diff --git a/nixos/doc/manual/from_md/release-notes/rl-2205.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
index 6f06838833eb..97e993e83ff0 100644
--- a/nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
+++ b/nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
@@ -2526,10 +2526,9 @@ sudo cp /var/lib/redis/dump.rdb /var/lib/redis-peertube/dump.rdb
The logrotate module also has been updated to freeform syntax:
- services.logrotate.paths
- and
- services.logrotate.extraConfig
- will work, but issue deprecation warnings and
+ services.logrotate.paths and
+ services.logrotate.extraConfig will work,
+ but issue deprecation warnings and
services.logrotate.settings
should now be used instead.
diff --git a/nixos/doc/manual/from_md/release-notes/rl-2211.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2211.section.xml
index 9e8cee9c5d70..f9478fbf83d0 100644
--- a/nixos/doc/manual/from_md/release-notes/rl-2211.section.xml
+++ b/nixos/doc/manual/from_md/release-notes/rl-2211.section.xml
@@ -507,6 +507,15 @@
[ "all" ].
+
+
+ Deprecated settings logrotate.paths and
+ logrotate.extraConfig have been removed.
+ Please convert any uses to
+ services.logrotate.settings
+ instead.
+
+
The isPowerPC predicate, found on
diff --git a/nixos/doc/manual/release-notes/rl-2205.section.md b/nixos/doc/manual/release-notes/rl-2205.section.md
index 6fe5eba212f3..217aa6056cad 100644
--- a/nixos/doc/manual/release-notes/rl-2205.section.md
+++ b/nixos/doc/manual/release-notes/rl-2205.section.md
@@ -906,8 +906,8 @@ In addition to numerous new and upgraded packages, this release has the followin
- [services.logrotate.enable](#opt-services.logrotate.enable) now defaults to true if any rotate path has
been defined, and some paths have been added by default.
-- The logrotate module also has been updated to freeform syntax: [services.logrotate.paths](#opt-services.logrotate.paths)
- and [services.logrotate.extraConfig](#opt-services.logrotate.extraConfig) will work, but issue deprecation
+- The logrotate module also has been updated to freeform syntax: `services.logrotate.paths`
+ and `services.logrotate.extraConfig` will work, but issue deprecation
warnings and [services.logrotate.settings](#opt-services.logrotate.settings) should now be used instead.
- `security.pam.ussh` has been added, which allows authorizing PAM sessions based on SSH _certificates_ held within an SSH agent, using [pam-ussh](https://github.com/uber/pam-ussh).
diff --git a/nixos/doc/manual/release-notes/rl-2211.section.md b/nixos/doc/manual/release-notes/rl-2211.section.md
index c73c13e1d34a..298eaabc10d0 100644
--- a/nixos/doc/manual/release-notes/rl-2211.section.md
+++ b/nixos/doc/manual/release-notes/rl-2211.section.md
@@ -171,6 +171,10 @@ Available as [services.patroni](options.html#opt-services.patroni.enable).
This got partially copied over from the minimal profile and reduces the final system size by up to 200MB.
If you require all locales installed set the option to ``[ "all" ]``.
+- Deprecated settings `logrotate.paths` and `logrotate.extraConfig` have
+ been removed. Please convert any uses to
+ [services.logrotate.settings](#opt-services.logrotate.settings) instead.
+
- The `isPowerPC` predicate, found on `platform` attrsets (`hostPlatform`, `buildPlatform`, `targetPlatform`, etc) has been removed in order to reduce confusion. The predicate was was defined such that it matches only the 32-bit big-endian members of the POWER/PowerPC family, despite having a name which would imply a broader set of systems. If you were using this predicate, you can replace `foo.isPowerPC` with `(with foo; isPower && is32bit && isBigEndian)`.
- The `fetchgit` fetcher now uses [cone mode](https://www.git-scm.com/docs/git-sparse-checkout/2.37.0#_internalscone_mode_handling) by default for sparse checkouts. [Non-cone mode](https://www.git-scm.com/docs/git-sparse-checkout/2.37.0#_internalsnon_cone_problems) can be enabled by passing `nonConeMode = true`, but note that non-cone mode is deprecated and this option may be removed alongside a future Git update without notice.
diff --git a/nixos/modules/programs/fish.nix b/nixos/modules/programs/fish.nix
index 357105c3e79b..160adc0cad6d 100644
--- a/nixos/modules/programs/fish.nix
+++ b/nixos/modules/programs/fish.nix
@@ -35,7 +35,7 @@ let
'';
babelfishTranslate = path: name:
- pkgs.runCommand "${name}.fish" {
+ pkgs.runCommandLocal "${name}.fish" {
nativeBuildInputs = [ pkgs.babelfish ];
} "${pkgs.babelfish}/bin/babelfish < ${path} > $out;";
diff --git a/nixos/modules/services/logging/logrotate.nix b/nixos/modules/services/logging/logrotate.nix
index 5ea54a4cf921..fd41b982678f 100644
--- a/nixos/modules/services/logging/logrotate.nix
+++ b/nixos/modules/services/logging/logrotate.nix
@@ -5,93 +5,9 @@ with lib;
let
cfg = config.services.logrotate;
- # deprecated legacy compat settings
- # these options will be removed before 22.11 in the following PR:
- # https://github.com/NixOS/nixpkgs/pull/164169
- pathOpts = { name, ... }: {
- options = {
- enable = mkOption {
- type = types.bool;
- default = true;
- description = lib.mdDoc ''
- Whether to enable log rotation for this path. This can be used to explicitly disable
- logging that has been configured by NixOS.
