Merge staging-next into staging

Changed files
+810 -204
maintainers
nixos
doc
manual
from_md
release-notes
release-notes
modules
services
databases
networking
tests
pkgs
applications
blockchains
erigon
emulators
citra
yuzu
misc
yambar
networking
cluster
argo-rollouts
cmctl
crc
k3s
kubergrunt
virtualization
development
interpreters
libraries
git2-cpp
python-modules
dnfile
dockerfile-parse
faraday-plugins
identify
jaconv
pytenable
tools
coder
package-project-cmake
ruff
rust
cargo-chef
games
BeatSaberModManager
os-specific
servers
http
apache-modules
mod_tile
monitoring
mqtt
nanomq
tools
misc
depotdownloader
star-history
vector
networking
mmsd-tng
netbird
package-management
nix-template
security
system
logrotate
text
mdbook-katex
virtualization
linode-cli
top-level
+6
maintainers/maintainer-list.nix
···
github = "kuwii";
githubId = 10705175;
+
kkharji = {
+
name = "kkharji";
+
email = "kkharji@protonmail.com";
+
github = "kkharji";
+
githubId = 65782666;
+
};
melias122 = {
name = "Martin Elias";
email = "martin+nixpkgs@elias.sx";
+8
nixos/doc/manual/from_md/release-notes/rl-2305.section.xml
···
</listitem>
<listitem>
<para>
+
<link xlink:href="https://gitlab.com/kop316/mmsd">mmsd</link>,
+
a lower level daemon that transmits and recieves MMSes.
+
Available as
+
<link linkend="opt-services.mmsd.enable">services.mmsd</link>.
+
</para>
+
</listitem>
+
<listitem>
+
<para>
<link xlink:href="https://v2raya.org">v2rayA</link>, a Linux
web GUI client of Project V which supports V2Ray, Xray, SS,
SSR, Trojan and Pingtunnel. Available as
+2
nixos/doc/manual/release-notes/rl-2305.section.md
···
- [atuin](https://github.com/ellie/atuin), a sync server for shell history. Available as [services.atuin](#opt-services.atuin.enable).
+
- [mmsd](https://gitlab.com/kop316/mmsd), a lower level daemon that transmits and recieves MMSes. Available as [services.mmsd](#opt-services.mmsd.enable).
+
- [v2rayA](https://v2raya.org), a Linux web GUI client of Project V which supports V2Ray, Xray, SS, SSR, Trojan and Pingtunnel. Available as [services.v2raya](options.html#opt-services.v2raya.enable).
## Backward Incompatibilities {#sec-release-23.05-incompatibilities}
+2
nixos/modules/module-list.nix
···
./services/networking/miniupnpd.nix
./services/networking/miredo.nix
./services/networking/mjpg-streamer.nix
+
./services/networking/mmsd.nix
+
./services/networking/mosquitto.nix
./services/networking/monero.nix
./services/networking/morty.nix
./services/networking/mosquitto.nix
+172 -6
nixos/modules/services/databases/postgresql.nix
···
Name of the user to ensure.
'';
};
+
ensurePermissions = mkOption {
type = types.attrsOf types.str;
default = {};
···
"ALL TABLES IN SCHEMA public" = "ALL PRIVILEGES";
}
'';
+
};
+
+
ensureClauses = mkOption {
+
description = lib.mdDoc ''
+
An attrset of clauses to grant to the user. Under the hood this uses the
+
[ALTER USER syntax](https://www.postgresql.org/docs/current/sql-alteruser.html) for each attrName where
+
the attrValue is true in the attrSet:
+
`ALTER USER user.name WITH attrName`
+
'';
+
example = literalExpression ''
+
{
+
superuser = true;
+
createrole = true;
+
createdb = true;
+
}
+
'';
+
default = {};
+
defaultText = lib.literalMD ''
+
The default, `null`, means that the user created will have the default permissions assigned by PostgreSQL. Subsequent server starts will not set or unset the clause, so imperative changes are preserved.
+
'';
+
type = types.submodule {
+
options = let
+
defaultText = lib.literalMD ''
+
`null`: do not set. For newly created roles, use PostgreSQL's default. For existing roles, do not touch this clause.
+
'';
+
in {
+
superuser = mkOption {
+
type = types.nullOr types.bool;
+
description = lib.mdDoc ''
+
Grants the user, created by the ensureUser attr, superuser permissions. From the postgres docs:
+
+
A database superuser bypasses all permission checks,
+
except the right to log in. This is a dangerous privilege
+
and should not be used carelessly; it is best to do most
+
of your work as a role that is not a superuser. To create
+
a new database superuser, use CREATE ROLE name SUPERUSER.
+
You must do this as a role that is already a superuser.
+
+
More information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)
+
'';
+
default = null;
+
inherit defaultText;
+
};
+
createrole = mkOption {
+
type = types.nullOr types.bool;
+
description = lib.mdDoc ''
+
Grants the user, created by the ensureUser attr, createrole permissions. From the postgres docs:
+
+
A role must be explicitly given permission to create more
+
roles (except for superusers, since those bypass all
+
permission checks). To create such a role, use CREATE
+
ROLE name CREATEROLE. A role with CREATEROLE privilege
+
can alter and drop other roles, too, as well as grant or
+
revoke membership in them. However, to create, alter,
+
drop, or change membership of a superuser role, superuser
+
status is required; CREATEROLE is insufficient for that.
+
+
More information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)
+
'';
+
default = null;
+
inherit defaultText;
+
};
+
createdb = mkOption {
+
type = types.nullOr types.bool;
+
description = lib.mdDoc ''
+
Grants the user, created by the ensureUser attr, createdb permissions. From the postgres docs:
+
+
A role must be explicitly given permission to create
+
databases (except for superusers, since those bypass all
+
permission checks). To create such a role, use CREATE
+
ROLE name CREATEDB.
+
+
More information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)
+
'';
+
default = null;
+
inherit defaultText;
+
};
+
"inherit" = mkOption {
+
type = types.nullOr types.bool;
+
description = lib.mdDoc ''
+
Grants the user created inherit permissions. From the postgres docs:
+
+
A role is given permission to inherit the privileges of
+
roles it is a member of, by default. However, to create a
+
role without the permission, use CREATE ROLE name
+
NOINHERIT.
+
+
More information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)
+
'';
+
default = null;
+
inherit defaultText;
+
};
+
login = mkOption {
+
type = types.nullOr types.bool;
+
description = lib.mdDoc ''
+
Grants the user, created by the ensureUser attr, login permissions. From the postgres docs:
+
+
Only roles that have the LOGIN attribute can be used as
+
the initial role name for a database connection. A role
+
with the LOGIN attribute can be considered the same as a
+
“database user”. To create a role with login privilege,
+
use either:
+
+
CREATE ROLE name LOGIN; CREATE USER name;
+
+
(CREATE USER is equivalent to CREATE ROLE except that
+
CREATE USER includes LOGIN by default, while CREATE ROLE
+
does not.)
+
+
More information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)
+
'';
+
default = null;
+
inherit defaultText;
+
};
+
replication = mkOption {
+
type = types.nullOr types.bool;
+
description = lib.mdDoc ''
+
Grants the user, created by the ensureUser attr, replication permissions. From the postgres docs:
+
+
A role must explicitly be given permission to initiate
+
streaming replication (except for superusers, since those
+
bypass all permission checks). A role used for streaming
+
replication must have LOGIN permission as well. To create
+
such a role, use CREATE ROLE name REPLICATION LOGIN.
+
+
More information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)
+
'';
+
default = null;
+
inherit defaultText;
+
};
+
bypassrls = mkOption {
+
type = types.nullOr types.bool;
+
description = lib.mdDoc ''
+
Grants the user, created by the ensureUser attr, replication permissions. From the postgres docs:
+
+
A role must be explicitly given permission to bypass
+
every row-level security (RLS) policy (except for
+
superusers, since those bypass all permission checks). To
+
create such a role, use CREATE ROLE name BYPASSRLS as a
+
superuser.
+
+
More information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)
+
'';
+
default = null;
+
inherit defaultText;
+
};
+
};
+
};
};
};
});
···
$PSQL -tAc "SELECT 1 FROM pg_database WHERE datname = '${database}'" | grep -q 1 || $PSQL -tAc 'CREATE DATABASE "${database}"'
'') cfg.ensureDatabases}
'' + ''
-
${concatMapStrings (user: ''
-
$PSQL -tAc "SELECT 1 FROM pg_roles WHERE rolname='${user.name}'" | grep -q 1 || $PSQL -tAc 'CREATE USER "${user.name}"'
-
${concatStringsSep "\n" (mapAttrsToList (database: permission: ''
-
$PSQL -tAc 'GRANT ${permission} ON ${database} TO "${user.name}"'
-
'') user.ensurePermissions)}
-
'') cfg.ensureUsers}
+
${
+
concatMapStrings
+
(user:
+
let
+
userPermissions = concatStringsSep "\n"
+
(mapAttrsToList
+
(database: permission: ''$PSQL -tAc 'GRANT ${permission} ON ${database} TO "${user.name}"' '')
+
user.ensurePermissions
+
);
+
+
filteredClauses = filterAttrs (name: value: value != null) user.ensureClauses;
+
+
clauseSqlStatements = attrValues (mapAttrs (n: v: if v then n else "no${n}") filteredClauses);
+
+
userClauses = ''$PSQL -tAc 'ALTER ROLE "${user.name}" ${concatStringsSep " " clauseSqlStatements}' '';
+
in ''
+
$PSQL -tAc "SELECT 1 FROM pg_roles WHERE rolname='${user.name}'" | grep -q 1 || $PSQL -tAc 'CREATE USER "${user.name}"'
+
${userPermissions}
+
${userClauses}
+
''
+
)
+
cfg.ensureUsers
+
}
'';
serviceConfig = mkMerge [
+38
nixos/modules/services/networking/mmsd.nix
···
+
{ pkgs, lib, config, ... }:
+
with lib;
+
let
+
cfg = config.services.mmsd;
+
dbusServiceFile = pkgs.writeTextDir "share/dbus-1/services/org.ofono.mms.service" ''
+
[D-BUS Service]
+
Name=org.ofono.mms
+
SystemdService=dbus-org.ofono.mms.service
+
+
# Exec= is still required despite SystemdService= being used:
+
# https://github.com/freedesktop/dbus/blob/ef55a3db0d8f17848f8a579092fb05900cc076f5/test/data/systemd-activation/com.example.SystemdActivatable1.service
+
Exec=${pkgs.coreutils}/bin/false mmsd
+
'';
+
in
+
{
+
options.services.mmsd = {
+
enable = mkEnableOption (mdDoc "Multimedia Messaging Service Daemon");
+
extraArgs = mkOption {
+
type = with types; listOf str;
+
description = mdDoc "Extra arguments passed to `mmsd-tng`";
+
default = [];
+
example = ["--debug"];
+
};
+
};
+
config = mkIf cfg.enable {
+
services.dbus.packages = [ dbusServiceFile ];
+
systemd.user.services.mmsd = {
+
after = [ "ModemManager.service" ];
+
aliases = [ "dbus-org.ofono.mms.service" ];
+
serviceConfig = {
+
Type = "dbus";
+
ExecStart = "${pkgs.mmsd-tng}/bin/mmsdtng " + escapeShellArgs cfg.extraArgs;
+
BusName = "org.ofono.mms";
+
Restart = "on-failure";
+
};
+
};
+
};
+
}
+91 -2
nixos/tests/postgresql.nix
···
'';
};
+
+
mk-ensure-clauses-test = postgresql-name: postgresql-package: makeTest {
+
name = postgresql-name;
+
meta = with pkgs.lib.maintainers; {
+
maintainers = [ zagy ];
+
};
+
+
machine = {...}:
+
{
+
services.postgresql = {
+
enable = true;
+
package = postgresql-package;
