Merge master into haskell-updates

This commit is contained in:
github-actions[bot] 2021-09-05 00:06:37 +00:00 committed by GitHub
commit 7a57a6bcd1
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
66 changed files with 12661 additions and 758 deletions

View File

@ -1324,6 +1324,12 @@
githubId = 7346933;
name = "betaboon";
};
bew = {
email = "benoit.dechezelles@gmail.com";
github = "bew";
githubId = 9730330;
name = "Benoit de Chezelles";
};
bfortz = {
email = "bernard.fortz@gmail.com";
github = "bfortz";
@ -6706,6 +6712,12 @@
githubId = 775189;
name = "Jordi Masip";
};
MaskedBelgian = {
email = "michael.colicchia@imio.be";
github = "MaskedBelgian";
githubId = 29855073;
name = "Michael Colicchia";
};
matdsoupe = {
github = "matdsoupe";
githubId = 44469426;
@ -10272,6 +10284,12 @@
githubId = 8668915;
name = "Stephane Schitter";
};
staccato = {
name = "staccato";
email = "moveq@riseup.net";
github = "staccato";
githubId = 86573128;
};
steell = {
email = "steve@steellworks.com";
github = "Steell";

View File

@ -1111,6 +1111,16 @@ Superuser created successfully.
make the apps fit better visually.
</para>
</listitem>
<listitem>
<para>
<literal>rofi</literal> has been updated from
<quote>1.6.1</quote> to <quote>1.7.0</quote>, one important
thing is the removal of the old xresources based configuration
setup. Read more
<link xlink:href="https://github.com/davatorium/rofi/blob/cb12e6fc058f4a0f4f/Changelog#L1">in
rofis changelog</link>.
</para>
</listitem>
</itemizedlist>
</section>
</section>

View File

@ -318,3 +318,5 @@ To be able to access the web UI this port needs to be opened in the firewall.
- `lib.formats.yaml`'s `generate` will not generate JSON anymore, but instead use more of the YAML-specific syntax.
- GNOME desktop environment now enables `QGnomePlatform` as the Qt platform theme, which should avoid crashes when opening file chooser dialogs in Qt apps by using XDG desktop portal. Additionally, it will make the apps fit better visually.
- `rofi` has been updated from '1.6.1' to '1.7.0', one important thing is the removal of the old xresources based configuration setup. Read more [in rofi's changelog](https://github.com/davatorium/rofi/blob/cb12e6fc058f4a0f4f/Changelog#L1).

View File

@ -2,16 +2,16 @@
buildGoModule rec {
pname = "hugo";
version = "0.87.0";
version = "0.88.0";
src = fetchFromGitHub {
owner = "gohugoio";
repo = pname;
rev = "v${version}";
sha256 = "sha256-2I1PDxbqtaOOlVbr7zhuawaFrFWM/PYt5QJm3N74Noc=";
sha256 = "sha256-6dJ8H9oJwIW7rY2NrYVKuWDjwrFc9C30Vb0i20+opM0=";
};
vendorSha256 = "sha256-0pkQ+VcmK2XLaQ2XJHh5/QftSdud6Eo1nlBK+L92xKU=";
vendorSha256 = "sha256-VX+oIz5wAyEQ4nky3kXmJZbMF0MvfAKdEAMLnS0hXc8=";
doCheck = false;

View File

@ -18,13 +18,13 @@
stdenv.mkDerivation rec {
pname = "notejot";
version = "3.1.1";
version = "3.1.2";
src = fetchFromGitHub {
owner = "lainsce";
repo = pname;
rev = version;
hash = "sha256-OmzEwShIpzIbonqwQmpdutd3tztm7Gmmo3qdt+DApWo=";
hash = "sha256-Exg9HxV3cxySuT8ifVyZgoATQ/FAC8umj3smJ7W/5/Y=";
};
nativeBuildInputs = [

View File

@ -1,16 +1,35 @@
{ stdenv, lib, fetchurl
, autoreconfHook, pkg-config, libxkbcommon, pango, which, git
, cairo, libxcb, xcbutil, xcbutilwm, xcbutilxrm, libstartup_notification
, bison, flex, librsvg, check
{ stdenv
, lib
, fetchFromGitHub
, autoreconfHook
, pkg-config
, libxkbcommon
, pango
, which
, git
, cairo
, libxcb
, xcbutil
, xcbutilwm
, xcbutilxrm
, xcb-util-cursor
, libstartup_notification
, bison
, flex
, librsvg
, check
}:
stdenv.mkDerivation rec {
pname = "rofi-unwrapped";
version = "1.6.1";
version = "1.7.0";
src = fetchurl {
url = "https://github.com/davatorium/rofi/releases/download/${version}/rofi-${version}.tar.gz";
sha256 = "04glljqbf9ckkc6x6fv4x1gqmy468n1agya0kd8rxdvz24wzf7cd";
src = fetchFromGitHub {
owner = "davatorium";
repo = "rofi";
rev = version;
fetchSubmodules = true;
sha256 = "03wdy56b3g8p2czb0qydrddyyhj3x037pirnhyqr5qbfczb9a63v";
};
preConfigure = ''
@ -20,8 +39,22 @@ stdenv.mkDerivation rec {
'';
nativeBuildInputs = [ autoreconfHook pkg-config ];
buildInputs = [ libxkbcommon pango cairo git bison flex librsvg check
libstartup_notification libxcb xcbutil xcbutilwm xcbutilxrm which
buildInputs = [
libxkbcommon
pango
cairo
git
bison
flex
librsvg
check
libstartup_notification
libxcb
xcbutil
xcbutilwm
xcbutilxrm
xcb-util-cursor
which
];
doCheck = false;
@ -30,7 +63,7 @@ stdenv.mkDerivation rec {
description = "Window switcher, run dialog and dmenu replacement";
homepage = "https://github.com/davatorium/rofi";
license = licenses.mit;
maintainers = with maintainers; [ ];
maintainers = with maintainers; [ bew ];
platforms = with platforms; linux;
};
}

View File

@ -195,9 +195,9 @@ rec {
};
terraform_1_0 = mkTerraform {
version = "1.0.5";
sha256 = "0nhxrlnwg76iiqs9hj6ls54176df78ys3356nxmd9ip8jx9ix47v";
vendorSha256 = "08fvp6w8xsv42jjgpr73kyah20g3979rf84ysrq5whvfmrbpzm2f";
version = "1.0.6";
sha256 = "1i1f2gmiv49ia6d4yi137s705vrxdc3rqxanjgwzysif11j6iwwc";
vendorSha256 = "00cl42w1mzsi9qd09wydfvp5f2h7lxaay6s2dv0mf47k6h7prf42";
patches = [ ./provider-path-0_15.patch ];
passthru = { inherit plugins; };
};

View File

@ -24,14 +24,14 @@
stdenv.mkDerivation rec {
pname = "chatty";
version = "0.3.2";
version = "0.3.4";
src = fetchFromGitLab {
domain = "source.puri.sm";
owner = "Librem5";
repo = "chatty";
rev = "v${version}";
sha256 = "sha256-/l8hysfBmXLbs2COIVjdr2JC1qX/c66DqOm2Gyqb9s8=";
sha256 = "0910f5bw75ph576gxbsd6ysdwnlk4ysdp0pml2i3mjqpcbkqfs3w";
};
postPatch = ''

View File

@ -28,14 +28,14 @@ let
in
assert lib.all (p: p.enabled -> ! (builtins.elem null p.buildInputs)) plugins;
stdenv.mkDerivation rec {
version = "3.2";
version = "3.2.1";
pname = "weechat";
hardeningEnable = [ "pie" ];
src = fetchurl {
url = "https://weechat.org/files/src/weechat-${version}.tar.bz2";
sha256 = "0pck4lczkk52mgwa1n0habp1xqi9xsgsh5q6bbsjmdbandvy5vc8";
sha256 = "sha256-gtFskJoJLw7cqLao46LRUcZobOtzgwUOiKf7I4OiJAQ=";
};
patches = [

View File

@ -8,13 +8,13 @@
buildGoModule rec {
pname = "lima";
version = "0.6.1";
version = "0.6.2";
src = fetchFromGitHub {
owner = "lima-vm";
repo = pname;
rev = "v${version}";
sha256 = "sha256-x4IRHxmVeP87M7rSrQWDd9pj2Rb9uGu133mExepxX6Q=";
sha256 = "sha256-kSJbSJ85cM6N+V67z+trNNuEO4O2KNs62JTy3Mz8Bi4=";
};
vendorSha256 = "sha256-PeIEIUX/PwwnbZfXnK3IsENO+zRYLhljBRe910aZgKs=";

View File

@ -40,7 +40,7 @@ rustPlatform.buildRustPackage rec {
postInstall = ''
mkdir -p $out/share
cp -R files/* $out/share
cp -R examples files/* $out/share
'';
postFixup = ''

View File

@ -14,6 +14,8 @@ stdenv.mkDerivation rec {
outputs = ["out" "hook"];
buildPhase = ''
runHook preBuild
$CC -Wall -std=c99 -O3 -fPIC -ldl -shared \
${lib.optionalString stdenv.isDarwin "-Wl,-install_name,$out/lib/$libName"} \
-o "$libName" \
@ -22,9 +24,18 @@ stdenv.mkDerivation rec {
if [ -n "$doInstallCheck" ]; then
$CC -Wall -std=c99 -O3 test.c -o test
fi
runHook postBuild
'';
# We want to retain debugging info to be able to use GDB on libredirect.so
# to more easily investigate which function overrides are missing or why
# existing ones do not have the intended effect.
dontStrip = true;
installPhase = ''
runHook preInstall
install -vD "$libName" "$out/lib/$libName"
mkdir -p "$hook/nix-support"
@ -36,6 +47,8 @@ stdenv.mkDerivation rec {
export LD_PRELOAD="$out/lib/$libName"
''}
SETUP_HOOK
runHook postInstall
'';
doInstallCheck = true;