- '';
- };
-
- name = mkOption {
- type = types.str;
- internal = true;
- };
-
- path = mkOption {
- type = with types; either str (listOf str);
- default = name;
- defaultText = "attribute name";
- description = lib.mdDoc ''
- The path to log files to be rotated.
- Spaces are allowed and normal shell quoting rules apply,
- with ', ", and \ characters supported.
- '';
- };
-
- user = mkOption {
- type = with types; nullOr str;
- default = null;
- description = lib.mdDoc ''
- The user account to use for rotation.
- '';
- };
-
- group = mkOption {
- type = with types; nullOr str;
- default = null;
- description = lib.mdDoc ''
- The group to use for rotation.
- '';
- };
-
- frequency = mkOption {
- type = types.enum [ "hourly" "daily" "weekly" "monthly" "yearly" ];
- default = "daily";
- description = lib.mdDoc ''
- How often to rotate the logs.
- '';
- };
-
- keep = mkOption {
- type = types.int;
- default = 20;
- description = lib.mdDoc ''
- How many rotations to keep.
- '';
- };
-
- extraConfig = mkOption {
- type = types.lines;
- default = "";
- description = lib.mdDoc ''
- Extra logrotate config options for this path. Refer to
- for details.
- '';
- };
-
- priority = mkOption {
- type = types.int;
- default = 1000;
- description = lib.mdDoc ''
- Order of this logrotate block in relation to the others. The semantics are
- the same as with `lib.mkOrder`. Smaller values have a greater priority.
- '';
- };
- };
-
- config.name = name;
- };
-
generateLine = n: v:
if builtins.elem n [ "files" "priority" "enable" "global" ] || v == null then null
- else if builtins.elem n [ "extraConfig" "frequency" ] then "${v}\n"
+ else if builtins.elem n [ "frequency" ] then "${v}\n"
else if builtins.elem n [ "firstaction" "lastaction" "prerotate" "postrotate" "preremove" ]
then "${n}\n ${v}\n endscript\n"
else if isInt v then "${n} ${toString v}\n"
@@ -110,25 +26,6 @@ let
${generateSection 2 settings}}
'';
- # below two mapPaths are compat functions
- mapPathOptToSetting = n: v:
- if n == "keep" then nameValuePair "rotate" v
- else if n == "path" then nameValuePair "files" v
- else nameValuePair n v;
-
- mapPathsToSettings = path: pathOpts:
- nameValuePair path (
- filterAttrs (n: v: ! builtins.elem n [ "user" "group" "name" ] && v != "") (
- (mapAttrs' mapPathOptToSetting pathOpts) //
- {
- su =
- if pathOpts.user != null
- then "${pathOpts.user} ${pathOpts.group}"
- else null;
- }
- )
- );
-
settings = sortProperties (attrValues (filterAttrs (_: settings: settings.enable) (
foldAttrs recursiveUpdate { } [
{
@@ -139,15 +36,7 @@ let
frequency = "weekly";
rotate = 4;
};
- # compat section
- extraConfig = {
- enable = (cfg.extraConfig != "");
- global = true;
- extraConfig = cfg.extraConfig;
- priority = 101;
- };
}
- (mapAttrs' mapPathsToSettings cfg.paths)
cfg.settings
{ header = { global = true; priority = 100; }; }
]
@@ -200,7 +89,9 @@ let
in
{
imports = [
- (mkRenamedOptionModule [ "services" "logrotate" "config" ] [ "services" "logrotate" "extraConfig" ])
+ (mkRemovedOptionModule [ "services" "logrotate" "config" ] "Modify services.logrotate.settings.header instead")
+ (mkRemovedOptionModule [ "services" "logrotate" "extraConfig" ] "Modify services.logrotate.settings.header instead")
+ (mkRemovedOptionModule [ "services" "logrotate" "paths" ] "Add attributes to services.logrotate.settings instead")
];
options = {
@@ -218,6 +109,25 @@ in
or settings common to all further files settings.
Refer to for details.
'';
+ example = literalExpression ''
+ {
+ # global options
+ header = {
+ dateext = true;
+ };
+ # example custom files
+ "/var/log/mylog.log" = {
+ frequency = "daily";
+ rotate = 3;
+ };
+ "multiple paths" = {
+ files = [
+ "/var/log/first*.log"
+ "/var/log/second.log"
+ ];
+ };
+ };
+ '';
type = types.attrsOf (types.submodule ({ name, ... }: {
freeformType = with types; attrsOf (nullOr (oneOf [ int bool str ]));
@@ -311,76 +221,10 @@ in
in this case you can disable the failing check with this option.
'';
};
-
- # deprecated legacy compat settings
- paths = mkOption {
- type = with types; attrsOf (submodule pathOpts);
- default = { };
- description = lib.mdDoc ''
- Attribute set of paths to rotate. The order each block appears in the generated configuration file
- can be controlled by the [priority](#opt-services.logrotate.paths._name_.priority) option
- using the same semantics as `lib.mkOrder`. Smaller values have a greater priority.
- This setting has been deprecated in favor of [logrotate settings](#opt-services.logrotate.settings).
- '';
- example = literalExpression ''
- {
- httpd = {
- path = "/var/log/httpd/*.log";
- user = config.services.httpd.user;
- group = config.services.httpd.group;
- keep = 7;
- };
-
- myapp = {
- path = "/var/log/myapp/*.log";
- user = "myuser";
- group = "mygroup";
- frequency = "weekly";
- keep = 5;
- priority = 1;
- };
- }
- '';
- };
-
- extraConfig = mkOption {
- default = "";
- type = types.lines;
- description = lib.mdDoc ''
- Extra contents to append to the logrotate configuration file. Refer to
- for details.