+
ensureUsers = [
+
{
+
name = "all-clauses";
+
ensureClauses = {
+
superuser = true;
+
createdb = true;
+
createrole = true;
+
"inherit" = true;
+
login = true;
+
replication = true;
+
bypassrls = true;
+
};
+
}
+
{
+
name = "default-clauses";
+
}
+
];
+
};
+
};
+
+
testScript = let
+
getClausesQuery = user: pkgs.lib.concatStringsSep " "
+
[
+
"SELECT row_to_json(row)"
+
"FROM ("
+
"SELECT"
+
"rolsuper,"
+
"rolinherit,"
+
"rolcreaterole,"
+
"rolcreatedb,"
+
"rolcanlogin,"
+
"rolreplication,"
+
"rolbypassrls"
+
"FROM pg_roles"
+
"WHERE rolname = '${user}'"
+
") row;"
+
];
+
in ''
+
import json
+
machine.start()
+
machine.wait_for_unit("postgresql")
+
+
with subtest("All user permissions are set according to the ensureClauses attr"):
+
clauses = json.loads(
+
machine.succeed(
+
"sudo -u postgres psql -tc \"${getClausesQuery "all-clauses"}\""
+
)
+
)
+
print(clauses)
+
assert clauses['rolsuper'], 'expected user with clauses to have superuser clause'
+
assert clauses['rolinherit'], 'expected user with clauses to have inherit clause'
+
assert clauses['rolcreaterole'], 'expected user with clauses to have create role clause'
+
assert clauses['rolcreatedb'], 'expected user with clauses to have create db clause'
+
assert clauses['rolcanlogin'], 'expected user with clauses to have login clause'
+
assert clauses['rolreplication'], 'expected user with clauses to have replication clause'
+
assert clauses['rolbypassrls'], 'expected user with clauses to have bypassrls clause'
+
+
with subtest("All user permissions default when ensureClauses is not provided"):
+
clauses = json.loads(
+
machine.succeed(
+
"sudo -u postgres psql -tc \"${getClausesQuery "default-clauses"}\""
+
)
+
)
+
assert not clauses['rolsuper'], 'expected user with no clauses set to have default superuser clause'
+
assert clauses['rolinherit'], 'expected user with no clauses set to have default inherit clause'
+
assert not clauses['rolcreaterole'], 'expected user with no clauses set to have default create role clause'
+
assert not clauses['rolcreatedb'], 'expected user with no clauses set to have default create db clause'
+
assert clauses['rolcanlogin'], 'expected user with no clauses set to have default login clause'
+
assert not clauses['rolreplication'], 'expected user with no clauses set to have default replication clause'
+
assert not clauses['rolbypassrls'], 'expected user with no clauses set to have default bypassrls clause'
+
+
machine.shutdown()
+
'';
+
};
in
-
(mapAttrs' (name: package: { inherit name; value=make-postgresql-test name package false;}) postgresql-versions) // {
+
concatMapAttrs (name: package: {
+
${name} = make-postgresql-test name package false;
+
${name + "-clauses"} = mk-ensure-clauses-test name package;
+
}) postgresql-versions
+
// {
postgresql_11-backup-all = make-postgresql-test "postgresql_11-backup-all" postgresql-versions.postgresql_11 true;
}
-
+2
pkgs/applications/blockchains/erigon/default.nix
···
"cmd/rlpdump"
];
+
passthru.updateScript = ./update.sh;
+
meta = with lib; {
homepage = "https://github.com/ledgerwatch/erigon/";
description = "Ethereum node implementation focused on scalability and modularity";
+2 -2
pkgs/applications/emulators/citra/update.sh
···
OLD_NIGHTLY_VERSION="$(getLocalVersion "citra-nightly")"
OLD_NIGHTLY_HASH="$(getLocalHash "citra-nightly")"
-
NEW_NIGHTLY_VERSION="$(curl -s ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} \
+
NEW_NIGHTLY_VERSION="$(curl -s ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} \
"https://api.github.com/repos/citra-emu/citra-nightly/releases?per_page=1" | jq -r '.[0].name' | cut -d"-" -f2 | cut -d" " -f2)"
if [[ "${OLD_NIGHTLY_VERSION}" = "${NEW_NIGHTLY_VERSION}" ]]; then
···
OLD_CANARY_VERSION="$(getLocalVersion "citra-canary")"
OLD_CANARY_HASH="$(getLocalHash "citra-canary")"
-
NEW_CANARY_VERSION="$(curl -s ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} \
+
NEW_CANARY_VERSION="$(curl -s ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} \
"https://api.github.com/repos/citra-emu/citra-canary/releases?per_page=1" | jq -r '.[0].name' | cut -d"-" -f2 | cut -d" " -f1)"
if [[ "${OLD_CANARY_VERSION}" = "${NEW_CANARY_VERSION}" ]]; then
+4 -4
pkgs/applications/emulators/yuzu/update.sh
···
oldHash="$(nix eval --raw -f "./default.nix" "$attribute".src.drvAttrs.outputHash)"
if [[ "$branch" = "mainline" ]]; then
-
newVersion="$(curl -s ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} "https://api.github.com/repos/yuzu-emu/yuzu-mainline/releases?per_page=1" \
+
newVersion="$(curl -s ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} "https://api.github.com/repos/yuzu-emu/yuzu-mainline/releases?per_page=1" \
| jq -r '.[0].name' | cut -d" " -f2)"
elif [[ "$branch" = "early-access" ]]; then
-
newVersion="$(curl -s ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} "https://api.github.com/repos/pineappleEA/pineapple-src/releases?per_page=2" \
+
newVersion="$(curl -s ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} "https://api.github.com/repos/pineappleEA/pineapple-src/releases?per_page=2" \
| jq -r '.[].tag_name' | grep '^EA-[0-9]*' | head -n1 | cut -d"-" -f2 | cut -d" " -f1)"
fi
···
updateCompatibilityList() {
local latestRevision oldUrl newUrl oldHash newHash oldDate newDate
-
latestRevision="$(curl -s ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} "https://api.github.com/repos/flathub/org.yuzu_emu.yuzu/commits/master" | jq -r '.sha')"
+
latestRevision="$(curl -s ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} "https://api.github.com/repos/flathub/org.yuzu_emu.yuzu/commits/master" | jq -r '.sha')"
oldUrl="$(sed -n '/yuzu-compat-list/,/url/p' "$DEFAULT_NIX" | tail -n1 | cut -d'"' -f2)"
newUrl="https://raw.githubusercontent.com/flathub/org.yuzu_emu.yuzu/${latestRevision}/compatibility_list.json"
oldDate="$(sed -n '/last updated.*/p' "$DEFAULT_NIX" | rev | cut -d' ' -f1 | rev)"
-
newDate="$(curl -s ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} "https://api.github.com/repos/flathub/org.yuzu_emu.yuzu/commits/${latestRevision}" \
+
newDate="$(curl -s ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} "https://api.github.com/repos/flathub/org.yuzu_emu.yuzu/commits/${latestRevision}" \
| jq -r '.commit.committer.date' | cut -d'T' -f1)"
oldHash="$(sed -n '/yuzu-compat-list/,/sha256/p' "$DEFAULT_NIX" | tail -n1 | cut -d'"' -f2)"
+20 -13
pkgs/applications/misc/yambar/default.nix
···
, stdenv
, fetchFromGitea
, alsa-lib
+
, bison
, fcft
+
, flex
, json_c
, libmpdclient
, libxcb
, libyaml
, meson
, ninja
+
, pipewire
, pixman
, pkg-config
+
, pulseaudio
, scdoc
, tllist
, udev
···
}:
let
-
# Courtesy of sternenseemann and FRidh
-
mesonFeatureFlag = feature: flag:
-
"-D${feature}=${if flag then "enabled" else "disabled"}";
+
inherit (lib) mesonEnable;
in
-
stdenv.mkDerivation rec {
+
assert (x11Support || waylandSupport);
+
stdenv.mkDerivation (finalAttrs: {
pname = "yambar";
-
version = "1.8.0";
+
version = "1.9.0";
src = fetchFromGitea {
domain = "codeberg.org";
owner = "dnkl";
repo = "yambar";
-
rev = version;
-
hash = "sha256-zXhIXT3JrVSllnYheDU2KK3NE2VYa+xuKufIXjdMFjU=";
+
rev = finalAttrs.version;
+
hash = "sha256-0bgRnZYLGWJ9PE62i04hPBcgzWyd30DK7AUuejSgta4=";
};
nativeBuildInputs = [
-
pkg-config
+
bison
+
flex
meson
ninja
+
pkg-config
scdoc
wayland-scanner
];
···
json_c
libmpdclient
libyaml
+
pipewire
pixman
+
pulseaudio
tllist
udev
] ++ lib.optionals (waylandSupport) [
···
mesonBuildType = "release";
mesonFlags = [
-
(mesonFeatureFlag "backend-x11" x11Support)
-
(mesonFeatureFlag "backend-wayland" waylandSupport)
+
(mesonEnable "backend-x11" x11Support)
+
(mesonEnable "backend-wayland" waylandSupport)
];
meta = with lib; {
homepage = "https://codeberg.org/dnkl/yambar";
-
changelog = "https://codeberg.org/dnkl/yambar/releases/tag/${version}";
+
changelog = "https://codeberg.org/dnkl/yambar/releases/tag/${finalAttrs.version}";
description = "Modular status panel for X11 and Wayland";
longDescription = ''
yambar is a lightweight and configurable status panel (bar, for short) for
···
'';
license = licenses.mit;
maintainers = with maintainers; [ AndersonTorres ];
-
platforms = with platforms; unix;
+
platforms = platforms.linux;
};
-
}
+
})
+2 -2
pkgs/applications/networking/cluster/argo-rollouts/default.nix
···
buildGoModule rec {
pname = "argo-rollouts";
-
version = "1.3.1";
+
version = "1.3.2";
src = fetchFromGitHub {
owner = "argoproj";
repo = "argo-rollouts";
rev = "v${version}";
-
sha256 = "sha256-qgOhiJdaxauHIoPsMfcdxwrKiv8QD/tFksCbk13Zpiw=";
+
sha256 = "sha256-hsUpZrtgjP6FaVhw0ijDTlvfz9Ok+A4nyAwi2VNxvEg=";
};
vendorSha256 = "sha256-gm96rQdQJGsIcxVgEI7sI7BvEETU/+HsQ6PnDjFXb/0=";
+3 -3
pkgs/applications/networking/cluster/cmctl/update.sh
···
CMCTL_PATH="$( cd -- "$(dirname "$0")" >/dev/null 2>&1 ; pwd -P )"
OLD_VERSION="$(nix-instantiate --eval -E "with import $NIXPKGS_PATH {}; cmctl.version or (builtins.parseDrvName cmctl.name).version" | tr -d '"')"
-
LATEST_TAG="$(curl -s ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} "https://api.github.com/repos/cert-manager/cert-manager/releases" | jq '.[].tag_name' --raw-output | sed '/-/d' | sort --version-sort -r | head -n 1)"
+
LATEST_TAG="$(curl -s ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} "https://api.github.com/repos/cert-manager/cert-manager/releases" | jq '.[].tag_name' --raw-output | sed '/-/d' | sort --version-sort -r | head -n 1)"
LATEST_VERSION="${LATEST_TAG:1}"
if [ ! "$OLD_VERSION" = "$LATEST_VERSION" ]; then
SHA256=$(nix-prefetch-url --quiet --unpack https://github.com/cert-manager/cert-manager/archive/refs/tags/${LATEST_TAG}.tar.gz)
-
TAG_SHA=$(curl -s ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} "https://api.github.com/repos/cert-manager/cert-manager/git/ref/tags/${LATEST_TAG}" | jq -r '.object.sha')
-
TAG_COMMIT_SHA=$(curl -s ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} "https://api.github.com/repos/cert-manager/cert-manager/git/tags/${TAG_SHA}" | jq '.object.sha' --raw-output)
+
TAG_SHA=$(curl -s ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} "https://api.github.com/repos/cert-manager/cert-manager/git/ref/tags/${LATEST_TAG}" | jq -r '.object.sha')
+
TAG_COMMIT_SHA=$(curl -s ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} "https://api.github.com/repos/cert-manager/cert-manager/git/tags/${TAG_SHA}" | jq '.object.sha' --raw-output)
setKV () {
sed -i "s|$1 = \".*\"|$1 = \"${2:-}\"|" "${CMCTL_PATH}/default.nix"
+2 -2
pkgs/applications/networking/cluster/crc/update.sh
···
cd ${NIXPKGS_CRC_FOLDER}
LATEST_TAG_RAWFILE=${WORKDIR}/latest_tag.json
-
curl --silent ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} \
+
curl --silent ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} \
https://api.github.com/repos/code-ready/crc/releases >${LATEST_TAG_RAWFILE}
