Merge master into staging-next

This commit is contained in:
github-actions[bot] 2022-01-29 06:01:08 +00:00 committed by GitHub
commit b898222283
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
16 changed files with 185 additions and 45 deletions

View file

@ -4474,7 +4474,7 @@
gordias = {
name = "Gordias";
email = "gordias@disroot.org";
github = "NotGordias";
github = "gordiasdot";
githubId = 94724133;
keys = [{
longkeyid = "ed25519/0x5D47284830FAA4FA";

View file

@ -88,7 +88,7 @@ let
requireSignedBinaryCaches = "require-sigs";
trustedUsers = "trusted-users";
allowedUsers = "allowed-users";
systemFeatures = "system-feature";
systemFeatures = "system-features";
};
semanticConfType = with types;

View file

@ -306,6 +306,9 @@ let
# The test cannot access the network, so any packages we
# need must be included in the VM.
system.extraDependencies = with pkgs; [
brotli
brotli.dev
brotli.lib
desktop-file-utils
docbook5
docbook_xsl_ns
@ -315,6 +318,7 @@ let
ntp
perlPackages.ListCompare
perlPackages.XMLLibXML
python3Minimal
shared-mime-info
sudo
texinfo

View file

@ -17,13 +17,13 @@
stdenv.mkDerivation rec {
pname = "reaper";
version = "6.43";
version = "6.46";
src = fetchurl {
url = "https://www.reaper.fm/files/${lib.versions.major version}.x/reaper${builtins.replaceStrings ["."] [""] version}_linux_${stdenv.hostPlatform.qemuArch}.tar.xz";
hash = {
x86_64-linux = "sha256-VQ91px9YZWbrw31fFQxS+H/6fsjkLDrYU6FtI8eSq6E=";
aarch64-linux = "sha256-x6z5+H7ASWiuNL0maNGK05VmJptHdFGRiFf6DgwlZDw=";
x86_64-linux = "sha256-cHjiO2hRK8gUaq2VfuE9GOtRJ0JyfH2rhdIbK+RxoEM=";
aarch64-linux = "sha256-j+05SdyDWzI1fekwwQ2RAGontEvppkUWPYfZEtOVXYg=";
}.${stdenv.hostPlatform.system};
};

View file

@ -11,11 +11,11 @@
stdenv.mkDerivation rec {
pname = "drawio";
version = "16.4.0";
version = "16.5.1";
src = fetchurl {
url = "https://github.com/jgraph/drawio-desktop/releases/download/v${version}/drawio-x86_64-${version}.rpm";
sha256 = "624f776478b6960adb1be565077f79aed72c95de5e995fc1216b78978c9c6857";
sha256 = "a8ebf2560820d2d05677b9b16fc863f555dde8235b3e34acd7916eee3544eaa9";
};
nativeBuildInputs = [

View file

@ -1,25 +1,31 @@
{ lib, stdenv, fetchurl
, perl, flex, bison, python3
{ lib, stdenv, fetchFromGitHub
, perl, flex, bison, python3, autoconf
}:
stdenv.mkDerivation rec {
pname = "verilator";
version = "4.210";
version = "4.218";
src = fetchurl {
url = "https://www.veripool.org/ftp/${pname}-${version}.tgz";
sha256 = "sha256-KoIfJeV2aITnwiB2eQgQo4ZyXfMe6erFiGKXezR+IBg=";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "v${version}";
sha256 = "sha256-FukC60z7Y3bb3I/dgzqCh6kFP6DDBOGi0M8IIZ50P3g=";
};
enableParallelBuilding = true;
buildInputs = [ perl ];
nativeBuildInputs = [ flex bison python3 ];
nativeBuildInputs = [ flex bison python3 autoconf ];
# these tests need some interpreter paths patched early on...
# see https://github.com/NixOS/nix/issues/1205
doCheck = false;
checkTarget = "test";
preConfigure = ''
autoconf
'';
postPatch = ''
patchShebangs \
src/flexfix \

