Merge remote-tracking branch 'origin/staging-next' into staging

K900 007b4f3e d91621c5

+2799 -1313
+3
.git-blame-ignore-revs
··· 212 213 # format files with nixfmt (#347275) 214 adb9714bd909df283c66bbd641bd631ff50a4260
··· 212 213 # format files with nixfmt (#347275) 214 adb9714bd909df283c66bbd641bd631ff50a4260 215 + 216 + # treewide: incus packages 217 + 9ab59bb5fb943ad6740f64f5a79eae9642fb8211
+1 -1
CONTRIBUTING.md
··· 345 Here's a brief overview of the main Git branches and what channels they're used for: 346 347 - `master`: The main branch, used for the unstable channels such as `nixpkgs-unstable`, `nixos-unstable` and `nixos-unstable-small`. 348 - - `release-YY.MM` (e.g. `release-24.11`): The NixOS release branches, used for the stable channels such as `nixos-24.11`, `nixos-24.11-small` and `nixpkgs-24.11-darwin`. 349 350 When a channel is updated, a corresponding Git branch is also updated to point to the corresponding commit. 351 So e.g. the [`nixpkgs-unstable` branch](https://github.com/nixos/nixpkgs/tree/nixpkgs-unstable) corresponds to the Git commit from the [`nixpkgs-unstable` channel](https://channels.nixos.org/nixpkgs-unstable).
··· 345 Here's a brief overview of the main Git branches and what channels they're used for: 346 347 - `master`: The main branch, used for the unstable channels such as `nixpkgs-unstable`, `nixos-unstable` and `nixos-unstable-small`. 348 + - `release-YY.MM` (e.g. `release-25.05`): The NixOS release branches, used for the stable channels such as `nixos-25.05`, `nixos-25.05-small` and `nixpkgs-25.05-darwin`. 349 350 When a channel is updated, a corresponding Git branch is also updated to point to the corresponding commit. 351 So e.g. the [`nixpkgs-unstable` branch](https://github.com/nixos/nixpkgs/tree/nixpkgs-unstable) corresponds to the Git commit from the [`nixpkgs-unstable` channel](https://channels.nixos.org/nixpkgs-unstable).
+2 -2
README.md
··· 52 system, [Hydra](https://hydra.nixos.org/). 53 54 * [Continuous package builds for unstable/master](https://hydra.nixos.org/jobset/nixos/trunk-combined) 55 - * [Continuous package builds for the NixOS 24.05 release](https://hydra.nixos.org/jobset/nixos/release-24.05) 56 * [Tests for unstable/master](https://hydra.nixos.org/job/nixos/trunk-combined/tested#tabs-constituents) 57 - * [Tests for the NixOS 24.05 release](https://hydra.nixos.org/job/nixos/release-24.05/tested#tabs-constituents) 58 59 Artifacts successfully built with Hydra are published to cache at 60 https://cache.nixos.org/. When successful build and test criteria are
··· 52 system, [Hydra](https://hydra.nixos.org/). 53 54 * [Continuous package builds for unstable/master](https://hydra.nixos.org/jobset/nixos/trunk-combined) 55 + * [Continuous package builds for the NixOS 24.11 release](https://hydra.nixos.org/jobset/nixos/release-24.11) 56 * [Tests for unstable/master](https://hydra.nixos.org/job/nixos/trunk-combined/tested#tabs-constituents) 57 + * [Tests for the NixOS 24.11 release](https://hydra.nixos.org/job/nixos/release-24.11/tested#tabs-constituents) 58 59 Artifacts successfully built with Hydra are published to cache at 60 https://cache.nixos.org/. When successful build and test criteria are
+5
maintainers/maintainer-list.nix
··· 16805 githubId = 33826198; 16806 name = "Philipp Arras"; 16807 }; 16808 pashashocky = { 16809 email = "pashashocky@gmail.com"; 16810 github = "pashashocky";
··· 16805 githubId = 33826198; 16806 name = "Philipp Arras"; 16807 }; 16808 + parth = { 16809 + github = "parth"; 16810 + githubId = 821972; 16811 + name = "Parth Mehrotra"; 16812 + }; 16813 pashashocky = { 16814 email = "pashashocky@gmail.com"; 16815 github = "pashashocky";
+8 -8
nixos/doc/manual/installation/upgrading.chapter.md
··· 6 automatically from NixOS's Git repository after certain tests have 7 passed and all packages have been built. These channels are: 8 9 - - *Stable channels*, such as [`nixos-24.05`](https://channels.nixos.org/nixos-24.05). 10 These only get conservative bug fixes and package upgrades. For 11 instance, a channel update may cause the Linux kernel on your system 12 to be upgraded from 4.19.34 to 4.19.38 (a minor bug fix), but not ··· 19 radical changes between channel updates. It's not recommended for 20 production systems. 21 22 - - *Small channels*, such as [`nixos-24.05-small`](https://channels.nixos.org/nixos-24.05-small) 23 or [`nixos-unstable-small`](https://channels.nixos.org/nixos-unstable-small). 24 These are identical to the stable and unstable channels described above, 25 except that they contain fewer binary packages. This means they get updated ··· 38 39 When you first install NixOS, you're automatically subscribed to the 40 NixOS channel that corresponds to your installation source. For 41 - instance, if you installed from a 24.05 ISO, you will be subscribed to 42 - the `nixos-24.05` channel. To see which NixOS channel you're subscribed 43 to, run the following as root: 44 45 ```ShellSession ··· 54 ``` 55 56 (Be sure to include the `nixos` parameter at the end.) For instance, to 57 - use the NixOS 24.05 stable channel: 58 59 ```ShellSession 60 - # nix-channel --add https://channels.nixos.org/nixos-24.05 nixos 61 ``` 62 63 If you have a server, you may want to use the "small" channel instead: 64 65 ```ShellSession 66 - # nix-channel --add https://channels.nixos.org/nixos-24.05-small nixos 67 ``` 68 69 And if you want to live on the bleeding edge: ··· 117 118 ```nix 119 { 120 - system.autoUpgrade.channel = "https://channels.nixos.org/nixos-24.05"; 121 } 122 ```
··· 6 automatically from NixOS's Git repository after certain tests have 7 passed and all packages have been built. These channels are: 8 9 + - *Stable channels*, such as [`nixos-24.11`](https://channels.nixos.org/nixos-24.11). 10 These only get conservative bug fixes and package upgrades. For 11 instance, a channel update may cause the Linux kernel on your system 12 to be upgraded from 4.19.34 to 4.19.38 (a minor bug fix), but not ··· 19 radical changes between channel updates. It's not recommended for 20 production systems. 21 22 + - *Small channels*, such as [`nixos-24.11-small`](https://channels.nixos.org/nixos-24.11-small) 23 or [`nixos-unstable-small`](https://channels.nixos.org/nixos-unstable-small). 24 These are identical to the stable and unstable channels described above, 25 except that they contain fewer binary packages. This means they get updated ··· 38 39 When you first install NixOS, you're automatically subscribed to the 40 NixOS channel that corresponds to your installation source. For 41 + instance, if you installed from a 24.11 ISO, you will be subscribed to 42 + the `nixos-24.11` channel. To see which NixOS channel you're subscribed 43 to, run the following as root: 44 45 ```ShellSession ··· 54 ``` 55 56 (Be sure to include the `nixos` parameter at the end.) For instance, to 57 + use the NixOS 24.11 stable channel: 58 59 ```ShellSession 60 + # nix-channel --add https://channels.nixos.org/nixos-24.11 nixos 61 ``` 62 63 If you have a server, you may want to use the "small" channel instead: 64 65 ```ShellSession 66 + # nix-channel --add https://channels.nixos.org/nixos-24.11-small nixos 67 ``` 68 69 And if you want to live on the bleeding edge: ··· 117 118 ```nix 119 { 120 + system.autoUpgrade.channel = "https://channels.nixos.org/nixos-24.11"; 121 } 122 ```
+1 -1
nixos/doc/manual/release-notes/rl-2411.section.md
··· 1 - # Release 24.11 (“Vicuña”, 2024.11/??) {#sec-release-24.11} 2 3 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. --> 4
··· 1 + # Release 24.11 (“Vicuña”, 2024.11/28) {#sec-release-24.11} 2 3 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. --> 4
+1 -1
nixos/modules/programs/java.nix
··· 67 environment.systemPackages = [ cfg.package ]; 68 69 environment.shellInit = '' 70 - test -e ${cfg.package}/nix-support/setup-hook && source ${cfg.package}/nix-support/setup-hook 71 ''; 72 73 };
··· 67 environment.systemPackages = [ cfg.package ]; 68 69 environment.shellInit = '' 70 + test -e ${cfg.package}/nix-support/setup-hook && . ${cfg.package}/nix-support/setup-hook 71 ''; 72 73 };
+76 -15
nixos/modules/services/networking/zapret.nix
··· 8 cfg = config.services.zapret; 9 10 whitelist = lib.optionalString ( 11 - cfg.whitelist != null 12 ) "--hostlist ${pkgs.writeText "zapret-whitelist" (lib.concatStringsSep "\n" cfg.whitelist)}"; 13 14 blacklist = 15 - lib.optionalString (cfg.blacklist != null) 16 "--hostlist-exclude ${pkgs.writeText "zapret-blacklist" (lib.concatStringsSep "\n" cfg.blacklist)}"; 17 18 - ports = if cfg.httpSupport then "80,443" else "443"; 19 in 20 { 21 options.services.zapret = { ··· 29 "--dpi-desync=fake,disorder2" 30 "--dpi-desync-ttl=1" 31 "--dpi-desync-autottl=2" 32 - ]; 33 ''; 34 description = '' 35 Specify the bypass parameters for Zapret binary. ··· 40 ''; 41 }; 42 whitelist = lib.mkOption { 43 - default = null; 44 - type = with lib.types; nullOr (listOf str); 45 example = '' 46 [ 47 "youtube.com" ··· 59 ''; 60 }; 61 blacklist = lib.mkOption { 62 - default = null; 63 - type = with lib.types; nullOr (listOf str); 64 example = '' 65 [ 66 "example.com" ··· 96 Http bypass rarely works and you might want to disable it if you don't utilise http connections. 97 ''; 98 }; 99 }; 100 101 config = lib.mkIf cfg.enable ( ··· 103 { 104 assertions = [ 105 { 106 - assertion = (cfg.whitelist == null) || (cfg.blacklist == null); 107 message = "Can't specify both whitelist and blacklist."; 108 } 109 { 110 assertion = (builtins.length cfg.params) != 0; 111 message = "You have to specify zapret parameters. See the params option's description."; 112 } 113 ]; 114 115 systemd.services.zapret = { ··· 117 wantedBy = [ "multi-user.target" ]; 118 after = [ "network.target" ]; 119 serviceConfig = { 120 - ExecStart = "${cfg.package}/bin/nfqws --pidfile=/run/nfqws.pid ${lib.concatStringsSep " " cfg.params} ${whitelist} ${blacklist} --qnum=${toString cfg.qnum}"; 121 Type = "simple"; 122 PIDFile = "/run/nfqws.pid"; 123 Restart = "always"; 124 - RuntimeMaxSec = "1h"; # This service loves to crash silently or cause network slowdowns. It also restarts instantly. In my experience restarting it hourly provided the best experience. 125 126 - # hardening 127 DevicePolicy = "closed"; 128 KeyringMode = "private"; 129 PrivateTmp = true; ··· 145 146 # Route system traffic via service for specified ports. 147 (lib.mkIf cfg.configureFirewall { 148 - networking.firewall.extraCommands = '' 149 - iptables -t mangle -I POSTROUTING -p tcp -m multiport --dports ${ports} -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000 -j NFQUEUE --queue-num ${toString cfg.qnum} --queue-bypass 150 - ''; 151 }) 152 ] 153 );
··· 8 cfg = config.services.zapret; 9 10 whitelist = lib.optionalString ( 11 + (builtins.length cfg.whitelist) != 0 12 ) "--hostlist ${pkgs.writeText "zapret-whitelist" (lib.concatStringsSep "\n" cfg.whitelist)}"; 13 14 blacklist = 15 + lib.optionalString ((builtins.length cfg.blacklist) != 0) 16 "--hostlist-exclude ${pkgs.writeText "zapret-blacklist" (lib.concatStringsSep "\n" cfg.blacklist)}"; 17 18 + params = lib.concatStringsSep " " cfg.params; 19 + 20 + qnum = toString cfg.qnum; 21 in 22 { 23 options.services.zapret = { ··· 31 "--dpi-desync=fake,disorder2" 32 "--dpi-desync-ttl=1" 33 "--dpi-desync-autottl=2" 34 + ] 35 ''; 36 description = '' 37 Specify the bypass parameters for Zapret binary. ··· 42 ''; 43 }; 44 whitelist = lib.mkOption { 45 + default = [ ]; 46 + type = with lib.types; listOf str; 47 example = '' 48 [ 49 "youtube.com" ··· 61 ''; 62 }; 63 blacklist = lib.mkOption { 64 + default = [ ]; 65 + type = with lib.types; listOf str; 66 example = '' 67 [ 68 "example.com" ··· 98 Http bypass rarely works and you might want to disable it if you don't utilise http connections. 99 ''; 100 }; 101 + httpMode = lib.mkOption { 102 + default = "first"; 103 + type = lib.types.enum [ 104 + "first" 105 + "full" 106 + ]; 107 + example = "full"; 108 + description = '' 109 + By default this service only changes the first packet sent, which is enough in most cases. 110 + But there are DPIs that monitor the whole traffic within a session. 111 + That requires full processing of every packet, which increases the CPU usage. 112 + 113 + Set the mode to `full` if http doesn't work. 114 + ''; 115 + }; 116 + udpSupport = lib.mkOption { 117 + default = false; 118 + type = lib.types.bool; 119 + description = '' 120 + Enable UDP routing. 121 + This requires you to specify `udpPorts` and `--dpi-desync-any-protocol` parameter. 122 + ''; 123 + }; 124 + udpPorts = lib.mkOption { 125 + default = [ ]; 126 + type = with lib.types; listOf str; 127 + example = '' 128 + [ 129 + "50000:50099" 130 + "1234" 131 + ] 132 + ''; 133 + description = '' 134 + List of UDP ports to route. 135 + Port ranges are delimited with a colon like this "50000:50099". 136 + ''; 137 + }; 138 }; 139 140 config = lib.mkIf cfg.enable ( ··· 142 { 143 assertions = [ 144 { 145 + assertion = (builtins.length cfg.whitelist) == 0 || (builtins.length cfg.blacklist) == 0; 146 message = "Can't specify both whitelist and blacklist."; 147 } 148 { 149 assertion = (builtins.length cfg.params) != 0; 150 message = "You have to specify zapret parameters. See the params option's description."; 151 } 152 + { 153 + assertion = cfg.udpSupport -> (builtins.length cfg.udpPorts) != 0; 154 + message = "You have to specify UDP ports or disable UDP support."; 155 + } 156 + { 157 + assertion = !cfg.configureFirewall || !config.networking.nftables.enable; 158 + message = "You need to manually configure you firewall for Zapret service when using nftables."; 159 + } 160 ]; 161 162 systemd.services.zapret = { ··· 164 wantedBy = [ "multi-user.target" ]; 165 after = [ "network.target" ]; 166 serviceConfig = { 167 + ExecStart = "${cfg.package}/bin/nfqws --pidfile=/run/nfqws.pid ${params} ${whitelist} ${blacklist} --qnum=${qnum}"; 168 Type = "simple"; 169 PIDFile = "/run/nfqws.pid"; 170 Restart = "always"; 171 + RuntimeMaxSec = "1h"; # This service loves to crash silently or cause network slowdowns. It also restarts instantly. Restarting it at least hourly provided the best experience. 172 173 + # Hardening. 174 DevicePolicy = "closed"; 175 KeyringMode = "private"; 176 PrivateTmp = true; ··· 192 193 # Route system traffic via service for specified ports. 194 (lib.mkIf cfg.configureFirewall { 195 + networking.firewall.extraCommands = 196 + let 197 + httpParams = lib.optionalString ( 198 + cfg.httpMode == "first" 199 + ) "-m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6"; 200 + 201 + udpPorts = lib.concatStringsSep "," cfg.udpPorts; 202 + in 203 + '' 204 + ip46tables -t mangle -I POSTROUTING -p tcp --dport 443 -m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:6 -m mark ! --mark 0x40000000/0x40000000 -j NFQUEUE --queue-num ${qnum} --queue-bypass 205 + '' 206 + + lib.optionalString (cfg.httpSupport) '' 207 + ip46tables -t mangle -I POSTROUTING -p tcp --dport 80 ${httpParams} -m mark ! --mark 0x40000000/0x40000000 -j NFQUEUE --queue-num ${qnum} --queue-bypass 208 + '' 209 + + lib.optionalString (cfg.udpSupport) '' 210 + ip46tables -t mangle -A POSTROUTING -p udp -m multiport --dports ${udpPorts} -m mark ! --mark 0x40000000/0x40000000 -j NFQUEUE --queue-num ${qnum} --queue-bypass 211 + ''; 212 }) 213 ] 214 );
+1 -1
nixos/modules/services/web-apps/moodle.nix
··· 56 mysqlLocal = cfg.database.createLocally && cfg.database.type == "mysql"; 57 pgsqlLocal = cfg.database.createLocally && cfg.database.type == "pgsql"; 58 59 - phpExt = pkgs.php81.buildEnv { 60 extensions = { all, ... }: with all; [ iconv mbstring curl openssl tokenizer soap ctype zip gd simplexml dom intl sqlite3 pgsql pdo_sqlite pdo_pgsql pdo_odbc pdo_mysql pdo mysqli session zlib xmlreader fileinfo filter opcache exif sodium ]; 61 extraConfig = "max_input_vars = 5000"; 62 };
··· 56 mysqlLocal = cfg.database.createLocally && cfg.database.type == "mysql"; 57 pgsqlLocal = cfg.database.createLocally && cfg.database.type == "pgsql"; 58 59 + phpExt = pkgs.php83.buildEnv { 60 extensions = { all, ... }: with all; [ iconv mbstring curl openssl tokenizer soap ctype zip gd simplexml dom intl sqlite3 pgsql pdo_sqlite pdo_pgsql pdo_odbc pdo_mysql pdo mysqli session zlib xmlreader fileinfo filter opcache exif sodium ]; 61 extraConfig = "max_input_vars = 5000"; 62 };
+67 -42
nixos/modules/virtualisation/lxc-image-metadata.nix
··· 1 - { lib, config, pkgs, ... }: 2 3 let 4 - templateSubmodule = {...}: { 5 - options = { 6 - enable = lib.mkEnableOption "this template"; 7 8 - target = lib.mkOption { 9 - description = "Path in the container"; 10 - type = lib.types.path; 11 - }; 12 - template = lib.mkOption { 13 - description = ".tpl file for rendering the target"; 14 - type = lib.types.path; 15 - }; 16 - when = lib.mkOption { 17 - description = "Events which trigger a rewrite (create, copy)"; 18 - type = lib.types.listOf (lib.types.str); 19 - }; 20 - properties = lib.mkOption { 21 - description = "Additional properties"; 22 - type = lib.types.attrs; 23 - default = {}; 24 }; 25 }; 26 - }; 27 28 - toYAML = name: data: pkgs.writeText name (lib.generators.toYAML {} data); 29 30 cfg = config.virtualisation.lxc; 31 - templates = if cfg.templates != {} then let 32 - list = lib.mapAttrsToList (name: value: { inherit name; } // value) 33 - (lib.filterAttrs (name: value: value.enable) cfg.templates); 34 - in 35 - { 36 - files = map (tpl: { 37 - source = tpl.template; 38 - target = "/templates/${tpl.name}.tpl"; 39 - }) list; 40 - properties = lib.listToAttrs (map (tpl: lib.nameValuePair tpl.target { 41 - when = tpl.when; 42 - template = "${tpl.name}.tpl"; 43 - properties = tpl.properties; 44 - }) list); 45 - } 46 - else { files = []; properties = {}; }; 47 48 - in { 49 imports = [ 50 ../image/file-options.nix 51 ]; ··· 59 templates = lib.mkOption { 60 description = "Templates for LXD"; 61 type = lib.types.attrsOf (lib.types.submodule templateSubmodule); 62 - default = {}; 63 example = lib.literalExpression '' 64 { 65 # create /etc/hostname on container creation ··· 91 }; 92 93 config = { 94 - system.nixos.tags = [ "lxc" "metadata" ]; 95 image.extension = "tar.xz"; 96 image.filePath = "tarball/${config.image.fileName}"; 97 system.build.image = config.system.build.metadata; ··· 100 contents = [ 101 { 102 source = toYAML "metadata.yaml" { 103 - architecture = builtins.elemAt (builtins.match "^([a-z0-9_]+).+" (toString pkgs.stdenv.hostPlatform.system)) 0; 104 creation_date = 1; 105 properties = { 106 description = "${config.system.nixos.distroName} ${config.system.nixos.codeName} ${config.system.nixos.label} ${pkgs.stdenv.hostPlatform.system}";
··· 1 + { 2 + lib, 3 + config, 4 + pkgs, 5 + ... 6 + }: 7 8 let 9 + templateSubmodule = 10 + { ... }: 11 + { 12 + options = { 13 + enable = lib.mkEnableOption "this template"; 14 15 + target = lib.mkOption { 16 + description = "Path in the container"; 17 + type = lib.types.path; 18 + }; 19 + template = lib.mkOption { 20 + description = ".tpl file for rendering the target"; 21 + type = lib.types.path; 22 + }; 23 + when = lib.mkOption { 24 + description = "Events which trigger a rewrite (create, copy)"; 25 + type = lib.types.listOf (lib.types.str); 26 + }; 27 + properties = lib.mkOption { 28 + description = "Additional properties"; 29 + type = lib.types.attrs; 30 + default = { }; 31 + }; 32 }; 33 }; 34 35 + toYAML = name: data: pkgs.writeText name (lib.generators.toYAML { } data); 36 37 cfg = config.virtualisation.lxc; 38 + templates = 39 + if cfg.templates != { } then 40 + let 41 + list = lib.mapAttrsToList (name: value: { inherit name; } // value) ( 42 + lib.filterAttrs (name: value: value.enable) cfg.templates 43 + ); 44 + in 45 + { 46 + files = map (tpl: { 47 + source = tpl.template; 48 + target = "/templates/${tpl.name}.tpl"; 49 + }) list; 50 + properties = lib.listToAttrs ( 51 + map ( 52 + tpl: 53 + lib.nameValuePair tpl.target { 54 + when = tpl.when; 55 + template = "${tpl.name}.tpl"; 56 + properties = tpl.properties; 57 + } 58 + ) list 59 + ); 60 + } 61 + else 62 + { 63 + files = [ ]; 64 + properties = { }; 65 + }; 66 67 + in 68 + { 69 imports = [ 70 ../image/file-options.nix 71 ]; ··· 79 templates = lib.mkOption { 80 description = "Templates for LXD"; 81 type = lib.types.attrsOf (lib.types.submodule templateSubmodule); 82 + default = { }; 83 example = lib.literalExpression '' 84 { 85 # create /etc/hostname on container creation ··· 111 }; 112 113 config = { 114 + system.nixos.tags = [ 115 + "lxc" 116 + "metadata" 117 + ]; 118 image.extension = "tar.xz"; 119 image.filePath = "tarball/${config.image.fileName}"; 120 system.build.image = config.system.build.metadata; ··· 123 contents = [ 124 { 125 source = toYAML "metadata.yaml" { 126 + architecture = builtins.elemAt (builtins.match "^([a-z0-9_]+).+" ( 127 + toString pkgs.stdenv.hostPlatform.system 128 + )) 0; 129 creation_date = 1; 130 properties = { 131 description = "${config.system.nixos.distroName} ${config.system.nixos.codeName} ${config.system.nixos.label} ${pkgs.stdenv.hostPlatform.system}";
+1 -1
nixos/modules/virtualisation/lxc-instance-common.nix
··· 1 - {lib, ...}: 2 3 { 4 meta = {
··· 1 + { lib, ... }: 2 3 { 4 meta = {
+53 -48
nixos/modules/virtualisation/lxc.nix
··· 1 # LXC Configuration 2 3 - { config, lib, pkgs, ... }: 4 5 let 6 cfg = config.virtualisation.lxc; ··· 12 }; 13 14 options.virtualisation.lxc = { 15 - enable = 16 - lib.mkOption { 17 - type = lib.types.bool; 18 - default = false; 19 - description = '' 20 - This enables Linux Containers (LXC), which provides tools 21 - for creating and managing system or application containers 22 - on Linux. 23 - ''; 24 - }; 25 26 unprivilegedContainers = lib.mkEnableOption "support for unprivileged users to launch containers"; 27 28 - systemConfig = 29 - lib.mkOption { 30 - type = lib.types.lines; 31 - default = ""; 32 - description = '' 33 - This is the system-wide LXC config. See 34 - {manpage}`lxc.system.conf(5)`. 35 - ''; 36 - }; 37 package = lib.mkPackageOption pkgs "lxc" { }; 38 39 - defaultConfig = 40 - lib.mkOption { 41 - type = lib.types.lines; 42 - default = ""; 43 - description = '' 44 - Default config (default.conf) for new containers, i.e. for 45 - network config. See {manpage}`lxc.container.conf(5)`. 46 - ''; 47 - }; 48 49 - usernetConfig = 50 - lib.mkOption { 51 - type = lib.types.lines; 52 - default = ""; 53 - description = '' 54 - This is the config file for managing unprivileged user network 55 - administration access in LXC. See {manpage}`lxc-usernet(5)`. 56 - ''; 57 - }; 58 59 - bridgeConfig = 60 - lib.mkOption { 61 - type = lib.types.lines; 62 - default = ""; 63 - description = '' 64 - This is the config file for override lxc-net bridge default settings. 65 - ''; 66 - }; 67 }; 68 69 ###### implementation ··· 88 }; 89 90 # We don't need the `lxc-user` group, unless the unprivileged containers are enabled. 91 - users.groups = lib.mkIf cfg.unprivilegedContainers { lxc-user = {}; }; 92 93 # `lxc-user-nic` needs suid to attach to bridge for unpriv containers. 94 security.wrappers = lib.mkIf cfg.unprivilegedContainers { ··· 108 lxc-net = { 109 enable = true; 110 wantedBy = [ "multi-user.target" ]; 111 - path = [ pkgs.iproute2 pkgs.iptables pkgs.getent pkgs.dnsmasq ]; 112 }; 113 }; 114 };
··· 1 # LXC Configuration 2 3 + { 4 + config, 5 + lib, 6 + pkgs, 7 + ... 8 + }: 9 10 let 11 cfg = config.virtualisation.lxc; ··· 17 }; 18 19 options.virtualisation.lxc = { 20 + enable = lib.mkOption { 21 + type = lib.types.bool; 22 + default = false; 23 + description = '' 24 + This enables Linux Containers (LXC), which provides tools 25 + for creating and managing system or application containers 26 + on Linux. 27 + ''; 28 + }; 29 30 unprivilegedContainers = lib.mkEnableOption "support for unprivileged users to launch containers"; 31 32 + systemConfig = lib.mkOption { 33 + type = lib.types.lines; 34 + default = ""; 35 + description = '' 36 + This is the system-wide LXC config. See 37 + {manpage}`lxc.system.conf(5)`. 38 + ''; 39 + }; 40 package = lib.mkPackageOption pkgs "lxc" { }; 41 42 + defaultConfig = lib.mkOption { 43 + type = lib.types.lines; 44 + default = ""; 45 + description = '' 46 + Default config (default.conf) for new containers, i.e. for 47 + network config. See {manpage}`lxc.container.conf(5)`. 48 + ''; 49 + }; 50 51 + usernetConfig = lib.mkOption { 52 + type = lib.types.lines; 53 + default = ""; 54 + description = '' 55 + This is the config file for managing unprivileged user network 56 + administration access in LXC. See {manpage}`lxc-usernet(5)`. 57 + ''; 58 + }; 59 60 + bridgeConfig = lib.mkOption { 61 + type = lib.types.lines; 62 + default = ""; 63 + description = '' 64 + This is the config file for override lxc-net bridge default settings. 65 + ''; 66 + }; 67 }; 68 69 ###### implementation ··· 88 }; 89 90 # We don't need the `lxc-user` group, unless the unprivileged containers are enabled. 91 + users.groups = lib.mkIf cfg.unprivilegedContainers { lxc-user = { }; }; 92 93 # `lxc-user-nic` needs suid to attach to bridge for unpriv containers. 94 security.wrappers = lib.mkIf cfg.unprivilegedContainers { ··· 108 lxc-net = { 109 enable = true; 110 wantedBy = [ "multi-user.target" ]; 111 + path = [ 112 + pkgs.iproute2 113 + pkgs.iptables 114 + pkgs.getent 115 + pkgs.dnsmasq 116 + ]; 117 }; 118 }; 119 };
+25 -20
nixos/modules/virtualisation/lxcfs.nix
··· 1 # LXC Configuration 2 3 - { config, lib, pkgs, ... }: 4 5 let 6 cfg = config.virtualisation.lxc.lxcfs; 7 - in { 8 meta = { 9 maintainers = lib.teams.lxc.members; 10 }; 11 12 ###### interface 13 options.virtualisation.lxc.lxcfs = { 14 - enable = 15 - lib.mkOption { 16 - type = lib.types.bool; 17 - default = false; 18 - description = '' 19 - This enables LXCFS, a FUSE filesystem for LXC. 20 - To use lxcfs in include the following configuration in your 21 - container configuration: 22 - ``` 23 - virtualisation.lxc.defaultConfig = "lxc.include = ''${pkgs.lxcfs}/share/lxc/config/common.conf.d/00-lxcfs.conf"; 24 - ``` 25 - ''; 26 - }; 27 }; 28 29 ###### implementation ··· 34 before = [ "lxc.service" ]; 35 restartIfChanged = false; 36 serviceConfig = { 37 - ExecStartPre="${pkgs.coreutils}/bin/mkdir -p /var/lib/lxcfs"; 38 - ExecStart="${pkgs.lxcfs}/bin/lxcfs /var/lib/lxcfs"; 39 - ExecStopPost="-${pkgs.fuse}/bin/fusermount -u /var/lib/lxcfs"; 40 - KillMode="process"; 41 - Restart="on-failure"; 42 }; 43 }; 44 };
··· 1 # LXC Configuration 2 3 + { 4 + config, 5 + lib, 6 + pkgs, 7 + ... 8 + }: 9 10 let 11 cfg = config.virtualisation.lxc.lxcfs; 12 + in 13 + { 14 meta = { 15 maintainers = lib.teams.lxc.members; 16 }; 17 18 ###### interface 19 options.virtualisation.lxc.lxcfs = { 20 + enable = lib.mkOption { 21 + type = lib.types.bool; 22 + default = false; 23 + description = '' 24 + This enables LXCFS, a FUSE filesystem for LXC. 25 + To use lxcfs in include the following configuration in your 26 + container configuration: 27 + ``` 28 + virtualisation.lxc.defaultConfig = "lxc.include = ''${pkgs.lxcfs}/share/lxc/config/common.conf.d/00-lxcfs.conf"; 29 + ``` 30 + ''; 31 + }; 32 }; 33 34 ###### implementation ··· 39 before = [ "lxc.service" ]; 40 restartIfChanged = false; 41 serviceConfig = { 42 + ExecStartPre = "${pkgs.coreutils}/bin/mkdir -p /var/lib/lxcfs"; 43 + ExecStart = "${pkgs.lxcfs}/bin/lxcfs /var/lib/lxcfs"; 44 + ExecStopPost = "-${pkgs.fuse}/bin/fusermount -u /var/lib/lxcfs"; 45 + KillMode = "process"; 46 + Restart = "on-failure"; 47 }; 48 }; 49 };
+122 -108
nixos/tests/incus/container.nix
··· 1 - import ../make-test-python.nix ({ pkgs, lib, extra ? {}, name ? "incus-container", incus ? pkgs.incus-lts, ... } : 2 3 - let 4 - releases = import ../../release.nix { 5 - configuration = lib.recursiveUpdate { 6 # Building documentation makes the test unnecessarily take a longer time: 7 documentation.enable = lib.mkForce false; 8 9 boot.kernel.sysctl."net.ipv4.ip_forward" = "1"; 10 - } 11 - extra; 12 - }; 13 14 - container-image-metadata = "${releases.incusContainerMeta.${pkgs.stdenv.hostPlatform.system}}/tarball/nixos-system-${pkgs.stdenv.hostPlatform.system}.tar.xz"; 15 - container-image-rootfs = "${releases.incusContainerImage.${pkgs.stdenv.hostPlatform.system}}/nixos-lxc-image-${pkgs.stdenv.hostPlatform.system}.squashfs"; 16 - in 17 - { 18 - inherit name; 19 20 - meta = { 21 - maintainers = lib.teams.lxc.members; 22 - }; 23 24 - nodes.machine = { ... }: { 25 - virtualisation = { 26 - # Ensure test VM has enough resources for creating and managing guests 27 - cores = 2; 28 - memorySize = 1024; 29 - diskSize = 4096; 30 31 - incus = { 32 - enable = true; 33 - package = incus; 34 }; 35 - }; 36 - networking.nftables.enable = true; 37 - }; 38 39 - testScript = # python 40 - '' 41 - def instance_is_up(_) -> bool: 42 - status, _ = machine.execute("incus exec container --disable-stdin --force-interactive /run/current-system/sw/bin/systemctl -- is-system-running") 43 - return status == 0 44 45 - def set_container(config): 46 - machine.succeed(f"incus config set container {config}") 47 - machine.succeed("incus restart container") 48 - with machine.nested("Waiting for instance to start and be usable"): 49 - retry(instance_is_up) 50 51 - def check_sysctl(instance): 52 - with subtest("systemd sysctl settings are applied"): 53 - machine.succeed(f"incus exec {instance} -- systemctl status systemd-sysctl") 54 - sysctl = machine.succeed(f"incus exec {instance} -- sysctl net.ipv4.ip_forward").strip().split(" ")[-1] 55 - assert "1" == sysctl, f"systemd-sysctl configuration not correctly applied, {sysctl} != 1" 56 57 - machine.wait_for_unit("incus.service") 58 59 - # no preseed should mean no service 60 - machine.fail("systemctl status incus-preseed.service") 61 62 - machine.succeed("incus admin init --minimal") 63 64 - with subtest("Container image can be imported"): 65 - machine.succeed("incus image import ${container-image-metadata} ${container-image-rootfs} --alias nixos") 66 67 - with subtest("Container can be launched and managed"): 68 - machine.succeed("incus launch nixos container") 69 - with machine.nested("Waiting for instance to start and be usable"): 70 - retry(instance_is_up) 71 - machine.succeed("echo true | incus exec container /run/current-system/sw/bin/bash -") 72 73 - with subtest("Container mounts lxcfs overlays"): 74 - machine.succeed("incus exec container mount | grep 'lxcfs on /proc/cpuinfo type fuse.lxcfs'") 75 - machine.succeed("incus exec container mount | grep 'lxcfs on /proc/meminfo type fuse.lxcfs'") 76 77 - with subtest("resource limits"): 78 - with subtest("Container CPU limits can be managed"): 79 - set_container("limits.cpu 1") 80 - cpuinfo = machine.succeed("incus exec container grep -- -c ^processor /proc/cpuinfo").strip() 81 - assert cpuinfo == "1", f"Wrong number of CPUs reported from /proc/cpuinfo, want: 1, got: {cpuinfo}" 82 83 - set_container("limits.cpu 2") 84 - cpuinfo = machine.succeed("incus exec container grep -- -c ^processor /proc/cpuinfo").strip() 85 - assert cpuinfo == "2", f"Wrong number of CPUs reported from /proc/cpuinfo, want: 2, got: {cpuinfo}" 86 87 - with subtest("Container memory limits can be managed"): 88 - set_container("limits.memory 64MB") 89 - meminfo = machine.succeed("incus exec container grep -- MemTotal /proc/meminfo").strip() 90 - meminfo_bytes = " ".join(meminfo.split(' ')[-2:]) 91 - assert meminfo_bytes == "62500 kB", f"Wrong amount of memory reported from /proc/meminfo, want: '62500 kB', got: '{meminfo_bytes}'" 92 93 - set_container("limits.memory 128MB") 94 - meminfo = machine.succeed("incus exec container grep -- MemTotal /proc/meminfo").strip() 95 - meminfo_bytes = " ".join(meminfo.split(' ')[-2:]) 96 - assert meminfo_bytes == "125000 kB", f"Wrong amount of memory reported from /proc/meminfo, want: '125000 kB', got: '{meminfo_bytes}'" 97 98 - with subtest("virtual tpm can be configured"): 99 - machine.succeed("incus config device add container vtpm tpm path=/dev/tpm0 pathrm=/dev/tpmrm0") 100 - machine.succeed("incus exec container -- test -e /dev/tpm0") 101 - machine.succeed("incus exec container -- test -e /dev/tpmrm0") 102 - machine.succeed("incus config device remove container vtpm") 103 - machine.fail("incus exec container -- test -e /dev/tpm0") 104 105 - with subtest("lxc-generator"): 106 - with subtest("lxc-container generator configures plain container"): 107 - # reuse the existing container to save some time 108 - machine.succeed("incus exec container test -- -e /run/systemd/system/service.d/zzz-lxc-service.conf") 109 - check_sysctl("container") 110 111 - with subtest("lxc-container generator configures nested container"): 112 - machine.execute("incus delete --force container") 113 - machine.succeed("incus launch nixos container --config security.nesting=true") 114 - with machine.nested("Waiting for instance to start and be usable"): 115 - retry(instance_is_up) 116 117 - machine.fail("incus exec container test -- -e /run/systemd/system/service.d/zzz-lxc-service.conf") 118 - target = machine.succeed("incus exec container readlink -- -f /run/systemd/system/systemd-binfmt.service").strip() 119 - assert target == "/dev/null", "lxc generator did not correctly mask /run/systemd/system/systemd-binfmt.service" 120 121 - check_sysctl("container") 122 123 - with subtest("lxc-container generator configures privileged container"): 124 - machine.execute("incus delete --force container") 125 - machine.succeed("incus launch nixos container --config security.privileged=true") 126 - with machine.nested("Waiting for instance to start and be usable"): 127 - retry(instance_is_up) 128 129 - machine.succeed("incus exec container test -- -e /run/systemd/system/service.d/zzz-lxc-service.conf") 130 131 - check_sysctl("container") 132 133 - with subtest("softDaemonRestart"): 134 - with subtest("Instance remains running when softDaemonRestart is enabled and services is stopped"): 135 - pid = machine.succeed("incus info container | grep 'PID'").split(":")[1].strip() 136 - machine.succeed(f"ps {pid}") 137 - machine.succeed("systemctl stop incus") 138 - machine.succeed(f"ps {pid}") 139 - ''; 140 - })
