diff --git a/maintainers/maintainer-list.nix b/maintainers/maintainer-list.nix
index d51c11e14914..c35d0df8f056 100644
--- a/maintainers/maintainer-list.nix
+++ b/maintainers/maintainer-list.nix
@@ -6440,13 +6440,6 @@
githubId = 3267697;
name = "Joshua Potter";
};
- jschievink = {
- email = "jonasschievink@gmail.com";
- matrix = "@jschievink:matrix.org";
- github = "jonas-schievink";
- githubId = 1786438;
- name = "Jonas Schievink";
- };
jshcmpbll = {
email = "me@joshuadcampbell.com";
github = "jshcmpbll";
diff --git a/nixos/doc/manual/from_md/release-notes/rl-2211.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2211.section.xml
index 5d09d3a93aae..aaa85138dfa1 100644
--- a/nixos/doc/manual/from_md/release-notes/rl-2211.section.xml
+++ b/nixos/doc/manual/from_md/release-notes/rl-2211.section.xml
@@ -392,6 +392,18 @@
as coreboot’s fork is no longer available.
+
+
+ The udisks2 service, available at
+ services.udisks2.enable, is now disabled by
+ default. It will automatically be enabled through services and
+ desktop environments as needed. This also means that polkit
+ will now actually be disabled by default. The default for
+ security.polkit.enable was already flipped
+ in the previous release, but udisks2 being enabled by default
+ re-enabled it.
+
+
Add udev rules for the Teensy family of microcontrollers.
diff --git a/nixos/doc/manual/release-notes/rl-2211.section.md b/nixos/doc/manual/release-notes/rl-2211.section.md
index f37d7d827bd9..e1253d46190f 100644
--- a/nixos/doc/manual/release-notes/rl-2211.section.md
+++ b/nixos/doc/manual/release-notes/rl-2211.section.md
@@ -145,6 +145,9 @@ Use `configure.packages` instead.
- memtest86+ was updated from 5.00-coreboot-002 to 6.00-beta2. It is now the upstream version from https://www.memtest.org/, as coreboot's fork is no longer available.
+- The udisks2 service, available at `services.udisks2.enable`, is now disabled by default. It will automatically be enabled through services and desktop environments as needed.
+ This also means that polkit will now actually be disabled by default. The default for `security.polkit.enable` was already flipped in the previous release, but udisks2 being enabled by default re-enabled it.
+
- Add udev rules for the Teensy family of microcontrollers.
- The `pass-secret-service` package now includes systemd units from upstream, so adding it to the NixOS `services.dbus.packages` option will make it start automatically as a systemd user service when an application tries to talk to the libsecret D-Bus API.
diff --git a/nixos/modules/services/desktops/gvfs.nix b/nixos/modules/services/desktops/gvfs.nix
index 4aa6412aaa5f..84cd29638723 100644
--- a/nixos/modules/services/desktops/gvfs.nix
+++ b/nixos/modules/services/desktops/gvfs.nix
@@ -56,6 +56,8 @@ in
services.udev.packages = [ pkgs.libmtp.out ];
+ services.udisks2.enable = true;
+
# Needed for unwrapped applications
environment.sessionVariables.GIO_EXTRA_MODULES = [ "${cfg.package}/lib/gio/modules" ];
diff --git a/nixos/modules/services/hardware/udisks2.nix b/nixos/modules/services/hardware/udisks2.nix
index f9b5afceac32..988e975d7e66 100644
--- a/nixos/modules/services/hardware/udisks2.nix
+++ b/nixos/modules/services/hardware/udisks2.nix
@@ -19,14 +19,7 @@ in
services.udisks2 = {
- enable = mkOption {
- type = types.bool;
- default = true;
- description = lib.mdDoc ''
- Whether to enable Udisks, a DBus service that allows
- applications to query and manipulate storage devices.