View file

@ -1,18 +1,43 @@
{ lib, stdenv, fetchFromGitHub, git, gnupg, installShellFiles }:
{ lib
, stdenv
, resholvePackage
, fetchFromGitHub
, git
, bash
, openssl
, gawk
/*
TODO: yadm can use git-crypt and transcrypt
but it does so in a way that resholve 0.6.0
can't yet do anything smart about. It looks
like these are for interactive use, so the
main impact should just be that users still
need both of these packages in their profile
to support their use in yadm.
*/
# , git-crypt
# , transcrypt
, j2cli
, esh
, gnupg
, coreutils
, gnutar
, installShellFiles
, runCommand
, yadm
}:
stdenv.mkDerivation rec {
resholvePackage rec {
pname = "yadm";
version = "3.1.1";
buildInputs = [ git gnupg ];
nativeBuildInputs = [ installShellFiles ];
src = fetchFromGitHub {
owner = "TheLocehiliosan";
repo = "yadm";
rev = version;
sha256 = "sha256-bgiRBlqEjDq0gQ0+aUWpFDeE2piFX3Gy2gEAXgChAOk=";
hash = "sha256-bgiRBlqEjDq0gQ0+aUWpFDeE2piFX3Gy2gEAXgChAOk=";
};
dontConfigure = true;
@ -31,6 +56,72 @@ stdenv.mkDerivation rec {
--bash completion/bash/yadm
'';
solutions = {
yadm = {
scripts = [ "bin/yadm" ];
interpreter = "${bash}/bin/sh";
inputs = [
git
gnupg
openssl
gawk
# see head comment
# git-crypt
# transcrypt
j2cli
esh
bash
coreutils
gnutar
];
fake = {
external = if stdenv.isCygwin then [ ] else [ "cygpath" ];
};
fix = {
"$GPG_PROGRAM" = [ "gpg" ];
"$OPENSSL_PROGRAM" = [ "openssl" ];
"$GIT_PROGRAM" = [ "git" ];
"$AWK_PROGRAM" = [ "awk" ];
# see head comment
# "$GIT_CRYPT_PROGRAM" = [ "git-crypt" ];
# "$TRANSCRYPT_PROGRAM" = [ "transcrypt" ];
"$J2CLI_PROGRAM" = [ "j2" ];
"$ESH_PROGRAM" = [ "esh" ];
# not in nixpkgs (yet)
# "$ENVTPL_PROGRAM" = [ "envtpl" ];
# "$LSB_RELEASE_PROGRAM" = [ "lsb_release" ];
};
keep = {
"$YADM_COMMAND" = true; # internal cmds
"$template_cmd" = true; # dynamic, template-engine
"$SHELL" = true; # probably user env? unsure
"$hook_command" = true; # ~git hooks?
"exec" = [ "$YADM_BOOTSTRAP" ]; # yadm bootstrap script
# not in nixpkgs
"$ENVTPL_PROGRAM" = true;
"$LSB_RELEASE_PROGRAM" = true;
};
/*
TODO: these should be dropped as fast as they can be dealt
with properly in binlore and/or resholve.
*/
execer = [
"cannot:${j2cli}/bin/j2"
"cannot:${esh}/bin/esh"
"cannot:${git}/bin/git"
"cannot:${gnupg}/bin/gpg"
];
};
};
passthru.tests = {
minimal = runCommand "${pname}-test" {} ''
export HOME=$out
${yadm}/bin/yadm init
'';
};
meta = {
homepage = "https://github.com/TheLocehiliosan/yadm";
description = "Yet Another Dotfiles Manager";
@ -40,6 +131,7 @@ stdenv.mkDerivation rec {
* Provides a way to use alternate files on a specific OS or host.
* Supplies a method of encrypting confidential data so it can safely be stored in your repository.
'';
changelog = "https://github.com/TheLocehiliosan/yadm/blob/${version}/CHANGES";
license = lib.licenses.gpl3Plus;
maintainers = with lib.maintainers; [ abathur ];
platforms = lib.platforms.unix;

