Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 84d11bd1fb89
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 0a19162fa9a7
Choose a head ref

Commits on Mar 22, 2018

  1. parity: 1.8.11 -> 1.9.5

    akru committed Mar 22, 2018
    Copy the full SHA
    869336d View commit details
  2. parity-beta: 1.9.4 -> 1.10.0

    akru committed Mar 22, 2018
    Copy the full SHA
    1310e23 View commit details
  3. parity: patch fixes

    akru committed Mar 22, 2018
    Copy the full SHA
    cac1065 View commit details

Commits on Mar 27, 2018

  1. Copy the full SHA
    b2bc190 View commit details

Commits on Apr 8, 2018

  1. Copy the full SHA
    27f2088 View commit details

Commits on Apr 18, 2018

  1. Copy the full SHA
    03d1b72 View commit details
  2. parity: 1.9.5 -> 1.9.6

    akru committed Apr 18, 2018
    Copy the full SHA
    efe25f4 View commit details
  3. parity-beta: 1.10.0 -> 1.10.1

    akru committed Apr 18, 2018
    Copy the full SHA
    44342f1 View commit details

Commits on Apr 24, 2018

  1. libfm-extra: 1.2.5 -> 1.3.0

    Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.
    
    This update was made based on information from https://repology.org/metapackage/libfm-extra/versions.
    
    These checks were done:
    
    - built on NixOS
    - Warning: no binary found that responded to help or version flags. (This warning appears even if the package isn't expected to have binaries.)
    - found 1.3.0 with grep in /nix/store/jfppsgl453gipb6vx66y4pcssxd7fq54-libfm-extra-1.3.0
    - directory tree listing: https://gist.github.com/74991e480da532d6ef49f6fb5727d564
    R. RyanTM committed Apr 24, 2018
    Copy the full SHA
    e05099f View commit details

Commits on Apr 27, 2018

  1. parity-beta: 1.10.1 -> 1.10.2

    akru committed Apr 27, 2018
    Copy the full SHA
    9939fb2 View commit details
  2. parity: 1.9.6 -> 1.9.7

    akru committed Apr 27, 2018
    Copy the full SHA
    82f24d6 View commit details

Commits on Apr 30, 2018

  1. Copy the full SHA
    2fcf50a View commit details
  2. Copy the full SHA
    a7ce939 View commit details
  3. wesnoth-dev: 1.13.13 -> 1.14.0

    Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.
    
    This update was made based on information from https://repology.org/metapackage/wesnoth/versions.
    
    These checks were done:
    
    - built on NixOS
    - ran ‘/nix/store/kk2lcjayzj584gczvzmqbna8gc59g92j-wesnoth-1.14.0/bin/wesnoth -h’ got 0 exit code
    - ran ‘/nix/store/kk2lcjayzj584gczvzmqbna8gc59g92j-wesnoth-1.14.0/bin/wesnoth --help’ got 0 exit code
    - ran ‘/nix/store/kk2lcjayzj584gczvzmqbna8gc59g92j-wesnoth-1.14.0/bin/wesnothd -h’ got 0 exit code
    - ran ‘/nix/store/kk2lcjayzj584gczvzmqbna8gc59g92j-wesnoth-1.14.0/bin/wesnothd --help’ got 0 exit code
    - ran ‘/nix/store/kk2lcjayzj584gczvzmqbna8gc59g92j-wesnoth-1.14.0/bin/wesnothd -V’ and found version 1.14.0
    - ran ‘/nix/store/kk2lcjayzj584gczvzmqbna8gc59g92j-wesnoth-1.14.0/bin/wesnothd --version’ and found version 1.14.0
    - found 1.14.0 with grep in /nix/store/kk2lcjayzj584gczvzmqbna8gc59g92j-wesnoth-1.14.0
    - directory tree listing: https://gist.github.com/faf1d8fe4a47781eb51e8a411a546099
    R. RyanTM committed Apr 30, 2018
    Copy the full SHA
    99964ff View commit details
  4. utf8proc: 2.1.0 -> 2.1.1

    Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.
    
