Merge master into staging-next

authored by github-actions[bot] and committed by GitHub 034cfc0b 9b8d89f3

+217 -233
+1 -1
CONTRIBUTING.md
··· 51 52 In addition to writing properly formatted commit messages, it's important to include relevant information so other developers can later understand *why* a change was made. While this information usually can be found by digging code, mailing list/Discourse archives, pull request discussions or upstream changes, it may require a lot of work. 53 54 - For package version upgrades and such a one-line commit message is usually sufficient. 55 56 ## Rebasing between branches (i.e. from master to staging) 57
··· 51 52 In addition to writing properly formatted commit messages, it's important to include relevant information so other developers can later understand *why* a change was made. While this information usually can be found by digging code, mailing list/Discourse archives, pull request discussions or upstream changes, it may require a lot of work. 53 54 + Package version upgrades usually allow for simpler commit messages, including attribute name, old and new version, as well as a reference to the relevant release notes/changelog. Every once in a while a package upgrade requires more extensive changes, and that subsequently warrants a more verbose message. 55 56 ## Rebasing between branches (i.e. from master to staging) 57
+8
nixos/doc/manual/from_md/release-notes/rl-2211.section.xml
··· 1464 are under <literal>programs.firefox</literal>. 1465 </para> 1466 </listitem> 1467 </itemizedlist> 1468 </section> 1469 </section>
··· 1464 are under <literal>programs.firefox</literal>. 1465 </para> 1466 </listitem> 1467 + <listitem> 1468 + <para> 1469 + The option 1470 + <literal>services.picom.experimentalBackends</literal> was 1471 + removed since it is now the default and the option will cause 1472 + <literal>picom</literal> to quit instead. 1473 + </para> 1474 + </listitem> 1475 </itemizedlist> 1476 </section> 1477 </section>
+2
nixos/doc/manual/release-notes/rl-2211.section.md
··· 447 448 - A NixOS module for Firefox has been added which allows preferences and [policies](https://github.com/mozilla/policy-templates/blob/master/README.md) to be set. This also allows extensions to be installed via the `ExtensionSettings` policy. The new options are under `programs.firefox`. 449 450 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->
··· 447 448 - A NixOS module for Firefox has been added which allows preferences and [policies](https://github.com/mozilla/policy-templates/blob/master/README.md) to be set. This also allows extensions to be installed via the `ExtensionSettings` policy. The new options are under `programs.firefox`. 449 450 + - The option `services.picom.experimentalBackends` was removed since it is now the default and the option will cause `picom` to quit instead. 451 + 452 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->
+1 -1
nixos/modules/config/power-management.nix
··· 94 after = [ "suspend.target" "hibernate.target" "hybrid-sleep.target" "suspend-then-hibernate.target" ]; 95 script = 96 '' 97 - /run/current-system/systemd/bin/systemctl try-restart post-resume.target 98 ${cfg.resumeCommands} 99 ${cfg.powerUpCommands} 100 '';
··· 94 after = [ "suspend.target" "hibernate.target" "hybrid-sleep.target" "suspend-then-hibernate.target" ]; 95 script = 96 '' 97 + /run/current-system/systemd/bin/systemctl try-restart --no-block post-resume.target 98 ${cfg.resumeCommands} 99 ${cfg.powerUpCommands} 100 '';
+4 -10
nixos/modules/services/x11/picom.nix
··· 47 since picom v6 and was subsequently removed by upstream. 48 See https://github.com/yshui/picom/commit/bcbc410 49 '') 50 ]; 51 52 options.services.picom = { ··· 55 default = false; 56 description = lib.mdDoc '' 57 Whether or not to enable Picom as the X.org composite manager. 58 - ''; 59 - }; 60 - 61 - experimentalBackends = mkOption { 62 - type = types.bool; 63 - default = false; 64 - description = lib.mdDoc '' 65 - Whether to use the unstable new reimplementation of the backends. 66 ''; 67 }; 68 ··· 306 }; 307 308 serviceConfig = { 309 - ExecStart = "${pkgs.picom}/bin/picom --config ${configFile}" 310 - + (optionalString cfg.experimentalBackends " --experimental-backends"); 311 RestartSec = 3; 312 Restart = "always"; 313 };
··· 47 since picom v6 and was subsequently removed by upstream. 48 See https://github.com/yshui/picom/commit/bcbc410 49 '') 50 + (mkRemovedOptionModule [ "services" "picom" "experimentalBackends" ] '' 51 + This option was removed by upstream since picom v10. 52 + '') 53 ]; 54 55 options.services.picom = { ··· 58 default = false; 59 description = lib.mdDoc '' 60 Whether or not to enable Picom as the X.org composite manager. 61 ''; 62 }; 63 ··· 301 }; 302 303 serviceConfig = { 304 + ExecStart = "${pkgs.picom}/bin/picom --config ${configFile}"; 305 RestartSec = 3; 306 Restart = "always"; 307 };
+30
pkgs/applications/editors/vscode/extensions/default.nix
