Merge master into staging-next

main
github-actions[bot] 2 years ago committed by GitHub
commit a993c6ae0e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
  1. 6
      maintainers/maintainer-list.nix
  2. 2
      nixos/modules/hardware/gpgsmartcards.nix
  3. 2
      nixos/modules/programs/captive-browser.nix
  4. 2
      nixos/modules/services/monitoring/mimir.nix
  5. 1
      nixos/modules/services/web-apps/hedgedoc.nix
  6. 2
      nixos/tests/all-tests.nix
  7. 2
      nixos/tests/mimir.nix
  8. 4
      pkgs/applications/misc/gnome-secrets/default.nix
  9. 6
      pkgs/applications/networking/cluster/roxctl/default.nix
  10. 8
      pkgs/applications/networking/instant-messengers/slack-term/default.nix
  11. 4
      pkgs/applications/networking/sniffers/wireshark/default.nix
  12. 4
      pkgs/applications/system/glances/default.nix
  13. 1
      pkgs/build-support/trivial-builders.nix
  14. 4
      pkgs/development/libraries/libmediaart/default.nix
  15. 4
      pkgs/development/python-modules/browser-cookie3/default.nix
  16. 10
      pkgs/development/python-modules/deezer-python/default.nix
  17. 6
      pkgs/development/python-modules/fakeredis/default.nix
  18. 4
      pkgs/development/python-modules/google-cloud-asset/default.nix
  19. 4
      pkgs/development/python-modules/google-cloud-bigquery-datatransfer/default.nix
  20. 4
      pkgs/development/python-modules/google-cloud-bigquery-logging/default.nix
  21. 4
      pkgs/development/python-modules/google-cloud-bigquery-storage/default.nix
  22. 4
      pkgs/development/python-modules/google-cloud-container/default.nix
  23. 4
      pkgs/development/python-modules/google-cloud-datacatalog/default.nix
  24. 4
      pkgs/development/python-modules/google-cloud-dataproc/default.nix
  25. 4
      pkgs/development/python-modules/google-cloud-datastore/default.nix
  26. 4
      pkgs/development/python-modules/google-cloud-dlp/default.nix
  27. 4
      pkgs/development/python-modules/google-cloud-error-reporting/default.nix
  28. 4
      pkgs/development/python-modules/google-cloud-iam-logging/default.nix
  29. 4
      pkgs/development/python-modules/google-cloud-iam/default.nix
  30. 4
      pkgs/development/python-modules/google-cloud-iot/default.nix
  31. 4
      pkgs/development/python-modules/google-cloud-kms/default.nix
  32. 4
      pkgs/development/python-modules/google-cloud-language/default.nix
  33. 4
      pkgs/development/python-modules/google-cloud-os-config/default.nix
  34. 4
      pkgs/development/python-modules/google-cloud-runtimeconfig/default.nix
  35. 4
      pkgs/development/python-modules/google-cloud-tasks/default.nix
  36. 4
      pkgs/development/python-modules/google-cloud-texttospeech/default.nix
  37. 4
      pkgs/development/python-modules/google-cloud-websecurityscanner/default.nix
  38. 12
      pkgs/development/python-modules/oauthenticator/default.nix
  39. 6
      pkgs/development/tools/build-managers/scala-cli/sources.json
  40. 26
      pkgs/development/tools/goresym/default.nix
  41. 6
      pkgs/development/tools/rust/cargo-generate/default.nix
  42. 4
      pkgs/development/tools/rust/rust-analyzer/test-neovim-lsp.nix
  43. 2
      pkgs/pkgs-lib/formats.nix
  44. 20
      pkgs/servers/adguardhome/bins.nix
  45. 2
      pkgs/servers/adguardhome/default.nix
  46. 2
      pkgs/servers/monitoring/mimir/default.nix
  47. 6
      pkgs/shells/zsh/oh-my-zsh/default.nix
  48. 29
      pkgs/tools/bluetooth/bluewalker/default.nix
  49. 98
      pkgs/tools/filesystems/ntfs-3g/autoconf-sbin-helpers.patch
  50. 48
      pkgs/tools/filesystems/ntfs-3g/consistent-sbindir-usage.patch
  51. 41
      pkgs/tools/filesystems/ntfs-3g/default.nix
  52. 14
      pkgs/tools/system/runitor/default.nix
  53. 1
      pkgs/top-level/aliases.nix
  54. 6
      pkgs/top-level/all-packages.nix

@ -2334,6 +2334,12 @@
githubId = 3956062;
name = "Simon Lackerbauer";
};
cimm = {
email = "8k9ft8m5gv@astil.be";
github = "cimm";
githubId = 68112;
name = "Simon";
};
cirno-999 = {
email = "reverene@protonmail.com";
github = "cirno-999";

@ -19,7 +19,7 @@ let
# per debian's udev deb hook (https://man7.org/linux/man-pages/man1/dh_installudev.1.html)
destination = "60-scdaemon.rules";
scdaemonUdevRulesPkg = pkgs.runCommandNoCC "scdaemon-udev-rules" {} ''
scdaemonUdevRulesPkg = pkgs.runCommand "scdaemon-udev-rules" {} ''
loc="$out/lib/udev/rules.d/"
mkdir -p "''${loc}"
cp "${scdaemonRules}" "''${loc}/${destination}"

@ -98,7 +98,7 @@ in
config = mkIf cfg.enable {
environment.systemPackages = [
(pkgs.runCommandNoCC "captive-browser-desktop-item" { } ''
(pkgs.runCommand "captive-browser-desktop-item" { } ''
install -Dm444 -t $out/share/applications ${desktopItem}/share/applications/*.desktop
'')
];

