Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 7a3083fef83b
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 6bce1acd26f6
Choose a head ref

Commits on Sep 18, 2019

  1. Revert "setup.sh introduce isELFExec, isELFDyn"

    This is broken in PIE (#68513). Best to not keep it in otherwise something
    else will start using it.
    
    This reverts commit e1b80a5.
    matthewbauer committed Sep 18, 2019
    Copy the full SHA
    da13868 View commit details

Commits on Sep 21, 2019

  1. Merge pull request #69029 from matthewbauer/remove-iself-iselfdyn-19-09

    Revert "setup.sh introduce isELFExec, isELFDyn"
    matthewbauer authored Sep 21, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    89a6723 View commit details

Commits on Sep 22, 2019

  1. python: Fix invalid pip call in setuptoolsShellHook

    (cherry picked from commit 5505d2f)
    seppeljordan authored and FRidh committed Sep 22, 2019
    Copy the full SHA
    b06275b View commit details
  2. Copy the full SHA
    2ae5f1f View commit details

Commits on Sep 23, 2019

  1. systemd: make sysinit.target depend on local-fs.target again

    This change was re-introduced when updating to systemd 243.
    Also see: NixOS/nixpkgs#67858
    
    (cherry picked from commit 53fb1c5)
    Mic92 committed Sep 23, 2019
    Copy the full SHA
    9bc836c View commit details
  2. systemd: add myself as maintainer

    (cherry picked from commit 1e87723)
    Mic92 committed Sep 23, 2019
    Copy the full SHA
    cf97c54 View commit details
  3. systemd: make sysinit.target depend on local-fs.target again [… (#69285)

    systemd: make sysinit.target depend on local-fs.target again [backport]
    Mic92 authored Sep 23, 2019
    Copy the full SHA
    6c0d878 View commit details

Commits on Sep 25, 2019

  1. kernel/common-config: enable SCHED_DEBUG

    (cherry picked from commit 97cc421)
    ivan authored and globin committed Sep 25, 2019
    Copy the full SHA
    e4f6f50 View commit details
  2. Copy the full SHA
    8005bf8 View commit details
  3. Copy the full SHA
    e3d85b6 View commit details
  4. Copy the full SHA
    1c240e4 View commit details
  5. Copy the full SHA
    3c26f2d View commit details
  6. Copy the full SHA
    a663d8f View commit details
  7. kate: No propagatedBuildInputs

    kate does not have a `dev` output, so it should not have
    `propagatedBuildInputs`, as this propagates other `dev` outputs into the user
    environment.
    ttuegel committed Sep 25, 2019
    Copy the full SHA
    3212486 View commit details
  8. Copy the full SHA
    f041a04 View commit details
  9. Copy the full SHA
    1cac77c View commit details
  10. Copy the full SHA
    2aaf890 View commit details
  11. Copy the full SHA
    4b46ba1 View commit details

Commits on Sep 26, 2019

  1. Copy the full SHA
    cc37ffc View commit details
  2. Merge pull request #69427 from ttuegel/closure-size/qt-staging-19.09

    Reduce closure size of Qt applications (backport)
    ttuegel authored Sep 26, 2019
    Copy the full SHA
    1943028 View commit details

Commits on Sep 27, 2019

  1. Copy the full SHA
    e7ae9de View commit details
  2. Copy the full SHA
    475c9de View commit details
  3. Copy the full SHA
    eeb6ee9 View commit details

Commits on Sep 28, 2019

  1. Merge #69700: libX11: upstream patch to fix cross-compilation

    (cherry picked from commit 52af1d0)
    vcunat committed Sep 28, 2019
    Copy the full SHA
    8d8b98c View commit details
  2. Merge pull request #69642 from ttuegel/bug--staging-19.09--hdf5

    hdf5: Fix dependencies and flavors with multiple outputs
    ttuegel authored Sep 28, 2019
    Copy the full SHA
    29c1c19 View commit details
  3. dbus: set datadir again

    Fixes #69404
    worldofpeace committed Sep 28, 2019
    Copy the full SHA
    a694217 View commit details

