Merge remote-tracking branch 'origin/staging-next' into staging

K900 007b4f3e d91621c5

+2799 -1313
+3
.git-blame-ignore-revs
··· 212 212 213 213 # format files with nixfmt (#347275) 214 214 adb9714bd909df283c66bbd641bd631ff50a4260 215 + 216 + # treewide: incus packages 217 + 9ab59bb5fb943ad6740f64f5a79eae9642fb8211
+1 -1
CONTRIBUTING.md
··· 345 345 Here's a brief overview of the main Git branches and what channels they're used for: 346 346 347 347 - `master`: The main branch, used for the unstable channels such as `nixpkgs-unstable`, `nixos-unstable` and `nixos-unstable-small`. 348 - - `release-YY.MM` (e.g. `release-24.11`): The NixOS release branches, used for the stable channels such as `nixos-24.11`, `nixos-24.11-small` and `nixpkgs-24.11-darwin`. 348 + - `release-YY.MM` (e.g. `release-25.05`): The NixOS release branches, used for the stable channels such as `nixos-25.05`, `nixos-25.05-small` and `nixpkgs-25.05-darwin`. 349 349 350 350 When a channel is updated, a corresponding Git branch is also updated to point to the corresponding commit. 351 351 So e.g. the [`nixpkgs-unstable` branch](https://github.com/nixos/nixpkgs/tree/nixpkgs-unstable) corresponds to the Git commit from the [`nixpkgs-unstable` channel](https://channels.nixos.org/nixpkgs-unstable).
+2 -2
README.md
··· 52 52 system, [Hydra](https://hydra.nixos.org/). 53 53 54 54 * [Continuous package builds for unstable/master](https://hydra.nixos.org/jobset/nixos/trunk-combined) 55 - * [Continuous package builds for the NixOS 24.05 release](https://hydra.nixos.org/jobset/nixos/release-24.05) 55 + * [Continuous package builds for the NixOS 24.11 release](https://hydra.nixos.org/jobset/nixos/release-24.11) 56 56 * [Tests for unstable/master](https://hydra.nixos.org/job/nixos/trunk-combined/tested#tabs-constituents) 57 - * [Tests for the NixOS 24.05 release](https://hydra.nixos.org/job/nixos/release-24.05/tested#tabs-constituents) 57 + * [Tests for the NixOS 24.11 release](https://hydra.nixos.org/job/nixos/release-24.11/tested#tabs-constituents) 58 58 59 59 Artifacts successfully built with Hydra are published to cache at 60 60 https://cache.nixos.org/. When successful build and test criteria are
+5
maintainers/maintainer-list.nix
··· 16805 16805 githubId = 33826198; 16806 16806 name = "Philipp Arras"; 16807 16807 }; 16808 + parth = { 16809 + github = "parth"; 16810 + githubId = 821972; 16811 + name = "Parth Mehrotra"; 16812 + }; 16808 16813 pashashocky = { 16809 16814 email = "pashashocky@gmail.com"; 16810 16815 github = "pashashocky";
+8 -8
nixos/doc/manual/installation/upgrading.chapter.md
··· 6 6 automatically from NixOS's Git repository after certain tests have 7 7 passed and all packages have been built. These channels are: 8 8 9 - - *Stable channels*, such as [`nixos-24.05`](https://channels.nixos.org/nixos-24.05). 9 + - *Stable channels*, such as [`nixos-24.11`](https://channels.nixos.org/nixos-24.11). 10 10 These only get conservative bug fixes and package upgrades. For 11 11 instance, a channel update may cause the Linux kernel on your system 12 12 to be upgraded from 4.19.34 to 4.19.38 (a minor bug fix), but not ··· 19 19 radical changes between channel updates. It's not recommended for 20 20 production systems. 21 21 22 - - *Small channels*, such as [`nixos-24.05-small`](https://channels.nixos.org/nixos-24.05-small) 22 + - *Small channels*, such as [`nixos-24.11-small`](https://channels.nixos.org/nixos-24.11-small) 23 23 or [`nixos-unstable-small`](https://channels.nixos.org/nixos-unstable-small). 24 24 These are identical to the stable and unstable channels described above, 25 25 except that they contain fewer binary packages. This means they get updated ··· 38 38 39 39 When you first install NixOS, you're automatically subscribed to the 40 40 NixOS channel that corresponds to your installation source. For 41 - instance, if you installed from a 24.05 ISO, you will be subscribed to 42 - the `nixos-24.05` channel. To see which NixOS channel you're subscribed 41 + instance, if you installed from a 24.11 ISO, you will be subscribed to 42 + the `nixos-24.11` channel. To see which NixOS channel you're subscribed 43 43 to, run the following as root: 44 44 45 45 ```ShellSession ··· 54 54 ``` 55 55 56 56 (Be sure to include the `nixos` parameter at the end.) For instance, to 57 - use the NixOS 24.05 stable channel: 57 + use the NixOS 24.11 stable channel: 58 58 59 59 ```ShellSession 60 - # nix-channel --add https://channels.nixos.org/nixos-24.05 nixos 60 + # nix-channel --add https://channels.nixos.org/nixos-24.11 nixos 61 61 ``` 62 62 63 63 If you have a server, you may want to use the "small" channel instead: 64 64 65 65 ```ShellSession 66 - # nix-channel --add https://channels.nixos.org/nixos-24.05-small nixos 66 + # nix-channel --add https://channels.nixos.org/nixos-24.11-small nixos 67 67 ``` 68 68 69 69 And if you want to live on the bleeding edge: ··· 117 117 118 118 ```nix 119 119 { 120 - system.autoUpgrade.channel = "https://channels.nixos.org/nixos-24.05"; 120 + system.autoUpgrade.channel = "https://channels.nixos.org/nixos-24.11"; 121 121 } 122 122 ```
+1 -1
nixos/doc/manual/release-notes/rl-2411.section.md
··· 1 - # Release 24.11 (“Vicuña”, 2024.11/??) {#sec-release-24.11} 1 + # Release 24.11 (“Vicuña”, 2024.11/28) {#sec-release-24.11} 2 2 3 3 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. --> 4 4
+1 -1
nixos/modules/programs/java.nix
··· 67 67 environment.systemPackages = [ cfg.package ]; 68 68 69 69 environment.shellInit = '' 70 - test -e ${cfg.package}/nix-support/setup-hook && source ${cfg.package}/nix-support/setup-hook 70 + test -e ${cfg.package}/nix-support/setup-hook && . ${cfg.package}/nix-support/setup-hook 71 71 ''; 72 72 73 73 };
+76 -15
nixos/modules/services/networking/zapret.nix
··· 8 8 cfg = config.services.zapret; 9 9 10 10 whitelist = lib.optionalString ( 11 - cfg.whitelist != null 11 + (builtins.length cfg.whitelist) != 0 12 12 ) "--hostlist ${pkgs.writeText "zapret-whitelist" (lib.concatStringsSep "\n" cfg.whitelist)}"; 13 13 14 14 blacklist = 15 - lib.optionalString (cfg.blacklist != null) 15 + lib.optionalString ((builtins.length cfg.blacklist) != 0) 16 16 "--hostlist-exclude ${pkgs.writeText "zapret-blacklist" (lib.concatStringsSep "\n" cfg.blacklist)}"; 17 17 18 - ports = if cfg.httpSupport then "80,443" else "443"; 18 + params = lib.concatStringsSep " " cfg.params; 19 + 20 + qnum = toString cfg.qnum; 19 21 in 20 22 { 21 23 options.services.zapret = { ··· 29 31 "--dpi-desync=fake,disorder2" 30 32 "--dpi-desync-ttl=1" 31 33 "--dpi-desync-autottl=2" 32 - ]; 34 + ] 33 35 ''; 34 36 description = '' 35 37 Specify the bypass parameters for Zapret binary. ··· 40 42 ''; 41 43 }; 42 44 whitelist = lib.mkOption { 43 - default = null; 44 - type = with lib.types; nullOr (listOf str); 45 + default = [ ]; 46 + type = with lib.types; listOf str; 45 47 example = '' 46 48 [ 47 49 "youtube.com" ··· 59 61 ''; 60 62 }; 61 63 blacklist = lib.mkOption { 62 - default = null; 63 - type = with lib.types; nullOr (listOf str); 64 + default = [ ]; 65 + type = with lib.types; listOf str; 64 66 example = '' 65 67 [ 66 68 "example.com" ··· 96 98 Http bypass rarely works and you might want to disable it if you don't utilise http connections. 97 99 ''; 98 100 }; 101 + httpMode = lib.mkOption { 102 + default = "first"; 103 + type = lib.types.enum [ 104 + "first" 105 + "full" 106 + ]; 107 + example = "full"; 108 + description = '' 109 + By default this service only changes the first packet sent, which is enough in most cases. 110 + But there are DPIs that monitor the whole traffic within a session. 111 + That requires full processing of every packet, which increases the CPU usage. 112 + 113 + Set the mode to `full` if http doesn't work. 114 + ''; 115 + }; 116 + udpSupport = lib.mkOption { 117 + default = false; 118 + type = lib.types.bool; 119 + description = '' 120 + Enable UDP routing. 121 + This requires you to specify `udpPorts` and `--dpi-desync-any-protocol` parameter. 122 + ''; 123 + }; 124 + udpPorts = lib.mkOption { 125 + default = [ ]; 126 + type = with lib.types; listOf str; 127 + example = '' 128 + [ 129 + "50000:50099" 130 + "1234" 131 + ] 132 + ''; 133 + description = '' 134 + List of UDP ports to route. 135 + Port ranges are delimited with a colon like this "50000:50099". 136 + ''; 137 + }; 99 138 }; 100 139 101 140 config = lib.mkIf cfg.enable ( ··· 103 142 { 104 143 assertions = [ 105 144 { 106 - assertion = (cfg.whitelist == null) || (cfg.blacklist == null); 145 + assertion = (builtins.length cfg.whitelist) == 0 || (builtins.length cfg.blacklist) == 0; 107 146 message = "Can't specify both whitelist and blacklist."; 108 147 } 109 148 { 110 149 assertion = (builtins.length cfg.params) != 0; 111 150 message = "You have to specify zapret parameters. See the params option's description."; 112 151 } 152 + { 153 + assertion = cfg.udpSupport -> (builtins.length cfg.udpPorts) != 0; 154 + message = "You have to specify UDP ports or disable UDP support."; 155 + } 156 + { 157 + assertion = !cfg.configureFirewall || !config.networking.nftables.enable; 158 + message = "You need to manually configure you firewall for Zapret service when using nftables."; 159 + } 113 160 ]; 114 161 115 162 systemd.services.zapret = { ··· 117 164 wantedBy = [ "multi-user.target" ]; 118 165 after = [ "network.target" ]; 119 166 serviceConfig = { 120 - ExecStart = "${cfg.package}/bin/nfqws --pidfile=/run/nfqws.pid ${lib.concatStringsSep " " cfg.params} ${whitelist} ${blacklist} --qnum=${toString cfg.qnum}"; 167 + ExecStart = "${cfg.package}/bin/nfqws --pidfile=/run/nfqws.pid ${params} ${whitelist} ${blacklist} --qnum=${qnum}"; 121 168 Type = "simple"; 122 169 PIDFile = "/run/nfqws.pid"; 123 170 Restart = "always"; 124 - RuntimeMaxSec = "1h"; # This service loves to crash silently or cause network slowdowns. It also restarts instantly. In my experience restarting it hourly provided the best experience. 171 + RuntimeMaxSec = "1h"; # This service loves to crash silently or cause network slowdowns. It also restarts instantly. Restarting it at least hourly provided the best experience. 125 172 126 - # hardening 173 + # Hardening. 127 174 DevicePolicy = "closed"; 128 175 KeyringMode = "private"; 129 176 PrivateTmp = true; ··· 145 192 146 193 # Route system traffic via service for specified ports. 147 194 (lib.mkIf cfg.configureFirewall { 148 - networking.firewall.extraCommands = '' 149 - iptables -t mangle -I POSTROUTING -p tcp -m multiport --dports ${ports} -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000 -j NFQUEUE --queue-num ${toString cfg.qnum} --queue-bypass 150 - ''; 195 + networking.firewall.extraCommands = 196 + let 197 + httpParams = lib.optionalString ( 198 + cfg.httpMode == "first" 199 + ) "-m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6"; 200 + 201 + udpPorts = lib.concatStringsSep "," cfg.udpPorts; 202 + in 203 + '' 204 + ip46tables -t mangle -I POSTROUTING -p tcp --dport 443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000 -j NFQUEUE --queue-num ${qnum} --queue-bypass 205 + '' 206 + + lib.optionalString (cfg.httpSupport) '' 207 + ip46tables -t mangle -I POSTROUTING -p tcp --dport 80 ${httpParams} -m mark ! --mark 0x40000000/0x40000000 -j NFQUEUE --queue-num ${qnum} --queue-bypass 208 + '' 209 + + lib.optionalString (cfg.udpSupport) '' 210 + ip46tables -t mangle -A POSTROUTING -p udp -m multiport --dports ${udpPorts} -m mark ! --mark 0x40000000/0x40000000 -j NFQUEUE --queue-num ${qnum} --queue-bypass 211 + ''; 151 212 }) 152 213 ] 153 214 );
+1 -1
nixos/modules/services/web-apps/moodle.nix
··· 56 56 mysqlLocal = cfg.database.createLocally && cfg.database.type == "mysql"; 57 57 pgsqlLocal = cfg.database.createLocally && cfg.database.type == "pgsql"; 58 58 59 - phpExt = pkgs.php81.buildEnv { 59 + phpExt = pkgs.php83.buildEnv { 60 60 extensions = { all, ... }: with all; [ iconv mbstring curl openssl tokenizer soap ctype zip gd simplexml dom intl sqlite3 pgsql pdo_sqlite pdo_pgsql pdo_odbc pdo_mysql pdo mysqli session zlib xmlreader fileinfo filter opcache exif sodium ]; 61 61 extraConfig = "max_input_vars = 5000"; 62 62 };
+67 -42
nixos/modules/virtualisation/lxc-image-metadata.nix
··· 1 - { lib, config, pkgs, ... }: 1 + { 2 + lib, 3 + config, 4 + pkgs, 5 + ... 6 + }: 2 7 3 8 let 4 - templateSubmodule = {...}: { 5 - options = { 6 - enable = lib.mkEnableOption "this template"; 9 + templateSubmodule = 10 + { ... }: 11 + { 12 + options = { 13 + enable = lib.mkEnableOption "this template"; 7 14 8 - target = lib.mkOption { 9 - description = "Path in the container"; 10 - type = lib.types.path; 11 - }; 12 - template = lib.mkOption { 13 - description = ".tpl file for rendering the target"; 14 - type = lib.types.path; 15 - }; 16 - when = lib.mkOption { 17 - description = "Events which trigger a rewrite (create, copy)"; 18 - type = lib.types.listOf (lib.types.str); 19 - }; 20 - properties = lib.mkOption { 21 - description = "Additional properties"; 22 - type = lib.types.attrs; 23 - default = {}; 15 + target = lib.mkOption { 16 + description = "Path in the container"; 17 + type = lib.types.path; 18 + }; 19 + template = lib.mkOption { 20 + description = ".tpl file for rendering the target"; 21 + type = lib.types.path; 22 + }; 23 + when = lib.mkOption { 24 + description = "Events which trigger a rewrite (create, copy)"; 25 + type = lib.types.listOf (lib.types.str); 26 + }; 27 + properties = lib.mkOption { 28 + description = "Additional properties"; 29 + type = lib.types.attrs; 30 + default = { }; 31 + }; 24 32 }; 25 33 }; 26 - }; 27 34 28 - toYAML = name: data: pkgs.writeText name (lib.generators.toYAML {} data); 35 + toYAML = name: data: pkgs.writeText name (lib.generators.toYAML { } data); 29 36 30 37 cfg = config.virtualisation.lxc; 31 - templates = if cfg.templates != {} then let 32 - list = lib.mapAttrsToList (name: value: { inherit name; } // value) 33 - (lib.filterAttrs (name: value: value.enable) cfg.templates); 34 - in 35 - { 36 - files = map (tpl: { 37 - source = tpl.template; 38 - target = "/templates/${tpl.name}.tpl"; 39 - }) list; 40 - properties = lib.listToAttrs (map (tpl: lib.nameValuePair tpl.target { 41 - when = tpl.when; 42 - template = "${tpl.name}.tpl"; 43 - properties = tpl.properties; 44 - }) list); 45 - } 46 - else { files = []; properties = {}; }; 38 + templates = 39 + if cfg.templates != { } then 40 + let 41 + list = lib.mapAttrsToList (name: value: { inherit name; } // value) ( 42 + lib.filterAttrs (name: value: value.enable) cfg.templates 43 + ); 44 + in 45 + { 46 + files = map (tpl: { 47 + source = tpl.template; 48 + target = "/templates/${tpl.name}.tpl"; 49 + }) list; 50 + properties = lib.listToAttrs ( 51 + map ( 52 + tpl: 53 + lib.nameValuePair tpl.target { 54 + when = tpl.when; 55 + template = "${tpl.name}.tpl"; 56 + properties = tpl.properties; 57 + } 58 + ) list 59 + ); 60 + } 61 + else 62 + { 63 + files = [ ]; 64 + properties = { }; 65 + }; 47 66 48 - in { 67 + in 68 + { 49 69 imports = [ 50 70 ../image/file-options.nix 51 71 ]; ··· 59 79 templates = lib.mkOption { 60 80 description = "Templates for LXD"; 61 81 type = lib.types.attrsOf (lib.types.submodule templateSubmodule); 62 - default = {}; 82 + default = { }; 63 83 example = lib.literalExpression '' 64 84 { 65 85 # create /etc/hostname on container creation ··· 91 111 }; 92 112 93 113 config = { 94 - system.nixos.tags = [ "lxc" "metadata" ]; 114 + system.nixos.tags = [ 115 + "lxc" 116 + "metadata" 117 + ]; 95 118 image.extension = "tar.xz"; 96 119 image.filePath = "tarball/${config.image.fileName}"; 97 120 system.build.image = config.system.build.metadata; ··· 100 123 contents = [ 101 124 { 102 125 source = toYAML "metadata.yaml" { 103 - architecture = builtins.elemAt (builtins.match "^([a-z0-9_]+).+" (toString pkgs.stdenv.hostPlatform.system)) 0; 126 + architecture = builtins.elemAt (builtins.match "^([a-z0-9_]+).+" ( 127 + toString pkgs.stdenv.hostPlatform.system 128 + )) 0; 104 129 creation_date = 1; 105 130 properties = { 106 131 description = "${config.system.nixos.distroName} ${config.system.nixos.codeName} ${config.system.nixos.label} ${pkgs.stdenv.hostPlatform.system}";
+1 -1
nixos/modules/virtualisation/lxc-instance-common.nix
··· 1 - {lib, ...}: 1 + { lib, ... }: 2 2 3 3 { 4 4 meta = {
+53 -48
nixos/modules/virtualisation/lxc.nix
··· 1 1 # LXC Configuration 2 2 3 - { config, lib, pkgs, ... }: 3 + { 4 + config, 5 + lib, 6 + pkgs, 7 + ... 8 + }: 4 9 5 10 let 6 11 cfg = config.virtualisation.lxc; ··· 12 17 }; 13 18 14 19 options.virtualisation.lxc = { 15 - enable = 16 - lib.mkOption { 17 - type = lib.types.bool; 18 - default = false; 19 - description = '' 20 - This enables Linux Containers (LXC), which provides tools 21 - for creating and managing system or application containers 22 - on Linux. 23 - ''; 24 - }; 20 + enable = lib.mkOption { 21 + type = lib.types.bool; 22 + default = false; 23 + description = '' 24 + This enables Linux Containers (LXC), which provides tools 25 + for creating and managing system or application containers 26 + on Linux. 27 + ''; 28 + }; 25 29 26 30 unprivilegedContainers = lib.mkEnableOption "support for unprivileged users to launch containers"; 27 31 28 - systemConfig = 29 - lib.mkOption { 30 - type = lib.types.lines; 31 - default = ""; 32 - description = '' 33 - This is the system-wide LXC config. See 34 - {manpage}`lxc.system.conf(5)`. 35 - ''; 36 - }; 32 + systemConfig = lib.mkOption { 33 + type = lib.types.lines; 34 + default = ""; 35 + description = '' 36 + This is the system-wide LXC config. See 37 + {manpage}`lxc.system.conf(5)`. 38 + ''; 39 + }; 37 40 package = lib.mkPackageOption pkgs "lxc" { }; 38 41 39 - defaultConfig = 40 - lib.mkOption { 41 - type = lib.types.lines; 42 - default = ""; 43 - description = '' 44 - Default config (default.conf) for new containers, i.e. for 45 - network config. See {manpage}`lxc.container.conf(5)`. 46 - ''; 47 - }; 42 + defaultConfig = lib.mkOption { 43 + type = lib.types.lines; 44 + default = ""; 45 + description = '' 46 + Default config (default.conf) for new containers, i.e. for 47 + network config. See {manpage}`lxc.container.conf(5)`. 48 + ''; 49 + }; 48 50 49 - usernetConfig = 50 - lib.mkOption { 51 - type = lib.types.lines; 52 - default = ""; 53 - description = '' 54 - This is the config file for managing unprivileged user network 55 - administration access in LXC. See {manpage}`lxc-usernet(5)`. 56 - ''; 57 - }; 51 + usernetConfig = lib.mkOption { 52 + type = lib.types.lines; 53 + default = ""; 54 + description = '' 55 + This is the config file for managing unprivileged user network 56 + administration access in LXC. See {manpage}`lxc-usernet(5)`. 57 + ''; 58 + }; 58 59 59 - bridgeConfig = 60 - lib.mkOption { 61 - type = lib.types.lines; 62 - default = ""; 63 - description = '' 64 - This is the config file for override lxc-net bridge default settings. 65 - ''; 66 - }; 60 + bridgeConfig = lib.mkOption { 61 + type = lib.types.lines; 62 + default = ""; 63 + description = '' 64 + This is the config file for override lxc-net bridge default settings. 65 + ''; 66 + }; 67 67 }; 68 68 69 69 ###### implementation ··· 88 88 }; 89 89 90 90 # We don't need the `lxc-user` group, unless the unprivileged containers are enabled. 91 - users.groups = lib.mkIf cfg.unprivilegedContainers { lxc-user = {}; }; 91 + users.groups = lib.mkIf cfg.unprivilegedContainers { lxc-user = { }; }; 92 92 93 93 # `lxc-user-nic` needs suid to attach to bridge for unpriv containers. 94 94 security.wrappers = lib.mkIf cfg.unprivilegedContainers { ··· 108 108 lxc-net = { 109 109 enable = true; 110 110 wantedBy = [ "multi-user.target" ]; 111 - path = [ pkgs.iproute2 pkgs.iptables pkgs.getent pkgs.dnsmasq ]; 111 + path = [ 112 + pkgs.iproute2 113 + pkgs.iptables 114 + pkgs.getent 115 + pkgs.dnsmasq 116 + ]; 112 117 }; 113 118 }; 114 119 };
+25 -20
nixos/modules/virtualisation/lxcfs.nix
··· 1 1 # LXC Configuration 2 2 3 - { config, lib, pkgs, ... }: 3 + { 4 + config, 5 + lib, 6 + pkgs, 7 + ... 8 + }: 4 9 5 10 let 6 11 cfg = config.virtualisation.lxc.lxcfs; 7 - in { 12 + in 13 + { 8 14 meta = { 9 15 maintainers = lib.teams.lxc.members; 10 16 }; 11 17 12 18 ###### interface 13 19 options.virtualisation.lxc.lxcfs = { 14 - enable = 15 - lib.mkOption { 16 - type = lib.types.bool; 17 - default = false; 18 - description = '' 19 - This enables LXCFS, a FUSE filesystem for LXC. 20 - To use lxcfs in include the following configuration in your 21 - container configuration: 22 - ``` 23 - virtualisation.lxc.defaultConfig = "lxc.include = ''${pkgs.lxcfs}/share/lxc/config/common.conf.d/00-lxcfs.conf"; 24 - ``` 25 - ''; 26 - }; 20 + enable = lib.mkOption { 21 + type = lib.types.bool; 22 + default = false; 23 + description = '' 24 + This enables LXCFS, a FUSE filesystem for LXC. 25 + To use lxcfs in include the following configuration in your 26 + container configuration: 27 + ``` 28 + virtualisation.lxc.defaultConfig = "lxc.include = ''${pkgs.lxcfs}/share/lxc/config/common.conf.d/00-lxcfs.conf"; 29 + ``` 30 + ''; 31 + }; 27 32 }; 28 33 29 34 ###### implementation ··· 34 39 before = [ "lxc.service" ]; 35 40 restartIfChanged = false; 36 41 serviceConfig = { 37 - ExecStartPre="${pkgs.coreutils}/bin/mkdir -p /var/lib/lxcfs"; 38 - ExecStart="${pkgs.lxcfs}/bin/lxcfs /var/lib/lxcfs"; 39 - ExecStopPost="-${pkgs.fuse}/bin/fusermount -u /var/lib/lxcfs"; 40 - KillMode="process"; 41 - Restart="on-failure"; 42 + ExecStartPre = "${pkgs.coreutils}/bin/mkdir -p /var/lib/lxcfs"; 43 + ExecStart = "${pkgs.lxcfs}/bin/lxcfs /var/lib/lxcfs"; 44 + ExecStopPost = "-${pkgs.fuse}/bin/fusermount -u /var/lib/lxcfs"; 45 + KillMode = "process"; 46 + Restart = "on-failure"; 42 47 }; 43 48 }; 44 49 };
+122 -108
nixos/tests/incus/container.nix
··· 1 - import ../make-test-python.nix ({ pkgs, lib, extra ? {}, name ? "incus-container", incus ? pkgs.incus-lts, ... } : 1 + import ../make-test-python.nix ( 2 + { 3 + pkgs, 4 + lib, 5 + extra ? { }, 6 + name ? "incus-container", 7 + incus ? pkgs.incus-lts, 8 + ... 9 + }: 2 10 3 - let 4 - releases = import ../../release.nix { 5 - configuration = lib.recursiveUpdate { 11 + let 12 + releases = import ../../release.nix { 13 + configuration = lib.recursiveUpdate { 6 14 # Building documentation makes the test unnecessarily take a longer time: 7 15 documentation.enable = lib.mkForce false; 8 16 9 17 boot.kernel.sysctl."net.ipv4.ip_forward" = "1"; 10 - } 11 - extra; 12 - }; 18 + } extra; 19 + }; 13 20 14 - container-image-metadata = "${releases.incusContainerMeta.${pkgs.stdenv.hostPlatform.system}}/tarball/nixos-system-${pkgs.stdenv.hostPlatform.system}.tar.xz"; 15 - container-image-rootfs = "${releases.incusContainerImage.${pkgs.stdenv.hostPlatform.system}}/nixos-lxc-image-${pkgs.stdenv.hostPlatform.system}.squashfs"; 16 - in 17 - { 18 - inherit name; 21 + container-image-metadata = "${ 22 + releases.incusContainerMeta.${pkgs.stdenv.hostPlatform.system} 23 + }/tarball/nixos-image-lxc-*-${pkgs.stdenv.hostPlatform.system}.tar.xz"; 24 + container-image-rootfs = "${ 25 + releases.incusContainerImage.${pkgs.stdenv.hostPlatform.system} 26 + }/nixos-lxc-image-${pkgs.stdenv.hostPlatform.system}.squashfs"; 27 + in 28 + { 29 + inherit name; 19 30 20 - meta = { 21 - maintainers = lib.teams.lxc.members; 22 - }; 31 + meta = { 32 + maintainers = lib.teams.lxc.members; 33 + }; 23 34 24 - nodes.machine = { ... }: { 25 - virtualisation = { 26 - # Ensure test VM has enough resources for creating and managing guests 27 - cores = 2; 28 - memorySize = 1024; 29 - diskSize = 4096; 35 + nodes.machine = 36 + { ... }: 37 + { 38 + virtualisation = { 39 + # Ensure test VM has enough resources for creating and managing guests 40 + cores = 2; 41 + memorySize = 1024; 42 + diskSize = 4096; 30 43 31 - incus = { 32 - enable = true; 33 - package = incus; 44 + incus = { 45 + enable = true; 46 + package = incus; 47 + }; 48 + }; 49 + networking.nftables.enable = true; 34 50 }; 35 - }; 36 - networking.nftables.enable = true; 37 - }; 38 51 39 - testScript = # python 40 - '' 41 - def instance_is_up(_) -> bool: 42 - status, _ = machine.execute("incus exec container --disable-stdin --force-interactive /run/current-system/sw/bin/systemctl -- is-system-running") 43 - return status == 0 52 + testScript = # python 53 + '' 54 + def instance_is_up(_) -> bool: 55 + status, _ = machine.execute("incus exec container --disable-stdin --force-interactive /run/current-system/sw/bin/systemctl -- is-system-running") 56 + return status == 0 44 57 45 - def set_container(config): 46 - machine.succeed(f"incus config set container {config}") 47 - machine.succeed("incus restart container") 48 - with machine.nested("Waiting for instance to start and be usable"): 49 - retry(instance_is_up) 58 + def set_container(config): 59 + machine.succeed(f"incus config set container {config}") 60 + machine.succeed("incus restart container") 61 + with machine.nested("Waiting for instance to start and be usable"): 62 + retry(instance_is_up) 50 63 51 - def check_sysctl(instance): 52 - with subtest("systemd sysctl settings are applied"): 53 - machine.succeed(f"incus exec {instance} -- systemctl status systemd-sysctl") 54 - sysctl = machine.succeed(f"incus exec {instance} -- sysctl net.ipv4.ip_forward").strip().split(" ")[-1] 55 - assert "1" == sysctl, f"systemd-sysctl configuration not correctly applied, {sysctl} != 1" 64 + def check_sysctl(instance): 65 + with subtest("systemd sysctl settings are applied"): 66 + machine.succeed(f"incus exec {instance} -- systemctl status systemd-sysctl") 67 + sysctl = machine.succeed(f"incus exec {instance} -- sysctl net.ipv4.ip_forward").strip().split(" ")[-1] 68 + assert "1" == sysctl, f"systemd-sysctl configuration not correctly applied, {sysctl} != 1" 56 69 57 - machine.wait_for_unit("incus.service") 70 + machine.wait_for_unit("incus.service") 58 71 59 - # no preseed should mean no service 60 - machine.fail("systemctl status incus-preseed.service") 72 + # no preseed should mean no service 73 + machine.fail("systemctl status incus-preseed.service") 61 74 62 - machine.succeed("incus admin init --minimal") 75 + machine.succeed("incus admin init --minimal") 63 76 64 - with subtest("Container image can be imported"): 65 - machine.succeed("incus image import ${container-image-metadata} ${container-image-rootfs} --alias nixos") 77 + with subtest("Container image can be imported"): 78 + machine.succeed("incus image import ${container-image-metadata} ${container-image-rootfs} --alias nixos") 66 79 67 - with subtest("Container can be launched and managed"): 68 - machine.succeed("incus launch nixos container") 69 - with machine.nested("Waiting for instance to start and be usable"): 70 - retry(instance_is_up) 71 - machine.succeed("echo true | incus exec container /run/current-system/sw/bin/bash -") 80 + with subtest("Container can be launched and managed"): 81 + machine.succeed("incus launch nixos container") 82 + with machine.nested("Waiting for instance to start and be usable"): 83 + retry(instance_is_up) 84 + machine.succeed("echo true | incus exec container /run/current-system/sw/bin/bash -") 72 85 73 - with subtest("Container mounts lxcfs overlays"): 74 - machine.succeed("incus exec container mount | grep 'lxcfs on /proc/cpuinfo type fuse.lxcfs'") 75 - machine.succeed("incus exec container mount | grep 'lxcfs on /proc/meminfo type fuse.lxcfs'") 86 + with subtest("Container mounts lxcfs overlays"): 87 + machine.succeed("incus exec container mount | grep 'lxcfs on /proc/cpuinfo type fuse.lxcfs'") 88 + machine.succeed("incus exec container mount | grep 'lxcfs on /proc/meminfo type fuse.lxcfs'") 76 89 77 - with subtest("resource limits"): 78 - with subtest("Container CPU limits can be managed"): 79 - set_container("limits.cpu 1") 80 - cpuinfo = machine.succeed("incus exec container grep -- -c ^processor /proc/cpuinfo").strip() 81 - assert cpuinfo == "1", f"Wrong number of CPUs reported from /proc/cpuinfo, want: 1, got: {cpuinfo}" 90 + with subtest("resource limits"): 91 + with subtest("Container CPU limits can be managed"): 92 + set_container("limits.cpu 1") 93 + cpuinfo = machine.succeed("incus exec container grep -- -c ^processor /proc/cpuinfo").strip() 94 + assert cpuinfo == "1", f"Wrong number of CPUs reported from /proc/cpuinfo, want: 1, got: {cpuinfo}" 82 95 83 - set_container("limits.cpu 2") 84 - cpuinfo = machine.succeed("incus exec container grep -- -c ^processor /proc/cpuinfo").strip() 85 - assert cpuinfo == "2", f"Wrong number of CPUs reported from /proc/cpuinfo, want: 2, got: {cpuinfo}" 96 + set_container("limits.cpu 2") 97 + cpuinfo = machine.succeed("incus exec container grep -- -c ^processor /proc/cpuinfo").strip() 98 + assert cpuinfo == "2", f"Wrong number of CPUs reported from /proc/cpuinfo, want: 2, got: {cpuinfo}" 86 99 87 - with subtest("Container memory limits can be managed"): 88 - set_container("limits.memory 64MB") 89 - meminfo = machine.succeed("incus