    This update was made based on information from https://repology.org/metapackage/utf8proc/versions.
    
    These checks were done:
    
    - built on NixOS
    - Warning: no binary found that responded to help or version flags. (This warning appears even if the package isn't expected to have binaries.)
    - found 2.1.1 with grep in /nix/store/bzpfz4cpf1lf7269ymwdblz2kn0iwf2b-utf8proc-2.1.1
    - directory tree listing: https://gist.github.com/bc9fd69cddc0fd9435fab30a0abcae97
    R. RyanTM committed Apr 30, 2018
    Copy the full SHA
    92f00a5 View commit details

Commits on May 1, 2018

  1. Copy the full SHA
    8838533 View commit details
  2. inetutils: cleanup

    - supports darwin (only when servers are disabled)
    - pass SUIDMODE= to avoid setuid
    - add myself as maintainer
    matthewbauer committed May 1, 2018
    Copy the full SHA
    85e1f22 View commit details
  3. moe: supports darwin

    matthewbauer committed May 1, 2018
    Copy the full SHA
    e1bc2fb View commit details
  4. Copy the full SHA
    426a9ac View commit details
  5. Copy the full SHA
    884babe View commit details
  6. jwhois: supports darwin

    - also set license to gpl3
    matthewbauer committed May 1, 2018
    Copy the full SHA
    d424d34 View commit details
  7. gcal: supports darwin

    matthewbauer committed May 1, 2018
    Copy the full SHA
    262fdca View commit details
  8. Copy the full SHA
    7cbf408 View commit details
  9. ocrad: supports darwin

    matthewbauer committed May 1, 2018
    Copy the full SHA
    ccaebf0 View commit details
  10. gpa: supports darwin

    matthewbauer committed May 1, 2018
    Copy the full SHA
    1beb423 View commit details
  11. pspp: supports darwin

    matthewbauer committed May 1, 2018
    Copy the full SHA
    57a4db2 View commit details
  12. Merge pull request #39428 from r-ryantm/auto-update/libfm-extra

    libfm-extra: 1.2.5 -> 1.3.0
    matthewbauer authored May 1, 2018
    Copy the full SHA
    b9f669e View commit details
  13. Copy the full SHA
    1a18fed View commit details
  14. kid3: qt5 support

    AndersonTorres committed May 1, 2018
    Copy the full SHA
    f08de6c View commit details
  15. cquery: 2018-03-31 -> 2018-05-01

    The update should fix the build on osx.
    tobim committed May 1, 2018
    Copy the full SHA
    5fb8267 View commit details
  16. Copy the full SHA
    5e6f1ab View commit details
  17. Merge pull request #39729 from r-ryantm/auto-update/utf8proc

    utf8proc: 2.1.0 -> 2.1.1
    xeji authored May 1, 2018
    Copy the full SHA
    f1a8206 View commit details
  18. souffle: 1.0.0 -> 1.2.0

    wchresta committed May 1, 2018
    Copy the full SHA
    0cb3923 View commit details
  19. checkstyle: 8.9 -> 8.10

    pSub committed May 1, 2018
    Copy the full SHA
    30a065b View commit details
  20. Copy the full SHA
    0c17b75 View commit details
  21. discord: 0.0.4 -> 0.0.5

    lightdiscord committed May 1, 2018
    Copy the full SHA
    d72b870 View commit details
  22. Merge pull request #39829 from LightDiscord/updates/discord

    discord: 0.0.4 -> 0.0.5
    pSub authored May 1, 2018
    Copy the full SHA
    07b8c39 View commit details
  23. Merge pull request #39822 from edef1c/mananager

    nixos doc: mananager -> manager
    pSub authored May 1, 2018
    Copy the full SHA
    7203e2c View commit details
  24. Copy the full SHA
    f787dfc View commit details
  25. Merge pull request #39827 from AndersonTorres/upload/kid3-qt5

    kid3: qt5 support
    xeji authored May 1, 2018
    Copy the full SHA
    3abe395 View commit details
  26. Merge pull request #39701 from romildo/upd.uget-integrator