LATEST_TAG_NAME=$(jq 'map(.tag_name)' ${LATEST_TAG_RAWFILE} |
···
CRC_VERSION=$(echo ${LATEST_TAG_NAME} | sed 's/^v//')
-
CRC_COMMIT=$(curl --silent ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} \
+
CRC_COMMIT=$(curl --silent ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} \
https://api.github.com/repos/code-ready/crc/tags |
jq -r "map(select(.name == \"${LATEST_TAG_NAME}\")) | .[0] | .commit.sha")
+2 -2
pkgs/applications/networking/cluster/k3s/update.sh
···
cd ${NIXPKGS_K3S_PATH}
LATEST_TAG_RAWFILE=${WORKDIR}/latest_tag.json
-
curl --silent ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} \
+
curl --silent ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} \
https://api.github.com/repos/k3s-io/k3s/releases > ${LATEST_TAG_RAWFILE}
LATEST_TAG_NAME=$(jq 'map(.tag_name)' ${LATEST_TAG_RAWFILE} | \
···
K3S_VERSION=$(echo ${LATEST_TAG_NAME} | sed 's/^v//')
-
K3S_COMMIT=$(curl --silent ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} \
+
K3S_COMMIT=$(curl --silent ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} \
https://api.github.com/repos/k3s-io/k3s/tags \
| jq -r "map(select(.name == \"${LATEST_TAG_NAME}\")) | .[0] | .commit.sha")
+2 -2
pkgs/applications/networking/cluster/kubergrunt/default.nix
···
buildGoModule rec {
pname = "kubergrunt";
-
version = "0.9.3";
+
version = "0.10.0";
src = fetchFromGitHub {
owner = "gruntwork-io";
repo = "kubergrunt";
rev = "v${version}";
-
sha256 = "sha256-nbpRdAkctLiG/hP6vhfEimplAzzj70d5nnaFcJ1NykY=";
+
sha256 = "sha256-HJZrE0fHlyOTQF9EqdrtQNmaHlrMA2RwNg4P7B2lYI0=";
};
vendorSha256 = "sha256-9hWX6INN5HWXyeFQRjkqr+BsGv56lInVYacvT6Imahw=";
+3 -3
pkgs/applications/virtualization/pods/default.nix
···
stdenv.mkDerivation rec {
pname = "pods";
-
version = "1.0.0-beta.9";
+
version = "1.0.0-rc.2";
src = fetchFromGitHub {
owner = "marhkb";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-cW6n00EPe7eFuqT2Vk27Ax0fxjz9kWSlYuS2oIj0mXY=";
+
sha256 = "sha256-fyhp0Qumku2EO+5+AaWBLp6xG9mpfNuxhr/PoLca1a4=";
};
cargoDeps = rustPlatform.fetchCargoTarball {
inherit src;
name = "${pname}-${version}";
-
sha256 = "sha256-y0njqlzAx1M7iC8bZrKlKACSiYnSRaHOrcAxs3bFF30=";
+
sha256 = "sha256-v6ZGDd1mAxb55JIijJHlthrTta2PwZMRa8MqVnJMyzQ=";
};
nativeBuildInputs = [
+1 -1
pkgs/development/interpreters/clojure/babashka.nix
···
set -euo pipefail
readonly latest_version="$(curl \
-
''${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} \
+
''${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} \
-s "https://api.github.com/repos/babashka/babashka/releases/latest" \
| jq -r '.tag_name')"
+1 -1
pkgs/development/interpreters/clojure/default.nix
···
# `jq -r '.[0].name'` results in `v0.0`
readonly latest_version="$(curl \
-
''${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} \
+
''${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} \
-s "https://api.github.com/repos/clojure/brew-install/tags" \
| jq -r '.[1].name')"
+30
pkgs/development/libraries/git2-cpp/default.nix
···
+
{ lib
+
, stdenv
+
, fetchFromGitHub
+
, cmake
+
}:
+
+
stdenv.mkDerivation (finalAttrs: {
+
pname = "git2-cpp";
+
version = "0.1.1";
+
+
src = fetchFromGitHub {
+
owner = "ken-matsui";
+
repo = "git2-cpp";
+
rev = finalAttrs.version;
+
hash = "sha256-2jKSQW6dUCIKtl33paSTuZdYAaYdFnILx/Gxv/ghFiI=";
+
};
+
+
nativeBuildInputs = [
+
cmake
+
];
+
+
meta = with lib; {
+
homepage = "https://github.com/ken-matsui/git2-cpp";
+
description = "libgit2 bindings for C++";
+
license = licenses.mit;
+
maintainers = with maintainers; [ ken-matsui ];
+
platforms = platforms.unix;
+
};
+
})
+
# TODO [ ken-matsui ]: tests
+2 -2
pkgs/development/python-modules/dnfile/default.nix
···
buildPythonPackage rec {
pname = "dnfile";
-
version = "0.12.0";
+
version = "0.13.0";
format = "setuptools";
disabled = pythonOlder "3.7";
···
owner = "malwarefrank";
repo = pname;
rev = "refs/tags/v${version}";
-
hash = "sha256-r3DupEyMEXOFeSDo9k0LmGM/TGMbbpVW7zCoUA4oG8Y=";
+
hash = "sha256-TH30gEoxXkaDac6hJsGQFWzwDeqzdZ19HK8i/3Dlh8k=";
fetchSubmodules = true;
};
+3 -7
pkgs/development/python-modules/dockerfile-parse/default.nix
···
{ lib
, buildPythonPackage
, fetchPypi
-
, six
, pytestCheckHook
, pythonOlder
}:
buildPythonPackage rec {
pname = "dockerfile-parse";
-
version = "1.2.0";
+
version = "2.0.0";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-B+Ze7DE5eOh32oGYVYcLOuR/P6yUpAqWW57eEEhNrMU=";
+
hash = "sha256-If59UQZC8rYamZ1Fw9l0X5UOEf5rokl1Vbj2N4K3jkU=";
};
-
propagatedBuildInputs = [
-
six
-
];
-
checkInputs = [
pytestCheckHook
];
···
meta = with lib; {
description = "Library for parsing Dockerfile files";
homepage = "https://github.com/DBuildService/dockerfile-parse";
+
changelog = "https://github.com/containerbuildsystem/dockerfile-parse/releases/tag/${version}";
license = licenses.bsd3;
maintainers = with maintainers; [ leenaars ];
};
+2 -2
pkgs/development/python-modules/faraday-plugins/default.nix
···
buildPythonPackage rec {
pname = "faraday-plugins";
-
version = "1.8.1";
+
version = "1.9.0";
format = "setuptools";
disabled = pythonOlder "3.7";
···
owner = "infobyte";
repo = "faraday_plugins";
rev = "refs/tags/${version}";
-
hash = "sha256-UnOIYYmOeBX22jQ4MkDxQKtSlxv+H/KOC83BZ39JA1E=";
+
hash = "sha256-ZWPImBqBpiz3y4OpDZLCfL3Oe/J+qP1Hduas3p0unCg=";
};
postPatch = ''
+2 -2
pkgs/development/python-modules/identify/default.nix
···
buildPythonPackage rec {
pname = "identify";
-
version = "2.5.9";
+
version = "2.5.10";
format = "setuptools";
disabled = pythonOlder "3.7";
···
owner = "pre-commit";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-5ISxzOTTlA1EcBO5N6YtBEah0SRehGeVIONj30zOKk0=";
+
sha256 = "sha256-4/p2m2A+0RDxQZHAJFSqk4x49bMWQo4R3aDOu3jI6FQ=";
};
checkInputs = [
+4 -3
pkgs/development/python-modules/jaconv/default.nix
···
buildPythonPackage rec {
pname = "jaconv";
-
version = "0.3";
+
version = "0.3.1";
format = "setuptools";
-
disabled = pythonOlder "3.6";
+
disabled = pythonOlder "3.7";
src = fetchFromGitHub {
owner = "ikegami-yukino";
repo = pname;
rev = "v${version}";
-
sha256 = "rityHi1JWWlV7+sAxNrlbcmfHmORZWrMZqXTRlsclhQ=";
+
hash = "sha256-uzGHvklFHVoNloZauczgITeHQIgYQAfI9cjLWgG/vyI=";
};
checkInputs = [
···
meta = with lib; {
description = "Python Japanese character interconverter for Hiragana, Katakana, Hankaku and Zenkaku";
homepage = "https://github.com/ikegami-yukino/jaconv";
+
changelog = "https://github.com/ikegami-yukino/jaconv/blob/v${version}/CHANGES.rst";
license = licenses.mit;
maintainers = with maintainers; [ fab ];
};
+2 -2
pkgs/development/python-modules/pytenable/default.nix
···
buildPythonPackage rec {
pname = "pytenable";
-
version = "1.4.10";
+
version = "1.4.11";
format = "setuptools";
disabled = pythonOlder "3.7";
···
owner = "tenable";
repo = "pyTenable";
rev = "refs/tags/${version}";
-
hash = "sha256-BNPfoKXDLUckj/yg1Gz806CS5CyjWvc/Hy/NwnuWfo0=";
+
hash = "sha256-GSEMjgG8Q+gzHQWRbXr/qiGP6U6ydPxu0JsD56mRNWU=";
};
propagatedBuildInputs = [
+2 -2
pkgs/development/tools/coder/default.nix
···
}:
buildGoModule rec {
pname = "coder";
-
version = "0.13.2";
+
version = "0.13.3";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "v${version}";
-
hash = "sha256-iuNTp+28tOggK3fgsa7yHmqXKz/zW/o47e5UKNppNWs=";
+
hash = "sha256-26RvDJ890MclDB4rtYQ7CcB3NQRXC7sI2cXd689Eq6E=";
};
# integration tests require network access
+45
pkgs/development/tools/package-project-cmake/default.nix
···
+
{ lib
+
, stdenvNoCC
+
, fetchFromGitHub
+
}:
+
+
stdenvNoCC.mkDerivation (finalAttrs: {
+
pname = "package-project-cmake";
+
version = "1.10.0";
+
+
src = fetchFromGitHub {
+
owner = "TheLartians";
+
repo = "PackageProject.cmake";
+
rev = "v${finalAttrs.version}";
+
hash = "sha256-tDjWknwqN8NLx6GX16WOn0JUDAyaGU9HA7fTsHNLx9s=";
+
};
+
+
dontConfigure = true;
+
dontBuild = true;
+
+
installPhase = ''
+
runHook preInstall
+
+
mkdir -p $out/share/{,doc/}package-project-cmake
+
install -Dm644 CMakeLists.txt $out/share/package-project-cmake/
+
install -Dm644 README.md $out/share/doc/package-project-cmake/
+
+
runHook postInstall
+
'';
+
+
meta = with lib; {
+
homepage = "https://github.com/TheLartians/PackageProject.cmake";
+
description = "A CMake script for packaging C/C++ projects";
+
longDescription = ''
+
Help other developers use your project. A CMake script for packaging
+
C/C++ projects for simple project installation while employing
+
best-practices for maximum compatibility. Creating installable
+
CMake scripts always requires a large amount of boilerplate code
+
to get things working. This small script should simplify the CMake
+
packaging process into a single, easy-to-use command.
+
'';
+
license = licenses.mit;
+
maintainers = with maintainers; [ ken-matsui ];
+
platforms = platforms.all;
+
};
+
})
+5 -7
pkgs/development/tools/ruff/default.nix
···
, rustPlatform
, fetchFromGitHub
, stdenv
-
, CoreServices
-
, Security
+
, darwin
}:
rustPlatform.buildRustPackage rec {
pname = "ruff";
-
version = "0.0.183";
+
version = "0.0.185";
src = fetchFromGitHub {
owner = "charliermarsh";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-xZSPRSqtf62BSfNw3eJEvsxqGBpy/v5DKWz6mipjsAY=";
+
sha256 = "sha256-L2NaBvSFy+x8mLxy7r0EQUKT4FE5JHaDkVjGiJ7HzTw=";
};
-
cargoSha256 = "sha256-s7IQtfcRvcLgvzep0Ya6i7+OfFlQwFNG67SQe5D0/Ec=";
+
cargoSha256 = "sha256-/L9xgSG9ydGbjth6tBkqnuIAu7UqP+0IAX8izW1ZAkg=";
buildInputs = lib.optionals stdenv.isDarwin [
-
CoreServices
-
Security
+
darwin.apple_sdk.frameworks.CoreServices
];
meta = with lib; {
+20
pkgs/development/tools/rust/cargo-chef/default.nix
···
+
{ lib, rustPlatform, fetchCrate }:
+
+
rustPlatform.buildRustPackage rec {
+
pname = "cargo-chef";
+
version = "0.1.50";
+
+
src = fetchCrate {
+
inherit pname version;
+
sha256 = "sha256-d467uk4UCtAKcpFYODxIhRrYoIOHzxhoaJVMA9ErRAw=";
+
};
+
+
cargoSha256 = "sha256-5xj4/uxuMhlqY1ncrMU1IFWdVB4ZjHVXg0ZbRXDvIak=";
+
+
meta = with lib; {
+
description = "A cargo-subcommand to speed up Rust Docker builds using Docker layer caching";
+
homepage = "https://github.com/LukeMathWalker/cargo-chef";
+
license = licenses.mit;
+
maintainers = with maintainers; [ kkharji ];
+
};
+
}
+7 -2
pkgs/games/BeatSaberModManager/default.nix
···
buildDotnetModule,
fetchFromGitHub,
+
dotnetCorePackages,
+
libX11,
libICE,
libSM,
···
buildDotnetModule rec {
pname = "BeatSaberModManager";
-
version = "0.0.2";
+
version = "0.0.4";
src = fetchFromGitHub {
owner = "affederaffe";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-6+9pWr8jJzs430Ai2ddh/2DK3C2bQA1e1+BNDrKhyzY=";
+
sha256 = "sha256-XeyOWg4Wa4hiorLPnbnBrLSjnxheAGGMPTqBleulDGw=";
fetchSubmodules = true; # It vendors BSIPA-Linux
};
···
runtimeIdentifier = dotnet-sdk.passthru.systemToDotnetRid targetPlatform.system;
})
];
+
+
dotnet-sdk = dotnetCorePackages.sdk_7_0;
+
dotnet-runtime = dotnetCorePackages.runtime_7_0;
nugetDeps = ./deps.nix;
