Merge master into staging-next

This commit is contained in:
github-actions[bot] 2021-11-29 06:01:16 +00:00 committed by GitHub
commit be67219326
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
14 changed files with 42 additions and 44 deletions

View file

@ -32,6 +32,10 @@ jobs:
into: staging-next-21.05 into: staging-next-21.05
- from: staging-next-21.05 - from: staging-next-21.05
into: staging-21.05 into: staging-21.05
- from: release-21.11
into: staging-next-21.11
- from: staging-next-21.11
into: staging-21.11
name: ${{ matrix.pairs.from }} → ${{ matrix.pairs.into }} name: ${{ matrix.pairs.from }} → ${{ matrix.pairs.into }}
steps: steps:
- uses: actions/checkout@v2 - uses: actions/checkout@v2

View file

@ -12466,7 +12466,7 @@
githubId = 6016963; githubId = 6016963;
name = "Patrick Winter"; name = "Patrick Winter";
}; };
winterqt = { winter = {
email = "nixos@winter.cafe"; email = "nixos@winter.cafe";
github = "winterqt"; github = "winterqt";
githubId = 78392041; githubId = 78392041;

View file

@ -8,13 +8,13 @@
python3Packages.buildPythonApplication rec { python3Packages.buildPythonApplication rec {
pname = "vorta"; pname = "vorta";
version = "0.7.8"; version = "0.8.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "borgbase"; owner = "borgbase";
repo = "vorta"; repo = "vorta";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-qNBswy1dsCE6TEQLr/r7nnZWegDD8BD9pMkcpcuT7Q0="; sha256 = "sha256-ut4HCfLU/P22y5QbNakTV4d4CnFRxJvn+cnJ0ZGpTlw=";
}; };
nativeBuildInputs = [ wrapQtAppsHook ]; nativeBuildInputs = [ wrapQtAppsHook ];
@ -24,7 +24,6 @@ python3Packages.buildPythonApplication rec {
peewee peewee
pyqt5 pyqt5
python-dateutil python-dateutil
APScheduler
psutil psutil
qdarkstyle qdarkstyle
secretstorage secretstorage

View file

@ -10,13 +10,13 @@
stdenvNoCC.mkDerivation rec { stdenvNoCC.mkDerivation rec {
pname = "iterm2"; pname = "iterm2";
version = "3.4.13"; version = "3.4.14";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "gnachman"; owner = "gnachman";
repo = "iTerm2"; repo = "iTerm2";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-GOUdXBQCvM0oJ2/3zgKqDpfyCkHNwd1Qdopg5Mpyekg="; sha256 = "sha256-sDCnBO7xDpecu2cSjpHwync2DVsj9EKUmgpqEVLtxRM=";
}; };
patches = [ ./disable_updates.patch ]; patches = [ ./disable_updates.patch ];

View file

@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "glitter"; pname = "glitter";
version = "1.5.6"; version = "1.5.7";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "milo123459"; owner = "milo123459";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-RP/8E2wqEFArWrZ1nfDhTKt2Ak1bl6PhalaHcQobfTk="; sha256 = "sha256-0hKwGZingOa4nB9VTErbOTSBLc4pcxDUnK5lltVZiYk=";
}; };
cargoSha256 = "sha256-6OGkcTGKCMgxMFDJ625NeVmKjRRwiRkQdE+oXRN3FHw="; cargoSha256 = "sha256-08heeRIGzPmORh8KTyBx9GPfOZw2RR85PjkGvbaGA50=";
# tests require it to be in a git repository # tests require it to be in a git repository
preCheck = '' preCheck = ''

View file

@ -13,14 +13,14 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "pijul"; pname = "pijul";
version = "1.0.0-alpha.55"; version = "1.0.0-alpha.56";
src = fetchCrate { src = fetchCrate {
inherit version pname; inherit version pname;
sha256 = "sha256-1nnn0cdDe+WOetGtRe7dMEyuCcbfRHdJWFxQ4bTXebQ="; sha256 = "zV4F4dbjJ58yGiupUwj5Z0HrKR78Mzch8Zs98YfxSTQ=";
}; };
cargoSha256 = "sha256-j9xf97qPdhtakIwhAql0/Go5fPxlyWKAVLk5CMBfAbs="; cargoSha256 = "JQGBTCNu9U2Kq6tc7VT07LEbzLW+jdVWrK5e2qjzGRA=";
doCheck = false; doCheck = false;
nativeBuildInputs = [ pkg-config ]; nativeBuildInputs = [ pkg-config ];

