Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: f2ea885bedfe
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 75601e10cb30
Choose a head ref

Commits on May 7, 2018

  1. Copy the full SHA
    a75aee3 View commit details

Commits on May 25, 2018

  1. Copy the full SHA
    468f820 View commit details

Commits on Jun 6, 2018

  1. parity-beta: deinit

    akru committed Jun 6, 2018
    Copy the full SHA
    c36101e View commit details
  2. parity: 1.9.7 -> 1.10.6

    akru committed Jun 6, 2018
    Copy the full SHA
    7e45efc View commit details
  3. nixos/tests/hydra: build a trivial derivation

    A script is used to create a project, and configure a jobset. This
    jobset fetches a local file containing a trivial Nix expression. The
    test script makes sure this derivation has been successfully built by
    Hydra.
    nlewo committed Jun 6, 2018
    Copy the full SHA
    47fc27b View commit details
  4. Copy the full SHA
    891650b View commit details
  5. Merge pull request #40729 from nlewo/pr-hydra-test

    nixos/tests/hydra: build a trivial derivation
    LnL7 authored Jun 6, 2018
    Copy the full SHA
    4e0de0c View commit details
  6. nixos/release-combined: remove keymap tests from tested job

    Temporary fix for #41538; non-deterministic failures
    blocked the release channel.
    xeji committed Jun 6, 2018
    Copy the full SHA
    4c25fbe View commit details
  7. Merge pull request #38263 from lopsided98/grub-initrd-secrets

    grub: support initrd secrets
    joachifm authored Jun 6, 2018
    Copy the full SHA
    c06d795 View commit details
  8. Merge pull request #40666 from magnetophon/M32edit

    m32edit and x32edit: init at 3.2
    nlewo authored Jun 6, 2018
    Copy the full SHA
    2c3e532 View commit details
  9. Copy the full SHA
    5892931 View commit details
  10. h2o: 2.2.4 -> 2.2.5

    Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.
    
    This update was made based on information from https://repology.org/metapackage/h2o/versions.
    
    These checks were done:
    
    - built on NixOS
    - /nix/store/dwz174x5lsj14gm3a89rhpw2mb4wciap-h2o-2.2.5/bin/h2o passed the binary check.
    - 1 of 1 passed binary check by having a zero exit code.
    - 0 of 1 passed binary check by having the new version present in output.
    - found 2.2.5 with grep in /nix/store/dwz174x5lsj14gm3a89rhpw2mb4wciap-h2o-2.2.5
    - directory tree listing: https://gist.github.com/b8176825df6a9bbef22331d62ac7208c
    - du listing: https://gist.github.com/4c5ecd9f4cd736d08daeeab72549037e
    R. RyanTM authored and thoughtpolice committed Jun 6, 2018
    Copy the full SHA
    d277e4f View commit details
  11. gtkwave: 3.3.90 -> 3.3.91

    Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.
    
    This update was made based on information from https://repology.org/metapackage/gtkwave/versions.
    
    These checks were done:
    
    - built on NixOS
    - /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/evcd2vcd passed the binary check.
    - /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/fst2vcd passed the binary check.
    - /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/vcd2fst passed the binary check.
    - /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/fstminer passed the binary check.
    - Warning: no invocation of /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/ghwdump had a zero exit code or showed the expected version
    - /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/lxt2miner passed the binary check.
    - /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/lxt2vcd passed the binary check.
    - Warning: no invocation of /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/shmidcat had a zero exit code or showed the expected version
    - /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/vcd2lxt passed the binary check.
    - /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/vcd2lxt2 passed the binary check.
    - /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/vcd2vzt passed the binary check.
    - /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/vzt2vcd passed the binary check.
    - /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/vztminer passed the binary check.
    - /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/gtkwave passed the binary check.
    - Warning: no invocation of /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/twinwave had a zero exit code or showed the expected version
    - Warning: no invocation of /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/rtlbrowse had a zero exit code or showed the expected version
    - /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91/bin/vermin passed the binary check.
    - 13 of 17 passed binary check by having a zero exit code.
    - 0 of 17 passed binary check by having the new version present in output.
    - found 3.3.91 with grep in /nix/store/saxwlbm10w3r18rlj0svnfbrf5crwr4w-gtkwave-3.3.91
    - directory tree listing: https://gist.github.com/3ce8b90b2a4e815255bced6a94d99818
    - du listing: https://gist.github.com/8571bbab590243bbfadf05271e188f20
    R. RyanTM authored and thoughtpolice committed Jun 6, 2018
    Copy the full SHA
    ff92e43 View commit details
  12. cryptoverif: 1.28 -> 2.00

    Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.
    
