For attrpath rPackages.ConcordanceTest, using log file: /var/log/nixpkgs-update/rPackages.ConcordanceTest/2024-04-03.log rPackages.ConcordanceTest 1.0.2 -> 1.0.3 https://repology.org/project/r:concordancetest/versions attrpath: rPackages.ConcordanceTest Checking auto update branch... No auto update branch exists Old version 1.0.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.ConcordanceTest 1.0.2 -> 1.0.3 https://repology.org/project/r:concordancetest/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.reddPrec, using log file: /var/log/nixpkgs-update/rPackages.reddPrec/2024-04-03.log rPackages.reddPrec 0.4.0 -> 2.0.1 https://repology.org/project/r:reddprec/versions attrpath: rPackages.reddPrec Checking auto update branch... No auto update branch exists Old version 0.4.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.reddPrec 0.4.0 -> 2.0.1 https://repology.org/project/r:reddprec/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.clugenr, using log file: /var/log/nixpkgs-update/rPackages.clugenr/2024-04-03.log rPackages.clugenr 1.0.2 -> 1.0.3 https://repology.org/project/r:clugenr/versions attrpath: rPackages.clugenr Checking auto update branch... No auto update branch exists Old version 1.0.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.clugenr 1.0.2 -> 1.0.3 https://repology.org/project/r:clugenr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.pkgload, using log file: /var/log/nixpkgs-update/rPackages.pkgload/2024-04-03.log rPackages.pkgload 1.3.3 -> 1.3.4 https://repology.org/project/r:pkgload/versions attrpath: rPackages.pkgload Checking auto update branch... No auto update branch exists Old version 1.3.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.pkgload 1.3.3 -> 1.3.4 https://repology.org/project/r:pkgload/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath docbook_xml_dtd_45, using log file: /var/log/nixpkgs-update/docbook_xml_dtd_45/2024-04-03.log docbook_xml_dtd_45 4.5 -> 5.1 https://repology.org/project/docbook-xml/versions attrpath: docbook_xml_dtd_45 Checking auto update branch... No auto update branch exists Old version 4.5" not present in master derivation file with contents: { lib, stdenv, unzip, src, version, postInstall ? "true", findXMLCatalogs }: stdenv.mkDerivation { inherit version src postInstall; pname = "docbook-xml"; nativeBuildInputs = [ unzip ]; propagatedNativeBuildInputs = [ findXMLCatalogs ]; unpackPhase = '' mkdir -p $out/xml/dtd/docbook cd $out/xml/dtd/docbook unpackFile $src ''; installPhase = '' find . -type f -exec chmod -x {} \; runHook postInstall ''; meta = { branch = version; platforms = lib.platforms.unix; }; } [result] Failed to update docbook_xml_dtd_45 4.5 -> 5.1 https://repology.org/project/docbook-xml/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.misty, using log file: /var/log/nixpkgs-update/rPackages.misty/2024-04-03.log rPackages.misty 0.5.4 -> 0.6.2 https://repology.org/project/r:misty/versions attrpath: rPackages.misty Checking auto update branch... No auto update branch exists Old version 0.5.4" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.misty 0.5.4 -> 0.6.2 https://repology.org/project/r:misty/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath linuxKernel.packages.linux_4_19.system76-power, using log file: /var/log/nixpkgs-update/linuxKernel.packages.linux_4_19.system76-power/2024-04-03.log linuxKernel.packages.linux_4_19.system76-power 1.1.23 -> 1.1.26 https://repology.org/project/system76-power/versions attrpath: linuxKernel.packages.linux_4_19.system76-power Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] build succeeded unexpectedlystderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'linuxKernel.packages.linux_4_19.system76-power.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/7n2804g7iwv6w0ppkn9i23avgsl7625j-system76-power-1.1.26-vendor.tar.gz.drv /nix/store/gi71mlk16k29glmgsd6s4jzz1mgd16xx-system76-power-1.1.26.drv building '/nix/store/7n2804g7iwv6w0ppkn9i23avgsl7625j-system76-power-1.1.26-vendor.tar.gz.drv'... Running phase: unpackPhase unpacking source archive /nix/store/hagyw75l1dg0m516hnd9a2ny4y1gzip6-source source root is source Running phase: patchPhase Running phase: updateAutotoolsGnuConfigScriptsPhase Running phase: configurePhase no configure script, doing nothing Running phase: buildPhase source = "git+https://github.com/pop-os/sysfs-class#ab63e7f638aadfaf896a02e53cf330343d331337" ERROR: The Cargo.lock contains git dependencies This is currently not supported in the fixed-output derivation fetcher. Use cargoLock.lockFile / importCargoLock instead. error: builder for '/nix/store/7n2804g7iwv6w0ppkn9i23avgsl7625j-system76-power-1.1.26-vendor.tar.gz.drv' failed with exit code 1; last 15 log lines: > Running phase: unpackPhase > unpacking source archive /nix/store/hagyw75l1dg0m516hnd9a2ny4y1gzip6-source > source root is source > Running phase: patchPhase > Running phase: updateAutotoolsGnuConfigScriptsPhase > Running phase: configurePhase > no configure script, doing nothing > Running phase: buildPhase > source = "git+https://github.com/pop-os/sysfs-class#ab63e7f638aadfaf896a02e53cf330343d331337" > > ERROR: The Cargo.lock contains git dependencies > > This is currently not supported in the fixed-output derivation fetcher. > Use cargoLock.lockFile / importCargoLock instead. > For full logs, run 'nix log /nix/store/7n2804g7iwv6w0ppkn9i23avgsl7625j-system76-power-1.1.26-vendor.tar.gz.drv'. error: 1 dependencies of derivation '/nix/store/gi71mlk16k29glmgsd6s4jzz1mgd16xx-system76-power-1.1.26.drv' failed to build [result] Failed to update linuxKernel.packages.linux_4_19.system76-power 1.1.23 -> 1.1.26 https://repology.org/project/system76-power/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.BEKKs, using log file: /var/log/nixpkgs-update/rPackages.BEKKs/2024-04-03.log rPackages.BEKKs 1.4.3 -> 1.4.4 https://repology.org/project/r:bekks/versions attrpath: rPackages.BEKKs Checking auto update branch... No auto update branch exists Old version 1.4.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.BEKKs 1.4.3 -> 1.4.4 https://repology.org/project/r:bekks/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath epic5, using log file: /var/log/nixpkgs-update/epic5/2024-04-03.log epic5 2.0.1 -> 2.1.12 https://repology.org/project/epic5/versions attrpath: epic5 Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update epic5 2.0.1 -> 2.1.12 https://repology.org/project/epic5/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath ocamlPackages.mccs, using log file: /var/log/nixpkgs-update/ocamlPackages.mccs/2024-04-03.log ocamlPackages.mccs 1.1+13 -> 1.1.14 https://repology.org/project/ocaml:mccs/versions attrpath: ocamlPackages.mccs Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/5yrf5zc1sazjciq1mlf4v2r8dpnzw6b3-source.drv building '/nix/store/5yrf5zc1sazjciq1mlf4v2r8dpnzw6b3-source.drv'... trying https://github.com/AltGr/ocaml-mccs/archive/1.1.14.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/5yrf5zc1sazjciq1mlf4v2r8dpnzw6b3-source.drv' failed with exit code 1; last 9 log lines: > > trying https://github.com/AltGr/ocaml-mccs/archive/1.1.14.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/5yrf5zc1sazjciq1mlf4v2r8dpnzw6b3-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'ocamlPackages.mccs.originalSrc' not found stderr did not split as expected full stderr was: these 4 derivations will be built: /nix/store/5yrf5zc1sazjciq1mlf4v2r8dpnzw6b3-source.drv /nix/store/vb3kx90dh7mqlldm3dpn63cky38kys21-source.drv /nix/store/xga9rqq3991pj5dksl97l32syqi3np5b-ocaml5.1.1-cudf-0.10.drv /nix/store/hmw1lmh7qbz4al60cv39wwdh1nkd4nnq-ocaml5.1.1-mccs-1.1.14.drv these 4 paths will be fetched (1.99 MiB download, 9.11 MiB unpacked): /nix/store/ssgzwrwybvmlpfd5gblfh9fipk34rdrd-ocaml5.1.1-extlib-1.7.9 /nix/store/j8q0mia3izmcb30h08drc7j5akzxa196-ocaml5.1.1-ounit2-2.2.7 /nix/store/aqkg0krp9ck5binai417pndvmd1akrzw-ocaml5.1.1-seq-0.1 /nix/store/qbmdalk8jr81h3xhxglrffmn6kqxhpay-ocaml5.1.1-stdlib-shims-0.3.0 copying path '/nix/store/aqkg0krp9ck5binai417pndvmd1akrzw-ocaml5.1.1-seq-0.1' from 'https://cache.nixos.org'... building '/nix/store/5yrf5zc1sazjciq1mlf4v2r8dpnzw6b3-source.drv'... copying path '/nix/store/ssgzwrwybvmlpfd5gblfh9fipk34rdrd-ocaml5.1.1-extlib-1.7.9' from 'https://cache.nixos.org'... copying path '/nix/store/qbmdalk8jr81h3xhxglrffmn6kqxhpay-ocaml5.1.1-stdlib-shims-0.3.0' from 'https://cache.nixos.org'... building '/nix/store/vb3kx90dh7mqlldm3dpn63cky38kys21-source.drv'... copying path '/nix/store/j8q0mia3izmcb30h08drc7j5akzxa196-ocaml5.1.1-ounit2-2.2.7' from 'https://cache.nixos.org'... cannot link '/nix/store/.links/11pq29qjp73hmgh28q66ww7afd6sw545nj70ajj0zapkwxkmysyx' to '/nix/store/j8q0mia3izmcb30h08drc7j5akzxa196-ocaml5.1.1-ounit2-2.2.7/lib/ocaml/5.1.1/site-lib/ounit2/advanced/oUnitDiff.cmti': No space left on device trying https://gitlab.com/api/v4/projects/irill%2Fcudf/repository/archive.tar.gz?sha=v0.10 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed trying https://github.com/AltGr/ocaml-mccs/archive/1.1.14.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/5yrf5zc1sazjciq1mlf4v2r8dpnzw6b3-source.drv' failed with exit code 1; last 9 log lines: > > trying https://github.com/AltGr/ocaml-mccs/archive/1.1.14.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/5yrf5zc1sazjciq1mlf4v2r8dpnzw6b3-source.drv'. cannot link '/nix/store/.links/0iq914jk2kk70y48vyfgqxa5355k7dyr4jm303wxps1k220jaw95' to '/nix/store/ssgzwrwybvmlpfd5gblfh9fipk34rdrd-ocaml5.1.1-extlib-1.7.9/lib/ocaml/5.1.1/site-lib/extlib/extBuffer.cmx': No space left on device cannot link '/nix/store/.links/143jh5qpryzbw0lhaiq909gj0qa2xc6w2k2g7skimllmlajg4s6l' to '/nix/store/ssgzwrwybvmlpfd5gblfh9fipk34rdrd-ocaml5.1.1-extlib-1.7.9/lib/ocaml/5.1.1/site-lib/extlib/extList.ml': No space left on device error: 1 dependencies of derivation '/nix/store/hmw1lmh7qbz4al60cv39wwdh1nkd4nnq-ocaml5.1.1-mccs-1.1.14.drv' failed to build [result] Failed to update ocamlPackages.mccs 1.1+13 -> 1.1.14 https://repology.org/project/ocaml:mccs/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.shapviz, using log file: /var/log/nixpkgs-update/rPackages.shapviz/2024-04-03.log rPackages.shapviz 0.9.2 -> 0.9.3 https://repology.org/project/r:shapviz/versions attrpath: rPackages.shapviz Checking auto update branch... No auto update branch exists Old version 0.9.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.shapviz 0.9.2 -> 0.9.3 https://repology.org/project/r:shapviz/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath libabigail, using log file: /var/log/nixpkgs-update/libabigail/2024-04-03.log libabigail 2.1 -> 2.4 https://repology.org/project/libabigail/versions attrpath: libabigail Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/d0paj3w09b33p50jcpwphr61a8c5zny1-libabigail-2.4.tar.gz.drv building '/nix/store/d0paj3w09b33p50jcpwphr61a8c5zny1-libabigail-2.4.tar.gz.drv'... trying https://mirrors.kernel.org/sourceware/libabigail/libabigail-2.4.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 369 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download libabigail-2.4.tar.gz from any mirror error: builder for '/nix/store/d0paj3w09b33p50jcpwphr61a8c5zny1-libabigail-2.4.tar.gz.drv' failed with exit code 1; last 7 log lines: > > trying https://mirrors.kernel.org/sourceware/libabigail/libabigail-2.4.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 369 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download libabigail-2.4.tar.gz from any mirror For full logs, run 'nix log /nix/store/d0paj3w09b33p50jcpwphr61a8c5zny1-libabigail-2.4.tar.gz.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'libabigail.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/d0paj3w09b33p50jcpwphr61a8c5zny1-libabigail-2.4.tar.gz.drv /nix/store/xpx46q8350hfh35j3c8gs8s9sk81nvbp-libabigail-2.4.drv building '/nix/store/d0paj3w09b33p50jcpwphr61a8c5zny1-libabigail-2.4.tar.gz.drv'... trying https://mirrors.kernel.org/sourceware/libabigail/libabigail-2.4.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 369 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download libabigail-2.4.tar.gz from any mirror error: builder for '/nix/store/d0paj3w09b33p50jcpwphr61a8c5zny1-libabigail-2.4.tar.gz.drv' failed with exit code 1; last 7 log lines: > > trying https://mirrors.kernel.org/sourceware/libabigail/libabigail-2.4.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 369 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download libabigail-2.4.tar.gz from any mirror For full logs, run 'nix log /nix/store/d0paj3w09b33p50jcpwphr61a8c5zny1-libabigail-2.4.tar.gz.drv'. error: 1 dependencies of derivation '/nix/store/xpx46q8350hfh35j3c8gs8s9sk81nvbp-libabigail-2.4.drv' failed to build [result] Failed to update libabigail 2.1 -> 2.4 https://repology.org/project/libabigail/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath semver, using log file: /var/log/nixpkgs-update/semver/2024-04-03.log semver 1.0.0 -> 7.6.0 https://repology.org/project/semver/versions attrpath: semver Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/awja76yq3lh2vf1s6vjlwvrzix5pnmsm-source.drv building '/nix/store/awja76yq3lh2vf1s6vjlwvrzix5pnmsm-source.drv'... trying https://github.com/catouc/semver-go/archive/v7.6.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/awja76yq3lh2vf1s6vjlwvrzix5pnmsm-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/catouc/semver-go/archive/v7.6.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/awja76yq3lh2vf1s6vjlwvrzix5pnmsm-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'semver.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/awja76yq3lh2vf1s6vjlwvrzix5pnmsm-source.drv /nix/store/y62rrxzin5cracmzdzjiivgrlwjc324q-semver-7.6.0.drv building '/nix/store/awja76yq3lh2vf1s6vjlwvrzix5pnmsm-source.drv'... trying https://github.com/catouc/semver-go/archive/v7.6.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/awja76yq3lh2vf1s6vjlwvrzix5pnmsm-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/catouc/semver-go/archive/v7.6.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/awja76yq3lh2vf1s6vjlwvrzix5pnmsm-source.drv'. error: 1 dependencies of derivation '/nix/store/y62rrxzin5cracmzdzjiivgrlwjc324q-semver-7.6.0.drv' failed to build [result] Failed to update semver 1.0.0 -> 7.6.0 https://repology.org/project/semver/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath emacsPackages.gnugo, using log file: /var/log/nixpkgs-update/emacsPackages.gnugo/2024-04-03.log emacsPackages.gnugo 3.1.2 -> 3.8 https://repology.org/project/gnugo/versions attrpath: emacsPackages.gnugo Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update emacsPackages.gnugo 3.1.2 -> 3.8 https://repology.org/project/gnugo/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath redstore, using log file: /var/log/nixpkgs-update/redstore/2024-04-03.log redstore 0.5.4 -> 0.5.5 https://repology.org/project/redstore/versions attrpath: redstore Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/diycf48z47niv88ydx7wazyj0ry20l6f-redstore-0.5.5.tar.gz.drv building '/nix/store/diycf48z47niv88ydx7wazyj0ry20l6f-redstore-0.5.5.tar.gz.drv'... trying https://www.aelius.com/njh/redstore/redstore-0.5.5.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 277 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download redstore-0.5.5.tar.gz from any mirror error: builder for '/nix/store/diycf48z47niv88ydx7wazyj0ry20l6f-redstore-0.5.5.tar.gz.drv' failed with exit code 1; last 7 log lines: > > trying https://www.aelius.com/njh/redstore/redstore-0.5.5.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 277 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download redstore-0.5.5.tar.gz from any mirror For full logs, run 'nix log /nix/store/diycf48z47niv88ydx7wazyj0ry20l6f-redstore-0.5.5.tar.gz.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'redstore.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/diycf48z47niv88ydx7wazyj0ry20l6f-redstore-0.5.5.tar.gz.drv /nix/store/kxg9zmmpwbb1f0fbzk4q643ccx6rhaaw-redstore-0.5.5.drv these 2 paths will be fetched (0.35 MiB download, 1.31 MiB unpacked): /nix/store/cvr6xhsblykmpm6s7il41dhijyjakv10-rasqal-0.9.33 /nix/store/vdj8mmh6f22sg48k1zhq8xvda0vqwikr-redland-1.0.17 copying path '/nix/store/cvr6xhsblykmpm6s7il41dhijyjakv10-rasqal-0.9.33' from 'https://cache.nixos.org'... building '/nix/store/diycf48z47niv88ydx7wazyj0ry20l6f-redstore-0.5.5.tar.gz.drv'... copying path '/nix/store/vdj8mmh6f22sg48k1zhq8xvda0vqwikr-redland-1.0.17' from 'https://cache.nixos.org'... trying https://www.aelius.com/njh/redstore/redstore-0.5.5.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 277 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download redstore-0.5.5.tar.gz from any mirror error: builder for '/nix/store/diycf48z47niv88ydx7wazyj0ry20l6f-redstore-0.5.5.tar.gz.drv' failed with exit code 1; last 7 log lines: > > trying https://www.aelius.com/njh/redstore/redstore-0.5.5.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 277 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download redstore-0.5.5.tar.gz from any mirror For full logs, run 'nix log /nix/store/diycf48z47niv88ydx7wazyj0ry20l6f-redstore-0.5.5.tar.gz.drv'. error: 1 dependencies of derivation '/nix/store/kxg9zmmpwbb1f0fbzk4q643ccx6rhaaw-redstore-0.5.5.drv' failed to build [result] Failed to update redstore 0.5.4 -> 0.5.5 https://repology.org/project/redstore/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.NMRphasing, using log file: /var/log/nixpkgs-update/rPackages.NMRphasing/2024-04-03.log rPackages.NMRphasing 1.0.3 -> 1.0.4 https://repology.org/project/r:nmrphasing/versions attrpath: rPackages.NMRphasing Checking auto update branch... No auto update branch exists Old version 1.0.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.NMRphasing 1.0.3 -> 1.0.4 https://repology.org/project/r:nmrphasing/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO currently don't know how to update perl [result] Failed to update perl536Packages.ScalarType 0.3.2 -> 1.0.0 https://repology.org/project/perl:scalar-type/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.dgpsi, using log file: /var/log/nixpkgs-update/rPackages.dgpsi/2024-04-03.log rPackages.dgpsi 2.3.0 -> 2.4.0 https://repology.org/project/r:dgpsi/versions attrpath: rPackages.dgpsi Checking auto update branch... No auto update branch exists Old version 2.3.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.dgpsi 2.3.0 -> 2.4.0 https://repology.org/project/r:dgpsi/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.ggrepel, using log file: /var/log/nixpkgs-update/rPackages.ggrepel/2024-04-03.log rPackages.ggrepel 0.9.4 -> 0.9.5 https://repology.org/project/r:ggrepel/versions attrpath: rPackages.ggrepel Checking auto update branch... No auto update branch exists Old version 0.9.4" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.ggrepel 0.9.4 -> 0.9.5 https://repology.org/project/r:ggrepel/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.fsr, using log file: /var/log/nixpkgs-update/rPackages.fsr/2024-04-03.log rPackages.fsr 2.0.0 -> 2.0.1 https://repology.org/project/r:fsr/versions attrpath: rPackages.fsr Checking auto update branch... No auto update branch exists Old version 2.0.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.fsr 2.0.0 -> 2.0.1 https://repology.org/project/r:fsr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath migmix, using log file: /var/log/nixpkgs-update/migmix/2024-04-03.log migmix 20150712 -> 20200307 https://repology.org/project/fonts:migmix/versions attrpath: migmix Checking auto update branch... No auto update branch exists [outpaths] eval start [outpaths] eval end [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update migmix 20150712 -> 20200307 https://repology.org/project/fonts:migmix/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.ulid, using log file: /var/log/nixpkgs-update/rPackages.ulid/2024-04-03.log rPackages.ulid 0.3.0 -> 0.3.1 https://repology.org/project/r:ulid/versions attrpath: rPackages.ulid Checking auto update branch... No auto update branch exists Old version 0.3.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.ulid 0.3.0 -> 0.3.1 https://repology.org/project/r:ulid/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cargo-pgo, using log file: /var/log/nixpkgs-update/cargo-pgo/2024-04-03.log cargo-pgo 0.2.6 -> 0.2.8 https://repology.org/project/cargo-pgo/versions attrpath: cargo-pgo Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] Replacing cargoHash with sha256-T49RfBInMZeTPT7HhZIwhfK48ORKDD14fcShC6lFApI= [rustCrateVersion] Finished updating Crate version and replacing hashes [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/by-name/ca/cargo-pgo/package.nix b/pkgs/by-name/ca/cargo-pgo/package.nix index 1850fb2d85d6..d7140a3f1523 100644 --- a/pkgs/by-name/ca/cargo-pgo/package.nix +++ b/pkgs/by-name/ca/cargo-pgo/package.nix @@ -5,16 +5,16 @@ rustPlatform.buildRustPackage rec { pname = "cargo-pgo"; - version = "0.2.6"; + version = "0.2.8"; src = fetchFromGitHub { owner = "kobzol"; repo = pname; rev = "v${version}"; - hash = "sha256-u3kWYPLJYarwwudRpeBdJglP9kNbLRTYgEvZT2pBBoY="; + hash = "sha256-yt9QAgpu667JkdNS7OiB/wB9BLXXpis0ZhWjYuETteU="; }; - cargoHash = "sha256-Peicupa2vFDzPCH0OQYk7plkWIn82o45oGutOyMlI2s="; + cargoHash = "sha256-T49RfBInMZeTPT7HhZIwhfK48ORKDD14fcShC6lFApI="; # Integration tests do not run in Nix build environment due to needing to # create and build Cargo workspaces. [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/k2sxhligaszlm30aiww8v0ghk97nq24x-cargo-pgo-0.2.8" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/cargo-pgo/versions. meta.description for cargo-pgo is: Cargo subcommand for optimizing Rust binaries/libraries with PGO and BOLT meta.homepage for cargo-pgo is: https://github.com/kobzol/cargo-pgo ###### Updates performed - Rust version update ###### To inspect upstream changes - [Compare changes on GitHub](https://github.com/kobzol/cargo-pgo/compare/v0.2.6...v0.2.8) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.2.8 with grep in /nix/store/k2sxhligaszlm30aiww8v0ghk97nq24x-cargo-pgo-0.2.8 - found 0.2.8 in filename of file in /nix/store/k2sxhligaszlm30aiww8v0ghk97nq24x-cargo-pgo-0.2.8 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath cargo-pgo ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/k2sxhligaszlm30aiww8v0ghk97nq24x-cargo-pgo-0.2.8 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A cargo-pgo https://github.com/r-ryantm/nixpkgs/archive/fca0124a51afa047a15cd96cea5d164f83dee154.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/fca0124a51afa047a15cd96cea5d164f83dee154#cargo-pgo ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/k2sxhligaszlm30aiww8v0ghk97nq24x-cargo-pgo-0.2.8 ls -la /nix/store/k2sxhligaszlm30aiww8v0ghk97nq24x-cargo-pgo-0.2.8/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @DanNixon for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301091 [result] Success updating cargo-pgo 0.2.6 -> 0.2.8 https://repology.org/project/cargo-pgo/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath foot, using log file: /var/log/nixpkgs-update/foot/2024-04-03.log foot 1.16.2 -> 1.17.0 https://repology.org/project/foot/versions attrpath: foot Checking auto update branch... No auto update branch exists There might already be an open PR for this update: - foot: 1.16.2 -> 1.17.0 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/301074" [result] Failed to update foot 1.16.2 -> 1.17.0 https://repology.org/project/foot/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath skaffold, using log file: /var/log/nixpkgs-update/skaffold/2024-04-03.log skaffold 2.10.1 -> 2.11.0 https://repology.org/project/skaffold/versions attrpath: skaffold Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Found old vendorHash = null [golangModuleVersion] Set vendorHash to null [golangModuleVersion] Finished updating vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/tools/skaffold/default.nix b/pkgs/development/tools/skaffold/default.nix index bac6c119e350..a67c430dbfc1 100644 --- a/pkgs/development/tools/skaffold/default.nix +++ b/pkgs/development/tools/skaffold/default.nix @@ -2,13 +2,13 @@ buildGoModule rec { pname = "skaffold"; - version = "2.10.1"; + version = "2.11.0"; src = fetchFromGitHub { owner = "GoogleContainerTools"; repo = "skaffold"; rev = "v${version}"; - hash = "sha256-NNiWiTY5AHMcGxDND5QwlucYVrp94C92qtMNLrVm2tQ="; + hash = "sha256-xaRVgvYK6xWSy75K7AOkSw4ZjXn3xR0NqbBBbbK5MVU="; }; vendorHash = null; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/zn2n5s4qmpjy4vmkir73m22rwp99azjm-skaffold-2.11.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/skaffold/versions. meta.description for skaffold is: Easy and Repeatable Kubernetes Development meta.homepage for skaffold is: https://skaffold.dev/ meta.changelog for skaffold is: https://github.com/GoogleContainerTools/skaffold/releases/tag/v2.11.0 ###### Updates performed - Golang update ###### To inspect upstream changes - [Release on GitHub](https://github.com/GoogleContainerTools/skaffold/releases/tag/v2.11.0) - [Compare changes on GitHub](https://github.com/GoogleContainerTools/skaffold/compare/v2.10.1...v2.11.0) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 2.11.0 with grep in /nix/store/zn2n5s4qmpjy4vmkir73m22rwp99azjm-skaffold-2.11.0 - found 2.11.0 in filename of file in /nix/store/zn2n5s4qmpjy4vmkir73m22rwp99azjm-skaffold-2.11.0 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath skaffold ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/zn2n5s4qmpjy4vmkir73m22rwp99azjm-skaffold-2.11.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A skaffold https://github.com/r-ryantm/nixpkgs/archive/6cf68fd40180b38e2ada10cfb95d724b9b1161f6.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/6cf68fd40180b38e2ada10cfb95d724b9b1161f6#skaffold ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/zn2n5s4qmpjy4vmkir73m22rwp99azjm-skaffold-2.11.0 ls -la /nix/store/zn2n5s4qmpjy4vmkir73m22rwp99azjm-skaffold-2.11.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @vdemeester @bryanasdev000 for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301093 [result] Success updating skaffold 2.10.1 -> 2.11.0 https://repology.org/project/skaffold/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath kdePackages.qtutilities, using log file: /var/log/nixpkgs-update/kdePackages.qtutilities/2024-04-03.log kdePackages.qtutilities 6.13.5 -> 6.14.0 https://repology.org/project/qtutilities/versions attrpath: kdePackages.qtutilities Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/libraries/qtutilities/default.nix b/pkgs/development/libraries/qtutilities/default.nix index 8d385afc148d..0ac930710bf4 100644 --- a/pkgs/development/libraries/qtutilities/default.nix +++ b/pkgs/development/libraries/qtutilities/default.nix @@ -9,13 +9,13 @@ stdenv.mkDerivation (finalAttrs: { pname = "qtutilities"; - version = "6.13.5"; + version = "6.14.0"; src = fetchFromGitHub { owner = "Martchus"; repo = "qtutilities"; rev = "v${finalAttrs.version}"; - hash = "sha256-ZPfyJAQHtE5ae/X9f8s/69UNiB4CnyACPLvYp8RgpKg="; + hash = "sha256-pg2SaFfFkP2v1qHo8CRCn7b9B4XKX+R4UqRNzNG4to4="; }; nativeBuildInputs = [ [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/y9amjzlw0ifgyclxf0gjrc08z096i2w1-qtutilities-6.14.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
7 packages built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/qtutilities/versions. meta.description for kdePackages.qtutilities is: Common Qt related C++ classes and routines used by @Martchus' applications such as dialogs, widgets and models Topics meta.homepage for kdePackages.qtutilities is: https://github.com/Martchus/qtutilities ###### Updates performed - Version update ###### To inspect upstream changes - [Release on GitHub](https://github.com/Martchus/qtutilities/releases/tag/v6.14.0) - [Compare changes on GitHub](https://github.com/Martchus/qtutilities/compare/v6.13.5...v6.14.0) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 6.14.0 with grep in /nix/store/y9amjzlw0ifgyclxf0gjrc08z096i2w1-qtutilities-6.14.0 - found 6.14.0 in filename of file in /nix/store/y9amjzlw0ifgyclxf0gjrc08z096i2w1-qtutilities-6.14.0 ---
Rebuild report (if merged into master) (click to expand) ``` 11 total rebuild path(s) 11 package rebuild(s) First fifty rebuilds by attrpath kdePackages.qtforkawesome kdePackages.qtutilities libsForQt5.qtforkawesome libsForQt5.qtutilities plasma5Packages.qtforkawesome plasma5Packages.qtutilities qt6Packages.qtforkawesome qt6Packages.qtutilities syncthingtray syncthingtray-minimal tageditor ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/y9amjzlw0ifgyclxf0gjrc08z096i2w1-qtutilities-6.14.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A kdePackages.qtutilities https://github.com/r-ryantm/nixpkgs/archive/ec7e7712b59e4c6427ec3e6717824e6f99e71b90.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/ec7e7712b59e4c6427ec3e6717824e6f99e71b90#kdePackages.qtutilities ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/y9amjzlw0ifgyclxf0gjrc08z096i2w1-qtutilities-6.14.0 ls -la /nix/store/y9amjzlw0ifgyclxf0gjrc08z096i2w1-qtutilities-6.14.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
7 packages built:
--- ###### Maintainer pings cc @doronbehar for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301097 [result] Success updating kdePackages.qtutilities 6.13.5 -> 6.14.0 https://repology.org/project/qtutilities/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pulldown-cmark, using log file: /var/log/nixpkgs-update/pulldown-cmark/2024-04-03.log pulldown-cmark 0.10.0 -> 0.10.2 https://repology.org/project/pulldown-cmark/versions attrpath: pulldown-cmark Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] Replacing cargoHash with sha256-UsdssFfy7cTM0wrfLDLrzbKudB5vqFINInJAteH5OTk= [rustCrateVersion] Finished updating Crate version and replacing hashes [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/tools/typesetting/pulldown-cmark/default.nix b/pkgs/tools/typesetting/pulldown-cmark/default.nix index a7ef454c811f..b63cc05cd2af 100644 --- a/pkgs/tools/typesetting/pulldown-cmark/default.nix +++ b/pkgs/tools/typesetting/pulldown-cmark/default.nix @@ -5,14 +5,14 @@ rustPlatform.buildRustPackage rec { pname = "pulldown-cmark"; - version = "0.10.0"; + version = "0.10.2"; src = fetchCrate { inherit pname version; - hash = "sha256-7ZO3MdQBNgltrd4Anu19g0Gkye6Bc2WHDuSng6mB9pM="; + hash = "sha256-jRQ2BnaElhciyBPQiHw680uFC6FXs+rP8rJGWH5ZbCc="; }; - cargoHash = "sha256-4UUdsS3dK5a6phwYZqjNwX52UMLLe/LHxOiBanTRMZM="; + cargoHash = "sha256-UsdssFfy7cTM0wrfLDLrzbKudB5vqFINInJAteH5OTk="; meta = { description = "A pull parser for CommonMark written in Rust"; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/fr3bzbhfz196vbrqpi7694wfg6dj84gz-pulldown-cmark-0.10.2" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/pulldown-cmark/versions. meta.description for pulldown-cmark is: A pull parser for CommonMark written in Rust meta.homepage for pulldown-cmark is: https://github.com/raphlinus/pulldown-cmark ###### Updates performed - Rust version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.10.2 with grep in /nix/store/fr3bzbhfz196vbrqpi7694wfg6dj84gz-pulldown-cmark-0.10.2 - found 0.10.2 in filename of file in /nix/store/fr3bzbhfz196vbrqpi7694wfg6dj84gz-pulldown-cmark-0.10.2 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath pulldown-cmark ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/fr3bzbhfz196vbrqpi7694wfg6dj84gz-pulldown-cmark-0.10.2 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A pulldown-cmark https://github.com/r-ryantm/nixpkgs/archive/c3eb87ffd2373e4089e161792e8bb9a7f9c6aa86.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/c3eb87ffd2373e4089e161792e8bb9a7f9c6aa86#pulldown-cmark ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/fr3bzbhfz196vbrqpi7694wfg6dj84gz-pulldown-cmark-0.10.2 ls -la /nix/store/fr3bzbhfz196vbrqpi7694wfg6dj84gz-pulldown-cmark-0.10.2/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @CobaltCause for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301099 [result] Success updating pulldown-cmark 0.10.0 -> 0.10.2 https://repology.org/project/pulldown-cmark/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath frugal, using log file: /var/log/nixpkgs-update/frugal/2024-04-03.log frugal 3.17.9 -> 3.17.10 https://repology.org/project/frugal/versions attrpath: frugal Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Found old vendorHash = "sha256-5o2r392gT5mNvO7mFVRgOGgoy5d+1K2kIitBo+dzhFQ=" [golangModuleVersion] Replaced vendorHash with sha256-6yKyPocuahr9m5frhbhBlcWd7QZ1rH+f9KhQ83+oadY= [golangModuleVersion] Finished updating vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/tools/frugal/default.nix b/pkgs/development/tools/frugal/default.nix index 0bea6b4e5785..3cd3d4a7788f 100644 --- a/pkgs/development/tools/frugal/default.nix +++ b/pkgs/development/tools/frugal/default.nix @@ -2,18 +2,18 @@ buildGoModule rec { pname = "frugal"; - version = "3.17.9"; + version = "3.17.10"; src = fetchFromGitHub { owner = "Workiva"; repo = pname; rev = "v${version}"; - sha256 = "sha256-VNzTrJ5sY6JHfUXLlY3LOQYfzoWPYltPQBZWx9FopSU="; + sha256 = "sha256-FAxvpP2js0bTb5hwFTCGKxIbunM8htEaf17gbM60WWM="; }; subPackages = [ "." ]; - vendorHash = "sha256-5o2r392gT5mNvO7mFVRgOGgoy5d+1K2kIitBo+dzhFQ="; + vendorHash = "sha256-6yKyPocuahr9m5frhbhBlcWd7QZ1rH+f9KhQ83+oadY="; meta = with lib; { description = "Thrift improved"; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/ikmkyifa53sfpp4y0zamf7rpb3cs5gll-frugal-3.17.10" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/frugal/versions. meta.description for frugal is: Thrift improved meta.homepage for frugal is: https://github.com/Workiva/frugal ###### Updates performed - Golang update ###### To inspect upstream changes - [Release on GitHub](https://github.com/Workiva/frugal/releases/tag/v3.17.10) - [Compare changes on GitHub](https://github.com/Workiva/frugal/compare/v3.17.9...v3.17.10) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 3.17.10 with grep in /nix/store/ikmkyifa53sfpp4y0zamf7rpb3cs5gll-frugal-3.17.10 - found 3.17.10 in filename of file in /nix/store/ikmkyifa53sfpp4y0zamf7rpb3cs5gll-frugal-3.17.10 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath frugal ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/ikmkyifa53sfpp4y0zamf7rpb3cs5gll-frugal-3.17.10 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A frugal https://github.com/r-ryantm/nixpkgs/archive/c7a1fb29bf5608372ee671dfc44c46b2e805902b.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/c7a1fb29bf5608372ee671dfc44c46b2e805902b#frugal ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/ikmkyifa53sfpp4y0zamf7rpb3cs5gll-frugal-3.17.10 ls -la /nix/store/ikmkyifa53sfpp4y0zamf7rpb3cs5gll-frugal-3.17.10/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @diogox for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301106 [result] Success updating frugal 3.17.9 -> 3.17.10 https://repology.org/project/frugal/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath qmplay2, using log file: /var/log/nixpkgs-update/qmplay2/2024-04-03.log qmplay2 24.03.16 -> 24.04.02 https://repology.org/project/qmplay2/versions attrpath: qmplay2 Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/applications/video/qmplay2/default.nix b/pkgs/applications/video/qmplay2/default.nix index 4c31c97d5b1d..bc92499e75ea 100644 --- a/pkgs/applications/video/qmplay2/default.nix +++ b/pkgs/applications/video/qmplay2/default.nix @@ -26,14 +26,14 @@ stdenv.mkDerivation (finalAttrs: { pname = "qmplay2"; - version = "24.03.16"; + version = "24.04.02"; src = fetchFromGitHub { owner = "zaps166"; repo = "QMPlay2"; rev = finalAttrs.version; fetchSubmodules = true; - hash = "sha256-yIBQBRdmaY7qaBirANxMqfm5vn3T4usokJUxwSYUHjQ="; + hash = "sha256-eJWXTcJU24QzPChFTKbvNcuL9UpIQD8rFzd5h591tjg="; }; nativeBuildInputs = [ [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/l8fw4a3lzavy6gj0z42qy34yyib3vd9g-qmplay2-24.04.02" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/qmplay2/versions. meta.description for qmplay2 is: Qt-based Multimedia player meta.homepage for qmplay2 is: https://github.com/zaps166/QMPlay2/ meta.changelog for qmplay2 is: https://github.com/zaps166/QMPlay2/releases/tag/24.04.02 ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 24.04.02 with grep in /nix/store/l8fw4a3lzavy6gj0z42qy34yyib3vd9g-qmplay2-24.04.02 - found 24.04.02 in filename of file in /nix/store/l8fw4a3lzavy6gj0z42qy34yyib3vd9g-qmplay2-24.04.02 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath qmplay2 ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/l8fw4a3lzavy6gj0z42qy34yyib3vd9g-qmplay2-24.04.02 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A qmplay2 https://github.com/r-ryantm/nixpkgs/archive/511009ada7a9c2c7855201bc871e61b9e03ad790.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/511009ada7a9c2c7855201bc871e61b9e03ad790#qmplay2 ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/l8fw4a3lzavy6gj0z42qy34yyib3vd9g-qmplay2-24.04.02 ls -la /nix/store/l8fw4a3lzavy6gj0z42qy34yyib3vd9g-qmplay2-24.04.02/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @AndersonTorres @kashw2 for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301111 [result] Success updating qmplay2 24.03.16 -> 24.04.02 https://repology.org/project/qmplay2/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO @yayayayaka asked to skip in https://github.com/NixOS/nixpkgs/pull/244074#issuecomment-1641657015 [result] Failed to update gitlab-elasticsearch-indexer 4.7.0 -> 4.8.0 https://repology.org/project/gitlab-elasticsearch-indexer/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath aerospike, using log file: /var/log/nixpkgs-update/aerospike/2024-04-03.log aerospike 7.0.0.6 -> 7.0.0.7 https://github.com/aerospike/aerospike-server/releases attrpath: aerospike Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/servers/nosql/aerospike/default.nix b/pkgs/servers/nosql/aerospike/default.nix index 623918d1b55c..9a283a418217 100644 --- a/pkgs/servers/nosql/aerospike/default.nix +++ b/pkgs/servers/nosql/aerospike/default.nix @@ -2,13 +2,13 @@ stdenv.mkDerivation rec { pname = "aerospike-server"; - version = "7.0.0.6"; + version = "7.0.0.7"; src = fetchFromGitHub { owner = "aerospike"; repo = "aerospike-server"; rev = version; - hash = "sha256-2Gz0Z8nEC3NX2Skg+4MzLrXYVqL30QwMnvu4dkbJ6+g="; + hash = "sha256-WAdN0Kk55Y3rhth1tiAZb9xIb0tF3YVfP+BXGRRY3lI="; fetchSubmodules = true; }; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/sc1vx2rib9y8q825nhxsnxqaw8cw73h7-aerospike-server-7.0.0.7" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/aerospike/aerospike-server/releases. meta.description for aerospike is: Flash-optimized, in-memory, NoSQL database meta.homepage for aerospike is: https://aerospike.com/ ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 7.0.0.7 with grep in /nix/store/sc1vx2rib9y8q825nhxsnxqaw8cw73h7-aerospike-server-7.0.0.7 - found 7.0.0.7 in filename of file in /nix/store/sc1vx2rib9y8q825nhxsnxqaw8cw73h7-aerospike-server-7.0.0.7 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath aerospike ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/sc1vx2rib9y8q825nhxsnxqaw8cw73h7-aerospike-server-7.0.0.7 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A aerospike https://github.com/r-ryantm/nixpkgs/archive/78ec6893a13139b9c38bb482ec6037c242301798.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/78ec6893a13139b9c38bb482ec6037c242301798#aerospike ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/sc1vx2rib9y8q825nhxsnxqaw8cw73h7-aerospike-server-7.0.0.7 ls -la /nix/store/sc1vx2rib9y8q825nhxsnxqaw8cw73h7-aerospike-server-7.0.0.7/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @kalbasit for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301115 [result] Success updating aerospike 7.0.0.6 -> 7.0.0.7 https://github.com/aerospike/aerospike-server/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lua52Packages.rocks-git-nvim, using log file: /var/log/nixpkgs-update/lua52Packages.rocks-git-nvim/2024-04-03.log lua52Packages.rocks-git-nvim 1.3.0-1 -> 1.3.1 https://github.com/nvim-neorocks/rocks-git.nvim/releases attrpath: lua52Packages.rocks-git-nvim Packages for lua are currently skipped. https://github.com/NixOS/nixpkgs/pull/37501#issuecomment-375169646 [result] Failed to update lua52Packages.rocks-git-nvim 1.3.0-1 -> 1.3.1 https://github.com/nvim-neorocks/rocks-git.nvim/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lua53Packages.rocks-git-nvim, using log file: /var/log/nixpkgs-update/lua53Packages.rocks-git-nvim/2024-04-03.log lua53Packages.rocks-git-nvim 1.3.0-1 -> 1.3.1 https://github.com/nvim-neorocks/rocks-git.nvim/releases attrpath: lua53Packages.rocks-git-nvim Packages for lua are currently skipped. https://github.com/NixOS/nixpkgs/pull/37501#issuecomment-375169646 [result] Failed to update lua53Packages.rocks-git-nvim 1.3.0-1 -> 1.3.1 https://github.com/nvim-neorocks/rocks-git.nvim/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath luajitPackages.rocks-git-nvim, using log file: /var/log/nixpkgs-update/luajitPackages.rocks-git-nvim/2024-04-03.log luajitPackages.rocks-git-nvim 1.3.0-1 -> 1.3.1 https://github.com/nvim-neorocks/rocks-git.nvim/releases attrpath: luajitPackages.rocks-git-nvim Packages for lua are currently skipped. https://github.com/NixOS/nixpkgs/pull/37501#issuecomment-375169646 [result] Failed to update luajitPackages.rocks-git-nvim 1.3.0-1 -> 1.3.1 https://github.com/nvim-neorocks/rocks-git.nvim/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath libsForQt5.sierra-breeze-enhanced, using log file: /var/log/nixpkgs-update/libsForQt5.sierra-breeze-enhanced/2024-04-03.log libsForQt5.sierra-breeze-enhanced 1.3.3 -> 2.0.1 https://github.com/kupiqu/SierraBreezeEnhanced/releases attrpath: libsForQt5.sierra-breeze-enhanced Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/data/themes/kwin-decorations/sierra-breeze-enhanced/default.nix b/pkgs/data/themes/kwin-decorations/sierra-breeze-enhanced/default.nix index 156d8aaaf907..6a3d21b3f2bf 100644 --- a/pkgs/data/themes/kwin-decorations/sierra-breeze-enhanced/default.nix +++ b/pkgs/data/themes/kwin-decorations/sierra-breeze-enhanced/default.nix @@ -11,8 +11,8 @@ let latestVersion = "2.0.1"; latestSha256 = "sha256-4KvOhQSYmHV/5TxyeK4f1uUmHK5uR5xXC2MfPTM96SM="; - qt5Version = "1.3.3"; - qt5Sha256 = "sha256-zTUTsSzy4p0Y7RPOidCtxTjjyvPRyWSQCxA5sUzXcLc="; + qt5Version = "2.0.1"; + qt5Sha256 = "sha256-4KvOhQSYmHV/5TxyeK4f1uUmHK5uR5xXC2MfPTM96SM="; in stdenv.mkDerivation rec { pname = "sierra-breeze-enhanced"; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A libsForQt5.sierra-breeze-enhanced nix build failed. -- The CXX compiler identification is GNU 13.2.0 -- Detecting C compiler ABI info -- Detecting C compiler ABI info - done -- Check for working C compiler: /nix/store/ac1hb5dc2z4biwgy8mjrhlifffkkrvdq-gcc-wrapper-13.2.0/bin/gcc - skipped -- Detecting C compile features -- Detecting C compile features - done -- Detecting CXX compiler ABI info -- Detecting CXX compiler ABI info - done -- Check for working CXX compiler: /nix/store/ac1hb5dc2z4biwgy8mjrhlifffkkrvdq-gcc-wrapper-13.2.0/bin/g++ - skipped -- Detecting CXX compile features -- Detecting CXX compile features - done CMake Deprecation Warning at CMakeLists.txt:5 (cmake_minimum_required): Compatibility with CMake < 3.5 will be removed from a future version of CMake. Update the VERSION argument value or use a ... suffix to tell CMake that the project does not need compatibility with older versions.  CMake Error at CMakeLists.txt:15 (find_package): Could not find a configuration file for package "ECM" that is compatible with requested version "6.0.0". The following configuration files were considered but not accepted: /nix/store/hwg6703jw0s2haldf5isc9i4xx6nak6p-extra-cmake-modules-5.115.0/share/ECM/cmake/ECMConfig.cmake, version: 5.115.0  -- Configuring incomplete, errors occurred! [result] Failed to update libsForQt5.sierra-breeze-enhanced 1.3.3 -> 2.0.1 https://github.com/kupiqu/SierraBreezeEnhanced/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath opengist, using log file: /var/log/nixpkgs-update/opengist/2024-04-03.log opengist 1.6.1 -> 1.7.0 https://github.com/thomiceli/opengist/releases attrpath: opengist Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Found old vendorHash = "sha256-IorqXJKzUTUL5zfKRipZaJtRlwVOmTwolJXFG/34Ais=" [golangModuleVersion] Replaced vendorHash with sha256-QdZPO5UWY3cXyrjsQu6MkWbQHznb/GJSNJxSkhZRm50= Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A opengist Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix --extra-experimental-features nix-command log -f . opengist Standard output: error: build log of 'opengist' is not available [result] Failed to update opengist 1.6.1 -> 1.7.0 https://github.com/thomiceli/opengist/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath opensearch, using log file: /var/log/nixpkgs-update/opensearch/2024-04-03.log opensearch 2.12.0 -> 2.13.0 https://github.com/opensearch-project/OpenSearch/releases attrpath: opensearch Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/servers/search/opensearch/default.nix b/pkgs/servers/search/opensearch/default.nix index 94207ec5665f..2c7d140ccce2 100644 --- a/pkgs/servers/search/opensearch/default.nix +++ b/pkgs/servers/search/opensearch/default.nix @@ -11,11 +11,11 @@ stdenvNoCC.mkDerivation (finalAttrs: { pname = "opensearch"; - version = "2.12.0"; + version = "2.13.0"; src = fetchurl { url = "https://artifacts.opensearch.org/releases/bundle/opensearch/${finalAttrs.version}/opensearch-${finalAttrs.version}-linux-x64.tar.gz"; - hash = "sha256-t9s633qDzxvG1x+VVATpczzvD+ojnfTiwB/EambMKtA="; + hash = "sha256-cF2JZX5psuh7h8acazK9tcjNu6wralJtliwqaBnd/V8="; }; nativeBuildInputs = [ [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/ygy0hp74sam5mfm2rjsnf6mhxkr7g29x-opensearch-2.13.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • opensearch
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/opensearch-project/OpenSearch/releases. meta.description for opensearch is: Open Source, Distributed, RESTful Search Engine meta.homepage for opensearch is: https://github.com/opensearch-project/OpenSearch ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 2.13.0 with grep in /nix/store/ygy0hp74sam5mfm2rjsnf6mhxkr7g29x-opensearch-2.13.0 - found 2.13.0 in filename of file in /nix/store/ygy0hp74sam5mfm2rjsnf6mhxkr7g29x-opensearch-2.13.0 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath opensearch ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/ygy0hp74sam5mfm2rjsnf6mhxkr7g29x-opensearch-2.13.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A opensearch https://github.com/r-ryantm/nixpkgs/archive/bb2278e4a0955e17066c76c98fe64541904591c5.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/bb2278e4a0955e17066c76c98fe64541904591c5#opensearch ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/ygy0hp74sam5mfm2rjsnf6mhxkr7g29x-opensearch-2.13.0 ls -la /nix/store/ygy0hp74sam5mfm2rjsnf6mhxkr7g29x-opensearch-2.13.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • opensearch
--- ###### Maintainer pings cc @shyim for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301122 [result] Success updating opensearch 2.12.0 -> 2.13.0 https://github.com/opensearch-project/OpenSearch/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath postgresql13JitPackages.pg_partman, using log file: /var/log/nixpkgs-update/postgresql13JitPackages.pg_partman/2024-04-03.log postgresql13JitPackages.pg_partman 5.0.1 -> 5.1.0 https://github.com/pgpartman/pg_partman/releases attrpath: postgresql13JitPackages.pg_partman Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/servers/sql/postgresql/ext/pg_partman.nix b/pkgs/servers/sql/postgresql/ext/pg_partman.nix index 10e899f810d0..87ee50411b75 100644 --- a/pkgs/servers/sql/postgresql/ext/pg_partman.nix +++ b/pkgs/servers/sql/postgresql/ext/pg_partman.nix @@ -2,7 +2,7 @@ stdenv.mkDerivation rec { pname = "pg_partman"; - version = "5.0.1"; + version = "5.1.0"; buildInputs = [ postgresql ]; @@ -10,7 +10,7 @@ stdenv.mkDerivation rec { owner = "pgpartman"; repo = pname; rev = "refs/tags/v${version}"; - sha256 = "sha256-sJODpyRgqpeg/Lb584wNgCCFRaH22ELcbof1bA612aw="; + sha256 = "sha256-GrVOJ5ywZMyqyDroYDLdKkXDdIJSDGhDfveO/ZvrmYs="; }; installPhase = '' [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A postgresql13JitPackages.pg_partman Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix --extra-experimental-features nix-command log -f . postgresql13JitPackages.pg_partman Standard output: error: … in the condition of the assert statement at /var/cache/nixpkgs-update/worker/worktree/postgresql13JitPackages.pg_partman/lib/customisation.nix:365:17: 364| in commonAttrs // { 365| drvPath = assert condition; drv.drvPath; | ^ 366| outPath = assert condition; drv.outPath; … while evaluating the attribute 'handled' at /var/cache/nixpkgs-update/worker/worktree/postgresql13JitPackages.pg_partman/pkgs/stdenv/generic/check-meta.nix:502:7: 501| # or, alternatively, just output a warning message. 502| handled = | ^ 503| ( (stack trace truncated; use '--show-trace' to show the full trace) error: Package ‘pg_partman-5.1.0’ in /var/cache/nixpkgs-update/worker/worktree/postgresql13JitPackages.pg_partman/pkgs/servers/sql/postgresql/ext/pg_partman.nix:26 is marked as broken, refusing to evaluate. a) To temporarily allow broken packages, you can use an environment variable for a single invocation of the nix tools. $ export NIXPKGS_ALLOW_BROKEN=1 Note: When using `nix shell`, `nix build`, `nix develop`, etc with a flake, then pass `--impure` in order to allow use of environment variables. b) For `nixos-rebuild` you can set { nixpkgs.config.allowBroken = true; } in configuration.nix to override this. c) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add { allowBroken = true; } to ~/.config/nixpkgs/config.nix. [result] Failed to update postgresql13JitPackages.pg_partman 5.0.1 -> 5.1.0 https://github.com/pgpartman/pg_partman/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath postgresql16Packages.pg_partman, using log file: /var/log/nixpkgs-update/postgresql16Packages.pg_partman/2024-04-03.log postgresql16Packages.pg_partman 5.0.1 -> 5.1.0 https://github.com/pgpartman/pg_partman/releases attrpath: postgresql16Packages.pg_partman Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/servers/sql/postgresql/ext/pg_partman.nix b/pkgs/servers/sql/postgresql/ext/pg_partman.nix index 10e899f810d0..87ee50411b75 100644 --- a/pkgs/servers/sql/postgresql/ext/pg_partman.nix +++ b/pkgs/servers/sql/postgresql/ext/pg_partman.nix @@ -2,7 +2,7 @@ stdenv.mkDerivation rec { pname = "pg_partman"; - version = "5.0.1"; + version = "5.1.0"; buildInputs = [ postgresql ]; @@ -10,7 +10,7 @@ stdenv.mkDerivation rec { owner = "pgpartman"; repo = pname; rev = "refs/tags/v${version}"; - sha256 = "sha256-sJODpyRgqpeg/Lb584wNgCCFRaH22ELcbof1bA612aw="; + sha256 = "sha256-GrVOJ5ywZMyqyDroYDLdKkXDdIJSDGhDfveO/ZvrmYs="; }; installPhase = '' [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/kx63496756khzm9h5fbdhd916qjr8hd2-pg_partman-5.1.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
4 packages marked as broken and skipped:
  • postgresql12JitPackages.pg_partman
  • postgresql12Packages.pg_partman
  • postgresql13JitPackages.pg_partman
  • postgresql13Packages.pg_partman
6 packages built:
  • postgresql14JitPackages.pg_partman
  • postgresql14Packages.pg_partman
  • postgresql15JitPackages.pg_partman
  • postgresql15Packages.pg_partman
  • postgresql16JitPackages.pg_partman
  • postgresql16Packages.pg_partman
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/pgpartman/pg_partman/releases. meta.description for postgresql16Packages.pg_partman is: Partition management extension for PostgreSQL meta.homepage for postgresql16Packages.pg_partman is: https://github.com/pgpartman/pg_partman meta.changelog for postgresql16Packages.pg_partman is: https://github.com/pgpartman/pg_partman/blob/v5.1.0/CHANGELOG.md ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 5.1.0 with grep in /nix/store/kx63496756khzm9h5fbdhd916qjr8hd2-pg_partman-5.1.0 - found 5.1.0 in filename of file in /nix/store/kx63496756khzm9h5fbdhd916qjr8hd2-pg_partman-5.1.0 ---
Rebuild report (if merged into master) (click to expand) ``` 12 total rebuild path(s) 12 package rebuild(s) First fifty rebuilds by attrpath postgresql12JitPackages.pg_partman postgresql12Packages.pg_partman postgresql13JitPackages.pg_partman postgresql13Packages.pg_partman postgresql14JitPackages.pg_partman postgresql14Packages.pg_partman postgresql15JitPackages.pg_partman postgresql15Packages.pg_partman postgresql16JitPackages.pg_partman postgresql16Packages.pg_partman postgresqlJitPackages.pg_partman postgresqlPackages.pg_partman ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/kx63496756khzm9h5fbdhd916qjr8hd2-pg_partman-5.1.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A postgresql16Packages.pg_partman https://github.com/r-ryantm/nixpkgs/archive/b4be900c31e56bae4d5356a3f0c3007990fc1138.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/b4be900c31e56bae4d5356a3f0c3007990fc1138#postgresql16Packages.pg_partman ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/kx63496756khzm9h5fbdhd916qjr8hd2-pg_partman-5.1.0 ls -la /nix/store/kx63496756khzm9h5fbdhd916qjr8hd2-pg_partman-5.1.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
4 packages marked as broken and skipped:
  • postgresql12JitPackages.pg_partman
  • postgresql12Packages.pg_partman
  • postgresql13JitPackages.pg_partman
  • postgresql13Packages.pg_partman
6 packages built:
  • postgresql14JitPackages.pg_partman
  • postgresql14Packages.pg_partman
  • postgresql15JitPackages.pg_partman
  • postgresql15Packages.pg_partman
  • postgresql16JitPackages.pg_partman
  • postgresql16Packages.pg_partman
--- ###### Maintainer pings cc @ggPeti for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301125 [result] Success updating postgresql16Packages.pg_partman 5.0.1 -> 5.1.0 https://github.com/pgpartman/pg_partman/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath postgresql15Packages.pg_partman, using log file: /var/log/nixpkgs-update/postgresql15Packages.pg_partman/2024-04-03.log postgresql15Packages.pg_partman 5.0.1 -> 5.1.0 https://github.com/pgpartman/pg_partman/releases attrpath: postgresql15Packages.pg_partman Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/servers/sql/postgresql/ext/pg_partman.nix b/pkgs/servers/sql/postgresql/ext/pg_partman.nix index 10e899f810d0..87ee50411b75 100644 --- a/pkgs/servers/sql/postgresql/ext/pg_partman.nix +++ b/pkgs/servers/sql/postgresql/ext/pg_partman.nix @@ -2,7 +2,7 @@ stdenv.mkDerivation rec { pname = "pg_partman"; - version = "5.0.1"; + version = "5.1.0"; buildInputs = [ postgresql ]; @@ -10,7 +10,7 @@ stdenv.mkDerivation rec { owner = "pgpartman"; repo = pname; rev = "refs/tags/v${version}"; - sha256 = "sha256-sJODpyRgqpeg/Lb584wNgCCFRaH22ELcbof1bA612aw="; + sha256 = "sha256-GrVOJ5ywZMyqyDroYDLdKkXDdIJSDGhDfveO/ZvrmYs="; }; installPhase = '' [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/r3fpc4sjdzhv2b2ky18iz78g76c3h37n-pg_partman-5.1.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
4 packages marked as broken and skipped:
  • postgresql12JitPackages.pg_partman
  • postgresql12Packages.pg_partman
  • postgresql13JitPackages.pg_partman
  • postgresql13Packages.pg_partman
6 packages built:
  • postgresql14JitPackages.pg_partman
  • postgresql14Packages.pg_partman
  • postgresql15JitPackages.pg_partman
  • postgresql15Packages.pg_partman
  • postgresql16JitPackages.pg_partman
  • postgresql16Packages.pg_partman
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/pgpartman/pg_partman/releases. meta.description for postgresql15Packages.pg_partman is: Partition management extension for PostgreSQL meta.homepage for postgresql15Packages.pg_partman is: https://github.com/pgpartman/pg_partman meta.changelog for postgresql15Packages.pg_partman is: https://github.com/pgpartman/pg_partman/blob/v5.1.0/CHANGELOG.md ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 5.1.0 with grep in /nix/store/r3fpc4sjdzhv2b2ky18iz78g76c3h37n-pg_partman-5.1.0 - found 5.1.0 in filename of file in /nix/store/r3fpc4sjdzhv2b2ky18iz78g76c3h37n-pg_partman-5.1.0 ---
Rebuild report (if merged into master) (click to expand) ``` 12 total rebuild path(s) 12 package rebuild(s) First fifty rebuilds by attrpath postgresql12JitPackages.pg_partman postgresql12Packages.pg_partman postgresql13JitPackages.pg_partman postgresql13Packages.pg_partman postgresql14JitPackages.pg_partman postgresql14Packages.pg_partman postgresql15JitPackages.pg_partman postgresql15Packages.pg_partman postgresql16JitPackages.pg_partman postgresql16Packages.pg_partman postgresqlJitPackages.pg_partman postgresqlPackages.pg_partman ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/r3fpc4sjdzhv2b2ky18iz78g76c3h37n-pg_partman-5.1.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A postgresql15Packages.pg_partman https://github.com/r-ryantm/nixpkgs/archive/a4639d85ae8ab52ad86f5bcbbc3a074dc78be1c0.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/a4639d85ae8ab52ad86f5bcbbc3a074dc78be1c0#postgresql15Packages.pg_partman ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/r3fpc4sjdzhv2b2ky18iz78g76c3h37n-pg_partman-5.1.0 ls -la /nix/store/r3fpc4sjdzhv2b2ky18iz78g76c3h37n-pg_partman-5.1.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
4 packages marked as broken and skipped:
  • postgresql12JitPackages.pg_partman
  • postgresql12Packages.pg_partman
  • postgresql13JitPackages.pg_partman
  • postgresql13Packages.pg_partman
6 packages built:
  • postgresql14JitPackages.pg_partman
  • postgresql14Packages.pg_partman
  • postgresql15JitPackages.pg_partman
  • postgresql15Packages.pg_partman
  • postgresql16JitPackages.pg_partman
  • postgresql16Packages.pg_partman
--- ###### Maintainer pings cc @ggPeti for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301128 [result] Success updating postgresql15Packages.pg_partman 5.0.1 -> 5.1.0 https://github.com/pgpartman/pg_partman/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO currently don't know how to update perl [result] Failed to update perl536Packages.CDDB_get 2.28 -> 2.28.1 https://repology.org/project/perl:cddb-get/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.pool, using log file: /var/log/nixpkgs-update/rPackages.pool/2024-04-03.log rPackages.pool 1.0.1 -> 1.0.3 https://repology.org/project/r:pool/versions attrpath: rPackages.pool Checking auto update branch... No auto update branch exists Old version 1.0.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.pool 1.0.1 -> 1.0.3 https://repology.org/project/r:pool/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.edk2-pytool-library, using log file: /var/log/nixpkgs-update/python312Packages.edk2-pytool-library/2024-04-03.log python312Packages.edk2-pytool-library 0.21.4 -> 0.21.5 https://github.com/tianocore/edk2-pytool-library/releases attrpath: python312Packages.edk2-pytool-library Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/7zwf0cjhzww8zw6r46hdvrxm8smdwycn-packages.json.drv building '/nix/store/7zwf0cjhzww8zw6r46hdvrxm8smdwycn-packages.json.drv'... Going to be running update for following packages: - python3.12-edk2-pytool-library-0.21.4 Press Enter key to continue... Running update for: - python3.12-edk2-pytool-library-0.21.4: UPDATING ... - python3.12-edk2-pytool-library-0.21.4: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/edk2-pytool-library/default.nix b/pkgs/development/python-modules/edk2-pytool-library/default.nix index 9fb346b0f135..9bf7320f9ec1 100644 --- a/pkgs/development/python-modules/edk2-pytool-library/default.nix +++ b/pkgs/development/python-modules/edk2-pytool-library/default.nix @@ -16,7 +16,7 @@ buildPythonPackage rec { pname = "edk2-pytool-library"; - version = "0.21.4"; + version = "0.21.5"; pyproject = true; disabled = pythonOlder "3.10"; @@ -25,7 +25,7 @@ buildPythonPackage rec { owner = "tianocore"; repo = "edk2-pytool-library"; rev = "refs/tags/v${version}"; - hash = "sha256-LzIK4GGVWAp4JXlKE7Mo0cPIH2srnJIlu36bzovNkwE="; + hash = "sha256-4Sb8Lu/nYUXgGt9gVv+j32cwW7TjXfH8z+fwzKaOeM8="; }; nativeBuildInputs = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/dd2bnbpimg9dvczqw0skmfixl5mhdx99-python3.12-edk2-pytool-library-0.21.5" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
4 packages built:
  • python311Packages.edk2-pytool-library
  • python311Packages.edk2-pytool-library.dist
  • python312Packages.edk2-pytool-library
  • python312Packages.edk2-pytool-library.dist
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from passthru.updateScript. meta.description for python312Packages.edk2-pytool-library is: Python library package that supports UEFI development meta.homepage for python312Packages.edk2-pytool-library is: https://github.com/tianocore/edk2-pytool-library meta.changelog for python312Packages.edk2-pytool-library is: https://github.com/tianocore/edk2-pytool-library/releases/tag/v0.21.5 ###### Updates performed - Ran passthru.UpdateScript ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.21.5 with grep in /nix/store/dd2bnbpimg9dvczqw0skmfixl5mhdx99-python3.12-edk2-pytool-library-0.21.5 - found 0.21.5 in filename of file in /nix/store/dd2bnbpimg9dvczqw0skmfixl5mhdx99-python3.12-edk2-pytool-library-0.21.5 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath python311Packages.edk2-pytool-library python312Packages.edk2-pytool-library ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/dd2bnbpimg9dvczqw0skmfixl5mhdx99-python3.12-edk2-pytool-library-0.21.5 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A python312Packages.edk2-pytool-library https://github.com/r-ryantm/nixpkgs/archive/b4945ec190b15994815854ffbb36cb10779ea0c8.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/b4945ec190b15994815854ffbb36cb10779ea0c8#python312Packages.edk2-pytool-library ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/dd2bnbpimg9dvczqw0skmfixl5mhdx99-python3.12-edk2-pytool-library-0.21.5 ls -la /nix/store/dd2bnbpimg9dvczqw0skmfixl5mhdx99-python3.12-edk2-pytool-library-0.21.5/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
4 packages built:
  • python311Packages.edk2-pytool-library
  • python311Packages.edk2-pytool-library.dist
  • python312Packages.edk2-pytool-library
  • python312Packages.edk2-pytool-library.dist
--- ###### Maintainer pings cc @NickCao for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301135 [result] Success updating python312Packages.edk2-pytool-library 0.21.4 -> 0.21.5 https://github.com/tianocore/edk2-pytool-library/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.scipy, using log file: /var/log/nixpkgs-update/python312Packages.scipy/2024-04-03.log python312Packages.scipy 1.12.0 -> 1.13.0 https://github.com/scipy/scipy/releases attrpath: python312Packages.scipy Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/q6cs6b0pidy351ff3098l0xa84clk58w-packages.json.drv building '/nix/store/q6cs6b0pidy351ff3098l0xa84clk58w-packages.json.drv'... Going to be running update for following packages: - python3.12-scipy-1.12.0 Press Enter key to continue... Running update for: - python3.12-scipy-1.12.0: UPDATING ... - python3.12-scipy-1.12.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/scipy/default.nix b/pkgs/development/python-modules/scipy/default.nix index 2870e5ec3bbd..d12539370d04 100644 --- a/pkgs/development/python-modules/scipy/default.nix +++ b/pkgs/development/python-modules/scipy/default.nix @@ -34,8 +34,8 @@ let # nix-shell maintainers/scripts/update.nix --argstr package python3.pkgs.scipy # # The update script uses sed regexes to replace them with the updated hashes. - version = "1.12.0"; - srcHash = "sha256-PuiyYTgSegDTV9Kae5N68FOXT1jyJrNv9p2aFP70Z20="; + version = "1.13.0"; + srcHash = "sha256-HaYk92hOREHMOXppK+Bs9DrBu9KUVUsZ0KV+isTofUo="; datasetsHashes = { ascent = "1qjp35ncrniq9rhzb14icwwykqg2208hcssznn3hz27w39615kh3"; ecg = "1bwbjp43b7znnwha5hv6wiz3g0bhwrpqpi75s12zidxrbwvd62pj"; No auto update branch exists [outpaths] eval start [outpaths] eval end Python package with too many package rebuilds 993 > 500 [result] Failed to update python312Packages.scipy 1.12.0 -> 1.13.0 https://github.com/scipy/scipy/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.volkszaehler, using log file: /var/log/nixpkgs-update/python312Packages.volkszaehler/2024-04-03.log python312Packages.volkszaehler 0.4.0 -> 0.5.0 https://github.com/home-assistant-ecosystem/python-volkszaehler/releases attrpath: python312Packages.volkszaehler Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/raziw0j86n4nvscb0jzza3pna1k9flsi-packages.json.drv building '/nix/store/raziw0j86n4nvscb0jzza3pna1k9flsi-packages.json.drv'... Going to be running update for following packages: - python3.12-volkszaehler-0.4.0 Press Enter key to continue... Running update for: - python3.12-volkszaehler-0.4.0: UPDATING ... - python3.12-volkszaehler-0.4.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/volkszaehler/default.nix b/pkgs/development/python-modules/volkszaehler/default.nix index dcb153ba98ca..8150c7d51eb6 100644 --- a/pkgs/development/python-modules/volkszaehler/default.nix +++ b/pkgs/development/python-modules/volkszaehler/default.nix @@ -8,7 +8,7 @@ buildPythonPackage rec { pname = "volkszaehler"; - version = "0.4.0"; + version = "0.5.0"; format = "setuptools"; disabled = pythonOlder "3.9"; @@ -17,7 +17,7 @@ buildPythonPackage rec { owner = "home-assistant-ecosystem"; repo = "python-volkszaehler"; rev = "refs/tags/${version}"; - hash = "sha256-jX0nwBsBYU383LG8f08FVI7Lo9gnyPSQ0fiEF8dQc/M="; + hash = "sha256-7SB0x0BO9SMeMG1M/hH4fX7oDbtwPgCzyRrrUq1/WPo="; }; propagatedBuildInputs = [ No auto update branch exists There might already be an open PR for this update: - python312Packages.volkszaehler: 0.4.0 -> 0.5.0 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/301067" [result] Failed to update python312Packages.volkszaehler 0.4.0 -> 0.5.0 https://github.com/home-assistant-ecosystem/python-volkszaehler/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.yalexs, using log file: /var/log/nixpkgs-update/python312Packages.yalexs/2024-04-03.log python312Packages.yalexs 3.0.0 -> 3.0.1 https://github.com/bdraco/yalexs/releases attrpath: python312Packages.yalexs Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/s7xq5njlksdk2qr53nzzzgyh7p25507v-packages.json.drv building '/nix/store/s7xq5njlksdk2qr53nzzzgyh7p25507v-packages.json.drv'... Going to be running update for following packages: - python3.12-yalexs-3.0.0 Press Enter key to continue... Running update for: - python3.12-yalexs-3.0.0: UPDATING ... - python3.12-yalexs-3.0.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/yalexs/default.nix b/pkgs/development/python-modules/yalexs/default.nix index 2111d5fa4d6b..252aea351b20 100644 --- a/pkgs/development/python-modules/yalexs/default.nix +++ b/pkgs/development/python-modules/yalexs/default.nix @@ -18,7 +18,7 @@ buildPythonPackage rec { pname = "yalexs"; - version = "3.0.0"; + version = "3.0.1"; pyproject = true; disabled = pythonOlder "3.9"; @@ -27,7 +27,7 @@ buildPythonPackage rec { owner = "bdraco"; repo = "yalexs"; rev = "refs/tags/v${version}"; - hash = "sha256-hY46hUUmbQUWmI+Oa9qIQ1rZdXT5daGo1Vd5JRKfDHE="; + hash = "sha256-+FdQQzQhKhIOEnOym2DNT9uQL2uAbfE8tUXUHIFFK2I="; }; postPatch = '' No auto update branch exists [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/mi4hlx97hw0svv2980zh089jlm829kgb-python3.12-yalexs-3.0.1" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
5 packages built:
  • home-assistant-component-tests.august
  • python311Packages.yalexs
  • python311Packages.yalexs.dist
  • python312Packages.yalexs
  • python312Packages.yalexs.dist
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from passthru.updateScript. meta.description for python312Packages.yalexs is: Python API for Yale Access (formerly August) Smart Lock and Doorbell meta.homepage for python312Packages.yalexs is: https://github.com/bdraco/yalexs meta.changelog for python312Packages.yalexs is: https://github.com/bdraco/yalexs/releases/tag/v3.0.1 ###### Updates performed - Ran passthru.UpdateScript ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 3.0.1 with grep in /nix/store/mi4hlx97hw0svv2980zh089jlm829kgb-python3.12-yalexs-3.0.1 - found 3.0.1 in filename of file in /nix/store/mi4hlx97hw0svv2980zh089jlm829kgb-python3.12-yalexs-3.0.1 ---
Rebuild report (if merged into master) (click to expand) ``` 3 total rebuild path(s) 3 package rebuild(s) First fifty rebuilds by attrpath home-assistant-component-tests.august python311Packages.yalexs python312Packages.yalexs ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/mi4hlx97hw0svv2980zh089jlm829kgb-python3.12-yalexs-3.0.1 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A python312Packages.yalexs https://github.com/r-ryantm/nixpkgs/archive/fc76c921a9de501348e28b82d6ae70a0a2f84f76.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/fc76c921a9de501348e28b82d6ae70a0a2f84f76#python312Packages.yalexs ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/mi4hlx97hw0svv2980zh089jlm829kgb-python3.12-yalexs-3.0.1 ls -la /nix/store/mi4hlx97hw0svv2980zh089jlm829kgb-python3.12-yalexs-3.0.1/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
5 packages built:
  • home-assistant-component-tests.august
  • python311Packages.yalexs
  • python311Packages.yalexs.dist
  • python312Packages.yalexs
  • python312Packages.yalexs.dist
--- ###### Maintainer pings cc @fabaff for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301139 [result] Success updating python312Packages.yalexs 3.0.0 -> 3.0.1 https://github.com/bdraco/yalexs/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath syn2mas, using log file: /var/log/nixpkgs-update/syn2mas/2024-04-03.log syn2mas 0.8.0 -> 0.9.0 https://github.com/matrix-org/matrix-authentication-service/releases attrpath: syn2mas Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] Replacing npmDepsHash with sha256-47tFcKgzH/2WEX99rs7F79TXBXjqVwEumg5aLkx86Fw= [npmDepsVersion] Finished updating NPM deps version and replacing hashes [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/by-name/sy/syn2mas/package.nix b/pkgs/by-name/sy/syn2mas/package.nix index 75fefef93689..38e78d4bf92b 100644 --- a/pkgs/by-name/sy/syn2mas/package.nix +++ b/pkgs/by-name/sy/syn2mas/package.nix @@ -5,18 +5,18 @@ buildNpmPackage rec { pname = "syn2mas"; - version = "0.8.0"; + version = "0.9.0"; src = fetchFromGitHub { owner = "matrix-org"; repo = "matrix-authentication-service"; rev = "v${version}"; - hash = "sha256-DPGigs6DifTRa7VQVHgizZ3BUy3FPX3YhZi++yoBFBA="; + hash = "sha256-e5JlkcSJ44iE+pVnGQpGiSNahxUcIFeaPyOjp9E3eD0="; }; sourceRoot = "${src.name}/tools/syn2mas"; - npmDepsHash = "sha256-HvBFuRyP1APg5V+yhvlODAJ02MEkdpuLfNjWB/UT2vg="; + npmDepsHash = "sha256-47tFcKgzH/2WEX99rs7F79TXBXjqVwEumg5aLkx86Fw="; dontBuild = true; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/7qil4wc8c317h5fa95aqbsjj0wz2c9bw-syn2mas-0.9.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • syn2mas
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/matrix-org/matrix-authentication-service/releases. meta.description for syn2mas is: Tool to help with the migration of a Matrix Synapse installation to the Matrix Authentication Service meta.homepage for syn2mas is: https://github.com/matrix-org/matrix-authentication-service/tree/main/tools/syn2mas ###### Updates performed - NPM version update ###### To inspect upstream changes - [Release on GitHub](https://github.com/matrix-org/matrix-authentication-service/releases/tag/v0.9.0) - [Compare changes on GitHub](https://github.com/matrix-org/matrix-authentication-service/compare/v0.8.0...v0.9.0) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.9.0 with grep in /nix/store/7qil4wc8c317h5fa95aqbsjj0wz2c9bw-syn2mas-0.9.0 - found 0.9.0 in filename of file in /nix/store/7qil4wc8c317h5fa95aqbsjj0wz2c9bw-syn2mas-0.9.0 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath syn2mas ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/7qil4wc8c317h5fa95aqbsjj0wz2c9bw-syn2mas-0.9.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A syn2mas https://github.com/r-ryantm/nixpkgs/archive/b42281928eae31f5af3b43e5605a3ad1f488ae86.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/b42281928eae31f5af3b43e5605a3ad1f488ae86#syn2mas ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/7qil4wc8c317h5fa95aqbsjj0wz2c9bw-syn2mas-0.9.0 ls -la /nix/store/7qil4wc8c317h5fa95aqbsjj0wz2c9bw-syn2mas-0.9.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • syn2mas
--- ###### Maintainer pings cc @teutat3s for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301146 [result] Success updating syn2mas 0.8.0 -> 0.9.0 https://github.com/matrix-org/matrix-authentication-service/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath networkminer, using log file: /var/log/nixpkgs-update/networkminer/2024-04-03.log networkminer 2.8 -> 2.8.1 https://repology.org/project/networkminer/versions attrpath: networkminer Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/7yvd83rszsj8pprcjz4mdk4akclh52il-NetworkMiner_2-8-1_source.zip.drv building '/nix/store/7yvd83rszsj8pprcjz4mdk4akclh52il-NetworkMiner_2-8-1_source.zip.drv'... trying https://archive.org/download/networkminer-2-8-1/NetworkMiner_2-8-1_source.zip % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- 0:00:03 --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download NetworkMiner_2-8-1_source.zip from any mirror error: builder for '/nix/store/7yvd83rszsj8pprcjz4mdk4akclh52il-NetworkMiner_2-8-1_source.zip.drv' failed with exit code 1; last 7 log lines: > > trying https://archive.org/download/networkminer-2-8-1/NetworkMiner_2-8-1_source.zip > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- 0:00:03 --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download NetworkMiner_2-8-1_source.zip from any mirror For full logs, run 'nix log /nix/store/7yvd83rszsj8pprcjz4mdk4akclh52il-NetworkMiner_2-8-1_source.zip.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'networkminer.originalSrc' not found stderr did not split as expected full stderr was: cannot link '/nix/store/.links/0lbg0yx0dbwkr5w8pyazqaf9k4j8cg5y29rlw3gn2mnmaw3x5zjd' to '/nix/store/l8pi7yvsks1qm8084p0slhs53bglg2zk-system.reflection.metadata.1.6.0.nupkg.drv': No space left on device cannot link '/nix/store/.links/1dwhaccyliy7ay319pd0s1w4fl70f8g48wbi2fdaz254q3fg8sna' to '/nix/store/afxr98vzyn905znij7idhvlrrqx7g2h5-System.Runtime.CompilerServices.Unsafe.6.0.0.nupkg.drv': No space left on device these 9 derivations will be built: /nix/store/3fkz534rsn03abix146kn28wh2nb7dia-NuGet.config.drv /nix/store/7yvd83rszsj8pprcjz4mdk4akclh52il-NetworkMiner_2-8-1_source.zip.drv /nix/store/8n89hf1rassz3g2j9448rv3lnddnia7m-networkminer-2.8.1-nuget-deps.drv /nix/store/vcmp3crqx2wgiffix5xngryrmhihm7l1-networkminer-2.8.1-dependencies-source.drv /nix/store/cfcy9fhsgjc3bl6j6rj17xfqpv6absx1-networkminer-2.8.1-nuget-source.drv /nix/store/bx92z1jj4asjcjpz8482bbgnn4hrpmcs-dotnet-configure-hook.drv /nix/store/d9azv6rxls54z9a5pqkyhfmsm6753yy5-roslyn-4.2.0.drv /nix/store/z0cgqqa4wifmdzdv2khwmgskawkwq7a4-msbuild-16.10.1+xamarinxplat.2021.05.26.14.00.drv /nix/store/g423zazj3i0rcp4is39d74p6lw6xs9hd-networkminer-2.8.1.drv these 278 paths will be fetched (467.34 MiB download, 816.38 MiB unpacked): /nix/store/7ji0bksikrlry5fcgf912lz0rlcijzfx-Microsoft.AspNetCore.App.Ref.3.1.10.nupkg /nix/store/kqhbf401pj7k3557zin5zj1a04i5m3f9-Microsoft.AspNetCore.App.Runtime.linux-arm64.3.1.32.nupkg /nix/store/fydk0gr3m84hivdykfrvldcliv0ggd9f-Microsoft.AspNetCore.App.Runtime.linux-x64.3.1.32.nupkg /nix/store/1k6sbxq0b74jby3zwa8p48d16aj3pr1g-Microsoft.AspNetCore.App.Runtime.osx-x64.3.1.32.nupkg /nix/store/hjp58byqjd42w8zv9hj019vrgqd7h36k-Microsoft.Build.Framework.16.5.0.nupkg /nix/store/mz6azkjmqvfc24khi32ifgl4jmbl0f9d-Microsoft.Build.Tasks.Core.16.5.0.nupkg /nix/store/dwfzgd0xz1wrvjrii632nvrjcisrv7ak-Microsoft.Build.Tasks.Git.1.2.0-beta-22167-02.nupkg /nix/store/69mjfhcx902hfws01p6hw9j51ryg5ffd-Microsoft.Build.Utilities.Core.16.5.0.nupkg /nix/store/j1nzi0z9zlmjzc0y9304bhs917h3s7ni-Microsoft.CodeAnalysis.BannedApiAnalyzers.3.3.4-beta1.22160.2.nupkg /nix/store/vsb7avsg3ii1ksnavh51dliywh4fgvlc-Microsoft.CodeAnalysis.NetAnalyzers.6.0.0-rc1.21366.2.nupkg /nix/store/65nd6z1mx42yqh5vwaf7b1xif7vjkfhh-Microsoft.CodeAnalysis.PerformanceSensitiveAnalyzers.3.3.4-beta1.22160.2.nupkg /nix/store/m549mj4q60shvasvr9g9izb5fj051lsi-Microsoft.CodeAnalysis.PublicApiAnalyzers.3.3.4-beta1.22160.2.nupkg /nix/store/d2pib94zl2z4f9whigh6mr2vdsivzk04-Microsoft.DiaSymReader.Native.17.0.0-beta1.21524.1.nupkg /nix/store/kiy1jwmri4dsbn5cc1a3rl78061xm954-Microsoft.DotNet.Arcade.Sdk.7.0.0-beta.22171.2.nupkg /nix/store/91x02l35nz3kp4hq4kacj92i8v9pc6sm-Microsoft.DotNet.XliffTasks.1.0.0-beta.22169.1.nupkg /nix/store/1m95x0r1mngdff7d5sknssd639c89bsq-Microsoft.NETCore.App.Host.linux-arm64.3.1.32.nupkg /nix/store/y6qpnww0kq7jkq68fh3p2ghar8pikznv-Microsoft.NETCore.App.Host.linux-x64.3.1.32.nupkg /nix/store/agdjkj43476yj0s04pyhfhmn162rbhn2-Microsoft.NETCore.App.Host.osx-x64.3.1.32.nupkg /nix/store/3s84v8mlmjibgyn58advha05hyfnw9zg-Microsoft.NETCore.App.Ref.3.1.0.nupkg /nix/store/apxr32p8hrn0fj3x9ps4spvz6rq0a2sf-Microsoft.NETCore.App.Runtime.linux-arm64.3.1.32.nupkg /nix/store/xb8fdx955w8jp220qqw5h76l5dyzjwmc-Microsoft.NETCore.App.Runtime.linux-x64.3.1.32.nupkg /nix/store/l64g3ngxrrklh2izwrj1q99mg0y7q4ax-Microsoft.NETCore.App.Runtime.osx-x64.3.1.32.nupkg /nix/store/ax5f91jgvbj87yv0kvd8vwypjcmcg44f-Microsoft.NETFramework.ReferenceAssemblies.net461.1.0.2.nupkg /nix/store/spg4sfbl8vzk70552mb21vsjkykn7wvv-Microsoft.NETFramework.ReferenceAssemblies.net472.1.0.2.nupkg /nix/store/mfmrrkqnpd5j9mqlw7vi908baywgcmv1-Microsoft.Net.Compilers.Toolset.4.2.0-1.final.nupkg /nix/store/rl33vqi0kj1hin56xyrp33xr1x1fzjd3-Microsoft.SourceLink.AzureRepos.Git.1.2.0-beta-22167-02.nupkg /nix/store/v294n1kscjg5b6xjz81i1l8m409gr5ap-Microsoft.SourceLink.Common.1.2.0-beta-22167-02.nupkg /nix/store/i7l1qfd5sj1g91dy666lj18gqbc67l7d-Microsoft.SourceLink.GitHub.1.2.0-beta-22167-02.nupkg /nix/store/zcp26g53rjdksinzdzjh03n2gfpwm4zq-Microsoft.VisualStudio.Setup.Configuration.Interop.1.16.30.nupkg /nix/store/16q6h2s8hpiaavj1mr7xk2i4wmkwy0q6-Microsoft.VisualStudio.Threading.Analyzers.17.2.20-alpha.nupkg /nix/store/wf248jxhmrlqqi0xz693lniqmyxr52nn-Nuget-6.6.1.2 /nix/store/cizdj98x1iday7q0wbsrm53xam1dzc2a-PowerShell.7.0.0.nupkg /nix/store/x02haycf4gqkjdmr1dxphl6cpyfz7q8l-RichCodeNav.EnvVarDump.0.1.1643-alpha.nupkg /nix/store/3llhsb5kdw8b4dvvqz45zzhlrq41c6hh-Roslyn.Diagnostics.Analyzers.3.3.4-beta1.22160.2.nupkg /nix/store/ppzdd25bs01a9kj6vss0jp03m1fmrrg0-System.IO.Pipes.AccessControl.5.0.0.nupkg /nix/store/1n1j46zpzz85da43k5wxcrb3ss44i1m3-System.Resources.Extensions.4.6.0.nupkg /nix/store/ndsch2bl56xnih2j098kc8ydraknbkwp-System.Resources.Writer.4.0.0.nupkg /nix/store/9x3rg46rvhf45xhvprpcaz7nza3pfhia-System.Threading.Tasks.Dataflow.4.9.0.nupkg /nix/store/yawky9skx7iiiflyzwi5nyv49qczm57l-benchmarkdotnet.0.12.1.nupkg /nix/store/f1hiszl5v4z0drf1gdj8yppwckivxgwf-benchmarkdotnet.annotations.0.12.1.nupkg /nix/store/scdwf0qfn6mkjq8cqmi4yz9qp8s6pzhq-commandlineparser.2.4.3.nupkg /nix/store/3kappfcrgdigaxj9vjkhwag86azxl7sk-dotnet-check-hook /nix/store/1y3qsspng70y9z88nmh722l8f8jr85am-dotnet-configure-hook /nix/store/6yjdgvfwfccy3rrr1fagvn8xgs064mwf-dotnet-fixup-hook /nix/store/rn3q8hhw6f1am2522f74vm11nkvzcws4-dotnet-format.6.2.315104.nupkg /nix/store/ixwdc19hs33360j8fdyi4mv6907r7iy6-fsharp.net.sdk.1.0.4-bundled-0100.nupkg /nix/store/s2s6agnvkqimn28bhikdfdwwswmxjzgz-iced.1.4.0.nupkg /nix/store/ilncfybi33z18p22inqiwxyi55xng0r5-illink.tasks.0.1.6-prerelease.20175.2.nupkg /nix/store/n93wrhv7igq47bwv83bcnyv8h3b60yjq-jnm2.referenceassemblies.net35.1.0.1.nupkg /nix/store/7znka8r6m5v0ximn7s7k6d1bzznvg969-largeaddressaware.1.0.5.nupkg /nix/store/1wl9crzima8hsil1y0z3f3zy13ik6z4l-microbuild.core.0.2.0.nupkg /nix/store/21yl6lagcmhaij1g2l8cpw18dvw7yrbj-microbuild.core.sentinel.1.0.0.nupkg /nix/store/c63v7cb176zfl8cj9jxq4hl357szzzqf-microsoft.bcl.asyncinterfaces.1.1.0.nupkg /nix/store/c5yiqylbnncnlps4d3g6f50iyap704b6-microsoft.build.14.3.0.nupkg /nix/store/hhm4sj4gfkkvlvf66c8lkk31nf9gig4y-microsoft.build.centralpackageversions.2.0.1.nupkg /nix/store/7zhxva42d6ijk6q1vwm66bivfwvcmsjm-microsoft.build.framework.14.3.0.nupkg /nix/store/lkfay30cba0a88idgfrli2n0359fa170-microsoft.build.framework.15.5.180.nupkg /nix/store/ngwaaz69q9jq5dl8k0azwr2874dx2iv6-microsoft.build.nugetsdkresolver.5.9.1-rc.8.nupkg /nix/store/cc3jz0pl2wn76jvsblbs9xrdqs717673-microsoft.build.tasks.git.1.1.0-beta-20206-02.nupkg /nix/store/yydd7j6yc8v2n3i3bg1c4p78x0cxivzr-microsoft.build.utilities.core.14.3.0.nupkg /nix/store/r1pfh63vahkpznwk6b0wjl4y40v952xd-microsoft.build.utilities.core.15.5.180.nupkg /nix/store/vkdpd2217yahadars0d3vg6z6xkgkya7-microsoft.codeanalysis.analyzers.2.6.1.nupkg /nix/store/i0dpdqz24q2x08d1qc849jfhrb7yd3n9-microsoft.codeanalysis.build.tasks.3.9.0-5.21112.8.nupkg /nix/store/1gbs2iqdl10m559qpmm62b50d9kclxgz-microsoft.codeanalysis.common.2.10.0.nupkg /nix/store/r4f9g0fzivncb031cgdk4jbgcmwzya55-microsoft.codeanalysis.csharp.2.10.0.nupkg /nix/store/hhln9mgsqmpx73mw7gbks1ffnf4gn5d5-microsoft.codecoverage.16.6.1.nupkg /nix/store/9z766i0x94bhcg4dvrddgqw9cwdkpjbs-microsoft.diagnostics.netcore.client.0.2.61701.nupkg /nix/store/2gx54ii3iwhkjix9apdpfx669yikmbi8-microsoft.diagnostics.runtime.1.1.57604.nupkg /nix/store/8jq4szv6nh3zqdl3w3p7lq96dv8akrxb-microsoft.diagnostics.tracing.traceevent.2.0.49.nupkg /nix/store/00hb59jb2sympx5bzzfin98rrqr8j1wj-microsoft.dotnet.arcade.sdk.5.0.0-beta.21226.1.nupkg /nix/store/aimj68k36216n2k5pqiq4s4n3181q4wp-microsoft.dotnet.msbuildsdkresolver.5.0.300-servicing.21267.11.nupkg /nix/store/4l67qhd3gwnz4y3psq8j1nhcl2xm1njj-microsoft.dotnet.platformabstractions.2.1.0.nupkg /nix/store/vd1wpxhcccqax90x9zwlj4k28jza0w0x-microsoft.dotnet.signtool.5.0.0-beta.21226.1.nupkg /nix/store/dj4vsp340pkmkva0c7gpbnpcf44myv26-microsoft.net.build.extensions.3.1.400-preview.20365.20.nupkg /nix/store/95g5y247jmx902j7yzdj63wb6nnpa5gn-microsoft.net.compilers.toolset.3.9.0-5.21112.8.nupkg /nix/store/s4m3jrhacbiq8lqim559bxmwcg697k1l-microsoft.net.sdk.3.1.400-preview.20365.20.nupkg /nix/store/1wkzw21pg7jymaqnp4fx173b0ikcqiay-microsoft.net.sdk.publish.3.1.300-servicing.20216.7.nupkg /nix/store/dy514cf3zwsf7rfj5kc6sim93a9n4qjl-microsoft.net.sdk.razor.3.1.6.nupkg /nix/store/yqi1sif62ql9nrq6gj8ls6c4h92nhzlx-microsoft.net.sdk.web.3.1.300-servicing.20216.7.nupkg /nix/store/cp0cfib9s5k3qrbr9im1jldb07xb3idh-microsoft.net.sdk.web.projectsystem.3.1.300-servicing.20216.7.nupkg /nix/store/2rkmrb9gngna71kjjmwky5vxl1qdjan0-microsoft.net.test.sdk.16.6.1.nupkg /nix/store/8jx7dmz8fpcf3gin436kdb0pgcpyk64l-microsoft.netcore.platforms.1.0.1.nupkg /nix/store/bllrbqcsi3gsnhl40rayhfmdkh5izxvw-microsoft.netcore.platforms.1.1.0.nupkg /nix/store/4d6n0b5jmnhm7b8xljpqj9daydcnia4x-microsoft.netcore.targets.1.0.1.nupkg /nix/store/45fddjcz9wdbrw833d9hjqda0gvs63z0-microsoft.netcore.targets.1.1.0.nupkg /nix/store/p8d3fp1dxfgsxkr4cvl2gv53zrmmy5xg-microsoft.netframework.referenceassemblies.1.0.0.nupkg /nix/store/6ikrv348f32ff6v465s1m4yyx9r1iaf6-microsoft.netframework.referenceassemblies.net45.1.0.0.nupkg /nix/store/c4025pk09q1pibdi2qfwb3mcagyb1h9m-microsoft.netframework.referenceassemblies.net472.1.0.0.nupkg /nix/store/4cki1hca7yhy207vcc0yx67ji3k6b33g-microsoft.sourcelink.azurerepos.git.1.1.0-beta-20206-02.nupkg /nix/store/lbnsl2rl0wa9jzlqa188w2nd5qggb5yq-microsoft.sourcelink.common.1.1.0-beta-20206-02.nupkg /nix/store/9pxzhlyhgsjznb16c3d7aq590h7ship2-microsoft.sourcelink.github.1.1.0-beta-20206-02.nupkg /nix/store/jkj3hca48aikzf6by77d6j2rfrfjwcw6-microsoft.symboluploader.build.task.1.1.145102.nupkg /nix/store/3risbjhqwda0x3yy88hnbj9h5vh0nf43-microsoft.visualstudio.sdk.embedinteroptypes.15.0.15.nupkg /nix/store/hw0zll6m7l9vmbckbrk0jj8f25lfd0bn-microsoft.visualstudio.setup.configuration.interop.1.16.30.nupkg /nix/store/zvgkghvhxvpdqjj5zq9f9398q7njcalz-microsoft.web.xdt.3.0.0.nupkg /nix/store/gq8qk42h0gccxzbnblnfkwxzjyl58hdd-microsoft.win32.primitives.4.0.1.nupkg /nix/store/iqr0pfyxmabpy95wylqbjl4jarhqw140-microsoft.win32.primitives.4.3.0.nupkg /nix/store/3ji7ky0ckgg8irr3aspmca7q90w4206n-microsoft.win32.registry.4.5.0.nupkg /nix/store/1ykpl7wxvja97rwwzyhs73ciy44s81c4-mono_msbuild_6.12.0.137.zip /nix/store/gg3gibwhdwkw5wf8w9v891ns41fp9nbf-msbuild-16.10.1+xamarinxplat.2021.05.26.14.00.tar.xz /nix/store/zkg1gkhqa32vmpkc6hjiznvlp36karf7-netstandard.library.1.6.1.nupkg /nix/store/98vmvdpnpsnr3sqjcm6d0v9ms1ys201r-newtonsoft.json.11.0.1.nupkg /nix/store/m9nxmc50mv0x9wag6iv7p5q6jz6cwwa3-newtonsoft.json.9.0.1.nupkg /nix/store/yyvxvmmp1fz3b0zxyd4mx5f9k79pxjyp-nuget.build.tasks.5.9.1-rc.8.nupkg /nix/store/ddd83kqfankm32y6dljmld33nlsm3w17-nuget.build.tasks.pack.5.9.1-rc.8.nupkg /nix/store/41c4c4k2fmcghxbfn8ky650ca6iqirls-nuget.commandline.4.1.0.nupkg /nix/store/zr8mfrpzdf1k7xwjv51f1fkrajyzviis-nuget.commands.5.9.1-rc.8.nupkg /nix/store/iv1ljmx2hlk83kv4daiz3n6l182w0kzd-nuget.common.5.9.1-rc.8.nupkg /nix/store/khvrz9kbds17fjgayl63jynhkfcvxwcm-nuget.configuration.5.9.1-rc.8.nupkg /nix/store/2s0sfdfm6xza6lpxxkmx6hqmvd51i4hr-nuget.credentials.5.9.1-rc.8.nupkg /nix/store/2ipmfki8275vp36r9lp25ij4yc74457a-nuget.dependencyresolver.core.5.9.1-rc.8.nupkg /nix/store/y2lws4gv7by44i8q48dxbk1k4x5vlsik-nuget.frameworks.5.9.1-rc.8.nupkg /nix/store/7fmzfsma08a2gq5f40pdzc1rgkg5d07b-nuget.librarymodel.5.9.1-rc.8.nupkg /nix/store/ayadi6l09aw2inxhfa0zcpgn5h0kjcfw-nuget.packagemanagement.5.9.1-rc.8.nupkg /nix/store/mms67i9mkarqq2rkqb237sp1m2ay0zn4-nuget.packaging.5.9.1-rc.8.nupkg /nix/store/j5lbdjlddslvgd2xyb81ix9dh489y79g-nuget.projectmodel.5.9.1-rc.8.nupkg /nix/store/p6bvad9haxrjp28a7lgii52ajfpk7xfw-nuget.protocol.5.9.1-rc.8.nupkg /nix/store/71fs78zk0y8xnn894y7w4jw1xihdqk5w-nuget.resolver.5.9.1-rc.8.nupkg /nix/store/lns5s28n318cvri4qn3ynll4psw8k390-nuget.versioning.5.9.1-rc.8.nupkg /nix/store/x3p32qs66ijvvnrg9ll443xvmbh2f2iw-perfolizer.0.2.1.nupkg /nix/store/7ddcwkiygzfpqxxvvwq2h0ipp5k2xrka-roslyn-4.2.0-dependencies-source /nix/store/j1s5dyh6aak1937cn70cgcsja9grzpyk-roslyn-4.2.0-nuget-deps /nix/store/yrir0y4rxqyf8pd061a0gzyjmbj1956h-roslyn-4.2.0-nuget-source /nix/store/jxgp8y9xzlar3y1sf5yvskd3jh4a1w0h-runtime.debian.8-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg /nix/store/269ccbm1g827k2yy35c28lm4h4kyygdm-runtime.fedora.23-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg /nix/store/5z0r556ssp5sdgmx3fh48crik2h07srw-runtime.fedora.24-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg /nix/store/8ig8938wjdmi4mcfb56wzbg0c2r5xbpb-runtime.native.system.4.0.0.nupkg /nix/store/33krwkb5xs0lvbhvvi85wkq3cbcaw6fs-runtime.native.system.4.3.0.nupkg /nix/store/mwh17dcmax4jfkf2k8jqii9gsblsw5jg-runtime.native.system.io.compression.4.3.0.nupkg /nix/store/i4lyiv6dcclvnk2x0q2x0pllp1yh91s2-runtime.native.system.security.cryptography.openssl.4.3.0.nupkg /nix/store/wnyafwc2iqrigcsg5yisn16pvg52s04c-runtime.opensuse.13.2-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg /nix/store/ngaxb45bxkvry4nd224dfhj7byfzxrsp-runtime.opensuse.42.1-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg /nix/store/p70h2c9dbra46rcymmhikrb939ysk8v5-runtime.osx.10.10-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg /nix/store/05j5h05mh30xwr8y5l5ik02myxcab67c-runtime.rhel.7-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg /nix/store/ddkidscdmm61lp98q7i4jpalbvvz1wna-runtime.ubuntu.14.04-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg /nix/store/8cma6yzh4ji5bsaqw6ccm35c3yf8sfaf-runtime.ubuntu.16.04-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg /nix/store/3s8svaicq063rk6wxwhgqinp1inkjc2f-runtime.ubuntu.16.10-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg /nix/store/8x33ypg46bbpyrdlzqpfnc9vgx2nkj48-shouldly.3.0.0.nupkg /nix/store/nwd16wpcwqdmnywa16zmk16vc6kpbh53-sn.1.0.0.nupkg /nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source /nix/store/spzxprnbl4ms26sa5zp1kksmc87kpizb-system.appcontext.4.1.0.nupkg /nix/store/51r08dpl1msq84iaw4b4j01nrc6fvzlg-system.appcontext.4.3.0.nupkg /nix/store/x58gkh4wxslh8li1qgy74i64p289m98i-system.buffers.4.3.0.nupkg /nix/store/a2cks60xysa6nhybhsqpamwgdxp5wl0i-system.buffers.4.4.0.nupkg /nix/store/825xgcl10agdvgz74fnlzsmir3dg1sp8-system.buffers.4.5.0.nupkg /nix/store/72q4vc5vxs6fvavc4q347d25dylw22zn-system.buffers.4.5.1.nupkg /nix/store/qjk55xxrg77rqlwdv2p82vzjj1qgabpd-system.collections.4.0.11.nupkg /nix/store/9ghgj90wfq6pr3x3jxrjj70l99zdll5m-system.collections.4.3.0.nupkg /nix/store/2ib6j9vmfly40c4i516pv2xzs7p9lnfz-system.collections.concurrent.4.0.12.nupkg /nix/store/04yby0vdh0rmv4f36l6by7n2iph54nbc-system.collections.concurrent.4.3.0.nupkg /nix/store/pi3vmvd8dd2l73dd3a991mw23w1dx4a4-system.collections.immutable.1.2.0.nupkg /nix/store/rlr1zhqzbsm3xphkx2gr8r7by2b7zys1-system.collections.immutable.1.5.0.nupkg /nix/store/lqwjpa4pvxvvi85ycl2nhxajfaxlri43-system.collections.immutable.5.0.0.nupkg /nix/store/2k87gr8mlvlialh27pgil3jl9fa9xpjl-system.collections.nongeneric.4.0.1.nupkg /nix/store/hq51flj0y1dhc97y6xnafbd5v6nfrhhq-system.configuration.configurationmanager.4.7.0.nupkg /nix/store/paizlrsb4h49rfxjcxl07cbhs2jwz842-system.console.4.0.0.nupkg /nix/store/z4sw0f34mbpq5mp5iwkq6pgi910q59y4-system.console.4.3.0.nupkg /nix/store/22rd6a1lpzzk5hnzppdariicz1s4baj8-system.diagnostics.debug.4.0.11.nupkg /nix/store/82al88hk41xlzgfnfwbh9hbhn15v699g-system.diagnostics.debug.4.3.0.nupkg /nix/store/jvw4s0pdqz8av8ygnydv4678gvj1zj4z-system.diagnostics.diagnosticsource.4.3.0.nupkg /nix/store/q0a9j4944lqy2vabqp8f4w60vqrdpi1k-system.diagnostics.fileversioninfo.4.3.0.nupkg /nix/store/04v5qdd63bcvnbqgfq55fqk46jy27kv2-system.diagnostics.process.4.1.0.nupkg /nix/store/4hix008f17fidi16mr34hy96fyc97bjn-system.diagnostics.stacktrace.4.3.0.nupkg /nix/store/qvicrks53qia61amsnyg29wm9iwjg6ba-system.diagnostics.tools.4.3.0.nupkg /nix/store/hvmbaj2f0i6ii4m7qv6bw0s44c3y66p3-system.diagnostics.tracesource.4.0.0.nupkg /nix/store/f444x63azs0yvbzczmk0aj90jdfxmygq-system.diagnostics.tracing.4.1.0.nupkg /nix/store/21px7pzw9m48y65rbd7kl4fiflp5vvf3-system.diagnostics.tracing.4.3.0.nupkg /nix/store/08xk4yc6hd5lwmgrvwdpm7zh8nmafc6c-system.dynamic.runtime.4.3.0.nupkg /nix/store/2fyqnd5la89rz4r9rhragk4krpcxr0n6-system.globalization.4.0.11.nupkg /nix/store/w9ngvaplg6a9skhi3ca2l8jg2vq0ka71-system.globalization.4.3.0.nupkg /nix/store/19i1kxpiddbap8bazl2r3z9z6q563cay-system.globalization.calendars.4.3.0.nupkg /nix/store/nv29wai902jxj12yzkh28kp4vd3v819x-system.io.4.1.0.nupkg /nix/store/jr1gjl99i8iqhhsc3hl5i9c9fdrk0n22-system.io.4.3.0.nupkg /nix/store/ngvrkcvcv2gniqxs1zhz17n65ff57qnj-system.io.compression.4.3.0.nupkg /nix/store/bpybhy7ghbczn188a3syggifwiipznpx-system.io.compression.zipfile.4.3.0.nupkg /nix/store/mh6dq6jka3dlyj641874zz0hklhrcx6h-system.io.filesystem.4.0.1.nupkg /nix/store/lwvc8f87vcl4sf9wxxcbkczr5k0gxb5a-system.io.filesystem.4.3.0.nupkg /nix/store/p72m87cjfqfzghpi5ha5rrsdly417w6j-system.io.filesystem.primitives.4.0.1.nupkg /nix/store/nq0yiy6qms80la1llnf4drmaflzzjzc9-system.io.filesystem.primitives.4.3.0.nupkg /nix/store/id07jnkizlbsgm49j65rw64qxwjbykwi-system.linq.4.1.0.nupkg /nix/store/1x4dagnwgf250bd65kp1h765qxrnxx8i-system.linq.4.3.0.nupkg /nix/store/avpczkxvfziyjnrnhckn0cjs929fs28v-system.linq.expressions.4.3.0.nupkg /nix/store/ph97svk2awki4kdddfy6fzqfw5w2n5a3-system.management.4.5.0.nupkg /nix/store/28r0qvyxixw7chnbzkyc4b43ygld731p-system.memory.4.5.3.nupkg /nix/store/bw0hlqiab05fg3j01xkb304gphs29594-system.memory.4.5.4.nupkg /nix/store/mk20zlgvk43hfxlkfjgbqzdf7i7h82ll-system.net.http.4.3.0.nupkg /nix/store/2pmrjbqf0m4m1ws0ifbgvrvvpc8xqhs5-system.net.primitives.4.3.0.nupkg /nix/store/a9c0xvbzmx2l3694x08yhxf7gv67if9w-system.net.sockets.4.3.0.nupkg /nix/store/amfsby0x84b9v1yxp50jiv81b6hv3hmv-system.numerics.vectors.4.4.0.nupkg /nix/store/kf9s3b9yw3piavc1lfm1adxphjihxlb5-system.numerics.vectors.4.5.0.nupkg /nix/store/c9jxb62q98r9xpfaai5ijjjv0vsn9xy9-system.objectmodel.4.0.12.nupkg /nix/store/k0i4djx44kzcwql2m09p9x7l7s1d52rs-system.objectmodel.4.3.0.nupkg /nix/store/qxcr212d1lgrssfcj5fy8kax3lfhr607-system.private.datacontractserialization.4.1.1.nupkg /nix/store/4nglscg75wsiz5a0kmsm31qwd5ls77y1-system.reflection.4.1.0.nupkg /nix/store/n1clqzxjbppaayr86p1dbkhgvlcks8z8-system.reflection.4.3.0.nupkg /nix/store/s5cf95f07hpm52d62rdrp9jc6wmmyfk3-system.reflection.emit.4.0.1.nupkg /nix/store/8s4b2z1a5p3b2rah97ivv368b69k1mwh-system.reflection.emit.4.3.0.nupkg /nix/store/p9y71h5gwh25sifn1rw2qzrcsgjssq9q-system.reflection.emit.ilgeneration.4.0.1.nupkg /nix/store/13nqysij7zaycdfxlhv900rhxmb5lsv8-system.reflection.emit.lightweight.4.0.1.nupkg /nix/store/kph5fkrydl1ckbs2ghi7im2gavxz55kd-system.reflection.emit.lightweight.4.3.0.nupkg /nix/store/h7x7avzmyls4cbdpfmwqmbrl7y73c6yc-system.reflection.extensions.4.0.1.nupkg /nix/store/lz3xllh22ga22kzd92zqrrsfcqsg8rbw-system.reflection.extensions.4.3.0.nupkg /nix/store/fflxh2jihn39mfgz7qh5qzbwq3cdjdvh-system.reflection.metadata.1.6.0.nupkg /nix/store/gk6gdwfxvya6zjq4qng560xv0zvkxl5p-system.reflection.metadata.5.0.0.nupkg /nix/store/zrh6m4h7nvjb02drb78j3yc1nzgkdr46-system.reflection.primitives.4.0.1.nupkg /nix/store/bpdpjnak1jgym56lxkd77cnp2h922sy9-system.reflection.primitives.4.3.0.nupkg /nix/store/1wxnskkc165r90v07jzarcsravvqcw6d-system.reflection.typeextensions.4.1.0.nupkg /nix/store/qydvv1lrki0svwl13msy2hp7rai39cxq-system.resources.extensions.4.6.0.nupkg /nix/store/qjmf51cm6qbc2ql7d5fqbbwkhayr96sa-system.resources.reader.4.0.0.nupkg /nix/store/j58azdlmhxxxiaq8jfqwq7i9hfr8r3zd-system.resources.resourcemanager.4.0.1.nupkg /nix/store/8vlczcgplh4v3cr1kcxybi5xsf03cw6y-system.resources.resourcemanager.4.3.0.nupkg /nix/store/49fynl59dq2wkwbjpz6ssp7k3rcdl5lq-system.runtime.4.1.0.nupkg /nix/store/5glj04h3pgdmfw5qnycnmllzhm6ad6dy-system.runtime.4.3.0.nupkg /nix/store/fp5a0f6ikzdk8nih2rqi1l6292fhhfwq-system.runtime.compilerservices.unsafe.5.0.0.nupkg /nix/store/sp8g6gpag0c2vfr5wnb380dgpa45xvbb-system.runtime.extensions.4.1.0.nupkg /nix/store/5flfynsiysp22rip6wv3pxjyf0000r0p-system.runtime.extensions.4.3.0.nupkg /nix/store/s8k3arsx1klr6sd6kfzkcsbgcjaqlvyf-system.runtime.handles.4.0.1.nupkg /nix/store/mw84ps060wnhc0466k1nqgx5mwl5z34w-system.runtime.handles.4.3.0.nupkg /nix/store/059lpkf9gkkm9dcqjrvw62crxwxavy3q-system.runtime.interopservices.4.1.0.nupkg /nix/store/p89nb9dw1s0mvcaaa5mz8zjvcl8xi5wz-system.runtime.interopservices.4.3.0.nupkg /nix/store/dbx73fcm2ww836mpijslnd3wp1bjgmz0-system.runtime.interopservices.runtimeinformation.4.0.0.nupkg /nix/store/cz72ak4zf7g8cck03pkd5p0kihzz2vkb-system.runtime.interopservices.runtimeinformation.4.3.0.nupkg /nix/store/vj36b1lnyryd16d3kmk8z8462fc3yj7r-system.runtime.numerics.4.3.0.nupkg /nix/store/na48nvinlc8gnv4j03i77hgrnm6mb95q-system.runtime.serialization.primitives.4.1.1.nupkg /nix/store/75k1acks1ly5hcp10bxpr12xv6j8pwkn-system.runtime.serialization.xml.4.1.1.nupkg /nix/store/6vy4ass9dbq91zy9ks52bx4na35svdlr-system.security.accesscontrol.4.5.0.nupkg /nix/store/nikmgdl52m1lcb9xd0l8w2axpqaww6di-system.security.accesscontrol.4.7.0.nupkg /nix/store/qrzsggyr5n50w14baxlqs9a14j4iqhq7-system.security.cryptography.algorithms.4.3.0.nupkg /nix/store/rj1wpijkj9cj8ygq4083h0g98s0g0az6-system.security.cryptography.encoding.4.3.0.nupkg /nix/store/ndwxw1a1d735g1y8x81nwirnilvdslq1-system.security.cryptography.primitives.4.3.0.nupkg /nix/store/c5ksclj5pcwy4pvmslza3lbhzx4047j3-system.security.cryptography.x509certificates.4.3.0.nupkg /nix/store/4x44a9bjy922m18231ivslxcj1fd0zss-system.security.permissions.4.7.0.nupkg /nix/store/yr7dzpkkxmjddygh73mr68h71bdy1akf-system.security.principal.windows.4.5.0.nupkg /nix/store/d70anp59kk15f6qkah9m3wz73i4r1318-system.security.principal.windows.4.7.0.nupkg /nix/store/f1zvah0y3jihvldbsfnv9kjnnyyjbkzx-system.text.encoding.4.0.11.nupkg /nix/store/sarfxpzalfb5pwqm80brd5mamjbpan4a-system.text.encoding.4.3.0.nupkg /nix/store/kfpd0cxqi8bhvas0gih7vy0a4j90p95y-system.text.encoding.codepages.4.0.1.nupkg /nix/store/xcvmb5r392qrj0whzqq0jrw9iqvcaw5c-system.text.encoding.codepages.4.3.0.nupkg /nix/store/kwb3scy3bcnsyllvnk3pmcwm4mkg9a8n-system.text.encoding.extensions.4.0.11.nupkg /nix/store/2bl8hcvasv97g837ida3w2jwbkfihzpb-system.text.encoding.extensions.4.3.0.nupkg /nix/store/3mlkr1vmxb8wv5srqrqzphw3dlf8g7dr-system.text.encodings.web.4.7.0.nupkg /nix/store/y455w5rhi993avvg2xx3k255afaxakcf-system.text.json.4.7.0.nupkg /nix/store/vm5fxmjc9mf7nl7cmw4sab8qnia6fkiz-system.text.regularexpressions.4.1.0.nupkg /nix/store/j55m920q4qkm63939l0j1mxjsslwz29k-system.text.regularexpressions.4.3.0.nupkg /nix/store/fp6im62w173pdiwkbk37q9f3rf5kv7p6-system.threading.4.0.11.nupkg /nix/store/8781mx9jrfr251clpryjbdw93w4j8bzl-system.threading.4.3.0.nupkg /nix/store/nhncf5kyh6xnqfaypjn45xly9hys91ba-system.threading.tasks.4.0.11.nupkg /nix/store/mcyfzshi28is6scsrvnsqcdasv45mi0c-system.threading.tasks.4.3.0.nupkg /nix/store/cldqlarngyq345427sfbisr7c8rfia6x-system.threading.tasks.dataflow.4.9.0.nupkg /nix/store/x2n7xdqi2gfvdvmzqd9q9qgsfd5iwsdd-system.threading.tasks.extensions.4.0.0.nupkg /nix/store/74hq5l3dyl2wvxv1zr59l39n54ix2lbn-system.threading.tasks.extensions.4.3.0.nupkg /nix/store/gjf45qx353x5wqxi6dlrd38nj1yp58qs-system.threading.tasks.extensions.4.5.2.nupkg /nix/store/a5l67w6dg8ifwkxb6qmhbfm34x4dbm86-system.threading.tasks.parallel.4.0.1.nupkg /nix/store/0l4bp5fxxmkv5cvw7h537fgqanxf6iic-system.threading.tasks.parallel.4.3.0.nupkg /nix/store/agaasmh1p7z1ba6rmv9prnq6k6k5mgwx-system.threading.thread.4.0.0.nupkg /nix/store/wdy4il54w8is7qiwx61a7md5k3g2024c-system.threading.thread.4.3.0.nupkg /nix/store/ckzm7lpgci0znh83sh511a0xhmd8aggq-system.threading.timer.4.0.1.nupkg /nix/store/qir1d7lcwzybvinimg5728lxzrxcgbz0-system.threading.timer.4.3.0.nupkg /nix/store/r7qi2jbdrkydzlbmf9jkmdvxk6jvg0w0-system.valuetuple.4.5.0.nupkg /nix/store/n01vaa56fi7bag69cfzy1jw6h07aw7fk-system.xml.readerwriter.4.0.11.nupkg /nix/store/nscbn8hschiyjn7l8qypa3w2y67iisx6-system.xml.readerwriter.4.3.0.nupkg /nix/store/nmdrkq6sq168vdky5946ps6indd7cj76-system.xml.xdocument.4.3.0.nupkg /nix/store/sk9xb28g3xldj61ldhmamr9ldbw5nc5i-system.xml.xmldocument.4.0.1.nupkg /nix/store/l04ym7fkpihzxkgrf1hcr5iyfybl0jgb-system.xml.xmldocument.4.3.0.nupkg /nix/store/y9jq486sdn91pgq37cpz4ysda8l6p8q4-system.xml.xmlserializer.4.0.11.nupkg /nix/store/305py95z4xw3dgjcqppasvb90pi3747m-system.xml.xpath.4.3.0.nupkg /nix/store/7l7k64mzm04f73az1ifg5mvyxy5zpgdn-system.xml.xpath.xdocument.4.3.0.nupkg /nix/store/zxjqcmdrc9ydclj11hqn65p9zr699yl1-vswhere.2.6.7.nupkg /nix/store/4hcxjdpizwgdykrc4pa03wxgfq093n1s-xlifftasks.1.0.0-beta.20502.2.nupkg /nix/store/ylp07l3hnvhj6a43b3x1vad493bx4k3a-xunit.2.4.1.nupkg /nix/store/d6l8gy48p1f8bwzd4gx5l3ml6bpmk364-xunit.abstractions.2.0.3.nupkg /nix/store/xfbcjvg6w50sigf3068w0lq7sf1flx3r-xunit.analyzers.0.10.0.nupkg /nix/store/knl2i4fx16774hw1llccaaz8mzz4pls1-xunit.assert.2.4.1.nupkg /nix/store/60xwv96xjc38nay897m0mpn0m76lyi2k-xunit.core.2.4.1.nupkg /nix/store/4dkvayxfnxnv9b69sc53d2cdsqkxp0m4-xunit.extensibility.core.2.4.1.nupkg /nix/store/z7nxqsbc6r5jp712x8nl9ypkflnj90sx-xunit.extensibility.execution.2.4.1.nupkg /nix/store/kcwjlr03fqjfdbkwd819rd2knh04pxb7-xunit.runner.console.2.4.1.nupkg /nix/store/k0zh2f2z1v3328ww2a1l179khfj7jbf3-xunit.runner.visualstudio.2.4.3.nupkg copying path '/nix/store/3kappfcrgdigaxj9vjkhwag86azxl7sk-dotnet-check-hook' from 'https://cache.nixos.org'... copying path '/nix/store/6yjdgvfwfccy3rrr1fagvn8xgs064mwf-dotnet-fixup-hook' from 'https://cache.nixos.org'... copying path '/nix/store/yawky9skx7iiiflyzwi5nyv49qczm57l-benchmarkdotnet.0.12.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/f1hiszl5v4z0drf1gdj8yppwckivxgwf-benchmarkdotnet.annotations.0.12.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/ixwdc19hs33360j8fdyi4mv6907r7iy6-fsharp.net.sdk.1.0.4-bundled-0100.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/scdwf0qfn6mkjq8cqmi4yz9qp8s6pzhq-commandlineparser.2.4.3.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/s2s6agnvkqimn28bhikdfdwwswmxjzgz-iced.1.4.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/ilncfybi33z18p22inqiwxyi55xng0r5-illink.tasks.0.1.6-prerelease.20175.2.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/n93wrhv7igq47bwv83bcnyv8h3b60yjq-jnm2.referenceassemblies.net35.1.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/7znka8r6m5v0ximn7s7k6d1bzznvg969-largeaddressaware.1.0.5.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/1wl9crzima8hsil1y0z3f3zy13ik6z4l-microbuild.core.0.2.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/21yl6lagcmhaij1g2l8cpw18dvw7yrbj-microbuild.core.sentinel.1.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/c63v7cb176zfl8cj9jxq4hl357szzzqf-microsoft.bcl.asyncinterfaces.1.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/hhm4sj4gfkkvlvf66c8lkk31nf9gig4y-microsoft.build.centralpackageversions.2.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/c5yiqylbnncnlps4d3g6f50iyap704b6-microsoft.build.14.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/7zhxva42d6ijk6q1vwm66bivfwvcmsjm-microsoft.build.framework.14.3.0.nupkg' from 'https://cache.nixos.org'... building '/nix/store/7yvd83rszsj8pprcjz4mdk4akclh52il-NetworkMiner_2-8-1_source.zip.drv'... building '/nix/store/3fkz534rsn03abix146kn28wh2nb7dia-NuGet.config.drv'... copying path '/nix/store/7ji0bksikrlry5fcgf912lz0rlcijzfx-Microsoft.AspNetCore.App.Ref.3.1.10.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/kqhbf401pj7k3557zin5zj1a04i5m3f9-Microsoft.AspNetCore.App.Runtime.linux-arm64.3.1.32.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/fydk0gr3m84hivdykfrvldcliv0ggd9f-Microsoft.AspNetCore.App.Runtime.linux-x64.3.1.32.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/1k6sbxq0b74jby3zwa8p48d16aj3pr1g-Microsoft.AspNetCore.App.Runtime.osx-x64.3.1.32.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/hjp58byqjd42w8zv9hj019vrgqd7h36k-Microsoft.Build.Framework.16.5.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/mz6azkjmqvfc24khi32ifgl4jmbl0f9d-Microsoft.Build.Tasks.Core.16.5.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/dwfzgd0xz1wrvjrii632nvrjcisrv7ak-Microsoft.Build.Tasks.Git.1.2.0-beta-22167-02.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/69mjfhcx902hfws01p6hw9j51ryg5ffd-Microsoft.Build.Utilities.Core.16.5.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/j1nzi0z9zlmjzc0y9304bhs917h3s7ni-Microsoft.CodeAnalysis.BannedApiAnalyzers.3.3.4-beta1.22160.2.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/vsb7avsg3ii1ksnavh51dliywh4fgvlc-Microsoft.CodeAnalysis.NetAnalyzers.6.0.0-rc1.21366.2.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/65nd6z1mx42yqh5vwaf7b1xif7vjkfhh-Microsoft.CodeAnalysis.PerformanceSensitiveAnalyzers.3.3.4-beta1.22160.2.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/m549mj4q60shvasvr9g9izb5fj051lsi-Microsoft.CodeAnalysis.PublicApiAnalyzers.3.3.4-beta1.22160.2.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/d2pib94zl2z4f9whigh6mr2vdsivzk04-Microsoft.DiaSymReader.Native.17.0.0-beta1.21524.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/kiy1jwmri4dsbn5cc1a3rl78061xm954-Microsoft.DotNet.Arcade.Sdk.7.0.0-beta.22171.2.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/91x02l35nz3kp4hq4kacj92i8v9pc6sm-Microsoft.DotNet.XliffTasks.1.0.0-beta.22169.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/1m95x0r1mngdff7d5sknssd639c89bsq-Microsoft.NETCore.App.Host.linux-arm64.3.1.32.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/y6qpnww0kq7jkq68fh3p2ghar8pikznv-Microsoft.NETCore.App.Host.linux-x64.3.1.32.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/agdjkj43476yj0s04pyhfhmn162rbhn2-Microsoft.NETCore.App.Host.osx-x64.3.1.32.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/3s84v8mlmjibgyn58advha05hyfnw9zg-Microsoft.NETCore.App.Ref.3.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/apxr32p8hrn0fj3x9ps4spvz6rq0a2sf-Microsoft.NETCore.App.Runtime.linux-arm64.3.1.32.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/xb8fdx955w8jp220qqw5h76l5dyzjwmc-Microsoft.NETCore.App.Runtime.linux-x64.3.1.32.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/l64g3ngxrrklh2izwrj1q99mg0y7q4ax-Microsoft.NETCore.App.Runtime.osx-x64.3.1.32.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/ax5f91jgvbj87yv0kvd8vwypjcmcg44f-Microsoft.NETFramework.ReferenceAssemblies.net461.1.0.2.