Merge remote-tracking branch 'origin/master' into haskell-updates

This commit is contained in:
sternenseemann 2022-10-01 13:53:07 +02:00
commit feaf3793ef
80 changed files with 787 additions and 240 deletions

View File

@ -16,7 +16,7 @@ in
extraModprobeConfig =
mkIf
(config.hardware.bluetooth.enable &&
(lib.versionOlder config.boot.kernelPackages.kernel.version "5.12"))
(lib.versionOlder config.boot.kernelPackages.kernel.version "5.12"))
"options bluetooth disable_ertm=1";
extraModulePackages = with config.boot.kernelPackages; [ xpadneo ];

View File

@ -31,6 +31,7 @@ let
in
{
nix.registry.nixpkgs.flake.outPath = builtins.path { name = "source"; path = pkgs.path; };
# Provide the NixOS/Nixpkgs sources in /etc/nixos. This is required
# for nixos-install.
boot.postBootCommands = mkAfter

View File

@ -69,7 +69,7 @@ in {
ProtectKernelTunables = true;
ProtectSystem = "full";
StateDirectory = "rust-motd";
RestrictAddressFamilies = "none";
RestrictAddressFamilies = [ "AF_UNIX" ];
RestrictNamespaces = true;
RestrictRealtime = true;
RestrictSUIDSGID = true;

View File

@ -212,6 +212,9 @@ with lib;
systemd.tmpfiles.rules = [
"d /var/spool/nullmailer - ${cfg.user} - - -"
"d /var/spool/nullmailer/failed 750 ${cfg.user} - - -"
"d /var/spool/nullmailer/queue 750 ${cfg.user} - - -"
"d /var/spool/nullmailer/tmp 750 ${cfg.user} - - -"
];
systemd.services.nullmailer = {
@ -220,7 +223,6 @@ with lib;
after = [ "network.target" ];
preStart = ''
mkdir -p /var/spool/nullmailer/{queue,tmp,failed}
rm -f /var/spool/nullmailer/trigger && mkfifo -m 660 /var/spool/nullmailer/trigger
'';

View File

@ -465,7 +465,13 @@ in
networking.wireguard = {
enable = mkOption {
description = lib.mdDoc "Whether to enable WireGuard.";
description = lib.mdDoc ''
Whether to enable WireGuard.
Please note that {option}`systemd.network.netdevs` has more features
and is better maintained. When building new things, it is advised to
use that instead.
'';
type = types.bool;
# 2019-05-25: Backwards compatibility.
default = cfg.interfaces != {};
@ -474,7 +480,13 @@ in
};
interfaces = mkOption {
description = lib.mdDoc "WireGuard interfaces.";
description = lib.mdDoc ''
WireGuard interfaces.
Please note that {option}`systemd.network.netdevs` has more features
and is better maintained. When building new things, it is advised to
use that instead.
'';
default = {};
example = {
wg0 = {

View File

@ -63,7 +63,7 @@ in {
hashedPassword = mkOption {
default = "";
description =
lib.mdDoc "Create the password with: 'echo -n 'thisismypassword' | npx argon2-cli -e'.";
lib.mdDoc "Create the password with: `echo -n 'thisismypassword' | npx argon2-cli -e`.";
type = types.str;
};
@ -109,7 +109,7 @@ in {
HASHED_PASSWORD = cfg.hashedPassword;
} // cfg.extraEnvironment;
serviceConfig = {
ExecStart = "${cfg.package}/bin/code-server --bind-addr ${cfg.host}:${toString cfg.port} --auth ${cfg.auth} " + builtins.concatStringsSep " " cfg.extraArguments;
ExecStart = "${cfg.package}/bin/code-server --bind-addr ${cfg.host}:${toString cfg.port} --auth ${cfg.auth} " + lib.escapeShellArgs cfg.extraArguments;
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
RuntimeDirectory = cfg.user;
User = cfg.user;

View File

@ -604,6 +604,10 @@ in
The configuration for each network interface. If
{option}`networking.useDHCP` is true, then every
interface not listed here will be configured using DHCP.
Please note that {option}`systemd.network.netdevs` has more features
and is better maintained. When building new things, it is advised to
use that instead.
'';
type = with types; attrsOf (submodule interfaceOpts);
};

View File

@ -678,6 +678,7 @@ in {
xfce = handleTest ./xfce.nix {};
xmonad = handleTest ./xmonad.nix {};
xmonad-xdg-autostart = handleTest ./xmonad-xdg-autostart.nix {};
xpadneo = handleTest ./xpadneo.nix {};
xrdp = handleTest ./xrdp.nix {};
xss-lock = handleTest ./xss-lock.nix {};
xterm = handleTest ./xterm.nix {};

View File

@ -1,4 +1,4 @@
import ./make-test-python.nix (
import ./make-test-python.nix ({ pkgs, ... }:
let
container = {
@ -18,6 +18,7 @@ import ./make-test-python.nix (
};
containerSystem = (import ../lib/eval-config.nix {
inherit (pkgs) system;
modules = [ container ];
}).config.system.build.toplevel;

18
nixos/tests/xpadneo.nix Normal file
View File

@ -0,0 +1,18 @@
import ./make-test-python.nix ({ lib, pkgs, ... }: {
name = "xpadneo";
meta.maintainers = with lib.maintainers; [ kira-bruneau ];
nodes = {
machine = {
config.hardware.xpadneo.enable = true;
};
};
# This is just a sanity check to make sure the module was
# loaded. We'd have to find some way to mock an xbox controller if
# we wanted more in-depth testing.
testScript = ''
machine.start();
machine.succeed("modinfo hid_xpadneo | grep 'version:\s\+${pkgs.linuxPackages.xpadneo.version}'")
'';
})

View File

@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "dragonfly-reverb";
version = "3.2.6";
version = "3.2.7";
src = fetchFromGitHub {
owner = "michaelwillis";
repo = "dragonfly-reverb";
rev = version;
sha256 = "sha256-hTapy/wXt1rRZVdkx2RDW8LS/DcY30p+WaAWgemGqVo=";
sha256 = "sha256-DJ6J5PuRFDin6PtkNYjIRI1gEVQkKmnZLhnj7L4JtPM=";
fetchSubmodules = true;
};

View File

@ -5,14 +5,14 @@
stdenv.mkDerivation rec {
pname = "helio-workstation";
version = "3.9";
version = "3.10";
src = fetchFromGitHub {
owner = "helio-fm";
repo = pname;
rev = version;
fetchSubmodules = true;
sha256 = "sha256-AtgKgw+F5lc0Ma3zOxmk3iaZQp2KZb2FP5F8QvvYTT4=";
sha256 = "sha256-TqwebaFZXUto+azVJQlggqAc7WKDxAaXxyXcG8x5S/w=";
};
buildInputs = [

View File

@ -6,14 +6,14 @@
let chia = python3Packages.buildPythonApplication rec {
pname = "chia";
version = "1.5.1";
version = "1.6.0";
src = fetchFromGitHub {
owner = "Chia-Network";
repo = "chia-blockchain";
rev = version;
fetchSubmodules = true;
hash = "sha256-FzKdb6Z/ykKYjpjCr7QR5fxXPNnQbW3bBY97t7DxS90=";
hash = "sha256-TNaHPvN19fkRqkQHtqdeEDwhqbntcVhxXhY8TNIScEg=";
};
patches = [

View File

@ -1,38 +1,47 @@
{ lib, stdenv, fetchurl, fetchFromGitHub, autoreconfHook
, libtool, pkg-config, gtk2, libGLU, file
{ lib
, stdenv
, fetchFromGitHub
, meson
, ninja
, pkg-config
, cglm
, gtk3
, libepoxy
, libGLU
}:
let
gtkglarea = stdenv.mkDerivation rec {
pname = "gtkglarea";
version = "2.1.0";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
sha256 = "1pl2vdj6l64j864ilhkq1bcggb3hrlxjwk5m029i7xfjfxc587lf";
};
nativeBuildInputs = [ pkg-config ];
buildInputs = [ gtk2 libGLU ];
hardeningDisable = [ "format" ];
};
in stdenv.mkDerivation rec {
stdenv.mkDerivation rec {
pname = "fsv";
version = "0.9-1";
version = "3.0";
src = fetchFromGitHub {
owner = "mcuelenaere";
repo = "fsv";
rev = "${pname}-${version}";
sha256 = "0n09jd7yqj18mx6zqbg7kab4idg5llr15g6avafj74fpg1h7iimj";
owner = "jabl";
repo = "fsv";
rev = "${pname}-${version}";
hash = "sha256-fxsA3qcBPvK4H5P4juGTe6eg1lkygvzFpNW36B9lsE4=";
};
postPatch = ''
# fix build with gettext 0.20
sed -i 's/AM_GNU_GETTEXT/AM_GNU_GETTEXT([external])/' configure.in
'';
nativeBuildInputs = [
meson
ninja
pkg-config
];
nativeBuildInputs = [ autoreconfHook libtool pkg-config ];
buildInputs = [ file gtk2 libGLU gtkglarea ];
buildInputs = [
cglm
gtk3
libepoxy
libGLU
];
installPhase = ''
runHook preInstall
mkdir -p $out/bin
cp src/fsv $out/bin/fsv
runHook postInstall
'';
meta = with lib; {
description = "File system visualizer in cyberspace";
@ -44,7 +53,7 @@ in stdenv.mkDerivation rec {
hard drive, or any arbitrarily large collection of files, limited only
by the host computer's memory and graphics hardware.
'';
homepage = "https://github.com/mcuelenaere/fsv";
homepage = "https://github.com/jabl/fsv";
license = licenses.lgpl2;
platforms = platforms.linux;
maintainers = with maintainers; [ rnhmjoj ];

View File

@ -2,13 +2,13 @@
mkDerivation rec {
pname = "heimer";
version = "3.6.0";
version = "3.6.1";
src = fetchFromGitHub {
owner = "juzzlin";
repo = pname;
rev = version;
sha256 = "sha256-GQf5S7mYuucJS5jsz0upe6DiniY8YXZXYQV7nyrjVmE=";
sha256 = "sha256-i4jgmqRvBX6g6IOitnBnQqWnFY5QoLk6/Cah0wCU8uc=";
};
nativeBuildInputs = [ cmake ];

