Merge staging-next into staging

This commit is contained in:
github-actions[bot] 2023-10-21 00:02:49 +00:00 committed by GitHub
commit 613d60266a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
63 changed files with 443 additions and 137 deletions

View File

@ -11667,6 +11667,13 @@
githubId = 149558;
name = "Merlin Gaillard";
};
mirkolenz = {
name = "Mirko Lenz";
email = "mirko@mirkolenz.com";
matrix = "@mlenz:matrix.org";
github = "mirkolenz";
githubId = 5160954;
};
mirrexagon = {
email = "mirrexagon@mirrexagon.com";
github = "mirrexagon";

View File

@ -258,6 +258,8 @@
- Garage has been upgraded to 0.9.x. `services.garage.package` now needs to be explicitly set, so version upgrades can be done in a controlled fashion. For this, we expose `garage_x_y` attributes which can be set here.
- `voms` and `xrootd` now moves the `$out/etc` content to the `$etc` output instead of `$out/etc.orig`, when input argument `externalEtc` is not `null`.
- The `woodpecker-*` CI packages have been updated to 1.0.0. This release is wildly incompatible with the 0.15.X versions that were previously packaged. Please read [upstream's documentation](https://woodpecker-ci.org/docs/next/migrations#100) to learn how to update your CI configurations.
- The Caddy module gained a new option named `services.caddy.enableReload` which is enabled by default. It allows reloading the service instead of restarting it, if only a config file has changed. This option must be disabled if you have turned off the [Caddy admin API](https://caddyserver.com/docs/caddyfile/options#admin). If you keep this option enabled, you should consider setting [`grace_period`](https://caddyserver.com/docs/caddyfile/options#grace-period) to a non-infinite value to prevent Caddy from delaying the reload indefinitely.

View File

@ -69,7 +69,7 @@ in
#dialout = 27; # unused
polkituser = 28;
#utmp = 29; # unused
# ddclient = 30; # software removed
# ddclient = 30; # converted to DynamicUser = true
davfs2 = 31;
disnix = 33;
osgi = 34;
@ -394,7 +394,7 @@ in
dialout = 27;
#polkituser = 28; # currently unused, polkitd doesn't need a group
utmp = 29;
# ddclient = 30; # software removed
# ddclient = 30; # converted to DynamicUser = true
davfs2 = 31;
disnix = 33;
osgi = 34;

View File

@ -884,6 +884,7 @@
./services/networking/dae.nix
./services/networking/dante.nix
./services/networking/deconz.nix
./services/networking/ddclient.nix
./services/networking/dhcpcd.nix
./services/networking/dnscache.nix
./services/networking/dnscrypt-proxy2.nix

View File

@ -54,7 +54,6 @@ in
(mkRemovedOptionModule [ "services" "chronos" ] "The corresponding package was removed from nixpkgs.")
(mkRemovedOptionModule [ "services" "couchpotato" ] "The corresponding package was removed from nixpkgs.")
(mkRemovedOptionModule [ "services" "dd-agent" ] "dd-agent was removed from nixpkgs in favor of the newer datadog-agent.")
(mkRemovedOptionModule [ "services" "ddclient" ] "ddclient has been removed on the request of the upstream maintainer because it is unmaintained and has bugs. Please switch to a different software like `inadyn` or `knsupdate`.") # Added 2023-07-04
(mkRemovedOptionModule [ "services" "dnscrypt-proxy" ] "Use services.dnscrypt-proxy2 instead")
(mkRemovedOptionModule [ "services" "exhibitor" ] "The corresponding package was removed from nixpkgs.")
(mkRemovedOptionModule [ "services" "firefox" "syncserver" ] "The corresponding package was removed from nixpkgs.")

