No auto update branch exists Old version 2.0.12" not present in staging derivation file with contents: { lib , brotli , buildPythonPackage , certifi , dpkt , fetchFromGitHub , gevent , llhttp , pytestCheckHook , pythonOlder , setuptools , six , stdenv , urllib3 }: buildPythonPackage rec { pname = "geventhttpclient"; version = "2.3.1"; pyproject = true; disabled = pythonOlder "3.6"; src = fetchFromGitHub { owner = "geventhttpclient"; repo = "geventhttpclient"; rev = "refs/tags/${version}"; # TODO: unvendor llhttp fetchSubmodules = true; hash = "sha256-uOGnwPbvTam14SFTUT0UrwxHfP4a5cn3a7EhLoGBUrA="; }; build-system = [ setuptools ]; dependencies = [ brotli certifi gevent urllib3 ]; nativeCheckInputs = [ dpkt pytestCheckHook ]; # lots of: [Errno 48] Address already in use: ('127.0.0.1', 54323) doCheck = !stdenv.isDarwin; __darwinAllowLocalNetworking = true; preCheck = '' rm -rf geventhttpclient ''; pytestFlagsArray = [ "-m 'not network'" ]; pythonImportsCheck = [ "geventhttpclient" ]; meta = with lib; { homepage = "https://github.com/geventhttpclient/geventhttpclient"; description = "High performance, concurrent HTTP client library using gevent"; changelog = "https://github.com/geventhttpclient/geventhttpclient/releases/tag/${version}"; license = licenses.mit; maintainers = with maintainers; [ koral ]; }; } [result] Failed to update python311Packages.geventhttpclient 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath phel, using log file: /var/log/nixpkgs-update/phel/2024-04-29.log phel 0.12.0 -> 0.13.0 https://github.com/phel-lang/phel-lang/releases attrpath: phel Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update phel 0.12.0 -> 0.13.0 https://github.com/phel-lang/phel-lang/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.repoze-who, using log file: /var/log/nixpkgs-update/python311Packages.repoze-who/2024-04-29.log python311Packages.repoze-who 0 -> 1 attrpath: python311Packages.repoze-who Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-repoze-who-3.0.0 Press Enter key to continue... Running update for: - python3.11-repoze-who-3.0.0: UPDATING ... - python3.11-repoze-who-3.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.repoze-who 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.should-dsl, using log file: /var/log/nixpkgs-update/python311Packages.should-dsl/2024-04-29.log python311Packages.should-dsl 0 -> 1 attrpath: python311Packages.should-dsl Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-should-dsl-2.1.2 Press Enter key to continue... Running update for: - python3.11-should-dsl-2.1.2: UPDATING ... - python3.11-should-dsl-2.1.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.should-dsl 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath switcheroo-control, using log file: /var/log/nixpkgs-update/switcheroo-control/2024-04-29.log switcheroo-control 0 -> 1 attrpath: switcheroo-control Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - switcheroo-control-2.6 Press Enter key to continue... Running update for: - switcheroo-control-2.6: UPDATING ... - switcheroo-control-2.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update switcheroo-control 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.jsonlines, using log file: /var/log/nixpkgs-update/python311Packages.jsonlines/2024-04-29.log python311Packages.jsonlines 0 -> 1 attrpath: python311Packages.jsonlines Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-jsonlines-3.1.0 Press Enter key to continue... Running update for: - python3.11-jsonlines-3.1.0: UPDATING ... - python3.11-jsonlines-3.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.jsonlines 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.charset-normalizer, using log file: /var/log/nixpkgs-update/python311Packages.charset-normalizer/2024-04-29.log python311Packages.charset-normalizer 0 -> 1 attrpath: python311Packages.charset-normalizer Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-charset-normalizer-3.3.2 Press Enter key to continue... Running update for: - python3.11-charset-normalizer-3.3.2: UPDATING ... - python3.11-charset-normalizer-3.3.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.charset-normalizer 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath jibri, using log file: /var/log/nixpkgs-update/jibri/2024-04-29.log jibri 0 -> 1 attrpath: jibri Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - jibri-8.0-169-g1258814 Press Enter key to continue... Running update for: - jibri-8.0-169-g1258814: UPDATING ... - jibri-8.0-169-g1258814: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update jibri 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath nwipe, using log file: /var/log/nixpkgs-update/nwipe/2024-04-29.log nwipe 0.34 -> 0.36 https://github.com/martijnvanbrummelen/nwipe/releases attrpath: nwipe Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/tools/security/nwipe/default.nix b/pkgs/tools/security/nwipe/default.nix index 00c66f351930..3c0bb1d16baa 100644 --- a/pkgs/tools/security/nwipe/default.nix +++ b/pkgs/tools/security/nwipe/default.nix @@ -9,13 +9,13 @@ stdenv.mkDerivation rec { pname = "nwipe"; - version = "0.34"; + version = "0.36"; src = fetchFromGitHub { owner = "martijnvanbrummelen"; repo = "nwipe"; rev = "v${version}"; - sha256 = "sha256-7WI8AwWkg9rOjAbOyDgCVOpeMxvJ5Bd1yvzfSv6TPLs="; + sha256 = "sha256-sIH6jEI5DVT3ohz+X8eZQq/TCwVgKW62IWrTsafivxw="; }; nativeBuildInputs = [ [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A nwipe nix build failed. config.status: creating Makefile config.status: creating src/Makefile config.status: creating man/Makefile checking for gcc... gcc checking whether the C compiler works... yes checking for C compiler default output file name... a.out checking for suffix of executables... checking whether we are cross compiling... no checking for suffix of object files... o checking whether the compiler supports GNU C... yes checking whether gcc accepts -g... yes checking for gcc option to enable C11 features... none needed checking whether gcc understands -c and -o together... yes checking whether make supports the include directive... yes (GNU style) checking dependency style of gcc... none checking pkg-config is at least version 0.9.0... yes checking for stdio.h... yes checking for stdlib.h... yes checking for string.h... yes checking for inttypes.h... yes checking for stdint.h... yes checking for strings.h... yes checking for sys/stat.h... yes checking for sys/types.h... yes checking for unistd.h... yes checking for panel... yes checking for ncurses... yes checking for libconfig... no checking for main in -llibconfig... no configure: error: libconfig library not found [result] Failed to update nwipe 0.34 -> 0.36 https://github.com/martijnvanbrummelen/nwipe/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath i3minator, using log file: /var/log/nixpkgs-update/i3minator/2024-04-29.log i3minator 0 -> 1 attrpath: i3minator Checking auto update branch... [outpaths] eval start [outpaths] eval end [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - i3minator-0.0.4 Press Enter key to continue... Running update for: - i3minator-0.0.4: UPDATING ... - i3minator-0.0.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update i3minator 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.kornia-rs, using log file: /var/log/nixpkgs-update/python311Packages.kornia-rs/2024-04-29.log python311Packages.kornia-rs 0 -> 1 attrpath: python311Packages.kornia-rs Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/pdd4amha0snjsxz991gg8ab54h2n2dgj-packages.json.drv building '/nix/store/pdd4amha0snjsxz991gg8ab54h2n2dgj-packages.json.drv'... Going to be running update for following packages: - python3.11-kornia-rs-0.1.2 Press Enter key to continue... Running update for: - python3.11-kornia-rs-0.1.2: UPDATING ... - python3.11-kornia-rs-0.1.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.kornia-rs 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.kasa-crypt, using log file: /var/log/nixpkgs-update/python311Packages.kasa-crypt/2024-04-29.log python311Packages.kasa-crypt 0 -> 1 attrpath: python311Packages.kasa-crypt Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-kasa-crypt-0.4.1 Press Enter key to continue... Running update for: - python3.11-kasa-crypt-0.4.1: UPDATING ... - python3.11-kasa-crypt-0.4.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.kasa-crypt 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.delorean, using log file: /var/log/nixpkgs-update/python311Packages.delorean/2024-04-29.log python311Packages.delorean 0 -> 1 attrpath: python311Packages.delorean Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-delorean-1.0.0 Press Enter key to continue... Running update for: - python3.11-delorean-1.0.0: UPDATING ... - python3.11-delorean-1.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.delorean 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath darwin.xattr, using log file: /var/log/nixpkgs-update/darwin.xattr/2024-04-29.log darwin.xattr 0 -> 1 attrpath: darwin.xattr Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-xattr-61.60.1 Press Enter key to continue... Running update for: - python3.11-xattr-61.60.1: UPDATING ... - python3.11-xattr-61.60.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update darwin.xattr 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath terraform-compliance, using log file: /var/log/nixpkgs-update/terraform-compliance/2024-04-29.log terraform-compliance 0 -> 1 attrpath: terraform-compliance Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/v7q1nwgckf2f0wa6dcfjd0srzg3d7q6b-packages.json.drv building '/nix/store/v7q1nwgckf2f0wa6dcfjd0srzg3d7q6b-packages.json.drv'... Going to be running update for following packages: - terraform-compliance-1.3.48 Press Enter key to continue... Running update for: - terraform-compliance-1.3.48: UPDATING ... - terraform-compliance-1.3.48: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update terraform-compliance 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyflexit, using log file: /var/log/nixpkgs-update/python311Packages.pyflexit/2024-04-29.log python311Packages.pyflexit 0 -> 1 attrpath: python311Packages.pyflexit Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pyflexit-0.3 Press Enter key to continue... Running update for: - python3.11-pyflexit-0.3: UPDATING ... - python3.11-pyflexit-0.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyflexit 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath yaralyzer, using log file: /var/log/nixpkgs-update/yaralyzer/2024-04-29.log yaralyzer 0 -> 1 attrpath: yaralyzer Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - yaralyzer-0.9.3 Press Enter key to continue... Running update for: - yaralyzer-0.9.3: UPDATING ... - yaralyzer-0.9.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update yaralyzer 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.gerbonara, using log file: /var/log/nixpkgs-update/python311Packages.gerbonara/2024-04-29.log python311Packages.gerbonara 0 -> 1 attrpath: python311Packages.gerbonara Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-gerbonara-1.2.0 Press Enter key to continue... Running update for: - python3.11-gerbonara-1.2.0: UPDATING ... - python3.11-gerbonara-1.2.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.gerbonara 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath argparse-manpage, using log file: /var/log/nixpkgs-update/argparse-manpage/2024-04-29.log argparse-manpage 0 -> 1 attrpath: argparse-manpage Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - argparse-manpage-4.5 Press Enter key to continue... Running update for: - argparse-manpage-4.5: UPDATING ... - argparse-manpage-4.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update argparse-manpage 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath go-thumbnailer, using log file: /var/log/nixpkgs-update/go-thumbnailer/2024-04-29.log go-thumbnailer 0 -> 1 attrpath: go-thumbnailer Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] skipping because derivation has updateScript [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - thud-0.3.1 Press Enter key to continue... Running update for: - thud-0.3.1: UPDATING ... - thud-0.3.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update go-thumbnailer 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lxqt.pavucontrol-qt, using log file: /var/log/nixpkgs-update/lxqt.pavucontrol-qt/2024-04-29.log lxqt.pavucontrol-qt 0 -> 1 attrpath: lxqt.pavucontrol-qt Packages for lxqt are currently skipped. [result] Failed to update lxqt.pavucontrol-qt 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.inotify-simple, using log file: /var/log/nixpkgs-update/python311Packages.inotify-simple/2024-04-29.log python311Packages.inotify-simple 0 -> 1 attrpath: python311Packages.inotify-simple Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-inotify-simple-1.3.5 Press Enter key to continue... Running update for: - python3.11-inotify-simple-1.3.5: UPDATING ... - python3.11-inotify-simple-1.3.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.inotify-simple 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath terraform-providers.aviatrix, using log file: /var/log/nixpkgs-update/terraform-providers.aviatrix/2024-04-29.log terraform-providers.aviatrix 0 -> 1 attrpath: terraform-providers.aviatrix Checking auto update branch... Derivation file opts-out of auto-updates [result] Failed to update terraform-providers.aviatrix 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pysubs2, using log file: /var/log/nixpkgs-update/python311Packages.pysubs2/2024-04-29.log python311Packages.pysubs2 0 -> 1 attrpath: python311Packages.pysubs2 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pysubs2-1.6.1 Press Enter key to continue... Running update for: - python3.11-pysubs2-1.6.1: UPDATING ... - python3.11-pysubs2-1.6.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pysubs2 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.life360, using log file: /var/log/nixpkgs-update/python311Packages.life360/2024-04-29.log python311Packages.life360 0 -> 1 attrpath: python311Packages.life360 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-life360-6.0.1 Press Enter key to continue... Running update for: - python3.11-life360-6.0.1: UPDATING ... - python3.11-life360-6.0.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.life360 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath qmenumodel, using log file: /var/log/nixpkgs-update/qmenumodel/2024-04-29.log qmenumodel 0 -> 1 attrpath: qmenumodel Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - qmenumodel-0.9.2 Press Enter key to continue... Running update for: - qmenumodel-0.9.2: UPDATING ... - qmenumodel-0.9.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update qmenumodel 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.ijson, using log file: /var/log/nixpkgs-update/python311Packages.ijson/2024-04-29.log python311Packages.ijson 0 -> 1 attrpath: python311Packages.ijson Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-ijson-3.2.3 Press Enter key to continue... Running update for: - python3.11-ijson-3.2.3: UPDATING ... - python3.11-ijson-3.2.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.ijson 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pypck, using log file: /var/log/nixpkgs-update/python311Packages.pypck/2024-04-29.log python311Packages.pypck 0 -> 1 attrpath: python311Packages.pypck Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pypck-0.7.19 Press Enter key to continue... Running update for: - python3.11-pypck-0.7.19: UPDATING ... - python3.11-pypck-0.7.19: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pypck 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO https://github.com/NixOS/nixpkgs/pull/47024#issuecomment-423300633 [result] Failed to update meson 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.ionoscloud, using log file: /var/log/nixpkgs-update/python311Packages.ionoscloud/2024-04-29.log python311Packages.ionoscloud 0 -> 1 attrpath: python311Packages.ionoscloud Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-ionoscloud-6.1.9 Press Enter key to continue... Running update for: - python3.11-ionoscloud-6.1.9: UPDATING ... - python3.11-ionoscloud-6.1.9: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.ionoscloud 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath scudcloud, using log file: /var/log/nixpkgs-update/scudcloud/2024-04-29.log scudcloud 0 -> 1 attrpath: scudcloud Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-scudcloud-1.65 Press Enter key to continue... Running update for: - python3.11-scudcloud-1.65: UPDATING ... - python3.11-scudcloud-1.65: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update scudcloud 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath tracefilesim, using log file: /var/log/nixpkgs-update/tracefilesim/2024-04-29.log tracefilesim unstable-2015-11-07 -> 5.0.0 https://github.com/GarCoSim/TraceFileSim/releases attrpath: tracefilesim Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/tools/analysis/garcosim/tracefilesim/default.nix b/pkgs/development/tools/analysis/garcosim/tracefilesim/default.nix index cd1682a1f5e7..b895588f5611 100644 --- a/pkgs/development/tools/analysis/garcosim/tracefilesim/default.nix +++ b/pkgs/development/tools/analysis/garcosim/tracefilesim/default.nix @@ -3,13 +3,13 @@ stdenv.mkDerivation { pname = "tracefilesim"; - version = "unstable-2015-11-07"; + version = "5.0.0"; src = fetchFromGitHub { owner = "GarCoSim"; repo = "TraceFileSim"; rev = "368aa6b1d6560e7ecbd16fca47000c8f528f3da2"; - sha256 = "156m92k38ap4bzidbr8dzl065rni8lrib71ih88myk9z5y1x5nxm"; + sha256 = "sha256-tdvSgy8/TV8RgjGcFTNF0eZiAP0N5dXiX+QqNKZI1ZQ="; }; hardeningDisable = [ "fortify" ]; Source url did not change. [result] Failed to update tracefilesim unstable-2015-11-07 -> 5.0.0 https://github.com/GarCoSim/TraceFileSim/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.qdarkstyle, using log file: /var/log/nixpkgs-update/python311Packages.qdarkstyle/2024-04-29.log python311Packages.qdarkstyle 0 -> 1 attrpath: python311Packages.qdarkstyle Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-qdarkstyle-3.2.3 Press Enter key to continue... Running update for: - python3.11-qdarkstyle-3.2.3: UPDATING ... - python3.11-qdarkstyle-3.2.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.qdarkstyle 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.glcontext, using log file: /var/log/nixpkgs-update/python311Packages.glcontext/2024-04-29.log python311Packages.glcontext 0 -> 1 attrpath: python311Packages.glcontext Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-glcontext-2.5.0 Press Enter key to continue... Running update for: - python3.11-glcontext-2.5.0: UPDATING ... - python3.11-glcontext-2.5.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.glcontext 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pymdown-extensions, using log file: /var/log/nixpkgs-update/python311Packages.pymdown-extensions/2024-04-29.log python311Packages.pymdown-extensions 0 -> 1 attrpath: python311Packages.pymdown-extensions Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pymdown-extensions-10.7.1 Press Enter key to continue... Running update for: - python3.11-pymdown-extensions-10.7.1: UPDATING ... - python3.11-pymdown-extensions-10.7.1: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/pymdown-extensions/default.nix b/pkgs/development/python-modules/pymdown-extensions/default.nix index d760b9cd0dd4..eef3d6ba97bf 100644 --- a/pkgs/development/python-modules/pymdown-extensions/default.nix +++ b/pkgs/development/python-modules/pymdown-extensions/default.nix @@ -44,14 +44,14 @@ let in buildPythonPackage rec { pname = "pymdown-extensions"; - version = "10.7.1"; + version = "10.8.1"; format = "pyproject"; src = fetchFromGitHub { owner = "facelessuser"; repo = "pymdown-extensions"; rev = "refs/tags/${version}"; - hash = "sha256-P2MkGD0B9mn34ia3Kd4MQej1XryNVXWVMF4JHaPTS0M="; + hash = "sha256-No0RDBgr40xSOiKXQRLRZnMdV+5i4eM8Jwp7c2Jw/ZY="; }; nativeBuildInputs = [ hatchling ]; No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A python311Packages.pymdown-extensions nix build failed. Sourcing python-namespaces-hook Sourcing python-catch-conflicts-hook.sh Sourcing pytest-check-hook Using pytestCheckPhase @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/79x2q2nwpjiglsqc7r0d2a8k302pka6n-source source root is source setting SOURCE_DATE_EPOCH to timestamp 315619200 of file source/tools/pymdownx_md_render.py @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase @nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" } Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "configurePhase" } Running phase: configurePhase no configure script, doing nothing @nix { "action": "setPhase", "phase": "buildPhase" } Running phase: buildPhase Executing pypaBuildPhase Creating a wheel... * Getting build dependencies for wheel... * Building wheel... Successfully built pymdown_extensions-10.8.1-py3-none-any.whl Finished creating a wheel... Finished executing pypaBuildPhase @nix { "action": "setPhase", "phase": "pythonRuntimeDepsCheckHook" } Running phase: pythonRuntimeDepsCheckHook Executing pythonRuntimeDepsCheck Checking runtime dependencies for pymdown_extensions-10.8.1-py3-none-any.whl - markdown>=3.6 not satisfied by version 3.5.2 [result] Failed to update python311Packages.pymdown-extensions 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath zafiro-icons, using log file: /var/log/nixpkgs-update/zafiro-icons/2024-04-29.log zafiro-icons 0 -> 1 attrpath: zafiro-icons Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - zafiro-icons-1.3 Press Enter key to continue... Running update for: - zafiro-icons-1.3: UPDATING ... - zafiro-icons-1.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update zafiro-icons 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath n8n, using log file: /var/log/nixpkgs-update/n8n/2024-04-29.log n8n 0 -> 1 attrpath: n8n Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Failed with exit code 124 updateScript for n8n took longer than 10m and timed out. Other output: Going to be running update for following packages: - n8n-1.9.3 Press Enter key to continue... Running update for: - n8n-1.9.3: UPDATING ... [result] Failed to update n8n 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.proxmoxer, using log file: /var/log/nixpkgs-update/python311Packages.proxmoxer/2024-04-29.log python311Packages.proxmoxer 0 -> 1 attrpath: python311Packages.proxmoxer Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-proxmoxer-2.0.1 Press Enter key to continue... Running update for: - python3.11-proxmoxer-2.0.1: UPDATING ... - python3.11-proxmoxer-2.0.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.proxmoxer 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.grpcio-channelz, using log file: /var/log/nixpkgs-update/python311Packages.grpcio-channelz/2024-04-29.log python311Packages.grpcio-channelz 0 -> 1 attrpath: python311Packages.grpcio-channelz Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-grpcio-channelz-1.62.1 Press Enter key to continue... Running update for: - python3.11-grpcio-channelz-1.62.1: UPDATING ... - python3.11-grpcio-channelz-1.62.1: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/grpcio-channelz/default.nix b/pkgs/development/python-modules/grpcio-channelz/default.nix index ba66ffe4e344..d4af46832018 100644 --- a/pkgs/development/python-modules/grpcio-channelz/default.nix +++ b/pkgs/development/python-modules/grpcio-channelz/default.nix @@ -8,12 +8,12 @@ buildPythonPackage rec { pname = "grpcio-channelz"; - version = "1.62.1"; + version = "1.62.2"; format = "setuptools"; src = fetchPypi { inherit pname version; - hash = "sha256-e+8XBt/tt4lNbgNGemBjrBCxUAR7aWXi+0gU1MKmQkU="; + hash = "sha256-bkrCxD12skXF9m2Y9SPbCHhrGGEoplXubyCjCn5o5Pk="; }; nativeBuildInputs = [ No auto update branch exists Old version 1.62.1" not present in staging derivation file with contents: { lib , buildPythonPackage , pythonRelaxDepsHook , fetchPypi , grpcio , protobuf }: buildPythonPackage rec { pname = "grpcio-channelz"; version = "1.62.2"; format = "setuptools"; src = fetchPypi { inherit pname version; hash = "sha256-bkrCxD12skXF9m2Y9SPbCHhrGGEoplXubyCjCn5o5Pk="; }; nativeBuildInputs = [ pythonRelaxDepsHook ]; pythonRelaxDeps = [ "grpcio" ]; propagatedBuildInputs = [ grpcio protobuf ]; pythonImportsCheck = [ "grpc_channelz" ]; # no tests doCheck = false; meta = with lib; { description = "Channel Level Live Debug Information Service for gRPC"; homepage = "https://pypi.org/project/grpcio-channelz"; license = with licenses; [ asl20 ]; maintainers = with maintainers; [ happysalada ]; }; } [result] Failed to update python311Packages.grpcio-channelz 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.tika-client, using log file: /var/log/nixpkgs-update/python311Packages.tika-client/2024-04-29.log python311Packages.tika-client 0 -> 1 attrpath: python311Packages.tika-client Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-tika-client-0.5.0 Press Enter key to continue... Running update for: - python3.11-tika-client-0.5.0: UPDATING ... - python3.11-tika-client-0.5.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.tika-client 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.google-cloud-videointelligence, using log file: /var/log/nixpkgs-update/python311Packages.google-cloud-videointelligence/2024-04-29.log python311Packages.google-cloud-videointelligence 0 -> 1 attrpath: python311Packages.google-cloud-videointelligence Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-google-cloud-videointelligence-2.13.3 Press Enter key to continue... Running update for: - python3.11-google-cloud-videointelligence-2.13.3: UPDATING ... - python3.11-google-cloud-videointelligence-2.13.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.google-cloud-videointelligence 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO gstreamer plugins are kept in lockstep. [result] Failed to update gst_all_1.gst-plugins-rs 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.starkbank-ecdsa, using log file: /var/log/nixpkgs-update/python311Packages.starkbank-ecdsa/2024-04-29.log python311Packages.starkbank-ecdsa 0 -> 1 attrpath: python311Packages.starkbank-ecdsa Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-starkbank-ecdsa-2.2.0 Press Enter key to continue... Running update for: - python3.11-starkbank-ecdsa-2.2.0: UPDATING ... - python3.11-starkbank-ecdsa-2.2.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.starkbank-ecdsa 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyskyqremote, using log file: /var/log/nixpkgs-update/python311Packages.pyskyqremote/2024-04-29.log python311Packages.pyskyqremote 0 -> 1 attrpath: python311Packages.pyskyqremote Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pyskyqremote-0.3.26 Press Enter key to continue... Running update for: - python3.11-pyskyqremote-0.3.26: UPDATING ... - python3.11-pyskyqremote-0.3.26: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyskyqremote 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath glfw-wayland-minecraft, using log file: /var/log/nixpkgs-update/glfw-wayland-minecraft/2024-04-29.log glfw-wayland-minecraft unstable-2023-06-01 -> 3.4 https://github.com/glfw/GLFW/releases attrpath: glfw-wayland-minecraft Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update glfw-wayland-minecraft unstable-2023-06-01 -> 3.4 https://github.com/glfw/GLFW/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath undervolt, using log file: /var/log/nixpkgs-update/undervolt/2024-04-29.log undervolt 0 -> 1 attrpath: undervolt Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - undervolt-0.4.0 Press Enter key to continue... Running update for: - undervolt-0.4.0: UPDATING ... - undervolt-0.4.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update undervolt 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath buck2, using log file: /var/log/nixpkgs-update/buck2/2024-04-29.log buck2 0 -> 1 attrpath: buck2 Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - buck2-unstable-2024-03-15 Press Enter key to continue... Running update for: - buck2-unstable-2024-03-15: UPDATING ... - buck2-unstable-2024-03-15: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/tools/build-managers/buck2/default.nix b/pkgs/development/tools/build-managers/buck2/default.nix index 3aad79ce1e58..7cf6a5173f4a 100644 --- a/pkgs/development/tools/build-managers/buck2/default.nix +++ b/pkgs/development/tools/build-managers/buck2/default.nix @@ -38,7 +38,7 @@ let buildHashes = builtins.fromJSON (builtins.readFile ./hashes.json); # our version of buck2; this should be a git tag - version = "2024-03-15"; + version = "2024-04-15"; # the platform-specific, statically linked binary — which is also # zstd-compressed @@ -63,7 +63,7 @@ let # tooling prelude-src = let - prelude-hash = "c68a0e4b35928891e72df1738c890bfcb76a6174"; + prelude-hash = "36321f97fc20b57efb5864606d61f4568e42a7fd"; name = "buck2-prelude-${version}.tar.gz"; hash = buildHashes."_prelude"; url = "https://github.com/facebook/buck2-prelude/archive/${prelude-hash}.tar.gz"; diff --git a/pkgs/development/tools/build-managers/buck2/hashes.json b/pkgs/development/tools/build-managers/buck2/hashes.json index 280228e6f4e8..e0ec6a159863 100644 --- a/pkgs/development/tools/build-managers/buck2/hashes.json +++ b/pkgs/development/tools/build-managers/buck2/hashes.json @@ -1,7 +1,7 @@ { "_comment": "@generated by pkgs/development/tools/build-managers/buck2/update.sh" -, "_prelude": "sha256-PTetJetdpFU3bKLU1WESMwIEZox86IcrczvCxmaQzoE=" -, "x86_64-linux": "sha256-2vaKYCFRu2fNA/Nsu3HHT5DWtNeMnEfE8FVl7bat1HQ=" -, "x86_64-darwin": "sha256-zzB3sPOCDGWAb4CQO0yjb7Bph+ioi3cJoMYO/2YzXfU=" -, "aarch64-linux": "sha256-sx8rcADlfdAECL/SSHeB7vzxoedqx6+yT7yJp1qLBgM=" -, "aarch64-darwin": "sha256-GKQ8Xfe9iRpgq5SrM6nyyIPBh9gC25uN/vzGRjViQdQ=" +, "_prelude": "sha256-7rPhF/kjVHBYikYqG3wUUKkNE1SB6J3BxwXcofrCyp0=" +, "x86_64-linux": "sha256-VoUaeCOrRhIJ0kuYYeyOFOtdoIjUU5UdSV61yiVx+KA=" +, "x86_64-darwin": "sha256-8f5TDTiPu8QV66IG0/+ghYjyRmZqJAce+lTSTFOLKpI=" +, "aarch64-linux": "sha256-aky/H5iNZqeFe1/zLxh0mOgLnH/JRcvjN8KBqDcg/0g=" +, "aarch64-darwin": "sha256-QIDCYWZwanN8B1YwuRolNY+YXeyLqoxorT2diZk3U/0=" } No auto update branch exists There might already be an open PR for this update: - buck2: unstable-2024-03-15 -> unstable-2024-04-01 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/303473" [result] Failed to update buck2 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath mate.caja-dropbox, using log file: /var/log/nixpkgs-update/mate.caja-dropbox/2024-04-29.log mate.caja-dropbox 0 -> 1 attrpath: mate.caja-dropbox mate packages are upgraded in lockstep https://github.com/NixOS/nixpkgs/pull/50695#issuecomment-441338593 [result] Failed to update mate.caja-dropbox 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.azure-mgmt-devtestlabs, using log file: /var/log/nixpkgs-update/python311Packages.azure-mgmt-devtestlabs/2024-04-29.log python311Packages.azure-mgmt-devtestlabs 0 -> 1 attrpath: python311Packages.azure-mgmt-devtestlabs Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-azure-mgmt-devtestlabs-9.0.0 Press Enter key to continue... Running update for: - python3.11-azure-mgmt-devtestlabs-9.0.0: UPDATING ... - python3.11-azure-mgmt-devtestlabs-9.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.azure-mgmt-devtestlabs 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.progressbar33, using log file: /var/log/nixpkgs-update/python311Packages.progressbar33/2024-04-29.log python311Packages.progressbar33 0 -> 1 attrpath: python311Packages.progressbar33 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-progressbar33-2.4 Press Enter key to continue... Running update for: - python3.11-progressbar33-2.4: UPDATING ... - python3.11-progressbar33-2.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.progressbar33 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cipher, using log file: /var/log/nixpkgs-update/cipher/2024-04-29.log cipher 0 -> 1 attrpath: cipher Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - cipher-2.5.0 Press Enter key to continue... Running update for: - cipher-2.5.0: UPDATING ... - cipher-2.5.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update cipher 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.libarchive-c, using log file: /var/log/nixpkgs-update/python311Packages.libarchive-c/2024-04-29.log python311Packages.libarchive-c 0 -> 1 attrpath: python311Packages.libarchive-c Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-libarchive-c-5.1 Press Enter key to continue... Running update for: - python3.11-libarchive-c-5.1: UPDATING ... - python3.11-libarchive-c-5.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.libarchive-c 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath ironbar, using log file: /var/log/nixpkgs-update/ironbar/2024-04-29.log ironbar 0.14.1 -> 0.15.0 https://github.com/JakeStanger/ironbar/releases attrpath: ironbar Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] Replacing cargoHash with sha256-DaF669mOnICTnUzH4mc640xIecin/UEZSk7PWDjQbr0= Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A ironbar nix build failed. cargo:rerun-if-env-changed=PKG_CONFIG_LIBDIR_x86_64-unknown-linux-gnu cargo:rerun-if-env-changed=PKG_CONFIG_LIBDIR_x86_64_unknown_linux_gnu cargo:rerun-if-env-changed=HOST_PKG_CONFIG_LIBDIR cargo:rerun-if-env-changed=PKG_CONFIG_LIBDIR cargo:rerun-if-env-changed=PKG_CONFIG_SYSROOT_DIR_x86_64-unknown-linux-gnu cargo:rerun-if-env-changed=PKG_CONFIG_SYSROOT_DIR_x86_64_unknown_linux_gnu cargo:rerun-if-env-changed=HOST_PKG_CONFIG_SYSROOT_DIR cargo:rerun-if-env-changed=PKG_CONFIG_SYSROOT_DIR --- stderr thread 'main' panicked at /build/ironbar-0.15.0-vendor.tar.gz/mlua-sys/build/find_normal.rs:57:30: cannot find LuaJIT using `pkg-config`: `PKG_CONFIG_ALLOW_SYSTEM_CFLAGS="1" PKG_CONFIG_ALLOW_SYSTEM_LIBS="1" PKG_CONFIG_PATH="/nix/store/mc7iq0j6h80qd89g32qq6cbx3y1cxxq4-librsvg-2.58.0-dev/lib/pkgconfig:/nix/store/hfa0jcamap6fyq1jlfxvn0dhaa3yrv8y-glib-2.78.4-dev/lib/pkgconfig:/nix/store/vi5lphqwg9cj7xkaggvw5n0wqsmwdlq5-zlib-1.3.1-dev/lib/pkgconfig:/nix/store/pavlygbhcz9j1giv9c5nbwqwynida044-libffi-3.4.6-dev/lib/pkgconfig:/nix/store/2339gpgyjmnr644z0qxdi0095j3k746y-gdk-pixbuf-2.42.10-dev/lib/pkgconfig:/nix/store/skbpy6wg22si6y1qf8i1axsxjd3mlx42-libtiff-4.6.0-dev/lib/pkgconfig:/nix/store/5zk3svqc96pnjkf9yxwx4vpb5bh0hqzj-libdeflate-1.20/lib/pkgconfig:/nix/store/z4rjfh54kmj84h524pja9lj9dkl128kz-libjpeg-turbo-3.0.2-dev/lib/pkgconfig:/nix/store/q44g9zy7snsnix8zry13kg6n2v7spdx3-xz-5.4.6-dev/lib/pkgconfig:/nix/store/n5y5qh10ak0xxmd3yh4h5b3zq25zisrq-libpng-apng-1.6.43-dev/lib/pkgconfig:/nix/store/hl1zm53nn45c7wy5d2168xp99ma6fxgf-cairo-1.18.0-dev/lib/pkgconfig:/nix/store/75faabxazn4q8mq992yvg1xfjla12l3y-fontconfig-2.15.0-dev/lib/pkgconfig:/nix/store/hyycb5lggv29z1h4kc4662wlsdcdq1y7-freetype-2.13.2-dev/lib/pkgconfig:/nix/store/b585qp4cqmp32yalnnf22c64fqxyh0di-bzip2-1.0.8-dev/lib/pkgconfig:/nix/store/kw7sqvhwsgxkx6aw4bzgy0c3s09fyb7k-brotli-1.1.0-dev/lib/pkgconfig:/nix/store/ldz76qcgv1ic8s8jlvhcyw51s7pzl2bx-pixman-0.43.4/lib/pkgconfig:/nix/store/lrsv735g1dswgm9kq1ss5251hyczpvan-libXext-1.3.6-dev/lib/pkgconfig:/nix/store/55kw5h1hskg904z00rj1q6lq9g1hiafy-xorgproto-2023.2/share/pkgconfig:/nix/store/2qnfnxmh8lm60ar02l69im97dmb3bhwj-libXau-1.0.11-dev/lib/pkgconfig:/nix/store/2lww92rgdl72iphwidszlj3sf4m6rh1p-libXrender-0.9.11-dev/lib/pkgconfig:/nix/store/l6acvxqrvmvalmpygclmg9pcb1kzmwcn-libX11-1.8.7-dev/lib/pkgconfig:/nix/store/gmjf09q9mxpqij5q6l5nvr7k8zb34pfb-libxcb-1.16-dev/lib/pkgconfig:/nix/store/6bzgx7161cdycq7jzk5kfq2j304m4b5v-gtk+3-3.24.41-dev/lib/pkgconfig:/nix/store/kbk46i0v8v4mb2pxgb07726wy4d9lc3z-at-spi2-core-2.50.2-dev/lib/pkgconfig:/nix/store/v53mpxmzvmlvalr1762x80phg4nzyp37-dbus-1.14.10-dev/lib/pkgconfig:/nix/store/vfr9cxnakcblkbbn2gydvr40sv51xqb6-expat-2.6.2-dev/lib/pkgconfig:/nix/store/8cwq2xx35aih0hm1r2x5q1v5b3fl9f7g-fribidi-1.0.13-dev/lib/pkgconfig:/nix/store/s5ayh9rkd2jns9v1z4qzfdyrcd2ar2rm-gsettings-desktop-schemas-45.0/share/pkgconfig:/nix/store/pnk1q3dwhpj3f306xd10kp47a9f2by1r-libICE-1.1.1-dev/lib/pkgconfig:/nix/store/c4a2jynjmpcng9chdwjff74b2rwakq50-libSM-1.2.4-dev/lib/pkgconfig:/nix/store/m9cbbkqbdkgahdyjzymh5112qc4559gw-libXcomposite-0.4.6-dev/lib/pkgconfig:/nix/store/2ikvdprs0i3c13gixacrpgf2is3lb177-libXfixes-6.0.1-dev/lib/pkgconfig:/nix/store/m3msyd6nhdqv1px3yyp6lsqd07vsy541-libXcursor-1.2.2-dev/lib/pkgconfig:/nix/store/j65q9f8f4irqmghwfzcin6rck72wbkhb-libXdamage-1.1.6-dev/lib/pkgconfig:/nix/store/m1y5hkq3741fy5z22kj3xq86b53c4y1h-libXi-1.8.1-dev/lib/pkgconfig:/nix/store/48ixycxmlrfnncyw0gd9fdqbnsk1v0d5-libXrandr-1.5.4-dev/lib/pkgconfig:/nix/store/b0ylwxvkvmqfkabiz18n14l4hsfxri5n-pango-1.51.2-dev/lib/pkgconfig:/nix/store/h2a0hvrmfzfxfggyfjgwnl3lmdhynm71-harfbuzz-8.4.0-dev/lib/pkgconfig:/nix/store/bas5r5dwqqii9syn5fpk2p5b620bfxn5-graphite2-1.3.14-dev/lib/pkgconfig:/nix/store/k5871s1dphbylkqmmvs2mq0m561am9q8-libXft-2.3.8-dev/lib/pkgconfig:/nix/store/icic5zwalxsqwnm5zgfgw9kf99nbxgxr-libGL-1.7.0-dev/lib/pkgconfig:/nix/store/9lq5jxvs1qja314ahz33r6rmb5mzz767-libglvnd-1.7.0-dev/lib/pkgconfig:/nix/store/xwi507pfnpqqsvha16lm1i39ljgk17hr-wayland-1.22.0-dev/lib/pkgconfig:/nix/store/wfh7w6rfcsnscs7w745pllry2n3wjqcl-wayland-1.22.0-bin/lib/pkgconfig:/nix/store/2c9w62qmifa1anxdpj0jyvfkaxcsg1ni-wayland-protocols-1.34/share/pkgconfig:/nix/store/rdwzdlcsp8r6hi35390x4yx90g3avhvg-libXinerama-1.1.5-dev/lib/pkgconfig:/nix/store/jh4ddz1q5cfmik1cnr0al6fkv5gc9l3p-cups-2.4.7-dev/lib/pkgconfig:/nix/store/21z2i2k8fhinpzsh9blh6ksz6iad13s7-gmp-with-cxx-6.3.0-dev/lib/pkgconfig:/nix/store/6xqvj41lv287qs6liafdr3g9kyvbnaiw-gobject-introspection-1.78.1-dev/lib/pkgconfig:/nix/store/d2xzviq47dpnf41ks6nr059kgh63bw3y-gtk-layer-shell-0.8.2-dev/lib/pkgconfig:/nix/store/h6ic6634mi38kym2k8mvl02y8z06f6xy-shared-mime-info-2.4-dev/share/pkgconfig:/nix/store/7bsy8jyyv57apnvr2kvcdl1ml154dhmz-adwaita-icon-theme-45.0/share/pkgconfig:/nix/store/5gj4fdskkwxlqnzrggghc3v9jr42zwlr-libxkbcommon-1.5.0-dev/lib/pkgconfig:/nix/store/aqaxrq9jyrjwsnsly12b2xkqmakcsawb-openssl-3.0.13-dev/lib/pkgconfig" "pkg-config" "--libs" "--cflags" "luajit" "luajit >= 2.0.4" "luajit < 2.2"` did not exit successfully: exit status: 1 error: could not find system library 'luajit' required by the 'mlua-sys' crate --- stderr Package luajit was not found in the pkg-config search path. Perhaps you should add the directory containing `luajit.pc' to the PKG_CONFIG_PATH environment variable No package 'luajit' found Package luajit was not found in the pkg-config search path. Perhaps you should add the directory containing `luajit.pc' to the PKG_CONFIG_PATH environment variable No package 'luajit' found Package luajit was not found in the pkg-config search path. Perhaps you should add the directory containing `luajit.pc' to the PKG_CONFIG_PATH environment variable No package 'luajit' found note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace warning: build failed, waiting for other jobs to finish... [result] Failed to update ironbar 0.14.1 -> 0.15.0 https://github.com/JakeStanger/ironbar/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.mss, using log file: /var/log/nixpkgs-update/python311Packages.mss/2024-04-29.log python311Packages.mss 0 -> 1 attrpath: python311Packages.mss Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-mss-9.0.1 Press Enter key to continue... Running update for: - python3.11-mss-9.0.1: UPDATING ... - python3.11-mss-9.0.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.mss 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.colormath, using log file: /var/log/nixpkgs-update/python311Packages.colormath/2024-04-29.log python311Packages.colormath 0 -> 1 attrpath: python311Packages.colormath Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-colormath-unstable-2021-04-17 Press Enter key to continue... Running update for: - python3.11-colormath-unstable-2021-04-17: UPDATING ... - python3.11-colormath-unstable-2021-04-17: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.colormath 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.adax, using log file: /var/log/nixpkgs-update/python311Packages.adax/2024-04-29.log python311Packages.adax 0 -> 1 attrpath: python311Packages.adax Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-adax-0.4.0 Press Enter key to continue... Running update for: - python3.11-adax-0.4.0: UPDATING ... - python3.11-adax-0.4.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.adax 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.htmllaundry, using log file: /var/log/nixpkgs-update/python311Packages.htmllaundry/2024-04-29.log python311Packages.htmllaundry 0 -> 1 attrpath: python311Packages.htmllaundry Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-htmllaundry-2.2 Press Enter key to continue... Running update for: - python3.11-htmllaundry-2.2: UPDATING ... - python3.11-htmllaundry-2.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.htmllaundry 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.dazl, using log file: /var/log/nixpkgs-update/python311Packages.dazl/2024-04-29.log python311Packages.dazl 0 -> 1 attrpath: python311Packages.dazl Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-dazl-7.11.0 Press Enter key to continue... Running update for: - python3.11-dazl-7.11.0: UPDATING ... - python3.11-dazl-7.11.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.dazl 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lua51Packages.rest-nvim, using log file: /var/log/nixpkgs-update/lua51Packages.rest-nvim/2024-04-29.log lua51Packages.rest-nvim 0.2-1 -> 2.0.1 https://github.com/rest-nvim/rest.nvim/releases attrpath: lua51Packages.rest-nvim Packages for lua are currently skipped. https://github.com/NixOS/nixpkgs/pull/37501#issuecomment-375169646 [result] Failed to update lua51Packages.rest-nvim 0.2-1 -> 2.0.1 https://github.com/rest-nvim/rest.nvim/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.atpublic, using log file: /var/log/nixpkgs-update/python311Packages.atpublic/2024-04-29.log python311Packages.atpublic 0 -> 1 attrpath: python311Packages.atpublic Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-atpublic-4.0 Press Enter key to continue... Running update for: - python3.11-atpublic-4.0: UPDATING ... - python3.11-atpublic-4.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/atpublic/default.nix b/pkgs/development/python-modules/atpublic/default.nix index 41cbe28b8a26..882b03e14b53 100644 --- a/pkgs/development/python-modules/atpublic/default.nix +++ b/pkgs/development/python-modules/atpublic/default.nix @@ -10,14 +10,14 @@ buildPythonPackage rec { pname = "atpublic"; - version = "4.0"; + version = "4.1.0"; format = "pyproject"; disabled = pythonOlder "3.6"; src = fetchPypi { inherit pname version; - hash = "sha256-D0BDMhnhJO3xFcbDY4CMpvDhz6fRYNhrL7lHkwhtEpQ="; + hash = "sha256-0cjNkxr3Rh9tGLxgYzg+hlTZ6e8Z1Y7m3AHoUVu/Vd8="; }; nativeBuildInputs = [ No auto update branch exists Old version 4.0" not present in staging derivation file with contents: { lib , buildPythonPackage , fetchPypi , pytestCheckHook , pythonOlder , hatchling , sybil , typing-extensions }: buildPythonPackage rec { pname = "atpublic"; version = "4.1.0"; format = "pyproject"; disabled = pythonOlder "3.6"; src = fetchPypi { inherit pname version; hash = "sha256-0cjNkxr3Rh9tGLxgYzg+hlTZ6e8Z1Y7m3AHoUVu/Vd8="; }; nativeBuildInputs = [ hatchling ]; propagatedBuildInputs = lib.optionals (pythonOlder "3.8") [ typing-extensions ]; nativeCheckInputs = [ pytestCheckHook sybil ]; pytestFlagsArray = [ # TypeError: FixtureManager.getfixtureclosure() missing 1 required positional argument: 'ignore_args' "--ignore=docs/using.rst" ]; postPatch = '' sed -i '/cov=public/d' pyproject.toml ''; pythonImportsCheck = [ "public" ]; meta = with lib; { description = "Python decorator and function which populates a module's __all__ and globals"; homepage = "https://public.readthedocs.io/"; longDescription = '' This is a very simple decorator and function which populates a module's __all__ and optionally the module globals. ''; license = licenses.asl20; maintainers = with maintainers; [ eadwu ]; }; } [result] Failed to update python311Packages.atpublic 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath php81Extensions.spx, using log file: /var/log/nixpkgs-update/php81Extensions.spx/2024-04-29.log php81Extensions.spx 0 -> 1 attrpath: php81Extensions.spx Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - php-spx-0.4.15 Press Enter key to continue... Running update for: - php-spx-0.4.15: UPDATING ... - php-spx-0.4.15: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update php81Extensions.spx 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.args, using log file: /var/log/nixpkgs-update/python311Packages.args/2024-04-29.log python311Packages.args 0 -> 1 attrpath: python311Packages.args Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-args-0.1.0 Press Enter key to continue... Running update for: - python3.11-args-0.1.0: UPDATING ... - python3.11-args-0.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.args 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath ejson2env, using log file: /var/log/nixpkgs-update/ejson2env/2024-04-29.log ejson2env 0 -> 1 attrpath: ejson2env Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] skipping because derivation has updateScript [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - ejson2env-2.0.5 Press Enter key to continue... Running update for: - ejson2env-2.0.5: UPDATING ... - ejson2env-2.0.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update ejson2env 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gensio, using log file: /var/log/nixpkgs-update/gensio/2024-04-29.log gensio 0 -> 1 attrpath: gensio Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - gensio-2.8.4 Press Enter key to continue... Running update for: - gensio-2.8.4: UPDATING ... - gensio-2.8.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update gensio 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.amcrest, using log file: /var/log/nixpkgs-update/python311Packages.amcrest/2024-04-29.log python311Packages.amcrest 0 -> 1 attrpath: python311Packages.amcrest Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-amcrest-1.9.8 Press Enter key to continue... Running update for: - python3.11-amcrest-1.9.8: UPDATING ... - python3.11-amcrest-1.9.8: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.amcrest 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.nibabel, using log file: /var/log/nixpkgs-update/python311Packages.nibabel/2024-04-29.log python311Packages.nibabel 0 -> 1 attrpath: python311Packages.nibabel Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-nibabel-5.2.1 Press Enter key to continue... Running update for: - python3.11-nibabel-5.2.1: UPDATING ... - python3.11-nibabel-5.2.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.nibabel 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pook, using log file: /var/log/nixpkgs-update/python311Packages.pook/2024-04-29.log python311Packages.pook 0 -> 1 attrpath: python311Packages.pook Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pook-1.4.3 Press Enter key to continue... Running update for: - python3.11-pook-1.4.3: UPDATING ... - python3.11-pook-1.4.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pook 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.types-setuptools, using log file: /var/log/nixpkgs-update/python311Packages.types-setuptools/2024-04-29.log python311Packages.types-setuptools 0 -> 1 attrpath: python311Packages.types-setuptools Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-types-setuptools-69.2.0.20240317 Press Enter key to continue... Running update for: - python3.11-types-setuptools-69.2.0.20240317: UPDATING ... - python3.11-types-setuptools-69.2.0.20240317: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/types-setuptools/default.nix b/pkgs/development/python-modules/types-setuptools/default.nix index a2a0a9f125bd..ccabb2a3d3ba 100644 --- a/pkgs/development/python-modules/types-setuptools/default.nix +++ b/pkgs/development/python-modules/types-setuptools/default.nix @@ -6,12 +6,12 @@ buildPythonPackage rec { pname = "types-setuptools"; - version = "69.2.0.20240317"; + version = "69.5.0.20240423"; pyproject = true; src = fetchPypi { inherit pname version; - hash = "sha256-tgfExIhC7z7kncDH/pwbrXVwCwceEBi7TX46xJLUcEg="; + hash = "sha256-p7qQjxdGxDN9E/An+g9KW8rW0dkgSCGbp5KzKVxYWG0="; }; nativeBuildInputs = [ An auto update branch exists with message `python311Packages.types-setuptools: 69.2.0.20240317 -> 69.5.0.20240415`. New version is 69.5.0.20240423. The auto update branch does not match or exceed the new version. Old version 69.2.0.20240317" not present in staging derivation file with contents: { lib , buildPythonPackage , fetchPypi , setuptools }: buildPythonPackage rec { pname = "types-setuptools"; version = "69.5.0.20240415"; pyproject = true; src = fetchPypi { inherit pname version; hash = "sha256-6mSvCpamdPjEC6NMCcJU88cLw/IYxr/6HQkSvZFYSi8="; }; nativeBuildInputs = [ setuptools ]; # Module doesn't have tests doCheck = false; pythonImportsCheck = [ "setuptools-stubs" ]; meta = with lib; { description = "Typing stubs for setuptools"; homepage = "https://github.com/python/typeshed"; license = licenses.asl20; maintainers = with maintainers; [ fab ]; }; } [result] Failed to update python311Packages.types-setuptools 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.inotifyrecursive, using log file: /var/log/nixpkgs-update/python311Packages.inotifyrecursive/2024-04-29.log python311Packages.inotifyrecursive 0 -> 1 attrpath: python311Packages.inotifyrecursive Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-inotifyrecursive-0.3.5 Press Enter key to continue... Running update for: - python3.11-inotifyrecursive-0.3.5: UPDATING ... - python3.11-inotifyrecursive-0.3.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.inotifyrecursive 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath xenomapper, using log file: /var/log/nixpkgs-update/xenomapper/2024-04-29.log xenomapper 0 -> 1 attrpath: xenomapper Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - xenomapper-1.0.2 Press Enter key to continue... Running update for: - xenomapper-1.0.2: UPDATING ... - xenomapper-1.0.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update xenomapper 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.aiolyric, using log file: /var/log/nixpkgs-update/python311Packages.aiolyric/2024-04-29.log python311Packages.aiolyric 0 -> 1 attrpath: python311Packages.aiolyric Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/qljhjvml0ndr5dghp1z3adf9dymk84i5-packages.json.drv building '/nix/store/qljhjvml0ndr5dghp1z3adf9dymk84i5-packages.json.drv'... Going to be running update for following packages: - python3.11-aiolyric-2.0.1 Press Enter key to continue... Running update for: - python3.11-aiolyric-2.0.1: UPDATING ... - python3.11-aiolyric-2.0.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.aiolyric 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.bpython, using log file: /var/log/nixpkgs-update/python311Packages.bpython/2024-04-29.log python311Packages.bpython 0 -> 1 attrpath: python311Packages.bpython Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-bpython-0.24 Press Enter key to continue... Running update for: - python3.11-bpython-0.24: UPDATING ... - python3.11-bpython-0.24: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.bpython 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.adlfs, using log file: /var/log/nixpkgs-update/python311Packages.adlfs/2024-04-29.log python311Packages.adlfs 0 -> 1 attrpath: python311Packages.adlfs Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-adlfs-2024.4.1 Press Enter key to continue... Running update for: - python3.11-adlfs-2024.4.1: UPDATING ... - python3.11-adlfs-2024.4.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.adlfs 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.blosc2, using log file: /var/log/nixpkgs-update/python311Packages.blosc2/2024-04-29.log python311Packages.blosc2 0 -> 1 attrpath: python311Packages.blosc2 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-blosc2-2.5.1 Press Enter key to continue... Running update for: - python3.11-blosc2-2.5.1: UPDATING ... - python3.11-blosc2-2.5.1: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/blosc2/default.nix b/pkgs/development/python-modules/blosc2/default.nix index efaec4ead713..eb4b5fab14a6 100644 --- a/pkgs/development/python-modules/blosc2/default.nix +++ b/pkgs/development/python-modules/blosc2/default.nix @@ -30,14 +30,14 @@ buildPythonPackage rec { pname = "blosc2"; - version = "2.5.1"; + version = "2.6.2"; pyproject = true; src = fetchFromGitHub { owner = "Blosc"; repo = "python-blosc2"; rev = "refs/tags/v${version}"; - hash = "sha256-yBgnNJU1q+FktIkpQn74LuRP19Ta/fNC60Z8TxzlWPk="; + hash = "sha256-boRQgZ2d4hwt1V65LY8eLI0rQSIwZ7W36S8m/GhyGVo="; }; postPatch = '' No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A python311Packages.blosc2 nix build failed. unpacking source archive /nix/store/rzmzdp9disd662z4bhvk9m7rr22hrz0x-source source root is source setting SOURCE_DATE_EPOCH to timestamp 315619200 of file source/tests/test_vlmeta.py @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase substituteStream(): WARNING: '--replace' is deprecated, use --replace-{fail,warn,quiet}. (file 'requirements-runtime.txt') substituteStream(): WARNING: pattern pytest doesn't match anything in file 'requirements-runtime.txt' @nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" } Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "configurePhase" } Running phase: configurePhase no configure script, doing nothing @nix { "action": "setPhase", "phase": "buildPhase" } Running phase: buildPhase Executing pypaBuildPhase Creating a wheel... * Getting build dependencies for wheel... running egg_info creating blosc2.egg-info writing blosc2.egg-info/PKG-INFO writing dependency_links to blosc2.egg-info/dependency_links.txt writing requirements to blosc2.egg-info/requires.txt writing top-level names to blosc2.egg-info/top_level.txt writing manifest file 'blosc2.egg-info/SOURCES.txt' reading manifest file 'blosc2.egg-info/SOURCES.txt' adding license file 'LICENSE.txt' writing manifest file 'blosc2.egg-info/SOURCES.txt' ERROR Missing dependencies: numpy>=2.0.0rc1 [result] Failed to update python311Packages.blosc2 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.resolvelib, using log file: /var/log/nixpkgs-update/python311Packages.resolvelib/2024-04-29.log python311Packages.resolvelib 0 -> 1 attrpath: python311Packages.resolvelib Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-resolvelib-0.5.5 Press Enter key to continue... Running update for: - python3.11-resolvelib-0.5.5: UPDATING ... - python3.11-resolvelib-0.5.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.resolvelib 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gnome.gnome-maps, using log file: /var/log/nixpkgs-update/gnome.gnome-maps/2024-04-29.log gnome.gnome-maps 0 -> 1 attrpath: gnome.gnome-maps Checking auto update branch... Do not update GNOME during a release cycle [result] Failed to update gnome.gnome-maps 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.lsprotocol, using log file: /var/log/nixpkgs-update/python311Packages.lsprotocol/2024-04-29.log python311Packages.lsprotocol 0 -> 1 attrpath: python311Packages.lsprotocol Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-lsprotocol-2023.0.1 Press Enter key to continue... Running update for: - python3.11-lsprotocol-2023.0.1: UPDATING ... - python3.11-lsprotocol-2023.0.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.lsprotocol 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath skytemple, using log file: /var/log/nixpkgs-update/skytemple/2024-04-29.log skytemple 0 -> 1 attrpath: skytemple Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - skytemple-1.6.5 Press Enter key to continue... Running update for: - skytemple-1.6.5: UPDATING ... - skytemple-1.6.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update skytemple 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.bitcoin-utils-fork-minimal, using log file: /var/log/nixpkgs-update/python311Packages.bitcoin-utils-fork-minimal/2024-04-29.log python311Packages.bitcoin-utils-fork-minimal 0 -> 1 attrpath: python311Packages.bitcoin-utils-fork-minimal Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-bitcoin-utils-fork-minimal-0.4.11.6 Press Enter key to continue... Running update for: - python3.11-bitcoin-utils-fork-minimal-0.4.11.6: UPDATING ... - python3.11-bitcoin-utils-fork-minimal-0.4.11.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.bitcoin-utils-fork-minimal 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath terraform-providers.kubectl, using log file: /var/log/nixpkgs-update/terraform-providers.kubectl/2024-04-29.log terraform-providers.kubectl 0 -> 1 attrpath: terraform-providers.kubectl Checking auto update branch... Derivation file opts-out of auto-updates [result] Failed to update terraform-providers.kubectl 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath anime-downloader, using log file: /var/log/nixpkgs-update/anime-downloader/2024-04-29.log anime-downloader 0 -> 1 attrpath: anime-downloader Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - anime-downloader-5.0.14 Press Enter key to continue... Running update for: - anime-downloader-5.0.14: UPDATING ... - anime-downloader-5.0.14: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update anime-downloader 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.python-kasa, using log file: /var/log/nixpkgs-update/python311Packages.python-kasa/2024-04-29.log python311Packages.python-kasa 0 -> 1 attrpath: python311Packages.python-kasa Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-python-kasa-0.6.2.1 Press Enter key to continue... Running update for: - python3.11-python-kasa-0.6.2.1: UPDATING ... - python3.11-python-kasa-0.6.2.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.python-kasa 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath mangohud, using log file: /var/log/nixpkgs-update/mangohud/2024-04-29.log mangohud 0 -> 1 attrpath: mangohud Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - mangohud-0.7.1 Press Enter key to continue... Running update for: - mangohud-0.7.1: UPDATING ... - mangohud-0.7.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update mangohud 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath tubekit-unwrapped, using log file: /var/log/nixpkgs-update/tubekit-unwrapped/2024-04-29.log tubekit-unwrapped 5 -> 9 https://github.com/reconquest/tubekit/releases attrpath: tubekit-unwrapped Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] stderr did not split as expected full stderr was: error: … while calling the 'derivationStrict' builtin at /builtin/derivation.nix:9:12: (source not available) … while evaluating derivation 'source' whose name attribute is located at /var/cache/nixpkgs-update/worker/worktree/tubekit-unwrapped/pkgs/stdenv/generic/make-derivation.nix:331:7 error: unknown hash algorithm 'sha296' Try '/nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --help' for more information. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'tubekit-unwrapped.originalSrc' not found stderr did not split as expected full stderr was: error: … while calling the 'derivationStrict' builtin at /builtin/derivation.nix:9:12: (source not available) … while evaluating derivation 'tubekit-9' whose name attribute is located at /var/cache/nixpkgs-update/worker/worktree/tubekit-unwrapped/pkgs/stdenv/generic/make-derivation.nix:331:7 … while evaluating attribute 'configurePhase' of derivation 'tubekit-9' at /var/cache/nixpkgs-update/worker/worktree/tubekit-unwrapped/pkgs/build-support/go/module.nix:173:5: 172| 173| configurePhase = args.configurePhase or ('' | ^ 174| runHook preConfigure (stack trace truncated; use '--show-trace' to show the full trace) error: unknown hash algorithm 'sha296' Try '/nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --help' for more information. [result] Failed to update tubekit-unwrapped 5 -> 9 https://github.com/reconquest/tubekit/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gnome-online-accounts, using log file: /var/log/nixpkgs-update/gnome-online-accounts/2024-04-29.log gnome-online-accounts 0 -> 1 attrpath: gnome-online-accounts Checking auto update branch... Do not update GNOME during a release cycle [result] Failed to update gnome-online-accounts 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath zk-shell, using log file: /var/log/nixpkgs-update/zk-shell/2024-04-29.log zk-shell 0 -> 1 attrpath: zk-shell Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - zk-shell-1.0.0 Press Enter key to continue... Running update for: - zk-shell-1.0.0: UPDATING ... - zk-shell-1.