linuxKernel.packages.linux_4_19_hardened.chipsec 1.10.6 -> 1.13.0 https://github.com/chipsec/chipsec/releases attrpath: linuxKernel.packages.linux_4_19_hardened.chipsec Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/9yf2ykjxgdgiizms9nq6iwz2inx6k6id-packages.json.drv building '/nix/store/9yf2ykjxgdgiizms9nq6iwz2inx6k6id-packages.json.drv'... Going to be running update for following packages: - chipsec-1.10.6 Press Enter key to continue... Running update for: - chipsec-1.10.6: UPDATING ... - chipsec-1.10.6: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/tools/security/chipsec/default.nix b/pkgs/tools/security/chipsec/default.nix index 8842cbab248c..a0e2004b61a8 100644 --- a/pkgs/tools/security/chipsec/default.nix +++ b/pkgs/tools/security/chipsec/default.nix @@ -10,15 +10,15 @@ python3.pkgs.buildPythonApplication rec { pname = "chipsec"; - version = "1.10.6"; + version = "1.13.0"; disabled = !stdenv.isLinux; src = fetchFromGitHub { owner = "chipsec"; repo = "chipsec"; - rev = version; - hash = "sha256-+pbFG1SmSO/cnt1e+kel7ereC0I1OCJKKsS0KaJDWdc="; + rev = "refs/tags/${version}"; + hash = "sha256-JQP2vvr+JqBLpot01KNTHeGdkQkMBlmvExbx1ttU0os="; }; patches = lib.optionals withDriver [ ./ko-path.diff ./compile-ko.diff ]; No auto update branch exists Received ExitFailure 1 when running Raw command: /nix/store/v7gdmdc9yhx3ngh840xx5kr46840s73b-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A linuxKernel.packages.linux_4_19_hardened.chipsec Received ExitFailure 1 when running Raw command: /nix/store/v7gdmdc9yhx3ngh840xx5kr46840s73b-nix-2.18.2/bin/nix --extra-experimental-features nix-command log -f . linuxKernel.packages.linux_4_19_hardened.chipsec Standard output: error: … while evaluating the attribute 'drvPath' at /var/cache/nixpkgs-update/worker/worktree/linuxKernel.packages.linux_4_19_hardened.chipsec/lib/customisation.nix:365:7: 364| in commonAttrs // { 365| drvPath = assert condition; drv.drvPath; | ^ 366| outPath = assert condition; drv.outPath; … in the condition of the assert statement at /var/cache/nixpkgs-update/worker/worktree/linuxKernel.packages.linux_4_19_hardened.chipsec/lib/customisation.nix:365:17: 364| in commonAttrs // { 365| drvPath = assert condition; drv.drvPath; | ^ 366| outPath = assert condition; drv.outPath; (stack trace truncated; use '--show-trace' to show the full trace) error: Package ‘chipsec-1.13.0’ in /var/cache/nixpkgs-update/worker/worktree/linuxKernel.packages.linux_4_19_hardened.chipsec/pkgs/tools/security/chipsec/default.nix:65 is marked as broken, refusing to evaluate. a) To temporarily allow broken packages, you can use an environment variable for a single invocation of the nix tools. $ export NIXPKGS_ALLOW_BROKEN=1 Note: When using `nix shell`, `nix build`, `nix develop`, etc with a flake, then pass `--impure` in order to allow use of environment variables. b) For `nixos-rebuild` you can set { nixpkgs.config.allowBroken = true; } in configuration.nix to override this. c) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add { allowBroken = true; } to ~/.config/nixpkgs/config.nix.