Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 92212a59df51
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 95b35a2514ff
Choose a head ref

Commits on Feb 24, 2020

  1. nixos/security/pam: Add nodelay option

    Closes #65551
    clkamp committed Feb 24, 2020

    Verified

    This commit was signed with the committer’s verified signature.
    headius Charles Oliver Nutter
    Copy the full SHA
    dc1efa9 View commit details

Commits on Apr 20, 2020

  1. Verified

    This commit was signed with the committer’s verified signature.
    headius Charles Oliver Nutter
    Copy the full SHA
    eb43e8d View commit details
  2. Verified

    This commit was signed with the committer’s verified signature.
    headius Charles Oliver Nutter
    Copy the full SHA
    ef7e6ee View commit details
  3. Verified

    This commit was signed with the committer’s verified signature.
    headius Charles Oliver Nutter
    Copy the full SHA
    bfffee9 View commit details
  4. Verified

    This commit was signed with the committer’s verified signature.
    headius Charles Oliver Nutter
    Copy the full SHA
    f3c18b2 View commit details
  5. Copy the full SHA
    3112c0e View commit details

Commits on Apr 25, 2020

  1. open-watcom-bin: init at 1.9

    This is a derivation for the binary distribution of the Open Watcom
    C/C++ compiler.
    blitz committed Apr 25, 2020
    Copy the full SHA
    c26e7f9 View commit details
  2. Copy the full SHA
    a89b773 View commit details

Commits on Apr 26, 2020

  1. nixos/nsswitch: Make databases more configurable

    Instead of hardcoding all nss modules that are added into nsswitch,
    there are now options exposed.
    This allows users to add own nss modules (I had this issue with
    winbindd, for example).
    Also, nss modules could be moved to their NixOS modules which would
    make the nsswitch module slimmer.
    
    As the lists are now handled by the modules system, we can use mkOrder
    to ensure a proper order as well as mkForce to override one specific
    database type instead of the entire file.
    dasJ committed Apr 26, 2020
    Copy the full SHA
    bc2a4b3 View commit details

Commits on Apr 28, 2020

  1. Copy the full SHA
    8a339b4 View commit details
  2. virtualbox: build BIOS from C instead of alternative sources

    VirtualBox ships with "alternative BIOS sources" for its virtual BIOS.
    These are generated by first compiling the BIOS C sources with the
    Open Watcom toolchain, disassembling the output and checking in the
    disassembly into the VirtualBox repo.
    
    The result means that the BIOS C code cannot be patched, because it's
    not compiled from the C sources, if Open Watcom is not there.
    
    As Open Watcom is now available in nixpkgs, we can just ignore the
    alternative BIOS sources and compile it from C directly.
    blitz committed Apr 28, 2020
    Copy the full SHA
    7c995a4 View commit details
  3. Copy the full SHA
    1e2a558 View commit details
  4. Copy the full SHA
    edddc7c View commit details
  5. wtf: 0.28.0 -> 0.29.0

    avdv committed Apr 28, 2020
    Copy the full SHA
    bd0e684 View commit details
  6. starship: 0.40.1 -> 0.41.0

    bbigras committed Apr 28, 2020
    Copy the full SHA
    6da294e View commit details
  7. amdadl-sdk, amdapp-sdk: remove

    these libraries are obsolete and nothing in the nixpkgs tree requires them
    prusnak committed Apr 28, 2020
    Copy the full SHA
    d94444e View commit details
  8. unison-ucm: 1.0.M1j-alpha -> 1.0.M1l-alpha

    Follow-up to #85940. There were a couple of issues with the
    1.0.M1j-alpha release that were promptly fixed.
    ceedubs committed Apr 28, 2020
    Copy the full SHA
    df202b4 View commit details
  9. Copy the full SHA
    de2b314 View commit details
  10. Merge pull request #86255 from lovesegfault/zoom-us-5.0

    zoom-us: 3.5.385850.0413 -> 5.0.398100.0427
    worldofpeace authored Apr 28, 2020
    Copy the full SHA
    f5c04ec View commit details
  11. Merge pull request #80896 from clkamp/pam-unix-add-nodelay

    nixos/security/pam: Add nodelay option
    worldofpeace authored Apr 28, 2020
    Copy the full SHA
    a0ebabf View commit details
  12. Merge pull request #85772 from blitz/open-watcom