View File

@ -1,14 +1,14 @@
{ lib, buildGoModule, fetchFromGitHub, installShellFiles }:
{ stdenv, lib, buildGoModule, fetchFromGitHub, installShellFiles, buildPackages }:
buildGoModule rec {
pname = "hugo";
version = "0.104.1";
version = "0.104.2";
src = fetchFromGitHub {
owner = "gohugoio";
repo = pname;
rev = "v${version}";
sha256 = "sha256-cR+S84ROSAnK1FXLX+f3BXKcxp8W/noA9cg0XvEXbaU=";
sha256 = "sha256-7GB2bLf6J253oFkTLg8iblE6c2wFYS3WCUqTDsc61/8=";
};
vendorSha256 = "sha256-K7rQSs4PqFGV4gZ6UevS7S0w0OQykAkHntklKz5vPrU=";
@ -25,13 +25,13 @@ buildGoModule rec {
ldflags = [ "-s" "-w" "-X github.com/gohugoio/hugo/common/hugo.vendorInfo=nixpkgs" ];
postInstall = ''
$out/bin/hugo gen man
postInstall = let emulator = stdenv.hostPlatform.emulator buildPackages; in ''
${emulator} $out/bin/hugo gen man
installManPage man/*
installShellCompletion --cmd hugo \
--bash <($out/bin/hugo completion bash) \
--fish <($out/bin/hugo completion fish) \
--zsh <($out/bin/hugo completion zsh)
--bash <(${emulator} $out/bin/hugo completion bash) \
--fish <(${emulator} $out/bin/hugo completion fish) \
--zsh <(${emulator} $out/bin/hugo completion zsh)
'';
meta = with lib; {

View File

@ -18,14 +18,14 @@
mkDerivation rec {
pname = "qcad";
version = "3.27.6.7";
version = "3.27.6.11";
src = fetchFromGitHub {
name = "qcad-${version}-src";
owner = "qcad";
repo = "qcad";
rev = "v${version}";
sha256 = "sha256-PGGm7XhjGngj2oD8NNh8aQOKRgcdx9qiQu/4ZYBceG8=";
sha256 = "sha256-FfbHedJgzZdUpamLL2Wz2P8glaC/IVYCGZQk9EEc83k=";
};
patches = [

View File

@ -2,13 +2,13 @@
buildGoModule rec {
pname = "argo-rollouts";
version = "1.3.0";
version = "1.3.1";
src = fetchFromGitHub {
owner = "argoproj";
repo = "argo-rollouts";
rev = "v${version}";
sha256 = "sha256-CsH/qYhi4sw4u7MZMSdNT5fAae5APwrvJQbubDCLbLY=";
sha256 = "sha256-qgOhiJdaxauHIoPsMfcdxwrKiv8QD/tFksCbk13Zpiw=";
};
vendorSha256 = "sha256-gm96rQdQJGsIcxVgEI7sI7BvEETU/+HsQ6PnDjFXb/0=";

View File

@ -1,23 +1,24 @@
{ lib, buildGoModule, fetchFromGitHub}:
{ lib, buildGoModule, fetchFromGitHub }:
buildGoModule rec {
pname = "kuttl";
version = "0.11.1";
version = "0.13.0";
cli = "kubectl-kuttl";
src = fetchFromGitHub {
owner = "kudobuilder";
repo = "kuttl";
rev = "v${version}";
sha256 = "sha256-jvearvhl2fQV5OOVmvf3C4MjE//wkVs8Ly9BIwv15/8=";
owner = "kudobuilder";
repo = "kuttl";
rev = "v${version}";
sha256 = "sha256-liuP8ALcPxbU+hZ54KDFj2r2yZpAbVago0IxIv52N3o=";
};
vendorSha256 = "sha256-EytHUfr6RbgXowYlfuajvNt9VwmGmvw9TBRtwYMAIh4=";
vendorSha256 = "sha256-u8Ezk78CrAhSeeMVXj09/Hiegtx+ZNKlr/Fg0O7+iOY=";
subPackages = [ "cmd/kubectl-kuttl" ];
ldflags = [
"-s" "-w"
"-s"
"-w"
"-X github.com/kudobuilder/kuttl/pkg/version.gitVersion=${version}"
];

View File

@ -2,16 +2,16 @@
buildGoModule rec {
pname = "pluto";
version = "5.10.7";
version = "5.11.0";
src = fetchFromGitHub {
owner = "FairwindsOps";
repo = "pluto";
rev = "v${version}";
sha256 = "sha256-AGzDs2KZt44uBJRBHvBL7nn5TpgWbcdLTEf9Vx9j89U=";
sha256 = "sha256-eyJ81i9kTuojBuo/rwfgnl3BRpiTnKst0SnL+oWfSWQ=";
};
vendorSha256 = "sha256-cA5QxI1lLBdzPOj3pFqqHPfMwJQPPiyqQA4FLwetNUs=";
vendorSha256 = "sha256-QH/mKq7QydYvUHZIPjoBWy015Sghh30VdEWu76KZdPE=";
ldflags = [
"-w" "-s"

View File

@ -2,13 +2,13 @@
buildGoModule rec {
pname = "terragrunt";
version = "0.38.9";
version = "0.39.0";
src = fetchFromGitHub {
owner = "gruntwork-io";
repo = pname;
rev = "v${version}";
sha256 = "sha256-rfAVgnFAxEguFuY+Gfe/T0NcsD6LmPSquxuTR0bRqXQ=";
sha256 = "sha256-Y8t5rThkPD3FzY25L2lOIvktU5+NwBZtq9Pn3VzQQf4=";
};
vendorSha256 = "sha256-CqImT90jFFLi6XR7jfzFKwhnCHK6B+aM+Ba/L+G3bEg=";

View File

@ -2,13 +2,13 @@
buildGoModule rec {
pname = "vcluster";
version = "0.11.1";
version = "0.12.1";
src = fetchFromGitHub {
owner = "loft-sh";
repo = pname;
rev = "v${version}";
sha256 = "sha256-aFTugqWr/9e3wQLL4yre2T8CUKq8P0HZLsES8lFZKHY=";
sha256 = "sha256-KRm6+WRMGzM7L17ABj/g6Nu+eU6F3C4a9CAa0ePC6i8=";
};
vendorSha256 = null;

View File

@ -10,13 +10,13 @@
buildGoModule rec {
pname = "werf";
version = "1.2.175";
version = "1.2.176";
src = fetchFromGitHub {
owner = "werf";
repo = "werf";
rev = "v${version}";
hash = "sha256-p60+IBy9f31BfmKdYlaHPO93mpIpWeOrDa6vFYrL1eQ=";
hash = "sha256-E6xRnEIo6ks8E9bWjo8d+mDhYe+nsKIFdUEGS6tbgXM=";
};
vendorHash = "sha256-NHRPl38/R7yS8Hht118mBc+OBPwfYiHOaGIwryNK8Mo=";

View File

@ -3,16 +3,16 @@
rustPlatform.buildRustPackage rec {
pname = "newsboat";
version = "2.28";
version = "2.29";
src = fetchFromGitHub {
owner = "newsboat";
repo = "newsboat";
rev = "r${version}";
hash = "sha256-MHbGCGtFPXG+82Qveoiv7f8qqZOxThEYb9y9Kv3pnFc=";
hash = "sha256-/R+ahUOgQR71kTZIpsic1gEYxJzbnY8x6AxtkzYTCDo=";
};
cargoHash = "sha256-9YcVKZn51fhkE6bZmaNu7PXsSG8j0M4piBnTWtX8Kcg=";
cargoHash = "sha256-uHhP5XurJHM31fJqsqW9tumPzzMMOEeEWAAsllazcME=";
# TODO: Check if that's still needed
postPatch = lib.optionalString stdenv.isDarwin ''

View File

@ -9,7 +9,7 @@
stdenv.mkDerivation rec {
pname = "signal-desktop";
version = "5.61.0"; # Please backport all updates to the stable channel.
version = "5.61.1"; # Please backport all updates to the stable channel.
# All releases have a limited lifetime and "expire" 90 days after the release.
# When releases "expire" the application becomes unusable until an update is
# applied. The expiration date for the current release can be extracted with:
@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
src = fetchurl {
url = "https://updates.signal.org/desktop/apt/pool/main/s/signal-desktop/signal-desktop_${version}_amd64.deb";
sha256 = "sha256-1EPOuvul/Dh/gFwgCy7Wme6GYIP1Mi3TofTrIF3kU3g=";
sha256 = "sha256-iEWJ0/rzQMZaZKwume+akMgRg71tVwhlovIGC129B/8=";
};
nativeBuildInputs = [

View File

@ -32,7 +32,6 @@
, jemalloc
, rnnoise
, abseil-cpp
, kcoreaddons
# Transitive dependencies:
, util-linuxMinimal
, pcre
@ -74,7 +73,7 @@ let
in
env.mkDerivation rec {
pname = "telegram-desktop";
version = "4.2.0";
version = "4.2.4";
# Note: Update via pkgs/applications/networking/instant-messengers/telegram/tdesktop/update.py
# Telegram-Desktop with submodules
@ -83,13 +82,10 @@ env.mkDerivation rec {
repo = "tdesktop";
rev = "v${version}";
fetchSubmodules = true;
sha256 = "1wpqn79pbarz48kmrh6gciw4a9y5hiki5qczlvj8smvx9is6yrf8";
sha256 = "sha256-X2ZbjlL3YbPdXSgS+wqZL3FUW2xQ0DhqiOO5MR1QyLY=";
};
postPatch = ''
substituteInPlace Telegram/CMakeLists.txt \
--replace '"''${TDESKTOP_LAUNCHER_BASENAME}.appdata.xml"' '"''${TDESKTOP_LAUNCHER_BASENAME}.metainfo.xml"'
substituteInPlace Telegram/ThirdParty/libtgvoip/os/linux/AudioInputALSA.cpp \
--replace '"libasound.so.2"' '"${alsa-lib}/lib/libasound.so.2"'
substituteInPlace Telegram/ThirdParty/libtgvoip/os/linux/AudioOutputALSA.cpp \
@ -139,7 +135,6 @@ env.mkDerivation rec {
jemalloc
rnnoise
tg_owt
kcoreaddons
# Transitive dependencies:
util-linuxMinimal # Required for libmount thus not nativeBuildInputs.
pcre

