Merge staging-next into staging

Changed files
+114 -44
nixos
modules
services
monitoring
prometheus
exporters
networking
tests
pkgs
applications
blockchains
science
logic
cadical
by-name
bi
bitmagnet
development
compilers
julia
libraries
cjson
python-modules
fhir-py
idasen
tools
parsing
tree-sitter
servers
home-automation
tools
misc
goreleaser
security
spire
top-level
+5 -3
nixos/modules/services/monitoring/prometheus/exporters/kea.nix
···
type = types.listOf types.str;
example = literalExpression ''
[
-
"/run/kea-dhcp4/kea-dhcp4.socket"
-
"/run/kea-dhcp6/kea-dhcp6.socket"
+
"/run/kea/kea-dhcp4.socket"
+
"/run/kea/kea-dhcp6.socket"
]
'';
description = lib.mdDoc ''
···
];
serviceConfig = {
User = "kea";
+
DynamicUser = true;
ExecStart = ''
${pkgs.prometheus-kea-exporter}/bin/kea-exporter \
--address ${cfg.listenAddress} \
--port ${toString cfg.port} \
${concatStringsSep " " cfg.controlSocketPaths}
'';
-
SupplementaryGroups = [ "kea" ];
+
RuntimeDirectory = "kea";
+
RuntimeDirectoryPreserve = true;
RestrictAddressFamilies = [
# Need AF_UNIX to collect data
"AF_UNIX"
+10 -12
nixos/modules/services/networking/kea.nix
···
DynamicUser = true;
User = "kea";
ConfigurationDirectory = "kea";
+
RuntimeDirectory = "kea";
+
RuntimeDirectoryPreserve = true;
StateDirectory = "kea";
UMask = "0077";
};
···
];
environment = {
-
KEA_PIDFILE_DIR = "/run/kea-ctrl-agent";
-
KEA_LOCKFILE_DIR = "/run/kea-ctrl-agent";
+
KEA_PIDFILE_DIR = "/run/kea";
+
KEA_LOCKFILE_DIR = "/run/kea";
};
restartTriggers = [
···
ExecStart = "${package}/bin/kea-ctrl-agent -c /etc/kea/ctrl-agent.conf ${lib.escapeShellArgs cfg.ctrl-agent.extraArgs}";
KillMode = "process";
Restart = "on-failure";
-
RuntimeDirectory = "kea-ctrl-agent";
} // commonServiceConfig;
};
})
···
];
environment = {
-
KEA_PIDFILE_DIR = "/run/kea-dhcp4";
-
KEA_LOCKFILE_DIR = "/run/kea-dhcp4";
+
KEA_PIDFILE_DIR = "/run/kea";
+
KEA_LOCKFILE_DIR = "/run/kea";
};
restartTriggers = [
···
"CAP_NET_BIND_SERVICE"
"CAP_NET_RAW"
];
-
RuntimeDirectory = "kea-dhcp4";
} // commonServiceConfig;
};
})
···
];
environment = {
-
KEA_PIDFILE_DIR = "/run/kea-dhcp6";
-
KEA_LOCKFILE_DIR = "/run/kea-dhcp6";
+
KEA_PIDFILE_DIR = "/run/kea";
+
KEA_LOCKFILE_DIR = "/run/kea";
};
restartTriggers = [
···
CapabilityBoundingSet = [
"CAP_NET_BIND_SERVICE"
];
-
RuntimeDirectory = "kea-dhcp6";
} // commonServiceConfig;
};
})
···
];
environment = {
-
KEA_PIDFILE_DIR = "/run/kea-dhcp-ddns";
-
KEA_LOCKFILE_DIR = "/run/kea-dhcp-ddns";
+
KEA_PIDFILE_DIR = "/run/kea";
+
KEA_LOCKFILE_DIR = "/run/kea";
};
restartTriggers = [
···
CapabilityBoundingSet = [
"CAP_NET_BIND_SERVICE"
];
-
RuntimeDirectory = "kea-dhcp-ddns";
} // commonServiceConfig;
};
})
+2 -2
nixos/tests/prometheus-exporters.nix
···
};
kea = let
-
controlSocketPathV4 = "/run/kea-dhcp4/dhcp4.sock";
-
controlSocketPathV6 = "/run/kea-dhcp6/dhcp6.sock";
+
controlSocketPathV4 = "/run/kea/dhcp4.sock";
+
controlSocketPathV6 = "/run/kea/dhcp6.sock";
in
{
exporterConfig = {
+2 -2
pkgs/applications/blockchains/ergo/default.nix
···
stdenv.mkDerivation rec {
pname = "ergo";
-
version = "5.0.16";
+
version = "5.0.18";
src = fetchurl {
url = "https://github.com/ergoplatform/ergo/releases/download/v${version}/ergo-${version}.jar";
-
sha256 = "sha256-20k2/701CqNJS2nFDCCeCzr1s/Rh2VB2g5KcU5XmsFQ=";
+
sha256 = "sha256-WwchK7qyy+J7TiWj4exBMLGkLmbPFDA7yNQVZ779nmk=";
};
nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/applications/science/logic/cadical/default.nix
···
stdenv.mkDerivation rec {
pname = "cadical";
-
version = "1.9.1";
+
version = "1.9.3";
src = fetchFromGitHub {
owner = "arminbiere";
repo = "cadical";
rev = "rel-${version}";
-
sha256 = "sha256-WQNaRkjJyWc3PDkK5uwLHEymlnpytVkbJqIVbc7HgZY=";
+
sha256 = "sha256-kjvbWFcoEe7Df2HDKKc2txrxpS8/StwiCLbS2RqnkyE=";
};
outputs = [ "out" "dev" "lib" ];
+9 -4
pkgs/by-name/bi/bitmagnet/package.nix
···
{ lib
, buildGoModule
, fetchFromGitHub
+
, nix-update-script
}:
buildGoModule rec {
pname = "bitmagnet";
-
version = "0.0.6";
+
version = "0.4.1";
src = fetchFromGitHub {
owner = "bitmagnet-io";
repo = "bitmagnet";
rev = "v${version}";
-
hash = "sha256-+KAIHg8M2CM+GRRv+htmev8MFe/Y1sJ8p+um/c7kI7c=";
+
hash = "sha256-Geukd4JYwmdG7M+HDCCqpiUjor1TWsqBY42ACd+LasU=";
};
-
vendorHash = "sha256-ydiZ3KMEiVkmdzhHjYYLJ7wuiKmwlMEn4OWrKSOnaSo=";
+
vendorHash = "sha256-TbfbrvXbO+eOb1Ot/gWRBjggTj9jkSGulHIJdziqsVc=";
ldflags = [ "-s" "-w" ];
+
passthru = {
+
updateScript = nix-update-script { };
+
};
+
meta = {
description = "A self-hosted BitTorrent indexer, DHT crawler, and torrent search engine";
longDescription = ''
···
'';
homepage = "https://bitmagnet.io/";
license = lib.licenses.mit;
-
maintainers = with lib.maintainers; [ eclairevoyant ];
+
maintainers = with lib.maintainers; [ eclairevoyant viraptor ];
mainProgram = "bitmagnet";
};
}
+2 -2
pkgs/development/compilers/julia/1.6-bin.nix
···
stdenv.mkDerivation rec {
pname = "julia-bin";
-
version = "1.6.6";
+
version = "1.6.7";
src = {
x86_64-linux = fetchurl {
url = "https://julialang-s3.julialang.org/bin/linux/x64/${lib.versions.majorMinor version}/julia-${version}-linux-x86_64.tar.gz";
-
sha256 = "0ia9a4h7w0n5rg57fkl1kzcyj500ymfwq3qsd2r7l82288dgfpy2";
+
sha256 = "sha256-bEUi1ZXky80AFXrEWKcviuwBdXBT0gc/mdqjnkQrKjY=";
};
}.${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}");
+2 -2
pkgs/development/libraries/cjson/default.nix
···
stdenv.mkDerivation rec {
pname = "cjson";
-
version = "1.7.16";
+
version = "1.7.17";
src = fetchFromGitHub {
owner = "DaveGamble";
repo = "cJSON";
rev = "v${version}";
-
sha256 = "sha256-sdhnDpaAO9Fau4uMzNXrbOJ2k0b8+MdhKh6rpFMUwaQ=";
+
sha256 = "sha256-jU9UbXvdXiNXFh7c9p/LppMsuqryFK40NTTyQGbNU84=";
};
nativeBuildInputs = [ cmake ];
+63
pkgs/development/python-modules/fhir-py/default.nix
···
+
{ lib
+
, buildPythonPackage
+
, fetchFromGitHub
+
, pythonOlder
+
, flit-core
+
, aiohttp
+
, pytz
+
, requests
+
, pytestCheckHook
+
, pytest-asyncio
+
, responses
+
}:
+
+
buildPythonPackage rec {
+
pname = "fhir-py";
+
version = "1.4.2";
+
pyproject = true;
+
+
disabled = pythonOlder "3.8";
+
+
src = fetchFromGitHub {
+
owner = "beda-software";
+
repo = "fhir-py";
+
rev = "refs/tags/v${version}";
+
hash = "sha256-kYqoRso1ypN5novRxMMzz1h2NGNybbw5lK4+HErG79I=";
+
};
+
+
preBuild = ''
+
substituteInPlace pyproject.toml \
+
--replace "--cov=fhirpy" "" \
+
--replace "--cov-report=xml" ""
+
'';
+
+
nativeBuildInputs = [
+
flit-core
+
];
+
+
propagatedBuildInputs = [
+
aiohttp
+
pytz
+
requests
+
];
+
+
nativeCheckInputs = [
+
pytestCheckHook
+
pytest-asyncio
+
responses
+
];
+
+
# sync/async test cases require docker-compose to set up services, so disable:
+
disabledTestPaths = [ "tests/test_lib_sync.py" ];
+
disabledTests = [ "TestLibAsyncCase" ];
+
+
pythonImportsCheck = [ "fhirpy" ];
