Merge master into haskell-updates

This commit is contained in:
github-actions[bot] 2024-01-28 00:13:47 +00:00 committed by GitHub
commit bc838f6bd7
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
190 changed files with 7069 additions and 4837 deletions

View File

@ -337,6 +337,11 @@ in mkLicense lset) ({
fullName = "Creative Commons Attribution 1.0"; fullName = "Creative Commons Attribution 1.0";
}; };
cc-by-20 = {
spdxId = "CC-BY-2.0";
fullName = "Creative Commons Attribution 2.0";
};
cc-by-30 = { cc-by-30 = {
spdxId = "CC-BY-3.0"; spdxId = "CC-BY-3.0";
fullName = "Creative Commons Attribution 3.0"; fullName = "Creative Commons Attribution 3.0";

View File

@ -2795,6 +2795,12 @@
githubId = 40476330; githubId = 40476330;
name = "brokenpip3"; name = "brokenpip3";
}; };
brpaz = {
email = "oss@brunopaz.dev";
github = "brpaz";
githubId = 184563;
name = "Bruno Paz";
};
bryanasdev000 = { bryanasdev000 = {
email = "bryanasdev000@gmail.com"; email = "bryanasdev000@gmail.com";
matrix = "@bryanasdev000:matrix.org"; matrix = "@bryanasdev000:matrix.org";
@ -5259,6 +5265,13 @@
github = "edlimerkaj"; github = "edlimerkaj";
githubId = 71988351; githubId = 71988351;
}; };
edmundmiller = {
name = "Edmund Miller";
email = "git@edmundmiller.dev";
matrix = "@emiller:beeper.com";
github = "edmundmiller";
githubId = 20095261;
};
edrex = { edrex = {
email = "ericdrex@gmail.com"; email = "ericdrex@gmail.com";
github = "edrex"; github = "edrex";
@ -11231,6 +11244,15 @@
githubId = 42545625; githubId = 42545625;
name = "Maas Lalani"; name = "Maas Lalani";
}; };
mabster314 = {
name = "Max Haland";
email = "max@haland.org";
github = "mabster314";
githubId = 5741741;
keys = [{
fingerprint = "71EF 8F1F 0C24 8B4D 5CDC 1B47 74B3 D790 77EE 37A8";
}];
};
macalinao = { macalinao = {
email = "me@ianm.com"; email = "me@ianm.com";
name = "Ian Macalinao"; name = "Ian Macalinao";
@ -11374,6 +11396,12 @@
githubId = 346094; githubId = 346094;
name = "Michael Alyn Miller"; name = "Michael Alyn Miller";
}; };
mandos = {
email = "marek.maksimczyk@mandos.net.pl";
github = "mandos";
githubId = 115060;
name = "Marek Maksimczyk";
};
mangoiv = { mangoiv = {
email = "contact@mangoiv.com"; email = "contact@mangoiv.com";
github = "mangoiv"; github = "mangoiv";
@ -15818,6 +15846,11 @@
githubId = 811827; githubId = 811827;
name = "Gabriel Lievano"; name = "Gabriel Lievano";
}; };
rgri = {
name = "shortcut";
github = "rgri";
githubId = 45253749;
};
rgrinberg = { rgrinberg = {
name = "Rudi Grinberg"; name = "Rudi Grinberg";
email = "me@rgrinberg.com"; email = "me@rgrinberg.com";
@ -20424,7 +20457,6 @@
}; };
xfix = { xfix = {
email = "kamila@borowska.pw"; email = "kamila@borowska.pw";
matrix = "@xfix:matrix.org";
github = "KamilaBorowska"; github = "KamilaBorowska";
githubId = 1297598; githubId = 1297598;
name = "Kamila Borowska"; name = "Kamila Borowska";
@ -20598,6 +20630,13 @@
githubId = 11229748; githubId = 11229748;
name = "Lin Yinfeng"; name = "Lin Yinfeng";
}; };
yisraeldov = {
email = "lebow@lebowtech.com";
name = "Yisrael Dov Lebow";
github = "yisraeldov";
githubId = 138219;
matrix = "@yisraeldov:matrix.org";
};
yisuidenghua = { yisuidenghua = {
email = "bileiner@gmail.com"; email = "bileiner@gmail.com";
name = "Milena Yisui"; name = "Milena Yisui";

View File

@ -67,6 +67,8 @@ The pre-existing [services.ankisyncd](#opt-services.ankisyncd.enable) has been m
- [RustDesk](https://rustdesk.com), a full-featured open source remote control alternative for self-hosting and security with minimal configuration. Alternative to TeamViewer. - [RustDesk](https://rustdesk.com), a full-featured open source remote control alternative for self-hosting and security with minimal configuration. Alternative to TeamViewer.
- [systemd-lock-handler](https://git.sr.ht/~whynothugo/systemd-lock-handler/), a bridge between logind D-Bus events and systemd targets. Available as [services.systemd-lock-handler.enable](#opt-services.systemd-lock-handler.enable).
## Backward Incompatibilities {#sec-release-24.05-incompatibilities} ## Backward Incompatibilities {#sec-release-24.05-incompatibilities}
<!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. --> <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->
@ -240,15 +242,15 @@ The pre-existing [services.ankisyncd](#opt-services.ankisyncd.enable) has been m
- [Lilypond](https://lilypond.org/index.html) and [Denemo](https://www.denemo.org) are now compiled with Guile 3.0. - [Lilypond](https://lilypond.org/index.html) and [Denemo](https://www.denemo.org) are now compiled with Guile 3.0.
- The following options of the Nextcloud module were moved into [`services.nextcloud.extraOptions`](#opt-services.nextcloud.extraOptions) and renamed to match the name from Nextcloud's `config.php`: - The following options of the Nextcloud module were moved into [`services.nextcloud.settings`](#opt-services.nextcloud.settings) and renamed to match the name from Nextcloud's `config.php`:
- `logLevel` -> [`loglevel`](#opt-services.nextcloud.extraOptions.loglevel), - `logLevel` -> [`loglevel`](#opt-services.nextcloud.settings.loglevel),
- `logType` -> [`log_type`](#opt-services.nextcloud.extraOptions.log_type), - `logType` -> [`log_type`](#opt-services.nextcloud.settings.log_type),
- `defaultPhoneRegion` -> [`default_phone_region`](#opt-services.nextcloud.extraOptions.default_phone_region), - `defaultPhoneRegion` -> [`default_phone_region`](#opt-services.nextcloud.settings.default_phone_region),
- `overwriteProtocol` -> [`overwriteprotocol`](#opt-services.nextcloud.extraOptions.overwriteprotocol), - `overwriteProtocol` -> [`overwriteprotocol`](#opt-services.nextcloud.settings.overwriteprotocol),
- `skeletonDirectory` -> [`skeletondirectory`](#opt-services.nextcloud.extraOptions.skeletondirectory), - `skeletonDirectory` -> [`skeletondirectory`](#opt-services.nextcloud.settings.skeletondirectory),
- `globalProfiles` -> [`profile.enabled`](#opt-services.nextcloud.extraOptions._profile.enabled_), - `globalProfiles` -> [`profile.enabled`](#opt-services.nextcloud.settings._profile.enabled_),
- `extraTrustedDomains` -> [`trusted_domains`](#opt-services.nextcloud.extraOptions.trusted_domains) and - `extraTrustedDomains` -> [`trusted_domains`](#opt-services.nextcloud.settings.trusted_domains) and
- `trustedProxies` -> [`trusted_proxies`](#opt-services.nextcloud.extraOptions.trusted_proxies). - `trustedProxies` -> [`trusted_proxies`](#opt-services.nextcloud.settings.trusted_proxies).
- The option [`services.nextcloud.config.dbport`] of the Nextcloud module was removed to match upstream. - The option [`services.nextcloud.config.dbport`] of the Nextcloud module was removed to match upstream.
The port can be specified in [`services.nextcloud.config.dbhost`](#opt-services.nextcloud.config.dbhost). The port can be specified in [`services.nextcloud.config.dbhost`](#opt-services.nextcloud.config.dbhost).

View File

@ -214,6 +214,7 @@
./programs/minipro.nix ./programs/minipro.nix
./programs/miriway.nix ./programs/miriway.nix
./programs/mosh.nix ./programs/mosh.nix
./programs/mouse-actions.nix
./programs/msmtp.nix ./programs/msmtp.nix
./programs/mtr.nix ./programs/mtr.nix
./programs/nano.nix ./programs/nano.nix
@ -1235,6 +1236,7 @@
./services/system/saslauthd.nix ./services/system/saslauthd.nix
./services/system/self-deploy.nix ./services/system/self-deploy.nix
./services/system/systembus-notify.nix ./services/system/systembus-notify.nix
./services/system/systemd-lock-handler.nix
./services/system/uptimed.nix ./services/system/uptimed.nix
./services/system/zram-generator.nix ./services/system/zram-generator.nix
./services/torrent/deluge.nix ./services/torrent/deluge.nix

View File

@ -0,0 +1,15 @@
{ config, lib, pkgs, ... }:
let
cfg = config.programs.mouse-actions;
in
{
options.programs.mouse-actions = {
enable = lib.mkEnableOption ''
mouse-actions udev rules. This is a prerequisite for using mouse-actions without being root.
'';
};
config = lib.mkIf cfg.enable {
services.udev.packages = [ pkgs.mouse-actions ];
};
}

View File

@ -53,6 +53,7 @@ in {
RuntimeDirectory = "navidrome"; RuntimeDirectory = "navidrome";
RootDirectory = "/run/navidrome"; RootDirectory = "/run/navidrome";
ReadWritePaths = ""; ReadWritePaths = "";
BindPaths = lib.optional (cfg.settings ? DataFolder) cfg.settings.DataFolder;
BindReadOnlyPaths = [ BindReadOnlyPaths = [
# navidrome uses online services to download additional album metadata / covers # navidrome uses online services to download additional album metadata / covers
"${config.environment.etc."ssl/certs/ca-certificates.crt".source}:/etc/ssl/certs/ca-certificates.crt" "${config.environment.etc."ssl/certs/ca-certificates.crt".source}:/etc/ssl/certs/ca-certificates.crt"

View File

@ -11,6 +11,8 @@ in
options = { options = {
services.ratbagd = { services.ratbagd = {
enable = mkEnableOption (lib.mdDoc "ratbagd for configuring gaming mice"); enable = mkEnableOption (lib.mdDoc "ratbagd for configuring gaming mice");
package = mkPackageOption pkgs "libratbag" { };
}; };
}; };
@ -18,10 +20,10 @@ in
config = mkIf cfg.enable { config = mkIf cfg.enable {
# Give users access to the "ratbagctl" tool # Give users access to the "ratbagctl" tool
environment.systemPackages = [ pkgs.libratbag ]; environment.systemPackages = [ cfg.package ];
services.dbus.packages = [ pkgs.libratbag ]; services.dbus.packages = [ cfg.package ];
systemd.packages = [ pkgs.libratbag ]; systemd.packages = [ cfg.package ];
}; };
} }

View File

@ -37,6 +37,15 @@ in
''; '';
}; };
seedSettings = lib.mkOption {
type = with lib.types; nullOr (attrsOf (listOf (attrsOf anything)));
default = null;
description = lib.mdDoc ''
Seed settings for users and groups.
See upstream for format <https://github.com/majewsky/portunus#seeding-users-and-groups-from-static-configuration>
'';
};
stateDir = mkOption { stateDir = mkOption {
type = types.path; type = types.path;
default = "/var/lib/portunus"; default = "/var/lib/portunus";
@ -172,49 +181,53 @@ in
"127.0.0.1" = [ cfg.domain ]; "127.0.0.1" = [ cfg.domain ];
}; };
services.dex = mkIf cfg.dex.enable { services = {
enable = true; dex = mkIf cfg.dex.enable {
settings = { enable = true;
issuer = "https://${cfg.domain}/dex"; settings = {
web.http = "127.0.0.1:${toString cfg.dex.port}"; issuer = "https://${cfg.domain}/dex";
storage = { web.http = "127.0.0.1:${toString cfg.dex.port}";
type = "sqlite3"; storage = {
config.file = "/var/lib/dex/dex.db"; type = "sqlite3";
}; config.file = "/var/lib/dex/dex.db";
enablePasswordDB = false;
connectors = [{
type = "ldap";
id = "ldap";
name = "LDAP";
config = {
host = "${cfg.domain}:636";
bindDN = "uid=${cfg.ldap.searchUserName},ou=users,${cfg.ldap.suffix}";
bindPW = "$DEX_SEARCH_USER_PASSWORD";
userSearch = {
baseDN = "ou=users,${cfg.ldap.suffix}";
filter = "(objectclass=person)";
username = "uid";
idAttr = "uid";
emailAttr = "mail";
nameAttr = "cn";
preferredUsernameAttr = "uid";
};
groupSearch = {
baseDN = "ou=groups,${cfg.ldap.suffix}";
filter = "(objectclass=groupOfNames)";
nameAttr = "cn";
userMatchers = [{ userAttr = "DN"; groupAttr = "member"; }];
};
}; };
}]; enablePasswordDB = false;
connectors = [{
type = "ldap";
id = "ldap";
name = "LDAP";
config = {
host = "${cfg.domain}:636";
bindDN = "uid=${cfg.ldap.searchUserName},ou=users,${cfg.ldap.suffix}";
bindPW = "$DEX_SEARCH_USER_PASSWORD";
userSearch = {
baseDN = "ou=users,${cfg.ldap.suffix}";
filter = "(objectclass=person)";
username = "uid";
idAttr = "uid";
emailAttr = "mail";
nameAttr = "cn";
preferredUsernameAttr = "uid";
};
groupSearch = {
baseDN = "ou=groups,${cfg.ldap.suffix}";
filter = "(objectclass=groupOfNames)";
nameAttr = "cn";
userMatchers = [{ userAttr = "DN"; groupAttr = "member"; }];
};
};
}];
staticClients = forEach cfg.dex.oidcClients (client: { staticClients = forEach cfg.dex.oidcClients (client: {
inherit (client) id; inherit (client) id;
redirectURIs = [ client.callbackURL ]; redirectURIs = [ client.callbackURL ];
name = "OIDC for ${client.id}"; name = "OIDC for ${client.id}";
secretEnv = "DEX_CLIENT_${client.id}"; secretEnv = "DEX_CLIENT_${client.id}";
}); });
};
}; };
portunus.seedPath = lib.mkIf (cfg.seedSettings != null) (pkgs.writeText "seed.json" (builtins.toJSON cfg.seedSettings));
}; };
systemd.services = { systemd.services = {

View File

@ -0,0 +1,47 @@
# systemd-lock-handler {#module-services-systemd-lock-handler}
The `systemd-lock-handler` module provides a service that bridges
D-Bus events from `logind` to user-level systemd targets:
- `lock.target` started by `loginctl lock-session`,
- `unlock.target` started by `loginctl unlock-session` and
- `sleep.target` started by `systemctl suspend`.
You can create a user service that starts with any of these targets.
For example, to create a service for `swaylock`:
```nix
{
services.systemd-lock-handler.enable = true;
systemd.user.services.swaylock = {
description = "Screen locker for Wayland";
documentation = ["man:swaylock(1)"];
# If swaylock exits cleanly, unlock the session:
onSuccess = ["unlock.target"];
# When lock.target is stopped, stops this too:
partOf = ["lock.target"];
# Delay lock.target until this service is ready:
before = ["lock.target"];
wantedBy = ["lock.target"];
serviceConfig = {
# systemd will consider this service started when swaylock forks...
Type = "forking";
# ... and swaylock will fork only after it has locked the screen.
ExecStart = "${lib.getExe pkgs.swaylock} -f";
# If swaylock crashes, always restart it immediately:
Restart = "on-failure";
RestartSec = 0;
};
};
}
```
See [upstream documentation](https://sr.ht/~whynothugo/systemd-lock-handler) for more information.

View File

@ -0,0 +1,27 @@
{ config
, pkgs
, lib
, ...
}:
let
cfg = config.services.systemd-lock-handler;
inherit (lib) mkIf mkEnableOption mkPackageOption;
in
{
options.services.systemd-lock-handler = {
enable = mkEnableOption (lib.mdDoc "systemd-lock-handler");
package = mkPackageOption pkgs "systemd-lock-handler" { };
};
config = mkIf cfg.enable {
systemd.packages = [ cfg.package ];
# https://github.com/NixOS/nixpkgs/issues/81138
systemd.user.services.systemd-lock-handler.wantedBy = [ "default.target" ];
};
meta = {
maintainers = with lib.maintainers; [ liff ];
doc = ./systemd-lock-handler.md;
};
}

View File

@ -116,7 +116,7 @@ in
} }
(lib.mkIf cfg.bendDomainToLocalhost { (lib.mkIf cfg.bendDomainToLocalhost {
nextcloud.extraOptions.trusted_proxies = [ "127.0.0.1" "::1" ]; nextcloud.settings.trusted_proxies = [ "127.0.0.1" "::1" ];
}) })
]; ];
}; };

View File

@ -51,7 +51,7 @@ to ensure that changes can be applied by changing the module's options.
In case the application serves multiple domains (those are checked with In case the application serves multiple domains (those are checked with
[`$_SERVER['HTTP_HOST']`](https://www.php.net/manual/en/reserved.variables.server.php)) [`$_SERVER['HTTP_HOST']`](https://www.php.net/manual/en/reserved.variables.server.php))
it's needed to add them to it's needed to add them to
[`services.nextcloud.extraOptions.trusted_domains`](#opt-services.nextcloud.extraOptions.trusted_domains). [`services.nextcloud.settings.trusted_domains`](#opt-services.nextcloud.settings.trusted_domains).
Auto updates for Nextcloud apps can be enabled using Auto updates for Nextcloud apps can be enabled using
[`services.nextcloud.autoUpdateApps`](#opt-services.nextcloud.autoUpdateApps.enable). [`services.nextcloud.autoUpdateApps`](#opt-services.nextcloud.autoUpdateApps.enable).