+80 -32
pkgs/games/BeatSaberModManager/deps.nix
···
# Please dont edit it manually, your changes might get overwritten!
{ fetchNuGet }: [
-
(fetchNuGet { pname = "Avalonia"; version = "0.10.16"; sha256 = "1197xyswinazahjd8mhfsrjszhcv4mdj48c56bmdlcsf6zbpravz"; })
+
(fetchNuGet { pname = "Avalonia"; version = "11.0.0-preview4"; sha256 = "0s2ijp8fbny04c62gy8acg4n769hzj1pl9jml35bqrzk4m29jxs2"; })
(fetchNuGet { pname = "Avalonia.Angle.Windows.Natives"; version = "2.1.0.2020091801"; sha256 = "04jm83cz7vkhhr6n2c9hya2k8i2462xbf6np4bidk55as0jdq43a"; })
-
(fetchNuGet { pname = "Avalonia.Controls.DataGrid"; version = "0.10.16"; sha256 = "1xlg7r9r77fc9bcjw3rnnknncny7mcnkin6nwhg0sig4ab6givd2"; })
-
(fetchNuGet { pname = "Avalonia.Desktop"; version = "0.10.16"; sha256 = "09fg9j411kq0012wvix1bxiybif3pm1if624mwg4ng7w2z97dfl3"; })
-
(fetchNuGet { pname = "Avalonia.FreeDesktop"; version = "0.10.16"; sha256 = "1rxcbsbszgyb77gxp4zvg9k1cxw40vbm1z04dn5dqp4bfam9gnnh"; })
-
(fetchNuGet { pname = "Avalonia.Markup.Xaml.Loader"; version = "0.10.16"; sha256 = "10p93y3zr8aq8malahdllknk28afr0p2n7fz1c7hbhbkdpfjz01a"; })
-
(fetchNuGet { pname = "Avalonia.Native"; version = "0.10.16"; sha256 = "1m6cgql12rkzxxzvyxd1d0f5z2k4myby6d90li5p3nhblswx6jpk"; })
-
(fetchNuGet { pname = "Avalonia.ReactiveUI"; version = "0.10.16"; sha256 = "1cp1i07v1pkbff2qm046r1g517lw14q3vrli6f2k0i6aw7naay80"; })
-
(fetchNuGet { pname = "Avalonia.Remote.Protocol"; version = "0.10.16"; sha256 = "00iv96n2q2qg34zgqzcaja39396fbk8fj373d7zld46c64kf8g4h"; })
-
(fetchNuGet { pname = "Avalonia.Skia"; version = "0.10.16"; sha256 = "1rla042nc9mc36qnpipszrf0sffwi5d83cr9dmihpa015bby42pz"; })
-
(fetchNuGet { pname = "Avalonia.Win32"; version = "0.10.16"; sha256 = "171jv4hdi2r0wgmrjv8ajnjmwrf9j2d0g4ffyhhmmjnaclckgzgv"; })
-
(fetchNuGet { pname = "Avalonia.X11"; version = "0.10.16"; sha256 = "0yr8vkn59phlgcjkhzyygn2i3ghzhvd64sy84qyxxxyfm376cyxr"; })
-
(fetchNuGet { pname = "DryIoc.dll"; version = "5.1.0"; sha256 = "0vim3xmaajnvhwz01028lizjl2j0y2r2cbiwz0ga7n903pncrahw"; })
-
(fetchNuGet { pname = "DynamicData"; version = "7.9.4"; sha256 = "0mfmlsdd48dpwiphqhq8gsix2528mc6anp7rakd6vyzmig60f520"; })
-
(fetchNuGet { pname = "HarfBuzzSharp"; version = "2.8.2-preview.178"; sha256 = "1p5nwzl7jpypsd6df7hgcf47r977anjlyv21wacmalsj6lvdgnvn"; })
-
(fetchNuGet { pname = "HarfBuzzSharp.NativeAssets.Linux"; version = "2.8.2-preview.178"; sha256 = "1402ylkxbgcnagcarqlfvg4gppy2pqs3bmin4n5mphva1g7bqb2p"; })
-
(fetchNuGet { pname = "HarfBuzzSharp.NativeAssets.macOS"; version = "2.8.2-preview.178"; sha256 = "0p8miaclnbfpacc1jaqxwfg0yfx9byagi4j4k91d9621vd19i8b2"; })
-
(fetchNuGet { pname = "HarfBuzzSharp.NativeAssets.WebAssembly"; version = "2.8.2-preview.178"; sha256 = "1n9jay9sji04xly6n8bzz4591fgy8i65p21a8mv5ip9lsyj1c320"; })
-
(fetchNuGet { pname = "HarfBuzzSharp.NativeAssets.Win32"; version = "2.8.2-preview.178"; sha256 = "1r5syii96wv8q558cvsqw3lr10cdw6677lyiy82p6i3if51v3mr7"; })
+
(fetchNuGet { pname = "Avalonia.Controls.ColorPicker"; version = "11.0.0-preview4"; sha256 = "0dbbigfg5qqqgi16fglsqphg63ihl3hhpfw9f85ypvb5dfjimnq0"; })
+
(fetchNuGet { pname = "Avalonia.Controls.DataGrid"; version = "11.0.0-preview4"; sha256 = "10c1w7slmlkn1sjyk2y8awzlkd9rr35zpvwnvsv0i235zbqc3a07"; })
+
(fetchNuGet { pname = "Avalonia.Desktop"; version = "11.0.0-preview4"; sha256 = "1ccnfi429hah9qsl6qimkhlz6j29zjjpm77di14wnlr8x3nh19z0"; })
+
(fetchNuGet { pname = "Avalonia.Diagnostics"; version = "11.0.0-preview4"; sha256 = "1x8d46p9wxwrfhn4xcgx64x5y9dw08a7v54w8ms9ba58zr01bm74"; })
+
(fetchNuGet { pname = "Avalonia.FreeDesktop"; version = "11.0.0-preview4"; sha256 = "1ivrh736xxn3j1b64ni0wy7ydp22sbl2yv5kdircxknhb7bhpigd"; })
+
(fetchNuGet { pname = "Avalonia.Markup.Xaml.Loader"; version = "11.0.0-preview4"; sha256 = "16p0va19f83ccq493vxa8rvdgy71jsgijymb078bagk5nsm2alzs"; })
+
(fetchNuGet { pname = "Avalonia.Native"; version = "11.0.0-preview4"; sha256 = "0ia7zx7chgchh4piqp400cdpj14jndh313yh2z9nspqxq30xll46"; })
+
(fetchNuGet { pname = "Avalonia.ReactiveUI"; version = "11.0.0-preview4"; sha256 = "0qrv6ff3lgsqa57q5nrsmfzfp3w2x6d536xi3hq18616zjv7k1x4"; })
+
(fetchNuGet { pname = "Avalonia.Remote.Protocol"; version = "11.0.0-preview4"; sha256 = "1g8j7ll3q9k7v0j54j42dy1mkzkgs9rlyia0gjg3b7z5ilk0rbiz"; })
+
(fetchNuGet { pname = "Avalonia.Skia"; version = "11.0.0-preview4"; sha256 = "011flxwy9rnjlvwb1nvn9qlj0nfsr3f4gmvlzkg7abhwh7hzv3vi"; })
+
(fetchNuGet { pname = "Avalonia.Themes.Fluent"; version = "11.0.0-preview4"; sha256 = "07lkj6z4fy41i6fbnrzkb22z63czspcnfp5lz25qkvys37vkmhdm"; })
+
(fetchNuGet { pname = "Avalonia.Themes.Simple"; version = "11.0.0-preview4"; sha256 = "02cn71h91fxvw9knni2dxlhpf9ihdkq3r0mylvr8z7r493saiqkm"; })
+
(fetchNuGet { pname = "Avalonia.Win32"; version = "11.0.0-preview4"; sha256 = "1fqj7jv22ki9pim55hav8qfr01vhjkzdp5rdi1p22xxmgrxws5ws"; })
+
(fetchNuGet { pname = "Avalonia.X11"; version = "11.0.0-preview4"; sha256 = "0lmw94qp4y05xzxx6flzgsv4cw6mckcn8ig6mm8hdqpqqsiihc1n"; })
+
(fetchNuGet { pname = "DynamicData"; version = "7.9.5"; sha256 = "1m9qx8g6na5ka6kd9vhg8gjmxrnkzb6v5cl5yqp1kdjsw4rcwy6x"; })
+
(fetchNuGet { pname = "HarfBuzzSharp"; version = "2.8.2.1-preview.108"; sha256 = "0xs4px4fy5b6glc77rqswzpi5ddhxvbar1md6q9wla7hckabnq0z"; })
+
(fetchNuGet { pname = "HarfBuzzSharp.NativeAssets.Linux"; version = "2.8.2.1-preview.108"; sha256 = "16wvgvyra2g1b38rxxgkk85wbz89hspixs54zfcm4racgmj1mrj4"; })
+
(fetchNuGet { pname = "HarfBuzzSharp.NativeAssets.macOS"; version = "2.8.2.1-preview.108"; sha256 = "16v7lrwwif2f5zfkx08n6y6w3m56mh4hy757biv0w9yffaf200js"; })
+
(fetchNuGet { pname = "HarfBuzzSharp.NativeAssets.WebAssembly"; version = "2.8.2.1-preview.108"; sha256 = "15kqb353snwpavz3jja63mq8xjqsrw1f902scm8wxmsqrm5q6x55"; })
+
(fetchNuGet { pname = "HarfBuzzSharp.NativeAssets.Win32"; version = "2.8.2.1-preview.108"; sha256 = "0n6ymn9jqms3mk5hg0ar4y9jmh96myl6q0jimn7ahb1a8viq55k1"; })
(fetchNuGet { pname = "JetBrains.Annotations"; version = "10.3.0"; sha256 = "1grdx28ga9fp4hwwpwv354rizm8anfq4lp045q4ss41gvhggr3z8"; })
+
(fetchNuGet { pname = "MicroCom.Runtime"; version = "0.11.0"; sha256 = "0p9c3m0zk59x9dcqw077hzd2yk60myisbacvm36mnwpcjwzjkp2m"; })
+
(fetchNuGet { pname = "Microsoft.AspNetCore.App.Ref"; version = "6.0.11"; sha256 = "15n8x52njzxs2cwzzswi0kawm673jkvf2yga87jaf7hr729bfmcr"; })
+
(fetchNuGet { pname = "Microsoft.AspNetCore.App.Runtime.linux-arm64"; version = "6.0.11"; sha256 = "1pw25rnw5nm51wjdjbrhzhz9v0c8gjjqn2na2bam3c5xawvnqkqf"; })
+
(fetchNuGet { pname = "Microsoft.AspNetCore.App.Runtime.linux-x64"; version = "6.0.11"; sha256 = "0vd5da34frm7avrc9d16d39s2k5sgzd260j5pkjsianhpjby5rbn"; })
+
(fetchNuGet { pname = "Microsoft.CodeAnalysis.Analyzers"; version = "3.0.0"; sha256 = "0bbl0jpqywqmzz2gagld1p2gvdfldjfjmm25hil9wj2nq1zc4di8"; })
+
(fetchNuGet { pname = "Microsoft.CodeAnalysis.Common"; version = "3.8.0"; sha256 = "12n7rvr39bzkf2maw7zplw8rwpxpxss4ich3bb2pw770rx4nyvyw"; })
+
(fetchNuGet { pname = "Microsoft.CodeAnalysis.CSharp"; version = "3.8.0"; sha256 = "1kmry65csvfn72zzc16vj1nfbfwam28wcmlrk3m5rzb8ydbzgylb"; })
+
(fetchNuGet { pname = "Microsoft.CodeAnalysis.CSharp.Scripting"; version = "3.8.0"; sha256 = "0w0yx0lpg54iw5jazqk46h48gx43ij32gwac8iywdj6kxfxm03vw"; })
+
(fetchNuGet { pname = "Microsoft.CodeAnalysis.Scripting.Common"; version = "3.8.0"; sha256 = "0hjgxcsj5zy27lqk0986m59n5dbplx2vjjla2lsvg4bwg8qa7bpk"; })
+
(fetchNuGet { pname = "Microsoft.CSharp"; version = "4.3.0"; sha256 = "0gw297dgkh0al1zxvgvncqs0j15lsna9l1wpqas4rflmys440xvb"; })
(fetchNuGet { pname = "Microsoft.CSharp"; version = "4.5.0"; sha256 = "01i28nvzccxbqmiz217fxs6hnjwmd5fafs37rd49a6qp53y6623l"; })
+
(fetchNuGet { pname = "Microsoft.NETCore.App.Host.linux-arm64"; version = "6.0.11"; sha256 = "0k8nl3hnr8h0ljw185dyhavrz2f7x6wavyadyf7f1v289jzasj72"; })