View file

@ -235,7 +235,7 @@ let
homepage = "https://www.gnu.org/software/octave/"; homepage = "https://www.gnu.org/software/octave/";
license = lib.licenses.gpl3Plus; license = lib.licenses.gpl3Plus;
maintainers = with lib.maintainers; [ raskin doronbehar ]; maintainers = with lib.maintainers; [ raskin doronbehar ];
description = "Scientific Pragramming Language"; description = "Scientific Programming Language";
# https://savannah.gnu.org/bugs/?func=detailitem&item_id=56425 is the best attempt to fix JIT # https://savannah.gnu.org/bugs/?func=detailitem&item_id=56425 is the best attempt to fix JIT
broken = enableJIT; broken = enableJIT;
platforms = if overridePlatforms == null then platforms = if overridePlatforms == null then

View file

@ -4,21 +4,16 @@
stdenv.mkDerivation { stdenv.mkDerivation {
pname = "anura-engine"; pname = "anura-engine";
version = "unstable-2021-05-24"; version = "unstable-2021-11-23";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "anura-engine"; owner = "anura-engine";
repo = "anura"; repo = "anura";
rev = "ed50bbfa68a4aa09438d95d39103ec39156d438f"; rev = "816425df31624066e2815e26a25b1c5d3d355cb4";
sha256 = "0bk0qklk9wwx3jr2kbrmansccn1nj962v5n2vlb5hxsrcv96s3dg"; sha256 = "1k7fnfgz003gcbyygv4aakhkkz3w3z9nyz7dlwz01xa6122zqyir";
fetchSubmodules = true; fetchSubmodules = true;
}; };
postPatch = ''
substituteInPlace src/sys.cpp \
--replace mallinfo2 mallinfo
'';
nativeBuildInputs = [ nativeBuildInputs = [
which pkg-config which pkg-config
]; ];

View file

@ -1,10 +1,10 @@
{ buildPackages, fetchFromGitHub, perl, buildLinux, libelf, util-linux, ... } @ args: { buildPackages, fetchFromGitHub, perl, buildLinux, libelf, util-linux, ... } @ args:
buildLinux (args // rec { buildLinux (args // rec {
version = "4.14.165-172"; version = "4.14.180-176";
# modDirVersion needs to be x.y.z. # modDirVersion needs to be x.y.z.
modDirVersion = "4.14.165"; modDirVersion = "4.14.180";
# branchVersion needs to be x.y. # branchVersion needs to be x.y.
extraMeta.branch = "4.14"; extraMeta.branch = "4.14";
@ -13,7 +13,7 @@ buildLinux (args // rec {
owner = "hardkernel"; owner = "hardkernel";
repo = "linux"; repo = "linux";
rev = version; rev = version;
sha256 = "10ayqjjs2hxj1q7sb0mxa3gv75q28lznjha19rpxvig2fpi8015s"; sha256 = "0n7i7a2bkrm9p1wfr20h54cqm32fbjvwyn703r6zm1f6ivqhk43v";
}; };
defconfig = "odroidxu4_defconfig"; defconfig = "odroidxu4_defconfig";

