Merge staging-next into staging

authored by github-actions[bot] and committed by GitHub 00e5877c d24f2502

+516 -126
+15
nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
··· 2471 2471 hosts. 2472 2472 </para> 2473 2473 </listitem> 2474 + <listitem> 2475 + <para> 2476 + The option 2477 + <link xlink:href="options.html#opt-networking.useDHCP">networking.useDHCP</link> 2478 + isn’t deprecated anymore. When using 2479 + <link xlink:href="options.html#opt-networking.useNetworkd"><literal>systemd-networkd</literal></link>, 2480 + a generic <literal>.network</literal>-unit is added which 2481 + enables DHCP for each interface matching 2482 + <literal>en*</literal>, <literal>eth*</literal> or 2483 + <literal>wl*</literal> with priority 99 (which means that it 2484 + doesn’t have any effect if such an interface is matched by a 2485 + <literal>.network-</literal>unit with a lower priority). In 2486 + case of scripted networking, no behavior was changed. 2487 + </para> 2488 + </listitem> 2474 2489 </itemizedlist> 2475 2490 </section> 2476 2491 </section>
+7
nixos/doc/manual/release-notes/rl-2205.section.md
··· 877 877 `true` starting with NixOS 22.11. Enable it explicitly if you need to control 878 878 Snapserver remotely or connect streamig clients from other hosts. 879 879 880 + - The option [networking.useDHCP](options.html#opt-networking.useDHCP) isn't deprecated anymore. 881 + When using [`systemd-networkd`](options.html#opt-networking.useNetworkd), a generic 882 + `.network`-unit is added which enables DHCP for each interface matching `en*`, `eth*` 883 + or `wl*` with priority 99 (which means that it doesn't have any effect if such an interface is matched 884 + by a `.network-`unit with a lower priority). In case of scripted networking, no behavior 885 + was changed. 886 + 880 887 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->
+7 -5
nixos/modules/installer/tools/nixos-generate-config.pl
··· 581 581 EOF 582 582 583 583 sub generateNetworkingDhcpConfig { 584 + # FIXME disable networking.useDHCP by default when switching to networkd. 584 585 my $config = <<EOF; 585 - # The global useDHCP flag is deprecated, therefore explicitly set to false here. 586 - # Per-interface useDHCP will be mandatory in the future, so this generated config 587 - # replicates the default behaviour. 588 - networking.useDHCP = lib.mkDefault false; 586 + # Enables DHCP on each ethernet and wireless interface. In case of scripted networking 587 + # (the default) this is the recommended approach. When using systemd-networkd it's 588 + # still possible to use this option, but it's recommended to use it in conjunction 589 + # with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`. 590 + networking.useDHCP = lib.mkDefault true; 589 591 EOF 590 592 591 593 foreach my $path (glob "/sys/class/net/*") { 592 594 my $dev = basename($path); 593 595 if ($dev ne "lo") { 594 - $config .= " networking.interfaces.$dev.useDHCP = lib.mkDefault true;\n"; 596 + $config .= " # networking.interfaces.$dev.useDHCP = lib.mkDefault true;\n"; 595 597 } 596 598 } 597 599
+14 -1
nixos/modules/services/games/factorio.nix
··· 87 87 a new map with default settings will be generated before starting the service. 88 88 ''; 89 89 }; 90 + loadLatestSave = mkOption { 91 + type = types.bool; 92 + default = false; 93 + description = '' 94 + Load the latest savegame on startup. This overrides saveName, in that the latest 95 + save will always be used even if a saved game of the given name exists. It still 96 + controls the 'canonical' name of the savegame. 97 + 98 + Set this to true to have the server automatically reload a recent autosave after 99 + a crash or desync. 100 + ''; 101 + }; 90 102 # TODO Add more individual settings as nixos-options? 91 103 # TODO XXX The server tries to copy a newly created config file over the old one 92 104 # on shutdown, but fails, because it's in the nix store. When is this needed? ··· 250 262 "--config=${cfg.configFile}" 251 263 "--port=${toString cfg.port}" 252 264 "--bind=${cfg.bind}" 253 - "--start-server=${mkSavePath cfg.saveName}" 265 + (optionalString (!cfg.loadLatestSave) "--start-server=${mkSavePath cfg.saveName}") 254 266 "--server-settings=${serverSettingsFile}" 267 + (optionalString cfg.loadLatestSave "--start-server-load-latest") 255 268 (optionalString (cfg.mods != []) "--mod-directory=${modDir}") 256 269 (optionalString (cfg.admins != []) "--server-adminlist=${serverAdminsFile}") 257 270 ];
+6 -1
nixos/modules/services/networking/tailscale.nix