0
nixos/modules/services/misc/confd.nix Executable file → Normal file
View File

View File

@ -0,0 +1,234 @@
{ config, pkgs, lib, ... }:
let
cfg = config.services.ddclient;
boolToStr = bool: if bool then "yes" else "no";
dataDir = "/var/lib/ddclient";
StateDirectory = builtins.baseNameOf dataDir;
RuntimeDirectory = StateDirectory;
configFile' = pkgs.writeText "ddclient.conf" ''
# This file can be used as a template for configFile or is automatically generated by Nix options.
cache=${dataDir}/ddclient.cache
foreground=YES
use=${cfg.use}
login=${cfg.username}
password=${if cfg.protocol == "nsupdate" then "/run/${RuntimeDirectory}/ddclient.key" else "@password_placeholder@"}
protocol=${cfg.protocol}
${lib.optionalString (cfg.script != "") "script=${cfg.script}"}
${lib.optionalString (cfg.server != "") "server=${cfg.server}"}
${lib.optionalString (cfg.zone != "") "zone=${cfg.zone}"}
ssl=${boolToStr cfg.ssl}
wildcard=YES
quiet=${boolToStr cfg.quiet}
verbose=${boolToStr cfg.verbose}
${cfg.extraConfig}
${lib.concatStringsSep "," cfg.domains}
'';
configFile = if (cfg.configFile != null) then cfg.configFile else configFile';
preStart = ''
install --mode=600 --owner=$USER ${configFile} /run/${RuntimeDirectory}/ddclient.conf
${lib.optionalString (cfg.configFile == null) (if (cfg.protocol == "nsupdate") then ''
install --mode=600 --owner=$USER ${cfg.passwordFile} /run/${RuntimeDirectory}/ddclient.key
'' else if (cfg.passwordFile != null) then ''
"${pkgs.replace-secret}/bin/replace-secret" "@password_placeholder@" "${cfg.passwordFile}" "/run/${RuntimeDirectory}/ddclient.conf"
'' else ''
sed -i '/^password=@password_placeholder@$/d' /run/${RuntimeDirectory}/ddclient.conf
'')}
'';
in
with lib;
{
imports = [
(mkChangedOptionModule [ "services" "ddclient" "domain" ] [ "services" "ddclient" "domains" ]
(config:
let value = getAttrFromPath [ "services" "ddclient" "domain" ] config;
in optional (value != "") value))
(mkRemovedOptionModule [ "services" "ddclient" "homeDir" ] "")
(mkRemovedOptionModule [ "services" "ddclient" "password" ] "Use services.ddclient.passwordFile instead.")
(mkRemovedOptionModule [ "services" "ddclient" "ipv6" ] "")
];
###### interface
options = {
services.ddclient = with lib.types; {
enable = mkOption {
default = false;
type = bool;
description = lib.mdDoc ''
Whether to synchronise your machine's IP address with a dynamic DNS provider (e.g. dyndns.org).
'';
};
package = mkOption {
type = package;
default = pkgs.ddclient;
defaultText = lib.literalExpression "pkgs.ddclient";
description = lib.mdDoc ''
The ddclient executable package run by the service.
'';
};
domains = mkOption {
default = [ "" ];
type = listOf str;
description = lib.mdDoc ''
Domain name(s) to synchronize.
'';
};
username = mkOption {
# For `nsupdate` username contains the path to the nsupdate executable
default = lib.optionalString (config.services.ddclient.protocol == "nsupdate") "${pkgs.bind.dnsutils}/bin/nsupdate";
defaultText = "";
type = str;
description = lib.mdDoc ''
User name.
'';
};
passwordFile = mkOption {
default = null;
type = nullOr str;
description = lib.mdDoc ''
A file containing the password or a TSIG key in named format when using the nsupdate protocol.
'';
};
interval = mkOption {
default = "10min";
type = str;
description = lib.mdDoc ''
The interval at which to run the check and update.
See {command}`man 7 systemd.time` for the format.
'';
};
configFile = mkOption {
default = null;
type = nullOr path;
description = lib.mdDoc ''
Path to configuration file.
When set this overrides the generated configuration from module options.
'';
example = "/root/nixos/secrets/ddclient.conf";
};
protocol = mkOption {
default = "dyndns2";
type = str;
description = lib.mdDoc ''
Protocol to use with dynamic DNS provider (see https://sourceforge.net/p/ddclient/wiki/protocols).
'';
};
server = mkOption {
default = "";
type = str;
description = lib.mdDoc ''
Server address.
'';
};
ssl = mkOption {
default = true;
type = bool;
description = lib.mdDoc ''
Whether to use SSL/TLS to connect to dynamic DNS provider.
'';
};
quiet = mkOption {
default = false;
type = bool;
description = lib.mdDoc ''
Print no messages for unnecessary updates.
'';
};
script = mkOption {
default = "";
type = str;
description = lib.mdDoc ''
script as required by some providers.
'';
};
use = mkOption {
default = "web, web=checkip.dyndns.com/, web-skip='Current IP Address: '";
type = str;
description = lib.mdDoc ''
Method to determine the IP address to send to the dynamic DNS provider.
'';
};
verbose = mkOption {
default = false;
type = bool;
description = lib.mdDoc ''
Print verbose information.
'';
};
zone = mkOption {
default = "";
type = str;
description = lib.mdDoc ''
zone as required by some providers.
'';
};
extraConfig = mkOption {
default = "";
type = lines;
description = lib.mdDoc ''
Extra configuration. Contents will be added verbatim to the configuration file.
::: {.note}
`daemon` should not be added here because it does not work great with the systemd-timer approach the service uses.
:::
'';
};
};
};
###### implementation
config = mkIf config.services.ddclient.enable {
systemd.services.ddclient = {
description = "Dynamic DNS Client";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
restartTriggers = optional (cfg.configFile != null) cfg.configFile;
path = lib.optional (lib.hasPrefix "if," cfg.use) pkgs.iproute2;
serviceConfig = {
DynamicUser = true;
RuntimeDirectoryMode = "0700";
inherit RuntimeDirectory;
inherit StateDirectory;
Type = "oneshot";
ExecStartPre = "!${pkgs.writeShellScript "ddclient-prestart" preStart}";
ExecStart = "${lib.getExe cfg.package} -file /run/${RuntimeDirectory}/ddclient.conf";
};
};
systemd.timers.ddclient = {
description = "Run ddclient";
wantedBy = [ "timers.target" ];
timerConfig = {
OnBootSec = cfg.interval;
OnUnitInactiveSec = cfg.interval;
};
};
};
}

0
pkgs/applications/audio/soundwireserver/default.nix Executable file → Normal file
View File