··· 537 }; 538 }; 539 540 bradlc.vscode-tailwindcss = buildVscodeMarketplaceExtension { 541 mktplcRef = { 542 name = "vscode-tailwindcss"; ··· 1668 }; 1669 }; 1670 1671 mattn.lisp = buildVscodeMarketplaceExtension { 1672 mktplcRef = { 1673 name = "lisp"; ··· 2596 license = licenses.mit; 2597 maintainers = with maintainers; [ ]; 2598 }; 2599 }; 2600 2601 tiehuis.zig = buildVscodeMarketplaceExtension {
··· 537 }; 538 }; 539 540 + bmalehorn.vscode-fish = buildVscodeMarketplaceExtension { 541 + mktplcRef = { 542 + name = "vscode-fish"; 543 + publisher = "bmalehorn"; 544 + version = "1.0.31"; 545 + sha256 = "sha256-jDWW43ozUPIzhK/qQ+a+JSNdDHrjvgosyGe8kzBX6xM="; 546 + }; 547 + meta.license = lib.licenses.mit; 548 + }; 549 + 550 bradlc.vscode-tailwindcss = buildVscodeMarketplaceExtension { 551 mktplcRef = { 552 name = "vscode-tailwindcss"; ··· 1678 }; 1679 }; 1680 1681 + matangover.mypy = buildVscodeMarketplaceExtension { 1682 + mktplcRef = { 1683 + name = "mypy"; 1684 + publisher = "matangover"; 1685 + version = "0.2.2"; 1686 + sha256 = "sha256-eaiR30HjPCpOLUKQqiQ2Oqj+XY+JNnV47bM5KD2Mouk="; 1687 + }; 1688 + meta.license = lib.licenses.mit; 1689 + }; 1690 + 1691 mattn.lisp = buildVscodeMarketplaceExtension { 1692 mktplcRef = { 1693 name = "lisp"; ··· 2616 license = licenses.mit; 2617 maintainers = with maintainers; [ ]; 2618 }; 2619 + }; 2620 + 2621 + thenuprojectcontributors.vscode-nushell-lang = buildVscodeMarketplaceExtension { 2622 + mktplcRef = { 2623 + name = "vscode-nushell-lang"; 2624 + publisher = "thenuprojectcontributors"; 2625 + version = "0.7.0"; 2626 + sha256 = "sha256-+AGJkFx/uzgQzuRnRBZ44xGNQ6a/QWt7SNiQgwPTZxo="; 2627 + }; 2628 + meta.license = lib.licenses.mit; 2629 }; 2630 2631 tiehuis.zig = buildVscodeMarketplaceExtension {
+2 -2
pkgs/applications/networking/irc/sic/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "sic"; 5 - version = "1.2"; 6 7 src = fetchurl { 8 url = "https://dl.suckless.org/tools/sic-${version}.tar.gz"; 9 - sha256 = "ac07f905995e13ba2c43912d7a035fbbe78a628d7ba1c256f4ca1372fb565185"; 10 }; 11 12 makeFlags = [ "CC:=$(CC)" ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "sic"; 5 + version = "1.3"; 6 7 src = fetchurl { 8 url = "https://dl.suckless.org/tools/sic-${version}.tar.gz"; 9 + hash = "sha256-MEePqz68dfLrXQjLtbL+3K9IkRbnWi3XGX4+nHM9ZdI="; 10 }; 11 12 makeFlags = [ "CC:=$(CC)" ];
+5 -23
pkgs/applications/science/electronics/dsview/default.nix
··· 1 { lib, mkDerivation, fetchFromGitHub, pkg-config, cmake 2 - , libzip, boost, fftw, qtbase, libusb1, libsigrok4dsl 3 - , libsigrokdecode4dsl, python3, fetchpatch 4 }: 5 6 mkDerivation rec { 7 pname = "dsview"; 8 9 - version = "1.12"; 10 11 src = fetchFromGitHub { 12 owner = "DreamSourceLab"; 13 repo = "DSView"; 14 rev = "v${version}"; 15 - sha256 = "q7F4FuK/moKkouXTNPZDVon/W/ZmgtNHJka4MiTxA0U="; 16 }; 17 - 18 - sourceRoot = "source/DSView"; 19 20 patches = [ 21 # Fix absolute install paths 22 ./install.patch 23 - 24 - # Fix buld with Qt5.15 already merged upstream for future release 25 - # Using local file instead of content of commit #33e3d896a47 because 26 - # sourceRoot make it unappliable 27 - ./qt515.patch 28 - 29 - # Change from upstream master that removes extern-C scopes which 30 - # cause failures with modern glib. This can likely be removed if 31 - # there is an upstream release >1.12 32 - (fetchpatch { 33 - name = "fix-extern-c.patch"; 34 - url = "https://github.com/DreamSourceLab/DSView/commit/33cc733abe19872bf5ed08540a94b798d0d4ecf4.patch"; 35 - sha256 = "sha256-TLfLQa3sdyNHTpMMvId/V6uUuOFihOZMFJOj9frnDoY="; 36 - stripLen = 2; 37 - extraPrefix = ""; 38 - }) 39 ]; 40 41 nativeBuildInputs = [ cmake pkg-config ]; 42 43 buildInputs = [ 44 - boost fftw qtbase libusb1 libzip libsigrokdecode4dsl libsigrok4dsl 45 python3 46 ]; 47
··· 1 { lib, mkDerivation, fetchFromGitHub, pkg-config, cmake 2 + , libzip, boost, fftw, qtbase, libusb1 3 + , python3, fetchpatch 4 }: 5 6 mkDerivation rec { 7 pname = "dsview"; 8 9 + version = "1.2.1"; 10 11 src = fetchFromGitHub { 12 owner = "DreamSourceLab"; 13 repo = "DSView"; 14 rev = "v${version}"; 15 + sha256 = "sha256-TE2yfzv2h77GLMkmoVGXmzs7J0l/N+n1eYxyrtnrnGU="; 16 }; 17 18 patches = [ 19 # Fix absolute install paths 20 ./install.patch 21 ]; 22 23 nativeBuildInputs = [ cmake pkg-config ]; 24 25 buildInputs = [ 26 + boost fftw qtbase libusb1 libzip 27 python3 28 ]; 29
+19 -11
pkgs/applications/science/electronics/dsview/install.patch
··· 1 diff --git a/CMakeLists.txt b/CMakeLists.txt 2 - index c1c33e1..208a184 100644 3 --- a/CMakeLists.txt 4 +++ b/CMakeLists.txt 5 - @@ -427,8 +427,8 @@ 6 - install(FILES ../NEWS31 DESTINATION share/${PROJECT_NAME} RENAME NEWS31) 7 - install(FILES ../ug25.pdf DESTINATION share/${PROJECT_NAME} RENAME ug25.pdf) 8 - install(FILES ../ug31.pdf DESTINATION share/${PROJECT_NAME} RENAME ug31.pdf) 9 - -install(FILES DreamSourceLab.rules DESTINATION /etc/udev/rules.d/) 10 - -install(FILES DSView.desktop DESTINATION /usr/share/applications/) 11 - +install(FILES DreamSourceLab.rules DESTINATION etc/udev/rules.d/) 12 - +install(FILES DSView.desktop DESTINATION share/applications/) 13 14 - #=============================================================================== 15 - #= Packaging (handled by CPack)
