From f888642ec69962a5da2e80c69b731d89e61f637d Mon Sep 17 00:00:00 2001 From: Eelco Dolstra Date: Tue, 31 May 2022 15:16:03 +0200 Subject: [PATCH 01/25] Remove nixUnstable Now that we have regular (6-weekly) releases, there no longer is a compelling reason to have an unstable version of Nix in Nixpkgs. People who really need the bleeding edge can use the 'nix' flake. --- pkgs/tools/package-management/nix/default.nix | 12 +----------- 1 file changed, 1 insertion(+), 11 deletions(-) diff --git a/pkgs/tools/package-management/nix/default.nix b/pkgs/tools/package-management/nix/default.nix index 44877c94c25..7c26bddb835 100644 --- a/pkgs/tools/package-management/nix/default.nix +++ b/pkgs/tools/package-management/nix/default.nix @@ -87,15 +87,5 @@ in lib.makeExtensible (self: { stable = self.nix_2_8; - # remember to backport updates to the stable branch! - unstable = lib.lowPrio (common rec { - version = "2.8"; - suffix = "pre20220530_${lib.substring 0 7 src.rev}"; - src = fetchFromGitHub { - owner = "NixOS"; - repo = "nix"; - rev = "af23d38019a47e5bb4cd6585a1678b37c957130c"; - sha256 = "sha256-RH77Y4IhbTofNYlLQSGKLL0fJAG9iHSwRNvMEZ4M0VQ="; - }; - }); + unstable = self.stable; }) From a65fab6b629bbc56573c407545aa646db0c28684 Mon Sep 17 00:00:00 2001 From: Guillaume Girol Date: Sat, 4 Jun 2022 12:00:00 +0000 Subject: [PATCH 02/25] gtg: 0.5 -> 0.6 --- pkgs/applications/office/gtg/default.nix | 20 +++++++++----------- 1 file changed, 9 insertions(+), 11 deletions(-) diff --git a/pkgs/applications/office/gtg/default.nix b/pkgs/applications/office/gtg/default.nix index 6d536ea60a3..16a498afcac 100644 --- a/pkgs/applications/office/gtg/default.nix +++ b/pkgs/applications/office/gtg/default.nix @@ -7,33 +7,27 @@ , gtk3 , wrapGAppsHook , glib +, gtksourceview4 , itstool , gettext , pango , gdk-pixbuf +, libsecret , gobject-introspection , xvfb-run }: python3Packages.buildPythonApplication rec { pname = "gtg"; - version = "0.5"; + version = "0.6"; src = fetchFromGitHub { owner = "getting-things-gnome"; repo = "gtg"; rev = "v${version}"; - sha256 = "0b2slm7kjq6q8c7v4m7aqc8m1ynjxn3bl7445srpv1xc0dilq403"; + sha256 = "sha256-O8qBD92P2g8QrBdMXa6j0Ozk+W80Ny5yk0KNTy7ekfE="; }; - patches = [ - # fix build with meson 0.60 (https://github.com/getting-things-gnome/gtg/pull/729) - (fetchpatch { - url = "https://github.com/getting-things-gnome/gtg/commit/1809d10663ae3d8f69c04138b66f9b4e66ee14f6.patch"; - sha256 = "sha256-bYr5PAsuvcSqTf0vaJj2APtuBrwHdhXJxtXoAb7CfGk="; - }) - ]; - nativeBuildInputs = [ meson ninja @@ -46,8 +40,10 @@ python3Packages.buildPythonApplication rec { buildInputs = [ glib gtk3 + gtksourceview4 pango gdk-pixbuf + libsecret ]; propagatedBuildInputs = with python3Packages; [ @@ -56,12 +52,14 @@ python3Packages.buildPythonApplication rec { lxml gst-python liblarch + caldav ]; checkInputs = with python3Packages; [ nose mock xvfb-run + pytest ]; preBuild = '' @@ -71,7 +69,7 @@ python3Packages.buildPythonApplication rec { format = "other"; strictDeps = false; # gobject-introspection does not run with strictDeps (https://github.com/NixOS/nixpkgs/issues/56943) - checkPhase = "xvfb-run python3 ../run-tests"; + checkPhase = "xvfb-run pytest ../tests/"; meta = with lib; { description = " A personal tasks and TODO-list items organizer"; From 50648f568d2c988dc53d4ea82da622eca0fe3dd7 Mon Sep 17 00:00:00 2001 From: Florian Klink Date: Thu, 9 Jun 2022 19:59:03 +0200 Subject: [PATCH 03/25] =?UTF-8?q?nixos/=E2=80=A6/kexec-boot.nix:=20move=20?= =?UTF-8?q?into=20netboot.nix,=20rename=20to=20kexecTree?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit `nixos/modules/installer/kexec/kexec-boot.nix` doesn't contain any custom NixOS config, other than importing `netboot-minimal.nix` (which imports `netboot-base.nix`, which imports `netboot.nix`. `netboot.nix` really is just describing a self-contained system config, running entirely off kernel and initrd, so we might as well move the kexec script generation there as well. `netboot.nix` already contains some `system.build` attributes. Provide a `system.build.kexecTree` attribute (and `kexecScript` for composability). --- nixos/modules/installer/kexec/kexec-boot.nix | 51 -------------------- nixos/modules/installer/netboot/netboot.nix | 31 ++++++++++++ nixos/tests/kexec.nix | 7 ++- 3 files changed, 34 insertions(+), 55 deletions(-) delete mode 100644 nixos/modules/installer/kexec/kexec-boot.nix diff --git a/nixos/modules/installer/kexec/kexec-boot.nix b/nixos/modules/installer/kexec/kexec-boot.nix deleted file mode 100644 index 2d062214efc..00000000000 --- a/nixos/modules/installer/kexec/kexec-boot.nix +++ /dev/null @@ -1,51 +0,0 @@ -# This module exposes a config.system.build.kexecBoot attribute, -# which returns a directory with kernel, initrd and a shell script -# running the necessary kexec commands. - -# It's meant to be scp'ed to a machine with working ssh and kexec binary -# installed. - -# This is useful for (cloud) providers where you can't boot a custom image, but -# get some Debian or Ubuntu installation. - -{ pkgs -, modulesPath -, config -, ... -}: -{ - imports = [ - (modulesPath + "/installer/netboot/netboot-minimal.nix") - ]; - - config = { - system.build.kexecBoot = - let - kexecScript = pkgs.writeScript "kexec-boot" '' - #!