- This setting has been deprecated in favor of
- [logrotate settings](#opt-services.logrotate.settings).
- '';
- };
};
};
config = mkIf cfg.enable {
- assertions =
- mapAttrsToList
- (name: pathOpts:
- {
- assertion = (pathOpts.user != null) == (pathOpts.group != null);
- message = ''
- If either of `services.logrotate.paths.${name}.user` or `services.logrotate.paths.${name}.group` are specified then *both* must be specified.
- '';
- })
- cfg.paths;
-
- warnings =
- (mapAttrsToList
- (name: pathOpts: ''
- Using config.services.logrotate.paths.${name} is deprecated and will become unsupported in a future release.
- Please use services.logrotate.settings instead.
- '')
- cfg.paths
- ) ++
- (optional (cfg.extraConfig != "") ''
- Using config.services.logrotate.extraConfig is deprecated and will become unsupported in a future release.
- Please use services.logrotate.settings with globals=true instead.
- '');
-
systemd.services.logrotate = {
description = "Logrotate Service";
startAt = "hourly";
diff --git a/nixos/modules/services/misc/gitlab.nix b/nixos/modules/services/misc/gitlab.nix
index 4988517a9b66..13453d9cc785 100644
--- a/nixos/modules/services/misc/gitlab.nix
+++ b/nixos/modules/services/misc/gitlab.nix
@@ -260,6 +260,7 @@ in {
(mkRenamedOptionModule [ "services" "gitlab" "stateDir" ] [ "services" "gitlab" "statePath" ])
(mkRenamedOptionModule [ "services" "gitlab" "backupPath" ] [ "services" "gitlab" "backup" "path" ])
(mkRemovedOptionModule [ "services" "gitlab" "satelliteDir" ] "")
+ (mkRemovedOptionModule [ "services" "gitlab" "logrotate" "extraConfig" ] "Modify services.logrotate.settings.gitlab directly instead")
];
options = {
@@ -871,15 +872,6 @@ in {
default = 30;
description = lib.mdDoc "How many rotations to keep.";
};
-
- extraConfig = mkOption {
- type = types.lines;
- default = "";
- description = lib.mdDoc ''
- Extra logrotate config options for this path. Refer to
- for details.
- '';
- };
};
workhorse.config = mkOption {
@@ -1042,7 +1034,6 @@ in {
rotate = cfg.logrotate.keep;
copytruncate = true;
compress = true;
- extraConfig = cfg.logrotate.extraConfig;
};
};
};
diff --git a/nixos/tests/logrotate.nix b/nixos/tests/logrotate.nix
index b0685f3af9ff..94f6ad5103fb 100644
--- a/nixos/tests/logrotate.nix
+++ b/nixos/tests/logrotate.nix
@@ -64,29 +64,6 @@ import ./make-test-python.nix ({ pkgs, ... }: rec {
notifempty = true;
};
};
- # extraConfig compatibility - should be added to top level, early.
- services.logrotate.extraConfig = ''
- nomail
- '';
- # paths compatibility
- services.logrotate.paths = {
- compat_path = {
- path = "compat_test_path";
- };
- # user/group should be grouped as 'su user group'
- compat_user = {
- user = config.users.users.root.name;
- group = "root";
- };
- # extraConfig in path should be added to block
- compat_extraConfig = {
- extraConfig = "dateext";
- };
- # keep -> rotate
- compat_keep = {
- keep = 1;
- };
- };
};
};
@@ -127,12 +104,6 @@ import ./make-test-python.nix ({ pkgs, ... }: rec {
"sed -ne '/\"postrotate\" {/,/}/p' /tmp/logrotate.conf | grep endscript",
"grep '\"file1\"\n\"file2\" {' /tmp/logrotate.conf",
"sed -ne '/\"import\" {/,/}/p' /tmp/logrotate.conf | grep noolddir",
- "sed -ne '1,/^\"/p' /tmp/logrotate.conf | grep nomail",
- "grep '\"compat_test_path\" {' /tmp/logrotate.conf",
- "sed -ne '/\"compat_user\" {/,/}/p' /tmp/logrotate.conf | grep 'su root root'",
- "sed -ne '/\"compat_extraConfig\" {/,/}/p' /tmp/logrotate.conf | grep dateext",
- "[[ $(sed -ne '/\"compat_keep\" {/,/}/p' /tmp/logrotate.conf | grep -w rotate) = \" rotate 1\" ]]",
- "! sed -ne '/\"compat_keep\" {/,/}/p' /tmp/logrotate.conf | grep -w keep",
)
# also check configFile option
failingMachine.succeed(
diff --git a/pkgs/applications/misc/calibre/default.nix b/pkgs/applications/misc/calibre/default.nix
index 049bada253c1..accfcfa2c237 100644
--- a/pkgs/applications/misc/calibre/default.nix
+++ b/pkgs/applications/misc/calibre/default.nix
@@ -30,11 +30,11 @@
stdenv.mkDerivation rec {
pname = "calibre";
- version = "6.7.1";