View File

@ -183,8 +183,8 @@ let
]; ];
$CONFIG = array_replace_recursive($CONFIG, nix_decode_json_file( $CONFIG = array_replace_recursive($CONFIG, nix_decode_json_file(
"${jsonFormat.generate "nextcloud-extraOptions.json" cfg.extraOptions}", "${jsonFormat.generate "nextcloud-settings.json" cfg.settings}",
"impossible: this should never happen (decoding generated extraOptions file %s failed)" "impossible: this should never happen (decoding generated settings file %s failed)"
)); ));
${optionalString (cfg.secretFile != null) '' ${optionalString (cfg.secretFile != null) ''
@ -205,21 +205,22 @@ in {
Add port to services.nextcloud.config.dbhost instead. Add port to services.nextcloud.config.dbhost instead.
'') '')
(mkRenamedOptionModule (mkRenamedOptionModule
[ "services" "nextcloud" "logLevel" ] [ "services" "nextcloud" "extraOptions" "loglevel" ]) [ "services" "nextcloud" "logLevel" ] [ "services" "nextcloud" "settings" "loglevel" ])
(mkRenamedOptionModule (mkRenamedOptionModule
[ "services" "nextcloud" "logType" ] [ "services" "nextcloud" "extraOptions" "log_type" ]) [ "services" "nextcloud" "logType" ] [ "services" "nextcloud" "settings" "log_type" ])
(mkRenamedOptionModule (mkRenamedOptionModule
[ "services" "nextcloud" "config" "defaultPhoneRegion" ] [ "services" "nextcloud" "extraOptions" "default_phone_region" ]) [ "services" "nextcloud" "config" "defaultPhoneRegion" ] [ "services" "nextcloud" "settings" "default_phone_region" ])
(mkRenamedOptionModule (mkRenamedOptionModule
[ "services" "nextcloud" "config" "overwriteProtocol" ] [ "services" "nextcloud" "extraOptions" "overwriteprotocol" ]) [ "services" "nextcloud" "config" "overwriteProtocol" ] [ "services" "nextcloud" "settings" "overwriteprotocol" ])
(mkRenamedOptionModule (mkRenamedOptionModule
[ "services" "nextcloud" "skeletonDirectory" ] [ "services" "nextcloud" "extraOptions" "skeletondirectory" ]) [ "services" "nextcloud" "skeletonDirectory" ] [ "services" "nextcloud" "settings" "skeletondirectory" ])
(mkRenamedOptionModule (mkRenamedOptionModule
[ "services" "nextcloud" "globalProfiles" ] [ "services" "nextcloud" "extraOptions" "profile.enabled" ]) [ "services" "nextcloud" "globalProfiles" ] [ "services" "nextcloud" "settings" "profile.enabled" ])
(mkRenamedOptionModule (mkRenamedOptionModule
[ "services" "nextcloud" "config" "extraTrustedDomains" ] [ "services" "nextcloud" "extraOptions" "trusted_domains" ]) [ "services" "nextcloud" "config" "extraTrustedDomains" ] [ "services" "nextcloud" "settings" "trusted_domains" ])
(mkRenamedOptionModule (mkRenamedOptionModule
[ "services" "nextcloud" "config" "trustedProxies" ] [ "services" "nextcloud" "extraOptions" "trusted_proxies" ]) [ "services" "nextcloud" "config" "trustedProxies" ] [ "services" "nextcloud" "settings" "trusted_proxies" ])
(mkRenamedOptionModule ["services" "nextcloud" "extraOptions" ] [ "services" "nextcloud" "settings" ])
]; ];
options.services.nextcloud = { options.services.nextcloud = {
@ -648,7 +649,7 @@ in {
''; '';
}; };
extraOptions = mkOption { settings = mkOption {
type = types.submodule { type = types.submodule {
freeformType = jsonFormat.type; freeformType = jsonFormat.type;
options = { options = {
@ -770,7 +771,7 @@ in {
default = null; default = null;
description = lib.mdDoc '' description = lib.mdDoc ''
Secret options which will be appended to Nextcloud's config.php file (written as JSON, in the same Secret options which will be appended to Nextcloud's config.php file (written as JSON, in the same
form as the [](#opt-services.nextcloud.extraOptions) option), for example form as the [](#opt-services.nextcloud.settings) option), for example
`{"redis":{"password":"secret"}}`. `{"redis":{"password":"secret"}}`.
''; '';
}; };
@ -930,7 +931,7 @@ in {
(i: v: '' (i: v: ''
${occ}/bin/nextcloud-occ config:system:set trusted_domains \ ${occ}/bin/nextcloud-occ config:system:set trusted_domains \
${toString i} --value="${toString v}" ${toString i} --value="${toString v}"
'') ([ cfg.hostName ] ++ cfg.extraOptions.trusted_domains)); '') ([ cfg.hostName ] ++ cfg.settings.trusted_domains));
in { in {
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
@ -1056,7 +1057,7 @@ in {
services.nextcloud = { services.nextcloud = {
caching.redis = lib.mkIf cfg.configureRedis true; caching.redis = lib.mkIf cfg.configureRedis true;
extraOptions = mkMerge [({ settings = mkMerge [({
datadirectory = lib.mkDefault "${datadir}/data"; datadirectory = lib.mkDefault "${datadir}/data";
trusted_domains = [ cfg.hostName ]; trusted_domains = [ cfg.hostName ];
}) (lib.mkIf cfg.configureRedis { }) (lib.mkIf cfg.configureRedis {

View File

@ -480,7 +480,7 @@ in
pkgs.maliit-framework pkgs.maliit-framework
pkgs.maliit-keyboard pkgs.maliit-keyboard
] ]
++ lib.optionals (cfg.mobile.installRecommendedSoftware) (with libsForQt5.plasmaMobileGear;[ ++ lib.optionals (cfg.mobile.installRecommendedSoftware) (with pkgs.plasma5Packages.plasmaMobileGear; [
# Additional software made for Plasma Mobile. # Additional software made for Plasma Mobile.
alligator alligator
angelfish angelfish

View File

@ -54,17 +54,18 @@ let
checkedSystemdBootBuilder = pkgs.runCommand "systemd-boot" { checkedSystemdBootBuilder = pkgs.runCommand "systemd-boot" {
nativeBuildInputs = [ pkgs.mypy ]; nativeBuildInputs = [ pkgs.mypy ];
} '' } ''
install -m755 ${systemdBootBuilder} $out mkdir -p $out/bin
install -m755 ${systemdBootBuilder} $out/bin/systemd-boot-builder
mypy \ mypy \
--no-implicit-optional \ --no-implicit-optional \
--disallow-untyped-calls \ --disallow-untyped-calls \
--disallow-untyped-defs \ --disallow-untyped-defs \
$out $out/bin/systemd-boot-builder
''; '';
finalSystemdBootBuilder = pkgs.writeScript "install-systemd-boot.sh" '' finalSystemdBootBuilder = pkgs.writeScript "install-systemd-boot.sh" ''
#!${pkgs.runtimeShell} #!${pkgs.runtimeShell}
${checkedSystemdBootBuilder} "$@" ${checkedSystemdBootBuilder}/bin/systemd-boot-builder "$@"
${cfg.extraInstallCommands} ${cfg.extraInstallCommands}
''; '';
in { in {

View File

@ -856,6 +856,7 @@ in {
systemd-journal = handleTest ./systemd-journal.nix {}; systemd-journal = handleTest ./systemd-journal.nix {};
systemd-journal-gateway = handleTest ./systemd-journal-gateway.nix {}; systemd-journal-gateway = handleTest ./systemd-journal-gateway.nix {};
systemd-journal-upload = handleTest ./systemd-journal-upload.nix {}; systemd-journal-upload = handleTest ./systemd-journal-upload.nix {};
systemd-lock-handler = runTestOn ["aarch64-linux" "x86_64-linux"] ./systemd-lock-handler.nix;
systemd-machinectl = handleTest ./systemd-machinectl.nix {}; systemd-machinectl = handleTest ./systemd-machinectl.nix {};
systemd-networkd = handleTest ./systemd-networkd.nix {}; systemd-networkd = handleTest ./systemd-networkd.nix {};
systemd-networkd-dhcpserver = handleTest ./systemd-networkd-dhcpserver.nix {}; systemd-networkd-dhcpserver = handleTest ./systemd-networkd-dhcpserver.nix {};

View File

@ -41,7 +41,7 @@ in {
}; };
secretFile = "/etc/nextcloud-secrets.json"; secretFile = "/etc/nextcloud-secrets.json";
extraOptions = { settings = {
allow_local_remote_servers = true; allow_local_remote_servers = true;
redis = { redis = {
dbindex = 0; dbindex = 0;

View File

@ -41,7 +41,7 @@ in {
extraApps = { extraApps = {
inherit (pkgs."nextcloud${lib.versions.major config.services.nextcloud.package.version}Packages".apps) notify_push; inherit (pkgs."nextcloud${lib.versions.major config.services.nextcloud.package.version}Packages".apps) notify_push;
}; };
extraOptions.trusted_proxies = [ "::1" ]; settings.trusted_proxies = [ "::1" ];
}; };
services.redis.servers."nextcloud".enable = true; services.redis.servers."nextcloud".enable = true;

View File

@ -1,7 +1,7 @@
import ./make-test-python.nix ({ pkgs, lib, ... }: { import ./make-test-python.nix ({ pkgs, lib, ... }: {
name = "pomerium"; name = "pomerium";
meta = with lib.maintainers; { meta = with lib.maintainers; {
maintainers = [ lukegb ]; maintainers = [ lukegb devusb ];
}; };
nodes = let base = myIP: { pkgs, lib, ... }: { nodes = let base = myIP: { pkgs, lib, ... }: {
@ -103,7 +103,7 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
with subtest("ui"): with subtest("ui"):
pomerium.succeed( pomerium.succeed(
# check for a string that only appears if the UI is displayed correctly # check for a string that only appears if the UI is displayed correctly
"chromium --no-sandbox --headless --disable-gpu --dump-dom --host-resolver-rules='MAP login.required 127.0.0.1:80' http://login.required/.pomerium | grep 'contact your administrator'" "chromium --no-sandbox --headless --disable-gpu --dump-dom --host-resolver-rules='MAP login.required 127.0.0.1:80' http://login.required/.pomerium | grep 'User Details Not Available'"
) )
''; '';
}) })

View File

@ -0,0 +1,56 @@
{ lib, ... }: {
name = "systemd-lock-handler";
meta.maintainers = with lib.maintainers; [ liff ];
enableOCR = true;
nodes.machine = { config, pkgs, lib, ... }:
let
touch = "${lib.getBin pkgs.coreutils}/bin/touch";
in
{
imports = [ common/wayland-cage.nix ];
services.systemd-lock-handler.enable = true;
systemd.user.services = {
test-lock = {
partOf = [ "lock.target" ];
onSuccess = [ "unlock.target" ];
before = [ "lock.target" ];
wantedBy = [ "lock.target" ];
serviceConfig.ExecStart = "${touch} /tmp/lock.target.activated";
};
test-unlock = {
partOf = [ "unlock.target" ];
after = [ "unlock.target" ];
wantedBy = [ "unlock.target" ];
serviceConfig.ExecStart = "${touch} /tmp/unlock.target.activated";
};
test-sleep = {
partOf = [ "sleep.target" ];
before = [ "sleep.target" ];
wantedBy = [ "sleep.target" ];
serviceConfig.ExecStart = "${touch} /tmp/sleep.target.activated";
};
};
};
testScript = ''
machine.wait_for_unit('graphical.target')
machine.wait_for_text('alice@machine')
machine.send_chars('loginctl lock-session\n')
machine.wait_for_file('/tmp/lock.target.activated')
machine.wait_for_file('/tmp/unlock.target.activated')
machine.send_chars('systemctl suspend\n')
# wait_for_file wont complete before the machine is asleep,
# so well watch the log instead.
machine.wait_for_console_text('Started test-sleep.service.')
# The VM is asleep, regular shutdown wont work.
machine.crash()
'';
}

View File

@ -348,7 +348,7 @@ There are a few naming guidelines:
- The `pname` and the `version` attribute _must not_ contain uppercase letters — e.g., `"mplayer" instead of `"MPlayer"`. - The `pname` and the `version` attribute _must not_ contain uppercase letters — e.g., `"mplayer" instead of `"MPlayer"`.
- The `version` attribute _must_ start with a digit e.g`"0.3.1rc2". - The `version` attribute _must_ start with a digit e.g., `"0.3.1rc2"`.
- If a package is a commit from a repository without a version assigned, then the `version` attribute _should_ be the latest upstream version preceding that commit, followed by `-unstable-` and the date of the (fetched) commit. The date _must_ be in `"YYYY-MM-DD"` format. - If a package is a commit from a repository without a version assigned, then the `version` attribute _should_ be the latest upstream version preceding that commit, followed by `-unstable-` and the date of the (fetched) commit. The date _must_ be in `"YYYY-MM-DD"` format.

View File

@ -2,7 +2,7 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "ensemble-chorus"; pname = "ensemble-chorus";
version = "unstable-15-02-2019"; version = "0-unstable-2019-02-15";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "jpcima"; owner = "jpcima";

View File

@ -1,13 +1,13 @@
{ stdenv, lib, fetchFromGitHub, faust2jaqt, faust2lv2 }: { stdenv, lib, fetchFromGitHub, faust2jaqt, faust2lv2 }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "faustPhysicalModeling"; pname = "faustPhysicalModeling";
version = "2.69.3"; version = "2.70.3";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "grame-cncm"; owner = "grame-cncm";
repo = "faust"; repo = "faust";
rev = version; rev = version;
sha256 = "sha256-E7cHDeQV7NVKyoCgI8P3gennpBidk7JmdnFGSIulvvQ="; sha256 = "sha256-QkksliLu2TnJ1GoM91e+Qf3SlRv3T06WNU++S3qq3e0=";
}; };
buildInputs = [ faust2jaqt faust2lv2 ]; buildInputs = [ faust2jaqt faust2lv2 ];

View File

@ -28,13 +28,13 @@ let
in in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "reaper"; pname = "reaper";
version = "7.08"; version = "7.09";
src = fetchurl { src = fetchurl {
url = url_for_platform version stdenv.hostPlatform.qemuArch; url = url_for_platform version stdenv.hostPlatform.qemuArch;
hash = if stdenv.isDarwin then "sha256-PgYAwSSRwew+QLx6/Gs+J1v3iZ4U22bn6V8XWZk8Pz0=" else { hash = if stdenv.isDarwin then "sha256-MztA9Azj20tyg/nFtXmvojeABNX11HCkmIcgMhNYyMQ=" else {
x86_64-linux = "sha256-lya/B9k9uWrvRbMnWRT0YDV9o+DpmjPGynBVPFij3rs="; x86_64-linux = "sha256-Mo7k8XbKLUkBvo2A73qeqHgDtXD/fBVtSVv74k/WGRo=";
aarch64-linux = "sha256-0ePUvVrArUdg0t+CQK37yXA4UlHlMj2Mafe0dTyz5JU="; aarch64-linux = "sha256-ttNHMC8Ouin2fNnIb5X5pnKwGrAML192oZdg/Q8SFlg=";
}.${stdenv.hostPlatform.system}; }.${stdenv.hostPlatform.system};
}; };

View File

@ -158,6 +158,7 @@ mkDerivation rec {
description = "Photo Management Program"; description = "Photo Management Program";
license = licenses.gpl2; license = licenses.gpl2;
homepage = "https://www.digikam.org"; homepage = "https://www.digikam.org";
maintainers = with maintainers; [ spacefault ];
platforms = platforms.linux; platforms = platforms.linux;
mainProgram = "digikam"; mainProgram = "digikam";
}; };

View File

@ -9,43 +9,43 @@
let let
pname = "1password"; pname = "1password";
version = if channel == "stable" then "8.10.23" else "8.10.24-35.BETA"; version = if channel == "stable" then "8.10.24" else "8.10.26-1.BETA";
sources = { sources = {
stable = { stable = {
x86_64-linux = { x86_64-linux = {
url = "https://downloads.1password.com/linux/tar/stable/x86_64/1password-${version}.x64.tar.gz"; url = "https://downloads.1password.com/linux/tar/stable/x86_64/1password-${version}.x64.tar.gz";
hash = "sha256-TqZ9AffyHl1mAKyZvADVGh5OXKZEGXjKSkXq7ZI/obA="; hash = "sha256-vYk7WHGVOzrrep6vmA58ELa6aDsZFUw5D2StCYP0Ioc=";
}; };
aarch64-linux = { aarch64-linux = {
url = "https://downloads.1password.com/linux/tar/stable/aarch64/1password-${version}.arm64.tar.gz"; url = "https://downloads.1password.com/linux/tar/stable/aarch64/1password-${version}.arm64.tar.gz";
hash = "sha256-vEdpqlGXc5gR9kr+iRRvRI4r48H6AWr+sDZt2kNQxB4="; hash = "sha256-HuhoGG2aQ2NcbZlQfUmGUl0IvhXPO5uV7x4WKJRR7Ew=";
}; };
x86_64-darwin = { x86_64-darwin = {
url = "https://downloads.1password.com/mac/1Password-${version}-x86_64.zip"; url = "https://downloads.1password.com/mac/1Password-${version}-x86_64.zip";
hash = "sha256-1vZbZdAyK/J+lMPwgeyEO5Qvj6nBd0TMkG4Y71Bgfoc="; hash = "sha256-RHn1JJoRLWfqOTx0Di0nfHM7fbLs54DdWlI+PTQs1sQ=";
}; };
aarch64-darwin = { aarch64-darwin = {
url = "https://downloads.1password.com/mac/1Password-${version}-aarch64.zip"; url = "https://downloads.1password.com/mac/1Password-${version}-aarch64.zip";
hash = "sha256-SGvzRGfoMrHSYOlJjsjS0ETIZelctzVbd/SyCv40+QI="; hash = "sha256-ZjmgkGTY6KQ0vv7ILMMLYsK7N2YLmJGCBS6954v0JX8=";
}; };
}; };
beta = { beta = {
x86_64-linux = { x86_64-linux = {
url = "https://downloads.1password.com/linux/tar/beta/x86_64/1password-${version}.x64.tar.gz"; url = "https://downloads.1password.com/linux/tar/beta/x86_64/1password-${version}.x64.tar.gz";
hash = "sha256-NO8jxXvdjDn7uTyboav8UnHfc0plHDLoKQ/FHZJqpsE="; hash = "sha256-dAasy1D5HXQ8Eu5cx0u9exobNMf2TIV4iCTcys/uCtQ=";
}; };
aarch64-linux = { aarch64-linux = {
url = "https://downloads.1password.com/linux/tar/beta/aarch64/1password-${version}.arm64.tar.gz"; url = "https://downloads.1password.com/linux/tar/beta/aarch64/1password-${version}.arm64.tar.gz";
hash = "sha256-9qnODNE3kNRZyj5+2nfoz9zBmY2MqxVPo3rpLOCFAsI="; hash = "sha256-sIPNv4HiU/6CLaER6deMG88zOOFwu6cm5XoB2Cr4qLQ=";
}; };
x86_64-darwin = { x86_64-darwin = {
url = "https://downloads.1password.com/mac/1Password-${version}-x86_64.zip"; url = "https://downloads.1password.com/mac/1Password-${version}-x86_64.zip";
hash = "sha256-gU11xBIGOCRbQshOQ4ktYVgHe6dxJ0GnONkVnZkCiEE="; hash = "sha256-Va4WgbPKrI7u+GYzVmA8Gp6NRY4EdJuoz00Pc5HsMIg=";
}; };
aarch64-darwin = { aarch64-darwin = {
url = "https://downloads.1password.com/mac/1Password-${version}-aarch64.zip"; url = "https://downloads.1password.com/mac/1Password-${version}-aarch64.zip";
hash = "sha256-YcnVIgV+2MZOS+a+3lFuNMgnLaGVrOP53B/k70zRoTI="; hash = "sha256-Dj96QoEcmJxV7qBkb68ovonr+XYqQdScb9GMeL8OCJo=";
}; };
}; };
}; };

View File

@ -2,13 +2,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "diff-pdf"; pname = "diff-pdf";
version = "0.5.1"; version = "0.5.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "vslavik"; owner = "vslavik";
repo = "diff-pdf"; repo = "diff-pdf";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-jt11wssl8cH2cH3NXF+iWHxVNxPJm0I8toignBHq3q0="; sha256 = "sha256-6aKF3Xqp/1BoHEiZVZJSemTjn5Qwwr3QyhsXOIjTr08=";
}; };
nativeBuildInputs = [ autoconf automake pkg-config ]; nativeBuildInputs = [ autoconf automake pkg-config ];

View File

@ -5,16 +5,16 @@
buildGoModule rec { buildGoModule rec {
pname = "harsh"; pname = "harsh";
version = "0.8.30"; version = "0.8.31";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "wakatara"; owner = "wakatara";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
hash = "sha256-X9YCxDgxIuJyTUurDQ574nKBAUsdKHNx1T6DkcygYS4="; hash = "sha256-q2kQAQu1rewCDk+UPuEHS4AJlhuC8azHk5MWP6uQ4fI=";
}; };
vendorHash = "sha256-zkz7X/qj8FwtQZXGuq4Oaoe5G9a4AJE1kv3j7wwQEp4="; vendorHash = "sha256-zjLXq64uC5iRm9uxUGDW5127z25gNSVV2qhVVXuYqY0=";
meta = with lib; { meta = with lib; {
description = "CLI habit tracking for geeks"; description = "CLI habit tracking for geeks";

View File

@ -14,7 +14,7 @@ let
pygobject3 pygobject3
]); ]);
version = "0.8.0"; version = "0.8.1";
in stdenv.mkDerivation { in stdenv.mkDerivation {
inherit version; inherit version;
@ -24,7 +24,7 @@ in stdenv.mkDerivation {
owner = "berarma"; owner = "berarma";
repo = "oversteer"; repo = "oversteer";
rev = version; rev = version;
sha256 = "sha256-fkf6sa4yYbxGOehyLzuFj5nZiPK3B1D/VVvobhKB4Uo="; sha256 = "sha256-J23fgEDkfZMjVEYHaSPbU9zh5CQFjPmqMsm09VybBv8=";
}; };
buildInputs = [ bash gtk3 ]; buildInputs = [ bash gtk3 ];