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/spg4sfbl8vzk70552mb21vsjkykn7wvv-Microsoft.NETFramework.ReferenceAssemblies.net472.1.0.2.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/mfmrrkqnpd5j9mqlw7vi908baywgcmv1-Microsoft.Net.Compilers.Toolset.4.2.0-1.final.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/rl33vqi0kj1hin56xyrp33xr1x1fzjd3-Microsoft.SourceLink.AzureRepos.Git.1.2.0-beta-22167-02.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/v294n1kscjg5b6xjz81i1l8m409gr5ap-Microsoft.SourceLink.Common.1.2.0-beta-22167-02.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/i7l1qfd5sj1g91dy666lj18gqbc67l7d-Microsoft.SourceLink.GitHub.1.2.0-beta-22167-02.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/zcp26g53rjdksinzdzjh03n2gfpwm4zq-Microsoft.VisualStudio.Setup.Configuration.Interop.1.16.30.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/16q6h2s8hpiaavj1mr7xk2i4wmkwy0q6-Microsoft.VisualStudio.Threading.Analyzers.17.2.20-alpha.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/wf248jxhmrlqqi0xz693lniqmyxr52nn-Nuget-6.6.1.2' from 'https://cache.nixos.org'... copying path '/nix/store/cizdj98x1iday7q0wbsrm53xam1dzc2a-PowerShell.7.0.0.nupkg' from 'https://cache.nixos.org'... trying https://archive.org/download/networkminer-2-8-1/NetworkMiner_2-8-1_source.zip % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed copying path '/nix/store/x02haycf4gqkjdmr1dxphl6cpyfz7q8l-RichCodeNav.EnvVarDump.0.1.1643-alpha.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/3llhsb5kdw8b4dvvqz45zzhlrq41c6hh-Roslyn.Diagnostics.Analyzers.3.3.4-beta1.22160.2.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/ppzdd25bs01a9kj6vss0jp03m1fmrrg0-System.IO.Pipes.AccessControl.5.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/1n1j46zpzz85da43k5wxcrb3ss44i1m3-System.Resources.Extensions.4.6.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/ndsch2bl56xnih2j098kc8ydraknbkwp-System.Resources.Writer.4.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/9x3rg46rvhf45xhvprpcaz7nza3pfhia-System.Threading.Tasks.Dataflow.4.9.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/rn3q8hhw6f1am2522f74vm11nkvzcws4-dotnet-format.6.2.315104.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/lkfay30cba0a88idgfrli2n0359fa170-microsoft.build.framework.15.5.180.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/ngwaaz69q9jq5dl8k0azwr2874dx2iv6-microsoft.build.nugetsdkresolver.5.9.1-rc.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/cc3jz0pl2wn76jvsblbs9xrdqs717673-microsoft.build.tasks.git.1.1.0-beta-20206-02.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/yydd7j6yc8v2n3i3bg1c4p78x0cxivzr-microsoft.build.utilities.core.14.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/r1pfh63vahkpznwk6b0wjl4y40v952xd-microsoft.build.utilities.core.15.5.180.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/vkdpd2217yahadars0d3vg6z6xkgkya7-microsoft.codeanalysis.analyzers.2.6.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/i0dpdqz24q2x08d1qc849jfhrb7yd3n9-microsoft.codeanalysis.build.tasks.3.9.0-5.21112.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/1gbs2iqdl10m559qpmm62b50d9kclxgz-microsoft.codeanalysis.common.2.10.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/r4f9g0fzivncb031cgdk4jbgcmwzya55-microsoft.codeanalysis.csharp.2.10.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/hhln9mgsqmpx73mw7gbks1ffnf4gn5d5-microsoft.codecoverage.16.6.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/9z766i0x94bhcg4dvrddgqw9cwdkpjbs-microsoft.diagnostics.netcore.client.0.2.61701.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/2gx54ii3iwhkjix9apdpfx669yikmbi8-microsoft.diagnostics.runtime.1.1.57604.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/8jq4szv6nh3zqdl3w3p7lq96dv8akrxb-microsoft.diagnostics.tracing.traceevent.2.0.49.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/00hb59jb2sympx5bzzfin98rrqr8j1wj-microsoft.dotnet.arcade.sdk.5.0.0-beta.21226.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/aimj68k36216n2k5pqiq4s4n3181q4wp-microsoft.dotnet.msbuildsdkresolver.5.0.300-servicing.21267.11.nupkg' from 'https://cache.nixos.org'... 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 503 Warning: Problem : HTTP error. Will retry in 1 seconds. 3 retries left. copying path '/nix/store/4l67qhd3gwnz4y3psq8j1nhcl2xm1njj-microsoft.dotnet.platformabstractions.2.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/vd1wpxhcccqax90x9zwlj4k28jza0w0x-microsoft.dotnet.signtool.5.0.0-beta.21226.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/dj4vsp340pkmkva0c7gpbnpcf44myv26-microsoft.net.build.extensions.3.1.400-preview.20365.20.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/95g5y247jmx902j7yzdj63wb6nnpa5gn-microsoft.net.compilers.toolset.3.9.0-5.21112.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/s4m3jrhacbiq8lqim559bxmwcg697k1l-microsoft.net.sdk.3.1.400-preview.20365.20.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/1wkzw21pg7jymaqnp4fx173b0ikcqiay-microsoft.net.sdk.publish.3.1.300-servicing.20216.7.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/dy514cf3zwsf7rfj5kc6sim93a9n4qjl-microsoft.net.sdk.razor.3.1.6.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/yqi1sif62ql9nrq6gj8ls6c4h92nhzlx-microsoft.net.sdk.web.3.1.300-servicing.20216.7.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/cp0cfib9s5k3qrbr9im1jldb07xb3idh-microsoft.net.sdk.web.projectsystem.3.1.300-servicing.20216.7.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/2rkmrb9gngna71kjjmwky5vxl1qdjan0-microsoft.net.test.sdk.16.6.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/8jx7dmz8fpcf3gin436kdb0pgcpyk64l-microsoft.netcore.platforms.1.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/bllrbqcsi3gsnhl40rayhfmdkh5izxvw-microsoft.netcore.platforms.1.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/4d6n0b5jmnhm7b8xljpqj9daydcnia4x-microsoft.netcore.targets.1.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/45fddjcz9wdbrw833d9hjqda0gvs63z0-microsoft.netcore.targets.1.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/p8d3fp1dxfgsxkr4cvl2gv53zrmmy5xg-microsoft.netframework.referenceassemblies.1.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/6ikrv348f32ff6v465s1m4yyx9r1iaf6-microsoft.netframework.referenceassemblies.net45.1.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/c4025pk09q1pibdi2qfwb3mcagyb1h9m-microsoft.netframework.referenceassemblies.net472.1.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/4cki1hca7yhy207vcc0yx67ji3k6b33g-microsoft.sourcelink.azurerepos.git.1.1.0-beta-20206-02.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/lbnsl2rl0wa9jzlqa188w2nd5qggb5yq-microsoft.sourcelink.common.1.1.0-beta-20206-02.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/9pxzhlyhgsjznb16c3d7aq590h7ship2-microsoft.sourcelink.github.1.1.0-beta-20206-02.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/jkj3hca48aikzf6by77d6j2rfrfjwcw6-microsoft.symboluploader.build.task.1.1.145102.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/3risbjhqwda0x3yy88hnbj9h5vh0nf43-microsoft.visualstudio.sdk.embedinteroptypes.15.0.15.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/hw0zll6m7l9vmbckbrk0jj8f25lfd0bn-microsoft.visualstudio.setup.configuration.interop.1.16.30.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/zvgkghvhxvpdqjj5zq9f9398q7njcalz-microsoft.web.xdt.3.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/gq8qk42h0gccxzbnblnfkwxzjyl58hdd-microsoft.win32.primitives.4.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/iqr0pfyxmabpy95wylqbjl4jarhqw140-microsoft.win32.primitives.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/3ji7ky0ckgg8irr3aspmca7q90w4206n-microsoft.win32.registry.4.5.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/1ykpl7wxvja97rwwzyhs73ciy44s81c4-mono_msbuild_6.12.0.137.zip' from 'https://cache.nixos.org'... copying path '/nix/store/gg3gibwhdwkw5wf8w9v891ns41fp9nbf-msbuild-16.10.1+xamarinxplat.2021.05.26.14.00.tar.xz' from 'https://cache.nixos.org'... 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 503 Warning: Problem : HTTP error. Will retry in 2 seconds. 2 retries left. copying path '/nix/store/zkg1gkhqa32vmpkc6hjiznvlp36karf7-netstandard.library.1.6.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/98vmvdpnpsnr3sqjcm6d0v9ms1ys201r-newtonsoft.json.11.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/m9nxmc50mv0x9wag6iv7p5q6jz6cwwa3-newtonsoft.json.9.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/yyvxvmmp1fz3b0zxyd4mx5f9k79pxjyp-nuget.build.tasks.5.9.1-rc.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/ddd83kqfankm32y6dljmld33nlsm3w17-nuget.build.tasks.pack.5.9.1-rc.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/41c4c4k2fmcghxbfn8ky650ca6iqirls-nuget.commandline.4.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/zr8mfrpzdf1k7xwjv51f1fkrajyzviis-nuget.commands.5.9.1-rc.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/iv1ljmx2hlk83kv4daiz3n6l182w0kzd-nuget.common.5.9.1-rc.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/khvrz9kbds17fjgayl63jynhkfcvxwcm-nuget.configuration.5.9.1-rc.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/2s0sfdfm6xza6lpxxkmx6hqmvd51i4hr-nuget.credentials.5.9.1-rc.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/2ipmfki8275vp36r9lp25ij4yc74457a-nuget.dependencyresolver.core.5.9.1-rc.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/y2lws4gv7by44i8q48dxbk1k4x5vlsik-nuget.frameworks.5.9.1-rc.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/7fmzfsma08a2gq5f40pdzc1rgkg5d07b-nuget.librarymodel.5.9.1-rc.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/ayadi6l09aw2inxhfa0zcpgn5h0kjcfw-nuget.packagemanagement.5.9.1-rc.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/mms67i9mkarqq2rkqb237sp1m2ay0zn4-nuget.packaging.5.9.1-rc.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/j5lbdjlddslvgd2xyb81ix9dh489y79g-nuget.projectmodel.5.9.1-rc.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/p6bvad9haxrjp28a7lgii52ajfpk7xfw-nuget.protocol.5.9.1-rc.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/71fs78zk0y8xnn894y7w4jw1xihdqk5w-nuget.resolver.5.9.1-rc.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/lns5s28n318cvri4qn3ynll4psw8k390-nuget.versioning.5.9.1-rc.8.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/x3p32qs66ijvvnrg9ll443xvmbh2f2iw-perfolizer.0.2.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/jxgp8y9xzlar3y1sf5yvskd3jh4a1w0h-runtime.debian.8-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/269ccbm1g827k2yy35c28lm4h4kyygdm-runtime.fedora.23-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/5z0r556ssp5sdgmx3fh48crik2h07srw-runtime.fedora.24-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/8ig8938wjdmi4mcfb56wzbg0c2r5xbpb-runtime.native.system.4.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/33krwkb5xs0lvbhvvi85wkq3cbcaw6fs-runtime.native.system.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/mwh17dcmax4jfkf2k8jqii9gsblsw5jg-runtime.native.system.io.compression.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/i4lyiv6dcclvnk2x0q2x0pllp1yh91s2-runtime.native.system.security.cryptography.openssl.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/wnyafwc2iqrigcsg5yisn16pvg52s04c-runtime.opensuse.13.2-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/ngaxb45bxkvry4nd224dfhj7byfzxrsp-runtime.opensuse.42.1-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/p70h2c9dbra46rcymmhikrb939ysk8v5-runtime.osx.10.10-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/05j5h05mh30xwr8y5l5ik02myxcab67c-runtime.rhel.7-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/ddkidscdmm61lp98q7i4jpalbvvz1wna-runtime.ubuntu.14.04-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/8cma6yzh4ji5bsaqw6ccm35c3yf8sfaf-runtime.ubuntu.16.04-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/3s8svaicq063rk6wxwhgqinp1inkjc2f-runtime.ubuntu.16.10-x64.runtime.native.system.security.cryptography.openssl.4.3.0.nupkg' from 'https://cache.nixos.org'... building '/nix/store/8n89hf1rassz3g2j9448rv3lnddnia7m-networkminer-2.8.1-nuget-deps.drv'... copying path '/nix/store/8x33ypg46bbpyrdlzqpfnc9vgx2nkj48-shouldly.3.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/nwd16wpcwqdmnywa16zmk16vc6kpbh53-sn.1.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/spzxprnbl4ms26sa5zp1kksmc87kpizb-system.appcontext.4.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source' from 'https://cache.nixos.org'... copying path '/nix/store/51r08dpl1msq84iaw4b4j01nrc6fvzlg-system.appcontext.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/x58gkh4wxslh8li1qgy74i64p289m98i-system.buffers.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/a2cks60xysa6nhybhsqpamwgdxp5wl0i-system.buffers.4.4.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/825xgcl10agdvgz74fnlzsmir3dg1sp8-system.buffers.4.5.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/72q4vc5vxs6fvavc4q347d25dylw22zn-system.buffers.4.5.1.nupkg' from 'https://cache.nixos.org'... building '/nix/store/vcmp3crqx2wgiffix5xngryrmhihm7l1-networkminer-2.8.1-dependencies-source.drv'... copying path '/nix/store/qjk55xxrg77rqlwdv2p82vzjj1qgabpd-system.collections.4.0.11.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/04yby0vdh0rmv4f36l6by7n2iph54nbc-system.collections.concurrent.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/2ib6j9vmfly40c4i516pv2xzs7p9lnfz-system.collections.concurrent.4.0.12.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/9ghgj90wfq6pr3x3jxrjj70l99zdll5m-system.collections.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/pi3vmvd8dd2l73dd3a991mw23w1dx4a4-system.collections.immutable.1.2.0.nupkg' from 'https://cache.nixos.org'... building '/nix/store/cfcy9fhsgjc3bl6j6rj17xfqpv6absx1-networkminer-2.8.1-nuget-source.drv'... /nix/store/8vql4ijwjipfiwpayrl2jqmcl5qzy1h3-dotnet-sdk-6.0.420-source/share: licenses: /nix/store/gqcwlk9hg2a2mwdlzfx9q5l0ywap5731-networkminer-2.8.1-dependencies-source/share/licenses building '/nix/store/bx92z1jj4asjcjpz8482bbgnn4hrpmcs-dotnet-configure-hook.drv'... copying path '/nix/store/rlr1zhqzbsm3xphkx2gr8r7by2b7zys1-system.collections.immutable.1.5.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/lqwjpa4pvxvvi85ycl2nhxajfaxlri43-system.collections.immutable.5.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/2k87gr8mlvlialh27pgil3jl9fa9xpjl-system.collections.nongeneric.4.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/hq51flj0y1dhc97y6xnafbd5v6nfrhhq-system.configuration.configurationmanager.4.7.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/paizlrsb4h49rfxjcxl07cbhs2jwz842-system.console.4.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/z4sw0f34mbpq5mp5iwkq6pgi910q59y4-system.console.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/22rd6a1lpzzk5hnzppdariicz1s4baj8-system.diagnostics.debug.4.0.11.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/82al88hk41xlzgfnfwbh9hbhn15v699g-system.diagnostics.debug.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/jvw4s0pdqz8av8ygnydv4678gvj1zj4z-system.diagnostics.diagnosticsource.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/q0a9j4944lqy2vabqp8f4w60vqrdpi1k-system.diagnostics.fileversioninfo.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/04v5qdd63bcvnbqgfq55fqk46jy27kv2-system.diagnostics.process.4.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/4hix008f17fidi16mr34hy96fyc97bjn-system.diagnostics.stacktrace.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/qvicrks53qia61amsnyg29wm9iwjg6ba-system.diagnostics.tools.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/hvmbaj2f0i6ii4m7qv6bw0s44c3y66p3-system.diagnostics.tracesource.4.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/f444x63azs0yvbzczmk0aj90jdfxmygq-system.diagnostics.tracing.4.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/21px7pzw9m48y65rbd7kl4fiflp5vvf3-system.diagnostics.tracing.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/08xk4yc6hd5lwmgrvwdpm7zh8nmafc6c-system.dynamic.runtime.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/2fyqnd5la89rz4r9rhragk4krpcxr0n6-system.globalization.4.0.11.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/w9ngvaplg6a9skhi3ca2l8jg2vq0ka71-system.globalization.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/19i1kxpiddbap8bazl2r3z9z6q563cay-system.globalization.calendars.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/nv29wai902jxj12yzkh28kp4vd3v819x-system.io.4.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/jr1gjl99i8iqhhsc3hl5i9c9fdrk0n22-system.io.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/ngvrkcvcv2gniqxs1zhz17n65ff57qnj-system.io.compression.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/bpybhy7ghbczn188a3syggifwiipznpx-system.io.compression.zipfile.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/mh6dq6jka3dlyj641874zz0hklhrcx6h-system.io.filesystem.4.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/lwvc8f87vcl4sf9wxxcbkczr5k0gxb5a-system.io.filesystem.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/p72m87cjfqfzghpi5ha5rrsdly417w6j-system.io.filesystem.primitives.4.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/nq0yiy6qms80la1llnf4drmaflzzjzc9-system.io.filesystem.primitives.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/id07jnkizlbsgm49j65rw64qxwjbykwi-system.linq.4.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/1x4dagnwgf250bd65kp1h765qxrnxx8i-system.linq.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/avpczkxvfziyjnrnhckn0cjs929fs28v-system.linq.expressions.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/ph97svk2awki4kdddfy6fzqfw5w2n5a3-system.management.4.5.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/28r0qvyxixw7chnbzkyc4b43ygld731p-system.memory.4.5.3.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/bw0hlqiab05fg3j01xkb304gphs29594-system.memory.4.5.4.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/mk20zlgvk43hfxlkfjgbqzdf7i7h82ll-system.net.http.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/2pmrjbqf0m4m1ws0ifbgvrvvpc8xqhs5-system.net.primitives.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/a9c0xvbzmx2l3694x08yhxf7gv67if9w-system.net.sockets.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/amfsby0x84b9v1yxp50jiv81b6hv3hmv-system.numerics.vectors.4.4.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/kf9s3b9yw3piavc1lfm1adxphjihxlb5-system.numerics.vectors.4.5.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/c9jxb62q98r9xpfaai5ijjjv0vsn9xy9-system.objectmodel.4.0.12.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/k0i4djx44kzcwql2m09p9x7l7s1d52rs-system.objectmodel.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/qxcr212d1lgrssfcj5fy8kax3lfhr607-system.private.datacontractserialization.4.1.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/4nglscg75wsiz5a0kmsm31qwd5ls77y1-system.reflection.4.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/n1clqzxjbppaayr86p1dbkhgvlcks8z8-system.reflection.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/s5cf95f07hpm52d62rdrp9jc6wmmyfk3-system.reflection.emit.4.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/8s4b2z1a5p3b2rah97ivv368b69k1mwh-system.reflection.emit.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/p9y71h5gwh25sifn1rw2qzrcsgjssq9q-system.reflection.emit.ilgeneration.4.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/13nqysij7zaycdfxlhv900rhxmb5lsv8-system.reflection.emit.lightweight.4.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/kph5fkrydl1ckbs2ghi7im2gavxz55kd-system.reflection.emit.lightweight.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/h7x7avzmyls4cbdpfmwqmbrl7y73c6yc-system.reflection.extensions.4.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/lz3xllh22ga22kzd92zqrrsfcqsg8rbw-system.reflection.extensions.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/fflxh2jihn39mfgz7qh5qzbwq3cdjdvh-system.reflection.metadata.1.6.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/gk6gdwfxvya6zjq4qng560xv0zvkxl5p-system.reflection.metadata.5.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/zrh6m4h7nvjb02drb78j3yc1nzgkdr46-system.reflection.primitives.4.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/bpdpjnak1jgym56lxkd77cnp2h922sy9-system.reflection.primitives.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/1wxnskkc165r90v07jzarcsravvqcw6d-system.reflection.typeextensions.4.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/qydvv1lrki0svwl13msy2hp7rai39cxq-system.resources.extensions.4.6.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/qjmf51cm6qbc2ql7d5fqbbwkhayr96sa-system.resources.reader.4.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/j58azdlmhxxxiaq8jfqwq7i9hfr8r3zd-system.resources.resourcemanager.4.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/8vlczcgplh4v3cr1kcxybi5xsf03cw6y-system.resources.resourcemanager.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/49fynl59dq2wkwbjpz6ssp7k3rcdl5lq-system.runtime.4.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/5glj04h3pgdmfw5qnycnmllzhm6ad6dy-system.runtime.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/fp5a0f6ikzdk8nih2rqi1l6292fhhfwq-system.runtime.compilerservices.unsafe.5.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/sp8g6gpag0c2vfr5wnb380dgpa45xvbb-system.runtime.extensions.4.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/5flfynsiysp22rip6wv3pxjyf0000r0p-system.runtime.extensions.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/s8k3arsx1klr6sd6kfzkcsbgcjaqlvyf-system.runtime.handles.4.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/mw84ps060wnhc0466k1nqgx5mwl5z34w-system.runtime.handles.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/059lpkf9gkkm9dcqjrvw62crxwxavy3q-system.runtime.interopservices.4.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/p89nb9dw1s0mvcaaa5mz8zjvcl8xi5wz-system.runtime.interopservices.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/dbx73fcm2ww836mpijslnd3wp1bjgmz0-system.runtime.interopservices.runtimeinformation.4.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/cz72ak4zf7g8cck03pkd5p0kihzz2vkb-system.runtime.interopservices.runtimeinformation.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/vj36b1lnyryd16d3kmk8z8462fc3yj7r-system.runtime.numerics.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/na48nvinlc8gnv4j03i77hgrnm6mb95q-system.runtime.serialization.primitives.4.1.1.nupkg' from 'https://cache.nixos.org'... 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 503 Warning: Problem : HTTP error. Will retry in 4 seconds. 1 retries left. copying path '/nix/store/75k1acks1ly5hcp10bxpr12xv6j8pwkn-system.runtime.serialization.xml.4.1.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/6vy4ass9dbq91zy9ks52bx4na35svdlr-system.security.accesscontrol.4.5.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/nikmgdl52m1lcb9xd0l8w2axpqaww6di-system.security.accesscontrol.4.7.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/qrzsggyr5n50w14baxlqs9a14j4iqhq7-system.security.cryptography.algorithms.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/rj1wpijkj9cj8ygq4083h0g98s0g0az6-system.security.cryptography.encoding.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/ndwxw1a1d735g1y8x81nwirnilvdslq1-system.security.cryptography.primitives.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/c5ksclj5pcwy4pvmslza3lbhzx4047j3-system.security.cryptography.x509certificates.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/4x44a9bjy922m18231ivslxcj1fd0zss-system.security.permissions.4.7.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/yr7dzpkkxmjddygh73mr68h71bdy1akf-system.security.principal.windows.4.5.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/d70anp59kk15f6qkah9m3wz73i4r1318-system.security.principal.windows.4.7.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/f1zvah0y3jihvldbsfnv9kjnnyyjbkzx-system.text.encoding.4.0.11.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/sarfxpzalfb5pwqm80brd5mamjbpan4a-system.text.encoding.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/kfpd0cxqi8bhvas0gih7vy0a4j90p95y-system.text.encoding.codepages.4.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/xcvmb5r392qrj0whzqq0jrw9iqvcaw5c-system.text.encoding.codepages.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/kwb3scy3bcnsyllvnk3pmcwm4mkg9a8n-system.text.encoding.extensions.4.0.11.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/2bl8hcvasv97g837ida3w2jwbkfihzpb-system.text.encoding.extensions.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/3mlkr1vmxb8wv5srqrqzphw3dlf8g7dr-system.text.encodings.web.4.7.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/y455w5rhi993avvg2xx3k255afaxakcf-system.text.json.4.7.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/vm5fxmjc9mf7nl7cmw4sab8qnia6fkiz-system.text.regularexpressions.4.1.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/j55m920q4qkm63939l0j1mxjsslwz29k-system.text.regularexpressions.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/fp6im62w173pdiwkbk37q9f3rf5kv7p6-system.threading.4.0.11.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/8781mx9jrfr251clpryjbdw93w4j8bzl-system.threading.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/nhncf5kyh6xnqfaypjn45xly9hys91ba-system.threading.tasks.4.0.11.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/mcyfzshi28is6scsrvnsqcdasv45mi0c-system.threading.tasks.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/cldqlarngyq345427sfbisr7c8rfia6x-system.threading.tasks.dataflow.4.9.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/x2n7xdqi2gfvdvmzqd9q9qgsfd5iwsdd-system.threading.tasks.extensions.4.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/74hq5l3dyl2wvxv1zr59l39n54ix2lbn-system.threading.tasks.extensions.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/gjf45qx353x5wqxi6dlrd38nj1yp58qs-system.threading.tasks.extensions.4.5.2.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/a5l67w6dg8ifwkxb6qmhbfm34x4dbm86-system.threading.tasks.parallel.4.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/0l4bp5fxxmkv5cvw7h537fgqanxf6iic-system.threading.tasks.parallel.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/agaasmh1p7z1ba6rmv9prnq6k6k5mgwx-system.threading.thread.4.0.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/wdy4il54w8is7qiwx61a7md5k3g2024c-system.threading.thread.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/ckzm7lpgci0znh83sh511a0xhmd8aggq-system.threading.timer.4.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/qir1d7lcwzybvinimg5728lxzrxcgbz0-system.threading.timer.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/r7qi2jbdrkydzlbmf9jkmdvxk6jvg0w0-system.valuetuple.4.5.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/n01vaa56fi7bag69cfzy1jw6h07aw7fk-system.xml.readerwriter.4.0.11.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/nscbn8hschiyjn7l8qypa3w2y67iisx6-system.xml.readerwriter.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/nmdrkq6sq168vdky5946ps6indd7cj76-system.xml.xdocument.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/sk9xb28g3xldj61ldhmamr9ldbw5nc5i-system.xml.xmldocument.4.0.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/l04ym7fkpihzxkgrf1hcr5iyfybl0jgb-system.xml.xmldocument.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/y9jq486sdn91pgq37cpz4ysda8l6p8q4-system.xml.xmlserializer.4.0.11.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/305py95z4xw3dgjcqppasvb90pi3747m-system.xml.xpath.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/7l7k64mzm04f73az1ifg5mvyxy5zpgdn-system.xml.xpath.xdocument.4.3.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/zxjqcmdrc9ydclj11hqn65p9zr699yl1-vswhere.2.6.7.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/4hcxjdpizwgdykrc4pa03wxgfq093n1s-xlifftasks.1.0.0-beta.20502.2.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/ylp07l3hnvhj6a43b3x1vad493bx4k3a-xunit.2.4.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/d6l8gy48p1f8bwzd4gx5l3ml6bpmk364-xunit.abstractions.2.0.3.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/xfbcjvg6w50sigf3068w0lq7sf1flx3r-xunit.analyzers.0.10.0.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/knl2i4fx16774hw1llccaaz8mzz4pls1-xunit.assert.2.4.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/60xwv96xjc38nay897m0mpn0m76lyi2k-xunit.core.2.4.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/4dkvayxfnxnv9b69sc53d2cdsqkxp0m4-xunit.extensibility.core.2.4.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/z7nxqsbc6r5jp712x8nl9ypkflnj90sx-xunit.extensibility.execution.2.4.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/kcwjlr03fqjfdbkwd819rd2knh04pxb7-xunit.runner.console.2.4.1.nupkg' from 'https://cache.nixos.org'... copying path '/nix/store/k0zh2f2z1v3328ww2a1l179khfj7jbf3-xunit.runner.visualstudio.2.4.3.nupkg' from 'https://cache.nixos.org'... cannot link '/nix/store/.links/0934vnj3nr2k1v9cnc6vppwwq0xq2vsv9nr75nzll4mljjqjk6k0' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/eng/common/SetupNugetSources.sh': No space left on device cannot link '/nix/store/.links/010g36w901q21aza2d5v29zs22pcypnjq21g7n2cqqk9fqw75md9' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/eng/common/templates/post-build/common-variables.yml': No space left on device cannot link '/nix/store/.links/05048jvmcxvbpaaadiz28gvzi16ksr44li55yvd3pq5j1ryp0w76' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/CodeStyle/Core/Analyzers/xlf/CodeStyleResources.fr.xlf': No space left on device cannot link '/nix/store/.links/0f0157kibrascs35p959hs3zkvq4sfjdddsh3mz29kpp1gv27mgf' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/Lsif/Generator/Graph/Edge.cs': No space left on device cannot link '/nix/store/.links/070wbizmkl5xmkjx5q9ihf6ip6bvsvfskmc8bs5qjxfsaaf7shzn' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/Core/Portable/Wrapping/AbstractWrappingCodeRefactoringProvider.cs': No space left on device cannot link '/nix/store/.links/02461m5pizw3pssyhch4di10ck2mxm93x3jm9b5k2rw31cla9ccq' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/Core/Portable/RQName/ParenthesesTreeWriter.cs': No space left on device cannot link '/nix/store/.links/066vaazx4c92ls1h252p8qh463b2dk13g7mmz57yinfhnlm9d6g4' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/Core/Portable/Structure/BlockStructureProvider.cs': No space left on device cannot link '/nix/store/.links/0gz8k8bijhxkikfgrzar8p3n3kx9fjh5sdn1cr1xp9549cridbqi' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/Core/Portable/FindUsages/DefinitionItem.DetachedDefinitionItem.cs': No space left on device cannot link '/nix/store/.links/1zxhkmzad7802i0avml1a701ykkh8f5gh1iyg5kdjmq5smsz0698' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/Core/Portable/LanguageServiceIndexFormat/SymbolMoniker.cs': No space left on device cannot link '/nix/store/.links/0siqxc7kbrf109h45gwdvswwscfgzssqbrbbsq64n7ik517mvm1b' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/Core/Portable/EmbeddedLanguages/StackFrame/StackFrameParser.cs': No space left on device cannot link '/nix/store/.links/1975ivyr1i2pqawck3hwa5749nf8vyvlq9j22ps09zxq66h97a0l' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/Core/Portable/GenerateDefaultConstructors/AbstractGenerateDefaultConstructorsService.CodeActionAll.cs': No space left on device cannot link '/nix/store/.links/04y17hq3h3i6chqrlc3vzkj1d0siha59xpaf42pnf58j7p39d9ss' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/Core/Portable/CodeLens/ICodeLensDisplayInfoService.cs': No space left on device cannot link '/nix/store/.links/1zm7af7yjadxl6d4igs2vmfwjjnmvwbgxajyggb1cm2yah5ipy9l' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/Core/Portable/MetadataAsSource/IMetadataAsSourceService.cs': No space left on device cannot link '/nix/store/.links/06ygvi0faikf2ppsf8nvyw2z2as1fmwp04wgj071l378xzab0ck1' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/Core/Portable/MetadataAsSource/MetadataAsSourceHelpers.cs': No space left on device cannot link '/nix/store/.links/04qggsgn4fjr130dlqrbd7l22143jafga23nh9hqsj3h20hr0hv9' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/Core/Portable/CodeFixes/Configuration/ConfigureCodeStyle/ConfigureCodeStyleOptionCodeFixProvider.TopLevelConfigureCodeStyleOptionCodeAction.cs': No space left on device cannot link '/nix/store/.links/0yi7mgpbzwckfcgs7prarky8fzkqh1y5cd116y7ghcq48nmima02' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/CSharp/Portable/ConvertLinq/CSharpConvertLinqQueryToForEachProvider.cs': No space left on device cannot link '/nix/store/.links/0198i3mbqrlkr671xv8z6cbq747v42n9a8yir1iyg0c85jrswn47' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/CSharp/Portable/UseExpressionBodyForLambda/UseExpressionBodyForLambdaCodeStyleProvider_Fixing.cs': No space left on device cannot link '/nix/store/.links/1z07wqr9ph26d1s1cldjrva58fnnx3qbfnjsp2cgs86dx8fyp15a' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/CSharp/Portable/GenerateMember/GenerateParameterizedMember/CSharpGenerateParameterizedMemberService.cs': No space left on device cannot link '/nix/store/.links/0pw6ik9r81c62h5wzf4bapg8f71ijsp0b42pg3niifbl2l2x4ggs' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/CSharp/Portable/Completion/KeywordRecommenders/RefKeywordRecommender.cs': No space left on device cannot link '/nix/store/.links/19ildybspi7mp6q2vnxy1c0jp0lyblxga8ld8k9n7ma1751cdxab' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/CSharp/Portable/CodeFixes/RemoveNewModifier/RemoveNewModifierCodeFixProvider.cs': No space left on device cannot link '/nix/store/.links/0df28wf3rvxg001sv4sniilph2n5q36k1v3lppsq2zbxlrinlkj2' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/VisualBasic/Portable/AddParameter/VisualBasicAddParameterCodeFixProvider.vb': No space left on device cannot link '/nix/store/.links/1bi6j2y3xa9kcnfxwfc39wzajxn608h0w755vp1k35d9ngb9kf0p' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Features/VisualBasic/Portable/xlf/VBFeaturesResources.ru.xlf': No space left on device cannot link '/nix/store/.links/1910in9mkzybdqh4f71p51i0dq68k8rjs2jwjc9crhhvycg5a74s' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/EditorFeatures/Core.Wpf/Peek/PeekableItemFactory.cs': No space left on device cannot link '/nix/store/.links/0axl83lp8n6wvw9y7sb5pmfjp38waqrxp9dw1ay34ww0a0j4xpml' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/EditorFeatures/VisualBasicTest/CodeActions/EncapsulateField/EncapsulateFieldTests.vb': No space left on device cannot link '/nix/store/.links/1rliw1q79jhyz2s54ilx86b3jkfxvmxcv95b8cinjw8g1zhffgyk' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/EditorFeatures/Test2/Rename/CSharp/LocalConflictTests.vb': No space left on device cannot link '/nix/store/.links/09q0ihi38zlqbkbpz097j7nh8qwwgmaiaqcdzv1cghvnm1q58kn7' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/EditorFeatures/Test2/Workspaces/TryFindSourceDefinitionTests.vb': No space left on device cannot link '/nix/store/.links/060ii5h0q8bvmf5ap6vyw9i5cb4xsndnar228anmy6gcx336hg0p' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/EditorFeatures/Test2/InteractivePaste/InteractivePasteCommandHandlerTests.vb': No space left on device cannot link '/nix/store/.links/0r1ra3mah7fm35q8x0zi0vv9hkj5hmapnk8fr9ibb928wd2niqqs' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/EditorFeatures/CSharpTest2/Recommendations/ContinueKeywordRecommenderTests.cs': No space left on device cannot link '/nix/store/.links/1xz3vsbv3kgvvjg0bmz6bnwzxinyz4xqvdqd9l7sv8f9nx71fk7n' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/EditorFeatures/CSharpTest2/Recommendations/RefKeywordRecommenderTests.cs': No space left on device cannot link '/nix/store/.links/16bws64h7qn77p91kfpbbs8bqbnwikykffc4lqsqadv4vicdshgd' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/EditorFeatures/CSharpTest2/Recommendations/AnnotationsKeywordRecommenderTests.cs': No space left on device cannot link '/nix/store/.links/1wkcc99v9al4mgyr4gp93qq790d7m76l64gxjrl27sqijzl22mqh' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/EditorFeatures/CSharpTest2/Recommendations/PropertyKeywordRecommenderTests.cs': No space left on device cannot link '/nix/store/.links/0b1idz9k0k8aa4vv8b5yh8ig6klxpp0mk5hmcnmk69xkpinsswh7' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/EditorFeatures/CSharpTest2/EmbeddedLanguages/Json/CSharpJsonParserTests.cs': No space left on device cannot link '/nix/store/.links/12v91w2n35mcv0s6l77yfs0snppklnsyxxd3ajrvjnxfvzb7xf9c' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/EditorFeatures/Core/Shared/Utilities/UIThreadOperationContextProgressTracker.cs': No space left on device cannot link '/nix/store/.links/06xn8a6znxy9zcqhz56ji05xm07kxs82z868kpimhm5v0cvl09ih' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/EditorFeatures/Core/Editor/ContentTypeDefinitions.cs': No space left on device cannot link '/nix/store/.links/1mwgb6hvs91kvlslb70crynfa7adzpzgiz0qvkyxc4c1lazrallk' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/EditorFeatures/Core/Tagging/TaggerDelay.cs': No space left on device cannot link '/nix/store/.links/0slp5smlrd8y7kw8scnlcgm2pj05mzjnkrb4nwy0g258y00sibk2' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/EditorFeatures/CSharpTest/EventHookup/EventHookupCommandHandlerTests.cs': No space left on device cannot link '/nix/store/.links/11b9gn9psmbgqpxg3n76i6a20hbnjxw5iyplx2gi45lnq390djpc' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/EditorFeatures/CSharpTest/CodeLens/CSharpCodeLensTests.cs': No space left on device cannot link '/nix/store/.links/0bc6hkp017ds0yxvip2gkb3yxabhfmj3lwrjmqqlb0lhxj53gcp9' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/SharedUtilitiesAndExtensions/Compiler/Core/Utilities/BKTree.cs': No space left on device cannot link '/nix/store/.links/1n7p8q0nm2mr48xaqnkg6a277ip8n74a3j9rmchjiy8apbymn0rg' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/SharedUtilitiesAndExtensions/Compiler/Core/FlowAnalysis/SymbolUsageAnalysis/SymbolUsageAnalysis.OperationTreeAnalysisData.cs': No space left on device cannot link '/nix/store/.links/1qjzazaj3pzprbx2qma5s0nvxn9yd639m2cim5a8ng7imp766wbl' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/SharedUtilitiesAndExtensions/Workspace/Core/Extensions/ITypeInferenceServiceExtensions.cs': No space left on device cannot link '/nix/store/.links/0dcckqjmdg5vqidks5d6jpxgq9vq3an7vsy4r60k7b9nygvdgdqr' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/SharedUtilitiesAndExtensions/Workspace/Core/Utilities/SyntacticDocument.cs': No space left on device cannot link '/nix/store/.links/1651iq0hwlz54lj2w0s33qnxicgck0xarz872qnm0ff2jlrrm2cr' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/SharedUtilitiesAndExtensions/Workspace/CSharp/Extensions/ITypeParameterSymbolExtensions.cs': No space left on device cannot link '/nix/store/.links/1jnxz3kdf02k7ni4y5yp906yhsakgngv9wdsfyjp1k3j9kywzqrs' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/Core/Portable/ErrorReporting/InfoBarUI.cs': No space left on device cannot link '/nix/store/.links/0pv5mhnjx9nas20d5lflszs5d6k0pbmd66dial64xalrr6cnc61y' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/Core/Portable/Log/RoslynEventSource.LogBlock.cs': No space left on device cannot link '/nix/store/.links/04r0akzsckw7ij9d9arqk06gc6w6jgzglav7k1h32l94kqmsi1x5' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/Core/Portable/LanguageServices/DeclaredSymbolFactoryService/ArityUtilities.cs': No space left on device cannot link '/nix/store/.links/128dqa52f39v3y70082irx41z1w425gy4yp3yj5bbi9bdmfhxxqx' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/Core/Portable/FindSymbols/FindReferences/Finders/NamespaceSymbolReferenceFinder.cs': No space left on device cannot link '/nix/store/.links/0y58xhqglnyvhcz0xrlhl6zkw2ddbbk0j8ciq4zjw0i7w1g7sdfz' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/Core/Portable/FindSymbols/TopLevelSyntaxTree/TopLevelSyntaxTreeIndex.cs': No space left on device cannot link '/nix/store/.links/0wh5bpq98xmdbrwggg5fyfznf65g8sj85al7048ya346h7i00ki8' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/Core/Portable/TodoComments/TodoCommentOptions.cs': No space left on device cannot link '/nix/store/.links/05qd6crcs6cz0k79synwxk1x46wips4yadhgs53b3l4dznsvpqw5' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/Core/Portable/Remote/IRemoteHostClientShutdownCancellationService.cs': No space left on device cannot link '/nix/store/.links/0mbm2ja2pp3gwhgs2fprzkdd6slg170x4fq5h0yg8w58xvhv6cd7' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/Core/Portable/Workspace/Solution/SolutionState.CompilationPair.cs': No space left on device cannot link '/nix/store/.links/05drz6i4qp9i4w6jxq7d93wzlc4al6bfvl9gpqd0g2ns3ma1wjcy' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/Core/Portable/SolutionCrawler/InvocationReasons.cs': No space left on device cannot link '/nix/store/.links/0k7q2riqy4y685kdpnbg65dyqg8l4cisj6410vydy823538dqp9x' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/CSharp/Portable/Classification/SyntaxClassification/NameSyntaxClassifier.cs': No space left on device cannot link '/nix/store/.links/14qrddphsgvlcvgps14b8yi2x2807b9b42s8vi52j8b2q6byb9ni' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/CSharp/Portable/Indentation/CSharpSmartTokenFormatter.cs': No space left on device cannot link '/nix/store/.links/1mq39x78zlzjmidy1xymjjyazm29dpr6dlrq1g64djk6w0fp0wii' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/Remote/ServiceHub/Services/ProjectTelemetry/ApiUsageIncrementalAnalyzerProvider.cs': No space left on device cannot link '/nix/store/.links/0pw4gwcw3l8pcql952a7hxfnxc92byzxrijyzrp1jjh1sbzfx3ar' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/VisualBasic/Portable/LanguageServices/SemanticFactsService/VisualBasicSemanticFacts.vb': No space left on device cannot link '/nix/store/.links/1j4sfzf9pcczd7l97ikc45v388h9ncwivl9fl5pby6qim8zr825i' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Workspaces/VisualBasic/Portable/Simplification/Reducers/AbstractVisualBasicReducer.AbstractReductionRewriter.vb': No space left on device cannot link '/nix/store/.links/1yl7ma14yhnqhxx2q2dpqcqm06k06c570b81mlihqwcrxrcqr0qs' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/ExpressionEvaluator/Core/Source/FunctionResolver/CSharp/Scanner.cs': No space left on device cannot link '/nix/store/.links/1r43xzmrmy8zw9srp1znqa5lv8gqjf4v6jv96krf6cnfr99jk1a2' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/VisualStudio/IntegrationTest/IntegrationTests/VisualBasic/BasicExtractMethod.cs': No space left on device cannot link '/nix/store/.links/1sk5l1zxs114l25dhrp9sv5hxii5rmm0pxciy61msnhns8p73x6a' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/VisualStudio/IntegrationTest/New.IntegrationTests/WellKnownCommands.cs': No space left on device cannot link '/nix/store/.links/191zdd988jb640wnjwg3zjxfh0vxxlqbr972kjw72r4k9p74azi8' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/VisualStudio/Core/Test/SolutionExplorer/SourceGeneratorItemTests.vb': No space left on device cannot link '/nix/store/.links/0fzjpj8rkrj3cs91d7pnw7vnr1hkga8gxgi5gcvya5kkxdy4fi47' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/VisualStudio/Core/Def/xlf/ServicesVSResources.es.xlf': No space left on device cannot link '/nix/store/.links/0530h4b3ap353hzvxycr4vvllzdymlyn5gal5f7pxpw7hilszkj7' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/VisualStudio/Core/Def/Interop/ComAggregate.cs': No space left on device cannot link '/nix/store/.links/19wc4xd7nri9mngjb4vh3n427xas5rf7k00i2xspaawhvfgw18f9' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/VisualStudio/Core/Def/ValueTracking/EmptyTreeViewItem.cs': No space left on device cannot link '/nix/store/.links/1bp6wr9dmxzhp0d49y5zws5mjli7rnbf7byvqfxl99250f4izg63' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/VisualStudio/Core/Def/ProjectSystem/SolutionChangeAccumulator.cs': No space left on device cannot link '/nix/store/.links/0zi92q3lvknjqinkvzx0lfppz8bpicgjfzv7ar3r9ap4llgw9wvg' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/VisualStudio/CSharp/Impl/xlf/CSharpVSResources.es.xlf': No space left on device cannot link '/nix/store/.links/007gp5kfb6sfwkwgi5kykh6wgvj3f1v6xaph6fk0rjxsy9ws0g0h' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Scripting/VisualBasicTest/CommandLineRunnerTests.vb': No space left on device cannot link '/nix/store/.links/0naydkgxyh3rwgklflxkf4hd34bhdv32ynaha9q0phlgaa90vsd6' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Scripting/Core/Hosting/CommandLine/CommandLineRunner.cs': No space left on device cannot link '/nix/store/.links/046cd2zgipfvang901qk9r7jqiyr1b7ziabrhp09cxp1p2s1r90g' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Tools/Source/RunTests/Program.cs': No space left on device cannot link '/nix/store/.links/0qrg0l0jl0mzc22c21vyy0pwphdllsm338cna7jxr2cg21hcpdwy' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Analyzers/CSharp/Analyzers/UseExpressionBody/Helpers/UseExpressionBodyForConversionOperatorsHelper.cs': No space left on device cannot link '/nix/store/.links/0gy6x7y35g02fwm4bm4qbraxdq8cc23qml876qdalm74myh4rr4a' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Analyzers/CSharp/Analyzers/UseExpressionBody/UseExpressionBodyDiagnosticAnalyzer.cs': No space left on device cannot link '/nix/store/.links/1rfds6lw3ixf12mqdfk3fcsxvvykjhb4dl3zf6crm1dh9xbgwbl4' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Analyzers/CSharp/Analyzers/PopulateSwitch/CSharpPopulateSwitchExpressionDiagnosticAnalyzer.cs': No space left on device cannot link '/nix/store/.links/13qkcgqm6fivy9ihb6gvlbhkv81jvh2kc9fshjbcz34nyrwi08fb' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/Core/RebuildTest/CSharpDeterministicKeyBuilderTests.cs': No space left on device cannot link '/nix/store/.links/0b0hsbf807d1fibc9mv763bh2zb0sb7qzwlqwygp2kv969r4ajfp' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/Core/Portable/DiagnosticAnalyzer/CompilationUnitCompletedEvent.cs': No space left on device cannot link '/nix/store/.links/1cda817b8yswav9lmipxnqhbwiwgbynl41hp5n7x37fc1kil64bs' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/Core/Portable/Diagnostic/SuppressionInfo.cs': No space left on device cannot link '/nix/store/.links/0p6hzrzb1k5k66b6vdifh4hwa04xw2gvq0za8cxr6hyhdqh3c15x' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/Core/Portable/SourceGeneration/GeneratorDriverOptions.cs': No space left on device cannot link '/nix/store/.links/13h2v7gzx9s0qrindcb02vz1mcygzlq25sy1j7gi08wfkmiy605m' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/Core/CodeAnalysisTest/ShadowCopyAnalyzerAssemblyLoaderTests.cs': No space left on device cannot link '/nix/store/.links/1gkyj8k370mjb5mjww44yarzkgp3bfw6l046w6b1kl112gpqfmp7' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/CSharp/Test/Syntax/Parsing/ScriptParsingTests.cs': No space left on device cannot link '/nix/store/.links/02s5gf7vpc28w7flwvvz84dg5xrl1bf78q5npcirjjnbrahvmr25' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/CSharp/Test/WinRT/Microsoft.CodeAnalysis.CSharp.WinRT.UnitTests.csproj': No space left on device cannot link '/nix/store/.links/0m84sikgcvhnaniwds91j3m0zfq5h3zlbn2y3f67wpy5ln2j7bav' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/CSharp/Test/Semantic/Semantics/GlobalUsingDirectiveTests.cs': No space left on device cannot link '/nix/store/.links/13zj3cxkwykk3lppr2b539j21szvhvlg0p6sv70nlykqlmcnkwkq' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/CSharp/Test/Semantic/Semantics/SemanticErrorTests.cs': No space left on device cannot link '/nix/store/.links/03923g96cz2xhysg6i459fhkxh1scw3rx4cfb7yjv44f46521f19' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/CSharp/Portable/Binder/Binder.OverflowChecks.cs': No space left on device cannot link '/nix/store/.links/1nwb0a3irgjbws69x444sljcy3w8cbvcb369c3rg4qa5359ay7nz' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/CSharp/Portable/Binder/Semantics/OverloadResolution/OverloadResolutionResult.cs': No space left on device cannot link '/nix/store/.links/0vqr9hchrja8bhzk22a5nl7z1swjw59l8v9jbpv4rk705vc18kvf' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/CSharp/Portable/Lowering/ClosureConversion/ClosureConversion.Analysis.cs': No space left on device cannot link '/nix/store/.links/1fwj4yl6gvpcf99x6qfxlg268j60wwdixgxl6z0dnjwh7mcp99ds' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/VisualBasic/Test/Syntax/Scanner/ScannerTests.vb': No space left on device cannot link '/nix/store/.links/09iiz4c1b8dhln2rcnyjni5divrmfgc373jx6704ljxvr0rybjwm' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/VisualBasic/Test/Semantic/Semantics/VariableTypeInference.vb': No space left on device cannot link '/nix/store/.links/0i4c9cmxrzrb5wjp4ccpsn58l4s0as5jyqy0m1cx4wlkywf4hh7q' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/VisualBasic/Portable/Symbols/Tuples/TuplePropertySymbol.vb': No space left on device cannot link '/nix/store/.links/03zwhhawddzxlw6d1a3yw4lzhm6n3b1407r5mmn7whzr92zjbsl2' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/VisualBasic/Portable/CommandLine/VisualBasicCompiler.vb': No space left on device cannot link '/nix/store/.links/1ks8g0dpng3wdnrbiaix8icjvs5kvx7kfaq00abinhkbzaipcvag' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/VisualBasic/Portable/BoundTree/BoundQueryClause.vb': No space left on device cannot link '/nix/store/.links/02hcdsxr83cyy4k3nay97ga4d8z6w72rnxg0h916c2zpak8jjm48' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/VisualBasic/Portable/BoundTree/BoundAggregateClause.vb': No space left on device cannot link '/nix/store/.links/0kkfga1a4akc1csj58hzw25imggk6nbd0hlnxd9f94qxh3j4bvhq' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/VisualBasic/Portable/BoundTree/UnboundLambda.vb': No space left on device cannot link '/nix/store/.links/1249dkz560q286s7zzw88py3863d777ymx3wzi1pmfha3syqmr5m' to '/nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source/src/Compilers/VisualBasic/Portable/Binding/GetTypeBinder.vb': No space left on device copying path '/nix/store/j1s5dyh6aak1937cn70cgcsja9grzpyk-roslyn-4.2.0-nuget-deps' from 'https://cache.nixos.org'... copying path '/nix/store/7ddcwkiygzfpqxxvvwq2h0ipp5k2xrka-roslyn-4.2.0-dependencies-source' from 'https://cache.nixos.org'... cannot link '/nix/store/.links/0xxhna7cy21xp343nhbcs0bmkyq5ddmsfykl1gli4vnwsjjgzh7w' to '/nix/store/7ddcwkiygzfpqxxvvwq2h0ipp5k2xrka-roslyn-4.2.0-dependencies-source/lib/System.Memory.4.5.4.nupkg': No space left on device cannot link '/nix/store/.links/1cskcv6hb61k7iibl2j12ma27h88m7gdpr931yam0dnyxdkimgpw' to '/nix/store/7ddcwkiygzfpqxxvvwq2h0ipp5k2xrka-roslyn-4.2.0-dependencies-source/lib/runtime.any.System.IO.4.3.0.nupkg': No space left on device cannot link '/nix/store/.links/0q05206p0pfhx7an71w505wrfw1rg3c478ib7v83ljiksgv53386' to '/nix/store/7ddcwkiygzfpqxxvvwq2h0ipp5k2xrka-roslyn-4.2.0-dependencies-source/lib/System.Diagnostics.DiagnosticSource.4.3.0.nupkg': No space left on device copying path '/nix/store/yrir0y4rxqyf8pd061a0gzyjmbj1956h-roslyn-4.2.0-nuget-source' from 'https://cache.nixos.org'... cannot link '/nix/store/.links/0xxhna7cy21xp343nhbcs0bmkyq5ddmsfykl1gli4vnwsjjgzh7w' to '/nix/store/yrir0y4rxqyf8pd061a0gzyjmbj1956h-roslyn-4.2.0-nuget-source/lib/System.Memory.4.5.4.nupkg': No space left on device cannot link '/nix/store/.links/1cskcv6hb61k7iibl2j12ma27h88m7gdpr931yam0dnyxdkimgpw' to '/nix/store/yrir0y4rxqyf8pd061a0gzyjmbj1956h-roslyn-4.2.0-nuget-source/lib/runtime.any.System.IO.4.3.0.nupkg': No space left on device cannot link '/nix/store/.links/0q05206p0pfhx7an71w505wrfw1rg3c478ib7v83ljiksgv53386' to '/nix/store/yrir0y4rxqyf8pd061a0gzyjmbj1956h-roslyn-4.2.0-nuget-source/lib/System.Diagnostics.DiagnosticSource.4.3.0.nupkg': No space left on device copying path '/nix/store/1y3qsspng70y9z88nmh722l8f8jr85am-dotnet-configure-hook' from 'https://cache.nixos.org'... building '/nix/store/d9azv6rxls54z9a5pqkyhfmsm6753yy5-roslyn-4.2.0.drv'... Running phase: unpackPhase unpacking source archive /nix/store/g5v4bafa3ardg8dijpd1bqnp8n1xa6cj-source 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 503 error: cannot download NetworkMiner_2-8-1_source.zip from any mirror error: builder for '/nix/store/7yvd83rszsj8pprcjz4mdk4akclh52il-NetworkMiner_2-8-1_source.zip.drv' failed with exit code 1; last 16 log lines: > > trying https://archive.org/download/networkminer-2-8-1/NetworkMiner_2-8-1_source.zip > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 503 > Warning: Problem : HTTP error. Will retry in 1 seconds. 3 retries left. > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 503 > Warning: Problem : HTTP error. Will retry in 2 seconds. 2 retries left. > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 503 > Warning: Problem : HTTP error. Will retry in 4 seconds. 1 retries left. > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 503 > error: cannot download NetworkMiner_2-8-1_source.zip from any mirror For full logs, run 'nix log /nix/store/7yvd83rszsj8pprcjz4mdk4akclh52il-NetworkMiner_2-8-1_source.zip.drv'. error (ignored): error: cannot unlink '/tmp/nix-build-roslyn-4.2.0.drv-0/source/src/Compilers/VisualBasic/Test/Semantic/Semantics': Directory not empty error: 1 dependencies of derivation '/nix/store/g423zazj3i0rcp4is39d74p6lw6xs9hd-networkminer-2.8.1.drv' failed to build [result] Failed to update networkminer 2.8 -> 2.8.1 https://repology.org/project/networkminer/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.Familias, using log file: /var/log/nixpkgs-update/rPackages.Familias/2024-04-03.log rPackages.Familias 2.4 -> 2.6.1 https://repology.org/project/r:familias/versions attrpath: rPackages.Familias Checking auto update branch... No auto update branch exists Old version 2.4" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.Familias 2.4 -> 2.6.1 https://repology.org/project/r:familias/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath synergy, using log file: /var/log/nixpkgs-update/synergy/2024-04-03.log synergy 1.14.6.19-stable -> 1.14.6.19 https://repology.org/project/synergy/versions attrpath: synergy Checking auto update branch... No auto update branch exists 1.14.6.19 is not newer than 1.14.6.19-stable according to Nix; versionComparison: -1 [result] Failed to update synergy 1.14.6.19-stable -> 1.14.6.19 https://repology.org/project/synergy/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO currently don't know how to update perl [result] Failed to update perl536Packages.FileLoadLines 1.021 -> 1.046 https://repology.org/project/perl:file-loadlines/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath yap, using log file: /var/log/nixpkgs-update/yap/2024-04-03.log yap 6.3.3 -> 7.1.0 https://repology.org/project/yap/versions attrpath: yap Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/73m1gjvqc76x4w1dp36bhc3mwhs28lf7-yap-7.1.0.tar.gz.drv building '/nix/store/73m1gjvqc76x4w1dp36bhc3mwhs28lf7-yap-7.1.0.tar.gz.drv'... trying https://www.dcc.fc.up.pt/~vsc/Yap/yap-7.1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 455 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download yap-7.1.0.tar.gz from any mirror error: builder for '/nix/store/73m1gjvqc76x4w1dp36bhc3mwhs28lf7-yap-7.1.0.tar.gz.drv' failed with exit code 1; last 7 log lines: > > trying https://www.dcc.fc.up.pt/~vsc/Yap/yap-7.1.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 455 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download yap-7.1.0.tar.gz from any mirror For full logs, run 'nix log /nix/store/73m1gjvqc76x4w1dp36bhc3mwhs28lf7-yap-7.1.0.tar.gz.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'yap.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/73m1gjvqc76x4w1dp36bhc3mwhs28lf7-yap-7.1.0.tar.gz.drv /nix/store/ygfg98m8a3qkp009f0qxrnfjhf7lkmi3-yap-7.1.0.drv building '/nix/store/73m1gjvqc76x4w1dp36bhc3mwhs28lf7-yap-7.1.0.tar.gz.drv'... trying https://www.dcc.fc.up.pt/~vsc/Yap/yap-7.1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 455 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download yap-7.1.0.tar.gz from any mirror error: builder for '/nix/store/73m1gjvqc76x4w1dp36bhc3mwhs28lf7-yap-7.1.0.tar.gz.drv' failed with exit code 1; last 7 log lines: > > trying https://www.dcc.fc.up.pt/~vsc/Yap/yap-7.1.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 455 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download yap-7.1.0.tar.gz from any mirror For full logs, run 'nix log /nix/store/73m1gjvqc76x4w1dp36bhc3mwhs28lf7-yap-7.1.0.tar.gz.drv'. error: 1 dependencies of derivation '/nix/store/ygfg98m8a3qkp009f0qxrnfjhf7lkmi3-yap-7.1.0.drv' failed to build [result] Failed to update yap 6.3.3 -> 7.1.0 https://repology.org/project/yap/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rubyPackages.one_gadget, using log file: /var/log/nixpkgs-update/rubyPackages.one_gadget/2024-04-03.log rubyPackages.one_gadget 1.7.4 -> 1.9.0 https://repology.org/project/ruby:one-gadget/versions attrpath: rubyPackages.one_gadget Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update rubyPackages.one_gadget 1.7.4 -> 1.9.0 https://repology.org/project/ruby:one-gadget/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath hakuneko, using log file: /var/log/nixpkgs-update/hakuneko/2024-04-03.log hakuneko 6.1.7 -> 8.3.4 https://repology.org/project/hakuneko/versions attrpath: hakuneko Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update hakuneko 6.1.7 -> 8.3.4 https://repology.org/project/hakuneko/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.tidyvpc, using log file: /var/log/nixpkgs-update/rPackages.tidyvpc/2024-04-03.log rPackages.tidyvpc 1.5.0 -> 1.5.1 https://repology.org/project/r:tidyvpc/versions attrpath: rPackages.tidyvpc Checking auto update branch... No auto update branch exists Old version 1.5.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.tidyvpc 1.5.0 -> 1.5.1 https://repology.org/project/r:tidyvpc/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.ichimoku, using log file: /var/log/nixpkgs-update/rPackages.ichimoku/2024-04-03.log rPackages.ichimoku 1.4.12 -> 1.5.0 https://repology.org/project/r:ichimoku/versions attrpath: rPackages.ichimoku Checking auto update branch... No auto update branch exists Old version 1.4.12" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.ichimoku 1.4.12 -> 1.5.0 https://repology.org/project/r:ichimoku/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath todoist, using log file: /var/log/nixpkgs-update/todoist/2024-04-03.log todoist 0.20.0 -> 9.1.0 https://repology.org/project/todoist/versions attrpath: todoist Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/m17b87js12bizzyddgs0wfi88vvp2y07-source.drv building '/nix/store/m17b87js12bizzyddgs0wfi88vvp2y07-source.drv'... trying https://github.com/sachaos/todoist/archive/v9.1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/m17b87js12bizzyddgs0wfi88vvp2y07-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/sachaos/todoist/archive/v9.1.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/m17b87js12bizzyddgs0wfi88vvp2y07-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'todoist.originalSrc' not found stderr did not split as expected full stderr was: these 3 derivations will be built: /nix/store/m17b87js12bizzyddgs0wfi88vvp2y07-source.drv /nix/store/83n4j5kkzv7gay9vxphzjnw4675cng79-todoist-9.1.0-go-modules.drv /nix/store/jprdn0jc39g3i71vpkr1f7a74ndq0m21-todoist-9.1.0.drv building '/nix/store/m17b87js12bizzyddgs0wfi88vvp2y07-source.drv'... trying https://github.com/sachaos/todoist/archive/v9.1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/m17b87js12bizzyddgs0wfi88vvp2y07-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/sachaos/todoist/archive/v9.1.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/m17b87js12bizzyddgs0wfi88vvp2y07-source.drv'. error: 1 dependencies of derivation '/nix/store/jprdn0jc39g3i71vpkr1f7a74ndq0m21-todoist-9.1.0.drv' failed to build [result] Failed to update todoist 0.20.0 -> 9.1.0 https://repology.org/project/todoist/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath sipsak, using log file: /var/log/nixpkgs-update/sipsak/2024-04-03.log sipsak 4.1.2.1 -> 0.9.8.1 https://repology.org/project/sipsak/versions attrpath: sipsak Checking auto update branch... No auto update branch exists 0.9.8.1 is not newer than 4.1.2.1 according to Nix; versionComparison: -1 [result] Failed to update sipsak 4.1.2.1 -> 0.9.8.1 https://repology.org/project/sipsak/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath picat, using log file: /var/log/nixpkgs-update/picat/2024-04-03.log picat 3.3p3 -> 3.6 https://repology.org/project/picat/versions attrpath: picat Checking auto update branch... No auto update branch exists Old version 3.3p3" not present in master derivation file with contents: { lib, stdenv, fetchurl, zlib }: let ARCH = { x86_64-linux = "linux64"; aarch64-linux = "linux64"; x86_64-cygwin = "cygwin64"; x86_64-darwin = "mac64"; aarch64-darwin = "mac64"; }."${stdenv.hostPlatform.system}" or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); in stdenv.mkDerivation { pname = "picat"; version = "3.6"; src = fetchurl { url = "http://picat-lang.org/download/picat36_src.tar.gz"; hash = "sha256-DjP1cjKxRLxMjiHmYX42+kaG5//09IrPIc1O75gLA6k="; }; buildInputs = [ zlib ]; inherit ARCH; hardeningDisable = [ "format" ]; enableParallelBuilding = true; buildPhase = '' cd emu make -j $NIX_BUILD_CORES -f Makefile.$ARCH ''; installPhase = '' mkdir -p $out/bin $out/share cp picat $out/bin/ cp -r ../doc $out/share/doc cp -r ../exs $out/share/examples ''; meta = with lib; { description = "Logic-based programming langage"; mainProgram = "picat"; homepage = "http://picat-lang.org/"; license = licenses.mpl20; platforms = [ "x86_64-linux" "aarch64-linux" "x86_64-cygwin" "x86_64-darwin" "aarch64-darwin" ]; maintainers = with maintainers; [ earldouglas thoughtpolice ]; }; } [result] Failed to update picat 3.3p3 -> 3.6 https://repology.org/project/picat/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.python-ev3dev2, using log file: /var/log/nixpkgs-update/python311Packages.python-ev3dev2/2024-04-03.log python311Packages.python-ev3dev2 2.1.0 -> 2.1.0.post1 https://repology.org/project/python:python-ev3dev2/versions attrpath: python311Packages.python-ev3dev2 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Failed with exit code 1 this derivation will be built: /nix/store/hjz1vi8lzgnza7qyl16fijwwxr9d7w65-packages.json.drv building '/nix/store/hjz1vi8lzgnza7qyl16fijwwxr9d7w65-packages.json.drv'... Going to be running update for following packages: - python3.11-python-ev3dev2-2.1.0 Press Enter key to continue... Running update for: - python3.11-python-ev3dev2-2.1.0: UPDATING ... - python3.11-python-ev3dev2-2.1.0: ERROR --- SHOWING ERROR LOG FOR python3.11-python-ev3dev2-2.1.0 ---------------------- INFO:root:Updating packages... Traceback (most recent call last): File "/nix/store/afx9mzh2bsnlsk5frb0a3nk3y2h9s2aj-update-python-libraries", line 600, in main() File "/nix/store/afx9mzh2bsnlsk5frb0a3nk3y2h9s2aj-update-python-libraries", line 579, in main results = list(filter(bool, p.map(lambda pkg: _update(pkg, target), packages))) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/concurrent/futures/_base.py", line 619, in result_iterator yield _result_or_cancel(fs.pop()) ^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/concurrent/futures/_base.py", line 317, in _result_or_cancel return fut.result(timeout) ^^^^^^^^^^^^^^^^^^^ File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/concurrent/futures/_base.py", line 456, in result return self.__get_result() ^^^^^^^^^^^^^^^^^^^ File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/concurrent/futures/_base.py", line 401, in __get_result raise self._exception File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/concurrent/futures/thread.py", line 58, in run result = self.fn(*self.args, **self.kwargs) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/afx9mzh2bsnlsk5frb0a3nk3y2h9s2aj-update-python-libraries", line 579, in results = list(filter(bool, p.map(lambda pkg: _update(pkg, target), packages))) ^^^^^^^^^^^^^^^^^^^^ File "/nix/store/afx9mzh2bsnlsk5frb0a3nk3y2h9s2aj-update-python-libraries", line 523, in _update return _update_package(path, target) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/afx9mzh2bsnlsk5frb0a3nk3y2h9s2aj-update-python-libraries", line 434, in _update_package new_version, new_sha256, prefix = FETCHERS[fetcher]( ^^^^^^^^^^^^^^^^^^ File "/nix/store/afx9mzh2bsnlsk5frb0a3nk3y2h9s2aj-update-python-libraries", line 298, in _get_latest_version_github response = subprocess.check_output(cmd) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/subprocess.py", line 466, in check_output return run(*popenargs, stdout=PIPE, timeout=timeout, check=True, ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/subprocess.py", line 548, in run with Popen(*popenargs, **kwargs) as process: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/subprocess.py", line 1026, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/subprocess.py", line 1953, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) FileNotFoundError: [Errno 2] No such file or directory: 'nix-prefetch-git' --- SHOWING ERROR LOG FOR python3.11-python-ev3dev2-2.1.0 ---------------------- The update script for python3.11-python-ev3dev2-2.1.0 failed with exit code 1 [result] Failed to update python311Packages.python-ev3dev2 2.1.0 -> 2.1.0.post1 https://repology.org/project/python:python-ev3dev2/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.Rsubread, using log file: /var/log/nixpkgs-update/rPackages.Rsubread/2024-04-03.log rPackages.Rsubread 2.16.0 -> 2.16.1 https://repology.org/project/r:rsubread/versions attrpath: rPackages.Rsubread Checking auto update branch... No auto update branch exists Old version 2.16.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.Rsubread 2.16.0 -> 2.16.1 https://repology.org/project/r:rsubread/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.ottrpal, using log file: /var/log/nixpkgs-update/rPackages.ottrpal/2024-04-03.log rPackages.ottrpal 1.2 -> 1.2.1 https://repology.org/project/r:ottrpal/versions attrpath: rPackages.ottrpal Checking auto update branch... No auto update branch exists Old version 1.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.ottrpal 1.2 -> 1.2.1 https://repology.org/project/r:ottrpal/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath tpm-tools, using log file: /var/log/nixpkgs-update/tpm-tools/2024-04-03.log tpm-tools 1.3.9.1 -> 1.3.9.2 https://repology.org/project/tpm-tools/versions attrpath: tpm-tools Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update tpm-tools 1.3.9.1 -> 1.3.9.2 https://repology.org/project/tpm-tools/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.lpjmlkit, using log file: /var/log/nixpkgs-update/rPackages.lpjmlkit/2024-04-03.log rPackages.lpjmlkit 1.0.11 -> 1.1.8 https://repology.org/project/r:lpjmlkit/versions attrpath: rPackages.lpjmlkit Checking auto update branch... No auto update branch exists Old version 1.0.11" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.lpjmlkit 1.0.11 -> 1.1.8 https://repology.org/project/r:lpjmlkit/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath librasterlite2, using log file: /var/log/nixpkgs-update/librasterlite2/2024-04-03.log librasterlite2 1.1.0-beta1 -> 1.1.0 https://repology.org/project/librasterlite2/versions attrpath: librasterlite2 Checking auto update branch... No auto update branch exists 1.1.0 is not newer than 1.1.0-beta1 according to Nix; versionComparison: -1 [result] Failed to update librasterlite2 1.1.0-beta1 -> 1.1.0 https://repology.org/project/librasterlite2/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath macopix, using log file: /var/log/nixpkgs-update/macopix/2024-04-03.log macopix 1.7.4 -> 3.4.0 https://repology.org/project/macopix/versions attrpath: macopix Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/y50kjszplnx2n23g4n2b02v3l3249aw2-macopix-3.4.0.tar.bz2.drv building '/nix/store/y50kjszplnx2n23g4n2b02v3l3249aw2-macopix-3.4.0.tar.bz2.drv'... trying http://rosegray.sakura.ne.jp/macopix/macopix-3.4.0.tar.bz2 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 196 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download macopix-3.4.0.tar.bz2 from any mirror error: builder for '/nix/store/y50kjszplnx2n23g4n2b02v3l3249aw2-macopix-3.4.0.tar.bz2.drv' failed with exit code 1; last 7 log lines: > > trying http://rosegray.sakura.ne.jp/macopix/macopix-3.4.0.tar.bz2 > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 196 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download macopix-3.4.0.tar.bz2 from any mirror For full logs, run 'nix log /nix/store/y50kjszplnx2n23g4n2b02v3l3249aw2-macopix-3.4.0.tar.bz2.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'macopix.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/y50kjszplnx2n23g4n2b02v3l3249aw2-macopix-3.4.0.tar.bz2.drv /nix/store/i1klg6m7bh2wss5jrw1n3fbas14dn6fc-macopix-3.4.0.drv building '/nix/store/y50kjszplnx2n23g4n2b02v3l3249aw2-macopix-3.4.0.tar.bz2.drv'... trying http://rosegray.sakura.ne.jp/macopix/macopix-3.4.0.tar.bz2 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 196 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download macopix-3.4.0.tar.bz2 from any mirror error: builder for '/nix/store/y50kjszplnx2n23g4n2b02v3l3249aw2-macopix-3.4.0.tar.bz2.drv' failed with exit code 1; last 7 log lines: > > trying http://rosegray.sakura.ne.jp/macopix/macopix-3.4.0.tar.bz2 > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 196 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download macopix-3.4.0.tar.bz2 from any mirror For full logs, run 'nix log /nix/store/y50kjszplnx2n23g4n2b02v3l3249aw2-macopix-3.4.0.tar.bz2.drv'. error: 1 dependencies of derivation '/nix/store/i1klg6m7bh2wss5jrw1n3fbas14dn6fc-macopix-3.4.0.drv' failed to build [result] Failed to update macopix 1.7.4 -> 3.4.0 https://repology.org/project/macopix/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath unixODBCDrivers.msodbcsql17, using log file: /var/log/nixpkgs-update/unixODBCDrivers.msodbcsql17/2024-04-03.log unixODBCDrivers.msodbcsql17 17.7.1.1-1 -> 17.10.2.1 https://repology.org/project/msodbcsql17/versions attrpath: unixODBCDrivers.msodbcsql17 Checking auto update branch... No auto update branch exists Old version 17.7.1.1-1" not present in master derivation file with contents: { fetchurl, stdenv, unixODBC, cmake, postgresql, mariadb, sqlite, zlib, libxml2, dpkg, lib, openssl, libkrb5, libuuid, patchelf, libiconv, fixDarwinDylibNames, fetchFromGitHub }: # Each of these ODBC drivers can be configured in your odbcinst.ini file using # the various passthru and meta values. Of note are: # # * `passthru.fancyName`, the typical name used to reference the driver # * `passthru.driver`, the path to the driver within the built package # * `meta.description`, a short description of the ODBC driver # # For example, you might generate it as follows: # # '' # [${package.fancyName}] # Description = ${package.meta.description} # Driver = ${package}/${package.driver} # '' { psql = stdenv.mkDerivation rec { pname = "psqlodbc"; version = "10.01.0000"; src = fetchurl { url = "mirror://postgresql/odbc/versions/src/${pname}-${version}.tar.gz"; sha256 = "1cyams7157f3gry86x64xrplqi2vyqrq3rqka59gv4lb4rpl7jl7"; }; buildInputs = [ unixODBC postgresql ]; # see the top of the file for an explanation passthru = { fancyName = "PostgreSQL"; driver = "lib/psqlodbcw.so"; }; meta = with lib; { description = "Official PostgreSQL ODBC Driver"; homepage = "https://odbc.postgresql.org/"; license = licenses.lgpl2; platforms = platforms.unix; }; }; mariadb = stdenv.mkDerivation rec { pname = "mariadb-connector-odbc"; version = "3.1.20"; src = fetchFromGitHub { owner = "mariadb-corporation"; repo = "mariadb-connector-odbc"; rev = version; hash = "sha256-l+HlS7/A0shwsEXYKDhi+QCmwHaMTeKrtcvo9yYpYws="; # this driver only seems to build correctly when built against the mariadb-connect-c subrepo # (see https://github.com/NixOS/nixpkgs/issues/73258) fetchSubmodules = true; }; patches = [ # Fix `call to undeclared function 'sleep'` with clang 16 ./mariadb-connector-odbc-unistd.patch ]; nativeBuildInputs = [ cmake ]; buildInputs = [ unixODBC openssl libiconv zlib ] ++ lib.optionals stdenv.isDarwin [ libkrb5 ]; cmakeFlags = [ "-DWITH_EXTERNAL_ZLIB=ON" "-DODBC_LIB_DIR=${lib.getLib unixODBC}/lib" "-DODBC_INCLUDE_DIR=${lib.getDev unixODBC}/include" "-DWITH_OPENSSL=ON" # on darwin this defaults to ON but we want to build against unixODBC "-DWITH_IODBC=OFF" ]; buildFlags = if stdenv.isDarwin then [ "maodbc" ] else null; installTargets = if stdenv.isDarwin then [ "install/fast" ] else null; # see the top of the file for an explanation passthru = { fancyName = "MariaDB"; driver = "lib/libmaodbc${stdenv.hostPlatform.extensions.sharedLibrary}"; }; meta = with lib; { description = "MariaDB ODBC database driver"; homepage = "https://downloads.mariadb.org/connector-odbc/"; license = licenses.gpl2; platforms = platforms.linux ++ platforms.darwin; }; }; mysql = stdenv.mkDerivation rec { pname = "mysql-connector-odbc"; majorVersion = "5.3"; version = "${majorVersion}.6"; src = fetchurl { url = "https://dev.mysql.com/get/Downloads/Connector-ODBC/${majorVersion}/${pname}-${version}-src.tar.gz"; sha256 = "1smi4z49i4zm7cmykjkwlxxzqvn7myngsw5bc35z6gqxmi8c55xr"; }; nativeBuildInputs = [ cmake ]; buildInputs = [ unixODBC mariadb ]; cmakeFlags = [ "-DWITH_UNIXODBC=1" ]; # see the top of the file for an explanation passthru = { fancyName = "MySQL"; driver = "lib/libmyodbc3-3.51.12.so"; }; meta = with lib; { description = "MySQL ODBC database driver"; homepage = "https://dev.mysql.com/downloads/connector/odbc/"; license = licenses.gpl2; platforms = platforms.linux; broken = true; }; }; sqlite = stdenv.mkDerivation rec { pname = "sqlite-connector-odbc"; version = "0.9993"; src = fetchurl { url = "http://www.ch-werner.de/sqliteodbc/sqliteodbc-${version}.tar.gz"; sha256 = "0dgsj28sc7f7aprmdd0n5a1rmcx6pv7170c8dfjl0x1qsjxim6hs"; }; buildInputs = [ unixODBC sqlite zlib libxml2 ]; configureFlags = [ "--with-odbc=${unixODBC}" "--with-sqlite3=${sqlite.dev}" ]; installTargets = [ "install-3" ]; # move libraries to $out/lib where they're expected to be postInstall = '' mkdir -p "$out/lib" mv "$out"/*.* "$out/lib" ''; # see the top of the file for an explanation passthru = { fancyName = "SQLite"; driver = "lib/libsqlite3odbc.so"; }; meta = with lib; { description = "ODBC driver for SQLite"; homepage = "http://www.ch-werner.de/sqliteodbc"; license = licenses.bsd2; platforms = platforms.unix; maintainers = with maintainers; [ vlstill ]; }; }; msodbcsql17 = stdenv.mkDerivation rec { pname = "msodbcsql17"; version = "${versionMajor}.${versionMinor}.${versionAdditional}-1"; versionMajor = "17"; versionMinor = "7"; versionAdditional = "1.1"; src = fetchurl { url = "https://packages.microsoft.com/debian/10/prod/pool/main/m/msodbcsql17/msodbcsql${versionMajor}_${version}_amd64.deb"; sha256 = "0vwirnp56jibm3qf0kmi4jnz1w7xfhnsfr8imr0c9hg6av4sk3a6"; }; nativeBuildInputs = [ dpkg patchelf ]; unpackPhase = "dpkg -x $src ./"; buildPhase = ""; installPhase = '' mkdir -p $out mkdir -p $out/lib cp -r opt/microsoft/msodbcsql${versionMajor}/lib64 opt/microsoft/msodbcsql${versionMajor}/share $out/ ''; postFixup = '' patchelf --set-rpath ${lib.makeLibraryPath [ unixODBC openssl libkrb5 libuuid stdenv.cc.cc ]} \ $out/lib/libmsodbcsql-${versionMajor}.${versionMinor}.so.${versionAdditional} ''; # see the top of the file for an explanation passthru = { fancyName = "ODBC Driver ${versionMajor} for SQL Server"; driver = "lib/libmsodbcsql-${versionMajor}.${versionMinor}.so.${versionAdditional}"; }; meta = with lib; { broken = stdenv.isDarwin; description = "ODBC Driver ${versionMajor} for SQL Server"; homepage = "https://docs.microsoft.com/en-us/sql/connect/odbc/linux-mac/installing-the-microsoft-odbc-driver-for-sql-server?view=sql-server-2017"; sourceProvenance = with sourceTypes; [ binaryNativeCode ]; license = licenses.unfree; platforms = platforms.linux; maintainers = with maintainers; [ spencerjanssen ]; }; }; msodbcsql18 = stdenv.mkDerivation(finalAttrs: { pname = "msodbcsql${finalAttrs.versionMajor}"; version = "${finalAttrs.versionMajor}.${finalAttrs.versionMinor}.${finalAttrs.versionAdditional}${finalAttrs.versionSuffix}"; versionMajor = "18"; versionMinor = "1"; versionAdditional = "1.1"; versionSuffix = lib.optionalString stdenv.isLinux "-1"; src = fetchurl { url = { x86_64-linux = "https://packages.microsoft.com/debian/11/prod/pool/main/m/${finalAttrs.pname}/${finalAttrs.pname}_${finalAttrs.version}_amd64.deb"; aarch64-linux = "https://packages.microsoft.com/debian/11/prod/pool/main/m/${finalAttrs.pname}/${finalAttrs.pname}_${finalAttrs.version}_arm64.deb"; x86_64-darwin = "https://download.microsoft.com/download/6/4/0/64006503-51e3-44f0-a6cd-a9b757d0d61b/${finalAttrs.pname}-${finalAttrs.version}-amd64.tar.gz"; aarch64-darwin = "https://download.microsoft.com/download/6/4/0/64006503-51e3-44f0-a6cd-a9b757d0d61b/${finalAttrs.pname}-${finalAttrs.version}-arm64.tar.gz"; }.${stdenv.system} or (throw "Unsupported system: ${stdenv.system}"); hash = { x86_64-linux = "sha256:1f0rmh1aynf1sqmjclbsyh2wz5jby0fixrwz71zp6impxpwvil52"; aarch64-linux = "sha256:0zphnbvkqdbkcv6lvv63p7pyl68h5bs2dy6vv44wm6bi89svms4a"; x86_64-darwin = "sha256:1fn80byn1yihflznxcm9cpj42mpllnz54apnk9n46vzm2ng2lj6d"; aarch64-darwin = "sha256:116xl8r2apr5b48jnq6myj9fwqs88yccw5176yfyzh4534fznj5x"; }.${stdenv.system} or (throw "Unsupported system: ${stdenv.system}"); }; nativeBuildInputs = if stdenv.isDarwin then [ # Fix up the names encoded into the dylib, and make them absolute. fixDarwinDylibNames ] else [ dpkg patchelf ]; unpackPhase = lib.optionalString stdenv.isLinux '' dpkg -x $src ./ ''; installPhase = if stdenv.isDarwin then '' mkdir -p $out tar xf $src --strip-components=1 -C $out '' else '' mkdir -p $out mkdir -p $out/lib cp -r opt/microsoft/msodbcsql${finalAttrs.versionMajor}/lib64 opt/microsoft/msodbcsql${finalAttrs.versionMajor}/share $out/ ''; # Replace the hard-coded paths in the dylib with nixpkgs equivalents. fixupPhase = lib.optionalString stdenv.isDarwin '' ${stdenv.cc.bintools.targetPrefix}install_name_tool \ -change /usr/lib/libiconv.2.dylib ${libiconv}/lib/libiconv.2.dylib \ -change /opt/homebrew/lib/libodbcinst.2.dylib ${unixODBC}/lib/libodbcinst.2.dylib \ $out/${finalAttrs.passthru.driver} ''; postFixup = lib.optionalString stdenv.isLinux '' patchelf --set-rpath ${lib.makeLibraryPath [ unixODBC openssl libkrb5 libuuid stdenv.cc.cc ]} \ $out/${finalAttrs.passthru.driver} ''; # see the top of the file for an explanation passthru = { fancyName = "ODBC Driver ${finalAttrs.versionMajor} for SQL Server"; driver = "lib/libmsodbcsql${if stdenv.isDarwin then ".${finalAttrs.versionMajor}.dylib" else "-${finalAttrs.versionMajor}.${finalAttrs.versionMinor}.so.${finalAttrs.versionAdditional}"}"; }; meta = with lib; { description = finalAttrs.passthru.fancyName; homepage = "https://learn.microsoft.com/en-us/sql/connect/odbc/linux-mac/installing-the-microsoft-odbc-driver-for-sql-server?view=sql-server-ver16"; sourceProvenance = with sourceTypes; [ binaryNativeCode ]; platforms = platforms.unix; license = licenses.unfree; maintainers = with maintainers; [ SamirTalwar ]; }; }); redshift = stdenv.mkDerivation rec { pname = "redshift-odbc"; version = "1.4.49.1000"; src = fetchurl { url = "https://s3.amazonaws.com/redshift-downloads/drivers/odbc/${version}/AmazonRedshiftODBC-64-bit-${version}-1.x86_64.deb"; sha256 = "sha256-r5HvsZjB7+x+ClxtWoONkE1/NAbz90NbHfzxC6tf7jA="; }; nativeBuildInputs = [ dpkg ]; unpackPhase = '' dpkg -x $src src cd src ''; # `unixODBC` is loaded with `dlopen`, so `autoPatchElfHook` cannot see it, and `patchELF` phase would strip the manual patchelf. Thus: # - Manually patchelf with `unixODCB` libraries # - Disable automatic `patchELF` phase installPhase = '' mkdir -p $out/lib cp opt/amazon/redshiftodbc/lib/64/* $out/lib patchelf --set-rpath ${unixODBC}/lib/ $out/lib/libamazonredshiftodbc64.so ''; dontPatchELF = true; buildInputs = [ unixODBC ]; # see the top of the file for an explanation passthru = { fancyName = "Amazon Redshift (x64)"; driver = "lib/libamazonredshiftodbc64.so"; }; meta = with lib; { broken = stdenv.isDarwin; description = "Amazon Redshift ODBC driver"; homepage = "https://docs.aws.amazon.com/redshift/latest/mgmt/configure-odbc-connection.html"; sourceProvenance = with sourceTypes; [ binaryNativeCode ]; license = licenses.unfree; platforms = platforms.linux; maintainers = with maintainers; [ sir4ur0n ]; }; }; } [result] Failed to update unixODBCDrivers.msodbcsql17 17.7.1.1-1 -> 17.10.2.1 https://repology.org/project/msodbcsql17/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath chrysalis, using log file: /var/log/nixpkgs-update/chrysalis/2024-04-03.log chrysalis 0 -> 1 attrpath: chrysalis Checking auto update branch... The derivation has no 'version' attribute, so do not know how to figure out the version while doing an updateScript update [result] Failed to update chrysalis 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath libcutl, using log file: /var/log/nixpkgs-update/libcutl/2024-04-03.log libcutl 1.10.0 -> 1.11.0 https://repology.org/project/libcutl/versions attrpath: libcutl Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/xxvw2k4kni6mqv19gqdzqpral7yjs0ih-libcutl-1.11.0.tar.bz2.drv building '/nix/store/xxvw2k4kni6mqv19gqdzqpral7yjs0ih-libcutl-1.11.0.tar.bz2.drv'... trying https://codesynthesis.com/download/libcutl/1.11/libcutl-1.11.0.tar.bz2 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 280 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download libcutl-1.11.0.tar.bz2 from any mirror error: builder for '/nix/store/xxvw2k4kni6mqv19gqdzqpral7yjs0ih-libcutl-1.11.0.tar.bz2.drv' failed with exit code 1; last 7 log lines: > > trying https://codesynthesis.com/download/libcutl/1.11/libcutl-1.11.0.tar.bz2 > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 280 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download libcutl-1.11.0.tar.bz2 from any mirror For full logs, run 'nix log /nix/store/xxvw2k4kni6mqv19gqdzqpral7yjs0ih-libcutl-1.11.0.tar.bz2.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'libcutl.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/xxvw2k4kni6mqv19gqdzqpral7yjs0ih-libcutl-1.11.0.tar.bz2.drv /nix/store/nzhy6al5dfj2kcfdvbpzzai4smpzwlhw-libcutl-1.11.0.drv building '/nix/store/xxvw2k4kni6mqv19gqdzqpral7yjs0ih-libcutl-1.11.0.tar.bz2.drv'... trying https://codesynthesis.com/download/libcutl/1.11/libcutl-1.11.0.tar.bz2 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 280 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download libcutl-1.11.0.tar.bz2 from any mirror error: builder for '/nix/store/xxvw2k4kni6mqv19gqdzqpral7yjs0ih-libcutl-1.11.0.tar.bz2.drv' failed with exit code 1; last 7 log lines: > > trying https://codesynthesis.com/download/libcutl/1.11/libcutl-1.11.0.tar.bz2 > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 280 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download libcutl-1.11.0.tar.bz2 from any mirror For full logs, run 'nix log /nix/store/xxvw2k4kni6mqv19gqdzqpral7yjs0ih-libcutl-1.11.0.tar.bz2.drv'. error: 1 dependencies of derivation '/nix/store/nzhy6al5dfj2kcfdvbpzzai4smpzwlhw-libcutl-1.11.0.drv' failed to build [result] Failed to update libcutl 1.10.0 -> 1.11.0 https://repology.org/project/libcutl/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gurobi, using log file: /var/log/nixpkgs-update/gurobi/2024-04-03.log gurobi 9.5.1 -> 11.0.1 https://repology.org/project/gurobi/versions attrpath: gurobi Checking auto update branch... No auto update branch exists Old version 9.5.1" not present in master derivation file with contents: { stdenv, lib, fetchurl, autoPatchelfHook, python3 }: stdenv.mkDerivation rec { pname = "gurobi"; version = "11.0.1"; src = fetchurl { url = "https://packages.gurobi.com/${lib.versions.majorMinor version}/gurobi${version}_linux64.tar.gz"; hash = "sha256-oZ7Oz22e4k6cVF3TDFxp/pE+RuU+3p/CatTWj1ci5ZY="; }; sourceRoot = "gurobi${builtins.replaceStrings ["."] [""] version}/linux64"; nativeBuildInputs = [ autoPatchelfHook ]; buildInputs = [ (python3.withPackages (ps: [ ps.gurobipy ])) ]; strictDeps = true; makeFlags = [ "--directory=src/build" ]; installPhase = '' mkdir -p $out/bin cp bin/* $out/bin/ rm $out/bin/gurobi.sh rm $out/bin/python* cp lib/gurobi.py $out/bin/gurobi.sh mkdir -p $out/include cp include/gurobi*.h $out/include/ mkdir -p $out/lib cp lib/*.jar $out/lib/ cp lib/libGurobiJni*.so $out/lib/ cp lib/libgurobi*.so* $out/lib/ cp lib/libgurobi*.a $out/lib/ cp src/build/*.a $out/lib/ mkdir -p $out/share/java ln -s $out/lib/gurobi.jar $out/share/java/ ln -s $out/lib/gurobi-javadoc.jar $out/share/java/ ''; passthru.libSuffix = lib.replaceStrings [ "." ] [ "" ] (lib.versions.majorMinor version); meta = with lib; { description = "Optimization solver for mathematical programming"; homepage = "https://www.gurobi.com"; sourceProvenance = with sourceTypes; [ binaryBytecode binaryNativeCode ]; license = licenses.unfree; platforms = [ "x86_64-linux" ]; maintainers = with maintainers; [ wegank ]; }; } [result] Failed to update gurobi 9.5.1 -> 11.0.1 https://repology.org/project/gurobi/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.nbTransmission, using log file: /var/log/nixpkgs-update/rPackages.nbTransmission/2024-04-03.log rPackages.nbTransmission 1.1.2 -> 1.1.4 https://repology.org/project/r:nbtransmission/versions attrpath: rPackages.nbTransmission Checking auto update branch... No auto update branch exists Old version 1.1.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.nbTransmission 1.1.2 -> 1.1.4 https://repology.org/project/r:nbtransmission/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gosmore, using log file: /var/log/nixpkgs-update/gosmore/2024-04-03.log gosmore 2014-03-17 -> 31801 https://repology.org/project/gosmore/versions attrpath: gosmore Checking auto update branch... No auto update branch exists [version] Hashes equal; no update necessary [result] Failed to update gosmore 2014-03-17 -> 31801 https://repology.org/project/gosmore/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.echarty, using log file: /var/log/nixpkgs-update/rPackages.echarty/2024-04-03.log rPackages.echarty 1.6.2 -> 1.6.3 https://repology.org/project/r:echarty/versions attrpath: rPackages.echarty Checking auto update branch... No auto update branch exists Old version 1.6.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.echarty 1.6.2 -> 1.6.3 https://repology.org/project/r:echarty/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath libdevil, using log file: /var/log/nixpkgs-update/libdevil/2024-04-03.log libdevil 1.7.8 -> 1.8.0 https://repology.org/project/devil/versions attrpath: libdevil Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update libdevil 1.7.8 -> 1.8.0 https://repology.org/project/devil/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath quartz-wm, using log file: /var/log/nixpkgs-update/quartz-wm/2024-04-03.log quartz-wm 1.3.1 -> 1.3.2 https://repology.org/project/quartz-wm/versions attrpath: quartz-wm Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/servers/x11/quartz-wm/default.nix b/pkgs/servers/x11/quartz-wm/default.nix index 3cf65e990795..8221778a247d 100644 --- a/pkgs/servers/x11/quartz-wm/default.nix +++ b/pkgs/servers/x11/quartz-wm/default.nix @@ -1,12 +1,12 @@ { lib, stdenv, fetchurl, xorg, pixman, pkg-config, AppKit, Foundation, Xplugin }: -let version = "1.3.1"; +let version = "1.3.2"; in stdenv.mkDerivation { pname = "quartz-wm"; inherit version; src = fetchurl { url = "http://xquartz-dl.macosforge.org/src/quartz-wm-${version}.tar.xz"; - sha256 = "1j8zd3p7rhay1s3sxq6anw78k5s59mx44xpqla2ianl62346a5g9"; + sha256 = "sha256-oPMXZTQTc1SL9d5+N2vF/OK+ESvKTT6MvsXsv0F62wY="; }; patches = [ ./no_title_crash.patch [outpaths] eval start [outpaths] eval end Update edits cause no rebuilds. [result] Failed to update quartz-wm 1.3.1 -> 1.3.2 https://repology.org/project/quartz-wm/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.arkhe, using log file: /var/log/nixpkgs-update/rPackages.arkhe/2024-04-03.log rPackages.arkhe 1.4.0 -> 1.6.0 https://repology.org/project/r:arkhe/versions attrpath: rPackages.arkhe Checking auto update branch... No auto update branch exists Old version 1.4.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.arkhe 1.4.0 -> 1.6.0 https://repology.org/project/r:arkhe/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pet, using log file: /var/log/nixpkgs-update/pet/2024-04-03.log pet 0.7.0 -> 0.11.6 https://repology.org/project/pet/versions attrpath: pet Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/y5k7531vx5r19z9g0r2a2phxk69hqj5l-source.drv building '/nix/store/y5k7531vx5r19z9g0r2a2phxk69hqj5l-source.drv'... trying https://github.com/knqyf263/pet/archive/v0.11.6.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/y5k7531vx5r19z9g0r2a2phxk69hqj5l-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/knqyf263/pet/archive/v0.11.6.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/y5k7531vx5r19z9g0r2a2phxk69hqj5l-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'pet.originalSrc' not found stderr did not split as expected full stderr was: these 3 derivations will be built: /nix/store/y5k7531vx5r19z9g0r2a2phxk69hqj5l-source.drv /nix/store/hnyn49n3qgk6wbgmszar8j0534s61sg3-pet-0.11.6-go-modules.drv /nix/store/50cvv2qsvn4n8nb6dx4nlb9nm8xq8iah-pet-0.11.6.drv building '/nix/store/y5k7531vx5r19z9g0r2a2phxk69hqj5l-source.drv'... trying https://github.com/knqyf263/pet/archive/v0.11.6.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/y5k7531vx5r19z9g0r2a2phxk69hqj5l-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/knqyf263/pet/archive/v0.11.6.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/y5k7531vx5r19z9g0r2a2phxk69hqj5l-source.drv'. error: 1 dependencies of derivation '/nix/store/50cvv2qsvn4n8nb6dx4nlb9nm8xq8iah-pet-0.11.6.drv' failed to build [result] Failed to update pet 0.7.0 -> 0.11.6 https://repology.org/project/pet/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath zug, using log file: /var/log/nixpkgs-update/zug/2024-04-03.log zug 0.1.0 -> 0.1.1 https://repology.org/project/zug/versions attrpath: zug Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/by-name/zu/zug/package.nix b/pkgs/by-name/zu/zug/package.nix index f3356dd51ae6..3d6bc76eb384 100644 --- a/pkgs/by-name/zu/zug/package.nix +++ b/pkgs/by-name/zu/zug/package.nix @@ -9,12 +9,12 @@ stdenv.mkDerivation rec { pname = "zug"; - version = "0.1.0"; + version = "0.1.1"; src = fetchFromGitHub { owner = "arximboldi"; repo = "zug"; rev = "v${version}"; - hash = "sha256-7xTMDhPIx1I1PiYNanGUsK8pdrWuemMWM7BW+NQs2BQ="; + hash = "sha256-Ti0EurhGQgWSXzSOlH9/Zsp6kQ/+qGjWbfHGTPpfehs="; }; nativeBuildInputs = [ cmake [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A zug nix build failed. -- The CXX compiler identification is GNU 13.2.0 -- Detecting C compiler ABI info -- Detecting C compiler ABI info - done -- Check for working C compiler: /nix/store/ac1hb5dc2z4biwgy8mjrhlifffkkrvdq-gcc-wrapper-13.2.0/bin/gcc - skipped -- Detecting C compile features -- Detecting C compile features - done -- Detecting CXX compiler ABI info -- Detecting CXX compiler ABI info - done -- Check for working CXX compiler: /nix/store/ac1hb5dc2z4biwgy8mjrhlifffkkrvdq-gcc-wrapper-13.2.0/bin/g++ - skipped -- Detecting CXX compile features -- Detecting CXX compile features - done -- Could not find ccache CMake Error at CMakeLists.txt:60 (find_package): By not providing "FindCatch2.cmake" in CMAKE_MODULE_PATH this project has asked CMake to find a package configuration file provided by "Catch2", but CMake did not find one. Could not find a package configuration file provided by "Catch2" with any of the following names: Catch2Config.cmake catch2-config.cmake Add the installation prefix of "Catch2" to CMAKE_PREFIX_PATH or set "Catch2_DIR" to a directory containing one of the above files. If "Catch2" provides a separate development package or SDK, be sure it has been installed.  -- Configuring incomplete, errors occurred! [result] Failed to update zug 0.1.0 -> 0.1.1 https://repology.org/project/zug/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.DrugExposureDiagnostics, using log file: /var/log/nixpkgs-update/rPackages.DrugExposureDiagnostics/2024-04-03.log rPackages.DrugExposureDiagnostics 1.0.1 -> 1.0.4 https://repology.org/project/r:drugexposurediagnostics/versions attrpath: rPackages.DrugExposureDiagnostics Checking auto update branch... No auto update branch exists Old version 1.0.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.DrugExposureDiagnostics 1.0.1 -> 1.0.4 https://repology.org/project/r:drugexposurediagnostics/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.adjclust, using log file: /var/log/nixpkgs-update/rPackages.adjclust/2024-04-03.log rPackages.adjclust 0.6.7 -> 0.6.9 https://repology.org/project/r:adjclust/versions attrpath: rPackages.adjclust Checking auto update branch... No auto update branch exists Old version 0.6.7" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.adjclust 0.6.7 -> 0.6.9 https://repology.org/project/r:adjclust/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cernlib, using log file: /var/log/nixpkgs-update/cernlib/2024-04-03.log cernlib 2006 -> 2023.10.31.0 https://repology.org/project/cernlib/versions attrpath: cernlib Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/3hcc8zq58qxxikc3blzzfqbpp8vlpl1j-2023.10.31.0_src.tar.gz.drv building '/nix/store/3hcc8zq58qxxikc3blzzfqbpp8vlpl1j-2023.10.31.0_src.tar.gz.drv'... trying https://ftp.riken.jp/cernlib/download/2023.10.31.0_source/tar/2023.10.31.0_src.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 262 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://cernlib.web.cern.ch/cernlib/download/2023.10.31.0_source/tar/2023.10.31.0_src.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 4470 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download 2023.10.31.0_src.tar.gz from any mirror error: builder for '/nix/store/3hcc8zq58qxxikc3blzzfqbpp8vlpl1j-2023.10.31.0_src.tar.gz.drv' failed with exit code 1; last 13 log lines: > > trying https://ftp.riken.jp/cernlib/download/2023.10.31.0_source/tar/2023.10.31.0_src.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 262 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 > curl: (22) The requested URL returned error: 404 > > trying https://cernlib.web.cern.ch/cernlib/download/2023.10.31.0_source/tar/2023.10.31.0_src.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 4470 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download 2023.10.31.0_src.tar.gz from any mirror For full logs, run 'nix log /nix/store/3hcc8zq58qxxikc3blzzfqbpp8vlpl1j-2023.10.31.0_src.tar.gz.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'cernlib.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/3hcc8zq58qxxikc3blzzfqbpp8vlpl1j-2023.10.31.0_src.tar.gz.drv /nix/store/wr1zyjijhhkk0p9rx1wq2si1n802h888-cernlib-2023.10.31.0.drv this path will be fetched (0.02 MiB download, 0.05 MiB unpacked): /nix/store/rbjgchy7fmkfp3ciqdq7rgd70x1jd53y-makedepend-1.0.9 copying path '/nix/store/rbjgchy7fmkfp3ciqdq7rgd70x1jd53y-makedepend-1.0.9' from 'https://cache.nixos.org'... building '/nix/store/3hcc8zq58qxxikc3blzzfqbpp8vlpl1j-2023.10.31.0_src.tar.gz.drv'... trying https://ftp.riken.jp/cernlib/download/2023.10.31.0_source/tar/2023.10.31.0_src.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 262 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://cernlib.web.cern.ch/cernlib/download/2023.10.31.0_source/tar/2023.10.31.0_src.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 4470 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download 2023.10.31.0_src.tar.gz from any mirror error: builder for '/nix/store/3hcc8zq58qxxikc3blzzfqbpp8vlpl1j-2023.10.31.0_src.tar.gz.drv' failed with exit code 1; last 13 log lines: > > trying https://ftp.riken.jp/cernlib/download/2023.10.31.0_source/tar/2023.10.31.0_src.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 262 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 > curl: (22) The requested URL returned error: 404 > > trying https://cernlib.web.cern.ch/cernlib/download/2023.10.31.0_source/tar/2023.10.31.0_src.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 4470 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download 2023.10.31.0_src.tar.gz from any mirror For full logs, run 'nix log /nix/store/3hcc8zq58qxxikc3blzzfqbpp8vlpl1j-2023.10.31.0_src.tar.gz.drv'. error: 1 dependencies of derivation '/nix/store/wr1zyjijhhkk0p9rx1wq2si1n802h888-cernlib-2023.10.31.0.drv' failed to build [result] Failed to update cernlib 2006 -> 2023.10.31.0 https://repology.org/project/cernlib/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO currently don't know how to update perl [result] Failed to update perl536Packages.DistZilla 6.030 -> 6.031 https://repology.org/project/perl:dist-zilla/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath adbfs-rootless, using log file: /var/log/nixpkgs-update/adbfs-rootless/2024-04-03.log adbfs-rootless 2023-03-21 -> 20200229 https://repology.org/project/adbfs-rootless/versions attrpath: adbfs-rootless Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/mobile/adbfs-rootless/default.nix b/pkgs/development/mobile/adbfs-rootless/default.nix index e959b88c6c6a..f6c32e5b0af9 100644 --- a/pkgs/development/mobile/adbfs-rootless/default.nix +++ b/pkgs/development/mobile/adbfs-rootless/default.nix @@ -8,13 +8,13 @@ stdenv.mkDerivation rec { pname = "adbfs-rootless"; - version = "unstable-2023-03-21"; + version = "unstable-20200229"; src = fetchFromGitHub { owner = "spion"; repo = pname; rev = "fd56381af4dc9ae2f09b904c295686871a46ed0f"; - sha256 = "atiVjRfqvhTlm8Q+3iTNNPQiNkLIaHDLg5HZDJvpl2Q="; + sha256 = "sha256-atiVjRfqvhTlm8Q+3iTNNPQiNkLIaHDLg5HZDJvpl2Q="; }; nativeBuildInputs = [ pkg-config ]; Source url did not change. [result] Failed to update adbfs-rootless 2023-03-21 -> 20200229 https://repology.org/project/adbfs-rootless/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath butt, using log file: /var/log/nixpkgs-update/butt/2024-04-03.log butt 0.1.40 -> 0.1.41 https://repology.org/project/butt/versions attrpath: butt Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/by-name/bu/butt/package.nix b/pkgs/by-name/bu/butt/package.nix index 6f2e7729797c..6ceaabb1fad7 100644 --- a/pkgs/by-name/bu/butt/package.nix +++ b/pkgs/by-name/bu/butt/package.nix @@ -3,11 +3,11 @@ stdenv.mkDerivation (finalAttrs: { pname = "butt"; - version = "0.1.40"; + version = "0.1.41"; src = fetchurl { url = "https://danielnoethen.de/butt/release/${finalAttrs.version}/butt-${finalAttrs.version}.tar.gz"; - hash = "sha256-wag177UIQ6YpBkJ5XQlxYtTdBFFNO5q+BLD/CiUkGoA="; + hash = "sha256-wTypjqd2PpmDSA8vScMLkAL44xE/WAccm747PS9ClVA="; }; postPatch = '' [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A butt nix build failed. checking host system type... x86_64-pc-linux-gnu checking whether the C++ compiler works... yes checking for C++ compiler default output file name... a.out checking for suffix of executables... checking whether we are cross compiling... no checking for suffix of object files... o checking whether the compiler supports GNU C++... yes checking whether g++ accepts -g... yes checking for g++ option to enable C++11 features... none needed checking whether make supports the include directive... yes (GNU style) checking dependency style of g++... none checking for gcc... gcc checking whether the compiler supports GNU C... yes checking whether gcc accepts -g... yes checking for gcc option to enable C11 features... none needed checking whether gcc understands -c and -o together... yes checking dependency style of gcc... none checking for gcc... gcc checking whether the compiler supports GNU Objective C... no checking whether gcc accepts -g... no checking dependency style of gcc... none checking for ogg_stream_init in -logg... yes checking for vorbis_info_init in -lvorbis... yes checking for vorbis_encode_init in -lvorbisenc... yes checking for opus_encoder_create in -lopus... yes checking for lame_init in -lmp3lame... yes checking for FLAC__stream_encoder_new in -lFLAC... yes checking for Pa_Initialize in -lportaudio... yes checking for Pm_Initialize in -lportmidi... no configure: error: **** Could not find libportmidi **** [result] Failed to update butt 0.1.40 -> 0.1.41 https://repology.org/project/butt/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath home-assistant-custom-components.sensi, using log file: /var/log/nixpkgs-update/home-assistant-custom-components.sensi/2024-04-03.log home-assistant-custom-components.sensi 0 -> 1 attrpath: home-assistant-custom-components.sensi Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/5sibjylclf6v1rgi7v956f27dprx4v77-packages.json.drv building '/nix/store/5sibjylclf6v1rgi7v956f27dprx4v77-packages.json.drv'... Going to be running update for following packages: - python3.12-iprak-sensi-1.3.4 Press Enter key to continue... Running update for: - python3.12-iprak-sensi-1.3.4: UPDATING ... - python3.12-iprak-sensi-1.3.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update home-assistant-custom-components.sensi 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gpg-tui, using log file: /var/log/nixpkgs-update/gpg-tui/2024-04-03.log gpg-tui 0.10.0 -> 0.11.0 https://repology.org/project/gpg-tui/versions attrpath: gpg-tui Checking auto update branch... No auto update branch exists Old version 0.10.0" not present in master derivation file with contents: { lib , stdenv , rustPlatform , fetchFromGitHub , gpgme , libgpg-error , pkg-config , python3 , AppKit , Foundation , libiconv , libobjc , libresolv , x11Support ? true, libxcb, libxkbcommon }: rustPlatform.buildRustPackage rec { pname = "gpg-tui"; version = "0.11.0"; src = fetchFromGitHub { owner = "orhun"; repo = "gpg-tui"; rev = "v${version}"; hash = "sha256-aHmLcWiDy5GMbcKi285tfBggNmGkpVAoZMm4dt8LKak="; }; cargoHash = "sha256-rtBvo2nX4A6K/TBl6xhW8huLXdR6xDUhzMB3KRXRYMs="; nativeBuildInputs = [ gpgme # for gpgme-config libgpg-error # for gpg-error-config pkg-config python3 ]; buildInputs = [ gpgme libgpg-error ] ++ lib.optionals x11Support [ libxcb libxkbcommon ] ++ lib.optionals stdenv.isDarwin [ AppKit Foundation libiconv libobjc libresolv ]; meta = with lib; { description = "Terminal user interface for GnuPG"; homepage = "https://github.com/orhun/gpg-tui"; changelog = "https://github.com/orhun/gpg-tui/blob/${src.rev}/CHANGELOG.md"; license = licenses.mit; maintainers = with maintainers; [ dotlambda matthiasbeyer ]; mainProgram = "gpg-tui"; }; } [result] Failed to update gpg-tui 0.10.0 -> 0.11.0 https://repology.org/project/gpg-tui/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.pak, using log file: /var/log/nixpkgs-update/rPackages.pak/2024-04-03.log rPackages.pak 0.7.1 -> 0.7.2 https://repology.org/project/r:pak/versions attrpath: rPackages.pak Checking auto update branch... No auto update branch exists Old version 0.7.