    uget-integrator: init at 1.0.0
    pSub authored May 1, 2018
    Copy the full SHA
    839842b View commit details
  27. Merge pull request #39728 from r-ryantm/auto-update/wesnoth

    wesnoth-dev: 1.13.13 -> 1.14.0
    pSub authored May 1, 2018
    Copy the full SHA
    4bcf3d9 View commit details
  28. Merge pull request #39828 from wchresta/souffle-1.2

    souffle: 1.0.0 -> 1.2.0
    copumpkin authored May 1, 2018
    Copy the full SHA
    9a63471 View commit details
  29. Merge pull request #39825 from tobimpub/cquery-update

    cquery: 2018-03-31 -> 2018-05-01
    Mic92 authored May 1, 2018
    Copy the full SHA
    5a990f5 View commit details
  30. foundationdb: install the java client library

    Signed-off-by: Austin Seipp <aseipp@pobox.com>
    thoughtpolice committed May 1, 2018
    Copy the full SHA
    ed5cbbb View commit details
  31. nixos: add TLS support to FoundationDB module, and tweak setup a bit

    Signed-off-by: Austin Seipp <aseipp@pobox.com>
    thoughtpolice committed May 1, 2018
    Copy the full SHA
    55eec81 View commit details
  32. foundationdb: split into multiple, major-versioned packages to make u…

    …pgrades user-controllable
    
    Signed-off-by: Austin Seipp <aseipp@pobox.com>
    thoughtpolice committed May 1, 2018
    Copy the full SHA
    5a24d99 View commit details
  33. Copy the full SHA
    92e5592 View commit details
  34. Copy the full SHA
    d3527d9 View commit details
  35. virtualbox: 5.2.8 -> 5.2.10

    closes #39182.
    flokli committed May 1, 2018
    Copy the full SHA
    8eb3167 View commit details
Showing with 367 additions and 201 deletions.
  1. +5 −0 maintainers/maintainer-list.nix
  2. +1 −1 nixos/doc/manual/installation/installing-from-other-distro.xml
  3. +67 −11 nixos/modules/services/databases/foundationdb.nix
  4. +47 −5 nixos/modules/services/databases/foundationdb.xml
  5. +4 −4 nixos/modules/virtualisation/virtualbox-host.nix
  6. +3 −3 pkgs/applications/altcoins/parity/beta.nix
  7. +3 −3 pkgs/applications/altcoins/parity/default.nix
  8. +7 −11 pkgs/applications/altcoins/parity/patches/vendored-sources-1.10.patch
  9. +7 −13 pkgs/applications/altcoins/parity/patches/vendored-sources-1.9.patch
  10. +9 −10 pkgs/applications/audio/kid3/default.nix
  11. +1 −1 pkgs/applications/editors/moe/default.nix
  12. +1 −1 pkgs/applications/graphics/ocrad/default.nix
  13. +1 −1 pkgs/applications/misc/gcal/default.nix
  14. +1 −1 pkgs/applications/misc/gpa/default.nix
  15. +2 −1 pkgs/applications/networking/browsers/firefox/wrapper.nix
  16. +2 −2 pkgs/applications/networking/instant-messengers/discord/default.nix
  17. +1 −1 pkgs/applications/science/math/pspp/default.nix
  18. +4 −4 pkgs/applications/virtualization/virtualbox/default.nix
  19. +7 −11 pkgs/development/compilers/souffle/default.nix
  20. +2 −2 pkgs/development/libraries/libfm/default.nix
  21. +2 −2 pkgs/development/libraries/utf8proc/default.nix
  22. +5 −3 pkgs/development/libraries/vcdimager/default.nix
  23. +2 −2 pkgs/development/tools/analysis/checkstyle/default.nix
  24. +3 −0 pkgs/development/tools/build-managers/buildbot/default.nix
  25. +3 −5 pkgs/development/tools/misc/cquery/default.nix
  26. +1 −1 pkgs/development/tools/misc/dejagnu/default.nix
  27. +1 −2 pkgs/games/ball-and-paddle/default.nix
  28. +2 −2 pkgs/games/wesnoth/dev.nix
  29. +104 −72 pkgs/servers/foundationdb/default.nix
  30. +9 −14 pkgs/tools/networking/inetutils/default.nix
  31. +2 −2 pkgs/tools/networking/jwhois/default.nix
  32. +39 −0 pkgs/tools/networking/uget-integrator/default.nix
  33. +5 −3 pkgs/tools/security/dirmngr/default.nix
  34. +10 −3 pkgs/top-level/all-packages.nix
  35. +2 −2 pkgs/top-level/lua-packages.nix
  36. +2 −2 pkgs/top-level/python-packages.nix
5 changes: 5 additions & 0 deletions maintainers/maintainer-list.nix
Original file line number Diff line number Diff line change
@@ -3984,6 +3984,11 @@
github = "vyp";
name = "vyp";
};
wchresta = {
email = "wchresta.nix@chrummibei.ch";
github = "wchresta";
name = "wchresta";
};
wedens = {
email = "kirill.wedens@gmail.com";
name = "wedens";
Original file line number Diff line number Diff line change
@@ -154,7 +154,7 @@ $ sudo useradd -u 30000 -g nixbld -G nixbld nixbld</screen>
$ sudo userdel nixbld
$ sudo groupdel nixbld</screen>