View File

@ -18,6 +18,7 @@ python3Packages.buildPythonPackage rec {
meta = with lib; { meta = with lib; {
description = "colourised df(1)-clone"; description = "colourised df(1)-clone";
homepage = "http://kassiopeia.juls.savba.sk/~garabik/software/pydf/"; homepage = "http://kassiopeia.juls.savba.sk/~garabik/software/pydf/";
mainProgram = "pydf";
license = licenses.publicDomain; license = licenses.publicDomain;
maintainers = with maintainers; [ monsieurp ]; maintainers = with maintainers; [ monsieurp ];
}; };

View File

@ -24,7 +24,7 @@ let
vivaldiName = if isSnapshot then "vivaldi-snapshot" else "vivaldi"; vivaldiName = if isSnapshot then "vivaldi-snapshot" else "vivaldi";
in stdenv.mkDerivation rec { in stdenv.mkDerivation rec {
pname = "vivaldi"; pname = "vivaldi";
version = "6.5.3206.50"; version = "6.5.3206.55";
suffix = { suffix = {
aarch64-linux = "arm64"; aarch64-linux = "arm64";
@ -34,8 +34,8 @@ in stdenv.mkDerivation rec {
src = fetchurl { src = fetchurl {
url = "https://downloads.vivaldi.com/${branch}/vivaldi-${branch}_${version}-1_${suffix}.deb"; url = "https://downloads.vivaldi.com/${branch}/vivaldi-${branch}_${version}-1_${suffix}.deb";
hash = { hash = {
aarch64-linux = "sha256-8Ozhad6aRskhhNqtUQFYLT14JHZnhLnHtuB+SmtwL8g="; aarch64-linux = "sha256-lr+9+w1vRZSG/2dP5K3mcKLCQijckPdkM/I2DgjO4wg=";
x86_64-linux = "sha256-hpWPDnnJGx2pokR1JFe3Uuq299HvsnjKMyg89wAo53I="; x86_64-linux = "sha256-ElkuuaZfK8F6CVA5xbKszkbqdcPACFR+xd0pRxnd6+U=";
}.${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); }.${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}");
}; };

View File

@ -2,15 +2,15 @@
buildGoModule rec { buildGoModule rec {
pname = "istioctl"; pname = "istioctl";
version = "1.20.1"; version = "1.20.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "istio"; owner = "istio";
repo = "istio"; repo = "istio";
rev = version; rev = version;
hash = "sha256-baY9O2F5qte6v8HM905VYdvqQZxkTSeu3ydB4Y4UM4E="; hash = "sha256-0Ep7HPc+1e2M87Z6qCKvAxpYxWjajruTrpP9EBe1PC0=";
}; };
vendorHash = "sha256-QEP7qG3RLVhEGsNJU0r/grVrcepouAC8usL9nLeaJFs="; vendorHash = "sha256-o9NFRVAY5AD5CB9GGSJTvxJM6uXBrDQVBy1slOByIrU=";
nativeBuildInputs = [ installShellFiles ]; nativeBuildInputs = [ installShellFiles ];

View File

@ -2,16 +2,16 @@
buildGoModule rec { buildGoModule rec {
pname = "kubeseal"; pname = "kubeseal";
version = "0.24.5"; version = "0.25.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "bitnami-labs"; owner = "bitnami-labs";
repo = "sealed-secrets"; repo = "sealed-secrets";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-OyYVilc5QEK7Mjp9NKQpvhR4HyNSUh/82eCl1LHf4fQ="; sha256 = "sha256-maDfKFrszKexwzHw50iPu+aLLhi/QqKj6zmes9kS5Lk=";
}; };
vendorHash = "sha256-TdEfw/f7dSIoueJoi7qqOegEBJQLHc6Em21dcDnCuJU="; vendorHash = "sha256-3SrfD+6Gg9T9Qtb2PbipJZTe8Szs8Cef/61alwgHUUA=";
subPackages = [ "cmd/kubeseal" ]; subPackages = [ "cmd/kubeseal" ];

View File

@ -2,16 +2,16 @@
buildGoModule rec { buildGoModule rec {
pname = "kubeshark"; pname = "kubeshark";
version = "52.0.0"; version = "52.1.9";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "kubeshark"; owner = "kubeshark";
repo = "kubeshark"; repo = "kubeshark";
rev = "v${version}"; rev = "v${version}";
hash = "sha256-CBiRQ3i3kPVMuhws30Pl/7deuEiUHnRiDKhad6/c7zU="; hash = "sha256-VtL/fuXMc+vTaP3nSBQm0wfe8m3/yqv5nzjP0BDLVw8=";
}; };
vendorHash = "sha256-LBvQ9Z6bEBzAzdaEBRJbixBjy1u7MlVTAn6vD/ZvCNM="; vendorHash = "sha256-SmvO9DYOXxnmN2dmHPPOguVwEbWSH/xNLBB+idpzopo=";
ldflags = let t = "github.com/kubeshark/kubeshark"; in [ ldflags = let t = "github.com/kubeshark/kubeshark"; in [
"-s" "-w" "-s" "-w"

View File

@ -2,7 +2,7 @@
(callPackage ./generic.nix { }) { (callPackage ./generic.nix { }) {
channel = "stable"; channel = "stable";
version = "2.14.8"; version = "2.14.9";
sha256 = "1iag3j3wr3q9sx85rj5nhzs4ygknx2xyazs5kd0vq2l8vb1ihbnn"; sha256 = "135x5q0a8knckbjkag2xqcr76zy49i57zf2hlsa70iknynq33ys7";
vendorHash = "sha256-bGl8IZppwLDS6cRO4HmflwIOhH3rOhE/9slJATe+onI="; vendorHash = "sha256-bGl8IZppwLDS6cRO4HmflwIOhH3rOhE/9slJATe+onI=";
} }

View File

@ -2,7 +2,7 @@
(callPackage ./generic.nix { }) { (callPackage ./generic.nix { }) {
channel = "edge"; channel = "edge";
version = "23.12.4"; version = "24.1.2";
sha256 = "0q6bizch27z1lmw7as7f34zf8b95605wpr27c2mb8s1375q9lixd"; sha256 = "1rwdjlf20k84g94ca724wcpykpd9z0q8ymi0mdyz86kfry6hr5sz";
vendorHash = "sha256-Mp2iZuESfTSe5whejJ7a43WSP6kmxFqoIlDxWx7vBLc="; vendorHash = "sha256-8fNse2ZuyWqZsHSUh+buEIYPf8JsEL+0Z8tkbxfiCwA=";
} }

View File

@ -2,13 +2,13 @@
buildGoModule rec { buildGoModule rec {
pname = "roxctl"; pname = "roxctl";
version = "4.3.3"; version = "4.3.4";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "stackrox"; owner = "stackrox";
repo = "stackrox"; repo = "stackrox";
rev = version; rev = version;
sha256 = "sha256-G+BmcGrVxZmVHNl2VsN7nankEIB7uV/PFpQekipdT3c="; sha256 = "sha256-5UMU3oKi3QhREum2YevOzwF5OOi8quPWgt+kgGjkeFQ=";
}; };
vendorHash = "sha256-Jzv4ozR8RJiwkgVGGq6dlV/7rbBLq8hFe/Pm4SJZCkU="; vendorHash = "sha256-Jzv4ozR8RJiwkgVGGq6dlV/7rbBLq8hFe/Pm4SJZCkU=";