View File

@ -17,15 +17,22 @@ static int nrRedirects = 0;
static char * from[MAX_REDIRECTS];
static char * to[MAX_REDIRECTS];
static int isInitialized = 0;
// FIXME: might run too late.
static void init() __attribute__((constructor));
static void init()
{
if (isInitialized) return;
char * spec = getenv("NIX_REDIRECTS");
if (!spec) return;
unsetenv("NIX_REDIRECTS");
// Ensure we only run this code once.
// We do not do `unsetenv("NIX_REDIRECTS")` to ensure that redirects
// also get initialized for subprocesses.
isInitialized = 1;
char * spec2 = malloc(strlen(spec) + 1);
strcpy(spec2, spec);

View File

@ -10,6 +10,7 @@
#include <sys/wait.h>
#define TESTPATH "/foo/bar/test"
#define SUBTEST "./test sub"
extern char **environ;
@ -36,7 +37,11 @@ void test_system(void) {
assert(system(TESTPATH) == 0);
}
int main(void)
void test_subprocess(void) {
assert(system(SUBTEST) == 0);
}
int main(int argc, char *argv[])
{
FILE *testfp;
int testfd;
@ -56,6 +61,14 @@ int main(void)
test_spawn();
test_system();
// Only run subprocess if no arguments are given
// as the subprocess will be called without argument
// otherwise we will have infinite recursion
if (argc == 1) {
test_subprocess();
}
test_execv();
/* If all goes well, this is never reached because test_execv() replaces

View File

@ -4,8 +4,17 @@
# This can be useful for deploying packages with NixOps, and to share
# binary dependencies between projects.
{ lib, stdenv, defaultCrateOverrides, fetchCrate, pkgsBuildBuild, rustc, rust
, cargo, jq }:
{ lib
, stdenv
, defaultCrateOverrides
, fetchCrate
, pkgsBuildBuild
, rustc
, rust
, cargo
, jq
, libiconv
}:
let
# Create rustc arguments to link against the given list of dependencies
@ -13,18 +22,21 @@ let
#
# See docs for crateRenames below.
mkRustcDepArgs = dependencies: crateRenames:
lib.concatMapStringsSep " " (dep:
lib.concatMapStringsSep " "
(dep:
let
normalizeName = lib.replaceStrings ["-"] ["_"];
normalizeName = lib.replaceStrings [ "-" ] [ "_" ];
extern = normalizeName dep.libName;
# Find a choice that matches in name and optionally version.
findMatchOrUseExtern = choices:
lib.findFirst (choice:
lib.findFirst
(choice:
(!(choice ? version)
|| choice.version == dep.version or ""))
{ rename = extern; }
choices;
name = if lib.hasAttr dep.crateName crateRenames then
name =
if lib.hasAttr dep.crateName crateRenames then
let choices = crateRenames.${dep.crateName};
in
normalizeName (
@ -34,11 +46,13 @@ let
)
else
extern;
in (if lib.any (x: x == "lib" || x == "rlib") dep.crateType then
in
(if lib.any (x: x == "lib" || x == "rlib") dep.crateType then
" --extern ${name}=${dep.lib}/lib/lib${extern}-${dep.metadata}.rlib"
else
" --extern ${name}=${dep.lib}/lib/lib${extern}-${dep.metadata}${stdenv.hostPlatform.extensions.sharedLibrary}")
) dependencies;
)
dependencies;
# Create feature arguments for rustc.
mkRustcFeatureArgs = lib.concatMapStringsSep " " (f: ''--cfg feature=\"${f}\"'');
@ -60,12 +74,13 @@ let
rustAttrs = rust;
in
/* The overridable pkgs.buildRustCrate function.
/* The overridable pkgs.buildRustCrate function.
*
* Any unrecognized parameters will be passed as to
* the underlying stdenv.mkDerivation.
*/
crate_: lib.makeOverridable (
crate_: lib.makeOverridable
(
# The rust compiler to use.
#
# Default: pkgs.rustc
@ -185,13 +200,28 @@ in
, postInstall
}:
let crate = crate_ // (lib.attrByPath [ crate_.crateName ] (attr: {}) crateOverrides crate_);
let
crate = crate_ // (lib.attrByPath [ crate_.crateName ] (attr: { }) crateOverrides crate_);
dependencies_ = dependencies;
buildDependencies_ = buildDependencies;
processedAttrs = [
"src" "nativeBuildInputs" "buildInputs" "crateBin" "crateLib" "libName" "libPath"
"buildDependencies" "dependencies" "features" "crateRenames"
"crateName" "version" "build" "authors" "colors" "edition"
"src"
"nativeBuildInputs"
"buildInputs"
"crateBin"
"crateLib"
"libName"
"libPath"
"buildDependencies"
"dependencies"
"features"
"crateRenames"
"crateName"
"version"
"build"
"authors"
"colors"
"edition"
"buildTests"
];
extraDerivationAttrs = builtins.removeAttrs crate processedAttrs;
@ -203,10 +233,10 @@ let crate = crate_ // (lib.attrByPath [ crate_.crateName ] (attr: {}) crateOverr
# crate2nix has a hack for the old bash based build script that did split
# entries at `,`. No we have to work around that hack.
# https://github.com/kolloch/crate2nix/blame/5b19c1b14e1b0e5522c3e44e300d0b332dc939e7/crate2nix/templates/build.nix.tera#L89
crateBin = lib.filter (bin: !(bin ? name && bin.name == ",")) (crate.crateBin or []);
crateBin = lib.filter (bin: !(bin ? name && bin.name == ",")) (crate.crateBin or [ ]);
hasCrateBin = crate ? crateBin;
in
stdenv.mkDerivation (rec {
in
stdenv.mkDerivation (rec {
inherit (crate) crateName;
inherit
@ -228,8 +258,8 @@ stdenv.mkDerivation (rec {
name = "rust_${crate.crateName}-${crate.version}${lib.optionalString buildTests_ "-test"}";
version = crate.version;
depsBuildBuild = [ pkgsBuildBuild.stdenv.cc ];
nativeBuildInputs = [ rust stdenv.cc cargo jq ] ++ (crate.nativeBuildInputs or []) ++ nativeBuildInputs_;
buildInputs = (crate.buildInputs or []) ++ buildInputs_;
nativeBuildInputs = [ rust stdenv.cc cargo jq ] ++ (crate.nativeBuildInputs or [ ]) ++ nativeBuildInputs_;
buildInputs = lib.optionals stdenv.isDarwin [ libiconv ] ++ (crate.buildInputs or [ ]) ++ buildInputs_;
dependencies = map lib.getLib dependencies_;
buildDependencies = map lib.getLib buildDependencies_;
@ -250,12 +280,14 @@ stdenv.mkDerivation (rec {
# Seed the symbol hashes with something unique every time.
# https://doc.rust-lang.org/1.0.0/rustc/metadata/loader/index.html#frobbing-symbols
metadata = let
metadata =
let
depsMetadata = lib.foldl' (str: dep: str + dep.metadata) "" (dependencies ++ buildDependencies);
hashedMetadata = builtins.hashString "sha256"
(crateName + "-" + crateVersion + "___" + toString (mkRustcFeatureArgs crateFeatures) +
"___" + depsMetadata + "___" + rustAttrs.toRustTarget stdenv.hostPlatform);
in lib.substring 0 10 hashedMetadata;
in
lib.substring 0 10 hashedMetadata;
build = crate.build or "";
# Either set to a concrete sub path to the crate root
@ -263,14 +295,14 @@ stdenv.mkDerivation (rec {
workspace_member = crate.workspace_member or ".";
crateVersion = crate.version;
crateDescription = crate.description or "";
crateAuthors = if crate ? authors && lib.isList crate.authors then crate.authors else [];
crateAuthors = if crate ? authors && lib.isList crate.authors then crate.authors else [ ];
crateHomepage = crate.homepage or "";
crateType =
if lib.attrByPath ["procMacro"] false crate then ["proc-macro"] else
if lib.attrByPath ["plugin"] false crate then ["dylib"] else
(crate.type or ["lib"]);
if lib.attrByPath [ "procMacro" ] false crate then [ "proc-macro" ] else
if lib.attrByPath [ "plugin" ] false crate then [ "dylib" ] else
(crate.type or [ "lib" ]);
colors = lib.attrByPath [ "colors" ] "always" crate;
extraLinkFlags = lib.concatStringsSep " " (crate.extraLinkFlags or []);
extraLinkFlags = lib.concatStringsSep " " (crate.extraLinkFlags or [ ]);
edition = crate.edition or null;
extraRustcOpts =
lib.optionals (crate ? extraRustcOpts) crate.extraRustcOpts
@ -297,20 +329,22 @@ stdenv.mkDerivation (rec {
outputs = if buildTests then [ "out" ] else [ "out" "lib" ];
outputDev = if buildTests then [ "out" ] else [ "lib" ];
} // extraDerivationAttrs
)) {
} // extraDerivationAttrs
)
)
{
rust = rustc;
release = crate_.release or true;
verbose = crate_.verbose or true;
extraRustcOpts = [];
features = [];
nativeBuildInputs = [];
buildInputs = [];
extraRustcOpts = [ ];
features = [ ];
nativeBuildInputs = [ ];
buildInputs = [ ];
crateOverrides = defaultCrateOverrides;
preUnpack = crate_.preUnpack or "";
postUnpack = crate_.postUnpack or "";
prePatch = crate_.prePatch or "";
patches = crate_.patches or [];
patches = crate_.patches or [ ];
postPatch = crate_.postPatch or "";
preConfigure = crate_.preConfigure or "";
postConfigure = crate_.postConfigure or "";
@ -318,8 +352,8 @@ stdenv.mkDerivation (rec {
postBuild = crate_.postBuild or "";
preInstall = crate_.preInstall or "";
postInstall = crate_.postInstall or "";
dependencies = crate_.dependencies or [];
buildDependencies = crate_.buildDependencies or [];
crateRenames = crate_.crateRenames or {};
dependencies = crate_.dependencies or [ ];
buildDependencies = crate_.buildDependencies or [ ];
crateRenames = crate_.crateRenames or { };
buildTests = crate_.buildTests or false;
}

