Merge master into staging-next

This commit is contained in:
github-actions[bot] 2022-10-01 12:01:27 +00:00 committed by GitHub
commit 25043f0f28
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
51 changed files with 681 additions and 161 deletions

View file

@ -16,7 +16,7 @@ in
extraModprobeConfig = extraModprobeConfig =
mkIf mkIf
(config.hardware.bluetooth.enable && (config.hardware.bluetooth.enable &&
(lib.versionOlder config.boot.kernelPackages.kernel.version "5.12")) (lib.versionOlder config.boot.kernelPackages.kernel.version "5.12"))
"options bluetooth disable_ertm=1"; "options bluetooth disable_ertm=1";
extraModulePackages = with config.boot.kernelPackages; [ xpadneo ]; extraModulePackages = with config.boot.kernelPackages; [ xpadneo ];

View file

@ -31,6 +31,7 @@ let
in in
{ {
nix.registry.nixpkgs.flake.outPath = builtins.path { name = "source"; path = pkgs.path; };
# Provide the NixOS/Nixpkgs sources in /etc/nixos. This is required # Provide the NixOS/Nixpkgs sources in /etc/nixos. This is required
# for nixos-install. # for nixos-install.
boot.postBootCommands = mkAfter boot.postBootCommands = mkAfter

View file

@ -69,7 +69,7 @@ in {
ProtectKernelTunables = true; ProtectKernelTunables = true;
ProtectSystem = "full"; ProtectSystem = "full";
StateDirectory = "rust-motd"; StateDirectory = "rust-motd";
RestrictAddressFamilies = "none"; RestrictAddressFamilies = [ "AF_UNIX" ];
RestrictNamespaces = true; RestrictNamespaces = true;
RestrictRealtime = true; RestrictRealtime = true;
RestrictSUIDSGID = true; RestrictSUIDSGID = true;

View file

@ -212,6 +212,9 @@ with lib;
systemd.tmpfiles.rules = [ systemd.tmpfiles.rules = [
"d /var/spool/nullmailer - ${cfg.user} - - -" "d /var/spool/nullmailer - ${cfg.user} - - -"
"d /var/spool/nullmailer/failed 750 ${cfg.user} - - -"
"d /var/spool/nullmailer/queue 750 ${cfg.user} - - -"
"d /var/spool/nullmailer/tmp 750 ${cfg.user} - - -"
]; ];
systemd.services.nullmailer = { systemd.services.nullmailer = {
@ -220,7 +223,6 @@ with lib;
after = [ "network.target" ]; after = [ "network.target" ];
preStart = '' preStart = ''
mkdir -p /var/spool/nullmailer/{queue,tmp,failed}
rm -f /var/spool/nullmailer/trigger && mkfifo -m 660 /var/spool/nullmailer/trigger rm -f /var/spool/nullmailer/trigger && mkfifo -m 660 /var/spool/nullmailer/trigger
''; '';

View file

@ -465,7 +465,13 @@ in
networking.wireguard = { networking.wireguard = {
enable = mkOption { enable = mkOption {
description = lib.mdDoc "Whether to enable WireGuard."; description = lib.mdDoc ''
Whether to enable WireGuard.
Please note that {option}`systemd.network.netdevs` has more features
and is better maintained. When building new things, it is advised to
use that instead.
'';
type = types.bool; type = types.bool;
# 2019-05-25: Backwards compatibility. # 2019-05-25: Backwards compatibility.
default = cfg.interfaces != {}; default = cfg.interfaces != {};
@ -474,7 +480,13 @@ in
}; };
interfaces = mkOption { interfaces = mkOption {
description = lib.mdDoc "WireGuard interfaces."; description = lib.mdDoc ''
WireGuard interfaces.
Please note that {option}`systemd.network.netdevs` has more features
and is better maintained. When building new things, it is advised to
use that instead.
'';
default = {}; default = {};
example = { example = {
wg0 = { wg0 = {

View file

@ -63,7 +63,7 @@ in {
hashedPassword = mkOption { hashedPassword = mkOption {
default = ""; default = "";
description = description =
lib.mdDoc "Create the password with: 'echo -n 'thisismypassword' | npx argon2-cli -e'."; lib.mdDoc "Create the password with: `echo -n 'thisismypassword' | npx argon2-cli -e`.";
type = types.str; type = types.str;
}; };
@ -109,7 +109,7 @@ in {
HASHED_PASSWORD = cfg.hashedPassword; HASHED_PASSWORD = cfg.hashedPassword;
} // cfg.extraEnvironment; } // cfg.extraEnvironment;
serviceConfig = { serviceConfig = {
ExecStart = "${cfg.package}/bin/code-server --bind-addr ${cfg.host}:${toString cfg.port} --auth ${cfg.auth} " + builtins.concatStringsSep " " cfg.extraArguments; ExecStart = "${cfg.package}/bin/code-server --bind-addr ${cfg.host}:${toString cfg.port} --auth ${cfg.auth} " + lib.escapeShellArgs cfg.extraArguments;
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID"; ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
RuntimeDirectory = cfg.user; RuntimeDirectory = cfg.user;
User = cfg.user; User = cfg.user;

View file

@ -604,6 +604,10 @@ in
The configuration for each network interface. If The configuration for each network interface. If
{option}`networking.useDHCP` is true, then every {option}`networking.useDHCP` is true, then every
interface not listed here will be configured using DHCP. interface not listed here will be configured using DHCP.
Please note that {option}`systemd.network.netdevs` has more features
and is better maintained. When building new things, it is advised to
use that instead.
''; '';
type = with types; attrsOf (submodule interfaceOpts); type = with types; attrsOf (submodule interfaceOpts);
}; };

View file

@ -678,6 +678,7 @@ in {
xfce = handleTest ./xfce.nix {}; xfce = handleTest ./xfce.nix {};
xmonad = handleTest ./xmonad.nix {}; xmonad = handleTest ./xmonad.nix {};
xmonad-xdg-autostart = handleTest ./xmonad-xdg-autostart.nix {}; xmonad-xdg-autostart = handleTest ./xmonad-xdg-autostart.nix {};
xpadneo = handleTest ./xpadneo.nix {};
xrdp = handleTest ./xrdp.nix {}; xrdp = handleTest ./xrdp.nix {};
xss-lock = handleTest ./xss-lock.nix {}; xss-lock = handleTest ./xss-lock.nix {};
xterm = handleTest ./xterm.nix {}; xterm = handleTest ./xterm.nix {};

View file

@ -1,4 +1,4 @@
import ./make-test-python.nix ( import ./make-test-python.nix ({ pkgs, ... }:
let let
container = { container = {
@ -18,6 +18,7 @@ import ./make-test-python.nix (
}; };
containerSystem = (import ../lib/eval-config.nix { containerSystem = (import ../lib/eval-config.nix {
inherit (pkgs) system;
modules = [ container ]; modules = [ container ];
}).config.system.build.toplevel; }).config.system.build.toplevel;

18
nixos/tests/xpadneo.nix Normal file
View file

@ -0,0 +1,18 @@
import ./make-test-python.nix ({ lib, pkgs, ... }: {
name = "xpadneo";
meta.maintainers = with lib.maintainers; [ kira-bruneau ];
nodes = {
machine = {
config.hardware.xpadneo.enable = true;
};
};
# This is just a sanity check to make sure the module was
# loaded. We'd have to find some way to mock an xbox controller if
# we wanted more in-depth testing.
testScript = ''
machine.start();
machine.succeed("modinfo hid_xpadneo | grep 'version:\s\+${pkgs.linuxPackages.xpadneo.version}'")
'';
})

View file

@ -6,14 +6,14 @@
let chia = python3Packages.buildPythonApplication rec { let chia = python3Packages.buildPythonApplication rec {
pname = "chia"; pname = "chia";
version = "1.5.1"; version = "1.6.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "Chia-Network"; owner = "Chia-Network";
repo = "chia-blockchain"; repo = "chia-blockchain";
rev = version; rev = version;
fetchSubmodules = true; fetchSubmodules = true;
hash = "sha256-FzKdb6Z/ykKYjpjCr7QR5fxXPNnQbW3bBY97t7DxS90="; hash = "sha256-TNaHPvN19fkRqkQHtqdeEDwhqbntcVhxXhY8TNIScEg=";
}; };
patches = [ patches = [