··· 1 + import ../make-test-python.nix ( 2 + { 3 + pkgs, 4 + lib, 5 + extra ? { }, 6 + name ? "incus-container", 7 + incus ? pkgs.incus-lts, 8 + ... 9 + }: 10 11 + let 12 + releases = import ../../release.nix { 13 + configuration = lib.recursiveUpdate { 14 # Building documentation makes the test unnecessarily take a longer time: 15 documentation.enable = lib.mkForce false; 16 17 boot.kernel.sysctl."net.ipv4.ip_forward" = "1"; 18 + } extra; 19 + }; 20 21 + container-image-metadata = "${ 22 + releases.incusContainerMeta.${pkgs.stdenv.hostPlatform.system} 23 + }/tarball/nixos-image-lxc-*-${pkgs.stdenv.hostPlatform.system}.tar.xz"; 24 + container-image-rootfs = "${ 25 + releases.incusContainerImage.${pkgs.stdenv.hostPlatform.system} 26 + }/nixos-lxc-image-${pkgs.stdenv.hostPlatform.system}.squashfs"; 27 + in 28 + { 29 + inherit name; 30 31 + meta = { 32 + maintainers = lib.teams.lxc.members; 33 + }; 34 35 + nodes.machine = 36 + { ... }: 37 + { 38 + virtualisation = { 39 + # Ensure test VM has enough resources for creating and managing guests 40 + cores = 2; 41 + memorySize = 1024; 42 + diskSize = 4096; 43 44 + incus = { 45 + enable = true; 46 + package = incus; 47 + }; 48 + }; 49 + networking.nftables.enable = true; 50 }; 51 52 + testScript = # python 53 + '' 54 + def instance_is_up(_) -> bool: 55 + status, _ = machine.execute("incus exec container --disable-stdin --force-interactive /run/current-system/sw/bin/systemctl -- is-system-running") 56 + return status == 0 57 58 + def set_container(config): 59 + machine.succeed(f"incus config set container {config}") 60 + machine.succeed("incus restart container") 61 + with machine.nested("Waiting for instance to start and be usable"): 62 + retry(instance_is_up) 63 64 + def check_sysctl(instance): 65 + with subtest("systemd sysctl settings are applied"): 66 + machine.succeed(f"incus exec {instance} -- systemctl status systemd-sysctl") 67 + sysctl = machine.succeed(f"incus exec {instance} -- sysctl net.ipv4.ip_forward").strip().split(" ")[-1] 68 + assert "1" == sysctl, f"systemd-sysctl configuration not correctly applied, {sysctl} != 1" 69 70 + machine.wait_for_unit("incus.service") 71 72 + # no preseed should mean no service 73 + machine.fail("systemctl status incus-preseed.service") 74 75 + machine.succeed("incus admin init --minimal") 76 77 + with subtest("Container image can be imported"): 78 + machine.succeed("incus image import ${container-image-metadata} ${container-image-rootfs} --alias nixos") 79 80 + with subtest("Container can be launched and managed"): 81 + machine.succeed("incus launch nixos container") 82 + with machine.nested("Waiting for instance to start and be usable"): 83 + retry(instance_is_up) 84 + machine.succeed("echo true | incus exec container /run/current-system/sw/bin/bash -") 85 86 + with subtest("Container mounts lxcfs overlays"): 87 + machine.succeed("incus exec container mount | grep 'lxcfs on /proc/cpuinfo type fuse.lxcfs'") 88 + machine.succeed("incus exec container mount | grep 'lxcfs on /proc/meminfo type fuse.lxcfs'") 89 90 + with subtest("resource limits"): 91 + with subtest("Container CPU limits can be managed"): 92 + set_container("limits.cpu 1") 93 + cpuinfo = machine.succeed("incus exec container grep -- -c ^processor /proc/cpuinfo").strip() 94 + assert cpuinfo == "1", f"Wrong number of CPUs reported from /proc/cpuinfo, want: 1, got: {cpuinfo}" 95 96 + set_container("limits.cpu 2") 97 + cpuinfo = machine.succeed("incus exec container grep -- -c ^processor /proc/cpuinfo").strip() 98 + assert cpuinfo == "2", f"Wrong number of CPUs reported from /proc/cpuinfo, want: 2, got: {cpuinfo}" 99 100 + with subtest("Container memory limits can be managed"): 101 + set_container("limits.memory 64MB") 102 + meminfo = machine.succeed("incus exec container grep -- MemTotal /proc/meminfo").strip() 103 + meminfo_bytes = " ".join(meminfo.split(' ')[-2:]) 104 + assert meminfo_bytes == "62500 kB", f"Wrong amount of memory reported from /proc/meminfo, want: '62500 kB', got: '{meminfo_bytes}'" 105 106 + set_container("limits.memory 128MB") 107 + meminfo = machine.succeed("incus exec container grep -- MemTotal /proc/meminfo").strip() 108 + meminfo_bytes = " ".join(meminfo.split(' ')[-2:]) 109 + assert meminfo_bytes == "125000 kB", f"Wrong amount of memory reported from /proc/meminfo, want: '125000 kB', got: '{meminfo_bytes}'" 110 111 + with subtest("virtual tpm can be configured"): 112 + machine.succeed("incus config device add container vtpm tpm path=/dev/tpm0 pathrm=/dev/tpmrm0") 113 + machine.succeed("incus exec container -- test -e /dev/tpm0") 114 + machine.succeed("incus exec container -- test -e /dev/tpmrm0") 115 + machine.succeed("incus config device remove container vtpm") 116 + machine.fail("incus exec container -- test -e /dev/tpm0") 117 118 + with subtest("lxc-generator"): 119 + with subtest("lxc-container generator configures plain container"): 120 + # reuse the existing container to save some time 121 + machine.succeed("incus exec container test -- -e /run/systemd/system/service.d/zzz-lxc-service.conf") 122 + check_sysctl("container") 123 124 + with subtest("lxc-container generator configures nested container"): 125 + machine.execute("incus delete --force container") 126 + machine.succeed("incus launch nixos container --config security.nesting=true") 127 + with machine.nested("Waiting for instance to start and be usable"): 128 + retry(instance_is_up) 129 130 + machine.fail("incus exec container test -- -e /run/systemd/system/service.d/zzz-lxc-service.conf") 131 + target = machine.succeed("incus exec container readlink -- -f /run/systemd/system/systemd-binfmt.service").strip() 132 + assert target == "/dev/null", "lxc generator did not correctly mask /run/systemd/system/systemd-binfmt.service" 133 134 + check_sysctl("container") 135 136 + with subtest("lxc-container generator configures privileged container"): 137 + machine.execute("incus delete --force container") 138 + machine.succeed("incus launch nixos container --config security.privileged=true") 139 + with machine.nested("Waiting for instance to start and be usable"): 140 + retry(instance_is_up) 141 142 + machine.succeed("incus exec container test -- -e /run/systemd/system/service.d/zzz-lxc-service.conf") 143 144 + check_sysctl("container") 145 146 + with subtest("softDaemonRestart"): 147 + with subtest("Instance remains running when softDaemonRestart is enabled and services is stopped"): 148 + pid = machine.succeed("incus info container | grep 'PID'").split(":")[1].strip() 149 + machine.succeed(f"ps {pid}") 150 + machine.succeed("systemctl stop incus") 151 + machine.succeed(f"ps {pid}") 152 + ''; 153 + } 154 + )
+70 -61
nixos/tests/incus/openvswitch.nix
··· 1 - import ../make-test-python.nix ({ pkgs, lib, incus ? pkgs.incus-lts, ... } : 2 3 - { 4 - name = "incus-openvswitch"; 5 6 - meta = { 7 - maintainers = lib.teams.lxc.members; 8 - }; 9 10 - nodes.machine = { lib, ... }: { 11 - virtualisation = { 12 - incus = { 13 - enable = true; 14 - package = incus; 15 - }; 16 17 - vswitch.enable = true; 18 - incus.preseed = { 19 - networks = [ 20 - { 21 - name = "nixostestbr0"; 22 - type = "bridge"; 23 - config = { 24 - "bridge.driver" = "openvswitch"; 25 - "ipv4.address" = "10.0.100.1/24"; 26 - "ipv4.nat" = "true"; 27 - }; 28 - } 29 - ]; 30 - profiles = [ 31 - { 32 - name = "nixostest_default"; 33 - devices = { 34 - eth0 = { 35 - name = "eth0"; 36 - network = "nixostestbr0"; 37 - type = "nic"; 38 - }; 39 - root = { 40 - path = "/"; 41 - pool = "default"; 42 - size = "35GiB"; 43 - type = "disk"; 44 - }; 45 - }; 46 - } 47 - ]; 48 - storage_pools = [ 49 - { 50 - name = "nixostest_pool"; 51 - driver = "dir"; 52 - } 53 - ]; 54 }; 55 - }; 56 - networking.nftables.enable = true; 57 - }; 58 59 - testScript = '' 60 - machine.wait_for_unit("incus.service") 61 - machine.wait_for_unit("incus-preseed.service") 62 63 - with subtest("Verify openvswitch bridge"): 64 - machine.succeed("incus network info nixostestbr0") 65 66 - with subtest("Verify openvswitch bridge"): 67 - machine.succeed("ovs-vsctl br-exists nixostestbr0") 68 - ''; 69 - })
··· 1 + import ../make-test-python.nix ( 2 + { 3 + pkgs, 4 + lib, 5 + incus ? pkgs.incus-lts, 6 + ... 7 + }: 8 9 + { 10 + name = "incus-openvswitch"; 11 12 + meta = { 13 + maintainers = lib.teams.lxc.members; 14 + }; 15 16 + nodes.machine = 17 + { lib, ... }: 18 + { 19 + virtualisation = { 20 + incus = { 21 + enable = true; 22 + package = incus; 23 + }; 24 25 + vswitch.enable = true; 26 + incus.preseed = { 27 + networks = [ 28 + { 29 + name = "nixostestbr0"; 30 + type = "bridge"; 31 + config = { 32 + "bridge.driver" = "openvswitch"; 33 + "ipv4.address" = "10.0.100.1/24"; 34 + "ipv4.nat" = "true"; 35 + }; 36 + } 37 + ]; 38 + profiles = [ 39 + { 40 + name = "nixostest_default"; 41 + devices = { 42 + eth0 = { 43 + name = "eth0"; 44 + network = "nixostestbr0"; 45 + type = "nic"; 46 + }; 47 + root = { 48 + path = "/"; 49 + pool = "default"; 50 + size = "35GiB"; 51 + type = "disk"; 52 + }; 53 + }; 54 + } 55 + ]; 56 + storage_pools = [ 57 + { 58 + name = "nixostest_pool"; 59 + driver = "dir"; 60 + } 61 + ]; 62 + }; 63 + }; 64 + networking.nftables.enable = true; 65 }; 66 67 + testScript = '' 68 + machine.wait_for_unit("incus.service") 69 + machine.wait_for_unit("incus-preseed.service") 70 71 + with subtest("Verify openvswitch bridge"): 72 + machine.succeed("incus network info nixostestbr0") 73 74 + with subtest("Verify openvswitch bridge"): 75 + machine.succeed("ovs-vsctl br-exists nixostestbr0") 76 + ''; 77 + } 78 + )
+34 -25
nixos/tests/incus/socket-activated.nix
··· 1 - import ../make-test-python.nix ({ pkgs, lib, incus ? pkgs.incus-lts, ... } : 2 3 - { 4 - name = "incus-socket-activated"; 5 6 - meta = { 7 - maintainers = lib.teams.lxc.members; 8 - }; 9 10 - nodes.machine = { lib, ... }: { 11 - virtualisation = { 12 - incus = { 13 - enable = true; 14 - package = incus; 15 - socketActivation = true; 16 }; 17 - }; 18 - networking.nftables.enable = true; 19 - }; 20 21 - testScript = '' 22 - machine.wait_for_unit("incus.socket") 23 24 - # ensure service is not running by default 25 - machine.fail("systemctl is-active incus.service") 26 - machine.fail("systemctl is-active incus-preseed.service") 27 28 - # access the socket and ensure the service starts 29 - machine.succeed("incus list") 30 - machine.wait_for_unit("incus.service") 31 - ''; 32 - })
··· 1 + import ../make-test-python.nix ( 2 + { 3 + pkgs, 4 + lib, 5 + incus ? pkgs.incus-lts, 6 + ... 7 + }: 8 9 + { 10 + name = "incus-socket-activated"; 11 12 + meta = { 13 + maintainers = lib.teams.lxc.members; 14 + }; 15 16 + nodes.machine = 17 + { lib, ... }: 18 + { 19 + virtualisation = { 20 + incus = { 21 + enable = true; 22 + package = incus; 23 + socketActivation = true; 24 + }; 25 + }; 26 + networking.nftables.enable = true; 27 }; 28 29 + testScript = '' 30 + machine.wait_for_unit("incus.socket") 31 32 + # ensure service is not running by default 33 + machine.fail("systemctl is-active incus.service") 34 + machine.fail("systemctl is-active incus-preseed.service") 35 36 + # access the socket and ensure the service starts 37 + machine.succeed("incus list") 38 + machine.wait_for_unit("incus.service") 39 + ''; 40 + } 41 + )
+70 -53
nixos/tests/incus/ui.nix
··· 1 - import ../make-test-python.nix ({ pkgs, lib, incus ? pkgs.incus-lts, ... }: { 2 - name = "incus-ui"; 3 4 - meta = { 5 - maintainers = lib.teams.lxc.members; 6 - }; 7 - 8 - nodes.machine = { lib, ... }: { 9 - virtualisation = { 10 - incus = { 11 - enable = true; 12 - package = incus; 13 - }; 14 - incus.ui.enable = true; 15 }; 16 - networking.nftables.enable = true; 17 18 - environment.systemPackages = 19 - let 20 - seleniumScript = pkgs.writers.writePython3Bin "selenium-script" 21 - { 22 - libraries = with pkgs.python3Packages; [ selenium ]; 23 - } '' 24 - from selenium import webdriver 25 - from selenium.webdriver.common.by import By 26 - from selenium.webdriver.firefox.options import Options 27 - from selenium.webdriver.support.ui import WebDriverWait 28 29 - options = Options() 30 - options.add_argument("--headless") 31 - service = webdriver.FirefoxService(executable_path="${lib.getExe pkgs.geckodriver}") # noqa: E501 32 33 - driver = webdriver.Firefox(options=options, service=service) 34 - driver.implicitly_wait(10) 35 - driver.get("https://localhost:8443/ui") 36 37 - wait = WebDriverWait(driver, 60) 38 39 - assert len(driver.find_elements(By.CLASS_NAME, "l-application")) > 0 40 - assert len(driver.find_elements(By.CLASS_NAME, "l-navigation__drawer")) > 0 41 42 - driver.close() 43 - ''; 44 - in 45 - with pkgs; [ curl firefox-unwrapped geckodriver seleniumScript ]; 46 - }; 47 48 49 - testScript = '' 50 - machine.wait_for_unit("sockets.target") 51 - machine.wait_for_unit("incus.service") 52 - machine.wait_for_file("/var/lib/incus/unix.socket") 53 54 - # Configure incus listen address 55 - machine.succeed("incus config set core.https_address :8443") 56 - machine.succeed("systemctl restart incus") 57 58 - # Check that the INCUS_UI environment variable is populated in the systemd unit 59 - machine.succeed("cat /etc/systemd/system/incus.service | grep 'INCUS_UI'") 60 61 - # Ensure the endpoint returns an HTML page with 'Incus UI' in the title 62 - machine.succeed("curl -kLs https://localhost:8443/ui | grep '<title>Incus UI</title>'") 63 64 - # Ensure the application is actually rendered by the Javascript 65 - machine.succeed("PYTHONUNBUFFERED=1 selenium-script") 66 - ''; 67 - })
··· 1 + import ../make-test-python.nix ( 2 + { 3 + pkgs, 4 + lib, 5 + incus ? pkgs.incus-lts, 6 + ... 7 + }: 8 + { 9 + name = "incus-ui"; 10 11 + meta = { 12 + maintainers = lib.teams.lxc.members; 13 }; 14 15 + nodes.machine = 16 + { lib, ... }: 17 + { 18 + virtualisation = { 19 + incus = { 20 + enable = true; 21 + package = incus; 22 + }; 23 + incus.ui.enable = true; 24 + }; 25 + networking.nftables.enable = true; 26 27 + environment.systemPackages = 28 + let 29 + seleniumScript = 30 + pkgs.writers.writePython3Bin "selenium-script" 31 + { 32 + libraries = with pkgs.python3Packages; [ selenium ]; 33 + } 34 + '' 35 + from selenium import webdriver 36 + from selenium.webdriver.common.by import By 37 + from selenium.webdriver.firefox.options import Options 38 + from selenium.webdriver.support.ui import WebDriverWait 39 40 + options = Options() 41 + options.add_argument("--headless") 42 + service = webdriver.FirefoxService(executable_path="${lib.getExe pkgs.geckodriver}") # noqa: E501 43 44 + driver = webdriver.Firefox(options=options, service=service) 45 + driver.implicitly_wait(10) 46 + driver.get("https://localhost:8443/ui") 47 48 + wait = WebDriverWait(driver, 60) 49 50 + assert len(driver.find_elements(By.CLASS_NAME, "l-application")) > 0 51 + assert len(driver.find_elements(By.CLASS_NAME, "l-navigation__drawer")) > 0 52 53 + driver.close() 54 + ''; 55 + in 56 + with pkgs; 57 + [ 58 + curl 59 + firefox-unwrapped 60 + geckodriver 61 + seleniumScript 62 + ]; 63 + }; 64 65 + testScript = '' 66 + machine.wait_for_unit("sockets.target") 67 + machine.wait_for_unit("incus.service") 68 + machine.wait_for_file("/var/lib/incus/unix.socket") 69 70 + # Configure incus listen address 71 + machine.succeed("incus config set core.https_address :8443") 72 + machine.succeed("systemctl restart incus") 73 74 + # Check that the INCUS_UI environment variable is populated in the systemd unit 75 + machine.succeed("cat /etc/systemd/system/incus.service | grep 'INCUS_UI'") 76 77 + # Ensure the endpoint returns an HTML page with 'Incus UI' in the title 78 + machine.succeed("curl -kLs https://localhost:8443/ui | grep '<title>Incus UI</title>'") 79 80 + # Ensure the application is actually rendered by the Javascript 81 + machine.succeed("PYTHONUNBUFFERED=1 selenium-script") 82 + ''; 83 + } 84 + )
+74 -65
nixos/tests/incus/virtual-machine.nix
··· 1 - import ../make-test-python.nix ({ pkgs, lib, incus ? pkgs.incus-lts, ... }: 2 3 - let 4 - releases = import ../../release.nix { 5 - configuration = { 6 - # Building documentation makes the test unnecessarily take a longer time: 7 - documentation.enable = lib.mkForce false; 8 9 - # Our tests require `grep` & friends: 10 - environment.systemPackages = with pkgs; [busybox]; 11 }; 12 - }; 13 14 - vm-image-metadata = releases.incusVirtualMachineImageMeta.${pkgs.stdenv.hostPlatform.system}; 15 - vm-image-disk = releases.incusVirtualMachineImage.${pkgs.stdenv.hostPlatform.system}; 16 17 - instance-name = "instance1"; 18 - in 19 - { 20 - name = "incus-virtual-machine"; 21 22 - meta = { 23 - maintainers = lib.teams.lxc.members; 24 - }; 25 26 - nodes.machine = {...}: { 27 - virtualisation = { 28 - # Ensure test VM has enough resources for creating and managing guests 29 - cores = 2; 30 - memorySize = 1024; 31 - diskSize = 4096; 32 33 - incus = { 34 - enable = true; 35 - package = incus; 36 }; 37 - }; 38 - networking.nftables.enable = true; 39 - }; 40 41 - testScript = # python 42 - '' 43 - def instance_is_up(_) -> bool: 44 - status, _ = machine.execute("incus exec ${instance-name} --disable-stdin --force-interactive /run/current-system/sw/bin/systemctl -- is-system-running") 45 - return status == 0 46 47 - machine.wait_for_unit("incus.service") 48 49 - machine.succeed("incus admin init --minimal") 50 51 - with subtest("virtual-machine image can be imported"): 52 - machine.succeed("incus image import ${vm-image-metadata}/*/*.tar.xz ${vm-image-disk}/nixos.qcow2 --alias nixos") 53 54 - with subtest("virtual-machine can be created"): 55 - machine.succeed("incus create nixos ${instance-name} --vm --config limits.memory=512MB --config security.secureboot=false") 56 57 - with subtest("virtual tpm can be configured"): 58 - machine.succeed("incus config device add ${instance-name} vtpm tpm path=/dev/tpm0") 59 60 - with subtest("virtual-machine can be launched and become available"): 61 - machine.succeed("incus start ${instance-name}") 62 - with machine.nested("Waiting for instance to start and be usable"): 63 - retry(instance_is_up) 64 65 - with subtest("incus-agent is started"): 66 - machine.succeed("incus exec ${instance-name} systemctl is-active incus-agent") 67 68 - with subtest("incus-agent has a valid path"): 69 - machine.succeed("incus exec ${instance-name} -- bash -c 'true'") 70 71 - with subtest("guest supports cpu hotplug"): 72 - machine.succeed("incus config set ${instance-name} limits.cpu=1") 73 - count = int(machine.succeed("incus exec ${instance-name} -- nproc").strip()) 74 - assert count == 1, f"Wrong number of CPUs reported, want: 1, got: {count}" 75 76 - machine.succeed("incus config set ${instance-name} limits.cpu=2") 77 - count = int(machine.succeed("incus exec ${instance-name} -- nproc").strip()) 78 - assert count == 2, f"Wrong number of CPUs reported, want: 2, got: {count}" 79 80 - with subtest("Instance remains running when softDaemonRestart is enabled and services is stopped"): 81 - pid = machine.succeed("incus info ${instance-name} | grep 'PID'").split(":")[1].strip() 82 - machine.succeed(f"ps {pid}") 83 - machine.succeed("systemctl stop incus") 84 - machine.succeed(f"ps {pid}") 85 - ''; 86 - })
··· 1 + import ../make-test-python.nix ( 2 + { 3 + pkgs, 4 + lib, 5 + incus ? pkgs.incus-lts, 6 + ... 7 + }: 8 9 + let 10 + releases = import ../../release.nix { 11 + configuration = { 12 + # Building documentation makes the test unnecessarily take a longer time: 13 + documentation.enable = lib.mkForce false; 14 15 + # Our tests require `grep` & friends: 16 + environment.systemPackages = with pkgs; [ busybox ]; 17 + }; 18 }; 19 20 + vm-image-metadata = releases.incusVirtualMachineImageMeta.${pkgs.stdenv.hostPlatform.system}; 21 + vm-image-disk = releases.incusVirtualMachineImage.${pkgs.stdenv.hostPlatform.system}; 22 23 + instance-name = "instance1"; 24 + in 25 + { 26 + name = "incus-virtual-machine"; 27 28 + meta = { 29 + maintainers = lib.teams.lxc.members; 30 + }; 31 32 + nodes.machine = 33 + { ... }: 34 + { 35 + virtualisation = { 36 + # Ensure test VM has enough resources for creating and managing guests 37 + cores = 2; 38 + memorySize = 1024; 39 + diskSize = 4096; 40 41 + incus = { 42 + enable = true; 43 + package = incus; 44 + }; 45 + }; 46 + networking.nftables.enable = true; 47 }; 48 49 + testScript = # python 50 + '' 51 + def instance_is_up(_) -> bool: 52 + status, _ = machine.execute("incus exec ${instance-name} --disable-stdin --force-interactive /run/current-system/sw/bin/systemctl -- is-system-running") 53 + return status == 0 54 55 + machine.wait_for_unit("incus.service") 56 57 + machine.succeed("incus admin init --minimal") 58 59 + with subtest("virtual-machine image can be imported"): 60 + machine.succeed("incus image import ${vm-image-metadata}/*/*.tar.xz ${vm-image-disk}/nixos.qcow2 --alias nixos") 61 62 + with subtest("virtual-machine can be created"): 63 + machine.succeed("incus create nixos ${instance-name} --vm --config limits.memory=512MB --config security.secureboot=false") 64 65 + with subtest("virtual tpm can be configured"): 66 + machine.succeed("incus config device add ${instance-name} vtpm tpm path=/dev/tpm0") 67 68 + with subtest("virtual-machine can be launched and become available"): 69 + machine.succeed("incus start ${instance-name}") 70 + with machine.nested("Waiting for instance to start and be usable"): 71 + retry(instance_is_up) 72 73 + with subtest("incus-agent is started"): 74 + machine.succeed("incus exec ${instance-name} systemctl is-active incus-agent") 75 76 + with subtest("incus-agent has a valid path"): 77 + machine.succeed("incus exec ${instance-name} -- bash -c 'true'") 78 79 + with subtest("guest supports cpu hotplug"): 80 + machine.succeed("incus config set ${instance-name} limits.cpu=1") 81 + count = int(machine.succeed("incus exec ${instance-name} -- nproc").strip()) 82 + assert count == 1, f"Wrong number of CPUs reported, want: 1, got: {count}" 83 84 + machine.succeed("incus config set ${instance-name} limits.cpu=2") 85 + count = int(machine.succeed("incus exec ${instance-name} -- nproc").strip()) 86 + assert count == 2, f"Wrong number of CPUs reported, want: 2, got: {count}" 87 88 + with subtest("Instance remains running when softDaemonRestart is enabled and services is stopped"): 89 + pid = machine.succeed("incus info ${instance-name} | grep 'PID'").split(":")[1].strip() 90 + machine.succeed(f"ps {pid}") 91 + machine.succeed("systemctl stop incus") 92 + machine.succeed(f"ps {pid}") 93 + ''; 94 + } 95 + )
+2
nixos/tests/networking/networkd-and-scripted.nix
··· 462 }; 463 bridges.bridge.interfaces = [ "greTunnel" "eth1" ]; 464 interfaces.eth1.ipv4.addresses = lib.mkOverride 0 []; 465 interfaces.bridge.ipv4.addresses = lib.mkOverride 0 [ 466 { address = "192.168.1.1"; prefixLength = 24; } 467 ]; ··· 498 }; 499 bridges.bridge.interfaces = [ "greTunnel" "eth2" ]; 500 interfaces.eth2.ipv4.addresses = lib.mkOverride 0 []; 501 interfaces.bridge.ipv4.addresses = lib.mkOverride 0 [ 502 { address = "192.168.1.2"; prefixLength = 24; } 503 ];
··· 462 }; 463 bridges.bridge.interfaces = [ "greTunnel" "eth1" ]; 464 interfaces.eth1.ipv4.addresses = lib.mkOverride 0 []; 465 + interfaces.eth1.ipv6.addresses = lib.mkOverride 0 []; 466 interfaces.bridge.ipv4.addresses = lib.mkOverride 0 [ 467 { address = "192.168.1.1"; prefixLength = 24; } 468 ]; ··· 499 }; 500 bridges.bridge.interfaces = [ "greTunnel" "eth2" ]; 501 interfaces.eth2.ipv4.addresses = lib.mkOverride 0 []; 502 + interfaces.eth2.ipv6.addresses = lib.mkOverride 0 []; 503 interfaces.bridge.ipv4.addresses = lib.mkOverride 0 [ 504 { address = "192.168.1.2"; prefixLength = 24; } 505 ];
+4 -3
nixos/tests/vscodium.nix
··· 3 wayland = { pkgs, ... }: { 4 imports = [ ./common/wayland-cage.nix ]; 5 6 - services.cage.program = "${pkgs.vscodium}/bin/codium"; 7 8 environment.variables.NIXOS_OZONE_WL = "1"; 9 environment.variables.DISPLAY = "do not use"; ··· 16 virtualisation.memorySize = 2047; 17 services.xserver.enable = true; 18 services.xserver.displayManager.sessionCommands = '' 19 - ${pkgs.vscodium}/bin/codium 20 ''; 21 test-support.displayManager.auto.user = "alice"; 22 }; ··· 46 codium_running.wait() # type: ignore[union-attr] 47 with codium_running: # type: ignore[union-attr] 48 # Wait until vscodium is visible. "File" is in the menu bar. 49 - machine.wait_for_text('Welcome') 50 machine.screenshot('start_screen') 51 52 test_string = 'testfile'
··· 3 wayland = { pkgs, ... }: { 4 imports = [ ./common/wayland-cage.nix ]; 5 6 + # We scale vscodium to help OCR find the small "Untitled" text. 7 + services.cage.program = "${pkgs.vscodium}/bin/codium --force-device-scale-factor=2"; 8 9 environment.variables.NIXOS_OZONE_WL = "1"; 10 environment.variables.DISPLAY = "do not use"; ··· 17 virtualisation.memorySize = 2047; 18 services.xserver.enable = true; 19 services.xserver.displayManager.sessionCommands = '' 20 + ${pkgs.vscodium}/bin/codium --force-device-scale-factor=2 21 ''; 22 test-support.displayManager.auto.user = "alice"; 23 }; ··· 47 codium_running.wait() # type: ignore[union-attr] 48 with codium_running: # type: ignore[union-attr] 49 # Wait until vscodium is visible. "File" is in the menu bar. 50 + machine.wait_for_text('Get Started with') 51 machine.screenshot('start_screen') 52 53 test_string = 'testfile'
+36
pkgs/applications/editors/vim/plugins/generated.nix
··· 2898 meta.homepage = "https://github.com/chrisbra/csv.vim/"; 2899 }; 2900 2901 ctrlp-cmatcher = buildVimPlugin { 2902 pname = "ctrlp-cmatcher"; 2903 version = "2015-10-15"; ··· 3570 sha256 = "1p6cn0m47l367i0qv94rgcx66y0p7sf7nnzk80qdasvyqij5rjg1"; 3571 }; 3572 meta.homepage = "https://github.com/NTBBloodbath/doom-one.nvim/"; 3573 }; 3574 3575 dracula-nvim = buildVimPlugin { ··· 8764 sha256 = "0ik9jnd561ipdclmxpbc0b1b4qykhkaqmmc2wr9iw4gmszjskhf1"; 8765 }; 8766 meta.homepage = "https://github.com/leoluz/nvim-dap-go/"; 8767 }; 8768 8769 nvim-dap-python = buildVimPlugin {
··· 2898 meta.homepage = "https://github.com/chrisbra/csv.vim/"; 2899 }; 2900 2901 + csvview-nvim = buildVimPlugin { 2902 + pname = "csvview.nvim"; 2903 + version = "2024-11-18"; 2904 + src = fetchFromGitHub { 2905 + owner = "hat0uma"; 2906 + repo = "csvview.nvim"; 2907 + rev = "63b6585fc22bba2060e6dd4600bd2dd0b77dd446"; 2908 + sha256 = "0615vjdiwij5j6qxa5hfvylq9swp0z6lm5xc38yk6yxhjrkcdvyg"; 2909 + }; 2910 + meta.homepage = "https://github.com/hat0uma/csvview.nvim/"; 2911 + }; 2912 + 2913 ctrlp-cmatcher = buildVimPlugin { 2914 pname = "ctrlp-cmatcher"; 2915 version = "2015-10-15"; ··· 3582 sha256 = "1p6cn0m47l367i0qv94rgcx66y0p7sf7nnzk80qdasvyqij5rjg1"; 3583 }; 3584 meta.homepage = "https://github.com/NTBBloodbath/doom-one.nvim/"; 3585 + }; 3586 + 3587 + dotnet-nvim = buildVimPlugin { 3588 + pname = "dotnet.nvim"; 3589 + version = "2024-10-21"; 3590 + src = fetchFromGitHub { 3591 + owner = "MoaidHathot"; 3592 + repo = "dotnet.nvim"; 3593 + rev = "f5c52f9f52a3d8ca8dff6916c2228fb41a075274"; 3594 + sha256 = "1ysqh2aj3iy2q0cl7i642c03jb7cakqhgbqslcfd7dfvibidd2a2"; 3595 + }; 3596 + meta.homepage = "https://github.com/MoaidHathot/dotnet.nvim/"; 3597 }; 3598 3599 dracula-nvim = buildVimPlugin { ··· 8788 sha256 = "0ik9jnd561ipdclmxpbc0b1b4qykhkaqmmc2wr9iw4gmszjskhf1"; 8789 }; 8790 meta.homepage = "https://github.com/leoluz/nvim-dap-go/"; 8791 + }; 8792 + 8793 + nvim-dap-lldb = buildVimPlugin { 8794 + pname = "nvim-dap-lldb"; 8795 + version = "2024-06-09"; 8796 + src = fetchFromGitHub { 8797 + owner = "julianolf"; 8798 + repo = "nvim-dap-lldb"; 8799 + rev = "81273514fdb5107b79090364b57a3ff5570bea21"; 8800 + sha256 = "18ds6kkrip0m2zanmzfqcr31qnw1whara1mvsnmx30z6iwgdp92w"; 8801 + }; 8802 + meta.homepage = "https://github.com/julianolf/nvim-dap-lldb/"; 8803 }; 8804 8805 nvim-dap-python = buildVimPlugin {
+11
pkgs/applications/editors/vim/plugins/overrides.nix
··· 884 ''; 885 }); 886 887 efmls-configs-nvim = super.efmls-configs-nvim.overrideAttrs { 888 dependencies = [ self.nvim-lspconfig ]; 889 }; ··· 1851 1852 nvim-fzf-commands = super.nvim-fzf-commands.overrideAttrs { 1853 dependencies = [ self.nvim-fzf ]; 1854 }; 1855 1856 nvim-dap-python = super.nvim-dap-python.overrideAttrs {
··· 884 ''; 885 }); 886 887 + dotnet-nvim = super.dotnet-nvim.overrideAttrs { 888 + dependencies = with self; [ 889 + telescope-nvim 890 + plenary-nvim 891 + ]; 892 + }; 893 + 894 efmls-configs-nvim = super.efmls-configs-nvim.overrideAttrs { 895 dependencies = [ self.nvim-lspconfig ]; 896 }; ··· 1858 1859 nvim-fzf-commands = super.nvim-fzf-commands.overrideAttrs { 1860 dependencies = [ self.nvim-fzf ]; 1861 + }; 1862 + 1863 + nvim-dap-lldb = super.nvim-dap-lldb.overrideAttrs { 1864 + dependencies = [ self.nvim-dap ]; 1865 }; 1866 1867 nvim-dap-python = super.nvim-dap-python.overrideAttrs {
+3
pkgs/applications/editors/vim/plugins/vim-plugin-names
··· 240 https://github.com/godlygeek/csapprox/,, 241 https://github.com/Decodetalkers/csharpls-extended-lsp.nvim/,HEAD, 242 https://github.com/chrisbra/csv.vim/,, 243 https://github.com/JazzCore/ctrlp-cmatcher/,, 244 https://github.com/FelikZ/ctrlp-py-matcher/,, 245 https://github.com/amiorin/ctrlp-z/,, ··· 296 https://github.com/chipsenkbeil/distant.nvim/,HEAD, 297 https://github.com/doki-theme/doki-theme-vim/,, 298 https://github.com/NTBBloodbath/doom-one.nvim/,, 299 https://github.com/dracula/vim/,,dracula-vim 300 https://github.com/Mofiqul/dracula.nvim/,HEAD, 301 https://github.com/stevearc/dressing.nvim/,, ··· 728 https://github.com/yamatsum/nvim-cursorline/,, 729 https://github.com/mfussenegger/nvim-dap/,, 730 https://github.com/leoluz/nvim-dap-go/,HEAD, 731 https://github.com/mfussenegger/nvim-dap-python/,HEAD, 732 https://github.com/rinx/nvim-dap-rego/,HEAD, 733 https://github.com/jonboh/nvim-dap-rr/,HEAD,
··· 240 https://github.com/godlygeek/csapprox/,, 241 https://github.com/Decodetalkers/csharpls-extended-lsp.nvim/,HEAD, 242 https://github.com/chrisbra/csv.vim/,, 243 + https://github.com/hat0uma/csvview.nvim/,HEAD, 244 https://github.com/JazzCore/ctrlp-cmatcher/,, 245 https://github.com/FelikZ/ctrlp-py-matcher/,, 246 https://github.com/amiorin/ctrlp-z/,, ··· 297 https://github.com/chipsenkbeil/distant.nvim/,HEAD, 298 https://github.com/doki-theme/doki-theme-vim/,, 299 https://github.com/NTBBloodbath/doom-one.nvim/,, 300 + https://github.com/MoaidHathot/dotnet.nvim/,HEAD, 301 https://github.com/dracula/vim/,,dracula-vim 302 https://github.com/Mofiqul/dracula.nvim/,HEAD, 303 https://github.com/stevearc/dressing.nvim/,, ··· 730 https://github.com/yamatsum/nvim-cursorline/,, 731 https://github.com/mfussenegger/nvim-dap/,, 732 https://github.com/leoluz/nvim-dap-go/,HEAD, 733 + https://github.com/julianolf/nvim-dap-lldb/,HEAD, 734 https://github.com/mfussenegger/nvim-dap-python/,HEAD, 735 https://github.com/rinx/nvim-dap-rego/,HEAD, 736 https://github.com/jonboh/nvim-dap-rr/,HEAD,
+67 -41
pkgs/applications/networking/mullvad-vpn/default.nix pkgs/by-name/mu/mullvad-vpn/package.nix
··· 1 - { stdenv 2 - , lib 3 - , fetchurl 4 - , dpkg 5 - , alsa-lib 6 - , atk 7 - , cairo 8 - , cups 9 - , dbus 10 - , expat 11 - , fontconfig 12 - , freetype 13 - , gdk-pixbuf 14 - , glib 15 - , pango 16 - , nspr 17 - , nss 18 - , gtk3 19 - , mesa 20 - , libGL 21 - , wayland 22 - , xorg 23 - , autoPatchelfHook 24 - , systemd 25 - , libnotify 26 - , libappindicator 27 - , makeWrapper 28 - , coreutils 29 - , gnugrep 30 }: 31 32 let ··· 64 systemd 65 ]; 66 67 - version = "2024.6"; 68 69 - selectSystem = attrs: attrs.${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 70 71 platform = selectSystem { 72 x86_64-linux = "amd64"; ··· 74 }; 75 76 hash = selectSystem { 77 - x86_64-linux = "sha256-paP9W23AbA9O4MiTdF5r7N50GgT4xu2vb9ktfBdPqDM="; 78 - aarch64-linux = "sha256-5FRPjiLyWDe7RNlhkiF4NUaCxVkfXZbxeoQxNAAls/I="; 79 }; 80 in 81 ··· 99 dontBuild = true; 100 dontConfigure = true; 101 102 - runtimeDependencies = [ (lib.getLib systemd) libGL libnotify libappindicator wayland ]; 103 104 installPhase = '' 105 runHook preInstall ··· 115 116 wrapProgram $out/bin/mullvad-vpn \ 117 --set MULLVAD_DISABLE_UPDATE_NOTIFICATION 1 \ 118 - --prefix PATH : ${lib.makeBinPath [ coreutils gnugrep ]} 119 120 wrapProgram $out/bin/mullvad-daemon \ 121 --set-default MULLVAD_RESOURCE_DIR "$out/share/mullvad/resources" ··· 128 runHook postInstall 129 ''; 130 131 passthru.updateScript = ./update.sh; 132 133 - meta = with lib; { 134 homepage = "https://github.com/mullvad/mullvadvpn-app"; 135 description = "Client for Mullvad VPN"; 136 changelog = "https://github.com/mullvad/mullvadvpn-app/blob/${version}/CHANGELOG.md"; 137 - sourceProvenance = with sourceTypes; [ binaryNativeCode ]; 138 - license = licenses.gpl3Only; 139 - platforms = [ "x86_64-linux" "aarch64-linux" ]; 140 - maintainers = with maintainers; [ Br1ght0ne ymarkus ataraxiasjel ]; 141 }; 142 - 143 }
··· 1 + { 2 + stdenv, 3 + lib, 4 + fetchurl, 5 + dpkg, 6 + alsa-lib, 7 + atk, 8 + cairo, 9 + cups, 10 + dbus, 11 + expat, 12 + fontconfig, 13 + freetype, 14 + gdk-pixbuf, 15 + glib, 16 + pango, 17 + nspr, 18 + nss, 19 + gtk3, 20 + mesa, 21 + libGL, 22 + wayland, 23 + xorg, 24 + autoPatchelfHook, 25 + systemd, 26 + libnotify, 27 + libappindicator, 28 + makeWrapper, 29 + coreutils, 30 + gnugrep, 31 + 32 + versionCheckHook, 33 }: 34 35 let ··· 67 systemd 68 ]; 69 70 + version = "2024.7"; 71 72 + selectSystem = 73 + attrs: 74 + attrs.${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 75 76 platform = selectSystem { 77 x86_64-linux = "amd64"; ··· 79 }; 80 81 hash = selectSystem { 82 + x86_64-linux = "sha256-l6uWrOzMzn8bF5iZzfa/xffLIvAPsCaLwzcRPRW3t0o="; 83 + aarch64-linux = "sha256-/RLTjhkiH9WdYO56njnxQyJ0nSaAq/awrkm0NhctFZY="; 84 }; 85 in 86 ··· 104 dontBuild = true; 105 dontConfigure = true; 106 107 + runtimeDependencies = [ 108 + (lib.getLib systemd) 109 + libGL 110 + libnotify 111 + libappindicator 112 + wayland 113 + ]; 114 115 installPhase = '' 116 runHook preInstall ··· 126 127 wrapProgram $out/bin/mullvad-vpn \ 128 --set MULLVAD_DISABLE_UPDATE_NOTIFICATION 1 \ 129 + --prefix PATH : ${ 130 + lib.makeBinPath [ 131 + coreutils 132 + gnugrep 133 + ] 134 + } 135 136 wrapProgram $out/bin/mullvad-daemon \ 137 --set-default MULLVAD_RESOURCE_DIR "$out/share/mullvad/resources" ··· 144 runHook postInstall 145 ''; 146 147 + nativeInstallCheckInputs = [ 148 + versionCheckHook 149 + ]; 150 + versionCheckProgramArg = [ "--version" ]; 151 + doInstallCheck = true; 152 + 153 passthru.updateScript = ./update.sh; 154 155 + meta = { 156 homepage = "https://github.com/mullvad/mullvadvpn-app"; 157 description = "Client for Mullvad VPN"; 158 changelog = "https://github.com/mullvad/mullvadvpn-app/blob/${version}/CHANGELOG.md"; 159 + sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ]; 160 + license = lib.licenses.gpl3Only; 161 + platforms = lib.platforms.unix; 162 + badPlatforms = [ lib.systems.inspect.patterns.isDarwin ]; 163 + maintainers = with lib.maintainers; [ 164 + Br1ght0ne 165 + ymarkus 166 + ataraxiasjel 167 + ]; 168 }; 169 }