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.pak 0.7.1 -> 0.7.2 https://repology.org/project/r:pak/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.rgrass, using log file: /var/log/nixpkgs-update/rPackages.rgrass/2024-04-03.log rPackages.rgrass 0.4-1 -> 0.4-2 https://repology.org/project/r:rgrass/versions attrpath: rPackages.rgrass Checking auto update branch... No auto update branch exists Old version 0.4-1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.rgrass 0.4-1 -> 0.4-2 https://repology.org/project/r:rgrass/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rubyPackages.jekyll-relative-links, using log file: /var/log/nixpkgs-update/rubyPackages.jekyll-relative-links/2024-04-03.log rubyPackages.jekyll-relative-links 0.6.1 -> 0.7.0 https://repology.org/project/ruby:jekyll-relative-links/versions attrpath: rubyPackages.jekyll-relative-links Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update rubyPackages.jekyll-relative-links 0.6.1 -> 0.7.0 https://repology.org/project/ruby:jekyll-relative-links/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath ruby-lsp, using log file: /var/log/nixpkgs-update/ruby-lsp/2024-04-03.log ruby-lsp 0.14.5 -> 0.15.0 https://repology.org/project/ruby:ruby-lsp/versions attrpath: ruby-lsp Checking auto update branch... No auto update branch exists Old version 0.14.5" not present in master derivation file with contents: { actioncable = { dependencies = ["actionpack" "activesupport" "nio4r" "websocket-driver" "zeitwerk"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0ifiz4nd6a34z2n8lpdgvlgwziy2g364b0xzghiqd3inji0cwqp1"; type = "gem"; }; version = "7.1.3.2"; }; actionmailbox = { dependencies = ["actionpack" "activejob" "activerecord" "activestorage" "activesupport" "mail" "net-imap" "net-pop" "net-smtp"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1adqnf5zc4fdr71ykxdv5b50h7n4xfvrc0qcgwmgidi0cxkzx4r4"; type = "gem"; }; version = "7.1.3.2"; }; actionmailer = { dependencies = ["actionpack" "actionview" "activejob" "activesupport" "mail" "net-imap" "net-pop" "net-smtp" "rails-dom-testing"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "012mxn5dfhwbssrckw6kvf851m6rlfa87n4nikk28g05ydfsvcys"; type = "gem"; }; version = "7.1.3.2"; }; actionpack = { dependencies = ["actionview" "activesupport" "nokogiri" "racc" "rack" "rack-session" "rack-test" "rails-dom-testing" "rails-html-sanitizer"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0n1v4r5cyac5wfdlf8bly45mnh60vbp067yjpkyb05vyszamiydq"; type = "gem"; }; version = "7.1.3.2"; }; actiontext = { dependencies = ["actionpack" "activerecord" "activestorage" "activesupport" "globalid" "nokogiri"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0an5sfy96cbd7f43igq47h3m228ivngqjj40gj6iqllhjhchgs7c"; type = "gem"; }; version = "7.1.3.2"; }; actionview = { dependencies = ["activesupport" "builder" "erubi" "rails-dom-testing" "rails-html-sanitizer"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1kq9b4xnwiknjqg4y6ixvv0cf1z0dcxs68inc8bx05s0fqrim6rn"; type = "gem"; }; version = "7.1.3.2"; }; activejob = { dependencies = ["activesupport" "globalid"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "08gjywvd65yzgjw7ynsgvi00scxc4fmgj70wajn7wsdqx00hbafj"; type = "gem"; }; version = "7.1.3.2"; }; activemodel = { dependencies = ["activesupport"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0p3ibps515151ja4gadrhh8frvjvvq4h5fpxw2acccv3z5i553hh"; type = "gem"; }; version = "7.1.3.2"; }; activerecord = { dependencies = ["activemodel" "activesupport" "timeout"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0ww1qxn12nlp0ivysq0pxj6cvajf0fbq781fr4pqx5206c690wj8"; type = "gem"; }; version = "7.1.3.2"; }; activestorage = { dependencies = ["actionpack" "activejob" "activerecord" "activesupport" "marcel"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "09wp0qqp7xr31ipcv42bs81fmyksz9l3jmraryf53qjsbbqpfdr8"; type = "gem"; }; version = "7.1.3.2"; }; activesupport = { dependencies = ["base64" "bigdecimal" "concurrent-ruby" "connection_pool" "drb" "i18n" "minitest" "mutex_m" "tzinfo"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0blbbf2x7dn7ar4g9aij403582zb6zscbj48bz63lvaamsvlb15d"; type = "gem"; }; version = "7.1.3.2"; }; addressable = { dependencies = ["public_suffix"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0irbdwkkjwzajq1ip6ba46q49sxnrl2cw7ddkdhsfhb6aprnm3vr"; type = "gem"; }; version = "2.8.6"; }; ansi = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "14ims9zfal4gs2wpx2m5rd8zsrl2k794d359shkrsgg3fhr2a22l"; type = "gem"; }; version = "1.5.0"; }; ast = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "04nc8x27hlzlrr5c2gn7mar4vdr0apw5xg22wp6m8dx3wqr04a0y"; type = "gem"; }; version = "2.4.2"; }; atk = { dependencies = ["glib2"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "11lcig7dr3nanwdgsacv2hbdpdk5yfaqzfjl8gav41mjbk90w15q"; type = "gem"; }; version = "4.2.1"; }; awesome_print = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0vkq6c8y2jvaw03ynds5vjzl1v9wg608cimkd3bidzxc0jvk56z9"; type = "gem"; }; version = "1.9.2"; }; backport = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0xbzzjrgah0f8ifgd449kak2vyf30micpz6x2g82aipfv7ypsb4i"; type = "gem"; }; version = "1.2.0"; }; bacon = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1f06gdj77bmwzc1k5iragl1595hbn67yc7sqvs56ca8plrr2vmai"; type = "gem"; }; version = "1.2.0"; }; base64 = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "01qml0yilb9basf7is2614skjp8384h2pycfx86cr8023arfj98g"; type = "gem"; }; version = "0.2.0"; }; benchmark = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0wghmhwjzv4r9mdcny4xfz2h2cm7ci24md79rvy2x65r4i99k9sc"; type = "gem"; }; version = "0.3.0"; }; bigdecimal = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0cq1c29zbkcxgdihqisirhcw76xc768z2zpd5vbccpq0l1lv76g7"; type = "gem"; }; version = "3.1.7"; }; bindata = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "08r67nglsqnxrbn803szf5bdnqhchhq8kf2by94f37fcl65wpp19"; type = "gem"; }; version = "2.5.0"; }; builder = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "045wzckxpwcqzrjr353cxnyaxgf0qg22jh00dcx7z38cys5g1jlr"; type = "gem"; }; version = "3.2.4"; }; byebug = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0nx3yjf4xzdgb8jkmk2344081gqr22pgjqnmjg2q64mj5d6r9194"; type = "gem"; }; version = "11.1.3"; }; cairo = { dependencies = ["native-package-installer" "pkg-config" "red-colors"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1a85gisjb2n236bpay7cjqlxq07m4swc8mqnwy8c5rkxfhil194c"; type = "gem"; }; version = "1.17.13"; }; cairo-gobject = { dependencies = ["cairo" "glib2"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "06y99zan4apgi4bsqqwnsdlsyss8dk2plr2gksh4yw8lkkk3a5zs"; type = "gem"; }; version = "4.2.1"; }; camping = { dependencies = ["kdl" "listen" "mab" "rack" "rack-session" "rackup" "zeitwerk"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1w6q8qfz05w0f530yfg8r134zkbsgis9fa0awbypdqfh9jmlhn0m"; type = "gem"; }; version = "3.1.3"; }; certified = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1706p6p0a8adyvd943af2a3093xakvislgffw3v9dvp7j07dyk5a"; type = "gem"; }; version = "1.0.0"; }; charlock_holmes = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0hybw8jw9ryvz5zrki3gc9r88jqy373m6v46ynxsdzv1ysiyr40p"; type = "gem"; }; version = "0.7.7"; }; claide = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1lpm76j8d648i4f41kk7gkc2kgvfsjvw0sf8zknlr1gm38q68i75"; type = "gem"; }; version = "0.9.1"; }; clamp = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1gpz9jvg1gpr8xmfqd35gvyzsvmjvlvwm2sq3pyhml3i84a6qjrq"; type = "gem"; }; version = "0.6.5"; }; cld3 = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0rn46vga5c1ww2vkf4dbg0w5g4h0vwx9idvdz3284188q4ksfbmg"; type = "gem"; }; version = "3.6.0"; }; cocoapods = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1sgw1aymfahgyhz1317mxglnajv5jrm6d5wai4c970avsrlc6qrm"; type = "gem"; }; version = "0.2.0"; }; cocoapods-acknowledgements = { dependencies = ["cocoapods" "redcarpet" "xcodeproj"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "04gaijs4djjkynan06wyaxxz48db0czzfrhh95jn3r201k2ypa7k"; type = "gem"; }; version = "1.3.0"; }; cocoapods-art = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1qxwlsqwg6wa2aa3acf4jvgi3vpxlpdj8qq35jyhkyl16n4hrr1b"; type = "gem"; }; version = "1.1.1"; }; cocoapods-browser = { dependencies = ["cocoapods"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1mq9mcw3xnf2nqkmcjg874sx422dbmfa99vhw31c9jb0cd4j3m9p"; type = "gem"; }; version = "0.1.5"; }; cocoapods-clean = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "16zy8xl94clblxivlcrw2jf3dnvmwlr6jni6kz74rnc8wj42sf1w"; type = "gem"; }; version = "0.0.1"; }; cocoapods-clean_build_phases_scripts = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0syya8l1kz36069y7cx4f37aihpmbm4yd5wvifs3j8qzz8bpxpfi"; type = "gem"; }; version = "0.0.3"; }; cocoapods-coverage = { dependencies = ["cocoapods-testing" "slather"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0y2mhsraf48ww9bp7c7ghrqh3kpx1f1djji5vpm4vh1gj4qz6669"; type = "gem"; }; version = "0.0.5"; }; cocoapods-deintegrate = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "18pnng0lv5z6kpp8hnki0agdxx979iq6hxkfkglsyqzmir22lz2i"; type = "gem"; }; version = "1.0.5"; }; cocoapods-dependencies = { dependencies = ["ruby-graphviz"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "10ssv98af44698kp4w0wfdrc7x3ccf2w9dhcva6i7hwlffjvcsz3"; type = "gem"; }; version = "1.3.0"; }; cocoapods-deploy = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1qnhl54z0dqyn0sk7rgn3vwmfax0yr3sk2r464h888d2qjxz6v7j"; type = "gem"; }; version = "0.0.12"; }; cocoapods-disable-podfile-validations = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0csgcp2kkmciavnic1yrb8z405dg4lqkzdlw2zscahvggpwr0j2p"; type = "gem"; }; version = "0.2.0"; }; cocoapods-downloader = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1ldnwwsx44i2xsdmsmyz9xrar19lfy5s5xslvral1p3674dvwvmv"; type = "gem"; }; version = "2.1"; }; cocoapods-expert-difficulty = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "19shjj4kj9rqg1a3pax568q0w9rkq8jcba2mycvq0szbv7bw6pgl"; type = "gem"; }; version = "1.0.0"; }; cocoapods-fix-react-native = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0jhgg3amman51hvk0x7h1xqqdb71kfmbzfziaip6fxkl7sjr43ix"; type = "gem"; }; version = "2019.09.17.15"; }; cocoapods-generate = { dependencies = ["cocoapods-disable-podfile-validations"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0216rwc4r0z0a1gvckphn7x9qk7zn00ivc49kv0hgafmrmaf2wy3"; type = "gem"; }; version = "2.2.5"; }; cocoapods-git_url_rewriter = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1cmyrj92d781pkq1b6qbvpmxvfx8k3l36cdqsi46w55icjm1jqbw"; type = "gem"; }; version = "1.0.1"; }; cocoapods-keys = { dependencies = ["dotenv" "ruby-keychain"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1zycjq1i3kqzpixngm1jp66r075yrb54qcd0xxxa8rmxngimqhff"; type = "gem"; }; version = "2.3.1"; }; cocoapods-open = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1z9x1cqrz4zc6yd08clawi8gg7ip8vbhkh9lkrdkzw7i6lqyrp0j"; type = "gem"; }; version = "0.0.8"; }; cocoapods-plugins = { dependencies = ["nap"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "16na82sfyc8801qs1n22nwq486s4j7yj6rj7fcp8cbxmj371fpbj"; type = "gem"; }; version = "1.0.0"; }; cocoapods-search = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "12amy0nknv09bvzix8bkmcjn996c50c4ms20v2dl7v8rcw73n4qv"; type = "gem"; }; version = "1.0.1"; }; cocoapods-testing = { dependencies = ["xctasks"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "03dqcz9pks7mbzq3zkfm2rzbjwkcwp8z3rip60d4pqs8b2bb61bg"; type = "gem"; }; version = "0.0.6"; }; cocoapods-trunk = { dependencies = ["nap" "netrc"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0cgdx7z9psxxrsa13fk7qc9i6jskrwcafhrdz94avzia2y6dlnsz"; type = "gem"; }; version = "1.6.0"; }; cocoapods-try = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1znyp625rql37ivb5rk9fk9564cmax8icxfr041ysivpdrn98nql"; type = "gem"; }; version = "1.2.0"; }; cocoapods-try-release-fix = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0a7hbc5j0p507cyd9a0rd2mf2d525ia3gcnx7bdspxqnhl0a43bf"; type = "gem"; }; version = "0.1.2"; }; cocoapods-update-if-you-dare = { dependencies = ["colored2"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0nqvywrbfxiagip2vl9kj71h39g4idq1lshkxl5bqh1hq57g4k9q"; type = "gem"; }; version = "0.2.0"; }; cocoapods-whitelist = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0imaai3zmm3mx35kmfhsir8c3ijcs0s2zm8gd2rhqmk26gn3xqbm"; type = "gem"; }; version = "0.5.4"; }; cocoapods-wholemodule = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "03gr4r0aa9mrj8i27dd6l87jzq78sid3jbywmkazg3yrq6y38i21"; type = "gem"; }; version = "0.0.1"; }; coderay = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0jvxqxzply1lwp7ysn94zjhh57vc14mcshw1ygw14ib8lhc00lyw"; type = "gem"; }; version = "1.1.3"; }; coffee-script = { dependencies = ["coffee-script-source" "execjs"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0rc7scyk7mnpfxqv5yy4y5q1hx3i7q3ahplcp4bq2g5r24g2izl2"; type = "gem"; }; version = "2.4.1"; }; coffee-script-source = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1907v9q1zcqmmyqzhzych5l7qifgls2rlbnbhy5vzyr7i7yicaz1"; type = "gem"; }; version = "1.12.2"; }; colorator = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0f7wvpam948cglrciyqd798gdc6z3cfijciavd0dfixgaypmvy72"; type = "gem"; }; version = "1.1.0"; }; colored = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0b0x5jmsyi0z69bm6sij1k89z7h0laag3cb4mdn7zkl9qmxb90lx"; type = "gem"; }; version = "1.2"; }; colored2 = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1zj06gjqwykgzxmbkp2hmg3wv5kv8zz5d77acxipzcgicdjgvfan"; type = "gem"; }; version = "4.0.0"; }; commonmarker = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1lb5slzbqrca49h0gaifg82xky5r7i9xgm4560pin1xl5fp15lzx"; type = "gem"; }; version = "0.23.10"; }; concurrent-ruby = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1qh1b14jwbbj242klkyz5fc7npd4j0mvndz62gajhvl1l3wd7zc2"; type = "gem"; }; version = "1.2.3"; }; connection_pool = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1x32mcpm2cl5492kd6lbjbaf17qsssmpx9kdyr7z1wcif2cwyh0g"; type = "gem"; }; version = "2.4.1"; }; crabstone = { dependencies = ["ffi"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "154g3l1flndm5pvnhjnrn47ndnsxvfm8y1kv4zhnwiys28pv40nb"; type = "gem"; }; version = "4.0.4"; }; crass = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0pfl5c0pyqaparxaqxi6s4gfl21bdldwiawrc0aknyvflli60lfw"; type = "gem"; }; version = "1.0.6"; }; curb = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1lgga9ina9gnpp9ycj8lpqkc5hm5qlxb41s4pfg0w6fnnpgmairc"; type = "gem"; }; version = "1.0.5"; }; curses = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "00y9g79lzfffxarj3rmhnkblsnyx7izx91mh8c1sdcs9y2pdfq53"; type = "gem"; }; version = "1.4.4"; }; daemons = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "07cszb0zl8mqmwhc8a2yfg36vi6lbgrp4pa5bvmryrpcz9v6viwg"; type = "gem"; }; version = "1.4.1"; }; data_objects = { dependencies = ["addressable"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "19fw1ckqc5f1wc4r72qrymy2k6cmd8azbxpn61ksbsjqhzc2bgqd"; type = "gem"; }; version = "0.10.17"; }; date = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "149jknsq999gnhy865n33fkk22s0r447k76x9pmcnnwldfv2q7wp"; type = "gem"; }; version = "3.3.4"; }; dentaku = { dependencies = ["concurrent-ruby"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0ssmjs7x733n7x6zvcwkaq2rnl0sz1qslli19s730a7ny7pialqg"; type = "gem"; }; version = "3.4.2"; }; dep-selector-libgecode = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "09frwp3np5c64y8g5rnbl46n7riknmdjprhndsh6zzajkjr9m3xj"; type = "gem"; }; version = "1.3.5"; }; diff-lcs = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1znxccz83m4xgpd239nyqxlifdb7m8rlfayk6s259186nkgj6ci7"; type = "gem"; }; version = "1.5.1"; }; differ = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0iayb71yqw5bgarq829fwchykw8lsqm8alnjc6c2m6k74fvnvkjy"; type = "gem"; }; version = "0.1.2"; }; digest-sha3 = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0x8fcwqn6b1l227w38l4hy6i28cpbfbp2yrmklgfy8nb7hq2k1gk"; type = "gem"; }; version = "1.0.2"; }; dip = { dependencies = ["thor"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0vpj7mxfyjjyhqmxrbwgf03b4m4wq4bmcbka66jarp1nsqsxya28"; type = "gem"; }; version = "8.0.0"; }; dnsruby = { dependencies = ["simpleidn"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "069402nn1sb63bslp9p5mcbn90zzzj6549ykxa4km0klb1l1klxr"; type = "gem"; }; version = "1.72.0"; }; do_sqlite3 = { dependencies = ["data_objects"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0gxz54qjgwg6a2mkqpai28m0i5swbyxpr4qmh9x1nwf20lysrgcf"; type = "gem"; }; version = "0.10.17"; }; docile = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1lxqxgq71rqwj1lpl9q1mbhhhhhhdkkj7my341f2889pwayk85sz"; type = "gem"; }; version = "1.4.0"; }; domain_name = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0cyr2xm576gqhqicsyqnhanni47408w2pgvrfi8pd13h2li3nsaz"; type = "gem"; }; version = "0.6.20240107"; }; dotenv = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1d5jv27p3gpj68pc1cxj3cp1bs11r25w2336sndsdfkx34p6hzlb"; type = "gem"; }; version = "3.1.0"; }; drb = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0h5kbj9hvg5hb3c7l425zpds0vb42phvln2knab8nmazg2zp5m79"; type = "gem"; }; version = "2.2.1"; }; e2mmap = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0n8gxjb63dck3vrmsdcqqll7xs7f3wk78mw8w0gdk9wp5nx6pvj5"; type = "gem"; }; version = "0.1.0"; }; elftools = { dependencies = ["bindata"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0p96wj4sz3sfv9yxyl8z530554bkbf82vj24w6x7yf91qa1p8z6i"; type = "gem"; }; version = "1.1.3"; }; em-websocket = { dependencies = ["eventmachine" "http_parser.rb"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1a66b0kjk6jx7pai9gc7i27zd0a128gy73nmas98gjz6wjyr4spm"; type = "gem"; }; version = "0.5.3"; }; erb-formatter = { dependencies = ["syntax_tree"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0g2jghbn2pmi1k8lnqbslyjix2rablalp4gjjsh4k9gxpvx5r1x1"; type = "gem"; }; version = "0.7.2"; }; erubi = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "08s75vs9cxlc4r1q2bjg4br8g9wc5lc5x5vl0vv4zq5ivxsdpgi7"; type = "gem"; }; version = "1.12.0"; }; ethon = { dependencies = ["ffi"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "17ix0mijpsy3y0c6ywrk5ibarmvqzjsirjyprpsy3hwax8fdm85v"; type = "gem"; }; version = "0.16.0"; }; eventmachine = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0wh9aqb0skz80fhfn66lbpr4f86ya2z5rx6gm5xlfhd05bj1ch4r"; type = "gem"; }; version = "1.2.7"; }; excon = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1m3gzvp1wqki0yh4b7761qhdy4pyr4phy429b7s9w25nrkhp4lsz"; type = "gem"; }; version = "0.110.0"; }; execjs = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1yywajqlpjhrj1m43s3lfg3i4lkb6pxwccmwps7qw37ndmphdzg8"; type = "gem"; }; version = "2.9.1"; }; faraday = { dependencies = ["faraday-net_http"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1qqb1rmk0f9m82iijjlqadh5yby1bhnr6svjk9vxdvh6f181988s"; type = "gem"; }; version = "2.9.0"; }; faraday-net_http = { dependencies = ["net-http"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "17w51yk4rrm9rpnbc3x509s619kba0jga3qrj4b17l30950vw9qn"; type = "gem"; }; version = "3.1.0"; }; ffi = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1yvii03hcgqj30maavddqamqy50h7y6xcn2wcyq72wn823zl4ckd"; type = "gem"; }; version = "1.16.3"; }; ffi-compiler = { dependencies = ["ffi" "rake"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1844j58cdg2q6g0rqfwg4rrambnhf059h4yg9rfmrbrcs60kskx9"; type = "gem"; }; version = "1.3.2"; }; ffi-rzmq-core = { dependencies = ["ffi"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0amkbvljpjfnv0jpdmz71p1i3mqbhyrnhamjn566w0c01xd64hb5"; type = "gem"; }; version = "1.0.7"; }; fiddle = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0x504023g56y32r81l6i4pqbhn46szzy6s5bcdlc7kb5iv1iigar"; type = "gem"; }; version = "1.1.2"; }; fog-core = { dependencies = ["builder" "excon" "formatador" "mime-types"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0p2xiw0n4l1k3ynma1vl0fzw5w8xhkv70x4f829nydxv7hply80y"; type = "gem"; }; version = "2.4.0"; }; fog-dnsimple = { dependencies = ["fog-core" "fog-json"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0lbzkc0w96a62ahjw0b7mfbqgg9x2jp7khg5hvpbgw0kfs5xza63"; type = "gem"; }; version = "2.1.0"; }; fog-json = { dependencies = ["fog-core" "multi_json"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1zj8llzc119zafbmfa4ai3z5s7c4vp9akfs0f9l2piyvcarmlkyx"; type = "gem"; }; version = "1.2.0"; }; formatador = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1l06bv4avphbdmr1y4g0rqlczr38k6r65b3zghrbj2ynyhm3xqjl"; type = "gem"; }; version = "1.1.0"; }; forwardable-extended = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "15zcqfxfvsnprwm8agia85x64vjzr2w0xn9vxfnxzgcv8s699v0v"; type = "gem"; }; version = "2.6.0"; }; gdk3 = { dependencies = ["cairo-gobject" "gdk_pixbuf2" "pango"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0nbzvmg3aa0r9iadkpiz3fzr1dnv09vx6bi7cc5wgpg13d3i3rbl"; type = "gem"; }; version = "4.2.1"; }; gdk_pixbuf2 = { dependencies = ["gio2"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1lrs0g6s5l050ld8mfjscijg0iycx9hq2wgdwc76y3nm47gs78na"; type = "gem"; }; version = "4.2.1"; }; gemoji = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0vgklpmhdz98xayln5hhqv4ffdyrglzwdixkn5gsk9rj94pkymc0"; type = "gem"; }; version = "3.0.1"; }; gio2 = { dependencies = ["fiddle" "gobject-introspection"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1zpz71ybilrk7i9ym7jx807fza22sdjm18l6qydds3gm7bpybvdz"; type = "gem"; }; version = "4.2.1"; }; git = { dependencies = ["addressable" "rchardet"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0w3xhay1z7qx9ab04wmy5p4f1fadvqa6239kib256wsiyvcj595h"; type = "gem"; }; version = "1.19.1"; }; github-pages = { dependencies = ["github-pages-health-check" "jekyll" "jekyll-avatar" "jekyll-coffeescript" "jekyll-commonmark-ghpages" "jekyll-default-layout" "jekyll-feed" "jekyll-gist" "jekyll-github-metadata" "jekyll-include-cache" "jekyll-mentions" "jekyll-optional-front-matter" "jekyll-paginate" "jekyll-readme-index" "jekyll-redirect-from" "jekyll-relative-links" "jekyll-remote-theme" "jekyll-sass-converter" "jekyll-seo-tag" "jekyll-sitemap" "jekyll-swiss" "jekyll-theme-architect" "jekyll-theme-cayman" "jekyll-theme-dinky" "jekyll-theme-hacker" "jekyll-theme-leap-day" "jekyll-theme-merlot" "jekyll-theme-midnight" "jekyll-theme-minimal" "jekyll-theme-modernist" "jekyll-theme-primer" "jekyll-theme-slate" "jekyll-theme-tactile" "jekyll-theme-time-machine" "jekyll-titles-from-headings" "jemoji" "kramdown" "kramdown-parser-gfm" "liquid" "mercenary" "minima" "nokogiri" "rouge" "terminal-table"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0608fr1ggyrk2f6pfc4zwy9i9prkxx0dsfb4k9j8s249kczqmlbr"; type = "gem"; }; version = "231"; }; github-pages-health-check = { dependencies = ["addressable" "dnsruby" "octokit" "public_suffix" "typhoeus"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0gc431xd6vwrh1p7pc3gp3xn7sy1w7dr7f95hmz4fqa1b97kv2fz"; type = "gem"; }; version = "1.18.2"; }; gitlab-markup = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1m3ypny84jyvlxf060p3q3d8pb4yihxa2br5hh012bgc11d09nky"; type = "gem"; }; version = "1.9.0"; }; glib2 = { dependencies = ["native-package-installer" "pkg-config"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0lbvk3jz21kw811hn411xvql7l14bb8kfnqc10inkkyli3a2ifv3"; type = "gem"; }; version = "4.2.1"; }; globalid = { dependencies = ["activesupport"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1sbw6b66r7cwdx3jhs46s4lr991969hvigkjpbdl7y3i31qpdgvh"; type = "gem"; }; version = "1.2.1"; }; gobject-introspection = { dependencies = ["glib2"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "08ysbhg8njdf1sb4mmx90baswqbya5ihw8kyym3rw43sl2gswnsk"; type = "gem"; }; version = "4.2.1"; }; gpgme = { dependencies = ["mini_portile2"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0r1vmql7w7ka5xzj1aqf8pk2a4sv0znwj2zkg1fgvd5b89qcvv2k"; type = "gem"; }; version = "2.0.24"; }; gtk3 = { dependencies = ["atk" "gdk3"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1hk0anmyczicvjzri5pdj6f65ibf1pyarychayhzxjl50n9sf1wd"; type = "gem"; }; version = "4.2.1"; }; haml = { dependencies = ["temple" "thor" "tilt"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "15yxph91zswbnfy7szpdcfbdfqqn595ff290hm4f6fcnhryvhvlf"; type = "gem"; }; version = "6.3.0"; }; hashie = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1nh3arcrbz1rc1cr59qm53sdhqm137b258y8rcb4cvd3y98lwv4x"; type = "gem"; }; version = "5.0.0"; }; highline = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "02ghhvigqbq4252gsi4w8a9klkdkybmbz29ghfp1y6sqzlcb466a"; type = "gem"; }; version = "3.0.1"; }; hike = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0hbhmchyhm1xf632cczmyg3fsbn7zly988q3fjpi8l3nb4cn40xj"; type = "gem"; }; version = "2.1.3"; }; hitimes = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0ix9rp9rsrwin38z2aqiwpxc8p2dzl6m3ra47az47fsija1cb2qf"; type = "gem"; }; version = "2.0.0"; }; hpricot = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1jn8x9ch79gqmnzgyz78kppavjh5lqx0y0r6frykga2b86rz9s6z"; type = "gem"; }; version = "0.8.6"; }; html-pipeline = { dependencies = ["activesupport" "nokogiri"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "180kjksi0sdlqb0aq0bhal96ifwqm25hzb3w709ij55j51qls7ca"; type = "gem"; }; version = "2.14.3"; }; htmlbeautifier = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0nrqvgja3pbmz4v27zc5ir58sk4mv177nq7hlssy2smawbvhhgdl"; type = "gem"; }; version = "1.4.3"; }; http = { dependencies = ["addressable" "base64" "http-cookie" "http-form_data" "llhttp-ffi"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "05b1khh7wxga9jviy9yi8z1nckxbm3svlzv40y0zvq3nag3d77mr"; type = "gem"; }; version = "5.2.0"; }; http-accept = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "09m1facypsdjynfwrcv19xcb1mqg8z6kk31g8r33pfxzh838c9n6"; type = "gem"; }; version = "1.7.0"; }; http-cookie = { dependencies = ["domain_name"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "13rilvlv8kwbzqfb644qp6hrbsj82cbqmnzcvqip1p6vqx36sxbk"; type = "gem"; }; version = "1.0.5"; }; http-form_data = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1wx591jdhy84901pklh1n9sgh74gnvq1qyqxwchni1yrc49ynknc"; type = "gem"; }; version = "2.3.0"; }; "http_parser.rb" = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1gj4fmls0mf52dlr928gaq0c0cb0m3aqa9kaa6l0ikl2zbqk42as"; type = "gem"; }; version = "0.8.0"; }; httpclient = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "19mxmvghp7ki3klsxwrlwr431li7hm1lczhhj8z4qihl2acy8l99"; type = "gem"; }; version = "2.8.3"; }; i18n = { dependencies = ["concurrent-ruby"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0lbm33fpb3w06wd2231sg58dwlwgjsvym93m548ajvl6s3mfvpn7"; type = "gem"; }; version = "1.14.4"; }; iconv = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "00fppiz9ypy7xpc08xdk6glq842rbc69c7a1p0kmv195271i4yqv"; type = "gem"; }; version = "1.0.8"; }; idn-ruby = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0dy04jx3n1ddz744b80mg7hp87miysnjp0h21lqr43hpmhdglxih"; type = "gem"; }; version = "0.1.5"; }; indieweb-endpoints = { dependencies = ["http" "link-header-parser" "nokogiri"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1yqy5clqrqwprmk8vwzni0vdgyvbzm5x36bj33qhv5b11kgskbwp"; type = "gem"; }; version = "8.0.0"; }; io-console = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "08d2lx42pa8jjav0lcjbzfzmw61b8imxr9041pva8xzqabrczp7h"; type = "gem"; }; version = "0.7.2"; }; irb = { dependencies = ["rdoc" "reline"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "17ak21ybbprj9vg0hk8pb1r2yk9vlh50v9bdwh3qvlmpzcvljqq7"; type = "gem"; }; version = "1.12.0"; }; jaro_winkler = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "10fd3i92897blalxfkgc0jjv0qqx31v7cm7j2b6a3b97an0bfz80"; type = "gem"; }; version = "1.5.6"; }; jbuilder = { dependencies = ["actionview" "activesupport"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1h58xgmp0fqpnd6mvw0zl0f76119v8lnf4xabqhckbzl6jrk8qpa"; type = "gem"; }; version = "2.11.5"; }; jekyll = { dependencies = ["addressable" "colorator" "em-websocket" "i18n" "jekyll-sass-converter" "jekyll-watch" "kramdown" "liquid" "mercenary" "pathutil" "rouge" "safe_yaml"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1w36kbn1ijbqfn33xbx14rpzr6adgiw2ip5g95jrzi1nh3qraan2"; type = "gem"; }; version = "3.9.5"; }; jekyll-archives = { dependencies = ["jekyll"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0c2rks7xf6ajp18h4f4wmmbqm5ljprv70bqcz2sabi17zncmz9n0"; type = "gem"; }; version = "2.2.1"; }; jekyll-avatar = { dependencies = ["jekyll"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0jzxmfcljfvjz21wls2w5mr2m5qp0mq9c80j009s4m6yq9vn4wza"; type = "gem"; }; version = "0.8.0"; }; jekyll-coffeescript = { dependencies = ["coffee-script" "coffee-script-source"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "040i6cyv20qmxlpm74kh5hfci8208ja4903yxdv4x0qs0z172kl9"; type = "gem"; }; version = "1.2.2"; }; jekyll-commonmark = { dependencies = ["commonmarker"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0i281yiwqiim6jzh7b8hgg8zifs5mn1qz1z6f4109kh9zrcfcc8p"; type = "gem"; }; version = "1.4.0"; }; jekyll-commonmark-ghpages = { dependencies = ["commonmarker" "jekyll" "jekyll-commonmark" "rouge"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1zps7bb9kc4qf32b9y9h47z08wpsziklg0jnhcrcz2wxn09fijgd"; type = "gem"; }; version = "0.4.0"; }; jekyll-default-layout = { dependencies = ["jekyll"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1br08grgv7h36jhlvzfaa3ikp1zz4b6s57ak4fhzrsjx997bw9n6"; type = "gem"; }; version = "0.1.5"; }; jekyll-favicon = { dependencies = ["jekyll" "mini_magick" "rexml"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0dyksm4i11n0qshd7wh6dvk8d0fc70dd32ir2dxs6igxq0gd6hi1"; type = "gem"; }; version = "1.1.0"; }; jekyll-feed = { dependencies = ["jekyll"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1hzwmjrxi57x68i7jx5rxi8qlcbqcbg3di55wywrp53pr0bap6k8"; type = "gem"; }; version = "0.17.0"; }; jekyll-gist = { dependencies = ["octokit"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "03wz9j6yq3552nzf4g71qrdm9pfdgbm68abml9sjjgiaan1n8ns9"; type = "gem"; }; version = "1.5.0"; }; jekyll-github-metadata = { dependencies = ["jekyll" "octokit"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0k2vnq6ns0x3iwnp8pw9lbxds924wmqswzy0gd57f95gpn49kwjc"; type = "gem"; }; version = "2.16.1"; }; jekyll-include-cache = { dependencies = ["jekyll"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "01d2l6qrmjc42664ns83cv36jbvalcxqbkmj5i22fakka7jvkm67"; type = "gem"; }; version = "0.2.1"; }; jekyll-mentions = { dependencies = ["html-pipeline" "jekyll"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1n8y67plydfmay3jn865igvgb3h6s2crk8kq7ydk3wmn9h103s1r"; type = "gem"; }; version = "1.6.0"; }; jekyll-optional-front-matter = { dependencies = ["jekyll"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "06vnxcmgkxm5nvrpv89qq0afjlxmadv63nh4ryglcwhlf4fhdp7c"; type = "gem"; }; version = "0.3.2"; }; jekyll-paginate = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0r7bcs8fq98zldih4787zk5i9w24nz5wa26m84ssja95n3sas2l8"; type = "gem"; }; version = "1.1.0"; }; jekyll-readme-index = { dependencies = ["jekyll"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0chybr1zgnrmc7zf6psszcqnlrcy2jar8h77kci51lxj8vgc8k6p"; type = "gem"; }; version = "0.3.0"; }; jekyll-redirect-from = { dependencies = ["jekyll"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1nz6kd6qsa160lmjmls4zgx7fwcpp8ac07mpzy80z6zgd7jwldb6"; type = "gem"; }; version = "0.16.0"; }; jekyll-relative-links = { dependencies = ["jekyll"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0vfx90ajxyj24lz406k3pqknlbzy8nqs7wpz0in4ps9rggsh24yi"; type = "gem"; }; version = "0.6.1"; }; jekyll-remote-theme = { dependencies = ["addressable" "jekyll" "jekyll-sass-converter" "rubyzip"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0h2bwl42dig0282366kpxazxb8xafnppnd4yvq2dzcsg90kfgzfk"; type = "gem"; }; version = "0.4.3"; }; jekyll-sass-converter = { dependencies = ["sass"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "008ikh5fk0n6ri54mylcl8jn0mq8p2nfyfqif2q3pp0lwilkcxsk"; type = "gem"; }; version = "1.5.2"; }; jekyll-seo-tag = { dependencies = ["jekyll"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0638mqhqynghnlnaz0xi1kvnv53wkggaq94flfzlxwandn8x2biz"; type = "gem"; }; version = "2.8.0"; }; jekyll-sitemap = { dependencies = ["jekyll"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0622rwsn5i0m5xcyzdn86l68wgydqwji03lqixdfm1f1xdfqrq0d"; type = "gem"; }; version = "1.4.0"; }; jekyll-spaceship = { dependencies = ["gemoji" "jekyll" "nokogiri" "rainbow"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "142bp48vq9aqwpqig54anbv7ncwqv1h78mbqhckmnx0glnqlkyzh"; type = "gem"; }; version = "0.10.2"; }; jekyll-swiss = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "18w893f2snpbvgl80jnmq3xxsl5yi5a5qm11iy3gx0d8viasi6f2"; type = "gem"; }; version = "1.0.0"; }; jekyll-theme-architect = { dependencies = ["jekyll" "jekyll-seo-tag"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0h04zxlcdsb73qxh08xmsc36gmj95plwxr9g5zwzqd3bmbfd6xbj"; type = "gem"; }; version = "0.2.0"; }; jekyll-theme-cayman = { dependencies = ["jekyll" "jekyll-seo-tag"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0ajzhqhnj8gc5ns7i69kh69mzidvxkjs7yblrhzb13iaqzwi8prw"; type = "gem"; }; version = "0.2.0"; }; jekyll-theme-dinky = { dependencies = ["jekyll" "jekyll-seo-tag"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0z1clccf4q0g2zzhl1hfy3x2rcdjs6bzs9ab76lkmpphj5q2a2vj"; type = "gem"; }; version = "0.2.0"; }; jekyll-theme-hacker = { dependencies = ["jekyll" "jekyll-seo-tag"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "12ppp0bxffy838p4my79nppq112fazifr3cxwvhv3l6yjbwzjsw1"; type = "gem"; }; version = "0.2.0"; }; jekyll-theme-leap-day = { dependencies = ["jekyll" "jekyll-seo-tag"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1lf7bbpr2s2rir2nf07rnh2g9mjy6zidpacs3j45la70b8qah7lj"; type = "gem"; }; version = "0.2.0"; }; jekyll-theme-merlot = { dependencies = ["jekyll" "jekyll-seo-tag"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0ifmvq44vwmkp6sb79ys8lx5w24gn3dhdr32bg562da2c8dv5wnb"; type = "gem"; }; version = "0.2.0"; }; jekyll-theme-midnight = { dependencies = ["jekyll" "jekyll-seo-tag"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1plindxr5vrk98frzxbnkashgnqs86xkg26rjmhgz0qf6mkz77q0"; type = "gem"; }; version = "0.2.0"; }; jekyll-theme-minimal = { dependencies = ["jekyll" "jekyll-seo-tag"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "10idwpbqjqfc5i895ijf74ac79lccxpz30bvwp4x4fjp6l6229d2"; type = "gem"; }; version = "0.2.0"; }; jekyll-theme-modernist = { dependencies = ["jekyll" "jekyll-seo-tag"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1kzvdnk1vw8y6x8gy340mhnxipxh9p1h1h20br68clyxbsy7brsb"; type = "gem"; }; version = "0.2.0"; }; jekyll-theme-primer = { dependencies = ["jekyll" "jekyll-github-metadata" "jekyll-seo-tag"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1cq7lfwa3xs8hkx3cmv2ics7cr4r2azv66m0gfav0zi1k0kjh9yf"; type = "gem"; }; version = "0.6.0"; }; jekyll-theme-slate = { dependencies = ["jekyll" "jekyll-seo-tag"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0f9l7kaafab2cphkx8gh4b12d8zzbg2ig7x2qzxvxfqjwyfr0h2y"; type = "gem"; }; version = "0.2.0"; }; jekyll-theme-tactile = { dependencies = ["jekyll" "jekyll-seo-tag"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0li64hnjp4qw7fwsdx0767z7mwxn3kri6sqlg9fkicnmmr41p1mp"; type = "gem"; }; version = "0.2.0"; }; jekyll-theme-time-machine = { dependencies = ["jekyll" "jekyll-seo-tag"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1qjgsw2n3zny345h540n6rm9600mad7rs33qf6k4rhngxjkr0d5w"; type = "gem"; }; version = "0.2.0"; }; jekyll-titles-from-headings = { dependencies = ["jekyll"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "10c4sa3gwyidmkcs8h6223lmqpw3h09mn7w8hxfppsk1wda6fdkp"; type = "gem"; }; version = "0.5.3"; }; jekyll-watch = { dependencies = ["listen"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1qd7hy1kl87fl7l0frw5qbn22x7ayfzlv9a5ca1m59g0ym1ysi5w"; type = "gem"; }; version = "2.2.1"; }; jekyll-webmention_io = { dependencies = ["activesupport" "htmlbeautifier" "jekyll" "json" "jsonpath" "openssl" "uglifier" "webmention"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0kkxvr1gfbmfbhy13syq4pqwmfqwhnbfcwjiqrwahf99gfcj5izh"; type = "gem"; }; version = "4.0.0"; }; jemoji = { dependencies = ["gemoji" "html-pipeline" "jekyll"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0z4yabsvqdb8x1rr60yyzbaf950cyzv984n3jwwvgcmv5j73wk2x"; type = "gem"; }; version = "0.13.0"; }; jmespath = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1cdw9vw2qly7q7r41s7phnac264rbsdqgj4l0h4nqgbjb157g393"; type = "gem"; }; version = "1.6.2"; }; json = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0r9jmjhg2ly3l736flk7r2al47b5c8cayh0gqkq0yhjqzc9a6zhq"; type = "gem"; }; version = "2.7.1"; }; json_pure = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "09w7f7xlcas9irlaavhz0rnh17cjvjmmqm07drgghx5gwjcrar31"; type = "gem"; }; version = "2.7.1"; }; jsonpath = { dependencies = ["multi_json"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0xxklfvmwz8z6l08704x65gnq6r8r1pb9qk125qjbndnb1zz6fsp"; type = "gem"; }; version = "1.0.7"; }; jwt = { dependencies = ["base64"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "02m3vza49pb9dirwpn8vmzbcypi3fc6l3a9dh253jwm1121g7ajb"; type = "gem"; }; version = "2.8.1"; }; kdl = { dependencies = ["base64" "bigdecimal" "simpleidn"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "02kpqgss9psmxb1c2gzq6l5i41ykskwqiacppqdm86ky0f88j6cb"; type = "gem"; }; version = "1.0.4"; }; keystone-engine = { dependencies = ["ffi"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0waz2bj1dsl63416k1n0vvrwva425rm94gsza7ci49mm1wjdabh2"; type = "gem"; }; version = "0.9.0"; }; kramdown = { dependencies = ["rexml"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1ic14hdcqxn821dvzki99zhmcy130yhv5fqfffkcf87asv5mnbmn"; type = "gem"; }; version = "2.4.0"; }; kramdown-parser-gfm = { dependencies = ["kramdown"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0a8pb3v951f4x7h968rqfsa19c8arz21zw1vaj42jza22rap8fgv"; type = "gem"; }; version = "1.1.0"; }; kramdown-rfc2629 = { dependencies = ["certified" "differ" "json_pure" "kramdown" "kramdown-parser-gfm" "net-http-persistent" "unicode-blocks" "unicode-name" "unicode-scripts"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "00sms1hsjsw3w9a7z4qn3sl1dhkjg9wfnfmjbxk6n5glz7ymfwnj"; type = "gem"; }; version = "1.7.8"; }; language_server-protocol = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0gvb1j8xsqxms9mww01rmdl78zkd72zgxaap56bhv8j45z05hp1x"; type = "gem"; }; version = "3.17.0.3"; }; libv8 = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0kd4d5x9sxsbpbsk4xp66rxbmj2x3iglwirqws56wp7dzf7cd978"; type = "gem"; }; version = "8.4.255.0.1"; }; libxml-ruby = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1pib5bfwg684f1sczrhf3lzk9hb24dhsw5cmlnxm4rq66sx0slss"; type = "gem"; }; version = "5.0.3"; }; link-header-parser = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1bm32imabc12rjjw8ysca55c99flcsichynfflphxy8gda07dj9x"; type = "gem"; }; version = "5.1.1"; }; liquid = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1czxv2i1gv3k7hxnrgfjb0z8khz74l4pmfwd70c7kr25l2qypksg"; type = "gem"; }; version = "4.0.4"; }; listen = { dependencies = ["rb-fsevent" "rb-inotify"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "13rgkfar8pp31z1aamxf5y7cfq88wv6rxxcwy7cmm177qq508ycn"; type = "gem"; }; version = "3.8.0"; }; llhttp-ffi = { dependencies = ["ffi-compiler" "rake"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1yph78m8w8l6i9833fc7shy5krk4mnqjc7ys0bg9kgxw8jnl0vs9"; type = "gem"; }; version = "0.5.0"; }; loofah = { dependencies = ["crass" "nokogiri"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1zkjqf37v2d7s11176cb35cl83wls5gm3adnfkn2zcc61h3nxmqh"; type = "gem"; }; version = "2.22.0"; }; mab = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0manxbilpx0hdi19lhdsr4ncvbzgmwh279b64j8w60dg0p0i4b4j"; type = "gem"; }; version = "0.0.3"; }; magic = { dependencies = ["ffi"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "18vkdq2748wxg0kr923fbhx92wikh2dwv2hp8xind57qs7gn26pr"; type = "gem"; }; version = "0.2.9"; }; mail = { dependencies = ["mini_mime" "net-imap" "net-pop" "net-smtp"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1bf9pysw1jfgynv692hhaycfxa8ckay1gjw5hz3madrbrynryfzc"; type = "gem"; }; version = "2.8.1"; }; marcel = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "190n2mk8m1l708kr88fh6mip9sdsh339d2s6sgrik3sbnvz4jmhd"; type = "gem"; }; version = "1.0.4"; }; markaby = { dependencies = ["builder"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0da76p1gvfabm49a0g0pppxgcdackw8f3qhljalqykd4d5mb828j"; type = "gem"; }; version = "0.9.3"; }; matrix = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1h2cgkpzkh3dd0flnnwfq6f3nl2b1zff9lvqz8xs853ssv5kq23i"; type = "gem"; }; version = "0.4.2"; }; mercenary = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "10la0xw82dh5mqab8bl0dk21zld63cqxb1g16fk8cb39ylc4n21a"; type = "gem"; }; version = "0.3.6"; }; method_source = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1pnyh44qycnf9mzi1j6fywd5fkskv3x7nmsqrrws0rjn5dd4ayfp"; type = "gem"; }; version = "1.0.0"; }; mime-types = { dependencies = ["mime-types-data"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1r64z0m5zrn4k37wabfnv43wa6yivgdfk6cf2rpmmirlz889yaf1"; type = "gem"; }; version = "3.5.2"; }; mime-types-data = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "00x7w5xqsj9m33v3vkmy23wipkkysafksib53ypzn27p5g81w455"; type = "gem"; }; version = "3.2024.0305"; }; mini_magick = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0slh78f9z6n0l1i2km7m48yz7l4fjrk88sj1f4mh1wb39sl2yc37"; type = "gem"; }; version = "4.12.0"; }; mini_mime = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1vycif7pjzkr29mfk4dlqv3disc5dn0va04lkwajlpr1wkibg0c6"; type = "gem"; }; version = "1.1.5"; }; mini_portile2 = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1kl9c3kdchjabrihdqfmcplk3lq4cw1rr9f378y6q22qwy5dndvs"; type = "gem"; }; version = "2.8.5"; }; minima = { dependencies = ["jekyll" "jekyll-feed" "jekyll-seo-tag"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1gk7jmriiswda1ykjzpsw9cpiya4m9n0yrh0h6xnrc8zcfy543jj"; type = "gem"; }; version = "2.5.1"; }; minitest = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "07lq26b86giy3ha3fhrywk9r1ajhc2pm2mzj657jnpnbj1i6g17a"; type = "gem"; }; version = "5.22.3"; }; msgpack = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1a5adcb7bwan09mqhj3wi9ib52hmdzmqg7q08pggn3adibyn5asr"; type = "gem"; }; version = "1.7.2"; }; multi_json = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0pb1g1y3dsiahavspyzkdy39j4q377009f6ix0bh1ag4nqw43l0z"; type = "gem"; }; version = "1.15.0"; }; mustermann = { dependencies = ["ruby2_keywords"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0rwbq20s2gdh8dljjsgj5s6wqqfmnbclhvv2c2608brv7jm6jdbd"; type = "gem"; }; version = "3.0.0"; }; mutex_m = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1ma093ayps1m92q845hmpk0dmadicvifkbf05rpq9pifhin0rvxn"; type = "gem"; }; version = "0.2.0"; }; mysql2 = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0cysv1wdfdbizwkd0d9s16s832khdwv31pgp01mw2g3bbpa4gx3h"; type = "gem"; }; version = "0.5.6"; }; nap = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0xm5xssxk5s03wjarpipfm39qmgxsalb46v1prsis14x1xk935ll"; type = "gem"; }; version = "1.1.0"; }; native-package-installer = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0bvr9q7qwbmg9jfg85r1i5l7d0yxlgp0l2jg62j921vm49mipd7v"; type = "gem"; }; version = "1.1.9"; }; ncursesw = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1nc14wls1yiigz593vw7580hb99lf4n485axapiz6sqpg1jnlhcr"; type = "gem"; }; version = "1.4.10"; }; net-http = { dependencies = ["uri"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "10n2n9aq00ih8v881af88l1zyrqgs5cl3njdw8argjwbl5ggqvm9"; type = "gem"; }; version = "0.4.1"; }; net-http-persistent = { dependencies = ["connection_pool"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0i1as2lgnw7b4jid0gw5glv5hnxz36nmfsbr9rmxbcap72ijgy03"; type = "gem"; }; version = "4.0.2"; }; net-imap = { dependencies = ["date" "net-protocol"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0zn7j2w0hc622ig0rslk4iy6yp3937dy9ibhyr1mwwx39n7paxaj"; type = "gem"; }; version = "0.4.10"; }; net-pop = { dependencies = ["net-protocol"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1wyz41jd4zpjn0v1xsf9j778qx1vfrl24yc20cpmph8k42c4x2w4"; type = "gem"; }; version = "0.1.2"; }; net-protocol = { dependencies = ["timeout"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1a32l4x73hz200cm587bc29q8q9az278syw3x6fkc9d1lv5y0wxa"; type = "gem"; }; version = "0.2.2"; }; net-scp = { dependencies = ["net-ssh"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1si2nq9l6jy5n2zw1q59a5gaji7v9vhy8qx08h4fg368906ysbdk"; type = "gem"; }; version = "4.0.0"; }; net-smtp = { dependencies = ["net-protocol"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0amlhz8fhnjfmsiqcjajip57ici2xhw089x7zqyhpk51drg43h2z"; type = "gem"; }; version = "0.5.0"; }; net-ssh = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1i01340c4i144vvn3x54lc2rb77ch829qipl1rh6rqwm3yxzml9w"; type = "gem"; }; version = "7.2.1"; }; netrc = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0gzfmcywp1da8nzfqsql2zqi648mfnx6qwkig3cv36n9m0yy676y"; type = "gem"; }; version = "0.11.0"; }; nio4r = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "15iwbiij52x6jhdbl0rkcldnhfndmsy0sbnsygkr9vhskfqrp72m"; type = "gem"; }; version = "2.7.1"; }; nokogiri = { dependencies = ["mini_portile2" "racc"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0j72sg8n8834vbw2x8glcp46y5r2dls2pj64ll7rmf6mri9s52j9"; type = "gem"; }; version = "1.16.3"; }; observer = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1b2h1642jy1xrgyakyzz6bkq43gwp8yvxrs8sww12rms65qi18yq"; type = "gem"; }; version = "0.1.2"; }; octokit = { dependencies = ["faraday" "sawyer"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "15lvy06h276jryxg19258b2yqaykf0567sp0n16yipywhbp94860"; type = "gem"; }; version = "4.25.1"; }; og-corefoundation = { dependencies = ["ffi"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0xmz13rb92xy55askn5f3kkmz14qwyyhkdsikk2gd1ydicnaqkh8"; type = "gem"; }; version = "0.2.3"; }; one_gadget = { dependencies = ["elftools"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0v079xkzzr1bjff5z2wlzs0k11nk4b04kgy1p63lwhbl12jl7qz1"; type = "gem"; }; version = "1.7.4"; }; openssl = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "054d6ybgjdzxw567m7rbnd46yp6gkdbc5ihr536vxd3p15vbhjrw"; type = "gem"; }; version = "3.2.0"; }; optimist = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1vg2chy1cfmdj6c1gryl8zvjhhmb3plwgyh1jfnpq4fnfqv7asrk"; type = "gem"; }; version = "3.0.1"; }; opus-ruby = { dependencies = ["ffi"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0lyf2a8f1w1jk0qrl8h0gsydfalbh19g5k2c6xlq8j1sfzb0ij4d"; type = "gem"; }; version = "1.0.1"; }; ovirt-engine-sdk = { dependencies = ["json"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1vmacvx9q8iwnfbmybi7wlrvz0z47l8j5vgh3cm4pnsb35k95dsa"; type = "gem"; }; version = "4.6.0"; }; pandocomatic = { dependencies = ["optimist" "paru"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "04gq05mgy3v8gac0dk8ldr59865vbjhkzna51w8wh900512lakyq"; type = "gem"; }; version = "1.1.2"; }; pango = { dependencies = ["cairo-gobject" "gobject-introspection"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1lpl4klg2f1rq8rpsgkmjndkpf4zh2b8jjwryi8s3s5w9lb3314y"; type = "gem"; }; version = "4.2.1"; }; parallel = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "15wkxrg1sj3n1h2g8jcrn7gcapwcgxr659ypjf75z1ipkgxqxwsv"; type = "gem"; }; version = "1.24.0"; }; parser = { dependencies = ["ast" "racc"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "11r6kp8wam0nkfvnwyc1fmvky102r1vcfr84vi2p1a2wa0z32j3p"; type = "gem"; }; version = "3.3.0.5"; }; paru = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "10jiv4c28bdvp4r98s042ilzks8wx36qw5a4byragwa1fzwy87va"; type = "gem"; }; version = "1.2.0"; }; pastel = { dependencies = ["tty-color"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0xash2gj08dfjvq4hy6l1z22s5v30fhizwgs10d6nviggpxsj7a8"; type = "gem"; }; version = "0.8.0"; }; pathutil = { dependencies = ["forwardable-extended"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "12fm93ljw9fbxmv2krki5k5wkvr7560qy8p4spvb9jiiaqv78fz4"; type = "gem"; }; version = "0.16.2"; }; patron = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0523gddx88zql2mq6655k60gy2ac8vybpzkcf90lmd9nx7wl3fi9"; type = "gem"; }; version = "0.13.3"; }; pcaprub = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0886fcc5bi0kc0rbma5fj3wa3hbg2nl7ivnbi2j995yzg36zq7xy"; type = "gem"; }; version = "0.13.1"; }; pg = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "071b55bhsz7mivlnp2kv0a11msnl7xg5awvk8mlflpl270javhsb"; type = "gem"; }; version = "1.5.6"; }; pkg-config = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "04wi7n51w42v9s958gfmxwkg5iikq25whacyflpi307517ymlaya"; type = "gem"; }; version = "1.5.6"; }; polyglot = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1bqnxwyip623d8pr29rg6m8r0hdg08fpr2yb74f46rn1wgsnxmjr"; type = "gem"; }; version = "0.3.5"; }; prettier = { dependencies = ["syntax_tree" "syntax_tree-haml" "syntax_tree-rbs"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1iavhgs7iahjz28sks5kkml9gr43fx5rpq5l0ql81pkmfv3i0cbi"; type = "gem"; }; version = "4.0.4"; }; prettier_print = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1ybgks9862zmlx71zd4j20ky86fsrp6j6m0az4hzzb1zyaskha57"; type = "gem"; }; version = "1.2.1"; }; prism = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0pgxgng905jbhp0pr54w4w2pr4nqcq80ijj48204bj4x4nigj8ji"; type = "gem"; }; version = "0.24.0"; }; pry = { dependencies = ["coderay" "method_source"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0k9kqkd9nps1w1r1rb7wjr31hqzkka2bhi8b518x78dcxppm9zn4"; type = "gem"; }; version = "0.14.2"; }; pry-byebug = { dependencies = ["byebug" "pry"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1y41al94ks07166qbp2200yzyr5y60hm7xaiw4lxpgsm4b1pbyf8"; type = "gem"; }; version = "3.10.1"; }; pry-doc = { dependencies = ["pry" "yard"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0xgsr1agv754709fb7x11zn07skmbwlds88sa5s57d7x1apswmkd"; type = "gem"; }; version = "1.5.0"; }; psych = { dependencies = ["stringio"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0s5383m6004q76xm3lb732bp4sjzb6mxb6rbgn129gy2izsj4wrk"; type = "gem"; }; version = "5.1.2"; }; public_suffix = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1bni4qjrsh2q49pnmmd6if4iv3ak36bd2cckrs6npl111n769k9m"; type = "gem"; }; version = "5.0.4"; }; puma = { dependencies = ["nio4r"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0i2vaww6qcazj0ywva1plmjnj6rk23b01szswc5jhcq7s2cikd1y"; type = "gem"; }; version = "6.4.2"; }; pwntools = { dependencies = ["crabstone" "dentaku" "elftools" "keystone-engine" "method_source" "one_gadget" "rainbow" "ruby2ruby" "rubyserial"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0pxc3lcgnywglv0skzj1r8i4p8mwcj27hlwzwqf8sj2mn3iqyjnd"; type = "gem"; }; version = "1.2.1"; }; racc = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "01b9662zd2x9bp4rdjfid07h09zxj7kvn7f5fghbqhzc625ap1dp"; type = "gem"; }; version = "1.7.3"; }; rack = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0x3mijjklsrlzfmwqp7x58fla7sk8pfwijhk988nmba787r8rf9g"; type = "gem"; }; version = "3.0.10"; }; rack-protection = { dependencies = ["base64" "rack"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1xmvcxgm1jq92hqxm119gfk95wzl0d46nb2c2c6qqsm4ra2n3nyh"; type = "gem"; }; version = "4.0.0"; }; rack-session = { dependencies = ["rack"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "10afdpmy9kh0qva96slcyc59j4gkk9av8ilh58cnj0qq7q3b416v"; type = "gem"; }; version = "2.0.0"; }; rack-test = { dependencies = ["rack"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1ysx29gk9k14a14zsp5a8czys140wacvp91fja8xcja0j1hzqq8c"; type = "gem"; }; version = "2.1.0"; }; rackup = { dependencies = ["rack" "webrick"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0kbcka30g681cqasw47pq93fxjscq7yvs5zf8lp3740rb158ijvf"; type = "gem"; }; version = "2.1.0"; }; rails = { dependencies = ["actioncable" "actionmailbox" "actionmailer" "actionpack" "actiontext" "actionview" "activejob" "activemodel" "activerecord" "activestorage" "activesupport" "railties"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "185zq5r9g56sfks852992bm0xf2vm9569jyiz5jyww3vx1jply1d"; type = "gem"; }; version = "7.1.3.2"; }; rails-dom-testing = { dependencies = ["activesupport" "minitest" "nokogiri"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0fx9dx1ag0s1lr6lfr34lbx5i1bvn3bhyf3w3mx6h7yz90p725g5"; type = "gem"; }; version = "2.2.0"; }; rails-html-sanitizer = { dependencies = ["loofah" "nokogiri"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1pm4z853nyz1bhhqr7fzl44alnx4bjachcr6rh6qjj375sfz3sc6"; type = "gem"; }; version = "1.6.0"; }; railties = { dependencies = ["actionpack" "activesupport" "irb" "rackup" "rake" "thor" "zeitwerk"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0435sfvhhrd4b2ic9b4c2df3i1snryidx7ry9km4805rpxfdbz2r"; type = "gem"; }; version = "7.1.3.2"; }; rainbow = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0smwg4mii0fm38pyb5fddbmrdpifwv22zv3d3px2xx497am93503"; type = "gem"; }; version = "3.1.1"; }; rake = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1ilr853hawi09626axx0mps4rkkmxcs54mapz9jnqvpnlwd3wsmy"; type = "gem"; }; version = "13.1.0"; }; rb-fsevent = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1zmf31rnpm8553lqwibvv3kkx0v7majm1f341xbxc0bk5sbhp423"; type = "gem"; }; version = "0.11.2"; }; rb-inotify = { dependencies = ["ffi"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1jm76h8f8hji38z3ggf4bzi8vps6p7sagxn3ab57qc0xyga64005"; type = "gem"; }; version = "0.10.1"; }; rb-readline = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "14w79a121czmvk1s953qfzww30mqjb2zc0k9qhi0ivxxk3hxg6wy"; type = "gem"; }; version = "0.5.5"; }; rbnacl = { dependencies = ["ffi"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0y8yzianlkc9w6sbqy8iy8l0yym0y6x7p5rjflkfixq76fqmhvzk"; type = "gem"; }; version = "7.1.1"; }; rbs = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0dgj5n7rj83981fvrhswfwsh88x42p7r00nvd80hkxmdcjvda2h6"; type = "gem"; }; version = "2.8.4"; }; rchardet = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1isj1b3ywgg2m1vdlnr41lpvpm3dbyarf1lla4dfibfmad9csfk9"; type = "gem"; }; version = "1.8.0"; }; rdoc = { dependencies = ["psych"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0ib3cnf4yllvw070gr4bz94sbmqx3haqc5f846fsvdcs494vgxrr"; type = "gem"; }; version = "6.6.3.1"; }; re2 = { dependencies = ["mini_portile2"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1lx4wsrk7gd6733sjgrkwmj1x9jalnbfppawqfk0ljnw95c0557c"; type = "gem"; }; version = "2.9.0"; }; red-colors = { dependencies = ["json" "matrix"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "16lj0h6gzmc07xp5rhq5b7c1carajjzmyr27m96c99icg2hfnmi3"; type = "gem"; }; version = "0.4.0"; }; redcarpet = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1sg9sbf9pm91l7lac7fs4silabyn0vflxwaa2x3lrzsm0ff8ilca"; type = "gem"; }; version = "3.6.0"; }; redis = { dependencies = ["redis-client"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1yv9z3cch7aay3rs2iildk7jnvhijhwyyxvcn2nfdn6yp9vn7kxz"; type = "gem"; }; version = "5.1.0"; }; redis-client = { dependencies = ["connection_pool"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0irk5j73aqhyv54q3vs88y5rp9a5fkvbdif7zn5q7m5d51h2375w"; type = "gem"; }; version = "0.21.1"; }; redis-rack = { dependencies = ["rack-session" "redis-store"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "10438w0y1jbgr205zndvmz6md0mrqazh2j9fr88lvb8hms10pddb"; type = "gem"; }; version = "3.0.0"; }; redis-store = { dependencies = ["redis"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "17mhr1g3lmacrgjndbmrklngy32g55165n53111q70kykx7qjn7j"; type = "gem"; }; version = "1.10.0"; }; regexp_parser = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1ndxm0xnv27p4gv6xynk6q41irckj76q1jsqpysd9h6f86hhp841"; type = "gem"; }; version = "2.9.0"; }; reline = { dependencies = ["io-console"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1dr6dl0fsj66z3w0q90v467nswn5shmfq1rfsqjh4wzyldq4ak9c"; type = "gem"; }; version = "0.5.0"; }; rest-client = { dependencies = ["http-accept" "http-cookie" "mime-types" "netrc"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1qs74yzl58agzx9dgjhcpgmzfn61fqkk33k1js2y5yhlvc5l19im"; type = "gem"; }; version = "2.1.0"; }; reverse_markdown = { dependencies = ["nokogiri"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0087vhw5ik50lxvddicns01clkx800fk5v5qnrvi3b42nrk6885j"; type = "gem"; }; version = "2.1.1"; }; rexml = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "05i8518ay14kjbma550mv0jm8a6di8yp5phzrd8rj44z9qnrlrp0"; type = "gem"; }; version = "3.2.6"; }; rmagick = { dependencies = ["observer" "pkg-config"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1blqchqfbvqrwn9izzqf8wzkgfw6zafyrsl2ksg1w1d9qxj0c15s"; type = "gem"; }; version = "5.4.4"; }; rouge = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1dnfkrk8xx2m8r3r9m2p5xcq57viznyc09k7r3i4jbm758i57lx3"; type = "gem"; }; version = "3.30.0"; }; rpam2 = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1zvli3s4z1hf2l7gyfickm5i3afjrnycc3ihbiax6ji6arpbyf33"; type = "gem"; }; version = "4.0.2"; }; rspec = { dependencies = ["rspec-core" "rspec-expectations" "rspec-mocks"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "14xrp8vq6i9zx37vh0yp4h9m0anx9paw200l1r5ad9fmq559346l"; type = "gem"; }; version = "3.13.0"; }; rspec-core = { dependencies = ["rspec-support"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0k252n7s80bvjvpskgfm285a3djjjqyjcarlh3aq7a4dx2s94xsm"; type = "gem"; }; version = "3.13.0"; }; rspec-expectations = { dependencies = ["diff-lcs" "rspec-support"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0bhhjzwdk96vf3gq3rs7mln80q27fhq82hda3r15byb24b34h7b2"; type = "gem"; }; version = "3.13.0"; }; rspec-mocks = { dependencies = ["diff-lcs" "rspec-support"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0rkzkcfk2x0qjr5fxw6ib4wpjy0hqbziywplnp6pg3bm2l98jnkk"; type = "gem"; }; version = "3.13.0"; }; rspec-support = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "03z7gpqz5xkw9rf53835pa8a9vgj4lic54rnix9vfwmp2m7pv1s8"; type = "gem"; }; version = "3.13.1"; }; rubocop = { dependencies = ["json" "language_server-protocol" "parallel" "parser" "rainbow" "regexp_parser" "rexml" "rubocop-ast" "ruby-progressbar" "unicode-display_width"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0daamn13fbm77rdwwa4w6j6221iq6091asivgdhk6n7g398frcdf"; type = "gem"; }; version = "1.62.1"; }; rubocop-ast = { dependencies = ["parser"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1v3q8n48w8h809rqbgzihkikr4g3xk72m1na7s97jdsmjjq6y83w"; type = "gem"; }; version = "1.31.2"; }; rubocop-performance = { dependencies = ["rubocop" "rubocop-ast"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "16jayzjaaglhx69s6b83acpdzcxxccfkcn69gfpkimf2j64zlm7c"; type = "gem"; }; version = "1.21.0"; }; ruby-graphviz = { dependencies = ["rexml"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "010m283gk4qgzxkgrldlnrglh8d5fn6zvrzm56wf5abd7x7b8aqw"; type = "gem"; }; version = "1.2.5"; }; ruby-keychain = { dependencies = ["ffi" "og-corefoundation"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1g57fr1r39bfh1r887hp87mawfg3miidagvpqyqq3l0152ya43wr"; type = "gem"; }; version = "0.4.0"; }; ruby-libvirt = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0v6vj5vs9v01zr00bflqpfczhwcyc6jdf8k2dqn42lq6d87si77d"; type = "gem"; }; version = "0.8.2"; }; ruby-lsp = { dependencies = ["language_server-protocol" "prism" "sorbet-runtime"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1548gmj14xrc91lp7yzn0q23g6cjn8r7xfdlv2qarzi9k2a92l5m"; type = "gem"; }; version = "0.15.0"; }; ruby-lxc = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "08pnghqp15fwylq6w2qh7x1ikkiq87irpy0z03n0gma4gdzzx2qa"; type = "gem"; }; version = "1.2.3"; }; ruby-progressbar = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0cwvyb7j47m7wihpfaq7rc47zwwx9k4v7iqd9s1xch5nm53rrz40"; type = "gem"; }; version = "1.13.0"; }; ruby-terminfo = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0rl4ic5pzvrpgd42z0c1s2n3j39c9znksblxxvmhkzrc0ckyg2cm"; type = "gem"; }; version = "0.1.1"; }; ruby-vips = { dependencies = ["ffi"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0yycazz91ywwwv2iz3fgjkfn1z687bl4z5jjn7cwmky507b43652"; type = "gem"; }; version = "2.2.1"; }; ruby2_keywords = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1vz322p8n39hz3b4a9gkmz9y7a5jaz41zrm2ywf31dvkqm03glgz"; type = "gem"; }; version = "0.0.5"; }; ruby2ruby = { dependencies = ["ruby_parser" "sexp_processor"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "04bz2jw3ida07mgk450l9m6xklhzbv0z4s6ak6bl7vp4rhcy41f8"; type = "gem"; }; version = "2.5.0"; }; ruby_parser = { dependencies = ["racc" "sexp_processor"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0sy5y7w89ii5iqym7b21glcwxqg8kizxfy8a7kcxq0j65wyqjhiq"; type = "gem"; }; version = "3.21.0"; }; rubyserial = { dependencies = ["ffi"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1vj5yan6srbvkf5vfp9d9b9z8wyygd0zxcy54c35yhkjl6kwd22q"; type = "gem"; }; version = "0.6.0"; }; rubyzip = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0grps9197qyxakbpw02pda59v45lfgbgiyw48i0mq9f2bn9y6mrz"; type = "gem"; }; version = "2.3.2"; }; rugged = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1sccng15h8h3mcjxfgvxy85lfpswbj0nhmzwwsqdffbzqgsb2jch"; type = "gem"; }; version = "1.7.2"; }; safe_yaml = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0j7qv63p0vqcd838i2iy2f76c3dgwzkiz1d1xkg7n0pbnxj2vb56"; type = "gem"; }; version = "1.0.5"; }; sass = { dependencies = ["sass-listen"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0p95lhs0jza5l7hqci1isflxakz83xkj97lkvxl919is0lwhv2w0"; type = "gem"; }; version = "3.7.4"; }; sass-listen = { dependencies = ["rb-fsevent" "rb-inotify"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0xw3q46cmahkgyldid5hwyiwacp590zj2vmswlll68ryvmvcp7df"; type = "gem"; }; version = "4.0.0"; }; sassc = { dependencies = ["ffi"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0gpqv48xhl8mb8qqhcifcp0pixn206a7imc07g48armklfqa4q2c"; type = "gem"; }; version = "2.4.0"; }; sawyer = { dependencies = ["addressable" "faraday"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1jks1qjbmqm8f9kvwa81vqj39avaj9wdnzc531xm29a55bb74fps"; type = "gem"; }; version = "0.9.2"; }; scrypt = { dependencies = ["ffi-compiler"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0jw2bn6mqpw2wbjpmsfz44pppwa6zmhg9lywimm684sxkmlxscbl"; type = "gem"; }; version = "3.0.7"; }; semian = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0qs5mrjsr2hs03f2c1a611qrvxsk8pqlmhymxgwccwvr6arh3iby"; type = "gem"; }; version = "0.21.3"; }; sequel = { dependencies = ["bigdecimal"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "186wldacv9zdd3bxi85lika9hz6ac09r7kp1h4cjv23436qmsjq2"; type = "gem"; }; version = "5.78.0"; }; sequel_pg = { dependencies = ["pg" "sequel"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "01j51vn47ynyhlxpgz6wj8swm3d8g1hrad1678s0sd43kh2hqxdg"; type = "gem"; }; version = "1.17.1"; }; sexp_processor = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "182x05kpdjlckh31qizws50fz7sjk86yjjfmy45z61q3f930j4ci"; type = "gem"; }; version = "4.17.1"; }; simplecov = { dependencies = ["docile" "simplecov-html" "simplecov_json_formatter"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "198kcbrjxhhzca19yrdcd6jjj9sb51aaic3b0sc3pwjghg3j49py"; type = "gem"; }; version = "0.22.0"; }; simplecov-html = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0yx01bxa8pbf9ip4hagqkp5m0mqfnwnw2xk8kjraiywz4lrss6jb"; type = "gem"; }; version = "0.12.3"; }; simplecov_json_formatter = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0a5l0733hj7sk51j81ykfmlk2vd5vaijlq9d5fn165yyx3xii52j"; type = "gem"; }; version = "0.1.4"; }; simpleidn = { dependencies = ["unf"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "06f7w6ph3bzzqk212yylfp4jfx275shgp9zg3xszbpv1ny2skp9m"; type = "gem"; }; version = "0.2.1"; }; sinatra = { dependencies = ["mustermann" "rack" "rack-protection" "rack-session" "tilt"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0za92lv4s7xhgkkm6xxf7ib0b3bsyj8drxgkrskgsb5g3mxnixjl"; type = "gem"; }; version = "4.0.0"; }; slather = { dependencies = ["clamp" "xcodeproj"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0i1h1kr5j6v8kzrcdfrjxdf1qnnrwhxl9i5vkr8wgbspp5raissq"; type = "gem"; }; version = "1.3.0"; }; slop = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1iyrjskgxyn8i1679qwkzns85p909aq77cgx2m4fs5ygzysj4hw4"; type = "gem"; }; version = "4.10.1"; }; snappy = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1ndib94d181y5gd7qg515ralb02zri91vd3q94k21fgc4r897cd4"; type = "gem"; }; version = "0.4.0"; }; snmp = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1xr7rwfk7mwxzqcgir0glmyy4j27g6yixfaswsbd2qn6r8c980qf"; type = "gem"; }; version = "1.3.2"; }; solargraph = { dependencies = ["backport" "benchmark" "diff-lcs" "e2mmap" "jaro_winkler" "kramdown" "kramdown-parser-gfm" "parser" "rbs" "reverse_markdown" "rubocop" "thor" "tilt" "yard"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0qbjgsrlrwvbywzi0shf3nmfhb52y5fmp9al9nk7c4qqwxyhz397"; type = "gem"; }; version = "0.50.0"; }; sorbet-runtime = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "10fja24vp16ggxdaw77hcdk0rcz47qpdv8nn2wsgqdr04rrfjjvd"; type = "gem"; }; version = "0.5.11319"; }; sqlite3 = { dependencies = ["mini_portile2"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "073hd24qwx9j26cqbk0jma0kiajjv9fb8swv9rnz8j4mf0ygcxzs"; type = "gem"; }; version = "1.7.3"; }; stringio = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "063psvsn1aq6digpznxfranhcpmi0sdv2jhra5g0459sw0x2dxn1"; type = "gem"; }; version = "3.1.0"; }; syntax_tree = { dependencies = ["prettier_print"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0g9l9acknjr2yz8ynfxbcrwx2ws3wh96pfzdb31g66k08v1022m5"; type = "gem"; }; version = "6.2.0"; }; syntax_tree-haml = { dependencies = ["haml" "prettier_print" "syntax_tree"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0nb335cn093qnc3hyb8s4vbgn8apwz019m4dj15hz2y2gmkpdxnw"; type = "gem"; }; version = "4.0.3"; }; syntax_tree-rbs = { dependencies = ["prettier_print" "rbs" "syntax_tree"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1g9n2i99y6b5l3x3vp2nk0fss2x0b2gd1h5hynbs2y4ab35jhrsr"; type = "gem"; }; version = "1.0.0"; }; taglib-ruby = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0yvchq3j0splz70796a27hr1v6ifhyab5ddc9fl1x734nhmsy4rb"; type = "gem"; }; version = "1.1.3"; }; temple = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0fwia5hvc1xz9w7vprzjnsym3v9j5l9ggdvy70jixbvpcpz4acfz"; type = "gem"; }; version = "0.10.3"; }; terminal-table = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0hbmzfr17ji5ws5x5z3kypmb5irwwss7q7kkad0gs005ibqrxv0a"; type = "gem"; }; version = "1.6.0"; }; thor = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1vq1fjp45az9hfp6fxljhdrkv75cvbab1jfrwcw738pnsiqk8zps"; type = "gem"; }; version = "1.3.1"; }; thrift = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0i686137n188lj75nnhfpjz5zs8b4iak8iwpwciwb8lywm860nmv"; type = "gem"; }; version = "0.20.0"; }; tilt = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0p3l7v619hwfi781l3r7ypyv1l8hivp09r18kmkn6g11c4yr1pc2"; type = "gem"; }; version = "2.3.0"; }; timeout = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "16mvvsmx90023wrhf8dxc1lpqh0m8alk65shb7xcya6a9gflw7vg"; type = "gem"; }; version = "0.4.1"; }; tiny_tds = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1nva5glid3mpwqk0siws74r6qfv89n0amw9ffzwnwlm12cd4ahdm"; type = "gem"; }; version = "2.1.7"; }; treetop = { dependencies = ["polyglot"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0adc8qblz8ii668r3rksjx83p675iryh52rvdvysimx2hkbasj7d"; type = "gem"; }; version = "1.6.12"; }; tty-color = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0aik4kmhwwrmkysha7qibi2nyzb4c8kp42bd5vxnf8sf7b53g73g"; type = "gem"; }; version = "0.6.0"; }; tty-command = { dependencies = ["pastel"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "14hi8xiahfrrnydw6g3i30lxvvz90wp4xsrlhx8mabckrcglfv0c"; type = "gem"; }; version = "0.10.1"; }; tty-option = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "019ir4bcr8fag7dmq7ph6ilpvwjbv4qalip0bz7dlddbd6fk4vjs"; type = "gem"; }; version = "0.3.0"; }; typhoeus = { dependencies = ["ethon"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0z7gamf6s83wy0yqms3bi4srirn3fc0lc7n65lqanidxcj1xn5qw"; type = "gem"; }; version = "1.4.1"; }; tzinfo = { dependencies = ["concurrent-ruby"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "16w2g84dzaf3z13gxyzlzbf748kylk5bdgg3n1ipvkvvqy685bwd"; type = "gem"; }; version = "2.0.6"; }; uglifier = { dependencies = ["execjs"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0wgh7bzy68vhv9v68061519dd8samcy8sazzz0w3k8kqpy3g4s5f"; type = "gem"; }; version = "4.2.0"; }; unf = { dependencies = ["unf_ext"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0bh2cf73i2ffh4fcpdn9ir4mhq8zi50ik0zqa1braahzadx536a9"; type = "gem"; }; version = "0.1.4"; }; unf_ext = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1sf6bxvf6x8gihv6j63iakixmdddgls58cpxpg32chckb2l18qcj"; type = "gem"; }; version = "0.0.9.1"; }; unicode-blocks = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0zf98czws958zyniwb0wvcxifpcr850qfp4m9g6q90qpdh9c61s1"; type = "gem"; }; version = "1.9.0"; }; unicode-display_width = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1d0azx233nags5jx3fqyr23qa2rhgzbhv8pxp46dgbg1mpf82xky"; type = "gem"; }; version = "2.5.0"; }; unicode-name = { dependencies = ["unicode-types"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0177232y0di7klwy0nsixbjfs5mym334y6b3lbfczl8953ybdmg6"; type = "gem"; }; version = "1.12.0"; }; unicode-scripts = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0m2xcss5nr9q6312c4dir54537skpdmwdp5s7gxgjrsv82pzpjdr"; type = "gem"; }; version = "1.9.0"; }; unicode-types = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1wlqwz1cq4bis4r2h8ghbp5c56867a86nnzp2pxnlq48mnjnmgww"; type = "gem"; }; version = "1.9.0"; }; uri = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "094gk72ckazf495qc76gk09b5i318d5l9m7bicg2wxlrjcm3qm96"; type = "gem"; }; version = "0.13.0"; }; uuid4r = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0qlcxzn8pnql34pcdrkd20kdla3k6n2sspaxp3lwwx8a87jnzbc3"; type = "gem"; }; version = "0.2.0"; }; webmention = { dependencies = ["http" "indieweb-endpoints" "nokogiri"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1ag06gal14r3rlcv0c951w1a9wb0d04mk5pz2v0f71q9fzwxwwmi"; type = "gem"; }; version = "7.0.0"; }; webrick = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "13qm7s0gr2pmfcl7dxrmq38asaza4w0i2n9my4yzs499j731wh8r"; type = "gem"; }; version = "1.8.1"; }; websocket-driver = { dependencies = ["websocket-extensions"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1nyh873w4lvahcl8kzbjfca26656d5c6z3md4sbqg5y1gfz0157n"; type = "gem"; }; version = "0.7.6"; }; websocket-extensions = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "0hc2g9qps8lmhibl5baa91b4qx8wqw872rgwagml78ydj8qacsqw"; type = "gem"; }; version = "0.1.5"; }; whois = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "109v9vgkry317v5vc3b5dwgxpp1if3q9m26mrpl6052m020q05qx"; type = "gem"; }; version = "5.1.1"; }; xcodeproj = { dependencies = ["activesupport" "claide" "colored"]; groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "080xdnlkx8zfh2ka5jzgmj4k5jqxirfzggpjrc5q5q1mh5jamfwj"; type = "gem"; }; version = "0.28.2"; }; xctasks = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1jmxq0dv2q4qs628cykrhsm9piysjsacbq5blsf35a0fj015bw7l"; type = "gem"; }; version = "0.2.2"; }; yard = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1r0b8w58p7gy06wph1qdjv2p087hfnmhd9jk23vjdj803dn761am"; type = "gem"; }; version = "0.9.36"; }; zeitwerk = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1m67qmsak3x8ixs8rb971azl3l7wapri65pmbf5z886h46q63f1d"; type = "gem"; }; version = "2.6.13"; }; zookeeper = { groups = ["default"]; platforms = []; source = { remotes = ["https://rubygems.org"]; sha256 = "1hc87pbmgc53lksa1aql61kxn9d2kjzmlhnjxa5rcn01qhm3pkvg"; type = "gem"; }; version = "1.5.5"; }; } [result] Failed to update ruby-lsp 0.14.5 -> 0.15.0 https://repology.org/project/ruby:ruby-lsp/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.pyglet, using log file: /var/log/nixpkgs-update/python312Packages.pyglet/2024-04-03.log python312Packages.pyglet 2.0.10 -> 2.0.14 https://repology.org/project/python:pyglet/versions attrpath: python312Packages.pyglet Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/gpjvxndgp7wrk22z4dprnrzpgsa3kqbv-packages.json.drv building '/nix/store/gpjvxndgp7wrk22z4dprnrzpgsa3kqbv-packages.json.drv'... Going to be running update for following packages: - python3.12-pyglet-2.0.10 Press Enter key to continue... Running update for: - python3.12-pyglet-2.0.10: UPDATING ... - python3.12-pyglet-2.0.10: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python312Packages.pyglet 2.0.10 -> 2.0.14 https://repology.org/project/python:pyglet/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lynx, using log file: /var/log/nixpkgs-update/lynx/2024-04-03.log lynx 2.9.0dev12 -> 2.9.0rel0 https://repology.org/project/lynx/versions attrpath: lynx Checking auto update branch... No auto update branch exists Old version 2.9.0dev12" not present in master derivation file with contents: { lib , stdenv , buildPackages , fetchurl , pkg-config , ncurses , gzip , sslSupport ? true , openssl , nukeReferences , fetchpatch }: stdenv.mkDerivation rec { pname = "lynx"; version = "2.9.0dev.12"; src = fetchurl { urls = [ "ftp://ftp.invisible-island.net/lynx/tarballs/lynx${version}.tar.bz2" "https://invisible-mirror.net/archives/lynx/tarballs/lynx${version}.tar.bz2" ]; hash = "sha256-pkVbFZ0Ad22OwQUShcly3B8MVS0FcaDP8Coj7BRu6OU="; }; enableParallelBuilding = true; hardeningEnable = [ "pie" ]; configureFlags = [ "--enable-default-colors" "--enable-widec" "--enable-ipv6" ] ++ lib.optional sslSupport "--with-ssl"; depsBuildBuild = [ buildPackages.stdenv.cc ]; nativeBuildInputs = [ nukeReferences ] ++ lib.optional sslSupport pkg-config; buildInputs = [ ncurses gzip ] ++ lib.optional sslSupport openssl; # cfg_defs.h captures lots of references to build-only dependencies, derived # from config.cache. postConfigure = '' make cfg_defs.h nuke-refs cfg_defs.h ''; meta = with lib; { description = "A text-mode web browser"; homepage = "https://lynx.invisible-island.net/"; mainProgram = "lynx"; maintainers = with maintainers; [ ]; license = licenses.gpl2Plus; platforms = platforms.unix; }; } [result] Failed to update lynx 2.9.0dev12 -> 2.9.0rel0 https://repology.org/project/lynx/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gnomeExtensions.control-blur-effect-on-lock-screen, using log file: /var/log/nixpkgs-update/gnomeExtensions.control-blur-effect-on-lock-screen/2024-04-03.log gnomeExtensions.control-blur-effect-on-lock-screen 24 -> 20230905 https://repology.org/project/gnome:control-blur-effect-on-lock-screen/versions attrpath: gnomeExtensions.control-blur-effect-on-lock-screen Checking auto update branch... No auto update branch exists Old version 24" not present in master derivation file with contents: { pkgs, lib, stdenv, fetchzip, nixosTests }: let buildGnomeExtension = { # Every gnome extension has a UUID. It's the name of the extension folder once unpacked # and can always be found in the metadata.json of every extension. uuid, name, pname, description, # extensions.gnome.org extension URL link, # Extension version numbers are integers version, sha256, # Hex-encoded string of JSON bytes metadata, }: stdenv.mkDerivation { pname = "gnome-shell-extension-${pname}"; version = builtins.toString version; src = fetchzip { url = "https://extensions.gnome.org/extension-data/${ builtins.replaceStrings [ "@" ] [ "" ] uuid }.v${builtins.toString version}.shell-extension.zip"; inherit sha256; stripRoot = false; # The download URL may change content over time. This is because the # metadata.json is automatically generated, and parts of it can be changed # without making a new release. We simply substitute the possibly changed fields # with their content from when we last updated, and thus get a deterministic output # hash. postFetch = '' echo "${metadata}" | base64 --decode > $out/metadata.json ''; }; nativeBuildInputs = with pkgs; [ buildPackages.glib ]; buildPhase = '' runHook preBuild if [ -d schemas ]; then glib-compile-schemas --strict schemas fi runHook postBuild ''; installPhase = '' runHook preInstall mkdir -p $out/share/gnome-shell/extensions/ cp -r -T . $out/share/gnome-shell/extensions/${uuid} runHook postInstall ''; meta = { description = builtins.head (lib.splitString "\n" description); longDescription = description; homepage = link; license = lib.licenses.gpl2Plus; # https://wiki.gnome.org/Projects/GnomeShell/Extensions/Review#Licensing maintainers = with lib.maintainers; [ piegames ]; }; passthru = { extensionPortalSlug = pname; # Store the extension's UUID, because we might need it at some places extensionUuid = uuid; tests = { gnome-extensions = nixosTests.gnome-extensions; }; }; }; in lib.makeOverridable buildGnomeExtension [result] Failed to update gnomeExtensions.control-blur-effect-on-lock-screen 24 -> 20230905 https://repology.org/project/gnome:control-blur-effect-on-lock-screen/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.gif, using log file: /var/log/nixpkgs-update/rPackages.gif/2024-04-03.log rPackages.gif 0.1.0 -> 0.1.1 https://repology.org/project/r:gif/versions attrpath: rPackages.gif Checking auto update branch... No auto update branch exists Old version 0.1.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.gif 0.1.0 -> 0.1.1 https://repology.org/project/r:gif/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.tamarin-prover-theory, using log file: /var/log/nixpkgs-update/haskellPackages.tamarin-prover-theory/2024-04-03.log haskellPackages.tamarin-prover-theory 0.8.6.0 -> 1.8.0 https://repology.org/project/haskell:tamarin-prover-theory/versions attrpath: haskellPackages.tamarin-prover-theory Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update haskellPackages.tamarin-prover-theory 0.8.6.0 -> 1.8.0 https://repology.org/project/haskell:tamarin-prover-theory/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath ecos, using log file: /var/log/nixpkgs-update/ecos/2024-04-03.log ecos 2.0.7 -> 2.0.10 https://repology.org/project/ecos/versions attrpath: ecos Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/13z1gi1pivw99l5z4f51130dr9yv0jvr-source.drv building '/nix/store/13z1gi1pivw99l5z4f51130dr9yv0jvr-source.drv'... trying https://github.com/embotech/ecos/archive/2.0.10.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/13z1gi1pivw99l5z4f51130dr9yv0jvr-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/embotech/ecos/archive/2.0.10.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/13z1gi1pivw99l5z4f51130dr9yv0jvr-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'ecos.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/13z1gi1pivw99l5z4f51130dr9yv0jvr-source.drv /nix/store/3sr2zhww07590davy64ifvinca694r1n-ecos-2.0.10.drv building '/nix/store/13z1gi1pivw99l5z4f51130dr9yv0jvr-source.drv'... trying https://github.com/embotech/ecos/archive/2.0.10.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/13z1gi1pivw99l5z4f51130dr9yv0jvr-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/embotech/ecos/archive/2.0.10.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/13z1gi1pivw99l5z4f51130dr9yv0jvr-source.drv'. error: 1 dependencies of derivation '/nix/store/3sr2zhww07590davy64ifvinca694r1n-ecos-2.0.10.drv' failed to build [result] Failed to update ecos 2.0.7 -> 2.0.10 https://repology.org/project/ecos/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.SparseArray, using log file: /var/log/nixpkgs-update/rPackages.SparseArray/2024-04-03.log rPackages.SparseArray 1.2.3 -> 1.3.4 https://repology.org/project/r:sparsearray/versions attrpath: rPackages.SparseArray Checking auto update branch... No auto update branch exists Old version 1.2.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.SparseArray 1.2.3 -> 1.3.4 https://repology.org/project/r:sparsearray/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath maxima, using log file: /var/log/nixpkgs-update/maxima/2024-04-03.log maxima 5.46.0 -> 5.47.0 https://repology.org/project/maxima/versions attrpath: maxima Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update maxima 5.46.0 -> 5.47.0 https://repology.org/project/maxima/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.gglm, using log file: /var/log/nixpkgs-update/rPackages.gglm/2024-04-03.log rPackages.gglm 1.0.2 -> 1.0.3 https://repology.org/project/r:gglm/versions attrpath: rPackages.gglm Checking auto update branch... No auto update branch exists Old version 1.0.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.gglm 1.0.2 -> 1.0.3 https://repology.org/project/r:gglm/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.jagshelper, using log file: /var/log/nixpkgs-update/rPackages.jagshelper/2024-04-03.log rPackages.jagshelper 0.2.0 -> 0.2.2 https://repology.org/project/r:jagshelper/versions attrpath: rPackages.jagshelper Checking auto update branch... No auto update branch exists Old version 0.2.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.jagshelper 0.2.0 -> 0.2.2 https://repology.org/project/r:jagshelper/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath fte, using log file: /var/log/nixpkgs-update/fte/2024-04-03.log fte 0.50.02 -> 20110708 https://repology.org/project/fte/versions attrpath: fte Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update fte 0.50.02 -> 20110708 https://repology.org/project/fte/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.htsr, using log file: /var/log/nixpkgs-update/rPackages.htsr/2024-04-03.log rPackages.htsr 2.1.2 -> 2.1.4 https://repology.org/project/r:htsr/versions attrpath: rPackages.htsr Checking auto update branch... No auto update branch exists Old version 2.1.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.htsr 2.1.2 -> 2.1.4 https://repology.org/project/r:htsr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.bigmemory, using log file: /var/log/nixpkgs-update/rPackages.bigmemory/2024-04-03.log rPackages.bigmemory 4.6.1 -> 4.6.4 https://repology.org/project/r:bigmemory/versions attrpath: rPackages.bigmemory Checking auto update branch... No auto update branch exists Old version 4.6.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.bigmemory 4.6.1 -> 4.6.4 https://repology.org/project/r:bigmemory/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath libfakekey, using log file: /var/log/nixpkgs-update/libfakekey/2024-04-03.log libfakekey 0.1 -> 0.3 https://repology.org/project/libfakekey/versions attrpath: libfakekey Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/xz35yyj0gn00av5mcnqhqwlfvvfqvq3j-libfakekey-0.3.tar.gz.drv building '/nix/store/xz35yyj0gn00av5mcnqhqwlfvvfqvq3j-libfakekey-0.3.tar.gz.drv'... trying https://downloads.yoctoproject.org/releases/matchbox/libfakekey/0.3/libfakekey-0.3.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 153 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download libfakekey-0.3.tar.gz from any mirror error: builder for '/nix/store/xz35yyj0gn00av5mcnqhqwlfvvfqvq3j-libfakekey-0.3.tar.gz.drv' failed with exit code 1; last 7 log lines: > > trying https://downloads.yoctoproject.org/releases/matchbox/libfakekey/0.3/libfakekey-0.3.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 153 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download libfakekey-0.3.tar.gz from any mirror For full logs, run 'nix log /nix/store/xz35yyj0gn00av5mcnqhqwlfvvfqvq3j-libfakekey-0.3.tar.gz.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'libfakekey.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/xz35yyj0gn00av5mcnqhqwlfvvfqvq3j-libfakekey-0.3.tar.gz.drv /nix/store/7c5yj5ffzw3jx7mkj9p0s0n3207c2q5w-libfakekey-0.3.drv building '/nix/store/xz35yyj0gn00av5mcnqhqwlfvvfqvq3j-libfakekey-0.3.tar.gz.drv'... trying https://downloads.yoctoproject.org/releases/matchbox/libfakekey/0.3/libfakekey-0.3.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 153 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download libfakekey-0.3.tar.gz from any mirror error: builder for '/nix/store/xz35yyj0gn00av5mcnqhqwlfvvfqvq3j-libfakekey-0.3.tar.gz.drv' failed with exit code 1; last 7 log lines: > > trying https://downloads.yoctoproject.org/releases/matchbox/libfakekey/0.3/libfakekey-0.3.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 153 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download libfakekey-0.3.tar.gz from any mirror For full logs, run 'nix log /nix/store/xz35yyj0gn00av5mcnqhqwlfvvfqvq3j-libfakekey-0.3.tar.gz.drv'. error: 1 dependencies of derivation '/nix/store/7c5yj5ffzw3jx7mkj9p0s0n3207c2q5w-libfakekey-0.3.drv' failed to build [result] Failed to update libfakekey 0.1 -> 0.3 https://repology.org/project/libfakekey/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath parcellite, using log file: /var/log/nixpkgs-update/parcellite/2024-04-03.log parcellite 1.2.1 -> 1.2.6 https://repology.org/project/parcellite/versions attrpath: parcellite Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/cs2spf9cqif0alx0rx4lpg1xbpj2mgig-source.drv building '/nix/store/cs2spf9cqif0alx0rx4lpg1xbpj2mgig-source.drv'... trying https://github.com/rickyrockrat/parcellite/archive/1.2.6.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/cs2spf9cqif0alx0rx4lpg1xbpj2mgig-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/rickyrockrat/parcellite/archive/1.2.6.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/cs2spf9cqif0alx0rx4lpg1xbpj2mgig-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'parcellite.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/cs2spf9cqif0alx0rx4lpg1xbpj2mgig-source.drv /nix/store/s567b5y0mkgv69ryijykkiz65hx38dyk-parcellite-1.2.6.drv this path will be fetched (0.01 MiB download, 0.09 MiB unpacked): /nix/store/449l1w4czkl07apgiwikqgmfynf82zl1-libappindicator-gtk2-12.10.1+20.10.20200706.1-dev copying path '/nix/store/449l1w4czkl07apgiwikqgmfynf82zl1-libappindicator-gtk2-12.10.1+20.10.20200706.1-dev' from 'https://cache.nixos.org'... building '/nix/store/cs2spf9cqif0alx0rx4lpg1xbpj2mgig-source.drv'... trying https://github.com/rickyrockrat/parcellite/archive/1.2.6.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/cs2spf9cqif0alx0rx4lpg1xbpj2mgig-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/rickyrockrat/parcellite/archive/1.2.6.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/cs2spf9cqif0alx0rx4lpg1xbpj2mgig-source.drv'. error: 1 dependencies of derivation '/nix/store/s567b5y0mkgv69ryijykkiz65hx38dyk-parcellite-1.2.6.drv' failed to build [result] Failed to update parcellite 1.2.1 -> 1.2.6 https://repology.org/project/parcellite/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath ogdf, using log file: /var/log/nixpkgs-update/ogdf/2024-04-03.log ogdf 2022.02 -> 202309 https://repology.org/project/ogdf/versions attrpath: ogdf Checking auto update branch... No auto update branch exists [version] Hashes equal; no update necessary [result] Failed to update ogdf 2022.02 -> 202309 https://repology.org/project/ogdf/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lime, using log file: /var/log/nixpkgs-update/lime/2024-04-03.log lime 5.2.98 -> 5.3.38 https://repology.org/project/lime/versions attrpath: lime Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/libraries/lime/default.nix b/pkgs/development/libraries/lime/default.nix index 0ac3e0f81ecd..530d86c2741a 100644 --- a/pkgs/development/libraries/lime/default.nix +++ b/pkgs/development/libraries/lime/default.nix @@ -10,7 +10,7 @@ stdenv.mkDerivation rec { pname = "lime"; - version = "5.2.98"; + version = "5.3.38"; src = fetchFromGitLab { domain = "gitlab.linphone.org"; @@ -18,7 +18,7 @@ stdenv.mkDerivation rec { group = "BC"; repo = pname; rev = version; - hash = "sha256-LdwXBJpwSA/PoCXL+c1pcX1V2Fq/eR6nNmwBKDM1Vr8="; + hash = "sha256-Sp9l7MK4mmzp+hPacGKDSg40GrJftIE3y8VPRlwipck="; }; buildInputs = [ [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A lime nix build failed. Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "configurePhase" } Running phase: configurePhase fixing cmake files... cmake flags: -DCMAKE_FIND_USE_SYSTEM_PACKAGE_REGISTRY=OFF -DCMAKE_FIND_USE_PACKAGE_REGISTRY=OFF -DCMAKE_EXPORT_NO_PACKAGE_REGISTRY=ON -DCMAKE_BUILD_TYPE=Release -DBUILD_TESTING=OFF -DCMAKE_INSTALL_LOCALEDIR=/nix/store/y09kggx270m4vajwm0f47rjr4ifsff9c-lime-5.3.38/share/locale -DCMAKE_INSTALL_LIBEXECDIR=/nix/store/y09kggx270m4vajwm0f47rjr4ifsff9c-lime-5.3.38/libexec -DCMAKE_INSTALL_LIBDIR=/nix/store/y09kggx270m4vajwm0f47rjr4ifsff9c-lime-5.3.38/lib -DCMAKE_INSTALL_DOCDIR=/nix/store/y09kggx270m4vajwm0f47rjr4ifsff9c-lime-5.3.38/share/doc/Lime -DCMAKE_INSTALL_INFODIR=/nix/store/y09kggx270m4vajwm0f47rjr4ifsff9c-lime-5.3.38/share/info -DCMAKE_INSTALL_MANDIR=/nix/store/y09kggx270m4vajwm0f47rjr4ifsff9c-lime-5.3.38/share/man -DCMAKE_INSTALL_OLDINCLUDEDIR=/nix/store/y09kggx270m4vajwm0f47rjr4ifsff9c-lime-5.3.38/include -DCMAKE_INSTALL_INCLUDEDIR=/nix/store/y09kggx270m4vajwm0f47rjr4ifsff9c-lime-5.3.38/include -DCMAKE_INSTALL_SBINDIR=/nix/store/y09kggx270m4vajwm0f47rjr4ifsff9c-lime-5.3.38/sbin -DCMAKE_INSTALL_BINDIR=/nix/store/y09kggx270m4vajwm0f47rjr4ifsff9c-lime-5.3.38/bin -DCMAKE_INSTALL_NAME_DIR=/nix/store/y09kggx270m4vajwm0f47rjr4ifsff9c-lime-5.3.38/lib -DCMAKE_POLICY_DEFAULT_CMP0025=NEW -DCMAKE_OSX_SYSROOT= -DCMAKE_FIND_FRAMEWORK=LAST -DCMAKE_STRIP=/nix/store/ac1hb5dc2z4biwgy8mjrhlifffkkrvdq-gcc-wrapper-13.2.0/bin/strip -DCMAKE_RANLIB=/nix/store/ac1hb5dc2z4biwgy8mjrhlifffkkrvdq-gcc-wrapper-13.2.0/bin/ranlib -DCMAKE_AR=/nix/store/ac1hb5dc2z4biwgy8mjrhlifffkkrvdq-gcc-wrapper-13.2.0/bin/ar -DCMAKE_C_COMPILER=gcc -DCMAKE_CXX_COMPILER=g++ -DCMAKE_INSTALL_PREFIX=/nix/store/y09kggx270m4vajwm0f47rjr4ifsff9c-lime-5.3.38 -DENABLE_STATIC=NO -DENABLE_UNIT_TESTS=NO -- The CXX compiler identification is GNU 13.2.0 -- Detecting CXX compiler ABI info -- Detecting CXX compiler ABI info - done -- Check for working CXX compiler: /nix/store/ac1hb5dc2z4biwgy8mjrhlifffkkrvdq-gcc-wrapper-13.2.0/bin/g++ - skipped -- Detecting CXX compile features -- Detecting CXX compile features - done -- Setting install rpath to /nix/store/y09kggx270m4vajwm0f47rjr4ifsff9c-lime-5.3.38/lib CMake Error at CMakeLists.txt:62 (find_package): By not providing "FindBCToolbox.cmake" in CMAKE_MODULE_PATH this project has asked CMake to find a package configuration file provided by "BCToolbox", but CMake did not find one. Could not find a package configuration file provided by "BCToolbox" (requested version 5.3.0) with any of the following names: BCToolboxConfig.cmake bctoolbox-config.cmake Add the installation prefix of "BCToolbox" to CMAKE_PREFIX_PATH or set "BCToolbox_DIR" to a directory containing one of the above files. If "BCToolbox" provides a separate development package or SDK, be sure it has been installed.  -- Configuring incomplete, errors occurred! [result] Failed to update lime 5.2.98 -> 5.3.38 https://repology.org/project/lime/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath sensible-utils, using log file: /var/log/nixpkgs-update/sensible-utils/2024-04-03.log sensible-utils 0.0.18 -> 0.0.22 https://repology.org/project/sensible-utils/versions attrpath: sensible-utils Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/tools/misc/sensible-utils/default.nix b/pkgs/tools/misc/sensible-utils/default.nix index 238b9f400b89..a43f6819def0 100644 --- a/pkgs/tools/misc/sensible-utils/default.nix +++ b/pkgs/tools/misc/sensible-utils/default.nix @@ -2,14 +2,14 @@ stdenv.mkDerivation rec { pname = "sensible-utils"; - version = "0.0.18"; + version = "0.0.22"; src = fetchFromGitLab { domain = "salsa.debian.org"; owner = "debian"; repo = "sensible-utils"; rev = "debian/${version}"; - sha256 = "sha256-fZJKPnEkPfo/3luUcHzAmGB2k1nkA4ATEQMSz0aN0YY="; + sha256 = "sha256-d5DIydkVnH+r8KMh/fVEpJ3mn5pTd36nyGDsbvfghkk="; }; nativeBuildInputs = [ makeWrapper ]; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A sensible-utils nix build failed. got build log for 'sensible-utils' from 'daemon' @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/c4z515k18v0168id022dfii34fhx3l44-source source root is source @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase @nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" } Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "buildPhase" } Running phase: buildPhase no Makefile or custom buildPhase, doing nothing @nix { "action": "setPhase", "phase": "installPhase" } Running phase: installPhase cp: cannot stat 'sensible-browser': No such file or directory cp: cannot stat 'sensible-editor': No such file or directory cp: cannot stat 'sensible-pager': No such file or directory cp: cannot stat 'sensible-terminal': No such file or directory [result] Failed to update sensible-utils 0.0.18 -> 0.0.22 https://repology.org/project/sensible-utils/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.rattle, using log file: /var/log/nixpkgs-update/rPackages.rattle/2024-04-03.log rPackages.rattle 5.5.1 -> 5.5.2 https://repology.org/project/r:rattle/versions attrpath: rPackages.rattle Checking auto update branch... No auto update branch exists Old version 5.5.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.rattle 5.5.1 -> 5.5.2 https://repology.org/project/r:rattle/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath ocamlPackages.uri, using log file: /var/log/nixpkgs-update/ocamlPackages.uri/2024-04-03.log ocamlPackages.uri 4.2.0 -> 4.4.0 https://repology.org/project/ocaml:uri/versions attrpath: ocamlPackages.uri Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/7hs8xifvvj8dkz20vwlj2xarkzxs9pb4-uri-v4.4.0.tbz.drv building '/nix/store/7hs8xifvvj8dkz20vwlj2xarkzxs9pb4-uri-v4.4.0.tbz.drv'... trying https://github.com/mirage/ocaml-uri/releases/download/v4.4.0/uri-v4.4.0.tbz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 9 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download uri-v4.4.0.tbz from any mirror error: builder for '/nix/store/7hs8xifvvj8dkz20vwlj2xarkzxs9pb4-uri-v4.4.0.tbz.drv' failed with exit code 1; last 7 log lines: > > trying https://github.com/mirage/ocaml-uri/releases/download/v4.4.0/uri-v4.4.0.tbz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 9 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download uri-v4.4.0.tbz from any mirror For full logs, run 'nix log /nix/store/7hs8xifvvj8dkz20vwlj2xarkzxs9pb4-uri-v4.4.0.tbz.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'ocamlPackages.uri.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/7hs8xifvvj8dkz20vwlj2xarkzxs9pb4-uri-v4.4.0.tbz.drv /nix/store/j3gghmlz5bmm69bpdsf9sfg72qlilal4-ocaml5.1.1-uri-4.4.0.drv these 4 paths will be fetched (0.47 MiB download, 2.15 MiB unpacked): /nix/store/2fslnigqcqips93m66myw3p5bb632csv-ocaml5.1.1-angstrom-0.16.0 /nix/store/0qgry3hcq66faxx04g3q707fldfjzxxp-ocaml5.1.1-bigstringaf-0.9.0 /nix/store/6c4iks5fnfn454fns56m6a885v5nwgrr-ocaml5.1.1-ounit-2.2.7 /nix/store/z8awppb41k4w8g0azzvxsv0qnlsi6943-ocaml5.1.1-stringext-1.6.0 copying path '/nix/store/6c4iks5fnfn454fns56m6a885v5nwgrr-ocaml5.1.1-ounit-2.2.7' from 'https://cache.nixos.org'... copying path '/nix/store/z8awppb41k4w8g0azzvxsv0qnlsi6943-ocaml5.1.1-stringext-1.6.0' from 'https://cache.nixos.org'... copying path '/nix/store/0qgry3hcq66faxx04g3q707fldfjzxxp-ocaml5.1.1-bigstringaf-0.9.0' from 'https://cache.nixos.org'... building '/nix/store/7hs8xifvvj8dkz20vwlj2xarkzxs9pb4-uri-v4.4.0.tbz.drv'... copying path '/nix/store/2fslnigqcqips93m66myw3p5bb632csv-ocaml5.1.1-angstrom-0.16.0' from 'https://cache.nixos.org'... trying https://github.com/mirage/ocaml-uri/releases/download/v4.4.0/uri-v4.4.0.tbz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 9 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download uri-v4.4.0.tbz from any mirror error: builder for '/nix/store/7hs8xifvvj8dkz20vwlj2xarkzxs9pb4-uri-v4.4.0.tbz.drv' failed with exit code 1; last 7 log lines: > > trying https://github.com/mirage/ocaml-uri/releases/download/v4.4.0/uri-v4.4.0.tbz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 9 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download uri-v4.4.0.tbz from any mirror For full logs, run 'nix log /nix/store/7hs8xifvvj8dkz20vwlj2xarkzxs9pb4-uri-v4.4.0.tbz.drv'. error: 1 dependencies of derivation '/nix/store/j3gghmlz5bmm69bpdsf9sfg72qlilal4-ocaml5.1.1-uri-4.4.0.drv' failed to build [result] Failed to update ocamlPackages.uri 4.2.0 -> 4.4.0 https://repology.org/project/ocaml:uri/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.mod, using log file: /var/log/nixpkgs-update/haskellPackages.mod/2024-04-03.log haskellPackages.mod 0.2.0.1 -> 5.7.0.0 https://repology.org/project/haskell:mod/versions attrpath: haskellPackages.mod Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update haskellPackages.mod 0.2.0.1 -> 5.7.0.0 https://repology.org/project/haskell:mod/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO currently don't know how to update perl [result] Failed to update perl536Packages.MetaCPANClient 2.030000 -> 2.031001 https://repology.org/project/perl:metacpan-client/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath _389-ds-base, using log file: /var/log/nixpkgs-update/_389-ds-base/2024-04-03.log _389-ds-base 2.4.3 -> 3.0.1 https://repology.org/project/389-ds-base/versions attrpath: _389-ds-base Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update _389-ds-base 2.4.3 -> 3.0.1 https://repology.org/project/389-ds-base/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pop-icon-theme, using log file: /var/log/nixpkgs-update/pop-icon-theme/2024-04-03.log pop-icon-theme 3.3.0 -> 20210111 https://repology.org/project/pop-icon-theme/versions attrpath: pop-icon-theme Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/vvxrsmpvg8s8kydz59l7hcjhv59c67mg-source.drv building '/nix/store/vvxrsmpvg8s8kydz59l7hcjhv59c67mg-source.drv'... trying https://github.com/pop-os/icon-theme/archive/v20210111.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/vvxrsmpvg8s8kydz59l7hcjhv59c67mg-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/pop-os/icon-theme/archive/v20210111.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/vvxrsmpvg8s8kydz59l7hcjhv59c67mg-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'pop-icon-theme.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/vvxrsmpvg8s8kydz59l7hcjhv59c67mg-source.drv /nix/store/jb2s7qxc456q3zjn32n97radsf03fj0r-pop-icon-theme-20210111.drv building '/nix/store/vvxrsmpvg8s8kydz59l7hcjhv59c67mg-source.drv'... trying https://github.com/pop-os/icon-theme/archive/v20210111.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/vvxrsmpvg8s8kydz59l7hcjhv59c67mg-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/pop-os/icon-theme/archive/v20210111.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/vvxrsmpvg8s8kydz59l7hcjhv59c67mg-source.drv'. error: 1 dependencies of derivation '/nix/store/jb2s7qxc456q3zjn32n97radsf03fj0r-pop-icon-theme-20210111.drv' failed to build [result] Failed to update pop-icon-theme 3.3.0 -> 20210111 https://repology.org/project/pop-icon-theme/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath alock, using log file: /var/log/nixpkgs-update/alock/2024-04-03.log alock 2017-07-20 -> 20170720 https://repology.org/project/alock/versions attrpath: alock Checking auto update branch... No auto update branch exists [version] Hashes equal; no update necessary [result] Failed to update alock 2017-07-20 -> 20170720 https://repology.org/project/alock/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath amoeba, using log file: /var/log/nixpkgs-update/amoeba/2024-04-03.log amoeba 1.1 -> 1.1-29.1 https://repology.org/project/amoeba/versions attrpath: amoeba Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update amoeba 1.1 -> 1.1-29.1 https://repology.org/project/amoeba/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath paleta, using log file: /var/log/nixpkgs-update/paleta/2024-04-03.log paleta 0.3.1 -> 1.0.2 https://repology.org/project/paleta/versions attrpath: paleta Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update paleta 0.3.1 -> 1.0.2 https://repology.org/project/paleta/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath restool, using log file: /var/log/nixpkgs-update/restool/2024-04-03.log restool 2.4 -> 20.12 https://repology.org/project/restool/versions attrpath: restool Checking auto update branch... No auto update branch exists [version] Hashes equal; no update necessary [result] Failed to update restool 2.4 -> 20.12 https://repology.org/project/restool/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath jellyfin-ffmpeg, using log file: /var/log/nixpkgs-update/jellyfin-ffmpeg/2024-04-03.log jellyfin-ffmpeg 6.0.1-3 -> 6.0-7 https://repology.org/project/jellyfin-ffmpeg/versions attrpath: jellyfin-ffmpeg Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/libraries/jellyfin-ffmpeg/default.nix b/pkgs/development/libraries/jellyfin-ffmpeg/default.nix index 750a5aa8d002..9b85faa836a7 100644 --- a/pkgs/development/libraries/jellyfin-ffmpeg/default.nix +++ b/pkgs/development/libraries/jellyfin-ffmpeg/default.nix @@ -4,7 +4,7 @@ }: let - version = "6.0.1-3"; + version = "6.0-7"; in (ffmpeg_6-full.override { @@ -13,7 +13,7 @@ in owner = "jellyfin"; repo = "jellyfin-ffmpeg"; rev = "v${version}"; - hash = "sha256-UINiXO61nB/AL0HJJy7G7emujakk/mQv81aUioyJz0Y="; + hash = "sha256-Z4getn/mVYIRANkIOyt7jMpcqHBvq5GXLK/ST5zV1r4="; }; }).overrideAttrs (old: { pname = "jellyfin-ffmpeg"; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A jellyfin-ffmpeg nix build failed. ./debian/rules: interpreter directive changed from "#!/usr/bin/make -f" to "/nix/store/pg3wkw0as88676ib4ckbibrfwy5c5vzg-gnumake-4.4.1/bin/make -f" ./debian/tests/encdec: interpreter directive changed from "#!/bin/bash" to "/nix/store/a1s263pmsci9zykm5xcdf7x9rv26w6d5-bash-5.2p26/bin/bash" ./debian/tests/encdec-extra: interpreter directive changed from "#!/bin/bash" to "/nix/store/a1s263pmsci9zykm5xcdf7x9rv26w6d5-bash-5.2p26/bin/bash" ./debian/tests/examples: interpreter directive changed from "#!/bin/sh" to "/nix/store/a1s263pmsci9zykm5xcdf7x9rv26w6d5-bash-5.2p26/bin/sh" ./tests/copycooker.sh: interpreter directive changed from "#!/bin/sh" to "/nix/store/a1s263pmsci9zykm5xcdf7x9rv26w6d5-bash-5.2p26/bin/sh" ./tests/fate/source-check.sh: interpreter directive changed from "#!/bin/sh" to "/nix/store/a1s263pmsci9zykm5xcdf7x9rv26w6d5-bash-5.2p26/bin/sh" ./tests/fate.sh: interpreter directive changed from "#! /bin/sh" to "/nix/store/a1s263pmsci9zykm5xcdf7x9rv26w6d5-bash-5.2p26/bin/sh" ./tests/fate-run.sh: interpreter directive changed from "#! /bin/sh" to "/nix/store/a1s263pmsci9zykm5xcdf7x9rv26w6d5-bash-5.2p26/bin/sh" ./ffbuild/pkgconfig_generate.sh: interpreter directive changed from "#!/bin/sh" to "/nix/store/a1s263pmsci9zykm5xcdf7x9rv26w6d5-bash-5.2p26/bin/sh" ./ffbuild/version.sh: interpreter directive changed from "#!/bin/sh" to "/nix/store/a1s263pmsci9zykm5xcdf7x9rv26w6d5-bash-5.2p26/bin/sh" ./docker-build-win64.sh: interpreter directive changed from "#!/bin/bash" to "/nix/store/a1s263pmsci9zykm5xcdf7x9rv26w6d5-bash-5.2p26/bin/bash" ./compat/windows/makedef: interpreter directive changed from "#!/bin/sh" to "/nix/store/a1s263pmsci9zykm5xcdf7x9rv26w6d5-bash-5.2p26/bin/sh" ./compat/windows/mslink: interpreter directive changed from "#!/bin/sh" to "/nix/store/a1s263pmsci9zykm5xcdf7x9rv26w6d5-bash-5.2p26/bin/sh" ./compat/windows/mswindres: interpreter directive changed from "#!/bin/sh" to "/nix/store/a1s263pmsci9zykm5xcdf7x9rv26w6d5-bash-5.2p26/bin/sh" ./compat/solaris/make_sunver.pl: interpreter directive changed from "#!/usr/bin/env perl" to "/nix/store/gsyvgp6bs6cnd3928c9ldbvgws2swqhl-perl-5.38.2/bin/perl" ./configure.orig: interpreter directive changed from "#!