Merge staging-next into staging

Changed files
+357 -78
nixos
tests
pkgs
applications
networking
cluster
version-management
git-chglog
virtualization
nixpacks
singularity
data
icons
numix-icon-theme-circle
development
embedded
fpga
lattice-diamond
libraries
librsync
s2n-tls
spandsp
python-modules
asyncssh
frozendict
gdown
itanium-demangler
pulumi-aws
rokuecp
txtorcon
types-docutils
tools
sentry-cli
os-specific
linux
servers
matrix-synapse
tools
admin
filesystems
btrfs-progs
misc
debian-devscripts
tea
vtm
security
fulcio
system
erdtree
top-level
+3
nixos/tests/k3s/single-node.nix
···
machine.succeed("k3s kubectl wait --for 'condition=Ready' pod/test")
machine.succeed("k3s kubectl delete -f ${testPodYaml}")
+
# regression test for #176445
+
machine.fail("journalctl -o cat -u k3s.service | grep 'ipset utility not found'")
+
machine.shutdown()
'';
})
+2
pkgs/applications/networking/cluster/k3s/1_23/default.nix
···
, socat
, iptables
, iproute2
+
, ipset
, bridge-utils
, btrfs-progs
, conntrack-tools
···
socat
iptables
iproute2
+
ipset
bridge-utils
ethtool
util-linux # kubelet wants 'nsenter' from util-linux: https://github.com/kubernetes/kubernetes/issues/26093#issuecomment-705994388
+2
pkgs/applications/networking/cluster/k3s/1_24/default.nix
···
, socat
, iptables
, iproute2
+
, ipset
, bridge-utils
, btrfs-progs
, conntrack-tools
···
socat
iptables
iproute2
+
ipset
bridge-utils
ethtool
util-linux # kubelet wants 'nsenter' from util-linux: https://github.com/kubernetes/kubernetes/issues/26093#issuecomment-705994388
+2
pkgs/applications/networking/cluster/k3s/1_25/default.nix
···
, socat
, iptables
, iproute2
+
, ipset
, bridge-utils
, btrfs-progs
, conntrack-tools
···
socat
iptables
iproute2
+
ipset
bridge-utils
ethtool
util-linux # kubelet wants 'nsenter' from util-linux: https://github.com/kubernetes/kubernetes/issues/26093#issuecomment-705994388
+2
pkgs/applications/networking/cluster/k3s/1_26/default.nix
···
, socat
, iptables
, iproute2
+
, ipset
, bridge-utils
, btrfs-progs
, conntrack-tools
···
socat
iptables
iproute2
+
ipset
bridge-utils
ethtool
util-linux # kubelet wants 'nsenter' from util-linux: https://github.com/kubernetes/kubernetes/issues/26093#issuecomment-705994388
+3 -3
pkgs/applications/version-management/git-chglog/default.nix
···
buildGoModule rec {
pname = "git-chglog";
-
version = "0.15.2";
+
version = "0.15.4";
src = fetchFromGitHub {
owner = "git-chglog";
repo = "git-chglog";
rev = "v${version}";
-
sha256 = "sha256-VB3JYXz50B/SkA/q1iET7p5uhArrF8JyhAWhcxLVsg8=";
+
sha256 = "sha256-rTJn2vUrEnmG2japqCxHv3BR9MpmMfpMLO2FBP6ONbw=";
};
-
vendorHash = "sha256-/5s9Dvce0JWu8DaUlrtnkN6N5esEmkFvOgq0tVLZGnM=";
+
vendorHash = "sha256-skhEHpSnxOTZrL8XLlQZL3s224mg8XRINKJnatYCQko=";
ldflags = [ "-s" "-w" "-X=main.Version=v${version}" ];
+3 -3
pkgs/applications/virtualization/nixpacks/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "nixpacks";
-
version = "1.3.1";
+
version = "1.4.0";
src = fetchFromGitHub {
owner = "railwayapp";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-lQHJ5Y+EMhERxOX062QMNPImAX9tjamGYFXYYUmhpys=";
+
sha256 = "sha256-v9ycluLfkrPDzjsMXtv7w9UHgMaGzTsJw4lT/KfRAu4=";
};
-
cargoHash = "sha256-z+DQkl/7kX5tLG9igPnEgHi9sJhB4NoutfV2/BV2U6A=";
+
cargoHash = "sha256-wVQEa1qS+JF6PHKvRrRFbSvj2qp6j14ErOQPkxP0uuA=";
# skip test due FHS dependency
doCheck = false;