View file

@ -1,38 +1,47 @@
{ lib, stdenv, fetchurl, fetchFromGitHub, autoreconfHook { lib
, libtool, pkg-config, gtk2, libGLU, file , stdenv
, fetchFromGitHub
, meson
, ninja
, pkg-config
, cglm
, gtk3
, libepoxy
, libGLU
}: }:
let stdenv.mkDerivation rec {
gtkglarea = stdenv.mkDerivation rec {
pname = "gtkglarea";
version = "2.1.0";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
sha256 = "1pl2vdj6l64j864ilhkq1bcggb3hrlxjwk5m029i7xfjfxc587lf";
};
nativeBuildInputs = [ pkg-config ];
buildInputs = [ gtk2 libGLU ];
hardeningDisable = [ "format" ];
};
in stdenv.mkDerivation rec {
pname = "fsv"; pname = "fsv";
version = "0.9-1"; version = "3.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "mcuelenaere"; owner = "jabl";
repo = "fsv"; repo = "fsv";
rev = "${pname}-${version}"; rev = "${pname}-${version}";
sha256 = "0n09jd7yqj18mx6zqbg7kab4idg5llr15g6avafj74fpg1h7iimj"; hash = "sha256-fxsA3qcBPvK4H5P4juGTe6eg1lkygvzFpNW36B9lsE4=";
}; };
postPatch = '' nativeBuildInputs = [
# fix build with gettext 0.20 meson
sed -i 's/AM_GNU_GETTEXT/AM_GNU_GETTEXT([external])/' configure.in ninja
''; pkg-config
];
nativeBuildInputs = [ autoreconfHook libtool pkg-config ]; buildInputs = [
buildInputs = [ file gtk2 libGLU gtkglarea ]; cglm
gtk3
libepoxy
libGLU
];
installPhase = ''
runHook preInstall
mkdir -p $out/bin
cp src/fsv $out/bin/fsv
runHook postInstall
'';
meta = with lib; { meta = with lib; {
description = "File system visualizer in cyberspace"; description = "File system visualizer in cyberspace";
@ -44,7 +53,7 @@ in stdenv.mkDerivation rec {
hard drive, or any arbitrarily large collection of files, limited only hard drive, or any arbitrarily large collection of files, limited only
by the host computer's memory and graphics hardware. by the host computer's memory and graphics hardware.
''; '';
homepage = "https://github.com/mcuelenaere/fsv"; homepage = "https://github.com/jabl/fsv";
license = licenses.lgpl2; license = licenses.lgpl2;
platforms = platforms.linux; platforms = platforms.linux;
maintainers = with maintainers; [ rnhmjoj ]; maintainers = with maintainers; [ rnhmjoj ];

View file

@ -2,13 +2,13 @@
mkDerivation rec { mkDerivation rec {
pname = "heimer"; pname = "heimer";
version = "3.6.0"; version = "3.6.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "juzzlin"; owner = "juzzlin";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "sha256-GQf5S7mYuucJS5jsz0upe6DiniY8YXZXYQV7nyrjVmE="; sha256 = "sha256-i4jgmqRvBX6g6IOitnBnQqWnFY5QoLk6/Cah0wCU8uc=";
}; };
nativeBuildInputs = [ cmake ]; nativeBuildInputs = [ cmake ];

View file

@ -1,4 +1,4 @@
{ lib, buildGoModule, fetchFromGitHub, installShellFiles }: { stdenv, lib, buildGoModule, fetchFromGitHub, installShellFiles, buildPackages }:
buildGoModule rec { buildGoModule rec {
pname = "hugo"; pname = "hugo";
@ -25,13 +25,13 @@ buildGoModule rec {
ldflags = [ "-s" "-w" "-X github.com/gohugoio/hugo/common/hugo.vendorInfo=nixpkgs" ]; ldflags = [ "-s" "-w" "-X github.com/gohugoio/hugo/common/hugo.vendorInfo=nixpkgs" ];
postInstall = '' postInstall = let emulator = stdenv.hostPlatform.emulator buildPackages; in ''
$out/bin/hugo gen man ${emulator} $out/bin/hugo gen man
installManPage man/* installManPage man/*
installShellCompletion --cmd hugo \ installShellCompletion --cmd hugo \
--bash <($out/bin/hugo completion bash) \ --bash <(${emulator} $out/bin/hugo completion bash) \
--fish <($out/bin/hugo completion fish) \ --fish <(${emulator} $out/bin/hugo completion fish) \
--zsh <($out/bin/hugo completion zsh) --zsh <(${emulator} $out/bin/hugo completion zsh)
''; '';
meta = with lib; { meta = with lib; {

View file

@ -1,23 +1,24 @@
{ lib, buildGoModule, fetchFromGitHub}: { lib, buildGoModule, fetchFromGitHub }:
buildGoModule rec { buildGoModule rec {
pname = "kuttl"; pname = "kuttl";
version = "0.11.1"; version = "0.13.0";
cli = "kubectl-kuttl"; cli = "kubectl-kuttl";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "kudobuilder"; owner = "kudobuilder";
repo = "kuttl"; repo = "kuttl";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-jvearvhl2fQV5OOVmvf3C4MjE//wkVs8Ly9BIwv15/8="; sha256 = "sha256-liuP8ALcPxbU+hZ54KDFj2r2yZpAbVago0IxIv52N3o=";
}; };
vendorSha256 = "sha256-EytHUfr6RbgXowYlfuajvNt9VwmGmvw9TBRtwYMAIh4="; vendorSha256 = "sha256-u8Ezk78CrAhSeeMVXj09/Hiegtx+ZNKlr/Fg0O7+iOY=";
subPackages = [ "cmd/kubectl-kuttl" ]; subPackages = [ "cmd/kubectl-kuttl" ];
ldflags = [ ldflags = [
"-s" "-w" "-s"
"-w"
"-X github.com/kudobuilder/kuttl/pkg/version.gitVersion=${version}" "-X github.com/kudobuilder/kuttl/pkg/version.gitVersion=${version}"
]; ];

View file

@ -2,16 +2,16 @@
buildGoModule rec { buildGoModule rec {
pname = "pluto"; pname = "pluto";
version = "5.10.7"; version = "5.11.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "FairwindsOps"; owner = "FairwindsOps";
repo = "pluto"; repo = "pluto";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-AGzDs2KZt44uBJRBHvBL7nn5TpgWbcdLTEf9Vx9j89U="; sha256 = "sha256-eyJ81i9kTuojBuo/rwfgnl3BRpiTnKst0SnL+oWfSWQ=";
}; };
vendorSha256 = "sha256-cA5QxI1lLBdzPOj3pFqqHPfMwJQPPiyqQA4FLwetNUs="; vendorSha256 = "sha256-QH/mKq7QydYvUHZIPjoBWy015Sghh30VdEWu76KZdPE=";
ldflags = [ ldflags = [
"-w" "-s" "-w" "-s"

View file

@ -2,13 +2,13 @@
buildGoModule rec { buildGoModule rec {
pname = "terragrunt"; pname = "terragrunt";
version = "0.38.9"; version = "0.39.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "gruntwork-io"; owner = "gruntwork-io";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-rfAVgnFAxEguFuY+Gfe/T0NcsD6LmPSquxuTR0bRqXQ="; sha256 = "sha256-Y8t5rThkPD3FzY25L2lOIvktU5+NwBZtq9Pn3VzQQf4=";
}; };
vendorSha256 = "sha256-CqImT90jFFLi6XR7jfzFKwhnCHK6B+aM+Ba/L+G3bEg="; vendorSha256 = "sha256-CqImT90jFFLi6XR7jfzFKwhnCHK6B+aM+Ba/L+G3bEg=";

View file

@ -2,13 +2,13 @@
buildGoModule rec { buildGoModule rec {
pname = "vcluster"; pname = "vcluster";
version = "0.11.1"; version = "0.12.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "loft-sh"; owner = "loft-sh";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-aFTugqWr/9e3wQLL4yre2T8CUKq8P0HZLsES8lFZKHY="; sha256 = "sha256-KRm6+WRMGzM7L17ABj/g6Nu+eU6F3C4a9CAa0ePC6i8=";
}; };
vendorSha256 = null; vendorSha256 = null;