··· 1 diff --git a/CMakeLists.txt b/CMakeLists.txt 2 + index eb9be42..220817c 100644 3 --- a/CMakeLists.txt 4 +++ b/CMakeLists.txt 5 + @@ -662,16 +662,8 @@ install(FILES DSView/icons/logo.svg DESTINATION share/icons/hicolor/scalable/app 6 + install(FILES DSView/icons/logo.svg DESTINATION share/pixmaps RENAME dsview.svg) 7 8 + if(CMAKE_SYSTEM_NAME MATCHES "Linux") 9 + - install(FILES DSView/DSView.desktop DESTINATION /usr/share/applications RENAME dsview.desktop) 10 + - 11 + - if(IS_DIRECTORY /usr/lib/udev/rules.d) 12 + - install(FILES DSView/DreamSourceLab.rules DESTINATION /usr/lib/udev/rules.d RENAME 60-dreamsourcelab.rules) 13 + - elseif(IS_DIRECTORY /lib/udev/rules.d) 14 + - install(FILES DSView/DreamSourceLab.rules DESTINATION /lib/udev/rules.d RENAME 60-dreamsourcelab.rules) 15 + - elseif(IS_DIRECTORY /etc/udev/rules.d) 16 + - install(FILES DSView/DreamSourceLab.rules DESTINATION /etc/udev/rules.d RENAME 60-dreamsourcelab.rules) 17 + - endif() 18 + - 19 + + install(FILES DSView/DSView.desktop DESTINATION share/applications RENAME dsview.desktop) 20 + + install(FILES DSView/DreamSourceLab.rules DESTINATION etc/udev/rules.d RENAME 60-dreamsourcelab.rules) 21 + endif() 22 + 23 + install(FILES NEWS25 DESTINATION share/DSView RENAME NEWS25)
-28
pkgs/applications/science/electronics/dsview/libsigrok4dsl.nix
··· 1 - { lib, stdenv, pkg-config, autoreconfHook, 2 - glib, libzip, libserialport, check, libusb1, libftdi, 3 - systemd, alsa-lib, dsview 4 - }: 5 - 6 - stdenv.mkDerivation { 7 - inherit (dsview) version src; 8 - 9 - pname = "libsigrok4dsl"; 10 - 11 - postUnpack = '' 12 - export sourceRoot=$sourceRoot/libsigrok4DSL 13 - ''; 14 - 15 - nativeBuildInputs = [ pkg-config autoreconfHook ]; 16 - 17 - buildInputs = [ 18 - glib libzip libserialport libusb1 libftdi systemd check alsa-lib 19 - ]; 20 - 21 - meta = with lib; { 22 - description = "A fork of the sigrok library for usage with DSView"; 23 - homepage = "https://www.dreamsourcelab.com/"; 24 - license = licenses.gpl3Plus; 25 - platforms = platforms.linux; 26 - maintainers = [ maintainers.bachp ]; 27 - }; 28 - }
···
-27
pkgs/applications/science/electronics/dsview/libsigrokdecode4dsl.nix
··· 1 - { lib, stdenv, pkg-config, autoreconfHook, 2 - glib, check, python3, dsview 3 - }: 4 - 5 - stdenv.mkDerivation { 6 - inherit (dsview) version src; 7 - 8 - pname = "libsigrokdecode4dsl"; 9 - 10 - postUnpack = '' 11 - export sourceRoot=$sourceRoot/libsigrokdecode4DSL 12 - ''; 13 - 14 - nativeBuildInputs = [ pkg-config autoreconfHook ]; 15 - 16 - buildInputs = [ 17 - python3 glib check 18 - ]; 19 - 20 - meta = with lib; { 21 - description = "A fork of the sigrokdecode library for usage with DSView"; 22 - homepage = "https://www.dreamsourcelab.com/"; 23 - license = licenses.gpl3Plus; 24 - platforms = platforms.linux; 25 - maintainers = [ maintainers.bachp ]; 26 - }; 27 - }
···
-13
pkgs/applications/science/electronics/dsview/qt515.patch
··· 1 - diff --git a/pv/view/viewport.cpp b/pv/view/viewport.cpp 2 - index 921d3db..16cdce9 100755 3 - --- a/pv/view/viewport.cpp 4 - +++ b/pv/view/viewport.cpp 5 - @@ -37,7 +37,7 @@ 6 - 7 - #include <QMouseEvent> 8 - #include <QStyleOption> 9 - - 10 - +#include <QPainterPath> 11 - 12 - #include <math.h> 13 -
···
+36
pkgs/applications/version-management/git-and-tools/git-credential-keepassxc/default.nix
···
··· 1 + { lib 2 + , stdenv 3 + , rustPlatform 4 + , fetchFromGitHub 5 + , DiskArbitration 6 + , Foundation 7 + }: 8 + 9 + rustPlatform.buildRustPackage rec { 10 + pname = "git-credential-keepassxc"; 11 + version = "0.10.1"; 12 + 13 + src = fetchFromGitHub { 14 + owner = "Frederick888"; 15 + repo = "git-credential-keepassxc"; 16 + rev = "v${version}"; 17 + hash = "sha256-zVE3RQlh0SEV4iavz40YhR+MP31oLCvG54H8gqXwL/k="; 18 + }; 19 + 20 + cargoHash = "sha256-H75SGbT//02I+umttnPM5BwtFkDVNxEYLf84oULEuEk="; 21 + 22 + buildInputs = lib.optionals stdenv.isDarwin [ DiskArbitration Foundation ]; 23 + 24 + meta = with lib; { 25 + description = "Helper that allows Git (and shell scripts) to use KeePassXC as credential store"; 26 + longDescription = '' 27 + git-credential-keepassxc is a Git credential helper that allows Git 28 + (and shell scripts) to get/store logins from/to KeePassXC. 29 + It communicates with KeePassXC using keepassxc-protocol which is 30 + originally designed for browser extensions. 31 + ''; 32 + homepage = "https://github.com/Frederick888/git-credential-keepassxc"; 33 + license = licenses.gpl3Plus; 34 + maintainers = with maintainers; [ fgaz ]; 35 + }; 36 + }
+5 -8
pkgs/applications/virtualization/cri-o/wrapper.nix