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update zk-shell 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.python-csxcad, using log file: /var/log/nixpkgs-update/python311Packages.python-csxcad/2024-04-29.log python311Packages.python-csxcad 0 -> 1 attrpath: python311Packages.python-csxcad Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-python-csxcad-0.6.3 Press Enter key to continue... Running update for: - python3.11-python-csxcad-0.6.3: UPDATING ... - python3.11-python-csxcad-0.6.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.python-csxcad 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.csscompressor, using log file: /var/log/nixpkgs-update/python311Packages.csscompressor/2024-04-29.log python311Packages.csscompressor 0 -> 1 attrpath: python311Packages.csscompressor Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-csscompressor-0.9.5 Press Enter key to continue... Running update for: - python3.11-csscompressor-0.9.5: UPDATING ... - python3.11-csscompressor-0.9.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.csscompressor 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.sorl-thumbnail, using log file: /var/log/nixpkgs-update/python311Packages.sorl-thumbnail/2024-04-29.log python311Packages.sorl-thumbnail 0 -> 1 attrpath: python311Packages.sorl-thumbnail Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-sorl-thumbnail-12.10.0 Press Enter key to continue... Running update for: - python3.11-sorl-thumbnail-12.10.0: UPDATING ... - python3.11-sorl-thumbnail-12.10.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.sorl-thumbnail 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.types-protobuf, using log file: /var/log/nixpkgs-update/python311Packages.types-protobuf/2024-04-29.log python311Packages.types-protobuf 0 -> 1 attrpath: python311Packages.types-protobuf Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-types-protobuf-4.24.0.20240311 Press Enter key to continue... Running update for: - python3.11-types-protobuf-4.24.0.20240311: UPDATING ... - python3.11-types-protobuf-4.24.0.20240311: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/types-protobuf/default.nix b/pkgs/development/python-modules/types-protobuf/default.nix index c09cb206cf04..8b885bdd937b 100644 --- a/pkgs/development/python-modules/types-protobuf/default.nix +++ b/pkgs/development/python-modules/types-protobuf/default.nix @@ -6,12 +6,12 @@ buildPythonPackage rec { pname = "types-protobuf"; - version = "4.24.0.20240311"; + version = "5.26.0.20240422"; format = "setuptools"; src = fetchPypi { inherit pname version; - hash = "sha256-yAQm+fubIa7lFGkelqsypc1pSoLirAeWSzUsPn4Bgrw="; + hash = "sha256-5gdBeBCfl+/p8LIKA1umHXw7A+hn60fSVNKyq2qAXjY="; }; propagatedBuildInputs = [ An auto update branch exists with message `python311Packages.types-protobuf: 4.24.0.20240311 -> 4.25.0.20240417`. New version is 5.26.0.20240422. The auto update branch does not match or exceed the new version. Old version 4.24.0.20240311" not present in staging derivation file with contents: { lib , buildPythonPackage , fetchPypi , types-futures }: buildPythonPackage rec { pname = "types-protobuf"; version = "4.25.0.20240417"; format = "setuptools"; src = fetchPypi { inherit pname version; hash = "sha256-w07/F7mzoK22gwYi8PMCSE5MCJ9TOkbj8UdWgxNUQ1I="; }; propagatedBuildInputs = [ types-futures ]; # Module doesn't have tests doCheck = false; pythonImportsCheck = [ "google-stubs" ]; meta = with lib; { description = "Typing stubs for protobuf"; homepage = "https://github.com/python/typeshed"; license = licenses.asl20; maintainers = with maintainers; [ andersk ]; }; } [result] Failed to update python311Packages.types-protobuf 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.supervisor, using log file: /var/log/nixpkgs-update/python311Packages.supervisor/2024-04-29.log python311Packages.supervisor 0 -> 1 attrpath: python311Packages.supervisor Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-supervisor-4.2.5 Press Enter key to continue... Running update for: - python3.11-supervisor-4.2.5: UPDATING ... - python3.11-supervisor-4.2.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.supervisor 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.oelint-parser, using log file: /var/log/nixpkgs-update/python311Packages.oelint-parser/2024-04-29.log python311Packages.oelint-parser 0 -> 1 attrpath: python311Packages.oelint-parser Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/z80f769zaqhkzgs45wz0v1qp63v5cwbg-packages.json.drv building '/nix/store/z80f769zaqhkzgs45wz0v1qp63v5cwbg-packages.json.drv'... Going to be running update for following packages: - python3.11-oelint-parser-3.5.0 Press Enter key to continue... Running update for: - python3.11-oelint-parser-3.5.0: UPDATING ... - python3.11-oelint-parser-3.5.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.oelint-parser 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.huawei-lte-api, using log file: /var/log/nixpkgs-update/python311Packages.huawei-lte-api/2024-04-29.log python311Packages.huawei-lte-api 0 -> 1 attrpath: python311Packages.huawei-lte-api Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-huawei-lte-api-1.8.1 Press Enter key to continue... Running update for: - python3.11-huawei-lte-api-1.8.1: UPDATING ... - python3.11-huawei-lte-api-1.8.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.huawei-lte-api 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath kitty, using log file: /var/log/nixpkgs-update/kitty/2024-04-29.log kitty 0 -> 1 attrpath: kitty Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - kitty-0.34.1 Press Enter key to continue... Running update for: - kitty-0.34.1: UPDATING ... - kitty-0.34.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update kitty 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath terraform-providers.dexidp, using log file: /var/log/nixpkgs-update/terraform-providers.dexidp/2024-04-29.log terraform-providers.dexidp 0 -> 1 attrpath: terraform-providers.dexidp Checking auto update branch... Derivation file opts-out of auto-updates [result] Failed to update terraform-providers.dexidp 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.safetensors, using log file: /var/log/nixpkgs-update/python311Packages.safetensors/2024-04-29.log python311Packages.safetensors 0 -> 1 attrpath: python311Packages.safetensors Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-safetensors-0.4.2 Press Enter key to continue... Running update for: - python3.11-safetensors-0.4.2: UPDATING ... - python3.11-safetensors-0.4.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.safetensors 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pygments-markdown-lexer, using log file: /var/log/nixpkgs-update/python311Packages.pygments-markdown-lexer/2024-04-29.log python311Packages.pygments-markdown-lexer 0 -> 1 attrpath: python311Packages.pygments-markdown-lexer Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pygments-markdown-lexer-0.1.0.dev39 Press Enter key to continue... Running update for: - python3.11-pygments-markdown-lexer-0.1.0.dev39: UPDATING ... - python3.11-pygments-markdown-lexer-0.1.0.dev39: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pygments-markdown-lexer 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.paver, using log file: /var/log/nixpkgs-update/python311Packages.paver/2024-04-29.log python311Packages.paver 0 -> 1 attrpath: python311Packages.paver Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-paver-1.3.4 Press Enter key to continue... Running update for: - python3.11-paver-1.3.4: UPDATING ... - python3.11-paver-1.3.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.paver 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyosohotwaterapi, using log file: /var/log/nixpkgs-update/python311Packages.pyosohotwaterapi/2024-04-29.log python311Packages.pyosohotwaterapi 0 -> 1 attrpath: python311Packages.pyosohotwaterapi Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pyosohotwaterapi-1.1.4 Press Enter key to continue... Running update for: - python3.11-pyosohotwaterapi-1.1.4: UPDATING ... - python3.11-pyosohotwaterapi-1.1.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyosohotwaterapi 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.python-rabbitair, using log file: /var/log/nixpkgs-update/python311Packages.python-rabbitair/2024-04-29.log python311Packages.python-rabbitair 0 -> 1 attrpath: python311Packages.python-rabbitair Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-python-rabbitair-0.0.8 Press Enter key to continue... Running update for: - python3.11-python-rabbitair-0.0.8: UPDATING ... - python3.11-python-rabbitair-0.0.8: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.python-rabbitair 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath fscryptctl, using log file: /var/log/nixpkgs-update/fscryptctl/2024-04-29.log fscryptctl 1.0.0 -> 1.1.0 https://github.com/google/fscryptctl/releases attrpath: fscryptctl Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/os-specific/linux/fscryptctl/default.nix b/pkgs/os-specific/linux/fscryptctl/default.nix index 4b38913b7122..b1f58b0d349f 100644 --- a/pkgs/os-specific/linux/fscryptctl/default.nix +++ b/pkgs/os-specific/linux/fscryptctl/default.nix @@ -2,7 +2,7 @@ stdenv.mkDerivation rec { pname = "fscryptctl"; - version = "1.0.0"; + version = "1.1.0"; goPackagePath = "github.com/google/fscrypt"; @@ -10,7 +10,7 @@ stdenv.mkDerivation rec { owner = "google"; repo = "fscryptctl"; rev = "v${version}"; - sha256 = "1hwj726mm0yhlcf6523n07h0yq1rvkv4km64h3ydpjcrcxklhw6l"; + sha256 = "sha256-8tkep52DLGL7U1212CXAF8hmgu1BjaE3tbupQD/1058="; }; makeFlags = [ "PREFIX=${placeholder "out"}" ]; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A fscryptctl nix build failed. got build log for 'fscryptctl' from 'daemon' @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/lw4n7dp6wc68gyk4pp9s1hj3bys5wzcd-source source root is source @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase @nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" } Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "configurePhase" } Running phase: configurePhase no configure script, doing nothing @nix { "action": "setPhase", "phase": "buildPhase" } Running phase: buildPhase build flags: SHELL=/nix/store/dy2z01kpnxn7dn2kgfdxs4fm8xy9mb89-bash-5.2p26/bin/bash PREFIX=/nix/store/h61lg4mfhvk5dkx3f1lq8mrq105588iz-fscryptctl-1.1.0 gcc -o fscryptctl.o -c -O2 -Wall fscryptctl.c gcc -o fscryptctl -O2 -Wall fscryptctl.o pandoc -s -t man fscryptctl.1.md > fscryptctl.1 /nix/store/dy2z01kpnxn7dn2kgfdxs4fm8xy9mb89-bash-5.2p26/bin/bash: line 1: pandoc: command not found make: *** [Makefile:66: fscryptctl.1] Error 127 [result] Failed to update fscryptctl 1.0.0 -> 1.1.0 https://github.com/google/fscryptctl/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pudb, using log file: /var/log/nixpkgs-update/python311Packages.pudb/2024-04-29.log python311Packages.pudb 0 -> 1 attrpath: python311Packages.pudb Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pudb-2024.1 Press Enter key to continue... Running update for: - python3.11-pudb-2024.1: UPDATING ... - python3.11-pudb-2024.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pudb 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.torchgpipe, using log file: /var/log/nixpkgs-update/python311Packages.torchgpipe/2024-04-29.log python311Packages.torchgpipe 0 -> 1 attrpath: python311Packages.torchgpipe Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-torchgpipe-0.0.7 Press Enter key to continue... Running update for: - python3.11-torchgpipe-0.0.7: UPDATING ... - python3.11-torchgpipe-0.0.7: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.torchgpipe 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath croaring, using log file: /var/log/nixpkgs-update/croaring/2024-04-29.log croaring 0.2.61 -> 3.0.1 https://github.com/RoaringBitmap/CRoaring/releases attrpath: croaring Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update croaring 0.2.61 -> 3.0.1 https://github.com/RoaringBitmap/CRoaring/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath aspellDicts.rw, using log file: /var/log/nixpkgs-update/aspellDicts.rw/2024-04-29.log aspellDicts.rw 0 -> 1 attrpath: aspellDicts.rw Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - aspell-dict-rw-0.50-0 Press Enter key to continue... Running update for: - aspell-dict-rw-0.50-0: UPDATING ... - aspell-dict-rw-0.50-0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update aspellDicts.rw 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath udpt, using log file: /var/log/nixpkgs-update/udpt/2024-04-29.log udpt 3.1.1 -> 3.1.2 https://github.com/naim94a/udpt/releases attrpath: udpt Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/gg5nd8xr7ljvr0yiagbdi1rg508f56j2-source.drv building '/nix/store/gg5nd8xr7ljvr0yiagbdi1rg508f56j2-source.drv'... trying https://github.com/naim94a/udpt/archive/udpt-3.1.2.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (56) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/gg5nd8xr7ljvr0yiagbdi1rg508f56j2-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/naim94a/udpt/archive/udpt-3.1.2.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (56) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/gg5nd8xr7ljvr0yiagbdi1rg508f56j2-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'udpt.originalSrc' not found stderr did not split as expected full stderr was: these 3 derivations will be built: /nix/store/gg5nd8xr7ljvr0yiagbdi1rg508f56j2-source.drv /nix/store/nqb2vh7px0havy5r3qr3b77hbc5vrkbc-udpt-3.1.2-vendor.tar.gz.drv /nix/store/yr0sgwmm70af6ys4fmmpcd35zn1agzk5-udpt-3.1.2.drv building '/nix/store/gg5nd8xr7ljvr0yiagbdi1rg508f56j2-source.drv'... trying https://github.com/naim94a/udpt/archive/udpt-3.1.2.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (56) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/gg5nd8xr7ljvr0yiagbdi1rg508f56j2-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/naim94a/udpt/archive/udpt-3.1.2.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (56) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/gg5nd8xr7ljvr0yiagbdi1rg508f56j2-source.drv'. error: 1 dependencies of derivation '/nix/store/yr0sgwmm70af6ys4fmmpcd35zn1agzk5-udpt-3.1.2.drv' failed to build [result] Failed to update udpt 3.1.1 -> 3.1.2 https://github.com/naim94a/udpt/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyathena, using log file: /var/log/nixpkgs-update/python311Packages.pyathena/2024-04-29.log python311Packages.pyathena 0 -> 1 attrpath: python311Packages.pyathena Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/ca102krpwfkb3v94cql0ip3hrcxipif6-packages.json.drv building '/nix/store/ca102krpwfkb3v94cql0ip3hrcxipif6-packages.json.drv'... Going to be running update for following packages: - python3.11-pyathena-3.7.0 Press Enter key to continue... Running update for: - python3.11-pyathena-3.7.0: UPDATING ... - python3.11-pyathena-3.7.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyathena 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.process-tests, using log file: /var/log/nixpkgs-update/python311Packages.process-tests/2024-04-29.log python311Packages.process-tests 0 -> 1 attrpath: python311Packages.process-tests Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-process-tests-3.0.0 Press Enter key to continue... Running update for: - python3.11-process-tests-3.0.0: UPDATING ... - python3.11-process-tests-3.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.process-tests 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.tiktoken, using log file: /var/log/nixpkgs-update/python312Packages.tiktoken/2024-04-29.log python312Packages.tiktoken 0.5.1 -> 0.6.0 https://github.com/openai/tiktoken/releases attrpath: python312Packages.tiktoken isn't the default python version [result] Failed to update python312Packages.tiktoken 0.5.1 -> 0.6.0 https://github.com/openai/tiktoken/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath umr, using log file: /var/log/nixpkgs-update/umr/2024-04-29.log umr 0 -> 1 attrpath: umr Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - umr-1.0.8 Press Enter key to continue... Running update for: - umr-1.0.8: UPDATING ... - umr-1.0.8: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update umr 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pretalx, using log file: /var/log/nixpkgs-update/pretalx/2024-04-29.log pretalx 0 -> 1 attrpath: pretalx Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] skipping because derivation has updateScript [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - pretalx-2024.1.0 Press Enter key to continue... Running update for: - pretalx-2024.1.0: UPDATING ... - pretalx-2024.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update pretalx 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.icmplib, using log file: /var/log/nixpkgs-update/python311Packages.icmplib/2024-04-29.log python311Packages.icmplib 0 -> 1 attrpath: python311Packages.icmplib Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-icmplib-3.0.4 Press Enter key to continue... Running update for: - python3.11-icmplib-3.0.4: UPDATING ... - python3.11-icmplib-3.0.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.icmplib 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath mate.eom, using log file: /var/log/nixpkgs-update/mate.eom/2024-04-29.log mate.eom 0 -> 1 attrpath: mate.eom mate packages are upgraded in lockstep https://github.com/NixOS/nixpkgs/pull/50695#issuecomment-441338593 [result] Failed to update mate.eom 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gitqlient, using log file: /var/log/nixpkgs-update/gitqlient/2024-04-29.log gitqlient 0 -> 1 attrpath: gitqlient Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - gitqlient-1.6.2 Press Enter key to continue... Running update for: - gitqlient-1.6.2: UPDATING ... - gitqlient-1.6.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update gitqlient 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.dparse, using log file: /var/log/nixpkgs-update/python311Packages.dparse/2024-04-29.log python311Packages.dparse 0 -> 1 attrpath: python311Packages.dparse Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-dparse-0.6.3 Press Enter key to continue... Running update for: - python3.11-dparse-0.6.3: UPDATING ... - python3.11-dparse-0.6.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.dparse 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.proboscis, using log file: /var/log/nixpkgs-update/python311Packages.proboscis/2024-04-29.log python311Packages.proboscis 0 -> 1 attrpath: python311Packages.proboscis Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-proboscis-1.2.6.0 Press Enter key to continue... Running update for: - python3.11-proboscis-1.2.6.0: UPDATING ... - python3.11-proboscis-1.2.6.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.proboscis 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.siuba, using log file: /var/log/nixpkgs-update/python311Packages.siuba/2024-04-29.log python311Packages.siuba 0 -> 1 attrpath: python311Packages.siuba Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-siuba-0.4.4 Press Enter key to continue... Running update for: - python3.11-siuba-0.4.4: UPDATING ... - python3.11-siuba-0.4.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.siuba 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.isbnlib, using log file: /var/log/nixpkgs-update/python311Packages.isbnlib/2024-04-29.log python311Packages.isbnlib 0 -> 1 attrpath: python311Packages.isbnlib Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-isbnlib-3.10.14 Press Enter key to continue... Running update for: - python3.11-isbnlib-3.10.14: UPDATING ... - python3.11-isbnlib-3.10.14: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.isbnlib 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.meshcat, using log file: /var/log/nixpkgs-update/python311Packages.meshcat/2024-04-29.log python311Packages.meshcat 0 -> 1 attrpath: python311Packages.meshcat Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-meshcat-0.3.2 Press Enter key to continue... Running update for: - python3.11-meshcat-0.3.2: UPDATING ... - python3.11-meshcat-0.3.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.meshcat 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.aioquic, using log file: /var/log/nixpkgs-update/python311Packages.aioquic/2024-04-29.log python311Packages.aioquic 0 -> 1 attrpath: python311Packages.aioquic Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-aioquic-0.9.25 Press Enter key to continue... Running update for: - python3.11-aioquic-0.9.25: UPDATING ... - python3.11-aioquic-0.9.25: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/aioquic/default.nix b/pkgs/development/python-modules/aioquic/default.nix index 071fe70dd962..70156682fbff 100644 --- a/pkgs/development/python-modules/aioquic/default.nix +++ b/pkgs/development/python-modules/aioquic/default.nix @@ -15,14 +15,14 @@ buildPythonPackage rec { pname = "aioquic"; - version = "0.9.25"; + version = "1.0.0"; pyproject = true; disabled = pythonOlder "3.8"; src = fetchPypi { inherit pname version; - hash = "sha256-cHlceJBTJthVwq5SQHIjSq5YbHibgSkuJy0CHpsEMKM="; + hash = "sha256-7THCta+pjFtsr6TzYUnerx3/bFppcB6t0nFnQV+fFmA="; }; patches = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A python311Packages.aioquic nix build failed. Using pythonRuntimeDepsCheckHook Sourcing pypa-install-hook Using pypaInstallPhase Sourcing python-imports-check-hook.sh Using pythonImportsCheckPhase Sourcing python-namespaces-hook Sourcing python-catch-conflicts-hook.sh Sourcing pytest-check-hook Using pytestCheckPhase @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/bdc4wpmkdaf4va06cs7sr177mnxlf44z-aioquic-1.0.0.tar.gz source root is aioquic-1.0.0 setting SOURCE_DATE_EPOCH to timestamp 1710269077 of file aioquic-1.0.0/setup.cfg @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase applying patch /nix/store/f1515rhaw5ll73ys7pdini9nf0x1isrv-e899593805e0b31325a1d347504eb8e6100fe87d.diff patching file pyproject.toml Hunk #1 FAILED at 31. 1 out of 1 hunk FAILED -- saving rejects to file pyproject.toml.rej patching file src/aioquic/tls.py Reversed (or previously applied) patch detected! Assume -R? [n] Apply anyway? [n] Skipping patch. 1 out of 1 hunk ignored -- saving rejects to file src/aioquic/tls.py.rej patching file tests/test_tls.py Reversed (or previously applied) patch detected! Assume -R? [n] Apply anyway? [n] Skipping patch. 1 out of 1 hunk ignored -- saving rejects to file tests/test_tls.py.rej [result] Failed to update python311Packages.aioquic 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.python-unshare, using log file: /var/log/nixpkgs-update/python311Packages.python-unshare/2024-04-29.log python311Packages.python-unshare 0 -> 1 attrpath: python311Packages.python-unshare Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-python-unshare-unstable-2018-05-20 Press Enter key to continue... Running update for: - python3.11-python-unshare-unstable-2018-05-20: UPDATING ... - python3.11-python-unshare-unstable-2018-05-20: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.python-unshare 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.dulwich, using log file: /var/log/nixpkgs-update/python311Packages.dulwich/2024-04-29.log python311Packages.dulwich 0 -> 1 attrpath: python311Packages.dulwich Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-dulwich-0.21.7 Press Enter key to continue... Running update for: - python3.11-dulwich-0.21.7: UPDATING ... - python3.11-dulwich-0.21.7: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/dulwich/default.nix b/pkgs/development/python-modules/dulwich/default.nix index 49789421af34..b8bb81af56b0 100644 --- a/pkgs/development/python-modules/dulwich/default.nix +++ b/pkgs/development/python-modules/dulwich/default.nix @@ -20,7 +20,7 @@ }: buildPythonPackage rec { - version = "0.21.7"; + version = "0.22.1"; pname = "dulwich"; format = "setuptools"; @@ -29,8 +29,8 @@ buildPythonPackage rec { src = fetchFromGitHub { owner = "jelmer"; repo = "dulwich"; - rev = "refs/tags/${pname}-${version}"; - hash = "sha256-iP+6KtaQ8tfOobovSLSJZogS/XWW0LuHgE2oV8uQW/8="; + rev = "refs/tags/dulwich-${version}"; + hash = "sha256-bf3ZUMX4afpdTBpFnx0HMyzCNG6V/p4eOl36djxGbtk="; }; build-system = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A python311Packages.dulwich nix build failed. patching script interpreter paths in /nix/store/zh7qppg6acg35s2jdyn5nm5vg76kry1r-python3.11-dulwich-0.22.1 stripping (with command strip and flags -S -p) in /nix/store/zh7qppg6acg35s2jdyn5nm5vg76kry1r-python3.11-dulwich-0.22.1/lib /nix/store/zh7qppg6acg35s2jdyn5nm5vg76kry1r-python3.11-dulwich-0.22.1/bin shrinking RPATHs of ELF executables and libraries in /nix/store/gikf53fp43s8azkb33sq02fbj19adnal-python3.11-dulwich-0.22.1-dist checking for references to /build/ in /nix/store/gikf53fp43s8azkb33sq02fbj19adnal-python3.11-dulwich-0.22.1-dist... patching script interpreter paths in /nix/store/gikf53fp43s8azkb33sq02fbj19adnal-python3.11-dulwich-0.22.1-dist Rewriting #!/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/bin/python3.11 to #!/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9 wrapping `/nix/store/zh7qppg6acg35s2jdyn5nm5vg76kry1r-python3.11-dulwich-0.22.1/bin/dul-receive-pack'... Rewriting #!/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/bin/python3.11 to #!/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9 wrapping `/nix/store/zh7qppg6acg35s2jdyn5nm5vg76kry1r-python3.11-dulwich-0.22.1/bin/dulwich'... Rewriting #!/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/bin/python3.11 to #!/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9 wrapping `/nix/store/zh7qppg6acg35s2jdyn5nm5vg76kry1r-python3.11-dulwich-0.22.1/bin/dul-upload-pack'... Executing pythonRemoveTestsDir Finished executing pythonRemoveTestsDir @nix { "action": "setPhase", "phase": "installCheckPhase" } Running phase: installCheckPhase no Makefile or custom installCheckPhase, doing nothing @nix { "action": "setPhase", "phase": "pythonCatchConflictsPhase" } Running phase: pythonCatchConflictsPhase @nix { "action": "setPhase", "phase": "pythonRemoveBinBytecodePhase" } Running phase: pythonRemoveBinBytecodePhase @nix { "action": "setPhase", "phase": "pythonImportsCheckPhase" } Running phase: pythonImportsCheckPhase Executing pythonImportsCheckPhase Check whether the following modules can be imported: dulwich @nix { "action": "setPhase", "phase": "pytestXdistHook" } Running phase: pytestXdistHook @nix { "action": "setPhase", "phase": "pytestCheckPhase" } Running phase: pytestCheckPhase Executing pytestCheckPhase Disabled tests path "dulwich/contrib/test_swift_smoke.py" does not exist. Aborting [result] Failed to update python311Packages.dulwich 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.sipyco, using log file: /var/log/nixpkgs-update/python311Packages.sipyco/2024-04-29.log python311Packages.sipyco 0 -> 1 attrpath: python311Packages.sipyco Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-sipyco-1.4 Press Enter key to continue... Running update for: - python3.11-sipyco-1.4: UPDATING ... - python3.11-sipyco-1.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.sipyco 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.boa-api, using log file: /var/log/nixpkgs-update/python311Packages.boa-api/2024-04-29.log python311Packages.boa-api 0 -> 1 attrpath: python311Packages.boa-api Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-boa-api-0.1.14 Press Enter key to continue... Running update for: - python3.11-boa-api-0.1.14: UPDATING ... - python3.11-boa-api-0.1.14: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.boa-api 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath networkmanagerapplet, using log file: /var/log/nixpkgs-update/networkmanagerapplet/2024-04-29.log networkmanagerapplet 0 -> 1 attrpath: networkmanagerapplet Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - network-manager-applet-1.36.0 Press Enter key to continue... Running update for: - network-manager-applet-1.36.0: UPDATING ... - network-manager-applet-1.36.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update networkmanagerapplet 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pvlib, using log file: /var/log/nixpkgs-update/python311Packages.pvlib/2024-04-29.log python311Packages.pvlib 0 -> 1 attrpath: python311Packages.pvlib Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pvlib-0.10.4 Press Enter key to continue... Running update for: - python3.11-pvlib-0.10.4: UPDATING ... - python3.11-pvlib-0.10.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pvlib 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.oauth, using log file: /var/log/nixpkgs-update/python311Packages.oauth/2024-04-29.log python311Packages.oauth 0 -> 1 attrpath: python311Packages.oauth Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-oauth-1.0.1 Press Enter key to continue... Running update for: - python3.11-oauth-1.0.1: UPDATING ... - python3.11-oauth-1.0.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.oauth 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath termtosvg, using log file: /var/log/nixpkgs-update/termtosvg/2024-04-29.log termtosvg 0 -> 1 attrpath: termtosvg Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - termtosvg-1.1.0 Press Enter key to continue... Running update for: - termtosvg-1.1.0: UPDATING ... - termtosvg-1.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update termtosvg 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyre-extensions, using log file: /var/log/nixpkgs-update/python311Packages.pyre-extensions/2024-04-29.log python311Packages.pyre-extensions 0 -> 1 attrpath: python311Packages.pyre-extensions Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pyre-extensions-0.0.30 Press Enter key to continue... Running update for: - python3.11-pyre-extensions-0.0.30: UPDATING ... - python3.11-pyre-extensions-0.0.30: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyre-extensions 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath vcstool, using log file: /var/log/nixpkgs-update/vcstool/2024-04-29.log vcstool 0 -> 1 attrpath: vcstool Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - vcstool-0.3.0 Press Enter key to continue... Running update for: - vcstool-0.3.0: UPDATING ... - vcstool-0.3.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update vcstool 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath black, using log file: /var/log/nixpkgs-update/black/2024-04-29.log black 0 -> 1 attrpath: black Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - black-24.3.0 Press Enter key to continue... Running update for: - black-24.3.0: UPDATING ... - black-24.3.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/black/default.nix b/pkgs/development/python-modules/black/default.nix index ec11de747c1e..1bd026c8e083 100644 --- a/pkgs/development/python-modules/black/default.nix +++ b/pkgs/development/python-modules/black/default.nix @@ -24,14 +24,14 @@ buildPythonPackage rec { pname = "black"; - version = "24.3.0"; + version = "24.4.2"; format = "pyproject"; disabled = pythonOlder "3.8"; src = fetchPypi { inherit pname version; - hash = "sha256-oMnEoHca/GkZV4zscc6Co+MeBUkE5xl96svJOCZxxB8="; + hash = "sha256-yHK1MFfwAAhdpmoZxV1o9vjdysJkI5KtOjVYeEBvvU0="; }; nativeBuildInputs = [ No auto update branch exists Old version 24.3.0" not present in staging derivation file with contents: { stdenv , lib , buildPythonPackage , fetchPypi , pythonOlder , pytestCheckHook , aiohttp , click , colorama , hatch-fancy-pypi-readme , hatch-vcs , hatchling , ipython , mypy-extensions , packaging , pathspec , parameterized , platformdirs , tokenize-rt , tomli , typing-extensions , uvloop }: buildPythonPackage rec { pname = "black"; version = "24.4.0"; format = "pyproject"; disabled = pythonOlder "3.8"; src = fetchPypi { inherit pname version; hash = "sha256-8Htp/aIFeDZ+rrvWcP+PxlOrGB4f+V2ESX+fog59BkE="; }; nativeBuildInputs = [ hatch-fancy-pypi-readme hatch-vcs hatchling ]; propagatedBuildInputs = [ click mypy-extensions packaging pathspec platformdirs ] ++ lib.optionals (pythonOlder "3.11") [ tomli typing-extensions ]; passthru.optional-dependencies = { colorama = [ colorama ]; d = [ aiohttp ]; uvloop = [ uvloop ]; jupyter = [ ipython tokenize-rt ]; }; # Necessary for the tests to pass on Darwin with sandbox enabled. # Black starts a local server and needs to bind a local address. __darwinAllowLocalNetworking = true; nativeCheckInputs = [ pytestCheckHook parameterized ] ++ lib.flatten (lib.attrValues passthru.optional-dependencies); pytestFlagsArray = [ "-W" "ignore::DeprecationWarning" ]; preCheck = '' export PATH="$PATH:$out/bin" # The top directory /build matches black's DEFAULT_EXCLUDE regex. # Make /build the project root for black tests to avoid excluding files. touch ../.git '' + lib.optionalString stdenv.isDarwin '' # Work around https://github.com/psf/black/issues/2105 export TMPDIR="/tmp" ''; disabledTests = [ # requires network access "test_gen_check_output" ] ++ lib.optionals stdenv.isDarwin [ # fails on darwin "test_expression_diff" # Fail on Hydra, see https://github.com/NixOS/nixpkgs/pull/130785 "test_bpo_2142_workaround" "test_skip_magic_trailing_comma" ]; # multiple tests exceed max open files on hydra builders doCheck = !(stdenv.isLinux && stdenv.isAarch64); meta = with lib; { description = "The uncompromising Python code formatter"; homepage = "https://github.com/psf/black"; changelog = "https://github.com/psf/black/blob/${version}/CHANGES.md"; license = licenses.mit; mainProgram = "black"; maintainers = with maintainers; [ sveitser autophagy ]; }; } [result] Failed to update black 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath libffi, using log file: /var/log/nixpkgs-update/libffi/2024-04-29.log libffi 0 -> 1 attrpath: libffi Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - libffi-3.4.6 Press Enter key to continue... Running update for: - libffi-3.4.6: UPDATING ... - libffi-3.4.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update libffi 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath php81Extensions.pdlib, using log file: /var/log/nixpkgs-update/php81Extensions.pdlib/2024-04-29.log php81Extensions.pdlib 0 -> 1 attrpath: php81Extensions.pdlib Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - php-pdlib-1.1.0 Press Enter key to continue... Running update for: - php-pdlib-1.1.0: UPDATING ... - php-pdlib-1.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update php81Extensions.pdlib 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.lsassy, using log file: /var/log/nixpkgs-update/python311Packages.lsassy/2024-04-29.log python311Packages.lsassy 0 -> 1 attrpath: python311Packages.lsassy Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-lsassy-3.1.10 Press Enter key to continue... Running update for: - python3.11-lsassy-3.1.10: UPDATING ... - python3.11-lsassy-3.1.10: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.lsassy 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.xdxf2html, using log file: /var/log/nixpkgs-update/python311Packages.xdxf2html/2024-04-29.log python311Packages.xdxf2html 0 -> 1 attrpath: python311Packages.xdxf2html Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-xdxf2html-0.1.0 Press Enter key to continue... Running update for: - python3.11-xdxf2html-0.1.0: UPDATING ... - python3.11-xdxf2html-0.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.xdxf2html 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.ago, using log file: /var/log/nixpkgs-update/python311Packages.ago/2024-04-29.log python311Packages.ago 0 -> 1 attrpath: python311Packages.ago Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-ago-0.0.95 Press Enter key to continue... Running update for: - python3.11-ago-0.0.95: UPDATING ... - python3.11-ago-0.0.95: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.ago 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.hurry-filesize, using log file: /var/log/nixpkgs-update/python311Packages.hurry-filesize/2024-04-29.log python311Packages.hurry-filesize 0 -> 1 attrpath: python311Packages.hurry-filesize Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-hurry-filesize-0.9 Press Enter key to continue... Running update for: - python3.11-hurry-filesize-0.9: UPDATING ... - python3.11-hurry-filesize-0.9: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.hurry-filesize 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.dsl2html, using log file: /var/log/nixpkgs-update/python311Packages.dsl2html/2024-04-29.log python311Packages.dsl2html 0 -> 1 attrpath: python311Packages.dsl2html Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-dsl2html-0.1.5 Press Enter key to continue... Running update for: - python3.11-dsl2html-0.1.5: UPDATING ... - python3.11-dsl2html-0.1.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.dsl2html 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath bark, using log file: /var/log/nixpkgs-update/bark/2024-04-29.log bark unstable-2023-08-22 -> 0.6.0 https://github.com/haileys/bark/releases attrpath: bark Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] Hashes equal; no update necessary [result] Failed to update bark unstable-2023-08-22 -> 0.6.0 https://github.com/haileys/bark/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath clevis, using log file: /var/log/nixpkgs-update/clevis/2024-04-29.log clevis 19 -> 20 https://github.com/latchset/clevis/releases attrpath: clevis Checking auto update branch... An auto update branch exists with message `clevis: 19 -> 20`. New version is 20. An auto update branch exists with an equal or greater version [result] Failed to update clevis 19 -> 20 https://github.com/latchset/clevis/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cntb, using log file: /var/log/nixpkgs-update/cntb/2024-04-29.log cntb 1.4.8 -> 1.4.12 https://github.com/contabo/cntb/releases attrpath: cntb Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/5ssk8flckb70m2dzrnlbkpqhzv0gq2ak-source.drv building '/nix/store/5ssk8flckb70m2dzrnlbkpqhzv0gq2ak-source.drv'... trying https://github.com/contabo/cntb/archive/1.4.12.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (56) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/5ssk8flckb70m2dzrnlbkpqhzv0gq2ak-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/contabo/cntb/archive/1.4.12.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (56) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/5ssk8flckb70m2dzrnlbkpqhzv0gq2ak-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'cntb.originalSrc' not found stderr did not split as expected full stderr was: these 3 derivations will be built: /nix/store/5ssk8flckb70m2dzrnlbkpqhzv0gq2ak-source.drv /nix/store/6a3ss09q7m1b5k8sk0kp9g01aarn2ian-cntb-1.4.12-go-modules.drv /nix/store/wp1l05nsscfyynkzsp34cb66bccacqfy-cntb-1.4.12.drv building '/nix/store/5ssk8flckb70m2dzrnlbkpqhzv0gq2ak-source.drv'... trying https://github.com/contabo/cntb/archive/1.4.12.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (56) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/5ssk8flckb70m2dzrnlbkpqhzv0gq2ak-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/contabo/cntb/archive/1.4.12.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (56) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/5ssk8flckb70m2dzrnlbkpqhzv0gq2ak-source.drv'. error: 1 dependencies of derivation '/nix/store/wp1l05nsscfyynkzsp34cb66bccacqfy-cntb-1.4.12.drv' failed to build [result] Failed to update cntb 1.4.8 -> 1.4.12 https://github.com/contabo/cntb/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pantheon.switchboard-plug-bluetooth, using log file: /var/log/nixpkgs-update/pantheon.switchboard-plug-bluetooth/2024-04-29.log pantheon.switchboard-plug-bluetooth 0 -> 1 attrpath: pantheon.switchboard-plug-bluetooth Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - switchboard-plug-bluetooth-2.3.6 Press Enter key to continue... Running update for: - switchboard-plug-bluetooth-2.3.6: UPDATING ... - switchboard-plug-bluetooth-2.3.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update pantheon.switchboard-plug-bluetooth 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO @volth asked to not update xfce [result] Failed to update xfce.xfce4-icon-theme 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.domeneshop, using log file: /var/log/nixpkgs-update/python311Packages.domeneshop/2024-04-29.log python311Packages.domeneshop 0 -> 1 attrpath: python311Packages.domeneshop Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-domeneshop-0.4.3 Press Enter key to continue... Running update for: - python3.11-domeneshop-0.4.3: UPDATING ... - python3.11-domeneshop-0.4.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.domeneshop 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath geeqie, using log file: /var/log/nixpkgs-update/geeqie/2024-04-29.log geeqie 0 -> 1 attrpath: geeqie Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Failed with exit code 1 Going to be running update for following packages: - geeqie-2.4 Press Enter key to continue... Running update for: - geeqie-2.4: UPDATING ... - geeqie-2.4: ERROR --- SHOWING ERROR LOG FOR geeqie-2.4 ---------------------- warning: found empty hash, assuming 'sha256-AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=' this derivation will be built: /nix/store/jla0wgygw1n7gqw9a1qpagpa4wm3miib-source.drv building '/nix/store/jla0wgygw1n7gqw9a1qpagpa4wm3miib-source.drv'... trying https://github.com/BestImageViewer/geeqie/archive/vcontinuous.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (56) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/jla0wgygw1n7gqw9a1qpagpa4wm3miib-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/BestImageViewer/geeqie/archive/vcontinuous.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (56) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/jla0wgygw1n7gqw9a1qpagpa4wm3miib-source.drv'. Traceback (most recent call last): File "/nix/store/za4cw9phkrarysb2h5n0pfnqwa3h5s80-nix-update-1.3.1/bin/.nix-update-wrapped", line 9, in sys.exit(main()) ^^^^^^ File "/nix/store/za4cw9phkrarysb2h5n0pfnqwa3h5s80-nix-update-1.3.1/lib/python3.11/site-packages/nix_update/__init__.py", line 291, in main package = update(options) ^^^^^^^^^^^^^^^ File "/nix/store/za4cw9phkrarysb2h5n0pfnqwa3h5s80-nix-update-1.3.1/lib/python3.11/site-packages/nix_update/update.py", line 366, in update update_src_hash(opts, package.filename, package.hash) File "/nix/store/za4cw9phkrarysb2h5n0pfnqwa3h5s80-nix-update-1.3.1/lib/python3.11/site-packages/nix_update/update.py", line 144, in update_src_hash target_hash = nix_prefetch(opts, "src") ^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/za4cw9phkrarysb2h5n0pfnqwa3h5s80-nix-update-1.3.1/lib/python3.11/site-packages/nix_update/update.py", line 126, in nix_prefetch raise UpdateError( nix_update.errors.UpdateError: failed to retrieve hash when trying to update geeqie.src --- SHOWING ERROR LOG FOR geeqie-2.4 ---------------------- The update script for geeqie-2.4 failed with exit code 1 [result] Failed to update geeqie 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.journalwatch, using log file: /var/log/nixpkgs-update/python311Packages.journalwatch/2024-04-29.log python311Packages.journalwatch 0 -> 1 attrpath: python311Packages.journalwatch Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-journalwatch-1.1.0 Press Enter key to continue... Running update for: - python3.11-journalwatch-1.1.0: UPDATING ... - python3.11-journalwatch-1.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.journalwatch 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.ndspy, using log file: /var/log/nixpkgs-update/python311Packages.ndspy/2024-04-29.log python311Packages.ndspy 0 -> 1 attrpath: python311Packages.ndspy Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-ndspy-4.1.0 Press Enter key to continue... Running update for: - python3.11-ndspy-4.1.0: UPDATING ... - python3.11-ndspy-4.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.ndspy 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath mold, using log file: /var/log/nixpkgs-update/mold/2024-04-29.log mold 0 -> 1 attrpath: mold Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - mold-2.30.0 Press Enter key to continue... Running update for: - mold-2.30.0: UPDATING ... - mold-2.30.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update mold 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pycyphal, using log file: /var/log/nixpkgs-update/python311Packages.pycyphal/2024-04-29.log python311Packages.pycyphal 0 -> 1 attrpath: python311Packages.pycyphal Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pycyphal-1.18.0 Press Enter key to continue... Running update for: - python3.11-pycyphal-1.18.0: UPDATING ... - python3.11-pycyphal-1.18.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pycyphal 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO @volth asked to not update xfce [result] Failed to update xfce.catfish 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pytz-deprecation-shim, using log file: /var/log/nixpkgs-update/python311Packages.pytz-deprecation-shim/2024-04-29.log python311Packages.pytz-deprecation-shim 0 -> 1 attrpath: python311Packages.pytz-deprecation-shim Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pytz-deprecation-shim-0.1.0.post0 Press Enter key to continue... Running update for: - python3.11-pytz-deprecation-shim-0.1.0.post0: UPDATING ... - python3.11-pytz-deprecation-shim-0.1.0.post0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pytz-deprecation-shim 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.webrtcvad, using log file: /var/log/nixpkgs-update/python311Packages.webrtcvad/2024-04-29.log python311Packages.webrtcvad 0 -> 1 attrpath: python311Packages.webrtcvad Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-webrtcvad-2.0.10 Press Enter key to continue... Running update for: - python3.11-webrtcvad-2.0.10: UPDATING ... - python3.11-webrtcvad-2.0.10: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.webrtcvad 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.libcst, using log file: /var/log/nixpkgs-update/python311Packages.libcst/2024-04-29.log python311Packages.libcst 0 -> 1 attrpath: python311Packages.libcst Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-libcst-1.1.0 Press Enter key to continue... Running update for: - python3.11-libcst-1.1.0: UPDATING ... - python3.11-libcst-1.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.libcst 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.libpyvivotek, using log file: /var/log/nixpkgs-update/python311Packages.libpyvivotek/2024-04-29.log python311Packages.libpyvivotek 0 -> 1 attrpath: python311Packages.libpyvivotek Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-libpyvivotek-0.4.0 Press Enter key to continue... Running update for: - python3.11-libpyvivotek-0.4.0: UPDATING ... - python3.11-libpyvivotek-0.4.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.libpyvivotek 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.skytemple-ssb-emulator, using log file: /var/log/nixpkgs-update/python311Packages.skytemple-ssb-emulator/2024-04-29.log python311Packages.skytemple-ssb-emulator 0 -> 1 attrpath: python311Packages.skytemple-ssb-emulator Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-skytemple-ssb-emulator-1.6.4 Press Enter key to continue... Running update for: - python3.11-skytemple-ssb-emulator-1.6.4: UPDATING ... - python3.11-skytemple-ssb-emulator-1.6.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.skytemple-ssb-emulator 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath compdb, using log file: /var/log/nixpkgs-update/compdb/2024-04-29.log compdb 0 -> 1 attrpath: compdb Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - compdb-0.2.0 Press Enter key to continue... Running update for: - compdb-0.2.0: UPDATING ... - compdb-0.2.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update compdb 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.google-cloud-os-config, using log file: /var/log/nixpkgs-update/python311Packages.google-cloud-os-config/2024-04-29.log python311Packages.google-cloud-os-config 0 -> 1 attrpath: python311Packages.google-cloud-os-config Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-google-cloud-os-config-1.17.3 Press Enter key to continue... Running update for: - python3.11-google-cloud-os-config-1.17.3: UPDATING ... - python3.11-google-cloud-os-config-1.17.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.google-cloud-os-config 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.ecoaliface, using log file: /var/log/nixpkgs-update/python311Packages.ecoaliface/2024-04-29.log python311Packages.ecoaliface 0 -> 1 attrpath: python311Packages.ecoaliface Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-ecoaliface-0.5.0 Press Enter key to continue... Running update for: - python3.11-ecoaliface-0.5.0: UPDATING ... - python3.11-ecoaliface-0.5.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.ecoaliface 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.allure-python-commons-test, using log file: /var/log/nixpkgs-update/python311Packages.allure-python-commons-test/2024-04-29.log python311Packages.allure-python-commons-test 0 -> 1 attrpath: python311Packages.allure-python-commons-test Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-allure-python-commons-test-2.13.4 Press Enter key to continue... Running update for: - python3.11-allure-python-commons-test-2.13.4: UPDATING ... - python3.11-allure-python-commons-test-2.13.4: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/allure-python-commons-test/default.nix b/pkgs/development/python-modules/allure-python-commons-test/default.nix index 4a75e18835a4..da1d4a3dca4c 100644 --- a/pkgs/development/python-modules/allure-python-commons-test/default.nix +++ b/pkgs/development/python-modules/allure-python-commons-test/default.nix @@ -12,14 +12,14 @@ buildPythonPackage rec { pname = "allure-python-commons-test"; - version = "2.13.4"; + version = "2.13.5"; format = "setuptools"; disabled = pythonOlder "3.4"; src = fetchPypi { inherit pname version; - hash = "sha256-WPthxhyKlN6fGdKXJLrjh3nbQ8h6CacYToyadh/p49M="; + hash = "sha256-pWkLVfBrLEhdhuTE95K3aqrhEY2wEyo5uRzuJC3ngjE="; }; nativeBuildInputs = [ No auto update branch exists There might already be an open PR for this update: - python312Packages.allure-python-commons: 2.13.2 -> 2.13.5 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/298021" [result] Failed to update python311Packages.allure-python-commons-test 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath vunnel, using log file: /var/log/nixpkgs-update/vunnel/2024-04-29.log vunnel 0 -> 1 attrpath: vunnel Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - vunnel-0.22.0 Press Enter key to continue... Running update for: - vunnel-0.22.0: UPDATING ... - vunnel-0.22.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update vunnel 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath wsrepl, using log file: /var/log/nixpkgs-update/wsrepl/2024-04-29.log wsrepl 0 -> 1 attrpath: wsrepl Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - wsrepl-0.2.0 Press Enter key to continue... Running update for: - wsrepl-0.2.0: UPDATING ... - wsrepl-0.2.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update wsrepl 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.aiodns, using log file: /var/log/nixpkgs-update/python312Packages.aiodns/2024-04-29.log python312Packages.aiodns 3.1.1 -> 3.2.0 https://github.com/saghul/aiodns/releases attrpath: python312Packages.aiodns isn't the default python version [result] Failed to update python312Packages.aiodns 3.1.1 -> 3.2.0 https://github.com/saghul/aiodns/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.vllm, using log file: /var/log/nixpkgs-update/python312Packages.vllm/2024-04-29.log python312Packages.vllm 0.3.3 -> 0.4.1 https://github.com/vllm-project/vllm/releases attrpath: python312Packages.vllm isn't the default python version [result] Failed to update python312Packages.vllm 0.3.3 -> 0.4.1 https://github.com/vllm-project/vllm/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath re2, using log file: /var/log/nixpkgs-update/re2/2024-04-29.log re2 2024-03-01 -> 2024-04-01 https://github.com/google/re2/releases attrpath: re2 Checking auto update branch... No auto update branch exists Old version 2024-03-01" not present in staging derivation file with contents: { lib , stdenv , fetchFromGitHub , cmake , ninja , chromium , grpc , haskellPackages , mercurial , python3Packages , abseil-cpp }: stdenv.mkDerivation rec { pname = "re2"; version = "2024-04-01"; src = fetchFromGitHub { owner = "google"; repo = "re2"; rev = version; hash = "sha256-qRNV0O55L+r2rNSUJjU6nMqkPWXENZQvyr5riTU3e5o="; }; outputs = [ "out" "dev" ]; nativeBuildInputs = [ cmake ninja ]; propagatedBuildInputs = [ abseil-cpp ]; postPatch = '' substituteInPlace re2Config.cmake.in \ --replace "\''${PACKAGE_PREFIX_DIR}/" "" ''; # Needed for case-insensitive filesystems (i.e. MacOS) because a file named # BUILD already exists. cmakeBuildDir = "build_dir"; cmakeFlags = lib.optional (!stdenv.hostPlatform.isStatic) "-DBUILD_SHARED_LIBS:BOOL=ON"; # This installs a pkg-config definition. postInstall = '' pushd "$src" make common-install prefix="$dev" SED_INPLACE="sed -i" popd ''; doCheck = true; passthru.tests = { inherit chromium grpc mercurial; inherit (python3Packages) fb-re2 google-re2; haskell-re2 = haskellPackages.re2; }; meta = with lib; { description = "A regular expression library"; longDescription = '' RE2 is a fast, safe, thread-friendly alternative to backtracking regular expression engines like those used in PCRE, Perl, and Python. It is a C++ library. ''; license = licenses.bsd3; homepage = "https://github.com/google/re2"; maintainers = with maintainers; [ azahi networkexception ]; platforms = platforms.all; }; } [result] Failed to update re2 2024-03-01 -> 2024-04-01 https://github.com/google/re2/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.gspread, using log file: /var/log/nixpkgs-update/python311Packages.gspread/2024-04-29.log python311Packages.gspread 0 -> 1 attrpath: python311Packages.gspread Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-gspread-6.1.0 Press Enter key to continue... Running update for: - python3.11-gspread-6.1.0: UPDATING ... - python3.11-gspread-6.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.gspread 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath fceux, using log file: /var/log/nixpkgs-update/fceux/2024-04-29.log fceux 2.6.6-unstable-2024-01-19 -> 2.6.6 https://github.com/TASEmulators/fceux/releases attrpath: fceux Checking auto update branch... No auto update branch exists 2.6.6 is not newer than 2.6.6-unstable-2024-01-19 according to Nix; versionComparison: -1 [result] Failed to update fceux 2.6.6-unstable-2024-01-19 -> 2.6.6 https://github.com/TASEmulators/fceux/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gdtoolkit, using log file: /var/log/nixpkgs-update/gdtoolkit/2024-04-29.log gdtoolkit 0 -> 1 attrpath: gdtoolkit Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - gdtoolkit-3.3.1 Press Enter key to continue... Running update for: - gdtoolkit-3.3.1: UPDATING ... - gdtoolkit-3.3.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update gdtoolkit 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.linetable, using log file: /var/log/nixpkgs-update/python311Packages.linetable/2024-04-29.log python311Packages.linetable 0 -> 1 attrpath: python311Packages.linetable Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-linetable-0.0.3 Press Enter key to continue... Running update for: - python3.11-linetable-0.0.3: UPDATING ... - python3.11-linetable-0.0.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.linetable 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath aspellDicts.ro, using log file: /var/log/nixpkgs-update/aspellDicts.ro/2024-04-29.log aspellDicts.ro 0 -> 1 attrpath: aspellDicts.ro Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - aspell-dict-ro-3.3-2 Press Enter key to continue... Running update for: - aspell-dict-ro-3.3-2: UPDATING ... - aspell-dict-ro-3.3-2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update aspellDicts.ro 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rocmPackages.llvm.lldb, using log file: /var/log/nixpkgs-update/rocmPackages.llvm.lldb/2024-04-29.log rocmPackages.llvm.lldb 0 -> 1 attrpath: rocmPackages.llvm.lldb Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - rocm-llvm-lldb-6.0.2 Press Enter key to continue... Running update for: - rocm-llvm-lldb-6.0.2: UPDATING ... - rocm-llvm-lldb-6.0.2: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/rocm-modules/6/llvm/base.nix b/pkgs/development/rocm-modules/6/llvm/base.nix index caa2ebe42823..ceb2e8f5f525 100644 --- a/pkgs/development/rocm-modules/6/llvm/base.nix +++ b/pkgs/development/rocm-modules/6/llvm/base.nix @@ -61,7 +61,7 @@ let llvmTargetsToBuild' = [ "AMDGPU" ] ++ builtins.map inferNativeTarget llvmTargetsToBuild; in stdenv.mkDerivation (finalAttrs: { pname = "rocm-llvm-${targetName}"; - version = "6.0.2"; + version = "6.1.0"; outputs = [ "out" @@ -78,7 +78,7 @@ in stdenv.mkDerivation (finalAttrs: { owner = "ROCm"; repo = "llvm-project"; rev = "rocm-${finalAttrs.version}"; - hash = "sha256-uGxalrwMNCOSqSFVrYUBi3ijkMEFFTrzFImmvZKQf6I="; + hash = "sha256-Fkh4UJ70pzXGHY2od4kjcWxGUIZoVZFcsF2i4jvKA2E="; }; nativeBuildInputs = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A rocmPackages.llvm.lldb Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix --extra-experimental-features nix-command log -f . rocmPackages.llvm.lldb Standard output: error: build log of 'rocmPackages.llvm.lldb' is not available [result] Failed to update rocmPackages.llvm.lldb 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath libhwy, using log file: /var/log/nixpkgs-update/libhwy/2024-04-29.log libhwy 1.0.7 -> 1.1.0 https://github.com/google/highway/releases attrpath: libhwy Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update libhwy 1.0.7 -> 1.1.0 https://github.com/google/highway/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lego, using log file: /var/log/nixpkgs-update/lego/2024-04-29.log lego 4.15.0 -> 4.16.1 https://github.com/go-acme/lego/releases attrpath: lego Checking auto update branch... An auto update branch exists with message `lego: 4.15.0 -> 4.16.1`. New version is 4.16.1. An auto update branch exists with an equal or greater version [result] Failed to update lego 4.15.0 -> 4.16.1 https://github.com/go-acme/lego/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.onnxmltools, using log file: /var/log/nixpkgs-update/python311Packages.onnxmltools/2024-04-29.log python311Packages.onnxmltools 0 -> 1 attrpath: python311Packages.onnxmltools Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-onnxmltools-1.12.0 Press Enter key to continue... Running update for: - python3.11-onnxmltools-1.12.0: UPDATING ... - python3.11-onnxmltools-1.12.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.onnxmltools 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pantheon.switchboard-plug-onlineaccounts, using log file: /var/log/nixpkgs-update/pantheon.switchboard-plug-onlineaccounts/2024-04-29.log pantheon.switchboard-plug-onlineaccounts 0 -> 1 attrpath: pantheon.switchboard-plug-onlineaccounts Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - switchboard-plug-onlineaccounts-6.5.3 Press Enter key to continue... Running update for: - switchboard-plug-onlineaccounts-6.5.3: UPDATING ... - switchboard-plug-onlineaccounts-6.5.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update pantheon.switchboard-plug-onlineaccounts 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pytest-expect, using log file: /var/log/nixpkgs-update/python311Packages.pytest-expect/2024-04-29.log python311Packages.pytest-expect 0 -> 1 attrpath: python311Packages.pytest-expect Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pytest-expect-1.1.0 Press Enter key to continue... Running update for: - python3.11-pytest-expect-1.1.0: UPDATING ... - python3.11-pytest-expect-1.