- '';
- };
+ enable = mkEnableOption "udisks2, a DBus service that allows applications to query and manipulate storage devices.";
settings = mkOption rec {
type = types.attrsOf settingsFormat.type;
diff --git a/nixos/modules/services/networking/ssh/sshd.nix b/nixos/modules/services/networking/ssh/sshd.nix
index 6da83eb7de10..00ec15c54bc1 100644
--- a/nixos/modules/services/networking/ssh/sshd.nix
+++ b/nixos/modules/services/networking/ssh/sshd.nix
@@ -435,13 +435,12 @@ in
# socket activation, it goes to the remote side (#19589).
exec >&2
- mkdir -m 0755 -p /etc/ssh
-
${flip concatMapStrings cfg.hostKeys (k: ''
if ! [ -s "${k.path}" ]; then
if ! [ -h "${k.path}" ]; then
rm -f "${k.path}"
fi
+ mkdir -m 0755 -p "$(dirname '${k.path}')"
ssh-keygen \
-t "${k.type}" \
${if k ? bits then "-b ${toString k.bits}" else ""} \
diff --git a/nixos/modules/virtualisation/container-config.nix b/nixos/modules/virtualisation/container-config.nix
index 0966ef84827f..94f28ea80d09 100644
--- a/nixos/modules/virtualisation/container-config.nix
+++ b/nixos/modules/virtualisation/container-config.nix
@@ -8,7 +8,6 @@ with lib;
# Disable some features that are not useful in a container.
nix.optimise.automatic = mkDefault false; # the store is host managed
- services.udisks2.enable = mkDefault false;
powerManagement.enable = mkDefault false;
documentation.nixos.enable = mkDefault false;
diff --git a/pkgs/applications/graphics/freecad/default.nix b/pkgs/applications/graphics/freecad/default.nix
index 6c3f6fac3039..17537083aaed 100644
--- a/pkgs/applications/graphics/freecad/default.nix
+++ b/pkgs/applications/graphics/freecad/default.nix
@@ -49,13 +49,13 @@
mkDerivation rec {
pname = "freecad";
- version = "0.20";
+ version = "0.20.1";
src = fetchFromGitHub {
owner = "FreeCAD";
repo = "FreeCAD";
rev = version;
- hash = "sha256-Em4XVxDfvVG1Kf7q+6uHNA/VcMGLKMTv5TCh2XF/BtQ=";
+ hash = "sha256-r2lhFv4ReASteoVxwwiW9TdSckpaju6QE8UegxeY4rE=";
};
nativeBuildInputs = [
diff --git a/pkgs/applications/graphics/inkscape/default.nix b/pkgs/applications/graphics/inkscape/default.nix
index 88f62793483a..83fd78c63134 100644
--- a/pkgs/applications/graphics/inkscape/default.nix
+++ b/pkgs/applications/graphics/inkscape/default.nix
@@ -48,6 +48,7 @@ let
cachecontrol
numpy
lxml
+ packaging
pillow
scour
pyserial
diff --git a/pkgs/applications/networking/cluster/openshift/default.nix b/pkgs/applications/networking/cluster/openshift/default.nix
index 89bbd0cb7d6d..9933e8056670 100644
--- a/pkgs/applications/networking/cluster/openshift/default.nix
+++ b/pkgs/applications/networking/cluster/openshift/default.nix
@@ -10,14 +10,14 @@
buildGoModule rec {
pname = "openshift";
- version = "4.10.0";
- gitCommit = "346b183";
+ version = "4.11.0";
+ gitCommit = "20dd77d5";
src = fetchFromGitHub {
owner = "openshift";
repo = "oc";
- rev = "release-4.10";
- sha256 = "Pdq3OwT5P7vvB70X+GVglT9CdJbhkm35nvEGurO1HPc=";
+ rev = "20dd77d5c889f86b05e2bdd182853ae702852c63";
+ sha256 = "wqLo/CKGzeMDJUoI9PUEjJER5hSPu+FmUCJLPZ9PJuw=";
};
vendorSha256 = null;
diff --git a/pkgs/development/libraries/intel-media-sdk/default.nix b/pkgs/development/libraries/intel-media-sdk/default.nix
index 31f25ec10d77..a8591f40ee98 100644
--- a/pkgs/development/libraries/intel-media-sdk/default.nix