··· 3 , makeWrapper 4 , lib 5 , extraPackages ? [] 6 - , cri-o 7 , runc # Default container runtime 8 , crun # Container runtime (default with cgroups v2 for podman/buildah) 9 , conmon # Container runtime monitor ··· 12 }: 13 14 let 15 - cri-o = cri-o-unwrapped; 16 - 17 binPath = lib.makeBinPath ([ 18 runc 19 crun ··· 22 iptables 23 ] ++ extraPackages); 24 25 - in runCommand cri-o.name { 26 - name = "${cri-o.pname}-wrapper-${cri-o.version}"; 27 - inherit (cri-o) pname version passthru; 28 29 preferLocalBuild = true; 30 31 - meta = builtins.removeAttrs cri-o.meta [ "outputsToInstall" ]; 32 33 outputs = [ 34 "out" ··· 40 ]; 41 42 } '' 43 - ln -s ${cri-o.man} $man 44 45 mkdir -p $out/bin 46 ln -s ${cri-o-unwrapped}/share $out/share
··· 3 , makeWrapper 4 , lib 5 , extraPackages ? [] 6 , runc # Default container runtime 7 , crun # Container runtime (default with cgroups v2 for podman/buildah) 8 , conmon # Container runtime monitor ··· 11 }: 12 13 let 14 binPath = lib.makeBinPath ([ 15 runc 16 crun ··· 19 iptables 20 ] ++ extraPackages); 21 22 + in runCommand cri-o-unwrapped.name { 23 + name = "${cri-o-unwrapped.pname}-wrapper-${cri-o-unwrapped.version}"; 24 + inherit (cri-o-unwrapped) pname version passthru; 25 26 preferLocalBuild = true; 27 28 + meta = builtins.removeAttrs cri-o-unwrapped.meta [ "outputsToInstall" ]; 29 30 outputs = [ 31 "out" ··· 37 ]; 38 39 } '' 40 + ln -s ${cri-o-unwrapped.man} $man 41 42 mkdir -p $out/bin 43 ln -s ${cri-o-unwrapped}/share $out/share
+7 -10
pkgs/applications/virtualization/podman/wrapper.nix
··· 5 , lib 6 , stdenv 7 , extraPackages ? [] 8 - , podman # Docker compat 9 , runc # Default container runtime 10 , crun # Container runtime (default with cgroups v2 for podman/buildah) 11 , conmon # Container runtime monitor ··· 23 # adding aardvark-dns/netavark to `helpersBin` requires changes to the modules and tests 24 25 let 26 - podman = podman-unwrapped; 27 - 28 binPath = lib.makeBinPath ([ 29 ] ++ lib.optionals stdenv.isLinux [ 30 runc ··· 38 ] ++ extraPackages); 39 40 helpersBin = symlinkJoin { 41 - name = "${podman.pname}-helper-binary-wrapper-${podman.version}"; 42 43 # this only works for some binaries, others may need to be be added to `binPath` or in the modules 44 paths = [ 45 gvproxy 46 ] ++ lib.optionals stdenv.isLinux [ 47 catatonit # added here for the pause image and also set in `containersConf` for `init_path` 48 - podman.rootlessport 49 ]; 50 }; 51 52 - in runCommand podman.name { 53 - name = "${podman.pname}-wrapper-${podman.version}"; 54 - inherit (podman) pname version passthru; 55 56 preferLocalBuild = true; 57 58 - meta = builtins.removeAttrs podman.meta [ "outputsToInstall" ]; 59 60 outputs = [ 61 "out" ··· 67 ]; 68 69 } '' 70 - ln -s ${podman.man} $man 71 72 mkdir -p $out/bin 73 ln -s ${podman-unwrapped}/etc $out/etc
··· 5 , lib 6 , stdenv 7 , extraPackages ? [] 8 , runc # Default container runtime 9 , crun # Container runtime (default with cgroups v2 for podman/buildah) 10 , conmon # Container runtime monitor ··· 22 # adding aardvark-dns/netavark to `helpersBin` requires changes to the modules and tests 23 24 let 25 binPath = lib.makeBinPath ([ 26 ] ++ lib.optionals stdenv.isLinux [ 27 runc ··· 35 ] ++ extraPackages); 36 37 helpersBin = symlinkJoin { 38 + name = "${podman-unwrapped.pname}-helper-binary-wrapper-${podman-unwrapped.version}"; 39 40 # this only works for some binaries, others may need to be be added to `binPath` or in the modules 41 paths = [ 42 gvproxy 43 ] ++ lib.optionals stdenv.isLinux [ 44 catatonit # added here for the pause image and also set in `containersConf` for `init_path` 45 + podman-unwrapped.rootlessport 46 ]; 47 }; 48 49 + in runCommand podman-unwrapped.name { 50 + name = "${podman-unwrapped.pname}-wrapper-${podman-unwrapped.version}"; 51 + inherit (podman-unwrapped) pname version passthru; 52 53 preferLocalBuild = true; 54 55 + meta = builtins.removeAttrs podman-unwrapped.meta [ "outputsToInstall" ]; 56 57 outputs = [ 58 "out" ··· 64 ]; 65 66 } '' 67 + ln -s ${podman-unwrapped.man} $man 68 69 mkdir -p $out/bin 70 ln -s ${podman-unwrapped}/etc $out/etc
+2 -2
pkgs/applications/window-managers/picom/default.nix
··· 32 33 stdenv.mkDerivation rec { 34 pname = "picom"; 35 - version = "9.1"; 36 37 src = fetchFromGitHub { 38 owner = "yshui"; 39 repo = "picom"; 40 rev = "v${version}"; 41 - sha256 = "sha256-Fqk6bPAOg4muxmSP+ezpGUNw6xrMWchZACKemeA08mA="; 42 fetchSubmodules = true; 43 }; 44
··· 32 33 stdenv.mkDerivation rec { 34 pname = "picom"; 35 + version = "10"; 36 37 src = fetchFromGitHub { 38 owner = "yshui"; 39 repo = "picom"; 40 rev = "v${version}"; 41 + sha256 = "sha256-ACQBgAYtJ4OOQIismNYJB3z426GmlyUtXXbH06eRsgg="; 42 fetchSubmodules = true; 43 }; 44
-9
pkgs/build-support/make-symlinks/builder.sh
··· 1 - source $stdenv/setup 2 - 3 - mkdir $out 4 - for file in $files 5 - do 6 - subdir=`dirname $file` 7 - mkdir -p $out/$subdir 8 - ln -s $dir/$file $out/$file 9 - done
···
-7
pkgs/build-support/make-symlinks/default.nix
··· 1 - {name ? "", stdenv, dir, files}: 2 - 3 - stdenv.mkDerivation { 4 - inherit dir files; 5 - name = if name == "" then dir.name else name; 6 - builder = ./builder.sh; 7 - }
