBuildInputs = [ pkg-config ];

View File

@ -7,12 +7,12 @@
buildPythonPackage rec {
pname = "pynvml";
version = "11.0.0";
version = "11.4.1";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-1fxKItNVtAw0HWugqoiKLU0iUxd9JDkA+EAbfmyssbs=";
sha256 = "b2e4a33b80569d093b513f5804db0c7f40cfc86f15a013ae7a8e99c5e175d5dd";
};
propagatedBuildInputs = [ cudatoolkit ];

View File

@ -0,0 +1,45 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
, pycountry
, pythonOlder
, requests
, websocket-client
, xmltodict
}:
buildPythonPackage rec {
pname = "pyskyqremote";
version = "0.2.49";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchFromGitHub {
owner = "RogerSelwyn";
repo = "skyq_remote";
rev = version;
sha256 = "sha256-Xhr+p/kIp3Sm7swqCsjXHaECntwJnBLyGlcSg2lsxZc=";
};
propagatedBuildInputs = [
pycountry
requests
websocket-client
xmltodict
];
# Project has no tests, only a test script which looks like anusage example
doCheck = false;
pythonImportsCheck = [
"pyskyqremote"
];
meta = with lib; {
description = "Python module for accessing SkyQ boxes";
homepage = "https://github.com/RogerSelwyn/skyq_remote";
license = with licenses; [ mit ];
maintainers = with maintainers; [ fab ];
};
}

View File

@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "pystache";
version = "0.5.4";
version = "0.6.0";
src = fetchPypi {
inherit pname version;
sha256 = "f7bbc265fb957b4d6c7c042b336563179444ab313fb93a719759111eabd3b85a";
sha256 = "93bf92b2149a4c4b58d12142e2c4c6dd5c08d89e4c95afccd4b6efe2ee1d470d";
};
LC_ALL = "en_US.UTF-8";

View File

@ -7,12 +7,12 @@ buildPythonPackage rec {
# upstream has abandoned project in favor of pytest-flake8
# retaining package to not break other packages
pname = "pytest-flakes";
version = "4.0.4";
version = "4.0.5";
disabled = pythonOlder "3.5";
src = fetchPypi {
inherit pname version;
sha256 = "551467a129331bed83596f3145d9eaf6541c26a03dc1b36419efef8ae231341b";
sha256 = "953134e97215ae31f6879fbd7368c18d43f709dc2fab5b7777db2bb2bac3a924";
};
buildInputs = [ pytest ];

View File

@ -9,14 +9,14 @@
buildPythonPackage rec {
pname = "python-lsp-black";
version = "1.0.0";
version = "1.0.1";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "python-lsp";
repo = "python-lsp-black";
rev = "v${version}";
sha256 = "1blxhj70jxb9xfbd4dxqikd262n6dn9dw5qhyml5yvdwxbv0bybc";
sha256 = "03k32m4jfqfzrawj69yxhk9kwzsdcwginip77kxdbra2xwgqfc3w";
};
checkInputs = [ pytestCheckHook ];

View File

@ -9,7 +9,7 @@
buildPythonPackage rec {
pname = "pytradfri";
version = "7.2.0";
version = "7.2.1";
disabled = pythonOlder "3.7";
@ -17,7 +17,7 @@ buildPythonPackage rec {
owner = "home-assistant-libs";
repo = "pytradfri";
rev = version;
sha256 = "sha256-/1K2jBgDuOIUb4WUownoceprZbOwSkQIqeEt07HfZrY=";
sha256 = "sha256-4+QdMuwDMLhIIzffHXG+LehuwR9QMcI/CeL5g8wOQfU=";
};
propagatedBuildInputs = [