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pytest-expect 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath easytag, using log file: /var/log/nixpkgs-update/easytag/2024-04-29.log easytag 0 -> 1 attrpath: easytag Checking auto update branch... The derivation has no 'version' attribute, so do not know how to figure out the version while doing an updateScript update [result] Failed to update easytag 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.chessboard, using log file: /var/log/nixpkgs-update/texlivePackages.chessboard/2024-04-29.log texlivePackages.chessboard 1.9 -> 2.05 https://repology.org/project/chessboard/versions attrpath: texlivePackages.chessboard Checking auto update branch... No auto update branch exists Old version 1.9" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.chessboard 1.9 -> 2.05 https://repology.org/project/chessboard/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.pulsectl, using log file: /var/log/nixpkgs-update/python312Packages.pulsectl/2024-04-29.log python312Packages.pulsectl 23.5.2 -> 24.4.0 https://repology.org/project/python:pulsectl/versions attrpath: python312Packages.pulsectl isn't the default python version [result] Failed to update python312Packages.pulsectl 23.5.2 -> 24.4.0 https://repology.org/project/python:pulsectl/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.memory, using log file: /var/log/nixpkgs-update/texlivePackages.memory/2024-04-29.log texlivePackages.memory 1.2 -> 2023.11 https://repology.org/project/memory/versions attrpath: texlivePackages.memory Checking auto update branch... No auto update branch exists Old version 1.2" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.memory 1.2 -> 2023.11 https://repology.org/project/memory/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.labyrinth, using log file: /var/log/nixpkgs-update/texlivePackages.labyrinth/2024-04-29.log texlivePackages.labyrinth 1.0 -> 1.0.1 https://repology.org/project/labyrinth/versions attrpath: texlivePackages.labyrinth Checking auto update branch... No auto update branch exists Old version 1.0" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.labyrinth 1.0 -> 1.0.1 https://repology.org/project/labyrinth/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.dtl, using log file: /var/log/nixpkgs-update/texlivePackages.dtl/2024-04-29.log texlivePackages.dtl 0.6.1 -> 1.20 https://repology.org/project/dtl/versions attrpath: texlivePackages.dtl Checking auto update branch... No auto update branch exists Old version 0.6.1" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.dtl 0.6.1 -> 1.20 https://repology.org/project/dtl/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.options, using log file: /var/log/nixpkgs-update/texlivePackages.options/2024-04-29.log texlivePackages.options 1.0 -> 1.7 https://repology.org/project/options/versions attrpath: texlivePackages.options Checking auto update branch... No auto update branch exists Old version 1.0" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.options 1.0 -> 1.7 https://repology.org/project/options/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.cachix-api, using log file: /var/log/nixpkgs-update/haskellPackages.cachix-api/2024-04-29.log haskellPackages.cachix-api 1.7 -> 1.7.2 https://repology.org/project/haskell:cachix-api/versions attrpath: haskellPackages.cachix-api Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update haskellPackages.cachix-api 1.7 -> 1.7.2 https://repology.org/project/haskell:cachix-api/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lxd-lts, using log file: /var/log/nixpkgs-update/lxd-lts/2024-04-29.log lxd-lts 5.21.0 -> 5.21.1 https://repology.org/project/lxd/versions attrpath: lxd-lts Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update lxd-lts 5.21.0 -> 5.21.1 https://repology.org/project/lxd/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.webtrackR, using log file: /var/log/nixpkgs-update/rPackages.webtrackR/2024-04-29.log rPackages.webtrackR 0.1.0 -> 0.3.0 https://repology.org/project/r:webtrackr/versions attrpath: rPackages.webtrackR Checking auto update branch... No auto update branch exists Old version 0.1.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.webtrackR 0.1.0 -> 0.3.0 https://repology.org/project/r:webtrackr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath dotconf, using log file: /var/log/nixpkgs-update/dotconf/2024-04-29.log dotconf 1.3 -> 1.4.1 https://repology.org/project/dotconf/versions attrpath: dotconf Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/libraries/dotconf/default.nix b/pkgs/development/libraries/dotconf/default.nix index fed050f64b6e..27aee8e92cd7 100644 --- a/pkgs/development/libraries/dotconf/default.nix +++ b/pkgs/development/libraries/dotconf/default.nix @@ -2,13 +2,13 @@ stdenv.mkDerivation rec { pname = "dotconf"; - version = "1.3"; + version = "1.4.1"; src = fetchFromGitHub { owner = "williamh"; repo = "dotconf"; rev = "v${version}"; - sha256 = "1sc95hw5k2xagpafny0v35filmcn05k1ds5ghkldfpf6xw4hakp7"; + sha256 = "sha256-6Du26Ffz08DLGg6uIiPi8Sgjf691MM2kn0qXe3oFeTw="; }; nativeBuildInputs = [ autoreconfHook ]; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/9ib7d078vpkscz1nnvy7cy6zdlj5zixl-dotconf-1.4.1" [check][nixpkgs-review] [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.dateback, using log file: /var/log/nixpkgs-update/rPackages.dateback/2024-04-29.log rPackages.dateback 1.0.3 -> 1.0.4 https://repology.org/project/r:dateback/versions attrpath: rPackages.dateback Checking auto update branch... No auto update branch exists Old version 1.0.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.dateback 1.0.3 -> 1.0.4 https://repology.org/project/r:dateback/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.galamm, using log file: /var/log/nixpkgs-update/rPackages.galamm/2024-04-29.log rPackages.galamm 0.1.1 -> 0.2.0 https://repology.org/project/r:galamm/versions attrpath: rPackages.galamm Checking auto update branch... No auto update branch exists Old version 0.1.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.galamm 0.1.1 -> 0.2.0 https://repology.org/project/r:galamm/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.mgwnbr, using log file: /var/log/nixpkgs-update/rPackages.mgwnbr/2024-04-29.log rPackages.mgwnbr 0.1.0 -> 0.2.0 https://repology.org/project/r:mgwnbr/versions attrpath: rPackages.mgwnbr Checking auto update branch... No auto update branch exists Old version 0.1.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.mgwnbr 0.1.0 -> 0.2.0 https://repology.org/project/r:mgwnbr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.bibtex8, using log file: /var/log/nixpkgs-update/texlivePackages.bibtex8/2024-04-29.log texlivePackages.bibtex8 3.72 -> 4.02 https://repology.org/project/bibtex8/versions attrpath: texlivePackages.bibtex8 Checking auto update branch... No auto update branch exists Old version 3.72" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.bibtex8 3.72 -> 4.02 https://repology.org/project/bibtex8/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.xmltex, using log file: /var/log/nixpkgs-update/texlivePackages.xmltex/2024-04-29.log texlivePackages.xmltex 0.8 -> 20090226 https://repology.org/project/xmltex/versions attrpath: texlivePackages.xmltex Checking auto update branch... No auto update branch exists Old version 0.8" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.xmltex 0.8 -> 20090226 https://repology.org/project/xmltex/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.Bayenet, using log file: /var/log/nixpkgs-update/rPackages.Bayenet/2024-04-29.log rPackages.Bayenet 0.1 -> 0.2 https://repology.org/project/r:bayenet/versions attrpath: rPackages.Bayenet Checking auto update branch... No auto update branch exists Old version 0.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.Bayenet 0.1 -> 0.2 https://repology.org/project/r:bayenet/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.shapes, using log file: /var/log/nixpkgs-update/texlivePackages.shapes/2024-04-29.log texlivePackages.shapes 1.1 -> 5.0 https://repology.org/project/shapes/versions attrpath: texlivePackages.shapes Checking auto update branch... No auto update branch exists Old version 1.1" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.shapes 1.1 -> 5.0 https://repology.org/project/shapes/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.T2DFitTailor, using log file: /var/log/nixpkgs-update/rPackages.T2DFitTailor/2024-04-29.log rPackages.T2DFitTailor 1.0.0 -> 3.0.0 https://repology.org/project/r:t2dfittailor/versions attrpath: rPackages.T2DFitTailor Checking auto update branch... No auto update branch exists Old version 1.0.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.T2DFitTailor 1.0.0 -> 3.0.0 https://repology.org/project/r:t2dfittailor/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.emayili, using log file: /var/log/nixpkgs-update/rPackages.emayili/2024-04-29.log rPackages.emayili 0.7.18 -> 0.8.0 https://repology.org/project/r:emayili/versions attrpath: rPackages.emayili Checking auto update branch... No auto update branch exists Old version 0.7.18" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.emayili 0.7.18 -> 0.8.0 https://repology.org/project/r:emayili/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.wconf, using log file: /var/log/nixpkgs-update/rPackages.wconf/2024-04-29.log rPackages.wconf 1.0.0 -> 1.1.0 https://repology.org/project/r:wconf/versions attrpath: rPackages.wconf Checking auto update branch... No auto update branch exists Old version 1.0.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.wconf 1.0.0 -> 1.1.0 https://repology.org/project/r:wconf/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.unicode-data, using log file: /var/log/nixpkgs-update/texlivePackages.unicode-data/2024-04-29.log texlivePackages.unicode-data 1.17 -> 15.1.0 https://repology.org/project/unicode-data/versions attrpath: texlivePackages.unicode-data Checking auto update branch... No auto update branch exists Old version 1.17" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.unicode-data 1.17 -> 15.1.0 https://repology.org/project/unicode-data/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.bifurcatingr, using log file: /var/log/nixpkgs-update/rPackages.bifurcatingr/2024-04-29.log rPackages.bifurcatingr 2.0.0 -> 2.1.0 https://repology.org/project/r:bifurcatingr/versions attrpath: rPackages.bifurcatingr Checking auto update branch... No auto update branch exists Old version 2.0.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.bifurcatingr 2.0.0 -> 2.1.0 https://repology.org/project/r:bifurcatingr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.comfortaa, using log file: /var/log/nixpkgs-update/texlivePackages.comfortaa/2024-04-29.log texlivePackages.comfortaa 3.2 -> 3.105 https://repology.org/project/fonts:comfortaa/versions attrpath: texlivePackages.comfortaa Checking auto update branch... No auto update branch exists Old version 3.2" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.comfortaa 3.2 -> 3.105 https://repology.org/project/fonts:comfortaa/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath ocamlPackages.iri, using log file: /var/log/nixpkgs-update/ocamlPackages.iri/2024-04-29.log ocamlPackages.iri 0.7.0 -> 1.0.0 https://repology.org/project/ocaml:iri/versions attrpath: ocamlPackages.iri Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/ocaml-modules/iri/default.nix b/pkgs/development/ocaml-modules/iri/default.nix index 8d7b3f6893fe..54db34bc9740 100644 --- a/pkgs/development/ocaml-modules/iri/default.nix +++ b/pkgs/development/ocaml-modules/iri/default.nix @@ -4,7 +4,7 @@ buildDunePackage rec { pname = "iri"; - version = "0.7.0"; + version = "1.0.0"; minimalOCamlVersion = "4.12"; @@ -13,7 +13,7 @@ buildDunePackage rec { owner = "zoggy"; repo = "ocaml-iri"; rev = version; - hash = "sha256-Mkg7kIIVpKbeWUras1RqtJsRx2Q3dBnm4QqSMJFweF8="; + hash = "sha256-6Q7qPezmdcO6JSevWl55XAxFuIROZNDrMkYw8VRR7qg="; }; propagatedBuildInputs = [ sedlex uunf uutf ]; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/axwz84dhpxg3bj5048lzp77g096i82xs-ocaml5.1.1-iri-1.0.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
7 packages built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/ocaml:iri/versions. meta.description for ocamlPackages.iri is: IRI (RFC3987) native OCaml implementation meta.homepage for ocamlPackages.iri is: https://framagit.org/zoggy/ocaml-iri/ ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 1.0.0 with grep in /nix/store/axwz84dhpxg3bj5048lzp77g096i82xs-ocaml5.1.1-iri-1.0.0 - found 1.0.0 in filename of file in /nix/store/axwz84dhpxg3bj5048lzp77g096i82xs-ocaml5.1.1-iri-1.0.0 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath stog ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/axwz84dhpxg3bj5048lzp77g096i82xs-ocaml5.1.1-iri-1.0.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A ocamlPackages.iri https://github.com/r-ryantm/nixpkgs/archive/30c644c1ee066cf4df638b978c2fd08568af4270.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/30c644c1ee066cf4df638b978c2fd08568af4270#ocamlPackages.iri ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/axwz84dhpxg3bj5048lzp77g096i82xs-ocaml5.1.1-iri-1.0.0 ls -la /nix/store/axwz84dhpxg3bj5048lzp77g096i82xs-ocaml5.1.1-iri-1.0.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
7 packages built:
--- ###### Maintainer pings cc @vbgl for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307612 [result] Success updating ocamlPackages.iri 0.7.0 -> 1.0.0 https://repology.org/project/ocaml:iri/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.bliss, using log file: /var/log/nixpkgs-update/rPackages.bliss/2024-04-29.log rPackages.bliss 1.0.4 -> 1.0.5 https://repology.org/project/r:bliss/versions attrpath: rPackages.bliss Checking auto update branch... No auto update branch exists Old version 1.0.4" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.bliss 1.0.4 -> 1.0.5 https://repology.org/project/r:bliss/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.jackpolynomials, using log file: /var/log/nixpkgs-update/haskellPackages.jackpolynomials/2024-04-29.log haskellPackages.jackpolynomials 1.2.1.0 -> 1.3.0.0 https://repology.org/project/haskell:jackpolynomials/versions attrpath: haskellPackages.jackpolynomials Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update haskellPackages.jackpolynomials 1.2.1.0 -> 1.3.0.0 https://repology.org/project/haskell:jackpolynomials/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.rdkit, using log file: /var/log/nixpkgs-update/python312Packages.rdkit/2024-04-29.log python312Packages.rdkit 2023.09.5 -> 2023.9.6 https://repology.org/project/python:rdkit/versions attrpath: python312Packages.rdkit isn't the default python version [result] Failed to update python312Packages.rdkit 2023.09.5 -> 2023.9.6 https://repology.org/project/python:rdkit/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.django-mysql, using log file: /var/log/nixpkgs-update/python312Packages.django-mysql/2024-04-29.log python312Packages.django-mysql 4.12.0 -> 4.13.0 https://repology.org/project/python:django-mysql/versions attrpath: python312Packages.django-mysql isn't the default python version [result] Failed to update python312Packages.django-mysql 4.12.0 -> 4.13.0 https://repology.org/project/python:django-mysql/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.learnrbook, using log file: /var/log/nixpkgs-update/rPackages.learnrbook/2024-04-29.log rPackages.learnrbook 1.0.2-1 -> 2.0.1 https://repology.org/project/r:learnrbook/versions attrpath: rPackages.learnrbook Checking auto update branch... No auto update branch exists Old version 1.0.2-1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.learnrbook 1.0.2-1 -> 2.0.1 https://repology.org/project/r:learnrbook/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.bitset, using log file: /var/log/nixpkgs-update/texlivePackages.bitset/2024-04-29.log texlivePackages.bitset 1.3 -> 2.8.4 https://repology.org/project/bitset/versions attrpath: texlivePackages.bitset Checking auto update branch... No auto update branch exists Old version 1.3" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.bitset 1.3 -> 2.8.4 https://repology.org/project/bitset/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.schedule, using log file: /var/log/nixpkgs-update/texlivePackages.schedule/2024-04-29.log texlivePackages.schedule 1.20 -> 8.0.1 https://repology.org/project/schedule/versions attrpath: texlivePackages.schedule Checking auto update branch... No auto update branch exists Old version 1.20" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.schedule 1.20 -> 8.0.1 https://repology.org/project/schedule/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO currently don't know how to update perl [result] Failed to update perl536Packages.Clipboard 0.28 -> 0.29 https://repology.org/project/perl:clipboard/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.http2_5_1_4, using log file: /var/log/nixpkgs-update/haskellPackages.http2_5_1_4/2024-04-29.log haskellPackages.http2_5_1_4 5.1.4 -> 5.2.1 https://repology.org/project/haskell:http2/versions attrpath: haskellPackages.http2_5_1_4 Checking auto update branch... No auto update branch exists Version in attr path haskellPackages.http2_5_1_4 not compatible with 5.2.1 [result] Failed to update haskellPackages.http2_5_1_4 5.1.4 -> 5.2.1 https://repology.org/project/haskell:http2/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.miRSM, using log file: /var/log/nixpkgs-update/rPackages.miRSM/2024-04-29.log rPackages.miRSM 1.18.0 -> 1.20.0 https://repology.org/project/r:mirsm/versions attrpath: rPackages.miRSM Checking auto update branch... No auto update branch exists Old version 1.18.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.miRSM 1.18.0 -> 1.20.0 https://repology.org/project/r:mirsm/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.hledger-web, using log file: /var/log/nixpkgs-update/haskellPackages.hledger-web/2024-04-29.log haskellPackages.hledger-web 1.32.3 -> 1.33 https://repology.org/project/hledger-web/versions attrpath: haskellPackages.hledger-web Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update haskellPackages.hledger-web 1.32.3 -> 1.33 https://repology.org/project/hledger-web/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.ecoregime, using log file: /var/log/nixpkgs-update/rPackages.ecoregime/2024-04-29.log rPackages.ecoregime 0.1.3 -> 0.2.0 https://repology.org/project/r:ecoregime/versions attrpath: rPackages.ecoregime Checking auto update branch... No auto update branch exists Old version 0.1.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.ecoregime 0.1.3 -> 0.2.0 https://repology.org/project/r:ecoregime/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath the-foundation, using log file: /var/log/nixpkgs-update/the-foundation/2024-04-29.log the-foundation 1.7.0 -> 1.8.1 https://repology.org/project/the-foundation/versions attrpath: the-foundation Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/libraries/the-foundation/default.nix b/pkgs/development/libraries/the-foundation/default.nix index 9b0fe4de9e44..d3021995ff8f 100644 --- a/pkgs/development/libraries/the-foundation/default.nix +++ b/pkgs/development/libraries/the-foundation/default.nix @@ -12,14 +12,14 @@ stdenv.mkDerivation (finalAttrs: { pname = "the-foundation"; - version = "1.7.0"; + version = "1.8.1"; src = fetchFromGitea { domain = "git.skyjake.fi"; owner = "skyjake"; repo = "the_Foundation"; rev = "v${finalAttrs.version}"; - hash = "sha256-6bEd8KzOfBse5sQ2zp+cZtEAu8xIl3GqrpxSZ7h/edI="; + hash = "sha256-gyDBK/bF+QxXMnthUfMjeUuRBZk0Xcahm7wOtLGs5kY="; }; nativeBuildInputs = [ cmake pkg-config ]; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/gnpc1qmr1dy4qzy8sqfg3vhggaa0l5cb-the-foundation-1.8.1" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
4 packages built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/the-foundation/versions. meta.description for the-foundation is: Opinionated C11 library for low-level functionality meta.homepage for the-foundation is: https://git.skyjake.fi/skyjake/the_Foundation ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 1.8.1 with grep in /nix/store/gnpc1qmr1dy4qzy8sqfg3vhggaa0l5cb-the-foundation-1.8.1 - found 1.8.1 in filename of file in /nix/store/gnpc1qmr1dy4qzy8sqfg3vhggaa0l5cb-the-foundation-1.8.1 ---
Rebuild report (if merged into master) (click to expand) ``` 5 total rebuild path(s) 5 package rebuild(s) First fifty rebuilds by attrpath lagrange lagrange-tui sealcurses the-foundation ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/gnpc1qmr1dy4qzy8sqfg3vhggaa0l5cb-the-foundation-1.8.1 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A the-foundation https://github.com/r-ryantm/nixpkgs/archive/4e5e98a3989265af204eac29f93e1c5012506887.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/4e5e98a3989265af204eac29f93e1c5012506887#the-foundation ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/gnpc1qmr1dy4qzy8sqfg3vhggaa0l5cb-the-foundation-1.8.1 ls -la /nix/store/gnpc1qmr1dy4qzy8sqfg3vhggaa0l5cb-the-foundation-1.8.1/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
4 packages built:
--- ###### Maintainer pings cc @sikmir for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307617 [result] Success updating the-foundation 1.7.0 -> 1.8.1 https://repology.org/project/the-foundation/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.hasql-pool_1_0_1, using log file: /var/log/nixpkgs-update/haskellPackages.hasql-pool_1_0_1/2024-04-29.log haskellPackages.hasql-pool_1_0_1 1.0.1 -> 1.1 https://repology.org/project/haskell:hasql-pool/versions attrpath: haskellPackages.hasql-pool_1_0_1 Checking auto update branch... No auto update branch exists Version in attr path haskellPackages.hasql-pool_1_0_1 not compatible with 1.1 [result] Failed to update haskellPackages.hasql-pool_1_0_1 1.0.1 -> 1.1 https://repology.org/project/haskell:hasql-pool/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.rsi, using log file: /var/log/nixpkgs-update/rPackages.rsi/2024-04-29.log rPackages.rsi 0.1.2 -> 0.2.0 https://repology.org/project/r:rsi/versions attrpath: rPackages.rsi Checking auto update branch... No auto update branch exists Old version 0.1.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.rsi 0.1.2 -> 0.2.0 https://repology.org/project/r:rsi/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.extism-manifest, using log file: /var/log/nixpkgs-update/haskellPackages.extism-manifest/2024-04-29.log haskellPackages.extism-manifest 1.2.0.3 -> 1.2.1.0 https://repology.org/project/haskell:extism-manifest/versions attrpath: haskellPackages.extism-manifest Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update haskellPackages.extism-manifest 1.2.0.3 -> 1.2.1.0 https://repology.org/project/haskell:extism-manifest/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lbd, using log file: /var/log/nixpkgs-update/lbd/2024-04-29.log lbd 0-unstable-2024-02-17 -> 0.4 https://repology.org/project/lbd/versions attrpath: lbd Checking auto update branch... No auto update branch exists [version] Hashes equal; no update necessary [result] Failed to update lbd 0-unstable-2024-02-17 -> 0.4 https://repology.org/project/lbd/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.dunai, using log file: /var/log/nixpkgs-update/haskellPackages.dunai/2024-04-29.log haskellPackages.dunai 0.12.2 -> 0.12.3 https://repology.org/project/haskell:dunai/versions attrpath: haskellPackages.dunai Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update haskellPackages.dunai 0.12.2 -> 0.12.3 https://repology.org/project/haskell:dunai/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.PropScrRand, using log file: /var/log/nixpkgs-update/rPackages.PropScrRand/2024-04-29.log rPackages.PropScrRand 1.1.1 -> 1.1.2 https://repology.org/project/r:propscrrand/versions attrpath: rPackages.PropScrRand Checking auto update branch... No auto update branch exists Old version 1.1.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.PropScrRand 1.1.1 -> 1.1.2 https://repology.org/project/r:propscrrand/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.bindata, using log file: /var/log/nixpkgs-update/rPackages.bindata/2024-04-29.log rPackages.bindata 0.9-20 -> 0.9-21 https://repology.org/project/r:bindata/versions attrpath: rPackages.bindata Checking auto update branch... No auto update branch exists Old version 0.9-20" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.bindata 0.9-20 -> 0.9-21 https://repology.org/project/r:bindata/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.envir, using log file: /var/log/nixpkgs-update/rPackages.envir/2024-04-29.log rPackages.envir 0.2.2 -> 0.3.0 https://repology.org/project/r:envir/versions attrpath: rPackages.envir Checking auto update branch... No auto update branch exists Old version 0.2.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.envir 0.2.2 -> 0.3.0 https://repology.org/project/r:envir/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.pyqt6, using log file: /var/log/nixpkgs-update/python312Packages.pyqt6/2024-04-29.log python312Packages.pyqt6 6.7.0.dev2404081550 -> 6.7.0 https://repology.org/project/python:pyqt6/versions attrpath: python312Packages.pyqt6 isn't the default python version [result] Failed to update python312Packages.pyqt6 6.7.0.dev2404081550 -> 6.7.0 https://repology.org/project/python:pyqt6/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.ggfortify, using log file: /var/log/nixpkgs-update/rPackages.ggfortify/2024-04-29.log rPackages.ggfortify 0.4.16 -> 0.4.17 https://repology.org/project/r:ggfortify/versions attrpath: rPackages.ggfortify Checking auto update branch... No auto update branch exists Old version 0.4.16" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.ggfortify 0.4.16 -> 0.4.17 https://repology.org/project/r:ggfortify/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath xboxdrv, using log file: /var/log/nixpkgs-update/xboxdrv/2024-04-29.log xboxdrv 0.8.8 -> 0.8.9 https://repology.org/project/xboxdrv/versions attrpath: xboxdrv Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/30xhnfhff8s4z5dj0zx30v7c90blc6m0-source.drv building '/nix/store/30xhnfhff8s4z5dj0zx30v7c90blc6m0-source.drv'... trying https://github.com/xboxdrv/xboxdrv/archive/v0.8.9.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (56) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/30xhnfhff8s4z5dj0zx30v7c90blc6m0-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/xboxdrv/xboxdrv/archive/v0.8.9.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (56) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/30xhnfhff8s4z5dj0zx30v7c90blc6m0-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'xboxdrv.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/30xhnfhff8s4z5dj0zx30v7c90blc6m0-source.drv /nix/store/yhrhqkbgai047cav2g7661xhp1mx16j2-xboxdrv-0.8.9.drv building '/nix/store/30xhnfhff8s4z5dj0zx30v7c90blc6m0-source.drv'... trying https://github.com/xboxdrv/xboxdrv/archive/v0.8.9.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (56) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/30xhnfhff8s4z5dj0zx30v7c90blc6m0-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/xboxdrv/xboxdrv/archive/v0.8.9.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (56) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/30xhnfhff8s4z5dj0zx30v7c90blc6m0-source.drv'. error: 1 dependencies of derivation '/nix/store/yhrhqkbgai047cav2g7661xhp1mx16j2-xboxdrv-0.8.9.drv' failed to build [result] Failed to update xboxdrv 0.8.8 -> 0.8.9 https://repology.org/project/xboxdrv/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.crc32c_0_2_0, using log file: /var/log/nixpkgs-update/haskellPackages.crc32c_0_2_0/2024-04-29.log haskellPackages.crc32c_0_2_0 0.2.0 -> 0.2.1 https://repology.org/project/haskell:crc32c/versions attrpath: haskellPackages.crc32c_0_2_0 Checking auto update branch... No auto update branch exists Version in attr path haskellPackages.crc32c_0_2_0 not compatible with 0.2.1 [result] Failed to update haskellPackages.crc32c_0_2_0 0.2.0 -> 0.2.1 https://repology.org/project/haskell:crc32c/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.yatah, using log file: /var/log/nixpkgs-update/rPackages.yatah/2024-04-29.log rPackages.yatah 0.2.1 -> 1.0.0 https://repology.org/project/r:yatah/versions attrpath: rPackages.yatah Checking auto update branch... No auto update branch exists Old version 0.2.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.yatah 0.2.1 -> 1.0.0 https://repology.org/project/r:yatah/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.arcs, using log file: /var/log/nixpkgs-update/texlivePackages.arcs/2024-04-29.log texlivePackages.arcs 1 -> 1.2.5 https://repology.org/project/arcs/versions attrpath: texlivePackages.arcs Checking auto update branch... No auto update branch exists Old version 1" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.arcs 1 -> 1.2.5 https://repology.org/project/arcs/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.msrestazure, using log file: /var/log/nixpkgs-update/python312Packages.msrestazure/2024-04-29.log python312Packages.msrestazure 0.6.4 -> 0.6.4.post1 https://repology.org/project/python:msrestazure/versions attrpath: python312Packages.msrestazure isn't the default python version [result] Failed to update python312Packages.msrestazure 0.6.4 -> 0.6.4.post1 https://repology.org/project/python:msrestazure/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.rattletrap, using log file: /var/log/nixpkgs-update/haskellPackages.rattletrap/2024-04-29.log haskellPackages.rattletrap 12.1.3 -> 13.0.2 https://repology.org/project/haskell:rattletrap/versions attrpath: haskellPackages.rattletrap Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update haskellPackages.rattletrap 12.1.3 -> 13.0.2 https://repology.org/project/haskell:rattletrap/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.SIAmodules, using log file: /var/log/nixpkgs-update/rPackages.SIAmodules/2024-04-29.log rPackages.SIAmodules 0.1.0 -> 0.1.1 https://repology.org/project/r:siamodules/versions attrpath: rPackages.SIAmodules Checking auto update branch... No auto update branch exists Old version 0.1.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.SIAmodules 0.1.0 -> 0.1.1 https://repology.org/project/r:siamodules/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath selene, using log file: /var/log/nixpkgs-update/selene/2024-04-29.log selene 0.26.1 -> 0.27.1 https://repology.org/project/selene-linter/versions attrpath: selene Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] Replacing cargoHash with sha256-e3oQUFtgdjqPiB2YpmqnFUG2scmYJhLSpUaw0W6RxIk= [rustCrateVersion] Finished updating Crate version and replacing hashes [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/tools/selene/default.nix b/pkgs/development/tools/selene/default.nix index b464bee86e06..0bd600423b31 100644 --- a/pkgs/development/tools/selene/default.nix +++ b/pkgs/development/tools/selene/default.nix @@ -10,16 +10,16 @@ rustPlatform.buildRustPackage rec { pname = "selene"; - version = "0.26.1"; + version = "0.27.1"; src = fetchFromGitHub { owner = "kampfkarren"; repo = pname; rev = version; - sha256 = "sha256-0imHwZNyhJXFai1J5tHqnQ6Ta10nETQ5TILGH0bHc8Y="; + sha256 = "sha256-NbVSFYv3nyEjSf0bFajcMaoWP2bS0EfJT8tDddjS7jg="; }; - cargoHash = "sha256-Lm3agCnxDxcj7op17uiokK8Y790oMxwHJStvP/9DsI0="; + cargoHash = "sha256-e3oQUFtgdjqPiB2YpmqnFUG2scmYJhLSpUaw0W6RxIk="; nativeBuildInputs = lib.optionals robloxSupport [ pkg-config [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/4mkcvf5b5g60jzxi2sphzk218qaanyav-selene-0.27.1" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/selene-linter/versions. meta.description for selene is: A blazing-fast modern Lua linter written in Rust meta.homepage for selene is: https://github.com/kampfkarren/selene meta.changelog for selene is: https://github.com/kampfkarren/selene/blob/0.27.1/CHANGELOG.md ###### Updates performed - Rust version update ###### To inspect upstream changes - [Release on GitHub](https://github.com/Kampfkarren/selene/releases/tag/0.27.1) - [Compare changes on GitHub](https://github.com/kampfkarren/selene/compare/0.26.1...0.27.1) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.27.1 with grep in /nix/store/4mkcvf5b5g60jzxi2sphzk218qaanyav-selene-0.27.1 - found 0.27.1 in filename of file in /nix/store/4mkcvf5b5g60jzxi2sphzk218qaanyav-selene-0.27.1 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath selene ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/4mkcvf5b5g60jzxi2sphzk218qaanyav-selene-0.27.1 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A selene https://github.com/r-ryantm/nixpkgs/archive/16ed583742fbd6ce33c55b49470a6065cc00c0dd.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/16ed583742fbd6ce33c55b49470a6065cc00c0dd#selene ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/4mkcvf5b5g60jzxi2sphzk218qaanyav-selene-0.27.1 ls -la /nix/store/4mkcvf5b5g60jzxi2sphzk218qaanyav-selene-0.27.1/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @figsoda for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307621 [result] Success updating selene 0.26.1 -> 0.27.1 https://repology.org/project/selene-linter/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath makebootfat, using log file: /var/log/nixpkgs-update/makebootfat/2024-04-29.log makebootfat 1.4 -> 1.6 https://repology.org/project/makebootfat/versions attrpath: makebootfat Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/gh887mjzham91pza55fa5ysw47ppih80-makebootfat-1.6.tar.gz.drv building '/nix/store/gh887mjzham91pza55fa5ysw47ppih80-makebootfat-1.6.tar.gz.drv'... trying https://downloads.sourceforge.net/advancemame/makebootfat-1.6.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 154 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (56) The requested URL returned error: 404 trying https://prdownloads.sourceforge.net/advancemame/makebootfat-1.6.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (56) The requested URL returned error: 404 trying https://netcologne.dl.sourceforge.net/sourceforge/advancemame/makebootfat-1.6.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 138 100 138 0 0 816 0 --:--:-- --:--:-- --:--:-- 821 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (56) The requested URL returned error: 404 trying https://versaweb.dl.sourceforge.net/sourceforge/advancemame/makebootfat-1.6.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 154 100 154 0 0 199 0 --:--:-- --:--:-- --:--:-- 199 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (56) The requested URL returned error: 404 trying https://freefr.dl.sourceforge.net/sourceforge/advancemame/makebootfat-1.6.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 316 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (56) The requested URL returned error: 404 trying https://osdn.dl.sourceforge.net/sourceforge/advancemame/makebootfat-1.6.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL: no alternative certificate subject name matches target host name 'osdn.dl.sourceforge.net' More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. error: cannot download makebootfat-1.6.tar.gz from any mirror error: builder for '/nix/store/gh887mjzham91pza55fa5ysw47ppih80-makebootfat-1.6.tar.gz.drv' failed with exit code 1; last 25 log lines: > trying https://versaweb.dl.sourceforge.net/sourceforge/advancemame/makebootfat-1.6.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 100 154 100 154 0 0 199 0 --:--:-- --:--:-- --:--:-- 199 > 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 > curl: (56) The requested URL returned error: 404 > > trying https://freefr.dl.sourceforge.net/sourceforge/advancemame/makebootfat-1.6.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 316 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 > curl: (56) The requested URL returned error: 404 > > trying https://osdn.dl.sourceforge.net/sourceforge/advancemame/makebootfat-1.6.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (60) SSL: no alternative certificate subject name matches target host name 'osdn.dl.sourceforge.net' > More details here: https://curl.se/docs/sslcerts.html > > curl failed to verify the legitimacy of the server and therefore could not > establish a secure connection to it. To learn more about this situation and > how to fix it, please visit the web page mentioned above. > error: cannot download makebootfat-1.6.tar.gz from any mirror For full logs, run 'nix log /nix/store/gh887mjzham91pza55fa5ysw47ppih80-makebootfat-1.6.tar.gz.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'makebootfat.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/gh887mjzham91pza55fa5ysw47ppih80-makebootfat-1.6.tar.gz.drv /nix/store/ri4klwrmiv7pgp3d631v1jgma9xd5jhx-makebootfat-1.6.drv building '/nix/store/gh887mjzham91pza55fa5ysw47ppih80-makebootfat-1.6.tar.gz.drv'... trying https://downloads.sourceforge.net/advancemame/makebootfat-1.6.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 154 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (56) The requested URL returned error: 404 trying https://prdownloads.sourceforge.net/advancemame/makebootfat-1.6.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (56) The requested URL returned error: 404 trying https://netcologne.dl.sourceforge.net/sourceforge/advancemame/makebootfat-1.6.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 138 100 138 0 0 1290 0 --:--:-- --:--:-- --:--:-- 1301 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (56) The requested URL returned error: 404 trying https://versaweb.dl.sourceforge.net/sourceforge/advancemame/makebootfat-1.6.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 154 100 154 0 0 210 0 --:--:-- --:--:-- --:--:-- 210 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (56) The requested URL returned error: 404 trying https://freefr.dl.sourceforge.net/sourceforge/advancemame/makebootfat-1.6.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 316 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (56) The requested URL returned error: 404 trying https://osdn.dl.sourceforge.net/sourceforge/advancemame/makebootfat-1.6.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL: no alternative certificate subject name matches target host name 'osdn.dl.sourceforge.net' More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. error: cannot download makebootfat-1.6.tar.gz from any mirror error: builder for '/nix/store/gh887mjzham91pza55fa5ysw47ppih80-makebootfat-1.6.tar.gz.drv' failed with exit code 1; last 25 log lines: > trying https://versaweb.dl.sourceforge.net/sourceforge/advancemame/makebootfat-1.6.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 100 154 100 154 0 0 210 0 --:--:-- --:--:-- --:--:-- 210 > 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 > curl: (56) The requested URL returned error: 404 > > trying https://freefr.dl.sourceforge.net/sourceforge/advancemame/makebootfat-1.6.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 316 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 154 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 > curl: (56) The requested URL returned error: 404 > > trying https://osdn.dl.sourceforge.net/sourceforge/advancemame/makebootfat-1.6.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (60) SSL: no alternative certificate subject name matches target host name 'osdn.dl.sourceforge.net' > More details here: https://curl.se/docs/sslcerts.html > > curl failed to verify the legitimacy of the server and therefore could not > establish a secure connection to it. To learn more about this situation and > how to fix it, please visit the web page mentioned above. > error: cannot download makebootfat-1.6.tar.gz from any mirror For full logs, run 'nix log /nix/store/gh887mjzham91pza55fa5ysw47ppih80-makebootfat-1.6.tar.gz.drv'. error: 1 dependencies of derivation '/nix/store/ri4klwrmiv7pgp3d631v1jgma9xd5jhx-makebootfat-1.6.drv' failed to build [result] Failed to update makebootfat 1.4 -> 1.6 https://repology.org/project/makebootfat/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.AQEval, using log file: /var/log/nixpkgs-update/rPackages.AQEval/2024-04-29.log rPackages.AQEval 0.5.2 -> 0.5.7 https://repology.org/project/r:aqeval/versions attrpath: rPackages.AQEval Checking auto update branch... No auto update branch exists Old version 0.5.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.AQEval 0.5.2 -> 0.5.7 https://repology.org/project/r:aqeval/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.hpc-codecov, using log file: /var/log/nixpkgs-update/haskellPackages.hpc-codecov/2024-04-29.log haskellPackages.hpc-codecov 0.5.0.0 -> 0.6.0.0 https://repology.org/project/haskell:hpc-codecov/versions attrpath: haskellPackages.hpc-codecov Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update haskellPackages.hpc-codecov 0.5.0.0 -> 0.6.0.0 https://repology.org/project/haskell:hpc-codecov/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.rutledge, using log file: /var/log/nixpkgs-update/rPackages.rutledge/2024-04-29.log rPackages.rutledge 0.1.0 -> 0.1.1 https://repology.org/project/r:rutledge/versions attrpath: rPackages.rutledge Checking auto update branch... No auto update branch exists Old version 0.1.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.rutledge 0.1.0 -> 0.1.1 https://repology.org/project/r:rutledge/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.NEONiso, using log file: /var/log/nixpkgs-update/rPackages.NEONiso/2024-04-29.log rPackages.NEONiso 0.6.4 -> 0.7.0 https://repology.org/project/r:neoniso/versions attrpath: rPackages.NEONiso Checking auto update branch... No auto update branch exists Old version 0.6.4" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.NEONiso 0.6.4 -> 0.7.0 https://repology.org/project/r:neoniso/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.admix, using log file: /var/log/nixpkgs-update/rPackages.admix/2024-04-29.log rPackages.admix 2.1-2 -> 2.1-3 https://repology.org/project/r:admix/versions attrpath: rPackages.admix Checking auto update branch... No auto update branch exists Old version 2.1-2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.admix 2.1-2 -> 2.1-3 https://repology.org/project/r:admix/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.bech32-th, using log file: /var/log/nixpkgs-update/haskellPackages.bech32-th/2024-04-29.log haskellPackages.bech32-th 1.1.5 -> 1.1.6 https://repology.org/project/haskell:bech32-th/versions attrpath: haskellPackages.bech32-th Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update haskellPackages.bech32-th 1.1.5 -> 1.1.6 https://repology.org/project/haskell:bech32-th/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath why3, using log file: /var/log/nixpkgs-update/why3/2024-04-29.log why3 1.7.1 -> 1.7.2 https://repology.org/project/why3/versions attrpath: why3 Checking auto update branch... No auto update branch exists There might already be an open PR for this update: - why3: 1.7.1 → 1.7.2 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/306092" [result] Failed to update why3 1.7.1 -> 1.7.2 https://repology.org/project/why3/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.pipenostics, using log file: /var/log/nixpkgs-update/rPackages.pipenostics/2024-04-29.log rPackages.pipenostics 0.1.7 -> 0.2.0 https://repology.org/project/r:pipenostics/versions attrpath: rPackages.pipenostics Checking auto update branch... No auto update branch exists Old version 0.1.7" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.pipenostics 0.1.7 -> 0.2.0 https://repology.org/project/r:pipenostics/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.decli, using log file: /var/log/nixpkgs-update/python312Packages.decli/2024-04-29.log python312Packages.decli 0.6.1 -> 0.6.2 https://repology.org/project/python:decli/versions attrpath: python312Packages.decli isn't the default python version [result] Failed to update python312Packages.decli 0.6.1 -> 0.6.2 https://repology.org/project/python:decli/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rrsync, using log file: /var/log/nixpkgs-update/rrsync/2024-04-29.log rrsync 3.2.7 -> 3.3.0 https://repology.org/project/rsync/versions attrpath: rrsync Checking auto update branch... No auto update branch exists Old version 3.2.7" not present in master derivation file with contents: { stdenv, python3, rsync }: stdenv.mkDerivation { pname = "rrsync"; inherit (rsync) version src; buildInputs = [ rsync (python3.withPackages (pythonPackages: with pythonPackages; [ braceexpand ])) ]; # Skip configure and build phases. # We just want something from the support directory dontConfigure = true; dontBuild = true; inherit (rsync) patches; postPatch = '' substituteInPlace support/rrsync --replace /usr/bin/rsync ${rsync}/bin/rsync ''; installPhase = '' mkdir -p $out/bin cp support/rrsync $out/bin chmod a+x $out/bin/rrsync ''; meta = rsync.meta // { description = "A helper to run rsync-only environments from ssh-logins"; }; } [result] Failed to update rrsync 3.2.7 -> 3.3.0 https://repology.org/project/rsync/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.r2shortcode, using log file: /var/log/nixpkgs-update/rPackages.r2shortcode/2024-04-29.log rPackages.r2shortcode 0.1 -> 0.2 https://repology.org/project/r:r2shortcode/versions attrpath: rPackages.r2shortcode Checking auto update branch... No auto update branch exists Old version 0.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.r2shortcode 0.1 -> 0.2 https://repology.org/project/r:r2shortcode/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.xindy, using log file: /var/log/nixpkgs-update/texlivePackages.xindy/2024-04-29.log texlivePackages.xindy 2.5.1 -> 2.5.1.20160104 https://repology.org/project/xindy/versions attrpath: texlivePackages.xindy Checking auto update branch... No auto update branch exists Old version 2.5.1" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.xindy 2.5.1 -> 2.5.1.20160104 https://repology.org/project/xindy/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.AgroR, using log file: /var/log/nixpkgs-update/rPackages.AgroR/2024-04-29.log rPackages.AgroR 1.3.5 -> 1.3.6 https://repology.org/project/r:agror/versions attrpath: rPackages.AgroR Checking auto update branch... No auto update branch exists Old version 1.3.5" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.AgroR 1.3.5 -> 1.3.6 https://repology.org/project/r:agror/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.baRulho, using log file: /var/log/nixpkgs-update/rPackages.baRulho/2024-04-29.log rPackages.baRulho 1.0.6 -> 2.1.0 https://repology.org/project/r:barulho/versions attrpath: rPackages.baRulho Checking auto update branch... No auto update branch exists Old version 1.0.6" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.baRulho 1.0.6 -> 2.1.0 https://repology.org/project/r:barulho/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.latexmk, using log file: /var/log/nixpkgs-update/texlivePackages.latexmk/2024-04-29.log texlivePackages.latexmk 4.83 -> 4.85 https://repology.org/project/latexmk/versions attrpath: texlivePackages.latexmk Checking auto update branch... No auto update branch exists Old version 4.83" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.latexmk 4.83 -> 4.85 https://repology.org/project/latexmk/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.tourr, using log file: /var/log/nixpkgs-update/rPackages.tourr/2024-04-29.log rPackages.tourr 1.1.0 -> 1.2.0 https://repology.org/project/r:tourr/versions attrpath: rPackages.tourr Checking auto update branch... No auto update branch exists Old version 1.1.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.tourr 1.1.0 -> 1.2.0 https://repology.org/project/r:tourr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath fabric-installer, using log file: /var/log/nixpkgs-update/fabric-installer/2024-04-29.log fabric-installer 1.0.0 -> 1.0.1 https://repology.org/project/fabric-installer/versions attrpath: fabric-installer Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/tools/games/minecraft/fabric-installer/default.nix b/pkgs/tools/games/minecraft/fabric-installer/default.nix index 4a11a08a42e6..bbec1d40d09c 100644 --- a/pkgs/tools/games/minecraft/fabric-installer/default.nix +++ b/pkgs/tools/games/minecraft/fabric-installer/default.nix @@ -6,11 +6,11 @@ stdenv.mkDerivation rec { pname = "fabric-installer"; - version = "1.0.0"; + version = "1.0.1"; src = fetchurl { url = "https://maven.fabricmc.net/net/fabricmc/fabric-installer/${version}/fabric-installer-${version}.jar"; - sha256 = "sha256-fX5bHTp/jiCBBpiY6V3HHYS7Olx5yyNcA0iVFzz9NHs="; + sha256 = "sha256-Yu3xcL3MQe3qhdM6zz64VHQlhpmz1B+UGNKGyDbLCI0="; }; dontUnpack = true; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/gdckmhxhb56p88mr0gsnh06lnk6kfvww-fabric-installer-1.0.1" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/fabric-installer/versions. meta.description for fabric-installer is: A lightweight, experimental modding toolchain for Minecraft meta.homepage for fabric-installer is: https://fabricmc.net/ ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 1.0.1 in filename of file in /nix/store/gdckmhxhb56p88mr0gsnh06lnk6kfvww-fabric-installer-1.0.1 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath fabric-installer ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/gdckmhxhb56p88mr0gsnh06lnk6kfvww-fabric-installer-1.0.1 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A fabric-installer https://github.com/r-ryantm/nixpkgs/archive/0e7581ae3b415b16de5593cd754dcd6fecc270d6.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/0e7581ae3b415b16de5593cd754dcd6fecc270d6#fabric-installer ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/gdckmhxhb56p88mr0gsnh06lnk6kfvww-fabric-installer-1.0.1 ls -la /nix/store/gdckmhxhb56p88mr0gsnh06lnk6kfvww-fabric-installer-1.0.1/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @IvarWithoutBones for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307627 [result] Success updating fabric-installer 1.0.0 -> 1.0.1 https://repology.org/project/fabric-installer/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.parso, using log file: /var/log/nixpkgs-update/python312Packages.parso/2024-04-29.log python312Packages.parso 0.8.3 -> 0.8.4 https://repology.org/project/python:parso/versions attrpath: python312Packages.parso isn't the default python version [result] Failed to update python312Packages.parso 0.8.3 -> 0.8.4 https://repology.org/project/python:parso/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.CAST, using log file: /var/log/nixpkgs-update/rPackages.CAST/2024-04-29.log rPackages.CAST 0.9.0 -> 1.0.1 https://repology.org/project/r:cast/versions attrpath: rPackages.CAST Checking auto update branch... No auto update branch exists Old version 0.9.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.CAST 0.9.0 -> 1.0.1 https://repology.org/project/r:cast/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath kshutdown, using log file: /var/log/nixpkgs-update/kshutdown/2024-04-29.log kshutdown 5.91-beta -> 5.91 https://repology.org/project/kshutdown/versions attrpath: kshutdown Checking auto update branch... No auto update branch exists 5.91 is not newer than 5.91-beta according to Nix; versionComparison: -1 [result] Failed to update kshutdown 5.91-beta -> 5.91 https://repology.org/project/kshutdown/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.tolerance, using log file: /var/log/nixpkgs-update/rPackages.tolerance/2024-04-29.log rPackages.tolerance 2.0.0 -> 3.0.0 https://repology.org/project/r:tolerance/versions attrpath: rPackages.tolerance Checking auto update branch... No auto update branch exists Old version 2.0.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.tolerance 2.0.0 -> 3.0.0 https://repology.org/project/r:tolerance/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gretl, using log file: /var/log/nixpkgs-update/gretl/2024-04-29.log gretl 2023c -> 2024a https://repology.org/project/gretl/versions attrpath: gretl Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/applications/science/math/gretl/default.nix b/pkgs/applications/science/math/gretl/default.nix index 2c3963cecec9..552639de6c53 100644 --- a/pkgs/applications/science/math/gretl/default.nix +++ b/pkgs/applications/science/math/gretl/default.nix @@ -19,11 +19,11 @@ stdenv.mkDerivation (finalAttrs: { pname = "gretl"; - version = "2023c"; + version = "2024a"; src = fetchurl { url = "mirror://sourceforge/gretl/gretl-${finalAttrs.version}.tar.xz"; - hash = "sha256-vTxCmHrTpYTo9CIPousUCnpcalS6cN1u8bRaOJyu6MI="; + hash = "sha256-6ha0d/n75Xf0hZM0GRHLOnM274P1h2MerB/8SHWTh+o="; }; buildInputs = [ [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/apn6w3ifbzngzrwqbfznbb6cmgrr6sdm-gretl-2024a" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/gretl/versions. meta.description for gretl is: A software package for econometric analysis meta.homepage for gretl is: https://gretl.sourceforge.net ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 2024a with grep in /nix/store/apn6w3ifbzngzrwqbfznbb6cmgrr6sdm-gretl-2024a - found 2024a in filename of file in /nix/store/apn6w3ifbzngzrwqbfznbb6cmgrr6sdm-gretl-2024a ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath gretl ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/apn6w3ifbzngzrwqbfznbb6cmgrr6sdm-gretl-2024a \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A gretl https://github.com/r-ryantm/nixpkgs/archive/69c0d7e88ff031181142cb1bb987e42369338c99.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/69c0d7e88ff031181142cb1bb987e42369338c99#gretl ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/apn6w3ifbzngzrwqbfznbb6cmgrr6sdm-gretl-2024a ls -la /nix/store/apn6w3ifbzngzrwqbfznbb6cmgrr6sdm-gretl-2024a/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @dmrauh for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307629 [result] Success updating gretl 2023c -> 2024a https://repology.org/project/gretl/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.upmendex, using log file: /var/log/nixpkgs-update/texlivePackages.upmendex/2024-04-29.log texlivePackages.upmendex 1.07 -> 1.08 https://repology.org/project/upmendex/versions attrpath: texlivePackages.upmendex Checking auto update branch... No auto update branch exists Old version 1.07" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.upmendex 1.07 -> 1.08 https://repology.org/project/upmendex/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.bluefin, using log file: /var/log/nixpkgs-update/haskellPackages.bluefin/2024-04-29.log haskellPackages.bluefin 0.0.4.2 -> 0.0.6.0 https://repology.org/project/haskell:bluefin/versions attrpath: haskellPackages.bluefin Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update haskellPackages.bluefin 0.0.4.2 -> 0.0.6.0 https://repology.org/project/haskell:bluefin/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.tds, using log file: /var/log/nixpkgs-update/texlivePackages.tds/2024-04-29.log texlivePackages.tds 1.1 -> 1.4.2 https://repology.org/project/tds/versions attrpath: texlivePackages.tds Checking auto update branch... No auto update branch exists Old version 1.1" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.tds 1.1 -> 1.4.2 https://repology.org/project/tds/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath google-authenticator, using log file: /var/log/nixpkgs-update/google-authenticator/2024-04-29.log google-authenticator 1.09 -> 1.10 https://repology.org/project/google-authenticator-libpam/versions attrpath: google-authenticator Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/os-specific/linux/google-authenticator/default.nix b/pkgs/os-specific/linux/google-authenticator/default.nix index 02ca3d30d238..11791a664c8b 100644 --- a/pkgs/os-specific/linux/google-authenticator/default.nix +++ b/pkgs/os-specific/linux/google-authenticator/default.nix @@ -2,13 +2,13 @@ stdenv.mkDerivation rec { pname = "google-authenticator-libpam"; - version = "1.09"; + version = "1.10"; src = fetchFromGitHub { owner = "google"; repo = "google-authenticator-libpam"; rev = version; - hash = "sha256-DS0h6FWMNKnSSj039bH6iyWrERa5M7LBSkbyig6pyxY="; + hash = "sha256-KEfwQeJIuRF+S3gPn+maDb8Fu0FRXLs2/Nlbjj2d3AE="; }; nativeBuildInputs = [ autoreconfHook ]; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/5xl3sikh9i4nlk9iyw8i55f8dmqys64n-google-authenticator-libpam-1.10" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/google-authenticator-libpam/versions. meta.description for google-authenticator is: Two-step verification, with pam module meta.homepage for google-authenticator is: https://github.com/google/google-authenticator-libpam ###### Updates performed - Version update ###### To inspect upstream changes - [Compare changes on GitHub](https://github.com/google/google-authenticator-libpam/compare/1.09...1.10) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 1.10 with grep in /nix/store/5xl3sikh9i4nlk9iyw8i55f8dmqys64n-google-authenticator-libpam-1.10 - found 1.10 in filename of file in /nix/store/5xl3sikh9i4nlk9iyw8i55f8dmqys64n-google-authenticator-libpam-1.10 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath google-authenticator ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/5xl3sikh9i4nlk9iyw8i55f8dmqys64n-google-authenticator-libpam-1.10 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A google-authenticator https://github.com/r-ryantm/nixpkgs/archive/f673a78c48ad0d031cea649be34bda9161f1576e.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/f673a78c48ad0d031cea649be34bda9161f1576e#google-authenticator ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/5xl3sikh9i4nlk9iyw8i55f8dmqys64n-google-authenticator-libpam-1.10 ls -la /nix/store/5xl3sikh9i4nlk9iyw8i55f8dmqys64n-google-authenticator-libpam-1.10/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @aneeshusa for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307632 [result] Success updating google-authenticator 1.09 -> 1.10 https://repology.org/project/google-authenticator-libpam/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath yubihsm-shell, using log file: /var/log/nixpkgs-update/yubihsm-shell/2024-04-29.log yubihsm-shell 2.4.2 -> 2.5.0 https://repology.org/project/yubihsm-shell/versions attrpath: yubihsm-shell Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/tools/security/yubihsm-shell/default.nix b/pkgs/tools/security/yubihsm-shell/default.nix index 24d96f43ba43..3302b26bfb90 100644 --- a/pkgs/tools/security/yubihsm-shell/default.nix +++ b/pkgs/tools/security/yubihsm-shell/default.nix @@ -16,13 +16,13 @@ stdenv.mkDerivation rec { pname = "yubihsm-shell"; - version = "2.4.2"; + version = "2.5.0"; src = fetchFromGitHub { owner = "Yubico"; repo = "yubihsm-shell"; rev = version; - hash = "sha256-Un3DNmrD9aC9+A3+NNM21yrH1g14THXPHkJ0SUYrL/M="; + hash = "sha256-QTDFL/UTnnG0TuojJ0eVKw8fNEqZz86CXWb6uHvzUbs="; }; postPatch = '' [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/62p5qpafdyzzk11yhih9mi6j6hlp0skr-yubihsm-shell-2.5.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
2 packages built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/yubihsm-shell/versions. meta.description for yubihsm-shell is: yubihsm-shell and libyubihsm meta.homepage for yubihsm-shell is: https://github.com/Yubico/yubihsm-shell ###### Updates performed - Version update ###### To inspect upstream changes - [Compare changes on GitHub](https://github.com/Yubico/yubihsm-shell/compare/2.4.2...2.5.0) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 2.5.0 with grep in /nix/store/62p5qpafdyzzk11yhih9mi6j6hlp0skr-yubihsm-shell-2.5.0 - found 2.5.0 in filename of file in /nix/store/62p5qpafdyzzk11yhih9mi6j6hlp0skr-yubihsm-shell-2.5.0 ---
Rebuild report (if merged into master) (click to expand) ``` 3 total rebuild path(s) 3 package rebuild(s) First fifty rebuilds by attrpath step-kms-plugin yubihsm-shell ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/62p5qpafdyzzk11yhih9mi6j6hlp0skr-yubihsm-shell-2.5.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A yubihsm-shell https://github.com/r-ryantm/nixpkgs/archive/d64a20edc48371953bb59b4213227710d9f13682.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/d64a20edc48371953bb59b4213227710d9f13682#yubihsm-shell ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/62p5qpafdyzzk11yhih9mi6j6hlp0skr-yubihsm-shell-2.5.0 ls -la /nix/store/62p5qpafdyzzk11yhih9mi6j6hlp0skr-yubihsm-shell-2.5.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
2 packages built:
--- ###### Maintainer pings cc @MatthewCroughan for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307635 [result] Success updating yubihsm-shell 2.4.2 -> 2.5.0 https://repology.org/project/yubihsm-shell/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.cheapr, using log file: /var/log/nixpkgs-update/rPackages.cheapr/2024-04-29.log rPackages.cheapr 0.3.0 -> 0.9.0 https://repology.org/project/r:cheapr/versions attrpath: rPackages.cheapr Checking auto update branch... No auto update branch exists Old version 0.3.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.cheapr 0.3.0 -> 0.9.0 https://repology.org/project/r:cheapr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.pamr, using log file: /var/log/nixpkgs-update/rPackages.pamr/2024-04-29.log rPackages.pamr 1.56.1 -> 1.56.2 https://repology.org/project/r:pamr/versions attrpath: rPackages.pamr Checking auto update branch... No auto update branch exists Old version 1.56.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.pamr 1.56.1 -> 1.56.2 https://repology.org/project/r:pamr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.grid, using log file: /var/log/nixpkgs-update/texlivePackages.grid/2024-04-29.log texlivePackages.grid 1.0 -> 1.4 https://repology.org/project/grid/versions attrpath: texlivePackages.grid Checking auto update branch... No auto update branch exists Old version 1.0" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.grid 1.0 -> 1.4 https://repology.org/project/grid/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.randtests, using log file: /var/log/nixpkgs-update/rPackages.randtests/2024-04-29.log rPackages.randtests 1.0.1 -> 1.0.2 https://repology.org/project/r:randtests/versions attrpath: rPackages.randtests Checking auto update branch... No auto update branch exists Old version 1.0.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.randtests 1.0.1 -> 1.0.2 https://repology.org/project/r:randtests/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.text-show, using log file: /var/log/nixpkgs-update/haskellPackages.text-show/2024-04-29.log haskellPackages.text-show 3.10.4 -> 3.10.5 https://repology.org/project/haskell:text-show/versions attrpath: haskellPackages.text-show Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update haskellPackages.text-show 3.10.4 -> 3.10.5 https://repology.org/project/haskell:text-show/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.DelayedMatrixStats, using log file: /var/log/nixpkgs-update/rPackages.DelayedMatrixStats/2024-04-29.log rPackages.DelayedMatrixStats 1.24.0 -> 1.25.3 https://repology.org/project/r:delayedmatrixstats/versions attrpath: rPackages.DelayedMatrixStats Checking auto update branch... No auto update branch exists Old version 1.24.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.DelayedMatrixStats 1.24.0 -> 1.25.3 https://repology.org/project/r:delayedmatrixstats/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.paran, using log file: /var/log/nixpkgs-update/rPackages.paran/2024-04-29.log rPackages.paran 1.5.2 -> 1.5.3 https://repology.org/project/r:paran/versions attrpath: rPackages.paran Checking auto update branch... No auto update branch exists Old version 1.5.2" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.paran 1.5.2 -> 1.5.3 https://repology.org/project/r:paran/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.shuffle, using log file: /var/log/nixpkgs-update/texlivePackages.shuffle/2024-04-29.log texlivePackages.shuffle 1.0 -> 20010603 https://repology.org/project/shuffle/versions attrpath: texlivePackages.shuffle Checking auto update branch... No auto update branch exists Old version 1.0" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.shuffle 1.0 -> 20010603 https://repology.org/project/shuffle/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath kodiPackages.visualization-goom, using log file: /var/log/nixpkgs-update/kodiPackages.visualization-goom/2024-04-29.log kodiPackages.visualization-goom 20.1.1 -> 21.0.0 https://repology.org/project/kodi-visualization-goom/versions attrpath: kodiPackages.visualization-goom Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/scqxkk9db17b1np7p6464jdg5rf6pvr7-source.drv building '/nix/store/scqxkk9db17b1np7p6464jdg5rf6pvr7-source.drv'... trying https://github.com/xbmc/visualization.goom/archive/21.0.0-Omega.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (56) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/scqxkk9db17b1np7p6464jdg5rf6pvr7-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/xbmc/visualization.goom/archive/21.0.0-Omega.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (56) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/scqxkk9db17b1np7p6464jdg5rf6pvr7-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'kodiPackages.visualization-goom.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/scqxkk9db17b1np7p6464jdg5rf6pvr7-source.drv /nix/store/yqxdrjizvbcjb87qwsddkardk4vnmxr7-kodi-visualization-goom-21.0.0.drv building '/nix/store/scqxkk9db17b1np7p6464jdg5rf6pvr7-source.drv'... trying https://github.com/xbmc/visualization.goom/archive/21.0.0-Omega.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (56) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/scqxkk9db17b1np7p6464jdg5rf6pvr7-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/xbmc/visualization.goom/archive/21.0.0-Omega.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (56) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/scqxkk9db17b1np7p6464jdg5rf6pvr7-source.drv'. error: 1 dependencies of derivation '/nix/store/yqxdrjizvbcjb87qwsddkardk4vnmxr7-kodi-visualization-goom-21.0.0.drv' failed to build [result] Failed to update kodiPackages.visualization-goom 20.1.1 -> 21.0.0 https://repology.org/project/kodi-visualization-goom/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath osi, using log file: /var/log/nixpkgs-update/osi/2024-04-29.log osi 0.108.9 -> 0.108.10 https://repology.org/project/osi/versions attrpath: osi Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/libraries/science/math/osi/default.nix b/pkgs/development/libraries/science/math/osi/default.nix index a6bc5a086251..485c5322cacd 100644 --- a/pkgs/development/libraries/science/math/osi/default.nix +++ b/pkgs/development/libraries/science/math/osi/default.nix @@ -5,13 +5,13 @@ stdenv.mkDerivation rec { pname = "osi"; - version = "0.108.9"; + version = "0.108.10"; src = fetchFromGitHub { owner = "coin-or"; repo = "Osi"; rev = "releases/${version}"; - hash = "sha256-ueIa9CL4K5ygKpkMRvfuWR0emEG6omg65ZKCsConWsw="; + hash = "sha256-rHNGnnDFU9UrszjjkZQkgWCfjjBIQba6vVbK/HLpRsQ="; }; buildInputs = [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/qjpv5vnfxqlml3zapnwbfdbi4z6xj7f7-osi-0.108.10" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
7 packages built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/osi/versions. meta.description for osi is: An abstract base class to a generic linear programming (LP) solver meta.homepage for osi is: https://github.com/coin-or/Osi ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.108.10 with grep in /nix/store/qjpv5vnfxqlml3zapnwbfdbi4z6xj7f7-osi-0.108.10 - found 0.108.10 in filename of file in /nix/store/qjpv5vnfxqlml3zapnwbfdbi4z6xj7f7-osi-0.108.10 ---
Rebuild report (if merged into master) (click to expand) ``` 8 total rebuild path(s) 8 package rebuild(s) First fifty rebuilds by attrpath bonmin cgl clp fast-downward openmvg openroad osi ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/qjpv5vnfxqlml3zapnwbfdbi4z6xj7f7-osi-0.108.10 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A osi https://github.com/r-ryantm/nixpkgs/archive/bd1d6c59e3d73c2acfa8418e2922f12eacd9e843.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/bd1d6c59e3d73c2acfa8418e2922f12eacd9e843#osi ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/qjpv5vnfxqlml3zapnwbfdbi4z6xj7f7-osi-0.108.10 ls -la /nix/store/qjpv5vnfxqlml3zapnwbfdbi4z6xj7f7-osi-0.108.10/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
7 packages built:
--- ###### Maintainer pings cc @abbradar for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307640 [result] Success updating osi 0.108.9 -> 0.108.10 https://repology.org/project/osi/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.BOSO, using log file: /var/log/nixpkgs-update/rPackages.BOSO/2024-04-29.log rPackages.BOSO 1.0.3 -> 1.0.4 https://repology.org/project/r:boso/versions attrpath: rPackages.BOSO Checking auto update branch... No auto update branch exists Old version 1.0.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.BOSO 1.0.3 -> 1.0.4 https://repology.org/project/r:boso/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.grisette, using log file: /var/log/nixpkgs-update/haskellPackages.grisette/2024-04-29.log haskellPackages.grisette 0.4.1.0 -> 0.5.0.1 https://repology.org/project/haskell:grisette/versions attrpath: haskellPackages.grisette Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update haskellPackages.grisette 0.4.1.0 -> 0.5.0.1 https://repology.org/project/haskell:grisette/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath onevpl-intel-gpu, using log file: /var/log/nixpkgs-update/onevpl-intel-gpu/2024-04-29.log onevpl-intel-gpu 23.4.3 -> 24.2.1 https://repology.org/project/onevpl-intel-gpu/versions attrpath: onevpl-intel-gpu Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/by-name/on/onevpl-intel-gpu/package.nix b/pkgs/by-name/on/onevpl-intel-gpu/package.nix index 64e6f9d262f2..cb9d01f54c82 100644 --- a/pkgs/by-name/on/onevpl-intel-gpu/package.nix +++ b/pkgs/by-name/on/onevpl-intel-gpu/package.nix @@ -9,7 +9,7 @@ stdenv.mkDerivation rec { pname = "onevpl-intel-gpu"; - version = "23.4.3"; + version = "24.2.1"; outputs = [ "out" "dev" ]; @@ -17,7 +17,7 @@ stdenv.mkDerivation rec { owner = "oneapi-src"; repo = "oneVPL-intel-gpu"; rev = "intel-onevpl-${version}"; - sha256 = "sha256-oDwDMUq6JpRJH5nbANb7TJLW7HRYA9y0xZxEsoepx/U="; + sha256 = "sha256-O+6s6Dq44XImptCPEvZ6lFSHQieltmpsRTpba++iCfY="; }; nativeBuildInputs = [ cmake pkg-config ]; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/mhj7qbpryrfkrknr548cbpkf4rxjgcsh-onevpl-intel-gpu-24.2.1" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
2 packages built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/onevpl-intel-gpu/versions. meta.description for onevpl-intel-gpu is: oneAPI Video Processing Library Intel GPU implementation meta.homepage for onevpl-intel-gpu is: https://github.com/oneapi-src/oneVPL-intel-gpu meta.changelog for onevpl-intel-gpu is: https://github.com/oneapi-src/oneVPL-intel-gpu/releases/tag/intel-onevpl-24.2.1 ###### Updates performed - Version update ###### To inspect upstream changes - [Compare changes on GitHub](https://github.com/oneapi-src/oneVPL-intel-gpu/compare/intel-onevpl-23.4.3...intel-onevpl-24.2.1) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 24.2.1 with grep in /nix/store/mhj7qbpryrfkrknr548cbpkf4rxjgcsh-onevpl-intel-gpu-24.2.1 - found 24.2.1 in filename of file in /nix/store/mhj7qbpryrfkrknr548cbpkf4rxjgcsh-onevpl-intel-gpu-24.2.1 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath onevpl-intel-gpu ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/mhj7qbpryrfkrknr548cbpkf4rxjgcsh-onevpl-intel-gpu-24.2.1 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A onevpl-intel-gpu https://github.com/r-ryantm/nixpkgs/archive/5c12eeeff876c73f0623db1939d9b59af705d9e8.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/5c12eeeff876c73f0623db1939d9b59af705d9e8#onevpl-intel-gpu ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/mhj7qbpryrfkrknr548cbpkf4rxjgcsh-onevpl-intel-gpu-24.2.1 ls -la /nix/store/mhj7qbpryrfkrknr548cbpkf4rxjgcsh-onevpl-intel-gpu-24.2.1/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
2 packages built:
--- ###### Maintainer pings cc @evanrichter for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307642 [result] Success updating onevpl-intel-gpu 23.4.3 -> 24.2.1 https://repology.org/project/onevpl-intel-gpu/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath greetd.greetd, using log file: /var/log/nixpkgs-update/greetd.greetd/2024-04-29.log greetd.greetd 0.9.0 -> 0.10.0 https://repology.org/project/greetd/versions attrpath: greetd.greetd Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] Replacing cargoHash with sha256-w7V5ZBFy5MIEQKOPPgsc7XnrXsF5rEDNzUKeLPPy4P4= [rustCrateVersion] Finished updating Crate version and replacing hashes [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/applications/display-managers/greetd/default.nix b/pkgs/applications/display-managers/greetd/default.nix index 3a4d385f4f6c..6d8a5f2bda29 100644 --- a/pkgs/applications/display-managers/greetd/default.nix +++ b/pkgs/applications/display-managers/greetd/default.nix @@ -8,16 +8,16 @@ rustPlatform.buildRustPackage rec { pname = "greetd"; - version = "0.9.0"; + version = "0.10.0"; src = fetchFromSourcehut { owner = "~kennylevinsen"; repo = pname; rev = version; - sha256 = "sha256-w68iKabVVIHB+ujCd5q+L4T6+Tfqedou3wXOuMGi6aw="; + sha256 = "sha256-QFxE5c4XDOBa3rKpUFur6xOG+5m0NSCOWo7960ZWEow="; }; - cargoHash = "sha256-vn1ih4YXsltR1zdy7BzS3CSJO9Uewx/654lRTSkWV0k="; + cargoHash = "sha256-w7V5ZBFy5MIEQKOPPgsc7XnrXsF5rEDNzUKeLPPy4P4="; nativeBuildInputs = [ scdoc [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/5y61dk5yx0hkg8aq6rrv7b7wqsml175w-greetd-0.10.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/greetd/versions. meta.description for greetd.greetd is: Minimal and flexible login manager daemon meta.homepage for greetd.greetd is: https://sr.ht/~kennylevinsen/greetd/ ###### Updates performed - Rust version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.10.0 with grep in /nix/store/5y61dk5yx0hkg8aq6rrv7b7wqsml175w-greetd-0.10.0 - found 0.10.0 in filename of file in /nix/store/5y61dk5yx0hkg8aq6rrv7b7wqsml175w-greetd-0.10.0 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath greetd.greetd ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/5y61dk5yx0hkg8aq6rrv7b7wqsml175w-greetd-0.10.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A greetd.greetd https://github.com/r-ryantm/nixpkgs/archive/9e9ad7ac8be4956d81977dc0b05202dd234f83f2.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/9e9ad7ac8be4956d81977dc0b05202dd234f83f2#greetd.greetd ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/5y61dk5yx0hkg8aq6rrv7b7wqsml175w-greetd-0.10.0 ls -la /nix/store/5y61dk5yx0hkg8aq6rrv7b7wqsml175w-greetd-0.10.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @luc65r for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307646 [result] Success updating greetd.greetd 0.9.0 -> 0.10.0 https://repology.org/project/greetd/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.utxorpc-server, using log file: /var/log/nixpkgs-update/haskellPackages.utxorpc-server/2024-04-29.log haskellPackages.utxorpc-server 0.0.1.1 -> 0.0.2.0 https://repology.org/project/haskell:utxorpc-server/versions attrpath: haskellPackages.utxorpc-server Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update haskellPackages.utxorpc-server 0.0.1.1 -> 0.0.2.0 https://repology.org/project/haskell:utxorpc-server/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.simaerep, using log file: /var/log/nixpkgs-update/rPackages.simaerep/2024-04-29.log rPackages.simaerep 0.4.3 -> 0.5.0 https://repology.org/project/r:simaerep/versions attrpath: rPackages.simaerep Checking auto update branch... No auto update branch exists Old version 0.4.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.simaerep 0.4.3 -> 0.5.0 https://repology.org/project/r:simaerep/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.EigenR, using log file: /var/log/nixpkgs-update/rPackages.EigenR/2024-04-29.log rPackages.EigenR 1.2.3 -> 1.3.0 https://repology.org/project/r:eigenr/versions attrpath: rPackages.EigenR Checking auto update branch... No auto update branch exists Old version 1.2.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.EigenR 1.2.3 -> 1.3.0 https://repology.org/project/r:eigenr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.formatters, using log file: /var/log/nixpkgs-update/rPackages.formatters/2024-04-29.log rPackages.formatters 0.5.5 -> 0.5.6 https://repology.org/project/r:formatters/versions attrpath: rPackages.formatters Checking auto update branch... No auto update branch exists Old version 0.5.5" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.formatters 0.5.5 -> 0.5.6 https://repology.org/project/r:formatters/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.ars, using log file: /var/log/nixpkgs-update/rPackages.ars/2024-04-29.log rPackages.ars 0.6 -> 0.7 https://repology.org/project/r:ars/versions attrpath: rPackages.ars Checking auto update branch... No auto update branch exists Old version 0.6" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.ars 0.6 -> 0.7 https://repology.org/project/r:ars/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.execnet, using log file: /var/log/nixpkgs-update/python312Packages.execnet/2024-04-29.log python312Packages.execnet 2.0.2 -> 2.1.1 https://repology.org/project/python:execnet/versions attrpath: python312Packages.execnet isn't the default python version [result] Failed to update python312Packages.execnet 2.0.2 -> 2.1.1 https://repology.org/project/python:execnet/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.pysmi, using log file: /var/log/nixpkgs-update/python312Packages.pysmi/2024-04-29.log python312Packages.pysmi 0.3.4 -> 1.1.13 https://repology.org/project/python:pysmi/versions attrpath: python312Packages.pysmi isn't the default python version [result] Failed to update python312Packages.pysmi 0.3.4 -> 1.1.13 https://repology.org/project/python:pysmi/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.SCATEData, using log file: /var/log/nixpkgs-update/rPackages.SCATEData/2024-04-29.log rPackages.SCATEData 1.10.0 -> 1.12.0 https://repology.org/project/r:scatedata/versions attrpath: rPackages.SCATEData Checking auto update branch... No auto update branch exists Old version 1.10.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.SCATEData 1.10.0 -> 1.12.0 https://repology.org/project/r:scatedata/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.rib, using log file: /var/log/nixpkgs-update/rPackages.rib/2024-04-29.log rPackages.rib 0.19.3 -> 0.20.0 https://repology.org/project/r:rib/versions attrpath: rPackages.rib Checking auto update branch... No auto update branch exists Old version 0.19.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.rib 0.19.3 -> 0.20.0 https://repology.org/project/r:rib/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.zlib_0_7_0_0, using log file: /var/log/nixpkgs-update/haskellPackages.zlib_0_7_0_0/2024-04-29.log haskellPackages.zlib_0_7_0_0 0.7.0.0 -> 0.7.1.0 https://repology.org/project/haskell:zlib/versions attrpath: haskellPackages.zlib_0_7_0_0 Checking auto update branch... No auto update branch exists Version in attr path haskellPackages.zlib_0_7_0_0 not compatible with 0.7.1.0 [result] Failed to update haskellPackages.zlib_0_7_0_0 0.7.0.0 -> 0.7.1.0 https://repology.org/project/haskell:zlib/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.tex-gyre, using log file: /var/log/nixpkgs-update/texlivePackages.tex-gyre/2024-04-29.log texlivePackages.tex-gyre 2.501 -> 20180621 https://repology.org/project/tex-gyre/versions attrpath: texlivePackages.tex-gyre Checking auto update branch... No auto update branch exists Old version 2.501" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.tex-gyre 2.501 -> 20180621 https://repology.org/project/tex-gyre/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath wineasio, using log file: /var/log/nixpkgs-update/wineasio/2024-04-29.log wineasio 1.2.0 -> 1.2.0b https://repology.org/project/wineasio/versions attrpath: wineasio Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/9h4mdzf5dw5m2aqx2lslbbmr68la630f-source.drv building '/nix/store/9h4mdzf5dw5m2aqx2lslbbmr68la630f-source.drv'... exporting https://github.com/wineasio/wineasio.git (rev v1.2.0b) into /nix/store/bqfq4db6nwycmkdrql9igsbrayqsw3g2-source Initialized empty Git repository in /nix/store/bqfq4db6nwycmkdrql9igsbrayqsw3g2-source/.git/ fatal: couldn't find remote ref refs/tags/v1.2.0b remote: Enumerating objects: 26, done. remote: Counting objects: 100% (26/26), done. remote: Compressing objects: 100% (26/26), done. remote: Total 26 (delta 0), reused 15 (delta 0), pack-reused 0 Unpacking objects: 100% (26/26), 96.02 KiB | 1.03 MiB/s, done. From https://github.com/wineasio/wineasio * branch HEAD -> FETCH_HEAD fatal: Not a valid object name Unrecognized git object type: Unable to checkout refs/tags/v1.2.0b from https://github.com/wineasio/wineasio.git. error: builder for '/nix/store/9h4mdzf5dw5m2aqx2lslbbmr68la630f-source.drv' failed with exit code 1; last 13 log lines: > exporting https://github.com/wineasio/wineasio.git (rev v1.2.0b) into /nix/store/bqfq4db6nwycmkdrql9igsbrayqsw3g2-source > Initialized empty Git repository in /nix/store/bqfq4db6nwycmkdrql9igsbrayqsw3g2-source/.git/ > fatal: couldn't find remote ref refs/tags/v1.2.0b > remote: Enumerating objects: 26, done. > remote: Counting objects: 100% (26/26), done. > remote: Compressing objects: 100% (26/26), done. > remote: Total 26 (delta 0), reused 15 (delta 0), pack-reused 0 > Unpacking objects: 100% (26/26), 96.02 KiB | 1.03 MiB/s, done. > From https://github.com/wineasio/wineasio > * branch HEAD -> FETCH_HEAD > fatal: Not a valid object name > Unrecognized git object type: > Unable to checkout refs/tags/v1.2.0b from https://github.com/wineasio/wineasio.git. For full logs, run 'nix log /nix/store/9h4mdzf5dw5m2aqx2lslbbmr68la630f-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'wineasio.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/9h4mdzf5dw5m2aqx2lslbbmr68la630f-source.drv /nix/store/qk877ryarfsn8d9f0f8wnkcfimdzfhli-wineasio-1.2.0b.drv these 2 paths will be fetched (54.05 MiB download, 547.10 MiB unpacked): /nix/store/pf638lxb03409g75ijmm106y81zslbq4-libjack2-1.9.22-dev /nix/store/f835p206klqw7yxxvjmxy4f100fmm8pj-wine-wow-9.0 copying path '/nix/store/pf638lxb03409g75ijmm106y81zslbq4-libjack2-1.9.22-dev' from 'https://cache.nixos.org'... copying path '/nix/store/f835p206klqw7yxxvjmxy4f100fmm8pj-wine-wow-9.0' from 'https://cache.nixos.org'... building '/nix/store/9h4mdzf5dw5m2aqx2lslbbmr68la630f-source.drv'... exporting https://github.com/wineasio/wineasio.git (rev v1.2.0b) into /nix/store/bqfq4db6nwycmkdrql9igsbrayqsw3g2-source Initialized empty Git repository in /nix/store/bqfq4db6nwycmkdrql9igsbrayqsw3g2-source/.git/ fatal: couldn't find remote ref refs/tags/v1.2.0b remote: Enumerating objects: 26, done. remote: Counting objects: 100% (26/26), done. remote: Compressing objects: 100% (26/26), done. remote: Total 26 (delta 0), reused 15 (delta 0), pack-reused 0 Unpacking objects: 100% (26/26), 96.02 KiB | 1.01 MiB/s, done. From https://github.com/wineasio/wineasio * branch HEAD -> FETCH_HEAD fatal: Not a valid object name Unrecognized git object type: Unable to checkout refs/tags/v1.2.0b from https://github.com/wineasio/wineasio.git. error: builder for '/nix/store/9h4mdzf5dw5m2aqx2lslbbmr68la630f-source.drv' failed with exit code 1; last 13 log lines: > exporting https://github.com/wineasio/wineasio.git (rev v1.2.0b) into /nix/store/bqfq4db6nwycmkdrql9igsbrayqsw3g2-source > Initialized empty Git repository in /nix/store/bqfq4db6nwycmkdrql9igsbrayqsw3g2-source/.git/ > fatal: couldn't find remote ref refs/tags/v1.2.0b > remote: Enumerating objects: 26, done. > remote: Counting objects: 100% (26/26), done. > remote: Compressing objects: 100% (26/26), done. > remote: Total 26 (delta 0), reused 15 (delta 0), pack-reused 0 > Unpacking objects: 100% (26/26), 96.02 KiB | 1.01 MiB/s, done. > From https://github.com/wineasio/wineasio > * branch HEAD -> FETCH_HEAD > fatal: Not a valid object name > Unrecognized git object type: > Unable to checkout refs/tags/v1.2.0b from https://github.com/wineasio/wineasio.git. For full logs, run 'nix log /nix/store/9h4mdzf5dw5m2aqx2lslbbmr68la630f-source.drv'. error: 1 dependencies of derivation '/nix/store/qk877ryarfsn8d9f0f8wnkcfimdzfhli-wineasio-1.2.0b.drv' failed to build [result] Failed to update wineasio 1.2.0 -> 1.2.0b https://repology.org/project/wineasio/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cargo-bloat, using log file: /var/log/nixpkgs-update/cargo-bloat/2024-04-29.log cargo-bloat 0.11.1 -> 0.12.0 https://repology.org/project/cargo-bloat/versions attrpath: cargo-bloat Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] Replacing cargoHash with sha256-6fMFGLH16Z1O+ETlr0685TXHup1vJetfzPdNC2Lw9uM= [rustCrateVersion] Finished updating Crate version and replacing hashes [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/by-name/ca/cargo-bloat/package.nix b/pkgs/by-name/ca/cargo-bloat/package.nix index 59085534d063..b0026988c9a1 100644 --- a/pkgs/by-name/ca/cargo-bloat/package.nix +++ b/pkgs/by-name/ca/cargo-bloat/package.nix @@ -2,16 +2,16 @@ rustPlatform.buildRustPackage rec { pname = "cargo-bloat"; - version = "0.11.1"; + version = "0.12.0"; src = fetchFromGitHub { owner = "RazrFalcon"; repo = pname; rev = "v${version}"; - hash = "sha256-lCA7C1G2xu65jn3/wzj6prWSrjQz3EqqJyMlPR/HRFs="; + hash = "sha256-vPk6ERl0VM1TjK/JRMcXqCvKqSTuw78MsmQ0xImQyd4="; }; - cargoHash = "sha256-fOenXn5gagFss9DRDXXsGxQlDqVXZ5LZcdM4WsXAyUU="; + cargoHash = "sha256-6fMFGLH16Z1O+ETlr0685TXHup1vJetfzPdNC2Lw9uM="; meta = with lib; { description = "A tool and Cargo subcommand that helps you find out what takes most of the space in your executable"; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/iphc14zc39kb1jzr0jsnc86i99v1w7mz-cargo-bloat-0.12.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/cargo-bloat/versions. meta.description for cargo-bloat is: A tool and Cargo subcommand that helps you find out what takes most of the space in your executable meta.homepage for cargo-bloat is: https://github.com/RazrFalcon/cargo-bloat ###### Updates performed - Rust version update ###### To inspect upstream changes - [Compare changes on GitHub](https://github.com/RazrFalcon/cargo-bloat/compare/v0.11.1...v0.12.0) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.12.0 with grep in /nix/store/iphc14zc39kb1jzr0jsnc86i99v1w7mz-cargo-bloat-0.12.0 - found 0.12.0 in filename of file in /nix/store/iphc14zc39kb1jzr0jsnc86i99v1w7mz-cargo-bloat-0.12.0 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath cargo-bloat ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/iphc14zc39kb1jzr0jsnc86i99v1w7mz-cargo-bloat-0.12.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A cargo-bloat https://github.com/r-ryantm/nixpkgs/archive/a6639281460e5cab3823ec6edee6471edf90c25e.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/a6639281460e5cab3823ec6edee6471edf90c25e#cargo-bloat ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/iphc14zc39kb1jzr0jsnc86i99v1w7mz-cargo-bloat-0.12.0 ls -la /nix/store/iphc14zc39kb1jzr0jsnc86i99v1w7mz-cargo-bloat-0.12.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @xrelkd @matthiasbeyer for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307652 [result] Success updating cargo-bloat 0.11.1 -> 0.12.0 https://repology.org/project/cargo-bloat/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.ggcorset, using log file: /var/log/nixpkgs-update/rPackages.ggcorset/2024-04-29.log rPackages.ggcorset 0.4.5 -> 0.5.0 https://repology.org/project/r:ggcorset/versions attrpath: rPackages.ggcorset Checking auto update branch... No auto update branch exists Old version 0.4.5" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.ggcorset 0.4.5 -> 0.5.0 https://repology.org/project/r:ggcorset/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.thurstonianIRT, using log file: /var/log/nixpkgs-update/rPackages.thurstonianIRT/2024-04-29.log rPackages.thurstonianIRT 0.12.4 -> 0.12.5 https://repology.org/project/r:thurstonianirt/versions attrpath: rPackages.thurstonianIRT Checking auto update branch... No auto update branch exists Old version 0.12.4" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.thurstonianIRT 0.12.4 -> 0.12.5 https://repology.org/project/r:thurstonianirt/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.bspm, using log file: /var/log/nixpkgs-update/rPackages.bspm/2024-04-29.log rPackages.bspm 0.5.5 -> 0.5.7 https://repology.org/project/r:bspm/versions attrpath: rPackages.bspm Checking auto update branch... No auto update branch exists Old version 0.5.5" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.bspm 0.5.5 -> 0.5.7 https://repology.org/project/r:bspm/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.bundesbank, using log file: /var/log/nixpkgs-update/rPackages.bundesbank/2024-04-29.log rPackages.bundesbank 0.1-11 -> 0.1-12 https://repology.org/project/r:bundesbank/versions attrpath: rPackages.bundesbank Checking auto update branch... No auto update branch exists Old version 0.1-11" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.bundesbank 0.1-11 -> 0.1-12 https://repology.org/project/r:bundesbank/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.TreeSearch, using log file: /var/log/nixpkgs-update/rPackages.TreeSearch/2024-04-29.log rPackages.TreeSearch 1.4.0 -> 1.5.0 https://repology.org/project/r:treesearch/versions attrpath: rPackages.TreeSearch Checking auto update branch... No auto update branch exists Old version 1.4.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.TreeSearch 1.4.0 -> 1.5.0 https://repology.org/project/r:treesearch/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.giacR, using log file: /var/log/nixpkgs-update/rPackages.giacR/2024-04-29.log rPackages.giacR 1.0.0 -> 1.0.1 https://repology.org/project/r:giacr/versions attrpath: rPackages.giacR Checking auto update branch... No auto update branch exists Old version 1.0.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.giacR 1.0.0 -> 1.0.1 https://repology.org/project/r:giacr/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.kantorovich, using log file: /var/log/nixpkgs-update/rPackages.kantorovich/2024-04-29.log rPackages.kantorovich 3.1.0 -> 3.2.0 https://repology.org/project/r:kantorovich/versions attrpath: rPackages.kantorovich Checking auto update branch... No auto update branch exists Old version 3.1.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.kantorovich 3.1.0 -> 3.2.0 https://repology.org/project/r:kantorovich/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rubyPackages_3_3.json_pure, using log file: /var/log/nixpkgs-update/rubyPackages_3_3.json_pure/2024-04-29.log rubyPackages_3_3.json_pure 2.7.1 -> 2.7.2 https://repology.org/project/ruby:json-pure/versions attrpath: rubyPackages_3_3.json_pure Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update rubyPackages_3_3.json_pure 2.7.1 -> 2.7.2 https://repology.org/project/ruby:json-pure/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.gslnls, using log file: /var/log/nixpkgs-update/rPackages.gslnls/2024-04-29.log rPackages.gslnls 1.2.0 -> 1.3.0 https://repology.org/project/r:gslnls/versions attrpath: rPackages.gslnls Checking auto update branch... No auto update branch exists Old version 1.2.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.gslnls 1.2.0 -> 1.3.0 https://repology.org/project/r:gslnls/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.som_nn, using log file: /var/log/nixpkgs-update/rPackages.som_nn/2024-04-29.log rPackages.som_nn 1.1.0 -> 1.4.4 https://repology.org/project/r:som.nn/versions attrpath: rPackages.som_nn Checking auto update branch... No auto update branch exists Old version 1.1.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.som_nn 1.1.0 -> 1.4.4 https://repology.org/project/r:som.nn/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath nsd, using log file: /var/log/nixpkgs-update/nsd/2024-04-29.log nsd 4.8.0 -> 4.9.1 https://repology.org/project/nsd/versions attrpath: nsd Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/servers/dns/nsd/default.nix b/pkgs/servers/dns/nsd/default.nix index 1f82bde0384c..eecef52e2b4e 100644 --- a/pkgs/servers/dns/nsd/default.nix +++ b/pkgs/servers/dns/nsd/default.nix @@ -16,11 +16,11 @@ stdenv.mkDerivation rec { pname = "nsd"; - version = "4.8.0"; + version = "4.9.1"; src = fetchurl { url = "https://www.nlnetlabs.nl/downloads/${pname}/${pname}-${version}.tar.gz"; - sha256 = "sha256-gg2k44RyGRX0vK9/K+2YUZ2lY8bkwTDHQsckdg7AKgo="; + sha256 = "sha256-psI6U+6BEfpx53t1ZdG49IbqaVdwgWWF+93xTkNn5t8="; }; prePatch = '' [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/jq8jfr4fkn2xvl5i5xd23c0aqg01hsna-nsd-4.9.1" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/nsd/versions. meta.description for nsd is: Authoritative only, high performance, simple and open source name server meta.homepage for nsd is: http://www.nlnetlabs.nl ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 4.9.1 with grep in /nix/store/jq8jfr4fkn2xvl5i5xd23c0aqg01hsna-nsd-4.9.1 - found 4.9.1 in filename of file in /nix/store/jq8jfr4fkn2xvl5i5xd23c0aqg01hsna-nsd-4.9.1 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath nsd ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/jq8jfr4fkn2xvl5i5xd23c0aqg01hsna-nsd-4.9.1 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A nsd https://github.com/r-ryantm/nixpkgs/archive/183ed98086f44465e2ad04548961a1162f4a02f7.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/183ed98086f44465e2ad04548961a1162f4a02f7#nsd ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/jq8jfr4fkn2xvl5i5xd23c0aqg01hsna-nsd-4.9.1 ls -la /nix/store/jq8jfr4fkn2xvl5i5xd23c0aqg01hsna-nsd-4.9.1/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @hrdinka for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307661 [result] Success updating nsd 4.8.0 -> 4.9.1 https://repology.org/project/nsd/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.lmfit, using log file: /var/log/nixpkgs-update/python312Packages.lmfit/2024-04-29.log python312Packages.lmfit 1.2.2 -> 1.3.1 https://repology.org/project/python:lmfit/versions attrpath: python312Packages.lmfit isn't the default python version [result] Failed to update python312Packages.lmfit 1.2.2 -> 1.3.1 https://repology.org/project/python:lmfit/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.libyaml-streamly, using log file: /var/log/nixpkgs-update/haskellPackages.libyaml-streamly/2024-04-29.log haskellPackages.libyaml-streamly 0.2.2.1 -> 0.2.3.0 https://repology.org/project/haskell:libyaml-streamly/versions attrpath: haskellPackages.libyaml-streamly Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update haskellPackages.libyaml-streamly 0.2.2.1 -> 0.2.3.0 https://repology.org/project/haskell:libyaml-streamly/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.scratch3, using log file: /var/log/nixpkgs-update/texlivePackages.scratch3/2024-04-29.log texlivePackages.scratch3 0.19 -> 3.30.5 https://repology.org/project/scratch3/versions attrpath: texlivePackages.scratch3 Checking auto update branch... No auto update branch exists Old version 0.19" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.scratch3 0.19 -> 3.30.5 https://repology.org/project/scratch3/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rubyPackages.rake, using log file: /var/log/nixpkgs-update/rubyPackages.rake/2024-04-29.log rubyPackages.rake 13.1.0 -> 13.2.1 https://repology.org/project/ruby:rake/versions attrpath: rubyPackages.rake Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update rubyPackages.rake 13.1.0 -> 13.2.1 https://repology.org/project/ruby:rake/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.sfnetworks, using log file: /var/log/nixpkgs-update/rPackages.sfnetworks/2024-04-29.log rPackages.sfnetworks 0.6.3 -> 0.6.4 https://repology.org/project/r:sfnetworks/versions attrpath: rPackages.sfnetworks Checking auto update branch... No auto update branch exists Old version 0.6.3" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.sfnetworks 0.6.3 -> 0.6.4 https://repology.org/project/r:sfnetworks/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.microlens-pro, using log file: /var/log/nixpkgs-update/haskellPackages.microlens-pro/2024-04-29.log haskellPackages.microlens-pro 0.2.0 -> 0.2.0.1 https://repology.org/project/haskell:microlens-pro/versions attrpath: haskellPackages.microlens-pro Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update haskellPackages.microlens-pro 0.2.0 -> 0.2.0.1 https://repology.org/project/haskell:microlens-pro/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.pl, using log file: /var/log/nixpkgs-update/texlivePackages.pl/2024-04-29.log texlivePackages.pl 1.09a -> 9.2.4 https://repology.org/project/pl/versions attrpath: texlivePackages.pl Checking auto update branch... No auto update branch exists Old version 1.09a" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.pl 1.09a -> 9.2.4 https://repology.org/project/pl/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath libsoundio, using log file: /var/log/nixpkgs-update/libsoundio/2024-04-29.log libsoundio 2.0.0 -> 2.0.1-7 https://repology.org/project/libsoundio/versions attrpath: libsoundio Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/libraries/libsoundio/default.nix b/pkgs/development/libraries/libsoundio/default.nix index b7de8bf04e88..fcfb02ca06fc 100644 --- a/pkgs/development/libraries/libsoundio/default.nix +++ b/pkgs/development/libraries/libsoundio/default.nix @@ -1,14 +1,14 @@ { lib, stdenv, fetchFromGitHub, cmake, alsa-lib, libjack2, libpulseaudio, AudioUnit }: stdenv.mkDerivation rec { - version = "2.0.0"; + version = "2.0.1-7"; pname = "libsoundio"; src = fetchFromGitHub { owner = "andrewrk"; repo = "libsoundio"; rev = version; - sha256 = "12l4rvaypv87vigdrmjz48d4d6sq4gfxf5asvnc4adyabxb73i4x"; + sha256 = "sha256-JQ6TH6zf1wNb4al0v5MgcR12KQL6CKSVXbf1KKJevwA="; }; nativeBuildInputs = [ cmake ]; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/0vhif3jkdh2fzn4xdqy3g5m7l3bqba8j-libsoundio-2.0.1-7" Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 8 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 7 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 7 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 7 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 7 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 7 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 7 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 8 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 8 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 7 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 7 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 3 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 3 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 3 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 3 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 3 [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
4 packages built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/libsoundio/versions. meta.description for libsoundio is: Cross platform audio input and output meta.homepage for libsoundio is: http://libsound.io/ ###### Updates performed - Version update ###### To inspect upstream changes - [Compare changes on GitHub](https://github.com/andrewrk/libsoundio/compare/2.0.0...2.0.1-7) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 2.0.1-7 in filename of file in /nix/store/0vhif3jkdh2fzn4xdqy3g5m7l3bqba8j-libsoundio-2.0.1-7 ---
Rebuild report (if merged into master) (click to expand) ``` 5 total rebuild path(s) 5 package rebuild(s) First fifty rebuilds by attrpath castty libsoundio ryujinx zrythm ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/0vhif3jkdh2fzn4xdqy3g5m7l3bqba8j-libsoundio-2.0.1-7 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A libsoundio https://github.com/r-ryantm/nixpkgs/archive/48d86995090316ba6bad57020f621bb35bf50e92.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/48d86995090316ba6bad57020f621bb35bf50e92#libsoundio ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/0vhif3jkdh2fzn4xdqy3g5m7l3bqba8j-libsoundio-2.0.1-7 ls -la /nix/store/0vhif3jkdh2fzn4xdqy3g5m7l3bqba8j-libsoundio-2.0.1-7/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
4 packages built:
--- ###### Maintainer pings cc @andrewrk for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307680 [result] Success updating libsoundio 2.0.0 -> 2.0.1-7 https://repology.org/project/libsoundio/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath haskellPackages.stack-all_0_5_1, using log file: /var/log/nixpkgs-update/haskellPackages.stack-all_0_5_1/2024-04-29.log haskellPackages.stack-all_0_5_1 0.5.1 -> 0.5.2 https://repology.org/project/haskell:stack-all/versions attrpath: haskellPackages.stack-all_0_5_1 Checking auto update branch... No auto update branch exists Version in attr path haskellPackages.stack-all_0_5_1 not compatible with 0.5.2 [result] Failed to update haskellPackages.stack-all_0_5_1 0.5.1 -> 0.5.2 https://repology.org/project/haskell:stack-all/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.sgapi, using log file: /var/log/nixpkgs-update/rPackages.sgapi/2024-04-29.log rPackages.sgapi 1.0.1 -> 1.0.2 https://repology.org/project/r:sgapi/versions attrpath: rPackages.sgapi Checking auto update branch... No auto update branch exists Old version 1.0.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.sgapi 1.0.1 -> 1.0.2 https://repology.org/project/r:sgapi/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.BoneProfileR, using log file: /var/log/nixpkgs-update/rPackages.BoneProfileR/2024-04-29.log rPackages.BoneProfileR 2.4 -> 2.5 https://repology.org/project/r:boneprofiler/versions attrpath: rPackages.BoneProfileR Checking auto update branch... No auto update branch exists Old version 2.4" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.BoneProfileR 2.4 -> 2.5 https://repology.org/project/r:boneprofiler/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rubyPackages.method_source, using log file: /var/log/nixpkgs-update/rubyPackages.method_source/2024-04-29.log rubyPackages.method_source 1.0.0 -> 1.1.0 https://repology.org/project/ruby:method-source/versions attrpath: rubyPackages.method_source Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update rubyPackages.method_source 1.0.0 -> 1.1.0 https://repology.org/project/ruby:method-source/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath fprintd, using log file: /var/log/nixpkgs-update/fprintd/2024-04-29.log fprintd 1.94.2 -> 1.94.3 https://repology.org/project/fprintd/versions attrpath: fprintd Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update fprintd 1.94.2 -> 1.94.3 https://repology.org/project/fprintd/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath nodePackages.katex, using log file: /var/log/nixpkgs-update/nodePackages.katex/2024-04-29.log nodePackages.katex 0.16.9 -> 0.16.10 https://repology.org/project/node:katex/versions attrpath: nodePackages.katex Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update nodePackages.katex 0.16.9 -> 0.16.10 https://repology.org/project/node:katex/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.RoBTT, using log file: /var/log/nixpkgs-update/rPackages.RoBTT/2024-04-29.log rPackages.RoBTT 1.2.1 -> 1.3.0 https://repology.org/project/r:robtt/versions attrpath: rPackages.RoBTT Checking auto update branch... No auto update branch exists Old version 1.2.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.RoBTT 1.2.1 -> 1.3.0 https://repology.org/project/r:robtt/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.RCPA, using log file: /var/log/nixpkgs-update/rPackages.RCPA/2024-04-29.log rPackages.RCPA 0.2.1 -> 0.2.2 https://repology.org/project/r:rcpa/versions attrpath: rPackages.RCPA Checking auto update branch... No auto update branch exists Old version 0.2.1" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.RCPA 0.2.1 -> 0.2.2 https://repology.org/project/r:rcpa/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.cmsafops, using log file: /var/log/nixpkgs-update/rPackages.cmsafops/2024-04-29.log rPackages.cmsafops 1.3.0 -> 1.4.0 https://repology.org/project/r:cmsafops/versions attrpath: rPackages.cmsafops Checking auto update branch... No auto update branch exists Old version 1.3.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.cmsafops 1.3.0 -> 1.4.0 https://repology.org/project/r:cmsafops/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath texlivePackages.fancybox, using log file: /var/log/nixpkgs-update/texlivePackages.fancybox/2024-04-29.log texlivePackages.fancybox 1.4 -> 3.5.7 https://repology.org/project/fancybox/versions attrpath: texlivePackages.fancybox Checking auto update branch... No auto update branch exists Old version 1.4" not present in master derivation file with contents: { lib , fetchurl , runCommand , writeShellScript # script interpreters , bash , jdk , perl , python3 , ruby , snobol4 , tk # TeX Live prerequisites , texliveBinaries }: /* Convert an attribute set extracted from tlpdb.nix (with the deps attribute already processed) to a fake multi-output derivation with possible outputs [ "tex" "texdoc" "texsource" "tlpkg" "out" "man" "info" ] The multi-output is emulated as follows: - the main derivation is a multi-output derivation that builds links to the containers (tex, texdoc, ...) - the output attributes are replaced with the actual containers with the outputSpecified attribute set to true In this way, when texlive.withPackages picks an output such as drv.tex, it receives the actual container, avoiding superfluous dependencies on the other containers (for instance doc containers). */ # TODO stabilise a generic interface decoupled from the finer details of the # translation from texlive.tlpdb to tlpdb.nix { pname , revision , version ? toString revision , extraRevision ? "" , extraVersion ? "" , sha512 , mirrors , fixedHashes ? { } , postUnpack ? "" , postFixup ? "" , stripPrefix ? 1 , license ? [ ] , hasHyphens ? false , hasInfo ? false , hasManpages ? false , hasRunfiles ? false , hasTlpkg ? false , extraNativeBuildInputs ? [ ] , ... }@args: let # common metadata name = "${pname}-${version}${extraVersion}"; meta = { license = map (x: lib.licenses.${x}) license; # TeX Live packages should not be installed directly into the user profile outputsToInstall = [ ]; longDescription = '' This package cannot be installed directly. Please use `texlive.withPackages`. ''; } // lib.optionalAttrs (args ? shortdesc) { description = args.shortdesc; }; hasBinfiles = args ? binfiles && args.binfiles != [ ]; hasDocfiles = sha512 ? doc; hasSource = sha512 ? source; # containers that will be built by Hydra outputs = lib.optional hasBinfiles "out" ++ lib.optional hasRunfiles "tex" ++ lib.optional hasDocfiles "texdoc" ++ # omit building sources, since as far as we know, installing them is not common # the sources will still be available under drv.texsource # lib.optional hasSource "texsource" ++ lib.optional hasTlpkg "tlpkg" ++ lib.optional hasManpages "man" ++ lib.optional hasInfo "info"; outputDrvs = lib.getAttrs outputs containers; passthru = { # metadata inherit pname; revision = toString revision + extraRevision; version = version + extraVersion; # containers behave like specified outputs outputSpecified = true; } // lib.optionalAttrs (args ? deps) { tlDeps = args.deps; } // lib.optionalAttrs (args ? fontMaps) { inherit (args) fontMaps; } // lib.optionalAttrs (args ? formats) { inherit (args) formats; } // lib.optionalAttrs (args ? hyphenPatterns) { inherit (args) hyphenPatterns; } // lib.optionalAttrs (args ? postactionScript) { inherit (args) postactionScript; } // lib.optionalAttrs hasSource { inherit (containers) texsource; } // lib.optionalAttrs (! hasRunfiles) { tex = fakeTeX; }; # build run, doc, source, tlpkg containers mkContainer = tlType: tlOutputName: sha512: let fixedHash = fixedHashes.${tlType} or null; # be graceful about missing hashes # the basename used by upstream (without ".tar.xz" suffix) # tlpkg is not a true container but a subfolder of the run container urlName = pname + (lib.optionalString (tlType != "run" && tlType != "tlpkg") ".${tlType}"); urls = map (up: "${up}/archive/${urlName}.r${toString revision}.tar.xz") mirrors; container = runCommand "${name}-${tlOutputName}" ({ src = fetchurl { inherit urls sha512; }; inherit passthru; # save outputName, since fixed output derivations cannot change nor override outputName inherit meta stripPrefix tlOutputName; } // lib.optionalAttrs (fixedHash != null) { outputHash = fixedHash; outputHashAlgo = "sha256"; outputHashMode = "recursive"; }) ('' mkdir "$out" if [[ "$tlOutputName" == "tlpkg" ]]; then tar -xf "$src" \ --strip-components=1 \ -C "$out" --anchored --exclude=tlpkg/tlpobj --keep-old-files \ tlpkg else tar -xf "$src" \ --strip-components="$stripPrefix" \ -C "$out" --anchored --exclude=tlpkg --keep-old-files fi '' + postUnpack); in # remove drv.out to avoid confusing texlive.withPackages removeAttrs container [ "out" ] // outputDrvs; # find interpreters for the script extensions found in tlpdb extToInput = { jar = jdk; lua = texliveBinaries.luatex; py = python3; rb = ruby; sno = snobol4; tcl = tk; texlua = texliveBinaries.luatex; tlu = texliveBinaries.luatex; }; # fake derivation for resolving dependencies in the absence of a "tex" containers fakeTeX = passthru // { inherit meta; tlOutputName = "tex"; } // outputDrvs; containers = rec { tex = mkContainer "run" "tex" sha512.run; texdoc = mkContainer "doc" "texdoc" sha512.doc; texsource = mkContainer "source" "texsource" sha512.source; tlpkg = mkContainer "tlpkg" "tlpkg" sha512.run; # bin container out = runCommand "${name}" { inherit meta; passthru = passthru // { tlOutputName = "out"; }; # shebang interpreters buildInputs = let outName = builtins.replaceStrings [ "-" ] [ "_" ] pname; in [ texliveBinaries.core.${outName} or null texliveBinaries.${pname} or null texliveBinaries.core-big.${outName} or null ] ++ (args.extraBuildInputs or [ ]) ++ [ bash perl ] ++ (lib.attrVals (args.scriptExts or [ ]) extToInput); nativeBuildInputs = extraNativeBuildInputs; # absolute scripts folder scriptsFolder = lib.optionals (hasRunfiles && tex ? outPath) (map (f: tex.outPath + "/scripts/" + f) (lib.toList args.scriptsFolder or pname)); # binaries info inherit (args) binfiles; binlinks = builtins.attrNames (args.binlinks or { }); bintargets = builtins.attrValues (args.binlinks or { }); # build scripts patchScripts = ./patch-scripts.sed; makeBinContainers = ./make-bin-containers.sh; } '' . "$makeBinContainers" ${args.postFixup or ""} '' // outputDrvs; # build man, info containers man = removeAttrs (runCommand "${name}-man" { inherit meta texdoc; passthru = passthru // { tlOutputName = "man"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/man '') [ "out" ] // outputDrvs; info = removeAttrs (runCommand "${name}-info" { inherit meta texdoc; passthru = passthru // { tlOutputName = "info"; }; } '' mkdir -p "$out"/share ln -s {"$texdoc"/doc,"$out"/share}/info '') [ "out" ] // outputDrvs; }; in if outputs == [ ] then removeAttrs fakeTeX [ "outputSpecified" ] else runCommand name { __structuredAttrs = true; inherit meta outputDrvs outputs; passthru = removeAttrs passthru [ "outputSpecified" ]; # force output name in case "out" is missing nativeBuildInputs = lib.optional (! hasBinfiles) (writeShellScript "force-output.sh" '' export out="''${${builtins.head outputs}-}" ''); } '' for outputName in ''${!outputs[@]} ; do ln -s "''${outputDrvs[$outputName]}" "''${outputs[$outputName]}" done '' // outputDrvs [result] Failed to update texlivePackages.fancybox 1.4 -> 3.5.7 https://repology.org/project/fancybox/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath xnec2c, using log file: /var/log/nixpkgs-update/xnec2c/2024-04-29.log xnec2c 4.4.12 -> 4.4.16 https://repology.org/project/xnec2c/versions attrpath: xnec2c Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/applications/science/physics/xnec2c/default.nix b/pkgs/applications/science/physics/xnec2c/default.nix index 26ec1518fed5..60afa09ecc8c 100644 --- a/pkgs/applications/science/physics/xnec2c/default.nix +++ b/pkgs/applications/science/physics/xnec2c/default.nix @@ -14,11 +14,11 @@ assert (!blas.isILP64) && (!lapack.isILP64); stdenv.mkDerivation rec { pname = "xnec2c"; - version = "4.4.12"; + version = "4.4.16"; src = fetchurl { url = "https://www.xnec2c.org/releases/${pname}-v${version}.tar.gz"; - hash = "sha256-6Yrx6LkJjfnMA/kJUDWLhGzGopZeecARSrcR++UScsU="; + hash = "sha256-XiZi8pfmfHjGpePkRy/pF1TA+5RdxX4AGuKzG5Wqrmk="; }; nativeBuildInputs = [ [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/qi7p8y4gfnyiigyziw7x0xk1vrsysk05-xnec2c-4.4.16" Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 3 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 3 [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/xnec2c/versions. meta.description for xnec2c is: Graphical antenna simulation meta.homepage for xnec2c is: https://www.xnec2c.org/ ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 4.4.16 with grep in /nix/store/qi7p8y4gfnyiigyziw7x0xk1vrsysk05-xnec2c-4.4.16 - found 4.4.16 in filename of file in /nix/store/qi7p8y4gfnyiigyziw7x0xk1vrsysk05-xnec2c-4.4.16 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath xnec2c ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/qi7p8y4gfnyiigyziw7x0xk1vrsysk05-xnec2c-4.4.16 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A xnec2c https://github.com/r-ryantm/nixpkgs/archive/50cff5784b858e77e015bc5b6d07003b13366859.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/50cff5784b858e77e015bc5b6d07003b13366859#xnec2c ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/qi7p8y4gfnyiigyziw7x0xk1vrsysk05-xnec2c-4.4.16 ls -la /nix/store/qi7p8y4gfnyiigyziw7x0xk1vrsysk05-xnec2c-4.4.16/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @illdefined for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307686 [result] Success updating xnec2c 4.4.12 -> 4.4.16 https://repology.org/project/xnec2c/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.dsmSearch, using log file: /var/log/nixpkgs-update/rPackages.dsmSearch/2024-04-29.log rPackages.dsmSearch 1.0.0 -> 1.0.1 https://repology.org/project/r:dsmsearch/versions attrpath: rPackages.dsmSearch Checking auto update branch... No auto update branch exists Old version 1.0.0" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.dsmSearch 1.0.0 -> 1.0.1 https://repology.org/project/r:dsmsearch/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.cvxpy, using log file: /var/log/nixpkgs-update/python312Packages.cvxpy/2024-04-29.log python312Packages.cvxpy 1.4.2 -> 1.4.3 https://repology.org/project/python:cvxpy/versions attrpath: python312Packages.cvxpy isn't the default python version [result] Failed to update python312Packages.cvxpy 1.4.2 -> 1.4.3 https://repology.org/project/python:cvxpy/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath taskchampion-sync-server, using log file: /var/log/nixpkgs-update/taskchampion-sync-server/2024-04-29.log taskchampion-sync-server 0.4.1-unstable-2024-04-08 -> 3.0.0 https://repology.org/project/taskchampion-sync-server/versions attrpath: taskchampion-sync-server Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] Hashes equal; no update necessary [result] Failed to update taskchampion-sync-server 0.4.1-unstable-2024-04-08 -> 3.0.0 https://repology.org/project/taskchampion-sync-server/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.dittodb, using log file: /var/log/nixpkgs-update/rPackages.dittodb/2024-04-29.log rPackages.dittodb 0.1.7 -> 0.1.8 https://repology.org/project/r:dittodb/versions attrpath: rPackages.dittodb Checking auto update branch... No auto update branch exists Old version 0.1.7" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.dittodb 0.1.7 -> 0.1.8 https://repology.org/project/r:dittodb/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rPackages.traveltimeR, using log file: /var/log/nixpkgs-update/rPackages.traveltimeR/2024-04-29.log rPackages.traveltimeR 1.1.4 -> 1.2.0 https://repology.org/project/r:traveltimer/versions attrpath: rPackages.traveltimeR Checking auto update branch... No auto update branch exists Old version 1.1.4" not present in master derivation file with contents: { stdenv, lib, R, libcxx, xvfb-run, util-linux, Cocoa, Foundation, gettext, gfortran, libiconv }: { name, buildInputs ? [], requireX ? false, ... } @ attrs: stdenv.mkDerivation ({ buildInputs = buildInputs ++ [R gettext] ++ lib.optionals requireX [util-linux xvfb-run] ++ lib.optionals stdenv.isDarwin [Cocoa Foundation gfortran libiconv]; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-I${lib.getDev libcxx}/include/c++/v1"; configurePhase = '' runHook preConfigure export R_LIBS_SITE="$R_LIBS_SITE''${R_LIBS_SITE:+:}$out/library" runHook postConfigure ''; buildPhase = '' runHook preBuild runHook postBuild ''; installFlags = if attrs.doCheck or true then [] else [ "--no-test-load" ]; rCommand = if requireX then # Unfortunately, xvfb-run has a race condition even with -a option, so that # we acquire a lock explicitly. "flock ${xvfb-run} xvfb-run -a -e xvfb-error R" else "R"; installPhase = '' runHook preInstall mkdir -p $out/library $rCommand CMD INSTALL --built-timestamp='1970-01-01 00:00:00 UTC' $installFlags --configure-args="$configureFlags" -l $out/library . runHook postInstall ''; postFixup = '' if test -e $out/nix-support/propagated-build-inputs; then ln -s $out/nix-support/propagated-build-inputs $out/nix-support/propagated-user-env-packages fi ''; checkPhase = '' # noop since R CMD INSTALL tests packages ''; } // attrs // { name = "r-" + name; }) [result] Failed to update rPackages.traveltimeR 1.1.4 -> 1.2.0 https://repology.org/project/r:traveltimer/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath dmidecode, using log file: /var/log/nixpkgs-update/dmidecode/2024-04-29.log dmidecode 3.5 -> 3.6 https://repology.org/project/dmidecode/versions attrpath: dmidecode Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/os-specific/linux/dmidecode/default.nix b/pkgs/os-specific/linux/dmidecode/default.nix index 80cd5147a210..3bfaad303516 100644 --- a/pkgs/os-specific/linux/dmidecode/default.nix +++ b/pkgs/os-specific/linux/dmidecode/default.nix @@ -2,11 +2,11 @@ stdenv.mkDerivation rec { pname = "dmidecode"; - version = "3.5"; + version = "3.6"; src = fetchurl { url = "mirror://savannah/dmidecode/dmidecode-${version}.tar.xz"; - sha256 = "sha256-eddnNe6OJRluKnIpZM+Wg/WglYFQNTeISyVrATicwHM="; + sha256 = "sha256-5Axl8+w9r+Ma2DSaTvGpcSLTj2UATtZldeGo1XXdi64="; }; makeFlags = [ [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/k4r1a7hksv9z4ilvch4zy7qvbrcnnhdd-dmidecode-3.6" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
9 packages failed to build:
63 packages built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/dmidecode/versions. meta.description for dmidecode is: A tool that reads information about your system's hardware from the BIOS according to the SMBIOS/DMI standard meta.homepage for dmidecode is: https://www.nongnu.org/dmidecode/ ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 3.6 with grep in /nix/store/k4r1a7hksv9z4ilvch4zy7qvbrcnnhdd-dmidecode-3.6 - found 3.6 in filename of file in /nix/store/k4r1a7hksv9z4ilvch4zy7qvbrcnnhdd-dmidecode-3.6 ---
Rebuild report (if merged into master) (click to expand) ``` 58 total rebuild path(s) 58 package rebuild(s) First fifty rebuilds by attrpath amazon-ssm-agent appvm asterisk asterisk-ldap asterisk-lts asterisk-module-sccp asterisk-stable asterisk_18 asterisk_20 cloud-init collectd deepin.dde-daemon diffoscope dmidecode docker-machine-kvm2 edac-utils fusionInventory fwts gnome.gnome-boxes guestfs-tools htcondor hw-probe libguestfs librenms libsForQt5.kinfocenter libvirt libvirt-glib libvmi mgmt minikube mission-center multipass nixops_unstablePlugins.nixops-libvirtd nixops_unstablePlugins.nixops-virtd nixops_unstable_full ocsinventory-agent passmark-performancetest perl536Packages.SysVirt perl538Packages.SysVirt plasma5Packages.kinfocenter python311Packages.guestfs python311Packages.libvirt python311Packages.py-dmidecode python312Packages.guestfs python312Packages.py-dmidecode rasdaemon resources rubyPackages.ruby-libvirt rubyPackages_3_1.ruby-libvirt ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/k4r1a7hksv9z4ilvch4zy7qvbrcnnhdd-dmidecode-3.6 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A dmidecode https://github.com/r-ryantm/nixpkgs/archive/0573f66f5eafee724d3d5a208320c867b005f0cc.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/0573f66f5eafee724d3d5a208320c867b005f0cc#dmidecode ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/k4r1a7hksv9z4ilvch4zy7qvbrcnnhdd-dmidecode-3.6 ls -la /nix/store/k4r1a7hksv9z4ilvch4zy7qvbrcnnhdd-dmidecode-3.6/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