exec container grep -- MemTotal /proc/meminfo").strip() 90 - meminfo_bytes = " ".join(meminfo.split(' ')[-2:]) 91 - assert meminfo_bytes == "62500 kB", f"Wrong amount of memory reported from /proc/meminfo, want: '62500 kB', got: '{meminfo_bytes}'" 100 + with subtest("Container memory limits can be managed"): 101 + set_container("limits.memory 64MB") 102 + meminfo = machine.succeed("incus exec container grep -- MemTotal /proc/meminfo").strip() 103 + meminfo_bytes = " ".join(meminfo.split(' ')[-2:]) 104 + assert meminfo_bytes == "62500 kB", f"Wrong amount of memory reported from /proc/meminfo, want: '62500 kB', got: '{meminfo_bytes}'" 92 105 93 - set_container("limits.memory 128MB") 94 - meminfo = machine.succeed("incus exec container grep -- MemTotal /proc/meminfo").strip() 95 - meminfo_bytes = " ".join(meminfo.split(' ')[-2:]) 96 - assert meminfo_bytes == "125000 kB", f"Wrong amount of memory reported from /proc/meminfo, want: '125000 kB', got: '{meminfo_bytes}'" 106 + set_container("limits.memory 128MB") 107 + meminfo = machine.succeed("incus exec container grep -- MemTotal /proc/meminfo").strip() 108 + meminfo_bytes = " ".join(meminfo.split(' ')[-2:]) 109 + assert meminfo_bytes == "125000 kB", f"Wrong amount of memory reported from /proc/meminfo, want: '125000 kB', got: '{meminfo_bytes}'" 97 110 98 - with subtest("virtual tpm can be configured"): 99 - machine.succeed("incus config device add container vtpm tpm path=/dev/tpm0 pathrm=/dev/tpmrm0") 100 - machine.succeed("incus exec container -- test -e /dev/tpm0") 101 - machine.succeed("incus exec container -- test -e /dev/tpmrm0") 102 - machine.succeed("incus config device remove container vtpm") 103 - machine.fail("incus exec container -- test -e /dev/tpm0") 111 + with subtest("virtual tpm can be configured"): 112 + machine.succeed("incus config device add container vtpm tpm path=/dev/tpm0 pathrm=/dev/tpmrm0") 113 + machine.succeed("incus exec container -- test -e /dev/tpm0") 114 + machine.succeed("incus exec container -- test -e /dev/tpmrm0") 115 + machine.succeed("incus config device remove container vtpm") 116 + machine.fail("incus exec container -- test -e /dev/tpm0") 104 117 105 - with subtest("lxc-generator"): 106 - with subtest("lxc-container generator configures plain container"): 107 - # reuse the existing container to save some time 108 - machine.succeed("incus exec container test -- -e /run/systemd/system/service.d/zzz-lxc-service.conf") 109 - check_sysctl("container") 118 + with subtest("lxc-generator"): 119 + with subtest("lxc-container generator configures plain container"): 120 + # reuse the existing container to save some time 121 + machine.succeed("incus exec container test -- -e /run/systemd/system/service.d/zzz-lxc-service.conf") 122 + check_sysctl("container") 110 123 111 - with subtest("lxc-container generator configures nested container"): 112 - machine.execute("incus delete --force container") 113 - machine.succeed("incus launch nixos container --config security.nesting=true") 114 - with machine.nested("Waiting for instance to start and be usable"): 115 - retry(instance_is_up) 124 + with subtest("lxc-container generator configures nested container"): 125 + machine.execute("incus delete --force container") 126 + machine.succeed("incus launch nixos container --config security.nesting=true") 127 + with machine.nested("Waiting for instance to start and be usable"): 128 + retry(instance_is_up) 116 129 117 - machine.fail("incus exec container test -- -e /run/systemd/system/service.d/zzz-lxc-service.conf") 118 - target = machine.succeed("incus exec container readlink -- -f /run/systemd/system/systemd-binfmt.service").strip() 119 - assert target == "/dev/null", "lxc generator did not correctly mask /run/systemd/system/systemd-binfmt.service" 130 + machine.fail("incus exec container test -- -e /run/systemd/system/service.d/zzz-lxc-service.conf") 131 + target = machine.succeed("incus exec container readlink -- -f /run/systemd/system/systemd-binfmt.service").strip() 132 + assert target == "/dev/null", "lxc generator did not correctly mask /run/systemd/system/systemd-binfmt.service" 120 133 121 - check_sysctl("container") 134 + check_sysctl("container") 122 135 123 - with subtest("lxc-container generator configures privileged container"): 124 - machine.execute("incus delete --force container") 125 - machine.succeed("incus launch nixos container --config security.privileged=true") 126 - with machine.nested("Waiting for instance to start and be usable"): 127 - retry(instance_is_up) 136 + with subtest("lxc-container generator configures privileged container"): 137 + machine.execute("incus delete --force container") 138 + machine.succeed("incus launch nixos container --config security.privileged=true") 139 + with machine.nested("Waiting for instance to start and be usable"): 140 + retry(instance_is_up) 128 141 129 - machine.succeed("incus exec container test -- -e /run/systemd/system/service.d/zzz-lxc-service.conf") 142 + machine.succeed("incus exec container test -- -e /run/systemd/system/service.d/zzz-lxc-service.conf") 130 143 131 - check_sysctl("container") 144 + check_sysctl("container") 132 145 133 - with subtest("softDaemonRestart"): 134 - with subtest("Instance remains running when softDaemonRestart is enabled and services is stopped"): 135 - pid = machine.succeed("incus info container | grep 'PID'").split(":")[1].strip() 136 - machine.succeed(f"ps {pid}") 137 - machine.succeed("systemctl stop incus") 138 - machine.succeed(f"ps {pid}") 139 - ''; 140 - }) 146 + with subtest("softDaemonRestart"): 147 + with subtest("Instance remains running when softDaemonRestart is enabled and services is stopped"): 148 + pid = machine.succeed("incus info container | grep 'PID'").split(":")[1].strip() 149 + machine.succeed(f"ps {pid}") 150 + machine.succeed("systemctl stop incus") 151 + machine.succeed(f"ps {pid}") 152 + ''; 153 + } 154 + )
+70 -61
nixos/tests/incus/openvswitch.nix
··· 1 - import ../make-test-python.nix ({ pkgs, lib, incus ? pkgs.incus-lts, ... } : 1 + import ../make-test-python.nix ( 2 + { 3 + pkgs, 4 + lib, 5 + incus ? pkgs.incus-lts, 6 + ... 7 + }: 2 8 3 - { 4 - name = "incus-openvswitch"; 9 + { 10 + name = "incus-openvswitch"; 5 11 6 - meta = { 7 - maintainers = lib.teams.lxc.members; 8 - }; 12 + meta = { 13 + maintainers = lib.teams.lxc.members; 14 + }; 9 15 10 - nodes.machine = { lib, ... }: { 11 - virtualisation = { 12 - incus = { 13 - enable = true; 14 - package = incus; 15 - }; 16 + nodes.machine = 17 + { lib, ... }: 18 + { 19 + virtualisation = { 20 + incus = { 21 + enable = true; 22 + package = incus; 23 + }; 16 24 17 - vswitch.enable = true; 18 - incus.preseed = { 19 - networks = [ 20 - { 21 - name = "nixostestbr0"; 22 - type = "bridge"; 23 - config = { 24 - "bridge.driver" = "openvswitch"; 25 - "ipv4.address" = "10.0.100.1/24"; 26 - "ipv4.nat" = "true"; 27 - }; 28 - } 29 - ]; 30 - profiles = [ 31 - { 32 - name = "nixostest_default"; 33 - devices = { 34 - eth0 = { 35 - name = "eth0"; 36 - network = "nixostestbr0"; 37 - type = "nic"; 38 - }; 39 - root = { 40 - path = "/"; 41 - pool = "default"; 42 - size = "35GiB"; 43 - type = "disk"; 44 - }; 45 - }; 46 - } 47 - ]; 48 - storage_pools = [ 49 - { 50 - name = "nixostest_pool"; 51 - driver = "dir"; 52 - } 53 - ]; 25 + vswitch.enable = true; 26 + incus.preseed = { 27 + networks = [ 28 + { 29 + name = "nixostestbr0"; 30 + type = "bridge"; 31 + config = { 32 + "bridge.driver" = "openvswitch"; 33 + "ipv4.address" = "10.0.100.1/24"; 34 + "ipv4.nat" = "true"; 35 + }; 36 + } 37 + ]; 38 + profiles = [ 39 + { 40 + name = "nixostest_default"; 41 + devices = { 42 + eth0 = { 43 + name = "eth0"; 44 + network = "nixostestbr0"; 45 + type = "nic"; 46 + }; 47 + root = { 48 + path = "/"; 49 + pool = "default"; 50 + size = "35GiB"; 51 + type = "disk"; 52 + }; 53 + }; 54 + } 55 + ]; 56 + storage_pools = [ 57 + { 58 + name = "nixostest_pool"; 59 + driver = "dir"; 60 + } 61 + ]; 62 + }; 63 + }; 64 + networking.nftables.enable = true; 54 65 }; 55 - }; 56 - networking.nftables.enable = true; 57 - }; 58 66 59 - testScript = '' 60 - machine.wait_for_unit("incus.service") 61 - machine.wait_for_unit("incus-preseed.service") 67 + testScript = '' 68 + machine.wait_for_unit("incus.service") 69 + machine.wait_for_unit("incus-preseed.service") 62 70 63 - with subtest("Verify openvswitch bridge"): 64 - machine.succeed("incus network info nixostestbr0") 71 + with subtest("Verify openvswitch bridge"): 72 + machine.succeed("incus network info nixostestbr0") 65 73 66 - with subtest("Verify openvswitch bridge"): 67 - machine.succeed("ovs-vsctl br-exists nixostestbr0") 68 - ''; 69 - }) 74 + with subtest("Verify openvswitch bridge"): 75 + machine.succeed("ovs-vsctl br-exists nixostestbr0") 76 + ''; 77 + } 78 + )
+34 -25
nixos/tests/incus/socket-activated.nix
··· 1 - import ../make-test-python.nix ({ pkgs, lib, incus ? pkgs.incus-lts, ... } : 1 + import ../make-test-python.nix ( 2 + { 3 + pkgs, 4 + lib, 5 + incus ? pkgs.incus-lts, 6 + ... 7 + }: 2 8 3 - { 4 - name = "incus-socket-activated"; 9 + { 10 + name = "incus-socket-activated"; 5 11 6 - meta = { 7 - maintainers = lib.teams.lxc.members; 8 - }; 12 + meta = { 13 + maintainers = lib.teams.lxc.members; 14 + }; 9 15 10 - nodes.machine = { lib, ... }: { 11 - virtualisation = { 12 - incus = { 13 - enable = true; 14 - package = incus; 15 - socketActivation = true; 16 + nodes.machine = 17 + { lib, ... }: 18 + { 19 + virtualisation = { 20 + incus = { 21 + enable = true; 22 + package = incus; 23 + socketActivation = true; 24 + }; 25 + }; 26 + networking.nftables.enable = true; 16 27 }; 17 - }; 18 - networking.nftables.enable = true; 19 - }; 20 28 21 - testScript = '' 22 - machine.wait_for_unit("incus.socket") 29 + testScript = '' 30 + machine.wait_for_unit("incus.socket") 23 31 24 - # ensure service is not running by default 25 - machine.fail("systemctl is-active incus.service") 26 - machine.fail("systemctl is-active incus-preseed.service") 32 + # ensure service is not running by default 33 + machine.fail("systemctl is-active incus.service") 34 + machine.fail("systemctl is-active incus-preseed.service") 27 35 28 - # access the socket and ensure the service starts 29 - machine.succeed("incus list") 30 - machine.wait_for_unit("incus.service") 31 - ''; 32 - }) 36 + # access the socket and ensure the service starts 37 + machine.succeed("incus list") 38 + machine.wait_for_unit("incus.service") 39 + ''; 40 + } 41 + )
+70 -53
nixos/tests/incus/ui.nix
··· 1 - import ../make-test-python.nix ({ pkgs, lib, incus ? pkgs.incus-lts, ... }: { 2 - name = "incus-ui"; 1 + import ../make-test-python.nix ( 2 + { 3 + pkgs, 4 + lib, 5 + incus ? pkgs.incus-lts, 6 + ... 7 + }: 8 + { 9 + name = "incus-ui"; 3 10 4 - meta = { 5 - maintainers = lib.teams.lxc.members; 6 - }; 7 - 8 - nodes.machine = { lib, ... }: { 9 - virtualisation = { 10 - incus = { 11 - enable = true; 12 - package = incus; 13 - }; 14 - incus.ui.enable = true; 11 + meta = { 12 + maintainers = lib.teams.lxc.members; 15 13 }; 16 - networking.nftables.enable = true; 17 14 18 - environment.systemPackages = 19 - let 20 - seleniumScript = pkgs.writers.writePython3Bin "selenium-script" 21 - { 22 - libraries = with pkgs.python3Packages; [ selenium ]; 23 - } '' 24 - from selenium import webdriver 25 - from selenium.webdriver.common.by import By 26 - from selenium.webdriver.firefox.options import Options 27 - from selenium.webdriver.support.ui import WebDriverWait 15 + nodes.machine = 16 + { lib, ... }: 17 + { 18 + virtualisation = { 19 + incus = { 20 + enable = true; 21 + package = incus; 22 + }; 23 + incus.ui.enable = true; 24 + }; 25 + networking.nftables.enable = true; 28 26 29 - options = Options() 30 - options.add_argument("--headless") 31 - service = webdriver.FirefoxService(executable_path="${lib.getExe pkgs.geckodriver}") # noqa: E501 27 + environment.systemPackages = 28 + let 29 + seleniumScript = 30 + pkgs.writers.writePython3Bin "selenium-script" 31 + { 32 + libraries = with pkgs.python3Packages; [ selenium ]; 33 + } 34 + '' 35 + from selenium import webdriver 36 + from selenium.webdriver.common.by import By 37 + from selenium.webdriver.firefox.options import Options 38 + from selenium.webdriver.support.ui import WebDriverWait 32 39 33 - driver = webdriver.Firefox(options=options, service=service) 34 - driver.implicitly_wait(10) 35 - driver.get("https://localhost:8443/ui") 40 + options = Options() 41 + options.add_argument("--headless") 42 + service = webdriver.FirefoxService(executable_path="${lib.getExe pkgs.geckodriver}") # noqa: E501 36 43 37 - wait = WebDriverWait(driver, 60) 44 + driver = webdriver.Firefox(options=options, service=service) 45 + driver.implicitly_wait(10) 46 + driver.get("https://localhost:8443/ui") 38 47 39 - assert len(driver.find_elements(By.CLASS_NAME, "l-application")) > 0 40 - assert len(driver.find_elements(By.CLASS_NAME, "l-navigation__drawer")) > 0 48 + wait = WebDriverWait(driver, 60) 41 49 42 - driver.close() 43 - ''; 44 - in 45 - with pkgs; [ curl firefox-unwrapped geckodriver seleniumScript ]; 46 - }; 50 + assert len(driver.find_elements(By.CLASS_NAME, "l-application")) > 0 51 + assert len(driver.find_elements(By.CLASS_NAME, "l-navigation__drawer")) > 0 47 52 53 + driver.close() 54 + ''; 55 + in 56 + with pkgs; 57 + [ 58 + curl 59 + firefox-unwrapped 60 + geckodriver 61 + seleniumScript 62 + ]; 63 + }; 48 64 49 - testScript = '' 50 - machine.wait_for_unit("sockets.target") 51 - machine.wait_for_unit("incus.service") 52 - machine.wait_for_file("/var/lib/incus/unix.socket") 65 + testScript = '' 66 + machine.wait_for_unit("sockets.target") 67 + machine.wait_for_unit("incus.service") 68 + machine.wait_for_file("/var/lib/incus/unix.socket") 53 69 54 - # Configure incus listen address 55 - machine.succeed("incus config set core.https_address :8443") 56 - machine.succeed("systemctl restart incus") 70 + # Configure incus listen address 71 + machine.succeed("incus config set core.https_address :8443") 72 + machine.succeed("systemctl restart incus") 57 73 58 - # Check that the INCUS_UI environment variable is populated in the systemd unit 59 - machine.succeed("cat /etc/systemd/system/incus.service | grep 'INCUS_UI'") 74 + # Check that the INCUS_UI environment variable is populated in the systemd unit 75 + machine.succeed("cat /etc/systemd/system/incus.service | grep 'INCUS_UI'") 60 76 61 - # Ensure the endpoint returns an HTML page with 'Incus UI' in the title 62 - machine.succeed("curl -kLs https://localhost:8443/ui | grep '<title>Incus UI</title>'") 77 + # Ensure the endpoint returns an HTML page with 'Incus UI' in the title 78 + machine.succeed("curl -kLs https://localhost:8443/ui | grep '<title>Incus UI</title>'") 63 79 64 - # Ensure the application is actually rendered by the Javascript 65 - machine.succeed("PYTHONUNBUFFERED=1 selenium-script") 66 - ''; 67 - }) 80 + # Ensure the application is actually rendered by the Javascript 81 + machine.succeed("PYTHONUNBUFFERED=1 selenium-script") 82 + ''; 83 + } 84 + )
+74 -65
nixos/tests/incus/virtual-machine.nix
··· 1 - import ../make-test-python.nix ({ pkgs, lib, incus ? pkgs.incus-lts, ... }: 1 + import ../make-test-python.nix ( 2 + { 3 + pkgs, 4 + lib, 5 + incus ? pkgs.incus-lts, 6 + ... 7 + }: 2 8 3 - let 4 - releases = import ../../release.nix { 5 - configuration = { 6 - # Building documentation makes the test unnecessarily take a longer time: 7 - documentation.enable = lib.mkForce false; 9 + let 10 + releases = import ../../release.nix { 11 + configuration = { 12 + # Building documentation makes the test unnecessarily take a longer time: 13 + documentation.enable = lib.mkForce false; 8 14 9 - # Our tests require `grep` & friends: 10 - environment.systemPackages = with pkgs; [busybox]; 15 + # Our tests require `grep` & friends: 16 + environment.systemPackages = with pkgs; [ busybox ]; 17 + }; 11 18 }; 12 - }; 13 19 14 - vm-image-metadata = releases.incusVirtualMachineImageMeta.${pkgs.stdenv.hostPlatform.system}; 15 - vm-image-disk = releases.incusVirtualMachineImage.${pkgs.stdenv.hostPlatform.system}; 20 + vm-image-metadata = releases.incusVirtualMachineImageMeta.${pkgs.stdenv.hostPlatform.system}; 21 + vm-image-disk = releases.incusVirtualMachineImage.${pkgs.stdenv.hostPlatform.system}; 16 22 17 - instance-name = "instance1"; 18 - in 19 - { 20 - name = "incus-virtual-machine"; 23 + instance-name = "instance1"; 24 + in 25 + { 26 + name = "incus-virtual-machine"; 21 27 22 - meta = { 23 - maintainers = lib.teams.lxc.members; 24 - }; 28 + meta = { 29 + maintainers = lib.teams.lxc.members; 30 + }; 25 31 26 - nodes.machine = {...}: { 27 - virtualisation = { 28 - # Ensure test VM has enough resources for creating and managing guests 29 - cores = 2; 30 - memorySize = 1024; 31 - diskSize = 4096; 32 + nodes.machine = 33 + { ... }: 34 + { 35 + virtualisation = { 36 + # Ensure test VM has enough resources for creating and managing guests 37 + cores = 2; 38 + memorySize = 1024; 39 + diskSize = 4096; 32 40 33 - incus = { 34 - enable = true; 35 - package = incus; 41 + incus = { 42 + enable = true; 43 + package = incus; 44 + }; 45 + }; 46 + networking.nftables.enable = true; 36 47 }; 37 - }; 38 - networking.nftables.enable = true; 39 - }; 40 48 41 - testScript = # python 42 - '' 43 - def instance_is_up(_) -> bool: 44 - status, _ = machine.execute("incus exec ${instance-name} --disable-stdin --force-interactive /run/current-system/sw/bin/systemctl -- is-system-running") 45 - return status == 0 49 + testScript = # python 50 + '' 51 + def instance_is_up(_) -> bool: 52 + status, _ = machine.execute("incus exec ${instance-name} --disable-stdin --force-interactive /run/current-system/sw/bin/systemctl -- is-system-running") 53 + return status == 0 46 54 47 - machine.wait_for_unit("incus.service") 55 + machine.wait_for_unit("incus.service") 48 56 49 - machine.succeed("incus admin init --minimal") 57 + machine.succeed("incus admin init --minimal") 50 58 51 - with subtest("virtual-machine image can be imported"): 52 - machine.succeed("incus image import ${vm-image-metadata}/*/*.tar.xz ${vm-image-disk}/nixos.qcow2 --alias nixos") 59 + with subtest("virtual-machine image can be imported"): 60 + machine.succeed("incus image import ${vm-image-metadata}/*/*.tar.xz ${vm-image-disk}/nixos.qcow2 --alias nixos") 53 61 54 - with subtest("virtual-machine can be created"): 55 - machine.succeed("incus create nixos ${instance-name} --vm --config limits.memory=512MB --config security.secureboot=false") 62 + with subtest("virtual-machine can be created"): 63 + machine.succeed("incus create nixos ${instance-name} --vm --config limits.memory=512MB --config security.secureboot=false") 56 64 57 - with subtest("virtual tpm can be configured"): 58 - machine.succeed("incus config device add ${instance-name} vtpm tpm path=/dev/tpm0") 65 + with subtest("virtual tpm can be configured"): 66 + machine.succeed("incus config device add ${instance-name} vtpm tpm path=/dev/tpm0") 59 67 60 - with subtest("virtual-machine can be launched and become available"): 61 - machine.succeed("incus start ${instance-name}") 62 - with machine.nested("Waiting for instance to start and be usable"): 63 - retry(instance_is_up) 68 + with subtest("virtual-machine can be launched and become available"): 69 + machine.succeed("incus start ${instance-name}") 70 + with machine.nested("Waiting for instance to start and be usable"): 71 + retry(instance_is_up) 64 72 65 - with subtest("incus-agent is started"): 66 - machine.succeed("incus exec ${instance-name} systemctl is-active incus-agent") 73 + with subtest("incus-agent is started"): 74 + machine.succeed("incus exec ${instance-name} systemctl is-active incus-agent") 67 75 68 - with subtest("incus-agent has a valid path"): 69 - machine.succeed("incus exec ${instance-name} -- bash -c 'true'") 76 + with subtest("incus-agent has a valid path"): 77 + machine.succeed("incus exec ${instance-name} -- bash -c 'true'") 70 78 71 - with subtest("guest supports cpu hotplug"): 72 - machine.succeed("incus config set ${instance-name} limits.cpu=1") 73 - count = int(machine.succeed("incus exec ${instance-name} -- nproc").strip()) 74 - assert count == 1, f"Wrong number of CPUs reported, want: 1, got: {count}" 79 + with subtest("guest supports cpu hotplug"): 80 + machine.succeed("incus config set ${instance-name} limits.cpu=1") 81 + count = int(machine.succeed("incus exec ${instance-name} -- nproc").strip()) 82 + assert count == 1, f"Wrong number of CPUs reported, want: 1, got: {count}" 75 83 76 - machine.succeed("incus config set ${instance-name} limits.cpu=2") 77 - count = int(machine.succeed("incus exec ${instance-name} -- nproc").strip()) 78 - assert count == 2, f"Wrong number of CPUs reported, want: 2, got: {count}" 84 + machine.succeed("incus config set ${instance-name} limits.cpu=2") 85 + count = int(machine.succeed("incus exec ${instance-name} -- nproc").strip()) 86 + assert count == 2, f"Wrong number of CPUs reported, want: 2, got: {count}" 79 87 80 - with subtest("Instance remains running when softDaemonRestart is enabled and services is stopped"): 81 - pid = machine.succeed("incus info ${instance-name} | grep 'PID'").split(":")[1].strip() 82 - machine.succeed(f"ps {pid}") 83 - machine.succeed("systemctl stop incus") 84 - machine.succeed(f"ps {pid}") 85 - ''; 86 - }) 88 + with subtest("Instance remains running when softDaemonRestart is enabled and services is stopped"): 89 + pid = machine.succeed("incus info ${instance-name} | grep 'PID'").split(":")[1].strip() 90 + machine.succeed(f"ps {pid}") 91 + machine.succeed("systemctl stop incus") 92 + machine.succeed(f"ps {pid}") 93 + ''; 94 + } 95 + )
+2
nixos/tests/networking/networkd-and-scripted.nix
··· 462 462 }; 463 463 bridges.bridge.interfaces = [ "greTunnel" "eth1" ]; 464 464 interfaces.eth1.ipv4.addresses = lib.mkOverride 0 []; 465 + interfaces.eth1.ipv6.addresses = lib.mkOverride 0 []; 465 466 interfaces.bridge.ipv4.addresses = lib.mkOverride 0 [ 466 467 { address = "192.168.1.1"; prefixLength = 24; } 467 468 ]; ··· 498 499 }; 499 500 bridges.bridge.interfaces = [ "greTunnel" "eth2" ]; 500 501 interfaces.eth2.ipv4.addresses = lib.mkOverride 0 []; 502 + interfaces.eth2.ipv6.addresses = lib.mkOverride 0 []; 501 503 interfaces.bridge.ipv4.addresses = lib.mkOverride 0 [ 502 504 { address = "192.168.1.2"; prefixLength = 24; } 503 505 ];
+4 -3
nixos/tests/vscodium.nix
··· 3 3 wayland = { pkgs, ... }: { 4 4 imports = [ ./common/wayland-cage.nix ]; 5 5 6 - services.cage.program = "${pkgs.vscodium}/bin/codium"; 6 + # We scale vscodium to help OCR find the small "Untitled" text. 7 + services.cage.program = "${pkgs.vscodium}/bin/codium --force-device-scale-factor=2"; 7 8 8 9 environment.variables.NIXOS_OZONE_WL = "1"; 9 10 environment.variables.DISPLAY = "do not use"; ··· 16 17 virtualisation.memorySize = 2047; 17 18 services.xserver.enable = true; 18 19 services.xserver.displayManager.sessionCommands = '' 19 - ${pkgs.vscodium}/bin/codium 20 + ${pkgs.vscodium}/bin/codium --force-device-scale-factor=2 20 21 ''; 21 22 test-support.displayManager.auto.user = "alice"; 22 23 }; ··· 46 47 codium_running.wait() # type: ignore[union-attr] 47 48 with codium_running: # type: ignore[union-attr] 48 49 # Wait until vscodium is visible. "File" is in the menu bar. 49 - machine.wait_for_text('Welcome') 50 + machine.wait_for_text('Get Started with') 50 51 machine.screenshot('start_screen') 51 52 52 53 test_string = 'testfile'
+36
pkgs/applications/editors/vim/plugins/generated.nix
··· 2898 2898 meta.homepage = "https://github.com/chrisbra/csv.vim/"; 2899 2899 }; 2900 2900 2901 + csvview-nvim = buildVimPlugin { 2902 + pname = "csvview.nvim"; 2903 + version = "2024-11-18"; 2904 + src = fetchFromGitHub { 2905 + owner = "hat0uma"; 2906 + repo = "csvview.nvim"; 2907 + rev = "63b6585fc22bba2060e6dd4600bd2dd0b77dd446"; 2908 + sha256 = "0615vjdiwij5j6qxa5hfvylq9swp0z6lm5xc38yk6yxhjrkcdvyg"; 2909 + }; 2910 + meta.homepage = "https://github.com/hat0uma/csvview.nvim/"; 2911 + }; 2912 + 2901 2913 ctrlp-cmatcher = buildVimPlugin { 2902 2914 pname = "ctrlp-cmatcher"; 2903 2915 version = "2015-10-15"; ··· 3570 3582 sha256 = "1p6cn0m47l367i0qv94rgcx66y0p7sf7nnzk80qdasvyqij5rjg1"; 3571 3583 }; 3572 3584 meta.homepage = "https://github.com/NTBBloodbath/doom-one.nvim/"; 3585 + }; 3586 + 3587 + dotnet-nvim = buildVimPlugin { 3588 + pname = "dotnet.nvim"; 3589 + version = "2024-10-21"; 3590 + src = fetchFromGitHub { 3591 + owner = "MoaidHathot"; 3592 + repo = "dotnet.nvim"; 3593 + rev = "f5c52f9f52a3d8ca8dff6916c2228fb41a075274"; 3594 + sha256 = "1ysqh2aj3iy2q0cl7i642c03jb7cakqhgbqslcfd7dfvibidd2a2"; 3595 + }; 3596 + meta.homepage = "https://github.com/MoaidHathot/dotnet.nvim/"; 3573 3597 }; 3574 3598 3575 3599 dracula-nvim = buildVimPlugin { ··· 8764 8788 sha256 = "0ik9jnd561ipdclmxpbc0b1b4qykhkaqmmc2wr9iw4gmszjskhf1"; 8765 8789 }; 8766 8790 meta.homepage = "https://github.com/leoluz/nvim-dap-go/"; 8791 + }; 8792 + 8793 + nvim-dap-lldb = buildVimPlugin { 8794 + pname = "nvim-dap-lldb"; 8795 + version = "2024-06-09"; 8796 + src = fetchFromGitHub { 8797 + owner = "julianolf"; 8798 + repo = "nvim-dap-lldb"; 8799 + rev = "81273514fdb5107b79090364b57a3ff5570bea21"; 8800 + sha256 = "18ds6kkrip0m2zanmzfqcr31qnw1whara1mvsnmx30z6iwgdp92w"; 8801 + }; 8802 + meta.homepage = "https://github.com/julianolf/nvim-dap-lldb/"; 8767 8803 }; 8768 8804 8769 8805 nvim-dap-python = buildVimPlugin {
+11
pkgs/applications/editors/vim/plugins/overrides.nix
··· 884 884 ''; 885 885 }); 886 886 887 + dotnet-nvim = super.dotnet-nvim.overrideAttrs { 888 + dependencies = with self; [ 889 + telescope-nvim 890 + plenary-nvim 891 + ]; 892 + }; 893 + 887 894 efmls-configs-nvim = super.efmls-configs-nvim.overrideAttrs { 888 895 dependencies = [ self.nvim-lspconfig ]; 889 896 }; ··· 1851 1858 1852 1859 nvim-fzf-commands = super.nvim-fzf-commands.overrideAttrs { 1853 1860 dependencies = [ self.nvim-fzf ]; 1861 + }; 1862 + 1863 + nvim-dap-lldb = super.nvim-dap-lldb.overrideAttrs { 1864 + dependencies = [ self.nvim-dap ]; 1854 1865 }; 1855 1866 1856 1867 nvim-dap-python = super.nvim-dap-python.overrideAttrs {
+3
pkgs/applications/editors/vim/plugins/vim-plugin-names
··· 240 240 https://github.com/godlygeek/csapprox/,, 241 241 https://github.com/Decodetalkers/csharpls-extended-lsp.nvim/,HEAD, 242 242 https://github.com/chrisbra/csv.vim/,, 243 + https://github.com/hat0uma/csvview.nvim/,HEAD, 243 244 https://github.com/JazzCore/ctrlp-cmatcher/,, 244 245 https://github.com/FelikZ/ctrlp-py-matcher/,, 245 246 https://github.com/amiorin/ctrlp-z/,, ··· 296 297 https://github.com/chipsenkbeil/distant.nvim/,HEAD, 297 298 https://github.com/doki-theme/doki-theme-vim/,, 298 299 https://github.com/NTBBloodbath/doom-one.nvim/,, 300 + https://github.com/MoaidHathot/dotnet.nvim/,HEAD, 299 301 https://github.com/dracula/vim/,,dracula-vim 300 302 https://github.com/Mofiqul/dracula.nvim/,HEAD, 301 303 https://github.com/stevearc/dressing.nvim/,, ··· 728 730 https://github.com/yamatsum/nvim-cursorline/,, 729 731 https://github.com/mfussenegger/nvim-dap/,, 730 732 https://github.com/leoluz/nvim-dap-go/,HEAD, 733 + https://github.com/julianolf/nvim-dap-lldb/,HEAD, 731 734 https://github.com/mfussenegger/nvim-dap-python/,HEAD, 732 735 https://github.com/rinx/nvim-dap-rego/,HEAD, 733 736 https://github.com/jonboh/nvim-dap-rr/,HEAD,
+67 -41
pkgs/applications/networking/mullvad-vpn/default.nix pkgs/by-name/mu/mullvad-vpn/package.nix