+
(fetchNuGet { pname = "Microsoft.NETCore.App.Host.linux-x64"; version = "6.0.11"; sha256 = "0bnq4dj7s5mspi7f8ihpp2y4bncb229ihrcmxvifsbb15mlhh8g4"; })
+
(fetchNuGet { pname = "Microsoft.NETCore.App.Ref"; version = "6.0.11"; sha256 = "1j64ppdvh5s3pqr6sm3sq9bmk3fzj7l4j3bx023zn3dyllibpv68"; })
+
(fetchNuGet { pname = "Microsoft.NETCore.App.Runtime.linux-arm64"; version = "6.0.11"; sha256 = "03kvh4l5j8i8263wz7fmznzf5rs1grgazrhi3ayhynvhdal04mdk"; })
+
(fetchNuGet { pname = "Microsoft.NETCore.App.Runtime.linux-x64"; version = "6.0.11"; sha256 = "1f60dyl8pnj067i7bvmsbazcvrjkgrz9943vjj0ym49cfyq98cnw"; })
(fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "1.0.1"; sha256 = "01al6cfxp68dscl15z7rxfw9zvhm64dncsw09a1vmdkacsa2v6lr"; })
(fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "1.1.0"; sha256 = "08vh1r12g6ykjygq5d3vq09zylgb84l63k49jc4v8faw9g93iqqm"; })
-
(fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "2.0.0"; sha256 = "1fk2fk2639i7nzy58m9dvpdnzql4vb8yl8vr19r2fp8lmj9w2jr0"; })
+
(fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "2.1.2"; sha256 = "1507hnpr9my3z4w1r6xk5n0s1j3y6a2c2cnynj76za7cphxi1141"; })
(fetchNuGet { pname = "Microsoft.NETCore.Targets"; version = "1.0.1"; sha256 = "0ppdkwy6s9p7x9jix3v4402wb171cdiibq7js7i13nxpdky7074p"; })
(fetchNuGet { pname = "Microsoft.NETCore.Targets"; version = "1.1.0"; sha256 = "193xwf33fbm0ni3idxzbr5fdq3i2dlfgihsac9jj7whj0gd902nh"; })
-
(fetchNuGet { pname = "Microsoft.Win32.SystemEvents"; version = "4.5.0"; sha256 = "0fnkv3ky12227zqg4zshx4kw2mvysq2ppxjibfw02cc3iprv4njq"; })
-
(fetchNuGet { pname = "ReactiveUI"; version = "18.2.9"; sha256 = "156747759npb2dgsnd2y1bq2vnmmssizsz78kf80mr8pd60wlbj4"; })
+
(fetchNuGet { pname = "Microsoft.Win32.SystemEvents"; version = "6.0.0"; sha256 = "0c6pcj088g1yd1vs529q3ybgsd2vjlk5y1ic6dkmbhvrp5jibl9p"; })
+
(fetchNuGet { pname = "ReactiveUI"; version = "18.3.1"; sha256 = "1lxkc8yk9glj0w9n5vry2dnwwvh8152ad2c5bivk8aciq64zidyn"; })
+
(fetchNuGet { pname = "runtime.any.System.Collections"; version = "4.0.11"; sha256 = "1x44bm1cgv28zmrp095wf9mn8a6a0ivnzp9v14dcbhx06igxzgg0"; })
+
(fetchNuGet { pname = "runtime.any.System.Globalization"; version = "4.0.11"; sha256 = "0240rp66pi5bw1xklmh421hj7arwcdmjmgfkiq1cbc6nrm8ah286"; })
(fetchNuGet { pname = "runtime.any.System.IO"; version = "4.1.0"; sha256 = "0kasfkjiml2kk8prnyn1990nhsahnjggvqwszqjdsfwfl43vpcb5"; })
(fetchNuGet { pname = "runtime.any.System.Reflection"; version = "4.1.0"; sha256 = "06kcs059d5czyakx75rvlwa2mr86156w18fs7chd03f7084l7mq6"; })
+
(fetchNuGet { pname = "runtime.any.System.Reflection.Extensions"; version = "4.0.1"; sha256 = "05k34ijz9g9csh0vbbv3g3lrxl163izwcfncmbcl7k073h32rzkr"; })
(fetchNuGet { pname = "runtime.any.System.Reflection.Primitives"; version = "4.0.1"; sha256 = "1zxrpvixr5fqzkxpnin6g6gjq6xajy1snghz99ds2dwbhm276rhz"; })
+
(fetchNuGet { pname = "runtime.any.System.Resources.ResourceManager"; version = "4.0.1"; sha256 = "1jmgs7hynb2rff48623wnyb37558bbh1q28k9c249j5r5sgsr5kr"; })
(fetchNuGet { pname = "runtime.any.System.Runtime"; version = "4.1.0"; sha256 = "0mjr2bi7wvnkphfjqgkyf8vfyvy15a829jz6mivl6jmksh2bx40m"; })
+
(fetchNuGet { pname = "runtime.any.System.Runtime.Handles"; version = "4.0.1"; sha256 = "1kswgqhy34qvc49i981fk711s7knd6z13bp0rin8ms6axkh98nas"; })
+
(fetchNuGet { pname = "runtime.any.System.Runtime.InteropServices"; version = "4.1.0"; sha256 = "0gm8if0hcmp1qys1wmx4970k2x62pqvldgljsyzbjhiy5644vl8z"; })
(fetchNuGet { pname = "runtime.any.System.Text.Encoding"; version = "4.0.11"; sha256 = "0m4vgmzi1ky8xlj0r7xcyazxln3j9dlialnk6d2gmgrfnzf8f9m7"; })
(fetchNuGet { pname = "runtime.any.System.Threading.Tasks"; version = "4.0.11"; sha256 = "1qzdp09qs8br5qxzlm1lgbjn4n57fk8vr1lzrmli2ysdg6x1xzvk"; })
(fetchNuGet { pname = "runtime.native.System"; version = "4.0.0"; sha256 = "1ppk69xk59ggacj9n7g6fyxvzmk1g5p4fkijm0d7xqfkig98qrkf"; })
+
(fetchNuGet { pname = "runtime.native.System.Security.Cryptography"; version = "4.0.0"; sha256 = "0k57aa2c3b10wl3hfqbgrl7xq7g8hh3a3ir44b31dn5p61iiw3z9"; })
+
(fetchNuGet { pname = "runtime.unix.System.Diagnostics.Debug"; version = "4.0.11"; sha256 = "05ndbai4vpqrry0ghbfgqc8xblmplwjgndxmdn1zklqimczwjg2d"; })
(fetchNuGet { pname = "runtime.unix.System.Private.Uri"; version = "4.0.1"; sha256 = "0ic5dgc45jkhcr1g9xmmzjm7ffiw4cymm0fprczlx4fnww4783nm"; })
+
(fetchNuGet { pname = "runtime.unix.System.Runtime.Extensions"; version = "4.1.0"; sha256 = "0x1cwd7cvifzmn5x1wafvj75zdxlk3mxy860igh3x1wx0s8167y4"; })
(fetchNuGet { pname = "Serilog"; version = "2.10.0"; sha256 = "08bih205i632ywryn3zxkhb15dwgyaxbhmm1z3b5nmby9fb25k7v"; })
-
(fetchNuGet { pname = "Serilog.Sinks.File"; version = "5.0.0"; sha256 = "097rngmgcrdfy7jy8j7dq3xaq2qky8ijwg0ws6bfv5lx0f3vvb0q"; })
-
(fetchNuGet { pname = "SkiaSharp"; version = "2.88.1-preview.1"; sha256 = "1i1px67hcr9kygmbfq4b9nqzlwm7v2gapsp4isg9i19ax5g8dlhm"; })
-
(fetchNuGet { pname = "SkiaSharp.NativeAssets.Linux"; version = "2.88.1-preview.1"; sha256 = "1r9qr3civk0ws1z7hg322qyr8yjm10853zfgs03szr2lvdqiy7d1"; })
-
(fetchNuGet { pname = "SkiaSharp.NativeAssets.macOS"; version = "2.88.1-preview.1"; sha256 = "1w55nrwpl42psn6klia5a9aw2j1n25hpw2fdhchypm9f0v2iz24h"; })
-
(fetchNuGet { pname = "SkiaSharp.NativeAssets.WebAssembly"; version = "2.88.1-preview.1"; sha256 = "0mwj2yl4gn40lry03yqkj7sbi1drmm672dv88481sgah4c21lzrq"; })
-
(fetchNuGet { pname = "SkiaSharp.NativeAssets.Win32"; version = "2.88.1-preview.1"; sha256 = "1k50abd147pif9z9lkckbbk91ga1vv6k4skjz2n7wpll6fn0fvlv"; })
-
(fetchNuGet { pname = "Splat"; version = "14.3.4"; sha256 = "1j5riry4hc6gmw6zkwqq4fsw4rcddnb8kwyhnb321qp60z8v8pv4"; })
+
(fetchNuGet { pname = "Serilog.Sinks.File"; version = "5.0.1-dev-00947"; sha256 = "153vi3xjy65ixfr8nfs59n0bmgj0jxfyydmhjs8h3apr9f29lbh4"; })
+
(fetchNuGet { pname = "SkiaSharp"; version = "2.88.1"; sha256 = "0jpn0x1rfj3dzjfg972icml5swvzvr368nip269qq0a2z4xy0lhx"; })
+
(fetchNuGet { pname = "SkiaSharp.NativeAssets.Linux"; version = "2.88.1"; sha256 = "19f8f0m3d6xds2dggazafdk4i3injaxpx7ahg73nq8zj03qbg7fp"; })
+
(fetchNuGet { pname = "SkiaSharp.NativeAssets.macOS"; version = "2.88.1"; sha256 = "1img6chwxprz6bqjyi43walgb3xccnzgfxs29xwcvkkmc8w6pvdp"; })
+
(fetchNuGet { pname = "SkiaSharp.NativeAssets.WebAssembly"; version = "2.88.1"; sha256 = "0bvpwfdji8wb5f16hfzc62k265p21r172dqpibdx1gjd6w6phxrs"; })
+
(fetchNuGet { pname = "SkiaSharp.NativeAssets.Win32"; version = "2.88.1"; sha256 = "1x0ds2nnbqn44kfrfbvj055nihhmzlqm5fhdka3mgbj821fpy629"; })
+
(fetchNuGet { pname = "Splat"; version = "14.4.1"; sha256 = "03ycyjn2ii44npi015p4rk344xnjgdzz02cf63cmhx2ab8hv6p4b"; })
+
(fetchNuGet { pname = "StrongInject"; version = "1.4.5-ci-20220524-023137"; sha256 = "1ksiv5rs22j193sxwjvdc4vhblikka9z8hhs705f4mi1r4q0x1ha"; })
+
(fetchNuGet { pname = "System.Collections"; version = "4.3.0"; sha256 = "19r4y64dqyrq6k4706dnyhhw7fs24kpp3awak7whzss39dakpxk9"; })
+
(fetchNuGet { pname = "System.Collections.Immutable"; version = "5.0.0"; sha256 = "1kvcllagxz2q92g81zkz81djkn2lid25ayjfgjalncyc68i15p0r"; })
(fetchNuGet { pname = "System.ComponentModel.Annotations"; version = "4.5.0"; sha256 = "1jj6f6g87k0iwsgmg3xmnn67a14mq88np0l1ys5zkxhkvbc8976p"; })
-
(fetchNuGet { pname = "System.Drawing.Common"; version = "4.5.0"; sha256 = "0knqa0zsm91nfr34br8gx5kjqq4v81zdhqkacvs2hzc8nqk0ddhc"; })
+
(fetchNuGet { pname = "System.Diagnostics.Debug"; version = "4.3.0"; sha256 = "00yjlf19wjydyr6cfviaph3vsjzg3d5nvnya26i2fvfg53sknh3y"; })
+
(fetchNuGet { pname = "System.Drawing.Common"; version = "6.0.0"; sha256 = "02n8rzm58dac2np8b3xw8ychbvylja4nh6938l5k2fhyn40imlgz"; })
+
(fetchNuGet { pname = "System.Dynamic.Runtime"; version = "4.3.0"; sha256 = "1d951hrvrpndk7insiag80qxjbf2y0y39y8h5hnq9612ws661glk"; })
+