View File

@ -1,22 +1,22 @@
{ {
"aci": { "aci": {
"hash": "sha256-8oQSliSbuSXCXFkwVca33E8g+qUP1Yf9I4n1/c6O8BA=", "hash": "sha256-1N9Ya8WWb2gL84jYj4B8zllB5jQxRneVSNESYeRhj+c=",
"homepage": "https://registry.terraform.io/providers/CiscoDevNet/aci", "homepage": "https://registry.terraform.io/providers/CiscoDevNet/aci",
"owner": "CiscoDevNet", "owner": "CiscoDevNet",
"repo": "terraform-provider-aci", "repo": "terraform-provider-aci",
"rev": "v2.12.0", "rev": "v2.13.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": null "vendorHash": null
}, },
"acme": { "acme": {
"hash": "sha256-hDZY+AY+MRHNbceVdAzLso9isUo/6/qTCk9hSZLBd2g=", "hash": "sha256-wyDlI8G1MxZsoYPBjqQ32+/gK8DqQMXZWgTkATaOztQ=",
"homepage": "https://registry.terraform.io/providers/vancluever/acme", "homepage": "https://registry.terraform.io/providers/vancluever/acme",
"owner": "vancluever", "owner": "vancluever",
"proxyVendor": true, "proxyVendor": true,
"repo": "terraform-provider-acme", "repo": "terraform-provider-acme",
"rev": "v2.19.0", "rev": "v2.19.1",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-1OfGAuzd+rLAgLmzzkm3Biru0vb/xd3C5DJQcXwdlME=" "vendorHash": "sha256-PoykgWxMKmQzKUSojFICwjDucukfHYxHdgn60uD+UQ8="
}, },
"age": { "age": {
"hash": "sha256-bJrzjvkrCX93bNqCA+FdRibHnAw6cb61StqtwUY5ok4=", "hash": "sha256-bJrzjvkrCX93bNqCA+FdRibHnAw6cb61StqtwUY5ok4=",
@ -28,13 +28,13 @@
"vendorHash": "sha256-jK7JuARpoxq7hvq5+vTtUwcYot0YqlOZdtDwq4IqKvk=" "vendorHash": "sha256-jK7JuARpoxq7hvq5+vTtUwcYot0YqlOZdtDwq4IqKvk="
}, },
"aiven": { "aiven": {
"hash": "sha256-GlrHHg3byM18P2YSRoZGsJe+IH1DyYqey18KbkjpYrs=", "hash": "sha256-7dKlhPGkt1WB/nlXV2IrNT7E3w2kNdishJB/xL299Cw=",
"homepage": "https://registry.terraform.io/providers/aiven/aiven", "homepage": "https://registry.terraform.io/providers/aiven/aiven",
"owner": "aiven", "owner": "aiven",
"repo": "terraform-provider-aiven", "repo": "terraform-provider-aiven",
"rev": "v4.12.1", "rev": "v4.13.2",
"spdx": "MIT", "spdx": "MIT",
"vendorHash": "sha256-S0C5utY/xNs8Jh1vOCFiq/GM/GV/Dt6jJmsnrAAsVSI=" "vendorHash": "sha256-rIyAhe4YQ9XG3nODCSxZRohHgNIPQ94pDLrh7+4Rj1k="
}, },
"akamai": { "akamai": {
"hash": "sha256-CBBrX0mm6hyobOdhbDaud4HKupIMnDTJp7+kWSej+NI=", "hash": "sha256-CBBrX0mm6hyobOdhbDaud4HKupIMnDTJp7+kWSej+NI=",
@ -46,11 +46,11 @@
"vendorHash": "sha256-Y30DSv7gAW7JzaTYt0XGwLhTArFILPPnxYmP2mKe9Sc=" "vendorHash": "sha256-Y30DSv7gAW7JzaTYt0XGwLhTArFILPPnxYmP2mKe9Sc="
}, },
"alicloud": { "alicloud": {
"hash": "sha256-We0Dfqh7qCY2XSQ5Jj+vFtTf2YIsZmCCxufC8vUeoDw=", "hash": "sha256-LgpEooWXTefhH4HLVO1BIBUXXZBMO11ZS6NwsEbbnog=",
"homepage": "https://registry.terraform.io/providers/aliyun/alicloud", "homepage": "https://registry.terraform.io/providers/aliyun/alicloud",
"owner": "aliyun", "owner": "aliyun",
"repo": "terraform-provider-alicloud", "repo": "terraform-provider-alicloud",
"rev": "v1.214.1", "rev": "v1.215.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": null "vendorHash": null
}, },
@ -64,13 +64,13 @@
"vendorHash": "sha256-OAd8SeTqTrH0kMoM2LsK3vM2PI23b3gl57FaJYM9hM0=" "vendorHash": "sha256-OAd8SeTqTrH0kMoM2LsK3vM2PI23b3gl57FaJYM9hM0="
}, },
"archive": { "archive": {
"hash": "sha256-uoHuh4LTbF27ns4oBRfmR7f/NvFd7j0NNmFWywl5x7U=", "hash": "sha256-jkqbj7NGrTQeMQcg52JVurV3ce8iosxAJjBGdoQ3PLY=",
"homepage": "https://registry.terraform.io/providers/hashicorp/archive", "homepage": "https://registry.terraform.io/providers/hashicorp/archive",
"owner": "hashicorp", "owner": "hashicorp",
"repo": "terraform-provider-archive", "repo": "terraform-provider-archive",
"rev": "v2.4.1", "rev": "v2.4.2",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-F3bCFX57QTw5h/pnPB6pIrszXYqbwe0kzStOpmPgzHM=" "vendorHash": "sha256-buKYDNVCIcSDLCrCL4ZAKNQ7HqkH3+/7RHjyyR4dLmU="
}, },
"argocd": { "argocd": {
"hash": "sha256-nJrXbeI/07LlKngEkAnqPG6CiOLFTFugmZMVl2FEvIo=", "hash": "sha256-nJrXbeI/07LlKngEkAnqPG6CiOLFTFugmZMVl2FEvIo=",
@ -82,22 +82,22 @@
"vendorHash": "sha256-q9PO9tMbaXTs3nBLElwU05GcDZMZqNmLVVGDmiSRSfo=" "vendorHash": "sha256-q9PO9tMbaXTs3nBLElwU05GcDZMZqNmLVVGDmiSRSfo="
}, },
"artifactory": { "artifactory": {
"hash": "sha256-6WtnjsXzGZAIilm3N52G07o7eU9UQ6LXWqd7sDcV2Bg=", "hash": "sha256-hcdd762uNBYJx2KL4kouR8qWuSZBtGO2egUwaWufOMg=",
"homepage": "https://registry.terraform.io/providers/jfrog/artifactory", "homepage": "https://registry.terraform.io/providers/jfrog/artifactory",
"owner": "jfrog", "owner": "jfrog",
"repo": "terraform-provider-artifactory", "repo": "terraform-provider-artifactory",
"rev": "v10.0.2", "rev": "v10.1.2",
"spdx": "Apache-2.0", "spdx": "Apache-2.0",
"vendorHash": "sha256-iYm8xaHDWqjq8ui5bsSMMKNRE0/KBkOkzmImOQwMA7w=" "vendorHash": "sha256-J/+OcqRtcHaqoDkrWIDpPlBHQ/UWupwchA1aeSoHSh4="
}, },
"auth0": { "auth0": {
"hash": "sha256-z40zGGgKtru83KbmhK5kQhbHdXjCQ7q5G0eAfvqfa4A=", "hash": "sha256-6VwjKNX24r93EgVED+NK17dY577HL4tT76jSCgVIpHg=",
"homepage": "https://registry.terraform.io/providers/auth0/auth0", "homepage": "https://registry.terraform.io/providers/auth0/auth0",
"owner": "auth0", "owner": "auth0",
"repo": "terraform-provider-auth0", "repo": "terraform-provider-auth0",
"rev": "v1.1.1", "rev": "v1.1.2",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-/rT/dVpla6r3pIouZZ7tmluKDyjdYuzdMGoPCNn+Ptk=" "vendorHash": "sha256-t40UZ9LF7PNhIqdEK6puuNeSDapTpC0+BTQgXQlMPTs="
}, },
"avi": { "avi": {
"hash": "sha256-EGpHajrTTOx7LrFHzsrrkGMqsuUEJLJAN6AJ48QdJis=", "hash": "sha256-EGpHajrTTOx7LrFHzsrrkGMqsuUEJLJAN6AJ48QdJis=",
@ -109,22 +109,22 @@
"vendorHash": "sha256-r42KHzvRBXuWgLgtg+WUVt0ThjSMXtUKjEE9y/s/1uQ=" "vendorHash": "sha256-r42KHzvRBXuWgLgtg+WUVt0ThjSMXtUKjEE9y/s/1uQ="
}, },
"aviatrix": { "aviatrix": {
"hash": "sha256-PRYtkq4CLEbUJ7YOSlvDyz+z4icLi0DBkDCTs/tNoIQ=", "hash": "sha256-84MtHPrDVaLMQQYnAfuP/pZuzruWxUTLpziwn3ny1oU=",
"homepage": "https://registry.terraform.io/providers/AviatrixSystems/aviatrix", "homepage": "https://registry.terraform.io/providers/AviatrixSystems/aviatrix",
"owner": "AviatrixSystems", "owner": "AviatrixSystems",
"repo": "terraform-provider-aviatrix", "repo": "terraform-provider-aviatrix",
"rev": "v3.1.3", "rev": "v3.1.4",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": null "vendorHash": null
}, },
"aws": { "aws": {
"hash": "sha256-wEbpTOlIZjewEepvqTjQRZAY4BtpetMF+HzvmdFEHGw=", "hash": "sha256-UI1ECQ1bHxwjxtBzpgwbyZLexRH+7L6rjrEcyxSed0g=",
"homepage": "https://registry.terraform.io/providers/hashicorp/aws", "homepage": "https://registry.terraform.io/providers/hashicorp/aws",
"owner": "hashicorp", "owner": "hashicorp",
"repo": "terraform-provider-aws", "repo": "terraform-provider-aws",
"rev": "v5.31.0", "rev": "v5.34.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-SVrPxBzcykecphwpHvcAhUbmf77eXC9VDdabGzg2bn8=" "vendorHash": "sha256-sccfJ5EUY9XTjDYah9/0R9L53Zzdfi06kWi5QaFp+og="
}, },
"azuread": { "azuread": {
"hash": "sha256-lumXl3orK5Jq5+qnRfiIA94NjK2bCjd3LhRzHmW1h8I=", "hash": "sha256-lumXl3orK5Jq5+qnRfiIA94NjK2bCjd3LhRzHmW1h8I=",
@ -136,11 +136,11 @@
"vendorHash": null "vendorHash": null
}, },
"azurerm": { "azurerm": {
"hash": "sha256-0AD30AibmJpfP+5ZT9aQDaeNWyViI9lajq2c4LzEUz4=", "hash": "sha256-QNaTyyz7H5jf7znPOv6ZTUnaI2zPNHnfZXp2ns3Nv00=",
"homepage": "https://registry.terraform.io/providers/hashicorp/azurerm", "homepage": "https://registry.terraform.io/providers/hashicorp/azurerm",
"owner": "hashicorp", "owner": "hashicorp",
"repo": "terraform-provider-azurerm", "repo": "terraform-provider-azurerm",
"rev": "v3.86.0", "rev": "v3.89.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": null "vendorHash": null
}, },
@ -154,13 +154,14 @@
"vendorHash": null "vendorHash": null
}, },
"baiducloud": { "baiducloud": {
"hash": "sha256-YZC3Z9F2SvnUS7yN4blmXy9g4mRr0zPQ9G/yoKa/91g=", "deleteVendor": true,
"hash": "sha256-+/QLVhVzT80IYwoXvRoxHok3PAw+ZPQhH+b5YARFFLU=",
"homepage": "https://registry.terraform.io/providers/baidubce/baiducloud", "homepage": "https://registry.terraform.io/providers/baidubce/baiducloud",
"owner": "baidubce", "owner": "baidubce",
"repo": "terraform-provider-baiducloud", "repo": "terraform-provider-baiducloud",
"rev": "v1.19.26", "rev": "v1.19.31",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": null "vendorHash": "sha256-7FA5bhb22C/OUhcHrcZK2D4esj+su/HLB7pTyX7ot44="
}, },
"bigip": { "bigip": {
"hash": "sha256-itRFSpaso9AJpjsXNpVxUgoG13Ys7dSuG5XCcuCkuMk=", "hash": "sha256-itRFSpaso9AJpjsXNpVxUgoG13Ys7dSuG5XCcuCkuMk=",
@ -217,31 +218,32 @@
"vendorHash": null "vendorHash": null
}, },
"cloudamqp": { "cloudamqp": {
"hash": "sha256-ways6qj4rwoBo0XS69aMIMlBssv4R8CFZ4l5Lsnlih0=", "hash": "sha256-TWBilEfRrLUk1PIAO/Vq1wed1BTALKApeBGTa5WtN5g=",
"homepage": "https://registry.terraform.io/providers/cloudamqp/cloudamqp", "homepage": "https://registry.terraform.io/providers/cloudamqp/cloudamqp",
"owner": "cloudamqp", "owner": "cloudamqp",
"repo": "terraform-provider-cloudamqp", "repo": "terraform-provider-cloudamqp",
"rev": "v1.29.1", "rev": "v1.29.3",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-+HZzsAsEJuzEZ61ARaNYC1WxI3M6UwFEf+8q3Bd/JWA=" "vendorHash": "sha256-+HZzsAsEJuzEZ61ARaNYC1WxI3M6UwFEf+8q3Bd/JWA="
}, },
"cloudflare": { "cloudflare": {
"hash": "sha256-X7bjuZQ0UMEmPBQg9U5ZykBViDrcvumsoGCaIegMxP8=", "hash": "sha256-ftpfjKjW+60n+mmwdx/ivpge4Nt2H1I3ElSk3AhPevY=",
"homepage": "https://registry.terraform.io/providers/cloudflare/cloudflare", "homepage": "https://registry.terraform.io/providers/cloudflare/cloudflare",
"owner": "cloudflare", "owner": "cloudflare",
"repo": "terraform-provider-cloudflare", "repo": "terraform-provider-cloudflare",
"rev": "v4.21.0", "rev": "v4.23.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-0Ci2x2yVOU9ChlFJFFObR4DZqe4hX30/ARv+CGDa88k=" "vendorHash": "sha256-F+6bk+Lc0ziRJ/LBhrb5bS8oMN9zT7WqzPZKVUReNU4="
}, },
"cloudfoundry": { "cloudfoundry": {
"hash": "sha256-yEqsdgTSlwppt6ILRZQ6Epyh5WVN6Il3xsBOa/NfIdo=", "hash": "sha256-1nYncJLVU/f9WD6Quh9IieIXgixPzbPk4zbtI1zmf9g=",
"homepage": "https://registry.terraform.io/providers/cloudfoundry-community/cloudfoundry", "homepage": "https://registry.terraform.io/providers/cloudfoundry-community/cloudfoundry",
"owner": "cloudfoundry-community", "owner": "cloudfoundry-community",
"proxyVendor": true,
"repo": "terraform-provider-cloudfoundry", "repo": "terraform-provider-cloudfoundry",
"rev": "v0.51.3", "rev": "v0.52.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-0hq4dR1KqnE2IXMwif2/NVKQKRO/QplW/A6sB4pJ+FM=" "vendorHash": "sha256-g1T6kH8Rv9bpvb6Q3YHCseEi1ayydJIxlplH3k12s8c="
}, },
"cloudinit": { "cloudinit": {
"hash": "sha256-etZeCGtYhO0szRGxnj1c3/WOelxScWiHEA9w1Jb7bEE=", "hash": "sha256-etZeCGtYhO0szRGxnj1c3/WOelxScWiHEA9w1Jb7bEE=",
@ -290,13 +292,13 @@
"vendorHash": "sha256-ZCMSmOCPEMxCSpl3DjIUGPj1W/KNJgyjtHpmQ19JquA=" "vendorHash": "sha256-ZCMSmOCPEMxCSpl3DjIUGPj1W/KNJgyjtHpmQ19JquA="
}, },
"datadog": { "datadog": {
"hash": "sha256-NEXA4oRPC+A8aDuecp45mQm3NbAQKIHR0GSfxDVkeUw=", "hash": "sha256-JH0QDASZLFU9beexGze0vg1qrQutgAeGSExwHnYRyKs=",
"homepage": "https://registry.terraform.io/providers/DataDog/datadog", "homepage": "https://registry.terraform.io/providers/DataDog/datadog",
"owner": "DataDog", "owner": "DataDog",
"repo": "terraform-provider-datadog", "repo": "terraform-provider-datadog",
"rev": "v3.34.0", "rev": "v3.35.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-57cwm7RqCqDR9PmnBFMnrM2vTogCOlpXwvVwnBkkA0Y=" "vendorHash": "sha256-eGOUtinVIi6R1R19nosw60I+DfdJNxmw3pBrS171tRI="
}, },
"dexidp": { "dexidp": {
"hash": "sha256-3UgiOeAGpGG2mkImPDvb24WjV2mavhY0E12j7W+SJs8=", "hash": "sha256-3UgiOeAGpGG2mkImPDvb24WjV2mavhY0E12j7W+SJs8=",
@ -345,13 +347,13 @@
"vendorHash": "sha256-z2p2tjTK7eL0gRU8XnXw9SY9qokqiqJOVhkiBQlHRnA=" "vendorHash": "sha256-z2p2tjTK7eL0gRU8XnXw9SY9qokqiqJOVhkiBQlHRnA="
}, },
"dnsimple": { "dnsimple": {
"hash": "sha256-6QubFsPp3sOmCSgIpRH+x+Q9YDDnOnfX5UzV+iy3uh4=", "hash": "sha256-iH35dJLa/63s+CU5PdeMbqXUVGfWfpKIXH3znNUApEc=",
"homepage": "https://registry.terraform.io/providers/dnsimple/dnsimple", "homepage": "https://registry.terraform.io/providers/dnsimple/dnsimple",
"owner": "dnsimple", "owner": "dnsimple",
"repo": "terraform-provider-dnsimple", "repo": "terraform-provider-dnsimple",
"rev": "v1.3.1", "rev": "v1.4.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-TTRxLal+oao8UtZpeZ4/HdR99WHGXARZWKqy1baT/mE=" "vendorHash": "sha256-fuIaNHlZica6PxFLzXGA+b6ODWrGWXdWYOeWzgiQRXo="
}, },
"docker": { "docker": {
"hash": "sha256-UyHOI8C0eDV5YllAi9clHp/CEldHjIp3FHHMPy1rK58=", "hash": "sha256-UyHOI8C0eDV5YllAi9clHp/CEldHjIp3FHHMPy1rK58=",
@ -363,13 +365,13 @@
"vendorHash": "sha256-XxltOTtCgmJ9wZX8Yw39HkwVVZb58kZjAH7jfKPhjKM=" "vendorHash": "sha256-XxltOTtCgmJ9wZX8Yw39HkwVVZb58kZjAH7jfKPhjKM="
}, },
"doppler": { "doppler": {
"hash": "sha256-zebkytKTBZ1WRS8oSdW/5B7McnL5GBClN79igdjcMvs=", "hash": "sha256-YOJbeMFwEF+r4vOdKM5txdqPeYV1/8N/DKwlMjQiT6w=",
"homepage": "https://registry.terraform.io/providers/DopplerHQ/doppler", "homepage": "https://registry.terraform.io/providers/DopplerHQ/doppler",
"owner": "DopplerHQ", "owner": "DopplerHQ",
"repo": "terraform-provider-doppler", "repo": "terraform-provider-doppler",
"rev": "v1.3.0", "rev": "v1.4.0",
"spdx": "Apache-2.0", "spdx": "Apache-2.0",
"vendorHash": "sha256-Z5GKIty78BUFF3VbTcsZKi437gw/kOIHEKkAYu3uB2o=" "vendorHash": "sha256-qJ1mOuMyJ/f2/yCns7qY8zUt2lgDuBgzN0w1HCKBk7E="
}, },
"elasticsearch": { "elasticsearch": {
"hash": "sha256-a6kHN3w0sQCP+0+ZtFwcg9erfVBYkhNo+yOrnwweGWo=", "hash": "sha256-a6kHN3w0sQCP+0+ZtFwcg9erfVBYkhNo+yOrnwweGWo=",
@ -381,20 +383,20 @@
"vendorHash": "sha256-oVTanZpCWs05HwyIKW2ajiBPz1HXOFzBAt5Us+EtTRw=" "vendorHash": "sha256-oVTanZpCWs05HwyIKW2ajiBPz1HXOFzBAt5Us+EtTRw="
}, },
"equinix": { "equinix": {
"hash": "sha256-zjYMJfG+FJpgDWdDxlwp02lhs5yn15EIJqrAGIbrgDs=", "hash": "sha256-WWW4X5fCQAZZiAVi79realf0EtB0AGnfS5yjSJrlZTU=",
"homepage": "https://registry.terraform.io/providers/equinix/equinix", "homepage": "https://registry.terraform.io/providers/equinix/equinix",
"owner": "equinix", "owner": "equinix",
"repo": "terraform-provider-equinix", "repo": "terraform-provider-equinix",
"rev": "v1.22.0", "rev": "v1.26.0",
"spdx": "MIT", "spdx": "MIT",
"vendorHash": "sha256-c40HqNBU0dXsidddgXuke8cSo/frAUKlxWMbsimiYMc=" "vendorHash": "sha256-vMmHoQEXXPbFS/q+wy35SQd5+yEXLQFVWX9AKsmbTn4="
}, },
"exoscale": { "exoscale": {
"hash": "sha256-HVNGzcX0l7E4jB6TiWSPG9XRmpKL6HIt2gaYiDLFOb4=", "hash": "sha256-SDvW6VC8MwrAWhFGNFMNXA55FbMwSBs9BjX9gnqesZ8=",
"homepage": "https://registry.terraform.io/providers/exoscale/exoscale", "homepage": "https://registry.terraform.io/providers/exoscale/exoscale",
"owner": "exoscale", "owner": "exoscale",
"repo": "terraform-provider-exoscale", "repo": "terraform-provider-exoscale",
"rev": "v0.54.1", "rev": "v0.55.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": null "vendorHash": null
}, },
@ -454,33 +456,33 @@
"vendorHash": null "vendorHash": null
}, },
"gitlab": { "gitlab": {
"hash": "sha256-J7jjGlvdxdAfbvSuekVaDTOZbY3MhxvLQMxGFH6LKEQ=", "hash": "sha256-sk18gC7ZecdvXIzYrNhyYLduttZrVVgekNjgYR379TY=",
"homepage": "https://registry.terraform.io/providers/gitlabhq/gitlab", "homepage": "https://registry.terraform.io/providers/gitlabhq/gitlab",
"owner": "gitlabhq", "owner": "gitlabhq",
"repo": "terraform-provider-gitlab", "repo": "terraform-provider-gitlab",
"rev": "v16.7.0", "rev": "v16.8.1",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-X+8WUPVpP27wWeWM1DA8P3fOToK791mtO6/grKyxcXg=" "vendorHash": "sha256-dfsIEyLyTTJJxMPXWyo0YuSaRrjL+qGL654TAgECWPM="
}, },
"google": { "google": {
"hash": "sha256-ZlU2ifri8yM6oUwS1tVmHkTbZfdcei7M0aaX8d4o4NE=", "hash": "sha256-oGd2r/qCpiX/+vLDUlMhBBatZHmX0V+28jkhwy1zga4=",
"homepage": "https://registry.terraform.io/providers/hashicorp/google", "homepage": "https://registry.terraform.io/providers/hashicorp/google",
"owner": "hashicorp", "owner": "hashicorp",
"proxyVendor": true, "proxyVendor": true,
"repo": "terraform-provider-google", "repo": "terraform-provider-google",
"rev": "v5.11.0", "rev": "v5.13.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-N/FsxRGQu7GQG54oUO4TYiBFjRSZaU1vxBidC56D7m8=" "vendorHash": "sha256-1VdjxH20jZw6u33TLVMw/qxTHdviqF45SmWiKald2yw="
}, },
"google-beta": { "google-beta": {
"hash": "sha256-VZmoIR4yDh3uaaE9DOt6B04IIxsqla+dFWWXbU2qW1c=", "hash": "sha256-Q7hQff48vpGoiUPDWF+IuiJYDRMJgajqc7Jzgb4aUj4=",
"homepage": "https://registry.terraform.io/providers/hashicorp/google-beta", "homepage": "https://registry.terraform.io/providers/hashicorp/google-beta",
"owner": "hashicorp", "owner": "hashicorp",
"proxyVendor": true, "proxyVendor": true,
"repo": "terraform-provider-google-beta", "repo": "terraform-provider-google-beta",
"rev": "v5.11.0", "rev": "v5.13.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-N/FsxRGQu7GQG54oUO4TYiBFjRSZaU1vxBidC56D7m8=" "vendorHash": "sha256-1VdjxH20jZw6u33TLVMw/qxTHdviqF45SmWiKald2yw="
}, },
"googleworkspace": { "googleworkspace": {
"hash": "sha256-dedYnsKHizxJZibuvJOMbJoux0W6zgKaK5fxIofKqCY=", "hash": "sha256-dedYnsKHizxJZibuvJOMbJoux0W6zgKaK5fxIofKqCY=",
@ -492,13 +494,13 @@
"vendorHash": "sha256-fqVBnAivVekV+4tpkl+E6eNA3wi8mhLevJRCs3W7L2g=" "vendorHash": "sha256-fqVBnAivVekV+4tpkl+E6eNA3wi8mhLevJRCs3W7L2g="
}, },
"grafana": { "grafana": {
"hash": "sha256-6A7+9LuKq7XvP65XB00wTKfbY0cXbGR2puVP3qMSVfA=", "hash": "sha256-hC87cIbDqK9rTK/SOuLy4qBVpMUCPxrFb+ReDkGhU1o=",