9 packages failed to build:
63 packages built:
--- ###### Maintainer pings https://api.github.com/repos/NixOS/nixpkgs/pulls/307696 [result] Success updating dmidecode 3.5 -> 3.6 https://repology.org/project/dmidecode/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath guile-goblins, using log file: /var/log/nixpkgs-update/guile-goblins/2024-04-29.log guile-goblins 0.12.0 -> 0.13.0 https://repology.org/project/guile-goblins/versions attrpath: guile-goblins Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/by-name/gu/guile-goblins/package.nix b/pkgs/by-name/gu/guile-goblins/package.nix index 13b391e4f6f5..aa5bcbc4bced 100644 --- a/pkgs/by-name/gu/guile-goblins/package.nix +++ b/pkgs/by-name/gu/guile-goblins/package.nix @@ -10,11 +10,11 @@ }: stdenv.mkDerivation rec { pname = "guile-goblins"; - version = "0.12.0"; + version = "0.13.0"; src = fetchurl { url = "https://spritely.institute/files/releases/guile-goblins/guile-goblins-${version}.tar.gz"; - hash = "sha256-P5WKKv5i5Lrs4en+IWL40AkYAD+bgTyFdsQqE4FxPfA="; + hash = "sha256-efmyOtPAz1ZPdMCuVaGALR6e0lg7gcjt81BUMBVUKug="; }; strictDeps = true; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/vmxvrziap94fz9wp6azhffl8nn1qcvdj-guile-goblins-0.13.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/guile-goblins/versions. meta.description for guile-goblins is: Spritely Goblins for Guile meta.homepage for guile-goblins is: https://spritely.institute/goblins/ ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.13.0 in filename of file in /nix/store/vmxvrziap94fz9wp6azhffl8nn1qcvdj-guile-goblins-0.13.0 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath guile-goblins ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/vmxvrziap94fz9wp6azhffl8nn1qcvdj-guile-goblins-0.13.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A guile-goblins https://github.com/r-ryantm/nixpkgs/archive/3d6ee473d834f2f32027f4bc260cc2c31304d1b7.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/3d6ee473d834f2f32027f4bc260cc2c31304d1b7#guile-goblins ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/vmxvrziap94fz9wp6azhffl8nn1qcvdj-guile-goblins-0.13.0 ls -la /nix/store/vmxvrziap94fz9wp6azhffl8nn1qcvdj-guile-goblins-0.13.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @offsetcyan for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307700 [result] Success updating guile-goblins 0.12.0 -> 0.13.0 https://repology.org/project/guile-goblins/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath fldigi, using log file: /var/log/nixpkgs-update/fldigi/2024-04-29.log fldigi 4.2.04 -> 4.2.05 https://repology.org/project/fldigi/versions attrpath: fldigi Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/applications/radio/fldigi/default.nix b/pkgs/applications/radio/fldigi/default.nix index abdf52051345..d0bb561cdac6 100644 --- a/pkgs/applications/radio/fldigi/default.nix +++ b/pkgs/applications/radio/fldigi/default.nix @@ -18,11 +18,11 @@ stdenv.mkDerivation rec { pname = "fldigi"; - version = "4.2.04"; + version = "4.2.05"; src = fetchurl { url = "mirror://sourceforge/${pname}/${pname}-${version}.tar.gz"; - hash = "sha256-crVeX9vtvn1O5ah1dc74425qUKcozKlDMVeIefMpktY="; + hash = "sha256-rBGJ+63Szhy37LQw0LpE2/lLyP5lwK7hsz/uq453iHY="; }; nativeBuildInputs = [ pkg-config ]; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/w9cw10x0mqnka1wf1qxyr4fgmi687b6v-fldigi-4.2.05" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/fldigi/versions. meta.description for fldigi is: Digital modem program meta.homepage for fldigi is: https://sourceforge.net/projects/fldigi/ ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 4.2.05 with grep in /nix/store/w9cw10x0mqnka1wf1qxyr4fgmi687b6v-fldigi-4.2.05 - found 4.2.05 in filename of file in /nix/store/w9cw10x0mqnka1wf1qxyr4fgmi687b6v-fldigi-4.2.05 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath fldigi ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/w9cw10x0mqnka1wf1qxyr4fgmi687b6v-fldigi-4.2.05 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A fldigi https://github.com/r-ryantm/nixpkgs/archive/aa6d9fbc589efc7915e8819fa54e2a868c8213da.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/aa6d9fbc589efc7915e8819fa54e2a868c8213da#fldigi ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/w9cw10x0mqnka1wf1qxyr4fgmi687b6v-fldigi-4.2.05 ls -la /nix/store/w9cw10x0mqnka1wf1qxyr4fgmi687b6v-fldigi-4.2.05/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @relrod @ftrvxmtrx for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307706 [result] Success updating fldigi 4.2.04 -> 4.2.05 https://repology.org/project/fldigi/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gnomeExtensions.space-bar, using log file: /var/log/nixpkgs-update/gnomeExtensions.space-bar/2024-04-29.log gnomeExtensions.space-bar 24 -> 25 https://repology.org/project/gnome:space-bar/versions attrpath: gnomeExtensions.space-bar Checking auto update branch... No auto update branch exists Old version 24" not present in master derivation file with contents: { pkgs, lib, stdenv, fetchzip, nixosTests }: let buildGnomeExtension = { # Every gnome extension has a UUID. It's the name of the extension folder once unpacked # and can always be found in the metadata.json of every extension. uuid, name, pname, description, # extensions.gnome.org extension URL link, # Extension version numbers are integers version, sha256, # Hex-encoded string of JSON bytes metadata, }: stdenv.mkDerivation { pname = "gnome-shell-extension-${pname}"; version = builtins.toString version; src = fetchzip { url = "https://extensions.gnome.org/extension-data/${ builtins.replaceStrings [ "@" ] [ "" ] uuid }.v${builtins.toString version}.shell-extension.zip"; inherit sha256; stripRoot = false; # The download URL may change content over time. This is because the # metadata.json is automatically generated, and parts of it can be changed # without making a new release. We simply substitute the possibly changed fields # with their content from when we last updated, and thus get a deterministic output # hash. postFetch = '' echo "${metadata}" | base64 --decode > $out/metadata.json ''; }; nativeBuildInputs = with pkgs; [ buildPackages.glib ]; buildPhase = '' runHook preBuild if [ -d schemas ]; then glib-compile-schemas --strict schemas fi runHook postBuild ''; installPhase = '' runHook preInstall mkdir -p $out/share/gnome-shell/extensions/ cp -r -T . $out/share/gnome-shell/extensions/${uuid} runHook postInstall ''; meta = { description = builtins.head (lib.splitString "\n" description); longDescription = description; homepage = link; license = lib.licenses.gpl2Plus; # https://wiki.gnome.org/Projects/GnomeShell/Extensions/Review#Licensing platforms = lib.platforms.linux; maintainers = with lib.maintainers; [ ]; }; passthru = { extensionPortalSlug = pname; # Store the extension's UUID, because we might need it at some places extensionUuid = uuid; tests = { gnome-extensions = nixosTests.gnome-extensions; }; }; }; in lib.makeOverridable buildGnomeExtension [result] Failed to update gnomeExtensions.space-bar 24 -> 25 https://repology.org/project/gnome:space-bar/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.mypy-protobuf, using log file: /var/log/nixpkgs-update/python311Packages.mypy-protobuf/2024-04-29.log python311Packages.mypy-protobuf 3.5.0 -> 3.6.0 https://repology.org/project/python:mypy-protobuf/versions attrpath: python311Packages.mypy-protobuf Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/w6na4f61sfgsplcvp23r53b5xr1z5vn4-packages.json.drv building '/nix/store/w6na4f61sfgsplcvp23r53b5xr1z5vn4-packages.json.drv'... Going to be running update for following packages: - python3.11-mypy-protobuf-3.5.0 Press Enter key to continue... Running update for: - python3.11-mypy-protobuf-3.5.0: UPDATING ... - python3.11-mypy-protobuf-3.5.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/mypy-protobuf/default.nix b/pkgs/development/python-modules/mypy-protobuf/default.nix index 0010e40800ec..32560c7baeef 100644 --- a/pkgs/development/python-modules/mypy-protobuf/default.nix +++ b/pkgs/development/python-modules/mypy-protobuf/default.nix @@ -10,14 +10,14 @@ buildPythonPackage rec { pname = "mypy-protobuf"; - version = "3.5.0"; + version = "3.6.0"; format = "pyproject"; disabled = pythonOlder "3.8"; src = fetchPypi { inherit pname version; - hash = "sha256-IfJw2gqXkqnax2sN9GPAJ+VhZkq2lzxZvk5NBk3+Z9w="; + hash = "sha256-AvJC6zQJ9miJ8rGjqlg1bsTZCc3Q+TEVYi6ecDZuyjw="; }; propagatedBuildInputs = [ No auto update branch exists Old version 3.5.0" not present in staging derivation file with contents: { lib , fetchPypi , buildPythonPackage , protobuf , types-protobuf , grpcio-tools , pytestCheckHook , pythonOlder }: buildPythonPackage rec { pname = "mypy-protobuf"; version = "3.6.0"; format = "pyproject"; disabled = pythonOlder "3.8"; src = fetchPypi { inherit pname version; hash = "sha256-AvJC6zQJ9miJ8rGjqlg1bsTZCc3Q+TEVYi6ecDZuyjw="; }; propagatedBuildInputs = [ protobuf types-protobuf grpcio-tools ]; doCheck = false; # ModuleNotFoundError: No module named 'testproto' nativeCheckInputs = [ pytestCheckHook ]; pythonImportsCheck = [ "mypy_protobuf" ]; meta = with lib; { description = "Generate mypy stub files from protobuf specs"; homepage = "https://github.com/dropbox/mypy-protobuf"; license = licenses.asl20; maintainers = with maintainers; [ lnl7 ]; }; } [result] Failed to update python311Packages.mypy-protobuf 3.5.0 -> 3.6.0 https://repology.org/project/python:mypy-protobuf/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath openssl_3_2, using log file: /var/log/nixpkgs-update/openssl_3_2/2024-04-29.log openssl_3_2 3.2.1 -> 3.3.0 https://repology.org/project/openssl/versions attrpath: openssl_3_2 Checking auto update branch... No auto update branch exists Version in attr path openssl_3_2 not compatible with 3.3.0 [result] Failed to update openssl_3_2 3.2.1 -> 3.3.0 https://repology.org/project/openssl/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath mpv, using log file: /var/log/nixpkgs-update/mpv/2024-04-29.log mpv 0.37.0 -> 0.38.0 https://repology.org/project/mpv/versions attrpath: mpv Checking auto update branch... No auto update branch exists There might already be an open PR for this update: - mpv: 0.37.0 -> 0.38.0 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/304349" [result] Failed to update mpv 0.37.0 -> 0.38.0 https://repology.org/project/mpv/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath batctl, using log file: /var/log/nixpkgs-update/batctl/2024-04-29.log batctl 2024.0 -> 2024.1 https://repology.org/project/batctl/versions attrpath: batctl Checking auto update branch... No auto update branch exists Old version 2024.0" not present in master derivation file with contents: { lib, stdenv, fetchurl, pkg-config, libnl }: let cfg = import ./version.nix; in stdenv.mkDerivation rec { pname = "batctl"; inherit (cfg) version; src = fetchurl { url = "https://downloads.open-mesh.org/batman/releases/batman-adv-${version}/${pname}-${version}.tar.gz"; sha256 = cfg.sha256.${pname}; }; nativeBuildInputs = [ pkg-config ]; buildInputs = [ libnl ]; preBuild = '' makeFlags="PREFIX=$out" ''; meta = { homepage = "https://www.open-mesh.org/projects/batman-adv/wiki/Wiki"; description = "B.A.T.M.A.N. routing protocol in a linux kernel module for layer 2, control tool"; mainProgram = "batctl"; license = lib.licenses.gpl2; maintainers = with lib.maintainers; [ fpletz ]; platforms = with lib.platforms; linux; }; } [result] Failed to update batctl 2024.0 -> 2024.1 https://repology.org/project/batctl/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath alfred, using log file: /var/log/nixpkgs-update/alfred/2024-04-29.log alfred 2024.0 -> 2024.1 https://repology.org/project/alfred/versions attrpath: alfred Checking auto update branch... No auto update branch exists Old version 2024.0" not present in master derivation file with contents: { lib, stdenv, fetchurl, pkg-config, gpsd, libcap, libnl }: let cfg = import ./version.nix; in stdenv.mkDerivation rec { pname = "alfred"; inherit (cfg) version; src = fetchurl { url = "https://downloads.open-mesh.org/batman/releases/batman-adv-${version}/${pname}-${version}.tar.gz"; sha256 = cfg.sha256.${pname}; }; nativeBuildInputs = [ pkg-config ]; buildInputs = [ gpsd libcap libnl ]; preBuild = '' makeFlags="PREFIX=$out" ''; meta = { homepage = "https://www.open-mesh.org/projects/batman-adv/wiki/Wiki"; description = "B.A.T.M.A.N. routing protocol in a linux kernel module for layer 2, information distribution tool"; license = lib.licenses.gpl2; maintainers = with lib.maintainers; [ fpletz ]; platforms = with lib.platforms; linux; }; } [result] Failed to update alfred 2024.0 -> 2024.1 https://repology.org/project/alfred/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.types-pytz, using log file: /var/log/nixpkgs-update/python312Packages.types-pytz/2024-04-29.log python312Packages.types-pytz 2024.1.0.20240203 -> 2024.1.0.20240417 https://repology.org/project/python:types-pytz/versions attrpath: python312Packages.types-pytz isn't the default python version [result] Failed to update python312Packages.types-pytz 2024.1.0.20240203 -> 2024.1.0.20240417 https://repology.org/project/python:types-pytz/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rubyPackages.redis, using log file: /var/log/nixpkgs-update/rubyPackages.redis/2024-04-29.log rubyPackages.redis 5.1.0 -> 5.2.0 https://repology.org/project/ruby:redis/versions attrpath: rubyPackages.redis Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update rubyPackages.redis 5.1.0 -> 5.2.0 https://repology.org/project/ruby:redis/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath mission-center, using log file: /var/log/nixpkgs-update/mission-center/2024-04-29.log mission-center 0.4.4 -> 0.4.5 https://repology.org/project/mission-center/versions attrpath: mission-center Checking auto update branch... No auto update branch exists There might already be an open PR for this update: - mission-center: 0.4.4 -> 0.4.5 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/306962" [result] Failed to update mission-center 0.4.4 -> 0.4.5 https://repology.org/project/mission-center/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.pluggy, using log file: /var/log/nixpkgs-update/python312Packages.pluggy/2024-04-29.log python312Packages.pluggy 1.4.0 -> 1.5.0 https://repology.org/project/python:pluggy/versions attrpath: python312Packages.pluggy isn't the default python version [result] Failed to update python312Packages.pluggy 1.4.0 -> 1.5.0 https://repology.org/project/python:pluggy/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath clamav, using log file: /var/log/nixpkgs-update/clamav/2024-04-29.log clamav 1.3.0 -> 1.3.1 https://repology.org/project/clamav/versions attrpath: clamav Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/tools/security/clamav/default.nix b/pkgs/tools/security/clamav/default.nix index c9d15351da4e..256fe1a77256 100644 --- a/pkgs/tools/security/clamav/default.nix +++ b/pkgs/tools/security/clamav/default.nix @@ -6,11 +6,11 @@ stdenv.mkDerivation rec { pname = "clamav"; - version = "1.3.0"; + version = "1.3.1"; src = fetchurl { url = "https://www.clamav.net/downloads/production/${pname}-${version}.tar.gz"; - hash = "sha256-CoamSWMg2RV2A3szEBEZr2/Y1bkQYM0xajqcIp6WBKo="; + hash = "sha256-EqMDW/JvVfceMQalGl+o17dEVy35imOSCpz/h2p9zOQ="; }; patches = [ [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/xmbnw1k9vgi02zy8s9vpsc8dababmlzb-clamav-1.3.1" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
3 packages built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/clamav/versions. meta.description for clamav is: Antivirus engine designed for detecting Trojans, viruses, malware and other malicious threats meta.homepage for clamav is: https://www.clamav.net ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 1.3.1 with grep in /nix/store/xmbnw1k9vgi02zy8s9vpsc8dababmlzb-clamav-1.3.1 - found 1.3.1 in filename of file in /nix/store/xmbnw1k9vgi02zy8s9vpsc8dababmlzb-clamav-1.3.1 ---
Rebuild report (if merged into master) (click to expand) ``` 3 total rebuild path(s) 3 package rebuild(s) First fifty rebuilds by attrpath clamav clamtk ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/xmbnw1k9vgi02zy8s9vpsc8dababmlzb-clamav-1.3.1 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A clamav https://github.com/r-ryantm/nixpkgs/archive/fd0ca03e574028aef7c07d5fe993048eed886271.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/fd0ca03e574028aef7c07d5fe993048eed886271#clamav ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/xmbnw1k9vgi02zy8s9vpsc8dababmlzb-clamav-1.3.1 ls -la /nix/store/xmbnw1k9vgi02zy8s9vpsc8dababmlzb-clamav-1.3.1/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
3 packages built:
--- ###### Maintainer pings cc @robberer @qknight @globin for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307713 [result] Success updating clamav 1.3.0 -> 1.3.1 https://repology.org/project/clamav/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath swagger-codegen3, using log file: /var/log/nixpkgs-update/swagger-codegen3/2024-04-29.log swagger-codegen3 3.0.54 -> 3.0.55 https://repology.org/project/swagger-codegen/versions attrpath: swagger-codegen3 Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/tools/networking/swagger-codegen3/default.nix b/pkgs/tools/networking/swagger-codegen3/default.nix index 4caade2c053e..48db097e35b4 100644 --- a/pkgs/tools/networking/swagger-codegen3/default.nix +++ b/pkgs/tools/networking/swagger-codegen3/default.nix @@ -1,7 +1,7 @@ { lib, stdenv, fetchurl, jre, makeWrapper, testers, swagger-codegen3 }: stdenv.mkDerivation rec { - version = "3.0.54"; + version = "3.0.55"; pname = "swagger-codegen"; jarfilename = "${pname}-cli-${version}.jar"; @@ -12,7 +12,7 @@ stdenv.mkDerivation rec { src = fetchurl { url = "mirror://maven/io/swagger/codegen/v3/${pname}-cli/${version}/${jarfilename}"; - sha256 = "sha256-OOv+7r43mxUZjTs3tGHax3Yu7CNM8bg6XkOt5pJADy0="; + sha256 = "sha256-xiPeWblDr6P405o4ik0gWG2GfBPC/eGtEyF6XCRFHGg="; }; dontUnpack = true; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/rplp4l359wmf5a9pbxkcvk406y7c375f-swagger-codegen-3.0.55" Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 3 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/swagger-codegen/versions. meta.description for swagger-codegen3 is: Allows generation of API client libraries (SDK generation), server stubs and documentation automatically given an OpenAPI Spec meta.homepage for swagger-codegen3 is: https://github.com/swagger-api/swagger-codegen/tree/3.0.0 ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 3.0.55 with grep in /nix/store/rplp4l359wmf5a9pbxkcvk406y7c375f-swagger-codegen-3.0.55 - found 3.0.55 in filename of file in /nix/store/rplp4l359wmf5a9pbxkcvk406y7c375f-swagger-codegen-3.0.55 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath swagger-codegen3 ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/rplp4l359wmf5a9pbxkcvk406y7c375f-swagger-codegen-3.0.55 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A swagger-codegen3 https://github.com/r-ryantm/nixpkgs/archive/3419425b6de5a8dcfaf11556ba7545485ac3dbba.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/3419425b6de5a8dcfaf11556ba7545485ac3dbba#swagger-codegen3 ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/rplp4l359wmf5a9pbxkcvk406y7c375f-swagger-codegen-3.0.55 ls -la /nix/store/rplp4l359wmf5a9pbxkcvk406y7c375f-swagger-codegen-3.0.55/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @1000101 for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307716 [result] Success updating swagger-codegen3 3.0.54 -> 3.0.55 https://repology.org/project/swagger-codegen/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.usort, using log file: /var/log/nixpkgs-update/python312Packages.usort/2024-04-29.log python312Packages.usort 1.0.7 -> 1.0.8.post1 https://repology.org/project/python:usort/versions attrpath: python312Packages.usort isn't the default python version [result] Failed to update python312Packages.usort 1.0.7 -> 1.0.8.post1 https://repology.org/project/python:usort/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rubyPackages.glib2, using log file: /var/log/nixpkgs-update/rubyPackages.glib2/2024-04-29.log rubyPackages.glib2 4.2.1 -> 4.2.2 https://repology.org/project/ruby-gnome2/versions attrpath: rubyPackages.glib2 Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update rubyPackages.glib2 4.2.1 -> 4.2.2 https://repology.org/project/ruby-gnome2/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.whois, using log file: /var/log/nixpkgs-update/python312Packages.whois/2024-04-29.log python312Packages.whois 0.99.3 -> 1.20240129.2 https://repology.org/project/python:whois/versions attrpath: python312Packages.whois isn't the default python version [result] Failed to update python312Packages.whois 0.99.3 -> 1.20240129.2 https://repology.org/project/python:whois/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath ledger-live-desktop, using log file: /var/log/nixpkgs-update/ledger-live-desktop/2024-04-29.log ledger-live-desktop 2.77.2 -> 2.79.1 https://repology.org/project/ledger-live-desktop/versions attrpath: ledger-live-desktop Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/applications/blockchains/ledger-live-desktop/default.nix b/pkgs/applications/blockchains/ledger-live-desktop/default.nix index d49902c9d5ac..24ba95df584f 100644 --- a/pkgs/applications/blockchains/ledger-live-desktop/default.nix +++ b/pkgs/applications/blockchains/ledger-live-desktop/default.nix @@ -2,11 +2,11 @@ let pname = "ledger-live-desktop"; - version = "2.77.2"; + version = "2.79.1"; src = fetchurl { url = "https://download.live.ledger.com/${pname}-${version}-linux-x86_64.AppImage"; - hash = "sha256-orIyfRs6TJgqGGLpl2tvoUtejsB0ni8xRK0SboP2LHw="; + hash = "sha256-zgs4uIK73CBp4hTbuO8LdcgvmUN3hYsnv61E+WGlpjg="; }; appimageContents = appimageTools.extractType2 { [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/l3xgimava9jnmfqcmcp0l8f6qj4nyh52-ledger-live-desktop-2.79.1" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/ledger-live-desktop/versions. meta.description for ledger-live-desktop is: App for Ledger hardware wallets meta.homepage for ledger-live-desktop is: https://www.ledger.com/ledger-live/ ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 2.79.1 with grep in /nix/store/l3xgimava9jnmfqcmcp0l8f6qj4nyh52-ledger-live-desktop-2.79.1 - found 2.79.1 in filename of file in /nix/store/l3xgimava9jnmfqcmcp0l8f6qj4nyh52-ledger-live-desktop-2.79.1 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath ledger-live-desktop ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/l3xgimava9jnmfqcmcp0l8f6qj4nyh52-ledger-live-desktop-2.79.1 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A ledger-live-desktop https://github.com/r-ryantm/nixpkgs/archive/857ad2250ea724c8e3d87ab875503597418d74ee.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/857ad2250ea724c8e3d87ab875503597418d74ee#ledger-live-desktop ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/l3xgimava9jnmfqcmcp0l8f6qj4nyh52-ledger-live-desktop-2.79.1 ls -la /nix/store/l3xgimava9jnmfqcmcp0l8f6qj4nyh52-ledger-live-desktop-2.79.1/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @andresilva @thedavidmeister @nyanloutre @RaghavSood @Th0rgal for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307723 [result] Success updating ledger-live-desktop 2.77.2 -> 2.79.1 https://repology.org/project/ledger-live-desktop/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath postgresql12JitPackages.pgroonga, using log file: /var/log/nixpkgs-update/postgresql12JitPackages.pgroonga/2024-04-29.log postgresql12JitPackages.pgroonga 3.1.8 -> 3.2.0 https://repology.org/project/pgroonga/versions attrpath: postgresql12JitPackages.pgroonga creates too many duplicate PRs [result] Failed to update postgresql12JitPackages.pgroonga 3.1.8 -> 3.2.0 https://repology.org/project/pgroonga/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.sybil, using log file: /var/log/nixpkgs-update/python312Packages.sybil/2024-04-29.log python312Packages.sybil 6.0.3 -> 6.1.0 https://repology.org/project/python:sybil/versions attrpath: python312Packages.sybil isn't the default python version [result] Failed to update python312Packages.sybil 6.0.3 -> 6.1.0 https://repology.org/project/python:sybil/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cobalt, using log file: /var/log/nixpkgs-update/cobalt/2024-04-29.log cobalt 0.19.2 -> 0.19.3 https://repology.org/project/cobalt/versions attrpath: cobalt Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] Replacing cargoHash with sha256-vw7fGsTSEVO8s1LzilKJN5lGzOfQcms1h7rnTOyE4Kw= [rustCrateVersion] Finished updating Crate version and replacing hashes [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/applications/misc/cobalt/default.nix b/pkgs/applications/misc/cobalt/default.nix index e35939536a61..1fda51767541 100644 --- a/pkgs/applications/misc/cobalt/default.nix +++ b/pkgs/applications/misc/cobalt/default.nix @@ -2,16 +2,16 @@ rustPlatform.buildRustPackage rec { pname = "cobalt"; - version = "0.19.2"; + version = "0.19.3"; src = fetchFromGitHub { owner = "cobalt-org"; repo = "cobalt.rs"; rev = "v${version}"; - sha256 = "sha256-W0XbNZDSeSK6oxOD1JeLNF+c6/6cy/WQrrmQbSKeqk4="; + sha256 = "sha256-aAhceExz5SENL+FhPHyx8HmaNOWjNsynv81Rj2cS5M8="; }; - cargoHash = "sha256-IM2SKovb8FYwA/c4R3N7M+oVuGfuc5sK+r6FP9YMk+I="; + cargoHash = "sha256-vw7fGsTSEVO8s1LzilKJN5lGzOfQcms1h7rnTOyE4Kw="; buildInputs = lib.optionals stdenv.isDarwin [ CoreServices ]; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/pysbii6nrlvcx2jhmfhc7qqm74bavmr0-cobalt-0.19.3" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/cobalt/versions. meta.description for cobalt is: Static site generator written in Rust meta.homepage for cobalt is: https://github.com/cobalt-org/cobalt.rs/ ###### Updates performed - Rust version update ###### To inspect upstream changes - [Compare changes on GitHub](https://github.com/cobalt-org/cobalt.rs/compare/v0.19.2...v0.19.3) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.19.3 with grep in /nix/store/pysbii6nrlvcx2jhmfhc7qqm74bavmr0-cobalt-0.19.3 - found 0.19.3 in filename of file in /nix/store/pysbii6nrlvcx2jhmfhc7qqm74bavmr0-cobalt-0.19.3 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath cobalt ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/pysbii6nrlvcx2jhmfhc7qqm74bavmr0-cobalt-0.19.3 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A cobalt https://github.com/r-ryantm/nixpkgs/archive/60d590b9d15d9effd291171cd9d8eff6786e8466.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/60d590b9d15d9effd291171cd9d8eff6786e8466#cobalt ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/pysbii6nrlvcx2jhmfhc7qqm74bavmr0-cobalt-0.19.3 ls -la /nix/store/pysbii6nrlvcx2jhmfhc7qqm74bavmr0-cobalt-0.19.3/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @ethancedwards8 for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307732 [result] Success updating cobalt 0.19.2 -> 0.19.3 https://repology.org/project/cobalt/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath taplo, using log file: /var/log/nixpkgs-update/taplo/2024-04-29.log taplo 0.9.0 -> 0.9.1 https://repology.org/project/taplo/versions attrpath: taplo Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/19l36hsk63w907pzfpmpq20zsq4crr16-taplo-cli-0.9.1.tar.gz.drv building '/nix/store/19l36hsk63w907pzfpmpq20zsq4crr16-taplo-cli-0.9.1.tar.gz.drv'... trying https://crates.io/api/v1/crates/taplo-cli/0.9.1/download % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (56) The requested URL returned error: 403 error: cannot download taplo-cli-0.9.1.tar.gz from any mirror error: builder for '/nix/store/19l36hsk63w907pzfpmpq20zsq4crr16-taplo-cli-0.9.1.tar.gz.drv' failed with exit code 1; last 8 log lines: > > trying https://crates.io/api/v1/crates/taplo-cli/0.9.1/download > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (56) The requested URL returned error: 403 > error: cannot download taplo-cli-0.9.1.tar.gz from any mirror For full logs, run 'nix log /nix/store/19l36hsk63w907pzfpmpq20zsq4crr16-taplo-cli-0.9.1.tar.gz.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'taplo.originalSrc' not found stderr did not split as expected full stderr was: these 3 derivations will be built: /nix/store/19l36hsk63w907pzfpmpq20zsq4crr16-taplo-cli-0.9.1.tar.gz.drv /nix/store/ffa1jrd6h1lv7qd38pwhkqca2xidmhbr-taplo-0.9.1-vendor.tar.gz.drv /nix/store/wlxpykpaq670ryynlgixk7d3knq53lia-taplo-0.9.1.drv building '/nix/store/19l36hsk63w907pzfpmpq20zsq4crr16-taplo-cli-0.9.1.tar.gz.drv'... trying https://crates.io/api/v1/crates/taplo-cli/0.9.1/download % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 curl: (56) The requested URL returned error: 403 error: cannot download taplo-cli-0.9.1.tar.gz from any mirror error: builder for '/nix/store/19l36hsk63w907pzfpmpq20zsq4crr16-taplo-cli-0.9.1.tar.gz.drv' failed with exit code 1; last 8 log lines: > > trying https://crates.io/api/v1/crates/taplo-cli/0.9.1/download > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 > curl: (56) The requested URL returned error: 403 > error: cannot download taplo-cli-0.9.1.tar.gz from any mirror For full logs, run 'nix log /nix/store/19l36hsk63w907pzfpmpq20zsq4crr16-taplo-cli-0.9.1.tar.gz.drv'. error: 1 dependencies of derivation '/nix/store/wlxpykpaq670ryynlgixk7d3knq53lia-taplo-0.9.1.drv' failed to build [result] Failed to update taplo 0.9.0 -> 0.9.1 https://repology.org/project/taplo/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath commonsBcel, using log file: /var/log/nixpkgs-update/commonsBcel/2024-04-29.log commonsBcel 6.8.1 -> 6.8.2 https://repology.org/project/bcel/versions attrpath: commonsBcel Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/libraries/java/commons/bcel/default.nix b/pkgs/development/libraries/java/commons/bcel/default.nix index f25f4a552b7c..0387b5dd9e30 100644 --- a/pkgs/development/libraries/java/commons/bcel/default.nix +++ b/pkgs/development/libraries/java/commons/bcel/default.nix @@ -1,12 +1,12 @@ {lib, stdenv, fetchurl}: stdenv.mkDerivation rec { - version = "6.8.1"; + version = "6.8.2"; pname = "commons-bcel"; src = fetchurl { url = "mirror://apache/commons/bcel/binaries/bcel-${version}-bin.tar.gz"; - hash = "sha256-a7PqcVvS+7tHSU2uXi5gLpl82ZN9hA03VEnCnc5cnRc="; + hash = "sha256-VRCRxy+P3uPW9gWy9xHfJ35muhWCHtXNimRmTfba+04="; }; installPhase = '' [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/9ysns79l4sp4zy5jrmxjppww1nj719h7-commons-bcel-6.8.2" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/bcel/versions. meta.description for commonsBcel is: Gives users a convenient way to analyze, create, and manipulate (binary) Java class files meta.homepage for commonsBcel is: https://commons.apache.org/proper/commons-bcel/ ###### Updates performed - Version update ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 6.8.2 in filename of file in /nix/store/9ysns79l4sp4zy5jrmxjppww1nj719h7-commons-bcel-6.8.2 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath commonsBcel ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/9ysns79l4sp4zy5jrmxjppww1nj719h7-commons-bcel-6.8.2 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A commonsBcel https://github.com/r-ryantm/nixpkgs/archive/b0fde6566493960c9604872ea2d05d9f22c6e2f2.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/b0fde6566493960c9604872ea2d05d9f22c6e2f2#commonsBcel ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/9ysns79l4sp4zy5jrmxjppww1nj719h7-commons-bcel-6.8.2 ls -la /nix/store/9ysns79l4sp4zy5jrmxjppww1nj719h7-commons-bcel-6.8.2/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @copumpkin for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307734 [result] Success updating commonsBcel 6.8.1 -> 6.8.2 https://repology.org/project/bcel/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cargo-deb, using log file: /var/log/nixpkgs-update/cargo-deb/2024-04-29.log cargo-deb 2.1.0 -> 2.1.1 https://repology.org/project/cargo-deb/versions attrpath: cargo-deb Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] Replacing cargoHash with sha256-MmHwaodr/FLxCucfCkV/Cuflyu8902kpEPuTCKkchNU= [rustCrateVersion] Finished updating Crate version and replacing hashes [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/tools/rust/cargo-deb/default.nix b/pkgs/development/tools/rust/cargo-deb/default.nix index b70f742772c0..236fd2f3e025 100644 --- a/pkgs/development/tools/rust/cargo-deb/default.nix +++ b/pkgs/development/tools/rust/cargo-deb/default.nix @@ -7,16 +7,16 @@ rustPlatform.buildRustPackage rec { pname = "cargo-deb"; - version = "2.1.0"; + version = "2.1.1"; src = fetchFromGitHub { owner = "kornelski"; repo = pname; rev = "v${version}"; - hash = "sha256-LCyTbOSSz3O53hZmOPcK+tB5LNZLE4uwfOZrwJZuebc="; + hash = "sha256-FIBMwLgLLgf6m/ciSlYiQ46HHf1ux0QY4RkoidlaEjs="; }; - cargoHash = "sha256-apT60W4lUCMsRvuzGkY8AkA8m8e7ESGGnmOpyv5Ca1I="; + cargoHash = "sha256-MmHwaodr/FLxCucfCkV/Cuflyu8902kpEPuTCKkchNU="; nativeBuildInputs = [ makeWrapper [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/cll5pgb9iafvrbabnqw5y1zhndci7klc-cargo-deb-2.1.1" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://repology.org/project/cargo-deb/versions. meta.description for cargo-deb is: A cargo subcommand that generates Debian packages from information in Cargo.toml meta.homepage for cargo-deb is: https://github.com/kornelski/cargo-deb ###### Updates performed - Rust version update ###### To inspect upstream changes - [Compare changes on GitHub](https://github.com/kornelski/cargo-deb/compare/v2.1.0...v2.1.1) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 2.1.1 with grep in /nix/store/cll5pgb9iafvrbabnqw5y1zhndci7klc-cargo-deb-2.1.1 - found 2.1.1 in filename of file in /nix/store/cll5pgb9iafvrbabnqw5y1zhndci7klc-cargo-deb-2.1.1 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath cargo-deb ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/cll5pgb9iafvrbabnqw5y1zhndci7klc-cargo-deb-2.1.1 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A cargo-deb https://github.com/r-ryantm/nixpkgs/archive/2e9af7cf218e588820351ff031af49cb3e41fc24.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/2e9af7cf218e588820351ff031af49cb3e41fc24#cargo-deb ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/cll5pgb9iafvrbabnqw5y1zhndci7klc-cargo-deb-2.1.1 ls -la /nix/store/cll5pgb9iafvrbabnqw5y1zhndci7klc-cargo-deb-2.1.1/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @Br1ght0ne @matthiasbeyer for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307742 [result] Success updating cargo-deb 2.1.0 -> 2.1.1 https://repology.org/project/cargo-deb/versions [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath alock, using log file: /var/log/nixpkgs-update/alock/2024-04-29.log alock 0 -> 1 attrpath: alock Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/wx3gmc5vprpj8vcy0pa078qsz1p92jjp-packages.json.drv building '/nix/store/wx3gmc5vprpj8vcy0pa078qsz1p92jjp-packages.json.drv'... Going to be running update for following packages: - alock-2.5.1 Press Enter key to continue... Running update for: - alock-2.5.1: UPDATING ... - alock-2.5.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update alock 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath libsigcxx30, using log file: /var/log/nixpkgs-update/libsigcxx30/2024-04-29.log libsigcxx30 0 -> 1 attrpath: libsigcxx30 Checking auto update branch... Do not update GNOME during a release cycle [result] Failed to update libsigcxx30 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pantheon.pantheon-agent-geoclue2, using log file: /var/log/nixpkgs-update/pantheon.pantheon-agent-geoclue2/2024-04-29.log pantheon.pantheon-agent-geoclue2 0 -> 1 attrpath: pantheon.pantheon-agent-geoclue2 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - pantheon-agent-geoclue2-1.0.6 Press Enter key to continue... Running update for: - pantheon-agent-geoclue2-1.0.6: UPDATING ... - pantheon-agent-geoclue2-1.0.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update pantheon.pantheon-agent-geoclue2 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.psychrolib, using log file: /var/log/nixpkgs-update/python311Packages.psychrolib/2024-04-29.log python311Packages.psychrolib 0 -> 1 attrpath: python311Packages.psychrolib Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-psychrolib-2.5.0 Press Enter key to continue... Running update for: - python3.11-psychrolib-2.5.0: UPDATING ... - python3.11-psychrolib-2.5.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.psychrolib 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.ratarmount, using log file: /var/log/nixpkgs-update/python311Packages.ratarmount/2024-04-29.log python311Packages.ratarmount 0 -> 1 attrpath: python311Packages.ratarmount Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-ratarmount-0.15.0 Press Enter key to continue... Running update for: - python3.11-ratarmount-0.15.0: UPDATING ... - python3.11-ratarmount-0.15.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.ratarmount 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath buildbot-full, using log file: /var/log/nixpkgs-update/buildbot-full/2024-04-29.log buildbot-full 0 -> 1 attrpath: buildbot-full Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - buildbot-with-plugins-3.11.1 Press Enter key to continue... Running update for: - buildbot-with-plugins-3.11.1: UPDATING ... - buildbot-with-plugins-3.11.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update buildbot-full 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.azure-mgmt-maps, using log file: /var/log/nixpkgs-update/python311Packages.azure-mgmt-maps/2024-04-29.log python311Packages.azure-mgmt-maps 0 -> 1 attrpath: python311Packages.azure-mgmt-maps Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-azure-mgmt-maps-2.1.0 Press Enter key to continue... Running update for: - python3.11-azure-mgmt-maps-2.1.0: UPDATING ... - python3.11-azure-mgmt-maps-2.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.azure-mgmt-maps 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.deezer-py, using log file: /var/log/nixpkgs-update/python311Packages.deezer-py/2024-04-29.log python311Packages.deezer-py 0 -> 1 attrpath: python311Packages.deezer-py Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-deezer-py-1.3.7 Press Enter key to continue... Running update for: - python3.11-deezer-py-1.3.7: UPDATING ... - python3.11-deezer-py-1.3.7: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.deezer-py 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.indexed-gzip, using log file: /var/log/nixpkgs-update/python311Packages.indexed-gzip/2024-04-29.log python311Packages.indexed-gzip 0 -> 1 attrpath: python311Packages.indexed-gzip Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-indexed_gzip-1.8.7 Press Enter key to continue... Running update for: - python3.11-indexed_gzip-1.8.7: UPDATING ... - python3.11-indexed_gzip-1.8.7: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.indexed-gzip 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyenphase, using log file: /var/log/nixpkgs-update/python311Packages.pyenphase/2024-04-29.log python311Packages.pyenphase 0 -> 1 attrpath: python311Packages.pyenphase Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pyenphase-1.20.2 Press Enter key to continue... Running update for: - python3.11-pyenphase-1.20.2: UPDATING ... - python3.11-pyenphase-1.20.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyenphase 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath firebird_4, using log file: /var/log/nixpkgs-update/firebird_4/2024-04-29.log firebird_4 4.0.2 -> 5.0.0 https://github.com/FirebirdSQL/firebird/releases attrpath: firebird_4 Checking auto update branch... No auto update branch exists Version in attr path firebird_4 not compatible with 5.0.0 [result] Failed to update firebird_4 4.0.2 -> 5.0.0 https://github.com/FirebirdSQL/firebird/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath smbscan, using log file: /var/log/nixpkgs-update/smbscan/2024-04-29.log smbscan 0 -> 1 attrpath: smbscan Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - smbscan-unstable-2022-05-26 Press Enter key to continue... Running update for: - smbscan-unstable-2022-05-26: UPDATING ... - smbscan-unstable-2022-05-26: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update smbscan 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath kdePackages.zxing-cpp, using log file: /var/log/nixpkgs-update/kdePackages.zxing-cpp/2024-04-29.log kdePackages.zxing-cpp 0 -> 1 attrpath: kdePackages.zxing-cpp Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - zxing-cpp-2.2.1 Press Enter key to continue... Running update for: - zxing-cpp-2.2.1: UPDATING ... - zxing-cpp-2.2.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update kdePackages.zxing-cpp 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath kdePackages.qzxing, using log file: /var/log/nixpkgs-update/kdePackages.qzxing/2024-04-29.log kdePackages.qzxing 0 -> 1 attrpath: kdePackages.qzxing Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - qzxing-3.3.0 Press Enter key to continue... Running update for: - qzxing-3.3.0: UPDATING ... - qzxing-3.3.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update kdePackages.qzxing 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath csview, using log file: /var/log/nixpkgs-update/csview/2024-04-29.log csview 1.3.0 -> 1.3.1 https://github.com/wfxr/csview/releases attrpath: csview Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] Replacing cargoHash with sha256-ZXLu/6IQ20u8dk0gaZoBh0rt6CGaRBNVHGgrCW5+yzA= [rustCrateVersion] Finished updating Crate version and replacing hashes [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/tools/text/csview/default.nix b/pkgs/tools/text/csview/default.nix index 5420591e5842..b85d98b58fd7 100644 --- a/pkgs/tools/text/csview/default.nix +++ b/pkgs/tools/text/csview/default.nix @@ -2,16 +2,16 @@ rustPlatform.buildRustPackage rec { pname = "csview"; - version = "1.3.0"; + version = "1.3.1"; src = fetchFromGitHub { owner = "wfxr"; repo = pname; rev = "v${version}"; - sha256 = "sha256-v+WqiHecps3rCGf6CF0KJDZUWs7zMrFypVPTANR8b6Y="; + sha256 = "sha256-Tu/h9jhZgulrc5bTJrwq7Ksg69qUVUBjWNdzve4m9JM="; }; - cargoHash = "sha256-v5QxJto9acVJnMUvBK3QdkDH+qO2+wtqitGfSCcaJ5w="; + cargoHash = "sha256-ZXLu/6IQ20u8dk0gaZoBh0rt6CGaRBNVHGgrCW5+yzA="; meta = with lib; { description = "A high performance csv viewer with cjk/emoji support"; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/rrnbqf9y3k2jxkwrd6bim6f0bkmvf28q-csview-1.3.1" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/wfxr/csview/releases. meta.description for csview is: A high performance csv viewer with cjk/emoji support meta.homepage for csview is: https://github.com/wfxr/csview ###### Updates performed - Rust version update ###### To inspect upstream changes - [Release on GitHub](https://github.com/wfxr/csview/releases/tag/v1.3.1) - [Compare changes on GitHub](https://github.com/wfxr/csview/compare/v1.3.0...v1.3.1) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 1.3.1 with grep in /nix/store/rrnbqf9y3k2jxkwrd6bim6f0bkmvf28q-csview-1.3.1 - found 1.3.1 in filename of file in /nix/store/rrnbqf9y3k2jxkwrd6bim6f0bkmvf28q-csview-1.3.1 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath csview ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/rrnbqf9y3k2jxkwrd6bim6f0bkmvf28q-csview-1.3.1 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A csview https://github.com/r-ryantm/nixpkgs/archive/725af64d9598686113ede1e2d75f33a43433b6c6.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/725af64d9598686113ede1e2d75f33a43433b6c6#csview ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/rrnbqf9y3k2jxkwrd6bim6f0bkmvf28q-csview-1.3.1 ls -la /nix/store/rrnbqf9y3k2jxkwrd6bim6f0bkmvf28q-csview-1.3.1/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @figsoda for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307748 [result] Success updating csview 1.3.0 -> 1.3.1 https://github.com/wfxr/csview/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.fpylll, using log file: /var/log/nixpkgs-update/python311Packages.fpylll/2024-04-29.log python311Packages.fpylll 0 -> 1 attrpath: python311Packages.fpylll Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-fpylll-0.6.1 Press Enter key to continue... Running update for: - python3.11-fpylll-0.6.1: UPDATING ... - python3.11-fpylll-0.6.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.fpylll 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath qgnomeplatform-qt6, using log file: /var/log/nixpkgs-update/qgnomeplatform-qt6/2024-04-29.log qgnomeplatform-qt6 0.8.4 -> 0.9.2 https://github.com/FedoraQt/QGnomePlatform/releases attrpath: qgnomeplatform-qt6 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - qgnomeplatform-0.8.4 Press Enter key to continue... Running update for: - qgnomeplatform-0.8.4: UPDATING ... - qgnomeplatform-0.8.4: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/libraries/qgnomeplatform/default.nix b/pkgs/development/libraries/qgnomeplatform/default.nix index 4c75b475c17c..705ccec1278f 100644 --- a/pkgs/development/libraries/qgnomeplatform/default.nix +++ b/pkgs/development/libraries/qgnomeplatform/default.nix @@ -18,13 +18,13 @@ stdenv.mkDerivation rec { pname = "qgnomeplatform"; - version = "0.8.4"; + version = "0.9.2"; src = fetchFromGitHub { owner = "FedoraQt"; repo = "QGnomePlatform"; rev = version; - sha256 = "sha256-DaIBtWmce+58OOhqFG5802c3EprBAtDXhjiSPIImoOM="; + sha256 = "sha256-8hq+JapJPWOjS7ICkWnCglS8udqQ0+w45ajyyxfBIME="; }; patches = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A qgnomeplatform-qt6 nix build failed. got build log for 'qgnomeplatform-qt6' from 'daemon' @nix { "action": "setPhase", "phase": "qtPreHook" } Running phase: qtPreHook @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/jg8myix4m9nchpky5j9k2bb3ifbhn22n-source source root is source @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase applying patch /nix/store/djnps47palc34f4a9hp8m1lrdadbf8b2-hardcode-gsettings.patch patching file src/common/gnomesettings.cpp Hunk #1 FAILED at 150. 1 out of 1 hunk FAILED -- saving rejects to file src/common/gnomesettings.cpp.rej [result] Failed to update qgnomeplatform-qt6 0.8.4 -> 0.9.2 https://github.com/FedoraQt/QGnomePlatform/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cffconvert, using log file: /var/log/nixpkgs-update/cffconvert/2024-04-29.log cffconvert 0 -> 1 attrpath: cffconvert Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - cffconvert-2.0.0-unstable-2024-02-12 Press Enter key to continue... Running update for: - cffconvert-2.0.0-unstable-2024-02-12: UPDATING ... - cffconvert-2.0.0-unstable-2024-02-12: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update cffconvert 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath obs-studio, using log file: /var/log/nixpkgs-update/obs-studio/2024-04-29.log obs-studio 0 -> 1 attrpath: obs-studio Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - obs-studio-30.1.2 Press Enter key to continue... Running update for: - obs-studio-30.1.2: UPDATING ... - obs-studio-30.1.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update obs-studio 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath charmcraft, using log file: /var/log/nixpkgs-update/charmcraft/2024-04-29.log charmcraft 0 -> 1 attrpath: charmcraft Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - charmcraft-2.6.0 Press Enter key to continue... Running update for: - charmcraft-2.6.0: UPDATING ... - charmcraft-2.6.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update charmcraft 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath sshesame, using log file: /var/log/nixpkgs-update/sshesame/2024-04-29.log sshesame 0 -> 1 attrpath: sshesame Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] skipping because derivation has updateScript [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - sshesame-0.0.27 Press Enter key to continue... Running update for: - sshesame-0.0.27: UPDATING ... - sshesame-0.0.27: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update sshesame 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath kubectl-view-allocations, using log file: /var/log/nixpkgs-update/kubectl-view-allocations/2024-04-29.log kubectl-view-allocations 0.18.1 -> 0.19.2 https://github.com/davidB/kubectl-view-allocations/releases attrpath: kubectl-view-allocations Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/applications/networking/cluster/kubectl-view-allocations/default.nix b/pkgs/applications/networking/cluster/kubectl-view-allocations/default.nix index 4d67c3786bdd..715ed8065b7b 100644 --- a/pkgs/applications/networking/cluster/kubectl-view-allocations/default.nix +++ b/pkgs/applications/networking/cluster/kubectl-view-allocations/default.nix @@ -8,13 +8,13 @@ rustPlatform.buildRustPackage rec { pname = "kubectl-view-allocations"; - version = "0.18.1"; + version = "0.19.2"; src = fetchFromGitHub { owner = "davidB"; repo = pname; rev = version; - sha256 = "sha256-BM0TLzoXQg3m5fdQEnO/tErW8xmuljo74GprwEgJN8o="; + sha256 = "sha256-RAcS37ENrLxma27ieIb3dJEL2Vyu8tRq4ltjwpCgAlc="; }; postPatch = '' [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A kubectl-view-allocations nix build failed. got build log for 'kubectl-view-allocations' from 'daemon' @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/905c21z65vxrdji39kfvns812vq24vbq-source source root is source Executing cargoSetupPostUnpackHook Finished cargoSetupPostUnpackHook @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase Executing cargoSetupPostPatchHook Validating consistency between /build/source/Cargo.lock and /build/cargo-vendor-dir/Cargo.lock Finished cargoSetupPostPatchHook @nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" } Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "configurePhase" } Running phase: configurePhase @nix { "action": "setPhase", "phase": "buildPhase" } Running phase: buildPhase Executing cargoBuildHook ++ env CC_X86_64_UNKNOWN_LINUX_GNU=/nix/store/4kwk49k8rc8cg8c387kbbjcrl8i0y693-gcc-wrapper-13.2.0/bin/cc CXX_X86_64_UNKNOWN_LINUX_GNU=/nix/store/4kwk49k8rc8cg8c387kbbjcrl8i0y693-gcc-wrapper-13.2.0/bin/c++ CARGO_TARGET_X86_64_UNKNOWN_LINUX_GNU_LINKER=/nix/store/4kwk49k8rc8cg8c387kbbjcrl8i0y693-gcc-wrapper-13.2.0/bin/cc CC_X86_64_UNKNOWN_LINUX_GNU=/nix/store/4kwk49k8rc8cg8c387kbbjcrl8i0y693-gcc-wrapper-13.2.0/bin/cc CXX_X86_64_UNKNOWN_LINUX_GNU=/nix/store/4kwk49k8rc8cg8c387kbbjcrl8i0y693-gcc-wrapper-13.2.0/bin/c++ CARGO_TARGET_X86_64_UNKNOWN_LINUX_GNU_LINKER=/nix/store/4kwk49k8rc8cg8c387kbbjcrl8i0y693-gcc-wrapper-13.2.0/bin/cc CARGO_BUILD_TARGET=x86_64-unknown-linux-gnu HOST_CC=/nix/store/4kwk49k8rc8cg8c387kbbjcrl8i0y693-gcc-wrapper-13.2.0/bin/cc HOST_CXX=/nix/store/4kwk49k8rc8cg8c387kbbjcrl8i0y693-gcc-wrapper-13.2.0/bin/c++ cargo build -j 24 --target x86_64-unknown-linux-gnu --frozen --profile release error: failed to select a version for the requirement `k8s-openapi = "^0.21"` candidate versions found which didn't match: 0.20.0 location searched: directory source `/build/cargo-vendor-dir` (which is replacing registry `crates-io`) required by package `kubectl-view-allocations v0.19.2 (/build/source)` perhaps a crate was updated and forgotten to be re-vendored? [result] Failed to update kubectl-view-allocations 0.18.1 -> 0.19.2 https://github.com/davidB/kubectl-view-allocations/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath php83Packages.box, using log file: /var/log/nixpkgs-update/php83Packages.box/2024-04-29.log php83Packages.box 4.6.1 -> 4.6.2 https://github.com/box-project/box/releases attrpath: php83Packages.box Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update php83Packages.box 4.6.1 -> 4.6.2 https://github.com/box-project/box/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath php82Packages.box, using log file: /var/log/nixpkgs-update/php82Packages.box/2024-04-29.log php82Packages.box 4.6.1 -> 4.6.2 https://github.com/box-project/box/releases attrpath: php82Packages.box Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update php82Packages.box 4.6.1 -> 4.6.2 https://github.com/box-project/box/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.cffconvert, using log file: /var/log/nixpkgs-update/python311Packages.cffconvert/2024-04-29.log python311Packages.cffconvert 2.0.0-unstable-2024-02-12 -> 2.0.0 https://github.com/citation-file-format/cffconvert/releases attrpath: python311Packages.cffconvert Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-cffconvert-2.0.0-unstable-2024-02-12 Press Enter key to continue... Running update for: - python3.11-cffconvert-2.0.0-unstable-2024-02-12: UPDATING ... - python3.11-cffconvert-2.0.0-unstable-2024-02-12: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.cffconvert 2.0.0-unstable-2024-02-12 -> 2.0.0 https://github.com/citation-file-format/cffconvert/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.seccomp, using log file: /var/log/nixpkgs-update/python311Packages.seccomp/2024-04-29.log python311Packages.seccomp 0 -> 1 attrpath: python311Packages.seccomp Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-libseccomp-2.5.5 Press Enter key to continue... Running update for: - python3.11-libseccomp-2.5.5: UPDATING ... - python3.11-libseccomp-2.5.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.seccomp 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath git-mit, using log file: /var/log/nixpkgs-update/git-mit/2024-04-29.log git-mit 5.12.197 -> 5.12.198 https://github.com/PurpleBooth/git-mit/releases attrpath: git-mit Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] Replacing cargoHash with sha256-vKiCKcyB1Q2CNA4HpE8dc5gh+nlrz0VERIMaTGlDH5Y= [rustCrateVersion] Finished updating Crate version and replacing hashes [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/applications/version-management/git-mit/default.nix b/pkgs/applications/version-management/git-mit/default.nix index bdef9fe1ea7d..508f416515ad 100644 --- a/pkgs/applications/version-management/git-mit/default.nix +++ b/pkgs/applications/version-management/git-mit/default.nix @@ -10,7 +10,7 @@ }: let - version = "5.12.197"; + version = "5.12.198"; in rustPlatform.buildRustPackage { pname = "git-mit"; @@ -20,10 +20,10 @@ rustPlatform.buildRustPackage { owner = "PurpleBooth"; repo = "git-mit"; rev = "v${version}"; - hash = "sha256-Z03FDdlg1IBXHpurKr6RwmtZkaptyeQe+0lgKn/GTTQ="; + hash = "sha256-4tWgIwDmGZhMFTVT5VzmGj69zV8FGTV0yBHUy5Iu1Xw="; }; - cargoHash = "sha256-V8TV8RM3T7DYqwNV/r5PkkJVtyAQLdY3BR3sz26phdY="; + cargoHash = "sha256-vKiCKcyB1Q2CNA4HpE8dc5gh+nlrz0VERIMaTGlDH5Y="; nativeBuildInputs = [ pkg-config ]; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/2l3f4s6qnvys7lfbhxxghbhy2wfjc419-git-mit-5.12.198" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/PurpleBooth/git-mit/releases. meta.description for git-mit is: Minimalist set of hooks to aid pairing and link commits to issues meta.homepage for git-mit is: https://github.com/PurpleBooth/git-mit meta.changelog for git-mit is: https://github.com/PurpleBooth/git-mit/releases/tag/v5.12.198 ###### Updates performed - Rust version update ###### To inspect upstream changes - [Release on GitHub](https://github.com/PurpleBooth/git-mit/releases/tag/v5.12.198) - [Compare changes on GitHub](https://github.com/PurpleBooth/git-mit/compare/v5.12.197...v5.12.198) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 5.12.198 with grep in /nix/store/2l3f4s6qnvys7lfbhxxghbhy2wfjc419-git-mit-5.12.198 - found 5.12.198 in filename of file in /nix/store/2l3f4s6qnvys7lfbhxxghbhy2wfjc419-git-mit-5.12.198 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath git-mit ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/2l3f4s6qnvys7lfbhxxghbhy2wfjc419-git-mit-5.12.198 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A git-mit https://github.com/r-ryantm/nixpkgs/archive/5b18f063b90f674cbdcf9099678f2eb5f4b2754e.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/5b18f063b90f674cbdcf9099678f2eb5f4b2754e#git-mit ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/2l3f4s6qnvys7lfbhxxghbhy2wfjc419-git-mit-5.12.198 ls -la /nix/store/2l3f4s6qnvys7lfbhxxghbhy2wfjc419-git-mit-5.12.198/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @figsoda for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307753 [result] Success updating git-mit 5.12.197 -> 5.12.198 https://github.com/PurpleBooth/git-mit/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.jupyter-cache, using log file: /var/log/nixpkgs-update/python311Packages.jupyter-cache/2024-04-29.log python311Packages.jupyter-cache 0 -> 1 attrpath: python311Packages.jupyter-cache Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-jupyter-cache-1.0.0 Press Enter key to continue... Running update for: - python3.11-jupyter-cache-1.0.0: UPDATING ... - python3.11-jupyter-cache-1.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.jupyter-cache 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pystring, using log file: /var/log/nixpkgs-update/pystring/2024-04-29.log pystring 1.1.3 -> 1.1.4 https://github.com/imageworks/pystring/releases attrpath: pystring Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update pystring 1.1.3 -> 1.1.4 https://github.com/imageworks/pystring/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.dask-image, using log file: /var/log/nixpkgs-update/python311Packages.dask-image/2024-04-29.log python311Packages.dask-image 0 -> 1 attrpath: python311Packages.dask-image Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-dask-image-2023.8.1 Press Enter key to continue... Running update for: - python3.11-dask-image-2023.8.1: UPDATING ... - python3.11-dask-image-2023.8.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.dask-image 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath i3-balance-workspace, using log file: /var/log/nixpkgs-update/i3-balance-workspace/2024-04-29.log i3-balance-workspace 0 -> 1 attrpath: i3-balance-workspace Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-i3-balance-workspace-1.8.6 Press Enter key to continue... Running update for: - python3.11-i3-balance-workspace-1.8.6: UPDATING ... - python3.11-i3-balance-workspace-1.8.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update i3-balance-workspace 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.llama-index-agent-openai, using log file: /var/log/nixpkgs-update/python311Packages.llama-index-agent-openai/2024-04-29.log python311Packages.llama-index-agent-openai 0 -> 1 attrpath: python311Packages.llama-index-agent-openai Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-llama-index-agent-openai-0.2.3 Press Enter key to continue... Running update for: - python3.11-llama-index-agent-openai-0.2.3: UPDATING ... - python3.11-llama-index-agent-openai-0.2.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.llama-index-agent-openai 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.llama-index-vector-stores-chroma, using log file: /var/log/nixpkgs-update/python311Packages.llama-index-vector-stores-chroma/2024-04-29.log python311Packages.llama-index-vector-stores-chroma 0 -> 1 attrpath: python311Packages.llama-index-vector-stores-chroma Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-llama-index-vector-stores-chroma-0.1.6 Press Enter key to continue... Running update for: - python3.11-llama-index-vector-stores-chroma-0.1.6: UPDATING ... - python3.11-llama-index-vector-stores-chroma-0.1.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.llama-index-vector-stores-chroma 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.llama-index-llms-openai, using log file: /var/log/nixpkgs-update/python311Packages.llama-index-llms-openai/2024-04-29.log python311Packages.llama-index-llms-openai 0 -> 1 attrpath: python311Packages.llama-index-llms-openai Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-llama-index-llms-openai-0.1.16 Press Enter key to continue... Running update for: - python3.11-llama-index-llms-openai-0.1.16: UPDATING ... - python3.11-llama-index-llms-openai-0.1.16: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.llama-index-llms-openai 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.llama-index-indices-managed-llama-cloud, using log file: /var/log/nixpkgs-update/python311Packages.llama-index-indices-managed-llama-cloud/2024-04-29.log python311Packages.llama-index-indices-managed-llama-cloud 0 -> 1 attrpath: python311Packages.llama-index-indices-managed-llama-cloud Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/cbdjzh978bkcff5xl77zzcxhymmiq7zw-packages.json.drv building '/nix/store/cbdjzh978bkcff5xl77zzcxhymmiq7zw-packages.json.drv'... Going to be running update for following packages: - python3.11-llama-index-indices-managed-llama-cloud-0.1.6 Press Enter key to continue... Running update for: - python3.11-llama-index-indices-managed-llama-cloud-0.1.6: UPDATING ... - python3.11-llama-index-indices-managed-llama-cloud-0.1.