(fetchNuGet { pname = "System.Globalization"; version = "4.3.0"; sha256 = "1cp68vv683n6ic2zqh2s1fn4c2sd87g5hpp6l4d4nj4536jz98ki"; })
(fetchNuGet { pname = "System.IO"; version = "4.3.0"; sha256 = "05l9qdrzhm4s5dixmx68kxwif4l99ll5gqmh7rqgw554fx0agv5f"; })
+
(fetchNuGet { pname = "System.Linq"; version = "4.3.0"; sha256 = "1w0gmba695rbr80l1k2h4mrwzbzsyfl2z4klmpbsvsg5pm4a56s7"; })
+
(fetchNuGet { pname = "System.Linq.Expressions"; version = "4.3.0"; sha256 = "0ky2nrcvh70rqq88m9a5yqabsl4fyd17bpr63iy2mbivjs2nyypv"; })
(fetchNuGet { pname = "System.Memory"; version = "4.5.3"; sha256 = "0naqahm3wljxb5a911d37mwjqjdxv9l0b49p5dmfyijvni2ppy8a"; })
+
(fetchNuGet { pname = "System.Memory"; version = "4.5.4"; sha256 = "14gbbs22mcxwggn0fcfs1b062521azb9fbb7c113x0mq6dzq9h6y"; })
(fetchNuGet { pname = "System.Numerics.Vectors"; version = "4.5.0"; sha256 = "1kzrj37yzawf1b19jq0253rcs8hsq1l2q8g69d7ipnhzb0h97m59"; })
+
(fetchNuGet { pname = "System.ObjectModel"; version = "4.3.0"; sha256 = "191p63zy5rpqx7dnrb3h7prvgixmk168fhvvkkvhlazncf8r3nc2"; })
(fetchNuGet { pname = "System.Private.Uri"; version = "4.0.1"; sha256 = "0k57qhawjysm4cpbfpc49kl4av7lji310kjcamkl23bwgij5ld9j"; })
(fetchNuGet { pname = "System.Reactive"; version = "5.0.0"; sha256 = "1lafmpnadhiwxyd543kraxa3jfdpm6ipblxrjlibym9b1ykpr5ik"; })
(fetchNuGet { pname = "System.Reflection"; version = "4.3.0"; sha256 = "0xl55k0mw8cd8ra6dxzh974nxif58s3k1rjv1vbd7gjbjr39j11m"; })
(fetchNuGet { pname = "System.Reflection.Emit"; version = "4.3.0"; sha256 = "11f8y3qfysfcrscjpjym9msk7lsfxkk4fmz9qq95kn3jd0769f74"; })
(fetchNuGet { pname = "System.Reflection.Emit"; version = "4.7.0"; sha256 = "121l1z2ypwg02yz84dy6gr82phpys0njk7yask3sihgy214w43qp"; })
(fetchNuGet { pname = "System.Reflection.Emit.ILGeneration"; version = "4.3.0"; sha256 = "0w1n67glpv8241vnpz1kl14sy7zlnw414aqwj4hcx5nd86f6994q"; })
+
(fetchNuGet { pname = "System.Reflection.Emit.Lightweight"; version = "4.3.0"; sha256 = "0ql7lcakycrvzgi9kxz1b3lljd990az1x6c4jsiwcacrvimpib5c"; })
+
(fetchNuGet { pname = "System.Reflection.Extensions"; version = "4.3.0"; sha256 = "02bly8bdc98gs22lqsfx9xicblszr2yan7v2mmw3g7hy6miq5hwq"; })
+
(fetchNuGet { pname = "System.Reflection.Metadata"; version = "5.0.0"; sha256 = "17qsl5nanlqk9iz0l5wijdn6ka632fs1m1fvx18dfgswm258r3ss"; })
(fetchNuGet { pname = "System.Reflection.Primitives"; version = "4.3.0"; sha256 = "04xqa33bld78yv5r93a8n76shvc8wwcdgr1qvvjh959g3rc31276"; })
+
(fetchNuGet { pname = "System.Reflection.TypeExtensions"; version = "4.3.0"; sha256 = "0y2ssg08d817p0vdag98vn238gyrrynjdj4181hdg780sif3ykp1"; })
+
(fetchNuGet { pname = "System.Resources.ResourceManager"; version = "4.3.0"; sha256 = "0sjqlzsryb0mg4y4xzf35xi523s4is4hz9q4qgdvlvgivl7qxn49"; })
(fetchNuGet { pname = "System.Runtime"; version = "4.1.0"; sha256 = "02hdkgk13rvsd6r9yafbwzss8kr55wnj8d5c7xjnp8gqrwc8sn0m"; })
(fetchNuGet { pname = "System.Runtime"; version = "4.3.0"; sha256 = "066ixvgbf2c929kgknshcxqj6539ax7b9m570cp8n179cpfkapz7"; })
(fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.6.0"; sha256 = "0xmzi2gpbmgyfr75p24rqqsba3cmrqgmcv45lsqp5amgrdwd0f0m"; })
+
(fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.7.1"; sha256 = "119br3pd85lq8zcgh4f60jzmv1g976q1kdgi3hvqdlhfbw6siz2j"; })
+
(fetchNuGet { pname = "System.Runtime.Extensions"; version = "4.3.0"; sha256 = "1ykp3dnhwvm48nap8q23893hagf665k0kn3cbgsqpwzbijdcgc60"; })
+
(fetchNuGet { pname = "System.Runtime.Handles"; version = "4.3.0"; sha256 = "0sw2gfj2xr7sw9qjn0j3l9yw07x73lcs97p8xfc9w1x9h5g5m7i8"; })
+
(fetchNuGet { pname = "System.Runtime.InteropServices"; version = "4.3.0"; sha256 = "00hywrn4g7hva1b2qri2s6rabzwgxnbpw9zfxmz28z09cpwwgh7j"; })
(fetchNuGet { pname = "System.Security.Principal.Windows"; version = "4.7.0"; sha256 = "1a56ls5a9sr3ya0nr086sdpa9qv0abv31dd6fp27maqa9zclqq5d"; })
(fetchNuGet { pname = "System.Text.Encoding"; version = "4.3.0"; sha256 = "1f04lkir4iladpp51sdgmis9dj4y8v08cka0mbmsy0frc9a4gjqr"; })
+
(fetchNuGet { pname = "System.Text.Encoding.CodePages"; version = "4.5.1"; sha256 = "1z21qyfs6sg76rp68qdx0c9iy57naan89pg7p6i3qpj8kyzn921w"; })
+
(fetchNuGet { pname = "System.Threading"; version = "4.3.0"; sha256 = "0rw9wfamvhayp5zh3j7p1yfmx9b5khbf4q50d8k5rk993rskfd34"; })
(fetchNuGet { pname = "System.Threading.Tasks"; version = "4.3.0"; sha256 = "134z3v9abw3a6jsw17xl3f6hqjpak5l682k2vz39spj4kmydg6k7"; })
(fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.5.4"; sha256 = "0y6ncasgfcgnjrhynaf0lwpkpkmv4a07sswwkwbwb5h7riisj153"; })
(fetchNuGet { pname = "System.ValueTuple"; version = "4.5.0"; sha256 = "00k8ja51d0f9wrq4vv5z2jhq8hy31kac2rg0rv06prylcybzl8cy"; })
-
(fetchNuGet { pname = "ThisAssembly.AssemblyInfo"; version = "1.0.9"; sha256 = "0rvav885cq7ia5kzwp7d37c2azsg47988z2fn6ksi1q6y294crxm"; })
-
(fetchNuGet { pname = "ThisAssembly.Prerequisites"; version = "1.0.9"; sha256 = "1igi76li4c1iif71141jhn7x5w0ng1vmqj5ijjhdxz289n6wjf2g"; })
+
(fetchNuGet { pname = "ThisAssembly.AssemblyInfo"; version = "1.0.10"; sha256 = "1hvq0c9d6zmn1q6lyvz4hcaiypf1d65akhx70mv2plysbgvrcm95"; })
+
(fetchNuGet { pname = "ThisAssembly.Prerequisites"; version = "1.0.10"; sha256 = "112grp0xxkzfkhyxb1hbh4qs2d9qrkasv42himdkqjk0i0fg1ag0"; })
(fetchNuGet { pname = "Tmds.DBus"; version = "0.9.0"; sha256 = "0vvx6sg8lxm23g5jvm5wh2gfs95mv85vd52lkq7d1b89bdczczf3"; })
-
(fetchNuGet { pname = "XamlNameReferenceGenerator"; version = "1.3.4"; sha256 = "0w1bz5sr6y5fhgx1f54xyl8rx7y3kyf1fhacnd6akq8970zjdkdi"; })
+
(fetchNuGet { pname = "XamlNameReferenceGenerator"; version = "1.5.1"; sha256 = "11sld5a9z2rdglkykvylghka7y37ny18naywpgpxp485m9bc63wc"; })
]
+8 -11
pkgs/os-specific/linux/catfs/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "catfs";
-
version = "unstable-2020-03-21";
+
version = "0.9.0";
src = fetchFromGitHub {
owner = "kahing";
repo = pname;
-
rev = "daa2b85798fa8ca38306242d51cbc39ed122e271";
-
sha256 = "0zca0c4n2p9s5kn8c9f9lyxdf3df88a63nmhprpgflj86bh8wgf5";
+
rev = "v${version}";
+
hash = "sha256-OvmtU2jpewP5EqPwEFAf67t8UCI1WuzUO2QQj4cH1Ak=";
};
-
cargoSha256 = "1agcwq409s40kyij487wjrp8mj7942r9l2nqwks4xqlfb0bvaimf";
+
patches = [
+
# monitor https://github.com/kahing/catfs/issues/71
+
./fix-for-rust-1.65.diff
+
];
-
cargoPatches = [
-
# update cargo lock
-
(fetchpatch {
-
url = "https://github.com/kahing/catfs/commit/f838c1cf862cec3f1d862492e5be82b6dbe16ac5.patch";
-
sha256 = "1r1p0vbr3j9xyj9r1ahipg4acii3m4ni4m9mp3avbi1rfgzhblhw";
-
})
-
];
+
cargoHash = "sha256-xF1J2Pr4qtNFcd2kec4tnbdYxoLK+jRnzp8p+cmNOcI=";
nativeBuildInputs = [ pkg-config ];
+13
pkgs/os-specific/linux/catfs/fix-for-rust-1.65.diff
···
+
diff --git a/src/catfs/file.rs b/src/catfs/file.rs
+
index 6e781eb..92fdd80 100644
+
--- a/src/catfs/file.rs
+
+++ b/src/catfs/file.rs
+
@@ -569,7 +569,7 @@ impl Handle {
+
path: &dyn AsRef<Path>,
+
create: bool,
+
) -> error::Result<()> {
+
- let _ = self.page_in_res.0.lock().unwrap();
+
+ drop(self.page_in_res.0.lock().unwrap());
+
+
let mut buf = [0u8; 0];
+
let mut flags = rlibc::O_RDWR;
+2 -2
pkgs/os-specific/linux/kernel/zen-kernels.nix
···
# ./update-zen.py lqx
lqxVariant = {
version = "6.0.13"; #lqx
-
suffix = "lqx2"; #lqx
-
sha256 = "0xxxlv6rk620s947qj6xxxbjc8asynmx4ilbp66ahi92inxqiw29"; #lqx
+
suffix = "lqx3"; #lqx
+
sha256 = "0dc295d9dfm3j2nmvkzy21ky1k6jp7c7miqjhqgfjny9yk1b41k4"; #lqx
isLqx = true;
};
zenKernelsFor = { version, suffix, sha256, isLqx }: buildLinux (args // {
+39 -2
pkgs/servers/http/apache-modules/mod_tile/default.nix
···
-
{ lib, stdenv, fetchFromGitHub, fetchpatch, autoreconfHook, apacheHttpd, apr, cairo, iniparser, mapnik }:
+
{ lib
+
, stdenv
+
, fetchFromGitHub
+
, fetchpatch
+
, autoreconfHook
+
, apacheHttpd
+
, apr
+
, cairo
+
, iniparser
+
, mapnik
+
, boost
+
, icu
+
, harfbuzz
+
, libjpeg
+
, libtiff
+
, libwebp
+
, proj
+
, sqlite
+
}:
stdenv.mkDerivation rec {
pname = "mod_tile";
···
})
];