"homepage": "https://registry.terraform.io/providers/grafana/grafana", "homepage": "https://registry.terraform.io/providers/grafana/grafana",
"owner": "grafana", "owner": "grafana",
"repo": "terraform-provider-grafana", "repo": "terraform-provider-grafana",
"rev": "v2.8.1", "rev": "v2.10.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-FhpuE01EcxnZALAeMvSBxKmgJRNiJvQg6+WVKCI3Cek=" "vendorHash": "sha256-/cS4skB/p4QMeRqxpgp7JjnkTnTHVtb5M9YEVA1X+k0="
}, },
"gridscale": { "gridscale": {
"hash": "sha256-nOuckOEiHTMUOSjRwTHaitLOosraEl2mbU4gafi3gi4=", "hash": "sha256-nOuckOEiHTMUOSjRwTHaitLOosraEl2mbU4gafi3gi4=",
@ -510,13 +512,13 @@
"vendorHash": null "vendorHash": null
}, },
"hcloud": { "hcloud": {
"hash": "sha256-9yW3VbxtD+oSxmc2R9yzZisMTAOwjzyCzvZBRdFdH/w=", "hash": "sha256-D7RBrpOxfSfeip7z+mAkWBjSTVnnM/MfN7Qvl/E+nA0=",
"homepage": "https://registry.terraform.io/providers/hetznercloud/hcloud", "homepage": "https://registry.terraform.io/providers/hetznercloud/hcloud",
"owner": "hetznercloud", "owner": "hetznercloud",
"repo": "terraform-provider-hcloud", "repo": "terraform-provider-hcloud",
"rev": "v1.44.1", "rev": "v1.45.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-oGABaZRnwZdS5qPmksT4x7Tin2WpU2Jk9pejeHbghm8=" "vendorHash": "sha256-sipYN9Z76fib4j15VIn/1Rn7QelNNB2+KeFn5rIA6hM="
}, },
"helm": { "helm": {
"hash": "sha256-Zj0mZfQhZimk3QozKHNU7quO/SqV3278Y+l9bFa8w/k=", "hash": "sha256-Zj0mZfQhZimk3QozKHNU7quO/SqV3278Y+l9bFa8w/k=",
@ -528,11 +530,11 @@
"vendorHash": "sha256-qoXWnAbjRsvFDtlDCfeaIjc5hZIbCgosyH0pXhHkWiA=" "vendorHash": "sha256-qoXWnAbjRsvFDtlDCfeaIjc5hZIbCgosyH0pXhHkWiA="
}, },
"heroku": { "heroku": {
"hash": "sha256-M1HdcKHOVf/rxjECvHqnU6FRXE6T8TpI24Fo0gkZ6FU=", "hash": "sha256-B/NaFe8KOKGJJlF3vZnpdMnbD1VxBktqodPBk+4NZEc=",
"homepage": "https://registry.terraform.io/providers/heroku/heroku", "homepage": "https://registry.terraform.io/providers/heroku/heroku",
"owner": "heroku", "owner": "heroku",
"repo": "terraform-provider-heroku", "repo": "terraform-provider-heroku",
"rev": "v5.2.7", "rev": "v5.2.8",
"spdx": null, "spdx": null,
"vendorHash": null "vendorHash": null
}, },
@ -727,13 +729,13 @@
"vendorHash": "sha256-T/YQsNpPISDSVi00KrLRX/+jFNQVl2ze/3D2ZRxmUjI=" "vendorHash": "sha256-T/YQsNpPISDSVi00KrLRX/+jFNQVl2ze/3D2ZRxmUjI="
}, },
"lxd": { "lxd": {
"hash": "sha256-2th4/2uLFnmSFKI94bSSt4OSX9wiML/OkThR6SbUCPE=", "hash": "sha256-culY1Im8D4CtgC2LtTFFB0BgrNgLfDLT0I290+0NE3A=",
"homepage": "https://registry.terraform.io/providers/terraform-lxd/lxd", "homepage": "https://registry.terraform.io/providers/terraform-lxd/lxd",
"owner": "terraform-lxd", "owner": "terraform-lxd",
"repo": "terraform-provider-lxd", "repo": "terraform-provider-lxd",
"rev": "v1.10.4", "rev": "v2.0.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-gcXX4XIyY2X7ZSDMVVzGL/ltaf8Z1/Zx8oJo/IDrIBA=" "vendorHash": "sha256-NHf6xjbbDHsTdjzZ0gIa08PE53Bjv2llBRIgNTx7fj4="
}, },
"mailgun": { "mailgun": {
"hash": "sha256-fg1I1lt2cA0DgxLnxYrm0V55pD9AkpAdonXVGYeFZwQ=", "hash": "sha256-fg1I1lt2cA0DgxLnxYrm0V55pD9AkpAdonXVGYeFZwQ=",
@ -763,13 +765,13 @@
"vendorHash": "sha256-QxbZv6YMa5/I4bTeQBNdmG3EKtLEmstnH7HMiZzFJrI=" "vendorHash": "sha256-QxbZv6YMa5/I4bTeQBNdmG3EKtLEmstnH7HMiZzFJrI="
}, },
"migadu": { "migadu": {
"hash": "sha256-Alr9E9kaShDls8KZzi1OAennXi+T7y4F6AnpMLnhOgM=", "hash": "sha256-4mT5BbOXl4OY99ao6nyQQgQImPk/1X7lOAZcAxYToQw=",
"homepage": "https://registry.terraform.io/providers/metio/migadu", "homepage": "https://registry.terraform.io/providers/metio/migadu",
"owner": "metio", "owner": "metio",
"repo": "terraform-provider-migadu", "repo": "terraform-provider-migadu",
"rev": "2023.12.21", "rev": "2024.1.25",
"spdx": "0BSD", "spdx": "0BSD",
"vendorHash": "sha256-xCra7bh/vydRUAV/g5L8ZbJR3K+UeT8ovz7vMpsupAE=" "vendorHash": "sha256-eee9X1QTDqL9rIGOnnxLU6QlcSIeMLlTZnHYis+ht+w="
}, },
"minio": { "minio": {
"hash": "sha256-i3YYBffP7Jp3f0wN1ZwP+c7C8WN8EKUh7JOKzbH0R/I=", "hash": "sha256-i3YYBffP7Jp3f0wN1ZwP+c7C8WN8EKUh7JOKzbH0R/I=",
@ -808,13 +810,13 @@
"vendorHash": null "vendorHash": null
}, },
"newrelic": { "newrelic": {
"hash": "sha256-dRO12NFsZnRxbKBo7B0wK2C5HHBVA0iIdCU+sYzuSqA=", "hash": "sha256-9oYJTB4GYnLqw7paELFA8MdhLa5C9+aTCbzHOqrX+Io=",
"homepage": "https://registry.terraform.io/providers/newrelic/newrelic", "homepage": "https://registry.terraform.io/providers/newrelic/newrelic",
"owner": "newrelic", "owner": "newrelic",
"repo": "terraform-provider-newrelic", "repo": "terraform-provider-newrelic",
"rev": "v3.28.1", "rev": "v3.29.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-mcw5BfZLmSidhkJz/NonraE77HonthI6WUwRfammM/g=" "vendorHash": "sha256-GwvO9w1WikBseQpGMJXZ4G6E4eyTxrpNWmFWpWGC4Vs="
}, },
"nomad": { "nomad": {
"hash": "sha256-MEQK/HF9SNEKehLIUMBm2P0WdR5yISJ8DCpI0fVP/DA=", "hash": "sha256-MEQK/HF9SNEKehLIUMBm2P0WdR5yISJ8DCpI0fVP/DA=",
@ -845,20 +847,20 @@
}, },
"nutanix": { "nutanix": {
"deleteVendor": true, "deleteVendor": true,
"hash": "sha256-Okjb4MS28gY1UdYA8+qs45VV5QcGabvMn5bc+nhzbt4=", "hash": "sha256-p1VhGSor/uxQYiSb9enAeu6dtLRuXMKk9m2DtPEj6vs=",
"homepage": "https://registry.terraform.io/providers/nutanix/nutanix", "homepage": "https://registry.terraform.io/providers/nutanix/nutanix",
"owner": "nutanix", "owner": "nutanix",
"repo": "terraform-provider-nutanix", "repo": "terraform-provider-nutanix",
"rev": "v1.9.4", "rev": "v1.9.5",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-LRIfxQGwG988HE5fftGl6JmBG7tTknvmgpm4Fu1NbWI=" "vendorHash": "sha256-LRIfxQGwG988HE5fftGl6JmBG7tTknvmgpm4Fu1NbWI="
}, },
"oci": { "oci": {
"hash": "sha256-s+yyvYJCEcG3BxcPbnHR88WzZfuwk2c4QNGkdqSwLn4=", "hash": "sha256-WpBYrIm0Holm3ynEZjC7Pkqk8w4jGXu9Q7iOmKN8h/g=",
"homepage": "https://registry.terraform.io/providers/oracle/oci", "homepage": "https://registry.terraform.io/providers/oracle/oci",
"owner": "oracle", "owner": "oracle",
"repo": "terraform-provider-oci", "repo": "terraform-provider-oci",
"rev": "v5.23.0", "rev": "v5.26.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": null "vendorHash": null
}, },
@ -881,13 +883,13 @@
"vendorHash": null "vendorHash": null
}, },
"opennebula": { "opennebula": {
"hash": "sha256-WVNCZDb96vsDfRvAz0MQlHmQUj+PbJ2CVWJ/A7yOAGk=", "hash": "sha256-Bz/JKPbdxKS7VDnQoXnZ5ajqh++ujl+4wIS49BDtT94=",
"homepage": "https://registry.terraform.io/providers/OpenNebula/opennebula", "homepage": "https://registry.terraform.io/providers/OpenNebula/opennebula",
"owner": "OpenNebula", "owner": "OpenNebula",
"repo": "terraform-provider-opennebula", "repo": "terraform-provider-opennebula",
"rev": "v1.3.1", "rev": "v1.4.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-W7UGOtyFsIMXPqFDnde2XlzU7klR7Fs00mSuJ9ID20A=" "vendorHash": "sha256-Hd6vh4ihuR1rRk5yIu1mPuDMb4Not4soKld10MfOuGU="
}, },
"openstack": { "openstack": {
"hash": "sha256-sFv7n5tf3aAwe6R1XeJdU3XMDF9ZMCM3t/vVLegZaXM=", "hash": "sha256-sFv7n5tf3aAwe6R1XeJdU3XMDF9ZMCM3t/vVLegZaXM=",
@ -899,13 +901,13 @@
"vendorHash": "sha256-hVsqlWTZoYAMWMeismKhiqFxSFbkTBSIEMSLZx5stnQ=" "vendorHash": "sha256-hVsqlWTZoYAMWMeismKhiqFxSFbkTBSIEMSLZx5stnQ="
}, },
"opentelekomcloud": { "opentelekomcloud": {
"hash": "sha256-KDVbrOwThgZJMD2qmHPhcV+ZbMz3sPM+ZOa4Cw7KEYA=", "hash": "sha256-4AsU4O5YxyqUvxBPwQw56dPGXoEsHBxJfHc5tnEPz4Q=",
"homepage": "https://registry.terraform.io/providers/opentelekomcloud/opentelekomcloud", "homepage": "https://registry.terraform.io/providers/opentelekomcloud/opentelekomcloud",
"owner": "opentelekomcloud", "owner": "opentelekomcloud",
"repo": "terraform-provider-opentelekomcloud", "repo": "terraform-provider-opentelekomcloud",
"rev": "v1.35.15", "rev": "v1.36.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-LWFUVxEF9u6ddVjFVjmzbrcqblKuNurluYlV8/2tn6s=" "vendorHash": "sha256-2XxpNnJkmXFd8CHETUlj1T3eQWDssFqPKzrWAbOOYzk="
}, },
"opsgenie": { "opsgenie": {
"hash": "sha256-ZssKhfwFrzCjvlebEmKAHWBInN5daVqxbmVFoA92dv8=", "hash": "sha256-ZssKhfwFrzCjvlebEmKAHWBInN5daVqxbmVFoA92dv8=",
@ -926,11 +928,11 @@
"vendorHash": null "vendorHash": null
}, },
"pagerduty": { "pagerduty": {
"hash": "sha256-XP7Y8qCnsCDMfMV1ip09y5HZHZUmpvYzBZA3xodedTw=", "hash": "sha256-PgMG1TfeJ5vMmp+DxjFKL3UdHpHmPUwF6GG/y36Km+s=",
"homepage": "https://registry.terraform.io/providers/PagerDuty/pagerduty", "homepage": "https://registry.terraform.io/providers/PagerDuty/pagerduty",
"owner": "PagerDuty", "owner": "PagerDuty",
"repo": "terraform-provider-pagerduty", "repo": "terraform-provider-pagerduty",
"rev": "v3.4.0", "rev": "v3.6.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": null "vendorHash": null
}, },
@ -1034,13 +1036,13 @@
"vendorHash": null "vendorHash": null
}, },
"scaleway": { "scaleway": {
"hash": "sha256-KSkVKPRBSdajQrf9XbcVDu+migRWqCKAYxVuywILzEo=", "hash": "sha256-xJpCu2/7pf6kkZVPhozAXfeU5mbzdVDYT2DvDmjajCc=",
"homepage": "https://registry.terraform.io/providers/scaleway/scaleway", "homepage": "https://registry.terraform.io/providers/scaleway/scaleway",
"owner": "scaleway", "owner": "scaleway",
"repo": "terraform-provider-scaleway", "repo": "terraform-provider-scaleway",
"rev": "v2.35.0", "rev": "v2.36.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-vG5wLysF76t4eGIaV8eyrH7TNeZKci2gJ/AfZEUlhdA=" "vendorHash": "sha256-E/qBdcSPq/hpG0b0pmeY6ugItNrtu0HUdlJxpakAVwE="
}, },
"secret": { "secret": {
"hash": "sha256-MmAnA/4SAPqLY/gYcJSTnEttQTsDd2kEdkQjQj6Bb+A=", "hash": "sha256-MmAnA/4SAPqLY/gYcJSTnEttQTsDd2kEdkQjQj6Bb+A=",
@ -1061,13 +1063,13 @@
"vendorHash": "sha256-FjJosTjFRJnBW22IB9UHfZe9KWrT1h12InyUl0q7a28=" "vendorHash": "sha256-FjJosTjFRJnBW22IB9UHfZe9KWrT1h12InyUl0q7a28="
}, },
"sentry": { "sentry": {
"hash": "sha256-VTgD19eWeRtDFOuUjnSANkNz8pN/UutJeFgS5qkMpH8=", "hash": "sha256-sUXOH0cbD5Zf3e4KHLUYM8vu2knJdfIWZ+fq9HMfJ54=",
"homepage": "https://registry.terraform.io/providers/jianyuan/sentry", "homepage": "https://registry.terraform.io/providers/jianyuan/sentry",
"owner": "jianyuan", "owner": "jianyuan",
"repo": "terraform-provider-sentry", "repo": "terraform-provider-sentry",
"rev": "v0.12.1", "rev": "v0.12.2",
"spdx": "MIT", "spdx": "MIT",
"vendorHash": "sha256-lwTsKX3rQObMvysvcPYxJxd09LRlWTH2s+APiOhnalo=" "vendorHash": "sha256-C4gyHcfWN7v5a5gB8CjoDkAlqRxgd6bpsT8n9St2tEM="
}, },
"shell": { "shell": {
"hash": "sha256-LTWEdXxi13sC09jh+EFZ6pOi1mzuvgBz5vceIkNE/JY=", "hash": "sha256-LTWEdXxi13sC09jh+EFZ6pOi1mzuvgBz5vceIkNE/JY=",
@ -1079,11 +1081,11 @@
"vendorHash": "sha256-MIO0VHofPtKPtynbvjvEukMNr5NXHgk7BqwIhbc9+u0=" "vendorHash": "sha256-MIO0VHofPtKPtynbvjvEukMNr5NXHgk7BqwIhbc9+u0="
}, },
"signalfx": { "signalfx": {
"hash": "sha256-ILh5mdTyzU0AfJzyGH9JK1QsOER0BtKn9vXyRaGeb8g=", "hash": "sha256-kUubyCd00VhB72JEvWDBLF4/uglzkBmijcbotTyQgyA=",
"homepage": "https://registry.terraform.io/providers/splunk-terraform/signalfx", "homepage": "https://registry.terraform.io/providers/splunk-terraform/signalfx",
"owner": "splunk-terraform", "owner": "splunk-terraform",
"repo": "terraform-provider-signalfx", "repo": "terraform-provider-signalfx",
"rev": "v9.0.0", "rev": "v9.0.1",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-PQU4VC5wHcB70UkZaRT8jtz+qOAONU2SxtRrTmml9vY=" "vendorHash": "sha256-PQU4VC5wHcB70UkZaRT8jtz+qOAONU2SxtRrTmml9vY="
}, },
@ -1097,11 +1099,11 @@
"vendorHash": null "vendorHash": null
}, },
"snowflake": { "snowflake": {
"hash": "sha256-G/LHNXkK/pOwNqpoCudM3eGQgv1U2r5l4N/gJfJ5JzU=", "hash": "sha256-uMXU/0LqOMBRaIOw1hxCdWuogrkWW9r/28YHniOxCbA=",
"homepage": "https://registry.terraform.io/providers/Snowflake-Labs/snowflake", "homepage": "https://registry.terraform.io/providers/Snowflake-Labs/snowflake",
"owner": "Snowflake-Labs", "owner": "Snowflake-Labs",
"repo": "terraform-provider-snowflake", "repo": "terraform-provider-snowflake",
"rev": "v0.82.0", "rev": "v0.84.1",
"spdx": "MIT", "spdx": "MIT",
"vendorHash": "sha256-nT/zEQgHWnCrlm6TL/DnXIvwDxEs147OfXn/qnlvIH0=" "vendorHash": "sha256-nT/zEQgHWnCrlm6TL/DnXIvwDxEs147OfXn/qnlvIH0="
}, },
@ -1115,13 +1117,13 @@
"vendorHash": "sha256-8W1PK4T98iK1N6EB6AVjvr1P9Ja51+kSOmYAEosxrh8=" "vendorHash": "sha256-8W1PK4T98iK1N6EB6AVjvr1P9Ja51+kSOmYAEosxrh8="
}, },
"spotinst": { "spotinst": {
"hash": "sha256-LJVaD0GW3a4sDwUuxB8C0Rp+s1wFknMo0LFPDkClp68=", "hash": "sha256-cLP/I54ClS0aQ14cWrtV57WrDJzBO3fpOMjd9GPR/Z0=",
"homepage": "https://registry.terraform.io/providers/spotinst/spotinst", "homepage": "https://registry.terraform.io/providers/spotinst/spotinst",
"owner": "spotinst", "owner": "spotinst",
"repo": "terraform-provider-spotinst", "repo": "terraform-provider-spotinst",
"rev": "v1.158.0", "rev": "v1.160.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-7hgpA6ck7I5r1rkTjJSZ2vbLAe0suS+GaVJ80LlbJsM=" "vendorHash": "sha256-xsV1Co7kSDUrhT6wL6WAzNV/ciHyinW2V6svsezY3/s="
}, },
"stackpath": { "stackpath": {
"hash": "sha256-aCaoRxlV/UxYobHC5OqFO8nt9oQgyug1AuJffhnwauc=", "hash": "sha256-aCaoRxlV/UxYobHC5OqFO8nt9oQgyug1AuJffhnwauc=",
@ -1142,11 +1144,11 @@
"vendorHash": "sha256-9M1DsE/FPQK8TG7xCJWbU3HAJCK3p/7lxdzjO1oAfWs=" "vendorHash": "sha256-9M1DsE/FPQK8TG7xCJWbU3HAJCK3p/7lxdzjO1oAfWs="
}, },
"sumologic": { "sumologic": {
"hash": "sha256-HMjghu/2Q7rPkVKO5qtKAqEZFexbK3lfiylwB8Q2sYw=", "hash": "sha256-LQ+EDvnQVuNhMMAlU27R9aytWsfdyaHHiGLF4zBs4d0=",
"homepage": "https://registry.terraform.io/providers/SumoLogic/sumologic", "homepage": "https://registry.terraform.io/providers/SumoLogic/sumologic",
"owner": "SumoLogic", "owner": "SumoLogic",
"repo": "terraform-provider-sumologic", "repo": "terraform-provider-sumologic",
"rev": "v2.28.0", "rev": "v2.28.1",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-iNBM4Y24vDGPKyb5cppSogk145F0/pAFmOzEeiWgfLI=" "vendorHash": "sha256-iNBM4Y24vDGPKyb5cppSogk145F0/pAFmOzEeiWgfLI="
}, },
@ -1169,11 +1171,11 @@
"vendorHash": "sha256-FWwHAaUKUw7DyNs4sAlkLkGNj48wMJgpFvfQgbp8lFs=" "vendorHash": "sha256-FWwHAaUKUw7DyNs4sAlkLkGNj48wMJgpFvfQgbp8lFs="
}, },
"tencentcloud": { "tencentcloud": {
"hash": "sha256-pgG8Y/Bnyg86TNK4pjhBXXLijQE2nCe/Q35L+SY1AJs=", "hash": "sha256-miYELvWd/b33JUe74j3pYmyDIRrOI+8PEv4mJ+MfhNE=",
"homepage": "https://registry.terraform.io/providers/tencentcloudstack/tencentcloud", "homepage": "https://registry.terraform.io/providers/tencentcloudstack/tencentcloud",
"owner": "tencentcloudstack", "owner": "tencentcloudstack",
"repo": "terraform-provider-tencentcloud", "repo": "terraform-provider-tencentcloud",
"rev": "v1.81.64", "rev": "v1.81.71",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": null "vendorHash": null
}, },
@ -1187,11 +1189,11 @@
"vendorHash": "sha256-lxXTiJeZ/8psry2dxrecB+o0xElSQrCjwZ9zXijI9Bs=" "vendorHash": "sha256-lxXTiJeZ/8psry2dxrecB+o0xElSQrCjwZ9zXijI9Bs="
}, },
"thunder": { "thunder": {
"hash": "sha256-wS50I4iTnHq0rDUoz7tQXpqW84wugQQiw42xhzxFiRw=", "hash": "sha256-ezolcZ652YUV/CDoNKNRZkiRpRoa5AMqHxeYLxluA5A=",
"homepage": "https://registry.terraform.io/providers/a10networks/thunder", "homepage": "https://registry.terraform.io/providers/a10networks/thunder",
"owner": "a10networks", "owner": "a10networks",
"repo": "terraform-provider-thunder", "repo": "terraform-provider-thunder",
"rev": "v1.3.0", "rev": "v1.4.1",
"spdx": "BSD-2-Clause", "spdx": "BSD-2-Clause",
"vendorHash": null "vendorHash": null
}, },
@ -1242,22 +1244,22 @@
"vendorHash": null "vendorHash": null
}, },
"utils": { "utils": {
"hash": "sha256-WbJy1lwEX6RCYxZydCJ+0U/mJB4NoYiUg9+zf8Mxnwk=", "hash": "sha256-7o3pVJvwnO80bXPJ5i0wfgz9mVqmXJRvGsVWj7N92gA=",
"homepage": "https://registry.terraform.io/providers/cloudposse/utils", "homepage": "https://registry.terraform.io/providers/cloudposse/utils",
"owner": "cloudposse", "owner": "cloudposse",
"repo": "terraform-provider-utils", "repo": "terraform-provider-utils",
"rev": "1.14.0", "rev": "1.15.0",
"spdx": "Apache-2.0", "spdx": "Apache-2.0",
"vendorHash": "sha256-vFfwa8DfmiHpbBbXPNovPC7SFoXRjyHRwOVqBcWCEtI=" "vendorHash": "sha256-jz1eQG7pyeYt96KndzY1iR8n5Xm/1NNM7AD5eR8W/k0="
}, },
"vault": { "vault": {
"hash": "sha256-Db56SNnIHUuiIUKFKC5NwWaIbfsT85GZ95UBR+PUSMY=", "hash": "sha256-nFthtHwWuWEgtrw6mhqDlXW5sOuxqHlMyReHvYNcasQ=",
"homepage": "https://registry.terraform.io/providers/hashicorp/vault", "homepage": "https://registry.terraform.io/providers/hashicorp/vault",
"owner": "hashicorp", "owner": "hashicorp",
"repo": "terraform-provider-vault", "repo": "terraform-provider-vault",
"rev": "v3.23.0", "rev": "v3.24.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-5rRWlInDRj7hw4GZqTxfH7Y8tyTvzJgBWA1I5j0EyaI=" "vendorHash": "sha256-SjKFRIrIQD9rsoHkoBxNDdCd8iBF1aHdJodII1ml7Ds="
}, },
"vcd": { "vcd": {
"hash": "sha256-TP9COMofx4c2GZ0dQkfopn4iq8ddfV3WwuNjTu6yQnU=", "hash": "sha256-TP9COMofx4c2GZ0dQkfopn4iq8ddfV3WwuNjTu6yQnU=",
@ -1323,12 +1325,12 @@
"vendorHash": "sha256-GRnVhGpVgFI83Lg34Zv1xgV5Kp8ioKTFV5uaqS80ATg=" "vendorHash": "sha256-GRnVhGpVgFI83Lg34Zv1xgV5Kp8ioKTFV5uaqS80ATg="
}, },
"yandex": { "yandex": {
"hash": "sha256-piN10vAmUjI/jHTGVWvSGFNR7T01/51E8rJ+UZZt5Vk=", "hash": "sha256-B0gc1PfAlwq//JvfEx4r+QUBDE1eO4ACJO6H2/TZvz8=",
"homepage": "https://registry.terraform.io/providers/yandex-cloud/yandex", "homepage": "https://registry.terraform.io/providers/yandex-cloud/yandex",
"owner": "yandex-cloud", "owner": "yandex-cloud",
"repo": "terraform-provider-yandex", "repo": "terraform-provider-yandex",
"rev": "v0.104.0", "rev": "v0.106.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-W/i1r+SdYPTU4kha5Pr4i8+Xr8KqTEKFZDA3+vMP8pk=" "vendorHash": "sha256-6GLzXkRrDAsTxdrzz+sWf2AxkTHdyjfu72l4s0KwndY="
} }
} }