@ -53,7 +53,7 @@ in {
else cfg.configFile;
in
{
ExecStart = "${pkgs.grafana-mimir}/bin/mimir --config.file=${conf}";
ExecStart = "${pkgs.mimir}/bin/mimir --config.file=${conf}";
DynamicUser = true;
Restart = "always";
ProtectSystem = "full";

@ -1027,6 +1027,7 @@ in
${pkgs.envsubst}/bin/envsubst \
-o ${cfg.workDir}/config.json \
-i ${prettyJSON cfg.configuration}
mkdir -p ${cfg.configuration.uploadsPath}
'';
serviceConfig = {
WorkingDirectory = cfg.workDir;

@ -170,7 +170,7 @@ in {
frr = handleTest ./frr.nix {};
fsck = handleTest ./fsck.nix {};
ft2-clone = handleTest ./ft2-clone.nix {};
grafana-mimir = handleTest ./grafana-mimir.nix {};
mimir = handleTest ./mimir.nix {};
gerrit = handleTest ./gerrit.nix {};
geth = handleTest ./geth.nix {};
ghostunnel = handleTest ./ghostunnel.nix {};

@ -1,5 +1,5 @@
import ./make-test-python.nix ({ pkgs, ... }: {
name = "grafana-mimir";
name = "mimir";
nodes = {
server = { ... }: {
environment.systemPackages = [ pkgs.jq ];

@ -16,7 +16,7 @@
python3Packages.buildPythonApplication rec {
pname = "gnome-secrets";
version = "6.4";
version = "6.5";
format = "other";
strictDeps = false; # https://github.com/NixOS/nixpkgs/issues/56943
@ -25,7 +25,7 @@ python3Packages.buildPythonApplication rec {
owner = "World";
repo = "secrets";
rev = version;
sha256 = "sha256-qO2DJ/Eb9+G1R3un2+n9Tf6oxpGrEuH3SBrajQ9tCPU=";
sha256 = "sha256-Hy2W7cvvzVcKtd/KzTn81awoolnfM3ST0Nm70YBLTYY=";
};
nativeBuildInputs = [

@ -2,16 +2,16 @@
buildGoModule rec {
pname = "roxctl";
version = "3.69.1";
version = "3.70.0";
src = fetchFromGitHub {
owner = "stackrox";
repo = "stackrox";
rev = version;
sha256 = "sha256-fB43C+gMtUOg/Ah1fOTnOWOUmS0TjXkNCzw/TKfMzj4=";
sha256 = "sha256-VnnMD2tRixCswO/9nrP3PgXmev6O8QUTbkwmFIpPUyE=";
};
vendorSha256 = "sha256-M+ZueycJEaDVzC2bFwQc5EulCrdz6lvzyD8YCoGyW1g=";
vendorSha256 = "sha256-xh2bgLSWjQHOjHrgDpQri78LvCL4CDbMteQYARyGLgg=";
nativeBuildInputs = [ installShellFiles ];

@ -1,18 +1,16 @@
{ lib, buildGoPackage, fetchFromGitHub }:
{ lib, buildGoModule, fetchFromGitHub }:
buildGoPackage rec {
# https://github.com/erroneousboat/slack-term
buildGoModule rec {
pname = "slack-term";
version = "0.5.0";
goPackagePath = "github.com/erroneousboat/slack-term";
src = fetchFromGitHub {
owner = "erroneousboat";
repo = "slack-term";
rev = "v${version}";
sha256 = "1fbq7bdhy70hlkklppimgdjamnk0v059pg73xm9ax1f4616ki1m6";
};
vendorSha256 = null;
meta = with lib; {
description = "Slack client for your terminal";

@ -11,7 +11,7 @@ assert withQt -> qt5 != null;
with lib;
let
version = "3.6.3";
version = "3.6.5";
variant = if withQt then "qt" else "cli";
in stdenv.mkDerivation {
@ -21,7 +21,7 @@ in stdenv.mkDerivation {
src = fetchurl {
url = "https://www.wireshark.org/download/src/all-versions/wireshark-${version}.tar.xz";
sha256 = "sha256-tgNkpMAGihCBGrP9B1ymwesOddRGACcbiKIO2Tou9jE=";
sha256 = "sha256-otdB1g/zUWE31LnzjNwH7uVKVuw2BG9MOv7mv7T26qE=";
};
cmakeFlags = [

@ -9,14 +9,14 @@
buildPythonApplication rec {
pname = "glances";
version = "3.2.4.2";
version = "3.2.5";
disabled = isPyPy;
src = fetchFromGitHub {
owner = "nicolargo";
repo = "glances";
rev = "v${version}";
sha256 = "0gql61lrav3f7wbsvgc1d6vf8r0xi5xs9rz9d3sqw3wj5m90w0vq";
sha256 = "sha256-kTnUP7WvmEw4VazjLrGb0FhSdz+/OadzgwDXs1SA02o=";
};
# Some tests fail in the sandbox (they e.g. require access to /sys/class/power_supply):

@ -10,7 +10,6 @@ rec {
*
* Examples:
* runCommand "name" {envVariable = true;} ''echo hello > $out''
* runCommandNoCC "name" {envVariable = true;} ''echo hello > $out'' # equivalent to prior
* runCommandCC "name" {} ''gcc -o myfile myfile.c; cp myfile $out'';
*
* The `*Local` variants force a derivation to be built locally,

@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "libmediaart";
version = "1.9.5";
version = "1.9.6";
outputs = [ "out" "dev" "devdoc" ];
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
sha256 = "1mlw1qgj8nkd9ll6b6h54r1gfdy3zp8a8xqz7qfyfaj85jjgbph7";
sha256 = "w7xQJdfbOAWH+cjrgAxhH2taFta0t4/P+T9ih2pnfxc=";
};
nativeBuildInputs = [ meson ninja pkg-config vala gtk-doc docbook_xsl docbook_xml_dtd_412 gobject-introspection ];