+
# test is broken and I couldn't figure out a better way to disable it.
+
postPatch = ''
+
echo "int main(){return 0;}" > src/gen_tile_test.cpp
+
'';
+
nativeBuildInputs = [ autoreconfHook ];
-
buildInputs = [ apacheHttpd apr cairo iniparser mapnik ];
+
buildInputs = [
+
apacheHttpd
+
apr
+
cairo
+
iniparser
+
mapnik
+
boost
+
icu
+
harfbuzz
+
libjpeg
+
libtiff
+
libwebp
+
proj
+
sqlite
+
];
configureFlags = [
"--with-apxs=${apacheHttpd.dev}/bin/apxs"
+10 -4
pkgs/servers/monitoring/mimir/default.nix
···
{ lib, buildGoModule, fetchFromGitHub, nixosTests }:
+
let
+
pinData = lib.importJSON ./pin.json;
+
in
buildGoModule rec {
pname = "mimir";
-
version = "2.4.0";
+
version = pinData.version;
src = fetchFromGitHub {
rev = "${pname}-${version}";
owner = "grafana";
repo = pname;
-
sha256 = "sha256-OpQxVp4Q2+r3Tqrqw3SrBsJDU5KJqChxsuYneT0PvYQ=";
+
sha256 = pinData.sha256;
};
vendorSha256 = null;
···
"cmd/mimirtool"
];
-
passthru.tests = {
-
inherit (nixosTests) mimir;
+
passthru = {
+
updateScript = ./update.sh;
+
tests = {
+
inherit (nixosTests) mimir;
+
};
};
ldflags = let t = "github.com/grafana/mimir/pkg/util/version";
+4
pkgs/servers/monitoring/mimir/pin.json
···
+
{
+
"version": "mimir-2.5.0",
+
"sha256": "sha256-lyF7ugnNEJug1Vx24ISrtENk6RoIt7H1zaCPYUZbBmM="
+
}
+25
pkgs/servers/monitoring/mimir/update.sh
···
+
#!/usr/bin/env nix-shell
+
#! nix-shell -i oil -p jq sd nix-prefetch-github ripgrep
+
+
# TODO set to `verbose` or `extdebug` once implemented in oil
+
shopt --set xtrace
+
# we need failures inside of command subs to get the correct vendorSha256
+
shopt --unset inherit_errexit
+
+
const directory = $(dirname $0 | xargs realpath)
+
const owner = "grafana"
+
const repo = "mimir"
+
const latest_rev = $(curl -q https://api.github.com/repos/${owner}/${repo}/releases/latest | \
+
jq -r '.tag_name')
+
const latest_version = $(echo $latest_rev | sd 'v' '')
+
const current_version = $(jq -r '.version' $directory/pin.json)
+
if ("$latest_version" === "$current_version") {
+
echo "$repo is already up-to-date"
+
return 0
+
} else {
+
const tarball_meta = $(nix-prefetch-github $owner $repo --rev "$latest_rev")
+
const tarball_hash = "sha256-$(echo $tarball_meta | jq -r '.sha256')"
+
+
jq ".version = \"$latest_version\" | \
+
.\"sha256\" = \"$tarball_hash\"" $directory/pin.json | sponge $directory/pin.json
+
}
+1 -1
pkgs/servers/monitoring/uptime-kuma/update.sh
···
set -euo pipefail
-
latestVersion="$(curl -s ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} "https://api.github.com/repos/louislam/uptime-kuma/releases?per_page=1" | jq -r ".[0].tag_name" | sed 's/^v//')"
+
latestVersion="$(curl -s ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} "https://api.github.com/repos/louislam/uptime-kuma/releases?per_page=1" | jq -r ".[0].tag_name" | sed 's/^v//')"
currentVersion=$(nix-instantiate --eval -E "with import ./. {}; uptime-kuma.version or (lib.getVersion uptime-kuma)" | tr -d '"')
if [[ "$currentVersion" == "$latestVersion" ]]; then
+2 -2
pkgs/servers/mqtt/nanomq/default.nix
···
stdenv.mkDerivation (finalAttrs: {
pname = "nanomq";
-
version = "0.14.5";
+
version = "0.14.8";
src = fetchFromGitHub {
owner = "emqx";
repo = "nanomq";
rev = finalAttrs.version;
-
hash = "sha256-VbVeePacHrE79qV74rGv70G4Hj6O8nK4XCZ3xKbxuQU=";
+
hash = "sha256-rWLsH01XHtN/UlyOiMFI2UECuxodCkCVR/L72HIfNtY=";
fetchSubmodules = true;
};
+1 -1
pkgs/tools/misc/depotdownloader/update.sh
···
depsFile="$(realpath "$(dirname "${BASH_SOURCE[0]}")/deps.nix")"
currentVersion="$(nix eval --raw -f . depotdownloader.version)"
-
latestVersion="$(curl -s ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} "https://api.github.com/repos/SteamRE/DepotDownloader/releases?per_page=1" \
+
latestVersion="$(curl -s ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} "https://api.github.com/repos/SteamRE/DepotDownloader/releases?per_page=1" \
| jq -r '.[].name' | cut -d' ' -f2)"
if [[ "$currentVersion" = "$latestVersion" ]]; then
+3 -3
pkgs/tools/misc/star-history/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "star-history";
-
version = "1.0.5";
+
version = "1.0.6";
src = fetchCrate {
inherit pname version;
-
sha256 = "sha256-fmuCmyqw7wubMafkhqL1MltW6jZefgXdnudxdeBRSV4=";
+
sha256 = "sha256-NPlfgnLji261w/QedCkZ+IgfJMiG2aGjVfqJYpBPm6I=";
};
-
cargoSha256 = "sha256-+wHOBjBQyMuooDey4Py8xmgW3NNI8t8rCwA8A7D6L84=";
+
cargoSha256 = "sha256-NBegNCNjhI0XuvxeqiI1RD7nIM9MabhXxZBnSEZrsD4=";
nativeBuildInputs = [ pkg-config ];
+4 -1
pkgs/tools/misc/vector/default.nix
···
''}
'';
-
passthru = { inherit features; };
+
passthru = {
+
inherit features;
+
updateScript = ./update.sh;
+
};
meta = with lib; {
description = "A high-performance logs, metrics, and events router";
+53
pkgs/tools/networking/mmsd-tng/default.nix
···
+
{ lib, stdenv
+
, fetchFromGitLab
+
, c-ares
+
, dbus
+
, glib
+
, libphonenumber
+
, libsoup
+
, meson
+
, mobile-broadband-provider-info
+
, modemmanager
+
, ninja
+
, pkg-config
+
, protobuf
+
}:
+
+
stdenv.mkDerivation rec {
+
pname = "mmsd-tng";
+
version = "1.12.1";
+
+
src = fetchFromGitLab {
+
owner = "kop316";
+
repo = "mmsd";
+
rev = version;
+
sha256 = "sha256-fhbiTJWmQwJpuMaVX2qWyWwJ/2Y/Vczo//+0T0b6jhA=";
+
};
+
+
nativeBuildInputs = [
+
meson
+
ninja
+
pkg-config
+
];
+
+
buildInputs = [
+
c-ares
+
dbus
+
glib
+
libphonenumber
+
libsoup
+
mobile-broadband-provider-info
+
modemmanager
+
protobuf
+
];
+
+
doCheck = true;
+
+
meta = with lib; {
+
description = "Multimedia Messaging Service Daemon - The Next Generation";
+
homepage = "https://gitlab.com/kop316/mmsd";
+
license = licenses.gpl2Plus;
+
maintainers = with maintainers; [ julm ];
+
platforms = platforms.linux;
+
};
+
}
+2 -2
pkgs/tools/networking/netbird/default.nix
···
in
buildGoModule rec {
pname = "netbird";
-
version = "0.11.5";
+
version = "0.11.6";
src = fetchFromGitHub {
owner = "netbirdio";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-MW0RAhBgragzRR+St6jy5GmiNdD+WDsmM/q7AIlO72w=";
+
sha256 = "sha256-q86GVCRppBU9qiCch0sjTnSsjl17xU5l3o72cBF3zZo=";
};
vendorSha256 = "sha256-TfHBvcG3e+yjifPVo0ZgcvLvD16fni4m71nCr4cCBD4=";
+3 -3
pkgs/tools/package-management/nix-template/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "nix-template";
-
version = "0.4.0";
+
version = "0.4.1";
src = fetchFromGitHub {
name = "${pname}-${version}-src";
owner = "jonringer";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-5Xxv9TH5rGA4VU/64YarrBIOrROWjFu3RYRcoNo70UA=";
+
sha256 = "sha256-42u5FmTIKHpfQ2zZQXIrFkAN2/XvU0wWnCRrQkQzcNI=";
};
-
cargoSha256 = "sha256-GvIE46NXNWg1kSEbffvOCwVDr0YmVMo8C8+52RDEwco=";
+
cargoSha256 = "sha256-f8Th6SbV66Uukqh1Cb5uQVa844qw1PmBB9W7EMXMU4E=";
nativeBuildInputs = [
installShellFiles
+4 -3
pkgs/tools/security/ldapnomnom/default.nix
···
buildGoModule rec {
pname = "ldapnomnom";
-
version = "1.0.7";
+
version = "1.1.0";
src = fetchFromGitHub {
owner = "lkarlslund";
repo = pname;
rev = "refs/tags/v${version}";
-
hash = "sha256-eGCg6s3bg7ixXmdwFsugRMLvL/nTE2p53otkfc8OgQU=";
+
hash = "sha256-o29vcPKRX8TWRCpa20DVsh/4K7d3IbaLS3B+jJGBEmo=";
};
-
vendorSha256 = "sha256-3ucnLD+qhBSWY2wLtBcsOcuEf1woqHP17qQg7LlERA8=";
+
vendorHash = "sha256-3ucnLD+qhBSWY2wLtBcsOcuEf1woqHP17qQg7LlERA8=";
meta = with lib; {
description = "Tool to anonymously bruteforce usernames from Domain controllers";
homepage = "https://github.com/lkarlslund/ldapnomnom";
+
changelog = "https://github.com/lkarlslund/ldapnomnom/releases/tag/v${version}";
license = licenses.mit;
maintainers = with maintainers; [ fab ];
};
+1 -1
pkgs/tools/security/metasploit/Gemfile
···
# frozen_string_literal: true
source "https://rubygems.org"
-
gem "metasploit-framework", git: "https://github.com/rapid7/metasploit-framework", ref: "refs/tags/6.2.30"
+
gem "metasploit-framework", git: "https://github.com/rapid7/metasploit-framework", ref: "refs/tags/6.2.31"
+21 -22
pkgs/tools/security/metasploit/Gemfile.lock
···
GIT
remote: https://github.com/rapid7/metasploit-framework
-
revision: 21ca4473d2486d30618f99eaee7f3067e136c608
-
ref: refs/tags/6.2.30
+
revision: 2654f6f02a0ce6150e623804b9fab9576fe008f6
+
ref: refs/tags/6.2.31
specs:
-
metasploit-framework (6.2.30)
+
metasploit-framework (6.2.31)
actionpack (~> 6.0)
activerecord (~> 6.0)
activesupport (~> 6.0)
···
bcrypt
bcrypt_pbkdf
bson
-
concurrent-ruby (= 1.0.5)
dnsruby
ed25519
em-http-request
···
metasploit-concern
metasploit-credential
metasploit-model
-
metasploit-payloads (= 2.0.101)
+
metasploit-payloads (= 2.0.105)
metasploit_data_models
metasploit_payloads-mettle (= 1.0.20)
mqtt
···
arel-helpers (2.14.0)
activerecord (>= 3.1.0, < 8)
aws-eventstream (1.2.0)
-
aws-partitions (1.674.0)
+
aws-partitions (1.679.0)
aws-sdk-core (3.168.4)
aws-eventstream (~> 1, >= 1.0.2)
aws-partitions (~> 1, >= 1.651.0)
aws-sigv4 (~> 1.5)
jmespath (~> 1, >= 1.6.1)
-
aws-sdk-ec2 (1.354.0)
+
aws-sdk-ec2 (1.355.0)
aws-sdk-core (~> 3, >= 3.165.0)
aws-sigv4 (~> 1.1)
aws-sdk-iam (1.73.0)
···
bindata (2.4.14)
bson (4.15.0)
builder (3.2.4)
-
concurrent-ruby (1.0.5)
+
concurrent-ruby (1.1.10)
cookiejar (0.3.3)
crass (1.0.6)
daemons (1.4.1)
···
eventmachine (1.2.7)
faker (3.0.0)
i18n (>= 1.8.11, < 2)
-
faraday (2.7.1)
+
faraday (2.7.2)
faraday-net_http (>= 2.0, < 3.1)
ruby2_keywords (>= 0.0.4)
faraday-net_http (3.0.2)
···
httpclient (2.8.3)
i18n (1.12.0)
concurrent-ruby (~> 1.0)
-
io-console (0.5.11)
-
irb (1.6.0)
+
io-console (0.6.0)
+
irb (1.6.1)
reline (>= 0.3.0)
jmespath (1.6.2)
jsobfu (0.4.2)
···
logging (2.3.1)
little-plugger (~> 1.1)
multi_json (~> 1.14)
-
loofah (2.19.0)
+
loofah (2.19.1)
crass (~> 1.0.2)
nokogiri (>= 1.5.9)
metasm (1.0.5)
···
activemodel (~> 6.0)
activesupport (~> 6.0)
railties (~> 6.0)
-
metasploit-credential (6.0.0)
+
metasploit-credential (6.0.1)
metasploit-concern
metasploit-model
metasploit_data_models (>= 5.0.0)
···
activemodel (~> 6.0)
activesupport (~> 6.0)
railties (~> 6.0)
-
metasploit-payloads (2.0.101)
+
metasploit-payloads (2.0.105)
metasploit_data_models (5.0.6)
activerecord (~> 6.0)
activesupport (~> 6.0)
···
nio4r (~> 2.0)
racc (1.6.1)
rack (2.2.4)
-
rack-protection (3.0.4)
+
rack-protection (3.0.5)
rack
rack-test (2.0.2)
rack (>= 1.3)
rails-dom-testing (2.0.3)
activesupport (>= 4.2.0)
nokogiri (>= 1.6)
-
rails-html-sanitizer (1.4.3)
-
loofah (~> 2.3)
+
rails-html-sanitizer (1.4.4)
+
loofah (~> 2.19, >= 2.19.1)
railties (6.1.7)
actionpack (= 6.1.7)
activesupport (= 6.1.7)
···
recog (3.0.3)
nokogiri
redcarpet (3.5.1)
-
reline (0.3.1)
+
reline (0.3.2)
io-console (~> 0.5)
rex-arch (0.1.14)
rex-text
···
rex-socket
rex-text
rex-struct2 (0.1.3)
-
rex-text (0.2.46)
+
rex-text (0.2.47)
rex-zip (0.1.4)
rex-text
rexml (3.2.5)
···
faraday (>= 0.17.3, < 3)
simpleidn (0.2.1)
unf (~> 0.1.4)
-
sinatra (3.0.4)
+
sinatra (3.0.5)
mustermann (~> 3.0)
rack (~> 2.2, >= 2.2.4)
-
rack-protection (= 3.0.4)
+
rack-protection (= 3.0.5)
tilt (~> 2.0)
sqlite3 (1.5.4)
mini_portile2 (~> 2.8.0)
···
metasploit-framework!