pkgs/applications/networking/mullvad-vpn/update.sh pkgs/by-name/mu/mullvad-vpn/update.sh
+2 -2
pkgs/applications/radio/gqrx/default.nix
··· 27 28 gnuradioMinimal.pkgs.mkDerivation rec { 29 pname = "gqrx"; 30 - version = "2.17.5"; 31 32 src = fetchFromGitHub { 33 owner = "gqrx-sdr"; 34 repo = "gqrx"; 35 rev = "v${version}"; 36 - hash = "sha256-9VePsl/vaSTZ1TMyIeaGoZNrZv+O/7BxQ3ubD5S2EjY="; 37 }; 38 39 nativeBuildInputs = [
··· 27 28 gnuradioMinimal.pkgs.mkDerivation rec { 29 pname = "gqrx"; 30 + version = "2.17.6"; 31 32 src = fetchFromGitHub { 33 owner = "gqrx-sdr"; 34 repo = "gqrx"; 35 rev = "v${version}"; 36 + hash = "sha256-/ykKcwOotu8kn+EpJI+EUeqSkHZ2IrSh+o7lBGeHrZ0="; 37 }; 38 39 nativeBuildInputs = [
+3 -3
pkgs/applications/video/mpv/scripts/mpv-image-viewer.nix
··· 10 let 11 self = { 12 inherit pname; 13 - version = "0-unstable-2023-03-03"; 14 src = fetchFromGitHub { 15 owner = "occivink"; 16 repo = "mpv-image-viewer"; 17 - rev = "efc82147cba4809f22e9afae6ed7a41ad9794ffd"; 18 - hash = "sha256-H7uBwrIb5uNEr3m+rHED/hO2CHypGu7hbcRpC30am2Q="; 19 }; 20 21 sourceRoot = "source/scripts";
··· 10 let 11 self = { 12 inherit pname; 13 + version = "0-unstable-2024-11-23"; 14 src = fetchFromGitHub { 15 owner = "occivink"; 16 repo = "mpv-image-viewer"; 17 + rev = "128b498e3e57a14deea5ca9bbf662f8c1ca79e8d"; 18 + hash = "sha256-VwIL1529CW9MLK4N9jHHddSSZD5RsJ5bWGWqGJ751C0="; 19 }; 20 21 sourceRoot = "source/scripts";
+1 -1
pkgs/build-support/build-fhsenv-bubblewrap/buildFHSEnv.nix
··· 174 175 allPaths = paths ++ paths32; 176 177 - rootfs-builder = pkgs.rustPlatform.buildRustPackage { 178 name = "fhs-rootfs-bulder"; 179 src = ./rootfs-builder; 180 cargoLock.lockFile = ./rootfs-builder/Cargo.lock;
··· 174 175 allPaths = paths ++ paths32; 176 177 + rootfs-builder = pkgs.buildPackages.rustPlatform.buildRustPackage { 178 name = "fhs-rootfs-bulder"; 179 src = ./rootfs-builder; 180 cargoLock.lockFile = ./rootfs-builder/Cargo.lock;
+19 -23
pkgs/build-support/vm/default.nix
··· 88 set -- $(IFS==; echo $o) 89 command=$2 90 ;; 91 - out=*) 92 - set -- $(IFS==; echo $o) 93 - export out=$2 94 - ;; 95 esac 96 done 97 ··· 129 mkdir -p /fs${storeDir} 130 mount -t 9p store /fs${storeDir} -o trans=virtio,version=9p2000.L,cache=loose,msize=131072 131 132 - echo "mounting host's build directory..." 133 - mkdir -p /fs/build 134 - mount -t 9p sa /fs/build -o trans=virtio,version=9p2000.L,cache=loose,msize=131072 135 - 136 mkdir -p /fs/tmp /fs/run /fs/var 137 mount -t tmpfs -o "mode=1777" none /fs/tmp 138 mount -t tmpfs -o "mode=755" none /fs/run 139 ln -sfn /run /fs/var/run 140 141 mkdir -p /fs/proc 142 mount -t proc none /fs/proc 143 ··· 153 fi 154 155 echo "starting stage 2 ($command)" 156 - exec switch_root /fs $command $out 157 ''; 158 159 ··· 169 stage2Init = writeScript "vm-run-stage2" '' 170 #! ${bash}/bin/sh 171 set -euo pipefail 172 - source /build/xchg/saved-env 173 - if [ -f "''${NIX_ATTRS_SH_FILE-}" ]; then 174 - source "$NIX_ATTRS_SH_FILE" 175 fi 176 - source $stdenv/setup 177 178 export NIX_STORE=${storeDir} 179 export NIX_BUILD_TOP=/tmp 180 export TMPDIR=/tmp 181 export PATH=/empty 182 cd "$NIX_BUILD_TOP" 183 184 if ! test -e /bin/sh; then 185 ${coreutils}/bin/mkdir -p /bin ··· 205 declare -a argsArray=() 206 concatTo argsArray origArgs 207 "$origBuilder" "''${argsArray[@]}" 208 - echo $? > /build/xchg/in-vm-exit 209 210 ${busybox}/bin/mount -o remount,ro dummy / 211 ··· 224 -nographic -no-reboot \ 225 -device virtio-rng-pci \ 226 -virtfs local,path=${storeDir},security_model=none,mount_tag=store \ 227 - -virtfs local,path=/build,security_model=none,mount_tag=sa \ 228 - -virtfs local,path=$TMPDIR/xchg,security_model=none,mount_tag=xchg \ 229 ''${diskImage:+-drive file=$diskImage,if=virtio,cache=unsafe,werror=report} \ 230 -kernel ${kernel}/${img} \ 231 -initrd ${initrd}/initrd \ ··· 235 236 237 vmRunCommand = qemuCommand: writeText "vm-run" '' 238 if [ -f "''${NIX_ATTRS_SH_FILE-}" ]; then 239 source "$NIX_ATTRS_SH_FILE" 240 fi 241 source $stdenv/setup 242 - export > saved-env 243 - 244 - PATH=${coreutils}/bin 245 - mkdir xchg 246 - mv saved-env xchg/ 247 248 eval "$preVM" 249 ··· 261 cat > ./run-vm <<EOF 262 #! ${bash}/bin/sh 263 ''${diskImage:+diskImage=$diskImage} 264 - TMPDIR=$TMPDIR 265 - cd $TMPDIR 266 ${qemuCommand} 267 EOF 268
··· 88 set -- $(IFS==; echo $o) 89 command=$2 90 ;; 91 esac 92 done 93 ··· 125 mkdir -p /fs${storeDir} 126 mount -t 9p store /fs${storeDir} -o trans=virtio,version=9p2000.L,cache=loose,msize=131072 127 128 mkdir -p /fs/tmp /fs/run /fs/var 129 mount -t tmpfs -o "mode=1777" none /fs/tmp 130 mount -t tmpfs -o "mode=755" none /fs/run 131 ln -sfn /run /fs/var/run 132 133 + echo "mounting host's temporary directory..." 134 + mkdir -p /fs/tmp/xchg 135 + mount -t 9p xchg /fs/tmp/xchg -o trans=virtio,version=9p2000.L,msize=131072 136 + 137 mkdir -p /fs/proc 138 mount -t proc none /fs/proc 139 ··· 149 fi 150 151 echo "starting stage 2 ($command)" 152 + exec switch_root /fs $command 153 ''; 154 155 ··· 165 stage2Init = writeScript "vm-run-stage2" '' 166 #! ${bash}/bin/sh 167 set -euo pipefail 168 + source /tmp/xchg/saved-env 169 + if [ -f /tmp/xchg/.attrs.sh ]; then 170 + source /tmp/xchg/.attrs.sh 171 + export NIX_ATTRS_JSON_FILE=/tmp/xchg/.attrs.json 172 + export NIX_ATTRS_SH_FILE=/tmp/xchg/.attrs.sh 173 fi 174 175 export NIX_STORE=${storeDir} 176 export NIX_BUILD_TOP=/tmp 177 export TMPDIR=/tmp 178 export PATH=/empty 179 cd "$NIX_BUILD_TOP" 180 + 181 + source $stdenv/setup 182 183 if ! test -e /bin/sh; then 184 ${coreutils}/bin/mkdir -p /bin ··· 204 declare -a argsArray=() 205 concatTo argsArray origArgs 206 "$origBuilder" "''${argsArray[@]}" 207 + echo $? > /tmp/xchg/in-vm-exit 208 209 ${busybox}/bin/mount -o remount,ro dummy / 210 ··· 223 -nographic -no-reboot \ 224 -device virtio-rng-pci \ 225 -virtfs local,path=${storeDir},security_model=none,mount_tag=store \ 226 + -virtfs local,path=xchg,security_model=none,mount_tag=xchg \ 227 ''${diskImage:+-drive file=$diskImage,if=virtio,cache=unsafe,werror=report} \ 228 -kernel ${kernel}/${img} \ 229 -initrd ${initrd}/initrd \ ··· 233 234 235 vmRunCommand = qemuCommand: writeText "vm-run" '' 236 + ${coreutils}/bin/mkdir xchg 237 + export > xchg/saved-env 238 + PATH=${coreutils}/bin 239 + 240 if [ -f "''${NIX_ATTRS_SH_FILE-}" ]; then 241 + cp $NIX_ATTRS_JSON_FILE $NIX_ATTRS_SH_FILE xchg 242 source "$NIX_ATTRS_SH_FILE" 243 fi 244 source $stdenv/setup 245 246 eval "$preVM" 247 ··· 259 cat > ./run-vm <<EOF 260 #! ${bash}/bin/sh 261 ''${diskImage:+diskImage=$diskImage} 262 ${qemuCommand} 263 EOF 264
+1
pkgs/build-support/vm/test.nix
··· 24 buildPatchelfInVM = runInLinuxVM patchelf; 25 26 buildHelloInVM = runInLinuxVM hello; 27 28 buildPcmanrmInVM = runInLinuxVM (pcmanfm.overrideAttrs (old: { 29 # goes out-of-memory with many cores
··· 24 buildPatchelfInVM = runInLinuxVM patchelf; 25 26 buildHelloInVM = runInLinuxVM hello; 27 + buildStructuredAttrsHelloInVM = runInLinuxVM (hello.overrideAttrs { __structuredAttrs = true; }); 28 29 buildPcmanrmInVM = runInLinuxVM (pcmanfm.overrideAttrs (old: { 30 # goes out-of-memory with many cores
+2 -2
pkgs/by-name/ap/apt/package.nix
··· 33 34 stdenv.mkDerivation (finalAttrs: { 35 pname = "apt"; 36 - version = "2.9.8"; 37 38 src = fetchurl { 39 url = "mirror://debian/pool/main/a/apt/apt_${finalAttrs.version}.tar.xz"; 40 - hash = "sha256-VPt7NL25PqIIESOrNfiTwm/g8+gApU6Onsy18+LslxA="; 41 }; 42 43 # cycle detection; lib can't be split
··· 33 34 stdenv.mkDerivation (finalAttrs: { 35 pname = "apt"; 36 + version = "2.9.16"; 37 38 src = fetchurl { 39 url = "mirror://debian/pool/main/a/apt/apt_${finalAttrs.version}.tar.xz"; 40 + hash = "sha256-9ncx162Jm4WZBYFPvtO03ic8/rhcGEUEPxR4x1LsnvQ="; 41 }; 42 43 # cycle detection; lib can't be split
+3 -2
pkgs/by-name/at/atop/package.nix
··· 22 hash = "sha256-m5TGZmAu//e/QC7M5wbDR/OMOctjSY+dOWJoYeVkbiA="; 23 }; 24 25 - nativeBuildInputs = lib.optionals withAtopgpu [ 26 python3.pkgs.wrapPython 27 ]; 28 ··· 30 glib 31 zlib 32 ncurses 33 - pkg-config 34 ] ++ lib.optionals withAtopgpu [ 35 python3 36 ];
··· 22 hash = "sha256-m5TGZmAu//e/QC7M5wbDR/OMOctjSY+dOWJoYeVkbiA="; 23 }; 24 25 + nativeBuildInputs = [ 26 + pkg-config 27 + ] ++ lib.optionals withAtopgpu [ 28 python3.pkgs.wrapPython 29 ]; 30 ··· 32 glib 33 zlib 34 ncurses 35 ] ++ lib.optionals withAtopgpu [ 36 python3 37 ];
+2 -2
pkgs/by-name/bo/bombsquad/package.nix
··· 22 { 23 x86_64-linux = { 24 name = "BombSquad_Linux_x86_64"; 25 - hash = "sha256-jrExsqaM6uhnKMGPkJJTsKt2Imek+YDI2soSP/kfPj0="; 26 }; 27 aarch-64-linux = { 28 name = "BombSquad_Linux_Arm64"; 29 - hash = "sha256-o1Yg0C5k07NZzc9jQrHXR+kkQl8HZ55U9/fqcpe3Iyw="; 30 }; 31 } 32 .${stdenv.targetPlatform.system} or (throw "${stdenv.targetPlatform.system} is unsupported.");
··· 22 { 23 x86_64-linux = { 24 name = "BombSquad_Linux_x86_64"; 25 + hash = "sha256-aujLYzFcKaW0ff7sRdyJ6SvSQowafWVbmwycQfDQUYY="; 26 }; 27 aarch-64-linux = { 28 name = "BombSquad_Linux_Arm64"; 29 + hash = "sha256-pPP7QZzToTOQtSxzF7Q3ZzlDjUjQWMBM/y79d6Yf38I="; 30 }; 31 } 32 .${stdenv.targetPlatform.system} or (throw "${stdenv.targetPlatform.system} is unsupported.");
+3 -16
pkgs/by-name/ca/caligula/package.nix
··· 1 { lib 2 , rustPlatform 3 , fetchFromGitHub 4 - , llvmPackages 5 - , stdenv 6 - , darwin 7 }: 8 9 rustPlatform.buildRustPackage rec { ··· 19 20 cargoHash = "sha256-ma7JVbWSiKfkCXCDwA8DFm2+KPrWR+8nSdgGSqehNg8="; 21 22 - env = { 23 - LIBCLANG_PATH = "${lib.getLib llvmPackages.libclang}/lib"; 24 - }; 25 - 26 - 27 - buildInputs = lib.optionals stdenv.hostPlatform.isDarwin ( 28 - with darwin.apple_sdk.frameworks; [ 29 - Cocoa 30 - IOKit 31 - Foundation 32 - DiskArbitration 33 - ] 34 - ); 35 36 RUSTFLAGS = "--cfg tracing_unstable"; 37
··· 1 { lib 2 , rustPlatform 3 , fetchFromGitHub 4 }: 5 6 rustPlatform.buildRustPackage rec { ··· 16 17 cargoHash = "sha256-ma7JVbWSiKfkCXCDwA8DFm2+KPrWR+8nSdgGSqehNg8="; 18 19 + nativeBuildInputs = [ 20 + rustPlatform.bindgenHook 21 + ]; 22 23 RUSTFLAGS = "--cfg tracing_unstable"; 24
+3 -3
pkgs/by-name/ch/chainsaw/package.nix
··· 8 9 rustPlatform.buildRustPackage rec { 10 pname = "chainsaw"; 11 - version = "2.9.2"; 12 13 src = fetchFromGitHub { 14 owner = "WithSecureLabs"; 15 repo = "chainsaw"; 16 rev = "refs/tags/v${version}"; 17 - hash = "sha256-oKlLFKCZNBcHURVvT0i8Hfym6r30ikndV30uuxjYgDM="; 18 }; 19 20 - cargoHash = "sha256-1w3DYP69aOphoqbsZIF9aX56Lftg2niKClmImLTa5DE="; 21 22 buildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ 23 darwin.apple_sdk.frameworks.CoreFoundation
··· 8 9 rustPlatform.buildRustPackage rec { 10 pname = "chainsaw"; 11 + version = "2.10.1"; 12 13 src = fetchFromGitHub { 14 owner = "WithSecureLabs"; 15 repo = "chainsaw"; 16 rev = "refs/tags/v${version}"; 17 + hash = "sha256-ErDIfLhzCiFm3dZzr6ThjYCplfDKbALAqcu8c0gREH4="; 18 }; 19 20 + cargoHash = "sha256-WuPfYxI61wsQyOKqPF7/a3Hx9vMBCkTkoXsZczgeKpg="; 21 22 buildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ 23 darwin.apple_sdk.frameworks.CoreFoundation
+19 -2
pkgs/by-name/di/distrobuilder/generator.nix
··· 1 - { stdenvNoCC, lib, src, version, makeWrapper, coreutils, findutils, gnugrep, systemd }: 2 3 stdenvNoCC.mkDerivation { 4 name = "distrobuilder-nixos-generator"; ··· 14 15 installPhase = '' 16 install -D -m 0555 distrobuilder/lxc.generator $out/lib/systemd/system-generators/lxc 17 - wrapProgram $out/lib/systemd/system-generators/lxc --prefix PATH : ${lib.makeBinPath [coreutils findutils gnugrep systemd]}:${systemd}/lib/systemd 18 ''; 19 }
··· 1 + { 2 + stdenvNoCC, 3 + lib, 4 + src, 5 + version, 6 + makeWrapper, 7 + coreutils, 8 + findutils, 9 + gnugrep, 10 + systemd, 11 + }: 12 13 stdenvNoCC.mkDerivation { 14 name = "distrobuilder-nixos-generator"; ··· 24 25 installPhase = '' 26 install -D -m 0555 distrobuilder/lxc.generator $out/lib/systemd/system-generators/lxc 27 + wrapProgram $out/lib/systemd/system-generators/lxc --prefix PATH : ${ 28 + lib.makeBinPath [ 29 + coreutils 30 + findutils 31 + gnugrep 32 + systemd 33 + ] 34 + }:${systemd}/lib/systemd 35 ''; 36 }
+31 -29
pkgs/by-name/di/distrobuilder/package.nix
··· 1 - { lib 2 - , buildGoModule 3 - , callPackage 4 - , cdrkit 5 - , coreutils 6 - , debootstrap 7 - , fetchFromGitHub 8 - , gnupg 9 - , gnutar 10 - , hivex 11 - , makeWrapper 12 - , nixosTests 13 - , pkg-config 14 - , squashfsTools 15 - , stdenv 16 - , wimlib 17 }: 18 19 let 20 - bins = [ 21 - coreutils 22 - debootstrap 23 - gnupg 24 - gnutar 25 - squashfsTools 26 - ] ++ lib.optionals stdenv.hostPlatform.isx86_64 [ 27 - # repack-windows deps 28 - cdrkit 29 - hivex 30 - wimlib 31 - ]; 32 in 33 buildGoModule rec { 34 pname = "distrobuilder"; ··· 45 }; 46 47 buildInputs = bins; 48 - 49 50 # tests require a local keyserver (mkg20001/nixpkgs branch distrobuilder-with-tests) but gpg is currently broken in tests 51 doCheck = false;
··· 1 + { 2 + lib, 3 + buildGoModule, 4 + callPackage, 5 + cdrkit, 6 + coreutils, 7 + debootstrap, 8 + fetchFromGitHub, 9 + gnupg, 10 + gnutar, 11 + hivex, 12 + makeWrapper, 13 + nixosTests, 14 + pkg-config, 15 + squashfsTools, 16 + stdenv, 17 + wimlib, 18 }: 19 20 let 21 + bins = 22 + [ 23 + coreutils 24 + debootstrap 25 + gnupg 26 + gnutar 27 + squashfsTools 28 + ] 29 + ++ lib.optionals stdenv.hostPlatform.isx86_64 [ 30 + # repack-windows deps 31 + cdrkit 32 + hivex 33 + wimlib 34 + ]; 35 in 36 buildGoModule rec { 37 pname = "distrobuilder"; ··· 48 }; 49 50 buildInputs = bins; 51 52 # tests require a local keyserver (mkg20001/nixpkgs branch distrobuilder-with-tests) but gpg is currently broken in tests 53 doCheck = false;
+2 -2
pkgs/by-name/dm/dmarc-metrics-exporter/package.nix
··· 7 8 python3.pkgs.buildPythonApplication rec { 9 pname = "dmarc-metrics-exporter"; 10 - version = "1.1.0"; 11 12 pyproject = true; 13 ··· 15 owner = "jgosmann"; 16 repo = "dmarc-metrics-exporter"; 17 rev = "refs/tags/v${version}"; 18 - hash = "sha256-xzIYlOZ1HeW+jbVDVlUPTIooFraQ0cJltsDoCzVMNsA="; 19 }; 20 21 pythonRelaxDeps = true;
··· 7 8 python3.pkgs.buildPythonApplication rec { 9 pname = "dmarc-metrics-exporter"; 10 + version = "1.2.0"; 11 12 pyproject = true; 13 ··· 15 owner = "jgosmann"; 16 repo = "dmarc-metrics-exporter"; 17 rev = "refs/tags/v${version}"; 18 + hash = "sha256-cIsI4TNYuLK0fpUg9lnbl5KSBtzQoT/pTByI9hiy/7o="; 19 }; 20 21 pythonRelaxDeps = true;
+2 -2
pkgs/by-name/et/etesync-dav/package.nix
··· 3 , nixosTests 4 , python3 5 , fetchFromGitHub 6 - , radicale3 7 }: 8 9 python3.pkgs.buildPythonApplication { ··· 25 flask-wtf 26 msgpack 27 setuptools 28 - (python.pkgs.toPythonModule (radicale3.override { python3 = python; })) 29 requests 30 types-setuptools 31 ] ++ requests.optional-dependencies.socks;
··· 3 , nixosTests 4 , python3 5 , fetchFromGitHub 6 + , radicale 7 }: 8 9 python3.pkgs.buildPythonApplication { ··· 25 flask-wtf 26 msgpack 27 setuptools 28 + (python.pkgs.toPythonModule (radicale.override { python3 = python; })) 29 requests 30 types-setuptools 31 ] ++ requests.optional-dependencies.socks;
+1 -1
pkgs/by-name/et/etlegacy-assets/package.nix
··· 5 6 stdenv.mkDerivation { 7 pname = "etlegacy-assets"; 8 - version = "2.82.0"; 9 10 srcs = let 11 fetchAsset = { asset, hash }: fetchurl {
··· 5 6 stdenv.mkDerivation { 7 pname = "etlegacy-assets"; 8 + version = "2.83.1"; 9 10 srcs = let 11 fetchAsset = { asset, hash }: fetchurl {
+2 -2
pkgs/by-name/et/etlegacy-unwrapped/package.nix
··· 22 , zlib 23 }: 24 let 25 - version = "2.82.1"; 26 fakeGit = writeShellApplication { 27 name = "git"; 28 ··· 41 owner = "etlegacy"; 42 repo = "etlegacy"; 43 rev = "refs/tags/v${version}"; 44 - hash = "sha256-DA5tudbehXIU+4hX3ggcxWZ7AAOa8LUkIvUHbgMgDY8="; 45 }; 46 47 nativeBuildInputs = [
··· 22 , zlib 23 }: 24 let 25 + version = "2.83.1"; 26 fakeGit = writeShellApplication { 27 name = "git"; 28 ··· 41 owner = "etlegacy"; 42 repo = "etlegacy"; 43 rev = "refs/tags/v${version}"; 44 + hash = "sha256-k1H3irA9UVOICY3keKGVJMtBczW/b5ObyNvB7fGAcFA="; 45 }; 46 47 nativeBuildInputs = [
+1 -1
pkgs/by-name/et/etlegacy/package.nix
··· 7 8 symlinkJoin { 9 name = "etlegacy"; 10 - version = "2.82.1"; 11 paths = [ 12 etlegacy-assets 13 etlegacy-unwrapped
··· 7 8 symlinkJoin { 9 name = "etlegacy"; 10 + version = "2.83.1"; 11 paths = [ 12 etlegacy-assets 13 etlegacy-unwrapped
+3 -3
pkgs/by-name/ev/evcc/package.nix
··· 16 17 buildGoModule rec { 18 pname = "evcc"; 19 - version = "0.131.6"; 20 21 src = fetchFromGitHub { 22 owner = "evcc-io"; 23 repo = "evcc"; 24 rev = version; 25 - hash = "sha256-r9GaihxC9ZQtTzKqfJ3LLDMzDEXeud7vTFEMOf0whFU="; 26 }; 27 28 vendorHash = "sha256-x0EWFsR/O2Ztg39DL+yZx2ZDzJHADo2aPAeg/i+5KqM="; 29 30 npmDeps = fetchNpmDeps { 31 inherit src; 32 - hash = "sha256-4pQYv5UKoz3Gu5OS0zoYrjrFYD796MDb7ofWbTv3HlU="; 33 }; 34 35 nativeBuildInputs = [
··· 16 17 buildGoModule rec { 18 pname = "evcc"; 19 + version = "0.131.8"; 20 21 src = fetchFromGitHub { 22 owner = "evcc-io"; 23 repo = "evcc"; 24 rev = version; 25 + hash = "sha256-W04iXqABwp5fDesOZf633mS6caEsGv0lHEyCzqEv1WA="; 26 }; 27 28 vendorHash = "sha256-x0EWFsR/O2Ztg39DL+yZx2ZDzJHADo2aPAeg/i+5KqM="; 29 30 npmDeps = fetchNpmDeps { 31 inherit src; 32 + hash = "sha256-MjmqVyIj/foI6FFMydpbZA3wL09qs02eAq7Tk872JKM="; 33 }; 34 35 nativeBuildInputs = [
+3 -25
pkgs/by-name/fe/fedimint/package.nix
··· 1 { lib 2 , buildPackages 3 - , clang 4 , fetchFromGitHub 5 - , libclang 6 - , libiconv 7 - , llvmPackages_12 8 , openssl 9 , pkg-config 10 , protobuf 11 , rustPlatform 12 - , stdenv 13 - , Security 14 - , SystemConfiguration 15 }: 16 - let 17 - # Rust rocksdb bindings have C++ compilation/linking errors on Darwin when using newer clang 18 - # Forcing it to clang 12 fixes the issue. 19 - buildRustPackage = 20 - if stdenv.hostPlatform.isDarwin then 21 - rustPlatform.buildRustPackage.override { stdenv = llvmPackages_12.stdenv; } 22 - else 23 - rustPlatform.buildRustPackage; 24 - in 25 - buildRustPackage rec { 26 pname = "fedimint"; 27 version = "0.4.4"; 28 ··· 38 nativeBuildInputs = [ 39 protobuf 40 pkg-config 41 - clang 42 - (lib.getLib libclang) 43 ]; 44 45 buildInputs = [ 46 openssl 47 - ] ++ lib.optionals stdenv.hostPlatform.isDarwin [ 48 - Security 49 - libiconv 50 - Security 51 - SystemConfiguration 52 ]; 53 54 outputs = [ "out" "fedimintCli" "fedimint" "gateway" "gatewayCli" "devimint" ]; ··· 79 PROTOC = "${buildPackages.protobuf}/bin/protoc"; 80 PROTOC_INCLUDE = "${protobuf}/include"; 81 OPENSSL_DIR = openssl.dev; 82 - LIBCLANG_PATH = "${lib.getLib libclang}/lib"; 83 84 FEDIMINT_BUILD_FORCE_GIT_HASH = "0000000000000000000000000000000000000000"; 85
··· 1 { lib 2 , buildPackages 3 , fetchFromGitHub 4 , openssl 5 , pkg-config 6 , protobuf 7 , rustPlatform 8 }: 9 + 10 + rustPlatform.buildRustPackage rec { 11 pname = "fedimint"; 12 version = "0.4.4"; 13 ··· 23 nativeBuildInputs = [ 24 protobuf 25 pkg-config 26 + rustPlatform.bindgenHook 27 ]; 28 29 buildInputs = [ 30 openssl 31 ]; 32 33 outputs = [ "out" "fedimintCli" "fedimint" "gateway" "gatewayCli" "devimint" ]; ··· 58 PROTOC = "${buildPackages.protobuf}/bin/protoc"; 59 PROTOC_INCLUDE = "${protobuf}/include"; 60 OPENSSL_DIR = openssl.dev; 61 62 FEDIMINT_BUILD_FORCE_GIT_HASH = "0000000000000000000000000000000000000000"; 63
+2 -2
pkgs/by-name/ga/gapless/package.nix
··· 15 }: 16 stdenv.mkDerivation (finalAttrs: { 17 pname = "gapless"; 18 - version = "4.0"; 19 20 src = fetchFromGitLab { 21 domain = "gitlab.gnome.org"; 22 owner = "neithern"; 23 repo = "g4music"; 24 rev = "v${finalAttrs.version}"; 25 - hash = "sha256-t9YthW8HZz2kXYPvidVRy7GVB2cRGEOCrXZtIpW65MA="; 26 }; 27 28 nativeBuildInputs = [
··· 15 }: 16 stdenv.mkDerivation (finalAttrs: { 17 pname = "gapless"; 18 + version = "4.2"; 19 20 src = fetchFromGitLab { 21 domain = "gitlab.gnome.org"; 22 owner = "neithern"; 23 repo = "g4music"; 24 rev = "v${finalAttrs.version}"; 25 + hash = "sha256-lH3bogDbUjfNC6rC1UG2MiLRmc8YDaP0+STNKzg54dQ="; 26 }; 27 28 nativeBuildInputs = [
+2 -2
pkgs/by-name/gc/gcov2lcov/package.nix
··· 5 6 buildGoModule rec { 7 pname = "gcov2lcov"; 8 - version = "1.1.0"; 9 10 src = fetchFromGitHub { 11 owner = "jandelgado"; 12 repo = "gcov2lcov"; 13 rev = "v${version}"; 14 - hash = "sha256-E8TPxaKJTd+5OP9e5S1FD5aZP42nJvjiqqNs4xP9gm4="; 15 }; 16 17 vendorHash = "sha256-/2OIBWXbNch6lmw0C1jkyJfNefJXOVG9/jNW8CYHTsc=";
··· 5 6 buildGoModule rec { 7 pname = "gcov2lcov"; 8 + version = "1.1.1"; 9 10 src = fetchFromGitHub { 11 owner = "jandelgado"; 12 repo = "gcov2lcov"; 13 rev = "v${version}"; 14 + hash = "sha256-ifXpT5jGNaStqvzP5Rq6Hf6PFhpiKMRC+eSYOZfzt+s="; 15 }; 16 17 vendorHash = "sha256-/2OIBWXbNch6lmw0C1jkyJfNefJXOVG9/jNW8CYHTsc=";
+12 -4
pkgs/by-name/ge/gerrit/package.nix
··· 1 - { lib, stdenv, fetchurl, nixosTests }: 2 3 stdenv.mkDerivation rec { 4 pname = "gerrit"; 5 - version = "3.10.2"; 6 7 src = fetchurl { 8 url = "https://gerrit-releases.storage.googleapis.com/gerrit-${version}.war"; 9 - hash = "sha256-jsyL7j4ENzHVi07Uii0ouWXF3hkoGrq3NJi8fB1kj8o="; 10 }; 11 12 buildCommand = '' ··· 40 license = licenses.asl20; 41 description = "Web based code review and repository management for the git version control system"; 42 sourceProvenance = with sourceTypes; [ binaryBytecode ]; 43 - maintainers = with maintainers; [ flokli zimbatm ]; 44 platforms = platforms.unix; 45 }; 46 }
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchurl, 5 + nixosTests, 6 + }: 7 8 stdenv.mkDerivation rec { 9 pname = "gerrit"; 10 + version = "3.10.3"; 11 12 src = fetchurl { 13 url = "https://gerrit-releases.storage.googleapis.com/gerrit-${version}.war"; 14 + hash = "sha256-pVI5YZihvJNuaboh2dLe/Aw371rNPiGbaLUd0ALpANQ="; 15 }; 16 17 buildCommand = '' ··· 45 license = licenses.asl20; 46 description = "Web based code review and repository management for the git version control system"; 47 sourceProvenance = with sourceTypes; [ binaryBytecode ]; 48 + maintainers = with maintainers; [ 49 + flokli 50 + zimbatm 51 + ]; 52 platforms = platforms.unix; 53 }; 54 }
+3 -3
pkgs/by-name/gl/glab/package.nix
··· 8 9 buildGo123Module rec { 10 pname = "glab"; 11 - version = "1.49.0"; 12 13 src = fetchFromGitLab { 14 owner = "gitlab-org"; 15 repo = "cli"; 16 rev = "v${version}"; 17 - hash = "sha256-G9z9lISalj3ZXlvDY+qA+0NB6F7flBd1cTcGfxrM91U="; 18 }; 19 20 - vendorHash = "sha256-SsWZO77KqDPzyEK57WaK4NpnDWUtZPP0qur2EvEoiL0="; 21 22 ldflags = [ 23 "-s"
··· 8 9 buildGo123Module rec { 10 pname = "glab"; 11 + version = "1.50.0"; 12 13 src = fetchFromGitLab { 14 owner = "gitlab-org"; 15 repo = "cli"; 16 rev = "v${version}"; 17 + hash = "sha256-WQO+9Fmlzj21UPJ9cdFc6JC8mbkzOWxz077JR+11BXA="; 18 }; 19 20 + vendorHash = "sha256-nwHY0221nacHk4M+RKA8BEJLCoJJdIKwP0ZPjhYxc7Q="; 21 22 ldflags = [ 23 "-s"
+2 -10
pkgs/by-name/go/goodvibes/package.nix
··· 1 { lib 2 , stdenv 3 , fetchFromGitLab 4 - , fetchpatch 5 , meson 6 , ninja 7 , pkg-config ··· 18 19 stdenv.mkDerivation rec { 20 pname = "goodvibes"; 21 - version = "0.8.0"; 22 23 src = fetchFromGitLab { 24 owner = pname; 25 repo = pname; 26 rev = "v${version}"; 27 - hash = "sha256-KflLEc6BFA3pBY9HukEm5NluGi2igFNP6joOMdmZ0Ds="; 28 }; 29 - patches = [ 30 - # Fixes a compilation error 31 - (fetchpatch { 32 - url = "https://gitlab.com/goodvibes/goodvibes/-/commit/e332f831b91ee068a1a58846d7607b30ab010116.patch"; 33 - hash = "sha256-PzbTltbD0xWJAytCGg1TAwBLrICP+9QZbCbG1QQ8Qmw="; 34 - }) 35 - ]; 36 37 nativeBuildInputs = [ 38 meson
··· 1 { lib 2 , stdenv 3 , fetchFromGitLab 4 , meson 5 , ninja 6 , pkg-config ··· 17 18 stdenv.mkDerivation rec { 19 pname = "goodvibes"; 20 + version = "0.8.1"; 21 22 src = fetchFromGitLab { 23 owner = pname; 24 repo = pname; 25 rev = "v${version}"; 26 + hash = "sha256-zqJbtCqdwKXy13WWoAwSRYVhAOJsHqOF0DriSDEigbI="; 27 }; 28 29 nativeBuildInputs = [ 30 meson
+3 -3
pkgs/by-name/gr/grpcui/package.nix
··· 2 3 buildGoModule rec { 4 pname = "grpcui"; 5 - version = "1.4.1"; 6 7 src = fetchFromGitHub { 8 owner = "fullstorydev"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-OIwfLuWY7Y0t85v+P/0F55vEe0hNohlqMl16Omr8AF0="; 12 }; 13 14 - vendorHash = "sha256-dEek7q8OjFgCn+f/qyiQL/5qu8RJp38vZk3OrBREHx4="; 15 16 doCheck = false; 17
··· 2 3 buildGoModule rec { 4 pname = "grpcui"; 5 + version = "1.4.2"; 6 7 src = fetchFromGitHub { 8 owner = "fullstorydev"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-yk9SgQMUga7htP7XTKFk2JGzixxBV3y3PrnkzsiAMbw="; 12 }; 13 14 + vendorHash = "sha256-uP5jtFji2E6GqpzjD7X5p59TXu7KQVBgEX+Gh0BIclM="; 15 16 doCheck = false; 17
+10 -9
pkgs/by-name/in/incus/ui.nix
··· 1 - { lib 2 - , stdenv 3 - , fetchFromGitHub 4 - , fetchYarnDeps 5 - , nodejs 6 - , fixup-yarn-lock 7 - , yarn 8 - , nixosTests 9 - , git 10 }: 11 12 stdenv.mkDerivation rec {
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + fetchYarnDeps, 6 + nodejs, 7 + fixup-yarn-lock, 8 + yarn, 9 + nixosTests, 10 + git, 11 }: 12 13 stdenv.mkDerivation rec {
+2 -2
pkgs/by-name/ko/komikku/package.nix
··· 23 24 python3.pkgs.buildPythonApplication rec { 25 pname = "komikku"; 26 - version = "1.63.0"; 27 28 format = "other"; 29 ··· 32 owner = "valos"; 33 repo = "Komikku"; 34 rev = "v${version}"; 35 - hash = "sha256-+p5iTB98jpCqodvSEZ9Y8SM9W3M57Lpoh9jAzN3OmRs="; 36 }; 37 38 nativeBuildInputs = [
··· 23 24 python3.pkgs.buildPythonApplication rec { 25 pname = "komikku"; 26 + version = "1.64.0"; 27 28 format = "other"; 29 ··· 32 owner = "valos"; 33 repo = "Komikku"; 34 rev = "v${version}"; 35 + hash = "sha256-EpKLez5gTHCSJYGvDqmzj6YO1dIugZKrEP4zE2G5TxA="; 36 }; 37 38 nativeBuildInputs = [
+3 -3
pkgs/by-name/ku/kube-bench/package.nix
··· 2 3 buildGoModule rec { 4 pname = "kube-bench"; 5 - version = "0.9.0"; 6 7 src = fetchFromGitHub { 8 owner = "aquasecurity"; 9 repo = pname; 10 rev = "refs/tags/v${version}"; 11 - hash = "sha256-x6xCrxePB/TR7BP1kLiVFjv4pLUJu9JVh5/Y0ebOjvY="; 12 }; 13 14 - vendorHash = "sha256-d6GhZBHDSRgMVeglw8rhq5QF7gRH4hQOzTn0DZjvhiA="; 15 16 nativeBuildInputs = [ installShellFiles ]; 17
··· 2 3 buildGoModule rec { 4 pname = "kube-bench"; 5 + version = "0.9.2"; 6 7 src = fetchFromGitHub { 8 owner = "aquasecurity"; 9 repo = pname; 10 rev = "refs/tags/v${version}"; 11 + hash = "sha256-wRY40yNXTcixCUYWFMQsfkI7MPE4RuxCEHBoedDpW9Y="; 12 }; 13 14 + vendorHash = "sha256-bTpE8zJ6dCMimTowexehxnWPq3tXd0H9ZduJvCVqAlI="; 15 16 nativeBuildInputs = [ installShellFiles ]; 17
+2 -2
pkgs/by-name/ku/kubecfg/package.nix
··· 6 7 buildGoModule rec { 8 pname = "kubecfg"; 9 - version = "0.35.0"; 10 11 src = fetchFromGitHub { 12 owner = "kubecfg"; 13 repo = "kubecfg"; 14 rev = "v${version}"; 15 - hash = "sha256-/xfZcykOGYOnCkKQDUJ9k4xh+bwrDmy2iSNFPVLkjew="; 16 }; 17 18 vendorHash = "sha256-K2IyljE5QS/SZ6EXV42q/a5ru+0UXZ69oLNi94XKxw4=";
··· 6 7 buildGoModule rec { 8 pname = "kubecfg"; 9 + version = "0.35.1"; 10 11 src = fetchFromGitHub { 12 owner = "kubecfg"; 13 repo = "kubecfg"; 14 rev = "v${version}"; 15 + hash = "sha256-5xs9iE6sfFzoTq24DTNKOj4D+A5ezBKN1lfIdJCt+pk="; 16 }; 17 18 vendorHash = "sha256-K2IyljE5QS/SZ6EXV42q/a5ru+0UXZ69oLNi94XKxw4=";
+1 -1
pkgs/by-name/la/lact/package.nix
··· 66 ''; 67 68 meta = { 69 - description = "Linux AMDGPU Controller"; 70 homepage = "https://github.com/ilya-zlobintsev/LACT"; 71 license = lib.licenses.mit; 72 maintainers = with lib.maintainers; [ figsoda atemu ];
··· 66 ''; 67 68 meta = { 69 + description = "Linux GPU Configuration Tool for AMD and NVIDIA"; 70 homepage = "https://github.com/ilya-zlobintsev/LACT"; 71 license = lib.licenses.mit; 72 maintainers = with lib.maintainers; [ figsoda atemu ];
+3 -3
pkgs/by-name/le/legcord/package.nix
··· 11 }: 12 stdenv.mkDerivation rec { 13 pname = "legcord"; 14 - version = "1.0.4"; 15 16 src = fetchFromGitHub { 17 owner = "Legcord"; 18 repo = "Legcord"; 19 rev = "v${version}"; 20 - hash = "sha256-1nM0v8cjLcctvRcGHGtbyGxaqonIY8wM9s413NxTo+I="; 21 }; 22 23 nativeBuildInputs = [ pnpm.configHook nodejs makeWrapper copyDesktopItems ]; 24 25 pnpmDeps = pnpm.fetchDeps { 26 inherit pname version src; 27 - hash = "sha256-E1kT3WiCYkLwrfHa11P1Z6e0fVnZSpXEQStr1NPjEJU="; 28 }; 29 30 ELECTRON_SKIP_BINARY_DOWNLOAD = "1";
··· 11 }: 12 stdenv.mkDerivation rec { 13 pname = "legcord"; 14 + version = "1.0.5"; 15 16 src = fetchFromGitHub { 17 owner = "Legcord"; 18 repo = "Legcord"; 19 rev = "v${version}"; 20 + hash = "sha256-9CicqDZDetxElD36OLizyVNxkqz3rQOjAtUNTGWVwss="; 21 }; 22 23 nativeBuildInputs = [ pnpm.configHook nodejs makeWrapper copyDesktopItems ]; 24 25 pnpmDeps = pnpm.fetchDeps { 26 inherit pname version src; 27 + hash = "sha256-5GE/I2xLmu2Wu9mjzZMk1YZvtS5PgpwgXnxuY+4nimQ="; 28 }; 29 30 ELECTRON_SKIP_BINARY_DOWNLOAD = "1";
+1 -4
pkgs/by-name/li/libkrun/package.nix
··· 11 , pipewire 12 , virglrenderer 13 , libkrunfw 14 - , llvmPackages 15 , rustc 16 , withGpu ? false 17 , withSound ? false ··· 38 }; 39 40 nativeBuildInputs = [ 41 - llvmPackages.clang 42 rustPlatform.cargoSetupHook 43 cargo 44 rustc 45 ] ++ lib.optional (sevVariant || withGpu) pkg-config; ··· 51 ] ++ lib.optionals withGpu [ libepoxy libdrm virglrenderer ] 52 ++ lib.optional withSound pipewire 53 ++ lib.optional sevVariant openssl; 54 - 55 - env.LIBCLANG_PATH = "${lib.getLib llvmPackages.clang-unwrapped}/lib/libclang.so"; 56 57 makeFlags = [ 58 "PREFIX=${placeholder "out"}"
··· 11 , pipewire 12 , virglrenderer 13 , libkrunfw 14 , rustc 15 , withGpu ? false 16 , withSound ? false ··· 37 }; 38 39 nativeBuildInputs = [ 40 rustPlatform.cargoSetupHook 41 + rustPlatform.bindgenHook 42 cargo 43 rustc 44 ] ++ lib.optional (sevVariant || withGpu) pkg-config; ··· 50 ] ++ lib.optionals withGpu [ libepoxy libdrm virglrenderer ] 51 ++ lib.optional withSound pipewire 52 ++ lib.optional sevVariant openssl; 53 54 makeFlags = [ 55 "PREFIX=${placeholder "out"}"
+50
pkgs/by-name/lo/lockbook/package.nix
···
··· 1 + { 2 + lib, 3 + stdenv, 4 + rustPlatform, 5 + fetchFromGitHub, 6 + installShellFiles, 7 + }: 8 + rustPlatform.buildRustPackage rec { 9 + pname = "lockbook"; 10 + version = "0.9.15"; 11 + 12 + src = fetchFromGitHub { 13 + owner = "lockbook"; 14 + repo = "lockbook"; 15 + rev = "refs/tags/${version}"; 16 + hash = "sha256-hqBjA/6MWlhVjV4m+cIcnoRTApHuzbPzivMsaQHfRcc="; 17 + }; 18 + 19 + useFetchCargoVendor = true; 20 + cargoHash = "sha256-+M+wL26KDbLKhcujPyWAsTlXwLrQVCUbTnnu/7sXul4="; 21 + 22 + doCheck = false; # there are no cli tests 23 + cargoBuildFlags = [ 24 + "--package" 25 + "lockbook-cli" 26 + ]; 27 + 28 + nativeBuildInputs = [ installShellFiles ]; 29 + postInstall = lib.optionalString (stdenv.buildPlatform.canExecute stdenv.hostPlatform) '' 30 + installShellCompletion --bash --name lockbook.bash <($out/bin/lockbook completions bash) 31 + installShellCompletion --zsh --name _lockbook <($out/bin/lockbook completions zsh) 32 + installShellCompletion --fish --name lockbook.fish <($out/bin/lockbook completions fish) 33 + ''; 34 + 35 + meta = { 36 + description = "Private, polished note-taking platform"; 37 + longDescription = '' 38 + Write notes, sketch ideas, and store files in one secure place. 39 + Share seamlessly, keep data synced, and access it on any 40 + platform—even offline. Lockbook encrypts files so even we 41 + can’t see them, but don’t take our word for it: 42 + Lockbook is 100% open-source. 43 + ''; 44 + homepage = "https://lockbook.net"; 45 + license = lib.licenses.unlicense; 46 + platforms = lib.platforms.all; 47 + changelog = "https://github.com/lockbook/lockbook/releases"; 48 + maintainers = [ lib.maintainers.parth ]; 49 + }; 50 + }
+6 -1
pkgs/by-name/lx/lxcfs/package.nix
··· 53 54 postInstall = '' 55 # `mount` hook requires access to the `mount` command from `util-linux` and `readlink` from `coreutils`: 56 - wrapProgram "$out/share/lxcfs/lxc.mount.hook" --prefix PATH : ${lib.makeBinPath [ coreutils util-linux ]} 57 ''; 58 59 postFixup = ''
··· 53 54 postInstall = '' 55 # `mount` hook requires access to the `mount` command from `util-linux` and `readlink` from `coreutils`: 56 + wrapProgram "$out/share/lxcfs/lxc.mount.hook" --prefix PATH : ${ 57 + lib.makeBinPath [ 58 + coreutils 59 + util-linux 60 + ] 61 + } 62 ''; 63 64 postFixup = ''
+22 -16
pkgs/by-name/mi/microsoft-identity-broker/package.nix
··· 1 - { stdenv 2 - , lib 3 - , fetchurl 4 - , dpkg 5 - , openjdk11 6 - , jnr-posix 7 - , makeWrapper 8 - , openjfx17 9 - , zip 10 - , nixosTests 11 - , bash 12 }: 13 stdenv.mkDerivation rec { 14 pname = "microsoft-identity-broker"; ··· 16 17 src = fetchurl { 18 url = "https://packages.microsoft.com/ubuntu/22.04/prod/pool/main/m/microsoft-identity-broker/microsoft-identity-broker_${version}_amd64.deb"; 19 - hash = "sha256-I4Q6ucT6ps8/QGiQTNbMXcKxq6UMcuwJ0Prcqvov56M="; 20 }; 21 22 - nativeBuildInputs = [ dpkg makeWrapper openjdk11 zip ]; 23 24 buildPhase = '' 25 runHook preBuild ··· 93 tests = { inherit (nixosTests) intune; }; 94 }; 95 96 - meta = with lib; { 97 description = "Microsoft Authentication Broker for Linux"; 98 homepage = "https://www.microsoft.com/"; 99 - license = licenses.unfree; 100 - sourceProvenance = with sourceTypes; [ binaryNativeCode ]; 101 platforms = [ "x86_64-linux" ]; 102 maintainers = with lib.maintainers; [ rhysmdnz ]; 103 };