@ -12,14 +12,14 @@
buildPythonPackage rec {
pname = "browser-cookie3";
version = "0.14.1";
version = "0.14.2";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
hash = "sha256-2cMWFyHK+7M99Z9O7PiKue37c5XVBe/n88AF5ax7A2s=";
hash = "sha256-YR5NcDmbLlnhxcDuyM6hjjuL/Ozw79ytbCF4/nmSZmQ=";
};
propagatedBuildInputs = [

@ -13,16 +13,16 @@
buildPythonPackage rec {
pname = "deezer-python";
version = "5.3.2";
version = "5.3.3";
format = "pyproject";
disabled = pythonOlder "3.6";
disabled = pythonOlder "3.7";
src = fetchFromGitHub {
owner = "browniebroke";
repo = pname;
rev = "refs/tags/v${version}";
sha256 = "sha256-lOVHSYL57hwzvdC+pJFDkDGFuu29jdZ36BYscw82uDE=";
hash = "sha256-eiznL23Pt7bwBLxNG8V3ITSNMnwMBjFdiGgu0cSoSw0=";
};
nativeBuildInputs = [
@ -46,7 +46,9 @@ buildPythonPackage rec {
--replace " --cov=deezer" ""
'';
pythonImportsCheck = [ "deezer" ];
pythonImportsCheck = [
"deezer"
];
meta = with lib; {
description = "Python wrapper around the Deezer API";

@ -16,7 +16,7 @@
buildPythonPackage rec {
pname = "fakeredis";
version = "1.8";
version = "1.8.1";
format = "pyproject";
disabled = pythonOlder "3.7";
@ -24,8 +24,8 @@ buildPythonPackage rec {
src = fetchFromGitHub {
owner = "dsoftwareinc";
repo = "fakeredis-py";
rev = "v${version}";
hash = "sha256-HWt2EE25h8zUarknrNMBJmizP3rNM9W8IEUMxLyUii8=";
rev = "refs/tags/v${version}";
hash = "sha256-gmQuQIlpE4PdgZ1J5aucSQkJpfrh1qTJNLfyI+cMCJU=";
};
nativeBuildInputs = [

@ -17,14 +17,14 @@
buildPythonPackage rec {
pname = "google-cloud-asset";
version = "3.9.0";
version = "3.9.1";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
hash = "sha256-DMRBAzGlByjcdLr/HnVxFxbNWK1TbYFpYKEjDdzfEeg=";
hash = "sha256-rGN3P4EfSs7bLLca4Y2J1jF1/wPR5Oc1d6iZFjeQHTM=";
};
propagatedBuildInputs = [

@ -13,14 +13,14 @@
buildPythonPackage rec {
pname = "google-cloud-bigquery-datatransfer";
version = "3.6.1";
version = "3.6.2";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
hash = "sha256-hR5qHucBpq1LS9pIZeovcPMiVbw3dhSeeJxkYH8xuMk=";
hash = "sha256-y8W0qwm4rTHlDO8L+/fhIJlfW5PonUhAYBU5wLIZJ94=";
};
propagatedBuildInputs = [

@ -11,11 +11,11 @@
buildPythonPackage rec {
pname = "google-cloud-bigquery-logging";
version = "1.0.2";
version = "1.0.3";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-i8Bh39MnQRQtE4WwDNhHdxFX2bGL6txT+sV8RcvXiZw=";
sha256 = "sha256-hIwKcQNPG6AHudqjy2dotACk51IeivwRbJZZaiFweqs=";
};
propagatedBuildInputs = [

@ -9,11 +9,11 @@
buildPythonPackage rec {
pname = "google-cloud-bigquery-storage";
version = "2.13.1";
version = "2.13.2";
src = fetchPypi {
inherit pname version;
sha256 = "7a25148f635a04ca9ff568d47e64be275d3a4a3c90772524879e8f88f270d92d";
sha256 = "sha256-rEznNOgFrKfnOmlhexTTHmkKETRGE26SKSp04diz47I=";
};
propagatedBuildInputs = [

@ -13,14 +13,14 @@
buildPythonPackage rec {
pname = "google-cloud-container";
version = "2.10.7";
version = "2.10.8";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
hash = "sha256-I3oYldj915GBCX5VLEZRqGS7jMHWasQGVIvj50EUTK4=";
hash = "sha256-cQ5wFAwgqT2NT+jTfsg13wA7OOq8bk/QIRiIsK2ZyJ0=";
};
propagatedBuildInputs = [

@ -13,14 +13,14 @@
buildPythonPackage rec {
pname = "google-cloud-datacatalog";
version = "3.8.0";
version = "3.8.1";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
hash = "sha256-kGYfdvAnvdFm/1u0CS+n6rGKhV5GtGhW1zF7SVUu8PY=";
hash = "sha256-t7kFCkyH3/MNGFX8S4OzgWnW/NSomAFDbDPCx9hV40g=";
};
propagatedBuildInputs = [

@ -12,14 +12,14 @@
buildPythonPackage rec {
pname = "google-cloud-dataproc";
version = "4.0.2";
version = "4.0.3";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-C2hAkWSb3h+lFC3pUIHlttme44Ugfae8opmFQbVWYTE=";
sha256 = "sha256-9PqMYqZpcy+Lv/3sh5Ru0X0wQWW5VW7CDsFGgHvErpU=";
};
propagatedBuildInputs = [