··· 2 2 3 3 with lib; 4 4 5 - let cfg = config.services.tailscale; 5 + let 6 + cfg = config.services.tailscale; 7 + firewallOn = config.networking.firewall.enable; 8 + rpfMode = config.networking.firewall.checkReversePath; 9 + rpfIsStrict = rpfMode == true || rpfMode == "strict"; 6 10 in { 7 11 meta.maintainers = with maintainers; [ danderson mbaillie twitchyliquid64 ]; 8 12 ··· 36 40 }; 37 41 38 42 config = mkIf cfg.enable { 43 + warnings = optional (firewallOn && rpfIsStrict) "Strict reverse path filtering breaks Tailscale exit node use and some subnet routing setups. Consider setting `networking.firewall.checkReversePath` = 'loose'"; 39 44 environment.systemPackages = [ cfg.package ]; # for the CLI 40 45 systemd.packages = [ cfg.package ]; 41 46 systemd.services.tailscaled = {
+1
nixos/modules/system/boot/networkd.nix
··· 779 779 "RouteDenyList" 780 780 "RouteAllowList" 781 781 "DHCPv6Client" 782 + "RouteMetric" 782 783 ]) 783 784 (assertValueOneOf "UseDNS" boolValues) 784 785 (assertValueOneOf "UseDomains" (boolValues ++ ["route"]))
+36 -6
nixos/modules/tasks/network-interfaces-systemd.nix
··· 43 43 } { 44 44 assertion = cfg.defaultGateway6 == null || cfg.defaultGateway6.interface == null; 45 45 message = "networking.defaultGateway6.interface is not supported by networkd."; 46 - } { 47 - assertion = cfg.useDHCP == false; 48 - message = '' 49 - networking.useDHCP is not supported by networkd. 50 - Please use per interface configuration and set the global option to false. 51 - ''; 52 46 } ] ++ flip mapAttrsToList cfg.bridges (n: { rstp, ... }: { 53 47 assertion = !rstp; 54 48 message = "networking.bridges.${n}.rstp is not supported by networkd."; ··· 80 74 in mkMerge [ { 81 75 enable = true; 82 76 } 77 + (mkIf cfg.useDHCP { 78 + networks."99-ethernet-default-dhcp" = lib.mkIf cfg.useDHCP { 79 + # We want to match physical ethernet interfaces as commonly 80 + # found on laptops, desktops and servers, to provide an 81 + # "out-of-the-box" setup that works for common cases. This 82 + # heuristic isn't perfect (it could match interfaces with 83 + # custom names that _happen_ to start with en or eth), but 84 + # should be good enough to make the common case easy and can 85 + # be overridden on a case-by-case basis using 86 + # higher-priority networks or by disabling useDHCP. 87 + 88 + # Type=ether matches veth interfaces as well, and this is 89 + # more likely to result in interfaces being configured to 90 + # use DHCP when they shouldn't. 91 + 92 + # We set RequiredForOnline to false, because it's fairly 93 + # common for such devices to have multiple interfaces and 94 + # only one of them to be connected (e.g. a laptop with 95 + # ethernet and WiFi interfaces). Maybe one day networkd will 96 + # support "any"-style RequiredForOnline... 97 + matchConfig.Name = ["en*" "eth*"]; 98 + DHCP = "yes"; 99 + linkConfig.RequiredForOnline = lib.mkDefault false; 100 + }; 101 + networks."99-wireless-client-dhcp" = lib.mkIf cfg.useDHCP { 102 + # Like above, but this is much more likely to be correct. 103 + matchConfig.WLANInterfaceType = "station"; 104 + DHCP = "yes"; 105 + linkConfig.RequiredForOnline = lib.mkDefault false; 106 + # We also set the route metric to one more than the default 107 + # of 1024, so that Ethernet is preferred if both are 108 + # available. 109 + dhcpV4Config.RouteMetric = 1025; 110 + ipv6AcceptRAConfig.RouteMetric = 1025; 111 + }; 112 + }) 83 113 (mkMerge (forEach interfaces (i: { 84 114 netdevs = mkIf i.virtual ({ 85 115 "40-${i.name}" = {
-5
nixos/modules/tasks/network-interfaces.nix
··· 1254 1254 Whether to use DHCP to obtain an IP address and other 1255 1255 configuration for all network interfaces that are not manually 1256 1256 configured. 1257 - 1258 - Using this option is highly discouraged and also incompatible with 1259 - <option>networking.useNetworkd</option>. Please use 1260 - <option>networking.interfaces.&lt;name&gt;.useDHCP</option> instead 1261 - and set this to false. 1262 1257 ''; 1263 1258 }; 1264 1259
+11
nixos/modules/virtualisation/proxmox-lxc.nix
··· 20 20 configuration from proxmox. 21 21 ''; 22 22 }; 23 + manageHostName = mkOption { 24 + type = types.bool; 25 + default = false; 26 + description = '' 27 + Whether to manage hostname through nix options 28 + When false, the hostname is picked up from /etc/hostname 29 + populated by proxmox. 30 + ''; 31 + }; 23 32 }; 24 33 25 34 config = ··· 50 59 useDHCP = false; 51 60 useHostResolvConf = false; 52 61 useNetworkd = true; 62 + # pick up hostname from /etc/hostname generated by proxmox 63 + hostName = mkIf (!cfg.manageHostName) (mkForce ""); 53 64 }; 54 65 55 66 services.openssh = {
+20
nixos/tests/networking.nix
··· 139 139 client.wait_until_succeeds("ping -c 1 192.168.3.1") 140 140 ''; 141 141 }; 142 + dhcpDefault = { 143 + name = "useDHCP-by-default"; 144 + nodes.router = router; 145 + nodes.client = { lib, ... }: { 146 + # Disable test driver default config 147 + networking.interfaces = lib.mkForce {}; 148 + networking.useNetworkd = networkd; 149 + virtualisation.vlans = [ 1 ]; 150 + }; 151 + testScript = '' 152 + start_all() 153 + client.wait_for_unit("multi-user.target") 154 + client.wait_until_succeeds("ip addr show dev eth1 | grep '192.168.1'") 155 + client.shell_interact() 156 + client.succeed("ping -c 1 192.168.1.1") 157 + router.succeed("ping -c 1 192.168.1.1") 158 + router.succeed("ping -c 1 192.168.1.2") 159 + client.succeed("ping -c 1 192.168.1.2") 160 + ''; 161 + }; 142 162 dhcpSimple = { 143 163 name = "SimpleDHCP"; 144 164 nodes.router = router;