···
+4 -6
pkgs/development/interpreters/lunatic/default.nix
··· 1 - { lib, rustPlatform, fetchFromGitHub, cmake, stdenv, Security }: 2 3 rustPlatform.buildRustPackage rec { 4 pname = "lunatic"; 5 - version = "0.10.1"; 6 7 src = fetchFromGitHub { 8 owner = "lunatic-solutions"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-MQ10WwvUdqU4w9uA4H1+VRM29HXVtLMwfGvbM6VqS90="; 12 }; 13 14 - cargoSha256 = "sha256-tNYA3YruI7VENmLbd3rmZr7BkqHp1HNOfzPTkIiixqA="; 15 - 16 - nativeBuildInputs = [ cmake ]; 17 18 buildInputs = lib.optional stdenv.isDarwin Security; 19
··· 1 + { lib, rustPlatform, fetchFromGitHub, stdenv, Security }: 2 3 rustPlatform.buildRustPackage rec { 4 pname = "lunatic"; 5 + version = "0.12.0"; 6 7 src = fetchFromGitHub { 8 owner = "lunatic-solutions"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-7fxccufM5tunbutABEtsa6++OLTsS72oA219zvf+KN8="; 12 }; 13 14 + cargoSha256 = "sha256-sHSQUvHTwyqMrGmwpblqpS4HfFiWGb+70a1uloDu2wY="; 15 16 buildInputs = lib.optional stdenv.isDarwin Security; 17
+15 -5
pkgs/development/libraries/duckdb/default.nix
··· 17 in 18 stdenv.mkDerivation rec { 19 pname = "duckdb"; 20 - version = "0.5.1"; 21 22 src = fetchFromGitHub { 23 owner = pname; 24 repo = pname; 25 rev = "v${version}"; 26 - sha256 = "sha256-qzDQFS2ogQ6hqTCddHnttWF365007Labnn4BmHB219k="; 27 }; 28 29 postPatch = '' 30 substituteInPlace CMakeLists.txt --subst-var-by DUCKDB_VERSION "v${version}" 31 ''; ··· 42 "-DBUILD_TPCE=ON" 43 "-DBUILD_TPCH_EXTENSION=ON" 44 "-DBUILD_VISUALIZER_EXTENSION=ON" 45 "-DJDBC_DRIVER=${enableFeature withJdbc}" 46 ]; 47 ··· 56 installCheckPhase = 57 let 58 excludes = map (pattern: "exclude:'${pattern}'") [ 59 - "*test_slow" 60 - "Test file buffers for reading/writing to file" 61 - "[test_slow]" 62 "test/common/test_cast_hugeint.test" 63 "test/sql/copy/csv/test_csv_remote.test" 64 "test/sql/copy/parquet/test_parquet_remote.test" 65 "test/sql/copy/parquet/test_parquet_remote_foreign_files.test" 66 ] ++ lib.optionals stdenv.isAarch64 [ 67 "test/sql/aggregate/aggregates/test_kurtosis.test" 68 "test/sql/aggregate/aggregates/test_skewness.test"
··· 17 in 18 stdenv.mkDerivation rec { 19 pname = "duckdb"; 20 + version = "0.6.0"; 21 22 src = fetchFromGitHub { 23 owner = pname; 24 repo = pname; 25 rev = "v${version}"; 26 + sha256 = "sha256-XCEX2VCynbMUP5xsxWq8PlHnfrBfES5c2fuu2jhM+tI="; 27 }; 28 29 + patches = [ ./version.patch ]; 30 + 31 postPatch = '' 32 substituteInPlace CMakeLists.txt --subst-var-by DUCKDB_VERSION "v${version}" 33 ''; ··· 44 "-DBUILD_TPCE=ON" 45 "-DBUILD_TPCH_EXTENSION=ON" 46 "-DBUILD_VISUALIZER_EXTENSION=ON" 47 + "-DBUILD_INET_EXTENSION=ON" 48 "-DJDBC_DRIVER=${enableFeature withJdbc}" 49 ]; 50 ··· 59 installCheckPhase = 60 let 61 excludes = map (pattern: "exclude:'${pattern}'") [ 62 + "[s3]" 63 + "Test closing database during long running query" 64 "test/common/test_cast_hugeint.test" 65 "test/sql/copy/csv/test_csv_remote.test" 66 "test/sql/copy/parquet/test_parquet_remote.test" 67 "test/sql/copy/parquet/test_parquet_remote_foreign_files.test" 68 + "test/sql/storage/compression/chimp/chimp_read.test" 69 + "test/sql/storage/compression/chimp/chimp_read_float.test" 70 + "test/sql/storage/compression/patas/patas_compression_ratio.test_coverage" 71 + "test/sql/storage/compression/patas/patas_read.test" 72 + # these are only hidden if no filters are passed in 73 + "[!hide]" 74 + # this test apparently never terminates 75 + "test/sql/copy/csv/auto/test_csv_auto.test" 76 ] ++ lib.optionals stdenv.isAarch64 [ 77 "test/sql/aggregate/aggregates/test_kurtosis.test" 78 "test/sql/aggregate/aggregates/test_skewness.test"
+27 -20
pkgs/development/libraries/duckdb/version.patch
··· 1 diff --git a/CMakeLists.txt b/CMakeLists.txt 2 - index 92c097228..5f51929f6 100644 3 --- a/CMakeLists.txt 4 +++ b/CMakeLists.txt 5 - @@ -157,45 +157,7 @@ if(${CMAKE_SYSTEM_NAME} STREQUAL "SunOS") 6 set(SUN TRUE) 7 endif() 8 9 - -execute_process( 10 - - COMMAND git log -1 --format=%h 11 - - WORKING_DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR} 12 - - RESULT_VARIABLE GIT_RESULT 13 - - OUTPUT_VARIABLE GIT_COMMIT_HASH 14 - - OUTPUT_STRIP_TRAILING_WHITESPACE) 15 - -execute_process( 16 - - COMMAND git describe --tags --abbrev=0 17 - - WORKING_DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR} 18 - - OUTPUT_VARIABLE GIT_LAST_TAG 19 - - OUTPUT_STRIP_TRAILING_WHITESPACE) 20 - -execute_process( 21 - - COMMAND git describe --tags --long 22 - - WORKING_DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR} 23 - - OUTPUT_VARIABLE GIT_ITERATION 24 - - OUTPUT_STRIP_TRAILING_WHITESPACE) 25 - 26 -if(GIT_RESULT EQUAL "0") 27 - string(REGEX REPLACE "v([0-9]+).[0-9]+.[0-9]+" "\\1" DUCKDB_MAJOR_VERSION "${GIT_LAST_TAG}") ··· 47 -endif() 48 +set(DUCKDB_VERSION "@DUCKDB_VERSION@") 49 50 - option(AMALGAMATION_BUILD 51 - "Build from the amalgamation files, rather than from the normal sources."