··· 1 + { 2 + stdenv, 3 + lib, 4 + fetchurl, 5 + dpkg, 6 + openjdk11, 7 + jnr-posix, 8 + makeWrapper, 9 + openjfx17, 10 + zip, 11 + nixosTests, 12 + bash, 13 }: 14 stdenv.mkDerivation rec { 15 pname = "microsoft-identity-broker"; ··· 17 18 src = fetchurl { 19 url = "https://packages.microsoft.com/ubuntu/22.04/prod/pool/main/m/microsoft-identity-broker/microsoft-identity-broker_${version}_amd64.deb"; 20 + hash = "sha256-v/FxtdvRaUHYqvFSkJIZyicIdcyxQ8lPpY5rb9smnqA="; 21 }; 22 23 + nativeBuildInputs = [ 24 + dpkg 25 + makeWrapper 26 + openjdk11 27 + zip 28 + ]; 29 30 buildPhase = '' 31 runHook preBuild ··· 99 tests = { inherit (nixosTests) intune; }; 100 }; 101 102 + meta = { 103 description = "Microsoft Authentication Broker for Linux"; 104 homepage = "https://www.microsoft.com/"; 105 + license = lib.licenses.unfree; 106 + sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ]; 107 platforms = [ "x86_64-linux" ]; 108 maintainers = with lib.maintainers; [ rhysmdnz ]; 109 };
+2 -2
pkgs/by-name/ml/mlx42/package.nix
··· 10 11 stdenv.mkDerivation (finalAttrs: { 12 pname = "mlx42"; 13 - version = "2.4.0"; 14 15 src = fetchFromGitHub { 16 owner = "codam-coding-college"; 17 repo = "MLX42"; 18 rev = "refs/tags/v${finalAttrs.version}"; 19 - hash = "sha256-jYcBvvx0Xfc/wDWSUROfQeRvn+tWvSS0ymKO1iuzg8w="; 20 }; 21 22 postPatch =
··· 10 11 stdenv.mkDerivation (finalAttrs: { 12 pname = "mlx42"; 13 + version = "2.4.1"; 14 15 src = fetchFromGitHub { 16 owner = "codam-coding-college"; 17 repo = "MLX42"; 18 rev = "refs/tags/v${finalAttrs.version}"; 19 + hash = "sha256-/HCP6F7N+J97n4orlLxg/4agEoq4+rJdpeW/3q+DI1I="; 20 }; 21 22 postPatch =
+33
pkgs/by-name/mo/morf/package.nix
···
··· 1 + { 2 + lib, 3 + buildGoModule, 4 + fetchFromGitHub, 5 + }: 6 + 7 + buildGoModule rec { 8 + pname = "morf"; 9 + version = "1.0.0"; 10 + 11 + src = fetchFromGitHub { 12 + owner = "amrudesh1"; 13 + repo = "morf"; 14 + rev = "refs/tags/v${version}"; 15 + hash = "sha256-3PJ+YtKSH6HHAXBSHO8iMP2HFiuW1RQ0N8iUjQD7NBw="; 16 + }; 17 + 18 + vendorHash = "sha256-tK58UGCI7CuJsFSM7htRQT98tzunAOXyYAxhCkdTJdU="; 19 + 20 + ldflags = [ 21 + "-s" 22 + "-w" 23 + ]; 24 + 25 + meta = { 26 + description = "Offensive mobile security tool designed to identify and address sensitive information"; 27 + homepage = "https://github.com/amrudesh1/morf"; 28 + changelog = "https://github.com/amrudesh1/morf/releases/tag/v${version}"; 29 + license = lib.licenses.asl20; 30 + maintainers = with lib.maintainers; [ fab ]; 31 + mainProgram = "morf"; 32 + }; 33 + }
+2 -2
pkgs/by-name/mq/mqtt-randompub/package.nix
··· 6 7 python3.pkgs.buildPythonApplication rec { 8 pname = "mqtt-randompub"; 9 - version = "0.2.2"; 10 pyproject = true; 11 12 src = fetchFromGitHub { 13 owner = "fabaff"; 14 repo = "mqtt-randompub"; 15 rev = "refs/tags/${version}"; 16 - hash = "sha256-vAFEVlw9reRP+4Qwywv+cP27SU1c3seL3Z+b/YfUdl8="; 17 }; 18 19 build-system = with python3.pkgs; [ setuptools ];
··· 6 7 python3.pkgs.buildPythonApplication rec { 8 pname = "mqtt-randompub"; 9 + version = "0.3.0"; 10 pyproject = true; 11 12 src = fetchFromGitHub { 13 owner = "fabaff"; 14 repo = "mqtt-randompub"; 15 rev = "refs/tags/${version}"; 16 + hash = "sha256-X9gITmzyUNtYW8IMTcBiubPscBEO5OGjdxot9wRD/BY="; 17 }; 18 19 build-system = with python3.pkgs; [ setuptools ];
+2 -2
pkgs/by-name/mx/mxt-app/package.nix
··· 1 { lib, stdenv, fetchFromGitHub, autoreconfHook, libtool }: 2 3 stdenv.mkDerivation rec { 4 - version="1.40"; 5 pname = "mxt-app"; 6 7 src = fetchFromGitHub { 8 owner = "atmel-maxtouch"; 9 repo = "mxt-app"; 10 rev = "v${version}"; 11 - sha256 = "sha256-ZquD1aZu/TJQdr7QwKHTbCwSCFxt4drVBm4D1FLlzF0="; 12 }; 13 14 nativeBuildInputs = [ autoreconfHook ];
··· 1 { lib, stdenv, fetchFromGitHub, autoreconfHook, libtool }: 2 3 stdenv.mkDerivation rec { 4 + version="1.41"; 5 pname = "mxt-app"; 6 7 src = fetchFromGitHub { 8 owner = "atmel-maxtouch"; 9 repo = "mxt-app"; 10 rev = "v${version}"; 11 + sha256 = "sha256-Sn83k04ctwyVH90wnPIFuH91epPgLt1mWY+07r5eKpk="; 12 }; 13 14 nativeBuildInputs = [ autoreconfHook ];
+2 -2
pkgs/by-name/nc/nchat/package.nix
··· 15 16 stdenv.mkDerivation rec { 17 pname = "nchat"; 18 - version = "5.2.11"; 19 20 src = fetchFromGitHub { 21 owner = "d99kris"; 22 repo = "nchat"; 23 rev = "refs/tags/v${version}"; 24 - hash = "sha256-LcTVftLKlzHstSaJjdtqoEmQ7kiqft9dbXRXoYjbaus="; 25 }; 26 27 postPatch = ''
··· 15 16 stdenv.mkDerivation rec { 17 pname = "nchat"; 18 + version = "5.3.5"; 19 20 src = fetchFromGitHub { 21 owner = "d99kris"; 22 repo = "nchat"; 23 rev = "refs/tags/v${version}"; 24 + hash = "sha256-Nnu2Bk11Crk2vhvQqlDFo42duDqkNRCwDq4xCKIXwLQ="; 25 }; 26 27 postPatch = ''
+1 -6
pkgs/by-name/ne/neothesia/package.nix
··· 6 , alsa-lib 7 , wayland 8 , makeWrapper 9 - , llvmPackages 10 , libxkbcommon 11 , vulkan-loader 12 , xorg ··· 33 34 nativeBuildInputs = [ 35 pkg-config 36 - llvmPackages.clang 37 makeWrapper 38 ]; 39 40 cargoLock = { ··· 53 install -Dm 644 flatpak/com.github.polymeilex.neothesia.desktop $out/share/applications/com.github.polymeilex.neothesia.desktop 54 install -Dm 644 flatpak/com.github.polymeilex.neothesia.png $out/share/icons/hicolor/256x256/apps/com.github.polymeilex.neothesia.png 55 ''; 56 - 57 - env = { 58 - LIBCLANG_PATH = "${lib.getLib llvmPackages.libclang}/lib"; 59 - }; 60 61 meta = { 62 description = "Flashy Synthesia Like Software For Linux, Windows and macOS";
··· 6 , alsa-lib 7 , wayland 8 , makeWrapper 9 , libxkbcommon 10 , vulkan-loader 11 , xorg ··· 32 33 nativeBuildInputs = [ 34 pkg-config 35 makeWrapper 36 + rustPlatform.bindgenHook 37 ]; 38 39 cargoLock = { ··· 52 install -Dm 644 flatpak/com.github.polymeilex.neothesia.desktop $out/share/applications/com.github.polymeilex.neothesia.desktop 53 install -Dm 644 flatpak/com.github.polymeilex.neothesia.png $out/share/icons/hicolor/256x256/apps/com.github.polymeilex.neothesia.png 54 ''; 55 56 meta = { 57 description = "Flashy Synthesia Like Software For Linux, Windows and macOS";
-4
pkgs/by-name/ni/nixos-rebuild-ng/src/nixos_rebuild/__init__.py
··· 238 path_to_config = nix.nixos_build_flake( 239 "toplevel", 240 flake, 241 - keep_going=True, 242 dry_run=dry_run, 243 **flake_build_flags, 244 ) ··· 247 "system", 248 args.attr, 249 args.file, 250 - keep_going=True, 251 dry_run=dry_run, 252 **build_flags, 253 ) ··· 266 path_to_config = nix.nixos_build_flake( 267 attr, 268 flake, 269 - keep_going=True, 270 **flake_build_flags, 271 ) 272 else: ··· 274 attr, 275 args.attr, 276 args.file, 277 - keep_going=True, 278 **build_flags, 279 ) 280 vm_path = next(path_to_config.glob("bin/run-*-vm"), "./result/bin/run-*-vm")
··· 238 path_to_config = nix.nixos_build_flake( 239 "toplevel", 240 flake, 241 dry_run=dry_run, 242 **flake_build_flags, 243 ) ··· 246 "system", 247 args.attr, 248 args.file, 249 dry_run=dry_run, 250 **build_flags, 251 ) ··· 264 path_to_config = nix.nixos_build_flake( 265 attr, 266 flake, 267 **flake_build_flags, 268 ) 269 else: ··· 271 attr, 272 args.attr, 273 args.file, 274 **build_flags, 275 ) 276 vm_path = next(path_to_config.glob("bin/run-*-vm"), "./result/bin/run-*-vm")
+9 -8
pkgs/by-name/nu/nufmt/package.nix
··· 4 fetchFromGitHub, 5 rustPlatform, 6 apple-sdk_11, 7 - llvmPackages, 8 nix-update-script, 9 - ... 10 }: 11 rustPlatform.buildRustPackage { 12 pname = "nufmt"; 13 - version = "0-unstable-2024-10-20"; 14 15 src = fetchFromGitHub { 16 owner = "nushell"; 17 repo = "nufmt"; 18 - rev = "decc88ef8e11a14081c2dd86c6ea0c94d6d2861d"; 19 - hash = "sha256-AurQGIZDYOkMMyAEXP01QziISQcSME3GFtvqjCDoeiw="; 20 }; 21 22 buildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ 23 apple-sdk_11 24 ]; 25 26 - env.LIBCLANG_PATH = lib.optionalString stdenv.cc.isClang "${lib.getLib llvmPackages.libclang}/lib"; 27 - 28 - cargoHash = "sha256-5DS6pTYGOQ4qay6+YiUstInRX17n3RViNxKXtFZ6J3k="; 29 30 passthru.updateScript = nix-update-script { extraArgs = [ "--version=branch" ]; }; 31
··· 4 fetchFromGitHub, 5 rustPlatform, 6 apple-sdk_11, 7 nix-update-script, 8 }: 9 + 10 rustPlatform.buildRustPackage { 11 pname = "nufmt"; 12 + version = "0-unstable-2024-11-21"; 13 14 src = fetchFromGitHub { 15 owner = "nushell"; 16 repo = "nufmt"; 17 + rev = "628a3b73ea637c96f2c191ae066cf1cecadeafa3"; 18 + hash = "sha256-ideILLOawU6BNawmr4lqt2LGkf29wvlwQe9gqgdYRiI="; 19 }; 20 21 + nativeBuildInputs = [ 22 + rustPlatform.bindgenHook 23 + ]; 24 + 25 buildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ 26 apple-sdk_11 27 ]; 28 29 + cargoHash = "sha256-MHZlXmHAYIiaB6Isutqjrh45jppRzTZRSE3VqzpFBBA="; 30 31 passthru.updateScript = nix-update-script { extraArgs = [ "--version=branch" ]; }; 32
+1126
pkgs/by-name/op/opentabletdriver/deps.nix
···
··· 1 + # This file was automatically generated by passthru.fetch-deps. 2 + # Please dont edit it manually, your changes might get overwritten! 3 + 4 + { fetchNuGet }: 5 + [ 6 + (fetchNuGet { 7 + pname = "AtkSharp"; 8 + version = "3.24.24.34"; 9 + hash = "sha256-GrOzO4YDMKJNHAnqLF+c44iGYlvazGTOuRLUnuLbwco="; 10 + }) 11 + (fetchNuGet { 12 + pname = "CairoSharp"; 13 + version = "3.24.24.34"; 14 + hash = "sha256-/80xbYSPU8+6twoXRjES8PtV7dKB6fQoe6EqBmawzV8="; 15 + }) 16 + (fetchNuGet { 17 + pname = "Castle.Core"; 18 + version = "4.4.0"; 19 + hash = "sha256-7hLBAHnB+drr2yU4w3o05eMX2ADy/rXN3XRPBn1d7GY="; 20 + }) 21 + (fetchNuGet { 22 + pname = "coverlet.collector"; 23 + version = "3.0.2"; 24 + hash = "sha256-b8LCEIZCLJdYcJXQqI3TGDmkLrmLhz84eoTq+qP5xvU="; 25 + }) 26 + (fetchNuGet { 27 + pname = "Eto.Forms"; 28 + version = "2.5.10"; 29 + hash = "sha256-51NkW/COGLiGl/+niLJaPJY+ypG1a1OXw65HMunj4bQ="; 30 + }) 31 + (fetchNuGet { 32 + pname = "Eto.Forms"; 33 + version = "2.5.11"; 34 + hash = "sha256-enxjfLwl+KEl//rG9pJ4VaQtAAycjHWP1Hp4ngKTBkE="; 35 + }) 36 + (fetchNuGet { 37 + pname = "Eto.Platform.Gtk"; 38 + version = "2.5.11"; 39 + hash = "sha256-sqRlx0itUTncAfLaExymb2hdtoqLnkj/yvD9RM+XNuk="; 40 + }) 41 + (fetchNuGet { 42 + pname = "GdkSharp"; 43 + version = "3.24.24.34"; 44 + hash = "sha256-pQOp2jft19vVN+gSjD0tHfNGucss7ruy1xyys6IHHWQ="; 45 + }) 46 + (fetchNuGet { 47 + pname = "GioSharp"; 48 + version = "3.24.24.34"; 49 + hash = "sha256-/fZBfaKXlrdBuNh1/h0s1++5Ek4OnznXvzJx0uTbHQo="; 50 + }) 51 + (fetchNuGet { 52 + pname = "GLibSharp"; 53 + version = "3.24.24.34"; 54 + hash = "sha256-eAYUYNHF37nIJnk7aRffzBj8b/rluqXERYy358YAd08="; 55 + }) 56 + (fetchNuGet { 57 + pname = "GtkSharp"; 58 + version = "3.24.24.34"; 59 + hash = "sha256-i0XZfzUt9GNaZD1uXNd8x+pb1mPJqYrxQd15XOuHSAA="; 60 + }) 61 + (fetchNuGet { 62 + pname = "HidSharpCore"; 63 + version = "1.2.1.1"; 64 + hash = "sha256-lM4o3FYBon8eQIMt4uiJAs8M0t4MW+joykiDX+lrdv4="; 65 + }) 66 + (fetchNuGet { 67 + pname = "MessagePack"; 68 + version = "2.1.194"; 69 + hash = "sha256-QKq/zQKI3P9TBhhnnktaaeRr4f/12U+huxeaplPzT+w="; 70 + }) 71 + (fetchNuGet { 72 + pname = "MessagePack.Annotations"; 73 + version = "2.1.194"; 74 + hash = "sha256-YCHelFO/hXW7Q3rkV/fQ32aZliSXUO7133kRH+HAcMo="; 75 + }) 76 + (fetchNuGet { 77 + pname = "Microsoft.Bcl.AsyncInterfaces"; 78 + version = "1.1.1"; 79 + hash = "sha256-fAcX4sxE0veWM1CZBtXR/Unky+6sE33yrV7ohrWGKig="; 80 + }) 81 + (fetchNuGet { 82 + pname = "Microsoft.CodeCoverage"; 83 + version = "16.9.4"; 84 + hash = "sha256-90oZu7wror4PMfy9VL4O7WzxNHt0+KqS0mG+6Yf3kYc="; 85 + }) 86 + (fetchNuGet { 87 + pname = "Microsoft.CSharp"; 88 + version = "4.0.1"; 89 + hash = "sha256-0huoqR2CJ3Z9Q2peaKD09TV3E6saYSqDGZ290K8CrH8="; 90 + }) 91 + (fetchNuGet { 92 + pname = "Microsoft.Extensions.DependencyInjection"; 93 + version = "6.0.0-rc.1.21451.13"; 94 + hash = "sha256-zJQsAVTfA46hUV5q67BslsVn9yehYBclD06wg2UhyWQ="; 95 + }) 96 + (fetchNuGet { 97 + pname = "Microsoft.Extensions.DependencyInjection.Abstractions"; 98 + version = "6.0.0-rc.1.21451.13"; 99 + hash = "sha256-oTYhI+lMwaQ7l9CfDHeNMBAdfofv4kHC0vqBZ7oJr4U="; 100 + }) 101 + (fetchNuGet { 102 + pname = "Microsoft.NET.Test.Sdk"; 103 + version = "16.9.4"; 104 + hash = "sha256-ROXDqgp87j/In0UyGWygrCwMgn982Of60UHiXH8Bvck="; 105 + }) 106 + (fetchNuGet { 107 + pname = "Microsoft.NETCore.Platforms"; 108 + version = "1.0.1"; 109 + hash = "sha256-mZotlGZqtrqDSoBrZhsxFe6fuOv5/BIo0w2Z2x0zVAU="; 110 + }) 111 + (fetchNuGet { 112 + pname = "Microsoft.NETCore.Platforms"; 113 + version = "1.1.0"; 114 + hash = "sha256-FeM40ktcObQJk4nMYShB61H/E8B7tIKfl9ObJ0IOcCM="; 115 + }) 116 + (fetchNuGet { 117 + pname = "Microsoft.NETCore.Platforms"; 118 + version = "1.1.1"; 119 + hash = "sha256-8hLiUKvy/YirCWlFwzdejD2Db3DaXhHxT7GSZx/znJg="; 120 + }) 121 + (fetchNuGet { 122 + pname = "Microsoft.NETCore.Platforms"; 123 + version = "3.0.0"; 124 + hash = "sha256-ocB+U+mMvi/xVwII7bGsIfAqSXiKVSnEMLHCODLJaK4="; 125 + }) 126 + (fetchNuGet { 127 + pname = "Microsoft.NETCore.Targets"; 128 + version = "1.0.1"; 129 + hash = "sha256-lxxw/Gy32xHi0fLgFWNj4YTFBSBkjx5l6ucmbTyf7V4="; 130 + }) 131 + (fetchNuGet { 132 + pname = "Microsoft.NETCore.Targets"; 133 + version = "1.1.0"; 134 + hash = "sha256-0AqQ2gMS8iNlYkrD+BxtIg7cXMnr9xZHtKAuN4bjfaQ="; 135 + }) 136 + (fetchNuGet { 137 + pname = "Microsoft.TestPlatform.ObjectModel"; 138 + version = "16.9.4"; 139 + hash = "sha256-JvLvmGmaT9I5Sz2QMCEv8lQk34kzCcg+MPuSavOaP8o="; 140 + }) 141 + (fetchNuGet { 142 + pname = "Microsoft.TestPlatform.TestHost"; 143 + version = "16.9.4"; 144 + hash = "sha256-3VRVjK5XrR5+SNuMQnLbD1ji6sHXjr65FydfXz8GIZA="; 145 + }) 146 + (fetchNuGet { 147 + pname = "Microsoft.VisualStudio.Threading"; 148 + version = "16.7.56"; 149 + hash = "sha256-V2HB/0j+I/3iUT7mEVyeF11P/61cSpYcZQa1LnXuoI8="; 150 + }) 151 + (fetchNuGet { 152 + pname = "Microsoft.VisualStudio.Threading.Analyzers"; 153 + version = "16.7.56"; 154 + hash = "sha256-4lsL6hg1mposZ62buQWBud1B4raV8Pl+BkyvM4FraRM="; 155 + }) 156 + (fetchNuGet { 157 + pname = "Microsoft.VisualStudio.Validation"; 158 + version = "15.5.31"; 159 + hash = "sha256-/NWbGyad7wejY8QyxK8YWTgiRiUGjimaBgoLkWxOCao="; 160 + }) 161 + (fetchNuGet { 162 + pname = "Microsoft.Win32.Primitives"; 163 + version = "4.3.0"; 164 + hash = "sha256-mBNDmPXNTW54XLnPAUwBRvkIORFM7/j0D0I2SyQPDEg="; 165 + }) 166 + (fetchNuGet { 167 + pname = "Microsoft.Win32.Registry"; 168 + version = "4.6.0"; 169 + hash = "sha256-Wrj0Sc9srH5+ma0lCbgRYYP6gKgnlXcL6h7j7AU6nkQ="; 170 + }) 171 + (fetchNuGet { 172 + pname = "Moq"; 173 + version = "4.16.1"; 174 + hash = "sha256-9CCEY6246RbB4zaF5xwCDf2XuGoPDpZoJsjrB/riT9Q="; 175 + }) 176 + (fetchNuGet { 177 + pname = "Nerdbank.Streams"; 178 + version = "2.6.77"; 179 + hash = "sha256-rOBiYpZQ0rrM9wbWOjzCYIbxcWa3tCrdPt1rpDp3to0="; 180 + }) 181 + (fetchNuGet { 182 + pname = "NETStandard.Library"; 183 + version = "1.6.1"; 184 + hash = "sha256-iNan1ix7RtncGWC9AjAZ2sk70DoxOsmEOgQ10fXm4Pw="; 185 + }) 186 + (fetchNuGet { 187 + pname = "Newtonsoft.Json"; 188 + version = "12.0.2"; 189 + hash = "sha256-BW7sXT2LKpP3ylsCbTTZ1f6Mg1sR4yL68aJVHaJcTnA="; 190 + }) 191 + (fetchNuGet { 192 + pname = "Newtonsoft.Json"; 193 + version = "13.0.1"; 194 + hash = "sha256-K2tSVW4n4beRPzPu3rlVaBEMdGvWSv/3Q1fxaDh4Mjo="; 195 + }) 196 + (fetchNuGet { 197 + pname = "Newtonsoft.Json"; 198 + version = "13.0.3"; 199 + hash = "sha256-hy/BieY4qxBWVVsDqqOPaLy1QobiIapkbrESm6v2PHc="; 200 + }) 201 + (fetchNuGet { 202 + pname = "Newtonsoft.Json"; 203 + version = "9.0.1"; 204 + hash = "sha256-mYCBrgUhIJFzRuLLV9SIiIFHovzfR8Uuqfg6e08EnlU="; 205 + }) 206 + (fetchNuGet { 207 + pname = "Newtonsoft.Json.Schema"; 208 + version = "3.0.15"; 209 + hash = "sha256-l2r1pkQ9d+SbuMXkEbbsunDKpd2G9+uFG857dvtPrNo="; 210 + }) 211 + (fetchNuGet { 212 + pname = "NuGet.Frameworks"; 213 + version = "5.0.0"; 214 + hash = "sha256-WWLh+v9Y9as+WURW8tUPowQB8HWIiVJzbpKzEWTdMqI="; 215 + }) 216 + (fetchNuGet { 217 + pname = "Octokit"; 218 + version = "0.50.0"; 219 + hash = "sha256-GJ+9HkF8FNOB7O2d32fPvMrmUqYcAJ4xToEFZWKR9sU="; 220 + }) 221 + (fetchNuGet { 222 + pname = "PangoSharp"; 223 + version = "3.24.24.34"; 224 + hash = "sha256-/KdH3SA/11bkwPe/AXRph4v4a2cjbUjDvo4+OhkJEOQ="; 225 + }) 226 + (fetchNuGet { 227 + pname = "runtime.any.System.Collections"; 228 + version = "4.3.0"; 229 + hash = "sha256-4PGZqyWhZ6/HCTF2KddDsbmTTjxs2oW79YfkberDZS8="; 230 + }) 231 + (fetchNuGet { 232 + pname = "runtime.any.System.Diagnostics.Tools"; 233 + version = "4.3.0"; 234 + hash = "sha256-8yLKFt2wQxkEf7fNfzB+cPUCjYn2qbqNgQ1+EeY2h/I="; 235 + }) 236 + (fetchNuGet { 237 + pname = "runtime.any.System.Diagnostics.Tracing"; 238 + version = "4.3.0"; 239 + hash = "sha256-dsmTLGvt8HqRkDWP8iKVXJCS+akAzENGXKPV18W2RgI="; 240 + }) 241 + (fetchNuGet { 242 + pname = "runtime.any.System.Globalization"; 243 + version = "4.3.0"; 244 + hash = "sha256-PaiITTFI2FfPylTEk7DwzfKeiA/g/aooSU1pDcdwWLU="; 245 + }) 246 + (fetchNuGet { 247 + pname = "runtime.any.System.Globalization.Calendars"; 248 + version = "4.3.0"; 249 + hash = "sha256-AYh39tgXJVFu8aLi9Y/4rK8yWMaza4S4eaxjfcuEEL4="; 250 + }) 251 + (fetchNuGet { 252 + pname = "runtime.any.System.IO"; 253 + version = "4.3.0"; 254 + hash = "sha256-vej7ySRhyvM3pYh/ITMdC25ivSd0WLZAaIQbYj/6HVE="; 255 + }) 256 + (fetchNuGet { 257 + pname = "runtime.any.System.Reflection"; 258 + version = "4.3.0"; 259 + hash = "sha256-ns6f++lSA+bi1xXgmW1JkWFb2NaMD+w+YNTfMvyAiQk="; 260 + }) 261 + (fetchNuGet { 262 + pname = "runtime.any.System.Reflection.Extensions"; 263 + version = "4.3.0"; 264 + hash = "sha256-Y2AnhOcJwJVYv7Rp6Jz6ma0fpITFqJW+8rsw106K2X8="; 265 + }) 266 + (fetchNuGet { 267 + pname = "runtime.any.System.Reflection.Primitives"; 268 + version = "4.3.0"; 269 + hash = "sha256-LkPXtiDQM3BcdYkAm5uSNOiz3uF4J45qpxn5aBiqNXQ="; 270 + }) 271 + (fetchNuGet { 272 + pname = "runtime.any.System.Resources.ResourceManager"; 273 + version = "4.3.0"; 274 + hash = "sha256-9EvnmZslLgLLhJ00o5MWaPuJQlbUFcUF8itGQNVkcQ4="; 275 + }) 276 + (fetchNuGet { 277 + pname = "runtime.any.System.Runtime"; 278 + version = "4.3.0"; 279 + hash = "sha256-qwhNXBaJ1DtDkuRacgHwnZmOZ1u9q7N8j0cWOLYOELM="; 280 + }) 281 + (fetchNuGet { 282 + pname = "runtime.any.System.Runtime.Handles"; 283 + version = "4.3.0"; 284 + hash = "sha256-PQRACwnSUuxgVySO1840KvqCC9F8iI9iTzxNW0RcBS4="; 285 + }) 286 + (fetchNuGet { 287 + pname = "runtime.any.System.Runtime.InteropServices"; 288 + version = "4.3.0"; 289 + hash = "sha256-Kaw5PnLYIiqWbsoF3VKJhy7pkpoGsUwn4ZDCKscbbzA="; 290 + }) 291 + (fetchNuGet { 292 + pname = "runtime.any.System.Text.Encoding"; 293 + version = "4.3.0"; 294 + hash = "sha256-Q18B9q26MkWZx68exUfQT30+0PGmpFlDgaF0TnaIGCs="; 295 + }) 296 + (fetchNuGet { 297 + pname = "runtime.any.System.Text.Encoding.Extensions"; 298 + version = "4.3.0"; 299 + hash = "sha256-6MYj0RmLh4EVqMtO/MRqBi0HOn5iG4x9JimgCCJ+EFM="; 300 + }) 301 + (fetchNuGet { 302 + pname = "runtime.any.System.Threading.Tasks"; 303 + version = "4.3.0"; 304 + hash = "sha256-agdOM0NXupfHbKAQzQT8XgbI9B8hVEh+a/2vqeHctg4="; 305 + }) 306 + (fetchNuGet { 307 + pname = "runtime.any.System.Threading.Timer"; 308 + version = "4.3.0"; 309 + hash = "sha256-BgHxXCIbicVZtpgMimSXixhFC3V+p5ODqeljDjO8hCs="; 310 + }) 311 + (fetchNuGet { 312 + pname = "runtime.debian.8-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 313 + version = "4.3.0"; 314 + hash = "sha256-LXUPLX3DJxsU1Pd3UwjO1PO9NM2elNEDXeu2Mu/vNps="; 315 + }) 316 + (fetchNuGet { 317 + pname = "runtime.debian.8-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 318 + version = "4.3.2"; 319 + hash = "sha256-EbnOqPOrAgI9eNheXLR++VnY4pHzMsEKw1dFPJ/Fl2c="; 320 + }) 321 + (fetchNuGet { 322 + pname = "runtime.fedora.23-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 323 + version = "4.3.0"; 324 + hash = "sha256-qeSqaUI80+lqw5MK4vMpmO0CZaqrmYktwp6L+vQAb0I="; 325 + }) 326 + (fetchNuGet { 327 + pname = "runtime.fedora.23-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 328 + version = "4.3.2"; 329 + hash = "sha256-mVg02TNvJc1BuHU03q3fH3M6cMgkKaQPBxraSHl/Btg="; 330 + }) 331 + (fetchNuGet { 332 + pname = "runtime.fedora.24-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 333 + version = "4.3.0"; 334 + hash = "sha256-SrHqT9wrCBsxILWtaJgGKd6Odmxm8/Mh7Kh0CUkZVzA="; 335 + }) 336 + (fetchNuGet { 337 + pname = "runtime.fedora.24-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 338 + version = "4.3.2"; 339 + hash = "sha256-g9Uiikrl+M40hYe0JMlGHe/lrR0+nN05YF64wzLmBBA="; 340 + }) 341 + (fetchNuGet { 342 + pname = "runtime.native.System"; 343 + version = "4.3.0"; 344 + hash = "sha256-ZBZaodnjvLXATWpXXakFgcy6P+gjhshFXmglrL5xD5Y="; 345 + }) 346 + (fetchNuGet { 347 + pname = "runtime.native.System.IO.Compression"; 348 + version = "4.3.0"; 349 + hash = "sha256-DWnXs4vlKoU6WxxvCArTJupV6sX3iBbZh8SbqfHace8="; 350 + }) 351 + (fetchNuGet { 352 + pname = "runtime.native.System.Net.Http"; 353 + version = "4.3.0"; 354 + hash = "sha256-c556PyheRwpYhweBjSfIwEyZHnAUB8jWioyKEcp/2dg="; 355 + }) 356 + (fetchNuGet { 357 + pname = "runtime.native.System.Security.Cryptography.Apple"; 358 + version = "4.3.0"; 359 + hash = "sha256-2IhBv0i6pTcOyr8FFIyfPEaaCHUmJZ8DYwLUwJ+5waw="; 360 + }) 361 + (fetchNuGet { 362 + pname = "runtime.native.System.Security.Cryptography.OpenSsl"; 363 + version = "4.3.0"; 364 + hash = "sha256-Jy01KhtcCl2wjMpZWH+X3fhHcVn+SyllWFY8zWlz/6I="; 365 + }) 366 + (fetchNuGet { 367 + pname = "runtime.native.System.Security.Cryptography.OpenSsl"; 368 + version = "4.3.2"; 369 + hash = "sha256-xqF6LbbtpzNC9n1Ua16PnYgXHU0LvblEROTfK4vIxX8="; 370 + }) 371 + (fetchNuGet { 372 + pname = "runtime.opensuse.13.2-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 373 + version = "4.3.0"; 374 + hash = "sha256-wyv00gdlqf8ckxEdV7E+Ql9hJIoPcmYEuyeWb5Oz3mM="; 375 + }) 376 + (fetchNuGet { 377 + pname = "runtime.opensuse.13.2-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 378 + version = "4.3.2"; 379 + hash = "sha256-aJBu6Frcg6webvzVcKNoUP1b462OAqReF2giTSyBzCQ="; 380 + }) 381 + (fetchNuGet { 382 + pname = "runtime.opensuse.42.1-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 383 + version = "4.3.0"; 384 + hash = "sha256-zi+b4sCFrA9QBiSGDD7xPV27r3iHGlV99gpyVUjRmc4="; 385 + }) 386 + (fetchNuGet { 387 + pname = "runtime.opensuse.42.1-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 388 + version = "4.3.2"; 389 + hash = "sha256-Mpt7KN2Kq51QYOEVesEjhWcCGTqWckuPf8HlQ110qLY="; 390 + }) 391 + (fetchNuGet { 392 + pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.Apple"; 393 + version = "4.3.0"; 394 + hash = "sha256-serkd4A7F6eciPiPJtUyJyxzdAtupEcWIZQ9nptEzIM="; 395 + }) 396 + (fetchNuGet { 397 + pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 398 + version = "4.3.0"; 399 + hash = "sha256-gybQU6mPgaWV3rBG2dbH6tT3tBq8mgze3PROdsuWnX0="; 400 + }) 401 + (fetchNuGet { 402 + pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 403 + version = "4.3.2"; 404 + hash = "sha256-JvMltmfVC53mCZtKDHE69G3RT6Id28hnskntP9MMP9U="; 405 + }) 406 + (fetchNuGet { 407 + pname = "runtime.rhel.7-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 408 + version = "4.3.0"; 409 + hash = "sha256-VsP72GVveWnGUvS/vjOQLv1U80H2K8nZ4fDAmI61Hm4="; 410 + }) 411 + (fetchNuGet { 412 + pname = "runtime.rhel.7-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 413 + version = "4.3.2"; 414 + hash = "sha256-QfFxWTVRNBhN4Dm1XRbCf+soNQpy81PsZed3x6op/bI="; 415 + }) 416 + (fetchNuGet { 417 + pname = "runtime.ubuntu.14.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 418 + version = "4.3.0"; 419 + hash = "sha256-4yKGa/IrNCKuQ3zaDzILdNPD32bNdy6xr5gdJigyF5g="; 420 + }) 421 + (fetchNuGet { 422 + pname = "runtime.ubuntu.14.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 423 + version = "4.3.2"; 424 + hash = "sha256-EaJHVc9aDZ6F7ltM2JwlIuiJvqM67CKRq682iVSo+pU="; 425 + }) 426 + (fetchNuGet { 427 + pname = "runtime.ubuntu.16.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 428 + version = "4.3.0"; 429 + hash = "sha256-HmdJhhRsiVoOOCcUvAwdjpMRiyuSwdcgEv2j9hxi+Zc="; 430 + }) 431 + (fetchNuGet { 432 + pname = "runtime.ubuntu.16.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 433 + version = "4.3.2"; 434 + hash = "sha256-PHR0+6rIjJswn89eoiWYY1DuU8u6xRJLrtjykAMuFmA="; 435 + }) 436 + (fetchNuGet { 437 + pname = "runtime.ubuntu.16.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 438 + version = "4.3.0"; 439 + hash = "sha256-pVFUKuPPIx0edQKjzRon3zKq8zhzHEzko/lc01V/jdw="; 440 + }) 441 + (fetchNuGet { 442 + pname = "runtime.ubuntu.16.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; 443 + version = "4.3.2"; 444 + hash = "sha256-LFkh7ua7R4rI5w2KGjcHlGXLecsncCy6kDXLuy4qD/Q="; 445 + }) 446 + (fetchNuGet { 447 + pname = "runtime.unix.Microsoft.Win32.Primitives"; 448 + version = "4.3.0"; 449 + hash = "sha256-LZb23lRXzr26tRS5aA0xyB08JxiblPDoA7HBvn6awXg="; 450 + }) 451 + (fetchNuGet { 452 + pname = "runtime.unix.System.Console"; 453 + version = "4.3.0"; 454 + hash = "sha256-AHkdKShTRHttqfMjmi+lPpTuCrM5vd/WRy6Kbtie190="; 455 + }) 456 + (fetchNuGet { 457 + pname = "runtime.unix.System.Diagnostics.Debug"; 458 + version = "4.3.0"; 459 + hash = "sha256-ReoazscfbGH+R6s6jkg5sIEHWNEvjEoHtIsMbpc7+tI="; 460 + }) 461 + (fetchNuGet { 462 + pname = "runtime.unix.System.IO.FileSystem"; 463 + version = "4.3.0"; 464 + hash = "sha256-Pf4mRl6YDK2x2KMh0WdyNgv0VUNdSKVDLlHqozecy5I="; 465 + }) 466 + (fetchNuGet { 467 + pname = "runtime.unix.System.Net.Primitives"; 468 + version = "4.3.0"; 469 + hash = "sha256-pHJ+I6i16MV6m77uhTC6GPY6jWGReE3SSP3fVB59ti0="; 470 + }) 471 + (fetchNuGet { 472 + pname = "runtime.unix.System.Net.Sockets"; 473 + version = "4.3.0"; 474 + hash = "sha256-IvgOeA2JuBjKl5yAVGjPYMPDzs9phb3KANs95H9v1w4="; 475 + }) 476 + (fetchNuGet { 477 + pname = "runtime.unix.System.Private.Uri"; 478 + version = "4.3.0"; 479 + hash = "sha256-c5tXWhE/fYbJVl9rXs0uHh3pTsg44YD1dJvyOA0WoMs="; 480 + }) 481 + (fetchNuGet { 482 + pname = "runtime.unix.System.Runtime.Extensions"; 483 + version = "4.3.0"; 484 + hash = "sha256-l8S9gt6dk3qYG6HYonHtdlYtBKyPb29uQ6NDjmrt3V4="; 485 + }) 486 + (fetchNuGet { 487 + pname = "SharpZipLib"; 488 + version = "1.3.3"; 489 + hash = "sha256-HWEQTKh9Ktwg/zIl079dAiH+ob2ShWFAqLgG6XgIMr4="; 490 + }) 491 + (fetchNuGet { 492 + pname = "StreamJsonRpc"; 493 + version = "2.6.121"; 494 + hash = "sha256-5tSk90kVoj0YRbuS1YIohu+c5zvykNd+s1MLfsK8+3c="; 495 + }) 496 + (fetchNuGet { 497 + pname = "System.AppContext"; 498 + version = "4.3.0"; 499 + hash = "sha256-yg95LNQOwFlA1tWxXdQkVyJqT4AnoDc+ACmrNvzGiZg="; 500 + }) 501 + (fetchNuGet { 502 + pname = "System.Buffers"; 503 + version = "4.3.0"; 504 + hash = "sha256-XqZWb4Kd04960h4U9seivjKseGA/YEIpdplfHYHQ9jk="; 505 + }) 506 + (fetchNuGet { 507 + pname = "System.Collections"; 508 + version = "4.0.11"; 509 + hash = "sha256-puoFMkx4Z55C1XPxNw3np8nzNGjH+G24j43yTIsDRL0="; 510 + }) 511 + (fetchNuGet { 512 + pname = "System.Collections"; 513 + version = "4.3.0"; 514 + hash = "sha256-afY7VUtD6w/5mYqrce8kQrvDIfS2GXDINDh73IjxJKc="; 515 + }) 516 + (fetchNuGet { 517 + pname = "System.Collections.Concurrent"; 518 + version = "4.3.0"; 519 + hash = "sha256-KMY5DfJnDeIsa13DpqvyN8NkReZEMAFnlmNglVoFIXI="; 520 + }) 521 + (fetchNuGet { 522 + pname = "System.Collections.Immutable"; 523 + version = "1.7.1"; 524 + hash = "sha256-WMMAUqoxT3J1gW9DI8v31VAuhwqTc4Posose5jq1BNo="; 525 + }) 526 + (fetchNuGet { 527 + pname = "System.Collections.NonGeneric"; 528 + version = "4.3.0"; 529 + hash = "sha256-8/yZmD4jjvq7m68SPkJZLBQ79jOTOyT5lyzX4SCYAx8="; 530 + }) 531 + (fetchNuGet { 532 + pname = "System.Collections.Specialized"; 533 + version = "4.3.0"; 534 + hash = "sha256-QNg0JJNx+zXMQ26MJRPzH7THdtqjrNtGLUgaR1SdvOk="; 535 + }) 536 + (fetchNuGet { 537 + pname = "System.CommandLine"; 538 + version = "2.0.0-beta4.22272.1"; 539 + hash = "sha256-zSO+CYnMH8deBHDI9DHhCPj79Ce3GOzHCyH1/TiHxcc="; 540 + }) 541 + (fetchNuGet { 542 + pname = "System.ComponentModel"; 543 + version = "4.3.0"; 544 + hash = "sha256-i00uujMO4JEDIEPKLmdLY3QJ6vdSpw6Gh9oOzkFYBiU="; 545 + }) 546 + (fetchNuGet { 547 + pname = "System.ComponentModel.Annotations"; 548 + version = "4.7.0"; 549 + hash = "sha256-PxG9lvf2v/IAIs7LhO4Ur+EpX/L5nYbEs0D21gypoRs="; 550 + }) 551 + (fetchNuGet { 552 + pname = "System.ComponentModel.Annotations"; 553 + version = "5.0.0"; 554 + hash = "sha256-0pST1UHgpeE6xJrYf5R+U7AwIlH3rVC3SpguilI/MAg="; 555 + }) 556 + (fetchNuGet { 557 + pname = "System.ComponentModel.Primitives"; 558 + version = "4.3.0"; 559 + hash = "sha256-IOMJleuIBppmP4ECB3uftbdcgL7CCd56+oAD/Sqrbus="; 560 + }) 561 + (fetchNuGet { 562 + pname = "System.ComponentModel.TypeConverter"; 563 + version = "4.3.0"; 564 + hash = "sha256-PSDiPYt8PgTdTUBz+GH6lHCaM1YgfObneHnZsc8Fz54="; 565 + }) 566 + (fetchNuGet { 567 + pname = "System.Console"; 568 + version = "4.3.0"; 569 + hash = "sha256-Xh3PPBZr0pDbDaK8AEHbdGz7ePK6Yi1ZyRWI1JM6mbo="; 570 + }) 571 + (fetchNuGet { 572 + pname = "System.Diagnostics.Debug"; 573 + version = "4.0.11"; 574 + hash = "sha256-P+rSQJVoN6M56jQbs76kZ9G3mAWFdtF27P/RijN8sj4="; 575 + }) 576 + (fetchNuGet { 577 + pname = "System.Diagnostics.Debug"; 578 + version = "4.3.0"; 579 + hash = "sha256-fkA79SjPbSeiEcrbbUsb70u9B7wqbsdM9s1LnoKj0gM="; 580 + }) 581 + (fetchNuGet { 582 + pname = "System.Diagnostics.DiagnosticSource"; 583 + version = "4.3.0"; 584 + hash = "sha256-OFJRb0ygep0Z3yDBLwAgM/Tkfs4JCDtsNhwDH9cd1Xw="; 585 + }) 586 + (fetchNuGet { 587 + pname = "System.Diagnostics.Tools"; 588 + version = "4.0.1"; 589 + hash = "sha256-vSBqTbmWXylvRa37aWyktym+gOpsvH43mwr6A962k6U="; 590 + }) 591 + (fetchNuGet { 592 + pname = "System.Diagnostics.Tools"; 593 + version = "4.3.0"; 594 + hash = "sha256-gVOv1SK6Ape0FQhCVlNOd9cvQKBvMxRX9K0JPVi8w0Y="; 595 + }) 596 + (fetchNuGet { 597 + pname = "System.Diagnostics.TraceSource"; 598 + version = "4.3.0"; 599 + hash = "sha256-xpxwaXsRcgso8Gj0cqY4+Hvvz6vZkmEMh5/J204j3M8="; 600 + }) 601 + (fetchNuGet { 602 + pname = "System.Diagnostics.Tracing"; 603 + version = "4.3.0"; 604 + hash = "sha256-hCETZpHHGVhPYvb4C0fh4zs+8zv4GPoixagkLZjpa9Q="; 605 + }) 606 + (fetchNuGet { 607 + pname = "System.Dynamic.Runtime"; 608 + version = "4.0.11"; 609 + hash = "sha256-qWqFVxuXioesVftv2RVJZOnmojUvRjb7cS3Oh3oTit4="; 610 + }) 611 + (fetchNuGet { 612 + pname = "System.Dynamic.Runtime"; 613 + version = "4.3.0"; 614 + hash = "sha256-k75gjOYimIQtLBD5NDzwwi3ZMUBPRW3jmc3evDMMJbU="; 615 + }) 616 + (fetchNuGet { 617 + pname = "System.Globalization"; 618 + version = "4.0.11"; 619 + hash = "sha256-rbSgc2PIEc2c2rN6LK3qCREAX3DqA2Nq1WcLrZYsDBw="; 620 + }) 621 + (fetchNuGet { 622 + pname = "System.Globalization"; 623 + version = "4.3.0"; 624 + hash = "sha256-caL0pRmFSEsaoeZeWN5BTQtGrAtaQPwFi8YOZPZG5rI="; 625 + }) 626 + (fetchNuGet { 627 + pname = "System.Globalization.Calendars"; 628 + version = "4.3.0"; 629 + hash = "sha256-uNOD0EOVFgnS2fMKvMiEtI9aOw00+Pfy/H+qucAQlPc="; 630 + }) 631 + (fetchNuGet { 632 + pname = "System.Globalization.Extensions"; 633 + version = "4.3.0"; 634 + hash = "sha256-mmJWA27T0GRVuFP9/sj+4TrR4GJWrzNIk2PDrbr7RQk="; 635 + }) 636 + (fetchNuGet { 637 + pname = "System.IO"; 638 + version = "4.1.0"; 639 + hash = "sha256-V6oyQFwWb8NvGxAwvzWnhPxy9dKOfj/XBM3tEC5aHrw="; 640 + }) 641 + (fetchNuGet { 642 + pname = "System.IO"; 643 + version = "4.3.0"; 644 + hash = "sha256-ruynQHekFP5wPrDiVyhNiRIXeZ/I9NpjK5pU+HPDiRY="; 645 + }) 646 + (fetchNuGet { 647 + pname = "System.IO.Compression"; 648 + version = "4.3.0"; 649 + hash = "sha256-f5PrQlQgj5Xj2ZnHxXW8XiOivaBvfqDao9Sb6AVinyA="; 650 + }) 651 + (fetchNuGet { 652 + pname = "System.IO.Compression.ZipFile"; 653 + version = "4.3.0"; 654 + hash = "sha256-WQl+JgWs+GaRMeiahTFUbrhlXIHapzcpTFXbRvAtvvs="; 655 + }) 656 + (fetchNuGet { 657 + pname = "System.IO.FileSystem"; 658 + version = "4.0.1"; 659 + hash = "sha256-4VKXFgcGYCTWVXjAlniAVq0dO3o5s8KHylg2wg2/7k0="; 660 + }) 661 + (fetchNuGet { 662 + pname = "System.IO.FileSystem"; 663 + version = "4.3.0"; 664 + hash = "sha256-vNIYnvlayuVj0WfRfYKpDrhDptlhp1pN8CYmlVd2TXw="; 665 + }) 666 + (fetchNuGet { 667 + pname = "System.IO.FileSystem.Primitives"; 668 + version = "4.0.1"; 669 + hash = "sha256-IpigKMomqb6pmYWkrlf0ZdpILtRluX2cX5sOKVW0Feg="; 670 + }) 671 + (fetchNuGet { 672 + pname = "System.IO.FileSystem.Primitives"; 673 + version = "4.3.0"; 674 + hash = "sha256-LMnfg8Vwavs9cMnq9nNH8IWtAtSfk0/Fy4s4Rt9r1kg="; 675 + }) 676 + (fetchNuGet { 677 + pname = "System.IO.Pipelines"; 678 + version = "4.7.2"; 679 + hash = "sha256-yWlQwmzMX+4kVQbOd9WowP6bvZnjo4yddkycer3CZJs="; 680 + }) 681 + (fetchNuGet { 682 + pname = "System.Linq"; 683 + version = "4.1.0"; 684 + hash = "sha256-ZQpFtYw5N1F1aX0jUK3Tw+XvM5tnlnshkTCNtfVA794="; 685 + }) 686 + (fetchNuGet { 687 + pname = "System.Linq"; 688 + version = "4.3.0"; 689 + hash = "sha256-R5uiSL3l6a3XrXSSL6jz+q/PcyVQzEAByiuXZNSqD/A="; 690 + }) 691 + (fetchNuGet { 692 + pname = "System.Linq.Expressions"; 693 + version = "4.1.0"; 694 + hash = "sha256-7zqB+FXgkvhtlBzpcZyd81xczWP0D3uWssyAGw3t7b4="; 695 + }) 696 + (fetchNuGet { 697 + pname = "System.Linq.Expressions"; 698 + version = "4.3.0"; 699 + hash = "sha256-+3pvhZY7rip8HCbfdULzjlC9FPZFpYoQxhkcuFm2wk8="; 700 + }) 701 + (fetchNuGet { 702 + pname = "System.Memory"; 703 + version = "4.5.4"; 704 + hash = "sha256-3sCEfzO4gj5CYGctl9ZXQRRhwAraMQfse7yzKoRe65E="; 705 + }) 706 + (fetchNuGet { 707 + pname = "System.Net.Http"; 708 + version = "4.3.0"; 709 + hash = "sha256-UoBB7WPDp2Bne/fwxKF0nE8grJ6FzTMXdT/jfsphj8Q="; 710 + }) 711 + (fetchNuGet { 712 + pname = "System.Net.Http"; 713 + version = "4.3.4"; 714 + hash = "sha256-FMoU0K7nlPLxoDju0NL21Wjlga9GpnAoQjsFhFYYt00="; 715 + }) 716 + (fetchNuGet { 717 + pname = "System.Net.NameResolution"; 718 + version = "4.3.0"; 719 + hash = "sha256-eGZwCBExWsnirWBHyp2sSSSXp6g7I6v53qNmwPgtJ5c="; 720 + }) 721 + (fetchNuGet { 722 + pname = "System.Net.Primitives"; 723 + version = "4.3.0"; 724 + hash = "sha256-MY7Z6vOtFMbEKaLW9nOSZeAjcWpwCtdO7/W1mkGZBzE="; 725 + }) 726 + (fetchNuGet { 727 + pname = "System.Net.Sockets"; 728 + version = "4.3.0"; 729 + hash = "sha256-il7dr5VT/QWDg/0cuh+4Es2u8LY//+qqiY9BZmYxSus="; 730 + }) 731 + (fetchNuGet { 732 + pname = "System.Net.WebSockets"; 733 + version = "4.3.0"; 734 + hash = "sha256-l3h3cF1cCC9zMhWLKSDnZBZvFADUd0Afe2+iAwBA0r0="; 735 + }) 736 + (fetchNuGet { 737 + pname = "System.ObjectModel"; 738 + version = "4.0.12"; 739 + hash = "sha256-MudZ/KYcvYsn2cST3EE049mLikrNkmE7QoUoYKKby+s="; 740 + }) 741 + (fetchNuGet { 742 + pname = "System.ObjectModel"; 743 + version = "4.3.0"; 744 + hash = "sha256-gtmRkWP2Kwr3nHtDh0yYtce38z1wrGzb6fjm4v8wN6Q="; 745 + }) 746 + (fetchNuGet { 747 + pname = "System.Private.Uri"; 748 + version = "4.3.0"; 749 + hash = "sha256-fVfgcoP4AVN1E5wHZbKBIOPYZ/xBeSIdsNF+bdukIRM="; 750 + }) 751 + (fetchNuGet { 752 + pname = "System.Reflection"; 753 + version = "4.1.0"; 754 + hash = "sha256-idZHGH2Yl/hha1CM4VzLhsaR8Ljo/rV7TYe7mwRJSMs="; 755 + }) 756 + (fetchNuGet { 757 + pname = "System.Reflection"; 758 + version = "4.3.0"; 759 + hash = "sha256-NQSZRpZLvtPWDlvmMIdGxcVuyUnw92ZURo0hXsEshXY="; 760 + }) 761 + (fetchNuGet { 762 + pname = "System.Reflection.Emit"; 763 + version = "4.0.1"; 764 + hash = "sha256-F1MvYoQWHCY89/O4JBwswogitqVvKuVfILFqA7dmuHk="; 765 + }) 766 + (fetchNuGet { 767 + pname = "System.Reflection.Emit"; 768 + version = "4.3.0"; 769 + hash = "sha256-5LhkDmhy2FkSxulXR+bsTtMzdU3VyyuZzsxp7/DwyIU="; 770 + }) 771 + (fetchNuGet { 772 + pname = "System.Reflection.Emit"; 773 + version = "4.7.0"; 774 + hash = "sha256-Fw/CSRD+wajH1MqfKS3Q/sIrUH7GN4K+F+Dx68UPNIg="; 775 + }) 776 + (fetchNuGet { 777 + pname = "System.Reflection.Emit.ILGeneration"; 778 + version = "4.0.1"; 779 + hash = "sha256-YG+eJBG5P+5adsHiw/lhJwvREnvdHw6CJyS8ZV4Ujd0="; 780 + }) 781 + (fetchNuGet { 782 + pname = "System.Reflection.Emit.ILGeneration"; 783 + version = "4.3.0"; 784 + hash = "sha256-mKRknEHNls4gkRwrEgi39B+vSaAz/Gt3IALtS98xNnA="; 785 + }) 786 + (fetchNuGet { 787 + pname = "System.Reflection.Emit.Lightweight"; 788 + version = "4.0.1"; 789 + hash = "sha256-uVvNOnL64CPqsgZP2OLqNmxdkZl6Q0fTmKmv9gcBi+g="; 790 + }) 791 + (fetchNuGet { 792 + pname = "System.Reflection.Emit.Lightweight"; 793 + version = "4.3.0"; 794 + hash = "sha256-rKx4a9yZKcajloSZHr4CKTVJ6Vjh95ni+zszPxWjh2I="; 795 + }) 796 + (fetchNuGet { 797 + pname = "System.Reflection.Emit.Lightweight"; 798 + version = "4.6.0"; 799 + hash = "sha256-913OIkt3v3N12Yke328IRxTtgYUQYNs/eSzOs8wUPkM="; 800 + }) 801 + (fetchNuGet { 802 + pname = "System.Reflection.Extensions"; 803 + version = "4.0.1"; 804 + hash = "sha256-NsfmzM9G/sN3H8X2cdnheTGRsh7zbRzvegnjDzDH/FQ="; 805 + }) 806 + (fetchNuGet { 807 + pname = "System.Reflection.Extensions"; 808 + version = "4.3.0"; 809 + hash = "sha256-mMOCYzUenjd4rWIfq7zIX9PFYk/daUyF0A8l1hbydAk="; 810 + }) 811 + (fetchNuGet { 812 + pname = "System.Reflection.Metadata"; 813 + version = "1.6.0"; 814 + hash = "sha256-JJfgaPav7UfEh4yRAQdGhLZF1brr0tUWPl6qmfNWq/E="; 815 + }) 816 + (fetchNuGet { 817 + pname = "System.Reflection.Primitives"; 818 + version = "4.0.1"; 819 + hash = "sha256-SFSfpWEyCBMAOerrMCOiKnpT+UAWTvRcmoRquJR6Vq0="; 820 + }) 821 + (fetchNuGet { 822 + pname = "System.Reflection.Primitives"; 823 + version = "4.3.0"; 824 + hash = "sha256-5ogwWB4vlQTl3jjk1xjniG2ozbFIjZTL9ug0usZQuBM="; 825 + }) 826 + (fetchNuGet { 827 + pname = "System.Reflection.TypeExtensions"; 828 + version = "4.1.0"; 829 + hash = "sha256-R0YZowmFda+xzKNR4kKg7neFoE30KfZwp/IwfRSKVK4="; 830 + }) 831 + (fetchNuGet { 832 + pname = "System.Reflection.TypeExtensions"; 833 + version = "4.3.0"; 834 + hash = "sha256-4U4/XNQAnddgQIHIJq3P2T80hN0oPdU2uCeghsDTWng="; 835 + }) 836 + (fetchNuGet { 837 + pname = "System.Resources.ResourceManager"; 838 + version = "4.0.1"; 839 + hash = "sha256-cZ2/3/fczLjEpn6j3xkgQV9ouOVjy4Kisgw5xWw9kSw="; 840 + }) 841 + (fetchNuGet { 842 + pname = "System.Resources.ResourceManager"; 843 + version = "4.3.0"; 844 + hash = "sha256-idiOD93xbbrbwwSnD4mORA9RYi/D/U48eRUsn/WnWGo="; 845 + }) 846 + (fetchNuGet { 847 + pname = "System.Runtime"; 848 + version = "4.1.0"; 849 + hash = "sha256-FViNGM/4oWtlP6w0JC0vJU+k9efLKZ+yaXrnEeabDQo="; 850 + }) 851 + (fetchNuGet { 852 + pname = "System.Runtime"; 853 + version = "4.3.0"; 854 + hash = "sha256-51813WXpBIsuA6fUtE5XaRQjcWdQ2/lmEokJt97u0Rg="; 855 + }) 856 + (fetchNuGet { 857 + pname = "System.Runtime.CompilerServices.Unsafe"; 858 + version = "4.5.2"; 859 + hash = "sha256-8eUXXGWO2LL7uATMZye2iCpQOETn2jCcjUhG6coR5O8="; 860 + }) 861 + (fetchNuGet { 862 + pname = "System.Runtime.CompilerServices.Unsafe"; 863 + version = "4.7.1"; 864 + hash = "sha256-UvyoDV8O0oY3HPG1GbA56YVdvwTGEfjYR5gW1O7IK4U="; 865 + }) 866 + (fetchNuGet { 867 + pname = "System.Runtime.CompilerServices.Unsafe"; 868 + version = "6.0.0-rc.1.21451.13"; 869 + hash = "sha256-BgiqR6Y555tJEBEqDT5+yHCyQy5Wv9bLKlKWcQFiq2w="; 870 + }) 871 + (fetchNuGet { 872 + pname = "System.Runtime.Extensions"; 873 + version = "4.1.0"; 874 + hash = "sha256-X7DZ5CbPY7jHs20YZ7bmcXs9B5Mxptu/HnBUvUnNhGc="; 875 + }) 876 + (fetchNuGet { 877 + pname = "System.Runtime.Extensions"; 878 + version = "4.3.0"; 879 + hash = "sha256-wLDHmozr84v1W2zYCWYxxj0FR0JDYHSVRaRuDm0bd/o="; 880 + }) 881 + (fetchNuGet { 882 + pname = "System.Runtime.Handles"; 883 + version = "4.0.1"; 884 + hash = "sha256-j2QgVO9ZOjv7D1het98CoFpjoYgxjupuIhuBUmLLH7w="; 885 + }) 886 + (fetchNuGet { 887 + pname = "System.Runtime.Handles"; 888 + version = "4.3.0"; 889 + hash = "sha256-KJ5aXoGpB56Y6+iepBkdpx/AfaJDAitx4vrkLqR7gms="; 890 + }) 891 + (fetchNuGet { 892 + pname = "System.Runtime.InteropServices"; 893 + version = "4.1.0"; 894 + hash = "sha256-QceAYlJvkPRJc/+5jR+wQpNNI3aqGySWWSO30e/FfQY="; 895 + }) 896 + (fetchNuGet { 897 + pname = "System.Runtime.InteropServices"; 898 + version = "4.3.0"; 899 + hash = "sha256-8sDH+WUJfCR+7e4nfpftj/+lstEiZixWUBueR2zmHgI="; 900 + }) 901 + (fetchNuGet { 902 + pname = "System.Runtime.InteropServices.RuntimeInformation"; 903 + version = "4.3.0"; 904 + hash = "sha256-MYpl6/ZyC6hjmzWRIe+iDoldOMW1mfbwXsduAnXIKGA="; 905 + }) 906 + (fetchNuGet { 907 + pname = "System.Runtime.Numerics"; 908 + version = "4.3.0"; 909 + hash = "sha256-P5jHCgMbgFMYiONvzmaKFeOqcAIDPu/U8bOVrNPYKqc="; 910 + }) 911 + (fetchNuGet { 912 + pname = "System.Runtime.Serialization.Primitives"; 913 + version = "4.1.1"; 914 + hash = "sha256-80B05oxJbPLGq2pGOSl6NlZvintX9A1CNpna2aN0WRA="; 915 + }) 916 + (fetchNuGet { 917 + pname = "System.Security.AccessControl"; 918 + version = "4.6.0"; 919 + hash = "sha256-rspJ63MbjNVDve0owXby0Pu2vHjQvR2uuhCDCJ9vgfI="; 920 + }) 921 + (fetchNuGet { 922 + pname = "System.Security.Claims"; 923 + version = "4.3.0"; 924 + hash = "sha256-Fua/rDwAqq4UByRVomAxMPmDBGd5eImRqHVQIeSxbks="; 925 + }) 926 + (fetchNuGet { 927 + pname = "System.Security.Cryptography.Algorithms"; 928 + version = "4.3.0"; 929 + hash = "sha256-tAJvNSlczYBJ3Ed24Ae27a55tq/n4D3fubNQdwcKWA8="; 930 + }) 931 + (fetchNuGet { 932 + pname = "System.Security.Cryptography.Cng"; 933 + version = "4.3.0"; 934 + hash = "sha256-u17vy6wNhqok91SrVLno2M1EzLHZm6VMca85xbVChsw="; 935 + }) 936 + (fetchNuGet { 937 + pname = "System.Security.Cryptography.Csp"; 938 + version = "4.3.0"; 939 + hash = "sha256-oefdTU/Z2PWU9nlat8uiRDGq/PGZoSPRgkML11pmvPQ="; 940 + }) 941 + (fetchNuGet { 942 + pname = "System.Security.Cryptography.Encoding"; 943 + version = "4.3.0"; 944 + hash = "sha256-Yuge89N6M+NcblcvXMeyHZ6kZDfwBv3LPMDiF8HhJss="; 945 + }) 946 + (fetchNuGet { 947 + pname = "System.Security.Cryptography.OpenSsl"; 948 + version = "4.3.0"; 949 + hash = "sha256-DL+D2sc2JrQiB4oAcUggTFyD8w3aLEjJfod5JPe+Oz4="; 950 + }) 951 + (fetchNuGet { 952 + pname = "System.Security.Cryptography.Primitives"; 953 + version = "4.3.0"; 954 + hash = "sha256-fnFi7B3SnVj5a+BbgXnbjnGNvWrCEU6Hp/wjsjWz318="; 955 + }) 956 + (fetchNuGet { 957 + pname = "System.Security.Cryptography.X509Certificates"; 958 + version = "4.3.0"; 959 + hash = "sha256-MG3V/owDh273GCUPsGGraNwaVpcydupl3EtPXj6TVG0="; 960 + }) 961 + (fetchNuGet { 962 + pname = "System.Security.Principal"; 963 + version = "4.3.0"; 964 + hash = "sha256-rjudVUHdo8pNJg2EVEn0XxxwNo5h2EaYo+QboPkXlYk="; 965 + }) 966 + (fetchNuGet { 967 + pname = "System.Security.Principal.Windows"; 968 + version = "4.3.0"; 969 + hash = "sha256-mbdLVUcEwe78p3ZnB6jYsizNEqxMaCAWI3tEQNhRQAE="; 970 + }) 971 + (fetchNuGet { 972 + pname = "System.Security.Principal.Windows"; 973 + version = "4.6.0"; 974 + hash = "sha256-lZeXm45RboVgqnPQVJ65y8b5b+9FSVr0MBciG777rso="; 975 + }) 976 + (fetchNuGet { 977 + pname = "System.Text.Encoding"; 978 + version = "4.0.11"; 979 + hash = "sha256-PEailOvG05CVgPTyKLtpAgRydlSHmtd5K0Y8GSHY2Lc="; 980 + }) 981 + (fetchNuGet { 982 + pname = "System.Text.Encoding"; 983 + version = "4.3.0"; 984 + hash = "sha256-GctHVGLZAa/rqkBNhsBGnsiWdKyv6VDubYpGkuOkBLg="; 985 + }) 986 + (fetchNuGet { 987 + pname = "System.Text.Encoding.Extensions"; 988 + version = "4.0.11"; 989 + hash = "sha256-+kf7J3dEhgCbnCM5vHYlsTm5/R/Ud0Jr6elpHm922iI="; 990 + }) 991 + (fetchNuGet { 992 + pname = "System.Text.Encoding.Extensions"; 993 + version = "4.3.0"; 994 + hash = "sha256-vufHXg8QAKxHlujPHHcrtGwAqFmsCD6HKjfDAiHyAYc="; 995 + }) 996 + (fetchNuGet { 997 + pname = "System.Text.RegularExpressions"; 998 + version = "4.1.0"; 999 + hash = "sha256-x6OQN6MCN7S0fJ6EFTfv4rczdUWjwuWE9QQ0P6fbh9c="; 1000 + }) 1001 + (fetchNuGet { 1002 + pname = "System.Text.RegularExpressions"; 1003 + version = "4.3.0"; 1004 + hash = "sha256-VLCk1D1kcN2wbAe3d0YQM/PqCsPHOuqlBY1yd2Yo+K0="; 1005 + }) 1006 + (fetchNuGet { 1007 + pname = "System.Threading"; 1008 + version = "4.0.11"; 1009 + hash = "sha256-mob1Zv3qLQhQ1/xOLXZmYqpniNUMCfn02n8ZkaAhqac="; 1010 + }) 1011 + (fetchNuGet { 1012 + pname = "System.Threading"; 1013 + version = "4.3.0"; 1014 + hash = "sha256-ZDQ3dR4pzVwmaqBg4hacZaVenQ/3yAF/uV7BXZXjiWc="; 1015 + }) 1016 + (fetchNuGet { 1017 + pname = "System.Threading.Tasks"; 1018 + version = "4.0.11"; 1019 + hash = "sha256-5SLxzFg1df6bTm2t09xeI01wa5qQglqUwwJNlQPJIVs="; 1020 + }) 1021 + (fetchNuGet { 1022 + pname = "System.Threading.Tasks"; 1023 + version = "4.3.0"; 1024 + hash = "sha256-Z5rXfJ1EXp3G32IKZGiZ6koMjRu0n8C1NGrwpdIen4w="; 1025 + }) 1026 + (fetchNuGet { 1027 + pname = "System.Threading.Tasks.Dataflow"; 1028 + version = "4.11.1"; 1029 + hash = "sha256-fIt5XouNaswWOvZWpIHbTItVzUJDCmz3XawHr6J2yyU="; 1030 + }) 1031 + (fetchNuGet { 1032 + pname = "System.Threading.Tasks.Extensions"; 1033 + version = "4.0.0"; 1034 + hash = "sha256-+YdcPkMhZhRbMZHnfsDwpNbUkr31X7pQFGxXYcAPZbE="; 1035 + }) 1036 + (fetchNuGet { 1037 + pname = "System.Threading.Tasks.Extensions"; 1038 + version = "4.3.0"; 1039 + hash = "sha256-X2hQ5j+fxcmnm88Le/kSavjiGOmkcumBGTZKBLvorPc="; 1040 + }) 1041 + (fetchNuGet { 1042 + pname = "System.Threading.Tasks.Extensions"; 1043 + version = "4.5.4"; 1044 + hash = "sha256-owSpY8wHlsUXn5xrfYAiu847L6fAKethlvYx97Ri1ng="; 1045 + }) 1046 + (fetchNuGet { 1047 + pname = "System.Threading.ThreadPool"; 1048 + version = "4.3.0"; 1049 + hash = "sha256-wW0QdvssRoaOfQLazTGSnwYTurE4R8FxDx70pYkL+gg="; 1050 + }) 1051 + (fetchNuGet { 1052 + pname = "System.Threading.Timer"; 1053 + version = "4.3.0"; 1054 + hash = "sha256-pmhslmhQhP32TWbBzoITLZ4BoORBqYk25OWbru04p9s="; 1055 + }) 1056 + (fetchNuGet { 1057 + pname = "System.Xml.ReaderWriter"; 1058 + version = "4.0.11"; 1059 + hash = "sha256-haZAFFQ9Sl2DhfvEbdx2YRqKEoxNMU5STaqpMmXw0zA="; 1060 + }) 1061 + (fetchNuGet { 1062 + pname = "System.Xml.ReaderWriter"; 1063 + version = "4.3.0"; 1064 + hash = "sha256-QQ8KgU0lu4F5Unh+TbechO//zaAGZ4MfgvW72Cn1hzA="; 1065 + }) 1066 + (fetchNuGet { 1067 + pname = "System.Xml.XDocument"; 1068 + version = "4.0.11"; 1069 + hash = "sha256-KPz1kxe0RUBM+aoktJ/f9p51GudMERU8Pmwm//HdlFg="; 1070 + }) 1071 + (fetchNuGet { 1072 + pname = "System.Xml.XDocument"; 1073 + version = "4.3.0"; 1074 + hash = "sha256-rWtdcmcuElNOSzCehflyKwHkDRpiOhJJs8CeQ0l1CCI="; 1075 + }) 1076 + (fetchNuGet { 1077 + pname = "System.Xml.XmlDocument"; 1078 + version = "4.3.0"; 1079 + hash = "sha256-kbuV4Y7rVJkfMp2Kgoi8Zvdatm9CZNmlKB3GZgANvy4="; 1080 + }) 1081 + (fetchNuGet { 1082 + pname = "WaylandNET"; 1083 + version = "0.2.0"; 1084 + hash = "sha256-E2VXvSV4KkTz1tQgGXJpuvRQiPlVvSAJb7htBFTeV+I="; 1085 + }) 1086 + (fetchNuGet { 1087 + pname = "xunit"; 1088 + version = "2.4.1"; 1089 + hash = "sha256-QGDuE0ZnsxyEJONP8GcJ80PmPeb+OawwdSW8y72aw3U="; 1090 + }) 1091 + (fetchNuGet { 1092 + pname = "xunit.abstractions"; 1093 + version = "2.0.3"; 1094 + hash = "sha256-0D1y/C34iARI96gb3bAOG8tcGPMjx+fMabTPpydGlAM="; 1095 + }) 1096 + (fetchNuGet { 1097 + pname = "xunit.analyzers"; 1098 + version = "0.10.0"; 1099 + hash = "sha256-8lRZhogXHYksa9ChnkFXpBnTMlLlYIvu3Av7qQYWwJY="; 1100 + }) 1101 + (fetchNuGet { 1102 + pname = "xunit.assert"; 1103 + version = "2.4.1"; 1104 + hash = "sha256-hl1cMSakAlwkpFEchxCNMdvQie6PMJ1uFrhzgOC3vsY="; 1105 + }) 1106 + (fetchNuGet { 1107 + pname = "xunit.core"; 1108 + version = "2.4.1"; 1109 + hash = "sha256-KgUgAIJIPHQ5VQ4FiB+i5u2JXSYxmvMCV8zXP4kcy9o="; 1110 + }) 1111 + (fetchNuGet { 1112 + pname = "xunit.extensibility.core"; 1113 + version = "2.4.1"; 1114 + hash = "sha256-oACVOrvF4XmKFr+8ZqPVpjbopZgeRwaXveJGW2XUeIA="; 1115 + }) 1116 + (fetchNuGet { 1117 + pname = "xunit.extensibility.execution"; 1118 + version = "2.4.1"; 1119 + hash = "sha256-KmKEdgsUq4zuQJ2saJA0YT1CIZ2AuhZL5V7cF2Cncd0="; 1120 + }) 1121 + (fetchNuGet { 1122 + pname = "xunit.runner.visualstudio"; 1123 + version = "2.4.3"; 1124 + hash = "sha256-42axn0yDDiJWKV8UEYzYWgiKbpc6mHh9M/eeylYGLUg="; 1125 + }) 1126 + ]
+23
pkgs/by-name/op/opentabletdriver/update.sh
···
··· 1 + #!/usr/bin/env nix-shell 2 + #!nix-shell -I nixpkgs=./. -i bash -p curl gnused jq common-updater-scripts nixfmt-rfc-style 3 + set -eo pipefail 4 + 5 + verlte() { 6 + printf '%s\n' "$1" "$2" | sort -C -V 7 + } 8 + 9 + new_version="$(curl ${GITHUB_TOKEN:+" -u \":$GITHUB_TOKEN\""} -s "https://api.github.com/repos/OpenTabletDriver/OpenTabletDriver/releases" | 10 + jq -r 'map(select(.prerelease == false)) | .[0].tag_name' | 11 + cut -c2-)" 12 + old_version="$(nix --extra-experimental-features 'nix-command' eval --file default.nix opentabletdriver.version --raw)" 13 + 14 + if verlte "$new_version" "$old_version"; then 15 + echo "Already up to date!" 16 + [[ "${1}" != "--force" ]] && exit 0 17 + fi 18 + 19 + update-source-version opentabletdriver "$new_version" 20 + eval "$(nix-build -A opentabletdriver.fetch-deps --no-out-link)" 21 + 22 + cd "$(dirname "${BASH_SOURCE[0]}")" 23 + nixfmt deps.nix
+3 -3
pkgs/by-name/ox/ox/package.nix
··· 10 11 rustPlatform.buildRustPackage rec { 12 pname = "ox"; 13 - version = "0.7.1"; 14 15 src = fetchFromGitHub { 16 owner = "curlpipe"; 17 repo = pname; 18 rev = version; 19 - hash = "sha256-7rP/h3MlrMZl9yd655uRrnv1aUB57LzdyKs66wHp33Y="; 20 }; 21 22 - cargoHash = "sha256-z9pyMnYQZfCCVdVEakj3q27SFLahMDWRuAopYye6RIY="; 23 24 passthru = { 25 tests.version = testers.testVersion {
··· 10 11 rustPlatform.buildRustPackage rec { 12 pname = "ox"; 13 + version = "0.7.2"; 14 15 src = fetchFromGitHub { 16 owner = "curlpipe"; 17 repo = pname; 18 rev = version; 19 + hash = "sha256-yAToibHhvHAry7WVZ5uD84CbUTp06RyZ9J12/2deM1I="; 20 }; 21 22 + cargoHash = "sha256-YAy5vCxcHUL0wM9+Y3GDqV/V1utL3V05heT92/zQ/X8="; 23 24 passthru = { 25 tests.version = testers.testVersion {
+47
pkgs/by-name/pa/parca-agent/package.nix
···
··· 1 + { 2 + buildGoModule, 3 + fetchFromGitHub, 4 + lib, 5 + stdenv, 6 + }: 7 + 8 + buildGoModule rec { 9 + pname = "parca-agent"; 10 + version = "0.35.0"; 11 + 12 + src = fetchFromGitHub { 13 + owner = "parca-dev"; 14 + repo = "parca-agent"; 15 + rev = "refs/tags/v${version}"; 16 + hash = "sha256-5MoHX47uUtQgszNuu9ImLJPYnaN2NKZKOPa60PMHDL0="; 17 + fetchSubmodules = true; 18 + }; 19 + 20 + proxyVendor = true; 21 + vendorHash = "sha256-v2OnCuOI9inZ4WiU/3PbBwK6ZcvZX21MNsLhRWZ6sGY="; 22 + 23 + buildInputs = [ 24 + stdenv.cc.libc.static 25 + ]; 26 + 27 + ldflags = [ 28 + "-X=main.version=${version}" 29 + "-X=main.commit=${src.rev}" 30 + "-extldflags=-static" 31 + ]; 32 + 33 + tags = [ 34 + "osusergo" 35 + "netgo" 36 + ]; 37 + 38 + meta = { 39 + description = "eBPF based, always-on profiling agent"; 40 + homepage = "https://github.com/parca-dev/parca-agent"; 41 + changelog = "https://github.com/parca-dev/parca-agent/releases/tag/v${version}"; 42 + license = lib.licenses.asl20; 43 + maintainers = with lib.maintainers; [ jnsgruk ]; 44 + platforms = lib.platforms.linux; 45 + mainProgram = "parca-agent"; 46 + }; 47 + }
+34
pkgs/by-name/pa/parca-debuginfo/package.nix
···
··· 1 + { 2 + lib, 3 + buildGoModule, 4 + fetchFromGitHub, 5 + }: 6 + 7 + buildGoModule rec { 8 + pname = "parca-debuginfo"; 9 + version = "0.11.0"; 10 + 11 + src = fetchFromGitHub { 12 + owner = "parca-dev"; 13 + repo = "parca-debuginfo"; 14 + rev = "refs/tags/v${version}"; 15 + hash = "sha256-gL1BgDtEf2Q7yxzpoiTJY+nsRlsWv3zYzLVvaVijMDM="; 16 + }; 17 + 18 + vendorHash = "sha256-xtKkKhKQmZcCIFTOH+oM5a2cPlAWlJPRNQWfrAl2948="; 19 + 20 + ldflags = [ 21 + "-X=main.version=${version}" 22 + "-X=main.commit=${src.rev}" 23 + ]; 24 + 25 + meta = { 26 + description = "Command line utility for handling debuginfos"; 27 + changelog = "https://github.com/parca-dev/parca-debuginfo/releases/tag/v${version}"; 28 + homepage = "https://github.com/parca-dev/parca-debuginfo"; 29 + license = lib.licenses.asl20; 30 + maintainers = with lib.maintainers; [ jnsgruk ]; 31 + platforms = lib.platforms.unix; 32 + mainProgram = "parca-debuginfo"; 33 + }; 34 + }
+6 -16
pkgs/by-name/pg/pg-gvm/package.nix pkgs/servers/sql/postgresql/ext/pg-gvm.nix
··· 1 { 2 cmake, 3 fetchFromGitHub, 4 glib, ··· 9 pcre2, 10 pkg-config, 11 postgresql, 12 - stdenv, 13 }: 14 15 - stdenv.mkDerivation rec { 16 pname = "pg-gvm"; 17 version = "22.6.5"; 18 19 src = fetchFromGitHub { 20 owner = "greenbone"; 21 repo = "pg-gvm"; 22 - rev = "refs/tags/v${version}"; 23 hash = "sha256-19ZmQdLjfwJwOMoO16rKJYKOnRyt7SQOdkYTxt8WQ2A="; 24 }; 25 26 strictDeps = true; 27 28 - configurePhase = '' 29 - runHook preConfigure 30 - 31 - cmake \ 32 - -DCMAKE_INSTALL_DEV_PREFIX=$out . 33 - 34 - runHook postConfigure 35 - ''; 36 - 37 nativeBuildInputs = [ 38 cmake 39 pkg-config ··· 46 icu 47 libical 48 pcre2 49 - postgresql 50 ]; 51 52 meta = { 53 description = "Greenbone Library for helper functions in PostgreSQL"; 54 homepage = "https://github.com/greenbone/pg-gvm"; 55 - changelog = "https://github.com/greenbone/pg-gvm/releases/tag/v${version}"; 56 license = lib.licenses.gpl3Only; 57 maintainers = with lib.maintainers; [ tochiaha ]; 58 mainProgram = "pg-gvm"; 59 - platforms = lib.platforms.all; 60 }; 61 - }
··· 1 { 2 + buildPostgresqlExtension, 3 cmake, 4 fetchFromGitHub, 5 glib, ··· 10 pcre2, 11 pkg-config, 12 postgresql, 13 }: 14 15 + buildPostgresqlExtension (finalAttrs: { 16 pname = "pg-gvm"; 17 version = "22.6.5"; 18 19 src = fetchFromGitHub { 20 owner = "greenbone"; 21 repo = "pg-gvm"; 22 + rev = "refs/tags/v${finalAttrs.version}"; 23 hash = "sha256-19ZmQdLjfwJwOMoO16rKJYKOnRyt7SQOdkYTxt8WQ2A="; 24 }; 25 26 strictDeps = true; 27 28 nativeBuildInputs = [ 29 cmake 30 pkg-config ··· 37 icu 38 libical 39 pcre2 40 ]; 41 42 meta = { 43 description = "Greenbone Library for helper functions in PostgreSQL"; 44 homepage = "https://github.com/greenbone/pg-gvm"; 45 + changelog = "https://github.com/greenbone/pg-gvm/releases/tag/v${finalAttrs.version}"; 46 license = lib.licenses.gpl3Only; 47 maintainers = with lib.maintainers; [ tochiaha ]; 48 mainProgram = "pg-gvm"; 49 + platforms = postgresql.meta.platforms; 50 }; 51 + })
+27 -10
pkgs/by-name/pg/pg_top/package.nix
··· 1 - { lib, stdenv, fetchurl, ncurses, postgresql }: 2 3 stdenv.mkDerivation rec { 4 pname = "pg_top"; 5 - version = "3.7.0"; 6 7 src = fetchurl { 8 - url = "https://pgfoundry.org/frs/download.php/1781/pg_top-${version}.tar.gz"; 9 - sha256 = "17xrv0l58rv3an06gkajzw0gg6v810xx6vl137an1iykmhvfh7h2"; 10 }; 11 12 - buildInputs = [ ncurses postgresql ]; 13 14 meta = with lib; { 15 description = "'top' like tool for PostgreSQL"; 16 longDescription = '' 17 pg_top allows you to: 18 * View currently running SQL statement of a process. 19 - * View query plan of a currently running SQL statement. 20 * View locks held by a process. 21 - * View user table statistics. 22 - * View user index statistics. 23 ''; 24 25 - homepage = "http://ptop.projects.postgresql.org/"; 26 platforms = platforms.linux; 27 - license = licenses.free; # see commands.c 28 mainProgram = "pg_top"; 29 }; 30 }
··· 1 + { 2 + cmake, 3 + fetchurl, 4 + lib, 5 + libbsd, 6 + libelf, 7 + ncurses, 8 + postgresql, 9 + stdenv, 10 + }: 11 12 stdenv.mkDerivation rec { 13 pname = "pg_top"; 14 + version = "4.1.0"; 15 16 src = fetchurl { 17 + url = "https://pg_top.gitlab.io/source/pg_top-${version}.tar.xz"; 18 + sha256 = "sha256-WdSiQURJgtBCYoS/maImppcyM8wzUIJzLWmiSZPlx1Q="; 19 }; 20 21 + buildInputs = [ 22 + libbsd 23 + libelf 24 + ncurses 25 + postgresql 26 + ]; 27 + 28 + nativeBuildInputs = [ cmake ]; 29 30 meta = with lib; { 31 description = "'top' like tool for PostgreSQL"; 32 longDescription = '' 33 pg_top allows you to: 34 * View currently running SQL statement of a process. 35 + * View query plan of a currently running SELECT statement. 36 * View locks held by a process. 37 + * View I/O statistics per process. 38 + * View replication statistics for downstream nodes. 39 ''; 40 41 + homepage = "https://pg_top.gitlab.io"; 42 + changelog = "https://gitlab.com/pg_top/pg_top/-/blob/main/HISTORY.rst"; 43 platforms = platforms.linux; 44 + license = licenses.bsd3; 45 mainProgram = "pg_top"; 46 }; 47 }
+2 -2
pkgs/by-name/pr/pragtical/package.nix
··· 20 21 stdenv.mkDerivation (finalAttrs: { 22 pname = "pragtical"; 23 - version = "3.5.0"; 24 pluginManagerVersion = "1.2.9"; 25 26 src = fetchFromGitHub { ··· 44 find subprojects -type d -name .git -prune -execdir rm -r {} + 45 ''; 46 47 - hash = "sha256-a9LnLKtJ33YHtlnhWmKBeW5dOjjwa7PmaZjYh0+Nx9g="; 48 }; 49 50 nativeBuildInputs = [
··· 20 21 stdenv.mkDerivation (finalAttrs: { 22 pname = "pragtical"; 23 + version = "3.5.1"; 24 pluginManagerVersion = "1.2.9"; 25 26 src = fetchFromGitHub { ··· 44 find subprojects -type d -name .git -prune -execdir rm -r {} + 45 ''; 46 47 + hash = "sha256-o19akSgsWLRTyHT+dvmTeTS4HtNfzEyNXBhVot92OD4="; 48 }; 49 50 nativeBuildInputs = [
+4 -4
pkgs/by-name/re/readarr/package.nix
··· 8 x86_64-darwin = "x64"; 9 }."${stdenv.hostPlatform.system}" or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 10 hash = { 11 - x64-linux_hash = "sha256-VI0mdNGPyT45GUrp3hpBQVe1xx/BBbMWz7iJQvvrg9E="; 12 - arm64-linux_hash = "sha256-4ahiRo13qOEUSzrwXFVRj26U0l5GblXfw7sjY8sCLxQ="; 13 - x64-osx_hash = "sha256-1HtarF+eAU2d3dQiw3n/DCIFCbgN4GEUFMlYxy8uglA="; 14 }."${arch}-${os}_hash"; 15 in stdenv.mkDerivation rec { 16 pname = "readarr"; 17 - version = "0.4.3.2665"; 18 19 src = fetchurl { 20 url = "https://github.com/Readarr/Readarr/releases/download/v${version}/Readarr.develop.${version}.${os}-core-${arch}.tar.gz";
··· 8 x86_64-darwin = "x64"; 9 }."${stdenv.hostPlatform.system}" or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 10 hash = { 11 + x64-linux_hash = "sha256-48ZlBTr/lO1AAsYInu48fDB77RXH+b2hXjDPwWdeZW4="; 12 + arm64-linux_hash = "sha256-vyNoI1ffqWyYCfH+3rRNtaECkku3pF3pD+2RBchD+6o="; 13 + x64-osx_hash = "sha256-VeGq+kVuBLGqERcWyvPfcygAG0/262J9/RPr49X4jtE="; 14 }."${arch}-${os}_hash"; 15 in stdenv.mkDerivation rec { 16 pname = "readarr"; 17 + version = "0.4.4.2686"; 18 19 src = fetchurl { 20 url = "https://github.com/Readarr/Readarr/releases/download/v${version}/Readarr.develop.${version}.${os}-core-${arch}.tar.gz";
+2 -2
pkgs/by-name/re/restinio/package.nix
··· 21 22 stdenv.mkDerivation (finalAttrs: { 23 pname = "restinio"; 24 - version = "0.7.2"; 25 26 src = fetchFromGitHub { 27 owner = "Stiffstream"; 28 repo = "restinio"; 29 rev = "v.${finalAttrs.version}"; 30 - hash = "sha256-Nv/VVdHciCv+DsVu3MqfXeAa8Ef+qi6c1OaTAVrYUg0="; 31 }; 32 33 strictDeps = true;
··· 21 22 stdenv.mkDerivation (finalAttrs: { 23 pname = "restinio"; 24 + version = "0.7.3"; 25 26 src = fetchFromGitHub { 27 owner = "Stiffstream"; 28 repo = "restinio"; 29 rev = "v.${finalAttrs.version}"; 30 + hash = "sha256-heVdo0MtsWi/r9yse+/FZ55lhiunyEdwB3UkOOY5Vj0="; 31 }; 32 33 strictDeps = true;
+2 -2
pkgs/by-name/rf/rfc/package.nix
··· 8 9 stdenvNoCC.mkDerivation rec { 10 pname = "rfc"; 11 - version = "1.0.0"; 12 13 src = fetchFromGitHub { 14 owner = "bfontaine"; 15 repo = "rfc"; 16 rev = "v${version}"; 17 - hash = "sha256-zN+MQtHh69PkzbrfceHFpBYCPmTg9qrOf/ML2efq6Xk="; 18 }; 19 20 nativeBuildInputs = [ installShellFiles makeWrapper ];
··· 8 9 stdenvNoCC.mkDerivation rec { 10 pname = "rfc"; 11 + version = "1.0.1"; 12 13 src = fetchFromGitHub { 14 owner = "bfontaine"; 15 repo = "rfc"; 16 rev = "v${version}"; 17 + hash = "sha256-bCqgLkbZGQFcxhLwekVw+rUGinXTc7QJHlVRGtNf6Jc="; 18 }; 19 20 nativeBuildInputs = [ installShellFiles makeWrapper ];
+3 -4
pkgs/by-name/ru/rustls-ffi/package.nix
··· 15 16 stdenv.mkDerivation (finalAttrs: { 17 pname = "rustls-ffi"; 18 - version = "0.13.0"; 19 20 src = fetchFromGitHub { 21 owner = "rustls"; 22 repo = "rustls-ffi"; 23 rev = "v${finalAttrs.version}"; 24 - hash = "sha256-Bc9bVZ2pDsG118l/SlElZpgh9F1JEgPF8LzBX7d4mhE="; 25 }; 26 27 cargoDeps = rustPlatform.fetchCargoTarball { 28 src = finalAttrs.src; 29 name = "${finalAttrs.pname}-${finalAttrs.version}"; 30 - hash = "sha256-gDQ9AFrJuV7SrzKCAHQBkKj6clXuPLO0DHhnvcBqRLs="; 31 }; 32 33 propagatedBuildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ libiconv darwin.apple_sdk.frameworks.Security ]; ··· 54 55 passthru.tests = { 56 curl = curl.override { opensslSupport = false; rustlsSupport = true; rustls-ffi = finalAttrs.finalPackage; }; 57 - apacheHttpd = apacheHttpd.override { modTlsSupport = true; rustls-ffi = finalAttrs.finalPackage; }; 58 pkg-config = testers.testMetaPkgConfig finalAttrs.finalPackage; 59 }; 60
··· 15 16 stdenv.mkDerivation (finalAttrs: { 17 pname = "rustls-ffi"; 18 + version = "0.14.1"; 19 20 src = fetchFromGitHub { 21 owner = "rustls"; 22 repo = "rustls-ffi"; 23 rev = "v${finalAttrs.version}"; 24 + hash = "sha256-ZKAyKcKwhnPE6PrfBFjLJKkTlGbdLcmW1EP/xSv2cpM="; 25 }; 26 27 cargoDeps = rustPlatform.fetchCargoTarball { 28 src = finalAttrs.src; 29 name = "${finalAttrs.pname}-${finalAttrs.version}"; 30 + hash = "sha256-IaOhQfDEgLhGmes0xzhLVym29aP691TY0EXdOIgXEMA="; 31 }; 32 33 propagatedBuildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ libiconv darwin.apple_sdk.frameworks.Security ]; ··· 54 55 passthru.tests = { 56 curl = curl.override { opensslSupport = false; rustlsSupport = true; rustls-ffi = finalAttrs.finalPackage; }; 57 pkg-config = testers.testMetaPkgConfig finalAttrs.finalPackage; 58 }; 59
+1 -2
pkgs/by-name/se/servo/package.nix
··· 110 perl 111 pkg-config 112 python3 113 taplo 114 which 115 yasm ··· 141 wrapProgram $out/bin/servo \ 142 --prefix LD_LIBRARY_PATH : ${runtimePaths} 143 ''; 144 - 145 - LIBCLANG_PATH = "${lib.getLib llvmPackages.libclang}/lib"; 146 147 meta = { 148 description = "The embeddable, independent, memory-safe, modular, parallel web rendering engine";
··· 110 perl 111 pkg-config 112 python3 113 + rustPlatform.bindgenHook 114 taplo 115 which 116 yasm ··· 142 wrapProgram $out/bin/servo \ 143 --prefix LD_LIBRARY_PATH : ${runtimePaths} 144 ''; 145 146 meta = { 147 description = "The embeddable, independent, memory-safe, modular, parallel web rendering engine";
+3 -3
pkgs/by-name/sv/svd2rust/package.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "svd2rust"; 5 - version = "0.33.5"; 6 7 src = fetchCrate { 8 inherit pname version; 9 - hash = "sha256-wZfCk8jzTmltpmrp7QWU1uS5ct10iltNFdUCJvnrv98="; 10 }; 11 12 - cargoHash = "sha256-5m3/5zwjDeDgPuUsTIknXwEMjQs0gtVoksQn4EdPnwM="; 13 14 # error: linker `aarch64-linux-gnu-gcc` not found 15 postPatch = ''
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "svd2rust"; 5 + version = "0.35.0"; 6 7 src = fetchCrate { 8 inherit pname version; 9 + hash = "sha256-KLwIwJtPBQ8Sa94/IEJhIGTx/n3oYQKINmNV5L5TJV0="; 10 }; 11 12 + cargoHash = "sha256-4a89Do57KFKu/RDTB4BxUxVlO46HL5aEhhHmnzLuZGo="; 13 14 # error: linker `aarch64-linux-gnu-gcc` not found 15 postPatch = ''
+3 -3
pkgs/by-name/tb/tbls/package.nix
··· 9 10 buildGoModule rec { 11 pname = "tbls"; 12 - version = "1.78.0"; 13 14 src = fetchFromGitHub { 15 owner = "k1LoW"; 16 repo = "tbls"; 17 rev = "v${version}"; 18 - hash = "sha256-vqt4IlVvqlUjDqvcdiRctt/VuEkZ5YzCXYHvHfc87Ew="; 19 }; 20 21 - vendorHash = "sha256-cnACY+NIjsVe6BU7AjTO+yLDn0f1HO1gHnw5SgqKuy4="; 22 23 nativeBuildInputs = [ installShellFiles ]; 24
··· 9 10 buildGoModule rec { 11 pname = "tbls"; 12 + version = "1.79.4"; 13 14 src = fetchFromGitHub { 15 owner = "k1LoW"; 16 repo = "tbls"; 17 rev = "v${version}"; 18 + hash = "sha256-o/ZhXoenK3xlflRMXS9NtnW23VBiDmDPSGlHtE3cNiM="; 19 }; 20 21 + vendorHash = "sha256-SkddF8ZxvGRQ+/tWnmlcoaTs3MRfVgQWX4MZ05nZ9XA="; 22 23 nativeBuildInputs = [ installShellFiles ]; 24
+2 -2
pkgs/by-name/te/terraform-backend-git/package.nix
··· 6 7 buildGoModule rec { 8 pname = "terraform-backend-git"; 9 - version = "0.1.7"; 10 11 src = fetchFromGitHub { 12 owner = "plumber-cd"; 13 repo = "terraform-backend-git"; 14 rev = "v${version}"; 15 - hash = "sha256-mLgUA7f4enlVuQx4VM3QbNuaAq7FgDaRyiG0sbT31ng="; 16 }; 17 18 vendorHash = "sha256-vFx59dIdniLRP0xHcD3c22GidZOPdGZvmvg/BvxFBGI=";
··· 6 7 buildGoModule rec { 8 pname = "terraform-backend-git"; 9 + version = "0.1.8"; 10 11 src = fetchFromGitHub { 12 owner = "plumber-cd"; 13 repo = "terraform-backend-git"; 14 rev = "v${version}"; 15 + hash = "sha256-mZbGMv5b9wK/gWqQB75sDJIVURrS6t/L7WBhTonaatQ="; 16 }; 17 18 vendorHash = "sha256-vFx59dIdniLRP0xHcD3c22GidZOPdGZvmvg/BvxFBGI=";
+3 -3
pkgs/by-name/up/updatecli/package.nix
··· 11 12 buildGoModule rec { 13 pname = "updatecli"; 14 - version = "0.82.0"; 15 16 src = fetchFromGitHub { 17 owner = "updatecli"; 18 repo = "updatecli"; 19 rev = "v${version}"; 20 - hash = "sha256-kNc+Z+v4fvuWO/Ibr9VOekMDT39YEwA/fReP+e3C74U="; 21 }; 22 23 - vendorHash = "sha256-fnx0EAGxau0+ktnuUb8ljolNAlwu2595FMjsDbM2MiY="; 24 25 # tests require network access 26 doCheck = false;
··· 11 12 buildGoModule rec { 13 pname = "updatecli"; 14 + version = "0.88.0"; 15 16 src = fetchFromGitHub { 17 owner = "updatecli"; 18 repo = "updatecli"; 19 rev = "v${version}"; 20 + hash = "sha256-qWggdLNF6iWrbcKgdR3Tr19bwK5wS5ffadS3kMFGp5E="; 21 }; 22 23 + vendorHash = "sha256-feBmzBrV6yoepU8CiqKaB/bCWIhuiDNhMTem0y1Lynw="; 24 25 # tests require network access 26 doCheck = false;
+2 -2
pkgs/by-name/ve/vencord/package.nix
··· 14 }: 15 stdenv.mkDerivation (finalAttrs: { 16 pname = "vencord"; 17 - version = "1.10.7"; 18 19 src = fetchFromGitHub { 20 owner = "Vendicated"; 21 repo = "Vencord"; 22 rev = "v${finalAttrs.version}"; 23 - hash = "sha256-/CZzRIXD0shEok9H+Vx7s9BmzXTI6ly957jvS+nU2fI="; 24 }; 25 26 pnpmDeps = pnpm.fetchDeps {
··· 14 }: 15 stdenv.mkDerivation (finalAttrs: { 16 pname = "vencord"; 17 + version = "1.10.8"; 18 19 src = fetchFromGitHub { 20 owner = "Vendicated"; 21 repo = "Vencord"; 22 rev = "v${finalAttrs.version}"; 23 + hash = "sha256-2UOz8o+3jWppk6lWatbG0avcqBFpxHYSMEspCpFWWOk="; 24 }; 25 26 pnpmDeps = pnpm.fetchDeps {
+38
pkgs/by-name/xa/xautocfg/package.nix
···
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + libX11, 6 + libXi, 7 + }: 8 + 9 + stdenv.mkDerivation (finalAttrs: { 10 + pname = "xautocfg"; 11 + version = "1.2"; 12 + 13 + src = fetchFromGitHub { 14 + owner = "SFTtech"; 15 + repo = "xautocfg"; 16 + rev = "refs/tags/v${finalAttrs.version}"; 17 + hash = "sha256-NxfuBknNRicmEAPBeMaNb57gpM0y0t+JmNMKpSNzlQM="; 18 + }; 19 + 20 + buildInputs = [ 21 + libX11 22 + libXi 23 + ]; 24 + 25 + makeFlags = [ 26 + "PREFIX=${placeholder "out"}" 27 + "MANPREFIX=${placeholder "out"}" 28 + ]; 29 + 30 + meta = { 31 + homepage = "https://github.com/SFTtech/xautocfg"; 32 + description = "Automatic keyboard repeat rate configuration for new keyboards"; 33 + license = lib.licenses.gpl3Only; 34 + maintainers = with lib.maintainers; [ jceb ]; 35 + mainProgram = "xautocfg"; 36 + platforms = lib.platforms.linux; 37 + }; 38 + })
+50 -42
pkgs/development/compilers/binaryen/default.nix
··· 1 { lib, stdenv, cmake, python3, fetchFromGitHub, emscripten, 2 gtest, lit, nodejs, filecheck 3 }: 4 - 5 - stdenv.mkDerivation rec { 6 - pname = "binaryen"; 7 - version = "118"; 8 - 9 - src = fetchFromGitHub { 10 owner = "WebAssembly"; 11 - repo = "binaryen"; 12 - rev = "version_${version}"; 13 - hash = "sha256-akMW3S2/qUyLK8F77EtnaXPDXvIMpkGfNB2jOD6hQho="; 14 }; 15 16 - nativeBuildInputs = [ cmake python3 ]; 17 18 - preConfigure = '' 19 - if [ $doCheck -eq 1 ]; then 20 - sed -i '/googletest/d' third_party/CMakeLists.txt 21 - else 22 - cmakeFlagsArray=($cmakeFlagsArray -DBUILD_TESTS=0) 23 - fi 24 - ''; 25 26 - nativeCheckInputs = [ gtest lit nodejs filecheck ]; 27 - checkPhase = '' 28 - LD_LIBRARY_PATH=$LD_LIBRARY_PATH:$PWD/lib python3 ../check.py $tests 29 - ''; 30 31 - tests = [ 32 - "version" "wasm-opt" "wasm-dis" 33 - "crash" "dylink" "ctor-eval" 34 - "wasm-metadce" "wasm-reduce" "spec" 35 - "lld" "wasm2js" "validator" 36 - "example" "unit" 37 - # "binaryenjs" "binaryenjs_wasm" # not building this 38 - "lit" "gtest" 39 - ]; 40 - doCheck = stdenv.hostPlatform.isLinux; 41 42 - meta = with lib; { 43 - homepage = "https://github.com/WebAssembly/binaryen"; 44 - description = "Compiler infrastructure and toolchain library for WebAssembly, in C++"; 45 - platforms = platforms.all; 46 - maintainers = with maintainers; [ asppsa willcohen ]; 47 - license = licenses.asl20; 48 - }; 49 50 - passthru.tests = { 51 - inherit emscripten; 52 - }; 53 - }