View File

@ -5,16 +5,16 @@
buildGoModule rec { buildGoModule rec {
pname = "terragrunt"; pname = "terragrunt";
version = "0.54.16"; version = "0.54.22";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "gruntwork-io"; owner = "gruntwork-io";
repo = pname; repo = pname;
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-UWldCHuRZI3pKl65VVorik9ucN0+xWyfl6r3X5m2xoI="; hash = "sha256-Kxj/Op+XWKJ5C0sShnXp8zovpn0BZh7CYm8FwLHTXpI=";
}; };
vendorHash = "sha256-kGHcVWO59LyFGDjh9fC++z6PSirepa5QNHDJoojT5kA="; vendorHash = "sha256-Y5+XruUqya+sY3DuX/bVVT4ZVYmTBIDoFRAiRKFyX3M=";
doCheck = false; doCheck = false;

View File

@ -2,16 +2,16 @@
buildGoModule rec { buildGoModule rec {
pname = "tfupdate"; pname = "tfupdate";
version = "0.8.0"; version = "0.8.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "minamijoyo"; owner = "minamijoyo";
repo = "tfupdate"; repo = "tfupdate";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-HyDWye7xL0g5vDoGl8FYFXfuMKU4rxAlFawQ5ynqkmc="; sha256 = "sha256-WVYWoojNRAKmFt5kTaE86TNgodTld/vZ4O2LmLcU6sA=";
}; };
vendorHash = "sha256-oPqAH+i9ryb1Ps1yCkxoPgMmf4RNtFBCeE94vZAEnuo="; vendorHash = "sha256-BjusVkp7gN/w2uC1ZyUDaqvXvjEN6BVYNcwNZFOLjDc=";
# Tests start http servers which need to bind to local addresses: # Tests start http servers which need to bind to local addresses:
# panic: httptest: failed to listen on a port: listen tcp6 [::1]:0: bind: operation not permitted # panic: httptest: failed to listen on a port: listen tcp6 [::1]:0: bind: operation not permitted

View File

@ -26,11 +26,11 @@ let
in in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "zeek"; pname = "zeek";
version = "6.1.0"; version = "6.1.1";
src = fetchurl { src = fetchurl {
url = "https://download.zeek.org/zeek-${version}.tar.gz"; url = "https://download.zeek.org/zeek-${version}.tar.gz";
sha256 = "sha256-+3VvS5eAl1W13sOJJ8SUd/8GqmR9/NK4gCWxvhtqNY4="; sha256 = "sha256-j8Vl6Vc/Wu1JpDV0UoXkLcEPUjRUnvwVAq91RPaDN+U=";
}; };
strictDeps = true; strictDeps = true;

View File

@ -77,7 +77,7 @@ stdenvNoCC.mkDerivation rec {
''; '';
homepage = "https://beeper.com"; homepage = "https://beeper.com";
license = licenses.unfree; license = licenses.unfree;
maintainers = with maintainers; [ jshcmpbll mjm ]; maintainers = with maintainers; [ jshcmpbll mjm edmundmiller ];
platforms = [ "x86_64-linux" ]; platforms = [ "x86_64-linux" ];
}; };
} }

View File

@ -1,8 +1,8 @@
# Generated by ./update.sh - do not update manually! # Generated by ./update.sh - do not update manually!
# Last updated: 2024-01-19 # Last updated: 2024-01-27
{ {
version = "3.2.5-20979"; version = "3.2.5-21159";
urlhash = "c64ca459"; urlhash = "feb78c41";
arm64_hash = "sha256-zzLCWI/0L/6opFpTEQN2xdhqWA8i3pYI+K/0z63tOh4="; arm64_hash = "sha256-3zbhFKQrO1tMSnWJllLJLaVeVpLs44WBbuuyU1LTMIU=";
amd64_hash = "sha256-XDQg98Bo0o7BGkMkl6vpUSvUd0wAbMa0cPVFPrIqWAY="; amd64_hash = "sha256-pX99V18gjlMM6+jC9U7E5YvHDODGsrj0twt9K4rJN4Y=";
} }

View File

@ -19,13 +19,13 @@
stdenv.mkDerivation (finalAttrs: { stdenv.mkDerivation (finalAttrs: {
pname = "teams-for-linux"; pname = "teams-for-linux";
version = "1.4.4"; version = "1.4.5";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "IsmaelMartinez"; owner = "IsmaelMartinez";
repo = "teams-for-linux"; repo = "teams-for-linux";
rev = "v${finalAttrs.version}"; rev = "v${finalAttrs.version}";
hash = "sha256-GNfFzJsWyu46mP0k1wT8SG22F9oKpLwoLQ0TnNFqvv8="; hash = "sha256-Gp+Euuuo51syHmQzzQALxZjejYLoJtGJbo4Gl40UASs=";
}; };
offlineCache = fetchYarnDeps { offlineCache = fetchYarnDeps {

View File

@ -5,11 +5,11 @@
let let
pname = "zulip"; pname = "zulip";
version = "5.10.4"; version = "5.10.5";
src = fetchurl { src = fetchurl {
url = "https://github.com/zulip/zulip-desktop/releases/download/v${version}/Zulip-${version}-x86_64.AppImage"; url = "https://github.com/zulip/zulip-desktop/releases/download/v${version}/Zulip-${version}-x86_64.AppImage";
hash = "sha256-M4h+kV4JjZ91K6OpxKc10XVohzKJEVxw8cYcVALibXA="; hash = "sha256-dWTczjE6QAW26bGTIeFTuXl1JwYr3Ma+8Ab6MjeDr78=";
name="${pname}-${version}.AppImage"; name="${pname}-${version}.AppImage";
}; };

View File

@ -6,16 +6,16 @@
buildNpmPackage rec { buildNpmPackage rec {
pname = "flood-for-transmission"; pname = "flood-for-transmission";
version = "2023-11-17T12-46-13"; version = "2024-01-24T16-52-06";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "johman10"; owner = "johman10";
repo = pname; repo = pname;
rev = version; rev = version;
hash = "sha256-TaLWhly/4hOigWY1XP7FmgN4LbrdLb79NQ47z5JiiYE="; hash = "sha256-ZV/Gk9DlYkMh8j034YGvMVN7MeOJgFARyOr9Atrs3j4=";
}; };
npmDepsHash = "sha256-PCeknfS81K8ttU4hV2D841tgQsGfIVaAOVIEDXe8fVQ="; npmDepsHash = "sha256-VHWM0vxFKucrmoJiwYpjw7QqhBQw9rPPQVIIevp6Wn0=";
npmInstallFlags = [ "--legacy-peer-deps" ]; npmInstallFlags = [ "--legacy-peer-deps" ];

View File

@ -5,18 +5,18 @@
buildGoModule rec { buildGoModule rec {
pname = "storj-uplink"; pname = "storj-uplink";
version = "1.94.2"; version = "1.96.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "storj"; owner = "storj";
repo = "storj"; repo = "storj";
rev = "v${version}"; rev = "v${version}";
hash = "sha256-q2QLsbJSVnRch4CIlGI2Thuz0OOpGURIdy1BEKxUZ1A="; hash = "sha256-mQIrXDEfMMrubQyn90eu0k3isvnpaF237Tpd84HhUfU=";
}; };
subPackages = [ "cmd/uplink" ]; subPackages = [ "cmd/uplink" ];
vendorHash = "sha256-UGx5pGfS7jWn7Uwjg1Gf/oQ3GbRTh5JSb38uPjxdUxc="; vendorHash = "sha256-cUhdl0jqgkA89NeOdFSifR5LsTjeYifOXqBu3qCAovk=";
ldflags = [ "-s" "-w" ]; ldflags = [ "-s" "-w" ];

View File

@ -8,13 +8,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "vnstat"; pname = "vnstat";
version = "2.11"; version = "2.12";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "vergoh"; owner = "vergoh";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-IO5B+jyY6izPpam3Qt4Hu8BOGwfO10ER/GFEbsQORK0="; sha256 = "sha256-JwVYhmCscEdbwNGa+aKdOt8cIclpvjl4tmWFU3zhcwc=";
}; };
postPatch = '' postPatch = ''

View File

@ -1,5 +1,6 @@
{ lib { lib
, fetchFromGitHub , fetchFromGitHub
, fetchpatch
, rustPlatform , rustPlatform
, makeWrapper , makeWrapper
, pkg-config , pkg-config
@ -164,6 +165,14 @@ rec {
src = ./override-version.patch; src = ./override-version.patch;
version = sources.rev; version = sources.rev;
}) })
# Can be removed with release 0.12.3
(fetchpatch {
name = "remove-unused-unstable-features.patch";
url = "https://github.com/ActivityWatch/aw-server-rust/commit/e1cd761d2f0a9309eb851b59732c2567a7ae2d3a.patch";
hash = "sha256-wP+3XZDkr148XY5b8RV3obuLczAFBE3FhaYPqnmmGcU=";
includes = [ "aw-server/src/lib.rs" ];
})
]; ];
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -21,13 +21,13 @@ with lib;
python3Packages.buildPythonApplication rec { python3Packages.buildPythonApplication rec {
pname = "tryton"; pname = "tryton";
version = "5.4.2"; version = "7.0.5";
disabled = !python3Packages.isPy3k; disabled = !python3Packages.isPy3k;
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
sha256 = "1rca19krvmycdhmi1vb4ixwq0cagmrkhbqry4f19b725nlp8cv0q"; sha256 = "sha256-NAnNBfwnMky0qbtU3P5+kHJwCj6nfIQCtYgu6nXLcaQ=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -6,14 +6,14 @@
python3.pkgs.buildPythonApplication rec { python3.pkgs.buildPythonApplication rec {
pname = "snakemake"; pname = "snakemake";
version = "8.2.1"; version = "8.3.2";
format = "setuptools"; format = "setuptools";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "snakemake"; owner = "snakemake";
repo = pname; repo = pname;
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-NpsDJuxH+NHvE735OCHaISPSOhYDxWiKqCb4Yk9DHf4="; hash = "sha256-urC8IVfliVzyWu7zqZN5EI6d3vXz80vHPhQaKBzTEVA=";
# https://github.com/python-versioneer/python-versioneer/issues/217 # https://github.com/python-versioneer/python-versioneer/issues/217
postFetch = '' postFetch = ''
sed -i "$out"/snakemake/_version.py -e 's#git_refnames = ".*"#git_refnames = " (tag: v${version})"#' sed -i "$out"/snakemake/_version.py -e 's#git_refnames = ".*"#git_refnames = " (tag: v${version})"#'

View File

@ -30,14 +30,14 @@
with python3Packages; with python3Packages;
buildPythonApplication rec { buildPythonApplication rec {
pname = "kitty"; pname = "kitty";
version = "0.32.0"; version = "0.32.1";
format = "other"; format = "other";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "kovidgoyal"; owner = "kovidgoyal";
repo = "kitty"; repo = "kitty";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-untfXvBAn39C+s1BxVjXoLpPvnw7TM/uPFB+zZHH8w8="; hash = "sha256-d+Xwn+po/pclAy4UZ4pR4KWmriHCLPeMhXxoHp6wHT8=";
}; };
goModules = (buildGoModule { goModules = (buildGoModule {
@ -240,7 +240,10 @@ buildPythonApplication rec {
homepage = "https://github.com/kovidgoyal/kitty"; homepage = "https://github.com/kovidgoyal/kitty";
description = "A modern, hackable, featureful, OpenGL based terminal emulator"; description = "A modern, hackable, featureful, OpenGL based terminal emulator";
license = licenses.gpl3Only; license = licenses.gpl3Only;
changelog = "https://sw.kovidgoyal.net/kitty/changelog/"; changelog = [
"https://sw.kovidgoyal.net/kitty/changelog/"
"https://github.com/kovidgoyal/kitty/blob/v${version}/docs/changelog.rst"
];
platforms = platforms.darwin ++ platforms.linux; platforms = platforms.darwin ++ platforms.linux;
mainProgram = "kitty"; mainProgram = "kitty";
maintainers = with maintainers; [ tex rvolosatovs Luflosi adamcstephens kashw2 ]; maintainers = with maintainers; [ tex rvolosatovs Luflosi adamcstephens kashw2 ];

View File

@ -8,13 +8,13 @@
}: }:
stdenvNoCC.mkDerivation rec { stdenvNoCC.mkDerivation rec {
pname = "cosmic-icons"; pname = "cosmic-icons";
version = "unstable-2023-11-28"; version = "unstable-2024-01-23";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "pop-os"; owner = "pop-os";
repo = pname; repo = pname;
rev = "1e328dacc117c21000a000a3170a801f467f3c2b"; rev = "49a1762c958196924afcf1eae52ee910c4b4bc9f";
sha256 = "sha256-QmCHkqSPWfZhofh4ieJhl4yjt0R4J15+xElbszHS/4M="; sha256 = "sha256-wL4f1rXWuFmeZCAAw0y+JQ3iesZcEC3XxWWrvrJ50oA=";
}; };
nativeBuildInputs = [ just ]; nativeBuildInputs = [ just ];

View File

@ -6,18 +6,18 @@
buildGoModule rec { buildGoModule rec {
pname = "crawley"; pname = "crawley";
version = "1.7.1"; version = "1.7.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "s0rg"; owner = "s0rg";
repo = "crawley"; repo = "crawley";
rev = "v${version}"; rev = "v${version}";
hash = "sha256-IRhi6z2TQZOOw8EZkJ3/VEOBzAlg0DQjq9wSt+/c3ck="; hash = "sha256-hQvmWob5zCM1dh9oIACjIndaus0gYSidrs4QZM5jtEg=";
}; };
nativeBuildInputs = [ installShellFiles ]; nativeBuildInputs = [ installShellFiles ];
vendorHash = "sha256-0BUbALCBR9CGwkqz1cUnzF3xjQkkzfdS7JDDTXkGmN4="; vendorHash = "sha256-u1y70ydfVG/aH1CVKOUDBmtZgTLlXXrQGt3mfGDibzs=";
ldflags = [ "-w" "-s" ]; ldflags = [ "-w" "-s" ];

View File

@ -15,13 +15,13 @@
stdenv.mkDerivation (finalAttrs: { stdenv.mkDerivation (finalAttrs: {
pname = "cryptor"; pname = "cryptor";
version = "1.0.3"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "moson-mo"; owner = "moson-mo";
repo = "cryptor"; repo = "cryptor";
rev = "v${finalAttrs.version}"; rev = "v${finalAttrs.version}";
hash = "sha256-bgOOueOKSc6dLyxGU+ds9XYWM5mO+qCKC4dkCu2B1sQ="; hash = "sha256-EqiaWgwhSLwZnovqYQ9rfHwvhWucmK0ujSsOhMJEJ1A=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -0,0 +1,41 @@
{ lib
, stdenv
, fetchzip
, perlPackages
}:
stdenv.mkDerivation (finalAttrs: {
pname = "dc3dd";
version = "7.3.1";
src = fetchzip {
url = "mirror://sourceforge/dc3dd/dc3dd-${finalAttrs.version}.zip";
hash = "sha256-SYDoqGlsROHX1a0jJX11F+yp6CeFK+tZbYOOnScC6Ig=";
};
outputs = [ "out" "man" ];
preConfigure = ''
chmod +x configure
'';
buildInputs = [ perlPackages.LocaleGettext ];
makeFlags = [
"PREFIX=$out"
];
configureFlags = lib.optionals (stdenv.hostPlatform.isAarch32 || stdenv.hostPlatform.isAarch64) [ "--build=arm" ];
enableParallelBuilding = true;
meta = with lib; {
description = "A patched version of dd that includes a number of features useful for computer forensics";
mainProgram = "dc3dd";
homepage = "https://sourceforge.net/projects/dc3dd/";
maintainers = with maintainers; [ d3vil0p3r ];
platforms = platforms.unix;
license = licenses.gpl3Plus; # Refer to https://sourceforge.net/p/dc3dd/code/HEAD/tree/COPYING
broken = stdenv.isDarwin;
};
})

View File

@ -2,26 +2,21 @@
lib, lib,
python3Packages, python3Packages,
fetchFromGitHub, fetchFromGitHub,
fetchpatch,
}: }:
python3Packages.buildPythonPackage rec { python3Packages.buildPythonApplication rec {
pname = "doge"; pname = "doge";
version = "3.6.0"; version = "3.7.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "Olivia5k"; owner = "Olivia5k";
repo = "doge"; repo = "doge";
rev = version; rev = version;
hash = "sha256-72nRghD5k0ofrlvV3hEdyrr6uzV4+8At1bOCmRZTxhk="; hash = "sha256-LmEbDQUZe/3lg/Ze+WUNyYfC8zMr88/rn10sL0jgbGA=";
}; };
patches = [ pyproject = true;
# https://github.com/Olivia5k/doge/pull/66, adds a small doge nativeBuildInputs = [python3Packages.setuptools];
(fetchpatch { propagatedBuildInputs = [python3Packages.python-dateutil];
url = "https://github.com/Olivia5k/doge/commit/14e3ccc0a3f1e91862492e20a34d008768a34039.patch";
hash = "sha256-3F+7F9RuoiVWoN+69T7tM871AXX1IQbHqFxD+S3TjxQ=";
})
];
meta = { meta = {
homepage = "https://github.com/Olivia5k/doge"; homepage = "https://github.com/Olivia5k/doge";

View File

@ -14,7 +14,7 @@
}: }:
let let
version = "2.5.2"; version = "3.0";
in in
stdenv.mkDerivation { stdenv.mkDerivation {
inherit version; inherit version;
@ -25,7 +25,7 @@ stdenv.mkDerivation {
owner = "dagargo"; owner = "dagargo";
repo = "elektroid"; repo = "elektroid";
rev = version; rev = version;
sha256 = "sha256-wpPHcrlCX7RD/TGH2Xrth+oCg98gMm035tfTBV70P+Y="; sha256 = "sha256-77bsFB6hOxiW5f9bZ7IQIiwWd3MgtJUD37E6IXBfv/E=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -0,0 +1,29 @@
{ lib
, stdenv
, fetchFromSourcehut
, lua
, luaPackages
}:
stdenv.mkDerivation (finalAttrs: {
pname = "fennel-ls";
version = "0.1.0";
src = fetchFromSourcehut {
owner = "~xerool";
repo = "fennel-ls";
rev = finalAttrs.version;
hash = "sha256-RW3WFJGwascD4YnnrAm/2LFnVigzgtfzVubLMDW9J5s=";
};
buildInputs = [ lua luaPackages.fennel ];
makeFlags = [ "PREFIX=$(out)" ];
installFlags = [ "PREFIX=$(out)" ];
meta = with lib; {
description = "A language server for intelligent editing of the Fennel Programming Language";
homepage = "https://git.sr.ht/~xerool/fennel-ls/";
license = licenses.mit;
maintainers = with maintainers; [ yisraeldov ];
platforms = lua.meta.platforms;
mainProgram = "fennel-ls";
};
})

View File

@ -0,0 +1,32 @@
{ lib
, buildGoModule
, fetchFromGitHub
}:
buildGoModule rec {
pname = "golink";
version = "0-unstable-2024-01-26";
src = fetchFromGitHub {
owner = "tailscale";
repo = "golink";
# https://github.com/tailscale/golink/issues/104
rev = "d9de913fb174ec2569a15b6e2dbe5cb6e4a0a853";
hash = "sha256-w6jRbajEQkOrBqxDnQreSmSB5DNL9flWjloShiIBM+M=";
};
vendorHash = "sha256-R/o3csZC/M9nm0k5STL7AhbG5J4LtdxqKaVjM/9ggW8=";
ldflags = [
"-s"
"-w"
];
meta = with lib; {
description = "A private shortlink service for tailnets";
homepage = "https://github.com/tailscale/golink";
license = licenses.bsd3;
maintainers = with maintainers; [ fab ];
mainProgram = "golink";
};
}

View File

@ -0,0 +1,44 @@
{
lib,
buildGoModule,
fetchFromGitHub,
testers,
gomarkdoc
}:
buildGoModule rec {
pname = "gomarkdoc";
version = "1.1.0";
src = fetchFromGitHub {
owner = "princjef";
repo = "gomarkdoc";
rev = "v${version}";
hash = "sha256-eMH+F1ZXAKHqnrvOJvCETm2NiDwY03IFHrDNYr3jaW8=";
};
subPackages = [ "cmd/gomarkdoc" ];
vendorHash = "sha256-gCuYqk9agH86wfGd7k6QwLUiG3Mv6TrEd9tdyj8AYPs=";
ldflags = [
"-s"
"-w"
"-X main.version=${version}"
"-X main.commit=${src.rev}"
];
passthru.tests = {
version = testers.testVersion {
package = gomarkdoc;
};
};
meta = with lib; {
description = "Generate markdown documentation for Go (golang) code";
homepage = "https://github.com/princjef/gomarkdoc";
license = licenses.mit;
maintainers = with maintainers; [ brpaz ];
mainProgram = "gomarkdoc";
};
}