    Use Open Watcom to build VirtualBox BIOS
    flokli authored Apr 28, 2020
    Copy the full SHA
    05328a4 View commit details
  13. Copy the full SHA
    3fb6a30 View commit details
  14. Merge pull request #85589 from emilazy/add-acme-maintainers-team

    Add ACME maintainers team
    worldofpeace authored Apr 28, 2020
    Copy the full SHA
    10bf212 View commit details
  15. Merge pull request #86167 from jtojnar/webkitgtk-2.28.2

    webkitgtk: 2.28.1 → 2.28.2
    worldofpeace authored Apr 28, 2020
    Copy the full SHA
    a8b60a8 View commit details
  16. Copy the full SHA
    aa3dde8 View commit details
  17. Merge pull request #85998 from helsinki-systems/make-nsswitch-more-fl…

    …exible
    
    nixos/nsswitch: Make databases more configurable
    flokli authored Apr 28, 2020
    Copy the full SHA
    c01ac3e View commit details

Commits on Apr 29, 2020

  1. treewide get rid of go 1.12 (#83253)

    * treewide Drop unneeded go 1.12 overrides
    
    * Fix packr to be go module compatible.
    
    I updated to version 2.8.0 which is the latest on master.
    Then due to the 2 different sets of go modules which are used, I split
    the build into two different derivations, then merged them togethor
    using symlinkJoin to have the same output structure as the existing derivation.
    
    * Remove consul dependency on go1.12
    
    I updated the consul version to 1.7.2 and flipped it to building using
    modules.
    
    * Remove go1.12 from perkeep.
    
    Update the version to the latest unstable on master.
    
    * Update scaleway-cli to not be pinned to go1.12
    
    Switched the version to 1.20
    
    * Update prometheus-varnish-exporter to not depend on go1.12
    
    * Update lnd to build with go1.12
    
    Updated the version
    Forced only building subpackages with main to prevent panics over
    multiple modules in one repo
    
    * Remove go1.12 from openshift
    
    Had to update the version to 4.1.0 and do a bit of munging to get this
    to work
    
    * Remove go1.12 completely.
    
    These are no longer needed.
    
    * Update bazel-watcher and make it build with go 1.14
    c00w authored Apr 29, 2020
    Copy the full SHA
    4007ceb View commit details
  2. Merge pull request #86224 from bbigras/starship

    starship: 0.40.1 -> 0.41.0
    marsam authored Apr 29, 2020
    Copy the full SHA
    0028170 View commit details
  3. Merge pull request #86262 from zowoq/podman

    podman: 1.9.0 -> 1.9.1
    adisbladis authored Apr 29, 2020
    Copy the full SHA
    50950bd View commit details
  4. Merge pull request #86233 from prusnak/remove-amd-legacy

    amdadl-sdk, amdapp-sdk: remove
    offlinehacker authored Apr 29, 2020
    Copy the full SHA
    d3ef065 View commit details
  5. Merge pull request #86211 from marsam/update-nodejs-12_x

    nodejs-12_x: 12.16.2 -> 12.16.3
    marsam authored Apr 29, 2020
    Copy the full SHA
    af6f00d View commit details
  6. Merge pull request #86150 from ceedubs/unison-ucm-M1l

    unison-ucm: 1.0.M1j-alpha -> 1.0.M1l-alpha
    worldofpeace authored Apr 29, 2020
    Copy the full SHA
    b7f80f0 View commit details
  7. Merge pull request #86220 from avdv/wtf-0.29.0

    wtf: 0.29.0 -> 0.29.0
    marsam authored Apr 29, 2020
    Copy the full SHA
    de71be7 View commit details
  8. pykms: replace logging patch