+
+
meta = with lib; {
+
description = "Async/sync API for FHIR resources";
+
homepage = "https://github.com/beda-software/fhir-py";
+
changelog = "https://github.com/beda-software/fhir-py/blob/${src.rev}/CHANGELOG.md";
+
license = licenses.mit;
+
maintainers = with maintainers; [ bcdarwin ];
+
};
+
}
+2 -2
pkgs/development/python-modules/idasen/default.nix
···
buildPythonPackage rec {
pname = "idasen";
-
version = "0.10.3";
+
version = "0.11.0";
format = "pyproject";
disabled = pythonOlder "3.8";
···
owner = "newAM";
repo = "idasen";
rev = "refs/tags/v${version}";
-
hash = "sha256-mAczHrFEH1LEH1IEUc7ZXTWtaPBrvIdSvkUqOCupyRs=";
+
hash = "sha256-ybM3dQhTogjhtIO5daWMXpnxUM7uWYnKONMOEx3u+58=";
};
nativeBuildInputs = [
+5 -5
pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-nix.json
···
{
"url": "https://github.com/cstrahan/tree-sitter-nix",
-
"rev": "66e3e9ce9180ae08fc57372061006ef83f0abde7",
-
"date": "2023-07-13T16:23:24+12:00",
-
"path": "/nix/store/s4wax7d0axrm8npq02lk4n1g75hzjhp0-tree-sitter-nix",
-
"sha256": "06671j6kx0b5z35mkmyygvxmjd8af9ac7kbl0w1bfwk177arz3zs",
-
"hash": "sha256-+o+f1TlhcrcCB3TNw1RyCjVZ+37e11nL+GWBPo0Mxxg=",
+
"rev": "763168fa916a333a459434f1424b5d30645f015d",
+
"date": "2023-12-26T15:36:50+13:00",
+
"path": "/nix/store/wvnrjnrb3dgc5pg5n8nkwxm43478nk2k-tree-sitter-nix",
+
"sha256": "0nn3ij8k6wkbf3kcvkyyp0vhfjcksi31wyyfwmsbx66maf2xgaii",
+
"hash": "sha256-MarXhVPVmL505c57HkbUk0kHN7jez83mcGtyM5GMw1o=",
"fetchLFS": false,
"fetchSubmodules": false,
"deepClone": false,
+2 -2
pkgs/servers/home-automation/evcc/default.nix
···
buildGoModule rec {
pname = "evcc";
-
version = "0.123.0";
+
version = "0.123.1";
src = fetchFromGitHub {
owner = "evcc-io";
repo = pname;
rev = version;
-
hash = "sha256-jqlGjDwi+QGh5gmYVoSlxQjyKvNrE9nmSfh1cOlwnoM=";
+
hash = "sha256-12xRdyBil5sTUqxmjw3af9bLdO+LTI+8qwnDQYYm9NA=";
};
vendorHash = "sha256-rhGMN5v+JzNg1p2GptomDDtqS7M4EafROXXy185qtmU=";
+3 -3
pkgs/tools/misc/goreleaser/default.nix
···
}:
buildGoModule rec {
pname = "goreleaser";
-
version = "1.22.1";
+
version = "1.23.0";
src = fetchFromGitHub {
owner = "goreleaser";
repo = pname;
rev = "v${version}";
-
hash = "sha256-Okuiicq1CAVrE3YPe/aF/HZbf23p6ulz//BRGX77cnw=";
+
hash = "sha256-b3yXabHqpw0npkTlO4eKy41agtDV1QnpfctBYv4BV/Q=";
};
-
vendorHash = "sha256-+ac4q820gETsNRVpW2u0MXU6HfoztLdsWK2HYqJ4mqo=";
+
vendorHash = "sha256-c9fygb6ywTUwcF1jbgr8YQ0SR7u36C0bRDljakQRdGA=";
ldflags =
[ "-s" "-w" "-X main.version=${version}" "-X main.builtBy=nixpkgs" ];
+3 -3
pkgs/tools/security/spire/default.nix
···
buildGoModule rec {
pname = "spire";
-
version = "1.8.3";
+
version = "1.8.7";
outputs = [ "out" "agent" "server" ];
···
owner = "spiffe";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-xfSOmUfBoIQSI9u2YD3CxBIOiT7QxMi3fJZUVeZo39o=";
+
sha256 = "sha256-D6NNG//1rM7EIzawKdMA/8nloqMNAkF75YyFpHvxUkI=";
};
-
vendorHash = "sha256-9j/EZntVW40QHYJi9NvAKX/4uGxLolk75GNennQ6ymY=";
+
vendorHash = "sha256-bSQitqXTY1LMnpGkXAmDiDsMd0xZHrcr/Ms1F6avBKM=";
subPackages = [ "cmd/spire-agent" "cmd/spire-server" ];
+2
pkgs/top-level/python-packages.nix
···
ffmpy = callPackage ../development/python-modules/ffmpy { };
+
fhir-py = callPackage ../development/python-modules/fhir-py { };
+
fiblary3-fork = callPackage ../development/python-modules/fiblary3-fork { };
fido2 = callPackage ../development/python-modules/fido2 { };