View file

@ -13,13 +13,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "cbmc"; pname = "cbmc";
version = "5.65.1"; version = "5.67.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "diffblue"; owner = "diffblue";
repo = pname; repo = pname;
rev = "${pname}-${version}"; rev = "${pname}-${version}";
sha256 = "sha256-6Cy3yScPl2Ax0N2pmJWJEPXrSlj+F0IAoM5G8rIjbT8="; sha256 = "sha256-9w6GGi/yW7IYv3NoflpzO/UH712+LWp6f10+ak2hLIA=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -1,5 +1,5 @@
{ lib, stdenv, fetchurl, fetchgit, vdr, fetchFromGitHub { lib, stdenv, fetchurl, fetchgit, vdr, fetchFromGitHub
, graphicsmagick, libav, pcre, xorgserver, ffmpeg , graphicsmagick, pcre, xorgserver, ffmpeg
, libiconv, boost, libgcrypt, perl, util-linux, groff, libva, xorg, ncurses , libiconv, boost, libgcrypt, perl, util-linux, groff, libva, xorg, ncurses
, callPackage , callPackage
}: let }: let
@ -53,16 +53,16 @@ in {
markad = stdenv.mkDerivation rec { markad = stdenv.mkDerivation rec {
pname = "vdr-markad"; pname = "vdr-markad";
version = "2.0.4"; version = "3.0.25";
src = fetchFromGitHub { src = fetchFromGitHub {
repo = "vdr-plugin-markad"; repo = "vdr-plugin-markad";
owner = "jbrundiers"; owner = "kfb77";
sha256 = "sha256-Y4KsEtUq+KoUooXiw9O9RokBxNwWBkiGB31GncmHkYM="; sha256 = "sha256-m7cUAxwXj62spelHYH6uTIoViSavSR0d4psr7+KLJg8=";
rev = "288e3dae93421b0176f4f62b68ea4b39d98e8793"; rev = "v${version}";
}; };
buildInputs = [ vdr libav ]; buildInputs = [ vdr ffmpeg ];
postPatch = '' postPatch = ''
substituteInPlace command/Makefile --replace '/usr' "" substituteInPlace command/Makefile --replace '/usr' ""
@ -78,6 +78,8 @@ in {
buildFlags = [ buildFlags = [
"DESTDIR=$(out)" "DESTDIR=$(out)"
"LIBDIR=/lib/vdr" "LIBDIR=/lib/vdr"
"BINDIR=/bin"
"MANDIR=/share/man"
"APIVERSION=${vdr.version}" "APIVERSION=${vdr.version}"
"VDRDIR=${vdr.dev}/include/vdr" "VDRDIR=${vdr.dev}/include/vdr"
"LOCDIR=/share/locale" "LOCDIR=/share/locale"
@ -86,7 +88,7 @@ in {
installFlags = buildFlags; installFlags = buildFlags;
meta = with lib; { meta = with lib; {
homepage = "https://github.com/jbrundiers/vdr-plugin-markad"; homepage = "https://github.com/kfb77/vdr-plugin-markad";
description = "MarkAd marks advertisements in VDR recordings."; description = "MarkAd marks advertisements in VDR recordings.";
maintainers = [ maintainers.ck3d ]; maintainers = [ maintainers.ck3d ];
license = licenses.gpl2; license = licenses.gpl2;

View file

@ -2,13 +2,13 @@
stdenvNoCC.mkDerivation rec { stdenvNoCC.mkDerivation rec {
pname = "distrobox"; pname = "distrobox";
version = "1.4.0"; version = "1.4.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "89luca89"; owner = "89luca89";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "sha256-XYqPwBiMbwG0bTiFRywZRWjp1OabTHcwhmbcx11SgPo="; sha256 = "sha256-WIpl3eSdResAmWFc8OG8Jm0uLTGaovkItGAZTOEzhuE=";
}; };
dontConfigure = true; dontConfigure = true;

View file

@ -26,9 +26,7 @@ buildGoModule rec {
nativeBuildInputs = [ go-md2man installShellFiles ]; nativeBuildInputs = [ go-md2man installShellFiles ];
postInstall = '' postInstall = ''
substituteInPlace Makefile --replace \ make docs SHELL="$SHELL"
'$(shell which bash)' '${lib.getBin bash}/bin/bash'
make docs
installManPage doc/man/*.[1-9] installManPage doc/man/*.[1-9]
''; '';

View file

@ -1,10 +1,11 @@
{ stdenv, fetchurl }: { stdenv, fetchurl }:
stdenv.mkDerivation { stdenv.mkDerivation rec {
name = "tipa-1.3"; pname = "tipa";
version = "1.3";
src = fetchurl { src = fetchurl {
url = "mirror://debian/pool/main/t/tipa/tipa_1.3.orig.tar.gz"; url = "mirror://debian/pool/main/t/tipa/${pname}_${version}.orig.tar.gz";
sha256 = "1q1sisxdcd2zd9b7mnagr2mxf9v3n1r4s5892zx5ly4r0niyya9m"; sha256 = "1q1sisxdcd2zd9b7mnagr2mxf9v3n1r4s5892zx5ly4r0niyya9m";
}; };

View file

@ -2,12 +2,12 @@
let let
pname = "restinio"; pname = "restinio";
version = "0.6.16"; version = "0.6.17";
in in
fetchzip { fetchzip {
name = "${pname}-${version}"; name = "${pname}-${version}";
url = "https://github.com/Stiffstream/restinio/releases/download/v.${version}/${pname}-${version}.tar.bz2"; url = "https://github.com/Stiffstream/restinio/releases/download/v.${version}/${pname}-${version}.tar.bz2";
hash = "sha256-tl9HUsT9mCupuwp6T4dbPdYOQy3vYyctuwFQPfR8m0Y="; hash = "sha256-8A13r3Qsn5S+kVWLPENoOjqz2tPMxSo6EWBvHG1cTAE=";
stripRoot = false; stripRoot = false;
postFetch = '' postFetch = ''

View file

@ -2,11 +2,11 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "autograd"; pname = "autograd";
version = "1.4"; version = "1.5";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
sha256 = "sha256-OD3g9TfvLji4X/lpJZOwz66JWMmzvUUbUsJV/ZFx/84="; sha256 = "sha256-2AvSJRVNHbE8tOrM96GMNYvnIJJkG2hxf5b88dFqzQs=";
}; };
propagatedBuildInputs = [ numpy future ]; propagatedBuildInputs = [ numpy future ];

View file

@ -2,6 +2,7 @@
, buildPythonPackage , buildPythonPackage
, fetchPypi , fetchPypi
, jsonschema , jsonschema
, pytestCheckHook
}: }:
buildPythonPackage rec { buildPythonPackage rec {
@ -15,6 +16,13 @@ buildPythonPackage rec {
propagatedBuildInputs = [ jsonschema ]; propagatedBuildInputs = [ jsonschema ];
checkInputs = [ pytestCheckHook ];
disabledTests = [
# Fails with "Unresolvable JSON pointer"
"test_local_reference_in_meta"
];
meta = with lib; { meta = with lib; {
description = "Merge a series of JSON documents"; description = "Merge a series of JSON documents";
homepage = "https://github.com/avian2/jsonmerge"; homepage = "https://github.com/avian2/jsonmerge";

View file

@ -10,7 +10,7 @@
buildGoModule rec { buildGoModule rec {
pname = "actionlint"; pname = "actionlint";
version = "1.6.19"; version = "1.6.20";
subPackages = [ "cmd/actionlint" ]; subPackages = [ "cmd/actionlint" ];
@ -18,7 +18,7 @@ buildGoModule rec {
owner = "rhysd"; owner = "rhysd";
repo = "actionlint"; repo = "actionlint";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-sWsn5jX4kQbK9rOW5FC94mdBwXNAR2a48XFHe37eK6U="; sha256 = "sha256-WQqEST5f3yUsvjw86ckS/jRaxcnUd13zb7lmQvfmsjM=";
}; };
vendorSha256 = "sha256-vWU3tEC+ZlrrTnX3fbuEuZRoSg1KtfpgpXmK4+HWrNY="; vendorSha256 = "sha256-vWU3tEC+ZlrrTnX3fbuEuZRoSg1KtfpgpXmK4+HWrNY=";

View file

@ -2,16 +2,16 @@
buildGoModule rec { buildGoModule rec {
pname = "act"; pname = "act";
version = "0.2.31"; version = "0.2.32";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "nektos"; owner = "nektos";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-6JMWt6svJwW7FNn2sOSUjFtXBqmC02uFEiybj5H9wTw="; sha256 = "sha256-fHGS05qlRSVTrjEx71hhVridbpbLVyaAOg3uMYIj0TU=";
}; };
vendorSha256 = "sha256-caFM1A4SGZ8MIIoWnzBdKJOAgzscrf9eGtv/GCSfzag="; vendorSha256 = "sha256-ctIKaThBIzaBw3/a0pat+G7Zb4Y2F7mk8VZWoM0XdyI=";
doCheck = false; doCheck = false;