<para>If you do not wish to keep the Nix package mananager
<para>If you do not wish to keep the Nix package manager
installed either, run something like <literal>sudo rm -rv
~/.nix-* /nix</literal> and remove the line that the Nix
installer added to your <literal>~/.profile</literal>.</para>
78 changes: 67 additions & 11 deletions nixos/modules/services/databases/foundationdb.nix
Original file line number Diff line number Diff line change
@@ -4,6 +4,7 @@ with lib;

let
cfg = config.services.foundationdb;
pkg = cfg.package;

# used for initial cluster configuration
initialIpAddr = if (cfg.publicAddress != "auto") then cfg.publicAddress else "127.0.0.1";
@@ -24,7 +25,7 @@ let
group = ${cfg.group}
[fdbserver]
command = ${pkgs.foundationdb}/bin/fdbserver
command = ${pkg}/bin/fdbserver
public_address = ${cfg.publicAddress}:$ID
listen_address = ${cfg.listenAddress}
datadir = ${cfg.dataDir}/$ID
@@ -35,6 +36,13 @@ let
memory = ${cfg.memory}
storage_memory = ${cfg.storageMemory}
${optionalString (cfg.tls != null) ''
tls_plugin = ${pkg}/libexec/plugins/FDBLibTLS.so
tls_certificate_file = ${cfg.tls.certificate}
tls_key_file = ${cfg.tls.key}
tls_verify_peers = ${cfg.tls.allowedPeers}
''}
${optionalString (cfg.locality.machineId != null) "locality_machineid=${cfg.locality.machineId}"}
${optionalString (cfg.locality.zoneId != null) "locality_zoneid=${cfg.locality.zoneId}"}
${optionalString (cfg.locality.datacenterId != null) "locality_dcid=${cfg.locality.datacenterId}"}
@@ -43,7 +51,7 @@ let
${fdbServers cfg.serverProcesses}
[backup_agent]
command = ${pkgs.foundationdb}/libexec/backup_agent
command = ${pkg}/libexec/backup_agent
${backupAgents cfg.backupProcesses}
'';
in
@@ -52,6 +60,14 @@ in

enable = mkEnableOption "FoundationDB Server";

package = mkOption {
type = types.package;
description = ''
The FoundationDB package to use for this server. This must be specified by the user
in order to ensure migrations and upgrades are controlled appropriately.
'';
};

publicAddress = mkOption {
type = types.str;
default = "auto";
@@ -188,6 +204,43 @@ in
'';
};

tls = mkOption {
default = null;
description = ''
FoundationDB Transport Security Layer (TLS) settings.
'';

type = types.nullOr (types.submodule ({
options = {
certificate = mkOption {
type = types.str;
description = ''
Path to the TLS certificate file. This certificate will
be offered to, and may be verified by, clients.
'';
};