+++ b/pkgs/development/libraries/intel-media-sdk/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "intel-media-sdk";
- version = "22.3.0";
+ version = "22.5.1";
src = fetchFromGitHub {
owner = "Intel-Media-SDK";
repo = "MediaSDK";
rev = "intel-mediasdk-${version}";
- sha256 = "sha256-6/MOjISfLsrsocdeFC148hRwl2os5dvJV1eYq/jIMr4=";
+ sha256 = "sha256-HTCqJG//byTTlTRdE8IyFGuUaLiNVDfl9swbH6d5gCk=";
};
nativeBuildInputs = [ cmake pkg-config ];
diff --git a/pkgs/development/libraries/pc-ble-driver/default.nix b/pkgs/development/libraries/pc-ble-driver/default.nix
index b06a771e1999..ae139639c732 100644
--- a/pkgs/development/libraries/pc-ble-driver/default.nix
+++ b/pkgs/development/libraries/pc-ble-driver/default.nix
@@ -43,6 +43,5 @@ stdenv.mkDerivation rec {
homepage = "https://github.com/NordicSemiconductor/pc-ble-driver";
license = licenses.unfreeRedistributable;
platforms = platforms.unix;
- maintainers = with maintainers; [ jschievink ];
};
}
diff --git a/pkgs/development/python-modules/levenshtein/default.nix b/pkgs/development/python-modules/levenshtein/default.nix
index a51d65cedc8d..24c4f11b6759 100644
--- a/pkgs/development/python-modules/levenshtein/default.nix
+++ b/pkgs/development/python-modules/levenshtein/default.nix
@@ -12,7 +12,7 @@
buildPythonPackage rec {
pname = "levenshtein";
- version = "0.19.3";
+ version = "0.20.2";
format = "pyproject";
disabled = pythonOlder "3.6";
@@ -21,7 +21,7 @@ buildPythonPackage rec {
owner = "maxbachmann";
repo = "Levenshtein";
rev = "refs/tags/v${version}";
- hash = "sha256-4Oc1n/ZgLdq57ZeyZHzTQOjar9Ligeb4yqKeT0s5dHY=";
+ hash = "sha256-zVYfErh9tts3yPgXqqeX6xp8o+gLd7nN64+Ml6YZfjE=";
};
nativeBuildInputs = [
@@ -51,6 +51,7 @@ buildPythonPackage rec {
meta = with lib; {
description = "Functions for fast computation of Levenshtein distance and string similarity";
homepage = "https://github.com/maxbachmann/Levenshtein";
+ changelog = "https://github.com/maxbachmann/Levenshtein/blob/${src.rev}/HISTORY.md";
license = licenses.gpl2Plus;
maintainers = with maintainers; [ fab ];
};
diff --git a/pkgs/development/python-modules/mlflow/default.nix b/pkgs/development/python-modules/mlflow/default.nix
index 9016272384ad..48b70d35a896 100644
--- a/pkgs/development/python-modules/mlflow/default.nix
+++ b/pkgs/development/python-modules/mlflow/default.nix
@@ -32,14 +32,14 @@
buildPythonPackage rec {
pname = "mlflow";
- version = "1.27.0";
+ version = "1.28.0";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
- hash = "sha256-ah401r4mZyXkHUVHVyqEJdhtZiPhyIiM8/IrkAGb4Ko=";
+ hash = "sha256-aXZp4eQuiHwzBQKuTw7WROgUvgas2pDOpEU57M4zSmQ=";
};
propagatedBuildInputs = [
diff --git a/pkgs/development/python-modules/pytorch-metric-learning/default.nix b/pkgs/development/python-modules/pytorch-metric-learning/default.nix
index 24be3f3eb4fb..1c6b2d61ecb6 100644
--- a/pkgs/development/python-modules/pytorch-metric-learning/default.nix
+++ b/pkgs/development/python-modules/pytorch-metric-learning/default.nix
@@ -8,11 +8,12 @@
, pytorch
, torchvision
, tqdm
+, faiss
}:
buildPythonPackage rec {
pname = "pytorch-metric-learning";
- version = "1.5.0";
+ version = "1.5.1";
disabled = isPy27;
@@ -20,7 +21,7 @@ buildPythonPackage rec {
owner = "KevinMusgrave";
repo = pname;