+ version = "6.8.0";
src = fetchurl {
url = "https://download.calibre-ebook.com/${version}/${pname}-${version}.tar.xz";
- hash = "sha256-B//rBsvOXA5UqGjd2MLcAhDFCvreI7UmtfEpuxaIsa0=";
+ hash = "sha256-d9JaWjAjJzKldjyrdrl6OyX1JSatp9U8agRog7K5n2s=";
};
# https://sources.debian.org/patches/calibre/${version}+dfsg-1
diff --git a/pkgs/applications/networking/cluster/terragrunt/default.nix b/pkgs/applications/networking/cluster/terragrunt/default.nix
index 10649ffb9ffd..f2cafe7f1d9a 100644
--- a/pkgs/applications/networking/cluster/terragrunt/default.nix
+++ b/pkgs/applications/networking/cluster/terragrunt/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "terragrunt";
- version = "0.39.2";
+ version = "0.40.0";
src = fetchFromGitHub {
owner = "gruntwork-io";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-YHPtOcWhUDcCqtAmxy/veBgpYY+UmnmK2IwplI5uRh0=";
+ sha256 = "sha256-ZDoGlm/H2xh9+azb7N1EWUXwfF919K9B4PmQZol4RV8=";
};
vendorSha256 = "sha256-CqImT90jFFLi6XR7jfzFKwhnCHK6B+aM+Ba/L+G3bEg=";
diff --git a/pkgs/applications/version-management/got/default.nix b/pkgs/applications/version-management/got/default.nix
index b70fe634cb1e..3676de308e5b 100644
--- a/pkgs/applications/version-management/got/default.nix
+++ b/pkgs/applications/version-management/got/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "got";
- version = "0.77";
+ version = "0.78";
src = fetchurl {
url = "https://gameoftrees.org/releases/portable/got-portable-${version}.tar.gz";
- sha256 = "sha256-/O9u7Ei6f0rGr7LRWcG9FUQd7Z+qpq2/6H01jNR1C7o=";
+ sha256 = "sha256-fi0YF0YCOtzA02Ix42BU6fi1UKgF/X6mG3S0fP/ZwxE=";
};
nativeBuildInputs = [ pkg-config bison ];
diff --git a/pkgs/data/misc/v2ray-geoip/default.nix b/pkgs/data/misc/v2ray-geoip/default.nix
index 0d2c4588ede9..b6b4af002d5c 100644
--- a/pkgs/data/misc/v2ray-geoip/default.nix
+++ b/pkgs/data/misc/v2ray-geoip/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "v2ray-geoip";
- version = "202210270100";
+ version = "202211030059";
src = fetchFromGitHub {
owner = "v2fly";
repo = "geoip";
- rev = "7558586fefca29c5d1705777187677fd8a4c4e6f";
- sha256 = "sha256-8UKcmkaRe51X4JgQ5pqPE46BnVF0AlXETD/Pliwx9xk=";
+ rev = "b7d16c8aea9bbe2555fe4aabddd1fb86f9785229";
+ sha256 = "sha256-1WxqD9a0uJY+/DiFwESkEceN2EJvDl5qhLg4oEs5uSA=";
};
installPhase = ''
diff --git a/pkgs/development/libraries/aws-c-sdkutils/default.nix b/pkgs/development/libraries/aws-c-sdkutils/default.nix
index 52a00229e979..22914b107b54 100644
--- a/pkgs/development/libraries/aws-c-sdkutils/default.nix
+++ b/pkgs/development/libraries/aws-c-sdkutils/default.nix
@@ -6,13 +6,13 @@
stdenv.mkDerivation rec {
pname = "aws-c-sdkutils";
- version = "0.1.3";
+ version = "0.1.4";
src = fetchFromGitHub {
owner = "awslabs";
repo = "aws-c-sdkutils";
rev = "v${version}";
- sha256 = "sha256-mbleTBNZegfYeaRgEup36+mAwYs/2FReA3gW2tp4ctk=";
+ sha256 = "sha256-B7BTafeN60csYhhscuHsynI183AvCqLljQgm8NgE6xo=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/libraries/jellyfin-ffmpeg/default.nix b/pkgs/development/libraries/jellyfin-ffmpeg/default.nix
index 6beceec390a8..ccff068e1da2 100644
--- a/pkgs/development/libraries/jellyfin-ffmpeg/default.nix
+++ b/pkgs/development/libraries/jellyfin-ffmpeg/default.nix
@@ -8,13 +8,13 @@
nv-codec-headers = nv-codec-headers-11;
}).overrideAttrs (old: rec {
pname = "jellyfin-ffmpeg";
- version = "5.1.2-2";
+ version = "5.1.2-4";
src = fetchFromGitHub {
owner = "jellyfin";
repo = "jellyfin-ffmpeg";
rev = "v${version}";
- sha256 = "sha256-7Icp1vFnvhuohipGK7BqnxhhtX0iB02v5TXvh5sss3c=";
+ sha256 = "sha256-yzaS50sPgyRRLnvzaOiKOEaHKL3Yuf89KsHyPebjoL8=";
};
configureFlags = old.configureFlags ++ [
diff --git a/pkgs/development/python-modules/aiomysensors/default.nix b/pkgs/development/python-modules/aiomysensors/default.nix
index b2888a92d256..bbbaa7361c69 100644
--- a/pkgs/development/python-modules/aiomysensors/default.nix
+++ b/pkgs/development/python-modules/aiomysensors/default.nix
@@ -15,7 +15,7 @@
buildPythonPackage rec {
pname = "aiomysensors";
- version = "0.3.1";