View file

@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "v2ray-geoip";
version = "202201200035";
version = "202201270031";
src = fetchFromGitHub {
owner = "v2fly";
repo = "geoip";
rev = "8d388b019028fb6fa9f0756b745331ffb9eb7c03";
sha256 = "sha256-ymXaDmmMucTuvJRqjJv6n22e7ONRt1awtOMABFJ+Y/w=";
rev = "236a5edc951685cf11d5fcbd08d82d74bd425f92";
sha256 = "sha256-y2hVSlfUwbbKpd2O8VBwTEL/djhXjd2XhBbDlmmqJCc=";
};
installPhase = ''

View file

@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "SDL2_ttf";
version = "2.0.15";
version = "2.0.18";
src = fetchurl {
url = "https://www.libsdl.org/projects/SDL_ttf/release/${pname}-${version}.tar.gz";
sha256 = "0cyd48dipc0m399qy8s03lci8b0bpiy8xlkvrm2ia7wcv0dfpv59";
sha256 = "sha256-cjTriINRTgGed0fHA+SndFdbGNQ1wipKKdBoy3aKIlE=";
};
configureFlags = lib.optional stdenv.isDarwin "--disable-sdltest";
@ -17,9 +17,9 @@ stdenv.mkDerivation rec {
++ lib.optional stdenv.isDarwin darwin.libobjc;
meta = with lib; {
description = "SDL TrueType library";
description = "Support for TrueType (.ttf) font files with Simple Directmedia Layer";
platforms = platforms.unix;
license = licenses.zlib;
homepage = "https://www.libsdl.org/projects/SDL_ttf/";
homepage = "https://github.com/libsdl-org/SDL_ttf";
};
}

View file

@ -17,15 +17,15 @@
rustPlatform.buildRustPackage rec {
pname = "deno";
version = "1.18.0";
version = "1.18.1";
src = fetchFromGitHub {
owner = "denoland";
repo = pname;
rev = "v${version}";
sha256 = "sha256-ov2zCINh4uH5pvhML1fgpnxFhWs680bdv9oqUESFkpw=";
sha256 = "sha256-YaQOYhnbzoLyMpEPYyGXdVTWKN8dvcpLcb++8HO51qQ=";
};
cargoSha256 = "sha256-qYz5p+3QNA/zir2M9/aWxKYOMYI01OsIWZCJ4njjFPc=";
cargoSha256 = "sha256-2+77mILB5vaiejeXJ75l5LedQ55ibq/nlEzxfbANvgI=";
# Install completions post-install
nativeBuildInputs = [ installShellFiles ];

View file

@ -0,0 +1,36 @@
{ lib
, stdenv
, fetchFromGitHub
, python3
}:
stdenv.mkDerivation rec {
pname = "lsirec";
version = "unstable-2019-03-03";
src = fetchFromGitHub {
owner = "marcan";
repo = "lsirec";
rev = "2dfb6dc92649feb01a3ddcfd117d4a99098084f2";
sha256 = "sha256-8v+KKjAJlJNpUT0poedRTQfPiDiwahrosXD35Bmh3jM=";
};
buildInputs = [ python3 ];
installPhase = ''
runHook preInstall
install -Dm755 'lsirec' "$out/bin/lsirec"
install -Dm755 'sbrtool.py' "$out/bin/sbrtool"
runHook postInstall
'';
meta = with lib; {
description = "LSI SAS2008/SAS2108 low-level recovery tool for Linux";
homepage = "https://github.com/marcan/lsirec";
platforms = platforms.linux;
license = licenses.bsd2;
maintainers = with maintainers; [ Luflosi ];
};
}

View file

@ -2,16 +2,16 @@
buildGoModule rec {
pname = "postgres_exporter";
version = "0.10.0";
version = "0.10.1";
src = fetchFromGitHub {
owner = "wrouesnel";
owner = "prometheus-community";
repo = "postgres_exporter";
rev = "v${version}";
sha256 = "sha256-QU/pPw0gOHF5SAET8S/v7nTPyEvBqkxwwGQ42PbQNvw=";
sha256 = "sha256-AH4nVwmNS4YtKxrWlFNqN+Q59TaSCGdoiCfpelPtJuM=";
};
vendorSha256 = "sha256-sSJjJR0wlW95I6bgzLKx4aVcqwKMRyzzWC4uz0BKLNY=";
vendorSha256 = "sha256-ST/Mc8RDEu2G6ufus8Gi7dwdBNIpaKJjn+Fw1AKCaXs=";
doCheck = true;