Commits on Sep 29, 2019

  1. Copy the full SHA
    d5bdf71 View commit details

Commits on Sep 30, 2019

  1. phpPackages.phpcbf: 3.4.2 -> 3.5.0

    (cherry picked from commit 096f03e)
    Ma27 authored and etu committed Sep 30, 2019
    Copy the full SHA
    b1967e3 View commit details
  2. Merge pull request #70048 from etu/1909-phpcbf

    [19.09] phpPackages.phpcbf: 3.4.2 -> 3.5.0
    Ma27 authored Sep 30, 2019
    Copy the full SHA
    105189c View commit details
  3. nixos/systemd: pick more upstream tmpfiles confs

    In #68792 it was discovered that /dev/fuse doesn't have
    wordl-read-writeable permissions anymore. The cause of this is that the
    tmpfiles examples in systemd were reorganized and split into more files.
    We thus lost some of the configuration we were depending on.
    
    In this commit some of the new tmpfiles configuration that are
    applicable to us are added which also makes wtmp/lastlog in the pam
    module not necessary anymore.
    
    Rationale for the new tmpfile configs:
    
      - `journal-nowcow.conf`: Contains chattr +C for journald logs which
      makes sense on copy-on-write filesystems like Btrfs. Other filesystems
      shouldn't do anything funny when that flag is set.
    
      - `static-nodes-permissions.conf`: Contains some permission overrides
      for some device nodes like audio, loop, tun, fuse and kvm.
    
      - `systemd-nspawn.conf`: Makes sure `/var/lib/machines` exists and old
      snapshots are properly removed.
    
      - `systemd-tmp.conf`: Removes systemd services related private tmp
      folders and temporary coredump files.
    
      - `var.conf`: Creates some useful directories in `/var` which we would
      create anyway at some point. Also includes
      `/var/log/{wtmp,btmp,lastlog}`.
    
    Fixes #68792.
    
    (cherry picked from commit 0dc4fe0)
    fpletz authored and lheckemann committed Sep 30, 2019
    Copy the full SHA
    ad36169 View commit details
  4. Merge branch 'staging-19.09' into release-19.09

    Almost all is rebuilt now, no mass regressions in there:
    https://hydra.nixos.org/eval/1545643
    vcunat committed Sep 30, 2019
    Copy the full SHA
    89509ca View commit details
  5. mkRemovedOptionModule: assert on removed options

    We don't want to ignore config that can mess up machines. In general
    this should always fail evaluation, as you think you are changing
    behaviour and don't, which can easily create run-time errors we can
    catch early.
    
    (cherry picked from commit b08b0bc)
    globin authored and lheckemann committed Sep 30, 2019
    Copy the full SHA
    00f495f View commit details
  6. roundcube: 1.3.9 -> 1.3.10

    Semi-automatic update generated by
    https://github.com/ryantm/nixpkgs-update tools. This update was made
    based on information from
    https://repology.org/metapackage/roundcube/versions
    
    (cherry picked from commit ad16672)
    r-ryantm authored and globin committed Sep 30, 2019
    Copy the full SHA
    6bce1ac View commit details
11 changes: 7 additions & 4 deletions lib/modules.nix
Original file line number Diff line number Diff line change
@@ -592,11 +592,14 @@ rec {
{ options = setAttrByPath optionName (mkOption {
visible = false;
});
config.warnings =
let opt = getAttrFromPath optionName options; in
optional opt.isDefined ''
config.assertions =
let opt = getAttrFromPath optionName options; in [{
assertion = !opt.isDefined;
message = ''
The option definition `${showOption optionName}' in ${showFiles opt.files} no longer has any effect; please remove it.
${replacementInstructions}'';
${replacementInstructions}
'';
}];
};