+ version = "0.3.2";
format = "pyproject";
disabled = pythonOlder "3.9";
@@ -24,7 +24,7 @@ buildPythonPackage rec {
owner = "MartinHjelmare";
repo = pname;
rev = "v${version}";
- hash = "sha256-uzVtgJ4R2MK6lqruvmoqgkzVCLhjyaEV92X6U6+lwG4=";
+ hash = "sha256-XPvnZOshA+PdFOzOlJXMfRTRYSue0uHsNwQsCwv3WOU=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/asyncio_mqtt/default.nix b/pkgs/development/python-modules/asyncio_mqtt/default.nix
index a87bca439643..6a52ff4fd2d1 100644
--- a/pkgs/development/python-modules/asyncio_mqtt/default.nix
+++ b/pkgs/development/python-modules/asyncio_mqtt/default.nix
@@ -1,31 +1,37 @@
{ lib
, buildPythonPackage
-, pythonOlder
-, fetchPypi
-, async_generator
+, fetchFromGitHub
, paho-mqtt
+, pythonOlder
+, typing-extensions
}:
buildPythonPackage rec {
pname = "asyncio-mqtt";
- version = "0.12.1";
+ version = "0.13.0";
format = "setuptools";
- src = fetchPypi {
- pname = "asyncio_mqtt";
- inherit version;
- sha256 = "sha256-bb+FpF+U0m50ZUEWgK2jlHtQVG6YII1dUuegp+16fDg=";
+ disabled = pythonOlder "3.7";
+
+ src = fetchFromGitHub {
+ owner = "sbtinstruments";
+ repo = pname;
+ rev = "refs/tags/v${version}";
+ hash = "sha256-On4N5KPnbwYrJguWwBdrnaNq58ZeGIPYSFzIRBfojpQ=";
};
propagatedBuildInputs = [
paho-mqtt
- ] ++ lib.optionals (pythonOlder "3.7") [
- async_generator
+ ] ++ lib.optionals (pythonOlder "3.10") [
+ typing-extensions
];
- doCheck = false; # no tests
+ # Module will have tests starting with > 0.13.0
+ doCheck = false;
- pythonImportsCheck = [ "asyncio_mqtt" ];
+ pythonImportsCheck = [
+ "asyncio_mqtt"
+ ];
meta = with lib; {
description = "Idomatic asyncio wrapper around paho-mqtt";
diff --git a/pkgs/development/python-modules/canonicaljson/default.nix b/pkgs/development/python-modules/canonicaljson/default.nix
index 4600e0c1e6b6..3e88db6c915b 100644
--- a/pkgs/development/python-modules/canonicaljson/default.nix
+++ b/pkgs/development/python-modules/canonicaljson/default.nix
@@ -10,14 +10,14 @@
buildPythonPackage rec {
pname = "canonicaljson";
- version = "1.6.3";
+ version = "1.6.4";
format = "pyproject";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
- hash = "sha256-yll2C8J0qJmg2nWAnWkJrkPlEjOB/W7wQKRNGVLAtEg=";
+ hash = "sha256-bAmyEZUR8w6xEmz82XOhCCTiDxz9JQOc3j0SGN2cjY8=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/jsonmerge/default.nix b/pkgs/development/python-modules/jsonmerge/default.nix
index 3cea64594200..de9656d01ccd 100644
--- a/pkgs/development/python-modules/jsonmerge/default.nix
+++ b/pkgs/development/python-modules/jsonmerge/default.nix
@@ -7,11 +7,11 @@
buildPythonPackage rec {
pname = "jsonmerge";
- version = "1.8.0";
+ version = "1.9.0";
src = fetchPypi {
inherit pname version;
- sha256 = "a86bfc44f32f6a28b749743df8960a4ce1930666b3b73882513825f845cb9558";
+ sha256 = "sha256-otH4ACHFwdcKSeMfhitfBo+dsGYIDYVh6AZU3nSjWE0=";
};
propagatedBuildInputs = [ jsonschema ];
diff --git a/pkgs/development/python-modules/mockupdb/default.nix b/pkgs/development/python-modules/mockupdb/default.nix
index 47107f0617be..ddd72e7e7c1a 100644
--- a/pkgs/development/python-modules/mockupdb/default.nix
+++ b/pkgs/development/python-modules/mockupdb/default.nix
@@ -1,19 +1,43 @@
-{ lib, buildPythonPackage, fetchPypi
+{ lib
+, buildPythonPackage
+, fetchPypi
, pymongo
+, pythonOlder
+, pytestCheckHook
}:
buildPythonPackage rec {
pname = "mockupdb";
version = "1.8.1";
+ format = "setuptools";
+
+ disabled = pythonOlder "3.9";
src = fetchPypi {
inherit pname version;
- sha256 = "d36d0e5b6445ff9141e34d012fa2b5dfe589847aa1e3ecb8d774074962af944e";
+ hash = "sha256-020OW2RF/5FB400BL6K13+WJhHqh4+y413QHSWKvlE4=";
};
- propagatedBuildInputs = [ pymongo ];
+ propagatedBuildInputs = [
+ pymongo
+ ];
- pythonImportsCheck = [ "mockupdb" ];
+ checkInputs = [
+ pytestCheckHook
+ ];
+
+ pythonImportsCheck = [
+ "mockupdb"
+ ];
+
+ disabledTests = [
+ # AssertionError: expected to receive Request(), got nothing
+ "test_flags"
+ "test_iteration"
+ "test_ok"
+ "test_ssl_basic"
+ "test_unix_domain_socket"
+ ];
meta = with lib; {