View File

@ -10,16 +10,16 @@
}:
rustPlatform.buildRustPackage rec {
pname = "snarkos";
version = "2.1.7";
version = "2.2.1";
src = fetchFromGitHub {
owner = "AleoHQ";
repo = "snarkOS";
rev = "v${version}";
sha256 = "sha256-kW41SNbl2vckgUth+BZ6/aM03aT6MFeY4Hwi9OVWtTI=";
sha256 = "sha256-vEoEnjVjxVnjZ3Lya1qO2kOypNu07aYSlrSya5NJZzs=";
};
cargoHash = "sha256-znEAb4q9H0Doc+XYCf27hV/z2t74kjQUffl/aJzW6tI=";
cargoHash = "sha256-CVHvBqfcTqWBtLFcEcs9y/LmQ4gXjX+dfqqZSxN+33A=";
# buildAndTestSubdir = "cli";

0
pkgs/applications/editors/neovim/neovim-gtk.nix Executable file → Normal file
View File

View File

@ -49,10 +49,10 @@
}:
let
tzinfoVersion = "220816";
tzinfoVersion = "221202";
tzinfo = fetchurl {
url = "https://github.com/lat9nq/tzdb_to_nx/releases/download/${tzinfoVersion}/${tzinfoVersion}.zip";
hash = "sha256-yv8ykEYPu9upeXovei0u16iqQ7NasH6873KnQy4+KwI=";
hash = "sha256-mRzW+iIwrU1zsxHmf+0RArU8BShAoEMvCz+McXFFK3c=";
};
in stdenv.mkDerivation {
pname = "yuzu-${branch}";

View File

@ -1,19 +1,19 @@
# Generated by ./update.sh - do not update manually!
# Last updated: 2023-10-07
# Last updated: 2023-10-20
{
compatList = {
rev = "156a0a80efc47069ba3360f8a1b268a1c6f2f505";
rev = "9d17cbd71408476c6a28cbf0fa8177155c511681";
hash = "sha256:1hdsza3wf9a0yvj6h55gsl7xqvhafvbz1i8paz9kg7l49b0gnlh1";
};
mainline = {
version = "1579";
hash = "sha256:0689w42as1di8xbh8kq2p0cws8gdwq64zdj3i8wq612nkw0q5s60";
version = "1595";
hash = "sha256:09b0w6z4w9z4ms2pvik2vrmklfcx25jxcgs61bff3nflilnw9m97";
};
ea = {
version = "3911";
distHash = "sha256:0xj642kjhj0gp9l15b3ysj3gmyy47rcvzw9amghsfl13bg5ffnwh";
fullHash = "sha256:13rd6kwnhpvjzp67k6pqgl9fsqzwy5d8043hv6kd93gg8jbxkp38";
version = "3940";
distHash = "sha256:0g0vv274sh3iy56n7s324km87g302005ahi9zh2qhwkiirbnc811";
fullHash = "sha256:0ywppc4z5d4b1zl1cr8yfnba58hgi0z2szficwpinapai7q0pyid";
};
}

0
pkgs/applications/graphics/structorizer/default.nix Executable file → Normal file
View File

View File

@ -31,11 +31,11 @@ let
in
stdenv.mkDerivation (finalAttrs: rec {
pname = "blender";
version = "3.6.4";
version = "3.6.5";
src = fetchurl {
url = "https://download.blender.org/source/${pname}-${version}.tar.xz";
hash = "sha256-zFL0GRWAtNC3C+SAspWZmGa8US92EiYQgVfiOsCJRx4=";
hash = "sha256-QAHA/pn22HLsfH6VX4Sp7r25raFxAPS1Gergjez38kM=";
};
patches = [

0
pkgs/applications/misc/fluxboxlauncher/default.nix Executable file → Normal file
View File

View File

@ -11,13 +11,13 @@
perlPackages.buildPerlPackage rec {
pname = "get_iplayer";
version = "3.31";
version = "3.33";
src = fetchFromGitHub {
owner = "get-iplayer";
repo = "get_iplayer";
rev = "v${version}";
sha256 = "+ChCF27nmPKbqaZVxsZ6TlbzSdEz6RfMs87NE8xaSRw=";
hash = "sha256-cX+ydMvpQNFfQICRVKyhnB5gZkVnOMLPbGgdFymzmeA=";
};
nativeBuildInputs = [ makeWrapper ] ++ lib.optional stdenv.isDarwin shortenPerlShebang;
@ -32,10 +32,12 @@ perlPackages.buildPerlPackage rec {
installPhase = ''
runHook preInstall
mkdir -p $out/bin $out/share/man/man1
cp get_iplayer $out/bin
wrapProgram $out/bin/get_iplayer --suffix PATH : ${lib.makeBinPath [ atomicparsley ffmpeg ]} --prefix PERL5LIB : $PERL5LIB
cp get_iplayer.1 $out/share/man/man1
runHook postInstall
'';

View File

@ -19,18 +19,18 @@
stdenv.mkDerivation (finalAttrs: {
pname = "teams-for-linux";
version = "1.3.13";
version = "1.3.14";
src = fetchFromGitHub {
owner = "IsmaelMartinez";
repo = "teams-for-linux";
rev = "v${finalAttrs.version}";
hash = "sha256-WF2jWP6utopAMZPP/ZWOhqVGZJmACwHyLLE+HQaHJjg=";
hash = "sha256-2H7j8e2wPMd4cHXDKxSmyC2Ng/B3jb3/tGVTpUOU3XM=";
};
offlineCache = fetchYarnDeps {
yarnLock = "${finalAttrs.src}/yarn.lock";
hash = "sha256-vgjPGO5qa4IYfW1svClJ+wP/KtIFFd3P02T2sht69C8=";
hash = "sha256-zB6H14VAf13pAHQmsWC51d/qqyfRmAEbltyLD5ucG4Y=";
};
nativeBuildInputs = [ yarn fixup_yarn_lock nodejs copyDesktopItems makeWrapper ];