··· 1 diff --git a/CMakeLists.txt b/CMakeLists.txt 2 + index 349af6acf7..7ffec0b4cb 100644 3 --- a/CMakeLists.txt 4 +++ b/CMakeLists.txt 5 + @@ -196,52 +196,7 @@ if(${CMAKE_SYSTEM_NAME} STREQUAL "SunOS") 6 set(SUN TRUE) 7 endif() 8 9 + -find_package(Git) 10 + -if(Git_FOUND) 11 + - if (NOT DEFINED GIT_COMMIT_HASH) 12 + - execute_process( 13 + - COMMAND ${GIT_EXECUTABLE} log -1 --format=%h 14 + - WORKING_DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR} 15 + - RESULT_VARIABLE GIT_RESULT 16 + - OUTPUT_VARIABLE GIT_COMMIT_HASH 17 + - OUTPUT_STRIP_TRAILING_WHITESPACE) 18 + - endif() 19 + - execute_process( 20 + - COMMAND ${GIT_EXECUTABLE} describe --tags --abbrev=0 21 + - WORKING_DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR} 22 + - OUTPUT_VARIABLE GIT_LAST_TAG 23 + - OUTPUT_STRIP_TRAILING_WHITESPACE) 24 + - execute_process( 25 + - COMMAND ${GIT_EXECUTABLE} describe --tags --long 26 + - WORKING_DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR} 27 + - OUTPUT_VARIABLE GIT_ITERATION 28 + - OUTPUT_STRIP_TRAILING_WHITESPACE) 29 + -else() 30 + - message("Git NOT FOUND") 31 + -endif() 32 - 33 -if(GIT_RESULT EQUAL "0") 34 - string(REGEX REPLACE "v([0-9]+).[0-9]+.[0-9]+" "\\1" DUCKDB_MAJOR_VERSION "${GIT_LAST_TAG}") ··· 54 -endif() 55 +set(DUCKDB_VERSION "@DUCKDB_VERSION@") 56 57 + message(STATUS "git hash ${GIT_COMMIT_HASH}, version ${DUCKDB_VERSION}") 58 +
+10 -4
pkgs/development/python-modules/duckdb/default.nix
··· 13 }: 14 15 buildPythonPackage rec { 16 - pname = "duckdb"; 17 - inherit (duckdb) version src patches; 18 format = "setuptools"; 19 20 - preConfigure = '' 21 cd tools/pythonpkg 22 - substituteInPlace setup.py --replace "multiprocessing.cpu_count()" "$NIX_BUILD_CORES" 23 ''; 24 25 SETUPTOOLS_SCM_PRETEND_VERSION = version;
··· 13 }: 14 15 buildPythonPackage rec { 16 + inherit (duckdb) pname version src patches; 17 format = "setuptools"; 18 19 + # we can't use sourceRoot otherwise patches don't apply, because the patches 20 + # apply to the C++ library 21 + postPatch = '' 22 cd tools/pythonpkg 23 + 24 + # 1. let nix control build cores 25 + # 2. unconstrain setuptools_scm version 26 + substituteInPlace setup.py \ 27 + --replace "multiprocessing.cpu_count()" "$NIX_BUILD_CORES" \ 28 + --replace "setuptools_scm<7.0.0" "setuptools_scm" 29 ''; 30 31 SETUPTOOLS_SCM_PRETEND_VERSION = version;
+7 -10
pkgs/development/tools/buildah/wrapper.nix
··· 4 , lib 5 , stdenv 6 , extraPackages ? [] 7 - , buildah 8 , runc # Default container runtime 9 , crun # Container runtime (default with cgroups v2 for podman/buildah) 10 , conmon # Container runtime monitor ··· 15 }: 16 17 let 18 - buildah = buildah-unwrapped; 19 - 20 - preferLocalBuild = true; 21 - 22 binPath = lib.makeBinPath ([ 23 ] ++ lib.optionals stdenv.isLinux [ 24 runc ··· 30 iptables 31 ] ++ extraPackages); 32 33 - in runCommand buildah.name { 34 - name = "${buildah.pname}-wrapper-${buildah.version}"; 35 - inherit (buildah) pname version; 36 37 - meta = builtins.removeAttrs buildah.meta [ "outputsToInstall" ]; 38 39 outputs = [ 40 "out" ··· 46 ]; 47 48 } '' 49 - ln -s ${buildah.man} $man 50 51 mkdir -p $out/bin 52 ln -s ${buildah-unwrapped}/share $out/share
··· 4 , lib 5 , stdenv 6 , extraPackages ? [] 7 , runc # Default container runtime 8 , crun # Container runtime (default with cgroups v2 for podman/buildah) 9 , conmon # Container runtime monitor ··· 14 }: 15 16 let 17 binPath = lib.makeBinPath ([ 18 ] ++ lib.optionals stdenv.isLinux [ 19 runc ··· 25 iptables 26 ] ++ extraPackages); 27 28 + in runCommand buildah-unwrapped.name { 29 + name = "${buildah-unwrapped.pname}-wrapper-${buildah-unwrapped.version}"; 30 + inherit (buildah-unwrapped) pname version; 31 + 32 + preferLocalBuild = true; 33 34 + meta = builtins.removeAttrs buildah-unwrapped.meta [ "outputsToInstall" ]; 35 36 outputs = [ 37 "out" ··· 43 ]; 44 45 } '' 46 + ln -s ${buildah-unwrapped.man} $man 47 48 mkdir -p $out/bin 49 ln -s ${buildah-unwrapped}/share $out/share
+2 -2
pkgs/development/tools/continuous-integration/jenkins/default.nix
··· 4 5 stdenv.mkDerivation rec { 6 pname = "jenkins"; 7 - version = "2.361.3"; 8 9 src = fetchurl { 10 url = "https://get.jenkins.io/war-stable/${version}/jenkins.war"; 11 - hash = "sha256-85y40J/RfHLcCWURzlDyRfwwBNECKqr2BCGlNvdAybk="; 12 }; 13 14 nativeBuildInputs = [ makeWrapper ];
··· 4 5 stdenv.mkDerivation rec { 6 pname = "jenkins"; 7 + version = "2.361.4"; 8 9 src = fetchurl { 10 url = "https://get.jenkins.io/war-stable/${version}/jenkins.war"; 11 + hash = "sha256-s4/iGK+1RHsMmm+jCNerdirFpY3YmqaLc1BnrWw3wXs="; 12 }; 13 14 nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/development/tools/oh-my-posh/default.nix