+4 -2
pkgs/applications/virtualization/singularity/generic.nix
···
# SingularityCE 3.10.0 and above requires explicit --without-seccomp when libseccomp is not available.
, enableSeccomp ? true
# Whether the configure script treat SUID support as default
+
# When equal to enableSuid, it supress the --with-suid / --without-suid build flag
+
# It can be set to `null` to always pass either --with-suid or --without-suided
+
# Type: null or boolean
, defaultToSuid ? true
# Whether to compile with SUID support
, enableSuid ? false
···
"--runstatedir=/var/run"
]
++ lib.optional (!enableSeccomp) "--without-seccomp"
-
++ lib.optional (defaultToSuid && !enableSuid) "--without-suid"
-
++ lib.optional (!defaultToSuid && enableSuid) "--with-suid"
+
++ lib.optional (enableSuid != defaultToSuid) (if enableSuid then "--with-suid" else "--without-suid")
++ extraConfigureFlags
;
+4 -4
pkgs/applications/virtualization/singularity/packages.nix
···
# Apptainer doesn't depend on conmon
conmon = null;
-
# defaultToSuid becomes false since Apptainer 1.1.0
-
# https://github.com/apptainer/apptainer/pull/495
-
# https://github.com/apptainer/apptainer/releases/tag/v1.1.0
-
defaultToSuid = false;
+
# Apptainer builders require explicit --with-suid / --without-suid flag
+
# when building on a system with disabled unprivileged namespace.
+
# See https://github.com/NixOS/nixpkgs/pull/215690#issuecomment-1426954601
+
defaultToSuid = null;
};
singularity = callPackage
+2 -2
pkgs/data/icons/numix-icon-theme-circle/default.nix
···
stdenvNoCC.mkDerivation rec {
pname = "numix-icon-theme-circle";
-
version = "23.02.12";
+
version = "23.02.16";
src = fetchFromGitHub {
owner = "numixproject";
repo = pname;
rev = version;
-
sha256 = "sha256-gQdVmF7ZzC+KjU0uQW6+sEw9Wz5940G60ebXqKHajuY=";
+
sha256 = "sha256-P/lg+7hx3WOmuWUKznFVKlPIB+MqlE3Nb/n8WK8aUM8=";
};
nativeBuildInputs = [ gtk3 ];
+10 -7
pkgs/development/embedded/fpga/lattice-diamond/default.nix
···
{ lib, stdenv, rpmextract, patchelf, makeWrapper, file, requireFile, glib, zlib,
-
freetype, fontconfig, xorg, libusb-compat-0_1 }:
+
freetype, fontconfig, xorg, libusb-compat-0_1, coreutils }:
stdenv.mkDerivation {
pname = "diamond";
···
done
# Patch executable ELFs.
-
for path in bin/lin64 ispfpga/bin/lin64; do
+
for path in bin/lin64 ispfpga/bin/lin64 synpbase/linux_a_64 synpbase/linux_a_64/mbin; do
cd $out/$prefix/$path
for f in *; do
if ! file $f | grep -q "ELF 64-bit LSB executable" ; then
···
# dependencies from nix.
patchelf \
--set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" \
-
--set-rpath "$libPath" --force-rpath \
+
--set-rpath "$libPath:$out/$prefix/bin/lin64:$out/$prefix/ispfpga/bin/lin64" \
+
--force-rpath \
$f
done
done
+
+
# Patch absolute /usr/bin/id path in script
+
sed -i -e "s#/usr/bin/id#${coreutils}/bin/id#" $out/$prefix/synpbase/bin/config/platform_set