View file

@ -1,30 +1,63 @@
{ lib, stdenv, fetchurl, elfutils, libunwind }: { lib, stdenv, fetchurl, fetchgit, autoreconfHook, dejagnu, elfutils }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "ltrace"; pname = "ltrace";
version = "0.7.3"; version = "0.7.91";
src = fetchurl { src = fetchurl {
url = "mirror://debian/pool/main/l/${pname}/${pname}_${version}.orig.tar.bz2"; url = "https://src.fedoraproject.org/repo/pkgs/ltrace/ltrace-0.7.91.tar.bz2/9db3bdee7cf3e11c87d8cc7673d4d25b/ltrace-0.7.91.tar.bz2";
sha256 = "00wmbdghqbz6x95m1mcdd3wd46l6hgcr4wggdp049dbifh3qqvqf"; sha256 = "sha256-HqellbKh2ZDHxslXl7SSIXtpjV1sodtgVwh8hgTC3Dc=";
}; };
buildInputs = [ elfutils libunwind ]; nativeBuildInputs = [ autoreconfHook ]; # Some patches impact ./configure.
buildInputs = [ elfutils ];
checkInputs = [ dejagnu ];
# Import Fedora's (very) large patch series: bug fixes, architecture support,
# etc. RH/Fedora are currently working with upstream to merge all these
# patches for the next major branch.
prePatch = let prePatch = let
debian = fetchurl { fedora = fetchgit {
url = "mirror://debian/pool/main/l/ltrace/ltrace_0.7.3-6.debian.tar.xz"; url = "https://src.fedoraproject.org/rpms/ltrace.git";
sha256 = "0xc4pfd8qw53crvdxr29iwl8na53zmknca082kziwpvlzsick4kp"; rev = "00f430ccbebdbd13bdd4d7ee6303b091cf005542";
sha256 = "sha256-FBGEgmaslu7xrJtZ2WsYwu9Cw1ZQrWRV1+Eu9qLXO4s=";
}; };
in '' in ''
tar xf '${debian}' # Order matters, read the patch list from the RPM spec. Our own patches
patches="$patches $(cat debian/patches/series | sed 's|^|debian/patches/|')" # are applied on top of the Fedora baseline.
fedorapatches=""
for p in $(grep '^Patch[0-9]\+:' ${fedora}/ltrace.spec | awk '{ print $2 }'); do
fedorapatches="$fedorapatches ${fedora}/$p"
done
patches="$fedorapatches $patches"
''; '';
# Cherry-pick extra patches for recent glibc support in the test suite.
patches = [
# https://gitlab.com/cespedes/ltrace/-/merge_requests/14
./testsuite-newfstatat.patch
# https://gitlab.com/cespedes/ltrace/-/merge_requests/15
./sysdeps-x86.patch
];
doCheck = true;
checkPhase = ''
# Hardening options interfere with some of the low-level expectations in
# the test suite (e.g. printf ends up redirected to __printf_chk).
NIX_HARDENING_ENABLE="" \
# Disable test that requires ptrace-ing a non-child process, this might be
# forbidden by YAMA ptrace policy on the build host.
RUNTESTFLAGS="--host=${stdenv.hostPlatform.config} \
--target=${stdenv.targetPlatform.config} \
--ignore attach-process.exp" \
make check
'';
meta = with lib; { meta = with lib; {
description = "Library call tracer"; description = "Library call tracer";
homepage = "https://www.ltrace.org/"; homepage = "https://www.ltrace.org/";
platforms = [ "i686-linux" "x86_64-linux" ]; platforms = platforms.linux;
license = licenses.gpl2; license = licenses.gpl2Plus;
maintainers = with maintainers; [ delroth ];
}; };
} }