BUNDLED WITH
-
2.3.25
+
2.3.26
+2 -2
pkgs/tools/security/metasploit/default.nix
···
};
in stdenv.mkDerivation rec {
pname = "metasploit-framework";
-
version = "6.2.30";
+
version = "6.2.31";
src = fetchFromGitHub {
owner = "rapid7";
repo = "metasploit-framework";
rev = version;
-
sha256 = "sha256-2AEZJoGSWEBCCFabHjqzJyI3zx0PC8da2D3eRlfMKwY=";
+
sha256 = "sha256-oifgAc1umrEOULuJzK9EboBdXIXSici8ndlhRbbHUaw=";
};
nativeBuildInputs = [ makeWrapper ];
+31 -31
pkgs/tools/security/metasploit/gemset.nix
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "0a4inr58vqzqb6g4j09pch55xyhj4kbbl4drsk1apfwhakc70vpr";
+
sha256 = "0ijs16zjif7zkwi4wd1qffi7c5b1v5b6hnw76h8kh6vgiwj9hmmz";
type = "gem";
};
-
version = "1.674.0";
+
version = "1.679.0";
};
aws-sdk-core = {
groups = ["default"];
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "1fj3na0i1d50iw6cih2g3k3h9h2hq0n62czppxr0qsw65mwr5h8b";
+
sha256 = "1x0fg5gp7qcvfhngplb9438jv074llfb9d52jclnik8ibrrmgx8w";
type = "gem";
};
-
version = "1.354.0";
+
version = "1.355.0";
};
aws-sdk-iam = {
groups = ["default"];
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "183lszf5gx84kcpb779v6a2y0mx9sssy8dgppng1z9a505nj1qcf";
+
sha256 = "0s4fpn3mqiizpmpy2a24k4v365pv75y50292r8ajrv4i1p5b2k14";
type = "gem";
};
-
version = "1.0.5";
+
version = "1.1.10";
};
cookiejar = {
groups = ["default"];
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "1wyz9ab0mzi84gpf81fs19vrixglmmxi25k6n1mn9h141qmsp590";
+
sha256 = "17lacy6n0hsayafvgxgzmngfq2x62b2arbn32bj2yyzmgxwyxhqn";
type = "gem";
};
-
version = "2.7.1";
+
version = "2.7.2";
};
faraday-net_http = {
groups = ["default"];
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "0r9kxrf9jccrr329pa3s37rf16vy426cbqmfwxkav1fidwvih93y";
+
sha256 = "0dikardh14c72gd9ypwh8dim41wvqmzfzf35mincaj5yals9m7ff";
type = "gem";
};
-
version = "0.5.11";
+
version = "0.6.0";
};
irb = {
groups = ["default"];
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "078jfdkjg8kl82hy3awq0r9vww4allw4zpncm8hl6ccjswppr4jk";
+
sha256 = "09mbpnmfh5lwg6kcjlbyv9163pn50lfxphbra9rsws8cp04m1qj3";
type = "gem";
};
-
version = "1.6.0";
+
version = "1.6.1";
};
jmespath = {
groups = ["default"];
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "1fpyk1965py77al7iadkn5dibwgvybknkr7r8bii2dj73wvr29rh";
+
sha256 = "08qhzck271anrx9y6qa6mh8hwwdzsgwld8q0000rcd7yvvpnjr3c";
type = "gem";
};
-
version = "2.19.0";
+
version = "2.19.1";
};
metasm = {
groups = ["default"];
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "045aap4wrslclbvm2rczdxlgivyx9ricdbg2z9xk5xamf6cxfrx1";
+
sha256 = "061zkhiq7gpp0kjk1alaz0r266makzj3ahjzq6j9qxm4z9xiis4d";
type = "gem";
};
-
version = "6.0.0";
+
version = "6.0.1";
};
metasploit-framework = {
groups = ["default"];
platforms = [];
source = {
fetchSubmodules = false;
-
rev = "21ca4473d2486d30618f99eaee7f3067e136c608";
-
sha256 = "01ibribldpixv1dcf2qg3p7kf8i7ncx1x6sn11140n4jh4k1j0fq";
+
rev = "2654f6f02a0ce6150e623804b9fab9576fe008f6";
+
sha256 = "1b2iqyv4aqfrknyci2fjhmf5v03f8jpwr2dva07b36kfrl0y09x2";
type = "git";
url = "https://github.com/rapid7/metasploit-framework";
};
-
version = "6.2.30";
+
version = "6.2.31";
};
metasploit-model = {
groups = ["default"];
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "0m9w4yy5iwpbbjycpxyhfql2b4dnm4wgcn039aw43igjgfdrkmkz";
+
sha256 = "1zp4njsk9ybrhjr7pb06nmnm3shmxc69ra2hxvz0bwhq4syr1xsl";
type = "gem";
};
-
version = "2.0.101";
+
version = "2.0.105";
};
metasploit_data_models = {
groups = ["default"];
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "1kljmw1lhzqjcwnwadr5m2khii0h2lsah447zb9vgirrv5jszg9h";
+
sha256 = "1a12m1mv8dc0g90fs1myvis8vsgr427k1arg1q4a9qlfw6fqyhis";
type = "gem";
};
-
version = "3.0.4";
+
version = "3.0.5";
};
rack-test = {
groups = ["default"];
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "1mj0b7ay10a2fgwj70kjw7mlyrp7a5la8lx8zmwhy40bkansdfrf";
+
sha256 = "1mcb75qvldfz6zsr4inrfx7dmb0ngxy507awx28khqmnla3hqpc9";
type = "gem";
};
-
version = "1.4.3";
+
version = "1.4.4";
};
railties = {
groups = ["default"];
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "1izlsziflj70kgwfy2d72jfr7bhrzamnhbq8gxjn8xdz0wvdj0di";
+
sha256 = "1vpsmij5mknpiqy4b835rzl87slshm5dkr08hm8wypfya3v4m6cp";
type = "gem";
};
-
version = "0.3.1";
+
version = "0.3.2";
};
rex-arch = {
groups = ["default"];
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "0arm3yakxs541qbm52rxjjd9b3p70sqim7syd83m3vqh366gr67d";
+
sha256 = "06xihmiw7fqbjpxi1zh6hb8whbq45saxllvlk00mjp2l3dn0p7hb";
type = "gem";
};
-
version = "0.2.46";
+
version = "0.2.47";
};
rex-zip = {
groups = ["default"];
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "1lgvrna3wvm21y350hrasdb4w8119cn1fd0prrrj76ws5w0pdzvc";
+
sha256 = "1ryfja9yd3fq8n1p5yi3qnd0pjk7bkycmxxmbb1bj0axlr1pdv20";
type = "gem";
};
-
version = "3.0.4";
+
version = "3.0.5";
};
sqlite3 = {
dependencies = ["mini_portile2"];
+2 -2
pkgs/tools/system/logrotate/default.nix
···
stdenv.mkDerivation rec {
pname = "logrotate";
-
version = "3.20.1";
+
version = "3.21.0";
src = fetchFromGitHub {
owner = "logrotate";
repo = "logrotate";
rev = version;
-
sha256 = "sha256-IegYAV7Mrw9GKMQOE5Bk0J/2ljfHzPlIipyYm3LrUcU=";
+
sha256 = "sha256-w86y6bz/nvH/0mIbn2XrSs5KdOM/xadnlZMQZp4LdGQ=";
};
# Logrotate wants to access the 'mail' program; to be done.
+3 -3
pkgs/tools/text/mdbook-katex/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "mdbook-katex";
-
version = "0.2.17";
+
version = "0.2.21";
src = fetchCrate {
inherit pname version;
-
sha256 = "sha256-rJzZVZn8CJOIcSVLCLv6tWox0MRdxNBMUKo1fij1ogc=";
+
hash = "sha256-cJRO/HHxujSL5YTM4e+HMRsItlEe1OYn8rSqnwcqbgU=";
};
-
cargoHash = "sha256-aSFXTeP5wDshdrrJ+eJCTmLuTlxCuM+5irUr0iW4tAY=";
+
cargoHash = "sha256-FPoSye+wD/MPR5fCrQ212W4iYoJLWOFXgeStcg0GEHw=";
OPENSSL_DIR = "${lib.getDev openssl}";
OPENSSL_LIB_DIR = "${lib.getLib openssl}/lib";
+1 -1
pkgs/tools/virtualization/linode-cli/update.sh
···
SPEC_SHA256=$(nix-prefetch-url --quiet https://raw.githubusercontent.com/linode/linode-api-docs/v${SPEC_VERSION}/openapi.yaml)
-
VERSION=$(curl -s ${GITHUB_TOKEN:+"-u \":$GITHUB_TOKEN\""} \
+
VERSION=$(curl -s ${GITHUB_TOKEN:+-u ":$GITHUB_TOKEN"} \
-H "Accept: application/vnd.github.v3+json" \
"https://api.github.com/repos/linode/linode-cli/tags" \
| jq 'map(.name)' \
+8 -3
pkgs/top-level/all-packages.nix
···
cargo-cache = callPackage ../development/tools/rust/cargo-cache {
inherit (darwin.apple_sdk.frameworks) Security;
+
cargo-chef = callPackage ../development/tools/rust/cargo-chef { };
cargo-crev = callPackage ../development/tools/rust/cargo-crev {
inherit (darwin.apple_sdk.frameworks) Security SystemConfiguration CoreFoundation;
···
gi-docgen = callPackage ../development/tools/documentation/gi-docgen { };
+
git2-cpp = callPackage ../development/libraries/git2-cpp { };
+
github-release = callPackage ../development/tools/github/github-release { };
global = callPackage ../development/tools/misc/global { };
···
oprofile = callPackage ../development/tools/profiling/oprofile {
libiberty_static = libiberty.override { staticBuild = true; };
+
+
package-project-cmake = callPackage ../development/tools/package-project-cmake { };
pactorio = callPackage ../development/tools/pactorio {
inherit (darwin.apple_sdk.frameworks) Security;
···
mmsd = callPackage ../tools/networking/mmsd { };
+
mmsd-tng = callPackage ../tools/networking/mmsd-tng { };
+
mmtc = callPackage ../applications/audio/mmtc { };
mnamer = callPackage ../applications/misc/mnamer { };
···
rucksack = callPackage ../development/tools/rucksack { };
-
ruff = callPackage ../development/tools/ruff {
-
inherit (darwin.apple_sdk.frameworks) CoreServices Security;
-
};
+
ruff = callPackage ../development/tools/ruff { };
sam-ba = callPackage ../tools/misc/sam-ba { };