View file

@ -16,9 +16,9 @@ let
owner = "gravitational";
repo = "teleport";
rev = "v${version}";
sha256 = "sha256-02Wsj2V7RNjKlkgAqj7IqyRGCxml8pw5h0vflqcGAB8=";
sha256 = "sha256-/Dn2X1VMQI1OYHmvNDlAjrLI64DFxmVmS3PeEKLFVjQ=";
};
version = "8.0.6";
version = "8.1.1";
roleTester = rustPlatform.buildRustPackage {
name = "teleport-roletester";
@ -39,8 +39,8 @@ let
webassets = fetchFromGitHub {
owner = "gravitational";
repo = "webassets";
rev = "240464d54ac498281592eb0b30c871dc3c7ce09b";
sha256 = "sha256-8gt8x2fNh8mA1KCop5dEZmpBWBu7HsrTY5zVUlmKDgs=";
rev = "36ba49bb58dd6933d5ed5c9599e86d2b6c828137";
sha256 = "sha256-XgH+IjTsaJUdM54Y+L8Rf/bt6y0vB4t8IcRES2EG70s=";
};
in
buildGo117Module rec {

View file

@ -11,16 +11,16 @@
rustPlatform.buildRustPackage rec {
pname = "xh";
version = "0.14.1";
version = "0.15.0";
src = fetchFromGitHub {
owner = "ducaale";
repo = "xh";
rev = "v${version}";
sha256 = "sha256-zq1jpkMcq7WHc6weht2iEFMlxIJSoDreWqJCi8F+Lxs=";
sha256 = "sha256-+GiVehgU0g/rHeikSyACbTdCdpjHd8WxjkP+uxCylnY=";
};
cargoSha256 = "sha256-NcznWWMcgK4RixqvumPEQUlvIFRyYkbeTTGvjQ91ggE=";
cargoSha256 = "sha256-G3jaM6U7O+GLAiAbaWMIyh6Ksu4ypTK50s/RNe2wT3c=";
buildFeatures = lib.optional withNativeTls "native-tls";

View file

@ -34,7 +34,7 @@ let
boehmgc = boehmgc-nix;
aws-sdk-cpp = aws-sdk-cpp-nix;
};
in rec {
in lib.makeExtensible (self: {
nix_2_3 = (common rec {
version = "2.3.16";
src = fetchurl {
@ -63,7 +63,7 @@ in rec {
};
# FIXME: nix_2_6 is broken on aarch64-darwin for now.
stable = nix_2_5;
stable = self.nix_2_5;
unstable = lib.lowPrio (common rec {
version = "2.7";
@ -75,4 +75,4 @@ in rec {
sha256 = "sha256-aOM9MPNlnWNMobx4CuD4JIXH2poRlG8AKkuxY7FysWg=";
};
});
}
})

View file

@ -22622,6 +22622,8 @@ with pkgs;
lockdep = callPackage ../os-specific/linux/lockdep { };
lsirec = callPackage ../os-specific/linux/lsirec { };
lsiutil = callPackage ../os-specific/linux/lsiutil { };
kaitai-struct-compiler = callPackage ../development/compilers/kaitai-struct-compiler { };
@ -33143,11 +33145,11 @@ with pkgs;
neo = callPackage ../applications/misc/neo { };
nixVersions = callPackage ../tools/package-management/nix {
nixVersions = recurseIntoAttrs (callPackage ../tools/package-management/nix {
storeDir = config.nix.storeDir or "/nix/store";
stateDir = config.nix.stateDir or "/nix/var";
inherit (darwin.apple_sdk.frameworks) Security;
};
});
nix = nixVersions.stable;