Skip to content

Commit 8c878fe

Browse files
committed
build: bump flake, sphinx, python
1 parent 73a807f commit 8c878fe

File tree

3 files changed

+37
-19
lines changed

3 files changed

+37
-19
lines changed

flake.lock

+27-9
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

flake.nix

+8-8
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,11 @@
1212

1313
outputs = { self, nixpkgs, flake-utils, flake-compat, sphinx-exec-haskell }:
1414
let press-theme-overlay = final: prev: {
15-
sphinx-press-theme = prev.python310Packages.buildPythonPackage rec {
15+
sphinx-press-theme = prev.python311Packages.buildPythonPackage rec {
1616
pname = "sphinx_press_theme";
1717
version = "0.8.0";
1818

19-
src = prev.python3Packages.fetchPypi {
19+
src = prev.python311Packages.fetchPypi {
2020
inherit pname;
2121
inherit version;
2222
sha256 = "sha256-KITKqx3AHssR0VjU3W0xeeLdl81IUWx2nMJzYCcuYrM=";
@@ -26,25 +26,25 @@
2626
};
2727

2828
copy-button-overlay = final: prev: {
29-
sphinx-copybutton = prev.python310Packages.buildPythonPackage rec {
29+
sphinx-copybutton = prev.python311Packages.buildPythonPackage rec {
3030
pname = "sphinx-copybutton";
31-
version = "0.5.0";
31+
version = "0.5.2";
3232

33-
src = prev.python3Packages.fetchPypi {
33+
src = prev.python311Packages.fetchPypi {
3434
inherit pname;
3535
inherit version;
36-
sha256 = "sha256-oMBZ2q3QPCe6dQ2lNKkqY+ejanc23PaE8m7jRhmXh/Y=";
36+
sha256 = "sha256-TPF8gvuWRtG8nKkqwoCBOjtgXYxCEiX9mRMVQQPuH70=";
3737
};
3838
propagatedBuildInputs = [ prev.sphinx ];
3939
};
4040
};
4141

4242
sphinx-exec-directive-overlay = final: prev: {
43-
sphinx-exec-directive = prev.python310Packages.buildPythonPackage rec {
43+
sphinx-exec-directive = prev.python311Packages.buildPythonPackage rec {
4444
pname = "sphinx-exec-directive";
4545
version = "0.6";
4646

47-
src = prev.python310Packages.fetchPypi {
47+
src = prev.python311Packages.fetchPypi {
4848
inherit pname;
4949
inherit version;
5050
sha256 = "sha256-lMo4QILqt6pEiIatN/LNxhiUGX3ziSWV+bfRahzmZWU=";

src/Case_Studies/klister.rst

+2-2
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ spot inefficient data structure use by reading code, and GHC's profiling tools
2121
to diagnose memory performance issues and identify hot code. To read through the
2222
code, `this commit
2323
<https://github.com/gelisam/klister/commit/33501b2233ce865407a8a3ca7c090457f3375442>`__
24-
is the result of the case study, and `this commit
24+
is the result of the case study, and `here
2525
<https://github.com/gelisam/klister/tree/5aea4d2b9df8f6e9db276078570c1e1bd1306cd3>`__
26-
was the state of the klister code base that the tutorial starts with.
26+
is the state of the klister code base that the tutorial starts with.
2727

2828
The rest of the chapter is structured as follows. We introduce the |klister|
2929
interpreter and perform a performance minded code review. We then use the

0 commit comments

Comments
 (0)