# Remove 32-bit libz.
rm $out/$prefix/bin/lin64/libz.{so,so.1}
-
# Make wrappers (should these target more than the 'diamond' tool?).
-
# The purpose of these is just to call the target program using its
-
# absolute path - otherwise, it will crash.
+
# Make wrappers. The purpose of these is just to call the target program
+
# using its absolute path - otherwise, it will crash.
mkdir -p bin
-
for tool in diamond ; do
+
for tool in diamond pnmainc ddtcmd ; do
makeWrapper $out/$prefix/bin/lin64/$tool $out/bin/$tool
done
'';
+3 -2
pkgs/development/libraries/librsync/default.nix
···
stdenv.mkDerivation rec {
pname = "librsync";
-
version = "2.3.2";
+
version = "2.3.4";
src = fetchFromGitHub {
owner = "librsync";
repo = "librsync";
rev = "v${version}";
-
sha256 = "sha256-GNwOIZ2UjvsYIthotiPDBrabYzCGFG/YVEbwVa9Nwi4=";
+
sha256 = "sha256-fiOby8tOhv0KJ+ZwAWfh/ynqHlYC9kNqKfxNl3IhzR8=";
};
nativeBuildInputs = [ cmake ];
···
meta = with lib; {
description = "Implementation of the rsync remote-delta algorithm";
homepage = "https://librsync.sourceforge.net/";
+
changelog = "https://github.com/librsync/librsync/releases/tag/v${version}";
license = licenses.lgpl2Plus;
mainProgram = "rdiff";
platforms = platforms.unix;
+2 -2
pkgs/development/libraries/s2n-tls/default.nix
···
stdenv.mkDerivation rec {
pname = "s2n-tls";
-
version = "1.3.36";
+
version = "1.3.37";
src = fetchFromGitHub {
owner = "aws";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-IL7+f+7Igvm7KeBpDwnIoIB8IUqg3JDEtLFQslBIENE=";
+
sha256 = "sha256-NqOr2R61s4aUjHWI2QkyLpxUm/+c4vkAUg+UDduu3j4=";
};
nativeBuildInputs = [ cmake ];
+1
pkgs/development/libraries/spandsp/default.nix
···
outputs = [ "out" "dev" ];
makeFlags = [
"CC=${stdenv.cc.targetPrefix}cc"
+
"CC_FOR_BUILD=${buildPackages.stdenv.cc}/bin/cc"
];
configureFlags = [
-1
pkgs/development/python-modules/asyncssh/default.nix
···
];
meta = with lib; {
-
broken = stdenv.isDarwin;
description = "Asynchronous SSHv2 Python client and server library";
homepage = "https://asyncssh.readthedocs.io/";
changelog = "https://github.com/ronf/asyncssh/blob/v${version}/docs/changes.rst";
+2 -2
pkgs/development/python-modules/frozendict/default.nix
···
buildPythonPackage rec {
pname = "frozendict";
-
version = "2.3.4";
+
version = "2.3.5";
format = "setuptools";
disabled = pythonOlder "3.7";
···
owner = "Marco-Sulla";
repo = "python-frozendict";
rev = "refs/tags/v${version}";
-
hash = "sha256-rDorFoVHiwbkRsIIA2MLKPHJ9HWJw2FKZ5iFHEiqzhg=";
+
hash = "sha256-IlKhqQvNaYz4+U8UJ/fGUNNTC3RjyGKCJUzJ6J431Vw=";
};
postPatch = ''
+2 -2
pkgs/development/python-modules/gdown/default.nix
···
buildPythonPackage rec {
pname = "gdown";
-
version = "4.6.2";
+
version = "4.6.3";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-/2pPAymq6dek2NsInD+ga+CYOTG7BPgWGNm7Iwp2GHg=";
+
hash = "sha256-7G6pIu9ONhagVAc2VtmqLNxxf729CpTS931S0yOUMwc=";
};
propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/itanium-demangler/default.nix
···
src = fetchFromGitHub {
owner = "whitequark";
repo = "python-itanium_demangler";
-
rev = "v${version}";
+
rev = "refs/tags/v${version}";
hash = "sha256-I6NUfckt2cocQt5dZSFadpshTCuA/6bVNauNXypWh+A=";
};
···
];
pythonImportsCheck = [
-
" itanium_demangler "
+
"itanium_demangler"
];
meta = with lib; {
+2 -2
pkgs/development/python-modules/pulumi-aws/default.nix
···
buildPythonPackage rec {
pname = "pulumi-aws";