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.llama-index-indices-managed-llama-cloud 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.llama-index-program-openai, using log file: /var/log/nixpkgs-update/python311Packages.llama-index-program-openai/2024-04-29.log python311Packages.llama-index-program-openai 0 -> 1 attrpath: python311Packages.llama-index-program-openai Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/i72afblamida47n77kl0hrbhb27qa2fy-packages.json.drv building '/nix/store/i72afblamida47n77kl0hrbhb27qa2fy-packages.json.drv'... Going to be running update for following packages: - python3.11-llama-index-program-openai-0.1.6 Press Enter key to continue... Running update for: - python3.11-llama-index-program-openai-0.1.6: UPDATING ... - python3.11-llama-index-program-openai-0.1.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.llama-index-program-openai 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.srptools, using log file: /var/log/nixpkgs-update/python311Packages.srptools/2024-04-29.log python311Packages.srptools 0 -> 1 attrpath: python311Packages.srptools Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-srptools-1.0.1 Press Enter key to continue... Running update for: - python3.11-srptools-1.0.1: UPDATING ... - python3.11-srptools-1.0.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.srptools 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.mautrix, using log file: /var/log/nixpkgs-update/python311Packages.mautrix/2024-04-29.log python311Packages.mautrix 0 -> 1 attrpath: python311Packages.mautrix Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-mautrix-0.20.4 Press Enter key to continue... Running update for: - python3.11-mautrix-0.20.4: UPDATING ... - python3.11-mautrix-0.20.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.mautrix 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gitlint, using log file: /var/log/nixpkgs-update/gitlint/2024-04-29.log gitlint 0 -> 1 attrpath: gitlint Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - gitlint-0.19.1 Press Enter key to continue... Running update for: - gitlint-0.19.1: UPDATING ... - gitlint-0.19.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update gitlint 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.wsproto, using log file: /var/log/nixpkgs-update/python311Packages.wsproto/2024-04-29.log python311Packages.wsproto 0 -> 1 attrpath: python311Packages.wsproto Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-wsproto-1.2.0 Press Enter key to continue... Running update for: - python3.11-wsproto-1.2.0: UPDATING ... - python3.11-wsproto-1.2.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.wsproto 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath irrd, using log file: /var/log/nixpkgs-update/irrd/2024-04-29.log irrd 0 -> 1 attrpath: irrd Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-irrd-4.4.2 Press Enter key to continue... Running update for: - python3.11-irrd-4.4.2: UPDATING ... - python3.11-irrd-4.4.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update irrd 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath coursier, using log file: /var/log/nixpkgs-update/coursier/2024-04-29.log coursier 0 -> 1 attrpath: coursier Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - coursier-2.1.9 Press Enter key to continue... Running update for: - coursier-2.1.9: UPDATING ... - coursier-2.1.9: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update coursier 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath khard, using log file: /var/log/nixpkgs-update/khard/2024-04-29.log khard 0 -> 1 attrpath: khard Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - khard-0.19.1 Press Enter key to continue... Running update for: - khard-0.19.1: UPDATING ... - khard-0.19.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update khard 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.django-sekizai, using log file: /var/log/nixpkgs-update/python311Packages.django-sekizai/2024-04-29.log python311Packages.django-sekizai 0 -> 1 attrpath: python311Packages.django-sekizai Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-django-sekizai-4.1.0 Press Enter key to continue... Running update for: - python3.11-django-sekizai-4.1.0: UPDATING ... - python3.11-django-sekizai-4.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.django-sekizai 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath joycond-cemuhook, using log file: /var/log/nixpkgs-update/joycond-cemuhook/2024-04-29.log joycond-cemuhook 0 -> 1 attrpath: joycond-cemuhook Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - joycond-cemuhook-unstable-2023-08-09 Press Enter key to continue... Running update for: - joycond-cemuhook-unstable-2023-08-09: UPDATING ... - joycond-cemuhook-unstable-2023-08-09: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update joycond-cemuhook 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.lcgit, using log file: /var/log/nixpkgs-update/python311Packages.lcgit/2024-04-29.log python311Packages.lcgit 0 -> 1 attrpath: python311Packages.lcgit Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-lcgit-0.2.1 Press Enter key to continue... Running update for: - python3.11-lcgit-0.2.1: UPDATING ... - python3.11-lcgit-0.2.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.lcgit 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath httpstat, using log file: /var/log/nixpkgs-update/httpstat/2024-04-29.log httpstat 0 -> 1 attrpath: httpstat Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - httpstat-1.3.1 Press Enter key to continue... Running update for: - httpstat-1.3.1: UPDATING ... - httpstat-1.3.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update httpstat 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath nss, using log file: /var/log/nixpkgs-update/nss/2024-04-29.log nss 0 -> 1 attrpath: nss Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Failed with exit code 1 Going to be running update for following packages: - nss-3.90.2 Press Enter key to continue... Running update for: - nss-3.90.2: UPDATING ... - nss-3.90.2: ERROR --- SHOWING ERROR LOG FOR nss-3.90.2 ---------------------- + base_url=https://ftp.mozilla.org/pub/security/nss/releases/ ++ curl -sSL https://ftp.mozilla.org/pub/security/nss/releases/ ++ grep RTM ++ grep -v WITH_CKBI ++ sed 's|.*>\(NSS_[0-9]*_[0-9]*_*[0-9]*_*[0-9]*_RTM\)/.*|\1|g' ++ sed 's|NSS_||g' ++ sed 's|_RTM||g' ++ sed 's|_|.|g' ++ sort -V ++ tail -1 + version=3.99 ++ nix-hash --type sha256 --base32 https://ftp.mozilla.org/pub/security/nss/releases//NSS_3_99_RTM/src/nss-3.99.tar.gz error: getting status of 'https://ftp.mozilla.org/pub/security/nss/releases//NSS_3_99_RTM/src/nss-3.99.tar.gz': No such file or directory + hash= + update-source-version nss 3.99 '' update-source-version: error: Couldn't locate old source hash 'sha256-4r/LhKilkSeEhw/rl2IRAn5xMJ74W5ACg7fX0e4GQxA=' (or it appeared more than once) in '/var/cache/nixpkgs-update/worker/worktree/nss/pkgs/development/libraries/nss/generic.nix'! --- SHOWING ERROR LOG FOR nss-3.90.2 ---------------------- The update script for nss-3.90.2 failed with exit code 1 [result] Failed to update nss 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pantheon.elementary-default-settings, using log file: /var/log/nixpkgs-update/pantheon.elementary-default-settings/2024-04-29.log pantheon.elementary-default-settings 0 -> 1 attrpath: pantheon.elementary-default-settings Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - elementary-default-settings-7.1.0 Press Enter key to continue... Running update for: - elementary-default-settings-7.1.0: UPDATING ... - elementary-default-settings-7.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update pantheon.elementary-default-settings 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.aioasuswrt, using log file: /var/log/nixpkgs-update/python311Packages.aioasuswrt/2024-04-29.log python311Packages.aioasuswrt 0 -> 1 attrpath: python311Packages.aioasuswrt Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-aioasuswrt-1.4.0 Press Enter key to continue... Running update for: - python3.11-aioasuswrt-1.4.0: UPDATING ... - python3.11-aioasuswrt-1.4.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.aioasuswrt 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath dxvk_1, using log file: /var/log/nixpkgs-update/dxvk_1/2024-04-29.log dxvk_1 1.10.3 -> 2.3.1 https://github.com/doitsujin/dxvk/releases attrpath: dxvk_1 Checking auto update branch... No auto update branch exists Version in attr path dxvk_1 not compatible with 2.3.1 [result] Failed to update dxvk_1 1.10.3 -> 2.3.1 https://github.com/doitsujin/dxvk/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyeverlights, using log file: /var/log/nixpkgs-update/python311Packages.pyeverlights/2024-04-29.log python311Packages.pyeverlights 0 -> 1 attrpath: python311Packages.pyeverlights Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pyeverlights-0.1.0 Press Enter key to continue... Running update for: - python3.11-pyeverlights-0.1.0: UPDATING ... - python3.11-pyeverlights-0.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyeverlights 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.ufo2ft, using log file: /var/log/nixpkgs-update/python311Packages.ufo2ft/2024-04-29.log python311Packages.ufo2ft 0 -> 1 attrpath: python311Packages.ufo2ft Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-ufo2ft-3.1.0 Press Enter key to continue... Running update for: - python3.11-ufo2ft-3.1.0: UPDATING ... - python3.11-ufo2ft-3.1.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/ufo2ft/default.nix b/pkgs/development/python-modules/ufo2ft/default.nix index 5cbcf1370372..4da116d00781 100644 --- a/pkgs/development/python-modules/ufo2ft/default.nix +++ b/pkgs/development/python-modules/ufo2ft/default.nix @@ -17,14 +17,14 @@ buildPythonPackage rec { pname = "ufo2ft"; - version = "3.1.0"; + version = "3.2.1"; pyproject = true; disabled = pythonOlder "3.8"; src = fetchPypi { inherit pname version; - hash = "sha256-5EUrML1Yd88tVEP+Kd9TmXm+5Ejk/XIH/USYBakK/wQ="; + hash = "sha256-/n6oEwr1s0AS09deJYRRhzRJNHgqXACfZJsKTuEHxf8="; }; nativeBuildInputs = [ No auto update branch exists Old version 3.1.0" not present in staging derivation file with contents: { lib , booleanoperations , buildPythonPackage , cffsubr , compreffor , cu2qu , defcon , fetchPypi , fontmath , fonttools , pytestCheckHook , pythonOlder , pythonRelaxDepsHook , setuptools-scm , skia-pathops , ufolib2 }: buildPythonPackage rec { pname = "ufo2ft"; version = "3.2.1"; pyproject = true; disabled = pythonOlder "3.8"; src = fetchPypi { inherit pname version; hash = "sha256-/n6oEwr1s0AS09deJYRRhzRJNHgqXACfZJsKTuEHxf8="; }; nativeBuildInputs = [ setuptools-scm pythonRelaxDepsHook ]; pythonRelaxDeps = [ "cffsubr" ]; propagatedBuildInputs = [ cu2qu fontmath fonttools defcon compreffor booleanoperations cffsubr ufolib2 skia-pathops ] ++ fonttools.optional-dependencies.lxml ++ fonttools.optional-dependencies.ufo; nativeCheckInputs = [ pytestCheckHook ]; disabledTests = [ # Do not depend on skia. "test_removeOverlaps_CFF_pathops" "test_removeOverlaps_pathops" "test_custom_filters_as_argument" "test_custom_filters_as_argument" # Some integration tests fail "test_compileVariableCFF2" "test_compileVariableTTF" "test_drop_glyph_names_variable" "test_drop_glyph_names_variable" ]; pythonImportsCheck = [ "ufo2ft" ]; meta = with lib; { description = "Bridge from UFOs to FontTools objects"; homepage = "https://github.com/googlefonts/ufo2ft"; changelog = "https://github.com/googlefonts/ufo2ft/releases/tag/v${version}"; license = licenses.mit; maintainers = with maintainers; [ ]; }; } [result] Failed to update python311Packages.ufo2ft 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath peertube, using log file: /var/log/nixpkgs-update/peertube/2024-04-29.log peertube 6.0.4 -> 6.1.0 https://github.com/Chocobozzz/PeerTube/releases attrpath: peertube Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update peertube 6.0.4 -> 6.1.0 https://github.com/Chocobozzz/PeerTube/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pytest-instafail, using log file: /var/log/nixpkgs-update/python311Packages.pytest-instafail/2024-04-29.log python311Packages.pytest-instafail 0 -> 1 attrpath: python311Packages.pytest-instafail Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pytest-instafail-0.5.0 Press Enter key to continue... Running update for: - python3.11-pytest-instafail-0.5.0: UPDATING ... - python3.11-pytest-instafail-0.5.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pytest-instafail 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.versioningit, using log file: /var/log/nixpkgs-update/python311Packages.versioningit/2024-04-29.log python311Packages.versioningit 0 -> 1 attrpath: python311Packages.versioningit Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-versioningit-3.0.0 Press Enter key to continue... Running update for: - python3.11-versioningit-3.0.0: UPDATING ... - python3.11-versioningit-3.0.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/versioningit/default.nix b/pkgs/development/python-modules/versioningit/default.nix index a58f2d6133aa..9c2d160dca5b 100644 --- a/pkgs/development/python-modules/versioningit/default.nix +++ b/pkgs/development/python-modules/versioningit/default.nix @@ -17,14 +17,14 @@ buildPythonPackage rec { pname = "versioningit"; - version = "3.0.0"; + version = "3.1.1"; format = "pyproject"; disabled = pythonOlder "3.8"; src = fetchPypi { inherit pname version; - hash = "sha256-TjzkemQk2FCunlXhsTSgIOn8vLiVM48QfytcUdNMnBs="; + hash = "sha256-sLpYblrwi4fb4zVAgpEKHQUCw2IC1JbhrmDvO0HuKcE="; }; postPatch = '' No auto update branch exists Old version 3.0.0" not present in staging derivation file with contents: { lib , buildPythonPackage , pythonOlder , fetchPypi , importlib-metadata , packaging , tomli , pytestCheckHook , build , hatchling , pydantic , pytest-mock , setuptools , git , mercurial }: buildPythonPackage rec { pname = "versioningit"; version = "3.1.0"; format = "pyproject"; disabled = pythonOlder "3.8"; src = fetchPypi { inherit pname version; hash = "sha256-eqxxPDGlPrNnprvC6LPejMK4bRDUXFEBr9ZRRGyxD9c="; }; postPatch = '' substituteInPlace tox.ini \ --replace "--cov=versioningit" "" \ --replace "--cov-config=tox.ini" "" \ --replace "--no-cov-on-fail" "" ''; nativeBuildInputs = [ hatchling ]; propagatedBuildInputs = [ packaging ] ++ lib.optionals (pythonOlder "3.10") [ importlib-metadata ] ++ lib.optionals (pythonOlder "3.11") [ tomli ]; nativeCheckInputs = [ pytestCheckHook build hatchling pydantic pytest-mock setuptools git mercurial ]; disabledTests = [ # wants to write to the Nix store "test_editable_mode" ]; pythonImportsCheck = [ "versioningit" ]; meta = with lib; { description = "setuptools plugin for determining package version from VCS"; mainProgram = "versioningit"; homepage = "https://github.com/jwodder/versioningit"; changelog = "https://versioningit.readthedocs.io/en/latest/changelog.html"; license = licenses.mit; maintainers = with maintainers; [ DeeUnderscore ]; }; } [result] Failed to update python311Packages.versioningit 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.h5netcdf, using log file: /var/log/nixpkgs-update/python311Packages.h5netcdf/2024-04-29.log python311Packages.h5netcdf 0 -> 1 attrpath: python311Packages.h5netcdf Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-h5netcdf-1.3.0 Press Enter key to continue... Running update for: - python3.11-h5netcdf-1.3.0: UPDATING ... - python3.11-h5netcdf-1.3.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.h5netcdf 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.basemap, using log file: /var/log/nixpkgs-update/python311Packages.basemap/2024-04-29.log python311Packages.basemap 0 -> 1 attrpath: python311Packages.basemap Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-basemap-1.4.1 Press Enter key to continue... Running update for: - python3.11-basemap-1.4.1: UPDATING ... - python3.11-basemap-1.4.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.basemap 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.myst-parser, using log file: /var/log/nixpkgs-update/python312Packages.myst-parser/2024-04-29.log python312Packages.myst-parser 2.0.0 -> 3.0.0 https://github.com/executablebooks/myst-parser/releases attrpath: python312Packages.myst-parser isn't the default python version [result] Failed to update python312Packages.myst-parser 2.0.0 -> 3.0.0 https://github.com/executablebooks/myst-parser/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.datamodeldict, using log file: /var/log/nixpkgs-update/python311Packages.datamodeldict/2024-04-29.log python311Packages.datamodeldict 0 -> 1 attrpath: python311Packages.datamodeldict Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-datamodeldict-0.9.9 Press Enter key to continue... Running update for: - python3.11-datamodeldict-0.9.9: UPDATING ... - python3.11-datamodeldict-0.9.9: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.datamodeldict 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rocmPackages.llvm.flang, using log file: /var/log/nixpkgs-update/rocmPackages.llvm.flang/2024-04-29.log rocmPackages.llvm.flang 0 -> 1 attrpath: rocmPackages.llvm.flang Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - rocm-llvm-flang-6.0.2 Press Enter key to continue... Running update for: - rocm-llvm-flang-6.0.2: UPDATING ... - rocm-llvm-flang-6.0.2: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/rocm-modules/6/llvm/base.nix b/pkgs/development/rocm-modules/6/llvm/base.nix index caa2ebe42823..ceb2e8f5f525 100644 --- a/pkgs/development/rocm-modules/6/llvm/base.nix +++ b/pkgs/development/rocm-modules/6/llvm/base.nix @@ -61,7 +61,7 @@ let llvmTargetsToBuild' = [ "AMDGPU" ] ++ builtins.map inferNativeTarget llvmTargetsToBuild; in stdenv.mkDerivation (finalAttrs: { pname = "rocm-llvm-${targetName}"; - version = "6.0.2"; + version = "6.1.0"; outputs = [ "out" @@ -78,7 +78,7 @@ in stdenv.mkDerivation (finalAttrs: { owner = "ROCm"; repo = "llvm-project"; rev = "rocm-${finalAttrs.version}"; - hash = "sha256-uGxalrwMNCOSqSFVrYUBi3ijkMEFFTrzFImmvZKQf6I="; + hash = "sha256-Fkh4UJ70pzXGHY2od4kjcWxGUIZoVZFcsF2i4jvKA2E="; }; nativeBuildInputs = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A rocmPackages.llvm.flang Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix --extra-experimental-features nix-command log -f . rocmPackages.llvm.flang Standard output: error: … in the condition of the assert statement at /var/cache/nixpkgs-update/worker/worktree/rocmPackages.llvm.flang/lib/customisation.nix:365:17: 364| in commonAttrs // { 365| drvPath = assert condition; drv.drvPath; | ^ 366| outPath = assert condition; drv.outPath; … while evaluating the attribute 'handled' at /var/cache/nixpkgs-update/worker/worktree/rocmPackages.llvm.flang/pkgs/stdenv/generic/check-meta.nix:507:7: 506| # or, alternatively, just output a warning message. 507| handled = | ^ 508| ( (stack trace truncated; use '--show-trace' to show the full trace) error: Package ‘rocm-llvm-flang-6.1.0’ in /var/cache/nixpkgs-update/worker/worktree/rocmPackages.llvm.flang/pkgs/development/rocm-modules/6/llvm/base.nix:175 is marked as broken, refusing to evaluate. a) To temporarily allow broken packages, you can use an environment variable for a single invocation of the nix tools. $ export NIXPKGS_ALLOW_BROKEN=1 Note: When using `nix shell`, `nix build`, `nix develop`, etc with a flake, then pass `--impure` in order to allow use of environment variables. b) For `nixos-rebuild` you can set { nixpkgs.config.allowBroken = true; } in configuration.nix to override this. c) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add { allowBroken = true; } to ~/.config/nixpkgs/config.nix. [result] Failed to update rocmPackages.llvm.flang 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.python-nomad, using log file: /var/log/nixpkgs-update/python312Packages.python-nomad/2024-04-29.log python312Packages.python-nomad 2.0.0 -> 2.0.1 https://github.com/jrxFive/python-nomad/releases attrpath: python312Packages.python-nomad isn't the default python version [result] Failed to update python312Packages.python-nomad 2.0.0 -> 2.0.1 https://github.com/jrxFive/python-nomad/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.gps3, using log file: /var/log/nixpkgs-update/python311Packages.gps3/2024-04-29.log python311Packages.gps3 0 -> 1 attrpath: python311Packages.gps3 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-gps3-unstable-2017-11-01 Press Enter key to continue... Running update for: - python3.11-gps3-unstable-2017-11-01: UPDATING ... - python3.11-gps3-unstable-2017-11-01: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.gps3 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.stytra, using log file: /var/log/nixpkgs-update/python311Packages.stytra/2024-04-29.log python311Packages.stytra 0 -> 1 attrpath: python311Packages.stytra Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-stytra-0.8.34 Press Enter key to continue... Running update for: - python3.11-stytra-0.8.34: UPDATING ... - python3.11-stytra-0.8.34: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.stytra 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.serialio, using log file: /var/log/nixpkgs-update/python311Packages.serialio/2024-04-29.log python311Packages.serialio 0 -> 1 attrpath: python311Packages.serialio Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-serialio-2.4.0 Press Enter key to continue... Running update for: - python3.11-serialio-2.4.0: UPDATING ... - python3.11-serialio-2.4.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.serialio 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.dissect-volume, using log file: /var/log/nixpkgs-update/python311Packages.dissect-volume/2024-04-29.log python311Packages.dissect-volume 0 -> 1 attrpath: python311Packages.dissect-volume Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-dissect-volume-3.9 Press Enter key to continue... Running update for: - python3.11-dissect-volume-3.9: UPDATING ... - python3.11-dissect-volume-3.9: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.dissect-volume 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.paho-mqtt, using log file: /var/log/nixpkgs-update/python311Packages.paho-mqtt/2024-04-29.log python311Packages.paho-mqtt 0 -> 1 attrpath: python311Packages.paho-mqtt Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-paho-mqtt-1.6.1 Press Enter key to continue... Running update for: - python3.11-paho-mqtt-1.6.1: UPDATING ... - python3.11-paho-mqtt-1.6.1: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/paho-mqtt/default.nix b/pkgs/development/python-modules/paho-mqtt/default.nix index 8c0e54d18d60..e9597ac8fe12 100644 --- a/pkgs/development/python-modules/paho-mqtt/default.nix +++ b/pkgs/development/python-modules/paho-mqtt/default.nix @@ -10,14 +10,14 @@ buildPythonPackage rec { pname = "paho-mqtt"; - version = "1.6.1"; + version = "2.0.0"; format = "setuptools"; src = fetchFromGitHub { owner = "eclipse"; repo = "paho.mqtt.python"; - rev = "v${version}"; - hash = "sha256-9nH6xROVpmI+iTKXfwv2Ar1PAmWbEunI3HO0pZyK6Rg="; + rev = "refs/tags/v${version}"; + hash = "sha256-dR/MCz3c9eHai76I17PGD71E5/nZVEo6uRwUULOzKQU="; }; nativeCheckInputs = [ No auto update branch exists There might already be an open PR for this update: - python311Packages.paho-mqtt: 1.6.1 -> 2.0.0 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/288219" [result] Failed to update python311Packages.paho-mqtt 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.sphinxcontrib-serializinghtml, using log file: /var/log/nixpkgs-update/python311Packages.sphinxcontrib-serializinghtml/2024-04-29.log python311Packages.sphinxcontrib-serializinghtml 0 -> 1 attrpath: python311Packages.sphinxcontrib-serializinghtml Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-sphinxcontrib-serializinghtml-1.1.10 Press Enter key to continue... Running update for: - python3.11-sphinxcontrib-serializinghtml-1.1.10: UPDATING ... - python3.11-sphinxcontrib-serializinghtml-1.1.10: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.sphinxcontrib-serializinghtml 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.python-ctags3, using log file: /var/log/nixpkgs-update/python311Packages.python-ctags3/2024-04-29.log python311Packages.python-ctags3 0 -> 1 attrpath: python311Packages.python-ctags3 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-python-ctags3-1.5.0 Press Enter key to continue... Running update for: - python3.11-python-ctags3-1.5.0: UPDATING ... - python3.11-python-ctags3-1.5.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.python-ctags3 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath printrun, using log file: /var/log/nixpkgs-update/printrun/2024-04-29.log printrun 0 -> 1 attrpath: printrun Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - printrun-2.0.1 Press Enter key to continue... Running update for: - printrun-2.0.1: UPDATING ... - printrun-2.0.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update printrun 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.websocket-client, using log file: /var/log/nixpkgs-update/python312Packages.websocket-client/2024-04-29.log python312Packages.websocket-client 1.7.0 -> 1.8.0 https://github.com/websocket-client/websocket-client/releases attrpath: python312Packages.websocket-client isn't the default python version [result] Failed to update python312Packages.websocket-client 1.7.0 -> 1.8.0 https://github.com/websocket-client/websocket-client/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath aspellDicts.sc, using log file: /var/log/nixpkgs-update/aspellDicts.sc/2024-04-29.log aspellDicts.sc 0 -> 1 attrpath: aspellDicts.sc Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - aspell-dict-sc-1.0 Press Enter key to continue... Running update for: - aspell-dict-sc-1.0: UPDATING ... - aspell-dict-sc-1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update aspellDicts.sc 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.minimal-snowplow-tracker, using log file: /var/log/nixpkgs-update/python311Packages.minimal-snowplow-tracker/2024-04-29.log python311Packages.minimal-snowplow-tracker 0 -> 1 attrpath: python311Packages.minimal-snowplow-tracker Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-minimal-snowplow-tracker-0.0.2 Press Enter key to continue... Running update for: - python3.11-minimal-snowplow-tracker-0.0.2: UPDATING ... - python3.11-minimal-snowplow-tracker-0.0.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.minimal-snowplow-tracker 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath netbox_3_6, using log file: /var/log/nixpkgs-update/netbox_3_6/2024-04-29.log netbox_3_6 3.6.9 -> 3.7.6 https://github.com/netbox-community/netbox/releases attrpath: netbox_3_6 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - netbox-3.6.9 Press Enter key to continue... Running update for: - netbox-3.6.9: UPDATING ... - netbox-3.6.9: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update netbox_3_6 3.6.9 -> 3.7.6 https://github.com/netbox-community/netbox/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath onboard, using log file: /var/log/nixpkgs-update/onboard/2024-04-29.log onboard 0 -> 1 attrpath: onboard Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - onboard-1.4.1 Press Enter key to continue... Running update for: - onboard-1.4.1: UPDATING ... - onboard-1.4.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update onboard 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath zsh-fzf-tab, using log file: /var/log/nixpkgs-update/zsh-fzf-tab/2024-04-29.log zsh-fzf-tab 0 -> 1 attrpath: zsh-fzf-tab Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - zsh-fzf-tab-1.1.1 Press Enter key to continue... Running update for: - zsh-fzf-tab-1.1.1: UPDATING ... - zsh-fzf-tab-1.1.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update zsh-fzf-tab 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gossip, using log file: /var/log/nixpkgs-update/gossip/2024-04-29.log gossip 0.9 -> 0.10.1 https://github.com/mikedilger/gossip/releases attrpath: gossip Checking auto update branch... No auto update branch exists [version] stderr did not split as expected full stderr was: this derivation will be built: /nix/store/052yqf2m6f765p6lhmqq15q3pnkckav4-source.drv building '/nix/store/052yqf2m6f765p6lhmqq15q3pnkckav4-source.drv'... trying https://github.com/mikedilger/gossip/archive/0.10.1.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (56) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/052yqf2m6f765p6lhmqq15q3pnkckav4-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/mikedilger/gossip/archive/0.10.1.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (56) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/052yqf2m6f765p6lhmqq15q3pnkckav4-source.drv'. stderr did not split as expected full stderr was: error: attribute 'originalSrc' in selection path 'gossip.originalSrc' not found stderr did not split as expected full stderr was: these 2 derivations will be built: /nix/store/052yqf2m6f765p6lhmqq15q3pnkckav4-source.drv /nix/store/ih8yb21l9vpw42z16bz3cfclhmzvpgyl-gossip-0.10.1.drv this path will be fetched (0.02 MiB download, 0.14 MiB unpacked): /nix/store/skxkv2pgl1ssjqk9zrx70n7aibkya7fp-cargo-vendor-dir copying path '/nix/store/skxkv2pgl1ssjqk9zrx70n7aibkya7fp-cargo-vendor-dir' from 'https://cache.nixos.org'... building '/nix/store/052yqf2m6f765p6lhmqq15q3pnkckav4-source.drv'... trying https://github.com/mikedilger/gossip/archive/0.10.1.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (56) The requested URL returned error: 404 error: cannot download source from any mirror error: builder for '/nix/store/052yqf2m6f765p6lhmqq15q3pnkckav4-source.drv' failed with exit code 1; last 8 log lines: > > trying https://github.com/mikedilger/gossip/archive/0.10.1.tar.gz > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed > 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > 0 14 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 > curl: (56) The requested URL returned error: 404 > error: cannot download source from any mirror For full logs, run 'nix log /nix/store/052yqf2m6f765p6lhmqq15q3pnkckav4-source.drv'. error: 1 dependencies of derivation '/nix/store/ih8yb21l9vpw42z16bz3cfclhmzvpgyl-gossip-0.10.1.drv' failed to build [result] Failed to update gossip 0.9 -> 0.10.1 https://github.com/mikedilger/gossip/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gpac, using log file: /var/log/nixpkgs-update/gpac/2024-04-29.log gpac 2.2.1 -> 2.4.0 https://github.com/gpac/gpac/releases attrpath: gpac Checking auto update branch... No auto update branch exists There might already be an open PR for this update: - gpac: 2.2.1 -> 2.4.0, update knownVulnerabilities list URL "https://api.github.com/repos/NixOS/nixpkgs/issues/305402" [result] Failed to update gpac 2.2.1 -> 2.4.0 https://github.com/gpac/gpac/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.opentelemetry-instrumentation-flask, using log file: /var/log/nixpkgs-update/python311Packages.opentelemetry-instrumentation-flask/2024-04-29.log python311Packages.opentelemetry-instrumentation-flask 0 -> 1 attrpath: python311Packages.opentelemetry-instrumentation-flask Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/9plbpamib8rx7h5ja1hxp2qxhhyg65h7-packages.json.drv building '/nix/store/9plbpamib8rx7h5ja1hxp2qxhhyg65h7-packages.json.drv'... Going to be running update for following packages: - python3.11-opentelemetry-instrumentation-flask-0.45b0 Press Enter key to continue... Running update for: - python3.11-opentelemetry-instrumentation-flask-0.45b0: UPDATING ... - python3.11-opentelemetry-instrumentation-flask-0.45b0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.opentelemetry-instrumentation-flask 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath parabolic, using log file: /var/log/nixpkgs-update/parabolic/2024-04-29.log parabolic 0 -> 1 attrpath: parabolic Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - parabolic-2023.12.0 Press Enter key to continue... Running update for: - parabolic-2023.12.0: UPDATING ... - parabolic-2023.12.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update parabolic 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath xva-img, using log file: /var/log/nixpkgs-update/xva-img/2024-04-29.log xva-img 1.4.2 -> 1.5 https://github.com/eriklax/xva-img/releases attrpath: xva-img Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/tools/virtualization/xva-img/default.nix b/pkgs/tools/virtualization/xva-img/default.nix index bb5c9d5a5992..2121a2469e7f 100644 --- a/pkgs/tools/virtualization/xva-img/default.nix +++ b/pkgs/tools/virtualization/xva-img/default.nix @@ -2,13 +2,13 @@ stdenv.mkDerivation rec { pname = "xva-img"; - version = "1.4.2"; + version = "1.5"; src = fetchFromGitHub { owner = "eriklax"; repo = "xva-img"; rev = version; - sha256 = "sha256-QHCKGsHSMT2P64No1IUCjenm1XZMSgEvsJGJOyHFZS8="; + sha256 = "sha256-YyWfN6VcEABmzHkkoA/kRehLum1UxsNJ58XBs1pl+c8="; }; nativeBuildInputs = [ cmake ]; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A xva-img nix build failed. | ^~~~~~~~~~ compilation terminated. make[2]: *** [CMakeFiles/xva-img.dir/build.make:174: CMakeFiles/xva-img.dir/src/xxh64.cpp.o] Error 1 make[2]: *** Waiting for unfinished jobs.... /build/source/src/sha1.cpp: In function 'std::string XVA::SHA1(const std::string&)': /build/source/src/sha1.cpp:40:18: warning: 'int SHA1_Init(SHA_CTX*)' is deprecated: Since OpenSSL 3.0 []8;;https://gcc.gnu.org/onlinedocs/gcc/Warning-Options.html#index-Wdeprecated-declarations-Wdeprecated-declarations]8;;] 40 | SHA1_Init(&ctx); | ~~~~~~~~~^~~~~~ In file included from /build/source/src/sha1.cpp:33: /nix/store/aqaxrq9jyrjwsnsly12b2xkqmakcsawb-openssl-3.0.13-dev/include/openssl/sha.h:49:27: note: declared here 49 | OSSL_DEPRECATEDIN_3_0 int SHA1_Init(SHA_CTX *c); | ^~~~~~~~~ /build/source/src/sha1.cpp:41:20: warning: 'int SHA1_Update(SHA_CTX*, const void*, size_t)' is deprecated: Since OpenSSL 3.0 []8;;https://gcc.gnu.org/onlinedocs/gcc/Warning-Options.html#index-Wdeprecated-declarations-Wdeprecated-declarations]8;;] 41 | SHA1_Update(&ctx, input.c_str(), input.size()); | ~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /nix/store/aqaxrq9jyrjwsnsly12b2xkqmakcsawb-openssl-3.0.13-dev/include/openssl/sha.h:50:27: note: declared here 50 | OSSL_DEPRECATEDIN_3_0 int SHA1_Update(SHA_CTX *c, const void *data, size_t len); | ^~~~~~~~~~~ /build/source/src/sha1.cpp:44:19: warning: 'int SHA1_Final(unsigned char*, SHA_CTX*)' is deprecated: Since OpenSSL 3.0 []8;;https://gcc.gnu.org/onlinedocs/gcc/Warning-Options.html#index-Wdeprecated-declarations-Wdeprecated-declarations]8;;] 44 | SHA1_Final(hash, &ctx); | ~~~~~~~~~~^~~~~~~~~~~~ /nix/store/aqaxrq9jyrjwsnsly12b2xkqmakcsawb-openssl-3.0.13-dev/include/openssl/sha.h:51:27: note: declared here 51 | OSSL_DEPRECATEDIN_3_0 int SHA1_Final(unsigned char *md, SHA_CTX *c); | ^~~~~~~~~~ /build/source/src/disk.cpp: In member function 'bool XVA::Disk::Import(const std::string&)': /build/source/src/disk.cpp:221:22: warning: ignoring return value of 'size_t fread(void*, size_t, size_t, FILE*)' declared with attribute 'warn_unused_result' []8;;https://gcc.gnu.org/onlinedocs/gcc/Warning-Options.html#index-Wunused-result-Wunused-result]8;;] 221 | fread(buf, 1, sizeof buf, fp); | ~~~~~^~~~~~~~~~~~~~~~~~~~~~~~ make[1]: *** [CMakeFiles/Makefile2:83: CMakeFiles/xva-img.dir/all] Error 2 make: *** [Makefile:136: all] Error 2 [result] Failed to update xva-img 1.4.2 -> 1.5 https://github.com/eriklax/xva-img/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath simplotask, using log file: /var/log/nixpkgs-update/simplotask/2024-04-29.log simplotask 1.15.1 -> 1.16.0 https://github.com/umputun/spot/releases attrpath: simplotask Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Found old vendorHash = null [golangModuleVersion] Set vendorHash to null [golangModuleVersion] Finished updating vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/by-name/si/simplotask/package.nix b/pkgs/by-name/si/simplotask/package.nix index 59c8d804f7e2..d08d53ed88c4 100644 --- a/pkgs/by-name/si/simplotask/package.nix +++ b/pkgs/by-name/si/simplotask/package.nix @@ -2,13 +2,13 @@ buildGoModule rec { pname = "simplotask"; - version = "1.15.1"; + version = "1.16.0"; src = fetchFromGitHub { owner = "umputun"; repo = "spot"; rev = "v${version}"; - hash = "sha256-XLkq8Oe3EsP0wf0sA7NSZWIsQQnOAGmvlVQad35+5Ws="; + hash = "sha256-VnQIg5HXZZwvYpaYDF1CIphLtE4S+1zADE1WnicXOSQ="; }; vendorHash = null; [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/74rww7l74adcv8x0cb3kr584zxy36cqf-simplotask-1.16.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/umputun/spot/releases. meta.description for simplotask is: A tool for effortless deployment and configuration management meta.homepage for simplotask is: https://spot.umputun.dev/ ###### Updates performed - Golang update ###### To inspect upstream changes - [Release on GitHub](https://github.com/umputun/spot/releases/tag/v1.16.0) - [Compare changes on GitHub](https://github.com/umputun/spot/compare/v1.15.1...v1.16.0) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 1.16.0 with grep in /nix/store/74rww7l74adcv8x0cb3kr584zxy36cqf-simplotask-1.16.0 - found 1.16.0 in filename of file in /nix/store/74rww7l74adcv8x0cb3kr584zxy36cqf-simplotask-1.16.0 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath simplotask ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/74rww7l74adcv8x0cb3kr584zxy36cqf-simplotask-1.16.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A simplotask https://github.com/r-ryantm/nixpkgs/archive/5019d918a32026ad5336db205f7d6c5b5faa4c13.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/5019d918a32026ad5336db205f7d6c5b5faa4c13#simplotask ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/74rww7l74adcv8x0cb3kr584zxy36cqf-simplotask-1.16.0 ls -la /nix/store/74rww7l74adcv8x0cb3kr584zxy36cqf-simplotask-1.16.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @sikmir for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307765 [result] Success updating simplotask 1.15.1 -> 1.16.0 https://github.com/umputun/spot/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.dremel3dpy, using log file: /var/log/nixpkgs-update/python311Packages.dremel3dpy/2024-04-29.log python311Packages.dremel3dpy 0 -> 1 attrpath: python311Packages.dremel3dpy Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-dremel3dpy-2.1.1 Press Enter key to continue... Running update for: - python3.11-dremel3dpy-2.1.1: UPDATING ... - python3.11-dremel3dpy-2.1.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.dremel3dpy 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath auditbeat, using log file: /var/log/nixpkgs-update/auditbeat/2024-04-29.log auditbeat 7.17.16 -> 7.17.20 https://github.com/elastic/beats/releases attrpath: auditbeat Checking auto update branch... No auto update branch exists Old version 7.17.16" not present in master derivation file with contents: { lib, fetchFromGitHub, elk7Version, buildGoModule, libpcap, nixosTests, systemd, config }: let beat = package: extraArgs: buildGoModule (rec { pname = package; version = elk7Version; src = fetchFromGitHub { owner = "elastic"; repo = "beats"; rev = "v${version}"; hash = "sha256-0qwWHRIDLlnaPOCRmiiFGg+/jdanWuQtggM2QSaMR1o="; }; vendorHash = "sha256-rwCCpptppkpvwQWUtqTjBUumP8GSpPHBTCaj0nYVQv8="; subPackages = [ package ]; meta = with lib; { homepage = "https://www.elastic.co/products/beats"; license = licenses.asl20; maintainers = with maintainers; [ fadenb basvandijk dfithian ]; platforms = platforms.linux; }; } // extraArgs); in rec { auditbeat7 = beat "auditbeat" { meta.description = "Lightweight shipper for audit data"; }; filebeat7 = beat "filebeat" { meta.description = "Lightweight shipper for logfiles"; buildInputs = [ systemd ]; tags = [ "withjournald" ]; postFixup = '' patchelf --set-rpath ${lib.makeLibraryPath [ (lib.getLib systemd) ]} "$out/bin/filebeat" ''; }; heartbeat7 = beat "heartbeat" { meta.description = "Lightweight shipper for uptime monitoring"; }; metricbeat7 = beat "metricbeat" { meta.description = "Lightweight shipper for metrics"; passthru.tests = lib.optionalAttrs config.allowUnfree ( assert metricbeat7.drvPath == nixosTests.elk.unfree.ELK-7.elkPackages.metricbeat.drvPath; { elk = nixosTests.elk.unfree.ELK-7; } ); }; packetbeat7 = beat "packetbeat" { buildInputs = [ libpcap ]; meta.description = "Network packet analyzer that ships data to Elasticsearch"; meta.longDescription = '' Packetbeat is an open source network packet analyzer that ships the data to Elasticsearch. Think of it like a distributed real-time Wireshark with a lot more analytics features. The Packetbeat shippers sniff the traffic between your application processes, parse on the fly protocols like HTTP, MySQL, PostgreSQL, Redis or Thrift and correlate the messages into transactions. ''; }; } [result] Failed to update auditbeat 7.17.16 -> 7.17.20 https://github.com/elastic/beats/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath fcitx5, using log file: /var/log/nixpkgs-update/fcitx5/2024-04-29.log fcitx5 0 -> 1 attrpath: fcitx5 Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/as71r7iaa2w8wp7cj5zqmisnl6hls3ra-packages.json.drv building '/nix/store/as71r7iaa2w8wp7cj5zqmisnl6hls3ra-packages.json.drv'... Going to be running update for following packages: - fcitx5-5.1.9 Press Enter key to continue... Running update for: - fcitx5-5.1.9: UPDATING ... - fcitx5-5.1.9: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/tools/inputmethods/fcitx5/fcitx5-chewing.nix b/pkgs/tools/inputmethods/fcitx5/fcitx5-chewing.nix index e186839dbbb2..008ec44955a9 100644 --- a/pkgs/tools/inputmethods/fcitx5/fcitx5-chewing.nix +++ b/pkgs/tools/inputmethods/fcitx5/fcitx5-chewing.nix @@ -10,13 +10,13 @@ stdenv.mkDerivation rec { pname = "fcitx5-chewing"; - version = "5.1.2"; + version = "5.1.3"; src = fetchFromGitHub { owner = "fcitx"; repo = pname; rev = version; - hash = "sha256-Zl/YlN5qIB8rjL4lPwRcKRoId0i1ovMOLJKGmTUHuwo="; + hash = "sha256-1rbpCniRPP9528qCAohN1o5198vypfWmYgCx8sd+NXU="; }; nativeBuildInputs = [ Package version did not change. [result] Failed to update fcitx5 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.opentypespec, using log file: /var/log/nixpkgs-update/python311Packages.opentypespec/2024-04-29.log python311Packages.opentypespec 0 -> 1 attrpath: python311Packages.opentypespec Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-opentypespec-1.9.1 Press Enter key to continue... Running update for: - python3.11-opentypespec-1.9.1: UPDATING ... - python3.11-opentypespec-1.9.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.opentypespec 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.aio-geojson-geonetnz-quakes, using log file: /var/log/nixpkgs-update/python311Packages.aio-geojson-geonetnz-quakes/2024-04-29.log python311Packages.aio-geojson-geonetnz-quakes 0 -> 1 attrpath: python311Packages.aio-geojson-geonetnz-quakes Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-aio-geojson-geonetnz-quakes-0.16 Press Enter key to continue... Running update for: - python3.11-aio-geojson-geonetnz-quakes-0.16: UPDATING ... - python3.11-aio-geojson-geonetnz-quakes-0.16: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.aio-geojson-geonetnz-quakes 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.librosa, using log file: /var/log/nixpkgs-update/python311Packages.librosa/2024-04-29.log python311Packages.librosa 0 -> 1 attrpath: python311Packages.librosa Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Failed with exit code 1 Going to be running update for following packages: - python3.11-librosa-0.10.1 Press Enter key to continue... Running update for: - python3.11-librosa-0.10.1: UPDATING ... - python3.11-librosa-0.10.1: ERROR --- SHOWING ERROR LOG FOR python3.11-librosa-0.10.1 ---------------------- INFO:root:Updating packages... Traceback (most recent call last): File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 600, in main() File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 579, in main results = list(filter(bool, p.map(lambda pkg: _update(pkg, target), packages))) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/concurrent/futures/_base.py", line 619, in result_iterator yield _result_or_cancel(fs.pop()) ^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/concurrent/futures/_base.py", line 317, in _result_or_cancel return fut.result(timeout) ^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/concurrent/futures/_base.py", line 456, in result return self.__get_result() ^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/concurrent/futures/_base.py", line 401, in __get_result raise self._exception File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/concurrent/futures/thread.py", line 58, in run result = self.fn(*self.args, **self.kwargs) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 579, in results = list(filter(bool, p.map(lambda pkg: _update(pkg, target), packages))) ^^^^^^^^^^^^^^^^^^^^ File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 523, in _update return _update_package(path, target) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 434, in _update_package new_version, new_sha256, prefix = FETCHERS[fetcher]( ^^^^^^^^^^^^^^^^^^ File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 298, in _get_latest_version_github response = subprocess.check_output(cmd) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/subprocess.py", line 466, in check_output return run(*popenargs, stdout=PIPE, timeout=timeout, check=True, ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/subprocess.py", line 548, in run with Popen(*popenargs, **kwargs) as process: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/subprocess.py", line 1026, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/subprocess.py", line 1955, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) FileNotFoundError: [Errno 2] No such file or directory: 'nix-prefetch-git' --- SHOWING ERROR LOG FOR python3.11-librosa-0.10.1 ---------------------- The update script for python3.11-librosa-0.10.1 failed with exit code 1 [result] Failed to update python311Packages.librosa 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lua54Packages.luadbi-postgresql, using log file: /var/log/nixpkgs-update/lua54Packages.luadbi-postgresql/2024-04-29.log lua54Packages.luadbi-postgresql 0.7.2-1 -> 0.7.3 https://github.com/mwild1/luadbi/releases attrpath: lua54Packages.luadbi-postgresql Packages for lua are currently skipped. https://github.com/NixOS/nixpkgs/pull/37501#issuecomment-375169646 [result] Failed to update lua54Packages.luadbi-postgresql 0.7.2-1 -> 0.7.3 https://github.com/mwild1/luadbi/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lua52Packages.luadbi, using log file: /var/log/nixpkgs-update/lua52Packages.luadbi/2024-04-29.log lua52Packages.luadbi 0.7.2-1 -> 0.7.3 https://github.com/mwild1/luadbi/releases attrpath: lua52Packages.luadbi Packages for lua are currently skipped. https://github.com/NixOS/nixpkgs/pull/37501#issuecomment-375169646 [result] Failed to update lua52Packages.luadbi 0.7.2-1 -> 0.7.3 https://github.com/mwild1/luadbi/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath luajitPackages.luadbi-postgresql, using log file: /var/log/nixpkgs-update/luajitPackages.luadbi-postgresql/2024-04-29.log luajitPackages.luadbi-postgresql 0.7.2-1 -> 0.7.3 https://github.com/mwild1/luadbi/releases attrpath: luajitPackages.luadbi-postgresql Packages for lua are currently skipped. https://github.com/NixOS/nixpkgs/pull/37501#issuecomment-375169646 [result] Failed to update luajitPackages.luadbi-postgresql 0.7.2-1 -> 0.7.3 https://github.com/mwild1/luadbi/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lua51Packages.luadbi-mysql, using log file: /var/log/nixpkgs-update/lua51Packages.luadbi-mysql/2024-04-29.log lua51Packages.luadbi-mysql 0.7.2-1 -> 0.7.3 https://github.com/mwild1/luadbi/releases attrpath: lua51Packages.luadbi-mysql Packages for lua are currently skipped. https://github.com/NixOS/nixpkgs/pull/37501#issuecomment-375169646 [result] Failed to update lua51Packages.luadbi-mysql 0.7.2-1 -> 0.7.3 https://github.com/mwild1/luadbi/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath luajitPackages.luadbi, using log file: /var/log/nixpkgs-update/luajitPackages.luadbi/2024-04-29.log luajitPackages.luadbi 0.7.2-1 -> 0.7.3 https://github.com/mwild1/luadbi/releases attrpath: luajitPackages.luadbi Packages for lua are currently skipped. https://github.com/NixOS/nixpkgs/pull/37501#issuecomment-375169646 [result] Failed to update luajitPackages.luadbi 0.7.2-1 -> 0.7.3 https://github.com/mwild1/luadbi/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lua51Packages.luadbi-sqlite3, using log file: /var/log/nixpkgs-update/lua51Packages.luadbi-sqlite3/2024-04-29.log lua51Packages.luadbi-sqlite3 0.7.2-1 -> 0.7.3 https://github.com/mwild1/luadbi/releases attrpath: lua51Packages.luadbi-sqlite3 Packages for lua are currently skipped. https://github.com/NixOS/nixpkgs/pull/37501#issuecomment-375169646 [result] Failed to update lua51Packages.luadbi-sqlite3 0.7.2-1 -> 0.7.3 https://github.com/mwild1/luadbi/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.threadpoolctl, using log file: /var/log/nixpkgs-update/python312Packages.threadpoolctl/2024-04-29.log python312Packages.threadpoolctl 3.4.0 -> 3.5.0 https://github.com/joblib/threadpoolctl/releases attrpath: python312Packages.threadpoolctl isn't the default python version [result] Failed to update python312Packages.threadpoolctl 3.4.0 -> 3.5.0 https://github.com/joblib/threadpoolctl/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.ucsmsdk, using log file: /var/log/nixpkgs-update/python312Packages.ucsmsdk/2024-04-29.log python312Packages.ucsmsdk 0.9.16 -> 0.9.17 https://github.com/CiscoUcs/ucsmsdk/releases attrpath: python312Packages.ucsmsdk isn't the default python version [result] Failed to update python312Packages.ucsmsdk 0.9.16 -> 0.9.17 https://github.com/CiscoUcs/ucsmsdk/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lua54Packages.luadbi-sqlite3, using log file: /var/log/nixpkgs-update/lua54Packages.luadbi-sqlite3/2024-04-29.log lua54Packages.luadbi-sqlite3 0.7.2-1 -> 0.7.3 https://github.com/mwild1/luadbi/releases attrpath: lua54Packages.luadbi-sqlite3 Packages for lua are currently skipped. https://github.com/NixOS/nixpkgs/pull/37501#issuecomment-375169646 [result] Failed to update lua54Packages.luadbi-sqlite3 0.7.2-1 -> 0.7.3 https://github.com/mwild1/luadbi/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lua52Packages.luadbi-sqlite3, using log file: /var/log/nixpkgs-update/lua52Packages.luadbi-sqlite3/2024-04-29.log lua52Packages.luadbi-sqlite3 0.7.2-1 -> 0.7.3 https://github.com/mwild1/luadbi/releases attrpath: lua52Packages.luadbi-sqlite3 Packages for lua are currently skipped. https://github.com/NixOS/nixpkgs/pull/37501#issuecomment-375169646 [result] Failed to update lua52Packages.luadbi-sqlite3 0.7.2-1 -> 0.7.3 https://github.com/mwild1/luadbi/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO @volth asked to not update xfce [result] Failed to update xfce.gigolo 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.bottleneck, using log file: /var/log/nixpkgs-update/python311Packages.bottleneck/2024-04-29.log python311Packages.bottleneck 0 -> 1 attrpath: python311Packages.bottleneck Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-bottleneck-1.3.8 Press Enter key to continue... Running update for: - python3.11-bottleneck-1.3.8: UPDATING ... - python3.11-bottleneck-1.3.8: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.bottleneck 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.rocket-errbot, using log file: /var/log/nixpkgs-update/python311Packages.rocket-errbot/2024-04-29.log python311Packages.rocket-errbot 0 -> 1 attrpath: python311Packages.rocket-errbot Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-rocket-errbot-1.2.5 Press Enter key to continue... Running update for: - python3.11-rocket-errbot-1.2.5: UPDATING ... - python3.11-rocket-errbot-1.2.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.rocket-errbot 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.picobox, using log file: /var/log/nixpkgs-update/python311Packages.picobox/2024-04-29.log python311Packages.picobox 0 -> 1 attrpath: python311Packages.picobox Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-picobox-4.0.0 Press Enter key to continue... Running update for: - python3.11-picobox-4.0.0: UPDATING ... - python3.11-picobox-4.0.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.picobox 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath crystal_1_8, using log file: /var/log/nixpkgs-update/crystal_1_8/2024-04-29.log crystal_1_8 1.8.2 -> 1.12.1 https://github.com/crystal-lang/crystal/releases attrpath: crystal_1_8 Checking auto update branch... No auto update branch exists Version in attr path crystal_1_8 not compatible with 1.12.1 [result] Failed to update crystal_1_8 1.8.2 -> 1.12.1 https://github.com/crystal-lang/crystal/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.hsluv, using log file: /var/log/nixpkgs-update/python311Packages.hsluv/2024-04-29.log python311Packages.hsluv 0 -> 1 attrpath: python311Packages.hsluv Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-hsluv-5.0.4 Press Enter key to continue... Running update for: - python3.11-hsluv-5.0.4: UPDATING ... - python3.11-hsluv-5.0.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.hsluv 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath abseil-cpp_202206, using log file: /var/log/nixpkgs-update/abseil-cpp_202206/2024-04-29.log abseil-cpp_202206 20220623.2 -> 20240116.2 https://github.com/abseil/abseil-cpp/releases attrpath: abseil-cpp_202206 Checking auto update branch... No auto update branch exists Version in attr path abseil-cpp_202206 not compatible with 20240116.2 [result] Failed to update abseil-cpp_202206 20220623.2 -> 20240116.2 https://github.com/abseil/abseil-cpp/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rqbit, using log file: /var/log/nixpkgs-update/rqbit/2024-04-29.log rqbit 5.6.1 -> 5.6.2 https://github.com/ikatson/rqbit/releases attrpath: rqbit Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/by-name/rq/rqbit/package.nix b/pkgs/by-name/rq/rqbit/package.nix index 0aece0632d19..1ca813ea809c 100644 --- a/pkgs/by-name/rq/rqbit/package.nix +++ b/pkgs/by-name/rq/rqbit/package.nix @@ -2,13 +2,13 @@ rustPlatform.buildRustPackage rec { pname = "rqbit"; - version = "5.6.1"; + version = "5.6.2"; src = fetchFromGitHub { owner = "ikatson"; repo = "rqbit"; rev = "v${version}"; - hash = "sha256-SRom/rLyF7R+ESWsAKeLLujvuj5w7+Evlsm+8BKe2f0="; + hash = "sha256-RjoIEOccdhiMyQF4HMhHwyk+yGEvKQRwK1T2CZaeDOw="; }; cargoLock = { [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A rqbit nix build failed. source root is source Executing cargoSetupPostUnpackHook Finished cargoSetupPostUnpackHook @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase Executing cargoSetupPostPatchHook Validating consistency between /build/source/Cargo.lock and /build/cargo-vendor-dir/Cargo.lock 1264c1264 < version = "5.6.2" --- > version = "5.6.1" 1340c1340 < version = "3.8.0" --- > version = "3.7.0" 2067c2067 < version = "5.6.2" --- > version = "5.6.1" ERROR: cargoHash or cargoSha256 is out of date Cargo.lock is not the same in /build/cargo-vendor-dir To fix the issue: 1. Set cargoHash/cargoSha256 to an empty string: `cargoHash = "";` 2. Build the derivation and wait for it to fail with a hash mismatch 3. Copy the "got: sha256-..." value back into the cargoHash field You should have: cargoHash = "sha256-XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX="; [result] Failed to update rqbit 5.6.1 -> 5.6.2 https://github.com/ikatson/rqbit/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath kaufkauflist, using log file: /var/log/nixpkgs-update/kaufkauflist/2024-04-29.log kaufkauflist 0 -> 1 attrpath: kaufkauflist Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] skipping because derivation has updateScript [npmDepsVersion] [npmDepsVersion] skipping because derivation has updateScript [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - kaufkauflist-3.3.0 Press Enter key to continue... Running update for: - kaufkauflist-3.3.0: UPDATING ... - kaufkauflist-3.3.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update kaufkauflist 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.textfsm, using log file: /var/log/nixpkgs-update/python311Packages.textfsm/2024-04-29.log python311Packages.textfsm 0 -> 1 attrpath: python311Packages.textfsm Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-textfsm-1.1.3 Press Enter key to continue... Running update for: - python3.11-textfsm-1.1.3: UPDATING ... - python3.11-textfsm-1.1.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.textfsm 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.yacs, using log file: /var/log/nixpkgs-update/python311Packages.yacs/2024-04-29.log python311Packages.yacs 0 -> 1 attrpath: python311Packages.yacs Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-yacs-0.1.8 Press Enter key to continue... Running update for: - python3.11-yacs-0.1.8: UPDATING ... - python3.11-yacs-0.1.8: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.yacs 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath swayfx-unwrapped, using log file: /var/log/nixpkgs-update/swayfx-unwrapped/2024-04-29.log swayfx-unwrapped 0.3.2 -> 0.4 https://github.com/WillPower3309/swayfx/releases attrpath: swayfx-unwrapped Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/by-name/sw/swayfx-unwrapped/package.nix b/pkgs/by-name/sw/swayfx-unwrapped/package.nix index dfbb2e540c53..2316c18e57b6 100644 --- a/pkgs/by-name/sw/swayfx-unwrapped/package.nix +++ b/pkgs/by-name/sw/swayfx-unwrapped/package.nix @@ -23,13 +23,13 @@ wlroots = wlroots_0_16; }).overrideAttrs (oldAttrs: rec { pname = "swayfx-unwrapped"; - version = "0.3.2"; + version = "0.4"; src = fetchFromGitHub { owner = "WillPower3309"; repo = "swayfx"; rev = version; - sha256 = "sha256-Gwewb0yDVhEBrefSSGDf1hLtpWcntzifPCPJQhqLqI0="; + sha256 = "sha256-VT+JjQPqCIdtaLeSnRiZ3rES0KgDJR7j5Byxr+d6oRg="; }; meta = with lib; { [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A swayfx-unwrapped nix build failed. applying patch /nix/store/l4g7lb333j3bm1qsfx723ymaqhwy85mi-sway-config-no-nix-store-references.patch patching file config.in Hunk #1 succeeded at 45 (offset 24 lines). Hunk #2 succeeded at 236 (offset 23 lines). @nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" } Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "configurePhase" } Running phase: configurePhase mesonConfigurePhase flags: --prefix=/nix/store/fw0bcaycs8imvnzksgjd89h4ab1w9vj7-swayfx-unwrapped-0.4 --libdir=/nix/store/fw0bcaycs8imvnzksgjd89h4ab1w9vj7-swayfx-unwrapped-0.4/lib --libexecdir=/nix/store/fw0bcaycs8imvnzksgjd89h4ab1w9vj7-swayfx-unwrapped-0.4/libexec --bindir=/nix/store/fw0bcaycs8imvnzksgjd89h4ab1w9vj7-swayfx-unwrapped-0.4/bin --sbindir=/nix/store/fw0bcaycs8imvnzksgjd89h4ab1w9vj7-swayfx-unwrapped-0.4/sbin --includedir=/nix/store/fw0bcaycs8imvnzksgjd89h4ab1w9vj7-swayfx-unwrapped-0.4/include --mandir=/nix/store/fw0bcaycs8imvnzksgjd89h4ab1w9vj7-swayfx-unwrapped-0.4/share/man --infodir=/nix/store/fw0bcaycs8imvnzksgjd89h4ab1w9vj7-swayfx-unwrapped-0.4/share/info --localedir=/nix/store/fw0bcaycs8imvnzksgjd89h4ab1w9vj7-swayfx-unwrapped-0.4/share/locale -Dauto_features=enabled -Dwrap_mode=nodownload --buildtype=plain -Dsd-bus-provider=libsystemd The Meson build system Version: 1.4.0 Source dir: /build/source Build dir: /build/source/build Build type: native build Project name: sway Project version: 0.4 C compiler for the host machine: gcc (gcc 13.2.0 "gcc (GCC) 13.2.0") C linker for the host machine: gcc ld.bfd 2.41 Host machine cpu family: x86_64 Host machine cpu: x86_64 Neither a subproject directory nor a scenefx.wrap file was found. Subproject scenefx is buildable: NO (disabling) Found pkg-config: YES (/nix/store/39nq7p6jcm9m3xqqm99skwmgsqw4pbbg-pkg-config-wrapper-0.29.2/bin/pkg-config) 0.29.2 Did not find CMake 'cmake' Found CMake: NO Run-time dependency scenefx found: NO (tried pkgconfig) meson.build:44:10: ERROR: Dependency "scenefx" not found, tried pkgconfig A full log can be found at /build/source/build/meson-logs/meson-log.txt [result] Failed to update swayfx-unwrapped 0.3.2 -> 0.4 https://github.com/WillPower3309/swayfx/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath octavePackages.fem-fenics, using log file: /var/log/nixpkgs-update/octavePackages.fem-fenics/2024-04-29.log octavePackages.fem-fenics 0 -> 1 attrpath: octavePackages.fem-fenics Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - octave-8.4.0-fem-fenics-0.0.5 Press Enter key to continue... Running update for: - octave-8.4.0-fem-fenics-0.0.5: UPDATING ... - octave-8.4.0-fem-fenics-0.0.