/bin/sh" to "/nix/store/a1s263pmsci9zykm5xcdf7x9rv26w6d5-bash-5.2p26/bin/sh" substituteStream(): WARNING: '--replace' is deprecated, use --replace-{fail,warn,quiet}. (file 'libavfilter/vf_frei0r.c') @nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" } Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "configurePhase" } Running phase: configurePhase patching script interpreter paths in ./configure configure flags: --disable-static --prefix=/nix/store/nq9rj1dcvd73dkdw281fnjf2kqyd6df8-jellyfin-ffmpeg-6.0-7 --target_os=linux --arch=x86_64 --pkg-config=pkg-config --enable-gpl --enable-version3 --disable-nonfree --disable-static --enable-shared --enable-pic --disable-thumb --disable-small --enable-runtime-cpudetect --enable-gray --enable-swscale-alpha --enable-hardcoded-tables --enable-safe-bitstream-reader --enable-pthreads --disable-w32threads --disable-os2threads --enable-network --enable-pixelutils --datadir=/nix/store/f9inh92z5zm9vkrvbp0i99512117lpb0-jellyfin-ffmpeg-6.0-7-data/share/ffmpeg --enable-ffmpeg --enable-ffplay --enable-ffprobe --bindir=/nix/store/hnmx4y113wd2zs7fwi7gqxgsy8mc7k1l-jellyfin-ffmpeg-6.0-7-bin/bin --enable-avcodec --enable-avdevice --enable-avfilter --enable-avformat --enable-avutil --enable-postproc --enable-swresample --enable-swscale --libdir=/nix/store/rl26mlq3i7s3dznr3rpafr9873npxmss-jellyfin-ffmpeg-6.0-7-lib/lib --incdir=/nix/store/x6pqlk790cmasvnkam93c5x83n8s14sh-jellyfin-ffmpeg-6.0-7-dev/include --enable-doc --enable-htmlpages --enable-manpages --mandir=/nix/store/l3gqzbm3sdixzl4a1ch5xl7af93c1lgf-jellyfin-ffmpeg-6.0-7-man/share/man --enable-podpages --enable-txtpages --docdir=/nix/store/bb5n4hldjgrxffqabix280j5plpzqjvh-jellyfin-ffmpeg-6.0-7-doc/share/doc/ffmpeg --enable-alsa --enable-libaom --enable-libass --enable-libbluray --enable-libbs2b --enable-bzlib --enable-libcaca --enable-libcelt --enable-chromaprint --enable-cuda --enable-cuda-llvm --enable-libdav1d --enable-libdc1394 --enable-libdrm --disable-libfdk-aac --enable-libflite --enable-fontconfig --enable-libfontconfig --enable-libfreetype --enable-frei0r --enable-libfribidi --enable-libgme --enable-gnutls --enable-libgsm --enable-iconv --enable-libjack --enable-ladspa --enable-lzma --enable-libmfx --enable-libmodplug --enable-libmp3lame --enable-libmysofa --enable-cuvid --enable-nvdec --enable-nvenc --enable-openal --enable-opencl --enable-libopencore-amrnb --enable-libopencore-amrwb --disable-opengl --enable-libopenh264 --enable-libopenjpeg --enable-libopenmpt --enable-libopus --enable-libplacebo --enable-libpulse --enable-librav1e --disable-librtmp --enable-libsmbclient --enable-sdl2 --enable-libshaderc --enable-libsoxr --enable-libspeex --enable-libsrt --enable-libssh --enable-librsvg --enable-libsvtav1 --disable-libtensorflow --enable-libtheora --enable-libv4l2 --enable-v4l2-m2m --enable-vaapi --enable-vdpau --disable-libvpl --enable-libvidstab --enable-libvmaf --enable-libvo-amrwbenc --enable-libvorbis --enable-libvpx --enable-vulkan --enable-libwebp --enable-libx264 --enable-libx265 --enable-libxavs --enable-libxcb --enable-libxcb-shape --enable-libxcb-shm --enable-libxcb-xfixes --enable-xlib --enable-libxml2 --enable-libxvid --enable-libzimg --enable-zlib --enable-libzmq --disable-debug --enable-optimizations --disable-extra-warnings --disable-stripping --extra-version=Jellyfin --disable-ptx-compression ERROR: nvenc requested but not found If you think configure made a mistake, make sure you are using the latest version from Git. If the latest version fails, report the problem to the ffmpeg-user@ffmpeg.org mailing list or IRC #ffmpeg on irc.libera.chat. Include the log file "ffbuild/config.log" produced by configure as this will help solve the problem. [result] Failed to update jellyfin-ffmpeg 6.0.1-3 -> 6.0-7 https://repology.org/project/jellyfin-ffmpeg/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.templateflow, using log file: /var/log/nixpkgs-update/python311Packages.templateflow/2024-04-03.log python311Packages.templateflow 0 -> 1 attrpath: python311Packages.templateflow Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/slwqacf3a65cygnjifyxrdjg1a29cqz7-packages.json.drv building '/nix/store/slwqacf3a65cygnjifyxrdjg1a29cqz7-packages.json.drv'... Going to be running update for following packages: - python3.11-templateflow-24.1.0 Press Enter key to continue... Running update for: - python3.11-templateflow-24.1.0: UPDATING ... - python3.11-templateflow-24.1.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/templateflow/default.nix b/pkgs/development/python-modules/templateflow/default.nix index 8bdabc162a07..ade0685b08df 100644 --- a/pkgs/development/python-modules/templateflow/default.nix +++ b/pkgs/development/python-modules/templateflow/default.nix @@ -12,7 +12,7 @@ buildPythonPackage rec { pname = "templateflow"; - version = "24.1.0"; + version = "24.2.0"; pyproject = true; disabled = pythonOlder "3.7"; @@ -21,7 +21,7 @@ buildPythonPackage rec { owner = "templateflow"; repo = "python-client"; rev = "refs/tags/${version}"; - hash = "sha256-UxYJnKOqIIf10UW5xJ7MrFHtZY5WNVi5oZgdozj65Z8="; + hash = "sha256-SY51L3yBwqIlxtD9NY8sBq/teC7dcXmet3FCSAM83hc="; }; nativeBuildInputs = [ setuptools-scm ]; No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A python311Packages.templateflow Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix --extra-experimental-features nix-command log -f . python311Packages.templateflow Standard output: error: build log of 'python311Packages.templateflow' is not available [result] Failed to update python311Packages.templateflow 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath stc-cli, using log file: /var/log/nixpkgs-update/stc-cli/2024-04-03.log stc-cli 1.4 -> 4.2 https://repology.org/project/stc/versions attrpath: stc-cli Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/pjjar4zdg4mch0qgbcr2fwg1bqb1f5jr-source.drv building '/nix/store/pjjar4zdg4mch0qgbcr2fwg1bqb1f5jr-source.drv'... trying https://github.com/tenox7/stc/archive/4.2.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/pjjar4zdg4mch0qgbcr2fwg1bqb1f5jr-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/tenox7/stc/archive/4.2.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/pjjar4zdg4mch0qgbcr2fwg1bqb1f5jr-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'stc-cli.originalSrc' not found stderr did not split as expected full stderr was: these 3 derivations will be built: /nix/store/pjjar4zdg4mch0qgbcr2fwg1bqb1f5jr-source.drv /nix/store/z4d5inlhvfvkp27wslrg4718nrrjq02i-stc-4.2-go-modules.drv /nix/store/pb5jbp12kj9rpzramqw04d2bmz2v9af3-stc-4.2.drv building '/nix/store/pjjar4zdg4mch0qgbcr2fwg1bqb1f5jr-source.drv'... trying https://github.com/tenox7/stc/archive/4.2.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/pjjar4zdg4mch0qgbcr2fwg1bqb1f5jr-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/tenox7/stc/archive/4.2.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/pjjar4zdg4mch0qgbcr2fwg1bqb1f5jr-source.drv'. error: 1 dependencies of derivation '/nix/store/pb5jbp12kj9rpzramqw04d2bmz2v9af3-stc-4.2.drv' failed to build [result] Failed to update stc-cli 1.4 -> 4.2 https://repology.org/project/stc/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath megatools, using log file: /var/log/nixpkgs-update/megatools/2024-04-03.log megatools 1.11.0 -> 1.11.1 https://repology.org/project/megatools/versions attrpath: megatools Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/dd78v4rmnbzpgpq8m69k4fylaasj6w7x-megatools.drv building '/nix/store/dd78v4rmnbzpgpq8m69k4fylaasj6w7x-megatools.drv'... exporting https://megous.com/git/megatools (rev 1.11.1) into /nix/store/krx4m3w1yfrw1dhp2jvjdk3cs523y3bf-megatools Initialized empty Git repository in /nix/store/krx4m3w1yfrw1dhp2jvjdk3cs523y3bf-megatools/.git/ fatal: dumb http transport does not support shallow capabilities fatal: dumb http transport does not support shallow capabilities From https://megous.com/git/megatools * [new branch] 1.10.x -> origin/1.10.x * [new branch] dev -> origin/dev * [new branch] master -> origin/master * [new tag] 1.10.0 -> 1.10.0 * [new tag] 1.10.0-rc1 -> 1.10.0-rc1 * [new tag] 1.10.0-rc2 -> 1.10.0-rc2 * [new tag] 1.10.1 -> 1.10.1 * [new tag] 1.10.2 -> 1.10.2 * [new tag] 1.11.0 -> 1.11.0 * [new tag] 1.11.1 -> 1.11.1 * [new tag] 1.9.90 -> 1.9.90 * [new tag] 1.9.91 -> 1.9.91 * [new tag] 1.9.92 -> 1.9.92 * [new tag] 1.9.93 -> 1.9.93 * [new tag] 1.9.94 -> 1.9.94 * [new tag] 1.9.95 -> 1.9.95 * [new tag] 1.9.96 -> 1.9.96 * [new tag] 1.9.97 -> 1.9.97 * [new tag] 1.9.98 -> 1.9.98 * [new tag] 1.9.98-pre1 -> 1.9.98-pre1 Unrecognized git object type: tag Unable to checkout refs/tags/1.11.1 from https://megous.com/git/megatools. error: builder for '/nix/store/dd78v4rmnbzpgpq8m69k4fylaasj6w7x-megatools.drv' failed with exit code 1; last 25 log lines: > fatal: dumb http transport does not support shallow capabilities > fatal: dumb http transport does not support shallow capabilities > From https://megous.com/git/megatools > * [new branch] 1.10.x -> origin/1.10.x > * [new branch] dev -> origin/dev > * [new branch] master -> origin/master > * [new tag] 1.10.0 -> 1.10.0 > * [new tag] 1.10.0-rc1 -> 1.10.0-rc1 > * [new tag] 1.10.0-rc2 -> 1.10.0-rc2 > * [new tag] 1.10.1 -> 1.10.1 > * [new tag] 1.10.2 -> 1.10.2 > * [new tag] 1.11.0 -> 1.11.0 > * [new tag] 1.11.1 -> 1.11.1 > * [new tag] 1.9.90 -> 1.9.90 > * [new tag] 1.9.91 -> 1.9.91 > * [new tag] 1.9.92 -> 1.9.92 > * [new tag] 1.9.93 -> 1.9.93 > * [new tag] 1.9.94 -> 1.9.94 > * [new tag] 1.9.95 -> 1.9.95 > * [new tag] 1.9.96 -> 1.9.96 > * [new tag] 1.9.97 -> 1.9.97 > * [new tag] 1.9.98 -> 1.9.98 > * [new tag] 1.9.98-pre1 -> 1.9.98-pre1 > Unrecognized git object type: tag > Unable to checkout refs/tags/1.11.1 from https://megous.com/git/megatools. For full logs, run 'nix log /nix/store/dd78v4rmnbzpgpq8m69k4fylaasj6w7x-megatools.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'megatools.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/dd78v4rmnbzpgpq8m69k4fylaasj6w7x-megatools.drv /nix/store/hkmywqlpfcfhsf28bpwvafmrr278p57c-megatools-1.11.1.drv this path will be fetched (0.21 MiB download, 1.79 MiB unpacked): /nix/store/zscg84cmh24jwzl8al59vh8nx2gi473w-docbook2X-0.8.8 copying path '/nix/store/zscg84cmh24jwzl8al59vh8nx2gi473w-docbook2X-0.8.8' from 'https://cache.nixos.org'... building '/nix/store/dd78v4rmnbzpgpq8m69k4fylaasj6w7x-megatools.drv'... exporting https://megous.com/git/megatools (rev 1.11.1) into /nix/store/krx4m3w1yfrw1dhp2jvjdk3cs523y3bf-megatools Initialized empty Git repository in /nix/store/krx4m3w1yfrw1dhp2jvjdk3cs523y3bf-megatools/.git/ cannot link '/nix/store/.links/0j6lmyyvx06n181jv5g72k78q1984i41l25a704mshv2sdg1vw7x' to '/nix/store/zscg84cmh24jwzl8al59vh8nx2gi473w-docbook2X-0.8.8/bin/.docbook2texi-wrapped': No space left on device fatal: dumb http transport does not support shallow capabilities fatal: dumb http transport does not support shallow capabilities From https://megous.com/git/megatools * [new branch] 1.10.x -> origin/1.10.x * [new branch] dev -> origin/dev * [new branch] master -> origin/master * [new tag] 1.10.0 -> 1.10.0 * [new tag] 1.10.0-rc1 -> 1.10.0-rc1 * [new tag] 1.10.0-rc2 -> 1.10.0-rc2 * [new tag] 1.10.1 -> 1.10.1 * [new tag] 1.10.2 -> 1.10.2 * [new tag] 1.11.0 -> 1.11.0 * [new tag] 1.11.1 -> 1.11.1 * [new tag] 1.9.90 -> 1.9.90 * [new tag] 1.9.91 -> 1.9.91 * [new tag] 1.9.92 -> 1.9.92 * [new tag] 1.9.93 -> 1.9.93 * [new tag] 1.9.94 -> 1.9.94 * [new tag] 1.9.95 -> 1.9.95 * [new tag] 1.9.96 -> 1.9.96 * [new tag] 1.9.97 -> 1.9.97 * [new tag] 1.9.98 -> 1.9.98 * [new tag] 1.9.98-pre1 -> 1.9.98-pre1 Unrecognized git object type: tag Unable to checkout refs/tags/1.11.1 from https://megous.com/git/megatools. error: builder for '/nix/store/dd78v4rmnbzpgpq8m69k4fylaasj6w7x-megatools.drv' failed with exit code 1; last 25 log lines: > fatal: dumb http transport does not support shallow capabilities > fatal: dumb http transport does not support shallow capabilities > From https://megous.com/git/megatools > * [new branch] 1.10.x -> origin/1.10.x > * [new branch] dev -> origin/dev > * [new branch] master -> origin/master > * [new tag] 1.10.0 -> 1.10.0 > * [new tag] 1.10.0-rc1 -> 1.10.0-rc1 > * [new tag] 1.10.0-rc2 -> 1.10.0-rc2 > * [new tag] 1.10.1 -> 1.10.1 > * [new tag] 1.10.2 -> 1.10.2 > * [new tag] 1.11.0 -> 1.11.0 > * [new tag] 1.11.1 -> 1.11.1 > * [new tag] 1.9.90 -> 1.9.90 > * [new tag] 1.9.91 -> 1.9.91 > * [new tag] 1.9.92 -> 1.9.92 > * [new tag] 1.9.93 -> 1.9.93 > * [new tag] 1.9.94 -> 1.9.94 > * [new tag] 1.9.95 -> 1.9.95 > * [new tag] 1.9.96 -> 1.9.96 > * [new tag] 1.9.97 -> 1.9.97 > * [new tag] 1.9.98 -> 1.9.98 > * [new tag] 1.9.98-pre1 -> 1.9.98-pre1 > Unrecognized git object type: tag > Unable to checkout refs/tags/1.11.1 from https://megous.com/git/megatools. For full logs, run 'nix log /nix/store/dd78v4rmnbzpgpq8m69k4fylaasj6w7x-megatools.drv'. error: 1 dependencies of derivation '/nix/store/hkmywqlpfcfhsf28bpwvafmrr278p57c-megatools-1.11.1.drv' failed to build [result] Failed to update megatools 1.11.0 -> 1.11.1 https://repology.org/project/megatools/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lua52Packages.lua-resty-http, using log file: /var/log/nixpkgs-update/lua52Packages.lua-resty-http/2024-04-03.log lua52Packages.lua-resty-http 0.17.1-0 -> 0.17.2 https://github.com/ledgetech/lua-resty-http/releases attrpath: lua52Packages.lua-resty-http Packages for lua are currently skipped. https://github.com/NixOS/nixpkgs/pull/37501#issuecomment-375169646 [result] Failed to update lua52Packages.lua-resty-http 0.17.1-0 -> 0.17.2 https://github.com/ledgetech/lua-resty-http/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.SummarizedExperiment, using log file: /var/log/nixpkgs-update/rPackages.SummarizedExperiment/2024-04-03.log rPackages.SummarizedExperiment 1.32.0 -> 1.33.0 https://repology.org/project/r:summarizedexperiment/versions attrpath: rPackages.SummarizedExperiment Checking auto update branch... No auto update branch exists Old version 1.32.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.SummarizedExperiment 1.32.0 -> 1.33.0 https://repology.org/project/r:summarizedexperiment/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath swt, using log file: /var/log/nixpkgs-update/swt/2024-04-03.log swt 4.5 -> 4.31 https://repology.org/project/swt/versions attrpath: swt Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update swt 4.5 -> 4.31 https://repology.org/project/swt/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO currently don't know how to update perl [result] Failed to update perl536Packages.PDL 2.025 -> 2.086 https://repology.org/project/perl:pdl/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.csranks, using log file: /var/log/nixpkgs-update/rPackages.csranks/2024-04-03.log rPackages.csranks 1.2.1 -> 1.2.2 https://repology.org/project/r:csranks/versions attrpath: rPackages.csranks Checking auto update branch... No auto update branch exists Old version 1.2.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.csranks 1.2.1 -> 1.2.2 https://repology.org/project/r:csranks/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath sundtek, using log file: /var/log/nixpkgs-update/sundtek/2024-04-03.log sundtek 2016-01-26 -> 150728.175535 https://repology.org/project/sundtek/versions attrpath: sundtek Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update sundtek 2016-01-26 -> 150728.175535 https://repology.org/project/sundtek/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath enyo-launcher, using log file: /var/log/nixpkgs-update/enyo-launcher/2024-04-03.log enyo-launcher 2.0.6 -> 2.0.7 https://repology.org/project/enyo-launcher/versions attrpath: enyo-launcher Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/v1sc705v50ycd53qvq28hj0918a01zbb-source.drv building '/nix/store/v1sc705v50ycd53qvq28hj0918a01zbb-source.drv'... trying https://gitlab.com/api/v4/projects/sdcofer70%2Fenyo-launcher/repository/archive.tar.gz?sha=2.0.7 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 32 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/v1sc705v50ycd53qvq28hj0918a01zbb-source.drv' failed with exit code 1; last 7 log lines: > > trying https://gitlab.com/api/v4/projects/sdcofer70%2Fenyo-launcher/repository/archive.tar.gz?sha=2.0.7 > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 32 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/v1sc705v50ycd53qvq28hj0918a01zbb-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'enyo-launcher.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/v1sc705v50ycd53qvq28hj0918a01zbb-source.drv /nix/store/3xk85l0j86aiaz0d0zj3rkpdbzn4fxjm-enyo-launcher-2.0.7.drv building '/nix/store/v1sc705v50ycd53qvq28hj0918a01zbb-source.drv'... trying https://gitlab.com/api/v4/projects/sdcofer70%2Fenyo-launcher/repository/archive.tar.gz?sha=2.0.7 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 32 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/v1sc705v50ycd53qvq28hj0918a01zbb-source.drv' failed with exit code 1; last 7 log lines: > > trying https://gitlab.com/api/v4/projects/sdcofer70%2Fenyo-launcher/repository/archive.tar.gz?sha=2.0.7 > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 32 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/v1sc705v50ycd53qvq28hj0918a01zbb-source.drv'. error: 1 dependencies of derivation '/nix/store/3xk85l0j86aiaz0d0zj3rkpdbzn4fxjm-enyo-launcher-2.0.7.drv' failed to build [result] Failed to update enyo-launcher 2.0.6 -> 2.0.7 https://repology.org/project/enyo-launcher/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.lddmm, using log file: /var/log/nixpkgs-update/rPackages.lddmm/2024-04-03.log rPackages.lddmm 0.4.0 -> 0.4.2 https://repology.org/project/r:lddmm/versions attrpath: rPackages.lddmm Checking auto update branch... No auto update branch exists Old version 0.4.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.lddmm 0.4.0 -> 0.4.2 https://repology.org/project/r:lddmm/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.paws_security_identity, using log file: /var/log/nixpkgs-update/rPackages.paws_security_identity/2024-04-03.log rPackages.paws_security_identity 0.4.0 -> 0.5.0 https://repology.org/project/r:paws.security.identity/versions attrpath: rPackages.paws_security_identity Checking auto update branch... No auto update branch exists Old version 0.4.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.paws_security_identity 0.4.0 -> 0.5.0 https://repology.org/project/r:paws.security.identity/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO currently don't know how to update perl [result] Failed to update perl536Packages.SyntaxKeywordTry 0.29 -> 0.290.0 https://repology.org/project/perl:syntax-keyword-try/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath harvid, using log file: /var/log/nixpkgs-update/harvid/2024-04-03.log harvid 0.9.0 -> 0.9.1 https://repology.org/project/harvid/versions attrpath: harvid Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update harvid 0.9.0 -> 0.9.1 https://repology.org/project/harvid/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath jpm, using log file: /var/log/nixpkgs-update/jpm/2024-04-03.log jpm 1.1.0 -> 20220615 https://repology.org/project/jpm/versions attrpath: jpm Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/v7b9kw5j9z3dxc8vcxx90n8pjxw72qrm-source.drv building '/nix/store/v7b9kw5j9z3dxc8vcxx90n8pjxw72qrm-source.drv'... trying https://github.com/janet-lang/jpm/archive/v20220615.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/v7b9kw5j9z3dxc8vcxx90n8pjxw72qrm-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/janet-lang/jpm/archive/v20220615.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/v7b9kw5j9z3dxc8vcxx90n8pjxw72qrm-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'jpm.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/v7b9kw5j9z3dxc8vcxx90n8pjxw72qrm-source.drv /nix/store/5p0hvla4gk7plsjaj75bi2vjynbfyf03-jpm-20220615.drv this path will be fetched (0.39 MiB download, 2.25 MiB unpacked): /nix/store/25gcfgirrgs212bgq2lvxgz6kfk0ivy0-janet-1.33.0 copying path '/nix/store/25gcfgirrgs212bgq2lvxgz6kfk0ivy0-janet-1.33.0' from 'https://cache.nixos.org'... building '/nix/store/v7b9kw5j9z3dxc8vcxx90n8pjxw72qrm-source.drv'... trying https://github.com/janet-lang/jpm/archive/v20220615.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/v7b9kw5j9z3dxc8vcxx90n8pjxw72qrm-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/janet-lang/jpm/archive/v20220615.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/v7b9kw5j9z3dxc8vcxx90n8pjxw72qrm-source.drv'. error: 1 dependencies of derivation '/nix/store/5p0hvla4gk7plsjaj75bi2vjynbfyf03-jpm-20220615.drv' failed to build [result] Failed to update jpm 1.1.0 -> 20220615 https://repology.org/project/jpm/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO currently don't know how to update perl [result] Failed to update perl536Packages.NetSCP 0.08.reprise -> 0.08 https://repology.org/project/perl:net-scp/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath radamsa, using log file: /var/log/nixpkgs-update/radamsa/2024-04-03.log radamsa 0.6 -> 0.7 https://repology.org/project/radamsa/versions attrpath: radamsa Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update radamsa 0.6 -> 0.7 https://repology.org/project/radamsa/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pythonDocs.html.python310, using log file: /var/log/nixpkgs-update/pythonDocs.html.python310/2024-04-03.log pythonDocs.html.python310 3.10.7 -> 3.12.2 https://repology.org/project/python-docs/versions attrpath: pythonDocs.html.python310 Checking auto update branch... No auto update branch exists Version in attr path pythonDocs.html.python310 not compatible with 3.12.2 [result] Failed to update pythonDocs.html.python310 3.10.7 -> 3.12.2 https://repology.org/project/python-docs/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.SMDIC, using log file: /var/log/nixpkgs-update/rPackages.SMDIC/2024-04-03.log rPackages.SMDIC 0.1.4 -> 0.1.5 https://repology.org/project/r:smdic/versions attrpath: rPackages.SMDIC Checking auto update branch... No auto update branch exists Old version 0.1.4" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.SMDIC 0.1.4 -> 0.1.5 https://repology.org/project/r:smdic/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.gmp, using log file: /var/log/nixpkgs-update/rPackages.gmp/2024-04-03.log rPackages.gmp 0.7-3 -> 0.7.4 https://repology.org/project/r:gmp/versions attrpath: rPackages.gmp Checking auto update branch... No auto update branch exists Old version 0.7-3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.gmp 0.7-3 -> 0.7.4 https://repology.org/project/r:gmp/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath styx, using log file: /var/log/nixpkgs-update/styx/2024-04-03.log styx 0.7.5 -> 2.0.1 https://repology.org/project/styx/versions attrpath: styx Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/19wbyslbh13zsswnigr8a4yd7xy7dl61-source.drv building '/nix/store/19wbyslbh13zsswnigr8a4yd7xy7dl61-source.drv'... trying https://github.com/styx-static/styx/archive/v2.0.1.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/19wbyslbh13zsswnigr8a4yd7xy7dl61-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/styx-static/styx/archive/v2.0.1.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/19wbyslbh13zsswnigr8a4yd7xy7dl61-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'styx.originalSrc' not found stderr did not split as expected full stderr was: cannot link '/nix/store/.links/18w1raaxf7lmf9hikzcqpis3dmm2jgz8x7hkfwxwiif1hgnqzrd8' to '/nix/store/hm03220jbmii2hrrnrfx8vbbcl5gvin9-is-what-3.14.1.tgz.drv': No space left on device these 4 derivations will be built: /nix/store/19wbyslbh13zsswnigr8a4yd7xy7dl61-source.drv /nix/store/g1qsfxvl1c1l39jlgg1n0gkn8c8nhimk-sass-3.7.4.drv /nix/store/za0mx8c59gr4fpyrq3bgkn2jmx0h9s7i-sass-3.7.4.drv /nix/store/ci3f8linmipikwm8hh35mzmbayrf0jgk-styx-2.0.1.drv these 10 paths will be fetched (13.60 MiB download, 55.05 MiB unpacked): /nix/store/7ad29pl6dsmpjkphkv4q7n3pp63g3v7w-caddy-2.7.6 /nix/store/aaqwcscfkbj1vyq872931k5vnysnyk6i-gemfile-and-lockfile /nix/store/d641pzhhvyj4pax6hyjqf3am36hmhhc4-less-4.2.0 /nix/store/yqzw4dkrlazrhm6i1jmxk5f6vid5n0fp-linkchecker-10.2.1 /nix/store/n051jpc8n6cg7ginqmpavapl45qxdq1a-multimarkdown-6.6.0 /nix/store/6nlnxsns9plfybhc385gykm8anv42j0b-ruby3.1-ffi-1.16.3 /nix/store/22gkr59d8ywigz4jia0m4r4xgqz8q30v-ruby3.1-rb-fsevent-0.11.2 /nix/store/33fw4wic6mcl2c9lbff6rm6nf0xw83sr-ruby3.1-rb-inotify-0.10.1 /nix/store/k26p7xcjdfhjzcaxr9mka42wi9n85hdy-ruby3.1-sass-3.7.4 /nix/store/vmjdrr2j00dp2c6c7kxv30fq50a6ap1a-ruby3.1-sass-listen-4.0.0 copying path '/nix/store/7ad29pl6dsmpjkphkv4q7n3pp63g3v7w-caddy-2.7.6' from 'https://cache.nixos.org'... copying path '/nix/store/aaqwcscfkbj1vyq872931k5vnysnyk6i-gemfile-and-lockfile' from 'https://cache.nixos.org'... copying path '/nix/store/d641pzhhvyj4pax6hyjqf3am36hmhhc4-less-4.2.0' from 'https://cache.nixos.org'... copying path '/nix/store/yqzw4dkrlazrhm6i1jmxk5f6vid5n0fp-linkchecker-10.2.1' from 'https://cache.nixos.org'... copying path '/nix/store/n051jpc8n6cg7ginqmpavapl45qxdq1a-multimarkdown-6.6.0' from 'https://cache.nixos.org'... copying path '/nix/store/22gkr59d8ywigz4jia0m4r4xgqz8q30v-ruby3.1-rb-fsevent-0.11.2' from 'https://cache.nixos.org'... copying path '/nix/store/6nlnxsns9plfybhc385gykm8anv42j0b-ruby3.1-ffi-1.16.3' from 'https://cache.nixos.org'... building '/nix/store/19wbyslbh13zsswnigr8a4yd7xy7dl61-source.drv'... copying path '/nix/store/33fw4wic6mcl2c9lbff6rm6nf0xw83sr-ruby3.1-rb-inotify-0.10.1' from 'https://cache.nixos.org'... copying path '/nix/store/vmjdrr2j00dp2c6c7kxv30fq50a6ap1a-ruby3.1-sass-listen-4.0.0' from 'https://cache.nixos.org'... cannot link '/nix/store/.links/1ll2lvlzb2fcfz8v2026d8bmambjrxrmzfmdrmiq1f172nxp2gsh' to '/nix/store/yqzw4dkrlazrhm6i1jmxk5f6vid5n0fp-linkchecker-10.2.1/lib/python3.11/site-packages/linkcheck/network/__pycache__/iputil.cpython-311.opt-1.pyc': No space left on device cannot link '/nix/store/.links/1ll2lvlzb2fcfz8v2026d8bmambjrxrmzfmdrmiq1f172nxp2gsh' to '/nix/store/yqzw4dkrlazrhm6i1jmxk5f6vid5n0fp-linkchecker-10.2.1/lib/python3.11/site-packages/linkcheck/network/__pycache__/iputil.cpython-311.pyc': No space left on device copying path '/nix/store/k26p7xcjdfhjzcaxr9mka42wi9n85hdy-ruby3.1-sass-3.7.4' from 'https://cache.nixos.org'... cannot link '/nix/store/.links/1vlb7x9ycm43896v44ajp8snc1ky82if82fj4dpizavlhf1jzf6x' to '/nix/store/n051jpc8n6cg7ginqmpavapl45qxdq1a-multimarkdown-6.6.0/share/texmf/tex/latex/mmd6/mmd6-tufte-handout-begin.tex': No space left on device trying https://github.com/styx-static/styx/archive/v2.0.1.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed building '/nix/store/g1qsfxvl1c1l39jlgg1n0gkn8c8nhimk-sass-3.7.4.drv'... 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 created 18 symlinks in user environment building '/nix/store/za0mx8c59gr4fpyrq3bgkn2jmx0h9s7i-sass-3.7.4.drv'... 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/19wbyslbh13zsswnigr8a4yd7xy7dl61-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/styx-static/styx/archive/v2.0.1.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/19wbyslbh13zsswnigr8a4yd7xy7dl61-source.drv'. error: 1 dependencies of derivation '/nix/store/ci3f8linmipikwm8hh35mzmbayrf0jgk-styx-2.0.1.drv' failed to build [result] Failed to update styx 0.7.5 -> 2.0.1 https://repology.org/project/styx/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.glmmrBase, using log file: /var/log/nixpkgs-update/rPackages.glmmrBase/2024-04-03.log rPackages.glmmrBase 0.5.3 -> 0.7.1 https://repology.org/project/r:glmmrbase/versions attrpath: rPackages.glmmrBase Checking auto update branch... No auto update branch exists Old version 0.5.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.glmmrBase 0.5.3 -> 0.7.1 https://repology.org/project/r:glmmrbase/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath memtest86-efi, using log file: /var/log/nixpkgs-update/memtest86-efi/2024-04-03.log memtest86-efi 9.3.1000 -> 10.7build1000 https://repology.org/project/memtest86-efi/versions attrpath: memtest86-efi Checking auto update branch... No auto update branch exists [version] Hashes equal; no update necessary [result] Failed to update memtest86-efi 9.3.1000 -> 10.7build1000 https://repology.org/project/memtest86-efi/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath chrpath, using log file: /var/log/nixpkgs-update/chrpath/2024-04-03.log chrpath 0.16 -> 0.17 https://repology.org/project/chrpath/versions attrpath: chrpath Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/9c6lwwwk97prrvrzwbprx0vif4wmbrsz-chrpath-0.17.tar.gz.drv building '/nix/store/9c6lwwwk97prrvrzwbprx0vif4wmbrsz-chrpath-0.17.tar.gz.drv'... trying https://alioth-archive.debian.org/releases/chrpath/chrpath/0.17/chrpath-0.17.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 272 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download chrpath-0.17.tar.gz from any mirror error: builder for '/nix/store/9c6lwwwk97prrvrzwbprx0vif4wmbrsz-chrpath-0.17.tar.gz.drv' failed with exit code 1; last 7 log lines: > > trying https://alioth-archive.debian.org/releases/chrpath/chrpath/0.17/chrpath-0.17.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 272 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download chrpath-0.17.tar.gz from any mirror For full logs, run 'nix log /nix/store/9c6lwwwk97prrvrzwbprx0vif4wmbrsz-chrpath-0.17.tar.gz.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'chrpath.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/9c6lwwwk97prrvrzwbprx0vif4wmbrsz-chrpath-0.17.tar.gz.drv /nix/store/ip3fnccx9lwnnxf2jf94yhbnd77hqcf5-chrpath-0.17.drv building '/nix/store/9c6lwwwk97prrvrzwbprx0vif4wmbrsz-chrpath-0.17.tar.gz.drv'... trying https://alioth-archive.debian.org/releases/chrpath/chrpath/0.17/chrpath-0.17.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 272 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download chrpath-0.17.tar.gz from any mirror error: builder for '/nix/store/9c6lwwwk97prrvrzwbprx0vif4wmbrsz-chrpath-0.17.tar.gz.drv' failed with exit code 1; last 7 log lines: > > trying https://alioth-archive.debian.org/releases/chrpath/chrpath/0.17/chrpath-0.17.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 272 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download chrpath-0.17.tar.gz from any mirror For full logs, run 'nix log /nix/store/9c6lwwwk97prrvrzwbprx0vif4wmbrsz-chrpath-0.17.tar.gz.drv'. error: 1 dependencies of derivation '/nix/store/ip3fnccx9lwnnxf2jf94yhbnd77hqcf5-chrpath-0.17.drv' failed to build [result] Failed to update chrpath 0.16 -> 0.17 https://repology.org/project/chrpath/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.bakR, using log file: /var/log/nixpkgs-update/rPackages.bakR/2024-04-03.log rPackages.bakR 1.0.0 -> 1.0.1 https://repology.org/project/r:bakr/versions attrpath: rPackages.bakR Checking auto update branch... No auto update branch exists Old version 1.0.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.bakR 1.0.0 -> 1.0.1 https://repology.org/project/r:bakr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.StanHeaders, using log file: /var/log/nixpkgs-update/rPackages.StanHeaders/2024-04-03.log rPackages.StanHeaders 2.26.28 -> 2.32.6 https://repology.org/project/r:stanheaders/versions attrpath: rPackages.StanHeaders Checking auto update branch... No auto update branch exists Old version 2.26.28" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.StanHeaders 2.26.28 -> 2.32.6 https://repology.org/project/r:stanheaders/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath unl0kr, using log file: /var/log/nixpkgs-update/unl0kr/2024-04-03.log unl0kr 2.0.0 -> 2.0.3 https://repology.org/project/unl0kr/versions attrpath: unl0kr Checking auto update branch... An auto update branch exists with message `unl0kr: 2.0.0 -> 2.0.3`. New version is 2.0.3. An auto update branch exists with an equal or greater version [result] Failed to update unl0kr 2.0.0 -> 2.0.3 https://repology.org/project/unl0kr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.RStoolbox, using log file: /var/log/nixpkgs-update/rPackages.RStoolbox/2024-04-03.log rPackages.RStoolbox 0.3.0 -> 0.4.0 https://repology.org/project/r:rstoolbox/versions attrpath: rPackages.RStoolbox Checking auto update branch... No auto update branch exists Old version 0.3.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.RStoolbox 0.3.0 -> 0.4.0 https://repology.org/project/r:rstoolbox/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.shinyWidgets, using log file: /var/log/nixpkgs-update/rPackages.shinyWidgets/2024-04-03.log rPackages.shinyWidgets 0.8.0 -> 0.8.3 https://repology.org/project/r:shinywidgets/versions attrpath: rPackages.shinyWidgets Checking auto update branch... No auto update branch exists Old version 0.8.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.shinyWidgets 0.8.0 -> 0.8.3 https://repology.org/project/r:shinywidgets/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath docbook2mdoc, using log file: /var/log/nixpkgs-update/docbook2mdoc/2024-04-03.log docbook2mdoc 0.0.9 -> 1.1.0 https://repology.org/project/docbook2mdoc/versions attrpath: docbook2mdoc Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/tools/misc/docbook2mdoc/default.nix b/pkgs/tools/misc/docbook2mdoc/default.nix index f64a73a338ba..429f1f11feab 100644 --- a/pkgs/tools/misc/docbook2mdoc/default.nix +++ b/pkgs/tools/misc/docbook2mdoc/default.nix @@ -2,11 +2,11 @@ stdenv.mkDerivation rec { pname = "docbook2mdoc"; - version = "0.0.9"; + version = "1.1.0"; src = fetchurl { url = "http://mdocml.bsd.lv/docbook2mdoc/snapshots/${pname}-${version}.tgz"; - sha256 = "07il80sg89xf6ym4bry6hxdacfzqgbwkxzyf7bjaihmw5jj0lclk"; + sha256 = "sha256-n8ZBHPBB/xDnbxmlChQgdajfnTQ/JI4g2PyYv45UfHE="; }; buildInputs = [ expat.dev ]; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A docbook2mdoc nix build failed. 561 | TAILQ_FOREACH_SAFE(nc, &n->childq, child, nn) { | ^~ | ; docbook2mdoc.c:590:54: error: expected ';' before '{' token 590 | TAILQ_FOREACH_SAFE(nc, &n->childq, child, nn) { | ^~ | ; docbook2mdoc.c: In function 'pnode_printvarlistentry': docbook2mdoc.c:760:44: error: 'child' undeclared (first use in this function) 760 | TAILQ_FOREACH_SAFE(nc, &n->childq, child, nn) { | ^~~~~ docbook2mdoc.c:760:54: error: expected ';' before '{' token 760 | TAILQ_FOREACH_SAFE(nc, &n->childq, child, nn) { | ^~ | ; docbook2mdoc.c:754:26: warning: variable 'comma' set but not used []8;;https://gcc.gnu.org/onlinedocs/gcc/Warning-Options.html#index-Wunused-but-set-variable-Wunused-but-set-variable]8;;] 754 | int comma; | ^~~~~ docbook2mdoc.c:753:36: warning: unused variable 'ncc' []8;;https://gcc.gnu.org/onlinedocs/gcc/Warning-Options.html#index-Wunused-variable-Wunused-variable]8;;] 753 | struct pnode *nc, *nn, *ncc; | ^~~ docbook2mdoc.c: In function 'pnode_printtitle': docbook2mdoc.c:796:44: error: 'child' undeclared (first use in this function) 796 | TAILQ_FOREACH_SAFE(nc, &n->childq, child, nn) { | ^~~~~ docbook2mdoc.c:796:54: error: expected ';' before '{' token 796 | TAILQ_FOREACH_SAFE(nc, &n->childq, child, nn) { | ^~ | ; make: *** [: docbook2mdoc.o] Error 1 [result] Failed to update docbook2mdoc 0.0.9 -> 1.1.0 https://repology.org/project/docbook2mdoc/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO currently don't know how to update perl [result] Failed to update perl536Packages.LEOCHARREDebug 1.03 -> 1.14 https://repology.org/project/perl:leocharre-debug/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.shinyTempSignal, using log file: /var/log/nixpkgs-update/rPackages.shinyTempSignal/2024-04-03.log rPackages.shinyTempSignal 0.0.5 -> 0.0.8 https://repology.org/project/r:shinytempsignal/versions attrpath: rPackages.shinyTempSignal Checking auto update branch... No auto update branch exists Old version 0.0.5" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.shinyTempSignal 0.0.5 -> 0.0.8 https://repology.org/project/r:shinytempsignal/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath sauerbraten, using log file: /var/log/nixpkgs-update/sauerbraten/2024-04-03.log sauerbraten 2020_12_27 -> 2020_12_29 https://repology.org/project/sauerbraten/versions attrpath: sauerbraten Checking auto update branch... No auto update branch exists Old version 2020_12_27" not present in master derivation file with contents: { lib , stdenv , fetchzip , SDL2 , SDL2_image , SDL2_mixer , zlib , makeWrapper , copyDesktopItems , makeDesktopItem }: stdenv.mkDerivation rec { pname = "sauerbraten"; version = "2020-12-27"; src = fetchzip { url = "mirror://sourceforge/sauerbraten/sauerbraten_${builtins.replaceStrings [ "-" ] [ "_" ] version}_linux.tar.bz2"; sha256 = "0llknzj23vx6f3y452by9c7wlhzclyq4bqi22qd52m3l916z2mn5"; }; nativeBuildInputs = [ makeWrapper copyDesktopItems ]; buildInputs = [ SDL2 SDL2_mixer SDL2_image zlib ]; sourceRoot = "${src.name}/src"; enableParallelBuilding = true; desktopItems = [ (makeDesktopItem { name = "sauerbraten"; exec = "sauerbraten_client %u"; icon = "sauerbraten"; desktopName = "Sauerbraten"; comment = "FPS that uses an improved version of the Cube engine"; categories = [ "Application" "Game" "ActionGame" ]; }) ]; installPhase = '' runHook preInstall mkdir -p $out/bin $out/share/icon/ $out/share/sauerbraten $out/share/doc/sauerbraten cp -r "../docs/"* $out/share/doc/sauerbraten/ cp sauer_client sauer_server $out/share/sauerbraten/ cp -r ../packages ../data $out/share/sauerbraten/ ln -s $out/share/sauerbraten/cube.png $out/share/icon/sauerbraten.png makeWrapper $out/share/sauerbraten/sauer_server $out/bin/sauerbraten_server \ --chdir "$out/share/sauerbraten" makeWrapper $out/share/sauerbraten/sauer_client $out/bin/sauerbraten_client \ --chdir "$out/share/sauerbraten" \ --add-flags "-q\''${HOME}/.config/sauerbraten" runHook postInstall ''; meta = with lib; { description = "A free multiplayer & singleplayer first person shooter, the successor of the Cube FPS"; homepage = "http://sauerbraten.org"; maintainers = with maintainers; [ raskin ajs124 ]; mainProgram = "sauerbraten_client"; hydraPlatforms = # raskin: tested amd64-linux; # not setting platforms because it is 0.5+ GiB of game data [ ]; license = "freeware"; # as an aggregate - data files have different licenses code is under zlib license platforms = platforms.linux; }; } [result] Failed to update sauerbraten 2020_12_27 -> 2020_12_29 https://repology.org/project/sauerbraten/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath iperf2, using log file: /var/log/nixpkgs-update/iperf2/2024-04-03.log iperf2 2.1.4 -> 3.16 https://repology.org/project/iperf/versions attrpath: iperf2 Checking auto update branch... No auto update branch exists Version in attr path iperf2 not compatible with 3.16 [result] Failed to update iperf2 2.1.4 -> 3.16 https://repology.org/project/iperf/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pango, using log file: /var/log/nixpkgs-update/pango/2024-04-03.log pango 1.51.0 -> 1.52.2 https://repology.org/project/pango/versions attrpath: pango Checking auto update branch... Do not update GNOME during a release cycle [result] Failed to update pango 1.51.0 -> 1.52.2 https://repology.org/project/pango/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.crandep, using log file: /var/log/nixpkgs-update/rPackages.crandep/2024-04-03.log rPackages.crandep 0.3.4 -> 0.3.7 https://repology.org/project/r:crandep/versions attrpath: rPackages.crandep Checking auto update branch... No auto update branch exists Old version 0.3.4" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.crandep 0.3.4 -> 0.3.7 https://repology.org/project/r:crandep/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath redwax-tool, using log file: /var/log/nixpkgs-update/redwax-tool/2024-04-03.log redwax-tool 0.9.1 -> 0.9.4 https://repology.org/project/redwax-tool/versions attrpath: redwax-tool Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/tools/security/redwax-tool/default.nix b/pkgs/tools/security/redwax-tool/default.nix index 50a2d36699e7..b0e4472b776c 100644 --- a/pkgs/tools/security/redwax-tool/default.nix +++ b/pkgs/tools/security/redwax-tool/default.nix @@ -5,11 +5,11 @@ stdenv.mkDerivation rec { pname = "redwax-tool"; - version = "0.9.1"; + version = "0.9.4"; src = fetchsvn { url = "https://source.redwax.eu/svn/redwax/rt/redwax-tool/tags/redwax-tool-${version}/"; - sha256 = "sha256-MWSB1AkkRS18UUHGq8EWv3OIXPSVHpmrdD5Eq1VdbkA="; + sha256 = "sha256-Wv6xa/eNxY2LfD3oWsIbYxa/9X87LeAzPFUhOEo5+Is="; }; nativeBuildInputs = [ autoreconfHook pkg-config txt2man which ]; rev equal; no update necessary [result] Failed to update redwax-tool 0.9.1 -> 0.9.4 https://repology.org/project/redwax-tool/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.mco, using log file: /var/log/nixpkgs-update/rPackages.mco/2024-04-03.log rPackages.mco 1.15.6 -> 1.16 https://repology.org/project/r:mco/versions attrpath: rPackages.mco Checking auto update branch... No auto update branch exists Old version 1.15.6" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.mco 1.15.6 -> 1.16 https://repology.org/project/r:mco/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.diffcor, using log file: /var/log/nixpkgs-update/rPackages.diffcor/2024-04-03.log rPackages.diffcor 0.8.1 -> 0.8.2 https://repology.org/project/r:diffcor/versions attrpath: rPackages.diffcor Checking auto update branch... No auto update branch exists Old version 0.8.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.diffcor 0.8.1 -> 0.8.2 https://repology.org/project/r:diffcor/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.bigmemory_sri, using log file: /var/log/nixpkgs-update/rPackages.bigmemory_sri/2024-04-03.log rPackages.bigmemory_sri 0.1.6 -> 0.1.8 https://repology.org/project/r:bigmemory.sri/versions attrpath: rPackages.bigmemory_sri Checking auto update branch... No auto update branch exists Old version 0.1.6" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.bigmemory_sri 0.1.6 -> 0.1.8 https://repology.org/project/r:bigmemory.sri/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath libpulsar, using log file: /var/log/nixpkgs-update/libpulsar/2024-04-03.log libpulsar 2.10.2 -> 3.5.1 https://repology.org/project/libpulsar/versions attrpath: libpulsar Checking auto update branch... No auto update branch exists Old version 2.10.2" not present in master derivation file with contents: { lib , asioSupport ? true , asio , boost180 , log4cxxSupport ? false , log4cxx , snappySupport ? false , snappy , zlibSupport ? true , zlib , zstdSupport ? true , zstd , gtest , gtestSupport ? false , cmake , curl , fetchFromGitHub , protobuf , jsoncpp , openssl , pkg-config , stdenv }: let /* Check if null or false Example: let result = enableFeature null => "OFF" let result = enableFeature false => "OFF" let result = enableFeature «derivation» => "ON" */ enableCmakeFeature = p: if (p == null || p == false) then "OFF" else "ON"; defaultOptionals = [ protobuf ] ++ lib.optional snappySupport snappy.dev ++ lib.optional zlibSupport zlib ++ lib.optional zstdSupport zstd ++ lib.optional log4cxxSupport log4cxx ++ lib.optional asioSupport asio ++ lib.optional (!asioSupport) boost180; in stdenv.mkDerivation (finalAttrs: rec { pname = "libpulsar"; version = "3.5.0"; src = fetchFromGitHub { owner = "apache"; repo = "pulsar-client-cpp"; rev = "v${version}"; hash = "sha256-pNeoStDryyMtBolpp5nT5GFjYPuXg2ks1Ka1mjjN/9k="; }; nativeBuildInputs = [ cmake pkg-config ] ++ defaultOptionals ++ lib.optional gtestSupport gtest.dev; buildInputs = [ jsoncpp openssl curl ] ++ defaultOptionals; cmakeFlags = [ "-DBUILD_TESTS=${enableCmakeFeature gtestSupport}" "-DUSE_LOG4CXX=${enableCmakeFeature log4cxxSupport}" "-DUSE_ASIO=${enableCmakeFeature asioSupport}" ]; doInstallCheck = true; installCheckPhase = '' echo ${lib.escapeShellArg '' #include int main (int argc, char **argv) { pulsar::Client client("pulsar://localhost:6650"); return 0; } ''} > test.cc $CXX test.cc -L $out/lib -I $out/include -lpulsar -o test ''; meta = with lib; { homepage = "https://pulsar.apache.org/docs/next/client-libraries-cpp/"; description = "Apache Pulsar C++ library"; changelog = "https://github.com/apache/pulsar-client-cpp/releases/tag/v${version}"; platforms = platforms.all; license = licenses.asl20; maintainers = with maintainers; [ corbanr gaelreyrol ]; }; }) [result] Failed to update libpulsar 2.10.2 -> 3.5.1 https://repology.org/project/libpulsar/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO currently don't know how to update perl [result] Failed to update perl536Packages.DataClone 0.004 -> 0.006 https://repology.org/project/perl:data-clone/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath frostwire-bin, using log file: /var/log/nixpkgs-update/frostwire-bin/2024-04-03.log frostwire-bin 6.9.8 -> 6.13.1 https://repology.org/project/frostwire/versions attrpath: frostwire-bin Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/70q67vw7f0b924vjlj2sqiki5n643sw2-frostwire-6.13.1.amd64.tar.gz.drv building '/nix/store/70q67vw7f0b924vjlj2sqiki5n643sw2-frostwire-6.13.1.amd64.tar.gz.drv'... trying https://dl.frostwire.com/frostwire/6.13.1/frostwire-6.13.1.amd64.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL certificate problem: unable to get local issuer certificate More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. error: cannot download frostwire-6.13.1.amd64.tar.gz from any mirror error: builder for '/nix/store/70q67vw7f0b924vjlj2sqiki5n643sw2-frostwire-6.13.1.amd64.tar.gz.drv' failed with exit code 1; last 12 log lines: > > trying https://dl.frostwire.com/frostwire/6.13.1/frostwire-6.13.1.amd64.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (60) SSL certificate problem: unable to get local issuer certificate > More details here: https://curl.se/docs/sslcerts.html > > curl failed to verify the legitimacy of the server and therefore could not > establish a secure connection to it. To learn more about this situation and > how to fix it, please visit the web page mentioned above. > error: cannot download frostwire-6.13.1.amd64.tar.gz from any mirror For full logs, run 'nix log /nix/store/70q67vw7f0b924vjlj2sqiki5n643sw2-frostwire-6.13.1.amd64.tar.gz.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'frostwire-bin.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/70q67vw7f0b924vjlj2sqiki5n643sw2-frostwire-6.13.1.amd64.tar.gz.drv /nix/store/d7y6pi5rdajflfx7mmqx6436pn71fwjv-frostwire-6.13.1.drv building '/nix/store/70q67vw7f0b924vjlj2sqiki5n643sw2-frostwire-6.13.1.amd64.tar.gz.drv'... trying https://dl.frostwire.com/frostwire/6.13.1/frostwire-6.13.1.amd64.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL certificate problem: unable to get local issuer certificate More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. error: cannot download frostwire-6.13.1.amd64.tar.gz from any mirror error: builder for '/nix/store/70q67vw7f0b924vjlj2sqiki5n643sw2-frostwire-6.13.1.amd64.tar.gz.drv' failed with exit code 1; last 12 log lines: > > trying https://dl.frostwire.com/frostwire/6.13.1/frostwire-6.13.1.amd64.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (60) SSL certificate problem: unable to get local issuer certificate > More details here: https://curl.se/docs/sslcerts.html > > curl failed to verify the legitimacy of the server and therefore could not > establish a secure connection to it. To learn more about this situation and > how to fix it, please visit the web page mentioned above. > error: cannot download frostwire-6.13.1.amd64.tar.gz from any mirror For full logs, run 'nix log /nix/store/70q67vw7f0b924vjlj2sqiki5n643sw2-frostwire-6.13.1.amd64.tar.gz.drv'. error: 1 dependencies of derivation '/nix/store/d7y6pi5rdajflfx7mmqx6436pn71fwjv-frostwire-6.13.1.drv' failed to build [result] Failed to update frostwire-bin 6.9.8 -> 6.13.1 https://repology.org/project/frostwire/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gede, using log file: /var/log/nixpkgs-update/gede/2024-04-03.log gede 2.18.3 -> 2.19.3 https://repology.org/project/gede/versions attrpath: gede Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/tools/misc/gede/default.nix b/pkgs/development/tools/misc/gede/default.nix index 6ae512657666..09c91d08b10c 100644 --- a/pkgs/development/tools/misc/gede/default.nix +++ b/pkgs/development/tools/misc/gede/default.nix @@ -2,11 +2,11 @@ mkDerivation rec { pname = "gede"; - version = "2.18.3"; + version = "2.19.3"; src = fetchurl { url = "http://gede.dexar.se/uploads/source/${pname}-${version}.tar.xz"; - sha256 = "sha256-RUl60iPa4XSlUilpYKaYQbRmLqthKHAvYonnhufjPsE="; + sha256 = "sha256-9faFySggfD7tWe6lMqlY8TYlV2cIbOkH0cN6sHfeQV0="; }; nativeBuildInputs = [ qmake makeWrapper python3 ]; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A gede nix build failed. got build log for 'gede' from 'daemon' @nix { "action": "setPhase", "phase": "qmakePrePhase" } Running phase: qmakePrePhase @nix { "action": "setPhase", "phase": "qtPreHook" } Running phase: qtPreHook @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/ils1wd4qaff4nhnsihmrcpnv1541fdyy-gede-2.19.3.tar.xz source root is gede-2.19.3 setting SOURCE_DATE_EPOCH to timestamp 1704400705 of file gede-2.19.3/todo.rst @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase @nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" } Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "configurePhase" } Running phase: configurePhase no configure script, doing nothing @nix { "action": "setPhase", "phase": "glibPreInstallPhase" } Running phase: glibPreInstallPhase @nix { "action": "setPhase", "phase": "installPhase" } Running phase: installPhase Checking for make... found in /nix/store/pg3wkw0as88676ib4ckbibrfwy5c5vzg-gnumake-4.4.1/bin Checking for gcc... found in /nix/store/ac1hb5dc2z4biwgy8mjrhlifffkkrvdq-gcc-wrapper-13.2.0/bin Checking for ctags...  not found!! Detecting Qt version... Qt5 (qmake) Using 'qmake' Qt version: 5.15.12 Generating makefile Info: creating stash file /build/gede-2.19.3/src/.qmake.stash Project ERROR: Unknown module(s) in QT: serialport [result] Failed to update gede 2.18.3 -> 2.19.3 https://repology.org/project/gede/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO currently don't know how to update perl [result] Failed to update perl536Packages.DBIxClassSchemaLoader 0.07051 -> 0.07052 https://repology.org/project/perl:dbix-class-schema-loader/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.ff, using log file: /var/log/nixpkgs-update/rPackages.ff/2024-04-03.log rPackages.ff 4.0.9 -> 4.0.12 https://repology.org/project/r:ff/versions attrpath: rPackages.ff Checking auto update branch... No auto update branch exists Old version 4.0.9" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.ff 4.0.9 -> 4.0.12 https://repology.org/project/r:ff/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.PHEindicatormethods, using log file: /var/log/nixpkgs-update/rPackages.PHEindicatormethods/2024-04-03.log rPackages.PHEindicatormethods 2.0.1 -> 2.0.2 https://repology.org/project/r:pheindicatormethods/versions attrpath: rPackages.PHEindicatormethods Checking auto update branch... No auto update branch exists Old version 2.0.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.PHEindicatormethods 2.0.1 -> 2.0.2 https://repology.org/project/r:pheindicatormethods/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.GJRM, using log file: /var/log/nixpkgs-update/rPackages.GJRM/2024-04-03.log rPackages.GJRM 0.2-6.4 -> 0.2-6.5 https://repology.org/project/r:gjrm/versions attrpath: rPackages.GJRM Checking auto update branch... No auto update branch exists Old version 0.2-6.4" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.GJRM 0.2-6.4 -> 0.2-6.5 https://repology.org/project/r:gjrm/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.exact2x2, using log file: /var/log/nixpkgs-update/rPackages.exact2x2/2024-04-03.log rPackages.exact2x2 1.6.8 -> 1.6.9 https://repology.org/project/r:exact2x2/versions attrpath: rPackages.exact2x2 Checking auto update branch... No auto update branch exists Old version 1.6.8" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.exact2x2 1.6.8 -> 1.6.9 https://repology.org/project/r:exact2x2/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.ggm, using log file: /var/log/nixpkgs-update/rPackages.ggm/2024-04-03.log rPackages.ggm 2.5 -> 2.5.1 https://repology.org/project/r:ggm/versions attrpath: rPackages.ggm Checking auto update branch... No auto update branch exists Old version 2.5" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.ggm 2.5 -> 2.5.1 https://repology.org/project/r:ggm/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath jetbrains.idea-ultimate, using log file: /var/log/nixpkgs-update/jetbrains.idea-ultimate/2024-04-03.log jetbrains.idea-ultimate 2023.3.5 -> 2023.3.6 https://repology.org/project/intellij-idea-ultimate/versions attrpath: jetbrains.idea-ultimate Checking auto update branch... No auto update branch exists Old version 2023.3.5" not present in master derivation file with contents: { lib , stdenv , callPackage , fetchurl , jdk , zlib , python3 , lldb , dotnet-sdk_7 , maven , openssl , expat , libxcrypt , libxcrypt-legacy , fontconfig , libxml2 , runCommand , musl , R , libgcc , lttng-ust_2_12 , xz , xorg , libGL , vmopts ? null }: let inherit (stdenv.hostPlatform) system; # `ides.json` is handwritten and contains information that doesn't change across updates, like maintainers and other metadata # `versions.json` contains everything generated/needed by the update script version numbers, build numbers and tarball hashes ideInfo = lib.importJSON ./bin/ides.json; versions = lib.importJSON ./bin/versions.json; products = versions.${system} or (throw "Unsupported system: ${system}"); package = if stdenv.isDarwin then ./bin/darwin.nix else ./bin/linux.nix; mkJetBrainsProductCore = callPackage package { inherit vmopts; }; mkMeta = meta: fromSource: { inherit (meta) homepage longDescription; description = meta.description + lib.optionalString meta.isOpenSource (if fromSource then " (built from source)" else " (patched binaries from jetbrains)"); maintainers = map (x: lib.maintainers."${x}") meta.maintainers; license = if meta.isOpenSource then lib.licenses.asl20 else lib.licenses.unfree; }; mkJetBrainsProduct = { pname , fromSource ? false , extraWrapperArgs ? [ ] , extraLdPath ? [ ] , extraBuildInputs ? [ ] }: mkJetBrainsProductCore { inherit pname jdk extraWrapperArgs extraLdPath extraBuildInputs; src = if fromSource then communitySources."${pname}" else fetchurl { url = products."${pname}".url; sha256 = products."${pname}".sha256; }; inherit (products."${pname}") version; buildNumber = products."${pname}".build_number; inherit (ideInfo."${pname}") wmClass product; productShort = ideInfo."${pname}".productShort or ideInfo."${pname}".product; meta = mkMeta ideInfo."${pname}".meta fromSource; libdbm = if ideInfo."${pname}".meta.isOpenSource then communitySources."${pname}".libdbm else communitySources.idea-community.libdbm; fsnotifier = if ideInfo."${pname}".meta.isOpenSource then communitySources."${pname}".fsnotifier else communitySources.idea-community.fsnotifier; }; communitySources = callPackage ./source { }; buildIdea = args: mkJetBrainsProduct (args // { extraLdPath = [ zlib ]; extraWrapperArgs = [ ''--set M2_HOME "${maven}/maven"'' ''--set M2 "${maven}/maven/bin"'' ]; }); buildPycharm = args: (mkJetBrainsProduct args).overrideAttrs (finalAttrs: previousAttrs: lib.optionalAttrs stdenv.isLinux { buildInputs = with python3.pkgs; (previousAttrs.buildInputs or []) ++ [ python3 setuptools ]; preInstall = '' echo "compiling cython debug speedups" if [[ -d plugins/python-ce ]]; then ${python3.interpreter} plugins/python-ce/helpers/pydev/setup_cython.py build_ext --inplace else ${python3.interpreter} plugins/python/helpers/pydev/setup_cython.py build_ext --inplace fi ''; # See https://www.jetbrains.com/help/pycharm/2022.1/cython-speedups.html }); in rec { # Sorted alphabetically clion = (mkJetBrainsProduct { pname = "clion"; extraBuildInputs = lib.optionals (stdenv.isLinux) [ python3 stdenv.cc.cc openssl libxcrypt-legacy musl ] ++ lib.optionals (stdenv.isLinux && stdenv.isAarch64) [ expat libxml2 xz ]; }).overrideAttrs (attrs: { postFixup = (attrs.postFixup or "") + lib.optionalString (stdenv.isLinux) '' ( cd $out/clion # I think the included gdb has a couple of patches, so we patch it instead of replacing ls -d $PWD/bin/gdb/linux/*/lib/python3.8/lib-dynload/* | xargs patchelf \ --replace-needed libssl.so.10 libssl.so \ --replace-needed libcrypto.so.10 libcrypto.so ls -d $PWD/bin/lldb/linux/*/lib/python3.8/lib-dynload/* | xargs patchelf \ --replace-needed libssl.so.10 libssl.so \ --replace-needed libcrypto.so.10 libcrypto.so ) ''; }); datagrip = mkJetBrainsProduct { pname = "datagrip"; extraBuildInputs = [ stdenv.cc.cc ]; }; dataspell = let libr = runCommand "libR" {} '' mkdir -p $out/lib ln -s ${R}/lib/R/lib/libR.so $out/lib/libR.so ''; in mkJetBrainsProduct { pname = "dataspell"; extraBuildInputs = [ libgcc libr stdenv.cc.cc ]; }; gateway = mkJetBrainsProduct { pname = "gateway"; }; goland = (mkJetBrainsProduct { pname = "goland"; extraWrapperArgs = [ # fortify source breaks build since delve compiles with -O0 ''--prefix CGO_CPPFLAGS " " "-U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=0"'' ]; extraBuildInputs = [ libgcc stdenv.cc.cc ]; }).overrideAttrs (attrs: { postFixup = (attrs.postFixup or "") + lib.optionalString stdenv.isLinux '' interp="$(cat $NIX_CC/nix-support/dynamic-linker)" patchelf --set-interpreter $interp $out/goland/plugins/go-plugin/lib/dlv/linux/dlv chmod +x $out/goland/plugins/go-plugin/lib/dlv/linux/dlv ''; }); idea-community-bin = buildIdea { pname = "idea-community"; extraBuildInputs = [ stdenv.cc.cc ]; }; idea-community-src = buildIdea { pname = "idea-community"; extraBuildInputs = [ stdenv.cc.cc ]; fromSource = true; }; idea-community = if stdenv.isDarwin || stdenv.isAarch64 then idea-community-bin else idea-community-src; idea-ultimate = buildIdea { pname = "idea-ultimate"; extraBuildInputs = [ stdenv.cc.cc lldb musl ]; }; mps = mkJetBrainsProduct { pname = "mps"; }; phpstorm = mkJetBrainsProduct { pname = "phpstorm"; extraBuildInputs = [ stdenv.cc.cc musl ]; }; pycharm-community-bin = buildPycharm { pname = "pycharm-community"; }; pycharm-community-src = buildPycharm { pname = "pycharm-community"; fromSource = true; }; pycharm-community = if stdenv.isDarwin then pycharm-community-bin else pycharm-community-src; pycharm-professional = buildPycharm { pname = "pycharm-professional"; extraBuildInputs = [ musl ]; }; rider = (mkJetBrainsProduct { pname = "rider"; extraBuildInputs = [ fontconfig stdenv.cc.cc openssl libxcrypt lttng-ust_2_12 musl ]; }).overrideAttrs (attrs: { postInstall = (attrs.postInstall or "") + lib.optionalString (stdenv.isLinux) '' ( cd $out/rider ls -d $PWD/plugins/cidr-debugger-plugin/bin/lldb/linux/*/lib/python3.8/lib-dynload/* | xargs patchelf \ --replace-needed libssl.so.10 libssl.so \ --replace-needed libcrypto.so.10 libcrypto.so \ --replace-needed libcrypt.so.1 libcrypt.so for dir in lib/ReSharperHost/linux-*; do rm -rf $dir/dotnet ln -s ${dotnet-sdk_7} $dir/dotnet done ) ''; }); ruby-mine = mkJetBrainsProduct { pname = "ruby-mine"; extraBuildInputs = [ stdenv.cc.cc musl ]; }; rust-rover = (mkJetBrainsProduct { pname = "rust-rover"; extraBuildInputs = lib.optionals (stdenv.isLinux) [ python3 openssl libxcrypt-legacy fontconfig xorg.libX11 libGL ] ++ lib.optionals (stdenv.isLinux && stdenv.isAarch64) [ expat libxml2 xz ]; }).overrideAttrs (attrs: { postFixup = (attrs.postFixup or "") + lib.optionalString (stdenv.isLinux) '' ( cd $out/rust-rover # Copied over from clion (gdb seems to have a couple of patches) ls -d $PWD/bin/gdb/linux/*/lib/python3.8/lib-dynload/* | xargs patchelf \ --replace-needed libssl.so.10 libssl.so \ --replace-needed libcrypto.so.10 libcrypto.so ls -d $PWD/bin/lldb/linux/*/lib/python3.8/lib-dynload/* | xargs patchelf \ --replace-needed libssl.so.10 libssl.so \ --replace-needed libcrypto.so.10 libcrypto.so chmod +x $PWD/plugins/intellij-rust/bin/linux/*/intellij-rust-native-helper ) ''; }); webstorm = mkJetBrainsProduct { pname = "webstorm"; extraBuildInputs = [ stdenv.cc.cc musl ]; }; plugins = callPackage ./plugins { } // { __attrsFailEvaluation = true; }; } [result] Failed to update jetbrains.idea-ultimate 2023.3.5 -> 2023.3.6 https://repology.org/project/intellij-idea-ultimate/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO gstreamer plugins are kept in lockstep. [result] Failed to update gst_all_1.gst-libav 1.22.9 -> 1.24.1 https://repology.org/project/gstreamer:libav/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.RPPanalyzer, using log file: /var/log/nixpkgs-update/rPackages.RPPanalyzer/2024-04-03.log rPackages.RPPanalyzer 1.4.8 -> 1.4.9 https://repology.org/project/r:rppanalyzer/versions attrpath: rPackages.RPPanalyzer Checking auto update branch... No auto update branch exists Old version 1.4.8" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.RPPanalyzer 1.4.8 -> 1.4.9 https://repology.org/project/r:rppanalyzer/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.iheatmapr, using log file: /var/log/nixpkgs-update/rPackages.iheatmapr/2024-04-03.log rPackages.iheatmapr 0.7.0 -> 0.7.1 https://repology.org/project/r:iheatmapr/versions attrpath: rPackages.iheatmapr Checking auto update branch... No auto update branch exists Old version 0.7.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.iheatmapr 0.7.0 -> 0.7.1 https://repology.org/project/r:iheatmapr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO gstreamer plugins are kept in lockstep. [result] Failed to update gst_all_1.gst-plugins-ugly 1.22.9 -> 1.24.1 https://repology.org/project/gstreamer:ugly/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.ncdfgeom, using log file: /var/log/nixpkgs-update/rPackages.ncdfgeom/2024-04-03.log rPackages.ncdfgeom 1.1.5 -> 1.1.6 https://repology.org/project/r:ncdfgeom/versions attrpath: rPackages.ncdfgeom Checking auto update branch... No auto update branch exists Old version 1.1.5" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.ncdfgeom 1.1.5 -> 1.1.6 https://repology.org/project/r:ncdfgeom/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.gbfs, using log file: /var/log/nixpkgs-update/rPackages.gbfs/2024-04-03.log rPackages.gbfs 1.3.8 -> 1.3.9 https://repology.org/project/r:gbfs/versions attrpath: rPackages.gbfs Checking auto update branch... No auto update branch exists Old version 1.3.8" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.gbfs 1.3.8 -> 1.3.9 https://repology.org/project/r:gbfs/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.nivm, using log file: /var/log/nixpkgs-update/rPackages.nivm/2024-04-03.log rPackages.nivm 0.3 -> 0.5 https://repology.org/project/r:nivm/versions attrpath: rPackages.nivm Checking auto update branch... No auto update branch exists Old version 0.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.nivm 0.3 -> 0.5 https://repology.org/project/r:nivm/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.rpact, using log file: /var/log/nixpkgs-update/rPackages.rpact/2024-04-03.log rPackages.rpact 3.4.0 -> 3.5.1 https://repology.org/project/r:rpact/versions attrpath: rPackages.rpact Checking auto update branch... No auto update branch exists Old version 3.4.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.rpact 3.4.0 -> 3.5.1 https://repology.org/project/r:rpact/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.CodelistGenerator, using log file: /var/log/nixpkgs-update/rPackages.CodelistGenerator/2024-04-03.log rPackages.CodelistGenerator 2.1.1 -> 2.2.3 https://repology.org/project/r:codelistgenerator/versions attrpath: rPackages.CodelistGenerator Checking auto update branch... No auto update branch exists Old version 2.1.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.CodelistGenerator 2.1.1 -> 2.2.3 https://repology.org/project/r:codelistgenerator/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.elasdics, using log file: /var/log/nixpkgs-update/rPackages.elasdics/2024-04-03.log rPackages.elasdics 1.1.1 -> 1.1.3 https://repology.org/project/r:elasdics/versions attrpath: rPackages.elasdics Checking auto update branch... No auto update branch exists Old version 1.1.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.elasdics 1.1.1 -> 1.1.3 https://repology.org/project/r:elasdics/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.SOMbrero, using log file: /var/log/nixpkgs-update/rPackages.SOMbrero/2024-04-03.log rPackages.SOMbrero 1.4-1 -> 1.4.2 https://repology.org/project/r:sombrero/versions attrpath: rPackages.SOMbrero Checking auto update branch... No auto update branch exists Old version 1.4-1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.SOMbrero 1.4-1 -> 1.4.2 https://repology.org/project/r:sombrero/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.mrfDepth, using log file: /var/log/nixpkgs-update/rPackages.mrfDepth/2024-04-03.log rPackages.mrfDepth 1.0.15 -> 1.0.16 https://repology.org/project/r:mrfdepth/versions attrpath: rPackages.mrfDepth Checking auto update branch... No auto update branch exists Old version 1.0.15" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.mrfDepth 1.0.15 -> 1.0.16 https://repology.org/project/r:mrfdepth/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.FPDclustering, using log file: /var/log/nixpkgs-update/rPackages.FPDclustering/2024-04-03.log rPackages.FPDclustering 2.2 -> 2.3.1 https://repology.org/project/r:fpdclustering/versions attrpath: rPackages.FPDclustering Checking auto update branch... No auto update branch exists Old version 2.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.FPDclustering 2.2 -> 2.3.1 https://repology.org/project/r:fpdclustering/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.minimaxApprox, using log file: /var/log/nixpkgs-update/rPackages.minimaxApprox/2024-04-03.log rPackages.minimaxApprox 0.2.2 -> 0.4.1 https://repology.org/project/r:minimaxapprox/versions attrpath: rPackages.minimaxApprox Checking auto update branch... No auto update branch exists Old version 0.2.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.minimaxApprox 0.2.2 -> 0.4.1 https://repology.org/project/r:minimaxapprox/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.bsitar, using log file: /var/log/nixpkgs-update/rPackages.bsitar/2024-04-03.log rPackages.bsitar 0.1.0 -> 0.2.1 https://repology.org/project/r:bsitar/versions attrpath: rPackages.bsitar Checking auto update branch... No auto update branch exists Old version 0.1.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.bsitar 0.1.0 -> 0.2.1 https://repology.org/project/r:bsitar/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.SiPSiC, using log file: /var/log/nixpkgs-update/rPackages.SiPSiC/2024-04-03.log rPackages.SiPSiC 1.2.1 -> 1.2.2 https://repology.org/project/r:sipsic/versions attrpath: rPackages.SiPSiC Checking auto update branch... No auto update branch exists Old version 1.2.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.SiPSiC 1.2.1 -> 1.2.2 https://repology.org/project/r:sipsic/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO gstreamer plugins are kept in lockstep. [result] Failed to update gst_all_1.gst-editing-services 1.22.9 -> 1.24.1 https://repology.org/project/gstreamer:editing-services/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO gstreamer plugins are kept in lockstep. [result] Failed to update gst_all_1.gst-devtools 1.22.9 -> 1.24.1 https://repology.org/project/gstreamer:devtools/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO gstreamer plugins are kept in lockstep. [result] Failed to update gst_all_1.gst-vaapi 1.22.9 -> 1.24.1 https://repology.org/project/gstreamer:vaapi/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.MOCHA, using log file: /var/log/nixpkgs-update/rPackages.MOCHA/2024-04-03.log rPackages.MOCHA 1.0.2 -> 1.1.0 https://repology.org/project/r:mocha/versions attrpath: rPackages.MOCHA Checking auto update branch... No auto update branch exists Old version 1.0.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.MOCHA 1.0.2 -> 1.1.0 https://repology.org/project/r:mocha/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.PRECAST, using log file: /var/log/nixpkgs-update/rPackages.PRECAST/2024-04-03.log rPackages.PRECAST 1.6.3 -> 1.6.5 https://repology.org/project/r:precast/versions attrpath: rPackages.PRECAST Checking auto update branch... No auto update branch exists Old version 1.6.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.PRECAST 1.6.3 -> 1.6.5 https://repology.org/project/r:precast/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.VC2copula, using log file: /var/log/nixpkgs-update/rPackages.VC2copula/2024-04-03.log rPackages.VC2copula 0.1.2 -> 0.1.5 https://repology.org/project/r:vc2copula/versions attrpath: rPackages.VC2copula Checking auto update branch... No auto update branch exists Old version 0.1.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.VC2copula 0.1.2 -> 0.1.5 https://repology.org/project/r:vc2copula/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath johnny, using log file: /var/log/nixpkgs-update/johnny/2024-04-03.log johnny 2.2 -> 20120424 https://repology.org/project/johnny/versions attrpath: johnny Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/3wizjrd2h7128a19d0mmdb03bdwwqasf-source.drv building '/nix/store/3wizjrd2h7128a19d0mmdb03bdwwqasf-source.drv'... trying https://github.com/openwall/johnny/archive/v20120424.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/3wizjrd2h7128a19d0mmdb03bdwwqasf-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/openwall/johnny/archive/v20120424.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/3wizjrd2h7128a19d0mmdb03bdwwqasf-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'johnny.originalSrc' not found stderr did not split as expected full stderr was: these 3 derivations will be built: /nix/store/3wizjrd2h7128a19d0mmdb03bdwwqasf-source.drv /nix/store/iik27b9ipl9lms36zx3dxxbjlz9rsm4p-Johnny.desktop.drv /nix/store/z3il57d4m7bn19mq4y6ml29xgx4brhyb-johnny-20120424.drv these 7 paths will be fetched (21.78 MiB download, 78.15 MiB unpacked): /nix/store/y5hqabn5840xg8zr38hwpbhqpfzkwgqc-john-1.9.0-jumbo-1 /nix/store/090pvyfs2pmr50k1l5n1sk3p8adnjk2y-perl5.38.2-Compress-Raw-Lzma-2.206 /nix/store/jlk2j9q0cbq25kgyryyhli3c5cxgzzd7-perl5.38.2-Convert-ASN1-0.34 /nix/store/yp1fzxl5dxssdayi1rpyh54cn1spz7y8-perl5.38.2-Digest-MD4-1.9 /nix/store/jd57m2v7spr225c5zn1x4l20c3jfjnnk-perl5.38.2-perl-ldap-0.68 /nix/store/c11n521ji6hvv81hj7cypsgxzjbzs8ds-python3.11-dpkt-1.9.8 /nix/store/nn6yw5xgjakyjh4lx88ih8ikz6sbh8mk-python3.11-scapy-2.5.0 copying path '/nix/store/jlk2j9q0cbq25kgyryyhli3c5cxgzzd7-perl5.38.2-Convert-ASN1-0.34' from 'https://cache.nixos.org'... building '/nix/store/iik27b9ipl9lms36zx3dxxbjlz9rsm4p-Johnny.desktop.drv'... copying path '/nix/store/090pvyfs2pmr50k1l5n1sk3p8adnjk2y-perl5.38.2-Compress-Raw-Lzma-2.206' from 'https://cache.nixos.org'... copying path '/nix/store/yp1fzxl5dxssdayi1rpyh54cn1spz7y8-perl5.38.2-Digest-MD4-1.9' from 'https://cache.nixos.org'... copying path '/nix/store/c11n521ji6hvv81hj7cypsgxzjbzs8ds-python3.11-dpkt-1.9.8' from 'https://cache.nixos.org'... copying path '/nix/store/nn6yw5xgjakyjh4lx88ih8ikz6sbh8mk-python3.11-scapy-2.5.0' from 'https://cache.nixos.org'... building '/nix/store/3wizjrd2h7128a19d0mmdb03bdwwqasf-source.drv'... /nix/store/irazl0bp8llp66yxhclpx40wcfjdy4nb-Johnny.desktop/share/applications/Johnny.desktop: warning: value "Application;System" for key "Categories" in group "Desktop Entry" contains a deprecated value "Application" copying path '/nix/store/jd57m2v7spr225c5zn1x4l20c3jfjnnk-perl5.38.2-perl-ldap-0.68' from 'https://cache.nixos.org'... cannot link '/nix/store/.links/1v1wi46s9jnl9phkx8z1wvc8v5xdkg6jl3n21vv3d5i2kxncy34f' to '/nix/store/c11n521ji6hvv81hj7cypsgxzjbzs8ds-python3.11-dpkt-1.9.8/lib/python3.11/site-packages/dpkt/__pycache__/ah.cpython-311.opt-1.pyc': No space left on device trying https://github.com/openwall/johnny/archive/v20120424.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 cannot link '/nix/store/.links/0vzkr7zkbb43x0izckrk3dg0m4kmahikky4z02yscy7rddnracgd' to '/nix/store/nn6yw5xgjakyjh4lx88ih8ikz6sbh8mk-python3.11-scapy-2.5.0/lib/python3.11/site-packages/scapy/contrib/__pycache__/concox.cpython-311.opt-1.pyc': No space left on device cannot link '/nix/store/.links/0vzkr7zkbb43x0izckrk3dg0m4kmahikky4z02yscy7rddnracgd' to '/nix/store/nn6yw5xgjakyjh4lx88ih8ikz6sbh8mk-python3.11-scapy-2.5.0/lib/python3.11/site-packages/scapy/contrib/__pycache__/concox.cpython-311.pyc': No space left on device cannot link '/nix/store/.links/1mdh7finpfg4bsb52wij6d0y6ljd8avzg3g1218ci05p5gca9mrz' to '/nix/store/nn6yw5xgjakyjh4lx88ih8ikz6sbh8mk-python3.11-scapy-2.5.0/lib/python3.11/site-packages/scapy/layers/tls/crypto/__pycache__/ciphers.cpython-311.pyc': No space left on device cannot link '/nix/store/.links/1mdh7finpfg4bsb52wij6d0y6ljd8avzg3g1218ci05p5gca9mrz' to '/nix/store/nn6yw5xgjakyjh4lx88ih8ikz6sbh8mk-python3.11-scapy-2.5.0/lib/python3.11/site-packages/scapy/layers/tls/crypto/__pycache__/ciphers.cpython-311.opt-1.pyc': No space left on device copying path '/nix/store/y5hqabn5840xg8zr38hwpbhqpfzkwgqc-john-1.9.0-jumbo-1' from 'https://cache.nixos.org'... 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/3wizjrd2h7128a19d0mmdb03bdwwqasf-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/openwall/johnny/archive/v20120424.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/3wizjrd2h7128a19d0mmdb03bdwwqasf-source.drv'. cannot link '/nix/store/.links/1cy6f3cl4j9pgcvjkydadz8mzm9r5n34vvxgv1rfs1wpa2i06p8g' to '/nix/store/y5hqabn5840xg8zr38hwpbhqpfzkwgqc-john-1.9.0-jumbo-1/bin/uaf2john': No space left on device error: 1 dependencies of derivation '/nix/store/z3il57d4m7bn19mq4y6ml29xgx4brhyb-johnny-20120424.drv' failed to build [result] Failed to update johnny 2.2 -> 20120424 https://repology.org/project/johnny/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath skippy-xd, using log file: /var/log/nixpkgs-update/skippy-xd/2024-04-03.log skippy-xd 0.6.0 -> 2023.06.25 https://repology.org/project/skippy-xd/versions attrpath: skippy-xd Checking auto update branch... No auto update branch exists [version] Hashes equal; no update necessary [result] Failed to update skippy-xd 0.6.0 -> 2023.06.25 https://repology.org/project/skippy-xd/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cask-server, using log file: /var/log/nixpkgs-update/cask-server/2024-04-03.log cask-server 0.6.0 -> 0.6.6 https://repology.org/project/cask-server/versions attrpath: cask-server Checking auto update branch... No auto update branch exists [version] Hashes equal; no update necessary [result] Failed to update cask-server 0.6.0 -> 0.6.6 https://repology.org/project/cask-server/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.lpcde, using log file: /var/log/nixpkgs-update/rPackages.lpcde/2024-04-03.log rPackages.lpcde 0.1.1 -> 0.1.3 https://repology.org/project/r:lpcde/versions attrpath: rPackages.lpcde Checking auto update branch... No auto update branch exists Old version 0.1.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.lpcde 0.1.1 -> 0.1.3 https://repology.org/project/r:lpcde/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath xorg.libX11, using log file: /var/log/nixpkgs-update/xorg.libX11/2024-04-03.log xorg.libX11 1.8.7 -> 1.8.8 https://repology.org/project/libx11/versions attrpath: xorg.libX11 Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update xorg.libX11 1.8.7 -> 1.8.8 https://repology.org/project/libx11/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath home-assistant-custom-components.homematicip_local, using log file: /var/log/nixpkgs-update/home-assistant-custom-components.homematicip_local/2024-04-03.log home-assistant-custom-components.homematicip_local 0 -> 1 attrpath: home-assistant-custom-components.homematicip_local Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/mi9zqkaxpa384w69c766s0z1xgw83d2n-packages.json.drv building '/nix/store/mi9zqkaxpa384w69c766s0z1xgw83d2n-packages.json.drv'... Going to be running update for following packages: - python3.12-danielperna84-homematicip_local-1.58.0 Press Enter key to continue... Running update for: - python3.12-danielperna84-homematicip_local-1.58.0: UPDATING ... - python3.12-danielperna84-homematicip_local-1.58.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update home-assistant-custom-components.homematicip_local 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.rnmamod, using log file: /var/log/nixpkgs-update/rPackages.rnmamod/2024-04-03.log rPackages.rnmamod 0.3.0 -> 0.4.0 https://repology.org/project/r:rnmamod/versions attrpath: rPackages.rnmamod Checking auto update branch... No auto update branch exists Old version 0.3.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.rnmamod 0.3.0 -> 0.4.0 https://repology.org/project/r:rnmamod/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.teal_logger, using log file: /var/log/nixpkgs-update/rPackages.teal_logger/2024-04-03.log rPackages.teal_logger 0.1.3 -> 0.2.0 https://repology.org/project/r:teal.logger/versions attrpath: rPackages.teal_logger Checking auto update branch... No auto update branch exists Old version 0.1.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.teal_logger 0.1.3 -> 0.2.0 https://repology.org/project/r:teal.logger/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.HDShOP, using log file: /var/log/nixpkgs-update/rPackages.HDShOP/2024-04-03.log rPackages.HDShOP 0.1.3 -> 0.1.5 https://repology.org/project/r:hdshop/versions attrpath: rPackages.HDShOP Checking auto update branch... No auto update branch exists Old version 0.1.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.HDShOP 0.1.3 -> 0.1.5 https://repology.org/project/r:hdshop/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath libiec61850, using log file: /var/log/nixpkgs-update/libiec61850/2024-04-03.log libiec61850 0 -> 1 attrpath: libiec61850 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/il92c72469xhrvm2l0cc7jqb7189fggy-packages.json.drv building '/nix/store/il92c72469xhrvm2l0cc7jqb7189fggy-packages.json.drv'... Going to be running update for following packages: - libiec61850-1.5.3 Press Enter key to continue... Running update for: - libiec61850-1.5.3: UPDATING ... - libiec61850-1.5.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update libiec61850 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.daltoolbox, using log file: /var/log/nixpkgs-update/rPackages.daltoolbox/2024-04-03.log rPackages.daltoolbox 1.0.727 -> 1.0.767 https://repology.org/project/r:daltoolbox/versions attrpath: rPackages.daltoolbox Checking auto update branch... No auto update branch exists Old version 1.0.727" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.daltoolbox 1.0.727 -> 1.0.767 https://repology.org/project/r:daltoolbox/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.sf, using log file: /var/log/nixpkgs-update/rPackages.sf/2024-04-03.log rPackages.sf 1.0-15 -> 1.0.16 https://repology.org/project/r:sf/versions attrpath: rPackages.sf Checking auto update branch... No auto update branch exists Old version 1.0-15" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.sf 1.0-15 -> 1.0.16 https://repology.org/project/r:sf/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.lintr, using log file: /var/log/nixpkgs-update/rPackages.lintr/2024-04-03.log rPackages.lintr 3.1.1 -> 3.1.2 https://repology.org/project/r:lintr/versions attrpath: rPackages.lintr Checking auto update branch... No auto update branch exists Old version 3.1.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.lintr 3.1.1 -> 3.1.2 https://repology.org/project/r:lintr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath xorg.lndir, using log file: /var/log/nixpkgs-update/xorg.lndir/2024-04-03.log xorg.lndir 1.0.4 -> 1.0.5 https://repology.org/project/lndir/versions attrpath: xorg.lndir Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update xorg.lndir 1.0.4 -> 1.0.5 https://repology.org/project/lndir/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.parsedmarc, using log file: /var/log/nixpkgs-update/python311Packages.parsedmarc/2024-04-03.log python311Packages.parsedmarc 8.8.0 -> 8.11.0 https://repology.org/project/python:parsedmarc/versions attrpath: python311Packages.parsedmarc Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/4f70w3ab1xk0qq1r1carrvylyv59j3vb-packages.json.drv building '/nix/store/4f70w3ab1xk0qq1r1carrvylyv59j3vb-packages.json.drv'... Going to be running update for following packages: - python3.11-parsedmarc-8.8.0 Press Enter key to continue... Running update for: - python3.11-parsedmarc-8.8.0: UPDATING ... - python3.11-parsedmarc-8.8.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/parsedmarc/default.nix b/pkgs/development/python-modules/parsedmarc/default.nix index a5c59338fcdc..26d01dedf976 100644 --- a/pkgs/development/python-modules/parsedmarc/default.nix +++ b/pkgs/development/python-modules/parsedmarc/default.nix @@ -40,14 +40,14 @@ let in buildPythonPackage rec { pname = "parsedmarc"; - version = "8.8.0"; + version = "8.11.0"; pyproject = true; disabled = pythonOlder "3.7"; src = fetchPypi { inherit pname version; - hash = "sha256-tK/cxOw50awcDAGRDTQ+Nxb9aJl2+zLZHuJq88xNmXM="; + hash = "sha256-OBxiaXB8NKNMviRI19rYYJxpnfnaEL3zSPmYB4urIug="; }; postPatch = '' No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A python311Packages.parsedmarc nix build failed. Sourcing python-namespaces-hook Sourcing python-catch-conflicts-hook.sh @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/kjpk5bz9zp1nbwymp4jwx62i2nqsvzaa-parsedmarc-8.11.0.tar.gz source root is parsedmarc-8.11.0 setting SOURCE_DATE_EPOCH to timestamp 1580601600 of file parsedmarc-8.11.0/pyproject.toml @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase substituteStream(): WARNING: '--replace' is deprecated, use --replace-{fail,warn,quiet}. (file 'pyproject.toml') @nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" } Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "configurePhase" } Running phase: configurePhase no configure script, doing nothing @nix { "action": "setPhase", "phase": "buildPhase" } Running phase: buildPhase Executing pypaBuildPhase Creating a wheel... * Getting build dependencies for wheel... * Building wheel... Successfully built parsedmarc-8.11.0-py2.py3-none-any.whl Finished creating a wheel... Finished executing pypaBuildPhase @nix { "action": "setPhase", "phase": "pythonRuntimeDepsCheckHook" } Running phase: pythonRuntimeDepsCheckHook Executing pythonRuntimeDepsCheck Checking runtime dependencies for parsedmarc-8.11.0-py2.py3-none-any.whl - msgraph-core==0.2.2 not satisfied by version 1.0.0 - opensearch-py not installed [result] Failed to update python311Packages.parsedmarc 8.8.0 -> 8.11.0 https://repology.org/project/python:parsedmarc/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.MSoutcomes, using log file: /var/log/nixpkgs-update/rPackages.MSoutcomes/2024-04-03.log rPackages.MSoutcomes 0.1.0 -> 0.2.0 https://repology.org/project/r:msoutcomes/versions attrpath: rPackages.MSoutcomes Checking auto update branch... No auto update branch exists Old version 0.1.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.MSoutcomes 0.1.0 -> 0.2.0 https://repology.org/project/r:msoutcomes/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.lfe, using log file: /var/log/nixpkgs-update/rPackages.lfe/2024-04-03.log rPackages.lfe 2.9-0 -> 3.0-0 https://repology.org/project/r:lfe/versions attrpath: rPackages.lfe Checking auto update branch... No auto update branch exists Old version 2.9-0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.lfe 2.9-0 -> 3.0-0 https://repology.org/project/r:lfe/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.OptGS, using log file: /var/log/nixpkgs-update/rPackages.OptGS/2024-04-03.log rPackages.OptGS 1.1.1 -> 1.2 https://repology.org/project/r:optgs/versions attrpath: rPackages.OptGS Checking auto update branch... No auto update branch exists Old version 1.1.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.OptGS 1.1.1 -> 1.2 https://repology.org/project/r:optgs/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.hdflex, using log file: /var/log/nixpkgs-update/rPackages.hdflex/2024-04-03.log rPackages.hdflex 0.2.0 -> 0.2.1 https://repology.org/project/r:hdflex/versions attrpath: rPackages.hdflex Checking auto update branch... No auto update branch exists Old version 0.2.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.hdflex 0.2.0 -> 0.2.1 https://repology.org/project/r:hdflex/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.PUMP, using log file: /var/log/nixpkgs-update/rPackages.PUMP/2024-04-03.log rPackages.PUMP 1.0.2 -> 1.0.3 https://repology.org/project/r:pump/versions attrpath: rPackages.PUMP Checking auto update branch... No auto update branch exists Old version 1.0.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.PUMP 1.0.2 -> 1.0.3 https://repology.org/project/r:pump/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.spatstat_random, using log file: /var/log/nixpkgs-update/rPackages.spatstat_random/2024-04-03.log rPackages.spatstat_random 3.2-2 -> 3.2.3 https://repology.org/project/r:spatstat.random/versions attrpath: rPackages.spatstat_random Checking auto update branch... No auto update branch exists Old version 3.2-2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.spatstat_random 3.2-2 -> 3.2.3 https://repology.org/project/r:spatstat.random/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath phpunit, using log file: /var/log/nixpkgs-update/phpunit/2024-04-03.log phpunit 11.0.4 -> 11.0.9 https://repology.org/project/php:phpunit/versions attrpath: phpunit Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update phpunit 11.0.4 -> 11.0.9 https://repology.org/project/php:phpunit/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.gMCPLite, using log file: /var/log/nixpkgs-update/rPackages.gMCPLite/2024-04-03.log rPackages.gMCPLite 0.1.4 -> 0.1.5 https://repology.org/project/r:gmcplite/versions attrpath: rPackages.gMCPLite Checking auto update branch... No auto update branch exists Old version 0.1.4" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.gMCPLite 0.1.4 -> 0.1.5 https://repology.org/project/r:gmcplite/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath dfu-programmer, using log file: /var/log/nixpkgs-update/dfu-programmer/2024-04-03.log dfu-programmer 0.7.2 -> 1.1.0 https://repology.org/project/dfu-programmer/versions attrpath: dfu-programmer Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/4rk7d6228mcczqsf4gs0xpangpwy31r7-dfu-programmer-1.1.0.tar.gz.drv building '/nix/store/4rk7d6228mcczqsf4gs0xpangpwy31r7-dfu-programmer-1.1.0.tar.gz.drv'... trying https://downloads.sourceforge.net/dfu-programmer/dfu-programmer-1.1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 154 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://prdownloads.sourceforge.net/dfu-programmer/dfu-programmer-1.1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 154 0 0 0 0 0 0 --:--:-- 0:00:02 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://netcologne.dl.sourceforge.net/sourceforge/dfu-programmer/dfu-programmer-1.1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 138 100 138 0 0 883 0 --:--:-- --:--:-- --:--:-- 884 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://versaweb.dl.sourceforge.net/sourceforge/dfu-programmer/dfu-programmer-1.1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 154 100 154 0 0 245 0 --:--:-- --:--:-- --:--:-- 245 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://freefr.dl.sourceforge.net/sourceforge/dfu-programmer/dfu-programmer-1.1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 324 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://osdn.dl.sourceforge.net/sourceforge/dfu-programmer/dfu-programmer-1.1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL: no alternative certificate subject name matches target host name 'osdn.dl.sourceforge.net' More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. error: cannot download dfu-programmer-1.1.0.tar.gz from any mirror error: builder for '/nix/store/4rk7d6228mcczqsf4gs0xpangpwy31r7-dfu-programmer-1.1.0.tar.gz.drv' failed with exit code 1; last 25 log lines: > trying https://versaweb.dl.sourceforge.net/sourceforge/dfu-programmer/dfu-programmer-1.1.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 100 154 100 154 0 0 245 0 --:--:-- --:--:-- --:--:-- 245 > 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 > curl: (22) The requested URL returned error: 404 > > trying https://freefr.dl.sourceforge.net/sourceforge/dfu-programmer/dfu-programmer-1.1.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 324 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 > curl: (22) The requested URL returned error: 404 > > trying https://osdn.dl.sourceforge.net/sourceforge/dfu-programmer/dfu-programmer-1.1.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (60) SSL: no alternative certificate subject name matches target host name 'osdn.dl.sourceforge.net' > More details here: https://curl.se/docs/sslcerts.html > > curl failed to verify the legitimacy of the server and therefore could not > establish a secure connection to it. To learn more about this situation and > how to fix it, please visit the web page mentioned above. > error: cannot download dfu-programmer-1.1.0.tar.gz from any mirror For full logs, run 'nix log /nix/store/4rk7d6228mcczqsf4gs0xpangpwy31r7-dfu-programmer-1.1.0.tar.gz.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'dfu-programmer.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/4rk7d6228mcczqsf4gs0xpangpwy31r7-dfu-programmer-1.1.0.tar.gz.drv /nix/store/mq51cqz92azzlrjvaxlwn7cdkh39pl76-dfu-programmer-1.1.0.drv this path will be fetched (0.00 MiB download, 0.01 MiB unpacked): /nix/store/5ahpk0x0ll1wm1vhdsq64nk0sw48zckm-libusb-compat-0.1.8-dev copying path '/nix/store/5ahpk0x0ll1wm1vhdsq64nk0sw48zckm-libusb-compat-0.1.8-dev' from 'https://cache.nixos.org'... building '/nix/store/4rk7d6228mcczqsf4gs0xpangpwy31r7-dfu-programmer-1.1.0.tar.gz.drv'... trying https://downloads.sourceforge.net/dfu-programmer/dfu-programmer-1.1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 154 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://prdownloads.sourceforge.net/dfu-programmer/dfu-programmer-1.1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://netcologne.dl.sourceforge.net/sourceforge/dfu-programmer/dfu-programmer-1.1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 138 100 138 0 0 1292 0 --:--:-- --:--:-- --:--:-- 1301 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://versaweb.dl.sourceforge.net/sourceforge/dfu-programmer/dfu-programmer-1.1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 154 100 154 0 0 249 0 --:--:-- --:--:-- --:--:-- 249 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://freefr.dl.sourceforge.net/sourceforge/dfu-programmer/dfu-programmer-1.1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 324 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://osdn.dl.sourceforge.net/sourceforge/dfu-programmer/dfu-programmer-1.1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL: no alternative certificate subject name matches target host name 'osdn.dl.sourceforge.net' More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. error: cannot download dfu-programmer-1.1.0.tar.gz from any mirror error: builder for '/nix/store/4rk7d6228mcczqsf4gs0xpangpwy31r7-dfu-programmer-1.1.0.tar.gz.drv' failed with exit code 1; last 25 log lines: > trying https://versaweb.dl.sourceforge.net/sourceforge/dfu-programmer/dfu-programmer-1.1.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 100 154 100 154 0 0 249 0 --:--:-- --:--:-- --:--:-- 249 > 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 > curl: (22) The requested URL returned error: 404 > > trying https://freefr.dl.sourceforge.net/sourceforge/dfu-programmer/dfu-programmer-1.1.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 324 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 > curl: (22) The requested URL returned error: 404 > > trying https://osdn.dl.sourceforge.net/sourceforge/dfu-programmer/dfu-programmer-1.1.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (60) SSL: no alternative certificate subject name matches target host name 'osdn.dl.sourceforge.net' > More details here: https://curl.se/docs/sslcerts.html > > curl failed to verify the legitimacy of the server and therefore could not > establish a secure connection to it. To learn more about this situation and > how to fix it, please visit the web page mentioned above. > error: cannot download dfu-programmer-1.1.0.tar.gz from any mirror For full logs, run 'nix log /nix/store/4rk7d6228mcczqsf4gs0xpangpwy31r7-dfu-programmer-1.1.0.tar.gz.drv'. error: 1 dependencies of derivation '/nix/store/mq51cqz92azzlrjvaxlwn7cdkh39pl76-dfu-programmer-1.1.0.drv' failed to build [result] Failed to update dfu-programmer 0.7.2 -> 1.1.0 https://repology.org/project/dfu-programmer/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath eclipses.eclipse-cpp, using log file: /var/log/nixpkgs-update/eclipses.eclipse-cpp/2024-04-03.log eclipses.eclipse-cpp 4.30 -> 2023.09 https://repology.org/project/eclipse-cpp/versions attrpath: eclipses.eclipse-cpp Checking auto update branch... No auto update branch exists Old version 4.30" not present in master derivation file with contents: { lib, stdenv, makeDesktopItem, freetype, fontconfig, libX11, libXrender , zlib, jdk, glib, glib-networking, gtk, libXtst, libsecret, gsettings-desktop-schemas, webkitgtk , makeWrapper, perl, ... }: { name, src ? builtins.getAttr stdenv.hostPlatform.system sources, sources ? null, description, productVersion }: stdenv.mkDerivation rec { inherit name src; desktopItem = makeDesktopItem { name = "Eclipse"; exec = "eclipse"; icon = "eclipse"; comment = "Integrated Development Environment"; desktopName = "Eclipse IDE"; genericName = "Integrated Development Environment"; categories = [ "Development" ]; }; nativeBuildInputs = [ makeWrapper perl ]; buildInputs = [ fontconfig freetype glib gsettings-desktop-schemas gtk jdk libX11 libXrender libXtst libsecret zlib ] ++ lib.optional (webkitgtk != null) webkitgtk; buildCommand = '' # Unpack tarball. mkdir -p $out tar xfvz $src -C $out # Patch binaries. interpreter="$(cat $NIX_BINTOOLS/nix-support/dynamic-linker)" libCairo=$out/eclipse/libcairo-swt.so patchelf --set-interpreter $interpreter $out/eclipse/eclipse [ -f $libCairo ] && patchelf --set-rpath ${lib.makeLibraryPath [ freetype fontconfig libX11 libXrender zlib ]} $libCairo # Create wrapper script. Pass -configuration to store # settings in ~/.eclipse/org.eclipse.platform_ rather # than ~/.eclipse/org.eclipse.platform__. productId=$(sed 's/id=//; t; d' $out/eclipse/.eclipseproduct) makeWrapper $out/eclipse/eclipse $out/bin/eclipse \ --prefix PATH : ${jdk}/bin \ --prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath ([ glib gtk libXtst libsecret ] ++ lib.optional (webkitgtk != null) webkitgtk)} \ --prefix GIO_EXTRA_MODULES : "${glib-networking}/lib/gio/modules" \ --prefix XDG_DATA_DIRS : "$GSETTINGS_SCHEMAS_PATH" \ --add-flags "-configuration \$HOME/.eclipse/''${productId}_${productVersion}/configuration" # Create desktop item. mkdir -p $out/share/applications cp ${desktopItem}/share/applications/* $out/share/applications mkdir -p $out/share/pixmaps ln -s $out/eclipse/icon.xpm $out/share/pixmaps/eclipse.xpm # ensure eclipse.ini does not try to use a justj jvm, as those aren't compatible with nix perl -i -p0e 's|-vm\nplugins/org.eclipse.justj.*/jre/bin.*\n||' $out/eclipse/eclipse.ini ''; # */ meta = { homepage = "https://www.eclipse.org/"; inherit description; sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ]; platforms = [ "x86_64-linux" "aarch64-linux" ]; }; } [result] Failed to update eclipses.eclipse-cpp 4.30 -> 2023.09 https://repology.org/project/eclipse-cpp/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gigedit, using log file: /var/log/nixpkgs-update/gigedit/2024-04-03.log gigedit 1.1.1 -> 1.2.1 https://repology.org/project/gigedit/versions attrpath: gigedit Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/applications/audio/gigedit/default.nix b/pkgs/applications/audio/gigedit/default.nix index 7a367aa7ba71..f32667480551 100644 --- a/pkgs/applications/audio/gigedit/default.nix +++ b/pkgs/applications/audio/gigedit/default.nix @@ -21,11 +21,11 @@ let in stdenv.mkDerivation rec { pname = "gigedit"; - version = "1.1.1"; + version = "1.2.1"; src = fetchurl { url = "https://download.linuxsampler.org/packages/${pname}-${version}.tar.bz2"; - sha256 = "08db12crwf0dy1dbyrmivqqpg5zicjikqkmf2kb1ywpq0a9hcxrb"; + sha256 = "sha256-pz+2gbVbPytuioXxNHQWE3Pml4r9JfwBIQcsbevWHkQ="; }; preConfigure = "make -f Makefile.svn"; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A gigedit nix build failed. checking for CFLocaleCopyCurrent... no checking for libintl.h... yes checking for ngettext in libc... yes checking for dgettext in libc... yes checking for bind_textdomain_codeset... yes checking for msgfmt... (cached) /nix/store/qjb0xvlkzdbrxxasmajw93phx3wh8vq6-gettext-0.21.1/bin/msgfmt checking for dcgettext... yes checking if msgfmt accepts -c... yes checking for gmsgfmt... (cached) /nix/store/qjb0xvlkzdbrxxasmajw93phx3wh8vq6-gettext-0.21.1/bin/msgfmt checking for xgettext... (cached) /nix/store/qjb0xvlkzdbrxxasmajw93phx3wh8vq6-gettext-0.21.1/bin/xgettext checking whether g++ supports C++11 features with -std=gnu++11... yes checking for gcc... gcc checking whether the compiler supports GNU Objective C... no checking whether gcc accepts -g... no checking for g++... g++ checking whether the compiler supports GNU Objective C++... no checking whether g++ accepts -g... no checking whether make supports nested variables... yes checking pkg-config is at least version 0.9.0... yes checking for gtk+-2.0... yes checking pkg-config is at least version 0.9.0... yes checking for gtkmm-2.4 >= 2.8 gthread-2.0 cairomm-1.0... yes checking for cairommconfig.h... yes checking for sigc++-2.0... yes checking for gig >= 4.4.0... yes checking for sndfile >= 1.0.11... yes checking for linuxsampler >= 2.3.0... no Required liblinuxsampler version not found! You need to have liblinuxsampler version 2.3.0 installed for this version of gigedit. [result] Failed to update gigedit 1.1.1 -> 1.2.1 https://repology.org/project/gigedit/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.countland, using log file: /var/log/nixpkgs-update/rPackages.countland/2024-04-03.log rPackages.countland 0.1.1 -> 0.1.2 https://repology.org/project/r:countland/versions attrpath: rPackages.countland Checking auto update branch... No auto update branch exists Old version 0.1.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.countland 0.1.1 -> 0.1.2 https://repology.org/project/r:countland/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.penaltyLearning, using log file: /var/log/nixpkgs-update/rPackages.penaltyLearning/2024-04-03.log rPackages.penaltyLearning 2023.8.31 -> 2024.1.25 https://repology.org/project/r:penaltylearning/versions attrpath: rPackages.penaltyLearning Checking auto update branch... No auto update branch exists Old version 2023.8.31" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.penaltyLearning 2023.8.31 -> 2024.1.25 https://repology.org/project/r:penaltylearning/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.xpose, using log file: /var/log/nixpkgs-update/rPackages.xpose/2024-04-03.log rPackages.xpose 0.4.17 -> 0.4.18 https://repology.org/project/r:xpose/versions attrpath: rPackages.xpose Checking auto update branch... No auto update branch exists Old version 0.4.17" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.xpose 0.4.17 -> 0.4.18 https://repology.org/project/r:xpose/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.ottr, using log file: /var/log/nixpkgs-update/rPackages.ottr/2024-04-03.log rPackages.ottr 1.4.0 -> 1.5.0 https://repology.org/project/r:ottr/versions attrpath: rPackages.ottr Checking auto update branch... No auto update branch exists Old version 1.4.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.ottr 1.4.0 -> 1.5.0 https://repology.org/project/r:ottr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.degreenet, using log file: /var/log/nixpkgs-update/rPackages.degreenet/2024-04-03.log rPackages.degreenet 1.3-3 -> 1.3-5 https://repology.org/project/r:degreenet/versions attrpath: rPackages.degreenet Checking auto update branch... No auto update branch exists Old version 1.3-3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.degreenet 1.3-3 -> 1.3-5 https://repology.org/project/r:degreenet/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.paddleocr, using log file: /var/log/nixpkgs-update/python312Packages.paddleocr/2024-04-03.log python312Packages.paddleocr 2.7.1 -> 2.7.5 https://github.com/PaddlePaddle/PaddleOCR/releases attrpath: python312Packages.paddleocr Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/wmgq3h5b11xvgzq1k8ajrinn08gv7sdx-packages.json.drv building '/nix/store/wmgq3h5b11xvgzq1k8ajrinn08gv7sdx-packages.json.drv'... Going to be running update for following packages: - python3.12-paddleocr-2.7.1 Press Enter key to continue... Running update for: - python3.12-paddleocr-2.7.1: UPDATING ... - python3.12-paddleocr-2.7.1: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/paddleocr/default.nix b/pkgs/development/python-modules/paddleocr/default.nix index 4cc4d283a831..06ba4a8d1682 100644 --- a/pkgs/development/python-modules/paddleocr/default.nix +++ b/pkgs/development/python-modules/paddleocr/default.nix @@ -28,7 +28,7 @@ }: let - version = "2.7.1"; + version = "2.7.5"; in buildPythonPackage { pname = "paddleocr"; @@ -38,8 +38,8 @@ buildPythonPackage { src = fetchFromGitHub { owner = "PaddlePaddle"; repo = "PaddleOCR"; - rev = "v${version}"; - hash = "sha256-5Dt4UL+7dwJNjcNnCVi3o8bLCt7/m/M6oh1vPu9rza8="; + rev = "refs/tags/v${version}"; + hash = "sha256-8mnSV4ga6G2cbYCX84XJRFiLCoXstTAtqvg9QqVN6GI="; }; patches = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Update edits cause no rebuilds. [result] Failed to update python312Packages.paddleocr 2.7.1 -> 2.7.5 https://github.com/PaddlePaddle/PaddleOCR/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath scaleway-cli, using log file: /var/log/nixpkgs-update/scaleway-cli/2024-04-03.log scaleway-cli 2.27.0 -> 2.29.0 https://repology.org/project/scaleway-cli/versions attrpath: scaleway-cli Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Found old vendorHash = "sha256-GDV7BDZb0oHQUbA/Ojx6kzh9kBh0C5RbjYDDzX16LmQ=" [golangModuleVersion] Replaced vendorHash with sha256-h32vhZIPK0542LY+hjRdL+41lPwATA9xM1RUE5t9Bqk= Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A scaleway-cli nix build failed. Error Trace: /build/source/internal/core/testing.go:599 /build/source/internal/core/testing.go:591 /build/source/internal/core/testing.go:458 Error: Not equal: expected: 0 actual : 1 Test: Test_CreateContext/Simple Messages: Invalid exit code panic: interface conversion: interface {} is nil, not *core.SuccessResult [recovered] panic: interface conversion: interface {} is nil, not *core.SuccessResult goroutine 20 [running]: testing.tRunner.func1.2({0x9732e0, 0xc00027cf90}) /nix/store/mzg3cka0bbr5jq96ysymwziw74fnk22m-go-1.22.1/share/go/src/testing/testing.go:1631 +0x24a testing.tRunner.func1() /nix/store/mzg3cka0bbr5jq96ysymwziw74fnk22m-go-1.22.1/share/go/src/testing/testing.go:1634 +0x377 panic({0x9732e0?, 0xc00027cf90?}) /nix/store/mzg3cka0bbr5jq96ysymwziw74fnk22m-go-1.22.1/share/go/src/runtime/panic.go:770 +0x132 github.com/scaleway/scaleway-cli/v2/internal/namespaces/mnq/v1beta1_test.Test_CreateContext.func1(0xc00014d520?, 0xc0001ff0e0?) /build/source/internal/namespaces/mnq/v1beta1/custom_nats_test.go:31 +0x15e github.com/scaleway/scaleway-cli/v2/internal/namespaces/mnq/v1beta1_test.Test_CreateContext.TestCheckCombine.func5(0xc00014d520, 0xc0001ff0e0) /build/source/internal/core/testing.go:591 +0x3f github.com/scaleway/scaleway-cli/v2/internal/namespaces/mnq/v1beta1_test.Test_CreateContext.Test.func7(0xc00014d520) /build/source/internal/core/testing.go:458 +0xf52 testing.tRunner(0xc00014d520, 0xc000127640) /nix/store/mzg3cka0bbr5jq96ysymwziw74fnk22m-go-1.22.1/share/go/src/testing/testing.go:1689 +0xfb created by testing.(*T).Run in goroutine 19 /nix/store/mzg3cka0bbr5jq96ysymwziw74fnk22m-go-1.22.1/share/go/src/testing/testing.go:1742 +0x390 FAIL github.com/scaleway/scaleway-cli/v2/internal/namespaces/mnq/v1beta1 0.009s FAIL [result] Failed to update scaleway-cli 2.27.0 -> 2.29.0 https://repology.org/project/scaleway-cli/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.distrDoc, using log file: /var/log/nixpkgs-update/rPackages.distrDoc/2024-04-03.log rPackages.distrDoc 2.8.1 -> 2.8.2 https://repology.org/project/r:distrdoc/versions attrpath: rPackages.distrDoc Checking auto update branch... No auto update branch exists Old version 2.8.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.distrDoc 2.8.1 -> 2.8.2 https://repology.org/project/r:distrdoc/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.neat, using log file: /var/log/nixpkgs-update/rPackages.neat/2024-04-03.log rPackages.neat 1.2.3 -> 1.2.4 https://repology.org/project/r:neat/versions attrpath: rPackages.neat Checking auto update branch... No auto update branch exists Old version 1.2.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.neat 1.2.3 -> 1.2.4 https://repology.org/project/r:neat/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.PNDSIBGE, using log file: /var/log/nixpkgs-update/rPackages.PNDSIBGE/2024-04-03.log rPackages.PNDSIBGE 0.1.0 -> 0.1.1 https://repology.org/project/r:pndsibge/versions attrpath: rPackages.PNDSIBGE Checking auto update branch... No auto update branch exists Old version 0.1.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.PNDSIBGE 0.1.0 -> 0.1.1 https://repology.org/project/r:pndsibge/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.support_BWS3, using log file: /var/log/nixpkgs-update/rPackages.support_BWS3/2024-04-03.log rPackages.support_BWS3 0.2-0 -> 0.2-1 https://repology.org/project/r:support.bws3/versions attrpath: rPackages.support_BWS3 Checking auto update branch... No auto update branch exists Old version 0.2-0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.support_BWS3 0.2-0 -> 0.2-1 https://repology.org/project/r:support.bws3/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.mlr3misc, using log file: /var/log/nixpkgs-update/rPackages.mlr3misc/2024-04-03.log rPackages.mlr3misc 0.13.0 -> 0.14.0 https://repology.org/project/r:mlr3misc/versions attrpath: rPackages.mlr3misc Checking auto update branch... No auto update branch exists Old version 0.13.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.mlr3misc 0.13.0 -> 0.14.0 https://repology.org/project/r:mlr3misc/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.mlVAR, using log file: /var/log/nixpkgs-update/rPackages.mlVAR/2024-04-03.log rPackages.mlVAR 0.5.1 -> 0.5.2 https://repology.org/project/r:mlvar/versions attrpath: rPackages.mlVAR Checking auto update branch... No auto update branch exists Old version 0.5.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.mlVAR 0.5.1 -> 0.5.2 https://repology.org/project/r:mlvar/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.springer, using log file: /var/log/nixpkgs-update/rPackages.springer/2024-04-03.log rPackages.springer 0.1.8 -> 0.1.9 https://repology.org/project/r:springer/versions attrpath: rPackages.springer Checking auto update branch... No auto update branch exists Old version 0.1.8" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.springer 0.1.8 -> 0.1.9 https://repology.org/project/r:springer/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.kedd, using log file: /var/log/nixpkgs-update/rPackages.kedd/2024-04-03.log rPackages.kedd 1.0.3 -> 1.0.4 https://repology.org/project/r:kedd/versions attrpath: rPackages.kedd Checking auto update branch... No auto update branch exists Old version 1.0.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.kedd 1.0.3 -> 1.0.4 https://repology.org/project/r:kedd/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath libmediainfo, using log file: /var/log/nixpkgs-update/libmediainfo/2024-04-03.log libmediainfo 24.01 -> 24.03 https://repology.org/project/libmediainfo/versions attrpath: libmediainfo Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/libraries/libmediainfo/default.nix b/pkgs/development/libraries/libmediainfo/default.nix index ee81e63ba5e4..c0abeb221ec8 100644 --- a/pkgs/development/libraries/libmediainfo/default.nix +++ b/pkgs/development/libraries/libmediainfo/default.nix @@ -2,11 +2,11 @@ stdenv.mkDerivation rec { pname = "libmediainfo"; - version = "24.01"; + version = "24.03"; src = fetchurl { url = "https://mediaarea.net/download/source/libmediainfo/${version}/libmediainfo_${version}.tar.xz"; - hash = "sha256-oC38Zon0hc7Ab6EqNBTDw6ooU7Td4YrqtLVKVsgxYlk="; + hash = "sha256-zCu0TkB8iQq1ZpNMVnY5GFBatYwUE0tT8NHanuokLI0="; }; nativeBuildInputs = [ autoreconfHook pkg-config ]; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/mi5pjmwqinbkmvrzadplspc9959ixk1a-libmediainfo-24.03" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package marked as broken and skipped:
  • ultrastar-manager
32 packages built:
  • CuboCore.coreinfo
  • aaxtomp3
  • deepin.dde-file-manager
  • deepin.dde-gsettings-schemas
  • deepin.deepin-camera
  • deepin.deepin-screen-recorder
  • deepin.image-editor
  • deepin.util-dfm
  • filebot
  • kdePackages.kdenlive
  • kdePackages.kdenlive.debug
  • kdePackages.kdenlive.dev
  • libmediainfo
  • libsForQt5.kdenlive
  • lidarr
  • mediaelch
  • mediaelch-qt6
  • mediainfo
  • mediainfo-gui
  • megacmd
  • megasync
  • prowlarr
  • python311Packages.pymediainfo
  • python311Packages.pymediainfo.dist
  • python312Packages.pymediainfo
  • python312Packages.pymediainfo.dist
  • radarr
  • rapid-photo-downloader
  • rapid-photo-downloader.dist
  • readarr
  • svp
  • ums
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/libmediainfo/versions. meta.description for libmediainfo is: Shared library for mediainfo meta.homepage for libmediainfo is: https://mediaarea.net/ meta.changelog for libmediainfo is: https://mediaarea.net/MediaInfo/ChangeLog ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 24.03 with grep in /nix/store/mi5pjmwqinbkmvrzadplspc9959ixk1a-libmediainfo-24.03 - found 24.03 in filename of file in /nix/store/mi5pjmwqinbkmvrzadplspc9959ixk1a-libmediainfo-24.03 ---
Rebuild report (if merged into master) (click to expand) ``` 30 total rebuild path(s) 30 package rebuild(s) First fifty rebuilds by attrpath CuboCore.coreinfo aaxtomp3 deepin.dde-file-manager deepin.dde-gsettings-schemas deepin.deepin-camera deepin.deepin-screen-recorder deepin.image-editor deepin.util-dfm filebot kdePackages.kdenlive libmediainfo libsForQt5.kdenlive lidarr mediaelch mediaelch-qt5 mediaelch-qt6 mediainfo mediainfo-gui megacmd megasync plasma5Packages.kdenlive prowlarr python311Packages.pymediainfo python312Packages.pymediainfo radarr rapid-photo-downloader readarr svp ultrastar-manager ums ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/mi5pjmwqinbkmvrzadplspc9959ixk1a-libmediainfo-24.03 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A libmediainfo https://github.com/r-ryantm/nixpkgs/archive/50ccd82200c1aa07f01b047fc625708cc03aa3ae.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/50ccd82200c1aa07f01b047fc625708cc03aa3ae#libmediainfo ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/mi5pjmwqinbkmvrzadplspc9959ixk1a-libmediainfo-24.03 ls -la /nix/store/mi5pjmwqinbkmvrzadplspc9959ixk1a-libmediainfo-24.03/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package marked as broken and skipped:
  • ultrastar-manager
32 packages built:
  • CuboCore.coreinfo
  • aaxtomp3
  • deepin.dde-file-manager
  • deepin.dde-gsettings-schemas
  • deepin.deepin-camera
  • deepin.deepin-screen-recorder
  • deepin.image-editor
  • deepin.util-dfm
  • filebot
  • kdePackages.kdenlive
  • kdePackages.kdenlive.debug
  • kdePackages.kdenlive.dev
  • libmediainfo
  • libsForQt5.kdenlive
  • lidarr
  • mediaelch
  • mediaelch-qt6
  • mediainfo
  • mediainfo-gui
  • megacmd
  • megasync
  • prowlarr
  • python311Packages.pymediainfo
  • python311Packages.pymediainfo.dist
  • python312Packages.pymediainfo
  • python312Packages.pymediainfo.dist
  • radarr
  • rapid-photo-downloader
  • rapid-photo-downloader.dist
  • readarr
  • svp
  • ums
--- ###### Maintainer pings cc @devhell for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301161 [result] Success updating libmediainfo 24.01 -> 24.03 https://repology.org/project/libmediainfo/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cpp-netlib, using log file: /var/log/nixpkgs-update/cpp-netlib/2024-04-03.log cpp-netlib 0.13.0-final -> 0.13.0 https://repology.org/project/cpp-netlib/versions attrpath: cpp-netlib Checking auto update branch... No auto update branch exists 0.13.0 is not newer than 0.13.0-final according to Nix; versionComparison: -1 [result] Failed to update cpp-netlib 0.13.0-final -> 0.13.0 https://repology.org/project/cpp-netlib/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath php81Packages.psalm, using log file: /var/log/nixpkgs-update/php81Packages.psalm/2024-04-03.log php81Packages.psalm 5.22.2 -> 5.23.1 https://github.com/vimeo/psalm/releases attrpath: php81Packages.psalm Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update php81Packages.psalm 5.22.2 -> 5.23.1 https://github.com/vimeo/psalm/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath freepats, using log file: /var/log/nixpkgs-update/freepats/2024-04-03.log freepats 20060219 -> 20221026 https://repology.org/project/freepats/versions attrpath: freepats Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/32dj73jsphs07ilvb46nnhyzax8llbwx-freepats-20221026.tar.bz2.drv building '/nix/store/32dj73jsphs07ilvb46nnhyzax8llbwx-freepats-20221026.tar.bz2.drv'... trying https://freepats.zenvoid.org/freepats-20221026.tar.bz2 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 880 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download freepats-20221026.tar.bz2 from any mirror error: builder for '/nix/store/32dj73jsphs07ilvb46nnhyzax8llbwx-freepats-20221026.tar.bz2.drv' failed with exit code 1; last 7 log lines: > > trying https://freepats.zenvoid.org/freepats-20221026.tar.bz2 > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 880 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download freepats-20221026.tar.bz2 from any mirror For full logs, run 'nix log /nix/store/32dj73jsphs07ilvb46nnhyzax8llbwx-freepats-20221026.tar.bz2.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'freepats.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/32dj73jsphs07ilvb46nnhyzax8llbwx-freepats-20221026.tar.bz2.drv /nix/store/7c0q56z3xkfzq0k5hbj3ggmvc53hh3cl-freepats-20221026.drv building '/nix/store/32dj73jsphs07ilvb46nnhyzax8llbwx-freepats-20221026.tar.bz2.drv'... trying https://freepats.zenvoid.org/freepats-20221026.tar.bz2 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 880 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download freepats-20221026.tar.bz2 from any mirror error: builder for '/nix/store/32dj73jsphs07ilvb46nnhyzax8llbwx-freepats-20221026.tar.bz2.drv' failed with exit code 1; last 7 log lines: > > trying https://freepats.zenvoid.org/freepats-20221026.tar.bz2 > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 880 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download freepats-20221026.tar.bz2 from any mirror For full logs, run 'nix log /nix/store/32dj73jsphs07ilvb46nnhyzax8llbwx-freepats-20221026.tar.bz2.drv'. error: 1 dependencies of derivation '/nix/store/7c0q56z3xkfzq0k5hbj3ggmvc53hh3cl-freepats-20221026.drv' failed to build [result] Failed to update freepats 20060219 -> 20221026 https://repology.org/project/freepats/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lua51Packages.lua-iconv, using log file: /var/log/nixpkgs-update/lua51Packages.lua-iconv/2024-04-03.log lua51Packages.lua-iconv 7.0.0-4 -> 7.1.0 https://repology.org/project/lua:lua-iconv/versions attrpath: lua51Packages.lua-iconv Packages for lua are currently skipped. https://github.com/NixOS/nixpkgs/pull/37501#issuecomment-375169646 [result] Failed to update lua51Packages.lua-iconv 7.0.0-4 -> 7.1.0 https://repology.org/project/lua:lua-iconv/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.RaggedExperiment, using log file: /var/log/nixpkgs-update/rPackages.RaggedExperiment/2024-04-03.log rPackages.RaggedExperiment 1.26.0 -> 1.27.0 https://repology.org/project/r:raggedexperiment/versions attrpath: rPackages.RaggedExperiment Checking auto update branch... No auto update branch exists Old version 1.26.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.RaggedExperiment 1.26.0 -> 1.27.0 https://repology.org/project/r:raggedexperiment/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.XCIR, using log file: /var/log/nixpkgs-update/rPackages.XCIR/2024-04-03.log rPackages.XCIR 1.7.0 -> 1.12.0 https://repology.org/project/r:xcir/versions attrpath: rPackages.XCIR Checking auto update branch... No auto update branch exists Old version 1.7.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.XCIR 1.7.0 -> 1.12.0 https://repology.org/project/r:xcir/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.tglkmeans, using log file: /var/log/nixpkgs-update/rPackages.tglkmeans/2024-04-03.log rPackages.tglkmeans 0.3.11 -> 0.5.4 https://repology.org/project/r:tglkmeans/versions attrpath: rPackages.tglkmeans Checking auto update branch... No auto update branch exists Old version 0.3.11" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.tglkmeans 0.3.11 -> 0.5.4 https://repology.org/project/r:tglkmeans/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO currently don't know how to update perl [result] Failed to update perl536Packages.NetMQTTSimple 1.28 -> 1.29 https://repology.org/project/perl:net-mqtt-simple/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath fricas, using log file: /var/log/nixpkgs-update/fricas/2024-04-03.log fricas 1.3.9 -> 1.3.10 https://repology.org/project/fricas/versions attrpath: fricas Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/applications/science/math/fricas/default.nix b/pkgs/applications/science/math/fricas/default.nix index 355238ace15c..0830949703a6 100644 --- a/pkgs/applications/science/math/fricas/default.nix +++ b/pkgs/applications/science/math/fricas/default.nix @@ -2,11 +2,11 @@ stdenv.mkDerivation rec { pname = "fricas"; - version = "1.3.9"; + version = "1.3.10"; src = fetchurl { url = "mirror://sourceforge/fricas/fricas/${version}/fricas-${version}-full.tar.bz2"; - sha256 = "sha256-5RPcffM0GN0l6r8IgHJlwdxwwp2y4kIdJ5M3JnGZCzc="; + sha256 = "sha256-/CESrUW6e0WsQjFl8yvVskRiIQeh5OHVa5E2+WdG8qA="; }; buildInputs = [ sbcl libX11 libXpm libICE libSM libXt libXau libXdmcp ]; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A fricas nix build failed. ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)lisp'' ldb> unknown command: ``)quit'' ldb> make[3]: *** [Makefile:605: stamp-fasls3] Error 1 make[3]: Leaving directory '/build/fricas-1.3.10/src/algebra' make[2]: *** [Makefile:586: all-ax] Error 2 make[2]: Leaving directory '/build/fricas-1.3.10/src/algebra' make[1]: *** [Makefile:243: all-algebra] Error 2 make[1]: Leaving directory '/build/fricas-1.3.10/src' make: *** [Makefile:250: all-src] Error 2 [result] Failed to update fricas 1.3.9 -> 1.3.10 https://repology.org/project/fricas/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath nodePackages.eas-cli, using log file: /var/log/nixpkgs-update/nodePackages.eas-cli/2024-04-03.log nodePackages.eas-cli 7.6.0 -> 7.6.2 https://github.com/expo/eas-cli/releases attrpath: nodePackages.eas-cli Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update nodePackages.eas-cli 7.6.0 -> 7.6.2 https://github.com/expo/eas-cli/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath nodePackages_latest.eas-cli, using log file: /var/log/nixpkgs-update/nodePackages_latest.eas-cli/2024-04-03.log nodePackages_latest.eas-cli 7.6.0 -> 7.6.2 https://github.com/expo/eas-cli/releases attrpath: nodePackages_latest.eas-cli Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update nodePackages_latest.eas-cli 7.6.0 -> 7.6.2 https://github.com/expo/eas-cli/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haste-server, using log file: /var/log/nixpkgs-update/haste-server/2024-04-03.log haste-server 2023-03-06 -> 20919c946602b8151157f647e475e30687a43727 https://repology.org/project/haste-server/versions attrpath: haste-server Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] Hashes equal; no update necessary [result] Failed to update haste-server 2023-03-06 -> 20919c946602b8151157f647e475e30687a43727 https://repology.org/project/haste-server/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath qbs, using log file: /var/log/nixpkgs-update/qbs/2024-04-03.log qbs 1.24.1 -> 2.2.2 https://repology.org/project/qbs/versions attrpath: qbs Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/tools/build-managers/qbs/default.nix b/pkgs/development/tools/build-managers/qbs/default.nix index 9d1305f77675..54800fe55cd8 100644 --- a/pkgs/development/tools/build-managers/qbs/default.nix +++ b/pkgs/development/tools/build-managers/qbs/default.nix @@ -3,13 +3,13 @@ stdenv.mkDerivation rec { pname = "qbs"; - version = "1.24.1"; + version = "2.2.2"; src = fetchFromGitHub { owner = "qbs"; repo = "qbs"; rev = "v${version}"; - sha256 = "sha256-nL7UZh29Oecu3RvXYg5xsin2IvPWpApleLH37sEdSAI="; + sha256 = "sha256-JQGr507r0nqoEXqu9s9xIsE0ac7L+0siu8RhmuYktfA="; }; nativeBuildInputs = [ qmake ]; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A qbs nix build failed. got build log for 'qbs' from 'daemon' @nix { "action": "setPhase", "phase": "qmakePrePhase" } Running phase: qmakePrePhase @nix { "action": "setPhase", "phase": "qtPreHook" } Running phase: qtPreHook @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/7vjh0dz43dfxkl3bnb0ks9i4aqrcc9jw-source source root is source @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase @nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" } Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "configurePhase" } Running phase: configurePhase QMAKEPATH=/nix/store/lmfidmz9rca7sygwiq58fd0gbq564vdk-qtbase-5.15.12-dev:/nix/store/9695097ax31z2rwwrs3b9d3m3h5w8k90-qtscript-5.15.16-dev:/nix/store/8fmccgxcaap1fc8k3a0fhw01f9n86yl6-qttools-5.15.12-dev:/nix/store/aqh3a3yfzxr8dw4ksa4pync224vja316-qtdeclarative-5.15.12-dev:/nix/store/cp3qkxqdh7ijhsqrgqbh74ywidswlq57-qtsvg-5.15.12-dev qmake PREFIX=/nix/store/msrbmxkkxzqvmp277rdy1ggyyawd8gp5-qbs-2.2.2 NIX_OUTPUT_OUT=/nix/store/msrbmxkkxzqvmp277rdy1ggyyawd8gp5-qbs-2.2.2 NIX_OUTPUT_DEV=/nix/store/msrbmxkkxzqvmp277rdy1ggyyawd8gp5-qbs-2.2.2 NIX_OUTPUT_BIN=/nix/store/msrbmxkkxzqvmp277rdy1ggyyawd8gp5-qbs-2.2.2 NIX_OUTPUT_DOC=/nix/store/msrbmxkkxzqvmp277rdy1ggyyawd8gp5-qbs-2.2.2/share/doc/qt-5.15.12 NIX_OUTPUT_QML=/nix/store/msrbmxkkxzqvmp277rdy1ggyyawd8gp5-qbs-2.2.2/lib/qt-5.15.12/qml NIX_OUTPUT_PLUGIN=/nix/store/msrbmxkkxzqvmp277rdy1ggyyawd8gp5-qbs-2.2.2/lib/qt-5.15.12/plugins CONFIG+=release CONFIG+=nostrip QBS_INSTALL_PREFIX=$(out) qbs.pro QMAKE_LRELEASE=/nix/store/8fmccgxcaap1fc8k3a0fhw01f9n86yl6-qttools-5.15.12-dev/bin/lrelease Cannot find file: qbs.pro. [result] Failed to update qbs 1.24.1 -> 2.2.2 https://repology.org/project/qbs/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.ProteomicsAnnotationHubData, using log file: /var/log/nixpkgs-update/rPackages.ProteomicsAnnotationHubData/2024-04-03.log rPackages.ProteomicsAnnotationHubData 1.24.0 -> 1.26.0 https://repology.org/project/r:proteomicsannotationhubdata/versions attrpath: rPackages.ProteomicsAnnotationHubData Checking auto update branch... No auto update branch exists Old version 1.24.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.ProteomicsAnnotationHubData 1.24.0 -> 1.26.0 https://repology.org/project/r:proteomicsannotationhubdata/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath unicode-emoji, using log file: /var/log/nixpkgs-update/unicode-emoji/2024-04-03.log unicode-emoji 15.0 -> 15.1 https://repology.org/project/unicode-emoji/versions attrpath: unicode-emoji Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update unicode-emoji 15.0 -> 15.1 https://repology.org/project/unicode-emoji/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.flexiblas, using log file: /var/log/nixpkgs-update/rPackages.flexiblas/2024-04-03.log rPackages.flexiblas 3.3.0 -> 3.4.0 https://repology.org/project/r:flexiblas/versions attrpath: rPackages.flexiblas Checking auto update branch... No auto update branch exists Old version 3.3.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.flexiblas 3.3.0 -> 3.4.0 https://repology.org/project/r:flexiblas/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.collapse, using log file: /var/log/nixpkgs-update/rPackages.collapse/2024-04-03.log rPackages.collapse 2.0.7 -> 2.0.12 https://repology.org/project/r:collapse/versions attrpath: rPackages.collapse Checking auto update branch... No auto update branch exists Old version 2.0.7" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.collapse 2.0.7 -> 2.0.12 https://repology.org/project/r:collapse/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.cccrm, using log file: /var/log/nixpkgs-update/rPackages.cccrm/2024-04-03.log rPackages.cccrm 2.2.0 -> 2.2.1 https://repology.org/project/r:cccrm/versions attrpath: rPackages.cccrm Checking auto update branch... No auto update branch exists Old version 2.2.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.cccrm 2.2.0 -> 2.2.1 https://repology.org/project/r:cccrm/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.psycopg, using log file: /var/log/nixpkgs-update/python311Packages.psycopg/2024-04-03.log python311Packages.psycopg 0 -> 1 attrpath: python311Packages.psycopg Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/85jyz71dhll0ha8qwwf87vgikqqadp02-packages.json.drv building '/nix/store/85jyz71dhll0ha8qwwf87vgikqqadp02-packages.json.drv'... Going to be running update for following packages: - python3.11-psycopg-3.1.17 Press Enter key to continue... Running update for: - python3.11-psycopg-3.1.17: UPDATING ... - python3.11-psycopg-3.1.17: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.psycopg 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath xrootd, using log file: /var/log/nixpkgs-update/xrootd/2024-04-03.log xrootd 5.6.6 -> 5.6.9 https://repology.org/project/xrootd/versions attrpath: xrootd Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update xrootd 5.6.6 -> 5.6.9 https://repology.org/project/xrootd/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.opensfm, using log file: /var/log/nixpkgs-update/python311Packages.opensfm/2024-04-03.log python311Packages.opensfm 0 -> 1 attrpath: python311Packages.opensfm Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/jah4mdpfr0ibcgx2v6qrbd2141ikq69x-packages.json.drv building '/nix/store/jah4mdpfr0ibcgx2v6qrbd2141ikq69x-packages.json.drv'... Going to be running update for following packages: - python3.11-opensfm-unstable-2023-12-09 Press Enter key to continue... Running update for: - python3.11-opensfm-unstable-2023-12-09: UPDATING ... - python3.11-opensfm-unstable-2023-12-09: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.opensfm 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pantheon.switchboard-plug-keyboard, using log file: /var/log/nixpkgs-update/pantheon.switchboard-plug-keyboard/2024-04-03.log pantheon.switchboard-plug-keyboard 0 -> 1 attrpath: pantheon.switchboard-plug-keyboard Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/3pyfz5mfwbrfss2apayf4ds8bn9andi4-packages.json.drv building '/nix/store/3pyfz5mfwbrfss2apayf4ds8bn9andi4-packages.json.drv'... Going to be running update for following packages: - switchboard-plug-keyboard-3.2.1 Press Enter key to continue... Running update for: - switchboard-plug-keyboard-3.2.1: UPDATING ... - switchboard-plug-keyboard-3.2.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update pantheon.switchboard-plug-keyboard 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.phik, using log file: /var/log/nixpkgs-update/python311Packages.phik/2024-04-03.log python311Packages.phik 0 -> 1 attrpath: python311Packages.phik Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/yvpiqkrqqwrbhzs0d5p02j634ayghw8b-packages.json.drv building '/nix/store/yvpiqkrqqwrbhzs0d5p02j634ayghw8b-packages.json.drv'... Going to be running update for following packages: - python3.11-phik-0.12.4 Press Enter key to continue... Running update for: - python3.11-phik-0.12.4: UPDATING ... - python3.11-phik-0.12.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.phik 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.csvw, using log file: /var/log/nixpkgs-update/python311Packages.csvw/2024-04-03.log python311Packages.csvw 0 -> 1 attrpath: python311Packages.csvw Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/x4y6z4b7f7l2qdjln33si5vallnns5bv-packages.json.drv building '/nix/store/x4y6z4b7f7l2qdjln33si5vallnns5bv-packages.json.drv'... Going to be running update for following packages: - python3.11-csvw-1.11.0 Press Enter key to continue... Running update for: - python3.11-csvw-1.11.0: UPDATING ... - python3.11-csvw-1.11.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.csvw 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.crownstone-cloud, using log file: /var/log/nixpkgs-update/python311Packages.crownstone-cloud/2024-04-03.log python311Packages.crownstone-cloud 0 -> 1 attrpath: python311Packages.crownstone-cloud Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/7a856y6skxq95vhaqpby0pfy674v3sqk-packages.json.drv building '/nix/store/7a856y6skxq95vhaqpby0pfy674v3sqk-packages.json.drv'... Going to be running update for following packages: - python3.11-crownstone-cloud-1.4.9 Press Enter key to continue... Running update for: - python3.11-crownstone-cloud-1.4.9: UPDATING ... - python3.11-crownstone-cloud-1.4.9: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.crownstone-cloud 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.libversion, using log file: /var/log/nixpkgs-update/python311Packages.libversion/2024-04-03.log python311Packages.libversion 0 -> 1 attrpath: python311Packages.libversion Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/8dz52sc26snq62w015iymlvyksbr8axf-packages.json.drv building '/nix/store/8dz52sc26snq62w015iymlvyksbr8axf-packages.json.drv'... Going to be running update for following packages: - python3.11-libversion-1.2.4 Press Enter key to continue... Running update for: - python3.11-libversion-1.2.4: UPDATING ... - python3.11-libversion-1.2.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.libversion 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath saw-tools, using log file: /var/log/nixpkgs-update/saw-tools/2024-04-03.log saw-tools 0.1.1-20150731 -> 1.1 https://github.com/GaloisInc/saw-script/releases attrpath: saw-tools Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update saw-tools 0.1.1-20150731 -> 1.1 https://github.com/GaloisInc/saw-script/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath sword, using log file: /var/log/nixpkgs-update/sword/2024-04-03.log sword 1.8.1 -> 1.9.0 https://repology.org/project/sword/versions attrpath: sword Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/h1d7vzkdfqjqfaf782agvqgnmh9anvx7-sword-1.9.0.tar.gz.drv building '/nix/store/h1d7vzkdfqjqfaf782agvqgnmh9anvx7-sword-1.9.0.tar.gz.drv'... trying https://www.crosswire.org/ftpmirror/pub/sword/source/v1.8/sword-1.9.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 196 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download sword-1.9.0.tar.gz from any mirror error: builder for '/nix/store/h1d7vzkdfqjqfaf782agvqgnmh9anvx7-sword-1.9.0.tar.gz.drv' failed with exit code 1; last 7 log lines: > > trying https://www.crosswire.org/ftpmirror/pub/sword/source/v1.8/sword-1.9.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 196 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download sword-1.9.0.tar.gz from any mirror For full logs, run 'nix log /nix/store/h1d7vzkdfqjqfaf782agvqgnmh9anvx7-sword-1.9.0.tar.gz.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'sword.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/h1d7vzkdfqjqfaf782agvqgnmh9anvx7-sword-1.9.0.tar.gz.drv /nix/store/dvnnrp885hwbv7h4x5jzymvvq3c5fkf9-sword-1.9.0.drv this path will be fetched (0.90 MiB download, 4.70 MiB unpacked): /nix/store/5alc52iicvybqj0hyx4lvj7d73j9604a-clucene-core-2.3.3.4 copying path '/nix/store/5alc52iicvybqj0hyx4lvj7d73j9604a-clucene-core-2.3.3.4' from 'https://cache.nixos.org'... building '/nix/store/h1d7vzkdfqjqfaf782agvqgnmh9anvx7-sword-1.9.0.tar.gz.drv'... trying https://www.crosswire.org/ftpmirror/pub/sword/source/v1.8/sword-1.9.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 196 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download sword-1.9.0.tar.gz from any mirror error: builder for '/nix/store/h1d7vzkdfqjqfaf782agvqgnmh9anvx7-sword-1.9.0.tar.gz.drv' failed with exit code 1; last 7 log lines: > > trying https://www.crosswire.org/ftpmirror/pub/sword/source/v1.8/sword-1.9.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 196 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download sword-1.9.0.tar.gz from any mirror For full logs, run 'nix log /nix/store/h1d7vzkdfqjqfaf782agvqgnmh9anvx7-sword-1.9.0.tar.gz.drv'. error: 1 dependencies of derivation '/nix/store/dvnnrp885hwbv7h4x5jzymvvq3c5fkf9-sword-1.9.0.drv' failed to build [result] Failed to update sword 1.8.1 -> 1.9.0 https://repology.org/project/sword/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.lcov-cobertura, using log file: /var/log/nixpkgs-update/python311Packages.lcov-cobertura/2024-04-03.log python311Packages.lcov-cobertura 0 -> 1 attrpath: python311Packages.lcov-cobertura Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/ykq6hapjbmh76j154vqg9k3j8qkxvgpg-packages.json.drv building '/nix/store/ykq6hapjbmh76j154vqg9k3j8qkxvgpg-packages.json.drv'... Going to be running update for following packages: - python3.11-lcov-cobertura-2.0.2 Press Enter key to continue... Running update for: - python3.11-lcov-cobertura-2.0.2: UPDATING ... - python3.11-lcov-cobertura-2.0.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.lcov-cobertura 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.odp-amsterdam, using log file: /var/log/nixpkgs-update/python311Packages.odp-amsterdam/2024-04-03.log python311Packages.odp-amsterdam 0 -> 1 attrpath: python311Packages.odp-amsterdam Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/vl8ibzzyvd8nagrqncm9855a5jlmarf3-packages.json.drv building '/nix/store/vl8ibzzyvd8nagrqncm9855a5jlmarf3-packages.json.drv'... Going to be running update for following packages: - python3.11-odp-amsterdam-6.0.1 Press Enter key to continue... Running update for: - python3.11-odp-amsterdam-6.0.1: UPDATING ... - python3.11-odp-amsterdam-6.0.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.odp-amsterdam 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.msgraph-core, using log file: /var/log/nixpkgs-update/python311Packages.msgraph-core/2024-04-03.log python311Packages.msgraph-core 0 -> 1 attrpath: python311Packages.msgraph-core Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/vfcai03v4jmpb8g7wyb4j4w4nz0rbqwm-packages.json.drv building '/nix/store/vfcai03v4jmpb8g7wyb4j4w4nz0rbqwm-packages.json.drv'... Going to be running update for following packages: - python3.11-msgraph-core-1.0.0 Press Enter key to continue... Running update for: - python3.11-msgraph-core-1.0.0: UPDATING ... - python3.11-msgraph-core-1.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.msgraph-core 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath neovim-remote, using log file: /var/log/nixpkgs-update/neovim-remote/2024-04-03.log neovim-remote 0 -> 1 attrpath: neovim-remote Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] cannot link '/nix/store/.links/0q9n0cb7139bci4hh048izzvgh3r3chrdldvmpw7dmqbvb5rk5wy' to '/nix/store/sn1z4dmrw3pwfgpv2l1vqp68qgndhh16-packages.json.drv': No space left on device this derivation will be built: /nix/store/sn1z4dmrw3pwfgpv2l1vqp68qgndhh16-packages.json.drv building '/nix/store/sn1z4dmrw3pwfgpv2l1vqp68qgndhh16-packages.json.drv'... Going to be running update for following packages: - neovim-remote-2.5.1 Press Enter key to continue... Running update for: - neovim-remote-2.5.1: UPDATING ... - neovim-remote-2.5.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update neovim-remote 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.gtts, using log file: /var/log/nixpkgs-update/python311Packages.gtts/2024-04-03.log python311Packages.gtts 0 -> 1 attrpath: python311Packages.gtts Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/70izdkg6a548cxrx52mq4i46vfpix659-packages.json.drv building '/nix/store/70izdkg6a548cxrx52mq4i46vfpix659-packages.json.drv'... Going to be running update for following packages: - python3.11-gtts-2.5.1 Press Enter key to continue... Running update for: - python3.11-gtts-2.5.1: UPDATING ... - python3.11-gtts-2.5.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.gtts 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.nbsphinx, using log file: /var/log/nixpkgs-update/python311Packages.nbsphinx/2024-04-03.log python311Packages.nbsphinx 0 -> 1 attrpath: python311Packages.nbsphinx Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/yxpi59w88xpckfxzapcxr5wrrz7f83hc-packages.json.drv building '/nix/store/yxpi59w88xpckfxzapcxr5wrrz7f83hc-packages.json.drv'... Going to be running update for following packages: - python3.11-nbsphinx-0.9.3 Press Enter key to continue... Running update for: - python3.11-nbsphinx-0.9.3: UPDATING ... - python3.11-nbsphinx-0.9.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.nbsphinx 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.cfscrape, using log file: /var/log/nixpkgs-update/python311Packages.cfscrape/2024-04-03.log python311Packages.cfscrape 0 -> 1 attrpath: python311Packages.cfscrape Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/xibgcsy5cm3z15m82zvyg27a4z7831h2-packages.json.drv building '/nix/store/xibgcsy5cm3z15m82zvyg27a4z7831h2-packages.json.drv'... Going to be running update for following packages: - python3.11-cfscrape-2.1.1 Press Enter key to continue... Running update for: - python3.11-cfscrape-2.1.1: UPDATING ... - python3.11-cfscrape-2.1.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.cfscrape 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath eddy, using log file: /var/log/nixpkgs-update/eddy/2024-04-03.log eddy 0 -> 1 attrpath: eddy Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/xwpxw7fhvm56nv3r3w0qqwscgc3pj1wr-packages.json.drv building '/nix/store/xwpxw7fhvm56nv3r3w0qqwscgc3pj1wr-packages.json.drv'... Going to be running update for following packages: - eddy-1.2.1 Press Enter key to continue... Running update for: - eddy-1.2.1: UPDATING ... - eddy-1.2.1: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/applications/graphics/eddy/default.nix b/pkgs/applications/graphics/eddy/default.nix index 6dac49fc5d15..ddeef688e5c0 100644 --- a/pkgs/applications/graphics/eddy/default.nix +++ b/pkgs/applications/graphics/eddy/default.nix @@ -8,13 +8,13 @@ python3Packages.buildPythonApplication rec { pname = "eddy"; - version = "1.2.1"; + version = "3.5.2"; src = fetchFromGitHub { owner = "obdasystems"; repo = pname; - rev = "v${version}"; - sha256 = "12j77bbva5py9bd57c80cmjvf8vll40h19n81h16lvv2r2r7jynh"; + rev = "refs/tags/v${version}"; + sha256 = "sha256-9Ftix8ATTW8M3neBm5la8uBpqUk2b0Bjl62MWC2UFAk="; }; propagatedBuildInputs = [ An auto update branch exists with message `eddy: 1.2.1 -> 3.5.2`. New version is 3.5.2. An auto update branch exists with an equal or greater version [result] Failed to update eddy 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath zerobin, using log file: /var/log/nixpkgs-update/zerobin/2024-04-03.log zerobin 0 -> 1 attrpath: zerobin Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] cannot link '/nix/store/.links/0wipf0phq3idw4gpj1p7v69ajn3ajdv4150prhm3zbqlzanqi3hg' to '/nix/store/gfpfxk2dx35xfgwcfjmq6zdd0hbmj2cz-nixpkgs-update-script.drv': No space left on device this derivation will be built: /nix/store/fpks1skx6g9vbgph6dcj5i4j6sbmks5l-packages.json.drv building '/nix/store/fpks1skx6g9vbgph6dcj5i4j6sbmks5l-packages.json.drv'... Going to be running update for following packages: - zerobin-1.0.5 Press Enter key to continue... Running update for: - zerobin-1.0.5: UPDATING ... - zerobin-1.0.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update zerobin 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath chrome-token-signing, using log file: /var/log/nixpkgs-update/chrome-token-signing/2024-04-03.log chrome-token-signing 1.1.5 -> 1.1.5.547 https://repology.org/project/chrome-token-signing/versions attrpath: chrome-token-signing Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/b4yzpx6xxas6aprxgsdah5324n7dmj25-source.drv building '/nix/store/b4yzpx6xxas6aprxgsdah5324n7dmj25-source.drv'... trying https://github.com/open-eid/chrome-token-signing/archive/v1.1.5.547.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/b4yzpx6xxas6aprxgsdah5324n7dmj25-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/open-eid/chrome-token-signing/archive/v1.1.5.547.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/b4yzpx6xxas6aprxgsdah5324n7dmj25-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'chrome-token-signing.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/b4yzpx6xxas6aprxgsdah5324n7dmj25-source.drv /nix/store/xq999naygry3aljfxn7k0i07l3vnb3gg-chrome-token-signing-1.1.5.547.drv these 3 paths will be fetched (1.29 MiB download, 4.65 MiB unpacked): /nix/store/j5mf1a066d76rx3s0zafqjg01z05m5vz-opensc-0.25.0 /nix/store/lzw3sri7f2kzs3qclfxx2xnh6l9rs6c3-pcsclite-2.0.3 /nix/store/g7y8pbzn75lvpd4llwbvwvfh8kkv8y04-pcsclite-2.0.3-dev copying path '/nix/store/j5mf1a066d76rx3s0zafqjg01z05m5vz-opensc-0.25.0' from 'https://cache.nixos.org'... copying path '/nix/store/lzw3sri7f2kzs3qclfxx2xnh6l9rs6c3-pcsclite-2.0.3' from 'https://cache.nixos.org'... building '/nix/store/b4yzpx6xxas6aprxgsdah5324n7dmj25-source.drv'... copying path '/nix/store/g7y8pbzn75lvpd4llwbvwvfh8kkv8y04-pcsclite-2.0.3-dev' from 'https://cache.nixos.org'... trying https://github.com/open-eid/chrome-token-signing/archive/v1.1.5.547.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/b4yzpx6xxas6aprxgsdah5324n7dmj25-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/open-eid/chrome-token-signing/archive/v1.1.5.547.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/b4yzpx6xxas6aprxgsdah5324n7dmj25-source.drv'. error: 1 dependencies of derivation '/nix/store/xq999naygry3aljfxn7k0i07l3vnb3gg-chrome-token-signing-1.1.5.547.drv' failed to build [result] Failed to update chrome-token-signing 1.1.5 -> 1.1.5.547 https://repology.org/project/chrome-token-signing/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.dateutil, using log file: /var/log/nixpkgs-update/python311Packages.dateutil/2024-04-03.log python311Packages.dateutil 0 -> 1 attrpath: python311Packages.dateutil Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/ifc3ijsxrb3w0b9biaac8d549zr700p5-packages.json.drv building '/nix/store/ifc3ijsxrb3w0b9biaac8d549zr700p5-packages.json.drv'... Going to be running update for following packages: - python3.11-python-dateutil-2.9.0.post0 Press Enter key to continue... Running update for: - python3.11-python-dateutil-2.9.0.post0: UPDATING ... - python3.11-python-dateutil-2.9.0.post0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.dateutil 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath behdad-fonts, using log file: /var/log/nixpkgs-update/behdad-fonts/2024-04-03.log behdad-fonts 0.0.3 -> 1.0.0 https://github.com/font-store/BehdadFont/releases attrpath: behdad-fonts Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/2xszvzfbgfs9pg7szv3yx658h2hc5fbn-source.drv building '/nix/store/2xszvzfbgfs9pg7szv3yx658h2hc5fbn-source.drv'... trying https://github.com/font-store/BehdadFont/archive/v1.0.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/2xszvzfbgfs9pg7szv3yx658h2hc5fbn-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/font-store/BehdadFont/archive/v1.0.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/2xszvzfbgfs9pg7szv3yx658h2hc5fbn-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'behdad-fonts.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/2xszvzfbgfs9pg7szv3yx658h2hc5fbn-source.drv /nix/store/0vlybnnm95di29h9jcqhlyy65ycv4qb5-behdad-fonts-1.0.0.drv building '/nix/store/2xszvzfbgfs9pg7szv3yx658h2hc5fbn-source.drv'... trying https://github.com/font-store/BehdadFont/archive/v1.0.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/2xszvzfbgfs9pg7szv3yx658h2hc5fbn-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/font-store/BehdadFont/archive/v1.0.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/2xszvzfbgfs9pg7szv3yx658h2hc5fbn-source.drv'. error: 1 dependencies of derivation '/nix/store/0vlybnnm95di29h9jcqhlyy65ycv4qb5-behdad-fonts-1.0.0.drv' failed to build [result] Failed to update behdad-fonts 0.0.3 -> 1.0.0 https://github.com/font-store/BehdadFont/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pycares, using log file: /var/log/nixpkgs-update/python311Packages.pycares/2024-04-03.log python311Packages.pycares 0 -> 1 attrpath: python311Packages.pycares Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/mgq3jfvs9z544p6nrwzc017ahksd642b-packages.json.drv building '/nix/store/mgq3jfvs9z544p6nrwzc017ahksd642b-packages.json.drv'... Going to be running update for following packages: - python3.11-pycares-4.4.0 Press Enter key to continue... Running update for: - python3.11-pycares-4.4.0: UPDATING ... - python3.11-pycares-4.4.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pycares 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath logmap, using log file: /var/log/nixpkgs-update/logmap/2024-04-03.log logmap 0 -> 1 attrpath: logmap Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/lsjyh4a6504il21b72l1pxn94ypw8vcw-packages.json.drv building '/nix/store/lsjyh4a6504il21b72l1pxn94ypw8vcw-packages.json.drv'... Going to be running update for following packages: - logmap-unstable-2021-12-15 Press Enter key to continue... Running update for: - logmap-unstable-2021-12-15: UPDATING ... - logmap-unstable-2021-12-15: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update logmap 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath das, using log file: /var/log/nixpkgs-update/das/2024-04-03.log das 0 -> 1 attrpath: das Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/pgfg55s412jjg9vy1b7jqjgxk952q5y9-packages.json.drv building '/nix/store/pgfg55s412jjg9vy1b7jqjgxk952q5y9-packages.json.drv'... Going to be running update for following packages: - das-1.0.3 Press Enter key to continue... Running update for: - das-1.0.3: UPDATING ... - das-1.0.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update das 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath twitch-chat-downloader, using log file: /var/log/nixpkgs-update/twitch-chat-downloader/2024-04-03.log twitch-chat-downloader 0 -> 1 attrpath: twitch-chat-downloader Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/rll4v62rq5cixnldngiys2r9n0139zhh-packages.json.drv building '/nix/store/rll4v62rq5cixnldngiys2r9n0139zhh-packages.json.drv'... Going to be running update for following packages: - twitch-chat-downloader-2.5.3 Press Enter key to continue... Running update for: - twitch-chat-downloader-2.5.3: UPDATING ... - twitch-chat-downloader-2.5.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update twitch-chat-downloader 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath ccextractor, using log file: /var/log/nixpkgs-update/ccextractor/2024-04-03.log ccextractor 0.93 -> 0.94 https://repology.org/project/ccextractor/versions attrpath: ccextractor Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/applications/video/ccextractor/default.nix b/pkgs/applications/video/ccextractor/default.nix index 3814f921fa24..78bccbb73b50 100644 --- a/pkgs/applications/video/ccextractor/default.nix +++ b/pkgs/applications/video/ccextractor/default.nix @@ -14,13 +14,13 @@ stdenv.mkDerivation rec { pname = "ccextractor"; - version = "0.93"; + version = "0.94"; src = fetchFromGitHub { owner = "CCExtractor"; repo = pname; rev = "v${version}"; - sha256 = "sha256-usVAKBkdd8uz9cD5eLd0hnwGonOJLscRdc+iWDlNXVc="; + sha256 = "sha256-j2p3Hw3w95F1A8PlKsj8jkAENYOcZA+2vWnu+WknM8M="; }; postPatch = '' [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A ccextractor nix build failed. -- Detecting CXX compiler ABI info - done -- Check for working CXX compiler: /nix/store/ac1hb5dc2z4biwgy8mjrhlifffkkrvdq-gcc-wrapper-13.2.0/bin/g++ - skipped -- Detecting CXX compile features -- Detecting CXX compile features - done -- Commit : Unknown -- Compilation Date: 1980-01-01 -- Found PkgConfig: /nix/store/fyxva0kkcmaigwk4218l0zdy8z3s9sj3-pkg-config-wrapper-0.29.2/bin/pkg-config (found version "0.29.2") -- Checking for module 'tesseract' -- Found tesseract, version 4.1.3 -- Checking for module 'lept' -- Found lept, version 1.84.1 -- Checking for module 'libavformat' -- Found libavformat, version 58.76.100 -- Checking for module 'libavutil' -- Found libavutil, version 56.70.100 -- Checking for module 'libavcodec' -- Found libavcodec, version 58.134.100 -- Checking for module 'libswscale' -- Found libswscale, version 5.9.100 CMake Error at rust/CMakeLists.txt:13 (string): string sub-command REGEX, mode MATCH needs at least 5 arguments total to command.  -- Detected rustc version CMake Error at rust/CMakeLists.txt:18 (message): Minimum supported rust version(MSRV) is 1.54.0, please upgrade rust  -- Configuring incomplete, errors occurred! [result] Failed to update ccextractor 0.93 -> 0.94 https://repology.org/project/ccextractor/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyqwikswitch, using log file: /var/log/nixpkgs-update/python311Packages.pyqwikswitch/2024-04-03.log python311Packages.pyqwikswitch 0 -> 1 attrpath: python311Packages.pyqwikswitch Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/fvl4jdvnsz19fllljipaa5z7an8w5v5r-packages.json.drv building '/nix/store/fvl4jdvnsz19fllljipaa5z7an8w5v5r-packages.json.drv'... Going to be running update for following packages: - python3.11-pyqwikswitch-0.94 Press Enter key to continue... Running update for: - python3.11-pyqwikswitch-0.94: UPDATING ... - python3.11-pyqwikswitch-0.94: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyqwikswitch 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.py-desmume, using log file: /var/log/nixpkgs-update/python311Packages.py-desmume/2024-04-03.log python311Packages.py-desmume 0 -> 1 attrpath: python311Packages.py-desmume Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Failed with exit code 1 this derivation will be built: /nix/store/70bdida7nyylql8cz6yv7y3dqipf32ii-packages.json.drv building '/nix/store/70bdida7nyylql8cz6yv7y3dqipf32ii-packages.json.drv'... Going to be running update for following packages: - python3.11-py-desmume-0.0.6 Press Enter key to continue... Running update for: - python3.11-py-desmume-0.0.6: UPDATING ... - python3.11-py-desmume-0.0.6: ERROR --- SHOWING ERROR LOG FOR python3.11-py-desmume-0.0.6 ---------------------- INFO:root:Updating packages... Traceback (most recent call last): File "/nix/store/afx9mzh2bsnlsk5frb0a3nk3y2h9s2aj-update-python-libraries", line 600, in main() File "/nix/store/afx9mzh2bsnlsk5frb0a3nk3y2h9s2aj-update-python-libraries", line 579, in main results = list(filter(bool, p.map(lambda pkg: _update(pkg, target), packages))) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/concurrent/futures/_base.py", line 619, in result_iterator yield _result_or_cancel(fs.pop()) ^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/concurrent/futures/_base.py", line 317, in _result_or_cancel return fut.result(timeout) ^^^^^^^^^^^^^^^^^^^ File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/concurrent/futures/_base.py", line 456, in result return self.__get_result() ^^^^^^^^^^^^^^^^^^^ File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/concurrent/futures/_base.py", line 401, in __get_result raise self._exception File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/concurrent/futures/thread.py", line 58, in run result = self.fn(*self.args, **self.kwargs) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/afx9mzh2bsnlsk5frb0a3nk3y2h9s2aj-update-python-libraries", line 579, in results = list(filter(bool, p.map(lambda pkg: _update(pkg, target), packages))) ^^^^^^^^^^^^^^^^^^^^ File "/nix/store/afx9mzh2bsnlsk5frb0a3nk3y2h9s2aj-update-python-libraries", line 523, in _update return _update_package(path, target) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/afx9mzh2bsnlsk5frb0a3nk3y2h9s2aj-update-python-libraries", line 434, in _update_package new_version, new_sha256, prefix = FETCHERS[fetcher]( ^^^^^^^^^^^^^^^^^^ File "/nix/store/afx9mzh2bsnlsk5frb0a3nk3y2h9s2aj-update-python-libraries", line 298, in _get_latest_version_github response = subprocess.check_output(cmd) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/subprocess.py", line 466, in check_output return run(*popenargs, stdout=PIPE, timeout=timeout, check=True, ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/subprocess.py", line 548, in run with Popen(*popenargs, **kwargs) as process: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/subprocess.py", line 1026, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/nix/store/lcpwqmx0m7zclwp298kv06l55k6xz470-python3-3.11.8-env/lib/python3.11/subprocess.py", line 1953, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) FileNotFoundError: [Errno 2] No such file or directory: 'nix-prefetch-git' --- SHOWING ERROR LOG FOR python3.11-py-desmume-0.0.6 ---------------------- The update script for python3.11-py-desmume-0.0.6 failed with exit code 1 [result] Failed to update python311Packages.py-desmume 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath swaglyrics, using log file: /var/log/nixpkgs-update/swaglyrics/2024-04-03.log swaglyrics 0 -> 1 attrpath: swaglyrics Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/myj7vb2ngzg666rhd6bigz1a1nhd12pg-packages.json.drv building '/nix/store/myj7vb2ngzg666rhd6bigz1a1nhd12pg-packages.json.drv'... Going to be running update for following packages: - swaglyrics-unstable-2021-06-17 Press Enter key to continue... Running update for: - swaglyrics-unstable-2021-06-17: UPDATING ... - swaglyrics-unstable-2021-06-17: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update swaglyrics 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.srt, using log file: /var/log/nixpkgs-update/python311Packages.srt/2024-04-03.log python311Packages.srt 0 -> 1 attrpath: python311Packages.srt Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/p82rp11ps22qyj07lncjq3nniva8i221-packages.json.drv building '/nix/store/p82rp11ps22qyj07lncjq3nniva8i221-packages.json.drv'... Going to be running update for following packages: - python3.11-srt-3.5.3 Press Enter key to continue... Running update for: - python3.11-srt-3.5.3: UPDATING ... - python3.11-srt-3.5.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.srt 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyinotify, using log file: /var/log/nixpkgs-update/python311Packages.pyinotify/2024-04-03.log python311Packages.pyinotify 0 -> 1 attrpath: python311Packages.pyinotify Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/prv7sr3bxq5saxifyk2ywaz6a49nfgcx-packages.json.drv building '/nix/store/prv7sr3bxq5saxifyk2ywaz6a49nfgcx-packages.json.drv'... Going to be running update for following packages: - python3.11-pyinotify-0.9.6 Press Enter key to continue... Running update for: - python3.11-pyinotify-0.9.6: UPDATING ... - python3.11-pyinotify-0.9.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyinotify 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.x11-hash, using log file: /var/log/nixpkgs-update/python311Packages.x11-hash/2024-04-03.log python311Packages.x11-hash 0 -> 1 attrpath: python311Packages.x11-hash Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/z92b5wf1sfc96ilhladldxjmg33mxxvg-packages.json.drv building '/nix/store/z92b5wf1sfc96ilhladldxjmg33mxxvg-packages.json.drv'... Going to be running update for following packages: - python3.11-x11-hash-1.4 Press Enter key to continue... Running update for: - python3.11-x11-hash-1.4: UPDATING ... - python3.11-x11-hash-1.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.x11-hash 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.apispec-webframeworks, using log file: /var/log/nixpkgs-update/python311Packages.apispec-webframeworks/2024-04-03.log python311Packages.apispec-webframeworks 0 -> 1 attrpath: python311Packages.apispec-webframeworks Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/5xxxr240zv27cab819z6g0a75ipcbg8r-packages.json.drv building '/nix/store/5xxxr240zv27cab819z6g0a75ipcbg8r-packages.json.drv'... Going to be running update for following packages: - python3.11-apispec-webframeworks-1.1.0 Press Enter key to continue... Running update for: - python3.11-apispec-webframeworks-1.1.0: UPDATING ... - python3.11-apispec-webframeworks-1.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.apispec-webframeworks 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.autofaiss, using log file: /var/log/nixpkgs-update/python311Packages.autofaiss/2024-04-03.log python311Packages.autofaiss 0 -> 1 attrpath: python311Packages.autofaiss Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/r6ss7azs24wlb5spfdkm2x6a4rn0bld6-packages.json.drv building '/nix/store/r6ss7azs24wlb5spfdkm2x6a4rn0bld6-packages.json.drv'... Going to be running update for following packages: - python3.11-autofaiss-2.17.0 Press Enter key to continue... Running update for: - python3.11-autofaiss-2.17.0: UPDATING ... - python3.11-autofaiss-2.17.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.autofaiss 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath swift, using log file: /var/log/nixpkgs-update/swift/2024-04-03.log swift 5.8 -> 5.10-RELEASE https://github.com/apple/swift/releases attrpath: swift Checking auto update branch... No auto update branch exists There might already be an open PR for this update: - mesonlsp: init at 4.1.3 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/269042" [result] Failed to update swift 5.8 -> 5.10-RELEASE https://github.com/apple/swift/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.google-pasta, using log file: /var/log/nixpkgs-update/python311Packages.google-pasta/2024-04-03.log python311Packages.google-pasta 0 -> 1 attrpath: python311Packages.google-pasta Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/vn1jn6vybdqnaf5hb3f9mkm9357m0blh-packages.json.drv building '/nix/store/vn1jn6vybdqnaf5hb3f9mkm9357m0blh-packages.json.drv'... Going to be running update for following packages: - python3.11-google-pasta-0.2.0 Press Enter key to continue... Running update for: - python3.11-google-pasta-0.2.0: UPDATING ... - python3.11-google-pasta-0.2.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.google-pasta 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.hypercorn, using log file: /var/log/nixpkgs-update/python311Packages.hypercorn/2024-04-03.log python311Packages.hypercorn 0 -> 1 attrpath: python311Packages.hypercorn Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/k2kvv2pj7kh55ak4rr9mjlvqsgsdghdk-packages.json.drv building '/nix/store/k2kvv2pj7kh55ak4rr9mjlvqsgsdghdk-packages.json.drv'... Going to be running update for following packages: - python3.11-hypercorn-0.14.3 Press Enter key to continue... Running update for: - python3.11-hypercorn-0.14.3: UPDATING ... - python3.11-hypercorn-0.14.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.hypercorn 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath _9pfs, using log file: /var/log/nixpkgs-update/_9pfs/2024-04-03.log _9pfs 0 -> 1 attrpath: _9pfs Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/044v90km2xmnhp38v39wggpg55gn75l3-packages.json.drv building '/nix/store/044v90km2xmnhp38v39wggpg55gn75l3-packages.json.drv'... Going to be running update for following packages: - 9pfs-0.3 Press Enter key to continue... Running update for: - 9pfs-0.3: UPDATING ... - 9pfs-0.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update _9pfs 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gnomeExtensions.hotel-manager, using log file: /var/log/nixpkgs-update/gnomeExtensions.hotel-manager/2024-04-03.log gnomeExtensions.hotel-manager 20 -> 22 https://repology.org/project/gnome:hotel-manager/versions attrpath: gnomeExtensions.hotel-manager Checking auto update branch... No auto update branch exists Old version 20" not present in master derivation file with contents: { pkgs, lib, stdenv, fetchzip, nixosTests }: let buildGnomeExtension = { # Every gnome extension has a UUID. It's the name of the extension folder once unpacked # and can always be found in the metadata.json of every extension. uuid, name, pname, description, # extensions.gnome.org extension URL link, # Extension version numbers are integers version, sha256, # Hex-encoded string of JSON bytes metadata, }: stdenv.mkDerivation { pname = "gnome-shell-extension-${pname}"; version = builtins.toString version; src = fetchzip { url = "https://extensions.gnome.org/extension-data/${ builtins.replaceStrings [ "@" ] [ "" ] uuid }.v${builtins.toString version}.shell-extension.zip"; inherit sha256; stripRoot = false; # The download URL may change content over time. This is because the # metadata.json is automatically generated, and parts of it can be changed # without making a new release. We simply substitute the possibly changed fields # with their content from when we last updated, and thus get a deterministic output # hash. postFetch = '' echo "${metadata}" | base64 --decode > $out/metadata.json ''; }; nativeBuildInputs = with pkgs; [ buildPackages.glib ]; buildPhase = '' runHook preBuild if [ -d schemas ]; then glib-compile-schemas --strict schemas fi runHook postBuild ''; installPhase = '' runHook preInstall mkdir -p $out/share/gnome-shell/extensions/ cp -r -T . $out/share/gnome-shell/extensions/${uuid} runHook postInstall ''; meta = { description = builtins.head (lib.splitString "\n" description); longDescription = description; homepage = link; license = lib.licenses.gpl2Plus; # https://wiki.gnome.org/Projects/GnomeShell/Extensions/Review#Licensing maintainers = with lib.maintainers; [ piegames ]; }; passthru = { extensionPortalSlug = pname; # Store the extension's UUID, because we might need it at some places extensionUuid = uuid; tests = { gnome-extensions = nixosTests.gnome-extensions; }; }; }; in lib.makeOverridable buildGnomeExtension [result] Failed to update gnomeExtensions.hotel-manager 20 -> 22 https://repology.org/project/gnome:hotel-manager/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath terraform-providers.nomad, using log file: /var/log/nixpkgs-update/terraform-providers.nomad/2024-04-03.log terraform-providers.nomad 0 -> 1 attrpath: terraform-providers.nomad Checking auto update branch... Derivation file opts-out of auto-updates [result] Failed to update terraform-providers.nomad 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.dockerfile-parse, using log file: /var/log/nixpkgs-update/python311Packages.dockerfile-parse/2024-04-03.log python311Packages.dockerfile-parse 0 -> 1 attrpath: python311Packages.dockerfile-parse Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/xcf5mjcikj9sqjmmfh6mpfmn3xprx76n-packages.json.drv building '/nix/store/xcf5mjcikj9sqjmmfh6mpfmn3xprx76n-packages.json.drv'... Going to be running update for following packages: - python3.11-dockerfile-parse-2.0.1 Press Enter key to continue... Running update for: - python3.11-dockerfile-parse-2.0.1: UPDATING ... - python3.11-dockerfile-parse-2.0.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.dockerfile-parse 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyviz-comms, using log file: /var/log/nixpkgs-update/python311Packages.pyviz-comms/2024-04-03.log python311Packages.pyviz-comms 0 -> 1 attrpath: python311Packages.pyviz-comms Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/l60nk074j8dkalprpyxl9nwvmfjwdc78-packages.json.drv building '/nix/store/l60nk074j8dkalprpyxl9nwvmfjwdc78-packages.json.drv'... Going to be running update for following packages: - python3.11-pyviz_comms-2.2.1 Press Enter key to continue... Running update for: - python3.11-pyviz_comms-2.2.1: UPDATING ... - python3.11-pyviz_comms-2.2.1: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/pyviz-comms/default.nix b/pkgs/development/python-modules/pyviz-comms/default.nix index 4b3678494990..4613afd288f0 100644 --- a/pkgs/development/python-modules/pyviz-comms/default.nix +++ b/pkgs/development/python-modules/pyviz-comms/default.nix @@ -7,11 +7,11 @@ buildPythonPackage rec { pname = "pyviz_comms"; - version = "2.2.1"; + version = "3.0.2"; src = fetchPypi { inherit pname version; - hash = "sha256-omFFuM5D0tk0s8aCbXe5E84QXFKOsuSUyJCz41Jd3zM="; + hash = "sha256-MWffkyZWQWxL1xEgXa1H6Yaj664fMWJY3cJvngFRPvc="; }; propagatedBuildInputs = [ param ]; No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A python311Packages.pyviz-comms nix build failed. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/4718wmk03wr3554kmf09vy80vkdjvq56-python3.11-setuptools-69.1.1/lib/python3.11/site-packages/setuptools/_distutils/core.py", line 159, in setup dist.parse_config_files() File "/nix/store/4718wmk03wr3554kmf09vy80vkdjvq56-python3.11-setuptools-69.1.1/lib/python3.11/site-packages/setuptools/dist.py", line 627, in parse_config_files pyprojecttoml.apply_configuration(self, filename, ignore_option_errors) File "/nix/store/4718wmk03wr3554kmf09vy80vkdjvq56-python3.11-setuptools-69.1.1/lib/python3.11/site-packages/setuptools/config/pyprojecttoml.py", line 67, in apply_configuration config = read_configuration(filepath, True, ignore_option_errors, dist) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/4718wmk03wr3554kmf09vy80vkdjvq56-python3.11-setuptools-69.1.1/lib/python3.11/site-packages/setuptools/config/pyprojecttoml.py", line 132, in read_configuration return expand_configuration(asdict, root_dir, ignore_option_errors, dist) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/4718wmk03wr3554kmf09vy80vkdjvq56-python3.11-setuptools-69.1.1/lib/python3.11/site-packages/setuptools/config/pyprojecttoml.py", line 157, in expand_configuration return _ConfigExpander(config, root_dir, ignore_option_errors, dist).expand() ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/4718wmk03wr3554kmf09vy80vkdjvq56-python3.11-setuptools-69.1.1/lib/python3.11/site-packages/setuptools/config/pyprojecttoml.py", line 205, in expand self._expand_all_dynamic(dist, package_dir) File "/nix/store/4718wmk03wr3554kmf09vy80vkdjvq56-python3.11-setuptools-69.1.1/lib/python3.11/site-packages/setuptools/config/pyprojecttoml.py", line 243, in _expand_all_dynamic obtained_dynamic = { ^ File "/nix/store/4718wmk03wr3554kmf09vy80vkdjvq56-python3.11-setuptools-69.1.1/lib/python3.11/site-packages/setuptools/config/pyprojecttoml.py", line 244, in field: self._obtain(dist, field, package_dir) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/4718wmk03wr3554kmf09vy80vkdjvq56-python3.11-setuptools-69.1.1/lib/python3.11/site-packages/setuptools/config/pyprojecttoml.py", line 293, in _obtain self._ensure_previously_set(dist, field) File "/nix/store/4718wmk03wr3554kmf09vy80vkdjvq56-python3.11-setuptools-69.1.1/lib/python3.11/site-packages/setuptools/config/pyprojecttoml.py", line 269, in _ensure_previously_set raise InvalidConfigError(msg) setuptools.errors.InvalidConfigError: No configuration found for dynamic 'description'. Some dynamic fields need to be specified via `tool.setuptools.dynamic` others must be specified via the equivalent attribute in `setup.py`. /nix/store/v5lsd029lz5lfhamivbgqyp3zdv94ah2-stdenv-linux/setup: line 1578: pop_var_context: head of shell_variables not a function context [result] Failed to update python311Packages.pyviz-comms 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath poezio, using log file: /var/log/nixpkgs-update/poezio/2024-04-03.log poezio 0 -> 1 attrpath: poezio Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/k3dhrpi49mai2gdyf557ndpij4dlfr8v-packages.json.drv building '/nix/store/k3dhrpi49mai2gdyf557ndpij4dlfr8v-packages.json.drv'... Going to be running update for following packages: - poezio-0.13.1 Press Enter key to continue... Running update for: - poezio-0.13.1: UPDATING ... - poezio-0.13.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update poezio 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cmake, using log file: /var/log/nixpkgs-update/cmake/2024-04-03.log cmake 0 -> 1 attrpath: cmake Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/sr313p29saf0ii5ipymdwzl3l9k0qanj-packages.json.drv building '/nix/store/sr313p29saf0ii5ipymdwzl3l9k0qanj-packages.json.drv'... Going to be running update for following packages: - cmake-3.28.3 Press Enter key to continue... Running update for: - cmake-3.28.3: UPDATING ... - cmake-3.28.3: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/by-name/cm/cmake/package.nix b/pkgs/by-name/cm/cmake/package.nix index a9b29a3245d5..e39baaef8cf6 100644 --- a/pkgs/by-name/cm/cmake/package.nix +++ b/pkgs/by-name/cm/cmake/package.nix @@ -47,11 +47,11 @@ stdenv.mkDerivation (finalAttrs: { + lib.optionalString isMinimalBuild "-minimal" + lib.optionalString cursesUI "-cursesUI" + lib.optionalString qt5UI "-qt5UI"; - version = "3.28.3"; + version = "3.29.0"; src = fetchurl { url = "https://cmake.org/files/v${lib.versions.majorMinor finalAttrs.version}/cmake-${finalAttrs.version}.tar.gz"; - hash = "sha256-crdXDlyFk95qxKtDO3PqsYxfsyiIBGDIbOMmCBQa1cE="; + hash = "sha256-oGaWMKrnuqSoIoBIvzC2Ivnp/Y7oztuUF1Tp44aGx3g="; }; patches = [ An auto update branch exists with message `cmake: 3.28.3 -> 3.29.0`. New version is 3.29.0. An auto update branch exists with an equal or greater version [result] Failed to update cmake 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.ansiconv, using log file: /var/log/nixpkgs-update/python311Packages.ansiconv/2024-04-03.log python311Packages.ansiconv 0 -> 1 attrpath: python311Packages.ansiconv Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/ckm7lbqnk7qgmflcpp9dj06x2k73yn8r-packages.json.drv building '/nix/store/ckm7lbqnk7qgmflcpp9dj06x2k73yn8r-packages.json.drv'... Going to be running update for following packages: - python3.11-ansiconv-1.0.0 Press Enter key to continue... Running update for: - python3.11-ansiconv-1.0.0: UPDATING ... - python3.11-ansiconv-1.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.ansiconv 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.trove-classifiers, using log file: /var/log/nixpkgs-update/python312Packages.trove-classifiers/2024-04-03.log python312Packages.trove-classifiers 2024.3.3 -> 2024.3.25 https://github.com/pypa/trove-classifiers/releases attrpath: python312Packages.trove-classifiers Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/y3knd6aw4lw4rp13vj4g40jnhax4jy3l-packages.json.drv building '/nix/store/y3knd6aw4lw4rp13vj4g40jnhax4jy3l-packages.json.drv'... Going to be running update for following packages: - python3.12-trove-classifiers-2024.3.3 Press Enter key to continue... Running update for: - python3.12-trove-classifiers-2024.3.3: UPDATING ... - python3.12-trove-classifiers-2024.3.3: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/trove-classifiers/default.nix b/pkgs/development/python-modules/trove-classifiers/default.nix index 64829175c198..bf2110ee3736 100644 --- a/pkgs/development/python-modules/trove-classifiers/default.nix +++ b/pkgs/development/python-modules/trove-classifiers/default.nix @@ -10,14 +10,14 @@ let self = buildPythonPackage rec { pname = "trove-classifiers"; - version = "2024.3.3"; + version = "2024.3.25"; pyproject = true; disabled = pythonOlder "3.7"; src = fetchPypi { inherit pname version; - hash = "sha256-337f+cZ/+GtzNiiZgzCxgOgdElseCWU22DrA/XlnP9w="; + hash = "sha256-beaNBu3W/sUDIWK2ryLoGKS7b0riJY50aZ+KQQZLfK0="; }; postPatch = '' No auto update branch exists [outpaths] eval start [outpaths] eval end Python package with too many package rebuilds 55352 > 500 [result] Failed to update python312Packages.trove-classifiers 2024.3.3 -> 2024.3.25 https://github.com/pypa/trove-classifiers/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath stellarium, using log file: /var/log/nixpkgs-update/stellarium/2024-04-03.log stellarium 23.4 -> 24.1 https://repology.org/project/stellarium/versions attrpath: stellarium Checking auto update branch... No auto update branch exists There might already be an open PR for this update: - stellarium: 23.4 -> 24.1 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/299214" [result] Failed to update stellarium 23.4 -> 24.1 https://repology.org/project/stellarium/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.hwdata, using log file: /var/log/nixpkgs-update/python311Packages.hwdata/2024-04-03.log python311Packages.hwdata 0 -> 1 attrpath: python311Packages.hwdata Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/33qk682rj004j3qsz86qv55a9iwv6fqn-packages.json.drv building '/nix/store/33qk682rj004j3qsz86qv55a9iwv6fqn-packages.json.drv'... Going to be running update for following packages: - python3.11-hwdata-2.4.1 Press Enter key to continue... Running update for: - python3.11-hwdata-2.4.1: UPDATING ... - python3.11-hwdata-2.4.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.hwdata 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.xknxproject, using log file: /var/log/nixpkgs-update/python311Packages.xknxproject/2024-04-03.log python311Packages.xknxproject 0 -> 1 attrpath: python311Packages.xknxproject Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/yfc03si5bi8nikbqdd0g63afmvx976p1-packages.json.drv building '/nix/store/yfc03si5bi8nikbqdd0g63afmvx976p1-packages.json.drv'... Going to be running update for following packages: - python3.11-xknxproject-3.7.0 Press Enter key to continue... Running update for: - python3.11-xknxproject-3.7.0: UPDATING ... - python3.11-xknxproject-3.7.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.xknxproject 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath arxiv-latex-cleaner, using log file: /var/log/nixpkgs-update/arxiv-latex-cleaner/2024-04-03.log arxiv-latex-cleaner 0 -> 1 attrpath: arxiv-latex-cleaner Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/v4zw8362hjcfzvb7z6im83v9qfka9j41-packages.json.drv building '/nix/store/v4zw8362hjcfzvb7z6im83v9qfka9j41-packages.json.drv'... Going to be running update for following packages: - arxiv-latex-cleaner-1.0.5 Press Enter key to continue... Running update for: - arxiv-latex-cleaner-1.0.5: UPDATING ... - arxiv-latex-cleaner-1.0.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update arxiv-latex-cleaner 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath hashlink, using log file: /var/log/nixpkgs-update/hashlink/2024-04-03.log hashlink 1.13 -> 1.14 https://repology.org/project/hashlink/versions attrpath: hashlink Checking auto update branch... An auto update branch exists with message `hashlink: 1.13 -> 1.14`. New version is 1.14. An auto update branch exists with an equal or greater version [result] Failed to update hashlink 1.13 -> 1.14 https://repology.org/project/hashlink/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath evince, using log file: /var/log/nixpkgs-update/evince/2024-04-03.log evince 0 -> 1 attrpath: evince Checking auto update branch... Do not update GNOME during a release cycle [result] Failed to update evince 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.flit-scm, using log file: /var/log/nixpkgs-update/python311Packages.flit-scm/2024-04-03.log python311Packages.flit-scm 0 -> 1 attrpath: python311Packages.flit-scm Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/nbn030rvxcaa3axprs8s6xz0r43xal4f-packages.json.drv building '/nix/store/nbn030rvxcaa3axprs8s6xz0r43xal4f-packages.json.drv'... Going to be running update for following packages: - python3.11-flit-scm-1.7.0 Press Enter key to continue... Running update for: - python3.11-flit-scm-1.7.0: UPDATING ... - python3.11-flit-scm-1.7.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.flit-scm 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath source-serif, using log file: /var/log/nixpkgs-update/source-serif/2024-04-03.log source-serif 4.005 -> 4.005R https://github.com/adobe-fonts/source-serif/releases attrpath: source-serif Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/gml8m2yiabnq91kvxwnd70dzn2fgnrx0-source.drv building '/nix/store/gml8m2yiabnq91kvxwnd70dzn2fgnrx0-source.drv'... trying https://github.com/adobe-fonts/source-serif/archive/refs/tags/4.005RR.zip % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/gml8m2yiabnq91kvxwnd70dzn2fgnrx0-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/adobe-fonts/source-serif/archive/refs/tags/4.005RR.zip > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/gml8m2yiabnq91kvxwnd70dzn2fgnrx0-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'source-serif.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/gml8m2yiabnq91kvxwnd70dzn2fgnrx0-source.drv /nix/store/ck8si5arbacql32cavp6jm8rpmffr4jg-source-serif-4.005R.drv building '/nix/store/gml8m2yiabnq91kvxwnd70dzn2fgnrx0-source.drv'... trying https://github.com/adobe-fonts/source-serif/archive/refs/tags/4.005RR.zip % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/gml8m2yiabnq91kvxwnd70dzn2fgnrx0-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/adobe-fonts/source-serif/archive/refs/tags/4.005RR.zip > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/gml8m2yiabnq91kvxwnd70dzn2fgnrx0-source.drv'. error: 1 dependencies of derivation '/nix/store/ck8si5arbacql32cavp6jm8rpmffr4jg-source-serif-4.005R.drv' failed to build [result] Failed to update source-serif 4.005 -> 4.005R https://github.com/adobe-fonts/source-serif/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.sortedcollections, using log file: /var/log/nixpkgs-update/python311Packages.sortedcollections/2024-04-03.log python311Packages.sortedcollections 0 -> 1 attrpath: python311Packages.sortedcollections Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/0gg7vdc9m98x9zvrqf701zyylk5kq7nl-packages.json.drv building '/nix/store/0gg7vdc9m98x9zvrqf701zyylk5kq7nl-packages.json.drv'... Going to be running update for following packages: - python3.11-sortedcollections-2.1.0 Press Enter key to continue... Running update for: - python3.11-sortedcollections-2.1.0: UPDATING ... - python3.11-sortedcollections-2.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.sortedcollections 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.eduvpn-common, using log file: /var/log/nixpkgs-update/python311Packages.eduvpn-common/2024-04-03.log python311Packages.eduvpn-common 0 -> 1 attrpath: python311Packages.eduvpn-common Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/ipkq7ims3ynafy0h4skwxrhmvfjganhi-packages.json.drv building '/nix/store/ipkq7ims3ynafy0h4skwxrhmvfjganhi-packages.json.drv'... Going to be running update for following packages: - python3.11-eduvpn-common-1.2.0 Press Enter key to continue... Running update for: - python3.11-eduvpn-common-1.2.0: UPDATING ... - python3.11-eduvpn-common-1.2.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.eduvpn-common 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath csv2odf, using log file: /var/log/nixpkgs-update/csv2odf/2024-04-03.log csv2odf 0 -> 1 attrpath: csv2odf Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/ncvhz5mz58k7gg9y50pjmjwz9dm5bjc0-packages.json.drv building '/nix/store/ncvhz5mz58k7gg9y50pjmjwz9dm5bjc0-packages.json.drv'... Going to be running update for following packages: - csv2odf-2.09 Press Enter key to continue... Running update for: - csv2odf-2.09: UPDATING ... - csv2odf-2.09: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update csv2odf 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.whatthepatch, using log file: /var/log/nixpkgs-update/python311Packages.whatthepatch/2024-04-03.log python311Packages.whatthepatch 0 -> 1 attrpath: python311Packages.whatthepatch Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/3lqysd7xghxm2xhyn00hmsbd8pbc6xz6-packages.json.drv building '/nix/store/3lqysd7xghxm2xhyn00hmsbd8pbc6xz6-packages.json.drv'... Going to be running update for following packages: - python3.11-whatthepatch-1.0.5 Press Enter key to continue... Running update for: - python3.11-whatthepatch-1.0.5: UPDATING ... - python3.11-whatthepatch-1.0.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.whatthepatch 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath emborg, using log file: /var/log/nixpkgs-update/emborg/2024-04-03.log emborg 0 -> 1 attrpath: emborg Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/qvd3cmrsz6hxaqnhqzsksvsdjl1x7pd8-packages.json.drv building '/nix/store/qvd3cmrsz6hxaqnhqzsksvsdjl1x7pd8-packages.json.drv'... Going to be running update for following packages: - python3.11-emborg-1.38 Press Enter key to continue... Running update for: - python3.11-emborg-1.38: UPDATING ... - python3.11-emborg-1.38: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update emborg 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath bzrtp, using log file: /var/log/nixpkgs-update/bzrtp/2024-04-03.log bzrtp 5.2.111 -> 5.3.38 https://repology.org/project/bzrtp/versions attrpath: bzrtp Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/libraries/bzrtp/default.nix b/pkgs/development/libraries/bzrtp/default.nix index 6cbe6fc1899d..c1fbdcc88d45 100644 --- a/pkgs/development/libraries/bzrtp/default.nix +++ b/pkgs/development/libraries/bzrtp/default.nix @@ -8,7 +8,7 @@ stdenv.mkDerivation rec { pname = "bzrtp"; - version = "5.2.111"; + version = "5.3.38"; src = fetchFromGitLab { domain = "gitlab.linphone.org"; @@ -16,7 +16,7 @@ stdenv.mkDerivation rec { group = "BC"; repo = pname; rev = version; - hash = "sha256-sLvvQhJ9uVt/dx57xs9ftY/ETi46xmyGDH8372zpqj8="; + hash = "sha256-dw4B3sedfFVOM9Uxww2W7o5NyfuntUW2/1Uy4egqHOE="; }; buildInputs = [ bctoolbox sqlite ]; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A bzrtp nix build failed. -- Detecting C compiler ABI info - done -- Check for working C compiler: /nix/store/ac1hb5dc2z4biwgy8mjrhlifffkkrvdq-gcc-wrapper-13.2.0/bin/gcc - skipped -- Detecting C compile features -- Detecting C compile features - done -- Detecting CXX compiler ABI info -- Detecting CXX compiler ABI info - done -- Check for working CXX compiler: /nix/store/ac1hb5dc2z4biwgy8mjrhlifffkkrvdq-gcc-wrapper-13.2.0/bin/g++ - skipped -- Detecting CXX compile features -- Detecting CXX compile features - done -- Setting install rpath to -- Looking for sqrt in m -- Looking for sqrt in m - found CMake Error at CMakeLists.txt:49 (find_package): By not providing "FindBCToolbox.cmake" in CMAKE_MODULE_PATH this project has asked CMake to find a package configuration file provided by "BCToolbox", but CMake did not find one. Could not find a package configuration file provided by "BCToolbox" (requested version 5.3.0) with any of the following names: BCToolboxConfig.cmake bctoolbox-config.cmake Add the installation prefix of "BCToolbox" to CMAKE_PREFIX_PATH or set "BCToolbox_DIR" to a directory containing one of the above files. If "BCToolbox" provides a separate development package or SDK, be sure it has been installed.  -- Configuring incomplete, errors occurred! [result] Failed to update bzrtp 5.2.111 -> 5.3.38 https://repology.org/project/bzrtp/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.ReplicationSuccess, using log file: /var/log/nixpkgs-update/rPackages.ReplicationSuccess/2024-04-03.log rPackages.ReplicationSuccess 1.3.1 -> 1.3.2 https://repology.org/project/r:replicationsuccess/versions attrpath: rPackages.ReplicationSuccess Checking auto update branch... No auto update branch exists Old version 1.3.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.ReplicationSuccess 1.3.1 -> 1.3.2 https://repology.org/project/r:replicationsuccess/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.stdmod, using log file: /var/log/nixpkgs-update/rPackages.stdmod/2024-04-03.log rPackages.stdmod 0.2.9 -> 0.2.10 https://repology.org/project/r:stdmod/versions attrpath: rPackages.stdmod Checking auto update branch... No auto update branch exists Old version 0.2.9" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.stdmod 0.2.9 -> 0.2.10 https://repology.org/project/r:stdmod/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.MsQuality, using log file: /var/log/nixpkgs-update/rPackages.MsQuality/2024-04-03.log rPackages.MsQuality 1.2.0 -> 1.2.1 https://repology.org/project/r:msquality/versions attrpath: rPackages.MsQuality Checking auto update branch... No auto update branch exists Old version 1.2.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.MsQuality 1.2.0 -> 1.2.1 https://repology.org/project/r:msquality/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.laces, using log file: /var/log/nixpkgs-update/python311Packages.laces/2024-04-03.log python311Packages.laces 0 -> 1 attrpath: python311Packages.laces Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/r654dfwi18znlcisrcab4i5jbiikgb4b-packages.json.drv building '/nix/store/r654dfwi18znlcisrcab4i5jbiikgb4b-packages.json.drv'... Going to be running update for following packages: - python3.11-laces-0.1.1 Press Enter key to continue... Running update for: - python3.11-laces-0.1.1: UPDATING ... - python3.11-laces-0.1.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.laces 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cakelisp, using log file: /var/log/nixpkgs-update/cakelisp/2024-04-03.log cakelisp 0 -> 1 attrpath: cakelisp Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/jmb3k6sjcnm9sgg43bnshdshzjgrl3dh-packages.json.drv building '/nix/store/jmb3k6sjcnm9sgg43bnshdshzjgrl3dh-packages.json.drv'... Going to be running update for following packages: - cakelisp-0.3.0-unstable-2024-03-21 Press Enter key to continue... Running update for: - cakelisp-0.3.0-unstable-2024-03-21: UPDATING ... - cakelisp-0.3.0-unstable-2024-03-21: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/compilers/cakelisp/default.nix b/pkgs/development/compilers/cakelisp/default.nix index 1d52430a16a5..9e7832b471eb 100644 --- a/pkgs/development/compilers/cakelisp/default.nix +++ b/pkgs/development/compilers/cakelisp/default.nix @@ -3,12 +3,12 @@ stdenv.mkDerivation { pname = "cakelisp"; # using unstable as it's the only version that builds against gcc-13 - version = "0.3.0-unstable-2024-03-21"; + version = "unstable-2024-04-01"; src = fetchgit { url = "https://macoy.me/code/macoy/cakelisp"; - rev = "6bde4b8002e4825116f3b18291a012bf1729f497"; - hash = "sha256-jpwVHiDRVa6QoYxsasmiV1IdbBqZj0tU5EBruOHfzYg="; + rev = "7f09a08623f4141d3c2940bca3e8ea646a7049cc"; + hash = "sha256-5ey2j38bhoRADMFcTGcUiOHE/UlU2mPGqzfv7dEk6oQ="; }; buildInputs = [ gcc ]; No auto update branch exists [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/cn0h89lhvpmai4wcfb6c9q9rpxg2z67r-cakelisp-unstable-2024-04-01" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • cakelisp
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from passthru.updateScript. meta.description for cakelisp is: A performance-oriented Lisp-like language meta.homepage for cakelisp is: https://macoy.me/code/macoy/cakelisp ###### Updates performed - Ran passthru.UpdateScript ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found unstable-2024-04-01 in filename of file in /nix/store/cn0h89lhvpmai4wcfb6c9q9rpxg2z67r-cakelisp-unstable-2024-04-01 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath cakelisp ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/cn0h89lhvpmai4wcfb6c9q9rpxg2z67r-cakelisp-unstable-2024-04-01 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A cakelisp https://github.com/r-ryantm/nixpkgs/archive/961b6043a7558daa5f9c4fa1e0d1ccf1574b269d.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/961b6043a7558daa5f9c4fa1e0d1ccf1574b269d#cakelisp ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/cn0h89lhvpmai4wcfb6c9q9rpxg2z67r-cakelisp-unstable-2024-04-01 ls -la /nix/store/cn0h89lhvpmai4wcfb6c9q9rpxg2z67r-cakelisp-unstable-2024-04-01/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • cakelisp
--- ###### Maintainer pings cc @sbond75 for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301172 [result] Success updating cakelisp 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.blavaan, using log file: /var/log/nixpkgs-update/rPackages.blavaan/2024-04-03.log rPackages.blavaan 0.5-2 -> 0.5-3 https://repology.org/project/r:blavaan/versions attrpath: rPackages.blavaan Checking auto update branch... No auto update branch exists Old version 0.5-2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.blavaan 0.5-2 -> 0.5-3 https://repology.org/project/r:blavaan/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.rgho, using log file: /var/log/nixpkgs-update/rPackages.rgho/2024-04-03.log rPackages.rgho 3.0.1 -> 3.0.2 https://repology.org/project/r:rgho/versions attrpath: rPackages.rgho Checking auto update branch... No auto update branch exists Old version 3.0.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.rgho 3.0.1 -> 3.0.2 https://repology.org/project/r:rgho/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.MCARtest, using log file: /var/log/nixpkgs-update/rPackages.MCARtest/2024-04-03.log rPackages.MCARtest 1.1 -> 1.2.1 https://repology.org/project/r:mcartest/versions attrpath: rPackages.MCARtest Checking auto update branch... No auto update branch exists Old version 1.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.MCARtest 1.1 -> 1.2.1 https://repology.org/project/r:mcartest/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.ASV, using log file: /var/log/nixpkgs-update/rPackages.ASV/2024-04-03.log rPackages.ASV 1.1.1 -> 1.1.4 https://repology.org/project/r:asv/versions attrpath: rPackages.ASV Checking auto update branch... No auto update branch exists Old version 1.1.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.ASV 1.1.1 -> 1.1.4 https://repology.org/project/r:asv/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath uchecker, using log file: /var/log/nixpkgs-update/uchecker/2024-04-03.log uchecker 0 -> 1 attrpath: uchecker Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/k43c1hnqma6az6wd42k9sgnf05rmhfcq-packages.json.drv building '/nix/store/k43c1hnqma6az6wd42k9sgnf05rmhfcq-packages.json.drv'... Going to be running update for following packages: - uchecker-0.1.2 Press Enter key to continue... Running update for: - uchecker-0.1.2: UPDATING ... - uchecker-0.1.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update uchecker 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath mutagen, using log file: /var/log/nixpkgs-update/mutagen/2024-04-03.log mutagen 0.17.1 -> 0.17.5 https://repology.org/project/mutagen-io/versions attrpath: mutagen Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Found old vendorHash = "sha256-kfzT+230KY2TJVc0qKMi4TysmltZSgF/OvL5nPLPcbM=" [golangModuleVersion] Replaced vendorHash with sha256-Uzfd1fZJ+x8m6/A2r0WJSiF2OW30WYiPkPQtdaqh4Qc= Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A mutagen Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix --extra-experimental-features nix-command log -f . mutagen Standard output: error: build log of 'mutagen' is not available [result] Failed to update mutagen 0.17.1 -> 0.17.5 https://repology.org/project/mutagen-io/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath log4jcheck, using log file: /var/log/nixpkgs-update/log4jcheck/2024-04-03.log log4jcheck 0 -> 1 attrpath: log4jcheck Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] cannot link '/nix/store/.links/11l9w1xb5wivfhr4ws3ngkfy67ricxvxx7ay65mh0vwyksyf8w6v' to '/nix/store/nll5m4x1bx43784xpbgjw9yw6vpywqaj-packages.json.drv': No space left on device this derivation will be built: /nix/store/nll5m4x1bx43784xpbgjw9yw6vpywqaj-packages.json.drv building '/nix/store/nll5m4x1bx43784xpbgjw9yw6vpywqaj-packages.json.drv'... Going to be running update for following packages: - log4jcheck-unstable-2021-12-14 Press Enter key to continue... Running update for: - log4jcheck-unstable-2021-12-14: UPDATING ... - log4jcheck-unstable-2021-12-14: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update log4jcheck 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gnome2.pango, using log file: /var/log/nixpkgs-update/gnome2.pango/2024-04-03.log gnome2.pango 0 -> 1 attrpath: gnome2.pango Checking auto update branch... Do not update GNOME during a release cycle [result] Failed to update gnome2.pango 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.frilouz, using log file: /var/log/nixpkgs-update/python311Packages.frilouz/2024-04-03.log python311Packages.frilouz 0 -> 1 attrpath: python311Packages.frilouz Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/73cx6jyc9n4lqcs2whkvvbnbjq330j6b-packages.json.drv building '/nix/store/73cx6jyc9n4lqcs2whkvvbnbjq330j6b-packages.json.drv'... Going to be running update for following packages: - python3.11-frilouz-0.0.2 Press Enter key to continue... Running update for: - python3.11-frilouz-0.0.2: UPDATING ... - python3.11-frilouz-0.0.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.frilouz 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.nbdev, using log file: /var/log/nixpkgs-update/python311Packages.nbdev/2024-04-03.log python311Packages.nbdev 0 -> 1 attrpath: python311Packages.nbdev Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/ka3a1qg5qjh8cjwhan54xr2l36xxh5r9-packages.json.drv building '/nix/store/ka3a1qg5qjh8cjwhan54xr2l36xxh5r9-packages.json.drv'... Going to be running update for following packages: - python3.11-nbdev-2.3.13 Press Enter key to continue... Running update for: - python3.11-nbdev-2.3.13: UPDATING ... - python3.11-nbdev-2.3.13: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.nbdev 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath radicale2, using log file: /var/log/nixpkgs-update/radicale2/2024-04-03.log radicale2 0 -> 1 attrpath: radicale2 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/g8hbxn5m7mqvya7gzp5631yjyfqwpy5x-packages.json.drv building '/nix/store/g8hbxn5m7mqvya7gzp5631yjyfqwpy5x-packages.json.drv'... Going to be running update for following packages: - Radicale-2.1.12 Press Enter key to continue... Running update for: - Radicale-2.1.12: UPDATING ... - Radicale-2.1.12: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/servers/radicale/2.x.nix b/pkgs/servers/radicale/2.x.nix index c1e596669030..bf7a1c4e79fd 100644 --- a/pkgs/servers/radicale/2.x.nix +++ b/pkgs/servers/radicale/2.x.nix @@ -2,14 +2,14 @@ python3.pkgs.buildPythonApplication rec { pname = "Radicale"; - version = "2.1.12"; + version = "3.1.9"; # No tests in PyPI tarball src = fetchFromGitHub { owner = "Kozea"; repo = "Radicale"; - rev = version; - sha256 = "14f9ql0fiwapaa4xaslwgk1ah9fzxxan2p1p2rxb4a5iqph1z0cl"; + rev = "refs/tags/v${version}"; + sha256 = "sha256-i4NQ1+ltRE0g8AoyGKKVcgZgSmLeppnobu6bf2+XmWY="; }; # We only want functional tests No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A radicale2 nix build failed. from radicale.app import Application radicale/app/__init__.py:38: in from radicale.app.base import ApplicationBase radicale/app/base.py:29: in import defusedxml.ElementTree as DefusedET # isort:skip E ModuleNotFoundError: No module named 'defusedxml' _________________ ERROR collecting radicale/tests/test_web.py __________________ ImportError while importing test module '/build/source/radicale/tests/test_web.py'. Hint: make sure your test modules/packages have valid Python names. Traceback: /nix/store/gd3shnza1i50zn8zs04fa729ribr88m9-python3-3.11.8/lib/python3.11/importlib/__init__.py:126: in import_module return _bootstrap._gcd_import(name[level:], package, level) radicale/__init__.py:33: in from radicale.app import Application radicale/app/__init__.py:38: in from radicale.app.base import ApplicationBase radicale/app/base.py:29: in import defusedxml.ElementTree as DefusedET # isort:skip E ModuleNotFoundError: No module named 'defusedxml' =========================== short test summary info ============================ ERROR radicale/tests/test_auth.py ERROR radicale/tests/test_base.py ERROR radicale/tests/test_config.py ERROR radicale/tests/test_rights.py ERROR radicale/tests/test_server.py ERROR radicale/tests/test_storage.py ERROR radicale/tests/test_web.py !!!!!!!!!!!!!!!!!!! Interrupted: 7 errors during collection !!!!!!!!!!!!!!!!!!!! ============================== 7 errors in 0.17s =============================== /nix/store/v5lsd029lz5lfhamivbgqyp3zdv94ah2-stdenv-linux/setup: line 1578: pop_var_context: head of shell_variables not a function context [result] Failed to update radicale2 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cosmic-icons, using log file: /var/log/nixpkgs-update/cosmic-icons/2024-04-03.log cosmic-icons 0 -> 1 attrpath: cosmic-icons Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/ry0gyfy4xnz9ccg26769djr5ngbr3bdc-packages.json.drv building '/nix/store/ry0gyfy4xnz9ccg26769djr5ngbr3bdc-packages.json.drv'... Going to be running update for following packages: - cosmic-icons-unstable-2024-02-22 Press Enter key to continue... Running update for: - cosmic-icons-unstable-2024-02-22: UPDATING ... - cosmic-icons-unstable-2024-02-22: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update cosmic-icons 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.fuzzyfinder, using log file: /var/log/nixpkgs-update/python311Packages.fuzzyfinder/2024-04-03.log python311Packages.fuzzyfinder 0 -> 1 attrpath: python311Packages.fuzzyfinder Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/pq8bwsd6z7x1i87391wqi8pprjpi5djx-packages.json.drv building '/nix/store/pq8bwsd6z7x1i87391wqi8pprjpi5djx-packages.json.drv'... Going to be running update for following packages: - python3.11-fuzzyfinder-2.1.0 Press Enter key to continue... Running update for: - python3.11-fuzzyfinder-2.1.0: UPDATING ... - python3.11-fuzzyfinder-2.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.fuzzyfinder 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.picosvg, using log file: /var/log/nixpkgs-update/python311Packages.picosvg/2024-04-03.log python311Packages.picosvg 0 -> 1 attrpath: python311Packages.picosvg Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/6cwfxwrwyw3xx255grr6qgq3xf7kbcj1-packages.json.drv building '/nix/store/6cwfxwrwyw3xx255grr6qgq3xf7kbcj1-packages.json.drv'... Going to be running update for following packages: - python3.11-picosvg-0.22.1 Press Enter key to continue... Running update for: - python3.11-picosvg-0.22.1: UPDATING ... - python3.11-picosvg-0.22.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.picosvg 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rpPPPoE, using log file: /var/log/nixpkgs-update/rpPPPoE/2024-04-03.log rpPPPoE 3.12 -> 4.0 https://repology.org/project/rp-pppoe/versions attrpath: rpPPPoE Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/sl576xzv8anc5z5xjzrbigqni6zx0h04-rp-pppoe-4.0.tar.gz.drv building '/nix/store/sl576xzv8anc5z5xjzrbigqni6zx0h04-rp-pppoe-4.0.tar.gz.drv'... trying https://www.roaringpenguin.com/files/download/rp-pppoe-4.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- 0:00:19 --:--:-- 0curl: (6) Could not resolve host: www.roaringpenguin.com Warning: Problem : timeout. Will retry in 1 seconds. 3 retries left. 0 0 0 0 0 0 0 0 --:--:-- 0:00:19 --:--:-- 0curl: (6) Could not resolve host: www.roaringpenguin.com Warning: Problem : timeout. Will retry in 2 seconds. 2 retries left. 0 0 0 0 0 0 0 0 --:--:-- 0:00:19 --:--:-- 0curl: (6) Could not resolve host: www.roaringpenguin.com Warning: Problem : timeout. Will retry in 4 seconds. 1 retries left. 0 0 0 0 0 0 0 0 --:--:-- 0:00:19 --:--:-- 0curl: (6) Could not resolve host: www.roaringpenguin.com error: cannot download rp-pppoe-4.0.tar.gz from any mirror error: builder for '/nix/store/sl576xzv8anc5z5xjzrbigqni6zx0h04-rp-pppoe-4.0.tar.gz.drv' failed with exit code 1; last 12 log lines: > > trying https://www.roaringpenguin.com/files/download/rp-pppoe-4.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- 0:00:19 --:--:-- 0curl: (6) Could not resolve host: www.roaringpenguin.com > Warning: Problem : timeout. Will retry in 1 seconds. 3 retries left. > 0 0 0 0 0 0 0 0 --:--:-- 0:00:19 --:--:-- 0curl: (6) Could not resolve host: www.roaringpenguin.com > Warning: Problem : timeout. Will retry in 2 seconds. 2 retries left. > 0 0 0 0 0 0 0 0 --:--:-- 0:00:19 --:--:-- 0curl: (6) Could not resolve host: www.roaringpenguin.com > Warning: Problem : timeout. Will retry in 4 seconds. 1 retries left. > 0 0 0 0 0 0 0 0 --:--:-- 0:00:19 --:--:-- 0curl: (6) Could not resolve host: www.roaringpenguin.com > error: cannot download rp-pppoe-4.0.tar.gz from any mirror For full logs, run 'nix log /nix/store/sl576xzv8anc5z5xjzrbigqni6zx0h04-rp-pppoe-4.0.tar.gz.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'rpPPPoE.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/sl576xzv8anc5z5xjzrbigqni6zx0h04-rp-pppoe-4.0.tar.gz.drv /nix/store/bpbsfbl1b3hc4j4284vqwyml40fl98df-rp-pppoe-4.0.drv building '/nix/store/sl576xzv8anc5z5xjzrbigqni6zx0h04-rp-pppoe-4.0.tar.gz.drv'... trying https://www.roaringpenguin.com/files/download/rp-pppoe-4.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- 0:00:19 --:--:-- 0curl: (6) Could not resolve host: www.roaringpenguin.com Warning: Problem : timeout. Will retry in 1 seconds. 3 retries left. 0 0 0 0 0 0 0 0 --:--:-- 0:00:15 --:--:-- 0curl: (6) Could not resolve host: www.roaringpenguin.com Warning: Problem : timeout. Will retry in 2 seconds. 2 retries left. 0 0 0 0 0 0 0 0 --:--:-- 0:00:17 --:--:-- 0curl: (6) Could not resolve host: www.roaringpenguin.com Warning: Problem : timeout. Will retry in 4 seconds. 1 retries left. 0 0 0 0 0 0 0 0 --:--:-- 0:00:10 --:--:-- 0curl: (6) Could not resolve host: www.roaringpenguin.com error: cannot download rp-pppoe-4.0.tar.gz from any mirror error: builder for '/nix/store/sl576xzv8anc5z5xjzrbigqni6zx0h04-rp-pppoe-4.0.tar.gz.drv' failed with exit code 1; last 12 log lines: > > trying https://www.roaringpenguin.com/files/download/rp-pppoe-4.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- 0:00:19 --:--:-- 0curl: (6) Could not resolve host: www.roaringpenguin.com > Warning: Problem : timeout. Will retry in 1 seconds. 3 retries left. > 0 0 0 0 0 0 0 0 --:--:-- 0:00:15 --:--:-- 0curl: (6) Could not resolve host: www.roaringpenguin.com > Warning: Problem : timeout. Will retry in 2 seconds. 2 retries left. > 0 0 0 0 0 0 0 0 --:--:-- 0:00:17 --:--:-- 0curl: (6) Could not resolve host: www.roaringpenguin.com > Warning: Problem : timeout. Will retry in 4 seconds. 1 retries left. > 0 0 0 0 0 0 0 0 --:--:-- 0:00:10 --:--:-- 0curl: (6) Could not resolve host: www.roaringpenguin.com > error: cannot download rp-pppoe-4.0.tar.gz from any mirror For full logs, run 'nix log /nix/store/sl576xzv8anc5z5xjzrbigqni6zx0h04-rp-pppoe-4.0.tar.gz.drv'. error: 1 dependencies of derivation '/nix/store/bpbsfbl1b3hc4j4284vqwyml40fl98df-rp-pppoe-4.0.drv' failed to build [result] Failed to update rpPPPoE 3.12 -> 4.0 https://repology.org/project/rp-pppoe/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.iNZightTS, using log file: /var/log/nixpkgs-update/rPackages.iNZightTS/2024-04-03.log rPackages.iNZightTS 1.5.9 -> 2.0.0 https://repology.org/project/r:inzightts/versions attrpath: rPackages.iNZightTS Checking auto update branch... No auto update branch exists Old version 1.5.9" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.iNZightTS 1.5.9 -> 2.0.0 https://repology.org/project/r:inzightts/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath u3-tool, using log file: /var/log/nixpkgs-update/u3-tool/2024-04-03.log u3-tool 0.3 -> 1.0 https://repology.org/project/u3-tool/versions attrpath: u3-tool Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/5sqfasfbw5ydmcdaxg95ak27m2h7l07z-u3-tool-1.0.tar.gz.drv building '/nix/store/5sqfasfbw5ydmcdaxg95ak27m2h7l07z-u3-tool-1.0.tar.gz.drv'... trying https://downloads.sourceforge.net/u3-tool/u3-tool-1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 154 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://prdownloads.sourceforge.net/u3-tool/u3-tool-1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://netcologne.dl.sourceforge.net/sourceforge/u3-tool/u3-tool-1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 138 100 138 0 0 970 0 --:--:-- --:--:-- --:--:-- 971 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://versaweb.dl.sourceforge.net/sourceforge/u3-tool/u3-tool-1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 154 100 154 0 0 241 0 --:--:-- --:--:-- --:--:-- 241 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://freefr.dl.sourceforge.net/sourceforge/u3-tool/u3-tool-1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 308 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://osdn.dl.sourceforge.net/sourceforge/u3-tool/u3-tool-1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL: no alternative certificate subject name matches target host name 'osdn.dl.sourceforge.net' More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. error: cannot download u3-tool-1.0.tar.gz from any mirror error: builder for '/nix/store/5sqfasfbw5ydmcdaxg95ak27m2h7l07z-u3-tool-1.0.tar.gz.drv' failed with exit code 1; last 25 log lines: > trying https://versaweb.dl.sourceforge.net/sourceforge/u3-tool/u3-tool-1.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 100 154 100 154 0 0 241 0 --:--:-- --:--:-- --:--:-- 241 > 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 > curl: (22) The requested URL returned error: 404 > > trying https://freefr.dl.sourceforge.net/sourceforge/u3-tool/u3-tool-1.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 308 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 > curl: (22) The requested URL returned error: 404 > > trying https://osdn.dl.sourceforge.net/sourceforge/u3-tool/u3-tool-1.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (60) SSL: no alternative certificate subject name matches target host name 'osdn.dl.sourceforge.net' > More details here: https://curl.se/docs/sslcerts.html > > curl failed to verify the legitimacy of the server and therefore could not > establish a secure connection to it. To learn more about this situation and > how to fix it, please visit the web page mentioned above. > error: cannot download u3-tool-1.0.tar.gz from any mirror For full logs, run 'nix log /nix/store/5sqfasfbw5ydmcdaxg95ak27m2h7l07z-u3-tool-1.0.tar.gz.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'u3-tool.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/5sqfasfbw5ydmcdaxg95ak27m2h7l07z-u3-tool-1.0.tar.gz.drv /nix/store/gjfyz64ga3cd03db74nz7ffzncgwiym7-u3-tool-1.0.drv building '/nix/store/5sqfasfbw5ydmcdaxg95ak27m2h7l07z-u3-tool-1.0.tar.gz.drv'... trying https://downloads.sourceforge.net/u3-tool/u3-tool-1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 154 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://prdownloads.sourceforge.net/u3-tool/u3-tool-1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://netcologne.dl.sourceforge.net/sourceforge/u3-tool/u3-tool-1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 138 100 138 0 0 1296 0 --:--:-- --:--:-- --:--:-- 1301 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://versaweb.dl.sourceforge.net/sourceforge/u3-tool/u3-tool-1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 154 100 154 0 0 249 0 --:--:-- --:--:-- --:--:-- 249 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://freefr.dl.sourceforge.net/sourceforge/u3-tool/u3-tool-1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 308 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 154 0 0 0 0 0 0 --:--:-- 0:00:02 --:--:-- 0 curl: (22) The requested URL returned error: 404 trying https://osdn.dl.sourceforge.net/sourceforge/u3-tool/u3-tool-1.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL: no alternative certificate subject name matches target host name 'osdn.dl.sourceforge.net' More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. error: cannot download u3-tool-1.0.tar.gz from any mirror error: builder for '/nix/store/5sqfasfbw5ydmcdaxg95ak27m2h7l07z-u3-tool-1.0.tar.gz.drv' failed with exit code 1; last 25 log lines: > trying https://versaweb.dl.sourceforge.net/sourceforge/u3-tool/u3-tool-1.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 100 154 100 154 0 0 249 0 --:--:-- --:--:-- --:--:-- 249 > 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 > curl: (22) The requested URL returned error: 404 > > trying https://freefr.dl.sourceforge.net/sourceforge/u3-tool/u3-tool-1.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 308 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 154 0 0 0 0 0 0 --:--:-- 0:00:02 --:--:-- 0 > curl: (22) The requested URL returned error: 404 > > trying https://osdn.dl.sourceforge.net/sourceforge/u3-tool/u3-tool-1.