# Version is independant of pulumi's.
-
version = "5.29.1";
+
version = "5.30.0";
format = "setuptools";
disabled = pythonOlder "3.7";
···
owner = "pulumi";
repo = "pulumi-aws";
rev = "refs/tags/v${version}";
-
hash = "sha256-sdefoQgZ58re2VtIvNQjbjAb9aateZlGSeTAiVO6JGo=";
+
hash = "sha256-XRn5kMbbbbk5+X8vah44cAHv2MMySK0ToO8ga5FWSuA=";
};
sourceRoot = "${src.name}/sdk/python";
+4 -3
pkgs/development/python-modules/rokuecp/default.nix
···
buildPythonPackage rec {
pname = "rokuecp";
-
version = "0.17.0";
+
version = "0.17.1";
format = "pyproject";
disabled = pythonOlder "3.9";
···
src = fetchFromGitHub {
owner = "ctalkington";
repo = "python-rokuecp";
-
rev = version;
-
hash = "sha256-M4eZzFphhc96Pf1bspD+Hvl9SUN1N72xnxdtVFiPc78=";
+
rev = "refs/tags/${version}";
+
hash = "sha256-3GHG4FBGMiF5kNk2gl05xiX9+5tcrUyi4SUCXTa6Qco=";
};
nativeBuildInputs = [
···
meta = with lib; {
description = "Asynchronous Python client for Roku (ECP)";
homepage = "https://github.com/ctalkington/python-rokuecp";
+
changelog = "https://github.com/ctalkington/python-rokuecp/releases/tag/${version}";
license = licenses.mit;
maintainers = with maintainers; [ fab ];
};
+26 -17
pkgs/development/python-modules/txtorcon/default.nix
···
{ lib
, stdenv
-
, python
+
, automat
, buildPythonPackage
-
, pythonOlder
+
, cryptography
, fetchPypi
-
, cryptography
+
, GeoIP
+
, idna
, incremental
-
, twisted
-
, automat
-
, zope_interface
-
, idna
+
, lsof
+
, mock
, pyopenssl
+
, pytestCheckHook
+
, python
+
, pythonOlder
, service-identity
-
, pytestCheckHook
-
, mock
-
, lsof
-
, GeoIP
+
, twisted
+
, zope_interface
}:
buildPythonPackage rec {
pname = "txtorcon";
-
version = "22.0.0";
+
version = "23.0.0";
+
format = "setuptools";
+
+
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
-
sha256 = "sha256-iaG2XjKks2nWfmwWY4f7xGjMXQUidEjSOaXn6XGKoFM=";
+
hash = "sha256-AiX/rWdokTeEmtmtNK21abDYj5rwRQMABnpfkB6ZQyU=";
};
propagatedBuildInputs = [
···
zope_interface
] ++ twisted.optional-dependencies.tls;
-
nativeCheckInputs = [ pytestCheckHook mock lsof GeoIP ];
+
nativeCheckInputs = [
+
pytestCheckHook
+
mock
+
lsof
+
GeoIP
+
];
doCheck = !(stdenv.isDarwin && stdenv.isAarch64);
-
meta = {
+
meta = with lib; {
description = "Twisted-based Tor controller client, with state-tracking and configuration abstractions";
homepage = "https://github.com/meejah/txtorcon";
-
maintainers = with lib.maintainers; [ jluttine exarkun ];
-
license = lib.licenses.mit;
+
changelog = "https://github.com/meejah/txtorcon/releases/tag/v${version}";
+
maintainers = with maintainers; [ jluttine exarkun ];
+
license = licenses.mit;
};
}
+2 -2
pkgs/development/python-modules/types-docutils/default.nix
···
buildPythonPackage rec {
pname = "types-docutils";
-
version = "0.19.1.3";
+
version = "0.19.1.4";
format = "setuptools";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-Nv4w3lbx7OGp96mQ1H2qeBta+DHSs/Lct9/QG4V8w9Q=";
+
hash = "sha256-G2SyG2Cf8fx3kdPZMPFLVrNq0JAp/ZfkXjTMiJ1nG18=";
};
# Module doesn't have tests
+3 -3
pkgs/development/tools/sentry-cli/default.nix
···
}:
rustPlatform.buildRustPackage rec {
pname = "sentry-cli";
-
version = "2.12.0";
+
version = "2.13.0";
src = fetchFromGitHub {
owner = "getsentry";
repo = "sentry-cli";
rev = version;
-
sha256 = "sha256-HkaCaOVbEEy8H6gN9hoiDEEQM+XWyUJ4gYPxTlbBGgA=";
+
sha256 = "sha256-U6L2JQk/fYuxmZdt3CvPSaaEDRgZby0CiPT0nJGuVwA=";
};
doCheck = false;
···
buildInputs = [ openssl ] ++ lib.optionals stdenv.isDarwin [ Security SystemConfiguration ];
nativeBuildInputs = [ pkg-config ];
-
cargoHash = "sha256-4RUeUwixb5omcHT4jJHJKF2lYZE/4014DnrR2j7sen0=";
+
cargoHash = "sha256-gF3a8oCHmnNgatvbM1DeOQknXMMcHgerx2OcDdyqC8U=";
meta = with lib; {
homepage = "https://docs.sentry.io/cli/";