description = "Simulate a MongoDB server";
diff --git a/pkgs/development/python-modules/shtab/default.nix b/pkgs/development/python-modules/shtab/default.nix
index 4e8ba675b9c1..24a29318170f 100644
--- a/pkgs/development/python-modules/shtab/default.nix
+++ b/pkgs/development/python-modules/shtab/default.nix
@@ -10,7 +10,7 @@
buildPythonPackage rec {
pname = "shtab";
- version = "1.5.6";
+ version = "1.5.7";
format = "setuptools";
disabled = pythonOlder "3.7";
@@ -19,7 +19,7 @@ buildPythonPackage rec {
owner = "iterative";
repo = pname;
rev = "refs/tags/v${version}";
- hash = "sha256-w04wvmzWcp92slPIc2f1En+52J9Z/XvjGHHntCeuTd0=";
+ hash = "sha256-BIUUg+Y6bbgjnIWPU/bZO2axSLSzIsRJwyu7lBVQz/Q=";
};
SETUPTOOLS_SCM_PRETEND_VERSION = version;
diff --git a/pkgs/development/python-modules/slither-analyzer/default.nix b/pkgs/development/python-modules/slither-analyzer/default.nix
index bb6ffcad0005..303d385bbc42 100644
--- a/pkgs/development/python-modules/slither-analyzer/default.nix
+++ b/pkgs/development/python-modules/slither-analyzer/default.nix
@@ -13,7 +13,7 @@
buildPythonPackage rec {
pname = "slither-analyzer";
- version = "0.9.0";
+ version = "0.9.1";
format = "setuptools";
disabled = pythonOlder "3.8";
@@ -22,7 +22,7 @@ buildPythonPackage rec {
owner = "crytic";
repo = "slither";
rev = "refs/tags/${version}";
- hash = "sha256-Td7WBPpc+ZYlFroZNzvUqQZJag0lbkCgj8TVOPrAAPY=";
+ hash = "sha256-u9uA4eq6gYQXHhZ1ruk1vkEIRTKsgN87zENuR1Fhew4=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/tools/oh-my-posh/default.nix b/pkgs/development/tools/oh-my-posh/default.nix
index 4e4987fa53df..8829a3e1583f 100644
--- a/pkgs/development/tools/oh-my-posh/default.nix
+++ b/pkgs/development/tools/oh-my-posh/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "oh-my-posh";
- version = "12.10.0";
+ version = "12.12.1";
src = fetchFromGitHub {
owner = "jandedobbeleer";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-iPSaJL1mvPjzZjXtgqeFS1p1jlOqc6B/R1/Zwym0j3g=";
+ sha256 = "sha256-6h/TV9Ddv+1pYPV7ZvOfEOOvbocRpLXdeR6EchTvV/A=";
};
vendorSha256 = "sha256-OrtKFkWXqVoXKmN6BT8YbCNjR1gRTT4gPNwmirn7fjU=";
diff --git a/pkgs/development/tools/pgloader/default.nix b/pkgs/development/tools/pgloader/default.nix
index c86c3eb08708..f12cf2a07c96 100644
--- a/pkgs/development/tools/pgloader/default.nix
+++ b/pkgs/development/tools/pgloader/default.nix
@@ -1,11 +1,11 @@
{ lib, stdenv, fetchurl, makeWrapper, sbcl_2_2_6, sqlite, freetds, libzip, curl, git, cacert, openssl }:
stdenv.mkDerivation rec {
pname = "pgloader";
- version = "3.6.8";
+ version = "3.6.9";
src = fetchurl {
- url = "https://github.com/dimitri/pgloader/releases/download/v3.6.8/pgloader-bundle-3.6.8.tgz";
- sha256 = "sha256-h5vB+KOapbXsSVNIVWEsaanyczaCfl81+SXdiNmNboE=";
+ url = "https://github.com/dimitri/pgloader/releases/download/v3.6.9/pgloader-bundle-3.6.9.tgz";
+ sha256 = "sha256-pdCcRmoJnrfVnkhbT0WqLrRbCtOEmRgGRsXK+3uByeA=";
};
nativeBuildInputs = [ git makeWrapper ];
diff --git a/pkgs/development/tools/ruff/default.nix b/pkgs/development/tools/ruff/default.nix
index d4e52707b512..5ff02a25d3d3 100644
--- a/pkgs/development/tools/ruff/default.nix
+++ b/pkgs/development/tools/ruff/default.nix
@@ -8,16 +8,16 @@
rustPlatform.buildRustPackage rec {
pname = "ruff";
- version = "0.0.99";
+ version = "0.0.100";
src = fetchFromGitHub {
owner = "charliermarsh";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-nDquTrdHv7t4XBuO1HUe6ZF+QKy06F2kjzNxlINZcPQ=";
+ sha256 = "sha256-kFWYSaRKx63X6Nfxd1knkusiJRKVRTNdd1jOQXBCRFQ=";
};
- cargoSha256 = "sha256-QG1EXsYuzrUgPCUWz/2NrtOpbFQHZjr9TVIyalnTvCc=";
+ cargoSha256 = "sha256-eew1ZTCm/C3qY/eZvWYkcLprgM/cRaTb6e2O66SNwk8=";
buildInputs = lib.optionals stdenv.isDarwin [
CoreServices
diff --git a/pkgs/development/web/nodejs/v14.nix b/pkgs/development/web/nodejs/v14.nix
index 20f3f181b388..86358be5bcf0 100644
--- a/pkgs/development/web/nodejs/v14.nix
+++ b/pkgs/development/web/nodejs/v14.nix
@@ -8,7 +8,7 @@ let
in
buildNodejs {
inherit enableNpm;
- version = "14.21.0";