··· 1 { lib, stdenv, cmake, python3, fetchFromGitHub, emscripten, 2 gtest, lit, nodejs, filecheck 3 }: 4 + let 5 + testsuite = fetchFromGitHub { 6 owner = "WebAssembly"; 7 + repo = "testsuite"; 8 + rev = "e05365077e13a1d86ffe77acfb1a835b7aa78422"; 9 + hash = "sha256-yvZ5AZTPUA6nsD3xpFC0VLthiu2CxVto66RTXBXXeJM="; 10 }; 11 + in 12 + stdenv.mkDerivation rec { 13 + pname = "binaryen"; 14 + version = "119"; 15 16 + src = fetchFromGitHub { 17 + owner = "WebAssembly"; 18 + repo = "binaryen"; 19 + rev = "version_${version}"; 20 + hash = "sha256-JYXtN3CW4qm/nnjGRvv3GxQ0x9O9wHtNYQLqHIYTTOA="; 21 + }; 22 23 + nativeBuildInputs = [ cmake python3 ]; 24 25 + preConfigure = '' 26 + if [ $doCheck -eq 1 ]; then 27 + sed -i '/googletest/d' third_party/CMakeLists.txt 28 + rmdir test/spec/testsuite 29 + ln -s ${testsuite} test/spec/testsuite 30 + else 31 + cmakeFlagsArray=($cmakeFlagsArray -DBUILD_TESTS=0) 32 + fi 33 + ''; 34 35 + nativeCheckInputs = [ gtest lit nodejs filecheck ]; 36 + checkPhase = '' 37 + LD_LIBRARY_PATH=$LD_LIBRARY_PATH:$PWD/lib python3 ../check.py $tests 38 + ''; 39 40 + tests = [ 41 + "version" "wasm-opt" "wasm-dis" 42 + "crash" "dylink" "ctor-eval" 43 + "wasm-metadce" "wasm-reduce" "spec" 44 + "lld" "wasm2js" "validator" 45 + "example" "unit" 46 + # "binaryenjs" "binaryenjs_wasm" # not building this 47 + "lit" "gtest" 48 + ]; 49 + doCheck = stdenv.isLinux; 50 51 + meta = with lib; { 52 + homepage = "https://github.com/WebAssembly/binaryen"; 53 + description = "Compiler infrastructure and toolchain library for WebAssembly, in C++"; 54 + platforms = platforms.all; 55 + maintainers = with maintainers; [ asppsa willcohen ]; 56 + license = licenses.asl20; 57 + }; 58 + passthru.tests = { 59 + inherit emscripten; 60 + }; 61 + }
+6 -3
pkgs/development/compilers/emscripten/default.nix
··· 8 9 stdenv.mkDerivation rec { 10 pname = "emscripten"; 11 - version = "3.1.64"; 12 13 llvmEnv = symlinkJoin { 14 name = "emscripten-llvm-${version}"; ··· 19 name = "emscripten-node-modules-${version}"; 20 inherit pname version src; 21 22 - npmDepsHash = "sha256-2dsIuB6P+Z3wflIsn6QaZvjHeHHGzsFAI3GcP3SfiP4="; 23 24 dontBuild = true; 25 ··· 32 src = fetchFromGitHub { 33 owner = "emscripten-core"; 34 repo = "emscripten"; 35 - hash = "sha256-AbO1b4pxZ7I6n1dRzxhLC7DnXIUnaCK9SbLy96Qxqr0="; 36 rev = version; 37 }; 38 ··· 50 runHook preBuild 51 52 patchShebangs . 53 54 # fixes cmake support 55 sed -i -e "s/print \('emcc (Emscript.*\)/sys.stderr.write(\1); sys.stderr.flush()/g" emcc.py
··· 8 9 stdenv.mkDerivation rec { 10 pname = "emscripten"; 11 + version = "3.1.73"; 12 13 llvmEnv = symlinkJoin { 14 name = "emscripten-llvm-${version}"; ··· 19 name = "emscripten-node-modules-${version}"; 20 inherit pname version src; 21 22 + npmDepsHash = "sha256-bqxUlxpIH1IAx9RbnaMq4dZW8fy+M/Q02Q7VrW/AKNQ="; 23 24 dontBuild = true; 25 ··· 32 src = fetchFromGitHub { 33 owner = "emscripten-core"; 34 repo = "emscripten"; 35 + hash = "sha256-QlC2k2rhF3/Pz+knnrlBDV8AfHHBSlGr7b9Ae6TNsxY="; 36 rev = version; 37 }; 38 ··· 50 runHook preBuild 51 52 patchShebangs . 53 + 54 + # emscripten 3.1.67 requires LLVM tip-of-tree instead of LLVM 18 55 + sed -i -e "s/EXPECTED_LLVM_VERSION = 20/EXPECTED_LLVM_VERSION = 19/g" tools/shared.py 56 57 # fixes cmake support 58 sed -i -e "s/print \('emcc (Emscript.*\)/sys.stderr.write(\1); sys.stderr.flush()/g" emcc.py
+13 -8
pkgs/development/compilers/ghc/common-hadrian.nix
··· 169 170 patches = 171 let 172 - # Disable haddock generating pretty source listings to stay under 3GB on aarch64-linux 173 enableHyperlinkedSource = 174 - lib.versionAtLeast version "9.8" || 175 - !(stdenv.hostPlatform.isAarch64 && stdenv.hostPlatform.isLinux); 176 in 177 [ 178 # Fix docs build with Sphinx >= 7 https://gitlab.haskell.org/ghc/ghc/-/issues/24129 ··· 207 then ./Cabal-at-least-3.6-paths-fix-cycle-aarch64-darwin.patch 208 else ./Cabal-3.12-paths-fix-cycle-aarch64-darwin.patch) 209 ] 210 - # Prevents passing --hyperlinked-source to haddock. This is a custom 211 - # workaround as we wait for this to be configurable via userSettings or 212 - # similar. https://gitlab.haskell.org/ghc/ghc/-/issues/23625 213 ++ lib.optionals (!enableHyperlinkedSource) [ 214 - # TODO(@sternenseemann): Doesn't apply for GHC >= 9.8 215 - ../../tools/haskell/hadrian/disable-hyperlinked-source.patch 216 ] 217 # Incorrect bounds on Cabal in hadrian 218 # https://gitlab.haskell.org/ghc/ghc/-/issues/24100
··· 169 170 patches = 171 let 172 enableHyperlinkedSource = 173 + # Disable haddock generating pretty source listings to stay under 3GB on aarch64-linux 174 + !(stdenv.hostPlatform.isAarch64 && stdenv.hostPlatform.isLinux) 175 + # 9.8 and 9.10 don't run into this problem for some reason 176 + || (lib.versionAtLeast version "9.8" && lib.versionOlder version "9.11"); 177 in 178 [ 179 # Fix docs build with Sphinx >= 7 https://gitlab.haskell.org/ghc/ghc/-/issues/24129 ··· 208 then ./Cabal-at-least-3.6-paths-fix-cycle-aarch64-darwin.patch 209 else ./Cabal-3.12-paths-fix-cycle-aarch64-darwin.patch) 210 ] 211 + # Prevents passing --hyperlinked-source to haddock. Note that this can 212 + # be configured via a user defined flavour now. Unfortunately, it is 213 + # impossible to import an existing flavour in UserSettings, so patching 214 + # the defaults is actually simpler and less maintenance intensive 215 + # compared to keeping an entire flavour definition in sync with upstream 216 + # manually. See also https://gitlab.haskell.org/ghc/ghc/-/issues/23625 217 ++ lib.optionals (!enableHyperlinkedSource) [ 218 + (if lib.versionOlder version "9.8" 219 + then ../../tools/haskell/hadrian/disable-hyperlinked-source-pre-9.8.patch 220 + else ../../tools/haskell/hadrian/disable-hyperlinked-source-extra-args.patch) 221 ] 222 # Incorrect bounds on Cabal in hadrian 223 # https://gitlab.haskell.org/ghc/ghc/-/issues/24100
+26 -13
pkgs/development/haskell-modules/configuration-common.nix
··· 102 ####################################### 103 104 # All jailbreaks in this section due to: https://github.com/haskell/haskell-language-server/pull/4316#discussion_r1667684895 105 - haskell-language-server = doJailbreak (dontCheck (super.haskell-language-server.overrideScope (lself: lsuper: { 106 - # For most ghc versions, we overrideScope Cabal in the configuration-ghc-???.nix, 107 - # because some packages, like ormolu, need a newer Cabal version. 108 - # ghc-paths is special because it depends on Cabal for building 109 - # its Setup.hs, and therefor declares a Cabal dependency, but does 110 - # not actually use it as a build dependency. 111 - # That means ghc-paths can just use the ghc included Cabal version, 112 - # without causing package-db incoherence and we should do that because 113 - # otherwise we have different versions of ghc-paths 114 - # around which have the same abi-hash, which can lead to confusions and conflicts. 115 - ghc-paths = lsuper.ghc-paths.override { Cabal = null; }; 116 - }))); 117 hls-plugin-api = doJailbreak super.hls-plugin-api; 118 - ghcide = doJailbreak super.ghcide; 119 120 # For -f-auto see cabal.project in haskell-language-server. 121 ghc-lib-parser-ex = addBuildDepend self.ghc-lib-parser (disableCabalFlag "auto" super.ghc-lib-parser-ex);
··· 102 ####################################### 103 104 # All jailbreaks in this section due to: https://github.com/haskell/haskell-language-server/pull/4316#discussion_r1667684895 105 + haskell-language-server = 106 + lib.pipe 107 + (super.haskell-language-server.overrideScope (lself: lsuper: { 108 + # For most ghc versions, we overrideScope Cabal in the configuration-ghc-???.nix, 109 + # because some packages, like ormolu, need a newer Cabal version. 110 + # ghc-paths is special because it depends on Cabal for building 111 + # its Setup.hs, and therefor declares a Cabal dependency, but does 112 + # not actually use it as a build dependency. 113 + # That means ghc-paths can just use the ghc included Cabal version, 114 + # without causing package-db incoherence and we should do that because 115 + # otherwise we have different versions of ghc-paths 116 + # around which have the same abi-hash, which can lead to confusions and conflicts. 117 + ghc-paths = lsuper.ghc-paths.override { Cabal = null; }; 118 + })) 119 + [ 120 + doJailbreak 121 + dontCheck 122 + ]; 123 + 124 hls-plugin-api = doJailbreak super.hls-plugin-api; 125 + ghcide = doJailbreak (appendPatch (pkgs.fetchpatch { 126 + name = "ghcide-ghc-9.8.3.patch"; 127 + url = "https://github.com/haskell/haskell-language-server/commit/6d0a6f220226fe6c1cb5b6533177deb55e755b0b.patch"; 128 + sha256 = "1jwxldar9qzkg2z6vsx8f2yih3vkf4yjk9p3mryv0azn929qn3h1"; 129 + stripLen = 1; 130 + excludes = [ "cabal.project" ]; 131 + }) super.ghcide); 132 133 # For -f-auto see cabal.project in haskell-language-server. 134 ghc-lib-parser-ex = addBuildDepend self.ghc-lib-parser (disableCabalFlag "auto" super.ghc-lib-parser-ex);
+61
pkgs/development/haskell-modules/configuration-ghc-9.14.x.nix
···
··· 1 + { pkgs, haskellLib }: 2 + 3 + let 4 + inherit (pkgs) lib; 5 + 6 + in 7 + 8 + self: super: { 9 + llvmPackages = lib.dontRecurseIntoAttrs self.ghc.llvmPackages; 10 + 11 + # Disable GHC core libraries 12 + array = null; 13 + base = null; 14 + binary = null; 15 + bytestring = null; 16 + Cabal = null; 17 + Cabal-syntax = null; 18 + containers = null; 19 + deepseq = null; 20 + directory = null; 21 + exceptions = null; 22 + file-io = null; 23 + filepath = null; 24 + ghc-bignum = null; 25 + ghc-boot = null; 26 + ghc-boot-th = null; 27 + ghc-compact = null; 28 + ghc-experimental = null; 29 + ghc-heap = null; 30 + ghc-internal = null; 31 + ghc-platform = null; 32 + ghc-prim = null; 33 + ghc-toolchain = null; 34 + ghci = null; 35 + haddock-api = null; 36 + haddock-library = null; 37 + haskeline = null; 38 + hpc = null; 39 + integer-gmp = null; 40 + mtl = null; 41 + os-string = null; 42 + parsec = null; 43 + pretty = null; 44 + process = null; 45 + rts = null; 46 + semaphore-compat = null; 47 + stm = null; 48 + system-cxx-std-lib = null; 49 + template-haskell = null; 50 + # GHC only builds terminfo if it is a native compiler 51 + terminfo = 52 + if pkgs.stdenv.hostPlatform == pkgs.stdenv.buildPlatform then 53 + null 54 + else 55 + haskellLib.doDistribute self.terminfo_0_4_1_6; 56 + text = null; 57 + time = null; 58 + transformers = null; 59 + unix = null; 60 + xhtml = null; 61 + }
+16 -14
pkgs/development/julia-modules/default.nix
··· 165 runCommand "julia-${julia.version}-env" { 166 nativeBuildInputs = [makeWrapper]; 167 168 - inherit julia; 169 - inherit juliaWrapped; 170 - meta = julia.meta; 171 172 - # Expose the steps we used along the way in case the user wants to use them, for example to build 173 - # expressions and build them separately to avoid IFD. 174 - inherit dependencies; 175 - inherit closureYaml; 176 - inherit dependencyUuidToInfoYaml; 177 - inherit dependencyUuidToRepoYaml; 178 - inherit minimalRegistry; 179 - inherit artifactsNix; 180 - inherit overridesJson; 181 - inherit overridesToml; 182 - inherit projectAndDepot; 183 } ('' 184 mkdir -p $out/bin 185 makeWrapper ${juliaWrapped}/bin/julia $out/bin/julia \
··· 165 runCommand "julia-${julia.version}-env" { 166 nativeBuildInputs = [makeWrapper]; 167 168 + passthru = { 169 + inherit julia; 170 + inherit juliaWrapped; 171 + inherit (julia) pname version meta; 172 173 + # Expose the steps we used along the way in case the user wants to use them, for example to build 174 + # expressions and build them separately to avoid IFD. 175 + inherit dependencies; 176 + inherit closureYaml; 177 + inherit dependencyUuidToInfoYaml; 178 + inherit dependencyUuidToRepoYaml; 179 + inherit minimalRegistry; 180 + inherit artifactsNix; 181 + inherit overridesJson; 182 + inherit overridesToml; 183 + inherit projectAndDepot; 184 + }; 185 } ('' 186 mkdir -p $out/bin 187 makeWrapper ${juliaWrapped}/bin/julia $out/bin/julia \
+1 -1
pkgs/development/libraries/tk/generic.nix
··· 24 '' 25 + lib.optionalString (stdenv.hostPlatform.isDarwin && lib.versionOlder stdenv.hostPlatform.darwinMinVersion "11") '' 26 substituteInPlace unix/configure* \ 27 - --replace " -framework UniformTypeIdentifiers" "" 28 ''; 29 30 postInstall = ''
··· 24 '' 25 + lib.optionalString (stdenv.hostPlatform.isDarwin && lib.versionOlder stdenv.hostPlatform.darwinMinVersion "11") '' 26 substituteInPlace unix/configure* \ 27 + --replace-fail " -weak_framework UniformTypeIdentifiers" "" 28 ''; 29 30 postInstall = ''
+12
pkgs/development/php-packages/imagick/default.nix
··· 1 { 2 buildPecl, 3 lib, 4 imagemagick, 5 pkg-config, 6 pcre2, 7 }: 8 9 buildPecl { ··· 15 configureFlags = [ "--with-imagick=${imagemagick.dev}" ]; 16 nativeBuildInputs = [ pkg-config ]; 17 buildInputs = [ pcre2 ]; 18 19 meta = with lib; { 20 description = "Imagick is a native php extension to create and modify images using the ImageMagick API";
··· 1 { 2 buildPecl, 3 + fetchpatch, 4 lib, 5 imagemagick, 6 pkg-config, 7 pcre2, 8 + php, 9 }: 10 11 buildPecl { ··· 17 configureFlags = [ "--with-imagick=${imagemagick.dev}" ]; 18 nativeBuildInputs = [ pkg-config ]; 19 buildInputs = [ pcre2 ]; 20 + 21 + patches = lib.optionals (lib.versionAtLeast php.version "8.4") [ 22 + # PHP 8.4 compatibility patch based on https://github.com/Imagick/imagick/pull/690 23 + # These is also an alternative https://github.com/Imagick/imagick/pull/704 24 + # Which includes more changes but doesn't apply cleanly. 25 + (fetchpatch { 26 + url = "https://github.com/Imagick/imagick/commit/65e27f2bc02e7e8f1bf64e26e359e42a1331fca1.patch"; 27 + hash = "sha256-I0FwdqtQ/Y/QVkCl+nWPBIxsdQY6qcjdwiA/BaLNl7g="; 28 + }) 29 + ]; 30 31 meta = with lib; { 32 description = "Imagick is a native php extension to create and modify images using the ImageMagick API";
+2 -2
pkgs/development/python-modules/aiovlc/default.nix
··· 13 14 buildPythonPackage rec { 15 pname = "aiovlc"; 16 - version = "0.6.2"; 17 pyproject = true; 18 19 disabled = pythonOlder "3.11"; ··· 22 owner = "MartinHjelmare"; 23 repo = "aiovlc"; 24 rev = "refs/tags/v${version}"; 25 - hash = "sha256-tvMd7kydL4fx9JLTFQgCskBQCV0Zs/swDpPBxtSEvyM="; 26 }; 27 28 build-system = [ poetry-core ];
··· 13 14 buildPythonPackage rec { 15 pname = "aiovlc"; 16 + version = "0.6.3"; 17 pyproject = true; 18 19 disabled = pythonOlder "3.11"; ··· 22 owner = "MartinHjelmare"; 23 repo = "aiovlc"; 24 rev = "refs/tags/v${version}"; 25 + hash = "sha256-b4QtTR/p2wmVk4LZdkWwzM1odx1cxjUF08pV/zunTx4="; 26 }; 27 28 build-system = [ poetry-core ];
+2 -2
pkgs/development/python-modules/databricks-sdk/default.nix
··· 22 23 buildPythonPackage rec { 24 pname = "databricks-sdk"; 25 - version = "0.35.0"; 26 pyproject = true; 27 28 src = fetchFromGitHub { 29 owner = "databricks"; 30 repo = "databricks-sdk-py"; 31 rev = "refs/tags/v${version}"; 32 - hash = "sha256-CEv/+3E7KWV9LXzFPvDQIL1v8iFgbsS3/cTS/4obWas="; 33 }; 34 35 build-system = [
··· 22 23 buildPythonPackage rec { 24 pname = "databricks-sdk"; 25 + version = "0.38.0"; 26 pyproject = true; 27 28 src = fetchFromGitHub { 29 owner = "databricks"; 30 repo = "databricks-sdk-py"; 31 rev = "refs/tags/v${version}"; 32 + hash = "sha256-g00NRo0FSHujN2mCLZCc1hKGsBFiN7ztEneUMziuQpk="; 33 }; 34 35 build-system = [
+2 -2
pkgs/development/python-modules/dbt-snowflake/default.nix
··· 11 12 buildPythonPackage rec { 13 pname = "dbt-snowflake"; 14 - version = "1.8.3"; 15 pyproject = true; 16 17 disabled = pythonOlder "3.7"; ··· 20 owner = "dbt-labs"; 21 repo = "dbt-snowflake"; 22 rev = "refs/tags/v${version}"; 23 - hash = "sha256-jvhjf+Ce/oyHXFxMryz5Uy6Hq5Sx6vKgaGEJVAzqSdA="; 24 }; 25 26 build-system = [ setuptools ];
··· 11 12 buildPythonPackage rec { 13 pname = "dbt-snowflake"; 14 + version = "1.8.4"; 15 pyproject = true; 16 17 disabled = pythonOlder "3.7"; ··· 20 owner = "dbt-labs"; 21 repo = "dbt-snowflake"; 22 rev = "refs/tags/v${version}"; 23 + hash = "sha256-XUHXyxAoIBHXmH2xXOGrCO2+WMwwJ7oVYt4+m/fT/Ko="; 24 }; 25 26 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/eq3btsmart/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "eq3btsmart"; 15 - version = "1.2.0"; 16 pyproject = true; 17 18 src = fetchFromGitHub { 19 owner = "EuleMitKeule"; 20 repo = "eq3btsmart"; 21 rev = "refs/tags/${version}"; 22 - hash = "sha256-Z3GfUTh3qp5ICJAYsCO6ufw/Jd5FDjOaQE9SaD3H0IU="; 23 }; 24 25 build-system = [ poetry-core ];
··· 12 13 buildPythonPackage rec { 14 pname = "eq3btsmart"; 15 + version = "1.4.1"; 16 pyproject = true; 17 18 src = fetchFromGitHub { 19 owner = "EuleMitKeule"; 20 repo = "eq3btsmart"; 21 rev = "refs/tags/${version}"; 22 + hash = "sha256-FRnCnSMtsiZ1AbZOMwO/I5UoFWP0xAFqRZsnrHG9WJA="; 23 }; 24 25 build-system = [ poetry-core ];
+2 -2
pkgs/development/python-modules/fastcore/default.nix
··· 9 10 buildPythonPackage rec { 11 pname = "fastcore"; 12 - version = "1.7.20"; 13 pyproject = true; 14 15 disabled = pythonOlder "3.8"; ··· 18 owner = "fastai"; 19 repo = "fastcore"; 20 rev = "refs/tags/${version}"; 21 - hash = "sha256-UGY6iSRF8pY5frZqarxpiNkGEQtgNdXY5mMQzbzMjhA="; 22 }; 23 24 build-system = [ setuptools ];
··· 9 10 buildPythonPackage rec { 11 pname = "fastcore"; 12 + version = "1.7.22"; 13 pyproject = true; 14 15 disabled = pythonOlder "3.8"; ··· 18 owner = "fastai"; 19 repo = "fastcore"; 20 rev = "refs/tags/${version}"; 21 + hash = "sha256-llD7hDZStgCUfp06byGLtLPgDqiK7BAMw9kLNzOGUec="; 22 }; 23 24 build-system = [ setuptools ];
+3 -11
pkgs/development/python-modules/glances-api/default.nix
··· 13 14 buildPythonPackage rec { 15 pname = "glances-api"; 16 - version = "0.8.0"; 17 pyproject = true; 18 19 disabled = pythonOlder "3.11"; ··· 22 owner = "home-assistant-ecosystem"; 23 repo = "python-glances-api"; 24 rev = "refs/tags/${version}"; 25 - hash = "sha256-QAnwFX53jf7yWWa308/XTARNw5Qeo9K2zfD+6+HiFuM="; 26 }; 27 28 - patches = [ 29 - (fetchpatch2 { 30 - name = "pytest-httpx-compat.patch"; 31 - url = "https://github.com/home-assistant-ecosystem/python-glances-api/commit/f193472a25469e7e4b946f9a1c3a7a95949c6c04.patch"; 32 - hash = "sha256-hFeWv2WdbdeoaHgAOmwtBwWwPLjJzyurTZDV98qR7F8="; 33 - }) 34 - ]; 35 - 36 build-system = [ poetry-core ]; 37 38 dependencies = [ httpx ]; ··· 49 description = "Python API for interacting with Glances"; 50 homepage = "https://github.com/home-assistant-ecosystem/python-glances-api"; 51 changelog = "https://github.com/home-assistant-ecosystem/python-glances-api/releases/tag/${version}"; 52 - license = with licenses; [ mit ]; 53 maintainers = with maintainers; [ fab ]; 54 }; 55 }
··· 13 14 buildPythonPackage rec { 15 pname = "glances-api"; 16 + version = "0.9.0"; 17 pyproject = true; 18 19 disabled = pythonOlder "3.11"; ··· 22 owner = "home-assistant-ecosystem"; 23 repo = "python-glances-api"; 24 rev = "refs/tags/${version}"; 25 + hash = "sha256-VLsNMFFt+kMxNw/81OMX4Fg/xCbQloCURmV0OxvClq8="; 26 }; 27 28 build-system = [ poetry-core ]; 29 30 dependencies = [ httpx ]; ··· 41 description = "Python API for interacting with Glances"; 42 homepage = "https://github.com/home-assistant-ecosystem/python-glances-api"; 43 changelog = "https://github.com/home-assistant-ecosystem/python-glances-api/releases/tag/${version}"; 44 + license = licenses.mit; 45 maintainers = with maintainers; [ fab ]; 46 }; 47 }
+2 -2
pkgs/development/python-modules/herepy/default.nix
··· 11 12 buildPythonPackage rec { 13 pname = "herepy"; 14 - version = "3.6.4"; 15 pyproject = true; 16 17 disabled = pythonOlder "3.8"; ··· 20 owner = "abdullahselek"; 21 repo = "HerePy"; 22 rev = "refs/tags/${version}"; 23 - hash = "sha256-XefoRAaWq5sPQsrqek6kibRjKU+ZImQmt32jutfptNw="; 24 }; 25 26 build-system = [ setuptools ];
··· 11 12 buildPythonPackage rec { 13 pname = "herepy"; 14 + version = "3.6.5"; 15 pyproject = true; 16 17 disabled = pythonOlder "3.8"; ··· 20 owner = "abdullahselek"; 21 repo = "HerePy"; 22 rev = "refs/tags/${version}"; 23 + hash = "sha256-8DwzzC0sTrGnMpuADc55HCIeH/KyWacv8X+Ubh+n7ZM="; 24 }; 25 26 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/kbcstorage/default.nix
··· 18 19 buildPythonPackage rec { 20 pname = "sapi-python-client"; 21 - version = "0.9.1"; 22 pyproject = true; 23 24 disabled = pythonOlder "3.7"; ··· 27 owner = "keboola"; 28 repo = "sapi-python-client"; 29 rev = "refs/tags/${version}"; 30 - hash = "sha256-4ykOwSQ1tM0ZviETkjU0ydg7FWjkGNysHQe+f9MS0MM="; 31 }; 32 33 postPatch = ''
··· 18 19 buildPythonPackage rec { 20 pname = "sapi-python-client"; 21 + version = "0.9.2"; 22 pyproject = true; 23 24 disabled = pythonOlder "3.7"; ··· 27 owner = "keboola"; 28 repo = "sapi-python-client"; 29 rev = "refs/tags/${version}"; 30 + hash = "sha256-30bAw5pYEUj0jeZWiJxzZ7lDs/+63tlcoLaHrUmYCs8="; 31 }; 32 33 postPatch = ''
+2 -2
pkgs/development/python-modules/latexrestricted/default.nix
··· 7 8 buildPythonPackage rec { 9 pname = "latexrestricted"; 10 - version = "0.6.0"; 11 pyproject = true; 12 13 src = fetchPypi { 14 inherit pname version; 15 - hash = "sha256-/N5eC32OVN6qxWZAwAUlCIrMV2ARitiX3gaCPiSCRHs="; 16 }; 17 18 build-system = [ setuptools ];
··· 7 8 buildPythonPackage rec { 9 pname = "latexrestricted"; 10 + version = "0.6.2"; 11 pyproject = true; 12 13 src = fetchPypi { 14 inherit pname version; 15 + hash = "sha256-1R0hpBGXpYH/KcD4GFUfFvoOaJDe+Sl5msC952KnqmA="; 16 }; 17 18 build-system = [ setuptools ];
+3 -3
pkgs/development/python-modules/libcst/default.nix
··· 23 24 buildPythonPackage rec { 25 pname = "libcst"; 26 - version = "1.5.0"; 27 pyproject = true; 28 29 disabled = pythonOlder "3.9"; ··· 32 owner = "Instagram"; 33 repo = "LibCST"; 34 rev = "refs/tags/v${version}"; 35 - hash = "sha256-0r2xQ8QVmA4I6eZHBWd/U1fQ8nK5rdblIoMACudOYPY="; 36 }; 37 38 cargoDeps = rustPlatform.fetchCargoTarball { 39 inherit src; 40 sourceRoot = "${src.name}/${cargoRoot}"; 41 name = "${pname}-${version}"; 42 - hash = "sha256-mexXuOsL1+F/GL2wMf/pwK7bJLFRgPtPSYE4W3E0VQ0="; 43 }; 44 45 cargoRoot = "native";
··· 23 24 buildPythonPackage rec { 25 pname = "libcst"; 26 + version = "1.5.1"; 27 pyproject = true; 28 29 disabled = pythonOlder "3.9"; ··· 32 owner = "Instagram"; 33 repo = "LibCST"; 34 rev = "refs/tags/v${version}"; 35 + hash = "sha256-fveY4ah94pv9ImI36MNrrxTpZv/DtLb45pXm67L8/GA="; 36 }; 37 38 cargoDeps = rustPlatform.fetchCargoTarball { 39 inherit src; 40 sourceRoot = "${src.name}/${cargoRoot}"; 41 name = "${pname}-${version}"; 42 + hash = "sha256-TcWGW1RF2se89BtvQHO+4BwnRMZ8ygqO3du9Q/gZi/Q="; 43 }; 44 45 cargoRoot = "native";
+103
pkgs/development/python-modules/llama-cpp-python/default.nix
···
··· 1 + { 2 + lib, 3 + stdenv, 4 + buildPythonPackage, 5 + cmake, 6 + fetchFromGitHub, 7 + gitUpdater, 8 + ninja, 9 + pathspec, 10 + pyproject-metadata, 11 + pytestCheckHook, 12 + pythonOlder, 13 + scikit-build-core, 14 + llama-cpp-python, 15 + 16 + config, 17 + cudaSupport ? config.cudaSupport, 18 + cudaPackages ? { }, 19 + 20 + diskcache, 21 + jinja2, 22 + numpy, 23 + typing-extensions, 24 + scipy, 25 + huggingface-hub, 26 + }: 27 + let 28 + version = "0.3.1"; 29 + in 30 + buildPythonPackage { 31 + pname = "llama-cpp-python"; 32 + inherit version; 33 + pyproject = true; 34 + 35 + disabled = pythonOlder "3.7"; 36 + 37 + stdenv = if cudaSupport then cudaPackages.backendStdenv else stdenv; 38 + 39 + src = fetchFromGitHub { 40 + owner = "abetlen"; 41 + repo = "llama-cpp-python"; 42 + rev = "refs/tags/v${version}"; 43 + hash = "sha256-eO1zvNJZBE5BCnbgbh00tFIRWBCWor1lIsrLXs/HFds="; 44 + fetchSubmodules = true; 45 + }; 46 + 47 + dontUseCmakeConfigure = true; 48 + SKBUILD_CMAKE_ARGS = lib.strings.concatStringsSep ";" ( 49 + lib.optionals cudaSupport [ 50 + "-DGGML_CUDA=on" 51 + "-DCUDAToolkit_ROOT=${lib.getDev cudaPackages.cuda_nvcc}" 52 + "-DCMAKE_CUDA_COMPILER=${lib.getExe cudaPackages.cuda_nvcc}" 53 + ] 54 + ); 55 + 56 + nativeBuildInputs = [ 57 + cmake 58 + ninja 59 + pathspec 60 + pyproject-metadata 61 + scikit-build-core 62 + ]; 63 + 64 + buildInputs = lib.optionals cudaSupport ( 65 + with cudaPackages; 66 + [ 67 + cuda_cudart # cuda_runtime.h 68 + cuda_cccl # <thrust/*> 69 + libcublas # cublas_v2.h 70 + ] 71 + ); 72 + 73 + propagatedBuildInputs = [ 74 + diskcache 75 + jinja2 76 + numpy 77 + typing-extensions 78 + ]; 79 + 80 + nativeCheckInputs = [ 81 + pytestCheckHook 82 + scipy 83 + huggingface-hub 84 + ]; 85 + 86 + disabledTests = [ 87 + # tries to download model from huggingface-hub 88 + "test_real_model" 89 + "test_real_llama" 90 + ]; 91 + 92 + pythonImportsCheck = [ "llama_cpp" ]; 93 + 94 + passthru.updateScript = gitUpdater { rev-prefix = "v"; }; 95 + passthru.tests.llama-cpp-python = llama-cpp-python.override { cudaSupport = true; }; 96 + 97 + meta = { 98 + description = "Python bindings for llama.cpp"; 99 + homepage = "https://github.com/abetlen/llama-cpp-python"; 100 + license = lib.licenses.mit; 101 + maintainers = with lib.maintainers; [ kirillrdy ]; 102 + }; 103 + }
+23 -19
pkgs/development/python-modules/moderngl-window/default.nix
··· 3 stdenv, 4 buildPythonPackage, 5 fetchFromGitHub, 6 setuptools, 7 - glfw, 8 - mesa, 9 moderngl, 10 numpy, 11 pillow, 12 pygame, 13 - pyglet, 14 - pyqt5, 15 - pyrr, 16 pysdl2, 17 pyside2, 18 - pythonOlder, 19 - scipy, 20 - trimesh, 21 }: 22 23 buildPythonPackage rec { 24 pname = "moderngl-window"; 25 - version = "2.4.6"; 26 pyproject = true; 27 28 - disabled = pythonOlder "3.8"; 29 - 30 src = fetchFromGitHub { 31 owner = "moderngl"; 32 repo = "moderngl_window"; 33 rev = "refs/tags/${version}"; 34 - hash = "sha256-zTygSXU/vQZaFCuHbRBpO9/BYYA2UOid+wvhyc2bWMI="; 35 }; 36 37 pythonRelaxDeps = [ ··· 42 setuptools 43 ]; 44 45 - dependencies = [ 46 numpy 47 - moderngl 48 pyglet 49 - pillow 50 - pyrr 51 ]; 52 53 optional-dependencies = { ··· 67 68 pythonImportsCheck = [ "moderngl_window" ]; 69 70 - meta = with lib; { 71 description = "Cross platform helper library for ModernGL making window creation and resource loading simple"; 72 homepage = "https://github.com/moderngl/moderngl-window"; 73 changelog = "https://github.com/moderngl/moderngl-window/blob/${version}/CHANGELOG.md"; 74 - license = licenses.mit; 75 - maintainers = with maintainers; [ c0deaddict ]; 76 inherit (mesa.meta) platforms; 77 broken = stdenv.hostPlatform.isDarwin; 78 };
··· 3 stdenv, 4 buildPythonPackage, 5 fetchFromGitHub, 6 + 7 + # build-system 8 setuptools, 9 + 10 + # dependencies 11 moderngl, 12 numpy, 13 pillow, 14 + pyglet, 15 + pyglm, 16 + 17 + # optional-dependencies 18 + trimesh, 19 + scipy, 20 + glfw, 21 pygame, 22 pysdl2, 23 pyside2, 24 + pyqt5, 25 + 26 + mesa, 27 }: 28 29 buildPythonPackage rec { 30 pname = "moderngl-window"; 31 + version = "3.0.0"; 32 pyproject = true; 33 34 src = fetchFromGitHub { 35 owner = "moderngl"; 36 repo = "moderngl_window"; 37 rev = "refs/tags/${version}"; 38 + hash = "sha256-V6QQCQcSSEt11+Xv6HtWZSH+/nPFRZZK1ThQJipIT0M="; 39 }; 40 41 pythonRelaxDeps = [ ··· 46 setuptools 47 ]; 48 49 + propagatedBuildInputs = [ 50 + moderngl 51 numpy 52 + pillow 53 pyglet 54 + pyglm 55 ]; 56 57 optional-dependencies = { ··· 71 72 pythonImportsCheck = [ "moderngl_window" ]; 73 74 + meta = { 75 description = "Cross platform helper library for ModernGL making window creation and resource loading simple"; 76 homepage = "https://github.com/moderngl/moderngl-window"; 77 changelog = "https://github.com/moderngl/moderngl-window/blob/${version}/CHANGELOG.md"; 78 + license = lib.licenses.mit; 79 + maintainers = with lib.maintainers; [ c0deaddict ]; 80 inherit (mesa.meta) platforms; 81 broken = stdenv.hostPlatform.isDarwin; 82 };
+2 -2
pkgs/development/python-modules/opensearch-py/default.nix
··· 30 31 buildPythonPackage rec { 32 pname = "opensearch-py"; 33 - version = "2.7.1"; 34 pyproject = true; 35 36 src = fetchFromGitHub { 37 owner = "opensearch-project"; 38 repo = "opensearch-py"; 39 rev = "refs/tags/v${version}"; 40 - hash = "sha256-GC0waXxHRiXVXjhTGbet3HvDKmUBKzoufu/J4fmrM+k="; 41 }; 42 43 nativeBuildInputs = [ setuptools ];
··· 30 31 buildPythonPackage rec { 32 pname = "opensearch-py"; 33 + version = "2.8.0"; 34 pyproject = true; 35 36 src = fetchFromGitHub { 37 owner = "opensearch-project"; 38 repo = "opensearch-py"; 39 rev = "refs/tags/v${version}"; 40 + hash = "sha256-rPHpGKEIINAEUu2UkJwAM60i0hTzXd1ec6WD50RrgL8="; 41 }; 42 43 nativeBuildInputs = [ setuptools ];
+2 -2
pkgs/development/python-modules/pyoverkiz/default.nix
··· 17 18 buildPythonPackage rec { 19 pname = "pyoverkiz"; 20 - version = "1.15.0"; 21 pyproject = true; 22 23 disabled = pythonOlder "3.10"; ··· 26 owner = "iMicknl"; 27 repo = "python-overkiz-api"; 28 rev = "refs/tags/v${version}"; 29 - hash = "sha256-nwRPIudrxsbK6UYLaGjQJBkGMI5cKEE7m8M0h3k6434="; 30 }; 31 32 build-system = [ poetry-core ];
··· 17 18 buildPythonPackage rec { 19 pname = "pyoverkiz"; 20 + version = "1.15.1"; 21 pyproject = true; 22 23 disabled = pythonOlder "3.10"; ··· 26 owner = "iMicknl"; 27 repo = "python-overkiz-api"; 28 rev = "refs/tags/v${version}"; 29 + hash = "sha256-3j72zLBMm6tuQDWqNrkVEFvDAc45xyLnG19lEsJV1Mg="; 30 }; 31 32 build-system = [ poetry-core ];
+2 -2
pkgs/development/python-modules/pystac-client/default.nix
··· 18 19 buildPythonPackage rec { 20 pname = "pystac-client"; 21 - version = "0.8.4"; 22 pyproject = true; 23 disabled = pythonOlder "3.9"; 24 ··· 26 owner = "stac-utils"; 27 repo = "pystac-client"; 28 rev = "refs/tags/v${version}"; 29 - hash = "sha256-EetS0MD5DLBR+ht9YfD+oRdfHbVONuVHdSZj3FQ5Sm8="; 30 }; 31 32 build-system = [ setuptools ];
··· 18 19 buildPythonPackage rec { 20 pname = "pystac-client"; 21 + version = "0.8.5"; 22 pyproject = true; 23 disabled = pythonOlder "3.9"; 24 ··· 26 owner = "stac-utils"; 27 repo = "pystac-client"; 28 rev = "refs/tags/v${version}"; 29 + hash = "sha256-bryJCg0JqjxQi5tAvd5Y2f/hXmHoIGEFiHuSPCjqfYk="; 30 }; 31 32 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/python-gvm/default.nix
··· 15 16 buildPythonPackage rec { 17 pname = "python-gvm"; 18 - version = "24.8.0"; 19 pyproject = true; 20 21 disabled = pythonOlder "3.9"; ··· 24 owner = "greenbone"; 25 repo = "python-gvm"; 26 rev = "refs/tags/v${version}"; 27 - hash = "sha256-JyImC75Le6S2kQXSU/Ze4TNaitJSJ8LD9j/ny+xjoGA="; 28 }; 29 30 build-system = [ poetry-core ];
··· 15 16 buildPythonPackage rec { 17 pname = "python-gvm"; 18 + version = "24.11.0"; 19 pyproject = true; 20 21 disabled = pythonOlder "3.9"; ··· 24 owner = "greenbone"; 25 repo = "python-gvm"; 26 rev = "refs/tags/v${version}"; 27 + hash = "sha256-n4Izhtqs6awEtnt4r915ZtyHQnM49ExbuAzqJw/CNa0="; 28 }; 29 30 build-system = [ poetry-core ];
+2 -2
pkgs/development/python-modules/unstructured/default.nix
··· 57 grpcio, 58 }: 59 let 60 - version = "0.15.14"; 61 optional-dependencies = { 62 huggingflace = [ 63 langdetect ··· 100 owner = "Unstructured-IO"; 101 repo = "unstructured"; 102 rev = "refs/tags/${version}"; 103 - hash = "sha256-cIMKaSKG4T832rpiJeiwftqVrcMezD9ICfislGPV/TQ="; 104 }; 105 106 propagatedBuildInputs = [
··· 57 grpcio, 58 }: 59 let 60 + version = "0.16.8"; 61 optional-dependencies = { 62 huggingflace = [ 63 langdetect ··· 100 owner = "Unstructured-IO"; 101 repo = "unstructured"; 102 rev = "refs/tags/${version}"; 103 + hash = "sha256-TIJ1cfti+zF9sP0LrIIue9F8n8gRAy5+8hb4cIzHk2U="; 104 }; 105 106 propagatedBuildInputs = [
+20 -7
pkgs/development/python-modules/vobject/default.nix
··· 3 buildPythonPackage, 4 fetchPypi, 5 isPyPy, 6 - python, 7 python-dateutil, 8 }: 9 10 buildPythonPackage rec { 11 - version = "0.9.7"; 12 - format = "setuptools"; 13 pname = "vobject"; 14 15 src = fetchPypi { 16 inherit pname version; 17 - hash = "sha256-q3J7+B3oiYStpcEfBm8eFkmQPT49fskfHOloFyr9UlY="; 18 }; 19 20 disabled = isPyPy; 21 22 - propagatedBuildInputs = [ python-dateutil ]; 23 24 - checkPhase = "${python.interpreter} tests.py"; 25 26 meta = with lib; { 27 description = "Module for reading vCard and vCalendar files"; 28 - homepage = "http://eventable.github.io/vobject/"; 29 license = licenses.asl20; 30 maintainers = [ ]; 31 };
··· 3 buildPythonPackage, 4 fetchPypi, 5 isPyPy, 6 + setuptools, 7 python-dateutil, 8 + pytz, 9 + six, 10 + pytestCheckHook, 11 }: 12 13 buildPythonPackage rec { 14 + version = "0.9.8"; 15 pname = "vobject"; 16 + pyproject = true; 17 18 src = fetchPypi { 19 inherit pname version; 20 + hash = "sha256-2wCn9NtJOXFV3YpoceiioBdabrpaZUww6RD4KylRS1g="; 21 }; 22 23 disabled = isPyPy; 24 25 + build-system = [ setuptools ]; 26 + 27 + dependencies = [ 28 + python-dateutil 29 + pytz 30 + six 31 + ]; 32 + 33 + pythonImportsCheck = [ "vobject" ]; 34 + 35 + nativeCheckInputs = [ pytestCheckHook ]; 36 37 + pytestFlagsArray = [ "tests.py" ]; 38 39 meta = with lib; { 40 description = "Module for reading vCard and vCalendar files"; 41 + homepage = "https://github.com/py-vobject/vobject"; 42 license = licenses.asl20; 43 maintainers = [ ]; 44 };
+1 -1
pkgs/development/r-modules/default.nix
··· 1809 }); 1810 1811 Rhdf5lib = let 1812 - hdf5 = pkgs.hdf5_1_10.overrideAttrs (attrs: {configureFlags = attrs.configureFlags ++ [ "--enable-cxx" ];}); 1813 in old.Rhdf5lib.overrideAttrs (attrs: { 1814 propagatedBuildInputs = attrs.propagatedBuildInputs ++ [ hdf5.dev pkgs.libaec ]; 1815 patches = [ ./patches/Rhdf5lib.patch ];
··· 1809 }); 1810 1811 Rhdf5lib = let 1812 + hdf5 = pkgs.hdf5_1_10; 1813 in old.Rhdf5lib.overrideAttrs (attrs: { 1814 propagatedBuildInputs = attrs.propagatedBuildInputs ++ [ hdf5.dev pkgs.libaec ]; 1815 patches = [ ./patches/Rhdf5lib.patch ];
+3 -3
pkgs/development/tools/analysis/cargo-tarpaulin/default.nix
··· 10 11 rustPlatform.buildRustPackage rec { 12 pname = "cargo-tarpaulin"; 13 - version = "0.31.2"; 14 15 src = fetchFromGitHub { 16 owner = "xd009642"; 17 repo = "tarpaulin"; 18 rev = version; 19 - hash = "sha256-rYu8SsG2vEXMpwsLV/6TjC0iDJRsm6UEl4qXZwXRRpE="; 20 }; 21 22 - cargoHash = "sha256-5zhsWliwPPXq+KUKW0N1qyueg8BD+qmUqeKUrVl/vZ8="; 23 24 nativeBuildInputs = [ 25 pkg-config
··· 10 11 rustPlatform.buildRustPackage rec { 12 pname = "cargo-tarpaulin"; 13 + version = "0.31.3"; 14 15 src = fetchFromGitHub { 16 owner = "xd009642"; 17 repo = "tarpaulin"; 18 rev = version; 19 + hash = "sha256-ROsoTXkNB6qlcKFXgylZYuKp+WTFcbcDfw6L5ZqiRiA="; 20 }; 21 22 + cargoHash = "sha256-1ZyAyJvHJtf8qEW7VmrZLL8WeVjD+w5vkVUld6keL+s="; 23 24 nativeBuildInputs = [ 25 pkg-config
+13
pkgs/development/tools/haskell/hadrian/disable-hyperlinked-source-extra-args.patch
···
··· 1 + diff --git a/hadrian/src/Settings/Default.hs b/hadrian/src/Settings/Default.hs 2 + index 0b743788ec..a7ff841609 100644 3 + --- a/hadrian/src/Settings/Default.hs 4 + +++ b/hadrian/src/Settings/Default.hs 5 + @@ -249,7 +249,7 @@ defaultExtraArgs = 6 + 7 + defaultHaddockExtraArgs :: Args 8 + defaultHaddockExtraArgs = builder (Haddock BuildPackage) ? 9 + - mconcat [ arg "--hyperlinked-source", arg "--hoogle", arg "--quickjump" ] 10 + + mconcat [ arg "--hoogle", arg "--quickjump" ] 11 + 12 + 13 + -- | Default source arguments, e.g. optimisation settings.