+2 -1
pkgs/os-specific/linux/ell/default.nix
···
enableParallelBuilding = true;
-
doCheck = true;
+
# tests sporadically fail on musl
+
doCheck = !stdenv.hostPlatform.isMusl;
meta = with lib; {
homepage = "https://git.kernel.org/pub/scm/libs/ell/ell.git";
+2 -2
pkgs/os-specific/linux/ena/default.nix
···
{ lib, stdenv, fetchFromGitHub, kernel }:
stdenv.mkDerivation rec {
-
version = "2.8.2";
+
version = "2.8.3";
name = "ena-${version}-${kernel.version}";
src = fetchFromGitHub {
owner = "amzn";
repo = "amzn-drivers";
rev = "ena_linux_${version}";
-
sha256 = "sha256-KlRNI2lnUbNeQGY1G+Qm683yXRTNCJwWIri51+PAi9o=";
+
sha256 = "sha256-Z5BCqqC4FNKHqpocJ6CsHwhh5sszj5QfxiN6+Dkaqek=";
};
hardeningDisable = [ "pic" ];
+6
pkgs/os-specific/linux/firejail/default.nix
···
# Fix the path to 'xdg-dbus-proxy' hardcoded in the 'common.h' file
substituteInPlace src/include/common.h \
--replace '/usr/bin/xdg-dbus-proxy' '${xdg-dbus-proxy}/bin/xdg-dbus-proxy'
+
+
# Workaround for regression introduced in 0.9.72 preventing usage of
+
# end-of-options indicator "--"
+
# See https://github.com/netblue30/firejail/issues/5659
+
substituteInPlace src/firejail/sandbox.c \
+
--replace " && !arg_doubledash" ""
'';
preConfigure = ''
+76
pkgs/servers/matrix-synapse/matrix-hookshot/default.nix
···
+
{ lib
+
, stdenv
+
, fetchFromGitHub
+
, fetchYarnDeps
+
, makeWrapper
+
, matrix-sdk-crypto-nodejs
+
, mkYarnPackage
+
, rust
+
, rustPlatform
+
, napi-rs-cli
+
, nodejs
+
}:
+
+
let
+
data = lib.importJSON ./pin.json;
+
in
+
mkYarnPackage rec {
+
pname = "matrix-hookshot";
+
version = data.version;
+
+
src = fetchFromGitHub {
+
owner = "matrix-org";
+
repo = "matrix-hookshot";
+
rev = data.version;
+
sha256 = data.srcHash;
+
};
+
+
packageJSON = ./package.json;
+
+
offlineCache = fetchYarnDeps {
+
yarnLock = src + "/yarn.lock";
+
sha256 = data.yarnHash;
+
};
+
+
cargoDeps = rustPlatform.fetchCargoTarball {
+
inherit src;
+
name = "${pname}-${version}";
+
hash = "sha256-WolkDSS5wPxtltKzq4Er2nAQ0GrsF3imim3/Ge4eguQ=";
+
};
+
+
packageResolutions = {
+
"@matrix-org/matrix-sdk-crypto-nodejs" = "${matrix-sdk-crypto-nodejs}/lib/node_modules/@matrix-org/matrix-sdk-crypto-nodejs";
+
};
+
+
nativeBuildInputs = [
+
rustPlatform.cargoSetupHook
+
rustPlatform.rust.cargo
+
rustPlatform.rust.rustc
+
napi-rs-cli
+
makeWrapper
+
];
+
+
buildPhase = ''
+
runHook preBuild
+
cd deps/${pname}
+
napi build --target ${rust.toRustTargetSpec stdenv.targetPlatform} --dts ../src/libRs.d.ts --release ./lib
+
yarn run build:app:fix-defs
+
yarn run build:app
+
yarn run build:web
+
cd ../..
+
runHook postBuild
+
'';
+
+
postInstall = ''
+
makeWrapper '${nodejs}/bin/node' "$out/bin/matrix-hookshot" --add-flags \
+
"$out/libexec/matrix-hookshot/deps/matrix-hookshot/lib/App/BridgeApp.js"
+
'';
+
+
doDist = false;
+
+
meta = with lib; {
+
description = "A bridge between Matrix and multiple project management services, such as GitHub, GitLab and JIRA";
+
maintainers = with maintainers; [ chvp ];
+
license = licenses.asl20;
+
};
+
}
+111
pkgs/servers/matrix-synapse/matrix-hookshot/package.json
···
+
{
+
"name": "matrix-hookshot",
+
"version": "2.7.0",
+
"description": "A bridge between Matrix and multiple project management services, such as GitHub, GitLab and JIRA.",
+
"main": "lib/app.js",
+
"repository": "https://github.com/matrix-org/matrix-hookshot",
+
"author": "matrix.org",
+
"license": "Apache-2.0",
+
"napi": {
+
"name": "matrix-hookshot-rs"
+
},
+
"engines": {
+
"node": ">=16"
+
},
+
"scripts": {
+
"build:web": "vite build",
+
"build:app": "tsc --project tsconfig.json",
+
"build:app:rs": "napi build --dts ../src/libRs.d.ts --release ./lib",
+
"build:app:fix-defs": "ts-node scripts/definitions-fixer.ts src/libRs.d.ts",
+