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (60) SSL: no alternative certificate subject name matches target host name 'osdn.dl.sourceforge.net' > More details here: https://curl.se/docs/sslcerts.html > > curl failed to verify the legitimacy of the server and therefore could not > establish a secure connection to it. To learn more about this situation and > how to fix it, please visit the web page mentioned above. > error: cannot download u3-tool-1.0.tar.gz from any mirror For full logs, run 'nix log /nix/store/5sqfasfbw5ydmcdaxg95ak27m2h7l07z-u3-tool-1.0.tar.gz.drv'. error: 1 dependencies of derivation '/nix/store/gjfyz64ga3cd03db74nz7ffzncgwiym7-u3-tool-1.0.drv' failed to build [result] Failed to update u3-tool 0.3 -> 1.0 https://repology.org/project/u3-tool/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.mattermostdriver, using log file: /var/log/nixpkgs-update/python311Packages.mattermostdriver/2024-04-03.log python311Packages.mattermostdriver 0 -> 1 attrpath: python311Packages.mattermostdriver Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/6hplw33picwcd3fsv1lwhx6lqf3hgjwq-packages.json.drv building '/nix/store/6hplw33picwcd3fsv1lwhx6lqf3hgjwq-packages.json.drv'... Going to be running update for following packages: - python3.11-mattermostdriver-7.3.2 Press Enter key to continue... Running update for: - python3.11-mattermostdriver-7.3.2: UPDATING ... - python3.11-mattermostdriver-7.3.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.mattermostdriver 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyamg, using log file: /var/log/nixpkgs-update/python311Packages.pyamg/2024-04-03.log python311Packages.pyamg 0 -> 1 attrpath: python311Packages.pyamg Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/ris6k03651yym93avp2xq71q1fmqvv70-packages.json.drv building '/nix/store/ris6k03651yym93avp2xq71q1fmqvv70-packages.json.drv'... Going to be running update for following packages: - python3.11-pyamg-5.1.0 Press Enter key to continue... Running update for: - python3.11-pyamg-5.1.0: UPDATING ... - python3.11-pyamg-5.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyamg 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath thunderbirdPackages.thunderbird-102, using log file: /var/log/nixpkgs-update/thunderbirdPackages.thunderbird-102/2024-04-03.log thunderbirdPackages.thunderbird-102 0 -> 1 attrpath: thunderbirdPackages.thunderbird-102 Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] these 2 derivations will be built: /nix/store/4wiy7njrpa3a5qj9jak74qi4zhifswdq-update-thunderbird-unwrapped.drv /nix/store/jmis9lirlvm777vln7c6l67s717fb1kh-packages.json.drv building '/nix/store/4wiy7njrpa3a5qj9jak74qi4zhifswdq-update-thunderbird-unwrapped.drv'... building '/nix/store/jmis9lirlvm777vln7c6l67s717fb1kh-packages.json.drv'... Going to be running update for following packages: - thunderbird-unwrapped-102.14.0 Press Enter key to continue... Running update for: - thunderbird-unwrapped-102.14.0: UPDATING ... - thunderbird-unwrapped-102.14.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/applications/networking/mailreaders/thunderbird/packages.nix b/pkgs/applications/networking/mailreaders/thunderbird/packages.nix index 956842ca9bcc..e819330c18c2 100644 --- a/pkgs/applications/networking/mailreaders/thunderbird/packages.nix +++ b/pkgs/applications/networking/mailreaders/thunderbird/packages.nix @@ -44,13 +44,13 @@ rec { thunderbird-115 = (buildMozillaMach rec { pname = "thunderbird"; - version = "115.9.0"; + version = "102.15.1"; application = "comm/mail"; applicationName = "Mozilla Thunderbird"; binaryName = pname; src = fetchurl { url = "mirror://mozilla/thunderbird/releases/${version}/source/thunderbird-${version}.source.tar.xz"; - sha512 = "8ff0bed6e6d7f337ebae09011a10b59343ae7a8355ed1da2d72ec0d4218010adfae78e42565e5b784df26cef4702f313dc9616ac5ca5530fb772d77bdf7f2ea4"; + sha512 = "2c96b9cae7acbf354a6aaf7a7987f40ffddbcb8d05a579e6782afbf9c685392e29b274460e7a82426f41f604cec06cb96139be45f099121603ffe434ec8fac06"; }; extraPatches = [ # The file to be patched is different from firefox's `no-buildconfig-ffx90.patch`. Package version did not change. [result] Failed to update thunderbirdPackages.thunderbird-102 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyramid-jinja2, using log file: /var/log/nixpkgs-update/python311Packages.pyramid-jinja2/2024-04-03.log python311Packages.pyramid-jinja2 0 -> 1 attrpath: python311Packages.pyramid-jinja2 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/3a1m8qadnmxrpjkaammaw2g7hyg30y8v-packages.json.drv building '/nix/store/3a1m8qadnmxrpjkaammaw2g7hyg30y8v-packages.json.drv'... Going to be running update for following packages: - python3.11-pyramid-jinja2-2.10.1 Press Enter key to continue... Running update for: - python3.11-pyramid-jinja2-2.10.1: UPDATING ... - python3.11-pyramid-jinja2-2.10.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyramid-jinja2 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.flask-limiter, using log file: /var/log/nixpkgs-update/python311Packages.flask-limiter/2024-04-03.log python311Packages.flask-limiter 0 -> 1 attrpath: python311Packages.flask-limiter Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/r7gl4qvyrr8ayhfgxd977gwwpjgzf0nm-packages.json.drv building '/nix/store/r7gl4qvyrr8ayhfgxd977gwwpjgzf0nm-packages.json.drv'... Going to be running update for following packages: - python3.11-flask-limiter-3.5.1 Press Enter key to continue... Running update for: - python3.11-flask-limiter-3.5.1: UPDATING ... - python3.11-flask-limiter-3.5.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.flask-limiter 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath terraform-providers.keycloak, using log file: /var/log/nixpkgs-update/terraform-providers.keycloak/2024-04-03.log terraform-providers.keycloak 0 -> 1 attrpath: terraform-providers.keycloak Checking auto update branch... Derivation file opts-out of auto-updates [result] Failed to update terraform-providers.keycloak 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.aioboto3, using log file: /var/log/nixpkgs-update/python311Packages.aioboto3/2024-04-03.log python311Packages.aioboto3 0 -> 1 attrpath: python311Packages.aioboto3 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/cpnbrnj4wyc0rz2rppjjr43fb1mxnfdp-packages.json.drv building '/nix/store/cpnbrnj4wyc0rz2rppjjr43fb1mxnfdp-packages.json.drv'... Going to be running update for following packages: - python3.11-aioboto3-12.3.0 Press Enter key to continue... Running update for: - python3.11-aioboto3-12.3.0: UPDATING ... - python3.11-aioboto3-12.3.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.aioboto3 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.ipwhl, using log file: /var/log/nixpkgs-update/python311Packages.ipwhl/2024-04-03.log python311Packages.ipwhl 0 -> 1 attrpath: python311Packages.ipwhl Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/534xh6yqpwmrwv7a2jkpzvfbx8rh6cf4-packages.json.drv building '/nix/store/534xh6yqpwmrwv7a2jkpzvfbx8rh6cf4-packages.json.drv'... Going to be running update for following packages: - python3.11-ipwhl-1.1.0 Press Enter key to continue... Running update for: - python3.11-ipwhl-1.1.0: UPDATING ... - python3.11-ipwhl-1.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.ipwhl 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.generic, using log file: /var/log/nixpkgs-update/python311Packages.generic/2024-04-03.log python311Packages.generic 0 -> 1 attrpath: python311Packages.generic Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/bwbv00cl81j7dkdgil267x79asl73aww-packages.json.drv building '/nix/store/bwbv00cl81j7dkdgil267x79asl73aww-packages.json.drv'... Going to be running update for following packages: - python3.11-generic-1.1.2 Press Enter key to continue... Running update for: - python3.11-generic-1.1.2: UPDATING ... - python3.11-generic-1.1.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.generic 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath xbursttools, using log file: /var/log/nixpkgs-update/xbursttools/2024-04-03.log xbursttools 2011-12-26 -> 201206 https://repology.org/project/xburst-tools/versions attrpath: xbursttools Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/tools/misc/xburst-tools/default.nix b/pkgs/tools/misc/xburst-tools/default.nix index e850e347b29a..36ae34d67e12 100644 --- a/pkgs/tools/misc/xburst-tools/default.nix +++ b/pkgs/tools/misc/xburst-tools/default.nix @@ -3,7 +3,7 @@ }: let - version = "2011-12-26"; + version = "201206"; in stdenv.mkDerivation { pname = "xburst-tools"; @@ -12,7 +12,7 @@ stdenv.mkDerivation { src = fetchgit { url = "git://projects.qi-hardware.com/xburst-tools.git"; rev = "c71ce8e15db25fe49ce8702917cb17720882e341"; - sha256 = "1hzdngs1l5ivvwnxjwzc246am6w1mj1aidcf0awh9yw0crzcjnjr"; + sha256 = "sha256-WVrJfmaA+wS5Ao61qIKsgZuqDBHsc9kt3zsWGvSz7cM="; }; preConfigure = '' rev equal; no update necessary [result] Failed to update xbursttools 2011-12-26 -> 201206 https://repology.org/project/xburst-tools/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.walkboutr, using log file: /var/log/nixpkgs-update/rPackages.walkboutr/2024-04-03.log rPackages.walkboutr 0.4.0 -> 0.6.0 https://repology.org/project/r:walkboutr/versions attrpath: rPackages.walkboutr Checking auto update branch... No auto update branch exists Old version 0.4.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.walkboutr 0.4.0 -> 0.6.0 https://repology.org/project/r:walkboutr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cassandra, using log file: /var/log/nixpkgs-update/cassandra/2024-04-03.log cassandra 0 -> 1 attrpath: cassandra Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Failed with exit code 1 these 2 derivations will be built: /nix/store/fvdsxr696xhhwaj6hcx43y8c5w225y3b-update-cassandra_4.drv /nix/store/8q5yijlqvs7w30fm653n8p7yvd2zwkbh-packages.json.drv building '/nix/store/fvdsxr696xhhwaj6hcx43y8c5w225y3b-update-cassandra_4.drv'... building '/nix/store/8q5yijlqvs7w30fm653n8p7yvd2zwkbh-packages.json.drv'... Going to be running update for following packages: - cassandra-4.1.2 Press Enter key to continue... Running update for: - cassandra-4.1.2: UPDATING ... - cassandra-4.1.2: ERROR --- SHOWING ERROR LOG FOR cassandra-4.1.2 ---------------------- + test -d pkgs -a -d nixos -a -d lib + cd pkgs/servers/nosql/cassandra + PATH=/nix/store/y56vmnczakd9p0dsjl6jgnqrkqv04yxx-git-2.44.0/bin:/nix/store/sbl740wnxd0c90mxflkrwk3gbhqw6q2a-gnupg-2.4.5/bin:/nix/store/8wdjzjs2cd19la06lqgf48y6xpbylbqx-bash-interactive-5.2p26/bin:/nix/store/43n2dxi419b1jgv2bq1xg7y6n8k66xpb-patchelf-0.15.0/bin:/nix/store/ac1hb5dc2z4biwgy8mjrhlifffkkrvdq-gcc-wrapper-13.2.0/bin:/nix/store/a3mmr5jmrd0sjvmnc9vqvs388ppq1bnf-gcc-13.2.0/bin:/nix/store/fpv9yd0mwm1lyph02j9bdyxbjz8vaxzy-glibc-2.39-5-bin/bin:/nix/store/ifzwv2xqwdnv1gz87rxkizi67py5p3vj-coreutils-9.4/bin:/nix/store/jsjfmx7r6cpyixxsg7bjl5cy3y8hw7k7-binutils-wrapper-2.41/bin:/nix/store/hqvni28zpibl6jsqqimcvng6h6qm58xy-binutils-2.41/bin:/nix/store/ifzwv2xqwdnv1gz87rxkizi67py5p3vj-coreutils-9.4/bin:/nix/store/jg2i1qj5js5ckzvfq5b9p9j1gcv69750-findutils-4.9.0/bin:/nix/store/ksyif7fp4p0baafvdm5szd375s7qf6cz-diffutils-3.10/bin:/nix/store/237dff1igc3v09p9r23a37yw8dr04bv6-gnused-4.9/bin:/nix/store/avqi5nnx7qydr078ssgifc2hgzqipqgx-gnugrep-3.11/bin:/nix/store/2s1h0q7xhk33nsw90l0g53bxax0d19ih-gawk-5.2.2/bin:/nix/store/xwvgwr85gghbl66kj30sp19p2y1cypqv-gnutar-1.35/bin:/nix/store/vnfi66rm1dykn8gwwy5i4f48bhbk9x6x-gzip-1.13/bin:/nix/store/3bdjxil2cz8dkd6l5sf4qalla762m99d-bzip2-1.0.8-bin/bin:/nix/store/pg3wkw0as88676ib4ckbibrfwy5c5vzg-gnumake-4.4.1/bin:/nix/store/a1s263pmsci9zykm5xcdf7x9rv26w6d5-bash-5.2p26/bin:/nix/store/bf9rz7vvxannxp15wfi7x0bx5b68ky7z-patch-2.7.6/bin:/nix/store/jdg5lv2j7d765h8pn73qz72lilxrcb5x-xz-5.4.6-bin/bin:/nix/store/j3f0hag67n4piz2avqgf07gja8a2ifn6-file-5.45/bin:/nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin:/nix/store/bd0dcc9qzpfz5xfz7fm6cwf7q64cyfhi-git-2.44.0/bin:/nix/store/c7s7fmaw4b2r30124jv7fzkl7m73yz5m-openssh-9.7p1/bin:/nix/store/nk45h8dy9zlx4d0b9ghf5xnj9pypyqgh-gnugrep-3.11/bin:/nix/store/kqb7yncgd6a17nlgbixhcvcwync0nqg0-gnused-4.9/bin:/nix/store/py4wdh4qd5dacjq9gyrsg9pz9jv5bnml-curl-8.6.0-bin/bin:/nix/store/qbnwj17dgd29hy985yfina8swr08zfsk-getent-glibc-2.38-44/bin:/nix/store/a7qv8mmj7j734mn2wbqm6fz7psjlzfv0-cachix-1.7-bin/bin:/nix/store/g2r7001w2by8hjf1h92yj1bs7gix79kl-apache-httpd-2.4.58/bin:/nix/store/1qrhn2y0z92n07dfhyknw35gs920gs5w-socat-1.8.0.0/bin:/nix/store/43dnc4h7x0p8ybaq38aaxkhy722kzrx2-coreutils-9.4/bin:/nix/store/6xyv6b1l5zvzd23scbim221rxkcp8g9w-findutils-4.9.0/bin:/nix/store/nk45h8dy9zlx4d0b9ghf5xnj9pypyqgh-gnugrep-3.11/bin:/nix/store/kqb7yncgd6a17nlgbixhcvcwync0nqg0-gnused-4.9/bin:/nix/store/3np3qw5y5xarl4hxbhk9vj2d5kmgqsir-systemd-255.2/bin:/nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/sbin:/nix/store/bd0dcc9qzpfz5xfz7fm6cwf7q64cyfhi-git-2.44.0/sbin:/nix/store/c7s7fmaw4b2r30124jv7fzkl7m73yz5m-openssh-9.7p1/sbin:/nix/store/nk45h8dy9zlx4d0b9ghf5xnj9pypyqgh-gnugrep-3.11/sbin:/nix/store/kqb7yncgd6a17nlgbixhcvcwync0nqg0-gnused-4.9/sbin:/nix/store/py4wdh4qd5dacjq9gyrsg9pz9jv5bnml-curl-8.6.0-bin/sbin:/nix/store/qbnwj17dgd29hy985yfina8swr08zfsk-getent-glibc-2.38-44/sbin:/nix/store/a7qv8mmj7j734mn2wbqm6fz7psjlzfv0-cachix-1.7-bin/sbin:/nix/store/g2r7001w2by8hjf1h92yj1bs7gix79kl-apache-httpd-2.4.58/sbin:/nix/store/1qrhn2y0z92n07dfhyknw35gs920gs5w-socat-1.8.0.0/sbin:/nix/store/43dnc4h7x0p8ybaq38aaxkhy722kzrx2-coreutils-9.4/sbin:/nix/store/6xyv6b1l5zvzd23scbim221rxkcp8g9w-findutils-4.9.0/sbin:/nix/store/nk45h8dy9zlx4d0b9ghf5xnj9pypyqgh-gnugrep-3.11/sbin:/nix/store/kqb7yncgd6a17nlgbixhcvcwync0nqg0-gnused-4.9/sbin:/nix/store/3np3qw5y5xarl4hxbhk9vj2d5kmgqsir-systemd-255.2/sbin ++ mktemp -d + tmp=/run/nixpkgs-update-worker/tmp.NLk0dJHM6r + trap cleanup EXIT + git ls-remote --tags https://github.com/apache/cassandra + awk '{ if (match($0, /refs.tags.cassandra-([0-9.]*)$/, m)) print m[1] }' + sort -V + tac ++ grep -E '^4' ++ head -n 1 + version=4.1.4 + path=cassandra/4.1.4/apache-cassandra-4.1.4-bin.tar.gz + curl https://downloads.apache.org/cassandra/4.1.4/apache-cassandra-4.1.4-bin.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 48.0M 100 48.0M 0 0 91.9M 0 --:--:-- --:--:-- --:--:-- 92.1M + curl https://downloads.apache.org/cassandra/4.1.4/apache-cassandra-4.1.4-bin.tar.gz.asc % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 833 100 833 0 0 14656 0 --:--:-- --:--:-- --:--:-- 14875 + for key in A4C465FEA0C552561A392A61E91335D77E3E87CB + gpg --trustdb-name /run/nixpkgs-update-worker/tmp.NLk0dJHM6r/trust.db --batch --recv-keys A4C465FEA0C552561A392A61E91335D77E3E87CB gpg: key E91335D77E3E87CB: "Michael Semb Wever " not changed gpg: Total number processed: 1 gpg: unchanged: 1 + echo A4C465FEA0C552561A392A61E91335D77E3E87CB:5: + gpg --trustdb-name /run/nixpkgs-update-worker/tmp.NLk0dJHM6r/trust.db --batch --import-ownertrust gpg: /run/nixpkgs-update-worker/tmp.NLk0dJHM6r/trust.db: trustdb created gpg: inserting ownertrust of 5 + gpg --trustdb-name /run/nixpkgs-update-worker/tmp.NLk0dJHM6r/trust.db --batch --verify --trust-model direct /run/nixpkgs-update-worker/tmp.NLk0dJHM6r/src.tar.gz.asc /run/nixpkgs-update-worker/tmp.NLk0dJHM6r/src.tar.gz gpg: Signature made Tue 23 Jan 2024 07:45:06 PM UTC gpg: using RSA key 7464AAD9068241C50BA6A26232F35CB2F546D93E gpg: Can't check signature: No public key + cleanup + rm -rf /run/nixpkgs-update-worker/tmp.NLk0dJHM6r --- SHOWING ERROR LOG FOR cassandra-4.1.2 ---------------------- The update script for cassandra-4.1.2 failed with exit code 2 [result] Failed to update cassandra 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.webtest-aiohttp, using log file: /var/log/nixpkgs-update/python311Packages.webtest-aiohttp/2024-04-03.log python311Packages.webtest-aiohttp 0 -> 1 attrpath: python311Packages.webtest-aiohttp Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/6k5hswc38fxq76cvf6sb0lc2r65iq01q-packages.json.drv building '/nix/store/6k5hswc38fxq76cvf6sb0lc2r65iq01q-packages.json.drv'... Going to be running update for following packages: - python3.11-webtest-aiohttp-2.0.0 Press Enter key to continue... Running update for: - python3.11-webtest-aiohttp-2.0.0: UPDATING ... - python3.11-webtest-aiohttp-2.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.webtest-aiohttp 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.validobj, using log file: /var/log/nixpkgs-update/python311Packages.validobj/2024-04-03.log python311Packages.validobj 0 -> 1 attrpath: python311Packages.validobj Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/y0yqhffpsdv650zrsd2d41qhnvb6p52d-packages.json.drv building '/nix/store/y0yqhffpsdv650zrsd2d41qhnvb6p52d-packages.json.drv'... Going to be running update for following packages: - python3.11-validobj-1.2 Press Enter key to continue... Running update for: - python3.11-validobj-1.2: UPDATING ... - python3.11-validobj-1.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.validobj 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath scons_3_1_2, using log file: /var/log/nixpkgs-update/scons_3_1_2/2024-04-03.log scons_3_1_2 0 -> 1 attrpath: scons_3_1_2 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/kx0ah2rmqry71kiarhwz6wg32pp4wypy-packages.json.drv building '/nix/store/kx0ah2rmqry71kiarhwz6wg32pp4wypy-packages.json.drv'... Going to be running update for following packages: - scons-3.1.2 Press Enter key to continue... Running update for: - scons-3.1.2: UPDATING ... - scons-3.1.2: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/tools/build-managers/scons/3.1.2.nix b/pkgs/development/tools/build-managers/scons/3.1.2.nix index 0bac0685b0d1..e2b0d840bd87 100644 --- a/pkgs/development/tools/build-managers/scons/3.1.2.nix +++ b/pkgs/development/tools/build-managers/scons/3.1.2.nix @@ -2,12 +2,12 @@ let pname = "scons"; - version = "3.1.2"; + version = "4.7.0"; src = fetchFromGitHub { owner = "Scons"; repo = "scons"; - rev = version; - hash = "sha256-C3U4N7+9vplzoJoevQe5Zeuz0TDmB6/miMwBJLzA3WA="; + rev = "refs/tags/${version}"; + hash = "sha256-7VzGuz9CAUF6MRCEpj5z1FkZD19/Ic+YBukYQocvkr0="; }; in python3.pkgs.buildPythonApplication { No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A scons_3_1_2 nix build failed. got build log for 'scons_3_1_2' from 'daemon' Sourcing python-remove-tests-dir-hook Sourcing python-catch-conflicts-hook.sh Sourcing python-remove-bin-bytecode-hook.sh Sourcing setuptools-build-hook Using setuptoolsBuildPhase Using setuptoolsShellHook Sourcing pypa-install-hook Using pypaInstallPhase Sourcing python-imports-check-hook.sh Using pythonImportsCheckPhase Sourcing python-namespaces-hook Sourcing python-catch-conflicts-hook.sh Sourcing setuptools-check-hook Using setuptoolsCheckPhase @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/q0jm2w0l6zdhf47fvc2y1h47g21l1x81-source source root is source setting SOURCE_DATE_EPOCH to timestamp 315619200 of file source/timings/js/plotter.js @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase @nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" } Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "configurePhase" } Running phase: configurePhase python: can't open file '/build/source/bootstrap.py': [Errno 2] No such file or directory /nix/store/v5lsd029lz5lfhamivbgqyp3zdv94ah2-stdenv-linux/setup: line 131: pop_var_context: head of shell_variables not a function context [result] Failed to update scons_3_1_2 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.matchpy, using log file: /var/log/nixpkgs-update/python311Packages.matchpy/2024-04-03.log python311Packages.matchpy 0 -> 1 attrpath: python311Packages.matchpy Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/7w581j864c863sql452mm9js20wa5hs5-packages.json.drv building '/nix/store/7w581j864c863sql452mm9js20wa5hs5-packages.json.drv'... Going to be running update for following packages: - python3.11-matchpy-0.5.5 Press Enter key to continue... Running update for: - python3.11-matchpy-0.5.5: UPDATING ... - python3.11-matchpy-0.5.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.matchpy 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath zcash, using log file: /var/log/nixpkgs-update/zcash/2024-04-03.log zcash 5.4.2 -> 5.8.0 https://repology.org/project/zcash/versions attrpath: zcash Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] Replacing cargoHash with sha256-3DPgCLyTenDZO5xvPVbK92Wx1v7rHHP9AcX5E3s45hg= Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A zcash nix build failed. error: unknown warning option '-Wgnu-null-pointer-arithmetic'; did you mean '-Wnull-pointer-arithmetic'? [-Werror,-Wunknown-warning-option] make[3]: *** [Makefile:6096: libbitcoin_server_a-net.o] Error 1 error: unknown warning option '-Wgnu-pointer-arith'; did you mean '-Wpointer-arith'? [-Werror,-Wunknown-warning-option] error: unknown warning option '-Winvalid-utf8'; did you mean '-Winvalid-iboutlet'? [-Werror,-Wunknown-warning-option] make[3]: *** [Makefile:5984: libbitcoin_server_a-httprpc.o] Error 1 make[3]: *** [Makefile:5872: libbitcoin_server_a-alert.o] Error 1 error: unknown warning option '-Wunreachable-code-generic-assoc' [-Werror,-Wunknown-warning-option] make[3]: *** [Makefile:6110: libbitcoin_server_a-noui.o] Error 1 make[3]: *** [Makefile:5998: libbitcoin_server_a-httpserver.o] Error 1 make[3]: *** [Makefile:6012: libbitcoin_server_a-init.o] Error 1 make[3]: *** [Makefile:6026: libbitcoin_server_a-dbwrapper.o] Error 1 error: error: unknown warning option '-Wgnu-line-marker'; did you mean '-Wgnu-case-range'? [-Werror,-Wunknown-warning-option]unknown warning option '-Wgnu-line-marker'; did you mean '-Wgnu-case-range'? [-Werror,-Wunknown-warning-option]  error: unknown warning option '-Wgnu-null-pointer-arithmetic'; did you mean '-Wnull-pointer-arithmetic'? [-Werror,-Wunknown-warning-option]error: unknown warning option '-Wgnu-null-pointer-arithmetic'; did you mean '-Wnull-pointer-arithmetic'? [-Werror,-Wunknown-warning-option] make[3]: *** [Makefile:6082: libbitcoin_server_a-miner.o] Error 1 error: unknown warning option '-Wgnu-pointer-arith'; did you mean '-Wpointer-arith'? [-Werror,-Wunknown-warning-option]error: unknown warning option '-Wgnu-pointer-arith'; did you mean '-Wpointer-arith'? [-Werror,-Wunknown-warning-option] error: unknown warning option '-Winvalid-utf8'; did you mean '-Winvalid-iboutlet'? [-Werror,-Wunknown-warning-option]error:  unknown warning option '-Winvalid-utf8'; did you mean '-Winvalid-iboutlet'? [-Werror,-Wunknown-warning-option] error: unknown warning option '-Wunreachable-code-generic-assoc' [-Werror,-Wunknown-warning-option] error: unknown warning option '-Wunreachable-code-generic-assoc' [-Werror,-Wunknown-warning-option] make[3]: *** [Makefile:6138: libbitcoin_server_a-pow.o] Error 1 make[3]: *** [Makefile:6152: libbitcoin_server_a-rest.o] Error 1 make[3]: Leaving directory '/build/source/src' make[2]: *** [Makefile:9394: all-recursive] Error 1 make[2]: Leaving directory '/build/source/src' make[1]: *** [Makefile:2950: all] Error 2 make[1]: Leaving directory '/build/source/src' make: *** [Makefile:647: all-recursive] Error 1 [result] Failed to update zcash 5.4.2 -> 5.8.0 https://repology.org/project/zcash/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.sdkmanager, using log file: /var/log/nixpkgs-update/python312Packages.sdkmanager/2024-04-03.log python312Packages.sdkmanager 0.6.6 -> 0.6.7 https://repology.org/project/sdkmanager/versions attrpath: python312Packages.sdkmanager Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/v73c7k069jmj7cwzs1ddaajsc1yzgpvv-packages.json.drv building '/nix/store/v73c7k069jmj7cwzs1ddaajsc1yzgpvv-packages.json.drv'... Going to be running update for following packages: - python3.12-sdkmanager-0.6.6 Press Enter key to continue... Running update for: - python3.12-sdkmanager-0.6.6: UPDATING ... - python3.12-sdkmanager-0.6.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python312Packages.sdkmanager 0.6.6 -> 0.6.7 https://repology.org/project/sdkmanager/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.avidtools, using log file: /var/log/nixpkgs-update/python311Packages.avidtools/2024-04-03.log python311Packages.avidtools 0 -> 1 attrpath: python311Packages.avidtools Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/l7qp4nwyrw5qjah76jjpszv9qijm6g11-packages.json.drv building '/nix/store/l7qp4nwyrw5qjah76jjpszv9qijm6g11-packages.json.drv'... Going to be running update for following packages: - python3.11-avidtools-0.1.2 Press Enter key to continue... Running update for: - python3.11-avidtools-0.1.2: UPDATING ... - python3.11-avidtools-0.1.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.avidtools 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.collidoscope, using log file: /var/log/nixpkgs-update/python311Packages.collidoscope/2024-04-03.log python311Packages.collidoscope 0 -> 1 attrpath: python311Packages.collidoscope Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/9nzbbs1qghqriw69k001vplapgb2pr4n-packages.json.drv building '/nix/store/9nzbbs1qghqriw69k001vplapgb2pr4n-packages.json.drv'... Going to be running update for following packages: - python3.11-collidoscope-0.6.5 Press Enter key to continue... Running update for: - python3.11-collidoscope-0.6.5: UPDATING ... - python3.11-collidoscope-0.6.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.collidoscope 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.skytemple-dtef, using log file: /var/log/nixpkgs-update/python311Packages.skytemple-dtef/2024-04-03.log python311Packages.skytemple-dtef 0 -> 1 attrpath: python311Packages.skytemple-dtef Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/vr547z7c7lvqdfi2ps5ri02bcc3hmfav-packages.json.drv building '/nix/store/vr547z7c7lvqdfi2ps5ri02bcc3hmfav-packages.json.drv'... Going to be running update for following packages: - python3.11-skytemple-dtef-1.6.1 Press Enter key to continue... Running update for: - python3.11-skytemple-dtef-1.6.1: UPDATING ... - python3.11-skytemple-dtef-1.6.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.skytemple-dtef 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath regexploit, using log file: /var/log/nixpkgs-update/regexploit/2024-04-03.log regexploit 0 -> 1 attrpath: regexploit Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/8ssmc2dn0bwwyzliqvzsxhhavq7k45b1-packages.json.drv building '/nix/store/8ssmc2dn0bwwyzliqvzsxhhavq7k45b1-packages.json.drv'... Going to be running update for following packages: - regexploit-1.0.0 Press Enter key to continue... Running update for: - regexploit-1.0.0: UPDATING ... - regexploit-1.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update regexploit 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.aiobotocore, using log file: /var/log/nixpkgs-update/python311Packages.aiobotocore/2024-04-03.log python311Packages.aiobotocore 0 -> 1 attrpath: python311Packages.aiobotocore Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/bvbz7ymnmz32vgdfwqj53kknypa107q3-packages.json.drv building '/nix/store/bvbz7ymnmz32vgdfwqj53kknypa107q3-packages.json.drv'... cannot link '/nix/store/.links/1bk1arn0wakjin2gcnw0kr9l2yr9lacklkr877sf9dx5imn27z2c' to '/nix/store/zy1qvhhwbp96rvq67p7kg1fbhdjghw3s-packages.json': No space left on device Going to be running update for following packages: - python3.11-aiobotocore-2.12.1 Press Enter key to continue... Running update for: - python3.11-aiobotocore-2.12.1: UPDATING ... - python3.11-aiobotocore-2.12.1: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/aiobotocore/default.nix b/pkgs/development/python-modules/aiobotocore/default.nix index 525e482a42f7..7b0373d08b43 100644 --- a/pkgs/development/python-modules/aiobotocore/default.nix +++ b/pkgs/development/python-modules/aiobotocore/default.nix @@ -20,7 +20,7 @@ buildPythonPackage rec { pname = "aiobotocore"; - version = "2.12.1"; + version = "2.12.2"; pyproject = true; disabled = pythonOlder "3.8"; @@ -29,7 +29,7 @@ buildPythonPackage rec { owner = "aio-libs"; repo = "aiobotocore"; rev = "refs/tags/${version}"; - hash = "sha256-+CXKDk6crCPTVpVfcDWy+1UzS05oTu1RtIvDcVrEmFU="; + hash = "sha256-AIOMyyEzg5TubEyNnHi2AGPNHLYCb+f33VM4rSCeJ9g="; }; # Relax version constraints: aiobotocore works with newer botocore versions No auto update branch exists [outpaths] eval start [outpaths] eval end Python package with too many package rebuilds 727 > 500 [result] Failed to update python311Packages.aiobotocore 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.sphinx, using log file: /var/log/nixpkgs-update/python311Packages.sphinx/2024-04-03.log python311Packages.sphinx 0 -> 1 attrpath: python311Packages.sphinx Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/lxz1s55vkq66hrs7wp7bbz8gp85siqzw-packages.json.drv building '/nix/store/lxz1s55vkq66hrs7wp7bbz8gp85siqzw-packages.json.drv'... Going to be running update for following packages: - python3.11-sphinx-7.2.6 Press Enter key to continue... Running update for: - python3.11-sphinx-7.2.6: UPDATING ... - python3.11-sphinx-7.2.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.sphinx 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.hawkesbow, using log file: /var/log/nixpkgs-update/rPackages.hawkesbow/2024-04-03.log rPackages.hawkesbow 1.0.2 -> 1.0.3 https://repology.org/project/r:hawkesbow/versions attrpath: rPackages.hawkesbow Checking auto update branch... No auto update branch exists Old version 1.0.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.hawkesbow 1.0.2 -> 1.0.3 https://repology.org/project/r:hawkesbow/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.aiosmtplib, using log file: /var/log/nixpkgs-update/python311Packages.aiosmtplib/2024-04-03.log python311Packages.aiosmtplib 0 -> 1 attrpath: python311Packages.aiosmtplib Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/cz63yn2h2kmqp1s3v33s2xcvqkj2b7a0-packages.json.drv building '/nix/store/cz63yn2h2kmqp1s3v33s2xcvqkj2b7a0-packages.json.drv'... Going to be running update for following packages: - python3.11-aiosmtplib-3.0.1 Press Enter key to continue... Running update for: - python3.11-aiosmtplib-3.0.1: UPDATING ... - python3.11-aiosmtplib-3.0.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.aiosmtplib 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.circuit-webhook, using log file: /var/log/nixpkgs-update/python311Packages.circuit-webhook/2024-04-03.log python311Packages.circuit-webhook 0 -> 1 attrpath: python311Packages.circuit-webhook Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/3fvwwjh66236i2bigjn8bhqfgj99yn8b-packages.json.drv building '/nix/store/3fvwwjh66236i2bigjn8bhqfgj99yn8b-packages.json.drv'... Going to be running update for following packages: - python3.11-circuit-webhook-1.0.1 Press Enter key to continue... Running update for: - python3.11-circuit-webhook-1.0.1: UPDATING ... - python3.11-circuit-webhook-1.0.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.circuit-webhook 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.parsermd, using log file: /var/log/nixpkgs-update/rPackages.parsermd/2024-04-03.log rPackages.parsermd 0.1.2 -> 0.1.3 https://repology.org/project/r:parsermd/versions attrpath: rPackages.parsermd Checking auto update branch... No auto update branch exists Old version 0.1.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.parsermd 0.1.2 -> 0.1.3 https://repology.org/project/r:parsermd/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.flask-babel, using log file: /var/log/nixpkgs-update/python311Packages.flask-babel/2024-04-03.log python311Packages.flask-babel 0 -> 1 attrpath: python311Packages.flask-babel Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/c9317482br2h84x9agjkq4667acnwzzn-packages.json.drv building '/nix/store/c9317482br2h84x9agjkq4667acnwzzn-packages.json.drv'... Going to be running update for following packages: - python3.11-flask-babel-4.0.0 Press Enter key to continue... Running update for: - python3.11-flask-babel-4.0.0: UPDATING ... - python3.11-flask-babel-4.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.flask-babel 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath octodns-providers.gandi, using log file: /var/log/nixpkgs-update/octodns-providers.gandi/2024-04-03.log octodns-providers.gandi 0 -> 1 attrpath: octodns-providers.gandi Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/7b8d3nyigi0klhrg4xycg065bw2ng41s-packages.json.drv building '/nix/store/7b8d3nyigi0klhrg4xycg065bw2ng41s-packages.json.drv'... Going to be running update for following packages: - python3.11-octodns-gandi-0.0.3 Press Enter key to continue... Running update for: - python3.11-octodns-gandi-0.0.3: UPDATING ... - python3.11-octodns-gandi-0.0.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update octodns-providers.gandi 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath darkplaces, using log file: /var/log/nixpkgs-update/darkplaces/2024-04-03.log darkplaces 2022-05-10 -> 20140513 https://repology.org/project/darkplaces/versions attrpath: darkplaces Checking auto update branch... No auto update branch exists [version] Hashes equal; no update necessary [result] Failed to update darkplaces 2022-05-10 -> 20140513 https://repology.org/project/darkplaces/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath bcompare, using log file: /var/log/nixpkgs-update/bcompare/2024-04-03.log bcompare 4.4.6.27483 -> 4.4.7.28397 https://repology.org/project/bcompare/versions attrpath: bcompare Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update bcompare 4.4.6.27483 -> 4.4.7.28397 https://repology.org/project/bcompare/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath octavePackages.database, using log file: /var/log/nixpkgs-update/octavePackages.database/2024-04-03.log octavePackages.database 0 -> 1 attrpath: octavePackages.database Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/vmap66yyar7m4sz8hsz5c1ncpw2jzx0m-packages.json.drv building '/nix/store/vmap66yyar7m4sz8hsz5c1ncpw2jzx0m-packages.json.drv'... Going to be running update for following packages: - octave-8.4.0-database-2.4.4 Press Enter key to continue... Running update for: - octave-8.4.0-database-2.4.4: UPDATING ... - octave-8.4.0-database-2.4.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update octavePackages.database 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.opentelemetry-instrumentation-grpc, using log file: /var/log/nixpkgs-update/python311Packages.opentelemetry-instrumentation-grpc/2024-04-03.log python311Packages.opentelemetry-instrumentation-grpc 0 -> 1 attrpath: python311Packages.opentelemetry-instrumentation-grpc Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/f3r8f49lj3vj9mc3d9gy78p1v5xq8yxa-packages.json.drv building '/nix/store/f3r8f49lj3vj9mc3d9gy78p1v5xq8yxa-packages.json.drv'... Going to be running update for following packages: - python3.11-opentelemetry-instrumentation-grpc-0.44b0 Press Enter key to continue... Running update for: - python3.11-opentelemetry-instrumentation-grpc-0.44b0: UPDATING ... - python3.11-opentelemetry-instrumentation-grpc-0.44b0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.opentelemetry-instrumentation-grpc 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pytelegrambotapi, using log file: /var/log/nixpkgs-update/python311Packages.pytelegrambotapi/2024-04-03.log python311Packages.pytelegrambotapi 0 -> 1 attrpath: python311Packages.pytelegrambotapi Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/8x69lc7vdwdsm26vjn4r0pl7kpc9hqny-packages.json.drv building '/nix/store/8x69lc7vdwdsm26vjn4r0pl7kpc9hqny-packages.json.drv'... Going to be running update for following packages: - python3.11-pytelegrambotapi-4.16.0 Press Enter key to continue... Running update for: - python3.11-pytelegrambotapi-4.16.0: UPDATING ... - python3.11-pytelegrambotapi-4.16.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pytelegrambotapi 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pytest-openfiles, using log file: /var/log/nixpkgs-update/python311Packages.pytest-openfiles/2024-04-03.log python311Packages.pytest-openfiles 0 -> 1 attrpath: python311Packages.pytest-openfiles Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/ypsbq4dhldwqkd918xsmg03452g78y6f-packages.json.drv building '/nix/store/ypsbq4dhldwqkd918xsmg03452g78y6f-packages.json.drv'... Going to be running update for following packages: - python3.11-pytest-openfiles-0.5.0 Press Enter key to continue... Running update for: - python3.11-pytest-openfiles-0.5.0: UPDATING ... - python3.11-pytest-openfiles-0.5.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pytest-openfiles 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath open-stage-control, using log file: /var/log/nixpkgs-update/open-stage-control/2024-04-03.log open-stage-control 0 -> 1 attrpath: open-stage-control Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] skipping because derivation has updateScript [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/cx3s86klmgk49g5p3ik8ihq1kgzdq80p-packages.json.drv building '/nix/store/cx3s86klmgk49g5p3ik8ihq1kgzdq80p-packages.json.drv'... Going to be running update for following packages: - open-stage-control-1.26.1 Press Enter key to continue... Running update for: - open-stage-control-1.26.1: UPDATING ... - open-stage-control-1.26.1: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/applications/audio/open-stage-control/default.nix b/pkgs/applications/audio/open-stage-control/default.nix index b789dc668a8e..60b9bc23bc36 100644 --- a/pkgs/applications/audio/open-stage-control/default.nix +++ b/pkgs/applications/audio/open-stage-control/default.nix @@ -12,13 +12,13 @@ buildNpmPackage rec { pname = "open-stage-control"; - version = "1.26.1"; + version = "1.26.2"; src = fetchFromGitHub { owner = "jean-emmanuel"; repo = "open-stage-control"; rev = "v${version}"; - hash = "sha256-uw9vj12vs2N4nap6z1L6sGoCuPpRCmvfGoK/b+zHwHA="; + hash = "sha256-hBQyz6VAtiC1XOADZml1MwGKtmdyiJNlRAmHRjt6QsA="; }; # Remove some Electron stuff from package.json No auto update branch exists [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/a71xx2fmlsb5jqd6l6wxa7hnw3dbxvpf-open-stage-control-1.26.2" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • open-stage-control
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from passthru.updateScript. meta.description for open-stage-control is: Libre and modular OSC / MIDI controller meta.homepage for open-stage-control is: https://openstagecontrol.ammd.net/ ###### Updates performed - Ran passthru.UpdateScript ###### To inspect upstream changes - [Release on GitHub](https://github.com/jean-emmanuel/open-stage-control/releases/tag/v1.26.2) - [Compare changes on GitHub](https://github.com/jean-emmanuel/open-stage-control/compare/v1.26.1...v1.26.2) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 1.26.2 with grep in /nix/store/a71xx2fmlsb5jqd6l6wxa7hnw3dbxvpf-open-stage-control-1.26.2 - found 1.26.2 in filename of file in /nix/store/a71xx2fmlsb5jqd6l6wxa7hnw3dbxvpf-open-stage-control-1.26.2 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath open-stage-control ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/a71xx2fmlsb5jqd6l6wxa7hnw3dbxvpf-open-stage-control-1.26.2 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A open-stage-control https://github.com/r-ryantm/nixpkgs/archive/9c555ad2ea67ba4ac8a68bd6395509d9a61b0bc6.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/9c555ad2ea67ba4ac8a68bd6395509d9a61b0bc6#open-stage-control ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/a71xx2fmlsb5jqd6l6wxa7hnw3dbxvpf-open-stage-control-1.26.2 ls -la /nix/store/a71xx2fmlsb5jqd6l6wxa7hnw3dbxvpf-open-stage-control-1.26.2/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • open-stage-control
--- ###### Maintainer pings cc @lilyinstarlight for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301183 [result] Success updating open-stage-control 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pytest-httpserver, using log file: /var/log/nixpkgs-update/python311Packages.pytest-httpserver/2024-04-03.log python311Packages.pytest-httpserver 0 -> 1 attrpath: python311Packages.pytest-httpserver Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/madir58jh74f0gc3484sr905cmvxan1p-packages.json.drv building '/nix/store/madir58jh74f0gc3484sr905cmvxan1p-packages.json.drv'... Going to be running update for following packages: - python3.11-pytest-httpserver-1.0.10 Press Enter key to continue... Running update for: - python3.11-pytest-httpserver-1.0.10: UPDATING ... - python3.11-pytest-httpserver-1.0.10: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pytest-httpserver 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath aws-c-auth, using log file: /var/log/nixpkgs-update/aws-c-auth/2024-04-03.log aws-c-auth 0.7.10 -> 0.7.16 https://repology.org/project/aws-c-auth/versions attrpath: aws-c-auth Checking auto update branch... No auto update branch exists Old version 0.7.10" not present in staging derivation file with contents: { lib , stdenv , fetchFromGitHub , aws-c-cal , aws-c-common , aws-c-compression , aws-c-http , aws-c-io , aws-c-sdkutils , cmake , nix , s2n-tls }: stdenv.mkDerivation rec { pname = "aws-c-auth"; version = "0.7.16"; src = fetchFromGitHub { owner = "awslabs"; repo = "aws-c-auth"; rev = "v${version}"; hash = "sha256-76sBv4oChDrkv80HPktkULFNC37kfTNxjlwNg/FJiyA="; }; nativeBuildInputs = [ cmake ]; buildInputs = [ aws-c-cal aws-c-common aws-c-compression aws-c-http aws-c-io s2n-tls ]; propagatedBuildInputs = [ aws-c-sdkutils ]; cmakeFlags = [ "-DBUILD_SHARED_LIBS=ON" ]; passthru.tests = { inherit nix; }; meta = with lib; { description = "C99 library implementation of AWS client-side authentication"; homepage = "https://github.com/awslabs/aws-c-auth"; license = licenses.asl20; platforms = platforms.unix; maintainers = with maintainers; [ r-burns ]; }; } [result] Failed to update aws-c-auth 0.7.10 -> 0.7.16 https://repology.org/project/aws-c-auth/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.sniffio, using log file: /var/log/nixpkgs-update/python311Packages.sniffio/2024-04-03.log python311Packages.sniffio 0 -> 1 attrpath: python311Packages.sniffio Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/q1686ql8p3kbw9kb3w87x032gpp6k7qi-packages.json.drv building '/nix/store/q1686ql8p3kbw9kb3w87x032gpp6k7qi-packages.json.drv'... Going to be running update for following packages: - python3.11-sniffio-1.3.1 Press Enter key to continue... Running update for: - python3.11-sniffio-1.3.1: UPDATING ... - python3.11-sniffio-1.3.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.sniffio 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.single-version, using log file: /var/log/nixpkgs-update/python311Packages.single-version/2024-04-03.log python311Packages.single-version 0 -> 1 attrpath: python311Packages.single-version Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/kns833ga78qmdpvbcfyprj6d8q8wgh6n-packages.json.drv building '/nix/store/kns833ga78qmdpvbcfyprj6d8q8wgh6n-packages.json.drv'... Going to be running update for following packages: - python3.11-single-version-1.6.0 Press Enter key to continue... Running update for: - python3.11-single-version-1.6.0: UPDATING ... - python3.11-single-version-1.6.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.single-version 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath s3ql, using log file: /var/log/nixpkgs-update/s3ql/2024-04-03.log s3ql 0 -> 1 attrpath: s3ql Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/sck9p8bakbz8yi43n3hwj607w1b6jmql-packages.json.drv building '/nix/store/sck9p8bakbz8yi43n3hwj607w1b6jmql-packages.json.drv'... Going to be running update for following packages: - s3ql-4.0.0 Press Enter key to continue... Running update for: - s3ql-4.0.0: UPDATING ... - s3ql-4.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update s3ql 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath anki, using log file: /var/log/nixpkgs-update/anki/2024-04-03.log anki 0 -> 1 attrpath: anki Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/q725lxd0nxc2prc418a2jm3pv8ck0xh5-packages.json.drv building '/nix/store/q725lxd0nxc2prc418a2jm3pv8ck0xh5-packages.json.drv'... Going to be running update for following packages: - anki-23.12.1 Press Enter key to continue... Running update for: - anki-23.12.1: UPDATING ... - anki-23.12.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update anki 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath fbvnc, using log file: /var/log/nixpkgs-update/fbvnc/2024-04-03.log fbvnc 1.0.2 -> 20130314 https://repology.org/project/fbvnc/versions attrpath: fbvnc Checking auto update branch... No auto update branch exists [version] Hashes equal; no update necessary [result] Failed to update fbvnc 1.0.2 -> 20130314 https://repology.org/project/fbvnc/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.venstarcolortouch, using log file: /var/log/nixpkgs-update/python311Packages.venstarcolortouch/2024-04-03.log python311Packages.venstarcolortouch 0 -> 1 attrpath: python311Packages.venstarcolortouch Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/4fsdzpn73mrwldivlazrlhixn54qs8cs-packages.json.drv building '/nix/store/4fsdzpn73mrwldivlazrlhixn54qs8cs-packages.json.drv'... Going to be running update for following packages: - python3.11-venstarcolortouch-0.19 Press Enter key to continue... Running update for: - python3.11-venstarcolortouch-0.19: UPDATING ... - python3.11-venstarcolortouch-0.19: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.venstarcolortouch 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.gql, using log file: /var/log/nixpkgs-update/python311Packages.gql/2024-04-03.log python311Packages.gql 0 -> 1 attrpath: python311Packages.gql Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/yy00if1hkvzjhmjm1jd6r6bwwmarf59p-packages.json.drv building '/nix/store/yy00if1hkvzjhmjm1jd6r6bwwmarf59p-packages.json.drv'... Going to be running update for following packages: - python3.11-gql-3.5.0 Press Enter key to continue... Running update for: - python3.11-gql-3.5.0: UPDATING ... - python3.11-gql-3.5.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.gql 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.django-autocomplete-light, using log file: /var/log/nixpkgs-update/python311Packages.django-autocomplete-light/2024-04-03.log python311Packages.django-autocomplete-light 0 -> 1 attrpath: python311Packages.django-autocomplete-light Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/6h6naj0mc35ym5whfz6262gnnyi9il4l-packages.json.drv building '/nix/store/6h6naj0mc35ym5whfz6262gnnyi9il4l-packages.json.drv'... Going to be running update for following packages: - python3.11-django-autocomplete-light-3.9.4 Press Enter key to continue... Running update for: - python3.11-django-autocomplete-light-3.9.4: UPDATING ... - python3.11-django-autocomplete-light-3.9.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.django-autocomplete-light 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.area, using log file: /var/log/nixpkgs-update/python311Packages.area/2024-04-03.log python311Packages.area 0 -> 1 attrpath: python311Packages.area Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/qz3wx44zsxlmhcbxcpaqkk906qrvimp0-packages.json.drv building '/nix/store/qz3wx44zsxlmhcbxcpaqkk906qrvimp0-packages.json.drv'... Going to be running update for following packages: - python3.11-area-1.1.1 Press Enter key to continue... Running update for: - python3.11-area-1.1.1: UPDATING ... - python3.11-area-1.1.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.area 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.picos, using log file: /var/log/nixpkgs-update/python311Packages.picos/2024-04-03.log python311Packages.picos 0 -> 1 attrpath: python311Packages.picos Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/9n18nbbhyzxymbqhxdc02ijzvqip6s39-packages.json.drv building '/nix/store/9n18nbbhyzxymbqhxdc02ijzvqip6s39-packages.json.drv'... Going to be running update for following packages: - python3.11-picos-2.0 Press Enter key to continue... Running update for: - python3.11-picos-2.0: UPDATING ... - python3.11-picos-2.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.picos 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.slack-bolt, using log file: /var/log/nixpkgs-update/python311Packages.slack-bolt/2024-04-03.log python311Packages.slack-bolt 0 -> 1 attrpath: python311Packages.slack-bolt Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/5sg3crczqhb7wv2a27qx50dgqxg282cf-packages.json.drv building '/nix/store/5sg3crczqhb7wv2a27qx50dgqxg282cf-packages.json.drv'... Going to be running update for following packages: - python3.11-slack-bolt-1.18.1 Press Enter key to continue... Running update for: - python3.11-slack-bolt-1.18.1: UPDATING ... - python3.11-slack-bolt-1.18.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.slack-bolt 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.mindsdb-evaluator, using log file: /var/log/nixpkgs-update/python311Packages.mindsdb-evaluator/2024-04-03.log python311Packages.mindsdb-evaluator 0 -> 1 attrpath: python311Packages.mindsdb-evaluator Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/syxlqf1v444lk0yysfl2x3qgs0wv8nca-packages.json.drv building '/nix/store/syxlqf1v444lk0yysfl2x3qgs0wv8nca-packages.json.drv'... Going to be running update for following packages: - python3.11-mindsdb-evaluator-0.0.12 Press Enter key to continue... Running update for: - python3.11-mindsdb-evaluator-0.0.12: UPDATING ... - python3.11-mindsdb-evaluator-0.0.12: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.mindsdb-evaluator 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath obs-studio-plugins.obs-backgroundremoval, using log file: /var/log/nixpkgs-update/obs-studio-plugins.obs-backgroundremoval/2024-04-03.log obs-studio-plugins.obs-backgroundremoval 0.5.16 -> 1.1.13 https://repology.org/project/obs-backgroundremoval/versions attrpath: obs-studio-plugins.obs-backgroundremoval Checking auto update branch... No auto update branch exists There might already be an open PR for this update: - obs-studio-plugins.obs-backgroundremoval: 0.5.16 -> 1.1.13 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/230775" [result] Failed to update obs-studio-plugins.obs-backgroundremoval 0.5.16 -> 1.1.13 https://repology.org/project/obs-backgroundremoval/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.ete3, using log file: /var/log/nixpkgs-update/python311Packages.ete3/2024-04-03.log python311Packages.ete3 0 -> 1 attrpath: python311Packages.ete3 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/73rqppcjagmmk3ka0adc2fxhpvrq7yb5-packages.json.drv building '/nix/store/73rqppcjagmmk3ka0adc2fxhpvrq7yb5-packages.json.drv'... cannot link '/nix/store/.links/0ikci7mrgk4mqj56n1qf8nsisixcndq9z450i790s0ixd3va4wyp' to '/nix/store/8qkdf5v1jkb3i7msd77pbzimcbp8plln-packages.json': No space left on device Going to be running update for following packages: - python3.11-ete3-3.1.3 Press Enter key to continue... Running update for: - python3.11-ete3-3.1.3: UPDATING ... - python3.11-ete3-3.1.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.ete3 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyhomematic, using log file: /var/log/nixpkgs-update/python311Packages.pyhomematic/2024-04-03.log python311Packages.pyhomematic 0 -> 1 attrpath: python311Packages.pyhomematic Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/rkp86jdfg78l8fzyfb894vx0iac1cv1z-packages.json.drv building '/nix/store/rkp86jdfg78l8fzyfb894vx0iac1cv1z-packages.json.drv'... Going to be running update for following packages: - python3.11-pyhomematic-0.1.78 Press Enter key to continue... Running update for: - python3.11-pyhomematic-0.1.78: UPDATING ... - python3.11-pyhomematic-0.1.78: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyhomematic 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath a2jmidid, using log file: /var/log/nixpkgs-update/a2jmidid/2024-04-03.log a2jmidid 9 -> 12 https://repology.org/project/a2jmidid/versions attrpath: a2jmidid Checking auto update branch... No auto update branch exists There might already be an open PR for this update: - a2jmidid: 9 -> 12 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/298134" [result] Failed to update a2jmidid 9 -> 12 https://repology.org/project/a2jmidid/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pydot, using log file: /var/log/nixpkgs-update/python311Packages.pydot/2024-04-03.log python311Packages.pydot 0 -> 1 attrpath: python311Packages.pydot Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/wg5p54hfnpsp4clp19kyr13zdxjcp51j-packages.json.drv building '/nix/store/wg5p54hfnpsp4clp19kyr13zdxjcp51j-packages.json.drv'... Going to be running update for following packages: - python3.11-pydot-2.0.0 Press Enter key to continue... Running update for: - python3.11-pydot-2.0.0: UPDATING ... - python3.11-pydot-2.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pydot 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyowm, using log file: /var/log/nixpkgs-update/python311Packages.pyowm/2024-04-03.log python311Packages.pyowm 0 -> 1 attrpath: python311Packages.pyowm Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/35y5lk0m97radn6fax2b71kvinhzks8b-packages.json.drv building '/nix/store/35y5lk0m97radn6fax2b71kvinhzks8b-packages.json.drv'... Going to be running update for following packages: - python3.11-pyowm-3.3.0 Press Enter key to continue... Running update for: - python3.11-pyowm-3.3.0: UPDATING ... - python3.11-pyowm-3.3.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyowm 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.azure-mgmt-machinelearningcompute, using log file: /var/log/nixpkgs-update/python311Packages.azure-mgmt-machinelearningcompute/2024-04-03.log python311Packages.azure-mgmt-machinelearningcompute 0 -> 1 attrpath: python311Packages.azure-mgmt-machinelearningcompute Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/646f4yshj2f09rwr784j1z13v23x6w5j-packages.json.drv building '/nix/store/646f4yshj2f09rwr784j1z13v23x6w5j-packages.json.drv'... Going to be running update for following packages: - python3.11-azure-mgmt-machinelearningcompute-0.4.1 Press Enter key to continue... Running update for: - python3.11-azure-mgmt-machinelearningcompute-0.4.1: UPDATING ... - python3.11-azure-mgmt-machinelearningcompute-0.4.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.azure-mgmt-machinelearningcompute 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.hatch-jupyter-builder, using log file: /var/log/nixpkgs-update/python311Packages.hatch-jupyter-builder/2024-04-03.log python311Packages.hatch-jupyter-builder 0 -> 1 attrpath: python311Packages.hatch-jupyter-builder Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/2nj9g25ahx3snbafljbnya2k4qpbrbri-packages.json.drv building '/nix/store/2nj9g25ahx3snbafljbnya2k4qpbrbri-packages.json.drv'... Going to be running update for following packages: - python3.11-hatch-jupyter-builder-0.9.1 Press Enter key to continue... Running update for: - python3.11-hatch-jupyter-builder-0.9.1: UPDATING ... - python3.11-hatch-jupyter-builder-0.9.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.hatch-jupyter-builder 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath aspellDicts.be, using log file: /var/log/nixpkgs-update/aspellDicts.be/2024-04-03.log aspellDicts.be 0 -> 1 attrpath: aspellDicts.be Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] these 2 derivations will be built: /nix/store/hr7wzvxnyl8ijaqnk8vc3gpczf8w0sax-update-aspellDict-be.drv /nix/store/r383y4nr0y8nriw2vd17grpfmp1fdxvj-packages.json.drv building '/nix/store/hr7wzvxnyl8ijaqnk8vc3gpczf8w0sax-update-aspellDict-be.drv'... building '/nix/store/r383y4nr0y8nriw2vd17grpfmp1fdxvj-packages.json.drv'... Going to be running update for following packages: - aspell-dict-be-0.01 Press Enter key to continue... Running update for: - aspell-dict-be-0.01: UPDATING ... - aspell-dict-be-0.01: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update aspellDicts.be 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.dissect-cim, using log file: /var/log/nixpkgs-update/python311Packages.dissect-cim/2024-04-03.log python311Packages.dissect-cim 0 -> 1 attrpath: python311Packages.dissect-cim Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/yj02lln4sc1lrfvif2lfrb0v99ly2ws9-packages.json.drv building '/nix/store/yj02lln4sc1lrfvif2lfrb0v99ly2ws9-packages.json.drv'... Going to be running update for following packages: - python3.11-dissect-cim-3.8 Press Enter key to continue... Running update for: - python3.11-dissect-cim-3.8: UPDATING ... - python3.11-dissect-cim-3.8: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.dissect-cim 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.nltk, using log file: /var/log/nixpkgs-update/python311Packages.nltk/2024-04-03.log python311Packages.nltk 0 -> 1 attrpath: python311Packages.nltk Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/k9yrzsj6hncfiv2617wvg8ip59ykfr5f-packages.json.drv building '/nix/store/k9yrzsj6hncfiv2617wvg8ip59ykfr5f-packages.json.drv'... Going to be running update for following packages: - python3.11-nltk-3.8.1 Press Enter key to continue... Running update for: - python3.11-nltk-3.8.1: UPDATING ... - python3.11-nltk-3.8.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.nltk 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath ansible-later, using log file: /var/log/nixpkgs-update/ansible-later/2024-04-03.log ansible-later 0 -> 1 attrpath: ansible-later Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/2vj2azvdrpmgdd1lkvsh4l25kn0qhfsf-packages.json.drv building '/nix/store/2vj2azvdrpmgdd1lkvsh4l25kn0qhfsf-packages.json.drv'... Going to be running update for following packages: - ansible-later-3.3.1 Press Enter key to continue... Running update for: - ansible-later-3.3.1: UPDATING ... - ansible-later-3.3.1: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/tools/admin/ansible/later.nix b/pkgs/tools/admin/ansible/later.nix index f040acdfbd0f..62303b508c7a 100644 --- a/pkgs/tools/admin/ansible/later.nix +++ b/pkgs/tools/admin/ansible/later.nix @@ -6,14 +6,14 @@ python3.pkgs.buildPythonApplication rec { pname = "ansible-later"; - version = "3.3.1"; + version = "4.0.2"; format = "pyproject"; src = fetchFromGitHub { owner = "thegeeklab"; repo = pname; rev = "refs/tags/v${version}"; - hash = "sha256-7k81eEcM+BXNrln6+Lu0+1LjsZdYkUidrRQCdlBbQB8="; + hash = "sha256-BJh9mu8VsbMz64ha6PsVbVZkHl6Wu5rSK+RU0Iubb7A="; }; patches = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A ansible-later nix build failed. got build log for 'ansible-later' from 'daemon' Sourcing python-remove-tests-dir-hook Sourcing python-catch-conflicts-hook.sh Sourcing python-remove-bin-bytecode-hook.sh Sourcing pypa-build-hook Using pypaBuildPhase Sourcing python-runtime-deps-check-hook Using pythonRuntimeDepsCheckHook Sourcing pypa-install-hook Using pypaInstallPhase Sourcing python-imports-check-hook.sh Using pythonImportsCheckPhase Sourcing python-namespaces-hook Sourcing python-catch-conflicts-hook.sh Sourcing pytest-check-hook Using pytestCheckPhase @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/q7f86sfcnghyaif1b43pnck6jaif4bmj-source source root is source setting SOURCE_DATE_EPOCH to timestamp 315619200 of file source/renovate.json @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase applying patch /nix/store/amlik9fbpv7vmnwidq9pdj6ajiisxzrf-poetry-dynamic-versioning-pep517.patch patching file pyproject.toml Reversed (or previously applied) patch detected! Assume -R? [n] Apply anyway? [n] Skipping patch. 1 out of 1 hunk ignored -- saving rejects to file pyproject.toml.rej [result] Failed to update ansible-later 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.tinygrad, using log file: /var/log/nixpkgs-update/python311Packages.tinygrad/2024-04-03.log python311Packages.tinygrad 0 -> 1 attrpath: python311Packages.tinygrad Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/gb5172n99swnmdd1lafcg3khnmx1zfrj-packages.json.drv building '/nix/store/gb5172n99swnmdd1lafcg3khnmx1zfrj-packages.json.drv'... Going to be running update for following packages: - python3.11-tinygrad-0.8.0 Press Enter key to continue... Running update for: - python3.11-tinygrad-0.8.0: UPDATING ... - python3.11-tinygrad-0.8.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.tinygrad 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.GofCens, using log file: /var/log/nixpkgs-update/rPackages.GofCens/2024-04-03.log rPackages.GofCens 0.92 -> 0.98 https://repology.org/project/r:gofcens/versions attrpath: rPackages.GofCens Checking auto update branch... No auto update branch exists Old version 0.92" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.GofCens 0.92 -> 0.98 https://repology.org/project/r:gofcens/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath octopus, using log file: /var/log/nixpkgs-update/octopus/2024-04-03.log octopus 13.0 -> 14.0 https://repology.org/project/octopus-tddft-code/versions attrpath: octopus Checking auto update branch... No auto update branch exists Old version 13.0" not present in master derivation file with contents: { lib , stdenv , fetchFromGitLab , cmake , pkg-config , ninja , gfortran , which , perl , procps , libvdwxc , libyaml , libxc , fftw , blas , lapack , gsl , netcdf , arpack , spglib , metis , scalapack , mpi , enableMpi ? true , python3 }: assert (!blas.isILP64) && (!lapack.isILP64); assert (blas.isILP64 == arpack.isILP64); stdenv.mkDerivation rec { pname = "octopus"; version = "14.0"; src = fetchFromGitLab { owner = "octopus-code"; repo = "octopus"; rev = version; sha256 = "sha256-wQ2I+10ZHLKamW3j6AUtq2KZVm6d29+JxYgwvBKz9DU="; }; nativeBuildInputs = [ which perl procps cmake gfortran pkg-config ninja ]; buildInputs = [ libyaml libxc blas lapack gsl fftw netcdf arpack libvdwxc spglib metis (python3.withPackages (ps: [ ps.pyyaml ])) ] ++ lib.optional enableMpi scalapack; propagatedBuildInputs = lib.optional enableMpi mpi; propagatedUserEnvPkgs = lib.optional enableMpi mpi; cmakeFlags = [ (lib.cmakeBool "OCTOPUS_MPI" enableMpi) (lib.cmakeBool "OCTOPUS_ScaLAPACK" enableMpi) (lib.cmakeBool "OCTOPUS_OpenMP" true) ]; nativeCheckInputs = lib.optional.enableMpi mpi; doCheck = false; checkTarget = "check-short"; postPatch = '' patchShebangs ./ ''; postConfigure = '' patchShebangs testsuite/oct-run_testsuite.sh ''; enableParallelBuilding = true; passthru = lib.attrsets.optionalAttrs enableMpi { inherit mpi; }; meta = with lib; { description = "Real-space time dependent density-functional theory code"; homepage = "https://octopus-code.org"; maintainers = with maintainers; [ markuskowa ]; license = with licenses; [ gpl2Only asl20 lgpl3Plus bsd3 ]; platforms = [ "x86_64-linux" ]; }; } [result] Failed to update octopus 13.0 -> 14.0 https://repology.org/project/octopus-tddft-code/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.maximin, using log file: /var/log/nixpkgs-update/rPackages.maximin/2024-04-03.log rPackages.maximin 1.0-4 -> 1.0-5 https://repology.org/project/r:maximin/versions attrpath: rPackages.maximin Checking auto update branch... No auto update branch exists Old version 1.0-4" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.maximin 1.0-4 -> 1.0-5 https://repology.org/project/r:maximin/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath hercules, using log file: /var/log/nixpkgs-update/hercules/2024-04-03.log hercules 4.6 -> 4.7 https://repology.org/project/hercules-emulator/versions attrpath: hercules Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update hercules 4.6 -> 4.7 https://repology.org/project/hercules-emulator/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.kornia, using log file: /var/log/nixpkgs-update/python312Packages.kornia/2024-04-03.log python312Packages.kornia 0.7.1 -> 0.7.2 https://repology.org/project/python:kornia/versions attrpath: python312Packages.kornia Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/7ar9pjnhc0hxk9867x6vwj5sqp05j1vm-packages.json.drv building '/nix/store/7ar9pjnhc0hxk9867x6vwj5sqp05j1vm-packages.json.drv'... Going to be running update for following packages: - python3.12-kornia-0.7.1 Press Enter key to continue... Running update for: - python3.12-kornia-0.7.1: UPDATING ... - python3.12-kornia-0.7.1: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/kornia/default.nix b/pkgs/development/python-modules/kornia/default.nix index a00b3d6487d3..469b29d044e8 100644 --- a/pkgs/development/python-modules/kornia/default.nix +++ b/pkgs/development/python-modules/kornia/default.nix @@ -8,7 +8,7 @@ buildPythonPackage rec { pname = "kornia"; - version = "0.7.1"; + version = "0.7.2"; format = "pyproject"; disabled = pythonOlder "3.8"; @@ -17,7 +17,7 @@ buildPythonPackage rec { owner = pname; repo = pname; rev = "refs/tags/v${version}"; - hash = "sha256-gHMrA4Uzazpw4TdswrXdoZG4+ek5g+wtLXNmhH3SlOM="; + hash = "sha256-DmXttvKoLqny0mt3SUonidNxDkNX7N0LdTxy/H32R/4="; }; propagatedBuildInputs = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A python312Packages.kornia nix build failed. adding 'kornia/utils/_compat.py' adding 'kornia/utils/draw.py' adding 'kornia/utils/grid.py' adding 'kornia/utils/helpers.py' adding 'kornia/utils/image.py' adding 'kornia/utils/image_print.py' adding 'kornia/utils/memory.py' adding 'kornia/utils/misc.py' adding 'kornia/utils/one_hot.py' adding 'kornia/utils/pointcloud_io.py' adding 'kornia/x/__init__.py' adding 'kornia/x/callbacks.py' adding 'kornia/x/trainer.py' adding 'kornia/x/trainers.py' adding 'kornia/x/utils.py' adding 'kornia-0.7.2.dist-info/LICENSE' adding 'kornia-0.7.2.dist-info/METADATA' adding 'kornia-0.7.2.dist-info/WHEEL' adding 'kornia-0.7.2.dist-info/top_level.txt' adding 'kornia-0.7.2.dist-info/zip-safe' adding 'kornia-0.7.2.dist-info/RECORD' removing build/bdist.linux-x86_64/wheel Successfully built kornia-0.7.2-py2.py3-none-any.whl Finished creating a wheel... Finished executing pypaBuildPhase @nix { "action": "setPhase", "phase": "pythonRuntimeDepsCheckHook" } Running phase: pythonRuntimeDepsCheckHook Executing pythonRuntimeDepsCheck Checking runtime dependencies for kornia-0.7.2-py2.py3-none-any.whl - kornia-rs not installed [result] Failed to update python312Packages.kornia 0.7.1 -> 0.7.2 https://repology.org/project/python:kornia/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath zotero, using log file: /var/log/nixpkgs-update/zotero/2024-04-03.log zotero 6.0.35 -> 6.0.37 https://repology.org/project/zotero/versions attrpath: zotero Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/j7km64a96n55lrn66zbqvpv14gk8kbil-Zotero-6.0.37_linux-x86_64.tar.bz2.drv building '/nix/store/j7km64a96n55lrn66zbqvpv14gk8kbil-Zotero-6.0.37_linux-x86_64.tar.bz2.drv'... trying https://download.zotero.org/client/release/6.0.37/Zotero-6.0.37_linux-x86_64.tar.bz2 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 403 error: cannot download Zotero-6.0.37_linux-x86_64.tar.bz2 from any mirror error: builder for '/nix/store/j7km64a96n55lrn66zbqvpv14gk8kbil-Zotero-6.0.37_linux-x86_64.tar.bz2.drv' failed with exit code 1; last 7 log lines: > > trying https://download.zotero.org/client/release/6.0.37/Zotero-6.0.37_linux-x86_64.tar.bz2 > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 403 > error: cannot download Zotero-6.0.37_linux-x86_64.tar.bz2 from any mirror For full logs, run 'nix log /nix/store/j7km64a96n55lrn66zbqvpv14gk8kbil-Zotero-6.0.37_linux-x86_64.tar.bz2.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'zotero.originalSrc' not found stderr did not split as expected full stderr was: these 3 derivations will be built: /nix/store/j7km64a96n55lrn66zbqvpv14gk8kbil-Zotero-6.0.37_linux-x86_64.tar.bz2.drv /nix/store/l04pknq8sswnncgrncyc09p3wx8x1q3h-zotero.desktop.drv /nix/store/rwh4sq7lf7fyi4vmzhj2w5d5mv4xlxdl-zotero-6.0.37.drv this path will be fetched (0.00 MiB download, 0.02 MiB unpacked): /nix/store/jxjjqx9b5xnf8sm4crbksd4hfw1nfiaw-dconf-0.40.0-dev copying path '/nix/store/jxjjqx9b5xnf8sm4crbksd4hfw1nfiaw-dconf-0.40.0-dev' from 'https://cache.nixos.org'... building '/nix/store/l04pknq8sswnncgrncyc09p3wx8x1q3h-zotero.desktop.drv'... building '/nix/store/j7km64a96n55lrn66zbqvpv14gk8kbil-Zotero-6.0.37_linux-x86_64.tar.bz2.drv'... trying https://download.zotero.org/client/release/6.0.37/Zotero-6.0.37_linux-x86_64.tar.bz2 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 403 error: cannot download Zotero-6.0.37_linux-x86_64.tar.bz2 from any mirror error: builder for '/nix/store/j7km64a96n55lrn66zbqvpv14gk8kbil-Zotero-6.0.37_linux-x86_64.tar.bz2.drv' failed with exit code 1; last 7 log lines: > > trying https://download.zotero.org/client/release/6.0.37/Zotero-6.0.37_linux-x86_64.tar.bz2 > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 403 > error: cannot download Zotero-6.0.37_linux-x86_64.tar.bz2 from any mirror For full logs, run 'nix log /nix/store/j7km64a96n55lrn66zbqvpv14gk8kbil-Zotero-6.0.37_linux-x86_64.tar.bz2.drv'. error: 1 dependencies of derivation '/nix/store/rwh4sq7lf7fyi4vmzhj2w5d5mv4xlxdl-zotero-6.0.37.drv' failed to build [result] Failed to update zotero 6.0.35 -> 6.0.37 https://repology.org/project/zotero/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath ceph, using log file: /var/log/nixpkgs-update/ceph/2024-04-03.log ceph 18.2.1 -> 18.2.2 https://repology.org/project/ceph/versions attrpath: ceph Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update ceph 18.2.1 -> 18.2.2 https://repology.org/project/ceph/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.pyside2, using log file: /var/log/nixpkgs-update/python312Packages.pyside2/2024-04-03.log python312Packages.pyside2 5.15.11 -> 5.15.13 https://repology.org/project/python:pyside2/versions attrpath: python312Packages.pyside2 Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/python-modules/pyside2/default.nix b/pkgs/development/python-modules/pyside2/default.nix index 1d4cf2ce6038..567cdcf7f0b0 100644 --- a/pkgs/development/python-modules/pyside2/default.nix +++ b/pkgs/development/python-modules/pyside2/default.nix @@ -12,11 +12,11 @@ }: stdenv.mkDerivation rec { pname = "pyside2"; - version = "5.15.11"; + version = "5.15.13"; src = fetchurl { url = "https://download.qt.io/official_releases/QtForPython/pyside2/PySide2-${version}-src/pyside-setup-opensource-src-${version}.tar.xz"; - sha256 = "sha256-2lZ807eFTSegtK/j6J3osvmLem1XOTvlbx/BP3cPryk="; + sha256 = "sha256-eld5eyAmjW68s53rpIx1Smmr+SIa7gPh89ym9lZbfak="; }; patches = [ [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A python312Packages.pyside2 Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix --extra-experimental-features nix-command log -f . python312Packages.pyside2 Standard output: error: build log of 'python312Packages.pyside2' is not available [result] Failed to update python312Packages.pyside2 5.15.11 -> 5.15.13 https://repology.org/project/python:pyside2/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.micromapST, using log file: /var/log/nixpkgs-update/rPackages.micromapST/2024-04-03.log rPackages.micromapST 3.0.1 -> 3.0.2 https://repology.org/project/r:micromapst/versions attrpath: rPackages.micromapST Checking auto update branch... No auto update branch exists Old version 3.0.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.micromapST 3.0.1 -> 3.0.2 https://repology.org/project/r:micromapst/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.vulcan-api, using log file: /var/log/nixpkgs-update/python311Packages.vulcan-api/2024-04-03.log python311Packages.vulcan-api 0 -> 1 attrpath: python311Packages.vulcan-api Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/p159x1sjdry939q8lr13g58p77ds0qsn-packages.json.drv building '/nix/store/p159x1sjdry939q8lr13g58p77ds0qsn-packages.json.drv'... Going to be running update for following packages: - python3.11-vulcan-api-2.3.2 Press Enter key to continue... Running update for: - python3.11-vulcan-api-2.3.2: UPDATING ... - python3.11-vulcan-api-2.3.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.vulcan-api 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pytest-httpbin, using log file: /var/log/nixpkgs-update/python311Packages.pytest-httpbin/2024-04-03.log python311Packages.pytest-httpbin 0 -> 1 attrpath: python311Packages.pytest-httpbin Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/lf46p7y5741qbxkmvyhc2jyarkzf03ms-packages.json.drv building '/nix/store/lf46p7y5741qbxkmvyhc2jyarkzf03ms-packages.json.drv'... Going to be running update for following packages: - python3.11-pytest-httpbin-2.0.0 Press Enter key to continue... Running update for: - python3.11-pytest-httpbin-2.0.0: UPDATING ... - python3.11-pytest-httpbin-2.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pytest-httpbin 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pcp, using log file: /var/log/nixpkgs-update/pcp/2024-04-03.log pcp 0.4.0 -> 6.2.0 https://repology.org/project/pcp/versions attrpath: pcp Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/wwcm5d7sr9n21fwl9a34wjn4sgzls9fx-source.drv building '/nix/store/wwcm5d7sr9n21fwl9a34wjn4sgzls9fx-source.drv'... trying https://github.com/dennis-tra/pcp/archive/v6.2.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/wwcm5d7sr9n21fwl9a34wjn4sgzls9fx-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/dennis-tra/pcp/archive/v6.2.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/wwcm5d7sr9n21fwl9a34wjn4sgzls9fx-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'pcp.originalSrc' not found stderr did not split as expected full stderr was: these 3 derivations will be built: /nix/store/wwcm5d7sr9n21fwl9a34wjn4sgzls9fx-source.drv /nix/store/3yrjxrj5zap1c6nr27zzsss6gpr3c1q6-pcp-6.2.0-go-modules.drv /nix/store/w4p84m74b6v43irsri6kx5fqjzspbrnd-pcp-6.2.0.drv building '/nix/store/wwcm5d7sr9n21fwl9a34wjn4sgzls9fx-source.drv'... trying https://github.com/dennis-tra/pcp/archive/v6.2.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/wwcm5d7sr9n21fwl9a34wjn4sgzls9fx-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/dennis-tra/pcp/archive/v6.2.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/wwcm5d7sr9n21fwl9a34wjn4sgzls9fx-source.drv'. error: 1 dependencies of derivation '/nix/store/w4p84m74b6v43irsri6kx5fqjzspbrnd-pcp-6.2.0.drv' failed to build [result] Failed to update pcp 0.4.0 -> 6.2.0 https://repology.org/project/pcp/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.apkinspector, using log file: /var/log/nixpkgs-update/python311Packages.apkinspector/2024-04-03.log python311Packages.apkinspector 0 -> 1 attrpath: python311Packages.apkinspector Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/s37vg652q8nj7in6i6sbpmk66advgfgf-packages.json.drv building '/nix/store/s37vg652q8nj7in6i6sbpmk66advgfgf-packages.json.drv'... Going to be running update for following packages: - python3.11-apkinspector-1.2.2 Press Enter key to continue... Running update for: - python3.11-apkinspector-1.2.2: UPDATING ... - python3.11-apkinspector-1.2.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.apkinspector 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pynello, using log file: /var/log/nixpkgs-update/python311Packages.pynello/2024-04-03.log python311Packages.pynello 0 -> 1 attrpath: python311Packages.pynello Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/5a5gap9swzgnxla11v3k4vzinfdvjcm3-packages.json.drv building '/nix/store/5a5gap9swzgnxla11v3k4vzinfdvjcm3-packages.json.drv'... Going to be running update for following packages: - python3.11-pynello-2.0.3 Press Enter key to continue... Running update for: - python3.11-pynello-2.0.3: UPDATING ... - python3.11-pynello-2.0.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pynello 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.tokentrim, using log file: /var/log/nixpkgs-update/python311Packages.tokentrim/2024-04-03.log python311Packages.tokentrim 0 -> 1 attrpath: python311Packages.tokentrim Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/s1vv323nsc9z1bcimy5synhb1bgp5vry-packages.json.drv building '/nix/store/s1vv323nsc9z1bcimy5synhb1bgp5vry-packages.json.drv'... Going to be running update for following packages: - python3.11-tokentrim-0.1.13 Press Enter key to continue... Running update for: - python3.11-tokentrim-0.1.13: UPDATING ... - python3.11-tokentrim-0.1.13: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.tokentrim 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.tilequant, using log file: /var/log/nixpkgs-update/python311Packages.tilequant/2024-04-03.log python311Packages.tilequant 0 -> 1 attrpath: python311Packages.tilequant Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/hsjz8nnai0rgq44ppsf0pkq62fvkgqpr-packages.json.drv building '/nix/store/hsjz8nnai0rgq44ppsf0pkq62fvkgqpr-packages.json.drv'... Going to be running update for following packages: - python3.11-tilequant-1.1.0 Press Enter key to continue... Running update for: - python3.11-tilequant-1.1.0: UPDATING ... - python3.11-tilequant-1.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.tilequant 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.glom, using log file: /var/log/nixpkgs-update/python311Packages.glom/2024-04-03.log python311Packages.glom 0 -> 1 attrpath: python311Packages.glom Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/mfbifhbdni47kwpcm41d7785dn7yv73p-packages.json.drv building '/nix/store/mfbifhbdni47kwpcm41d7785dn7yv73p-packages.json.drv'... Going to be running update for following packages: - python3.11-glom-23.5.0 Press Enter key to continue... Running update for: - python3.11-glom-23.5.0: UPDATING ... - python3.11-glom-23.5.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.glom 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath sway-overfocus, using log file: /var/log/nixpkgs-update/sway-overfocus/2024-04-03.log sway-overfocus 0 -> 1 attrpath: sway-overfocus Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] skipping because derivation has updateScript [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/vh9rscadnmbqbnpni60njgi2pmzd7m50-packages.json.drv building '/nix/store/vh9rscadnmbqbnpni60njgi2pmzd7m50-packages.json.drv'... Going to be running update for following packages: - sway-overfocus-0.2.3-fix Press Enter key to continue... Running update for: - sway-overfocus-0.2.3-fix: UPDATING ... - sway-overfocus-0.2.3-fix: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update sway-overfocus 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath fluxboxlauncher, using log file: /var/log/nixpkgs-update/fluxboxlauncher/2024-04-03.log fluxboxlauncher 0 -> 1 attrpath: fluxboxlauncher Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/9liwksswhlfwckx09sjgikk95y8y9rxl-packages.json.drv building '/nix/store/9liwksswhlfwckx09sjgikk95y8y9rxl-packages.json.drv'... Going to be running update for following packages: - fluxboxlauncher-0.2.1 Press Enter key to continue... Running update for: - fluxboxlauncher-0.2.1: UPDATING ... - fluxboxlauncher-0.2.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update fluxboxlauncher 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath check-ups-health, using log file: /var/log/nixpkgs-update/check-ups-health/2024-04-03.log check-ups-health 2.8.3.3 -> 3.0.5 https://repology.org/project/check-ups-health/versions attrpath: check-ups-health Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update check-ups-health 2.8.3.3 -> 3.0.5 https://repology.org/project/check-ups-health/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath charles, using log file: /var/log/nixpkgs-update/charles/2024-04-03.log charles 4.6.4 -> 4.6.6 https://repology.org/project/charles/versions attrpath: charles Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update charles 4.6.4 -> 4.6.6 https://repology.org/project/charles/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.sphinx-mdinclude, using log file: /var/log/nixpkgs-update/python311Packages.sphinx-mdinclude/2024-04-03.log python311Packages.sphinx-mdinclude 0 -> 1 attrpath: python311Packages.sphinx-mdinclude Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/pa1l4bih2ds49kzzyqs40cgncaacp1wc-packages.json.drv building '/nix/store/pa1l4bih2ds49kzzyqs40cgncaacp1wc-packages.json.drv'... Going to be running update for following packages: - python3.11-sphinx-mdinclude-0.5.3 Press Enter key to continue... Running update for: - python3.11-sphinx-mdinclude-0.5.3: UPDATING ... - python3.11-sphinx-mdinclude-0.5.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.sphinx-mdinclude 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pantheon.elementary-print-shim, using log file: /var/log/nixpkgs-update/pantheon.elementary-print-shim/2024-04-03.log pantheon.elementary-print-shim 0 -> 1 attrpath: pantheon.elementary-print-shim Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/vs9vmjdpwj29krg8d0fl73ff2v7mrc6g-packages.json.drv building '/nix/store/vs9vmjdpwj29krg8d0fl73ff2v7mrc6g-packages.json.drv'... Going to be running update for following packages: - elementary-print-shim-0.1.3 Press Enter key to continue... Running update for: - elementary-print-shim-0.1.3: UPDATING ... - elementary-print-shim-0.1.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update pantheon.elementary-print-shim 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath geogebra6, using log file: /var/log/nixpkgs-update/geogebra6/2024-04-03.log geogebra6 6-0-794-0 -> 6.0.836.0 https://repology.org/project/geogebra/versions attrpath: geogebra6 Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update geogebra6 6-0-794-0 -> 6.0.836.0 https://repology.org/project/geogebra/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pytest-pudb, using log file: /var/log/nixpkgs-update/python311Packages.pytest-pudb/2024-04-03.log python311Packages.pytest-pudb 0 -> 1 attrpath: python311Packages.pytest-pudb Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/fhck5xgy1mcrjm25x37sgp7b5g22bc02-packages.json.drv building '/nix/store/fhck5xgy1mcrjm25x37sgp7b5g22bc02-packages.json.drv'... Going to be running update for following packages: - python3.11-pytest-pudb-0.7.0 Press Enter key to continue... Running update for: - python3.11-pytest-pudb-0.7.0: UPDATING ... - python3.11-pytest-pudb-0.7.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pytest-pudb 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.subprocess-tee, using log file: /var/log/nixpkgs-update/python311Packages.subprocess-tee/2024-04-03.log python311Packages.subprocess-tee 0 -> 1 attrpath: python311Packages.subprocess-tee Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/wakpjixqfx1r4mc8r3y6y71ym3hia0z6-packages.json.drv building '/nix/store/wakpjixqfx1r4mc8r3y6y71ym3hia0z6-packages.json.drv'... Going to be running update for following packages: - python3.11-subprocess-tee-0.4.1 Press Enter key to continue... Running update for: - python3.11-subprocess-tee-0.4.1: UPDATING ... - python3.11-subprocess-tee-0.4.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.subprocess-tee 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath fritz-exporter, using log file: /var/log/nixpkgs-update/fritz-exporter/2024-04-03.log fritz-exporter 0 -> 1 attrpath: fritz-exporter Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/hfw4fp7jjs74bmagb33l6fzyc0r289zk-packages.json.drv building '/nix/store/hfw4fp7jjs74bmagb33l6fzyc0r289zk-packages.json.drv'... Going to be running update for following packages: - fritz-exporter-2.5.0 Press Enter key to continue... Running update for: - fritz-exporter-2.5.0: UPDATING ... - fritz-exporter-2.5.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update fritz-exporter 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cozy, using log file: /var/log/nixpkgs-update/cozy/2024-04-03.log cozy 0 -> 1 attrpath: cozy Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/k2dhxc9rkflpzvmzl0qrngb7043wmgiz-packages.json.drv building '/nix/store/k2dhxc9rkflpzvmzl0qrngb7043wmgiz-packages.json.drv'... Going to be running update for following packages: - cozy-1.3.0 Press Enter key to continue... Running update for: - cozy-1.3.0: UPDATING ... - cozy-1.3.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update cozy 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath luna-icons, using log file: /var/log/nixpkgs-update/luna-icons/2024-04-03.log luna-icons 0 -> 1 attrpath: luna-icons Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Failed with exit code 1 this derivation will be built: /nix/store/n253dm4x77d01sizv2z3hwm7y7pffnff-packages.json.drv building '/nix/store/n253dm4x77d01sizv2z3hwm7y7pffnff-packages.json.drv'... Going to be running update for following packages: - luna-icons-2.1 Press Enter key to continue... Running update for: - luna-icons-2.1: UPDATING ... - luna-icons-2.1: ERROR --- SHOWING ERROR LOG FOR luna-icons-2.1 ---------------------- + name= + pname= + version= + attr_path= + version_lister='/nix/store/i1frphpfr67l6vg16wvsbwnnwz0awbw8-common-updater-scripts/bin/list-git-tags ' + ignored_versions= + rev_prefix= + odd_unstable= + patchlevel_unstable= + [[ -n '' ]] + name=luna-icons-2.1 + [[ -n '' ]] + pname=luna-icons + [[ -n '' ]] + version=2.1 + [[ -n '' ]] + attr_path=luna-icons + echo '# luna-icons-2.1' ++ sh -c '/nix/store/i1frphpfr67l6vg16wvsbwnnwz0awbw8-common-updater-scripts/bin/list-git-tags --pname=luna-icons --attr-path=luna-icons --file="update-git-commits.txt"' fatal: could not read Username for 'https://github.com': No such device or address + tags= + '[' -n '' ']' ++ echo '' ++ /nix/store/avqi5nnx7qydr078ssgifc2hgzqipqgx-gnugrep-3.11/bin/grep '^[0-9]' + tags= --- SHOWING ERROR LOG FOR luna-icons-2.1 ---------------------- The update script for luna-icons-2.1 failed with exit code 1 [result] Failed to update luna-icons 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.MixtureMissing, using log file: /var/log/nixpkgs-update/rPackages.MixtureMissing/2024-04-03.log rPackages.MixtureMissing 3.0.0 -> 3.0.2 https://repology.org/project/r:mixturemissing/versions attrpath: rPackages.MixtureMissing Checking auto update branch... No auto update branch exists Old version 3.0.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.MixtureMissing 3.0.0 -> 3.0.2 https://repology.org/project/r:mixturemissing/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath sonic-server, using log file: /var/log/nixpkgs-update/sonic-server/2024-04-03.log sonic-server 0 -> 1 attrpath: sonic-server Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] skipping because derivation has updateScript [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/1ik1859znc7mmjkdsxmg3m1n9c9h23v6-packages.json.drv building '/nix/store/1ik1859znc7mmjkdsxmg3m1n9c9h23v6-packages.json.drv'... Going to be running update for following packages: - sonic-server-1.4.8 Press Enter key to continue... Running update for: - sonic-server-1.4.8: UPDATING ... - sonic-server-1.4.8: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update sonic-server 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath libnatpmp, using log file: /var/log/nixpkgs-update/libnatpmp/2024-04-03.log libnatpmp 20230423 -> 20240116 https://repology.org/project/libnatpmp/versions attrpath: libnatpmp Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update libnatpmp 20230423 -> 20240116 https://repology.org/project/libnatpmp/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.widgetsnbextension, using log file: /var/log/nixpkgs-update/python311Packages.widgetsnbextension/2024-04-03.log python311Packages.widgetsnbextension 0 -> 1 attrpath: python311Packages.widgetsnbextension Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/p22zhpmbfmnz89xv62pmnl7liwd9qp13-packages.json.drv building '/nix/store/p22zhpmbfmnz89xv62pmnl7liwd9qp13-packages.json.drv'... Going to be running update for following packages: - python3.11-widgetsnbextension-4.0.10 Press Enter key to continue... Running update for: - python3.11-widgetsnbextension-4.0.10: UPDATING ... - python3.11-widgetsnbextension-4.0.10: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.widgetsnbextension 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath uudeview, using log file: /var/log/nixpkgs-update/uudeview/2024-04-03.log uudeview 0.5.20 -> 20230502 https://repology.org/project/uudeview/versions attrpath: uudeview Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update uudeview 0.5.20 -> 20230502 https://repology.org/project/uudeview/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath kubeshark, using log file: /var/log/nixpkgs-update/kubeshark/2024-04-03.log kubeshark 0 -> 1 attrpath: kubeshark Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] skipping because derivation has updateScript [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/z4n4zlb7j6l6fkpvyg68cizdmz7yff6v-packages.json.drv building '/nix/store/z4n4zlb7j6l6fkpvyg68cizdmz7yff6v-packages.json.drv'... Going to be running update for following packages: - kubeshark-52.1.77 Press Enter key to continue... Running update for: - kubeshark-52.1.77: UPDATING ... - kubeshark-52.1.77: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/applications/networking/cluster/kubeshark/default.nix b/pkgs/applications/networking/cluster/kubeshark/default.nix index 412ca8f8a097..66ecc4274fdd 100644 --- a/pkgs/applications/networking/cluster/kubeshark/default.nix +++ b/pkgs/applications/networking/cluster/kubeshark/default.nix @@ -2,13 +2,13 @@ buildGoModule rec { pname = "kubeshark"; - version = "52.1.77"; + version = "52.2.1"; src = fetchFromGitHub { owner = "kubeshark"; repo = "kubeshark"; rev = "v${version}"; - hash = "sha256-BpixzQ88JfA1cS5bLMHmLhE5Si5UbC9zRf9GAELrJwM="; + hash = "sha256-MmKkM4nc9FkZkQIURPz63ryl0yhvxBwOvxkjrsaa67U="; }; vendorHash = "sha256-SmvO9DYOXxnmN2dmHPPOguVwEbWSH/xNLBB+idpzopo="; No auto update branch exists [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/jjkjmyc9kbmwzh4fk2hhkfgsgnpjfdi8-kubeshark-52.2.1" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • kubeshark
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from passthru.updateScript. meta.description for kubeshark is: The API Traffic Viewer for Kubernetes meta.homepage for kubeshark is: https://kubeshark.co/ meta.changelog for kubeshark is: https://github.com/kubeshark/kubeshark/releases/tag/52.2.1 ###### Updates performed - Ran passthru.UpdateScript ###### To inspect upstream changes - [Release on GitHub](https://github.com/kubeshark/kubeshark/releases/tag/v52.2.1) - [Compare changes on GitHub](https://github.com/kubeshark/kubeshark/compare/v52.1.77...v52.2.1) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 52.2.1 with grep in /nix/store/jjkjmyc9kbmwzh4fk2hhkfgsgnpjfdi8-kubeshark-52.2.1 - found 52.2.1 in filename of file in /nix/store/jjkjmyc9kbmwzh4fk2hhkfgsgnpjfdi8-kubeshark-52.2.1 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath kubeshark ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/jjkjmyc9kbmwzh4fk2hhkfgsgnpjfdi8-kubeshark-52.2.1 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A kubeshark https://github.com/r-ryantm/nixpkgs/archive/eb903959af7fb6b1ce9f91cb59f1cb3934e3986a.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/eb903959af7fb6b1ce9f91cb59f1cb3934e3986a#kubeshark ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/jjkjmyc9kbmwzh4fk2hhkfgsgnpjfdi8-kubeshark-52.2.1 ls -la /nix/store/jjkjmyc9kbmwzh4fk2hhkfgsgnpjfdi8-kubeshark-52.2.1/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • kubeshark
--- ###### Maintainer pings cc @bryanasdev000 @qjoly for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301196 [result] Success updating kubeshark 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.qpdf, using log file: /var/log/nixpkgs-update/rPackages.qpdf/2024-04-03.log rPackages.qpdf 1.3.2 -> 1.3.3 https://repology.org/project/r:qpdf/versions attrpath: rPackages.qpdf Checking auto update branch... No auto update branch exists Old version 1.3.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.qpdf 1.3.2 -> 1.3.3 https://repology.org/project/r:qpdf/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath puncia, using log file: /var/log/nixpkgs-update/puncia/2024-04-03.log puncia 0 -> 1 attrpath: puncia Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/j46ab3mi5vqanam0yjhmsma3zqajjpym-packages.json.drv building '/nix/store/j46ab3mi5vqanam0yjhmsma3zqajjpym-packages.json.drv'... Going to be running update for following packages: - puncia-0.15-unstable-2024-03-23 Press Enter key to continue... Running update for: - puncia-0.15-unstable-2024-03-23: UPDATING ... - puncia-0.15-unstable-2024-03-23: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update puncia 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.Compind, using log file: /var/log/nixpkgs-update/rPackages.Compind/2024-04-03.log rPackages.Compind 3.0 -> 3.1 https://repology.org/project/r:compind/versions attrpath: rPackages.Compind Checking auto update branch... No auto update branch exists Old version 3.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.Compind 3.0 -> 3.1 https://repology.org/project/r:compind/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.regsplice, using log file: /var/log/nixpkgs-update/rPackages.regsplice/2024-04-03.log rPackages.regsplice 1.28.0 -> 1.28.1 https://repology.org/project/r:regsplice/versions attrpath: rPackages.regsplice Checking auto update branch... No auto update branch exists Old version 1.28.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.regsplice 1.28.0 -> 1.28.1 https://repology.org/project/r:regsplice/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rmg, using log file: /var/log/nixpkgs-update/rmg/2024-04-03.log rmg 0.5.7 -> 0.5.8 https://repology.org/project/rmg/versions attrpath: rmg Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update rmg 0.5.7 -> 0.5.8 https://repology.org/project/rmg/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath etcd, using log file: /var/log/nixpkgs-update/etcd/2024-04-03.log etcd 0 -> 1 attrpath: etcd Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] skipping because derivation has updateScript [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/vfc6a2zg3j8dac52j96g9lch2pb8hxj3-packages.json.drv building '/nix/store/vfc6a2zg3j8dac52j96g9lch2pb8hxj3-packages.json.drv'... Going to be running update for following packages: - etcd-3.5.12 Press Enter key to continue... Running update for: - etcd-3.5.12: UPDATING ... - etcd-3.5.12: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/servers/etcd/3.5/default.nix b/pkgs/servers/etcd/3.5/default.nix index 43f47aa0eaa1..2cd6cdefcb8c 100644 --- a/pkgs/servers/etcd/3.5/default.nix +++ b/pkgs/servers/etcd/3.5/default.nix @@ -1,11 +1,11 @@ { lib, buildGoModule, fetchFromGitHub, symlinkJoin, nixosTests, k3s }: let - version = "3.5.12"; - etcdSrcHash = "sha256-Z2WXNzFJYfRQCldUspQjUR5NyUzCCINycuEXWaTn4vU="; - etcdServerVendorHash = "sha256-S5cEIV4hKRjn9JFEKWBiSEPytHtVacsSnG6T8dofgyk="; - etcdUtlVendorHash = "sha256-Vgp44Kg6zUDYVJU6SiYd8ZEcAWqKPPTsqYafcfk89Cc="; - etcdCtlVendorHash = "sha256-PZLsekZzwlGzccCirNk9uUj70Ue5LMDs6LMWBI9yivs="; + version = "3.5.13"; + etcdSrcHash = "sha256-6dQXgM6VEWwv5CfHvxxPxdhMwNjFsinwhsbSqvQoDxI="; + etcdServerVendorHash = "sha256-PB4gACfeYhdOXYs0xbcq2CmSMJnf/ifX2U2DN6zfJ1o="; + etcdUtlVendorHash = "sha256-f23mn4zE6beM8yPSbs9gEEEifyF2D+CVKdlYwQtzAkQ="; + etcdCtlVendorHash = "sha256-gSlyhmLKarDwc+MhYuTeTqwj0wLiN6+k2bHEVVTkyPc="; src = fetchFromGitHub { owner = "etcd-io"; No auto update branch exists [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/yhfzjsiayms1dc77av5wiac6fzgd9axn-etcd-3.5.13" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • etcd
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from passthru.updateScript. meta.description for etcd is: Distributed reliable key-value store for the most critical data of a distributed system meta.homepage for etcd is: https://etcd.io/ ###### Updates performed - Ran passthru.UpdateScript ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 3.5.13 in filename of file in /nix/store/yhfzjsiayms1dc77av5wiac6fzgd9axn-etcd-3.5.13 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath etcd etcd_3_5 ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/yhfzjsiayms1dc77av5wiac6fzgd9axn-etcd-3.5.13 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A etcd https://github.com/r-ryantm/nixpkgs/archive/e272191d403f023fb6122b57740d9c48b1969542.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/e272191d403f023fb6122b57740d9c48b1969542#etcd ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/yhfzjsiayms1dc77av5wiac6fzgd9axn-etcd-3.5.13 ls -la /nix/store/yhfzjsiayms1dc77av5wiac6fzgd9axn-etcd-3.5.13/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • etcd