    This update was made based on information from https://repology.org/metapackage/cryptoverif/versions.
    
    These checks were done:
    
    - built on NixOS
    - /nix/store/449i03imd329g3yi4gbmcbq9pv5ijpib-cryptoverif-2.00/bin/cryptoverif passed the binary check.
    - 1 of 1 passed binary check by having a zero exit code.
    - 0 of 1 passed binary check by having the new version present in output.
    - found 2.00 with grep in /nix/store/449i03imd329g3yi4gbmcbq9pv5ijpib-cryptoverif-2.00
    - directory tree listing: https://gist.github.com/b4cdf4e1befb51addd9b1dc1c39d78d9
    - du listing: https://gist.github.com/18190fb11f51471790dcc668635aba6a
    R. RyanTM authored and thoughtpolice committed Jun 6, 2018
    Copy the full SHA
    517d5ff View commit details
  13. Merge pull request #41578 from akru/master

    parity: 1.9.7 -> 1.10.6 [SECURITY UPDATES]
    xeji authored Jun 6, 2018
    Copy the full SHA
    0c9ec4d View commit details
  14. Copy the full SHA
    31ab326 View commit details
  15. quiterss: 0.18.10 -> 0.18.11

    primeos committed Jun 6, 2018
    Copy the full SHA
    0a1ab7e View commit details
  16. getdns: 1.4.1 -> 1.4.2 (#41595)

    leenaars authored and xeji committed Jun 6, 2018
    Copy the full SHA
    9026840 View commit details
  17. Mint: 2018-05-27 -> 0.0.3 (#41554)

    manveru authored and xeji committed Jun 6, 2018
    Copy the full SHA
    b7a025c View commit details
  18. Copy the full SHA
    979a835 View commit details
  19. joker: 0.9.2 -> 0.9.3 (#41577)

    andrestylianos authored and xeji committed Jun 6, 2018
    Copy the full SHA
    1c3798f View commit details
  20. ocamlPackages.functory: 0.5 -> 0.6 (#41596)

    vbgl authored and xeji committed Jun 6, 2018
    Copy the full SHA
    6c42674 View commit details
  21. mariadb: 10.2.14 -> 10.2.15 (#41497)

    Izorkin authored and xeji committed Jun 6, 2018
    Copy the full SHA
    13705c0 View commit details
  22. Copy the full SHA
    75601e1 View commit details
Showing with 446 additions and 209 deletions.
  1. +1 −0 doc/default.nix
  2. +9 −0 nixos/doc/manual/release-notes/rl-1809.xml
  3. +5 −15 nixos/modules/system/boot/loader/grub/grub.nix
  4. +17 −13 nixos/modules/system/boot/loader/grub/install-grub.pl
  5. +8 −6 nixos/release-combined.nix
  6. +1 −0 nixos/release.nix
  7. +0 −32 nixos/tests/hydra.nix
  8. +56 −0 nixos/tests/hydra/create-trivial-project.sh
  9. +78 −0 nixos/tests/hydra/default.nix
  10. +0 −1 pkgs/applications/altcoins/default.nix
  11. +0 −7 pkgs/applications/altcoins/parity/beta.nix
  12. +4 −4 pkgs/applications/altcoins/parity/default.nix
  13. +0 −101 pkgs/applications/altcoins/parity/patches/vendored-sources-1.9.patch
  14. +43 −0 pkgs/applications/audio/midas/generic.nix
  15. +9 −0 pkgs/applications/audio/midas/m32edit.nix
  16. +9 −0 pkgs/applications/audio/midas/x32edit.nix
  17. +2 −2 pkgs/applications/editors/atom/default.nix
  18. +2 −3 pkgs/applications/networking/instant-messengers/skypeforlinux/default.nix
  19. +157 −0 pkgs/applications/networking/newsreaders/quiterss/0001-Revert-change-WebKit-602.1-c2f.patch
  20. +11 −4 pkgs/applications/networking/newsreaders/quiterss/default.nix
  21. +2 −2 pkgs/applications/science/electronics/gtkwave/default.nix
  22. +2 −2 pkgs/applications/science/logic/cryptoverif/default.nix
  23. +3 −3 pkgs/development/compilers/mint/default.nix
  24. +2 −2 pkgs/development/interpreters/joker/default.nix
  25. +3 −3 pkgs/development/libraries/getdns/default.nix
  26. +14 −4 pkgs/development/ocaml-modules/functory/default.nix
  27. +2 −2 pkgs/servers/http/h2o/default.nix
  28. +2 −2 pkgs/servers/sql/mariadb/default.nix
  29. +4 −1 pkgs/top-level/all-packages.nix
1 change: 1 addition & 0 deletions doc/default.nix
Original file line number Diff line number Diff line change
@@ -44,5 +44,6 @@ pkgs.stdenv.mkDerivation {
mkdir -p $out/nix-support/
echo "doc manual $dest manual.html" >> $out/nix-support/hydra-build-products
echo "doc manual $dest nixpkgs-manual.epub" >> $out/nix-support/hydra-build-products
'';
}
9 changes: 9 additions & 0 deletions nixos/doc/manual/release-notes/rl-1809.xml
Original file line number Diff line number Diff line change
@@ -121,6 +121,15 @@ $ nix-instantiate -E '(import <nixpkgsunstable> {}).gitFull'
<literal>gnucash24</literal>.
</para>
</listitem>
<listitem>
<para>
The GRUB specific option <option>boot.loader.grub.extraInitrd</option>
has been replaced with the generic option
<option>boot.initrd.secrets</option>. This option creates a secondary
initrd from the specified files, rather than using a manually created
initrd file.
</para>
</listitem>
</itemizedlist>
</section>

