diff options
Diffstat (limited to 'pkgs/tools')
31 files changed, 553 insertions, 153 deletions
diff --git a/pkgs/tools/admin/azure-cli/README.md b/pkgs/tools/admin/azure-cli/README.md new file mode 100644 index 0000000000000..30936ded0a751 --- /dev/null +++ b/pkgs/tools/admin/azure-cli/README.md @@ -0,0 +1,101 @@ +# Azure CLI + +## Extensions + +There are two sets of extensions: the one in `extensions-generated.nix` is generated with the script +`query-extension-index.sh`. These are extensions that don't have external requirements and thus can +be easily maintained and updated. The set should only be manipulated through an update based on the +script output. + +The other set of extensions is in `extensions-manual.nix`. These are extensions with requirements, +which need to be packaged and maintained manually. + +### Adding an extension to `extensions-manual.nix` + +To manually add a missing extension, first query its metadata from the extension index. +Use the following command, use the current version of azure-cli in nixpkgs as `cli-version` +and the name of the extension you want to package as `extension`: + +```sh +./query-extension-index.sh --cli-version=2.61.0 --extension=azure-devops --download +``` + +The output should look something like this: + +```json +{ + "pname": "azure-devops", + "description": "Tools for managing Azure DevOps.", + "version": "1.0.1", + "url": "https://github.com/Azure/azure-devops-cli-extension/releases/download/20240514.1/azure_devops-1.0.1-py2.py3-none-any.whl", + "sha256": "f300d0288f017148514ebe6f5912aef10c7a6f29bdc0c916b922edf1d75bc7db", + "license": "MIT", + "requires": [ + "distro (==1.3.0)", + "distro==1.3.0" + ] +} +``` + +Based on this, you can add an attribute to `extensions-manual.nix`: + +```nix + azure-devops = mkAzExtension rec { + pname = "azure-devops"; + version = "1.0.0"; + url = "https://github.com/Azure/azure-devops-cli-extension/releases/download/20240206.1/azure_devops-${version}-py2.py3-none-any.whl"; + sha256 = "658a2854d8c80f874f9382d421fa45abf6a38d00334737dda006f8dec64cf70a"; + description = "Tools for managing Azure DevOps"; + propagatedBuildInputs = with python3Packages; [ + distro + ]; + meta.maintainers = with lib.maintainers; [ katexochen ]; + }; +``` + +* The attribute name should be the same as `pname`. +* Replace the version in `url` with `${version}`. +* The json output `requires` must be transformed into `propagetedBuildInputs`. +* If `license` is `"MIT"`, it can be left out in the nix expression, as the builder defaults to that license. +* Add yourself as maintainer in `meta.maintainers`. + +### Testing extensions + +You can build azure-cli with an extension on the command line by running the following command at the root of this repository: + +```sh +nix build --impure --expr 'with (import ./. {}); azure-cli.withExtensions [ azure-cli.extensions.azure-devops ]' +``` + +Check if the desired functionality was added. + +You can check if the extensions was recognized by running: + +```sh +./result/bin/az extension list +``` + +The output should show the extension like this: + +```sh +[ + { + "experimental": false, + "extensionType": "whl", + "name": "azure-devops", + "path": "/nix/store/azbgnpg5nh5rb8wfvp0r9bmcx83mqrj5-azure-cli-extensions/azure-devops", + "preview": false, + "version": "1.0.0" + } +] +``` + +### Removing an extension + +If extensions are removed upstream, an alias is added to the end of `extensions-manual.nix` +(see `# Removed extensions`). This alias should throw an error and be of similar structure as +this example: + +```nix +blockchain = throw "The 'blockchain' extension for azure-cli was deprecated upstream"; # Added 2024-04-26 +``` diff --git a/pkgs/tools/admin/azure-cli/extensions-manual.nix b/pkgs/tools/admin/azure-cli/extensions-manual.nix index 6e098fb1f3cf8..66c2268bffbb1 100644 --- a/pkgs/tools/admin/azure-cli/extensions-manual.nix +++ b/pkgs/tools/admin/azure-cli/extensions-manual.nix @@ -1,3 +1,7 @@ +# Manually packaged extensions for azure-cli +# +# Checkout ./README.md for more information. + { lib , mkAzExtension , mycli @@ -12,6 +16,7 @@ sha256 = "658a2854d8c80f874f9382d421fa45abf6a38d00334737dda006f8dec64cf70a"; description = "Tools for managing Azure DevOps"; propagatedBuildInputs = with python3Packages; [ distro ]; + meta.maintainers = with lib.maintainers; [ katexochen ]; }; rdbms-connect = mkAzExtension rec { diff --git a/pkgs/tools/admin/boulder/default.nix b/pkgs/tools/admin/boulder/default.nix index 50325a6690cf9..73acc0944df79 100644 --- a/pkgs/tools/admin/boulder/default.nix +++ b/pkgs/tools/admin/boulder/default.nix @@ -8,7 +8,7 @@ buildGoModule rec { pname = "boulder"; - version = "2024-06-17a"; + version = "2024-06-25"; src = fetchFromGitHub { owner = "letsencrypt"; @@ -21,7 +21,7 @@ buildGoModule rec { find $out -name .git -print0 | xargs -0 rm -rf popd ''; - hash = "sha256-kObCD9diy1ryyeLQNyfWNMJPfvtjAWVp8OVUO0MLV6A="; + hash = "sha256-AOCYCTIgT9QAn6LR72OG2C8Li1UMFieDrtkplXv4plA="; }; vendorHash = null; @@ -42,49 +42,260 @@ buildGoModule rec { preCheck = '' # Test all targets. unset subPackages - - # Disable tests that fail or require additional services. - rm -f \ - cmd/admin-revoker/main_test.go \ - cmd/admin/cert_test.go \ - cmd/admin/key_test.go \ - cmd/bad-key-revoker/main_test.go \ - cmd/cert-checker/main_test.go \ - cmd/config_test.go \ - cmd/contact-auditor/main_test.go \ - cmd/expiration-mailer/main_test.go \ - cmd/expiration-mailer/send_test.go \ - cmd/id-exporter/main_test.go \ - cmd/rocsp-tool/client_test.go \ - cmd/shell_test.go \ - core/util_test.go \ - db/map_test.go \ - db/multi_test.go \ - db/rollback_test.go \ - grpc/creds/creds_test.go \ - log/log_test.go \ - ocsp/updater/updater_test.go \ - ra/ra_test.go \ - ratelimits/limiter_test.go \ - ratelimits/source_redis_test.go \ - ratelimits/source_test.go \ - redis/lookup_test.go \ - rocsp/rocsp_test.go \ - sa/database_test.go \ - sa/model_test.go \ - sa/precertificates_test.go \ - sa/rate_limits_test.go \ - sa/sa_test.go \ - test/load-generator/acme/directory_test.go \ - va/caa_test.go \ - va/dns_test.go \ - va/http_test.go \ - va/tlsalpn_test.go \ - va/va_test.go \ - wfe2/verify_test.go \ - wfe2/wfe_test.go ''; + # Tests that fail or require additional services. + disabledTests = [ + "TestARI" + "TestAccount" + "TestAddBlockedKeyUnknownSource" + "TestAddCertificate" + "TestAddCertificateDuplicate" + "TestAddCertificateRenewalBit" + "TestAddPreCertificateDuplicate" + "TestAddPrecertificate" + "TestAddPrecertificateIncomplete" + "TestAddPrecertificateKeyHash" + "TestAddPrecertificateNoOCSP" + "TestAddRegistration" + "TestAddSerial" + "TestAdministrativelyRevokeCertificate" + "TestAuthorization500" + "TestAuthorizationChallengeNamespace" + "TestAuthzFailedRateLimitingNewOrder" + "TestAutoIncrementSchema" + "TestBadNonce" + "TestBlockedKey" + "TestBlockedKeyRevokedBy" + "TestBuildID" + "TestCTPolicyMeasurements" + "TestCertIsRenewed" + "TestCertificateAbsent" + "TestCertificateKeyNotEqualAccountKey" + "TestCertificatesTableContainsDuplicateSerials" + "TestCertsPerNameRateLimitTable" + "TestChallenge" + "TestCheckCert" + "TestCheckCert" + "TestCheckCertReturnsDNSNames" + "TestCheckCertReturnsDNSNames" + "TestCheckExactCertificateLimit" + "TestCheckFQDNSetRateLimitOverride" + "TestCheckWildcardCert" + "TestCheckWildcardCert" + "TestClientTransportCredentials" + "TestContactAuditor" + "TestCountCertificatesByNamesParallel" + "TestCountCertificatesByNamesTimeRange" + "TestCountCertificatesRenewalBit" + "TestCountInvalidAuthorizations2" + "TestCountNewOrderWithReplaces" + "TestCountOrders" + "TestCountPendingAuthorizations2" + "TestCountRegistrationsByIP" + "TestCountRegistrationsByIPRange" + "TestDbSettings" + "TestDeactivateAccount" + "TestDeactivateAuthorization" + "TestDeactivateRegistration" + "TestDedupOnRegistration" + "TestDirectory" + "TestDontFindRevokedCert" + "TestEarlyOrderRateLimiting" + "TestEmptyAccount" + "TestEnforceJWSAuthType" + "TestExactPublicSuffixCertLimit" + "TestExtractJWK" + "TestFQDNSetTimestampsForWindow" + "TestFQDNSets" + "TestFQDNSetsExists" + "TestFailExit" + "TestFasterGetOrderForNames" + "TestFinalizeAuthorization2" + "TestFinalizeOrder" + "TestFinalizeOrderWildcard" + "TestFinalizeOrderWithMixedSANAndCN" + "TestFinalizeSCTError" + "TestFindCertsAtCapacity" + "TestFindExpiringCertificates" + "TestFindIDs" + "TestFindIDsForHostnames" + "TestFindIDsWithExampleHostnames" + "TestFindUnrevoked" + "TestFindUnrevokedNoRows" + "TestGETAPIAuthz" + "TestGETAPIChallenge" + "TestGenerateOCSP" + "TestGenerateOCSPLongExpiredSerial" + "TestGenerateOCSPUnknownSerial" + "TestGetAndProcessCerts" + "TestGetAndProcessCerts" + "TestGetAuthorization" + "TestGetAuthorization2NoRows" + "TestGetAuthorizations2" + "TestGetCertificate" + "TestGetCertificateHEADHasCorrectBodyLength" + "TestGetCertificateNew" + "TestGetCertificateServerError" + "TestGetCertsEmptyResults" + "TestGetCertsEmptyResults" + "TestGetChallenge" + "TestGetChallengeUpRel" + "TestGetMaxExpiration" + "TestGetOrder" + "TestGetOrderExpired" + "TestGetOrderForNames" + "TestGetPendingAuthorization2" + "TestGetRevokedCerts" + "TestGetSerialMetadata" + "TestGetSerialsByAccount" + "TestGetSerialsByKey" + "TestGetStartingID" + "TestGetValidAuthorizations2" + "TestGetValidOrderAuthorizations2" + "TestHTTPDialTimeout" + "TestHTTPMethods" + "TestHandleFunc" + "TestHeaderBoulderRequester" + "TestIgnoredLint" + "TestIgnoredLint" + "TestIncidentARI" + "TestIncidentSerialModel" + "TestIncidentsForSerial" + "TestIndex" + "TestIndexGet404" + "TestInvoke" + "TestInvokeRevokerHasNoExtantCerts" + "TestIssueCertificateAuditLog" + "TestIssueCertificateCAACheckLog" + "TestIssueCertificateInnerErrs" + "TestIssueCertificateInnerWithProfile" + "TestIssueCertificateOuter" + "TestKeyRollover" + "TestKeyRolloverMismatchedJWSURLs" + "TestLeaseOldestCRLShard" + "TestLeaseSpecificCRLShard" + "TestLifetimeOfACert" + "TestLimiter_CheckWithLimitOverrides" + "TestLimiter_DefaultLimits" + "TestLimiter_InitializationViaCheckAndSpend" + "TestLimiter_RefundAndReset" + "TestLoadFromDB" + "TestLookupJWK" + "TestMatchJWSURLs" + "TestNewAccount" + "TestNewAccountNoID" + "TestNewAccountWhenAccountHasBeenDeactivated" + "TestNewAccountWhenGetRegByKeyFails" + "TestNewAccountWhenGetRegByKeyNotFound" + "TestNewECDSAAccount" + "TestNewLookup" + "TestNewLookupWithAllFailingSRV" + "TestNewLookupWithOneFailingSRV" + "TestNewOrder" + "TestNewOrderAuthzReuseSafety" + "TestNewOrderCheckFailedAuthorizationsFirst" + "TestNewOrderExpiry" + "TestNewOrderFailedAuthzRateLimitingExempt" + "TestNewOrderMaxNames" + "TestNewOrderRateLimiting" + "TestNewOrderRateLimitingExempt" + "TestNewOrderReplacesSerialCarriesThroughToSA" + "TestNewOrderReuse" + "TestNewOrderReuseInvalidAuthz" + "TestNewOrderWildcard" + "TestNewRegistration" + "TestNewRegistrationBadKey" + "TestNewRegistrationContactsPresent" + "TestNewRegistrationNoFieldOverwrite" + "TestNewRegistrationRateLimit" + "TestNewRegistrationSAFailure" + "TestNoContactCertIsNotRenewed" + "TestNoContactCertIsRenewed" + "TestNoSuchRegistrationErrors" + "TestNonceEndpoint" + "TestOldTLSInbound" + "TestOrderMatchesReplacement" + "TestOrderToOrderJSONV2Authorizations" + "TestOrderWithOrderModelv1" + "TestPOST404" + "TestPanicStackTrace" + "TestParseJWSRequest" + "TestPendingAuthorizationsUnlimited" + "TestPerformValidationAlreadyValid" + "TestPerformValidationBadChallengeType" + "TestPerformValidationExpired" + "TestPerformValidationSuccess" + "TestPerformValidationVAError" + "TestPrepAuthzForDisplay" + "TestPreresolvedDialerTimeout" + "TestProcessCerts" + "TestProcessCertsConnectError" + "TestProcessCertsParallel" + "TestRecheckCAADates" + "TestRecheckCAAEmpty" + "TestRecheckCAAFail" + "TestRecheckCAAInternalServerError" + "TestRecheckCAASuccess" + "TestRedisSource_BatchSetAndGet" + "TestRedisSource_Ping" + "TestRegistrationsPerIPOverrideUsage" + "TestRehydrateHostPort" + "TestRelativeDirectory" + "TestReplicationLagRetries" + "TestResolveContacts" + "TestRevokeCertByApplicant_Controller" + "TestRevokeCertByApplicant_Subscriber" + "TestRevokeCertByKey" + "TestRevokeCertificate" + "TestRevokeCerts" + "TestRollback" + "TestSPKIHashFromPrivateKey" + "TestSPKIHashesFromFile" + "TestSelectRegistration" + "TestSelectUncheckedRows" + "TestSendEarliestCertInfo" + "TestSerialsForIncident" + "TestSerialsFromFile" + "TestSerialsFromPrivateKey" + "TestSetAndGet" + "TestSetOrderProcessing" + "TestSingleton" + "TestStart" + "TestStatusForOrder" + "TestStoreResponse" + "TestStrictness" + "TestTLSALPN01DialTimeout" + "TestTLSConfigLoad" + "TestTimeouts" + "TestUpdateCRLShard" + "TestUpdateChallengeFinalizedAuthz" + "TestUpdateChallengeRAError" + "TestUpdateChallengesDeleteUnused" + "TestUpdateMissingAuthorization" + "TestUpdateNowWithAllFailingSRV" + "TestUpdateNowWithOneFailingSRV" + "TestUpdateRegistrationSame" + "TestUpdateRevokedCertificate" + "TestValidJWSForKey" + "TestValidNonce" + "TestValidNonce_NoMatchingBackendFound" + "TestValidPOSTAsGETForAccount" + "TestValidPOSTForAccount" + "TestValidPOSTForAccountSwappedKey" + "TestValidPOSTRequest" + "TestValidPOSTURL" + "TestValidSelfAuthenticatedPOST" + "TestValidSelfAuthenticatedPOSTGoodKeyErrors" + "TestValidateContacts" + "TestWrappedMap" + "Test_sendError" + ]; + + checkFlags = [ + "-skip ${lib.strings.concatStringsSep "|" disabledTests}" + ]; + postInstall = '' for i in $($out/bin/boulder --list); do ln -s $out/bin/boulder $out/bin/$i diff --git a/pkgs/tools/admin/scaleway-cli/default.nix b/pkgs/tools/admin/scaleway-cli/default.nix index ba65217d59c70..3b9ffe581afd6 100644 --- a/pkgs/tools/admin/scaleway-cli/default.nix +++ b/pkgs/tools/admin/scaleway-cli/default.nix @@ -2,16 +2,16 @@ buildGoModule rec { pname = "scaleway-cli"; - version = "2.31.0"; + version = "2.32.1"; src = fetchFromGitHub { owner = "scaleway"; repo = "scaleway-cli"; rev = "v${version}"; - sha256 = "sha256-v8KkF5GShMDVjeAoe/bvoqHIBKDJ1hd6RIpu9Zugc6w="; + sha256 = "sha256-+zSUgwh3CKyvBzRY4NevkoSINfvMNOfw8rvs48O0yJw="; }; - vendorHash = "sha256-Oprca0JX8SmrEGrnalzKt89qrXa5UEbErl8BOFJlHGI="; + vendorHash = "sha256-iEPBTM+hVAGs0TF30onHR0lWAALQbsA164OTkYuOdwc="; ldflags = [ "-w" diff --git a/pkgs/tools/audio/mpd-notification/default.nix b/pkgs/tools/audio/mpd-notification/default.nix index bb09b9b183024..d4ee520ad6dc0 100644 --- a/pkgs/tools/audio/mpd-notification/default.nix +++ b/pkgs/tools/audio/mpd-notification/default.nix @@ -12,13 +12,13 @@ stdenv.mkDerivation rec { pname = "mpd-notification"; - version = "0.9.0"; + version = "0.9.1"; src = fetchFromGitHub { owner = "eworm-de"; repo = "mpd-notification"; rev = version; - hash = "sha256-1DG8pemlF5bURbdJwGTZqp3WVfLOwGEpfqq9q1NtwaE="; + hash = "sha256-8iBG1IdbERB2gOALvVBNJ3/hhiou3D/azSRkRD+u9O8="; }; nativeBuildInputs = [ diff --git a/pkgs/tools/backup/dar/default.nix b/pkgs/tools/backup/dar/default.nix index 9e36f7572df15..56a5a9313911e 100644 --- a/pkgs/tools/backup/dar/default.nix +++ b/pkgs/tools/backup/dar/default.nix @@ -22,12 +22,12 @@ }: stdenv.mkDerivation rec { - version = "2.7.14"; + version = "2.7.15"; pname = "dar"; src = fetchzip { url = "mirror://sourceforge/dar/${pname}-${version}.tar.gz"; - sha256 = "sha256-qesq+Rqo/llvQ7JPqYwLhObwZw2GlhXpYyc6NEA9c4M="; + sha256 = "sha256-2CuPqb17E2bHBuwRPA0QoIeTUq/lJZ3pFKbtqsRPktk="; }; outputs = [ "out" "dev" ]; diff --git a/pkgs/tools/filesystems/exfatprogs/default.nix b/pkgs/tools/filesystems/exfatprogs/default.nix index 997aeec80fa7c..e8f17431069b2 100644 --- a/pkgs/tools/filesystems/exfatprogs/default.nix +++ b/pkgs/tools/filesystems/exfatprogs/default.nix @@ -17,7 +17,7 @@ stdenv.mkDerivation rec { description = "exFAT filesystem userspace utilities"; homepage = "https://github.com/exfatprogs/exfatprogs"; license = licenses.gpl2Plus; - maintainers = with maintainers; [ zane ]; + maintainers = with maintainers; [ ]; platforms = platforms.linux; }; } diff --git a/pkgs/tools/filesystems/juicefs/default.nix b/pkgs/tools/filesystems/juicefs/default.nix index 518a5ca55f5cc..2bca01f54527c 100644 --- a/pkgs/tools/filesystems/juicefs/default.nix +++ b/pkgs/tools/filesystems/juicefs/default.nix @@ -1,32 +1,30 @@ { lib -, buildGo121Module +, buildGoModule , fetchFromGitHub -, stdenv }: -# JuiceFS 1.1.2 doesn't build with Go 1.22. Fixed in upstream. This can be -# reverted in future releases. https://github.com/juicedata/juicefs/issues/4339 -buildGo121Module rec { +buildGoModule rec { pname = "juicefs"; - version = "1.1.2"; + version = "1.2.0"; src = fetchFromGitHub { owner = "juicedata"; repo = pname; rev = "v${version}"; - sha256 = "sha256-Sf68N5ZKveKM6xZEqF7Ah0KGgOx1cGZpJ2lYkUlgpI0="; + hash = "sha256-qPdrcWCD8BYwRwnynNhcti7eUskgHP1kAS6KiS0LHsc="; }; - vendorHash = "sha256-ofUo/3EQPhXPNeD/3to5oFir/3eAaf9WBHR4DOzcxBQ="; + vendorHash = "sha256-tKbn/dFnYTc0fYwYUrrpdN1hzx047yQSFdTG94CifhM="; - ldflags = [ "-s" "-w" ]; + excludedPackages = [ "sdk/java/libjfs" ]; - doCheck = false; # requires network access + ldflags = [ + "-s" + "-w" + "-X github.com/juicedata/juicefs/pkg/version.version=${version}" + ]; - # we dont need the libjfs binary - postFixup = '' - rm $out/bin/libjfs - ''; + doCheck = false; # requires network access postInstall = '' ln -s $out/bin/juicefs $out/bin/mount.juicefs @@ -37,6 +35,5 @@ buildGo121Module rec { homepage = "https://www.juicefs.com/"; license = licenses.asl20; maintainers = with maintainers; [ dit7ya ]; - broken = stdenv.isDarwin; }; } diff --git a/pkgs/tools/misc/multitail/default.nix b/pkgs/tools/misc/multitail/default.nix index 3732d64dd9290..80875dec8f711 100644 --- a/pkgs/tools/misc/multitail/default.nix +++ b/pkgs/tools/misc/multitail/default.nix @@ -1,14 +1,14 @@ { lib, stdenv, fetchFromGitHub, ncurses, pkg-config, cmake }: stdenv.mkDerivation rec { - version = "7.1.2"; + version = "7.1.3"; pname = "multitail"; src = fetchFromGitHub { owner = "folkertvanheusden"; repo = pname; rev = version; - sha256 = "sha256-00NZI/KFcgEAkvESnx0KQFW1GvX6FgZLA4Z1Fv2qi+E="; + sha256 = "sha256-4iAFxDAS3gthYPECzyFj0AKzIGwZ9hTJ96fCnQGLbXU="; }; nativeBuildInputs = [ pkg-config cmake ]; diff --git a/pkgs/tools/misc/pfetch-rs/default.nix b/pkgs/tools/misc/pfetch-rs/default.nix index 143e340a4c0d7..e5cb03d01dc11 100644 --- a/pkgs/tools/misc/pfetch-rs/default.nix +++ b/pkgs/tools/misc/pfetch-rs/default.nix @@ -2,16 +2,16 @@ rustPlatform.buildRustPackage rec { pname = "pfetch-rs"; - version = "2.9.2"; + version = "2.10.0"; src = fetchFromGitHub { owner = "Gobidev"; repo = pname; rev = "v${version}"; - hash = "sha256-1Mw20O64I0UeAOO4Gea8cAbNnHkWOMvoRawIAZ62kTI="; + hash = "sha256-Sq5bHbUxZxgbCmekKVNlgVAXTAxY2sSPgUeFJ/nzkU4="; }; - cargoHash = "sha256-Jx8g49rMatXMV1KvoFGBhXKmf77WR4uE/Xewl5TMeWM="; + cargoHash = "sha256-nEI2boe7bP/c5WKl7LifQNA2VxMvpxGeCyHcwr3aG7E="; buildInputs = lib.optionals