rev = "refs/tags/v${version}";
- sha256 = "sha256-ge6y5n1N/+nymgD4La3ger7N4vvcoo1Bxa+etirNFNI=";
+ sha256 = "sha256-d7Ngd4SzGTJXtpgs2Jqb+y1aeMt9YUqIOft5ByDtRsc=";
};
propagatedBuildInputs = [
@@ -36,14 +37,18 @@ buildPythonPackage rec {
export TEST_DEVICE=cpu
export TEST_DTYPES=float32,float64 # half-precision tests fail on CPU
'';
+
# package only requires `unittest`, but use `pytest` to exclude tests
- checkInputs = [ pytestCheckHook ];
+ checkInputs = [
+ faiss
+ pytestCheckHook
+ ];
+
disabledTests = [
- # requires FAISS (not in Nixpkgs)
- "test_accuracy_calculator_and_faiss"
- "test_global_embedding_space_tester"
- "test_with_same_parent_label_tester"
+ # TypeError: setup() missing 1 required positional argument: 'world_size'
+ "TestDistributedLossWrapper"
# require network access:
+ "TestInference"
"test_get_nearest_neighbors"
"test_tuplestoweights_sampler"
"test_untrained_indexer"
@@ -59,6 +64,5 @@ buildPythonPackage rec {
changelog = "https://github.com/KevinMusgrave/pytorch-metric-learning/releases/tag/v${version}";
license = lib.licenses.mit;
maintainers = with lib.maintainers; [ bcdarwin ];
- broken = true; # requires faiss which is unpackaged
};
}
diff --git a/pkgs/development/python-modules/rapidfuzz/default.nix b/pkgs/development/python-modules/rapidfuzz/default.nix
index 1475b42ec939..e981ea48524c 100644
--- a/pkgs/development/python-modules/rapidfuzz/default.nix
+++ b/pkgs/development/python-modules/rapidfuzz/default.nix
@@ -20,7 +20,7 @@
buildPythonPackage rec {
pname = "rapidfuzz";
- version = "2.4.2";
+ version = "2.4.3";
disabled = pythonOlder "3.6";
@@ -30,7 +30,7 @@ buildPythonPackage rec {
owner = "maxbachmann";
repo = "RapidFuzz";
rev = "refs/tags/v${version}";
- hash = "sha256-nLYxPGK+7ThvpsmvF2zlo+DqykY8bW1j2si3Lnyq7oo=";
+ hash = "sha256-KKRqSMU1AzXYDB50CBQ1ZcL87KgG2/tL+cmR1jnrTVk=";
};
nativeBuildInputs = [
diff --git a/pkgs/development/python-modules/streamz/default.nix b/pkgs/development/python-modules/streamz/default.nix
index 0b2fb134a921..a4fe702c8c5d 100644
--- a/pkgs/development/python-modules/streamz/default.nix
+++ b/pkgs/development/python-modules/streamz/default.nix
@@ -20,28 +20,16 @@
buildPythonPackage rec {
pname = "streamz";
- version = "0.6.3";
+ version = "0.6.4";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
- hash = "sha256-0wZ1ldLFRAIL9R+gLfwsFbL+gvdORAkYWNjnDmeafm8=";
+ hash = "sha256-VXfWkEwuxInBQVQJV3IQXgGVRkiBmYfUZCBMbjyWNPM=";
};
- patches = [
- # remove with next bump
- (fetchpatch {
- name = "fix-tests-against-distributed-2021.10.0.patch";
- url = "https://github.com/python-streamz/streamz/commit/5bd3bc4d305ff40c740bc2550c8491be9162778a.patch";
- sha256 = "1xzxcbf7yninkyizrwm3ahqk6ij2fmh0454iqjx2n7mmzx3sazx7";
- includes = [
- "streamz/tests/test_dask.py"
- ];
- })
- ];
-
propagatedBuildInputs = [
networkx
six
@@ -65,6 +53,12 @@ buildPythonPackage rec {
];
disabledTests = [
+ # Error with distutils version: fixture 'cleanup' not found
+ "test_separate_thread_without_time"
+ "test_await_syntax"
+ "test_partition_then_scatter_sync"
+ "test_sync"
+ "test_sync_2"
# Test fail in the sandbox
"test_tcp_async"
"test_tcp"
diff --git a/pkgs/development/python-modules/xml2rfc/default.nix b/pkgs/development/python-modules/xml2rfc/default.nix