pkgs/development/tools/haskell/hadrian/disable-hyperlinked-source.patch pkgs/development/tools/haskell/hadrian/disable-hyperlinked-source-pre-9.8.patch
+2 -2
pkgs/kde/misc/kirigami-addons/default.nix
··· 7 }: 8 mkKdeDerivation rec { 9 pname = "kirigami-addons"; 10 - version = "1.5.0"; 11 12 src = fetchurl { 13 url = "mirror://kde/stable/kirigami-addons/kirigami-addons-${version}.tar.xz"; 14 - hash = "sha256-+d/RkQIrYz6jNI+Ecw1xWKFZ3+SWaNugqem9Z4rETlQ="; 15 }; 16 17 extraBuildInputs = [ qtdeclarative ];
··· 7 }: 8 mkKdeDerivation rec { 9 pname = "kirigami-addons"; 10 + version = "1.6.0"; 11 12 src = fetchurl { 13 url = "mirror://kde/stable/kirigami-addons/kirigami-addons-${version}.tar.xz"; 14 + hash = "sha256-N22ub8WsrH0JBc6f7zIRvgcFxuLfUruA394eqiD+G/o="; 15 }; 16 17 extraBuildInputs = [ qtdeclarative ];
+1 -2
pkgs/os-specific/linux/scx/scx_rustscheds.nix
··· 24 25 nativeBuildInputs = [ 26 pkg-config 27 - llvmPackages.clang 28 ]; 29 buildInputs = [ 30 elfutils ··· 33 ]; 34 35 env = { 36 - LIBCLANG_PATH = "${lib.getLib llvmPackages.libclang}/lib"; 37 BPF_CLANG = lib.getExe llvmPackages.clang; 38 BPF_EXTRA_CFLAGS_PRE_INCL = lib.concatStringsSep " " [ 39 "-I${scx.cscheds.dev}/libbpf/src/usr/include"
··· 24 25 nativeBuildInputs = [ 26 pkg-config 27 + rustPlatform.bindgenHook 28 ]; 29 buildInputs = [ 30 elfutils ··· 33 ]; 34 35 env = { 36 BPF_CLANG = lib.getExe llvmPackages.clang; 37 BPF_EXTRA_CFLAGS_PRE_INCL = lib.concatStringsSep " " [ 38 "-I${scx.cscheds.dev}/libbpf/src/usr/include"
-4
pkgs/servers/http/apache-httpd/2.4.nix
··· 2 , nixosTests 3 , proxySupport ? true 4 , sslSupport ? true, openssl 5 - , modTlsSupport ? false, rustls-ffi, Foundation 6 , http2Support ? true, nghttp2 7 , ldapSupport ? true, openldap 8 , libxml2Support ? true, libxml2 ··· 40 buildInputs = [ perl libxcrypt zlib ] ++ 41 lib.optional brotliSupport brotli ++ 42 lib.optional sslSupport openssl ++ 43 - lib.optional modTlsSupport rustls-ffi ++ 44 - lib.optional (modTlsSupport && stdenv.hostPlatform.isDarwin) Foundation ++ 45 lib.optional ldapSupport openldap ++ # there is no --with-ldap flag 46 lib.optional libxml2Support libxml2 ++ 47 lib.optional http2Support nghttp2 ++ ··· 70 "--includedir=${placeholder "dev"}/include" 71 (lib.enableFeature proxySupport "proxy") 72 (lib.enableFeature sslSupport "ssl") 73 - (lib.enableFeature modTlsSupport "tls") 74 (lib.withFeatureAs libxml2Support "libxml2" "${libxml2.dev}/include/libxml2") 75 "--docdir=$(doc)/share/doc" 76
··· 2 , nixosTests 3 , proxySupport ? true 4 , sslSupport ? true, openssl 5 , http2Support ? true, nghttp2 6 , ldapSupport ? true, openldap 7 , libxml2Support ? true, libxml2 ··· 39 buildInputs = [ perl libxcrypt zlib ] ++ 40 lib.optional brotliSupport brotli ++ 41 lib.optional sslSupport openssl ++ 42 lib.optional ldapSupport openldap ++ # there is no --with-ldap flag 43 lib.optional libxml2Support libxml2 ++ 44 lib.optional http2Support nghttp2 ++ ··· 67 "--includedir=${placeholder "dev"}/include" 68 (lib.enableFeature proxySupport "proxy") 69 (lib.enableFeature sslSupport "ssl") 70 (lib.withFeatureAs libxml2Support "libxml2" "${libxml2.dev}/include/libxml2") 71 "--docdir=$(doc)/share/doc" 72
-51
pkgs/servers/radicale/2.x.nix
··· 1 - { lib, fetchFromGitHub, python3 }: 2 - 3 - python3.pkgs.buildPythonApplication rec { 4 - pname = "Radicale"; 5 - version = "2.1.12"; 6 - 7 - # No tests in PyPI tarball 8 - src = fetchFromGitHub { 9 - owner = "Kozea"; 10 - repo = "Radicale"; 11 - rev = version; 12 - sha256 = "14f9ql0fiwapaa4xaslwgk1ah9fzxxan2p1p2rxb4a5iqph1z0cl"; 13 - }; 14 - 15 - # We only want functional tests 16 - postPatch = '' 17 - sed -i "s/pytest-cov\|pytest-flake8\|pytest-isort//g" setup.py 18 - sed -i "/^addopts/d" setup.cfg 19 - ''; 20 - 21 - propagatedBuildInputs = with python3.pkgs; [ 22 - vobject 23 - python-dateutil 24 - passlib 25 - setuptools 26 - ]; 27 - 28 - nativeCheckInputs = with python3.pkgs; [ 29 - pytestCheckHook 30 - ]; 31 - 32 - disabledTests = [ 33 - # uses unsupported crypt method 34 - "test_htpasswd_crypt" 35 - ]; 36 - 37 - meta = with lib; { 38 - homepage = "https://radicale.org/v2.html"; 39 - description = "CalDAV CardDAV server"; 40 - mainProgram = "radicale"; 41 - longDescription = '' 42 - The Radicale Project is a complete CalDAV (calendar) and CardDAV 43 - (contact) server solution. Calendars and address books are available for 44 - both local and remote access, possibly limited through authentication 45 - policies. They can be viewed and edited by calendar and contact clients 46 - on mobile phones or computers. 47 - ''; 48 - license = licenses.gpl3Plus; 49 - maintainers = with maintainers; [ edwtjo pSub ]; 50 - }; 51 - }
···
+2
pkgs/servers/sql/postgresql/ext/default.nix
··· 72 73 pg_net = super.callPackage ./pg_net.nix { }; 74 75 pg-semver = super.callPackage ./pg-semver.nix { }; 76 77 pgtap = super.callPackage ./pgtap.nix { };
··· 72 73 pg_net = super.callPackage ./pg_net.nix { }; 74 75 + pg-gvm = super.callPackage ./pg-gvm.nix { }; 76 + 77 pg-semver = super.callPackage ./pg-semver.nix { }; 78 79 pgtap = super.callPackage ./pgtap.nix { };
+2 -2
pkgs/servers/web-apps/moodle/default.nix
··· 1 { lib, stdenv, fetchurl, writeText, plugins ? [ ], nixosTests }: 2 3 let 4 - version = "4.4.1"; 5 6 versionParts = lib.take 2 (lib.splitVersion version); 7 # 4.2 -> 402, 3.11 -> 311 ··· 15 16 src = fetchurl { 17 url = "https://download.moodle.org/download.php/direct/stable${stableVersion}/${pname}-${version}.tgz"; 18 - hash = "sha256-+pzDrSMm+V4pEze13mJ/eyhaxcvnmG/eno0csCRTisU="; 19 }; 20 21 phpConfig = writeText "config.php" ''
··· 1 { lib, stdenv, fetchurl, writeText, plugins ? [ ], nixosTests }: 2 3 let 4 + version = "4.4.3"; 5 6 versionParts = lib.take 2 (lib.splitVersion version); 7 # 4.2 -> 402, 3.11 -> 311 ··· 15 16 src = fetchurl { 17 url = "https://download.moodle.org/download.php/direct/stable${stableVersion}/${pname}-${version}.tgz"; 18 + hash = "sha256-SFysVBGGJKQFzm3pV25+wHaF7R1trqAOFQ1BLBTIzWk="; 19 }; 20 21 phpConfig = writeText "config.php" ''
+52 -37
pkgs/tools/X11/opentabletdriver/default.nix pkgs/by-name/op/opentabletdriver/package.nix
··· 1 - { lib 2 - , buildDotnetModule 3 - , fetchFromGitHub 4 - , gtk3 5 - , libX11 6 - , libXrandr 7 - , libappindicator 8 - , libevdev 9 - , libnotify 10 - , udev 11 - , copyDesktopItems 12 - , makeDesktopItem 13 - , nixosTests 14 - , wrapGAppsHook3 15 - , jq 16 - , coreutils 17 - , dotnetCorePackages 18 }: 19 20 buildDotnetModule rec { 21 pname = "OpenTabletDriver"; 22 - version = "0.6.4.0"; 23 24 src = fetchFromGitHub { 25 owner = "OpenTabletDriver"; 26 repo = "OpenTabletDriver"; 27 - rev = "v${version}"; 28 - hash = "sha256-zK+feU96JOXjmkTndM9VyUid3z+MZFxJGH+MXaB6kzk="; 29 }; 30 31 - patches = [ 32 - ./remove-git-from-generate-rules.patch 33 - ]; 34 35 - dotnetInstallFlags = [ "--framework=net6.0" ]; 36 37 - dotnet-sdk = dotnetCorePackages.sdk_6_0; 38 - projectFile = [ "OpenTabletDriver.Console" "OpenTabletDriver.Daemon" "OpenTabletDriver.UX.Gtk" ]; 39 nugetDeps = ./deps.nix; 40 41 - executables = [ "OpenTabletDriver.Console" "OpenTabletDriver.Daemon" "OpenTabletDriver.UX.Gtk" ]; 42 43 nativeBuildInputs = [ 44 copyDesktopItems ··· 49 50 runtimeDeps = [ 51 gtk3 52 - libX11 53 - libXrandr 54 libappindicator 55 libevdev 56 libnotify 57 udev 58 ]; 59 ··· 84 85 preBuild = '' 86 patchShebangs generate-rules.sh 87 ''; 88 89 postFixup = '' ··· 94 95 install -Dm644 $src/OpenTabletDriver.UX/Assets/otd.png -t $out/share/pixmaps 96 97 mkdir -p $out/lib/udev/rules.d 98 - ./generate-rules.sh \ 99 - | sed 's@/usr/bin/env rm@${lib.getExe' coreutils "rm"}@' \ 100 - > $out/lib/udev/rules.d/70-opentabletdriver.rules 101 ''; 102 103 desktopItems = [ ··· 106 name = "OpenTabletDriver"; 107 exec = "otd-gui"; 108 icon = "otd"; 109 - comment = meta.description; 110 categories = [ "Utility" ]; 111 }) 112 ]; ··· 118 }; 119 }; 120 121 - meta = with lib; { 122 description = "Open source, cross-platform, user-mode tablet driver"; 123 homepage = "https://github.com/OpenTabletDriver/OpenTabletDriver"; 124 - license = licenses.lgpl3Plus; 125 - maintainers = with maintainers; [ gepbird thiagokokada ]; 126 - platforms = [ "x86_64-linux" "aarch64-linux" ]; 127 mainProgram = "otd"; 128 }; 129 }
··· 1 + { 2 + lib, 3 + buildDotnetModule, 4 + copyDesktopItems, 5 + coreutils, 6 + dotnetCorePackages, 7 + fetchFromGitHub, 8 + gtk3, 9 + jq, 10 + libappindicator, 11 + libevdev, 12 + libnotify, 13 + libX11, 14 + libXrandr, 15 + makeDesktopItem, 16 + nixosTests, 17 + udev, 18 + wrapGAppsHook3, 19 }: 20 21 buildDotnetModule rec { 22 pname = "OpenTabletDriver"; 23 + version = "0.6.4.0-unstable-2024-11-25"; 24 25 src = fetchFromGitHub { 26 owner = "OpenTabletDriver"; 27 repo = "OpenTabletDriver"; 28 + rev = "8b88b8bdc5144391f10eb61ee77803ba0ee83718"; # 0.6.x branch 29 + hash = "sha256-5JKkSqV9owkHgWXfjiyv5QRh86apDCPzpA6qha1i4D4="; 30 }; 31 32 + dotnetInstallFlags = [ "--framework=net8.0" ]; 33 34 + dotnet-sdk = dotnetCorePackages.sdk_8_0; 35 + dotnet-runtime = dotnetCorePackages.runtime_8_0; 36 37 + projectFile = [ 38 + "OpenTabletDriver.Console" 39 + "OpenTabletDriver.Daemon" 40 + "OpenTabletDriver.UX.Gtk" 41 + ]; 42 nugetDeps = ./deps.nix; 43 44 + executables = [ 45 + "OpenTabletDriver.Console" 46 + "OpenTabletDriver.Daemon" 47 + "OpenTabletDriver.UX.Gtk" 48 + ]; 49 50 nativeBuildInputs = [ 51 copyDesktopItems ··· 56 57 runtimeDeps = [ 58 gtk3 59 libappindicator 60 libevdev 61 libnotify 62 + libX11 63 + libXrandr 64 udev 65 ]; 66 ··· 91 92 preBuild = '' 93 patchShebangs generate-rules.sh 94 + substituteInPlace generate-rules.sh \ 95 + --replace-fail '/usr/bin/env rm' '${lib.getExe' coreutils "rm"}' 96 ''; 97 98 postFixup = '' ··· 103 104 install -Dm644 $src/OpenTabletDriver.UX/Assets/otd.png -t $out/share/pixmaps 105 106 + # Generate udev rules from source 107 + export OTD_CONFIGURATIONS="$src/OpenTabletDriver.Configurations/Configurations" 108 mkdir -p $out/lib/udev/rules.d 109 + ./generate-rules.sh > $out/lib/udev/rules.d/70-opentabletdriver.rules 110 ''; 111 112 desktopItems = [ ··· 115 name = "OpenTabletDriver"; 116 exec = "otd-gui"; 117 icon = "otd"; 118 + comment = "Open source, cross-platform, user-mode tablet driver"; 119 categories = [ "Utility" ]; 120 }) 121 ]; ··· 127 }; 128 }; 129 130 + meta = { 131 description = "Open source, cross-platform, user-mode tablet driver"; 132 homepage = "https://github.com/OpenTabletDriver/OpenTabletDriver"; 133 + license = lib.licenses.lgpl3Plus; 134 + maintainers = with lib.maintainers; [ 135 + gepbird 136 + thiagokokada 137 + ]; 138 + platforms = [ 139 + "x86_64-linux" 140 + "aarch64-linux" 141 + ]; 142 mainProgram = "otd"; 143 }; 144 }
-229
pkgs/tools/X11/opentabletdriver/deps.nix
··· 1 - # This file was automatically generated by passthru.fetch-deps. 2 - # Please dont edit it manually, your changes might get overwritten! 3 - 4 - { fetchNuGet }: [ 5 - (fetchNuGet { pname = "AtkSharp"; version = "3.24.24.34"; sha256 = "1jn1vgi9xm0jp7769k6sbdi8d273kigjrsh93i6s4c03hqxv7cqs"; }) 6 - (fetchNuGet { pname = "CairoSharp"; version = "3.24.24.34"; sha256 = "0pydn1k0cam1gclg9sc1sbnmbyzh28qlc5qanyxcylwghink3kgz"; }) 7 - (fetchNuGet { pname = "Castle.Core"; version = "4.4.0"; sha256 = "0rpcbmyhckvlvp6vbzpj03c1gqz56ixc6f15vgmxmyf1g40c24pf"; }) 8 - (fetchNuGet { pname = "coverlet.collector"; version = "3.0.2"; sha256 = "1xf6z6izmsl4g8w3z1wbp4pa8f8qsf6sil4mf1c9fb22hq8c5hkg"; }) 9 - (fetchNuGet { pname = "Eto.Forms"; version = "2.5.10"; sha256 = "1d71wglk4ixfqfbm6sxmj753x5iwbar8i9zzjy3bh64fy1dn8lz7"; }) 10 - (fetchNuGet { pname = "Eto.Forms"; version = "2.5.11"; sha256 = "0h86jc19wy3ssj7pb34w1h02v92mg29gdipszwjs3y15piy66z3s"; }) 11 - (fetchNuGet { pname = "Eto.Platform.Gtk"; version = "2.5.11"; sha256 = "1s9njz7l9zghrbzli7lbiav5ss3glqf17npj07f3jldd933nb95j"; }) 12 - (fetchNuGet { pname = "GdkSharp"; version = "3.24.24.34"; sha256 = "0r0x0yib7chwsyrbpvicrfwldwqx5lyqq4p86zaxpmzd6zdaj0x5"; }) 13 - (fetchNuGet { pname = "GioSharp"; version = "3.24.24.34"; sha256 = "02hxvgjd4w9jpzbkk7qf9q9bkvyp5hfzwxfqp10vg5lpl9yl3xpx"; }) 14 - (fetchNuGet { pname = "GLibSharp"; version = "3.24.24.34"; sha256 = "0kvp033fgdwc8p2abfp5z9pzq66cvwbnjfvr4v4bkpy5s5h181kq"; }) 15 - (fetchNuGet { pname = "GtkSharp"; version = "3.24.24.34"; sha256 = "0028hzmmqyfx87qqmaf9cgb5psn7gkbmqvixcid67x1d6mzxjicb"; }) 16 - (fetchNuGet { pname = "HidSharpCore"; version = "1.2.1.1"; sha256 = "1zkndglmz0s8rblfhnqcvv90rkq2i7lf4bc380g7z8h1avf2ikll"; }) 17 - (fetchNuGet { pname = "MessagePack"; version = "2.1.194"; sha256 = "1v2gyd9sd6hppfhlzngmzzhnpr39b95rwrqq0r9zzp480b6vzaj0"; }) 18 - (fetchNuGet { pname = "MessagePack.Annotations"; version = "2.1.194"; sha256 = "1jkhq3hiy4brvzsywl4p4jb9jrnzs3vmgr3s8fxpb1dzafadw8b0"; }) 19 - (fetchNuGet { pname = "Microsoft.Bcl.AsyncInterfaces"; version = "1.1.1"; sha256 = "0a1ahssqds2ympr7s4xcxv5y8jgxs7ahd6ah6fbgglj4rki1f1vw"; }) 20 - (fetchNuGet { pname = "Microsoft.CodeCoverage"; version = "16.9.4"; sha256 = "11wiyy3ykgk1sa9amy3lgcsg2v7d1sz59ggw647vx8ibpjxijjpp"; }) 21 - (fetchNuGet { pname = "Microsoft.CSharp"; version = "4.0.1"; sha256 = "0zxc0apx1gcx361jlq8smc9pfdgmyjh6hpka8dypc9w23nlsh6yj"; }) 22 - (fetchNuGet { pname = "Microsoft.Extensions.DependencyInjection"; version = "6.0.0-rc.1.21451.13"; sha256 = "0r6945jq7c2f1wjifq514zvngicndjqfnsjya6hqw0yzah0jr56c"; }) 23 - (fetchNuGet { pname = "Microsoft.Extensions.DependencyInjection.Abstractions"; version = "6.0.0-rc.1.21451.13"; sha256 = "11dg16x6g0gssb143qpghxz1s41himvhr7yhjwxs9hacx4ij2dm1"; }) 24 - (fetchNuGet { pname = "Microsoft.NET.Test.Sdk"; version = "16.9.4"; sha256 = "1jdx05zmrqj1s7xfgn3wgy10qb5cl1n1jcj5kz43zvkw1amc7ra4"; }) 25 - (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "1.0.1"; sha256 = "01al6cfxp68dscl15z7rxfw9zvhm64dncsw09a1vmdkacsa2v6lr"; }) 26 - (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "1.1.0"; sha256 = "08vh1r12g6ykjygq5d3vq09zylgb84l63k49jc4v8faw9g93iqqm"; }) 27 - (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "1.1.1"; sha256 = "164wycgng4mi9zqi2pnsf1pq6gccbqvw6ib916mqizgjmd8f44pj"; }) 28 - (fetchNuGet { pname = "Microsoft.NETCore.Platforms"; version = "3.0.0"; sha256 = "1bk8r4r3ihmi6322jmcag14jmw11mjqys202azqjzglcx59pxh51"; }) 29 - (fetchNuGet { pname = "Microsoft.NETCore.Targets"; version = "1.0.1"; sha256 = "0ppdkwy6s9p7x9jix3v4402wb171cdiibq7js7i13nxpdky7074p"; }) 30 - (fetchNuGet { pname = "Microsoft.NETCore.Targets"; version = "1.1.0"; sha256 = "193xwf33fbm0ni3idxzbr5fdq3i2dlfgihsac9jj7whj0gd902nh"; }) 31 - (fetchNuGet { pname = "Microsoft.TestPlatform.ObjectModel"; version = "16.9.4"; sha256 = "1jizkbrnm4pv60zch29ki7gj8m7j5whk141x9cwx4kwsd6cfzwi6"; }) 32 - (fetchNuGet { pname = "Microsoft.TestPlatform.TestHost"; version = "16.9.4"; sha256 = "14110qzmypr72ywvx3npq7mf4n0gvdr4536v91z1xbapms65am6x"; }) 33 - (fetchNuGet { pname = "Microsoft.VisualStudio.Threading"; version = "16.7.56"; sha256 = "13x0xrsjxd86clf9cjjwmpzlyp8pkrf13riya7igs8zy93zw2qap"; }) 34 - (fetchNuGet { pname = "Microsoft.VisualStudio.Threading.Analyzers"; version = "16.7.56"; sha256 = "04v9df0k7bsc0rzgkw4mnvi43pdrh42vk6xdcwn9m6im33m0nnz2"; }) 35 - (fetchNuGet { pname = "Microsoft.VisualStudio.Validation"; version = "15.5.31"; sha256 = "1ah99rn922qa0sd2k3h64m324f2r32pw8cn4cfihgvwx4qdrpmgw"; }) 36 - (fetchNuGet { pname = "Microsoft.Win32.Primitives"; version = "4.3.0"; sha256 = "0j0c1wj4ndj21zsgivsc24whiya605603kxrbiw6wkfdync464wq"; }) 37 - (fetchNuGet { pname = "Microsoft.Win32.Registry"; version = "4.6.0"; sha256 = "0i4y782yrqqyx85pg597m20gm0v126w0j9ddk5z7xb3crx4z9f2s"; }) 38 - (fetchNuGet { pname = "Moq"; version = "4.16.1"; sha256 = "1m2gwbx0gsy84rl9c3hgdaw9gz8d08ffg19nwg0idsdqmmiq887l"; }) 39 - (fetchNuGet { pname = "Nerdbank.Streams"; version = "2.6.77"; sha256 = "13dnfwxa8syx7vfjmd5pcrqz31k0q8y3mmh6yz6bmljhjri65q5c"; }) 40 - (fetchNuGet { pname = "NETStandard.Library"; version = "1.6.1"; sha256 = "1z70wvsx2d847a2cjfii7b83pjfs34q05gb037fdjikv5kbagml8"; }) 41 - (fetchNuGet { pname = "Newtonsoft.Json"; version = "12.0.2"; sha256 = "0w2fbji1smd2y7x25qqibf1qrznmv4s6s0jvrbvr6alb7mfyqvh5"; }) 42 - (fetchNuGet { pname = "Newtonsoft.Json"; version = "13.0.1"; sha256 = "0fijg0w6iwap8gvzyjnndds0q4b8anwxxvik7y8vgq97dram4srb"; }) 43 - (fetchNuGet { pname = "Newtonsoft.Json"; version = "13.0.3"; sha256 = "0xrwysmrn4midrjal8g2hr1bbg38iyisl0svamb11arqws4w2bw7"; }) 44 - (fetchNuGet { pname = "Newtonsoft.Json"; version = "9.0.1"; sha256 = "0mcy0i7pnfpqm4pcaiyzzji4g0c8i3a5gjz28rrr28110np8304r"; }) 45 - (fetchNuGet { pname = "Newtonsoft.Json.Schema"; version = "3.0.15"; sha256 = "1nmc9zxpcyyf3f2ypxw6vnjwlw5sxjv13r65p2dy8xrx8jkgaslp"; }) 46 - (fetchNuGet { pname = "NuGet.Frameworks"; version = "5.0.0"; sha256 = "18ijvmj13cwjdrrm52c8fpq021531zaz4mj4b4zapxaqzzxf2qjr"; }) 47 - (fetchNuGet { pname = "Octokit"; version = "0.50.0"; sha256 = "1ignj5i6a1c19qqrw00wlr9fdjmwrxkxz7gdxj0x653w84gbv7qq"; }) 48 - (fetchNuGet { pname = "PangoSharp"; version = "3.24.24.34"; sha256 = "1r0h14cklglfpv1lhv93cxmzi2w7d5s03gzpq3j5dmrz43flg9zw"; }) 49 - (fetchNuGet { pname = "runtime.any.System.Collections"; version = "4.3.0"; sha256 = "0bv5qgm6vr47ynxqbnkc7i797fdi8gbjjxii173syrx14nmrkwg0"; }) 50 - (fetchNuGet { pname = "runtime.any.System.Diagnostics.Tools"; version = "4.3.0"; sha256 = "1wl76vk12zhdh66vmagni66h5xbhgqq7zkdpgw21jhxhvlbcl8pk"; }) 51 - (fetchNuGet { pname = "runtime.any.System.Diagnostics.Tracing"; version = "4.3.0"; sha256 = "00j6nv2xgmd3bi347k00m7wr542wjlig53rmj28pmw7ddcn97jbn"; }) 52 - (fetchNuGet { pname = "runtime.any.System.Globalization"; version = "4.3.0"; sha256 = "1daqf33hssad94lamzg01y49xwndy2q97i2lrb7mgn28656qia1x"; }) 53 - (fetchNuGet { pname = "runtime.any.System.Globalization.Calendars"; version = "4.3.0"; sha256 = "1ghhhk5psqxcg6w88sxkqrc35bxcz27zbqm2y5p5298pv3v7g201"; }) 54 - (fetchNuGet { pname = "runtime.any.System.IO"; version = "4.3.0"; sha256 = "0l8xz8zn46w4d10bcn3l4yyn4vhb3lrj2zw8llvz7jk14k4zps5x"; }) 55 - (fetchNuGet { pname = "runtime.any.System.Reflection"; version = "4.3.0"; sha256 = "02c9h3y35pylc0zfq3wcsvc5nqci95nrkq0mszifc0sjx7xrzkly"; }) 56 - (fetchNuGet { pname = "runtime.any.System.Reflection.Extensions"; version = "4.3.0"; sha256 = "0zyri97dfc5vyaz9ba65hjj1zbcrzaffhsdlpxc9bh09wy22fq33"; }) 57 - (fetchNuGet { pname = "runtime.any.System.Reflection.Primitives"; version = "4.3.0"; sha256 = "0x1mm8c6iy8rlxm8w9vqw7gb7s1ljadrn049fmf70cyh42vdfhrf"; }) 58 - (fetchNuGet { pname = "runtime.any.System.Resources.ResourceManager"; version = "4.3.0"; sha256 = "03kickal0iiby82wa5flar18kyv82s9s6d4xhk5h4bi5kfcyfjzl"; }) 59 - (fetchNuGet { pname = "runtime.any.System.Runtime"; version = "4.3.0"; sha256 = "1cqh1sv3h5j7ixyb7axxbdkqx6cxy00p4np4j91kpm492rf4s25b"; }) 60 - (fetchNuGet { pname = "runtime.any.System.Runtime.Handles"; version = "4.3.0"; sha256 = "0bh5bi25nk9w9xi8z23ws45q5yia6k7dg3i4axhfqlnj145l011x"; }) 61 - (fetchNuGet { pname = "runtime.any.System.Runtime.InteropServices"; version = "4.3.0"; sha256 = "0c3g3g3jmhlhw4klrc86ka9fjbl7i59ds1fadsb2l8nqf8z3kb19"; }) 62 - (fetchNuGet { pname = "runtime.any.System.Text.Encoding"; version = "4.3.0"; sha256 = "0aqqi1v4wx51h51mk956y783wzags13wa7mgqyclacmsmpv02ps3"; }) 63 - (fetchNuGet { pname = "runtime.any.System.Text.Encoding.Extensions"; version = "4.3.0"; sha256 = "0lqhgqi0i8194ryqq6v2gqx0fb86db2gqknbm0aq31wb378j7ip8"; }) 64 - (fetchNuGet { pname = "runtime.any.System.Threading.Tasks"; version = "4.3.0"; sha256 = "03mnvkhskbzxddz4hm113zsch1jyzh2cs450dk3rgfjp8crlw1va"; }) 65 - (fetchNuGet { pname = "runtime.any.System.Threading.Timer"; version = "4.3.0"; sha256 = "0aw4phrhwqz9m61r79vyfl5la64bjxj8l34qnrcwb28v49fg2086"; }) 66 - (fetchNuGet { pname = "runtime.debian.8-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "16rnxzpk5dpbbl1x354yrlsbvwylrq456xzpsha1n9y3glnhyx9d"; }) 67 - (fetchNuGet { pname = "runtime.debian.8-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "0rwpqngkqiapqc5c2cpkj7idhngrgss5qpnqg0yh40mbyflcxf8i"; }) 68 - (fetchNuGet { pname = "runtime.fedora.23-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0hkg03sgm2wyq8nqk6dbm9jh5vcq57ry42lkqdmfklrw89lsmr59"; }) 69 - (fetchNuGet { pname = "runtime.fedora.23-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1n06gxwlinhs0w7s8a94r1q3lwqzvynxwd3mp10ws9bg6gck8n4r"; }) 70 - (fetchNuGet { pname = "runtime.fedora.24-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0c2p354hjx58xhhz7wv6div8xpi90sc6ibdm40qin21bvi7ymcaa"; }) 71 - (fetchNuGet { pname = "runtime.fedora.24-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "0404wqrc7f2yc0wxv71y3nnybvqx8v4j9d47hlscxy759a525mc3"; }) 72 - (fetchNuGet { pname = "runtime.native.System"; version = "4.3.0"; sha256 = "15hgf6zaq9b8br2wi1i3x0zvmk410nlmsmva9p0bbg73v6hml5k4"; }) 73 - (fetchNuGet { pname = "runtime.native.System.IO.Compression"; version = "4.3.0"; sha256 = "1vvivbqsk6y4hzcid27pqpm5bsi6sc50hvqwbcx8aap5ifrxfs8d"; }) 74 - (fetchNuGet { pname = "runtime.native.System.Net.Http"; version = "4.3.0"; sha256 = "1n6rgz5132lcibbch1qlf0g9jk60r0kqv087hxc0lisy50zpm7kk"; }) 75 - (fetchNuGet { pname = "runtime.native.System.Security.Cryptography.Apple"; version = "4.3.0"; sha256 = "1b61p6gw1m02cc1ry996fl49liiwky6181dzr873g9ds92zl326q"; }) 76 - (fetchNuGet { pname = "runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "18pzfdlwsg2nb1jjjjzyb5qlgy6xjxzmhnfaijq5s2jw3cm3ab97"; }) 77 - (fetchNuGet { pname = "runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "0zy5r25jppz48i2bkg8b9lfig24xixg6nm3xyr1379zdnqnpm8f6"; }) 78 - (fetchNuGet { pname = "runtime.opensuse.13.2-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0qyynf9nz5i7pc26cwhgi8j62ps27sqmf78ijcfgzab50z9g8ay3"; }) 79 - (fetchNuGet { pname = "runtime.opensuse.13.2-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "096ch4n4s8k82xga80lfmpimpzahd2ip1mgwdqgar0ywbbl6x438"; }) 80 - (fetchNuGet { pname = "runtime.opensuse.42.1-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "1klrs545awhayryma6l7g2pvnp9xy4z0r1i40r80zb45q3i9nbyf"; }) 81 - (fetchNuGet { pname = "runtime.opensuse.42.1-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1dm8fifl7rf1gy7lnwln78ch4rw54g0pl5g1c189vawavll7p6rj"; }) 82 - (fetchNuGet { pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.Apple"; version = "4.3.0"; sha256 = "10yc8jdrwgcl44b4g93f1ds76b176bajd3zqi2faf5rvh1vy9smi"; }) 83 - (fetchNuGet { pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0zcxjv5pckplvkg0r6mw3asggm7aqzbdjimhvsasb0cgm59x09l3"; }) 84 - (fetchNuGet { pname = "runtime.osx.10.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1m9z1k9kzva9n9kwinqxl97x2vgl79qhqjlv17k9s2ymcyv2bwr6"; }) 85 - (fetchNuGet { pname = "runtime.rhel.7-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0vhynn79ih7hw7cwjazn87rm9z9fj0rvxgzlab36jybgcpcgphsn"; }) 86 - (fetchNuGet { pname = "runtime.rhel.7-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1cpx56mcfxz7cpn57wvj18sjisvzq8b5vd9rw16ihd2i6mcp3wa1"; }) 87 - (fetchNuGet { pname = "runtime.ubuntu.14.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "160p68l2c7cqmyqjwxydcvgw7lvl1cr0znkw8fp24d1by9mqc8p3"; }) 88 - (fetchNuGet { pname = "runtime.ubuntu.14.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "15gsm1a8jdmgmf8j5v1slfz8ks124nfdhk2vxs2rw3asrxalg8hi"; }) 89 - (fetchNuGet { pname = "runtime.ubuntu.16.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "15zrc8fgd8zx28hdghcj5f5i34wf3l6bq5177075m2bc2j34jrqy"; }) 90 - (fetchNuGet { pname = "runtime.ubuntu.16.04-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "0q0n5q1r1wnqmr5i5idsrd9ywl33k0js4pngkwq9p368mbxp8x1w"; }) 91 - (fetchNuGet { pname = "runtime.ubuntu.16.