View File

@ -1,7 +1,29 @@
{ lib, stdenv, pkg-config, curl, darwin, libiconv, libgit2, libssh2,
openssl, sqlite, zlib, dbus, dbus-glib, gdk-pixbuf, cairo, python3,
libsodium, postgresql, gmp, foundationdb, capnproto, nettle, clang,
llvmPackages, linux-pam, ... }:
{ lib
, stdenv
, pkg-config
, curl
, darwin
, libgit2
, libssh2
, openssl
, sqlite
, zlib
, dbus
, dbus-glib
, gdk-pixbuf
, cairo
, python3
, libsodium
, postgresql
, gmp
, foundationdb
, capnproto
, nettle
, clang
, llvmPackages
, linux-pam
, ...
}:
let
inherit (darwin.apple_sdk.frameworks) CoreFoundation Security;
@ -17,20 +39,20 @@ in
cargo = attrs: {
buildInputs = [ openssl zlib curl ]
++ lib.optionals stdenv.isDarwin [ CoreFoundation Security libiconv ];
++ lib.optionals stdenv.isDarwin [ CoreFoundation Security ];
};
libz-sys = attrs: {
nativeBuildInputs = [ pkg-config ];
buildInputs = [ zlib ];
extraLinkFlags = ["-L${zlib.out}/lib"];
extraLinkFlags = [ "-L${zlib.out}/lib" ];
};
curl-sys = attrs: {
nativeBuildInputs = [ pkg-config ];
buildInputs = [ zlib curl ];
propagatedBuildInputs = [ curl zlib ];
extraLinkFlags = ["-L${zlib.out}/lib"];
extraLinkFlags = [ "-L${zlib.out}/lib" ];
};
dbus = attrs: {
@ -115,7 +137,7 @@ in
rink = attrs: {
buildInputs = [ gmp ];
crateBin = [ { name = "rink"; path = "src/bin/rink.rs"; } ];
crateBin = [{ name = "rink"; path = "src/bin/rink.rs"; }];
};
security-framework-sys = attr: {

View File

@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "papirus-icon-theme";
version = "20210802";
version = "20210901";
src = fetchFromGitHub {
owner = "PapirusDevelopmentTeam";
repo = pname;
rev = version;
sha256 = "sha256-run7F1iGq1h7o06zS/RNpCMhK5WDH++knLN+MvMcSy8=";
sha256 = "sha256-SbqEHLXSomUUaLRJA1MJbtF1lTQPiWSUXgapjEzSl00=";
};
nativeBuildInputs = [ gtk3 ];

View File

@ -1,30 +1,27 @@
{ lib, stdenv, fetchFromGitHub
, python3, boost
, cmake
}:
stdenv.mkDerivation rec {
pname = "trellis";
version = "2021.07.06";
{ lib, stdenv, fetchFromGitHub, python3, boost, cmake }:
let
rev = "03e0070f263fbe31c247de61d259544722786210";
# git describe --tags
realVersion = with lib; with builtins;
"1.0-482-g${substring 0 7 (elemAt srcs 0).rev}";
realVersion = "1.0-532-g${builtins.substring 0 7 rev}";
in stdenv.mkDerivation rec {
pname = "trellis";
version = "2021-09-01";
srcs = [
(fetchFromGitHub {
owner = "YosysHQ";
repo = "prjtrellis";
rev = "dff1cbcb1bd30de7e96f8a059f2e19be1bb2e44d";
sha256 = "1gbrka9gqn124shx448aivbgywyp30zyjwfazr7v49lhrl7d46lb";
inherit rev;
sha256 = "joQMsjVj8d3M3IaqOkfVQ1I5qPDM8HHJiye+Ak8f3dg=";
name = "trellis";
})
(fetchFromGitHub {
owner = "YosysHQ";
repo = "prjtrellis-db";
rev = "0ee729d20eaf9f1e0f1d657bc6452e3ffe6a0d63";
sha256 = "0069c98bb4wilxz21snwc39yy0rm7ffma179djyz57d99p0vcfkq";
rev = "fdf4bf275a7402654bc643db537173e2fbc86103";
sha256 = "eDq2wU2pnfK9bOkEVZ07NQPv02Dc6iB+p5GTtVBiyQA=";
name = "trellis-database";
})
];
@ -34,14 +31,11 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ cmake python3 ];
cmakeFlags = [
"-DCURRENT_GIT_VERSION=${realVersion}"
# TODO: should this be in stdenv instead?
"-DCMAKE_INSTALL_DATADIR=${placeholder "out"}/share"
];
preConfigure = with builtins; ''
rmdir database && ln -sfv ${elemAt srcs 1} ./database
preConfigure = ''
rmdir database && ln -sfv ${builtins.elemAt srcs 1} ./database
source environment.sh
cd libtrellis
'';
@ -53,9 +47,9 @@ stdenv.mkDerivation rec {
to provide sufficient information to develop a free and
open Verilog to bitstream toolchain for these devices.
'';
homepage = "https://github.com/SymbiFlow/prjtrellis";
license = lib.licenses.isc;
homepage = "https://github.com/YosysHQ/prjtrellis";
license = licenses.isc;
maintainers = with maintainers; [ q3k thoughtpolice emily ];
platforms = lib.platforms.all;
platforms = platforms.all;
};
}

View File

@ -6,7 +6,7 @@
stdenv.mkDerivation rec {
pname = "intel-media-driver";
version = "21.3.2";
version = "21.3.3";
outputs = [ "out" "dev" ];
@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
owner = "intel";
repo = "media-driver";
rev = "intel-media-${version}";
sha256 = "0d2w1wmq6w2hjyja7zn9f3glykk14mvphj00dbqkbsla311gkqw4";
sha256 = "1j33qq53jjmcvpr9w1xlyl5bpmq4rmshrd123l9alc2ddqbngrf7";
};
cmakeFlags = [

View File

@ -111005,7 +111005,7 @@ in
"rust-analyzer-build-deps-../../misc/vscode-extensions/rust-analyzer/build-deps" = nodeEnv.buildNodePackage {
name = "rust-analyzer";
packageName = "rust-analyzer";
version = "0.2.718";
version = "0.2.727";
src = ../../misc/vscode-extensions/rust-analyzer/build-deps;
dependencies = [
sources."@babel/code-frame-7.12.11"

View File

@ -10,14 +10,14 @@
buildPythonPackage rec {
pname = "aiokafka";
version = "0.7.1";
version = "0.7.2";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "aio-libs";
repo = pname;
rev = "v${version}";
sha256 = "sha256-D89ppIUliJJMDuCySrZUyN6Rlm01gFskz6ayHmqploc=";
sha256 = "sha256-D+91k4zVg28qPbWIrvyXi6WtDs1jeJt9jFGsrSBA3cs=";
};
nativeBuildInputs = [

View File

@ -1,31 +1,36 @@
{ lib
, fetchPypi
, buildPythonPackage
, isPy3k
, pythonOlder
, ifaddr
, bitstring
}:
buildPythonPackage rec {
pname = "aiolifx";
version = "0.6.10";
version = "0.7.0";
disabled = pythonOlder "3.4";
src = fetchPypi {
inherit pname version;
sha256 = "b3aaf814dbc03666b22b08103990f260e58616ea64f2a28396653ef3b5fad4f9";
sha256 = "sha256-9FwTYcaXwGMMnhp+MXe1Iu8Og5aHL6qo9SVKWHFtc7o=";
};
propagatedBuildInputs = [
bitstring
ifaddr
];
# tests are not implemented
doCheck = false;
disabled = !isPy3k;
propagatedBuildInputs = [ bitstring ifaddr ];
pythonImportsCheck = [ "aiolifx" ];
meta = with lib; {
description = "API for local communication with LIFX devices over a LAN";
homepage = "https://github.com/frawau/aiolifx";
license = licenses.mit;
description = "API for local communication with LIFX devices over a LAN with asyncio";
maintainers = with maintainers; [ netixx ];
};
}

View File

@ -7,13 +7,13 @@
buildPythonPackage rec {
pname = "anyascii";
version = "0.2.0";
version = "0.3.0";
format = "setuptools";
disabled = pythonOlder "3.3";
src = fetchPypi {
inherit pname version;
sha256 = "1b6jdd9nx15py0jqjdn154m6m491517sqlk57bbyj3x4xzywadkh";
sha256 = "sha256-JPJ0Mftkxsk6MxJftm+MugB6UmK8H6q+r+2l9LtwtZM=";
};
checkInputs = [

View File

@ -1,24 +1,38 @@
{ lib, fetchPypi, buildPythonPackage, isPy27
, mock, pytestCheckHook, nose, hypothesis
{ lib
, buildPythonPackage
, fetchPypi
, hypothesis
, isPy27
, mock
, nose
, pytestCheckHook
}:
buildPythonPackage rec {
pname = "dpath";
version = "2.0.1";
version = "2.0.2";
disabled = isPy27; # uses python3 imports
src = fetchPypi {
inherit pname version;
sha256 = "bea06b5f4ff620a28dfc9848cf4d6b2bfeed34238edeb8ebe815c433b54eb1fa";
sha256 = "sha256-BA2+ShAeG2sbZenaJYU08PCwrgCjsf0tWS/oV5/4N64=";
};
# use pytest as nosetests hangs
checkInputs = [ mock nose pytestCheckHook hypothesis ];
checkInputs = [
hypothesis
mock
nose
pytestCheckHook
];
pythonImportsCheck = [ "dpath" ];
meta = with lib; {
description = "Python library for accessing and searching dictionaries via /slashed/paths ala xpath";
homepage = "https://github.com/akesterson/dpath-python";
license = [ licenses.mit ];
description = "A python library for accessing and searching dictionaries via /slashed/paths ala xpath";
maintainers = [ maintainers.mmlb ];
license = with licenses; [ mit ];
maintainers = with maintainers; [ mmlb ];
};
}