+21 -20
pkgs/applications/editors/vis/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, pkg-config, makeWrapper, makeDesktopItem 2 - , ncurses, libtermkey, lua 3 - , acl ? null, libselinux ? null 1 + { lib, stdenv, fetchFromGitHub, pkg-config, makeWrapper 2 + , copyDesktopItems, makeDesktopItem 3 + , ncurses, libtermkey, lua, tre 4 + , acl, libselinux 4 5 }: 5 6 6 7 let ··· 17 18 owner = "martanne"; 18 19 }; 19 20 20 - nativeBuildInputs = [ pkg-config makeWrapper ]; 21 + nativeBuildInputs = [ pkg-config makeWrapper copyDesktopItems ]; 21 22 22 23 buildInputs = [ 23 24 ncurses 24 25 libtermkey 25 26 luaEnv 27 + tre 26 28 ] ++ lib.optionals stdenv.isLinux [ 27 29 acl 28 30 libselinux ··· 33 35 ''; 34 36 35 37 postInstall = '' 36 - mkdir -p "$out/share/applications" 37 - cp $desktopItem/share/applications/* $out/share/applications 38 - echo wrapping $out/bin/vis with runtime environment 39 38 wrapProgram $out/bin/vis \ 40 39 --prefix LUA_CPATH ';' "${luaEnv}/lib/lua/${lua.luaversion}/?.so" \ 41 40 --prefix LUA_PATH ';' "${luaEnv}/share/lua/${lua.luaversion}/?.lua" \ 42 41 --prefix VIS_PATH : "\$HOME/.config:$out/share/vis" 43 42 ''; 44 43 45 - desktopItem = makeDesktopItem { 46 - name = "vis"; 47 - exec = "vis %U"; 48 - type = "Application"; 49 - icon = "accessories-text-editor"; 50 - comment = meta.description; 51 - desktopName = "vis"; 52 - genericName = "Text editor"; 53 - categories = [ "Application" "Development" "IDE" ]; 54 - mimeTypes = [ "text/plain" "application/octet-stream" ]; 55 - startupNotify = false; 56 - terminal = true; 57 - }; 44 + desktopItems = [ 45 + (makeDesktopItem { 46 + name = "vis"; 47 + exec = "vis %U"; 48 + type = "Application"; 49 + icon = "accessories-text-editor"; 50 + comment = meta.description; 51 + desktopName = "vis"; 52 + genericName = "Text editor"; 53 + categories = [ "Application" "Development" "IDE" ]; 54 + mimeTypes = [ "text/plain" "application/octet-stream" ]; 55 + startupNotify = false; 56 + terminal = true; 57 + }) 58 + ]; 58 59 59 60 meta = with lib; { 60 61 description = "A vim like editor";
+3 -2
pkgs/applications/misc/charm/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "charm"; 5 - version = "0.12.0"; 5 + version = "0.12.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "charmbracelet"; 9 9 repo = "charm"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-XXKzK5MXJsB3LE7iE5BqnLm0hPs7WbyHR0x9aTldrj4="; 11 + sha256 = "sha256-vNy2ai1s7TKCymYznvT0Wo6lg9qEyDzz8l3SYzScz8g="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-6PGdM7aa1BGNZc3M35PJpmrlPUqkykxfTELdgeKcJD4="; ··· 18 18 meta = with lib; { 19 19 description = "Manage your charm account on the CLI"; 20 20 homepage = "https://github.com/charmbracelet/charm"; 21 + changelog = "https://github.com/charmbracelet/charm/releases/tag/v${version}"; 21 22 license = licenses.mit; 22 23 maintainers = with maintainers; [ penguwin ]; 23 24 };
+7 -7
pkgs/applications/networking/browsers/chromium/upstream-info.json
··· 1 1 { 2 2 "stable": { 3 - "version": "101.0.4951.41", 4 - "sha256": "0dzsbr309n70jg7fpq2qfnrgcm4553akvdmnzhss1fc85s467609", 5 - "sha256bin64": "12nzzsp4040mwc7jah5w0p58ckv8s16wv6ylf6vlmfby06a4xlkq", 3 + "version": "101.0.4951.54", 4 + "sha256": "1d808a7mvg0nd0mm20c1ny5kdvb2xvrs8vz4nnk456ix8pywcv62", 5 + "sha256bin64": "1m6s6xf2wvz535w6jskk3pnibvsjpzmbxvd9rlxmqr08y219gp5y", 6 6 "deps": { 7 7 "gn": { 8 8 "version": "2022-03-14", ··· 12 12 } 13 13 }, 14 14 "chromedriver": { 15 - "version": "101.0.4951.15", 16 - "sha256_linux": "1i8ay83gh1q6nd0v14qv7gjar9h4fccb50a8b6fg671pg0l6vn24", 17 - "sha256_darwin": "0ldxy1dxb99xps0h1d1264njc55q4bd000bdnaaks9kyx2djn54b", 18 - "sha256_darwin_aarch64": "14awsldpqz2y187jwbcli8v7f1r6gsybk8yx8jqg26y8iyg3lrx9" 15 + "version": "101.0.4951.41", 16 + "sha256_linux": "0zsh6cm7h1m0k5mx1cd29knxjxaadjjcbp7m5fr2mx9c21a1nlcr", 17 + "sha256_darwin": "09py50436y81lw2vk44256dmzsg8dqj14fd0g0gs1cc3ps6q4awl", 18 + "sha256_darwin_aarch64": "0krjijd0zgwg8d44miz43xrjdlvfiymbrrz5r1hzpx64555ch12y" 19 19 } 20 20 }, 21 21 "beta": {
+2 -2
pkgs/applications/networking/instant-messengers/signalbackup-tools/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "signalbackup-tools"; 5 - version = "20220425"; 5 + version = "20220430"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "bepaald"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "sha256-FWW4rVaoShT55ZWN/siFHoTTNcarnfTa2h/J2GWxLW8="; 11 + sha256 = "sha256-clG0B7PgtlpsSnZgglkv7y7SOtMTBvwJMnvMrcTWXdI="; 12 12 }; 13 13 14 14 # Remove when Apple SDK is >= 10.13
+3 -6
pkgs/applications/networking/nextcloud-client/default.nix