/usr/bin/env bash - if ! kexec -v >/dev/null 2>&1; then - echo "kexec not found: please install kexec-tools" 2>&1 - exit 1 - fi - SCRIPT_DIR=$( cd -- "$( dirname -- "''${BASH_SOURCE[0]}" )" &> /dev/null && pwd ) - kexec --load ''${SCRIPT_DIR}/bzImage \ - --initrd=''${SCRIPT_DIR}/initrd.gz \ - --command-line "init=${config.system.build.toplevel}/init ${toString config.boot.kernelParams}" - kexec -e - ''; in - pkgs.linkFarm "kexec-tree" [ - { - name = "initrd.gz"; - path = "${config.system.build.netbootRamdisk}/initrd"; - } - { - name = "bzImage"; - path = "${config.system.build.kernel}/${config.system.boot.loader.kernelFile}"; - } - { - name = "kexec-boot"; - path = kexecScript; - } - ]; - }; -} diff --git a/nixos/modules/installer/netboot/netboot.nix b/nixos/modules/installer/netboot/netboot.nix index a459e7304cd..3127bdc436f 100644 --- a/nixos/modules/installer/netboot/netboot.nix +++ b/nixos/modules/installer/netboot/netboot.nix @@ -101,6 +101,37 @@ with lib; boot ''; + # A script invoking kexec on ./bzImage and ./initrd.gz. + # Usually used through system.build.kexecTree, but exposed here for composability. + system.build.kexecScript = pkgs.writeScript "kexec-boot" '' + #!/usr/bin/env bash + if ! kexec -v >/dev/null 2>&1; then + echo "kexec not found: please install kexec-tools" 2>&1 + exit 1 + fi + SCRIPT_DIR=$( cd -- "$( dirname -- "''${BASH_SOURCE[0]}" )" &> /dev/null && pwd ) + kexec --load ''${SCRIPT_DIR}/bzImage \ + --initrd=''${SCRIPT_DIR}/initrd.gz \ + --command-line "init=${config.system.build.toplevel}/init ${toString config.boot.kernelParams}" + kexec -e + ''; + + # A tree containing initrd.gz, bzImage and a kexec-boot script. + system.build.kexecTree = pkgs.linkFarm "kexec-tree" [ + { + name = "initrd.gz"; + path = "${config.system.build.netbootRamdisk}/initrd"; + } + { + name = "bzImage"; + path = "${config.system.build.kernel}/${config.system.boot.loader.kernelFile}"; + } + { + name = "kexec-boot"; + path = config.system.build.kexecScript; + } + ]; + boot.loader.timeout = 10; boot.postBootCommands = diff --git a/nixos/tests/kexec.nix b/nixos/tests/kexec.nix index 7238a9f58e0..3f5a6f521af 100644 --- a/nixos/tests/kexec.nix +++ b/nixos/tests/kexec.nix @@ -18,8 +18,7 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: { virtualisation.vlans = [ ]; environment.systemPackages = [ pkgs.hello ]; imports = [ - "${modulesPath}/installer/kexec/kexec-boot.nix" - "${modulesPath}/profiles/minimal.nix" + "${modulesPath}/installer/netboot/netboot-minimal.nix" ]; }; }; @@ -33,14 +32,14 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: { node1.connect() node1.wait_for_unit("multi-user.target") - # Check if the machine with kexec-boot.nix profile boots up + # Check if the machine with netboot-minimal.nix profile boots up node2.wait_for_unit("multi-user.target") node2.shutdown() # Kexec node1 to the toplevel of node2 via the kexec-boot script node1.succeed('touch /run/foo') node1.fail('hello') - node1.execute('${nodes.node2.config.system.build.kexecBoot}/kexec-boot', check_return=False) + node1.execute('${nodes.node2.config.system.build.kexecTree}/kexec-boot', check_return=False) node1.succeed('! test -e /run/foo') node1.succeed('hello') node1.succeed('[ "$(hostname)" = "node2" ]') From cdaaf95e206c295404b189882db2f7d294d2cbe8 Mon Sep 17 00:00:00 2001 From: Florian Klink Date: Thu, 9 Jun 2022 20:00:26 +0200 Subject: [PATCH 04/25] nixos/release.nix: expose a `kexec.$system` attribute --- nixos/release.nix | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/nixos/release.nix b/nixos/release.nix index e0d782bcaec..beafdf9ff5b 100644 --- a/nixos/release.nix +++ b/nixos/release.nix @@ -151,6 +151,13 @@ in rec { # Build the initial ramdisk so Hydra can keep track of its size over time. initialRamdisk = buildFromConfig ({ ... }: { }) (config: config.system.build.initialRamdisk); + kexec = forMatchingSystems supportedSystems (system: (import lib/eval-config.nix { + inherit system; + modules = [ + ./modules/installer/netboot/netboot-minimal.nix + ]; + }).config.system.build.kexecTree); + netboot = forMatchingSystems supportedSystems (system: makeNetboot { module = ./modules/installer/netboot/netboot-minimal.nix; inherit system; From 06aa64684c6746eb54aea86f981d82b60f544657 Mon Sep 17 00:00:00 2001 From: Florian Klink Date: Thu, 9 Jun 2022 20:08:34 +0200 Subject: [PATCH 05/25] nixos/doc: document how to use kexecTree This documents how to build kexec artifacts. --- .../installation/installing-kexec.section.xml | 94 +++++++++++++++++++ .../installation/installing.chapter.xml | 1 + .../installation/installing-kexec.section.md | 64 +++++++++++++ .../manual/installation/installing.chapter.md | 1 + 4 files changed, 160 insertions(+) create mode 100644 nixos/doc/manual/from_md/installation/installing-kexec.section.xml create mode 100644 nixos/doc/manual/installation/installing-kexec.section.md diff --git a/nixos/doc/manual/from_md/installation/installing-kexec.section.xml b/nixos/doc/manual/from_md/installation/installing-kexec.section.xml new file mode 100644 index 00000000000..46ea0d59b6c --- /dev/null +++ b/nixos/doc/manual/from_md/installation/installing-kexec.section.xml @@ -0,0 +1,94 @@ +