View File

@ -5,11 +5,11 @@
buildPythonPackage rec {
pname = "eth-hash";
version = "0.3.1";
version = "0.3.2";
src = fetchPypi {
inherit pname version;
sha256 = "aee46d9c43b98ac6d4ddf957cf75d4d0a5174ee814cc6b53dd6134dcedb459bf";
sha256 = "3f40cecd5ead88184aa9550afc19d057f103728108c5102f592f8415949b5a76";
};
checkInputs = [ pytest ];

View File

@ -16,12 +16,12 @@
buildPythonPackage rec {
pname = "fakeredis";
version = "1.5.2";
version = "1.6.0";
disabled = pythonOlder "3.5";
src = fetchPypi {
inherit pname version;
sha256 = "18fc1808d2ce72169d3f11acdb524a00ef96bd29970c6d34cfeb2edb3fc0c020";
sha256 = "sha256-Ecz8l2nXGNN+RbOC5kproCWGtiKvoDcaa9hXZtciVfM=";
};
propagatedBuildInputs = [
@ -40,6 +40,11 @@ buildPythonPackage rec {
pytestCheckHook
];
disabledTestPaths = [
# Missing support for later pytest-asyncio, https://github.com/jamesls/fakeredis/issues/307
"test/test_aioredis1.py"
];
pythonImportsCheck = [ "fakeredis" ];
meta = with lib; {

View File

@ -5,11 +5,11 @@
buildPythonPackage rec {
pname = "ledgerblue";
version = "0.1.35";
version = "0.1.37";
src = fetchPypi {
inherit pname version;
sha256 = "44fbd8fcf62430a6b84d4e826a9ef7fc21c77a7d8ff275f3952d6086ef06d076";
sha256 = "f34945c9bd4b9846ed9e48ecc239d3e9aec64c3a45411092d133260246169854";
};
propagatedBuildInputs = [

View File

@ -6,11 +6,11 @@
buildPythonPackage rec {
pname = "lupa";
version = "1.9";
version = "1.10";
src = fetchPypi {
inherit pname version;
sha256 = "13ifv0nxbf70xg69sp49j484m8cnid7rgh8f94pgfb50dj01vqd3";
sha256 = "sha256-4lEbJ/OB9v22bvQNzFGCFQOBl0MbJBk1Z438PVEXgjE=";
};
nativeBuildInputs = [ cython ];

View File

@ -2,12 +2,12 @@
buildPythonPackage rec {
pname = "mailmanclient";
version = "3.3.2";
version = "3.3.3";
disabled = !isPy3k;
src = fetchPypi {
inherit pname version;
sha256 = "4082ac0c66d7f7bee15751fe2564098b971177c0013e66d0c8ceee1ebdcb5592";
sha256 = "92fe624675e41f41f59de1208e0125dfaa8d062bbe6138bd7cd79e4dd0b6f85e";
};
propagatedBuildInputs = [ six httplib2 requests ];

View File

@ -44,7 +44,7 @@ buildPythonPackage rec {
pytest-regressions
pytestCheckHook
];
pytestImportsCheck = [ "markdown_it" ];
pythonImportsCheck = [ "markdown_it" ];
meta = with lib; {
description = "Markdown parser done right";

View File

@ -0,0 +1,23 @@
{ lib, fetchFromGitHub, buildPythonPackage, docutils }:
buildPythonPackage rec {
pname = "rstcheck";
version = "v3.3.1";
src = fetchFromGitHub {
owner = "myint";
repo = pname;
rev = version;
sha256 = "sha256-4AhENuT+LtUMCi+aaI/rKa2gHti8sKGLdVGjdRithXI=";
};
pythonImportsCheck = [ "rstcheck" ];
propagatedBuildInputs = [ docutils ];
meta = with lib; {
description = "Checks syntax of reStructuredText and code blocks nested within it";
homepage = "https://github.com/myint/rstcheck";
license = licenses.mit;
maintainers = with maintainers; [ staccato ];
};
}

View File

@ -18,7 +18,7 @@
buildPythonPackage rec {
pname = "surepy";
version = "0.7.0";
version = "0.7.1";
format = "pyproject";
disabled = pythonOlder "3.8";
@ -26,7 +26,7 @@ buildPythonPackage rec {
owner = "benleb";
repo = pname;
rev = "v${version}";
sha256 = "04ywkbgs1lnnlhxakbr96crwc8hl97px8w7yigps2ki69md0xf60";
sha256 = "sha256-h2PEzS3R7NXIUWYOiTpe5ZEU1RopaRj1phudmvcklug=";
};
postPatch = ''

View File

@ -0,0 +1,24 @@
{ lib, buildPythonPackage, fetchFromGitHub, git }:
buildPythonPackage rec {
pname = "versiontag";
version = "1.2.0";
src = fetchFromGitHub {
owner = "thelabnyc";
repo = "python-versiontag";
rev = "r${version}";
sha256 = "1axv2214ykgv5adajv10v2zy5fr9v77db54rkik6ja29p66zl90n";
};
checkInputs = [ git ];
pythonImportsCheck = [ "versiontag" ];
meta = with lib; {
description = "Python library designed to make accessing the current version number of your software easy";
homepage = "https://github.com/thelabnyc/python-versiontag";
license = licenses.isc;
maintainers = with maintainers; [ MaskedBelgian ];
};
}

View File

@ -6,14 +6,14 @@
buildPythonPackage rec {
pname = "xdis";
version = "5.0.10";
version = "5.0.11";
disabled = isPy27;
src = fetchFromGitHub {
owner = "rocky";
repo = "python-xdis";
rev = version;
sha256 = "sha256-/3qyMgliua7W4Va1HdRbHyiR/eBQzHK+GrZVAMvMhLA=";
sha256 = "sha256-KTPu0+bERLRCVESqJgBPtcftlniWl2+C9GDcf84ssiA=";
};
checkInputs = [ pytest ];

View File

@ -2,16 +2,16 @@
buildGoModule rec {
pname = "pack";
version = "0.18.0";
version = "0.20.0";
src = fetchFromGitHub {
owner = "buildpacks";
repo = pname;
rev = "v${version}";
sha256 = "sha256-+fYw5dIDJJKGQKBL6RQh1SCQufbAkKeuJpPlywzbbnM=";
sha256 = "sha256-G1tnk0SlQVX4bEifmuZahazNv3bbdgmcr1V0dN9dlKc=";
};
vendorSha256 = "sha256-fSUTl5W/DyloCuCpEqA5z4bhB7wYxzPt6E0SfjorfQ0=";
vendorSha256 = "sha256-jeOK4k1W/5LvqB52LriKD5jNvZa/nc2ypRowrem2y30=";
nativeBuildInputs = [ installShellFiles ];

View File

@ -0,0 +1,31 @@
{ lib
, buildGoModule
, fetchFromGitHub
}:
buildGoModule rec {
pname = "dockfmt";
version = "0.3.3";
src = fetchFromGitHub {
owner = "jessfraz";
repo = "dockfmt";
rev = "v${version}";
sha256 = "0m56ydmf7zbcsa5yym7j5fgr75v677h9s40zyzwrqccyq01myp06";
};
vendorSha256 = null;
ldflags = [
"-w"
"-s"
"-X github.com/jessfraz/dockfmt/version.VERSION=${version}"
];
meta = with lib; {
description = "Dockerfile format";
homepage = "https://github.com/jessfraz/dockfmt";
license = [ licenses.mit ];
maintainers = [ maintainers.cpcloud ];
};
}