View File

0
pkgs/applications/science/biology/trimal/default.nix Executable file → Normal file
View File

0
pkgs/applications/science/biology/vcftools/default.nix Executable file → Normal file
View File

View File

@ -58,7 +58,7 @@
stdenv.mkDerivation rec {
pname = "root";
version = "6.28.06";
version = "6.28.08";
passthru = {
tests = import ./tests { inherit callPackage; };
@ -66,7 +66,7 @@ stdenv.mkDerivation rec {
src = fetchurl {
url = "https://root.cern.ch/download/root_v${version}.source.tar.gz";
hash = "sha256-rztnO5rKOTpcmuG/huqyZyqvGEG2WMXG56MKuTxYZTM=";
hash = "sha256-o+ZLTAH4fNm75X5h75a0FibkmwRGCVBw1B2b+6NSaGI=";
};
nativeBuildInputs = [ makeWrapper cmake pkg-config git ];

View File

@ -10,13 +10,13 @@ in
buildKodiBinaryAddon rec {
pname = "inputstream-adaptive";
namespace = "inputstream.adaptive";
version = "20.3.9";
version = "20.3.13";
src = fetchFromGitHub {
owner = "xbmc";
repo = "inputstream.adaptive";
rev = "${version}-${rel}";
sha256 = "sha256-Z5p/lw7qg6aacJ0eSqswaiwTOsUmuDbNlRRs51LdjRw=";
sha256 = "sha256-xvU+DcVEaQ/1sm6o21/6N1znCtzrct0qDhMxXGFZjL4=";
};
extraCMakeFlags = [

View File

@ -3,13 +3,13 @@
buildKodiAddon rec {
pname = "netflix";
namespace = "plugin.video.netflix";
version = "1.20.2";
version = "1.22.3";
src = fetchFromGitHub {
owner = "CastagnaIT";
repo = namespace;
rev = "v${version}";
sha256 = "sha256-k2O8a0P+TzQVoFQJkzmdqmkKh3Aj7OlsnuhJfUwxOmI=";
sha256 = "sha256-8NGj8n1p8euqYYdPDSeFh2ZE9lly5ThSmg69yXY3Te8=";
};
propagatedBuildInputs = [

View File

View File

@ -1,3 +1,4 @@
{ lib }:
# We provide three paths to get the credentials into the builder's
# environment:
#

View File

@ -1,7 +1,7 @@
{ stdenv, lib, haskellPackages, writeText, gawk }:
let
awk = "${gawk}/bin/awk";
dockerCredentialsFile = import ./credentials.nix;
dockerCredentialsFile = import ./credentials.nix { inherit lib; };
in
{ fetcher
, name

0
pkgs/data/fonts/vazir-fonts/default.nix Executable file → Normal file
View File

View File

@ -1,23 +1,21 @@
{ lib, stdenv, fetchurl, cmake, meson, ninja, pkg-config, python3
{ lib, stdenv, fetchurl, meson, ninja, pkg-config, python3
, libGLU, libepoxy, libX11, libdrm, mesa
}:
stdenv.mkDerivation rec {
pname = "virglrenderer";
version = "0.10.4";
version = "1.0.0";
src = fetchurl {
url = "https://gitlab.freedesktop.org/virgl/virglrenderer/-/archive/virglrenderer-${version}/virglrenderer-virglrenderer-${version}.tar.bz2";
sha256 = "sha256-qqvnko2sN4bdm9+F0PVjDW5FsiL5k3UAfjPSTqG+73c=";
url = "https://gitlab.freedesktop.org/virgl/virglrenderer/-/archive/${version}/virglrenderer-${version}.tar.bz2";
hash = "sha256-KMGPP2MeuATHFXKr5oW9HuFOMmmYpmkVLvMvQi0cEdg=";
};
separateDebugInfo = true;
buildInputs = [ libGLU libepoxy libX11 libdrm mesa ];
nativeBuildInputs = [ cmake meson ninja pkg-config python3 ];
dontUseCmakeConfigure = true;
nativeBuildInputs = [ meson ninja pkg-config python3 ];
meta = with lib; {
description = "A virtual 3D GPU library that allows a qemu guest to use the host GPU for accelerated 3D rendering";

View File

@ -5,13 +5,13 @@
stdenv.mkDerivation rec {
pname = "zlib-ng";
version = "2.1.3";
version = "2.1.4";
src = fetchFromGitHub {
owner = "zlib-ng";
repo = "zlib-ng";
rev = version;
hash = "sha256-DC4KPPaMuqML0HEhWJmWjyox4WEbExPDfNnpnWzoaHc=";
hash = "sha256-okNmobCVAC9y7tjZqFd0DBhOjs3WWRPK8jvK1j9G29k=";
};
outputs = [ "out" "dev" "bin" ];