··· 2 3 buildGoModule rec { 4 pname = "oh-my-posh"; 5 - version = "12.13.0"; 6 7 src = fetchFromGitHub { 8 owner = "jandedobbeleer"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-bGg0UqqplJpsJ2xOHmu6y8ixGxdDkWwZyRrgzrNBlIY="; 12 }; 13 14 vendorSha256 = "sha256-OrtKFkWXqVoXKmN6BT8YbCNjR1gRTT4gPNwmirn7fjU=";
··· 2 3 buildGoModule rec { 4 pname = "oh-my-posh"; 5 + version = "12.13.3"; 6 7 src = fetchFromGitHub { 8 owner = "jandedobbeleer"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-1H3BlKxTthyVXEaLISruZDFIeXEAaeZjGp597clPeLs="; 12 }; 13 14 vendorSha256 = "sha256-OrtKFkWXqVoXKmN6BT8YbCNjR1gRTT4gPNwmirn7fjU=";
+3 -3
pkgs/development/tools/ruff/default.nix
··· 8 9 rustPlatform.buildRustPackage rec { 10 pname = "ruff"; 11 - version = "0.0.121"; 12 13 src = fetchFromGitHub { 14 owner = "charliermarsh"; 15 repo = pname; 16 rev = "v${version}"; 17 - sha256 = "sha256-vplpsobc3LFkgJsyXGT0jel8nT6begotEvYGQESiMFI="; 18 }; 19 20 - cargoSha256 = "sha256-gtITHmB9Qd417yWqKcfidjUjAuVz1GNmbX0aL0Bl7jQ="; 21 22 buildInputs = lib.optionals stdenv.isDarwin [ 23 CoreServices
··· 8 9 rustPlatform.buildRustPackage rec { 10 pname = "ruff"; 11 + version = "0.0.122"; 12 13 src = fetchFromGitHub { 14 owner = "charliermarsh"; 15 repo = pname; 16 rev = "v${version}"; 17 + sha256 = "sha256-+CQOQcA7JLHsl6ieDpIEzUdeMBsGyP686mWaYgyweH4="; 18 }; 19 20 + cargoSha256 = "sha256-ZxJ7ErGdsI1dZIeUVdYBD4IF0nHHnIJGUXn+rtSBLLY="; 21 22 buildInputs = lib.optionals stdenv.isDarwin [ 23 CoreServices
+2 -2
pkgs/os-specific/linux/kernel/linux-5.10.nix
··· 3 with lib; 4 5 buildLinux (args // rec { 6 - version = "5.10.154"; 7 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 14 src = fetchurl { 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "12763vlnrgmgj03khj9ls2g7zlhclj9g1l3008b36j9jli6kvbn6"; 17 }; 18 } // (args.argsOverride or {}))
··· 3 with lib; 4 5 buildLinux (args // rec { 6 + version = "5.10.155"; 7 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 14 src = fetchurl { 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 + sha256 = "1wyla96qsdf50n7qjj4hdf36bj56whv7gc9mgw9bvrsqdi92gc7i"; 17 }; 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.15.nix
··· 3 with lib; 4 5 buildLinux (args // rec { 6 - version = "5.15.78"; 7 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 14 src = fetchurl { 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "16d4d4g5n2g6jpp8bvad1bm1l0b0nb4ckwsmq6w2g3538xrrzf8d"; 17 }; 18 } // (args.argsOverride or { }))
··· 3 with lib; 4 5 buildLinux (args // rec { 6 + version = "5.15.79"; 7 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 14 src = fetchurl { 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 + sha256 = "0m61k7k6lj24z9a266q08wzghggjik2wizcabdwd1vn0vcqr18yb"; 17 }; 18 } // (args.argsOverride or { }))
+2 -2
pkgs/os-specific/linux/kernel/linux-6.0.nix
··· 3 with lib; 4 5 buildLinux (args // rec { 6 - version = "6.0.8"; 7 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 14 src = fetchurl { 15 url = "mirror://kernel/linux/kernel/v6.x/linux-${version}.tar.xz"; 16 - sha256 = "0mx2bxgnxm3vz688268939xw90jqci7xn992kfpny74mjqwzir0d"; 17 }; 18 } // (args.argsOverride or { }))
··· 3 with lib; 4 5 buildLinux (args // rec { 6 + version = "6.0.9"; 7 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 14 src = fetchurl { 15 url = "mirror://kernel/linux/kernel/v6.x/linux-${version}.tar.xz"; 16 + sha256 = "1irip1yk62carcisxlacwcxsiqib4qswx6h5mfhv8f97x04a4531"; 17 }; 18 } // (args.argsOverride or { }))
+2 -2
pkgs/servers/monitoring/icinga2/default.nix
··· 9 10 stdenv.mkDerivation rec { 11 pname = "icinga2${nameSuffix}"; 12 - version = "2.13.5"; 13 14 src = fetchFromGitHub { 15 owner = "icinga"; 16 repo = "icinga2"; 17 rev = "v${version}"; 18 - sha256 = "sha256-XVA3VIGmj3mXfx2eIJ5X4hfjRrnZaAHYMPRyy9+9QGc="; 19 }; 20 21 patches = [
··· 9 10 stdenv.mkDerivation rec { 11 pname = "icinga2${nameSuffix}"; 12 + version = "2.13.6"; 13 14 src = fetchFromGitHub { 15 owner = "icinga"; 16 repo = "icinga2"; 17 rev = "v${version}"; 18 + sha256 = "sha256-Zrq+pw1dZyKVxpbsXeEPU3hLqcaYj/0wqB9HmYXnd0Y="; 19 }; 20 21 patches = [
+13 -17
pkgs/tools/compression/zfp/default.nix