··· 6 6 , inotify-tools 7 7 , installShellFiles 8 8 , libcloudproviders 9 + , librsvg 9 10 , libsecret 10 11 , openssl 11 12 , pcre ··· 20 21 , plasma5Packages 21 22 , sphinx 22 23 , sqlite 23 - , inkscape 24 24 , xdg-utils 25 25 }: 26 26 ··· 50 50 done 51 51 ''; 52 52 53 - # required to not include inkscape in the wrapper 54 - strictDeps = true; 55 - 56 53 nativeBuildInputs = [ 57 54 pkg-config 58 55 cmake 59 - inkscape 56 + extra-cmake-modules 57 + librsvg 60 58 sphinx 61 59 ]; 62 60 63 61 buildInputs = [ 64 - extra-cmake-modules 65 62 inotify-tools 66 63 libcloudproviders 67 64 libsecret
+51
pkgs/applications/networking/protonvpn-cli/2.nix
··· 1 + { lib 2 + , buildPythonApplication 3 + , fetchFromGitHub 4 + , pythonOlder 5 + , requests 6 + , docopt 7 + , pythondialog 8 + , jinja2 9 + , distro 10 + , dialog 11 + , iptables 12 + , openvpn }: 13 + 14 + buildPythonApplication rec { 15 + pname = "protonvpn-cli_2"; 16 + version = "2.2.11"; 17 + format = "setuptools"; 18 + 19 + disabled = pythonOlder "3.5"; 20 + 21 + src = fetchFromGitHub { 22 + owner = "Rafficer"; 23 + repo = "linux-cli-community"; 24 + # There is a tag and branch with the same name 25 + rev = "refs/tags/v${version}"; 26 + sha256 = "sha256-CWQpisJPBXbf+d5tCGuxfSQQZBeF36WFF4b6OSUn3GY="; 27 + }; 28 + 29 + propagatedBuildInputs = [ 30 + requests 31 + docopt 32 + pythondialog 33 + jinja2 34 + distro 35 + dialog 36 + openvpn 37 + iptables 38 + ]; 39 + 40 + # No tests 41 + doCheck = false; 42 + 43 + meta = with lib; { 44 + description = "Linux command-line client for ProtonVPN using Openvpn"; 45 + homepage = "https://github.com/Rafficer/linux-cli-community"; 46 + maintainers = with maintainers; [ jtcoolen jefflabonte shamilton ]; 47 + license = licenses.gpl3Plus; 48 + platforms = platforms.linux; 49 + mainProgram = "protonvpn"; 50 + }; 51 + }
+24 -20
pkgs/applications/networking/protonvpn-cli/default.nix
··· 1 - { lib, fetchFromGitHub, python3Packages, openvpn, dialog, iptables }: 1 + { lib 2 + , buildPythonApplication 3 + , pythonOlder 4 + , fetchFromGitHub 5 + , protonvpn-nm-lib 6 + , pythondialog 7 + , dialog 8 + }: 2 9 3 - python3Packages.buildPythonApplication rec { 4 - pname = "protonvpn-linux-cli"; 5 - version = "2.2.6"; 10 + buildPythonApplication rec { 11 + pname = "protonvpn-cli"; 12 + version = "3.11.1"; 13 + format = "setuptools"; 14 + 15 + disabled = pythonOlder "3.5"; 6 16 7 17 src = fetchFromGitHub { 8 18 owner = "protonvpn"; 9 19 repo = "linux-cli"; 10 - rev = "v${version}"; 11 - sha256 = "0y7v9ikrmy5dbjlpbpacp08gy838i8z54m8m4ps7ldk1j6kyia3n"; 20 + rev = version; 21 + sha256 = "sha256-u+POtUz7NoGS23aOmvDCZPUp2HW1xXGtfbZR88cWCBc="; 12 22 }; 13 23 14 - propagatedBuildInputs = (with python3Packages; [ 15 - requests 16 - docopt 17 - setuptools 18 - jinja2 19 - pythondialog 20 - ]) ++ [ 21 - dialog 22 - openvpn 23 - iptables 24 - ]; 24 + propagatedBuildInputs = [ 25 + protonvpn-nm-lib 26 + pythondialog 27 + dialog 28 + ]; 25 29 26 - # No tests 30 + # Project has a dummy test 27 31 doCheck = false; 28 32 29 33 meta = with lib; { 30 34 description = "Linux command-line client for ProtonVPN"; 31 35 homepage = "https://github.com/protonvpn/linux-cli"; 32 - maintainers = with maintainers; [ jtcoolen jefflabonte shamilton ]; 36 + maintainers = with maintainers; [ wolfangaukang ]; 33 37 license = licenses.gpl3Plus; 34 38 platforms = platforms.linux; 35 - mainProgram = "protonvpn"; 39 + mainProgram = "protonvpn-cli"; 36 40 }; 37 41 }
+3 -1
pkgs/applications/version-management/git-and-tools/git-machete/default.nix
··· 1 1 { lib 2 2 , buildPythonApplication 3 + , pytest-mock 4 + , pytestCheckHook 3 5 , fetchFromGitHub 4 6 , installShellFiles 5 7 , git ··· 21 23 22 24 nativeBuildInputs = [ installShellFiles ]; 23 25 24 - checkInputs = [ git ]; 26 + checkInputs = [ git pytest-mock pytestCheckHook ]; 25 27 26 28 postInstall = '' 27 29 installShellCompletion --bash --name git-machete completion/git-machete.completion.bash
+27
pkgs/data/fonts/khmeros/default.nix
··· 1 + { fetchzip, lib }: 2 + 3 + let 4 + version = "5.0"; 5 + in 6 + fetchzip { 7 + name = "khmeros-${version}"; 8 + url = "mirror://debian/pool/main/f/fonts-khmeros/fonts-khmeros_${version}.orig.tar.xz"; 9 + sha256 = "sha256-pS+7RQbGwlBxdCfSVxHmARCAkZrZttwYNlV/CrxqI+w="; 10 + 11 + postFetch = '' 12 + unpackDir="$TMPDIR/unpack" 13 + mkdir "$unpackDir" 14 + cd "$unpackDir" 15 + tar xf "$downloadedFile" --strip-components=1 16 + mkdir -p $out/share/fonts 17 + cp *.ttf $out/share/fonts 18 + ''; 19 + 20 + meta = with lib; { 21 + description = "KhmerOS Unicode fonts for the Khmer language"; 22 + homepage = "http://www.khmeros.info/"; 23 + license = licenses.gpl2Plus; 24 + maintainers = with lib.maintainers; [ serge ]; 25 + platforms = platforms.all; 26 + }; 27 + }
+23
pkgs/data/fonts/lklug-sinhala/default.nix