    The logging "sed-patch" that was introduced for version 20190611 worked poorly:
    it was too intrusive (breaking the --logfile option), and it didn't prevent
    using in-store file for logging by default. The new logging patch (an actual
    "diff-patch") is less intrusive: it just changes the default log file's
    location to be the current directory instead of the executable's directory.
    pvgoran committed Apr 29, 2020
    Copy the full SHA
    462fa8b View commit details
  9. Copy the full SHA
    c678d68 View commit details
  10. Merge pull request #81366 from pvgoran/pykms-fix-logging

    pykms: fix/enhance logging
    peterhoeg authored Apr 29, 2020
    Copy the full SHA
    83a57cf View commit details
  11. Copy the full SHA
    95b35a2 View commit details
Showing with 374 additions and 749 deletions.
  1. +6 −5 lib/tests/maintainers.nix
  2. +12 −3 lib/tests/release.nix
  3. +12 −0 maintainers/team-list.nix
  4. +101 −39 nixos/modules/config/nsswitch.nix
  5. +1 −1 nixos/modules/security/acme.nix
  6. +10 −2 nixos/modules/security/pam.nix
  7. +1 −0 nixos/modules/services/misc/pykms.nix
  8. +5 −0 nixos/modules/services/misc/sssd.nix
  9. +3 −2 nixos/tests/acme.nix
  10. +5 −3 pkgs/applications/blockchains/lnd.nix
  11. +3 −3 pkgs/applications/misc/perkeep/default.nix
  12. +3 −3 pkgs/applications/misc/wtf/default.nix
  13. +6 −17 pkgs/applications/networking/cluster/openshift/default.nix
  14. +2 −2 pkgs/applications/networking/instant-messengers/zoom-us/default.nix
  15. +2 −2 pkgs/applications/virtualization/podman/default.nix
  16. +4 −0 pkgs/applications/virtualization/virtualbox/default.nix
  17. +0 −247 pkgs/development/compilers/go/1.12.nix
  18. +0 −24 pkgs/development/compilers/go/remove-test-pie.patch
  19. +0 −59 pkgs/development/compilers/go/ssl-cert-file-1.12.1.patch
  20. +67 −0 pkgs/development/compilers/open-watcom-bin/default.nix
  21. +3 −3 pkgs/development/compilers/unison/default.nix
  22. +4 −4 pkgs/development/coq-modules/gappalib/default.nix
  23. +36 −7 pkgs/development/libraries/packr/default.nix
  24. +2 −2 pkgs/development/libraries/webkitgtk/default.nix
  25. +0 −50 pkgs/development/misc/amdadl-sdk/default.nix
  26. +0 −10 pkgs/development/misc/amdapp-sdk/01-remove-aparapi-samples.patch
  27. +0 −108 pkgs/development/misc/amdapp-sdk/default.nix
  28. +0 −11 pkgs/development/misc/amdapp-sdk/gcc-5.patch
  29. +11 −13 pkgs/development/tools/bazel-watcher/default.nix
  30. +2 −2 pkgs/development/web/nodejs/v12.nix
  31. +17 −13 pkgs/servers/consul/default.nix
  32. +4 −4 pkgs/servers/monitoring/prometheus/varnish-exporter.nix
  33. +1 −1 pkgs/tools/admin/lego/default.nix
  34. +1 −1 pkgs/tools/admin/pebble/default.nix
  35. +2 −2 pkgs/tools/admin/scaleway-cli/default.nix
  36. +3 −3 pkgs/tools/misc/starship/default.nix
  37. +3 −5 pkgs/tools/networking/pykms/default.nix
  38. +20 −0 pkgs/tools/networking/pykms/log-to-current-directory-by-default.patch
  39. +3 −0 pkgs/top-level/aliases.nix
  40. +19 −98 pkgs/top-level/all-packages.nix
11 changes: 6 additions & 5 deletions lib/tests/maintainers.nix
Original file line number Diff line number Diff line change
@@ -1,10 +1,11 @@
# to run these tests:
# nix-build nixpkgs/lib/tests/maintainers.nix
# If nothing is output, all tests passed
{ pkgs ? import ../.. {} }:
# to run these tests (and the others)
# nix-build nixpkgs/lib/tests/release.nix
{ # The pkgs used for dependencies for the testing itself
pkgs
, lib
}:

let
inherit (pkgs) lib;
inherit (lib) types;

maintainerModule = { config, ... }: {
15 changes: 12 additions & 3 deletions lib/tests/release.nix
Original file line number Diff line number Diff line change
@@ -1,8 +1,17 @@
{ pkgs ? import ../.. {} }:
{ # The pkgs used for dependencies for the testing itself
# Don't test properties of pkgs.lib, but rather the lib in the parent directory
pkgs ? import ../.. {} // { lib = throw "pkgs.lib accessed, but the lib tests should use nixpkgs' lib path directly!"; }
}:

pkgs.runCommandNoCC "nixpkgs-lib-tests" {
buildInputs = [ pkgs.nix (import ./check-eval.nix) (import ./maintainers.nix { inherit pkgs; }) ];
NIX_PATH = "nixpkgs=${toString pkgs.path}";
buildInputs = [
pkgs.nix
(import ./check-eval.nix)
(import ./maintainers.nix {
inherit pkgs;
lib = import ../.;
})
];
} ''
datadir="${pkgs.nix}/share"
export TEST_ROOT=$(pwd)/test-tmp
12 changes: 12 additions & 0 deletions maintainers/team-list.nix
Original file line number Diff line number Diff line change
@@ -17,6 +17,18 @@

{ lib }:
with lib.maintainers; {
acme = {
members = [
aanderse
andrew-d
arianvp
emily
flokli
m1cr0man
];
scope = "Maintain ACME-related packages and modules.";
};

freedesktop = {
members = [ jtojnar worldofpeace ];
scope = "Maintain Freedesktop.org packages for graphical desktop.";
140 changes: 101 additions & 39 deletions nixos/modules/config/nsswitch.nix
Original file line number Diff line number Diff line change
@@ -10,35 +10,36 @@ let
canLoadExternalModules = config.services.nscd.enable;
myhostname = canLoadExternalModules;
mymachines = canLoadExternalModules;
# XXX Move these to their respective modules
nssmdns = canLoadExternalModules && config.services.avahi.nssmdns;
nsswins = canLoadExternalModules && config.services.samba.nsswins;
ldap = canLoadExternalModules && (config.users.ldap.enable && config.users.ldap.nsswitch);
sssd = canLoadExternalModules && config.services.sssd.enable;
resolved = canLoadExternalModules && config.services.resolved.enable;
googleOsLogin = canLoadExternalModules && config.security.googleOsLogin.enable;

hostArray = [ "files" ]
++ optional mymachines "mymachines"
++ optional nssmdns "mdns_minimal [NOTFOUND=return]"
++ optional nsswins "wins"
++ optional resolved "resolve [!UNAVAIL=return]"
++ [ "dns" ]
++ optional nssmdns "mdns"
++ optional myhostname "myhostname";

passwdArray = [ "files" ]
++ optional sssd "sss"
++ optional ldap "ldap"
++ optional mymachines "mymachines"
++ optional googleOsLogin "cache_oslogin oslogin"
++ [ "systemd" ];

shadowArray = [ "files" ]
++ optional sssd "sss"
++ optional ldap "ldap";

servicesArray = [ "files" ]
++ optional sssd "sss";
hostArray = mkMerge [
(mkBefore [ "files" ])
(mkIf mymachines [ "mymachines" ])
(mkIf nssmdns [ "mdns_minimal [NOTFOUND=return]" ])
(mkIf nsswins [ "wins" ])
(mkIf resolved [ "resolve [!UNAVAIL=return]" ])
(mkAfter [ "dns" ])
(mkIf nssmdns (mkOrder 1501 [ "mdns" ])) # 1501 to ensure it's after dns
(mkIf myhostname (mkOrder 1600 [ "myhostname" ])) # 1600 to ensure it's always the last
];

passwdArray = mkMerge [
(mkBefore [ "files" ])
(mkIf ldap [ "ldap" ])
(mkIf mymachines [ "mymachines" ])
(mkIf googleOsLogin [ "cache_oslogin oslogin" ])
(mkIf canLoadExternalModules (mkAfter [ "systemd" ]))
];

shadowArray = mkMerge [
(mkBefore [ "files" ])
(mkIf ldap [ "ldap" ])
];

in {
options = {
@@ -61,17 +62,73 @@ in {
};
};

system.nssHosts = mkOption {
type = types.listOf types.str;
default = [];
example = [ "mdns" ];
description = ''
List of host entries to configure in <filename>/etc/nsswitch.conf</filename>.
'';
};
system.nssDatabases = {
passwd = mkOption {
type = types.listOf types.str;
description = ''
List of passwd entries to configure in <filename>/etc/nsswitch.conf</filename>.
Note that "files" is always prepended while "systemd" is appended if nscd is enabled.
This option only takes effect if nscd is enabled.
'';
default = [];
};