View File

@ -1,7 +1,7 @@
{ lib, buildPecl, fetchFromGitHub }:
let
version = "1.0.0RC2";
version = "1.0.0RC3";
in buildPecl {
inherit version;
pname = "opentelemetry";
@ -10,7 +10,7 @@ in buildPecl {
owner = "open-telemetry";
repo = "opentelemetry-php-instrumentation";
rev = version;
hash = "sha256-sCsJ4ZmQXTTG+ZxDzw3b6Su/8QUAVZv7vV6SuLBET+0=";
hash = "sha256-0jHXl+Amjv0vLSuSWhkGAU25pkRXbJgdx02N6o2dUyw=";
};
sourceRoot = "source/ext";

View File

View File

@ -0,0 +1,39 @@
{ buildPythonPackage
, acme
, certbot
, dns-lexicon
, pytestCheckHook
, pythonOlder
}:
buildPythonPackage rec {
pname = "certbot-dns-ovh";
inherit (certbot) src version;
disabled = pythonOlder "3.6";
sourceRoot = "${src.name}/certbot-dns-ovh";
propagatedBuildInputs = [
acme
certbot
dns-lexicon
];
nativeCheckInputs = [
pytestCheckHook
];
pytestFlagsArray = [
"-o cache_dir=$(mktemp -d)"
# Monitor https://github.com/certbot/certbot/issues/9606 for a solution
"-W 'ignore:pkg_resources is deprecated as an API:DeprecationWarning'"
"-W 'ignore:Package lexicon.providers is deprecated and will be removed in Lexicon 4>=.:DeprecationWarning'"
"-W 'ignore:Legacy configuration object has been used to load the ConfigResolver.:DeprecationWarning'"
];
meta = certbot.meta // {
description = "OVH DNS Authenticator plugin for Certbot";
};
}

View File

@ -74,13 +74,13 @@ let
in buildPythonPackage rec {
pname = "gpaw";
version = "22.8.0";
version = "23.9.1";
src = fetchFromGitLab {
owner = "gpaw";
repo = pname;
rev = version;
hash = "sha256-Kgf8yuGua7mcGP+jVVmbE8JCsbrfzewRTRt3ihq9YX4=";
hash = "sha256-9nnK4ksTFATO6HexnxfMiih/yoY/noyJZXZOaDG/2kc=";
};
# `inetutils` is required because importing `gpaw`, as part of

View File

@ -7,12 +7,12 @@
}:
buildPythonPackage rec {
version = "0.5.12";
version = "0.5.13";
pname = "num2words";
src = fetchPypi {
inherit pname version;
hash = "sha256-fnwLDwgEBao6HdnTKxypCzvwO6sXuOVNsF4beDAaCYg=";
hash = "sha256-owZHFvu/kNdcRJRQzr+8c6ahPmOyUx0JvezDqxoiCc8=";
};
propagatedBuildInputs = [ docopt ];

0
pkgs/development/python-modules/osmnx/default.nix Executable file → Normal file
View File

View File

@ -16,14 +16,14 @@
buildPythonPackage rec {
pname = "persim";
version = "0.3.1";
version = "0.3.2";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
hash = "sha256-7w8KJHrc9hBOysFBF9sLJFgXEOqKjZZIFoBTlXALSXU=";
hash = "sha256-p6Vumfr+vRDr0D9PnEZItp9vNlCLIb59HpBg1KdyHGE=";
};
propagatedBuildInputs = [

0
pkgs/development/python-modules/streamlit/default.nix Executable file → Normal file
View File

View File

@ -13,16 +13,16 @@
buildPythonPackage rec {
pname = "vehicle";
version = "1.0.1";
version = "2.0.0";
format = "pyproject";
disabled = pythonOlder "3.10";
disabled = pythonOlder "3.11";
src = fetchFromGitHub {
owner = "frenck";
repo = "python-vehicle";
rev = "refs/tags/v${version}";
hash = "sha256-nN7efkN59FCCjCk3svYCTGGdvr2RSM5VektuUkHy3Vo=";
hash = "sha256-EbjrAfbqVY336RHBWq81KM+oHixen+38aUTnWZQ+nCs=";
};
nativeBuildInputs = [

0
pkgs/development/python-modules/zstandard/default.nix Executable file → Normal file
View File

View File

@ -2732,6 +2732,9 @@
"certbot-dns-inwx": [
"setuptools"
],
"certbot-dns-ovh": [
"setuptools"
],
"certbot-dns-rfc2136": [
"setuptools"
],

View File

@ -3,16 +3,16 @@
rustPlatform.buildRustPackage rec {
pname = "railway";
version = "3.4.0";
version = "3.5.0";
src = fetchFromGitHub {
owner = "railwayapp";
repo = "cli";
rev = "v${version}";
hash = "sha256-pydnIUqUBMLHonEGcvB+K+48QQYQuFfZxbAETJjU+3o=";
hash = "sha256-I32DC0hzVM/LCSqS878sZd+UYZ0NfBuzBgd9Aed/Sq0=";
};
cargoHash = "sha256-VgLQfUk1xeAwr9KUo1Vz4Ndw0FAnYGw3af0v3ueNPuA=";
cargoHash = "sha256-CYy0YEWK9sHAr0yFIH9yzxPnzG6x/EcE8ZLkueYgSiE=";
nativeBuildInputs = [ pkg-config ];