··· 1 - { stdenv 2 - , lib 3 - , fetchurl 4 - , dpkg 5 - , alsa-lib 6 - , atk 7 - , cairo 8 - , cups 9 - , dbus 10 - , expat 11 - , fontconfig 12 - , freetype 13 - , gdk-pixbuf 14 - , glib 15 - , pango 16 - , nspr 17 - , nss 18 - , gtk3 19 - , mesa 20 - , libGL 21 - , wayland 22 - , xorg 23 - , autoPatchelfHook 24 - , systemd 25 - , libnotify 26 - , libappindicator 27 - , makeWrapper 28 - , coreutils 29 - , gnugrep 1 + { 2 + stdenv, 3 + lib, 4 + fetchurl, 5 + dpkg, 6 + alsa-lib, 7 + atk, 8 + cairo, 9 + cups, 10 + dbus, 11 + expat, 12 + fontconfig, 13 + freetype, 14 + gdk-pixbuf, 15 + glib, 16 + pango, 17 + nspr, 18 + nss, 19 + gtk3, 20 + mesa, 21 + libGL, 22 + wayland, 23 + xorg, 24 + autoPatchelfHook, 25 + systemd, 26 + libnotify, 27 + libappindicator, 28 + makeWrapper, 29 + coreutils, 30 + gnugrep, 31 + 32 + versionCheckHook, 30 33 }: 31 34 32 35 let ··· 64 67 systemd 65 68 ]; 66 69 67 - version = "2024.6"; 70 + version = "2024.7"; 68 71 69 - selectSystem = attrs: attrs.${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 72 + selectSystem = 73 + attrs: 74 + attrs.${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 70 75 71 76 platform = selectSystem { 72 77 x86_64-linux = "amd64"; ··· 74 79 }; 75 80 76 81 hash = selectSystem { 77 - x86_64-linux = "sha256-paP9W23AbA9O4MiTdF5r7N50GgT4xu2vb9ktfBdPqDM="; 78 - aarch64-linux = "sha256-5FRPjiLyWDe7RNlhkiF4NUaCxVkfXZbxeoQxNAAls/I="; 82 + x86_64-linux = "sha256-l6uWrOzMzn8bF5iZzfa/xffLIvAPsCaLwzcRPRW3t0o="; 83 + aarch64-linux = "sha256-/RLTjhkiH9WdYO56njnxQyJ0nSaAq/awrkm0NhctFZY="; 79 84 }; 80 85 in 81 86 ··· 99 104 dontBuild = true; 100 105 dontConfigure = true; 101 106 102 - runtimeDependencies = [ (lib.getLib systemd) libGL libnotify libappindicator wayland ]; 107 + runtimeDependencies = [ 108 + (lib.getLib systemd) 109 + libGL 110 + libnotify 111 + libappindicator 112 + wayland 113 + ]; 103 114 104 115 installPhase = '' 105 116 runHook preInstall ··· 115 126 116 127 wrapProgram $out/bin/mullvad-vpn \ 117 128 --set MULLVAD_DISABLE_UPDATE_NOTIFICATION 1 \ 118 - --prefix PATH : ${lib.makeBinPath [ coreutils gnugrep ]} 129 + --prefix PATH : ${ 130 + lib.makeBinPath [ 131 + coreutils 132 + gnugrep 133 + ] 134 + } 119 135 120 136 wrapProgram $out/bin/mullvad-daemon \ 121 137 --set-default MULLVAD_RESOURCE_DIR "$out/share/mullvad/resources" ··· 128 144 runHook postInstall 129 145 ''; 130 146 147 + nativeInstallCheckInputs = [ 148 + versionCheckHook 149 + ]; 150 + versionCheckProgramArg = [ "--version" ]; 151 + doInstallCheck = true; 152 + 131 153 passthru.updateScript = ./update.sh; 132 154 133 - meta = with lib; { 155 + meta = { 134 156 homepage = "https://github.com/mullvad/mullvadvpn-app"; 135 157 description = "Client for Mullvad VPN"; 136 158 changelog = "https://github.com/mullvad/mullvadvpn-app/blob/${version}/CHANGELOG.md"; 137 - sourceProvenance = with sourceTypes; [ binaryNativeCode ]; 138 - license = licenses.gpl3Only; 139 - platforms = [ "x86_64-linux" "aarch64-linux" ]; 140 - maintainers = with maintainers; [ Br1ght0ne ymarkus ataraxiasjel ]; 159 + sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ]; 160 + license = lib.licenses.gpl3Only; 161 + platforms = lib.platforms.unix; 162 + badPlatforms = [ lib.systems.inspect.patterns.isDarwin ]; 163 + maintainers = with lib.maintainers; [ 164 + Br1ght0ne 165 + ymarkus 166 + ataraxiasjel 167 + ]; 141 168 }; 142 - 143 169 }
pkgs/applications/networking/mullvad-vpn/update.sh pkgs/by-name/mu/mullvad-vpn/update.sh
+2 -2
pkgs/applications/radio/gqrx/default.nix
··· 27 27 28 28 gnuradioMinimal.pkgs.mkDerivation rec { 29 29 pname = "gqrx"; 30 - version = "2.17.5"; 30 + version = "2.17.6"; 31 31 32 32 src = fetchFromGitHub { 33 33 owner = "gqrx-sdr"; 34 34 repo = "gqrx"; 35 35 rev = "v${version}"; 36 - hash = "sha256-9VePsl/vaSTZ1TMyIeaGoZNrZv+O/7BxQ3ubD5S2EjY="; 36 + hash = "sha256-/ykKcwOotu8kn+EpJI+EUeqSkHZ2IrSh+o7lBGeHrZ0="; 37 37 }; 38 38 39 39 nativeBuildInputs = [
+3 -3
pkgs/applications/video/mpv/scripts/mpv-image-viewer.nix
··· 10 10 let 11 11 self = { 12 12 inherit pname; 13 - version = "0-unstable-2023-03-03"; 13 + version = "0-unstable-2024-11-23"; 14 14 src = fetchFromGitHub { 15 15 owner = "occivink"; 16 16 repo = "mpv-image-viewer"; 17 - rev = "efc82147cba4809f22e9afae6ed7a41ad9794ffd"; 18 - hash = "sha256-H7uBwrIb5uNEr3m+rHED/hO2CHypGu7hbcRpC30am2Q="; 17 + rev = "128b498e3e57a14deea5ca9bbf662f8c1ca79e8d"; 18 + hash = "sha256-VwIL1529CW9MLK4N9jHHddSSZD5RsJ5bWGWqGJ751C0="; 19 19 }; 20 20 21 21 sourceRoot = "source/scripts";
+1 -1
pkgs/build-support/build-fhsenv-bubblewrap/buildFHSEnv.nix
··· 174 174 175 175 allPaths = paths ++ paths32; 176 176 177 - rootfs-builder = pkgs.rustPlatform.buildRustPackage { 177 + rootfs-builder = pkgs.buildPackages.rustPlatform.buildRustPackage { 178 178 name = "fhs-rootfs-bulder"; 179 179 src = ./rootfs-builder; 180 180 cargoLock.lockFile = ./rootfs-builder/Cargo.lock;
+19 -23
pkgs/build-support/vm/default.nix
··· 88 88 set -- $(IFS==; echo $o) 89 89 command=$2 90 90 ;; 91 - out=*) 92 - set -- $(IFS==; echo $o) 93 - export out=$2 94 - ;; 95 91 esac 96 92 done 97 93 ··· 129 125 mkdir -p /fs${storeDir} 130 126 mount -t 9p store /fs${storeDir} -o trans=virtio,version=9p2000.L,cache=loose,msize=131072 131 127 132 - echo "mounting host's build directory..." 133 - mkdir -p /fs/build 134 - mount -t 9p sa /fs/build -o trans=virtio,version=9p2000.L,cache=loose,msize=131072 135 - 136 128 mkdir -p /fs/tmp /fs/run /fs/var 137 129 mount -t tmpfs -o "mode=1777" none /fs/tmp 138 130 mount -t tmpfs -o "mode=755" none /fs/run 139 131 ln -sfn /run /fs/var/run 140 132 133 + echo "mounting host's temporary directory..." 134 + mkdir -p /fs/tmp/xchg 135 + mount -t 9p xchg /fs/tmp/xchg -o trans=virtio,version=9p2000.L,msize=131072 136 + 141 137 mkdir -p /fs/proc 142 138 mount -t proc none /fs/proc 143 139 ··· 153 149 fi 154 150 155 151 echo "starting stage 2 ($command)" 156 - exec switch_root /fs $command $out 152 + exec switch_root /fs $command 157 153 ''; 158 154 159 155 ··· 169 165 stage2Init = writeScript "vm-run-stage2" '' 170 166 #! ${bash}/bin/sh 171 167 set -euo pipefail 172 - source /build/xchg/saved-env 173 - if [ -f "''${NIX_ATTRS_SH_FILE-}" ]; then 174 - source "$NIX_ATTRS_SH_FILE" 168 + source /tmp/xchg/saved-env 169 + if [ -f /tmp/xchg/.attrs.sh ]; then 170 + source /tmp/xchg/.attrs.sh 171 + export NIX_ATTRS_JSON_FILE=/tmp/xchg/.attrs.json 172 + export NIX_ATTRS_SH_FILE=/tmp/xchg/.attrs.sh 175 173 fi 176 - source $stdenv/setup 177 174 178 175 export NIX_STORE=${storeDir} 179 176 export NIX_BUILD_TOP=/tmp 180 177 export TMPDIR=/tmp 181 178 export PATH=/empty 182 179 cd "$NIX_BUILD_TOP" 180 + 181 + source $stdenv/setup 183 182 184 183 if ! test -e /bin/sh; then 185 184 ${coreutils}/bin/mkdir -p /bin ··· 205 204 declare -a argsArray=() 206 205 concatTo argsArray origArgs 207 206 "$origBuilder" "''${argsArray[@]}" 208 - echo $? > /build/xchg/in-vm-exit 207 + echo $? > /tmp/xchg/in-vm-exit 209 208 210 209 ${busybox}/bin/mount -o remount,ro dummy / 211 210 ··· 224 223 -nographic -no-reboot \ 225 224 -device virtio-rng-pci \ 226 225 -virtfs local,path=${storeDir},security_model=none,mount_tag=store \ 227 - -virtfs local,path=/build,security_model=none,mount_tag=sa \ 228 - -virtfs local,path=$TMPDIR/xchg,security_model=none,mount_tag=xchg \ 226 + -virtfs local,path=xchg,security_model=none,mount_tag=xchg \ 229 227 ''${diskImage:+-drive file=$diskImage,if=virtio,cache=unsafe,werror=report} \ 230 228 -kernel ${kernel}/${img} \ 231 229 -initrd ${initrd}/initrd \ ··· 235 233 236 234 237 235 vmRunCommand = qemuCommand: writeText "vm-run" '' 236 + ${coreutils}/bin/mkdir xchg 237 + export > xchg/saved-env 238 + PATH=${coreutils}/bin 239 + 238 240 if [ -f "''${NIX_ATTRS_SH_FILE-}" ]; then 241 + cp $NIX_ATTRS_JSON_FILE $NIX_ATTRS_SH_FILE xchg 239 242 source "$NIX_ATTRS_SH_FILE" 240 243 fi 241 244 source $stdenv/setup 242 - export > saved-env 243 - 244 - PATH=${coreutils}/bin 245 - mkdir xchg 246 - mv saved-env xchg/ 247 245 248 246 eval "$preVM" 249 247 ··· 261 259 cat > ./run-vm <<EOF 262 260 #! ${bash}/bin/sh 263 261 ''${diskImage:+diskImage=$diskImage} 264 - TMPDIR=$TMPDIR 265 - cd $TMPDIR 266 262 ${qemuCommand} 267 263 EOF 268 264
+1
pkgs/build-support/vm/test.nix
··· 24 24 buildPatchelfInVM = runInLinuxVM patchelf; 25 25 26 26 buildHelloInVM = runInLinuxVM hello; 27 + buildStructuredAttrsHelloInVM = runInLinuxVM (hello.overrideAttrs { __structuredAttrs = true; }); 27 28 28 29 buildPcmanrmInVM = runInLinuxVM (pcmanfm.overrideAttrs (old: { 29 30 # goes out-of-memory with many cores
+2 -2
pkgs/by-name/ap/apt/package.nix
··· 33 33 34 34 stdenv.mkDerivation (finalAttrs: { 35 35 pname = "apt"; 36 - version = "2.9.8"; 36 + version = "2.9.16"; 37 37 38 38 src = fetchurl { 39 39 url = "mirror://debian/pool/main/a/apt/apt_${finalAttrs.version}.tar.xz"; 40 - hash = "sha256-VPt7NL25PqIIESOrNfiTwm/g8+gApU6Onsy18+LslxA="; 40 + hash = "sha256-9ncx162Jm4WZBYFPvtO03ic8/rhcGEUEPxR4x1LsnvQ="; 41 41 }; 42 42 43 43 # cycle detection; lib can't be split
+3 -2
pkgs/by-name/at/atop/package.nix
··· 22 22 hash = "sha256-m5TGZmAu//e/QC7M5wbDR/OMOctjSY+dOWJoYeVkbiA="; 23 23 }; 24 24 25 - nativeBuildInputs = lib.optionals withAtopgpu [ 25 + nativeBuildInputs = [ 26 + pkg-config 27 + ] ++ lib.optionals withAtopgpu [ 26 28 python3.pkgs.wrapPython 27 29 ]; 28 30 ··· 30 32 glib 31 33 zlib 32 34 ncurses 33 - pkg-config 34 35 ] ++ lib.optionals withAtopgpu [ 35 36 python3 36 37 ];
+2 -2
pkgs/by-name/bo/bombsquad/package.nix
··· 22 22 { 23 23 x86_64-linux = { 24 24 name = "BombSquad_Linux_x86_64"; 25 - hash = "sha256-jrExsqaM6uhnKMGPkJJTsKt2Imek+YDI2soSP/kfPj0="; 25 + hash = "sha256-aujLYzFcKaW0ff7sRdyJ6SvSQowafWVbmwycQfDQUYY="; 26 26 }; 27 27 aarch-64-linux = { 28 28 name = "BombSquad_Linux_Arm64"; 29 - hash = "sha256-o1Yg0C5k07NZzc9jQrHXR+kkQl8HZ55U9/fqcpe3Iyw="; 29 + hash = "sha256-pPP7QZzToTOQtSxzF7Q3ZzlDjUjQWMBM/y79d6Yf38I="; 30 30 }; 31 31 } 32 32 .${stdenv.targetPlatform.system} or (throw "${stdenv.targetPlatform.system} is unsupported.");
+3 -16
pkgs/by-name/ca/caligula/package.nix
··· 1 1 { lib 2 2 , rustPlatform 3 3 , fetchFromGitHub 4 - , llvmPackages 5 - , stdenv 6 - , darwin 7 4 }: 8 5 9 6 rustPlatform.buildRustPackage rec { ··· 19 16 20 17 cargoHash = "sha256-ma7JVbWSiKfkCXCDwA8DFm2+KPrWR+8nSdgGSqehNg8="; 21 18 22 - env = { 23 - LIBCLANG_PATH = "${lib.getLib llvmPackages.libclang}/lib"; 24 - }; 25 - 26 - 27 - buildInputs = lib.optionals stdenv.hostPlatform.isDarwin ( 28 - with darwin.apple_sdk.frameworks; [ 29 - Cocoa 30 - IOKit 31 - Foundation 32 - DiskArbitration 33 - ] 34 - ); 19 + nativeBuildInputs = [ 20 + rustPlatform.bindgenHook 21 + ]; 35 22 36 23 RUSTFLAGS = "--cfg tracing_unstable"; 37 24
+3 -3
pkgs/by-name/ch/chainsaw/package.nix
··· 8 8 9 9 rustPlatform.buildRustPackage rec { 10 10 pname = "chainsaw"; 11 - version = "2.9.2"; 11 + version = "2.10.1"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "WithSecureLabs"; 15 15 repo = "chainsaw"; 16 16 rev = "refs/tags/v${version}"; 17 - hash = "sha256-oKlLFKCZNBcHURVvT0i8Hfym6r30ikndV30uuxjYgDM="; 17 + hash = "sha256-ErDIfLhzCiFm3dZzr6ThjYCplfDKbALAqcu8c0gREH4="; 18 18 }; 19 19 20 - cargoHash = "sha256-1w3DYP69aOphoqbsZIF9aX56Lftg2niKClmImLTa5DE="; 20 + cargoHash = "sha256-WuPfYxI61wsQyOKqPF7/a3Hx9vMBCkTkoXsZczgeKpg="; 21 21 22 22 buildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ 23 23 darwin.apple_sdk.frameworks.CoreFoundation
+19 -2
pkgs/by-name/di/distrobuilder/generator.nix
··· 1 - { stdenvNoCC, lib, src, version, makeWrapper, coreutils, findutils, gnugrep, systemd }: 1 + { 2 + stdenvNoCC, 3 + lib, 4 + src, 5 + version, 6 + makeWrapper, 7 + coreutils, 8 + findutils, 9 + gnugrep, 10 + systemd, 11 + }: 2 12 3 13 stdenvNoCC.mkDerivation { 4 14 name = "distrobuilder-nixos-generator"; ··· 14 24 15 25 installPhase = '' 16 26 install -D -m 0555 distrobuilder/lxc.generator $out/lib/systemd/system-generators/lxc 17 - wrapProgram $out/lib/systemd/system-generators/lxc --prefix PATH : ${lib.makeBinPath [coreutils findutils gnugrep systemd]}:${systemd}/lib/systemd 27 + wrapProgram $out/lib/systemd/system-generators/lxc --prefix PATH : ${ 28 + lib.makeBinPath [ 29 + coreutils 30 + findutils 31 + gnugrep 32 + systemd 33 + ] 34 + }:${systemd}/lib/systemd 18 35 ''; 19 36 }
+31 -29
pkgs/by-name/di/distrobuilder/package.nix
··· 1 - { lib 2 - , buildGoModule 3 - , callPackage 4 - , cdrkit 5 - , coreutils 6 - , debootstrap 7 - , fetchFromGitHub 8 - , gnupg 9 - , gnutar 10 - , hivex 11 - , makeWrapper 12 - , nixosTests 13 - , pkg-config 14 - , squashfsTools 15 - , stdenv 16 - , wimlib 1 + { 2 + lib, 3 + buildGoModule, 4 + callPackage, 5 + cdrkit, 6 + coreutils, 7 + debootstrap, 8 + fetchFromGitHub, 9 + gnupg, 10 + gnutar, 11 + hivex, 12 + makeWrapper, 13 + nixosTests, 14 + pkg-config, 15 + squashfsTools, 16 + stdenv, 17 + wimlib, 17 18 }: 18 19 19 20 let 20 - bins = [ 21 - coreutils 22 - debootstrap 23 - gnupg 24 - gnutar 25 - squashfsTools 26 - ] ++ lib.optionals stdenv.hostPlatform.isx86_64 [ 27 - # repack-windows deps 28 - cdrkit 29 - hivex 30 - wimlib 31 - ]; 21 + bins = 22 + [ 23 + coreutils 24 + debootstrap 25 + gnupg 26 + gnutar 27 + squashfsTools 28 + ] 29 + ++ lib.optionals stdenv.hostPlatform.isx86_64 [ 30 + # repack-windows deps 31 + cdrkit 32 + hivex 33 + wimlib 34 + ]; 32 35 in 33 36 buildGoModule rec { 34 37 pname = "distrobuilder"; ··· 45 48 }; 46 49 47 50 buildInputs = bins; 48 - 49 51 50 52 # tests require a local keyserver (mkg20001/nixpkgs branch distrobuilder-with-tests) but gpg is currently broken in tests 51 53 doCheck = false;
+2 -2
pkgs/by-name/dm/dmarc-metrics-exporter/package.nix
··· 7 7 8 8 python3.pkgs.buildPythonApplication rec { 9 9 pname = "dmarc-metrics-exporter"; 10 - version = "1.1.0"; 10 + version = "1.2.0"; 11 11 12 12 pyproject = true; 13 13 ··· 15 15 owner = "jgosmann"; 16 16 repo = "dmarc-metrics-exporter"; 17 17 rev = "refs/tags/v${version}"; 18 - hash = "sha256-xzIYlOZ1HeW+jbVDVlUPTIooFraQ0cJltsDoCzVMNsA="; 18 + hash = "sha256-cIsI4TNYuLK0fpUg9lnbl5KSBtzQoT/pTByI9hiy/7o="; 19 19 }; 20 20 21 21 pythonRelaxDeps = true;
+2 -2
pkgs/by-name/et/etesync-dav/package.nix
··· 3 3 , nixosTests 4 4 , python3 5 5 , fetchFromGitHub 6 - , radicale3 6 + , radicale 7 7 }: 8 8 9 9 python3.pkgs.buildPythonApplication { ··· 25 25 flask-wtf 26 26 msgpack 27 27 setuptools 28 - (python.pkgs.toPythonModule (radicale3.override { python3 = python; })) 28 + (python.pkgs.toPythonModule (radicale.override { python3 = python; })) 29 29 requests 30 30 types-setuptools 31 31 ] ++ requests.optional-dependencies.socks;
+1 -1
pkgs/by-name/et/etlegacy-assets/package.nix
··· 5 5 6 6 stdenv.mkDerivation { 7 7 pname = "etlegacy-assets"; 8 - version = "2.82.0"; 8 + version = "2.83.1"; 9 9 10 10 srcs = let 11 11 fetchAsset = { asset, hash }: fetchurl {
+2 -2
pkgs/by-name/et/etlegacy-unwrapped/package.nix
··· 22 22 , zlib 23 23 }: 24 24 let 25 - version = "2.82.1"; 25 + version = "2.83.1"; 26 26 fakeGit = writeShellApplication { 27 27 name = "git"; 28 28 ··· 41 41 owner = "etlegacy"; 42 42 repo = "etlegacy"; 43 43 rev = "refs/tags/v${version}"; 44 - hash = "sha256-DA5tudbehXIU+4hX3ggcxWZ7AAOa8LUkIvUHbgMgDY8="; 44 + hash = "sha256-k1H3irA9UVOICY3keKGVJMtBczW/b5ObyNvB7fGAcFA="; 45 45 }; 46 46 47 47 nativeBuildInputs = [
+1 -1
pkgs/by-name/et/etlegacy/package.nix
··· 7 7 8 8 symlinkJoin { 9 9 name = "etlegacy"; 10 - version = "2.82.1"; 10 + version = "2.83.1"; 11 11 paths = [ 12 12 etlegacy-assets 13 13 etlegacy-unwrapped
+3 -3
pkgs/by-name/ev/evcc/package.nix
··· 16 16 17 17 buildGoModule rec { 18 18 pname = "evcc"; 19 - version = "0.131.6"; 19 + version = "0.131.8"; 20 20 21 21 src = fetchFromGitHub { 22 22 owner = "evcc-io"; 23 23 repo = "evcc"; 24 24 rev = version; 25 - hash = "sha256-r9GaihxC9ZQtTzKqfJ3LLDMzDEXeud7vTFEMOf0whFU="; 25 + hash = "sha256-W04iXqABwp5fDesOZf633mS6caEsGv0lHEyCzqEv1WA="; 26 26 }; 27 27 28 28 vendorHash = "sha256-x0EWFsR/O2Ztg39DL+yZx2ZDzJHADo2aPAeg/i+5KqM="; 29 29 30 30 npmDeps = fetchNpmDeps { 31 31 inherit src; 32 - hash = "sha256-4pQYv5UKoz3Gu5OS0zoYrjrFYD796MDb7ofWbTv3HlU="; 32 + hash = "sha256-MjmqVyIj/foI6FFMydpbZA3wL09qs02eAq7Tk872JKM="; 33 33 }; 34 34 35 35 nativeBuildInputs = [
+3 -25
pkgs/by-name/fe/fedimint/package.nix
··· 1 1 { lib 2 2 , buildPackages 3 - , clang 4 3 , fetchFromGitHub 5 - , libclang 6 - , libiconv 7 - , llvmPackages_12 8 4 , openssl 9 5 , pkg-config 10 6 , protobuf 11 7 , rustPlatform 12 - , stdenv 13 - , Security 14 - , SystemConfiguration 15 8 }: 16 - let 17 - # Rust rocksdb bindings have C++ compilation/linking errors on Darwin when using newer clang 18 - # Forcing it to clang 12 fixes the issue. 19 - buildRustPackage = 20 - if stdenv.hostPlatform.isDarwin then 21 - rustPlatform.buildRustPackage.override { stdenv = llvmPackages_12.stdenv; } 22 - else 23 - rustPlatform.buildRustPackage; 24 - in 25 - buildRustPackage rec { 9 + 10 + rustPlatform.buildRustPackage rec { 26 11 pname = "fedimint"; 27 12 version = "0.4.4"; 28 13 ··· 38 23 nativeBuildInputs = [ 39 24 protobuf 40 25 pkg-config 41 - clang 42 - (lib.getLib libclang) 26 + rustPlatform.bindgenHook 43 27 ]; 44 28 45 29 buildInputs = [ 46 30 openssl 47 - ] ++ lib.optionals stdenv.hostPlatform.isDarwin [ 48 - Security 49 - libiconv 50 - Security 51 - SystemConfiguration 52 31 ]; 53 32 54 33 outputs = [ "out" "fedimintCli" "fedimint" "gateway" "gatewayCli" "devimint" ]; ··· 79 58 PROTOC = "${buildPackages.protobuf}/bin/protoc"; 80 59 PROTOC_INCLUDE = "${protobuf}/include"; 81 60 OPENSSL_DIR = openssl.dev; 82 - LIBCLANG_PATH = "${lib.getLib libclang}/lib"; 83 61 84 62 FEDIMINT_BUILD_FORCE_GIT_HASH = "0000000000000000000000000000000000000000"; 85 63
+2 -2
pkgs/by-name/ga/gapless/package.nix
··· 15 15 }: 16 16 stdenv.mkDerivation (finalAttrs: { 17 17 pname = "gapless"; 18 - version = "4.0"; 18 + version = "4.2"; 19 19 20 20 src = fetchFromGitLab { 21 21 domain = "gitlab.gnome.org"; 22 22 owner = "neithern"; 23 23 repo = "g4music"; 24 24 rev = "v${finalAttrs.version}"; 25 - hash = "sha256-t9YthW8HZz2kXYPvidVRy7GVB2cRGEOCrXZtIpW65MA="; 25 + hash = "sha256-lH3bogDbUjfNC6rC1UG2MiLRmc8YDaP0+STNKzg54dQ="; 26 26 }; 27 27 28 28 nativeBuildInputs = [
+2 -2
pkgs/by-name/gc/gcov2lcov/package.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "gcov2lcov"; 8 - version = "1.1.0"; 8 + version = "1.1.1"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "jandelgado"; 12 12 repo = "gcov2lcov"; 13 13 rev = "v${version}"; 14 - hash = "sha256-E8TPxaKJTd+5OP9e5S1FD5aZP42nJvjiqqNs4xP9gm4="; 14 + hash = "sha256-ifXpT5jGNaStqvzP5Rq6Hf6PFhpiKMRC+eSYOZfzt+s="; 15 15 }; 16 16 17 17 vendorHash = "sha256-/2OIBWXbNch6lmw0C1jkyJfNefJXOVG9/jNW8CYHTsc=";
+12 -4
pkgs/by-name/ge/gerrit/package.nix
··· 1 - { lib, stdenv, fetchurl, nixosTests }: 1 + { 2 + lib, 3 + stdenv, 4 + fetchurl, 5 + nixosTests, 6 + }: 2 7 3 8 stdenv.mkDerivation rec { 4 9 pname = "gerrit"; 5 - version = "3.10.2"; 10 + version = "3.10.3"; 6 11 7 12 src = fetchurl { 8 13 url = "https://gerrit-releases.storage.googleapis.com/gerrit-${version}.war"; 9 - hash = "sha256-jsyL7j4ENzHVi07Uii0ouWXF3hkoGrq3NJi8fB1kj8o="; 14 + hash = "sha256-pVI5YZihvJNuaboh2dLe/Aw371rNPiGbaLUd0ALpANQ="; 10 15 }; 11 16 12 17 buildCommand = '' ··· 40 45 license = licenses.asl20; 41 46 description = "Web based code review and repository management for the git version control system"; 42 47 sourceProvenance = with sourceTypes; [ binaryBytecode ]; 43 - maintainers = with maintainers; [ flokli zimbatm ]; 48 + maintainers = with maintainers; [ 49 + flokli 50 + zimbatm 51 + ]; 44 52 platforms = platforms.unix; 45 53 }; 46 54 }
+3 -3
pkgs/by-name/gl/glab/package.nix
··· 8 8 9 9 buildGo123Module rec { 10 10 pname = "glab"; 11 - version = "1.49.0"; 11 + version = "1.50.0"; 12 12 13 13 src = fetchFromGitLab { 14 14 owner = "gitlab-org"; 15 15 repo = "cli"; 16 16 rev = "v${version}"; 17 - hash = "sha256-G9z9lISalj3ZXlvDY+qA+0NB6F7flBd1cTcGfxrM91U="; 17 + hash = "sha256-WQO+9Fmlzj21UPJ9cdFc6JC8mbkzOWxz077JR+11BXA="; 18 18 }; 19 19 20 - vendorHash = "sha256-SsWZO77KqDPzyEK57WaK4NpnDWUtZPP0qur2EvEoiL0="; 20 + vendorHash = "sha256-nwHY0221nacHk4M+RKA8BEJLCoJJdIKwP0ZPjhYxc7Q="; 21 21 22 22 ldflags = [ 23 23 "-s"
+2 -10
pkgs/by-name/go/goodvibes/package.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , fetchFromGitLab 4 - , fetchpatch 5 4 , meson 6 5 , ninja 7 6 , pkg-config ··· 18 17 19 18 stdenv.mkDerivation rec { 20 19 pname = "goodvibes"; 21 - version = "0.8.0"; 20 + version = "0.8.1"; 22 21 23 22 src = fetchFromGitLab { 24 23 owner = pname; 25 24 repo = pname; 26 25 rev = "v${version}"; 27 - hash = "sha256-KflLEc6BFA3pBY9HukEm5NluGi2igFNP6joOMdmZ0Ds="; 26 + hash = "sha256-zqJbtCqdwKXy13WWoAwSRYVhAOJsHqOF0DriSDEigbI="; 28 27 }; 29 - patches = [ 30 - # Fixes a compilation error 31 - (fetchpatch { 32 - url = "https://gitlab.com/goodvibes/goodvibes/-/commit/e332f831b91ee068a1a58846d7607b30ab010116.patch"; 33 - hash = "sha256-PzbTltbD0xWJAytCGg1TAwBLrICP+9QZbCbG1QQ8Qmw="; 34 - }) 35 - ]; 36 28 37 29 nativeBuildInputs = [ 38 30 meson
+3 -3
pkgs/by-name/gr/grpcui/package.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "grpcui"; 5 - version = "1.4.1"; 5 + version = "1.4.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "fullstorydev"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-OIwfLuWY7Y0t85v+P/0F55vEe0hNohlqMl16Omr8AF0="; 11 + sha256 = "sha256-yk9SgQMUga7htP7XTKFk2JGzixxBV3y3PrnkzsiAMbw="; 12 12 }; 13 13 14 - vendorHash = "sha256-dEek7q8OjFgCn+f/qyiQL/5qu8RJp38vZk3OrBREHx4="; 14 + vendorHash = "sha256-uP5jtFji2E6GqpzjD7X5p59TXu7KQVBgEX+Gh0BIclM="; 15 15 16 16 doCheck = false; 17 17
+10 -9
pkgs/by-name/in/incus/ui.nix
··· 1 - { lib 2 - , stdenv 3 - , fetchFromGitHub 4 - , fetchYarnDeps 5 - , nodejs 6 - , fixup-yarn-lock 7 - , yarn 8 - , nixosTests 9 - , git 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + fetchYarnDeps, 6 + nodejs, 7 + fixup-yarn-lock, 8 + yarn, 9 + nixosTests, 10 + git, 10 11 }: 11 12 12 13 stdenv.mkDerivation rec {
+2 -2
pkgs/by-name/ko/komikku/package.nix
··· 23 23 24 24 python3.pkgs.buildPythonApplication rec { 25 25 pname = "komikku"; 26 - version = "1.63.0"; 26 + version = "1.64.0"; 27 27 28 28 format = "other"; 29 29 ··· 32 32 owner = "valos"; 33 33 repo = "Komikku"; 34 34 rev = "v${version}"; 35 - hash = "sha256-+p5iTB98jpCqodvSEZ9Y8SM9W3M57Lpoh9jAzN3OmRs="; 35 + hash = "sha256-EpKLez5gTHCSJYGvDqmzj6YO1dIugZKrEP4zE2G5TxA="; 36 36 }; 37 37 38 38 nativeBuildInputs = [
+3 -3
pkgs/by-name/ku/kube-bench/package.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "kube-bench"; 5 - version = "0.9.0"; 5 + version = "0.9.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "aquasecurity"; 9 9 repo = pname; 10 10 rev = "refs/tags/v${version}"; 11 - hash = "sha256-x6xCrxePB/TR7BP1kLiVFjv4pLUJu9JVh5/Y0ebOjvY="; 11 + hash = "sha256-wRY40yNXTcixCUYWFMQsfkI7MPE4RuxCEHBoedDpW9Y="; 12 12 }; 13 13 14 - vendorHash = "sha256-d6GhZBHDSRgMVeglw8rhq5QF7gRH4hQOzTn0DZjvhiA="; 14 + vendorHash = "sha256-bTpE8zJ6dCMimTowexehxnWPq3tXd0H9ZduJvCVqAlI="; 15 15 16 16 nativeBuildInputs = [ installShellFiles ]; 17 17
+2 -2
pkgs/by-name/ku/kubecfg/package.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "kubecfg"; 9 - version = "0.35.0"; 9 + version = "0.35.1"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "kubecfg"; 13 13 repo = "kubecfg"; 14 14 rev = "v${version}"; 15 - hash = "sha256-/xfZcykOGYOnCkKQDUJ9k4xh+bwrDmy2iSNFPVLkjew="; 15 + hash = "sha256-5xs9iE6sfFzoTq24DTNKOj4D+A5ezBKN1lfIdJCt+pk="; 16 16 }; 17 17 18 18 vendorHash = "sha256-K2IyljE5QS/SZ6EXV42q/a5ru+0UXZ69oLNi94XKxw4=";
+1 -1
pkgs/by-name/la/lact/package.nix
··· 66 66 ''; 67 67 68 68 meta = { 69 - description = "Linux AMDGPU Controller"; 69 + description = "Linux GPU Configuration Tool for AMD and NVIDIA"; 70 70 homepage = "https://github.com/ilya-zlobintsev/LACT"; 71 71 license = lib.licenses.mit; 72 72 maintainers = with lib.maintainers; [ figsoda atemu ];
+3 -3
pkgs/by-name/le/legcord/package.nix
··· 11 11 }: 12 12 stdenv.mkDerivation rec { 13 13 pname = "legcord"; 14 - version = "1.0.4"; 14 + version = "1.0.5"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "Legcord"; 18 18 repo = "Legcord"; 19 19 rev = "v${version}"; 20 - hash = "sha256-1nM0v8cjLcctvRcGHGtbyGxaqonIY8wM9s413NxTo+I="; 20 + hash = "sha256-9CicqDZDetxElD36OLizyVNxkqz3rQOjAtUNTGWVwss="; 21 21 }; 22 22 23 23 nativeBuildInputs = [ pnpm.configHook nodejs makeWrapper copyDesktopItems ]; 24 24 25 25 pnpmDeps = pnpm.fetchDeps { 26 26 inherit pname version src; 27 - hash = "sha256-E1kT3WiCYkLwrfHa11P1Z6e0fVnZSpXEQStr1NPjEJU="; 27 + hash = "sha256-5GE/I2xLmu2Wu9mjzZMk1YZvtS5PgpwgXnxuY+4nimQ="; 28 28 }; 29 29 30 30 ELECTRON_SKIP_BINARY_DOWNLOAD = "1";
+1 -4
pkgs/by-name/li/libkrun/package.nix
··· 11 11 , pipewire 12 12 , virglrenderer 13 13 , libkrunfw 14 - , llvmPackages 15 14 , rustc 16 15 , withGpu ? false 17 16 , withSound ? false ··· 38 37 }; 39 38 40 39 nativeBuildInputs = [ 41 - llvmPackages.clang 42 40 rustPlatform.cargoSetupHook 41 + rustPlatform.bindgenHook 43 42 cargo 44 43 rustc 45 44 ] ++ lib.optional (sevVariant || withGpu) pkg-config; ··· 51 50 ] ++ lib.optionals withGpu [ libepoxy libdrm virglrenderer ] 52 51 ++ lib.optional withSound pipewire 53 52 ++ lib.optional sevVariant openssl; 54 - 55 - env.LIBCLANG_PATH = "${lib.getLib llvmPackages.clang-unwrapped}/lib/libclang.so"; 56 53 57 54 makeFlags = [ 58 55 "PREFIX=${placeholder "out"}"
+50
pkgs/by-name/lo/lockbook/package.nix
··· 1 + { 2 + lib, 3 + stdenv, 4 + rustPlatform, 5 + fetchFromGitHub, 6 + installShellFiles, 7 + }: 8 + rustPlatform.buildRustPackage rec { 9 + pname = "lockbook"; 10 + version = "0.9.15"; 11 + 12 + src = fetchFromGitHub { 13 + owner = "lockbook"; 14 + repo = "lockbook"; 15 + rev = "refs/tags/${version}"; 16 + hash = "sha256-hqBjA/6MWlhVjV4m+cIcnoRTApHuzbPzivMsaQHfRcc="; 17 + }; 18 + 19 + useFetchCargoVendor = true; 20 + cargoHash = "sha256-+M+wL26KDbLKhcujPyWAsTlXwLrQVCUbTnnu/7sXul4="; 21 + 22 + doCheck = false; # there are no cli tests 23 + cargoBuildFlags = [ 24 + "--package" 25 + "lockbook-cli" 26 + ]; 27 + 28 + nativeBuildInputs = [ installShellFiles ]; 29 + postInstall = lib.optionalString (stdenv.buildPlatform.canExecute stdenv.hostPlatform) '' 30 + installShellCompletion --bash --name lockbook.bash <($out/bin/lockbook completions bash) 31 + installShellCompletion --zsh --name _lockbook <($out/bin/lockbook completions zsh) 32 + installShellCompletion --fish --name lockbook.fish <($out/bin/lockbook completions fish) 33 + ''; 34 + 35 + meta = { 36 + description = "Private, polished note-taking platform"; 37 + longDescription = '' 38 + Write notes, sketch ideas, and store files in one secure place. 39 + Share seamlessly, keep data synced, and access it on any 40 + platform—even offline. Lockbook encrypts files so even we 41 + can’t see them, but don’t take our word for it: 42 + Lockbook is 100% open-source. 43 + ''; 44 + homepage = "https://lockbook.net"; 45 + license = lib.licenses.unlicense; 46 + platforms = lib.platforms.all; 47 + changelog = "https://github.com/lockbook/lockbook/releases"; 48 + maintainers = [ lib.maintainers.parth ]; 49 + }; 50 + }
+6 -1
pkgs/by-name/lx/lxcfs/package.nix
··· 53 53 54 54 postInstall = '' 55 55 # `mount` hook requires access to the `mount` command from `util-linux` and `readlink` from `coreutils`: 56 - wrapProgram "$out/share/lxcfs/lxc.mount.hook" --prefix PATH : ${lib.makeBinPath [ coreutils util-linux ]} 56 + wrapProgram "$out/share/lxcfs/lxc.mount.hook" --prefix PATH : ${ 57 + lib.makeBinPath [ 58 + coreutils 59 + util-linux 60 + ] 61 + } 57 62 ''; 58 63 59 64 postFixup = ''
+22 -16
pkgs/by-name/mi/microsoft-identity-broker/package.nix
··· 1 - { stdenv 2 - , lib 3 - , fetchurl 4 - , dpkg 5 - , openjdk11 6 - , jnr-posix 7 - , makeWrapper 8 - , openjfx17 9 - , zip 10 - , nixosTests 11 - , bash 1 + { 2 + stdenv, 3 + lib, 4 + fetchurl, 5 + dpkg, 6 + openjdk11, 7 + jnr-posix, 8 + makeWrapper, 9 + openjfx17, 10 + zip, 11 + nixosTests, 12 + bash, 12 13 }: 13 14 stdenv.mkDerivation rec { 14 15 pname = "microsoft-identity-broker"; ··· 16 17 17 18 src = fetchurl { 18 19 url = "https://packages.microsoft.com/ubuntu/22.04/prod/pool/main/m/microsoft-identity-broker/microsoft-identity-broker_${version}_amd64.deb"; 19 - hash = "sha256-I4Q6ucT6ps8/QGiQTNbMXcKxq6UMcuwJ0Prcqvov56M="; 20 + hash = "sha256-v/FxtdvRaUHYqvFSkJIZyicIdcyxQ8lPpY5rb9smnqA="; 20 21 }; 21 22 22 - nativeBuildInputs = [ dpkg makeWrapper openjdk11 zip ]; 23 + nativeBuildInputs = [ 24 + dpkg 25 + makeWrapper 26 + openjdk11 27 + zip 28 + ]; 23 29 24 30 buildPhase = '' 25 31 runHook preBuild ··· 93 99 tests = { inherit (nixosTests) intune; }; 94 100 }; 95 101 96 - meta = with lib; { 102 + meta = { 97 103 description = "Microsoft Authentication Broker for Linux"; 98 104 homepage = "https://www.microsoft.com/"; 99 - license = licenses.unfree; 100 - sourceProvenance = with sourceTypes; [ binaryNativeCode ]; 105 + license = lib.licenses.unfree; 106 + sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ]; 101 107 platforms = [ "x86_64-linux" ]; 102 108 maintainers = with lib.maintainers; [ rhysmdnz ]; 103 109 };
+2 -2
pkgs/by-name/ml/mlx42/package.nix
··· 10 10 11 11 stdenv.mkDerivation (finalAttrs: { 12 12 pname = "mlx42"; 13 - version = "2.4.0"; 13 + version = "2.4.1"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "codam-coding-college"; 17 17 repo = "MLX42"; 18 18 rev = "refs/tags/v${finalAttrs.version}"; 19 - hash = "sha256-jYcBvvx0Xfc/wDWSUROfQeRvn+tWvSS0ymKO1iuzg8w="; 19 + hash = "sha256-/HCP6F7N+J97n4orlLxg/4agEoq4+rJdpeW/3q+DI1I="; 20 20 }; 21 21 22 22 postPatch =
+33
pkgs/by-name/mo/morf/package.nix
··· 1 + { 2 + lib, 3 + buildGoModule, 4 + fetchFromGitHub, 5 + }: 6 + 7 + buildGoModule rec { 8 + pname = "morf"; 9 + version = "1.0.0"; 10 + 11 + src = fetchFromGitHub { 12 + owner = "amrudesh1"; 13 + repo = "morf"; 14 + rev = "refs/tags/v${version}"; 15 + hash = "sha256-3PJ+YtKSH6HHAXBSHO8iMP2HFiuW1RQ0N8iUjQD7NBw="; 16 + }; 17 + 18 + vendorHash = "sha256-tK58UGCI7CuJsFSM7htRQT98tzunAOXyYAxhCkdTJdU="; 19 + 20 + ldflags = [ 21 + "-s" 22 + "-w" 23 + ]; 24 + 25 + meta = { 26 + description = "Offensive mobile security tool designed to identify and address sensitive information"; 27 + homepage = "https://github.com/amrudesh1/morf"; 28 + changelog = "https://github.com/amrudesh1/morf/releases/tag/v${version}"; 29 + license = lib.licenses.asl20; 30 + maintainers = with lib.maintainers; [ fab ]; 31 + mainProgram = "morf"; 32 + }; 33 + }