View File

@ -22,7 +22,7 @@ let
in
rec {
electron = electron_13;
electron = electron_14;
electron_3 = mkElectron "3.1.13" {
x86_64-linux = "1psmbplz6jhnnf6hmfhxbmmhn4n1dpnhzbc12pxn645xhfpk9ark";
@ -95,33 +95,43 @@ rec {
headers = "01x6a0r2jawjpl09ixgzap3g0z6znj34hsnnhzanavkbds0ri4k6";
};
electron_11 = mkElectron "11.4.12" {
x86_64-linux = "948e6377c3efc63429f3fa689566238ccb196abb8077dd984d3959c2b239b8be";
x86_64-darwin = "f932761acaf78a69fcacf5b4ec858877a05afa3cea03952a3ad9619b51095398";
i686-linux = "593df3f688032fd035a7e49c6b34c3c801eef0cf47671d2437ce51ccafde8d69";
armv7l-linux = "0905b508f30a9ab4f5e6d166e3c7fb924da3cfe569a684ca6dcf5159beb8439d";
aarch64-linux = "886bdd7f6b85ed4ba9a1de0d50dd51fbdbe76b2d669e91683a9156f073b69a2c";
aarch64-darwin = "bb9d65d7c9d02be57e62435e8f7427c1c8608e74aff709a20abc76ee0be005a9";
headers = "0gb56pxdkn8970z141l3p30lkizqca6kqj1cvgbp685xmb231hzq";
electron_11 = mkElectron "11.5.0" {
x86_64-linux = "613ef8ac00c5abda425dfa48778a68f58a2e9c7c1f82539bb1a41afabbd6193f";
x86_64-darwin = "32937dca29fc397f0b15dbab720ed3edb88eee24f00f911984b307bf12dc8fd5";
i686-linux = "cd154c56d02d7b1f16e2bcd5650bddf0de9141fdbb8248adc64f6d607e5fb725";
armv7l-linux = "3f5a41037aaad658051d8bc8b04e8dece72b729dd1a1ed8311b365daa8deea76";
aarch64-linux = "f698a7743962f553fe36673f1c85bccbd918efba8f6dca3a3df39d41c8e2de3e";
aarch64-darwin = "749fb6bd676e174de66845b8ac959985f30a773dcb2c05553890bd99b94c9d60";
headers = "1zkdgpjrh1dc9j8qyrrrh49v24960yhvwi2c530qbpf2azgqj71b";
};
electron_12 = mkElectron "12.0.18" {
x86_64-linux = "09a7908b98a1783bd3840fa289f0ce8d2badada698ddc9daff4398a969292ef2";
x86_64-darwin = "ab5071568614998adc3b12c93966f82b27da2f13a7317433a32252dd83593d08";
i686-linux = "0fbf1cb8cd3e5581ee80f49453c86673b4e91c7f599fdcb53af040c6d1992cb8";
armv7l-linux = "da064a1b86f42a5091ee1162fcad55b1a1f8a8168534a86e37dabd056b54ecbd";
aarch64-linux = "7197e1ae54af3cc20f312b01a200c75f6a6e0a1b38d0ca48492ead178a607edc";
aarch64-darwin = "aed2fbafb955f879c65099aebef504fd8076a452d25ccd1cd38d4d1b8758770e";
headers = "1m1ycv1ysr3aram1d3rj7b4w5dy63irq67x3ff355h33n6dhi4cf";
electron_12 = mkElectron "12.1.0" {
x86_64-linux = "b573f88a892e3f282352466db711734a678289edce83271f16865d63df4e8c85";
x86_64-darwin = "0c036793cfebb6ed680b13e11804560ec301fc26c68737045a3e9dcee3e8930b";
i686-linux = "0dced2796addc5e5440ca58691efd3ad683ae41906dea84ef517dd855c3df5a1";
armv7l-linux = "a1a07f550869f9a22b1ddc0f325ff5d60a792c7c8cf206c70f26c8d8867ced27";
aarch64-linux = "58da83b9e5c231ba0078cb2723530ab1be2c97d0c4036c88c7146cdf1a08ddac";
aarch64-darwin = "01e9f4c12f86eef6e79a594880b2415decad604fb1a7bb5d8086f6dcebc2de7c";
headers = "040ikf5wcz9zm0kprpggl3jiw8lj4msnh8kjqaacjk480wgv6k5q";
};
electron_13 = mkElectron "13.2.3" {
x86_64-linux = "495b0c96427c63f6f4d08c5b58d6379f9ee3c6c81148fbbe8a7a6a872127df6d";
x86_64-darwin = "c02f116484a5e1495d9f7451638bc0d3dea8fa2fde2e4c9c88a17cff98192ddc";
i686-linux = "03fb8cad91fcbb578027b814119b09cd1ddd414f159c9012850655f9171847c1";
armv7l-linux = "d8aaf2b49b9ab0a46caa31ed7d4358a3223efeaf90941d3d5e272532718ed754";
aarch64-linux = "cbbf9f98b1cfbee3fcd0869632a03542408dfd35f2e4d5b72cd823ce9448f659";
aarch64-darwin = "ef375063e30bc51bbcbe16fb7e5d85933eb60888ccc159c391aefc4f6d616faa";
headers = "0ayiklr84x7xhh5nz2dfzq2fkqivb9y9axfy7q9n4ps08xbqycyr";
electron_13 = mkElectron "13.3.0" {
x86_64-linux = "dae470d4685c1e18ea399cb4607d598a325d1a5143d1fabc15e3ec112a65b65b";
x86_64-darwin = "d8c673aca3cd5b0d573c24c9fd29ff6f6cea52daa2e9feb680c7d05c7982cf53";
i686-linux = "1569e39548493d4cc6a4feed1386ab18238705d20ed98078567db5439b9cafa5";
armv7l-linux = "91e6dec7be053a599cf4b6ab13e577ddb68fb35bd7a786c4f7e31a73b663aa59";
aarch64-linux = "147a43797e3aac97845a87f744cceacdfbed19b8017eea25f2e48cf519e20cfe";
aarch64-darwin = "f0e0b7e1a9a1ce41abbc2b64a8f1070b966535b4c90e6e293481c2e47a3f1a90";
headers = "1cxrpw5yzbv0gscmyzh0041smxirifp9f8nchn212csanjdycn6x";
};
electron_14 = mkElectron "14.0.0" {
x86_64-linux = "0a40533a50a42e6668e5265a84e2983979eededbb61f9e201d569d8b1b37ce0f";
x86_64-darwin = "4025c50cb9a0dce1a7b5d5698ee5412e55abeae386329ffe293152a8c42388e8";
i686-linux = "955280a0eb862eef913f9f394c7c7574138a5a48ffa85c59e84cc0163564fbfa";
armv7l-linux = "825684b3f759bc6c5d2e5be7c6a7679b7a1b8e0d9091f7d2f9904d0c24f6c978";
aarch64-linux = "367e76b34dcc58371232c87f540dd227c51de94ce8a916761379c3c4b890dd80";
aarch64-darwin = "0df8ced31e56243adb17f328e8d580a50e22d46403b2bb28d8922d2515904d94";
headers = "129rw4a05ixkyiiag2dgadcm34ndfajd896k11siahcij7rn4j7g";
};
}

View File

@ -6,14 +6,14 @@
rustPlatform.buildRustPackage rec {
pname = "rust-analyzer-unwrapped";
version = "2021-08-23";
cargoSha256 = "sha256-FMOLYR8cyimAA71SlxcT370wpeNH4f8vwv+oAhUd8zc=";
version = "2021-08-30";
cargoSha256 = "sha256-ba/4mQSBJin3yoIZjzFTiEIRY2eWFQI2pY1dOCZ1ALw=";
src = fetchFromGitHub {
owner = "rust-analyzer";
repo = "rust-analyzer";
rev = version;
sha256 = "sha256-6Tbgy77Essi3Hyd5kdJ7JJbx7RuFZQWURfRrpScvPPQ=";
sha256 = "sha256-mgwoJfvO3W4MYk6ikgck14e+hMjA2D+4lpnkAEeLEWA=";
};
patches = [

View File

@ -15,6 +15,10 @@
"date": "2021-08-22",
"new": "toggleterm-nvim"
},
"sql-nvim": {
"date": "2021-09-03",
"new": "sqlite-lua"
},
"vim-jade": {
"date": "2020-03-27",
"new": "vim-pug"

File diff suppressed because it is too large Load Diff

View File

@ -203,7 +203,7 @@ self: super: {
direnv-vim = super.direnv-vim.overrideAttrs (oa: {
preFixup = oa.preFixup or "" + ''
substituteInPlace $out/share/vim-plugins/direnv-vim/autoload/direnv.vim \
substituteInPlace $out/share/vim-plugins/direnv.vim/autoload/direnv.vim \
--replace "let s:direnv_cmd = get(g:, 'direnv_cmd', 'direnv')" \
"let s:direnv_cmd = get(g:, 'direnv_cmd', '${lib.getBin direnv}/bin/direnv')"
'';
@ -479,7 +479,7 @@ self: super: {
dependencies = with self; [ skim ];
});
sql-nvim = super.sql-nvim.overrideAttrs (old: {
sqlite-lua = super.sqlite-lua.overrideAttrs (old: {
postPatch = ''
substituteInPlace lua/sql/defs.lua \
--replace "vim.g.sql_clib_path or" "vim.g.sql_clib_path or '${sqlite.out}/lib/libsqlite3.so' or"
@ -516,7 +516,7 @@ self: super: {
});
telescope-frecency-nvim = super.telescope-frecency-nvim.overrideAttrs (old: {
dependencies = with self; [ sql-nvim telescope-nvim ];
dependencies = with self; [ sqlite-lua telescope-nvim ];
});
telescope-fzf-writer-nvim = super.telescope-fzf-writer-nvim.overrideAttrs (old: {

View File

@ -62,6 +62,7 @@ chikatoike/concealedyank.vim
chikatoike/sourcemap.vim
chkno/vim-haskell-module-name
chr4/nginx.vim
chr4/sslsecure.vim
chrisbra/CheckAttach
chrisbra/csv.vim
chrisbra/NrrwRgn
@ -122,6 +123,7 @@ easymotion/vim-easymotion
eddiebergman/nvim-treesitter-pyfold
eddyekofo94/gruvbox-flat.nvim
editorconfig/editorconfig-vim
edkolev/tmuxline.vim
edluffy/hologram.nvim@main
edluffy/specs.nvim@main
edwinb/idris2-vim
@ -299,6 +301,7 @@ junegunn/seoul256.vim
junegunn/vader.vim
junegunn/vim-after-object
junegunn/vim-easy-align
junegunn/vim-emoji
junegunn/vim-github-dashboard
junegunn/vim-peekaboo
junegunn/vim-plug
@ -456,7 +459,7 @@ nanotech/jellybeans.vim
natebosch/vim-lsc
nathanaelkane/vim-indent-guides
nathangrigg/vim-beancount
nathunsmitty/nvim-ale-diagnostic@main
nathanmsmith/nvim-ale-diagnostic@main
navicore/vissort.vim
nbouscal/vim-stylish-haskell
ncm2/float-preview.nvim
@ -481,6 +484,7 @@ neoclide/coc-neco
neoclide/coc.nvim@release
neoclide/denite-extra
neoclide/denite-git
neoclide/jsonc.vim
neoclide/vim-easygit
neomake/neomake
neovim/nvim-lspconfig
@ -601,6 +605,7 @@ rktjmp/fwatch.nvim@main
rktjmp/lush.nvim@main
rmagatti/auto-session@main
rmagatti/goto-preview@main
RobertAudi/securemodelines
rodjek/vim-puppet
romainl/vim-cool
romainl/vim-qf
@ -690,7 +695,7 @@ tamago324/compe-zsh
tamago324/lir.nvim
tami5/compe-conjure
tami5/lispdocs.nvim
tami5/sql.nvim
tami5/sqlite.lua
tbastos/vim-lua
tbodt/deoplete-tabnine
ternjs/tern_for_vim
@ -794,6 +799,7 @@ vim-erlang/vim-erlang-tags
vim-pandoc/vim-pandoc
vim-pandoc/vim-pandoc-after
vim-pandoc/vim-pandoc-syntax
vim-python/python-syntax
vim-ruby/vim-ruby
vim-scripts/a.vim
vim-scripts/align
@ -848,6 +854,7 @@ whonore/Coqtail
will133/vim-dirdiff
wincent/command-t
wincent/ferret
wincent/terminus
windwp/nvim-autopairs
winston0410/cmd-parser.nvim
winston0410/range-highlight.nvim