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "1p4dgxax6p7rlgj4q73k73rslcnz4wdcv8q2flg1s8ygwcm58ld5"; }) 92 - (fetchNuGet { pname = "runtime.ubuntu.16.10-x64.runtime.native.System.Security.Cryptography.OpenSsl"; version = "4.3.2"; sha256 = "1x0g58pbpjrmj2x2qw17rdwwnrcl0wvim2hdwz48lixvwvp22n9c"; }) 93 - (fetchNuGet { pname = "runtime.unix.Microsoft.Win32.Primitives"; version = "4.3.0"; sha256 = "0y61k9zbxhdi0glg154v30kkq7f8646nif8lnnxbvkjpakggd5id"; }) 94 - (fetchNuGet { pname = "runtime.unix.System.Console"; version = "4.3.0"; sha256 = "1pfpkvc6x2if8zbdzg9rnc5fx51yllprl8zkm5npni2k50lisy80"; }) 95 - (fetchNuGet { pname = "runtime.unix.System.Diagnostics.Debug"; version = "4.3.0"; sha256 = "1lps7fbnw34bnh3lm31gs5c0g0dh7548wfmb8zz62v0zqz71msj5"; }) 96 - (fetchNuGet { pname = "runtime.unix.System.IO.FileSystem"; version = "4.3.0"; sha256 = "14nbkhvs7sji5r1saj2x8daz82rnf9kx28d3v2qss34qbr32dzix"; }) 97 - (fetchNuGet { pname = "runtime.unix.System.Net.Primitives"; version = "4.3.0"; sha256 = "0bdnglg59pzx9394sy4ic66kmxhqp8q8bvmykdxcbs5mm0ipwwm4"; }) 98 - (fetchNuGet { pname = "runtime.unix.System.Net.Sockets"; version = "4.3.0"; sha256 = "03npdxzy8gfv035bv1b9rz7c7hv0rxl5904wjz51if491mw0xy12"; }) 99 - (fetchNuGet { pname = "runtime.unix.System.Private.Uri"; version = "4.3.0"; sha256 = "1jx02q6kiwlvfksq1q9qr17fj78y5v6mwsszav4qcz9z25d5g6vk"; }) 100 - (fetchNuGet { pname = "runtime.unix.System.Runtime.Extensions"; version = "4.3.0"; sha256 = "0pnxxmm8whx38dp6yvwgmh22smknxmqs5n513fc7m4wxvs1bvi4p"; }) 101 - (fetchNuGet { pname = "SharpZipLib"; version = "1.3.3"; sha256 = "1gij11wfj1mqm10631cjpnhzw882bnzx699jzwhdqakxm1610q8x"; }) 102 - (fetchNuGet { pname = "StreamJsonRpc"; version = "2.6.121"; sha256 = "0xzvpk17w2skndzdg47j7gkrrvw6521db4mv8lc3v8hm97vs9m76"; }) 103 - (fetchNuGet { pname = "System.AppContext"; version = "4.3.0"; sha256 = "1649qvy3dar900z3g817h17nl8jp4ka5vcfmsr05kh0fshn7j3ya"; }) 104 - (fetchNuGet { pname = "System.Buffers"; version = "4.3.0"; sha256 = "0fgns20ispwrfqll4q1zc1waqcmylb3zc50ys9x8zlwxh9pmd9jy"; }) 105 - (fetchNuGet { pname = "System.Collections"; version = "4.0.11"; sha256 = "1ga40f5lrwldiyw6vy67d0sg7jd7ww6kgwbksm19wrvq9hr0bsm6"; }) 106 - (fetchNuGet { pname = "System.Collections"; version = "4.3.0"; sha256 = "19r4y64dqyrq6k4706dnyhhw7fs24kpp3awak7whzss39dakpxk9"; }) 107 - (fetchNuGet { pname = "System.Collections.Concurrent"; version = "4.3.0"; sha256 = "0wi10md9aq33jrkh2c24wr2n9hrpyamsdhsxdcnf43b7y86kkii8"; }) 108 - (fetchNuGet { pname = "System.Collections.Immutable"; version = "1.7.1"; sha256 = "1nh4nlxfc7lbnbl86wwk1a3jwl6myz5j6hvgh5sp4krim9901hsq"; }) 109 - (fetchNuGet { pname = "System.Collections.NonGeneric"; version = "4.3.0"; sha256 = "07q3k0hf3mrcjzwj8fwk6gv3n51cb513w4mgkfxzm3i37sc9kz7k"; }) 110 - (fetchNuGet { pname = "System.Collections.Specialized"; version = "4.3.0"; sha256 = "1sdwkma4f6j85m3dpb53v9vcgd0zyc9jb33f8g63byvijcj39n20"; }) 111 - (fetchNuGet { pname = "System.CommandLine"; version = "2.0.0-beta4.22272.1"; sha256 = "1iy5hwwgvx911g3yq65p4zsgpy08w4qz9j3h0igcf7yci44vw8yd"; }) 112 - (fetchNuGet { pname = "System.ComponentModel"; version = "4.3.0"; sha256 = "0986b10ww3nshy30x9sjyzm0jx339dkjxjj3401r3q0f6fx2wkcb"; }) 113 - (fetchNuGet { pname = "System.ComponentModel.Annotations"; version = "4.7.0"; sha256 = "06x1m46ddxj0ng28d7gry9gjkqdg2kp89jyf480g5gznyybbs49z"; }) 114 - (fetchNuGet { pname = "System.ComponentModel.Annotations"; version = "5.0.0"; sha256 = "021h7x98lblq9avm1bgpa4i31c2kgsa7zn4sqhxf39g087ar756j"; }) 115 - (fetchNuGet { pname = "System.ComponentModel.Primitives"; version = "4.3.0"; sha256 = "1svfmcmgs0w0z9xdw2f2ps05rdxmkxxhf0l17xk9l1l8xfahkqr0"; }) 116 - (fetchNuGet { pname = "System.ComponentModel.TypeConverter"; version = "4.3.0"; sha256 = "17ng0p7v3nbrg3kycz10aqrrlw4lz9hzhws09pfh8gkwicyy481x"; }) 117 - (fetchNuGet { pname = "System.Console"; version = "4.3.0"; sha256 = "1flr7a9x920mr5cjsqmsy9wgnv3lvd0h1g521pdr1lkb2qycy7ay"; }) 118 - (fetchNuGet { pname = "System.Diagnostics.Debug"; version = "4.0.11"; sha256 = "0gmjghrqmlgzxivd2xl50ncbglb7ljzb66rlx8ws6dv8jm0d5siz"; }) 119 - (fetchNuGet { pname = "System.Diagnostics.Debug"; version = "4.3.0"; sha256 = "00yjlf19wjydyr6cfviaph3vsjzg3d5nvnya26i2fvfg53sknh3y"; }) 120 - (fetchNuGet { pname = "System.Diagnostics.DiagnosticSource"; version = "4.3.0"; sha256 = "0z6m3pbiy0qw6rn3n209rrzf9x1k4002zh90vwcrsym09ipm2liq"; }) 121 - (fetchNuGet { pname = "System.Diagnostics.Tools"; version = "4.0.1"; sha256 = "19cknvg07yhakcvpxg3cxa0bwadplin6kyxd8mpjjpwnp56nl85x"; }) 122 - (fetchNuGet { pname = "System.Diagnostics.Tools"; version = "4.3.0"; sha256 = "0in3pic3s2ddyibi8cvgl102zmvp9r9mchh82ns9f0ms4basylw1"; }) 123 - (fetchNuGet { pname = "System.Diagnostics.TraceSource"; version = "4.3.0"; sha256 = "1kyw4d7dpjczhw6634nrmg7yyyzq72k75x38y0l0nwhigdlp1766"; }) 124 - (fetchNuGet { pname = "System.Diagnostics.Tracing"; version = "4.3.0"; sha256 = "1m3bx6c2s958qligl67q7grkwfz3w53hpy7nc97mh6f7j5k168c4"; }) 125 - (fetchNuGet { pname = "System.Dynamic.Runtime"; version = "4.0.11"; sha256 = "1pla2dx8gkidf7xkciig6nifdsb494axjvzvann8g2lp3dbqasm9"; }) 126 - (fetchNuGet { pname = "System.Dynamic.Runtime"; version = "4.3.0"; sha256 = "1d951hrvrpndk7insiag80qxjbf2y0y39y8h5hnq9612ws661glk"; }) 127 - (fetchNuGet { pname = "System.Globalization"; version = "4.0.11"; sha256 = "070c5jbas2v7smm660zaf1gh0489xanjqymkvafcs4f8cdrs1d5d"; }) 128 - (fetchNuGet { pname = "System.Globalization"; version = "4.3.0"; sha256 = "1cp68vv683n6ic2zqh2s1fn4c2sd87g5hpp6l4d4nj4536jz98ki"; }) 129 - (fetchNuGet { pname = "System.Globalization.Calendars"; version = "4.3.0"; sha256 = "1xwl230bkakzzkrggy1l1lxmm3xlhk4bq2pkv790j5lm8g887lxq"; }) 130 - (fetchNuGet { pname = "System.Globalization.Extensions"; version = "4.3.0"; sha256 = "02a5zfxavhv3jd437bsncbhd2fp1zv4gxzakp1an9l6kdq1mcqls"; }) 131 - (fetchNuGet { pname = "System.IO"; version = "4.1.0"; sha256 = "1g0yb8p11vfd0kbkyzlfsbsp5z44lwsvyc0h3dpw6vqnbi035ajp"; }) 132 - (fetchNuGet { pname = "System.IO"; version = "4.3.0"; sha256 = "05l9qdrzhm4s5dixmx68kxwif4l99ll5gqmh7rqgw554fx0agv5f"; }) 133 - (fetchNuGet { pname = "System.IO.Compression"; version = "4.3.0"; sha256 = "084zc82yi6yllgda0zkgl2ys48sypiswbiwrv7irb3r0ai1fp4vz"; }) 134 - (fetchNuGet { pname = "System.IO.Compression.ZipFile"; version = "4.3.0"; sha256 = "1yxy5pq4dnsm9hlkg9ysh5f6bf3fahqqb6p8668ndy5c0lk7w2ar"; }) 135 - (fetchNuGet { pname = "System.IO.FileSystem"; version = "4.0.1"; sha256 = "0kgfpw6w4djqra3w5crrg8xivbanh1w9dh3qapb28q060wb9flp1"; }) 136 - (fetchNuGet { pname = "System.IO.FileSystem"; version = "4.3.0"; sha256 = "0z2dfrbra9i6y16mm9v1v6k47f0fm617vlb7s5iybjjsz6g1ilmw"; }) 137 - (fetchNuGet { pname = "System.IO.FileSystem.Primitives"; version = "4.0.1"; sha256 = "1s0mniajj3lvbyf7vfb5shp4ink5yibsx945k6lvxa96r8la1612"; }) 138 - (fetchNuGet { pname = "System.IO.FileSystem.Primitives"; version = "4.3.0"; sha256 = "0j6ndgglcf4brg2lz4wzsh1av1gh8xrzdsn9f0yznskhqn1xzj9c"; }) 139 - (fetchNuGet { pname = "System.IO.Pipelines"; version = "4.7.2"; sha256 = "16v4qaypm72cfsfqr8z3k6yrpzn0m3apgkh6aljfwpycdk150sf9"; }) 140 - (fetchNuGet { pname = "System.Linq"; version = "4.1.0"; sha256 = "1ppg83svb39hj4hpp5k7kcryzrf3sfnm08vxd5sm2drrijsla2k5"; }) 141 - (fetchNuGet { pname = "System.Linq"; version = "4.3.0"; sha256 = "1w0gmba695rbr80l1k2h4mrwzbzsyfl2z4klmpbsvsg5pm4a56s7"; }) 142 - (fetchNuGet { pname = "System.Linq.Expressions"; version = "4.1.0"; sha256 = "1gpdxl6ip06cnab7n3zlcg6mqp7kknf73s8wjinzi4p0apw82fpg"; }) 143 - (fetchNuGet { pname = "System.Linq.Expressions"; version = "4.3.0"; sha256 = "0ky2nrcvh70rqq88m9a5yqabsl4fyd17bpr63iy2mbivjs2nyypv"; }) 144 - (fetchNuGet { pname = "System.Memory"; version = "4.5.4"; sha256 = "14gbbs22mcxwggn0fcfs1b062521azb9fbb7c113x0mq6dzq9h6y"; }) 145 - (fetchNuGet { pname = "System.Net.Http"; version = "4.3.0"; sha256 = "1i4gc757xqrzflbk7kc5ksn20kwwfjhw9w7pgdkn19y3cgnl302j"; }) 146 - (fetchNuGet { pname = "System.Net.Http"; version = "4.3.4"; sha256 = "0kdp31b8819v88l719j6my0yas6myv9d1viql3qz5577mv819jhl"; }) 147 - (fetchNuGet { pname = "System.Net.NameResolution"; version = "4.3.0"; sha256 = "15r75pwc0rm3vvwsn8rvm2krf929mjfwliv0mpicjnii24470rkq"; }) 148 - (fetchNuGet { pname = "System.Net.Primitives"; version = "4.3.0"; sha256 = "0c87k50rmdgmxx7df2khd9qj7q35j9rzdmm2572cc55dygmdk3ii"; }) 149 - (fetchNuGet { pname = "System.Net.Sockets"; version = "4.3.0"; sha256 = "1ssa65k6chcgi6mfmzrznvqaxk8jp0gvl77xhf1hbzakjnpxspla"; }) 150 - (fetchNuGet { pname = "System.Net.WebSockets"; version = "4.3.0"; sha256 = "1gfj800078kggcgl0xyl00a6y5k4wwh2k2qm69rjy22wbmq7fy4p"; }) 151 - (fetchNuGet { pname = "System.ObjectModel"; version = "4.0.12"; sha256 = "1sybkfi60a4588xn34nd9a58png36i0xr4y4v4kqpg8wlvy5krrj"; }) 152 - (fetchNuGet { pname = "System.ObjectModel"; version = "4.3.0"; sha256 = "191p63zy5rpqx7dnrb3h7prvgixmk168fhvvkkvhlazncf8r3nc2"; }) 153 - (fetchNuGet { pname = "System.Private.Uri"; version = "4.3.0"; sha256 = "04r1lkdnsznin0fj4ya1zikxiqr0h6r6a1ww2dsm60gqhdrf0mvx"; }) 154 - (fetchNuGet { pname = "System.Reflection"; version = "4.1.0"; sha256 = "1js89429pfw79mxvbzp8p3q93il6rdff332hddhzi5wqglc4gml9"; }) 155 - (fetchNuGet { pname = "System.Reflection"; version = "4.3.0"; sha256 = "0xl55k0mw8cd8ra6dxzh974nxif58s3k1rjv1vbd7gjbjr39j11m"; }) 156 - (fetchNuGet { pname = "System.Reflection.Emit"; version = "4.0.1"; sha256 = "0ydqcsvh6smi41gyaakglnv252625hf29f7kywy2c70nhii2ylqp"; }) 157 - (fetchNuGet { pname = "System.Reflection.Emit"; version = "4.3.0"; sha256 = "11f8y3qfysfcrscjpjym9msk7lsfxkk4fmz9qq95kn3jd0769f74"; }) 158 - (fetchNuGet { pname = "System.Reflection.Emit"; version = "4.7.0"; sha256 = "121l1z2ypwg02yz84dy6gr82phpys0njk7yask3sihgy214w43qp"; }) 159 - (fetchNuGet { pname = "System.Reflection.Emit.ILGeneration"; version = "4.0.1"; sha256 = "1pcd2ig6bg144y10w7yxgc9d22r7c7ww7qn1frdfwgxr24j9wvv0"; }) 160 - (fetchNuGet { pname = "System.Reflection.Emit.ILGeneration"; version = "4.3.0"; sha256 = "0w1n67glpv8241vnpz1kl14sy7zlnw414aqwj4hcx5nd86f6994q"; }) 161 - (fetchNuGet { pname = "System.Reflection.Emit.Lightweight"; version = "4.0.1"; sha256 = "1s4b043zdbx9k39lfhvsk68msv1nxbidhkq6nbm27q7sf8xcsnxr"; }) 162 - (fetchNuGet { pname = "System.Reflection.Emit.Lightweight"; version = "4.3.0"; sha256 = "0ql7lcakycrvzgi9kxz1b3lljd990az1x6c4jsiwcacrvimpib5c"; }) 163 - (fetchNuGet { pname = "System.Reflection.Emit.Lightweight"; version = "4.6.0"; sha256 = "0hry2k6b7kicg4zxnq0hhn0ys52711pxy7l9v5sp7gvp9cicwpgp"; }) 164 - (fetchNuGet { pname = "System.Reflection.Extensions"; version = "4.0.1"; sha256 = "0m7wqwq0zqq9gbpiqvgk3sr92cbrw7cp3xn53xvw7zj6rz6fdirn"; }) 165 - (fetchNuGet { pname = "System.Reflection.Extensions"; version = "4.3.0"; sha256 = "02bly8bdc98gs22lqsfx9xicblszr2yan7v2mmw3g7hy6miq5hwq"; }) 166 - (fetchNuGet { pname = "System.Reflection.Metadata"; version = "1.6.0"; sha256 = "1wdbavrrkajy7qbdblpbpbalbdl48q3h34cchz24gvdgyrlf15r4"; }) 167 - (fetchNuGet { pname = "System.Reflection.Primitives"; version = "4.0.1"; sha256 = "1bangaabhsl4k9fg8khn83wm6yial8ik1sza7401621jc6jrym28"; }) 168 - (fetchNuGet { pname = "System.Reflection.Primitives"; version = "4.3.0"; sha256 = "04xqa33bld78yv5r93a8n76shvc8wwcdgr1qvvjh959g3rc31276"; }) 169 - (fetchNuGet { pname = "System.Reflection.TypeExtensions"; version = "4.1.0"; sha256 = "1bjli8a7sc7jlxqgcagl9nh8axzfl11f4ld3rjqsyxc516iijij7"; }) 170 - (fetchNuGet { pname = "System.Reflection.TypeExtensions"; version = "4.3.0"; sha256 = "0y2ssg08d817p0vdag98vn238gyrrynjdj4181hdg780sif3ykp1"; }) 171 - (fetchNuGet { pname = "System.Resources.ResourceManager"; version = "4.0.1"; sha256 = "0b4i7mncaf8cnai85jv3wnw6hps140cxz8vylv2bik6wyzgvz7bi"; }) 172 - (fetchNuGet { pname = "System.Resources.ResourceManager"; version = "4.3.0"; sha256 = "0sjqlzsryb0mg4y4xzf35xi523s4is4hz9q4qgdvlvgivl7qxn49"; }) 173 - (fetchNuGet { pname = "System.Runtime"; version = "4.1.0"; sha256 = "02hdkgk13rvsd6r9yafbwzss8kr55wnj8d5c7xjnp8gqrwc8sn0m"; }) 174 - (fetchNuGet { pname = "System.Runtime"; version = "4.3.0"; sha256 = "066ixvgbf2c929kgknshcxqj6539ax7b9m570cp8n179cpfkapz7"; }) 175 - (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.5.2"; sha256 = "1vz4275fjij8inf31np78hw50al8nqkngk04p3xv5n4fcmf1grgi"; }) 176 - (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "4.7.1"; sha256 = "119br3pd85lq8zcgh4f60jzmv1g976q1kdgi3hvqdlhfbw6siz2j"; }) 177 - (fetchNuGet { pname = "System.Runtime.CompilerServices.Unsafe"; version = "6.0.0-rc.1.21451.13"; sha256 = "0v5bc80p35jj5b5xdgsn5r1v4w68gqz0sahi214rprrrlr3sl206"; }) 178 - (fetchNuGet { pname = "System.Runtime.Extensions"; version = "4.1.0"; sha256 = "0rw4rm4vsm3h3szxp9iijc3ksyviwsv6f63dng3vhqyg4vjdkc2z"; }) 179 - (fetchNuGet { pname = "System.Runtime.Extensions"; version = "4.3.0"; sha256 = "1ykp3dnhwvm48nap8q23893hagf665k0kn3cbgsqpwzbijdcgc60"; }) 180 - (fetchNuGet { pname = "System.Runtime.Handles"; version = "4.0.1"; sha256 = "1g0zrdi5508v49pfm3iii2hn6nm00bgvfpjq1zxknfjrxxa20r4g"; }) 181 - (fetchNuGet { pname = "System.Runtime.Handles"; version = "4.3.0"; sha256 = "0sw2gfj2xr7sw9qjn0j3l9yw07x73lcs97p8xfc9w1x9h5g5m7i8"; }) 182 - (fetchNuGet { pname = "System.Runtime.InteropServices"; version = "4.1.0"; sha256 = "01kxqppx3dr3b6b286xafqilv4s2n0gqvfgzfd4z943ga9i81is1"; }) 183 - (fetchNuGet { pname = "System.Runtime.InteropServices"; version = "4.3.0"; sha256 = "00hywrn4g7hva1b2qri2s6rabzwgxnbpw9zfxmz28z09cpwwgh7j"; }) 184 - (fetchNuGet { pname = "System.Runtime.InteropServices.RuntimeInformation"; version = "4.3.0"; sha256 = "0q18r1sh4vn7bvqgd6dmqlw5v28flbpj349mkdish2vjyvmnb2ii"; }) 185 - (fetchNuGet { pname = "System.Runtime.Numerics"; version = "4.3.0"; sha256 = "19rav39sr5dky7afygh309qamqqmi9kcwvz3i0c5700v0c5cg61z"; }) 186 - (fetchNuGet { pname = "System.Runtime.Serialization.Primitives"; version = "4.1.1"; sha256 = "042rfjixknlr6r10vx2pgf56yming8lkjikamg3g4v29ikk78h7k"; }) 187 - (fetchNuGet { pname = "System.Security.AccessControl"; version = "4.6.0"; sha256 = "1wl1dyghi0qhpap1vgfhg2ybdyyhy9vc2a7dpm1xb30vfgmlkjmf"; }) 188 - (fetchNuGet { pname = "System.Security.Claims"; version = "4.3.0"; sha256 = "0jvfn7j22l3mm28qjy3rcw287y9h65ha4m940waaxah07jnbzrhn"; }) 189 - (fetchNuGet { pname = "System.Security.Cryptography.Algorithms"; version = "4.3.0"; sha256 = "03sq183pfl5kp7gkvq77myv7kbpdnq3y0xj7vi4q1kaw54sny0ml"; }) 190 - (fetchNuGet { pname = "System.Security.Cryptography.Cng"; version = "4.3.0"; sha256 = "1k468aswafdgf56ab6yrn7649kfqx2wm9aslywjam1hdmk5yypmv"; }) 191 - (fetchNuGet { pname = "System.Security.Cryptography.Csp"; version = "4.3.0"; sha256 = "1x5wcrddf2s3hb8j78cry7yalca4lb5vfnkrysagbn6r9x6xvrx1"; }) 192 - (fetchNuGet { pname = "System.Security.Cryptography.Encoding"; version = "4.3.0"; sha256 = "1jr6w70igqn07k5zs1ph6xja97hxnb3mqbspdrff6cvssgrixs32"; }) 193 - (fetchNuGet { pname = "System.Security.Cryptography.OpenSsl"; version = "4.3.0"; sha256 = "0givpvvj8yc7gv4lhb6s1prq6p2c4147204a0wib89inqzd87gqc"; }) 194 - (fetchNuGet { pname = "System.Security.Cryptography.Primitives"; version = "4.3.0"; sha256 = "0pyzncsv48zwly3lw4f2dayqswcfvdwq2nz0dgwmi7fj3pn64wby"; }) 195 - (fetchNuGet { pname = "System.Security.Cryptography.X509Certificates"; version = "4.3.0"; sha256 = "0valjcz5wksbvijylxijjxb1mp38mdhv03r533vnx1q3ikzdav9h"; }) 196 - (fetchNuGet { pname = "System.Security.Principal"; version = "4.3.0"; sha256 = "12cm2zws06z4lfc4dn31iqv7072zyi4m910d4r6wm8yx85arsfxf"; }) 197 - (fetchNuGet { pname = "System.Security.Principal.Windows"; version = "4.3.0"; sha256 = "00a0a7c40i3v4cb20s2cmh9csb5jv2l0frvnlzyfxh848xalpdwr"; }) 198 - (fetchNuGet { pname = "System.Security.Principal.Windows"; version = "4.6.0"; sha256 = "1jmfzfz1n8hp63s5lja5xxpzkinbp6g59l3km9h8avjiisdrg5wm"; }) 199 - (fetchNuGet { pname = "System.Text.Encoding"; version = "4.0.11"; sha256 = "1dyqv0hijg265dwxg6l7aiv74102d6xjiwplh2ar1ly6xfaa4iiw"; }) 200 - (fetchNuGet { pname = "System.Text.Encoding"; version = "4.3.0"; sha256 = "1f04lkir4iladpp51sdgmis9dj4y8v08cka0mbmsy0frc9a4gjqr"; }) 201 - (fetchNuGet { pname = "System.Text.Encoding.Extensions"; version = "4.0.11"; sha256 = "08nsfrpiwsg9x5ml4xyl3zyvjfdi4mvbqf93kjdh11j4fwkznizs"; }) 202 - (fetchNuGet { pname = "System.Text.Encoding.Extensions"; version = "4.3.0"; sha256 = "11q1y8hh5hrp5a3kw25cb6l00v5l5dvirkz8jr3sq00h1xgcgrxy"; }) 203 - (fetchNuGet { pname = "System.Text.RegularExpressions"; version = "4.1.0"; sha256 = "1mw7vfkkyd04yn2fbhm38msk7dz2xwvib14ygjsb8dq2lcvr18y7"; }) 204 - (fetchNuGet { pname = "System.Text.RegularExpressions"; version = "4.3.0"; sha256 = "1bgq51k7fwld0njylfn7qc5fmwrk2137gdq7djqdsw347paa9c2l"; }) 205 - (fetchNuGet { pname = "System.Threading"; version = "4.0.11"; sha256 = "19x946h926bzvbsgj28csn46gak2crv2skpwsx80hbgazmkgb1ls"; }) 206 - (fetchNuGet { pname = "System.Threading"; version = "4.3.0"; sha256 = "0rw9wfamvhayp5zh3j7p1yfmx9b5khbf4q50d8k5rk993rskfd34"; }) 207 - (fetchNuGet { pname = "System.Threading.Tasks"; version = "4.0.11"; sha256 = "0nr1r41rak82qfa5m0lhk9mp0k93bvfd7bbd9sdzwx9mb36g28p5"; }) 208 - (fetchNuGet { pname = "System.Threading.Tasks"; version = "4.3.0"; sha256 = "134z3v9abw3a6jsw17xl3f6hqjpak5l682k2vz39spj4kmydg6k7"; }) 209 - (fetchNuGet { pname = "System.Threading.Tasks.Dataflow"; version = "4.11.1"; sha256 = "09fbfsiay1xcbpvnq2j38b6mb2scvf0s8mpn78bcqsldidg7k2vw"; }) 210 - (fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.0.0"; sha256 = "1cb51z062mvc2i8blpzmpn9d9mm4y307xrwi65di8ri18cz5r1zr"; }) 211 - (fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.3.0"; sha256 = "1xxcx2xh8jin360yjwm4x4cf5y3a2bwpn2ygkfkwkicz7zk50s2z"; }) 212 - (fetchNuGet { pname = "System.Threading.Tasks.Extensions"; version = "4.5.4"; sha256 = "0y6ncasgfcgnjrhynaf0lwpkpkmv4a07sswwkwbwb5h7riisj153"; }) 213 - (fetchNuGet { pname = "System.Threading.ThreadPool"; version = "4.3.0"; sha256 = "027s1f4sbx0y1xqw2irqn6x161lzj8qwvnh2gn78ciiczdv10vf1"; }) 214 - (fetchNuGet { pname = "System.Threading.Timer"; version = "4.3.0"; sha256 = "1nx773nsx6z5whv8kaa1wjh037id2f1cxhb69pvgv12hd2b6qs56"; }) 215 - (fetchNuGet { pname = "System.Xml.ReaderWriter"; version = "4.0.11"; sha256 = "0c6ky1jk5ada9m94wcadih98l6k1fvf6vi7vhn1msjixaha419l5"; }) 216 - (fetchNuGet { pname = "System.Xml.ReaderWriter"; version = "4.3.0"; sha256 = "0c47yllxifzmh8gq6rq6l36zzvw4kjvlszkqa9wq3fr59n0hl3s1"; }) 217 - (fetchNuGet { pname = "System.Xml.XDocument"; version = "4.0.11"; sha256 = "0n4lvpqzy9kc7qy1a4acwwd7b7pnvygv895az5640idl2y9zbz18"; }) 218 - (fetchNuGet { pname = "System.Xml.XDocument"; version = "4.3.0"; sha256 = "08h8fm4l77n0nd4i4fk2386y809bfbwqb7ih9d7564ifcxr5ssxd"; }) 219 - (fetchNuGet { pname = "System.Xml.XmlDocument"; version = "4.3.0"; sha256 = "0bmz1l06dihx52jxjr22dyv5mxv6pj4852lx68grjm7bivhrbfwi"; }) 220 - (fetchNuGet { pname = "WaylandNET"; version = "0.2.0"; sha256 = "1qjpvra08vdqdw4j1gamz6451x5sd5r1j86lsvrl8akq4nymfr8k"; }) 221 - (fetchNuGet { pname = "xunit"; version = "2.4.1"; sha256 = "0xf3kaywpg15flqaqfgywqyychzk15kz0kz34j21rcv78q9ywq20"; }) 222 - (fetchNuGet { pname = "xunit.abstractions"; version = "2.0.3"; sha256 = "00wl8qksgkxld76fgir3ycc5rjqv1sqds6x8yx40927q5py74gfh"; }) 223 - (fetchNuGet { pname = "xunit.analyzers"; version = "0.10.0"; sha256 = "15n02q3akyqbvkp8nq75a8rd66d4ax0rx8fhdcn8j78pi235jm7j"; }) 224 - (fetchNuGet { pname = "xunit.assert"; version = "2.4.1"; sha256 = "1imynzh80wxq2rp9sc4gxs4x1nriil88f72ilhj5q0m44qqmqpc6"; }) 225 - (fetchNuGet { pname = "xunit.core"; version = "2.4.1"; sha256 = "1nnb3j4kzmycaw1g76ii4rfqkvg6l8gqh18falwp8g28h802019a"; }) 226 - (fetchNuGet { pname = "xunit.extensibility.core"; version = "2.4.1"; sha256 = "103qsijmnip2pnbhciqyk2jyhdm6snindg5z2s57kqf5pcx9a050"; }) 227 - (fetchNuGet { pname = "xunit.extensibility.execution"; version = "2.4.1"; sha256 = "1pbilxh1gp2ywm5idfl0klhl4gb16j86ib4x83p8raql1dv88qia"; }) 228 - (fetchNuGet { pname = "xunit.runner.visualstudio"; version = "2.4.3"; sha256 = "0j1d0rbcm7pp6dypi61sjxp8l22sv261252z55b243l39jgv2rp3"; }) 229 - ]
···
-22
pkgs/tools/X11/opentabletdriver/remove-git-from-generate-rules.patch
··· 1 - diff --git a/generate-rules.sh b/generate-rules.sh 2 - index ce6c3f3d..a0266612 100755 3 - --- a/generate-rules.sh 4 - +++ b/generate-rules.sh 5 - @@ -8,7 +8,7 @@ print_help() { 6 - echo " -h, --help Print this help message" 7 - } 8 - 9 - -for c in git jq tr awk sed; do 10 - +for c in jq tr awk sed; do 11 - command -v $c > /dev/null 12 - if [[ $? > 0 ]]; then 13 - echo "Error: Command $c not found in \$PATH." >&2 14 - @@ -23,7 +23,7 @@ tohex() { 15 - shopt -s globstar 16 - set -eu 17 - 18 - -OTD_CONFIGURATIONS="${OTD_CONFIGURATIONS:="$(git rev-parse --show-toplevel)/OpenTabletDriver.Configurations/Configurations"}" 19 - +OTD_CONFIGURATIONS="${OTD_CONFIGURATIONS:="$src/OpenTabletDriver.Configurations/Configurations"}" 20 - 21 - while [ $# -gt 0 ]; do 22 - case "$1" in
···
-24
pkgs/tools/X11/opentabletdriver/update.sh
··· 1 - #!/usr/bin/env nix-shell 2 - #!nix-shell -I nixpkgs=./. -i bash -p curl gnused jq common-updater-scripts 3 - set -eo pipefail 4 - cd "$(dirname "${BASH_SOURCE[0]}")" 5 - 6 - new_version="$(curl ${GITHUB_TOKEN:+" -u \":$GITHUB_TOKEN\""} -s "https://api.github.com/repos/OpenTabletDriver/OpenTabletDriver/releases" | jq -r 'map(select(.prerelease == false)) | .[0].tag_name' | cut -c2-)" 7 - old_version="$(sed -nE 's/\s*version = "(.*)".*/\1/p' ./default.nix)" 8 - 9 - if [[ "$new_version" == "$old_version" ]]; then 10 - echo "Already up to date!" 11 - [[ "${1}" != "--force" ]] && exit 0 12 - fi 13 - 14 - # Updating the hash of deb package manually since there seems to be no way to do it automatically 15 - oldDebPkgUrl="https://github.com/OpenTabletDriver/OpenTabletDriver/releases/download/v${old_version}/OpenTabletDriver.deb"; 16 - newDebPkgUrl="https://github.com/OpenTabletDriver/OpenTabletDriver/releases/download/v${new_version}/OpenTabletDriver.deb"; 17 - oldDebSha256=$(nix-prefetch-url "$oldDebPkgUrl") 18 - newDebSha256=$(nix-prefetch-url "$newDebPkgUrl") 19 - echo "oldDebSha256: $oldDebSha256 newDebSha256: $newDebSha256" 20 - sed -i ./default.nix -re "s|\"$oldDebSha256\"|\"$newDebSha256\"|" 21 - 22 - pushd ../../../.. 23 - update-source-version opentabletdriver "$new_version" 24 - $(nix-build -A opentabletdriver.fetch-deps --no-out-link)
···
+4 -1
pkgs/tools/misc/hdf5/1.10.nix
··· 2 , stdenv 3 , fetchurl 4 , removeReferencesTo 5 , zlibSupport ? true 6 , zlib 7 , enableShared ? !stdenv.hostPlatform.isStatic ··· 28 propagatedBuildInputs = optional zlibSupport zlib; 29 30 configureFlags = optional enableShared "--enable-shared" 31 - ++ optional javaSupport "--enable-java"; 32 33 patches = [ ]; 34 ··· 49 applications for managing, manipulating, viewing, and analyzing data in the HDF5 format. 50 ''; 51 license = lib.licenses.bsd3; # Lawrence Berkeley National Labs BSD 3-Clause variant 52 homepage = "https://www.hdfgroup.org/HDF5/"; 53 platforms = lib.platforms.unix; 54 };
··· 2 , stdenv 3 , fetchurl 4 , removeReferencesTo 5 + , cppSupport ? true 6 , zlibSupport ? true 7 , zlib 8 , enableShared ? !stdenv.hostPlatform.isStatic ··· 29 propagatedBuildInputs = optional zlibSupport zlib; 30 31 configureFlags = optional enableShared "--enable-shared" 32 + ++ optional javaSupport "--enable-java" 33 + ++ optional cppSupport "--enable-cxx"; 34 35 patches = [ ]; 36 ··· 51 applications for managing, manipulating, viewing, and analyzing data in the HDF5 format. 52 ''; 53 license = lib.licenses.bsd3; # Lawrence Berkeley National Labs BSD 3-Clause variant 54 + maintainers = with lib.maintainers; [ stephen-huan ]; 55 homepage = "https://www.hdfgroup.org/HDF5/"; 56 platforms = lib.platforms.unix; 57 };
+1
pkgs/tools/networking/openssh/common.nix
··· 189 tests = { 190 borgbackup-integration = nixosTests.borgbackup; 191 nixosTest = nixosTests.openssh; 192 openssh = finalAttrs.finalPackage.overrideAttrs (previousAttrs: { 193 pname = previousAttrs.pname + "-test"; 194 doCheck = true;
··· 189 tests = { 190 borgbackup-integration = nixosTests.borgbackup; 191 nixosTest = nixosTests.openssh; 192 + initrd-network-openssh = nixosTests.initrd-network-ssh; 193 openssh = finalAttrs.finalPackage.overrideAttrs (previousAttrs: { 194 pname = previousAttrs.pname + "-test"; 195 doCheck = true;
+3
pkgs/top-level/aliases.nix
··· 986 perldevel = throw "'perldevel' has been dropped due to lack of updates in nixpkgs and lack of consistent support for devel versions by 'perl-cross' releases, use 'perl' instead"; 987 perldevelPackages = perldevel; 988 petrinizer = throw "'petrinizer' has been removed, as it was broken and unmaintained"; # added 2024-05-09 989 pgadmin = pgadmin4; 990 pharo-spur64 = pharo; # Added 2022-08-03 991 picom-next = picom; # Added 2024-02-13 ··· 1089 1090 rabbitvcs = throw "rabbitvcs has been removed from nixpkgs, because it was broken"; # Added 2024-07-15 1091 radare2-cutter = throw "'radare2-cutter' has been renamed to/replaced by 'cutter'"; # Converted to throw 2024-10-17 1092 radicle-cli = throw "'radicle-cli' was removed in favor of 'radicle-node'"; # Added 2024-05-04 1093 radicle-upstream = throw "'radicle-upstream' was sunset, see <https://community.radworks.org/t/2962>"; # Added 2024-05-04 1094 railway-travel = diebahn; # Added 2024-04-01
··· 986 perldevel = throw "'perldevel' has been dropped due to lack of updates in nixpkgs and lack of consistent support for devel versions by 'perl-cross' releases, use 'perl' instead"; 987 perldevelPackages = perldevel; 988 petrinizer = throw "'petrinizer' has been removed, as it was broken and unmaintained"; # added 2024-05-09 989 + pg-gvm = throw "pg-gvm has been moved to postgresql.pkgs.pg-gvm to make it work with all versions of PostgreSQL"; # added 2024-11-30 990 pgadmin = pgadmin4; 991 pharo-spur64 = pharo; # Added 2022-08-03 992 picom-next = picom; # Added 2024-02-13 ··· 1090 1091 rabbitvcs = throw "rabbitvcs has been removed from nixpkgs, because it was broken"; # Added 2024-07-15 1092 radare2-cutter = throw "'radare2-cutter' has been renamed to/replaced by 'cutter'"; # Converted to throw 2024-10-17 1093 + radicale2 = throw "'radicale2' was removed because it was broken. Use 'radicale' (version 3) instead"; # Added 2024-11-29 1094 + radicale3 = radicale; # Added 2024-11-29 1095 radicle-cli = throw "'radicle-cli' was removed in favor of 'radicle-node'"; # Added 2024-05-04 1096 radicle-upstream = throw "'radicle-upstream' was sunset, see <https://community.radworks.org/t/2962>"; # Added 2024-05-04 1097 railway-travel = diebahn; # Added 2024-04-01
+1 -14
pkgs/top-level/all-packages.nix
··· 2341 2342 fdroidcl = pkgs.callPackage ../development/mobile/fdroidcl { }; 2343 2344 - fedimint = callPackage ../by-name/fe/fedimint/package.nix { 2345 - inherit (darwin.apple_sdk.frameworks) Security SystemConfiguration; 2346 - }; 2347 - 2348 flowgger = callPackage ../tools/misc/flowgger { 2349 inherit (darwin.apple_sdk.frameworks) CoreServices; 2350 }; ··· 11459 11460 alerta-server = callPackage ../servers/monitoring/alerta { }; 11461 11462 - apacheHttpd_2_4 = callPackage ../servers/http/apache-httpd/2.4.nix { 11463 - inherit (darwin.apple_sdk.frameworks) Foundation; 11464 - }; 11465 apacheHttpd = apacheHttpd_2_4; 11466 11467 apacheHttpdPackagesFor = apacheHttpd: self: let callPackage = newScope self; in { ··· 11746 11747 inherit (callPackage ../applications/networking/mullvad { }) 11748 mullvad; 11749 - 11750 - mullvad-vpn = callPackage ../applications/networking/mullvad-vpn { }; 11751 11752 mullvad-closest = with python3Packages; toPythonApplication mullvad-closest; 11753 ··· 12082 erlang = erlang_27; 12083 elixir = pkgs.elixir.override { inherit erlang; }; 12084 }; 12085 - 12086 - radicale2 = callPackage ../servers/radicale/2.x.nix { }; 12087 - radicale3 = radicale; 12088 12089 qcal = callPackage ../tools/networking/qcal/default.nix { }; 12090 ··· 15134 opentimestamps-client = python3Packages.callPackage ../tools/misc/opentimestamps-client { }; 15135 15136 opentoonz = libsForQt5.callPackage ../applications/graphics/opentoonz { }; 15137 - 15138 - opentabletdriver = callPackage ../tools/X11/opentabletdriver { }; 15139 15140 opentx = libsForQt5.callPackage ../applications/misc/opentx { }; 15141
··· 2341 2342 fdroidcl = pkgs.callPackage ../development/mobile/fdroidcl { }; 2343 2344 flowgger = callPackage ../tools/misc/flowgger { 2345 inherit (darwin.apple_sdk.frameworks) CoreServices; 2346 }; ··· 11455 11456 alerta-server = callPackage ../servers/monitoring/alerta { }; 11457 11458 + apacheHttpd_2_4 = callPackage ../servers/http/apache-httpd/2.4.nix { }; 11459 apacheHttpd = apacheHttpd_2_4; 11460 11461 apacheHttpdPackagesFor = apacheHttpd: self: let callPackage = newScope self; in { ··· 11740 11741 inherit (callPackage ../applications/networking/mullvad { }) 11742 mullvad; 11743 11744 mullvad-closest = with python3Packages; toPythonApplication mullvad-closest; 11745 ··· 12074 erlang = erlang_27; 12075 elixir = pkgs.elixir.override { inherit erlang; }; 12076 }; 12077 12078 qcal = callPackage ../tools/networking/qcal/default.nix { }; 12079 ··· 15123 opentimestamps-client = python3Packages.callPackage ../tools/misc/opentimestamps-client { }; 15124 15125 opentoonz = libsForQt5.callPackage ../applications/graphics/opentoonz { }; 15126 15127 opentx = libsForQt5.callPackage ../applications/misc/opentx { }; 15128
+3 -8
pkgs/top-level/haskell-packages.nix
··· 429 ghc910 = compiler.ghc9101; 430 ghcHEAD = callPackage ../development/compilers/ghc/head.nix { 431 bootPkgs = 432 - # For GHC 9.6 no armv7l bindists are available. 433 - if stdenv.buildPlatform.isAarch32 then 434 - bb.packages.ghc963 435 - else if stdenv.buildPlatform.isPower64 && stdenv.buildPlatform.isLittleEndian then 436 - bb.packages.ghc963 437 - else 438 - bb.packages.ghc963Binary; 439 inherit (buildPackages.python3Packages) sphinx; 440 # Need to use apple's patched xattr until 441 # https://github.com/xattr/xattr/issues/44 and ··· 604 ghcHEAD = callPackage ../development/haskell-modules { 605 buildHaskellPackages = bh.packages.ghcHEAD; 606 ghc = bh.compiler.ghcHEAD; 607 - compilerConfig = callPackage ../development/haskell-modules/configuration-ghc-9.12.x.nix { }; 608 }; 609 610 ghcjs = packages.ghcjs810;
··· 429 ghc910 = compiler.ghc9101; 430 ghcHEAD = callPackage ../development/compilers/ghc/head.nix { 431 bootPkgs = 432 + # No suitable bindist packaged yet 433 + bb.packages.ghc9101; 434 inherit (buildPackages.python3Packages) sphinx; 435 # Need to use apple's patched xattr until 436 # https://github.com/xattr/xattr/issues/44 and ··· 599 ghcHEAD = callPackage ../development/haskell-modules { 600 buildHaskellPackages = bh.packages.ghcHEAD; 601 ghc = bh.compiler.ghcHEAD; 602 + compilerConfig = callPackage ../development/haskell-modules/configuration-ghc-9.14.x.nix { }; 603 }; 604 605 ghcjs = packages.ghcjs810;
+2
pkgs/top-level/python-packages.nix
··· 7473 7474 lizard = callPackage ../development/python-modules/lizard { }; 7475 7476 llama-cloud = callPackage ../development/python-modules/llama-cloud { }; 7477 7478 llama-index = callPackage ../development/python-modules/llama-index { };
··· 7473 7474 lizard = callPackage ../development/python-modules/lizard { }; 7475 7476 + llama-cpp-python = callPackage ../development/python-modules/llama-cpp-python { }; 7477 + 7478 llama-cloud = callPackage ../development/python-modules/llama-cloud { }; 7479 7480 llama-index = callPackage ../development/python-modules/llama-index { };