+2 -2
pkgs/by-name/mq/mqtt-randompub/package.nix
··· 6 6 7 7 python3.pkgs.buildPythonApplication rec { 8 8 pname = "mqtt-randompub"; 9 - version = "0.2.2"; 9 + version = "0.3.0"; 10 10 pyproject = true; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "fabaff"; 14 14 repo = "mqtt-randompub"; 15 15 rev = "refs/tags/${version}"; 16 - hash = "sha256-vAFEVlw9reRP+4Qwywv+cP27SU1c3seL3Z+b/YfUdl8="; 16 + hash = "sha256-X9gITmzyUNtYW8IMTcBiubPscBEO5OGjdxot9wRD/BY="; 17 17 }; 18 18 19 19 build-system = with python3.pkgs; [ setuptools ];
+2 -2
pkgs/by-name/mx/mxt-app/package.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, autoreconfHook, libtool }: 2 2 3 3 stdenv.mkDerivation rec { 4 - version="1.40"; 4 + version="1.41"; 5 5 pname = "mxt-app"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "atmel-maxtouch"; 9 9 repo = "mxt-app"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-ZquD1aZu/TJQdr7QwKHTbCwSCFxt4drVBm4D1FLlzF0="; 11 + sha256 = "sha256-Sn83k04ctwyVH90wnPIFuH91epPgLt1mWY+07r5eKpk="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ autoreconfHook ];
+2 -2
pkgs/by-name/nc/nchat/package.nix
··· 15 15 16 16 stdenv.mkDerivation rec { 17 17 pname = "nchat"; 18 - version = "5.2.11"; 18 + version = "5.3.5"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "d99kris"; 22 22 repo = "nchat"; 23 23 rev = "refs/tags/v${version}"; 24 - hash = "sha256-LcTVftLKlzHstSaJjdtqoEmQ7kiqft9dbXRXoYjbaus="; 24 + hash = "sha256-Nnu2Bk11Crk2vhvQqlDFo42duDqkNRCwDq4xCKIXwLQ="; 25 25 }; 26 26 27 27 postPatch = ''
+1 -6
pkgs/by-name/ne/neothesia/package.nix
··· 6 6 , alsa-lib 7 7 , wayland 8 8 , makeWrapper 9 - , llvmPackages 10 9 , libxkbcommon 11 10 , vulkan-loader 12 11 , xorg ··· 33 32 34 33 nativeBuildInputs = [ 35 34 pkg-config 36 - llvmPackages.clang 37 35 makeWrapper 36 + rustPlatform.bindgenHook 38 37 ]; 39 38 40 39 cargoLock = { ··· 53 52 install -Dm 644 flatpak/com.github.polymeilex.neothesia.desktop $out/share/applications/com.github.polymeilex.neothesia.desktop 54 53 install -Dm 644 flatpak/com.github.polymeilex.neothesia.png $out/share/icons/hicolor/256x256/apps/com.github.polymeilex.neothesia.png 55 54 ''; 56 - 57 - env = { 58 - LIBCLANG_PATH = "${lib.getLib llvmPackages.libclang}/lib"; 59 - }; 60 55 61 56 meta = { 62 57 description = "Flashy Synthesia Like Software For Linux, Windows and macOS";
-4
pkgs/by-name/ni/nixos-rebuild-ng/src/nixos_rebuild/__init__.py
··· 238 238 path_to_config = nix.nixos_build_flake( 239 239 "toplevel", 240 240 flake, 241 - keep_going=True, 242 241 dry_run=dry_run, 243 242 **flake_build_flags, 244 243 ) ··· 247 246 "system", 248 247 args.attr, 249 248 args.file, 250 - keep_going=True, 251 249 dry_run=dry_run, 252 250 **build_flags, 253 251 ) ··· 266 264 path_to_config = nix.nixos_build_flake( 267 265 attr, 268 266 flake, 269 - keep_going=True, 270 267 **flake_build_flags, 271 268 ) 272 269 else: ··· 274 271 attr, 275 272 args.attr, 276 273 args.file, 277 - keep_going=True, 278 274 **build_flags, 279 275 ) 280 276 vm_path = next(path_to_config.glob("bin/run-*-vm"), "./result/bin/run-*-vm")
+9 -8
pkgs/by-name/nu/nufmt/package.nix
··· 4 4 fetchFromGitHub, 5 5 rustPlatform, 6 6 apple-sdk_11, 7 - llvmPackages, 8 7 nix-update-script, 9 - ... 10 8 }: 9 + 11 10 rustPlatform.buildRustPackage { 12 11 pname = "nufmt"; 13 - version = "0-unstable-2024-10-20"; 12 + version = "0-unstable-2024-11-21"; 14 13 15 14 src = fetchFromGitHub { 16 15 owner = "nushell"; 17 16 repo = "nufmt"; 18 - rev = "decc88ef8e11a14081c2dd86c6ea0c94d6d2861d"; 19 - hash = "sha256-AurQGIZDYOkMMyAEXP01QziISQcSME3GFtvqjCDoeiw="; 17 + rev = "628a3b73ea637c96f2c191ae066cf1cecadeafa3"; 18 + hash = "sha256-ideILLOawU6BNawmr4lqt2LGkf29wvlwQe9gqgdYRiI="; 20 19 }; 21 20 21 + nativeBuildInputs = [ 22 + rustPlatform.bindgenHook 23 + ]; 24 + 22 25 buildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ 23 26 apple-sdk_11 24 27 ]; 25 28 26 - env.LIBCLANG_PATH = lib.optionalString stdenv.cc.isClang "${lib.getLib llvmPackages.libclang}/lib"; 27 - 28 - cargoHash = "sha256-5DS6pTYGOQ4qay6+YiUstInRX17n3RViNxKXtFZ6J3k="; 29 + cargoHash = "sha256-MHZlXmHAYIiaB6Isutqjrh45jppRzTZRSE3VqzpFBBA="; 29 30 30 31 passthru.updateScript = nix-update-script { extraArgs = [ "--version=branch" ]; }; 31 32
+1126
pkgs/by-name/op/opentabletdriver/deps.nix
··· 1 + # This file was automatically generated by passthru.fetch-deps. 2 + # Please dont edit it manually, your changes might get overwritten! 3 + 4 + { fetchNuGet }: 5 + [ 6 + (fetchNuGet { 7 + pname = "AtkSharp"; 8 + version = "3.24.24.34"; 9 + hash = "sha256-GrOzO4YDMKJNHAnqLF+c44iGYlvazGTOuRLUnuLbwco="; 10 + }) 11 + (fetchNuGet { 12 + pname = "CairoSharp"; 13 + version = "3.24.24.34"; 14 + hash = "sha256-/80xbYSPU8+6twoXRjES8PtV7dKB6fQoe6EqBmawzV8="; 15 + }) 16 + (fetchNuGet { 17 + pname = "Castle.Core"; 18 + version = "4.4.0"; 19 + hash = "sha256-7hLBAHnB+drr2yU4w3o05eMX2ADy/rXN3XRPBn1d7GY="; 20 + }) 21 + (fetchNuGet { 22 + pname = "coverlet.collector"; 23 + version = "3.0.2"; 24 + hash = "sha256-b8LCEIZCLJdYcJXQqI3TGDmkLrmLhz84eoTq+qP5xvU="; 25 + }) 26 + (fetchNuGet { 27 + pname = "Eto.Forms"; 28 + version = "2.5.10"; 29 + hash = "sha256-51NkW/COGLiGl/+niLJaPJY+ypG1a1OXw65HMunj4bQ="; 30 + }) 31 + (fetchNuGet { 32 + pname = "Eto.Forms"; 33 + version = "2.5.11"; 34 + hash = "sha256-enxjfLwl+KEl//rG9pJ4VaQtAAycjHWP1Hp4ngKTBkE="; 35 + }) 36 + (fetchNuGet { 37 + pname = "Eto.Platform.Gtk"; 38 + version = "2.5.11"; 39 + hash = "sha256-sqRlx0itUTncAfLaExymb2hdtoqLnkj/yvD9RM+XNuk="; 40 + }) 41 + (fetchNuGet { 42 + pname = "GdkSharp"; 43 + version = "3.24.24.34"; 44 + hash = "sha256-pQOp2jft19vVN+gSjD0tHfNGucss7ruy1xyys6IHHWQ="; 45 + }) 46 + (fetchNuGet { 47 + pname = "GioSharp"; 48 + version = "3.24.24.34"; 49 + hash = "sha256-/fZBfaKXlrdBuNh1/h0s1++5Ek4OnznXvzJx0uTbHQo="; 50 + }) 51 + (fetchNuGet { 52 + pname = "GLibSharp"; 53 + version = "3.24.24.34"; 54 + hash = "sha256-eAYUYNHF37nIJnk7aRffzBj8b/rluqXERYy358YAd08="; 55 + }) 56 + (fetchNuGet { 57 + pname = "GtkSharp"; 58 + version = "3.24.24.34"; 59 + hash = "sha256-i0XZfzUt9GNaZD1uXNd8x+pb1mPJqYrxQd15XOuHSAA="; 60 + }) 61 + (fetchNuGet { 62 + pname = "HidSharpCore"; 63 + version = "1.2.1.1"; 64 + hash = "sha256-lM4o3FYBon8eQIMt4uiJAs8M0t4MW+joykiDX+lrdv4="; 65 + }) 66 + (fetchNuGet { 67 + pname = "MessagePack"; 68 + version = "2.1.194"; 69 + hash = "sha256-QKq/zQKI3P9TBhhnnktaaeRr4f/12U+huxeaplPzT+w="; 70 + }) 71 + (fetchNuGet { 72 + pname = "MessagePack.Annotations"; 73 + version = "2.1.194"; 74 + hash = "sha256-YCHelFO/hXW7Q3rkV/fQ32aZliSXUO7133kRH+HAcMo="; 75 + }) 76 + (fetchNuGet { 77 + pname = "Microsoft.Bcl.AsyncInterfaces"; 78 + version = "1.1.1"; 79 + hash = "sha256-fAcX4sxE0veWM1CZBtXR/Unky+6sE33yrV7ohrWGKig="; 80 + }) 81 + (fetchNuGet { 82 + pname = "Microsoft.CodeCoverage"; 83 + version = "16.9.4"; 84 + hash = "sha256-90oZu7wror4PMfy9VL4O7WzxNHt0+KqS0mG+6Yf3kYc="; 85 + }) 86 + (fetchNuGet { 87 + pname = "Microsoft.CSharp"; 88 + version = "4.0.1"; 89 + hash = "sha256-0huoqR2CJ3Z9Q2peaKD09TV3E6saYSqDGZ290K8CrH8="; 90 + }) 91 + (fetchNuGet { 92 + pname = "Microsoft.Extensions.DependencyInjection"; 93 + version = "6.0.0-rc.1.21451.13"; 94 + hash = "sha256-zJQsAVTfA46hUV5q67BslsVn9yehYBclD06wg2UhyWQ="; 95 + }) 96 + (fetchNuGet { 97 + pname = "Microsoft.Extensions.DependencyInjection.Abstractions"; 98 + version = "6.0.0-rc.1.21451.13"; 99 + hash = "sha256-oTYhI+lMwaQ7l9CfDHeNMBAdfofv4kHC0vqBZ7oJr4U="; 100 + }) 101 + (fetchNuGet { 102 + pname = "Microsoft.NET.Test.Sdk"; 103 + version = "16.9.4"; 104 + hash = "sha256-ROXDqgp87j/In0UyGWygrCwMgn982Of60UHiXH8Bvck="; 105 + }) 106 + (fetchNuGet { 107 + pname = "Microsoft.NETCore.Platforms"; 108 + version = "1.0.1"; 109 + hash = "sha256-mZotlGZqtrqDSoBrZhsxFe6fuOv5/BIo0w2Z2x0zVAU="; 110 + }) 111 + (fetchNuGet { 112 + pname = "Microsoft.NETCore.Platforms"; 113 + version = "1.1.0"; 114 + hash = "sha256-FeM40ktcObQJk4nMYShB61H/E8B7tIKfl9ObJ0IOcCM="; 115 + }) 116 + (fetchNuGet { 117 + pname = "Microsoft.NETCore.Platforms"; 118 + version = "1.1.1"; 119 + hash = "sha256-8hLiUKvy/YirCWlFwzdejD2Db3DaXhHxT7GSZx/znJg="; 120 + }) 121 + (fetchNuGet { 122 + pname = "Microsoft.NETCore.Platforms"; 123 + version = "3.0.0"; 124 + hash = "sha256-ocB+U+mMvi/xVwII7bGsIfAqSXiKVSnEMLHCODLJaK4="; 125 + }) 126 + (fetchNuGet { 127 + pname = "Microsoft.NETCore.Targets"; 128 + version = "1.0.1"; 129 + hash = "sha256-lxxw/Gy32xHi0fLgFWNj4YTFBSBkjx5l6ucmbTyf7V4="; 130 + }) 131 + (fetchNuGet { 132 + pname = "Microsoft.NETCore.Targets"; 133 + version = "1.1.0"; 134 + hash = "sha256-0AqQ2gMS8iNlYkrD+BxtIg7cXMnr9xZHtKAuN4bjfaQ="; 135 + }) 136 + (fetchNuGet { 137 + pname = "Microsoft.TestPlatform.ObjectModel"; 138 + version = "16.9.4"; 139 + hash = "sha256-JvLvmGmaT9I5Sz2QMCEv8lQk34kzCcg+MPuSavOaP8o="; 140 + }) 141 + (fetchNuGet { 142 + pname = "Microsoft.TestPlatform.TestHost"; 143 + version = "16.9.4"; 144 + hash = "sha256-3VRVjK5XrR5+SNuMQnLbD1ji6sHXjr65FydfXz8GIZA="; 145 + }) 146 + (fetchNuGet { 147 + pname = "Microsoft.VisualStudio.Threading"; 148 + version = "16.7.56"; 149 + hash = "sha256-V2HB/0j+I/3iUT7mEVyeF11P/61cSpYcZQa1LnXuoI8="; 150 + }) 151 + (fetchNuGet { 152 + pname = "Microsoft.VisualStudio.Threading.Analyzers"; 153 + version = "16.7.56"; 154 + hash = "sha256-4lsL6hg1mposZ62buQWBud1B4raV8Pl+BkyvM4FraRM="; 155 + }) 156 + (fetchNuGet { 157 + pname = "Microsoft.VisualStudio.Validation"; 158 + version = "15.5.31"; 159 + hash = "sha256-/NWbGyad7wejY8QyxK8YWTgiRiUGjimaBgoLkWxOCao="; 160 + }) 161 + (fetchNuGet { 162 + pname = "Microsoft.Win32.Primitives"; 163 + version = "4.3.0"; 164 + hash = "sha256-mBNDmPXNTW54XLnPAUwBRvkIORFM7/j0D0I2SyQPDEg="; 165 + }) 166 + (fetchNuGet { 167 + pname = "Microsoft.Win32.Registry"; 168 + version = "4.6.0"; 169 + hash = "sha256-Wrj0Sc9srH5+ma0lCbgRYYP6gKgnlXcL6h7j7AU6nkQ="; 170 + }) 171 + (fetchNuGet { 172 + pname = "Moq"; 173 + version = "4.16.1"; 174 + hash = "sha256-9CCEY6246RbB4zaF5xwCDf2XuGoPDpZoJsjrB/riT9Q="; 175 + }) 176 + (fetchNuGet { 177 + pname = "Nerdbank.Streams"; 178 + version = "2.6.77"; 179 + hash = "sha256-rOBiYpZQ0rrM9wbWOjzCYIbxcWa3tCrdPt1rpDp3to0="; 180 + }) 181 + (fetchNuGet { 182 + pname = "NETStandard.Library"; 183 + version = "1.6.1"; 184 + hash = "sha256-iNan1ix7RtncGWC9AjAZ2sk70DoxOsmEOgQ10fXm4Pw="; 185 + }) 186 + (fetchNuGet { 187 + pname = "Newtonsoft.Json"; 188 + version = "12.0.2"; 189 + hash = "sha256-BW7sXT2LKpP3ylsCbTTZ1f6Mg1sR4yL68aJVHaJcTnA="; 190 + }) 191 + (fetchNuGet { 192 + pname = "Newtonsoft.Json"; 193 + version = "13.0.1"; 194 + hash = "sha256-K2tSVW4n4beRPzPu3rlVaBEMdGvWSv/3Q1fxaDh4Mjo="; 195 + }) 196 + (fetchNuGet { 197 + pname = "Newtonsoft.Json"; 198 + version = "13.0.3"; 199 + hash = "sha256-hy/BieY4qxBWVVsDqqOPaLy1QobiIapkbrESm6v2PHc="; 200 + }) 201 + (fetchNuGet { 202 + pname = "Newtonsoft.Json"; 203 + version = "9.0.1"; 204 + hash = "sha256-mYCBrgUhIJFzRuLLV9SIiIFHovzfR8Uuqfg6e08EnlU="; 205 + }) 206 + (fetchNuGet { 207 + pname = "Newtonsoft.Json.Schema"; 208 + version = "3.0.15"; 209 + hash = "sha256-l2r1pkQ9d+SbuMXkEbbsunDKpd2G9+uFG857dvtPrNo="; 210 + }) 211 + (fetchNuGet { 212 + pname = "NuGet.Frameworks"; 213 + version = "5.0.0"; 214 + hash = "sha256-WWLh+v9Y9as+WURW8tUPowQB8HWIiVJzbpKzEWTdMqI="; 215 + }) 216 + (fetchNuGet { 217 + pname = "Octokit"; 218 + version = "0.50.0"; 219 + hash = "sha256-GJ+9HkF8FNOB7O2d32fPvMrmUqYcAJ4xToEFZWKR9sU="; 220 + }) 221 + (fetchNuGet { 222 + pname = "PangoSharp"; 223 + version = "3.24.24.34"; 224 + hash = "sha256-/KdH3SA/11bkwPe/AXRph4v4a2cjbUjDvo4+OhkJEOQ="; 225 + }) 226 + (fetchNuGet { 227 + pname = "runtime.any.System.Collections"; 228 + version = "4.3.0"; 229 + hash = "sha256-4PGZqyWhZ6/HCTF2KddDsbmTTjxs2oW79YfkberDZS8="; 230 + }) 231 + (fetchNuGet { 232 + pname = "runtime.any.System.Diagnostics.Tools"; 233 + version = "4.3.0"; 234 + hash = "sha256-8yLKFt2wQxkEf7fNfzB+cPUCjYn2qbqNgQ1+EeY2h/I="; 235 + }) 236 + (fetchNuGet { 237 + pname = "runtime.any.System.Diagnostics.Tracing"; 238 + version = "4.3.0"; 239 + hash = "sha256-dsmTLGvt8HqRkDWP8iKVXJCS+akAzENGXKPV18W2RgI="; 240 + }) 241 + (fetchNuGet { 242 + pname = "runtime.any.System.Globalization"; 243 + version = "4.3.0"; 244 + hash = "sha256-PaiITTFI2FfPylTEk7DwzfKeiA/g/aooSU1pDcdwWLU="; 245 + }) 246 + (fetchNuGet { 247 + pname = "runtime.any.System.Globalization.Calendars"; 248 + version = "4.3.0"; 249 + hash = "sha256-AYh39tgXJVFu8aLi9Y/4rK8yWMaza4S4eaxjfcuEEL4="; 250 + }) 251 + (fetchNuGet { 252 + pname = "runtime.any.System.IO"; 253 + version = "4.3.0"; 254 + hash = "sha256-vej7ySRhyvM3pYh/ITMdC25ivSd0WLZAaIQbYj/6HVE="; 255 + }) 256 + (fetchNuGet { 257 + pname = "runtime.any.System.Reflection"; 258 + version = "4.3.0"; 259 + hash = "sha256-ns6f++lSA+bi1xXgmW1JkWFb2NaMD+w+YNTfMvyAiQk="; 260 + }) 261 + (fetchNuGet { 262 + pname = "runtime.any.System.Reflection.Extensions"; 263 + version = "4.3.0"; 264 + hash = "sha256-Y2AnhOcJwJVYv7Rp6Jz6ma0fpITFqJW+8rsw106K2X8="; 265 + }) 266 + (fetchNuGet { 267 + pname = "runtime.any.System.Reflection.Primitives"; 268 + version = "4.3.0"; 269 + hash = "sha256-LkPXtiDQM3BcdYkAm5uSNOiz3uF4J45qpxn5aBiqNXQ="; 270 + }) 271 + (fetchNuGet { 272 + pname = "runtime.any.System.Resources.ResourceManager"; 273 + version = "4.3.0"; 274 + hash = "sha256-9EvnmZslLgLLhJ00o5MWaPuJQlbUFcUF8itGQNVkcQ4="; 275 + }) 276 + (fetchNuGet { 277 + pname = "runtime.any.System.Runtime"; 278 + version = "4.3.0"; 279 + hash = "sha256-qwhNXBaJ1DtDkuRacgHwnZmOZ1u9q7N8j0cWOLYOELM="; 280 + }) 281 + (fetchNuGet { 282 + pname = "runtime.any.System.Runtime.Handles"; 283 + version = "4.3.0"; 284 + hash = "sha256-PQRACwnSUuxgVySO1840KvqCC9F8iI9iTzxNW0RcBS4="; 285 + }) 286 + (fetchNuGet { 287 + pname = "runtime.any.System.Runtime.InteropServices"; 288 + version = "4.3.0"; 289 + hash = "sha256-Kaw5PnLYIiqWbsoF3VKJhy7pkpoGsUwn4ZDCKscbbzA="; 290 + }) 291 + (fetchNuGet { 292 + pname = "runtime.any.System.Text.Encoding"; 293 + version = "4.3.0"; 294 + hash = "sha256-Q18B9q26MkWZx68exUfQT30+0PGmpFlDgaF0TnaIGCs="; 295 + }) 296 + (fetchNuGet { 297 + pname = "runtime.any.System.Text.Encoding.Extensions"; 298 + version = "4.3.0"; 299 + hash = "sha256-6MYj0RmLh4EVqMtO/MRqBi0HOn5iG4x9JimgCCJ+EFM="; 300 + }) 301 + (fetchNuGet { 302 + pname = "runtime.any.System.Threading.Tasks"; 303 + version = "4.3.0"; 304 + hash = "sha256-agdOM0NXupfHbKAQzQT8XgbI9B8hVEh+a/2vqeHctg4="; 305 + }) 306 + (fetchNuGet { 307 + pname = "runtime.any.System.Threading.Timer"; 308 + version = "4.3.0"; 309 + hash = "sha256-BgHxXCIbicVZtpgMimSXixhFC3V+p5ODqeljDjO8hCs="; 310 + }) 311 + (fetchNuGet { 312 + pname = "runtime.debian.8-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 313 + version = "4.3.0"; 314 + hash = "sha256-LXUPLX3DJxsU1Pd3UwjO1PO9NM2elNEDXeu2Mu/vNps="; 315 + }) 316 + (fetchNuGet { 317 + pname = "runtime.debian.8-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 318 + version = "4.3.2"; 319 + hash = "sha256-EbnOqPOrAgI9eNheXLR++VnY4pHzMsEKw1dFPJ/Fl2c="; 320 + }) 321 + (fetchNuGet { 322 + pname = "runtime.fedora.23-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 323 + version = "4.3.0"; 324 + hash = "sha256-qeSqaUI80+lqw5MK4vMpmO0CZaqrmYktwp6L+vQAb0I="; 325 + }) 326 + (fetchNuGet { 327 + pname = "runtime.fedora.23-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 328 + version = "4.3.2"; 329 + hash = "sha256-mVg02TNvJc1BuHU03q3fH3M6cMgkKaQPBxraSHl/Btg="; 330 + }) 331 + (fetchNuGet { 332 + pname = "runtime.fedora.24-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 333 + version = "4.3.0"; 334 + hash = "sha256-SrHqT9wrCBsxILWtaJgGKd6Odmxm8/Mh7Kh0CUkZVzA="; 335 + }) 336 + (fetchNuGet { 337 + pname = "runtime.fedora.24-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 338 + version = "4.3.2"; 339 + hash = "sha256-g9Uiikrl+M40hYe0JMlGHe/lrR0+nN05YF64wzLmBBA="; 340 + }) 341 + (fetchNuGet { 342 + pname = "runtime.native.System"; 343 + version = "4.3.0"; 344 + hash = "sha256-ZBZaodnjvLXATWpXXakFgcy6P+gjhshFXmglrL5xD5Y="; 345 + }) 346 + (fetchNuGet { 347 + pname = "runtime.native.System.IO.Compression"; 348 + version = "4.3.0"; 349 + hash = "sha256-DWnXs4vlKoU6WxxvCArTJupV6sX3iBbZh8SbqfHace8="; 350 + }) 351 + (fetchNuGet { 352 + pname = "runtime.native.System.Net.Http"; 353 + version = "4.3.0"; 354 + hash = "sha256-c556PyheRwpYhweBjSfIwEyZHnAUB8jWioyKEcp/2dg="; 355 + }) 356 + (fetchNuGet { 357 + pname = "runtime.native.System.Security.Cryptography.Apple"; 358 + version = "4.3.0"; 359 + hash = "sha256-2IhBv0i6pTcOyr8FFIyfPEaaCHUmJZ8DYwLUwJ+5waw="; 360 + }) 361 + (fetchNuGet { 362 + pname = "runtime.native.System.Security.Cryptography.OpenSsl"; 363 + version = "4.3.0"; 364 + hash = "sha256-Jy01KhtcCl2wjMpZWH+X3fhHcVn+SyllWFY8zWlz/6I="; 365 + }) 366 + (fetchNuGet { 367 + pname = "runtime.native.System.Security.Cryptography.OpenSsl"; 368 + version = "4.3.2"; 369 + hash = "sha256-xqF6LbbtpzNC9n1Ua16PnYgXHU0LvblEROTfK4vIxX8="; 370 + }) 371 + (fetchNuGet { 372 + pname = "runtime.opensuse.13.2-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 373 + version = "4.3.0"; 374 + hash = "sha256-wyv00gdlqf8ckxEdV7E+Ql9hJIoPcmYEuyeWb5Oz3mM="; 375 + }) 376 + (fetchNuGet { 377 + pname = "runtime.opensuse.13.2-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 378 + version = "4.3.2"; 379 + hash = "sha256-aJBu6Frcg6webvzVcKNoUP1b462OAqReF2giTSyBzCQ="; 380 + }) 381 + (fetchNuGet { 382 + pname = "runtime.opensuse.42.1-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 383 + version = "4.3.0"; 384 + hash = "sha256-zi+b4sCFrA9QBiSGDD7xPV27r3iHGlV99gpyVUjRmc4="; 385 + }) 386 + (fetchNuGet { 387 + pname = "runtime.opensuse.42.1-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 388 + version = "4.3.2"; 389 + hash = "sha256-Mpt7KN2Kq51QYOEVesEjhWcCGTqWckuPf8HlQ110qLY="; 390 + }) 391 + (fetchNuGet { 392 + pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.Apple"; 393 + version = "4.3.0"; 394 + hash = "sha256-serkd4A7F6eciPiPJtUyJyxzdAtupEcWIZQ9nptEzIM="; 395 + }) 396 + (fetchNuGet { 397 + pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 398 + version = "4.3.0"; 399 + hash = "sha256-gybQU6mPgaWV3rBG2dbH6tT3tBq8mgze3PROdsuWnX0="; 400 + }) 401 + (fetchNuGet { 402 + pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 403 + version = "4.3.2"; 404 + hash = "sha256-JvMltmfVC53mCZtKDHE69G3RT6Id28hnskntP9MMP9U="; 405 + }) 406 + (fetchNuGet { 407 + pname = "runtime.rhel.7-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 408 + version = "4.3.0"; 409 + hash = "sha256-VsP72GVveWnGUvS/vjOQLv1U80H2K8nZ4fDAmI61Hm4="; 410 + }) 411 + (fetchNuGet { 412 + pname = "runtime.rhel.7-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 413 + version = "4.3.2"; 414 + hash = "sha256-QfFxWTVRNBhN4Dm1XRbCf+soNQpy81PsZed3x6op/bI="; 415 + }) 416 + (fetchNuGet { 417 + pname = "runtime.ubuntu.14.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 418 + version = "4.3.0"; 419 + hash = "sha256-4yKGa/IrNCKuQ3zaDzILdNPD32bNdy6xr5gdJigyF5g="; 420 + }) 421 + (fetchNuGet { 422 + pname = "runtime.ubuntu.14.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 423 + version = "4.3.2"; 424 + hash = "sha256-EaJHVc9aDZ6F7ltM2JwlIuiJvqM67CKRq682iVSo+pU="; 425 + }) 426 + (fetchNuGet { 427 + pname = "runtime.ubuntu.16.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 428 + version = "4.3.0"; 429 + hash = "sha256-HmdJhhRsiVoOOCcUvAwdjpMRiyuSwdcgEv2j9hxi+Zc="; 430 + }) 431 + (fetchNuGet { 432 + pname = "runtime.ubuntu.16.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 433 + version = "4.3.2"; 434 + hash = "sha256-PHR0+6rIjJswn89eoiWYY1DuU8u6xRJLrtjykAMuFmA="; 435 + }) 436 + (fetchNuGet { 437 + pname = "runtime.ubuntu.16.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 438 + version = "4.3.0"; 439 + hash = "sha256-pVFUKuPPIx0edQKjzRon3zKq8zhzHEzko/lc01V/jdw="; 440 + }) 441 + (fetchNuGet { 442 + pname = "runtime.ubuntu.16.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 443 + version = "4.3.2"; 444 + hash = "sha256-LFkh7ua7R4rI5w2KGjcHlGXLecsncCy6kDXLuy4qD/Q="; 445 + }) 446 + (fetchNuGet { 447 + pname = "runtime.unix.Microsoft.Win32.Primitives"; 448 + version = "4.3.0"; 449 + hash = "sha256-LZb23lRXzr26tRS5aA0xyB08JxiblPDoA7HBvn6awXg="; 450 + }) 451 + (fetchNuGet { 452 + pname = "runtime.unix.System.Console"; 453 + version = "4.3.0"; 454 + hash = "sha256-AHkdKShTRHttqfMjmi+lPpTuCrM5vd/WRy6Kbtie190="; 455 + }) 456 + (fetchNuGet { 457 + pname = "runtime.unix.System.Diagnostics.Debug"; 458 + version = "4.3.0"; 459 + hash = "sha256-ReoazscfbGH+R6s6jkg5sIEHWNEvjEoHtIsMbpc7+tI="; 460 + }) 461 + (fetchNuGet { 462 + pname = "runtime.unix.System.IO.FileSystem"; 463 + version = "4.3.0"; 464 + hash = "sha256-Pf4mRl6YDK2x2KMh0WdyNgv0VUNdSKVDLlHqozecy5I="; 465 + }) 466 + (fetchNuGet { 467 + pname = "runtime.unix.System.Net.Primitives"; 468 + version = "4.3.0"; 469 + hash = "sha256-pHJ+I6i16MV6m77uhTC6GPY6jWGReE3SSP3fVB59ti0="; 470 + }) 471 + (fetchNuGet { 472 + pname = "runtime.unix.System.Net.Sockets"; 473 + version = "4.3.0"; 474 + hash = "sha256-IvgOeA2JuBjKl5yAVGjPYMPDzs9phb3KANs95H9v1w4="; 475 + }) 476 + (fetchNuGet { 477 + pname = "runtime.unix.System.Private.Uri"; 478 + version = "4.3.0"; 479 + hash = "sha256-c5tXWhE/fYbJVl9rXs0uHh3pTsg44YD1dJvyOA0WoMs="; 480 + }) 481 + (fetchNuGet { 482 + pname = "runtime.unix.System.Runtime.Extensions"; 483 + version = "4.3.0"; 484 + hash = "sha256-l8S9gt6dk3qYG6HYonHtdlYtBKyPb29uQ6NDjmrt3V4="; 485 + }) 486 + (fetchNuGet { 487 + pname = "SharpZipLib"; 488 + version = "1.3.3"; 489 + hash = "sha256-HWEQTKh9Ktwg/zIl079dAiH+ob2ShWFAqLgG6XgIMr4="; 490 + }) 491 + (fetchNuGet { 492 + pname = "StreamJsonRpc"; 493 + version = "2.6.121"; 494 + hash = "sha256-5tSk90kVoj0YRbuS1YIohu+c5zvykNd+s1MLfsK8+3c="; 495 + }) 496 + (fetchNuGet { 497 + pname = "System.AppContext"; 498 + version = "4.3.0"; 499 + hash = "sha256-yg95LNQOwFlA1tWxXdQkVyJqT4AnoDc+ACmrNvzGiZg="; 500 + }) 501 + (fetchNuGet { 502 + pname = "System.Buffers"; 503 + version = "4.3.0"; 504 + hash = "sha256-XqZWb4Kd04960h4U9seivjKseGA/YEIpdplfHYHQ9jk="; 505 + }) 506 + (fetchNuGet { 507 + pname = "System.Collections"; 508 + version = "4.0.11"; 509 + hash = "sha256-puoFMkx4Z55C1XPxNw3np8nzNGjH+G24j43yTIsDRL0="; 510 + }) 511 + (fetchNuGet { 512 + pname = "System.Collections"; 513 + version = "4.3.0"; 514 + hash = "sha256-afY7VUtD6w/5mYqrce8kQrvDIfS2GXDINDh73IjxJKc="; 515 + }) 516 + (fetchNuGet { 517 + pname = "System.Collections.Concurrent"; 518 + version = "4.3.0"; 519 + hash = "sha256-KMY5DfJnDeIsa13DpqvyN8NkReZEMAFnlmNglVoFIXI="; 520 + }) 521 + (fetchNuGet { 522 + pname = "System.Collections.Immutable"; 523 + version = "1.7.1"; 524 + hash = "sha256-WMMAUqoxT3J1gW9DI8v31VAuhwqTc4Posose5jq1BNo="; 525 + }) 526 + (fetchNuGet { 527 + pname = "System.Collections.NonGeneric"; 528 + version = "4.3.0"; 529 + hash = "sha256-8/yZmD4jjvq7m68SPkJZLBQ79jOTOyT5lyzX4SCYAx8="; 530 + }) 531 + (fetchNuGet { 532 + pname = "System.Collections.Specialized"; 533 + version = "4.3.0"; 534 + hash = "sha256-QNg0JJNx+zXMQ26MJRPzH7THdtqjrNtGLUgaR1SdvOk="; 535 + }) 536 + (fetchNuGet { 537 + pname = "System.CommandLine"; 538 + version = "2.0.0-beta4.22272.1"; 539 + hash = "sha256-zSO+CYnMH8deBHDI9DHhCPj79Ce3GOzHCyH1/TiHxcc="; 540 + }) 541 + (fetchNuGet { 542 + pname = "System.ComponentModel"; 543 + version = "4.3.0"; 544 + hash = "sha256-i00uujMO4JEDIEPKLmdLY3QJ6vdSpw6Gh9oOzkFYBiU="; 545 + }) 546 + (fetchNuGet { 547 + pname = "System.ComponentModel.Annotations"; 548 + version = "4.7.0"; 549 + hash = "sha256-PxG9lvf2v/IAIs7LhO4Ur+EpX/L5nYbEs0D21gypoRs="; 550 + }) 551 + (fetchNuGet { 552 + pname = "System.ComponentModel.Annotations"; 553 + version = "5.0.0"; 554 + hash = "sha256-0pST1UHgpeE6xJrYf5R+U7AwIlH3rVC3SpguilI/MAg="; 555 + }) 556 + (fetchNuGet { 557 + pname = "System.ComponentModel.Primitives"; 558 + version = "4.3.0"; 559 + hash = "sha256-IOMJleuIBppmP4ECB3uftbdcgL7CCd56+oAD/Sqrbus="; 560 + }) 561 + (fetchNuGet { 562 + pname = "System.ComponentModel.TypeConverter"; 563 + version = "4.3.0"; 564 + hash = "sha256-PSDiPYt8PgTdTUBz+GH6lHCaM1YgfObneHnZsc8Fz54="; 565 + }) 566 + (fetchNuGet { 567 + pname = "System.Console"; 568 + version = "4.3.0"; 569 + hash = "sha256-Xh3PPBZr0pDbDaK8AEHbdGz7ePK6Yi1ZyRWI1JM6mbo="; 570 + }) 571 + (fetchNuGet { 572 + pname = "System.Diagnostics.Debug"; 573 + version = "4.0.11"; 574 + hash = "sha256-P+rSQJVoN6M56jQbs76kZ9G3mAWFdtF27P/RijN8sj4="; 575 + }) 576 + (fetchNuGet { 577 + pname = "System.Diagnostics.Debug"; 578 + version = "4.3.0"; 579 + hash = "sha256-fkA79SjPbSeiEcrbbUsb70u9B7wqbsdM9s1LnoKj0gM="; 580 + }) 581 + (fetchNuGet { 582 + pname = "System.Diagnostics.DiagnosticSource"; 583 + version = "4.3.0"; 584 + hash = "sha256-OFJRb0ygep0Z3yDBLwAgM/Tkfs4JCDtsNhwDH9cd1Xw="; 585 + }) 586 + (fetchNuGet { 587 + pname = "System.Diagnostics.Tools"; 588 + version = "4.0.1"; 589 + hash = "sha256-vSBqTbmWXylvRa37aWyktym+gOpsvH43mwr6A962k6U="; 590 + }) 591 + (fetchNuGet { 592 + pname = "System.Diagnostics.Tools"; 593 + version = "4.3.0"; 594 + hash = "sha256-gVOv1SK6Ape0FQhCVlNOd9cvQKBvMxRX9K0JPVi8w0Y="; 595 + }) 596 + (fetchNuGet { 597 + pname = "System.Diagnostics.TraceSource"; 598 + version = "4.3.0"; 599 + hash = "sha256-xpxwaXsRcgso8Gj0cqY4+Hvvz6vZkmEMh5/J204j3M8="; 600 + }) 601 + (fetchNuGet { 602 + pname = "System.Diagnostics.Tracing"; 603 + version = "4.3.0"; 604 + hash = "sha256-hCETZpHHGVhPYvb4C0fh4zs+8zv4GPoixagkLZjpa9Q="; 605 + }) 606 + (fetchNuGet { 607 + pname = "System.Dynamic.Runtime"; 608 + version = "4.0.11"; 609 + hash = "sha256-qWqFVxuXioesVftv2RVJZOnmojUvRjb7cS3Oh3oTit4="; 610 + }) 611 + (fetchNuGet { 612 + pname = "System.Dynamic.Runtime"; 613 + version = "4.3.0"; 614 + hash = "sha256-k75gjOYimIQtLBD5NDzwwi3ZMUBPRW3jmc3evDMMJbU="; 615 + }) 616 + (fetchNuGet { 617 + pname = "System.Globalization"; 618 + version = "4.0.11"; 619 + hash = "sha256-rbSgc2PIEc2c2rN6LK3qCREAX3DqA2Nq1WcLrZYsDBw="; 620 + }) 621 + (fetchNuGet { 622 + pname = "System.Globalization"; 623 + version = "4.3.0"; 624 + hash = "sha256-caL0pRmFSEsaoeZeWN5BTQtGrAtaQPwFi8YOZPZG5rI="; 625 + }) 626 + (fetchNuGet { 627 + pname = "System.Globalization.Calendars"; 628 + version = "4.3.0"; 629 + hash = "sha256-uNOD0EOVFgnS2fMKvMiEtI9aOw00+Pfy/H+qucAQlPc="; 630 + }) 631 + (fetchNuGet { 632 + pname = "System.Globalization.Extensions"; 633 + version = "4.3.0"; 634 + hash = "sha256-mmJWA27T0GRVuFP9/sj+4TrR4GJWrzNIk2PDrbr7RQk="; 635 + }) 636 + (fetchNuGet { 637 + pname = "System.IO"; 638 + version = "4.1.0"; 639 + hash = "sha256-V6oyQFwWb8NvGxAwvzWnhPxy9dKOfj/XBM3tEC5aHrw="; 640 + }) 641 + (fetchNuGet { 642 + pname = "System.IO"; 643 + version = "4.3.0"; 644 + hash = "sha256-ruynQHekFP5wPrDiVyhNiRIXeZ/I9NpjK5pU+HPDiRY="; 645 + }) 646 + (fetchNuGet { 647 + pname = "System.IO.Compression"; 648 + version = "4.3.0"; 649 + hash = "sha256-f5PrQlQgj5Xj2ZnHxXW8XiOivaBvfqDao9Sb6AVinyA="; 650 + }) 651 + (fetchNuGet { 652 + pname = "System.IO.Compression.ZipFile"; 653 + version = "4.3.0"; 654 + hash = "sha256-WQl+JgWs+GaRMeiahTFUbrhlXIHapzcpTFXbRvAtvvs="; 655 + }) 656 + (fetchNuGet { 657 + pname = "System.IO.FileSystem"; 658 + version = "4.0.1"; 659 + hash = "sha256-4VKXFgcGYCTWVXjAlniAVq0dO3o5s8KHylg2wg2/7k0="; 660 + }) 661 + (fetchNuGet { 662 + pname = "System.IO.FileSystem"; 663 + version = "4.3.0"; 664 + hash = "sha256-vNIYnvlayuVj0WfRfYKpDrhDptlhp1pN8CYmlVd2TXw="; 665 + }) 666 + (fetchNuGet { 667 + pname = "System.IO.FileSystem.Primitives"; 668 + version = "4.0.1"; 669 + hash = "sha256-IpigKMomqb6pmYWkrlf0ZdpILtRluX2cX5sOKVW0Feg="; 670 + }) 671 + (fetchNuGet { 672 + pname = "System.IO.FileSystem.Primitives"; 673 + version = "4.3.0"; 674 + hash = "sha256-LMnfg8Vwavs9cMnq9nNH8IWtAtSfk0/Fy4s4Rt9r1kg="; 675 + }) 676 + (fetchNuGet { 677 + pname = "System.IO.Pipelines"; 678 + version = "4.7.2"; 679 + hash = "sha256-yWlQwmzMX+4kVQbOd9WowP6bvZnjo4yddkycer3CZJs="; 680 + }) 681 + (fetchNuGet { 682 + pname = "System.Linq"; 683 + version = "4.1.0"; 684 + hash = "sha256-ZQpFtYw5N1F1aX0jUK3Tw+XvM5tnlnshkTCNtfVA794="; 685 + }) 686 + (fetchNuGet { 687 + pname = "System.Linq"; 688 + version = "4.3.0"; 689 + hash = "sha256-R5uiSL3l6a3XrXSSL6jz+q/PcyVQzEAByiuXZNSqD/A="; 690 + }) 691 + (fetchNuGet { 692 + pname = "System.Linq.Expressions"; 693 + version = "4.1.0"; 694 + hash = "sha256-7zqB+FXgkvhtlBzpcZyd81xczWP0D3uWssyAGw3t7b4="; 695 + }) 696 + (fetchNuGet { 697 + pname = "System.Linq.Expressions"; 698 + version = "4.3.0"; 699 + hash = "sha256-+3pvhZY7rip8HCbfdULzjlC9FPZFpYoQxhkcuFm2wk8="; 700 + }) 701 + (fetchNuGet { 702 + pname = "System.Memory"; 703 + version = "4.5.4"; 704 + hash = "sha256-3sCEfzO4gj5CYGctl9ZXQRRhwAraMQfse7yzKoRe65E="; 705 + }) 706 + (fetchNuGet { 707 + pname = "System.Net.Http"; 708 + version = "4.3.0"; 709 + hash = "sha256-UoBB7WPDp2Bne/fwxKF0nE8grJ6FzTMXdT/jfsphj8Q="; 710 + }) 711 + (fetchNuGet { 712 + pname = "System.Net.Http"; 713 + version = "4.3.4"; 714 + hash = "sha256-FMoU0K7nlPLxoDju0NL21Wjlga9GpnAoQjsFhFYYt00="; 715 + }) 716 + (fetchNuGet { 717 + pname = "System.Net.NameResolution"; 718 + version = "4.3.0"; 719 + hash = "sha256-eGZwCBExWsnirWBHyp2sSSSXp6g7I6v53qNmwPgtJ5c="; 720 + }) 721 + (fetchNuGet { 722 + pname = "System.Net.Primitives"; 723 + version = "4.3.0"; 724 + hash = "sha256-MY7Z6vOtFMbEKaLW9nOSZeAjcWpwCtdO7/W1mkGZBzE="; 725 + }) 726 + (fetchNuGet { 727 + pname = "System.Net.Sockets"; 728 + version = "4.3.0"; 729 + hash = "sha256-il7dr5VT/QWDg/0cuh+4Es2u8LY//+qqiY9BZmYxSus="; 730 + }) 731 + (fetchNuGet { 732 + pname = "System.Net.WebSockets"; 733 + version = "4.3.0"; 734 + hash = "sha256-l3h3cF1cCC9zMhWLKSDnZBZvFADUd0Afe2+iAwBA0r0="; 735 + }) 736 + (fetchNuGet { 737 + pname = "System.ObjectModel"; 738 + version = "4.0.12"; 739 + hash = "sha256-MudZ/KYcvYsn2cST3EE049mLikrNkmE7QoUoYKKby+s="; 740 + }) 741 + (fetchNuGet { 742 + pname = "System.ObjectModel"; 743 + version = "4.3.0"; 744 + hash = "sha256-gtmRkWP2Kwr3nHtDh0yYtce38z1wrGzb6fjm4v8wN6Q="; 745 + }) 746 + (fetchNuGet { 747 + pname = "System.Private.Uri"; 748 + version = "4.3.0"; 749 + hash = "sha256-fVfgcoP4AVN1E5wHZbKBIOPYZ/xBeSIdsNF+bdukIRM="; 750 + }) 751 + (fetchNuGet { 752 + pname = "System.Reflection"; 753 + version = "4.1.0"; 754 + hash = "sha256-idZHGH2Yl/hha1CM4VzLhsaR8Ljo/rV7TYe7mwRJSMs="; 755 + }) 756 + (fetchNuGet { 757 + pname = "System.Reflection"; 758 + version = "4.3.0"; 759 + hash = "sha256-NQSZRpZLvtPWDlvmMIdGxcVuyUnw92ZURo0hXsEshXY="; 760 + }) 761 + (fetchNuGet { 762 + pname = "System.Reflection.Emit"; 763 + version = "4.0.1"; 764 + hash = "sha256-F1MvYoQWHCY89/O4JBwswogitqVvKuVfILFqA7dmuHk="; 765 + }) 766 + (fetchNuGet { 767 + pname = "System.Reflection.Emit"; 768 + version = "4.3.0"; 769 + hash = "sha256-5LhkDmhy2FkSxulXR+bsTtMzdU3VyyuZzsxp7/DwyIU="; 770 + }) 771 + (fetchNuGet { 772 + pname = "System.Reflection.Emit"; 773 + version = "4.7.0"; 774 + hash = "sha256-Fw/CSRD+wajH1MqfKS3Q/sIrUH7GN4K+F+Dx68UPNIg="; 775 + }) 776 + (fetchNuGet { 777 + pname = "System.Reflection.Emit.ILGeneration"; 778 + version = "4.0.1"; 779 + hash = "sha256-YG+eJBG5P+5adsHiw/lhJwvREnvdHw6CJyS8ZV4Ujd0="; 780 + }) 781 + (fetchNuGet { 782 + pname = "System.Reflection.Emit.ILGeneration"; 783 + version = "4.3.0"; 784 + hash = "sha256-mKRknEHNls4gkRwrEgi39B+vSaAz/Gt3IALtS98xNnA="; 785 + }) 786 + (fetchNuGet { 787 + pname = "System.Reflection.Emit.Lightweight"; 788 + version = "4.0.1"; 789 + hash = "sha256-uVvNOnL64CPqsgZP2OLqNmxdkZl6Q0fTmKmv9gcBi+g="; 790 + }) 791 + (fetchNuGet { 792 + pname = "System.Reflection.Emit.Lightweight"; 793 + version = "4.3.0"; 794 + hash = "sha256-rKx4a9yZKcajloSZHr4CKTVJ6Vjh95ni+zszPxWjh2I="; 795 + }) 796 + (fetchNuGet { 797 + pname = "System.Reflection.Emit.Lightweight"; 798 + version = "4.6.0"; 799 + hash = "sha256-913OIkt3v3N12Yke328IRxTtgYUQYNs/eSzOs8wUPkM="; 800 + }) 801 + (fetchNuGet { 802 + pname = "System.Reflection.Extensions"; 803 + version = "4.0.1"; 804 + hash = "sha256-NsfmzM9G/sN3H8X2cdnheTGRsh7zbRzvegnjDzDH/FQ="; 805 + }) 806 + (fetchNuGet { 807 + pname = "System.Reflection.Extensions"; 808 + version = "4.3.0"; 809 + hash = "sha256-mMOCYzUenjd4rWIfq7zIX9PFYk/daUyF0A8l1hbydAk="; 810 + }) 811 + (fetchNuGet { 812 + pname = "System.Reflection.Metadata"; 813 + version = "1.6.0"; 814 + hash = "sha256-JJfgaPav7UfEh4yRAQdGhLZF1brr0tUWPl6qmfNWq/E="; 815 + }) 816 + (fetchNuGet { 817 + pname = "System.Reflection.Primitives"; 818 + version = "4.0.1"; 819 + hash = "sha256-SFSfpWEyCBMAOerrMCOiKnpT+UAWTvRcmoRquJR6Vq0="; 820 + }) 821 + (fetchNuGet { 822 + pname = "System.Reflection.Primitives"; 823 + version = "4.3.0"; 824 + hash = "sha256-5ogwWB4vlQTl3jjk1xjniG2ozbFIjZTL9ug0usZQuBM="; 825 + }) 826 + (fetchNuGet { 827 + pname = "System.Reflection.TypeExtensions"; 828 + version = "4.1.0"; 829 + hash = "sha256-R0YZowmFda+xzKNR4kKg7neFoE30KfZwp/IwfRSKVK4="; 830 + }) 831 + (fetchNuGet { 832 + pname = "System.Reflection.TypeExtensions"; 833 + version = "4.3.0"; 834 + hash = "sha256-4U4/XNQAnddgQIHIJq3P2T80hN0oPdU2uCeghsDTWng="; 835 + }) 836 + (fetchNuGet { 837 + pname = "System.Resources.ResourceManager"; 838 + version = "4.0.1"; 839 + hash = "sha256-cZ2/3/fczLjEpn6j3xkgQV9ouOVjy4Kisgw5xWw9kSw="; 840 + }) 841 + (fetchNuGet { 842 + pname = "System.Resources.ResourceManager"; 843 + version = "4.3.0"; 844 + hash = "sha256-idiOD93xbbrbwwSnD4mORA9RYi/D/U48eRUsn/WnWGo="; 845 + }) 846 + (fetchNuGet { 847 + pname = "System.Runtime"; 848 + version = "4.1.0"; 849 + hash = "sha256-FViNGM/4oWtlP6w0JC0vJU+k9efLKZ+yaXrnEeabDQo="; 850 + }) 851 + (fetchNuGet { 852 + pname = "System.Runtime"; 853 + version = "4.3.0"; 854 + hash = "sha256-51813WXpBIsuA6fUtE5XaRQjcWdQ2/lmEokJt97u0Rg="; 855 + }) 856 + (fetchNuGet { 857 + pname = "System.Runtime.CompilerServices.Unsafe"; 858 + version = "4.5.2"; 859 + hash = "sha256-8eUXXGWO2LL7uATMZye2iCpQOETn2jCcjUhG6coR5O8="; 860 + }) 861 + (fetchNuGet { 862 + pname = "System.Runtime.CompilerServices.Unsafe"; 863 + version = "4.7.1"; 864 + hash = "sha256-UvyoDV8O0oY3HPG1GbA56YVdvwTGEfjYR5gW1O7IK4U="; 865 + }) 866 + (fetchNuGet { 867 + pname = "System.Runtime.CompilerServices.Unsafe"; 868 + version = "6.0.0-rc.1.21451.13"; 869 + hash = "sha256-BgiqR6Y555tJEBEqDT5+yHCyQy5Wv9bLKlKWcQFiq2w="; 870 + }) 871 + (fetchNuGet { 872 + pname = "System.Runtime.Extensions"; 873 + version = "4.1.0"; 874 + hash = "sha256-X7DZ5CbPY7jHs20YZ7bmcXs9B5Mxptu/HnBUvUnNhGc="; 875 + }) 876 + (fetchNuGet { 877 + pname = "System.Runtime.Extensions"; 878 + version = "4.3.0"; 879 + hash = "sha256-wLDHmozr84v1W2zYCWYxxj0FR0JDYHSVRaRuDm0bd/o="; 880 + }) 881 + (fetchNuGet { 882 + pname = "System.Runtime.Handles"; 883 + version = "4.0.1"; 884 + hash = "sha256-j2QgVO9ZOjv7D1het98CoFpjoYgxjupuIhuBUmLLH7w="; 885 + }) 886 + (fetchNuGet { 887 + pname = "System.Runtime.Handles"; 888 + version = "4.3.0"; 889 + hash = "sha256-KJ5aXoGpB56Y6+iepBkdpx/AfaJDAitx4vrkLqR7gms="; 890 + }) 891 + (fetchNuGet { 892 + pname = "System.Runtime.InteropServices"; 893 + version = "4.1.0"; 894 + hash = "sha256-QceAYlJvkPRJc/+5jR+wQpNNI3aqGySWWSO30e/FfQY="; 895 + }) 896 + (fetchNuGet { 897 + pname = "System.Runtime.InteropServices"; 898 + version = "4.3.0"; 899 + hash = "sha256-8sDH+WUJfCR+7e4nfpftj/+lstEiZixWUBueR2zmHgI="; 900 + }) 901 + (fetchNuGet { 902 + pname = "System.Runtime.InteropServices.RuntimeInformation"; 903 + version = "4.3.0"; 904 + hash = "sha256-MYpl6/ZyC6hjmzWRIe+iDoldOMW1mfbwXsduAnXIKGA="; 905 + }) 906 + (fetchNuGet { 907 + pname = "System.Runtime.Numerics"; 908 + version = "4.3.0"; 909 + hash = "sha256-P5jHCgMbgFMYiONvzmaKFeOqcAIDPu/U8bOVrNPYKqc="; 910 + }) 911 + (fetchNuGet { 912 + pname = "System.Runtime.Serialization.Primitives"; 913 + version = "4.1.1"; 914 + hash = "sha256-80B05oxJbPLGq2pGOSl6NlZvintX9A1CNpna2aN0WRA="; 915 + }) 916 + (fetchNuGet { 917 + pname = "System.Security.AccessControl"; 918 + version = "4.6.0"; 919 + hash = "sha256-rspJ63MbjNVDve0owXby0Pu2vHjQvR2uuhCDCJ9vgfI="; 920 + }) 921 + (fetchNuGet { 922 + pname = "System.Security.Claims"; 923 + version = "4.3.0"; 924 + hash = "sha256-Fua/rDwAqq4UByRVomAxMPmDBGd5eImRqHVQIeSxbks="; 925 + }) 926 + (fetchNuGet { 927 + pname = "System.Security.Cryptography.Algorithms"; 928 + version = "4.3.0"; 929 + hash = "sha256-tAJvNSlczYBJ3Ed24Ae27a55tq/n4D3fubNQdwcKWA8="; 930 + }) 931 + (fetchNuGet { 932 + pname = "System.Security.Cryptography.Cng"; 933 + version = "4.3.0"; 934 + hash = "sha256-u17vy6wNhqok91SrVLno2M1EzLHZm6VMca85xbVChsw="; 935 + }) 936 + (fetchNuGet { 937 + pname = "System.Security.Cryptography.Csp"; 938 + version = "4.3.0"; 939 + hash = "sha256-oefdTU/Z2PWU9nlat8uiRDGq/PGZoSPRgkML11pmvPQ="; 940 + }) 941 + (fetchNuGet { 942 + pname = "System.Security.Cryptography.Encoding"; 943 + version = "4.3.0"; 944 + hash = "sha256-Yuge89N6M+NcblcvXMeyHZ6kZDfwBv3LPMDiF8HhJss="; 945 + }) 946 + (fetchNuGet { 947 + pname = "System.Security.Cryptography.OpenSsl"; 948 + version = "4.3.0"; 949 + hash = "sha256-DL+D2sc2JrQiB4oAcUggTFyD8w3aLEjJfod5JPe+Oz4="; 950 + }) 951 + (fetchNuGet { 952 + pname = "System.Security.Cryptography.Primitives"; 953 + version = "4.3.0"; 954 + hash = "sha256-fnFi7B3SnVj5a+BbgXnbjnGNvWrCEU6Hp/wjsjWz318="; 955 + }) 956 + (fetchNuGet { 957 + pname = "System.Security.Cryptography.X509Certificates"; 958 + version = "4.3.0"; 959 + hash = "sha256-MG3V/owDh273GCUPsGGraNwaVpcydupl3EtPXj6TVG0="; 960 + }) 961 + (fetchNuGet { 962 + pname = "System.Security.Principal"; 963 + version = "4.3.0"; 964 + hash = "sha256-rjudVUHdo8pNJg2EVEn0XxxwNo5h2EaYo+QboPkXlYk="; 965 + }) 966 + (fetchNuGet { 967 + pname = "System.Security.Principal.Windows"; 968 + version = "4.3.0"; 969 + hash = "sha256-mbdLVUcEwe78p3ZnB6jYsizNEqxMaCAWI3tEQNhRQAE="; 970 + }) 971 + (fetchNuGet { 972 + pname = "System.Security.Principal.Windows"; 973 + version = "4.6.0"; 974 + hash = "sha256-lZeXm45RboVgqnPQVJ65y8b5b+9FSVr0MBciG777rso="; 975 + }) 976 + (fetchNuGet { 977 + pname = "System.Text.Encoding"; 978 + version = "4.0.11"; 979 + hash = "sha256-PEailOvG05CVgPTyKLtpAgRydlSHmtd5K0Y8GSHY2Lc="; 980 + }) 981 + (fetchNuGet { 982 + pname = "System.Text.Encoding"; 983 + version = "4.3.0"; 984 + hash = "sha256-GctHVGLZAa/rqkBNhsBGnsiWdKyv6VDubYpGkuOkBLg="; 985 + }) 986 + (fetchNuGet { 987 + pname = "System.Text.Encoding.Extensions"; 988 + version = "4.0.11"; 989 + hash = "sha256-+kf7J3dEhgCbnCM5vHYlsTm5/R/Ud0Jr6elpHm922iI="; 990 + }) 991 + (fetchNuGet { 992 + pname = "System.Text.Encoding.Extensions"; 993 + version = "4.3.0"; 994 + hash = "sha256-vufHXg8QAKxHlujPHHcrtGwAqFmsCD6HKjfDAiHyAYc="; 995 + }) 996 + (fetchNuGet { 997 + pname = "System.Text.RegularExpressions"; 998 + version = "4.1.0"; 999 + hash = "sha256-x6OQN6MCN7S0fJ6EFTfv4rczdUWjwuWE9QQ0P6fbh9c="; 1000 + }) 1001 + (fetchNuGet { 1002 + pname = "System.Text.RegularExpressions"; 1003 + version = "4.3.0"; 1004 + hash = "sha256-VLCk1D1kcN2wbAe3d0YQM/PqCsPHOuqlBY1yd2Yo+K0="; 1005 + }) 1006 + (fetchNuGet { 1007 + pname = "System.Threading"; 1008 + version = "4.0.11"; 1009 + hash = "sha256-mob1Zv3qLQhQ1/xOLXZmYqpniNUMCfn02n8ZkaAhqac="; 1010 + }) 1011 + (fetchNuGet { 1012 + pname = "System.Threading"; 1013 + version = "4.3.0"; 1014 + hash = "sha256-ZDQ3dR4pzVwmaqBg4hacZaVenQ/3yAF/uV7BXZXjiWc="; 1015 + }) 1016 + (fetchNuGet { 1017 + pname = "System.Threading.Tasks"; 1018 + version = "4.0.11"; 1019 + hash = "sha256-5SLxzFg1df6bTm2t09xeI01wa5qQglqUwwJNlQPJIVs="; 1020 + }) 1021 + (fetchNuGet { 1022 + pname = "System.Threading.Tasks"; 1023 + version = "4.3.0"; 1024 + hash = "sha256-Z5rXfJ1EXp3G32IKZGiZ6koMjRu0n8C1NGrwpdIen4w="; 1025 + }) 1026 + (fetchNuGet { 1027 + pname = "System.Threading.Tasks.Dataflow"; 1028 + version = "4.11.1"; 1029 + hash = "sha256-fIt5XouNaswWOvZWpIHbTItVzUJDCmz3XawHr6J2yyU="; 1030 + }) 1031 + (fetchNuGet { 1032 + pname = "System.Threading.Tasks.Extensions"; 1033 + version = "4.0.0"; 1034 + hash = "sha256-+YdcPkMhZhRbMZHnfsDwpNbUkr31X7pQFGxXYcAPZbE="; 1035 + }) 1036 + (fetchNuGet { 1037 + pname = "System.Threading.Tasks.Extensions"; 1038 + version = "4.3.0"; 1039 + hash = "sha256-X2hQ5j+fxcmnm88Le/kSavjiGOmkcumBGTZKBLvorPc="; 1040 + }) 1041 + (fetchNuGet { 1042 + pname = "System.Threading.Tasks.Extensions"; 1043 + version = "4.5.4"; 1044 + hash = "sha256-owSpY8wHlsUXn5xrfYAiu847L6fAKethlvYx97Ri1ng="; 1045 + }) 1046 + (fetchNuGet { 1047 + pname = "System.Threading.ThreadPool"; 1048 + version = "4.3.0"; 1049 + hash = "sha256-wW0QdvssRoaOfQLazTGSnwYTurE4R8FxDx70pYkL+gg="; 1050 + }) 1051 + (fetchNuGet { 1052 + pname = "System.Threading.Timer"; 1053 + version = "4.3.0"; 1054 + hash = "sha256-pmhslmhQhP32TWbBzoITLZ4BoORBqYk25OWbru04p9s="; 1055 + }) 1056 + (fetchNuGet { 1057 + pname = "System.Xml.ReaderWriter"; 1058 + version = "4.0.11"; 1059 + hash = "sha256-haZAFFQ9Sl2DhfvEbdx2YRqKEoxNMU5STaqpMmXw0zA="; 1060 + }) 1061 + (fetchNuGet { 1062 + pname = "System.Xml.ReaderWriter"; 1063 + version = "4.3.0"; 1064 + hash = "sha256-QQ8KgU0lu4F5Unh+TbechO//zaAGZ4MfgvW72Cn1hzA="; 1065 + }) 1066 + (fetchNuGet { 1067 + pname = "System.Xml.XDocument"; 1068 + version = "4.0.11"; 1069 + hash = "sha256-KPz1kxe0RUBM+aoktJ/f9p51GudMERU8Pmwm//HdlFg="; 1070 + }) 1071 + (fetchNuGet { 1072 + pname = "System.Xml.XDocument"; 1073 + version = "4.3.0"; 1074 + hash = "sha256-rWtdcmcuElNOSzCehflyKwHkDRpiOhJJs8CeQ0l1CCI="; 1075 + }) 1076 + (fetchNuGet { 1077 + pname = "System.Xml.XmlDocument"; 1078 + version = "4.3.0"; 1079 + hash = "sha256-kbuV4Y7rVJkfMp2Kgoi8Zvdatm9CZNmlKB3GZgANvy4="; 1080 + }) 1081 + (fetchNuGet { 1082 + pname = "WaylandNET"; 1083 + version = "0.2.0"; 1084 + hash = "sha256-E2VXvSV4KkTz1tQgGXJpuvRQiPlVvSAJb7htBFTeV+I="; 1085 + }) 1086 + (fetchNuGet { 1087 + pname = "xunit"; 1088 + version = "2.4.1"; 1089 + hash = "sha256-QGDuE0ZnsxyEJONP8GcJ80PmPeb+OawwdSW8y72aw3U="; 1090 + }) 1091 + (fetchNuGet { 1092 + pname = "xunit.abstractions"; 1093 + version = "2.0.3"; 1094 + hash = "sha256-0D1y/C34iARI96gb3bAOG8tcGPMjx+fMabTPpydGlAM="; 1095 + }) 1096 + (fetchNuGet { 1097 + pname = "xunit.analyzers"; 1098 + version = "0.10.0"; 1099 + hash = "sha256-8lRZhogXHYksa9ChnkFXpBnTMlLlYIvu3Av7qQYWwJY="; 1100 + }) 1101 + (fetchNuGet { 1102 + pname = "xunit.assert"; 1103 + version = "2.4.1"; 1104 + hash = "sha256-hl1cMSakAlwkpFEchxCNMdvQie6PMJ1uFrhzgOC3vsY="; 1105 + }) 1106 + (fetchNuGet { 1107 + pname = "xunit.core"; 1108 + version = "2.4.1"; 1109 + hash = "sha256-KgUgAIJIPHQ5VQ4FiB+i5u2JXSYxmvMCV8zXP4kcy9o="; 1110 + }) 1111 + (fetchNuGet { 1112 + pname = "xunit.extensibility.core"; 1113 + version = "2.4.1"; 1114 + hash = "sha256-oACVOrvF4XmKFr+8ZqPVpjbopZgeRwaXveJGW2XUeIA="; 1115 + }) 1116 + (fetchNuGet { 1117 + pname = "xunit.extensibility.execution"; 1118 + version = "2.4.1"; 1119 + hash = "sha256-KmKEdgsUq4zuQJ2saJA0YT1CIZ2AuhZL5V7cF2Cncd0="; 1120 + }) 1121 + (fetchNuGet { 1122 + pname = "xunit.runner.visualstudio"; 1123 + version = "2.4.3"; 1124 + hash = "sha256-42axn0yDDiJWKV8UEYzYWgiKbpc6mHh9M/eeylYGLUg="; 1125 + }) 1126 + ]
+23
pkgs/by-name/op/opentabletdriver/update.sh
··· 1 + #!/usr/bin/env nix-shell 2 + #!nix-shell -I nixpkgs=./. -i bash -p curl gnused jq common-updater-scripts nixfmt-rfc-style 3 + set -eo pipefail 4 + 5 + verlte() { 6 + printf '%s\n' "$1" "$2" | sort -C -V 7 + } 8 + 9 + new_version="$(curl ${GITHUB_TOKEN:+" -u \":$GITHUB_TOKEN\""} -s "https://api.github.com/repos/OpenTabletDriver/OpenTabletDriver/releases" | 10 + jq -r 'map(select(.prerelease == false)) | .[0].tag_name' | 11 + cut -c2-)" 12 + old_version="$(nix --extra-experimental-features 'nix-command' eval --file default.nix opentabletdriver.version --raw)" 13 + 14 + if verlte "$new_version" "$old_version"; then 15 + echo "Already up to date!" 16 + [[ "${1}" != "--force" ]] && exit 0 17 + fi 18 + 19 + update-source-version opentabletdriver "$new_version" 20 + eval "$(nix-build -A opentabletdriver.fetch-deps --no-out-link)" 21 + 22 + cd "$(dirname "${BASH_SOURCE[0]}")" 23 + nixfmt deps.nix
+3 -3
pkgs/by-name/ox/ox/package.nix
··· 10 10 11 11 rustPlatform.buildRustPackage rec { 12 12 pname = "ox"; 13 - version = "0.7.1"; 13 + version = "0.7.2"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "curlpipe"; 17 17 repo = pname; 18 18 rev = version; 19 - hash = "sha256-7rP/h3MlrMZl9yd655uRrnv1aUB57LzdyKs66wHp33Y="; 19 + hash = "sha256-yAToibHhvHAry7WVZ5uD84CbUTp06RyZ9J12/2deM1I="; 20 20 }; 21 21 22 - cargoHash = "sha256-z9pyMnYQZfCCVdVEakj3q27SFLahMDWRuAopYye6RIY="; 22 + cargoHash = "sha256-YAy5vCxcHUL0wM9+Y3GDqV/V1utL3V05heT92/zQ/X8="; 23 23 24 24 passthru = { 25 25 tests.version = testers.testVersion {
+47
pkgs/by-name/pa/parca-agent/package.nix
··· 1 + { 2 + buildGoModule, 3 + fetchFromGitHub, 4 + lib, 5 + stdenv, 6 + }: 7 + 8 + buildGoModule rec { 9 + pname = "parca-agent"; 10 + version = "0.35.0"; 11 + 12 + src = fetchFromGitHub { 13 + owner = "parca-dev"; 14 + repo = "parca-agent"; 15 + rev = "refs/tags/v${version}"; 16 + hash = "sha256-5MoHX47uUtQgszNuu9ImLJPYnaN2NKZKOPa60PMHDL0="; 17 + fetchSubmodules = true; 18 + }; 19 + 20 + proxyVendor = true; 21 + vendorHash = "sha256-v2OnCuOI9inZ4WiU/3PbBwK6ZcvZX21MNsLhRWZ6sGY="; 22 + 23 + buildInputs = [ 24 + stdenv.cc.libc.static 25 + ]; 26 + 27 + ldflags = [ 28 + "-X=main.version=${version}" 29 + "-X=main.commit=${src.rev}" 30 + "-extldflags=-static" 31 + ]; 32 + 33 + tags = [ 34 + "osusergo" 35 + "netgo" 36 + ]; 37 + 38 + meta = { 39 + description = "eBPF based, always-on profiling agent"; 40 + homepage = "https://github.com/parca-dev/parca-agent"; 41 + changelog = "https://github.com/parca-dev/parca-agent/releases/tag/v${version}"; 42 + license = lib.licenses.asl20; 43 + maintainers = with lib.maintainers; [ jnsgruk ]; 44 + platforms = lib.platforms.linux; 45 + mainProgram = "parca-agent"; 46 + }; 47 + }
+34
pkgs/by-name/pa/parca-debuginfo/package.nix
··· 1 + { 2 + lib, 3 + buildGoModule, 4 + fetchFromGitHub, 5 + }: 6 + 7 + buildGoModule rec { 8 + pname = "parca-debuginfo"; 9 + version = "0.11.0"; 10 + 11 + src = fetchFromGitHub { 12 + owner = "parca-dev"; 13 + repo = "parca-debuginfo"; 14 + rev = "refs/tags/v${version}"; 15 + hash = "sha256-gL1BgDtEf2Q7yxzpoiTJY+nsRlsWv3zYzLVvaVijMDM="; 16 + }; 17 + 18 + vendorHash = "sha256-xtKkKhKQmZcCIFTOH+oM5a2cPlAWlJPRNQWfrAl2948="; 19 + 20 + ldflags = [ 21 + "-X=main.version=${version}" 22 + "-X=main.commit=${src.rev}" 23 + ]; 24 + 25 + meta = { 26 + description = "Command line utility for handling debuginfos"; 27 + changelog = "https://github.com/parca-dev/parca-debuginfo/releases/tag/v${version}"; 28 + homepage = "https://github.com/parca-dev/parca-debuginfo"; 29 + license = lib.licenses.asl20; 30 + maintainers = with lib.maintainers; [ jnsgruk ]; 31 + platforms = lib.platforms.unix; 32 + mainProgram = "parca-debuginfo"; 33 + }; 34 + }
+6 -16
pkgs/by-name/pg/pg-gvm/package.nix pkgs/servers/sql/postgresql/ext/pg-gvm.nix
··· 1 1 { 2 + buildPostgresqlExtension, 2 3 cmake, 3 4 fetchFromGitHub, 4 5 glib, ··· 9 10 pcre2, 10 11 pkg-config, 11 12 postgresql, 12 - stdenv, 13 13 }: 14 14 15 - stdenv.mkDerivation rec { 15 + buildPostgresqlExtension (finalAttrs: { 16 16 pname = "pg-gvm"; 17 17 version = "22.6.5"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "greenbone"; 21 21 repo = "pg-gvm"; 22 - rev = "refs/tags/v${version}"; 22 + rev = "refs/tags/v${finalAttrs.version}"; 23 23 hash = "sha256-19ZmQdLjfwJwOMoO16rKJYKOnRyt7SQOdkYTxt8WQ2A="; 24 24 }; 25 25 26 26 strictDeps = true; 27 27 28 - configurePhase = '' 29 - runHook preConfigure 30 - 31 - cmake \ 32 - -DCMAKE_INSTALL_DEV_PREFIX=$out . 33 - 34 - runHook postConfigure 35 - ''; 36 - 37 28 nativeBuildInputs = [ 38 29 cmake 39 30 pkg-config ··· 46 37 icu 47 38 libical 48 39 pcre2 49 - postgresql 50 40 ]; 51 41 52 42 meta = { 53 43 description = "Greenbone Library for helper functions in PostgreSQL"; 54 44 homepage = "https://github.com/greenbone/pg-gvm"; 55 - changelog = "https://github.com/greenbone/pg-gvm/releases/tag/v${version}"; 45 + changelog = "https://github.com/greenbone/pg-gvm/releases/tag/v${finalAttrs.version}"; 56 46 license = lib.licenses.gpl3Only; 57 47 maintainers = with lib.maintainers; [ tochiaha ]; 58 48 mainProgram = "pg-gvm"; 59 - platforms = lib.platforms.all; 49 + platforms = postgresql.meta.platforms; 60 50 }; 61 - } 51 + })
+27 -10
pkgs/by-name/pg/pg_top/package.nix
··· 1 - { lib, stdenv, fetchurl, ncurses, postgresql }: 1 + { 2 + cmake, 3 + fetchurl, 4 + lib, 5 + libbsd, 6 + libelf, 7 + ncurses, 8 + postgresql, 9 + stdenv, 10 + }: 2 11 3 12 stdenv.mkDerivation rec { 4 13 pname = "pg_top"; 5 - version = "3.7.0"; 14 + version = "4.1.0"; 6 15 7 16 src = fetchurl { 8 - url = "https://pgfoundry.org/frs/download.php/1781/pg_top-${version}.tar.gz"; 9 - sha256 = "17xrv0l58rv3an06gkajzw0gg6v810xx6vl137an1iykmhvfh7h2"; 17 + url = "https://pg_top.gitlab.io/source/pg_top-${version}.tar.xz"; 18 + sha256 = "sha256-WdSiQURJgtBCYoS/maImppcyM8wzUIJzLWmiSZPlx1Q="; 10 19 }; 11 20 12 - buildInputs = [ ncurses postgresql ]; 21 + buildInputs = [ 22 + libbsd 23 + libelf 24 + ncurses 25 + postgresql 26 + ]; 27 + 28 + nativeBuildInputs = [ cmake ]; 13 29 14 30 meta = with lib; { 15 31 description = "'top' like tool for PostgreSQL"; 16 32 longDescription = '' 17 33 pg_top allows you to: 18 34 * View currently running SQL statement of a process. 19 - * View query plan of a currently running SQL statement. 35 + * View query plan of a currently running SELECT statement. 20 36 * View locks held by a process. 21 - * View user table statistics. 22 - * View user index statistics. 37 + * View I/O statistics per process. 38 + * View replication statistics for downstream nodes. 23 39 ''; 24 40 25 - homepage = "http://ptop.projects.postgresql.org/"; 41 + homepage = "https://pg_top.gitlab.io"; 42 + changelog = "https://gitlab.com/pg_top/pg_top/-/blob/main/HISTORY.rst"; 26 43 platforms = platforms.linux; 27 - license = licenses.free; # see commands.c 44 + license = licenses.bsd3; 28 45 mainProgram = "pg_top"; 29 46 }; 30 47 }
+2 -2
pkgs/by-name/pr/pragtical/package.nix
··· 20 20 21 21 stdenv.mkDerivation (finalAttrs: { 22 22 pname = "pragtical"; 23 - version = "3.5.0"; 23 + version = "3.5.1"; 24 24 pluginManagerVersion = "1.2.9"; 25 25 26 26 src = fetchFromGitHub { ··· 44 44 find subprojects -type d -name .git -prune -execdir rm -r {} + 45 45 ''; 46 46 47 - hash = "sha256-a9LnLKtJ33YHtlnhWmKBeW5dOjjwa7PmaZjYh0+Nx9g="; 47 + hash = "sha256-o19akSgsWLRTyHT+dvmTeTS4HtNfzEyNXBhVot92OD4="; 48 48 }; 49 49 50 50 nativeBuildInputs = [
+4 -4
pkgs/by-name/re/readarr/package.nix
··· 8 8 x86_64-darwin = "x64"; 9 9 }."${stdenv.hostPlatform.system}" or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 10 10 hash = { 11 - x64-linux_hash = "sha256-VI0mdNGPyT45GUrp3hpBQVe1xx/BBbMWz7iJQvvrg9E="; 12 - arm64-linux_hash = "sha256-4ahiRo13qOEUSzrwXFVRj26U0l5GblXfw7sjY8sCLxQ="; 13 - x64-osx_hash = "sha256-1HtarF+eAU2d3dQiw3n/DCIFCbgN4GEUFMlYxy8uglA="; 11 + x64-linux_hash = "sha256-48ZlBTr/lO1AAsYInu48fDB77RXH+b2hXjDPwWdeZW4="; 12 + arm64-linux_hash = "sha256-vyNoI1ffqWyYCfH+3rRNtaECkku3pF3pD+2RBchD+6o="; 13 + x64-osx_hash = "sha256-VeGq+kVuBLGqERcWyvPfcygAG0/262J9/RPr49X4jtE="; 14 14 }."${arch}-${os}_hash"; 15 15 in stdenv.mkDerivation rec { 16 16 pname = "readarr"; 17 - version = "0.4.3.2665"; 17 + version = "0.4.4.2686"; 18 18 19 19 src = fetchurl { 20 20 url = "https://github.com/Readarr/Readarr/releases/download/v${version}/Readarr.develop.${version}.${os}-core-${arch}.tar.gz";
+2 -2
pkgs/by-name/re/restinio/package.nix
··· 21 21 22 22 stdenv.mkDerivation (finalAttrs: { 23 23 pname = "restinio"; 24 - version = "0.7.2"; 24 + version = "0.7.3"; 25 25 26 26 src = fetchFromGitHub { 27 27 owner = "Stiffstream"; 28 28 repo = "restinio"; 29 29 rev = "v.${finalAttrs.version}"; 30 - hash = "sha256-Nv/VVdHciCv+DsVu3MqfXeAa8Ef+qi6c1OaTAVrYUg0="; 30 + hash = "sha256-heVdo0MtsWi/r9yse+/FZ55lhiunyEdwB3UkOOY5Vj0="; 31 31 }; 32 32 33 33 strictDeps = true;
+2 -2
pkgs/by-name/rf/rfc/package.nix
··· 8 8 9 9 stdenvNoCC.mkDerivation rec { 10 10 pname = "rfc"; 11 - version = "1.0.0"; 11 + version = "1.0.1"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "bfontaine"; 15 15 repo = "rfc"; 16 16 rev = "v${version}"; 17 - hash = "sha256-zN+MQtHh69PkzbrfceHFpBYCPmTg9qrOf/ML2efq6Xk="; 17 + hash = "sha256-bCqgLkbZGQFcxhLwekVw+rUGinXTc7QJHlVRGtNf6Jc="; 18 18 }; 19 19 20 20 nativeBuildInputs = [ installShellFiles makeWrapper ];
+3 -4
pkgs/by-name/ru/rustls-ffi/package.nix
··· 15 15 16 16 stdenv.mkDerivation (finalAttrs: { 17 17 pname = "rustls-ffi"; 18 - version = "0.13.0"; 18 + version = "0.14.1"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "rustls"; 22 22 repo = "rustls-ffi"; 23 23 rev = "v${finalAttrs.version}"; 24 - hash = "sha256-Bc9bVZ2pDsG118l/SlElZpgh9F1JEgPF8LzBX7d4mhE="; 24 + hash = "sha256-ZKAyKcKwhnPE6PrfBFjLJKkTlGbdLcmW1EP/xSv2cpM="; 25 25 }; 26 26 27 27 cargoDeps = rustPlatform.fetchCargoTarball { 28 28 src = finalAttrs.src; 29 29 name = "${finalAttrs.pname}-${finalAttrs.version}"; 30 - hash = "sha256-gDQ9AFrJuV7SrzKCAHQBkKj6clXuPLO0DHhnvcBqRLs="; 30 + hash = "sha256-IaOhQfDEgLhGmes0xzhLVym29aP691TY0EXdOIgXEMA="; 31 31 }; 32 32 33 33 propagatedBuildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ libiconv darwin.apple_sdk.frameworks.Security ]; ··· 54 54 55 55 passthru.tests = { 56 56 curl = curl.override { opensslSupport = false; rustlsSupport = true; rustls-ffi = finalAttrs.finalPackage; }; 57 - apacheHttpd = apacheHttpd.override { modTlsSupport = true; rustls-ffi = finalAttrs.finalPackage; }; 58 57 pkg-config = testers.testMetaPkgConfig finalAttrs.finalPackage; 59 58 }; 60 59
+1 -2
pkgs/by-name/se/servo/package.nix
··· 110 110 perl 111 111 pkg-config 112 112 python3 113 + rustPlatform.bindgenHook 113 114 taplo 114 115 which 115 116 yasm ··· 141 142 wrapProgram $out/bin/servo \ 142 143 --prefix LD_LIBRARY_PATH : ${runtimePaths} 143 144 ''; 144 - 145 - LIBCLANG_PATH = "${lib.getLib llvmPackages.libclang}/lib"; 146 145 147 146 meta = { 148 147 description = "The embeddable, independent, memory-safe, modular, parallel web rendering engine";
+3 -3
pkgs/by-name/sv/svd2rust/package.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "svd2rust"; 5 - version = "0.33.5"; 5 + version = "0.35.0"; 6 6 7 7 src = fetchCrate { 8 8 inherit pname version; 9 - hash = "sha256-wZfCk8jzTmltpmrp7QWU1uS5ct10iltNFdUCJvnrv98="; 9 + hash = "sha256-KLwIwJtPBQ8Sa94/IEJhIGTx/n3oYQKINmNV5L5TJV0="; 10 10 }; 11 11 12 - cargoHash = "sha256-5m3/5zwjDeDgPuUsTIknXwEMjQs0gtVoksQn4EdPnwM="; 12 + cargoHash = "sha256-4a89Do57KFKu/RDTB4BxUxVlO46HL5aEhhHmnzLuZGo="; 13 13 14 14 # error: linker `aarch64-linux-gnu-gcc` not found 15 15 postPatch = ''
+3 -3
pkgs/by-name/tb/tbls/package.nix
··· 9 9 10 10 buildGoModule rec { 11 11 pname = "tbls"; 12 - version = "1.78.0"; 12 + version = "1.79.4"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "k1LoW"; 16 16 repo = "tbls"; 17 17 rev = "v${version}"; 18 - hash = "sha256-vqt4IlVvqlUjDqvcdiRctt/VuEkZ5YzCXYHvHfc87Ew="; 18 + hash = "sha256-o/ZhXoenK3xlflRMXS9NtnW23VBiDmDPSGlHtE3cNiM="; 19 19 }; 20 20 21 - vendorHash = "sha256-cnACY+NIjsVe6BU7AjTO+yLDn0f1HO1gHnw5SgqKuy4="; 21 + vendorHash = "sha256-SkddF8ZxvGRQ+/tWnmlcoaTs3MRfVgQWX4MZ05nZ9XA="; 22 22 23 23 nativeBuildInputs = [ installShellFiles ]; 24 24
+2 -2
pkgs/by-name/te/terraform-backend-git/package.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "terraform-backend-git"; 9 - version = "0.1.7"; 9 + version = "0.1.8"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "plumber-cd"; 13 13 repo = "terraform-backend-git"; 14 14 rev = "v${version}"; 15 - hash = "sha256-mLgUA7f4enlVuQx4VM3QbNuaAq7FgDaRyiG0sbT31ng="; 15 + hash = "sha256-mZbGMv5b9wK/gWqQB75sDJIVURrS6t/L7WBhTonaatQ="; 16 16 }; 17 17 18 18 vendorHash = "sha256-vFx59dIdniLRP0xHcD3c22GidZOPdGZvmvg/BvxFBGI=";
+3 -3
pkgs/by-name/up/updatecli/package.nix
··· 11 11 12 12 buildGoModule rec { 13 13 pname = "updatecli"; 14 - version = "0.82.0"; 14 + version = "0.88.0"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "updatecli"; 18 18 repo = "updatecli"; 19 19 rev = "v${version}"; 20 - hash = "sha256-kNc+Z+v4fvuWO/Ibr9VOekMDT39YEwA/fReP+e3C74U="; 20 + hash = "sha256-qWggdLNF6iWrbcKgdR3Tr19bwK5wS5ffadS3kMFGp5E="; 21 21 }; 22 22 23 - vendorHash = "sha256-fnx0EAGxau0+ktnuUb8ljolNAlwu2595FMjsDbM2MiY="; 23 + vendorHash = "sha256-feBmzBrV6yoepU8CiqKaB/bCWIhuiDNhMTem0y1Lynw="; 24 24 25 25 # tests require network access 26 26 doCheck = false;
+2 -2
pkgs/by-name/ve/vencord/package.nix
··· 14 14 }: 15 15 stdenv.mkDerivation (finalAttrs: { 16 16 pname = "vencord"; 17 - version = "1.10.7"; 17 + version = "1.10.8"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "Vendicated"; 21 21 repo = "Vencord"; 22 22 rev = "v${finalAttrs.version}"; 23 - hash = "sha256-/CZzRIXD0shEok9H+Vx7s9BmzXTI6ly957jvS+nU2fI="; 23 + hash = "sha256-2UOz8o+3jWppk6lWatbG0avcqBFpxHYSMEspCpFWWOk="; 24 24 }; 25 25 26 26 pnpmDeps = pnpm.fetchDeps {
+38
pkgs/by-name/xa/xautocfg/package.nix
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + libX11, 6 + libXi, 7 + }: 8 + 9 + stdenv.mkDerivation (finalAttrs: { 10 + pname = "xautocfg"; 11 + version = "1.2"; 12 + 13 + src = fetchFromGitHub { 14 + owner = "SFTtech"; 15 + repo = "xautocfg"; 16 + rev = "refs/tags/v${finalAttrs.version}"; 17 + hash = "sha256-NxfuBknNRicmEAPBeMaNb57gpM0y0t+JmNMKpSNzlQM="; 18 + }; 19 + 20 + buildInputs = [ 21 + libX11 22 + libXi 23 + ]; 24 + 25 + makeFlags = [ 26 + "PREFIX=${placeholder "out"}" 27 + "MANPREFIX=${placeholder "out"}" 28 + ]; 29 + 30 + meta = { 31 + homepage = "https://github.com/SFTtech/xautocfg"; 32 + description = "Automatic keyboard repeat rate configuration for new keyboards"; 33 + license = lib.licenses.gpl3Only; 34 + maintainers = with lib.maintainers; [ jceb ]; 35 + mainProgram = "xautocfg"; 36 + platforms = lib.platforms.linux; 37 + }; 38 + })
+50 -42
pkgs/development/compilers/binaryen/default.nix