key = mkOption {
type = types.str;
description = "Private key file for the certificate.";
};

allowedPeers = mkOption {
type = types.str;
default = "Check.Valid=1,Check.Unexpired=1";
description = ''
"Peer verification string". This may be used to adjust which TLS
client certificates a server will accept, as a form of user
authorization; for example, it may only accept TLS clients who
offer a certificate abiding by some locality or organization name.
For more information, please see the FoundationDB documentation.
'';
};
};
}));
};

locality = mkOption {
default = {
machineId = null;
@@ -270,7 +323,7 @@ in
meta.doc = ./foundationdb.xml;
meta.maintainers = with lib.maintainers; [ thoughtpolice ];

environment.systemPackages = [ pkgs.foundationdb ];
environment.systemPackages = [ pkg ];

users.extraUsers = optionalAttrs (cfg.user == "foundationdb") (singleton
{ name = "foundationdb";
@@ -324,34 +377,37 @@ in
ReadWritePaths = lib.concatStringsSep " " (map (x: "-" + x) rwpaths);
};

path = [ pkgs.foundationdb pkgs.coreutils ];
path = [ pkg pkgs.coreutils ];

preStart = ''
rm -f ${cfg.pidfile} && \
touch ${cfg.pidfile} && \
chown -R ${cfg.user}:${cfg.group} ${cfg.pidfile}
for x in "${cfg.logDir}" "${cfg.dataDir}" /etc/foundationdb; do
[ ! -d "$x" ] && mkdir -m 0700 -vp "$x" && chown -R ${cfg.user}:${cfg.group} "$x";
for x in "${cfg.logDir}" "${cfg.dataDir}"; do
[ ! -d "$x" ] && mkdir -m 0700 -vp "$x";
chown -R ${cfg.user}:${cfg.group} "$x";
done
[ ! -d /etc/foundationdb ] && \
mkdir -m 0775 -vp /etc/foundationdb && \
chown -R ${cfg.user}:${cfg.group} "/etc/foundationdb"
if [ ! -f /etc/foundationdb/fdb.cluster ]; then
cf=/etc/foundationdb/fdb.cluster
desc=$(tr -dc A-Za-z0-9 </dev/urandom 2>/dev/null | head -c8)
rand=$(tr -dc A-Za-z0-9 </dev/urandom 2>/dev/null | head -c8)
echo ''${desc}:''${rand}@${initialIpAddr}:${builtins.toString cfg.listenPortStart} > $cf
chmod 0660 $cf && chown -R ${cfg.user}:${cfg.group} $cf
chmod 0664 $cf && chown -R ${cfg.user}:${cfg.group} $cf
touch "${cfg.dataDir}/.first_startup"
fi
'';

script = ''
exec fdbmonitor --lockfile ${cfg.pidfile} --conffile ${configFile};
'';
script = "exec fdbmonitor --lockfile ${cfg.pidfile} --conffile ${configFile}";

postStart = ''
if [ -e "${cfg.dataDir}/.first_startup" ]; then
fdbcli --exec "configure new single ssd"
fdbcli --exec "configure new single memory"
rm -f "${cfg.dataDir}/.first_startup";
fi
'';
52 changes: 47 additions & 5 deletions nixos/modules/services/databases/foundationdb.xml
Original file line number Diff line number Diff line change
@@ -12,7 +12,7 @@

<para><emphasis>Maintainer:</emphasis> Austin Seipp</para>

<para><emphasis>Default version:</emphasis> 5.1.x</para>
<para><emphasis>Available version(s):</emphasis> 5.1.x</para>

<para>FoundationDB (or "FDB") is a distributed, open source, high performance,
transactional key-value store. It can store petabytes of data and deliver
@@ -26,9 +26,17 @@ exceptional performance while maintaining consistency and ACID semantics

<programlisting>
services.foundationdb.enable = true;
services.foundationdb.package = pkgs.foundationdb51; # FoundationDB 5.1.x
</programlisting>
</para>