stdenv.isDarwin [ darwin.apple_sdk.frameworks.AppKit diff --git a/pkgs/tools/misc/sensible-utils/default.nix b/pkgs/tools/misc/sensible-utils/default.nix index 4584de1f8fdda..c60220c0341cd 100644 --- a/pkgs/tools/misc/sensible-utils/default.nix +++ b/pkgs/tools/misc/sensible-utils/default.nix @@ -2,14 +2,14 @@ stdenv.mkDerivation rec { pname = "sensible-utils"; - version = "0.0.23"; + version = "0.0.24"; src = fetchFromGitLab { domain = "salsa.debian.org"; owner = "debian"; repo = "sensible-utils"; rev = "debian/${version}"; - sha256 = "sha256-EiWrMDVfauCBHmpJOoJFWOdigtDiNc5DzDoeyWhke9k="; + sha256 = "sha256-omdg5df/TxURarrqawsB3+B85siDJxDaex/2rx5csXI="; }; nativeBuildInputs = [ makeWrapper ]; diff --git a/pkgs/tools/misc/tmux/default.nix b/pkgs/tools/misc/tmux/default.nix index dec0e1b453359..aa72ecb5d980c 100644 --- a/pkgs/tools/misc/tmux/default.nix +++ b/pkgs/tools/misc/tmux/default.nix @@ -48,6 +48,12 @@ stdenv.mkDerivation (finalAttrs: { url = "https://github.com/tmux/tmux/commit/4f5a944ae3e8f7a230054b6c0b26f423fa738e71.patch"; hash = "sha256-HlUeU5ZicPe7Ya8A1HpunxfVOE2BF6jOHq3ZqTuU5RE="; }) + # https://github.com/tmux/tmux/issues/3983 + # fix tmux crashing when neovim is used in a ssh session + (fetchpatch { + url = "https://github.com/tmux/tmux/commit/aa17f0e0c1c8b3f1d6fc8617613c74f07de66fae.patch"; + hash = "sha256-jhWGnC9tsGqTTA5tU+i4G3wlwZ7HGz4P0UHl17dVRU4="; + }) ]; nativeBuildInputs = [ diff --git a/pkgs/tools/misc/uutils-coreutils/default.nix b/pkgs/tools/misc/uutils-coreutils/default.nix index 0e88aa91c863b..1b3c920eca091 100644 --- a/pkgs/tools/misc/uutils-coreutils/default.nix +++ b/pkgs/tools/misc/uutils-coreutils/default.nix @@ -12,19 +12,19 @@ stdenv.mkDerivation rec { pname = "uutils-coreutils"; - version = "0.0.25"; + version = "0.0.27"; src = fetchFromGitHub { owner = "uutils"; repo = "coreutils"; rev = version; - hash = "sha256-25jmlGxMWzAaJEmMHruA6H+nqx2QHnYX9c9SKqrQRE4="; + hash = "sha256-6MbX3C5NVwiOwXW5xJO2X3qKMh3pUSALR9aK2IbgaaU="; }; cargoDeps = rustPlatform.fetchCargoTarball { inherit src; name = "${pname}-${version}"; - hash = "sha256-lQoOkiSga2aS8GNgLcHdid1/1u3johYEcGi9oOVsdJs="; + hash = "sha256-JowORfYHxN8GqvWeUm0ACnHNM3uZviYbhR7BOeAfphw="; }; nativeBuildInputs = [ rustPlatform.cargoSetupHook sphinx ]; diff --git a/pkgs/tools/misc/xq/default.nix b/pkgs/tools/misc/xq/default.nix index 67d09807afc9e..e0b7d61616f2f 100644 --- a/pkgs/tools/misc/xq/default.nix +++ b/pkgs/tools/misc/xq/default.nix @@ -5,14 +5,14 @@ rustPlatform.buildRustPackage rec { pname = "xq"; - version = "0.4.0"; + version = "0.4.1"; src = fetchCrate { inherit pname version; - sha256 = "sha256-pQhzyXLurFnBn9DkkXA54NsAX8wE4rQvaHXZLkLDwdw="; + sha256 = "sha256-Qe+crretlKJRoNPO2+aHxCmMO9MecqGjOuvdhr4a0NU="; }; - cargoHash = "sha256-gfCH/jnJTUiqwzxUYuZuFWh9Wq8hp43z2gRdaDQ908g="; + cargoHash = "sha256-R2ng5l2l/5vWnTJ3kt3cURNWL4Lo55yGbSE+9hjQu20="; meta = with lib; { description = "Pure rust implementation of jq"; diff --git a/pkgs/tools/networking/arping/default.nix b/pkgs/tools/networking/arping/default.nix index 3a08ec85083aa..baa1b1a98ad45 100644 --- a/pkgs/tools/networking/arping/default.nix +++ b/pkgs/tools/networking/arping/default.nix @@ -8,13 +8,13 @@ stdenv.mkDerivation rec { pname = "arping"; - version = "2.24"; + version = "2.25"; src = fetchFromGitHub { owner = "ThomasHabets"; repo = pname; rev = "${pname}-${version}"; - hash = "sha256-rME4IDzwYHOURbyuG7G5gnXvUIVoQH2WIeLWacHyoBA="; + hash = "sha256-SAdbgPmApmFToYrAm8acUapZMEMQr5MO7bQOTO2hd2c="; }; nativeBuildInputs = [ diff --git a/pkgs/tools/networking/fast-ssh/default.nix b/pkgs/tools/networking/fast-ssh/default.nix index 3fb812a38ee74..59f61d9af7101 100644 --- a/pkgs/tools/networking/fast-ssh/default.nix +++ b/pkgs/tools/networking/fast-ssh/default.nix @@ -1,32 +1,23 @@ -{ lib -, stdenv -, fetchFromGitHub -, fetchpatch -, rustPlatform -, Security +{ + lib, + stdenv, + fetchFromGitHub, + rustPlatform, + Security, }: rustPlatform.buildRustPackage rec { pname = "fast-ssh"; - version = "0.3.1"; + version = "0.3.2"; src = fetchFromGitHub { owner = "julien-r44"; repo = "fast-ssh"; - rev = "v${version}"; - sha256 = "sha256-eHJdMe8RU6Meg/9+NCfIneD5BqNUc2yIiQ8Z5UqUBUI="; + rev = "refs/tags/v${version}"; + hash = "sha256-Wn1kwuY1tRJVe9DJexyQ/h+Z1gNtluj78QpBYjeCbSE="; }; - cargoSha256 = "sha256-sIQNoH3UWX3SwCFCPZEREIFR7C28ml4oGsrq6wuOAT0="; - - patches = [ - # Can be removed as soon as this is is merged: https://github.com/Julien-R44/fast-ssh/pull/22 - (fetchpatch { - name = "fix-ambiguous-as_ref.patch"; - url = "https://github.com/Julien-R44/fast-ssh/commit/c082a64a4b412380b2ab145c24161fdaa26175db.patch"; - hash = "sha256-egkoJF+rQiuClNL8ltzmB7oHngbpOxO29rlwZ3nELOE="; - }) - ]; + cargoHash = "sha256-CJ3Xx5jaTD01Ai7YAY4vB7RB5lU1BIXq7530B6+KeX4="; buildInputs = lib.optional stdenv.isDarwin Security; diff --git a/pkgs/tools/networking/ntpd-rs/default.nix b/pkgs/tools/networking/ntpd-rs/default.nix index 2803d72110580..264d07428fc3c 100644 --- a/pkgs/tools/networking/ntpd-rs/default.nix +++ b/pkgs/tools/networking/ntpd-rs/default.nix @@ -13,16 +13,16 @@ rustPlatform.buildRustPackage rec { pname = "ntpd-rs"; - version = "1.1.2"; + version = "1.1.3"; src = fetchFromGitHub { owner = "pendulum-project"; repo = "ntpd-rs"; rev = "v${version}"; - hash = "sha256-0ykJruuyD1Z/QcmrogodNlMZp05ocXIo3wdygB/AnT0="; + hash = "sha256-7b0IZLTt9ROEhp9bOBOvNQmS+iuQjgSrdwL1Nxy46t4="; }; - cargoHash = "sha256-Badq3GYr7BoF8VNGGtKTT4/ksuds1zBcSxx5O3vLbzg="; + cargoHash = "sha256-FgRVWo27gdIzUNNTqgu7oHwrKSaWDA+sgL8kGak0otA="; buildInputs = lib.optionals stdenv.isDarwin [ Security ]; nativeBuildInputs = [ @@ -39,6 +39,10 @@ rustPlatform.buildRustPackage rec { source utils/generate-man.sh ''; + # tests don't compile for 1.1.3 + # https://github.com/pendulum-project/ntpd-rs/actions/runs/9712796372/job/26808251482 + doCheck = false; + checkFlags = [ # doesn't find the testca "--skip=daemon::keyexchange::tests" diff --git a/pkgs/tools/networking/pacparser/default.nix b/pkgs/tools/networking/pacparser/default.nix index bb12585155770..dfef255c15c9a 100644 --- a/pkgs/tools/networking/pacparser/default.nix +++ b/pkgs/tools/networking/pacparser/default.nix @@ -2,13 +2,13 @@ stdenv.mkDerivation rec { pname = "pacparser"; - version = "1.4.3"; + version = "1.4.5"; src = fetchFromGitHub { owner = "manugarg"; repo = pname; rev = "v${version}"; - sha256 = "sha256-qIfzAQ/dJgOZJajNU3XyFudSxu2w4JC0ffHosHXje1o="; + sha256 = "sha256-X842+xPjM404aQJTc2JwqU4vq8kgyKhpnqVu70pNLks="; }; makeFlags = [ "NO_INTERNET=1" ]; diff --git a/pkgs/tools/networking/smartdns/default.nix b/pkgs/tools/networking/smartdns/default.nix index 619a3c773b16f..12325afc48be7 100644 --- a/pkgs/tools/networking/smartdns/default.nix +++ b/pkgs/tools/networking/smartdns/default.nix @@ -2,13 +2,13 @@ stdenv.mkDerivation rec { pname = "smartdns"; - version = "45"; + version = "46"; src = fetchFromGitHub { owner = "pymumu"; repo = pname; rev = "Release${version}"; - hash = "sha256-aVGIgQkFz8A1UsHsgOSkEEE5vzp4cJEtcaKHv1EzErg="; + hash = "sha256-7JNP8vacYENBbbCxBtSpVu9j5vCBVBsQ/OeVPoRxlE4="; }; buildInputs = [ openssl ]; diff --git a/pkgs/tools/networking/snabb/default.nix b/pkgs/tools/networking/snabb/default.nix index 16c6a40bb347d..2cb9f3b62a929 100644 --- a/pkgs/tools/networking/snabb/default.nix +++ b/pkgs/tools/networking/snabb/default.nix @@ -5,13 +5,13 @@ stdenv.mkDerivation rec { pname = "snabb"; - version = "2023.10"; + version = "2024.06"; src = fetchFromGitHub { owner = "snabbco"; repo = "snabb"; rev = "v${version}"; - sha256 = "sha256-oCHPRqJ1zm2Ple3Ck9nMyRC7PgKaF1RuswzdGBVU2C8="; + sha256 = "sha256-iCW0oEbLLqRKaxqxhSDsmRnI5YTi4HYcg+IWRAbt9WI="; }; installPhase = '' diff --git a/pkgs/tools/networking/twa/default.nix b/pkgs/tools/networking/twa/default.nix index 1d860bc753648..909648f8d03c5 100644 --- a/pkgs/tools/networking/twa/default.nix +++ b/pkgs/tools/networking/twa/default.nix @@ -13,13 +13,13 @@ stdenv.mkDerivation rec { pname = "twa"; - version = "1.10.0"; + version = "1.11.0"; src = fetchFromGitHub { owner = "trailofbits"; repo = "twa"; rev = "v${version}"; - hash = "sha256-8c1o03iwStmhjKHmEXIZGyaSOAJRlOuhu0ERjCO5SHg="; + hash = "sha256-B+UwH7oCtediLzurjYuLp56IxiKNAqyoW5QkwXX72MA="; }; dontBuild = true; diff --git a/pkgs/tools/security/john/default.nix b/pkgs/tools/security/john/default.nix index b06e0f3ec64ff..aeefcaa0bbefd 100644 --- a/pkgs/tools/security/john/default.nix +++ b/pkgs/tools/security/john/default.nix @@ -1,5 +1,25 @@ -{ lib, stdenv, fetchFromGitHub, openssl, nss, nspr, libkrb5, gmp, zlib, libpcap, re2 -, gcc, python3Packages, perl, perlPackages, makeWrapper, }: +{ + lib, + stdenv, + fetchFromGitHub, + openssl, + nss, + nspr, + libkrb5, + gmp, + zlib, + libpcap, + re2, + gcc, + python3Packages, + perl, + perlPackages, + withOpenCL ? true, + opencl-headers, + ocl-icd, + substituteAll, + makeWrapper, +}: stdenv.mkDerivation rec { pname = "john"; @@ -12,6 +32,13 @@ stdenv.mkDerivation rec { hash = "sha256-zvoN+8Sx6qpVg2JeRLOIH1ehfl3tFTv7r5wQZ44Qsbc="; }; + patches = lib.optionals withOpenCL [ + (substituteAll { + src = ./opencl.patch; + ocl_icd = ocl-icd; + }) + ]; + postPatch = '' sed -ri -e ' s!^(#define\s+CFG_[A-Z]+_NAME\s+).*/!