group = mkOption {
type = types.listOf types.str;
description = ''
List of group entries to configure in <filename>/etc/nsswitch.conf</filename>.
Note that "files" is always prepended while "systemd" is appended if nscd is enabled.
This option only takes effect if nscd is enabled.
'';
default = [];
};

shadow = mkOption {
type = types.listOf types.str;
description = ''
List of shadow entries to configure in <filename>/etc/nsswitch.conf</filename>.
Note that "files" is always prepended.
This option only takes effect if nscd is enabled.
'';
default = [];
};

hosts = mkOption {
type = types.listOf types.str;
description = ''
List of hosts entries to configure in <filename>/etc/nsswitch.conf</filename>.
Note that "files" is always prepended, and "dns" and "myhostname" are always appended.
This option only takes effect if nscd is enabled.
'';
default = [];
};

services = mkOption {
type = types.listOf types.str;
description = ''
List of services entries to configure in <filename>/etc/nsswitch.conf</filename>.
Note that "files" is always prepended.
This option only takes effect if nscd is enabled.
'';
default = [];
};
};
};

imports = [
(mkRenamedOptionModule [ "system" "nssHosts" ] [ "system" "nssDatabases" "hosts" ])
];

config = {
assertions = [
{
@@ -87,23 +144,28 @@ in {
];

# Name Service Switch configuration file. Required by the C
# library. !!! Factor out the mdns stuff. The avahi module
# should define an option used by this module.
# library.
environment.etc."nsswitch.conf".text = ''
passwd: ${concatStringsSep " " passwdArray}
group: ${concatStringsSep " " passwdArray}
shadow: ${concatStringsSep " " shadowArray}
passwd: ${concatStringsSep " " config.system.nssDatabases.passwd}
group: ${concatStringsSep " " config.system.nssDatabases.group}
shadow: ${concatStringsSep " " config.system.nssDatabases.shadow}
hosts: ${concatStringsSep " " config.system.nssHosts}
hosts: ${concatStringsSep " " config.system.nssDatabases.hosts}
networks: files
ethers: files
services: ${concatStringsSep " " servicesArray}
services: ${concatStringsSep " " config.system.nssDatabases.services}
protocols: files
rpc: files
'';

system.nssHosts = hostArray;
system.nssDatabases = {
passwd = passwdArray;
group = passwdArray;
shadow = shadowArray;
hosts = hostArray;
services = mkBefore [ "files" ];
};

# Systemd provides nss-myhostname to ensure that our hostname
# always resolves to a valid IP address. It returns all locally
2 changes: 1 addition & 1 deletion nixos/modules/security/acme.nix
Original file line number Diff line number Diff line change
@@ -458,7 +458,7 @@ in
];

meta = {
maintainers = with lib.maintainers; [ abbradar fpletz globin m1cr0man ];
maintainers = lib.teams.acme.members;
doc = ./acme.xml;
};
}
12 changes: 10 additions & 2 deletions nixos/modules/security/pam.nix
Original file line number Diff line number Diff line change
@@ -219,6 +219,14 @@ let
'';
};

nodelay = mkOption {
default = false;
type = types.bool;
description = ''
Wheather the delay after typing a wrong password should be disabled.
'';
};

requireWheel = mkOption {
default = false;
type = types.bool;
@@ -366,7 +374,7 @@ let
|| cfg.enableGnomeKeyring
|| cfg.googleAuthenticator.enable
|| cfg.duoSecurity.enable)) ''
auth required pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} likeauth
auth required pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} ${optionalString cfg.nodelay "nodelay"} likeauth
${optionalString config.security.pam.enableEcryptfs
"auth optional ${pkgs.ecryptfs}/lib/security/pam_ecryptfs.so unwrap"}
${optionalString cfg.pamMount
@@ -382,7 +390,7 @@ let
"auth required ${pkgs.duo-unix}/lib/security/pam_duo.so"}
'') + ''
${optionalString cfg.unixAuth
"auth sufficient pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} likeauth try_first_pass"}
"auth sufficient pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} ${optionalString cfg.nodelay "nodelay"} likeauth try_first_pass"}
${optionalString cfg.otpwAuth
"auth sufficient ${pkgs.otpw}/lib/security/pam_otpw.so"}
${optionalString use_ldap
1 change: 1 addition & 0 deletions nixos/modules/services/misc/pykms.nix
Original file line number Diff line number Diff line change
@@ -82,6 +82,7 @@ in {
]);
ProtectHome = "tmpfs";
WorkingDirectory = libDir;
SyslogIdentifier = "pykms";
Restart = "on-failure";
MemoryLimit = cfg.memoryLimit;
};
5 changes: 5 additions & 0 deletions nixos/modules/services/misc/sssd.nix
Original file line number Diff line number Diff line change
@@ -75,6 +75,11 @@ in {
};