0
pkgs/misc/uq/default.nix Executable file → Normal file
View File

View File

@ -1,4 +1,4 @@
{
{ hostPlatform
}:
rec {
@ -65,7 +65,7 @@ rec {
*/
minimal-bootstrap-sources = derivation {
inherit name;
system = builtins.currentSystem;
system = hostPlatform.system;
outputHashMode = "recursive";
inherit outputHashAlgo outputHash;

View File

@ -12,12 +12,13 @@
#
{ lib
, hostPlatform
, fetchFromGitHub
, fetchpatch
}:
let
expected = import ./bootstrap-sources.nix { };
expected = import ./bootstrap-sources.nix { inherit hostPlatform; };
in
fetchFromGitHub {

View File

@ -10,12 +10,12 @@
buildGoModule rec {
pname = "oci-seccomp-bpf-hook";
version = "1.2.9";
version = "1.2.10";
src = fetchFromGitHub {
owner = "containers";
repo = "oci-seccomp-bpf-hook";
rev = "v${version}";
sha256 = "sha256-KPO9xqLgPML6smoO7P50yP81b4iCvRFIR74ciUiva7o=";
sha256 = "sha256-bWlm+JYNf7+faKSQfW5fhxoH/D2I8ujjakswH+1r49o=";
};
vendorHash = null;

View File

@ -13,11 +13,11 @@
stdenv.mkDerivation rec {
pname = "apache-httpd";
version = "2.4.57";
version = "2.4.58";
src = fetchurl {
url = "mirror://apache/httpd/httpd-${version}.tar.bz2";
sha256 = "sha256-28y4Su6V4JXt+7geXrkmzNJOatpV3Ng8rssmLlz5TSo=";
sha256 = "sha256-+hbXKgeCEKVMR91b7y+Lm4oB2UkJpRRTlWs+xkQupMU=";
};
# FIXME: -dev depends on -doc

View File

@ -15,26 +15,15 @@
stdenv.mkDerivation rec {
pname = "lighttpd";
version = "1.4.71";
version = "1.4.72";
src = fetchurl {
url = "https://download.lighttpd.net/lighttpd/releases-${lib.versions.majorMinor version}.x/${pname}-${version}.tar.xz";
sha256 = "sha256-uLaRXaIDlv3DVN8zJNXkQBabLl6nhZ46d1IThBMlr6w=";
sha256 = "sha256-98reTWm3VKB0jAFGPDPNi0VsqcwDuwnoWnG8vNVOVew=";
};
patches = [
# disable tests for des/md5, which we don't support any more
./disable-legacy-crypt-tests.patch
];
postPatch = ''
patchShebangs tests
# Linux sandbox has an empty hostname and not /etc/hosts, which fails some tests
sed -ire '/[$]self->{HOSTNAME} *=/i if(length($name)==0) { $name = "127.0.0.1" }' tests/LightyTest.pm
# it's difficult to prevent this test from trying to use /var/tmp (which
# the sandbox doesn't have) so until libredirect has support for mkstemp
# calls it's easiest to disable it
sed -i '/test_mod_ssi/d' src/t/test_mod.c
'';
depsBuildBuild = [ buildPackages.stdenv.cc ];

View File

@ -1,35 +0,0 @@
diff -uNr lighttpd-1.4.71.orig/tests/mod-fastcgi.t lighttpd-1.4.71.new/tests/mod-fastcgi.t
--- lighttpd-1.4.71.orig/tests/mod-fastcgi.t 2023-05-27 21:56:16.000000000 +0200
+++ lighttpd-1.4.71.new/tests/mod-fastcgi.t 2023-06-01 07:01:59.789873512 +0200
@@ -79,7 +79,7 @@
ok($tf->handle_http($t) == 0, 'FastCGI + bin-copy-environment');
SKIP: {
- skip "no crypt-des under openbsd or MS Visual Studio", 2 if $^O eq 'openbsd' || $tf->{'win32native'};
+ skip "no crypt-des", 2;
$t->{REQUEST} = ( <<EOF
GET /get-server-env.php?env=REMOTE_USER HTTP/1.0
diff -uNr lighttpd-1.4.71.orig/tests/request.t lighttpd-1.4.71.new/tests/request.t
--- lighttpd-1.4.71.orig/tests/request.t 2023-05-27 21:56:16.000000000 +0200
+++ lighttpd-1.4.71.new/tests/request.t 2023-06-01 07:02:39.855940048 +0200
@@ -1106,7 +1106,7 @@
ok($tf->handle_http($t) == 0, 'Basic-Auth: Valid Auth-token - plain');
SKIP: {
- skip "no crypt-des under openbsd or MS Visual Studio", 2 if $^O eq 'openbsd' || $tf->{'win32native'};
+ skip "no crypt-des", 2;
$t->{REQUEST} = ( <<EOF
GET /server-config HTTP/1.0
Host: auth-htpasswd.example.org
@@ -1163,9 +1163,7 @@
ok($tf->handle_http($t) == 0, 'Basic-Auth: Valid Auth-token - htpasswd (apr-md5, wrong password)');
SKIP: {
- skip "no crypt-md5 under cygwin", 1 if $^O eq 'cygwin';
- skip "no crypt-md5 under darwin", 1 if $^O eq 'darwin';
- skip "no crypt-md5 under openbsd",1 if $^O eq 'openbsd';
+ skip "no crypt-md5", 1;
$t->{REQUEST} = ( <<EOF
GET /server-config HTTP/1.0
Host: auth-htpasswd.example.org