index 61e6d877eb6a..06c494d76d45 100644
--- a/pkgs/development/python-modules/xml2rfc/default.nix
+++ b/pkgs/development/python-modules/xml2rfc/default.nix
@@ -26,7 +26,7 @@
buildPythonPackage rec {
pname = "xml2rfc";
- version = "3.13.1";
+ version = "3.14.0";
disabled = pythonOlder "3.6";
@@ -34,7 +34,7 @@ buildPythonPackage rec {
owner = "ietf-tools";
repo = "xml2rfc";
rev = "refs/tags/v${version}";
- sha256 = "sha256-DRHhcMPLBr1SM6e3BCB8gfvadd8CeMIOsPT+uzcET+4=";
+ sha256 = "sha256-BuOHQ6LnfjdlE9+wdJbl6wdD/oddKIklabVBx1IJJBA=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/xsdata/default.nix b/pkgs/development/python-modules/xsdata/default.nix
index 280cead6d2ee..fbc621a59692 100644
--- a/pkgs/development/python-modules/xsdata/default.nix
+++ b/pkgs/development/python-modules/xsdata/default.nix
@@ -14,7 +14,7 @@
buildPythonPackage rec {
pname = "xsdata";
- version = "22.5";
+ version = "22.7";
disabled = pythonOlder "3.6";
@@ -22,7 +22,7 @@ buildPythonPackage rec {
src = fetchPypi {
inherit pname version;
- sha256 = "701dcda5a4a07df3a642f8fb6f73f0e2e18224d359bcb7f4212b3c29d7af72c2";
+ sha256 = "sha256-2EpbTNYdjcHOQQqe+bEpMzGxD2Jh34P+eI+uK4SJPdo=";
};
postPatch = ''
diff --git a/pkgs/development/tools/continuous-integration/jenkins/default.nix b/pkgs/development/tools/continuous-integration/jenkins/default.nix
index 0bd1d5484388..9a7dd92a5bb8 100644
--- a/pkgs/development/tools/continuous-integration/jenkins/default.nix
+++ b/pkgs/development/tools/continuous-integration/jenkins/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "jenkins";
- version = "2.346.2";
+ version = "2.346.3";
src = fetchurl {
url = "https://get.jenkins.io/war-stable/${version}/jenkins.war";
- sha256 = "0ymp4zy73rxakk7i1pxai1i0hxp65ilzi57dan3mqspaprfllk7g";
+ sha256 = "12bxni81qldm7f3sbr2rhx6wghbkabhy634pgbrmq6m3j1c8q7hl";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/pkgs/development/tools/misc/texlab/default.nix b/pkgs/development/tools/misc/texlab/default.nix
index 229c2b68f62b..4371efca4f0a 100644
--- a/pkgs/development/tools/misc/texlab/default.nix
+++ b/pkgs/development/tools/misc/texlab/default.nix
@@ -2,6 +2,7 @@
, stdenv
, rustPlatform
, fetchFromGitHub
+, help2man
, installShellFiles
, libiconv
, Security
@@ -9,34 +10,47 @@
, nix-update-script
}:
-rustPlatform.buildRustPackage rec {
+let
+ isCross = stdenv.hostPlatform != stdenv.buildPlatform;
+in rustPlatform.buildRustPackage rec {
pname = "texlab";
- version = "4.2.0";
+ version = "4.2.1";
src = fetchFromGitHub {
owner = "latex-lsp";
repo = pname;
- rev = "v${version}";
- sha256 = "sha256-oYM+OAYjQ8aNAryg0Cthj14BsxMFnOtz38XdUQZZolk=";
+ rev = "refs/tags/v${version}";
+ sha256 = "sha256-za3TauhNoxGDphpY615EnTt46HpMgS+sYpBln/twefw=";
};
- cargoSha256 = "sha256-TDGiqC9eNIJfLTc1R3nvE84rAsVE8jtTaeQbVNMeVgg=";
+ cargoSha256 = "sha256-wppaa3IGOqkFu/1CAp8g+PlPtMWm/7qNpPu0k4/mL3A=";
- outputs = [ "out" "man" ];
+ outputs = [ "out" ] ++ lib.optional (!isCross) "man";
- nativeBuildInputs = [ installShellFiles ];
+ nativeBuildInputs = [ installShellFiles ]
+ ++ lib.optional (!isCross) help2man;
- buildInputs = lib.optionals stdenv.isDarwin [ libiconv Security CoreServices ];
+ buildInputs = lib.optionals stdenv.isDarwin [
+ libiconv
+ Security
+ CoreServices
+ ];
postInstall = ''