··· 1 1 { lib, stdenv, cmake, python3, fetchFromGitHub, emscripten, 2 2 gtest, lit, nodejs, filecheck 3 3 }: 4 - 5 - stdenv.mkDerivation rec { 6 - pname = "binaryen"; 7 - version = "118"; 8 - 9 - src = fetchFromGitHub { 4 + let 5 + testsuite = fetchFromGitHub { 10 6 owner = "WebAssembly"; 11 - repo = "binaryen"; 12 - rev = "version_${version}"; 13 - hash = "sha256-akMW3S2/qUyLK8F77EtnaXPDXvIMpkGfNB2jOD6hQho="; 7 + repo = "testsuite"; 8 + rev = "e05365077e13a1d86ffe77acfb1a835b7aa78422"; 9 + hash = "sha256-yvZ5AZTPUA6nsD3xpFC0VLthiu2CxVto66RTXBXXeJM="; 14 10 }; 11 + in 12 + stdenv.mkDerivation rec { 13 + pname = "binaryen"; 14 + version = "119"; 15 15 16 - nativeBuildInputs = [ cmake python3 ]; 16 + src = fetchFromGitHub { 17 + owner = "WebAssembly"; 18 + repo = "binaryen"; 19 + rev = "version_${version}"; 20 + hash = "sha256-JYXtN3CW4qm/nnjGRvv3GxQ0x9O9wHtNYQLqHIYTTOA="; 21 + }; 17 22 18 - preConfigure = '' 19 - if [ $doCheck -eq 1 ]; then 20 - sed -i '/googletest/d' third_party/CMakeLists.txt 21 - else 22 - cmakeFlagsArray=($cmakeFlagsArray -DBUILD_TESTS=0) 23 - fi 24 - ''; 23 + nativeBuildInputs = [ cmake python3 ]; 25 24 26 - nativeCheckInputs = [ gtest lit nodejs filecheck ]; 27 - checkPhase = '' 28 - LD_LIBRARY_PATH=$LD_LIBRARY_PATH:$PWD/lib python3 ../check.py $tests 29 - ''; 25 + preConfigure = '' 26 + if [ $doCheck -eq 1 ]; then 27 + sed -i '/googletest/d' third_party/CMakeLists.txt 28 + rmdir test/spec/testsuite 29 + ln -s ${testsuite} test/spec/testsuite 30 + else 31 + cmakeFlagsArray=($cmakeFlagsArray -DBUILD_TESTS=0) 32 + fi 33 + ''; 30 34 31 - tests = [ 32 - "version" "wasm-opt" "wasm-dis" 33 - "crash" "dylink" "ctor-eval" 34 - "wasm-metadce" "wasm-reduce" "spec" 35 - "lld" "wasm2js" "validator" 36 - "example" "unit" 37 - # "binaryenjs" "binaryenjs_wasm" # not building this 38 - "lit" "gtest" 39 - ]; 40 - doCheck = stdenv.hostPlatform.isLinux; 35 + nativeCheckInputs = [ gtest lit nodejs filecheck ]; 36 + checkPhase = '' 37 + LD_LIBRARY_PATH=$LD_LIBRARY_PATH:$PWD/lib python3 ../check.py $tests 38 + ''; 41 39 42 - meta = with lib; { 43 - homepage = "https://github.com/WebAssembly/binaryen"; 44 - description = "Compiler infrastructure and toolchain library for WebAssembly, in C++"; 45 - platforms = platforms.all; 46 - maintainers = with maintainers; [ asppsa willcohen ]; 47 - license = licenses.asl20; 48 - }; 40 + tests = [ 41 + "version" "wasm-opt" "wasm-dis" 42 + "crash" "dylink" "ctor-eval" 43 + "wasm-metadce" "wasm-reduce" "spec" 44 + "lld" "wasm2js" "validator" 45 + "example" "unit" 46 + # "binaryenjs" "binaryenjs_wasm" # not building this 47 + "lit" "gtest" 48 + ]; 49 + doCheck = stdenv.isLinux; 49 50 50 - passthru.tests = { 51 - inherit emscripten; 52 - }; 53 - } 51 + meta = with lib; { 52 + homepage = "https://github.com/WebAssembly/binaryen"; 53 + description = "Compiler infrastructure and toolchain library for WebAssembly, in C++"; 54 + platforms = platforms.all; 55 + maintainers = with maintainers; [ asppsa willcohen ]; 56 + license = licenses.asl20; 57 + }; 58 + passthru.tests = { 59 + inherit emscripten; 60 + }; 61 + }
+6 -3
pkgs/development/compilers/emscripten/default.nix
··· 8 8 9 9 stdenv.mkDerivation rec { 10 10 pname = "emscripten"; 11 - version = "3.1.64"; 11 + version = "3.1.73"; 12 12 13 13 llvmEnv = symlinkJoin { 14 14 name = "emscripten-llvm-${version}"; ··· 19 19 name = "emscripten-node-modules-${version}"; 20 20 inherit pname version src; 21 21 22 - npmDepsHash = "sha256-2dsIuB6P+Z3wflIsn6QaZvjHeHHGzsFAI3GcP3SfiP4="; 22 + npmDepsHash = "sha256-bqxUlxpIH1IAx9RbnaMq4dZW8fy+M/Q02Q7VrW/AKNQ="; 23 23 24 24 dontBuild = true; 25 25 ··· 32 32 src = fetchFromGitHub { 33 33 owner = "emscripten-core"; 34 34 repo = "emscripten"; 35 - hash = "sha256-AbO1b4pxZ7I6n1dRzxhLC7DnXIUnaCK9SbLy96Qxqr0="; 35 + hash = "sha256-QlC2k2rhF3/Pz+knnrlBDV8AfHHBSlGr7b9Ae6TNsxY="; 36 36 rev = version; 37 37 }; 38 38 ··· 50 50 runHook preBuild 51 51 52 52 patchShebangs . 53 + 54 + # emscripten 3.1.67 requires LLVM tip-of-tree instead of LLVM 18 55 + sed -i -e "s/EXPECTED_LLVM_VERSION = 20/EXPECTED_LLVM_VERSION = 19/g" tools/shared.py 53 56 54 57 # fixes cmake support 55 58 sed -i -e "s/print \('emcc (Emscript.*\)/sys.stderr.write(\1); sys.stderr.flush()/g" emcc.py
+13 -8
pkgs/development/compilers/ghc/common-hadrian.nix
··· 169 169 170 170 patches = 171 171 let 172 - # Disable haddock generating pretty source listings to stay under 3GB on aarch64-linux 173 172 enableHyperlinkedSource = 174 - lib.versionAtLeast version "9.8" || 175 - !(stdenv.hostPlatform.isAarch64 && stdenv.hostPlatform.isLinux); 173 + # Disable haddock generating pretty source listings to stay under 3GB on aarch64-linux 174 + !(stdenv.hostPlatform.isAarch64 && stdenv.hostPlatform.isLinux) 175 + # 9.8 and 9.10 don't run into this problem for some reason 176 + || (lib.versionAtLeast version "9.8" && lib.versionOlder version "9.11"); 176 177 in 177 178 [ 178 179 # Fix docs build with Sphinx >= 7 https://gitlab.haskell.org/ghc/ghc/-/issues/24129 ··· 207 208 then ./Cabal-at-least-3.6-paths-fix-cycle-aarch64-darwin.patch 208 209 else ./Cabal-3.12-paths-fix-cycle-aarch64-darwin.patch) 209 210 ] 210 - # Prevents passing --hyperlinked-source to haddock. This is a custom 211 - # workaround as we wait for this to be configurable via userSettings or 212 - # similar. https://gitlab.haskell.org/ghc/ghc/-/issues/23625 211 + # Prevents passing --hyperlinked-source to haddock. Note that this can 212 + # be configured via a user defined flavour now. Unfortunately, it is 213 + # impossible to import an existing flavour in UserSettings, so patching 214 + # the defaults is actually simpler and less maintenance intensive 215 + # compared to keeping an entire flavour definition in sync with upstream 216 + # manually. See also https://gitlab.haskell.org/ghc/ghc/-/issues/23625 213 217 ++ lib.optionals (!enableHyperlinkedSource) [ 214 - # TODO(@sternenseemann): Doesn't apply for GHC >= 9.8 215 - ../../tools/haskell/hadrian/disable-hyperlinked-source.patch 218 + (if lib.versionOlder version "9.8" 219 + then ../../tools/haskell/hadrian/disable-hyperlinked-source-pre-9.8.patch 220 + else ../../tools/haskell/hadrian/disable-hyperlinked-source-extra-args.patch) 216 221 ] 217 222 # Incorrect bounds on Cabal in hadrian 218 223 # https://gitlab.haskell.org/ghc/ghc/-/issues/24100
+26 -13
pkgs/development/haskell-modules/configuration-common.nix
··· 102 102 ####################################### 103 103 104 104 # All jailbreaks in this section due to: https://github.com/haskell/haskell-language-server/pull/4316#discussion_r1667684895 105 - haskell-language-server = doJailbreak (dontCheck (super.haskell-language-server.overrideScope (lself: lsuper: { 106 - # For most ghc versions, we overrideScope Cabal in the configuration-ghc-???.nix, 107 - # because some packages, like ormolu, need a newer Cabal version. 108 - # ghc-paths is special because it depends on Cabal for building 109 - # its Setup.hs, and therefor declares a Cabal dependency, but does 110 - # not actually use it as a build dependency. 111 - # That means ghc-paths can just use the ghc included Cabal version, 112 - # without causing package-db incoherence and we should do that because 113 - # otherwise we have different versions of ghc-paths 114 - # around which have the same abi-hash, which can lead to confusions and conflicts. 115 - ghc-paths = lsuper.ghc-paths.override { Cabal = null; }; 116 - }))); 105 + haskell-language-server = 106 + lib.pipe 107 + (super.haskell-language-server.overrideScope (lself: lsuper: { 108 + # For most ghc versions, we overrideScope Cabal in the configuration-ghc-???.nix, 109 + # because some packages, like ormolu, need a newer Cabal version. 110 + # ghc-paths is special because it depends on Cabal for building 111 + # its Setup.hs, and therefor declares a Cabal dependency, but does 112 + # not actually use it as a build dependency. 113 + # That means ghc-paths can just use the ghc included Cabal version, 114 + # without causing package-db incoherence and we should do that because 115 + # otherwise we have different versions of ghc-paths 116 + # around which have the same abi-hash, which can lead to confusions and conflicts. 117 + ghc-paths = lsuper.ghc-paths.override { Cabal = null; }; 118 + })) 119 + [ 120 + doJailbreak 121 + dontCheck 122 + ]; 123 + 117 124 hls-plugin-api = doJailbreak super.hls-plugin-api; 118 - ghcide = doJailbreak super.ghcide; 125 + ghcide = doJailbreak (appendPatch (pkgs.fetchpatch { 126 + name = "ghcide-ghc-9.8.3.patch"; 127 + url = "https://github.com/haskell/haskell-language-server/commit/6d0a6f220226fe6c1cb5b6533177deb55e755b0b.patch"; 128 + sha256 = "1jwxldar9qzkg2z6vsx8f2yih3vkf4yjk9p3mryv0azn929qn3h1"; 129 + stripLen = 1; 130 + excludes = [ "cabal.project" ]; 131 + }) super.ghcide); 119 132 120 133 # For -f-auto see cabal.project in haskell-language-server. 121 134 ghc-lib-parser-ex = addBuildDepend self.ghc-lib-parser (disableCabalFlag "auto" super.ghc-lib-parser-ex);
+61
pkgs/development/haskell-modules/configuration-ghc-9.14.x.nix
··· 1 + { pkgs, haskellLib }: 2 + 3 + let 4 + inherit (pkgs) lib; 5 + 6 + in 7 + 8 + self: super: { 9 + llvmPackages = lib.dontRecurseIntoAttrs self.ghc.llvmPackages; 10 + 11 + # Disable GHC core libraries 12 + array = null; 13 + base = null; 14 + binary = null; 15 + bytestring = null; 16 + Cabal = null; 17 + Cabal-syntax = null; 18 + containers = null; 19 + deepseq = null; 20 + directory = null; 21 + exceptions = null; 22 + file-io = null; 23 + filepath = null; 24 + ghc-bignum = null; 25 + ghc-boot = null; 26 + ghc-boot-th = null; 27 + ghc-compact = null; 28 + ghc-experimental = null; 29 + ghc-heap = null; 30 + ghc-internal = null; 31 + ghc-platform = null; 32 + ghc-prim = null; 33 + ghc-toolchain = null; 34 + ghci = null; 35 + haddock-api = null; 36 + haddock-library = null; 37 + haskeline = null; 38 + hpc = null; 39 + integer-gmp = null; 40 + mtl = null; 41 + os-string = null; 42 + parsec = null; 43 + pretty = null; 44 + process = null; 45 + rts = null; 46 + semaphore-compat = null; 47 + stm = null; 48 + system-cxx-std-lib = null; 49 + template-haskell = null; 50 + # GHC only builds terminfo if it is a native compiler 51 + terminfo = 52 + if pkgs.stdenv.hostPlatform == pkgs.stdenv.buildPlatform then 53 + null 54 + else 55 + haskellLib.doDistribute self.terminfo_0_4_1_6; 56 + text = null; 57 + time = null; 58 + transformers = null; 59 + unix = null; 60 + xhtml = null; 61 + }
+16 -14
pkgs/development/julia-modules/default.nix
··· 165 165 runCommand "julia-${julia.version}-env" { 166 166 nativeBuildInputs = [makeWrapper]; 167 167 168 - inherit julia; 169 - inherit juliaWrapped; 170 - meta = julia.meta; 168 + passthru = { 169 + inherit julia; 170 + inherit juliaWrapped; 171 + inherit (julia) pname version meta; 171 172 172 - # Expose the steps we used along the way in case the user wants to use them, for example to build 173 - # expressions and build them separately to avoid IFD. 174 - inherit dependencies; 175 - inherit closureYaml; 176 - inherit dependencyUuidToInfoYaml; 177 - inherit dependencyUuidToRepoYaml; 178 - inherit minimalRegistry; 179 - inherit artifactsNix; 180 - inherit overridesJson; 181 - inherit overridesToml; 182 - inherit projectAndDepot; 173 + # Expose the steps we used along the way in case the user wants to use them, for example to build 174 + # expressions and build them separately to avoid IFD. 175 + inherit dependencies; 176 + inherit closureYaml; 177 + inherit dependencyUuidToInfoYaml; 178 + inherit dependencyUuidToRepoYaml; 179 + inherit minimalRegistry; 180 + inherit artifactsNix; 181 + inherit overridesJson; 182 + inherit overridesToml; 183 + inherit projectAndDepot; 184 + }; 183 185 } ('' 184 186 mkdir -p $out/bin 185 187 makeWrapper ${juliaWrapped}/bin/julia $out/bin/julia \
+1 -1
pkgs/development/libraries/tk/generic.nix
··· 24 24 '' 25 25 + lib.optionalString (stdenv.hostPlatform.isDarwin && lib.versionOlder stdenv.hostPlatform.darwinMinVersion "11") '' 26 26 substituteInPlace unix/configure* \ 27 - --replace " -framework UniformTypeIdentifiers" "" 27 + --replace-fail " -weak_framework UniformTypeIdentifiers" "" 28 28 ''; 29 29 30 30 postInstall = ''
+12
pkgs/development/php-packages/imagick/default.nix
··· 1 1 { 2 2 buildPecl, 3 + fetchpatch, 3 4 lib, 4 5 imagemagick, 5 6 pkg-config, 6 7 pcre2, 8 + php, 7 9 }: 8 10 9 11 buildPecl { ··· 15 17 configureFlags = [ "--with-imagick=${imagemagick.dev}" ]; 16 18 nativeBuildInputs = [ pkg-config ]; 17 19 buildInputs = [ pcre2 ]; 20 + 21 + patches = lib.optionals (lib.versionAtLeast php.version "8.4") [ 22 + # PHP 8.4 compatibility patch based on https://github.com/Imagick/imagick/pull/690 23 + # These is also an alternative https://github.com/Imagick/imagick/pull/704 24 + # Which includes more changes but doesn't apply cleanly. 25 + (fetchpatch { 26 + url = "https://github.com/Imagick/imagick/commit/65e27f2bc02e7e8f1bf64e26e359e42a1331fca1.patch"; 27 + hash = "sha256-I0FwdqtQ/Y/QVkCl+nWPBIxsdQY6qcjdwiA/BaLNl7g="; 28 + }) 29 + ]; 18 30 19 31 meta = with lib; { 20 32 description = "Imagick is a native php extension to create and modify images using the ImageMagick API";
+2 -2
pkgs/development/python-modules/aiovlc/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "aiovlc"; 16 - version = "0.6.2"; 16 + version = "0.6.3"; 17 17 pyproject = true; 18 18 19 19 disabled = pythonOlder "3.11"; ··· 22 22 owner = "MartinHjelmare"; 23 23 repo = "aiovlc"; 24 24 rev = "refs/tags/v${version}"; 25 - hash = "sha256-tvMd7kydL4fx9JLTFQgCskBQCV0Zs/swDpPBxtSEvyM="; 25 + hash = "sha256-b4QtTR/p2wmVk4LZdkWwzM1odx1cxjUF08pV/zunTx4="; 26 26 }; 27 27 28 28 build-system = [ poetry-core ];
+2 -2
pkgs/development/python-modules/databricks-sdk/default.nix
··· 22 22 23 23 buildPythonPackage rec { 24 24 pname = "databricks-sdk"; 25 - version = "0.35.0"; 25 + version = "0.38.0"; 26 26 pyproject = true; 27 27 28 28 src = fetchFromGitHub { 29 29 owner = "databricks"; 30 30 repo = "databricks-sdk-py"; 31 31 rev = "refs/tags/v${version}"; 32 - hash = "sha256-CEv/+3E7KWV9LXzFPvDQIL1v8iFgbsS3/cTS/4obWas="; 32 + hash = "sha256-g00NRo0FSHujN2mCLZCc1hKGsBFiN7ztEneUMziuQpk="; 33 33 }; 34 34 35 35 build-system = [
+2 -2
pkgs/development/python-modules/dbt-snowflake/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "dbt-snowflake"; 14 - version = "1.8.3"; 14 + version = "1.8.4"; 15 15 pyproject = true; 16 16 17 17 disabled = pythonOlder "3.7"; ··· 20 20 owner = "dbt-labs"; 21 21 repo = "dbt-snowflake"; 22 22 rev = "refs/tags/v${version}"; 23 - hash = "sha256-jvhjf+Ce/oyHXFxMryz5Uy6Hq5Sx6vKgaGEJVAzqSdA="; 23 + hash = "sha256-XUHXyxAoIBHXmH2xXOGrCO2+WMwwJ7oVYt4+m/fT/Ko="; 24 24 }; 25 25 26 26 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/eq3btsmart/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "eq3btsmart"; 15 - version = "1.2.0"; 15 + version = "1.4.1"; 16 16 pyproject = true; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "EuleMitKeule"; 20 20 repo = "eq3btsmart"; 21 21 rev = "refs/tags/${version}"; 22 - hash = "sha256-Z3GfUTh3qp5ICJAYsCO6ufw/Jd5FDjOaQE9SaD3H0IU="; 22 + hash = "sha256-FRnCnSMtsiZ1AbZOMwO/I5UoFWP0xAFqRZsnrHG9WJA="; 23 23 }; 24 24 25 25 build-system = [ poetry-core ];
+2 -2
pkgs/development/python-modules/fastcore/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "fastcore"; 12 - version = "1.7.20"; 12 + version = "1.7.22"; 13 13 pyproject = true; 14 14 15 15 disabled = pythonOlder "3.8"; ··· 18 18 owner = "fastai"; 19 19 repo = "fastcore"; 20 20 rev = "refs/tags/${version}"; 21 - hash = "sha256-UGY6iSRF8pY5frZqarxpiNkGEQtgNdXY5mMQzbzMjhA="; 21 + hash = "sha256-llD7hDZStgCUfp06byGLtLPgDqiK7BAMw9kLNzOGUec="; 22 22 }; 23 23 24 24 build-system = [ setuptools ];
+3 -11
pkgs/development/python-modules/glances-api/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "glances-api"; 16 - version = "0.8.0"; 16 + version = "0.9.0"; 17 17 pyproject = true; 18 18 19 19 disabled = pythonOlder "3.11"; ··· 22 22 owner = "home-assistant-ecosystem"; 23 23 repo = "python-glances-api"; 24 24 rev = "refs/tags/${version}"; 25 - hash = "sha256-QAnwFX53jf7yWWa308/XTARNw5Qeo9K2zfD+6+HiFuM="; 25 + hash = "sha256-VLsNMFFt+kMxNw/81OMX4Fg/xCbQloCURmV0OxvClq8="; 26 26 }; 27 27 28 - patches = [ 29 - (fetchpatch2 { 30 - name = "pytest-httpx-compat.patch"; 31 - url = "https://github.com/home-assistant-ecosystem/python-glances-api/commit/f193472a25469e7e4b946f9a1c3a7a95949c6c04.patch"; 32 - hash = "sha256-hFeWv2WdbdeoaHgAOmwtBwWwPLjJzyurTZDV98qR7F8="; 33 - }) 34 - ]; 35 - 36 28 build-system = [ poetry-core ]; 37 29 38 30 dependencies = [ httpx ]; ··· 49 41 description = "Python API for interacting with Glances"; 50 42 homepage = "https://github.com/home-assistant-ecosystem/python-glances-api"; 51 43 changelog = "https://github.com/home-assistant-ecosystem/python-glances-api/releases/tag/${version}"; 52 - license = with licenses; [ mit ]; 44 + license = licenses.mit; 53 45 maintainers = with maintainers; [ fab ]; 54 46 }; 55 47 }
+2 -2
pkgs/development/python-modules/herepy/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "herepy"; 14 - version = "3.6.4"; 14 + version = "3.6.5"; 15 15 pyproject = true; 16 16 17 17 disabled = pythonOlder "3.8"; ··· 20 20 owner = "abdullahselek"; 21 21 repo = "HerePy"; 22 22 rev = "refs/tags/${version}"; 23 - hash = "sha256-XefoRAaWq5sPQsrqek6kibRjKU+ZImQmt32jutfptNw="; 23 + hash = "sha256-8DwzzC0sTrGnMpuADc55HCIeH/KyWacv8X+Ubh+n7ZM="; 24 24 }; 25 25 26 26 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/kbcstorage/default.nix
··· 18 18 19 19 buildPythonPackage rec { 20 20 pname = "sapi-python-client"; 21 - version = "0.9.1"; 21 + version = "0.9.2"; 22 22 pyproject = true; 23 23 24 24 disabled = pythonOlder "3.7"; ··· 27 27 owner = "keboola"; 28 28 repo = "sapi-python-client"; 29 29 rev = "refs/tags/${version}"; 30 - hash = "sha256-4ykOwSQ1tM0ZviETkjU0ydg7FWjkGNysHQe+f9MS0MM="; 30 + hash = "sha256-30bAw5pYEUj0jeZWiJxzZ7lDs/+63tlcoLaHrUmYCs8="; 31 31 }; 32 32 33 33 postPatch = ''
+2 -2
pkgs/development/python-modules/latexrestricted/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "latexrestricted"; 10 - version = "0.6.0"; 10 + version = "0.6.2"; 11 11 pyproject = true; 12 12 13 13 src = fetchPypi { 14 14 inherit pname version; 15 - hash = "sha256-/N5eC32OVN6qxWZAwAUlCIrMV2ARitiX3gaCPiSCRHs="; 15 + hash = "sha256-1R0hpBGXpYH/KcD4GFUfFvoOaJDe+Sl5msC952KnqmA="; 16 16 }; 17 17 18 18 build-system = [ setuptools ];
+3 -3
pkgs/development/python-modules/libcst/default.nix
··· 23 23 24 24 buildPythonPackage rec { 25 25 pname = "libcst"; 26 - version = "1.5.0"; 26 + version = "1.5.1"; 27 27 pyproject = true; 28 28 29 29 disabled = pythonOlder "3.9"; ··· 32 32 owner = "Instagram"; 33 33 repo = "LibCST"; 34 34 rev = "refs/tags/v${version}"; 35 - hash = "sha256-0r2xQ8QVmA4I6eZHBWd/U1fQ8nK5rdblIoMACudOYPY="; 35 + hash = "sha256-fveY4ah94pv9ImI36MNrrxTpZv/DtLb45pXm67L8/GA="; 36 36 }; 37 37 38 38 cargoDeps = rustPlatform.fetchCargoTarball { 39 39 inherit src; 40 40 sourceRoot = "${src.name}/${cargoRoot}"; 41 41 name = "${pname}-${version}"; 42 - hash = "sha256-mexXuOsL1+F/GL2wMf/pwK7bJLFRgPtPSYE4W3E0VQ0="; 42 + hash = "sha256-TcWGW1RF2se89BtvQHO+4BwnRMZ8ygqO3du9Q/gZi/Q="; 43 43 }; 44 44 45 45 cargoRoot = "native";
+103
pkgs/development/python-modules/llama-cpp-python/default.nix
··· 1 + { 2 + lib, 3 + stdenv, 4 + buildPythonPackage, 5 + cmake, 6 + fetchFromGitHub, 7 + gitUpdater, 8 + ninja, 9 + pathspec, 10 + pyproject-metadata, 11 + pytestCheckHook, 12 + pythonOlder, 13 + scikit-build-core, 14 + llama-cpp-python, 15 + 16 + config, 17 + cudaSupport ? config.cudaSupport, 18 + cudaPackages ? { }, 19 + 20 + diskcache, 21 + jinja2, 22 + numpy, 23 + typing-extensions, 24 + scipy, 25 + huggingface-hub, 26 + }: 27 + let 28 + version = "0.3.1"; 29 + in 30 + buildPythonPackage { 31 + pname = "llama-cpp-python"; 32 + inherit version; 33 + pyproject = true; 34 + 35 + disabled = pythonOlder "3.7"; 36 + 37 + stdenv = if cudaSupport then cudaPackages.backendStdenv else stdenv; 38 + 39 + src = fetchFromGitHub { 40 + owner = "abetlen"; 41 + repo = "llama-cpp-python"; 42 + rev = "refs/tags/v${version}"; 43 + hash = "sha256-eO1zvNJZBE5BCnbgbh00tFIRWBCWor1lIsrLXs/HFds="; 44 + fetchSubmodules = true; 45 + }; 46 + 47 + dontUseCmakeConfigure = true; 48 + SKBUILD_CMAKE_ARGS = lib.strings.concatStringsSep ";" ( 49 + lib.optionals cudaSupport [ 50 + "-DGGML_CUDA=on" 51 + "-DCUDAToolkit_ROOT=${lib.getDev cudaPackages.cuda_nvcc}" 52 + "-DCMAKE_CUDA_COMPILER=${lib.getExe cudaPackages.cuda_nvcc}" 53 + ] 54 + ); 55 + 56 + nativeBuildInputs = [ 57 + cmake 58 + ninja 59 + pathspec 60 + pyproject-metadata 61 + scikit-build-core 62 + ]; 63 + 64 + buildInputs = lib.optionals cudaSupport ( 65 + with cudaPackages; 66 + [ 67 + cuda_cudart # cuda_runtime.h 68 + cuda_cccl # <thrust/*> 69 + libcublas # cublas_v2.h 70 + ] 71 + ); 72 + 73 + propagatedBuildInputs = [ 74 + diskcache 75 + jinja2 76 + numpy 77 + typing-extensions 78 + ]; 79 + 80 + nativeCheckInputs = [ 81 + pytestCheckHook 82 + scipy 83 + huggingface-hub 84 + ]; 85 + 86 + disabledTests = [ 87 + # tries to download model from huggingface-hub 88 + "test_real_model" 89 + "test_real_llama" 90 + ]; 91 + 92 + pythonImportsCheck = [ "llama_cpp" ]; 93 + 94 + passthru.updateScript = gitUpdater { rev-prefix = "v"; }; 95 + passthru.tests.llama-cpp-python = llama-cpp-python.override { cudaSupport = true; }; 96 + 97 + meta = { 98 + description = "Python bindings for llama.cpp"; 99 + homepage = "https://github.com/abetlen/llama-cpp-python"; 100 + license = lib.licenses.mit; 101 + maintainers = with lib.maintainers; [ kirillrdy ]; 102 + }; 103 + }
+23 -19
pkgs/development/python-modules/moderngl-window/default.nix
··· 3 3 stdenv, 4 4 buildPythonPackage, 5 5 fetchFromGitHub, 6 + 7 + # build-system 6 8 setuptools, 7 - glfw, 8 - mesa, 9 + 10 + # dependencies 9 11 moderngl, 10 12 numpy, 11 13 pillow, 14 + pyglet, 15 + pyglm, 16 + 17 + # optional-dependencies 18 + trimesh, 19 + scipy, 20 + glfw, 12 21 pygame, 13 - pyglet, 14 - pyqt5, 15 - pyrr, 16 22 pysdl2, 17 23 pyside2, 18 - pythonOlder, 19 - scipy, 20 - trimesh, 24 + pyqt5, 25 + 26 + mesa, 21 27 }: 22 28 23 29 buildPythonPackage rec { 24 30 pname = "moderngl-window"; 25 - version = "2.4.6"; 31 + version = "3.0.0"; 26 32 pyproject = true; 27 33 28 - disabled = pythonOlder "3.8"; 29 - 30 34 src = fetchFromGitHub { 31 35 owner = "moderngl"; 32 36 repo = "moderngl_window"; 33 37 rev = "refs/tags/${version}"; 34 - hash = "sha256-zTygSXU/vQZaFCuHbRBpO9/BYYA2UOid+wvhyc2bWMI="; 38 + hash = "sha256-V6QQCQcSSEt11+Xv6HtWZSH+/nPFRZZK1ThQJipIT0M="; 35 39 }; 36 40 37 41 pythonRelaxDeps = [ ··· 42 46 setuptools 43 47 ]; 44 48 45 - dependencies = [ 49 + propagatedBuildInputs = [ 50 + moderngl 46 51 numpy 47 - moderngl 52 + pillow 48 53 pyglet 49 - pillow 50 - pyrr 54 + pyglm 51 55 ]; 52 56 53 57 optional-dependencies = { ··· 67 71 68 72 pythonImportsCheck = [ "moderngl_window" ]; 69 73 70 - meta = with lib; { 74 + meta = { 71 75 description = "Cross platform helper library for ModernGL making window creation and resource loading simple"; 72 76 homepage = "https://github.com/moderngl/moderngl-window"; 73 77 changelog = "https://github.com/moderngl/moderngl-window/blob/${version}/CHANGELOG.md"; 74 - license = licenses.mit; 75 - maintainers = with maintainers; [ c0deaddict ]; 78 + license = lib.licenses.mit; 79 + maintainers = with lib.maintainers; [ c0deaddict ]; 76 80 inherit (mesa.meta) platforms; 77 81 broken = stdenv.hostPlatform.isDarwin; 78 82 };
+2 -2
pkgs/development/python-modules/opensearch-py/default.nix
··· 30 30 31 31 buildPythonPackage rec { 32 32 pname = "opensearch-py"; 33 - version = "2.7.1"; 33 + version = "2.8.0"; 34 34 pyproject = true; 35 35 36 36 src = fetchFromGitHub { 37 37 owner = "opensearch-project"; 38 38 repo = "opensearch-py"; 39 39 rev = "refs/tags/v${version}"; 40 - hash = "sha256-GC0waXxHRiXVXjhTGbet3HvDKmUBKzoufu/J4fmrM+k="; 40 + hash = "sha256-rPHpGKEIINAEUu2UkJwAM60i0hTzXd1ec6WD50RrgL8="; 41 41 }; 42 42 43 43 nativeBuildInputs = [ setuptools ];
+2 -2
pkgs/development/python-modules/pyoverkiz/default.nix
··· 17 17 18 18 buildPythonPackage rec { 19 19 pname = "pyoverkiz"; 20 - version = "1.15.0"; 20 + version = "1.15.1"; 21 21 pyproject = true; 22 22 23 23 disabled = pythonOlder "3.10"; ··· 26 26 owner = "iMicknl"; 27 27 repo = "python-overkiz-api"; 28 28 rev = "refs/tags/v${version}"; 29 - hash = "sha256-nwRPIudrxsbK6UYLaGjQJBkGMI5cKEE7m8M0h3k6434="; 29 + hash = "sha256-3j72zLBMm6tuQDWqNrkVEFvDAc45xyLnG19lEsJV1Mg="; 30 30 }; 31 31 32 32 build-system = [ poetry-core ];
+2 -2
pkgs/development/python-modules/pystac-client/default.nix
··· 18 18 19 19 buildPythonPackage rec { 20 20 pname = "pystac-client"; 21 - version = "0.8.4"; 21 + version = "0.8.5"; 22 22 pyproject = true; 23 23 disabled = pythonOlder "3.9"; 24 24 ··· 26 26 owner = "stac-utils"; 27 27 repo = "pystac-client"; 28 28 rev = "refs/tags/v${version}"; 29 - hash = "sha256-EetS0MD5DLBR+ht9YfD+oRdfHbVONuVHdSZj3FQ5Sm8="; 29 + hash = "sha256-bryJCg0JqjxQi5tAvd5Y2f/hXmHoIGEFiHuSPCjqfYk="; 30 30 }; 31 31 32 32 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/python-gvm/default.nix
··· 15 15 16 16 buildPythonPackage rec { 17 17 pname = "python-gvm"; 18 - version = "24.8.0"; 18 + version = "24.11.0"; 19 19 pyproject = true; 20 20 21 21 disabled = pythonOlder "3.9"; ··· 24 24 owner = "greenbone"; 25 25 repo = "python-gvm"; 26 26 rev = "refs/tags/v${version}"; 27 - hash = "sha256-JyImC75Le6S2kQXSU/Ze4TNaitJSJ8LD9j/ny+xjoGA="; 27 + hash = "sha256-n4Izhtqs6awEtnt4r915ZtyHQnM49ExbuAzqJw/CNa0="; 28 28 }; 29 29 30 30 build-system = [ poetry-core ];
+2 -2
pkgs/development/python-modules/unstructured/default.nix
··· 57 57 grpcio, 58 58 }: 59 59 let 60 - version = "0.15.14"; 60 + version = "0.16.8"; 61 61 optional-dependencies = { 62 62 huggingflace = [ 63 63 langdetect ··· 100 100 owner = "Unstructured-IO"; 101 101 repo = "unstructured"; 102 102 rev = "refs/tags/${version}"; 103 - hash = "sha256-cIMKaSKG4T832rpiJeiwftqVrcMezD9ICfislGPV/TQ="; 103 + hash = "sha256-TIJ1cfti+zF9sP0LrIIue9F8n8gRAy5+8hb4cIzHk2U="; 104 104 }; 105 105 106 106 propagatedBuildInputs = [
+20 -7
pkgs/development/python-modules/vobject/default.nix
··· 3 3 buildPythonPackage, 4 4 fetchPypi, 5 5 isPyPy, 6 - python, 6 + setuptools, 7 7 python-dateutil, 8 + pytz, 9 + six, 10 + pytestCheckHook, 8 11 }: 9 12 10 13 buildPythonPackage rec { 11 - version = "0.9.7"; 12 - format = "setuptools"; 14 + version = "0.9.8"; 13 15 pname = "vobject"; 16 + pyproject = true; 14 17 15 18 src = fetchPypi { 16 19 inherit pname version; 17 - hash = "sha256-q3J7+B3oiYStpcEfBm8eFkmQPT49fskfHOloFyr9UlY="; 20 + hash = "sha256-2wCn9NtJOXFV3YpoceiioBdabrpaZUww6RD4KylRS1g="; 18 21 }; 19 22 20 23 disabled = isPyPy; 21 24 22 - propagatedBuildInputs = [ python-dateutil ]; 25 + build-system = [ setuptools ]; 26 + 27 + dependencies = [ 28 + python-dateutil 29 + pytz 30 + six 31 + ]; 32 + 33 + pythonImportsCheck = [ "vobject" ]; 34 + 35 + nativeCheckInputs = [ pytestCheckHook ]; 23 36 24 - checkPhase = "${python.interpreter} tests.py"; 37 + pytestFlagsArray = [ "tests.py" ]; 25 38 26 39 meta = with lib; { 27 40 description = "Module for reading vCard and vCalendar files"; 28 - homepage = "http://eventable.github.io/vobject/"; 41 + homepage = "https://github.com/py-vobject/vobject"; 29 42 license = licenses.asl20; 30 43 maintainers = [ ]; 31 44 };
+1 -1
pkgs/development/r-modules/default.nix
··· 1809 1809 }); 1810 1810 1811 1811 Rhdf5lib = let 1812 - hdf5 = pkgs.hdf5_1_10.overrideAttrs (attrs: {configureFlags = attrs.configureFlags ++ [ "--enable-cxx" ];}); 1812 + hdf5 = pkgs.hdf5_1_10; 1813 1813 in old.Rhdf5lib.overrideAttrs (attrs: { 1814 1814 propagatedBuildInputs = attrs.propagatedBuildInputs ++ [ hdf5.dev pkgs.libaec ]; 1815 1815 patches = [ ./patches/Rhdf5lib.patch ];
+3 -3
pkgs/development/tools/analysis/cargo-tarpaulin/default.nix
··· 10 10 11 11 rustPlatform.buildRustPackage rec { 12 12 pname = "cargo-tarpaulin"; 13 - version = "0.31.2"; 13 + version = "0.31.3"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "xd009642"; 17 17 repo = "tarpaulin"; 18 18 rev = version; 19 - hash = "sha256-rYu8SsG2vEXMpwsLV/6TjC0iDJRsm6UEl4qXZwXRRpE="; 19 + hash = "sha256-ROsoTXkNB6qlcKFXgylZYuKp+WTFcbcDfw6L5ZqiRiA="; 20 20 }; 21 21 22 - cargoHash = "sha256-5zhsWliwPPXq+KUKW0N1qyueg8BD+qmUqeKUrVl/vZ8="; 22 + cargoHash = "sha256-1ZyAyJvHJtf8qEW7VmrZLL8WeVjD+w5vkVUld6keL+s="; 23 23 24 24 nativeBuildInputs = [ 25 25 pkg-config
+13
pkgs/development/tools/haskell/hadrian/disable-hyperlinked-source-extra-args.patch
··· 1 + diff --git a/hadrian/src/Settings/Default.hs b/hadrian/src/Settings/Default.hs 2 + index 0b743788ec..a7ff841609 100644 3 + --- a/hadrian/src/Settings/Default.hs 4 + +++ b/hadrian/src/Settings/Default.hs 5 + @@ -249,7 +249,7 @@ defaultExtraArgs = 6 + 7 + defaultHaddockExtraArgs :: Args 8 + defaultHaddockExtraArgs = builder (Haddock BuildPackage) ? 9 + - mconcat [ arg "--hyperlinked-source", arg "--hoogle", arg "--quickjump" ] 10 + + mconcat [ arg "--hoogle", arg "--quickjump" ] 11 + 12 + 13 + -- | Default source arguments, e.g. optimisation settings.