--- ###### Maintainer pings cc @endocrimes @offlinehacker @superherointj for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301202 [result] Success updating etcd 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.azure-mgmt-security, using log file: /var/log/nixpkgs-update/python311Packages.azure-mgmt-security/2024-04-03.log python311Packages.azure-mgmt-security 0 -> 1 attrpath: python311Packages.azure-mgmt-security Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/xq67s7whppk93cgm5xa79psng6cvwps4-packages.json.drv building '/nix/store/xq67s7whppk93cgm5xa79psng6cvwps4-packages.json.drv'... Going to be running update for following packages: - python3.11-azure-mgmt-security-6.0.0 Press Enter key to continue... Running update for: - python3.11-azure-mgmt-security-6.0.0: UPDATING ... - python3.11-azure-mgmt-security-6.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.azure-mgmt-security 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.neo, using log file: /var/log/nixpkgs-update/python311Packages.neo/2024-04-03.log python311Packages.neo 0 -> 1 attrpath: python311Packages.neo Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/br8pcr6lplcqfzmc1l9136qpi3pbn860-packages.json.drv building '/nix/store/br8pcr6lplcqfzmc1l9136qpi3pbn860-packages.json.drv'... Going to be running update for following packages: - python3.11-neo-0.13.0 Press Enter key to continue... Running update for: - python3.11-neo-0.13.0: UPDATING ... - python3.11-neo-0.13.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.neo 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.eufylife-ble-client, using log file: /var/log/nixpkgs-update/python311Packages.eufylife-ble-client/2024-04-03.log python311Packages.eufylife-ble-client 0 -> 1 attrpath: python311Packages.eufylife-ble-client Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/68xm0lhdkfkm756dgaj9snfyz44q41jm-packages.json.drv building '/nix/store/68xm0lhdkfkm756dgaj9snfyz44q41jm-packages.json.drv'... Going to be running update for following packages: - python3.11-eufylife-ble-client-0.1.8 Press Enter key to continue... Running update for: - python3.11-eufylife-ble-client-0.1.8: UPDATING ... - python3.11-eufylife-ble-client-0.1.8: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.eufylife-ble-client 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pre2k, using log file: /var/log/nixpkgs-update/pre2k/2024-04-03.log pre2k 0 -> 1 attrpath: pre2k Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/biz9kfsrl1m8znhdw9lwqv9dn590zv8b-packages.json.drv building '/nix/store/biz9kfsrl1m8znhdw9lwqv9dn590zv8b-packages.json.drv'... Going to be running update for following packages: - pre2k-3.0 Press Enter key to continue... Running update for: - pre2k-3.0: UPDATING ... - pre2k-3.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update pre2k 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pytradfri, using log file: /var/log/nixpkgs-update/python311Packages.pytradfri/2024-04-03.log python311Packages.pytradfri 0 -> 1 attrpath: python311Packages.pytradfri Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/2669a9by0cyazx5jn7d0n94fc6m3j6xj-packages.json.drv building '/nix/store/2669a9by0cyazx5jn7d0n94fc6m3j6xj-packages.json.drv'... Going to be running update for following packages: - python3.11-pytradfri-13.0.0 Press Enter key to continue... Running update for: - python3.11-pytradfri-13.0.0: UPDATING ... - python3.11-pytradfri-13.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pytradfri 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.discogs-client, using log file: /var/log/nixpkgs-update/python311Packages.discogs-client/2024-04-03.log python311Packages.discogs-client 0 -> 1 attrpath: python311Packages.discogs-client Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/chdkcnjf7ijnfpqmjz7cbapksgz6qw1m-packages.json.drv building '/nix/store/chdkcnjf7ijnfpqmjz7cbapksgz6qw1m-packages.json.drv'... Going to be running update for following packages: - python3.11-discogs-client-2.7 Press Enter key to continue... Running update for: - python3.11-discogs-client-2.7: UPDATING ... - python3.11-discogs-client-2.7: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.discogs-client 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.reportengine, using log file: /var/log/nixpkgs-update/python311Packages.reportengine/2024-04-03.log python311Packages.reportengine 0 -> 1 attrpath: python311Packages.reportengine Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/px4r33nzfisbsr82vhfwqk4mnaz9rbci-packages.json.drv building '/nix/store/px4r33nzfisbsr82vhfwqk4mnaz9rbci-packages.json.drv'... Going to be running update for following packages: - python3.11-reportengine-0.31 Press Enter key to continue... Running update for: - python3.11-reportengine-0.31: UPDATING ... - python3.11-reportengine-0.31: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.reportengine 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath dolphin-emu, using log file: /var/log/nixpkgs-update/dolphin-emu/2024-04-03.log dolphin-emu 0 -> 1 attrpath: dolphin-emu Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] these 2 derivations will be built: /nix/store/8wdj1qn5vavqn1rqkjniir9n22xcm94l-dolphin-update-script.drv /nix/store/f8sxbhza9dlrdx90mcp0mfw1cg59918r-packages.json.drv building '/nix/store/8wdj1qn5vavqn1rqkjniir9n22xcm94l-dolphin-update-script.drv'... building '/nix/store/f8sxbhza9dlrdx90mcp0mfw1cg59918r-packages.json.drv'... Going to be running update for following packages: - dolphin-emu-5.0-21088 Press Enter key to continue... Running update for: - dolphin-emu-5.0-21088: UPDATING ... - dolphin-emu-5.0-21088: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/applications/emulators/dolphin-emu/default.nix b/pkgs/applications/emulators/dolphin-emu/default.nix index b2a9bbb7bbc4..9a38b009740b 100644 --- a/pkgs/applications/emulators/dolphin-emu/default.nix +++ b/pkgs/applications/emulators/dolphin-emu/default.nix @@ -59,13 +59,13 @@ stdenv.mkDerivation rec { pname = "dolphin-emu"; - version = "5.0-21088"; + version = "5.0-21264"; src = fetchFromGitHub { owner = "dolphin-emu"; repo = "dolphin"; - rev = "9240f579eab18a2f67eef23846a6b508393d0e6c"; - hash = "sha256-lOiDbEQZoi9Bsiyta/w+B1VXNNW4qST2cBZekqo5dDA="; + rev = "1efda863e47b690f460f069502a4391b3c7d87c4"; + hash = "sha256-mPjKVrOokZrXQrdYLc7yzOz0VuLYlIxpGDm73bJT/kM="; fetchSubmodules = true; }; No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A dolphin-emu nix build failed. got build log for 'dolphin-emu' from 'daemon' @nix { "action": "setPhase", "phase": "qtPreHook" } Running phase: qtPreHook @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/am13vycw5z8j4802ckgj5j49ky2xxkb8-source source root is source @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase applying patch /nix/store/27fk1yfb2sjyrkf1d4gcgykq0g0ivqp8-find-minizip-ng.patch patching file CMakeLists.txt Hunk #1 succeeded at 674 (offset -4 lines). applying patch /nix/store/dg364wzsrwsnbjp3fdfj4jyxy0kjvsgf-3da2e15e6b95f02f66df461e87c8b896e450fdab.patch patching file Source/Core/Common/IOFile.h Reversed (or previously applied) patch detected! Assume -R? [n] Apply anyway? [n] Skipping patch. 1 out of 1 hunk ignored -- saving rejects to file Source/Core/Common/IOFile.h.rej [result] Failed to update dolphin-emu 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.wikipedia, using log file: /var/log/nixpkgs-update/python311Packages.wikipedia/2024-04-03.log python311Packages.wikipedia 0 -> 1 attrpath: python311Packages.wikipedia Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/wbxb841rk2k5s2z9jqdnh4nrmfs3sjly-packages.json.drv building '/nix/store/wbxb841rk2k5s2z9jqdnh4nrmfs3sjly-packages.json.drv'... Going to be running update for following packages: - python3.11-wikipedia-1.4.0 Press Enter key to continue... Running update for: - python3.11-wikipedia-1.4.0: UPDATING ... - python3.11-wikipedia-1.4.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.wikipedia 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.bentoml, using log file: /var/log/nixpkgs-update/python311Packages.bentoml/2024-04-03.log python311Packages.bentoml 0 -> 1 attrpath: python311Packages.bentoml Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/0asc8djg2jh43rparpz2f976qc4mffly-packages.json.drv building '/nix/store/0asc8djg2jh43rparpz2f976qc4mffly-packages.json.drv'... Going to be running update for following packages: - python3.11-bentoml-1.2.5 Press Enter key to continue... Running update for: - python3.11-bentoml-1.2.5: UPDATING ... - python3.11-bentoml-1.2.5: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/bentoml/default.nix b/pkgs/development/python-modules/bentoml/default.nix index 6946f45e050f..99bd534e2da8 100644 --- a/pkgs/development/python-modules/bentoml/default.nix +++ b/pkgs/development/python-modules/bentoml/default.nix @@ -69,7 +69,7 @@ }: let - version = "1.2.5"; + version = "1.2.9"; aws = [ fs-s3fs ]; grpc = [ grpcio @@ -105,7 +105,7 @@ buildPythonPackage { owner = "bentoml"; repo = "BentoML"; rev = "refs/tags/v${version}"; - hash = "sha256-GBKxyjCs02mxYiMK4GhgFUATRCUSVf8mFbWjuPVD7SU="; + hash = "sha256-QziO2A/TiE9NzlE6Z9QX7fRK37I1yafDCBw673pUOmA="; }; # https://github.com/bentoml/BentoML/pull/4227 should fix this test No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A python311Packages.bentoml Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix --extra-experimental-features nix-command log -f . python311Packages.bentoml Standard output: error: … while evaluating the attribute 'drvPath' at /var/cache/nixpkgs-update/worker/worktree/python311Packages.bentoml/lib/customisation.nix:365:7: 364| in commonAttrs // { 365| drvPath = assert condition; drv.drvPath; | ^ 366| outPath = assert condition; drv.outPath; … while evaluating the attribute 'drvPath' at /var/cache/nixpkgs-update/worker/worktree/python311Packages.bentoml/lib/customisation.nix:365:7: 364| in commonAttrs // { 365| drvPath = assert condition; drv.drvPath; | ^ 366| outPath = assert condition; drv.outPath; (stack trace truncated; use '--show-trace' to show the full trace) error: Package ‘python3.11-bentoml-1.2.9’ in /var/cache/nixpkgs-update/worker/worktree/python311Packages.bentoml/pkgs/development/python-modules/bentoml/default.nix:202 is marked as broken, refusing to evaluate. a) To temporarily allow broken packages, you can use an environment variable for a single invocation of the nix tools. $ export NIXPKGS_ALLOW_BROKEN=1 Note: When using `nix shell`, `nix build`, `nix develop`, etc with a flake, then pass `--impure` in order to allow use of environment variables. b) For `nixos-rebuild` you can set { nixpkgs.config.allowBroken = true; } in configuration.nix to override this. c) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add { allowBroken = true; } to ~/.config/nixpkgs/config.nix. [result] Failed to update python311Packages.bentoml 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath flatpak-builder, using log file: /var/log/nixpkgs-update/flatpak-builder/2024-04-03.log flatpak-builder 1.4.2 -> 1.4.3 https://repology.org/project/flatpak-builder/versions attrpath: flatpak-builder Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/c305940k3n8pknj958lnjs3ic1vq5jy6-flatpak-builder-1.4.3-fixed-libglnx.tar.xz.drv building '/nix/store/c305940k3n8pknj958lnjs3ic1vq5jy6-flatpak-builder-1.4.3-fixed-libglnx.tar.xz.drv'... trying https://github.com/flatpak/flatpak-builder/releases/download/1.4.3/flatpak-builder-1.4.3-fixed-libglnx.tar.xz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 9 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download flatpak-builder-1.4.3-fixed-libglnx.tar.xz from any mirror error: builder for '/nix/store/c305940k3n8pknj958lnjs3ic1vq5jy6-flatpak-builder-1.4.3-fixed-libglnx.tar.xz.drv' failed with exit code 1; last 7 log lines: > > trying https://github.com/flatpak/flatpak-builder/releases/download/1.4.3/flatpak-builder-1.4.3-fixed-libglnx.tar.xz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 9 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download flatpak-builder-1.4.3-fixed-libglnx.tar.xz from any mirror For full logs, run 'nix log /nix/store/c305940k3n8pknj958lnjs3ic1vq5jy6-flatpak-builder-1.4.3-fixed-libglnx.tar.xz.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'flatpak-builder.originalSrc' not found stderr did not split as expected full stderr was: these 4 derivations will be built: /nix/store/c305940k3n8pknj958lnjs3ic1vq5jy6-flatpak-builder-1.4.3-fixed-libglnx.tar.xz.drv /nix/store/cmk9mhsxyw9wx11bjgikwlqkk0gcs8ad-fix-test-paths.patch.drv /nix/store/kd6y1kg3275dmha1vc4igh2pgp56icy1-fix-paths.patch.drv /nix/store/xqb630q5qfk9mrbk3whz2gmjlc0i92ga-flatpak-builder-1.4.3.drv these 3 paths will be fetched (1.46 MiB download, 9.39 MiB unpacked): /nix/store/d84iiwf5nl5nrfjr12c6d4bqjj8y7cc1-debugedit-5.0 /nix/store/y7h2h8y0rq5s33i621znl81mwy85v90p-flatpak-1.14.5 /nix/store/li3h8ycvfd95v17l7rjlsygj710z8sw4-flatpak-1.14.5-dev copying path '/nix/store/d84iiwf5nl5nrfjr12c6d4bqjj8y7cc1-debugedit-5.0' from 'https://cache.nixos.org'... building '/nix/store/kd6y1kg3275dmha1vc4igh2pgp56icy1-fix-paths.patch.drv'... building '/nix/store/cmk9mhsxyw9wx11bjgikwlqkk0gcs8ad-fix-test-paths.patch.drv'... copying path '/nix/store/y7h2h8y0rq5s33i621znl81mwy85v90p-flatpak-1.14.5' from 'https://cache.nixos.org'... building '/nix/store/c305940k3n8pknj958lnjs3ic1vq5jy6-flatpak-builder-1.4.3-fixed-libglnx.tar.xz.drv'... cannot link '/nix/store/.links/0s1dibmlyznvrlry9z9m536d86hfn70rmxmi41lcdwah9z5yyra0' to '/nix/store/y7h2h8y0rq5s33i621znl81mwy85v90p-flatpak-1.14.5/lib/libflatpak.so.0.11405.0': No space left on device copying path '/nix/store/li3h8ycvfd95v17l7rjlsygj710z8sw4-flatpak-1.14.5-dev' from 'https://cache.nixos.org'... trying https://github.com/flatpak/flatpak-builder/releases/download/1.4.3/flatpak-builder-1.4.3-fixed-libglnx.tar.xz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 9 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download flatpak-builder-1.4.3-fixed-libglnx.tar.xz from any mirror error: builder for '/nix/store/c305940k3n8pknj958lnjs3ic1vq5jy6-flatpak-builder-1.4.3-fixed-libglnx.tar.xz.drv' failed with exit code 1; last 7 log lines: > > trying https://github.com/flatpak/flatpak-builder/releases/download/1.4.3/flatpak-builder-1.4.3-fixed-libglnx.tar.xz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 9 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download flatpak-builder-1.4.3-fixed-libglnx.tar.xz from any mirror For full logs, run 'nix log /nix/store/c305940k3n8pknj958lnjs3ic1vq5jy6-flatpak-builder-1.4.3-fixed-libglnx.tar.xz.drv'. error: 1 dependencies of derivation '/nix/store/xqb630q5qfk9mrbk3whz2gmjlc0i92ga-flatpak-builder-1.4.3.drv' failed to build [result] Failed to update flatpak-builder 1.4.2 -> 1.4.3 https://repology.org/project/flatpak-builder/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pytest-aio, using log file: /var/log/nixpkgs-update/python311Packages.pytest-aio/2024-04-03.log python311Packages.pytest-aio 0 -> 1 attrpath: python311Packages.pytest-aio Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/frpgp7l0pqqwvvxidczjc1fn36qyzf8x-packages.json.drv building '/nix/store/frpgp7l0pqqwvvxidczjc1fn36qyzf8x-packages.json.drv'... cannot link '/nix/store/.links/1r2xcxlxcnxd70nbjbf0wm3yb501zvkjg1g6bz01rfz08lz3k139' to '/nix/store/zk5ynwqyzbsrz7gs0mny2w34nbs34bas-packages.json': No space left on device Going to be running update for following packages: - python3.11-pytest-aio-1.5.0 Press Enter key to continue... Running update for: - python3.11-pytest-aio-1.5.0: UPDATING ... - python3.11-pytest-aio-1.5.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pytest-aio 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.ssdp, using log file: /var/log/nixpkgs-update/python311Packages.ssdp/2024-04-03.log python311Packages.ssdp 0 -> 1 attrpath: python311Packages.ssdp Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/p1kjz65asls4d821k1nivb9fj87imbkw-packages.json.drv building '/nix/store/p1kjz65asls4d821k1nivb9fj87imbkw-packages.json.drv'... Going to be running update for following packages: - python3.11-ssdp-1.3.0 Press Enter key to continue... Running update for: - python3.11-ssdp-1.3.0: UPDATING ... - python3.11-ssdp-1.3.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.ssdp 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.characteristic, using log file: /var/log/nixpkgs-update/python311Packages.characteristic/2024-04-03.log python311Packages.characteristic 0 -> 1 attrpath: python311Packages.characteristic Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/rxshlsn9nym52djfggcp9y0czhv84xjg-packages.json.drv building '/nix/store/rxshlsn9nym52djfggcp9y0czhv84xjg-packages.json.drv'... Going to be running update for following packages: - python3.11-characteristic-14.3.0 Press Enter key to continue... Running update for: - python3.11-characteristic-14.3.0: UPDATING ... - python3.11-characteristic-14.3.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.characteristic 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.devpi-common, using log file: /var/log/nixpkgs-update/python311Packages.devpi-common/2024-04-03.log python311Packages.devpi-common 0 -> 1 attrpath: python311Packages.devpi-common Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/94dkxq9xq6m2arngl2adn74n151105v4-packages.json.drv building '/nix/store/94dkxq9xq6m2arngl2adn74n151105v4-packages.json.drv'... Going to be running update for following packages: - python3.11-devpi-common-4.0.3 Press Enter key to continue... Running update for: - python3.11-devpi-common-4.0.3: UPDATING ... - python3.11-devpi-common-4.0.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.devpi-common 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.tflearn, using log file: /var/log/nixpkgs-update/python311Packages.tflearn/2024-04-03.log python311Packages.tflearn 0 -> 1 attrpath: python311Packages.tflearn Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/bdh7fsjmalxm574n2iky48xz3g2ncijz-packages.json.drv building '/nix/store/bdh7fsjmalxm574n2iky48xz3g2ncijz-packages.json.drv'... Going to be running update for following packages: - python3.11-tflearn-0.5.0 Press Enter key to continue... Running update for: - python3.11-tflearn-0.5.0: UPDATING ... - python3.11-tflearn-0.5.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.tflearn 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.youtokentome, using log file: /var/log/nixpkgs-update/python311Packages.youtokentome/2024-04-03.log python311Packages.youtokentome 0 -> 1 attrpath: python311Packages.youtokentome Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/n2fn17bhvlakkyxzxvrrkfyzx5lixsbx-packages.json.drv building '/nix/store/n2fn17bhvlakkyxzxvrrkfyzx5lixsbx-packages.json.drv'... Going to be running update for following packages: - python3.11-youtokentome-1.0.6 Press Enter key to continue... Running update for: - python3.11-youtokentome-1.0.6: UPDATING ... - python3.11-youtokentome-1.0.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.youtokentome 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath xdgmenumaker, using log file: /var/log/nixpkgs-update/xdgmenumaker/2024-04-03.log xdgmenumaker 0 -> 1 attrpath: xdgmenumaker Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/2f5i9s32yidx8w3pwd5349hyql6zgp9s-packages.json.drv building '/nix/store/2f5i9s32yidx8w3pwd5349hyql6zgp9s-packages.json.drv'... Going to be running update for following packages: - xdgmenumaker-2.1 Press Enter key to continue... Running update for: - xdgmenumaker-2.1: UPDATING ... - xdgmenumaker-2.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update xdgmenumaker 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.omorfi, using log file: /var/log/nixpkgs-update/python311Packages.omorfi/2024-04-03.log python311Packages.omorfi 0 -> 1 attrpath: python311Packages.omorfi Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/zh8jymd8h21i8vlnhmaq8xgdxm4bs2ad-packages.json.drv building '/nix/store/zh8jymd8h21i8vlnhmaq8xgdxm4bs2ad-packages.json.drv'... Going to be running update for following packages: - python3.11-omorfi-0.9.9 Press Enter key to continue... Running update for: - python3.11-omorfi-0.9.9: UPDATING ... - python3.11-omorfi-0.9.9: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.omorfi 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath terraform-providers.newrelic, using log file: /var/log/nixpkgs-update/terraform-providers.newrelic/2024-04-03.log terraform-providers.newrelic 0 -> 1 attrpath: terraform-providers.newrelic Checking auto update branch... Derivation file opts-out of auto-updates [result] Failed to update terraform-providers.newrelic 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.abjad, using log file: /var/log/nixpkgs-update/python311Packages.abjad/2024-04-03.log python311Packages.abjad 0 -> 1 attrpath: python311Packages.abjad Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/mhjhxig91y3czi8q0ldm14y8n53nqiys-packages.json.drv building '/nix/store/mhjhxig91y3czi8q0ldm14y8n53nqiys-packages.json.drv'... Going to be running update for following packages: - python3.11-abjad-3.19 Press Enter key to continue... Running update for: - python3.11-abjad-3.19: UPDATING ... - python3.11-abjad-3.19: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.abjad 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pysmartapp, using log file: /var/log/nixpkgs-update/python311Packages.pysmartapp/2024-04-03.log python311Packages.pysmartapp 0 -> 1 attrpath: python311Packages.pysmartapp Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/zi28nd1701yj6vbwwdgz9jgjwpzbq3a5-packages.json.drv building '/nix/store/zi28nd1701yj6vbwwdgz9jgjwpzbq3a5-packages.json.drv'... Going to be running update for following packages: - python3.11-pysmartapp-0.3.5 Press Enter key to continue... Running update for: - python3.11-pysmartapp-0.3.5: UPDATING ... - python3.11-pysmartapp-0.3.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pysmartapp 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath git-remote-hg, using log file: /var/log/nixpkgs-update/git-remote-hg/2024-04-03.log git-remote-hg 0 -> 1 attrpath: git-remote-hg Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/p1aqj0h7pjxjij3pbbnas3c046h7s8x9-packages.json.drv building '/nix/store/p1aqj0h7pjxjij3pbbnas3c046h7s8x9-packages.json.drv'... Going to be running update for following packages: - git-remote-hg-1.0.3.2 Press Enter key to continue... Running update for: - git-remote-hg-1.0.3.2: UPDATING ... - git-remote-hg-1.0.3.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update git-remote-hg 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath sitespeed-io, using log file: /var/log/nixpkgs-update/sitespeed-io/2024-04-03.log sitespeed-io 0 -> 1 attrpath: sitespeed-io Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] skipping because derivation has updateScript [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/yz9kdp8cly58rprdr5fc672nzvl1kicx-packages.json.drv building '/nix/store/yz9kdp8cly58rprdr5fc672nzvl1kicx-packages.json.drv'... Going to be running update for following packages: - sitespeed-io-33.4.0 Press Enter key to continue... Running update for: - sitespeed-io-33.4.0: UPDATING ... - sitespeed-io-33.4.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update sitespeed-io 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.zope-proxy, using log file: /var/log/nixpkgs-update/python311Packages.zope-proxy/2024-04-03.log python311Packages.zope-proxy 0 -> 1 attrpath: python311Packages.zope-proxy Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/blinqvclyqp410gdv79snlmspmh3k1cm-packages.json.drv building '/nix/store/blinqvclyqp410gdv79snlmspmh3k1cm-packages.json.drv'... Going to be running update for following packages: - python3.11-zope-proxy-5.2 Press Enter key to continue... Running update for: - python3.11-zope-proxy-5.2: UPDATING ... - python3.11-zope-proxy-5.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.zope-proxy 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.fleep, using log file: /var/log/nixpkgs-update/python311Packages.fleep/2024-04-03.log python311Packages.fleep 0 -> 1 attrpath: python311Packages.fleep Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/v1xqk6api9ws9lcf6rvjh8gljcsqbxlb-packages.json.drv building '/nix/store/v1xqk6api9ws9lcf6rvjh8gljcsqbxlb-packages.json.drv'... Going to be running update for following packages: - python3.11-fleep-1.0.1 Press Enter key to continue... Running update for: - python3.11-fleep-1.0.1: UPDATING ... - python3.11-fleep-1.0.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.fleep 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath litehtml, using log file: /var/log/nixpkgs-update/litehtml/2024-04-03.log litehtml 0.6 -> 0.9 https://repology.org/project/litehtml/versions attrpath: litehtml Checking auto update branch... An auto update branch exists with message `litehtml: 0.6 -> 0.8`. New version is 0.9. The auto update branch does not match or exceed the new version. [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/libraries/litehtml/default.nix b/pkgs/development/libraries/litehtml/default.nix index b1864f6497a9..bec023b37610 100644 --- a/pkgs/development/libraries/litehtml/default.nix +++ b/pkgs/development/libraries/litehtml/default.nix @@ -7,13 +7,13 @@ stdenv.mkDerivation (finalAttrs: { pname = "litehtml"; - version = "0.6"; + version = "0.9"; src = fetchFromGitHub { owner = "litehtml"; repo = "litehtml"; rev = "v${finalAttrs.version}"; - hash = "sha256-9571d3k8RkzEpMWPuIejZ7njLmYstSwFUaSqT3sk6uQ="; + hash = "sha256-ZE/HKzo3ejKpW/ih3sJwn2hzCtsBhAXeJWGezYd6Yc4="; }; # Don't search for non-existant gumbo cmake config [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A litehtml nix build failed. --- LOG END --- error: downloading 'https://github.com/google/googletest/archive/609281088cfefc76f9d0ce82e1ff6c30cc3591e5.zip' failed status_code: 6 status_string: "Couldn't resolve host name" log: --- LOG BEGIN --- Could not resolve host: github.com Closing connection --- LOG END --- make[2]: *** [CMakeFiles/googletest-populate.dir/build.make:100: googletest-populate-prefix/src/googletest-populate-stamp/googletest-populate-download] Error 1 make[1]: *** [CMakeFiles/Makefile2:83: CMakeFiles/googletest-populate.dir/all] Error 2 make: *** [Makefile:91: all] Error 2  CMake Error at /nix/store/mbw6qprvn80p8k7z3lq44hnz6b332xf6-cmake-3.28.3/share/cmake-3.28/Modules/FetchContent.cmake:1679 (message): Build step for googletest failed: 2 Call Stack (most recent call first): /nix/store/mbw6qprvn80p8k7z3lq44hnz6b332xf6-cmake-3.28.3/share/cmake-3.28/Modules/FetchContent.cmake:1819:EVAL:2 (__FetchContent_directPopulate) /nix/store/mbw6qprvn80p8k7z3lq44hnz6b332xf6-cmake-3.28.3/share/cmake-3.28/Modules/FetchContent.cmake:1819 (cmake_language) CMakeLists.txt:210 (FetchContent_Populate)  -- Configuring incomplete, errors occurred! [result] Failed to update litehtml 0.6 -> 0.9 https://repology.org/project/litehtml/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.tensorrt, using log file: /var/log/nixpkgs-update/python311Packages.tensorrt/2024-04-03.log python311Packages.tensorrt 0 -> 1 attrpath: python311Packages.tensorrt Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/02svk9dp658nzy6gwgbncmjrzq3sg4ll-packages.json.drv building '/nix/store/02svk9dp658nzy6gwgbncmjrzq3sg4ll-packages.json.drv'... Going to be running update for following packages: - python3.11-tensorrt-8.6.1.6 Press Enter key to continue... Running update for: - python3.11-tensorrt-8.6.1.6: UPDATING ... - python3.11-tensorrt-8.6.1.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.tensorrt 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.contourpy, using log file: /var/log/nixpkgs-update/python311Packages.contourpy/2024-04-03.log python311Packages.contourpy 0 -> 1 attrpath: python311Packages.contourpy Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/g9j91y06klq12dcsq7g5fwqqkd6rjk91-packages.json.drv building '/nix/store/g9j91y06klq12dcsq7g5fwqqkd6rjk91-packages.json.drv'... Going to be running update for following packages: - python3.11-contourpy-1.2.0 Press Enter key to continue... Running update for: - python3.11-contourpy-1.2.0: UPDATING ... - python3.11-contourpy-1.2.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/contourpy/default.nix b/pkgs/development/python-modules/contourpy/default.nix index 5e12a4531b33..e295dff26983 100644 --- a/pkgs/development/python-modules/contourpy/default.nix +++ b/pkgs/development/python-modules/contourpy/default.nix @@ -25,7 +25,7 @@ let countourpy = buildPythonPackage rec { pname = "contourpy"; - version = "1.2.0"; + version = "1.2.1"; format = "pyproject"; disabled = pythonOlder "3.8"; @@ -34,7 +34,7 @@ let countourpy = buildPythonPackage rec { owner = "contourpy"; repo = "contourpy"; rev = "refs/tags/v${version}"; - hash = "sha256-5yZrIwwe9dL5vtdSJnOhY9X4BdK/cdEY4DkVVjCq1uw="; + hash = "sha256-Qd6FC7SgFyC/BvOPWVkr2ZfKVMVAknLlidNRq3zcWU0="; }; nativeBuildInputs = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Python package with too many package rebuilds 6494 > 500 [result] Failed to update python311Packages.contourpy 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.block-io, using log file: /var/log/nixpkgs-update/python311Packages.block-io/2024-04-03.log python311Packages.block-io 0 -> 1 attrpath: python311Packages.block-io Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/zvmqfsm981a9ib4qcdbw5s512p7iv4qd-packages.json.drv building '/nix/store/zvmqfsm981a9ib4qcdbw5s512p7iv4qd-packages.json.drv'... Going to be running update for following packages: - python3.11-block-io-2.0.6 Press Enter key to continue... Running update for: - python3.11-block-io-2.0.6: UPDATING ... - python3.11-block-io-2.0.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.block-io 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.minimock, using log file: /var/log/nixpkgs-update/python311Packages.minimock/2024-04-03.log python311Packages.minimock 0 -> 1 attrpath: python311Packages.minimock Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/3v5h34p7kz2jbzd8q0zax65rzgld3mni-packages.json.drv building '/nix/store/3v5h34p7kz2jbzd8q0zax65rzgld3mni-packages.json.drv'... Going to be running update for following packages: - python3.11-minimock-1.3.0 Press Enter key to continue... Running update for: - python3.11-minimock-1.3.0: UPDATING ... - python3.11-minimock-1.3.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.minimock 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.keepkey, using log file: /var/log/nixpkgs-update/python311Packages.keepkey/2024-04-03.log python311Packages.keepkey 0 -> 1 attrpath: python311Packages.keepkey Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/1j29499nrq6z7fal240sqdfmz4cis17v-packages.json.drv building '/nix/store/1j29499nrq6z7fal240sqdfmz4cis17v-packages.json.drv'... Going to be running update for following packages: - python3.11-keepkey-7.2.1 Press Enter key to continue... Running update for: - python3.11-keepkey-7.2.1: UPDATING ... - python3.11-keepkey-7.2.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.keepkey 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.oldest-supported-numpy, using log file: /var/log/nixpkgs-update/python311Packages.oldest-supported-numpy/2024-04-03.log python311Packages.oldest-supported-numpy 0 -> 1 attrpath: python311Packages.oldest-supported-numpy Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/73myj6jg2yiji5jm5xbi5v22djcfdsmi-packages.json.drv building '/nix/store/73myj6jg2yiji5jm5xbi5v22djcfdsmi-packages.json.drv'... Going to be running update for following packages: - python3.11-oldest-supported-numpy-2023.12.21 Press Enter key to continue... Running update for: - python3.11-oldest-supported-numpy-2023.12.21: UPDATING ... - python3.11-oldest-supported-numpy-2023.12.21: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.oldest-supported-numpy 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath libxmlxx, using log file: /var/log/nixpkgs-update/libxmlxx/2024-04-03.log libxmlxx 0 -> 1 attrpath: libxmlxx Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/3s4d6s6ll09b0705qj1wvy35rzyaysq8-packages.json.drv building '/nix/store/3s4d6s6ll09b0705qj1wvy35rzyaysq8-packages.json.drv'... Going to be running update for following packages: - libxml++-2.40.1 Press Enter key to continue... Running update for: - libxml++-2.40.1: UPDATING ... - libxml++-2.40.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update libxmlxx 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO currently don't know how to update perl [result] Failed to update perl536Packages.TextMultiMarkdown 1.001 -> 1.002000 https://repology.org/project/perl:text-multimarkdown/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pandoc-plantuml-filter, using log file: /var/log/nixpkgs-update/pandoc-plantuml-filter/2024-04-03.log pandoc-plantuml-filter 0 -> 1 attrpath: pandoc-plantuml-filter Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/mp6hymccv3w9fy7izajb776m4wiwfp10-packages.json.drv building '/nix/store/mp6hymccv3w9fy7izajb776m4wiwfp10-packages.json.drv'... Going to be running update for following packages: - pandoc-plantuml-filter-0.1.2 Press Enter key to continue... Running update for: - pandoc-plantuml-filter-0.1.2: UPDATING ... - pandoc-plantuml-filter-0.1.2: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/tools/misc/pandoc-plantuml-filter/default.nix b/pkgs/tools/misc/pandoc-plantuml-filter/default.nix index d8c1bb2ea8a3..5b4b3af18946 100644 --- a/pkgs/tools/misc/pandoc-plantuml-filter/default.nix +++ b/pkgs/tools/misc/pandoc-plantuml-filter/default.nix @@ -6,11 +6,11 @@ buildPythonApplication rec { pname = "pandoc-plantuml-filter"; - version = "0.1.2"; + version = "0.1.5"; src = fetchPypi { inherit pname version; - sha256 = "08673mfwxsw6s52mgglbdz7ybb68svqyr3s9w97d7rifbwvvc9ia"; + sha256 = "sha256-9qXeIZuCu44m9EoPCPL7MgEboEwN91OylLfbkwhkZYQ="; }; propagatedBuildInputs = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A pandoc-plantuml-filter nix build failed. Sourcing python-imports-check-hook.sh Using pythonImportsCheckPhase Sourcing python-namespaces-hook Sourcing python-catch-conflicts-hook.sh Sourcing setuptools-check-hook Using setuptoolsCheckPhase @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/7ni37svalssrxyn1a5mj1lbvjyvnwbyk-pandoc-plantuml-filter-0.1.5.tar.gz source root is pandoc-plantuml-filter-0.1.5 setting SOURCE_DATE_EPOCH to timestamp 1702211668 of file pandoc-plantuml-filter-0.1.5/setup.cfg @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase @nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" } Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "configurePhase" } Running phase: configurePhase no configure script, doing nothing @nix { "action": "setPhase", "phase": "buildPhase" } Running phase: buildPhase Executing setuptoolsBuildPhase Traceback (most recent call last): File "/build/pandoc-plantuml-filter-0.1.5/nix_run_setup", line 8, in exec(compile(getattr(tokenize, 'open', open)(__file__).read().replace('\\r\\n', '\\n'), __file__, 'exec')) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/gd3shnza1i50zn8zs04fa729ribr88m9-python3-3.11.8/lib/python3.11/tokenize.py", line 396, in open buffer = _builtin_open(filename, 'rb') ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ FileNotFoundError: [Errno 2] No such file or directory: 'setup.py' /nix/store/v5lsd029lz5lfhamivbgqyp3zdv94ah2-stdenv-linux/setup: line 1578: pop_var_context: head of shell_variables not a function context [result] Failed to update pandoc-plantuml-filter 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath octavePackages.io, using log file: /var/log/nixpkgs-update/octavePackages.io/2024-04-03.log octavePackages.io 0 -> 1 attrpath: octavePackages.io Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/25gd5js4iqmbkxy2m4b4k8sqcr63bb4y-packages.json.drv building '/nix/store/25gd5js4iqmbkxy2m4b4k8sqcr63bb4y-packages.json.drv'... Going to be running update for following packages: - octave-8.4.0-io-2.6.4 Press Enter key to continue... Running update for: - octave-8.4.0-io-2.6.4: UPDATING ... - octave-8.4.0-io-2.6.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update octavePackages.io 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.twine, using log file: /var/log/nixpkgs-update/python311Packages.twine/2024-04-03.log python311Packages.twine 0 -> 1 attrpath: python311Packages.twine Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/g9188280qyy5v8h70fmgcmkksp5v2lmm-packages.json.drv building '/nix/store/g9188280qyy5v8h70fmgcmkksp5v2lmm-packages.json.drv'... Going to be running update for following packages: - python3.11-twine-5.0.0 Press Enter key to continue... Running update for: - python3.11-twine-5.0.0: UPDATING ... - python3.11-twine-5.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.twine 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.awsiotpythonsdk, using log file: /var/log/nixpkgs-update/python311Packages.awsiotpythonsdk/2024-04-03.log python311Packages.awsiotpythonsdk 0 -> 1 attrpath: python311Packages.awsiotpythonsdk Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/9ciakl9qlq77chxshgqz2b3r81vlk6wf-packages.json.drv building '/nix/store/9ciakl9qlq77chxshgqz2b3r81vlk6wf-packages.json.drv'... Going to be running update for following packages: - python3.11-awsiotpythonsdk-1.5.4 Press Enter key to continue... Running update for: - python3.11-awsiotpythonsdk-1.5.4: UPDATING ... - python3.11-awsiotpythonsdk-1.5.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.awsiotpythonsdk 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.types-decorator, using log file: /var/log/nixpkgs-update/python311Packages.types-decorator/2024-04-03.log python311Packages.types-decorator 0 -> 1 attrpath: python311Packages.types-decorator Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/iar49p3387sy8zrv5b7kr1mbncznliif-packages.json.drv building '/nix/store/iar49p3387sy8zrv5b7kr1mbncznliif-packages.json.drv'... Going to be running update for following packages: - python3.11-types-decorator-5.1.8.20240310 Press Enter key to continue... Running update for: - python3.11-types-decorator-5.1.8.20240310: UPDATING ... - python3.11-types-decorator-5.1.8.20240310: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.types-decorator 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath libmediaart, using log file: /var/log/nixpkgs-update/libmediaart/2024-04-03.log libmediaart 0 -> 1 attrpath: libmediaart Checking auto update branch... Do not update GNOME during a release cycle [result] Failed to update libmediaart 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pokefinder, using log file: /var/log/nixpkgs-update/pokefinder/2024-04-03.log pokefinder 0 -> 1 attrpath: pokefinder Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/dg0xizyj6pzcikf57cgbzh8pl4z1fn7n-packages.json.drv building '/nix/store/dg0xizyj6pzcikf57cgbzh8pl4z1fn7n-packages.json.drv'... Going to be running update for following packages: - pokefinder-4.1.2 Press Enter key to continue... Running update for: - pokefinder-4.1.2: UPDATING ... - pokefinder-4.1.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update pokefinder 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath terraform-providers.null, using log file: /var/log/nixpkgs-update/terraform-providers.null/2024-04-03.log terraform-providers.null 0 -> 1 attrpath: terraform-providers.null Checking auto update branch... Derivation file opts-out of auto-updates [result] Failed to update terraform-providers.null 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath sockdump, using log file: /var/log/nixpkgs-update/sockdump/2024-04-03.log sockdump 0 -> 1 attrpath: sockdump Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/5llh28hnk13dsa1g48478qzn271arvqk-packages.json.drv building '/nix/store/5llh28hnk13dsa1g48478qzn271arvqk-packages.json.drv'... Going to be running update for following packages: - sockdump-unstable-2023-12-11 Press Enter key to continue... Running update for: - sockdump-unstable-2023-12-11: UPDATING ... - sockdump-unstable-2023-12-11: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update sockdump 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath hiawatha, using log file: /var/log/nixpkgs-update/hiawatha/2024-04-03.log hiawatha 10.11 -> 11.5 https://repology.org/project/hiawatha/versions attrpath: hiawatha Checking auto update branch... No auto update branch exists There might already be an open PR for this update: - hiawatha: 10.11 -> 11.5 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/282936" [result] Failed to update hiawatha 10.11 -> 11.5 https://repology.org/project/hiawatha/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.flask-jwt-extended, using log file: /var/log/nixpkgs-update/python311Packages.flask-jwt-extended/2024-04-03.log python311Packages.flask-jwt-extended 0 -> 1 attrpath: python311Packages.flask-jwt-extended Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/wdifva6pjpp1bsacl6qajqryyy6fpadd-packages.json.drv building '/nix/store/wdifva6pjpp1bsacl6qajqryyy6fpadd-packages.json.drv'... Going to be running update for following packages: - python3.11-flask-jwt-extended-4.6.0 Press Enter key to continue... Running update for: - python3.11-flask-jwt-extended-4.6.0: UPDATING ... - python3.11-flask-jwt-extended-4.6.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.flask-jwt-extended 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath obs-studio-plugins.obs-multi-rtmp, using log file: /var/log/nixpkgs-update/obs-studio-plugins.obs-multi-rtmp/2024-04-03.log obs-studio-plugins.obs-multi-rtmp 0.2.8.1-OBS28 -> 0.5.0.4 https://repology.org/project/obs-multi-rtmp/versions attrpath: obs-studio-plugins.obs-multi-rtmp Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/applications/video/obs-studio/plugins/obs-multi-rtmp/default.nix b/pkgs/applications/video/obs-studio/plugins/obs-multi-rtmp/default.nix index e7c0d144b41d..07f1ce569c08 100644 --- a/pkgs/applications/video/obs-studio/plugins/obs-multi-rtmp/default.nix +++ b/pkgs/applications/video/obs-studio/plugins/obs-multi-rtmp/default.nix @@ -2,13 +2,13 @@ stdenv.mkDerivation rec { pname = "obs-multi-rtmp"; - version = "0.2.8.1-OBS28"; + version = "0.5.0.4"; src = fetchFromGitHub { owner = "sorayuki"; repo = "obs-multi-rtmp"; rev = version; - sha256 = "sha256-1W+c8Y0AmtKQmCIg8IDAaYYStQzDpZRuqw3vZEY5ncU="; + sha256 = "sha256-rpImKi09ARq0htDCj/xUzpTjjgUQx1Ww9yFIOiv+ZI8="; }; nativeBuildInputs = [ cmake ]; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A obs-studio-plugins.obs-multi-rtmp nix build failed. got build log for 'obs-studio-plugins.obs-multi-rtmp' from 'daemon' @nix { "action": "setPhase", "phase": "qtPreHook" } Running phase: qtPreHook @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/rpknwxf11gs9wknkm2cph3mj3kjdsxlc-source source root is source @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase applying patch /nix/store/0m19vcpz37azcqrlr29s32pjnmq5wy71-fix-build.patch patching file CMakeLists.txt Hunk #1 FAILED at 65. Hunk #2 FAILED at 96. 2 out of 2 hunks FAILED -- saving rejects to file CMakeLists.txt.rej [result] Failed to update obs-studio-plugins.obs-multi-rtmp 0.2.8.1-OBS28 -> 0.5.0.4 https://repology.org/project/obs-multi-rtmp/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.ms-active-directory, using log file: /var/log/nixpkgs-update/python311Packages.ms-active-directory/2024-04-03.log python311Packages.ms-active-directory 0 -> 1 attrpath: python311Packages.ms-active-directory Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/p732ygfab6q1ghf4b1k6a3v4xbii3ndy-packages.json.drv building '/nix/store/p732ygfab6q1ghf4b1k6a3v4xbii3ndy-packages.json.drv'... Going to be running update for following packages: - python3.11-ms-active-directory-1.13.0 Press Enter key to continue... Running update for: - python3.11-ms-active-directory-1.13.0: UPDATING ... - python3.11-ms-active-directory-1.13.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.ms-active-directory 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath net-cpp, using log file: /var/log/nixpkgs-update/net-cpp/2024-04-03.log net-cpp 0 -> 1 attrpath: net-cpp Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/i0qg2f9igr1rzmsbd9i5mj1s73n9vp41-packages.json.drv building '/nix/store/i0qg2f9igr1rzmsbd9i5mj1s73n9vp41-packages.json.drv'... Going to be running update for following packages: - net-cpp-3.1.1 Press Enter key to continue... Running update for: - net-cpp-3.1.1: UPDATING ... - net-cpp-3.1.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update net-cpp 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath go-tools, using log file: /var/log/nixpkgs-update/go-tools/2024-04-03.log go-tools 2023.1.7 -> 0.19.0 https://repology.org/project/go:tools/versions attrpath: go-tools Checking auto update branch... No auto update branch exists 0.19.0 is not newer than 2023.1.7 according to Nix; versionComparison: -1 [result] Failed to update go-tools 2023.1.7 -> 0.19.0 https://repology.org/project/go:tools/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath ghfetch, using log file: /var/log/nixpkgs-update/ghfetch/2024-04-03.log ghfetch 0.0.19 -> 1.5.3 https://repology.org/project/ghfetch/versions attrpath: ghfetch Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/wsh46l9d649pqmlanl2j3myhf6w5d622-source.drv building '/nix/store/wsh46l9d649pqmlanl2j3myhf6w5d622-source.drv'... trying https://github.com/orangekame3/ghfetch/archive/v1.5.3.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/wsh46l9d649pqmlanl2j3myhf6w5d622-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/orangekame3/ghfetch/archive/v1.5.3.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/wsh46l9d649pqmlanl2j3myhf6w5d622-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'ghfetch.originalSrc' not found stderr did not split as expected full stderr was: these 3 derivations will be built: /nix/store/wsh46l9d649pqmlanl2j3myhf6w5d622-source.drv /nix/store/zgrcg4yy744kz7556j0k5srhwjifls4f-ghfetch-1.5.3-go-modules.drv /nix/store/brw6xihlfh8adfq32hp9acywh6silk26-ghfetch-1.5.3.drv building '/nix/store/wsh46l9d649pqmlanl2j3myhf6w5d622-source.drv'... trying https://github.com/orangekame3/ghfetch/archive/v1.5.3.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/wsh46l9d649pqmlanl2j3myhf6w5d622-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/orangekame3/ghfetch/archive/v1.5.3.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/wsh46l9d649pqmlanl2j3myhf6w5d622-source.drv'. error: 1 dependencies of derivation '/nix/store/brw6xihlfh8adfq32hp9acywh6silk26-ghfetch-1.5.3.drv' failed to build [result] Failed to update ghfetch 0.0.19 -> 1.5.3 https://repology.org/project/ghfetch/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.aire_zmvm, using log file: /var/log/nixpkgs-update/rPackages.aire_zmvm/2024-04-03.log rPackages.aire_zmvm 0.8.2 -> 0.9.0 https://repology.org/project/r:aire.zmvm/versions attrpath: rPackages.aire_zmvm Checking auto update branch... No auto update branch exists Old version 0.8.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.aire_zmvm 0.8.2 -> 0.9.0 https://repology.org/project/r:aire.zmvm/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.Mqrcm, using log file: /var/log/nixpkgs-update/rPackages.Mqrcm/2024-04-03.log rPackages.Mqrcm 1.2 -> 1.3 https://repology.org/project/r:mqrcm/versions attrpath: rPackages.Mqrcm Checking auto update branch... No auto update branch exists Old version 1.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.Mqrcm 1.2 -> 1.3 https://repology.org/project/r:mqrcm/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath jogl, using log file: /var/log/nixpkgs-update/jogl/2024-04-03.log jogl 2.4.0 -> 2.5.0 https://repology.org/project/java:jogl/versions attrpath: jogl Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update jogl 2.4.0 -> 2.5.0 https://repology.org/project/java:jogl/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.polyline, using log file: /var/log/nixpkgs-update/python312Packages.polyline/2024-04-03.log python312Packages.polyline 2.0.1 -> 2.0.2 https://repology.org/project/python:polyline/versions attrpath: python312Packages.polyline Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/y7mvz7spxncsdp19im30cfw9w3s279pv-packages.json.drv building '/nix/store/y7mvz7spxncsdp19im30cfw9w3s279pv-packages.json.drv'... Going to be running update for following packages: - python3.12-polyline-2.0.1 Press Enter key to continue... Running update for: - python3.12-polyline-2.0.1: UPDATING ... - python3.12-polyline-2.0.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python312Packages.polyline 2.0.1 -> 2.0.2 https://repology.org/project/python:polyline/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.movecost, using log file: /var/log/nixpkgs-update/rPackages.movecost/2024-04-03.log rPackages.movecost 2.0 -> 2.1 https://repology.org/project/r:movecost/versions attrpath: rPackages.movecost Checking auto update branch... No auto update branch exists Old version 2.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.movecost 2.0 -> 2.1 https://repology.org/project/r:movecost/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath risor, using log file: /var/log/nixpkgs-update/risor/2024-04-03.log risor 1.5.1 -> 1.5.2 https://repology.org/project/risor/versions attrpath: risor Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Found old vendorHash = "sha256-eW6eSZp5Msg/u50i1+S2KSzDws0Rq8JBY1Yxzq7/hVo=" [golangModuleVersion] Replaced vendorHash with sha256-eW6eSZp5Msg/u50i1+S2KSzDws0Rq8JBY1Yxzq7/hVo= [golangModuleVersion] Finished updating vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/interpreters/risor/default.nix b/pkgs/development/interpreters/risor/default.nix index 9cd56ba22e92..89b31b8aa9b0 100644 --- a/pkgs/development/interpreters/risor/default.nix +++ b/pkgs/development/interpreters/risor/default.nix @@ -7,13 +7,13 @@ buildGoModule rec { pname = "risor"; - version = "1.5.1"; + version = "1.5.2"; src = fetchFromGitHub { owner = "risor-io"; repo = "risor"; rev = "v${version}"; - hash = "sha256-bGlJe61B5jMb1u81NvNMJDW+dNem6bNFT7DJYno5jCk="; + hash = "sha256-tvEiboH5cGRpyBmmpu8A1UlDR1Y9XPe1pUNS0/Jvooc="; }; proxyVendor = true; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/c6b12cq1az4wz30j7sb34dq7dsza6bcs-risor-1.5.2" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • risor
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/risor/versions. meta.description for risor is: Fast and flexible scripting for Go developers and DevOps meta.homepage for risor is: https://github.com/risor-io/risor meta.changelog for risor is: https://github.com/risor-io/risor/releases/tag/v1.5.2 ###### Updates performed - Golang update ###### To inspect upstream changes - [Release on GitHub](https://github.com/risor-io/risor/releases/tag/v1.5.2) - [Compare changes on GitHub](https://github.com/risor-io/risor/compare/v1.5.1...v1.5.2) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 1.5.2 with grep in /nix/store/c6b12cq1az4wz30j7sb34dq7dsza6bcs-risor-1.5.2 - found 1.5.2 in filename of file in /nix/store/c6b12cq1az4wz30j7sb34dq7dsza6bcs-risor-1.5.2 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath risor ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/c6b12cq1az4wz30j7sb34dq7dsza6bcs-risor-1.5.2 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A risor https://github.com/r-ryantm/nixpkgs/archive/30edf65874e2e87871afdd0f1c37263fe8c3acf2.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/30edf65874e2e87871afdd0f1c37263fe8c3acf2#risor ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/c6b12cq1az4wz30j7sb34dq7dsza6bcs-risor-1.5.2 ls -la /nix/store/c6b12cq1az4wz30j7sb34dq7dsza6bcs-risor-1.5.2/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • risor
--- ###### Maintainer pings cc @figsoda for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301215 [result] Success updating risor 1.5.1 -> 1.5.2 https://repology.org/project/risor/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.oslo-log, using log file: /var/log/nixpkgs-update/python311Packages.oslo-log/2024-04-03.log python311Packages.oslo-log 0 -> 1 attrpath: python311Packages.oslo-log Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/5c07ijxvv5vma8a5w5hvm9a17bdawkkb-packages.json.drv building '/nix/store/5c07ijxvv5vma8a5w5hvm9a17bdawkkb-packages.json.drv'... Going to be running update for following packages: - python3.11-oslo-log-5.5.0 Press Enter key to continue... Running update for: - python3.11-oslo-log-5.5.0: UPDATING ... - python3.11-oslo-log-5.5.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/oslo-log/default.nix b/pkgs/development/python-modules/oslo-log/default.nix index ab1084750996..bc4584bcee5a 100644 --- a/pkgs/development/python-modules/oslo-log/default.nix +++ b/pkgs/development/python-modules/oslo-log/default.nix @@ -17,7 +17,7 @@ buildPythonPackage rec { pname = "oslo-log"; - version = "5.5.0"; + version = "5.5.1"; format = "setuptools"; disabled = pythonOlder "3.8"; @@ -25,7 +25,7 @@ buildPythonPackage rec { src = fetchPypi { pname = "oslo.log"; inherit version; - hash = "sha256-TO3RZpx94o2OZrZ6X21sb+g5KFNfqHzWm/ZhG1n1Z+c="; + hash = "sha256-SEFIUSxdsqizXIPNmX6ZU3Vf2L+oqvbuDMjHrrdCkhA="; }; propagatedBuildInputs = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/cifimlvagyipp8hbn3b3x084hs0yryig-python3.11-oslo-log-5.5.1" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
6 packages built:
  • manilaclient (python311Packages.python-manilaclient)
  • manilaclient.dist (python311Packages.python-manilaclient.dist)
  • python311Packages.oslo-log
  • python311Packages.oslo-log.dist
  • python311Packages.tempest
  • python311Packages.tempest.dist
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from passthru.updateScript. meta.description for python311Packages.oslo-log is: oslo.log library meta.homepage for python311Packages.oslo-log is: https://github.com/openstack/oslo.log ###### Updates performed - Ran passthru.UpdateScript ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 5.5.1 with grep in /nix/store/cifimlvagyipp8hbn3b3x084hs0yryig-python3.11-oslo-log-5.5.1 - found 5.5.1 in filename of file in /nix/store/cifimlvagyipp8hbn3b3x084hs0yryig-python3.11-oslo-log-5.5.1 ---
Rebuild report (if merged into master) (click to expand) ``` 4 total rebuild path(s) 4 package rebuild(s) First fifty rebuilds by attrpath manilaclient python311Packages.oslo-log python311Packages.python-manilaclient python311Packages.tempest ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/cifimlvagyipp8hbn3b3x084hs0yryig-python3.11-oslo-log-5.5.1 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A python311Packages.oslo-log https://github.com/r-ryantm/nixpkgs/archive/8352227f58e76cf53262633cda6b06924a4c86f6.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/8352227f58e76cf53262633cda6b06924a4c86f6#python311Packages.oslo-log ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/cifimlvagyipp8hbn3b3x084hs0yryig-python3.11-oslo-log-5.5.1 ls -la /nix/store/cifimlvagyipp8hbn3b3x084hs0yryig-python3.11-oslo-log-5.5.1/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
6 packages built:
  • manilaclient (python311Packages.python-manilaclient)
  • manilaclient.dist (python311Packages.python-manilaclient.dist)
  • python311Packages.oslo-log
  • python311Packages.oslo-log.dist
  • python311Packages.tempest
  • python311Packages.tempest.dist
--- ###### Maintainer pings cc @SuperSandro2000 for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301218 [result] Success updating python311Packages.oslo-log 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.playwrightcapture, using log file: /var/log/nixpkgs-update/python312Packages.playwrightcapture/2024-04-03.log python312Packages.playwrightcapture 1.23.14 -> 1.24.1 https://repology.org/project/python:playwrightcapture/versions attrpath: python312Packages.playwrightcapture Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/sgfshhr2y2nrsvkkrva0f02cyzgymrgx-packages.json.drv building '/nix/store/sgfshhr2y2nrsvkkrva0f02cyzgymrgx-packages.json.drv'... Going to be running update for following packages: - python3.12-playwrightcapture-1.24.1 Press Enter key to continue... Running update for: - python3.12-playwrightcapture-1.24.1: UPDATING ... - python3.12-playwrightcapture-1.24.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python312Packages.playwrightcapture 1.23.14 -> 1.24.1 https://repology.org/project/python:playwrightcapture/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath qucs-s, using log file: /var/log/nixpkgs-update/qucs-s/2024-04-03.log qucs-s 24.1.0 -> 24.2.1 https://repology.org/project/qucs-s/versions attrpath: qucs-s Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/applications/science/electronics/qucs-s/default.nix b/pkgs/applications/science/electronics/qucs-s/default.nix index 4117638a1fda..7dd8104de735 100644 --- a/pkgs/applications/science/electronics/qucs-s/default.nix +++ b/pkgs/applications/science/electronics/qucs-s/default.nix @@ -18,13 +18,13 @@ stdenv.mkDerivation rec { pname = "qucs-s"; - version = "24.1.0"; + version = "24.2.1"; src = fetchFromGitHub { owner = "ra3xdh"; repo = "qucs_s"; rev = version; - sha256 = "sha256-ei9CPlJg+Kfjh7vu5VnT6DNLmmnA8wZ2A1jXnm//Fgo="; + sha256 = "sha256-CJ4YMX0XVa67YEEW8UCHnFRpFlA/THqRae26EuuQR7g="; }; nativeBuildInputs = [ flex bison wrapQtAppsHook cmake ]; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A qucs-s nix build failed. cmake_minimum_required() should be called prior to this top-level project() call. Please see the cmake-commands(7) manual for usage documentation of both commands. This warning is for project developers. Use -Wno-dev to suppress it.  -- The CXX compiler identification is GNU 13.2.0 -- Detecting CXX compiler ABI info -- Detecting CXX compiler ABI info - done -- Check for working CXX compiler: /nix/store/ac1hb5dc2z4biwgy8mjrhlifffkkrvdq-gcc-wrapper-13.2.0/bin/g++ - skipped -- Detecting CXX compile features -- Detecting CXX compile features - done -- Configuring Qucs: VERSION 24.2.1 -- qucs-suite /nix/store/iwg6pgvg9gif5nyy1pl9npwwnnxp8jcl-qucs-s-24.2.1 /build/source/build CMake Error at CMakeLists.txt:41 (find_package): By not providing "FindQt5.cmake" in CMAKE_MODULE_PATH this project has asked CMake to find a package configuration file provided by "Qt5", but CMake did not find one. Could not find a package configuration file provided by "Qt5" with any of the following names: Qt5Config.cmake qt5-config.cmake Add the installation prefix of "Qt5" to CMAKE_PREFIX_PATH or set "Qt5_DIR" to a directory containing one of the above files. If "Qt5" provides a separate development package or SDK, be sure it has been installed.  -- Configuring incomplete, errors occurred! [result] Failed to update qucs-s 24.1.0 -> 24.2.1 https://repology.org/project/qucs-s/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath safety-cli, using log file: /var/log/nixpkgs-update/safety-cli/2024-04-03.log safety-cli 3.0.1 -> 3.1.0 https://github.com/pyupio/safety/releases attrpath: safety-cli Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/2r49gb9pqs3q35yibmq6s7npjnkpv90l-packages.json.drv building '/nix/store/2r49gb9pqs3q35yibmq6s7npjnkpv90l-packages.json.drv'... Going to be running update for following packages: - safety-3.0.1 Press Enter key to continue... Running update for: - safety-3.0.1: UPDATING ... - safety-3.0.1: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/safety/default.nix b/pkgs/development/python-modules/safety/default.nix index 529ed4d8d4c2..1a5e1ab8f461 100644 --- a/pkgs/development/python-modules/safety/default.nix +++ b/pkgs/development/python-modules/safety/default.nix @@ -24,7 +24,7 @@ buildPythonPackage rec { pname = "safety"; - version = "3.0.1"; + version = "3.1.0"; disabled = pythonOlder "3.7"; @@ -32,7 +32,7 @@ buildPythonPackage rec { src = fetchPypi { inherit pname version; - hash = "sha256-HyAA8DZS86C/xn+P0emLxXI8y3bhXLG91oVFw9gD3wE="; + hash = "sha256-cfR7guzhU+wvJA4nf3y/pw1douDRQxYsZ/Y7L3RZoao="; }; postPatch = '' No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A safety-cli nix build failed. Running phase: pytestCheckPhase Executing pytestCheckPhase ============================= test session starts ============================== platform linux -- Python 3.11.8, pytest-8.0.2, pluggy-1.4.0 rootdir: /build/safety-3.1.0 collecting ...  collecting 0 items / 1 error  collected 90 items / 1 error / 5 deselected / 85 selected  ==================================== ERRORS ==================================== _________________ ERROR collecting tests/alerts/test_utils.py __________________ ImportError while importing test module '/build/safety-3.1.0/tests/alerts/test_utils.py'. Hint: make sure your test modules/packages have valid Python names. Traceback: /nix/store/gd3shnza1i50zn8zs04fa729ribr88m9-python3-3.11.8/lib/python3.11/importlib/__init__.py:126: in import_module return _bootstrap._gcd_import(name[level:], package, level) tests/alerts/test_utils.py:4: in from safety.alerts import utils safety/alerts/__init__.py:9: in from safety.cli_util import SafetyCLILegacyGroup safety/cli_util.py:9: in from safety.auth.constants import CLI_AUTH, MSG_NON_AUTHENTICATED safety/auth/__init__.py:3: in from .cli import auth safety/auth/cli.py:22: in from ..cli_util import get_command_for, pass_safety_cli_obj, SafetyCLISubGroup E ImportError: cannot import name 'get_command_for' from partially initialized module 'safety.cli_util' (most likely due to a circular import) (/build/safety-3.1.0/safety/cli_util.py) =========================== short test summary info ============================ ERROR tests/alerts/test_utils.py !!!!!!!!!!!!!!!!!!!! Interrupted: 1 error during collection !!!!!!!!!!!!!!!!!!!! ======================== 5 deselected, 1 error in 0.92s ======================== /nix/store/v5lsd029lz5lfhamivbgqyp3zdv94ah2-stdenv-linux/setup: line 1578: pop_var_context: head of shell_variables not a function context [result] Failed to update safety-cli 3.0.1 -> 3.1.0 https://github.com/pyupio/safety/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pylacrosse, using log file: /var/log/nixpkgs-update/python311Packages.pylacrosse/2024-04-03.log python311Packages.pylacrosse 0 -> 1 attrpath: python311Packages.pylacrosse Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/xd61cn6pcwqwylk5d5dbm10qwj9605c0-packages.json.drv building '/nix/store/xd61cn6pcwqwylk5d5dbm10qwj9605c0-packages.json.drv'... Going to be running update for following packages: - python3.11-pylacrosse-0.4 Press Enter key to continue... Running update for: - python3.11-pylacrosse-0.4: UPDATING ... - python3.11-pylacrosse-0.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pylacrosse 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.beanstalkc, using log file: /var/log/nixpkgs-update/python311Packages.beanstalkc/2024-04-03.log python311Packages.beanstalkc 0 -> 1 attrpath: python311Packages.beanstalkc Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/wchxa5dx074mbf0vvaszfph3j7ajlyxc-packages.json.drv building '/nix/store/wchxa5dx074mbf0vvaszfph3j7ajlyxc-packages.json.drv'... Going to be running update for following packages: - python3.11-beanstalkc-0.5.2 Press Enter key to continue... Running update for: - python3.11-beanstalkc-0.5.2: UPDATING ... - python3.11-beanstalkc-0.5.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.beanstalkc 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath evcc, using log file: /var/log/nixpkgs-update/evcc/2024-04-03.log evcc 0 -> 1 attrpath: evcc Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] skipping because derivation has updateScript [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/99nzyvalnmighjx1sh8gs6nava1g45nf-packages.json.drv building '/nix/store/99nzyvalnmighjx1sh8gs6nava1g45nf-packages.json.drv'... Going to be running update for following packages: - evcc-0.124.10 Press Enter key to continue... Running update for: - evcc-0.124.10: UPDATING ... - evcc-0.124.10: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update evcc 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.callr, using log file: /var/log/nixpkgs-update/rPackages.callr/2024-04-03.log rPackages.callr 3.7.3 -> 3.7.6 https://repology.org/project/r:callr/versions attrpath: rPackages.callr Checking auto update branch... No auto update branch exists Old version 3.7.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.callr 3.7.3 -> 3.7.6 https://repology.org/project/r:callr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.winch, using log file: /var/log/nixpkgs-update/rPackages.winch/2024-04-03.log rPackages.winch 0.1.0 -> 0.1.1 https://repology.org/project/r:winch/versions attrpath: rPackages.winch Checking auto update branch... No auto update branch exists Old version 0.1.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.winch 0.1.0 -> 0.1.1 https://repology.org/project/r:winch/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.facedancer, using log file: /var/log/nixpkgs-update/python312Packages.facedancer/2024-04-03.log python312Packages.facedancer 2019.3.2 -> 2.9.0 https://repology.org/project/python:facedancer/versions attrpath: python312Packages.facedancer Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/gvwm4x6xffa5h29g3w406ih7zy6dicr5-packages.json.drv building '/nix/store/gvwm4x6xffa5h29g3w406ih7zy6dicr5-packages.json.drv'... Going to be running update for following packages: - python3.12-facedancer-2019.3.2 Press Enter key to continue... Running update for: - python3.12-facedancer-2019.3.2: UPDATING ... - python3.12-facedancer-2019.3.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python312Packages.facedancer 2019.3.2 -> 2.9.0 https://repology.org/project/python:facedancer/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.wagtail-modeladmin, using log file: /var/log/nixpkgs-update/python311Packages.wagtail-modeladmin/2024-04-03.log python311Packages.wagtail-modeladmin 0 -> 1 attrpath: python311Packages.wagtail-modeladmin Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/p917hi1lz2nxji7xb5j1ipp4zq5cg7q0-packages.json.drv building '/nix/store/p917hi1lz2nxji7xb5j1ipp4zq5cg7q0-packages.json.drv'... Going to be running update for following packages: - python3.11-wagtail-modeladmin-2.0.0 Press Enter key to continue... Running update for: - python3.11-wagtail-modeladmin-2.0.0: UPDATING ... - python3.11-wagtail-modeladmin-2.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.wagtail-modeladmin 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.LipidMS, using log file: /var/log/nixpkgs-update/rPackages.LipidMS/2024-04-03.log rPackages.LipidMS 3.0.3 -> 3.0.4 https://repology.org/project/r:lipidms/versions attrpath: rPackages.LipidMS Checking auto update branch... No auto update branch exists Old version 3.0.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.LipidMS 3.0.3 -> 3.0.4 https://repology.org/project/r:lipidms/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.MARSS, using log file: /var/log/nixpkgs-update/rPackages.MARSS/2024-04-03.log rPackages.MARSS 3.11.8 -> 3.11.9 https://repology.org/project/r:marss/versions attrpath: rPackages.MARSS Checking auto update branch... No auto update branch exists Old version 3.11.8" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.MARSS 3.11.8 -> 3.11.9 https://repology.org/project/r:marss/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.usethis, using log file: /var/log/nixpkgs-update/rPackages.usethis/2024-04-03.log rPackages.usethis 2.2.2 -> 2.2.3 https://repology.org/project/r:usethis/versions attrpath: rPackages.usethis Checking auto update branch... No auto update branch exists Old version 2.2.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.usethis 2.2.2 -> 2.2.3 https://repology.org/project/r:usethis/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.linear-garage-door, using log file: /var/log/nixpkgs-update/python311Packages.linear-garage-door/2024-04-03.log python311Packages.linear-garage-door 0 -> 1 attrpath: python311Packages.linear-garage-door Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/6cqcisfwlv4dn3wrapsbmsxl2c0n26n5-packages.json.drv building '/nix/store/6cqcisfwlv4dn3wrapsbmsxl2c0n26n5-packages.json.drv'... Going to be running update for following packages: - python3.11-linear-garage-door-0.2.9 Press Enter key to continue... Running update for: - python3.11-linear-garage-door-0.2.9: UPDATING ... - python3.11-linear-garage-door-0.2.9: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.linear-garage-door 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lua51Packages.nvim-nio, using log file: /var/log/nixpkgs-update/lua51Packages.nvim-nio/2024-04-03.log lua51Packages.nvim-nio 1.2.0-1 -> 1.8.1 https://repology.org/project/lua:nvim-nio/versions attrpath: lua51Packages.nvim-nio Packages for lua are currently skipped. https://github.com/NixOS/nixpkgs/pull/37501#issuecomment-375169646 [result] Failed to update lua51Packages.nvim-nio 1.2.0-1 -> 1.8.1 https://repology.org/project/lua:nvim-nio/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rerun, using log file: /var/log/nixpkgs-update/rerun/2024-04-03.log rerun 0.13.0 -> 0.14.0 https://repology.org/project/rerun/versions attrpath: rerun Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] Replacing cargoHash with sha256-F8FtCY3YP4JYwEbOX6a/NOnXEjrEqdodVega3nCknoY= Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A rerun nix build failed.  Compiling vec1 v1.10.1  Compiling eframe v0.26.2  Compiling poll-promise v0.3.0  Compiling re_sdk v0.14.0 (/build/source/crates/re_sdk)  Compiling re_crash_handler v0.14.0 (/build/source/crates/re_crash_handler)  Compiling re_space_view_time_series v0.14.0 (/build/source/crates/re_space_view_time_series)  Compiling re_space_view_spatial v0.14.0 (/build/source/crates/re_space_view_spatial)  Compiling re_space_view_text_log v0.14.0 (/build/source/crates/re_space_view_text_log)  Compiling re_space_view_tensor v0.14.0 (/build/source/crates/re_space_view_tensor)  Compiling re_viewport v0.14.0 (/build/source/crates/re_viewport)  Compiling re_time_panel v0.14.0 (/build/source/crates/re_time_panel)  Compiling re_web_viewer_server v0.14.0 (/build/source/crates/re_web_viewer_server) error: couldn't read crates/re_web_viewer_server/src/../web_viewer/re_viewer.js: No such file or directory (os error 2)  --> crates/re_web_viewer_server/src/lib.rs:30:34  | 30 |  pub const VIEWER_JS: &[u8] = include_bytes!("../web_viewer/re_viewer.js");  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^  |  = note: this error originates in the macro `include_bytes` (in Nightly builds, run with -Z macro-backtrace for more info) error: couldn't read crates/re_web_viewer_server/src/../web_viewer/re_viewer_bg.wasm: No such file or directory (os error 2)  --> crates/re_web_viewer_server/src/lib.rs:31:36  | 31 |  pub const VIEWER_WASM: &[u8] = include_bytes!("../web_viewer/re_viewer_bg.wasm");  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^  |  = note: this error originates in the macro `include_bytes` (in Nightly builds, run with -Z macro-backtrace for more info) error: could not compile `re_web_viewer_server` (lib) due to 2 previous errors warning: build failed, waiting for other jobs to finish... [result] Failed to update rerun 0.13.0 -> 0.14.0 https://repology.org/project/rerun/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.smbprotocol, using log file: /var/log/nixpkgs-update/python312Packages.smbprotocol/2024-04-03.log python312Packages.smbprotocol 1.12.0 -> 1.13.0 https://github.com/jborean93/smbprotocol/releases attrpath: python312Packages.smbprotocol Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] cannot link '/nix/store/.links/0ndliihsb0cyp9aq463wrxhhvx492gzqwcaxc2ll4gkmqxy5v602' to '/nix/store/anhv0grbbjjs5kgnadipv12kkz6qi9bx-packages.json.drv': No space left on device this derivation will be built: /nix/store/anhv0grbbjjs5kgnadipv12kkz6qi9bx-packages.json.drv building '/nix/store/anhv0grbbjjs5kgnadipv12kkz6qi9bx-packages.json.drv'... Going to be running update for following packages: - python3.12-smbprotocol-1.12.0 Press Enter key to continue... Running update for: - python3.12-smbprotocol-1.12.0: UPDATING ... - python3.12-smbprotocol-1.12.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/smbprotocol/default.nix b/pkgs/development/python-modules/smbprotocol/default.nix index f72eef539134..c882ed4a0cb0 100644 --- a/pkgs/development/python-modules/smbprotocol/default.nix +++ b/pkgs/development/python-modules/smbprotocol/default.nix @@ -11,7 +11,7 @@ buildPythonPackage rec { pname = "smbprotocol"; - version = "1.12.0"; + version = "1.13.0"; format = "setuptools"; disabled = pythonOlder "3.7"; @@ -20,7 +20,7 @@ buildPythonPackage rec { owner = "jborean93"; repo = "smbprotocol"; rev = "refs/tags/v${version}"; - hash = "sha256-1huM+/WDrVJsB4ARh6fB6rLFOe9IqSQWr/A78FAk/Ag="; + hash = "sha256-VaNvOT1yVNvkQuYj+vjQxxQv2MxHhC35+k17aiGH4NY="; }; propagatedBuildInputs = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Python package with too many package rebuilds 604 > 500 [result] Failed to update python312Packages.smbprotocol 1.12.0 -> 1.13.0 https://github.com/jborean93/smbprotocol/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.ocrmypdf, using log file: /var/log/nixpkgs-update/python311Packages.ocrmypdf/2024-04-03.log python311Packages.ocrmypdf 16.1.1 -> 16.1.2 https://github.com/ocrmypdf/OCRmyPDF/releases attrpath: python311Packages.ocrmypdf Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/pzhmkibbfq670fkz9nmp3wfygyajpqxd-packages.json.drv building '/nix/store/pzhmkibbfq670fkz9nmp3wfygyajpqxd-packages.json.drv'... Going to be running update for following packages: - python3.11-ocrmypdf-16.1.1 Press Enter key to continue... Running update for: - python3.11-ocrmypdf-16.1.1: UPDATING ... - python3.11-ocrmypdf-16.1.1: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/ocrmypdf/default.nix b/pkgs/development/python-modules/ocrmypdf/default.nix index 3d73d3d19497..47de1128ffc6 100644 --- a/pkgs/development/python-modules/ocrmypdf/default.nix +++ b/pkgs/development/python-modules/ocrmypdf/default.nix @@ -30,7 +30,7 @@ buildPythonPackage rec { pname = "ocrmypdf"; - version = "16.1.1"; + version = "16.1.2"; disabled = pythonOlder "3.10"; @@ -39,14 +39,14 @@ buildPythonPackage rec { src = fetchFromGitHub { owner = "ocrmypdf"; repo = "OCRmyPDF"; - rev = "v${version}"; + rev = "refs/tags/v${version}"; # The content of .git_archival.txt is substituted upon tarball creation, # which creates indeterminism if master no longer points to the tag. # See https://github.com/ocrmypdf/OCRmyPDF/issues/841 postFetch = '' rm "$out/.git_archival.txt" ''; - hash = "sha256-XCYNz1QQodUEidz1+A79yleqOnOCK3zJ8mBIPU5JEQg="; + hash = "sha256-+poLSF0h/3l2oV+j1LwFRAbcPgi7WNcs+iCV/gTRHqo="; }; patches = [ No auto update branch exists There might already be an open PR for this update: - python311Packages.ocrmypdf: 16.1.1 -> 16.1.2 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/297861" [result] Failed to update python311Packages.ocrmypdf 16.1.1 -> 16.1.2 https://github.com/ocrmypdf/OCRmyPDF/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath _86Box, using log file: /var/log/nixpkgs-update/_86Box/2024-04-03.log _86Box 4.1 -> 4.1.1 https://repology.org/project/86box/versions attrpath: _86Box Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update _86Box 4.1 -> 4.1.1 https://repology.org/project/86box/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath ocamlPackages.linenoise, using log file: /var/log/nixpkgs-update/ocamlPackages.linenoise/2024-04-03.log ocamlPackages.linenoise 1.5 -> 1.5.1 https://github.com/fxfactorial/ocaml-linenoise/releases attrpath: ocamlPackages.linenoise Checking auto update branch... An auto update branch exists with message `ocamlPackages.linenoise: 1.5 -> 1.5.1`. New version is 1.5.1. An auto update branch exists with an equal or greater version [result] Failed to update ocamlPackages.linenoise 1.5 -> 1.5.1 https://github.com/fxfactorial/ocaml-linenoise/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.autopep8, using log file: /var/log/nixpkgs-update/python312Packages.autopep8/2024-04-03.log python312Packages.autopep8 2.0.4-unstable-2023-10-27 -> 2.1.0 https://github.com/hhatto/autopep8/releases attrpath: python312Packages.autopep8 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/xsqrhgxx13qlyza6l0bkbbm8ija2gyc4-packages.json.drv building '/nix/store/xsqrhgxx13qlyza6l0bkbbm8ija2gyc4-packages.json.drv'... Going to be running update for following packages: - python3.12-autopep8-2.0.4-unstable-2023-10-27 Press Enter key to continue... Running update for: - python3.12-autopep8-2.0.4-unstable-2023-10-27: UPDATING ... - python3.12-autopep8-2.0.4-unstable-2023-10-27: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python312Packages.autopep8 2.0.4-unstable-2023-10-27 -> 2.1.0 https://github.com/hhatto/autopep8/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.gamble, using log file: /var/log/nixpkgs-update/python312Packages.gamble/2024-04-03.log python312Packages.gamble 0.11 -> 0.13 https://github.com/jpetrucciani/gamble/releases attrpath: python312Packages.gamble Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/vl3w03kikw80mslq2h2h9hq5sdx5601s-packages.json.drv building '/nix/store/vl3w03kikw80mslq2h2h9hq5sdx5601s-packages.json.drv'... Going to be running update for following packages: - python3.12-gamble-0.11 Press Enter key to continue... Running update for: - python3.12-gamble-0.11: UPDATING ... - python3.12-gamble-0.11: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/gamble/default.nix b/pkgs/development/python-modules/gamble/default.nix index 6cdfc4410b34..c4bb32027102 100644 --- a/pkgs/development/python-modules/gamble/default.nix +++ b/pkgs/development/python-modules/gamble/default.nix @@ -7,14 +7,14 @@ buildPythonPackage rec { pname = "gamble"; - version = "0.11"; + version = "0.13"; format = "setuptools"; disabled = pythonOlder "3.7"; src = fetchPypi { inherit pname version; - hash = "sha256-zsEBqhKidgO1e0lpKhw+LY75I2Df+IefNLaSkBBFKFU="; + hash = "sha256-P0w1Q1Kus742Yu/MpqheEbp1+Pt21f163JWZfKJj3SA="; }; nativeCheckInputs = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A python312Packages.gamble nix build failed. Sourcing python-catch-conflicts-hook.sh Sourcing setuptools-check-hook Using setuptoolsCheckPhase Sourcing pytest-check-hook Using pytestCheckPhase Removing setuptoolsCheckPhase @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/915g4ijh2bivlanxcw7j8nyilddcadjd-gamble-0.13.tar.gz source root is gamble-0.13 setting SOURCE_DATE_EPOCH to timestamp 1709928476 of file gamble-0.13/pyproject.toml @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase @nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" } Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "configurePhase" } Running phase: configurePhase no configure script, doing nothing @nix { "action": "setPhase", "phase": "buildPhase" } Running phase: buildPhase Executing setuptoolsBuildPhase Traceback (most recent call last): File "/build/gamble-0.13/nix_run_setup", line 8, in exec(compile(getattr(tokenize, 'open', open)(__file__).read().replace('\\r\\n', '\\n'), __file__, 'exec')) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/fmwqa8nvva4sh18bqayzrilrzxq9fm0f-python3-3.12.2/lib/python3.12/tokenize.py", line 410, in open buffer = _builtin_open(filename, 'rb') ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ FileNotFoundError: [Errno 2] No such file or directory: 'setup.py' /nix/store/v5lsd029lz5lfhamivbgqyp3zdv94ah2-stdenv-linux/setup: line 1578: pop_var_context: head of shell_variables not a function context [result] Failed to update python312Packages.gamble 0.11 -> 0.13 https://github.com/jpetrucciani/gamble/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.mypy-boto3-iotevents, using log file: /var/log/nixpkgs-update/python312Packages.mypy-boto3-iotevents/2024-04-03.log python312Packages.mypy-boto3-iotevents 1.34.47 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases attrpath: python312Packages.mypy-boto3-iotevents Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/wi0fij22i6xhn7v3pwxdqlqgxgpi5yl8-packages.json.drv building '/nix/store/wi0fij22i6xhn7v3pwxdqlqgxgpi5yl8-packages.json.drv'... Going to be running update for following packages: - python3.12-mypy-boto3-iotevents-1.34.47 Press Enter key to continue... Running update for: - python3.12-mypy-boto3-iotevents-1.34.47: UPDATING ... - python3.12-mypy-boto3-iotevents-1.34.47: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python312Packages.mypy-boto3-iotevents 1.34.47 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.vapoursynth, using log file: /var/log/nixpkgs-update/python312Packages.vapoursynth/2024-04-03.log python312Packages.vapoursynth 65 -> 66 https://github.com/vapoursynth/vapoursynth/releases attrpath: python312Packages.vapoursynth Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] cannot link '/nix/store/.links/16v99g4wl1v90j2vp8pp387gy83pp7lb6z4h9wgqarcdwlbmgb9b' to '/nix/store/lc6kg81qlws1qap8czslii71015lj86w-nixpkgs-update-script.drv': No space left on device this derivation will be built: /nix/store/mk43165s3wfs4blxw01b9kciwjmamkkx-packages.json.drv building '/nix/store/mk43165s3wfs4blxw01b9kciwjmamkkx-packages.json.drv'... Going to be running update for following packages: - python3.12-vapoursynth-65 Press Enter key to continue... Running update for: - python3.12-vapoursynth-65: UPDATING ... - python3.12-vapoursynth-65: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python312Packages.vapoursynth 65 -> 66 https://github.com/vapoursynth/vapoursynth/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.google-api-python-client, using log file: /var/log/nixpkgs-update/python312Packages.google-api-python-client/2024-04-03.log python312Packages.google-api-python-client 2.121.0 -> 2.125.0 https://github.com/google/google-api-python-client/releases attrpath: python312Packages.google-api-python-client Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/ad9p05qacyh2j01f1d9y9hb9fp3zspj9-packages.json.drv building '/nix/store/ad9p05qacyh2j01f1d9y9hb9fp3zspj9-packages.json.drv'... Going to be running update for following packages: - python3.12-google-api-python-client-2.121.0 Press Enter key to continue... Running update for: - python3.12-google-api-python-client-2.121.0: UPDATING ... - python3.12-google-api-python-client-2.121.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/google-api-python-client/default.nix b/pkgs/development/python-modules/google-api-python-client/default.nix index fa2ee6aa8d6d..b07133350e2f 100644 --- a/pkgs/development/python-modules/google-api-python-client/default.nix +++ b/pkgs/development/python-modules/google-api-python-client/default.nix @@ -13,14 +13,14 @@ buildPythonPackage rec { pname = "google-api-python-client"; - version = "2.121.0"; + version = "2.125.0"; pyproject = true; disabled = pythonOlder "3.7"; src = fetchPypi { inherit pname version; - hash = "sha256-34Y+zk24s2zhBT69mD5D+8W2ZCCe7XjoLMhK5W3axsA="; + hash = "sha256-UaA4XP9l7BNRBui+YO5xElVzlt3l9EETriORK63doUM="; }; nativeBuildInputs = [ An auto update branch exists with message `python312Packages.google-api-python-client: 2.121.0 -> 2.123.0`. New version is 2.125.0. The auto update branch does not match or exceed the new version. [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/fk068jmjy1097r4fhp3hzqiiprj1893h-python3.12-google-api-python-client-2.125.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
5 packages failed to build:
  • gyb
  • parsedmarc (python311Packages.parsedmarc)
  • parsedmarc.dist (python311Packages.parsedmarc.dist)
  • prowler
  • prowler.dist
60 packages built:
  • beancount (python311Packages.beancount)
  • beancount.dist (python311Packages.beancount.dist)
  • certbot-full
  • deja-dup
  • duplicity
  • duplicity.dist
  • duply
  • fava
  • fava.dist
  • gam
  • gcalcli
  • gcalcli.dist
  • gcp-scanner
  • gcp-scanner.dist
  • git-annex-remote-googledrive
  • git-annex-remote-googledrive.dist
  • goobook (python311Packages.goobook)
  • goobook.dist (python311Packages.goobook.dist)
  • home-assistant-component-tests.google_mail
  • home-assistant-component-tests.google_tasks
  • lbdb
  • ledger2beancount
  • lieer
  • lieer.dist
  • pgadmin4
  • pgadmin4-desktopmode
  • pgadmin4-desktopmode.dist
  • pgadmin4.dist
  • python311Packages.beancount-docverif
  • python311Packages.beancount-docverif.dist
  • python311Packages.certbot-dns-google
  • python311Packages.certbot-dns-google.dist
  • python311Packages.drivelib
  • python311Packages.drivelib.dist
  • python311Packages.dvc-gdrive
  • python311Packages.dvc-gdrive.dist
  • python311Packages.gcsa
  • python311Packages.gcsa.dist
  • python311Packages.google-api-python-client
  • python311Packages.google-api-python-client.dist
  • python311Packages.oauthenticator
  • python311Packages.oauthenticator.dist
  • python311Packages.pydrive2
  • python311Packages.pydrive2.dist
  • python311Packages.weboob
  • python311Packages.weboob.dist
  • python312Packages.beancount
  • python312Packages.beancount-docverif
  • python312Packages.beancount-docverif.dist
  • python312Packages.beancount.dist
  • python312Packages.certbot-dns-google
  • python312Packages.certbot-dns-google.dist
  • python312Packages.gcsa
  • python312Packages.gcsa.dist
  • python312Packages.goobook
  • python312Packages.goobook.dist
  • python312Packages.google-api-python-client
  • python312Packages.google-api-python-client.dist
  • python312Packages.pydrive2
  • python312Packages.pydrive2.dist
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from passthru.updateScript. meta.description for python312Packages.google-api-python-client is: The official Python client library for Google's discovery based APIs meta.homepage for python312Packages.google-api-python-client is: https://github.com/google/google-api-python-client meta.changelog for python312Packages.google-api-python-client is: https://github.com/googleapis/google-api-python-client/releases/tag/v2.125.0 ###### Updates performed - Ran passthru.UpdateScript ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 2.125.0 with grep in /nix/store/fk068jmjy1097r4fhp3hzqiiprj1893h-python3.12-google-api-python-client-2.125.0 - found 2.125.0 in filename of file in /nix/store/fk068jmjy1097r4fhp3hzqiiprj1893h-python3.12-google-api-python-client-2.125.0 ---
Rebuild report (if merged into master) (click to expand) ``` 40 total rebuild path(s) 40 package rebuild(s) First fifty rebuilds by attrpath beancount certbot-full deja-dup duplicity duply fava gam gcalcli gcp-scanner git-annex-remote-googledrive goobook gyb home-assistant-component-tests.google_mail home-assistant-component-tests.google_tasks lbdb ledger2beancount lieer parsedmarc pgadmin4 pgadmin4-desktopmode prowler python311Packages.beancount python311Packages.beancount-docverif python311Packages.certbot-dns-google python311Packages.drivelib python311Packages.dvc-gdrive python311Packages.gcsa python311Packages.goobook python311Packages.google-api-python-client python311Packages.oauthenticator python311Packages.parsedmarc python311Packages.pydrive2 python311Packages.weboob python312Packages.beancount python312Packages.beancount-docverif python312Packages.certbot-dns-google python312Packages.gcsa python312Packages.goobook python312Packages.google-api-python-client python312Packages.pydrive2 ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/fk068jmjy1097r4fhp3hzqiiprj1893h-python3.12-google-api-python-client-2.125.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A python312Packages.google-api-python-client https://github.com/r-ryantm/nixpkgs/archive/4bb06834ec6d4cee8d80bd5728c4a93cb2290884.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/4bb06834ec6d4cee8d80bd5728c4a93cb2290884#python312Packages.google-api-python-client ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/fk068jmjy1097r4fhp3hzqiiprj1893h-python3.12-google-api-python-client-2.125.0 ls -la /nix/store/fk068jmjy1097r4fhp3hzqiiprj1893h-python3.12-google-api-python-client-2.125.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
5 packages failed to build:
  • gyb
  • parsedmarc (python311Packages.parsedmarc)
  • parsedmarc.dist (python311Packages.parsedmarc.dist)
  • prowler
  • prowler.dist
60 packages built:
  • beancount (python311Packages.beancount)
  • beancount.dist (python311Packages.beancount.dist)
  • certbot-full
  • deja-dup
  • duplicity
  • duplicity.dist
  • duply
  • fava
  • fava.dist
  • gam
  • gcalcli
  • gcalcli.dist
  • gcp-scanner
  • gcp-scanner.dist
  • git-annex-remote-googledrive
  • git-annex-remote-googledrive.dist
  • goobook (python311Packages.goobook)
  • goobook.dist (python311Packages.goobook.dist)
  • home-assistant-component-tests.google_mail
  • home-assistant-component-tests.google_tasks
  • lbdb
  • ledger2beancount
  • lieer
  • lieer.dist
  • pgadmin4
  • pgadmin4-desktopmode
  • pgadmin4-desktopmode.dist
  • pgadmin4.dist
  • python311Packages.beancount-docverif
  • python311Packages.beancount-docverif.dist
  • python311Packages.certbot-dns-google
  • python311Packages.certbot-dns-google.dist
  • python311Packages.drivelib
  • python311Packages.drivelib.dist
  • python311Packages.dvc-gdrive
  • python311Packages.dvc-gdrive.dist
  • python311Packages.gcsa
  • python311Packages.gcsa.dist
  • python311Packages.google-api-python-client
  • python311Packages.google-api-python-client.dist
  • python311Packages.oauthenticator
  • python311Packages.oauthenticator.dist
  • python311Packages.pydrive2
  • python311Packages.pydrive2.dist
  • python311Packages.weboob
  • python311Packages.weboob.dist
  • python312Packages.beancount
  • python312Packages.beancount-docverif
  • python312Packages.beancount-docverif.dist
  • python312Packages.beancount.dist
  • python312Packages.certbot-dns-google
  • python312Packages.certbot-dns-google.dist
  • python312Packages.gcsa
  • python312Packages.gcsa.dist
  • python312Packages.goobook
  • python312Packages.goobook.dist
  • python312Packages.google-api-python-client
  • python312Packages.google-api-python-client.dist
  • python312Packages.pydrive2
  • python312Packages.pydrive2.dist
--- ###### Maintainer pings Updated existing PR https://api.github.com/repos/NixOS/nixpkgs/pulls/299205 [result] Success updating python312Packages.google-api-python-client 2.121.0 -> 2.125.0 https://github.com/google/google-api-python-client/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath neocmakelsp, using log file: /var/log/nixpkgs-update/neocmakelsp/2024-04-03.log neocmakelsp 0.6.20 -> 0.6.22 https://repology.org/project/neocmakelsp/versions attrpath: neocmakelsp Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] Replacing cargoHash with sha256-oPyMHrJTZYavE/M7PrTVv387KShLTg+Kwxg5sRYEkN4= [rustCrateVersion] Finished updating Crate version and replacing hashes [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/tools/language-servers/neocmakelsp/default.nix b/pkgs/development/tools/language-servers/neocmakelsp/default.nix index 3bdcf8a7a588..b2052d66a35b 100644 --- a/pkgs/development/tools/language-servers/neocmakelsp/default.nix +++ b/pkgs/development/tools/language-servers/neocmakelsp/default.nix @@ -5,16 +5,16 @@ rustPlatform.buildRustPackage rec { pname = "neocmakelsp"; - version = "0.6.20"; + version = "0.6.22"; src = fetchFromGitHub { owner = "Decodetalkers"; repo = "neocmakelsp"; rev = "v${version}"; - hash = "sha256-ZeaQgGD8XsbSfg5vxT165JLPybPsmmqqsbJiG0CaL7Y="; + hash = "sha256-qc0cWEnMH5S4fr9dMQHSWQ2NsCpfWxGvhkYJF7pgnKI="; }; - cargoHash = "sha256-ljbJ+ZeCtDr8OlGgZ5kgO31chs7/ZD3UfHkq3vWx+h8="; + cargoHash = "sha256-oPyMHrJTZYavE/M7PrTVv387KShLTg+Kwxg5sRYEkN4="; meta = with lib; { description = "A cmake lsp based on tower-lsp and treesitter"; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/jgbvjh5k7xrzjgrn36shjg4am1zjfh1y-neocmakelsp-0.6.22" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • neocmakelsp
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/neocmakelsp/versions. meta.description for neocmakelsp is: A cmake lsp based on tower-lsp and treesitter meta.homepage for neocmakelsp is: https://github.com/Decodetalkers/neocmakelsp ###### Updates performed - Rust version update ###### To inspect upstream changes - [Release on GitHub](https://github.com/Decodetalkers/neocmakelsp/releases/tag/v0.6.22) - [Compare changes on GitHub](https://github.com/Decodetalkers/neocmakelsp/compare/v0.6.20...v0.6.22) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.6.22 with grep in /nix/store/jgbvjh5k7xrzjgrn36shjg4am1zjfh1y-neocmakelsp-0.6.22 - found 0.6.22 in filename of file in /nix/store/jgbvjh5k7xrzjgrn36shjg4am1zjfh1y-neocmakelsp-0.6.22 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath neocmakelsp ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/jgbvjh5k7xrzjgrn36shjg4am1zjfh1y-neocmakelsp-0.6.22 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A neocmakelsp https://github.com/r-ryantm/nixpkgs/archive/853a440235bb8c02488935aa454aaec34976b9a5.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/853a440235bb8c02488935aa454aaec34976b9a5#neocmakelsp ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/jgbvjh5k7xrzjgrn36shjg4am1zjfh1y-neocmakelsp-0.6.22 ls -la /nix/store/jgbvjh5k7xrzjgrn36shjg4am1zjfh1y-neocmakelsp-0.6.22/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • neocmakelsp
--- ###### Maintainer pings cc @wineee for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301226 [result] Success updating neocmakelsp 0.6.20 -> 0.6.22 https://repology.org/project/neocmakelsp/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath reptor, using log file: /var/log/nixpkgs-update/reptor/2024-04-03.log reptor 0.14 -> 0.17 https://repology.org/project/reptor/versions attrpath: reptor Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/y82a57xrsz84k1x8960bcvlavwxgfgsc-packages.json.drv building '/nix/store/y82a57xrsz84k1x8960bcvlavwxgfgsc-packages.json.drv'... Going to be running update for following packages: - reptor-0.16 Press Enter key to continue... Running update for: - reptor-0.16: UPDATING ... - reptor-0.16: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/reptor/default.nix b/pkgs/development/python-modules/reptor/default.nix index 1843505af86d..3f472ef12733 100644 --- a/pkgs/development/python-modules/reptor/default.nix +++ b/pkgs/development/python-modules/reptor/default.nix @@ -32,7 +32,7 @@ buildPythonPackage rec { pname = "reptor"; - version = "0.16"; + version = "0.17"; pyproject = true; disabled = pythonOlder "3.8"; @@ -41,7 +41,7 @@ buildPythonPackage rec { owner = "Syslifters"; repo = "reptor"; rev = "refs/tags/${version}"; - hash = "sha256-xyk83XPITD1sAtuFcndTQg0otDMO89LK+B+9SD89kvo="; + hash = "sha256-3GINDFKgvFv03xF+77K+sTKSm0+kLF5m70dQ/iksZeM="; }; pythonRelaxDeps = true; No auto update branch exists There might already be an open PR for this update: - python312Packages.reptor: 0.16 -> 0.17 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/301219" [result] Failed to update reptor 0.14 -> 0.17 https://repology.org/project/reptor/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath matchbox-server, using log file: /var/log/nixpkgs-update/matchbox-server/2024-04-03.log matchbox-server v0.11.0 -> 0.11.0 https://github.com/poseidon/matchbox/releases attrpath: matchbox-server Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/4xhk4a2ksjjbv4zskdgxxlhyzfr2yx1i-source.drv building '/nix/store/4xhk4a2ksjjbv4zskdgxxlhyzfr2yx1i-source.drv'... trying https://github.com/poseidon/matchbox/archive/0.11.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/4xhk4a2ksjjbv4zskdgxxlhyzfr2yx1i-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/poseidon/matchbox/archive/0.11.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/4xhk4a2ksjjbv4zskdgxxlhyzfr2yx1i-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'matchbox-server.originalSrc' not found stderr did not split as expected full stderr was: these 3 derivations will be built: /nix/store/4xhk4a2ksjjbv4zskdgxxlhyzfr2yx1i-source.drv /nix/store/hml2zmk9jn5sa87vfbk28alkzsx20b58-matchbox-server-0.11.0-go-modules.drv /nix/store/ab8xinmgaw7bdmyl6akcgiaj0i2v4n6h-matchbox-server-0.11.0.drv building '/nix/store/4xhk4a2ksjjbv4zskdgxxlhyzfr2yx1i-source.drv'... trying https://github.com/poseidon/matchbox/archive/0.11.0.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/4xhk4a2ksjjbv4zskdgxxlhyzfr2yx1i-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/poseidon/matchbox/archive/0.11.0.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/4xhk4a2ksjjbv4zskdgxxlhyzfr2yx1i-source.drv'. error: 1 dependencies of derivation '/nix/store/ab8xinmgaw7bdmyl6akcgiaj0i2v4n6h-matchbox-server-0.11.0.drv' failed to build [result] Failed to update matchbox-server v0.11.0 -> 0.11.0 https://github.com/poseidon/matchbox/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.webdataset, using log file: /var/log/nixpkgs-update/python312Packages.webdataset/2024-04-03.log python312Packages.webdataset 0.2.86 -> 0.2.88 https://github.com/webdataset/webdataset/releases attrpath: python312Packages.webdataset Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/b5k56lqnx1zn4ky8il932ywna69dfkb7-packages.json.drv building '/nix/store/b5k56lqnx1zn4ky8il932ywna69dfkb7-packages.json.drv'... Going to be running update for following packages: - python3.12-webdataset-0.2.86 Press Enter key to continue... Running update for: - python3.12-webdataset-0.2.86: UPDATING ... - python3.12-webdataset-0.2.86: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/webdataset/default.nix b/pkgs/development/python-modules/webdataset/default.nix index 5f18d28f9fbd..fbdbce227d27 100644 --- a/pkgs/development/python-modules/webdataset/default.nix +++ b/pkgs/development/python-modules/webdataset/default.nix @@ -16,14 +16,14 @@ }: buildPythonPackage rec { pname = "webdataset"; - version = "0.2.86"; + version = "0.2.88"; pyproject = true; src = fetchFromGitHub { owner = "webdataset"; repo = "webdataset"; rev = "refs/tags/${version}"; - hash = "sha256-aTjxoSoQ9LH4gcFmV+7Aj0HNIpvsFHTrxFUpAtB3nkM="; + hash = "sha256-wsBOBUK4VIGMQXYdgbgsuSH4XYvxDsUv3rh0S5rvA6c="; }; nativeBuildInputs = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A python312Packages.webdataset nix build failed. sh: curl: not found sh: curl: not found sh: curl: not found =============================== warnings summary =============================== ../../nix/store/icww3ji4iv19xb2g9qk3iifl2l8d555s-python3.12-pytest-8.0.2/lib/python3.12/site-packages/_pytest/config/__init__.py:1457 /nix/store/icww3ji4iv19xb2g9qk3iifl2l8d555s-python3.12-pytest-8.0.2/lib/python3.12/site-packages/_pytest/config/__init__.py:1457: PytestConfigWarning: No files were found in testpaths; consider removing or adjusting your testpaths configuration. Searching recursively from the current directory instead. self.args, self.args_source = self._decide_args( tests/test_decode.py::test_xdecode /nix/store/icww3ji4iv19xb2g9qk3iifl2l8d555s-python3.12-pytest-8.0.2/lib/python3.12/site-packages/_pytest/unraisableexception.py:80: PytestUnraisableExceptionWarning: Exception ignored in: Traceback (most recent call last): File "/build/source/webdataset/gopen.py", line 121, in __del__ self.close() File "/build/source/webdataset/gopen.py", line 109, in close self.wait_for_child() File "/build/source/webdataset/gopen.py", line 83, in wait_for_child raise IOError(f"{self.args}: exit {self.status} (read) {info}") OSError: (("curl --connect-timeout 30 --retry 30 --retry-delay 2 -f -s -L 'https://storage.googleapis.com/webdataset/testdata/imagenet-000000.tgz'",), {'shell': True, 'bufsize': 8192}): exit 127 (read) {} warnings.warn(pytest.PytestUnraisableExceptionWarning(msg)) -- Docs: https://docs.pytest.org/en/stable/how-to/capture-warnings.html =========================== short test summary info ============================ FAILED tests/test_cache.py::TestStreamingOpen::test_remote_file - OSError: (("curl --connect-timeout 30 --retry 30 --retry-delay 2 -f -s -L '... FAILED tests/test_cache.py::TestFileCache::test_remote_file - OSError: (("curl --connect-timeout 30 --retry 30 --retry-delay 2 -f -s -L '... FAILED tests/test_fluid.py::test_cache_dir - OSError: (("curl --connect-timeout 30 --retry 30 --retry-delay 2 -f -s -L '... FAILED tests/test_wids_dl.py::test_concurrent_download_and_open - AssertionError: Command failed: curl -s -L https://storage.googleapis.com/w... ===== 4 failed, 109 passed, 9 skipped, 74 deselected, 2 warnings in 22.72s ===== /nix/store/v5lsd029lz5lfhamivbgqyp3zdv94ah2-stdenv-linux/setup: line 1578: pop_var_context: head of shell_variables not a function context [result] Failed to update python312Packages.webdataset 0.2.86 -> 0.2.88 https://github.com/webdataset/webdataset/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.mypy-boto3-sagemaker, using log file: /var/log/nixpkgs-update/python311Packages.mypy-boto3-sagemaker/2024-04-03.log python311Packages.mypy-boto3-sagemaker 1.34.70 -> 1.34.74 https://repology.org/project/python:mypy-boto3-sagemaker/versions attrpath: python311Packages.mypy-boto3-sagemaker Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/86nfsdkf11yq7pn33h5pympkv833aiij-packages.json.drv building '/nix/store/86nfsdkf11yq7pn33h5pympkv833aiij-packages.json.drv'... Going to be running update for following packages: - python3.11-mypy-boto3-sagemaker-1.34.74 Press Enter key to continue... Running update for: - python3.11-mypy-boto3-sagemaker-1.34.74: UPDATING ... - python3.11-mypy-boto3-sagemaker-1.34.74: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.mypy-boto3-sagemaker 1.34.70 -> 1.34.74 https://repology.org/project/python:mypy-boto3-sagemaker/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.mypy-boto3-mwaa, using log file: /var/log/nixpkgs-update/python312Packages.mypy-boto3-mwaa/2024-04-03.log python312Packages.mypy-boto3-mwaa 1.34.57 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases attrpath: python312Packages.mypy-boto3-mwaa Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/x9dw7v41fs59iifp6xskanpb1dqmjhpz-packages.json.drv building '/nix/store/x9dw7v41fs59iifp6xskanpb1dqmjhpz-packages.json.drv'... Going to be running update for following packages: - python3.12-mypy-boto3-mwaa-1.34.57 Press Enter key to continue... Running update for: - python3.12-mypy-boto3-mwaa-1.34.57: UPDATING ... - python3.12-mypy-boto3-mwaa-1.34.57: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python312Packages.mypy-boto3-mwaa 1.34.57 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.mypy-boto3-macie2, using log file: /var/log/nixpkgs-update/python312Packages.mypy-boto3-macie2/2024-04-03.log python312Packages.mypy-boto3-macie2 1.34.20 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases attrpath: python312Packages.mypy-boto3-macie2 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/4736fbqkybhx3lnc561rr1hyiai47wwk-packages.json.drv building '/nix/store/4736fbqkybhx3lnc561rr1hyiai47wwk-packages.json.drv'... Going to be running update for following packages: - python3.12-mypy-boto3-macie2-1.34.20 Press Enter key to continue... Running update for: - python3.12-mypy-boto3-macie2-1.34.20: UPDATING ... - python3.12-mypy-boto3-macie2-1.34.20: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python312Packages.mypy-boto3-macie2 1.34.20 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.mypy-boto3-outposts, using log file: /var/log/nixpkgs-update/python311Packages.mypy-boto3-outposts/2024-04-03.log python311Packages.mypy-boto3-outposts 1.34.27 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases attrpath: python311Packages.mypy-boto3-outposts Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/bp7zr8r4ki5w0kfdsmmi48iwpf4c3vqy-packages.json.drv building '/nix/store/bp7zr8r4ki5w0kfdsmmi48iwpf4c3vqy-packages.json.drv'... Going to be running update for following packages: - python3.11-mypy-boto3-outposts-1.34.27 Press Enter key to continue... Running update for: - python3.11-mypy-boto3-outposts-1.34.27: UPDATING ... - python3.11-mypy-boto3-outposts-1.34.27: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.mypy-boto3-outposts 1.34.27 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.mypy-boto3-macie, using log file: /var/log/nixpkgs-update/python311Packages.mypy-boto3-macie/2024-04-03.log python311Packages.mypy-boto3-macie 1.29.0 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases attrpath: python311Packages.mypy-boto3-macie Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/8j03wdilas9ic8k7vq7vwb99cymalxlh-packages.json.drv building '/nix/store/8j03wdilas9ic8k7vq7vwb99cymalxlh-packages.json.drv'... Going to be running update for following packages: - python3.11-mypy-boto3-macie-1.29.0 Press Enter key to continue... Running update for: - python3.11-mypy-boto3-macie-1.29.0: UPDATING ... - python3.11-mypy-boto3-macie-1.29.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.mypy-boto3-macie 1.29.0 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.rtp, using log file: /var/log/nixpkgs-update/python312Packages.rtp/2024-04-03.log python312Packages.rtp 0.0.3 -> 0.0.4 https://github.com/bbc/rd-apmm-python-lib-rtp/releases attrpath: python312Packages.rtp Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/nrsvxfclc0kyp51nqqkvm20fhnvn5dj7-packages.json.drv building '/nix/store/nrsvxfclc0kyp51nqqkvm20fhnvn5dj7-packages.json.drv'... Going to be running update for following packages: - python3.12-rtp-0.0.3 Press Enter key to continue... Running update for: - python3.12-rtp-0.0.3: UPDATING ... - python3.12-rtp-0.0.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python312Packages.rtp 0.0.3 -> 0.0.4 https://github.com/bbc/rd-apmm-python-lib-rtp/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.mypy-boto3-mediaconnect, using log file: /var/log/nixpkgs-update/python311Packages.mypy-boto3-mediaconnect/2024-04-03.log python311Packages.mypy-boto3-mediaconnect 1.34.7 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases attrpath: python311Packages.mypy-boto3-mediaconnect Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/szj9lrd2g562ai15im34v0iv9niqa44m-packages.json.drv building '/nix/store/szj9lrd2g562ai15im34v0iv9niqa44m-packages.json.drv'... Going to be running update for following packages: - python3.11-mypy-boto3-mediaconnect-1.34.7 Press Enter key to continue... Running update for: - python3.11-mypy-boto3-mediaconnect-1.34.7: UPDATING ... - python3.11-mypy-boto3-mediaconnect-1.34.7: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.mypy-boto3-mediaconnect 1.34.7 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.mypy-boto3-cloudtrail, using log file: /var/log/nixpkgs-update/python312Packages.mypy-boto3-cloudtrail/2024-04-03.log python312Packages.mypy-boto3-cloudtrail 1.34.59 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases attrpath: python312Packages.mypy-boto3-cloudtrail Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/zbif029gm6ic2jr4xfpi18651yixw8d4-packages.json.drv building '/nix/store/zbif029gm6ic2jr4xfpi18651yixw8d4-packages.json.drv'... Going to be running update for following packages: - python3.12-mypy-boto3-cloudtrail-1.34.59 Press Enter key to continue... Running update for: - python3.12-mypy-boto3-cloudtrail-1.34.59: UPDATING ... - python3.12-mypy-boto3-cloudtrail-1.34.59: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python312Packages.mypy-boto3-cloudtrail 1.34.59 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.mypy-boto3-lightsail, using log file: /var/log/nixpkgs-update/python311Packages.mypy-boto3-lightsail/2024-04-03.log python311Packages.mypy-boto3-lightsail 1.34.41 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases attrpath: python311Packages.mypy-boto3-lightsail Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/9nwplhvd4hjww77vn763sj39lawaap02-packages.json.drv building '/nix/store/9nwplhvd4hjww77vn763sj39lawaap02-packages.json.drv'... Going to be running update for following packages: - python3.11-mypy-boto3-lightsail-1.34.75 Press Enter key to continue... Running update for: - python3.11-mypy-boto3-lightsail-1.34.75: UPDATING ... - python3.11-mypy-boto3-lightsail-1.34.75: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.mypy-boto3-lightsail 1.34.41 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.mypy-boto3-docdb, using log file: /var/log/nixpkgs-update/python311Packages.mypy-boto3-docdb/2024-04-03.log python311Packages.mypy-boto3-docdb 1.34.13 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases attrpath: python311Packages.mypy-boto3-docdb Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/wn2vc5nvib65797gjj5r8qs6kqwspxsy-packages.json.drv building '/nix/store/wn2vc5nvib65797gjj5r8qs6kqwspxsy-packages.json.drv'... Going to be running update for following packages: - python3.11-mypy-boto3-docdb-1.34.13 Press Enter key to continue... Running update for: - python3.11-mypy-boto3-docdb-1.34.13: UPDATING ... - python3.11-mypy-boto3-docdb-1.34.13: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.mypy-boto3-docdb 1.34.13 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.llama-index-embeddings-gemini, using log file: /var/log/nixpkgs-update/python311Packages.llama-index-embeddings-gemini/2024-04-03.log python311Packages.llama-index-embeddings-gemini 0 -> 1 attrpath: python311Packages.llama-index-embeddings-gemini Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/lh8lawf20mdhpmqk8r17fq11ck6lwvky-packages.json.drv building '/nix/store/lh8lawf20mdhpmqk8r17fq11ck6lwvky-packages.json.drv'... Going to be running update for following packages: - python3.11-llama-index-embeddings-gemini-0.1.5 Press Enter key to continue... Running update for: - python3.11-llama-index-embeddings-gemini-0.1.5: UPDATING ... - python3.11-llama-index-embeddings-gemini-0.1.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.llama-index-embeddings-gemini 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.llama-index-readers-json, using log file: /var/log/nixpkgs-update/python311Packages.llama-index-readers-json/2024-04-03.log python311Packages.llama-index-readers-json 0 -> 1 attrpath: python311Packages.llama-index-readers-json Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/vssb1w5b7b2v51sd9zbfn1bs1knqzxai-packages.json.drv building '/nix/store/vssb1w5b7b2v51sd9zbfn1bs1knqzxai-packages.json.drv'... Going to be running update for following packages: - python3.11-llama-index-readers-json-0.1.5 Press Enter key to continue... Running update for: - python3.11-llama-index-readers-json-0.1.5: UPDATING ... - python3.11-llama-index-readers-json-0.1.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.llama-index-readers-json 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath linuxKernel.packages.linux_6_8.facetimehd, using log file: /var/log/nixpkgs-update/linuxKernel.packages.linux_6_8.facetimehd/2024-04-03.log linuxKernel.packages.linux_6_8.facetimehd 0.6.8 -> 0.6.8.1 https://github.com/patjak/facetimehd/releases attrpath: linuxKernel.packages.linux_6_8.facetimehd Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/os-specific/linux/facetimehd/default.nix b/pkgs/os-specific/linux/facetimehd/default.nix index 30d232f6eb88..ceba075758a6 100644 --- a/pkgs/os-specific/linux/facetimehd/default.nix +++ b/pkgs/os-specific/linux/facetimehd/default.nix @@ -2,7 +2,7 @@ stdenv.mkDerivation rec { name = "facetimehd-${version}-${kernel.version}"; - version = "0.6.8"; + version = "0.6.8.1"; # Note: When updating this revision: # 1. Also update pkgs/os-specific/linux/firmware/facetimehd-firmware/ @@ -18,7 +18,7 @@ stdenv.mkDerivation rec { owner = "patjak"; repo = "facetimehd"; rev = version; - sha256 = "sha256-Tze85Hx1YmStAKenmF/S1JuMDq5eVjBcs3LSWXjyE7w="; + sha256 = "sha256-h5Erga2hlDIWdDKQbkmkLY1aNCibFM7SVSnxVcoToaM="; }; preConfigure = '' [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/m80jbysgn3g158zrhxj8srfz1yf0pk55-facetimehd-0.6.8.1-6.8.2" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
3 packages failed to build:
  • linuxKernel.packages.linux_4_19_hardened.facetimehd
  • linuxKernel.packages.linux_5_4_hardened.facetimehd