View File

@ -1400,6 +1400,19 @@ let
vadimcn.vscode-lldb = callPackage ./vscode-lldb { };
viktorqvarfordt.vscode-pitch-black-theme = buildVscodeMarketplaceExtension {
mktplcRef = {
name = "vscode-pitch-black-theme";
publisher = "ViktorQvarfordt";
version = "1.2.4";
sha256 = "sha256-HTXToZv0WWFjuQiofEJuaZNSDTmCUcZ0B3KOn+CVALw=";
};
meta = {
license = lib.licenses.mit;
};
};
vincaslt.highlight-matching-tag = buildVscodeMarketplaceExtension {
mktplcRef = {
name = "highlight-matching-tag";

View File

@ -1,6 +1,6 @@
{
"name": "rust-analyzer",
"version": "0.2.718",
"version": "0.2.727",
"dependencies": {
"https-proxy-agent": "^5.0.0",
"node-fetch": "^2.6.1",

View File

@ -1,5 +1,5 @@
{ lib, stdenv,
fetchzip,
fetchFromGitHub,
makeWrapper,
cmake,
python3,
@ -17,29 +17,17 @@
cereal
}:
let
version = "2020.2";
minizip = "f5282643091dc1b33546bb8d8b3c23d78fdba231";
domoticz-src = fetchzip {
url = "https://github.com/domoticz/domoticz/archive/${version}.tar.gz";
sha256 = "1b4pkw9qp7f5r995vm4xdnpbwi9vxjyzbnk63bmy1xkvbhshm0g3";
};
minizip-src = fetchzip {
url = "https://github.com/domoticz/minizip/archive/${minizip}.tar.gz";
sha256 = "1vddrzm4pwl14bms91fs3mbqqjhcxrmpx9a68b6nfbs20xmpnsny";
};
in
stdenv.mkDerivation rec {
pname = "domoticz";
inherit version;
version = "2021.1";
src = domoticz-src;
postUnpack = ''
cp -r ${minizip-src}/* $sourceRoot/extern/minizip
'';
src = fetchFromGitHub {
owner = "domoticz";
repo = pname;
rev = version;
sha256 = "03s1fx2ilhiq47p99c6iln1fi0rhdcxxsrv1zaww7f7bc744vzbk";
fetchSubmodules = true;
};
buildInputs = [
openssl

View File

@ -1,4 +1,4 @@
{ lib, buildGoModule, fetchurl, fetchFromGitHub, nixosTests }:
{ lib, buildGoModule, fetchurl, fetchFromGitHub, nixosTests, tzdata }:
buildGoModule rec {
pname = "grafana";
@ -47,6 +47,16 @@ buildGoModule rec {
"-s" "-w" "-X main.version=${version}"
];
# Tests start http servers which need to bind to local addresses:
# panic: httptest: failed to listen on a port: listen tcp6 [::1]:0: bind: operation not permitted
__darwinAllowLocalNetworking = true;
# On Darwin, files under /usr/share/zoneinfo exist, but fail to open in sandbox:
# TestValueAsTimezone: date_formats_test.go:33: Invalid has err for input "Europe/Amsterdam": operation not permitted
preCheck = ''
export ZONEINFO=${tzdata}/share/zoneinfo
'';
postInstall = ''
tar -xvf $srcStatic
mkdir -p $out/share/grafana
@ -60,6 +70,6 @@ buildGoModule rec {
license = licenses.agpl3;
homepage = "https://grafana.com";
maintainers = with maintainers; [ offline fpletz willibutz globin ma27 Frostman ];
platforms = platforms.linux;
platforms = platforms.linux ++ platforms.darwin;
};
}

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,13 @@
{
"actix-cors 0.6.0-beta.1 (git+https://github.com/MarinPostma/actix-extras.git?rev=2dac1a4#2dac1a421619bf7b386dea63d3ae25a3bc4abc43)": "0ny03ibf8vvdvcmcvzlvngx80rvmh47bx517iqc5wh74yzdmdlsn",
"actix-web-static-files 3.0.5 (git+https://github.com/MarinPostma/actix-web-static-files.git?rev=6db8c3e#6db8c3e2940d61659581492b5e9c9b9062567613)": "1q00s1w2ry6kl7j4bn4q1xqpdn90sc3icjm2wml8fn4rszamhnqy",
"assert-json-diff 1.0.1 (git+https://github.com/qdequele/assert-json-diff?branch=master#9012a0c8866d0f2db0ef9a6242e4a19d1e8c67e4)": "1inv5y75acrw0vhpsc32rh5h0701vnm7c4lcsqcdzd8sdy76cisl",
"grenad 0.1.0 (git+https://github.com/Kerollmops/grenad.git?rev=3adcb26#3adcb267dcbc590c7da10eb5f887a254865b3dbe)": "03zzi59yk2rgasdzsf7rgz26vpk5060vlfskls9cb556wiizh6cl",
"heed 0.12.0 (git+https://github.com/Kerollmops/heed?tag=v0.12.1#8e5dc6d71c8166a8d7d0db059e6e51478942b551)": "09h9i693jiy3ybvc5acj8giszsv3kchpaxs4ld2ha81zxcmmfkrw",
"heed-traits 0.7.0 (git+https://github.com/Kerollmops/heed?tag=v0.12.1#8e5dc6d71c8166a8d7d0db059e6e51478942b551)": "09h9i693jiy3ybvc5acj8giszsv3kchpaxs4ld2ha81zxcmmfkrw",
"heed-types 0.7.2 (git+https://github.com/Kerollmops/heed?tag=v0.12.1#8e5dc6d71c8166a8d7d0db059e6e51478942b551)": "09h9i693jiy3ybvc5acj8giszsv3kchpaxs4ld2ha81zxcmmfkrw",
"lmdb-rkv-sys 0.15.0 (git+https://github.com/meilisearch/lmdb-rs#d0b50d02938ee84e4e4372697ea991fe2a4cae3b)": "0pqar429y4qzxmyr6daw32syvggm4dk7cs7g01lp6f8a6cvbbwkc",
"meilisearch-tokenizer 0.2.5 (git+https://github.com/meilisearch/tokenizer.git?tag=v0.2.5#c0b5cf741ed9485147f2cbe523f2214d4fa4c395)": "0hvf92z24adqwhh81r9arirhrvgyp1wva9g2wsrir4xqvaqdzdr5",
"milli 0.10.2 (git+https://github.com/meilisearch/milli.git?tag=v0.10.2#879d5e8799836d93f8995810965b6797be4f69d1)": "09gdf4mwrn3ka1iqh3h33b86p68c8ichkkkd4231igl11wxj91d1",
"pest 2.1.3 (git+https://github.com/pest-parser/pest.git?rev=51fd1d49f1041f7839975664ef71fe15c7dcaf67#51fd1d49f1041f7839975664ef71fe15c7dcaf67)": "1l2ixz723f58ksdm0j12z9zw5cnap0fhcd5kbhbz5ndazy8sn5rf"
}

View File

@ -1,29 +1,48 @@
{ lib, stdenv
, rustPlatform
{ lib
, stdenv
, buildRustCrate
, defaultCrateOverrides
, fetchFromGitHub
, IOKit
, Security
, features ? [ ]
}:
rustPlatform.buildRustPackage rec {
pname = "meilisearch";
version = "0.9.0";
let
version = "0.21.1";
src = fetchFromGitHub {
owner = "meilisearch";
repo = "MeiliSearch";
rev = "v${version}";
sha256 = "00i5vsbcyrbsvhr5n1b3pxa87v0kfw6pg931i2kzyf4wh021k6sw";
sha256 = "sha256-wyyhTNhVw8EJhahstLK+QuEhufQC68rMpw/ngK8FL8Y=";
};
cargoSha256 = "1icxpragn69c95i5gyx0b07gw4h82r8fsv0nvns0v8dxqisz877k";
buildInputs = lib.optionals stdenv.isDarwin [ IOKit Security ];
meta = with lib; {
description = "Ultra relevant and instant full-text search API";
homepage = "https://meilisearch.com/";
license = licenses.mit;
maintainers = with maintainers; [ Br1ght0ne ];
customBuildRustCrateForPkgs = pkgs: buildRustCrate.override {
defaultCrateOverrides = defaultCrateOverrides // {
meilisearch-http = attrs: {
src = "${src}/meilisearch-http";
buildInputs = lib.optionals stdenv.isDarwin [ Security ];
};
meilisearch-error = attrs: {
src = "${src}/meilisearch-error";
};
};
};
cargo_nix = import ./Cargo.nix {
nixpkgs = ../../../..;
buildRustCrateForPkgs = customBuildRustCrateForPkgs;
};
meilisearch-http = cargo_nix.workspaceMembers."meilisearch-http".build.override {
inherit features;
};
in
stdenv.mkDerivation {
pname = "meilisearch";
inherit version src;
dontUnpack = true;
dontBuild = true;
installPhase = ''
mkdir -p $out/bin
cp ${meilisearch-http}/bin/meilisearch $out/bin/meilisearch
'';
dontCheck = true;
dontFixup = true;
}