@ -13,11 +13,11 @@
buildPythonPackage rec {
pname = "google-cloud-datastore";
version = "2.6.1";
version = "2.6.2";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-2ItUrY5oMTtWig2UIC2IEOKgaaYsVuy9ralDitzQzdc=";
sha256 = "sha256-Ie/SyTY8AkmDXRKWwZiukD76HpwJEtp7IBusWj+Y4HE=";
};
propagatedBuildInputs = [

@ -14,14 +14,14 @@
buildPythonPackage rec {
pname = "google-cloud-dlp";
version = "3.7.0";
version = "3.7.1";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
hash = "sha256-aUabWEz+ou12Lgys7PZnldjHnifPWPPqO8iJqkDgx9U=";
hash = "sha256-q2I3ku8f55rSJQE5oiDttQOJFYtGPjmrW7htrZ+BMPU=";
};
propagatedBuildInputs = [

@ -13,14 +13,14 @@
buildPythonPackage rec {
pname = "google-cloud-error-reporting";
version = "1.5.2";
version = "1.5.3";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
hash = "sha256-wjRUPBZwyGP+2528vZ/x4EqiZwqH+9ZvK5rx4ISklHE=";
hash = "sha256-J+MzM6aaVy4xmlNUFhSOgAomT007p3ODYVXN71UmZJA=";
};
propagatedBuildInputs = [

@ -12,14 +12,14 @@
buildPythonPackage rec {
pname = "google-cloud-iam-logging";
version = "1.0.1";
version = "1.0.2";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
hash = "sha256-ZmoBaY0OM2pQcqasGCJQIeN6Rmbo4xlYK7LtH7SecgY=";
hash = "sha256-f5ZETn1zLrC+1Gil47zzJGanx7cFBisdoFPoDe1FFwo=";
};
propagatedBuildInputs = [

@ -12,12 +12,12 @@
buildPythonPackage rec {
pname = "google-cloud-iam";
version = "2.6.1";
version = "2.6.2";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-c1XPE5PBDXRgpiKGBfAhHB6yTPyvby3aZ5nF40+qFiQ=";
sha256 = "sha256-IOl5ZWekpiikOOMQ/afryiP+0lPLt4idSmVARRJj8LE=";
};
propagatedBuildInputs = [ google-api-core libcst proto-plus ];

@ -12,11 +12,11 @@
buildPythonPackage rec {
pname = "google-cloud-iot";
version = "2.5.0";
version = "2.5.1";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-bZ2Zn4r+hQ2MfkgXmJPYWbKy3tYlTkYh6ohmWQA/75U=";
sha256 = "sha256-Y71v505bwXEV1u28WFAHs12Qx0tKY7BDjFCc+oBgZcw=";
};
propagatedBuildInputs = [ grpc-google-iam-v1 google-api-core libcst proto-plus ];

@ -12,11 +12,11 @@
buildPythonPackage rec {
pname = "google-cloud-kms";
version = "2.11.1";
version = "2.11.2";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-n0alfJIsaqhQ4Wr4/d2JRXTCE24JTrRJBsYOnRhpV00=";
sha256 = "sha256-X95xD/L18dXPYxCbvxIPjaOolMSDr7vpyQnzb5oMFEQ=";
};
propagatedBuildInputs = [ grpc-google-iam-v1 google-api-core libcst proto-plus ];

@ -12,14 +12,14 @@
buildPythonPackage rec {
pname = "google-cloud-language";
version = "2.4.2";
version = "2.4.3";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-kxJySGikHdichitekEiPjzs48bDqWaXMBhmI6IAwKRM=";
sha256 = "sha256-1N5nnT22ILyaubDrpj2bS260AP4YrjrMQ0tgBA3OChg=";
};
propagatedBuildInputs = [

@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "google-cloud-os-config";
version = "1.11.1";
version = "1.11.2";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-i4STXwnFyfXauRx4zvYMO1uWMechvNUOxolOcY3Z5us=";
sha256 = "sha256-n3bCKr+fszqHsi6uDmOXSfzoPP8JfpZRAGXIzE3gOVU=";
};
propagatedBuildInputs = [ google-api-core libcst proto-plus ];

@ -9,11 +9,11 @@
buildPythonPackage rec {
pname = "google-cloud-runtimeconfig";
version = "0.33.0";
version = "0.33.1";
src = fetchPypi {
inherit pname version;
sha256 = "cc85e5de7cdb58a27561885021ee6fcf1d9f89e0f0db7c371bdca9c54788dd15";
sha256 = "sha256-SKinB6fiBh+oe+lb2IGMD6248DDOrG7g3kiFpMGX4BU=";
};
propagatedBuildInputs = [ google-api-core google-cloud-core ];

@ -12,11 +12,11 @@
buildPythonPackage rec {
pname = "google-cloud-tasks";
version = "2.9.0";
version = "2.9.1";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-MjXGDlqRDFn2whxnEm1lf0G+vU9U/S3BmNvi47aEJro=";
sha256 = "sha256-wIO22BScrDJdbia6oOEuuXptedxrCehqWKLXmxTJmKE=";
};
propagatedBuildInputs = [ google-api-core grpc-google-iam-v1 libcst proto-plus ];

@ -11,11 +11,11 @@
buildPythonPackage rec {
pname = "google-cloud-texttospeech";
version = "2.11.0";
version = "2.11.1";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-UJSP3a9G6k1arMpoh4/rWrnR4gYtPW6d6LGwWuk5WGg=";
sha256 = "sha256-4I7zmjZMjXjkxjEtwWNbev0ryTOIyOWsVkC46tgRyqc=";
};
propagatedBuildInputs = [ libcst google-api-core proto-plus ];