+ <quote>Booting</quote> into NixOS via kexec + + In some cases, your system might already be booted into/preinstalled + with another Linux distribution, and booting NixOS by attaching an + installation image is quite a manual process. + + + This is particularly useful for (cloud) providers where you can’t + boot a custom image, but get some Debian or Ubuntu installation. + + + In these cases, it might be easier to use kexec + to jump into NixOS from the running system, which + only assumes bash and kexec to + be installed on the machine. + + + Note that kexec may not work correctly on some hardware, as devices + are not fully re-initialized in the process. In practice, this + however is rarely the case. + + + To build the necessary files from your current version of nixpkgs, + you can run: + + +nix-build -A kexec.x86_64-linux '<nixpkgs/nixos/release.nix>' + + + This will create a result directory containing + the following: + + + + + bzImage (the Linux kernel) + + + + + initrd (the initrd file) + + + + + kexec-boot (a shellscript invoking + kexec) + + + + + These three files are meant to be copied over to the other already + running Linux Distribution. + + + Note it’s symlinks pointing elsewhere, so cd in, + and use scp * root@$destination to copy it over, + rather than rsync. + + + Once you finished copying, execute kexec-boot + on the destination, and after some seconds, the + machine should be booting into an (ephemeral) NixOS installation + medium. + + + In case you want to describe your own system closure to kexec into, + instead of the default installer image, you can build your own + configuration.nix: + + +{ modulesPath, ... }: { + imports = [ + (modulesPath + "/installer/netboot/netboot-minimal.nix") + ]; + + services.openssh.enable = true; + users.users.root.openssh.authorizedKeys.keys = [ + "my-ssh-pubkey" + ]; +} + + +nix-build '<nixpkgs/nixos>' \ + --arg configuration ./configuration.nix + --attr config.system.build.kexecTree + + + Make sure your configuration.nix does still + import netboot-minimal.nix (or + netboot-base.nix). + +
diff --git a/nixos/doc/manual/from_md/installation/installing.chapter.xml b/nixos/doc/manual/from_md/installation/installing.chapter.xml index aee0b30a707..19ff841f5a6 100644 --- a/nixos/doc/manual/from_md/installation/installing.chapter.xml +++ b/nixos/doc/manual/from_md/installation/installing.chapter.xml @@ -638,6 +638,7 @@ $ passwd eelco Additional installation notes + diff --git a/nixos/doc/manual/installation/installing-kexec.section.md b/nixos/doc/manual/installation/installing-kexec.section.md new file mode 100644 index 00000000000..286cbbda6a6 --- /dev/null +++ b/nixos/doc/manual/installation/installing-kexec.section.md @@ -0,0 +1,64 @@ +# "Booting" into NixOS via kexec {#sec-booting-via-kexec} + +In some cases, your system might already be booted into/preinstalled with +another Linux distribution, and booting NixOS by attaching an installation +image is quite a manual process. + +This is particularly useful for (cloud) providers where you can't boot a custom +image, but get some Debian or Ubuntu installation. + +In these cases, it might be easier to use `kexec` to "jump into NixOS" from the +running system, which only assumes `bash` and `kexec` to be installed on the +machine. + +Note that kexec may not work correctly on some hardware, as devices are not +fully re-initialized in the process. In practice, this however is rarely the +case. + +To build the necessary files from your current version of nixpkgs, +you can run: + +```ShellSession +nix-build -A kexec.x86_64-linux '' +``` + +This will create a `result` directory containing the following: + - `bzImage` (the Linux kernel) + - `initrd` (the initrd file) + - `kexec-boot` (a shellscript invoking `kexec`) + +These three files are meant to be copied over to the other already running +Linux Distribution. + +Note it's symlinks pointing elsewhere, so `cd` in, and use +`scp * root@$destination` to copy it over, rather than rsync. + +Once you finished copying, execute `kexec-boot` *on the destination*, and after +some seconds, the machine should be booting into an (ephemeral) NixOS +installation medium. + +In case you want to describe your own system closure to kexec into, instead of +the default installer image, you can build your own `configuration.nix`: + +```nix +{ modulesPath, ... }: { + imports = [ + (modulesPath + "/installer/netboot/netboot-minimal.nix") + ]; + + services.openssh.enable = true; + users.users.root.openssh.authorizedKeys.keys = [ + "my-ssh-pubkey" + ]; +} +``` + + +```ShellSession +nix-build '' \ + --arg configuration ./configuration.nix + --attr config.system.build.kexecTree +``` + +Make sure your `configuration.nix` does still import `netboot-minimal.nix` (or +`netboot-base.nix`). diff --git a/nixos/doc/manual/installation/installing.chapter.md b/nixos/doc/manual/installation/installing.chapter.md index 8a46d68ae3b..7e830f8e458 100644 --- a/nixos/doc/manual/installation/installing.chapter.md +++ b/nixos/doc/manual/installation/installing.chapter.md @@ -476,6 +476,7 @@ With a partitioned disk. ```{=docbook} + From 3df045e6d5ea17ffaaf9d1ec0c82b8eb1bae0faf Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Sandro=20J=C3=A4ckel?