View File

@ -10,16 +10,16 @@
buildGoModule rec { buildGoModule rec {
pname = "hugo"; pname = "hugo";
version = "0.121.2"; version = "0.122.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "gohugoio"; owner = "gohugoio";
repo = "hugo"; repo = "hugo";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-YwwvxkS+oqTMZzwq6iiB/0vLHIyeReQi76B7fCgqtcY="; hash = "sha256-pnsQo+nSuIlQ6KKTP1z/BZ74zEu9HjYP66hGStPc0pc=";
}; };
vendorHash = "sha256-4j61PFULBXhtERDhbHW7gwEuP+KBUEdva2fjuaAVY0o="; vendorHash = "sha256-aYy0TOfNIqx44UBXJhewvxi+oSAWjmi/32WvI3HJ3MM=";
doCheck = false; doCheck = false;

View File

@ -1,6 +1,11 @@
{ lib { lib
, buildNpmPackage , buildNpmPackage
, fetchFromGitHub , fetchFromGitHub
# for patching bundled 7z binary from the 7zip-bin node module
# at lib/node_modules/igir/node_modules/7zip-bin/linux/x64/7za
, autoPatchelfHook
, stdenv
}: }:
buildNpmPackage rec { buildNpmPackage rec {
@ -21,6 +26,14 @@ buildNpmPackage rec {
patchShebangs scripts/update-readme-help.sh patchShebangs scripts/update-readme-help.sh
''; '';
nativeBuildInputs = [ autoPatchelfHook ];
buildInputs = [ stdenv.cc.cc.lib ];
# from lib/node_modules/igir/node_modules/@node-rs/crc32-linux-x64-musl/crc32.linux-x64-musl.node
# Irrelevant to our use
autoPatchelfIgnoreMissingDeps = [ "libc.musl-x86_64.so.1" ];
meta = with lib; { meta = with lib; {
description = "A video game ROM collection manager to help filter, sort, patch, archive, and report on collections on any OS"; description = "A video game ROM collection manager to help filter, sort, patch, archive, and report on collections on any OS";
homepage = "https://igir.io"; homepage = "https://igir.io";

View File

@ -0,0 +1,32 @@
{
stdenv,
fetchFromGitHub,
lib,
}:
stdenv.mkDerivation (finalAttrs: {
pname = "kplex";
version = "1.4";
src = fetchFromGitHub {
owner = "stripydog";
repo = "kplex";
rev = "v${finalAttrs.version}";
hash = "sha256-sps9l238hGLJ673kewFH8fOJw0HphEkZbJ+VUIzxC+o=";
};
installPhase = ''
runHook preInstall
install -D -m 0555 kplex $out/bin/kplex
runHook postInstall
'';
meta = with lib; {
description = "A multiplexer for various nmea 0183 interfaces";
homepage = "https://www.stripydog.com/kplex/";
changelog = "https://www.stripydog.com/kplex/changes.html";
license = licenses.gpl3Plus;
maintainers = with maintainers; [ mabster314 ];
mainProgram = "kplex";
};
})

View File

@ -36,5 +36,6 @@ stdenv.mkDerivation {
description = "Prusa Block & Binary G-code reader / writer / converter"; description = "Prusa Block & Binary G-code reader / writer / converter";
license = licenses.agpl3Only; license = licenses.agpl3Only;
maintainers = with maintainers; [ lach ]; maintainers = with maintainers; [ lach ];
platforms = platforms.unix;
}; };
} }

View File

@ -0,0 +1,49 @@
{ lib
, fetchFromGitHub
, rustPlatform
, pkg-config
, libX11
, libXi
, libXtst
, libevdev
}:
rustPlatform.buildRustPackage rec {
pname = "mouse-actions";
version = "0.4.4";
src = fetchFromGitHub {
owner = "jersou";
repo = "mouse-actions";
rev = "v${version}";
hash = "sha256-02E4HrKIoBV3qZPVH6Tjz9Bv/mh5C8amO1Ilmd+YO5g=";
};
cargoHash = "sha256-5SUVZlrXIPtlu9KBzucZDCp5t5t8Z4/Nfht2Pw5agVI=";
buildInputs = [
libX11
libXi
libXtst
libevdev
];
nativeBuildInputs = [
pkg-config
];
postInstall = ''
mkdir -p $out/etc/udev/rules.d/
echo 'KERNEL=="uinput", SUBSYSTEM=="misc", TAG+="uaccess", OPTIONS+="static_node=uinput"' >> $out/etc/udev/rules.d/80-mouse-actions.rules
echo 'KERNEL=="/dev/input/event*", SUBSYSTEM=="misc", TAG+="uaccess", OPTIONS+="static_node=uinput"' >> $out/etc/udev/rules.d/80-mouse-actions.rules
'';
meta = with lib; {
description = "Execute commands from mouse events such as clicks/wheel on the side/corners of the screen, or drawing shapes";
homepage = "https://github.com/jersou/mouse-actions";
license = licenses.mit;
maintainers = with maintainers; [ rgri ];
mainProgram = "mouse-actions";
platforms = platforms.linux;
};
}

View File

@ -0,0 +1,40 @@
{ lib
, stdenv
, fetchFromGitHub
, cmake
, llvmPackages
}:
stdenv.mkDerivation rec {
pname = "muparser";
version = "2.3.4";
src = fetchFromGitHub {
owner = "beltoforion";
repo = "muparser";
rev = "v${version}";
hash = "sha256-hutmmhw7BHAwbDKBiK+3Yw833GL0rPGlVjlO7XzTii0=";
};
postPatch = ''
substituteInPlace muparser.pc.in \
--replace "\''${prefix}/@CMAKE_INSTALL_LIBDIR@" "@CMAKE_INSTALL_FULL_LIBDIR@" \
--replace "\''${prefix}/@CMAKE_INSTALL_INCLUDEDIR@" "@CMAKE_INSTALL_FULL_INCLUDEDIR@"
'';
nativeBuildInputs = [
cmake
];
buildInputs = lib.optionals stdenv.cc.isClang [
llvmPackages.openmp
];
meta = {
description = "An extensible high performance math expression parser library written in C++";
homepage = "https://beltoforion.de/en/muparser/";
license = lib.licenses.mit;
maintainers = with lib.maintainers; [ wegank ];
platforms = lib.platforms.unix;
};
}

View File

@ -0,0 +1,40 @@
{ lib
, stdenv
, fetchFromGitHub
, rustPlatform
, darwin
, pkg-config
, libiconv
}:
rustPlatform.buildRustPackage rec {
pname = "nrr";
version = "0.5.0";
src = fetchFromGitHub {
owner = "ryanccn";
repo = "nrr";
rev = "v${version}";
hash = "sha256-jkI5t+1P7Ae6MkSnyy7Ur3Z0Vt8+hWTgf6dgL5tzhY8=";
};
cargoHash = "sha256-9qLeFuaKAGhtyHFHOBS6HA0wAWuk0ZJppVySpMwUGYc=";
buildInputs = lib.optionals stdenv.isDarwin [
darwin.apple_sdk.frameworks.CoreFoundation
darwin.apple_sdk.frameworks.Security
darwin.apple_sdk.frameworks.IOKit
libiconv
];
nativeBuildInputs = [
pkg-config
];
meta = with lib; {
description = "Minimal, blazing fast Node.js script runner";
maintainers = with maintainers; [ ryanccn ];
license = licenses.gpl3Only;
mainProgram = "nrr";
};
}

View File

@ -63,7 +63,7 @@ rustPlatform.buildRustPackage rec {
description = "Package management made easy"; description = "Package management made easy";
homepage = "https://pixi.sh/"; homepage = "https://pixi.sh/";
license = licenses.bsd3; license = licenses.bsd3;
maintainers = with lib.maintainers; [ aaronjheng ]; maintainers = with lib.maintainers; [ aaronjheng edmundmiller ];
mainProgram = "pixi"; mainProgram = "pixi";
}; };
} }

View File

@ -12,13 +12,13 @@
buildDotnetModule rec { buildDotnetModule rec {
pname = "pupdate"; pname = "pupdate";
version = "3.0.0"; version = "3.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "mattpannella"; owner = "mattpannella";
repo = "${pname}"; repo = "${pname}";
rev = "${version}"; rev = "${version}";
hash = "sha256-Lr3orYOSzFQCLduBhp2MtGbgiKtFB1CgP/iMMySSvEk="; hash = "sha256-wIYqEtbQZsj9gq5KaLhd+sEnrKHBHzA9jWR+9dGDQ0s=";
}; };
buildInputs = [ buildInputs = [

View File

@ -0,0 +1,51 @@
{ lib
, fetchFromSourcehut
, buildGoModule
, nix-update-script
, nixosTests
}:
buildGoModule rec {
pname = "systemd-lock-handler";
version = "2.4.2";
src = fetchFromSourcehut {
owner = "~whynothugo";
repo = "systemd-lock-handler";
rev = "v${version}";
hash = "sha256-sTVAabwWtyvHuDp/+8FKNbfej1x/egoa9z1jLIMJuBg=";
};
vendorHash = "sha256-dWzojV3tDA5lLdpAQNC9NaADGyvV7dNOS3x8mfgNNtA=";
passthru = {
updateScript = nix-update-script { };
tests = nixosTests.systemd-lock-handler;
};
# The Makefile expects to find the binary in the source root. Make
# the one built by `buildGoModule` available so that `make install`
# doesnt try to build it again.
postBuild = ''
cp -a $GOPATH/bin/* .
'';
installPhase = ''
runHook preInstall
substituteInPlace systemd-lock-handler.service \
--replace /usr/lib/ $out/lib/
make install DESTDIR= PREFIX=$out
runHook postInstall
'';
meta = with lib; {
homepage = "https://git.sr.ht/~whynothugo/systemd-lock-handler";
description = "Translates systemd-system lock/sleep signals into systemd-user target activations";
license = licenses.isc;
maintainers = with maintainers; [ liff ];
platforms = platforms.linux;
};
}

View File

@ -1,6 +1,4 @@
{ lib { lib
, stdenv
, fetchurl
, autoPatchelfHook , autoPatchelfHook
, bash , bash
, copyDesktopItems , copyDesktopItems
@ -9,6 +7,7 @@
, dosfstools , dosfstools
, e2fsprogs , e2fsprogs
, exfat , exfat
, fetchurl
, gawk , gawk
, gnugrep , gnugrep
, gnused , gnused
@ -19,6 +18,7 @@
, ntfs3g , ntfs3g
, parted , parted
, procps , procps
, stdenv
, util-linux , util-linux
, which , which
, xfsprogs , xfsprogs
@ -38,7 +38,7 @@ assert defaultGuiType == "gtk3" -> withGtk3;
assert defaultGuiType == "qt5" -> withQt5; assert defaultGuiType == "qt5" -> withQt5;
let let
inherit (lib) optional optionalString; inherit (lib) optionals optionalString;
inherit (libsForQt5) qtbase wrapQtAppsHook; inherit (libsForQt5) qtbase wrapQtAppsHook;
arch = { arch = {
x86_64-linux = "x86_64"; x86_64-linux = "x86_64";
@ -46,20 +46,16 @@ let
aarch64-linux = "aarch64"; aarch64-linux = "aarch64";
mipsel-linux = "mips64el"; mipsel-linux = "mips64el";
}.${stdenv.hostPlatform.system} }.${stdenv.hostPlatform.system}
or (throw "Unsupported platform ${stdenv.hostPlatform.system}"); or (throw "Unsupported platform: ${stdenv.hostPlatform.system}");
in in
stdenv.mkDerivation (finalAttrs: { stdenv.mkDerivation (finalAttrs: {
pname = "ventoy"; pname = "ventoy";
version = "1.0.96"; version = "1.0.97";
src = src = fetchurl {
let url = "https://github.com/ventoy/Ventoy/releases/download/v${finalAttrs.version}/ventoy-${finalAttrs.version}-linux.tar.gz";
inherit (finalAttrs) version; hash = "sha256-E2ipCCydsllY5UB+9JhDItkNO7AJBTN9S9QWeOBsEVA=";
in };
fetchurl {
url = "https://github.com/ventoy/Ventoy/releases/download/v${version}/ventoy-${version}-linux.tar.gz";
hash = "sha256-eUpxfJQ0u3bpAXTUCKlMO/ViwKcBI59YFKJ3xGzSdcg=";
};
patches = [ patches = [
./000-nixos-sanitization.patch ./000-nixos-sanitization.patch
@ -78,8 +74,8 @@ stdenv.mkDerivation (finalAttrs: {
autoPatchelfHook autoPatchelfHook
makeWrapper makeWrapper
] ]
++ optional (withQt5 || withGtk3) copyDesktopItems ++ optionals (withQt5 || withGtk3) [ copyDesktopItems ]
++ optional withQt5 wrapQtAppsHook; ++ optionals withQt5 [ wrapQtAppsHook ];
buildInputs = [ buildInputs = [
bash bash
@ -96,12 +92,14 @@ stdenv.mkDerivation (finalAttrs: {
which which
xz xz
] ]
++ optional withCryptsetup cryptsetup ++ optionals withCryptsetup [ cryptsetup ]
++ optional withExt4 e2fsprogs ++ optionals withExt4 [ e2fsprogs ]
++ optional withGtk3 gtk3 ++ optionals withGtk3 [ gtk3 ]
++ optional withNtfs ntfs3g ++ optionals withNtfs [ ntfs3g ]
++ optional withXfs xfsprogs ++ optionals withXfs [ xfsprogs ]
++ optional withQt5 qtbase; ++ optionals withQt5 [ qtbase ];
strictDeps = true;
desktopItems = [ desktopItems = [
(makeDesktopItem { (makeDesktopItem {
@ -203,6 +201,7 @@ stdenv.mkDerivation (finalAttrs: {
''; '';
changelog = "https://www.ventoy.net/doc_news.html"; changelog = "https://www.ventoy.net/doc_news.html";
license = lib.licenses.gpl3Plus; license = lib.licenses.gpl3Plus;
mainProgram = "ventoy";
maintainers = with lib.maintainers; [ AndersonTorres ]; maintainers = with lib.maintainers; [ AndersonTorres ];
platforms = [ "x86_64-linux" "i686-linux" "aarch64-linux" "mipsel-linux" ]; platforms = [ "x86_64-linux" "i686-linux" "aarch64-linux" "mipsel-linux" ];
sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ]; sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ];

View File

@ -6,11 +6,11 @@
stdenv.mkDerivation (finalAttrs: { stdenv.mkDerivation (finalAttrs: {
pname = "worker"; pname = "worker";
version = "5.0.0"; version = "5.0.1";
src = fetchurl { src = fetchurl {
url = "http://www.boomerangsworld.de/cms/worker/downloads/worker-${finalAttrs.version}.tar.gz"; url = "http://www.boomerangsworld.de/cms/worker/downloads/worker-${finalAttrs.version}.tar.gz";
hash = "sha256-iEfHl3eDBkLpvI/WKBEO21briu5Ikv9YA4NSVZXos44="; hash = "sha256-7bnJ7w7ejK5VDkna52jCtHKD8iiNOdXCpU0wx7RtkxA=";
}; };
buildInputs = [ libX11 ]; buildInputs = [ libX11 ];

View File

@ -8,13 +8,13 @@
stdenv.mkDerivation (finalAttrs: { stdenv.mkDerivation (finalAttrs: {
pname = "xsct"; pname = "xsct";
version = "2.1"; version = "2.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "faf0"; owner = "faf0";
repo = "sct"; repo = "sct";
rev = finalAttrs.version; rev = finalAttrs.version;
hash = "sha256-VT92NRz4Te5+8NmpEm1PFXfsL2CoVT+b91/KD9sCg0Q="; hash = "sha256-PDkbZTtl14wYdfALv43SIU9MKhbfiYlRqkI1mFn1qa4=";
}; };
buildInputs = [ buildInputs = [

View File

@ -2,11 +2,11 @@
stdenvNoCC.mkDerivation (finalAttrs: { stdenvNoCC.mkDerivation (finalAttrs: {
pname = "kode-mono"; pname = "kode-mono";
version = "1.202"; version = "1.204";
src = fetchzip { src = fetchzip {
url = "https://github.com/isaozler/kode-mono/releases/download/${finalAttrs.version}/kode-mono-fonts.zip"; url = "https://github.com/isaozler/kode-mono/releases/download/${finalAttrs.version}/kode-mono-fonts.zip";
hash = "sha256-wltprCA73BHAe+WrCWIsLqQ/H+vgVzclEL5voZPmbDU="; hash = "sha256-0mAE06963HaBKBKBvTnt8q7QAY1FakEGUx1wAqOZVH4=";
stripRoot = false; stripRoot = false;
}; };

View File

@ -12,13 +12,13 @@
stdenv.mkDerivation (finalAttrs: { stdenv.mkDerivation (finalAttrs: {
pname = "deviceinfo"; pname = "deviceinfo";
version = "0.2.1"; version = "0.2.2";
src = fetchFromGitLab { src = fetchFromGitLab {
owner = "ubports"; owner = "ubports";
repo = "development/core/deviceinfo"; repo = "development/core/deviceinfo";
rev = finalAttrs.version; rev = finalAttrs.version;
hash = "sha256-x0Xm4Z3hpvO5p/5JxMRloFqn58cRH2ak8rKtuxmmVVQ="; hash = "sha256-wTl+GgNiWzJxGLdU2iMH94UhQ40gjAPTVErouQIGXOA=";
}; };
outputs = [ outputs = [
@ -57,6 +57,7 @@ stdenv.mkDerivation (finalAttrs: {
meta = with lib; { meta = with lib; {
description = "Library to detect and configure devices"; description = "Library to detect and configure devices";
homepage = "https://gitlab.com/ubports/development/core/deviceinfo"; homepage = "https://gitlab.com/ubports/development/core/deviceinfo";
changelog = "https://gitlab.com/ubports/development/core/deviceinfo/-/blob/${finalAttrs.version}/ChangeLog";
license = licenses.gpl3Only; license = licenses.gpl3Only;
maintainers = teams.lomiri.members; maintainers = teams.lomiri.members;
platforms = platforms.linux; platforms = platforms.linux;

View File

@ -38,6 +38,7 @@ rustPlatform.buildRustPackage {
meta = with lib; { meta = with lib; {
homepage = "https://rust-lang.github.io/rust-clippy/"; homepage = "https://rust-lang.github.io/rust-clippy/";
description = "A bunch of lints to catch common mistakes and improve your Rust code"; description = "A bunch of lints to catch common mistakes and improve your Rust code";
mainProgram = "cargo-clippy";
maintainers = with maintainers; [ basvandijk ] ++ teams.rust.members; maintainers = with maintainers; [ basvandijk ] ++ teams.rust.members;
license = with licenses; [ mit asl20 ]; license = with licenses; [ mit asl20 ];
platforms = platforms.unix; platforms = platforms.unix;

View File

@ -1,6 +1,7 @@
{ stdenv { stdenv
, lib , lib
, fetchFromGitHub , fetchFromGitHub
, fetchpatch
, pkg-config , pkg-config
, antlr4 , antlr4
, capnproto , capnproto
@ -29,6 +30,15 @@ stdenv.mkDerivation (finalAttrs: {
fetchSubmodules = false; # we use all dependencies from nix fetchSubmodules = false; # we use all dependencies from nix
}; };
patches = [
(fetchpatch {
# Fixes https://github.com/chipsalliance/synlig/issues/2299
name = "make-compile-for-yosys-0.37.patch";
url = "https://github.com/chipsalliance/synlig/commit/3dd46d4769c20b6dd1163310f8e56560b351a211.patch";
hash = "sha256-OP/2HA/Ukt6o5aKgoBk19P6T/33btU/x6VnoIVXct1g=";
})
];
nativeBuildInputs = [ nativeBuildInputs = [
pkg-config pkg-config
]; ];