/* Return a module that causes a warning to be shown if the
7 changes: 0 additions & 7 deletions nixos/modules/security/pam.nix
Original file line number Diff line number Diff line change
@@ -742,13 +742,6 @@ in
environment.etc =
mapAttrsToList (n: v: makePAMService v) config.security.pam.services;

systemd.tmpfiles.rules = optionals
(any (s: s.updateWtmp) (attrValues config.security.pam.services))
[
"f /var/log/wtmp"
"f /var/log/lastlog"
];

security.pam.services =
{ other.text =
''
Original file line number Diff line number Diff line change
@@ -49,6 +49,6 @@ in
(mkRemovedOptionModule [ "insecure" ] ''
This option was replaced by 'prometheus.exporters.nginx.sslVerify'.
'')
({ options.warnings = options.warnings; })
({ options.warnings = options.warnings; options.assertions = options.assertions; })
];
}
5 changes: 5 additions & 0 deletions nixos/modules/system/boot/systemd.nix
Original file line number Diff line number Diff line change
@@ -858,7 +858,12 @@ in
"sysctl.d/50-coredump.conf".source = "${systemd}/example/sysctl.d/50-coredump.conf";
"sysctl.d/50-default.conf".source = "${systemd}/example/sysctl.d/50-default.conf";

"tmpfiles.d/journal-nocow.conf".source = "${systemd}/example/tmpfiles.d/journal-nocow.conf";
"tmpfiles.d/static-nodes-permissions.conf".source = "${systemd}/example/tmpfiles.d/static-nodes-permissions.conf";
"tmpfiles.d/systemd.conf".source = "${systemd}/example/tmpfiles.d/systemd.conf";
"tmpfiles.d/systemd-nspawn.conf".source = "${systemd}/example/tmpfiles.d/system-nspawn.conf";
"tmpfiles.d/systemd-tmp.conf".source = "${systemd}/example/tmpfiles.d/system-tmp.conf";
"tmpfiles.d/var.conf".source = "${systemd}/example/tmpfiles.d/var.conf";
"tmpfiles.d/x11.conf".source = "${systemd}/example/tmpfiles.d/x11.conf";

"tmpfiles.d/nixos.conf".text = ''
2 changes: 1 addition & 1 deletion nixos/modules/tasks/network-interfaces.nix
Original file line number Diff line number Diff line change
@@ -305,7 +305,7 @@ let
optional (defined ipv6Address && defined ipv6PrefixLength)
{ address = ipv6Address; prefixLength = ipv6PrefixLength; }))

({ options.warnings = options.warnings; })
({ options.warnings = options.warnings; options.assertions = options.assertions; })
];

};
4 changes: 2 additions & 2 deletions pkgs/applications/kde/kate.nix
Original file line number Diff line number Diff line change
@@ -15,8 +15,8 @@ mkDerivation {
};

nativeBuildInputs = [ extra-cmake-modules kdoctools ];
buildInputs = [ libgit2 ];
propagatedBuildInputs = [
buildInputs = [
libgit2
kactivities ki18n kio ktexteditor kwindowsystem plasma-framework
qtscript kconfig kcrash kguiaddons kiconthemes kinit kjobwidgets kparts
kxmlgui kdbusaddons kwallet kitemmodels knotifications threadweaver
7 changes: 1 addition & 6 deletions pkgs/applications/kde/konsole.nix
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{
mkDerivation, lib, makeWrapper,
mkDerivation, lib,
extra-cmake-modules, kdoctools,
kbookmarks, kcompletion, kconfig, kconfigwidgets, kcoreaddons, kguiaddons,
ki18n, kiconthemes, kinit, kdelibs4support, kio, knotifications,
@@ -18,12 +18,7 @@ mkDerivation {
kbookmarks kcompletion kconfig kconfigwidgets kcoreaddons kdelibs4support
kguiaddons ki18n kiconthemes kinit kio knotifications knotifyconfig kparts kpty
kservice ktextwidgets kwidgetsaddons kwindowsystem kxmlgui qtscript knewstuff
makeWrapper
];

postInstall = ''
wrapProgram $out/bin/konsole --prefix XDG_DATA_DIRS ":" $out/share
'';

propagatedUserEnvPkgs = [ (lib.getBin kinit) ];
}
Original file line number Diff line number Diff line change
@@ -27,9 +27,9 @@ setuptoolsShellHook() {
if test -e setup.py; then
tmp_path=$(mktemp -d)
export PATH="$tmp_path/bin:$PATH"
export PYTHONPATH="@pythonSitePackages@:$PYTHONPATH"
export PYTHONPATH="$tmp_path/@pythonSitePackages@:$PYTHONPATH"
mkdir -p "$tmp_path/@pythonSitePackages@"
eval "@pythonInterpreter@ -m pip -e . --prefix $tmp_path >&2"
eval "@pythonInterpreter@ -m pip install -e . --prefix $tmp_path >&2"
fi