\1"'"$out"'/etc/john/! @@ -23,25 +50,61 @@ stdenv.mkDerivation rec { }' run/*.conf ''; - preConfigure = '' - cd src - # Makefile.in depends on AS and LD being set to CC, which is set by default in configure.ac. - # This ensures we override the environment variables set in cc-wrapper/setup-hook.sh - export AS=$CC - export LD=$CC - ''; + preConfigure = + '' + cd src + # Makefile.in depends on AS and LD being set to CC, which is set by default in configure.ac. + # This ensures we override the environment variables set in cc-wrapper/setup-hook.sh + export AS=$CC + export LD=$CC + '' + + lib.optionalString withOpenCL '' + python ./opencl_generate_dynamic_loader.py # Update opencl_dynamic_loader.c + ''; configureFlags = [ "--disable-native-tests" "--with-systemwide" ]; - buildInputs = [ openssl nss nspr libkrb5 gmp zlib libpcap re2 ]; - nativeBuildInputs = [ gcc python3Packages.wrapPython perl makeWrapper ]; - propagatedBuildInputs = (with python3Packages; [ dpkt scapy lxml ]) ++ # For pcap2john.py - (with perlPackages; [ DigestMD4 DigestSHA1 GetoptLong # For pass_gen.pl - CompressRawLzma # For 7z2john.pl - perlldap ]); # For sha-dump.pl - # TODO: Get dependencies for radius2john.pl and lion2john-alt.pl + buildInputs = + [ + openssl + nss + nspr + libkrb5 + gmp + zlib + libpcap + re2 + ] + ++ lib.optionals withOpenCL [ + opencl-headers + ocl-icd + ]; + nativeBuildInputs = [ + gcc + python3Packages.wrapPython + perl + makeWrapper + ]; + propagatedBuildInputs = + # For pcap2john.py + (with python3Packages; [ + dpkt + scapy + lxml + ]) + ++ (with perlPackages; [ + # For pass_gen.pl + DigestMD4 + DigestSHA1 + GetoptLong + # For 7z2john.pl + CompressRawLzma + # For sha-dump.pl + perlldap + ]); + # TODO: Get dependencies for radius2john.pl and lion2john-alt.pl # gcc -DAC_BUILT -Wall vncpcap2john.o memdbg.o -g -lpcap -fopenmp -o ../run/vncpcap2john # gcc: error: memdbg.o: No such file or directory @@ -70,7 +133,11 @@ stdenv.mkDerivation rec { description = "John the Ripper password cracker"; license = licenses.gpl2Plus; homepage = "https://github.com/openwall/john/"; - maintainers = with maintainers; [ offline matthewbauer cherrykitten ]; + maintainers = with maintainers; [ + offline + matthewbauer + cherrykitten + ]; platforms = platforms.unix; }; } diff --git a/pkgs/tools/security/john/opencl.patch b/pkgs/tools/security/john/opencl.patch new file mode 100644 index 0000000000000..575bfa82638ba --- /dev/null +++ b/pkgs/tools/security/john/opencl.patch @@ -0,0 +1,18 @@ +diff --git a/src/opencl_generate_dynamic_loader.py b/src/opencl_generate_dynamic_loader.py +index 790705330..2acedbc56 100755 +--- a/src/opencl_generate_dynamic_loader.py ++++ b/src/opencl_generate_dynamic_loader.py +@@ -134,12 +134,7 @@ static void load_opencl_dll(void) + + /* Names to try to load */ + const char * const opencl_names[] = { +- "libOpenCL.so", /* Linux/others, hack via "development" sub-package's symlink */ +- "OpenCL", /* _WIN */ +- "/System/Library/Frameworks/OpenCL.framework/OpenCL", /* __APPLE__ */ +- "opencl.dll", /* __CYGWIN__ */ +- "cygOpenCL-1.dll", /* __CYGWIN__ */ +- "libOpenCL.so.1" /* Linux/others, no "development" sub-package installed */ ++ "@ocl_icd@/lib/libOpenCL.so" /* NixOS */ + }; + + for (i = 0; i < sizeof(opencl_names)/sizeof(opencl_names[0]); i++) { diff --git a/pkgs/tools/security/metasploit/Gemfile b/pkgs/tools/security/metasploit/Gemfile index 55597617ab4d7..125546793296e 100644 --- a/pkgs/tools/security/metasploit/Gemfile +++ b/pkgs/tools/security/metasploit/Gemfile @@ -1,4 +1,4 @@ # frozen_string_literal: true source "https://rubygems.org" -gem "metasploit-framework", git: "https://github.com/rapid7/metasploit-framework", ref: "refs/tags/6.4.14" +gem "metasploit-framework", git: "https://github.com/rapid7/metasploit-framework", ref: "refs/tags/6.4.15" diff --git a/pkgs/tools/security/metasploit/Gemfile.lock b/pkgs/tools/security/metasploit/Gemfile.lock index 877afc8a4f9d0..f8839316b6a1c 100644 --- a/pkgs/tools/security/metasploit/Gemfile.lock +++ b/pkgs/tools/security/metasploit/Gemfile.lock @@ -1,9 +1,9 @@ GIT remote: https://github.com/rapid7/metasploit-framework - revision: 685168ecf3266361a8e7836b2a7889751b7d20b8 - ref: refs/tags/6.4.14 + revision: b4a408704631fd0a0a4587f1f1a0017bcec9fb45 + ref: refs/tags/6.4.15 specs: - metasploit-framework (6.4.14) + metasploit-framework (6.4.15) aarch64 abbrev actionpack (~> 7.0.0) @@ -44,7 +44,7 @@ GIT metasploit-model metasploit-payloads (= 2.0.166) metasploit_data_models - metasploit_payloads-mettle (= 1.0.26) + metasploit_payloads-mettle (= 1.0.28) mqtt msgpack (~> 1.6.0) mutex_m @@ -280,7 +280,7 @@ GEM railties (~> 7.0) recog webrick - metasploit_payloads-mettle (1.0.26) + metasploit_payloads-mettle (1.0.28) method_source (1.1.0) mini_portile2 (2.8.6) minitest (5.23.1) diff --git a/pkgs/tools/security/metasploit/default.nix b/pkgs/tools/security/metasploit/default.nix