··· 1 + { fetchzip, lib }: 2 + 3 + let 4 + version = "0.6"; 5 + in 6 + fetchzip { 7 + name = "lklug-sinhala-${version}"; 8 + url = "mirror://debian/pool/main/f/fonts-lklug-sinhala/fonts-lklug-sinhala_${version}.orig.tar.xz"; 9 + sha256 = "sha256-Fy+QnAajA4yLf/I1vOQll5pRd0ZLfLe8UXq4XMC9qNc="; 10 + 11 + postFetch = '' 12 + mkdir -p $out/share/fonts 13 + tar xf $downloadedFile --strip-components=1 -C $out/share/fonts fonts-lklug-sinhala-${version}/lklug.ttf 14 + ''; 15 + 16 + meta = with lib; { 17 + description = "Unicode Sinhala font by Lanka Linux User Group"; 18 + homepage = "http://www.lug.lk/fonts/lklug"; 19 + license = licenses.gpl2Plus; 20 + maintainers = with lib.maintainers; [ serge ]; 21 + platforms = platforms.all; 22 + }; 23 + }
+27
pkgs/data/fonts/nanum/default.nix
··· 1 + { fetchzip, lib }: 2 + 3 + let 4 + version = "20170925"; 5 + in 6 + fetchzip { 7 + name = "nanum-${version}"; 8 + url = "mirror://ubuntu/pool/universe/f/fonts-nanum/fonts-nanum_${version}.orig.tar.xz"; 9 + sha256 = "sha256-lSTeQEuMmlQxiQqrx9tNScifE8nMOUDJF3lCfoAFIJk="; 10 + 11 + postFetch = '' 12 + unpackDir="$TMPDIR/unpack" 13 + mkdir "$unpackDir" 14 + cd "$unpackDir" 15 + tar xf "$downloadedFile" --strip-components=1 16 + mkdir -p $out/share/fonts 17 + cp *.ttf $out/share/fonts 18 + ''; 19 + 20 + meta = with lib; { 21 + description = "Nanum Korean font set"; 22 + homepage = "https://hangeul.naver.com/font"; 23 + license = licenses.ofl; 24 + maintainers = with lib.maintainers; [ serge ]; 25 + platforms = platforms.all; 26 + }; 27 + }
+27
pkgs/data/fonts/sil-padauk/default.nix
··· 1 + { fetchzip, lib }: 2 + 3 + let 4 + version = "3.003"; 5 + in 6 + fetchzip { 7 + name = "sil-padauk-${version}"; 8 + url = "mirror://debian/pool/main/f/fonts-sil-padauk/fonts-sil-padauk_${version}.orig.tar.xz"; 9 + sha256 = "sha256-oK+EufbvsqXunTgcWj+DiNdfpRl+VPO60Wc9KYjZv5A="; 10 + 11 + postFetch = '' 12 + unpackDir="$TMPDIR/unpack" 13 + mkdir "$unpackDir" 14 + cd "$unpackDir" 15 + tar xf "$downloadedFile" --strip-components=1 16 + mkdir -p $out/share/fonts 17 + cp *.ttf $out/share/fonts 18 + ''; 19 + 20 + meta = with lib; { 21 + description = "Burmese Unicode 6 TrueType font"; 22 + homepage = "https://software.sil.org/padauk"; 23 + license = licenses.ofl; 24 + maintainers = with lib.maintainers; [ serge ]; 25 + platforms = platforms.all; 26 + }; 27 + }
+27
pkgs/data/fonts/takao/default.nix
··· 1 + { fetchzip, lib }: 2 + 3 + let 4 + version = "00303.01"; 5 + in 6 + fetchzip { 7 + name = "takao-${version}"; 8 + url = "mirror://ubuntu/pool/universe/f/fonts-takao/fonts-takao_${version}.orig.tar.gz"; 9 + sha256 = "sha256-TlPq3iIv8vHlxYu5dkX/Lf6ediYKQaQ5uMbFvypQM/w="; 10 + 11 + postFetch = '' 12 + unpackDir="$TMPDIR/unpack" 13 + mkdir "$unpackDir" 14 + cd "$unpackDir" 15 + tar xf "$downloadedFile" --strip-components=1 16 + mkdir -p $out/share/fonts 17 + cp *.ttf $out/share/fonts 18 + ''; 19 + 20 + meta = with lib; { 21 + description = "Japanese TrueType Gothic, P Gothic, Mincho, P Mincho fonts"; 22 + homepage = "https://launchpad.net/takao-fonts"; 23 + license = licenses.ipa; 24 + maintainers = with lib.maintainers; [ serge ]; 25 + platforms = platforms.all; 26 + }; 27 + }
+22
pkgs/data/fonts/tibetan-machine/default.nix
··· 1 + { fetchzip, lib }: 2 + 3 + let 4 + version = "1.901b"; 5 + in 6 + fetchzip { 7 + name = "tibetan-machine-${version}"; 8 + url = "mirror://debian/pool/main/f/fonts-tibetan-machine/fonts-tibetan-machine_${version}.orig.tar.bz2"; 9 + sha256 = "sha256-A+RgpFLsP4iTzl0PMRHaNzWGbDR5Qa38lRegNJ96ULo="; 10 + 11 + postFetch = '' 12 + mkdir -p $out/share/fonts 13 + tar xf $downloadedFile --strip-components=1 -C $out/share/fonts ttf-tmuni-${version}/TibMachUni-${version}.ttf 14 + ''; 15 + 16 + meta = with lib; { 17 + description = "Tibetan Machine - an OpenType Tibetan, Dzongkha and Ladakhi font"; 18 + license = licenses.gpl2Plus; 19 + maintainers = with lib.maintainers; [ serge ]; 20 + platforms = platforms.all; 21 + }; 22 + }
+3 -3
pkgs/development/compilers/open-watcom/v2.nix
··· 12 12 13 13 stdenv.mkDerivation rec { 14 14 pname = "open-watcom-v2"; 15 - version = "unstable-2022-05-03"; 15 + version = "unstable-2022-05-04"; 16 16 name = "${pname}-unwrapped-${version}"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "open-watcom"; 20 20 repo = "open-watcom-v2"; 21 - rev = "a927247a40e69261e7d8891b6f002c91450e01f2"; 22 - sha256 = "/CuPNCEoSjxwYL07b07XqnaAeFZGS8NjXBuj+gFCsOA="; 21 + rev = "01662ab4eb50c0757969fa53bd4270dbbba45dc5"; 22 + sha256 = "Nl5mcPDCr08XkVMWqkbbgTP/YjpfwMOo2GVu43FQQ3Y="; 23 23 }; 24 24 25 25 postPatch = ''
+2 -2
pkgs/development/libraries/aws-c-auth/default.nix