- sha256 = "sha256-O0vawbrMxUuu4uPbyre7Y1Ikxxbudu5Jqk9vVMKPeZE=";
+ version = "14.21.1";
+ sha256 = "sha256-PbldbKcolXvwkLYwGnqdLYBxSyoG2Jih22XG5Csdp6w=";
patches = lib.optional stdenv.isDarwin ./bypass-xcodebuild.diff;
}
diff --git a/pkgs/development/web/nodejs/v16.nix b/pkgs/development/web/nodejs/v16.nix
index a0586849cf75..a35c347c3d14 100644
--- a/pkgs/development/web/nodejs/v16.nix
+++ b/pkgs/development/web/nodejs/v16.nix
@@ -8,8 +8,8 @@ let
in
buildNodejs {
inherit enableNpm;
- version = "16.18.0";
- sha256 = "sha256-/P5q0jQPIpBh0+galN8Wf+P3fgFxLe3AFEoOfVjixps=";
+ version = "16.18.1";
+ sha256 = "sha256-H4BRqI+G9CBk9EFf56mA5ZsKUC7Mje9YP2MDvE1EUjg=";
patches = [
./disable-darwin-v8-system-instrumentation.patch
./bypass-darwin-xcrun-node16.patch
diff --git a/pkgs/development/web/nodejs/v18.nix b/pkgs/development/web/nodejs/v18.nix
index 142bf08bad7e..29f133a81105 100644
--- a/pkgs/development/web/nodejs/v18.nix
+++ b/pkgs/development/web/nodejs/v18.nix
@@ -8,8 +8,8 @@ let
in
buildNodejs {
inherit enableNpm;
- version = "18.12.0";
- sha256 = "sha256-c6fwHimZ6xl3Y87WZqbNVErVgOrvtz4KhJYDs+gE9C4=";
+ version = "18.12.1";
+ sha256 = "sha256-T6QGRRvFJlmikOUs/bIWKnYL1UnaS4u+vmop8pbZON8=";
patches = [
(fetchpatch {
# Fixes cross compilation to aarch64-linux by reverting https://github.com/nodejs/node/pull/43200
diff --git a/pkgs/development/web/nodejs/v19.nix b/pkgs/development/web/nodejs/v19.nix
index cb34e1c919d8..b9aed788bcd3 100644
--- a/pkgs/development/web/nodejs/v19.nix
+++ b/pkgs/development/web/nodejs/v19.nix
@@ -8,8 +8,8 @@ let
in
buildNodejs {
inherit enableNpm;
- version = "19.0.0";
- sha256 = "sha256-C3LSB6WBXxznskezPL+aLIb20BJT+jmQyXROJdl1BQ0=";
+ version = "19.0.1";
+ sha256 = "sha256-7OXCjOtHY/Xn8nb4ySUbNiHh+m5FyULnV8TRUfi/AW0=";
patches = [
(fetchpatch {
# Fixes cross compilation to aarch64-linux by reverting https://github.com/nodejs/node/pull/43200
diff --git a/pkgs/tools/admin/syft/default.nix b/pkgs/tools/admin/syft/default.nix
index 88923ef8dfbe..c221ea38eaea 100644
--- a/pkgs/tools/admin/syft/default.nix
+++ b/pkgs/tools/admin/syft/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "syft";
- version = "0.60.2";
+ version = "0.60.3";
src = fetchFromGitHub {
owner = "anchore";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-qOsKpJwX+8wFvVt/vLdVJ47rfoOn+11phq4HsQVLV6M=";
+ sha256 = "sha256-btPH92cLCAZFzlVoRxivBBhqzDK1bASrKbk3jvwDNo8=";
# populate values that require us to use git. By doing this in postFetch we
# can delete .git afterwards and maintain better reproducibility of the src.
leaveDotGit = true;
diff --git a/pkgs/tools/misc/debootstrap/default.nix b/pkgs/tools/misc/debootstrap/default.nix
index b8d099795e0e..9465d412b046 100644
--- a/pkgs/tools/misc/debootstrap/default.nix
+++ b/pkgs/tools/misc/debootstrap/default.nix
@@ -16,14 +16,14 @@ let binPath = lib.makeBinPath [
];
in stdenv.mkDerivation rec {
pname = "debootstrap";
- version = "1.0.127";
+ version = "1.0.128";
src = fetchFromGitLab {
domain = "salsa.debian.org";
owner = "installer-team";
repo = pname;
rev = version;
- sha256 = "sha256-KKH9F0e4HEO2FFh1/V5UIY5C95ZOUm4nUhVUGqpZWaI=";
+ sha256 = "sha256-WybWWyRPreokjUAdWfZ2MUjgZhF1GTncpbLajQ3rh0E=";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/pkgs/tools/misc/mutagen/default.nix b/pkgs/tools/misc/mutagen/default.nix
index 83fdef4b95e1..2758b348610c 100644
--- a/pkgs/tools/misc/mutagen/default.nix
+++ b/pkgs/tools/misc/mutagen/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "mutagen";
- version = "0.14.0";
+ version = "0.16.0";
src = fetchFromGitHub {
owner = "mutagen-io";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-OoRXf0QboRQkZE4zcwlGFyoToGOy1bbgGSo17BQLqCE=";
+ sha256 = "sha256-nKt/A1LIr+cPWASWFYiOebxsuWcbzd23CQ32GgnWvLA=";
};
- vendorSha256 = "sha256-dkPpz0SZEAMPR7mq11kDHGCgeIpnXj2lRnJo1Ws32Cc=";
+ vendorSha256 = "sha256-feQOrZmJ656yD3HsxnN8JFXoP/XM2Gobyzj5MHyH/Xw=";
agents = fetchzip {
name = "mutagen-agents-${version}";
@@ -21,7 +21,7 @@ buildGoModule rec {
postFetch = ''
rm $out/mutagen # Keep only mutagen-agents.tar.gz.