View File

@ -1,4 +1,4 @@
{ lib, stdenv, fetchFromGitHub }:
{ lib, python3, stdenv, substituteAll, fetchFromGitHub }:
stdenv.mkDerivation rec {
pname = "novnc";
@ -11,7 +11,12 @@ stdenv.mkDerivation rec {
sha256 = "sha256-Z+bks7kcwj+Z3uf/t0u25DnGOM60QhSH6uuoIi59jqU=";
};
patches = [ ./fix-paths.patch ];
patches = with python3.pkgs; [
(substituteAll {
src = ./websockify.patch;
inherit websockify;
})
] ++ [ ./fix-paths.patch ];
postPatch = ''
substituteAllInPlace utils/novnc_proxy

View File

@ -0,0 +1,13 @@
diff --git a/utils/novnc_proxy b/utils/novnc_proxy
index 0365c1e..7eba2db 100755
--- a/utils/novnc_proxy
+++ b/utils/novnc_proxy
@@ -167,7 +167,7 @@ if [[ -d ${HERE}/websockify ]]; then
echo "Using local websockify at $WEBSOCKIFY"
else
- WEBSOCKIFY_FROMSYSTEM=$(which websockify 2>/dev/null)
+ WEBSOCKIFY_FROMSYSTEM="@websockify@/bin/websockify"
WEBSOCKIFY_FROMSNAP=${HERE}/../usr/bin/python2-websockify
[ -f $WEBSOCKIFY_FROMSYSTEM ] && WEBSOCKIFY=$WEBSOCKIFY_FROMSYSTEM
[ -f $WEBSOCKIFY_FROMSNAP ] && WEBSOCKIFY=$WEBSOCKIFY_FROMSNAP

View File

@ -94,5 +94,6 @@ in stdenv.mkDerivation {
license = licenses.gpl2;
maintainers = with maintainers; [ gavin ];
platforms = [ "x86_64-darwin" "x86_64-linux" "i686-linux" ];
broken = true; # at 2022-09-30, errors with changing hash.
};
}

View File

@ -13,13 +13,13 @@
stdenv.mkDerivation rec {
pname = "cbmc";
version = "5.65.1";
version = "5.67.0";
src = fetchFromGitHub {
owner = "diffblue";
repo = pname;
rev = "${pname}-${version}";
sha256 = "sha256-6Cy3yScPl2Ax0N2pmJWJEPXrSlj+F0IAoM5G8rIjbT8=";
sha256 = "sha256-9w6GGi/yW7IYv3NoflpzO/UH712+LWp6f10+ak2hLIA=";
};
nativeBuildInputs = [

View File

@ -15,16 +15,24 @@
rustPlatform.buildRustPackage rec {
pname = "git-branchless";
version = "0.4.0";
version = "0.5.0";
src = fetchFromGitHub {
owner = "arxanas";
repo = "git-branchless";
rev = "v${version}";
sha256 = "sha256-WFrN5TRFr9xHBUawTfvri0qlTiWCfAeC5SL+T6mwlU0=";
sha256 = "sha256-jAc17poNTld3eptN1Vd1MOKS5iloMWkq3oZgpWBkGTY=";
};
cargoSha256 = "sha256-AGW1jUKPc5iiuDlgIDHG1sOn1flAB3UdxJJNKPH5+f8=";
cargoPatches = [
(fetchpatch {
name = "build-run-cargo-update";
url = "https://github.com/arxanas/git-branchless/commit/0ac3f325520f79d15368aa9d14893ebc17313ab6.patch";
sha256 = "sha256-S1kazUzvz3FzFpphSRhWiv/l2b/+zC9HtAl7ndq5aJA=";
})
];
cargoSha256 = "sha256-Lo/Q6OSIzWrRNiTGsOWRX+6FEcj4fk1kn7V9tw67UVo=";
nativeBuildInputs = [ pkg-config ];

View File

@ -1,5 +1,5 @@
{ lib, stdenv, fetchurl, fetchgit, vdr, fetchFromGitHub
, graphicsmagick, libav, pcre, xorgserver, ffmpeg
, graphicsmagick, pcre, xorgserver, ffmpeg
, libiconv, boost, libgcrypt, perl, util-linux, groff, libva, xorg, ncurses
, callPackage
}: let
@ -53,16 +53,16 @@ in {
markad = stdenv.mkDerivation rec {
pname = "vdr-markad";
version = "2.0.4";
version = "3.0.25";
src = fetchFromGitHub {
repo = "vdr-plugin-markad";
owner = "jbrundiers";
sha256 = "sha256-Y4KsEtUq+KoUooXiw9O9RokBxNwWBkiGB31GncmHkYM=";
rev = "288e3dae93421b0176f4f62b68ea4b39d98e8793";
owner = "kfb77";
sha256 = "sha256-m7cUAxwXj62spelHYH6uTIoViSavSR0d4psr7+KLJg8=";
rev = "v${version}";
};
buildInputs = [ vdr libav ];
buildInputs = [ vdr ffmpeg ];
postPatch = ''
substituteInPlace command/Makefile --replace '/usr' ""
@ -78,6 +78,8 @@ in {
buildFlags = [
"DESTDIR=$(out)"
"LIBDIR=/lib/vdr"
"BINDIR=/bin"
"MANDIR=/share/man"
"APIVERSION=${vdr.version}"
"VDRDIR=${vdr.dev}/include/vdr"
"LOCDIR=/share/locale"
@ -86,7 +88,7 @@ in {
installFlags = buildFlags;
meta = with lib; {
homepage = "https://github.com/jbrundiers/vdr-plugin-markad";
homepage = "https://github.com/kfb77/vdr-plugin-markad";
description = "MarkAd marks advertisements in VDR recordings.";
maintainers = [ maintainers.ck3d ];
license = licenses.gpl2;

View File

@ -2,13 +2,13 @@
stdenvNoCC.mkDerivation rec {
pname = "distrobox";
version = "1.4.0";
version = "1.4.1";
src = fetchFromGitHub {
owner = "89luca89";
repo = pname;
rev = version;
sha256 = "sha256-XYqPwBiMbwG0bTiFRywZRWjp1OabTHcwhmbcx11SgPo=";
sha256 = "sha256-WIpl3eSdResAmWFc8OG8Jm0uLTGaovkItGAZTOEzhuE=";
};
dontConfigure = true;

View File

@ -26,9 +26,7 @@ buildGoModule rec {
nativeBuildInputs = [ go-md2man installShellFiles ];
postInstall = ''
substituteInPlace Makefile --replace \
'$(shell which bash)' '${lib.getBin bash}/bin/bash'
make docs
make docs SHELL="$SHELL"
installManPage doc/man/*.[1-9]
'';

View File

@ -1,10 +1,11 @@
{ stdenv, fetchurl }:
stdenv.mkDerivation {
name = "tipa-1.3";
stdenv.mkDerivation rec {
pname = "tipa";
version = "1.3";
src = fetchurl {
url = "mirror://debian/pool/main/t/tipa/tipa_1.3.orig.tar.gz";
url = "mirror://debian/pool/main/t/tipa/${pname}_${version}.orig.tar.gz";
sha256 = "1q1sisxdcd2zd9b7mnagr2mxf9v3n1r4s5892zx5ly4r0niyya9m";
};

View File

@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "armadillo";
version = "11.2.4";
version = "11.4.0";
src = fetchurl {
url = "mirror://sourceforge/arma/armadillo-${version}.tar.xz";
sha256 = "sha256-3EyRlUqxFJC/ZNLfzFSoAvFDk8dWqNVFrBVe7v+n/ZM=";
sha256 = "sha256-AWUxFSwCcppgKqbxb0ujsEdXQNXBvSjTTt1yZPR2Rhw=";
};
nativeBuildInputs = [ cmake ];

View File

@ -2,12 +2,12 @@
let
pname = "restinio";
version = "0.6.16";
version = "0.6.17";
in
fetchzip {
name = "${pname}-${version}";
url = "https://github.com/Stiffstream/restinio/releases/download/v.${version}/${pname}-${version}.tar.bz2";
hash = "sha256-tl9HUsT9mCupuwp6T4dbPdYOQy3vYyctuwFQPfR8m0Y=";
hash = "sha256-8A13r3Qsn5S+kVWLPENoOjqz2tPMxSo6EWBvHG1cTAE=";
stripRoot = false;
postFetch = ''

View File

@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "autograd";
version = "1.4";
version = "1.5";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-OD3g9TfvLji4X/lpJZOwz66JWMmzvUUbUsJV/ZFx/84=";
sha256 = "sha256-2AvSJRVNHbE8tOrM96GMNYvnIJJkG2hxf5b88dFqzQs=";
};
propagatedBuildInputs = [ numpy future ];

View File

@ -9,12 +9,12 @@
buildPythonPackage rec {
pname = "casa-formats-io";
version = "0.1";
version = "0.2";
format = "pyproject";
src = fetchPypi {
inherit pname version;
sha256 = "16rypj65wdfxxrilxfhbk563lxv86if4vvs9zfq3f8bkzdr8xl9s";
sha256 = "sha256-omDPTR/RRHosOF+ejZzuGUBO1LAN/SefNQsvnXxezOQ=";
};
nativeBuildInputs = [ setuptools-scm ];

View File

@ -12,14 +12,14 @@
buildPythonPackage rec {
pname = "gaphas";
version = "3.7.0";
version = "3.8.0";
disabled = pythonOlder "3.7";
format = "pyproject";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-iT8Gez8PgIrdAS9Kd83aY1yOQFL45KB+SES/50wTFEI=";
sha256 = "sha256-szES3oLJayboCAMCGKtQqclOcbpYtEn3rg95OPtOZpU=";
};
nativeBuildInputs = [

View File

@ -2,6 +2,7 @@
, buildPythonPackage
, fetchPypi
, jsonschema
, pytestCheckHook
}:
buildPythonPackage rec {
@ -15,6 +16,13 @@ buildPythonPackage rec {
propagatedBuildInputs = [ jsonschema ];
checkInputs = [ pytestCheckHook ];
disabledTests = [
# Fails with "Unresolvable JSON pointer"
"test_local_reference_in_meta"
];
meta = with lib; {
description = "Merge a series of JSON documents";
homepage = "https://github.com/avian2/jsonmerge";

View File

@ -10,7 +10,7 @@
buildGoModule rec {
pname = "actionlint";
version = "1.6.19";
version = "1.6.20";
subPackages = [ "cmd/actionlint" ];
@ -18,7 +18,7 @@ buildGoModule rec {
owner = "rhysd";
repo = "actionlint";
rev = "v${version}";
sha256 = "sha256-sWsn5jX4kQbK9rOW5FC94mdBwXNAR2a48XFHe37eK6U=";
sha256 = "sha256-WQqEST5f3yUsvjw86ckS/jRaxcnUd13zb7lmQvfmsjM=";
};
vendorSha256 = "sha256-vWU3tEC+ZlrrTnX3fbuEuZRoSg1KtfpgpXmK4+HWrNY=";