··· 12 12 13 13 stdenv.mkDerivation rec { 14 14 pname = "aws-c-auth"; 15 - version = "0.6.11"; 15 + version = "0.6.13"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "awslabs"; 19 19 repo = "aws-c-auth"; 20 20 rev = "v${version}"; 21 - sha256 = "sha256-3pFOnXDvB4CUUG992i5ErKMe3lAiyYoMTSvm6eKyLjs="; 21 + sha256 = "sha256-f1STZdxj8cdK60dCgl2Xfsqaa/x3Z1xEjH3p4GUwGUg="; 22 22 }; 23 23 24 24 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/aws-c-cal/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "aws-c-cal"; 5 - version = "0.5.14"; 5 + version = "0.5.17"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "awslabs"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-+hWiDlL0GVVmMajoC+hfyvT4rm16RoAWhUr04B8JZts="; 11 + sha256 = "sha256-peaoTv2TLqtHScfnCPMNbE6fhUTKfRe1ZzuBsr/rpz0="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake ];
+2 -2
pkgs/development/libraries/aws-c-common/default.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "aws-c-common"; 10 - version = "0.6.19"; 10 + version = "0.7.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "awslabs"; 14 14 repo = pname; 15 15 rev = "v${version}"; 16 - sha256 = "sha256-oB5kAzIRyr8kfl4sILuIw343ghDZDXSEH97qkUeTqXI="; 16 + sha256 = "sha256-DKorZUVUDEP4IRPchzaW35fPLmYoJRcfLMdPHrBrol8="; 17 17 }; 18 18 19 19 nativeBuildInputs = [ cmake ];
+2 -2
pkgs/development/libraries/aws-c-http/default.nix
··· 10 10 11 11 stdenv.mkDerivation rec { 12 12 pname = "aws-c-http"; 13 - version = "0.6.10"; 13 + version = "0.6.15"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "awslabs"; 17 17 repo = "aws-c-http"; 18 18 rev = "v${version}"; 19 - sha256 = "sha256-R+teEKSQjSFYt3+XXvooAy4GJwN4yzEhJtiuknBZIgU="; 19 + sha256 = "sha256-WIKWF8G+fdX9MD6vQctM+5pDnR0/0TenabWE4PRteq8="; 20 20 }; 21 21 22 22 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/aws-c-io/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "aws-c-io"; 5 - version = "0.10.19"; 5 + version = "0.11.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "awslabs"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-dPstIWB+wuMJi+EfecPKw0WD1c3IvHS+L1XU72xrAoc="; 11 + sha256 = "sha256-LIrAA3+Yd0lhCMQ9R4HT/ZFKm3y9iSm3h5vcn0ghiPA="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake ];
+4 -2
pkgs/development/libraries/aws-c-s3/default.nix
··· 6 6 , aws-c-compression 7 7 , aws-c-http 8 8 , aws-c-io 9 + , aws-checksums 9 10 , cmake 10 11 , s2n-tls 11 12 }: 12 13 13 14 stdenv.mkDerivation rec { 14 15 pname = "aws-c-s3"; 15 - version = "0.1.33"; 16 + version = "0.1.39"; 16 17 17 18 src = fetchFromGitHub { 18 19 owner = "awslabs"; 19 20 repo = "aws-c-s3"; 20 21 rev = "v${version}"; 21 - sha256 = "sha256-lP5Luh/jFmlbb11rE5qYev+DMXjyMNwni0LcNvQGY4o="; 22 + sha256 = "sha256-UbYh3awI7Y3mJnVQrltU+rZ1TI1TDaMF5TOcvxbzNa8="; 22 23 }; 23 24 24 25 nativeBuildInputs = [ ··· 32 33 aws-c-compression 33 34 aws-c-http 34 35 aws-c-io 36 + aws-checksums 35 37 s2n-tls 36 38 ]; 37 39
+12 -2
pkgs/development/libraries/aws-crt-cpp/default.nix
··· 1 1 { lib, stdenv 2 2 , fetchFromGitHub 3 + , fetchpatch 3 4 , aws-c-auth 4 5 , aws-c-cal 5 6 , aws-c-common ··· 16 17 17 18 stdenv.mkDerivation rec { 18 19 pname = "aws-crt-cpp"; 19 - version = "0.17.16"; 20 + version = "0.17.28"; 20 21 21 22 outputs = [ "out" "dev" ]; 22 23 ··· 24 25 owner = "awslabs"; 25 26 repo = "aws-crt-cpp"; 26 27 rev = "v${version}"; 27 - sha256 = "sha256-RNcx/Enm1bd/NZOcNosNnYsT9Ot7AMQU7wsg+moT16c="; 28 + sha256 = "sha256-4/BgwX8Pa5D2lEn0Dh3JlUiYUtA9u0rWpBixqmv1X/A="; 28 29 }; 29 30 30 31 patches = [ 31 32 # Correct include path for split outputs. 32 33 # https://github.com/awslabs/aws-crt-cpp/pull/325 33 34 ./0001-build-Make-includedir-properly-overrideable.patch 35 + 36 + # Fix build with new input stream api 37 + # https://github.com/awslabs/aws-crt-cpp/pull/341 38 + # Remove with next release 39 + (fetchpatch { 40 + url = "https://github.com/awslabs/aws-crt-cpp/commit/8adb8490fd4f1d1fe65aad01b0a7dda0e52ac596.patch"; 41 + excludes = [ "crt/*" ]; 42 + sha256 = "190v8rlj6z0qllih6w3kqmdvqjifj66hc4bchsgr3gpfv18vpzid"; 43 + }) 34 44 ]; 35 45 36 46 postPatch = ''
+8 -3
pkgs/development/libraries/libdeltachat/default.nix
··· 5 5 , openssl 6 6 , perl 7 7 , pkg-config 8 + , python3 8 9 , rustPlatform 9 10 , sqlcipher 10 11 , sqlite ··· 16 17 17 18 stdenv.mkDerivation rec { 18 19 pname = "libdeltachat"; 19 - version = "1.79.0"; 20 + version = "1.80.0"; 20 21 21 22 src = fetchFromGitHub { 22 23 owner = "deltachat"; 23 24 repo = "deltachat-core-rust"; 24 25 rev = version; 25 - hash = "sha256-jwAPbTwMSWDucAvip5KcA7fb4LCWo70SiIspacijMvQ="; 26 + hash = "sha256-4b2tf7QmLQ5ltnkxUGCwA1TZSQRoyKaRGcxBxbSKDaE="; 26 27 }; 27 28 28 29 patches = [ ··· 32 33 cargoDeps = rustPlatform.fetchCargoTarball { 33 34 inherit src; 34 35 name = "${pname}-${version}"; 35 - hash = "sha256-Fn4M4CQV7VTE7SubvOszhpGBbmDyqemyUeZ0qDmcGUU="; 36 + hash = "sha256-t1/xztmiuJMqNkIe7cBzO7MaZQb6GtnIX5wxEpC+IFo="; 36 37 }; 37 38 38 39 nativeBuildInputs = [ ··· 59 60 checkInputs = with rustPlatform; [ 60 61 cargoCheckHook 61 62 ]; 63 + 64 + passthru.tests = { 65 + python = python3.pkgs.deltachat; 66 + }; 62 67 63 68 meta = with lib; { 64 69 description = "Delta Chat Rust Core library";
+1 -1
pkgs/development/libraries/libuv/default.nix