View file

@ -0,0 +1,328 @@
diff --git a/sysdeps/linux-gnu/x86/syscallent.h b/sysdeps/linux-gnu/x86/syscallent.h
index 345fe20..66ac522 100644
--- a/sysdeps/linux-gnu/x86/syscallent.h
+++ b/sysdeps/linux-gnu/x86/syscallent.h
@@ -238,7 +238,7 @@
"setfsgid32", /* 216 */
"pivot_root", /* 217 */
"mincore", /* 218 */
- "madvise1", /* 219 */
+ "madvise", /* 219 */
"getdents64", /* 220 */
"fcntl64", /* 221 */
"222", /* 222 */
@@ -279,14 +279,14 @@
"remap_file_pages", /* 257 */
"set_tid_address", /* 258 */
"timer_create", /* 259 */
- "260", /* 260 */
- "261", /* 261 */
- "262", /* 262 */
- "263", /* 263 */
- "264", /* 264 */
- "265", /* 265 */
- "266", /* 266 */
- "267", /* 267 */
+ "timer_settime", /* 260 */
+ "timer_gettime", /* 261 */
+ "timer_getoverrun", /* 262 */
+ "timer_delete", /* 263 */
+ "clock_settime", /* 264 */
+ "clock_gettime", /* 265 */
+ "clock_getres", /* 266 */
+ "clock_nanosleep", /* 267 */
"statfs64", /* 268 */
"fstatfs64", /* 269 */
"tgkill", /* 270 */
@@ -297,11 +297,11 @@
"get_mempolicy", /* 275 */
"set_mempolicy", /* 276 */
"mq_open", /* 277 */
- "278", /* 278 */
- "279", /* 279 */
- "280", /* 280 */
- "281", /* 281 */
- "282", /* 282 */
+ "mq_unlink", /* 278 */
+ "mq_timedsend", /* 279 */
+ "mq_timedreceive", /* 280 */
+ "mq_notify", /* 281 */
+ "mq_getsetattr", /* 282 */
"kexec_load", /* 283 */
"waitid", /* 284 */
"285", /* 285 */
@@ -368,3 +368,105 @@
"setns", /* 346 */
"process_vm_readv", /* 347 */
"process_vm_writev", /* 348 */
+ "kcmp", /* 349 */
+ "finit_module", /* 350 */
+ "sched_setattr", /* 351 */
+ "sched_getattr", /* 352 */
+ "renameat2", /* 353 */
+ "seccomp", /* 354 */
+ "getrandom", /* 355 */
+ "memfd_create", /* 356 */
+ "bpf", /* 357 */
+ "execveat", /* 358 */
+ "socket", /* 359 */
+ "socketpair", /* 360 */
+ "bind", /* 361 */
+ "connect", /* 362 */
+ "listen", /* 363 */
+ "accept4", /* 364 */
+ "getsockopt", /* 365 */
+ "setsockopt", /* 366 */
+ "getsockname", /* 367 */
+ "getpeername", /* 368 */
+ "sendto", /* 369 */
+ "sendmsg", /* 370 */
+ "recvfrom", /* 371 */
+ "recvmsg", /* 372 */
+ "shutdown", /* 373 */
+ "userfaultfd", /* 374 */
+ "membarrier", /* 375 */
+ "mlock2", /* 376 */
+ "copy_file_range", /* 377 */
+ "preadv2", /* 378 */
+ "pwritev2", /* 379 */
+ "pkey_mprotect", /* 380 */
+ "pkey_alloc", /* 381 */
+ "pkey_free", /* 382 */
+ "statx", /* 383 */
+ "arch_prctl", /* 384 */
+ "io_pgetevents", /* 385 */
+ "rseq", /* 386 */
+ "387", /* 387 */
+ "388", /* 388 */
+ "389", /* 389 */
+ "390", /* 390 */
+ "391", /* 391 */
+ "392", /* 392 */
+ "semget", /* 393 */
+ "semctl", /* 394 */
+ "shmget", /* 395 */
+ "shmctl", /* 396 */
+ "shmat", /* 397 */
+ "shmdt", /* 398 */
+ "msgget", /* 399 */
+ "msgsnd", /* 400 */
+ "msgrcv", /* 401 */
+ "msgctl", /* 402 */
+ "clock_gettime64", /* 403 */
+ "clock_settime64", /* 404 */
+ "clock_adjtime64", /* 405 */
+ "clock_getres_time64", /* 406 */
+ "clock_nanosleep_time64", /* 407 */
+ "timer_gettime64", /* 408 */
+ "timer_settime64", /* 409 */
+ "timerfd_gettime64", /* 410 */
+ "timerfd_settime64", /* 411 */
+ "utimensat_time64", /* 412 */
+ "pselect6_time64", /* 413 */
+ "ppoll_time64", /* 414 */
+ "415", /* 415 */
+ "io_pgetevents_time64", /* 416 */
+ "recvmmsg_time64", /* 417 */
+ "mq_timedsend_time64", /* 418 */
+ "mq_timedreceive_time64", /* 419 */
+ "semtimedop_time64", /* 420 */
+ "rt_sigtimedwait_time64", /* 421 */
+ "futex_time64", /* 422 */
+ "sched_rr_get_interval_time64", /* 423 */
+ "pidfd_send_signal", /* 424 */
+ "io_uring_setup", /* 425 */
+ "io_uring_enter", /* 426 */
+ "io_uring_register", /* 427 */
+ "open_tree", /* 428 */
+ "move_mount", /* 429 */
+ "fsopen", /* 430 */
+ "fsconfig", /* 431 */
+ "fsmount", /* 432 */
+ "fspick", /* 433 */
+ "pidfd_open", /* 434 */
+ "clone3", /* 435 */
+ "close_range", /* 436 */
+ "openat2", /* 437 */
+ "pidfd_getfd", /* 438 */
+ "faccessat2", /* 439 */
+ "process_madvise", /* 440 */
+ "epoll_pwait2", /* 441 */
+ "mount_setattr", /* 442 */
+ "quotactl_fd", /* 443 */
+ "landlock_create_ruleset", /* 444 */
+ "landlock_add_rule", /* 445 */
+ "landlock_restrict_self", /* 446 */
+ "memfd_secret", /* 447 */
+ "process_mrelease", /* 448 */
+ "futex_waitv", /* 449 */
+ "set_mempolicy_home_node", /* 450 */
diff --git a/sysdeps/linux-gnu/x86/syscallent1.h b/sysdeps/linux-gnu/x86/syscallent1.h
index 91ae8d6..f8b15f7 100644
--- a/sysdeps/linux-gnu/x86/syscallent1.h
+++ b/sysdeps/linux-gnu/x86/syscallent1.h
@@ -36,8 +36,8 @@
"rt_sigprocmask", /* 14 */
"rt_sigreturn", /* 15 */
"ioctl", /* 16 */
- "pread", /* 17 */
- "pwrite", /* 18 */
+ "pread64", /* 17 */
+ "pwrite64", /* 18 */
"readv", /* 19 */
"writev", /* 20 */
"access", /* 21 */
@@ -233,8 +233,8 @@
"get_thread_area", /* 211 */
"lookup_dcookie", /* 212 */
"epoll_create", /* 213 */
- "epoll_ctl", /* 214 */
- "epoll_wait", /* 215 */
+ "epoll_ctl_old", /* 214 */
+ "epoll_wait_old", /* 215 */
"remap_file_pages", /* 216 */
"getdents64", /* 217 */
"set_tid_address", /* 218 */
@@ -331,3 +331,142 @@
"getcpu", /* 309 */
"process_vm_readv", /* 310 */
"process_vm_writev", /* 311 */
+ "kcmp", /* 312 */
+ "finit_module", /* 313 */
+ "sched_setattr", /* 314 */
+ "sched_getattr", /* 315 */
+ "renameat2", /* 316 */
+ "seccomp", /* 317 */
+ "getrandom", /* 318 */
+ "memfd_create", /* 319 */
+ "kexec_file_load", /* 320 */
+ "bpf", /* 321 */
+ "execveat", /* 322 */
+ "userfaultfd", /* 323 */
+ "membarrier", /* 324 */
+ "mlock2", /* 325 */
+ "copy_file_range", /* 326 */
+ "preadv2", /* 327 */
+ "pwritev2", /* 328 */
+ "pkey_mprotect", /* 329 */
+ "pkey_alloc", /* 330 */
+ "pkey_free", /* 331 */
+ "statx", /* 332 */
+ "io_pgetevents", /* 333 */
+ "rseq", /* 334 */
+ "335", /* 335 */
+ "336", /* 336 */
+ "337", /* 337 */
+ "338", /* 338 */
+ "339", /* 339 */
+ "340", /* 340 */
+ "341", /* 341 */
+ "342", /* 342 */
+ "343", /* 343 */
+ "344", /* 344 */
+ "345", /* 345 */
+ "346", /* 346 */
+ "347", /* 347 */
+ "348", /* 348 */
+ "349", /* 349 */
+ "350", /* 350 */
+ "351", /* 351 */
+ "352", /* 352 */
+ "353", /* 353 */
+ "354", /* 354 */
+ "355", /* 355 */
+ "356", /* 356 */
+ "357", /* 357 */
+ "358", /* 358 */
+ "359", /* 359 */
+ "360", /* 360 */
+ "361", /* 361 */
+ "362", /* 362 */
+ "363", /* 363 */
+ "364", /* 364 */
+ "365", /* 365 */
+ "366", /* 366 */
+ "367", /* 367 */
+ "368", /* 368 */
+ "369", /* 369 */
+ "370", /* 370 */
+ "371", /* 371 */
+ "372", /* 372 */
+ "373", /* 373 */
+ "374", /* 374 */
+ "375", /* 375 */
+ "376", /* 376 */
+ "377", /* 377 */
+ "378", /* 378 */
+ "379", /* 379 */
+ "380", /* 380 */
+ "381", /* 381 */
+ "382", /* 382 */
+ "383", /* 383 */
+ "384", /* 384 */
+ "385", /* 385 */
+ "386", /* 386 */
+ "387", /* 387 */
+ "388", /* 388 */
+ "389", /* 389 */
+ "390", /* 390 */
+ "391", /* 391 */
+ "392", /* 392 */
+ "393", /* 393 */
+ "394", /* 394 */
+ "395", /* 395 */
+ "396", /* 396 */
+ "397", /* 397 */
+ "398", /* 398 */
+ "399", /* 399 */
+ "400", /* 400 */
+ "401", /* 401 */
+ "402", /* 402 */
+ "403", /* 403 */
+ "404", /* 404 */
+ "405", /* 405 */
+ "406", /* 406 */
+ "407", /* 407 */
+ "408", /* 408 */
+ "409", /* 409 */
+ "410", /* 410 */
+ "411", /* 411 */
+ "412", /* 412 */
+ "413", /* 413 */
+ "414", /* 414 */
+ "415", /* 415 */
+ "416", /* 416 */
+ "417", /* 417 */
+ "418", /* 418 */
+ "419", /* 419 */
+ "420", /* 420 */
+ "421", /* 421 */
+ "422", /* 422 */
+ "423", /* 423 */
+ "pidfd_send_signal", /* 424 */
+ "io_uring_setup", /* 425 */
+ "io_uring_enter", /* 426 */
+ "io_uring_register", /* 427 */
+ "open_tree", /* 428 */
+ "move_mount", /* 429 */
+ "fsopen", /* 430 */
+ "fsconfig", /* 431 */
+ "fsmount", /* 432 */
+ "fspick", /* 433 */
+ "pidfd_open", /* 434 */
+ "clone3", /* 435 */
+ "close_range", /* 436 */
+ "openat2", /* 437 */
+ "pidfd_getfd", /* 438 */
+ "faccessat2", /* 439 */
+ "process_madvise", /* 440 */
+ "epoll_pwait2", /* 441 */
+ "mount_setattr", /* 442 */
+ "quotactl_fd", /* 443 */
+ "landlock_create_ruleset", /* 444 */
+ "landlock_add_rule", /* 445 */
+ "landlock_restrict_self", /* 446 */
+ "memfd_secret", /* 447 */
+ "process_mrelease", /* 448 */
+ "futex_waitv", /* 449 */
+ "set_mempolicy_home_node", /* 450 */

View file

@ -0,0 +1,13 @@
diff --git a/testsuite/ltrace.main/system_calls.exp b/testsuite/ltrace.main/system_calls.exp
index 1b64cb0..af19916 100644
--- a/testsuite/ltrace.main/system_calls.exp
+++ b/testsuite/ltrace.main/system_calls.exp
@@ -133,7 +133,7 @@ Match [Diff [Calls [ltraceRun -L -S -- $bin]] \
{ {^write$} == 1 }
{ {^unlink(at)?$} >= 2 }
{ {^open(at)?$} == 1 }
- { {^(new|f)?stat(64)?$} >= 1 }
+ { {^(new)?f?statx?(at)?(64)?$} >= 1 }
{ {^close$} == 1 }
{ {^getcwd$} == 1 }
{ {^chdir$} == 1 }

View file

@ -2,11 +2,11 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "acpid"; pname = "acpid";
version = "2.0.33"; version = "2.0.34";
src = fetchurl { src = fetchurl {
url = "mirror://sourceforge/acpid2/acpid-${version}.tar.xz"; url = "mirror://sourceforge/acpid2/acpid-${version}.tar.xz";
sha256 = "sha256-CFb3Gz6zShtmPQqOY2Pfy8UZ5j2EczBJiJhljily2+g="; sha256 = "sha256-LQlcjPy8hHyux0bWLNyNC/8ewbxy73xnTHIeBNpqszM=";
}; };
nativeBuildInputs = [ autoreconfHook ]; nativeBuildInputs = [ autoreconfHook ];

View file

@ -68,13 +68,13 @@ with lib;
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "conky"; pname = "conky";
version = "1.12.2"; version = "1.13.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "brndnmtthws"; owner = "brndnmtthws";
repo = "conky"; repo = "conky";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-x6bR5E5LIvKWiVM15IEoUgGas/hcRp3F/O4MTOhVPb8="; sha256 = "sha256-3eCRzjfHGFiKuxmRHvnzqAg/+ApUKnHhsumWnio/Qxg=";
}; };
postPatch = '' postPatch = ''