"build:docs": "ts-node scripts/build-metrics-docs.ts > docs/metrics.md && mdbook build",
+
"dev:web": "vite dev",
+
"build": "scripts/build-app.sh",
+
"clean:web": "rimraf public/",
+
"clean:app": "tsc --build tsconfig.json --clean",
+
"clean:app:rs": "rimraf src/libRs.d.ts target/",
+
"clean:docs": "mdbook clean",
+
"clean": "scripts/clean.sh",
+
"prepare": "yarn build",
+
"start": "node --require source-map-support/register lib/App/BridgeApp.js",
+
"start:app": "node --require source-map-support/register lib/App/BridgeApp.js",
+
"start:webhooks": "node --require source-map-support/register lib/App/GithubWebhookApp.js",
+
"start:matrixsender": "node --require source-map-support/register lib/App/MatrixSenderApp.js",
+
"test": "mocha -r ts-node/register tests/init.ts tests/*.ts tests/**/*.ts",
+
"test:cover": "nyc --reporter=lcov --reporter=text yarn test",
+
"lint": "yarn run lint:js && yarn run lint:rs",
+
"lint:js": "eslint -c .eslintrc.js 'src/**/*.ts' 'tests/**/*.ts' 'web/**/*.ts' 'web/**/*.tsx'",
+
"lint:rs": "cargo fmt --all -- --check",
+
"generate-default-config": "ts-node src/Config/Defaults.ts --config > config.sample.yml",
+
"validate-config": "ts-node src/Config/Config.ts"
+
},
+
"dependencies": {
+
"@alloc/quick-lru": "^5.2.0",
+
"@octokit/auth-app": "^3.3.0",
+
"@octokit/auth-token": "^2.4.5",
+
"@octokit/rest": "^18.10.0",
+
"@octokit/webhooks": "^9.1.2",
+
"ajv": "^8.11.0",
+
"axios": "^0.24.0",
+
"cors": "^2.8.5",
+
"express": "^4.17.3",
+
"figma-js": "^1.14.0",
+
"http-status-codes": "^2.2.0",
+
"ioredis": "^5.2.3",
+
"jira-client": "^8.0.0",
+
"markdown-it": "^12.3.2",
+
"matrix-appservice-bridge": "^6.0.0",
+
"matrix-bot-sdk": "npm:@vector-im/matrix-bot-sdk@^0.6.3-element.0",
+
"matrix-widget-api": "^1.0.0",
+
"micromatch": "^4.0.4",
+
"mime": "^3.0.0",
+
"node-emoji": "^1.11.0",
+
"nyc": "^15.1.0",
+
"p-queue": "^6.6.2",
+
"prom-client": "^14.0.1",
+
"reflect-metadata": "^0.1.13",
+
"rss-parser": "^3.12.0",
+
"source-map-support": "^0.5.21",
+
"string-argv": "^0.3.1",
+
"tiny-typed-emitter": "^2.1.0",
+
"uuid": "^8.3.2",
+
"vm2": "^3.9.11",
+
"winston": "^3.3.3",
+
"xml2js": "^0.4.23",
+
"yaml": "^1.10.2"
+
},
+
"devDependencies": {
+
"@codemirror/lang-javascript": "^6.0.2",
+
"@napi-rs/cli": "^2.2.0",
+
"@preact/preset-vite": "^2.2.0",
+
"@tsconfig/node16": "^1.0.3",
+
"@types/ajv": "^1.0.0",
+
"@types/chai": "^4.2.22",
+
"@types/cors": "^2.8.12",
+
"@types/express": "^4.17.14",
+
"@types/jira-client": "^7.1.0",
+
"@types/markdown-it": "^12.2.3",
+
"@types/micromatch": "^4.0.1",
+
"@types/mime": "^2.0.3",
+
"@types/mocha": "^9.0.0",
+
"@types/node": "^16",
+
"@types/node-emoji": "^1.8.1",
+
"@types/uuid": "^8.3.3",
+
"@types/xml2js": "^0.4.11",
+
"@typescript-eslint/eslint-plugin": "^5.4.0",
+
"@typescript-eslint/parser": "^5.4.0",
+
"@uiw/react-codemirror": "^4.12.3",
+
"chai": "^4.3.4",
+
"eslint": "^8.3.0",
+
"eslint-config-preact": "^1.3.0",
+
"eslint-plugin-mocha": "^9.0.0",
+
"mini.css": "^3.0.1",
+
"mocha": "^8.2.1",
+
"preact": "^10.5.15",
+
"rimraf": "^3.0.2",
+
"sass": "^1.51.0",
+
"ts-node": "^10.4.0",
+
"typescript": "^4.5.2",
+
"vite": "^2.9.13",
+
"vite-svg-loader": "^3.4.0"
+
}
+
}
+5
pkgs/servers/matrix-synapse/matrix-hookshot/pin.json
···
+
{
+
"version": "2.7.0",
+
"srcHash": "rW5fqKshnF2S4w55V2GaAa2RFVM+YbwRum9OwTTpYuA=",
+
"yarnHash": "0q71901ra9m9rbbczal1imqfba4b07bpr8hkpw1d1r9ghc2xjay4"
+
}
+35
pkgs/servers/matrix-synapse/matrix-hookshot/update.sh
···
+
#!/usr/bin/env -S nix shell nixpkgs#nix nixpkgs#curl nixpkgs#jq nixpkgs#prefetch-yarn-deps nixpkgs#nix-prefetch-github nixpkgs#nix-prefetch-git --command bash
+
+
if [ "$#" -gt 1 ] || [[ "$1" == -* ]]; then
+
echo "Regenerates packaging data for matrix-hookshot."