View File

@ -23,7 +23,6 @@
let
phpPackage = php82.withExtensions ({ enabled, all }: enabled ++ [ all.memcached ]);
in phpPackage.buildComposerProject rec {
name = pname + "-" + version;
pname = "librenms";
version = "23.9.1";

0
pkgs/servers/unifi-video/default.nix Executable file → Normal file
View File

View File

@ -4,29 +4,31 @@
, libX11
, libXScrnSaver
}:
stdenv.mkDerivation rec {
stdenv.mkDerivation (finalAttrs: {
pname = "xssstate";
#
# Use the date of the last commit, since there were bug fixes after the 1.1
# release.
#
version = "unstable-2022-09-24";
version = "1.1-unstable-2022-09-24";
src = fetchgit {
url = "https://git.suckless.org/xssstate/";
rev = "5d8e9b49ce2970f786f1e5aa12bbaae83900453f";
hash = "sha256-Aor12tU1I/qNZCdBhZcvNK1FWFh0HYK8CEI29X5yoeA=";
};
makeFlags = [ "VERSION=${version}" ];
buildInputs = [
libX11
libXScrnSaver
];
installFlags = [ "PREFIX=$(out)" ];
buildInputs = [ libX11 libXScrnSaver ];
makeFlags = [
"PREFIX=${placeholder "out"}"
"VERSION=${finalAttrs.version}"
];
meta = with lib; {
description = "A simple tool to retrieve the X screensaver state";
license = licenses.mit;
maintainers = with maintainers; [ onemoresuza ];
platforms = platforms.linux;
mainProgram = "xssstate";
};
}
})

0
pkgs/tools/archivers/payload-dumper-go/default.nix Executable file → Normal file
View File

View File

@ -16,14 +16,14 @@ let
in
python.pkgs.buildPythonApplication rec {
pname = "esphome";
version = "2023.9.3";
version = "2023.10.1";
format = "setuptools";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "refs/tags/${version}";
hash = "sha256-SyXEiGh1/s9EJ0UPYC8R04JUYkCPhCtNUcGvVCycKGM=";
hash = "sha256-XKZYnZYXETv0UXrKtjQvDXyv8lwqfO19jc5Fs3KMhEY=";
};
postPatch = ''

0
pkgs/tools/misc/starfetch/default.nix Executable file → Normal file
View File

0
pkgs/tools/misc/szyszka/default.nix Executable file → Normal file
View File

View File

@ -0,0 +1,53 @@
{ lib, fetchFromGitHub, perlPackages, autoreconfHook, iproute2, perl, curl }:
let
myPerl = perl.withPackages (ps: [ ps.JSONPP ]);
in
perlPackages.buildPerlPackage rec {
pname = "ddclient";
version = "3.11.0_1";
outputs = [ "out" ];
src = fetchFromGitHub {
owner = "ddclient";
repo = "ddclient";
rev = "v${version}";
sha256 = "sha256-pl1kbzY5nUIvx1QiDdL9TP4vKtQnnv3RWklE4gbxXCw=";
};
postPatch = ''
touch Makefile.PL
'';
nativeBuildInputs = [ autoreconfHook ];
buildInputs = [ curl myPerl ];
# Prevent ddclient from picking up build time perl which is implicitly added
# by buildPerlPackage.
configureFlags = [
"--with-perl=${lib.getExe myPerl}"
];
installPhase = ''
runHook preInstall
install -Dm755 ddclient $out/bin/ddclient
install -Dm644 -t $out/share/doc/ddclient COP* README.* ChangeLog.md
runHook postInstall
'';
# TODO: run upstream tests
doCheck = false;
meta = with lib; {
description = "Client for updating dynamic DNS service entries";
homepage = "https://ddclient.net/";
license = licenses.gpl2Plus;
platforms = platforms.linux;
maintainers = with maintainers; [ bjornfor ];
mainProgram = "ddclient";
};
}

0
pkgs/tools/networking/ipfetch/default.nix Executable file → Normal file
View File

View File

@ -13,7 +13,8 @@
, zlib
# Configuration overridable with .override
# If not null, the builder will
# move "$out/etc" to "$out/etc.orig" and symlink "$out/etc" to externalEtc.
# create a new output "etc", move "$out/etc" to "$etc/etc"
# and symlink "$out/etc" to externalEtc.
, externalEtc ? "/etc"
}:
@ -46,7 +47,8 @@ stdenv.mkDerivation rec{
zlib
];
outputs = [ "bin" "out" "dev" "man" ];
outputs = [ "bin" "out" "dev" "man" ]
++ lib.optional (externalEtc != null) "etc";
preAutoreconf = ''
mkdir -p aux src/autogen
@ -65,13 +67,12 @@ stdenv.mkDerivation rec{
configureFlags = [
"--with-gsoap-wsdl2h=${gsoap}/bin/wsdl2h"
"--sysconfdir=${placeholder "out"}/etc"
];
postFixup = ''
${lib.optionalString (externalEtc != null) ''
mv "$out"/etc{,.orig}
ln -s ${lib.escapeShellArg externalEtc} "$out/etc"
''}
postFixup = lib.optionalString (externalEtc != null) ''
moveToOutput etc "$etc"
ln -s ${lib.escapeShellArg externalEtc} "$out/etc"
'';
meta = with lib; {