View file

@ -2,13 +2,13 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "system76-firmware"; pname = "system76-firmware";
# Check Makefile when updating, make sure postInstall matches make install # Check Makefile when updating, make sure postInstall matches make install
version = "1.0.42"; version = "1.0.43";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "pop-os"; owner = "pop-os";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "sha256-8raRfmNAvgxBVsFeOu/XPs5YU1wPpRBo3Cog/UpE5/o="; sha256 = "sha256-0NlM5ugpJzwzXgm8TqM6/aj3b+lDYbLeYOHNHM3g8aw=";
}; };
nativeBuildInputs = [ pkg-config makeWrapper ]; nativeBuildInputs = [ pkg-config makeWrapper ];
@ -17,7 +17,7 @@ rustPlatform.buildRustPackage rec {
cargoBuildFlags = [ "--workspace" ]; cargoBuildFlags = [ "--workspace" ];
cargoSha256 = "sha256-aKyLAISZlQz5e8MvOoydAZ4bwCEZ1K3FldyoG6R9FJU="; cargoSha256 = "sha256-oyHnEWtQ0pl4SaJsnao+oTDBuu9PJdU3uqLTDowRWQw=";
# Purposefully don't install systemd unit file, that's for NixOS # Purposefully don't install systemd unit file, that's for NixOS
postInstall = '' postInstall = ''

View file

@ -1,14 +1,20 @@
{ lib, stdenv, fetchFromGitHub, kernel, bluez }: { lib
, stdenv
, fetchFromGitHub
, kernel
, bluez
, nixosTests
}:
stdenv.mkDerivation rec { stdenv.mkDerivation (finalAttrs: {
pname = "xpadneo"; pname = "xpadneo";
version = "0.9.4"; version = "0.9.5";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "atar-axis"; owner = "atar-axis";
repo = pname; repo = "xpadneo";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${finalAttrs.version}";
sha256 = "sha256-4zd+x9uYl0lJgePM9LEgLYFqvcw6VPF/CbR1XiYSwGE="; sha256 = "sha256-rT2Mq40fE055FemDG7PBjt+cxgIHJG9tTjtw2nW6B98=";
}; };
setSourceRoot = '' setSourceRoot = ''
@ -22,13 +28,17 @@ stdenv.mkDerivation rec {
"-C" "-C"
"${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build"
"M=$(sourceRoot)" "M=$(sourceRoot)"
"VERSION=${version}" "VERSION=${finalAttrs.version}"
]; ];
buildFlags = [ "modules" ]; buildFlags = [ "modules" ];
installFlags = [ "INSTALL_MOD_PATH=${placeholder "out"}" ]; installFlags = [ "INSTALL_MOD_PATH=${placeholder "out"}" ];
installTargets = [ "modules_install" ]; installTargets = [ "modules_install" ];
passthru.tests = {
xpadneo = nixosTests.xpadneo;
};
meta = with lib; { meta = with lib; {
description = "Advanced Linux driver for Xbox One wireless controllers"; description = "Advanced Linux driver for Xbox One wireless controllers";
homepage = "https://atar-axis.github.io/xpadneo"; homepage = "https://atar-axis.github.io/xpadneo";
@ -36,4 +46,4 @@ stdenv.mkDerivation rec {
maintainers = with maintainers; [ kira-bruneau ]; maintainers = with maintainers; [ kira-bruneau ];
platforms = platforms.linux; platforms = platforms.linux;
}; };
} })

View file

@ -14,7 +14,7 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "slurm"; pname = "slurm";
version = "22.05.3.1"; version = "22.05.4.1";
# N.B. We use github release tags instead of https://www.schedmd.com/downloads.php # N.B. We use github release tags instead of https://www.schedmd.com/downloads.php
# because the latter does not keep older releases. # because the latter does not keep older releases.
@ -23,7 +23,7 @@ stdenv.mkDerivation rec {
repo = "slurm"; repo = "slurm";
# The release tags use - instead of . # The release tags use - instead of .
rev = "${pname}-${builtins.replaceStrings ["."] ["-"] version}"; rev = "${pname}-${builtins.replaceStrings ["."] ["-"] version}";
sha256 = "113l23zf98r2rz4smyb0lk68p5jj2gx2y2j11vvf5wq4apzyz8jf"; sha256 = "100ixhpi4ahx5w7b1ncgmmg1ar48brp095lrxhcxr55fq2wqlv35";
}; };
outputs = [ "out" "dev" ]; outputs = [ "out" "dev" ];

View file

@ -5,13 +5,13 @@
}: }:
let let
version = "2.3.0"; version = "2.4.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "influxdata"; owner = "influxdata";
repo = "influx-cli"; repo = "influx-cli";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-i3PN0mvSzPX/hu6fF2oizfioHZ2qU2V+mRwuxT1AYWo="; sha256 = "sha256-l27BAHQtMA4kE7VEZLdOPFnSXtyWUOrcUFitaWqwvTw=";
}; };
in buildGoModule { in buildGoModule {
@ -19,7 +19,7 @@ in buildGoModule {
version = version; version = version;
src = src; src = src;
vendorSha256 = "sha256-Boz1G8g0fjjlflxZh4V8sd/v0bE9Oy3DpqywOpKxjd0="; vendorSha256 = "sha256-GnVLr9mWehgw8vs4RiOrFHVlPpPT/LP6XvCq94aJxJQ=";
subPackages = [ "cmd/influx" ]; subPackages = [ "cmd/influx" ];
ldflags = [ "-X main.commit=v${version}" "-X main.version=${version}" ]; ldflags = [ "-X main.commit=v${version}" "-X main.version=${version}" ];

View file

@ -12,20 +12,23 @@
}: }:
let let
version = "2.1.1"; version = "2.4.0";
ui_version = "2.1.2"; # Despite the name, this is not a rolling release. This is the
libflux_version = "0.139.0"; # version of the UI assets for 2.4.0, as specified in
# scripts/fetch-ui-assets.sh in the 2.4.0 tag of influxdb.
ui_version = "Master";
libflux_version = "0.179.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "influxdata"; owner = "influxdata";
repo = "influxdb"; repo = "influxdb";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-wf01DhB1ampZuWPkHUEOf3KJK4GjeOAPL3LG2+g4NGY="; sha256 = "sha256-ufJnrVWVfia2/xLRmFkauCw8ktdSJUybJkv42Gd0npg=";
}; };
ui = fetchurl { ui = fetchurl {
url = "https://github.com/influxdata/ui/releases/download/OSS-${ui_version}/build.tar.gz"; url = "https://github.com/influxdata/ui/releases/download/OSS-${ui_version}/build.tar.gz";
sha256 = "sha256-fXjShNJfKN/ZQNQHoX9/Ou4XBrXavCN+rcO+8AMc5Ug="; sha256 = "sha256-YKDp1jLyo4n+YTeMaWl8dhN4Lr3H8FXV7stJ3p3zFe8=";
}; };
flux = rustPlatform.buildRustPackage { flux = rustPlatform.buildRustPackage {
@ -35,10 +38,10 @@ let
owner = "influxdata"; owner = "influxdata";
repo = "flux"; repo = "flux";
rev = "v${libflux_version}"; rev = "v${libflux_version}";
sha256 = "sha256-cELeWZXGVLFoPYfBoBP8NeLBVFIb5o+lWyto42BLyXY="; sha256 = "sha256-xcsmvT8Ve1WbfwrdVPnJcj7RAvrk795N3C95ubbGig0=";
}; };
sourceRoot = "source/libflux"; sourceRoot = "source/libflux";
cargoSha256 = "sha256-wFgawxgqZqoPnOXJD3r5t2n7Y2bTAkBbBxeBtFEF7N4="; cargoSha256 = "sha256-+hJQFV0tWeTQDN560DzROUNpdkcZ5h2sc13akHCgqPc=";
nativeBuildInputs = [ llvmPackages.libclang ]; nativeBuildInputs = [ llvmPackages.libclang ];
buildInputs = lib.optional stdenv.isDarwin libiconv; buildInputs = lib.optional stdenv.isDarwin libiconv;
LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib"; LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib";
@ -67,7 +70,7 @@ in buildGoModule {
nativeBuildInputs = [ go-bindata pkg-config ]; nativeBuildInputs = [ go-bindata pkg-config ];
vendorSha256 = "sha256-GVLAzVJzSsC10ZWDZPP8upydwZG21E+zQ6sMKm1lCY0="; vendorSha256 = "sha256-DZsd6qPKfRbnvz0UAww+ubaeTEqQxLeil1S3SZAmmJk=";
subPackages = [ "cmd/influxd" "cmd/telemetryd" ]; subPackages = [ "cmd/influxd" "cmd/telemetryd" ];
PKG_CONFIG_PATH = "${flux}/pkgconfig"; PKG_CONFIG_PATH = "${flux}/pkgconfig";
@ -81,7 +84,7 @@ in buildGoModule {
exit 1 exit 1
fi fi
ui_ver=$(grep influxdata/ui/releases scripts/fetch-ui-assets.sh | ${perl}/bin/perl -pe 's#.*/OSS-([^/]+)/.*#$1#') ui_ver=$(egrep 'influxdata/ui/releases/.*/sha256.txt' scripts/fetch-ui-assets.sh | ${perl}/bin/perl -pe 's#.*/OSS-([^/]+)/.*#$1#')
if [ "$ui_ver" != "${ui_version}" ]; then if [ "$ui_ver" != "${ui_version}" ]; then
echo "scripts/fetch-ui-assets.sh wants UI $ui_ver, but nix derivation provides ${ui_version}" echo "scripts/fetch-ui-assets.sh wants UI $ui_ver, but nix derivation provides ${ui_version}"
exit 1 exit 1