'';
- sha256 = "sha256-AlAo55/ewTE04WfS0beVonGA97AmpR1pAw/QxKAYjv8=";
+ sha256 = "sha256-QkleSf/Npbqrx2049tKxxwJk+996gM5AU/BIoyplDYo=";
};
doCheck = false;
diff --git a/pkgs/tools/misc/vector/default.nix b/pkgs/tools/misc/vector/default.nix
index 2fb2f82ba80f..d6c589ee2ed0 100644
--- a/pkgs/tools/misc/vector/default.nix
+++ b/pkgs/tools/misc/vector/default.nix
@@ -32,7 +32,7 @@
let
pname = "vector";
- version = "0.24.1";
+ version = "0.25.0";
in
rustPlatform.buildRustPackage {
inherit pname version;
@@ -41,28 +41,10 @@ rustPlatform.buildRustPackage {
owner = "vectordotdev";
repo = pname;
rev = "v${version}";
- hash = "sha256-RfKg14r3B5Jx2vIa4gpJs5vXRqSXKOXKRFmmQmzQorQ=";
+ hash = "sha256-2hCgHf7iBPl9BQITXyUDwgAz/i2HhXT4eczWrExCUDk=";
};
- patches = [
- (fetchpatch {
- name = "rust-1.64-part1.patch";
- url = "https://github.com/vectordotdev/vector/commit/e7437df97711b6a660a3532fe5026244472a900f.patch";
- hash = "sha256-EyheI3nngt72+ZZNNsjp3KV1CuRb9CZ7wUCHt0twFVs=";
- })
- (fetchpatch {
- name = "rust-1.64-part2.patch";
- url = "https://github.com/vectordotdev/vector/commit/e80c7afaf7601cf936c7c3468bd7b4b230ef6149.patch";
- hash = "sha256-pHcq7XLn+9PKs0DnBTK5FawN5KSF8BuJf7sBO9u5Gb8=";
- excludes = [
- # There are too many conflicts to easily resolve patching this file, but
- # the changes here do not block compilation.
- "lib/lookup/src/lookup_v2/owned.rs"
- ];
- })
- ];
-
- cargoHash = "sha256-l2rrT2SeeH4bYYlzSiFASNBxtg4TBm1dRA4cFRfvpkk=";
+ cargoHash = "sha256-E23m8/XCEXeEpz1itIzCit9RpoB1/PRrYVWxt+VVfxA=";
nativeBuildInputs = [ pkg-config cmake perl ];
buildInputs = [ oniguruma openssl protobuf rdkafka zstd ]
++ lib.optionals stdenv.isDarwin [ Security libiconv coreutils CoreServices ];
diff --git a/pkgs/tools/networking/netbird/default.nix b/pkgs/tools/networking/netbird/default.nix
index f4195dfa5fd9..5811c9a4a268 100644
--- a/pkgs/tools/networking/netbird/default.nix
+++ b/pkgs/tools/networking/netbird/default.nix
@@ -14,13 +14,13 @@ let
in
buildGoModule rec {
pname = "netbird";
- version = "0.10.3";
+ version = "0.10.4";
src = fetchFromGitHub {
owner = "netbirdio";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-JytK4wmQepSSml6jmP2TWRICt/s26E56ntACpFdiTDU=";
+ sha256 = "sha256-Z67imUrs/NUoBfbqIBmfTNMb1+X1NpYX4KxB5jU4C9c=";
};
vendorSha256 = "sha256-3gpA0EGdcVeUCU7iozpjQJM/iid34PRm3gpxUiwzDEk=";
diff --git a/pkgs/tools/networking/s3cmd/default.nix b/pkgs/tools/networking/s3cmd/default.nix
index a73d39b5126a..db6175bea50a 100644
--- a/pkgs/tools/networking/s3cmd/default.nix
+++ b/pkgs/tools/networking/s3cmd/default.nix
@@ -2,13 +2,13 @@
buildPythonApplication rec {
pname = "s3cmd";
- version = "2.2.0";
+ version = "2.3.0";
src = fetchFromGitHub {
owner = "s3tools";
repo = "s3cmd";
- rev = "v${version}";
- sha256 = "0w4abif05mp52qybh4hjg6jbbj2caljq5xdhfiha3g0s5zsq46ri";
+ rev = "refs/tags/v${version}";
+ sha256 = "sha256-nb4WEH8ELaG/bIe4NtjD4p99VJoG90UQ662iWyvnr2U=";
};
propagatedBuildInputs = [ python-magic python-dateutil ];
diff --git a/pkgs/tools/virtualization/cloud-init/default.nix b/pkgs/tools/virtualization/cloud-init/default.nix
index 6a2d0fcdda70..5e438d887211 100644
--- a/pkgs/tools/virtualization/cloud-init/default.nix
+++ b/pkgs/tools/virtualization/cloud-init/default.nix
@@ -14,14 +14,14 @@
python3.pkgs.buildPythonApplication rec {
pname = "cloud-init";
- version = "22.3.3";
+ version = "22.3.4";
namePrefix = "";
src = fetchFromGitHub {
owner = "canonical";
repo = "cloud-init";
- rev = version;
- hash = "sha256-9vdFPSmkkdJDlVfA9DgqczRoOBMmSMezdl3D/0OSbsQ=";
+ rev = "refs/tags/${version}";
+ hash = "sha256-agffkTEaURjw/Ro8znYRQLKhDP2Ey0LimuzqbW5xb28=";
};
patches = [ ./0001-add-nixos-support.patch ];