  • linuxKernel.packages.linux_lqx.facetimehd
18 packages built:
  • linuxKernel.packages.linux_4_19.facetimehd
  • linuxKernel.packages.linux_5_10.facetimehd
  • linuxKernel.packages.linux_5_10_hardened.facetimehd
  • linuxKernel.packages.linux_5_15.facetimehd
  • linuxKernel.packages.linux_5_15_hardened.facetimehd
  • linuxKernel.packages.linux_5_4.facetimehd
  • linuxKernel.packages.linux_6_1.facetimehd
  • linuxKernel.packages.linux_6_1_hardened.facetimehd
  • linuxKernel.packages.linux_6_6.facetimehd
  • linuxKernel.packages.linux_hardened.facetimehd (linuxKernel.packages.linux_6_6_hardened.facetimehd)
  • linuxKernel.packages.linux_6_7.facetimehd
  • linuxKernel.packages.linux_6_7_hardened.facetimehd
  • linuxKernel.packages.linux_6_8.facetimehd
  • linuxKernel.packages.linux_latest_libre.facetimehd
  • linuxKernel.packages.linux_libre.facetimehd
  • linuxKernel.packages.linux_xanmod.facetimehd
  • linuxKernel.packages.linux_xanmod_latest.facetimehd (linuxKernel.packages.linux_xanmod_stable.facetimehd)
  • linuxKernel.packages.linux_zen.facetimehd
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/patjak/facetimehd/releases. meta.description for linuxKernel.packages.linux_6_8.facetimehd is: Linux driver for the Facetime HD (Broadcom 1570) PCIe webcam meta.homepage for linuxKernel.packages.linux_6_8.facetimehd is: https://github.com/patjak/bcwc_pcie ###### Updates performed - Version update ###### To inspect upstream changes - [Release on GitHub](https://github.com/patjak/facetimehd/releases/tag/0.6.8.1) - [Compare changes on GitHub](https://github.com/patjak/facetimehd/compare/0.6.8...0.6.8.1) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.6.8.1 in filename of file in /nix/store/m80jbysgn3g158zrhxj8srfz1yf0pk55-facetimehd-0.6.8.1-6.8.2 ---
Rebuild report (if merged into master) (click to expand) ``` 40 total rebuild path(s) 40 package rebuild(s) First fifty rebuilds by attrpath linuxKernel.packages.linux_4_19.facetimehd linuxKernel.packages.linux_4_19_hardened.facetimehd linuxKernel.packages.linux_5_10.facetimehd linuxKernel.packages.linux_5_10_hardened.facetimehd linuxKernel.packages.linux_5_15.facetimehd linuxKernel.packages.linux_5_15_hardened.facetimehd linuxKernel.packages.linux_5_4.facetimehd linuxKernel.packages.linux_5_4_hardened.facetimehd linuxKernel.packages.linux_6_1.facetimehd linuxKernel.packages.linux_6_1_hardened.facetimehd linuxKernel.packages.linux_6_6.facetimehd linuxKernel.packages.linux_6_6_hardened.facetimehd linuxKernel.packages.linux_6_7.facetimehd linuxKernel.packages.linux_6_7_hardened.facetimehd linuxKernel.packages.linux_6_8.facetimehd linuxKernel.packages.linux_hardened.facetimehd linuxKernel.packages.linux_latest_libre.facetimehd linuxKernel.packages.linux_libre.facetimehd linuxKernel.packages.linux_lqx.facetimehd linuxKernel.packages.linux_xanmod.facetimehd linuxKernel.packages.linux_xanmod_latest.facetimehd linuxKernel.packages.linux_xanmod_stable.facetimehd linuxKernel.packages.linux_zen.facetimehd linuxPackages-libre.facetimehd linuxPackages.facetimehd linuxPackages_4_19_hardened.facetimehd linuxPackages_5_10_hardened.facetimehd linuxPackages_5_15_hardened.facetimehd linuxPackages_5_4_hardened.facetimehd linuxPackages_6_1_hardened.facetimehd linuxPackages_6_6_hardened.facetimehd linuxPackages_6_7_hardened.facetimehd linuxPackages_hardened.facetimehd linuxPackages_latest-libre.facetimehd linuxPackages_latest.facetimehd linuxPackages_lqx.facetimehd linuxPackages_xanmod.facetimehd linuxPackages_xanmod_latest.facetimehd linuxPackages_xanmod_stable.facetimehd linuxPackages_zen.facetimehd ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/m80jbysgn3g158zrhxj8srfz1yf0pk55-facetimehd-0.6.8.1-6.8.2 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A linuxKernel.packages.linux_6_8.facetimehd https://github.com/r-ryantm/nixpkgs/archive/c944eceef4504d473e5c75297866f860cad19619.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/c944eceef4504d473e5c75297866f860cad19619#linuxKernel.packages.linux_6_8.facetimehd ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/m80jbysgn3g158zrhxj8srfz1yf0pk55-facetimehd-0.6.8.1-6.8.2 ls -la /nix/store/m80jbysgn3g158zrhxj8srfz1yf0pk55-facetimehd-0.6.8.1-6.8.2/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
3 packages failed to build:
  • linuxKernel.packages.linux_4_19_hardened.facetimehd
  • linuxKernel.packages.linux_5_4_hardened.facetimehd
  • linuxKernel.packages.linux_lqx.facetimehd
18 packages built:
  • linuxKernel.packages.linux_4_19.facetimehd
  • linuxKernel.packages.linux_5_10.facetimehd
  • linuxKernel.packages.linux_5_10_hardened.facetimehd
  • linuxKernel.packages.linux_5_15.facetimehd
  • linuxKernel.packages.linux_5_15_hardened.facetimehd
  • linuxKernel.packages.linux_5_4.facetimehd
  • linuxKernel.packages.linux_6_1.facetimehd
  • linuxKernel.packages.linux_6_1_hardened.facetimehd
  • linuxKernel.packages.linux_6_6.facetimehd
  • linuxKernel.packages.linux_hardened.facetimehd (linuxKernel.packages.linux_6_6_hardened.facetimehd)
  • linuxKernel.packages.linux_6_7.facetimehd
  • linuxKernel.packages.linux_6_7_hardened.facetimehd
  • linuxKernel.packages.linux_6_8.facetimehd
  • linuxKernel.packages.linux_latest_libre.facetimehd
  • linuxKernel.packages.linux_libre.facetimehd
  • linuxKernel.packages.linux_xanmod.facetimehd
  • linuxKernel.packages.linux_xanmod_latest.facetimehd (linuxKernel.packages.linux_xanmod_stable.facetimehd)
  • linuxKernel.packages.linux_zen.facetimehd
--- ###### Maintainer pings cc @womfoo @grahamc @kraem for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301240 [result] Success updating linuxKernel.packages.linux_6_8.facetimehd 0.6.8 -> 0.6.8.1 https://github.com/patjak/facetimehd/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath linuxKernel.packages.linux_6_6_hardened.facetimehd, using log file: /var/log/nixpkgs-update/linuxKernel.packages.linux_6_6_hardened.facetimehd/2024-04-03.log linuxKernel.packages.linux_6_6_hardened.facetimehd 0.6.8 -> 0.6.8.1 https://github.com/patjak/facetimehd/releases attrpath: linuxKernel.packages.linux_6_6_hardened.facetimehd Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/os-specific/linux/facetimehd/default.nix b/pkgs/os-specific/linux/facetimehd/default.nix index 30d232f6eb88..ceba075758a6 100644 --- a/pkgs/os-specific/linux/facetimehd/default.nix +++ b/pkgs/os-specific/linux/facetimehd/default.nix @@ -2,7 +2,7 @@ stdenv.mkDerivation rec { name = "facetimehd-${version}-${kernel.version}"; - version = "0.6.8"; + version = "0.6.8.1"; # Note: When updating this revision: # 1. Also update pkgs/os-specific/linux/firmware/facetimehd-firmware/ @@ -18,7 +18,7 @@ stdenv.mkDerivation rec { owner = "patjak"; repo = "facetimehd"; rev = version; - sha256 = "sha256-Tze85Hx1YmStAKenmF/S1JuMDq5eVjBcs3LSWXjyE7w="; + sha256 = "sha256-h5Erga2hlDIWdDKQbkmkLY1aNCibFM7SVSnxVcoToaM="; }; preConfigure = '' [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/rx8gjq13w9hifl49vjnal14k5wwa58yc-facetimehd-0.6.8.1-6.6.21" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
3 packages failed to build:
  • linuxKernel.packages.linux_4_19_hardened.facetimehd
  • linuxKernel.packages.linux_5_4_hardened.facetimehd
  • linuxKernel.packages.linux_lqx.facetimehd
18 packages built:
  • linuxKernel.packages.linux_4_19.facetimehd
  • linuxKernel.packages.linux_5_10.facetimehd
  • linuxKernel.packages.linux_5_10_hardened.facetimehd
  • linuxKernel.packages.linux_5_15.facetimehd
  • linuxKernel.packages.linux_5_15_hardened.facetimehd
  • linuxKernel.packages.linux_5_4.facetimehd
  • linuxKernel.packages.linux_6_1.facetimehd
  • linuxKernel.packages.linux_6_1_hardened.facetimehd
  • linuxKernel.packages.linux_6_6.facetimehd
  • linuxKernel.packages.linux_hardened.facetimehd (linuxKernel.packages.linux_6_6_hardened.facetimehd)
  • linuxKernel.packages.linux_6_7.facetimehd
  • linuxKernel.packages.linux_6_7_hardened.facetimehd
  • linuxKernel.packages.linux_6_8.facetimehd
  • linuxKernel.packages.linux_latest_libre.facetimehd
  • linuxKernel.packages.linux_libre.facetimehd
  • linuxKernel.packages.linux_xanmod.facetimehd
  • linuxKernel.packages.linux_xanmod_latest.facetimehd (linuxKernel.packages.linux_xanmod_stable.facetimehd)
  • linuxKernel.packages.linux_zen.facetimehd
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/patjak/facetimehd/releases. meta.description for linuxKernel.packages.linux_6_6_hardened.facetimehd is: Linux driver for the Facetime HD (Broadcom 1570) PCIe webcam meta.homepage for linuxKernel.packages.linux_6_6_hardened.facetimehd is: https://github.com/patjak/bcwc_pcie ###### Updates performed - Version update ###### To inspect upstream changes - [Release on GitHub](https://github.com/patjak/facetimehd/releases/tag/0.6.8.1) - [Compare changes on GitHub](https://github.com/patjak/facetimehd/compare/0.6.8...0.6.8.1) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.6.8.1 in filename of file in /nix/store/rx8gjq13w9hifl49vjnal14k5wwa58yc-facetimehd-0.6.8.1-6.6.21 ---
Rebuild report (if merged into master) (click to expand) ``` 40 total rebuild path(s) 40 package rebuild(s) First fifty rebuilds by attrpath linuxKernel.packages.linux_4_19.facetimehd linuxKernel.packages.linux_4_19_hardened.facetimehd linuxKernel.packages.linux_5_10.facetimehd linuxKernel.packages.linux_5_10_hardened.facetimehd linuxKernel.packages.linux_5_15.facetimehd linuxKernel.packages.linux_5_15_hardened.facetimehd linuxKernel.packages.linux_5_4.facetimehd linuxKernel.packages.linux_5_4_hardened.facetimehd linuxKernel.packages.linux_6_1.facetimehd linuxKernel.packages.linux_6_1_hardened.facetimehd linuxKernel.packages.linux_6_6.facetimehd linuxKernel.packages.linux_6_6_hardened.facetimehd linuxKernel.packages.linux_6_7.facetimehd linuxKernel.packages.linux_6_7_hardened.facetimehd linuxKernel.packages.linux_6_8.facetimehd linuxKernel.packages.linux_hardened.facetimehd linuxKernel.packages.linux_latest_libre.facetimehd linuxKernel.packages.linux_libre.facetimehd linuxKernel.packages.linux_lqx.facetimehd linuxKernel.packages.linux_xanmod.facetimehd linuxKernel.packages.linux_xanmod_latest.facetimehd linuxKernel.packages.linux_xanmod_stable.facetimehd linuxKernel.packages.linux_zen.facetimehd linuxPackages-libre.facetimehd linuxPackages.facetimehd linuxPackages_4_19_hardened.facetimehd linuxPackages_5_10_hardened.facetimehd linuxPackages_5_15_hardened.facetimehd linuxPackages_5_4_hardened.facetimehd linuxPackages_6_1_hardened.facetimehd linuxPackages_6_6_hardened.facetimehd linuxPackages_6_7_hardened.facetimehd linuxPackages_hardened.facetimehd linuxPackages_latest-libre.facetimehd linuxPackages_latest.facetimehd linuxPackages_lqx.facetimehd linuxPackages_xanmod.facetimehd linuxPackages_xanmod_latest.facetimehd linuxPackages_xanmod_stable.facetimehd linuxPackages_zen.facetimehd ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/rx8gjq13w9hifl49vjnal14k5wwa58yc-facetimehd-0.6.8.1-6.6.21 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A linuxKernel.packages.linux_6_6_hardened.facetimehd https://github.com/r-ryantm/nixpkgs/archive/a56bfadc38b66a15c9d0a24b9edb50b77b48acb3.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/a56bfadc38b66a15c9d0a24b9edb50b77b48acb3#linuxKernel.packages.linux_6_6_hardened.facetimehd ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/rx8gjq13w9hifl49vjnal14k5wwa58yc-facetimehd-0.6.8.1-6.6.21 ls -la /nix/store/rx8gjq13w9hifl49vjnal14k5wwa58yc-facetimehd-0.6.8.1-6.6.21/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
3 packages failed to build:
  • linuxKernel.packages.linux_4_19_hardened.facetimehd
  • linuxKernel.packages.linux_5_4_hardened.facetimehd
  • linuxKernel.packages.linux_lqx.facetimehd
18 packages built:
  • linuxKernel.packages.linux_4_19.facetimehd
  • linuxKernel.packages.linux_5_10.facetimehd
  • linuxKernel.packages.linux_5_10_hardened.facetimehd
  • linuxKernel.packages.linux_5_15.facetimehd
  • linuxKernel.packages.linux_5_15_hardened.facetimehd
  • linuxKernel.packages.linux_5_4.facetimehd
  • linuxKernel.packages.linux_6_1.facetimehd
  • linuxKernel.packages.linux_6_1_hardened.facetimehd
  • linuxKernel.packages.linux_6_6.facetimehd
  • linuxKernel.packages.linux_hardened.facetimehd (linuxKernel.packages.linux_6_6_hardened.facetimehd)
  • linuxKernel.packages.linux_6_7.facetimehd
  • linuxKernel.packages.linux_6_7_hardened.facetimehd
  • linuxKernel.packages.linux_6_8.facetimehd
  • linuxKernel.packages.linux_latest_libre.facetimehd
  • linuxKernel.packages.linux_libre.facetimehd
  • linuxKernel.packages.linux_xanmod.facetimehd
  • linuxKernel.packages.linux_xanmod_latest.facetimehd (linuxKernel.packages.linux_xanmod_stable.facetimehd)
  • linuxKernel.packages.linux_zen.facetimehd
--- ###### Maintainer pings cc @womfoo @grahamc @kraem for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301244 [result] Success updating linuxKernel.packages.linux_6_6_hardened.facetimehd 0.6.8 -> 0.6.8.1 https://github.com/patjak/facetimehd/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath linuxKernel.packages.linux_4_19_hardened.facetimehd, using log file: /var/log/nixpkgs-update/linuxKernel.packages.linux_4_19_hardened.facetimehd/2024-04-03.log linuxKernel.packages.linux_4_19_hardened.facetimehd 0.6.8 -> 0.6.8.1 https://github.com/patjak/facetimehd/releases attrpath: linuxKernel.packages.linux_4_19_hardened.facetimehd Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/os-specific/linux/facetimehd/default.nix b/pkgs/os-specific/linux/facetimehd/default.nix index 30d232f6eb88..ceba075758a6 100644 --- a/pkgs/os-specific/linux/facetimehd/default.nix +++ b/pkgs/os-specific/linux/facetimehd/default.nix @@ -2,7 +2,7 @@ stdenv.mkDerivation rec { name = "facetimehd-${version}-${kernel.version}"; - version = "0.6.8"; + version = "0.6.8.1"; # Note: When updating this revision: # 1. Also update pkgs/os-specific/linux/firmware/facetimehd-firmware/ @@ -18,7 +18,7 @@ stdenv.mkDerivation rec { owner = "patjak"; repo = "facetimehd"; rev = version; - sha256 = "sha256-Tze85Hx1YmStAKenmF/S1JuMDq5eVjBcs3LSWXjyE7w="; + sha256 = "sha256-h5Erga2hlDIWdDKQbkmkLY1aNCibFM7SVSnxVcoToaM="; }; preConfigure = '' [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A linuxKernel.packages.linux_4_19_hardened.facetimehd Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix --extra-experimental-features nix-command log -f . linuxKernel.packages.linux_4_19_hardened.facetimehd Standard output: error: build log of 'linuxKernel.packages.linux_4_19_hardened.facetimehd' is not available [result] Failed to update linuxKernel.packages.linux_4_19_hardened.facetimehd 0.6.8 -> 0.6.8.1 https://github.com/patjak/facetimehd/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.mypy-boto3-acm-pca, using log file: /var/log/nixpkgs-update/python311Packages.mypy-boto3-acm-pca/2024-04-03.log python311Packages.mypy-boto3-acm-pca 1.34.28 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases attrpath: python311Packages.mypy-boto3-acm-pca Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/a9i71vkx0mvba2kljvy1yzwcsc50ml9f-packages.json.drv building '/nix/store/a9i71vkx0mvba2kljvy1yzwcsc50ml9f-packages.json.drv'... Going to be running update for following packages: - python3.11-mypy-boto3-acm-pca-1.34.28 Press Enter key to continue... Running update for: - python3.11-mypy-boto3-acm-pca-1.34.28: UPDATING ... - python3.11-mypy-boto3-acm-pca-1.34.28: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.mypy-boto3-acm-pca 1.34.28 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.mypy-boto3-sagemaker-featurestore-runtime, using log file: /var/log/nixpkgs-update/python312Packages.mypy-boto3-sagemaker-featurestore-runtime/2024-04-03.log python312Packages.mypy-boto3-sagemaker-featurestore-runtime 1.34.22 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases attrpath: python312Packages.mypy-boto3-sagemaker-featurestore-runtime Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/5kwq13ggjaq0k1j0kjcd32bzh89h74bk-packages.json.drv building '/nix/store/5kwq13ggjaq0k1j0kjcd32bzh89h74bk-packages.json.drv'... Going to be running update for following packages: - python3.12-mypy-boto3-sagemaker-featurestore-runtime-1.34.22 Press Enter key to continue... Running update for: - python3.12-mypy-boto3-sagemaker-featurestore-runtime-1.34.22: UPDATING ... - python3.12-mypy-boto3-sagemaker-featurestore-runtime-1.34.22: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python312Packages.mypy-boto3-sagemaker-featurestore-runtime 1.34.22 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.mypy-boto3-mediaconvert, using log file: /var/log/nixpkgs-update/python312Packages.mypy-boto3-mediaconvert/2024-04-03.log python312Packages.mypy-boto3-mediaconvert 1.34.33 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases attrpath: python312Packages.mypy-boto3-mediaconvert Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/4icag9r1m0dyx4affy7s61ghgiwflba5-packages.json.drv building '/nix/store/4icag9r1m0dyx4affy7s61ghgiwflba5-packages.json.drv'... Going to be running update for following packages: - python3.12-mypy-boto3-mediaconvert-1.34.33 Press Enter key to continue... Running update for: - python3.12-mypy-boto3-mediaconvert-1.34.33: UPDATING ... - python3.12-mypy-boto3-mediaconvert-1.34.33: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python312Packages.mypy-boto3-mediaconvert 1.34.33 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.mypy-boto3-ivs, using log file: /var/log/nixpkgs-update/python312Packages.mypy-boto3-ivs/2024-04-03.log python312Packages.mypy-boto3-ivs 1.34.45 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases attrpath: python312Packages.mypy-boto3-ivs Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/znfh0bj2knvw09zsn5gg17pgp20x0dij-packages.json.drv building '/nix/store/znfh0bj2knvw09zsn5gg17pgp20x0dij-packages.json.drv'... Going to be running update for following packages: - python3.12-mypy-boto3-ivs-1.34.45 Press Enter key to continue... Running update for: - python3.12-mypy-boto3-ivs-1.34.45: UPDATING ... - python3.12-mypy-boto3-ivs-1.34.45: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python312Packages.mypy-boto3-ivs 1.34.45 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.hdate, using log file: /var/log/nixpkgs-update/python312Packages.hdate/2024-04-03.log python312Packages.hdate 0.10.4 -> 0.10.8 https://github.com/py-libhdate/py-libhdate/releases attrpath: python312Packages.hdate Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/x0dihxa9c9lk3pc87sx0j4nfvzkagxsz-packages.json.drv building '/nix/store/x0dihxa9c9lk3pc87sx0j4nfvzkagxsz-packages.json.drv'... Going to be running update for following packages: - python3.12-hdate-0.10.4 Press Enter key to continue... Running update for: - python3.12-hdate-0.10.4: UPDATING ... - python3.12-hdate-0.10.4: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/hdate/default.nix b/pkgs/development/python-modules/hdate/default.nix index 3c45b7ff08d6..979bb5a1395b 100644 --- a/pkgs/development/python-modules/hdate/default.nix +++ b/pkgs/development/python-modules/hdate/default.nix @@ -10,7 +10,7 @@ buildPythonPackage rec { pname = "hdate"; - version = "0.10.4"; + version = "0.10.8"; format = "pyproject"; disabled = pythonOlder "3.7"; @@ -19,7 +19,7 @@ buildPythonPackage rec { owner = "py-libhdate"; repo = "py-libhdate"; rev = "refs/tags/v${version}"; - hash = "sha256-NF2ZA9ruW7sL2tLY11VAtyPRxGg2o5/mpv3ZsH/Zxb8="; + hash = "sha256-SANCZl+1ghUuuxZAl6oycvo7hB7mIagjVEmwzarsspk="; }; postPatch = '' An auto update branch exists with message `python312Packages.hdate: 0.10.4 -> 0.10.7`. New version is 0.10.8. The auto update branch does not match or exceed the new version. [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A python312Packages.hdate nix build failed. Using pytestCheckPhase @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/9hgmrafhp2v2n01nhkpc82jwp0z8r5dj-source source root is source setting SOURCE_DATE_EPOCH to timestamp 315619200 of file source/tox.ini @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase substituteStream(): WARNING: '--replace' is deprecated, use --replace-{fail,warn,quiet}. (file 'pyproject.toml') substituteStream(): WARNING: pattern pytz\ =\ \"\>=\ 2020.0\" doesn't match anything in file 'pyproject.toml' substituteStream(): WARNING: pattern astral\ =\ \{version\ =\ \"\^2.2\"\,\ python\ =\ \"\^3.6\"\} doesn't match anything in file 'pyproject.toml' @nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" } Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "configurePhase" } Running phase: configurePhase no configure script, doing nothing @nix { "action": "setPhase", "phase": "buildPhase" } Running phase: buildPhase Executing pypaBuildPhase Creating a wheel... * Getting build dependencies for wheel... * Building wheel... Successfully built hdate-0.10.8-py3-none-any.whl Finished creating a wheel... Finished executing pypaBuildPhase @nix { "action": "setPhase", "phase": "pythonRuntimeDepsCheckHook" } Running phase: pythonRuntimeDepsCheckHook Executing pythonRuntimeDepsCheck Checking runtime dependencies for hdate-0.10.8-py3-none-any.whl - astral<3.0,>=2.2 not satisfied by version 3.2 [result] Failed to update python312Packages.hdate 0.10.4 -> 0.10.8 https://github.com/py-libhdate/py-libhdate/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath php83Packages.psalm, using log file: /var/log/nixpkgs-update/php83Packages.psalm/2024-04-03.log php83Packages.psalm 5.22.2 -> 5.23.1 https://repology.org/project/php:psalm/versions attrpath: php83Packages.psalm Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update php83Packages.psalm 5.22.2 -> 5.23.1 https://repology.org/project/php:psalm/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.openusd, using log file: /var/log/nixpkgs-update/python311Packages.openusd/2024-04-03.log python311Packages.openusd 23.11 -> 24.03 https://github.com/PixarAnimationStudios/OpenUSD/releases attrpath: python311Packages.openusd Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/10lr0mwy9pnb6k4qcmb0gcwp9qmv9ghx-packages.json.drv building '/nix/store/10lr0mwy9pnb6k4qcmb0gcwp9qmv9ghx-packages.json.drv'... Going to be running update for following packages: - python3.11-openusd-23.11 Press Enter key to continue... Running update for: - python3.11-openusd-23.11: UPDATING ... - python3.11-openusd-23.11: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/openusd/default.nix b/pkgs/development/python-modules/openusd/default.nix index 4b323b25669d..2fc1a2b7df36 100644 --- a/pkgs/development/python-modules/openusd/default.nix +++ b/pkgs/development/python-modules/openusd/default.nix @@ -48,13 +48,13 @@ in buildPythonPackage rec { pname = "openusd"; - version = "23.11"; + version = "24.03"; src = fetchFromGitHub { owner = "PixarAnimationStudios"; repo = "OpenUSD"; rev = "refs/tags/v${version}"; - hash = "sha256-5zQrfB14kXs75WbL3s4eyhxELglhLNxU2L2aVXiyVjg="; + hash = "sha256-EYf8GhXhsAx0Wxz9ibDZEV4E5scL3GPiu3Nje7N5C/I="; }; stdenv = if python.stdenv.isDarwin then darwin.apple_sdk_11_0.stdenv else python.stdenv; No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A python311Packages.openusd nix build failed. -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/lib/python/pxr/UsdAppUtils/colorArgs.py -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/lib/python/pxr/UsdAppUtils/colorArgs.pyc -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/lib/python/pxr/UsdAppUtils/complexityArgs.py -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/lib/python/pxr/UsdAppUtils/complexityArgs.pyc -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/lib/python/pxr/UsdAppUtils/framesArgs.py -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/lib/python/pxr/UsdAppUtils/framesArgs.pyc -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/lib/python/pxr/UsdAppUtils/rendererArgs.py -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/lib/python/pxr/UsdAppUtils/rendererArgs.pyc -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/lib/python/pxr/UsdAppUtils/_usdAppUtils.so -- Set non-toolchain portion of runtime path of "/nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/lib/python/pxr/UsdAppUtils/_usdAppUtils.so" to "$ORIGIN/../../.." -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/bin/usdrecord -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/plugin/usd/usdShaders/resources/plugInfo.json -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/plugin/usd/usdShaders/resources/shaders/shaderDefs.usda -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/plugin/usd/usdShaders/resources/shaders/previewSurface.glslfx -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/plugin/usd/usdShaders/resources/shaders/uvTexture.glslfx -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/plugin/usd/usdShaders/resources/shaders/primvarReader.glslfx -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/plugin/usd/usdShaders/resources/shaders/transform2d.glslfx -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/lib/python/pxr/UsdShaders/__init__.py -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/lib/python/pxr/UsdShaders/__init__.pyc -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/plugin/usd/sdrGlslfx/resources/plugInfo.json -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/lib/python/pxr/SdrGlslfx/__init__.py -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/lib/python/pxr/SdrGlslfx/__init__.pyc -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/lib/python/pxr/__init__.py -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/pxrConfig.cmake -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/cmake/pxrTargets.cmake -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/cmake/pxrTargets-release.cmake -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/lib/usd/plugInfo.json -- Installing: /nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/plugin/usd/plugInfo.json rm: cannot remove '/nix/store/q75z2js0y9nw4x0x3955v5v0rdcw6jaz-python3.11-openusd-24.03/share': No such file or directory /nix/store/v5lsd029lz5lfhamivbgqyp3zdv94ah2-stdenv-linux/setup: line 131: pop_var_context: head of shell_variables not a function context [result] Failed to update python311Packages.openusd 23.11 -> 24.03 https://github.com/PixarAnimationStudios/OpenUSD/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath firebird_2_5, using log file: /var/log/nixpkgs-update/firebird_2_5/2024-04-03.log firebird_2_5 2.5.9 -> 5.0.0 https://github.com/FirebirdSQL/firebird/releases attrpath: firebird_2_5 Checking auto update branch... No auto update branch exists Version in attr path firebird_2_5 not compatible with 5.0.0 [result] Failed to update firebird_2_5 2.5.9 -> 5.0.0 https://github.com/FirebirdSQL/firebird/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath wavegain, using log file: /var/log/nixpkgs-update/wavegain/2024-04-03.log wavegain 1.3.1 -> 1.3.2 https://github.com/MestreLion/wavegain/releases attrpath: wavegain Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update wavegain 1.3.1 -> 1.3.2 https://github.com/MestreLion/wavegain/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO multi-platform srcs in file. [result] Failed to update electron_28 28.2.6 -> 29.1.6 https://github.com/electron/electron/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath ocamlPackages.asn1-combinators, using log file: /var/log/nixpkgs-update/ocamlPackages.asn1-combinators/2024-04-03.log ocamlPackages.asn1-combinators 0.2.6 -> 0.3.0 https://github.com/mirleft/ocaml-asn1-combinators/releases attrpath: ocamlPackages.asn1-combinators Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/3pvfacw5bqkvj5wds7acgwji2xn6lv5q-asn1-combinators-v0.3.0.tbz.drv building '/nix/store/3pvfacw5bqkvj5wds7acgwji2xn6lv5q-asn1-combinators-v0.3.0.tbz.drv'... trying https://github.com/mirleft/ocaml-asn1-combinators/releases/download/v0.3.0/asn1-combinators-v0.3.0.tbz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 9 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download asn1-combinators-v0.3.0.tbz from any mirror error: builder for '/nix/store/3pvfacw5bqkvj5wds7acgwji2xn6lv5q-asn1-combinators-v0.3.0.tbz.drv' failed with exit code 1; last 7 log lines: > > trying https://github.com/mirleft/ocaml-asn1-combinators/releases/download/v0.3.0/asn1-combinators-v0.3.0.tbz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 9 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download asn1-combinators-v0.3.0.tbz from any mirror For full logs, run 'nix log /nix/store/3pvfacw5bqkvj5wds7acgwji2xn6lv5q-asn1-combinators-v0.3.0.tbz.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'ocamlPackages.asn1-combinators.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/3pvfacw5bqkvj5wds7acgwji2xn6lv5q-asn1-combinators-v0.3.0.tbz.drv /nix/store/nihg2idd1i8dmhyisswfbki2pdazlapc-ocaml5.1.1-asn1-combinators-0.3.0.drv these 4 paths will be fetched (0.65 MiB download, 3.22 MiB unpacked): /nix/store/llz60w8p1vdisbn344n4346nfbxri390-ocaml5.1.1-bigarray-compat-1.1.0 /nix/store/1rscngicjp2q00q5k7pgl74cypwq2az5-ocaml5.1.1-cstruct-6.2.0 /nix/store/mvhq95030nb6ih1950l1w2cz8w0wf76g-ocaml5.1.1-ptime-1.1.0 /nix/store/rgmgj77nxx19fcszksknpjs2dbyybg84-ocaml5.1.1-zarith-1.13 copying path '/nix/store/llz60w8p1vdisbn344n4346nfbxri390-ocaml5.1.1-bigarray-compat-1.1.0' from 'https://cache.nixos.org'... copying path '/nix/store/1rscngicjp2q00q5k7pgl74cypwq2az5-ocaml5.1.1-cstruct-6.2.0' from 'https://cache.nixos.org'... copying path '/nix/store/mvhq95030nb6ih1950l1w2cz8w0wf76g-ocaml5.1.1-ptime-1.1.0' from 'https://cache.nixos.org'... copying path '/nix/store/rgmgj77nxx19fcszksknpjs2dbyybg84-ocaml5.1.1-zarith-1.13' from 'https://cache.nixos.org'... building '/nix/store/3pvfacw5bqkvj5wds7acgwji2xn6lv5q-asn1-combinators-v0.3.0.tbz.drv'... trying https://github.com/mirleft/ocaml-asn1-combinators/releases/download/v0.3.0/asn1-combinators-v0.3.0.tbz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 9 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 error: cannot download asn1-combinators-v0.3.0.tbz from any mirror error: builder for '/nix/store/3pvfacw5bqkvj5wds7acgwji2xn6lv5q-asn1-combinators-v0.3.0.tbz.drv' failed with exit code 1; last 7 log lines: > > trying https://github.com/mirleft/ocaml-asn1-combinators/releases/download/v0.3.0/asn1-combinators-v0.3.0.tbz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 9 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (22) The requested URL returned error: 404 > error: cannot download asn1-combinators-v0.3.0.tbz from any mirror For full logs, run 'nix log /nix/store/3pvfacw5bqkvj5wds7acgwji2xn6lv5q-asn1-combinators-v0.3.0.tbz.drv'. error: 1 dependencies of derivation '/nix/store/nihg2idd1i8dmhyisswfbki2pdazlapc-ocaml5.1.1-asn1-combinators-0.3.0.drv' failed to build [result] Failed to update ocamlPackages.asn1-combinators 0.2.6 -> 0.3.0 https://github.com/mirleft/ocaml-asn1-combinators/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath nixos-shell, using log file: /var/log/nixpkgs-update/nixos-shell/2024-04-03.log nixos-shell 1.1.0 -> 1.1.1 https://github.com/Mic92/nixos-shell/releases attrpath: nixos-shell Checking auto update branch... No auto update branch exists There might already be an open PR for this update: - microPlugins: init 41 packages URL "https://api.github.com/repos/NixOS/nixpkgs/issues/192680" [result] Failed to update nixos-shell 1.1.0 -> 1.1.1 https://github.com/Mic92/nixos-shell/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.mypy-boto3-athena, using log file: /var/log/nixpkgs-update/python312Packages.mypy-boto3-athena/2024-04-03.log python312Packages.mypy-boto3-athena 1.34.23 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases attrpath: python312Packages.mypy-boto3-athena Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/75vb4mn5jln2apv9708q8cx0346702xm-packages.json.drv building '/nix/store/75vb4mn5jln2apv9708q8cx0346702xm-packages.json.drv'... Going to be running update for following packages: - python3.12-mypy-boto3-athena-1.34.23 Press Enter key to continue... Running update for: - python3.12-mypy-boto3-athena-1.34.23: UPDATING ... - python3.12-mypy-boto3-athena-1.34.23: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python312Packages.mypy-boto3-athena 1.34.23 -> 7.23.2 https://github.com/youtype/mypy_boto3_builder/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath vertcoin, using log file: /var/log/nixpkgs-update/vertcoin/2024-04-03.log vertcoin 0.18.0 -> 23.2 https://github.com/vertcoin-project/vertcoin-core/releases attrpath: vertcoin Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update vertcoin 0.18.0 -> 23.2 https://github.com/vertcoin-project/vertcoin-core/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath stellar-core, using log file: /var/log/nixpkgs-update/stellar-core/2024-04-03.log stellar-core 19.14.0 -> 20.3.0 https://repology.org/project/stellar-core/versions attrpath: stellar-core Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update stellar-core 19.14.0 -> 20.3.0 https://repology.org/project/stellar-core/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python27Full, using log file: /var/log/nixpkgs-update/python27Full/2024-04-03.log python27Full 2.7.18.8 -> 3.7.17.3 https://github.com/ActiveState/cpython/releases attrpath: python27Full Checking auto update branch... No auto update branch exists Old version 2.7.18.8" not present in master derivation file with contents: { lib, stdenv, fetchFromGitHub, fetchpatch , bzip2 , expat , libffi , gdbm , db , ncurses , openssl , readline , sqlite , tcl ? null, tk ? null, tix ? null, libX11 ? null, x11Support ? false , zlib , self , configd, coreutils , autoreconfHook , python-setup-hook # Some proprietary libs assume UCS2 unicode, especially on darwin :( , ucsEncoding ? 4 # For the Python package set , packageOverrides ? (self: super: {}) , pkgsBuildBuild , pkgsBuildHost , pkgsBuildTarget , pkgsHostHost , pkgsTargetTarget , sourceVersion , hash , passthruFun , static ? stdenv.hostPlatform.isStatic , stripBytecode ? reproducibleBuild , rebuildBytecode ? true , reproducibleBuild ? false , enableOptimizations ? false , strip2to3 ? false , stripConfig ? false , stripIdlelib ? false , stripTests ? false , pythonAttr ? "python${sourceVersion.major}${sourceVersion.minor}" }: assert x11Support -> tcl != null && tk != null && libX11 != null; assert lib.assertMsg (enableOptimizations -> (!stdenv.cc.isClang)) "Optimizations with clang are not supported. configure: error: llvm-profdata is required for a --enable-optimizations build but could not be found."; assert lib.assertMsg (reproducibleBuild -> stripBytecode) "Deterministic builds require stripping bytecode."; assert lib.assertMsg (reproducibleBuild -> (!enableOptimizations)) "Deterministic builds are not achieved when optimizations are enabled."; assert lib.assertMsg (reproducibleBuild -> (!rebuildBytecode)) "Deterministic builds are not achieved when (default unoptimized) bytecode is created."; let buildPackages = pkgsBuildHost; inherit (passthru) pythonOnBuildForHost; pythonOnBuildForHostInterpreter = if stdenv.hostPlatform == stdenv.buildPlatform then "$out/bin/python" else pythonOnBuildForHost.interpreter; passthru = passthruFun rec { inherit self sourceVersion packageOverrides; implementation = "cpython"; libPrefix = "python${pythonVersion}"; executable = libPrefix; pythonVersion = with sourceVersion; "${major}.${minor}"; sitePackages = "lib/${libPrefix}/site-packages"; inherit hasDistutilsCxxPatch pythonAttr; pythonOnBuildForBuild = pkgsBuildBuild.${pythonAttr}; pythonOnBuildForHost = pkgsBuildHost.${pythonAttr}; pythonOnBuildForTarget = pkgsBuildTarget.${pythonAttr}; pythonOnHostForHost = pkgsHostHost.${pythonAttr}; pythonOnTargetForTarget = pkgsTargetTarget.${pythonAttr} or {}; } // { inherit ucsEncoding; }; version = with sourceVersion; "${major}.${minor}.${patch}${suffix}"; # ActiveState is a fork of cpython that includes fixes for security # issues after its EOL src = fetchFromGitHub { owner = "ActiveState"; repo = "cpython"; rev = "v${version}"; inherit hash; }; hasDistutilsCxxPatch = !(stdenv.cc.isGNU or false); patches = [ # Look in C_INCLUDE_PATH and LIBRARY_PATH for stuff. ./search-path.patch # Python recompiles a Python if the mtime stored *in* the # pyc/pyo file differs from the mtime of the source file. This # doesn't work in Nix because Nix changes the mtime of files in # the Nix store to 1. So treat that as a special case. ./nix-store-mtime.patch # patch python to put zero timestamp into pyc # if DETERMINISTIC_BUILD env var is set ./deterministic-build.patch # Fix python bug #27177 (https://bugs.python.org/issue27177) # The issue is that `match.group` only recognizes python integers # instead of everything that has `__index__`. # This bug was fixed upstream, but not backported to 2.7 (fetchpatch { name = "re_match_index.patch"; url = "https://bugs.python.org/file43084/re_match_index.patch"; sha256 = "0l9rw6r5r90iybdkp3hhl2pf0h0s1izc68h5d3ywrm92pq32wz57"; }) # Fix race-condition during pyc creation. Has a slight backwards # incompatible effect: pyc symlinks will now be overridden # (https://bugs.python.org/issue17222). Included in python >= 3.4, # backported in debian since 2013. # https://bugs.python.org/issue13146 ./atomic_pyc.patch # Backport from CPython 3.8 of a good list of tests to run for PGO. ./profile-task.patch # The workaround is for unittests on Win64, which we don't support. # It does break aarch64-darwin, which we do support. See: # * https://bugs.python.org/issue35523 # * https://github.com/python/cpython/commit/e6b247c8e524 ../3.7/no-win64-workaround.patch # fix openssl detection by reverting irrelevant change for us, to enable hashlib which is required by pip (fetchpatch { url = "https://github.com/ActiveState/cpython/pull/35/commits/20ea5b46aaf1e7bdf9d6905ba8bece2cc73b05b0.patch"; revert = true; hash = "sha256-Lp5fGlcfJJ6p6vKmcLckJiAA2AZz4prjFE0aMEJxotw="; }) ] ++ lib.optionals (x11Support && stdenv.isDarwin) [ ./use-correct-tcl-tk-on-darwin.patch ] ++ lib.optionals stdenv.isDarwin [ # Fix darwin build https://bugs.python.org/issue34027 ../3.7/darwin-libutil.patch ] ++ lib.optionals stdenv.isLinux [ # Disable the use of ldconfig in ctypes.util.find_library (since # ldconfig doesn't work on NixOS), and don't use # ctypes.util.find_library during the loading of the uuid module # (since it will do a futile invocation of gcc (!) to find # libuuid, slowing down program startup a lot). ./no-ldconfig.patch # Fix ctypes.util.find_library with gcc10. ./find_library-gcc10.patch ] ++ lib.optionals stdenv.hostPlatform.isCygwin [ ./2.5.2-ctypes-util-find_library.patch ./2.5.2-tkinter-x11.patch ./2.6.2-ssl-threads.patch ./2.6.5-export-PySignal_SetWakeupFd.patch ./2.6.5-FD_SETSIZE.patch ./2.6.5-ncurses-abi6.patch ./2.7.3-dbm.patch ./2.7.3-dylib.patch ./2.7.3-getpath-exe-extension.patch ./2.7.3-no-libm.patch ] ++ lib.optionals hasDistutilsCxxPatch [ # Patch from http://bugs.python.org/issue1222585 adapted to work with # `patch -p1' and with a last hunk removed # Upstream distutils is calling C compiler to compile C++ code, which # only works for GCC and Apple Clang. This makes distutils to call C++ # compiler when needed. ./python-2.7-distutils-C++.patch ] ++ lib.optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ ./cross-compile.patch ]; preConfigure = '' # Purity. for i in /usr /sw /opt /pkg; do substituteInPlace ./setup.py --replace $i /no-such-path done '' + lib.optionalString (stdenv ? cc && stdenv.cc.libc != null) '' for i in Lib/plat-*/regen; do substituteInPlace $i --replace /usr/include/ ${stdenv.cc.libc}/include/ done '' + lib.optionalString stdenv.isDarwin '' substituteInPlace configure --replace '`/usr/bin/arch`' '"i386"' substituteInPlace Lib/multiprocessing/__init__.py \ --replace 'os.popen(comm)' 'os.popen("${coreutils}/bin/nproc")' ''; configureFlags = lib.optionals enableOptimizations [ "--enable-optimizations" ] ++ lib.optionals (!static) [ "--enable-shared" ] ++ [ "--with-threads" "--with-system-ffi" "--with-system-expat" "--enable-unicode=ucs${toString ucsEncoding}" ] ++ lib.optionals stdenv.hostPlatform.isCygwin [ "ac_cv_func_bind_textdomain_codeset=yes" ] ++ lib.optionals stdenv.isDarwin [ "--disable-toolbox-glue" ] ++ lib.optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ "PYTHON_FOR_BUILD=${lib.getBin buildPackages.python}/bin/python" "ac_cv_buggy_getaddrinfo=no" # Assume little-endian IEEE 754 floating point when cross compiling "ac_cv_little_endian_double=yes" "ac_cv_big_endian_double=no" "ac_cv_mixed_endian_double=no" "ac_cv_x87_double_rounding=yes" "ac_cv_tanh_preserves_zero_sign=yes" # Generally assume that things are present and work "ac_cv_posix_semaphores_enabled=yes" "ac_cv_broken_sem_getvalue=no" "ac_cv_wchar_t_signed=yes" "ac_cv_rshift_extends_sign=yes" "ac_cv_broken_nice=no" "ac_cv_broken_poll=no" "ac_cv_working_tzset=yes" "ac_cv_have_long_long_format=yes" "ac_cv_have_size_t_format=yes" "ac_cv_computed_gotos=yes" "ac_cv_file__dev_ptmx=yes" "ac_cv_file__dev_ptc=yes" ] # Never even try to use lchmod on linux, # don't rely on detecting glibc-isms. ++ lib.optional stdenv.hostPlatform.isLinux "ac_cv_func_lchmod=no" ++ lib.optional static "LDFLAGS=-static"; strictDeps = true; buildInputs = lib.optional (stdenv ? cc && stdenv.cc.libc != null) stdenv.cc.libc ++ [ bzip2 openssl zlib libffi expat db gdbm ncurses sqlite readline ] ++ lib.optionals x11Support [ tcl tk libX11 ] ++ lib.optional (stdenv.isDarwin && configd != null) configd; nativeBuildInputs = [ autoreconfHook ] ++ lib.optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ buildPackages.stdenv.cc buildPackages.python ]; mkPaths = paths: { C_INCLUDE_PATH = lib.makeSearchPathOutput "dev" "include" paths; LIBRARY_PATH = lib.makeLibraryPath paths; }; # Python 2.7 needs this crossCompileEnv = lib.optionalAttrs (stdenv.hostPlatform != stdenv.buildPlatform) { _PYTHON_HOST_PLATFORM = stdenv.hostPlatform.config; }; # Build the basic Python interpreter without modules that have # external dependencies. in with passthru; stdenv.mkDerivation ({ pname = "python"; inherit version; inherit src patches buildInputs nativeBuildInputs preConfigure configureFlags; LDFLAGS = lib.optionalString (!stdenv.isDarwin) "-lgcc_s"; inherit (mkPaths buildInputs) C_INCLUDE_PATH LIBRARY_PATH; env.NIX_CFLAGS_COMPILE = lib.optionalString (stdenv.targetPlatform.system == "x86_64-darwin") "-msse2" + lib.optionalString stdenv.hostPlatform.isMusl " -DTHREAD_STACK_SIZE=0x100000"; DETERMINISTIC_BUILD = 1; setupHook = python-setup-hook sitePackages; postPatch = lib.optionalString (x11Support && (tix != null)) '' substituteInPlace "Lib/lib-tk/Tix.py" --replace "os.environ.get('TIX_LIBRARY')" "os.environ.get('TIX_LIBRARY') or '${tix}/lib'" ''; postInstall = '' # needed for some packages, especially packages that backport # functionality to 2.x from 3.x for item in $out/lib/${libPrefix}/test/*; do if [[ "$item" != */test_support.py* && "$item" != */test/support && "$item" != */test/regrtest.py* ]]; then rm -rf "$item" else echo $item fi done touch $out/lib/${libPrefix}/test/__init__.py ln -s $out/lib/${libPrefix}/pdb.py $out/bin/pdb ln -s $out/lib/${libPrefix}/pdb.py $out/bin/pdb${sourceVersion.major}.${sourceVersion.minor} ln -s $out/share/man/man1/{python2.7.1.gz,python.1.gz} rm "$out"/lib/python*/plat-*/regen # refers to glibc.dev # Determinism: Windows installers were not deterministic. # We're also not interested in building Windows installers. find "$out" -name 'wininst*.exe' | xargs -r rm -f '' + lib.optionalString stripBytecode '' # Determinism: deterministic bytecode # First we delete all old bytecode. find $out -name "*.pyc" -delete '' + lib.optionalString rebuildBytecode '' # We build 3 levels of optimized bytecode. Note the default level, without optimizations, # is not reproducible yet. https://bugs.python.org/issue29708 # Not creating bytecode will result in a large performance loss however, so we do build it. find $out -name "*.py" | ${pythonOnBuildForHostInterpreter} -m compileall -q -f -x "lib2to3" -i - find $out -name "*.py" | ${pythonOnBuildForHostInterpreter} -O -m compileall -q -f -x "lib2to3" -i - find $out -name "*.py" | ${pythonOnBuildForHostInterpreter} -OO -m compileall -q -f -x "lib2to3" -i - '' + lib.optionalString stdenv.hostPlatform.isCygwin '' cp libpython2.7.dll.a $out/lib ''; inherit passthru; postFixup = '' '' + lib.optionalString strip2to3 '' rm -R $out/bin/2to3 $out/lib/python*/lib2to3 '' + lib.optionalString stripConfig '' rm -R $out/bin/python*-config $out/lib/python*/config* '' + lib.optionalString stripIdlelib '' # Strip IDLE rm -R $out/bin/idle* $out/lib/python*/idlelib '' + lib.optionalString stripTests '' # Strip tests rm -R $out/lib/python*/test $out/lib/python*/**/test{,s} ''; enableParallelBuilding = true; doCheck = false; # expensive, and fails meta = { homepage = "http://python.org"; description = "A high-level dynamically-typed programming language"; longDescription = '' Python is a remarkably powerful dynamic programming language that is used in a wide variety of application domains. Some of its key distinguishing features include: clear, readable syntax; strong introspection capabilities; intuitive object orientation; natural expression of procedural code; full modularity, supporting hierarchical packages; exception-based error handling; and very high level dynamic data types. ''; license = lib.licenses.psfl; platforms = lib.platforms.all; maintainers = with lib.maintainers; [ fridh ]; knownVulnerabilities = [ "Python 2.7 has reached its end of life after 2020-01-01. See https://www.python.org/doc/sunset-python-2/." # Quote: That means that we will not improve it anymore after that day, # even if someone finds a security problem in it. You should upgrade to # Python 3 as soon as you can. [..] So, in 2008, we announced that we # would sunset Python 2 in 2015, and asked people to upgrade before # then. Some did, but many did not. So, in 2014, we extended that # sunset till 2020. ]; }; } // crossCompileEnv) [result] Failed to update python27Full 2.7.18.8 -> 3.7.17.3 https://github.com/ActiveState/cpython/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO multi-platform srcs in file. [result] Failed to update electron_24 24.8.6 -> 29.1.6 https://github.com/electron/electron/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.pyreadstat, using log file: /var/log/nixpkgs-update/python312Packages.pyreadstat/2024-04-03.log python312Packages.pyreadstat 1.2.6 -> 1.2.7 https://github.com/Roche/pyreadstat/releases attrpath: python312Packages.pyreadstat Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/3k41w4py0rm2h8iwinnh6m2ajzww9z65-packages.json.drv building '/nix/store/3k41w4py0rm2h8iwinnh6m2ajzww9z65-packages.json.drv'... Going to be running update for following packages: - python3.12-pyreadstat-1.2.6 Press Enter key to continue... Running update for: - python3.12-pyreadstat-1.2.6: UPDATING ... - python3.12-pyreadstat-1.2.6: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/pyreadstat/default.nix b/pkgs/development/python-modules/pyreadstat/default.nix index 1a575db7c2e2..91166079a359 100644 --- a/pkgs/development/python-modules/pyreadstat/default.nix +++ b/pkgs/development/python-modules/pyreadstat/default.nix @@ -13,7 +13,7 @@ buildPythonPackage rec { pname = "pyreadstat"; - version = "1.2.6"; + version = "1.2.7"; format = "setuptools"; disabled = pythonOlder "3.7"; @@ -22,7 +22,7 @@ buildPythonPackage rec { owner = "Roche"; repo = "pyreadstat"; rev = "refs/tags/v${version}"; - hash = "sha256-VcPpGRrE/5udNijodO88Lw69JPOm6ZN7BZb4xD34srQ="; + hash = "sha256-XuLFLpZbaCj/MHq0+l6GoNqR5nAldAlEJhoO5ioWYTA="; }; nativeBuildInputs = [ An auto update branch exists with message `python312Packages.pyreadstat: 1.2.6 -> 1.2.7`. New version is 1.2.7. An auto update branch exists with an equal or greater version [result] Failed to update python312Packages.pyreadstat 1.2.6 -> 1.2.7 https://github.com/Roche/pyreadstat/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath blockbook, using log file: /var/log/nixpkgs-update/blockbook/2024-04-03.log blockbook 0.3.6 -> 0.4.0 https://github.com/trezor/blockbook/releases attrpath: blockbook Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Found old vendorHash = "sha256-KJ92WztrtKjibvGBYRdnRag4XeZS4d7kyskJqD4GLPE=" [golangModuleVersion] Replaced vendorHash with sha256-msAB58a9PHyfyVvOa1MeuqmjZKGaXqCdLZOB0G4TZaM= Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A blockbook nix build failed. got build log for 'blockbook' from 'daemon' @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/8b04rsj0zjf4fc68rzm11d4r9qqr2rfn-source source root is source @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase @nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" } Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "configurePhase" } Running phase: configurePhase @nix { "action": "setPhase", "phase": "buildPhase" } Running phase: buildPhase Building subPackage ./. # github.com/supranational/blst/bindings/go vendor/github.com/supranational/blst/bindings/go/blst.go:16:11: fatal error: blst.h: No such file or directory 16 | // #include "blst.h" | ^~~~~~~~ compilation terminated. # github.com/linxGnu/grocksdb vendor/github.com/linxGnu/grocksdb/cache.go:84:2: could not determine kind of name for C.rocksdb_lru_cache_options_set_num_shard_bits [result] Failed to update blockbook 0.3.6 -> 0.4.0 https://github.com/trezor/blockbook/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath reproc, using log file: /var/log/nixpkgs-update/reproc/2024-04-03.log reproc 14.2.4 -> 14.2.5 https://repology.org/project/reproc/versions attrpath: reproc Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update reproc 14.2.4 -> 14.2.5 https://repology.org/project/reproc/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath sentry-cli, using log file: /var/log/nixpkgs-update/sentry-cli/2024-04-03.log sentry-cli 2.30.4 -> 2.31.0 https://repology.org/project/sentry-cli/versions attrpath: sentry-cli Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] Replacing cargoHash with sha256-G/c84j9BquLCJcl60H0ZZZDxjTHpaGHflfJL/hzdgYQ= [rustCrateVersion] Finished updating Crate version and replacing hashes [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/tools/sentry-cli/default.nix b/pkgs/development/tools/sentry-cli/default.nix index 92711b2d72df..b9fa98a228ce 100644 --- a/pkgs/development/tools/sentry-cli/default.nix +++ b/pkgs/development/tools/sentry-cli/default.nix @@ -11,13 +11,13 @@ }: rustPlatform.buildRustPackage rec { pname = "sentry-cli"; - version = "2.30.4"; + version = "2.31.0"; src = fetchFromGitHub { owner = "getsentry"; repo = "sentry-cli"; rev = version; - sha256 = "sha256-J+8/sCFSd2BYQgKOl8OZoxlFLB8scDY5Bl7GAQ54/RM="; + sha256 = "sha256-2F8f+vw559FI7CCiLkP8WLpLzDYzr3SHf/Ec8yFHu6g="; }; doCheck = false; @@ -27,7 +27,7 @@ rustPlatform.buildRustPackage rec { buildInputs = [ openssl ] ++ lib.optionals stdenv.isDarwin [ CoreServices Security SystemConfiguration ]; nativeBuildInputs = [ installShellFiles pkg-config ]; - cargoHash = "sha256-622cEaHEMmVspabsIYgQ5ySbaDr9qB1FjxJ5NwbeGx8="; + cargoHash = "sha256-G/c84j9BquLCJcl60H0ZZZDxjTHpaGHflfJL/hzdgYQ="; postInstall = '' installShellCompletion --cmd sentry-cli \ [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/dp6svz2zc366sr1bc3k4s231lr1arvji-sentry-cli-2.31.0" Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 3 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 3 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 3 [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • sentry-cli
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/sentry-cli/versions. meta.description for sentry-cli is: A command line utility to work with Sentry meta.homepage for sentry-cli is: https://docs.sentry.io/cli/ meta.changelog for sentry-cli is: https://github.com/getsentry/sentry-cli/raw/2.31.0/CHANGELOG.md ###### Updates performed - Rust version update ###### To inspect upstream changes - [Release on GitHub](https://github.com/getsentry/sentry-cli/releases/tag/2.31.0) - [Compare changes on GitHub](https://github.com/getsentry/sentry-cli/compare/2.30.4...2.31.0) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 2.31.0 with grep in /nix/store/dp6svz2zc366sr1bc3k4s231lr1arvji-sentry-cli-2.31.0 - found 2.31.0 in filename of file in /nix/store/dp6svz2zc366sr1bc3k4s231lr1arvji-sentry-cli-2.31.0 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath sentry-cli ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/dp6svz2zc366sr1bc3k4s231lr1arvji-sentry-cli-2.31.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A sentry-cli https://github.com/r-ryantm/nixpkgs/archive/e42b6b3480990fc76c8abfb7d7db8e332028783e.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/e42b6b3480990fc76c8abfb7d7db8e332028783e#sentry-cli ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/dp6svz2zc366sr1bc3k4s231lr1arvji-sentry-cli-2.31.0 ls -la /nix/store/dp6svz2zc366sr1bc3k4s231lr1arvji-sentry-cli-2.31.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • sentry-cli
--- ###### Maintainer pings cc @Rizary @loewenheim for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301264 [result] Success updating sentry-cli 2.30.4 -> 2.31.0 https://repology.org/project/sentry-cli/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath librepcb, using log file: /var/log/nixpkgs-update/librepcb/2024-04-03.log librepcb 1.0.0 -> 1.1.0 https://github.com/librepcb/librepcb/releases attrpath: librepcb Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/applications/science/electronics/librepcb/default.nix b/pkgs/applications/science/electronics/librepcb/default.nix index dfd679d4d531..bfb473146fe4 100644 --- a/pkgs/applications/science/electronics/librepcb/default.nix +++ b/pkgs/applications/science/electronics/librepcb/default.nix @@ -4,13 +4,13 @@ stdenv.mkDerivation rec { pname = "librepcb"; - version = "1.0.0"; + version = "1.1.0"; src = fetchFromGitHub { owner = pname; repo = pname; rev = version; - sha256 = "sha256-2o2Gue/RnDWxe8jk/Ehx9CM+B3ac5rEQn0H7yodUEZ8="; + sha256 = "sha256-Vyp7asVqvKFkkEb67LXapMkT1AQSburN3+B2dXIPcEU="; fetchSubmodules = true; }; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A librepcb Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix --extra-experimental-features nix-command log -f . librepcb Standard output: error: … while calling the 'derivationStrict' builtin at /builtin/derivation.nix:9:12: (source not available) … while evaluating derivation 'librepcb-1.1.0' whose name attribute is located at /var/cache/nixpkgs-update/worker/worktree/librepcb/pkgs/stdenv/generic/make-derivation.nix:331:7 … while evaluating attribute 'propagatedBuildInputs' of derivation 'librepcb-1.1.0' at /var/cache/nixpkgs-update/worker/worktree/librepcb/pkgs/stdenv/generic/make-derivation.nix:385:7: 384| depsHostHostPropagated = elemAt (elemAt propagatedDependencies 1) 0; 385| propagatedBuildInputs = elemAt (elemAt propagatedDependencies 1) 1; | ^ 386| depsTargetTargetPropagated = elemAt (elemAt propagatedDependencies 2) 0; error: Package ‘freeimage-unstable-2021-11-01’ in /var/cache/nixpkgs-update/worker/worktree/librepcb/pkgs/development/libraries/freeimage/default.nix:72 is marked as insecure, refusing to evaluate. Known issues: - CVE-2021-33367 - CVE-2021-40262 - CVE-2021-40263 - CVE-2021-40264 - CVE-2021-40265 - CVE-2021-40266 - CVE-2023-47992 - CVE-2023-47993 - CVE-2023-47994 - CVE-2023-47995 - CVE-2023-47996 You can install it anyway by allowing this package, using the following methods: a) To temporarily allow all insecure packages, you can use an environment variable for a single invocation of the nix tools: $ export NIXPKGS_ALLOW_INSECURE=1 Note: When using `nix shell`, `nix build`, `nix develop`, etc with a flake, then pass `--impure` in order to allow use of environment variables. b) for `nixos-rebuild` you can add ‘freeimage-unstable-2021-11-01’ to `nixpkgs.config.permittedInsecurePackages` in the configuration.nix, like so: { nixpkgs.config.permittedInsecurePackages = [ "freeimage-unstable-2021-11-01" ]; } c) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add ‘freeimage-unstable-2021-11-01’ to `permittedInsecurePackages` in ~/.config/nixpkgs/config.nix, like so: { permittedInsecurePackages = [ "freeimage-unstable-2021-11-01" ]; } [result] Failed to update librepcb 1.0.0 -> 1.1.0 https://github.com/librepcb/librepcb/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath linuxKernel.packages.linux_lqx.facetimehd, using log file: /var/log/nixpkgs-update/linuxKernel.packages.linux_lqx.facetimehd/2024-04-03.log linuxKernel.packages.linux_lqx.facetimehd 0.6.8 -> 0.6.8.1 https://github.com/patjak/facetimehd/releases attrpath: linuxKernel.packages.linux_lqx.facetimehd Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/os-specific/linux/facetimehd/default.nix b/pkgs/os-specific/linux/facetimehd/default.nix index 30d232f6eb88..ceba075758a6 100644 --- a/pkgs/os-specific/linux/facetimehd/default.nix +++ b/pkgs/os-specific/linux/facetimehd/default.nix @@ -2,7 +2,7 @@ stdenv.mkDerivation rec { name = "facetimehd-${version}-${kernel.version}"; - version = "0.6.8"; + version = "0.6.8.1"; # Note: When updating this revision: # 1. Also update pkgs/os-specific/linux/firmware/facetimehd-firmware/ @@ -18,7 +18,7 @@ stdenv.mkDerivation rec { owner = "patjak"; repo = "facetimehd"; rev = version; - sha256 = "sha256-Tze85Hx1YmStAKenmF/S1JuMDq5eVjBcs3LSWXjyE7w="; + sha256 = "sha256-h5Erga2hlDIWdDKQbkmkLY1aNCibFM7SVSnxVcoToaM="; }; preConfigure = '' [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A linuxKernel.packages.linux_lqx.facetimehd Received ExitFailure 1 when running Raw command: /nix/store/cydbsmqkxk30didm1rlz8ffk5wfa9gva-nix-2.18.2/bin/nix --extra-experimental-features nix-command log -f . linuxKernel.packages.linux_lqx.facetimehd Standard output: error: build log of 'linuxKernel.packages.linux_lqx.facetimehd' is not available [result] Failed to update linuxKernel.packages.linux_lqx.facetimehd 0.6.8 -> 0.6.8.1 https://github.com/patjak/facetimehd/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath phrase-cli, using log file: /var/log/nixpkgs-update/phrase-cli/2024-04-03.log phrase-cli 2.22.0 -> 2.23.0 https://github.com/phrase/phrase-cli/releases attrpath: phrase-cli Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Found old vendorHash = "sha256-/V1jAF3Uf0AT8JF7hERK3Kc4fX15lDnoEsjeHS0QjpE=" [golangModuleVersion] Replaced vendorHash with sha256-ZWCwSiKoU/zXD9JJ/8qW2tiXWAMqkh0Md0MLz0V4P4E= [golangModuleVersion] Finished updating vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/tools/misc/phrase-cli/default.nix b/pkgs/tools/misc/phrase-cli/default.nix index 9a7c6fc4633e..a9a842f8451d 100644 --- a/pkgs/tools/misc/phrase-cli/default.nix +++ b/pkgs/tools/misc/phrase-cli/default.nix @@ -2,16 +2,16 @@ buildGoModule rec { pname = "phrase-cli"; - version = "2.22.0"; + version = "2.23.0"; src = fetchFromGitHub { owner = "phrase"; repo = "phrase-cli"; rev = version; - sha256 = "sha256-k0Di69toio7uZiTCI34H0N+PnYXfxygQW9sZ9GpG3rU="; + sha256 = "sha256-ucuksG3T4cI/cuEsHe4+7RtY+n05p3RvW/tijZ49lVY="; }; - vendorHash = "sha256-/V1jAF3Uf0AT8JF7hERK3Kc4fX15lDnoEsjeHS0QjpE="; + vendorHash = "sha256-ZWCwSiKoU/zXD9JJ/8qW2tiXWAMqkh0Md0MLz0V4P4E="; ldflags = [ "-X=github.com/phrase/phrase-cli/cmd.PHRASE_CLIENT_VERSION=${version}" ]; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/6viy0m05yyid9nvxazsx9l3w9l85v2h9-phrase-cli-2.23.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • phrase-cli
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/phrase/phrase-cli/releases. meta.description for phrase-cli is: PhraseApp API v2 Command Line Client meta.homepage for phrase-cli is: http://docs.phraseapp.com meta.changelog for phrase-cli is: https://github.com/phrase/phrase-cli/blob/2.23.0/CHANGELOG.md ###### Updates performed - Golang update ###### To inspect upstream changes - [Compare changes on GitHub](https://github.com/phrase/phrase-cli/compare/2.22.0...2.23.0) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 2.23.0 with grep in /nix/store/6viy0m05yyid9nvxazsx9l3w9l85v2h9-phrase-cli-2.23.0 - found 2.23.0 in filename of file in /nix/store/6viy0m05yyid9nvxazsx9l3w9l85v2h9-phrase-cli-2.23.0 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath phrase-cli ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/6viy0m05yyid9nvxazsx9l3w9l85v2h9-phrase-cli-2.23.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A phrase-cli https://github.com/r-ryantm/nixpkgs/archive/5484d5f89c176579adb390bdde76a3d345b364ad.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/5484d5f89c176579adb390bdde76a3d345b364ad#phrase-cli ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/6viy0m05yyid9nvxazsx9l3w9l85v2h9-phrase-cli-2.23.0 ls -la /nix/store/6viy0m05yyid9nvxazsx9l3w9l85v2h9-phrase-cli-2.23.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • phrase-cli
--- ###### Maintainer pings cc @juboba for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301270 [result] Success updating phrase-cli 2.22.0 -> 2.23.0 https://github.com/phrase/phrase-cli/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath prometheus-pgbouncer-exporter, using log file: /var/log/nixpkgs-update/prometheus-pgbouncer-exporter/2024-04-03.log prometheus-pgbouncer-exporter 0.7.0 -> 0.8.0 https://github.com/prometheus-community/pgbouncer_exporter/releases attrpath: prometheus-pgbouncer-exporter Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Found old vendorHash = "sha256-2aaUlOokqYkjMpcM12mU+O+N09/mDPlIrJ4Z1iXJAyk=" [golangModuleVersion] Replaced vendorHash with sha256-NYiVW+CNrxFrEUl1nsTeNNgy7SmTYgqs1d50rCvyBcw= [golangModuleVersion] Finished updating vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/servers/monitoring/prometheus/pgbouncer-exporter.nix b/pkgs/servers/monitoring/prometheus/pgbouncer-exporter.nix index ca62b415bfb9..970d63ec0f2e 100644 --- a/pkgs/servers/monitoring/prometheus/pgbouncer-exporter.nix +++ b/pkgs/servers/monitoring/prometheus/pgbouncer-exporter.nix @@ -2,16 +2,16 @@ buildGoModule rec { pname = "pgbouncer-exporter"; - version = "0.7.0"; + version = "0.8.0"; src = fetchFromGitHub { owner = "prometheus-community"; repo = "pgbouncer_exporter"; rev = "v${version}"; - hash = "sha256-2N8FaGk6AU39j4q22B2Om5E7BeR7iw9drl3PTOBO2kg="; + hash = "sha256-QnA9H4qedCPZKqJQ1I2OJO42mCWcWqYxLmeF3+JXzTw="; }; - vendorHash = "sha256-2aaUlOokqYkjMpcM12mU+O+N09/mDPlIrJ4Z1iXJAyk="; + vendorHash = "sha256-NYiVW+CNrxFrEUl1nsTeNNgy7SmTYgqs1d50rCvyBcw="; meta = with lib; { description = "Prometheus exporter for PgBouncer"; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/ba10jkaw5n6nrz8265f81rndmi8ww33k-pgbouncer-exporter-0.8.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • prometheus-pgbouncer-exporter
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/prometheus-community/pgbouncer_exporter/releases. meta.description for prometheus-pgbouncer-exporter is: Prometheus exporter for PgBouncer meta.homepage for prometheus-pgbouncer-exporter is: https://github.com/prometheus-community/pgbouncer_exporter ###### Updates performed - Golang update ###### To inspect upstream changes - [Release on GitHub](https://github.com/prometheus-community/pgbouncer_exporter/releases/tag/v0.8.0) - [Compare changes on GitHub](https://github.com/prometheus-community/pgbouncer_exporter/compare/v0.7.0...v0.8.0) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.8.0 in filename of file in /nix/store/ba10jkaw5n6nrz8265f81rndmi8ww33k-pgbouncer-exporter-0.8.0 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath prometheus-pgbouncer-exporter ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/ba10jkaw5n6nrz8265f81rndmi8ww33k-pgbouncer-exporter-0.8.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A prometheus-pgbouncer-exporter https://github.com/r-ryantm/nixpkgs/archive/23ef381b2e908384284afea74321d2d1899f6566.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/23ef381b2e908384284afea74321d2d1899f6566#prometheus-pgbouncer-exporter ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/ba10jkaw5n6nrz8265f81rndmi8ww33k-pgbouncer-exporter-0.8.0 ls -la /nix/store/ba10jkaw5n6nrz8265f81rndmi8ww33k-pgbouncer-exporter-0.8.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • prometheus-pgbouncer-exporter
--- ###### Maintainer pings cc @1000101 for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301276 [result] Success updating prometheus-pgbouncer-exporter 0.7.0 -> 0.8.0 https://github.com/prometheus-community/pgbouncer_exporter/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.elasticsearchdsl, using log file: /var/log/nixpkgs-update/python311Packages.elasticsearchdsl/2024-04-03.log python311Packages.elasticsearchdsl 8.12.0 -> 8.13.0 https://github.com/elasticsearch/elasticsearch-dsl-py/releases attrpath: python311Packages.elasticsearchdsl Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/s05hhsrz3bycxz7nvsvll1k1jyakr0ac-packages.json.drv building '/nix/store/s05hhsrz3bycxz7nvsvll1k1jyakr0ac-packages.json.drv'... Going to be running update for following packages: - python3.11-elasticsearch-dsl-8.12.0 Press Enter key to continue... Running update for: - python3.11-elasticsearch-dsl-8.12.0: UPDATING ... - python3.11-elasticsearch-dsl-8.12.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/elasticsearch-dsl/default.nix b/pkgs/development/python-modules/elasticsearch-dsl/default.nix index 263786e3e404..53778ce0b4e1 100644 --- a/pkgs/development/python-modules/elasticsearch-dsl/default.nix +++ b/pkgs/development/python-modules/elasticsearch-dsl/default.nix @@ -8,12 +8,12 @@ buildPythonPackage rec { pname = "elasticsearch-dsl"; - version = "8.12.0"; + version = "8.13.0"; format = "setuptools"; src = fetchPypi { inherit pname version; - sha256 = "sha256-zjK4UpiIqXvpEVMedZCBbPOx9ggmPv9vt1qnEG4jPIg="; + sha256 = "sha256-cy/IEae7B2O8P7WJLk6nzwbTG7o1XoezM1PpLfrNebQ="; }; propagatedBuildInputs = [ elasticsearch python-dateutil six ]; No auto update branch exists [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/lqbsg68q78f71pb92a1gdyixnwr3rqzj-python3.11-elasticsearch-dsl-8.13.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
2 packages failed to build:
  • parsedmarc (python311Packages.parsedmarc)
  • parsedmarc.dist (python311Packages.parsedmarc.dist)
8 packages built:
  • python311Packages.elasticsearchdsl (python311Packages.elasticsearch-dsl)
  • python311Packages.elasticsearchdsl.dist (python311Packages.elasticsearch-dsl.dist)
  • python311Packages.luqum
  • python311Packages.luqum.dist
  • python312Packages.elasticsearchdsl (python312Packages.elasticsearch-dsl)
  • python312Packages.elasticsearchdsl.dist (python312Packages.elasticsearch-dsl.dist)
  • python312Packages.luqum
  • python312Packages.luqum.dist
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from passthru.updateScript. meta.description for python311Packages.elasticsearchdsl is: High level Python client for Elasticsearch meta.homepage for python311Packages.elasticsearchdsl is: https://github.com/elasticsearch/elasticsearch-dsl-py ###### Updates performed - Ran passthru.UpdateScript ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 8.13.0 with grep in /nix/store/lqbsg68q78f71pb92a1gdyixnwr3rqzj-python3.11-elasticsearch-dsl-8.13.0 - found 8.13.0 in filename of file in /nix/store/lqbsg68q78f71pb92a1gdyixnwr3rqzj-python3.11-elasticsearch-dsl-8.13.0 ---
Rebuild report (if merged into master) (click to expand) ``` 8 total rebuild path(s) 8 package rebuild(s) First fifty rebuilds by attrpath parsedmarc python311Packages.elasticsearch-dsl python311Packages.elasticsearchdsl python311Packages.luqum python311Packages.parsedmarc python312Packages.elasticsearch-dsl python312Packages.elasticsearchdsl python312Packages.luqum ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/lqbsg68q78f71pb92a1gdyixnwr3rqzj-python3.11-elasticsearch-dsl-8.13.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A python311Packages.elasticsearchdsl https://github.com/r-ryantm/nixpkgs/archive/acbf75bf2255cf65c1578d0fb028444f1e510e06.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/acbf75bf2255cf65c1578d0fb028444f1e510e06#python311Packages.elasticsearchdsl ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/lqbsg68q78f71pb92a1gdyixnwr3rqzj-python3.11-elasticsearch-dsl-8.13.0 ls -la /nix/store/lqbsg68q78f71pb92a1gdyixnwr3rqzj-python3.11-elasticsearch-dsl-8.13.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
2 packages failed to build:
  • parsedmarc (python311Packages.parsedmarc)
  • parsedmarc.dist (python311Packages.parsedmarc.dist)
8 packages built:
  • python311Packages.elasticsearchdsl (python311Packages.elasticsearch-dsl)
  • python311Packages.elasticsearchdsl.dist (python311Packages.elasticsearch-dsl.dist)
  • python311Packages.luqum
  • python311Packages.luqum.dist
  • python312Packages.elasticsearchdsl (python312Packages.elasticsearch-dsl)
  • python312Packages.elasticsearchdsl.dist (python312Packages.elasticsearch-dsl.dist)
  • python312Packages.luqum
  • python312Packages.luqum.dist
--- ###### Maintainer pings cc @desiderius for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301282 [result] Success updating python311Packages.elasticsearchdsl 8.12.0 -> 8.13.0 https://github.com/elasticsearch/elasticsearch-dsl-py/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.elasticsearchdsl, using log file: /var/log/nixpkgs-update/python312Packages.elasticsearchdsl/2024-04-03.log python312Packages.elasticsearchdsl 8.12.0 -> 8.13.0 https://github.com/elasticsearch/elasticsearch-dsl-py/releases attrpath: python312Packages.elasticsearchdsl Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/rfb1ly89xv9v9ph4qr0nbsk8jalazhiw-packages.json.drv building '/nix/store/rfb1ly89xv9v9ph4qr0nbsk8jalazhiw-packages.json.drv'... Going to be running update for following packages: - python3.12-elasticsearch-dsl-8.12.0 Press Enter key to continue... Running update for: - python3.12-elasticsearch-dsl-8.12.0: UPDATING ... - python3.12-elasticsearch-dsl-8.12.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/elasticsearch-dsl/default.nix b/pkgs/development/python-modules/elasticsearch-dsl/default.nix index 263786e3e404..53778ce0b4e1 100644 --- a/pkgs/development/python-modules/elasticsearch-dsl/default.nix +++ b/pkgs/development/python-modules/elasticsearch-dsl/default.nix @@ -8,12 +8,12 @@ buildPythonPackage rec { pname = "elasticsearch-dsl"; - version = "8.12.0"; + version = "8.13.0"; format = "setuptools"; src = fetchPypi { inherit pname version; - sha256 = "sha256-zjK4UpiIqXvpEVMedZCBbPOx9ggmPv9vt1qnEG4jPIg="; + sha256 = "sha256-cy/IEae7B2O8P7WJLk6nzwbTG7o1XoezM1PpLfrNebQ="; }; propagatedBuildInputs = [ elasticsearch python-dateutil six ]; No auto update branch exists [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/v6ng894n24yi70qhq5fwxz93fp5gkcws-python3.12-elasticsearch-dsl-8.13.0" Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 3 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 7 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 8 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 7 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 8 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 8 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 8 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 3 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 3 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 3 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 8 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 10 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 10 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 10 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 12 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 13 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 13 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 13 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 13 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 15 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 16 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 17 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 17 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 17 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 19 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 19 [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
2 packages failed to build:
  • parsedmarc (python311Packages.parsedmarc)
  • parsedmarc.dist (python311Packages.parsedmarc.dist)
8 packages built:
  • python311Packages.elasticsearchdsl (python311Packages.elasticsearch-dsl)
  • python311Packages.elasticsearchdsl.dist (python311Packages.elasticsearch-dsl.dist)
  • python311Packages.luqum
  • python311Packages.luqum.dist
  • python312Packages.elasticsearchdsl (python312Packages.elasticsearch-dsl)
  • python312Packages.elasticsearchdsl.dist (python312Packages.elasticsearch-dsl.dist)
  • python312Packages.luqum
  • python312Packages.luqum.dist
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from passthru.updateScript. meta.description for python312Packages.elasticsearchdsl is: High level Python client for Elasticsearch meta.homepage for python312Packages.elasticsearchdsl is: https://github.com/elasticsearch/elasticsearch-dsl-py ###### Updates performed - Ran passthru.UpdateScript ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 8.13.0 with grep in /nix/store/v6ng894n24yi70qhq5fwxz93fp5gkcws-python3.12-elasticsearch-dsl-8.13.0 - found 8.13.0 in filename of file in /nix/store/v6ng894n24yi70qhq5fwxz93fp5gkcws-python3.12-elasticsearch-dsl-8.13.0 ---
Rebuild report (if merged into master) (click to expand) ``` 8 total rebuild path(s) 8 package rebuild(s) First fifty rebuilds by attrpath parsedmarc python311Packages.elasticsearch-dsl python311Packages.elasticsearchdsl python311Packages.luqum python311Packages.parsedmarc python312Packages.elasticsearch-dsl python312Packages.elasticsearchdsl python312Packages.luqum ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/v6ng894n24yi70qhq5fwxz93fp5gkcws-python3.12-elasticsearch-dsl-8.13.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A python312Packages.elasticsearchdsl https://github.com/r-ryantm/nixpkgs/archive/d42c0a5b25c473018e450520d4f67bb56f62ca14.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/d42c0a5b25c473018e450520d4f67bb56f62ca14#python312Packages.elasticsearchdsl ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/v6ng894n24yi70qhq5fwxz93fp5gkcws-python3.12-elasticsearch-dsl-8.13.0 ls -la /nix/store/v6ng894n24yi70qhq5fwxz93fp5gkcws-python3.12-elasticsearch-dsl-8.13.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
2 packages failed to build:
  • parsedmarc (python311Packages.parsedmarc)
  • parsedmarc.dist (python311Packages.parsedmarc.dist)
8 packages built:
  • python311Packages.elasticsearchdsl (python311Packages.elasticsearch-dsl)
  • python311Packages.elasticsearchdsl.dist (python311Packages.elasticsearch-dsl.dist)
  • python311Packages.luqum
  • python311Packages.luqum.dist
  • python312Packages.elasticsearchdsl (python312Packages.elasticsearch-dsl)
  • python312Packages.elasticsearchdsl.dist (python312Packages.elasticsearch-dsl.dist)
  • python312Packages.luqum
  • python312Packages.luqum.dist
--- ###### Maintainer pings cc @desiderius for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301303 [result] Success updating python312Packages.elasticsearchdsl 8.12.0 -> 8.13.0 https://github.com/elasticsearch/elasticsearch-dsl-py/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.medpy, using log file: /var/log/nixpkgs-update/python312Packages.medpy/2024-04-03.log python312Packages.medpy 0.5.0rc1 -> 0.5.1 https://github.com/loli/medpy/releases attrpath: python312Packages.medpy Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/map5mr1qb08fg4k8y80xhkvkvbx7511j-packages.json.drv building '/nix/store/map5mr1qb08fg4k8y80xhkvkvbx7511j-packages.json.drv'... Going to be running update for following packages: - python3.12-medpy-0.5.0rc1 Press Enter key to continue... Running update for: - python3.12-medpy-0.5.0rc1: UPDATING ... - python3.12-medpy-0.5.0rc1: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/medpy/default.nix b/pkgs/development/python-modules/medpy/default.nix index 6fc6242c155c..e36896982c90 100644 --- a/pkgs/development/python-modules/medpy/default.nix +++ b/pkgs/development/python-modules/medpy/default.nix @@ -12,7 +12,7 @@ buildPythonPackage rec { pname = "medpy"; - version = "0.5.0rc1"; + version = "0.5.1"; pyproject = true; disabled = pythonOlder "3.6"; @@ -21,7 +21,7 @@ buildPythonPackage rec { owner = "loli"; repo = "medpy"; rev = "refs/tags/${version}"; - hash = "sha256-W62LjstH42OzNG+vMkuApUWczTNugJGKuuoeeS5ok4U="; + hash = "sha256-kzOTYBcXAAEYoe/m/BjWNaQX4ljG17NxndevAt5KxjQ="; }; nativeBuildInputs = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/7cw8b968098h85mg6jkk4vlkslv35437-python3.12-medpy-0.5.1" Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 11 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 12 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 11 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 12 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 12 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 12 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 11 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 12 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 14 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 14 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 16 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 18 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 18 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 17 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 17 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 17 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 16 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 16 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 17 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 17 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 17 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 18 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 20 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 22 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 22 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 22 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 22 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 19 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 19 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 19 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 20 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 22 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 22 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 24 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
4 packages built:
  • python311Packages.medpy
  • python311Packages.medpy.dist
  • python312Packages.medpy
  • python312Packages.medpy.dist
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from passthru.updateScript. meta.description for python312Packages.medpy is: Medical image processing library meta.homepage for python312Packages.medpy is: https://loli.github.io/medpy meta.changelog for python312Packages.medpy is: https://github.com/loli/medpy/releases/tag/0.5.1 ###### Updates performed - Ran passthru.UpdateScript ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.5.1 with grep in /nix/store/7cw8b968098h85mg6jkk4vlkslv35437-python3.12-medpy-0.5.1 - found 0.5.1 in filename of file in /nix/store/7cw8b968098h85mg6jkk4vlkslv35437-python3.12-medpy-0.5.1 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath python311Packages.medpy python312Packages.medpy ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/7cw8b968098h85mg6jkk4vlkslv35437-python3.12-medpy-0.5.1 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A python312Packages.medpy https://github.com/r-ryantm/nixpkgs/archive/755d71835b4a411cf66d34639af8a8c7d2f6f612.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/755d71835b4a411cf66d34639af8a8c7d2f6f612#python312Packages.medpy ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/7cw8b968098h85mg6jkk4vlkslv35437-python3.12-medpy-0.5.1 ls -la /nix/store/7cw8b968098h85mg6jkk4vlkslv35437-python3.12-medpy-0.5.1/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
4 packages built:
  • python311Packages.medpy
  • python311Packages.medpy.dist
  • python312Packages.medpy
  • python312Packages.medpy.dist
--- ###### Maintainer pings cc @bcdarwin for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301323 [result] Success updating python312Packages.medpy 0.5.0rc1 -> 0.5.1 https://github.com/loli/medpy/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath linuxKernel.packages.linux_5_15_hardened.facetimehd, using log file: /var/log/nixpkgs-update/linuxKernel.packages.linux_5_15_hardened.facetimehd/2024-04-03.log linuxKernel.packages.linux_5_15_hardened.facetimehd 0.6.8 -> 0.6.8.1 https://github.com/patjak/facetimehd/releases attrpath: linuxKernel.packages.linux_5_15_hardened.facetimehd Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/os-specific/linux/facetimehd/default.nix b/pkgs/os-specific/linux/facetimehd/default.nix index 30d232f6eb88..ceba075758a6 100644 --- a/pkgs/os-specific/linux/facetimehd/default.nix +++ b/pkgs/os-specific/linux/facetimehd/default.nix @@ -2,7 +2,7 @@ stdenv.mkDerivation rec { name = "facetimehd-${version}-${kernel.version}"; - version = "0.6.8"; + version = "0.6.8.1"; # Note: When updating this revision: # 1. Also update pkgs/os-specific/linux/firmware/facetimehd-firmware/ @@ -18,7 +18,7 @@ stdenv.mkDerivation rec { owner = "patjak"; repo = "facetimehd"; rev = version; - sha256 = "sha256-Tze85Hx1YmStAKenmF/S1JuMDq5eVjBcs3LSWXjyE7w="; + sha256 = "sha256-h5Erga2hlDIWdDKQbkmkLY1aNCibFM7SVSnxVcoToaM="; }; preConfigure = '' [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/yaf3n443nlqc427bw3qd60ncy2rrmvya-facetimehd-0.6.8.1-5.15.151" Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 24 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 24 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 22 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 22 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 22 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 21 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 22 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 24 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 24 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 26 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 26 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 27 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 27 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 26 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 24 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 24 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 24 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 25 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 25 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 25 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 24 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 26 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 27 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 27 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 27 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 27 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 26 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 24 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 25 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 25 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 24 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 23 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 22 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 24 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 25 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 27 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 27 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
3 packages failed to build:
  • linuxKernel.packages.linux_4_19_hardened.facetimehd
  • linuxKernel.packages.linux_5_4_hardened.facetimehd
  • linuxKernel.packages.linux_lqx.facetimehd
18 packages built:
  • linuxKernel.packages.linux_4_19.facetimehd
  • linuxKernel.packages.linux_5_10.facetimehd
  • linuxKernel.packages.linux_5_10_hardened.facetimehd
  • linuxKernel.packages.linux_5_15.facetimehd
  • linuxKernel.packages.linux_5_15_hardened.facetimehd
  • linuxKernel.packages.linux_5_4.facetimehd
  • linuxKernel.packages.linux_6_1.facetimehd
  • linuxKernel.packages.linux_6_1_hardened.facetimehd
  • linuxKernel.packages.linux_6_6.facetimehd
  • linuxKernel.packages.linux_hardened.facetimehd (linuxKernel.packages.linux_6_6_hardened.facetimehd)
  • linuxKernel.packages.linux_6_7.facetimehd
  • linuxKernel.packages.linux_6_7_hardened.facetimehd
  • linuxKernel.packages.linux_6_8.facetimehd
  • linuxKernel.packages.linux_latest_libre.facetimehd
  • linuxKernel.packages.linux_libre.facetimehd
  • linuxKernel.packages.linux_xanmod.facetimehd
  • linuxKernel.packages.linux_xanmod_latest.facetimehd (linuxKernel.packages.linux_xanmod_stable.facetimehd)
  • linuxKernel.packages.linux_zen.facetimehd
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/patjak/facetimehd/releases. meta.description for linuxKernel.packages.linux_5_15_hardened.facetimehd is: Linux driver for the Facetime HD (Broadcom 1570) PCIe webcam meta.homepage for linuxKernel.packages.linux_5_15_hardened.facetimehd is: https://github.com/patjak/bcwc_pcie ###### Updates performed - Version update ###### To inspect upstream changes - [Release on GitHub](https://github.com/patjak/facetimehd/releases/tag/0.6.8.1) - [Compare changes on GitHub](https://github.com/patjak/facetimehd/compare/0.6.8...0.6.8.1) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.6.8.1 in filename of file in /nix/store/yaf3n443nlqc427bw3qd60ncy2rrmvya-facetimehd-0.6.8.1-5.15.151 ---
Rebuild report (if merged into master) (click to expand) ``` 40 total rebuild path(s) 40 package rebuild(s) First fifty rebuilds by attrpath linuxKernel.packages.linux_4_19.facetimehd linuxKernel.packages.linux_4_19_hardened.facetimehd linuxKernel.packages.linux_5_10.facetimehd linuxKernel.packages.linux_5_10_hardened.facetimehd linuxKernel.packages.linux_5_15.facetimehd linuxKernel.packages.linux_5_15_hardened.facetimehd linuxKernel.packages.linux_5_4.facetimehd linuxKernel.packages.linux_5_4_hardened.facetimehd linuxKernel.packages.linux_6_1.facetimehd linuxKernel.packages.linux_6_1_hardened.facetimehd linuxKernel.packages.linux_6_6.facetimehd linuxKernel.packages.linux_6_6_hardened.facetimehd linuxKernel.packages.linux_6_7.facetimehd linuxKernel.packages.linux_6_7_hardened.facetimehd linuxKernel.packages.linux_6_8.facetimehd linuxKernel.packages.linux_hardened.facetimehd linuxKernel.packages.linux_latest_libre.facetimehd linuxKernel.packages.linux_libre.facetimehd linuxKernel.packages.linux_lqx.facetimehd linuxKernel.packages.linux_xanmod.facetimehd linuxKernel.packages.linux_xanmod_latest.facetimehd linuxKernel.packages.linux_xanmod_stable.facetimehd linuxKernel.packages.linux_zen.facetimehd linuxPackages-libre.facetimehd linuxPackages.facetimehd linuxPackages_4_19_hardened.facetimehd linuxPackages_5_10_hardened.facetimehd linuxPackages_5_15_hardened.facetimehd linuxPackages_5_4_hardened.facetimehd linuxPackages_6_1_hardened.facetimehd linuxPackages_6_6_hardened.facetimehd linuxPackages_6_7_hardened.facetimehd linuxPackages_hardened.facetimehd linuxPackages_latest-libre.facetimehd linuxPackages_latest.facetimehd linuxPackages_lqx.facetimehd linuxPackages_xanmod.facetimehd linuxPackages_xanmod_latest.facetimehd linuxPackages_xanmod_stable.facetimehd linuxPackages_zen.facetimehd ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/yaf3n443nlqc427bw3qd60ncy2rrmvya-facetimehd-0.6.8.1-5.15.151 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A linuxKernel.packages.linux_5_15_hardened.facetimehd https://github.com/r-ryantm/nixpkgs/archive/098611b9c1d9bf53e5dc029e63875c377b462f91.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/098611b9c1d9bf53e5dc029e63875c377b462f91#linuxKernel.packages.linux_5_15_hardened.facetimehd ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/yaf3n443nlqc427bw3qd60ncy2rrmvya-facetimehd-0.6.8.1-5.15.151 ls -la /nix/store/yaf3n443nlqc427bw3qd60ncy2rrmvya-facetimehd-0.6.8.1-5.15.151/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
3 packages failed to build:
  • linuxKernel.packages.linux_4_19_hardened.facetimehd
  • linuxKernel.packages.linux_5_4_hardened.facetimehd
  • linuxKernel.packages.linux_lqx.facetimehd
18 packages built:
  • linuxKernel.packages.linux_4_19.facetimehd
  • linuxKernel.packages.linux_5_10.facetimehd
  • linuxKernel.packages.linux_5_10_hardened.facetimehd
  • linuxKernel.packages.linux_5_15.facetimehd
  • linuxKernel.packages.linux_5_15_hardened.facetimehd
  • linuxKernel.packages.linux_5_4.facetimehd
  • linuxKernel.packages.linux_6_1.facetimehd
  • linuxKernel.packages.linux_6_1_hardened.facetimehd
  • linuxKernel.packages.linux_6_6.facetimehd
  • linuxKernel.packages.linux_hardened.facetimehd (linuxKernel.packages.linux_6_6_hardened.facetimehd)
  • linuxKernel.packages.linux_6_7.facetimehd
  • linuxKernel.packages.linux_6_7_hardened.facetimehd
  • linuxKernel.packages.linux_6_8.facetimehd
  • linuxKernel.packages.linux_latest_libre.facetimehd
  • linuxKernel.packages.linux_libre.facetimehd
  • linuxKernel.packages.linux_xanmod.facetimehd
  • linuxKernel.packages.linux_xanmod_latest.facetimehd (linuxKernel.packages.linux_xanmod_stable.facetimehd)
  • linuxKernel.packages.linux_zen.facetimehd
--- ###### Maintainer pings cc @womfoo @grahamc @kraem for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301344 [result] Success updating linuxKernel.packages.linux_5_15_hardened.facetimehd 0.6.8 -> 0.6.8.1 https://github.com/patjak/facetimehd/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath linuxKernel.packages.linux_xanmod_stable.facetimehd, using log file: /var/log/nixpkgs-update/linuxKernel.packages.linux_xanmod_stable.facetimehd/2024-04-03.log linuxKernel.packages.linux_xanmod_stable.facetimehd 0.6.8 -> 0.6.8.1 https://github.com/patjak/facetimehd/releases attrpath: linuxKernel.packages.linux_xanmod_stable.facetimehd Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/os-specific/linux/facetimehd/default.nix b/pkgs/os-specific/linux/facetimehd/default.nix index 30d232f6eb88..ceba075758a6 100644 --- a/pkgs/os-specific/linux/facetimehd/default.nix +++ b/pkgs/os-specific/linux/facetimehd/default.nix @@ -2,7 +2,7 @@ stdenv.mkDerivation rec { name = "facetimehd-${version}-${kernel.version}"; - version = "0.6.8"; + version = "0.6.8.1"; # Note: When updating this revision: # 1. Also update pkgs/os-specific/linux/firmware/facetimehd-firmware/ @@ -18,7 +18,7 @@ stdenv.mkDerivation rec { owner = "patjak"; repo = "facetimehd"; rev = version; - sha256 = "sha256-Tze85Hx1YmStAKenmF/S1JuMDq5eVjBcs3LSWXjyE7w="; + sha256 = "sha256-h5Erga2hlDIWdDKQbkmkLY1aNCibFM7SVSnxVcoToaM="; }; preConfigure = '' [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/5xl2yn6z2dcyqa6ack5hg5j06p22jrl7-facetimehd-0.6.8.1-6.7.11" Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 27 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 27 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 26 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 26 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 26 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 26 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 29 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 30 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 31 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 32 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 31 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 30 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 30 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 31 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 30 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 29 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 30 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 29 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 29 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 30 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 31 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 30 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 31 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 31 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 30 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 30 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 31 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 34 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 35 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 34 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 34 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 34 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 34 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 34 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 38 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 38 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 37 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 37 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 40 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 39 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 37 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 38 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 36 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 35 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 34 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 34 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 36 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 36 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 35 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 35 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 35 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 35 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 35 [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
3 packages failed to build:
  • linuxKernel.packages.linux_4_19_hardened.facetimehd
  • linuxKernel.packages.linux_5_4_hardened.facetimehd
  • linuxKernel.packages.linux_lqx.facetimehd
18 packages built:
  • linuxKernel.packages.linux_4_19.facetimehd
  • linuxKernel.packages.linux_5_10.facetimehd
  • linuxKernel.packages.linux_5_10_hardened.facetimehd
  • linuxKernel.packages.linux_5_15.facetimehd
  • linuxKernel.packages.linux_5_15_hardened.facetimehd
  • linuxKernel.packages.linux_5_4.facetimehd
  • linuxKernel.packages.linux_6_1.facetimehd
  • linuxKernel.packages.linux_6_1_hardened.facetimehd
  • linuxKernel.packages.linux_6_6.facetimehd
  • linuxKernel.packages.linux_hardened.facetimehd (linuxKernel.packages.linux_6_6_hardened.facetimehd)
  • linuxKernel.packages.linux_6_7.facetimehd
  • linuxKernel.packages.linux_6_7_hardened.facetimehd
  • linuxKernel.packages.linux_6_8.facetimehd
  • linuxKernel.packages.linux_latest_libre.facetimehd
  • linuxKernel.packages.linux_libre.facetimehd
  • linuxKernel.packages.linux_xanmod.facetimehd
  • linuxKernel.packages.linux_xanmod_latest.facetimehd (linuxKernel.packages.linux_xanmod_stable.facetimehd)
  • linuxKernel.packages.linux_zen.facetimehd
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/patjak/facetimehd/releases. meta.description for linuxKernel.packages.linux_xanmod_stable.facetimehd is: Linux driver for the Facetime HD (Broadcom 1570) PCIe webcam meta.homepage for linuxKernel.packages.linux_xanmod_stable.facetimehd is: https://github.com/patjak/bcwc_pcie ###### Updates performed - Version update ###### To inspect upstream changes - [Release on GitHub](https://github.com/patjak/facetimehd/releases/tag/0.6.8.1) - [Compare changes on GitHub](https://github.com/patjak/facetimehd/compare/0.6.8...0.6.8.1) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.6.8.1 in filename of file in /nix/store/5xl2yn6z2dcyqa6ack5hg5j06p22jrl7-facetimehd-0.6.8.1-6.7.11 ---
Rebuild report (if merged into master) (click to expand) ``` 40 total rebuild path(s) 40 package rebuild(s) First fifty rebuilds by attrpath linuxKernel.packages.linux_4_19.facetimehd linuxKernel.packages.linux_4_19_hardened.facetimehd linuxKernel.packages.linux_5_10.facetimehd linuxKernel.packages.linux_5_10_hardened.facetimehd linuxKernel.packages.linux_5_15.facetimehd linuxKernel.packages.linux_5_15_hardened.facetimehd linuxKernel.packages.linux_5_4.facetimehd linuxKernel.packages.linux_5_4_hardened.facetimehd linuxKernel.packages.linux_6_1.facetimehd linuxKernel.packages.linux_6_1_hardened.facetimehd linuxKernel.packages.linux_6_6.facetimehd linuxKernel.packages.linux_6_6_hardened.facetimehd linuxKernel.packages.linux_6_7.facetimehd linuxKernel.packages.linux_6_7_hardened.facetimehd linuxKernel.packages.linux_6_8.facetimehd linuxKernel.packages.linux_hardened.facetimehd linuxKernel.packages.linux_latest_libre.facetimehd linuxKernel.packages.linux_libre.facetimehd linuxKernel.packages.linux_lqx.facetimehd linuxKernel.packages.linux_xanmod.facetimehd linuxKernel.packages.linux_xanmod_latest.facetimehd linuxKernel.packages.linux_xanmod_stable.facetimehd linuxKernel.packages.linux_zen.facetimehd linuxPackages-libre.facetimehd linuxPackages.facetimehd linuxPackages_4_19_hardened.facetimehd linuxPackages_5_10_hardened.facetimehd linuxPackages_5_15_hardened.facetimehd linuxPackages_5_4_hardened.facetimehd linuxPackages_6_1_hardened.facetimehd linuxPackages_6_6_hardened.facetimehd linuxPackages_6_7_hardened.facetimehd linuxPackages_hardened.facetimehd linuxPackages_latest-libre.facetimehd linuxPackages_latest.facetimehd linuxPackages_lqx.facetimehd linuxPackages_xanmod.facetimehd linuxPackages_xanmod_latest.facetimehd linuxPackages_xanmod_stable.facetimehd linuxPackages_zen.facetimehd ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/5xl2yn6z2dcyqa6ack5hg5j06p22jrl7-facetimehd-0.6.8.1-6.7.11 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A linuxKernel.packages.linux_xanmod_stable.facetimehd https://github.com/r-ryantm/nixpkgs/archive/57c6f5752430b6774e43ac5f6be422ac39974732.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/57c6f5752430b6774e43ac5f6be422ac39974732#linuxKernel.packages.linux_xanmod_stable.facetimehd ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/5xl2yn6z2dcyqa6ack5hg5j06p22jrl7-facetimehd-0.6.8.1-6.7.11 ls -la /nix/store/5xl2yn6z2dcyqa6ack5hg5j06p22jrl7-facetimehd-0.6.8.1-6.7.11/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
3 packages failed to build:
  • linuxKernel.packages.linux_4_19_hardened.facetimehd
  • linuxKernel.packages.linux_5_4_hardened.facetimehd
  • linuxKernel.packages.linux_lqx.facetimehd
18 packages built:
  • linuxKernel.packages.linux_4_19.facetimehd
  • linuxKernel.packages.linux_5_10.facetimehd
  • linuxKernel.packages.linux_5_10_hardened.facetimehd
  • linuxKernel.packages.linux_5_15.facetimehd
  • linuxKernel.packages.linux_5_15_hardened.facetimehd
  • linuxKernel.packages.linux_5_4.facetimehd
  • linuxKernel.packages.linux_6_1.facetimehd
  • linuxKernel.packages.linux_6_1_hardened.facetimehd
  • linuxKernel.packages.linux_6_6.facetimehd
  • linuxKernel.packages.linux_hardened.facetimehd (linuxKernel.packages.linux_6_6_hardened.facetimehd)
  • linuxKernel.packages.linux_6_7.facetimehd
  • linuxKernel.packages.linux_6_7_hardened.facetimehd
  • linuxKernel.packages.linux_6_8.facetimehd
  • linuxKernel.packages.linux_latest_libre.facetimehd
  • linuxKernel.packages.linux_libre.facetimehd
  • linuxKernel.packages.linux_xanmod.facetimehd
  • linuxKernel.packages.linux_xanmod_latest.facetimehd (linuxKernel.packages.linux_xanmod_stable.facetimehd)
  • linuxKernel.packages.linux_zen.facetimehd
--- ###### Maintainer pings cc @womfoo @grahamc @kraem for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/301360 [result] Success updating linuxKernel.packages.linux_xanmod_stable.facetimehd 0.6.8 -> 0.6.8.1 https://github.com/patjak/facetimehd/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath linuxKernel.packages.linux_4_19.facetimehd, using log file: /var/log/nixpkgs-update/linuxKernel.packages.linux_4_19.facetimehd/2024-04-03.log linuxKernel.packages.linux_4_19.facetimehd 0.6.8 -> 0.6.8.1 https://github.com/patjak/facetimehd/releases attrpath: linuxKernel.packages.linux_4_19.facetimehd Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/os-specific/linux/facetimehd/default.nix b/pkgs/os-specific/linux/facetimehd/default.nix index 30d232f6eb88..ceba075758a6 100644 --- a/pkgs/os-specific/linux/facetimehd/default.nix +++ b/pkgs/os-specific/linux/facetimehd/default.nix @@ -2,7 +2,7 @@ stdenv.mkDerivation rec { name = "facetimehd-${version}-${kernel.version}"; - version = "0.6.8"; + version = "0.6.8.1"; # Note: When updating this revision: # 1. Also update pkgs/os-specific/linux/firmware/facetimehd-firmware/ @@ -18,7 +18,7 @@ stdenv.mkDerivation rec { owner = "patjak"; repo = "facetimehd"; rev = version; - sha256 = "sha256-Tze85Hx1YmStAKenmF/S1JuMDq5eVjBcs3LSWXjyE7w="; + sha256 = "sha256-h5Erga2hlDIWdDKQbkmkLY1aNCibFM7SVSnxVcoToaM="; }; preConfigure = '' [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/6y80nn46i2hgyiyw6kk6xc0hv4046q3l-facetimehd-0.6.8.1-4.19.311" Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 29 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 27 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 27 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 27 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 26 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 26 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 26 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 25 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 25 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 25 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 25 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 25 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 26 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 28 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 31 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 31 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 32 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 32 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 32 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 32 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 32 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 31 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 31 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 31 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 30 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 30 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath linuxKernel.packages.linux_6_1.facetimehd, using log file: /var/log/nixpkgs-update/linuxKernel.packages.linux_6_1.facetimehd/2024-04-03.log linuxKernel.packages.linux_6_1.facetimehd 0.6.8 -> 0.6.8.1 https://github.com/patjak/facetimehd/releases attrpath: linuxKernel.packages.linux_6_1.facetimehd Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/os-specific/linux/facetimehd/default.nix b/pkgs/os-specific/linux/facetimehd/default.nix index 30d232f6eb88..ceba075758a6 100644 --- a/pkgs/os-specific/linux/facetimehd/default.nix +++ b/pkgs/os-specific/linux/facetimehd/default.nix @@ -2,7 +2,7 @@ stdenv.mkDerivation rec { name = "facetimehd-${version}-${kernel.version}"; - version = "0.6.8"; + version = "0.6.8.1"; # Note: When updating this revision: # 1. Also update pkgs/os-specific/linux/firmware/facetimehd-firmware/ @@ -18,7 +18,7 @@ stdenv.mkDerivation rec { owner = "patjak"; repo = "facetimehd"; rev = version; - sha256 = "sha256-Tze85Hx1YmStAKenmF/S1JuMDq5eVjBcs3LSWXjyE7w="; + sha256 = "sha256-h5Erga2hlDIWdDKQbkmkLY1aNCibFM7SVSnxVcoToaM="; }; preConfigure = '' [outpaths] eval start