View File

@ -2,16 +2,16 @@
buildGoModule rec {
pname = "benthos";
version = "4.3.0";
version = "4.7.0";
src = fetchFromGitHub {
owner = "benthosdev";
repo = "benthos";
rev = "v${version}";
sha256 = "sha256-tRB9eTeyEyPkiR/sph76CMbPjJUNoDzfYuHmtFAzY7E=";
sha256 = "sha256-aj4MkVj1+9IcyiPWOilrk/x5Rwtoq9wwP4oCtgeb+vU=";
};
vendorSha256 = "sha256-nnaBQ7ADdAdo/+RQzXJHBBpXgTmxny0O/ij+eWsS5YM=";
vendorSha256 = "sha256-aQ3z8KBTLHNs5y+8I02AIZc7p5fr10GA99YdizwSJko=";
doCheck = false;

View File

@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "millet";
version = "0.3.11";
version = "0.3.12";
src = fetchFromGitHub {
owner = "azdavis";
repo = pname;
rev = "v${version}";
sha256 = "sha256-6xuqzeYTbBirkleyrza4y1i2m4sWhTHizq5BtAtoIHo=";
sha256 = "sha256-VqcC5RWo7az1SyrdLmbModK9I5za33plXm/PJ8b7Pbk=";
};
cargoSha256 = "sha256-DZCeEd/bg8/IlJ/3XgPc28tI8w8j/nH99Bj3HffuqtU=";
cargoSha256 = "sha256-1gU1SnKqLsIbipAbczu/WvAGxKHZ2NYhAqXwMAuISa0=";
postPatch = ''
rm .cargo/config.toml

View File

@ -2,16 +2,16 @@
buildGoModule rec {
pname = "act";
version = "0.2.31";
version = "0.2.32";
src = fetchFromGitHub {
owner = "nektos";
repo = pname;
rev = "v${version}";
sha256 = "sha256-6JMWt6svJwW7FNn2sOSUjFtXBqmC02uFEiybj5H9wTw=";
sha256 = "sha256-fHGS05qlRSVTrjEx71hhVridbpbLVyaAOg3uMYIj0TU=";
};
vendorSha256 = "sha256-caFM1A4SGZ8MIIoWnzBdKJOAgzscrf9eGtv/GCSfzag=";
vendorSha256 = "sha256-ctIKaThBIzaBw3/a0pat+G7Zb4Y2F7mk8VZWoM0XdyI=";
doCheck = false;

View File

@ -1,30 +1,63 @@
{ lib, stdenv, fetchurl, elfutils, libunwind }:
{ lib, stdenv, fetchurl, fetchgit, autoreconfHook, dejagnu, elfutils }:
stdenv.mkDerivation rec {
pname = "ltrace";
version = "0.7.3";
version = "0.7.91";
src = fetchurl {
url = "mirror://debian/pool/main/l/${pname}/${pname}_${version}.orig.tar.bz2";
sha256 = "00wmbdghqbz6x95m1mcdd3wd46l6hgcr4wggdp049dbifh3qqvqf";
url = "https://src.fedoraproject.org/repo/pkgs/ltrace/ltrace-0.7.91.tar.bz2/9db3bdee7cf3e11c87d8cc7673d4d25b/ltrace-0.7.91.tar.bz2";
sha256 = "sha256-HqellbKh2ZDHxslXl7SSIXtpjV1sodtgVwh8hgTC3Dc=";
};
buildInputs = [ elfutils libunwind ];
nativeBuildInputs = [ autoreconfHook ]; # Some patches impact ./configure.
buildInputs = [ elfutils ];
checkInputs = [ dejagnu ];
# Import Fedora's (very) large patch series: bug fixes, architecture support,
# etc. RH/Fedora are currently working with upstream to merge all these
# patches for the next major branch.
prePatch = let
debian = fetchurl {
url = "mirror://debian/pool/main/l/ltrace/ltrace_0.7.3-6.debian.tar.xz";
sha256 = "0xc4pfd8qw53crvdxr29iwl8na53zmknca082kziwpvlzsick4kp";
fedora = fetchgit {
url = "https://src.fedoraproject.org/rpms/ltrace.git";
rev = "00f430ccbebdbd13bdd4d7ee6303b091cf005542";
sha256 = "sha256-FBGEgmaslu7xrJtZ2WsYwu9Cw1ZQrWRV1+Eu9qLXO4s=";
};
in ''
tar xf '${debian}'
patches="$patches $(cat debian/patches/series | sed 's|^|debian/patches/|')"
# Order matters, read the patch list from the RPM spec. Our own patches
# are applied on top of the Fedora baseline.
fedorapatches=""
for p in $(grep '^Patch[0-9]\+:' ${fedora}/ltrace.spec | awk '{ print $2 }'); do
fedorapatches="$fedorapatches ${fedora}/$p"
done
patches="$fedorapatches $patches"
'';
# Cherry-pick extra patches for recent glibc support in the test suite.
patches = [
# https://gitlab.com/cespedes/ltrace/-/merge_requests/14
./testsuite-newfstatat.patch
# https://gitlab.com/cespedes/ltrace/-/merge_requests/15
./sysdeps-x86.patch
];
doCheck = true;
checkPhase = ''
# Hardening options interfere with some of the low-level expectations in
# the test suite (e.g. printf ends up redirected to __printf_chk).
NIX_HARDENING_ENABLE="" \
# Disable test that requires ptrace-ing a non-child process, this might be
# forbidden by YAMA ptrace policy on the build host.
RUNTESTFLAGS="--host=${stdenv.hostPlatform.config} \
--target=${stdenv.targetPlatform.config} \
--ignore attach-process.exp" \
make check
'';
meta = with lib; {
description = "Library call tracer";
homepage = "https://www.ltrace.org/";
platforms = [ "i686-linux" "x86_64-linux" ];
license = licenses.gpl2;
platforms = platforms.linux;
license = licenses.gpl2Plus;
maintainers = with maintainers; [ delroth ];
};
}