index e5844a655017f..6bd3bf152e58c 100644 --- a/pkgs/tools/security/metasploit/default.nix +++ b/pkgs/tools/security/metasploit/default.nix @@ -15,13 +15,13 @@ let }; in stdenv.mkDerivation rec { pname = "metasploit-framework"; - version = "6.4.14"; + version = "6.4.15"; src = fetchFromGitHub { owner = "rapid7"; repo = "metasploit-framework"; rev = "refs/tags/${version}"; - hash = "sha256-aUxHCeRBlE0CQuroxge9A/O1LA9DfQJwuwWZsPUKz1A="; + hash = "sha256-CJXti/pX2Q59fJgRbAodUDMlMHIJH0eh3kOZxrQEllY="; }; nativeBuildInputs = [ diff --git a/pkgs/tools/security/metasploit/gemset.nix b/pkgs/tools/security/metasploit/gemset.nix index ee76850346098..c1918985810b3 100644 --- a/pkgs/tools/security/metasploit/gemset.nix +++ b/pkgs/tools/security/metasploit/gemset.nix @@ -724,12 +724,12 @@ platforms = []; source = { fetchSubmodules = false; - rev = "685168ecf3266361a8e7836b2a7889751b7d20b8"; - sha256 = "0l6g1bsv1685pdq04za31wnbbwq3pl3wds7a8814v521wh4lfk39"; + rev = "b4a408704631fd0a0a4587f1f1a0017bcec9fb45"; + sha256 = "0mln0jscd6a3vshlf7q9f8q2acsh3l56q4cqgiyhxnapza5yv588"; type = "git"; url = "https://github.com/rapid7/metasploit-framework"; }; - version = "6.4.14"; + version = "6.4.15"; }; metasploit-model = { groups = ["default"]; @@ -766,10 +766,10 @@ platforms = []; source = { remotes = ["https://rubygems.org"]; - sha256 = "1qprmbmpw4c8396m0whbp08xzdbjc0s2zd0jkxqnh3aswmx8pj3m"; + sha256 = "0649y1zc2pncfalsa5nkszmbiz1gfg4q3bhh4p2q6vwaac5g6sfj"; type = "gem"; }; - version = "1.0.26"; + version = "1.0.28"; }; method_source = { groups = ["default"]; diff --git a/pkgs/tools/security/pinentry-rofi/default.nix b/pkgs/tools/security/pinentry-rofi/default.nix index 45c817c697956..6d623f5816581 100644 --- a/pkgs/tools/security/pinentry-rofi/default.nix +++ b/pkgs/tools/security/pinentry-rofi/default.nix @@ -11,13 +11,13 @@ stdenv.mkDerivation rec { pname = "pinentry-rofi"; - version = "2.1.0"; + version = "2.1.1"; src = fetchFromGitHub { owner = "plattfot"; repo = pname; rev = version; - sha256 = "sha256-J6aQTIFHlg21M9niBYdVih11heIPCLsGv0HOPaeguew="; + sha256 = "sha256-e7dpMivZrTHmRuAzBzDVRoUgvBt6NpZ43FRQtX2omHA="; }; nativeBuildInputs = [ diff --git a/pkgs/tools/text/kdiff3/default.nix b/pkgs/tools/text/kdiff3/default.nix index 456b2c568d820..f322a6f7d7c34 100644 --- a/pkgs/tools/text/kdiff3/default.nix +++ b/pkgs/tools/text/kdiff3/default.nix @@ -14,11 +14,11 @@ stdenv.mkDerivation (finalAttrs: { pname = "kdiff3"; - version = "1.11.1"; + version = "1.11.2"; src = fetchurl { url = "mirror://kde/stable/kdiff3/kdiff3-${finalAttrs.version}.tar.xz"; - hash = "sha256-MPFKWrbg1VEWgpF42CdlTDDoQhwE/pcA085npTCEYpg="; + hash = "sha256-kYU3dcP6qVIkaOwSPNbedGYqy21RFkdZlqyk3Cw778g="; }; nativeBuildInputs = [ extra-cmake-modules kdoctools wrapQtAppsHook ]; diff --git a/pkgs/tools/video/recyclarr/default.nix b/pkgs/tools/video/recyclarr/default.nix index 6db69039205cb..aef05e2a731fb 100644 --- a/pkgs/tools/video/recyclarr/default.nix +++ b/pkgs/tools/video/recyclarr/default.nix @@ -26,10 +26,10 @@ let or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); hash = { - x64-linux_hash = "sha256-Skf3wY52B6KnWS8YurAL0b5Sdkvp4YYn3IvHrAKyvK8="; - arm64-linux_hash = "sha256-66OCz13eLyAfEC3kYUniqq+QhsHoZNBJieXmmsLG5eM="; - x64-osx_hash = "sha256-6cNpfcjwgfxZRlBnZQrZLMPaXDHEXSbS3Z/qcx1Z3HA="; - arm64-osx_hash = "sha256-OkM+LgqXOHzyzEWH6D3czH86Sncym9FpfTFaacp2aN0="; + x64-linux_hash = "sha256-LMAY1UIwvB+ne4rpwLKaYO6QGTwdiS3YBndr73zIzvQ="; + arm64-linux_hash = "sha256-by3PSYdN7TPjA0Cx4pfzIbpZ/YVU1agfcuvuZh6mbfU="; + x64-osx_hash = "sha256-/YqdlVktgbBUNdm+mAD053pf6wCMXYt6gQP+iTQdKqw="; + arm64-osx_hash = "sha256-2RRQGNTztK14KDFRqgpagNCWTizHVNY67psaxFfyDZ4="; }."${arch}-${os}_hash"; libPath = { @@ -40,7 +40,7 @@ let in stdenv.mkDerivation rec { pname = "recyclarr"; - version = "6.0.2"; + version = "7.0.0"; src = fetchurl { url = "https://github.com/recyclarr/recyclarr/releases/download/v${version}/recyclarr-${os}-${arch}.tar.xz"; diff --git a/pkgs/tools/virtualization/jumppad/default.nix b/pkgs/tools/virtualization/jumppad/default.nix index 5133d4477fab1..97b3477c42423 100644 --- a/pkgs/tools/virtualization/jumppad/default.nix +++ b/pkgs/tools/virtualization/jumppad/default.nix @@ -2,15 +2,15 @@ buildGoModule rec { pname = "jumppad"; - version = "0.11.2"; + version = "0.12.0"; src = fetchFromGitHub { owner = "jumppad-labs"; repo = "jumppad"; rev = version; - hash = "sha256-ovPXjSHTCv7ke8k0iOqB4jB4R3cRMJ5cFkpptPrAr+g="; + hash = "sha256-eO/BZ59MZI1zaRCkbhBks55Jbf1i0M4XFHjAV03xp9k="; }; - vendorHash = "sha256-39CORZ5qqbMJuTzYt1sKbHPPYkQEwQWSIQ4hWqdUFmk="; + vendorHash = "sha256-FPM0q1ZVDfo00Z6QEXqtqfx77qkq5HhB+3vF9z9zrM0="; subPackages = [ "." ]; |