+
echo "Usage: $0 [git release tag]"
+
exit 1
+
fi
+
+
version="$1"
+
+
set -euo pipefail
+
+
if [ -z "$version" ]; then
+
version="$(curl "https://api.github.com/repos/matrix-org/matrix-hookshot/releases?per_page=1" | jq -r '.[0].tag_name')"
+
fi
+
+
src="https://raw.githubusercontent.com/matrix-org/matrix-hookshot/$version"
+
src_hash=$(nix-prefetch-github matrix-org matrix-hookshot --rev ${version} | jq -r .sha256)
+
+
tmpdir=$(mktemp -d)
+
trap 'rm -rf "$tmpdir"' EXIT
+
+
pushd $tmpdir
+
curl -O "$src/yarn.lock"
+
yarn_hash=$(prefetch-yarn-deps yarn.lock)
+
popd
+
+
curl -O "$src/package.json"
+
cat > pin.json << EOF
+
{
+
"version": "$version",
+
"srcHash": "$src_hash",
+
"yarnHash": "$yarn_hash"
+
}
+
EOF
+3 -3
pkgs/tools/admin/syft/default.nix
···
buildGoModule rec {
pname = "syft";
-
version = "0.71.0";
+
version = "0.72.0";
src = fetchFromGitHub {
owner = "anchore";
repo = pname;
rev = "v${version}";
-
hash = "sha256-Q02WBUMwboGkXrSjCT2C3vLYH4UlnavIudvOSb5g2bA=";
+
hash = "sha256-WpAD7/GiKD5+f9uqfRL5b3gMeUNaYHsosoNi0KdoBa0=";
# populate values that require us to use git. By doing this in postFetch we
# can delete .git afterwards and maintain better reproducibility of the src.
leaveDotGit = true;
···
};
# hash mismatch with darwin
proxyVendor = true;
-
vendorHash = "sha256-bUSQk4uJ4TAhjLS8pjqC486sa31z/MyZf5jDsnxhtSM=";
+
vendorHash = "sha256-8ArooLNyabjFTXYlfYTn63CewtPCT+p4+DNsebFoTj4=";
nativeBuildInputs = [ installShellFiles ];
+2 -2
pkgs/tools/filesystems/btrfs-progs/default.nix
···
stdenv.mkDerivation rec {
pname = "btrfs-progs";
-
version = "6.1.2";
+
version = "6.1.3";
src = fetchurl {
url = "mirror://kernel/linux/kernel/people/kdave/btrfs-progs/btrfs-progs-v${version}.tar.xz";
-
sha256 = "sha256-a+Zn2X89ZcC6V8MxyYsL07E89g2NMfqK0liCqtnXnXo=";
+
sha256 = "sha256-03/J7E+ld4sgqnVI/nBus6MAM4wUczGCca5UAk2scWc=";
};
nativeBuildInputs = [
+1 -1
pkgs/tools/misc/debian-devscripts/default.nix
···
nativeBuildInputs = [ makeWrapper pkg-config ];
buildInputs = [ xz dpkg libxslt python setuptools curl gnupg diffutils bash-completion help2man ] ++
-
(with perlPackages; [ perl CryptSSLeay LWP TimeDate DBFile FileDesktopEntry ParseDebControl LWPProtocolHttps ]);
+
(with perlPackages; [ perl CryptSSLeay LWP TimeDate DBFile FileDesktopEntry ParseDebControl LWPProtocolHttps Moo FileHomeDir IPCRun FileDirList FileTouch ]);
preConfigure = ''
export PERL5LIB="$PERL5LIB''${PERL5LIB:+:}${dpkg}";
+2 -2
pkgs/tools/misc/tea/default.nix
···
buildGoModule rec {
pname = "tea";
-
version = "0.9.0";
+
version = "0.9.2";
src = fetchFromGitea {
domain = "gitea.com";
owner = "gitea";
repo = "tea";
rev = "v${version}";
-
sha256 = "sha256-Bvee8m/BXvPtaaD8xjVg9qzorO0ln6xHP1upPgWoD+A=";
+