View File

@ -0,0 +1,328 @@
diff --git a/sysdeps/linux-gnu/x86/syscallent.h b/sysdeps/linux-gnu/x86/syscallent.h
index 345fe20..66ac522 100644
--- a/sysdeps/linux-gnu/x86/syscallent.h
+++ b/sysdeps/linux-gnu/x86/syscallent.h
@@ -238,7 +238,7 @@
"setfsgid32", /* 216 */
"pivot_root", /* 217 */
"mincore", /* 218 */
- "madvise1", /* 219 */
+ "madvise", /* 219 */
"getdents64", /* 220 */
"fcntl64", /* 221 */
"222", /* 222 */
@@ -279,14 +279,14 @@
"remap_file_pages", /* 257 */
"set_tid_address", /* 258 */
"timer_create", /* 259 */
- "260", /* 260 */
- "261", /* 261 */
- "262", /* 262 */
- "263", /* 263 */
- "264", /* 264 */
- "265", /* 265 */
- "266", /* 266 */
- "267", /* 267 */
+ "timer_settime", /* 260 */
+ "timer_gettime", /* 261 */
+ "timer_getoverrun", /* 262 */
+ "timer_delete", /* 263 */
+ "clock_settime", /* 264 */
+ "clock_gettime", /* 265 */
+ "clock_getres", /* 266 */
+ "clock_nanosleep", /* 267 */
"statfs64", /* 268 */
"fstatfs64", /* 269 */
"tgkill", /* 270 */
@@ -297,11 +297,11 @@
"get_mempolicy", /* 275 */
"set_mempolicy", /* 276 */
"mq_open", /* 277 */
- "278", /* 278 */
- "279", /* 279 */
- "280", /* 280 */
- "281", /* 281 */
- "282", /* 282 */
+ "mq_unlink", /* 278 */
+ "mq_timedsend", /* 279 */
+ "mq_timedreceive", /* 280 */
+ "mq_notify", /* 281 */
+ "mq_getsetattr", /* 282 */
"kexec_load", /* 283 */
"waitid", /* 284 */
"285", /* 285 */
@@ -368,3 +368,105 @@
"setns", /* 346 */
"process_vm_readv", /* 347 */
"process_vm_writev", /* 348 */
+ "kcmp", /* 349 */
+ "finit_module", /* 350 */
+ "sched_setattr", /* 351 */
+ "sched_getattr", /* 352 */
+ "renameat2", /* 353 */
+ "seccomp", /* 354 */
+ "getrandom", /* 355 */
+ "memfd_create", /* 356 */
+ "bpf", /* 357 */
+ "execveat", /* 358 */
+ "socket", /* 359 */
+ "socketpair", /* 360 */
+ "bind", /* 361 */
+ "connect", /* 362 */
+ "listen", /* 363 */
+ "accept4", /* 364 */
+ "getsockopt", /* 365 */
+ "setsockopt", /* 366 */
+ "getsockname", /* 367 */
+ "getpeername", /* 368 */
+ "sendto", /* 369 */
+ "sendmsg", /* 370 */
+ "recvfrom", /* 371 */
+ "recvmsg", /* 372 */
+ "shutdown", /* 373 */
+ "userfaultfd", /* 374 */
+ "membarrier", /* 375 */
+ "mlock2", /* 376 */
+ "copy_file_range", /* 377 */
+ "preadv2", /* 378 */
+ "pwritev2", /* 379 */
+ "pkey_mprotect", /* 380 */
+ "pkey_alloc", /* 381 */
+ "pkey_free", /* 382 */
+ "statx", /* 383 */
+ "arch_prctl", /* 384 */
+ "io_pgetevents", /* 385 */
+ "rseq", /* 386 */
+ "387", /* 387 */
+ "388", /* 388 */
+ "389", /* 389 */
+ "390", /* 390 */
+ "391", /* 391 */
+ "392", /* 392 */
+ "semget", /* 393 */
+ "semctl", /* 394 */
+ "shmget", /* 395 */
+ "shmctl", /* 396 */
+ "shmat", /* 397 */
+ "shmdt", /* 398 */
+ "msgget", /* 399 */
+ "msgsnd", /* 400 */
+ "msgrcv", /* 401 */
+ "msgctl", /* 402 */
+ "clock_gettime64", /* 403 */
+ "clock_settime64", /* 404 */
+ "clock_adjtime64", /* 405 */
+ "clock_getres_time64", /* 406 */
+ "clock_nanosleep_time64", /* 407 */
+ "timer_gettime64", /* 408 */
+ "timer_settime64", /* 409 */
+ "timerfd_gettime64", /* 410 */
+ "timerfd_settime64", /* 411 */
+ "utimensat_time64", /* 412 */
+ "pselect6_time64", /* 413 */
+ "ppoll_time64", /* 414 */
+ "415", /* 415 */
+ "io_pgetevents_time64", /* 416 */
+ "recvmmsg_time64", /* 417 */
+ "mq_timedsend_time64", /* 418 */
+ "mq_timedreceive_time64", /* 419 */
+ "semtimedop_time64", /* 420 */
+ "rt_sigtimedwait_time64", /* 421 */
+ "futex_time64", /* 422 */
+ "sched_rr_get_interval_time64", /* 423 */
+ "pidfd_send_signal", /* 424 */
+ "io_uring_setup", /* 425 */
+ "io_uring_enter", /* 426 */
+ "io_uring_register", /* 427 */
+ "open_tree", /* 428 */
+ "move_mount", /* 429 */
+ "fsopen", /* 430 */
+ "fsconfig", /* 431 */
+ "fsmount", /* 432 */
+ "fspick", /* 433 */
+ "pidfd_open", /* 434 */
+ "clone3", /* 435 */
+ "close_range", /* 436 */
+ "openat2", /* 437 */
+ "pidfd_getfd", /* 438 */
+ "faccessat2", /* 439 */
+ "process_madvise", /* 440 */
+ "epoll_pwait2", /* 441 */
+ "mount_setattr", /* 442 */
+ "quotactl_fd", /* 443 */
+ "landlock_create_ruleset", /* 444 */
+ "landlock_add_rule", /* 445 */
+ "landlock_restrict_self", /* 446 */
+ "memfd_secret", /* 447 */
+ "process_mrelease", /* 448 */
+ "futex_waitv", /* 449 */
+ "set_mempolicy_home_node", /* 450 */
diff --git a/sysdeps/linux-gnu/x86/syscallent1.h b/sysdeps/linux-gnu/x86/syscallent1.h
index 91ae8d6..f8b15f7 100644
--- a/sysdeps/linux-gnu/x86/syscallent1.h
+++ b/sysdeps/linux-gnu/x86/syscallent1.h
@@ -36,8 +36,8 @@
"rt_sigprocmask", /* 14 */
"rt_sigreturn", /* 15 */
"ioctl", /* 16 */
- "pread", /* 17 */
- "pwrite", /* 18 */
+ "pread64", /* 17 */
+ "pwrite64", /* 18 */
"readv", /* 19 */
"writev", /* 20 */
"access", /* 21 */
@@ -233,8 +233,8 @@
"get_thread_area", /* 211 */
"lookup_dcookie", /* 212 */
"epoll_create", /* 213 */
- "epoll_ctl", /* 214 */
- "epoll_wait", /* 215 */
+ "epoll_ctl_old", /* 214 */
+ "epoll_wait_old", /* 215 */
"remap_file_pages", /* 216 */
"getdents64", /* 217 */
"set_tid_address", /* 218 */
@@ -331,3 +331,142 @@
"getcpu", /* 309 */
"process_vm_readv", /* 310 */
"process_vm_writev", /* 311 */
+ "kcmp", /* 312 */
+ "finit_module", /* 313 */
+ "sched_setattr", /* 314 */
+ "sched_getattr", /* 315 */
+ "renameat2", /* 316 */
+ "seccomp", /* 317 */
+ "getrandom", /* 318 */
+ "memfd_create", /* 319 */
+ "kexec_file_load", /* 320 */
+ "bpf", /* 321 */
+ "execveat", /* 322 */
+ "userfaultfd", /* 323 */
+ "membarrier", /* 324 */
+ "mlock2", /* 325 */
+ "copy_file_range", /* 326 */
+ "preadv2", /* 327 */
+ "pwritev2", /* 328 */
+ "pkey_mprotect", /* 329 */
+ "pkey_alloc", /* 330 */
+ "pkey_free", /* 331 */
+ "statx", /* 332 */
+ "io_pgetevents", /* 333 */
+ "rseq", /* 334 */
+ "335", /* 335 */
+ "336", /* 336 */
+ "337", /* 337 */
+ "338", /* 338 */
+ "339", /* 339 */
+ "340", /* 340 */
+ "341", /* 341 */
+ "342", /* 342 */
+ "343", /* 343 */
+ "344", /* 344 */
+ "345", /* 345 */
+ "346", /* 346 */
+ "347", /* 347 */
+ "348", /* 348 */
+ "349", /* 349 */
+ "350", /* 350 */
+ "351", /* 351 */
+ "352", /* 352 */
+ "353", /* 353 */
+ "354", /* 354 */
+ "355", /* 355 */
+ "356", /* 356 */
+ "357", /* 357 */
+ "358", /* 358 */
+ "359", /* 359 */
+ "360", /* 360 */
+ "361", /* 361 */
+ "362", /* 362 */
+ "363", /* 363 */
+ "364", /* 364 */
+ "365", /* 365 */
+ "366", /* 366 */
+ "367", /* 367 */
+ "368", /* 368 */
+ "369", /* 369 */
+ "370", /* 370 */
+ "371", /* 371 */
+ "372", /* 372 */
+ "373", /* 373 */
+ "374", /* 374 */
+ "375", /* 375 */
+ "376", /* 376 */
+ "377", /* 377 */
+ "378", /* 378 */
+ "379", /* 379 */
+ "380", /* 380 */
+ "381", /* 381 */
+ "382", /* 382 */
+ "383", /* 383 */
+ "384", /* 384 */
+ "385", /* 385 */
+ "386", /* 386 */
+ "387", /* 387 */
+ "388", /* 388 */
+ "389", /* 389 */
+ "390", /* 390 */
+ "391", /* 391 */
+ "392", /* 392 */
+ "393", /* 393 */
+ "394", /* 394 */
+ "395", /* 395 */
+ "396", /* 396 */
+ "397", /* 397 */
+ "398", /* 398 */
+ "399", /* 399 */
+ "400", /* 400 */
+ "401", /* 401 */
+ "402", /* 402 */
+ "403", /* 403 */
+ "404", /* 404 */
+ "405", /* 405 */
+ "406", /* 406 */
+ "407", /* 407 */
+ "408", /* 408 */
+ "409", /* 409 */
+ "410", /* 410 */
+ "411", /* 411 */
+ "412", /* 412 */
+ "413", /* 413 */
+ "414", /* 414 */
+ "415", /* 415 */
+ "416", /* 416 */
+ "417", /* 417 */
+ "418", /* 418 */
+ "419", /* 419 */
+ "420", /* 420 */
+ "421", /* 421 */
+ "422", /* 422 */
+ "423", /* 423 */
+ "pidfd_send_signal", /* 424 */
+ "io_uring_setup", /* 425 */
+ "io_uring_enter", /* 426 */
+ "io_uring_register", /* 427 */
+ "open_tree", /* 428 */
+ "move_mount", /* 429 */
+ "fsopen", /* 430 */
+ "fsconfig", /* 431 */
+ "fsmount", /* 432 */
+ "fspick", /* 433 */
+ "pidfd_open", /* 434 */
+ "clone3", /* 435 */
+ "close_range", /* 436 */
+ "openat2", /* 437 */
+ "pidfd_getfd", /* 438 */
+ "faccessat2", /* 439 */
+ "process_madvise", /* 440 */
+ "epoll_pwait2", /* 441 */
+ "mount_setattr", /* 442 */
+ "quotactl_fd", /* 443 */
+ "landlock_create_ruleset", /* 444 */
+ "landlock_add_rule", /* 445 */
+ "landlock_restrict_self", /* 446 */
+ "memfd_secret", /* 447 */
+ "process_mrelease", /* 448 */
+ "futex_waitv", /* 449 */
+ "set_mempolicy_home_node", /* 450 */

View File

@ -0,0 +1,13 @@
diff --git a/testsuite/ltrace.main/system_calls.exp b/testsuite/ltrace.main/system_calls.exp
index 1b64cb0..af19916 100644
--- a/testsuite/ltrace.main/system_calls.exp
+++ b/testsuite/ltrace.main/system_calls.exp
@@ -133,7 +133,7 @@ Match [Diff [Calls [ltraceRun -L -S -- $bin]] \
{ {^write$} == 1 }
{ {^unlink(at)?$} >= 2 }
{ {^open(at)?$} == 1 }
- { {^(new|f)?stat(64)?$} >= 1 }
+ { {^(new)?f?statx?(at)?(64)?$} >= 1 }
{ {^close$} == 1 }
{ {^getcwd$} == 1 }
{ {^chdir$} == 1 }

View File

@ -2,13 +2,13 @@
buildGoModule rec {
pname = "protoc-gen-validate";
version = "0.6.8";
version = "0.6.12";
src = fetchFromGitHub {
owner = "envoyproxy";
repo = "protoc-gen-validate";
rev = "v${version}";
sha256 = "sha256-s66HfafyiAwr4tvWiPVj7ivWE9C03KTGgI/iu0LgNGk=";
sha256 = "sha256-JoOTIteE4/IFsVVXcRI1KYpRONjo3veQ6uCtxYFlz8Y=";
};
vendorSha256 = "sha256-vFi1DT7o2fyzxO/aZHtdsU1/G/sGmamqZPeql0vQVjs=";

View File

@ -1,29 +1,35 @@
{ stdenv, lib, fetchFromGitHub, rustPlatform }:
{ lib, rustPlatform, fetchFromGitHub }:
rustPlatform.buildRustPackage rec {
pname = "rq";
version = "1.0.2";
version = "1.0.4";
src = fetchFromGitHub {
owner = "dflemstr";
repo = pname;
rev = "v${version}";
sha256 = "0km9d751jr6c5qy4af6ks7nv3xfn13iqi03wq59a1c73rnf0zinp";
sha256 = "sha256-QyYTbMXikLSe3eYJRUALQJxUJjA6VlvaLMwGrxIKfZI=";
};
cargoSha256 = "0071q08f75qrxdkbx1b9phqpbj15r79jbh391y32acifi7hr35hj";
cargoSha256 = "sha256-WAgWc9rAQBjrsaHP6s3Djpg3iYmfRVC9J9yq0T/zMqA=";
postPatch = ''
# Remove #[deny(warnings)] which is equivalent to -Werror in C.
# Prevents build failures when upgrading rustc, which may give more warnings.
substituteInPlace src/lib.rs \
--replace "#![deny(warnings)]" ""
# build script tries to get version information from git
# this fixes the --version output
rm build.rs
'';
VERGEN_SEMVER = version;
meta = with lib; {
description = "A tool for doing record analysis and transformation";
homepage = "https://github.com/dflemstr/rq";
license = with licenses; [ asl20 ];
maintainers = with maintainers; [ aristid Br1ght0ne ];
maintainers = with maintainers; [ aristid Br1ght0ne figsoda ];
};
}