20 changes: 5 additions & 15 deletions nixos/modules/system/boot/loader/grub/grub.nix
Original file line number Diff line number Diff line change
@@ -35,6 +35,7 @@ let
let
efiSysMountPoint = if args.efiSysMountPoint == null then args.path else args.efiSysMountPoint;
efiSysMountPoint' = replaceChars [ "/" ] [ "-" ] efiSysMountPoint;
initrdSecrets = config.boot.initrd.secrets != {};
in
pkgs.writeText "grub-config.xml" (builtins.toXML
{ splashImage = f cfg.splashImage;
@@ -49,12 +50,12 @@ let
storePath = config.boot.loader.grub.storePath;
bootloaderId = if args.efiBootloaderId == null then "NixOS${efiSysMountPoint'}" else args.efiBootloaderId;
timeout = if config.boot.loader.timeout == null then -1 else config.boot.loader.timeout;
inherit efiSysMountPoint;
inherit efiSysMountPoint initrdSecrets;
inherit (args) devices;
inherit (efi) canTouchEfiVariables;
inherit (cfg)
version extraConfig extraPerEntryConfig extraEntries forceInstall useOSProber
extraEntriesBeforeNixOS extraPrepareConfig extraInitrd configurationLimit copyKernels
extraEntriesBeforeNixOS extraPrepareConfig configurationLimit copyKernels
default fsIdentifier efiSupport efiInstallAsRemovable gfxmodeEfi gfxmodeBios;
path = (makeBinPath ([
pkgs.coreutils pkgs.gnused pkgs.gnugrep pkgs.findutils pkgs.diffutils pkgs.btrfs-progs
@@ -284,19 +285,6 @@ in
'';
};

extraInitrd = mkOption {
type = types.nullOr types.path;
default = null;
example = "/boot/extra_initramfs.gz";
description = ''
The path to a second initramfs to be supplied to the kernel.
This ramfs will not be copied to the store, so that it can
contain secrets such as LUKS keyfiles or ssh keys.
This implies that rolling back to a previous configuration
won't rollback the state of this file.
'';
};

useOSProber = mkOption {
default = false;
type = types.bool;
@@ -541,6 +529,8 @@ in
{ path = "/boot"; inherit (cfg) devices; inherit (efi) efiSysMountPoint; }
];

boot.loader.supportsInitrdSecrets = true;

system.build.installBootLoader =
let
install-grub-pl = pkgs.substituteAll {
30 changes: 17 additions & 13 deletions nixos/modules/system/boot/loader/grub/install-grub.pl
Original file line number Diff line number Diff line change
@@ -49,7 +49,7 @@ sub runCommand {
my $extraPerEntryConfig = get("extraPerEntryConfig");
my $extraEntries = get("extraEntries");
my $extraEntriesBeforeNixOS = get("extraEntriesBeforeNixOS") eq "true";
my $extraInitrd = get("extraInitrd");
my $initrdSecrets = get("initrdSecrets");
my $splashImage = get("splashImage");
my $configurationLimit = int(get("configurationLimit"));
my $copyKernels = get("copyKernels") eq "true";
@@ -228,13 +228,6 @@ sub GrubFs {
if ($copyKernels == 0) {
$grubStore = GrubFs($storePath);
}
my $extraInitrdPath;
if ($extraInitrd) {
if (! -f $extraInitrd) {
print STDERR "Warning: the specified extraInitrd " . $extraInitrd . " doesn't exist. Your system won't boot without it.\n";
}
$extraInitrdPath = GrubFs($extraInitrd);
}