= Date: Thu, 9 Jun 2022 17:28:13 +0200 Subject: [PATCH 06/25] nixos/systemd: use cfg.package in systemPackages to avoid confusion --- nixos/modules/system/boot/systemd.nix | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/nixos/modules/system/boot/systemd.nix b/nixos/modules/system/boot/systemd.nix index 679c5210a6b..645fbc2b713 100644 --- a/nixos/modules/system/boot/systemd.nix +++ b/nixos/modules/system/boot/systemd.nix @@ -8,8 +8,6 @@ let cfg = config.systemd; - systemd = cfg.package; - inherit (systemdUtils.lib) generateUnits targetToUnit @@ -439,7 +437,7 @@ in system.build.units = cfg.units; - system.nssModules = [ systemd.out ]; + system.nssModules = [ cfg.package.out ]; system.nssDatabases = { hosts = (mkMerge [ (mkOrder 400 ["mymachines"]) # 400 to ensure it comes before resolve (which is mkBefore'd) @@ -453,7 +451,7 @@ in ]); }; - environment.systemPackages = [ systemd ]; + environment.systemPackages = [ cfg.package ]; environment.etc = let # generate contents for /etc/systemd/system-${type} from attrset of links and packages From ea62d92f6368e2da5ca695445b271ec7cb1522ef Mon Sep 17 00:00:00 2001 From: Klemens Nanni Date: Tue, 7 Jun 2022 12:10:35 +0200 Subject: [PATCH 07/25] libdigidocpp: Replace wrap with rpath addition libdigidocpp.so itself contains the code to load the PKCS#11 module, not digidoc-tool(1). Wrapping `digitoc-tool` - leaves the library broken - is too broad (LD_LIBRARY_PATH is generic and inherited by children) - needs an extra wrapper script (introducing subtle changes on its own) Considering how dlopen(3) prefers the calling object's DT_RUNPATH, simply amend that. --- .../development/libraries/libdigidocpp/default.nix | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/pkgs/development/libraries/libdigidocpp/default.nix b/pkgs/development/libraries/libdigidocpp/default.nix index 1e1e892e532..c99e96863d3 100644 --- a/pkgs/development/libraries/libdigidocpp/default.nix +++ b/pkgs/development/libraries/libdigidocpp/default.nix @@ -1,4 +1,4 @@ -{ lib, stdenv, fetchurl, fetchpatch, cmake, makeWrapper, minizip, pcsclite, opensc, openssl +{ lib, stdenv, fetchurl, fetchpatch, cmake, minizip, pcsclite, opensc, openssl , xercesc, xml-security-c, pkg-config, xsd, zlib, xalanc, xxd }: stdenv.mkDerivation rec { @@ -22,7 +22,7 @@ stdenv.mkDerivation rec { }) ]; - nativeBuildInputs = [ cmake makeWrapper pkg-config xxd ]; + nativeBuildInputs = [ cmake pkg-config xxd ]; buildInputs = [ minizip pcsclite opensc openssl xercesc @@ -31,11 +31,11 @@ stdenv.mkDerivation rec { outputs = [ "out" "lib" "dev" "bin" ]; - # replace this hack with a proper cmake variable or environment variable - # once https://github.com/open-eid/cmake/pull/34 (or #35) gets merged. - postInstall = '' - wrapProgram $bin/bin/digidoc-tool \ - --prefix LD_LIBRARY_PATH : ${opensc}/lib/pkcs11/ + # libdigidocpp.so's `PKCS11Signer::PKCS11Signer()` dlopen()s "opensc-pkcs11.so" + # itself, so add OpenSC to its DT_RUNPATH after the fixupPhase shrinked it. + # https://github.com/open-eid/cmake/pull/35 might be an alternative. + postFixup = '' + patchelf --add-rpath ${opensc}/lib/pkcs11 $lib/lib/libdigidocpp.so ''; meta = with lib; { From 8daa103d1fecf9d95ecb89a837034cdc18daefe2 Mon Sep 17 00:00:00 2001 From: Klemens Nanni Date: Tue, 7 Jun 2022 12:21:39 +0200 Subject: [PATCH 08/25] qdigidoc: Explain why LD_LIBRARY_PATH is required Contrary to libdigidocpp's libdigidocpp, qdigidoc uses Qt to load modules and thus causes different search behaviour in dlopen(3). This approach is not required on every platform; on OpenBSD[0] qdigidoc4(1) finds "opensc-pkcs11.so" due to /usr/local/lib/pkcs11/ in the main program's DT_RUNPATH. 0: https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/libexec/ld.so/library_subr.c?annotate=1.51 (line 297) --- pkgs/tools/security/qdigidoc/default.nix | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/pkgs/tools/security/qdigidoc/default.nix b/pkgs/tools/security/qdigidoc/default.nix index f76349c3dcf..f7d40dc604c 100644 --- a/pkgs/tools/security/qdigidoc/default.nix +++ b/pkgs/tools/security/qdigidoc/default.nix @@ -35,10 +35,14 @@ mkDerivation rec { qttranslations ]; - # replace this hack with a proper cmake variable or environment variable - # once https://github.com/open-eid/cmake/pull/34 (or #35) gets merged. + # qdigidoc4's `QPKCS11::reload()` dlopen()s "opensc-pkcs11.so" in QLibrary, + # i.e. OpenSC's module is searched for in libQt5Core's DT_RUNPATH and fixing + # qdigidoc4's DT_RUNPATH has no effect on Linux (at least OpenBSD's ld.so(1) + # searches the program's runtime path as well). + # LD_LIBRARY_PATH takes precedence