@ -11,11 +11,11 @@
buildPythonPackage rec {
pname = "google-cloud-websecurityscanner";
version = "1.7.1";
version = "1.7.2";
src = fetchPypi {
inherit pname version;
sha256 = "sha256-yK4xEu9rfFkA6RDNDjul0V+Xjc8TehJ6f8lv1k2WULc=";
sha256 = "sha256-JDuMhyk1018pMYNOhRVmP7XyF2wsK5temDTP5033Dxk=";
};
propagatedBuildInputs = [ google-api-core libcst proto-plus ];

@ -14,12 +14,14 @@
buildPythonPackage rec {
pname = "oauthenticator";
version = "14.2.0";
version = "15.0.0";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
sha256 = "4baa02ff2c159cbba06f8d07fe11a6e624285ca2f813b1258b4c68766c0ee46b";
hash = "sha256-d1toYgrufnVd10QhJ4nhQqyDRaq4CjWLDjC+7ABNp6Y=";
};
propagatedBuildInputs = [
@ -37,12 +39,14 @@ buildPythonPackage rec {
];
disabledTests = [
# Test are outdated, https://github.com/jupyterhub/oauthenticator/issues/432
# Tests are outdated, https://github.com/jupyterhub/oauthenticator/issues/432
"test_azuread"
"test_mediawiki"
];
pythonImportsCheck = [ "oauthenticator" ];
pythonImportsCheck = [
"oauthenticator"
];
meta = with lib; {
description = "Authenticate JupyterHub users with common OAuth providers, including GitHub, Bitbucket, and more.";

@ -1,13 +1,13 @@
{
"version": "0.1.6",
"version": "0.1.7",
"assets": {
"x86_64-darwin": {
"asset": "scala-cli-x86_64-apple-darwin.gz",
"sha256": "1wcm47x0w4gdhkqrqjn0qvgnn36c707mz9m260pdnnffja203vyr"
"sha256": "1sly3s9y742nms8kqwh2cikjkcnbkkafsql8sw2w2zr53z28g10v"
},
"x86_64-linux": {
"asset": "scala-cli-x86_64-pc-linux.gz",
"sha256": "1jwv67p2r6kxqlz8p2zvk5g5jdswl8cymj822b88lbp78a497kc6"
"sha256": "1lgcbxzhwqfnj6n81w1ssdcrn1j0c93chqgh0zzqi08w8wk3x4j5"
}
}
}

@ -0,0 +1,26 @@
{ stdenv, lib, fetchFromGitHub, buildGoModule }:
buildGoModule rec {
pname = "goresym";
version = "1.2";
src = fetchFromGitHub {
owner = "mandiant";
repo = pname;
rev = "v${version}";
sha256 = "sha256-XDy6qALE2xuOVQHuuvU/gOyTRZ/6CWpyjN3i7VmznoI=";
};
subPackages = [ "." ];
vendorSha256 = "sha256-dnQ/tP4RS6WkACobfW7jTTJSHbLrdlZDy1fmO65743Q=";
doCheck = true;
meta = with lib; {
description = "Go symbol recovery tool";
homepage = "https://github.com/mandiant/GoReSym";
license = licenses.mit;
maintainers = with maintainers; [ mrhedgehog ];
};
}

@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "cargo-generate";
version = "0.12.0";
version = "0.14.0";
src = fetchFromGitHub {
owner = "ashleygwilliams";
repo = "cargo-generate";
rev = "v${version}";
sha256 = "sha256-VMcyBa8bjH4n8hKS+l5xcaQCBYkBVWjDV2uk4JmhxFs=";
sha256 = "sha256-OYYGOB1NfNnOl8bd8KozgMCyW4Gb39LoFtD80DPzpdw=";
};
cargoSha256 = "sha256-9RMzvZLGRFGJ0Bw2is2aeRCoLzHsZZ6LCfoCTrKjHbo=";
cargoSha256 = "sha256-qmRKjPhPLpzVVuTHuoo0iTlX3BnT2Udo1kFXvA3zNQE=";
nativeBuildInputs = [ pkg-config ];

@ -1,5 +1,5 @@
{ runCommandNoCC, cargo, neovim, rust-analyzer, rustc }:
runCommandNoCC "test-neovim-rust-analyzer" {
{ runCommand, cargo, neovim, rust-analyzer, rustc }:
runCommand "test-neovim-rust-analyzer" {
nativeBuildInputs = [ cargo neovim rust-analyzer rustc ];
testRustSrc = /* rust */ ''

@ -357,7 +357,7 @@ rec {
} // lib.mapAttrs (_name: type: elixirOr type) lib.types;
};
generate = name: value: pkgs.runCommandNoCC name
generate = name: value: pkgs.runCommand name
{
value = toConf value;
passAsFile = [ "value" ];

