cargo-deb 2.0.6 -> 2.1.0 https://repology.org/project/cargo-deb/versions attrpath: cargo-deb Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] Replacing cargoHash with sha256-apT60W4lUCMsRvuzGkY8AkA8m8e7ESGGnmOpyv5Ca1I= [rustCrateVersion] Finished updating Crate version and replacing hashes [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/tools/rust/cargo-deb/default.nix b/pkgs/development/tools/rust/cargo-deb/default.nix index c8f16bdf5140..0d3af8268ece 100644 --- a/pkgs/development/tools/rust/cargo-deb/default.nix +++ b/pkgs/development/tools/rust/cargo-deb/default.nix @@ -7,16 +7,16 @@ rustPlatform.buildRustPackage rec { pname = "cargo-deb"; - version = "2.0.6"; + version = "2.1.0"; src = fetchFromGitHub { owner = "kornelski"; repo = pname; rev = "v${version}"; - hash = "sha256-EYb1cJ+t5pI7KfL2SK8w2oeKbbdbOpUarNHFxpW79fQ="; + hash = "sha256-LCyTbOSSz3O53hZmOPcK+tB5LNZLE4uwfOZrwJZuebc="; }; - cargoHash = "sha256-eLLi79XP/G6L0+2WlVTs6xpmkXOSO+4VOt6Srw5hnvw="; + cargoHash = "sha256-apT60W4lUCMsRvuzGkY8AkA8m8e7ESGGnmOpyv5Ca1I="; nativeBuildInputs = [ makeWrapper Successfully finished processing cachix "/nix/store/3ygwlp08zxdskhb3vg7789cq6s896y07-cargo-deb-2.1.0" Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 3 [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/cargo-deb/versions. meta.description for cargo-deb is: A cargo subcommand that generates Debian packages from information in Cargo.toml meta.homepage for cargo-deb is: https://github.com/kornelski/cargo-deb ###### Updates performed - Rust version update ###### To inspect upstream changes - [Compare changes on GitHub](https://github.com/kornelski/cargo-deb/compare/v2.0.6...v2.1.0) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 2.1.0 with grep in /nix/store/3ygwlp08zxdskhb3vg7789cq6s896y07-cargo-deb-2.1.0 - found 2.1.0 in filename of file in /nix/store/3ygwlp08zxdskhb3vg7789cq6s896y07-cargo-deb-2.1.0 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath cargo-deb ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/3ygwlp08zxdskhb3vg7789cq6s896y07-cargo-deb-2.1.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A cargo-deb https://github.com/r-ryantm/nixpkgs/archive/b3e95cbc3ad8012309c1d9ffda0be2004f4245d6.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/b3e95cbc3ad8012309c1d9ffda0be2004f4245d6#cargo-deb ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/3ygwlp08zxdskhb3vg7789cq6s896y07-cargo-deb-2.1.0 ls -la /nix/store/3ygwlp08zxdskhb3vg7789cq6s896y07-cargo-deb-2.1.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @Br1ght0ne @matthiasbeyer for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/294167