View File

@ -0,0 +1,74 @@
diff --git a/Cargo.lock b/Cargo.lock
index e92c0ed0..63bb0996 100644
--- a/Cargo.lock
+++ b/Cargo.lock
@@ -1700,7 +1700,7 @@ dependencies = [
"obkv",
"once_cell",
"ordered-float",
- "pest 2.1.3 (git+https://github.com/pest-parser/pest.git?rev=51fd1d49f1041f7839975664ef71fe15c7dcaf67)",
+ "pest",
"pest_derive",
"rayon",
"roaring",
@@ -1939,15 +1939,6 @@ version = "2.1.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "d4fd5641d01c8f18a23da7b6fe29298ff4b55afcccdf78973b24cf3175fee32e"
-[[package]]
-name = "pest"
-version = "2.1.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "10f4872ae94d7b90ae48754df22fd42ad52ce740b8f370b03da4835417403e53"
-dependencies = [
- "ucd-trie",
-]
-
[[package]]
name = "pest"
version = "2.1.3"
@@ -1962,7 +1953,7 @@ version = "2.1.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "833d1ae558dc601e9a60366421196a8d94bc0ac980476d0b67e1d0988d72b2d0"
dependencies = [
- "pest 2.1.3 (registry+https://github.com/rust-lang/crates.io-index)",
+ "pest",
"pest_generator",
]
@@ -1972,7 +1963,7 @@ version = "2.1.3"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "99b8db626e31e5b81787b9783425769681b347011cc59471e33ea46d2ea0cf55"
dependencies = [
- "pest 2.1.3 (registry+https://github.com/rust-lang/crates.io-index)",
+ "pest",
"pest_meta",
"proc-macro2 1.0.27",
"quote 1.0.9",
@@ -1986,7 +1977,7 @@ source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "54be6e404f5317079812fc8f9f5279de376d8856929e21c184ecf6bbd692a11d"
dependencies = [
"maplit",
- "pest 2.1.3 (registry+https://github.com/rust-lang/crates.io-index)",
+ "pest",
"sha-1 0.8.2",
]
diff --git a/Cargo.toml b/Cargo.toml
index a1dca038..405f210a 100644
--- a/Cargo.toml
+++ b/Cargo.toml
@@ -1,8 +1,9 @@
[workspace]
-members = [
- "meilisearch-http",
- "meilisearch-error",
-]
+members = ["meilisearch-http", "meilisearch-error"]
+resolver = "2"
[profile.release]
debug = true
+
+[patch.crates-io]
+pest = { git = "https://github.com/pest-parser/pest.git", rev = "51fd1d49f1041f7839975664ef71fe15c7dcaf67" }

View File

@ -17,9 +17,9 @@ rustPlatform.buildRustPackage rec {
postInstall = ''
for shell in bash fish zsh; do
$out/bin/procs --completion $shell > procs.$shell
installShellCompletion procs.$shell
$out/bin/procs --completion $shell
done
installShellCompletion procs.{bash,fish} --zsh _procs
'';
buildInputs = lib.optionals stdenv.isDarwin [ Security libiconv ];
@ -27,8 +27,8 @@ rustPlatform.buildRustPackage rec {
meta = with lib; {
description = "A modern replacement for ps written in Rust";
homepage = "https://github.com/dalance/procs";
changelog = "https://github.com/dalance/procs/raw/v${version}/CHANGELOG.md";
license = licenses.mit;
maintainers = with maintainers; [ dalance Br1ght0ne ];
platforms = with platforms; linux ++ darwin;
};
}

View File

@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "shadowenv";
version = "2.0.4";
version = "2.0.5";
src = fetchFromGitHub {
owner = "Shopify";
repo = pname;
rev = version;
sha256 = "sha256-BXCIb91EOpu/GUVvmFZbycuWYAS1n5Sxg5OiYx5rlPA=";
sha256 = "sha256-MPky0ZB7yfl/gOPThx1BpRoTgvY7mkLaoqnvGKPvSPo=";
};
cargoSha256 = "sha256-Hn+128ZQljTroebDQBBNynSq7WTZLpB5sdA2Gz54pOU=";
cargoSha256 = "sha256-reVw8YkKi+EMDk0Bva2Ugp72VhAYB6axHonkr9Kdos4=";
nativeBuildInputs = [ installShellFiles ];

View File

@ -0,0 +1,48 @@
{ lib
, stdenv
, fetchFromGitHub
, perlPackages
}:
stdenv.mkDerivation rec {
pname = "triehash";
version = "0.3";
src = fetchFromGitHub {
owner = "julian-klode";
repo = pname;
rev = "debian/0.3-3";
hash = "sha256-LxVcYj2WKHbhNu5x/DFkxQPOYrVkNvwiE/qcODq52Lc=";
};
nativeBuildInputs = [
perlPackages.perl
];
postPatch = ''
patchShebangs triehash.pl
'';
dontConfigure = true;
dontBuild = true;
installPhase = ''
runHook preInstall
install -d $out/bin $out/share/doc/${pname}/ $out/share/${pname}/
install triehash.pl $out/bin/triehash
install README.md $out/share/doc/${pname}/
cp -r tests/ $out/share/${pname}/tests/
runHook postInstall
'';
meta = with lib; {
homepage = "https://github.com/julian-klode/triehash";
description = "Order-preserving minimal perfect hash function generator";
license = with licenses; mit;
maintainers = with maintainers; [ AndersonTorres ];
platforms = perlPackages.perl.meta.platforms;
};
}

View File

@ -1,50 +1,84 @@
{ stdenv, lib, fetchurl, pkg-config, cmake, perlPackages, curl, gtest
, gnutls, libtasn1, xz, bzip2, lz4, zstd, libseccomp, udev
, db, dpkg, libxslt, docbook_xsl, docbook_xml_dtd_45
# used when WITH_DOC=ON
, w3m
, doxygen
# used when WITH_NLS=ON
, gettext
# opts
, withDocs ? true
, withNLS ? true
{ lib
, stdenv
, fetchurl
, bzip2
, cmake
, curl
, db
, docbook_xml_dtd_45
, docbook_xsl
, dpkg
, gnutls
, gtest
, libgcrypt
, libseccomp
, libtasn1
, libxslt
, lz4
, perlPackages
, pkg-config
, triehash
, udev
, xxHash
, xz
, zstd
, withDocs ? true , w3m, doxygen
, withNLS ? true , gettext
}:
stdenv.mkDerivation rec {
pname = "apt";
version = "1.8.4";
version = "2.3.8";
src = fetchurl {
url = "mirror://debian/pool/main/a/apt/apt_${version}.tar.xz";
sha256 = "0gn4srqaaym85gc8nldqkv01477kdwr136an2nlpbdrsbx3y83zl";
hash = "sha256-SFrxQwx14xWLcV5EJNv5bRtWQdxNzMUPVxssd5qDfyw=";
};
nativeBuildInputs = [ pkg-config cmake gtest libxslt.bin ];
nativeBuildInputs = [
cmake
gtest
libxslt.bin
pkg-config
triehash
];
buildInputs = [
perlPackages.perl curl gnutls libtasn1 xz bzip2 lz4 zstd libseccomp udev db dpkg
bzip2
curl
db
dpkg
gnutls
libgcrypt
libseccomp
libtasn1
lz4
perlPackages.perl
udev
xxHash
xz
zstd
] ++ lib.optionals withDocs [
doxygen perlPackages.Po4a w3m docbook_xml_dtd_45
docbook_xml_dtd_45
doxygen
perlPackages.Po4a
w3m
] ++ lib.optionals withNLS [
gettext
];
cmakeFlags = [
"-DBERKELEY_DB_INCLUDE_DIRS=${db.dev}/include"
"-DGNUTLS_INCLUDE_DIR=${gnutls.dev}/include"
"-DBERKELEY_INCLUDE_DIRS=${db.dev}/include"
"-DDOCBOOK_XSL=${docbook_xsl}/share/xml/docbook-xsl"
"-DGNUTLS_INCLUDE_DIR=${gnutls.dev}/include"
"-DROOT_GROUP=root"
"-DWITH_DOC=${if withDocs then "ON" else "OFF"}"
"-DUSE_NLS=${if withNLS then "ON" else "OFF"}"
"-DWITH_DOC=${if withDocs then "ON" else "OFF"}"
];
meta = with lib; {
description = "Command-line package management tools used on Debian-based systems";
homepage = "https://salsa.debian.org/apt-team/apt";
description = "Command-line package management tools used on Debian-based systems";
license = licenses.gpl2Plus;
platforms = platforms.linux;
maintainers = with maintainers; [ cstrahan ];

View File

@ -1,7 +1,7 @@
GEM
remote: https://rubygems.org/
specs:
bundler-audit (0.8.0)
bundler-audit (0.9.0.1)
bundler (>= 1.2.0, < 3)
thor (~> 1.0)
thor (1.1.0)
@ -13,4 +13,4 @@ DEPENDENCIES
bundler-audit
BUNDLED WITH
2.1.4
2.2.20

View File

@ -5,10 +5,10 @@
platforms = [];
source = {
remotes = ["https://rubygems.org"];
sha256 = "00l8rs7cna0j3yh4s9sza0r88x7kjc7j4gp9yl378422k7i0r73v";
sha256 = "05k19l5388248rd74cn2lm2ksci7fzmga74n835v7k31m4kbzw8v";
type = "gem";
};
version = "0.8.0";
version = "0.9.0.1";
};
thor = {
groups = ["default"];

View File

@ -0,0 +1,25 @@
{ lib
, buildGoModule
, fetchFromGitHub
}:
buildGoModule rec {
pname = "credential-detector";
version = "1.7.0";
src = fetchFromGitHub {
owner = "ynori7";
repo = pname;
rev = "v${version}";
sha256 = "1g5ja32rsf1b7y9gvmy29qz2ymyyvgh53wzd6vvknfla1df0slab";
};
vendorSha256 = "1mn3sysvdz4b94804gns1yssk2q08djq3kq3cd1h7gm942zwrnq4";
meta = with lib; {
description = "Tool to detect potentially hard-coded credentials";
homepage = "https://github.com/ynori7/credential-detector";
license = licenses.mit;
maintainers = with maintainers; [ fab ];
};
}

View File

@ -0,0 +1,25 @@
{ lib
, buildGoModule
, fetchFromGitHub
}:
buildGoModule rec {
pname = "dalfox";
version = "2.4.9";
src = fetchFromGitHub {
owner = "hahwul";
repo = pname;
rev = "v${version}";
sha256 = "1g0bafg3lgsqy8mjyzvvy9l1wp1rxqwpba3dkx6xisjkpbycxql8";
};
vendorSha256 = "1mw58zbihw2fzbpqwydfrrkcwqjkjqdzp37m4dijhx1pbzkv9gzl";
meta = with lib; {
description = "Tool for analysing parameter and XSS scanning";
homepage = "https://github.com/hahwul/dalfox";
license = licenses.mit;
maintainers = with maintainers; [ fab ];
};
}