@ -1,23 +1,23 @@
{ fetchurl, fetchzip }:
{
x86_64-darwin = fetchzip {
sha256 = "sha256-vUOdHDyvVg+8GhctW925WfjONi7TnPRfVfXmehOweB4=";
url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.6/AdGuardHome_darwin_amd64.zip";
sha256 = "sha256-z7QFnx414sdGazUZIenAVA+7LcSZT0tTb/ldv1SGV3Q=";
url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.7/AdGuardHome_darwin_amd64.zip";
};
aarch64-darwin = fetchzip {
sha256 = "sha256-3JmMvxd317Qmyrv7vWyfQsLol+yPuKBXHByt5YRrbX8=";
url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.6/AdGuardHome_darwin_arm64.zip";
sha256 = "sha256-Pbl7YaDVxdER/ubOiPq54ASB4ILnH0B3GiQlQBe7gFs=";
url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.7/AdGuardHome_darwin_arm64.zip";
};
i686-linux = fetchurl {
sha256 = "sha256-A6IsDRbRHyU0+IUKkrudKvlKiJkVNNs12MrKQ6RlpMQ=";
url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.6/AdGuardHome_linux_386.tar.gz";
sha256 = "sha256-P2PsSdpW5i2hwBPUKb+viYewlVHTER/eBkwPp3koawo=";
url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.7/AdGuardHome_linux_386.tar.gz";
};
x86_64-linux = fetchurl {
sha256 = "sha256-nPcqAk0m1e9izkylBuNcatHESgvSewR+MKmVdz+HBec=";
url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.6/AdGuardHome_linux_amd64.tar.gz";
sha256 = "sha256-cbTlVBlGdFgEz2b6pb0SJ7yUf4wFXnZwLCkmvX75FzU=";
url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.7/AdGuardHome_linux_amd64.tar.gz";
};
aarch64-linux = fetchurl {
sha256 = "sha256-ITkZdVU03FG9AUAMgD6nlCyioPJX357wB9m1jYdPlS4=";
url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.6/AdGuardHome_linux_arm64.tar.gz";
sha256 = "sha256-TKZ3bOM5oq30GtLn9ifNyY6+2Li4nf1+r2L0ExG/10c=";
url = "https://github.com/AdguardTeam/AdGuardHome/releases/download/v0.107.7/AdGuardHome_linux_arm64.tar.gz";
};
}

@ -7,7 +7,7 @@ in
stdenv.mkDerivation rec {
pname = "adguardhome";
version = "0.107.6";
version = "0.107.7";
src = sources.${system} or (throw "Source for ${pname} is not available for ${system}");
installPhase = ''

@ -18,7 +18,7 @@ buildGoModule rec {
];
passthru.tests = {
inherit (nixosTests) grafana-mimir;
inherit (nixosTests) mimir;
};
ldflags = let t = "github.com/grafana/mimir/pkg/util/version";

@ -5,15 +5,15 @@
, git, nix, nixfmt, jq, coreutils, gnused, curl, cacert, bash }:
stdenv.mkDerivation rec {
version = "2022-06-05";
version = "2022-06-06";
pname = "oh-my-zsh";
rev = "6622210d7d4afe859f11c5d50c177bd5e500f2c6";
rev = "d41ca84af1271e8bfbe26f581cebe3b86521d0db";
src = fetchFromGitHub {
inherit rev;
owner = "ohmyzsh";
repo = "ohmyzsh";
sha256 = "3+3ekdryhiILou+8yJpq7axS2PEHDCWnBCQ5373m1uo=";
sha256 = "87jAe5cEPj6e1raovj8sD4LZB1sfrSZkCleW8of2HP8=";
};
strictDeps = true;

@ -0,0 +1,29 @@
{ lib, buildGoModule, fetchFromGitLab }:
buildGoModule rec {
pname = "bluewalker";
version = "0.3.0";
src = fetchFromGitLab {
owner = "jtaimisto";
repo = pname;
rev = "v${version}";
sha256 = "sha256-spuJRiNiaBV4EsetUq8vUfR6ejUNZxLhVzS3AZZyrrQ=";
};
vendorSha256 = "189qs6vmx63vwsjmc4qgf1y8xjsi7x6l1f5c3kd8j8jnagl26z4h";
ldflags = [
"-w"
"-s"
];
meta = with lib; {
description = "Simple command line Bluetooth LE scanner";
homepage = "https://gitlab.com/jtaimisto/bluewalker";
changelog = "https://gitlab.com/jtaimisto/bluewalker/-/tags/v${version}";
license = licenses.bsd2;
maintainers = with maintainers; [ cimm ];
platforms = platforms.linux;
};
}