View File

@ -1,4 +1,7 @@
{ aiohttp
{ lib
, stdenv
, aiohttp
, asttokens
, blinker
, botocore
, bottle
@ -7,61 +10,127 @@
, certifi
, chalice
, django
, executing
, fakeredis
, falcon
, fetchPypi
, flask
, fetchFromGitHub
, flask_login
, gevent
, httpx
, iana-etc
, isPy3k
, jsonschema
, libredirect
, pure-eval
, pyramid
, pyspark
, pytest-django
, pytest-forked
, pytest-localserver
, pytestCheckHook
, rq
, sanic
, sanic-testing
, sqlalchemy
, lib
, tornado
, urllib3
, trytond
, urllib3
, werkzeug
, executing
, pure-eval
, asttokens
}:
buildPythonPackage rec {
pname = "sentry-sdk";
version = "1.4.3";
version = "1.5.0";
format = "setuptools";
src = fetchPypi {
inherit pname version;
sha256 = "b9844751e40710e84a457c5bc29b21c383ccb2b63d76eeaad72f7f1c808c8828";
src = fetchFromGitHub {
owner = "getsentry";
repo = "sentry-python";
rev = version;
sha256 = "sha256-hJqopR/kvqU0trniHMOahi3oeIzeMvc74ujmfJ2iG48=";
};
checkInputs = [ blinker botocore chalice django flask tornado bottle rq falcon sqlalchemy werkzeug trytond
executing pure-eval asttokens ]
++ lib.optionals isPy3k [ celery pyramid sanic aiohttp ];
propagatedBuildInputs = [
certifi
urllib3
];
propagatedBuildInputs = [ urllib3 certifi ];
checkInputs = [
asttokens
blinker
botocore
bottle
chalice
django
executing
fakeredis
falcon
flask_login
gevent
jsonschema
pure-eval
pytest-django
pytest-forked
pytest-localserver
pytestCheckHook
rq
sqlalchemy
tornado
trytond
werkzeug
] ++ lib.optionals isPy3k [
aiohttp
celery
httpx
pyramid
pyspark
sanic
sanic-testing
];
doCheck = !stdenv.isDarwin;
# The Sentry tests need access to `/etc/protocols` (the tests call
# `socket.getprotobyname('tcp')`, which reads from this file). Normally
# this path isn't available in the sandbox. Therefore, use libredirect
# to make on eavailable from `iana-etc`. This is a test-only operation.
preCheck = lib.optionalString doCheck ''
export NIX_REDIRECTS=/etc/protocols=${iana-etc}/etc/protocols
export LD_PRELOAD=${libredirect}/lib/libredirect.so
'';
disabledTests = [
# Issue with the asseration
"test_auto_enabling_integrations_catches_import_error"
# Output mismatch in sqlalchemy test
"test_too_large_event_truncated"
# Failing falcon tests
"test_has_context"
"uri_template-"
"path-"
"test_falcon_large_json_request"
"test_falcon_empty_json_request"
"test_falcon_raw_data_request"
# Failing spark tests
"test_set_app_properties"
"test_start_sentry_listener"
# Failing threading test
"test_circular_references"
# Failing wsgi test
"test_session_mode_defaults_to_request_mode_in_wsgi_handler"
];
postCheck = "unset NIX_REDIRECTS LD_PRELOAD";
disabledTestPaths = [
# Some tests are failing (network access, assertion errors)
"tests/integrations/aiohttp/"
"tests/integrations/gcp/"
"tests/integrations/httpx/"
"tests/integrations/stdlib/test_httplib.py"
# Tests are blocking
"tests/integrations/celery/"
# pytest-chalice is not available in nixpkgs yet
"tests/integrations/chalice/"
];
# no tests
doCheck = false;
pythonImportsCheck = [ "sentry_sdk" ];
pythonImportsCheck = [
"sentry_sdk"
];
meta = with lib; {
description = "Python SDK for Sentry.io";
homepage = "https://github.com/getsentry/sentry-python";
description = "New Python SDK for Sentry.io";
license = licenses.bsd2;
maintainers = with maintainers; [ gebner ];
maintainers = with maintainers; [ fab gebner ];
};
}

View File

@ -17,14 +17,14 @@
buildPythonPackage rec {
pname = "softlayer";
version = "5.9.7";
version = "5.9.8";
disabled = pythonOlder "3.5";
src = fetchFromGitHub {
owner = pname;
repo = "softlayer-python";
rev = "v${version}";
sha256 = "0zwhykrpckx3ln4w6vlgp0nrkkr8343ni1w43hxznm55qmrllrpg";
sha256 = "087kyl2yacvh12i4x3357659mgq4xycv8a4y9rl3rj57kp5jc6ah";
};
propagatedBuildInputs = [