runHook postShellHook
19 changes: 12 additions & 7 deletions pkgs/development/libraries/SDL/default.nix
Original file line number Diff line number Diff line change
@@ -13,6 +13,16 @@

with stdenv.lib;

let
extraPropagatedBuildInputs = [ ]
++ optionals x11Support [ libXext libICE libXrandr ]
++ optionals openglSupport [ libGL libGLU ]
++ optional alsaSupport alsaLib
++ optional pulseaudioSupport libpulseaudio
++ optional stdenv.isDarwin Cocoa;
rpath = makeLibraryPath extraPropagatedBuildInputs;
in

stdenv.mkDerivation rec {
pname = "SDL";
version = "1.2.15";
@@ -31,12 +41,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkgconfig ]
++ optional stdenv.isLinux libcap;

propagatedBuildInputs = [ libiconv ]
++ optionals x11Support [ libXext libICE libXrandr ]
++ optionals openglSupport [ libGL libGLU ]
++ optional alsaSupport alsaLib
++ optional pulseaudioSupport libpulseaudio
++ optional stdenv.isDarwin Cocoa;
propagatedBuildInputs = [ libiconv ] ++ extraPropagatedBuildInputs;

buildInputs = [ ]
++ optional (!stdenv.hostPlatform.isMinGW && alsaSupport) audiofile
@@ -108,7 +113,7 @@ stdenv.mkDerivation rec {
postFixup = ''
for lib in $out/lib/*.so* ; do
if [[ -L "$lib" ]]; then
patchelf --set-rpath "$(patchelf --print-rpath $lib):${makeLibraryPath propagatedBuildInputs}" "$lib"
patchelf --set-rpath "$(patchelf --print-rpath $lib):${rpath}" "$lib"
fi
done
'';
1 change: 1 addition & 0 deletions pkgs/development/libraries/dbus/default.nix
Original file line number Diff line number Diff line change
@@ -60,6 +60,7 @@ stdenv.mkDerivation rec {
configureFlags = [
"--enable-user-session"
"--libexecdir=${placeholder ''out''}/libexec"
"--datadir=/etc"
"--localstatedir=/var"
"--runstatedir=/run"
"--sysconfdir=/etc"
Original file line number Diff line number Diff line change
@@ -53,13 +53,12 @@ ecmPostHook() {
}
postHooks+=(ecmPostHook)

xdgDataSubdirs=(
"doc" "config.kcfg" "kconf_update" "kservices5" "kservicetypes5" \
xdgDataSubdirs=( \
"config.kcfg" "kconf_update" "kservices5" "kservicetypes5" \
"kxmlgui5" "knotifications5" "icons" "locale" "sounds" "templates" \
"wallpapers" "applications" "desktop-directories" "mime" "appdata" "dbus-1" \
)


ecmHostPathSeen=( )

ecmUnseenHostPath() {
@@ -104,5 +103,10 @@ ecmHostPathHook() {
then
qtWrapperArgs+=(--prefix INFOPATH : "$infoDir")
fi

if [ -d "$1/dbus-1" ]
then
propagatedUserEnvPkgs+=" $1"
fi
}
addEnvHooks "$hostOffset" ecmHostPathHook
addEnvHooks "$targetOffset" ecmHostPathHook
3 changes: 1 addition & 2 deletions pkgs/development/libraries/spandsp/default.nix
Original file line number Diff line number Diff line change
@@ -6,7 +6,7 @@ stdenv.mkDerivation rec {
url = "https://www.soft-switch.org/downloads/spandsp/spandsp-${version}.tar.gz";
sha256 = "0rclrkyspzk575v8fslzjpgp4y2s4x7xk3r55ycvpi4agv33l1fc";
};
buildInputs = [];
outputs = [ "out" "dev" ];
propagatedBuildInputs = [audiofile libtiff];
meta = {
homepage = http://www.creytiv.com/baresip.html;
@@ -18,4 +18,3 @@ stdenv.mkDerivation rec {
updateWalker = true;
};
}