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update octavePackages.fem-fenics 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pypinyin, using log file: /var/log/nixpkgs-update/python311Packages.pypinyin/2024-04-29.log python311Packages.pypinyin 0 -> 1 attrpath: python311Packages.pypinyin Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pypinyin-0.51.0 Press Enter key to continue... Running update for: - python3.11-pypinyin-0.51.0: UPDATING ... - python3.11-pypinyin-0.51.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pypinyin 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath halftone, using log file: /var/log/nixpkgs-update/halftone/2024-04-29.log halftone 0 -> 1 attrpath: halftone Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - halftone-0.6.0 Press Enter key to continue... Running update for: - halftone-0.6.0: UPDATING ... - halftone-0.6.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/applications/graphics/halftone/default.nix b/pkgs/applications/graphics/halftone/default.nix index 81e70e401fc8..c29bcb8ccd1d 100644 --- a/pkgs/applications/graphics/halftone/default.nix +++ b/pkgs/applications/graphics/halftone/default.nix @@ -15,13 +15,13 @@ python3Packages.buildPythonApplication rec { pname = "halftone"; - version = "0.6.0"; + version = "0.6.1"; src = fetchFromGitHub { owner = "tfuxu"; repo = pname; - rev = version; - hash = "sha256-7fa6afrGt8SXli2KHzzRIqTBBaN3Hk0coYwxe66jLsg="; + rev = "refs/tags/${version}"; + hash = "sha256-o55eimlDy86mbwveARxVXauMQEneAchVi2RNaj6FYxs="; }; format = "other"; No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A halftone nix build failed. source root is source setting SOURCE_DATE_EPOCH to timestamp 315619200 of file source/requirements.txt @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase @nix { "action": "setPhase", "phase": "updateAutotoolsGnuConfigScriptsPhase" } Running phase: updateAutotoolsGnuConfigScriptsPhase @nix { "action": "setPhase", "phase": "configurePhase" } Running phase: configurePhase mesonConfigurePhase flags: --prefix=/nix/store/q9fwsj3w2c1925l1hbkihxdpa5cvaspz-halftone-0.6.1 --libdir=/nix/store/q9fwsj3w2c1925l1hbkihxdpa5cvaspz-halftone-0.6.1/lib --libexecdir=/nix/store/q9fwsj3w2c1925l1hbkihxdpa5cvaspz-halftone-0.6.1/libexec --bindir=/nix/store/q9fwsj3w2c1925l1hbkihxdpa5cvaspz-halftone-0.6.1/bin --sbindir=/nix/store/q9fwsj3w2c1925l1hbkihxdpa5cvaspz-halftone-0.6.1/sbin --includedir=/nix/store/q9fwsj3w2c1925l1hbkihxdpa5cvaspz-halftone-0.6.1/include --mandir=/nix/store/q9fwsj3w2c1925l1hbkihxdpa5cvaspz-halftone-0.6.1/share/man --infodir=/nix/store/q9fwsj3w2c1925l1hbkihxdpa5cvaspz-halftone-0.6.1/share/info --localedir=/nix/store/q9fwsj3w2c1925l1hbkihxdpa5cvaspz-halftone-0.6.1/share/locale -Dauto_features=enabled -Dwrap_mode=nodownload --buildtype=plain The Meson build system Version: 1.4.0 Source dir: /build/source Build dir: /build/source/build Build type: native build Project name: halftone Project version: 0.6.1 Host machine cpu family: x86_64 Host machine cpu: x86_64 Program git found: NO Found pkg-config: YES (/nix/store/39nq7p6jcm9m3xqqm99skwmgsqw4pbbg-pkg-config-wrapper-0.29.2/bin/pkg-config) 0.29.2 Run-time dependency glib-2.0 found: YES 2.78.4 Run-time dependency gtk4 found: YES 4.12.5 Dependency libadwaita-1 found: NO found 1.4.4 but need: '>= 1.5.0' Did not find CMake 'cmake' Found CMake: NO Run-time dependency libadwaita-1 found: NO meson.build:49:0: ERROR: Dependency lookup for libadwaita-1 with method 'pkgconfig' failed: Invalid version, need 'libadwaita-1' ['>= 1.5.0'] found '1.4.4'. A full log can be found at /build/source/build/meson-logs/meson-log.txt [result] Failed to update halftone 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.ratarmountcore, using log file: /var/log/nixpkgs-update/python311Packages.ratarmountcore/2024-04-29.log python311Packages.ratarmountcore 0 -> 1 attrpath: python311Packages.ratarmountcore Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Failed with exit code 1 Going to be running update for following packages: - python3.11-ratarmountcore-0.6.3 Press Enter key to continue... Running update for: - python3.11-ratarmountcore-0.6.3: UPDATING ... - python3.11-ratarmountcore-0.6.3: ERROR --- SHOWING ERROR LOG FOR python3.11-ratarmountcore-0.6.3 ---------------------- INFO:root:Updating packages... Traceback (most recent call last): File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 600, in main() File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 579, in main results = list(filter(bool, p.map(lambda pkg: _update(pkg, target), packages))) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/concurrent/futures/_base.py", line 619, in result_iterator yield _result_or_cancel(fs.pop()) ^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/concurrent/futures/_base.py", line 317, in _result_or_cancel return fut.result(timeout) ^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/concurrent/futures/_base.py", line 456, in result return self.__get_result() ^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/concurrent/futures/_base.py", line 401, in __get_result raise self._exception File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/concurrent/futures/thread.py", line 58, in run result = self.fn(*self.args, **self.kwargs) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 579, in results = list(filter(bool, p.map(lambda pkg: _update(pkg, target), packages))) ^^^^^^^^^^^^^^^^^^^^ File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 523, in _update return _update_package(path, target) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 434, in _update_package new_version, new_sha256, prefix = FETCHERS[fetcher]( ^^^^^^^^^^^^^^^^^^ File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 298, in _get_latest_version_github response = subprocess.check_output(cmd) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/subprocess.py", line 466, in check_output return run(*popenargs, stdout=PIPE, timeout=timeout, check=True, ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/subprocess.py", line 548, in run with Popen(*popenargs, **kwargs) as process: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/subprocess.py", line 1026, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/subprocess.py", line 1955, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) FileNotFoundError: [Errno 2] No such file or directory: 'nix-prefetch-git' --- SHOWING ERROR LOG FOR python3.11-ratarmountcore-0.6.3 ---------------------- The update script for python3.11-ratarmountcore-0.6.3 failed with exit code 1 [result] Failed to update python311Packages.ratarmountcore 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath wordbook, using log file: /var/log/nixpkgs-update/wordbook/2024-04-29.log wordbook 0 -> 1 attrpath: wordbook Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - wordbook-unstable-2022-11-02 Press Enter key to continue... Running update for: - wordbook-unstable-2022-11-02: UPDATING ... - wordbook-unstable-2022-11-02: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update wordbook 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.flask-mail, using log file: /var/log/nixpkgs-update/python311Packages.flask-mail/2024-04-29.log python311Packages.flask-mail 0 -> 1 attrpath: python311Packages.flask-mail Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-flask-mail-0.9.1 Press Enter key to continue... Running update for: - python3.11-flask-mail-0.9.1: UPDATING ... - python3.11-flask-mail-0.9.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.flask-mail 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath mindforger, using log file: /var/log/nixpkgs-update/mindforger/2024-04-29.log mindforger 1.52.0 -> 2.0.0 https://github.com/dvorka/mindforger/releases attrpath: mindforger Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update mindforger 1.52.0 -> 2.0.0 https://github.com/dvorka/mindforger/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath p4est-sc-dbg, using log file: /var/log/nixpkgs-update/p4est-sc-dbg/2024-04-29.log p4est-sc-dbg unstable-2021-06-14 -> 2.8.6 https://github.com/cburstedde/libsc/releases attrpath: p4est-sc-dbg Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/libraries/science/math/p4est-sc/default.nix b/pkgs/development/libraries/science/math/p4est-sc/default.nix index bb5d212061f2..55a6d59d9a6c 100644 --- a/pkgs/development/libraries/science/math/p4est-sc/default.nix +++ b/pkgs/development/libraries/science/math/p4est-sc/default.nix @@ -12,14 +12,14 @@ let in stdenv.mkDerivation { pname = "p4est-sc${dbg}"; - version = "unstable-2021-06-14"; + version = "2.8.6"; # fetch an untagged snapshot of the prev3-develop branch src = fetchFromGitHub { owner = "cburstedde"; repo = "libsc"; rev = "1ae814e3fb1cc5456652e0d77550386842cb9bfb"; - sha256 = "14vm0b162jh8399pgpsikbwq4z5lkrw9vfzy3drqykw09n6nc53z"; + sha256 = "sha256-fxRmjU2AT49zG/67nXietHyC+ZpR33dTGghKYcICdZM="; }; strictDeps = true; Source url did not change. [result] Failed to update p4est-sc-dbg unstable-2021-06-14 -> 2.8.6 https://github.com/cburstedde/libsc/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath mpvScripts.acompressor, using log file: /var/log/nixpkgs-update/mpvScripts.acompressor/2024-04-29.log mpvScripts.acompressor 0.37.0 -> 0.38.0 https://github.com/mpv-player/mpv/releases attrpath: mpvScripts.acompressor Checking auto update branch... No auto update branch exists Received ExitFailure 1 when running Raw command: env EDITOR=echo /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix --extra-experimental-features nix-command edit mpvScripts.acompressor -f . Standard error: error: cannot find position information for 'mpvScripts.acompressor [result] Failed to update mpvScripts.acompressor 0.37.0 -> 0.38.0 https://github.com/mpv-player/mpv/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath mpvScripts.autocrop, using log file: /var/log/nixpkgs-update/mpvScripts.autocrop/2024-04-29.log mpvScripts.autocrop 0.37.0 -> 0.38.0 https://github.com/mpv-player/mpv/releases attrpath: mpvScripts.autocrop Checking auto update branch... No auto update branch exists Received ExitFailure 1 when running Raw command: env EDITOR=echo /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix --extra-experimental-features nix-command edit mpvScripts.autocrop -f . Standard error: error: cannot find position information for 'mpvScripts.autocrop [result] Failed to update mpvScripts.autocrop 0.37.0 -> 0.38.0 https://github.com/mpv-player/mpv/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath mpvScripts.autodeint, using log file: /var/log/nixpkgs-update/mpvScripts.autodeint/2024-04-29.log mpvScripts.autodeint 0.37.0 -> 0.38.0 https://github.com/mpv-player/mpv/releases attrpath: mpvScripts.autodeint Checking auto update branch... No auto update branch exists Received ExitFailure 1 when running Raw command: env EDITOR=echo /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix --extra-experimental-features nix-command edit mpvScripts.autodeint -f . Standard error: error: cannot find position information for 'mpvScripts.autodeint [result] Failed to update mpvScripts.autodeint 0.37.0 -> 0.38.0 https://github.com/mpv-player/mpv/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath mpv-unwrapped, using log file: /var/log/nixpkgs-update/mpv-unwrapped/2024-04-29.log mpv-unwrapped 0.37.0 -> 0.38.0 https://github.com/mpv-player/mpv/releases attrpath: mpv-unwrapped Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/applications/video/mpv/default.nix b/pkgs/applications/video/mpv/default.nix index 163729d879b9..08ba09aa844c 100644 --- a/pkgs/applications/video/mpv/default.nix +++ b/pkgs/applications/video/mpv/default.nix @@ -100,7 +100,7 @@ let else stdenv; in stdenv'.mkDerivation (finalAttrs: { pname = "mpv"; - version = "0.37.0"; + version = "0.38.0"; outputs = [ "out" "dev" "doc" "man" ]; @@ -108,7 +108,7 @@ in stdenv'.mkDerivation (finalAttrs: { owner = "mpv-player"; repo = "mpv"; rev = "v${finalAttrs.version}"; - hash = "sha256-izAz9Iiam7tJAWIQkmn2cKOfoaog8oPKq4sOUtp1nvU="; + hash = "sha256-dFajnCpGlNqUv33A8eFEn8kjtzIPkcBY5j0gNVlaiIY="; }; patches = [ ./darwin-sigtool-no-deep.patch ]; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A mpv-unwrapped nix build failed. got build log for 'mpv-unwrapped' from 'daemon' @nix { "action": "setPhase", "phase": "unpackPhase" } Running phase: unpackPhase unpacking source archive /nix/store/rr912g9f1i10vb7d60bbz4njzxn4zr89-source source root is source @nix { "action": "setPhase", "phase": "patchPhase" } Running phase: patchPhase applying patch /nix/store/4mbw7zl9iiq59z8rlvcr8kp5b13vvkd8-darwin-sigtool-no-deep.patch patching file TOOLS/osxbundle.py Hunk #1 FAILED at 39. 1 out of 1 hunk FAILED -- saving rejects to file TOOLS/osxbundle.py.rej [result] Failed to update mpv-unwrapped 0.37.0 -> 0.38.0 https://github.com/mpv-player/mpv/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath zef, using log file: /var/log/nixpkgs-update/zef/2024-04-29.log zef 0.21.4 -> 0.22.0 https://github.com/ugexe/zef/releases attrpath: zef Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/development/interpreters/rakudo/zef.nix b/pkgs/development/interpreters/rakudo/zef.nix index 158fd6df4eb5..2d6959c324e0 100644 --- a/pkgs/development/interpreters/rakudo/zef.nix +++ b/pkgs/development/interpreters/rakudo/zef.nix @@ -7,13 +7,13 @@ stdenv.mkDerivation (finalAttrs: { pname = "zef"; - version = "0.21.4"; + version = "0.22.0"; src = fetchFromGitHub { owner = "ugexe"; repo = "zef"; rev = "v${finalAttrs.version}"; - hash = "sha256-k6jihTDbaSXv+XvfqxGIyCdD005tG8l3mSIkNG6FwPQ="; + hash = "sha256-HpDTxu846jb5hasH7nL93vRihFIZbVBXf/dV4itqFQg="; }; nativeBuildInputs = [ [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/cznkwqf1ab4kqdskf07ja2pbxcw2vsmx-zef-0.22.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • zef
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/ugexe/zef/releases. meta.description for zef is: Raku / Perl6 Module Management meta.homepage for zef is: https://github.com/ugexe/zef ###### Updates performed - Version update ###### To inspect upstream changes - [Release on GitHub](https://github.com/ugexe/zef/releases/tag/v0.22.0) - [Compare changes on GitHub](https://github.com/ugexe/zef/compare/v0.21.4...v0.22.0) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 0.22.0 with grep in /nix/store/cznkwqf1ab4kqdskf07ja2pbxcw2vsmx-zef-0.22.0 - found 0.22.0 in filename of file in /nix/store/cznkwqf1ab4kqdskf07ja2pbxcw2vsmx-zef-0.22.0 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath zef ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/cznkwqf1ab4kqdskf07ja2pbxcw2vsmx-zef-0.22.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A zef https://github.com/r-ryantm/nixpkgs/archive/a0e3dcd812fda3b35c5364025ea95e8936967101.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/a0e3dcd812fda3b35c5364025ea95e8936967101#zef ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/cznkwqf1ab4kqdskf07ja2pbxcw2vsmx-zef-0.22.0 ls -la /nix/store/cznkwqf1ab4kqdskf07ja2pbxcw2vsmx-zef-0.22.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • zef
--- ###### Maintainer pings cc @stigtsp for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307778 [result] Success updating zef 0.21.4 -> 0.22.0 https://github.com/ugexe/zef/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.karton-config-extractor, using log file: /var/log/nixpkgs-update/python311Packages.karton-config-extractor/2024-04-29.log python311Packages.karton-config-extractor 0 -> 1 attrpath: python311Packages.karton-config-extractor Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-karton-config-extractor-2.2.0 Press Enter key to continue... Running update for: - python3.11-karton-config-extractor-2.2.0: UPDATING ... - python3.11-karton-config-extractor-2.2.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.karton-config-extractor 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.parso, using log file: /var/log/nixpkgs-update/python311Packages.parso/2024-04-29.log python311Packages.parso 0 -> 1 attrpath: python311Packages.parso Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-parso-0.8.3 Press Enter key to continue... Running update for: - python3.11-parso-0.8.3: UPDATING ... - python3.11-parso-0.8.3: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/parso/default.nix b/pkgs/development/python-modules/parso/default.nix index 7d76ef5d80aa..03b052a46dd7 100644 --- a/pkgs/development/python-modules/parso/default.nix +++ b/pkgs/development/python-modules/parso/default.nix @@ -9,13 +9,13 @@ buildPythonPackage rec { pname = "parso"; - version = "0.8.3"; + version = "0.8.4"; format = "setuptools"; disabled = pythonOlder "3.6"; src = fetchPypi { inherit pname version; - hash = "sha256-jAe+KQu1nwNYiRWSHinopQACrK8s3F+g4BFPkXCfr6A="; + hash = "sha256-6zp7WCQPuZCZo0VXHe7MD5VA6l9N0v4UwqmdaygauS0="; }; nativeCheckInputs = [ pytestCheckHook ]; No auto update branch exists Old version 0.8.3" not present in staging derivation file with contents: { lib , buildPythonPackage , fetchPypi , fetchpatch , pythonAtLeast , pythonOlder , pytestCheckHook }: buildPythonPackage rec { pname = "parso"; version = "0.8.4"; format = "setuptools"; disabled = pythonOlder "3.6"; src = fetchPypi { inherit pname version; hash = "sha256-6zp7WCQPuZCZo0VXHe7MD5VA6l9N0v4UwqmdaygauS0="; }; nativeCheckInputs = [ pytestCheckHook ]; disabledTests = lib.optionals (pythonAtLeast "3.10") [ # python changed exception message format in 3.10, 3.10 not yet supported "test_python_exception_matches" ]; meta = with lib; { description = "A Python Parser"; homepage = "https://parso.readthedocs.io/en/latest/"; changelog = "https://github.com/davidhalter/parso/blob/master/CHANGELOG.rst"; license = licenses.mit; }; } [result] Failed to update python311Packages.parso 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.magicgui, using log file: /var/log/nixpkgs-update/python311Packages.magicgui/2024-04-29.log python311Packages.magicgui 0 -> 1 attrpath: python311Packages.magicgui Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-magicgui-0.5.1 Press Enter key to continue... Running update for: - python3.11-magicgui-0.5.1: UPDATING ... - python3.11-magicgui-0.5.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.magicgui 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath aspellDicts.bg, using log file: /var/log/nixpkgs-update/aspellDicts.bg/2024-04-29.log aspellDicts.bg 0 -> 1 attrpath: aspellDicts.bg Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - aspell-dict-bg-4.1-0 Press Enter key to continue... Running update for: - aspell-dict-bg-4.1-0: UPDATING ... - aspell-dict-bg-4.1-0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update aspellDicts.bg 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pdm-pep517, using log file: /var/log/nixpkgs-update/python311Packages.pdm-pep517/2024-04-29.log python311Packages.pdm-pep517 0 -> 1 attrpath: python311Packages.pdm-pep517 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pdm-pep517-1.1.4 Press Enter key to continue... Running update for: - python3.11-pdm-pep517-1.1.4: UPDATING ... - python3.11-pdm-pep517-1.1.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pdm-pep517 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.fastcache, using log file: /var/log/nixpkgs-update/python311Packages.fastcache/2024-04-29.log python311Packages.fastcache 0 -> 1 attrpath: python311Packages.fastcache Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-fastcache-1.1.0 Press Enter key to continue... Running update for: - python3.11-fastcache-1.1.0: UPDATING ... - python3.11-fastcache-1.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.fastcache 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath erlang_odbc_javac, using log file: /var/log/nixpkgs-update/erlang_odbc_javac/2024-04-29.log erlang_odbc_javac 25.3.2.11 -> 26.2.4 https://github.com/erlang/otp/releases attrpath: erlang_odbc_javac Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - erlang_javac_odbc-25.3.2.11 Press Enter key to continue... Running update for: - erlang_javac_odbc-25.3.2.11: UPDATING ... - erlang_javac_odbc-25.3.2.11: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update erlang_odbc_javac 25.3.2.11 -> 26.2.4 https://github.com/erlang/otp/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath erlang_nox, using log file: /var/log/nixpkgs-update/erlang_nox/2024-04-29.log erlang_nox 25.3.2.11 -> 26.2.4 https://github.com/erlang/otp/releases attrpath: erlang_nox Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - erlang-25.3.2.11 Press Enter key to continue... Running update for: - erlang-25.3.2.11: UPDATING ... - erlang-25.3.2.11: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update erlang_nox 25.3.2.11 -> 26.2.4 https://github.com/erlang/otp/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath erlang_odbc, using log file: /var/log/nixpkgs-update/erlang_odbc/2024-04-29.log erlang_odbc 25.3.2.11 -> 26.2.4 https://github.com/erlang/otp/releases attrpath: erlang_odbc Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - erlang_odbc-25.3.2.11 Press Enter key to continue... Running update for: - erlang_odbc-25.3.2.11: UPDATING ... - erlang_odbc-25.3.2.11: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update erlang_odbc 25.3.2.11 -> 26.2.4 https://github.com/erlang/otp/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath erlang_javac, using log file: /var/log/nixpkgs-update/erlang_javac/2024-04-29.log erlang_javac 25.3.2.11 -> 26.2.4 https://github.com/erlang/otp/releases attrpath: erlang_javac Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - erlang_javac-25.3.2.11 Press Enter key to continue... Running update for: - erlang_javac-25.3.2.11: UPDATING ... - erlang_javac-25.3.2.11: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update erlang_javac 25.3.2.11 -> 26.2.4 https://github.com/erlang/otp/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath hunspellDictsChromium.de-de, using log file: /var/log/nixpkgs-update/hunspellDictsChromium.de-de/2024-04-29.log hunspellDictsChromium.de-de 0 -> 1 attrpath: hunspellDictsChromium.de-de Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - hunspell-dict-de-de-chromium-115.0.5790.170 Press Enter key to continue... Running update for: - hunspell-dict-de-de-chromium-115.0.5790.170: UPDATING ... - hunspell-dict-de-de-chromium-115.0.5790.170: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update hunspellDictsChromium.de-de 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cfn-nag, using log file: /var/log/nixpkgs-update/cfn-nag/2024-04-29.log cfn-nag 0 -> 1 attrpath: cfn-nag Checking auto update branch... The derivation has no 'version' attribute, so do not know how to figure out the version while doing an updateScript update [result] Failed to update cfn-nag 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.xnatpy, using log file: /var/log/nixpkgs-update/python311Packages.xnatpy/2024-04-29.log python311Packages.xnatpy 0 -> 1 attrpath: python311Packages.xnatpy Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-xnatpy-0.5.1 Press Enter key to continue... Running update for: - python3.11-xnatpy-0.5.1: UPDATING ... - python3.11-xnatpy-0.5.1: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/xnatpy/default.nix b/pkgs/development/python-modules/xnatpy/default.nix index 4738f137d427..092727c0e5e1 100644 --- a/pkgs/development/python-modules/xnatpy/default.nix +++ b/pkgs/development/python-modules/xnatpy/default.nix @@ -12,7 +12,7 @@ buildPythonPackage rec { pname = "xnatpy"; - version = "0.5.1"; + version = "0.5.3"; format = "pyproject"; disabled = pythonOlder "3.7"; @@ -20,7 +20,7 @@ buildPythonPackage rec { src = fetchPypi { pname = "xnat"; inherit version; - hash = "sha256-iOw9cVWP5Am4S9JQ0NTmtew38KZiKmau+19K2KG2aKQ="; + hash = "sha256-U66b1ZWX68TvgGHf1OO4pI/Jq9pJ8rZEuQQubA5PZKs="; }; nativeBuildInputs = [ setuptools ]; No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A python311Packages.xnatpy nix build failed. adding 'xnat/version.py' adding 'xnat/client/__init__.py' adding 'xnat/client/download.py' adding 'xnat/client/importing.py' adding 'xnat/client/listings.py' adding 'xnat/client/prearchive.py' adding 'xnat/client/rest.py' adding 'xnat/client/scripts.py' adding 'xnat/client/search.py' adding 'xnat/client/utils.py' adding 'xnat/scripts/__init__.py' adding 'xnat/scripts/copy_project.py' adding 'xnat/scripts/data_integrity_check.py' adding 'xnat/scripts/import_experiment_dir.py' adding 'xnat-0.5.3.dist-info/LICENSE' adding 'xnat-0.5.3.dist-info/METADATA' adding 'xnat-0.5.3.dist-info/WHEEL' adding 'xnat-0.5.3.dist-info/entry_points.txt' adding 'xnat-0.5.3.dist-info/top_level.txt' adding 'xnat-0.5.3.dist-info/RECORD' removing build/bdist.linux-x86_64/wheel Successfully built xnat-0.5.3-py3-none-any.whl Finished creating a wheel... Finished executing pypaBuildPhase @nix { "action": "setPhase", "phase": "pythonRuntimeDepsCheckHook" } Running phase: pythonRuntimeDepsCheckHook Executing pythonRuntimeDepsCheck Checking runtime dependencies for xnat-0.5.3-py3-none-any.whl - python-dateutil not installed - importlib-metadata not installed [result] Failed to update python311Packages.xnatpy 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.aiohttp-socks, using log file: /var/log/nixpkgs-update/python311Packages.aiohttp-socks/2024-04-29.log python311Packages.aiohttp-socks 0 -> 1 attrpath: python311Packages.aiohttp-socks Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-aiohttp-socks-0.8.4 Press Enter key to continue... Running update for: - python3.11-aiohttp-socks-0.8.4: UPDATING ... - python3.11-aiohttp-socks-0.8.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.aiohttp-socks 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyshp, using log file: /var/log/nixpkgs-update/python311Packages.pyshp/2024-04-29.log python311Packages.pyshp 0 -> 1 attrpath: python311Packages.pyshp Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pyshp-2.3.1 Press Enter key to continue... Running update for: - python3.11-pyshp-2.3.1: UPDATING ... - python3.11-pyshp-2.3.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyshp 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gnome.networkmanager-fortisslvpn, using log file: /var/log/nixpkgs-update/gnome.networkmanager-fortisslvpn/2024-04-29.log gnome.networkmanager-fortisslvpn 0 -> 1 attrpath: gnome.networkmanager-fortisslvpn Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - NetworkManager-fortisslvpn-gnome-1.4.0 Press Enter key to continue... Running update for: - NetworkManager-fortisslvpn-gnome-1.4.0: UPDATING ... - NetworkManager-fortisslvpn-gnome-1.4.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update gnome.networkmanager-fortisslvpn 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pyrosimple, using log file: /var/log/nixpkgs-update/pyrosimple/2024-04-29.log pyrosimple 0 -> 1 attrpath: pyrosimple Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - pyrosimple-2.13.0 Press Enter key to continue... Running update for: - pyrosimple-2.13.0: UPDATING ... - pyrosimple-2.13.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update pyrosimple 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.selectors2, using log file: /var/log/nixpkgs-update/python311Packages.selectors2/2024-04-29.log python311Packages.selectors2 0 -> 1 attrpath: python311Packages.selectors2 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-selectors2-2.0.2 Press Enter key to continue... Running update for: - python3.11-selectors2-2.0.2: UPDATING ... - python3.11-selectors2-2.0.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.selectors2 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.phone-modem, using log file: /var/log/nixpkgs-update/python311Packages.phone-modem/2024-04-29.log python311Packages.phone-modem 0 -> 1 attrpath: python311Packages.phone-modem Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-phone-modem-0.1.2 Press Enter key to continue... Running update for: - python3.11-phone-modem-0.1.2: UPDATING ... - python3.11-phone-modem-0.1.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.phone-modem 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath buildbot-plugins.react-grid-view, using log file: /var/log/nixpkgs-update/buildbot-plugins.react-grid-view/2024-04-29.log buildbot-plugins.react-grid-view 0 -> 1 attrpath: buildbot-plugins.react-grid-view Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-buildbot-react-grid-view-3.11.1 Press Enter key to continue... Running update for: - python3.11-buildbot-react-grid-view-3.11.1: UPDATING ... - python3.11-buildbot-react-grid-view-3.11.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update buildbot-plugins.react-grid-view 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath zfs-autobackup, using log file: /var/log/nixpkgs-update/zfs-autobackup/2024-04-29.log zfs-autobackup 0 -> 1 attrpath: zfs-autobackup Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - zfs-autobackup-3.2 Press Enter key to continue... Running update for: - zfs-autobackup-3.2: UPDATING ... - zfs-autobackup-3.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update zfs-autobackup 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath libsignal-ffi, using log file: /var/log/nixpkgs-update/libsignal-ffi/2024-04-29.log libsignal-ffi 0.44.0 -> 0.45.1 https://github.com/signalapp/libsignal/releases attrpath: libsignal-ffi Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/by-name/li/libsignal-ffi/package.nix b/pkgs/by-name/li/libsignal-ffi/package.nix index 06afbfc80408..a8d85d84167b 100644 --- a/pkgs/by-name/li/libsignal-ffi/package.nix +++ b/pkgs/by-name/li/libsignal-ffi/package.nix @@ -12,13 +12,13 @@ rustPlatform.buildRustPackage rec { pname = "libsignal-ffi"; # must match the version used in mautrix-signal # see https://github.com/mautrix/signal/issues/401 - version = "0.44.0"; + version = "0.45.1"; src = fetchFromGitHub { owner = "signalapp"; repo = "libsignal"; rev = "v${version}"; - hash = "sha256-HqnxemAPjjKl/l4dVjEUIIvgW3ibNtQWnA10QYcd8Os="; + hash = "sha256-n9g9pxnXmbRAucrIZQ4cZCKLSYsmPbzKZWumS8pQ6nc="; }; nativeBuildInputs = [ protobuf ] ++ lib.optionals stdenv.isDarwin [ xcodebuild ]; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A libsignal-ffi nix build failed. > "rustls-pemfile", 4351,4359d4340 < name = "webpki-roots" < version = "0.26.1" < source = "registry+https://github.com/rust-lang/crates.io-index" < checksum = "b3de34ae270483955a94f4b21bdaaeb83d508bb84a01435f393818edb0012009" < dependencies = [ < "rustls-pki-types", < ] < < [[package]] 4697d4677 < "thiserror", 4705c4685 < "base64 0.21.7", --- > "base64", 4726d4705 < "thiserror", ERROR: cargoHash or cargoSha256 is out of date Cargo.lock is not the same in /build/cargo-vendor-dir To fix the issue: 1. Set cargoHash/cargoSha256 to an empty string: `cargoHash = "";` 2. Build the derivation and wait for it to fail with a hash mismatch 3. Copy the "got: sha256-..." value back into the cargoHash field You should have: cargoHash = "sha256-XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX="; [result] Failed to update libsignal-ffi 0.44.0 -> 0.45.1 https://github.com/signalapp/libsignal/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.flask-mongoengine, using log file: /var/log/nixpkgs-update/python311Packages.flask-mongoengine/2024-04-29.log python311Packages.flask-mongoengine 0 -> 1 attrpath: python311Packages.flask-mongoengine Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-flask-mongoengine-1.0.0-unstable-2022-08-16 Press Enter key to continue... Running update for: - python3.11-flask-mongoengine-1.0.0-unstable-2022-08-16: UPDATING ... - python3.11-flask-mongoengine-1.0.0-unstable-2022-08-16: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.flask-mongoengine 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath octavePackages.mvn, using log file: /var/log/nixpkgs-update/octavePackages.mvn/2024-04-29.log octavePackages.mvn 0 -> 1 attrpath: octavePackages.mvn Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - octave-8.4.0-mvn-1.1.0 Press Enter key to continue... Running update for: - octave-8.4.0-mvn-1.1.0: UPDATING ... - octave-8.4.0-mvn-1.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update octavePackages.mvn 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath kicli, using log file: /var/log/nixpkgs-update/kicli/2024-04-29.log kicli 0 -> 1 attrpath: kicli Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] skipping because derivation has updateScript [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - kicli-0.0.3 Press Enter key to continue... Running update for: - kicli-0.0.3: UPDATING ... - kicli-0.0.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update kicli 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath nodePackages.unified-language-server, using log file: /var/log/nixpkgs-update/nodePackages.unified-language-server/2024-04-29.log nodePackages.unified-language-server 4.0.0 -> 4.0.1 https://github.com/unifiedjs/unified-language-server/releases attrpath: nodePackages.unified-language-server Checking auto update branch... No auto update branch exists Derivation file says not to edit it [result] Failed to update nodePackages.unified-language-server 4.0.0 -> 4.0.1 https://github.com/unifiedjs/unified-language-server/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.geocachingapi, using log file: /var/log/nixpkgs-update/python311Packages.geocachingapi/2024-04-29.log python311Packages.geocachingapi 0 -> 1 attrpath: python311Packages.geocachingapi Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-geocachingapi-0.2.3 Press Enter key to continue... Running update for: - python3.11-geocachingapi-0.2.3: UPDATING ... - python3.11-geocachingapi-0.2.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.geocachingapi 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.sqlsoup, using log file: /var/log/nixpkgs-update/python311Packages.sqlsoup/2024-04-29.log python311Packages.sqlsoup 0 -> 1 attrpath: python311Packages.sqlsoup Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-sqlsoup-0.9.1 Press Enter key to continue... Running update for: - python3.11-sqlsoup-0.9.1: UPDATING ... - python3.11-sqlsoup-0.9.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.sqlsoup 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath graphene, using log file: /var/log/nixpkgs-update/graphene/2024-04-29.log graphene 0 -> 1 attrpath: graphene Checking auto update branch... Do not update GNOME during a release cycle [result] Failed to update graphene 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.lz4, using log file: /var/log/nixpkgs-update/python311Packages.lz4/2024-04-29.log python311Packages.lz4 0 -> 1 attrpath: python311Packages.lz4 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-lz4-4.3.3 Press Enter key to continue... Running update for: - python3.11-lz4-4.3.3: UPDATING ... - python3.11-lz4-4.3.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.lz4 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath proxmove, using log file: /var/log/nixpkgs-update/proxmove/2024-04-29.log proxmove 0 -> 1 attrpath: proxmove Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - proxmove-1.2 Press Enter key to continue... Running update for: - proxmove-1.2: UPDATING ... - proxmove-1.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update proxmove 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath osu-lazer, using log file: /var/log/nixpkgs-update/osu-lazer/2024-04-29.log osu-lazer 0 -> 1 attrpath: osu-lazer Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - osu-lazer-2024.412.1 Press Enter key to continue... Running update for: - osu-lazer-2024.412.1: UPDATING ... - osu-lazer-2024.412.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update osu-lazer 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pycosat, using log file: /var/log/nixpkgs-update/python311Packages.pycosat/2024-04-29.log python311Packages.pycosat 0 -> 1 attrpath: python311Packages.pycosat Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pycosat-0.6.3 Press Enter key to continue... Running update for: - python3.11-pycosat-0.6.3: UPDATING ... - python3.11-pycosat-0.6.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pycosat 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath kicad-testing-small, using log file: /var/log/nixpkgs-update/kicad-testing-small/2024-04-29.log kicad-testing-small 0 -> 1 attrpath: kicad-testing-small Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - kicad-testing-small-8.0-2024-02-23 Press Enter key to continue... Running update for: - kicad-testing-small-8.0-2024-02-23: UPDATING ... - kicad-testing-small-8.0-2024-02-23: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/applications/science/electronics/kicad/versions.nix b/pkgs/applications/science/electronics/kicad/versions.nix index 4c55703edccf..7772c9775081 100644 --- a/pkgs/applications/science/electronics/kicad/versions.nix +++ b/pkgs/applications/science/electronics/kicad/versions.nix @@ -25,23 +25,23 @@ }; "kicad-testing" = { kicadVersion = { - version = "8.0-2024-02-23"; + version = "8.0-2024-04-29"; src = { - rev = "14d71c8ca6b48d2eb956bb069acf05a37b1b2652"; - sha256 = "0xqd0xbpnvsvba75526nwgzr8l2cfxy99sjmg13sjxfx7rq16kqi"; + rev = "2ee2d7d5d99ff87325e548cbd941057f14577591"; + sha256 = "122mfx8i0dfw9l8jffl7020g8b9jx4bwfndixs5xvc85f9qp4wzv"; }; }; libVersion = { - version = "8.0-2024-02-23"; + version = "8.0-2024-04-29"; libSources = { - symbols.rev = "e228d4e8b295364e90e36c57f4023d8285ba88cd"; - symbols.sha256 = "049h2a7yn6ks8sybppixa872dbvyd0rwf9r6nixvdg6d13fl6rwf"; - templates.rev = "2e00c233b67e35323f90d04c190bf70237a252f2"; - templates.sha256 = "0m9bggz3cm27kqpjjwxy19mqzk0c69bywcjkqcni7kafr21c6k4z"; - footprints.rev = "6e5329a6d4aaa81290e23af3eba88f505c2f61b0"; - footprints.sha256 = "0ypjlbmzmcl3pha3q2361va70c988b1drxy8320gm66jkzfc21a1"; - packages3d.rev = "d1e521228d9f5888836b1a6a35fb05fb925456fa"; - packages3d.sha256 = "0lcy1av7ixg1f7arflk50jllpc1749sfvf3h62hkxsz97wkr97xj"; + symbols.rev = "099ac0c8ac402a685fde00b1369e34a116e29661"; + symbols.sha256 = "0w333f89yw2m0zlpkg0k6hfwlj10snm8laihdjnsb22asyz4pbhn"; + templates.rev = "2e2da58e02707d327d59d4101c401a82dc9a26f6"; + templates.sha256 = "073a6cyvzzy0vmkj3ip4ziq7b7pcizs70nm5acw838dxghjfyv3v"; + footprints.rev = "e8c30550cde4945cbe1bf30cccf0b3c1e2bda6c6"; + footprints.sha256 = "10j8qjljc1fv8k4zp3zn0da33g57hn6pgrgmbgp18dsa539xvxcz"; + packages3d.rev = "249f7947587529026e1676cd70c8d7493a8d8162"; + packages3d.sha256 = "04gvfb54jhnww2qwrxc27wpyrvmjasdc4xhr0ridl7dglh4qcp35"; }; }; }; An auto update branch exists with message `kicad-testing-small: 8.0-2024-02-23 -> 8.0-2024-04-24`. New version is 8.0-2024-04-29. The auto update branch does not match or exceed the new version. [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/r7ijl1xpcm8mlq7inzm8zfxypy749shv-kicad-testing-small-8.0-2024-04-29" Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 6 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 8 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 10 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 10 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 9 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 9 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 8 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 7 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 7 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 7 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 5 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 Waiting for OfBorg: https://events.ofborg.org/stats.php's evaluator.messages.waiting = 4 [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
2 packages built:
  • kicad-testing
  • kicad-testing-small
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from passthru.updateScript. meta.description for kicad-testing-small is: Open Source Electronics Design Automation suite, without 3D models meta.homepage for kicad-testing-small is: https://www.kicad.org/ ###### Updates performed - Ran passthru.UpdateScript ###### To inspect upstream changes ###### Impact Checks done --- - built on NixOS - kicad result is not automatically checked because some binaries stick around ---
Rebuild report (if merged into master) (click to expand) ``` 3 total rebuild path(s) 3 package rebuild(s) First fifty rebuilds by attrpath kicad-testing kicad-testing-small ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/r7ijl1xpcm8mlq7inzm8zfxypy749shv-kicad-testing-small-8.0-2024-04-29 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A kicad-testing-small https://github.com/r-ryantm/nixpkgs/archive/7fb0ba787dfc74f34e77808b0019a24cbecd9504.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/7fb0ba787dfc74f34e77808b0019a24cbecd9504#kicad-testing-small ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/r7ijl1xpcm8mlq7inzm8zfxypy749shv-kicad-testing-small-8.0-2024-04-29 ls -la /nix/store/r7ijl1xpcm8mlq7inzm8zfxypy749shv-kicad-testing-small-8.0-2024-04-29/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
2 packages built:
  • kicad-testing
  • kicad-testing-small
--- ###### Maintainer pings cc @evils for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). Updated existing PR https://api.github.com/repos/NixOS/nixpkgs/pulls/280181 [result] Success updating kicad-testing-small 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.dunamai, using log file: /var/log/nixpkgs-update/python312Packages.dunamai/2024-04-29.log python312Packages.dunamai 1.19.2 -> 1.20.0 https://github.com/mtkennerly/dunamai/releases attrpath: python312Packages.dunamai isn't the default python version [result] Failed to update python312Packages.dunamai 1.19.2 -> 1.20.0 https://github.com/mtkennerly/dunamai/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath plex-mpv-shim, using log file: /var/log/nixpkgs-update/plex-mpv-shim/2024-04-29.log plex-mpv-shim 0 -> 1 attrpath: plex-mpv-shim Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - plex-mpv-shim-1.11.0 Press Enter key to continue... Running update for: - plex-mpv-shim-1.11.0: UPDATING ... - plex-mpv-shim-1.11.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update plex-mpv-shim 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyimpfuzzy, using log file: /var/log/nixpkgs-update/python311Packages.pyimpfuzzy/2024-04-29.log python311Packages.pyimpfuzzy 0 -> 1 attrpath: python311Packages.pyimpfuzzy Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pyimpfuzzy-0.5 Press Enter key to continue... Running update for: - python3.11-pyimpfuzzy-0.5: UPDATING ... - python3.11-pyimpfuzzy-0.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyimpfuzzy 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pymfy, using log file: /var/log/nixpkgs-update/python311Packages.pymfy/2024-04-29.log python311Packages.pymfy 0 -> 1 attrpath: python311Packages.pymfy Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pymfy-0.11.0 Press Enter key to continue... Running update for: - python3.11-pymfy-0.11.0: UPDATING ... - python3.11-pymfy-0.11.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pymfy 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath elixir_1_12, using log file: /var/log/nixpkgs-update/elixir_1_12/2024-04-29.log elixir_1_12 1.12.3 -> 1.16.2 https://github.com/elixir-lang/elixir/releases attrpath: elixir_1_12 Checking auto update branch... No auto update branch exists Version in attr path elixir_1_12 not compatible with 1.16.2 [result] Failed to update elixir_1_12 1.12.3 -> 1.16.2 https://github.com/elixir-lang/elixir/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath ospd-openvas, using log file: /var/log/nixpkgs-update/ospd-openvas/2024-04-29.log ospd-openvas 0 -> 1 attrpath: ospd-openvas Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/lz498jljs8kas6ilsnrwd7cmgn174ij2-packages.json.drv building '/nix/store/lz498jljs8kas6ilsnrwd7cmgn174ij2-packages.json.drv'... Going to be running update for following packages: - ospd-openvas-22.7.1 Press Enter key to continue... Running update for: - ospd-openvas-22.7.1: UPDATING ... - ospd-openvas-22.7.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update ospd-openvas 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath tartan, using log file: /var/log/nixpkgs-update/tartan/2024-04-29.log tartan 0 -> 1 attrpath: tartan Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/844h7bqqh8mcw7dc75q84z9lahhixzjd-packages.json.drv building '/nix/store/844h7bqqh8mcw7dc75q84z9lahhixzjd-packages.json.drv'... Going to be running update for following packages: - tartan-unstable-2021-12-23 Press Enter key to continue... Running update for: - tartan-unstable-2021-12-23: UPDATING ... - tartan-unstable-2021-12-23: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/tools/analysis/tartan/default.nix b/pkgs/development/tools/analysis/tartan/default.nix index 1106d017cba1..65216c0e7ccd 100644 --- a/pkgs/development/tools/analysis/tartan/default.nix +++ b/pkgs/development/tools/analysis/tartan/default.nix @@ -12,14 +12,14 @@ stdenv.mkDerivation rec { pname = "tartan"; - version = "unstable-2021-12-23"; + version = "0.3.0-unstable-2023-05-28"; src = fetchFromGitLab { domain = "gitlab.freedesktop.org"; owner = "tartan"; repo = "tartan"; - rev = "bd4ea95d8b3ce1258491e9fac7fcc37d2b241a16"; - sha256 = "l3duPt8Kh/JljzOV+Dm26XbS7gZ+mmFfYUYofWSJRyo="; + rev = "a4387a49c7bb318121a89f9042a28b4bbbec0720"; + sha256 = "0pXZiju4OhDf9+G0t1KRafRZXVZlkTLKyAhBkyCWAk0="; }; nativeBuildInputs = [ An auto update branch exists with message `tartan: unstable-2021-12-23 -> unstable-2023-05-28`. New version is 0.3.0-unstable-2023-05-28. The auto update branch does not match or exceed the new version. [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A tartan nix build failed. | ^~~~~~~~~~~~~~~~~~~ /nix/store/4lqzp9rms836sv9rbxpb7kqjm4bvywlz-clang-17.0.6-dev/include/clang/Basic/AttributeCommonInfo.h:130:3: note: candidate expects 6 arguments, 1 provided [8/13] Compiling C++ object clang-plugin/libtartan.so.p/gerror-checker.cpp.o [9/13] Compiling C++ object clang-plugin/libtartan.so.p/gvariant-checker.cpp.o FAILED: clang-plugin/libtartan.so.p/gvariant-checker.cpp.o g++ -Iclang-plugin/libtartan.so.p -Iclang-plugin -I../clang-plugin -I. -I.. -I/nix/store/hfa0jcamap6fyq1jlfxvn0dhaa3yrv8y-glib-2.78.4-dev/include/glib-2.0 -I/nix/store/77b9knzn0ai7jdvq74qkhahz001pc3w5-glib-2.78.4/lib/glib-2.0/include -I/nix/store/hfa0jcamap6fyq1jlfxvn0dhaa3yrv8y-glib-2.78.4-dev/include -I/nix/store/6xqvj41lv287qs6liafdr3g9kyvbnaiw-gobject-introspection-1.78.1-dev/include/gobject-introspection-1.0 -fdiagnostics-color=always -D_GLIBCXX_ASSERTIONS=1 -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -Wextra -Wpedantic -std=c++17 -fPIC -pthread -D_GNU_SOURCE -D__STDC_CONSTANT_MACROS -D__STDC_FORMAT_MACROS -D__STDC_LIMIT_MACROS '-DG_LOG_DOMAIN="tartan"' -MD -MQ clang-plugin/libtartan.so.p/gvariant-checker.cpp.o -MF clang-plugin/libtartan.so.p/gvariant-checker.cpp.o.d -o clang-plugin/libtartan.so.p/gvariant-checker.cpp.o -c ../clang-plugin/gvariant-checker.cpp ../clang-plugin/gvariant-checker.cpp: In function 'bool tartan::_consume_variadic_argument(clang::QualType, clang::CallExpr::const_arg_iterator*, clang::CallExpr::const_arg_iterator*, unsigned int, clang::CompilerInstance&, const clang::StringLiteral*, clang::ASTContext&, TypeManager&)': ../clang-plugin/gvariant-checker.cpp:346:9: error: 'Optional' was not declared in this scope; did you mean 'llvm::cl::Optional'? 346 | Optional int_constant_value = arg->getIntegerConstantExpr (context); | ^~~~~~~~ | llvm::cl::Optional In file included from /nix/store/4lqzp9rms836sv9rbxpb7kqjm4bvywlz-clang-17.0.6-dev/include/clang/Frontend/CommandLineSourceLoc.h:18, from /nix/store/4lqzp9rms836sv9rbxpb7kqjm4bvywlz-clang-17.0.6-dev/include/clang/Frontend/FrontendOptions.h:14, from /nix/store/4lqzp9rms836sv9rbxpb7kqjm4bvywlz-clang-17.0.6-dev/include/clang/Frontend/CompilerInvocation.h:19, from /nix/store/4lqzp9rms836sv9rbxpb7kqjm4bvywlz-clang-17.0.6-dev/include/clang/Frontend/CompilerInstance.h:16, from ../clang-plugin/debug.h:30, from ../clang-plugin/gvariant-checker.cpp:75: /nix/store/9jl1j5vivqz24wh4yp1c6ma32vndq8n6-llvm-17.0.6-dev/include/llvm/Support/CommandLine.h:114:3: note: 'llvm::cl::Optional' declared here 114 | Optional = 0x00, // Zero or One occurrence | ^~~~~~~~ ../clang-plugin/gvariant-checker.cpp:346:30: error: expected primary-expression before '>' token 346 | Optional int_constant_value = arg->getIntegerConstantExpr (context); | ^ ../clang-plugin/gvariant-checker.cpp:346:32: error: 'int_constant_value' was not declared in this scope 346 | Optional int_constant_value = arg->getIntegerConstantExpr (context); | ^~~~~~~~~~~~~~~~~~ [10/13] Compiling C++ object clang-plugin/libtartan.so.p/plugin.cpp.o [11/13] Compiling C++ object clang-plugin/libtartan.so.p/nullability-checker.cpp.o [12/13] Compiling C++ object clang-plugin/libtartan.so.p/gsignal-checker.cpp.o ninja: build stopped: subcommand failed. [result] Failed to update tartan 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath tabnine, using log file: /var/log/nixpkgs-update/tabnine/2024-04-29.log tabnine 0 -> 1 attrpath: tabnine Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] this derivation will be built: /nix/store/hg3hb3cz25b7zmscj8qxd2h4nysaw7k5-packages.json.drv building '/nix/store/hg3hb3cz25b7zmscj8qxd2h4nysaw7k5-packages.json.drv'... Going to be running update for following packages: - tabnine-4.154.0 Press Enter key to continue... Running update for: - tabnine-4.154.0: UPDATING ... - tabnine-4.154.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update tabnine 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath websploit, using log file: /var/log/nixpkgs-update/websploit/2024-04-29.log websploit 0 -> 1 attrpath: websploit Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - websploit-4.0.4 Press Enter key to continue... Running update for: - websploit-4.0.4: UPDATING ... - websploit-4.0.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update websploit 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pykostalpiko, using log file: /var/log/nixpkgs-update/python311Packages.pykostalpiko/2024-04-29.log python311Packages.pykostalpiko 0 -> 1 attrpath: python311Packages.pykostalpiko Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pykostalpiko-1.1.2 Press Enter key to continue... Running update for: - python3.11-pykostalpiko-1.1.2: UPDATING ... - python3.11-pykostalpiko-1.1.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pykostalpiko 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyqtdatavisualization, using log file: /var/log/nixpkgs-update/python311Packages.pyqtdatavisualization/2024-04-29.log python311Packages.pyqtdatavisualization 0 -> 1 attrpath: python311Packages.pyqtdatavisualization Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pyqtdatavisualization-5.15.5 Press Enter key to continue... Running update for: - python3.11-pyqtdatavisualization-5.15.5: UPDATING ... - python3.11-pyqtdatavisualization-5.15.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyqtdatavisualization 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.num2words, using log file: /var/log/nixpkgs-update/python311Packages.num2words/2024-04-29.log python311Packages.num2words 0 -> 1 attrpath: python311Packages.num2words Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-num2words-0.5.13 Press Enter key to continue... Running update for: - python3.11-num2words-0.5.13: UPDATING ... - python3.11-num2words-0.5.13: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.num2words 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pycookiecheat, using log file: /var/log/nixpkgs-update/python311Packages.pycookiecheat/2024-04-29.log python311Packages.pycookiecheat 0 -> 1 attrpath: python311Packages.pycookiecheat Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pycookiecheat-0.6.0 Press Enter key to continue... Running update for: - python3.11-pycookiecheat-0.6.0: UPDATING ... - python3.11-pycookiecheat-0.6.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pycookiecheat 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath atkmm, using log file: /var/log/nixpkgs-update/atkmm/2024-04-29.log atkmm 0 -> 1 attrpath: atkmm Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - atkmm-2.28.4 Press Enter key to continue... Running update for: - atkmm-2.28.4: UPDATING ... - atkmm-2.28.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update atkmm 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.cchardet, using log file: /var/log/nixpkgs-update/python311Packages.cchardet/2024-04-29.log python311Packages.cchardet 0 -> 1 attrpath: python311Packages.cchardet Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Failed with exit code 1 Going to be running update for following packages: - python3.11-faust-cchardet-2.1.19 Press Enter key to continue... Running update for: - python3.11-faust-cchardet-2.1.19: UPDATING ... - python3.11-faust-cchardet-2.1.19: ERROR --- SHOWING ERROR LOG FOR python3.11-faust-cchardet-2.1.19 ---------------------- INFO:root:Updating packages... Traceback (most recent call last): File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 600, in main() File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 579, in main results = list(filter(bool, p.map(lambda pkg: _update(pkg, target), packages))) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/concurrent/futures/_base.py", line 619, in result_iterator yield _result_or_cancel(fs.pop()) ^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/concurrent/futures/_base.py", line 317, in _result_or_cancel return fut.result(timeout) ^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/concurrent/futures/_base.py", line 456, in result return self.__get_result() ^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/concurrent/futures/_base.py", line 401, in __get_result raise self._exception File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/concurrent/futures/thread.py", line 58, in run result = self.fn(*self.args, **self.kwargs) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 579, in results = list(filter(bool, p.map(lambda pkg: _update(pkg, target), packages))) ^^^^^^^^^^^^^^^^^^^^ File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 523, in _update return _update_package(path, target) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 434, in _update_package new_version, new_sha256, prefix = FETCHERS[fetcher]( ^^^^^^^^^^^^^^^^^^ File "/nix/store/wym8gffx2479nqq18gn17pgh9fkygkl6-update-python-libraries", line 298, in _get_latest_version_github response = subprocess.check_output(cmd) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/subprocess.py", line 466, in check_output return run(*popenargs, stdout=PIPE, timeout=timeout, check=True, ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/subprocess.py", line 548, in run with Popen(*popenargs, **kwargs) as process: ^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/subprocess.py", line 1026, in __init__ self._execute_child(args, executable, preexec_fn, close_fds, File "/nix/store/glfr70gi7hfaj50mwj2431p8bg60fhqw-python3-3.11.9/lib/python3.11/subprocess.py", line 1955, in _execute_child raise child_exception_type(errno_num, err_msg, err_filename) FileNotFoundError: [Errno 2] No such file or directory: 'nix-prefetch-git' --- SHOWING ERROR LOG FOR python3.11-faust-cchardet-2.1.19 ---------------------- The update script for python3.11-faust-cchardet-2.1.19 failed with exit code 1 [result] Failed to update python311Packages.cchardet 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.resize-right, using log file: /var/log/nixpkgs-update/python311Packages.resize-right/2024-04-29.log python311Packages.resize-right 0 -> 1 attrpath: python311Packages.resize-right Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-resize-right-0.0.2 Press Enter key to continue... Running update for: - python3.11-resize-right-0.0.2: UPDATING ... - python3.11-resize-right-0.0.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.resize-right 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rocksdb_6_23, using log file: /var/log/nixpkgs-update/rocksdb_6_23/2024-04-29.log rocksdb_6_23 6.23.3 -> 9.1.1 https://github.com/facebook/rocksdb/releases attrpath: rocksdb_6_23 Checking auto update branch... No auto update branch exists Version in attr path rocksdb_6_23 not compatible with 9.1.1 [result] Failed to update rocksdb_6_23 6.23.3 -> 9.1.1 https://github.com/facebook/rocksdb/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath getmail6, using log file: /var/log/nixpkgs-update/getmail6/2024-04-29.log getmail6 0 -> 1 attrpath: getmail6 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - getmail6-6.18.14 Press Enter key to continue... Running update for: - getmail6-6.18.14: UPDATING ... - getmail6-6.18.14: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update getmail6 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO @volth asked to not update xfce [result] Failed to update xfce.libxfce4ui 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath pantheon.wingpanel-indicator-a11y, using log file: /var/log/nixpkgs-update/pantheon.wingpanel-indicator-a11y/2024-04-29.log pantheon.wingpanel-indicator-a11y 0 -> 1 attrpath: pantheon.wingpanel-indicator-a11y Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - wingpanel-indicator-a11y-1.0.2 Press Enter key to continue... Running update for: - wingpanel-indicator-a11y-1.0.2: UPDATING ... - wingpanel-indicator-a11y-1.0.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update pantheon.wingpanel-indicator-a11y 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.routeros-api, using log file: /var/log/nixpkgs-update/python311Packages.routeros-api/2024-04-29.log python311Packages.routeros-api 0 -> 1 attrpath: python311Packages.routeros-api Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-routeros-api-0.17.0 Press Enter key to continue... Running update for: - python3.11-routeros-api-0.17.0: UPDATING ... - python3.11-routeros-api-0.17.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.routeros-api 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pylutron-caseta, using log file: /var/log/nixpkgs-update/python311Packages.pylutron-caseta/2024-04-29.log python311Packages.pylutron-caseta 0 -> 1 attrpath: python311Packages.pylutron-caseta Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pylutron-caseta-0.20.0 Press Enter key to continue... Running update for: - python3.11-pylutron-caseta-0.20.0: UPDATING ... - python3.11-pylutron-caseta-0.20.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pylutron-caseta 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.multiset, using log file: /var/log/nixpkgs-update/python311Packages.multiset/2024-04-29.log python311Packages.multiset 0 -> 1 attrpath: python311Packages.multiset Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-multiset-3.1.0 Press Enter key to continue... Running update for: - python3.11-multiset-3.1.0: UPDATING ... - python3.11-multiset-3.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.multiset 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath sqlite-web, using log file: /var/log/nixpkgs-update/sqlite-web/2024-04-29.log sqlite-web 0 -> 1 attrpath: sqlite-web Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - sqlite-web-0.6.3 Press Enter key to continue... Running update for: - sqlite-web-0.6.3: UPDATING ... - sqlite-web-0.6.