linuxKernel.packages.linux_4_19_hardened.chipsec 1.10.6 -> 1.12.9 https://github.com/chipsec/chipsec/releases attrpath: linuxKernel.packages.linux_4_19_hardened.chipsec Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/snl7nh7xc66d2s2i3s82ab3gkzc68lvx-packages.json.drv building '/nix/store/snl7nh7xc66d2s2i3s82ab3gkzc68lvx-packages.json.drv'... Going to be running update for following packages: - chipsec-1.10.6 Press Enter key to continue... Running update for: - chipsec-1.10.6: UPDATING ... - chipsec-1.10.6: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/tools/security/chipsec/default.nix b/pkgs/tools/security/chipsec/default.nix index 8842cbab248c..3e01abc28fa8 100644 --- a/pkgs/tools/security/chipsec/default.nix +++ b/pkgs/tools/security/chipsec/default.nix @@ -10,15 +10,15 @@ python3.pkgs.buildPythonApplication rec { pname = "chipsec"; - version = "1.10.6"; + version = "1.12.9"; disabled = !stdenv.isLinux; src = fetchFromGitHub { owner = "chipsec"; repo = "chipsec"; - rev = version; - hash = "sha256-+pbFG1SmSO/cnt1e+kel7ereC0I1OCJKKsS0KaJDWdc="; + rev = "refs/tags/${version}"; + hash = "sha256-54ogUmI1DZH0doQo8Lj73Hw06d7vMsBs5Hmjp1MZ500="; }; patches = lib.optionals withDriver [ ./ko-path.diff ./compile-ko.diff ]; No auto update branch exists Received ExitFailure 1 when running Raw command: /nix/store/6r0bm8shswm9v08kzvq24ib48mx3kxmn-nix-2.18.1/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A linuxKernel.packages.linux_4_19_hardened.chipsec Received ExitFailure 1 when running Raw command: /nix/store/6r0bm8shswm9v08kzvq24ib48mx3kxmn-nix-2.18.1/bin/nix --extra-experimental-features nix-command log -f . linuxKernel.packages.linux_4_19_hardened.chipsec Standard output: error: … while evaluating the attribute 'drvPath' at /var/cache/nixpkgs-update/worker/worktree/linuxKernel.packages.linux_4_19_hardened.chipsec/lib/customisation.nix:268:7: 267| in commonAttrs // { 268| drvPath = assert condition; drv.drvPath; | ^ 269| outPath = assert condition; drv.outPath; … in the condition of the assert statement at /var/cache/nixpkgs-update/worker/worktree/linuxKernel.packages.linux_4_19_hardened.chipsec/lib/customisation.nix:268:17: 267| in commonAttrs // { 268| drvPath = assert condition; drv.drvPath; | ^ 269| outPath = assert condition; drv.outPath; (stack trace truncated; use '--show-trace' to show the full trace) error: Package ‘chipsec-1.12.9’ in /var/cache/nixpkgs-update/worker/worktree/linuxKernel.packages.linux_4_19_hardened.chipsec/pkgs/tools/security/chipsec/default.nix:65 is marked as broken, refusing to evaluate. a) To temporarily allow broken packages, you can use an environment variable for a single invocation of the nix tools. $ export NIXPKGS_ALLOW_BROKEN=1 Note: When using `nix shell`, `nix build`, `nix develop`, etc with a flake, then pass `--impure` in order to allow use of environment variables. b) For `nixos-rebuild` you can set { nixpkgs.config.allowBroken = true; } in configuration.nix to override this. c) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add { allowBroken = true; } to ~/.config/nixpkgs/config.nix.