- installManPage texlab.1
-
# Remove generated dylib of human_name dependency. TexLab statically
# links to the generated rlib and doesn't reference the dylib. I
# couldn't find any way to prevent building this by passing cargo flags.
# See https://github.com/djudd/human-name/blob/master/Cargo.toml#L43
rm "$out/lib/libhuman_name${stdenv.hostPlatform.extensions.sharedLibrary}"
rmdir "$out/lib"
+ ''
+ # When we cross compile we cannot run the output executable to
+ # generate the man page
+ + lib.optionalString (!isCross) ''
+ # TexLab builds man page separately in CI:
+ # https://github.com/latex-lsp/texlab/blob/v4.2.1/.github/workflows/publish.yml#L131-L135
+ help2man --no-info "$out/bin/texlab" > texlab.1
+ installManPage texlab.1
'';
passthru.updateScript = nix-update-script {
diff --git a/pkgs/development/tools/rust/cargo-pgx/default.nix b/pkgs/development/tools/rust/cargo-pgx/default.nix
new file mode 100644
index 000000000000..4ad70bfa9ed4
--- /dev/null
+++ b/pkgs/development/tools/rust/cargo-pgx/default.nix
@@ -0,0 +1,25 @@
+{ lib, stdenv, fetchCrate, rustPlatform, pkg-config, openssl, Security }:
+
+rustPlatform.buildRustPackage rec {
+ pname = "cargo-pgx";
+ version = "0.4.5";
+
+ src = fetchCrate {
+ inherit version pname;
+ sha256 = "sha256-BcMGa/1ATwLG8VnwItfd5eqmrck/u0MEoR5sA2yuzyQ=";
+ };
+
+ cargoSha256 = "sha256-urlwqBCZMxlPEjLLPBhI2lDNTusCSZ1bZu1p8poVrtw=";
+
+ nativeBuildInputs = [ pkg-config ];
+
+ buildInputs = [ openssl ]
+ ++ lib.optionals stdenv.isDarwin [ Security ];
+
+ meta = with lib; {
+ description = "Cargo subcommand for ‘pgx’ to make Postgres extension development easy";
+ homepage = "https://github.com/tcdi/pgx/tree/v${version}/cargo-pgx";
+ license = licenses.mit;
+ maintainers = with maintainers; [ typetetris ];
+ };
+}
diff --git a/pkgs/servers/monitoring/grafana/default.nix b/pkgs/servers/monitoring/grafana/default.nix
index 8218735a94c9..c25c34c125a9 100644
--- a/pkgs/servers/monitoring/grafana/default.nix
+++ b/pkgs/servers/monitoring/grafana/default.nix
@@ -2,7 +2,7 @@
buildGoModule rec {
pname = "grafana";
- version = "9.0.6";
+ version = "9.0.7";
excludedPackages = [ "alert_webhook_listener" "clean-swagger" "release_publisher" "slow_proxy" "slow_proxy_mac" "macaron" "devenv" ];
@@ -10,12 +10,12 @@ buildGoModule rec {
rev = "v${version}";
owner = "grafana";
repo = "grafana";
- sha256 = "sha256-at9JvFLP2xGIFQODHw8zi3kEqIKJ8SBwBbcjVLVeYRc=";
+ sha256 = "sha256-rmcoyYBTT1po0TphmoGSoiS13W98LvjBhizKkhZVMzE=";