View File

@ -8,7 +8,7 @@
buildPythonPackage rec {
pname = "spiderpy";
version = "1.7.1";
version = "1.7.2";
format = "pyproject";
disabled = isPy27;
@ -17,7 +17,7 @@ buildPythonPackage rec {
owner = "peternijssen";
repo = "spiderpy";
rev = version;
sha256 = "sha256-gQ/Y5c8+aSvoJzXI6eQ9rk0xDPxpi0xgO3xBKR+vVrY=";
sha256 = "sha256-Yujy8HSMbK2DQ/913r2c74hKPYDfcHFKq04ysqxG+go=";
};
nativeBuildInputs = [

View File

@ -15,7 +15,7 @@
buildPythonPackage rec {
pname = "teslajsonpy";
version = "1.4.0";
version = "1.4.1";
format = "pyproject";
disabled = pythonOlder "3.6";
@ -24,7 +24,7 @@ buildPythonPackage rec {
owner = "zabuldon";
repo = pname;
rev = "v${version}";
sha256 = "17ld1ciylfc8kmf5iazzrlqqdf434wi5dfjzm68nm5d539gccfss";
sha256 = "1hnlymdi27rjxaivn5csqrj9ahk86cwvbpvdl29v7qal0y2bc433";
};
nativeBuildInputs = [

View File

@ -26,7 +26,7 @@
, file, libvirt, glib, vips, taglib, libopus, linux-pam, libidn, protobuf, fribidi, harfbuzz
, bison, flex, pango, python3, patchelf, binutils, freetds, wrapGAppsHook, atk
, bundler, libsass, libexif, libselinux, libsepol, shared-mime-info, libthai, libdatrie
, CoreServices, DarwinTools, cctools
, CoreServices, DarwinTools, cctools, libtool
}@args:
let
@ -280,7 +280,7 @@ in
};
grpc = attrs: {
nativeBuildInputs = [ pkg-config ];
nativeBuildInputs = [ pkg-config ] ++ lib.optional stdenv.isDarwin libtool;
buildInputs = [ openssl ];
hardeningDisable = [ "format" ];
NIX_CFLAGS_COMPILE = toString [
@ -297,6 +297,9 @@ in
postPatch = ''
substituteInPlace Makefile \
--replace '-Wno-invalid-source-encoding' ""
'' + lib.optionalString stdenv.isDarwin ''
substituteInPlace src/ruby/ext/grpc/extconf.rb \
--replace "ENV['AR'] = 'libtool -o' if RUBY_PLATFORM =~ /darwin/" ""
'';
};
@ -570,7 +573,7 @@ in
};
rugged = attrs: {
nativeBuildInputs = [ cmake pkg-config which ];
nativeBuildInputs = [ cmake pkg-config which ] ++ lib.optional stdenv.isDarwin libiconv;
buildInputs = [ openssl libssh2 zlib ];
dontUseCmakeConfigure = true;
};

View File

@ -46,13 +46,13 @@ with py.pkgs;
buildPythonApplication rec {
pname = "checkov";
version = "2.0.632";
version = "2.0.641";
src = fetchFromGitHub {
owner = "bridgecrewio";
repo = pname;
rev = version;
sha256 = "sha256-SDMp+QOZy2Ml5V8RHLvmTl/3/KB8iYaW0muakE8PnhA=";
sha256 = "sha256-/WmzMffHaD13aZsz6Ib/yaI+6b3UrexWpPv1oLR+PuM=";
};
nativeBuildInputs = with py.pkgs; [

View File

@ -4,13 +4,13 @@
}:
buildGoModule rec {
pname = "litestream";
version = "0.3.6";
version = "0.3.7";
src = fetchFromGitHub {
owner = "benbjohnson";
repo = pname;
rev = "v${version}";
sha256 = "sha256-A1okmeX3njyRXFKcXJPSV7Hg8Q/P7WqpGz2HThDdUQo=";
sha256 = "sha256-IEdTLf+fEp19FhwL3IaGT9HGKQoa6HwFox2gf0lvFu4=";
};
ldflags = [