View File

@ -39,7 +39,8 @@ stdenv.mkDerivation (finalAttrs: {
hash = "sha256-SLmxv8opN7z4V07S9kLGo8HG7Ql62iZQLtf3zGemwA8=";
};
outputs = [ "bin" "out" "dev" "man" ];
outputs = [ "bin" "out" "dev" "man" ]
++ lib.optional (externalEtc != null) "etc";
passthru.fetchxrd = callPackage ./fetchxrd.nix { xrootd = finalAttrs.finalPackage; };
passthru.tests =
@ -118,7 +119,7 @@ stdenv.mkDerivation (finalAttrs: {
wrapProgram "$FILE" "''${makeWrapperArgs[@]}"
done < <(find "$bin/bin" -mindepth 1 -maxdepth 1 -type f,l -perm -a+x)
'' + lib.optionalString (externalEtc != null) ''
mv "$out"/etc{,.orig}
moveToOutput etc "$etc"
ln -s ${lib.escapeShellArg externalEtc} "$out/etc"
'';

View File

@ -8,11 +8,11 @@
stdenv.mkDerivation rec {
pname = "scrypt";
version = "1.3.1";
version = "1.3.2";
src = fetchurl {
url = "https://www.tarsnap.com/scrypt/${pname}-${version}.tgz";
sha256 = "1hnl0r6pmyxiy4dmafmqk1db7wpc0x9rqpzqcwr9d2cmghcj6byz";
sha256 = "sha256-1jLBGTQgrG+uv5SC5l4z06VmTszWQ7CaUJ0h0cHym+I=";
};
outputs = [ "out" "lib" "dev" ];

View File

@ -92,7 +92,6 @@ mapAliases ({
bird2 = bird; # Added 2022-02-21
bitwig-studio1 = throw "bitwig-studio1 has been removed, you can upgrade to 'bitwig-studio'"; # Added 2023-01-03
bitwig-studio2 = throw "bitwig-studio2 has been removed, you can upgrade to 'bitwig-studio'"; # Added 2023-01-03
ddclient = throw "ddclient has been removed on the request of the upstream maintainer because it is unmaintained and has bugs. Please switch to a different software like `inadyn` or `knsupdate`."; # Added 2023-07-04
bluezFull = throw "'bluezFull' has been renamed to/replaced by 'bluez'"; # Converted to throw 2023-09-10
boost168 = throw "boost168 has been deprecated in favor of the latest version"; # Added 2023-06-08
boost169 = throw "boost169 has been deprecated in favor of the latest version"; # Added 2023-06-08

View File

@ -7425,6 +7425,8 @@ with pkgs;
ddcutil = callPackage ../tools/misc/ddcutil { };
ddclient = callPackage ../tools/networking/ddclient { };
dd_rescue = callPackage ../tools/system/dd_rescue { };
ddh = callPackage ../tools/system/ddh { };
@ -20840,6 +20842,8 @@ with pkgs;
certbot-full = certbot.withPlugins (cp: with cp; [
certbot-dns-cloudflare
certbot-dns-google
certbot-dns-ovh
certbot-dns-rfc2136
certbot-dns-route53
]);
@ -28331,7 +28335,9 @@ with pkgs;
checkMeta = callPackage ../stdenv/generic/check-meta.nix { };
});
minimal-bootstrap-sources = callPackage ../os-specific/linux/minimal-bootstrap/stage0-posix/bootstrap-sources.nix { };
make-minimal-bootstrap-sources = callPackage ../os-specific/linux/minimal-bootstrap/stage0-posix/make-bootstrap-sources.nix { };
make-minimal-bootstrap-sources = callPackage ../os-specific/linux/minimal-bootstrap/stage0-posix/make-bootstrap-sources.nix {
inherit (stdenv) hostPlatform;
};
mingetty = callPackage ../os-specific/linux/mingetty { };
@ -28456,7 +28462,9 @@ with pkgs;
golint = callPackage ../development/tools/golint { };
golangci-lint = callPackage ../development/tools/golangci-lint { };
golangci-lint = callPackage ../development/tools/golangci-lint {
buildGoModule = buildGo121Module;
};
golangci-lint-langserver = callPackage ../development/tools/golangci-lint-langserver { };

View File

@ -1876,11 +1876,13 @@ self: super: with self; {
certbot-dns-cloudflare = callPackage ../development/python-modules/certbot-dns-cloudflare { };
certbot-dns-google = callPackage ../development/python-modules/certbot-dns-google { };
certbot-dns-inwx = callPackage ../development/python-modules/certbot-dns-inwx { };
certbot-dns-rfc2136 = callPackage ../development/python-modules/certbot-dns-rfc2136 { };
certbot-dns-ovh = callPackage ../development/python-modules/certbot-dns-ovh { };
certbot-dns-google = callPackage ../development/python-modules/certbot-dns-google { };
certbot-dns-rfc2136 = callPackage ../development/python-modules/certbot-dns-rfc2136 { };
certbot-dns-route53 = callPackage ../development/python-modules/certbot-dns-route53 { };