View File

@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "exploitdb";
version = "2021-09-01";
version = "2021-09-03";
src = fetchFromGitHub {
owner = "offensive-security";
repo = pname;
rev = version;
sha256 = "sha256-uWKZTtBp1HF7WbQVoZMxNQ2osvw3+RARLAJTwxqRErA=";
sha256 = "sha256-9roj5/DfbbN98jy/aO1Ua4pTMxgr4UbqXFicN2ONQgE=";
};
installPhase = ''

View File

@ -5,16 +5,16 @@
buildGoModule rec {
pname = "gitleaks";
version = "7.5.0";
version = "7.6.0";
src = fetchFromGitHub {
owner = "zricethezav";
repo = pname;
rev = "v${version}";
sha256 = "sha256-s7EOCoGciGT5+Fose9BffsHHE/SsSMmNoWGmeAv6Agk=";
sha256 = "sha256-XRpbbtQiF9EnGMICjyXXm2XjuR0jGC7UiY+UHIAMODM=";
};
vendorSha256 = "sha256-Cc4DJPpOMHxDcH22S7znYo7QHNRXv8jOJhznu09kaE4=";
vendorSha256 = "sha256-86PspExE+T/IuCvpf6LAkWcCRlHPqP5VUbHAckEzALc=";
ldflags = [
"-s" "-w" "-X github.com/zricethezav/gitleaks/v${lib.versions.major version}/version.Version=${version}"

View File

@ -0,0 +1,30 @@
{ lib
, buildGoModule
, fetchFromGitHub
}:
buildGoModule rec {
pname = "gotestwaf";
version = "0.3.1";
src = fetchFromGitHub {
owner = "wallarm";
repo = pname;
rev = "v${version}";
sha256 = "0c627bxx0mlxhc1fsd2k3x1lm5855pl215m88la662d70559z6k8";
};
vendorSha256 = null;
postFixup = ''
# Rename binary
mv $out/bin/cmd $out/bin/${pname}
'';
meta = with lib; {
description = "Tool for API and OWASP attack simulation";
homepage = "https://github.com/wallarm/gotestwaf";
license = licenses.mit;
maintainers = with maintainers; [ fab ];
};
}

View File

@ -0,0 +1,28 @@
{ lib
, buildGoModule
, fetchFromGitHub
}:
buildGoModule rec {
pname = "metabigor";
version = "1.9";
src = fetchFromGitHub {
owner = "j3ssie";
repo = pname;
rev = "v${version}";
sha256 = "0gjqjz35m9hj4dpch9akkjs895qrp8fwhcsn474lz6z2q6sb65pr";
};
vendorSha256 = "071s3vlz0maz1597l8y899758g24vh58s4kam4q2mxkzfynzs0cr";
# Disabled for now as there are some failures ("undefined:")
doCheck = false;
meta = with lib; {
description = "Tool to perform OSINT tasks";
homepage = "https://github.com/j3ssie/metabigor";
license = licenses.mit;
maintainers = with maintainers; [ fab ];
};
}

View File

@ -5,17 +5,16 @@
buildGoModule rec {
pname = "scilla";
version = "20210118-${lib.strings.substring 0 7 rev}";
rev = "74dd81492fef92b95765df1d0f629276a146a5a4";
version = "1.1.1";
src = fetchFromGitHub {
owner = "edoardottt";
repo = pname;
inherit rev;
sha256 = "10qvaigfarljydfb9vx2fb9nk293j4g9w2h9mr8xw6adbvl0qr9q";
rev = "v${version}";
sha256 = "sha256-xg8qnpYRdSGaFkjmQLbjMFIU419ASEHtFA8h8ads/50=";
};
vendorSha256 = "04wqsl4269gc3r6l9srqhcq19zarnyyab8k1shj3w6lkfcc61z25";
vendorSha256 = "sha256-PFfzlqBuasTNeCNnu5GiGyQzBQkbe83q1EqCsWTor18=";
meta = with lib; {
description = "Information gathering tool for DNS, ports and more";

View File

@ -1,17 +1,29 @@
{ fetchFromGitHub, lib, rustPlatform }:
{ cmake
, fetchFromGitHub
, lib
, rustPlatform
, stdenv
, libiconv
, CoreFoundation
, Security
}:
rustPlatform.buildRustPackage rec {
pname = "hck";
version = "0.5.4";
version = "0.6.1";
src = fetchFromGitHub {
owner = "sstadick";
repo = pname;
rev = "v${version}";
sha256 = "1zdzi98qywlwk5bp47963vya2p2ahrbjkc9h63lmb05wlas9s78y";
sha256 = "1l1v02rvb30bcq13ww56k04nc231f7q73zgf281974d6s2qwjdwh";
};
cargoSha256 = "0lvd5xpgh2vq2lszzb0fs6ha2vb419a5w0hlkq3287vq3ya3p4qg";
cargoSha256 = "1isgbzi8afbr2xkw70nxakwcb5zjzw28rgp4p7ammhfxjjxw7y93";
nativeBuildInputs = [ cmake ];
buildInputs = lib.optionals stdenv.isDarwin [ libiconv CoreFoundation Security ];
meta = with lib; {
description = "A close to drop in replacement for cut that can use a regex delimiter instead of a fixed string";

View File

@ -338,6 +338,8 @@ with pkgs;
creddump = callPackage ../tools/security/creddump {};
credential-detector = callPackage ../tools/security/credential-detector { };
credslayer = callPackage ../tools/security/credslayer { };
device-tree_rpi = callPackage ../os-specific/linux/device-tree/raspberrypi.nix {};
@ -2654,6 +2656,7 @@ with pkgs;
element-desktop = callPackage ../applications/networking/instant-messengers/element/element-desktop.nix {
inherit (darwin.apple_sdk.frameworks) Security AppKit CoreServices;
electron = electron_13;
};
element-desktop-wayland = element-desktop.override {
useWayland = true;
@ -6632,7 +6635,7 @@ with pkgs;
};
meilisearch = callPackage ../servers/search/meilisearch {
inherit (darwin.apple_sdk.frameworks) IOKit Security;
inherit (darwin.apple_sdk.frameworks) Security;
};
memtester = callPackage ../tools/system/memtester { };
@ -7273,6 +7276,8 @@ with pkgs;
mscgen = callPackage ../tools/graphics/mscgen { };
metabigor = callPackage ../tools/security/metabigor { };
metasploit = callPackage ../tools/security/metasploit { };
ms-sys = callPackage ../tools/misc/ms-sys { };
@ -13259,7 +13264,19 @@ with pkgs;
aws-adfs = with python3Packages; toPythonApplication aws-adfs;
inherit (callPackages ../development/tools/electron { })
electron electron_3 electron_4 electron_5 electron_6 electron_7 electron_8 electron_9 electron_10 electron_11 electron_12 electron_13;
electron
electron_3
electron_4
electron_5
electron_6
electron_7
electron_8
electron_9
electron_10
electron_11
electron_12
electron_13
electron_14;
autobuild = callPackage ../development/tools/misc/autobuild { };
@ -19032,6 +19049,8 @@ with pkgs;
tremor = callPackage ../development/libraries/tremor { };
triehash = callPackage ../tools/misc/triehash { };
trillian = callPackage ../tools/misc/trillian {
buildGoModule = buildGo115Module;
};
@ -20095,7 +20114,7 @@ with pkgs;
modules = [ nginxModules.dav nginxModules.moreheaders ];
};
nginxModules = callPackage ../servers/http/nginx/modules.nix { };
nginxModules = recurseIntoAttrs (callPackage ../servers/http/nginx/modules.nix { });
# We should move to dynmaic modules and create a nginxFull package with all modules
nginxShibboleth = nginxStable.override {
@ -24023,6 +24042,8 @@ with pkgs;
docker-distribution = callPackage ../applications/virtualization/docker/distribution.nix { };
dockfmt = callPackage ../development/tools/dockfmt { };
afterburn = callPackage ../tools/admin/afterburn {};
docker-buildx = callPackage ../applications/virtualization/docker/buildx.nix { };
@ -30383,6 +30404,8 @@ with pkgs;
conglomerate = callPackage ../applications/science/biology/conglomerate { };
dalfox = callPackage ../tools/security/dalfox { };
dcm2niix = callPackage ../applications/science/biology/dcm2niix { };
deepdiff = with python3Packages; toPythonApplication deepdiff;
@ -31447,6 +31470,8 @@ with pkgs;
emu2 = callPackage ../misc/emulators/emu2 { };
apt = callPackage ../tools/package-management/apt { };
dpkg = callPackage ../tools/package-management/dpkg { };
dumb = callPackage ../misc/dumb { };
@ -31538,6 +31563,8 @@ with pkgs;
gobuster = callPackage ../tools/security/gobuster { };
gotestwaf = callPackage ../tools/security/gotestwaf { };
guetzli = callPackage ../applications/graphics/guetzli { };
gummi = callPackage ../applications/misc/gummi { };
@ -31546,7 +31573,9 @@ with pkgs;
hatari = callPackage ../misc/emulators/hatari { };
hck = callPackage ../tools/text/hck { };
hck = callPackage ../tools/text/hck {
inherit (darwin.apple_sdk.frameworks) CoreFoundation Security;
};
helm = callPackage ../applications/audio/helm { };

View File

@ -7837,6 +7837,8 @@ in {
rst2ansi = callPackage ../development/python-modules/rst2ansi { };
rstcheck = callPackage ../development/python-modules/rstcheck { };
rtmidi-python = callPackage ../development/python-modules/rtmidi-python { };
rtoml = callPackage ../development/python-modules/rtoml { };
@ -9220,6 +9222,8 @@ in {
versioneer = callPackage ../development/python-modules/versioneer { };
versiontag = callPackage ../development/python-modules/versiontag { };
versiontools = callPackage ../development/python-modules/versiontools { };
vertica-python = callPackage ../development/python-modules/vertica-python { };