View File

@ -8,16 +8,16 @@
rustPlatform.buildRustPackage rec {
pname = "ruff";
version = "0.0.48";
version = "0.0.49";
src = fetchFromGitHub {
owner = "charliermarsh";
repo = pname;
rev = "v${version}";
sha256 = "sha256-KTvssDMy9Gol98jRPxDwjRIPAWNKU2Dx0TKAFvsX2zE=";
sha256 = "sha256-Ytjtw13tVn29rfHd5yPg3ZdAzBevHQblPkWZ+i3cX/g=";
};
cargoSha256 = "sha256-9OX1s461S5KDfwYq0kEI55LV4FmLGLEWI69wWOmDxtI=";
cargoSha256 = "sha256-nryWFPjsipweTFe9Snggv7O/xmtgO7XFDcR6VmBYHkc=";
buildInputs = lib.optionals stdenv.isDarwin [
CoreServices

View File

@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "shellharden";
version = "4.2.0";
version = "4.3.0";
src = fetchFromGitHub {
owner = "anordal";
repo = pname;
rev = "v${version}";
sha256 = "081b51h88hhyzn9vb9pcszz1wfdj73xwsyfn2ygz708kabzqpvdl";
sha256 = "sha256-yOfGMxNaaw5ub7woShDMCJNiz6FgV5IBJN87VmORLvg=";
};
cargoSha256 = "1gwlmds417szwvywvm19wv60a83inp52sf46sd05x5vahb8gv8hg";
cargoSha256 = "sha256-o3CBnxEQNmvn+h/QArIkzi9xfZzIngvwHpkMT+PItY4=";
postPatch = "patchShebangs moduletests/run";

View File

@ -2,14 +2,14 @@
buildGoModule rec {
pname = "symfony-cli";
version = "5.4.13";
vendorSha256 = "sha256-/HJgMCRfSS3ln/bW7pb6x9ugece8MFHTLHARTNMHNEU=";
version = "5.4.14";
vendorSha256 = "sha256-A0Dq5QoKSFDpif8x27a1O8CGZ9s5PzOycvPfvEp4qn4=";
src = fetchFromGitHub {
owner = "symfony-cli";
repo = "symfony-cli";
rev = "v${version}";
sha256 = "sha256-yTCq+kx86TGjDZ9Cx4d4ni1Q8yvgXSmJP3YD1owrLN8=";
sha256 = "sha256-XALXgEzVlgUbqatQMBd+blLK9Lt1rJ9+mWEvxhxneIo=";
};
postInstall = ''

View File

@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "acpid";
version = "2.0.33";
version = "2.0.34";
src = fetchurl {
url = "mirror://sourceforge/acpid2/acpid-${version}.tar.xz";
sha256 = "sha256-CFb3Gz6zShtmPQqOY2Pfy8UZ5j2EczBJiJhljily2+g=";
sha256 = "sha256-LQlcjPy8hHyux0bWLNyNC/8ewbxy73xnTHIeBNpqszM=";
};
nativeBuildInputs = [ autoreconfHook ];

View File

@ -68,13 +68,13 @@ with lib;
stdenv.mkDerivation rec {
pname = "conky";
version = "1.12.2";
version = "1.13.1";
src = fetchFromGitHub {
owner = "brndnmtthws";
repo = "conky";
rev = "v${version}";
sha256 = "sha256-x6bR5E5LIvKWiVM15IEoUgGas/hcRp3F/O4MTOhVPb8=";
sha256 = "sha256-3eCRzjfHGFiKuxmRHvnzqAg/+ApUKnHhsumWnio/Qxg=";
};
postPatch = ''

View File

@ -2,13 +2,13 @@
rustPlatform.buildRustPackage rec {
pname = "system76-firmware";
# Check Makefile when updating, make sure postInstall matches make install
version = "1.0.42";
version = "1.0.43";
src = fetchFromGitHub {
owner = "pop-os";
repo = pname;
rev = version;
sha256 = "sha256-8raRfmNAvgxBVsFeOu/XPs5YU1wPpRBo3Cog/UpE5/o=";
sha256 = "sha256-0NlM5ugpJzwzXgm8TqM6/aj3b+lDYbLeYOHNHM3g8aw=";
};
nativeBuildInputs = [ pkg-config makeWrapper ];
@ -17,7 +17,7 @@ rustPlatform.buildRustPackage rec {
cargoBuildFlags = [ "--workspace" ];
cargoSha256 = "sha256-aKyLAISZlQz5e8MvOoydAZ4bwCEZ1K3FldyoG6R9FJU=";
cargoSha256 = "sha256-oyHnEWtQ0pl4SaJsnao+oTDBuu9PJdU3uqLTDowRWQw=";
# Purposefully don't install systemd unit file, that's for NixOS
postInstall = ''

View File

@ -1,14 +1,20 @@
{ lib, stdenv, fetchFromGitHub, kernel, bluez }:
{ lib
, stdenv
, fetchFromGitHub
, kernel
, bluez
, nixosTests
}:
stdenv.mkDerivation rec {
stdenv.mkDerivation (finalAttrs: {
pname = "xpadneo";
version = "0.9.4";
version = "0.9.5";
src = fetchFromGitHub {
owner = "atar-axis";
repo = pname;
rev = "refs/tags/v${version}";
sha256 = "sha256-4zd+x9uYl0lJgePM9LEgLYFqvcw6VPF/CbR1XiYSwGE=";
repo = "xpadneo";
rev = "refs/tags/v${finalAttrs.version}";
sha256 = "sha256-rT2Mq40fE055FemDG7PBjt+cxgIHJG9tTjtw2nW6B98=";
};
setSourceRoot = ''
@ -22,13 +28,17 @@ stdenv.mkDerivation rec {
"-C"
"${kernel.dev}/lib/modules/${kernel.modDirVersion}/build"
"M=$(sourceRoot)"
"VERSION=${version}"
"VERSION=${finalAttrs.version}"
];
buildFlags = [ "modules" ];
installFlags = [ "INSTALL_MOD_PATH=${placeholder "out"}" ];
installTargets = [ "modules_install" ];
passthru.tests = {
xpadneo = nixosTests.xpadneo;
};
meta = with lib; {
description = "Advanced Linux driver for Xbox One wireless controllers";
homepage = "https://atar-axis.github.io/xpadneo";
@ -36,4 +46,4 @@ stdenv.mkDerivation rec {
maintainers = with maintainers; [ kira-bruneau ];
platforms = platforms.linux;
};
}
})

View File

@ -14,7 +14,7 @@
stdenv.mkDerivation rec {
pname = "slurm";
version = "22.05.3.1";
version = "22.05.4.1";
# N.B. We use github release tags instead of https://www.schedmd.com/downloads.php
# because the latter does not keep older releases.
@ -23,7 +23,7 @@ stdenv.mkDerivation rec {
repo = "slurm";
# The release tags use - instead of .
rev = "${pname}-${builtins.replaceStrings ["."] ["-"] version}";
sha256 = "113l23zf98r2rz4smyb0lk68p5jj2gx2y2j11vvf5wq4apzyz8jf";
sha256 = "100ixhpi4ahx5w7b1ncgmmg1ar48brp095lrxhcxr55fq2wqlv35";
};
outputs = [ "out" "dev" ];

View File

@ -5,13 +5,13 @@
}:
let
version = "2.3.0";
version = "2.4.0";
src = fetchFromGitHub {
owner = "influxdata";
repo = "influx-cli";
rev = "v${version}";
sha256 = "sha256-i3PN0mvSzPX/hu6fF2oizfioHZ2qU2V+mRwuxT1AYWo=";
sha256 = "sha256-l27BAHQtMA4kE7VEZLdOPFnSXtyWUOrcUFitaWqwvTw=";
};
in buildGoModule {
@ -19,7 +19,7 @@ in buildGoModule {
version = version;
src = src;
vendorSha256 = "sha256-Boz1G8g0fjjlflxZh4V8sd/v0bE9Oy3DpqywOpKxjd0=";
vendorSha256 = "sha256-GnVLr9mWehgw8vs4RiOrFHVlPpPT/LP6XvCq94aJxJQ=";
subPackages = [ "cmd/influx" ];
ldflags = [ "-X main.commit=v${version}" "-X main.version=${version}" ];