pkgs/development/tools/haskell/hadrian/disable-hyperlinked-source.patch pkgs/development/tools/haskell/hadrian/disable-hyperlinked-source-pre-9.8.patch
+2 -2
pkgs/kde/misc/kirigami-addons/default.nix
··· 7 7 }: 8 8 mkKdeDerivation rec { 9 9 pname = "kirigami-addons"; 10 - version = "1.5.0"; 10 + version = "1.6.0"; 11 11 12 12 src = fetchurl { 13 13 url = "mirror://kde/stable/kirigami-addons/kirigami-addons-${version}.tar.xz"; 14 - hash = "sha256-+d/RkQIrYz6jNI+Ecw1xWKFZ3+SWaNugqem9Z4rETlQ="; 14 + hash = "sha256-N22ub8WsrH0JBc6f7zIRvgcFxuLfUruA394eqiD+G/o="; 15 15 }; 16 16 17 17 extraBuildInputs = [ qtdeclarative ];
+1 -2
pkgs/os-specific/linux/scx/scx_rustscheds.nix
··· 24 24 25 25 nativeBuildInputs = [ 26 26 pkg-config 27 - llvmPackages.clang 27 + rustPlatform.bindgenHook 28 28 ]; 29 29 buildInputs = [ 30 30 elfutils ··· 33 33 ]; 34 34 35 35 env = { 36 - LIBCLANG_PATH = "${lib.getLib llvmPackages.libclang}/lib"; 37 36 BPF_CLANG = lib.getExe llvmPackages.clang; 38 37 BPF_EXTRA_CFLAGS_PRE_INCL = lib.concatStringsSep " " [ 39 38 "-I${scx.cscheds.dev}/libbpf/src/usr/include"
-4
pkgs/servers/http/apache-httpd/2.4.nix
··· 2 2 , nixosTests 3 3 , proxySupport ? true 4 4 , sslSupport ? true, openssl 5 - , modTlsSupport ? false, rustls-ffi, Foundation 6 5 , http2Support ? true, nghttp2 7 6 , ldapSupport ? true, openldap 8 7 , libxml2Support ? true, libxml2 ··· 40 39 buildInputs = [ perl libxcrypt zlib ] ++ 41 40 lib.optional brotliSupport brotli ++ 42 41 lib.optional sslSupport openssl ++ 43 - lib.optional modTlsSupport rustls-ffi ++ 44 - lib.optional (modTlsSupport && stdenv.hostPlatform.isDarwin) Foundation ++ 45 42 lib.optional ldapSupport openldap ++ # there is no --with-ldap flag 46 43 lib.optional libxml2Support libxml2 ++ 47 44 lib.optional http2Support nghttp2 ++ ··· 70 67 "--includedir=${placeholder "dev"}/include" 71 68 (lib.enableFeature proxySupport "proxy") 72 69 (lib.enableFeature sslSupport "ssl") 73 - (lib.enableFeature modTlsSupport "tls") 74 70 (lib.withFeatureAs libxml2Support "libxml2" "${libxml2.dev}/include/libxml2") 75 71 "--docdir=$(doc)/share/doc" 76 72
-51
pkgs/servers/radicale/2.x.nix
··· 1 - { lib, fetchFromGitHub, python3 }: 2 - 3 - python3.pkgs.buildPythonApplication rec { 4 - pname = "Radicale"; 5 - version = "2.1.12"; 6 - 7 - # No tests in PyPI tarball 8 - src = fetchFromGitHub { 9 - owner = "Kozea"; 10 - repo = "Radicale"; 11 - rev = version; 12 - sha256 = "14f9ql0fiwapaa4xaslwgk1ah9fzxxan2p1p2rxb4a5iqph1z0cl"; 13 - }; 14 - 15 - # We only want functional tests 16 - postPatch = '' 17 - sed -i "s/pytest-cov\|pytest-flake8\|pytest-isort//g" setup.py 18 - sed -i "/^addopts/d" setup.cfg 19 - ''; 20 - 21 - propagatedBuildInputs = with python3.pkgs; [ 22 - vobject 23 - python-dateutil 24 - passlib 25 - setuptools 26 - ]; 27 - 28 - nativeCheckInputs = with python3.pkgs; [ 29 - pytestCheckHook 30 - ]; 31 - 32 - disabledTests = [ 33 - # uses unsupported crypt method 34 - "test_htpasswd_crypt" 35 - ]; 36 - 37 - meta = with lib; { 38 - homepage = "https://radicale.org/v2.html"; 39 - description = "CalDAV CardDAV server"; 40 - mainProgram = "radicale"; 41 - longDescription = '' 42 - The Radicale Project is a complete CalDAV (calendar) and CardDAV 43 - (contact) server solution. Calendars and address books are available for 44 - both local and remote access, possibly limited through authentication 45 - policies. They can be viewed and edited by calendar and contact clients 46 - on mobile phones or computers. 47 - ''; 48 - license = licenses.gpl3Plus; 49 - maintainers = with maintainers; [ edwtjo pSub ]; 50 - }; 51 - }
+2
pkgs/servers/sql/postgresql/ext/default.nix
··· 72 72 73 73 pg_net = super.callPackage ./pg_net.nix { }; 74 74 75 + pg-gvm = super.callPackage ./pg-gvm.nix { }; 76 + 75 77 pg-semver = super.callPackage ./pg-semver.nix { }; 76 78 77 79 pgtap = super.callPackage ./pgtap.nix { };
+2 -2
pkgs/servers/web-apps/moodle/default.nix
··· 1 1 { lib, stdenv, fetchurl, writeText, plugins ? [ ], nixosTests }: 2 2 3 3 let 4 - version = "4.4.1"; 4 + version = "4.4.3"; 5 5 6 6 versionParts = lib.take 2 (lib.splitVersion version); 7 7 # 4.2 -> 402, 3.11 -> 311 ··· 15 15 16 16 src = fetchurl { 17 17 url = "https://download.moodle.org/download.php/direct/stable${stableVersion}/${pname}-${version}.tgz"; 18 - hash = "sha256-+pzDrSMm+V4pEze13mJ/eyhaxcvnmG/eno0csCRTisU="; 18 + hash = "sha256-SFysVBGGJKQFzm3pV25+wHaF7R1trqAOFQ1BLBTIzWk="; 19 19 }; 20 20 21 21 phpConfig = writeText "config.php" ''
+52 -37
pkgs/tools/X11/opentabletdriver/default.nix pkgs/by-name/op/opentabletdriver/package.nix
··· 1 - { lib 2 - , buildDotnetModule 3 - , fetchFromGitHub 4 - , gtk3 5 - , libX11 6 - , libXrandr 7 - , libappindicator 8 - , libevdev 9 - , libnotify 10 - , udev 11 - , copyDesktopItems 12 - , makeDesktopItem 13 - , nixosTests 14 - , wrapGAppsHook3 15 - , jq 16 - , coreutils 17 - , dotnetCorePackages 1 + { 2 + lib, 3 + buildDotnetModule, 4 + copyDesktopItems, 5 + coreutils, 6 + dotnetCorePackages, 7 + fetchFromGitHub, 8 + gtk3, 9 + jq, 10 + libappindicator, 11 + libevdev, 12 + libnotify, 13 + libX11, 14 + libXrandr, 15 + makeDesktopItem, 16 + nixosTests, 17 + udev, 18 + wrapGAppsHook3, 18 19 }: 19 20 20 21 buildDotnetModule rec { 21 22 pname = "OpenTabletDriver"; 22 - version = "0.6.4.0"; 23 + version = "0.6.4.0-unstable-2024-11-25"; 23 24 24 25 src = fetchFromGitHub { 25 26 owner = "OpenTabletDriver"; 26 27 repo = "OpenTabletDriver"; 27 - rev = "v${version}"; 28 - hash = "sha256-zK+feU96JOXjmkTndM9VyUid3z+MZFxJGH+MXaB6kzk="; 28 + rev = "8b88b8bdc5144391f10eb61ee77803ba0ee83718"; # 0.6.x branch 29 + hash = "sha256-5JKkSqV9owkHgWXfjiyv5QRh86apDCPzpA6qha1i4D4="; 29 30 }; 30 31 31 - patches = [ 32 - ./remove-git-from-generate-rules.patch 33 - ]; 32 + dotnetInstallFlags = [ "--framework=net8.0" ]; 34 33 35 - dotnetInstallFlags = [ "--framework=net6.0" ]; 34 + dotnet-sdk = dotnetCorePackages.sdk_8_0; 35 + dotnet-runtime = dotnetCorePackages.runtime_8_0; 36 36 37 - dotnet-sdk = dotnetCorePackages.sdk_6_0; 38 - projectFile = [ "OpenTabletDriver.Console" "OpenTabletDriver.Daemon" "OpenTabletDriver.UX.Gtk" ]; 37 + projectFile = [ 38 + "OpenTabletDriver.Console" 39 + "OpenTabletDriver.Daemon" 40 + "OpenTabletDriver.UX.Gtk" 41 + ]; 39 42 nugetDeps = ./deps.nix; 40 43 41 - executables = [ "OpenTabletDriver.Console" "OpenTabletDriver.Daemon" "OpenTabletDriver.UX.Gtk" ]; 44 + executables = [ 45 + "OpenTabletDriver.Console" 46 + "OpenTabletDriver.Daemon" 47 + "OpenTabletDriver.UX.Gtk" 48 + ]; 42 49 43 50 nativeBuildInputs = [ 44 51 copyDesktopItems ··· 49 56 50 57 runtimeDeps = [ 51 58 gtk3 52 - libX11 53 - libXrandr 54 59 libappindicator 55 60 libevdev 56 61 libnotify 62 + libX11 63 + libXrandr 57 64 udev 58 65 ]; 59 66 ··· 84 91 85 92 preBuild = '' 86 93 patchShebangs generate-rules.sh 94 + substituteInPlace generate-rules.sh \ 95 + --replace-fail '/usr/bin/env rm' '${lib.getExe' coreutils "rm"}' 87 96 ''; 88 97 89 98 postFixup = '' ··· 94 103 95 104 install -Dm644 $src/OpenTabletDriver.UX/Assets/otd.png -t $out/share/pixmaps 96 105 106 + # Generate udev rules from source 107 + export OTD_CONFIGURATIONS="$src/OpenTabletDriver.Configurations/Configurations" 97 108 mkdir -p $out/lib/udev/rules.d 98 - ./generate-rules.sh \ 99 - | sed 's@/usr/bin/env rm@${lib.getExe' coreutils "rm"}@' \ 100 - > $out/lib/udev/rules.d/70-opentabletdriver.rules 109 + ./generate-rules.sh > $out/lib/udev/rules.d/70-opentabletdriver.rules 101 110 ''; 102 111 103 112 desktopItems = [ ··· 106 115 name = "OpenTabletDriver"; 107 116 exec = "otd-gui"; 108 117 icon = "otd"; 109 - comment = meta.description; 118 + comment = "Open source, cross-platform, user-mode tablet driver"; 110 119 categories = [ "Utility" ]; 111 120 }) 112 121 ]; ··· 118 127 }; 119 128 }; 120 129 121 - meta = with lib; { 130 + meta = { 122 131 description = "Open source, cross-platform, user-mode tablet driver"; 123 132 homepage = "https://github.com/OpenTabletDriver/OpenTabletDriver"; 124 - license = licenses.lgpl3Plus; 125 - maintainers = with maintainers; [ gepbird thiagokokada ]; 126 - platforms = [ "x86_64-linux" "aarch64-linux" ]; 133 + license = lib.licenses.lgpl3Plus; 134 + maintainers = with lib.maintainers; [ 135 + gepbird 136 + thiagokokada 137 + ]; 138 + platforms = [ 139 + "x86_64-linux" 140 + "aarch64-linux" 141 + ]; 127 142 mainProgram = "otd"; 128 143 }; 129 144 }
-229
pkgs/tools/X11/opentabletdriver/deps.nix
··· 1 - # This file was automatically generated by passthru.fetch-deps. 2 - # Please dont edit it manually, your changes might get overwritten! 3 - 4 - { fetchNuGet }: [ 5 - (fetchNuGet { pname = "AtkSharp"; version = "3.24.24.34"; sha256 = "1jn1vgi9xm0jp7769k6sbdi8d273kigjrsh93i6s4c03hqxv7cqs"; }) 6 - (fetchNuGet { pname = "CairoSharp"; version = "3.24.24.34"; sha256 = "0pydn1k0cam1gclg9sc1sbnmbyzh28qlc5qanyxcylwghink3kgz"; }) 7 - (fetchNuGet { pname = "Castle.Core"; version = "4.4.0"; sha256 = "0rpcbmyhckvlvp6vbzpj03c1gqz56ixc6f15vgmxmyf1g40c24pf"; }) 8 - (fetchNuGet { pname = "coverlet.collector"; version = "3.0.2"; sha256 = "1xf6z6izmsl4g8w3z1wbp4pa8f8qsf6sil4mf1c9fb22hq8c5hkg"; }) 9 - (fetchNuGet { pname = "Eto.Forms"; version = "2.5.10"; sha256 = "1d71wglk4ixfqfbm6sxmj753x5iwbar8i9zzjy3bh64fy1dn8lz7"; }) 10 - (fetchNuGet { pname = "Eto.Forms"; version = "2.5.11"; sha256 = "0h86jc19wy3ssj7pb34w1h02v92mg29gdipszwjs3y15piy66z3s"; }) 11 - (fetchNuGet { pname = "Eto.Platform.Gtk"; version = "2.5.11"; sha256 = "1s9njz7l9zghrbzli7lbiav5ss3glqf17npj07f3jldd933nb95j"; }) 12 - (fetchNuGet { pname = "GdkSharp"; version = "3.24.24.34"; sha256 = "0r0x0yib7chwsyrbpvicrfwldwqx5lyqq4p86zaxpmzd6zdaj0x5"; }) 13 - (fetchNuGet { pname = "GioSharp"; version = "3.24.24.34"; sha256 = "02hxvgjd4w9jpzbkk7qf9q9bkvyp5hfzwxfqp10vg5lpl9yl3xpx"; }) 14 - (fetchNuGet { pname = "GLibSharp"; version = "3.24.24.34"; sha256 = "0kvp033fgdwc8p2abfp5z9pzq66cvwbnjfvr4v4bkpy5s5h181kq"; }) 15 - (fetchNuGet { pname = "GtkSharp"; version = "3.24.24.34"; sha256 = "0028hzmmqyfx87qqmaf9cgb5psn7gkbmqvixcid67x1d6mzxjicb"; }) 16 - (fetchNuGet { pname = "HidSharpCore"; version = "1.2.1.1"; sha256 = "1zkndglmz0s8rblfhnqcvv90rkq2i7lf4bc380g7z8h1avf2ikll"; }) 17 - (fetchNuGet { pname = "MessagePack"; version = "2.1.194"; sha256 = "1v2gyd9sd6hppfhlzngmzzhnpr39b95rwrqq0r9zzp480b6vzaj0"; }) 18 - (fetchNuGet { pname = "MessagePack.Annotations"; version = "2.1.194"; sha256 = "1jkhq3hiy4brvzsywl4p4jb9jrnzs3vmgr3s8fxpb1dzafadw8b0"; }) 19 - (fetchNuGet { pname = "Microsoft.Bcl.AsyncInterfaces"; version = "1.1.1"; sha256 = "0a1ahssqds2ympr7s4xcxv5y8jgxs7ahd6ah6fbgglj4rki1f1vw"; }) 20 - (fetchNuGet { pname = "Microsoft.CodeCoverage"; version = "16.9.4"; sha256 = "11wiyy3ykgk1sa9amy3lgcsg2v7d1sz59ggw647vx8ibpjxijjpp"; }) 21 - (fetchNuGet { pname = "Microsoft.CSharp"; version = "4.0.1"; sha256 = "0zxc0apx1gcx361jlq8smc9pfdgmyjh6hpka8dypc9w23nlsh6yj"; }) 22 - (fetchNuGet { pname = "Microsoft.Extensions.DependencyInjection"; version = "6.0.0-rc.1.21451.13"; sha256 = "0r6945jq7c2f1wjifq514zvngicndjqfnsjya6hqw0yzah0jr56c"; }) 23 - (fetchNuGet { pname = "Microsoft.Extensions.DependencyInjection.Abstractions"; version = "6.0.0-rc.1.21451.13"; sha256 = "11dg16x6g0gssb143qpghxz1s41himvhr7yhjwxs9hacx4ij2dm1"; }) 24 - (fetchNuGet { pname = "Microsoft.NET.Test.Sdk"; version = "16.9.4"; sha256 = "1jdx05zmrqj1s7xfgn3wgy10qb5cl1n1jcj5kz43zvkw1amc7ra4"; }) 25 - (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "1.0.1"; sha256 = "01al6cfxp68dscl15z7rxfw9zvhm64dncsw09a1vmdkacsa2v6lr"; }) 26 - (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "1.1.0"; sha256 = "08vh1r12g6ykjygq5d3vq09zylgb84l63k49jc4v8faw9g93iqqm"; }) 27 - (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "1.1.1"; sha256 = "164wycgng4mi9zqi2pnsf1pq6gccbqvw6ib916mqizgjmd8f44pj"; }) 28 - (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "3.0.0"; sha256 = "1bk8r4r3ihmi6322jmcag14jmw11mjqys202azqjzglcx59pxh51"; }) 29 - (fetchNuGet { pname = "Microsoft.NETCore.Targets"; version = "1.0.1"; sha256 = "0ppdkwy6s9p7x9jix3v4402wb171cdiibq7js7i13nxpdky7074p"; }) 30 - (fetchNuGet { pname = "Microsoft.NETCore.Targets"; version = "1.1.0"; sha256 = "193xwf33fbm0ni3idxzbr5fdq3i2dlfgihsac9jj7whj0gd902nh"; }) 31 - (fetchNuGet { pname = "Microsoft.TestPlatform.ObjectModel"; version = "16.9.4"; sha256 = "1jizkbrnm4pv60zch29ki7gj8m7j5whk141x9cwx4kwsd6cfzwi6"; }) 32 - (fetchNuGet { pname = "Microsoft.TestPlatform.TestHost"; version = "16.9.4"; sha256 = "14110qzmypr72ywvx3npq7mf4n0gvdr4536v91z1xbapms65am6x"; }) 33 - (fetchNuGet { pname = "Microsoft.VisualStudio.Threading"; version = "16.7.56"; sha256 = "13x0xrsjxd86clf9cjjwmpzlyp8pkrf13riya7igs8zy93zw2qap"; }) 34 - (fetchNuGet { pname = "Microsoft.VisualStudio.Threading.Analyzers"; version = "16.7.56"; sha256 = "04v9df0k7bsc0rzgkw4mnvi43pdrh42vk6xdcwn9m6im33m0nnz2"; }) 35 - (fetchNuGet { pname = "Microsoft.VisualStudio.Validation"; version = "15.5.31"; sha256 = "1ah99rn922qa0sd2k3h64m324f2r32pw8cn4cfihgvwx4qdrpmgw"; }) 36 - (fetchNuGet { pname = "Microsoft.Win32.Primitives"; version = "4.3.0"; sha256 = "0j0c1wj4ndj21zsgivsc24whiya605603kxrbiw6wkfdync464wq"; }) 37 - (fetchNuGet { pname = "Microsoft.Win32.Registry"; version = "4.6.0"; sha256 = "0i4y782yrqqyx85pg597m20gm0v126w0j9ddk5z7xb3crx4z9f2s"; }) 38 - (fetchNuGet { pname = "Moq"; version = "4.16.1"; sha256 = "1m2gwbx0gsy84rl9c3hgdaw9gz8d08ffg19nwg0idsdqmmiq887l"; }) 39 - (fetchNuGet { pname = "Nerdbank.Streams"; version = "2.6.77"; sha256 = "13dnfwxa8syx7vfjmd5pcrqz31k0q8y3mmh6yz6bmljhjri65q5c"; }) 40 - (fetchNuGet { pname = "NETStandard.Library"; version = "1.6.1"; sha256 = "1z70wvsx2d847a2cjfii7b83pjfs34q05gb037fdjikv5kbagml8"; }) 41 - (fetchNuGet { pname = "Newtonsoft.Json"; version = "12.0.2"; sha256 = "0w2fbji1smd2y7x25qqibf1qrznmv4s6s0jvrbvr6alb7mfyqvh5"; }) 42 - (fetchNuGet { pname = "Newtonsoft.Json"; version = "13.0.1"; sha256 = "0fijg0w6iwap8gvzyjnndds0q4b8anwxxvik7y8vgq97dram4srb"; }) 43 - (fetchNuGet { pname = "Newtonsoft.Json"; version = "13.0.3"; sha256 = "0xrwysmrn4midrjal8g2hr1bbg38iyisl0svamb11arqws4w2bw7"; }) 44 - (fetchNuGet { pname = "Newtonsoft.Json"; version = "9.0.1"; sha256 = "0mcy0i7pnfpqm4pcaiyzzji4g0c8i3a5gjz28rrr28110np8304r"; }) 45 - (fetchNuGet { pname = "Newtonsoft.Json.Schema"; version = "3.0.15"; sha256 = "1nmc9zxpcyyf3f2ypxw6vnjwlw5sxjv13r65p2dy8xrx8jkgaslp"; }) 46 - (fetchNuGet { pname = "NuGet.Frameworks"; version = "5.0.0"; sha256 = "18ijvmj13cwjdrrm52c8fpq021531zaz4mj4b4zapxaqzzxf2qjr"; }) 47 - (fetchNuGet { pname = "Octokit"; version = "0.50.0"; sha256 = "1ignj5i6a1c19qqrw00wlr9fdjmwrxkxz7gdxj0x653w84gbv7qq"; }) 48 - (fetchNuGet { pname = "PangoSharp"; version = "3.24.24.34"; sha256 = "1r0h14cklglfpv1lhv93cxmzi2w7d5s03gzpq3j5dmrz43flg9zw"; }) 49 - (fetchNuGet { pname = "runtime.any.System.Collections"; version = "4.3.0"; sha256 = "0bv5qgm6vr47ynxqbnkc7i797fdi8gbjjxii173syrx14nmrkwg0"; }) 50 - (fetchNuGet { pname = "runtime.any.System.Diagnostics.Tools"; version = "4.3.0"; sha256 = "1wl76vk12zhdh66vmagni66h5xbhgqq7zkdpgw21jhxhvlbcl8pk"; }) 51 - (fetchNuGet { pname = "runtime.any.System.Diagnostics.Tracing"; version = "4.3.0"; sha256 = "00j6nv2xgmd3bi347k00m7wr542wjlig53rmj28pmw7ddcn97jbn"; }) 52 - (fetchNuGet { pname = "runtime.any.System.Globalization"; version = "4.3.0"; sha256 = "1daqf33hssad94lamzg01y49xwndy2q97i2lrb7mgn28656qia1x"; }) 53 - (fetchNuGet { pname = "runtime.any.System.Globalization.Calendars"; version = "4.3.0"; sha256 = "1ghhhk5psqxcg6w88sxkqrc35bxcz27zbqm2y5p5298pv3v7g201"; }) 54 - (fetchNuGet { pname = "runtime.any.System.IO"; version = "4.3.0"; sha256 = "0l8xz8zn46w4d10bcn3l4yyn4vhb3lrj2zw8llvz7jk14k4zps5x"; }) 55 - (fetchNuGet { pname = "runtime.any.System.Reflection"; version = "4.3.0"; sha256 = "02c9h3y35pylc0zfq3wcsvc5nqci95nrkq0mszifc0sjx7xrzkly"; }) 56 - (fetchNuGet { pname = "runtime.any.System.Reflection.Extensions"; version = "4.3.0"; sha256 = "0zyri97dfc5vyaz9ba65hjj1zbcrzaffhsdlpxc9bh09wy22fq33"; }) 57 - (fetchNuGet { pname = "runtime.any.System.Reflection.Primitives"; version = "4.3.0"; sha256 = "0x1mm8c6iy8rlxm8w9vqw7gb7s1ljadrn049fmf70cyh42vdfhrf"; }) 58 - (fetchNuGet { pname = "runtime.any.System.Resources.ResourceManager"; version = "4.3.0"; sha256 = "03kickal0iiby82wa5flar18kyv82s9s6d4xhk5h4bi5kfcyfjzl"; }) 59 - (fetchNuGet { pname = "runtime.any.System.Runtime"; version = "4.3.0"; sha256 = "1cqh1sv3h5j7ixyb7axxbdkqx6cxy00p4np4j91kpm492rf4s25b"; }) 60 - (fetchNuGet { pname = "runtime.any.System.Runtime.Handles"; version = "4.3.0"; sha256 = "0bh5bi25nk9w9xi8z23ws45q5yia6k7dg3i4axhfqlnj145l011x"; }) 61 - (fetchNuGet { pname = "runtime.any.System.Runtime.InteropServices"; version = "4.3.0"; sha256 = "0c3g3g3jmhlhw4klrc86ka9fjbl7i59ds1fadsb2l8nqf8z3kb19"; }) 62 - (fetchNuGet { pname = "runtime.any.System.Text.Encoding"; version = "4.3.0"; sha256 = "0aqqi1v4wx51h51mk956y783wzags13wa7mgqyclacmsmpv02ps3"; }) 63 - (fetchNuGet { pname = "runtime.any.System.Text.Encoding.Extensions"; version = "4.3.0"; sha256 = "0lqhgqi0i8194ryqq6v2gqx0fb86db2gqknbm0aq31wb378j7ip8"; }) 64 - (fetchNuGet { pname = "runtime.any.System.Threading.Tasks"; version = "4.3.0"; sha256 = "03mnvkhskbzxddz4hm113zsch1jyzh2cs450dk3rgfjp8crlw1va"; }) 65 - (fetchNuGet { pname = "runtime.any.System.Threading.Timer"; version = "4.3.0"; sha256 = "0aw4phrhwqz9m61r79vyfl5la64bjxj8l34qnrcwb28v49fg2086"; }) 66 - (fetchNuGet { pname = "runtime.debian.8-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "16rnxzpk5dpbbl1x354yrlsbvwylrq456xzpsha1n9y3glnhyx9d"; }) 67 - (fetchNuGet { pname = "runtime.debian.8-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "0rwpqngkqiapqc5c2cpkj7idhngrgss5qpnqg0yh40mbyflcxf8i"; }) 68 - (fetchNuGet { pname = "runtime.fedora.23-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0hkg03sgm2wyq8nqk6dbm9jh5vcq57ry42lkqdmfklrw89lsmr59"; }) 69 - (fetchNuGet { pname = "runtime.fedora.23-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1n06gxwlinhs0w7s8a94r1q3lwqzvynxwd3mp10ws9bg6gck8n4r"; }) 70 - (fetchNuGet { pname = "runtime.fedora.24-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0c2p354hjx58xhhz7wv6div8xpi90sc6ibdm40qin21bvi7ymcaa"; }) 71 - (fetchNuGet { pname = "runtime.fedora.24-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "0404wqrc7f2yc0wxv71y3nnybvqx8v4j9d47hlscxy759a525mc3"; }) 72 - (fetchNuGet { pname = "runtime.native.System"; version = "4.3.0"; sha256 = "15hgf6zaq9b8br2wi1i3x0zvmk410nlmsmva9p0bbg73v6hml5k4"; }) 73 - (fetchNuGet { pname = "runtime.native.System.IO.Compression"; version = "4.3.0"; sha256 = "1vvivbqsk6y4hzcid27pqpm5bsi6sc50hvqwbcx8aap5ifrxfs8d"; }) 74 - (fetchNuGet { pname = "runtime.native.System.Net.Http"; version = "4.3.0"; sha256 = "1n6rgz5132lcibbch1qlf0g9jk60r0kqv087hxc0lisy50zpm7kk"; }) 75 - (fetchNuGet { pname = "runtime.native.System.Security.Cryptography.Apple"; version = "4.3.0"; sha256 = "1b61p6gw1m02cc1ry996fl49liiwky6181dzr873g9ds92zl326q"; }) 76 - (fetchNuGet { pname = "runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "18pzfdlwsg2nb1jjjjzyb5qlgy6xjxzmhnfaijq5s2jw3cm3ab97"; }) 77 - (fetchNuGet { pname = "runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "0zy5r25jppz48i2bkg8b9lfig24xixg6nm3xyr1379zdnqnpm8f6"; }) 78 - (fetchNuGet { pname = "runtime.opensuse.13.2-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0qyynf9nz5i7pc26cwhgi8j62ps27sqmf78ijcfgzab50z9g8ay3"; }) 79 - (fetchNuGet { pname = "runtime.opensuse.13.2-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "096ch4n4s8k82xga80lfmpimpzahd2ip1mgwdqgar0ywbbl6x438"; }) 80 - (fetchNuGet { pname = "runtime.opensuse.42.1-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "1klrs545awhayryma6l7g2pvnp9xy4z0r1i40r80zb45q3i9nbyf"; }) 81 - (fetchNuGet { pname = "runtime.opensuse.42.1-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1dm8fifl7rf1gy7lnwln78ch4rw54g0pl5g1c189vawavll7p6rj"; }) 82 - (fetchNuGet { pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.Apple"; version = "4.3.0"; sha256 = "10yc8jdrwgcl44b4g93f1ds76b176bajd3zqi2faf5rvh1vy9smi"; }) 83 - (fetchNuGet { pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0zcxjv5pckplvkg0r6mw3asggm7aqzbdjimhvsasb0cgm59x09l3"; }) 84 - (fetchNuGet { pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1m9z1k9kzva9n9kwinqxl97x2vgl79qhqjlv17k9s2ymcyv2bwr6"; }) 85 - (fetchNuGet { pname = "runtime.rhel.7-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0vhynn79ih7hw7cwjazn87rm9z9fj0rvxgzlab36jybgcpcgphsn"; }) 86 - (fetchNuGet { pname = "runtime.rhel.7-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1cpx56mcfxz7cpn57wvj18sjisvzq8b5vd9rw16ihd2i6mcp3wa1"; }) 87 - (fetchNuGet { pname = "runtime.ubuntu.14.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "160p68l2c7cqmyqjwxydcvgw7lvl1cr0znkw8fp24d1by9mqc8p3"; }) 88 - (fetchNuGet { pname = "runtime.ubuntu.14.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "15gsm1a8jdmgmf8j5v1slfz8ks124nfdhk2vxs2rw3asrxalg8hi"; }) 89 - (fetchNuGet { pname = "runtime.ubuntu.16.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "15zrc8fgd8zx28hdghcj5f5i34wf3l6bq5177075m2bc2j34jrqy"; }) 90 - (fetchNuGet { pname = "runtime.ubuntu.16.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "0q0n5q1r1wnqmr5i5idsrd9ywl33k0js4pngkwq9p368mbxp8x1w"; }) 91 - (fetchNuGet { pname = "runtime.ubuntu.16.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "1p4dgxax6p7rlgj4q73k73rslcnz4wdcv8q2flg1s8ygwcm58ld5"; }) 92 - (fetchNuGet { pname = "runtime.ubuntu.16.