··· 71 71 homepage = "https://libuv.org/"; 72 72 changelog = "https://github.com/libuv/libuv/blob/v${version}/ChangeLog"; 73 73 maintainers = with maintainers; [ cstrahan ]; 74 - platforms = with platforms; linux ++ darwin; 74 + platforms = platforms.all; 75 75 license = with licenses; [ mit isc bsd2 bsd3 cc-by-40 ]; 76 76 }; 77 77
+3 -3
pkgs/development/libraries/pe-parse/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "pe-parse"; 5 - version = "1.2.0"; 5 + version = "2.0.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "trailofbits"; 9 9 repo = "pe-parse"; 10 10 rev = "v${version}"; 11 - sha256 = "1jvfjaiwddczjlx4xdhpbgwvvpycab7ix35lwp3wfy44hs6qpjqv"; 11 + hash = "sha256-HwWlMRhpB/sa/JRyAZF7LZzkXCCyuxB+gtDAfHt7e6k="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake ]; 15 15 16 16 doInstallCheck = true; 17 17 installCheckPhase = '' 18 - $out/bin/dump-pe ../test/assets/example.exe 18 + $out/bin/dump-pe ../tests/assets/example.exe 19 19 ''; 20 20 21 21 meta = with lib; {
+2 -2
pkgs/development/libraries/s2n-tls/default.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "s2n-tls"; 9 - version = "1.3.6"; 9 + version = "1.3.12"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "aws"; 13 13 repo = pname; 14 14 rev = "v${version}"; 15 - hash = "sha256-i1RbyHw+Fr1QABra6fskRpIbYxEfhOVToeesyax4NtU="; 15 + sha256 = "1n1bak4s67cfizh8j5wpf05kfdcjvwqaca4rq9qys25z52bbpn9f"; 16 16 }; 17 17 18 18 nativeBuildInputs = [ cmake ];
+6 -13
pkgs/development/libraries/uthenticode/default.nix
··· 1 - { stdenv, lib, fetchFromGitHub, fetchpatch, cmake, gtest, openssl, pe-parse }: 1 + { stdenv, lib, fetchFromGitHub, cmake, gtest, openssl, pe-parse }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "uthenticode"; 5 - version = "1.0.4"; 5 + version = "1.0.8"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "trailofbits"; 9 9 repo = "uthenticode"; 10 10 rev = "v${version}"; 11 - sha256 = "16j91cki63zk4d7wzwvq8al98l8hmvcdil3vfp44ink4q4bfswkx"; 11 + hash = "sha256-H4fAHZM+vYaUkXZE4f7r2bxw9dno7O+lYrqQ9/6YPWA="; 12 12 }; 13 13 14 - patches = [ 15 - # adds USE_SYSTEM_GTEST cmake flag, the patch won't be necessary in next versions 16 - (fetchpatch { 17 - url = "https://github.com/trailofbits/uthenticode/commit/7a4c5499c8e5ea7bfae1c620e1f96c112866b1dd.patch"; 18 - sha256 = "17637j5zwp71jmi803mv1z04arld3k3kmrm8nvrkpg08q5kizh28"; 19 - }) 20 - ]; 21 - 22 - cmakeFlags = [ "-DBUILD_TESTS=1" "-DUSE_SYSTEM_GTEST=1" ]; 14 + cmakeFlags = [ "-DBUILD_TESTS=1" "-DUSE_EXTERNAL_GTEST=1" ]; 23 15 24 16 nativeBuildInputs = [ cmake ]; 25 - buildInputs = [ pe-parse openssl gtest ]; 17 + checkInputs = [ gtest ]; 18 + buildInputs = [ pe-parse openssl ]; 26 19 27 20 doCheck = true; 28 21 checkPhase = "test/uthenticode_test";
+2 -2
pkgs/development/python-modules/defcon/default.nix
··· 5 5 6 6 buildPythonPackage rec { 7 7 pname = "defcon"; 8 - version = "0.10.0"; 8 + version = "0.10.1"; 9 9 10 10 disabled = pythonOlder "3.6"; 11 11 12 12 src = fetchPypi { 13 13 inherit pname version; 14 - sha256 = "a009862a0bc3f41f2b1a1b1f80d6aeedb3a17ed77d598da09f5a1bd93e970b3c"; 14 + sha256 = "sha256-+nlk9xG3mOCS4xHzp54J/V+he7HNMg1aMgFeTFTrMHA="; 15 15 extension = "zip"; 16 16 }; 17 17
+2 -2
pkgs/development/python-modules/proglog/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "proglog"; 5 - version = "0.1.9"; 5 + version = "0.1.10"; 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "13diln950wk6nnn4rpmzx37rvrnpa7f803gwygiwbq1q46zwri6q"; 9 + sha256 = "sha256-ZYwoycguTK6y8l9Ij/+c6s4i+NabFdDByG1kJ15N2rQ="; 10 10 }; 11 11 12 12 propagatedBuildInputs = [ tqdm ];
+22
pkgs/development/python-modules/protonvpn-nm-lib/0001-Patching-GIRepository.patch
··· 1 + From 2867f022aad754fe54d95222b3ae52f6e7f14c2f Mon Sep 17 00:00:00 2001 2 + From: "P. R. d. O" <d.ol.rod@tutanota.com> 3 + Date: Wed, 27 Apr 2022 21:49:12 -0600 4 + Subject: [PATCH] Patching GIRepository 5 + 6 + --- 7 + protonvpn_nm_lib/__init__.py | 5 +++++ 8 + 1 file changed, 5 insertions(+) 9 + 10 + diff --git a/protonvpn_nm_lib/__init__.py b/protonvpn_nm_lib/__init__.py 11 + index e69de29..00b95f4 100644 12 + --- a/protonvpn_nm_lib/__init__.py 13 + +++ b/protonvpn_nm_lib/__init__.py 14 + @@ -0,0 +1,5 @@ 15 + +import gi 16 + +gi.require_version('GIRepository', '2.0') 17 + +from gi.repository import GIRepository 18 + +repo = GIRepository.Repository.get_default() 19 + +repo.prepend_search_path('@networkmanager_path@') 20 + -- 21 + 2.35.1 22 +
+13 -3
pkgs/development/python-modules/protonvpn-nm-lib/default.nix