@ -0,0 +1,98 @@
diff --git a/configure.ac b/configure.ac
index 9aa25bd5..c7c0437b 100644
--- a/configure.ac
+++ b/configure.ac
@@ -185,6 +185,30 @@ AC_ARG_ENABLE(
]
)
+AC_ARG_WITH(
+ [mount-helper],
+ [AS_HELP_STRING([--with-mount-helper=BIN],[use the specified binary as mount helper @<:@default=/sbin/mount@:>@])],
+ [mount_helper="$withval"],
+ [mount_helper="/sbin/mount"]
+)
+AC_DEFINE_UNQUOTED([MOUNT_HELPER], ["$mount_helper"], [Binary used as mount helper.])
+
+AC_ARG_WITH(
+ [umount-helper],
+ [AS_HELP_STRING([--with-umount-helper=BIN],[use the specified binary as umount helper @<:@default=/sbin/umount@:>@])],
+ [umount_helper="$withval"],
+ [umount_helper="/sbin/umount"]
+)
+AC_DEFINE_UNQUOTED([UMOUNT_HELPER], ["$umount_helper"], [Binary used as umount helper.])
+
+AC_ARG_WITH(
+ [modprobe-helper],
+ [AS_HELP_STRING([--with-modprobe-helper=BIN],[use the specified binary as modprobe helper @<:@default=/sbin/modprobe@:>@])],
+ [modprobe_helper="$withval"],
+ [modprobe_helper="/sbin/modprobe"]
+)
+AC_DEFINE_UNQUOTED([MODPROBE_HELPER], ["$modprobe_helper"], [Binary used as modprobe helper.])
+
# pthread_rwlock_t requires _GNU_SOURCE
AC_GNU_SOURCE
diff --git a/libfuse-lite/mount_util.c b/libfuse-lite/mount_util.c
index 8b317224..ee75ace6 100644
--- a/libfuse-lite/mount_util.c
+++ b/libfuse-lite/mount_util.c
@@ -89,10 +89,10 @@ int fuse_mnt_add_mount(const char *progname, const char *fsname,
exit(1);
}
rmdir(tmp);
- execle("/sbin/mount", "/sbin/mount", "-F", type, "-o", opts,
+ execle(MOUNT_HELPER, MOUNT_HELPER, "-F", type, "-o", opts,
fsname, mnt, NULL, &env);
- fprintf(stderr, "%s: failed to execute /sbin/mount: %s\n", progname,
- strerror(errno));
+ fprintf(stderr, "%s: failed to execute %s: %s\n", progname,
+ MOUNT_HELPER, strerror(errno));
exit(1);
}
res = waitpid(res, &status, 0);
@@ -126,14 +126,14 @@ int fuse_mnt_umount(const char *progname, const char *mnt, int lazy)
setuid(geteuid());
if (lazy) {
- execle("/sbin/umount", "/sbin/umount", mnt,
+ execle(UMOUNT_HELPER, UMOUNT_HELPER, mnt,
NULL, &env);
} else {
- execle("/sbin/umount", "/sbin/umount", "-f", mnt,
+ execle(UMOUNT_HELPER, UMOUNT_HELPER, "-f", mnt,
NULL, &env);
}
- fprintf(stderr, "%s: failed to execute /sbin/umount: %s\n", progname,
- strerror(errno));
+ fprintf(stderr, "%s: failed to execute %s: %s\n", progname,
+ UMOUNT_HELPER, strerror(errno));
exit(1);
}
res = waitpid(res, &status, 0);
diff --git a/src/lowntfs-3g.c b/src/lowntfs-3g.c
index 9330500c..dd18a93f 100644
--- a/src/lowntfs-3g.c
+++ b/src/lowntfs-3g.c
@@ -4463,7 +4463,7 @@ static fuse_fstype load_fuse_module(void)
int i;
struct stat st;
pid_t pid;
- const char *cmd = "/sbin/modprobe";
+ const char *cmd = MODPROBE_HELPER;
char *env = (char*)NULL;
struct timespec req = { 0, 100000000 }; /* 100 msec */
fuse_fstype fstype;
diff --git a/src/ntfs-3g.c b/src/ntfs-3g.c
index d8227e71..f5d77252 100644
--- a/src/ntfs-3g.c
+++ b/src/ntfs-3g.c
@@ -4171,7 +4171,7 @@ static fuse_fstype load_fuse_module(void)
int i;
struct stat st;
pid_t pid;
- const char *cmd = "/sbin/modprobe";
+ const char *cmd = MODPROBE_HELPER;
char *env = (char*)NULL;
struct timespec req = { 0, 100000000 }; /* 100 msec */
fuse_fstype fstype;

@ -0,0 +1,48 @@
diff --git a/ntfsprogs/Makefile.am b/ntfsprogs/Makefile.am
index 08228322..a390d8c7 100644
--- a/ntfsprogs/Makefile.am
+++ b/ntfsprogs/Makefile.am
@@ -165,7 +165,7 @@ extras: libs $(EXTRA_PROGRAMS)
if ENABLE_MOUNT_HELPER
install-exec-hook:
- $(INSTALL) -d $(DESTDIR)/$(sbindir)
+ $(INSTALL) -d $(DESTDIR)$(sbindir)
$(LN_S) -f $(sbindir)/mkntfs $(DESTDIR)$(sbindir)/mkfs.ntfs
install-data-hook:
@@ -173,7 +173,7 @@ install-data-hook:
$(LN_S) -f mkntfs.8 $(DESTDIR)$(man8dir)/mkfs.ntfs.8
uninstall-local:
- $(RM) -f $(DESTDIR)/sbin/mkfs.ntfs
+ $(RM) -f $(DESTDIR)$(sbindir)/mkfs.ntfs
$(RM) -f $(DESTDIR)$(man8dir)/mkfs.ntfs.8
endif
diff --git a/src/Makefile.am b/src/Makefile.am
index 8d984083..ea407067 100644
--- a/src/Makefile.am
+++ b/src/Makefile.am
@@ -66,9 +66,9 @@ endif
if ENABLE_MOUNT_HELPER
install-exec-local: install-rootbinPROGRAMS
- $(MKDIR_P) "$(DESTDIR)/sbin"
- $(LN_S) -f "$(rootbindir)/ntfs-3g" "$(DESTDIR)/sbin/mount.ntfs-3g"
- $(LN_S) -f "$(rootbindir)/lowntfs-3g" "$(DESTDIR)/sbin/mount.lowntfs-3g"
+ $(MKDIR_P) "$(DESTDIR)$(rootsbindir)"
+ $(LN_S) -f "$(rootbindir)/ntfs-3g" "$(DESTDIR)$(rootsbindir)/mount.ntfs-3g"
+ $(LN_S) -f "$(rootbindir)/lowntfs-3g" "$(DESTDIR)$(rootsbindir)/mount.lowntfs-3g"
install-data-local: install-man8
$(LN_S) -f ntfs-3g.8 "$(DESTDIR)$(man8dir)/mount.ntfs-3g.8"
@@ -76,7 +76,7 @@ install-data-local: install-man8
uninstall-local:
$(RM) -f "$(DESTDIR)$(man8dir)/mount.ntfs-3g.8"
- $(RM) -f "$(DESTDIR)/sbin/mount.ntfs-3g" "$(DESTDIR)/sbin/mount.lowntfs-3g"
+ $(RM) -f "$(DESTDIR)$(rootsbindir)/mount.ntfs-3g" "$(DESTDIR)$(rootsbindir)/mount.lowntfs-3g"
endif
endif # ENABLE_NTFS_3G