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1x0g58pbpjrmj2x2qw17rdwwnrcl0wvim2hdwz48lixvwvp22n9c"; }) 93 - (fetchNuGet { pname = "runtime.unix.Microsoft.Win32.Primitives"; version = "4.3.0"; sha256 = "0y61k9zbxhdi0glg154v30kkq7f8646nif8lnnxbvkjpakggd5id"; }) 94 - (fetchNuGet { pname = "runtime.unix.System.Console"; version = "4.3.0"; sha256 = "1pfpkvc6x2if8zbdzg9rnc5fx51yllprl8zkm5npni2k50lisy80"; }) 95 - (fetchNuGet { pname = "runtime.unix.System.Diagnostics.Debug"; version = "4.3.0"; sha256 = "1lps7fbnw34bnh3lm31gs5c0g0dh7548wfmb8zz62v0zqz71msj5"; }) 96 - (fetchNuGet { pname = "runtime.unix.System.IO.FileSystem"; version = "4.3.0"; sha256 = "14nbkhvs7sji5r1saj2x8daz82rnf9kx28d3v2qss34qbr32dzix"; }) 97 - (fetchNuGet { pname = "runtime.unix.System.Net.Primitives"; version = "4.3.0"; sha256 = "0bdnglg59pzx9394sy4ic66kmxhqp8q8bvmykdxcbs5mm0ipwwm4"; }) 98 - (fetchNuGet { pname = "runtime.unix.System.Net.Sockets"; version = "4.3.0"; sha256 = "03npdxzy8gfv035bv1b9rz7c7hv0rxl5904wjz51if491mw0xy12"; }) 99 - (fetchNuGet { pname = "runtime.unix.System.Private.Uri"; version = "4.3.0"; sha256 = "1jx02q6kiwlvfksq1q9qr17fj78y5v6mwsszav4qcz9z25d5g6vk"; }) 100 - (fetchNuGet { pname = "runtime.unix.System.Runtime.Extensions"; version = "4.3.0"; sha256 = "0pnxxmm8whx38dp6yvwgmh22smknxmqs5n513fc7m4wxvs1bvi4p"; }) 101 - (fetchNuGet { pname = "SharpZipLib"; version = "1.3.3"; sha256 = "1gij11wfj1mqm10631cjpnhzw882bnzx699jzwhdqakxm1610q8x"; }) 102 - (fetchNuGet { pname = "StreamJsonRpc"; version = "2.6.121"; sha256 = "0xzvpk17w2skndzdg47j7gkrrvw6521db4mv8lc3v8hm97vs9m76"; }) 103 - (fetchNuGet { pname = "System.AppContext"; version = "4.3.0"; sha256 = "1649qvy3dar900z3g817h17nl8jp4ka5vcfmsr05kh0fshn7j3ya"; }) 104 - (fetchNuGet { pname = "System.Buffers"; version = "4.3.0"; sha256 = "0fgns20ispwrfqll4q1zc1waqcmylb3zc50ys9x8zlwxh9pmd9jy"; }) 105 - (fetchNuGet { pname = "System.Collections"; version = "4.0.11"; sha256 = "1ga40f5lrwldiyw6vy67d0sg7jd7ww6kgwbksm19wrvq9hr0bsm6"; }) 106 - (fetchNuGet { pname = "System.Collections"; version = "4.3.0"; sha256 = "19r4y64dqyrq6k4706dnyhhw7fs24kpp3awak7whzss39dakpxk9"; }) 107 - (fetchNuGet { pname = "System.Collections.Concurrent"; version = "4.3.0"; sha256 = "0wi10md9aq33jrkh2c24wr2n9hrpyamsdhsxdcnf43b7y86kkii8"; }) 108 - (fetchNuGet { pname = "System.Collections.Immutable"; version = "1.7.1"; sha256 = "1nh4nlxfc7lbnbl86wwk1a3jwl6myz5j6hvgh5sp4krim9901hsq"; }) 109 - (fetchNuGet { pname = "System.Collections.NonGeneric"; version = "4.3.0"; sha256 = "07q3k0hf3mrcjzwj8fwk6gv3n51cb513w4mgkfxzm3i37sc9kz7k"; }) 110 - (fetchNuGet { pname = "System.Collections.Specialized"; version = "4.3.0"; sha256 = "1sdwkma4f6j85m3dpb53v9vcgd0zyc9jb33f8g63byvijcj39n20"; }) 111 - (fetchNuGet { pname = "System.CommandLine"; version = "2.0.0-beta4.22272.1"; sha256 = "1iy5hwwgvx911g3yq65p4zsgpy08w4qz9j3h0igcf7yci44vw8yd"; }) 112 - (fetchNuGet { pname = "System.ComponentModel"; version = "4.3.0"; sha256 = "0986b10ww3nshy30x9sjyzm0jx339dkjxjj3401r3q0f6fx2wkcb"; }) 113 - (fetchNuGet { pname = "System.ComponentModel.Annotations"; version = "4.7.0"; sha256 = "06x1m46ddxj0ng28d7gry9gjkqdg2kp89jyf480g5gznyybbs49z"; }) 114 - (fetchNuGet { pname = "System.ComponentModel.Annotations"; version = "5.0.0"; sha256 = "021h7x98lblq9avm1bgpa4i31c2kgsa7zn4sqhxf39g087ar756j"; }) 115 - (fetchNuGet { pname = "System.ComponentModel.Primitives"; version = "4.3.0"; sha256 = "1svfmcmgs0w0z9xdw2f2ps05rdxmkxxhf0l17xk9l1l8xfahkqr0"; }) 116 - (fetchNuGet { pname = "System.ComponentModel.TypeConverter"; version = "4.3.0"; sha256 = "17ng0p7v3nbrg3kycz10aqrrlw4lz9hzhws09pfh8gkwicyy481x"; }) 117 - (fetchNuGet { pname = "System.Console"; version = "4.3.0"; sha256 = "1flr7a9x920mr5cjsqmsy9wgnv3lvd0h1g521pdr1lkb2qycy7ay"; }) 118 - (fetchNuGet { pname = "System.Diagnostics.Debug"; version = "4.0.11"; sha256 = "0gmjghrqmlgzxivd2xl50ncbglb7ljzb66rlx8ws6dv8jm0d5siz"; }) 119 - (fetchNuGet { pname = "System.Diagnostics.Debug"; version = "4.3.0"; sha256 = "00yjlf19wjydyr6cfviaph3vsjzg3d5nvnya26i2fvfg53sknh3y"; }) 120 - (fetchNuGet { pname = "System.Diagnostics.DiagnosticSource"; version = "4.3.0"; sha256 = "0z6m3pbiy0qw6rn3n209rrzf9x1k4002zh90vwcrsym09ipm2liq"; }) 121 - (fetchNuGet { pname = "System.Diagnostics.Tools"; version = "4.0.1"; sha256 = "19cknvg07yhakcvpxg3cxa0bwadplin6kyxd8mpjjpwnp56nl85x"; }) 122 - (fetchNuGet { pname = "System.Diagnostics.Tools"; version = "4.3.0"; sha256 = "0in3pic3s2ddyibi8cvgl102zmvp9r9mchh82ns9f0ms4basylw1"; }) 123 - (fetchNuGet { pname = "System.Diagnostics.TraceSource"; version = "4.3.0"; sha256 = "1kyw4d7dpjczhw6634nrmg7yyyzq72k75x38y0l0nwhigdlp1766"; }) 124 - (fetchNuGet { pname = "System.Diagnostics.Tracing"; version = "4.3.0"; sha256 = "1m3bx6c2s958qligl67q7grkwfz3w53hpy7nc97mh6f7j5k168c4"; }) 125 - (fetchNuGet { pname = "System.Dynamic.Runtime"; version = "4.0.11"; sha256 = "1pla2dx8gkidf7xkciig6nifdsb494axjvzvann8g2lp3dbqasm9"; }) 126 - (fetchNuGet { pname = "System.Dynamic.Runtime"; version = "4.3.0"; sha256 = "1d951hrvrpndk7insiag80qxjbf2y0y39y8h5hnq9612ws661glk"; }) 127 - (fetchNuGet { pname = "System.Globalization"; version = "4.0.11"; sha256 = "070c5jbas2v7smm660zaf1gh0489xanjqymkvafcs4f8cdrs1d5d"; }) 128 - (fetchNuGet { pname = "System.Globalization"; version = "4.3.0"; sha256 = "1cp68vv683n6ic2zqh2s1fn4c2sd87g5hpp6l4d4nj4536jz98ki"; }) 129 - (fetchNuGet { pname = "System.Globalization.Calendars"; version = "4.3.0"; sha256 = "1xwl230bkakzzkrggy1l1lxmm3xlhk4bq2pkv790j5lm8g887lxq"; }) 130 - (fetchNuGet { pname = "System.Globalization.Extensions"; version = "4.3.0"; sha256 = "02a5zfxavhv3jd437bsncbhd2fp1zv4gxzakp1an9l6kdq1mcqls"; }) 131 - (fetchNuGet { pname = "System.IO"; version = "4.1.0"; sha256 = "1g0yb8p11vfd0kbkyzlfsbsp5z44lwsvyc0h3dpw6vqnbi035ajp"; }) 132 - (fetchNuGet { pname = "System.IO"; version = "4.3.0"; sha256 = "05l9qdrzhm4s5dixmx68kxwif4l99ll5gqmh7rqgw554fx0agv5f"; }) 133 - (fetchNuGet { pname = "System.IO.Compression"; version = "4.3.0"; sha256 = "084zc82yi6yllgda0zkgl2ys48sypiswbiwrv7irb3r0ai1fp4vz"; }) 134 - (fetchNuGet { pname = "System.IO.Compression.ZipFile"; version = "4.3.0"; sha256 = "1yxy5pq4dnsm9hlkg9ysh5f6bf3fahqqb6p8668ndy5c0lk7w2ar"; }) 135 - (fetchNuGet { pname = "System.IO.FileSystem"; version = "4.0.1"; sha256 = "0kgfpw6w4djqra3w5crrg8xivbanh1w9dh3qapb28q060wb9flp1"; }) 136 - (fetchNuGet { pname = "System.IO.FileSystem"; version = "4.3.0"; sha256 = "0z2dfrbra9i6y16mm9v1v6k47f0fm617vlb7s5iybjjsz6g1ilmw"; }) 137 - (fetchNuGet { pname = "System.IO.FileSystem.Primitives"; version = "4.0.1"; sha256 = "1s0mniajj3lvbyf7vfb5shp4ink5yibsx945k6lvxa96r8la1612"; }) 138 - (fetchNuGet { pname = "System.IO.FileSystem.Primitives"; version = "4.3.0"; sha256 = "0j6ndgglcf4brg2lz4wzsh1av1gh8xrzdsn9f0yznskhqn1xzj9c"; }) 139 - (fetchNuGet { pname = "System.IO.Pipelines"; version = "4.7.2"; sha256 = "16v4qaypm72cfsfqr8z3k6yrpzn0m3apgkh6aljfwpycdk150sf9"; }) 140 - (fetchNuGet { pname = "System.Linq"; version = "4.1.0"; sha256 = "1ppg83svb39hj4hpp5k7kcryzrf3sfnm08vxd5sm2drrijsla2k5"; }) 141 - (fetchNuGet { pname = "System.Linq"; version = "4.3.0"; sha256 = "1w0gmba695rbr80l1k2h4mrwzbzsyfl2z4klmpbsvsg5pm4a56s7"; }) 142 - (fetchNuGet { pname = "System.Linq.Expressions"; version = "4.1.0"; sha256 = "1gpdxl6ip06cnab7n3zlcg6mqp7kknf73s8wjinzi4p0apw82fpg"; }) 143 - (fetchNuGet { pname = "System.Linq.Expressions"; version = "4.3.0"; sha256 = "0ky2nrcvh70rqq88m9a5yqabsl4fyd17bpr63iy2mbivjs2nyypv"; }) 144 - (fetchNuGet { pname = "System.Memory"; version = "4.5.4"; sha256 = "14gbbs22mcxwggn0fcfs1b062521azb9fbb7c113x0mq6dzq9h6y"; }) 145 - (fetchNuGet { pname = "System.Net.Http"; version = "4.3.0"; sha256 = "1i4gc757xqrzflbk7kc5ksn20kwwfjhw9w7pgdkn19y3cgnl302j"; }) 146 - (fetchNuGet { pname = "System.Net.Http"; version = "4.3.4"; sha256 = "0kdp31b8819v88l719j6my0yas6myv9d1viql3qz5577mv819jhl"; }) 147 - (fetchNuGet { pname = "System.Net.NameResolution"; version = "4.3.0"; sha256 = "15r75pwc0rm3vvwsn8rvm2krf929mjfwliv0mpicjnii24470rkq"; }) 148 - (fetchNuGet { pname = "System.Net.Primitives"; version = "4.3.0"; sha256 = "0c87k50rmdgmxx7df2khd9qj7q35j9rzdmm2572cc55dygmdk3ii"; }) 149 - (fetchNuGet { pname = "System.Net.Sockets"; version = "4.3.0"; sha256 = "1ssa65k6chcgi6mfmzrznvqaxk8jp0gvl77xhf1hbzakjnpxspla"; }) 150 - (fetchNuGet { pname = "System.Net.WebSockets"; version = "4.3.0"; sha256 = "1gfj800078kggcgl0xyl00a6y5k4wwh2k2qm69rjy22wbmq7fy4p"; }) 151 - (fetchNuGet { pname = "System.ObjectModel"; version = "4.0.12"; sha256 = "1sybkfi60a4588xn34nd9a58png36i0xr4y4v4kqpg8wlvy5krrj"; }) 152 - (fetchNuGet { pname = "System.ObjectModel"; version = "4.3.0"; sha256 = "191p63zy5rpqx7dnrb3h7prvgixmk168fhvvkkvhlazncf8r3nc2"; }) 153 - (fetchNuGet { pname = "System.Private.Uri"; version = "4.3.0"; sha256 = "04r1lkdnsznin0fj4ya1zikxiqr0h6r6a1ww2dsm60gqhdrf0mvx"; }) 154 - (fetchNuGet { pname = "System.Reflection"; version = "4.1.0"; sha256 = "1js89429pfw79mxvbzp8p3q93il6rdff332hddhzi5wqglc4gml9"; }) 155 - (fetchNuGet { pname = "System.Reflection"; version = "4.3.0"; sha256 = "0xl55k0mw8cd8ra6dxzh974nxif58s3k1rjv1vbd7gjbjr39j11m"; }) 156 - (fetchNuGet { pname = "System.Reflection.Emit"; version = "4.0.1"; sha256 = "0ydqcsvh6smi41gyaakglnv252625hf29f7kywy2c70nhii2ylqp"; }) 157 - (fetchNuGet { pname = "System.Reflection.Emit"; version = "4.3.0"; sha256 = "11f8y3qfysfcrscjpjym9msk7lsfxkk4fmz9qq95kn3jd0769f74"; }) 158 - (fetchNuGet { pname = "System.Reflection.Emit"; version = "4.7.0"; sha256 = "121l1z2ypwg02yz84dy6gr82phpys0njk7yask3sihgy214w43qp"; }) 159 - (fetchNuGet { pname = "System.Reflection.Emit.ILGeneration"; version = "4.0.1"; sha256 = "1pcd2ig6bg144y10w7yxgc9d22r7c7ww7qn1frdfwgxr24j9wvv0"; }) 160 - (fetchNuGet { pname = "System.Reflection.Emit.ILGeneration"; version = "4.3.0"; sha256 = "0w1n67glpv8241vnpz1kl14sy7zlnw414aqwj4hcx5nd86f6994q"; }) 161 - (fetchNuGet { pname = "System.Reflection.Emit.Lightweight"; version = "4.0.1"; sha256 = "1s4b043zdbx9k39lfhvsk68msv1nxbidhkq6nbm27q7sf8xcsnxr"; }) 162 - (fetchNuGet { pname = "System.Reflection.Emit.Lightweight"; version = "4.3.0"; sha256 = "0ql7lcakycrvzgi9kxz1b3lljd990az1x6c4jsiwcacrvimpib5c"; }) 163 - (fetchNuGet { pname = "System.Reflection.Emit.Lightweight"; version = "4.6.0"; sha256 = "0hry2k6b7kicg4zxnq0hhn0ys52711pxy7l9v5sp7gvp9cicwpgp"; }) 164 - (fetchNuGet { pname = "System.Reflection.Extensions"; version = "4.0.1"; sha256 = "0m7wqwq0zqq9gbpiqvgk3sr92cbrw7cp3xn53xvw7zj6rz6fdirn"; }) 165 - (fetchNuGet { pname = "System.Reflection.Extensions"; version = "4.3.0"; sha256 = "02bly8bdc98gs22lqsfx9xicblszr2yan7v2mmw3g7hy6miq5hwq"; }) 166 - (fetchNuGet { pname = "System.Reflection.Metadata"; version = "1.6.0"; sha256 = "1wdbavrrkajy7qbdblpbpbalbdl48q3h34cchz24gvdgyrlf15r4"; }) 167 - (fetchNuGet { pname = "System.Reflection.Primitives"; version = "4.0.1"; sha256 = "1bangaabhsl4k9fg8khn83wm6yial8ik1sza7401621jc6jrym28"; }) 168 - (fetchNuGet { pname = "System.Reflection.Primitives"; version = "4.3.0"; sha256 = "04xqa33bld78yv5r93a8n76shvc8wwcdgr1qvvjh959g3rc31276"; }) 169 - (fetchNuGet { pname = "System.Reflection.TypeExtensions"; version = "4.1.0"; sha256 = "1bjli8a7sc7jlxqgcagl9nh8axzfl11f4ld3rjqsyxc516iijij7"; }) 170 - (fetchNuGet { pname = "System.Reflection.TypeExtensions"; version = "4.3.0"; sha256 = "0y2ssg08d817p0vdag98vn238gyrrynjdj4181hdg780sif3ykp1"; }) 171 - (fetchNuGet { pname = "System.Resources.ResourceManager"; version = "4.0.1"; sha256 = "0b4i7mncaf8cnai85jv3wnw6hps140cxz8vylv2bik6wyzgvz7bi"; }) 172 - (fetchNuGet { pname = "System.Resources.ResourceManager"; version = "4.3.0"; sha256 = "0sjqlzsryb0mg4y4xzf35xi523s4is4hz9q4qgdvlvgivl7qxn49"; }) 173 - (fetchNuGet { pname = "System.Runtime"; version = "4.1.0"; sha256 = "02hdkgk13rvsd6r9yafbwzss8kr55wnj8d5c7xjnp8gqrwc8sn0m"; }) 174 - (fetchNuGet { pname = "System.Runtime"; version = "4.3.0"; sha256 = "066ixvgbf2c929kgknshcxqj6539ax7b9m570cp8n179cpfkapz7"; }) 175 - (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.5.2"; sha256 = "1vz4275fjij8inf31np78hw50al8nqkngk04p3xv5n4fcmf1grgi"; }) 176 - (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.7.1"; sha256 = "119br3pd85lq8zcgh4f60jzmv1g976q1kdgi3hvqdlhfbw6siz2j"; }) 177 - (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "6.0.0-rc.1.21451.13"; sha256 = "0v5bc80p35jj5b5xdgsn5r1v4w68gqz0sahi214rprrrlr3sl206"; }) 178 - (fetchNuGet { pname = "System.Runtime.Extensions"; version = "4.1.0"; sha256 = "0rw4rm4vsm3h3szxp9iijc3ksyviwsv6f63dng3vhqyg4vjdkc2z"; }) 179 - (fetchNuGet { pname = "System.Runtime.Extensions"; version = "4.3.0"; sha256 = "1ykp3dnhwvm48nap8q23893hagf665k0kn3cbgsqpwzbijdcgc60"; }) 180 - (fetchNuGet { pname = "System.Runtime.Handles"; version = "4.0.1"; sha256 = "1g0zrdi5508v49pfm3iii2hn6nm00bgvfpjq1zxknfjrxxa20r4g"; }) 181 - (fetchNuGet { pname = "System.Runtime.Handles"; version = "4.3.0"; sha256 = "0sw2gfj2xr7sw9qjn0j3l9yw07x73lcs97p8xfc9w1x9h5g5m7i8"; }) 182 - (fetchNuGet { pname = "System.Runtime.InteropServices"; version = "4.1.0"; sha256 = "01kxqppx3dr3b6b286xafqilv4s2n0gqvfgzfd4z943ga9i81is1"; }) 183 - (fetchNuGet { pname = "System.Runtime.InteropServices"; version = "4.3.0"; sha256 = "00hywrn4g7hva1b2qri2s6rabzwgxnbpw9zfxmz28z09cpwwgh7j"; }) 184 - (fetchNuGet { pname = "System.Runtime.InteropServices.RuntimeInformation"; version = "4.3.0"; sha256 = "0q18r1sh4vn7bvqgd6dmqlw5v28flbpj349mkdish2vjyvmnb2ii"; }) 185 - (fetchNuGet { pname = "System.Runtime.Numerics"; version = "4.3.0"; sha256 = "19rav39sr5dky7afygh309qamqqmi9kcwvz3i0c5700v0c5cg61z"; }) 186 - (fetchNuGet { pname = "System.Runtime.Serialization.Primitives"; version = "4.1.1"; sha256 = "042rfjixknlr6r10vx2pgf56yming8lkjikamg3g4v29ikk78h7k"; }) 187 - (fetchNuGet { pname = "System.Security.AccessControl"; version = "4.6.0"; sha256 = "1wl1dyghi0qhpap1vgfhg2ybdyyhy9vc2a7dpm1xb30vfgmlkjmf"; }) 188 - (fetchNuGet { pname = "System.Security.Claims"; version = "4.3.0"; sha256 = "0jvfn7j22l3mm28qjy3rcw287y9h65ha4m940waaxah07jnbzrhn"; }) 189 - (fetchNuGet { pname = "System.Security.Cryptography.Algorithms"; version = "4.3.0"; sha256 = "03sq183pfl5kp7gkvq77myv7kbpdnq3y0xj7vi4q1kaw54sny0ml"; }) 190 - (fetchNuGet { pname = "System.Security.Cryptography.Cng"; version = "4.3.0"; sha256 = "1k468aswafdgf56ab6yrn7649kfqx2wm9aslywjam1hdmk5yypmv"; }) 191 - (fetchNuGet { pname = "System.Security.Cryptography.Csp"; version = "4.3.0"; sha256 = "1x5wcrddf2s3hb8j78cry7yalca4lb5vfnkrysagbn6r9x6xvrx1"; }) 192 - (fetchNuGet { pname = "System.Security.Cryptography.Encoding"; version = "4.3.0"; sha256 = "1jr6w70igqn07k5zs1ph6xja97hxnb3mqbspdrff6cvssgrixs32"; }) 193 - (fetchNuGet { pname = "System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0givpvvj8yc7gv4lhb6s1prq6p2c4147204a0wib89inqzd87gqc"; }) 194 - (fetchNuGet { pname = "System.Security.Cryptography.Primitives"; version = "4.3.0"; sha256 = "0pyzncsv48zwly3lw4f2dayqswcfvdwq2nz0dgwmi7fj3pn64wby"; }) 195 - (fetchNuGet { pname = "System.Security.Cryptography.X509Certificates"; version = "4.3.0"; sha256 = "0valjcz5wksbvijylxijjxb1mp38mdhv03r533vnx1q3ikzdav9h"; }) 196 - (fetchNuGet { pname = "System.Security.Principal"; version = "4.3.0"; sha256 = "12cm2zws06z4lfc4dn31iqv7072zyi4m910d4r6wm8yx85arsfxf"; }) 197 - (fetchNuGet { pname = "System.Security.Principal.Windows"; version = "4.3.0"; sha256 = "00a0a7c40i3v4cb20s2cmh9csb5jv2l0frvnlzyfxh848xalpdwr"; }) 198 - (fetchNuGet { pname = "System.Security.Principal.Windows"; version = "4.6.0"; sha256 = "1jmfzfz1n8hp63s5lja5xxpzkinbp6g59l3km9h8avjiisdrg5wm"; }) 199 - (fetchNuGet { pname = "System.Text.Encoding"; version = "4.0.11"; sha256 = "1dyqv0hijg265dwxg6l7aiv74102d6xjiwplh2ar1ly6xfaa4iiw"; }) 200 - (fetchNuGet { pname = "System.Text.Encoding"; version = "4.3.0"; sha256 = "1f04lkir4iladpp51sdgmis9dj4y8v08cka0mbmsy0frc9a4gjqr"; }) 201 - (fetchNuGet { pname = "System.Text.Encoding.Extensions"; version = "4.0.11"; sha256 = "08nsfrpiwsg9x5ml4xyl3zyvjfdi4mvbqf93kjdh11j4fwkznizs"; }) 202 - (fetchNuGet { pname = "System.Text.Encoding.Extensions"; version = "4.3.0"; sha256 = "11q1y8hh5hrp5a3kw25cb6l00v5l5dvirkz8jr3sq00h1xgcgrxy"; }) 203 - (fetchNuGet { pname = "System.Text.RegularExpressions"; version = "4.1.0"; sha256 = "1mw7vfkkyd04yn2fbhm38msk7dz2xwvib14ygjsb8dq2lcvr18y7"; }) 204 - (fetchNuGet { pname = "System.Text.RegularExpressions"; version = "4.3.0"; sha256 = "1bgq51k7fwld0njylfn7qc5fmwrk2137gdq7djqdsw347paa9c2l"; }) 205 - (fetchNuGet { pname = "System.Threading"; version = "4.0.11"; sha256 = "19x946h926bzvbsgj28csn46gak2crv2skpwsx80hbgazmkgb1ls"; }) 206 - (fetchNuGet { pname = "System.Threading"; version = "4.3.0"; sha256 = "0rw9wfamvhayp5zh3j7p1yfmx9b5khbf4q50d8k5rk993rskfd34"; }) 207 - (fetchNuGet { pname = "System.Threading.Tasks"; version = "4.0.11"; sha256 = "0nr1r41rak82qfa5m0lhk9mp0k93bvfd7bbd9sdzwx9mb36g28p5"; }) 208 - (fetchNuGet { pname = "System.Threading.Tasks"; version = "4.3.0"; sha256 = "134z3v9abw3a6jsw17xl3f6hqjpak5l682k2vz39spj4kmydg6k7"; }) 209 - (fetchNuGet { pname = "System.Threading.Tasks.Dataflow"; version = "4.11.1"; sha256 = "09fbfsiay1xcbpvnq2j38b6mb2scvf0s8mpn78bcqsldidg7k2vw"; }) 210 - (fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.0.0"; sha256 = "1cb51z062mvc2i8blpzmpn9d9mm4y307xrwi65di8ri18cz5r1zr"; }) 211 - (fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.3.0"; sha256 = "1xxcx2xh8jin360yjwm4x4cf5y3a2bwpn2ygkfkwkicz7zk50s2z"; }) 212 - (fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.5.4"; sha256 = "0y6ncasgfcgnjrhynaf0lwpkpkmv4a07sswwkwbwb5h7riisj153"; }) 213 - (fetchNuGet { pname = "System.Threading.ThreadPool"; version = "4.3.0"; sha256 = "027s1f4sbx0y1xqw2irqn6x161lzj8qwvnh2gn78ciiczdv10vf1"; }) 214 - (fetchNuGet { pname = "System.Threading.Timer"; version = "4.3.0"; sha256 = "1nx773nsx6z5whv8kaa1wjh037id2f1cxhb69pvgv12hd2b6qs56"; }) 215 - (fetchNuGet { pname = "System.Xml.ReaderWriter"; version = "4.0.11"; sha256 = "0c6ky1jk5ada9m94wcadih98l6k1fvf6vi7vhn1msjixaha419l5"; }) 216 - (fetchNuGet { pname = "System.Xml.ReaderWriter"; version = "4.3.0"; sha256 = "0c47yllxifzmh8gq6rq6l36zzvw4kjvlszkqa9wq3fr59n0hl3s1"; }) 217 - (fetchNuGet { pname = "System.Xml.XDocument"; version = "4.0.11"; sha256 = "0n4lvpqzy9kc7qy1a4acwwd7b7pnvygv895az5640idl2y9zbz18"; }) 218 - (fetchNuGet { pname = "System.Xml.XDocument"; version = "4.3.0"; sha256 = "08h8fm4l77n0nd4i4fk2386y809bfbwqb7ih9d7564ifcxr5ssxd"; }) 219 - (fetchNuGet { pname = "System.Xml.XmlDocument"; version = "4.3.0"; sha256 = "0bmz1l06dihx52jxjr22dyv5mxv6pj4852lx68grjm7bivhrbfwi"; }) 220 - (fetchNuGet { pname = "WaylandNET"; version = "0.2.0"; sha256 = "1qjpvra08vdqdw4j1gamz6451x5sd5r1j86lsvrl8akq4nymfr8k"; }) 221 - (fetchNuGet { pname = "xunit"; version = "2.4.1"; sha256 = "0xf3kaywpg15flqaqfgywqyychzk15kz0kz34j21rcv78q9ywq20"; }) 222 - (fetchNuGet { pname = "xunit.abstractions"; version = "2.0.3"; sha256 = "00wl8qksgkxld76fgir3ycc5rjqv1sqds6x8yx40927q5py74gfh"; }) 223 - (fetchNuGet { pname = "xunit.analyzers"; version = "0.10.0"; sha256 = "15n02q3akyqbvkp8nq75a8rd66d4ax0rx8fhdcn8j78pi235jm7j"; }) 224 - (fetchNuGet { pname = "xunit.assert"; version = "2.4.1"; sha256 = "1imynzh80wxq2rp9sc4gxs4x1nriil88f72ilhj5q0m44qqmqpc6"; }) 225 - (fetchNuGet { pname = "xunit.core"; version = "2.4.1"; sha256 = "1nnb3j4kzmycaw1g76ii4rfqkvg6l8gqh18falwp8g28h802019a"; }) 226 - (fetchNuGet { pname = "xunit.extensibility.core"; version = "2.4.1"; sha256 = "103qsijmnip2pnbhciqyk2jyhdm6snindg5z2s57kqf5pcx9a050"; }) 227 - (fetchNuGet { pname = "xunit.extensibility.execution"; version = "2.4.1"; sha256 = "1pbilxh1gp2ywm5idfl0klhl4gb16j86ib4x83p8raql1dv88qia"; }) 228 - (fetchNuGet { pname = "xunit.runner.visualstudio"; version = "2.4.3"; sha256 = "0j1d0rbcm7pp6dypi61sjxp8l22sv261252z55b243l39jgv2rp3"; }) 229 - ]
-22
pkgs/tools/X11/opentabletdriver/remove-git-from-generate-rules.patch
··· 1 - diff --git a/generate-rules.sh b/generate-rules.sh 2 - index ce6c3f3d..a0266612 100755 3 - --- a/generate-rules.sh 4 - +++ b/generate-rules.sh 5 - @@ -8,7 +8,7 @@ print_help() { 6 - echo " -h, --help Print this help message" 7 - } 8 - 9 - -for c in git jq tr awk sed; do 10 - +for c in jq tr awk sed; do 11 - command -v $c > /dev/null 12 - if [[ $? > 0 ]]; then 13 - echo "Error: Command $c not found in \$PATH." >&2 14 - @@ -23,7 +23,7 @@ tohex() { 15 - shopt -s globstar 16 - set -eu 17 - 18 - -OTD_CONFIGURATIONS="${OTD_CONFIGURATIONS:="$(git rev-parse --show-toplevel)/OpenTabletDriver.Configurations/Configurations"}" 19 - +OTD_CONFIGURATIONS="${OTD_CONFIGURATIONS:="$src/OpenTabletDriver.Configurations/Configurations"}" 20 - 21 - while [ $# -gt 0 ]; do 22 - case "$1" in
-24
pkgs/tools/X11/opentabletdriver/update.sh
··· 1 - #!/usr/bin/env nix-shell 2 - #!nix-shell -I nixpkgs=./. -i bash -p curl gnused jq common-updater-scripts 3 - set -eo pipefail 4 - cd "$(dirname "${BASH_SOURCE[0]}")" 5 - 6 - new_version="$(curl ${GITHUB_TOKEN:+" -u \":$GITHUB_TOKEN\""} -s "https://api.github.com/repos/OpenTabletDriver/OpenTabletDriver/releases" | jq -r 'map(select(.prerelease == false)) | .[0].tag_name' | cut -c2-)" 7 - old_version="$(sed -nE 's/\s*version = "(.*)".*/\1/p' ./default.nix)" 8 - 9 - if [[ "$new_version" == "$old_version" ]]; then 10 - echo "Already up to date!" 11 - [[ "${1}" != "--force" ]] && exit 0 12 - fi 13 - 14 - # Updating the hash of deb package manually since there seems to be no way to do it automatically 15 - oldDebPkgUrl="https://github.com/OpenTabletDriver/OpenTabletDriver/releases/download/v${old_version}/OpenTabletDriver.deb"; 16 - newDebPkgUrl="https://github.com/OpenTabletDriver/OpenTabletDriver/releases/download/v${new_version}/OpenTabletDriver.deb"; 17 - oldDebSha256=$(nix-prefetch-url "$oldDebPkgUrl") 18 - newDebSha256=$(nix-prefetch-url "$newDebPkgUrl") 19 - echo "oldDebSha256: $oldDebSha256 newDebSha256: $newDebSha256" 20 - sed -i ./default.nix -re "s|\"$oldDebSha256\"|\"$newDebSha256\"|" 21 - 22 - pushd ../../../.. 23 - update-source-version opentabletdriver "$new_version" 24 - $(nix-build -A opentabletdriver.fetch-deps --no-out-link)
+4 -1
pkgs/tools/misc/hdf5/1.10.nix
··· 2 2 , stdenv 3 3 , fetchurl 4 4 , removeReferencesTo 5 + , cppSupport ? true 5 6 , zlibSupport ? true 6 7 , zlib 7 8 , enableShared ? !stdenv.hostPlatform.isStatic ··· 28 29 propagatedBuildInputs = optional zlibSupport zlib; 29 30 30 31 configureFlags = optional enableShared "--enable-shared" 31 - ++ optional javaSupport "--enable-java"; 32 + ++ optional javaSupport "--enable-java" 33 + ++ optional cppSupport "--enable-cxx"; 32 34 33 35 patches = [ ]; 34 36 ··· 49 51 applications for managing, manipulating, viewing, and analyzing data in the HDF5 format. 50 52 ''; 51 53 license = lib.licenses.bsd3; # Lawrence Berkeley National Labs BSD 3-Clause variant 54 + maintainers = with lib.maintainers; [ stephen-huan ]; 52 55 homepage = "https://www.hdfgroup.org/HDF5/"; 53 56 platforms = lib.platforms.unix; 54 57 };
+1
pkgs/tools/networking/openssh/common.nix
··· 189 189 tests = { 190 190 borgbackup-integration = nixosTests.borgbackup; 191 191 nixosTest = nixosTests.openssh; 192 + initrd-network-openssh = nixosTests.initrd-network-ssh; 192 193 openssh = finalAttrs.finalPackage.overrideAttrs (previousAttrs: { 193 194 pname = previousAttrs.pname + "-test"; 194 195 doCheck = true;
+3
pkgs/top-level/aliases.nix
··· 986 986 perldevel = throw "'perldevel' has been dropped due to lack of updates in nixpkgs and lack of consistent support for devel versions by 'perl-cross' releases, use 'perl' instead"; 987 987 perldevelPackages = perldevel; 988 988 petrinizer = throw "'petrinizer' has been removed, as it was broken and unmaintained"; # added 2024-05-09 989 + pg-gvm = throw "pg-gvm has been moved to postgresql.pkgs.pg-gvm to make it work with all versions of PostgreSQL"; # added 2024-11-30 989 990 pgadmin = pgadmin4; 990 991 pharo-spur64 = pharo; # Added 2022-08-03 991 992 picom-next = picom; # Added 2024-02-13 ··· 1089 1090 1090 1091 rabbitvcs = throw "rabbitvcs has been removed from nixpkgs, because it was broken"; # Added 2024-07-15 1091 1092 radare2-cutter = throw "'radare2-cutter' has been renamed to/replaced by 'cutter'"; # Converted to throw 2024-10-17 1093 + radicale2 = throw "'radicale2' was removed because it was broken. Use 'radicale' (version 3) instead"; # Added 2024-11-29 1094 + radicale3 = radicale; # Added 2024-11-29 1092 1095 radicle-cli = throw "'radicle-cli' was removed in favor of 'radicle-node'"; # Added 2024-05-04 1093 1096 radicle-upstream = throw "'radicle-upstream' was sunset, see <https://community.radworks.org/t/2962>"; # Added 2024-05-04 1094 1097 railway-travel = diebahn; # Added 2024-04-01
+1 -14
pkgs/top-level/all-packages.nix
··· 2341 2341 2342 2342 fdroidcl = pkgs.callPackage ../development/mobile/fdroidcl { }; 2343 2343 2344 - fedimint = callPackage ../by-name/fe/fedimint/package.nix { 2345 - inherit (darwin.apple_sdk.frameworks) Security SystemConfiguration; 2346 - }; 2347 - 2348 2344 flowgger = callPackage ../tools/misc/flowgger { 2349 2345 inherit (darwin.apple_sdk.frameworks) CoreServices; 2350 2346 }; ··· 11459 11455 11460 11456 alerta-server = callPackage ../servers/monitoring/alerta { }; 11461 11457 11462 - apacheHttpd_2_4 = callPackage ../servers/http/apache-httpd/2.4.nix { 11463 - inherit (darwin.apple_sdk.frameworks) Foundation; 11464 - }; 11458 + apacheHttpd_2_4 = callPackage ../servers/http/apache-httpd/2.4.nix { }; 11465 11459 apacheHttpd = apacheHttpd_2_4; 11466 11460 11467 11461 apacheHttpdPackagesFor = apacheHttpd: self: let callPackage = newScope self; in { ··· 11746 11740 11747 11741 inherit (callPackage ../applications/networking/mullvad { }) 11748 11742 mullvad; 11749 - 11750 - mullvad-vpn = callPackage ../applications/networking/mullvad-vpn { }; 11751 11743 11752 11744 mullvad-closest = with python3Packages; toPythonApplication mullvad-closest; 11753 11745 ··· 12082 12074 erlang = erlang_27; 12083 12075 elixir = pkgs.elixir.override { inherit erlang; }; 12084 12076 }; 12085 - 12086 - radicale2 = callPackage ../servers/radicale/2.x.nix { }; 12087 - radicale3 = radicale; 12088 12077 12089 12078 qcal = callPackage ../tools/networking/qcal/default.nix { }; 12090 12079 ··· 15134 15123 opentimestamps-client = python3Packages.callPackage ../tools/misc/opentimestamps-client { }; 15135 15124 15136 15125 opentoonz = libsForQt5.callPackage ../applications/graphics/opentoonz { }; 15137 - 15138 - opentabletdriver = callPackage ../tools/X11/opentabletdriver { }; 15139 15126 15140 15127 opentx = libsForQt5.callPackage ../applications/misc/opentx { }; 15141 15128
+3 -8
pkgs/top-level/haskell-packages.nix
··· 429 429 ghc910 = compiler.ghc9101; 430 430 ghcHEAD = callPackage ../development/compilers/ghc/head.nix { 431 431 bootPkgs = 432 - # For GHC 9.6 no armv7l bindists are available. 433 - if stdenv.buildPlatform.isAarch32 then 434 - bb.packages.ghc963 435 - else if stdenv.buildPlatform.isPower64 && stdenv.buildPlatform.isLittleEndian then 436 - bb.packages.ghc963 437 - else 438 - bb.packages.ghc963Binary; 432 + # No suitable bindist packaged yet 433 + bb.packages.ghc9101; 439 434 inherit (buildPackages.python3Packages) sphinx; 440 435 # Need to use apple's patched xattr until 441 436 # https://github.com/xattr/xattr/issues/44 and ··· 604 599 ghcHEAD = callPackage ../development/haskell-modules { 605 600 buildHaskellPackages = bh.packages.ghcHEAD; 606 601 ghc = bh.compiler.ghcHEAD; 607 - compilerConfig = callPackage ../development/haskell-modules/configuration-ghc-9.12.x.nix { }; 602 + compilerConfig = callPackage ../development/haskell-modules/configuration-ghc-9.14.x.nix { }; 608 603 }; 609 604 610 605 ghcjs = packages.ghcjs810;
+2
pkgs/top-level/python-packages.nix
··· 7473 7473 7474 7474 lizard = callPackage ../development/python-modules/lizard { }; 7475 7475 7476 + llama-cpp-python = callPackage ../development/python-modules/llama-cpp-python { }; 7477 + 7476 7478 llama-cloud = callPackage ../development/python-modules/llama-cloud { }; 7477 7479 7478 7480 llama-index = callPackage ../development/python-modules/llama-index { };