View file

@ -2,11 +2,11 @@
, dataPath ? "/var/lib/snappymail" }: , dataPath ? "/var/lib/snappymail" }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "snappymail"; pname = "snappymail";
version = "2.18.1"; version = "2.18.3";
src = fetchurl { src = fetchurl {
url = "https://github.com/the-djmaze/snappymail/releases/download/v${version}/snappymail-${version}.tar.gz"; url = "https://github.com/the-djmaze/snappymail/releases/download/v${version}/snappymail-${version}.tar.gz";
sha256 = "sha256-0NsDm1dDMg0HbAmuGIrNRkwtjvaZ9QYh7GUXkOJNoKw="; sha256 = "sha256-QAdR7fhF05taVtoUqqbw6EELnSDwRtX2O43VN8p6L7Q=";
}; };
sourceRoot = "snappymail"; sourceRoot = "snappymail";

View file

@ -2,13 +2,13 @@
buildGoModule rec { buildGoModule rec {
pname = "eksctl"; pname = "eksctl";
version = "0.112.0"; version = "0.113.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "weaveworks"; owner = "weaveworks";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "sha256-kY2AE5lLP1awxfPj16MAhcxO59S3lOZOUXV2EzXDHTY="; sha256 = "sha256-sHknZg34FHhYcf4l2oPQG6RGpybF0lC4n816YoVPeGk=";
}; };
vendorSha256 = "sha256-z/3aUSuAZSVsQ67JgUy6z3T91vKHlBjjQS4oSljl/nk="; vendorSha256 = "sha256-z/3aUSuAZSVsQ67JgUy6z3T91vKHlBjjQS4oSljl/nk=";

View file

@ -2,7 +2,7 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "ceph-csi"; pname = "ceph-csi";
version = "3.7.0"; version = "3.7.1";
nativeBuildInputs = [ go ]; nativeBuildInputs = [ go ];
buildInputs = [ ceph ]; buildInputs = [ ceph ];
@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
owner = "ceph"; owner = "ceph";
repo = "ceph-csi"; repo = "ceph-csi";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-DmYwLhJoWPsqtXQp2+vpUuEBfo7dTQkxMVa+/oR6LZk="; sha256 = "sha256-VlOKN2PjHM0MdDz6t/AAjcFx4F15+7p3+25tLkRQH1Q=";
}; };
preConfigure = '' preConfigure = ''

View file

@ -38,7 +38,7 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "vips"; pname = "vips";
version = "8.13.0"; version = "8.13.2";
outputs = [ "bin" "out" "man" "dev" ]; outputs = [ "bin" "out" "man" "dev" ];
@ -46,7 +46,7 @@ stdenv.mkDerivation rec {
owner = "libvips"; owner = "libvips";
repo = "libvips"; repo = "libvips";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-N2jq68Vs/D+lZcIJVdjBLVaz2gK/TwqKeNfHUWdS3NA="; sha256 = "sha256-Tff+M2qJ/FPxU7Y5gUnuF+Kbwh8DIW5Tb7fe0Lbi0m4=";
# Remove unicode file names which leads to different checksums on HFS+ # Remove unicode file names which leads to different checksums on HFS+
# vs. other filesystems because of unicode normalisation. # vs. other filesystems because of unicode normalisation.
postFetch = '' postFetch = ''

View file

@ -4,11 +4,11 @@ gobject-introspection, gsettings-desktop-schemas, wrapGAppsHook }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "birdfont"; pname = "birdfont";
version = "2.32.0"; version = "2.32.3";
src = fetchurl { src = fetchurl {
url = "https://birdfont.org/releases/${pname}-${version}.tar.xz"; url = "https://birdfont.org/releases/${pname}-${version}.tar.xz";
sha256 = "sha256-OnbLDKBxk1IGZZlSM/zK6xus6zmzV7OygfvHFBujHUk="; sha256 = "sha256-ZsYwDS7pgs635P3wPX/PCTuHLX3/Iu97HgVe+qFyjZw=";
}; };
nativeBuildInputs = [ python3 pkg-config vala gobject-introspection wrapGAppsHook ]; nativeBuildInputs = [ python3 pkg-config vala gobject-introspection wrapGAppsHook ];

View file

@ -82,6 +82,10 @@ python3Packages.buildPythonApplication rec {
# disable formatting tests because they can break on black updates # disable formatting tests because they can break on black updates
"test_code_is_black_clean" "test_code_is_black_clean"
# fails at 2022-09-30
"test_identification"
"test_diff"
] ++ lib.optionals stdenv.isDarwin [ ] ++ lib.optionals stdenv.isDarwin [
# Disable flaky tests on Darwin # Disable flaky tests on Darwin
"test_non_unicode_filename" "test_non_unicode_filename"

View file

@ -7,23 +7,25 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "minipro"; pname = "minipro";
version = "0.5"; version = "0.6";
src = fetchFromGitLab { src = fetchFromGitLab {
owner = "DavidGriffith"; owner = "DavidGriffith";
repo = "minipro"; repo = "minipro";
rev = version; rev = version;
sha256 = "sha256-Hyj2LyY7W8opjigH+QLHHbDyelC0LMgGgdN+u3nNoJc="; sha256 = "sha256-6i4PYzSm6lcO/Nb6n3holrNe4TtAnG2o81ZIMAIGqOE=";
}; };
nativeBuildInputs = [ pkg-config ]; nativeBuildInputs = [ pkg-config ];
buildInputs = [ libusb1 ]; buildInputs = [ libusb1 ];
makeFlags = [ makeFlags = [
"VERSION=${version}"
"PREFIX=$(out)" "PREFIX=$(out)"
"UDEV_DIR=$(out)/lib/udev" "UDEV_DIR=$(out)/lib/udev"
"COMPLETIONS_DIR=$(out)/share/bash-completion/completions" "COMPLETIONS_DIR=$(out)/share/bash-completion/completions"
"PKG_CONFIG=${pkg-config}/bin/${pkg-config.targetPrefix}pkg-config" "PKG_CONFIG=${pkg-config}/bin/${pkg-config.targetPrefix}pkg-config"
"CC=${stdenv.cc.targetPrefix}cc" "CC=${stdenv.cc.targetPrefix}cc"
"CFLAGS=-O2"
]; ];
meta = with lib; { meta = with lib; {