for all calling objects, see dlopen(3). + # https://github.com/open-eid/cmake/pull/35 might be an alternative. qtWrapperArgs = [ - "--prefix LD_LIBRARY_PATH : ${opensc}/lib/pkcs11/" + "--prefix LD_LIBRARY_PATH : ${opensc}/lib/pkcs11/" ]; meta = with lib; { From 39215582e1eb8e3c3306b19056d7f1f0436efad2 Mon Sep 17 00:00:00 2001 From: Azat Bahawi Date: Fri, 10 Jun 2022 22:39:06 +0300 Subject: [PATCH 09/25] pebble: use buildGoModule --- pkgs/tools/admin/pebble/default.nix | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/pkgs/tools/admin/pebble/default.nix b/pkgs/tools/admin/pebble/default.nix index 0d6d2f57df1..f111cb887b4 100644 --- a/pkgs/tools/admin/pebble/default.nix +++ b/pkgs/tools/admin/pebble/default.nix @@ -1,15 +1,13 @@ -{ buildGoPackage +{ lib +, buildGoModule , fetchFromGitHub -, lib , nixosTests }: -buildGoPackage rec { +buildGoModule rec { pname = "pebble"; version = "2.3.1"; - goPackagePath = "github.com/letsencrypt/${pname}"; - src = fetchFromGitHub { owner = "letsencrypt"; repo = pname; @@ -17,6 +15,8 @@ buildGoPackage rec { sha256 = "sha256-S9+iRaTSRt4F6yMKK0OJO6Zto9p0dZ3q/mULaipudVo="; }; + vendorSha256 = null; + passthru.tests = { smoke-test = nixosTests.acme; }; From 7c2609922a09041b4965e6c176e892c1d18d83a2 Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Sat, 11 Jun 2022 05:51:50 +0000 Subject: [PATCH 10/25] python310Packages.transformers: 4.19.3 -> 4.19.4 --- pkgs/development/python-modules/transformers/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/python-modules/transformers/default.nix b/pkgs/development/python-modules/transformers/default.nix index ae3009e3fba..b23da192142 100644 --- a/pkgs/development/python-modules/transformers/default.nix +++ b/pkgs/development/python-modules/transformers/default.nix @@ -24,7 +24,7 @@ buildPythonPackage rec { pname = "transformers"; - version = "4.19.3"; + version = "4.19.4"; format = "setuptools"; disabled = pythonOlder "3.7"; @@ -33,7 +33,7 @@ buildPythonPackage rec { owner = "huggingface"; repo = pname; rev = "refs/tags/v${version}"; - hash = "sha256-kXgxIjU5L4YYCqHGvhqjX4YZ3VKNLYIxIKqT1Nmv/GU="; + hash = "sha256-MxP87tmRsjAOkTkJ7VmlUjG4RE3mh/wF76TZQE/UOoQ="; }; propagatedBuildInputs = [ From 03a6fedb127aba81984a1ca6818e8841d86338d3 Mon Sep 17 00:00:00 2001 From: Jonas Heinrich Date: Sat, 11 Jun 2022 12:40:31 +0200 Subject: [PATCH 11/25] firejail: 0.9.68 -> 0.9.70 --- pkgs/os-specific/linux/firejail/default.nix | 39 ++------------------- 1 file changed, 2 insertions(+), 37 deletions(-) diff --git a/pkgs/os-specific/linux/firejail/default.nix b/pkgs/os-specific/linux/firejail/default.nix index a8188caf18b..7b7abdb8441 100644 --- a/pkgs/os-specific/linux/firejail/default.nix +++ b/pkgs/os-specific/linux/firejail/default.nix @@ -11,13 +11,13 @@ stdenv.mkDerivation rec { pname = "firejail"; - version = "0.9.68"; + version = "0.9.70"; src = fetchFromGitHub { owner = "netblue30"; repo = "firejail"; rev = version; - sha256 = "18yy1mykx7h78yj7sz729i3dlsrgi25m17m5x9gbrvsx7f87rw7j"; + sha256 = "sha256-x1txt0uER66bZN6BD6c/31Zu6fPPwC9kl/3bxEE6Ce8="; }; nativeBuildInputs = [ @@ -41,41 +41,6 @@ stdenv.mkDerivation rec { # By default fbuilder hardcodes the firejail binary to the install path. # On NixOS the firejail binary is a setuid wrapper available in $PATH. ./fbuilder-call-firejail-on-path.patch - - # NixOS specific whitelist to resolve binary paths in user environment - # Fixes https://github.com/NixOS/nixpkgs/issues/170784 - # Upstream fix https://github.com/netblue30/firejail/pull/5131 - # Upstream hopefully fixed in later versions > 0.9.68 - ./whitelist-nix-profile.patch - - # Fix OpenGL support for various applications including Firefox - # Issue: https://github.com/NixOS/nixpkgs/issues/55191 - # Upstream fix: https://github.com/netblue30/firejail/pull/5132 - # Hopefully fixed upstream in version > 0.9.68 - ./fix-opengl-support.patch - - # Fix CVE-2022-31214 by patching in 4 commits from upstream - # https://seclists.org/oss-sec/2022/q2/188 - (fetchpatch { - name = "CVE-2022-31214-patch1"; # "fixing CVE-2022-31214" - url = "https://github.com/netblue30/firejail/commit/27cde3d7d1e4e16d4190932347c7151dc2a84c50.patch"; - sha256 = "sha256-XXmnYCn4TPUvU43HifZDk4tEZQvOho9/7ehU6889nN4="; - }) - (fetchpatch { - name = "CVE-2022-31214-patch2"; # "shutdown testing" - url = "https://github.com/netblue30/firejail/commit/04ff0edf74395ddcbbcec955279c74ed9a6c0f86.patch"; - sha256 = "sha256-PV73hRlvYEQihuljSCQMNO34KJ0hDVFexhirpHcTK1I="; - }) - (fetchpatch { - name = "CVE-2022-31214-patch3"; # "CVE-2022-31214: fixing the fix" - url = "https://github.com/netblue30/firejail/commit/dab835e7a0eb287822016f5ae4e87f46e1d363e7.patch"; - sha256 = "sha256-6plBIliW/nLKR7TdGeB88eQ65JHEasnaRsP3HPXAFyA="; - }) - (fetchpatch { - name = "CVE-2022-31214-patch4"; # "CVE-2022-31214: fixing the fix, one more time " - url = "https://github.com/netblue30/firejail/commit/1884ea22a90d225950d81c804f1771b42ae55f54.patch"; - sha256 = "sha256-inkpcdC5rl5w+CTAwwQVBOELlHTXb8UGlpU+8kMY95s="; - }) ]; prePatch = '' From 