system.nssModules = optional cfg.enable pkgs.sssd;
system.nssDatabases = {
passwd = [ "sss" ];
shadow = [ "sss" ];
services = [ "sss" ];
};
services.dbus.packages = [ pkgs.sssd ];
})

5 changes: 3 additions & 2 deletions nixos/tests/acme.nix
Original file line number Diff line number Diff line change
@@ -12,8 +12,9 @@ let
fi
'';

in import ./make-test-python.nix {
in import ./make-test-python.nix ({ lib, ... }: {
name = "acme";
meta.maintainers = lib.teams.acme.members;

nodes = rec {
acme = { nodes, lib, ... }: {
@@ -207,4 +208,4 @@ in import ./make-test-python.nix {
"curl --cacert /tmp/ca.crt https://c.example.test/ | grep -qF 'hello world'"
)
'';
}
})
8 changes: 5 additions & 3 deletions pkgs/applications/blockchains/lnd.nix
Original file line number Diff line number Diff line change
@@ -2,16 +2,18 @@

buildGoModule rec {
pname = "lnd";
version = "0.9.0-beta";
version = "0.9.2-beta";

src = fetchFromGitHub {
owner = "lightningnetwork";
repo = "lnd";
rev = "v${version}";
sha256 = "1hq105s9ykp6nsn4iicjnl3mwspqkbfsswkx7sgzv3jggg08fkq9";
sha256 = "0gm33z89fiqv231ks2mkpsblskcsijipq8fcmip6m6jy8g06b1gb";
};

modSha256 = "1pvcvpiz6ck8xkgpypchrq9kgkik0jxd7f3jhihbgldsh4zaqiaq";
modSha256 = "1khxplvyaqgaddrx1nna1fw0nb1xz9bmqpxpfifif4f5nmx90gbr";

subPackages = ["cmd/lncli" "cmd/lnd"];

meta = with lib; {
description = "Lightning Network Daemon";
6 changes: 3 additions & 3 deletions pkgs/applications/misc/perkeep/default.nix
Original file line number Diff line number Diff line change
@@ -13,13 +13,13 @@ let

in buildGoPackage rec {
name = "perkeep-${version}";
version = "unstable-2019-07-29";
version = "unstable-2020-03-23";

src = fetchFromGitHub {
owner = "perkeep";
repo = "perkeep";
rev = "c9f78d02adf9740f3b8d403a1418554293cc9f41";
sha256 = "11rin94pjzg0kvizrq9ss42fjw7wfwx3g1pk8zdlhyfkiwwh2rmg";
rev = "c2e31370ddefd86b6112a5d891100ea3382a4254";
sha256 = "0jf02k20ms7h60wglcq6dj3vqi9rlfww7db5iplgwznbij70c1i4";
};

goPackagePath = "perkeep.org";
6 changes: 3 additions & 3 deletions pkgs/applications/misc/wtf/default.nix
Original file line number Diff line number Diff line change
@@ -7,16 +7,16 @@

buildGoModule rec {
pname = "wtf";
version = "0.28.0";
version = "0.29.0";

src = fetchFromGitHub {
owner = "wtfutil";
repo = pname;
rev = "v${version}";
sha256 = "0pybj2h844x9vncwdcaymihyd1mwdnxxpnzpq0p29ra0cwmsxcgr";
sha256 = "0v6yafpz3sycq6yb7w4dyxqclszvdgwbyhqs5ii8ckynqcf6ifn7";
};

modSha256 = "00xvhajag25kfkizi2spv4ady3h06as43rnbjzfbv7z1mln844y4";
modSha256 = "0csxc5q7i2iq8z71ysfan2kwf4mghi89i5zja5g1a4cvmcabiq1g";

buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version}" ];

Loading