··· 1 { cmake, cudatoolkit, fetchFromGitHub, gfortran, lib, llvmPackages, python3Packages, stdenv, targetPlatform 2 , enableCfp ? true 3 , enableCuda ? false 4 - , enableExamples ? true 5 , enableFortran ? builtins.elem targetPlatform.system gfortran.meta.platforms 6 , enableOpenMP ? true 7 , enablePython ? true ··· 9 10 stdenv.mkDerivation rec { 11 pname = "zfp"; 12 - version = "0.5.5"; 13 14 src = fetchFromGitHub { 15 owner = "LLNL"; 16 repo = "zfp"; 17 rev = version; 18 - sha256 = "19ycflz35qsrzfcvxdyy0mgbykfghfi9y5v684jb4awjp7nf562c"; 19 }; 20 21 nativeBuildInputs = [ cmake ]; ··· 24 ++ lib.optional enableFortran gfortran 25 ++ lib.optional enableOpenMP llvmPackages.openmp 26 ++ lib.optionals enablePython (with python3Packages; [ cython numpy python ]); 27 28 cmakeFlags = [ 29 - # More tests not enabled by default 30 - ''-DZFP_BINARY_DIR=${placeholder "out"}'' 31 - ''-DZFP_BUILD_TESTING_LARGE=ON'' 32 - ] 33 - ++ lib.optionals targetPlatform.isDarwin [ 34 - "-DCMAKE_INSTALL_BINDIR=bin" 35 - "-DCMAKE_INSTALL_LIBDIR=lib" 36 - ] 37 - ++ lib.optional enableCfp "-DBUILD_CFP=ON" 38 ++ lib.optional enableCuda "-DZFP_WITH_CUDA=ON" 39 - ++ lib.optional enableExamples "-DBUILD_EXAMPLES=ON" 40 ++ lib.optional enableFortran "-DBUILD_ZFORP=ON" 41 ++ lib.optional enableOpenMP "-DZFP_WITH_OPENMP=ON" 42 ++ lib.optional enablePython "-DBUILD_ZFPY=ON" 43 ++ ([ "-DBUILD_UTILITIES=${if enableUtilities then "ON" else "OFF"}" ]); 44 - 45 - preCheck = lib.optional targetPlatform.isDarwin '' 46 - export DYLD_LIBRARY_PATH="$out/lib:$DYLD_LIBRARY_PATH" 47 - ''; 48 49 doCheck = true; 50
··· 1 { cmake, cudatoolkit, fetchFromGitHub, gfortran, lib, llvmPackages, python3Packages, stdenv, targetPlatform 2 , enableCfp ? true 3 , enableCuda ? false 4 , enableFortran ? builtins.elem targetPlatform.system gfortran.meta.platforms 5 , enableOpenMP ? true 6 , enablePython ? true ··· 8 9 stdenv.mkDerivation rec { 10 pname = "zfp"; 11 + version = "1.0.0"; 12 13 src = fetchFromGitHub { 14 owner = "LLNL"; 15 repo = "zfp"; 16 rev = version; 17 + sha256 = "sha256-E2LI1rWo1HO5O/sxPHAmLDs3Z5xouzlgMj11rQFPNYQ="; 18 }; 19 20 nativeBuildInputs = [ cmake ]; ··· 23 ++ lib.optional enableFortran gfortran 24 ++ lib.optional enableOpenMP llvmPackages.openmp 25 ++ lib.optionals enablePython (with python3Packages; [ cython numpy python ]); 26 + 27 + # compile CUDA code for all extant GPUs so the binary will work with any GPU 28 + # and driver combination. to be ultimately solved upstream: 29 + # https://github.com/LLNL/zfp/issues/178 30 + # NB: not in cmakeFlags due to https://github.com/NixOS/nixpkgs/issues/114044 31 + preConfigure = lib.optionalString enableCuda '' 32 + cmakeFlagsArray+=( 33 + "-DCMAKE_CUDA_FLAGS=-gencode=arch=compute_52,code=sm_52 -gencode=arch=compute_60,code=sm_60 -gencode=arch=compute_61,code=sm_61 -gencode=arch=compute_70,code=sm_70 -gencode=arch=compute_75,code=sm_75 -gencode=arch=compute_80,code=sm_80 -gencode=arch=compute_86,code=sm_86 -gencode=arch=compute_87,code=sm_87 -gencode=arch=compute_86,code=compute_86" 34 + ) 35 + ''; 36 37 cmakeFlags = [ 38 + ] ++ lib.optional enableCfp "-DBUILD_CFP=ON" 39 ++ lib.optional enableCuda "-DZFP_WITH_CUDA=ON" 40 ++ lib.optional enableFortran "-DBUILD_ZFORP=ON" 41 ++ lib.optional enableOpenMP "-DZFP_WITH_OPENMP=ON" 42 ++ lib.optional enablePython "-DBUILD_ZFPY=ON" 43 ++ ([ "-DBUILD_UTILITIES=${if enableUtilities then "ON" else "OFF"}" ]); 44 45 doCheck = true; 46
+4 -4
pkgs/top-level/all-packages.nix
··· 7081 7082 git-credential-1password = callPackage ../applications/version-management/git-and-tools/git-credential-1password { }; 7083 7084 git-crecord = callPackage ../applications/version-management/git-crecord { }; 7085 7086 git-crypt = callPackage ../applications/version-management/git-and-tools/git-crypt { }; ··· 16820 }; 16821 16822 libsigrokdecode = callPackage ../development/tools/libsigrokdecode { }; 16823 - 16824 - # special forks used for dsview 16825 - libsigrok4dsl = callPackage ../applications/science/electronics/dsview/libsigrok4dsl.nix { }; 16826 - libsigrokdecode4dsl = callPackage ../applications/science/electronics/dsview/libsigrokdecode4dsl.nix { }; 16827 16828 sigrok-firmware-fx2lafw = callPackage ../development/tools/sigrok-firmware-fx2lafw { }; 16829
··· 7081 7082 git-credential-1password = callPackage ../applications/version-management/git-and-tools/git-credential-1password { }; 7083 7084 + git-credential-keepassxc = callPackage ../applications/version-management/git-and-tools/git-credential-keepassxc { 7085 + inherit (darwin.apple_sdk.frameworks) DiskArbitration Foundation; 7086 + }; 7087 + 7088 git-crecord = callPackage ../applications/version-management/git-crecord { }; 7089 7090 git-crypt = callPackage ../applications/version-management/git-and-tools/git-crypt { }; ··· 16824 }; 16825 16826 libsigrokdecode = callPackage ../development/tools/libsigrokdecode { }; 16827 16828 sigrok-firmware-fx2lafw = callPackage ../development/tools/sigrok-firmware-fx2lafw { }; 16829