@ -1,30 +1,34 @@
{ lib, stdenv, fetchurl, pkg-config, mount, libuuid
, macfuse-stubs, DiskArbitration
{ lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config
, gettext, mount, libuuid, kmod, macfuse-stubs, DiskArbitration
, crypto ? false, libgcrypt, gnutls
}:
stdenv.mkDerivation rec {
pname = "ntfs3g";
version = "2021.8.22";
version = "2022.5.17";
outputs = [ "out" "dev" "man" "doc" ];
buildInputs = [ libuuid ] ++ lib.optionals crypto [ gnutls libgcrypt ]
src = fetchFromGitHub {
owner = "tuxera";
repo = "ntfs-3g";
rev = version;
sha256 = "sha256-xh8cMNIHeJ1rtk5zwOsmcxeedgZ3+MSiWn2UC7y+gtQ=";
};
buildInputs = [ gettext libuuid ]
++ lib.optionals crypto [ gnutls libgcrypt ]
++ lib.optionals stdenv.isDarwin [ macfuse-stubs DiskArbitration ];
nativeBuildInputs = [ pkg-config ];
src = fetchurl {
url = "https://tuxera.com/opensource/ntfs-3g_ntfsprogs-${version}.tgz";
sha256 = "55b883aa05d94b2ec746ef3966cb41e66bed6db99f22ddd41d1b8b94bb202efb";
};
# Note: libgcrypt is listed here non-optionally because its m4 macros are
# being used in ntfs-3g's configure.ac.
nativeBuildInputs = [ autoreconfHook libgcrypt pkg-config ];
patchPhase = ''
substituteInPlace src/Makefile.in --replace /sbin '@sbindir@'
substituteInPlace ntfsprogs/Makefile.in --replace /sbin '@sbindir@'
substituteInPlace libfuse-lite/mount_util.c \
--replace /bin/mount ${mount}/bin/mount \
--replace /bin/umount ${mount}/bin/umount
'';
patches = [
# https://github.com/tuxera/ntfs-3g/pull/39
./autoconf-sbin-helpers.patch
./consistent-sbindir-usage.patch
];
configureFlags = [
"--disable-ldconfig"
@ -34,6 +38,9 @@ stdenv.mkDerivation rec {
"--enable-xattr-mappings"
"--${if crypto then "enable" else "disable"}-crypto"
"--enable-extras"
"--with-mount-helper=${mount}/bin/mount"
"--with-umount-helper=${mount}/bin/umount"
"--with-modprobe-helper=${kmod}/bin/modprobe"
];
postInstall =
@ -42,6 +49,8 @@ stdenv.mkDerivation rec {
ln -sv mount.ntfs-3g $out/sbin/mount.ntfs
'';
enableParallelBuilding = true;
meta = with lib; {
homepage = "https://github.com/tuxera/ntfs-3g";
description = "FUSE-based NTFS driver with full write support";

@ -2,26 +2,18 @@
buildGoModule rec {
pname = "runitor";
version = "0.10.0";
version = "0.10.1";
vendorSha256 = null;
src = fetchFromGitHub {
owner = "bdd";
repo = "runitor";
rev = "v${version}";
sha256 = "sha256-96WKMeRkkG6en9JXaZjjnqeZOcLSII3knx8cdjTBAKw=";
sha256 = "sha256-qqfaA1WAHkuiyzyQbrSvnmwuRXElArErJ6PtLPOxzsg=";
};
ldflags = [
"-s" "-X main.Version=v${version}"
];
patches = [
(fetchpatch {
name = "backport_TestPostRetries-timeout-fix.patch";
url = "https://github.com/bdd/runitor/commit/418142585a8387224825637cca3fe275d3c3d147.patch";
sha256 = "sha256-cl+KYoiHm2ioFuJVKokZkglIzL/NaEd5JNUuj4g8MUg=";
})
"-s" "-w" "-X main.Version=v${version}"
];
passthru.tests.version = testers.testVersion {

@ -538,6 +538,7 @@ mapAliases ({
graalvm8-ee = throw "graalvm8-ee has been removed because it is unmaintained"; # Added 2022-04-15
graalvm11-ee = throw "graalvm11-ee has been removed because it is unmaintained"; # Added 2022-04-15
gradio = throw "gradio has been removed because it is unmaintained, use shortwave instead"; # Added 2022-06-03
grafana-mimir = throw "'grafana-mimir' has been renamed to/replaced by 'mimir'"; # Added 2022-06-07
gr-ais = gnuradio3_7.pkgs.ais; # Added 2019-05-27, changed 2020-10-16
grantlee5 = throw "'grantlee5' has been renamed to/replaced by 'libsForQt5.grantlee'"; # Converted to throw 2022-02-22
gr-gsm = gnuradio3_7.pkgs.gsm; # Added 2019-05-27, changed 2020-10-16

@ -2710,6 +2710,8 @@ with pkgs;
bluemix-cli = callPackage ../tools/admin/bluemix-cli { };
bluewalker = callPackage ../tools/bluetooth/bluewalker { };
blur-effect = callPackage ../tools/graphics/blur-effect { };
bootiso = callPackage ../tools/cd-dvd/bootiso { };
@ -21792,7 +21794,7 @@ with pkgs;
grafana-loki = callPackage ../servers/monitoring/loki { };
grafana-mimir = callPackage ../servers/monitoring/mimir { };
mimir = callPackage ../servers/monitoring/mimir { };
promtail = grafana-loki.overrideAttrs (o: {
pname = "promtail";
@ -23560,6 +23562,8 @@ with pkgs;
gore = callPackage ../development/tools/gore { };
goresym = callPackage ../development/tools/goresym { };
gotests = callPackage ../development/tools/gotests { };
gotestsum = callPackage ../development/tools/gotestsum { };

Loading…
Cancel
Save