};
srcStatic = fetchurl {
url = "https://dl.grafana.com/oss/release/grafana-${version}.linux-amd64.tar.gz";
- sha256 = "sha256-92gWk5G6zLmesS0r5QRePdsVYJ9CFS/i0rsT8HOK1Js=";
+ sha256 = "sha256-9mXmot/UjMNrfDQ1MXSQvjn6cBBNQ4gP7bJvpBqBIKc=";
};
vendorSha256 = "sha256-6Z1qvn5HTybKAjsst8kSGYCbEIBsPyhNswVGGiMD9B8=";
diff --git a/pkgs/tools/networking/ooniprobe-cli/default.nix b/pkgs/tools/networking/ooniprobe-cli/default.nix
index 8ae015102bb3..ea7a14563257 100644
--- a/pkgs/tools/networking/ooniprobe-cli/default.nix
+++ b/pkgs/tools/networking/ooniprobe-cli/default.nix
@@ -5,16 +5,16 @@
buildGoModule rec {
pname = "ooniprobe-cli";
- version = "3.15.1";
+ version = "3.15.3";
src = fetchFromGitHub {
owner = "ooni";
repo = "probe-cli";
rev = "v${version}";
- hash = "sha256-s1q9QgdbLmMaEV2ovGRKWHRhUFvbTHhFvo7ALdhUG4Y=";
+ hash = "sha256-21D/1ImKOr9+GeSrIRCUGCcALU0WPohrnz1qqUXLy1A=";
};
- vendorSha256 = "sha256-h06WoKykuVzNgco74YbpSP+1nu/bOEf2mT4rUEX8MxU=";
+ vendorSha256 = "sha256-tZHBcVTCll3dSfQnQDfo9z3ALAykRmFvH7vjLLtQHDc=";
subPackages = [ "cmd/ooniprobe" ];
diff --git a/pkgs/tools/security/spire/default.nix b/pkgs/tools/security/spire/default.nix
index 0ddd6d4db722..aa121e72ea97 100644
--- a/pkgs/tools/security/spire/default.nix
+++ b/pkgs/tools/security/spire/default.nix
@@ -2,7 +2,7 @@
buildGoModule rec {
pname = "spire";
- version = "1.3.3";
+ version = "1.4.0";
outputs = [ "out" "agent" "server" ];
@@ -10,10 +10,10 @@ buildGoModule rec {
owner = "spiffe";
repo = pname;
rev = "v${version}";
- sha256 = "sha256-hkmmNY0L7yMH1DoPKHUq6F2lWpKnGj6Ftni8E+jIfH4=";
+ sha256 = "sha256-wyKluqYKNmaJaXK70v7/f2WEGgekd0Qgdu3UZnXm/UU=";
};
- vendorSha256 = "sha256-sjR8HCEBWj4BAIMeYkQZqzuOVL3PDG7ELpRo8K5wn1A=";
+ vendorSha256 = "sha256-EZWoMSBxdvnrdBmSrRYf4+2d1LCka7oUIhRAW+2n7CU=";
subPackages = [ "cmd/spire-agent" "cmd/spire-server" ];
diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix
index e3ae2233345f..63fee4f653ca 100644
--- a/pkgs/top-level/all-packages.nix
+++ b/pkgs/top-level/all-packages.nix
@@ -14219,6 +14219,9 @@ with pkgs;
cargo-outdated = callPackage ../development/tools/rust/cargo-outdated {
inherit (darwin.apple_sdk.frameworks) Security SystemConfiguration;
};
+ cargo-pgx = callPackage ../development/tools/rust/cargo-pgx {
+ inherit (darwin.apple_sdk.frameworks) Security;
+ };
cargo-release = callPackage ../development/tools/rust/cargo-release {
inherit (darwin.apple_sdk.frameworks) Security;
};