2 changes: 2 additions & 0 deletions pkgs/development/libraries/srtp/default.nix
Original file line number Diff line number Diff line change
@@ -14,6 +14,8 @@ stdenv.mkDerivation rec {
sha256 = "1ac7xs1djb03j131f1gmqyfmrplblid9qqyxahs0shdy707r5ll6";
};

outputs = [ "out" "dev" ];

nativeBuildInputs = [ pkgconfig ];

# libsrtp.pc references -lcrypto -lpcap without -L
2 changes: 2 additions & 0 deletions pkgs/development/libraries/tremor/default.nix
Original file line number Diff line number Diff line change
@@ -9,6 +9,8 @@ stdenv.mkDerivation {
sha256 = "0m07gq4zfgigsiz8b518xyb19v7qqp76qmp7lb262825vkqzl3zq";
};

outputs = [ "out" "dev" ];

nativeBuildInputs = [ autoreconfHook pkgconfig ];
propagatedBuildInputs = [ libogg ];

4 changes: 2 additions & 2 deletions pkgs/development/python-modules/netcdf4/default.nix
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{ stdenv, buildPythonPackage, fetchPypi, isPyPy, pytest
{ stdenv, lib, buildPythonPackage, fetchPypi, isPyPy, pytest
, numpy, zlib, netcdf, hdf5, curl, libjpeg, cython, cftime
}:
buildPythonPackage rec {
@@ -37,7 +37,7 @@ buildPythonPackage rec {

# Variables used to configure the build process
USE_NCCONFIG="0";
HDF5_DIR=hdf5;
HDF5_DIR = lib.getDev hdf5;
NETCDF4_DIR=netcdf;
CURL_DIR=curl.dev;
JPEG_DIR=libjpeg.dev;
4 changes: 2 additions & 2 deletions pkgs/development/python-modules/tables/default.nix
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{ stdenv, fetchPypi, python, buildPythonPackage
{ stdenv, lib, fetchPypi, python, buildPythonPackage
, cython, bzip2, lzo, numpy, numexpr, hdf5, six, c-blosc, mock }:

buildPythonPackage rec {
@@ -16,7 +16,7 @@ buildPythonPackage rec {
# The setup script complains about missing run-paths, but they are
# actually set.
setupPyBuildFlags =
[ "--hdf5=${hdf5}"
[ "--hdf5=${lib.getDev hdf5}"
"--lzo=${lzo}"
"--bzip2=${bzip2.dev}"
"--blosc=${c-blosc}"
2 changes: 2 additions & 0 deletions pkgs/os-specific/linux/kernel/common-config.nix
Original file line number Diff line number Diff line change
@@ -42,6 +42,8 @@ let
CRASH_DUMP = option no;
# Easier debugging of NFS issues.
SUNRPC_DEBUG = yes;
# Provide access to tunables like sched_migration_cost_ns
SCHED_DEBUG = yes;
};

power-management = {
6 changes: 3 additions & 3 deletions pkgs/os-specific/linux/systemd/default.nix
Original file line number Diff line number Diff line change
@@ -27,8 +27,8 @@ in stdenv.mkDerivation {
src = fetchFromGitHub {
owner = "NixOS";
repo = "systemd";
rev = "7019836a26ebdc1ba20c03d06dbb3a613833bd0f";
sha256 = "0ywaq5jfy177k4q5hwr43v66sz62l1bqhgyxs2vk9m1d5kvrjwk6";
rev = "ccec67cab6c0fda85a1762eee7aeea422a0dc15e";
sha256 = "12nq2ah33amhyfma464a4ssf90wh2ai8c7w55j381cks8jliny40";
};

outputs = [ "out" "lib" "man" "dev" ];
@@ -231,6 +231,6 @@ in stdenv.mkDerivation {
license = licenses.lgpl21Plus;
platforms = platforms.linux;
priority = 10;
maintainers = with maintainers; [ eelco andir ];
maintainers = with maintainers; [ eelco andir mic92 ];
};
}
4 changes: 2 additions & 2 deletions pkgs/servers/roundcube/default.nix
Original file line number Diff line number Diff line change
@@ -2,11 +2,11 @@

stdenv.mkDerivation rec {
pname = "roundcube";
version = "1.3.9";
version = "1.3.10";