<para>The <option>services.foundationdb.package</option> option is required,
and must always be specified. Because FoundationDB network protocols and
on-disk storage formats may change between (major) versions, and upgrades must
be explicitly handled by the user, you must always manually specify this
yourself so that the NixOS module will use the proper version. Note that minor,
bugfix releases are always compatible.</para>

<para>After running <command>nixos-rebuild</command>, you can verify whether
FoundationDB is running by executing <command>fdbcli</command> (which is added
to <option>environment.systemPackages</option>):
@@ -192,6 +200,44 @@ to a new node in order to connect, if it is not part of the cluster.</para>

</section>

<section><title>Client authorization and TLS</title>

<para>By default, any user who can connect to a FoundationDB process with the
correct cluster configuration can access anything. FoundationDB uses a
pluggable design to transport security, and out of the box it supports a
LibreSSL-based plugin for TLS support. This plugin not only does in-flight
encryption, but also performs client authorization based on the given
endpoint's certificate chain. For example, a FoundationDB server may be
configured to only accept client connections over TLS, where the client TLS
certificate is from organization <emphasis>Acme Co</emphasis> in the
<emphasis>Research and Development</emphasis> unit.</para>

<para>Configuring TLS with FoundationDB is done using the
<option>services.foundationdb.tls</option> options in order to control the peer
verification string, as well as the certificate and its private key.</para>

<para>Note that the certificate and its private key must be accessible to the
FoundationDB user account that the server runs under. These files are also NOT
managed by NixOS, as putting them into the store may reveal private
information.</para>

<para>After you have a key and certificate file in place, it is not enough to
simply set the NixOS module options -- you must also configure the
<command>fdb.cluster</command> file to specify that a given set of coordinators
use TLS. This is as simple as adding the suffix <command>:tls</command> to your
cluster coordinator configuration, after the port number. For example, assuming
you have a coordinator on localhost with the default configuration, simply
specifying:</para>

<programlisting>
XXXXXX:XXXXXX@127.0.0.1:4500:tls
</programlisting>

<para>will configure all clients and server processes to use TLS from now
on.</para>

</section>

<section><title>Backups and Disaster Recovery</title>

<para>The usual rules for doing FoundationDB backups apply on NixOS as written
@@ -245,16 +291,12 @@ FoundationDB is not new software, but the NixOS compilation and integration has
only undergone fairly basic testing of all the available functionality.</para>

<itemizedlist>
<listitem><para>TLS plugin support is compiled in, but it's currently not
possible to specify the set of TLS certificate options in
<command>services.foundationdb</command></para></listitem>
<listitem><para>There is no way to specify individual parameters for
individual <command>fdbserver</command> processes. Currently, all server
processes inherit all the global <command>fdbmonitor</command> settings.
</para></listitem>
<listitem><para>Python bindings are not currently installed.</para></listitem>
<listitem><para>Ruby bindings are not currently installed.</para></listitem>
<listitem><para>Java bindings are not currently installed.</para></listitem>
<listitem><para>Go bindings are not currently installed.</para></listitem>
</itemizedlist>

8 changes: 4 additions & 4 deletions nixos/modules/virtualisation/virtualbox-host.nix
Original file line number Diff line number Diff line change
@@ -6,7 +6,7 @@ let
cfg = config.virtualisation.virtualbox.host;

virtualbox = pkgs.virtualbox.override {
inherit (cfg) enableHardening headless;
inherit (cfg) enableExtensionPack enableHardening headless;
};

kernelModules = config.boot.kernelPackages.virtualbox.override {
@@ -17,9 +17,7 @@ in

{
options.virtualisation.virtualbox.host = {
enable = mkOption {
type = types.bool;
default = false;
enable = mkEnableOption "VirtualBox" // {
description = ''
Whether to enable VirtualBox.
@@ -30,6 +28,8 @@ in
'';
};

enableExtensionPack = mkEnableOption "VirtualBox extension pack";