View file

@ -0,0 +1,73 @@
{ lib, stdenv, makeWrapper, fetchzip, runCommand, plantuml, plantuml-c4, jre }:
# The C4-PlantUML docs say that it suffices to run plantuml with the
# -DRELATIVE_INCLUDE="..." arg to make plantuml find the C4 templates
# when included like "!include C4_Container.puml".
# Unfortunately, this is not sufficient in practise, when the path is not ".".
# What helps is setting -Dplantuml.include.path="..." *before* the jar
# parameter.
# The -DRELATIVE_INCLUDE param then *still* needs to be set (*after* the jar
# argument), because the C4 template vars check for existence of this variable
# and if it is not set, reference paths in the internet.
let
c4-lib = fetchzip {
url = "https://github.com/plantuml-stdlib/C4-PlantUML/archive/88a3f99150c6ff7953c4a99b184d03412ffdedb1.zip";
sha256 = "sha256-vk4YWdGb47OsI9mApGTQ7OfELRZdBouzKfUZq3kchcM=";
};
sprites = fetchzip {
url = "https://github.com/tupadr3/plantuml-icon-font-sprites/archive/fa3f885dbd45c9cd0cdf6c0e5e4fb51ec8b76582.zip";
sha256 = "sha256-lt9+NNMIaZSkKNsGyHoqXUCTlKmZFGfNYYGjer6X0Xc=";
};
# In order to pre-fix the plantuml.jar parameter with the argument
# -Dplantuml.include.path=..., we post-fix the java command using a wrapper.
# This way the plantuml derivation can remain unchanged.
plantumlWithExtraPath =
let
plantumlIncludePath = lib.concatStringsSep ":" [ c4-lib sprites ];
includeFlag = "-Dplantuml.include.path=${lib.escapeShellArg plantumlIncludePath}";
postFixedJre =
runCommand "jre-postfixed" { nativeBuildInputs = [ makeWrapper ]; } ''
mkdir -p $out/bin
makeWrapper ${jre}/bin/java $out/bin/java \
--add-flags ${lib.escapeShellArg includeFlag}
'';
in
plantuml.override { jre = postFixedJre; };
in
stdenv.mkDerivation rec {
pname = "plantuml-c4";
version = "unstable-2022-08-21";
nativeBuildInputs = [ makeWrapper ];
buildCommand = ''
mkdir -p $out/bin
makeWrapper ${plantumlWithExtraPath}/bin/plantuml $out/bin/plantuml \
--add-flags "-DRELATIVE_INCLUDE=\"${c4-lib}\""
$out/bin/plantuml -help
'';
passthru.tests.example-c4-diagram =
runCommand "c4-plantuml-sample.png" { nativeBuildInputs = [ plantuml-c4 ]; } ''
sed 's/https:.*\///' "${c4-lib}/samples/C4_Context Diagram Sample - enterprise.puml" > sample.puml
plantuml sample.puml -o $out
sed 's/!include ..\//!include /' ${sprites}/examples/complex-example.puml > sprites.puml
plantuml sprites.puml -o $out
'';
meta = with lib; {
description = "PlantUML bundled with C4-Plantuml and plantuml sprites library";
homepage = "https://github.com/plantuml-stdlib/C4-PlantUML";
license = licenses.mit;
maintainers = with maintainers; [ tfc ];
platforms = platforms.unix;
};
}

View file

@ -6,13 +6,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "snapper"; pname = "snapper";
version = "0.10.2"; version = "0.10.3";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "openSUSE"; owner = "openSUSE";
repo = "snapper"; repo = "snapper";
rev = "v${version}"; rev = "v${version}";
sha256 = "0x9anracaa19yqkc0x8wangrkdrx01kdy07c55lvlqrjyimfm4ih"; sha256 = "sha256-pi2S5dKUB2pjBQjaSJr789Ke5WU1uKp1RYMPKd0W4J0=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -29,7 +29,7 @@ let
boolToUpper = b: lib.toUpper (lib.boolToString b); boolToUpper = b: lib.toUpper (lib.boolToString b);
in in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
version = "0.8.2"; version = "0.8.3";
pname = "davix" + lib.optionalString enableThirdPartyCopy "-copy"; pname = "davix" + lib.optionalString enableThirdPartyCopy "-copy";
nativeBuildInputs = [ cmake pkg-config python3 ]; nativeBuildInputs = [ cmake pkg-config python3 ];
buildInputs = [ buildInputs = [
@ -45,7 +45,7 @@ stdenv.mkDerivation rec {
# https://github.com/cern-fts/davix/releases/tag/R_0_8_0 # https://github.com/cern-fts/davix/releases/tag/R_0_8_0
src = fetchurl { src = fetchurl {
url = "https://github.com/cern-fts/davix/releases/download/R_${lib.replaceStrings ["."] ["_"] version}/davix-${version}.tar.gz"; url = "https://github.com/cern-fts/davix/releases/download/R_${lib.replaceStrings ["."] ["_"] version}/davix-${version}.tar.gz";
sha256 = "sha256-iBeiTCPxMJud4jO5qIJFX0V8Qu3CpknccP4lJM922Uw="; sha256 = "sha256-fjC1VB4I0y2/WuA8a8q+rsBjrsEKZkd4eCIie0VBrj4=";
}; };
preConfigure = '' preConfigure = ''

View file

@ -2,16 +2,16 @@
buildGoModule rec { buildGoModule rec {
pname = "passphrase2pgp"; pname = "passphrase2pgp";
version = "1.2.0"; version = "1.2.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "skeeto"; owner = "skeeto";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
hash = "sha256-VNOoYYnHsSgiSbVxlBwYUq0JsLa4BwZQSvMVSiyB6rg="; hash = "sha256-Ik/W3gGvrOyUvYgMYqT8FIFoxp62BXd2GpV14pYXEuY=";
}; };
vendorSha256 = "sha256-7q5nwkj4TP7VgHmV9YBbCB11yTPL7tK4gD+uN4Vw3Cs="; vendorSha256 = "sha256-2H9YRVCaari47ppSkcQYg/P4Dzb4k5PLjKAtfp39NR8=";
postInstall = '' postInstall = ''
mkdir -p $out/share/doc/$name mkdir -p $out/share/doc/$name

View file

@ -18,13 +18,13 @@ let
in in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "tree"; pname = "tree";
version = "2.0.2"; version = "2.0.4";
src = fetchFromGitLab { src = fetchFromGitLab {
owner = "OldManProgrammer"; owner = "OldManProgrammer";
repo = "unix-tree"; repo = "unix-tree";
rev = version; rev = version;
sha256 = "sha256-ex4fD8dZJGplL3oMaSokMBn6PRJ8/s83CnWQaAjBcao="; sha256 = "sha256-2voXL31JHh09yBBLuHhYyZsUapiPVF/cgRmTU6wSXk4=";
}; };
preConfigure = '' preConfigure = ''

View file

@ -3980,7 +3980,9 @@ with pkgs;
fx_cast_bridge = callPackage ../tools/misc/fx_cast { }; fx_cast_bridge = callPackage ../tools/misc/fx_cast { };
fzf = callPackage ../tools/misc/fzf { }; fzf = callPackage ../tools/misc/fzf {
buildGoModule = buildGo119Module;
};
fzf-obc = callPackage ../shells/bash/fzf-obc { }; fzf-obc = callPackage ../shells/bash/fzf-obc { };
@ -10125,6 +10127,8 @@ with pkgs;
plantuml = callPackage ../tools/misc/plantuml { }; plantuml = callPackage ../tools/misc/plantuml { };
plantuml-c4 = callPackage ../tools/misc/plantuml/plantuml-c4.nix { };
plantuml-server = callPackage ../tools/misc/plantuml-server { }; plantuml-server = callPackage ../tools/misc/plantuml-server { };
plan9port = callPackage ../tools/system/plan9port { plan9port = callPackage ../tools/system/plan9port {
@ -27816,9 +27820,7 @@ with pkgs;
fritzprofiles = with python3.pkgs; toPythonApplication fritzprofiles; fritzprofiles = with python3.pkgs; toPythonApplication fritzprofiles;
fsv = callPackage ../applications/misc/fsv { fsv = callPackage ../applications/misc/fsv { };
autoreconfHook = buildPackages.autoreconfHook269;
};
ft2-clone = callPackage ../applications/audio/ft2-clone { ft2-clone = callPackage ../applications/audio/ft2-clone {
inherit (darwin.apple_sdk.frameworks) CoreAudio CoreMIDI CoreServices Cocoa; inherit (darwin.apple_sdk.frameworks) CoreAudio CoreMIDI CoreServices Cocoa;
@ -29127,10 +29129,7 @@ with pkgs;
k3sup = callPackage ../applications/networking/cluster/k3sup {}; k3sup = callPackage ../applications/networking/cluster/k3sup {};
kconf = callPackage ../applications/networking/cluster/kconf { kconf = callPackage ../applications/networking/cluster/kconf { };
# pinned due to build failure or vendoring problems. When unpinning double check with: nix-build -A $name.go-modules --rebuild
buildGoModule = buildGo117Module;
};
kail = callPackage ../tools/networking/kail { }; kail = callPackage ../tools/networking/kail { };
@ -29277,10 +29276,7 @@ with pkgs;
kubebuilder = callPackage ../applications/networking/cluster/kubebuilder { }; kubebuilder = callPackage ../applications/networking/cluster/kubebuilder { };
kuttl = callPackage ../applications/networking/cluster/kuttl { kuttl = callPackage ../applications/networking/cluster/kuttl { };
# pinned due to build failure or vendoring problems. When unpinning double check with: nix-build -A $name.go-modules --rebuild
buildGoModule = buildGo117Module;
};
kubectl-doctor = callPackage ../applications/networking/cluster/kubectl-doctor { kubectl-doctor = callPackage ../applications/networking/cluster/kubectl-doctor {
# pinned due to build failure or vendoring problems. When unpinning double check with: nix-build -A $name.go-modules --rebuild # pinned due to build failure or vendoring problems. When unpinning double check with: nix-build -A $name.go-modules --rebuild