View File

@ -2,17 +2,17 @@
buildGoModule rec {
pname = "spruce";
version = "1.28.0";
version = "1.29.0";
src = fetchFromGitHub {
owner = "geofffranks";
repo = pname;
rev = "v${version}";
sha256 = "sha256-cNO+6rMQPO1e4Hen8vcFU1FRnnCv2+fDYtXXbuR2UCU=";
sha256 = "sha256-HjJWiBYd1YFDZ+XOFcU2Df6bmKFBwVQ6YbiZv1IVN3A=";
};
deleteVendor = true;
vendorSha256 = "sha256-5EM4Z9AN1Mjy7DayII0Iu+XrjM9lyUqrScMT/fe43dw=";
vendorSha256 = "sha256-67PGSW3wV8i3mAt3rCuWbFmeOe+QhHXn2rTUmeN6YMA=";
meta = with lib; {
description = "A BOSH template merge tool";

View File

@ -25,14 +25,14 @@ const result = []
readFile
.on('line', line => {
const arr = line.match(/^ {2}resolved "([^#]+)#([^"]+)"$/)
const arr = line.match(/^ {2}resolved "([^#]+)(#[^"]+)?"$/)
if (arr !== null) {
const [_, url, shaOrRev] = arr
const fileName = urlToName(url)
result.push(` resolved "${fileName}#${shaOrRev}"`)
result.push(` resolved "${fileName}${shaOrRev ?? ''}"`)
} else {
result.push(line)
}

View File

@ -69,7 +69,7 @@ function fetchgit(fileName, url, rev, branch, builtinFetchGit) {
function fetchLockedDep(builtinFetchGit) {
return function (pkg) {
const { nameWithVersion, resolved } = pkg
const { integrity, nameWithVersion, resolved } = pkg
if (!resolved) {
console.error(
@ -102,14 +102,14 @@ function fetchLockedDep(builtinFetchGit) {
return fetchgit(fileName, urlForGit, rev, branch || 'master', builtinFetchGit)
}
const sha = sha1OrRev
const [algo, hash] = integrity ? integrity.split('-') : ['sha1', sha1OrRev]
return ` {
name = "${fileName}";
path = fetchurl {
name = "${fileName}";
url = "${url}";
sha1 = "${sha}";
${algo} = "${hash}";
};
}`
}

View File

@ -2,13 +2,13 @@
buildGoModule rec {
pname = "flyctl";
version = "0.0.250";
version = "0.0.260";
src = fetchFromGitHub {
owner = "superfly";
repo = "flyctl";
rev = "v${version}";
sha256 = "sha256-QhEstfzx0zqC+dDgqfgmi1zOdc491YbzVAgXVaoTVUU=";
sha256 = "sha256-xjvZp6LAKVYgZpiSHlfZzZ/OBp/UutjvndM46okC0b4=";
};
preBuild = ''
@ -17,7 +17,7 @@ buildGoModule rec {
subPackages = [ "." ];
vendorSha256 = "sha256-JxEl23bwfvd8jNBYqIXBIu1pNu2rt+jvdEl0RdXCidE=";
vendorSha256 = "sha256-lwayHq4uByCkiwzRd3lPaSAW4XvKNMVNcN4Cfct74e8=";
doCheck = false;

View File

@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "odamex";
version = "0.8.2";
version = "0.9.5";
src = fetchurl {
url = "mirror://sourceforge/${pname}/${pname}-src-${version}.tar.bz2";
sha256 = "0d4v1l7kghkz1xz92jxlx50x3iy94z7ix1i3209m5j5545qzxrqq";
sha256 = "sha256-WBqO5fWzemw1kYlY192v0nnZkbIEVuWmjWYMy+1ODPQ=";
};
nativeBuildInputs = [ cmake pkg-config ];

View File

@ -1,4 +1,8 @@
{
"compe-tmux": {
"date": "2021-12-07",
"new": "cmp-tmux"
},
"gist-vim": {
"date": "2020-03-27",
"new": "vim-gist"

File diff suppressed because it is too large Load Diff

View File

@ -748,7 +748,7 @@ self: super: {
libiconv
];
cargoSha256 = "sha256-XFo3FLaeLnXVQAEZol9PipqYYZ9C1z23S/qijxf0uIE=";
cargoSha256 = "sha256-zYm+7qAvhVGa/afddHhI2aQxmiLOkus5PHZBDP9S/Qg=";
};
in
''

Some files were not shown because too many files have changed in this diff Show More