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update sqlite-web 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.fontawesomefree, using log file: /var/log/nixpkgs-update/python311Packages.fontawesomefree/2024-04-29.log python311Packages.fontawesomefree 0 -> 1 attrpath: python311Packages.fontawesomefree Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-fontawesomefree-6.5.1 Press Enter key to continue... Running update for: - python3.11-fontawesomefree-6.5.1: UPDATING ... - python3.11-fontawesomefree-6.5.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.fontawesomefree 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath annextimelog, using log file: /var/log/nixpkgs-update/annextimelog/2024-04-29.log annextimelog 0 -> 1 attrpath: annextimelog Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - annextimelog-0.13.1 Press Enter key to continue... Running update for: - annextimelog-0.13.1: UPDATING ... - annextimelog-0.13.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update annextimelog 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.qiskit-ignis, using log file: /var/log/nixpkgs-update/python311Packages.qiskit-ignis/2024-04-29.log python311Packages.qiskit-ignis 0 -> 1 attrpath: python311Packages.qiskit-ignis Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-qiskit-ignis-0.7.1 Press Enter key to continue... Running update for: - python3.11-qiskit-ignis-0.7.1: UPDATING ... - python3.11-qiskit-ignis-0.7.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.qiskit-ignis 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath one_gadget, using log file: /var/log/nixpkgs-update/one_gadget/2024-04-29.log one_gadget 0 -> 1 attrpath: one_gadget Checking auto update branch... The derivation has no 'version' attribute, so do not know how to figure out the version while doing an updateScript update [result] Failed to update one_gadget 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.sphinxcontrib-excel-table, using log file: /var/log/nixpkgs-update/python311Packages.sphinxcontrib-excel-table/2024-04-29.log python311Packages.sphinxcontrib-excel-table 0 -> 1 attrpath: python311Packages.sphinxcontrib-excel-table Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-sphinxcontrib-excel-table-1.0.8 Press Enter key to continue... Running update for: - python3.11-sphinxcontrib-excel-table-1.0.8: UPDATING ... - python3.11-sphinxcontrib-excel-table-1.0.8: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.sphinxcontrib-excel-table 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pykulersky, using log file: /var/log/nixpkgs-update/python311Packages.pykulersky/2024-04-29.log python311Packages.pykulersky 0 -> 1 attrpath: python311Packages.pykulersky Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pykulersky-0.5.5 Press Enter key to continue... Running update for: - python3.11-pykulersky-0.5.5: UPDATING ... - python3.11-pykulersky-0.5.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pykulersky 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath protobuf, using log file: /var/log/nixpkgs-update/protobuf/2024-04-29.log protobuf 24.4 -> 26.1 https://github.com/protocolbuffers/protobuf/releases attrpath: protobuf Checking auto update branch... No auto update branch exists Old version 24.4" not present in master derivation file with contents: # The cmake version of this build is meant to enable both cmake and .pc being exported # this is important because grpc exports a .cmake file which also expects for protobuf # to have been exported through cmake as well. { lib , stdenv , abseil-cpp , buildPackages , cmake , fetchFromGitHub , fetchpatch , gtest , zlib , version , hash # downstream dependencies , python3 , grpc , enableShared ? !stdenv.hostPlatform.isStatic , ... }: stdenv.mkDerivation (finalAttrs: { pname = "protobuf"; inherit version; src = fetchFromGitHub { owner = "protocolbuffers"; repo = "protobuf"; rev = "v${version}"; inherit hash; }; postPatch = lib.optionalString stdenv.isDarwin '' substituteInPlace src/google/protobuf/testing/googletest.cc \ --replace 'tmpnam(b)' '"'$TMPDIR'/foo"' ''; patches = lib.optionals (lib.versionOlder version "22") [ # fix protobuf-targets.cmake installation paths, and allow for CMAKE_INSTALL_LIBDIR to be absolute # https://github.com/protocolbuffers/protobuf/pull/10090 (fetchpatch { url = "https://github.com/protocolbuffers/protobuf/commit/a7324f88e92bc16b57f3683403b6c993bf68070b.patch"; hash = "sha256-SmwaUjOjjZulg/wgNmR/F5b8rhYA2wkKAjHIOxjcQdQ="; }) ] ++ lib.optionals stdenv.hostPlatform.isStatic [ ./static-executables-have-no-rpath.patch ]; nativeBuildInputs = [ cmake ] ++ lib.optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ # protoc of the same version must be available for build. For non-cross builds, it's able to # re-use the executable generated as part of the build buildPackages."protobuf_${lib.versions.major version}" ]; buildInputs = [ gtest zlib ]; propagatedBuildInputs = [ abseil-cpp ]; strictDeps = true; cmakeDir = if lib.versionOlder version "22" then "../cmake" else null; cmakeFlags = [ "-Dprotobuf_USE_EXTERNAL_GTEST=ON" "-Dprotobuf_ABSL_PROVIDER=package" ] ++ lib.optionals enableShared [ "-Dprotobuf_BUILD_SHARED_LIBS=ON" ] # Tests fail to build on 32-bit platforms; fixed in 22.x # https://github.com/protocolbuffers/protobuf/issues/10418 ++ lib.optionals (stdenv.hostPlatform.is32bit && lib.versionOlder version "22") [ "-Dprotobuf_BUILD_TESTS=OFF" ]; # FIXME: investigate. 24.x and 23.x have different errors. # At least some of it is not reproduced on some other machine; example: # https://hydra.nixos.org/build/235677717/nixlog/4/tail # Also AnyTest.TestPackFromSerializationExceedsSizeLimit fails on 32-bit platforms # https://github.com/protocolbuffers/protobuf/issues/8460 doCheck = !(stdenv.isDarwin && lib.versionAtLeast version "23") && !stdenv.hostPlatform.is32bit; passthru = { tests = { pythonProtobuf = python3.pkgs.protobuf.override (_: { protobuf = finalAttrs.finalPackage; }); inherit grpc; }; inherit abseil-cpp; }; meta = { description = "Google's data interchange format"; longDescription = '' Protocol Buffers are a way of encoding structured data in an efficient yet extensible format. Google uses Protocol Buffers for almost all of its internal RPC protocols and file formats. ''; license = lib.licenses.bsd3; platforms = lib.platforms.all; homepage = "https://protobuf.dev/"; maintainers = with lib.maintainers; [ jonringer ]; mainProgram = "protoc"; }; }) [result] Failed to update protobuf 24.4 -> 26.1 https://github.com/protocolbuffers/protobuf/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gtk-frdp, using log file: /var/log/nixpkgs-update/gtk-frdp/2024-04-29.log gtk-frdp 0 -> 1 attrpath: gtk-frdp Checking auto update branch... Do not update GNOME during a release cycle [result] Failed to update gtk-frdp 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.fastnumbers, using log file: /var/log/nixpkgs-update/python311Packages.fastnumbers/2024-04-29.log python311Packages.fastnumbers 0 -> 1 attrpath: python311Packages.fastnumbers Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-fastnumbers-5.1.0 Press Enter key to continue... Running update for: - python3.11-fastnumbers-5.1.0: UPDATING ... - python3.11-fastnumbers-5.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.fastnumbers 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyixapi, using log file: /var/log/nixpkgs-update/python311Packages.pyixapi/2024-04-29.log python311Packages.pyixapi 0 -> 1 attrpath: python311Packages.pyixapi Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pyixapi-0.2.3 Press Enter key to continue... Running update for: - python3.11-pyixapi-0.2.3: UPDATING ... - python3.11-pyixapi-0.2.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyixapi 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath terraform-providers.postgresql, using log file: /var/log/nixpkgs-update/terraform-providers.postgresql/2024-04-29.log terraform-providers.postgresql 0 -> 1 attrpath: terraform-providers.postgresql Checking auto update branch... Derivation file opts-out of auto-updates [result] Failed to update terraform-providers.postgresql 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.fastrlock, using log file: /var/log/nixpkgs-update/python311Packages.fastrlock/2024-04-29.log python311Packages.fastrlock 0 -> 1 attrpath: python311Packages.fastrlock Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-fastrlock-0.8.2 Press Enter key to continue... Running update for: - python3.11-fastrlock-0.8.2: UPDATING ... - python3.11-fastrlock-0.8.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.fastrlock 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.wadllib, using log file: /var/log/nixpkgs-update/python311Packages.wadllib/2024-04-29.log python311Packages.wadllib 0 -> 1 attrpath: python311Packages.wadllib Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-wadllib-1.3.6 Press Enter key to continue... Running update for: - python3.11-wadllib-1.3.6: UPDATING ... - python3.11-wadllib-1.3.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.wadllib 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pytest-asyncio, using log file: /var/log/nixpkgs-update/python311Packages.pytest-asyncio/2024-04-29.log python311Packages.pytest-asyncio 0 -> 1 attrpath: python311Packages.pytest-asyncio Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pytest-asyncio-0.23.6 Press Enter key to continue... Running update for: - python3.11-pytest-asyncio-0.23.6: UPDATING ... - python3.11-pytest-asyncio-0.23.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pytest-asyncio 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.marshmallow-enum, using log file: /var/log/nixpkgs-update/python311Packages.marshmallow-enum/2024-04-29.log python311Packages.marshmallow-enum 0 -> 1 attrpath: python311Packages.marshmallow-enum Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-marshmallow-enum-1.5.1 Press Enter key to continue... Running update for: - python3.11-marshmallow-enum-1.5.1: UPDATING ... - python3.11-marshmallow-enum-1.5.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.marshmallow-enum 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gitg, using log file: /var/log/nixpkgs-update/gitg/2024-04-29.log gitg 0 -> 1 attrpath: gitg Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - gitg-44 Press Enter key to continue... Running update for: - gitg-44: UPDATING ... - gitg-44: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update gitg 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath paps, using log file: /var/log/nixpkgs-update/paps/2024-04-29.log paps 0.7.1 -> 0.8.0 https://github.com/dov/paps/releases attrpath: paps Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/tools/misc/paps/default.nix b/pkgs/tools/misc/paps/default.nix index ab9c9e433c68..4acc956d708a 100644 --- a/pkgs/tools/misc/paps/default.nix +++ b/pkgs/tools/misc/paps/default.nix @@ -3,13 +3,13 @@ stdenv.mkDerivation rec { pname = "paps"; - version = "0.7.1"; + version = "0.8.0"; src = fetchFromGitHub { owner = "dov"; repo = pname; rev = "v${version}"; - sha256 = "129wpm2ayxs6qfh2761d4x9c034ivb2bcmmcnl56qs4448qb9495"; + sha256 = "sha256-bNF/kZl/fGAT+He9kMHYj5ERhJwCJJABjhV3H+bs3D0="; }; nativeBuildInputs = [ autoconf automake pkg-config intltool ]; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A paps nix build failed. checking whether gcc understands -c and -o together... yes checking dependency style of gcc... gcc3 ./configure: line 5222: AX_COMPILER_FLAGS: command not found checking for stdio.h... yes checking for stdlib.h... yes checking for string.h... yes checking for inttypes.h... yes checking for stdint.h... yes checking for strings.h... yes checking for sys/stat.h... yes checking for sys/types.h... yes checking for unistd.h... yes checking for wchar.h... yes checking for minix/config.h... no checking whether it is safe to define __EXTENSIONS__... yes checking whether _XOPEN_SOURCE should be defined... no checking pkg-config is at least version 0.9.0... yes checking for PANGO... yes checking for FMT... no configure: error: Package requirements (fmt >= 6.0) were not met: No package 'fmt' found Consider adjusting the PKG_CONFIG_PATH environment variable if you installed software in a non-standard prefix. Alternatively, you may set the environment variables FMT_CFLAGS and FMT_LIBS to avoid the need to call pkg-config. See the pkg-config man page for more details. /nix/store/9wnvhjyxjykwn5y06xc9a2h8rs5fbfia-stdenv-linux/setup: line 131: pop_var_context: head of shell_variables not a function context [result] Failed to update paps 0.7.1 -> 0.8.0 https://github.com/dov/paps/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath git-aggregator, using log file: /var/log/nixpkgs-update/git-aggregator/2024-04-29.log git-aggregator 0 -> 1 attrpath: git-aggregator Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - git-aggregator-2.1.0 Press Enter key to continue... Running update for: - git-aggregator-2.1.0: UPDATING ... - git-aggregator-2.1.0: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/applications/version-management/git-aggregator/default.nix b/pkgs/applications/version-management/git-aggregator/default.nix index 34365cb5d90d..4694669cce4b 100644 --- a/pkgs/applications/version-management/git-aggregator/default.nix +++ b/pkgs/applications/version-management/git-aggregator/default.nix @@ -2,11 +2,11 @@ python3Packages.buildPythonApplication rec { pname = "git-aggregator"; - version = "2.1.0"; + version = "4.0"; src = fetchPypi { inherit pname version; - sha256 = "sha256-79xNPzYP1j71sU5wZM5e2xTqQExqQEdxXPxbk4T/Scw="; + sha256 = "sha256-g31wsNW+mazyC9lA2nwItnEJ8ARrhX/xI60EiWBRVZg="; }; nativeBuildInputs = with python3Packages; [ No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A git-aggregator Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix --extra-experimental-features nix-command log -f . git-aggregator Standard output: error: build log of 'git-aggregator' is not available [result] Failed to update git-aggregator 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.reactivex, using log file: /var/log/nixpkgs-update/python311Packages.reactivex/2024-04-29.log python311Packages.reactivex 0 -> 1 attrpath: python311Packages.reactivex Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-reactivex-4.0.4 Press Enter key to continue... Running update for: - python3.11-reactivex-4.0.4: UPDATING ... - python3.11-reactivex-4.0.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.reactivex 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.aws-encryption-sdk, using log file: /var/log/nixpkgs-update/python311Packages.aws-encryption-sdk/2024-04-29.log python311Packages.aws-encryption-sdk 0 -> 1 attrpath: python311Packages.aws-encryption-sdk Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-aws-encryption-sdk-3.2.0 Press Enter key to continue... Running update for: - python3.11-aws-encryption-sdk-3.2.0: UPDATING ... - python3.11-aws-encryption-sdk-3.2.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.aws-encryption-sdk 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pydantic, using log file: /var/log/nixpkgs-update/python311Packages.pydantic/2024-04-29.log python311Packages.pydantic 0 -> 1 attrpath: python311Packages.pydantic Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pydantic-2.6.3 Press Enter key to continue... Running update for: - python3.11-pydantic-2.6.3: UPDATING ... - python3.11-pydantic-2.6.3: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/python-modules/pydantic/default.nix b/pkgs/development/python-modules/pydantic/default.nix index 59ec82ce829b..ed7a26731990 100644 --- a/pkgs/development/python-modules/pydantic/default.nix +++ b/pkgs/development/python-modules/pydantic/default.nix @@ -28,7 +28,7 @@ buildPythonPackage rec { pname = "pydantic"; - version = "2.6.3"; + version = "2.7.1"; pyproject = true; disabled = pythonOlder "3.8"; @@ -37,7 +37,7 @@ buildPythonPackage rec { owner = "pydantic"; repo = "pydantic"; rev = "refs/tags/v${version}"; - hash = "sha256-neTdG/IcXopCmevzFY5/XDlhPHmOb6dhyAnzaobmeG8="; + hash = "sha256-qeqcm1dAZ4bzZB/GmGevs3d0mPj47/+9YH3oNui0ElI="; }; patches = [ No auto update branch exists [outpaths] eval start [outpaths] eval end Python package with too many package rebuilds 4832 > 100 [result] Failed to update python311Packages.pydantic 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.bbox, using log file: /var/log/nixpkgs-update/python311Packages.bbox/2024-04-29.log python311Packages.bbox 0 -> 1 attrpath: python311Packages.bbox Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-bbox-0.9.4 Press Enter key to continue... Running update for: - python3.11-bbox-0.9.4: UPDATING ... - python3.11-bbox-0.9.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.bbox 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.python-registry, using log file: /var/log/nixpkgs-update/python311Packages.python-registry/2024-04-29.log python311Packages.python-registry 0 -> 1 attrpath: python311Packages.python-registry Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-python-registry-1.4 Press Enter key to continue... Running update for: - python3.11-python-registry-1.4: UPDATING ... - python3.11-python-registry-1.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.python-registry 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.purl, using log file: /var/log/nixpkgs-update/python311Packages.purl/2024-04-29.log python311Packages.purl 0 -> 1 attrpath: python311Packages.purl Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-purl-1.6 Press Enter key to continue... Running update for: - python3.11-purl-1.6: UPDATING ... - python3.11-purl-1.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.purl 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.para, using log file: /var/log/nixpkgs-update/python311Packages.para/2024-04-29.log python311Packages.para 0 -> 1 attrpath: python311Packages.para Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-para-0.0.8 Press Enter key to continue... Running update for: - python3.11-para-0.0.8: UPDATING ... - python3.11-para-0.0.8: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.para 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.bluetooth-data-tools, using log file: /var/log/nixpkgs-update/python311Packages.bluetooth-data-tools/2024-04-29.log python311Packages.bluetooth-data-tools 0 -> 1 attrpath: python311Packages.bluetooth-data-tools Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-bluetooth-data-tools-1.19.0 Press Enter key to continue... Running update for: - python3.11-bluetooth-data-tools-1.19.0: UPDATING ... - python3.11-bluetooth-data-tools-1.19.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.bluetooth-data-tools 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.azure-mgmt-devspaces, using log file: /var/log/nixpkgs-update/python311Packages.azure-mgmt-devspaces/2024-04-29.log python311Packages.azure-mgmt-devspaces 0 -> 1 attrpath: python311Packages.azure-mgmt-devspaces Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-azure-mgmt-devspaces-0.2.0 Press Enter key to continue... Running update for: - python3.11-azure-mgmt-devspaces-0.2.0: UPDATING ... - python3.11-azure-mgmt-devspaces-0.2.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.azure-mgmt-devspaces 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.mike, using log file: /var/log/nixpkgs-update/python311Packages.mike/2024-04-29.log python311Packages.mike 0 -> 1 attrpath: python311Packages.mike Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-mike-unstable-2023-05-06 Press Enter key to continue... Running update for: - python3.11-mike-unstable-2023-05-06: UPDATING ... - python3.11-mike-unstable-2023-05-06: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.mike 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.herepy, using log file: /var/log/nixpkgs-update/python311Packages.herepy/2024-04-29.log python311Packages.herepy 0 -> 1 attrpath: python311Packages.herepy Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-herepy-3.6.2 Press Enter key to continue... Running update for: - python3.11-herepy-3.6.2: UPDATING ... - python3.11-herepy-3.6.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.herepy 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.sphinxcontrib-bayesnet, using log file: /var/log/nixpkgs-update/python311Packages.sphinxcontrib-bayesnet/2024-04-29.log python311Packages.sphinxcontrib-bayesnet 0 -> 1 attrpath: python311Packages.sphinxcontrib-bayesnet Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-sphinxcontrib-bayesnet-0.4 Press Enter key to continue... Running update for: - python3.11-sphinxcontrib-bayesnet-0.4: UPDATING ... - python3.11-sphinxcontrib-bayesnet-0.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.sphinxcontrib-bayesnet 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.preggy, using log file: /var/log/nixpkgs-update/python311Packages.preggy/2024-04-29.log python311Packages.preggy 0 -> 1 attrpath: python311Packages.preggy Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-preggy-1.4.4 Press Enter key to continue... Running update for: - python3.11-preggy-1.4.4: UPDATING ... - python3.11-preggy-1.4.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.preggy 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.enamlx, using log file: /var/log/nixpkgs-update/python311Packages.enamlx/2024-04-29.log python311Packages.enamlx 0 -> 1 attrpath: python311Packages.enamlx Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-enamlx-0.6.4 Press Enter key to continue... Running update for: - python3.11-enamlx-0.6.4: UPDATING ... - python3.11-enamlx-0.6.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.enamlx 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.structlog, using log file: /var/log/nixpkgs-update/python311Packages.structlog/2024-04-29.log python311Packages.structlog 0 -> 1 attrpath: python311Packages.structlog Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-structlog-24.1.0 Press Enter key to continue... Running update for: - python3.11-structlog-24.1.0: UPDATING ... - python3.11-structlog-24.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.structlog 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath frida-tools, using log file: /var/log/nixpkgs-update/frida-tools/2024-04-29.log frida-tools 0 -> 1 attrpath: frida-tools Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - frida-tools-12.3.0 Press Enter key to continue... Running update for: - frida-tools-12.3.0: UPDATING ... - frida-tools-12.3.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update frida-tools 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath keka, using log file: /var/log/nixpkgs-update/keka/2024-04-29.log keka 1.3.2 -> 1.3.8 https://github.com/aonez/Keka/releases attrpath: keka Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/tools/compression/keka/default.nix b/pkgs/tools/compression/keka/default.nix index 71e979fa0c20..12cf86a669a9 100644 --- a/pkgs/tools/compression/keka/default.nix +++ b/pkgs/tools/compression/keka/default.nix @@ -6,11 +6,11 @@ }: stdenvNoCC.mkDerivation (finalAttrs: { pname = "keka"; - version = "1.3.2"; + version = "1.3.8"; src = fetchurl { url = "https://github.com/aonez/Keka/releases/download/v${finalAttrs.version}/Keka-${finalAttrs.version}.zip"; - sha256 = "0id8j639kba5yc0z34lgvadzgv9z9s2573nn6dx9m6gd8qpnk2x7"; + sha256 = "sha256-q3IPC7ZWWXr9CobxU0E/Rdmv2RIxlQ1qaVARRt1+QWI="; }; dontUnpack = true; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A keka Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix --extra-experimental-features nix-command log -f . keka Standard output: error: … in the condition of the assert statement at /var/cache/nixpkgs-update/worker/worktree/keka/lib/customisation.nix:365:17: 364| in commonAttrs // { 365| drvPath = assert condition; drv.drvPath; | ^ 366| outPath = assert condition; drv.outPath; … while evaluating the attribute 'handled' at /var/cache/nixpkgs-update/worker/worktree/keka/pkgs/stdenv/generic/check-meta.nix:507:7: 506| # or, alternatively, just output a warning message. 507| handled = | ^ 508| ( (stack trace truncated; use '--show-trace' to show the full trace) error: Package ‘keka-1.3.8’ in /var/cache/nixpkgs-update/worker/worktree/keka/pkgs/tools/compression/keka/default.nix:31 has an unfree license (‘unfree’), refusing to evaluate. a) To temporarily allow unfree packages, you can use an environment variable for a single invocation of the nix tools. $ export NIXPKGS_ALLOW_UNFREE=1 Note: When using `nix shell`, `nix build`, `nix develop`, etc with a flake, then pass `--impure` in order to allow use of environment variables. b) For `nixos-rebuild` you can set { nixpkgs.config.allowUnfree = true; } in configuration.nix to override this. Alternatively you can configure a predicate to allow specific packages: { nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) [ "keka" ]; } c) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add { allowUnfree = true; } to ~/.config/nixpkgs/config.nix. [result] Failed to update keka 1.3.2 -> 1.3.8 https://github.com/aonez/Keka/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath kodiPackages.inputstream-adaptive, using log file: /var/log/nixpkgs-update/kodiPackages.inputstream-adaptive/2024-04-29.log kodiPackages.inputstream-adaptive 21.4.4 -> 21.4.5-Omega https://github.com/xbmc/inputstream.adaptive/releases attrpath: kodiPackages.inputstream-adaptive Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript The diff was empty after rewrites. [result] Failed to update kodiPackages.inputstream-adaptive 21.4.4 -> 21.4.5-Omega https://github.com/xbmc/inputstream.adaptive/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lomiri.lomiri-url-dispatcher, using log file: /var/log/nixpkgs-update/lomiri.lomiri-url-dispatcher/2024-04-29.log lomiri.lomiri-url-dispatcher 0 -> 1 attrpath: lomiri.lomiri-url-dispatcher Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - lomiri-url-dispatcher-0.1.3 Press Enter key to continue... Running update for: - lomiri-url-dispatcher-0.1.3: UPDATING ... - lomiri-url-dispatcher-0.1.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update lomiri.lomiri-url-dispatcher 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.python3-openid, using log file: /var/log/nixpkgs-update/python311Packages.python3-openid/2024-04-29.log python311Packages.python3-openid 0 -> 1 attrpath: python311Packages.python3-openid Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-python3-openid-3.2.0 Press Enter key to continue... Running update for: - python3.11-python3-openid-3.2.0: UPDATING ... - python3.11-python3-openid-3.2.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.python3-openid 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.ufmt, using log file: /var/log/nixpkgs-update/python311Packages.ufmt/2024-04-29.log python311Packages.ufmt 0 -> 1 attrpath: python311Packages.ufmt Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-ufmt-2.1.0 Press Enter key to continue... Running update for: - python3.11-ufmt-2.1.0: UPDATING ... - python3.11-ufmt-2.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.ufmt 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.aiosasl, using log file: /var/log/nixpkgs-update/python311Packages.aiosasl/2024-04-29.log python311Packages.aiosasl 0 -> 1 attrpath: python311Packages.aiosasl Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-aiosasl-0.5.0 Press Enter key to continue... Running update for: - python3.11-aiosasl-0.5.0: UPDATING ... - python3.11-aiosasl-0.5.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.aiosasl 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.jsonrpc-websocket, using log file: /var/log/nixpkgs-update/python311Packages.jsonrpc-websocket/2024-04-29.log python311Packages.jsonrpc-websocket 0 -> 1 attrpath: python311Packages.jsonrpc-websocket Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-jsonrpc-websocket-3.1.5 Press Enter key to continue... Running update for: - python3.11-jsonrpc-websocket-3.1.5: UPDATING ... - python3.11-jsonrpc-websocket-3.1.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.jsonrpc-websocket 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.aionotion, using log file: /var/log/nixpkgs-update/python311Packages.aionotion/2024-04-29.log python311Packages.aionotion 0 -> 1 attrpath: python311Packages.aionotion Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-aionotion-2024.03.0 Press Enter key to continue... Running update for: - python3.11-aionotion-2024.03.0: UPDATING ... - python3.11-aionotion-2024.03.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.aionotion 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath grpc-tools, using log file: /var/log/nixpkgs-update/grpc-tools/2024-04-29.log grpc-tools 0 -> 1 attrpath: grpc-tools Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - grpc-tools-1.12.4 Press Enter key to continue... Running update for: - grpc-tools-1.12.4: UPDATING ... - grpc-tools-1.12.4: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update grpc-tools 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath kakoune-lsp, using log file: /var/log/nixpkgs-update/kakoune-lsp/2024-04-29.log kakoune-lsp 16.0.0 -> 17.0.1 https://github.com/kakoune-lsp/kakoune-lsp/releases attrpath: kakoune-lsp Checking auto update branch... No auto update branch exists There might already be an open PR for this update: - kakoune-lsp: 16.0.0 -> 17.0.1 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/302761" [result] Failed to update kakoune-lsp 16.0.0 -> 17.0.1 https://github.com/kakoune-lsp/kakoune-lsp/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.seatconnect, using log file: /var/log/nixpkgs-update/python311Packages.seatconnect/2024-04-29.log python311Packages.seatconnect 0 -> 1 attrpath: python311Packages.seatconnect Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-seatconnect-1.1.9 Press Enter key to continue... Running update for: - python3.11-seatconnect-1.1.9: UPDATING ... - python3.11-seatconnect-1.1.9: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.seatconnect 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.aioprometheus, using log file: /var/log/nixpkgs-update/python311Packages.aioprometheus/2024-04-29.log python311Packages.aioprometheus 0 -> 1 attrpath: python311Packages.aioprometheus Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-aioprometheus-unstable-2023-03-14 Press Enter key to continue... Running update for: - python3.11-aioprometheus-unstable-2023-03-14: UPDATING ... - python3.11-aioprometheus-unstable-2023-03-14: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.aioprometheus 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.pyopengl, using log file: /var/log/nixpkgs-update/python311Packages.pyopengl/2024-04-29.log python311Packages.pyopengl 0 -> 1 attrpath: python311Packages.pyopengl Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-pyopengl-3.1.7 Press Enter key to continue... Running update for: - python3.11-pyopengl-3.1.7: UPDATING ... - python3.11-pyopengl-3.1.7: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.pyopengl 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath crystal_1_9, using log file: /var/log/nixpkgs-update/crystal_1_9/2024-04-29.log crystal_1_9 1.9.2 -> 1.12.1 https://github.com/crystal-lang/crystal/releases attrpath: crystal_1_9 Checking auto update branch... No auto update branch exists Version in attr path crystal_1_9 not compatible with 1.12.1 [result] Failed to update crystal_1_9 1.9.2 -> 1.12.1 https://github.com/crystal-lang/crystal/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath php81Extensions.grpc, using log file: /var/log/nixpkgs-update/php81Extensions.grpc/2024-04-29.log php81Extensions.grpc 0 -> 1 attrpath: php81Extensions.grpc Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - php-grpc-1.62.1 Press Enter key to continue... Running update for: - php-grpc-1.62.1: UPDATING ... - php-grpc-1.62.1: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update php81Extensions.grpc 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath nbd, using log file: /var/log/nixpkgs-update/nbd/2024-04-29.log nbd 3.25 -> 3.26.1 https://github.com/NetworkBlockDevice/nbd/releases attrpath: nbd Checking auto update branch... No auto update branch exists There might already be an open PR for this update: - nbd: 3.25 -> 3.26.1 URL "https://api.github.com/repos/NixOS/nixpkgs/issues/294758" [result] Failed to update nbd 3.25 -> 3.26.1 https://github.com/NetworkBlockDevice/nbd/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath coolercontrol.coolercontrol-liqctld, using log file: /var/log/nixpkgs-update/coolercontrol.coolercontrol-liqctld/2024-04-29.log coolercontrol.coolercontrol-liqctld 0 -> 1 attrpath: coolercontrol.coolercontrol-liqctld Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - coolercontrol-liqctld-1.2.2 Press Enter key to continue... Running update for: - coolercontrol-liqctld-1.2.2: UPDATING ... - coolercontrol-liqctld-1.2.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update coolercontrol.coolercontrol-liqctld 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.thttp, using log file: /var/log/nixpkgs-update/python311Packages.thttp/2024-04-29.log python311Packages.thttp 0 -> 1 attrpath: python311Packages.thttp Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-thttp-1.3.0 Press Enter key to continue... Running update for: - python3.11-thttp-1.3.0: UPDATING ... - python3.11-thttp-1.3.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.thttp 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO @volth asked to not update xfce [result] Failed to update xfce.xfce4-panel 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.adblock, using log file: /var/log/nixpkgs-update/python311Packages.adblock/2024-04-29.log python311Packages.adblock 0 -> 1 attrpath: python311Packages.adblock Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-adblock-0.6.0 Press Enter key to continue... Running update for: - python3.11-adblock-0.6.0: UPDATING ... - python3.11-adblock-0.6.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.adblock 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.easydict, using log file: /var/log/nixpkgs-update/python311Packages.easydict/2024-04-29.log python311Packages.easydict 0 -> 1 attrpath: python311Packages.easydict Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-easydict-1.13 Press Enter key to continue... Running update for: - python3.11-easydict-1.13: UPDATING ... - python3.11-easydict-1.13: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.easydict 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.amberelectric, using log file: /var/log/nixpkgs-update/python311Packages.amberelectric/2024-04-29.log python311Packages.amberelectric 0 -> 1 attrpath: python311Packages.amberelectric Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-amberelectric-1.1.0 Press Enter key to continue... Running update for: - python3.11-amberelectric-1.1.0: UPDATING ... - python3.11-amberelectric-1.1.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.amberelectric 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath fastfetch, using log file: /var/log/nixpkgs-update/fastfetch/2024-04-29.log fastfetch 0 -> 1 attrpath: fastfetch Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - fastfetch-2.9.2 Press Enter key to continue... Running update for: - fastfetch-2.9.2: UPDATING ... - fastfetch-2.9.2: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/by-name/fa/fastfetch/package.nix b/pkgs/by-name/fa/fastfetch/package.nix index b8344d0bfaee..9bb0fd4919ea 100644 --- a/pkgs/by-name/fa/fastfetch/package.nix +++ b/pkgs/by-name/fa/fastfetch/package.nix @@ -46,13 +46,13 @@ let in stdenv'.mkDerivation (finalAttrs: { pname = "fastfetch"; - version = "2.9.2"; + version = "2.10.2"; src = fetchFromGitHub { owner = "fastfetch-cli"; repo = "fastfetch"; rev = finalAttrs.version; - hash = "sha256-SEt/qw8ixlgRY2+fqyCmhqzLVoAw/BMl//JqQxbuB0s="; + hash = "sha256-1ok2HR9RapS+MF8zuNLhzMZMz0F2AQsKsxNqCT7QF/8="; }; outputs = [ "out" "man" ]; No auto update branch exists [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/dqa7v5kdsi8yqbk12cs4kph1wsprdw3c-fastfetch-2.10.2" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
2 packages built:
  • fastfetch
  • fastfetch.man
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from passthru.updateScript. meta.description for fastfetch is: Like neofetch, but much faster because written in C meta.homepage for fastfetch is: https://github.com/fastfetch-cli/fastfetch ###### Updates performed - Ran passthru.UpdateScript ###### To inspect upstream changes - [Release on GitHub](https://github.com/fastfetch-cli/fastfetch/releases/tag/2.10.2) - [Compare changes on GitHub](https://github.com/fastfetch-cli/fastfetch/compare/2.9.2...2.10.2) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 2.10.2 with grep in /nix/store/dqa7v5kdsi8yqbk12cs4kph1wsprdw3c-fastfetch-2.10.2 - found 2.10.2 in filename of file in /nix/store/dqa7v5kdsi8yqbk12cs4kph1wsprdw3c-fastfetch-2.10.2 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath fastfetch ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/dqa7v5kdsi8yqbk12cs4kph1wsprdw3c-fastfetch-2.10.2 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A fastfetch https://github.com/r-ryantm/nixpkgs/archive/6b44d00844281979e75e00a85c10e34f051da8be.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/6b44d00844281979e75e00a85c10e34f051da8be#fastfetch ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/dqa7v5kdsi8yqbk12cs4kph1wsprdw3c-fastfetch-2.10.2 ls -la /nix/store/dqa7v5kdsi8yqbk12cs4kph1wsprdw3c-fastfetch-2.10.2/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
2 packages built:
  • fastfetch
  • fastfetch.man
--- ###### Maintainer pings cc @Gerg-L @khaneliman for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307810 [result] Success updating fastfetch 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath scala-cli, using log file: /var/log/nixpkgs-update/scala-cli/2024-04-29.log scala-cli 0 -> 1 attrpath: scala-cli Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - scala-cli-1.2.2 Press Enter key to continue... Running update for: - scala-cli-1.2.2: UPDATING ... - scala-cli-1.2.2: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/tools/build-managers/scala-cli/sources.json b/pkgs/development/tools/build-managers/scala-cli/sources.json index b3bf504901d5..e07a11c40d74 100644 --- a/pkgs/development/tools/build-managers/scala-cli/sources.json +++ b/pkgs/development/tools/build-managers/scala-cli/sources.json @@ -1,21 +1,21 @@ { - "version": "1.2.2", + "version": "1.3.0", "assets": { "aarch64-darwin": { "asset": "scala-cli-aarch64-apple-darwin.gz", - "sha256": "103qjwh3lcckbillx9q5pi0s10xp65vygrwlzhnqbczcxrlsa3d1" + "sha256": "140klmqcv8cjnznsn35vba7mgmifrp9p776n39m689hkprzz474w" }, "aarch64-linux": { "asset": "scala-cli-aarch64-pc-linux.gz", - "sha256": "0nnv4b2rlnczhxa46n7cif5pxhqj5djzc1063r37z225wxs6lcqm" + "sha256": "1vxq4j2slrdvxzq0chm8nggdrrj3fdb7q1qqbhf83vlirgrf9da1" }, "x86_64-darwin": { "asset": "scala-cli-x86_64-apple-darwin.gz", - "sha256": "09iizd55k53wpg13yfm2xr2waan9qdkfn5x5v2f5rr1v4l3cj90i" + "sha256": "0df8jilv5hzka9xhwhhgq7imw4xik2ybdzh318ka77rwd58wy5yy" }, "x86_64-linux": { "asset": "scala-cli-x86_64-pc-linux.gz", - "sha256": "0jgclzd0b36adj187c9qa2y7mkgwpzb1wy5apssdm49ng6b92lbs" + "sha256": "0rw40xqchw3s07acyn2n35z0nlf7fyrvyixhl41wf28q999kbxwn" } } } No auto update branch exists [outpaths] eval start [outpaths] eval end Successfully finished processing cachix "/nix/store/k99lr0rcmhj0s7nx4d85w5qi5cy8ibdi-scala-cli-1.3.0" [check][nixpkgs-review] Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • scala-cli
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from passthru.updateScript. meta.description for scala-cli is: Command-line tool to interact with the Scala language meta.homepage for scala-cli is: https://scala-cli.virtuslab.org ###### Updates performed - Ran passthru.UpdateScript ###### To inspect upstream changes - [Release on GitHub](https://github.com/VirtusLab/scala-cli/releases/tag/v1.3.0) - [Compare changes on GitHub](https://github.com/Virtuslab/scala-cli/compare/v1.2.2...v1.3.0) ###### Impact Checks done --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 1.3.0 with grep in /nix/store/k99lr0rcmhj0s7nx4d85w5qi5cy8ibdi-scala-cli-1.3.0 - found 1.3.0 in filename of file in /nix/store/k99lr0rcmhj0s7nx4d85w5qi5cy8ibdi-scala-cli-1.3.0 ---
Rebuild report (if merged into master) (click to expand) ``` 2 total rebuild path(s) 2 package rebuild(s) First fifty rebuilds by attrpath scala-cli ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/k99lr0rcmhj0s7nx4d85w5qi5cy8ibdi-scala-cli-1.3.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A scala-cli https://github.com/r-ryantm/nixpkgs/archive/00f4dcf5224cf4e050ec02d04b51a8ca342bc227.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/00f4dcf5224cf4e050ec02d04b51a8ca342bc227#scala-cli ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/k99lr0rcmhj0s7nx4d85w5qi5cy8ibdi-scala-cli-1.3.0 ls -la /nix/store/k99lr0rcmhj0s7nx4d85w5qi5cy8ibdi-scala-cli-1.3.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
  • scala-cli
--- ###### Maintainer pings cc @kubukoz for [testing](https://github.com/ryantm/nixpkgs-update/blob/main/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/307814 [result] Success updating scala-cli 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.celery, using log file: /var/log/nixpkgs-update/python312Packages.celery/2024-04-29.log python312Packages.celery 5.3.6 -> 5.4.0 https://github.com/celery/celery/releases attrpath: python312Packages.celery isn't the default python version [result] Failed to update python312Packages.celery 5.3.6 -> 5.4.0 https://github.com/celery/celery/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.sopel, using log file: /var/log/nixpkgs-update/python311Packages.sopel/2024-04-29.log python311Packages.sopel 0 -> 1 attrpath: python311Packages.sopel Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-sopel-7.1.9 Press Enter key to continue... Running update for: - python3.11-sopel-7.1.9: UPDATING ... - python3.11-sopel-7.1.9: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.sopel 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath gnome.gnome-session, using log file: /var/log/nixpkgs-update/gnome.gnome-session/2024-04-29.log gnome.gnome-session 0 -> 1 attrpath: gnome.gnome-session Checking auto update branch... Do not update GNOME during a release cycle [result] Failed to update gnome.gnome-session 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath luau, using log file: /var/log/nixpkgs-update/luau/2024-04-29.log luau 0 -> 1 attrpath: luau Packages for lua are currently skipped. https://github.com/NixOS/nixpkgs/pull/37501#issuecomment-375169646 [result] Failed to update luau 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.lingua, using log file: /var/log/nixpkgs-update/python311Packages.lingua/2024-04-29.log python311Packages.lingua 0 -> 1 attrpath: python311Packages.lingua Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-lingua-4.15.0 Press Enter key to continue... Running update for: - python3.11-lingua-4.15.0: UPDATING ... - python3.11-lingua-4.15.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.lingua 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.sip4, using log file: /var/log/nixpkgs-update/python311Packages.sip4/2024-04-29.log python311Packages.sip4 0 -> 1 attrpath: python311Packages.sip4 Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-sip-4.19.25 Press Enter key to continue... Running update for: - python3.11-sip-4.19.25: UPDATING ... - python3.11-sip-4.19.25: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.sip4 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath graalvmCEPackages.graalnodejs, using log file: /var/log/nixpkgs-update/graalvmCEPackages.graalnodejs/2024-04-29.log graalvmCEPackages.graalnodejs 0 -> 1 attrpath: graalvmCEPackages.graalnodejs Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Failed with exit code 1 Going to be running update for following packages: - nodejs-installable-svm-23.1.0 Press Enter key to continue... Running update for: - nodejs-installable-svm-23.1.0: UPDATING ... - nodejs-installable-svm-23.1.0: ERROR --- SHOWING ERROR LOG FOR nodejs-installable-svm-23.1.0 ---------------------- error: attribute 'nodejs-installable-svm' in selection path 'graalvmCEPackages.nodejs-installable-svm.version' not found --- SHOWING ERROR LOG FOR nodejs-installable-svm-23.1.0 ---------------------- The update script for nodejs-installable-svm-23.1.0 failed with exit code 1 [result] Failed to update graalvmCEPackages.graalnodejs 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath jfrog-cli, using log file: /var/log/nixpkgs-update/jfrog-cli/2024-04-29.log jfrog-cli 0 -> 1 attrpath: jfrog-cli Checking auto update branch... [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] skipping because derivation has updateScript [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - jfrog-cli-2.56.0 Press Enter key to continue... Running update for: - jfrog-cli-2.56.0: UPDATING ... - jfrog-cli-2.56.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update jfrog-cli 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath sogo, using log file: /var/log/nixpkgs-update/sogo/2024-04-29.log sogo 5.9.1 -> 5.10.0 https://github.com/inverse-inc/SOGo/releases attrpath: sogo Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript Diff after rewrites: diff --git a/pkgs/servers/web-apps/sogo/default.nix b/pkgs/servers/web-apps/sogo/default.nix index ab617dc291b2..41934cab4e2d 100644 --- a/pkgs/servers/web-apps/sogo/default.nix +++ b/pkgs/servers/web-apps/sogo/default.nix @@ -5,14 +5,14 @@ , libwbxml }: gnustep.stdenv.mkDerivation rec { pname = "SOGo"; - version = "5.9.1"; + version = "5.10.0"; # always update the sope package as well, when updating sogo src = fetchFromGitHub { owner = "inverse-inc"; repo = pname; rev = "SOGo-${version}"; - hash = "sha256-b6BZZ61wY0Akt1Q6+Bq6JXAx/67MwBNbzHr3sB0NuRg="; + hash = "sha256-ZmpOI1zk/TkRNFmwTXugVb9IvxYSP4LgNrApSytdI7s="; }; nativeBuildInputs = [ gnustep.make makeWrapper python3 pkg-config ]; [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A sogo nix build failed. SOGoToolUpdateSecret.m:251:52: warning: instance method '-encryptAES256GCM:exception:' not found (return type defaults to 'id') [-Wobjc-method-access] 251 | encryptedPassword = [decryptedPassword encryptAES256GCM: newSecret exception:&exception]; |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /nix/store/0iaw320zhyxnc8rzvzgsi3pj73k8ig0f-gnustep-base-1.29.0-dev/include/Foundation/NSString.h:475:12: note: receiver is instance of class declared here 475 | @interface NSString :NSObject  |  ^ SOGoToolUpdateSecret.m:260:22: warning: 'NSDictionary' may not respond to 'setObject:forKey:' 260 | [account setObject: encryptedPassword forKey: @"password"]; |  ~~~~~~~ ^ SOGoToolUpdateSecret.m:270:3: error: void method 'updateSecretFromEncryptedData:oldSecret:' should not return a value [-Wreturn-type] 270 | return rc; |  ^ ~~ SOGoToolUpdateSecret.m:312:37: warning: instance method '-decryptAES256GCM:iv:tag:exception:' not found (return type defaults to 'id') [-Wobjc-method-access] 312 | newPassword = [password decryptAES256GCM: oldSecret iv: iv tag: tag exception:&exception]; |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /nix/store/0iaw320zhyxnc8rzvzgsi3pj73k8ig0f-gnustep-base-1.29.0-dev/include/Foundation/NSString.h:475:12: note: receiver is instance of class declared here 475 | @interface NSString :NSObject  |  ^ SOGoToolUpdateSecret.m:316:24: warning: 'NSDictionary' may not respond to 'setObject:forKey:' 316 | [account setObject: newPassword forKey: @"password"]; |  ~~~~~~~ ^ SOGoToolUpdateSecret.m:390:12: warning: unused variable 'i' [-Wunused-variable] 390 | int max, i; |  ^ 14 warnings and 1 error generated. make[4]: *** [/nix/store/1an7dr36myi1l003yp6vr53jyzvxrr9h-gnustep-make-2.9.1/share/GNUstep/Makefiles/rules.make:521: obj/sogo-tool.obj/SOGoToolUpdateSecret.m.o] Error 1 make[3]: *** [/nix/store/1an7dr36myi1l003yp6vr53jyzvxrr9h-gnustep-make-2.9.1/share/GNUstep/Makefiles/Instance/tool.make:74: internal-tool-all_] Error 2 make[2]: *** [/nix/store/1an7dr36myi1l003yp6vr53jyzvxrr9h-gnustep-make-2.9.1/share/GNUstep/Makefiles/Master/rules.make:297: sogo-tool.all.tool.variables] Error 2 make[1]: *** [/nix/store/1an7dr36myi1l003yp6vr53jyzvxrr9h-gnustep-make-2.9.1/share/GNUstep/Makefiles/Master/tool.make:71: internal-all] Error 2 make: *** [/nix/store/1an7dr36myi1l003yp6vr53jyzvxrr9h-gnustep-make-2.9.1/share/GNUstep/Makefiles/Master/serial-subdirectories.make:53: internal-all] Error 2 [result] Failed to update sogo 5.9.1 -> 5.10.0 https://github.com/inverse-inc/SOGo/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.snakeviz, using log file: /var/log/nixpkgs-update/python311Packages.snakeviz/2024-04-29.log python311Packages.snakeviz 0 -> 1 attrpath: python311Packages.snakeviz Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-snakeviz-2.2.0 Press Enter key to continue... Running update for: - python3.11-snakeviz-2.2.0: UPDATING ... - python3.11-snakeviz-2.2.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.snakeviz 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath cddl, using log file: /var/log/nixpkgs-update/cddl/2024-04-29.log cddl 0 -> 1 attrpath: cddl Checking auto update branch... The derivation has no 'version' attribute, so do not know how to figure out the version while doing an updateScript update [result] Failed to update cddl 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.google-cloud-storage, using log file: /var/log/nixpkgs-update/python311Packages.google-cloud-storage/2024-04-29.log python311Packages.google-cloud-storage 0 -> 1 attrpath: python311Packages.google-cloud-storage Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-google-cloud-storage-2.16.0 Press Enter key to continue... Running update for: - python3.11-google-cloud-storage-2.16.0: UPDATING ... - python3.11-google-cloud-storage-2.16.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.google-cloud-storage 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath tsduck, using log file: /var/log/nixpkgs-update/tsduck/2024-04-29.log tsduck 3.31-2761 -> 3.37-3670 https://github.com/tsduck/tsduck/releases attrpath: tsduck Checking auto update branch... No auto update branch exists There might already be an open PR for this update: - TSDuck updates and build fixes for Darwin URL "https://api.github.com/repos/NixOS/nixpkgs/issues/306636" [result] Failed to update tsduck 3.31-2761 -> 3.37-3670 https://github.com/tsduck/tsduck/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.craft-parts, using log file: /var/log/nixpkgs-update/python311Packages.craft-parts/2024-04-29.log python311Packages.craft-parts 0 -> 1 attrpath: python311Packages.craft-parts Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-craft-parts-1.29.0 Press Enter key to continue... Running update for: - python3.11-craft-parts-1.29.0: UPDATING ... - python3.11-craft-parts-1.29.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.craft-parts 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rockcraft, using log file: /var/log/nixpkgs-update/rockcraft/2024-04-29.log rockcraft 0 -> 1 attrpath: rockcraft Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - rockcraft-1.2.3 Press Enter key to continue... Running update for: - rockcraft-1.2.3: UPDATING ... - rockcraft-1.2.3: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/by-name/ro/rockcraft/package.nix b/pkgs/by-name/ro/rockcraft/package.nix index e1b29f50061b..660a50844212 100644 --- a/pkgs/by-name/ro/rockcraft/package.nix +++ b/pkgs/by-name/ro/rockcraft/package.nix @@ -8,13 +8,13 @@ python3Packages.buildPythonApplication rec { pname = "rockcraft"; - version = "1.2.3"; + version = "1.3.1"; src = fetchFromGitHub { owner = "canonical"; repo = "rockcraft"; rev = "refs/tags/${version}"; - hash = "sha256-Qk7Fi4I/5TCf9llGTsTBQsAxUkeVmAlH6tFNYMsyZ1c="; + hash = "sha256-BGQXrsztp1KZQy3ZVxkBpRYWCzMsPCBUT7aWtH0ULHM="; }; postPatch = '' No auto update branch exists [outpaths] eval start [outpaths] eval end Received ExitFailure 1 when running Raw command: /nix/store/03a4f9rij2z4mmwprlbip3mrnnfaw0yd-nix-2.18.2/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A rockcraft nix build failed. return _bootstrap._gcd_import(name[level:], package, level) tests/unit/test_project.py:32: in from rockcraft.models import Project rockcraft/models/__init__.py:20: in from rockcraft.models.project import Project, load_project, transform_yaml rockcraft/models/project.py:30: in from craft_application.models import BuildPlanner as BaseBuildPlanner E ImportError: cannot import name 'BuildPlanner' from 'craft_application.models' (/nix/store/6vj92hgklbpxx3zrhh1xf638zbfwc169-python3.11-craft-application-1-1.2.1/lib/python3.11/site-packages/craft_application/models/__init__.py) =============================== warnings summary =============================== rockcraft/utils.py:25 /build/source/rockcraft/utils.py:25: DeprecationWarning: The distutils package is deprecated and slated for removal in Python 3.12. Use setuptools or check PEP 632 for potential alternatives from distutils.util import strtobool # pylint: disable=deprecated-module -- Docs: https://docs.pytest.org/en/stable/how-to/capture-warnings.html =========================== short test summary info ============================ ERROR tests/integration/plugins/test_python_plugin.py ERROR tests/integration/services/test_lifecycle.py ERROR tests/integration/test_application.py ERROR tests/integration/test_oci.py ERROR tests/unit/commands/test_expand_extensions.py ERROR tests/unit/commands/test_list_extensions.py ERROR tests/unit/extensions/test_extensions.py ERROR tests/unit/plugins/test_python_plugin.py ERROR tests/unit/services/test_lifecycle.py ERROR tests/unit/services/test_package.py ERROR tests/unit/test_cli.py ERROR tests/unit/test_project.py !!!!!!!!!!!!!!!!!!! Interrupted: 12 errors during collection !!!!!!!!!!!!!!!!!!! ======================== 1 warning, 12 errors in 0.85s ========================= /nix/store/9wnvhjyxjykwn5y06xc9a2h8rs5fbfia-stdenv-linux/setup: line 1579: pop_var_context: head of shell_variables not a function context [result] Failed to update rockcraft 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.craft-archives, using log file: /var/log/nixpkgs-update/python311Packages.craft-archives/2024-04-29.log python311Packages.craft-archives 0 -> 1 attrpath: python311Packages.craft-archives Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-craft-archives-1.1.3 Press Enter key to continue... Running update for: - python3.11-craft-archives-1.1.3: UPDATING ... - python3.11-craft-archives-1.1.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.craft-archives 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.craft-application-1, using log file: /var/log/nixpkgs-update/python312Packages.craft-application-1/2024-04-29.log python312Packages.craft-application-1 1.2.1 -> 2.6.0 https://github.com/canonical/craft-application/releases attrpath: python312Packages.craft-application-1 isn't the default python version [result] Failed to update python312Packages.craft-application-1 1.2.1 -> 2.6.0 https://github.com/canonical/craft-application/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.craft-grammar, using log file: /var/log/nixpkgs-update/python311Packages.craft-grammar/2024-04-29.log python311Packages.craft-grammar 0 -> 1 attrpath: python311Packages.craft-grammar Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-craft-grammar-1.2.0 Press Enter key to continue... Running update for: - python3.11-craft-grammar-1.2.0: UPDATING ... - python3.11-craft-grammar-1.2.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.craft-grammar 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python312Packages.tensordict, using log file: /var/log/nixpkgs-update/python312Packages.tensordict/2024-04-29.log python312Packages.tensordict 0.3.1 -> 0.4.0 https://github.com/pytorch/tensordict/releases attrpath: python312Packages.tensordict isn't the default python version [result] Failed to update python312Packages.tensordict 0.3.1 -> 0.4.0 https://github.com/pytorch/tensordict/releases [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.ghapi, using log file: /var/log/nixpkgs-update/python311Packages.ghapi/2024-04-29.log python311Packages.ghapi 0 -> 1 attrpath: python311Packages.ghapi Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-ghapi-1.0.3 Press Enter key to continue... Running update for: - python3.11-ghapi-1.0.3: UPDATING ... - python3.11-ghapi-1.0.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.ghapi 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath lagrange, using log file: /var/log/nixpkgs-update/lagrange/2024-04-29.log lagrange 0 -> 1 attrpath: lagrange Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - lagrange-1.17.6 Press Enter key to continue... Running update for: - lagrange-1.17.6: UPDATING ... - lagrange-1.17.6: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update lagrange 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.cart, using log file: /var/log/nixpkgs-update/python311Packages.cart/2024-04-29.log python311Packages.cart 0 -> 1 attrpath: python311Packages.cart Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-cart-1.2.2 Press Enter key to continue... Running update for: - python3.11-cart-1.2.2: UPDATING ... - python3.11-cart-1.2.2: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.cart 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.opencensus-context, using log file: /var/log/nixpkgs-update/python311Packages.opencensus-context/2024-04-29.log python311Packages.opencensus-context 0 -> 1 attrpath: python311Packages.opencensus-context Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-opencensus-context-0.1.3 Press Enter key to continue... Running update for: - python3.11-opencensus-context-0.1.3: UPDATING ... - python3.11-opencensus-context-0.1.3: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.opencensus-context 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.grpc-google-iam-v1, using log file: /var/log/nixpkgs-update/python311Packages.grpc-google-iam-v1/2024-04-29.log python311Packages.grpc-google-iam-v1 0 -> 1 attrpath: python311Packages.grpc-google-iam-v1 Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-grpc-google-iam-v1-0.13.0 Press Enter key to continue... Running update for: - python3.11-grpc-google-iam-v1-0.13.0: UPDATING ... - python3.11-grpc-google-iam-v1-0.13.0: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.grpc-google-iam-v1 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath python311Packages.shiv, using log file: /var/log/nixpkgs-update/python311Packages.shiv/2024-04-29.log python311Packages.shiv 0 -> 1 attrpath: python311Packages.shiv Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - python3.11-shiv-1.0.5 Press Enter key to continue... Running update for: - python3.11-shiv-1.0.5: UPDATING ... - python3.11-shiv-1.0.5: DONE. Packages updated! The diff was empty after rewrites. [result] Failed to update python311Packages.shiv 0 -> 1 [options] github_user: r-ryantm, pull_request: YES, batch_update: YES, calculate_outpaths: YES, cve_report: NO, nixpkgs-review: YES, nixpkgs_dir: "/var/cache/nixpkgs-update/worker/nixpkgs", use attrpath: NO For attrpath rocmPackages.migraphx, using log file: /var/log/nixpkgs-update/rocmPackages.migraphx/2024-04-29.log rocmPackages.migraphx 0 -> 1 attrpath: rocmPackages.migraphx Checking auto update branch... [version] [version] skipping because derivation has updateScript [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] Success [updateScript] Going to be running update for following packages: - migraphx-6.0.2 Press Enter key to continue... Running update for: - migraphx-6.0.2: UPDATING ... - migraphx-6.0.2: DONE. Packages updated! Diff after rewrites: diff --git a/pkgs/development/rocm-modules/6/migraphx/default.nix b/pkgs/development/rocm-modules/6/migraphx/default.nix index 4cc2e4bd24b3..956db9709325 100644 --- a/pkgs/development/rocm-modules/6/migraphx/default.nix +++ b/pkgs/development/rocm-modules/6/migraphx/default.nix @@ -48,7 +48,7 @@ let ])); in stdenv.mkDerivation (finalAttrs: { pname = "migraphx"; - version = "6.0.2"; + version = "6.1.0"; outputs = [ "out" @@ -62,7 +62,7 @@ in stdenv.mkDerivation (finalAttrs: { owner = "ROCm"; repo = "AMDMIGraphX"; rev = "rocm-${finalAttrs.version}"; - hash = "sha256-VDYUSpWYAdJ63SKVCO26DVAC3RtZM7otqN0sYUA6DBQ="; + hash = "sha256-Mf2L+P64/hstR74wko7fqlvsOzwtdNYRgewxeBlXvh4="; }; nativeBuildInputs = [ No auto update branch exists [outpaths] eval start [outpaths] eval end