View File

@ -12,20 +12,23 @@
}:
let
version = "2.1.1";
ui_version = "2.1.2";
libflux_version = "0.139.0";
version = "2.4.0";
# Despite the name, this is not a rolling release. This is the
# version of the UI assets for 2.4.0, as specified in
# scripts/fetch-ui-assets.sh in the 2.4.0 tag of influxdb.
ui_version = "Master";
libflux_version = "0.179.0";
src = fetchFromGitHub {
owner = "influxdata";
repo = "influxdb";
rev = "v${version}";
sha256 = "sha256-wf01DhB1ampZuWPkHUEOf3KJK4GjeOAPL3LG2+g4NGY=";
sha256 = "sha256-ufJnrVWVfia2/xLRmFkauCw8ktdSJUybJkv42Gd0npg=";
};
ui = fetchurl {
url = "https://github.com/influxdata/ui/releases/download/OSS-${ui_version}/build.tar.gz";
sha256 = "sha256-fXjShNJfKN/ZQNQHoX9/Ou4XBrXavCN+rcO+8AMc5Ug=";
sha256 = "sha256-YKDp1jLyo4n+YTeMaWl8dhN4Lr3H8FXV7stJ3p3zFe8=";
};
flux = rustPlatform.buildRustPackage {
@ -35,10 +38,10 @@ let
owner = "influxdata";
repo = "flux";
rev = "v${libflux_version}";
sha256 = "sha256-cELeWZXGVLFoPYfBoBP8NeLBVFIb5o+lWyto42BLyXY=";
sha256 = "sha256-xcsmvT8Ve1WbfwrdVPnJcj7RAvrk795N3C95ubbGig0=";
};
sourceRoot = "source/libflux";
cargoSha256 = "sha256-wFgawxgqZqoPnOXJD3r5t2n7Y2bTAkBbBxeBtFEF7N4=";
cargoSha256 = "sha256-+hJQFV0tWeTQDN560DzROUNpdkcZ5h2sc13akHCgqPc=";
nativeBuildInputs = [ llvmPackages.libclang ];
buildInputs = lib.optional stdenv.isDarwin libiconv;
LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib";
@ -67,7 +70,7 @@ in buildGoModule {
nativeBuildInputs = [ go-bindata pkg-config ];
vendorSha256 = "sha256-GVLAzVJzSsC10ZWDZPP8upydwZG21E+zQ6sMKm1lCY0=";
vendorSha256 = "sha256-DZsd6qPKfRbnvz0UAww+ubaeTEqQxLeil1S3SZAmmJk=";
subPackages = [ "cmd/influxd" "cmd/telemetryd" ];
PKG_CONFIG_PATH = "${flux}/pkgconfig";
@ -81,7 +84,7 @@ in buildGoModule {
exit 1
fi
ui_ver=$(grep influxdata/ui/releases scripts/fetch-ui-assets.sh | ${perl}/bin/perl -pe 's#.*/OSS-([^/]+)/.*#$1#')
ui_ver=$(egrep 'influxdata/ui/releases/.*/sha256.txt' scripts/fetch-ui-assets.sh | ${perl}/bin/perl -pe 's#.*/OSS-([^/]+)/.*#$1#')
if [ "$ui_ver" != "${ui_version}" ]; then
echo "scripts/fetch-ui-assets.sh wants UI $ui_ver, but nix derivation provides ${ui_version}"
exit 1

View File

@ -2,11 +2,11 @@
, dataPath ? "/var/lib/snappymail" }:
stdenv.mkDerivation rec {
pname = "snappymail";
version = "2.18.1";
version = "2.18.3";
src = fetchurl {
url = "https://github.com/the-djmaze/snappymail/releases/download/v${version}/snappymail-${version}.tar.gz";
sha256 = "sha256-0NsDm1dDMg0HbAmuGIrNRkwtjvaZ9QYh7GUXkOJNoKw=";
sha256 = "sha256-QAdR7fhF05taVtoUqqbw6EELnSDwRtX2O43VN8p6L7Q=";
};
sourceRoot = "snappymail";

View File

@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "squid";
version = "5.6";
version = "5.7";
src = fetchurl {
url = "http://www.squid-cache.org/Versions/v5/${pname}-${version}.tar.xz";
sha256 = "sha256-ONJzOKNHWXzg6T0MO+bl9mtnUEF8R0yofuDWG7bRSNs=";
hash = "sha256-awdTqrpMnE79Mz5nEkyuz3rWzC04WB8Z0vAyH1t+zYE=";
};
nativeBuildInputs = [ pkg-config ];
@ -16,6 +16,8 @@ stdenv.mkDerivation rec {
perl openldap db cyrus_sasl expat libxml2 openssl
] ++ lib.optionals stdenv.isLinux [ libcap pam systemd ];
enableParallelBuilding = true;
configureFlags = [
"--enable-ipv6"
"--disable-strict-error-checking"

View File

@ -2,16 +2,16 @@
buildGoModule rec {
pname = "traefik";
version = "2.8.5";
version = "2.8.8";
# Archive with static assets for webui
src = fetchzip {
url = "https://github.com/traefik/traefik/releases/download/v${version}/traefik-v${version}.src.tar.gz";
sha256 = "sha256-qRnt2ZyGMwnbilaau66/SEJOSWkKyZf1L7CLWVHme5k=";
sha256 = "sha256-DfCHoo6CmEzemzOQrjKj0+p1jogMUkT6wFIOXJssn1s=";
stripRoot = false;
};
vendorSha256 = "sha256-6gUnM+axlkzBwVx0OePTybPP1Fk+oqsFRED4+K9Weu4=";
vendorSha256 = "sha256-kKm8yvw5KVwXm2xz/8RxXAI+y1jD9IukSZWiRYG/pHA=";
subPackages = [ "cmd/traefik" ];

View File

@ -2,13 +2,13 @@
buildGoModule rec {
pname = "eksctl";
version = "0.112.0";
version = "0.113.0";
src = fetchFromGitHub {
owner = "weaveworks";
repo = pname;
rev = version;
sha256 = "sha256-kY2AE5lLP1awxfPj16MAhcxO59S3lOZOUXV2EzXDHTY=";
sha256 = "sha256-sHknZg34FHhYcf4l2oPQG6RGpybF0lC4n816YoVPeGk=";
};
vendorSha256 = "sha256-z/3aUSuAZSVsQ67JgUy6z3T91vKHlBjjQS4oSljl/nk=";

View File

@ -2,7 +2,7 @@
stdenv.mkDerivation rec {
pname = "ceph-csi";
version = "3.7.0";
version = "3.7.1";
nativeBuildInputs = [ go ];
buildInputs = [ ceph ];
@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
owner = "ceph";
repo = "ceph-csi";
rev = "v${version}";
sha256 = "sha256-DmYwLhJoWPsqtXQp2+vpUuEBfo7dTQkxMVa+/oR6LZk=";
sha256 = "sha256-VlOKN2PjHM0MdDz6t/AAjcFx4F15+7p3+25tLkRQH1Q=";
};
preConfigure = ''

View File

@ -2,7 +2,7 @@
rustPlatform.buildRustPackage rec {
pname = "shotgun";
version = "2.2.1";
version = "2.3.1";
nativeBuildInputs = [ pkg-config ];
@ -12,10 +12,10 @@ rustPlatform.buildRustPackage rec {
owner = "neXromancers";
repo = pname;
rev = "v${version}";
sha256 = "sha256-ClQP/iNs9b4foDUVpH37YCZyjVSgweHLKnSwnpkRwZI=";
sha256 = "sha256-hu8UYia2tu6I6Ii9aZ6vfpbrcDz4yeEDkljGFa5s6VY=";
};
cargoSha256 = "sha256-w5s9I7lXO8HN9zHqZQCeqBXSd7jmbsaqMZRwPLnbqNk=";
cargoSha256 = "sha256-UOchXeBX+sDuLhwWQRVFCj9loJUyr4IltiAKsQoh5/c=";
meta = with lib; {
description = "Minimal X screenshot utility";

View File

@ -38,7 +38,7 @@
stdenv.mkDerivation rec {
pname = "vips";
version = "8.13.0";
version = "8.13.2";
outputs = [ "bin" "out" "man" "dev" ];
@ -46,7 +46,7 @@ stdenv.mkDerivation rec {
owner = "libvips";
repo = "libvips";
rev = "v${version}";
sha256 = "sha256-N2jq68Vs/D+lZcIJVdjBLVaz2gK/TwqKeNfHUWdS3NA=";
sha256 = "sha256-Tff+M2qJ/FPxU7Y5gUnuF+Kbwh8DIW5Tb7fe0Lbi0m4=";
# Remove unicode file names which leads to different checksums on HFS+
# vs. other filesystems because of unicode normalisation.
postFetch = ''

View File

@ -4,11 +4,11 @@ gobject-introspection, gsettings-desktop-schemas, wrapGAppsHook }:
stdenv.mkDerivation rec {
pname = "birdfont";
version = "2.32.0";
version = "2.32.3";
src = fetchurl {
url = "https://birdfont.org/releases/${pname}-${version}.tar.xz";
sha256 = "sha256-OnbLDKBxk1IGZZlSM/zK6xus6zmzV7OygfvHFBujHUk=";
sha256 = "sha256-ZsYwDS7pgs635P3wPX/PCTuHLX3/Iu97HgVe+qFyjZw=";
};
nativeBuildInputs = [ python3 pkg-config vala gobject-introspection wrapGAppsHook ];

View File

@ -82,6 +82,10 @@ python3Packages.buildPythonApplication rec {
# disable formatting tests because they can break on black updates
"test_code_is_black_clean"
# fails at 2022-09-30
"test_identification"
"test_diff"
] ++ lib.optionals stdenv.isDarwin [
# Disable flaky tests on Darwin
"test_non_unicode_filename"

View File

@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "fluent-bit";
version = "1.9.8";
version = "1.9.9";
src = fetchFromGitHub {
owner = "fluent";
repo = "fluent-bit";
rev = "v${version}";
sha256 = "sha256-qHfEcLqCajGFXlEP6as7kvqFUcEAr74UZ9zSAL+OC/I=";
sha256 = "sha256-6+4DOi61WwUstIkHzUU4eBsfeqEUxJY54RccvpXjlJY=";
};
nativeBuildInputs = [ cmake flex bison ];

View File

@ -2,15 +2,15 @@
buildGoModule rec {
pname = "infracost";
version = "0.10.11";
version = "0.10.12";
src = fetchFromGitHub {
owner = "infracost";
rev = "v${version}";
repo = "infracost";
sha256 = "sha256-ZBm93lBu6sblc/P5m1igf5K8yJ8ff5qcvECZ9o3Gn6I=";
sha256 = "sha256-sobIgUiFMLZ2/vkKO2DIQfEM92eRK1PV+oKaWfwk/nE=";
};
vendorSha256 = "sha256-Hs+WWc2UJtxc2isSfef8xvKDqhWytkUWh6DEq+bbAt4=";
vendorSha256 = "sha256-QowKhRakXkkmKDI0vbSjWdftz4nXnjKNpdD4gscR3dM=";
ldflags = [ "-s" "-w" "-X github.com/infracost/infracost/internal/version.Version=v${version}" ];

View File

@ -7,23 +7,25 @@
stdenv.mkDerivation rec {
pname = "minipro";
version = "0.5";
version = "0.6";
src = fetchFromGitLab {
owner = "DavidGriffith";
repo = "minipro";
rev = version;
sha256 = "sha256-Hyj2LyY7W8opjigH+QLHHbDyelC0LMgGgdN+u3nNoJc=";
sha256 = "sha256-6i4PYzSm6lcO/Nb6n3holrNe4TtAnG2o81ZIMAIGqOE=";
};
nativeBuildInputs = [ pkg-config ];
buildInputs = [ libusb1 ];
makeFlags = [
"VERSION=${version}"
"PREFIX=$(out)"
"UDEV_DIR=$(out)/lib/udev"
"COMPLETIONS_DIR=$(out)/share/bash-completion/completions"
"PKG_CONFIG=${pkg-config}/bin/${pkg-config.targetPrefix}pkg-config"
"CC=${stdenv.cc.targetPrefix}cc"
"CFLAGS=-O2"
];
meta = with lib; {

