sladeUnstable 0 -> 1 attrpath: sladeUnstable Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - slade-unstable-2023-09-30 Press Enter key to continue... Running update for: - slade-unstable-2023-09-30: UPDATING ... - slade-unstable-2023-09-30: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/games/doom-ports/slade/git.nix b/pkgs/games/doom-ports/slade/git.nix index 7ecc5d5d1b6a..a8a819c11928 100644 --- a/pkgs/games/doom-ports/slade/git.nix +++ b/pkgs/games/doom-ports/slade/git.nix @@ -20,13 +20,13 @@ stdenv.mkDerivation rec { pname = "slade"; - version = "unstable-2023-09-30"; + version = "unstable-2024-04-24"; src = fetchFromGitHub { owner = "sirjuddington"; repo = "SLADE"; - rev = "d05af4bd3a9a655dfe17d02760bab3542cc0b909"; - sha256 = "sha256-lzTSE0WH+4fOad9E/pL3LDc4L151W0hFEmD0zsS0gpQ="; + rev = "7a655731af2346b8d4d87c15a857b3563ef8157f"; + sha256 = "sha256-LonKm9u+nTmT1GgpOWCkaZBNaO9B3PE+kTUs1xW1qCU="; }; postPatch = lib.optionalString (!stdenv.hostPlatform.isx86) '' An auto update branch exists with message `sladeUnstable: unstable-2023-09-30 -> unstable-2024-02-09`. New version is unstable-2024-04-24. The auto update branch does not match or exceed the new version. Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A sladeUnstable Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix --extra-experimental-features nix-command log -f . sladeUnstable Standard output: error: … while calling the 'derivationStrict' builtin at /builtin/derivation.nix:9:12: (source not available) … while evaluating derivation 'slade-unstable-2024-04-24' whose name attribute is located at /var/cache/nixpkgs-update/worker/worktree/sladeUnstable/pkgs/stdenv/generic/make-derivation.nix:331:7 … while evaluating attribute 'buildInputs' of derivation 'slade-unstable-2024-04-24' at /var/cache/nixpkgs-update/worker/worktree/sladeUnstable/pkgs/stdenv/generic/make-derivation.nix:378:7: 377| depsHostHost = elemAt (elemAt dependencies 1) 0; 378| buildInputs = elemAt (elemAt dependencies 1) 1; | ^ 379| depsTargetTarget = elemAt (elemAt dependencies 2) 0; error: Package ‘freeimage-unstable-2021-11-01’ in /var/cache/nixpkgs-update/worker/worktree/sladeUnstable/pkgs/development/libraries/freeimage/default.nix:72 is marked as insecure, refusing to evaluate. Known issues: - CVE-2021-33367 - CVE-2021-40262 - CVE-2021-40263 - CVE-2021-40264 - CVE-2021-40265 - CVE-2021-40266 - CVE-2023-47992 - CVE-2023-47993 - CVE-2023-47994 - CVE-2023-47995 - CVE-2023-47996 You can install it anyway by allowing this package, using the following methods: a) To temporarily allow all insecure packages, you can use an environment variable for a single invocation of the nix tools: $ export NIXPKGS_ALLOW_INSECURE=1 Note: When using `nix shell`, `nix build`, `nix develop`, etc with a flake, then pass `--impure` in order to allow use of environment variables. b) for `nixos-rebuild` you can add ‘freeimage-unstable-2021-11-01’ to `nixpkgs.config.permittedInsecurePackages` in the configuration.nix, like so: { nixpkgs.config.permittedInsecurePackages = [ "freeimage-unstable-2021-11-01" ]; } c) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add ‘freeimage-unstable-2021-11-01’ to `permittedInsecurePackages` in ~/.config/nixpkgs/config.nix, like so: { permittedInsecurePackages = [ "freeimage-unstable-2021-11-01" ]; }