View file

@ -1,4 +1,5 @@
#! @runtimeShell@ #! @runtimeShell@
# shellcheck shell=bash
if [ -x "@runtimeShell@" ]; then export SHELL="@runtimeShell@"; fi; if [ -x "@runtimeShell@" ]; then export SHELL="@runtimeShell@"; fi;
@ -132,7 +133,7 @@ if [[ -n "$SUDO_USER" || -n $remoteSudo ]]; then
maybeSudo=(sudo --preserve-env="$preservedSudoVars" --) maybeSudo=(sudo --preserve-env="$preservedSudoVars" --)
fi fi
if [ -z "$buildHost" -a -n "$targetHost" ]; then if [[ -z "$buildHost" && -n "$targetHost" ]]; then
buildHost="$targetHost" buildHost="$targetHost"
fi fi
if [ "$targetHost" = localhost ]; then if [ "$targetHost" = localhost ]; then
@ -217,8 +218,7 @@ nixBuild() {
} }
nixFlakeBuild() { nixFlakeBuild() {
if [[ -z "$buildHost" && -z "$targetHost" ]] && if [[ -z "$buildHost" && -z "$targetHost" && "$action" != switch && "$action" != boot ]]
! [ "$action" = switch -o "$action" = boot ]
then then
nix "${flakeFlags[@]}" build "$@" nix "${flakeFlags[@]}" build "$@"
readlink -f ./result readlink -f ./result
@ -273,7 +273,7 @@ if [ -z "$action" ]; then showSyntax; fi
# executed, so it's safe to run nixos-rebuild against a potentially # executed, so it's safe to run nixos-rebuild against a potentially
# untrusted tree. # untrusted tree.
canRun= canRun=
if [ "$action" = switch -o "$action" = boot -o "$action" = test ]; then if [[ "$action" = switch || "$action" = boot || "$action" = test ]]; then
canRun=1 canRun=1
fi fi
@ -377,7 +377,7 @@ trap cleanup EXIT
# First build Nix, since NixOS may require a newer version than the # First build Nix, since NixOS may require a newer version than the
# current one. # current one.
if [ -n "$rollback" -o "$action" = dry-build ]; then if [[ -n "$rollback" || "$action" = dry-build ]]; then
buildNix= buildNix=
fi fi
@ -411,7 +411,7 @@ if [[ -n $buildNix && -z $flake ]]; then
if ! nixStorePath="$(nix-instantiate --eval '<nixpkgs/nixos/modules/installer/tools/nix-fallback-paths.nix>' -A "$(nixSystem)" | sed -e 's/^"//' -e 's/"$//')"; then if ! nixStorePath="$(nix-instantiate --eval '<nixpkgs/nixos/modules/installer/tools/nix-fallback-paths.nix>' -A "$(nixSystem)" | sed -e 's/^"//' -e 's/"$//')"; then
nixStorePath="$(prebuiltNix "$(uname -m)")" nixStorePath="$(prebuiltNix "$(uname -m)")"
fi fi
if ! nix-store -r $nixStorePath --add-root $tmpDir/nix --indirect \ if ! nix-store -r "$nixStorePath" --add-root "${tmpDir}/nix" --indirect \
--option extra-binary-caches https://cache.nixos.org/; then --option extra-binary-caches https://cache.nixos.org/; then
echo "warning: don't know how to get latest Nix" >&2 echo "warning: don't know how to get latest Nix" >&2
fi fi
@ -464,7 +464,7 @@ fi
# current directory (for "build" and "test"). # current directory (for "build" and "test").
if [ -z "$rollback" ]; then if [ -z "$rollback" ]; then
echo "building the system configuration..." >&2 echo "building the system configuration..." >&2
if [ "$action" = switch -o "$action" = boot ]; then if [[ "$action" = switch || "$action" = boot ]]; then
if [[ -z $flake ]]; then if [[ -z $flake ]]; then
pathToConfig="$(nixBuild '<nixpkgs/nixos>' --no-out-link -A system "${extraBuildFlags[@]}")" pathToConfig="$(nixBuild '<nixpkgs/nixos>' --no-out-link -A system "${extraBuildFlags[@]}")"
else else
@ -472,7 +472,7 @@ if [ -z "$rollback" ]; then
fi fi
copyToTarget "$pathToConfig" copyToTarget "$pathToConfig"
targetHostCmd nix-env -p "$profile" --set "$pathToConfig" targetHostCmd nix-env -p "$profile" --set "$pathToConfig"
elif [ "$action" = test -o "$action" = build -o "$action" = dry-build -o "$action" = dry-activate ]; then elif [[ "$action" = test || "$action" = build || "$action" = dry-build || "$action" = dry-activate ]]; then
if [[ -z $flake ]]; then if [[ -z $flake ]]; then
pathToConfig="$(nixBuild '<nixpkgs/nixos>' -A system -k "${extraBuildFlags[@]}")" pathToConfig="$(nixBuild '<nixpkgs/nixos>' -A system -k "${extraBuildFlags[@]}")"
else else
@ -494,14 +494,14 @@ if [ -z "$rollback" ]; then
showSyntax showSyntax
fi fi
# Copy build to target host if we haven't already done it # Copy build to target host if we haven't already done it
if ! [ "$action" = switch -o "$action" = boot ]; then if ! [[ "$action" = switch || "$action" = boot ]]; then
copyToTarget "$pathToConfig" copyToTarget "$pathToConfig"
fi fi
else # [ -n "$rollback" ] else # [ -n "$rollback" ]
if [ "$action" = switch -o "$action" = boot ]; then if [[ "$action" = switch || "$action" = boot ]]; then
targetHostCmd nix-env --rollback -p "$profile" targetHostCmd nix-env --rollback -p "$profile"
pathToConfig="$profile" pathToConfig="$profile"
elif [ "$action" = test -o "$action" = build ]; then elif [[ "$action" = test || "$action" = build ]]; then
systemNumber=$( systemNumber=$(
targetHostCmd nix-env -p "$profile" --list-generations | targetHostCmd nix-env -p "$profile" --list-generations |
sed -n '/current/ {g; p;}; s/ *\([0-9]*\).*/\1/; h' sed -n '/current/ {g; p;}; s/ *\([0-9]*\).*/\1/; h'
@ -518,7 +518,7 @@ fi
# If we're not just building, then make the new configuration the boot # If we're not just building, then make the new configuration the boot
# default and/or activate it now. # default and/or activate it now.
if [ "$action" = switch -o "$action" = boot -o "$action" = test -o "$action" = dry-activate ]; then if [[ "$action" = switch || "$action" = boot || "$action" = test || "$action" = dry-activate ]]; then
if ! targetHostCmd "$pathToConfig/bin/switch-to-configuration" "$action"; then if ! targetHostCmd "$pathToConfig/bin/switch-to-configuration" "$action"; then
echo "warning: error(s) occurred while switching to the new configuration" >&2 echo "warning: error(s) occurred while switching to the new configuration" >&2
exit 1 exit 1
@ -526,9 +526,9 @@ if [ "$action" = switch -o "$action" = boot -o "$action" = test -o "$action" = d
fi fi
if [ "$action" = build-vm -o "$action" = build-vm-with-bootloader ]; then if [[ "$action" = build-vm || "$action" = build-vm-with-bootloader ]]; then
cat >&2 <<EOF cat >&2 <<EOF
Done. The virtual machine can be started by running $(echo $pathToConfig/bin/run-*-vm) Done. The virtual machine can be started by running $(echo "${pathToConfig}/bin/"run-*-vm)
EOF EOF
fi fi