View File

@ -0,0 +1,73 @@
{ lib, stdenv, makeWrapper, fetchzip, runCommand, plantuml, plantuml-c4, jre }:
# The C4-PlantUML docs say that it suffices to run plantuml with the
# -DRELATIVE_INCLUDE="..." arg to make plantuml find the C4 templates
# when included like "!include C4_Container.puml".
# Unfortunately, this is not sufficient in practise, when the path is not ".".
# What helps is setting -Dplantuml.include.path="..." *before* the jar
# parameter.
# The -DRELATIVE_INCLUDE param then *still* needs to be set (*after* the jar
# argument), because the C4 template vars check for existence of this variable
# and if it is not set, reference paths in the internet.
let
c4-lib = fetchzip {
url = "https://github.com/plantuml-stdlib/C4-PlantUML/archive/88a3f99150c6ff7953c4a99b184d03412ffdedb1.zip";
sha256 = "sha256-vk4YWdGb47OsI9mApGTQ7OfELRZdBouzKfUZq3kchcM=";
};
sprites = fetchzip {
url = "https://github.com/tupadr3/plantuml-icon-font-sprites/archive/fa3f885dbd45c9cd0cdf6c0e5e4fb51ec8b76582.zip";
sha256 = "sha256-lt9+NNMIaZSkKNsGyHoqXUCTlKmZFGfNYYGjer6X0Xc=";
};
# In order to pre-fix the plantuml.jar parameter with the argument
# -Dplantuml.include.path=..., we post-fix the java command using a wrapper.
# This way the plantuml derivation can remain unchanged.
plantumlWithExtraPath =
let
plantumlIncludePath = lib.concatStringsSep ":" [ c4-lib sprites ];
includeFlag = "-Dplantuml.include.path=${lib.escapeShellArg plantumlIncludePath}";
postFixedJre =
runCommand "jre-postfixed" { nativeBuildInputs = [ makeWrapper ]; } ''
mkdir -p $out/bin
makeWrapper ${jre}/bin/java $out/bin/java \
--add-flags ${lib.escapeShellArg includeFlag}
'';
in
plantuml.override { jre = postFixedJre; };
in
stdenv.mkDerivation rec {
pname = "plantuml-c4";
version = "unstable-2022-08-21";
nativeBuildInputs = [ makeWrapper ];
buildCommand = ''
mkdir -p $out/bin
makeWrapper ${plantumlWithExtraPath}/bin/plantuml $out/bin/plantuml \
--add-flags "-DRELATIVE_INCLUDE=\"${c4-lib}\""
$out/bin/plantuml -help
'';
passthru.tests.example-c4-diagram =
runCommand "c4-plantuml-sample.png" { nativeBuildInputs = [ plantuml-c4 ]; } ''
sed 's/https:.*\///' "${c4-lib}/samples/C4_Context Diagram Sample - enterprise.puml" > sample.puml
plantuml sample.puml -o $out
sed 's/!include ..\//!include /' ${sprites}/examples/complex-example.puml > sprites.puml
plantuml sprites.puml -o $out
'';
meta = with lib; {
description = "PlantUML bundled with C4-Plantuml and plantuml sprites library";
homepage = "https://github.com/plantuml-stdlib/C4-PlantUML";
license = licenses.mit;
maintainers = with maintainers; [ tfc ];
platforms = platforms.unix;
};
}

View File

@ -6,13 +6,13 @@
stdenv.mkDerivation rec {
pname = "snapper";
version = "0.10.2";
version = "0.10.3";
src = fetchFromGitHub {
owner = "openSUSE";
repo = "snapper";
rev = "v${version}";
sha256 = "0x9anracaa19yqkc0x8wangrkdrx01kdy07c55lvlqrjyimfm4ih";
sha256 = "sha256-pi2S5dKUB2pjBQjaSJr789Ke5WU1uKp1RYMPKd0W4J0=";
};
nativeBuildInputs = [

View File

@ -29,7 +29,7 @@ let
boolToUpper = b: lib.toUpper (lib.boolToString b);
in
stdenv.mkDerivation rec {
version = "0.8.2";
version = "0.8.3";
pname = "davix" + lib.optionalString enableThirdPartyCopy "-copy";
nativeBuildInputs = [ cmake pkg-config python3 ];
buildInputs = [
@ -45,7 +45,7 @@ stdenv.mkDerivation rec {
# https://github.com/cern-fts/davix/releases/tag/R_0_8_0
src = fetchurl {
url = "https://github.com/cern-fts/davix/releases/download/R_${lib.replaceStrings ["."] ["_"] version}/davix-${version}.tar.gz";
sha256 = "sha256-iBeiTCPxMJud4jO5qIJFX0V8Qu3CpknccP4lJM922Uw=";
sha256 = "sha256-fjC1VB4I0y2/WuA8a8q+rsBjrsEKZkd4eCIie0VBrj4=";
};
preConfigure = ''

View File

@ -5,13 +5,13 @@
python3.pkgs.buildPythonApplication rec {
pname = "getmail6";
version = "6.18.9";
version = "6.18.10";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "v${version}";
hash = "sha256-qzlURYdE7nv+/wxK3B6WddmhW6xiLS7em3X5O5+CBbI=";
rev = "refs/tags/v${version}";
hash = "sha256-nRi0HUq8jEugFogerFD7Xu9fgn1njfumbwhChz2t4t8=";
};
# needs a Docker setup

View File

@ -14,13 +14,13 @@ let
in
buildGoModule rec {
pname = "netbird";
version = "0.9.6";
version = "0.9.7";
src = fetchFromGitHub {
owner = "netbirdio";
repo = pname;
rev = "v${version}";
sha256 = "sha256-VNKVl1C14iZROl3JFHY7+8EYbgZTuoz5rVOOBqkmmo0=";
sha256 = "sha256-phFkMJlzNUw5IrjXcAIGSWiGuRismNDuOQFqc5jJU5s=";
};
vendorSha256 = "sha256-VyYw8Hp2qWoRBeOFsgtxmvFN2cYzuDeYmWAwC/+vjI0=";

View File

@ -2,16 +2,16 @@
buildGoModule rec {
pname = "passphrase2pgp";
version = "1.2.0";
version = "1.2.1";
src = fetchFromGitHub {
owner = "skeeto";
repo = pname;
rev = "v${version}";
hash = "sha256-VNOoYYnHsSgiSbVxlBwYUq0JsLa4BwZQSvMVSiyB6rg=";
hash = "sha256-Ik/W3gGvrOyUvYgMYqT8FIFoxp62BXd2GpV14pYXEuY=";
};
vendorSha256 = "sha256-7q5nwkj4TP7VgHmV9YBbCB11yTPL7tK4gD+uN4Vw3Cs=";
vendorSha256 = "sha256-2H9YRVCaari47ppSkcQYg/P4Dzb4k5PLjKAtfp39NR8=";
postInstall = ''
mkdir -p $out/share/doc/$name

View File

@ -18,13 +18,13 @@ let
in
stdenv.mkDerivation rec {
pname = "tree";
version = "2.0.2";
version = "2.0.4";
src = fetchFromGitLab {
owner = "OldManProgrammer";
repo = "unix-tree";
rev = version;
sha256 = "sha256-ex4fD8dZJGplL3oMaSokMBn6PRJ8/s83CnWQaAjBcao=";
sha256 = "sha256-2voXL31JHh09yBBLuHhYyZsUapiPVF/cgRmTU6wSXk4=";
};
preConfigure = ''

View File

@ -3975,7 +3975,9 @@ with pkgs;
fx_cast_bridge = callPackage ../tools/misc/fx_cast { };
fzf = callPackage ../tools/misc/fzf { };
fzf = callPackage ../tools/misc/fzf {
buildGoModule = buildGo119Module;
};
fzf-obc = callPackage ../shells/bash/fzf-obc { };
@ -10120,6 +10122,8 @@ with pkgs;
plantuml = callPackage ../tools/misc/plantuml { };
plantuml-c4 = callPackage ../tools/misc/plantuml/plantuml-c4.nix { };
plantuml-server = callPackage ../tools/misc/plantuml-server { };
plan9port = callPackage ../tools/system/plan9port {
@ -27809,9 +27813,7 @@ with pkgs;
fritzprofiles = with python3.pkgs; toPythonApplication fritzprofiles;
fsv = callPackage ../applications/misc/fsv {
autoreconfHook = buildPackages.autoreconfHook269;
};
fsv = callPackage ../applications/misc/fsv { };
ft2-clone = callPackage ../applications/audio/ft2-clone {
inherit (darwin.apple_sdk.frameworks) CoreAudio CoreMIDI CoreServices Cocoa;
@ -29118,10 +29120,7 @@ with pkgs;
k3sup = callPackage ../applications/networking/cluster/k3sup {};
kconf = callPackage ../applications/networking/cluster/kconf {
# pinned due to build failure or vendoring problems. When unpinning double check with: nix-build -A $name.go-modules --rebuild
buildGoModule = buildGo117Module;
};
kconf = callPackage ../applications/networking/cluster/kconf { };
kail = callPackage ../tools/networking/kail { };
@ -29268,10 +29267,7 @@ with pkgs;
kubebuilder = callPackage ../applications/networking/cluster/kubebuilder { };
kuttl = callPackage ../applications/networking/cluster/kuttl {
# pinned due to build failure or vendoring problems. When unpinning double check with: nix-build -A $name.go-modules --rebuild
buildGoModule = buildGo117Module;
};
kuttl = callPackage ../applications/networking/cluster/kuttl { };
kubectl-doctor = callPackage ../applications/networking/cluster/kubectl-doctor {
# pinned due to build failure or vendoring problems. When unpinning double check with: nix-build -A $name.go-modules --rebuild
@ -31795,10 +31791,7 @@ with pkgs;
toxic = callPackage ../applications/networking/instant-messengers/toxic { };
toxiproxy = callPackage ../development/tools/toxiproxy {
# pinned due to build failure or vendoring problems. When unpinning double check with: nix-build -A $name.go-modules --rebuild
buildGoModule = buildGo117Module;
};
toxiproxy = callPackage ../development/tools/toxiproxy { };
tqsl = callPackage ../applications/radio/tqsl {
openssl = openssl_1_1;