99f3479d6085b26c1fdd521b7767861c9f589bcc Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Sat, 11 Jun 2022 12:01:35 +0000 Subject: [PATCH 12/25] python310Packages.pydal: 20220213.2 -> 20220609.1 --- pkgs/development/python-modules/pydal/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/python-modules/pydal/default.nix b/pkgs/development/python-modules/pydal/default.nix index f1aacb1c312..6cefc75fe04 100644 --- a/pkgs/development/python-modules/pydal/default.nix +++ b/pkgs/development/python-modules/pydal/default.nix @@ -6,12 +6,12 @@ buildPythonPackage rec { pname = "pydal"; - version = "20220213.2"; + version = "20220609.1"; format = "setuptools"; src = fetchPypi { inherit pname version; - sha256 = "sha256-7DBLcHSEkoT8wV6824TGWRLi9vK2t+r1RwwWmRBYD9I="; + sha256 = "sha256-c9cWdQ+V1Phw1cfe5MUif2edXIrFQaDZC9qGBDevedI="; }; postPatch = '' From bb390ea97f34d6d711145647185e20de91be1bce Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Sat, 11 Jun 2022 13:40:28 +0000 Subject: [PATCH 13/25] python310Packages.dogpile-cache: 1.1.5 -> 1.1.6 --- pkgs/development/python-modules/dogpile-cache/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/python-modules/dogpile-cache/default.nix b/pkgs/development/python-modules/dogpile-cache/default.nix index 66e5d5d5468..fe700abedd7 100644 --- a/pkgs/development/python-modules/dogpile-cache/default.nix +++ b/pkgs/development/python-modules/dogpile-cache/default.nix @@ -11,13 +11,13 @@ buildPythonPackage rec { pname = "dogpile-cache"; - version = "1.1.5"; + version = "1.1.6"; disabled = pythonOlder "3.6"; src = fetchPypi { pname = "dogpile.cache"; inherit version; - sha256 = "0f01bdc329329a8289af9705ff40fadb1f82a28c336f3174e12142b70d31c756"; + sha256 = "sha256-7tweMn5myT8MFah0BWmrdO89iSkELxCPmP3tnjX6/1U="; }; preCheck = '' From 76f2f569ef7bc092cc6a11ade767587d92d53ad5 Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Sat, 11 Jun 2022 17:26:47 +0000 Subject: [PATCH 14/25] python310Packages.pulumi-aws: 5.7.2 -> 5.8.0 --- pkgs/development/python-modules/pulumi-aws/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/python-modules/pulumi-aws/default.nix b/pkgs/development/python-modules/pulumi-aws/default.nix index 170a24ff70f..023414f3c41 100644 --- a/pkgs/development/python-modules/pulumi-aws/default.nix +++ b/pkgs/development/python-modules/pulumi-aws/default.nix @@ -12,7 +12,7 @@ buildPythonPackage rec { pname = "pulumi-aws"; # Version is independant of pulumi's. - version = "5.7.2"; + version = "5.8.0"; format = "setuptools"; disabled = pythonOlder "3.7"; @@ -21,7 +21,7 @@ buildPythonPackage rec { owner = "pulumi"; repo = "pulumi-aws"; rev = "refs/tags/v${version}"; - hash = "sha256-oy2TBxE9zDbRc6cSml4nwibAAEq3anWngoxj6h4sYbU="; + hash = "sha256-exMPHz5sq6AW3hyv+pl66RmHR4nEBIeDu7NPPyH1mig="; }; sourceRoot = "${src.name}/sdk/python"; From 2ea99624587e6a64ffe9d6ada5414b10d98d7739 Mon Sep 17 00:00:00 2001 From: Fabian Affolter Date: Sat, 11 Jun 2022 21:25:21 +0200 Subject: [PATCH 15/25] python310Packages.py-sneakers: init at 1.0.1 --- .../python-modules/py-sneakers/default.nix | 32 +++++++++++++++++++ pkgs/top-level/python-packages.nix | 2 ++ 2 files changed, 34 insertions(+) create mode 100644 pkgs/development/python-modules/py-sneakers/default.nix diff --git a/pkgs/development/python-modules/py-sneakers/default.nix b/pkgs/development/python-modules/py-sneakers/default.nix new file mode 100644 index 00000000000..62174c3dfc2 --- /dev/null +++ b/pkgs/development/python-modules/py-sneakers/default.nix @@ -0,0 +1,32 @@ +{ lib +, buildPythonPackage +, fetchPypi +, pythonOlder +}: + +buildPythonPackage rec { + pname = "py-sneakers"; + version = "1.0.1"; + format = "setuptools"; + + disabled = pythonOlder "3.7"; + + src = fetchPypi { + inherit pname version; + hash = "sha256-bIhkYTzRe4uM0kbNhbDTr6TiaOEBSiCSkPJKKCivDZY="; + }; + + # Module has no tests + doCheck = false; + + pythonImportsCheck = [ + "py_sneakers" + ]; + + meta = with lib; { + description = "Library to emulate the Sneakers movie effect"; + homepage = "https://github.com/aenima-x/py-sneakers"; + license = licenses.mit; + maintainers = with maintainers; [ fab ]; + }; +} diff --git a/pkgs/top-level/python-packages.nix b/pkgs/top-level/python-packages.nix index 6fd6fcae040..d3019faa80e 100644 --- a/pkgs/top-level/python-packages.nix +++ b/pkgs/top-level/python-packages.nix @@ -6976,6 +6976,8 @@ in { py-synologydsm-api = callPackage ../development/python-modules/py-synologydsm-api { }; + py-sneakers = callPackage ../development/python-modules/py-sneakers { }; + py-tes = callPackage ../development/python-modules/py-tes { }; py-ubjson = callPackage ../development/python-modules/py-ubjson { }; From c5d8a91b00e2011a248c70a97b50d8b6cc580840 Mon Sep 17 00:00:00 2001 From: Fabian Affolter Date: Sat, 11 Jun 2022 21:25:46 +0200 Subject: [PATCH 16/25] faraday-cli: 2.0.2 -> 2.1.5 --- pkgs/tools/security/faraday-cli/default.nix | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/pkgs/tools/security/faraday-cli/default.nix b/pkgs/tools/security/faraday-cli/default.nix index 27625277752..28cf9078865 100644 --- a/pkgs/tools/security/faraday-cli/default.nix +++ b/pkgs/tools/security/faraday-cli/default.nix @@ -5,13 +5,14 @@ python3.pkgs.buildPythonApplication rec { pname = "faraday-cli"; - version = "2.0.2"; + version = "2.1.5"; + format = "setuptools"; src = fetchFromGitHub { owner = "infobyte"; repo = pname; rev = "v${version}"; - hash = "sha256-J3YlFsX/maOqWo4ILEMXzIJeQ8vr47ApGGiaBWrUCMs="; + hash = "sha256-kl5yOJTMobccZoaIoWwQubCrswPa69I5Kmuox7JqAXs="; }; propagatedBuildInputs = with python3.pkgs; [ @@ -22,8 +23,10 @@ python3.pkgs.buildPythonApplication rec { faraday-plugins jsonschema log-symbols + luddite packaging pyyaml + py-sneakers simple-rest-client spinners tabulate From 69c4953f4b6bf2ed6df453a20be9537d52ceee29 Mon Sep 17 00:00:00 2001 From: Michael Weiss Date: Sat, 11 Jun 2022 22:20:09 +0200 Subject: [PATCH 17/25] ungoogled-chromium: 102.0.5005.61 -> 102.0.5005.115 --- .../networking/browsers/chromium/upstream-info.json | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/pkgs/applications/networking/browsers/chromium/upstream-info.json b/pkgs/applications/networking/browsers/chromium/upstream-info.json index ff7d61800da..e1dc07c7698 100644 --- a/pkgs/applications/networking/browsers/chromium/upstream-info.json +++ b/pkgs/applications/networking/browsers/chromium/upstream-info.json @@ -45,9 +45,9 @@ } }, "ungoogled-chromium": { - "version": "102.0.5005.61", - "sha256": "07vbi3gn9g4n04b2qi2hm34r122snrqaifa46yk3pyh1d79rfdqs", - "sha256bin64": "100n8k3d9k5bq58irc36ig6m5m0lxggffyk4crqqqcib2anqd0zv", + "version": "102.0.5005.115", + "sha256": "1rj7vy824vn513hiivc90lnxvxyi2s0qkdmfqsdssv9v6zjl079h", + "sha256bin64": "0b32sscbjnvr98lk962i9k2srckv2s7fp9pifmsv5jlwndjhzm7y", "deps": { "gn": { "version": "2022-04-14", @@ -56,8 +56,8 @@ "sha256": "0b5xs0chcv3hfhy71rycsmgxnqbm375a333hwav8929k9cbi5p9h" }, "ungoogled-patches": { - "rev": "102.0.5005.61-1", - "sha256": "1hlyi6k894blkkqmqsizx72bag2vj6wlpza0fvi8db5wp6i5b58g" + "rev": "102.0.5005.115-1", + "sha256": "1z2xkxxviggyyksga74cqa4v73gynlgzi22ckg8yv84qxrklik6p" } } } From c9f4a4ccb80be93853e05bff96436498f1f41e80 Mon Sep 17 00:00:00 2001 From: Fabian Affolter Date: Sun, 12 Jun 2022 00:43:49 +0200 Subject: [PATCH 18/25] python310Packages.cyclonedx-python-lib: 2.4.0 -> 2.5.1 --- .../python-modules/cyclonedx-python-lib/default.nix | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/pkgs/development/python-modules/cyclonedx-python-lib/default.nix b/pkgs/development/python-modules/cyclonedx-python-lib/default.nix index 9e32b3e4fea..352af83f013 100644 --- a/pkgs/development/python-modules/cyclonedx-python-lib/default.nix +++ b/pkgs/development/python-modules/cyclonedx-python-lib/default.nix @@ -9,6 +9,7 @@ , python , pythonOlder , requirements-parser +, sortedcontainers , setuptools , toml , types-setuptools @@ -18,7 +19,7 @@ buildPythonPackage rec { pname = "cyclonedx-python-lib"; - version = "2.4.0"; + version = "2.5.1"; format = "pyproject"; disabled = pythonOlder "3.9"; @@ -27,7 +28,7 @@ buildPythonPackage rec { owner = "CycloneDX"; repo = pname; rev = "refs/tags/v${version}"; - hash = "sha256-IrMXHWeksEmON3LxJvQ3WSKwQTY0aRZ8XItWMr3p4gw="; + hash = "sha256-w/av9U42fC4g7NUw7PSW+K822klH4e1xYFPh7I4jrRA="; }; nativeBuildInputs = [ @@ -39,6 +40,7 @@ buildPythonPackage rec { packageurl-python requirements-parser setuptools + sortedcontainers toml types-setuptools types-toml From a8d6ba5802823311e0f87b831410e5d8054aa5bf Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Sun, 12 Jun 2022 01:22:09 +0000 Subject: [PATCH 19/25] clojure: 1.11.1.1119 -> 1.11.1.1124 --- pkgs/development/interpreters/clojure/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/interpreters/clojure/default.nix b/pkgs/development/interpreters/clojure/default.nix index b309dd8b7db..e4ae49124e1 100644 --- a/pkgs/development/interpreters/clojure/default.nix +++ b/pkgs/development/interpreters/clojure/default.nix @@ -2,12 +2,12 @@ stdenv.mkDerivation rec { pname = "clojure"; - version = "1.11.1.1119"; + version = "1.11.1.1124"; src = fetchurl { # https://clojure.org/releases/tools url = "https://download.clojure.org/install/clojure-tools-${version}.tar.gz"; - sha256 = "sha256-DPFLExCMWheI5IIa8aNz/ZggftJpxgOUIOYZZKBdvIc="; + sha256 = "sha256-QucUcLCzLPe/OpVyI8++Z+RFukNNRQ39imBaxZuH324="; }; nativeBuildInputs = [ From 7240fe89a449e9f8f3c4c7bce858875f36bcfc85 Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Sun, 12 Jun 2022 01:43:13 +0000 Subject: [PATCH 20/25] python310Packages.mkdocs-material: 8.3.3 -> 8.3.4 --- pkgs/development/python-modules/mkdocs-material/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/python-modules/mkdocs-material/default.nix b/pkgs/development/python-modules/mkdocs-material/default.nix index 1cdf9d883a7..326cffcd640 100644 --- a/pkgs/development/python-modules/mkdocs-material/default.nix +++ b/pkgs/development/python-modules/mkdocs-material/default.nix @@ -13,7 +13,7 @@ buildPythonApplication rec { pname = "mkdocs-material"; - version = "8.3.3"; + version = "8.3.4"; format = "setuptools"; disabled = pythonOlder "3.7"; @@ -22,7 +22,7 @@ buildPythonApplication rec { owner = "squidfunk"; repo = pname; rev = "refs/tags/${version}"; - hash = "sha256-4rJ1fKYIQli4j6x1/xipQeCXMfbILyroxrwbpcPGYiU="; + hash = "sha256-UQGszU1ICundexXSHMdDm15FjlnzK1ifuRn2M5fp1sA="; }; propagatedBuildInputs = [ From 4cb7a914b11b4db61181d1f9d5efb8cdf1c942c5 Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Sun, 12 Jun 2022 03:43:02 +0000 Subject: [PATCH 21/25] python310Packages.peaqevcore: 0.4.2 -> 0.4.7 --- pkgs/development/python-modules/peaqevcore/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/python-modules/peaqevcore/default.nix b/pkgs/development/python-modules/peaqevcore/default.nix index fb078bff61c..629e9b9de61 100644 --- a/pkgs/development/python-modules/peaqevcore/default.nix +++ b/pkgs/development/python-modules/peaqevcore/default.nix @@ -6,14 +6,14 @@ buildPythonPackage rec { pname = "peaqevcore"; - version = "0.4.2"; + version = "0.4.7"; format = "setuptools"; disabled = pythonOlder "3.7"; src = fetchPypi { inherit pname version; - hash = "sha256-s7vJ4rAOQPZBhCA8Q+ZJl6RBTBmP90XA9c6B/xwoHU0="; + hash = "sha256-DEK8vOWHv+O6zpzluUkhozsihhM9Ad2lOCEf4YnT+Yk="; }; postPatch = '' From 98fad5577ceafb12c647cfe00adfd2625fc2515f Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Sun, 12 Jun 2022 04:41:32 +0000 Subject: [PATCH 22/25] python310Packages.aioskybell: 22.6.0 -> 22.6.1 --- pkgs/development/python-modules/aioskybell/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/development/python-modules/aioskybell/default.nix b/pkgs/development/python-modules/aioskybell/default.nix index 67ef3c83db7..db2573fa959 100644 --- a/pkgs/development/python-modules/aioskybell/default.nix +++ b/pkgs/development/python-modules/aioskybell/default.nix @@ -11,7 +11,7 @@ buildPythonPackage rec { pname = "aioskybell"; - version = "22.6.0"; + version = "22.6.1"; format = "setuptools"; disabled = pythonOlder "3.9"; @@ -19,8 +19,8 @@ buildPythonPackage rec { src = fetchFromGitHub { owner = "tkdrob"; repo = pname; - rev = version; - hash = "sha256-2AsEVGZ4cA1GeoxtGFuvjZ05W4FjQ5GFSM8euu9iY4s=="; + rev = "refs/tags/${version}"; + hash = "sha256-VaG8r4ULbjI7LkIPCit3bILZgOi9k7ddRQXwVzplaCM="; }; propagatedBuildInputs = [ From 31d2556995c61190151e8bedffac5538efc42361 Mon Sep 17 00:00:00 2001 From: sudosubin Date: Sun, 12 Jun 2022 15:49:50 +0900 Subject: [PATCH 23/25] lefthook: 0.7.7 -> 0.8.0 --- .../version-management/git-and-tools/lefthook/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/applications/version-management/git-and-tools/lefthook/default.nix b/pkgs/applications/version-management/git-and-tools/lefthook/default.nix index bab5b5aa33d..a1d1448928b 100644 --- a/pkgs/applications/version-management/git-and-tools/lefthook/default.nix +++ b/pkgs/applications/version-management/git-and-tools/lefthook/default.nix @@ -2,13 +2,13 @@ buildGoModule rec { pname = "lefthook"; - version = "0.7.7"; + version = "0.8.0"; src = fetchFromGitHub { rev = "v${version}"; owner = "evilmartians"; repo = "lefthook"; - sha256 = "sha256-XyuXegCTJSW4uO6fEaRKq/jZnE+JbrxZw0kcDvhpsVo="; + sha256 = "sha256-ahkTxuBjMbvBzPuLtW7AhM2OUtL9Rw+ZqgnGGTkeCQQ="; }; vendorSha256 = "sha256-Rp67FnFU27u85t02MIs7wZQoOa8oGsHVVPQ9OdIyTJg="; From 961d7293b9cfe1971808db00b54d5e41558d11bc Mon Sep 17 00:00:00 2001 From: zowoq <59103226+zowoq@users.noreply.github.com> Date: Sun, 12 Jun 2022 19:05:10 +1000 Subject: [PATCH 24/25] lsd: 0.21.0 -> 0.22.0 https://github.com/Peltoche/lsd/releases/tag/0.22.0 --- pkgs/tools/misc/lsd/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/tools/misc/lsd/default.nix b/pkgs/tools/misc/lsd/default.nix index dc370b6a3e7..3568d785eec 100644 --- a/pkgs/tools/misc/lsd/default.nix +++ b/pkgs/tools/misc/lsd/default.nix @@ -9,16 +9,16 @@ rustPlatform.buildRustPackage rec { pname = "lsd"; - version = "0.21.0"; + version = "0.22.0"; src = fetchFromGitHub { owner = "Peltoche"; repo = pname; rev = version; - sha256 = "sha256-4pa8yJjUTO5MUDuljfU9Vo2ZjbsIwWJsJj6VVNfN25A="; + sha256 = "sha256-YeSEaamtIjip2nLBw/1/RSkr6ZL0p1GG2pHU14Ry6XU="; }; - cargoSha256 = "sha256-P0HJVp2ReJuLSZrArw/EAfLFDOZqswI0nD1SCHwegoE="; + cargoSha256 = "sha256-JsPGw5hjNy+yTZiSBeF05o9Zl6pYXxEI4kIDLY6Q54Q="; nativeBuildInputs = [ installShellFiles pandoc ]; postInstall = '' From e8c87f09460c565322f9ef05b781b31c4adcbdfd Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Vladim=C3=ADr=20=C4=8Cun=C3=A1t?= Date: Sun, 12 Jun 2022 13:45:06 +0200 Subject: [PATCH 25/25] Revert "metrics job: schedule on any machine, for now" --- pkgs/top-level/metrics.nix | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/pkgs/top-level/metrics.nix b/pkgs/top-level/metrics.nix index 6caec7327e5..d413b881eaa 100644 --- a/pkgs/top-level/metrics.nix +++ b/pkgs/top-level/metrics.nix @@ -4,8 +4,7 @@ with pkgs; runCommand "nixpkgs-metrics" { nativeBuildInputs = with pkgs.lib; map getBin [ nix time jq ]; - # see https://github.com/NixOS/nixpkgs/issues/52436 - #requiredSystemFeatures = [ "benchmark" ]; # dedicated `t2a` machine, by @vcunat + requiredSystemFeatures = [ "benchmark" ]; # dedicated `t2a` machine, by @vcunat } '' export NIX_STORE_DIR=$TMPDIR/store