# Generate the header.
my $conf .= "# Automatically generated. DO NOT EDIT THIS FILE!\n";
@@ -354,9 +347,23 @@ sub addEntry {

my $kernel = copyToKernelsDir(Cwd::abs_path("$path/kernel"));
my $initrd = copyToKernelsDir(Cwd::abs_path("$path/initrd"));
if ($extraInitrd) {
$initrd .= " " .$extraInitrdPath->path;

# Include second initrd with secrets
if ($initrdSecrets) {
# Get last element of path
$initrd =~ /\/([^\/]+)$/;
my $initrdSecretsPath = "$bootPath/kernels/$1-secrets";
$initrd .= " $initrd-secrets";
my $oldUmask = umask;
# Make sure initrd is not world readable (won't work if /boot is FAT)
umask 0137;
my $initrdSecretsPathTemp = File::Temp::mktemp("$initrdSecretsPath.XXXXXXXX");
system("$path/append-initrd-secrets", $initrdSecretsPathTemp) == 0 or die "failed to create initrd secrets\n";
rename $initrdSecretsPathTemp, $initrdSecretsPath or die "failed to move initrd secrets into place\n";
umask $oldUmask;
$copied{$initrdSecretsPath} = 1;
}

my $xen = -e "$path/xen.gz" ? copyToKernelsDir(Cwd::abs_path("$path/xen.gz")) : undef;

# FIXME: $confName
@@ -379,9 +386,6 @@ sub addEntry {
if ($copyKernels == 0) {
$conf .= $grubStore->search . "\n";
}
if ($extraInitrd) {
$conf .= $extraInitrdPath->search . "\n";
}
$conf .= " $extraPerEntryConfig\n" if $extraPerEntryConfig;
$conf .= " multiboot $xen $xenParams\n" if $xen;
$conf .= " " . ($xen ? "module" : "linux") . " $kernel $kernelParams\n";
14 changes: 8 additions & 6 deletions nixos/release-combined.nix
Original file line number Diff line number Diff line change
@@ -88,12 +88,14 @@ in rec {
(all nixos.tests.env)
(all nixos.tests.ipv6)
(all nixos.tests.i3wm)
(all nixos.tests.keymap.azerty)
(all nixos.tests.keymap.colemak)
(all nixos.tests.keymap.dvorak)
(all nixos.tests.keymap.dvp)
(all nixos.tests.keymap.neo)
(all nixos.tests.keymap.qwertz)
# 2018-06-06: keymap tests temporarily removed from tested job
# since non-deterministic failure are blocking the channel (#41538)
#(all nixos.tests.keymap.azerty)
#(all nixos.tests.keymap.colemak)
#(all nixos.tests.keymap.dvorak)
#(all nixos.tests.keymap.dvp)
#(all nixos.tests.keymap.neo)
#(all nixos.tests.keymap.qwertz)
(all nixos.tests.plasma5)
#(all nixos.tests.lightdm)
(all nixos.tests.login)
1 change: 1 addition & 0 deletions nixos/release.nix
Original file line number Diff line number Diff line change
@@ -305,6 +305,7 @@ in rec {
tests.home-assistant = callTest tests/home-assistant.nix { };
tests.hound = callTest tests/hound.nix {};
tests.hocker-fetchdocker = callTest tests/hocker-fetchdocker {};
tests.hydra = callTest tests/hydra {};
tests.i3wm = callTest tests/i3wm.nix {};
tests.iftop = callTest tests/iftop.nix {};
tests.initrd-network-ssh = callTest tests/initrd-network-ssh {};
32 changes: 0 additions & 32 deletions nixos/tests/hydra.nix

This file was deleted.

56 changes: 56 additions & 0 deletions nixos/tests/hydra/create-trivial-project.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
#!/usr/bin/env bash
#
# This script creates a project, a jobset with an input of type local
# path. This local path is a directory that contains a Nix expression
# to define a job.
# The EXPR-PATH environment variable must be set with the local path.

set -e

URL=http://localhost:3000
USERNAME="admin"
PASSWORD="admin"
PROJECT_NAME="trivial"
JOBSET_NAME="trivial"
EXPR_PATH=${EXPR_PATH:-}

if [ -z $EXPR_PATH ]; then
echo "Environment variable EXPR_PATH must be set"
exit 1
fi

mycurl() {
curl --referer $URL -H "Accept: application/json" -H "Content-Type: application/json" $@
}

cat >data.json <<EOF
{ "username": "$USERNAME", "password": "$PASSWORD" }
EOF
mycurl -X POST -d '@data.json' $URL/login -c hydra-cookie.txt