addNetworkInterface = mkOption {
type = types.bool;
default = true;
6 changes: 3 additions & 3 deletions pkgs/applications/altcoins/parity/beta.nix
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
let
version = "1.10.0";
sha256 = "0dmdd7qa8lww5bzcdn25nkyz6334irh8hw0y1j0yc2pmd2dny99g";
cargoSha256 = "0whkjbaq40mqva1ayqnmz2ppqjrg35va93cypx1al41rsp1yc37m";
version = "1.10.2";
sha256 = "1a1rbwlwi60nfv6m1rdy5baq5lcafc8nw96y45pr1674i48gkp0l";
cargoSha256 = "0l3rjkinzppfq8fi8h24r35rb552fzzman5a6yk33wlsdj2lv7yh";
patches = [ ./patches/vendored-sources-1.10.patch ];
in
import ./parity.nix { inherit version sha256 cargoSha256 patches; }
6 changes: 3 additions & 3 deletions pkgs/applications/altcoins/parity/default.nix
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
let
version = "1.9.5";
sha256 = "0f2x78p5bshs3678qcybqd34k83d294mp3vadp99iqhmbkhbfyy7";
cargoSha256 = "1irc01sva5yyhdv79cs6jk5pbmhxyvs0ja4cly4nw639m1kx7rva";
version = "1.9.7";
sha256 = "1h9rmyqkdv2v83g12dadgqflq1n1qqgd5hrpy20ajha0qpbiv3ph";
cargoSha256 = "0ss5jw43850r8l34prai5vk1zd5d5fjyg4rcav1asbq6v683bww0";
patches = [ ./patches/vendored-sources-1.9.patch ];
in
import ./parity.nix { inherit version sha256 cargoSha256 patches; }
Original file line number Diff line number Diff line change
@@ -2,7 +2,7 @@ diff --git a/.cargo/config b/.cargo/config
index 72652ad2f..b21c6aa7b 100644
--- a/.cargo/config
+++ b/.cargo/config
@@ -1,3 +1,113 @@
@@ -1,3 +1,108 @@
[target.x86_64-pc-windows-msvc]
# Link the C runtime statically ; https://github.com/paritytech/parity/issues/6643
rustflags = ["-Ctarget-feature=+crt-static"]
@@ -42,6 +42,11 @@ index 72652ad2f..b21c6aa7b 100644
+rev = "eecaadcb9e421bce31e91680d14a20bbd38f92a2"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/app-dirs-rs"]
+git = "https://github.com/paritytech/app-dirs-rs"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/bn"]
+git = "https://github.com/paritytech/bn"
+branch = "master"
@@ -97,16 +102,6 @@ index 72652ad2f..b21c6aa7b 100644
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/wasm-utils"]
+git = "https://github.com/paritytech/wasm-utils"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/wasmi"]
+git = "https://github.com/paritytech/wasmi"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/tailhook/rotor"]
+git = "https://github.com/tailhook/rotor"
+branch = "master"
@@ -116,3 +111,4 @@ index 72652ad2f..b21c6aa7b 100644
+git = "https://github.com/tomusdrw/ws-rs"
+branch = "master"
+replace-with = "vendored-sources"
+
Original file line number Diff line number Diff line change
@@ -1,10 +1,9 @@
diff --git a/.cargo/config b/.cargo/config
new file mode 100644
index 000000000..0efb69724
--- /dev/null
--- /dev/null
+++ b/.cargo/config
@@ -0,0 +1,100 @@
+
@@ -0,0 +1,94 @@
+[source."https://github.com/alexcrichton/mio-named-pipes"]
+git = "https://github.com/alexcrichton/mio-named-pipes"
+branch = "master"
@@ -30,6 +29,11 @@ index 000000000..0efb69724
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/app-dirs-rs"]
+git = "https://github.com/paritytech/app-dirs-rs"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/bn"]
+git = "https://github.com/paritytech/bn"
+branch = "master"
@@ -85,16 +89,6 @@ index 000000000..0efb69724
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/wasm-utils"]
+git = "https://github.com/paritytech/wasm-utils"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/paritytech/wasmi"]
+git = "https://github.com/paritytech/wasmi"
+branch = "master"
+replace-with = "vendored-sources"
+
+[source."https://github.com/tailhook/rotor"]
+git = "https://github.com/tailhook/rotor"
+branch = "master"
Loading