··· 2 2 , buildPythonPackage 3 3 , fetchFromGitHub 4 4 , pythonOlder 5 + , substituteAll 5 6 , distro 6 7 , jinja2 7 8 , keyring ··· 9 10 , pygobject3 10 11 , pyxdg 11 12 , systemd 13 + , networkmanager 12 14 }: 13 15 14 16 buildPythonPackage rec { 15 17 pname = "protonvpn-nm-lib"; 16 - version = "3.8.0"; 18 + version = "3.9.0"; 17 19 disabled = pythonOlder "3.7"; 18 20 19 21 src = fetchFromGitHub { 20 22 owner = "ProtonVPN"; 21 23 repo = pname; 22 24 rev = version; 23 - sha256 = "sha256-fAaP9c66LcbZgezadGPUt400YRnrnFoBvpzlc1zxuc4="; 25 + sha256 = "sha256-yV3xeIyPc2DJj5DOa5PA1MHt00bjJ/Y9zZK77s/XRAA="; 24 26 }; 25 27 26 28 propagatedBuildInputs = [ ··· 33 35 systemd 34 36 ]; 35 37 36 - # Project has a dummy test. 38 + patches = [ 39 + (substituteAll { 40 + src = ./0001-Patching-GIRepository.patch; 41 + networkmanager_path = "${networkmanager}/lib/girepository-1.0"; 42 + }) 43 + ]; 44 + 45 + # Checks cannot be run in the sandbox 46 + # "Failed to connect to socket /run/dbus/system_bus_socket: No such file or directory" 37 47 doCheck = false; 38 48 39 49 pythonImportsCheck = [ "protonvpn_nm_lib" ];
+3 -3
pkgs/development/tools/taplo-cli/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "taplo-cli"; 5 - version = "0.5.0"; 5 + version = "0.6.1"; 6 6 7 7 src = fetchCrate { 8 8 inherit pname version; 9 - sha256 = "sha256-+0smR1FDeJMSa/LaRM2M53updt5p8717DEaFItNXCdM="; 9 + sha256 = "sha256-0U7qoRnId3gKTQYPwbvrt/vzGfiSX6kcGwgRNc1uZ/I="; 10 10 }; 11 11 12 - cargoSha256 = "sha256-d7mysGYR72shXwvmDXr0oftSa+RtRoSbP++HBR40Mus="; 12 + cargoSha256 = "sha256-FIcq8wwJrZRxATDr+jo4KOX4l6auriNg+rSpMNsG+Tk="; 13 13 14 14 nativeBuildInputs = lib.optional stdenv.isLinux pkg-config; 15 15
+25
pkgs/tools/text/cidrgrep/default.nix
··· 1 + { lib, buildGoModule, fetchFromGitHub }: 2 + 3 + buildGoModule { 4 + pname = "cidrgrep"; 5 + version = "unstable-2020-11-17"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "tomdoherty"; 9 + repo = "cidrgrep"; 10 + rev = "8ad5af533e8dc33ea18ff19b7c6a41550748fe0e"; 11 + sha256 = "sha256:0jvwm9jq5jd270b6l9nkvc5pr3rgf158sw83lrprmwmz7r4mr786"; 12 + }; 13 + 14 + vendorSha256 = "sha256:0sjjj9z1dhilhpc8pq4154czrb79z9cm044jvn75kxcjv6v5l2m5"; 15 + 16 + postInstall = '' 17 + mv $out/bin/cmd $out/bin/cidrgrep 18 + ''; 19 + 20 + meta = { 21 + description = "Like grep but for IPv4 CIDRs"; 22 + maintainers = with lib.maintainers; [ das_j ]; 23 + license = lib.licenses.mit; 24 + }; 25 + }
+16 -1
pkgs/top-level/all-packages.nix
··· 1117 1117 1118 1118 bikeshed = python3Packages.callPackage ../applications/misc/bikeshed { }; 1119 1119 1120 + cidrgrep = callPackage ../tools/text/cidrgrep { }; 1121 + 1120 1122 cope = callPackage ../tools/misc/cope { }; 1121 1123 1122 1124 ejson2env = callPackage ../tools/admin/ejson2env { }; ··· 24392 24394 24393 24395 kde-rounded-corners = libsForQt5.callPackage ../data/themes/kwin-decorations/kde-rounded-corners { }; 24394 24396 24397 + khmeros = callPackage ../data/fonts/khmeros {}; 24398 + 24395 24399 kochi-substitute = callPackage ../data/fonts/kochi-substitute {}; 24396 24400 24397 24401 kochi-substitute-naga10 = callPackage ../data/fonts/kochi-substitute-naga10 {}; ··· 24457 24461 line-awesome = callPackage ../data/fonts/line-awesome { }; 24458 24462 24459 24463 linux-manual = callPackage ../data/documentation/linux-manual { }; 24464 + 24465 + lklug-sinhala = callPackage ../data/fonts/lklug-sinhala {}; 24460 24466 24461 24467 lmmath = callPackage ../data/fonts/lmmath {}; 24462 24468 ··· 24563 24569 myrica = callPackage ../data/fonts/myrica { }; 24564 24570 24565 24571 nafees = callPackage ../data/fonts/nafees { }; 24572 + 24573 + nanum = callPackage ../data/fonts/nanum { }; 24566 24574 24567 24575 nanum-gothic-coding = callPackage ../data/fonts/nanum-gothic-coding { }; 24568 24576 ··· 24761 24769 24762 24770 sierra-gtk-theme = callPackage ../data/themes/sierra { }; 24763 24771 24772 + sil-padauk = callPackage ../data/fonts/sil-padauk { }; 24773 + 24764 24774 snap7 = callPackage ../development/libraries/snap7 {}; 24765 24775 24766 24776 snowblind = callPackage ../data/themes/snowblind { }; ··· 24860 24870 24861 24871 inherit (callPackages ../data/fonts/tai-languages { }) tai-ahom; 24862 24872 24873 + takao = callPackage ../data/fonts/takao { }; 24874 + 24863 24875 taskspooler = callPackage ../tools/system/taskspooler { }; 24864 24876 24865 24877 tamsyn = callPackage ../data/fonts/tamsyn { inherit (buildPackages.xorg) mkfontscale; }; ··· 24902 24914 tex-gyre-math = callPackages ../data/fonts/tex-gyre-math { }; 24903 24915 24904 24916 theme-vertex = callPackage ../data/themes/vertex { }; 24917 + 24918 + tibetan-machine = callPackage ../data/fonts/tibetan-machine { }; 24905 24919 24906 24920 times-newer-roman = callPackage ../data/fonts/times-newer-roman { }; 24907 24921 ··· 29039 29053 29040 29054 protonmail-bridge = callPackage ../applications/networking/protonmail-bridge { }; 29041 29055 29042 - protonvpn-cli = callPackage ../applications/networking/protonvpn-cli { }; 29056 + protonvpn-cli = python3Packages.callPackage ../applications/networking/protonvpn-cli { }; 29057 + protonvpn-cli_2 = python3Packages.callPackage ../applications/networking/protonvpn-cli/2.nix { }; 29043 29058 29044 29059 protonvpn-gui = python3Packages.callPackage ../applications/networking/protonvpn-gui { }; 29045 29060