sha256 = "sha256-sZfg8+LIu1Ejvmr/o4X3EOz3fv+RvLhrGRf2yy+6t8c=";
};
vendorSha256 = "sha256-nb0lQEAaIYlGpodFQLhMk/24DmTgg5K3zQ4s/XY+Z1w=";
+2 -2
pkgs/tools/misc/vtm/default.nix
···
stdenv.mkDerivation rec {
pname = "vtm";
-
version = "0.9.8t";
+
version = "0.9.8v";
src = fetchFromGitHub {
owner = "netxs-group";
repo = "vtm";
rev = "v${version}";
-
sha256 = "sha256-Q6kwGmxDThsaGIzSPhxd/kKz0nORf6K9lUJMU9CdIXU=";
+
sha256 = "sha256-7ECYbw51MXhYsbQxnuS4QUr5HN0cIUqgMx7V7D/kYTg=";
};
nativeBuildInputs = [ cmake ];
+3 -3
pkgs/tools/security/fulcio/default.nix
···
buildGoModule rec {
pname = "fulcio";
-
version = "1.0.0";
+
version = "1.1.0";
src = fetchFromGitHub {
owner = "sigstore";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-djnDHRD/vHfsem03896qcEb6uzgW3OCMBLqMDHca9vY=";
+
sha256 = "sha256-b2rn4et7Ze8XRc1Oa/DCfpva/rihtBLapbGlpYGvOjc=";
# populate values that require us to use git. By doing this in postFetch we
# can delete .git afterwards and maintain better reproducibility of the src.
leaveDotGit = true;
···
find "$out" -name .git -print0 | xargs -0 rm -rf
'';
};
-
vendorSha256 = "sha256-X+M/E1kWhgS408PHwMg5jnDn2ad1NW6xvlLucuOLAeg=";
+
vendorHash = "sha256-8iNXBSEaKApu+qjGIYOLU6z/sxIVQhltgBRG9eN4RXw=";
nativeBuildInputs = [ installShellFiles ];
+3 -3
pkgs/tools/system/erdtree/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "erdtree";
-
version = "1.0.0";
+
version = "1.1.0";
src = fetchFromGitHub {
owner = "solidiquis";
repo = pname;
rev = "v${version}";
-
hash = "sha256-gZC90flsfH03Grc1netzlv/iX/9DH+rpaSstfXFearc=";
+
hash = "sha256-W9rTsumZZ3O0kOc+dT9TC/Z/Katb3q6yFreAVCvX5qo=";
};
-
cargoHash = "sha256-0I60lUYyR4Za2Q3FqcdqJhUKFjX5+PE88G6JxxxiBXw=";
+
cargoHash = "sha256-6jFBNkiCFBQbpiYkNZ6dyXH/ZnFHZYFliMZFlE/DodM=";
meta = with lib; {
description = "File-tree visualizer and disk usage analyzer";
+2
pkgs/top-level/all-packages.nix
···
matrix-corporal = callPackage ../servers/matrix-corporal { };
+
matrix-hookshot = callPackage ../servers/matrix-synapse/matrix-hookshot {};
+
mautrix-facebook = callPackage ../servers/mautrix-facebook { };
mautrix-googlechat = callPackage ../servers/mautrix-googlechat { };
+16
pkgs/top-level/perl-packages.nix
···
};
};
+
FileDirList = buildPerlPackage {
+
version = "0.05";
+
pname = "File-DirList";
+
src = fetchurl {
+
url = "mirror://cpan/authors/id/T/TP/TPABA/File-DirList/File-DirList-0.05.tar.gz";
+
sha256 = "sha256-mTt9dmLlV5hEih7azLmr0oHSvSO+fquZ9Wm44pYtO8M=";
+
};
+
preCheck = ''
+
export HOME="$TMPDIR"
+
'';
+
meta = {
+
description = "Provide a sorted list of directory content";
+
license = with lib.licenses; [ artistic1 gpl1Plus ];
+
};
+
};
+
FileFindIterator = buildPerlPackage {
pname = "File-Find-Iterator";
version = "0.4";