View file

@ -16,7 +16,7 @@ rustPlatform.buildRustPackage rec {
description = "Fantastic (maybe) CLI for translating between bottom and human-readable text"; description = "Fantastic (maybe) CLI for translating between bottom and human-readable text";
homepage = "https://github.com/bottom-software-foundation/bottom-rs"; homepage = "https://github.com/bottom-software-foundation/bottom-rs";
license = licenses.mit; license = licenses.mit;
maintainers = with maintainers; [ winterqt ]; maintainers = with maintainers; [ winter ];
mainProgram = "bottomify"; mainProgram = "bottomify";
}; };
} }

View file

@ -38,7 +38,7 @@ stdenv.mkDerivation rec {
homepage = "https://github.com/jesec/libtorrent"; homepage = "https://github.com/jesec/libtorrent";
description = "A BitTorrent library written in C++ for *nix, with focus on high performance and good code (jesec's fork)"; description = "A BitTorrent library written in C++ for *nix, with focus on high performance and good code (jesec's fork)";
license = licenses.gpl2Plus; license = licenses.gpl2Plus;
maintainers = with maintainers; [ winterqt AndersonTorres ]; maintainers = with maintainers; [ winter AndersonTorres ];
platforms = platforms.linux; platforms = platforms.linux;
}; };
} }

View file

@ -59,7 +59,7 @@ stdenv.mkDerivation rec {
description = "An ncurses client for libtorrent, ideal for use with screen, tmux, or dtach (jesec's fork)"; description = "An ncurses client for libtorrent, ideal for use with screen, tmux, or dtach (jesec's fork)";
homepage = "https://github.com/jesec/rtorrent"; homepage = "https://github.com/jesec/rtorrent";
license = licenses.gpl2Plus; license = licenses.gpl2Plus;
maintainers = with maintainers; [ winterqt AndersonTorres ]; maintainers = with maintainers; [ winter AndersonTorres ];
platforms = platforms.linux; platforms = platforms.linux;
}; };
} }

View file

@ -9,16 +9,16 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "hck"; pname = "hck";
version = "0.7.0"; version = "0.7.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "sstadick"; owner = "sstadick";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-BP1B1FlN+9qpkqv4WfT7OSyPCb7K47uxJQKXAW1Kkck="; sha256 = "sha256-6PXhFOXWplj7yEyn7hOQSPS2YDGc1nxTs6wRseRvEVk=";
}; };
cargoSha256 = "sha256-Lp0VGt6z9mE8b9Fi6Fz3MjmHmbr9Az72D7BzOju9uOI="; cargoSha256 = "sha256-VAtvc8K4282twB1MRY72+dCky3JmrTRjOPx1Ft7Oqt8=";
nativeBuildInputs = [ cmake ]; nativeBuildInputs = [ cmake ];