src = fetchurl {
url = "https://github.com/roundcube/roundcubemail/releases/download/${version}/roundcubemail-${version}-complete.tar.gz";
sha256 = "1b91amcpzb7935hpm67iqw92bl5r1a0rkfrc8gfm8w9sngzv8vbj";
sha256 = "1gx8dgrr3p6fksv3pm381a080i9r6snwcmfd1q112mqg19ai3zk9";
};

patches = [ ./0001-Don-t-resolve-symlinks-when-trying-to-find-INSTALL_P.patch ];
7 changes: 7 additions & 0 deletions pkgs/servers/x11/xorg/overrides.nix
Original file line number Diff line number Diff line change
@@ -79,6 +79,13 @@ self: super:

libX11 = super.libX11.overrideAttrs (attrs: {
outputs = [ "out" "dev" "man" ];
patches = [
# Fixes an issue that happens when cross-compiling for us.
(fetchpatch {
url = "https://cgit.freedesktop.org/xorg/lib/libX11/patch/?id=0327c427d62f671eced067c6d9b69f4e216a8cac";
sha256 = "11k2mx56hjgw886zf1cdf2nhv7052d5rggimfshg6lq20i38vpza";
})
];
configureFlags = attrs.configureFlags or []
++ malloc0ReturnsNullCrossFlag;
depsBuildBuild = [ buildPackages.stdenv.cc ];
12 changes: 0 additions & 12 deletions pkgs/stdenv/generic/setup.sh
Original file line number Diff line number Diff line change
@@ -212,18 +212,6 @@ isELF() {
if [ "$magic" = $'\177ELF' ]; then return 0; else return 1; fi
}

# Return success if the specified file is an ELF object
# and its e_type is ET_EXEC (executable file)
isELFExec() {
grep -ao -P '^\177ELF.{11}\x00\x02' "$1" >/dev/null
}

# Return success if the specified file is an ELF object
# and its e_type is ET_DYN (shared object file)
isELFDyn() {
grep -ao -P '^\177ELF.{11}\x00\x03' "$1" >/dev/null
}

# Return success if the specified file is a script (i.e. starts with
# "#!").
isScript() {
2 changes: 2 additions & 0 deletions pkgs/tools/inputmethods/ibus/default.nix
Original file line number Diff line number Diff line change
@@ -98,6 +98,8 @@ stdenv.mkDerivation rec {
})
];

outputs = [ "out" "dev" ];

postPatch = ''
echo \#!${runtimeShell} > data/dconf/make-dconf-override-db.sh
cp ${buildPackages.gtk-doc}/share/gtk-doc/data/gtk-doc.make .
6 changes: 6 additions & 0 deletions pkgs/tools/misc/hdf5/default.nix
Original file line number Diff line number Diff line change
@@ -28,6 +28,8 @@ stdenv.mkDerivation rec {
inherit mpi;
};

outputs = [ "out" "dev" ];

nativeBuildInputs = [ removeReferencesTo ];

buildInputs = []
@@ -51,6 +53,10 @@ stdenv.mkDerivation rec {

postInstall = ''
find "$out" -type f -exec remove-references-to -t ${stdenv.cc} '{}' +
moveToOutput 'bin/h5cc' "''${!outputDev}"
moveToOutput 'bin/h5c++' "''${!outputDev}"
moveToOutput 'bin/h5fc' "''${!outputDev}"
moveToOutput 'bin/h5pcc' "''${!outputDev}"
'';

meta = {
4 changes: 2 additions & 2 deletions pkgs/top-level/php-packages.nix
Original file line number Diff line number Diff line change
@@ -338,12 +338,12 @@ let
};

phpcbf = mkDerivation rec {
version = "3.4.2";
version = "3.5.0";
pname = "phpcbf";

src = pkgs.fetchurl {
url = "https://github.com/squizlabs/PHP_CodeSniffer/releases/download/${version}/phpcbf.phar";
sha256 = "08s47r8i5dyjivk1q3nhrz40n6fx3zghrn5irsxfnx5nj9pb7ffp";
sha256 = "15n3r3sc62ar1kq38idw22y7gasvy747bix99zs0l0paapcbxz6n";
};

phases = [ "installPhase" ];