cat >data.json <<EOF
{
"displayname":"Trivial",
"enabled":"1"
}
EOF
mycurl --silent -X PUT $URL/project/$PROJECT_NAME -d @data.json -b hydra-cookie.txt

cat >data.json <<EOF
{
"description": "Trivial",
"checkinterval": "60",
"enabled": "1",
"visible": "1",
"keepnr": "1",
"nixexprinput": "trivial",
"nixexprpath": "trivial.nix",
"inputs": {
"trivial": {
"value": "$EXPR_PATH",
"type": "path"
}
}
}
EOF
mycurl --silent -X PUT $URL/jobset/$PROJECT_NAME/$JOBSET_NAME -d @data.json -b hydra-cookie.txt
78 changes: 78 additions & 0 deletions nixos/tests/hydra/default.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,78 @@
import ../make-test.nix ({ pkgs, ...} :

let
trivialJob = pkgs.writeTextDir "trivial.nix" ''
with import <nix/config.nix>;
{ trivial = builtins.derivation {
name = "trivial";
system = "x86_64-linux";
PATH = coreutils;
builder = shell;
args = ["-c" "touch $out; exit 0"];
};
}
'';

createTrivialProject = pkgs.stdenv.mkDerivation {
name = "create-trivial-project";
unpackPhase = ":";
buildInputs = [ pkgs.makeWrapper ];
installPhase = "install -m755 -D ${./create-trivial-project.sh} $out/bin/create-trivial-project.sh";
postFixup = ''
wrapProgram "$out/bin/create-trivial-project.sh" --prefix PATH ":" ${pkgs.stdenv.lib.makeBinPath [ pkgs.curl ]} --set EXPR_PATH ${trivialJob}
'';
};

in {
name = "hydra-init-localdb";
meta = with pkgs.stdenv.lib.maintainers; {
maintainers = [ pstn lewo ];
};

machine =
{ config, pkgs, ... }:

{
virtualisation.memorySize = 1024;
time.timeZone = "UTC";

environment.systemPackages = [ createTrivialProject pkgs.jq ];
services.hydra = {
enable = true;

#Hydra needs those settings to start up, so we add something not harmfull.
hydraURL = "example.com";
notificationSender = "example@example.com";
};
nix = {
buildMachines = [{
hostName = "localhost";
systems = [ "x86_64-linux" ];
}];
};
};

testScript =
''
# let the system boot up
$machine->waitForUnit("multi-user.target");
# test whether the database is running
$machine->succeed("systemctl status postgresql.service");
# test whether the actual hydra daemons are running
$machine->succeed("systemctl status hydra-queue-runner.service");
$machine->succeed("systemctl status hydra-init.service");
$machine->succeed("systemctl status hydra-evaluator.service");
$machine->succeed("systemctl status hydra-send-stats.service");
$machine->succeed("hydra-create-user admin --role admin --password admin");
# create a project with a trivial job
$machine->waitForOpenPort(3000);
# make sure the build as been successfully built
$machine->succeed("create-trivial-project.sh");
$machine->waitUntilSucceeds('curl -L -s http://localhost:3000/build/1 -H "Accept: application/json" | jq .buildstatus | xargs test 0 -eq');
'';
})
1 change: 0 additions & 1 deletion pkgs/applications/altcoins/default.nix
Original file line number Diff line number Diff line change
@@ -85,7 +85,6 @@ rec {
};

parity = callPackage ./parity { };
parity-beta = callPackage ./parity/beta.nix { };
parity-ui = callPackage ./parity-ui { };

particl-core = callPackage ./particl/particl-core.nix { boost = boost165; miniupnpc = miniupnpc_2; withGui = false; };
7 changes: 0 additions & 7 deletions pkgs/applications/altcoins/parity/beta.nix

This file was deleted.

8 changes: 4 additions & 4 deletions pkgs/applications/altcoins/parity/default.nix
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
let
version = "1.9.7";
sha256 = "1h9rmyqkdv2v83g12dadgqflq1n1qqgd5hrpy20ajha0qpbiv3ph";
cargoSha256 = "0ss5jw43850r8l34prai5vk1zd5d5fjyg4rcav1asbq6v683bww0";
patches = [ ./patches/vendored-sources-1.9.patch ];
version = "1.10.6";
sha256 = "1x2sm262z8fdkx8zin6r8nwbb7znziw9nm224pr6ap3p0jmv7fcq";
cargoSha256 = "1wf1lh32f9dlhv810gdcssv92g1yximx09lw63m0mxcjbn9813bs";
patches = [ ./patches/vendored-sources-1.10.patch ];
in
import ./parity.nix { inherit version sha256 cargoSha256 patches; }
Loading