View File

@ -61,7 +61,7 @@ stdenv.mkDerivation rec {
homepage = "https://www.nextflow.io/"; homepage = "https://www.nextflow.io/";
changelog = "https://github.com/nextflow-io/nextflow/releases"; changelog = "https://github.com/nextflow-io/nextflow/releases";
license = licenses.asl20; license = licenses.asl20;
maintainers = [ maintainers.Etjean ]; maintainers = with maintainers; [ Etjean edmundmiller ];
mainProgram = "nextflow"; mainProgram = "nextflow";
platforms = platforms.unix; platforms = platforms.unix;
}; };

View File

@ -2,13 +2,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "amf-headers"; pname = "amf-headers";
version = "1.4.32"; version = "1.4.33";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "GPUOpen-LibrariesAndSDKs"; owner = "GPUOpen-LibrariesAndSDKs";
repo = "AMF"; repo = "AMF";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-3CdC/9o6ur2CeVLImz2QfaZAH2+KtDdxs5zRF7W5/oo="; sha256 = "sha256-oho1EonWxgBmsQiX3wPhs0jQjLFwLe49C7/SOEptYiw=";
}; };
installPhase = '' installPhase = ''

View File

@ -32,6 +32,22 @@ stdenv.mkDerivation rec {
url = "https://src.fedoraproject.org/rpms/dbus-c++/raw/9f515ace0594c8b2b9f0d41ffe71bc5b78d30eee/f/dbus-c++-template-operators.patch"; url = "https://src.fedoraproject.org/rpms/dbus-c++/raw/9f515ace0594c8b2b9f0d41ffe71bc5b78d30eee/f/dbus-c++-template-operators.patch";
hash = "sha256-B8S7z/YH2YEQgaRsBJBBVTx8vHQhHW7z171TZmogpL8="; hash = "sha256-B8S7z/YH2YEQgaRsBJBBVTx8vHQhHW7z171TZmogpL8=";
}) })
] ++ lib.optionals stdenv.hostPlatform.isMusl [
(fetchpatch {
name = "0001-src-eventloop.cpp-use-portable-method-for-initializi.patch";
url = "https://github.com/openembedded/meta-openembedded/raw/119e75e48dbf0539b4e440417901458ffff79b38/meta-oe/recipes-core/dbus/libdbus-c++-0.9.0/0001-src-eventloop.cpp-use-portable-method-for-initializi.patch";
hash = "sha256-GJWvp5F26c88OCGLrFcXaqUl2FMSDCluppMrRQO3rzc=";
})
(fetchpatch {
name = "0002-tools-generate_proxy.cpp-avoid-possibly-undefined-ui.patch";
url = "https://github.com/openembedded/meta-openembedded/raw/119e75e48dbf0539b4e440417901458ffff79b38/meta-oe/recipes-core/dbus/libdbus-c++-0.9.0/0002-tools-generate_proxy.cpp-avoid-possibly-undefined-ui.patch";
hash = "sha256-P9JuG/6k5L6NTiAGH9JRfNcwpNVOV29RQC6fTj0fKZE=";
})
(fetchpatch {
name = "0003-Fixed-undefined-ssize_t-for-clang-3.8.0-on-FreeBSD.patch";
url = "https://github.com/openembedded/meta-openembedded/raw/119e75e48dbf0539b4e440417901458ffff79b38/meta-oe/recipes-core/dbus/libdbus-c++-0.9.0/0003-Fixed-undefined-ssize_t-for-clang-3.8.0-on-FreeBSD.patch";
hash = "sha256-/RCpDvaLIw0kmuBvUGbfnVEvgTKjIQWcSKWheCfgSmM=";
})
]; ];
nativeBuildInputs = [ pkg-config ]; nativeBuildInputs = [ pkg-config ];
@ -45,8 +61,5 @@ stdenv.mkDerivation rec {
license = licenses.gpl2Plus; license = licenses.gpl2Plus;
platforms = platforms.linux; platforms = platforms.linux;
maintainers = [ maintainers.goibhniu ]; maintainers = [ maintainers.goibhniu ];
# Broken for Musl at 2023-12-28:
# https://github.com/NixOS/nixpkgs/issues/277198
broken = stdenv.hostPlatform.isMusl;
}; };
} }

View File

@ -16,14 +16,14 @@
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
version = "0.7.27"; version = "0.7.28";
pname = "libsolv"; pname = "libsolv";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "openSUSE"; owner = "openSUSE";
repo = "libsolv"; repo = "libsolv";
rev = version; rev = version;
sha256 = "sha256-kVExzCHfPU/o+C5TTAv1J9H7GmYwVWCsIpVkkts42js="; sha256 = "sha256-cL7SDwCzXM2qJQfiu/3nfAiFbcFNn1YXD23Sl3n9nzY=";
}; };
cmakeFlags = [ cmakeFlags = [

View File

@ -1,6 +1,6 @@
{ callPackage }: { callPackage }:
callPackage ./generic.nix { callPackage ./generic.nix {
version = "2.28.6"; version = "2.28.7";
hash = "sha256-1YyA3O0/u7Tcf8rhNmrMGF64/tnitQH65THpXa7N7P8="; hash = "sha256-JI0Frbz4HkPqrLQNrSIj1ikN8201h4kd1wTwyPotERw=";
} }

View File

@ -1,6 +1,6 @@
{ callPackage }: { callPackage }:
callPackage ./generic.nix { callPackage ./generic.nix {
version = "3.5.1"; version = "3.5.2";
hash = "sha256-HxsHcGbSExp1aG5yMR/J3kPL4zqnmNoN5T5wfV3APaw="; hash = "sha256-lVGmnSYccNmRS6vfF/fDiny5cYRPc/wJBpgciFLPUvM=";
} }

View File

@ -1,22 +0,0 @@
{lib, stdenv, fetchurl, unzip, setfile}:
stdenv.mkDerivation rec {
pname = "muparser";
version = "2.2.3";
url-version = lib.replaceStrings ["."] ["_"] version;
src = fetchurl {
url = "mirror://sourceforge/muparser/muparser_v${url-version}.zip";
sha256 = "00l92k231yb49wijzkspa2l58mapn6vh2dlxnlg0pawjjfv33s6z";
};
nativeBuildInputs = [ unzip ];
buildInputs = lib.optionals stdenv.isDarwin [setfile];
meta = {
homepage = "http://muparser.sourceforge.net";
description = "An extensible high performance math expression parser library written in C++";
license = lib.licenses.mit;
platforms = lib.platforms.linux ++ lib.platforms.darwin;
};
}

View File

@ -2,7 +2,7 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "tdlib"; pname = "tdlib";
version = "1.8.23"; version = "1.8.24";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "tdlib"; owner = "tdlib";
@ -11,8 +11,8 @@ stdenv.mkDerivation rec {
# The tdlib authors do not set tags for minor versions, but # The tdlib authors do not set tags for minor versions, but
# external programs depending on tdlib constrain the minor # external programs depending on tdlib constrain the minor
# version, hence we set a specific commit with a known version. # version, hence we set a specific commit with a known version.
rev = "27c3eaeb4964bd5f18d8488e354abde1a4383e49"; rev = "c5c55092dd61b9eb15d6bbfd0f02c04c593450e7";
hash = "sha256-TxgzZn/OF5b5FWzwnOWIozH+1d7O0RG3h+WKV10rxpE="; hash = "sha256-jqS3PGg42W15QBgpL1PNU3xJdk67g8u0THN/4hW5i88=";
}; };
buildInputs = [ gperf openssl readline zlib ]; buildInputs = [ gperf openssl readline zlib ];

View File

@ -11,14 +11,14 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "agate-sql"; pname = "agate-sql";
version = "0.7.0"; version = "0.7.2";
format = "setuptools"; format = "setuptools";
disabled = isPy27; disabled = isPy27;
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
hash = "sha256-uyHkkc3KzuYulOtod9KkHQmszVh2mrrCOLwvQt6JTMk="; hash = "sha256-mxswKEpXP9QWdZQ3Jz3MXIECK98vrLJLSqAppir9U7A=";
}; };
propagatedBuildInputs = [ agate sqlalchemy ]; propagatedBuildInputs = [ agate sqlalchemy ];

View File

@ -6,32 +6,48 @@
, pytest-asyncio , pytest-asyncio
, pytestCheckHook , pytestCheckHook
, pythonOlder , pythonOlder
, setuptools
, siosocks , siosocks
, trustme , trustme
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "aioftp"; pname = "aioftp";
version = "0.21.4"; version = "0.22.2";
format = "setuptools"; pyproject = true;
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.11";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
hash = "sha256-KLsm1GFsfDgaFUMoH5hwUbjS0dW/rwI9nn4sIQXFG7k="; hash = "sha256-YcHNpxpldxW0GZRCt9t0XcW+rgWGW43w3QFMBSQK3LA=";
}; };
postPatch = ''
substituteInPlace pyproject.toml \
--replace " --cov" ""
'';
nativeBuildInputs = [
setuptools
];
propagatedBuildInputs = [ propagatedBuildInputs = [
siosocks siosocks
]; ];
passthru.optional-dependencies = {
socks = [
siosocks
];
};
nativeCheckInputs = [ nativeCheckInputs = [
async-timeout async-timeout
pytest-asyncio pytest-asyncio
pytestCheckHook pytestCheckHook
trustme trustme
]; ] ++ lib.flatten (builtins.attrValues passthru.optional-dependencies);
disabledTests = lib.optionals stdenv.isDarwin [ disabledTests = lib.optionals stdenv.isDarwin [
# uses 127.0.0.2, which macos doesn't like # uses 127.0.0.2, which macos doesn't like
@ -44,7 +60,7 @@ buildPythonPackage rec {
meta = with lib; { meta = with lib; {
description = "Python FTP client/server for asyncio"; description = "Python FTP client/server for asyncio";
homepage = "https://github.com/aio-libs/aioftp"; homepage = "https://aioftp.readthedocs.io/";
license = licenses.asl20; license = licenses.asl20;
maintainers = with maintainers; [ ]; maintainers = with maintainers; [ ];
}; };

View File

@ -10,7 +10,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "aiovodafone"; pname = "aiovodafone";
version = "0.5.3"; version = "0.5.4";
pyproject = true; pyproject = true;
disabled = pythonOlder "3.10"; disabled = pythonOlder "3.10";
@ -19,7 +19,7 @@ buildPythonPackage rec {
owner = "chemelli74"; owner = "chemelli74";
repo = "aiovodafone"; repo = "aiovodafone";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-a9V5rocQmloNkg9IsxOAle8zmOIQ7jf1xPLjdsjntVw="; hash = "sha256-J2VdRxCzIjRUOqQW4YzOC8RRth9tibBS9YuizveqhhI=";
}; };
postPatch = '' postPatch = ''

View File

@ -10,16 +10,16 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "atom"; pname = "atom";
version = "0.10.3"; version = "0.10.4";
format = "pyproject"; pyproject = true;
disabled = pythonOlder "3.8"; disabled = pythonOlder "3.8";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "nucleic"; owner = "nucleic";
repo = pname; repo = "atom";
rev = "refs/tags/${version}"; rev = "refs/tags/${version}";
hash = "sha256-NXjvRVYcWU9p7b8y2ICOzYe6TeMh1S70Edy/JvTG7a4="; hash = "sha256-HoUKU6z+6PPBUsvI4earZG9UXN0PrugAxu/F7WUfUe8=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [
@ -45,6 +45,7 @@ buildPythonPackage rec {
meta = with lib; { meta = with lib; {
description = "Memory efficient Python objects"; description = "Memory efficient Python objects";
homepage = "https://github.com/nucleic/atom"; homepage = "https://github.com/nucleic/atom";
changelog = "https://github.com/nucleic/atom/releases/tag/${version}";
license = licenses.bsd3; license = licenses.bsd3;
maintainers = with maintainers; [ bhipple ]; maintainers = with maintainers; [ bhipple ];
}; };

View File

@ -365,14 +365,14 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "boto3-stubs"; pname = "boto3-stubs";
version = "1.34.27"; version = "1.34.29";
pyproject = true; pyproject = true;
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
hash = "sha256-/YRnjjsSNxA0EGkOaLx6YwZBE47iat7uz9Z5iUUU2Gk="; hash = "sha256-48aM0PAcF9UJCq/PHHuy17lK7k46nNRa+L+d2ILvZEw=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -9,7 +9,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "botocore-stubs"; pname = "botocore-stubs";
version = "1.34.27"; version = "1.34.29";
format = "pyproject"; format = "pyproject";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -17,7 +17,7 @@ buildPythonPackage rec {
src = fetchPypi { src = fetchPypi {
pname = "botocore_stubs"; pname = "botocore_stubs";
inherit version; inherit version;
hash = "sha256-6r4CRGoS6r0dCY4WN0MnW2HCxurrvtmb5bVNt+9sc2c="; hash = "sha256-PMjbcbfYrsjG0TvITOzsGNZMsUIxHhvQYNZzy1VtkTs=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -7,15 +7,20 @@
, nbconvert , nbconvert
, nbformat , nbformat
, pytestCheckHook , pytestCheckHook
, setuptools
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "cirq-ft"; pname = "cirq-ft";
format = "setuptools"; pyproject = true;
inherit (cirq-core) version src meta; inherit (cirq-core) version src meta;
sourceRoot = "${src.name}/${pname}"; sourceRoot = "${src.name}/${pname}";
nativeBuildInputs = [
setuptools
];
propagatedBuildInputs = [ propagatedBuildInputs = [
attrs attrs
cachetools cachetools
@ -31,6 +36,11 @@ buildPythonPackage rec {
pytestCheckHook pytestCheckHook
]; ];
disabledTests = [
# Upstream doesn't always adjust the version
"test_version"
];
# cirq's importlib hook doesn't work here # cirq's importlib hook doesn't work here
#pythonImportsCheck = [ "cirq_ft" ]; #pythonImportsCheck = [ "cirq_ft" ];

View File

@ -1,27 +1,23 @@
{ buildPythonPackage { buildPythonPackage
, cirq-core , cirq-core
, freezegun
, google-api-core , google-api-core
, protobuf , protobuf
, pytestCheckHook , pytestCheckHook
, freezegun
, pythonRelaxDepsHook , pythonRelaxDepsHook
, setuptools
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "cirq-google"; pname = "cirq-google";
format = "setuptools"; pyproject = true;
inherit (cirq-core) version src meta; inherit (cirq-core) version src meta;
sourceRoot = "${src.name}/${pname}"; sourceRoot = "${src.name}/${pname}";
postPatch = ''
substituteInPlace requirements.txt \
--replace "google-api-core[grpc] >= 1.14.0, < 2.0.0dev" "google-api-core[grpc] >= 1.14.0, < 3.0.0dev" \
--replace "protobuf >= 3.15.0, < 4" "protobuf >= 3.15.0"
'';
nativeBuildInputs = [ nativeBuildInputs = [
pythonRelaxDepsHook pythonRelaxDepsHook
setuptools
]; ];
propagatedBuildInputs = [ propagatedBuildInputs = [
@ -40,6 +36,8 @@ buildPythonPackage rec {
"cirq_google/_version_test.py" "cirq_google/_version_test.py"
# Trace/BPT trap: 5 # Trace/BPT trap: 5
"cirq_google/engine/calibration_test.py" "cirq_google/engine/calibration_test.py"
# Very time-consuming
"cirq_google/engine/*_test.py"
]; ];
disabledTests = [ disabledTests = [

View File

@ -12,7 +12,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "cvelib"; pname = "cvelib";
version = "1.2.1"; version = "1.3.0";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -21,7 +21,7 @@ buildPythonPackage rec {
owner = "RedHatProductSecurity"; owner = "RedHatProductSecurity";
repo = "cvelib"; repo = "cvelib";
rev = "tags/${version}"; rev = "tags/${version}";
hash = "sha256-hJPcxnc4iQzsYNNVJ9fw6yQl+5K7pdtjHT6oMmBx/Zs="; hash = "sha256-PCZUAKgE80PD//4qK8ap55IN9vtx9WdpRZUAC3UdaWM=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View File

@ -11,7 +11,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "cx-freeze"; pname = "cx-freeze";
version = "6.15.12"; version = "6.15.13";
pyproject = true; pyproject = true;
disabled = pythonOlder "3.8"; disabled = pythonOlder "3.8";
@ -19,7 +19,7 @@ buildPythonPackage rec {
src = fetchPypi { src = fetchPypi {
pname = "cx_Freeze"; pname = "cx_Freeze";
inherit version; inherit version;
hash = "sha256-Ak4OC94xD21daVdsbYSvFxO1YKJcccJ8xoCBk50cWww="; hash = "sha256-VeOgoVrga9dPJ0W9S3Ye/9Ff5yEOlP2DlDf0sDUh1yo=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -1,33 +1,29 @@
{ lib { lib
, fetchFromGitHub
, fetchpatch
, buildPythonPackage , buildPythonPackage
, django , django
, python-fsutil , fetchFromGitHub
, python , python
, python-fsutil
, pythonOlder , pythonOlder
, setuptools
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "django-maintenance-mode"; pname = "django-maintenance-mode";
version = "0.19.0"; version = "0.19.0";
format = "setuptools"; pyproject = true;
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "fabiocaccamo"; owner = "fabiocaccamo";
repo = pname; repo = "django-maintenance-mode";
rev = "refs/tags/${version}"; rev = "refs/tags/${version}";
hash = "sha256-NAm3xMcHePTYxysihYj48bk7r9ykEtPcxPjSEju/zMM="; hash = "sha256-NAm3xMcHePTYxysihYj48bk7r9ykEtPcxPjSEju/zMM=";
}; };
patches = [ nativeBuildInputs = [
(fetchpatch { setuptools
name = "fix-broken-test.patch";
url = "https://github.com/fabiocaccamo/django-maintenance-mode/commit/68cde8d9ceef00eeaa2068f420698c1c562fa9fc.patch";
hash = "sha256-K/zYYkcnmWGc7Knz4l9PgvUtT0IccPRXc3UFriC1ldc=";
})
]; ];
propagatedBuildInputs = [ propagatedBuildInputs = [
@ -43,11 +39,15 @@ buildPythonPackage rec {
runHook postCheck runHook postCheck
''; '';
pythonImportsCheck = [
"maintenance_mode"
];
meta = with lib; { meta = with lib; {
description = "Shows a 503 error page when maintenance-mode is on"; description = "Shows a 503 error page when maintenance-mode is on";
homepage = "https://github.com/fabiocaccamo/django-maintenance-mode"; homepage = "https://github.com/fabiocaccamo/django-maintenance-mode";
changelog = "https://github.com/fabiocaccamo/django-maintenance-mode/releases/tag/${version}"; changelog = "https://github.com/fabiocaccamo/django-maintenance-mode/releases/tag/${version}";
maintainers = with maintainers; [ mrmebelman ];
license = licenses.bsd3; license = licenses.bsd3;
maintainers = with maintainers; [ mrmebelman ];
}; };
} }

View File

@ -25,7 +25,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "django-silk"; pname = "django-silk";
version = "5.0.3"; version = "5.1.0";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -34,7 +34,7 @@ buildPythonPackage rec {
owner = "jazzband"; owner = "jazzband";
repo = "django-silk"; repo = "django-silk";
rev = "refs/tags/${version}"; rev = "refs/tags/${version}";
hash = "sha256-91FcOqAYZK7/RCKgXjbQEPUQ2cZRFi7NzVLQF+MMDRI="; hash = "sha256-QqY1bRa0v4DZ2/gDbssyhJA9Kb+5jig4hZEBVKZiowY=";
}; };
# "test_time_taken" tests aren't suitable for reproducible execution, but Django's # "test_time_taken" tests aren't suitable for reproducible execution, but Django's

View File

@ -7,7 +7,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "django-vite"; pname = "django-vite";
version = "3.0.2"; version = "3.0.3";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -16,7 +16,7 @@ buildPythonPackage rec {
owner = "MrBin99"; owner = "MrBin99";
repo = pname; repo = pname;
rev = "refs/tags/${version}"; rev = "refs/tags/${version}";
hash = "sha256-Lnecxkn+E1Bce/EhP1AHH9/VrdzBiMGLv+eYld5+QKM="; hash = "sha256-FH42auBm/YRfGgjL9TGQLed/p0P8POb7DOLmpUK1d9c=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

Some files were not shown because too many files have changed in this diff Show More